summaryrefslogtreecommitdiff
path: root/src/security/vboot/vbios_cache_hash_tpm.c
diff options
context:
space:
mode:
authorMatt DeVillier <matt.devillier@amd.corp-partner.google.com>2023-01-23 18:31:27 -0600
committerFelix Held <felix-coreboot@felixheld.de>2023-02-13 14:56:22 +0000
commit9ce755d05ed56753105bce6f4d75f4ddbc98cb26 (patch)
tree57ad7bc451400be69796046505c8fb660ff67053 /src/security/vboot/vbios_cache_hash_tpm.c
parente47d9fd3b6cf23b0d98bdcd2a8176cefa4c5f089 (diff)
security/vboot: Add store/validate methods for AMD VBIOS FMAP cache
Add methods to store and retrieve the hash of the data stored in the VBIOS cache FMAP region. Add a dedicated index in TPM NVRAM to store the hash, and methods to calculate/read/write it. Modeled after mrc_cache_hash_tpm.{c,h} BUG=b:255812886 TEST=tested with rest of patch train Change-Id: I030017d3bf956b8593bc09073ad6545b80a5b52b Signed-off-by: Matt DeVillier <matt.devillier@amd.corp-partner.google.com> Reviewed-on: https://review.coreboot.org/c/coreboot/+/72401 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Martin L Roth <gaumless@gmail.com>
Diffstat (limited to 'src/security/vboot/vbios_cache_hash_tpm.c')
-rw-r--r--src/security/vboot/vbios_cache_hash_tpm.c75
1 files changed, 75 insertions, 0 deletions
diff --git a/src/security/vboot/vbios_cache_hash_tpm.c b/src/security/vboot/vbios_cache_hash_tpm.c
new file mode 100644
index 0000000000..aa54f19e4c
--- /dev/null
+++ b/src/security/vboot/vbios_cache_hash_tpm.c
@@ -0,0 +1,75 @@
+/* SPDX-License-Identifier: GPL-2.0-only */
+
+#include <security/vboot/antirollback.h>
+#include <program_loading.h>
+#include <vb2_api.h>
+#include <security/tpm/tss.h>
+#include <security/vboot/misc.h>
+#include <security/vboot/vbios_cache_hash_tpm.h>
+#include <console/console.h>
+#include <string.h>
+
+void vbios_cache_update_hash(const uint8_t *data, size_t size)
+{
+ struct vb2_hash hash;
+
+ /* Initialize TPM driver. */
+ if (tlcl_lib_init() != VB2_SUCCESS) {
+ printk(BIOS_ERR, "VBIOS_CACHE: TPM driver initialization failed.\n");
+ return;
+ }
+
+ /* Calculate hash of vbios data. */
+ if (vb2_hash_calculate(vboot_hwcrypto_allowed(), data, size,
+ VB2_HASH_SHA256, &hash)) {
+ printk(BIOS_ERR, "VBIOS_CACHE: SHA-256 calculation failed for data; "
+ "clearing TPM hash space.\n");
+ /*
+ * Since data is being updated in vbios cache, the hash
+ * currently stored in TPM hash space is no longer
+ * valid. If we are not able to calculate hash of the
+ * data being updated, reset all the bits in TPM hash
+ * space to zero to invalidate it.
+ */
+ memset(hash.raw, 0, VB2_SHA256_DIGEST_SIZE);
+ }
+
+ /* Write hash of data to TPM space. */
+ if (antirollback_write_space_vbios_hash(hash.sha256, sizeof(hash.sha256))
+ != TPM_SUCCESS) {
+ printk(BIOS_ERR, "VBIOS_CACHE: Could not save hash to TPM.\n");
+ return;
+ }
+
+ printk(BIOS_INFO, "VBIOS_CACHE: TPM NV idx 0x%x updated successfully.\n",
+ VBIOS_CACHE_NV_INDEX);
+}
+
+enum cb_err vbios_cache_verify_hash(const uint8_t *data, size_t size)
+{
+ struct vb2_hash tpm_hash = { .algo = VB2_HASH_SHA256 };
+
+ /* Initialize TPM driver. */
+ if (tlcl_lib_init() != VB2_SUCCESS) {
+ printk(BIOS_ERR, "VBIOS_CACHE: TPM driver initialization failed.\n");
+ return CB_ERR;
+ }
+
+ /* Read hash of VBIOS data saved in TPM. */
+ if (antirollback_read_space_vbios_hash(tpm_hash.sha256, sizeof(tpm_hash.sha256))
+ != TPM_SUCCESS) {
+ printk(BIOS_ERR, "VBIOS_CACHE: Could not read hash from TPM.\n");
+ return CB_ERR;
+ }
+
+ /* Calculate hash of data read from VBIOS FMAP CACHE and compare. */
+ if (vb2_hash_verify(vboot_hwcrypto_allowed(), data, size, &tpm_hash)) {
+ printk(BIOS_ERR, "VBIOS_CACHE: Hash comparison failed.\n");
+ return CB_ERR;
+ }
+
+ printk(BIOS_INFO, "VBIOS_CACHE: Hash idx 0x%x comparison successful.\n",
+ VBIOS_CACHE_NV_INDEX);
+
+ return CB_SUCCESS;
+}