148ba0345SManish V Badarkhe /*
286e08d47SHarrison Mutai * Copyright (c) 2021-2025, Arm Limited. All rights reserved.
348ba0345SManish V Badarkhe *
448ba0345SManish V Badarkhe * SPDX-License-Identifier: BSD-3-Clause
548ba0345SManish V Badarkhe */
648ba0345SManish V Badarkhe
748ba0345SManish V Badarkhe #include <stdint.h>
848ba0345SManish V Badarkhe
9*b67e9846SHarrison Mutai #if TRANSFER_LIST
10*b67e9846SHarrison Mutai #include <tpm_event_log.h>
11*b67e9846SHarrison Mutai #endif
125bf0b807SHarrison Mutai #include <plat/arm/common/plat_arm.h>
135bf0b807SHarrison Mutai
14*b67e9846SHarrison Mutai #include <drivers/auth/crypto_mod.h>
15*b67e9846SHarrison Mutai #include <drivers/measured_boot/metadata.h>
16*b67e9846SHarrison Mutai #include <event_measure.h>
17*b67e9846SHarrison Mutai #include <event_print.h>
18*b67e9846SHarrison Mutai #include <tools_share/zero_oid.h>
19*b67e9846SHarrison Mutai
2048ba0345SManish V Badarkhe /* Event Log data */
215bf0b807SHarrison Mutai #if TRANSFER_LIST
225bf0b807SHarrison Mutai static uint8_t *event_log;
235bf0b807SHarrison Mutai #else
2448ba0345SManish V Badarkhe static uint8_t event_log[PLAT_ARM_EVENT_LOG_MAX_SIZE];
255bf0b807SHarrison Mutai #endif
2648ba0345SManish V Badarkhe
27*b67e9846SHarrison Mutai static const struct event_log_hash_info crypto_hash_info = {
28*b67e9846SHarrison Mutai .func = crypto_mod_calc_hash,
29*b67e9846SHarrison Mutai .ids = (const uint32_t[]){ CRYPTO_MD_ID },
30*b67e9846SHarrison Mutai .count = 1U,
31*b67e9846SHarrison Mutai };
32*b67e9846SHarrison Mutai
3348ba0345SManish V Badarkhe /* FVP table with platform specific image IDs, names and PCRs */
3448ba0345SManish V Badarkhe const event_log_metadata_t fvp_event_log_metadata[] = {
3509bb42dbSTamas Ban { FW_CONFIG_ID, MBOOT_FW_CONFIG_STRING, PCR_0 },
3609bb42dbSTamas Ban { TB_FW_CONFIG_ID, MBOOT_TB_FW_CONFIG_STRING, PCR_0 },
3709bb42dbSTamas Ban { BL2_IMAGE_ID, MBOOT_BL2_IMAGE_STRING, PCR_0 },
38426a1119SManish V Badarkhe
39426a1119SManish V Badarkhe { EVLOG_INVALID_ID, NULL, (unsigned int)(-1) } /* Terminator */
4048ba0345SManish V Badarkhe };
4148ba0345SManish V Badarkhe
bl1_plat_mboot_init(void)4248ba0345SManish V Badarkhe void bl1_plat_mboot_init(void)
4348ba0345SManish V Badarkhe {
445bf0b807SHarrison Mutai size_t event_log_max_size;
4586e08d47SHarrison Mutai int rc;
4686e08d47SHarrison Mutai
475bf0b807SHarrison Mutai #if TRANSFER_LIST
48*b67e9846SHarrison Mutai event_log_max_size = PLAT_ARM_EVENT_LOG_MAX_SIZE;
49*b67e9846SHarrison Mutai
50*b67e9846SHarrison Mutai event_log =
51*b67e9846SHarrison Mutai transfer_list_event_log_extend(secure_tl, event_log_max_size);
525bf0b807SHarrison Mutai assert(event_log != NULL);
535bf0b807SHarrison Mutai #else
545bf0b807SHarrison Mutai event_log_max_size = sizeof(event_log);
555bf0b807SHarrison Mutai #endif
565bf0b807SHarrison Mutai
57*b67e9846SHarrison Mutai rc = event_log_init_and_reg(event_log, event_log + event_log_max_size,
58*b67e9846SHarrison Mutai &crypto_hash_info);
5986e08d47SHarrison Mutai if (rc < 0) {
6086e08d47SHarrison Mutai ERROR("Failed to initialize event log (%d).\n", rc);
6186e08d47SHarrison Mutai panic();
6286e08d47SHarrison Mutai }
6386e08d47SHarrison Mutai
6486e08d47SHarrison Mutai rc = event_log_write_header();
6586e08d47SHarrison Mutai if (rc < 0) {
6686e08d47SHarrison Mutai ERROR("Failed to write event log header (%d).\n", rc);
6786e08d47SHarrison Mutai panic();
6886e08d47SHarrison Mutai }
6948ba0345SManish V Badarkhe }
7048ba0345SManish V Badarkhe
bl1_plat_mboot_finish(void)7148ba0345SManish V Badarkhe void bl1_plat_mboot_finish(void)
7248ba0345SManish V Badarkhe {
735bf0b807SHarrison Mutai size_t event_log_cur_size = event_log_get_cur_size(event_log);
740500f447SManish V Badarkhe
755bf0b807SHarrison Mutai #if TRANSFER_LIST
765bf0b807SHarrison Mutai uint8_t *rc = transfer_list_event_log_finish(
775bf0b807SHarrison Mutai secure_tl, (uintptr_t)event_log + event_log_cur_size);
785bf0b807SHarrison Mutai
79*b67e9846SHarrison Mutai /* Ensure changes are visible to the next stage. */
80*b67e9846SHarrison Mutai flush_dcache_range((uintptr_t)secure_tl, secure_tl->size);
81*b67e9846SHarrison Mutai
825bf0b807SHarrison Mutai if (rc != NULL) {
835bf0b807SHarrison Mutai return;
845bf0b807SHarrison Mutai }
855bf0b807SHarrison Mutai #else
865bf0b807SHarrison Mutai int rc = arm_set_tb_fw_info((uintptr_t)event_log, event_log_cur_size,
871cf3e2f0SManish V Badarkhe PLAT_ARM_EVENT_LOG_MAX_SIZE);
885bf0b807SHarrison Mutai if (rc == 0) {
895bf0b807SHarrison Mutai return;
905bf0b807SHarrison Mutai }
915bf0b807SHarrison Mutai #endif
925bf0b807SHarrison Mutai
9348ba0345SManish V Badarkhe /*
945bf0b807SHarrison Mutai * Panic if we fail to set up the event log for the next stage. This is a fatal
955bf0b807SHarrison Mutai * error because, on the FVP platform, BL2 software assumes that a valid
965bf0b807SHarrison Mutai * Event Log buffer exists and will use the same Event Log buffer to append image
975bf0b807SHarrison Mutai * measurements.
9848ba0345SManish V Badarkhe */
990500f447SManish V Badarkhe panic();
1000500f447SManish V Badarkhe }
101