[PATCH 1/3] efi_loader: add SMBIOS table measurement
Ilias Apalodimas
ilias.apalodimas at linaro.org
Wed Sep 15 10:37:06 CEST 2021
Hi Kojima-san,
On Wed, Sep 15, 2021 at 02:15:44PM +0900, Masahisa Kojima wrote:
> TCG PC Client spec requires to measure the SMBIOS
> table that contain static configuration information
> (e.g. Platform Manufacturer Enterprise Number assigned by IANA,
> platform model number, Vendor and Device IDs for each SMBIOS table).
>
> The device and environment dependent information such as
> serial number is cleared to zero or space character for
> the measurement.
>
> This commit also fixes the following compiler warning:
>
> lib/smbios-parser.c:59:39: warning: cast to pointer from integer of
> different size [-Wint-to-pointer-cast]
> const struct smbios_header *header = (struct smbios_header *)entry->struct_table_address;
>
> Signed-off-by: Masahisa Kojima <masahisa.kojima at linaro.org>
> ---
> include/efi_loader.h | 2 +
> include/efi_tcg2.h | 15 ++++
> include/smbios.h | 13 ++++
> lib/efi_loader/Kconfig | 1 +
> lib/efi_loader/efi_boottime.c | 2 +
> lib/efi_loader/efi_smbios.c | 2 -
> lib/efi_loader/efi_tcg2.c | 84 ++++++++++++++++++++++
> lib/smbios-parser.c | 127 +++++++++++++++++++++++++++++++++-
> 8 files changed, 243 insertions(+), 3 deletions(-)
>
> diff --git a/include/efi_loader.h b/include/efi_loader.h
> index c440962fe5..13f0c24058 100644
> --- a/include/efi_loader.h
> +++ b/include/efi_loader.h
> @@ -308,6 +308,8 @@ extern const efi_guid_t efi_guid_capsule_report;
> extern const efi_guid_t efi_guid_firmware_management_protocol;
> /* GUID for the ESRT */
> extern const efi_guid_t efi_esrt_guid;
> +/* GUID of the SMBIOS table */
> +extern const efi_guid_t smbios_guid;
>
> extern char __efi_runtime_start[], __efi_runtime_stop[];
> extern char __efi_runtime_rel_start[], __efi_runtime_rel_stop[];
> diff --git a/include/efi_tcg2.h b/include/efi_tcg2.h
> index 5a1a36212e..da33f8a1d0 100644
> --- a/include/efi_tcg2.h
> +++ b/include/efi_tcg2.h
> @@ -215,6 +215,21 @@ struct efi_tcg2_uefi_variable_data {
> u8 variable_data[1];
> };
>
> +/**
> + * struct tdUEFI_HANDOFF_TABLE_POINTERS2 - event log structure of SMBOIS tables
> + * @table_description_size: size of table description
> + * @table_description: table description
> + * @number_of_tables: number of uefi configuration table
> + * @table_entry: uefi configuration table entry
> + */
> +#define SMBIOS_HANDOFF_TABLE_DESC "SmbiosTable"
> +struct smbios_handoff_table_pointers2 {
> + u8 table_description_size;
> + u8 table_description[sizeof(SMBIOS_HANDOFF_TABLE_DESC)];
> + u64 number_of_tables;
> + struct efi_configuration_table table_entry[1];
> +} __packed;
Is this included in any other struct or array? If not the last member could
be a flexible array member?
> +
> struct efi_tcg2_protocol {
> efi_status_t (EFIAPI * get_capability)(struct efi_tcg2_protocol *this,
> struct efi_tcg2_boot_service_capability *capability);
> diff --git a/include/smbios.h b/include/smbios.h
> index aa6b6f3849..0c22c0c489 100644
> --- a/include/smbios.h
> +++ b/include/smbios.h
> @@ -292,4 +292,17 @@ int smbios_update_version(const char *version);
> */
> int smbios_update_version_full(void *smbios_tab, const char *version);
>
> +/**
> + * smbios_prepare_measurement() - Update smbios table for the measurement
> + *
> + * TCG specification requires to measure static configuration information.
> + * This function clear the device dependent parameters such as
> + * serial number for the measurement.
> + *
> + * @entry: pointer to a struct smbios_entry
> + * @header: pointer to a struct smbios_header
> + */
> +void smbios_prepare_measurement(const struct smbios_entry *entry,
> + struct smbios_header *header);
> +
> #endif /* _SMBIOS_H_ */
> diff --git a/lib/efi_loader/Kconfig b/lib/efi_loader/Kconfig
> index dacc3b5881..ac1a281a36 100644
> --- a/lib/efi_loader/Kconfig
> +++ b/lib/efi_loader/Kconfig
> @@ -327,6 +327,7 @@ config EFI_TCG2_PROTOCOL
> select SHA384
> select SHA512
> select HASH
> + select SMBIOS_PARSER
> help
> Provide a EFI_TCG2_PROTOCOL implementation using the TPM hardware
> of the platform.
> diff --git a/lib/efi_loader/efi_boottime.c b/lib/efi_loader/efi_boottime.c
> index f0283b539e..701e2212c8 100644
> --- a/lib/efi_loader/efi_boottime.c
> +++ b/lib/efi_loader/efi_boottime.c
> @@ -86,6 +86,8 @@ const efi_guid_t efi_guid_event_group_reset_system =
> /* GUIDs of the Load File and Load File2 protocols */
> const efi_guid_t efi_guid_load_file_protocol = EFI_LOAD_FILE_PROTOCOL_GUID;
> const efi_guid_t efi_guid_load_file2_protocol = EFI_LOAD_FILE2_PROTOCOL_GUID;
> +/* GUID of the SMBIOS table */
> +const efi_guid_t smbios_guid = SMBIOS_TABLE_GUID;
>
> static efi_status_t EFIAPI efi_disconnect_controller(
> efi_handle_t controller_handle,
> diff --git a/lib/efi_loader/efi_smbios.c b/lib/efi_loader/efi_smbios.c
> index 2eb4cb1c1a..fc0b23397c 100644
> --- a/lib/efi_loader/efi_smbios.c
> +++ b/lib/efi_loader/efi_smbios.c
> @@ -13,8 +13,6 @@
> #include <mapmem.h>
> #include <smbios.h>
>
> -static const efi_guid_t smbios_guid = SMBIOS_TABLE_GUID;
> -
> /*
> * Install the SMBIOS table as a configuration table.
> *
> diff --git a/lib/efi_loader/efi_tcg2.c b/lib/efi_loader/efi_tcg2.c
> index cb48919223..7f47998a55 100644
> --- a/lib/efi_loader/efi_tcg2.c
> +++ b/lib/efi_loader/efi_tcg2.c
> @@ -14,6 +14,7 @@
> #include <efi_tcg2.h>
> #include <log.h>
> #include <malloc.h>
> +#include <smbios.h>
> #include <version.h>
> #include <tpm-v2.h>
> #include <u-boot/hash-checksum.h>
> @@ -1449,6 +1450,81 @@ error:
> return ret;
> }
>
> +/**
> + * tcg2_measure_smbios() - measure smbios table
> + *
> + * @dev: TPM device
> + * @entry: pointer to the smbios_entry structure
> + *
> + * Return: status code
> + */
> +static efi_status_t
> +tcg2_measure_smbios(struct udevice *dev,
> + const struct smbios_entry *entry)
> +{
> + efi_status_t ret;
> + struct smbios_header *smbios_copy;
> + struct smbios_handoff_table_pointers2 *event = NULL;
> + u32 event_size;
> +
> + /*
> + * TCG PC Client PFP Spec says
> + * "SMBIOS structures that contain static configuration information
> + * (e.g. Platform Manufacturer Enterprise Number assigned by IANA,
> + * platform model number, Vendor and Device IDs for each SMBIOS table)
> + * that is relevant to the security of the platform MUST be measured".
> + * Device dependent parameters such as serial number are cleared to
> + * zero or spaces for the measurement.
> + */
> + event_size = sizeof(struct smbios_handoff_table_pointers2) +
> + entry->struct_table_length -
> + FIELD_SIZEOF(struct efi_configuration_table, table);
Why do we have to subtract the efi_config_table table field here?
> + event = calloc(1, event_size);
> + if (!event) {
> + ret = EFI_OUT_OF_RESOURCES;
> + goto out;
> + }
> +
> + event->table_description_size = sizeof(SMBIOS_HANDOFF_TABLE_DESC);
> + memcpy(event->table_description, SMBIOS_HANDOFF_TABLE_DESC,
> + sizeof(SMBIOS_HANDOFF_TABLE_DESC));
> + put_unaligned_le64(1, &event->number_of_tables);
> + guidcpy(&event->table_entry[0].guid, &smbios_guid);
> + smbios_copy = (struct smbios_header *)((uintptr_t)&event->table_entry[0].table);
> + memcpy(&event->table_entry[0].table,
> + (void *)((uintptr_t)entry->struct_table_address),
> + entry->struct_table_length);
> +
> + smbios_prepare_measurement(entry, smbios_copy);
> +
> + ret = tcg2_measure_event(dev, 1, EV_EFI_HANDOFF_TABLES2, event_size,
> + (u8 *)event);
> + if (ret != EFI_SUCCESS)
> + goto out;
> +
> +out:
> + free(event);
> +
> + return ret;
> +}
> +
> +/**
> + * search_smbios_table() - search smbios table
> + *
> + * Return: pointer to the smbios table
> + */
> +static void *search_smbios_table(void)
Isn't find_smbios_table a better name?
> +{
> + u32 i;
> +
> + for (i = 0; i < systab.nr_tables; i++) {
> + if (!guidcmp(&smbios_guid, &systab.tables[i].guid))
> + return systab.tables[i].table;
> + }
> +
> + return NULL;
> +}
> +
> /**
> * efi_tcg2_measure_efi_app_invocation() - measure efi app invocation
> *
> @@ -1460,6 +1536,7 @@ efi_status_t efi_tcg2_measure_efi_app_invocation(void)
> u32 pcr_index;
> struct udevice *dev;
> u32 event = 0;
> + struct smbios_entry *entry;
>
> if (tcg2_efi_app_invoked)
> return EFI_SUCCESS;
> @@ -1485,6 +1562,13 @@ efi_status_t efi_tcg2_measure_efi_app_invocation(void)
> goto out;
> }
>
> + entry = (struct smbios_entry *)search_smbios_table();
> + if (entry) {
> + ret = tcg2_measure_smbios(dev, entry);
> + if (ret != EFI_SUCCESS)
> + goto out;
> + }
> +
> tcg2_efi_app_invoked = true;
> out:
> return ret;
> diff --git a/lib/smbios-parser.c b/lib/smbios-parser.c
> index 34203f952c..5e0bd8f4ca 100644
> --- a/lib/smbios-parser.c
> +++ b/lib/smbios-parser.c
> @@ -56,7 +56,7 @@ static const struct smbios_header *next_header(const struct smbios_header *curr)
> const struct smbios_header *smbios_header(const struct smbios_entry *entry, int type)
> {
> const unsigned int num_header = entry->struct_count;
> - const struct smbios_header *header = (struct smbios_header *)entry->struct_table_address;
> + const struct smbios_header *header = (struct smbios_header *)((uintptr_t)entry->struct_table_address);
>
> for (unsigned int i = 0; i < num_header; i++) {
> if (header->type == type)
> @@ -132,3 +132,128 @@ int smbios_update_version_full(void *smbios_tab, const char *version)
>
> return 0;
> }
> +
> +struct smbios_filter_param {
> + u32 offset;
> + u32 size;
> + bool is_string;
> +};
> +
> +struct smbios_filter_table {
> + int type;
> + struct smbios_filter_param *params;
> + u32 count;
> +};
> +
> +struct smbios_filter_param smbios_type1_filter_params[] = {
> + {offsetof(struct smbios_type1, serial_number),
> + FIELD_SIZEOF(struct smbios_type1, serial_number), true},
> + {offsetof(struct smbios_type1, uuid),
> + FIELD_SIZEOF(struct smbios_type1, uuid), false},
> + {offsetof(struct smbios_type1, wakeup_type),
> + FIELD_SIZEOF(struct smbios_type1, wakeup_type), false},
> +};
> +
> +struct smbios_filter_param smbios_type2_filter_params[] = {
> + {offsetof(struct smbios_type2, serial_number),
> + FIELD_SIZEOF(struct smbios_type2, serial_number), true},
> + {offsetof(struct smbios_type2, chassis_location),
> + FIELD_SIZEOF(struct smbios_type2, chassis_location), false},
> +};
> +
> +struct smbios_filter_param smbios_type3_filter_params[] = {
> + {offsetof(struct smbios_type3, serial_number),
> + FIELD_SIZEOF(struct smbios_type3, serial_number), true},
> + {offsetof(struct smbios_type3, asset_tag_number),
> + FIELD_SIZEOF(struct smbios_type3, asset_tag_number), true},
> +};
> +
> +struct smbios_filter_param smbios_type4_filter_params[] = {
> + {offsetof(struct smbios_type4, serial_number),
> + FIELD_SIZEOF(struct smbios_type4, serial_number), true},
> + {offsetof(struct smbios_type4, asset_tag),
> + FIELD_SIZEOF(struct smbios_type4, asset_tag), true},
> + {offsetof(struct smbios_type4, part_number),
> + FIELD_SIZEOF(struct smbios_type4, part_number), true},
> + {offsetof(struct smbios_type4, core_count),
> + FIELD_SIZEOF(struct smbios_type4, core_count), false},
> + {offsetof(struct smbios_type4, core_enabled),
> + FIELD_SIZEOF(struct smbios_type4, core_enabled), false},
> + {offsetof(struct smbios_type4, thread_count),
> + FIELD_SIZEOF(struct smbios_type4, thread_count), false},
> + {offsetof(struct smbios_type4, core_count2),
> + FIELD_SIZEOF(struct smbios_type4, core_count2), false},
> + {offsetof(struct smbios_type4, core_enabled2),
> + FIELD_SIZEOF(struct smbios_type4, core_enabled2), false},
> + {offsetof(struct smbios_type4, thread_count),
> + FIELD_SIZEOF(struct smbios_type4, thread_count2), false},
> + {offsetof(struct smbios_type4, voltage),
> + FIELD_SIZEOF(struct smbios_type4, voltage), false},
> +};
> +
> +struct smbios_filter_table smbios_filter_tables[] = {
> + {SMBIOS_SYSTEM_INFORMATION, smbios_type1_filter_params,
> + ARRAY_SIZE(smbios_type1_filter_params)},
> + {SMBIOS_BOARD_INFORMATION, smbios_type2_filter_params,
> + ARRAY_SIZE(smbios_type2_filter_params)},
> + {SMBIOS_SYSTEM_ENCLOSURE, smbios_type3_filter_params,
> + ARRAY_SIZE(smbios_type3_filter_params)},
> + {SMBIOS_PROCESSOR_INFORMATION, smbios_type4_filter_params,
> + ARRAY_SIZE(smbios_type4_filter_params)},
> +};
> +
> +static void clear_smbios_table(struct smbios_header *header,
> + struct smbios_filter_param *filter,
> + u32 count)
> +{
> + u32 i;
> + char *str;
> + u8 string_id;
> +
> + for (i = 0; i < count; i++) {
> + if (filter[i].is_string) {
> + string_id = *((u8 *)header + filter[i].offset);
> + if (string_id == 0) /* string is empty */
> + continue;
> + /*
> + * smbios_string() returns const value, but this
> + * function needs to clear the string.
> + */
> + str = (char *)smbios_string(header, string_id);
> + if (!str)
> + continue;
> + /* string is cleared to space */
> + memset(str, ' ', strlen(str));
Isn't this undefined behavior ? If the area pointed to by whatever
smbios_string() is ro that will crash?
> +
> + } else {
> + memset((void *)((u8 *)header + filter[i].offset),
> + 0, filter[i].size);
> + }
> + }
> +}
> +
> +void smbios_prepare_measurement(const struct smbios_entry *entry,
> + struct smbios_header *smbios_copy)
> +{
> + u32 i, j;
> + struct smbios_header *header;
> +
> + for (i = 0; i < ARRAY_SIZE(smbios_filter_tables); i++) {
> + header = smbios_copy;
> + for (j = 0; j < entry->struct_count; j++) {
> + if (header->type == smbios_filter_tables[i].type)
> + break;
> + /*
> + * next_header() returns the const value, but some
> + * members need to be cleared for the measurement.
> + */
> + header = (struct smbios_header *)next_header(header);
> + }
> + if (j >= entry->struct_count)
> + continue;
> +
> + clear_smbios_table(header,
> + smbios_filter_tables[i].params,
> + smbios_filter_tables[i].count);
> + }
> +}
> --
> 2.17.1
>
Regards
/Ilias
More information about the U-Boot
mailing list