]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/boot/efi/measure.c
tree-wide: drop redundant space between __attribute__ and ((
[thirdparty/systemd.git] / src / boot / efi / measure.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
92ed3bb4 2
349cc4a5 3#if ENABLE_TPM
92ed3bb4
HH
4
5#include <efi.h>
6#include <efilib.h>
7#include "measure.h"
8
9#define EFI_TCG_PROTOCOL_GUID { 0xf541796d, 0xa62e, 0x4954, {0xa7, 0x75, 0x95, 0x84, 0xf6, 0x1b, 0x9c, 0xdd} }
10
11typedef struct _TCG_VERSION {
12 UINT8 Major;
13 UINT8 Minor;
14 UINT8 RevMajor;
15 UINT8 RevMinor;
16} TCG_VERSION;
17
bfdf8c3b
HH
18typedef struct tdEFI_TCG2_VERSION {
19 UINT8 Major;
20 UINT8 Minor;
21} EFI_TCG2_VERSION;
22
92ed3bb4
HH
23typedef struct _TCG_BOOT_SERVICE_CAPABILITY {
24 UINT8 Size;
25 struct _TCG_VERSION StructureVersion;
26 struct _TCG_VERSION ProtocolSpecVersion;
27 UINT8 HashAlgorithmBitmap;
28 BOOLEAN TPMPresentFlag;
29 BOOLEAN TPMDeactivatedFlag;
30} TCG_BOOT_SERVICE_CAPABILITY;
31
bfdf8c3b
HH
32typedef struct tdTREE_BOOT_SERVICE_CAPABILITY {
33 UINT8 Size;
34 EFI_TCG2_VERSION StructureVersion;
35 EFI_TCG2_VERSION ProtocolVersion;
36 UINT32 HashAlgorithmBitmap;
37 UINT32 SupportedEventLogs;
38 BOOLEAN TrEEPresentFlag;
39 UINT16 MaxCommandSize;
40 UINT16 MaxResponseSize;
41 UINT32 ManufacturerID;
42} TREE_BOOT_SERVICE_CAPABILITY;
43
92ed3bb4
HH
44typedef UINT32 TCG_ALGORITHM_ID;
45#define TCG_ALG_SHA 0x00000004 // The SHA1 algorithm
46
47#define SHA1_DIGEST_SIZE 20
48
49typedef struct _TCG_DIGEST {
50 UINT8 Digest[SHA1_DIGEST_SIZE];
51} TCG_DIGEST;
52
53#define EV_IPL 13
54
55typedef struct _TCG_PCR_EVENT {
56 UINT32 PCRIndex;
57 UINT32 EventType;
58 struct _TCG_DIGEST digest;
59 UINT32 EventSize;
60 UINT8 Event[1];
61} TCG_PCR_EVENT;
62
63INTERFACE_DECL(_EFI_TCG);
64
65typedef EFI_STATUS(EFIAPI * EFI_TCG_STATUS_CHECK) (IN struct _EFI_TCG * This,
66 OUT struct _TCG_BOOT_SERVICE_CAPABILITY * ProtocolCapability,
67 OUT UINT32 * TCGFeatureFlags,
68 OUT EFI_PHYSICAL_ADDRESS * EventLogLocation,
69 OUT EFI_PHYSICAL_ADDRESS * EventLogLastEntry);
70
71typedef EFI_STATUS(EFIAPI * EFI_TCG_HASH_ALL) (IN struct _EFI_TCG * This,
72 IN UINT8 * HashData,
73 IN UINT64 HashDataLen,
74 IN TCG_ALGORITHM_ID AlgorithmId,
75 IN OUT UINT64 * HashedDataLen, IN OUT UINT8 ** HashedDataResult);
76
77typedef EFI_STATUS(EFIAPI * EFI_TCG_LOG_EVENT) (IN struct _EFI_TCG * This,
78 IN struct _TCG_PCR_EVENT * TCGLogData,
79 IN OUT UINT32 * EventNumber, IN UINT32 Flags);
80
81typedef EFI_STATUS(EFIAPI * EFI_TCG_PASS_THROUGH_TO_TPM) (IN struct _EFI_TCG * This,
82 IN UINT32 TpmInputParameterBlockSize,
83 IN UINT8 * TpmInputParameterBlock,
84 IN UINT32 TpmOutputParameterBlockSize,
85 IN UINT8 * TpmOutputParameterBlock);
86
87typedef EFI_STATUS(EFIAPI * EFI_TCG_HASH_LOG_EXTEND_EVENT) (IN struct _EFI_TCG * This,
88 IN EFI_PHYSICAL_ADDRESS HashData,
89 IN UINT64 HashDataLen,
90 IN TCG_ALGORITHM_ID AlgorithmId,
91 IN struct _TCG_PCR_EVENT * TCGLogData,
92 IN OUT UINT32 * EventNumber,
93 OUT EFI_PHYSICAL_ADDRESS * EventLogLastEntry);
94
95typedef struct _EFI_TCG {
96 EFI_TCG_STATUS_CHECK StatusCheck;
97 EFI_TCG_HASH_ALL HashAll;
98 EFI_TCG_LOG_EVENT LogEvent;
99 EFI_TCG_PASS_THROUGH_TO_TPM PassThroughToTPM;
100 EFI_TCG_HASH_LOG_EXTEND_EVENT HashLogExtendEvent;
101} EFI_TCG;
102
103#define EFI_TCG2_PROTOCOL_GUID {0x607f766c, 0x7455, 0x42be, { 0x93, 0x0b, 0xe4, 0xd7, 0x6d, 0xb2, 0x72, 0x0f }}
104
105typedef struct tdEFI_TCG2_PROTOCOL EFI_TCG2_PROTOCOL;
106
92ed3bb4
HH
107typedef UINT32 EFI_TCG2_EVENT_LOG_BITMAP;
108typedef UINT32 EFI_TCG2_EVENT_LOG_FORMAT;
109typedef UINT32 EFI_TCG2_EVENT_ALGORITHM_BITMAP;
110
111#define EFI_TCG2_EVENT_LOG_FORMAT_TCG_1_2 0x00000001
112#define EFI_TCG2_EVENT_LOG_FORMAT_TCG_2 0x00000002
113
114typedef struct tdEFI_TCG2_BOOT_SERVICE_CAPABILITY {
115 UINT8 Size;
116 EFI_TCG2_VERSION StructureVersion;
117 EFI_TCG2_VERSION ProtocolVersion;
118 EFI_TCG2_EVENT_ALGORITHM_BITMAP HashAlgorithmBitmap;
119 EFI_TCG2_EVENT_LOG_BITMAP SupportedEventLogs;
120 BOOLEAN TPMPresentFlag;
121 UINT16 MaxCommandSize;
122 UINT16 MaxResponseSize;
123 UINT32 ManufacturerID;
124 UINT32 NumberOfPCRBanks;
125 EFI_TCG2_EVENT_ALGORITHM_BITMAP ActivePcrBanks;
126} EFI_TCG2_BOOT_SERVICE_CAPABILITY;
127
128#define EFI_TCG2_EVENT_HEADER_VERSION 1
129
130typedef struct {
131 UINT32 HeaderSize;
132 UINT16 HeaderVersion;
133 UINT32 PCRIndex;
134 UINT32 EventType;
2ee1c55d 135} __attribute__((packed)) EFI_TCG2_EVENT_HEADER;
92ed3bb4
HH
136
137typedef struct tdEFI_TCG2_EVENT {
138 UINT32 Size;
139 EFI_TCG2_EVENT_HEADER Header;
140 UINT8 Event[1];
2ee1c55d 141} __attribute__((packed)) EFI_TCG2_EVENT;
92ed3bb4
HH
142
143typedef EFI_STATUS(EFIAPI * EFI_TCG2_GET_CAPABILITY) (IN EFI_TCG2_PROTOCOL * This,
144 IN OUT EFI_TCG2_BOOT_SERVICE_CAPABILITY * ProtocolCapability);
145
146typedef EFI_STATUS(EFIAPI * EFI_TCG2_GET_EVENT_LOG) (IN EFI_TCG2_PROTOCOL * This,
147 IN EFI_TCG2_EVENT_LOG_FORMAT EventLogFormat,
148 OUT EFI_PHYSICAL_ADDRESS * EventLogLocation,
149 OUT EFI_PHYSICAL_ADDRESS * EventLogLastEntry,
150 OUT BOOLEAN * EventLogTruncated);
151
152typedef EFI_STATUS(EFIAPI * EFI_TCG2_HASH_LOG_EXTEND_EVENT) (IN EFI_TCG2_PROTOCOL * This,
153 IN UINT64 Flags,
154 IN EFI_PHYSICAL_ADDRESS DataToHash,
155 IN UINT64 DataToHashLen, IN EFI_TCG2_EVENT * EfiTcgEvent);
156
157typedef EFI_STATUS(EFIAPI * EFI_TCG2_SUBMIT_COMMAND) (IN EFI_TCG2_PROTOCOL * This,
158 IN UINT32 InputParameterBlockSize,
159 IN UINT8 * InputParameterBlock,
160 IN UINT32 OutputParameterBlockSize, IN UINT8 * OutputParameterBlock);
161
162typedef EFI_STATUS(EFIAPI * EFI_TCG2_GET_ACTIVE_PCR_BANKS) (IN EFI_TCG2_PROTOCOL * This, OUT UINT32 * ActivePcrBanks);
163
164typedef EFI_STATUS(EFIAPI * EFI_TCG2_SET_ACTIVE_PCR_BANKS) (IN EFI_TCG2_PROTOCOL * This, IN UINT32 ActivePcrBanks);
165
166typedef EFI_STATUS(EFIAPI * EFI_TCG2_GET_RESULT_OF_SET_ACTIVE_PCR_BANKS) (IN EFI_TCG2_PROTOCOL * This,
167 OUT UINT32 * OperationPresent, OUT UINT32 * Response);
168
169typedef struct tdEFI_TCG2_PROTOCOL {
170 EFI_TCG2_GET_CAPABILITY GetCapability;
171 EFI_TCG2_GET_EVENT_LOG GetEventLog;
172 EFI_TCG2_HASH_LOG_EXTEND_EVENT HashLogExtendEvent;
173 EFI_TCG2_SUBMIT_COMMAND SubmitCommand;
174 EFI_TCG2_GET_ACTIVE_PCR_BANKS GetActivePcrBanks;
175 EFI_TCG2_SET_ACTIVE_PCR_BANKS SetActivePcrBanks;
176 EFI_TCG2_GET_RESULT_OF_SET_ACTIVE_PCR_BANKS GetResultOfSetActivePcrBanks;
177} EFI_TCG2;
178
92ed3bb4
HH
179static EFI_STATUS tpm1_measure_to_pcr_and_event_log(const EFI_TCG *tcg, UINT32 pcrindex, const EFI_PHYSICAL_ADDRESS buffer,
180 UINTN buffer_size, const CHAR16 *description) {
181 EFI_STATUS status;
182 TCG_PCR_EVENT *tcg_event;
183 UINT32 event_number;
184 EFI_PHYSICAL_ADDRESS event_log_last;
185 UINTN desc_len;
186
187 desc_len = (StrLen(description) + 1) * sizeof(CHAR16);
188
189 tcg_event = AllocateZeroPool(desc_len + sizeof(TCG_PCR_EVENT));
190
234519ae 191 if (!tcg_event)
92ed3bb4
HH
192 return EFI_OUT_OF_RESOURCES;
193
194 tcg_event->EventSize = desc_len;
195 CopyMem((VOID *) & tcg_event->Event[0], (VOID *) description, desc_len);
196
197 tcg_event->PCRIndex = pcrindex;
198 tcg_event->EventType = EV_IPL;
199
200 event_number = 1;
201 status = uefi_call_wrapper(tcg->HashLogExtendEvent, 7,
a0693fc9 202 (EFI_TCG *) tcg, buffer, buffer_size, TCG_ALG_SHA, tcg_event, &event_number, &event_log_last);
92ed3bb4
HH
203
204 if (EFI_ERROR(status))
205 return status;
206
207 uefi_call_wrapper(BS->FreePool, 1, tcg_event);
208
209 return EFI_SUCCESS;
210}
211
59991e3f
LZ
212/*
213 * According to TCG EFI Protocol Specification for TPM 2.0 family,
214 * all events generated after the invocation of EFI_TCG2_GET_EVENT_LOG
215 * shall be stored in an instance of an EFI_CONFIGURATION_TABLE aka
216 * EFI TCG 2.0 final events table. Hence, it is necessary to trigger the
217 * internal switch through calling get_event_log() in order to allow
218 * to retrieve the logs from OS runtime.
219 */
bfdf8c3b 220static EFI_STATUS trigger_tcg2_final_events_table(const EFI_TCG2 *tcg, EFI_TCG2_EVENT_LOG_FORMAT log_fmt)
59991e3f 221{
16c73c76
RV
222 EFI_PHYSICAL_ADDRESS loc;
223 EFI_PHYSICAL_ADDRESS last_loc;
224 BOOLEAN truncated;
a0693fc9 225 return uefi_call_wrapper(tcg->GetEventLog, 5, (EFI_TCG2 *) tcg,
16c73c76 226 log_fmt, &loc, &last_loc, &truncated);
59991e3f 227}
92ed3bb4
HH
228
229static EFI_STATUS tpm2_measure_to_pcr_and_event_log(const EFI_TCG2 *tcg, UINT32 pcrindex, const EFI_PHYSICAL_ADDRESS buffer,
bfdf8c3b 230 UINT64 buffer_size, const CHAR16 *description, EFI_TCG2_EVENT_LOG_FORMAT log_fmt) {
92ed3bb4
HH
231 EFI_STATUS status;
232 EFI_TCG2_EVENT *tcg_event;
233 UINTN desc_len;
59991e3f
LZ
234 static BOOLEAN triggered = FALSE;
235
236 if (triggered == FALSE) {
bfdf8c3b 237 status = trigger_tcg2_final_events_table(tcg, log_fmt);
59991e3f
LZ
238 if (EFI_ERROR(status))
239 return status;
240
241 triggered = TRUE;
242 }
92ed3bb4
HH
243
244 desc_len = StrLen(description) * sizeof(CHAR16);
245
246 tcg_event = AllocateZeroPool(sizeof(*tcg_event) - sizeof(tcg_event->Event) + desc_len + 1);
247
234519ae 248 if (!tcg_event)
92ed3bb4
HH
249 return EFI_OUT_OF_RESOURCES;
250
bfdf8c3b 251 tcg_event->Size = sizeof(*tcg_event) - sizeof(tcg_event->Event) + desc_len + 1;
92ed3bb4
HH
252 tcg_event->Header.HeaderSize = sizeof(EFI_TCG2_EVENT_HEADER);
253 tcg_event->Header.HeaderVersion = EFI_TCG2_EVENT_HEADER_VERSION;
254 tcg_event->Header.PCRIndex = pcrindex;
255 tcg_event->Header.EventType = EV_IPL;
256
257 CopyMem((VOID *) tcg_event->Event, (VOID *) description, desc_len);
258
bfdf8c3b 259 status = uefi_call_wrapper(tcg->HashLogExtendEvent, 5, (EFI_TCG2 *) tcg, 0, buffer, (UINT64) buffer_size, tcg_event);
92ed3bb4
HH
260
261 uefi_call_wrapper(BS->FreePool, 1, tcg_event);
262
263 if (EFI_ERROR(status))
264 return status;
265
266 return EFI_SUCCESS;
267}
268
269static EFI_TCG * tcg1_interface_check(void) {
270 EFI_GUID tpm_guid = EFI_TCG_PROTOCOL_GUID;
271 EFI_STATUS status;
272 EFI_TCG *tcg;
273 TCG_BOOT_SERVICE_CAPABILITY capability;
274 UINT32 features;
275 EFI_PHYSICAL_ADDRESS event_log_location;
276 EFI_PHYSICAL_ADDRESS event_log_last_entry;
277
278 status = LibLocateProtocol(&tpm_guid, (void **) &tcg);
279
280 if (EFI_ERROR(status))
281 return NULL;
282
283 capability.Size = (UINT8) sizeof(capability);
284 status = uefi_call_wrapper(tcg->StatusCheck, 5, tcg, &capability, &features, &event_log_location, &event_log_last_entry);
285
286 if (EFI_ERROR(status))
287 return NULL;
288
289 if (capability.TPMDeactivatedFlag)
290 return NULL;
291
292 if (!capability.TPMPresentFlag)
293 return NULL;
294
295 return tcg;
296}
297
bfdf8c3b 298static EFI_TCG2 * tcg2_interface_check(EFI_TCG2_BOOT_SERVICE_CAPABILITY *caps) {
92ed3bb4
HH
299 EFI_GUID tpm2_guid = EFI_TCG2_PROTOCOL_GUID;
300 EFI_STATUS status;
301 EFI_TCG2 *tcg;
92ed3bb4
HH
302
303 status = LibLocateProtocol(&tpm2_guid, (void **) &tcg);
304
305 if (EFI_ERROR(status))
306 return NULL;
307
bfdf8c3b
HH
308 caps->Size = (UINT8) sizeof(EFI_TCG2_BOOT_SERVICE_CAPABILITY);
309 status = uefi_call_wrapper(tcg->GetCapability, 2, tcg, caps);
92ed3bb4
HH
310
311 if (EFI_ERROR(status))
312 return NULL;
313
bfdf8c3b
HH
314 if (caps->StructureVersion.Major == 1 &&
315 caps->StructureVersion.Minor == 0) {
316 TCG_BOOT_SERVICE_CAPABILITY *caps_1_0;
317 caps_1_0 = (TCG_BOOT_SERVICE_CAPABILITY *)caps;
318 if (caps_1_0->TPMPresentFlag)
319 return tcg;
320 }
321
322 if (!caps->TPMPresentFlag)
92ed3bb4
HH
323 return NULL;
324
325 return tcg;
326}
327
328EFI_STATUS tpm_log_event(UINT32 pcrindex, const EFI_PHYSICAL_ADDRESS buffer, UINTN buffer_size, const CHAR16 *description) {
329 EFI_TCG *tpm1;
330 EFI_TCG2 *tpm2;
bfdf8c3b
HH
331 EFI_TCG2_BOOT_SERVICE_CAPABILITY caps;
332
333 tpm2 = tcg2_interface_check(&caps);
334 if (tpm2) {
335 EFI_TCG2_EVENT_LOG_BITMAP supported_logs;
336 EFI_TCG2_EVENT_LOG_FORMAT log_fmt;
337
338 if (caps.StructureVersion.Major == 1 &&
339 caps.StructureVersion.Minor == 0)
340 supported_logs = ((TREE_BOOT_SERVICE_CAPABILITY *)&caps)->SupportedEventLogs;
341 else
342 supported_logs = caps.SupportedEventLogs;
343
344 if (supported_logs & EFI_TCG2_EVENT_LOG_FORMAT_TCG_2)
345 log_fmt = EFI_TCG2_EVENT_LOG_FORMAT_TCG_2;
346 else
347 log_fmt = EFI_TCG2_EVENT_LOG_FORMAT_TCG_1_2;
348
bfdf8c3b
HH
349 return tpm2_measure_to_pcr_and_event_log(tpm2, pcrindex, buffer, buffer_size, description, log_fmt);
350 }
92ed3bb4
HH
351
352 tpm1 = tcg1_interface_check();
353 if (tpm1)
354 return tpm1_measure_to_pcr_and_event_log(tpm1, pcrindex, buffer, buffer_size, description);
355
356 /* No active TPM found, so don't return an error */
357 return EFI_SUCCESS;
358}
359
360#endif