1 /* SPDX-License-Identifier: GPL-2.0 */
3 #ifndef __LINUX_TPM_EVENTLOG_H__
4 #define __LINUX_TPM_EVENTLOG_H__
8 #define TCG_EVENT_NAME_LEN_MAX 255
9 #define MAX_TEXT_EVENT 1000 /* Max event string length */
10 #define ACPI_TCPA_SIG "TCPA" /* 0x41504354 /'TCPA' */
12 #define EFI_TCG2_EVENT_LOG_FORMAT_TCG_1_2 0x1
13 #define EFI_TCG2_EVENT_LOG_FORMAT_TCG_2 0x2
16 #define do_endian_conversion(x) be32_to_cpu(x)
18 #define do_endian_conversion(x) x
21 enum bios_platform_class
{
29 u8 pcr_value
[20]; /* SHA1 */
34 enum tcpa_event_types
{
45 PLATFORM_CONFIG_FLAGS
,
55 struct tcpa_pc_event
{
61 enum tcpa_pc_event_ids
{
70 OPTION_ROM_MICROCODE
= 10,
74 HOST_TABLE_OF_DEVICES
,
77 /* http://www.trustedcomputinggroup.org/tcg-efi-protocol-specification/ */
79 struct tcg_efi_specid_event_algs
{
84 #define TCG_SPECID_SIG "Spec ID Event03"
86 struct tcg_efi_specid_event_head
{
89 u8 spec_version_minor
;
90 u8 spec_version_major
;
94 struct tcg_efi_specid_event_algs digest_sizes
[];
97 struct tcg_pcr_event
{
105 struct tcg_event_field
{
110 struct tcg_pcr_event2_head
{
114 struct tpm_digest digests
[];
117 struct tcg_algorithm_size
{
122 struct tcg_algorithm_info
{
125 u8 spec_version_minor
;
126 u8 spec_version_major
;
129 u32 number_of_algorithms
;
130 struct tcg_algorithm_size digest_sizes
[];
134 #define TPM_MEMREMAP(start, size) NULL
138 #define TPM_MEMUNMAP(start, size) do{} while(0)
142 * __calc_tpm2_event_size - calculate the size of a TPM2 event log entry
143 * @event: Pointer to the event whose size should be calculated
144 * @event_header: Pointer to the initial event containing the digest lengths
145 * @do_mapping: Whether or not the event needs to be mapped
147 * The TPM2 event log format can contain multiple digests corresponding to
148 * separate PCR banks, and also contains a variable length of the data that
149 * was measured. This requires knowledge of how long each digest type is,
150 * and this information is contained within the first event in the log.
152 * We calculate the length by examining the number of events, and then looking
153 * at each event in turn to determine how much space is used for events in
154 * total. Once we've done this we know the offset of the data length field,
155 * and can calculate the total size of the event.
157 * Return: size of the event on success, 0 on failure
160 static __always_inline u32
__calc_tpm2_event_size(struct tcg_pcr_event2_head
*event
,
161 struct tcg_pcr_event
*event_header
,
164 struct tcg_efi_specid_event_head
*efispecid
;
165 struct tcg_event_field
*event_field
;
166 void *mapping
= NULL
;
175 u32 count
, event_type
;
176 const u8 zero_digest
[sizeof(event_header
->digest
)] = {0};
179 marker_start
= marker
;
180 marker
= marker
+ sizeof(event
->pcr_idx
) + sizeof(event
->event_type
)
181 + sizeof(event
->count
);
183 /* Map the event header */
185 mapping_size
= marker
- marker_start
;
186 mapping
= TPM_MEMREMAP((unsigned long)marker_start
,
193 mapping
= marker_start
;
196 event
= (struct tcg_pcr_event2_head
*)mapping
;
198 * The loop below will unmap these fields if the log is larger than
199 * one page, so save them here for reference:
201 count
= event
->count
;
202 event_type
= event
->event_type
;
204 /* Verify that it's the log header */
205 if (event_header
->pcr_idx
!= 0 ||
206 event_header
->event_type
!= NO_ACTION
||
207 memcmp(event_header
->digest
, zero_digest
, sizeof(zero_digest
))) {
212 efispecid
= (struct tcg_efi_specid_event_head
*)event_header
->event
;
215 * Perform validation of the event in order to identify malformed
216 * events. This function may be asked to parse arbitrary byte sequences
217 * immediately following a valid event log. The caller expects this
218 * function to recognize that the byte sequence is not a valid event
219 * and to return an event size of 0.
221 if (memcmp(efispecid
->signature
, TCG_SPECID_SIG
,
222 sizeof(TCG_SPECID_SIG
)) ||
223 !efispecid
->num_algs
|| count
!= efispecid
->num_algs
) {
228 for (i
= 0; i
< count
; i
++) {
229 halg_size
= sizeof(event
->digests
[i
].alg_id
);
231 /* Map the digest's algorithm identifier */
233 TPM_MEMUNMAP(mapping
, mapping_size
);
234 mapping_size
= halg_size
;
235 mapping
= TPM_MEMREMAP((unsigned long)marker
,
245 memcpy(&halg
, mapping
, halg_size
);
246 marker
= marker
+ halg_size
;
248 for (j
= 0; j
< efispecid
->num_algs
; j
++) {
249 if (halg
== efispecid
->digest_sizes
[j
].alg_id
) {
251 efispecid
->digest_sizes
[j
].digest_size
;
255 /* Algorithm without known length. Such event is unparseable. */
256 if (j
== efispecid
->num_algs
) {
263 * Map the event size - we don't read from the event itself, so
264 * we don't need to map it
267 TPM_MEMUNMAP(mapping
, mapping_size
);
268 mapping_size
+= sizeof(event_field
->event_size
);
269 mapping
= TPM_MEMREMAP((unsigned long)marker
,
279 event_field
= (struct tcg_event_field
*)mapping
;
281 marker
= marker
+ sizeof(event_field
->event_size
)
282 + event_field
->event_size
;
283 size
= marker
- marker_start
;
285 if (event_type
== 0 && event_field
->event_size
== 0)
290 TPM_MEMUNMAP(mapping
, mapping_size
);