1 /* 2 * Copyright (c) 2021-2022, Arm Limited. All rights reserved. 3 * 4 * SPDX-License-Identifier: BSD-3-Clause 5 */ 6 7 #include <stdint.h> 8 9 #include <drivers/measured_boot/event_log/event_log.h> 10 #include <tools_share/tbbr_oid.h> 11 #include <fvp_critical_data.h> 12 13 #include <plat/arm/common/plat_arm.h> 14 #include <plat/common/common_def.h> 15 16 /* Event Log data */ 17 static uint64_t event_log_base; 18 19 /* FVP table with platform specific image IDs, names and PCRs */ 20 const event_log_metadata_t fvp_event_log_metadata[] = { 21 { BL31_IMAGE_ID, EVLOG_BL31_STRING, PCR_0 }, 22 { BL32_IMAGE_ID, EVLOG_BL32_STRING, PCR_0 }, 23 { BL32_EXTRA1_IMAGE_ID, EVLOG_BL32_EXTRA1_STRING, PCR_0 }, 24 { BL32_EXTRA2_IMAGE_ID, EVLOG_BL32_EXTRA2_STRING, PCR_0 }, 25 { BL33_IMAGE_ID, EVLOG_BL33_STRING, PCR_0 }, 26 { HW_CONFIG_ID, EVLOG_HW_CONFIG_STRING, PCR_0 }, 27 { NT_FW_CONFIG_ID, EVLOG_NT_FW_CONFIG_STRING, PCR_0 }, 28 { SCP_BL2_IMAGE_ID, EVLOG_SCP_BL2_STRING, PCR_0 }, 29 { SOC_FW_CONFIG_ID, EVLOG_SOC_FW_CONFIG_STRING, PCR_0 }, 30 { TOS_FW_CONFIG_ID, EVLOG_TOS_FW_CONFIG_STRING, PCR_0 }, 31 32 { CRITICAL_DATA_ID, EVLOG_CRITICAL_DATA_STRING, PCR_1 }, 33 34 { EVLOG_INVALID_ID, NULL, (unsigned int)(-1) } /* Terminator */ 35 }; 36 37 void bl2_plat_mboot_init(void) 38 { 39 uint8_t *event_log_start; 40 uint8_t *event_log_finish; 41 size_t bl1_event_log_size; 42 int rc; 43 44 rc = arm_get_tb_fw_info(&event_log_base, &bl1_event_log_size); 45 if (rc != 0) { 46 ERROR("%s(): Unable to get Event Log info from TB_FW_CONFIG\n", 47 __func__); 48 /* 49 * It is a fatal error because on FVP platform, BL2 software 50 * assumes that a valid Event Log buffer exist and it will use 51 * same Event Log buffer to append image measurements. 52 */ 53 panic(); 54 } 55 56 /* 57 * BL1 and BL2 share the same Event Log buffer and that BL2 will 58 * append its measurements after BL1's 59 */ 60 event_log_start = (uint8_t *)((uintptr_t)event_log_base + 61 bl1_event_log_size); 62 event_log_finish = (uint8_t *)((uintptr_t)event_log_base + 63 PLAT_ARM_EVENT_LOG_MAX_SIZE); 64 65 event_log_init((uint8_t *)event_log_start, event_log_finish); 66 } 67 68 int plat_mboot_measure_critical_data(unsigned int critical_data_id, 69 const void *base, size_t size) 70 { 71 /* 72 * It is very unlikely that the critical data size would be 73 * bigger than 2^32 bytes 74 */ 75 assert(size < UINT32_MAX); 76 assert(base != NULL); 77 78 /* Calculate image hash and record data in Event Log */ 79 int err = event_log_measure_and_record((uintptr_t)base, (uint32_t)size, 80 critical_data_id); 81 if (err != 0) { 82 ERROR("%s%s critical data (%i)\n", 83 "Failed to ", "record", err); 84 return err; 85 } 86 87 return 0; 88 } 89 90 #if TRUSTED_BOARD_BOOT 91 static int fvp_populate_critical_data(struct fvp_critical_data *critical_data) 92 { 93 char *nv_ctr_oids[MAX_NV_CTR_IDS] = { 94 [TRUSTED_NV_CTR_ID] = TRUSTED_FW_NVCOUNTER_OID, 95 [NON_TRUSTED_NV_CTR_ID] = NON_TRUSTED_FW_NVCOUNTER_OID, 96 }; 97 98 for (int i = 0; i < MAX_NV_CTR_IDS; i++) { 99 int rc = plat_get_nv_ctr(nv_ctr_oids[i], 100 &critical_data->nv_ctr[i]); 101 if (rc != 0) { 102 return rc; 103 } 104 } 105 106 return 0; 107 } 108 #endif /* TRUSTED_BOARD_BOOT */ 109 110 static int fvp_populate_and_measure_critical_data(void) 111 { 112 int rc = 0; 113 114 /* 115 * FVP platform only measures 'platform NV-counter' and hence its 116 * measurement makes sense during Trusted-Boot flow only. 117 */ 118 #if TRUSTED_BOARD_BOOT 119 struct fvp_critical_data populate_critical_data; 120 121 rc = fvp_populate_critical_data(&populate_critical_data); 122 if (rc == 0) { 123 rc = plat_mboot_measure_critical_data(CRITICAL_DATA_ID, 124 &populate_critical_data, 125 sizeof(populate_critical_data)); 126 } 127 #endif /* TRUSTED_BOARD_BOOT */ 128 129 return rc; 130 } 131 132 void bl2_plat_mboot_finish(void) 133 { 134 int rc; 135 136 /* Event Log address in Non-Secure memory */ 137 uintptr_t ns_log_addr; 138 139 /* Event Log filled size */ 140 size_t event_log_cur_size; 141 142 rc = fvp_populate_and_measure_critical_data(); 143 if (rc != 0) { 144 panic(); 145 } 146 147 event_log_cur_size = event_log_get_cur_size((uint8_t *)event_log_base); 148 149 rc = arm_set_nt_fw_info( 150 #ifdef SPD_opteed 151 (uintptr_t)event_log_base, 152 #endif 153 event_log_cur_size, &ns_log_addr); 154 if (rc != 0) { 155 ERROR("%s(): Unable to update %s_FW_CONFIG\n", 156 __func__, "NT"); 157 /* 158 * It is a fatal error because on FVP secure world software 159 * assumes that a valid event log exists and will use it to 160 * record the measurements into the fTPM. 161 * Note: In FVP platform, OP-TEE uses nt_fw_config to get the 162 * secure Event Log buffer address. 163 */ 164 panic(); 165 } 166 167 /* Copy Event Log to Non-secure memory */ 168 (void)memcpy((void *)ns_log_addr, (const void *)event_log_base, 169 event_log_cur_size); 170 171 /* Ensure that the Event Log is visible in Non-secure memory */ 172 flush_dcache_range(ns_log_addr, event_log_cur_size); 173 174 #if defined(SPD_tspd) || defined(SPD_spmd) 175 /* Set Event Log data in TOS_FW_CONFIG */ 176 rc = arm_set_tos_fw_info((uintptr_t)event_log_base, 177 event_log_cur_size); 178 if (rc != 0) { 179 ERROR("%s(): Unable to update %s_FW_CONFIG\n", 180 __func__, "TOS"); 181 panic(); 182 } 183 #endif /* defined(SPD_tspd) || defined(SPD_spmd) */ 184 185 dump_event_log((uint8_t *)event_log_base, event_log_cur_size); 186 } 187