blob: 42943658ef22da0a24d1bc73ec6922755d744487 [file] [log] [blame]
Abhi Singhc4c9e2b2024-11-06 11:11:11 -06001/*
2 * Copyright (c) 2025, Arm Limited. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <assert.h>
8#include <stdarg.h>
9#include <stdint.h>
10
11#include <common/desc_image_load.h>
12#include <common/ep_info.h>
13#include <drivers/auth/crypto_mod.h>
Abhi Singh4f9894d2024-11-07 17:39:38 -060014#include <drivers/gpio_spi.h>
Abhi Singhc4c9e2b2024-11-06 11:11:11 -060015#include <drivers/measured_boot/event_log/event_log.h>
16#include <drivers/measured_boot/metadata.h>
Abhi Singh4f9894d2024-11-07 17:39:38 -060017#include <drivers/tpm/tpm2.h>
18#include <drivers/tpm/tpm2_chip.h>
19#include <drivers/tpm/tpm2_slb9670/slb9670_gpio.h>
Abhi Singhc4c9e2b2024-11-06 11:11:11 -060020#include <plat/arm/common/plat_arm.h>
21#include <plat/common/platform.h>
22#include <platform_def.h>
23
Abhi Singh4f9894d2024-11-07 17:39:38 -060024#include <rpi_shared.h>
25
Abhi Singhc4c9e2b2024-11-06 11:11:11 -060026/* Event Log data */
27uint8_t event_log[PLAT_ARM_EVENT_LOG_MAX_SIZE];
28
29/* RPI3 table with platform specific image IDs, names and PCRs */
30const event_log_metadata_t rpi3_event_log_metadata[] = {
31 { FW_CONFIG_ID, MBOOT_FW_CONFIG_STRING, PCR_0 },
32 { TB_FW_CONFIG_ID, MBOOT_TB_FW_CONFIG_STRING, PCR_0 },
33 { BL2_IMAGE_ID, MBOOT_BL2_IMAGE_STRING, PCR_0 },
34
35 { EVLOG_INVALID_ID, NULL, (unsigned int)(-1) } /* Terminator */
36};
37
Abhi Singh4f9894d2024-11-07 17:39:38 -060038#if DISCRETE_TPM
39extern struct tpm_chip_data tpm_chip_data;
40#if (TPM_INTERFACE == FIFO_SPI)
41extern struct gpio_spi_data tpm_rpi3_gpio_data;
42struct spi_plat *spidev;
43#endif
44
45static void rpi3_bl1_tpm_early_interface_setup(void)
46{
47#if (TPM_INTERFACE == FIFO_SPI)
48 tpm2_slb9670_gpio_init(&tpm_rpi3_gpio_data);
49
50 tpm2_slb9670_reset_chip(&tpm_rpi3_gpio_data);
51
52 spidev = gpio_spi_init(&tpm_rpi3_gpio_data);
53#endif
54}
55#endif
56
Abhi Singhc4c9e2b2024-11-06 11:11:11 -060057void bl1_plat_mboot_init(void)
58{
Abhi Singh4f9894d2024-11-07 17:39:38 -060059#if DISCRETE_TPM
60 int rc;
61
62 rpi3_bl1_tpm_early_interface_setup();
63 rc = tpm_interface_init(&tpm_chip_data, 0);
64 if (rc != 0) {
65 ERROR("BL1: TPM interface init failed\n");
66 panic();
67 }
68 rc = tpm_startup(&tpm_chip_data, TPM_SU_CLEAR);
69 if (rc != 0) {
70 ERROR("BL1: TPM Startup failed\n");
71 panic();
72 }
73#endif
74
Abhi Singhc4c9e2b2024-11-06 11:11:11 -060075 event_log_init(event_log, event_log + sizeof(event_log));
76 event_log_write_header();
77}
78
79void bl1_plat_mboot_finish(void)
80{
81 size_t event_log_cur_size;
82 image_desc_t *image_desc;
83 entry_point_info_t *ep_info;
84
85 event_log_cur_size = event_log_get_cur_size(event_log);
86 image_desc = bl1_plat_get_image_desc(BL2_IMAGE_ID);
87 assert(image_desc != NULL);
88
89 /* Get the entry point info */
90 ep_info = &image_desc->ep_info;
91 ep_info->args.arg2 = (uint64_t) event_log;
92 ep_info->args.arg3 = (uint32_t) event_log_cur_size;
Abhi Singh4f9894d2024-11-07 17:39:38 -060093
94#if DISCRETE_TPM
95 int rc;
96
97 /* relinquish control of TPM locality 0 and close interface */
98 rc = tpm_interface_close(&tpm_chip_data, 0);
99 if (rc != 0) {
100 ERROR("BL1: TPM interface close failed\n");
101 panic();
102 }
103#endif
Abhi Singhc4c9e2b2024-11-06 11:11:11 -0600104}
105
106int plat_mboot_measure_image(unsigned int image_id, image_info_t *image_data)
107{
108 int rc = 0;
109 unsigned char hash_data[CRYPTO_MD_MAX_SIZE];
110 const event_log_metadata_t *metadata_ptr = rpi3_event_log_metadata;
111
112 rc = event_log_measure(image_data->image_base, image_data->image_size, hash_data);
113 if (rc != 0) {
114 return rc;
115 }
116
Abhi Singh4f9894d2024-11-07 17:39:38 -0600117#if DISCRETE_TPM
118 rc = tpm_pcr_extend(&tpm_chip_data, 0, TPM_ALG_ID, hash_data, TCG_DIGEST_SIZE);
119 if (rc != 0) {
120 ERROR("BL1: TPM PCR-0 extend failed\n");
121 panic();
122 }
123#endif
124
Abhi Singhc4c9e2b2024-11-06 11:11:11 -0600125 while ((metadata_ptr->id != EVLOG_INVALID_ID) &&
126 (metadata_ptr->id != image_id)) {
127 metadata_ptr++;
128 }
129 assert(metadata_ptr->id != EVLOG_INVALID_ID);
130
131 event_log_record(hash_data, EV_POST_CODE, metadata_ptr);
132
133 /* Dump Event Log for user view */
134 dump_event_log((uint8_t *)event_log, event_log_get_cur_size(event_log));
135
136 return rc;
137}