1 /* 2 * Copyright (c) 2021, Arm Limited. All rights reserved. 3 * 4 * SPDX-License-Identifier: BSD-3-Clause 5 */ 6 7 #include <stdint.h> 8 9 #include <drivers/measured_boot/event_log/event_log.h> 10 #include <tools_share/tbbr_oid.h> 11 #include <fvp_critical_data.h> 12 13 #include <plat/arm/common/plat_arm.h> 14 #include <plat/common/common_def.h> 15 16 /* Event Log data */ 17 static uint64_t event_log_base; 18 19 /* FVP table with platform specific image IDs, names and PCRs */ 20 const event_log_metadata_t fvp_event_log_metadata[] = { 21 { BL31_IMAGE_ID, EVLOG_BL31_STRING, PCR_0 }, 22 { BL32_IMAGE_ID, EVLOG_BL32_STRING, PCR_0 }, 23 { BL32_EXTRA1_IMAGE_ID, EVLOG_BL32_EXTRA1_STRING, PCR_0 }, 24 { BL32_EXTRA2_IMAGE_ID, EVLOG_BL32_EXTRA2_STRING, PCR_0 }, 25 { BL33_IMAGE_ID, EVLOG_BL33_STRING, PCR_0 }, 26 { HW_CONFIG_ID, EVLOG_HW_CONFIG_STRING, PCR_0 }, 27 { NT_FW_CONFIG_ID, EVLOG_NT_FW_CONFIG_STRING, PCR_0 }, 28 { SCP_BL2_IMAGE_ID, EVLOG_SCP_BL2_STRING, PCR_0 }, 29 { SOC_FW_CONFIG_ID, EVLOG_SOC_FW_CONFIG_STRING, PCR_0 }, 30 { TOS_FW_CONFIG_ID, EVLOG_TOS_FW_CONFIG_STRING, PCR_0 }, 31 32 { CRITICAL_DATA_ID, EVLOG_CRITICAL_DATA_STRING, PCR_1 }, 33 34 { EVLOG_INVALID_ID, NULL, (unsigned int)(-1) } /* Terminator */ 35 }; 36 37 void bl2_plat_mboot_init(void) 38 { 39 uint8_t *event_log_start; 40 uint8_t *event_log_finish; 41 size_t bl1_event_log_size; 42 int rc; 43 44 rc = arm_get_tb_fw_info(&event_log_base, &bl1_event_log_size); 45 if (rc != 0) { 46 ERROR("%s(): Unable to get Event Log info from TB_FW_CONFIG\n", 47 __func__); 48 /* 49 * It is a fatal error because on FVP platform, BL2 software 50 * assumes that a valid Event Log buffer exist and it will use 51 * same Event Log buffer to append image measurements. 52 */ 53 panic(); 54 } 55 56 /* 57 * BL1 and BL2 share the same Event Log buffer and that BL2 will 58 * append its measurements after BL1's 59 */ 60 event_log_start = (uint8_t *)((uintptr_t)event_log_base + 61 bl1_event_log_size); 62 event_log_finish = (uint8_t *)((uintptr_t)event_log_base + 63 PLAT_ARM_EVENT_LOG_MAX_SIZE); 64 65 event_log_init((uint8_t *)event_log_start, event_log_finish); 66 } 67 68 int plat_mboot_measure_critical_data(unsigned int critical_data_id, 69 const void *base, size_t size) 70 { 71 /* 72 * It is very unlikely that the critical data size would be 73 * bigger than 2^32 bytes 74 */ 75 assert(size < UINT32_MAX); 76 assert(base != NULL); 77 78 /* Calculate image hash and record data in Event Log */ 79 int err = event_log_measure_and_record((uintptr_t)base, (uint32_t)size, 80 critical_data_id); 81 if (err != 0) { 82 ERROR("%s%s critical data (%i)\n", 83 "Failed to ", "record", err); 84 return err; 85 } 86 87 return 0; 88 } 89 90 static int fvp_populate_critical_data(struct fvp_critical_data *critical_data) 91 { 92 char *nv_ctr_oids[MAX_NV_CTR_IDS] = { 93 [TRUSTED_NV_CTR_ID] = TRUSTED_FW_NVCOUNTER_OID, 94 [NON_TRUSTED_NV_CTR_ID] = NON_TRUSTED_FW_NVCOUNTER_OID, 95 }; 96 97 for (int i = 0; i < MAX_NV_CTR_IDS; i++) { 98 int rc = plat_get_nv_ctr(nv_ctr_oids[i], 99 &critical_data->nv_ctr[i]); 100 if (rc != 0) { 101 return rc; 102 } 103 } 104 105 return 0; 106 } 107 108 static int fvp_populate_and_measure_critical_data(void) 109 { 110 struct fvp_critical_data populate_critical_data; 111 112 int rc = fvp_populate_critical_data(&populate_critical_data); 113 if (rc == 0) { 114 rc = plat_mboot_measure_critical_data(CRITICAL_DATA_ID, 115 &populate_critical_data, 116 sizeof(populate_critical_data)); 117 } 118 119 return rc; 120 } 121 122 void bl2_plat_mboot_finish(void) 123 { 124 int rc; 125 126 /* Event Log address in Non-Secure memory */ 127 uintptr_t ns_log_addr; 128 129 /* Event Log filled size */ 130 size_t event_log_cur_size; 131 132 rc = fvp_populate_and_measure_critical_data(); 133 if (rc != 0) { 134 panic(); 135 } 136 137 event_log_cur_size = event_log_get_cur_size((uint8_t *)event_log_base); 138 139 rc = arm_set_nt_fw_info( 140 #ifdef SPD_opteed 141 (uintptr_t)event_log_base, 142 #endif 143 event_log_cur_size, &ns_log_addr); 144 if (rc != 0) { 145 ERROR("%s(): Unable to update %s_FW_CONFIG\n", 146 __func__, "NT"); 147 /* 148 * It is a fatal error because on FVP secure world software 149 * assumes that a valid event log exists and will use it to 150 * record the measurements into the fTPM. 151 * Note: In FVP platform, OP-TEE uses nt_fw_config to get the 152 * secure Event Log buffer address. 153 */ 154 panic(); 155 } 156 157 /* Copy Event Log to Non-secure memory */ 158 (void)memcpy((void *)ns_log_addr, (const void *)event_log_base, 159 event_log_cur_size); 160 161 /* Ensure that the Event Log is visible in Non-secure memory */ 162 flush_dcache_range(ns_log_addr, event_log_cur_size); 163 164 #if defined(SPD_tspd) || defined(SPD_spmd) 165 /* Set Event Log data in TOS_FW_CONFIG */ 166 rc = arm_set_tos_fw_info((uintptr_t)event_log_base, 167 event_log_cur_size); 168 if (rc != 0) { 169 ERROR("%s(): Unable to update %s_FW_CONFIG\n", 170 __func__, "TOS"); 171 panic(); 172 } 173 #endif /* defined(SPD_tspd) || defined(SPD_spmd) */ 174 175 dump_event_log((uint8_t *)event_log_base, event_log_cur_size); 176 } 177