Hello build bot (Jenkins), Patrick Georgi, Martin Roth,
I'd like you to reexamine a change. Please visit
https://review.coreboot.org/c/coreboot/+/37016
to look at the new patch set (#7).
Change subject: security/intel/txt: Add Intel TXT support
......................................................................
security/intel/txt: Add Intel TXT support
* Add TXT ramstage driver
** Show startup errors
** Check for TXT reset
** Check for Secrets-in-memory
** Add assembly for GETSEC instruction
** Check platform state if GETSEC instruction is supported
** Configure TXT memory regions
** Lock TXT
** Protect TSEG using DMA protected regions
** Place SINIT ACM
** Print information about ACMs
* Extend security_clear_dram_request()
** To clear all DRAM if secrets are in memory
Tested on OCP Wedge100s and Facebook Watson
* Able to enter a Measure Launch Environment using SINIT ACM and TBOOT
* Secrets in Memory bit is set on ungraceful shutdown
* Memory is cleared after ungraceful shutdown
Change-Id: Iaf4be7f016cc12d3971e1e1fe171e6665e44c284
Signed-off-by: Philipp Deppenwiese <zaolin.daisuki(a)gmail.com>
Signed-off-by: Philipp Deppenwiese <zaolin(a)das-labor.org>
---
M src/security/intel/txt/Kconfig
M src/security/intel/txt/Makefile.inc
A src/security/intel/txt/common.c
A src/security/intel/txt/getsec.c
A src/security/intel/txt/getsec_enteraccs.S
A src/security/intel/txt/logging.c
A src/security/intel/txt/ramstage.c
A src/security/intel/txt/txt.h
A src/security/intel/txt/txt_getsec.h
A src/security/intel/txt/txt_register.h
M src/security/memory/memory.c
11 files changed, 1,853 insertions(+), 1 deletion(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/16/37016/7
--
To view, visit https://review.coreboot.org/c/coreboot/+/37016
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: Iaf4be7f016cc12d3971e1e1fe171e6665e44c284
Gerrit-Change-Number: 37016
Gerrit-PatchSet: 7
Gerrit-Owner: Philipp Deppenwiese <zaolin.daisuki(a)gmail.com>
Gerrit-Reviewer: Martin Roth <martinroth(a)google.com>
Gerrit-Reviewer: Patrick Georgi <pgeorgi(a)google.com>
Gerrit-Reviewer: Philipp Deppenwiese <zaolin.daisuki(a)gmail.com>
Gerrit-Reviewer: build bot (Jenkins) <no-reply(a)coreboot.org>
Gerrit-CC: Arthur Heymans <arthur(a)aheymans.xyz>
Gerrit-CC: Paul Menzel <paulepanter(a)users.sourceforge.net>
Gerrit-MessageType: newpatchset
Philipp Deppenwiese has posted comments on this change. ( https://review.coreboot.org/c/coreboot/+/37016 )
Change subject: security/intel/txt: Add Intel TXT support
......................................................................
Patch Set 6:
(2 comments)
https://review.coreboot.org/c/coreboot/+/37016/6/src/security/intel/txt/com…
File src/security/intel/txt/common.c:
https://review.coreboot.org/c/coreboot/+/37016/6/src/security/intel/txt/com…
PS6, Line 31: int boot_cpu(void);
> this is defined in <smp/node. […]
Ack
https://review.coreboot.org/c/coreboot/+/37016/6/src/security/intel/txt/com…
PS6, Line 450: msr = rdmsr(LAPIC_BASE_MSR);
> unused
Ack
--
To view, visit https://review.coreboot.org/c/coreboot/+/37016
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: Iaf4be7f016cc12d3971e1e1fe171e6665e44c284
Gerrit-Change-Number: 37016
Gerrit-PatchSet: 6
Gerrit-Owner: Philipp Deppenwiese <zaolin.daisuki(a)gmail.com>
Gerrit-Reviewer: Martin Roth <martinroth(a)google.com>
Gerrit-Reviewer: Patrick Georgi <pgeorgi(a)google.com>
Gerrit-Reviewer: Philipp Deppenwiese <zaolin.daisuki(a)gmail.com>
Gerrit-Reviewer: build bot (Jenkins) <no-reply(a)coreboot.org>
Gerrit-CC: Arthur Heymans <arthur(a)aheymans.xyz>
Gerrit-CC: Paul Menzel <paulepanter(a)users.sourceforge.net>
Gerrit-Comment-Date: Wed, 08 Jul 2020 21:05:06 +0000
Gerrit-HasComments: Yes
Gerrit-Has-Labels: No
Comment-In-Reply-To: Arthur Heymans <arthur(a)aheymans.xyz>
Gerrit-MessageType: comment
Martin Roth has uploaded this change for review. ( https://review.coreboot.org/c/coreboot/+/42810 )
Change subject: soc/amd/picasso: Halt if workbuf is absent after psp_verstage
......................................................................
soc/amd/picasso: Halt if workbuf is absent after psp_verstage
Check for the workbuf in bootblock if psp_verstage is being used.
BUG=b:158124527
TEST=Build & boot Trembyle with psp_verstage
Signed-off-by: Martin Roth <martin(a)coreboot.org>
Change-Id: I0ec8d2c953bce4c44cde5102d2765e0ab9b5875e
---
M src/soc/amd/picasso/bootblock/bootblock.c
1 file changed, 17 insertions(+), 0 deletions(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/10/42810/1
diff --git a/src/soc/amd/picasso/bootblock/bootblock.c b/src/soc/amd/picasso/bootblock/bootblock.c
index a3935cc..f633767 100644
--- a/src/soc/amd/picasso/bootblock/bootblock.c
+++ b/src/soc/amd/picasso/bootblock/bootblock.c
@@ -14,6 +14,11 @@
#include <amdblocks/amd_pci_mmconf.h>
#include <acpi/acpi.h>
+/* vboot includes directory may bot be in include path if vboot is not enabled */
+#if CONFIG(VBOOT_STARTS_BEFORE_BOOTBLOCK)
+#include <2struct.h>
+#endif
+
asmlinkage void bootblock_resume_entry(void);
/* PSP performs the memory training and setting up DRAM map prior to x86 cores
@@ -123,5 +128,17 @@
u32 val = cpuid_eax(1);
printk(BIOS_DEBUG, "Family_Model: %08x\n", val);
+#if CONFIG(VBOOT_STARTS_BEFORE_BOOTBLOCK)
+#include <2struct.h>
+ unsigned int *workbuf_location = (unsigned int *)CONFIG_PSP_SHAREDMEM_BASE;
+ if (*workbuf_location != VB2_SHARED_DATA_MAGIC) {
+ printk(BIOS_ERR,"ERROR: VBOOT workbuf not valid.\n");
+
+ printk(BIOS_DEBUG,"Signature: %#08x\n",*workbuf_location);
+
+ die("Halting.\n");
+ }
+#endif
+
fch_early_init();
}
--
To view, visit https://review.coreboot.org/c/coreboot/+/42810
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: I0ec8d2c953bce4c44cde5102d2765e0ab9b5875e
Gerrit-Change-Number: 42810
Gerrit-PatchSet: 1
Gerrit-Owner: Martin Roth <martinroth(a)google.com>
Gerrit-MessageType: newchange
Martin Roth has uploaded this change for review. ( https://review.coreboot.org/c/coreboot/+/42822 )
Change subject: security/vboot: Allow files to go into only RW-A or RW-B region
......................................................................
security/vboot: Allow files to go into only RW-A or RW-B region
The AMD firmware package created by amdfwtool contains pointers to the
various binaries and settings. This means that we need different copies
of the package in each region.
This change allows for the different files in each of the 3 vboot
regions.
BUG=b:158124527
TEST=Build trembyle; see the correct versions of the files getting
built into the RW-A & RW-B regions.
Signed-off-by: Martin Roth <martin(a)coreboot.org>
Change-Id: I45ff69dbc2266a67e05597bbe721fbf95cf41777
---
M src/security/vboot/Kconfig
M src/security/vboot/Makefile.inc
2 files changed, 26 insertions(+), 3 deletions(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/22/42822/1
diff --git a/src/security/vboot/Kconfig b/src/security/vboot/Kconfig
index ad5b61e..ee8d36a 100644
--- a/src/security/vboot/Kconfig
+++ b/src/security/vboot/Kconfig
@@ -218,6 +218,22 @@
Add a space delimited list of filenames that should only be in the
RW sections.
+config RWA_REGION_ONLY
+ string
+ default ""
+ depends on VBOOT_SLOTS_RW_AB
+ help
+ Add a space-delimited list of filenames that should only be in the
+ RW-A section.
+
+config RWB_REGION_ONLY
+ string
+ default ""
+ depends on VBOOT_SLOTS_RW_AB
+ help
+ Add a space-delimited list of filenames that should only be in the
+ RW-B section.
+
config VBOOT_ENABLE_CBFS_FALLBACK
bool
default n
diff --git a/src/security/vboot/Makefile.inc b/src/security/vboot/Makefile.inc
index 1e0166e..90b2756 100644
--- a/src/security/vboot/Makefile.inc
+++ b/src/security/vboot/Makefile.inc
@@ -165,8 +165,9 @@
endif
# Return the regions a specific file should be placed in. The files listed below and the ones
-# that are specified in CONFIG_RO_REGION_ONLY are only specified in the RO region. The files
-# specified in the CONFIG_RW_REGION_ONLY are only placed in the RW regions.
+# that are specified in CONFIG_RO_REGION_ONLY, are only specified in the RO region. The files
+# specified in the CONFIG_RW_REGION_ONLY are placed in all RW regions. Files specified
+# in CONFIG_RWA_REGION_ONLY or CONFIG_RWB_REGION_ONLY get placed only in those sections.
# All other files will be installed into RO and RW regions
# Use $(sort) to cut down on extra spaces that would be translated to commas
regions-for-file = $(subst $(spc),$(comma),$(sort \
@@ -185,9 +186,15 @@
$(call strip_quotes,$(CONFIG_RO_REGION_ONLY)) \
,$(1)),COREBOOT,\
$(if $(filter \
+ $(call strip_quotes,$(CONFIG_RWA_REGION_ONLY)) \
+ ,$(1)), FW_MAIN_A, \
+ $(if $(filter \
+ $(call strip_quotes,$(CONFIG_RWB_REGION_ONLY)) \
+ ,$(1)), FW_MAIN_B, \
+ $(if $(filter \
$(call strip_quotes,$(CONFIG_RW_REGION_ONLY)) \
,$(1)), $(RW_PARTITIONS), $(VBOOT_PARTITIONS) ) \
- )))
+ )))))
CONFIG_GBB_HWID := $(call strip_quotes,$(CONFIG_GBB_HWID))
CONFIG_GBB_BMPFV_FILE := $(call strip_quotes,$(CONFIG_GBB_BMPFV_FILE))
--
To view, visit https://review.coreboot.org/c/coreboot/+/42822
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: I45ff69dbc2266a67e05597bbe721fbf95cf41777
Gerrit-Change-Number: 42822
Gerrit-PatchSet: 1
Gerrit-Owner: Martin Roth <martinroth(a)google.com>
Gerrit-Reviewer: Aaron Durbin <adurbin(a)chromium.org>
Gerrit-Reviewer: Patrick Georgi <pgeorgi(a)google.com>
Gerrit-MessageType: newchange