tpm_test.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548
  1. // SPDX-License-Identifier: GPL-2.0+
  2. /*
  3. * Copyright (c) 2015 Google, Inc
  4. */
  5. #include <common.h>
  6. #include <command.h>
  7. #include <environment.h>
  8. #include <tpm-v1.h>
  9. /* Prints error and returns on failure */
  10. #define TPM_CHECK(tpm_command) do { \
  11. uint32_t result; \
  12. \
  13. result = (tpm_command); \
  14. if (result != TPM_SUCCESS) { \
  15. printf("TEST FAILED: line %d: " #tpm_command ": 0x%x\n", \
  16. __LINE__, result); \
  17. return result; \
  18. } \
  19. } while (0)
  20. #define INDEX0 0xda70
  21. #define INDEX1 0xda71
  22. #define INDEX2 0xda72
  23. #define INDEX3 0xda73
  24. #define INDEX_INITIALISED 0xda80
  25. #define PHYS_PRESENCE 4
  26. #define PRESENCE 8
  27. static uint32_t TlclStartupIfNeeded(void)
  28. {
  29. uint32_t result = tpm_startup(TPM_ST_CLEAR);
  30. return result == TPM_INVALID_POSTINIT ? TPM_SUCCESS : result;
  31. }
  32. static int test_timer(void)
  33. {
  34. printf("get_timer(0) = %lu\n", get_timer(0));
  35. return 0;
  36. }
  37. static uint32_t tpm_get_flags(uint8_t *disable, uint8_t *deactivated,
  38. uint8_t *nvlocked)
  39. {
  40. struct tpm_permanent_flags pflags;
  41. uint32_t result;
  42. result = tpm_get_permanent_flags(&pflags);
  43. if (result)
  44. return result;
  45. if (disable)
  46. *disable = pflags.disable;
  47. if (deactivated)
  48. *deactivated = pflags.deactivated;
  49. if (nvlocked)
  50. *nvlocked = pflags.nv_locked;
  51. debug("TPM: Got flags disable=%d, deactivated=%d, nvlocked=%d\n",
  52. pflags.disable, pflags.deactivated, pflags.nv_locked);
  53. return 0;
  54. }
  55. static uint32_t tpm_nv_write_value_lock(uint32_t index)
  56. {
  57. debug("TPM: Write lock 0x%x\n", index);
  58. return tpm_nv_write_value(index, NULL, 0);
  59. }
  60. static int tpm_is_owned(void)
  61. {
  62. uint8_t response[TPM_PUBEK_SIZE];
  63. uint32_t result;
  64. result = tpm_read_pubek(response, sizeof(response));
  65. return result != TPM_SUCCESS;
  66. }
  67. static int test_early_extend(void)
  68. {
  69. uint8_t value_in[20];
  70. uint8_t value_out[20];
  71. printf("Testing earlyextend ...");
  72. tpm_init();
  73. TPM_CHECK(tpm_startup(TPM_ST_CLEAR));
  74. TPM_CHECK(tpm_continue_self_test());
  75. TPM_CHECK(tpm_extend(1, value_in, value_out));
  76. printf("done\n");
  77. return 0;
  78. }
  79. static int test_early_nvram(void)
  80. {
  81. uint32_t x;
  82. printf("Testing earlynvram ...");
  83. tpm_init();
  84. TPM_CHECK(tpm_startup(TPM_ST_CLEAR));
  85. TPM_CHECK(tpm_continue_self_test());
  86. TPM_CHECK(tpm_tsc_physical_presence(PRESENCE));
  87. TPM_CHECK(tpm_nv_read_value(INDEX0, (uint8_t *)&x, sizeof(x)));
  88. printf("done\n");
  89. return 0;
  90. }
  91. static int test_early_nvram2(void)
  92. {
  93. uint32_t x;
  94. printf("Testing earlynvram2 ...");
  95. tpm_init();
  96. TPM_CHECK(tpm_startup(TPM_ST_CLEAR));
  97. TPM_CHECK(tpm_continue_self_test());
  98. TPM_CHECK(tpm_tsc_physical_presence(PRESENCE));
  99. TPM_CHECK(tpm_nv_write_value(INDEX0, (uint8_t *)&x, sizeof(x)));
  100. printf("done\n");
  101. return 0;
  102. }
  103. static int test_enable(void)
  104. {
  105. uint8_t disable = 0, deactivated = 0;
  106. printf("Testing enable ...\n");
  107. tpm_init();
  108. TPM_CHECK(TlclStartupIfNeeded());
  109. TPM_CHECK(tpm_self_test_full());
  110. TPM_CHECK(tpm_tsc_physical_presence(PRESENCE));
  111. TPM_CHECK(tpm_get_flags(&disable, &deactivated, NULL));
  112. printf("\tdisable is %d, deactivated is %d\n", disable, deactivated);
  113. TPM_CHECK(tpm_physical_enable());
  114. TPM_CHECK(tpm_physical_set_deactivated(0));
  115. TPM_CHECK(tpm_get_flags(&disable, &deactivated, NULL));
  116. printf("\tdisable is %d, deactivated is %d\n", disable, deactivated);
  117. if (disable == 1 || deactivated == 1)
  118. printf("\tfailed to enable or activate\n");
  119. printf("\tdone\n");
  120. return 0;
  121. }
  122. #define reboot() do { \
  123. printf("\trebooting...\n"); \
  124. reset_cpu(0); \
  125. } while (0)
  126. static int test_fast_enable(void)
  127. {
  128. uint8_t disable = 0, deactivated = 0;
  129. int i;
  130. printf("Testing fastenable ...\n");
  131. tpm_init();
  132. TPM_CHECK(TlclStartupIfNeeded());
  133. TPM_CHECK(tpm_self_test_full());
  134. TPM_CHECK(tpm_tsc_physical_presence(PRESENCE));
  135. TPM_CHECK(tpm_get_flags(&disable, &deactivated, NULL));
  136. printf("\tdisable is %d, deactivated is %d\n", disable, deactivated);
  137. for (i = 0; i < 2; i++) {
  138. TPM_CHECK(tpm_force_clear());
  139. TPM_CHECK(tpm_get_flags(&disable, &deactivated, NULL));
  140. printf("\tdisable is %d, deactivated is %d\n", disable,
  141. deactivated);
  142. assert(disable == 1 && deactivated == 1);
  143. TPM_CHECK(tpm_physical_enable());
  144. TPM_CHECK(tpm_physical_set_deactivated(0));
  145. TPM_CHECK(tpm_get_flags(&disable, &deactivated, NULL));
  146. printf("\tdisable is %d, deactivated is %d\n", disable,
  147. deactivated);
  148. assert(disable == 0 && deactivated == 0);
  149. }
  150. printf("\tdone\n");
  151. return 0;
  152. }
  153. static int test_global_lock(void)
  154. {
  155. uint32_t zero = 0;
  156. uint32_t result;
  157. uint32_t x;
  158. printf("Testing globallock ...\n");
  159. tpm_init();
  160. TPM_CHECK(TlclStartupIfNeeded());
  161. TPM_CHECK(tpm_self_test_full());
  162. TPM_CHECK(tpm_tsc_physical_presence(PRESENCE));
  163. TPM_CHECK(tpm_nv_read_value(INDEX0, (uint8_t *)&x, sizeof(x)));
  164. TPM_CHECK(tpm_nv_write_value(INDEX0, (uint8_t *)&zero,
  165. sizeof(uint32_t)));
  166. TPM_CHECK(tpm_nv_read_value(INDEX1, (uint8_t *)&x, sizeof(x)));
  167. TPM_CHECK(tpm_nv_write_value(INDEX1, (uint8_t *)&zero,
  168. sizeof(uint32_t)));
  169. TPM_CHECK(tpm_set_global_lock());
  170. /* Verifies that write to index0 fails */
  171. x = 1;
  172. result = tpm_nv_write_value(INDEX0, (uint8_t *)&x, sizeof(x));
  173. assert(result == TPM_AREA_LOCKED);
  174. TPM_CHECK(tpm_nv_read_value(INDEX0, (uint8_t *)&x, sizeof(x)));
  175. assert(x == 0);
  176. /* Verifies that write to index1 is still possible */
  177. x = 2;
  178. TPM_CHECK(tpm_nv_write_value(INDEX1, (uint8_t *)&x, sizeof(x)));
  179. TPM_CHECK(tpm_nv_read_value(INDEX1, (uint8_t *)&x, sizeof(x)));
  180. assert(x == 2);
  181. /* Turns off PP */
  182. tpm_tsc_physical_presence(PHYS_PRESENCE);
  183. /* Verifies that write to index1 fails */
  184. x = 3;
  185. result = tpm_nv_write_value(INDEX1, (uint8_t *)&x, sizeof(x));
  186. assert(result == TPM_BAD_PRESENCE);
  187. TPM_CHECK(tpm_nv_read_value(INDEX1, (uint8_t *)&x, sizeof(x)));
  188. assert(x == 2);
  189. printf("\tdone\n");
  190. return 0;
  191. }
  192. static int test_lock(void)
  193. {
  194. printf("Testing lock ...\n");
  195. tpm_init();
  196. tpm_startup(TPM_ST_CLEAR);
  197. tpm_self_test_full();
  198. tpm_tsc_physical_presence(PRESENCE);
  199. tpm_nv_write_value_lock(INDEX0);
  200. printf("\tLocked 0x%x\n", INDEX0);
  201. printf("\tdone\n");
  202. return 0;
  203. }
  204. static void initialise_spaces(void)
  205. {
  206. uint32_t zero = 0;
  207. uint32_t perm = TPM_NV_PER_WRITE_STCLEAR | TPM_NV_PER_PPWRITE;
  208. printf("\tInitialising spaces\n");
  209. tpm_nv_set_locked(); /* useful only the first time */
  210. tpm_nv_define_space(INDEX0, perm, 4);
  211. tpm_nv_write_value(INDEX0, (uint8_t *)&zero, 4);
  212. tpm_nv_define_space(INDEX1, perm, 4);
  213. tpm_nv_write_value(INDEX1, (uint8_t *)&zero, 4);
  214. tpm_nv_define_space(INDEX2, perm, 4);
  215. tpm_nv_write_value(INDEX2, (uint8_t *)&zero, 4);
  216. tpm_nv_define_space(INDEX3, perm, 4);
  217. tpm_nv_write_value(INDEX3, (uint8_t *)&zero, 4);
  218. perm = TPM_NV_PER_READ_STCLEAR | TPM_NV_PER_WRITE_STCLEAR |
  219. TPM_NV_PER_PPWRITE;
  220. tpm_nv_define_space(INDEX_INITIALISED, perm, 1);
  221. }
  222. static int test_readonly(void)
  223. {
  224. uint8_t c;
  225. uint32_t index_0, index_1, index_2, index_3;
  226. int read0, read1, read2, read3;
  227. printf("Testing readonly ...\n");
  228. tpm_init();
  229. tpm_startup(TPM_ST_CLEAR);
  230. tpm_self_test_full();
  231. tpm_tsc_physical_presence(PRESENCE);
  232. /*
  233. * Checks if initialisation has completed by trying to read-lock a
  234. * space that's created at the end of initialisation
  235. */
  236. if (tpm_nv_read_value(INDEX_INITIALISED, &c, 0) == TPM_BADINDEX) {
  237. /* The initialisation did not complete */
  238. initialise_spaces();
  239. }
  240. /* Checks if spaces are OK or messed up */
  241. read0 = tpm_nv_read_value(INDEX0, (uint8_t *)&index_0, sizeof(index_0));
  242. read1 = tpm_nv_read_value(INDEX1, (uint8_t *)&index_1, sizeof(index_1));
  243. read2 = tpm_nv_read_value(INDEX2, (uint8_t *)&index_2, sizeof(index_2));
  244. read3 = tpm_nv_read_value(INDEX3, (uint8_t *)&index_3, sizeof(index_3));
  245. if (read0 || read1 || read2 || read3) {
  246. printf("Invalid contents\n");
  247. return 0;
  248. }
  249. /*
  250. * Writes space, and locks it. Then attempts to write again.
  251. * I really wish I could use the imperative.
  252. */
  253. index_0 += 1;
  254. if (tpm_nv_write_value(INDEX0, (uint8_t *)&index_0, sizeof(index_0) !=
  255. TPM_SUCCESS)) {
  256. pr_err("\tcould not write index 0\n");
  257. }
  258. tpm_nv_write_value_lock(INDEX0);
  259. if (tpm_nv_write_value(INDEX0, (uint8_t *)&index_0, sizeof(index_0)) ==
  260. TPM_SUCCESS)
  261. pr_err("\tindex 0 is not locked\n");
  262. printf("\tdone\n");
  263. return 0;
  264. }
  265. static int test_redefine_unowned(void)
  266. {
  267. uint32_t perm;
  268. uint32_t result;
  269. uint32_t x;
  270. printf("Testing redefine_unowned ...");
  271. tpm_init();
  272. TPM_CHECK(TlclStartupIfNeeded());
  273. TPM_CHECK(tpm_self_test_full());
  274. TPM_CHECK(tpm_tsc_physical_presence(PRESENCE));
  275. assert(!tpm_is_owned());
  276. /* Ensures spaces exist. */
  277. TPM_CHECK(tpm_nv_read_value(INDEX0, (uint8_t *)&x, sizeof(x)));
  278. TPM_CHECK(tpm_nv_read_value(INDEX1, (uint8_t *)&x, sizeof(x)));
  279. /* Redefines spaces a couple of times. */
  280. perm = TPM_NV_PER_PPWRITE | TPM_NV_PER_GLOBALLOCK;
  281. TPM_CHECK(tpm_nv_define_space(INDEX0, perm, 2 * sizeof(uint32_t)));
  282. TPM_CHECK(tpm_nv_define_space(INDEX0, perm, sizeof(uint32_t)));
  283. perm = TPM_NV_PER_PPWRITE;
  284. TPM_CHECK(tpm_nv_define_space(INDEX1, perm, 2 * sizeof(uint32_t)));
  285. TPM_CHECK(tpm_nv_define_space(INDEX1, perm, sizeof(uint32_t)));
  286. /* Sets the global lock */
  287. tpm_set_global_lock();
  288. /* Verifies that index0 cannot be redefined */
  289. result = tpm_nv_define_space(INDEX0, perm, sizeof(uint32_t));
  290. assert(result == TPM_AREA_LOCKED);
  291. /* Checks that index1 can */
  292. TPM_CHECK(tpm_nv_define_space(INDEX1, perm, 2 * sizeof(uint32_t)));
  293. TPM_CHECK(tpm_nv_define_space(INDEX1, perm, sizeof(uint32_t)));
  294. /* Turns off PP */
  295. tpm_tsc_physical_presence(PHYS_PRESENCE);
  296. /* Verifies that neither index0 nor index1 can be redefined */
  297. result = tpm_nv_define_space(INDEX0, perm, sizeof(uint32_t));
  298. assert(result == TPM_BAD_PRESENCE);
  299. result = tpm_nv_define_space(INDEX1, perm, sizeof(uint32_t));
  300. assert(result == TPM_BAD_PRESENCE);
  301. printf("done\n");
  302. return 0;
  303. }
  304. #define PERMPPGL (TPM_NV_PER_PPWRITE | TPM_NV_PER_GLOBALLOCK)
  305. #define PERMPP TPM_NV_PER_PPWRITE
  306. static int test_space_perm(void)
  307. {
  308. uint32_t perm;
  309. printf("Testing spaceperm ...");
  310. tpm_init();
  311. TPM_CHECK(TlclStartupIfNeeded());
  312. TPM_CHECK(tpm_continue_self_test());
  313. TPM_CHECK(tpm_tsc_physical_presence(PRESENCE));
  314. TPM_CHECK(tpm_get_permissions(INDEX0, &perm));
  315. assert((perm & PERMPPGL) == PERMPPGL);
  316. TPM_CHECK(tpm_get_permissions(INDEX1, &perm));
  317. assert((perm & PERMPP) == PERMPP);
  318. printf("done\n");
  319. return 0;
  320. }
  321. static int test_startup(void)
  322. {
  323. uint32_t result;
  324. printf("Testing startup ...\n");
  325. tpm_init();
  326. result = tpm_startup(TPM_ST_CLEAR);
  327. if (result != 0 && result != TPM_INVALID_POSTINIT)
  328. printf("\ttpm startup failed with 0x%x\n", result);
  329. result = tpm_get_flags(NULL, NULL, NULL);
  330. if (result != 0)
  331. printf("\ttpm getflags failed with 0x%x\n", result);
  332. printf("\texecuting SelfTestFull\n");
  333. tpm_self_test_full();
  334. result = tpm_get_flags(NULL, NULL, NULL);
  335. if (result != 0)
  336. printf("\ttpm getflags failed with 0x%x\n", result);
  337. printf("\tdone\n");
  338. return 0;
  339. }
  340. /*
  341. * Runs [op] and ensures it returns success and doesn't run longer than
  342. * [time_limit] in milliseconds.
  343. */
  344. #define TTPM_CHECK(op, time_limit) do { \
  345. ulong start, time; \
  346. uint32_t __result; \
  347. \
  348. start = get_timer(0); \
  349. __result = op; \
  350. if (__result != TPM_SUCCESS) { \
  351. printf("\t" #op ": error 0x%x\n", __result); \
  352. return -1; \
  353. } \
  354. time = get_timer(start); \
  355. printf("\t" #op ": %lu ms\n", time); \
  356. if (time > (ulong)time_limit) { \
  357. printf("\t" #op " exceeded " #time_limit " ms\n"); \
  358. } \
  359. } while (0)
  360. static int test_timing(void)
  361. {
  362. uint32_t x;
  363. uint8_t in[20], out[20];
  364. printf("Testing timing ...");
  365. tpm_init();
  366. TTPM_CHECK(TlclStartupIfNeeded(), 50);
  367. TTPM_CHECK(tpm_continue_self_test(), 100);
  368. TTPM_CHECK(tpm_self_test_full(), 1000);
  369. TTPM_CHECK(tpm_tsc_physical_presence(PRESENCE), 100);
  370. TTPM_CHECK(tpm_nv_write_value(INDEX0, (uint8_t *)&x, sizeof(x)), 100);
  371. TTPM_CHECK(tpm_nv_read_value(INDEX0, (uint8_t *)&x, sizeof(x)), 100);
  372. TTPM_CHECK(tpm_extend(0, in, out), 200);
  373. TTPM_CHECK(tpm_set_global_lock(), 50);
  374. TTPM_CHECK(tpm_tsc_physical_presence(PHYS_PRESENCE), 100);
  375. printf("done\n");
  376. return 0;
  377. }
  378. #define TPM_MAX_NV_WRITES_NOOWNER 64
  379. static int test_write_limit(void)
  380. {
  381. printf("Testing writelimit ...\n");
  382. int i;
  383. uint32_t result;
  384. tpm_init();
  385. TPM_CHECK(TlclStartupIfNeeded());
  386. TPM_CHECK(tpm_self_test_full());
  387. TPM_CHECK(tpm_tsc_physical_presence(PRESENCE));
  388. TPM_CHECK(tpm_force_clear());
  389. TPM_CHECK(tpm_physical_enable());
  390. TPM_CHECK(tpm_physical_set_deactivated(0));
  391. for (i = 0; i < TPM_MAX_NV_WRITES_NOOWNER + 2; i++) {
  392. printf("\twriting %d\n", i);
  393. result = tpm_nv_write_value(INDEX0, (uint8_t *)&i, sizeof(i));
  394. switch (result) {
  395. case TPM_SUCCESS:
  396. break;
  397. case TPM_MAXNVWRITES:
  398. assert(i >= TPM_MAX_NV_WRITES_NOOWNER);
  399. default:
  400. pr_err("\tunexpected error code %d (0x%x)\n",
  401. result, result);
  402. }
  403. }
  404. /* Reset write count */
  405. TPM_CHECK(tpm_force_clear());
  406. TPM_CHECK(tpm_physical_enable());
  407. TPM_CHECK(tpm_physical_set_deactivated(0));
  408. /* Try writing again. */
  409. TPM_CHECK(tpm_nv_write_value(INDEX0, (uint8_t *)&i, sizeof(i)));
  410. printf("\tdone\n");
  411. return 0;
  412. }
  413. #define VOIDTEST(XFUNC) \
  414. int do_test_##XFUNC(cmd_tbl_t *cmd_tbl, int flag, int argc, \
  415. char * const argv[]) \
  416. { \
  417. return test_##XFUNC(); \
  418. }
  419. #define VOIDENT(XNAME) \
  420. U_BOOT_CMD_MKENT(XNAME, 0, 1, do_test_##XNAME, "", ""),
  421. VOIDTEST(early_extend)
  422. VOIDTEST(early_nvram)
  423. VOIDTEST(early_nvram2)
  424. VOIDTEST(enable)
  425. VOIDTEST(fast_enable)
  426. VOIDTEST(global_lock)
  427. VOIDTEST(lock)
  428. VOIDTEST(readonly)
  429. VOIDTEST(redefine_unowned)
  430. VOIDTEST(space_perm)
  431. VOIDTEST(startup)
  432. VOIDTEST(timing)
  433. VOIDTEST(write_limit)
  434. VOIDTEST(timer)
  435. static cmd_tbl_t cmd_cros_tpm_sub[] = {
  436. VOIDENT(early_extend)
  437. VOIDENT(early_nvram)
  438. VOIDENT(early_nvram2)
  439. VOIDENT(enable)
  440. VOIDENT(fast_enable)
  441. VOIDENT(global_lock)
  442. VOIDENT(lock)
  443. VOIDENT(readonly)
  444. VOIDENT(redefine_unowned)
  445. VOIDENT(space_perm)
  446. VOIDENT(startup)
  447. VOIDENT(timing)
  448. VOIDENT(write_limit)
  449. VOIDENT(timer)
  450. };
  451. static int do_tpmtest(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
  452. {
  453. cmd_tbl_t *c;
  454. int i;
  455. printf("argc = %d, argv = ", argc);
  456. for (i = 0; i < argc; i++)
  457. printf(" %s", argv[i]);
  458. printf("\n------\n");
  459. argc--;
  460. argv++;
  461. c = find_cmd_tbl(argv[0], cmd_cros_tpm_sub,
  462. ARRAY_SIZE(cmd_cros_tpm_sub));
  463. return c ? c->cmd(cmdtp, flag, argc, argv) : cmd_usage(cmdtp);
  464. }
  465. U_BOOT_CMD(tpmtest, 2, 1, do_tpmtest, "TPM tests",
  466. "\n\tearly_extend\n"
  467. "\tearly_nvram\n"
  468. "\tearly_nvram2\n"
  469. "\tenable\n"
  470. "\tfast_enable\n"
  471. "\tglobal_lock\n"
  472. "\tlock\n"
  473. "\treadonly\n"
  474. "\tredefine_unowned\n"
  475. "\tspace_perm\n"
  476. "\tstartup\n"
  477. "\ttiming\n"
  478. "\twrite_limit\n");