blob: 0ea83971af42701f4eaa04b1103740e458aa1eeb [file] [log] [blame]
Alexei Fedorov71d81dc2020-07-13 13:58:06 +01001/*
2 * Copyright (c) 2020, Arm Limited. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <assert.h>
8#include <errno.h>
9#include <string.h>
10#include <arch_helpers.h>
11
12#include <common/bl_common.h>
13#include <common/debug.h>
14#include <drivers/auth/crypto_mod.h>
15#include <drivers/measured_boot/event_log.h>
16#include <mbedtls/md.h>
17
18#include <plat/common/platform.h>
19
20/* Event Log data */
21static uint8_t event_log[EVENT_LOG_SIZE];
22
23/* End of Event Log */
24#define EVENT_LOG_END ((uintptr_t)event_log + sizeof(event_log) - 1U)
25
26CASSERT(sizeof(event_log) >= LOG_MIN_SIZE, assert_event_log_size);
27
28/* Pointer in event_log[] */
29static uint8_t *log_ptr = event_log;
30
31/* Pointer to measured_boot_data_t */
32const static measured_boot_data_t *plat_data_ptr;
33
34static uintptr_t tos_fw_config_base;
35static uintptr_t nt_fw_config_base;
36
37/* TCG_EfiSpecIdEvent */
38static const id_event_headers_t id_event_header = {
39 .header = {
40 .pcr_index = PCR_0,
41 .event_type = EV_NO_ACTION,
42 .digest = {0},
43 .event_size = (uint32_t)(sizeof(id_event_struct_t) +
44 (sizeof(id_event_algorithm_size_t) *
45 HASH_ALG_COUNT))
46 },
47
48 .struct_header = {
49 .signature = TCG_ID_EVENT_SIGNATURE_03,
50 .platform_class = PLATFORM_CLASS_CLIENT,
51 .spec_version_minor = TCG_SPEC_VERSION_MINOR_TPM2,
52 .spec_version_major = TCG_SPEC_VERSION_MAJOR_TPM2,
53 .spec_errata = TCG_SPEC_ERRATA_TPM2,
54 .uintn_size = (uint8_t)(sizeof(unsigned int) /
55 sizeof(uint32_t)),
56 .number_of_algorithms = HASH_ALG_COUNT
57 }
58};
59
60static const event2_header_t locality_event_header = {
61 /*
62 * All EV_NO_ACTION events SHALL set
63 * TCG_PCR_EVENT2.pcrIndex = 0, unless otherwise specified
64 */
65 .pcr_index = PCR_0,
66
67 /*
68 * All EV_NO_ACTION events SHALL set
69 * TCG_PCR_EVENT2.eventType = 03h
70 */
71 .event_type = EV_NO_ACTION,
72
73 /*
74 * All EV_NO_ACTION events SHALL set
75 * TCG_PCR_EVENT2.digests to all
76 * 0x00's for each allocated Hash algorithm
77 */
78 .digests = {
79 .count = HASH_ALG_COUNT
80 }
81};
82
Alexei Fedorov71d81dc2020-07-13 13:58:06 +010083/*
84 * Add TCG_PCR_EVENT2 event
85 *
86 * @param[in] hash Pointer to hash data of TCG_DIGEST_SIZE bytes
87 * @param[in] image_ptr Pointer to image_data_t structure
88 * @return:
89 * 0 = success
90 * < 0 = error code
91 */
92static int add_event2(const uint8_t *hash, const image_data_t *image_ptr)
93{
94 void *ptr = log_ptr;
95 uint32_t name_len;
96 uint32_t size_of_event;
97
98 assert(image_ptr != NULL);
99 assert(image_ptr->name != NULL);
100
101 name_len = (uint32_t)strlen(image_ptr->name) + 1U;
102 size_of_event = name_len + (uint32_t)EVENT2_HDR_SIZE;
103
104 /* Check for space in Event Log buffer */
105 if (((uintptr_t)ptr + size_of_event) > EVENT_LOG_END) {
106 ERROR("%s(): Event Log is short of memory", __func__);
107 return -ENOMEM;
108 }
109
110 /*
111 * As per TCG specifications, firmware components that are measured
112 * into PCR[0] must be logged in the event log using the event type
113 * EV_POST_CODE.
114 */
115 /* TCG_PCR_EVENT2.PCRIndex */
116 ((event2_header_t *)ptr)->pcr_index = image_ptr->pcr;
117
118 /* TCG_PCR_EVENT2.EventType */
119 ((event2_header_t *)ptr)->event_type = EV_POST_CODE;
120
121 /* TCG_PCR_EVENT2.Digests.Count */
122 ptr = (uint8_t *)ptr + offsetof(event2_header_t, digests);
123 ((tpml_digest_values *)ptr)->count = HASH_ALG_COUNT;
124
125 /* TCG_PCR_EVENT2.Digests[] */
Alexei Fedorovf52e6a12020-09-28 14:47:54 +0100126 ptr = (uint8_t *)((uintptr_t)ptr +
127 offsetof(tpml_digest_values, digests));
Alexei Fedorov71d81dc2020-07-13 13:58:06 +0100128
129 /* TCG_PCR_EVENT2.Digests[].AlgorithmId */
130 ((tpmt_ha *)ptr)->algorithm_id = TPM_ALG_ID;
131
132 /* TCG_PCR_EVENT2.Digests[].Digest[] */
Alexei Fedorovf52e6a12020-09-28 14:47:54 +0100133 ptr = (uint8_t *)((uintptr_t)ptr + offsetof(tpmt_ha, digest));
Alexei Fedorov71d81dc2020-07-13 13:58:06 +0100134
135 /* Check for space in Event Log buffer */
136 if (((uintptr_t)ptr + TCG_DIGEST_SIZE) > EVENT_LOG_END) {
137 ERROR("%s(): Event Log is short of memory", __func__);
138 return -ENOMEM;
139 }
140
141 if (hash == NULL) {
142 /* Get BL2 hash from DTB */
143 bl2_plat_get_hash(ptr);
144 } else {
145 /* Copy digest */
146 (void)memcpy(ptr, (const void *)hash, TCG_DIGEST_SIZE);
147 }
148
149 /* TCG_PCR_EVENT2.EventSize */
Alexei Fedorovf52e6a12020-09-28 14:47:54 +0100150 ptr = (uint8_t *)((uintptr_t)ptr + TCG_DIGEST_SIZE);
Alexei Fedorov71d81dc2020-07-13 13:58:06 +0100151 ((event2_data_t *)ptr)->event_size = name_len;
152
153 /* Copy event data to TCG_PCR_EVENT2.Event */
154 (void)memcpy((void *)(((event2_data_t *)ptr)->event),
155 (const void *)image_ptr->name, name_len);
156
157 /* End of event data */
Alexei Fedorovf52e6a12020-09-28 14:47:54 +0100158 log_ptr = (uint8_t *)((uintptr_t)ptr +
159 offsetof(event2_data_t, event) + name_len);
Alexei Fedorov71d81dc2020-07-13 13:58:06 +0100160
161 return 0;
162}
163
164/*
165 * Init Event Log
166 *
167 * Initialises Event Log by writing Specification ID and
168 * Startup Locality events.
169 */
170void event_log_init(void)
171{
172 const char locality_signature[] = TCG_STARTUP_LOCALITY_SIGNATURE;
173 const uint8_t *start_ptr;
174 void *ptr = event_log;
175
176 /* Get pointer to platform's measured_boot_data_t structure */
177 plat_data_ptr = plat_get_measured_boot_data();
178
179 /*
180 * Add Specification ID Event first
181 *
182 * Copy TCG_EfiSpecIDEventStruct structure header
183 */
184 (void)memcpy(ptr, (const void *)&id_event_header,
185 sizeof(id_event_header));
Alexei Fedorovf52e6a12020-09-28 14:47:54 +0100186 ptr = (uint8_t *)((uintptr_t)ptr + sizeof(id_event_header));
Alexei Fedorov71d81dc2020-07-13 13:58:06 +0100187
188 /* TCG_EfiSpecIdEventAlgorithmSize structure */
189 ((id_event_algorithm_size_t *)ptr)->algorithm_id = TPM_ALG_ID;
190 ((id_event_algorithm_size_t *)ptr)->digest_size = TCG_DIGEST_SIZE;
Alexei Fedorovf52e6a12020-09-28 14:47:54 +0100191 ptr = (uint8_t *)((uintptr_t)ptr + sizeof(id_event_algorithm_size_t));
Alexei Fedorov71d81dc2020-07-13 13:58:06 +0100192
193 /*
194 * TCG_EfiSpecIDEventStruct.vendorInfoSize
195 * No vendor data
196 */
197 ((id_event_struct_data_t *)ptr)->vendor_info_size = 0;
Alexei Fedorovf52e6a12020-09-28 14:47:54 +0100198 ptr = (uint8_t *)((uintptr_t)ptr +
199 offsetof(id_event_struct_data_t, vendor_info));
Alexei Fedorov71d81dc2020-07-13 13:58:06 +0100200 if ((uintptr_t)ptr != ((uintptr_t)event_log + ID_EVENT_SIZE)) {
201 panic();
202 }
203
204 start_ptr = (uint8_t *)ptr;
205
206 /*
207 * The Startup Locality event should be placed in the log before
208 * any event which extends PCR[0].
209 *
210 * Ref. TCG PC Client Platform Firmware Profile 9.4.5.3
211 */
212
213 /* Copy Startup Locality Event Header */
214 (void)memcpy(ptr, (const void *)&locality_event_header,
215 sizeof(locality_event_header));
Alexei Fedorovf52e6a12020-09-28 14:47:54 +0100216 ptr = (uint8_t *)((uintptr_t)ptr + sizeof(locality_event_header));
Alexei Fedorov71d81dc2020-07-13 13:58:06 +0100217
218 /* TCG_PCR_EVENT2.Digests[].AlgorithmId */
219 ((tpmt_ha *)ptr)->algorithm_id = TPM_ALG_ID;
220
221 /* TCG_PCR_EVENT2.Digests[].Digest[] */
222 (void)memset(&((tpmt_ha *)ptr)->digest, 0, TPM_ALG_ID);
Alexei Fedorovf52e6a12020-09-28 14:47:54 +0100223 ptr = (uint8_t *)((uintptr_t)ptr +
224 offsetof(tpmt_ha, digest) + TCG_DIGEST_SIZE);
Alexei Fedorov71d81dc2020-07-13 13:58:06 +0100225
226 /* TCG_PCR_EVENT2.EventSize */
227 ((event2_data_t *)ptr)->event_size =
228 (uint32_t)sizeof(startup_locality_event_t);
Alexei Fedorovf52e6a12020-09-28 14:47:54 +0100229 ptr = (uint8_t *)((uintptr_t)ptr + offsetof(event2_data_t, event));
Alexei Fedorov71d81dc2020-07-13 13:58:06 +0100230
231 /* TCG_EfiStartupLocalityEvent.Signature */
232 (void)memcpy(ptr, (const void *)locality_signature,
233 sizeof(TCG_STARTUP_LOCALITY_SIGNATURE));
234
235 /*
236 * TCG_EfiStartupLocalityEvent.StartupLocality = 0:
237 * the platform's boot firmware
238 */
239 ((startup_locality_event_t *)ptr)->startup_locality = 0U;
Alexei Fedorovf52e6a12020-09-28 14:47:54 +0100240 ptr = (uint8_t *)((uintptr_t)ptr + sizeof(startup_locality_event_t));
Alexei Fedorov71d81dc2020-07-13 13:58:06 +0100241 if ((uintptr_t)ptr != ((uintptr_t)start_ptr + LOC_EVENT_SIZE)) {
242 panic();
243 }
244
245 log_ptr = (uint8_t *)ptr;
246
247 /* Add BL2 event */
248 if (add_event2(NULL, plat_data_ptr->images_data) != 0) {
249 panic();
250 }
251}
252
253/*
254 * Calculate and write hash of image, configuration data, etc.
255 * to Event Log.
256 *
257 * @param[in] data_base Address of data
258 * @param[in] data_size Size of data
259 * @param[in] data_id Data ID
260 * @return:
261 * 0 = success
262 * < 0 = error
263 */
264int tpm_record_measurement(uintptr_t data_base, uint32_t data_size,
265 uint32_t data_id)
266{
267 const image_data_t *data_ptr = plat_data_ptr->images_data;
268 unsigned char hash_data[MBEDTLS_MD_MAX_SIZE];
269 int rc;
270
271 /* Check if image_id is supported */
272 while (data_ptr->id != data_id) {
273 if ((data_ptr++)->id == INVALID_ID) {
274 ERROR("%s(): image_id %u not supported\n",
275 __func__, data_id);
276 return -EINVAL;
277 }
278 }
279
280 if (data_id == TOS_FW_CONFIG_ID) {
281 tos_fw_config_base = data_base;
282 } else if (data_id == NT_FW_CONFIG_ID) {
283 nt_fw_config_base = data_base;
284 } else {
285 /* No action */
286 }
287
288 /* Calculate hash */
289 rc = crypto_mod_calc_hash((unsigned int)MBEDTLS_MD_ID,
290 (void *)data_base, data_size, hash_data);
291 if (rc != 0) {
292 return rc;
293 }
294
295 return add_event2(hash_data, data_ptr);
296}
297
298/*
299 * Finalise Event Log
300 *
301 * @param[out] log_addr Pointer to return Event Log address
302 * @param[out] log_size Pointer to return Event Log size
303 * @return:
304 * 0 = success
305 * < 0 = error code
306 */
307int event_log_finalise(uint8_t **log_addr, size_t *log_size)
308{
309 /* Event Log size */
310 size_t num_bytes = (uintptr_t)log_ptr - (uintptr_t)event_log;
311 int rc;
312
313 assert(log_addr != NULL);
314 assert(log_size != NULL);
315
316 if (nt_fw_config_base == 0UL) {
317 ERROR("%s(): %s_FW_CONFIG not loaded\n", __func__, "NT");
318 return -ENOENT;
319 }
320
321 /*
322 * Set Event Log data in NT_FW_CONFIG and
323 * get Event Log address in Non-Secure memory
324 */
325 if (plat_data_ptr->set_nt_fw_info != NULL) {
326
327 /* Event Log address in Non-Secure memory */
328 uintptr_t ns_log_addr;
329
330 rc = plat_data_ptr->set_nt_fw_info(
331 nt_fw_config_base,
332#ifdef SPD_opteed
333 (uintptr_t)event_log,
334#endif
335 num_bytes, &ns_log_addr);
336 if (rc != 0) {
337 ERROR("%s(): Unable to update %s_FW_CONFIG\n",
338 __func__, "NT");
339 return rc;
340 }
341
342 /* Copy Event Log to Non-secure memory */
343 (void)memcpy((void *)ns_log_addr, (const void *)event_log,
344 num_bytes);
345
346 /* Ensure that the Event Log is visible in Non-secure memory */
347 flush_dcache_range(ns_log_addr, num_bytes);
348
349 /* Return Event Log address in Non-Secure memory */
350 *log_addr = (uint8_t *)ns_log_addr;
351
352 } else {
353 INFO("%s(): set_%s_fw_info not set\n", __func__, "nt");
354
355 /* Return Event Log address in Secure memory */
356 *log_addr = event_log;
357 }
358
359 if (tos_fw_config_base != 0UL) {
360 if (plat_data_ptr->set_tos_fw_info != NULL) {
361
362 /* Set Event Log data in TOS_FW_CONFIG */
363 rc = plat_data_ptr->set_tos_fw_info(
364 tos_fw_config_base,
365 (uintptr_t)event_log,
366 num_bytes);
367 if (rc != 0) {
368 ERROR("%s(): Unable to update %s_FW_CONFIG\n",
369 __func__, "TOS");
370 return rc;
371 }
372 } else {
373 INFO("%s(): set_%s_fw_info not set\n", __func__, "tos");
374 }
375 } else {
376 INFO("%s(): %s_FW_CONFIG not loaded\n", __func__, "TOS");
377 }
378
379 /* Ensure that the Event Log is visible in Secure memory */
380 flush_dcache_range((uintptr_t)event_log, num_bytes);
381
382 /* Return Event Log size */
383 *log_size = num_bytes;
384
385 return 0;
386}