coreboot-libre-fam15h-rdimm/3rdparty/chromeec/common/new_nvmem.c

3218 lines
87 KiB
C

/* Copyright 2019 The Chromium OS Authors. All rights reserved.
* Use of this source code is governed by a BSD-style license that can be
* found in the LICENSE file.
*/
#include <stdint.h>
#include <string.h>
#include "test/nvmem_test.h"
#include "common.h"
#include "board.h"
#include "console.h"
#include "crypto_api.h"
#include "flash.h"
#include "flash_log.h"
#include "new_nvmem.h"
#include "nvmem.h"
#include "nvmem_vars.h"
#include "shared_mem.h"
#include "system.h"
#include "system_chip.h"
#include "task.h"
#include "timer.h"
#define CPRINTS(format, args...) cprints(CC_SYSTEM, format, ##args)
/*
* ==== Overview
*
* This file is the implementation of the new TPM NVMEM flash storage layer.
* These are major differences compared to the legacy implementation:
*
* NVMEM TPM objects are stored in flash in separate containers, each one
* protected by hash and possibly encrypted. When nvmem_commit() is invoked,
* only objects changed in the NVMEM cache are updated in the flash.
*
* The (key, value) pairs are also stored in flash in the same kind of
* separate containers. There is no special area allocated for the (key, value)
* pairs in flash, they are interleaved with TPM objects.
*
* The (key, value) pairs are not kept in the NVMEM cache, they are stored in
* flash only. This causes a few deviations from the legacy (key, value) pair
* interface:
*
* - no need to initialize (key, value) storage separately, initvars() API is
* not there.
*
* - when the user is retrieving a (key, value) object, he/she is given a
* dynamically allocated buffer, which needs to be explicitly released by
* calling the new API: freevar().
*
* - the (key. value) pairs, if modified, are updated in flash immediately,
* not after nvmem_commit() is called.
*
* Storing (key, value) pairs in the flash frees up 272 bytes of the cache
* space previously used, but makes it more difficult to control how flash
* memory is split between TPM objects and (key, value) pairs. A soft limit of
* 1K is introduced, limiting the total space used by (key, value) pairs data,
* not including tuple headers.
*
* ===== Organizing flash storage
*
* The total space used by the NVMEM in flash is reduced from 24 to 20
* kilobytes, five 2K pages at the top of each flash bank. These pages are
* concatenated into a single storage space, based on the page header placed
* at the bottom of each page (struct nn_page_header). The page header
* includes a 21 bit page number (this allows to order pages properly on
* initialization), the offset of the first data object in the page and the
* hash of the entire header.
*
* Yet another limitation of the new scheme is that no object stored in NVMEM
* can exceed the flash page size less the page header size and container
* header size. This allows for objects as large as 2035 bytes. Objects can
* span flash pages. Note that reserved TPM object STATE_CLEAR_DATA exceeds 2K
* in size, this is why one of its components (the .pcrSave field) is stored
* in flash separately.
*
* ===== Object containers
*
* The container header (struct nn_container) describes the contained TPM
* object or (key, value) pair, along with the size, and also includes the
* hash of the entire container calculated when the hash field is set to zero.
*
* When an object needs to be updated, it is stored at the end of the used
* flash space in a container with the higher .generation field value, and
* then the older container's type field is erased, thus marking it as a
* deleted object. The idea is that when initializing NVMEM cache after reset,
* in case two instances of the same object are found in the flash because the
* new instance was saved, but the old instance was not erased because of some
* failure, the instance with larger .generation field value wins. Note that
* this error recovery procedure is supplemented by use of transaction
* delimiter objects described below.
*
* The container type field is duplicated in the container header, this allows
* verification of the container hash after even the object was erased.
*
* In order to be able to erase the type the container must start at the 4
* byte boundary. This in turn requires that each container is padded such
* that total storage taken by the container is divisible by 4.
*
* To be able to tell if two containers contain two instances of the same
* object, one needs to be able to identify the object stored in the container.
* For the three distinct types of objects it works as follows:
*
* - (key, value) pair: key, stored in the contained tuple.
*
* - reserved tpm object: the first byte stored in the container. PCR
* values from STATE_CLEAR_DATA.pcrSave field are stored as separate
* reserved objects with the appropriate first bytes.
*
* - evictable tpm object: the first 4 bytes stored in the container, the
* evictable TTPM object ID.
*
* Don't forget that the contents are usually encrypted. Decryption is needed
* each time a stored object needs to be examined.
*
* Reserved objects of types STATE_CLEAR_DATA and STATE_RESET_DATA are very
* big and are stored in the flash in marshaled form. On top of 'regular' TPM2
* style marshaling, PCRs found in the STATE_CLEAR_DATA object are stored in
* separate containers.
*
* ===== Storage compaction
*
* Keeping adding changed values at the end of the flash space would
* inevitably cause space overflow, unless something is done about it. This is
* where flash compaction kicks in: as soon as there are just three free flash
* pages left the stored objects are moved to the end of the space, which
* results in earlier used pages being freed and added to the pool of
* available flash pages.
*
* A great improvement to this storage compaction process would be grouping
* the objects such that the rarely changing ones occupy flash pages at the
* lower page indices. In this case when compaction starts, the pages not
* containing erased objects would not have to be re-written. This
* optimization is left as a future enhancement.
*
* ===== Committing TPM changes
*
* When nvmem_commit() is invoked it is necessary to identify which TPM
* objects in the cache have changed and require saving. Remember, that (key,
* value) pairs are not held in the cache any more and are saved in the flash
* immediately, so they do not have to be dealt with during commit.
*
* The commit procedure starts with iterating over the evictable objects space
* in the NVMEM cache, storing in an array offsets of all evictable objects it
* finds there. Then it iterates over flash contents skipping over (key,
* value) pairs.
*
* For each reserved object stored in flash, it compares its stored value with
* the value stored in the cache at known fixed location. If the value has
* changed, a new reserved object instance is saved in flash. This approach
* requires that all reserved objects are present in the flash, otherwise
* there is nothing to compare the cached instance of the object with. This is
* enforced by the init function.
*
* For each evictable object stored in flash, it checks if that object is
* still in the cache using the previously collected array of offsets. If the
* object is not in the cache, it must have been deleted by the TPM. The
* function deletes it from the flash as well. If the object is in the cache,
* its offset is removed from the array to indicate that the object has been
* processed. Then if the object value has changed, the new instance is added
* and the old instance erased. After this the only offsets left in the array
* are offsets of new objects, not yet saved in the flash. All these remaining
* objects get saved.
*
* To ensure transaction integrity, object deletions are just scheduled and
* not processed immediately, the deletion happens after all new instances
* have been saved in flash. See more about transaction delimiters below.
*
* ===== Migration from legacy storage and reclaiming flash space
*
* To be able to migrate existing devices from the legacy storage format the
* initialization code checks if a full 12K flash partition is still present,
* and if so - copies its contents into the cache and invokes the migration
* function. The function erases the alternative partition and creates a list
* of 5 pages available for the new format (remember, the flash footprint of
* the new scheme is smaller, only 10K is available in each half).
*
* The (key, value) pairs and TPM objects are stored in the new format as
* described, and then the legacy partition is erased and its pages are added
* to the list of free pages. This approach would fail if the existing TPM
* storage would exceed 10K, but this is extremely unlikely, especially since
* the large reserved objects are stored by the new scheme in marshaled form.
* This frees up a lot of flash space.
*
* Eventually it will be possible to reclaim the bottom 2K page per flash half
* currently used by the legacy scheme, but this would be possible only after
* migration is over. The plan is to keep a few Cr50 versions supporting the
* migration process, and then drop the migration code and rearrange the
* memory map and reclaim the freed pages. Chrome OS will always carry a
* migrating capable Cr50 version along with the latest one to make sure that
* even Chrome OS devices which had not updated their Cr50 code in a long
* while can be migrated in two steps.
*
* ===== Initialization, including erased/corrupted flash
*
* On regular startup (no legacy partition found) the flash pages dedicated to
* NVMEM storage are examined, pages with valid headers are included in the
* list of available pages, sorted by the page number. Erased pages are kept
* in a separate list. Pages which are not fully erased (but do not have a
* valid header) are considered corrupted, are erased, and added to the second
* list.
*
* After that the contents of the ordered flash pages is read, all discovered
* TPM objects are verified and saved in the cache.
*
* To enforce that all reserved TPM objects are present in the flash, the init
* routine maintains a bitmap of the reserved objects it found while
* initializing. In the case when after the scan of the entire NVMEM flash it
* turns out that some reserved objects have not been encountered, the init
* routine creates new flash instances of the missing reserved objects with
* default value of zero. This takes care of both initializing from empty
* flash and a case when a reserved object disappears due to a bug.
*
* ===== Transactions support
*
* It is important to make sure that TPM changes are grouped together. It came
* naturally with the legacy scheme where each time nvmem_save() was called,
* the entire cache snapshot was saved in the flash. With the new scheme some
* extra effort is required.
*
* Transaction delimiters are represented by containers of the appropriate
* type and the payload size of zero. When nvmem_save() operation is started,
* the new objects get written into flash and the objects requiring deletion
* are kept in the list. Once all new objects are added to the flash, the
* transaction delimiter is written, ending up at the top of the used flash.
* After that the objects scheduled for deletion are deleted, and then the
* transaction delimiter is also marked 'deleted'.
*
* So, during initialization the flash could be in one of three states:
*
* - thre is an erased transaction delimiter at the top
* . this is the normal state after successful commit operation.
*
* - there is transaction delimiter at the top, but it is not erased.
* . this is the case where the new objects were saved in flash, but some of
* the old instances might still be present not erased. The recovery
* procedure finds all duplicates of the objects present between two most
* recent delimiters and erases them.
*
* - there is no transaction delimiter on the top.
* . this is the case where nvmem_save() was interrupted before all new
* values have been written into the flash. The recovery procedure finds
* all TPM objects above the last valid delimiter in the flash and erases
* them all.
*
* ===== Handling failures
*
* This implementation is no better in handling failures than the legacy one,
* it in fact is even worse, because if a failure happened during legacy
* commit operation, at least the earlier saved partition would be available.
* If failure happens during this implementation's save or compaction process,
* there is a risk of ending up with a corrupted or inconsistent flash
* contents, even though the use of transaction delimiters narrows the failure
* window significantly.
*
* This first draft is offered for review and to facilitate testing and
* discussion about how failures should be addressed.
*
* ===== Missing stuff
*
* Presently not much thought has been given to locking and preventing
* problems caused by task preemption. The legacy scheme is still in place,
* but it might require improvements.
*/
/*
* This code relies on the fact that space dedicated to flash NVMEM storage is
* sufficient to guarantee that the entire NVMEM snapshot can fit into it
* comfortably. The assert below is a very liberal computation which
* guarantees this assumption. Note that marshaling huge reserved structures
* reduces amount of required flash space, and this is not accounted for in
* this calculation. Space allocated for 200 container descriptors is also way
* more than required.
*/
/*
* Fuzz testing does not enforce proper size definitions, causing the below
* assert failure.
*/
BUILD_ASSERT((NEW_NVMEM_TOTAL_PAGES * CONFIG_FLASH_BANK_SIZE) >
(MAX_VAR_TOTAL_SPACE +
NV_MEMORY_SIZE +
200 * (sizeof(struct nn_container)) +
CONFIG_FLASH_BANK_SIZE * 2));
/* Maximum number of evictable objects we support. */
#define MAX_STORED_EVICTABLE_OBJECTS 20
/*
* Container for storing (key, value) pairs, a.k.a. vars during read. Actual
* vars would never be this large, but when looking for vars we need to be
* able to iterate over and verify all objects in the flash, hence the max
* body size.
*/
struct max_var_container {
struct nn_container c_header;
struct tuple t_header;
uint8_t body[CONFIG_FLASH_BANK_SIZE - sizeof(struct nn_container) -
sizeof(struct tuple)];
} __packed;
/*
* Limit of the number of objects which can be updated in one TPM transaction,
* reserved and evictable total. This is much more than practical maximum.
*/
#define MAX_DELETE_CANDIDATES 30
static struct delete_candidates {
size_t num_candidates;
const struct nn_container *candidates[MAX_DELETE_CANDIDATES];
} *del_candidates;
/*
* This array contains a list of flash pages indices (0..255 range) sorted by
* the page header page number filed. Erased pages are kept at the tail of the
* list.
*/
static uint8_t page_list[NEW_NVMEM_TOTAL_PAGES];
static uint32_t next_evict_obj_base;
static uint8_t init_in_progress;
/*
* Mutex to protect flash space containing NVMEM objects. All operations
* modifying the flash contents or relying on its consistency (like searching
* in the flash) should acquire this mutex before proceeding.
*
* The interfaces grabbing this mutex are
*
* new_nvmem_migrate()
* new_nvmem_init()
* new_nvmem_save()
* getvar()
* setvar()
* nvmem_erase_tpm_data()
*
* The only static function using the mutex is browse_flash_contents() which
* can be invoked from the CLI and while it never modifies the flash contents,
* it still has to be protected to be able to properly iterate over the entire
* flash contents.
*/
static struct mutex flash_mtx;
/*
* Wrappers around locking/unlocking mutex make it easier to debug issues by
* adding with minimal code changes like printouts of line numbers where the
* functions are invoked from.
*/
static void lock_mutex(int line_num)
{
mutex_lock(&flash_mtx);
}
static void unlock_mutex(int line_num)
{
mutex_unlock(&flash_mtx);
}
/*
* Total space taken by key, value pairs in flash. It is limited to give TPM
* objects priority.
*/
test_export_static uint16_t total_var_space;
/* The main context used when adding objects to NVMEM. */
test_export_static struct access_tracker master_at;
test_export_static enum ec_error_list browse_flash_contents(int print);
static enum ec_error_list save_container(struct nn_container *nc);
static void invalidate_nvmem_flash(void);
/* Log NVMEM problem as per passed in payload and size, and reboot. */
static void report_failure(struct nvmem_failure_payload *payload,
size_t payload_union_size)
{
if (init_in_progress) {
/*
* This must be a rolling reboot, let's invalidate flash
* storage to stop this.
*/
invalidate_nvmem_flash();
}
flash_log_add_event(FE_LOG_NVMEM,
payload_union_size +
offsetof(struct nvmem_failure_payload,
size),
payload);
ccprintf("Logging failure %d, will %sreinit\n", payload->failure_type,
init_in_progress ? "" : "not ");
if (init_in_progress) {
struct nvmem_failure_payload fp;
fp.failure_type = NVMEMF_NVMEM_WIPE;
flash_log_add_event(
FE_LOG_NVMEM,
offsetof(struct nvmem_failure_payload, size), &fp);
}
cflush();
system_reset(SYSTEM_RESET_MANUALLY_TRIGGERED | SYSTEM_RESET_HARD);
}
static void report_no_payload_failure(enum nvmem_failure_type type)
{
struct nvmem_failure_payload fp;
fp.failure_type = type;
report_failure(&fp, 0);
}
/*
* This function allocates a buffer of the requested size.
*
* Heap space could be very limited and at times there could be not enough
* memory in the heap to allocate. This should not be considered a failure,
* polling should be used instead. On a properly functioning device the memory
* would become available. If it is not - there is not much we can do, we'll
* have to reboot adding a log entry.
*/
static void *get_scratch_buffer(size_t size)
{
char *buf;
int i;
struct nvmem_failure_payload fp;
/*
* Wait up to a 5 seconds in case some other operation is under
* way.
*/
for (i = 0; i < 50; i++) {
int rv;
rv = shared_mem_acquire(size, &buf);
if (rv == EC_SUCCESS) {
if (i)
CPRINTS("%s: waited %d cycles!", __func__, i);
return buf;
}
usleep(100 * MSEC);
}
fp.failure_type = NVMEMF_MALLOC;
fp.size = size;
report_failure(&fp, sizeof(fp.size));
/* Just to keep the compiler happy, this is never reached. */
return NULL;
}
/* Helper function returning actual size used by NVMEM in flash. */
static size_t total_used_size(void)
{
return master_at.list_index * CONFIG_FLASH_BANK_SIZE +
master_at.mt.data_offset;
}
/*
* Helper functions to set a bit a bit at a certain index in a bitmap array
* and to check if the bit is set. The caller must guarantee that the bitmap
* array is large enough for the index.
*/
static int bitmap_bit_check(const uint8_t *bitmap, size_t index)
{
return bitmap[index / 8] & (1 << (index % 8));
}
static int bitmap_bit_set(uint8_t *bitmap, size_t index)
{
return bitmap[index / 8] |= (1 << (index % 8));
}
/* Convenience functions used to reduce amount of typecasting. */
static void app_compute_hash_wrapper(void *buf, size_t size, void *hash,
size_t hash_size)
{
app_compute_hash(buf, size, hash, hash_size);
}
static STATE_CLEAR_DATA *get_scd(void)
{
NV_RESERVED_ITEM ri;
NvGetReserved(NV_STATE_CLEAR, &ri);
return (STATE_CLEAR_DATA *)((uint8_t *)nvmem_cache_base(NVMEM_TPM) +
ri.offset);
}
/*
* Make sure page header hash is different between prod and other types of
* images.
*/
static uint32_t calculate_page_header_hash(struct nn_page_header *ph)
{
uint32_t hash;
static const uint32_t salt[] = {1, 2, 3, 4};
BUILD_ASSERT(sizeof(hash) ==
offsetof(struct nn_page_header, page_hash));
app_cipher(salt, &hash, ph, sizeof(hash));
return hash;
}
/* Veirify page header hash. */
static int page_header_is_valid(struct nn_page_header *ph)
{
return calculate_page_header_hash(ph) == ph->page_hash;
}
/* Convert flash page number in 0..255 range into actual flash address. */
static struct nn_page_header *flash_index_to_ph(uint8_t index)
{
return (struct nn_page_header *)((index * CONFIG_FLASH_BANK_SIZE) +
CONFIG_PROGRAM_MEMORY_BASE);
}
static const void *page_cursor(const struct page_tracker *pt)
{
return (void *)((uintptr_t)pt->ph + pt->data_offset);
}
/*
* Return flash page pointed at by a certain page_list element if the page is
* valid. If the index is out of range, or page is not initialized properly
* return NULL.
*/
test_export_static struct nn_page_header *list_element_to_ph(size_t el)
{
struct nn_page_header *ph;
if (el >= ARRAY_SIZE(page_list))
return NULL;
ph = flash_index_to_ph(page_list[el]);
if (page_header_is_valid(ph))
return ph;
return NULL;
}
/*
* Read into buf or skip if buf is NULL the next num_bytes in the storage, at
* the location determined by the passed in access tracker. Start from the
* very beginning if the passed in access tracker is empty.
*
* If necessary - concatenate contents from different pages bypassing page
* headers.
*
* If user is reading the container header (as specified by the
* container_fetch argument), save in the context the location of the
* container.
*
* If not enough bytes are available in the storage to satisfy the request -
* log error and reboot.
*/
static size_t nvmem_read_bytes(struct access_tracker *at, size_t num_bytes,
void *buf, int container_fetch)
{
size_t togo;
struct nvmem_failure_payload fp;
if (!at->list_index && !at->mt.data_offset) {
/* Start from the beginning. */
at->mt.ph = list_element_to_ph(0);
at->mt.data_offset = at->mt.ph->data_offset;
}
if (container_fetch) {
at->ct.data_offset = at->mt.data_offset;
at->ct.ph = at->mt.ph;
}
if ((at->mt.data_offset + num_bytes) < CONFIG_FLASH_BANK_SIZE) {
/*
* All requested data fits and does not even reach the top of
* the page.
*/
if (buf)
memcpy(buf, page_cursor(&at->mt), num_bytes);
at->mt.data_offset += num_bytes;
return num_bytes;
}
/* Data is split between pages. */
/* To go in the current page. */
togo = CONFIG_FLASH_BANK_SIZE - at->mt.data_offset;
if (buf) {
memcpy(buf, page_cursor(&at->mt), togo);
/* Next portion goes here. */
buf = (uint8_t *)buf + togo;
}
/*
* Determine how much is there to read in the next page.
*
* Since object size is limited to page size
* less page header size, we are guaranteed that the object would not
* span more than one page boundary.
*/
togo = num_bytes - togo;
/* Move to the next page. */
at->list_index++;
at->mt.ph = list_element_to_ph(at->list_index);
if (!at->mt.ph && togo) {
/*
* No more data to read. Could the end of used flash be close
* to the page boundary, so that there is no room to read an
* erased container header?
*/
if (!container_fetch) {
fp.failure_type = NVMEMF_READ_UNDERRUN;
fp.underrun_size = num_bytes - togo;
/* This will never return. */
report_failure(&fp, sizeof(fp.underrun_size));
}
/*
* Simulate reading of the container header filled with all
* ones, which would be an indication of the end of storage,
* the caller will roll back ph, data_offset and list index as
* appropriate.
*/
memset(buf, 0xff, togo);
} else if (at->mt.ph) {
if (at->mt.ph->data_offset < (sizeof(*at->mt.ph) + togo)) {
fp.failure_type = NVMEMF_PH_SIZE_MISMATCH;
fp.ph.ph_offset = at->mt.ph->data_offset;
fp.ph.expected = sizeof(*at->mt.ph) + togo;
/* This will never return. */
report_failure(&fp, sizeof(fp.ph));
}
if (buf)
memcpy(buf, at->mt.ph + 1, togo);
at->mt.data_offset = sizeof(*at->mt.ph) + togo;
}
return num_bytes;
}
/*
* Convert passed in absolute address into flash memory offset and write the
* passed in blob into the flash.
*/
static enum ec_error_list write_to_flash(const void *flash_addr,
const void *obj, size_t size)
{
return flash_physical_write(
(uintptr_t)flash_addr - CONFIG_PROGRAM_MEMORY_BASE, size, obj);
}
/*
* Corrupt headers of all active pages thus invalidating the entire NVMEM
* flash storage.
*/
static void invalidate_nvmem_flash(void)
{
size_t i;
struct nn_page_header *ph;
struct nn_page_header bad_ph;
memset(&bad_ph, 0, sizeof(bad_ph));
for (i = 0; i < ARRAY_SIZE(page_list); i++) {
ph = list_element_to_ph(i);
if (!ph)
continue;
write_to_flash(ph, &bad_ph, sizeof(*ph));
}
}
/*
* When initializing flash for the first time - set the proper first page
* header.
*/
static enum ec_error_list set_first_page_header(void)
{
struct nn_page_header ph = {};
enum ec_error_list rv;
struct nn_page_header *fph; /* Address in flash. */
ph.data_offset = sizeof(ph);
ph.page_hash = calculate_page_header_hash(&ph);
fph = flash_index_to_ph(page_list[0]);
rv = write_to_flash(fph, &ph, sizeof(ph));
if (rv == EC_SUCCESS) {
/* Make sure master page tracker is ready. */
memset(&master_at, 0, sizeof(master_at));
master_at.mt.data_offset = ph.data_offset;
master_at.mt.ph = fph;
}
return rv;
}
/*
* Verify that the passed in container is valid, specifically that its hash
* matches its contents.
*/
static int container_is_valid(struct nn_container *ch)
{
struct nn_container dummy_c;
uint32_t hash;
uint32_t preserved_hash;
uint8_t preserved_type;
preserved_hash = ch->container_hash;
preserved_type = ch->container_type;
ch->container_type = ch->container_type_copy;
ch->container_hash = 0;
app_compute_hash_wrapper(ch, ch->size + sizeof(*ch), &hash,
sizeof(hash));
ch->container_hash = preserved_hash;
ch->container_type = preserved_type;
dummy_c.container_hash = hash;
return dummy_c.container_hash == ch->container_hash;
}
static uint32_t aligned_container_size(const struct nn_container *ch)
{
const size_t alignment_mask = CONFIG_FLASH_WRITE_SIZE - 1;
return (ch->size + sizeof(*ch) + alignment_mask) & ~alignment_mask;
}
/*
* Function which allows to iterate through all objects stored in flash. The
* passed in context keeps track of where the previous object retrieval ended.
*
* Return:
* EC_SUCCESS if an object is retrieved and verified
* EC_ERROR_MEMORY_ALLOCATION if 'erased' object reached (not an error).
* EC_ERROR_INVAL if verification failed or read is out of sync.
*/
test_export_static enum ec_error_list get_next_object(struct access_tracker *at,
struct nn_container *ch,
int include_deleted)
{
uint32_t salt[4];
uint8_t ctype;
salt[3] = 0;
do {
size_t aligned_remaining_size;
struct nn_container temp_ch;
nvmem_read_bytes(at, sizeof(temp_ch), &temp_ch, 1);
ctype = temp_ch.container_type;
/* Should we check for the container being all 0xff? */
if (ctype == NN_OBJ_ERASED) {
/* Roll back container size. */
at->mt.data_offset = at->ct.data_offset;
at->mt.ph = at->ct.ph;
/*
* If the container header happened to span between
* two pages or end at the page boundary - roll back
* page index saved in the context.
*/
if ((CONFIG_FLASH_BANK_SIZE - at->mt.data_offset) <=
sizeof(struct nn_container))
at->list_index--;
return EC_ERROR_MEMORY_ALLOCATION;
}
/*
* The read data is a container header, copy it into the user
* provided space and continue reading there.
*/
*ch = temp_ch;
aligned_remaining_size =
aligned_container_size(ch) - sizeof(*ch);
if (aligned_remaining_size) {
if (aligned_remaining_size >
(CONFIG_FLASH_BANK_SIZE - sizeof(*ch))) {
/* Never returns. */
report_no_payload_failure(
NVMEMF_INCONSISTENT_FLASH_CONTENTS);
}
nvmem_read_bytes(at, aligned_remaining_size, ch + 1, 0);
salt[0] = at->ct.ph->page_number;
salt[1] = at->ct.data_offset;
salt[2] = ch->container_hash;
/* Decrypt in place. */
if (!app_cipher(salt, ch + 1, ch + 1, ch->size))
report_no_payload_failure(NVMEMF_CIPHER_ERROR);
}
/* And calculate hash. */
if (!container_is_valid(ch)) {
struct nvmem_failure_payload fp;
if (!init_in_progress)
report_no_payload_failure(
NVMEMF_CONTAINER_HASH_MISMATCH);
/*
* During init there might be a way to deal with
* this, let's just log this and continue.
*/
fp.failure_type = NVMEMF_CONTAINER_HASH_MISMATCH;
flash_log_add_event(
FE_LOG_NVMEM,
offsetof(struct nvmem_failure_payload, size),
&fp);
return EC_ERROR_INVAL;
}
/*
* Keep track of the most recently encountered delimiter,
* finalized or not.
*/
if (ch->container_type_copy == NN_OBJ_TRANSACTION_DEL) {
include_deleted = 1; /* Always return all delimiters. */
/* But keep track only of finalized ones. */
if (ch->container_type == NN_OBJ_OLD_COPY) {
at->dt.ph = at->ct.ph;
at->dt.data_offset = at->ct.data_offset;
}
}
} while (!include_deleted && (ctype == NN_OBJ_OLD_COPY));
return EC_SUCCESS;
}
/*
* Add a delimiter object at the top of the flash. The container type field is
* not erased.
*
* This is an indication that after nvmem_commit() invocation all updated
* objects have been saved in the flash, but the old instances of the objects
* have not yet been deleted.
*/
static enum ec_error_list add_delimiter(void)
{
struct nn_container ch;
memset(&ch, 0, sizeof(ch));
ch.container_type = ch.container_type_copy = NN_OBJ_TRANSACTION_DEL;
return save_container(&ch);
}
/*
* Erase the container type field of the previously saved delimiter, thus
* indicating that nvmem save transaction is completed.
*/
static enum ec_error_list finalize_delimiter(const struct nn_container *del)
{
struct nn_container c;
c = *del;
c.container_type = NN_OBJ_OLD_COPY;
return write_to_flash(del, &c, sizeof(c));
}
/* Add delimiter indicating that flash is in a consistent state. */
static enum ec_error_list add_final_delimiter(void)
{
const struct nn_container *del;
del = page_cursor(&master_at.mt);
add_delimiter();
return finalize_delimiter(del);
}
/* Erase flash page and add it to the pool of empty pages. */
static void release_flash_page(struct access_tracker *at)
{
uint8_t page_index = page_list[0];
void *flash;
flash = flash_index_to_ph(page_index);
flash_physical_erase((uintptr_t)flash - CONFIG_PROGRAM_MEMORY_BASE,
CONFIG_FLASH_BANK_SIZE);
memmove(page_list, page_list + 1,
(ARRAY_SIZE(page_list) - 1) * sizeof(page_list[0]));
page_list[ARRAY_SIZE(page_list) - 1] = page_index;
at->list_index--;
master_at.list_index--;
}
/* Reshuffle flash contents dropping deleted objects. */
test_export_static enum ec_error_list compact_nvmem(void)
{
const void *fence_ph;
enum ec_error_list rv = EC_SUCCESS;
size_t before;
struct nn_container *ch;
struct access_tracker at = {};
int saved_object_count;
int final_delimiter_needed = 1;
/* How much space was used before compaction. */
before = total_used_size();
/* One page is enough even for the largest object. */
ch = get_scratch_buffer(CONFIG_FLASH_BANK_SIZE);
/*
* Page where we should stop compaction, all pages before this would
* be recycled.
*/
fence_ph = master_at.mt.ph;
saved_object_count = 0;
do {
switch (get_next_object(&at, ch, 0)) {
case EC_SUCCESS:
break;
case EC_ERROR_MEMORY_ALLOCATION:
shared_mem_release(ch);
return EC_SUCCESS;
default:
/*
* The error has been reported already.
*
* This must be compaction after startup with
* inconsistent nvmemory state, let's make sure the
* top page is recycled.
*/
if (at.mt.ph != fence_ph)
release_flash_page(&at);
shared_mem_release(ch);
return EC_ERROR_INVAL;
}
/* Re-store the object in compacted flash. */
switch (ch->container_type) {
case NN_OBJ_TUPLE:
case NN_OBJ_TPM_RESERVED:
case NN_OBJ_TPM_EVICTABLE:
ch->generation++;
if (save_container(ch) != EC_SUCCESS) {
ccprintf("%s: Saving FAILED\n", __func__);
shared_mem_release(ch);
return EC_ERROR_INVAL;
}
saved_object_count++;
break;
default:
break;
}
if (at.list_index != 0) {
/*
* We are done with a pre-compaction page, use a
* delimiter to indicate that a bunch of objects are
* being deleted and finalize the delimiter once the
* old page is erased.
*
* Return the erased page to the pool of empty pages
* and rearrange the list of active pages.
*/
const void *del;
if (saved_object_count) {
del = page_cursor(&master_at.mt);
add_delimiter();
}
release_flash_page(&at);
#if defined(NVMEM_TEST_BUILD)
if (failure_mode == TEST_FAIL_WHEN_COMPACTING) {
shared_mem_release(ch);
return EC_SUCCESS;
}
#endif
if (saved_object_count) {
finalize_delimiter(del);
saved_object_count = 0;
}
/*
* No need in another delimiter if data ends on a page
* boundary.
*/
final_delimiter_needed = 0;
} else {
final_delimiter_needed = 1;
}
} while (at.mt.ph != fence_ph);
shared_mem_release(ch);
if (final_delimiter_needed)
add_final_delimiter();
CPRINTS("Compaction done, went from %d to %d bytes", before,
total_used_size());
return rv;
}
static void start_new_flash_page(size_t data_size)
{
struct nn_page_header ph = {};
ph.data_offset = sizeof(ph) + data_size;
ph.page_number = master_at.mt.ph->page_number + 1;
ph.page_hash = calculate_page_header_hash(&ph);
master_at.list_index++;
if (master_at.list_index == ARRAY_SIZE(page_list))
report_no_payload_failure(NVMEMF_PAGE_LIST_OVERFLOW);
master_at.mt.ph =
(const void *)(((uintptr_t)page_list[master_at.list_index] *
CONFIG_FLASH_BANK_SIZE) +
CONFIG_PROGRAM_MEMORY_BASE);
write_to_flash(master_at.mt.ph, &ph, sizeof(ph));
master_at.mt.data_offset = sizeof(ph);
}
/*
* Save in the flash an object represented by the passed in container. Add new
* pages to the list of used pages if necessary.
*/
static enum ec_error_list save_object(const struct nn_container *cont)
{
const void *save_data = cont;
size_t save_size = aligned_container_size(cont);
size_t top_room;
#if defined(NVMEM_TEST_BUILD)
if (failure_mode == TEST_FAILED_HASH)
save_size -= sizeof(uint32_t);
#endif
top_room = CONFIG_FLASH_BANK_SIZE - master_at.mt.data_offset;
if (save_size >= top_room) {
/* Let's finish the current page. */
write_to_flash((uint8_t *)master_at.mt.ph +
master_at.mt.data_offset,
cont, top_room);
/* Remaining data and size to be written on the next page. */
save_data = (const void *)((uintptr_t)save_data + top_room);
save_size -= top_room;
start_new_flash_page(save_size);
#if defined(NVMEM_TEST_BUILD)
if (save_size && (failure_mode == TEST_SPANNING_PAGES)) {
ccprintf("%s:%d corrupting...\n", __func__, __LINE__);
return EC_SUCCESS;
}
#endif
}
if (save_size) {
write_to_flash((uint8_t *)master_at.mt.ph +
master_at.mt.data_offset,
save_data, save_size);
master_at.mt.data_offset += save_size;
}
return EC_SUCCESS;
}
/*
* Functions to check if the passed in blob is all zeros or all 0xff, in both
* cases would be considered an uninitialized value. This is used when
* marshaling certaing structures and PCRs.
*/
static int is_all_value(const uint8_t *p, size_t size, uint8_t value)
{
size_t i;
for (i = 0; i < size; i++)
if (p[i] != value)
return 0;
return 1;
}
test_export_static int is_uninitialized(const void *p, size_t size)
{
return is_all_value(p, size, 0xff);
}
static int is_all_zero(const void *p, size_t size)
{
return is_all_value(p, size, 0);
}
static int is_empty(const void *pcr_base, size_t pcr_size)
{
return is_uninitialized(pcr_base, pcr_size) ||
is_all_zero(pcr_base, pcr_size);
}
/*
* A convenience function checking if the passed in blob is not empty, and if
* so - save the blob in the destination memory.
*
* Return number of bytes placed in dst or zero, if the blob was empty.
*/
static size_t copy_pcr(const uint8_t *pcr_base, size_t pcr_size, uint8_t *dst)
{
/*
* We rely on the fact that all 16 PCRs of every PCR bank saved in the
* NVMEM's reserved space are originally set to all zeros.
*
* If all 0xFF is read - this is considered an artifact of trying to
* retrieve PCRs from legacy flash snapshot from the state when PCRs
* were not saved in the reserved space at all, i.e. also indicates an
* empty PCR.
*/
if (is_empty(pcr_base, pcr_size))
return 0; /* No need to save this. */
memcpy(dst, pcr_base, pcr_size);
return pcr_size;
}
/*
* A convenience structure and array, allowing quick access to PCR banks
* contained in the STATE_CLEAR_DATA:pcrSave field. This helps when
* marshailing/unmarshaling PCR contents.
*/
struct pcr_descriptor {
uint16_t pcr_array_offset;
uint8_t pcr_size;
} __packed;
static const struct pcr_descriptor pcr_arrays[] = {
{offsetof(PCR_SAVE, sha1), SHA1_DIGEST_SIZE},
{offsetof(PCR_SAVE, sha256), SHA256_DIGEST_SIZE},
{offsetof(PCR_SAVE, sha384), SHA384_DIGEST_SIZE},
{offsetof(PCR_SAVE, sha512), SHA512_DIGEST_SIZE}
};
#define NUM_OF_PCRS (ARRAY_SIZE(pcr_arrays) * NUM_STATIC_PCR)
/* Just in case we ever get to reducing the PCR set one way or another. */
BUILD_ASSERT(ARRAY_SIZE(pcr_arrays) == 4);
BUILD_ASSERT(NUM_OF_PCRS == 64);
/*
* Iterate over PCRs contained in the STATE_CLEAR_DATA structure in the NVMEM
* cache and save nonempty ones in the flash.
*/
static void migrate_pcr(STATE_CLEAR_DATA *scd, size_t array_index,
size_t pcr_index, struct nn_container *ch)
{
const struct pcr_descriptor *pdsc;
uint8_t *p_container_body;
uint8_t *pcr_base;
uint8_t reserved_index; /* Unique ID of this PCR in reserved storage. */
p_container_body = (uint8_t *)(ch + 1);
pdsc = pcr_arrays + array_index;
pcr_base = (uint8_t *)&scd->pcrSave + pdsc->pcr_array_offset +
pdsc->pcr_size * pcr_index;
reserved_index = NV_VIRTUAL_RESERVE_LAST +
array_index * NUM_STATIC_PCR + pcr_index;
if (!copy_pcr(pcr_base, pdsc->pcr_size, p_container_body + 1))
return;
p_container_body[0] = reserved_index;
ch->size = pdsc->pcr_size + 1;
save_container(ch);
}
/*
* Some NVMEM structures end up in the NVMEM cache with a wrong alignment. If
* a passed in pointer is not aligned at a 4 byte boundary, this function will
* save the 4 bytes above the blob in the passed in space and then move the
* blob up so that it is properly aligned.
*/
static void *preserve_struct(void *p, size_t size, uint32_t *preserved)
{
uint32_t misalignment = ((uintptr_t)p & 3);
void *new_p;
if (!misalignment)
return p; /* Nothing to adjust. */
memcpy(preserved, (uint8_t *)p + size, sizeof(*preserved));
new_p = (void *)((((uintptr_t)p) + 3) & ~3);
memmove(new_p, p, size);
return new_p;
}
static void maybe_restore_struct(void *new_p, void *old_p, size_t size,
uint32_t *preserved)
{
if (!memcmp(new_p, old_p, size))
return;
memmove(old_p, new_p, size);
memcpy((uint8_t *)old_p + size, preserved, sizeof(*preserved));
}
/*
* Note that PCRs are not marshaled here, but the rest of the structre, below
* and above the PCR array is.
*/
static uint16_t marshal_state_clear(STATE_CLEAR_DATA *scd, uint8_t *dst)
{
PCR_AUTHVALUE *new_pav;
STATE_CLEAR_DATA *new_scd;
size_t bottom_size;
size_t i;
size_t top_size;
uint32_t preserved;
uint8_t *base;
int room;
bottom_size = offsetof(STATE_CLEAR_DATA, pcrSave);
top_size = sizeof(scd->pcrAuthValues);
if (is_empty(scd, bottom_size) &&
is_empty(&scd->pcrAuthValues, top_size) &&
is_empty(&scd->pcrSave.pcrCounter, sizeof(scd->pcrSave.pcrCounter)))
return 0;
/* Marshaling STATE_CLEAR_DATA will never need this much. */
room = CONFIG_FLASH_BANK_SIZE;
new_scd = preserve_struct(scd, bottom_size, &preserved);
base = dst;
*dst++ = (!!new_scd->shEnable) | ((!!new_scd->ehEnable) << 1) |
((!!new_scd->phEnableNV) << 2);
memcpy(dst, &new_scd->platformAlg, sizeof(new_scd->platformAlg));
dst += sizeof(new_scd->platformAlg);
room -= (dst - base);
TPM2B_DIGEST_Marshal(&new_scd->platformPolicy, &dst, &room);
TPM2B_AUTH_Marshal(&new_scd->platformAuth, &dst, &room);
memcpy(dst, &new_scd->pcrSave.pcrCounter,
sizeof(new_scd->pcrSave.pcrCounter));
dst += sizeof(new_scd->pcrSave.pcrCounter);
room -= sizeof(new_scd->pcrSave.pcrCounter);
maybe_restore_struct(new_scd, scd, bottom_size, &preserved);
new_pav = preserve_struct(&scd->pcrAuthValues, top_size, &preserved);
for (i = 0; i < ARRAY_SIZE(new_scd->pcrAuthValues.auth); i++)
TPM2B_DIGEST_Marshal(new_pav->auth + i, &dst, &room);
maybe_restore_struct(new_pav, &scd->pcrAuthValues, top_size,
&preserved);
return dst - base;
}
static uint16_t marshal_state_reset_data(STATE_RESET_DATA *srd, uint8_t *dst)
{
STATE_RESET_DATA *new_srd;
uint32_t preserved;
uint8_t *base;
int room;
if (is_empty(srd, sizeof(*srd)))
return 0;
/* Marshaling STATE_RESET_DATA will never need this much. */
room = CONFIG_FLASH_BANK_SIZE;
new_srd = preserve_struct(srd, sizeof(*srd), &preserved);
base = dst;
TPM2B_AUTH_Marshal(&new_srd->nullProof, &dst, &room);
TPM2B_DIGEST_Marshal((TPM2B_DIGEST *)(&new_srd->nullSeed), &dst, &room);
UINT32_Marshal(&new_srd->clearCount, &dst, &room);
UINT64_Marshal(&new_srd->objectContextID, &dst, &room);
memcpy(dst, new_srd->contextArray, sizeof(new_srd->contextArray));
room -= sizeof(new_srd->contextArray);
dst += sizeof(new_srd->contextArray);
memcpy(dst, &new_srd->contextCounter, sizeof(new_srd->contextCounter));
room -= sizeof(new_srd->contextCounter);
dst += sizeof(new_srd->contextCounter);
TPM2B_DIGEST_Marshal(&new_srd->commandAuditDigest, &dst, &room);
UINT32_Marshal(&new_srd->restartCount, &dst, &room);
UINT32_Marshal(&new_srd->pcrCounter, &dst, &room);
#ifdef TPM_ALG_ECC
UINT64_Marshal(&new_srd->commitCounter, &dst, &room);
TPM2B_NONCE_Marshal(&new_srd->commitNonce, &dst, &room);
memcpy(dst, new_srd->commitArray, sizeof(new_srd->commitArray));
room -= sizeof(new_srd->commitArray);
dst += sizeof(new_srd->commitArray);
#endif
maybe_restore_struct(new_srd, srd, sizeof(*srd), &preserved);
return dst - base;
}
/*
* Migrate all reserved objects found in the NVMEM cache after intializing
* from legacy NVMEM storage.
*/
static enum ec_error_list migrate_tpm_reserved(struct nn_container *ch)
{
STATE_CLEAR_DATA *scd = NULL;
STATE_RESET_DATA *srd;
size_t pcr_type_index;
uint8_t *p_tpm_nvmem = nvmem_cache_base(NVMEM_TPM);
uint8_t *p_container_body = (uint8_t *)(ch + 1);
uint8_t index;
ch->container_type = ch->container_type_copy = NN_OBJ_TPM_RESERVED;
for (index = 0; index < NV_VIRTUAL_RESERVE_LAST; index++) {
NV_RESERVED_ITEM ri;
int copy_needed = 1;
NvGetReserved(index, &ri);
p_container_body[0] = index;
switch (index) {
case NV_STATE_CLEAR:
scd = (STATE_CLEAR_DATA *)(p_tpm_nvmem + ri.offset);
ri.size =
marshal_state_clear(scd, p_container_body + 1);
copy_needed = 0;
break;
case NV_STATE_RESET:
srd = (STATE_RESET_DATA *)(p_tpm_nvmem + ri.offset);
ri.size = marshal_state_reset_data(
srd, p_container_body + 1);
copy_needed = 0;
break;
}
if (copy_needed) {
/*
* Copy data into the stage area unless already done
* by marshaling function above.
*/
memcpy(p_container_body + 1, p_tpm_nvmem + ri.offset,
ri.size);
}
ch->size = ri.size + 1;
save_container(ch);
}
/*
* Now all components but the PCRs from STATE_CLEAR_DATA have been
* saved, let's deal with those PCR arrays. We want to save each PCR
* in a separate container, as if all PCRs are extended, the total
* combined size of the arrays would exceed flash page size. Also,
* PCRs are most likely to change one or very few at a time.
*/
for (pcr_type_index = 0; pcr_type_index < ARRAY_SIZE(pcr_arrays);
pcr_type_index++) {
size_t pcr_index;
for (pcr_index = 0; pcr_index < NUM_STATIC_PCR; pcr_index++)
migrate_pcr(scd, pcr_type_index, pcr_index, ch);
}
return EC_SUCCESS;
}
/*
* Migrate all evictable objects found in the NVMEM cache after intializing
* from legacy NVMEM storage.
*/
static enum ec_error_list migrate_objects(struct nn_container *ch)
{
uint32_t next_obj_base;
uint32_t obj_base;
uint32_t obj_size;
void *obj_addr;
ch->container_type = ch->container_type_copy = NN_OBJ_TPM_EVICTABLE;
obj_base = s_evictNvStart;
obj_addr = nvmem_cache_base(NVMEM_TPM) + obj_base;
memcpy(&next_obj_base, obj_addr, sizeof(next_obj_base));
while (next_obj_base && (next_obj_base <= s_evictNvEnd)) {
obj_size = next_obj_base - obj_base - sizeof(obj_size);
memcpy(ch + 1, (uint32_t *)obj_addr + 1, obj_size);
ch->size = obj_size;
save_container(ch);
obj_base = next_obj_base;
obj_addr = nvmem_cache_base(NVMEM_TPM) + obj_base;
memcpy(&next_obj_base, obj_addr, sizeof(next_obj_base));
}
return EC_SUCCESS;
}
static enum ec_error_list migrate_tpm_nvmem(struct nn_container *ch)
{
/* Call this to initialize NVMEM indices. */
NvEarlyStageFindHandle(0);
migrate_tpm_reserved(ch);
migrate_objects(ch);
return EC_SUCCESS;
}
static enum ec_error_list save_var(const uint8_t *key, uint8_t key_len,
const uint8_t *val, uint8_t val_len,
struct max_var_container *vc)
{
const int total_size =
key_len + val_len + offsetof(struct max_var_container, body);
enum ec_error_list rv;
int local_alloc = !vc;
if (local_alloc) {
vc = get_scratch_buffer(total_size);
vc->c_header.generation = 0;
}
/* Fill up tuple body. */
vc->t_header.key_len = key_len;
vc->t_header.val_len = val_len;
memcpy(vc->body, key, key_len);
memcpy(vc->body + key_len, val, val_len);
/* Set up container header. */
vc->c_header.container_type_copy = vc->c_header.container_type =
NN_OBJ_TUPLE;
vc->c_header.encrypted = 1;
vc->c_header.size = sizeof(struct tuple) + val_len + key_len;
rv = save_container(&vc->c_header);
if (rv == EC_SUCCESS)
total_var_space += key_len + val_len;
if (local_alloc)
shared_mem_release(vc);
return rv;
}
/*
* Migrate all (key, value) pairs found in the NVMEM cache after intializing
* from legacy NVMEM storage.
*/
static enum ec_error_list migrate_vars(struct nn_container *ch)
{
const struct tuple *var;
/*
* During migration (key, value) pairs need to be manually copied from
* the NVMEM cache.
*/
set_local_copy();
var = NULL;
total_var_space = 0;
while ((var = legacy_getnextvar(var)) != NULL)
save_var(var->data_, var->key_len, var->data_ + var->key_len,
var->val_len, (struct max_var_container *)ch);
return EC_SUCCESS;
}
static int erase_partition(unsigned int act_partition, int erase_backup)
{
enum ec_error_list rv;
size_t flash_base;
/*
* This is the first time we save using the new scheme, let's prepare
* the flash space. First determine which half is the backup now and
* erase it.
*/
flash_base = (act_partition ^ erase_backup) ? CONFIG_FLASH_NVMEM_BASE_A
: CONFIG_FLASH_NVMEM_BASE_B;
flash_base -= CONFIG_PROGRAM_MEMORY_BASE;
rv = flash_physical_erase(flash_base, NVMEM_PARTITION_SIZE);
if (rv != EC_SUCCESS) {
ccprintf("%s: flash erase failed\n", __func__);
return -rv;
}
return flash_base + CONFIG_FLASH_BANK_SIZE;
}
/*
* This function is called once in a lifetime, when Cr50 boots up and a legacy
* partition if found in the flash.
*/
enum ec_error_list new_nvmem_migrate(unsigned int act_partition)
{
int flash_base;
int i;
int j;
struct nn_container *ch;
if (!crypto_enabled())
return EC_ERROR_INVAL;
/*
* This is the first time we save using the new scheme, let's prepare
* the flash space. First determine which half is the backup now and
* erase it.
*/
flash_base = erase_partition(act_partition, 1);
if (flash_base < 0) {
ccprintf("%s: backup partition erase failed\n", __func__);
return -flash_base;
}
ch = get_scratch_buffer(CONFIG_FLASH_BANK_SIZE);
lock_mutex(__LINE__);
/* Populate half of page_list with available page offsets. */
for (i = 0; i < ARRAY_SIZE(page_list) / 2; i++)
page_list[i] = flash_base / CONFIG_FLASH_BANK_SIZE + i;
set_first_page_header();
ch->encrypted = 1;
ch->generation = 0;
migrate_vars(ch);
migrate_tpm_nvmem(ch);
shared_mem_release(ch);
add_final_delimiter();
unlock_mutex(__LINE__);
if (browse_flash_contents(0) != EC_SUCCESS)
/* Never returns. */
report_no_payload_failure(NVMEMF_MIGRATION_FAILURE);
CPRINTS("Migration success, used %d bytes of flash",
total_used_size());
/*
* Now we can erase the active partition and add its flash to the pool.
*/
flash_base = erase_partition(act_partition, 0);
if (flash_base < 0)
/* Never returns. */
report_no_payload_failure(NVMEMF_LEGACY_ERASE_FAILURE);
/*
* Populate the second half of the page_list with pages retrieved from
* legacy partition.
*/
for (j = 0; j < ARRAY_SIZE(page_list) / 2; j++)
page_list[i + j] = flash_base / CONFIG_FLASH_BANK_SIZE + j;
return EC_SUCCESS;
}
/* Check if the passed in flash page is empty, if not - erase it. */
static void verify_empty_page(void *ph)
{
uint32_t *word_p = ph;
size_t i;
for (i = 0; i < (CONFIG_FLASH_BANK_SIZE / sizeof(*word_p)); i++) {
if (word_p[i] != (uint32_t)~0) {
CPRINTS("%s: corrupted page at %p!", __func__, word_p);
flash_physical_erase((uintptr_t)word_p -
CONFIG_PROGRAM_MEMORY_BASE,
CONFIG_FLASH_BANK_SIZE);
break;
}
}
}
/*
* At startup initialize the list of pages which contain NVMEM data and erased
* pages. The list (in fact an array containing indices of the pages) is
* sorted by the page number found in the page header. Pages which do not
* contain valid page header are checked to be erased and are placed at the
* tail of the list.
*/
static void init_page_list(void)
{
size_t i;
size_t j;
size_t page_list_index = 0;
size_t tail_index;
struct nn_page_header *ph;
tail_index = ARRAY_SIZE(page_list);
for (i = 0; i < ARRAY_SIZE(page_list); i++) {
uint32_t page_index;
/*
* This will yield indices of top pages first, first from the
* bottom half of the flash, and then from the top half. We
* know that flash is 512K in size, and pages are 2K in size,
* the indices will be in 123..127 and 251..255 range.
*/
if (i < (ARRAY_SIZE(page_list) / 2)) {
page_index = (CONFIG_FLASH_NEW_NVMEM_BASE_A -
CONFIG_PROGRAM_MEMORY_BASE) /
CONFIG_FLASH_BANK_SIZE +
i;
} else {
page_index = (CONFIG_FLASH_NEW_NVMEM_BASE_B -
CONFIG_PROGRAM_MEMORY_BASE) /
CONFIG_FLASH_BANK_SIZE -
ARRAY_SIZE(page_list) / 2 + i;
}
ph = flash_index_to_ph(page_index);
if (!page_header_is_valid(ph)) {
/*
* this is not a valid page, let's plug it in into the
* tail of the list.
*/
page_list[--tail_index] = page_index;
verify_empty_page(ph);
continue;
}
/* This seems a valid page, let's put it in order. */
for (j = 0; j < page_list_index; j++) {
struct nn_page_header *prev_ph;
prev_ph = list_element_to_ph(j);
if (prev_ph->page_number > ph->page_number) {
/* Need to move up. */
memmove(page_list + j + 1, page_list + j,
sizeof(page_list[0]) *
(page_list_index - j));
break;
}
}
page_list[j] = page_index;
page_list_index++;
}
if (!page_list_index) {
CPRINTS("Init nvmem from scratch");
set_first_page_header();
page_list_index++;
}
}
/*
* The passed in pointer contains marshaled STATE_CLEAR structure as retrieved
* from flash. This function unmarshals it and places in the NVMEM cache where
* it belongs. Note that PCRs were not marshaled.
*/
static void unmarshal_state_clear(uint8_t *pad, int size, uint32_t offset)
{
STATE_CLEAR_DATA *real_scd;
STATE_CLEAR_DATA *scd;
size_t i;
uint32_t preserved;
uint8_t booleans;
real_scd = (STATE_CLEAR_DATA *)((uint8_t *)nvmem_cache_base(NVMEM_TPM) +
offset);
memset(real_scd, 0, sizeof(*real_scd));
if (!size)
return;
memcpy(&preserved, real_scd + 1, sizeof(preserved));
scd = (void *)(((uintptr_t)real_scd + 3) & ~3);
/* Need proper unmarshal. */
booleans = *pad++;
scd->shEnable = !!(booleans & 1);
scd->ehEnable = !!(booleans & (1 << 1));
scd->phEnableNV = !!(booleans & (1 << 2));
size--;
memcpy(&scd->platformAlg, pad, sizeof(scd->platformAlg));
pad += sizeof(scd->platformAlg);
size -= sizeof(scd->platformAlg);
TPM2B_DIGEST_Unmarshal(&scd->platformPolicy, &pad, &size);
TPM2B_AUTH_Unmarshal(&scd->platformAuth, &pad, &size);
memcpy(&scd->pcrSave.pcrCounter, pad, sizeof(scd->pcrSave.pcrCounter));
pad += sizeof(scd->pcrSave.pcrCounter);
size -= sizeof(scd->pcrSave.pcrCounter);
for (i = 0; i < ARRAY_SIZE(scd->pcrAuthValues.auth); i++)
TPM2B_DIGEST_Unmarshal(scd->pcrAuthValues.auth + i, &pad,
&size);
memmove(real_scd, scd, sizeof(*scd));
memcpy(real_scd + 1, &preserved, sizeof(preserved));
}
/*
* The passed in pointer contains marshaled STATE_RESET structure as retrieved
* from flash. This function unmarshals it and places in the NVMEM cache where
* it belongs.
*/
static void unmarshal_state_reset(uint8_t *pad, int size, uint32_t offset)
{
STATE_RESET_DATA *real_srd;
STATE_RESET_DATA *srd;
uint32_t preserved;
real_srd = (STATE_RESET_DATA *)((uint8_t *)nvmem_cache_base(NVMEM_TPM) +
offset);
memset(real_srd, 0, sizeof(*real_srd));
if (!size)
return;
memcpy(&preserved, real_srd + 1, sizeof(preserved));
srd = (void *)(((uintptr_t)real_srd + 3) & ~3);
TPM2B_AUTH_Unmarshal(&srd->nullProof, &pad, &size);
TPM2B_DIGEST_Unmarshal((TPM2B_DIGEST *)(&srd->nullSeed), &pad, &size);
UINT32_Unmarshal(&srd->clearCount, &pad, &size);
UINT64_Marshal(&srd->objectContextID, &pad, &size);
memcpy(srd->contextArray, pad, sizeof(srd->contextArray));
size -= sizeof(srd->contextArray);
pad += sizeof(srd->contextArray);
memcpy(&srd->contextCounter, pad, sizeof(srd->contextCounter));
size -= sizeof(srd->contextCounter);
pad += sizeof(srd->contextCounter);
TPM2B_DIGEST_Unmarshal(&srd->commandAuditDigest, &pad, &size);
UINT32_Unmarshal(&srd->restartCount, &pad, &size);
UINT32_Unmarshal(&srd->pcrCounter, &pad, &size);
#ifdef TPM_ALG_ECC
UINT64_Unmarshal(&srd->commitCounter, &pad, &size);
TPM2B_NONCE_Unmarshal(&srd->commitNonce, &pad, &size);
memcpy(srd->commitArray, pad, sizeof(srd->commitArray));
size -= sizeof(srd->commitArray);
#endif
memmove(real_srd, srd, sizeof(*srd));
memcpy(real_srd + 1, &preserved, sizeof(preserved));
}
/*
* Based on the passed in index, find the location of the PCR in the NVMEM
* cache and copy it there.
*/
static void restore_pcr(size_t pcr_index, uint8_t *pad, size_t size)
{
const STATE_CLEAR_DATA *scd;
const struct pcr_descriptor *pcrd;
void *cached; /* This PCR's position in the NVMEM cache. */
if (pcr_index > NUM_OF_PCRS)
return; /* This is an error. */
pcrd = pcr_arrays + pcr_index / NUM_STATIC_PCR;
if (pcrd->pcr_size != size)
return; /* This is an error. */
scd = get_scd();
cached = (uint8_t *)&scd->pcrSave + pcrd->pcr_array_offset +
pcrd->pcr_size * (pcr_index % NUM_STATIC_PCR);
memcpy(cached, pad, size);
}
/* Restore a reserved object found in flash on initialization. */
static void restore_reserved(void *pad, size_t size, uint8_t *bitmap)
{
NV_RESERVED_ITEM ri;
uint16_t type;
void *cached;
/*
* Index is saved as a single byte, update pad to point at the
* payload.
*/
type = *(uint8_t *)pad++;
size--;
if (type < NV_VIRTUAL_RESERVE_LAST) {
NvGetReserved(type, &ri);
bitmap_bit_set(bitmap, type);
switch (type) {
case NV_STATE_CLEAR:
unmarshal_state_clear(pad, size, ri.offset);
break;
case NV_STATE_RESET:
unmarshal_state_reset(pad, size, ri.offset);
break;
default:
cached = ((uint8_t *)nvmem_cache_base(NVMEM_TPM) +
ri.offset);
memcpy(cached, pad, size);
break;
}
return;
}
restore_pcr(type - NV_VIRTUAL_RESERVE_LAST, pad, size);
}
/* Restore an evictable object found in flash on initialization. */
static void restore_object(void *pad, size_t size)
{
uint8_t *dest;
if (!next_evict_obj_base)
next_evict_obj_base = s_evictNvStart;
dest = ((uint8_t *)nvmem_cache_base(NVMEM_TPM) + next_evict_obj_base);
next_evict_obj_base += size + sizeof(next_evict_obj_base);
memcpy(dest, &next_evict_obj_base, sizeof(next_evict_obj_base));
dest += sizeof(next_evict_obj_base);
memcpy(dest, pad, size);
dest += size;
memset(dest, 0, sizeof(next_evict_obj_base));
}
/*
* When starting from scratch (flash fully erased) there would be no reserved
* objects in NVMEM, and for the commit to work properly, every single
* reserved object needs to be present in the flash so that its value is
* compared with the cache contents.
*
* There is also an off chance of a bug where a reserved value is lost in the
* flash - it would never be reinstated even after TPM reinitializes.
*
* The reserved_bitmap array is a bitmap of all detected reserved objects,
* those not in the array are initialized to a dummy initial value.
*/
static enum ec_error_list verify_reserved(uint8_t *reserved_bitmap,
struct nn_container *ch)
{
enum ec_error_list rv;
int i;
uint8_t *container_body;
int delimiter_needed = 0;
/* All uninitted reserved objects set to zero. */
memset(ch, 0, CONFIG_FLASH_BANK_SIZE);
ch->container_type = ch->container_type_copy = NN_OBJ_TPM_RESERVED;
ch->encrypted = 1;
container_body = (uint8_t *)(ch + 1);
rv = EC_SUCCESS;
for (i = 0; i < NV_VIRTUAL_RESERVE_LAST; i++) {
NV_RESERVED_ITEM ri;
if (bitmap_bit_check(reserved_bitmap, i))
continue;
NvGetReserved(i, &ri);
container_body[0] = i;
switch (i) {
/*
* No need to save these on initialization from
* scratch, unmarshaling code will properly expand
* size of zero.
*/
case NV_STATE_CLEAR:
case NV_STATE_RESET:
ri.size = 0;
break;
/*
* This is used for Ram Index field, prepended by
* size. Set the size to minimum, the size of the size
* field.
*/
case NV_RAM_INDEX_SPACE:
ri.size = sizeof(uint32_t);
break;
default:
break;
}
delimiter_needed = 1;
ch->size = ri.size + 1;
rv = save_container(ch);
/* Clean up encrypted contents. */
memset(container_body + 1, 0, ri.size);
if (rv != EC_SUCCESS)
break;
}
if (delimiter_needed && (rv == EC_SUCCESS))
add_final_delimiter();
return rv;
}
static enum ec_error_list invalidate_object(const struct nn_container *ch)
{
struct nn_container c_copy;
c_copy = *ch;
c_copy.container_type = NN_OBJ_OLD_COPY;
return write_to_flash(ch, &c_copy, sizeof(uint32_t));
}
static enum ec_error_list delete_object(const struct access_tracker *at,
struct nn_container *ch)
{
const void *flash_ch;
flash_ch = page_cursor(&at->ct);
if (memcmp(ch, flash_ch, sizeof(uint32_t)))
report_no_payload_failure(NVMEMF_PRE_ERASE_MISMATCH);
if (!del_candidates)
return invalidate_object(flash_ch);
/*
* Do not delete the object yet, save it in the list of delete
* candidates.
*/
if (del_candidates->num_candidates ==
ARRAY_SIZE(del_candidates->candidates))
report_no_payload_failure(NVMEMF_EXCESS_DELETE_OBJECTS);
del_candidates->candidates[del_candidates->num_candidates++] = flash_ch;
return EC_SUCCESS;
}
static enum ec_error_list verify_last_section(
const struct page_tracker *prev_del, struct nn_container *ch)
{
/*
* This is very inefficient, but we do this only when recovering from
* botched nvmem saves.
*
* For each object found between prev_del and last_del we need to
* check if there are earlier instances of these objects in the flash
* which are not yet deleted, and delete them if found.
*/
struct object {
uint8_t cont_type;
union {
uint32_t handle; /* For evictables. */
uint8_t id; /* For reserved objects. */
struct { /* For tuples. */
uint32_t key_hash;
uint8_t key_len;
};
};
};
struct new_objects {
uint8_t num_objects;
struct object objects[2 * MAX_DELETE_CANDIDATES];
};
struct access_tracker at;
struct new_objects *newobjs;
struct object *po;
uint8_t ctype;
struct page_tracker top_del;
struct max_var_container *vc;
int i;
newobjs = get_scratch_buffer(sizeof(struct new_objects));
at.mt = *prev_del;
for (i = 0; i < ARRAY_SIZE(page_list); i++)
if (list_element_to_ph(i) == at.mt.ph) {
at.list_index = i;
break;
}
po = newobjs->objects;
while (get_next_object(&at, ch, 0) == EC_SUCCESS) {
ctype = ch->container_type;
/* Speculative assignment, might be unused. */
po->cont_type = ctype;
switch (ctype) {
case NN_OBJ_TPM_RESERVED:
po->id = *((uint8_t *)(ch + 1));
break;
case NN_OBJ_TPM_EVICTABLE:
po->handle = *((uint32_t *)(ch + 1));
break;
case NN_OBJ_TUPLE:
vc = (struct max_var_container *)ch;
po->key_len = vc->t_header.key_len;
app_compute_hash_wrapper(vc->t_header.data_,
po->key_len, &po->key_hash,
sizeof(po->key_hash));
break;
default:
continue;
}
if (++(newobjs->num_objects) == ARRAY_SIZE(newobjs->objects))
/* Never returns. */
report_no_payload_failure(NVMEMF_SECTION_VERIFY);
po++;
}
/*
* Last object read from flash should have been a non-finalized
* delimiter.
*/
if (ch->container_type != NN_OBJ_TRANSACTION_DEL) {
struct nvmem_failure_payload fp;
fp.failure_type = NVMEMF_UNEXPECTED_LAST_OBJ;
fp.last_obj_type = ch->container_type;
/* Never returns. */
report_failure(&fp, sizeof(fp.last_obj_type));
}
/*
* Now we have a cache of of objects which were updated but their old
* instances could have been left in the flash. Let's iterate over the
* flash and delete those if found.
*/
memset(&at, 0, sizeof(at));
while ((at.mt.ph != prev_del->ph) &&
(at.mt.data_offset != prev_del->data_offset)) {
size_t i;
size_t key_size;
uint32_t key;
if (get_next_object(&at, ch, 0) != EC_SUCCESS)
report_no_payload_failure(NVMEMF_MISSING_OBJECT);
ctype = ch->container_type;
switch (ctype) {
case NN_OBJ_TPM_RESERVED:
key = *((uint8_t *)(ch + 1));
key_size = sizeof(uint8_t);
break;
case NN_OBJ_TPM_EVICTABLE:
key = *((uint32_t *)(ch + 1));
key_size = sizeof(uint32_t);
break;
case NN_OBJ_TUPLE:
vc = (struct max_var_container *)ch;
key_size = vc->t_header.key_len;
app_compute_hash_wrapper(vc->t_header.data_, key_size,
&key, sizeof(key));
break;
default:
continue;
}
for (i = 0, po = newobjs->objects; i < newobjs->num_objects;
i++, po++) {
if (po->cont_type != ctype)
continue;
if ((ctype == NN_OBJ_TPM_RESERVED) && (po->id != key))
continue;
if ((ctype == NN_OBJ_TPM_EVICTABLE) &&
(po->handle != key))
continue;
if ((ctype == NN_OBJ_TUPLE) &&
((po->key_len != key_size) ||
(key != po->key_hash)))
continue;
/*
* This indeed is a leftover which needs to be
* deleted.
*/
delete_object(&at, ch);
}
}
shared_mem_release(newobjs);
if (master_at.mt.data_offset > sizeof(struct nn_page_header)) {
top_del.ph = master_at.mt.ph;
top_del.data_offset =
master_at.mt.data_offset - sizeof(struct nn_container);
} else {
top_del.ph = list_element_to_ph(master_at.list_index - 1);
top_del.data_offset =
CONFIG_FLASH_BANK_SIZE - -sizeof(struct nn_container);
}
return finalize_delimiter(page_cursor(&top_del));
}
/*
* This function is called during initialization after the entire flash
* contents were scanned, to verify that flash is in a valid state.
*/
static enum ec_error_list verify_delimiter(struct nn_container *nc)
{
enum ec_error_list rv;
/* Used to read starting at last good delimiter. */
struct access_tracker dpt = {};
if ((master_at.list_index == 0) &&
(master_at.mt.data_offset == sizeof(struct nn_page_header))) {
/* This must be an init from scratch, no delimiter yet. */
if (!master_at.dt.ph)
return EC_SUCCESS;
/* This is bad, will have to wipe out everything. */
return EC_ERROR_INVAL;
}
if (nc->container_type_copy == NN_OBJ_TRANSACTION_DEL) {
if (nc->container_type == NN_OBJ_OLD_COPY)
return EC_SUCCESS;
/*
* The delimiter is there, but it has not been finalized,
* which means that there might be objects in the flash which
* were not updated after the last delimiter was written.
*/
return verify_last_section(&master_at.dt, nc);
}
/*
* The delimiter is not there, everything above the last verified
* delimiter must go.
*
* First, create a context for retrieving objects starting at the last
* valid delimiter, make sure list index is set properly.
*/
dpt.mt = master_at.dt;
if (dpt.mt.ph == master_at.mt.ph) {
dpt.list_index = master_at.list_index;
} else {
uint8_t i;
for (i = 0; i < master_at.list_index; i++)
if (list_element_to_ph(i) == dpt.mt.ph) {
dpt.list_index = i;
break;
}
}
while ((rv = get_next_object(&dpt, nc, 0)) == EC_SUCCESS)
delete_object(&dpt, nc);
if (rv == EC_ERROR_INVAL) {
/*
* There must have been an interruption of the saving process,
* let's wipe out flash to the end of the current page and
* compact the storage.
*/
size_t remainder_size;
const void *p = page_cursor(&master_at.ct);
if (dpt.ct.ph != dpt.mt.ph) {
/*
* The last retrieved object is spanning flash page
* boundary.
*
* If this is not the last object in the flash, this
* is an unrecoverable init failure.
*/
if ((dpt.mt.ph != master_at.mt.ph) ||
(list_element_to_ph(dpt.list_index - 1) !=
dpt.ct.ph))
report_no_payload_failure(
NVMEMF_CORRUPTED_INIT);
/*
* Let's erase the page where the last object spilled
* into.
*/
flash_physical_erase((uintptr_t)dpt.mt.ph -
CONFIG_PROGRAM_MEMORY_BASE,
CONFIG_FLASH_BANK_SIZE);
/*
* And move it to the available pages part of the
* pages list.
*/
master_at.list_index -= 1;
master_at.mt = dpt.ct;
}
remainder_size = CONFIG_FLASH_BANK_SIZE - dpt.ct.data_offset;
memset(nc, 0, remainder_size);
write_to_flash(p, nc, remainder_size);
/* Make sure compaction starts with the new page. */
start_new_flash_page(0);
compact_nvmem();
} else {
/* Add delimiter at the very top. */
add_final_delimiter();
}
/* Need to re-read the NVMEM cache. */
return EC_ERROR_TRY_AGAIN;
}
/*
* At startup iterate over flash contents and move TPM objects into the
* appropriate locations in the NVMEM cache.
*/
static enum ec_error_list retrieve_nvmem_contents(void)
{
int rv;
int tries;
struct max_var_container *vc;
struct nn_container *nc;
uint8_t res_bitmap[(NV_PSEUDO_RESERVE_LAST + 7) / 8];
/* No saved object will exceed CONFIG_FLASH_BANK_SIZE in size. */
nc = get_scratch_buffer(CONFIG_FLASH_BANK_SIZE);
/*
* Depending on the state of flash, we might have to do this three
* times.
*/
for (tries = 0; tries < 3; tries++) {
memset(&master_at, 0, sizeof(master_at));
memset(nvmem_cache_base(NVMEM_TPM), 0,
nvmem_user_sizes[NVMEM_TPM]);
memset(res_bitmap, 0, sizeof(res_bitmap));
next_evict_obj_base = 0;
while ((rv = get_next_object(&master_at, nc, 0)) ==
EC_SUCCESS) {
switch (nc->container_type) {
case NN_OBJ_TUPLE:
vc = (struct max_var_container *)nc;
total_var_space += vc->t_header.key_len +
vc->t_header.val_len;
break; /* Keep tuples in flash. */
case NN_OBJ_TPM_RESERVED:
restore_reserved(nc + 1, nc->size, res_bitmap);
break;
case NN_OBJ_TPM_EVICTABLE:
restore_object(nc + 1, nc->size);
break;
default:
break;
}
}
rv = verify_delimiter(nc);
if (rv != EC_ERROR_TRY_AGAIN)
break;
}
if (rv != EC_SUCCESS)
report_no_payload_failure(NVMEMF_UNRECOVERABLE_INIT);
rv = verify_reserved(res_bitmap, nc);
shared_mem_release(nc);
return rv;
}
enum ec_error_list new_nvmem_init(void)
{
enum ec_error_list rv;
timestamp_t start, init;
if (!crypto_enabled())
return EC_ERROR_INVAL;
init_in_progress = 1;
total_var_space = 0;
/* Initialize NVMEM indices. */
NvEarlyStageFindHandle(0);
lock_mutex(__LINE__);
init_page_list();
start = get_time();
rv = retrieve_nvmem_contents();
init = get_time();
unlock_mutex(__LINE__);
init_in_progress = 0;
CPRINTS("init took %d", (uint32_t)(init.val - start.val));
return rv;
}
/*
* Browse through the flash storage and save all evictable objects' offsets in
* the passed in array. This is used to keep track of objects added or deleted
* by the TPM library.
*/
test_export_static size_t init_object_offsets(uint16_t *offsets, size_t count)
{
size_t num_objects = 0;
uint32_t next_obj_base;
uint32_t obj_base;
void *obj_addr;
obj_base = s_evictNvStart;
obj_addr = (uint8_t *)nvmem_cache_base(NVMEM_TPM) + obj_base;
memcpy(&next_obj_base, obj_addr, sizeof(next_obj_base));
while (next_obj_base && (next_obj_base <= s_evictNvEnd)) {
if (num_objects == count) {
/* What do we do here?! */
ccprintf("Too many objects!\n");
break;
}
offsets[num_objects++] =
obj_base - s_evictNvStart + sizeof(next_obj_base);
obj_addr = nvmem_cache_base(NVMEM_TPM) + next_obj_base;
obj_base = next_obj_base;
memcpy(&next_obj_base, obj_addr, sizeof(next_obj_base));
}
return num_objects;
}
static enum ec_error_list update_object(const struct access_tracker *at,
struct nn_container *ch,
void *cached_object, size_t new_size)
{
size_t copy_size = new_size;
size_t preserved_size;
uint32_t preserved_hash;
uint8_t *dst = (uint8_t *)(ch + 1);
preserved_size = ch->size;
preserved_hash = ch->container_hash;
/*
* Need to copy data into the container, skip reserved type if it is a
* reserved object.
*/
if (ch->container_type == NN_OBJ_TPM_RESERVED) {
dst++;
copy_size--;
}
memcpy(dst, cached_object, copy_size);
ch->generation++;
ch->size = new_size;
save_container(ch);
ch->generation--;
ch->size = preserved_size;
ch->container_hash = preserved_hash;
return delete_object(at, ch);
}
static enum ec_error_list update_pcr(const struct access_tracker *at,
struct nn_container *ch, uint8_t index,
uint8_t *cached)
{
uint8_t preserved;
cached--;
preserved = cached[0];
cached[0] = index;
update_object(at, ch, cached, ch->size);
cached[0] = preserved;
return EC_SUCCESS;
}
static enum ec_error_list save_pcr(struct nn_container *ch,
uint8_t reserved_index, const void *pcr,
size_t pcr_size)
{
uint8_t *container_body;
ch->container_type = ch->container_type_copy = NN_OBJ_TPM_RESERVED;
ch->encrypted = 1;
ch->size = pcr_size + 1;
ch->generation = 0;
container_body = (uint8_t *)(ch + 1);
container_body[0] = reserved_index;
memcpy(container_body + 1, pcr, pcr_size);
return save_container(ch);
}
static enum ec_error_list maybe_save_pcr(struct nn_container *ch,
size_t pcr_index)
{
const STATE_CLEAR_DATA *scd;
const struct pcr_descriptor *pcrd;
const void *cached;
size_t pcr_size;
pcrd = pcr_arrays + pcr_index / NUM_STATIC_PCR;
scd = get_scd();
pcr_size = pcrd->pcr_size;
cached = (const uint8_t *)&scd->pcrSave + pcrd->pcr_array_offset +
pcr_size * (pcr_index % NUM_STATIC_PCR);
if (is_empty(cached, pcr_size))
return EC_SUCCESS;
return save_pcr(ch, pcr_index + NV_VIRTUAL_RESERVE_LAST, cached,
pcr_size);
}
/*
* The process_XXX functions below are used to check and if necessary add,
* update or delete objects from the flash based on the NVMEM cache
* contents.
*/
static enum ec_error_list process_pcr(const struct access_tracker *at,
struct nn_container *ch, uint8_t index,
const uint8_t *saved, uint8_t *pcr_bitmap)
{
STATE_CLEAR_DATA *scd;
const struct pcr_descriptor *pcrd;
size_t pcr_bitmap_index;
size_t pcr_index;
size_t pcr_size;
uint8_t *cached;
pcr_bitmap_index = index - NV_VIRTUAL_RESERVE_LAST;
if (pcr_bitmap_index > NUM_OF_PCRS)
return EC_ERROR_INVAL;
pcrd = pcr_arrays + pcr_bitmap_index / NUM_STATIC_PCR;
pcr_index = pcr_bitmap_index % NUM_STATIC_PCR;
pcr_size = pcrd->pcr_size;
if (pcr_size != (ch->size - 1))
return EC_ERROR_INVAL; /* This is an error. */
/* Find out base address of the cached PCR. */
scd = get_scd();
cached = (uint8_t *)&scd->pcrSave + pcrd->pcr_array_offset +
pcr_size * pcr_index;
/* Set bitmap bit to indicate that this PCR was looked at. */
bitmap_bit_set(pcr_bitmap, pcr_bitmap_index);
if (memcmp(saved, cached, pcr_size))
return update_pcr(at, ch, index, cached);
return EC_SUCCESS;
}
static enum ec_error_list process_reserved(const struct access_tracker *at,
struct nn_container *ch,
uint8_t *pcr_bitmap)
{
NV_RESERVED_ITEM ri;
size_t new_size;
uint8_t *saved;
uint8_t index;
void *cached;
/*
* Find out this object's location in the cache (first byte of the
* contents is the index of the reserved object.
*/
saved = (uint8_t *)(ch + 1);
index = *saved++;
NvGetReserved(index, &ri);
if (ri.size) {
void *marshaled;
cached = (uint8_t *)nvmem_cache_base(NVMEM_TPM) + ri.offset;
/*
* For NV_STATE_CLEAR and NV_STATE_RESET cases Let's marshal
* cached data to be able to compare it with saved data.
*/
if (index == NV_STATE_CLEAR) {
marshaled = ((uint8_t *)(ch + 1)) + ch->size;
new_size = marshal_state_clear(cached, marshaled);
cached = marshaled;
} else if (index == NV_STATE_RESET) {
marshaled = ((uint8_t *)(ch + 1)) + ch->size;
new_size = marshal_state_reset_data(cached, marshaled);
cached = marshaled;
} else {
new_size = ri.size;
}
if ((new_size == (ch->size - 1)) &&
!memcmp(saved, cached, new_size))
return EC_SUCCESS;
return update_object(at, ch, cached, new_size + 1);
}
/* This must be a PCR. */
return process_pcr(at, ch, index, saved, pcr_bitmap);
}
static enum ec_error_list process_object(const struct access_tracker *at,
struct nn_container *ch,
uint16_t *tpm_object_offsets,
size_t *num_objects)
{
size_t i;
uint32_t cached_size;
uint32_t cached_type;
uint32_t flash_type;
uint32_t next_obj_base;
uint8_t *evict_start;
void *pcache;
evict_start = (uint8_t *)nvmem_cache_base(NVMEM_TPM) + s_evictNvStart;
memcpy(&flash_type, ch + 1, sizeof(flash_type));
for (i = 0; i < *num_objects; i++) {
/* Find TPM object in the NVMEM cache. */
pcache = evict_start + tpm_object_offsets[i];
memcpy(&cached_type, pcache, sizeof(cached_type));
if (cached_type == flash_type)
break;
}
if (i == *num_objects) {
/*
* This object is not in the cache any more, delete it from
* flash.
*/
return delete_object(at, ch);
}
memcpy(&next_obj_base, (uint8_t *)pcache - sizeof(next_obj_base),
sizeof(next_obj_base));
cached_size = next_obj_base - s_evictNvStart - tpm_object_offsets[i];
if ((cached_size != ch->size) || memcmp(ch + 1, pcache, cached_size)) {
/*
* Object changed. Let's delete the old copy and save the new
* one.
*/
update_object(at, ch, pcache, ch->size);
}
tpm_object_offsets[i] = tpm_object_offsets[*num_objects - 1];
*num_objects -= 1;
return EC_SUCCESS;
}
static enum ec_error_list save_new_object(uint16_t obj_base, void *buf)
{
size_t obj_size;
struct nn_container *ch = buf;
uint32_t next_obj_base;
void *obj_addr;
obj_addr = (uint8_t *)nvmem_cache_base(NVMEM_TPM) + obj_base +
s_evictNvStart;
memcpy(&next_obj_base, obj_addr - sizeof(next_obj_base),
sizeof(next_obj_base));
obj_size = next_obj_base - obj_base - s_evictNvStart;
ch->container_type_copy = ch->container_type = NN_OBJ_TPM_EVICTABLE;
ch->encrypted = 1;
ch->size = obj_size;
ch->generation = 0;
memcpy(ch + 1, obj_addr, obj_size);
return save_container(ch);
}
static enum ec_error_list new_nvmem_save_(void)
{
const void *fence_ph;
size_t i;
size_t num_objs;
struct nn_container *ch;
struct access_tracker at = {};
uint16_t fence_offset;
/* We don't foresee ever storing this many objects. */
uint16_t tpm_object_offsets[MAX_STORED_EVICTABLE_OBJECTS];
uint8_t pcr_bitmap[(NUM_STATIC_PCR * ARRAY_SIZE(pcr_arrays) + 7) / 8];
/* See if compaction is needed. */
if (master_at.list_index >= (ARRAY_SIZE(page_list) - 3)) {
enum ec_error_list rv;
rv = compact_nvmem();
if (rv != EC_SUCCESS)
return rv;
}
fence_ph = master_at.mt.ph;
fence_offset = master_at.mt.data_offset;
num_objs = init_object_offsets(tpm_object_offsets,
ARRAY_SIZE(tpm_object_offsets));
memset(pcr_bitmap, 0, sizeof(pcr_bitmap));
del_candidates = get_scratch_buffer(CONFIG_FLASH_BANK_SIZE +
sizeof(struct delete_candidates));
ch = (void *)(del_candidates + 1);
del_candidates->num_candidates = 0;
while ((fence_ph != at.mt.ph) || (fence_offset != at.mt.data_offset)) {
int rv;
rv = get_next_object(&at, ch, 0);
if (rv == EC_ERROR_MEMORY_ALLOCATION)
break;
if (rv != EC_SUCCESS) {
ccprintf("%s: failed to read flash when saving (%d)!\n",
__func__, rv);
shared_mem_release(ch);
return rv;
}
if (ch->container_type == NN_OBJ_TPM_RESERVED) {
process_reserved(&at, ch, pcr_bitmap);
continue;
}
if (ch->container_type == NN_OBJ_TPM_EVICTABLE) {
process_object(&at, ch, tpm_object_offsets, &num_objs);
continue;
}
}
/* Now save new objects, if any. */
for (i = 0; i < num_objs; i++)
save_new_object(tpm_object_offsets[i], ch);
/* And new pcrs, if any. */
for (i = 0; i < NUM_OF_PCRS; i++) {
if (bitmap_bit_check(pcr_bitmap, i))
continue;
maybe_save_pcr(ch, i);
}
#if defined(NVMEM_TEST_BUILD)
if (failure_mode == TEST_FAIL_WHEN_SAVING) {
shared_mem_release(del_candidates);
del_candidates = NULL;
return EC_SUCCESS;
}
#endif
/*
* Add a delimiter if there have been new containers added to the
* flash.
*/
if (del_candidates->num_candidates ||
(fence_offset != master_at.mt.data_offset) ||
(fence_ph != master_at.mt.ph)) {
const void *del = page_cursor(&master_at.mt);
add_delimiter();
if (del_candidates->num_candidates) {
/* Now delete objects which need to be deleted. */
for (i = 0; i < del_candidates->num_candidates; i++)
invalidate_object(
del_candidates->candidates[i]);
}
#if defined(NVMEM_TEST_BUILD)
if (failure_mode == TEST_FAIL_WHEN_INVALIDATING) {
shared_mem_release(del_candidates);
del_candidates = NULL;
return EC_SUCCESS;
}
#endif
finalize_delimiter(del);
}
shared_mem_release(del_candidates);
del_candidates = NULL;
return EC_SUCCESS;
}
enum ec_error_list new_nvmem_save(void)
{
enum ec_error_list rv;
if (!crypto_enabled())
return EC_ERROR_INVAL;
lock_mutex(__LINE__);
rv = new_nvmem_save_();
unlock_mutex(__LINE__);
return rv;
}
/* Caller must free memory allocated by this function! */
static struct max_var_container *find_var(const uint8_t *key, size_t key_len,
struct access_tracker *at)
{
int rv;
struct max_var_container *vc;
vc = get_scratch_buffer(CONFIG_FLASH_BANK_SIZE);
/*
* Let's iterate over all objects there are and look for matching
* tuples.
*/
while ((rv = get_next_object(at, &vc->c_header, 0)) == EC_SUCCESS) {
if (vc->c_header.container_type != NN_OBJ_TUPLE)
continue;
/* Verify consistency, first that the sizes match */
if ((vc->t_header.key_len + vc->t_header.val_len +
sizeof(vc->t_header)) != vc->c_header.size) {
ccprintf("%s: - inconsistent sizes!\n", __func__);
/* report error here. */
continue;
}
/* Ok, found a tuple, does the key match? */
if ((key_len == vc->t_header.key_len) &&
!memcmp(key, vc->body, key_len))
/* Yes, it does! */
return vc;
}
shared_mem_release(vc);
return NULL;
}
const struct tuple *getvar(const uint8_t *key, uint8_t key_len)
{
const struct max_var_container *vc;
struct access_tracker at = {};
if (!crypto_enabled())
return NULL;
if (!key || !key_len)
return NULL;
lock_mutex(__LINE__);
vc = find_var(key, key_len, &at);
unlock_mutex(__LINE__);
if (vc)
return &vc->t_header;
return NULL;
}
void freevar(const struct tuple *var)
{
void *vc;
if (!var)
return;
vc = (uint8_t *)var - offsetof(struct max_var_container, t_header);
shared_mem_release(vc);
}
static enum ec_error_list save_container(struct nn_container *nc)
{
uint32_t hash;
uint32_t salt[4];
nc->container_hash = 0;
app_compute_hash_wrapper(nc, sizeof(*nc) + nc->size, &hash,
sizeof(hash));
nc->container_hash = hash; /* This will truncate it. */
/* Skip transactions delimiters. */
if (nc->size) {
salt[0] = master_at.mt.ph->page_number;
salt[1] = master_at.mt.data_offset;
salt[2] = nc->container_hash;
salt[3] = 0;
if (!app_cipher(salt, nc + 1, nc + 1, nc->size))
report_no_payload_failure(NVMEMF_CIPHER_ERROR);
}
return save_object(nc);
}
static int setvar_(const uint8_t *key, uint8_t key_len, const uint8_t *val,
uint8_t val_len)
{
enum ec_error_list rv;
int erase_request;
size_t new_var_space;
size_t old_var_space;
struct max_var_container *vc;
struct access_tracker at = {};
const struct nn_container *del;
if (!key || !key_len)
return EC_ERROR_INVAL;
new_var_space = key_len + val_len;
if (new_var_space > MAX_VAR_BODY_SPACE)
/* Too much space would be needed. */
return EC_ERROR_INVAL;
erase_request = !val || !val_len;
/* See if compaction is needed. */
if (!erase_request &&
(master_at.list_index >= (ARRAY_SIZE(page_list) - 3))) {
rv = compact_nvmem();
if (rv != EC_SUCCESS)
return rv;
}
vc = find_var(key, key_len, &at);
if (erase_request) {
if (!vc)
/* Nothing to erase. */
return EC_SUCCESS;
rv = invalidate_object(
(struct nn_container *)((uintptr_t)at.ct.ph +
at.ct.data_offset));
if (rv == EC_SUCCESS)
total_var_space -=
vc->t_header.key_len + vc->t_header.val_len;
shared_mem_release(vc);
return rv;
}
/* Is this variable already there? */
if (!vc) {
/* No, it is not. Will it fit? */
if ((new_var_space + total_var_space) > MAX_VAR_TOTAL_SPACE)
/* No, it will not. */
return EC_ERROR_OVERFLOW;
rv = save_var(key, key_len, val, val_len, vc);
if (rv == EC_SUCCESS)
add_final_delimiter();
return rv;
}
/* The variable was found, let's see if the value is being changed. */
if (vc->t_header.val_len == val_len &&
!memcmp(val, vc->body + key_len, val_len)) {
shared_mem_release(vc);
return EC_SUCCESS;
}
/* Ok, the variable was found, and is of a different value. */
old_var_space = vc->t_header.val_len + vc->t_header.key_len;
if ((old_var_space < new_var_space) &&
((total_var_space + new_var_space - old_var_space) >
MAX_VAR_TOTAL_SPACE)) {
shared_mem_release(vc);
return EC_ERROR_OVERFLOW;
}
/* Save the new instance first with the larger generation number. */
vc->c_header.generation++;
rv = save_var(key, key_len, val, val_len, vc);
shared_mem_release(vc);
del = page_cursor(&master_at.mt);
#if defined(NVMEM_TEST_BUILD)
if (failure_mode == TEST_FAIL_SAVING_VAR)
return EC_SUCCESS;
#endif
add_delimiter();
if (rv == EC_SUCCESS) {
rv = invalidate_object(
(struct nn_container *)((uintptr_t)at.ct.ph +
at.ct.data_offset));
if (rv == EC_SUCCESS) {
total_var_space -= old_var_space;
#if defined(NVMEM_TEST_BUILD)
if (failure_mode != TEST_FAIL_FINALIZING_VAR)
#endif
finalize_delimiter(del);
}
}
return rv;
}
int setvar(const uint8_t *key, uint8_t key_len, const uint8_t *val,
uint8_t val_len)
{
int rv;
if (!crypto_enabled())
return EC_ERROR_INVAL;
lock_mutex(__LINE__);
rv = setvar_(key, key_len, val, val_len);
unlock_mutex(__LINE__);
return rv;
}
static void dump_contents(const struct nn_container *ch)
{
const uint8_t *buf = (const void *)ch;
size_t i;
size_t total_size = sizeof(*ch) + ch->size;
for (i = 0; i < total_size; i++) {
if (!(i % 16)) {
ccprintf("\n");
cflush();
}
ccprintf(" %02x", buf[i]);
}
ccprintf("\n");
}
/*
* Clear tpm data from nvmem. First fill up the current top page with erased
* objects, then compact the flash storage, removing all TPM related objects.
* This would guarantee that all pages where TPM objecs were stored would be
* erased.
*/
int nvmem_erase_tpm_data(void)
{
const uint8_t *key;
const uint8_t *val;
int rv;
struct nn_container *ch;
struct access_tracker at = {};
uint8_t saved_list_index;
uint8_t key_len;
if (!crypto_enabled())
return EC_ERROR_INVAL;
ch = get_scratch_buffer(CONFIG_FLASH_BANK_SIZE);
lock_mutex(__LINE__);
while (get_next_object(&at, ch, 0) == EC_SUCCESS) {
if ((ch->container_type != NN_OBJ_TPM_RESERVED) &&
(ch->container_type != NN_OBJ_TPM_EVICTABLE))
continue;
delete_object(&at, ch);
}
unlock_mutex(__LINE__);
shared_mem_release(ch);
/*
* Now fill up the current flash page with erased objects to make sure
* that it would be erased during next compaction. Use dummy key,
* value pairs as the erase objects.
*/
saved_list_index = master_at.list_index;
key = (const uint8_t *)nvmem_erase_tpm_data;
val = (const uint8_t *)nvmem_erase_tpm_data;
key_len = MAX_VAR_BODY_SPACE - 255;
do {
size_t to_go_in_page;
uint8_t val_len;
to_go_in_page =
CONFIG_FLASH_BANK_SIZE - master_at.mt.data_offset;
if (to_go_in_page >
(MAX_VAR_BODY_SPACE +
offsetof(struct max_var_container, body) - 1)) {
val_len = MAX_VAR_BODY_SPACE - key_len;
} else {
/*
* Let's not write more than we have to get over the
* page limit. The minimum size we need is:
*
* <container header size> + <tuple header size> + 2
*
* (where key and value are of one byte each).
*/
if (to_go_in_page <
(offsetof(struct max_var_container, body) + 2)) {
/*
* There is very little room left, even key
* and value of size of one each is enough to
* go over.
*/
key_len = 1;
val_len = 1;
} else {
size_t need_to_cover;
/* How much space key and value should cover? */
need_to_cover =
to_go_in_page -
offsetof(struct max_var_container,
body) + 1;
key_len = need_to_cover / 2;
val_len = need_to_cover - key_len;
}
}
if (setvar(key, key_len, val, val_len) != EC_SUCCESS)
ccprintf("%s: adding var failed!\n", __func__);
if (setvar(key, key_len, NULL, 0) != EC_SUCCESS)
ccprintf("%s: deleting var failed!\n", __func__);
} while (master_at.list_index != (saved_list_index + 1));
lock_mutex(__LINE__);
rv = compact_nvmem();
unlock_mutex(__LINE__);
if (rv == EC_SUCCESS)
rv = new_nvmem_init();
return rv;
}
/*
* Function which verifes flash contents integrity (and printing objects it
* finds, if requested by the caller). All objects' active and deleted alike
* integrity is verified by get_next_object().
*/
test_export_static enum ec_error_list browse_flash_contents(int print)
{
int active = 0;
int count = 0;
int rv = EC_SUCCESS;
size_t line_len = 0;
struct nn_container *ch;
struct access_tracker at = {};
if (!crypto_enabled()) {
ccprintf("Crypto services not available\n");
return EC_ERROR_INVAL;
}
ch = get_scratch_buffer(CONFIG_FLASH_BANK_SIZE);
lock_mutex(__LINE__);
while ((rv = get_next_object(&at, ch, 1)) == EC_SUCCESS) {
uint8_t ctype = ch->container_type;
count++;
if ((ctype != NN_OBJ_OLD_COPY) &&
(ctype != NN_OBJ_TRANSACTION_DEL))
active++;
if (print) {
char erased;
if (ctype == NN_OBJ_OLD_COPY)
erased = 'x';
else
erased = ' ';
if (ch->container_type_copy == NN_OBJ_TPM_RESERVED) {
ccprintf("%cR:%02x.%d ", erased,
*((uint8_t *)(ch + 1)),
ch->generation);
} else {
uint32_t index;
char tag;
switch (ch->container_type_copy) {
case NN_OBJ_TPM_EVICTABLE:
tag = 'E';
break;
case NN_OBJ_TUPLE:
tag = 'T';
break;
case NN_OBJ_TRANSACTION_DEL:
tag = 's'; /* 's' for separator. */
break;
default:
tag = '?';
break;
}
if (ch->container_type_copy !=
NN_OBJ_TRANSACTION_DEL)
memcpy(&index, ch + 1, sizeof(index));
else
index = 0;
ccprintf("%c%c:%08x.%d ", erased, tag, index,
ch->generation);
}
if (print > 1) {
dump_contents(ch);
continue;
}
if (line_len > 70) {
ccprintf("\n");
cflush();
line_len = 0;
} else {
line_len += 11;
}
}
}
unlock_mutex(__LINE__);
shared_mem_release(ch);
if (rv == EC_ERROR_MEMORY_ALLOCATION) {
ccprintf("%schecked %d objects, %d active\n", print ? "\n" : "",
count, active);
rv = EC_SUCCESS;
}
return rv;
}
static int command_dump_nvmem(int argc, char **argv)
{
int print = 1;
nvmem_disable_commits();
#ifdef CR50_DEV
/* Allow dumping ecnrypted NVMEM contents only to DEV builds. */
print += (argc > 1);
#endif
browse_flash_contents(print);
nvmem_enable_commits();
return 0;
}
DECLARE_SAFE_CONSOLE_COMMAND(dump_nvmem, command_dump_nvmem, "", "");