Martin L Roth has submitted this change. ( https://review.coreboot.org/c/coreboot/+/81415?usp=email )
Change subject: security/vboot: extract secdata_tpm{1,2}.c ......................................................................
security/vboot: extract secdata_tpm{1,2}.c
Most of the original secdata_tpm.c was TPM2-specific implementation.
Just moving the code around, with trivial tweaks: - drop now unnecessary #ifdef directives from _factory_initialize_tpm() - drop leading underscore from _factory_initialize_tpm{1,2}() (external identifiers should not start with an underscore in C) - drop unused <security/vboot/tpm_common.h> include and sub-includes of tss.h which should be considered its part (so this isn't an indirect inclusion) - fixed formatting of RETURN_ON_FAILURE() which didn't have slashes aligned no matter what tab width was used
Change-Id: I0090b748d7d3b2d76a941b87b5885682fd81c4fc Signed-off-by: Sergii Dmytruk sergii.dmytruk@3mdeb.com Reviewed-on: https://review.coreboot.org/c/coreboot/+/81415 Reviewed-by: Julius Werner jwerner@chromium.org Tested-by: build bot (Jenkins) no-reply@coreboot.org --- M src/security/vboot/Makefile.mk M src/security/vboot/secdata_tpm.c A src/security/vboot/secdata_tpm1.c A src/security/vboot/secdata_tpm2.c A src/security/vboot/secdata_tpm_private.h 5 files changed, 572 insertions(+), 549 deletions(-)
Approvals: build bot (Jenkins): Verified Julius Werner: Looks good to me, approved
diff --git a/src/security/vboot/Makefile.mk b/src/security/vboot/Makefile.mk index 23271ea..48a6c9d 100644 --- a/src/security/vboot/Makefile.mk +++ b/src/security/vboot/Makefile.mk @@ -118,6 +118,14 @@ verstage-y += secdata_tpm.c romstage-y += secdata_tpm.c ramstage-y += secdata_tpm.c + +verstage-$(CONFIG_TPM1) += secdata_tpm1.c +romstage-$(CONFIG_TPM1) += secdata_tpm1.c +ramstage-$(CONFIG_TPM1) += secdata_tpm1.c + +verstage-$(CONFIG_TPM2) += secdata_tpm2.c +romstage-$(CONFIG_TPM2) += secdata_tpm2.c +ramstage-$(CONFIG_TPM2) += secdata_tpm2.c endif
verstage-$(CONFIG_TPM) += tpm_common.c diff --git a/src/security/vboot/secdata_tpm.c b/src/security/vboot/secdata_tpm.c index f60a5e2..8714dd8 100644 --- a/src/security/vboot/secdata_tpm.c +++ b/src/security/vboot/secdata_tpm.c @@ -5,28 +5,12 @@ * stored in the TPM NVRAM. */
-#include <security/vboot/antirollback.h> -#include <security/vboot/tpm_common.h> -#include <security/tpm/tspi.h> -#include <security/tpm/tss.h> -#include <security/tpm/tss/tcg-1.2/tss_structures.h> -#include <security/tpm/tss/tcg-2.0/tss_structures.h> -#include <vb2_api.h> #include <console/console.h> +#include <security/tpm/tspi.h> +#include <security/vboot/antirollback.h> +#include <vb2_api.h>
-#define VBDEBUG(format, args...) \ - printk(BIOS_INFO, "%s():%d: " format, __func__, __LINE__, ## args) - -#define RETURN_ON_FAILURE(tpm_cmd) do { \ - tpm_result_t rc_; \ - if ((rc_ = (tpm_cmd)) != TPM_SUCCESS) { \ - VBDEBUG("Antirollback: %08x returned by " #tpm_cmd \ - "\n", (tpm_result_t)rc_); \ - return rc_; \ - } \ - } while (0) - -static tpm_result_t safe_write(uint32_t index, const void *data, uint32_t length); +#include "secdata_tpm_private.h"
tpm_result_t antirollback_read_space_kernel(struct vb2_context *ctx) { @@ -69,529 +53,7 @@ return TPM_SUCCESS; }
-#if CONFIG(TPM2) - -static tpm_result_t read_space_mrc_hash(uint32_t index, uint8_t *data) -{ - RETURN_ON_FAILURE(tlcl_read(index, data, - HASH_NV_SIZE)); - return TPM_SUCCESS; -} - -/* - * This is used to initialize the TPM space for recovery hash after defining - * it. Since there is no data available to calculate hash at the point where TPM - * space is defined, initialize it to all 0s. - */ -static const uint8_t mrc_hash_data[HASH_NV_SIZE] = { }; - -/* - * Different sets of NVRAM space attributes apply to the "ro" spaces, - * i.e. those which should not be possible to delete or modify once - * the RO exits, and the rest of the NVRAM spaces. - */ -static const TPMA_NV ro_space_attributes = { - .TPMA_NV_PPWRITE = 1, - .TPMA_NV_AUTHREAD = 1, - .TPMA_NV_PPREAD = 1, - .TPMA_NV_PLATFORMCREATE = 1, - .TPMA_NV_WRITE_STCLEAR = 1, - .TPMA_NV_POLICY_DELETE = 1, -}; - -static const TPMA_NV rw_space_attributes = { - .TPMA_NV_PPWRITE = 1, - .TPMA_NV_AUTHREAD = 1, - .TPMA_NV_PPREAD = 1, - .TPMA_NV_PLATFORMCREATE = 1, - .TPMA_NV_WRITE_STCLEAR = 1, -}; - -static const TPMA_NV rw_auth_space_attributes = { - .TPMA_NV_AUTHWRITE = 1, - .TPMA_NV_AUTHREAD = 1, - .TPMA_NV_NO_DA = 1, - .TPMA_NV_PPREAD = 1, - .TPMA_NV_PPWRITE = 1, - .TPMA_NV_PLATFORMCREATE = 1, - .TPMA_NV_WRITE_STCLEAR = 1, - .TPMA_NV_POLICY_DELETE = 1, -}; - -static const TPMA_NV fwmp_attr = { - .TPMA_NV_PLATFORMCREATE = 1, - .TPMA_NV_OWNERWRITE = 1, - .TPMA_NV_AUTHREAD = 1, - .TPMA_NV_PPREAD = 1, - .TPMA_NV_PPWRITE = 1, -}; - -/* Attributes for spaces that enable zero-touch enrollment (ZTE) */ -static const TPMA_NV zte_attr = { - .TPMA_NV_PLATFORMCREATE = 1, - .TPMA_NV_WRITEDEFINE = 1, - .TPMA_NV_AUTHWRITE = 1, - .TPMA_NV_AUTHREAD = 1, - .TPMA_NV_PPWRITE = 1, - .TPMA_NV_PPREAD = 1, - .TPMA_NV_NO_DA = 1, - .TPMA_NV_POLICY_DELETE = 1, -}; - -static const TPMA_NV zte_rma_bytes_attr = { - .TPMA_NV_PLATFORMCREATE = 1, - .TPMA_NV_BITS = 1, - .TPMA_NV_AUTHWRITE = 1, - .TPMA_NV_AUTHREAD = 1, - .TPMA_NV_PPWRITE = 1, - .TPMA_NV_PPREAD = 1, - .TPMA_NV_NO_DA = 1, - .TPMA_NV_POLICY_DELETE = 1, -}; - -static const TPMA_NV rw_orderly_counter_attributes = { - .TPMA_NV_COUNTER = 1, - .TPMA_NV_ORDERLY = 1, - .TPMA_NV_AUTHREAD = 1, - .TPMA_NV_AUTHWRITE = 1, - .TPMA_NV_PLATFORMCREATE = 1, - .TPMA_NV_WRITE_STCLEAR = 1, - .TPMA_NV_PPREAD = 1, - .TPMA_NV_PPWRITE = 1, - .TPMA_NV_NO_DA = 1, -}; - -/* - * This policy digest was obtained using TPM2_PolicyOR on 3 digests - * corresponding to a sequence of - * -) TPM2_PolicyCommandCode(TPM_CC_NV_UndefineSpaceSpecial), - * -) TPM2_PolicyPCR(PCR0, <extended_value>). - * where <extended value> is - * 1) all zeros = initial, unextended state: - * - Value to extend to initial PCR0: - * <none> - * - Resulting PCR0: - * 0000000000000000000000000000000000000000000000000000000000000000 - * - Policy digest for PolicyCommandCode + PolicyPCR: - * 4B44FC4192DB5AD7167E0135708FD374890A06BFB56317DF01F24F2226542A3F - * 2) result of extending (SHA1(0x00|0x01|0x00) | 00s to SHA256 size) - * - Value to extend to initial PCR0: - * 62571891215b4efc1ceab744ce59dd0b66ea6f73000000000000000000000000 - * - Resulting PCR0: - * 9F9EA866D3F34FE3A3112AE9CB1FBABC6FFE8CD261D42493BC6842A9E4F93B3D - * - Policy digest for PolicyCommandCode + PolicyPCR: - * CB5C8014E27A5F7586AAE42DB4F9776A977BCBC952CA61E33609DA2B2C329418 - * 3) result of extending (SHA1(0x01|0x01|0x00) | 00s to SHA256 size) - * - Value to extend to initial PCR0: - * 47ec8d98366433dc002e7721c9e37d5067547937000000000000000000000000 - * - Resulting PCR0: - * 2A7580E5DA289546F4D2E0509CC6DE155EA131818954D36D49E027FD42B8C8F8 - * - Policy digest for PolicyCommandCode + PolicyPCR: - * E6EF4F0296AC3EF0F53906480985B1BE8058E0E517E5F74A5B8A415EFE339D87 - * Values #2 and #3 correspond to two forms of recovery mode as extended by - * vb2api_get_pcr_digest(). - * As a result, the digest allows deleting the space with UndefineSpaceSpecial - * at early RO stages (before extending PCR0) or from recovery mode. - */ -static const uint8_t pcr0_allowed_policy[] = { - 0x44, 0x44, 0x79, 0x00, 0xCB, 0xB8, 0x3F, 0x5B, 0x15, 0x76, 0x56, - 0x50, 0xEF, 0x96, 0x98, 0x0A, 0x2B, 0x96, 0x6E, 0xA9, 0x09, 0x04, - 0x4A, 0x01, 0xB8, 0x5F, 0xA5, 0x4A, 0x96, 0xFC, 0x59, 0x84}; - -static const uint8_t unsatisfiable_policy[VB2_SHA256_DIGEST_SIZE] = - "hmwhat if RBR beat merc in 2021"; - -static uint32_t define_space(const char *name, uint32_t index, uint32_t length, - const TPMA_NV nv_attributes, - const uint8_t *nv_policy, size_t nv_policy_size) -{ - tpm_result_t rc; - - rc = tlcl2_define_space(index, length, nv_attributes, nv_policy, nv_policy_size); - if (rc == TPM_CB_NV_DEFINED) { - /* - * Continue with writing: it may be defined, but not written - * to. In that case a subsequent tlcl_read() would still return - * TPM_BADINDEX on TPM 2.0. The cases when some non-firmware - * space is defined while the firmware space is not there - * should be rare (interrupted initialization), so no big harm - * in writing once again even if it was written already. - */ - VBDEBUG("%s: %s space already exists\n", __func__, name); - rc = TPM_SUCCESS; - } - - return rc; -} - -static tpm_result_t setup_space(const char *name, uint32_t index, const void *data, - uint32_t length, const TPMA_NV nv_attributes, - const uint8_t *nv_policy, size_t nv_policy_size) -{ - tpm_result_t rc; - - rc = define_space(name, index, length, nv_attributes, nv_policy, - nv_policy_size); - if (rc != TPM_SUCCESS) - return rc; - - return safe_write(index, data, length); -} - -static tpm_result_t setup_firmware_space(struct vb2_context *ctx) -{ - uint32_t firmware_space_size = vb2api_secdata_firmware_create(ctx); - - return setup_space("firmware", FIRMWARE_NV_INDEX, - ctx->secdata_firmware, firmware_space_size, - ro_space_attributes, pcr0_allowed_policy, - sizeof(pcr0_allowed_policy)); -} - -static tpm_result_t setup_fwmp_space(struct vb2_context *ctx) -{ - uint32_t fwmp_space_size = vb2api_secdata_fwmp_create(ctx); - - return setup_space("FWMP", FWMP_NV_INDEX, ctx->secdata_fwmp, fwmp_space_size, - fwmp_attr, NULL, 0); -} - -static tpm_result_t setup_kernel_space(struct vb2_context *ctx) -{ - uint32_t kernel_space_size = vb2api_secdata_kernel_create(ctx); - - return setup_space("kernel", KERNEL_NV_INDEX, ctx->secdata_kernel, - kernel_space_size, rw_space_attributes, NULL, 0); -} - -static tpm_result_t set_mrc_hash_space(uint32_t index, const uint8_t *data) -{ - if (index == MRC_REC_HASH_NV_INDEX) { - return setup_space("RO MRC Hash", index, data, HASH_NV_SIZE, - ro_space_attributes, pcr0_allowed_policy, - sizeof(pcr0_allowed_policy)); - } else { - return setup_space("RW MRC Hash", index, data, HASH_NV_SIZE, - rw_space_attributes, NULL, 0); - } -} - -/** - * Set up the Zero-Touch Enrollment(ZTE) related spaces. - * - * These spaces are not used by firmware, but we do need to initialize them. - */ -static tpm_result_t setup_zte_spaces(void) -{ - tpm_result_t rc; - uint64_t rma_bytes_counter_default = 0; - uint8_t rma_sn_bits_default[16]; - uint8_t board_id_default[12]; - - /* Initialize defaults: Board ID and RMA+SN Bits must be initialized - to all 0xFFs. */ - memset(rma_sn_bits_default, 0xFF, ARRAY_SIZE(rma_sn_bits_default)); - memset(board_id_default, 0xFF, ARRAY_SIZE(board_id_default)); - - /* Set up RMA + SN Bits */ - rc = setup_space("RMA + SN Bits", ZTE_RMA_SN_BITS_INDEX, - rma_sn_bits_default, sizeof(rma_sn_bits_default), - zte_attr, - unsatisfiable_policy, sizeof(unsatisfiable_policy)); - if (rc != TPM_SUCCESS) { - VBDEBUG("%s: Failed to set up RMA + SN Bits space with error %#x\n", __func__, rc); - return rc; - } - - rc = setup_space("Board ID", ZTE_BOARD_ID_NV_INDEX, - board_id_default, sizeof(board_id_default), - zte_attr, - unsatisfiable_policy, sizeof(unsatisfiable_policy)); - if (rc != TPM_SUCCESS) { - VBDEBUG("%s: Failed to set up Board ID space with error %#x\n", __func__, rc); - return rc; - } - - /* Set up RMA Bytes counter */ - rc = define_space("RMA Bytes Counter", ZTE_RMA_BYTES_COUNTER_INDEX, - sizeof(rma_bytes_counter_default), - zte_rma_bytes_attr, - unsatisfiable_policy, sizeof(unsatisfiable_policy)); - if (rc != TPM_SUCCESS) { - VBDEBUG("%s: Failed to define RMA Bytes space with error %#x\n", __func__, rc); - return rc; - } - - /* - * Since the RMA counter has the BITS attribute, we need to call - * TPM2_NV_SetBits() in order to initialize it. - */ - rc = tlcl2_set_bits(ZTE_RMA_BYTES_COUNTER_INDEX, rma_bytes_counter_default); - if (rc != TPM_SUCCESS) { - VBDEBUG("%s: Failed to init RMA Bytes counter space wit error %#x\n", - __func__, rc); - return rc; - } - - return rc; -} - -/* - * Set up enterprise rollback space. - * - * This space is not used by firmware but needs to survive owner clear. Thus, it - * needs to be created here. - */ -static tpm_result_t enterprise_rollback_create_space(void) -{ - uint8_t rollback_space_default[32] = {0}; - - return setup_space("Enterprise Rollback Space", - ENT_ROLLBACK_SPACE_INDEX, rollback_space_default, - sizeof(rollback_space_default), rw_auth_space_attributes, - unsatisfiable_policy, sizeof(unsatisfiable_policy)); -} - -static tpm_result_t setup_widevine_counter_spaces(void) -{ - uint32_t index; - tpm_result_t rc; - - for (index = 0; index < NUM_WIDEVINE_COUNTERS; index++) { - rc = define_space(WIDEVINE_COUNTER_NAME, - WIDEVINE_COUNTER_NV_INDEX(index), - WIDEVINE_COUNTER_SIZE, - rw_orderly_counter_attributes, - NULL, - 0); - if (rc != TPM_SUCCESS) - return rc; - } - return rc; -} - -static tpm_result_t _factory_initialize_tpm2(struct vb2_context *ctx) -{ - RETURN_ON_FAILURE(tlcl_force_clear()); - - /* - * Of all NVRAM spaces defined by this function the firmware space - * must be defined last, because its existence is considered an - * indication that TPM factory initialization was successfully - * completed. - */ - RETURN_ON_FAILURE(setup_kernel_space(ctx)); - - /* - * Define and set rec hash space, if available. No need to - * create the RW hash space because we will definitely boot - * once in normal mode before shipping, meaning that the space - * will get created with correct permissions while still in - * our hands. - */ - if (CONFIG(VBOOT_HAS_REC_HASH_SPACE)) - RETURN_ON_FAILURE(set_mrc_hash_space(MRC_REC_HASH_NV_INDEX, mrc_hash_data)); - - /* Define and write firmware management parameters space. */ - RETURN_ON_FAILURE(setup_fwmp_space(ctx)); - - /* - * Define and write zero-touch enrollment (ZTE) spaces. For ChromeOS devices with - * Google TPM, these are set up elsewhere via TPM vendor commands. - */ - if (CONFIG(CHROMEOS) && !(CONFIG(TPM_GOOGLE))) - RETURN_ON_FAILURE(setup_zte_spaces()); - - /* - * On TPM 2.0, create a space that survives TPM clear. This allows to - * securely lock data during enterprise rollback by binding to this - * space's value. - */ - if (CONFIG(CHROMEOS)) - RETURN_ON_FAILURE(enterprise_rollback_create_space()); - - /* Define widevine counter space. No need to increment/write to the secure counters - and are expected to be incremented during the first use. */ - if (CONFIG(VBOOT_DEFINE_WIDEVINE_COUNTERS)) - RETURN_ON_FAILURE(setup_widevine_counter_spaces()); - - RETURN_ON_FAILURE(setup_firmware_space(ctx)); - - return TPM_SUCCESS; -} - -tpm_result_t antirollback_read_space_mrc_hash(uint32_t index, uint8_t *data, uint32_t size) -{ - if (size != HASH_NV_SIZE) { - VBDEBUG("TPM: Incorrect buffer size for hash idx %#x. " - "(Expected=%#x Actual=%#x).\n", index, HASH_NV_SIZE, - size); - return TPM_CB_READ_FAILURE; - } - return read_space_mrc_hash(index, data); -} - -tpm_result_t antirollback_write_space_mrc_hash(uint32_t index, const uint8_t *data, uint32_t size) -{ - uint8_t spc_data[HASH_NV_SIZE]; - tpm_result_t rc; - - if (size != HASH_NV_SIZE) { - VBDEBUG("TPM: Incorrect buffer size for hash idx %#x. " - "(Expected=%#x Actual=%#x).\n", index, HASH_NV_SIZE, - size); - return TPM_CB_WRITE_FAILURE; - } - - rc = read_space_mrc_hash(index, spc_data); - if (rc == TPM_BADINDEX) { - /* - * If space is not defined already for hash, define - * new space. - */ - VBDEBUG("TPM: Initializing hash space.\n"); - return set_mrc_hash_space(index, data); - } - - if (rc != TPM_SUCCESS) - return rc; - - return safe_write(index, data, size); -} - -tpm_result_t antirollback_lock_space_mrc_hash(uint32_t index) -{ - return tlcl2_lock_nv_write(index); -} - -static tpm_result_t read_space_vbios_hash(uint8_t *data) -{ - RETURN_ON_FAILURE(tlcl_read(VBIOS_CACHE_NV_INDEX, data, HASH_NV_SIZE)); - return TPM_SUCCESS; -} - -tpm_result_t antirollback_read_space_vbios_hash(uint8_t *data, uint32_t size) -{ - if (size != HASH_NV_SIZE) { - VBDEBUG("TPM: Incorrect buffer size for hash idx %#x. " - "(Expected=%#x Actual=%#x).\n", VBIOS_CACHE_NV_INDEX, HASH_NV_SIZE, - size); - return TPM_CB_READ_FAILURE; - } - return read_space_vbios_hash(data); -} - -tpm_result_t antirollback_write_space_vbios_hash(const uint8_t *data, uint32_t size) -{ - uint8_t spc_data[HASH_NV_SIZE]; - tpm_result_t rc; - - if (size != HASH_NV_SIZE) { - VBDEBUG("TPM: Incorrect buffer size for hash idx %#x. " - "(Expected=%#x Actual=%#x).\n", VBIOS_CACHE_NV_INDEX, HASH_NV_SIZE, - size); - return TPM_CB_WRITE_FAILURE; - } - - rc = read_space_vbios_hash(spc_data); - if (rc == TPM_BADINDEX) { - /* - * If space is not defined already for hash, define - * new space. - */ - VBDEBUG("TPM: Initializing hash space.\n"); - return setup_space("VBIOS Cache Hash", VBIOS_CACHE_NV_INDEX, data, HASH_NV_SIZE, - rw_space_attributes, NULL, 0); - } - - if (rc != TPM_SUCCESS) - return rc; - - return safe_write(VBIOS_CACHE_NV_INDEX, data, size); -} - -#endif /* CONFIG(TPM2) */ - -#if CONFIG(TPM1) - -/** - * Similarly to safe_write(), this ensures we don't fail a DefineSpace because - * we hit the TPM write limit. This is even less likely to happen than with - * writes because we only define spaces once at initialization, but we'd - * rather be paranoid about this. - */ -static tpm_result_t safe_define_space(uint32_t index, uint32_t perm, uint32_t size) -{ - tpm_result_t rc = tlcl1_define_space(index, perm, size); - if (rc == TPM_MAXNVWRITES) { - RETURN_ON_FAILURE(tpm_clear_and_reenable()); - return tlcl1_define_space(index, perm, size); - } else { - return rc; - } -} - -static tpm_result_t _factory_initialize_tpm1(struct vb2_context *ctx) -{ - TPM_PERMANENT_FLAGS pflags; - tpm_result_t rc; - - vb2api_secdata_firmware_create(ctx); - vb2api_secdata_kernel_create_v0(ctx); - - rc = tlcl1_get_permanent_flags(&pflags); - if (rc != TPM_SUCCESS) - return rc; - - /* - * TPM may come from the factory without physical presence finalized. - * Fix if necessary. - */ - VBDEBUG("TPM: physicalPresenceLifetimeLock=%d\n", - pflags.physicalPresenceLifetimeLock); - if (!pflags.physicalPresenceLifetimeLock) { - VBDEBUG("TPM: Finalizing physical presence\n"); - RETURN_ON_FAILURE(tlcl_finalize_physical_presence()); - } - - /* - * The TPM will not enforce the NV authorization restrictions until the - * execution of a TPM_NV_DefineSpace with the handle of - * TPM_NV_INDEX_LOCK. Here we create that space if it doesn't already - * exist. */ - VBDEBUG("TPM: nvLocked=%d\n", pflags.nvLocked); - if (!pflags.nvLocked) { - VBDEBUG("TPM: Enabling NV locking\n"); - RETURN_ON_FAILURE(tlcl1_set_nv_locked()); - } - - /* Clear TPM owner, in case the TPM is already owned for some reason. */ - VBDEBUG("TPM: Clearing owner\n"); - RETURN_ON_FAILURE(tpm_clear_and_reenable()); - - /* Define and write secdata_kernel space. */ - RETURN_ON_FAILURE(safe_define_space(KERNEL_NV_INDEX, - TPM_NV_PER_PPWRITE, - VB2_SECDATA_KERNEL_SIZE_V02)); - RETURN_ON_FAILURE(safe_write(KERNEL_NV_INDEX, - ctx->secdata_kernel, - VB2_SECDATA_KERNEL_SIZE_V02)); - - /* Define and write secdata_firmware space. */ - RETURN_ON_FAILURE(safe_define_space(FIRMWARE_NV_INDEX, - TPM_NV_PER_GLOBALLOCK | - TPM_NV_PER_PPWRITE, - VB2_SECDATA_FIRMWARE_SIZE)); - RETURN_ON_FAILURE(safe_write(FIRMWARE_NV_INDEX, - ctx->secdata_firmware, - VB2_SECDATA_FIRMWARE_SIZE)); - - return TPM_SUCCESS; -} - -#endif /* CONFIG(TPM1) */ - -static tpm_result_t safe_write(uint32_t index, const void *data, uint32_t length) +tpm_result_t safe_write(uint32_t index, const void *data, uint32_t length) { tpm_result_t rc = tlcl_write(index, data, length); if (tlcl_get_family() == TPM_1 && rc == TPM_MAXNVWRITES) { @@ -609,14 +71,10 @@
static uint32_t _factory_initialize_tpm(struct vb2_context *ctx) { -#if CONFIG(TPM1) if (tlcl_get_family() == TPM_1) - return _factory_initialize_tpm1(ctx); -#endif -#if CONFIG(TPM2) + return factory_initialize_tpm1(ctx); if (tlcl_get_family() == TPM_2) - return _factory_initialize_tpm2(ctx); -#endif + return factory_initialize_tpm2(ctx); return TPM_CB_CORRUPTED_STATE; }
diff --git a/src/security/vboot/secdata_tpm1.c b/src/security/vboot/secdata_tpm1.c new file mode 100644 index 0000000..b66b939 --- /dev/null +++ b/src/security/vboot/secdata_tpm1.c @@ -0,0 +1,83 @@ +/* SPDX-License-Identifier: BSD-3-Clause */ + +#include <security/tpm/tspi.h> +#include <security/tpm/tss.h> +#include <security/vboot/antirollback.h> +#include <vb2_api.h> + +#include "secdata_tpm_private.h" + +/** + * Similarly to safe_write(), this ensures we don't fail a DefineSpace because + * we hit the TPM write limit. This is even less likely to happen than with + * writes because we only define spaces once at initialization, but we'd + * rather be paranoid about this. + */ +static tpm_result_t safe_define_space(uint32_t index, uint32_t perm, uint32_t size) +{ + tpm_result_t rc = tlcl1_define_space(index, perm, size); + if (rc == TPM_MAXNVWRITES) { + RETURN_ON_FAILURE(tpm_clear_and_reenable()); + return tlcl1_define_space(index, perm, size); + } else { + return rc; + } +} + +tpm_result_t factory_initialize_tpm1(struct vb2_context *ctx) +{ + TPM_PERMANENT_FLAGS pflags; + tpm_result_t rc; + + vb2api_secdata_firmware_create(ctx); + vb2api_secdata_kernel_create_v0(ctx); + + rc = tlcl1_get_permanent_flags(&pflags); + if (rc != TPM_SUCCESS) + return rc; + + /* + * TPM may come from the factory without physical presence finalized. + * Fix if necessary. + */ + VBDEBUG("TPM: physicalPresenceLifetimeLock=%d\n", + pflags.physicalPresenceLifetimeLock); + if (!pflags.physicalPresenceLifetimeLock) { + VBDEBUG("TPM: Finalizing physical presence\n"); + RETURN_ON_FAILURE(tlcl_finalize_physical_presence()); + } + + /* + * The TPM will not enforce the NV authorization restrictions until the + * execution of a TPM_NV_DefineSpace with the handle of + * TPM_NV_INDEX_LOCK. Here we create that space if it doesn't already + * exist. */ + VBDEBUG("TPM: nvLocked=%d\n", pflags.nvLocked); + if (!pflags.nvLocked) { + VBDEBUG("TPM: Enabling NV locking\n"); + RETURN_ON_FAILURE(tlcl1_set_nv_locked()); + } + + /* Clear TPM owner, in case the TPM is already owned for some reason. */ + VBDEBUG("TPM: Clearing owner\n"); + RETURN_ON_FAILURE(tpm_clear_and_reenable()); + + /* Define and write secdata_kernel space. */ + RETURN_ON_FAILURE(safe_define_space(KERNEL_NV_INDEX, + TPM_NV_PER_PPWRITE, + VB2_SECDATA_KERNEL_SIZE_V02)); + RETURN_ON_FAILURE(safe_write(KERNEL_NV_INDEX, + ctx->secdata_kernel, + VB2_SECDATA_KERNEL_SIZE_V02)); + + /* Define and write secdata_firmware space. */ + RETURN_ON_FAILURE(safe_define_space(FIRMWARE_NV_INDEX, + TPM_NV_PER_GLOBALLOCK | + TPM_NV_PER_PPWRITE, + VB2_SECDATA_FIRMWARE_SIZE)); + RETURN_ON_FAILURE(safe_write(FIRMWARE_NV_INDEX, + ctx->secdata_firmware, + VB2_SECDATA_FIRMWARE_SIZE)); + + return TPM_SUCCESS; +} diff --git a/src/security/vboot/secdata_tpm2.c b/src/security/vboot/secdata_tpm2.c new file mode 100644 index 0000000..075e481 --- /dev/null +++ b/src/security/vboot/secdata_tpm2.c @@ -0,0 +1,446 @@ +/* SPDX-License-Identifier: BSD-3-Clause */ + +#include <security/vboot/antirollback.h> +#include <security/tpm/tss.h> +#include <vb2_api.h> + +#include "secdata_tpm_private.h" + +static tpm_result_t read_space_mrc_hash(uint32_t index, uint8_t *data) +{ + RETURN_ON_FAILURE(tlcl_read(index, data, + HASH_NV_SIZE)); + return TPM_SUCCESS; +} + +/* + * This is used to initialize the TPM space for recovery hash after defining + * it. Since there is no data available to calculate hash at the point where TPM + * space is defined, initialize it to all 0s. + */ +static const uint8_t mrc_hash_data[HASH_NV_SIZE] = { }; + +/* + * Different sets of NVRAM space attributes apply to the "ro" spaces, + * i.e. those which should not be possible to delete or modify once + * the RO exits, and the rest of the NVRAM spaces. + */ +static const TPMA_NV ro_space_attributes = { + .TPMA_NV_PPWRITE = 1, + .TPMA_NV_AUTHREAD = 1, + .TPMA_NV_PPREAD = 1, + .TPMA_NV_PLATFORMCREATE = 1, + .TPMA_NV_WRITE_STCLEAR = 1, + .TPMA_NV_POLICY_DELETE = 1, +}; + +static const TPMA_NV rw_space_attributes = { + .TPMA_NV_PPWRITE = 1, + .TPMA_NV_AUTHREAD = 1, + .TPMA_NV_PPREAD = 1, + .TPMA_NV_PLATFORMCREATE = 1, + .TPMA_NV_WRITE_STCLEAR = 1, +}; + +static const TPMA_NV rw_auth_space_attributes = { + .TPMA_NV_AUTHWRITE = 1, + .TPMA_NV_AUTHREAD = 1, + .TPMA_NV_NO_DA = 1, + .TPMA_NV_PPREAD = 1, + .TPMA_NV_PPWRITE = 1, + .TPMA_NV_PLATFORMCREATE = 1, + .TPMA_NV_WRITE_STCLEAR = 1, + .TPMA_NV_POLICY_DELETE = 1, +}; + +static const TPMA_NV fwmp_attr = { + .TPMA_NV_PLATFORMCREATE = 1, + .TPMA_NV_OWNERWRITE = 1, + .TPMA_NV_AUTHREAD = 1, + .TPMA_NV_PPREAD = 1, + .TPMA_NV_PPWRITE = 1, +}; + +/* Attributes for spaces that enable zero-touch enrollment (ZTE) */ +static const TPMA_NV zte_attr = { + .TPMA_NV_PLATFORMCREATE = 1, + .TPMA_NV_WRITEDEFINE = 1, + .TPMA_NV_AUTHWRITE = 1, + .TPMA_NV_AUTHREAD = 1, + .TPMA_NV_PPWRITE = 1, + .TPMA_NV_PPREAD = 1, + .TPMA_NV_NO_DA = 1, + .TPMA_NV_POLICY_DELETE = 1, +}; + +static const TPMA_NV zte_rma_bytes_attr = { + .TPMA_NV_PLATFORMCREATE = 1, + .TPMA_NV_BITS = 1, + .TPMA_NV_AUTHWRITE = 1, + .TPMA_NV_AUTHREAD = 1, + .TPMA_NV_PPWRITE = 1, + .TPMA_NV_PPREAD = 1, + .TPMA_NV_NO_DA = 1, + .TPMA_NV_POLICY_DELETE = 1, +}; + +static const TPMA_NV rw_orderly_counter_attributes = { + .TPMA_NV_COUNTER = 1, + .TPMA_NV_ORDERLY = 1, + .TPMA_NV_AUTHREAD = 1, + .TPMA_NV_AUTHWRITE = 1, + .TPMA_NV_PLATFORMCREATE = 1, + .TPMA_NV_WRITE_STCLEAR = 1, + .TPMA_NV_PPREAD = 1, + .TPMA_NV_PPWRITE = 1, + .TPMA_NV_NO_DA = 1, +}; + +/* + * This policy digest was obtained using TPM2_PolicyOR on 3 digests + * corresponding to a sequence of + * -) TPM2_PolicyCommandCode(TPM_CC_NV_UndefineSpaceSpecial), + * -) TPM2_PolicyPCR(PCR0, <extended_value>). + * where <extended value> is + * 1) all zeros = initial, unextended state: + * - Value to extend to initial PCR0: + * <none> + * - Resulting PCR0: + * 0000000000000000000000000000000000000000000000000000000000000000 + * - Policy digest for PolicyCommandCode + PolicyPCR: + * 4B44FC4192DB5AD7167E0135708FD374890A06BFB56317DF01F24F2226542A3F + * 2) result of extending (SHA1(0x00|0x01|0x00) | 00s to SHA256 size) + * - Value to extend to initial PCR0: + * 62571891215b4efc1ceab744ce59dd0b66ea6f73000000000000000000000000 + * - Resulting PCR0: + * 9F9EA866D3F34FE3A3112AE9CB1FBABC6FFE8CD261D42493BC6842A9E4F93B3D + * - Policy digest for PolicyCommandCode + PolicyPCR: + * CB5C8014E27A5F7586AAE42DB4F9776A977BCBC952CA61E33609DA2B2C329418 + * 3) result of extending (SHA1(0x01|0x01|0x00) | 00s to SHA256 size) + * - Value to extend to initial PCR0: + * 47ec8d98366433dc002e7721c9e37d5067547937000000000000000000000000 + * - Resulting PCR0: + * 2A7580E5DA289546F4D2E0509CC6DE155EA131818954D36D49E027FD42B8C8F8 + * - Policy digest for PolicyCommandCode + PolicyPCR: + * E6EF4F0296AC3EF0F53906480985B1BE8058E0E517E5F74A5B8A415EFE339D87 + * Values #2 and #3 correspond to two forms of recovery mode as extended by + * vb2api_get_pcr_digest(). + * As a result, the digest allows deleting the space with UndefineSpaceSpecial + * at early RO stages (before extending PCR0) or from recovery mode. + */ +static const uint8_t pcr0_allowed_policy[] = { + 0x44, 0x44, 0x79, 0x00, 0xCB, 0xB8, 0x3F, 0x5B, 0x15, 0x76, 0x56, + 0x50, 0xEF, 0x96, 0x98, 0x0A, 0x2B, 0x96, 0x6E, 0xA9, 0x09, 0x04, + 0x4A, 0x01, 0xB8, 0x5F, 0xA5, 0x4A, 0x96, 0xFC, 0x59, 0x84}; + +static const uint8_t unsatisfiable_policy[VB2_SHA256_DIGEST_SIZE] = + "hmwhat if RBR beat merc in 2021"; + +static uint32_t define_space(const char *name, uint32_t index, uint32_t length, + const TPMA_NV nv_attributes, + const uint8_t *nv_policy, size_t nv_policy_size) +{ + tpm_result_t rc; + + rc = tlcl2_define_space(index, length, nv_attributes, nv_policy, nv_policy_size); + if (rc == TPM_CB_NV_DEFINED) { + /* + * Continue with writing: it may be defined, but not written + * to. In that case a subsequent tlcl_read() would still return + * TPM_BADINDEX on TPM 2.0. The cases when some non-firmware + * space is defined while the firmware space is not there + * should be rare (interrupted initialization), so no big harm + * in writing once again even if it was written already. + */ + VBDEBUG("%s: %s space already exists\n", __func__, name); + rc = TPM_SUCCESS; + } + + return rc; +} + +static tpm_result_t setup_space(const char *name, uint32_t index, const void *data, + uint32_t length, const TPMA_NV nv_attributes, + const uint8_t *nv_policy, size_t nv_policy_size) +{ + tpm_result_t rc; + + rc = define_space(name, index, length, nv_attributes, nv_policy, + nv_policy_size); + if (rc != TPM_SUCCESS) + return rc; + + return safe_write(index, data, length); +} + +static tpm_result_t setup_firmware_space(struct vb2_context *ctx) +{ + uint32_t firmware_space_size = vb2api_secdata_firmware_create(ctx); + + return setup_space("firmware", FIRMWARE_NV_INDEX, + ctx->secdata_firmware, firmware_space_size, + ro_space_attributes, pcr0_allowed_policy, + sizeof(pcr0_allowed_policy)); +} + +static tpm_result_t setup_fwmp_space(struct vb2_context *ctx) +{ + uint32_t fwmp_space_size = vb2api_secdata_fwmp_create(ctx); + + return setup_space("FWMP", FWMP_NV_INDEX, ctx->secdata_fwmp, fwmp_space_size, + fwmp_attr, NULL, 0); +} + +static tpm_result_t setup_kernel_space(struct vb2_context *ctx) +{ + uint32_t kernel_space_size = vb2api_secdata_kernel_create(ctx); + + return setup_space("kernel", KERNEL_NV_INDEX, ctx->secdata_kernel, + kernel_space_size, rw_space_attributes, NULL, 0); +} + +static tpm_result_t set_mrc_hash_space(uint32_t index, const uint8_t *data) +{ + if (index == MRC_REC_HASH_NV_INDEX) { + return setup_space("RO MRC Hash", index, data, HASH_NV_SIZE, + ro_space_attributes, pcr0_allowed_policy, + sizeof(pcr0_allowed_policy)); + } else { + return setup_space("RW MRC Hash", index, data, HASH_NV_SIZE, + rw_space_attributes, NULL, 0); + } +} + +/** + * Set up the Zero-Touch Enrollment(ZTE) related spaces. + * + * These spaces are not used by firmware, but we do need to initialize them. + */ +static tpm_result_t setup_zte_spaces(void) +{ + tpm_result_t rc; + uint64_t rma_bytes_counter_default = 0; + uint8_t rma_sn_bits_default[16]; + uint8_t board_id_default[12]; + + /* Initialize defaults: Board ID and RMA+SN Bits must be initialized + to all 0xFFs. */ + memset(rma_sn_bits_default, 0xFF, ARRAY_SIZE(rma_sn_bits_default)); + memset(board_id_default, 0xFF, ARRAY_SIZE(board_id_default)); + + /* Set up RMA + SN Bits */ + rc = setup_space("RMA + SN Bits", ZTE_RMA_SN_BITS_INDEX, + rma_sn_bits_default, sizeof(rma_sn_bits_default), + zte_attr, + unsatisfiable_policy, sizeof(unsatisfiable_policy)); + if (rc != TPM_SUCCESS) { + VBDEBUG("%s: Failed to set up RMA + SN Bits space with error %#x\n", __func__, rc); + return rc; + } + + rc = setup_space("Board ID", ZTE_BOARD_ID_NV_INDEX, + board_id_default, sizeof(board_id_default), + zte_attr, + unsatisfiable_policy, sizeof(unsatisfiable_policy)); + if (rc != TPM_SUCCESS) { + VBDEBUG("%s: Failed to set up Board ID space with error %#x\n", __func__, rc); + return rc; + } + + /* Set up RMA Bytes counter */ + rc = define_space("RMA Bytes Counter", ZTE_RMA_BYTES_COUNTER_INDEX, + sizeof(rma_bytes_counter_default), + zte_rma_bytes_attr, + unsatisfiable_policy, sizeof(unsatisfiable_policy)); + if (rc != TPM_SUCCESS) { + VBDEBUG("%s: Failed to define RMA Bytes space with error %#x\n", __func__, rc); + return rc; + } + + /* + * Since the RMA counter has the BITS attribute, we need to call + * TPM2_NV_SetBits() in order to initialize it. + */ + rc = tlcl2_set_bits(ZTE_RMA_BYTES_COUNTER_INDEX, rma_bytes_counter_default); + if (rc != TPM_SUCCESS) { + VBDEBUG("%s: Failed to init RMA Bytes counter space wit error %#x\n", + __func__, rc); + return rc; + } + + return rc; +} + +/* + * Set up enterprise rollback space. + * + * This space is not used by firmware but needs to survive owner clear. Thus, it + * needs to be created here. + */ +static tpm_result_t enterprise_rollback_create_space(void) +{ + uint8_t rollback_space_default[32] = {0}; + + return setup_space("Enterprise Rollback Space", + ENT_ROLLBACK_SPACE_INDEX, rollback_space_default, + sizeof(rollback_space_default), rw_auth_space_attributes, + unsatisfiable_policy, sizeof(unsatisfiable_policy)); +} + +static tpm_result_t setup_widevine_counter_spaces(void) +{ + uint32_t index; + tpm_result_t rc; + + for (index = 0; index < NUM_WIDEVINE_COUNTERS; index++) { + rc = define_space(WIDEVINE_COUNTER_NAME, + WIDEVINE_COUNTER_NV_INDEX(index), + WIDEVINE_COUNTER_SIZE, + rw_orderly_counter_attributes, + NULL, + 0); + if (rc != TPM_SUCCESS) + return rc; + } + return rc; +} + +tpm_result_t factory_initialize_tpm2(struct vb2_context *ctx) +{ + RETURN_ON_FAILURE(tlcl_force_clear()); + + /* + * Of all NVRAM spaces defined by this function the firmware space + * must be defined last, because its existence is considered an + * indication that TPM factory initialization was successfully + * completed. + */ + RETURN_ON_FAILURE(setup_kernel_space(ctx)); + + /* + * Define and set rec hash space, if available. No need to + * create the RW hash space because we will definitely boot + * once in normal mode before shipping, meaning that the space + * will get created with correct permissions while still in + * our hands. + */ + if (CONFIG(VBOOT_HAS_REC_HASH_SPACE)) + RETURN_ON_FAILURE(set_mrc_hash_space(MRC_REC_HASH_NV_INDEX, mrc_hash_data)); + + /* Define and write firmware management parameters space. */ + RETURN_ON_FAILURE(setup_fwmp_space(ctx)); + + /* + * Define and write zero-touch enrollment (ZTE) spaces. For ChromeOS devices with + * Google TPM, these are set up elsewhere via TPM vendor commands. + */ + if (CONFIG(CHROMEOS) && !(CONFIG(TPM_GOOGLE))) + RETURN_ON_FAILURE(setup_zte_spaces()); + + /* + * On TPM 2.0, create a space that survives TPM clear. This allows to + * securely lock data during enterprise rollback by binding to this + * space's value. + */ + if (CONFIG(CHROMEOS)) + RETURN_ON_FAILURE(enterprise_rollback_create_space()); + + /* Define widevine counter space. No need to increment/write to the secure counters + and are expected to be incremented during the first use. */ + if (CONFIG(VBOOT_DEFINE_WIDEVINE_COUNTERS)) + RETURN_ON_FAILURE(setup_widevine_counter_spaces()); + + RETURN_ON_FAILURE(setup_firmware_space(ctx)); + + return TPM_SUCCESS; +} + +tpm_result_t antirollback_read_space_mrc_hash(uint32_t index, uint8_t *data, uint32_t size) +{ + if (size != HASH_NV_SIZE) { + VBDEBUG("TPM: Incorrect buffer size for hash idx %#x. " + "(Expected=%#x Actual=%#x).\n", index, HASH_NV_SIZE, + size); + return TPM_CB_READ_FAILURE; + } + return read_space_mrc_hash(index, data); +} + +tpm_result_t antirollback_write_space_mrc_hash(uint32_t index, const uint8_t *data, uint32_t size) +{ + uint8_t spc_data[HASH_NV_SIZE]; + tpm_result_t rc; + + if (size != HASH_NV_SIZE) { + VBDEBUG("TPM: Incorrect buffer size for hash idx %#x. " + "(Expected=%#x Actual=%#x).\n", index, HASH_NV_SIZE, + size); + return TPM_CB_WRITE_FAILURE; + } + + rc = read_space_mrc_hash(index, spc_data); + if (rc == TPM_BADINDEX) { + /* + * If space is not defined already for hash, define + * new space. + */ + VBDEBUG("TPM: Initializing hash space.\n"); + return set_mrc_hash_space(index, data); + } + + if (rc != TPM_SUCCESS) + return rc; + + return safe_write(index, data, size); +} + +tpm_result_t antirollback_lock_space_mrc_hash(uint32_t index) +{ + return tlcl2_lock_nv_write(index); +} + +static tpm_result_t read_space_vbios_hash(uint8_t *data) +{ + RETURN_ON_FAILURE(tlcl_read(VBIOS_CACHE_NV_INDEX, data, HASH_NV_SIZE)); + return TPM_SUCCESS; +} + +tpm_result_t antirollback_read_space_vbios_hash(uint8_t *data, uint32_t size) +{ + if (size != HASH_NV_SIZE) { + VBDEBUG("TPM: Incorrect buffer size for hash idx %#x. " + "(Expected=%#x Actual=%#x).\n", VBIOS_CACHE_NV_INDEX, HASH_NV_SIZE, + size); + return TPM_CB_READ_FAILURE; + } + return read_space_vbios_hash(data); +} + +tpm_result_t antirollback_write_space_vbios_hash(const uint8_t *data, uint32_t size) +{ + uint8_t spc_data[HASH_NV_SIZE]; + tpm_result_t rc; + + if (size != HASH_NV_SIZE) { + VBDEBUG("TPM: Incorrect buffer size for hash idx %#x. " + "(Expected=%#x Actual=%#x).\n", VBIOS_CACHE_NV_INDEX, HASH_NV_SIZE, + size); + return TPM_CB_WRITE_FAILURE; + } + + rc = read_space_vbios_hash(spc_data); + if (rc == TPM_BADINDEX) { + /* + * If space is not defined already for hash, define + * new space. + */ + VBDEBUG("TPM: Initializing hash space.\n"); + return setup_space("VBIOS Cache Hash", VBIOS_CACHE_NV_INDEX, data, HASH_NV_SIZE, + rw_space_attributes, NULL, 0); + } + + if (rc != TPM_SUCCESS) + return rc; + + return safe_write(VBIOS_CACHE_NV_INDEX, data, size); +} diff --git a/src/security/vboot/secdata_tpm_private.h b/src/security/vboot/secdata_tpm_private.h new file mode 100644 index 0000000..3fce40d --- /dev/null +++ b/src/security/vboot/secdata_tpm_private.h @@ -0,0 +1,28 @@ +/* SPDX-License-Identifier: BSD-3-Clause */ + +#ifndef __VBOOT_SECDATA_TPM_PRIVATE_H__ +#define __VBOOT_SECDATA_TPM_PRIVATE_H__ + +#include <console/console.h> +#include <security/tpm/tis.h> +#include <vb2_api.h> + +#define VBDEBUG(format, args...) \ + printk(BIOS_INFO, "%s():%d: " format, __func__, __LINE__, ## args) + +#define RETURN_ON_FAILURE(tpm_cmd) do { \ + tpm_result_t rc_; \ + if ((rc_ = (tpm_cmd)) != TPM_SUCCESS) { \ + VBDEBUG("Antirollback: %08x returned by " #tpm_cmd "\n", \ + (tpm_result_t)rc_); \ + return rc_; \ + } \ + } while (0) + +tpm_result_t safe_write(uint32_t index, const void *data, uint32_t length); + +tpm_result_t factory_initialize_tpm1(struct vb2_context *ctx); + +tpm_result_t factory_initialize_tpm2(struct vb2_context *ctx); + +#endif /* __VBOOT_SECDATA_TPM_PRIVATE_H__ */