blob: 79517f015aff6081b324a4d8c0a0cc27d6db3c9c [file] [log] [blame]
Tom Rini83d290c2018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Simon Glassed3f5a32013-11-10 10:27:05 -07002/*
3 * Copyright (c) 2013 Google, Inc
Simon Glassed3f5a32013-11-10 10:27:05 -07004 */
5
6#include <common.h>
Simon Glass21baf152015-08-22 18:31:35 -06007#include <dm.h>
Miquel Raynald677bfe2018-05-15 11:57:06 +02008#include <tpm-v1.h>
Simon Glassed3f5a32013-11-10 10:27:05 -07009#include <asm/state.h>
10#include <asm/unaligned.h>
11#include <linux/crc8.h>
12
13/* TPM NVRAM location indices. */
14#define FIRMWARE_NV_INDEX 0x1007
15#define KERNEL_NV_INDEX 0x1008
Simon Glassef8a2502018-10-01 11:55:18 -060016#define BACKUP_NV_INDEX 0x1009
17#define FWMP_NV_INDEX 0x100a
18#define REC_HASH_NV_INDEX 0x100b
19#define REC_HASH_NV_SIZE VB2_SHA256_DIGEST_SIZE
Simon Glassed3f5a32013-11-10 10:27:05 -070020
21#define NV_DATA_PUBLIC_PERMISSIONS_OFFSET 60
22
23/* Kernel TPM space - KERNEL_NV_INDEX, locked with physical presence */
24#define ROLLBACK_SPACE_KERNEL_VERSION 2
25#define ROLLBACK_SPACE_KERNEL_UID 0x4752574C /* 'GRWL' */
26
27struct rollback_space_kernel {
28 /* Struct version, for backwards compatibility */
29 uint8_t struct_version;
30 /* Unique ID to detect space redefinition */
31 uint32_t uid;
32 /* Kernel versions */
33 uint32_t kernel_versions;
34 /* Reserved for future expansion */
35 uint8_t reserved[3];
36 /* Checksum (v2 and later only) */
37 uint8_t crc8;
38} __packed rollback_space_kernel;
39
40/*
41 * These numbers derive from adding the sizes of command fields as shown in
42 * the TPM commands manual.
43 */
44#define TPM_REQUEST_HEADER_LENGTH 10
45#define TPM_RESPONSE_HEADER_LENGTH 10
46
47/* These are the different non-volatile spaces that we emulate */
48enum {
49 NV_GLOBAL_LOCK,
50 NV_SEQ_FIRMWARE,
51 NV_SEQ_KERNEL,
Simon Glassef8a2502018-10-01 11:55:18 -060052 NV_SEQ_BACKUP,
53 NV_SEQ_FWMP,
54 NV_SEQ_REC_HASH,
55
Simon Glassed3f5a32013-11-10 10:27:05 -070056 NV_SEQ_COUNT,
57};
58
59/* Size of each non-volatile space */
60#define NV_DATA_SIZE 0x20
61
Simon Glassef8a2502018-10-01 11:55:18 -060062struct nvdata_state {
63 bool present;
64 u8 data[NV_DATA_SIZE];
65};
66
Simon Glassed3f5a32013-11-10 10:27:05 -070067/*
68 * Information about our TPM emulation. This is preserved in the sandbox
69 * state file if enabled.
70 */
71static struct tpm_state {
Simon Glassef8a2502018-10-01 11:55:18 -060072 bool valid;
73 struct nvdata_state nvdata[NV_SEQ_COUNT];
Simon Glass21baf152015-08-22 18:31:35 -060074} g_state;
Simon Glassed3f5a32013-11-10 10:27:05 -070075
76/**
77 * sandbox_tpm_read_state() - read the sandbox EC state from the state file
78 *
79 * If data is available, then blob and node will provide access to it. If
80 * not this function sets up an empty TPM.
81 *
82 * @blob: Pointer to device tree blob, or NULL if no data to read
83 * @node: Node offset to read from
84 */
85static int sandbox_tpm_read_state(const void *blob, int node)
86{
87 const char *prop;
88 int len;
89 int i;
90
91 if (!blob)
92 return 0;
93
94 for (i = 0; i < NV_SEQ_COUNT; i++) {
95 char prop_name[20];
96
97 sprintf(prop_name, "nvdata%d", i);
98 prop = fdt_getprop(blob, node, prop_name, &len);
Simon Glassef8a2502018-10-01 11:55:18 -060099 if (prop && len == NV_DATA_SIZE) {
100 memcpy(g_state.nvdata[i].data, prop, NV_DATA_SIZE);
101 g_state.nvdata[i].present = true;
102 }
Simon Glassed3f5a32013-11-10 10:27:05 -0700103 }
Simon Glassef8a2502018-10-01 11:55:18 -0600104 g_state.valid = true;
Simon Glassed3f5a32013-11-10 10:27:05 -0700105
106 return 0;
107}
108
109/**
110 * cros_ec_write_state() - Write out our state to the state file
111 *
112 * The caller will ensure that there is a node ready for the state. The node
113 * may already contain the old state, in which case it is overridden.
114 *
115 * @blob: Device tree blob holding state
116 * @node: Node to write our state into
117 */
118static int sandbox_tpm_write_state(void *blob, int node)
119{
120 int i;
121
122 /*
123 * We are guaranteed enough space to write basic properties.
124 * We could use fdt_add_subnode() to put each set of data in its
125 * own node - perhaps useful if we add access informaiton to each.
126 */
127 for (i = 0; i < NV_SEQ_COUNT; i++) {
128 char prop_name[20];
129
Simon Glassef8a2502018-10-01 11:55:18 -0600130 if (g_state.nvdata[i].present) {
131 sprintf(prop_name, "nvdata%d", i);
132 fdt_setprop(blob, node, prop_name,
133 g_state.nvdata[i].data, NV_DATA_SIZE);
134 }
Simon Glassed3f5a32013-11-10 10:27:05 -0700135 }
136
137 return 0;
138}
139
140SANDBOX_STATE_IO(sandbox_tpm, "google,sandbox-tpm", sandbox_tpm_read_state,
141 sandbox_tpm_write_state);
142
143static int index_to_seq(uint32_t index)
144{
145 switch (index) {
146 case FIRMWARE_NV_INDEX:
147 return NV_SEQ_FIRMWARE;
148 case KERNEL_NV_INDEX:
149 return NV_SEQ_KERNEL;
Simon Glassef8a2502018-10-01 11:55:18 -0600150 case BACKUP_NV_INDEX:
151 return NV_SEQ_BACKUP;
152 case FWMP_NV_INDEX:
153 return NV_SEQ_FWMP;
154 case REC_HASH_NV_INDEX:
155 return NV_SEQ_REC_HASH;
Simon Glassed3f5a32013-11-10 10:27:05 -0700156 case 0:
157 return NV_GLOBAL_LOCK;
158 }
159
160 printf("Invalid nv index %#x\n", index);
161 return -1;
162}
163
Simon Glassef8a2502018-10-01 11:55:18 -0600164static void handle_cap_flag_space(u8 **datap, uint index)
165{
166 struct tpm_nv_data_public pub;
167
168 /* TPM_NV_PER_PPWRITE */
169 memset(&pub, '\0', sizeof(pub));
170 pub.nv_index = __cpu_to_be32(index);
171 pub.pcr_info_read.pcr_selection.size_of_select = __cpu_to_be16(
172 sizeof(pub.pcr_info_read.pcr_selection.pcr_select));
173 pub.permission.attributes = __cpu_to_be32(1);
174 pub.pcr_info_write = pub.pcr_info_read;
175 memcpy(*datap, &pub, sizeof(pub));
176 *datap += sizeof(pub);
177}
178
Simon Glass21baf152015-08-22 18:31:35 -0600179static int sandbox_tpm_xfer(struct udevice *dev, const uint8_t *sendbuf,
180 size_t send_size, uint8_t *recvbuf,
181 size_t *recv_len)
Simon Glassed3f5a32013-11-10 10:27:05 -0700182{
Simon Glass21baf152015-08-22 18:31:35 -0600183 struct tpm_state *tpm = dev_get_priv(dev);
Simon Glassed3f5a32013-11-10 10:27:05 -0700184 uint32_t code, index, length, type;
185 uint8_t *data;
186 int seq;
187
188 code = get_unaligned_be32(sendbuf + sizeof(uint16_t) +
189 sizeof(uint32_t));
190 printf("tpm: %zd bytes, recv_len %zd, cmd = %x\n", send_size,
191 *recv_len, code);
192 print_buffer(0, sendbuf, 1, send_size, 0);
193 switch (code) {
Simon Glass998af312018-10-01 11:55:17 -0600194 case TPM_CMD_GET_CAPABILITY:
Simon Glassed3f5a32013-11-10 10:27:05 -0700195 type = get_unaligned_be32(sendbuf + 14);
196 switch (type) {
Simon Glass998af312018-10-01 11:55:17 -0600197 case TPM_CAP_FLAG:
Simon Glassed3f5a32013-11-10 10:27:05 -0700198 index = get_unaligned_be32(sendbuf + 18);
199 printf("Get flags index %#02x\n", index);
200 *recv_len = 22;
201 memset(recvbuf, '\0', *recv_len);
Simon Glassed3f5a32013-11-10 10:27:05 -0700202 data = recvbuf + TPM_RESPONSE_HEADER_LENGTH +
203 sizeof(uint32_t);
204 switch (index) {
205 case FIRMWARE_NV_INDEX:
206 break;
207 case KERNEL_NV_INDEX:
Simon Glassef8a2502018-10-01 11:55:18 -0600208 handle_cap_flag_space(&data, index);
209 *recv_len = data - recvbuf -
210 TPM_RESPONSE_HEADER_LENGTH -
211 sizeof(uint32_t);
212 break;
213 case TPM_CAP_FLAG_PERMANENT: {
214 struct tpm_permanent_flags *pflags;
215
216 pflags = (struct tpm_permanent_flags *)data;
217 memset(pflags, '\0', sizeof(*pflags));
218 put_unaligned_be32(TPM_TAG_PERMANENT_FLAGS,
219 &pflags->tag);
220 *recv_len = TPM_HEADER_SIZE + 4 +
221 sizeof(*pflags);
Simon Glassed3f5a32013-11-10 10:27:05 -0700222 break;
223 }
Simon Glassef8a2502018-10-01 11:55:18 -0600224 default:
225 printf(" ** Unknown flags index %x\n", index);
226 return -ENOSYS;
227 }
228 put_unaligned_be32(*recv_len,
229 recvbuf +
230 TPM_RESPONSE_HEADER_LENGTH);
Simon Glassed3f5a32013-11-10 10:27:05 -0700231 break;
Simon Glass998af312018-10-01 11:55:17 -0600232 case TPM_CAP_NV_INDEX:
Simon Glassed3f5a32013-11-10 10:27:05 -0700233 index = get_unaligned_be32(sendbuf + 18);
234 printf("Get cap nv index %#02x\n", index);
235 put_unaligned_be32(22, recvbuf +
236 TPM_RESPONSE_HEADER_LENGTH);
237 break;
238 default:
239 printf(" ** Unknown 0x65 command type %#02x\n",
240 type);
Simon Glass998af312018-10-01 11:55:17 -0600241 return -ENOSYS;
Simon Glassed3f5a32013-11-10 10:27:05 -0700242 }
243 break;
Simon Glass998af312018-10-01 11:55:17 -0600244 case TPM_CMD_NV_WRITE_VALUE:
Simon Glassed3f5a32013-11-10 10:27:05 -0700245 index = get_unaligned_be32(sendbuf + 10);
246 length = get_unaligned_be32(sendbuf + 18);
247 seq = index_to_seq(index);
248 if (seq < 0)
Simon Glass998af312018-10-01 11:55:17 -0600249 return -EINVAL;
Simon Glassed3f5a32013-11-10 10:27:05 -0700250 printf("tpm: nvwrite index=%#02x, len=%#02x\n", index, length);
Simon Glassef8a2502018-10-01 11:55:18 -0600251 memcpy(&tpm->nvdata[seq].data, sendbuf + 22, length);
252 tpm->nvdata[seq].present = true;
Simon Glassed3f5a32013-11-10 10:27:05 -0700253 *recv_len = 12;
254 memset(recvbuf, '\0', *recv_len);
255 break;
Simon Glass998af312018-10-01 11:55:17 -0600256 case TPM_CMD_NV_READ_VALUE: /* nvread */
Simon Glassed3f5a32013-11-10 10:27:05 -0700257 index = get_unaligned_be32(sendbuf + 10);
258 length = get_unaligned_be32(sendbuf + 18);
259 seq = index_to_seq(index);
260 if (seq < 0)
Simon Glass998af312018-10-01 11:55:17 -0600261 return -EINVAL;
Simon Glassef8a2502018-10-01 11:55:18 -0600262 printf("tpm: nvread index=%#02x, len=%#02x, seq=%#02x\n", index,
263 length, seq);
Simon Glassed3f5a32013-11-10 10:27:05 -0700264 *recv_len = TPM_RESPONSE_HEADER_LENGTH + sizeof(uint32_t) +
265 length;
266 memset(recvbuf, '\0', *recv_len);
267 put_unaligned_be32(length, recvbuf +
268 TPM_RESPONSE_HEADER_LENGTH);
269 if (seq == NV_SEQ_KERNEL) {
270 struct rollback_space_kernel rsk;
271
272 data = recvbuf + TPM_RESPONSE_HEADER_LENGTH +
273 sizeof(uint32_t);
Tom Rini7e019da2016-04-12 15:11:22 -0400274 memset(&rsk, 0, sizeof(struct rollback_space_kernel));
Simon Glassed3f5a32013-11-10 10:27:05 -0700275 rsk.struct_version = 2;
276 rsk.uid = ROLLBACK_SPACE_KERNEL_UID;
Stefan Roese456ecd02016-04-08 15:56:29 +0200277 rsk.crc8 = crc8(0, (unsigned char *)&rsk,
Simon Glassed3f5a32013-11-10 10:27:05 -0700278 offsetof(struct rollback_space_kernel,
279 crc8));
280 memcpy(data, &rsk, sizeof(rsk));
Simon Glassef8a2502018-10-01 11:55:18 -0600281 } else if (!tpm->nvdata[seq].present) {
282 put_unaligned_be32(TPM_BADINDEX, recvbuf +
283 sizeof(uint16_t) + sizeof(uint32_t));
Simon Glassed3f5a32013-11-10 10:27:05 -0700284 } else {
285 memcpy(recvbuf + TPM_RESPONSE_HEADER_LENGTH +
Simon Glassef8a2502018-10-01 11:55:18 -0600286 sizeof(uint32_t), &tpm->nvdata[seq].data,
287 length);
Simon Glassed3f5a32013-11-10 10:27:05 -0700288 }
289 break;
Simon Glassef8a2502018-10-01 11:55:18 -0600290 case TPM_CMD_EXTEND:
291 *recv_len = 30;
292 memset(recvbuf, '\0', *recv_len);
293 break;
294 case TPM_CMD_NV_DEFINE_SPACE:
Simon Glassed3f5a32013-11-10 10:27:05 -0700295 case 0x15: /* pcr read */
296 case 0x5d: /* force clear */
297 case 0x6f: /* physical enable */
298 case 0x72: /* physical set deactivated */
299 case 0x99: /* startup */
Simon Glassef8a2502018-10-01 11:55:18 -0600300 case 0x50: /* self test full */
Simon Glassed3f5a32013-11-10 10:27:05 -0700301 case 0x4000000a: /* assert physical presence */
302 *recv_len = 12;
303 memset(recvbuf, '\0', *recv_len);
304 break;
305 default:
306 printf("Unknown tpm command %02x\n", code);
Simon Glass998af312018-10-01 11:55:17 -0600307 return -ENOSYS;
Simon Glassed3f5a32013-11-10 10:27:05 -0700308 }
309
310 return 0;
311}
312
Simon Glass21baf152015-08-22 18:31:35 -0600313static int sandbox_tpm_get_desc(struct udevice *dev, char *buf, int size)
Simon Glassed3f5a32013-11-10 10:27:05 -0700314{
Simon Glass21baf152015-08-22 18:31:35 -0600315 if (size < 15)
316 return -ENOSPC;
317
318 return snprintf(buf, size, "sandbox TPM");
319}
320
321static int sandbox_tpm_probe(struct udevice *dev)
322{
323 struct tpm_state *tpm = dev_get_priv(dev);
324
325 memcpy(tpm, &g_state, sizeof(*tpm));
326
Simon Glassed3f5a32013-11-10 10:27:05 -0700327 return 0;
328}
329
Simon Glass21baf152015-08-22 18:31:35 -0600330static int sandbox_tpm_open(struct udevice *dev)
Simon Glassed3f5a32013-11-10 10:27:05 -0700331{
Simon Glassed3f5a32013-11-10 10:27:05 -0700332 return 0;
333}
334
Simon Glass21baf152015-08-22 18:31:35 -0600335static int sandbox_tpm_close(struct udevice *dev)
Simon Glassed3f5a32013-11-10 10:27:05 -0700336{
Simon Glassed3f5a32013-11-10 10:27:05 -0700337 return 0;
338}
Simon Glass21baf152015-08-22 18:31:35 -0600339
340static const struct tpm_ops sandbox_tpm_ops = {
341 .open = sandbox_tpm_open,
342 .close = sandbox_tpm_close,
343 .get_desc = sandbox_tpm_get_desc,
344 .xfer = sandbox_tpm_xfer,
345};
346
347static const struct udevice_id sandbox_tpm_ids[] = {
348 { .compatible = "google,sandbox-tpm" },
349 { }
350};
351
352U_BOOT_DRIVER(sandbox_tpm) = {
353 .name = "sandbox_tpm",
354 .id = UCLASS_TPM,
355 .of_match = sandbox_tpm_ids,
356 .ops = &sandbox_tpm_ops,
357 .probe = sandbox_tpm_probe,
358 .priv_auto_alloc_size = sizeof(struct tpm_state),
359};