Andrew Walbran | 68a8c16 | 2022-03-07 15:38:42 +0000 | [diff] [blame] | 1 | // Copyright 2022, The Android Open Source Project |
| 2 | // |
| 3 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 4 | // you may not use this file except in compliance with the License. |
| 5 | // You may obtain a copy of the License at |
| 6 | // |
| 7 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 8 | // |
| 9 | // Unless required by applicable law or agreed to in writing, software |
| 10 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 11 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 12 | // See the License for the specific language governing permissions and |
| 13 | // limitations under the License. |
| 14 | |
| 15 | //! pVM firmware. |
| 16 | |
| 17 | #![no_main] |
| 18 | #![no_std] |
| 19 | |
Pierre-Clément Tosi | db74cb1 | 2022-12-08 13:56:25 +0000 | [diff] [blame] | 20 | extern crate alloc; |
| 21 | |
Alan Stokes | 4db76eb | 2023-04-26 14:28:15 +0100 | [diff] [blame] | 22 | mod bcc; |
Jiyong Park | c5d2ef2 | 2023-04-11 01:23:46 +0900 | [diff] [blame] | 23 | mod bootargs; |
Pierre-Clément Tosi | 20b6096 | 2022-10-17 13:35:27 +0100 | [diff] [blame] | 24 | mod config; |
Jaewan Kim | c6e023b | 2023-10-12 15:11:05 +0900 | [diff] [blame] | 25 | mod device_assignment; |
Pierre-Clément Tosi | 4f4f5eb | 2022-12-08 14:31:42 +0000 | [diff] [blame] | 26 | mod dice; |
Pierre-Clément Tosi | 5bbfca5 | 2022-10-21 12:14:35 +0100 | [diff] [blame] | 27 | mod entry; |
Andrew Walbran | dfb7337 | 2022-04-21 10:52:27 +0000 | [diff] [blame] | 28 | mod exceptions; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 29 | mod fdt; |
Pierre-Clément Tosi | 1cc5eb7 | 2023-02-02 11:09:18 +0000 | [diff] [blame] | 30 | mod gpt; |
Pierre-Clément Tosi | da4440a | 2022-08-22 18:06:32 +0100 | [diff] [blame] | 31 | mod helpers; |
Pierre-Clément Tosi | 1cc5eb7 | 2023-02-02 11:09:18 +0000 | [diff] [blame] | 32 | mod instance; |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 33 | mod memory; |
Andrew Walbran | 68a8c16 | 2022-03-07 15:38:42 +0000 | [diff] [blame] | 34 | |
Alan Stokes | 4db76eb | 2023-04-26 14:28:15 +0100 | [diff] [blame] | 35 | use crate::bcc::Bcc; |
Pierre-Clément Tosi | 4ba7966 | 2023-02-13 11:22:41 +0000 | [diff] [blame] | 36 | use crate::dice::PartialInputs; |
| 37 | use crate::entry::RebootReason; |
| 38 | use crate::fdt::modify_for_next_stage; |
Pierre-Clément Tosi | 4ba7966 | 2023-02-13 11:22:41 +0000 | [diff] [blame] | 39 | use crate::helpers::GUEST_PAGE_SIZE; |
Shikha Panwar | 37490d4 | 2024-03-19 22:14:58 +0000 | [diff] [blame] | 40 | use crate::instance::EntryBody; |
| 41 | use crate::instance::Error as InstanceError; |
| 42 | use crate::instance::{get_recorded_entry, record_instance_entry}; |
Alan Stokes | 7f27c0d | 2023-09-07 16:22:58 +0100 | [diff] [blame] | 43 | use alloc::borrow::Cow; |
Alan Stokes | 4db76eb | 2023-04-26 14:28:15 +0100 | [diff] [blame] | 44 | use alloc::boxed::Box; |
Shikha Panwar | 73ba0d4 | 2024-03-20 14:43:21 +0000 | [diff] [blame] | 45 | use bssl_avf::Digester; |
Alan Stokes | 4db76eb | 2023-04-26 14:28:15 +0100 | [diff] [blame] | 46 | use core::ops::Range; |
Shikha Panwar | 73ba0d4 | 2024-03-20 14:43:21 +0000 | [diff] [blame] | 47 | use cstr::cstr; |
| 48 | use diced_open_dice::{bcc_handover_parse, DiceArtifacts, Hidden}; |
Andrew Walbran | 730375d | 2022-12-21 14:04:34 +0000 | [diff] [blame] | 49 | use fdtpci::{PciError, PciInfo}; |
Shikha Panwar | 73ba0d4 | 2024-03-20 14:43:21 +0000 | [diff] [blame] | 50 | use libfdt::{Fdt, FdtNode}; |
Alan Stokes | 4db76eb | 2023-04-26 14:28:15 +0100 | [diff] [blame] | 51 | use log::{debug, error, info, trace, warn}; |
Pierre-Clément Tosi | 2d65298 | 2023-01-09 19:30:17 +0000 | [diff] [blame] | 52 | use pvmfw_avb::verify_payload; |
Alice Wang | ab0d020 | 2023-05-17 08:07:41 +0000 | [diff] [blame] | 53 | use pvmfw_avb::Capability; |
Jiyong Park | c5d2ef2 | 2023-04-11 01:23:46 +0900 | [diff] [blame] | 54 | use pvmfw_avb::DebugLevel; |
Alice Wang | 0aa3032 | 2023-01-31 11:00:10 +0000 | [diff] [blame] | 55 | use pvmfw_embedded_key::PUBLIC_KEY; |
Pierre-Clément Tosi | c332fae | 2023-06-22 11:37:12 +0000 | [diff] [blame] | 56 | use vmbase::heap; |
Alice Wang | 3fa9b80 | 2023-06-06 07:52:31 +0000 | [diff] [blame] | 57 | use vmbase::memory::flush; |
Alice Wang | 93ee98a | 2023-06-08 08:20:39 +0000 | [diff] [blame] | 58 | use vmbase::memory::MEMORY; |
Pierre-Clément Tosi | 8025197 | 2023-07-12 12:51:12 +0000 | [diff] [blame] | 59 | use vmbase::rand; |
Alice Wang | eade167 | 2023-06-08 14:56:20 +0000 | [diff] [blame] | 60 | use vmbase::virtio::pci; |
Andrew Walbran | 68a8c16 | 2022-03-07 15:38:42 +0000 | [diff] [blame] | 61 | |
Pierre-Clément Tosi | 4f4f5eb | 2022-12-08 14:31:42 +0000 | [diff] [blame] | 62 | const NEXT_BCC_SIZE: usize = GUEST_PAGE_SIZE; |
| 63 | |
Alice Wang | 28cbcf1 | 2022-12-01 07:58:28 +0000 | [diff] [blame] | 64 | fn main( |
Pierre-Clément Tosi | db74cb1 | 2022-12-08 13:56:25 +0000 | [diff] [blame] | 65 | fdt: &mut Fdt, |
Alice Wang | 28cbcf1 | 2022-12-01 07:58:28 +0000 | [diff] [blame] | 66 | signed_kernel: &[u8], |
| 67 | ramdisk: Option<&[u8]>, |
Alice Wang | 843d831 | 2023-02-15 09:47:06 +0000 | [diff] [blame] | 68 | current_bcc_handover: &[u8], |
Alan Stokes | 6561833 | 2023-12-15 14:09:25 +0000 | [diff] [blame] | 69 | mut debug_policy: Option<&[u8]>, |
Pierre-Clément Tosi | 97f5249 | 2023-04-04 15:52:17 +0100 | [diff] [blame] | 70 | ) -> Result<Range<usize>, RebootReason> { |
Pierre-Clément Tosi | 37105a6 | 2022-10-18 12:21:48 +0100 | [diff] [blame] | 71 | info!("pVM firmware"); |
Pierre-Clément Tosi | 8036b4f | 2023-02-17 10:31:31 +0000 | [diff] [blame] | 72 | debug!("FDT: {:?}", fdt.as_ptr()); |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 73 | debug!("Signed kernel: {:?} ({:#x} bytes)", signed_kernel.as_ptr(), signed_kernel.len()); |
Alice Wang | a78279c | 2022-12-16 12:41:19 +0000 | [diff] [blame] | 74 | debug!("AVB public key: addr={:?}, size={:#x} ({1})", PUBLIC_KEY.as_ptr(), PUBLIC_KEY.len()); |
Pierre-Clément Tosi | a0934c1 | 2022-11-25 20:54:11 +0000 | [diff] [blame] | 75 | if let Some(rd) = ramdisk { |
| 76 | debug!("Ramdisk: {:?} ({:#x} bytes)", rd.as_ptr(), rd.len()); |
| 77 | } else { |
| 78 | debug!("Ramdisk: None"); |
| 79 | } |
Alan Stokes | 4db76eb | 2023-04-26 14:28:15 +0100 | [diff] [blame] | 80 | |
Alice Wang | 843d831 | 2023-02-15 09:47:06 +0000 | [diff] [blame] | 81 | let bcc_handover = bcc_handover_parse(current_bcc_handover).map_err(|e| { |
| 82 | error!("Invalid BCC Handover: {e:?}"); |
| 83 | RebootReason::InvalidBcc |
| 84 | })?; |
| 85 | trace!("BCC: {bcc_handover:x?}"); |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 86 | |
Alan Stokes | 4db76eb | 2023-04-26 14:28:15 +0100 | [diff] [blame] | 87 | let cdi_seal = bcc_handover.cdi_seal(); |
| 88 | |
| 89 | let bcc = Bcc::new(bcc_handover.bcc()).map_err(|e| { |
| 90 | error!("{e}"); |
| 91 | RebootReason::InvalidBcc |
| 92 | })?; |
| 93 | |
| 94 | // The bootloader should never pass us a debug policy when the boot is secure (the bootloader |
| 95 | // is locked). If it gets it wrong, disregard it & log it, to avoid it causing problems. |
| 96 | if debug_policy.is_some() && !bcc.is_debug_mode() { |
| 97 | warn!("Ignoring debug policy, BCC does not indicate Debug mode"); |
| 98 | debug_policy = None; |
Alan Stokes | d1ee63e | 2023-04-24 16:17:39 +0100 | [diff] [blame] | 99 | } |
| 100 | |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 101 | // Set up PCI bus for VirtIO devices. |
Andrew Walbran | d1d0318 | 2022-12-09 18:20:01 +0000 | [diff] [blame] | 102 | let pci_info = PciInfo::from_fdt(fdt).map_err(handle_pci_error)?; |
| 103 | debug!("PCI: {:#x?}", pci_info); |
Alice Wang | eff5839 | 2023-07-04 13:32:09 +0000 | [diff] [blame] | 104 | let mut pci_root = pci::initialize(pci_info, MEMORY.lock().as_mut().unwrap()).map_err(|e| { |
| 105 | error!("Failed to initialize PCI: {e}"); |
Alice Wang | 287de62 | 2023-06-08 13:17:03 +0000 | [diff] [blame] | 106 | RebootReason::InternalError |
| 107 | })?; |
Andrew Walbran | 1969063 | 2022-12-07 16:41:30 +0000 | [diff] [blame] | 108 | |
Alice Wang | 1f0add0 | 2023-01-23 16:22:53 +0000 | [diff] [blame] | 109 | let verified_boot_data = verify_payload(signed_kernel, ramdisk, PUBLIC_KEY).map_err(|e| { |
Pierre-Clément Tosi | 2d65298 | 2023-01-09 19:30:17 +0000 | [diff] [blame] | 110 | error!("Failed to verify the payload: {e}"); |
| 111 | RebootReason::PayloadVerificationError |
| 112 | })?; |
Pierre-Clément Tosi | f90655d | 2023-06-28 11:00:17 +0000 | [diff] [blame] | 113 | let debuggable = verified_boot_data.debug_level != DebugLevel::None; |
| 114 | if debuggable { |
| 115 | info!("Successfully verified a debuggable payload."); |
| 116 | info!("Please disregard any previous libavb ERROR about initrd_normal."); |
| 117 | } |
Pierre-Clément Tosi | 2d65298 | 2023-01-09 19:30:17 +0000 | [diff] [blame] | 118 | |
Shikha Panwar | 4a0651d | 2023-09-28 13:06:13 +0000 | [diff] [blame] | 119 | if verified_boot_data.has_capability(Capability::RemoteAttest) { |
Alice Wang | ab0d020 | 2023-05-17 08:07:41 +0000 | [diff] [blame] | 120 | info!("Service VM capable of remote attestation detected"); |
Alice Wang | 12e4c86 | 2023-12-11 13:52:27 +0000 | [diff] [blame] | 121 | if service_vm_version::VERSION != verified_boot_data.rollback_index { |
| 122 | // For RKP VM, we only boot if the version in the AVB footer of its kernel matches |
| 123 | // the one embedded in pvmfw at build time. |
| 124 | // This prevents the pvmfw from booting a roll backed RKP VM. |
| 125 | error!( |
| 126 | "Service VM version mismatch: expected {}, found {}", |
| 127 | service_vm_version::VERSION, |
| 128 | verified_boot_data.rollback_index |
| 129 | ); |
| 130 | return Err(RebootReason::InvalidPayload); |
| 131 | } |
Alice Wang | ab0d020 | 2023-05-17 08:07:41 +0000 | [diff] [blame] | 132 | } |
| 133 | |
Pierre-Clément Tosi | db74cb1 | 2022-12-08 13:56:25 +0000 | [diff] [blame] | 134 | let next_bcc = heap::aligned_boxed_slice(NEXT_BCC_SIZE, GUEST_PAGE_SIZE).ok_or_else(|| { |
| 135 | error!("Failed to allocate the next-stage BCC"); |
| 136 | RebootReason::InternalError |
| 137 | })?; |
| 138 | // By leaking the slice, its content will be left behind for the next stage. |
| 139 | let next_bcc = Box::leak(next_bcc); |
Pierre-Clément Tosi | 4f4f5eb | 2022-12-08 14:31:42 +0000 | [diff] [blame] | 140 | |
Pierre-Clément Tosi | f58f3a3 | 2023-02-02 16:24:23 +0000 | [diff] [blame] | 141 | let dice_inputs = PartialInputs::new(&verified_boot_data).map_err(|e| { |
| 142 | error!("Failed to compute partial DICE inputs: {e:?}"); |
| 143 | RebootReason::InternalError |
| 144 | })?; |
Shikha Panwar | 37490d4 | 2024-03-19 22:14:58 +0000 | [diff] [blame] | 145 | |
Shikha Panwar | 8f7fc1a | 2024-04-10 10:41:34 +0000 | [diff] [blame^] | 146 | let instance_hash = if cfg!(llpvm_changes) { Some(salt_from_instance_id(fdt)?) } else { None }; |
| 147 | let (new_instance, salt) = if should_defer_rollback_protection(fdt)? |
Shikha Panwar | 73ba0d4 | 2024-03-20 14:43:21 +0000 | [diff] [blame] | 148 | && verified_boot_data.has_capability(Capability::SecretkeeperProtection) |
| 149 | { |
| 150 | info!("Guest OS is capable of Secretkeeper protection, deferring rollback protection"); |
| 151 | // rollback_index of the image is used as security_version and is expected to be > 0 to |
| 152 | // discourage implicit allocation. |
| 153 | if verified_boot_data.rollback_index == 0 { |
| 154 | error!("Expected positive rollback_index, found 0"); |
| 155 | return Err(RebootReason::InvalidPayload); |
| 156 | }; |
| 157 | // `new_instance` cannot be known to pvmfw |
Shikha Panwar | 8f7fc1a | 2024-04-10 10:41:34 +0000 | [diff] [blame^] | 158 | (false, instance_hash.unwrap()) |
Shikha Panwar | 73ba0d4 | 2024-03-20 14:43:21 +0000 | [diff] [blame] | 159 | } else { |
| 160 | let (recorded_entry, mut instance_img, header_index) = |
| 161 | get_recorded_entry(&mut pci_root, cdi_seal).map_err(|e| { |
| 162 | error!("Failed to get entry from instance.img: {e}"); |
Shikha Panwar | 37490d4 | 2024-03-19 22:14:58 +0000 | [diff] [blame] | 163 | RebootReason::InternalError |
| 164 | })?; |
Shikha Panwar | 73ba0d4 | 2024-03-20 14:43:21 +0000 | [diff] [blame] | 165 | let (new_instance, salt) = if let Some(entry) = recorded_entry { |
| 166 | maybe_check_dice_measurements_match_entry(&dice_inputs, &entry)?; |
Shikha Panwar | 8f7fc1a | 2024-04-10 10:41:34 +0000 | [diff] [blame^] | 167 | let salt = instance_hash.unwrap_or(entry.salt); |
Shikha Panwar | 73ba0d4 | 2024-03-20 14:43:21 +0000 | [diff] [blame] | 168 | (false, salt) |
| 169 | } else { |
| 170 | // New instance! |
Shikha Panwar | 8f7fc1a | 2024-04-10 10:41:34 +0000 | [diff] [blame^] | 171 | let salt = instance_hash.map_or_else(rand::random_array, Ok).map_err(|e| { |
| 172 | error!("Failed to generated instance.img salt: {e}"); |
| 173 | RebootReason::InternalError |
| 174 | })?; |
| 175 | |
Shikha Panwar | 73ba0d4 | 2024-03-20 14:43:21 +0000 | [diff] [blame] | 176 | let entry = EntryBody::new(&dice_inputs, &salt); |
| 177 | record_instance_entry(&entry, cdi_seal, &mut instance_img, header_index).map_err( |
| 178 | |e| { |
| 179 | error!("Failed to get recorded entry in instance.img: {e}"); |
| 180 | RebootReason::InternalError |
| 181 | }, |
| 182 | )?; |
| 183 | (true, salt) |
| 184 | }; |
| 185 | (new_instance, salt) |
Shikha Panwar | 37490d4 | 2024-03-19 22:14:58 +0000 | [diff] [blame] | 186 | }; |
Shikha Panwar | 73ba0d4 | 2024-03-20 14:43:21 +0000 | [diff] [blame] | 187 | trace!("Got salt for instance: {salt:x?}"); |
Pierre-Clément Tosi | 1cc5eb7 | 2023-02-02 11:09:18 +0000 | [diff] [blame] | 188 | |
Alan Stokes | 7f27c0d | 2023-09-07 16:22:58 +0100 | [diff] [blame] | 189 | let new_bcc_handover = if cfg!(dice_changes) { |
| 190 | Cow::Borrowed(current_bcc_handover) |
| 191 | } else { |
| 192 | // It is possible that the DICE chain we were given is rooted in the UDS. We do not want to |
| 193 | // give such a chain to the payload, or even the associated CDIs. So remove the |
| 194 | // entire chain we were given and taint the CDIs. Note that the resulting CDIs are |
| 195 | // still deterministically derived from those we received, so will vary iff they do. |
| 196 | // TODO(b/280405545): Remove this post Android 14. |
| 197 | let truncated_bcc_handover = bcc::truncate(bcc_handover).map_err(|e| { |
| 198 | error!("{e}"); |
| 199 | RebootReason::InternalError |
| 200 | })?; |
| 201 | Cow::Owned(truncated_bcc_handover) |
| 202 | }; |
Alan Stokes | a38d3b3 | 2023-05-05 12:19:18 +0100 | [diff] [blame] | 203 | |
Shikha Panwar | 8f7fc1a | 2024-04-10 10:41:34 +0000 | [diff] [blame^] | 204 | dice_inputs.write_next_bcc(new_bcc_handover.as_ref(), &salt, instance_hash, next_bcc).map_err( |
| 205 | |e| { |
| 206 | error!("Failed to derive next-stage DICE secrets: {e:?}"); |
| 207 | RebootReason::SecretDerivationError |
| 208 | }, |
| 209 | )?; |
Pierre-Clément Tosi | db74cb1 | 2022-12-08 13:56:25 +0000 | [diff] [blame] | 210 | flush(next_bcc); |
| 211 | |
Pierre-Clément Tosi | 8025197 | 2023-07-12 12:51:12 +0000 | [diff] [blame] | 212 | let kaslr_seed = u64::from_ne_bytes(rand::random_array().map_err(|e| { |
| 213 | error!("Failed to generated guest KASLR seed: {e}"); |
| 214 | RebootReason::InternalError |
| 215 | })?); |
Pierre-Clément Tosi | b2d8aa7 | 2023-02-17 15:22:50 +0000 | [diff] [blame] | 216 | let strict_boot = true; |
Pierre-Clément Tosi | 8025197 | 2023-07-12 12:51:12 +0000 | [diff] [blame] | 217 | modify_for_next_stage( |
| 218 | fdt, |
| 219 | next_bcc, |
| 220 | new_instance, |
| 221 | strict_boot, |
| 222 | debug_policy, |
| 223 | debuggable, |
| 224 | kaslr_seed, |
| 225 | ) |
| 226 | .map_err(|e| { |
| 227 | error!("Failed to configure device tree: {e}"); |
| 228 | RebootReason::InternalError |
| 229 | })?; |
Pierre-Clément Tosi | db74cb1 | 2022-12-08 13:56:25 +0000 | [diff] [blame] | 230 | |
Alice Wang | 4379c83 | 2022-12-05 15:50:20 +0000 | [diff] [blame] | 231 | info!("Starting payload..."); |
Pierre-Clément Tosi | 97f5249 | 2023-04-04 15:52:17 +0100 | [diff] [blame] | 232 | |
| 233 | let bcc_range = { |
| 234 | let r = next_bcc.as_ptr_range(); |
| 235 | (r.start as usize)..(r.end as usize) |
| 236 | }; |
| 237 | |
| 238 | Ok(bcc_range) |
Pierre-Clément Tosi | 263ffd5 | 2022-10-05 20:27:50 +0100 | [diff] [blame] | 239 | } |
Andrew Walbran | d1d0318 | 2022-12-09 18:20:01 +0000 | [diff] [blame] | 240 | |
Shikha Panwar | 73ba0d4 | 2024-03-20 14:43:21 +0000 | [diff] [blame] | 241 | fn maybe_check_dice_measurements_match_entry( |
| 242 | dice_inputs: &PartialInputs, |
| 243 | entry: &EntryBody, |
| 244 | ) -> Result<(), RebootReason> { |
| 245 | // The RKP VM is allowed to run if it has passed the verified boot check and |
| 246 | // contains the expected version in its AVB footer. |
| 247 | // The comparison below with the previous boot information is skipped to enable the |
| 248 | // simultaneous update of the pvmfw and RKP VM. |
| 249 | // For instance, when both the pvmfw and RKP VM are updated, the code hash of the |
| 250 | // RKP VM will differ from the one stored in the instance image. In this case, the |
| 251 | // RKP VM is still allowed to run. |
| 252 | // This ensures that the updated RKP VM will retain the same CDIs in the next stage. |
| 253 | if dice_inputs.rkp_vm_marker { |
| 254 | return Ok(()); |
| 255 | } |
| 256 | ensure_dice_measurements_match_entry(dice_inputs, entry).map_err(|e| { |
| 257 | error!( |
| 258 | "Dice measurements do not match recorded entry. \ |
| 259 | This may be because of update: {e}" |
| 260 | ); |
| 261 | RebootReason::InternalError |
| 262 | })?; |
| 263 | |
| 264 | Ok(()) |
| 265 | } |
| 266 | |
Shikha Panwar | 37490d4 | 2024-03-19 22:14:58 +0000 | [diff] [blame] | 267 | fn ensure_dice_measurements_match_entry( |
| 268 | dice_inputs: &PartialInputs, |
| 269 | entry: &EntryBody, |
| 270 | ) -> Result<(), InstanceError> { |
| 271 | if entry.code_hash != dice_inputs.code_hash { |
| 272 | Err(InstanceError::RecordedCodeHashMismatch) |
| 273 | } else if entry.auth_hash != dice_inputs.auth_hash { |
| 274 | Err(InstanceError::RecordedAuthHashMismatch) |
| 275 | } else if entry.mode() != dice_inputs.mode { |
| 276 | Err(InstanceError::RecordedDiceModeMismatch) |
| 277 | } else { |
| 278 | Ok(()) |
| 279 | } |
| 280 | } |
| 281 | |
Shikha Panwar | 73ba0d4 | 2024-03-20 14:43:21 +0000 | [diff] [blame] | 282 | // Get the "salt" which is one of the input for DICE derivation. |
| 283 | // This provides differentiation of secrets for different VM instances with same payloads. |
| 284 | fn salt_from_instance_id(fdt: &Fdt) -> Result<Hidden, RebootReason> { |
| 285 | let id = instance_id(fdt)?; |
| 286 | let salt = Digester::sha512() |
| 287 | .digest(&[&b"InstanceId:"[..], id].concat()) |
| 288 | .map_err(|e| { |
| 289 | error!("Failed to get digest of instance-id: {e}"); |
| 290 | RebootReason::InternalError |
| 291 | })? |
| 292 | .try_into() |
| 293 | .map_err(|_| RebootReason::InternalError)?; |
| 294 | Ok(salt) |
| 295 | } |
| 296 | |
| 297 | fn instance_id(fdt: &Fdt) -> Result<&[u8], RebootReason> { |
| 298 | let node = avf_untrusted_node(fdt)?; |
| 299 | let id = node.getprop(cstr!("instance-id")).map_err(|e| { |
| 300 | error!("Failed to get instance-id in DT: {e}"); |
| 301 | RebootReason::InvalidFdt |
| 302 | })?; |
| 303 | id.ok_or_else(|| { |
| 304 | error!("Missing instance-id"); |
| 305 | RebootReason::InvalidFdt |
| 306 | }) |
| 307 | } |
| 308 | |
| 309 | fn should_defer_rollback_protection(fdt: &Fdt) -> Result<bool, RebootReason> { |
| 310 | let node = avf_untrusted_node(fdt)?; |
| 311 | let defer_rbp = node |
| 312 | .getprop(cstr!("defer-rollback-protection")) |
| 313 | .map_err(|e| { |
| 314 | error!("Failed to get defer-rollback-protection property in DT: {e}"); |
| 315 | RebootReason::InvalidFdt |
| 316 | })? |
| 317 | .is_some(); |
| 318 | Ok(defer_rbp) |
| 319 | } |
| 320 | |
| 321 | fn avf_untrusted_node(fdt: &Fdt) -> Result<FdtNode, RebootReason> { |
| 322 | let node = fdt.node(cstr!("/avf/untrusted")).map_err(|e| { |
| 323 | error!("Failed to get /avf/untrusted node: {e}"); |
| 324 | RebootReason::InvalidFdt |
| 325 | })?; |
| 326 | node.ok_or_else(|| { |
| 327 | error!("/avf/untrusted node is missing in DT"); |
| 328 | RebootReason::InvalidFdt |
| 329 | }) |
| 330 | } |
| 331 | |
Andrew Walbran | d1d0318 | 2022-12-09 18:20:01 +0000 | [diff] [blame] | 332 | /// Logs the given PCI error and returns the appropriate `RebootReason`. |
| 333 | fn handle_pci_error(e: PciError) -> RebootReason { |
| 334 | error!("{}", e); |
| 335 | match e { |
| 336 | PciError::FdtErrorPci(_) |
| 337 | | PciError::FdtNoPci |
| 338 | | PciError::FdtErrorReg(_) |
| 339 | | PciError::FdtMissingReg |
| 340 | | PciError::FdtRegEmpty |
| 341 | | PciError::FdtRegMissingSize |
| 342 | | PciError::CamWrongSize(_) |
| 343 | | PciError::FdtErrorRanges(_) |
| 344 | | PciError::FdtMissingRanges |
| 345 | | PciError::RangeAddressMismatch { .. } |
| 346 | | PciError::NoSuitableRange => RebootReason::InvalidFdt, |
Andrew Walbran | d1d0318 | 2022-12-09 18:20:01 +0000 | [diff] [blame] | 347 | } |
| 348 | } |