123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335 |
- /*
- * GRUB -- GRand Unified Bootloader
- * Copyright (C) 2018 Free Software Foundation, Inc.
- *
- * GRUB is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * GRUB is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with GRUB. If not, see <http://www.gnu.org/licenses/>.
- *
- * EFI TPM support code.
- */
- #include <grub/err.h>
- #include <grub/i18n.h>
- #include <grub/efi/api.h>
- #include <grub/efi/efi.h>
- #include <grub/efi/cc.h>
- #include <grub/efi/tpm.h>
- #include <grub/mm.h>
- #include <grub/tpm.h>
- #include <grub/term.h>
- typedef TCG_PCR_EVENT grub_tpm_event_t;
- static grub_guid_t tpm_guid = EFI_TPM_GUID;
- static grub_guid_t tpm2_guid = EFI_TPM2_GUID;
- static grub_guid_t cc_measurement_guid = GRUB_EFI_CC_MEASUREMENT_PROTOCOL_GUID;
- static grub_efi_handle_t *grub_tpm_handle;
- static grub_uint8_t grub_tpm_version;
- static grub_int8_t tpm1_present = -1;
- static grub_int8_t tpm2_present = -1;
- static grub_efi_boolean_t
- grub_tpm1_present (grub_efi_tpm_protocol_t *tpm)
- {
- grub_efi_status_t status;
- TCG_EFI_BOOT_SERVICE_CAPABILITY caps;
- grub_uint32_t flags;
- grub_efi_physical_address_t eventlog, lastevent;
- if (tpm1_present != -1)
- return (grub_efi_boolean_t) tpm1_present;
- caps.Size = (grub_uint8_t) sizeof (caps);
- status = tpm->status_check (tpm, &caps, &flags, &eventlog, &lastevent);
- if (status != GRUB_EFI_SUCCESS || caps.TPMDeactivatedFlag
- || !caps.TPMPresentFlag)
- tpm1_present = 0;
- else
- tpm1_present = 1;
- grub_dprintf ("tpm", "tpm1%s present\n", tpm1_present ? "" : " NOT");
- return (grub_efi_boolean_t) tpm1_present;
- }
- static grub_efi_boolean_t
- grub_tpm2_present (grub_efi_tpm2_protocol_t *tpm)
- {
- grub_efi_status_t status;
- EFI_TCG2_BOOT_SERVICE_CAPABILITY caps;
- caps.Size = (grub_uint8_t) sizeof (caps);
- if (tpm2_present != -1)
- return (grub_efi_boolean_t) tpm2_present;
- status = tpm->get_capability (tpm, &caps);
- if (status != GRUB_EFI_SUCCESS || !caps.TPMPresentFlag)
- tpm2_present = 0;
- else
- tpm2_present = 1;
- grub_dprintf ("tpm", "tpm2%s present\n", tpm2_present ? "" : " NOT");
- return (grub_efi_boolean_t) tpm2_present;
- }
- static grub_efi_boolean_t
- grub_tpm_handle_find (grub_efi_handle_t *tpm_handle,
- grub_efi_uint8_t *protocol_version)
- {
- grub_efi_handle_t *handles;
- grub_efi_uintn_t num_handles;
- if (grub_tpm_handle != NULL)
- {
- *tpm_handle = grub_tpm_handle;
- *protocol_version = grub_tpm_version;
- return 1;
- }
- handles = grub_efi_locate_handle (GRUB_EFI_BY_PROTOCOL, &tpm_guid, NULL,
- &num_handles);
- if (handles && num_handles > 0)
- {
- grub_tpm_handle = handles[0];
- *tpm_handle = handles[0];
- grub_tpm_version = 1;
- *protocol_version = 1;
- grub_dprintf ("tpm", "TPM handle Found, version: 1\n");
- return 1;
- }
- handles = grub_efi_locate_handle (GRUB_EFI_BY_PROTOCOL, &tpm2_guid, NULL,
- &num_handles);
- if (handles && num_handles > 0)
- {
- grub_tpm_handle = handles[0];
- *tpm_handle = handles[0];
- grub_tpm_version = 2;
- *protocol_version = 2;
- grub_dprintf ("tpm", "TPM handle Found, version: 2\n");
- return 1;
- }
- return 0;
- }
- static grub_err_t
- grub_efi_log_event_status (grub_efi_status_t status)
- {
- switch (status)
- {
- case GRUB_EFI_SUCCESS:
- return GRUB_ERR_NONE;
- case GRUB_EFI_DEVICE_ERROR:
- return grub_error (GRUB_ERR_IO, N_("command failed"));
- case GRUB_EFI_INVALID_PARAMETER:
- return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("invalid parameter"));
- case GRUB_EFI_BUFFER_TOO_SMALL:
- return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("output buffer too small"));
- case GRUB_EFI_NOT_FOUND:
- return grub_error (GRUB_ERR_UNKNOWN_DEVICE, N_("TPM unavailable"));
- default:
- return grub_error (grub_is_tpm_fail_fatal () ? GRUB_ERR_UNKNOWN_DEVICE : GRUB_ERR_NONE, N_("unknown TPM error"));
- }
- }
- static grub_err_t
- grub_tpm1_log_event (grub_efi_handle_t tpm_handle, unsigned char *buf,
- grub_size_t size, grub_uint8_t pcr,
- const char *description)
- {
- grub_tpm_event_t *event;
- grub_efi_status_t status;
- grub_efi_tpm_protocol_t *tpm;
- grub_efi_physical_address_t lastevent;
- grub_uint32_t algorithm;
- grub_uint32_t eventnum = 0;
- tpm = grub_efi_open_protocol (tpm_handle, &tpm_guid,
- GRUB_EFI_OPEN_PROTOCOL_GET_PROTOCOL);
- if (!grub_tpm1_present (tpm))
- return 0;
- event = grub_zalloc (sizeof (*event) + grub_strlen (description) + 1);
- if (!event)
- return grub_error (GRUB_ERR_OUT_OF_MEMORY,
- N_("cannot allocate TPM event buffer"));
- event->PCRIndex = pcr;
- event->EventType = EV_IPL;
- event->EventSize = grub_strlen (description) + 1;
- grub_strcpy ((char *) event->Event, description);
- algorithm = TCG_ALG_SHA;
- status = tpm->log_extend_event (tpm, (grub_addr_t) buf, (grub_uint64_t) size,
- algorithm, event, &eventnum, &lastevent);
- grub_free (event);
- return grub_efi_log_event_status (status);
- }
- static grub_err_t
- grub_tpm2_log_event (grub_efi_handle_t tpm_handle, unsigned char *buf,
- grub_size_t size, grub_uint8_t pcr,
- const char *description)
- {
- EFI_TCG2_EVENT *event;
- grub_efi_status_t status;
- grub_efi_tpm2_protocol_t *tpm;
- tpm = grub_efi_open_protocol (tpm_handle, &tpm2_guid,
- GRUB_EFI_OPEN_PROTOCOL_GET_PROTOCOL);
- if (!grub_tpm2_present (tpm))
- return 0;
- event =
- grub_zalloc (sizeof (EFI_TCG2_EVENT) + grub_strlen (description) + 1);
- if (!event)
- return grub_error (GRUB_ERR_OUT_OF_MEMORY,
- N_("cannot allocate TPM event buffer"));
- event->Header.HeaderSize = sizeof (EFI_TCG2_EVENT_HEADER);
- event->Header.HeaderVersion = 1;
- event->Header.PCRIndex = pcr;
- event->Header.EventType = EV_IPL;
- event->Size =
- sizeof (*event) - sizeof (event->Event) + grub_strlen (description) + 1;
- grub_strcpy ((char *) event->Event, description);
- status = tpm->hash_log_extend_event (tpm, 0, (grub_addr_t) buf,
- (grub_uint64_t) size, event);
- grub_free (event);
- return grub_efi_log_event_status (status);
- }
- static void
- grub_cc_log_event (unsigned char *buf, grub_size_t size, grub_uint8_t pcr,
- const char *description)
- {
- grub_efi_cc_event_t *event;
- grub_efi_status_t status;
- grub_efi_cc_protocol_t *cc;
- grub_efi_cc_mr_index_t mr;
- cc = grub_efi_locate_protocol (&cc_measurement_guid, NULL);
- if (cc == NULL)
- return;
- status = cc->map_pcr_to_mr_index (cc, pcr, &mr);
- if (status != GRUB_EFI_SUCCESS)
- {
- grub_efi_log_event_status (status);
- return;
- }
- event = grub_zalloc (sizeof (grub_efi_cc_event_t) +
- grub_strlen (description) + 1);
- if (event == NULL)
- {
- grub_error (GRUB_ERR_OUT_OF_MEMORY, N_("cannot allocate CC event buffer"));
- return;
- }
- event->Header.HeaderSize = sizeof (grub_efi_cc_event_header_t);
- event->Header.HeaderVersion = GRUB_EFI_CC_EVENT_HEADER_VERSION;
- event->Header.MrIndex = mr;
- event->Header.EventType = EV_IPL;
- event->Size = sizeof (*event) + grub_strlen (description) + 1;
- grub_strcpy ((char *) event->Event, description);
- status = cc->hash_log_extend_event (cc, 0,
- (grub_efi_physical_address_t)(grub_addr_t) buf,
- (grub_efi_uint64_t) size, event);
- grub_free (event);
- if (status != GRUB_EFI_SUCCESS)
- grub_efi_log_event_status (status);
- }
- grub_err_t
- grub_tpm_measure (unsigned char *buf, grub_size_t size, grub_uint8_t pcr,
- const char *description)
- {
- grub_efi_handle_t tpm_handle;
- grub_efi_uint8_t protocol_version;
- grub_cc_log_event(buf, size, pcr, description);
- if (!grub_tpm_handle_find (&tpm_handle, &protocol_version))
- return 0;
- grub_dprintf ("tpm", "log_event, pcr = %d, size = 0x%" PRIxGRUB_SIZE ", %s\n",
- pcr, size, description);
- if (protocol_version == 1)
- return grub_tpm1_log_event (tpm_handle, buf, size, pcr, description);
- else
- return grub_tpm2_log_event (tpm_handle, buf, size, pcr, description);
- }
- int
- grub_tpm_present (void)
- {
- grub_efi_handle_t tpm_handle;
- grub_efi_uint8_t protocol_version;
- grub_efi_cc_protocol_t *cc;
- /*
- * When confidential computing measurement protocol is enabled
- * we assume the TPM is present.
- */
- cc = grub_efi_locate_protocol (&cc_measurement_guid, NULL);
- if (cc != NULL)
- return 1;
- if (!grub_tpm_handle_find (&tpm_handle, &protocol_version))
- return 0;
- if (protocol_version == 1)
- {
- grub_efi_tpm_protocol_t *tpm;
- tpm = grub_efi_open_protocol (tpm_handle, &tpm_guid,
- GRUB_EFI_OPEN_PROTOCOL_GET_PROTOCOL);
- if (!tpm)
- {
- grub_dprintf ("tpm", "Cannot open TPM protocol\n");
- return 0;
- }
- return grub_tpm1_present (tpm);
- }
- else
- {
- grub_efi_tpm2_protocol_t *tpm;
- tpm = grub_efi_open_protocol (tpm_handle, &tpm2_guid,
- GRUB_EFI_OPEN_PROTOCOL_GET_PROTOCOL);
- if (!tpm)
- {
- grub_dprintf ("tpm", "Cannot open TPM protocol\n");
- return 0;
- }
- return grub_tpm2_present (tpm);
- }
- }
|