Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751207AbcKZMqE (ORCPT ); Sat, 26 Nov 2016 07:46:04 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:50627 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1750745AbcKZMp5 (ORCPT ); Sat, 26 Nov 2016 07:45:57 -0500 From: Nayna Jain To: tpmdd-devel@lists.sourceforge.net Cc: peterhuewe@gmx.de, tpmdd@selhorst.net, jarkko.sakkinen@linux.intel.com, jgunthorpe@obsidianresearch.com, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, Nayna Jain Subject: [PATCH v6 0/2] securityfs support for TPM 2.0 firmware event log Date: Sat, 26 Nov 2016 07:45:37 -0500 X-Mailer: git-send-email 2.5.0 X-TM-AS-MML: disable X-Content-Scanned: Fidelis XPS MAILER x-cbid: 16112612-0052-0000-0000-000001F5214B X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 16112612-0053-0000-0000-0000074E80F9 Message-Id: <1480164339-26409-1-git-send-email-nayna@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2016-11-26_09:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=1 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1609300000 definitions=main-1611260234 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 4518 Lines: 110 The TPM device driver defines ascii and binary methods for displaying the TPM 1.2 event log via securityfs files, which are needed for validating a TPM quote. The device driver for TPM 2.0 does not have similar support for displaying the TPM 2.0 event log. This patch set adds the support for displaying TPM 2.0 event log in binary format. The parsing mechanism to display the TPM 2.0 event log in binary format is implemented as defined in the TPM 2.0 TCG specification[1]. If the firmware event log support exists and is successfully read, the securityfs file is created to provide the event log in binary format for both the OF device tree and ACPI. - Patch 1 adds the device tree bindings support for Physical TPM. - Patch 2 adds the support for creating securityfs files and for displaying the TPM 2.0 crypto agile event log in binary format. [1] TCG EFI Protocol Specification, Family "2.0" - Section 5 "Event Log Structure" Changelog History v6: - Rebased to the Jarkko's latest master branch (e717b5c:tpm: vtpm_proxy: conditionally call tpm_chip_unregister) - Retained securityfs setup functions in tpm_eventlog.c - Renamed tpm_eventlog.c to tpm1_eventlog.c - Fixed tpm_read_log_of() for NULL check and memcpy function. v5: - Upstreamed cleanup and fixes as different patchset - Rebased to the Jarkko's latest master branch (e5be084 tpm: vtpm_proxy: Do not access host's event log) - Patch "tpm: enhance read_log_of() to support Physical TPM event log - New Patch. - Patch "tpm: add securityfs support for TPM 2.0 firmware event log" - Moved the changes in read_log_of() to a different patch - TPM 2.0 event log data types are declared in tpm_eventlog.h, tpm2.h is removed. - Included other feedbacks also from Jarkko on aligment and extra line v4: - Includes feedbacks from Jarkko and Jason. - Patch "tpm: define a generic open() method for ascii & bios measurements". - Fix indentation issue. - Patch "tpm: replace the dynamically allocated bios_dir as struct dentry array". - Continue to use bios_dir_count variable to use is_bad() checks and to maintain correct order for securityfs_remove() during teardown. - Reset chip->bios_dir_count in teardown() function. - Patch "tpm: validate the eventlog access before tpm_bios_log_setup". - Retain TPM2 check which was removed in previous patch. - Add tpm_bios_log_setup failure handling. - Remove use of private data from v3 version of patch. Add a new member to struct tpm_chip to achieve the same purpose. - Patch "tpm: redefine the read_log method to check for ACPI/OF properties sequentially". - Move replacement of CONFIG_TCG_IBMVTPM with CONFIG_OF to this patch from patch 3. - Replace -1 error code with -ENODEV. - Patch "tpm: replace the of_find_node_by_name() with dev of_node property". - Uses chip->dev.parent->of_node. - Created separate patch for cleanup of pr_err messages. - Patch "tpm: remove printk error messages". - New Patch. - Patch "tpm: add the securityfs file support for TPM 2.0 eventlog". - Parses event digests using event alg_id rather than event log header alg_id. - Uses of_property_match_string to differentiate tpm/vtpm compatible v3: - Includes the review feedbacks as suggested by Jason. - Split of patches into one patch per idea. - Generic open() method for ascii/bios measurements. - Replacement of of **bios_dir with *bios_dir[3]. - Verifying readlog() is successful before creating securityfs entries. - Generic readlog() to check for ACPI/OF in sequence. - read_log_of() method now uses of_node propertry rather than calling find_device_by_name. - read_log differentiates vtpm/tpm using its compatible property. - Cleans pr_err with dev_dbg. - Commit msgs subject line prefixed with tpm. v2: - Fixes issues as given in feedback by Jason. - Adds documentation for device tree. Nayna Jain (2): tpm: enhance read_log_of() to support Physical TPM event log tpm: add securityfs support for TPM 2.0 firmware event log drivers/char/tpm/Makefile | 2 +- .../char/tpm/{tpm_eventlog.c => tpm1_eventlog.c} | 35 ++-- drivers/char/tpm/tpm2_eventlog.c | 214 +++++++++++++++++++++ drivers/char/tpm/tpm_eventlog.h | 70 +++++++ drivers/char/tpm/tpm_of.c | 27 ++- 5 files changed, 329 insertions(+), 19 deletions(-) rename drivers/char/tpm/{tpm_eventlog.c => tpm1_eventlog.c} (95%) create mode 100644 drivers/char/tpm/tpm2_eventlog.c -- 2.5.0