/* * Copyright (c) 2025, Arm Limited. All rights reserved. * * SPDX-License-Identifier: BSD-3-Clause */ #include #include #include #include "./include/rpi3_measured_boot.h" #include #include #include #include #include #include #include #include #include #include #include /* RPI3 table with platform specific image IDs, names and PCRs */ const event_log_metadata_t rpi3_event_log_metadata[] = { { BL31_IMAGE_ID, MBOOT_BL31_IMAGE_STRING, PCR_0 }, { BL33_IMAGE_ID, MBOOT_BL33_IMAGE_STRING, PCR_0 }, { NT_FW_CONFIG_ID, MBOOT_NT_FW_CONFIG_STRING, PCR_0 }, { EVLOG_INVALID_ID, NULL, (unsigned int)(-1) } /* Terminator */ }; #if DISCRETE_TPM extern struct tpm_chip_data tpm_chip_data; #if (TPM_INTERFACE == FIFO_SPI) extern struct gpio_spi_data tpm_rpi3_gpio_data; struct spi_plat *spidev; #endif static void rpi3_bl2_tpm_early_interface_setup(void) { #if (TPM_INTERFACE == FIFO_SPI) tpm2_slb9670_gpio_init(&tpm_rpi3_gpio_data); spidev = gpio_spi_init(&tpm_rpi3_gpio_data); #endif } #endif static uint8_t *event_log_start; static size_t event_log_size; void bl2_plat_mboot_init(void) { uint8_t *bl2_event_log_start; uint8_t *bl2_event_log_finish; #if DISCRETE_TPM int rc; rpi3_bl2_tpm_early_interface_setup(); rc = tpm_interface_init(&tpm_chip_data, 0); if (rc != 0) { ERROR("BL2: TPM interface init failed\n"); panic(); } #endif rpi3_mboot_fetch_eventlog_info(&event_log_start, &event_log_size); bl2_event_log_start = event_log_start + event_log_size; bl2_event_log_finish = event_log_start + PLAT_ARM_EVENT_LOG_MAX_SIZE; event_log_init(bl2_event_log_start, bl2_event_log_finish); } void bl2_plat_mboot_finish(void) { int rc; /* Event Log address in Non-Secure memory */ uintptr_t ns_log_addr; /* Event Log filled size */ size_t event_log_cur_size; event_log_cur_size = event_log_get_cur_size((uint8_t *)event_log_start); /* write the eventlog addr and size to NT_FW_CONFIG TPM entry */ rc = rpi3_set_nt_fw_info(event_log_cur_size, &ns_log_addr); if (rc != 0) { ERROR("%s(): Unable to update %s_FW_CONFIG\n", __func__, "NT"); /* * fatal error due to Bl33 maintaining the assumption * that the eventlog is successfully passed via * NT_FW_CONFIG. */ panic(); } /* Copy Event Log to Non-secure memory */ (void)memcpy((void *)ns_log_addr, (const void *)event_log_start, event_log_cur_size); /* Ensure that the Event Log is visible in Non-secure memory */ flush_dcache_range(ns_log_addr, event_log_cur_size); /* Dump Event Log for user view */ event_log_dump((uint8_t *)event_log_start, event_log_cur_size); #if DISCRETE_TPM /* relinquish control of TPM locality 0 and close interface */ rc = tpm_interface_close(&tpm_chip_data, 0); if (rc != 0) { ERROR("BL2: TPM interface close failed\n"); panic(); } #endif } int plat_mboot_measure_image(unsigned int image_id, image_info_t *image_data) { int rc = 0; unsigned char hash_data[CRYPTO_MD_MAX_SIZE]; const event_log_metadata_t *metadata_ptr = rpi3_event_log_metadata; /* Measure the payload with algorithm selected by EventLog driver */ rc = event_log_measure(image_data->image_base, image_data->image_size, hash_data); if (rc != 0) { return rc; } #if DISCRETE_TPM rc = tpm_pcr_extend(&tpm_chip_data, 0, TPM_ALG_ID, hash_data, TCG_DIGEST_SIZE); if (rc != 0) { ERROR("BL2: TPM PCR-0 extend failed\n"); panic(); } #endif while ((metadata_ptr->id != EVLOG_INVALID_ID) && (metadata_ptr->id != image_id)) { metadata_ptr++; } assert(metadata_ptr->id != EVLOG_INVALID_ID); event_log_record(hash_data, EV_POST_CODE, metadata_ptr); return rc; }