| /* |
| * Copyright (C) 2005 IBM Corporation |
| * |
| * Authors: |
| * Seiji Munetoh <munetoh@jp.ibm.com> |
| * Stefan Berger <stefanb@us.ibm.com> |
| * Reiner Sailer <sailer@watson.ibm.com> |
| * Kylene Hall <kjhall@us.ibm.com> |
| * |
| * Access to the eventlog extended by the TCG BIOS of PC platform |
| * |
| * This program is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU General Public License |
| * as published by the Free Software Foundation; either version |
| * 2 of the License, or (at your option) any later version. |
| * |
| */ |
| |
| #include <linux/seq_file.h> |
| #include <linux/fs.h> |
| #include <linux/security.h> |
| #include <linux/module.h> |
| #include <acpi/acpi.h> |
| #include <acpi/actypes.h> |
| #include <acpi/actbl.h> |
| #include "tpm.h" |
| |
| #define TCG_EVENT_NAME_LEN_MAX 255 |
| #define MAX_TEXT_EVENT 1000 /* Max event string length */ |
| #define ACPI_TCPA_SIG "TCPA" /* 0x41504354 /'TCPA' */ |
| |
| enum bios_platform_class { |
| BIOS_CLIENT = 0x00, |
| BIOS_SERVER = 0x01, |
| }; |
| |
| struct tpm_bios_log { |
| void *bios_event_log; |
| void *bios_event_log_end; |
| }; |
| |
| struct acpi_tcpa { |
| struct acpi_table_header hdr; |
| u16 platform_class; |
| union { |
| struct client_hdr { |
| u32 log_max_len __attribute__ ((packed)); |
| u64 log_start_addr __attribute__ ((packed)); |
| } client; |
| struct server_hdr { |
| u16 reserved; |
| u64 log_max_len __attribute__ ((packed)); |
| u64 log_start_addr __attribute__ ((packed)); |
| } server; |
| }; |
| }; |
| |
| struct tcpa_event { |
| u32 pcr_index; |
| u32 event_type; |
| u8 pcr_value[20]; /* SHA1 */ |
| u32 event_size; |
| u8 event_data[0]; |
| }; |
| |
| enum tcpa_event_types { |
| PREBOOT = 0, |
| POST_CODE, |
| UNUSED, |
| NO_ACTION, |
| SEPARATOR, |
| ACTION, |
| EVENT_TAG, |
| SCRTM_CONTENTS, |
| SCRTM_VERSION, |
| CPU_MICROCODE, |
| PLATFORM_CONFIG_FLAGS, |
| TABLE_OF_DEVICES, |
| COMPACT_HASH, |
| IPL, |
| IPL_PARTITION_DATA, |
| NONHOST_CODE, |
| NONHOST_CONFIG, |
| NONHOST_INFO, |
| }; |
| |
| static const char* tcpa_event_type_strings[] = { |
| "PREBOOT", |
| "POST CODE", |
| "", |
| "NO ACTION", |
| "SEPARATOR", |
| "ACTION", |
| "EVENT TAG", |
| "S-CRTM Contents", |
| "S-CRTM Version", |
| "CPU Microcode", |
| "Platform Config Flags", |
| "Table of Devices", |
| "Compact Hash", |
| "IPL", |
| "IPL Partition Data", |
| "Non-Host Code", |
| "Non-Host Config", |
| "Non-Host Info" |
| }; |
| |
| struct tcpa_pc_event { |
| u32 event_id; |
| u32 event_size; |
| u8 event_data[0]; |
| }; |
| |
| enum tcpa_pc_event_ids { |
| SMBIOS = 1, |
| BIS_CERT, |
| POST_BIOS_ROM, |
| ESCD, |
| CMOS, |
| NVRAM, |
| OPTION_ROM_EXEC, |
| OPTION_ROM_CONFIG, |
| OPTION_ROM_MICROCODE = 10, |
| S_CRTM_VERSION, |
| S_CRTM_CONTENTS, |
| POST_CONTENTS, |
| HOST_TABLE_OF_DEVICES, |
| }; |
| |
| static const char* tcpa_pc_event_id_strings[] = { |
| "", |
| "SMBIOS", |
| "BIS Certificate", |
| "POST BIOS ", |
| "ESCD ", |
| "CMOS", |
| "NVRAM", |
| "Option ROM", |
| "Option ROM config", |
| "", |
| "Option ROM microcode ", |
| "S-CRTM Version", |
| "S-CRTM Contents ", |
| "POST Contents ", |
| "Table of Devices", |
| }; |
| |
| /* returns pointer to start of pos. entry of tcg log */ |
| static void *tpm_bios_measurements_start(struct seq_file *m, loff_t *pos) |
| { |
| loff_t i; |
| struct tpm_bios_log *log = m->private; |
| void *addr = log->bios_event_log; |
| void *limit = log->bios_event_log_end; |
| struct tcpa_event *event; |
| |
| /* read over *pos measurements */ |
| for (i = 0; i < *pos; i++) { |
| event = addr; |
| |
| if ((addr + sizeof(struct tcpa_event)) < limit) { |
| if (event->event_type == 0 && event->event_size == 0) |
| return NULL; |
| addr += sizeof(struct tcpa_event) + event->event_size; |
| } |
| } |
| |
| /* now check if current entry is valid */ |
| if ((addr + sizeof(struct tcpa_event)) >= limit) |
| return NULL; |
| |
| event = addr; |
| |
| if ((event->event_type == 0 && event->event_size == 0) || |
| ((addr + sizeof(struct tcpa_event) + event->event_size) >= limit)) |
| return NULL; |
| |
| return addr; |
| } |
| |
| static void *tpm_bios_measurements_next(struct seq_file *m, void *v, |
| loff_t *pos) |
| { |
| struct tcpa_event *event = v; |
| struct tpm_bios_log *log = m->private; |
| void *limit = log->bios_event_log_end; |
| |
| v += sizeof(struct tcpa_event) + event->event_size; |
| |
| /* now check if current entry is valid */ |
| if ((v + sizeof(struct tcpa_event)) >= limit) |
| return NULL; |
| |
| event = v; |
| |
| if (event->event_type == 0 && event->event_size == 0) |
| return NULL; |
| |
| if ((event->event_type == 0 && event->event_size == 0) || |
| ((v + sizeof(struct tcpa_event) + event->event_size) >= limit)) |
| return NULL; |
| |
| (*pos)++; |
| return v; |
| } |
| |
| static void tpm_bios_measurements_stop(struct seq_file *m, void *v) |
| { |
| } |
| |
| static int get_event_name(char *dest, struct tcpa_event *event, |
| unsigned char * event_entry) |
| { |
| const char *name = ""; |
| char data[40] = ""; |
| int i, n_len = 0, d_len = 0; |
| struct tcpa_pc_event *pc_event; |
| |
| switch(event->event_type) { |
| case PREBOOT: |
| case POST_CODE: |
| case UNUSED: |
| case NO_ACTION: |
| case SCRTM_CONTENTS: |
| case SCRTM_VERSION: |
| case CPU_MICROCODE: |
| case PLATFORM_CONFIG_FLAGS: |
| case TABLE_OF_DEVICES: |
| case COMPACT_HASH: |
| case IPL: |
| case IPL_PARTITION_DATA: |
| case NONHOST_CODE: |
| case NONHOST_CONFIG: |
| case NONHOST_INFO: |
| name = tcpa_event_type_strings[event->event_type]; |
| n_len = strlen(name); |
| break; |
| case SEPARATOR: |
| case ACTION: |
| if (MAX_TEXT_EVENT > event->event_size) { |
| name = event_entry; |
| n_len = event->event_size; |
| } |
| break; |
| case EVENT_TAG: |
| pc_event = (struct tcpa_pc_event *)event_entry; |
| |
| /* ToDo Row data -> Base64 */ |
| |
| switch (pc_event->event_id) { |
| case SMBIOS: |
| case BIS_CERT: |
| case CMOS: |
| case NVRAM: |
| case OPTION_ROM_EXEC: |
| case OPTION_ROM_CONFIG: |
| case S_CRTM_VERSION: |
| name = tcpa_pc_event_id_strings[pc_event->event_id]; |
| n_len = strlen(name); |
| break; |
| /* hash data */ |
| case POST_BIOS_ROM: |
| case ESCD: |
| case OPTION_ROM_MICROCODE: |
| case S_CRTM_CONTENTS: |
| case POST_CONTENTS: |
| name = tcpa_pc_event_id_strings[pc_event->event_id]; |
| n_len = strlen(name); |
| for (i = 0; i < 20; i++) |
| d_len += sprintf(&data[2*i], "%02x", |
| pc_event->event_data[i]); |
| break; |
| default: |
| break; |
| } |
| default: |
| break; |
| } |
| |
| return snprintf(dest, MAX_TEXT_EVENT, "[%.*s%.*s]", |
| n_len, name, d_len, data); |
| |
| } |
| |
| static int tpm_binary_bios_measurements_show(struct seq_file *m, void *v) |
| { |
| struct tcpa_event *event = v; |
| char *data = v; |
| int i; |
| |
| for (i = 0; i < sizeof(struct tcpa_event) + event->event_size; i++) |
| seq_putc(m, data[i]); |
| |
| return 0; |
| } |
| |
| static int tpm_bios_measurements_release(struct inode *inode, |
| struct file *file) |
| { |
| struct seq_file *seq = file->private_data; |
| struct tpm_bios_log *log = seq->private; |
| |
| if (log) { |
| kfree(log->bios_event_log); |
| kfree(log); |
| } |
| |
| return seq_release(inode, file); |
| } |
| |
| static int tpm_ascii_bios_measurements_show(struct seq_file *m, void *v) |
| { |
| int len = 0; |
| int i; |
| char *eventname; |
| struct tcpa_event *event = v; |
| unsigned char *event_entry = |
| (unsigned char *) (v + sizeof(struct tcpa_event)); |
| |
| eventname = kmalloc(MAX_TEXT_EVENT, GFP_KERNEL); |
| if (!eventname) { |
| printk(KERN_ERR "%s: ERROR - No Memory for event name\n ", |
| __func__); |
| return -EFAULT; |
| } |
| |
| seq_printf(m, "%2d ", event->pcr_index); |
| |
| /* 2nd: SHA1 */ |
| for (i = 0; i < 20; i++) |
| seq_printf(m, "%02x", event->pcr_value[i]); |
| |
| /* 3rd: event type identifier */ |
| seq_printf(m, " %02x", event->event_type); |
| |
| len += get_event_name(eventname, event, event_entry); |
| |
| /* 4th: eventname <= max + \'0' delimiter */ |
| seq_printf(m, " %s\n", eventname); |
| |
| kfree(eventname); |
| return 0; |
| } |
| |
| static struct seq_operations tpm_ascii_b_measurments_seqops = { |
| .start = tpm_bios_measurements_start, |
| .next = tpm_bios_measurements_next, |
| .stop = tpm_bios_measurements_stop, |
| .show = tpm_ascii_bios_measurements_show, |
| }; |
| |
| static struct seq_operations tpm_binary_b_measurments_seqops = { |
| .start = tpm_bios_measurements_start, |
| .next = tpm_bios_measurements_next, |
| .stop = tpm_bios_measurements_stop, |
| .show = tpm_binary_bios_measurements_show, |
| }; |
| |
| /* read binary bios log */ |
| static int read_log(struct tpm_bios_log *log) |
| { |
| struct acpi_tcpa *buff; |
| acpi_status status; |
| struct acpi_table_header *virt; |
| u64 len, start; |
| |
| if (log->bios_event_log != NULL) { |
| printk(KERN_ERR |
| "%s: ERROR - Eventlog already initialized\n", |
| __func__); |
| return -EFAULT; |
| } |
| |
| /* Find TCPA entry in RSDT (ACPI_LOGICAL_ADDRESSING) */ |
| status = acpi_get_firmware_table(ACPI_TCPA_SIG, 1, |
| ACPI_LOGICAL_ADDRESSING, |
| (struct acpi_table_header **) |
| &buff); |
| |
| if (ACPI_FAILURE(status)) { |
| printk(KERN_ERR "%s: ERROR - Could not get TCPA table\n", |
| __func__); |
| return -EIO; |
| } |
| |
| switch(buff->platform_class) { |
| case BIOS_SERVER: |
| len = buff->server.log_max_len; |
| start = buff->server.log_start_addr; |
| break; |
| case BIOS_CLIENT: |
| default: |
| len = buff->client.log_max_len; |
| start = buff->client.log_start_addr; |
| break; |
| } |
| if (!len) { |
| printk(KERN_ERR "%s: ERROR - TCPA log area empty\n", __func__); |
| return -EIO; |
| } |
| |
| /* malloc EventLog space */ |
| log->bios_event_log = kmalloc(len, GFP_KERNEL); |
| if (!log->bios_event_log) { |
| printk("%s: ERROR - Not enough Memory for BIOS measurements\n", |
| __func__); |
| return -ENOMEM; |
| } |
| |
| log->bios_event_log_end = log->bios_event_log + len; |
| |
| acpi_os_map_memory(start, len, (void *) &virt); |
| |
| memcpy(log->bios_event_log, virt, len); |
| |
| acpi_os_unmap_memory(virt, len); |
| return 0; |
| } |
| |
| static int tpm_ascii_bios_measurements_open(struct inode *inode, |
| struct file *file) |
| { |
| int err; |
| struct tpm_bios_log *log; |
| struct seq_file *seq; |
| |
| log = kzalloc(sizeof(struct tpm_bios_log), GFP_KERNEL); |
| if (!log) |
| return -ENOMEM; |
| |
| if ((err = read_log(log))) |
| return err; |
| |
| /* now register seq file */ |
| err = seq_open(file, &tpm_ascii_b_measurments_seqops); |
| if (!err) { |
| seq = file->private_data; |
| seq->private = log; |
| } else { |
| kfree(log->bios_event_log); |
| kfree(log); |
| } |
| return err; |
| } |
| |
| struct file_operations tpm_ascii_bios_measurements_ops = { |
| .open = tpm_ascii_bios_measurements_open, |
| .read = seq_read, |
| .llseek = seq_lseek, |
| .release = tpm_bios_measurements_release, |
| }; |
| |
| static int tpm_binary_bios_measurements_open(struct inode *inode, |
| struct file *file) |
| { |
| int err; |
| struct tpm_bios_log *log; |
| struct seq_file *seq; |
| |
| log = kzalloc(sizeof(struct tpm_bios_log), GFP_KERNEL); |
| if (!log) |
| return -ENOMEM; |
| |
| if ((err = read_log(log))) |
| return err; |
| |
| /* now register seq file */ |
| err = seq_open(file, &tpm_binary_b_measurments_seqops); |
| if (!err) { |
| seq = file->private_data; |
| seq->private = log; |
| } else { |
| kfree(log->bios_event_log); |
| kfree(log); |
| } |
| return err; |
| } |
| |
| struct file_operations tpm_binary_bios_measurements_ops = { |
| .open = tpm_binary_bios_measurements_open, |
| .read = seq_read, |
| .llseek = seq_lseek, |
| .release = tpm_bios_measurements_release, |
| }; |
| |
| static int is_bad(void *p) |
| { |
| if (!p) |
| return 1; |
| if (IS_ERR(p) && (PTR_ERR(p) != -ENODEV)) |
| return 1; |
| return 0; |
| } |
| |
| struct dentry **tpm_bios_log_setup(char *name) |
| { |
| struct dentry **ret = NULL, *tpm_dir, *bin_file, *ascii_file; |
| |
| tpm_dir = securityfs_create_dir(name, NULL); |
| if (is_bad(tpm_dir)) |
| goto out; |
| |
| bin_file = |
| securityfs_create_file("binary_bios_measurements", |
| S_IRUSR | S_IRGRP, tpm_dir, NULL, |
| &tpm_binary_bios_measurements_ops); |
| if (is_bad(bin_file)) |
| goto out_tpm; |
| |
| ascii_file = |
| securityfs_create_file("ascii_bios_measurements", |
| S_IRUSR | S_IRGRP, tpm_dir, NULL, |
| &tpm_ascii_bios_measurements_ops); |
| if (is_bad(ascii_file)) |
| goto out_bin; |
| |
| ret = kmalloc(3 * sizeof(struct dentry *), GFP_KERNEL); |
| if (!ret) |
| goto out_ascii; |
| |
| ret[0] = ascii_file; |
| ret[1] = bin_file; |
| ret[2] = tpm_dir; |
| |
| return ret; |
| |
| out_ascii: |
| securityfs_remove(ascii_file); |
| out_bin: |
| securityfs_remove(bin_file); |
| out_tpm: |
| securityfs_remove(tpm_dir); |
| out: |
| return NULL; |
| } |
| EXPORT_SYMBOL_GPL(tpm_bios_log_setup); |
| |
| void tpm_bios_log_teardown(struct dentry **lst) |
| { |
| int i; |
| |
| for (i = 0; i < 3; i++) |
| securityfs_remove(lst[i]); |
| } |
| EXPORT_SYMBOL_GPL(tpm_bios_log_teardown); |
| MODULE_LICENSE("GPL"); |