1 /* SPDX-License-Identifier: GPL-2.0 */
3 #ifndef __LINUX_TPM_EVENTLOG_H__
4 #define __LINUX_TPM_EVENTLOG_H__
8 #define TCG_EVENT_NAME_LEN_MAX 255
9 #define MAX_TEXT_EVENT 1000 /* Max event string length */
10 #define ACPI_TCPA_SIG "TCPA" /* 0x41504354 /'TCPA' */
12 #define EFI_TCG2_EVENT_LOG_FORMAT_TCG_1_2 0x1
13 #define EFI_TCG2_EVENT_LOG_FORMAT_TCG_2 0x2
16 #define do_endian_conversion(x) be32_to_cpu(x)
18 #define do_endian_conversion(x) x
21 enum bios_platform_class {
29 u8 pcr_value[20]; /* SHA1 */
34 enum tcpa_event_types {
45 PLATFORM_CONFIG_FLAGS,
55 struct tcpa_pc_event {
61 enum tcpa_pc_event_ids {
70 OPTION_ROM_MICROCODE = 10,
74 HOST_TABLE_OF_DEVICES,
77 /* http://www.trustedcomputinggroup.org/tcg-efi-protocol-specification/ */
79 struct tcg_efi_specid_event_algs {
84 #define TCG_SPECID_SIG "Spec ID Event03"
86 struct tcg_efi_specid_event_head {
89 u8 spec_version_minor;
90 u8 spec_version_major;
94 struct tcg_efi_specid_event_algs digest_sizes[];
97 struct tcg_pcr_event {
105 struct tcg_event_field {
110 struct tcg_pcr_event2_head {
114 struct tpm_digest digests[];
117 struct tcg_algorithm_size {
122 struct tcg_algorithm_info {
125 u8 spec_version_minor;
126 u8 spec_version_major;
129 u32 number_of_algorithms;
130 struct tcg_algorithm_size digest_sizes[];
134 #define TPM_MEMREMAP(start, size) NULL
138 #define TPM_MEMUNMAP(start, size) do{} while(0)
142 * __calc_tpm2_event_size - calculate the size of a TPM2 event log entry
143 * @event: Pointer to the event whose size should be calculated
144 * @event_header: Pointer to the initial event containing the digest lengths
145 * @do_mapping: Whether or not the event needs to be mapped
147 * The TPM2 event log format can contain multiple digests corresponding to
148 * separate PCR banks, and also contains a variable length of the data that
149 * was measured. This requires knowledge of how long each digest type is,
150 * and this information is contained within the first event in the log.
152 * We calculate the length by examining the number of events, and then looking
153 * at each event in turn to determine how much space is used for events in
154 * total. Once we've done this we know the offset of the data length field,
155 * and can calculate the total size of the event.
157 * Return: size of the event on success, 0 on failure
160 static __always_inline int __calc_tpm2_event_size(struct tcg_pcr_event2_head *event,
161 struct tcg_pcr_event *event_header,
164 struct tcg_efi_specid_event_head *efispecid;
165 struct tcg_event_field *event_field;
166 void *mapping = NULL;
175 u32 count, event_type;
176 const u8 zero_digest[sizeof(event_header->digest)] = {0};
179 marker_start = marker;
180 marker = marker + sizeof(event->pcr_idx) + sizeof(event->event_type)
181 + sizeof(event->count);
183 /* Map the event header */
185 mapping_size = marker - marker_start;
186 mapping = TPM_MEMREMAP((unsigned long)marker_start,
193 mapping = marker_start;
196 event = (struct tcg_pcr_event2_head *)mapping;
198 * The loop below will unmap these fields if the log is larger than
199 * one page, so save them here for reference:
201 count = event->count;
202 event_type = event->event_type;
204 /* Verify that it's the log header */
205 if (event_header->pcr_idx != 0 ||
206 event_header->event_type != NO_ACTION ||
207 memcmp(event_header->digest, zero_digest, sizeof(zero_digest))) {
212 efispecid = (struct tcg_efi_specid_event_head *)event_header->event;
215 * Perform validation of the event in order to identify malformed
216 * events. This function may be asked to parse arbitrary byte sequences
217 * immediately following a valid event log. The caller expects this
218 * function to recognize that the byte sequence is not a valid event
219 * and to return an event size of 0.
221 if (memcmp(efispecid->signature, TCG_SPECID_SIG,
222 sizeof(TCG_SPECID_SIG)) ||
223 !efispecid->num_algs || count != efispecid->num_algs) {
228 for (i = 0; i < count; i++) {
229 halg_size = sizeof(event->digests[i].alg_id);
231 /* Map the digest's algorithm identifier */
233 TPM_MEMUNMAP(mapping, mapping_size);
234 mapping_size = halg_size;
235 mapping = TPM_MEMREMAP((unsigned long)marker,
245 memcpy(&halg, mapping, halg_size);
246 marker = marker + halg_size;
248 for (j = 0; j < efispecid->num_algs; j++) {
249 if (halg == efispecid->digest_sizes[j].alg_id) {
251 efispecid->digest_sizes[j].digest_size;
255 /* Algorithm without known length. Such event is unparseable. */
256 if (j == efispecid->num_algs) {
263 * Map the event size - we don't read from the event itself, so
264 * we don't need to map it
267 TPM_MEMUNMAP(mapping, mapping_size);
268 mapping_size += sizeof(event_field->event_size);
269 mapping = TPM_MEMREMAP((unsigned long)marker,
279 event_field = (struct tcg_event_field *)mapping;
281 marker = marker + sizeof(event_field->event_size)
282 + event_field->event_size;
283 size = marker - marker_start;
285 if (event_type == 0 && event_field->event_size == 0)
290 TPM_MEMUNMAP(mapping, mapping_size);