blob: 81d2dd1083e8792abdf846705101af130094f6fa [file] [log] [blame]
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +01001/* SPDX-License-Identifier: GPL-2.0-only */
2
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +01003#include <acpi/acpi.h>
Angel Pons52082be2020-10-05 12:34:29 +02004#include <arch/mmio.h>
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +01005#include <bootmem.h>
Angel Pons52082be2020-10-05 12:34:29 +02006#include <bootstate.h>
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +01007#include <cbfs.h>
Angel Pons52082be2020-10-05 12:34:29 +02008#include <console/console.h>
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +01009#include <cpu/intel/common/common.h>
10#include <cpu/x86/msr.h>
Angel Pons11334722020-10-05 16:34:03 +020011#include <cpu/x86/smm.h>
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +010012#include <device/pci_ops.h>
Angel Pons52082be2020-10-05 12:34:29 +020013#include <types.h>
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +010014
15#include "txt.h"
Angel Ponsffbb4b22020-10-15 23:25:58 +020016#include "txt_platform.h"
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +010017#include "txt_register.h"
18#include "txt_getsec.h"
19
20/* FIXME: Seems to work only on some platforms */
21static void log_ibb_measurements(void)
22{
23 const uint64_t mseg_size = read64((void *)TXT_MSEG_SIZE);
24 uint64_t mseg_base = read64((void *)TXT_MSEG_BASE);
25
26 if (!mseg_size || !mseg_base || mseg_size <= mseg_base)
27 return;
28 /*
29 * MSEG SIZE and MSEG BASE might contain random values.
30 * Assume below 4GiB and 8byte aligned.
31 */
32 if (mseg_base & ~0xfffffff8ULL || mseg_size & ~0xfffffff8ULL)
33 return;
34
35 printk(BIOS_INFO, "TEE-TXT: IBB Hash 0x");
36 for (; mseg_base < mseg_size; mseg_base++)
37 printk(BIOS_INFO, "%02X", read8((void *)(uintptr_t)mseg_base));
38
39 printk(BIOS_INFO, "\n");
40}
41
42void bootmem_platform_add_ranges(void)
43{
44 uint64_t status = read64((void *)TXT_SPAD);
45
46 if (status & ACMSTS_TXT_DISABLED)
47 return;
48
49 /* Chapter 5.5.5 Intel TXT reserved memory */
50 bootmem_add_range(TXT_RESERVED_SPACE,
51 TXT_RESERVED_SPACE_SIZE,
52 BM_MEM_RESERVED);
53
54 /* Intel TPM decode memory */
55 bootmem_add_range(TXT_TPM_DECODE_AREA,
56 TXT_RESERVED_SPACE - TXT_TPM_DECODE_AREA,
57 BM_MEM_RESERVED);
58
59 /* Intel TXT public space memory */
60 bootmem_add_range(TXT_PUBLIC_SPACE,
61 TXT_TPM_DECODE_AREA - TXT_PUBLIC_SPACE,
62 BM_MEM_RESERVED);
63
64 /* Intel TXT private space memory */
65 bootmem_add_range(TXT_PRIVATE_SPACE,
66 TXT_PUBLIC_SPACE - TXT_PRIVATE_SPACE,
67 BM_MEM_RESERVED);
68
Angel Pons463e44b2020-10-05 13:58:16 +020069 const union dpr_register dpr = {
70 .raw = read32((void *)TXT_DPR),
71 };
72
73 const uint32_t dpr_base = dpr.top - dpr.size * MiB;
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +010074
75 /* Chapter 5.5.6 Intel TXT Device Memory */
Angel Pons463e44b2020-10-05 13:58:16 +020076 bootmem_add_range(dpr_base, dpr.size * MiB, BM_MEM_RESERVED);
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +010077}
78
79static bool get_wake_error_status(void)
80{
81 const uint8_t error = read8((void *)TXT_ESTS);
82 return !!(error & TXT_ESTS_WAKE_ERROR_STS);
83}
84
85static void check_secrets_txt(void *unused)
86{
87 uint64_t status = read64((void *)TXT_SPAD);
88
89 if (status & ACMSTS_TXT_DISABLED)
90 return;
91
92 /* Check for fatal ACM error and TXT reset */
93 if (get_wake_error_status()) {
94 /*
95 * Check if secrets bit needs to be reset. Only platforms that support
96 * CONFIG(PLATFORM_HAS_DRAM_CLEAR) will be able to run this code.
97 * Assume all memory really was cleared.
98 *
99 * TXT will issue a platform reset to come up sober.
100 */
101 if (intel_txt_memory_has_secrets()) {
102 printk(BIOS_INFO, "TEE-TXT: Wiping TEE...\n");
103 intel_txt_run_bios_acm(ACMINPUT_CLEAR_SECRETS);
104
105 /* Should never reach this point ... */
106 intel_txt_log_acm_error(read32((void *)TXT_BIOSACM_ERRORCODE));
107 die("Waiting for platform reset...\n");
108 }
109 }
110}
111
112BOOT_STATE_INIT_ENTRY(BS_POST_DEVICE, BS_ON_ENTRY, check_secrets_txt, NULL);
113
114/**
115 * Log TXT startup errors, check all bits for TXT, run BIOSACM using
116 * GETSEC[ENTERACCS].
117 *
118 * If a "TXT reset" is detected or "memory had secrets" is set, then do nothing as
119 * 1. Running ACMs will cause a TXT-RESET
120 * 2. Memory will be scrubbed in BS_DEV_INIT
121 * 3. TXT-RESET will be issued by code above later
122 *
123 */
124static void init_intel_txt(void *unused)
125{
126 const uint64_t status = read64((void *)TXT_SPAD);
127
128 if (status & ACMSTS_TXT_DISABLED)
129 return;
130
131 printk(BIOS_INFO, "TEE-TXT: Initializing TEE...\n");
132
133 intel_txt_log_spad();
134
135 if (CONFIG(INTEL_TXT_LOGGING)) {
136 intel_txt_log_bios_acm_error();
137 txt_dump_chipset_info();
138 }
139
140 printk(BIOS_INFO, "TEE-TXT: Validate TEE...\n");
141
142 if (intel_txt_prepare_txt_env()) {
143 printk(BIOS_ERR, "TEE-TXT: Failed to prepare TXT environment\n");
144 return;
145 }
146
147 /* Check for fatal ACM error and TXT reset */
148 if (get_wake_error_status()) {
149 /* Can't run ACMs with TXT_ESTS_WAKE_ERROR_STS set */
150 printk(BIOS_ERR, "TEE-TXT: Fatal BIOS ACM error reported\n");
151 return;
152 }
153
Angel Pons8a285fd82020-10-16 10:49:12 +0200154 if (CONFIG(INTEL_TXT_TEST_BIOS_ACM_CALLING_CODE)) {
155 printk(BIOS_INFO, "TEE-TXT: Testing BIOS ACM calling code...\n");
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +0100156
Angel Pons8a285fd82020-10-16 10:49:12 +0200157 /*
158 * Test BIOS ACM code.
159 * ACM should do nothing on reserved functions, and return an error code
160 * in TXT_BIOSACM_ERRORCODE. Tests showed that this is not true.
161 * Use special function "NOP" that does 'nothing'.
162 */
163 if (intel_txt_run_bios_acm(ACMINPUT_NOP) < 0) {
164 printk(BIOS_ERR,
165 "TEE-TXT: Error calling BIOS ACM with NOP function.\n");
166 return;
167 }
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +0100168 }
169
170 if (status & (ACMSTS_BIOS_TRUSTED | ACMSTS_IBB_MEASURED)) {
Angel Ponse70a3f82020-10-16 10:58:57 +0200171 printk(BIOS_INFO, "TEE-TXT: Logging IBB measurements...\n");
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +0100172 log_ibb_measurements();
Angel Ponse70a3f82020-10-16 10:58:57 +0200173 }
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +0100174
Angel Ponse70a3f82020-10-16 10:58:57 +0200175 int s3resume = acpi_is_wakeup_s3();
176 if (!s3resume) {
177 printk(BIOS_INFO, "TEE-TXT: Scheck...\n");
178 if (intel_txt_run_bios_acm(ACMINPUT_SCHECK) < 0) {
179 printk(BIOS_ERR, "TEE-TXT: Error calling BIOS ACM.\n");
180 return;
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +0100181 }
182 }
183}
184
185BOOT_STATE_INIT_ENTRY(BS_DEV_INIT, BS_ON_EXIT, init_intel_txt, NULL);
186
187static void push_sinit_heap(u8 **heap_ptr, void *data, size_t data_length)
188{
189 /* Push size */
190 const uint64_t tmp = data_length + 8;
191 memcpy(*heap_ptr, &tmp, 8);
192 *heap_ptr += 8;
193
194 if (data_length) {
195 /* Push data */
196 memcpy(*heap_ptr, data, data_length);
197 *heap_ptr += data_length;
198 }
199}
200
Angel Pons8f7e2a32020-10-16 01:07:18 +0200201static void txt_initialize_heap(void)
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +0100202{
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +0100203 /*
204 * BIOS Data Format
205 * Chapter C.2
206 * Intel TXT Software Development Guide (Document: 315168-015)
207 */
208 struct {
209 struct txt_biosdataregion bdr;
Angel Pons08de7d62020-10-16 01:01:14 +0200210 struct txt_bios_spec_ver_element spec;
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +0100211 struct txt_heap_acm_element heap_acm;
212 struct txt_extended_data_element_header end;
213 } __packed data = {0};
214
215 /* TPM2.0 requires version 6 of BDT */
216 if (CONFIG(TPM2))
217 data.bdr.version = 6;
218 else
219 data.bdr.version = 5;
220
221 data.bdr.no_logical_procs = dev_count_cpu();
222
223 void *sinit_base = (void *)(uintptr_t)read64((void *)TXT_SINIT_BASE);
Julius Werner834b3ec2020-03-04 16:52:08 -0800224 data.bdr.bios_sinit_size = cbfs_load(CONFIG_INTEL_TXT_CBFS_SINIT_ACM,
225 sinit_base,
226 read64((void *)TXT_SINIT_SIZE));
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +0100227
228 if (data.bdr.bios_sinit_size) {
229 printk(BIOS_INFO, "TEE-TXT: Placing SINIT ACM in memory.\n");
230 if (CONFIG(INTEL_TXT_LOGGING))
231 txt_dump_acm_info(sinit_base);
232 } else {
233 printk(BIOS_ERR, "TEE-TXT: Couldn't locate SINIT ACM in CBFS.\n");
234 /* Clear memory */
235 memset(sinit_base, 0, read64((void *)TXT_SINIT_SIZE));
236 }
237
238 struct cbfsf file;
239 /* The following have been removed from BIOS Data Table in version 6 */
240 if (!cbfs_boot_locate(&file, CONFIG_INTEL_TXT_CBFS_BIOS_POLICY, NULL)) {
241 struct region_device policy;
242
243 cbfs_file_data(&policy, &file);
244 void *policy_data = rdev_mmap_full(&policy);
245 size_t policy_len = region_device_sz(&policy);
246
247 if (policy_data && policy_len) {
248 /* Point to FIT Type 9 entry in flash */
249 data.bdr.lcp_pd_base = (uintptr_t)policy_data;
250 data.bdr.lcp_pd_size = (uint64_t)policy_len;
251 rdev_munmap(&policy, policy_data);
252 } else {
253 printk(BIOS_ERR, "TEE-TXT: Couldn't map LCP PD Policy from CBFS.\n");
254 }
255 } else {
256 printk(BIOS_ERR, "TEE-TXT: Couldn't locate LCP PD Policy in CBFS.\n");
257 }
258
259 data.bdr.support_acpi_ppi = 0;
260 data.bdr.platform_type = 0;
261
Angel Pons08de7d62020-10-16 01:01:14 +0200262 /* Fill in the version of the used TXT BIOS Specification */
263 data.spec.header.type = HEAP_EXTDATA_TYPE_BIOS_SPEC_VER;
264 data.spec.header.size = sizeof(data.spec);
265 data.spec.ver_major = 2;
266 data.spec.ver_minor = 1;
267 data.spec.ver_revision = 0;
268
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +0100269 /* Extended elements - ACM addresses */
270 data.heap_acm.header.type = HEAP_EXTDATA_TYPE_ACM;
271 data.heap_acm.header.size = sizeof(data.heap_acm);
272 if (data.bdr.bios_sinit_size) {
273 data.heap_acm.num_acms = 2;
274 data.heap_acm.acm_addrs[1] = (uintptr_t)sinit_base;
275 } else {
276 data.heap_acm.num_acms = 1;
277 }
278 data.heap_acm.acm_addrs[0] =
Julius Werner834b3ec2020-03-04 16:52:08 -0800279 (uintptr_t)cbfs_map(CONFIG_INTEL_TXT_CBFS_BIOS_ACM, NULL);
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +0100280 /* Extended elements - End marker */
281 data.end.type = HEAP_EXTDATA_TYPE_END;
282 data.end.size = sizeof(data.end);
283
284 /* Fill TXT.HEAP.BASE with 4 subregions */
285 u8 *heap_struct = (void *)((uintptr_t)read64((void *)TXT_HEAP_BASE));
286
287 /* BiosData */
288 push_sinit_heap(&heap_struct, &data, sizeof(data));
289
290 /* OsMLEData */
291 /* FIXME: Does firmware need to write this? */
292 push_sinit_heap(&heap_struct, NULL, 0);
293
294 /* OsSinitData */
295 /* FIXME: Does firmware need to write this? */
296 push_sinit_heap(&heap_struct, NULL, 0);
297
298 /* SinitMLEData */
299 /* FIXME: Does firmware need to write this? */
300 push_sinit_heap(&heap_struct, NULL, 0);
Angel Pons8f7e2a32020-10-16 01:07:18 +0200301}
302
303/**
304 * Finalize the TXT device.
305 *
306 * - Lock TXT register.
307 * - Protect TSEG using DMA protected regions.
308 * - Setup TXT regions.
309 * - Place SINIT ACM in TXT_SINIT memory segment.
310 * - Fill TXT BIOSDATA region.
311 */
312static void lockdown_intel_txt(void *unused)
313{
314 const uint64_t status = read64((void *)TXT_SPAD);
315
Angel Pons6c4028d2020-10-16 11:52:40 +0200316 uint32_t txt_feature_flags = 0;
Angel Pons8f7e2a32020-10-16 01:07:18 +0200317 uintptr_t tseg_base;
318 size_t tseg_size;
319
320 smm_region(&tseg_base, &tseg_size);
321
322 if (status & ACMSTS_TXT_DISABLED)
323 return;
324
Angel Pons6c4028d2020-10-16 11:52:40 +0200325 /*
326 * Document Number: 558294
327 * Chapter 5.4.3 Detection of Intel TXT Capability
328 */
Angel Pons8f7e2a32020-10-16 01:07:18 +0200329
Angel Pons6c4028d2020-10-16 11:52:40 +0200330 if (!getsec_parameter(NULL, NULL, NULL, NULL, NULL, &txt_feature_flags))
Angel Pons8f7e2a32020-10-16 01:07:18 +0200331 return;
Angel Pons6c4028d2020-10-16 11:52:40 +0200332
333 /* LockConfig only exists on Intel TXT for Servers */
334 if (txt_feature_flags & GETSEC_PARAMS_TXT_EXT_CRTM_SUPPORT) {
335 printk(BIOS_INFO, "TEE-TXT: Locking TEE...\n");
336
337 /* Lock TXT config, unlocks TXT_HEAP_BASE */
338 if (intel_txt_run_bios_acm(ACMINPUT_LOCK_CONFIG) < 0) {
339 printk(BIOS_ERR, "TEE-TXT: Failed to lock registers.\n");
340 printk(BIOS_ERR, "TEE-TXT: SINIT won't be supported.\n");
341 return;
342 }
Angel Pons8f7e2a32020-10-16 01:07:18 +0200343 }
344
345 /*
346 * Document Number: 558294
347 * Chapter 5.5.6.1 DMA Protection Memory Region
348 */
349
350 const u8 dpr_capable = !!(read64((void *)TXT_CAPABILITIES) &
351 TXT_CAPABILITIES_DPR);
352 printk(BIOS_INFO, "TEE-TXT: DPR capable %x\n", dpr_capable);
353
354 if (dpr_capable) {
355 /* Verify the DPR settings on the MCH and mirror them to TXT public space */
356 union dpr_register dpr = txt_get_chipset_dpr();
357
358 printk(BIOS_DEBUG, "TEE-TXT: MCH DPR 0x%08x\n", dpr.raw);
359
360 printk(BIOS_DEBUG, "TEE-TXT: MCH DPR base @ 0x%08x size %u MiB\n",
361 (dpr.top - dpr.size) * MiB, dpr.size);
362
363 // DPR TODO: implement SA_ENABLE_DPR in the intelblocks
364
365 if (!dpr.lock) {
366 printk(BIOS_ERR, "TEE-TXT: MCH DPR not locked.\n");
367 return;
368 }
369
370 if (!dpr.epm || !dpr.prs) {
371 printk(BIOS_ERR, "TEE-TXT: MCH DPR protection not active.\n");
372 return;
373 }
374
375 if (dpr.size < CONFIG_INTEL_TXT_DPR_SIZE) {
376 printk(BIOS_ERR, "TEE-TXT: MCH DPR configured size is too small.\n");
377 return;
378 }
379
380 if (dpr.top * MiB != tseg_base) {
381 printk(BIOS_ERR, "TEE-TXT: MCH DPR top does not equal TSEG base.\n");
382 return;
383 }
384
385 /* Clear reserved bits */
386 dpr.prs = 0;
387 dpr.epm = 0;
388
389 write64((void *)TXT_DPR, dpr.raw);
390
391 printk(BIOS_INFO, "TEE-TXT: TXT.DPR 0x%08x\n",
392 read32((void *)TXT_DPR));
393 }
394
395 /*
396 * Document Number: 558294
397 * Chapter 5.5.6.3 Intel TXT Heap Memory Region
398 */
399 write64((void *)TXT_HEAP_SIZE, 0xE0000);
400 write64((void *)TXT_HEAP_BASE,
401 ALIGN_DOWN(tseg_base - read64((void *)TXT_HEAP_SIZE), 4096));
402
403 /*
404 * Document Number: 558294
405 * Chapter 5.5.6.2 SINIT Memory Region
406 */
407 write64((void *)TXT_SINIT_SIZE, 0x20000);
408 write64((void *)TXT_SINIT_BASE,
409 ALIGN_DOWN(read64((void *)TXT_HEAP_BASE) -
410 read64((void *)TXT_SINIT_SIZE), 4096));
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +0100411
412 /*
413 * FIXME: Server-TXT capable platforms need to install an STM in SMM and set up MSEG.
414 */
415
416 /**
417 * Chapter 5.10.1 SMM in the Intel TXT for Servers Environment
418 * Disable MSEG.
419 */
420 write64((void *)TXT_MSEG_SIZE, 0);
421 write64((void *)TXT_MSEG_BASE, 0);
422
Angel Ponsc0376952020-10-16 01:12:00 +0200423 /* Only initialize the heap on regular boots */
424 if (!acpi_is_wakeup_s3())
425 txt_initialize_heap();
Angel Pons8f7e2a32020-10-16 01:07:18 +0200426
Philipp Deppenwiese5f9f7762018-11-20 14:22:15 +0100427 if (CONFIG(INTEL_TXT_LOGGING))
428 txt_dump_regions();
429}
430
431BOOT_STATE_INIT_ENTRY(BS_POST_DEVICE, BS_ON_EXIT, lockdown_intel_txt, NULL);