xref: /rk3399_ARM-atf/plat/arm/board/fvp/fvp_bl1_measured_boot.c (revision b73aa414e4ab919c3a57373235072f3401364d80)
148ba0345SManish V Badarkhe /*
286e08d47SHarrison Mutai  * Copyright (c) 2021-2025, Arm Limited. All rights reserved.
348ba0345SManish V Badarkhe  *
448ba0345SManish V Badarkhe  * SPDX-License-Identifier: BSD-3-Clause
548ba0345SManish V Badarkhe  */
648ba0345SManish V Badarkhe 
748ba0345SManish V Badarkhe #include <stdint.h>
848ba0345SManish V Badarkhe 
9*b67e9846SHarrison Mutai #if TRANSFER_LIST
10*b67e9846SHarrison Mutai #include <tpm_event_log.h>
11*b67e9846SHarrison Mutai #endif
125bf0b807SHarrison Mutai #include <plat/arm/common/plat_arm.h>
135bf0b807SHarrison Mutai 
14*b67e9846SHarrison Mutai #include <drivers/auth/crypto_mod.h>
15*b67e9846SHarrison Mutai #include <drivers/measured_boot/metadata.h>
16*b67e9846SHarrison Mutai #include <event_measure.h>
17*b67e9846SHarrison Mutai #include <event_print.h>
18*b67e9846SHarrison Mutai #include <tools_share/zero_oid.h>
19*b67e9846SHarrison Mutai 
2048ba0345SManish V Badarkhe /* Event Log data */
215bf0b807SHarrison Mutai #if TRANSFER_LIST
225bf0b807SHarrison Mutai static uint8_t *event_log;
235bf0b807SHarrison Mutai #else
2448ba0345SManish V Badarkhe static uint8_t event_log[PLAT_ARM_EVENT_LOG_MAX_SIZE];
255bf0b807SHarrison Mutai #endif
2648ba0345SManish V Badarkhe 
27*b67e9846SHarrison Mutai static const struct event_log_hash_info crypto_hash_info = {
28*b67e9846SHarrison Mutai 	.func = crypto_mod_calc_hash,
29*b67e9846SHarrison Mutai 	.ids = (const uint32_t[]){ CRYPTO_MD_ID },
30*b67e9846SHarrison Mutai 	.count = 1U,
31*b67e9846SHarrison Mutai };
32*b67e9846SHarrison Mutai 
3348ba0345SManish V Badarkhe /* FVP table with platform specific image IDs, names and PCRs */
3448ba0345SManish V Badarkhe const event_log_metadata_t fvp_event_log_metadata[] = {
3509bb42dbSTamas Ban 	{ FW_CONFIG_ID, MBOOT_FW_CONFIG_STRING, PCR_0 },
3609bb42dbSTamas Ban 	{ TB_FW_CONFIG_ID, MBOOT_TB_FW_CONFIG_STRING, PCR_0 },
3709bb42dbSTamas Ban 	{ BL2_IMAGE_ID, MBOOT_BL2_IMAGE_STRING, PCR_0 },
38426a1119SManish V Badarkhe 
39426a1119SManish V Badarkhe 	{ EVLOG_INVALID_ID, NULL, (unsigned int)(-1) } /* Terminator */
4048ba0345SManish V Badarkhe };
4148ba0345SManish V Badarkhe 
bl1_plat_mboot_init(void)4248ba0345SManish V Badarkhe void bl1_plat_mboot_init(void)
4348ba0345SManish V Badarkhe {
445bf0b807SHarrison Mutai 	size_t event_log_max_size;
4586e08d47SHarrison Mutai 	int rc;
4686e08d47SHarrison Mutai 
475bf0b807SHarrison Mutai #if TRANSFER_LIST
48*b67e9846SHarrison Mutai 	event_log_max_size = PLAT_ARM_EVENT_LOG_MAX_SIZE;
49*b67e9846SHarrison Mutai 
50*b67e9846SHarrison Mutai 	event_log =
51*b67e9846SHarrison Mutai 		transfer_list_event_log_extend(secure_tl, event_log_max_size);
525bf0b807SHarrison Mutai 	assert(event_log != NULL);
535bf0b807SHarrison Mutai #else
545bf0b807SHarrison Mutai 	event_log_max_size = sizeof(event_log);
555bf0b807SHarrison Mutai #endif
565bf0b807SHarrison Mutai 
57*b67e9846SHarrison Mutai 	rc = event_log_init_and_reg(event_log, event_log + event_log_max_size,
58*b67e9846SHarrison Mutai 				    &crypto_hash_info);
5986e08d47SHarrison Mutai 	if (rc < 0) {
6086e08d47SHarrison Mutai 		ERROR("Failed to initialize event log (%d).\n", rc);
6186e08d47SHarrison Mutai 		panic();
6286e08d47SHarrison Mutai 	}
6386e08d47SHarrison Mutai 
6486e08d47SHarrison Mutai 	rc = event_log_write_header();
6586e08d47SHarrison Mutai 	if (rc < 0) {
6686e08d47SHarrison Mutai 		ERROR("Failed to write event log header (%d).\n", rc);
6786e08d47SHarrison Mutai 		panic();
6886e08d47SHarrison Mutai 	}
6948ba0345SManish V Badarkhe }
7048ba0345SManish V Badarkhe 
bl1_plat_mboot_finish(void)7148ba0345SManish V Badarkhe void bl1_plat_mboot_finish(void)
7248ba0345SManish V Badarkhe {
735bf0b807SHarrison Mutai 	size_t event_log_cur_size = event_log_get_cur_size(event_log);
740500f447SManish V Badarkhe 
755bf0b807SHarrison Mutai #if TRANSFER_LIST
765bf0b807SHarrison Mutai 	uint8_t *rc = transfer_list_event_log_finish(
775bf0b807SHarrison Mutai 		secure_tl, (uintptr_t)event_log + event_log_cur_size);
785bf0b807SHarrison Mutai 
79*b67e9846SHarrison Mutai 	/* Ensure changes are visible to the next stage. */
80*b67e9846SHarrison Mutai 	flush_dcache_range((uintptr_t)secure_tl, secure_tl->size);
81*b67e9846SHarrison Mutai 
825bf0b807SHarrison Mutai 	if (rc != NULL) {
835bf0b807SHarrison Mutai 		return;
845bf0b807SHarrison Mutai 	}
855bf0b807SHarrison Mutai #else
865bf0b807SHarrison Mutai 	int rc = arm_set_tb_fw_info((uintptr_t)event_log, event_log_cur_size,
871cf3e2f0SManish V Badarkhe 				PLAT_ARM_EVENT_LOG_MAX_SIZE);
885bf0b807SHarrison Mutai 	if (rc == 0) {
895bf0b807SHarrison Mutai 		return;
905bf0b807SHarrison Mutai 	}
915bf0b807SHarrison Mutai #endif
925bf0b807SHarrison Mutai 
9348ba0345SManish V Badarkhe 	/*
945bf0b807SHarrison Mutai 	 * Panic if we fail to set up the event log for the next stage. This is a fatal
955bf0b807SHarrison Mutai 	 * error because, on the FVP platform, BL2 software assumes that a valid
965bf0b807SHarrison Mutai 	 * Event Log buffer exists and will use the same Event Log buffer to append image
975bf0b807SHarrison Mutai 	 * measurements.
9848ba0345SManish V Badarkhe 	 */
990500f447SManish V Badarkhe 	panic();
1000500f447SManish V Badarkhe }
101