]>
Commit | Line | Data |
---|---|---|
83d290c5 | 1 | // SPDX-License-Identifier: GPL-2.0+ |
b83c709e | 2 | /* |
29067abf | 3 | * Copyright (C) 2010-2015 Freescale Semiconductor, Inc. |
b83c709e SB |
4 | */ |
5 | ||
6 | #include <common.h> | |
09140113 | 7 | #include <command.h> |
fba6f9ef AA |
8 | #include <config.h> |
9 | #include <fuse.h> | |
ea91031b PN |
10 | #include <mapmem.h> |
11 | #include <image.h> | |
b83c709e | 12 | #include <asm/io.h> |
36c1ca4d | 13 | #include <asm/system.h> |
36c1ca4d | 14 | #include <asm/arch/clock.h> |
f2f07e85 | 15 | #include <asm/arch/sys_proto.h> |
552a848e | 16 | #include <asm/mach-imx/hab.h> |
b83c709e | 17 | |
36c1ca4d | 18 | #define ALIGN_SIZE 0x1000 |
36c1ca4d NG |
19 | #define MX6DQ_PU_IROM_MMU_EN_VAR 0x009024a8 |
20 | #define MX6DLS_PU_IROM_MMU_EN_VAR 0x00901dd0 | |
5760069a | 21 | #define MX6SL_PU_IROM_MMU_EN_VAR 0x00901c60 |
ee3899aa | 22 | #define IS_HAB_ENABLED_BIT \ |
27117b20 PF |
23 | (is_soc_type(MXC_SOC_MX7ULP) ? 0x80000000 : \ |
24 | (is_soc_type(MXC_SOC_MX7) ? 0x2000000 : 0x2)) | |
36c1ca4d | 25 | |
49b6d058 BD |
26 | static int ivt_header_error(const char *err_str, struct ivt_header *ivt_hdr) |
27 | { | |
28 | printf("%s magic=0x%x length=0x%02x version=0x%x\n", err_str, | |
29 | ivt_hdr->magic, ivt_hdr->length, ivt_hdr->version); | |
30 | ||
31 | return 1; | |
32 | } | |
33 | ||
34 | static int verify_ivt_header(struct ivt_header *ivt_hdr) | |
35 | { | |
36 | int result = 0; | |
37 | ||
38 | if (ivt_hdr->magic != IVT_HEADER_MAGIC) | |
39 | result = ivt_header_error("bad magic", ivt_hdr); | |
40 | ||
41 | if (be16_to_cpu(ivt_hdr->length) != IVT_TOTAL_LENGTH) | |
42 | result = ivt_header_error("bad length", ivt_hdr); | |
43 | ||
44 | if (ivt_hdr->version != IVT_HEADER_V1 && | |
45 | ivt_hdr->version != IVT_HEADER_V2) | |
46 | result = ivt_header_error("bad version", ivt_hdr); | |
47 | ||
48 | return result; | |
49 | } | |
50 | ||
15b505b0 SE |
51 | #if !defined(CONFIG_SPL_BUILD) |
52 | ||
29067abf UC |
53 | #define MAX_RECORD_BYTES (8*1024) /* 4 kbytes */ |
54 | ||
55 | struct record { | |
56 | uint8_t tag; /* Tag */ | |
57 | uint8_t len[2]; /* Length */ | |
58 | uint8_t par; /* Version */ | |
59 | uint8_t contents[MAX_RECORD_BYTES];/* Record Data */ | |
60 | bool any_rec_flag; | |
61 | }; | |
62 | ||
58bebfb7 BD |
63 | static char *rsn_str[] = { |
64 | "RSN = HAB_RSN_ANY (0x00)\n", | |
65 | "RSN = HAB_ENG_FAIL (0x30)\n", | |
66 | "RSN = HAB_INV_ADDRESS (0x22)\n", | |
67 | "RSN = HAB_INV_ASSERTION (0x0C)\n", | |
68 | "RSN = HAB_INV_CALL (0x28)\n", | |
69 | "RSN = HAB_INV_CERTIFICATE (0x21)\n", | |
70 | "RSN = HAB_INV_COMMAND (0x06)\n", | |
71 | "RSN = HAB_INV_CSF (0x11)\n", | |
72 | "RSN = HAB_INV_DCD (0x27)\n", | |
73 | "RSN = HAB_INV_INDEX (0x0F)\n", | |
74 | "RSN = HAB_INV_IVT (0x05)\n", | |
75 | "RSN = HAB_INV_KEY (0x1D)\n", | |
76 | "RSN = HAB_INV_RETURN (0x1E)\n", | |
77 | "RSN = HAB_INV_SIGNATURE (0x18)\n", | |
78 | "RSN = HAB_INV_SIZE (0x17)\n", | |
79 | "RSN = HAB_MEM_FAIL (0x2E)\n", | |
80 | "RSN = HAB_OVR_COUNT (0x2B)\n", | |
81 | "RSN = HAB_OVR_STORAGE (0x2D)\n", | |
82 | "RSN = HAB_UNS_ALGORITHM (0x12)\n", | |
83 | "RSN = HAB_UNS_COMMAND (0x03)\n", | |
84 | "RSN = HAB_UNS_ENGINE (0x0A)\n", | |
85 | "RSN = HAB_UNS_ITEM (0x24)\n", | |
86 | "RSN = HAB_UNS_KEY (0x1B)\n", | |
87 | "RSN = HAB_UNS_PROTOCOL (0x14)\n", | |
88 | "RSN = HAB_UNS_STATE (0x09)\n", | |
89 | "RSN = INVALID\n", | |
90 | NULL | |
91 | }; | |
92 | ||
93 | static char *sts_str[] = { | |
94 | "STS = HAB_SUCCESS (0xF0)\n", | |
95 | "STS = HAB_FAILURE (0x33)\n", | |
96 | "STS = HAB_WARNING (0x69)\n", | |
97 | "STS = INVALID\n", | |
98 | NULL | |
99 | }; | |
100 | ||
101 | static char *eng_str[] = { | |
102 | "ENG = HAB_ENG_ANY (0x00)\n", | |
103 | "ENG = HAB_ENG_SCC (0x03)\n", | |
104 | "ENG = HAB_ENG_RTIC (0x05)\n", | |
105 | "ENG = HAB_ENG_SAHARA (0x06)\n", | |
106 | "ENG = HAB_ENG_CSU (0x0A)\n", | |
107 | "ENG = HAB_ENG_SRTC (0x0C)\n", | |
108 | "ENG = HAB_ENG_DCP (0x1B)\n", | |
109 | "ENG = HAB_ENG_CAAM (0x1D)\n", | |
110 | "ENG = HAB_ENG_SNVS (0x1E)\n", | |
111 | "ENG = HAB_ENG_OCOTP (0x21)\n", | |
112 | "ENG = HAB_ENG_DTCP (0x22)\n", | |
113 | "ENG = HAB_ENG_ROM (0x36)\n", | |
114 | "ENG = HAB_ENG_HDCP (0x24)\n", | |
115 | "ENG = HAB_ENG_RTL (0x77)\n", | |
116 | "ENG = HAB_ENG_SW (0xFF)\n", | |
117 | "ENG = INVALID\n", | |
118 | NULL | |
119 | }; | |
120 | ||
121 | static char *ctx_str[] = { | |
122 | "CTX = HAB_CTX_ANY(0x00)\n", | |
123 | "CTX = HAB_CTX_FAB (0xFF)\n", | |
124 | "CTX = HAB_CTX_ENTRY (0xE1)\n", | |
125 | "CTX = HAB_CTX_TARGET (0x33)\n", | |
126 | "CTX = HAB_CTX_AUTHENTICATE (0x0A)\n", | |
127 | "CTX = HAB_CTX_DCD (0xDD)\n", | |
128 | "CTX = HAB_CTX_CSF (0xCF)\n", | |
129 | "CTX = HAB_CTX_COMMAND (0xC0)\n", | |
130 | "CTX = HAB_CTX_AUT_DAT (0xDB)\n", | |
131 | "CTX = HAB_CTX_ASSERT (0xA0)\n", | |
132 | "CTX = HAB_CTX_EXIT (0xEE)\n", | |
133 | "CTX = INVALID\n", | |
134 | NULL | |
135 | }; | |
136 | ||
137 | static uint8_t hab_statuses[5] = { | |
29067abf UC |
138 | HAB_STS_ANY, |
139 | HAB_FAILURE, | |
140 | HAB_WARNING, | |
141 | HAB_SUCCESS, | |
142 | -1 | |
143 | }; | |
144 | ||
58bebfb7 | 145 | static uint8_t hab_reasons[26] = { |
29067abf UC |
146 | HAB_RSN_ANY, |
147 | HAB_ENG_FAIL, | |
148 | HAB_INV_ADDRESS, | |
149 | HAB_INV_ASSERTION, | |
150 | HAB_INV_CALL, | |
151 | HAB_INV_CERTIFICATE, | |
152 | HAB_INV_COMMAND, | |
153 | HAB_INV_CSF, | |
154 | HAB_INV_DCD, | |
155 | HAB_INV_INDEX, | |
156 | HAB_INV_IVT, | |
157 | HAB_INV_KEY, | |
158 | HAB_INV_RETURN, | |
159 | HAB_INV_SIGNATURE, | |
160 | HAB_INV_SIZE, | |
161 | HAB_MEM_FAIL, | |
162 | HAB_OVR_COUNT, | |
163 | HAB_OVR_STORAGE, | |
164 | HAB_UNS_ALGORITHM, | |
165 | HAB_UNS_COMMAND, | |
166 | HAB_UNS_ENGINE, | |
167 | HAB_UNS_ITEM, | |
168 | HAB_UNS_KEY, | |
169 | HAB_UNS_PROTOCOL, | |
170 | HAB_UNS_STATE, | |
171 | -1 | |
172 | }; | |
173 | ||
58bebfb7 | 174 | static uint8_t hab_contexts[12] = { |
29067abf UC |
175 | HAB_CTX_ANY, |
176 | HAB_CTX_FAB, | |
177 | HAB_CTX_ENTRY, | |
178 | HAB_CTX_TARGET, | |
179 | HAB_CTX_AUTHENTICATE, | |
180 | HAB_CTX_DCD, | |
181 | HAB_CTX_CSF, | |
182 | HAB_CTX_COMMAND, | |
183 | HAB_CTX_AUT_DAT, | |
184 | HAB_CTX_ASSERT, | |
185 | HAB_CTX_EXIT, | |
186 | -1 | |
187 | }; | |
188 | ||
58bebfb7 | 189 | static uint8_t hab_engines[16] = { |
29067abf UC |
190 | HAB_ENG_ANY, |
191 | HAB_ENG_SCC, | |
192 | HAB_ENG_RTIC, | |
193 | HAB_ENG_SAHARA, | |
194 | HAB_ENG_CSU, | |
195 | HAB_ENG_SRTC, | |
196 | HAB_ENG_DCP, | |
197 | HAB_ENG_CAAM, | |
198 | HAB_ENG_SNVS, | |
199 | HAB_ENG_OCOTP, | |
200 | HAB_ENG_DTCP, | |
201 | HAB_ENG_ROM, | |
202 | HAB_ENG_HDCP, | |
203 | HAB_ENG_RTL, | |
204 | HAB_ENG_SW, | |
205 | -1 | |
206 | }; | |
207 | ||
29067abf UC |
208 | static inline uint8_t get_idx(uint8_t *list, uint8_t tgt) |
209 | { | |
210 | uint8_t idx = 0; | |
211 | uint8_t element = list[idx]; | |
212 | while (element != -1) { | |
213 | if (element == tgt) | |
214 | return idx; | |
215 | element = list[++idx]; | |
216 | } | |
217 | return -1; | |
218 | } | |
219 | ||
58bebfb7 | 220 | static void process_event_record(uint8_t *event_data, size_t bytes) |
29067abf UC |
221 | { |
222 | struct record *rec = (struct record *)event_data; | |
223 | ||
224 | printf("\n\n%s", sts_str[get_idx(hab_statuses, rec->contents[0])]); | |
225 | printf("%s", rsn_str[get_idx(hab_reasons, rec->contents[1])]); | |
226 | printf("%s", ctx_str[get_idx(hab_contexts, rec->contents[2])]); | |
227 | printf("%s", eng_str[get_idx(hab_engines, rec->contents[3])]); | |
228 | } | |
229 | ||
58bebfb7 | 230 | static void display_event(uint8_t *event_data, size_t bytes) |
b83c709e SB |
231 | { |
232 | uint32_t i; | |
233 | ||
234 | if (!(event_data && bytes > 0)) | |
235 | return; | |
236 | ||
237 | for (i = 0; i < bytes; i++) { | |
238 | if (i == 0) | |
239 | printf("\t0x%02x", event_data[i]); | |
240 | else if ((i % 8) == 0) | |
241 | printf("\n\t0x%02x", event_data[i]); | |
242 | else | |
243 | printf(" 0x%02x", event_data[i]); | |
244 | } | |
29067abf UC |
245 | |
246 | process_event_record(event_data, bytes); | |
b83c709e SB |
247 | } |
248 | ||
58bebfb7 | 249 | static int get_hab_status(void) |
b83c709e SB |
250 | { |
251 | uint32_t index = 0; /* Loop index */ | |
252 | uint8_t event_data[128]; /* Event data buffer */ | |
253 | size_t bytes = sizeof(event_data); /* Event size in bytes */ | |
254 | enum hab_config config = 0; | |
255 | enum hab_state state = 0; | |
f2f07e85 SB |
256 | hab_rvt_report_event_t *hab_rvt_report_event; |
257 | hab_rvt_report_status_t *hab_rvt_report_status; | |
258 | ||
7b889baf BL |
259 | hab_rvt_report_event = (hab_rvt_report_event_t *)HAB_RVT_REPORT_EVENT; |
260 | hab_rvt_report_status = | |
261 | (hab_rvt_report_status_t *)HAB_RVT_REPORT_STATUS; | |
b83c709e | 262 | |
e5b30e4a | 263 | if (imx_hab_is_enabled()) |
b83c709e SB |
264 | puts("\nSecure boot enabled\n"); |
265 | else | |
266 | puts("\nSecure boot disabled\n"); | |
267 | ||
268 | /* Check HAB status */ | |
269 | if (hab_rvt_report_status(&config, &state) != HAB_SUCCESS) { | |
270 | printf("\nHAB Configuration: 0x%02x, HAB State: 0x%02x\n", | |
271 | config, state); | |
272 | ||
273 | /* Display HAB Error events */ | |
274 | while (hab_rvt_report_event(HAB_FAILURE, index, event_data, | |
275 | &bytes) == HAB_SUCCESS) { | |
276 | puts("\n"); | |
277 | printf("--------- HAB Event %d -----------------\n", | |
278 | index + 1); | |
279 | puts("event data:\n"); | |
280 | display_event(event_data, bytes); | |
281 | puts("\n"); | |
282 | bytes = sizeof(event_data); | |
283 | index++; | |
284 | } | |
285 | } | |
286 | /* Display message if no HAB events are found */ | |
287 | else { | |
288 | printf("\nHAB Configuration: 0x%02x, HAB State: 0x%02x\n", | |
289 | config, state); | |
290 | puts("No HAB Events Found!\n\n"); | |
291 | } | |
292 | return 0; | |
293 | } | |
294 | ||
09140113 SG |
295 | static int do_hab_status(struct cmd_tbl *cmdtp, int flag, int argc, |
296 | char *const argv[]) | |
15b505b0 SE |
297 | { |
298 | if ((argc != 1)) { | |
299 | cmd_usage(cmdtp); | |
300 | return 1; | |
301 | } | |
302 | ||
303 | get_hab_status(); | |
304 | ||
305 | return 0; | |
306 | } | |
307 | ||
ea91031b PN |
308 | static ulong get_image_ivt_offset(ulong img_addr) |
309 | { | |
310 | const void *buf; | |
311 | ||
312 | buf = map_sysmem(img_addr, 0); | |
313 | switch (genimg_get_format(buf)) { | |
c76c93a3 | 314 | #if CONFIG_IS_ENABLED(LEGACY_IMAGE_FORMAT) |
ea91031b PN |
315 | case IMAGE_FORMAT_LEGACY: |
316 | return (image_get_image_size((image_header_t *)img_addr) | |
317 | + 0x1000 - 1) & ~(0x1000 - 1); | |
318 | #endif | |
319 | #if IMAGE_ENABLE_FIT | |
320 | case IMAGE_FORMAT_FIT: | |
321 | return (fit_get_size(buf) + 0x1000 - 1) & ~(0x1000 - 1); | |
322 | #endif | |
323 | default: | |
324 | return 0; | |
325 | } | |
326 | } | |
327 | ||
09140113 SG |
328 | static int do_authenticate_image(struct cmd_tbl *cmdtp, int flag, int argc, |
329 | char *const argv[]) | |
15b505b0 | 330 | { |
c5800b25 | 331 | ulong addr, length, ivt_offset; |
15b505b0 SE |
332 | int rcode = 0; |
333 | ||
ea91031b | 334 | if (argc < 3) |
15b505b0 SE |
335 | return CMD_RET_USAGE; |
336 | ||
337 | addr = simple_strtoul(argv[1], NULL, 16); | |
c5800b25 | 338 | length = simple_strtoul(argv[2], NULL, 16); |
ea91031b PN |
339 | if (argc == 3) |
340 | ivt_offset = get_image_ivt_offset(addr); | |
341 | else | |
342 | ivt_offset = simple_strtoul(argv[3], NULL, 16); | |
15b505b0 | 343 | |
57f65486 | 344 | rcode = imx_hab_authenticate_image(addr, length, ivt_offset); |
9535b397 BD |
345 | if (rcode == 0) |
346 | rcode = CMD_RET_SUCCESS; | |
347 | else | |
348 | rcode = CMD_RET_FAILURE; | |
c5800b25 | 349 | |
15b505b0 SE |
350 | return rcode; |
351 | } | |
352 | ||
09140113 SG |
353 | static int do_hab_failsafe(struct cmd_tbl *cmdtp, int flag, int argc, |
354 | char *const argv[]) | |
9587b0d6 BD |
355 | { |
356 | hab_rvt_failsafe_t *hab_rvt_failsafe; | |
357 | ||
358 | if (argc != 1) { | |
359 | cmd_usage(cmdtp); | |
360 | return 1; | |
361 | } | |
362 | ||
7b889baf | 363 | hab_rvt_failsafe = (hab_rvt_failsafe_t *)HAB_RVT_FAILSAFE; |
9587b0d6 BD |
364 | hab_rvt_failsafe(); |
365 | ||
366 | return 0; | |
367 | } | |
368 | ||
09140113 SG |
369 | static int do_hab_version(struct cmd_tbl *cmdtp, int flag, int argc, |
370 | char *const argv[]) | |
b4eca2d7 SS |
371 | { |
372 | struct hab_hdr *hdr = (struct hab_hdr *)HAB_RVT_BASE; | |
373 | ||
374 | if (hdr->tag != HAB_TAG_RVT) { | |
375 | printf("Unexpected header tag: %x\n", hdr->tag); | |
376 | return CMD_RET_FAILURE; | |
377 | } | |
378 | ||
379 | printf("HAB version: %d.%d\n", hdr->par >> 4, hdr->par & 0xf); | |
380 | ||
381 | return 0; | |
382 | } | |
383 | ||
09140113 SG |
384 | static int do_authenticate_image_or_failover(struct cmd_tbl *cmdtp, int flag, |
385 | int argc, char *const argv[]) | |
49e62426 BD |
386 | { |
387 | int ret = CMD_RET_FAILURE; | |
388 | ||
389 | if (argc != 4) { | |
390 | ret = CMD_RET_USAGE; | |
391 | goto error; | |
392 | } | |
393 | ||
394 | if (!imx_hab_is_enabled()) { | |
395 | printf("error: secure boot disabled\n"); | |
396 | goto error; | |
397 | } | |
398 | ||
399 | if (do_authenticate_image(NULL, flag, argc, argv) != CMD_RET_SUCCESS) { | |
400 | fprintf(stderr, "authentication fail -> %s %s %s %s\n", | |
401 | argv[0], argv[1], argv[2], argv[3]); | |
402 | do_hab_failsafe(0, 0, 1, NULL); | |
403 | }; | |
404 | ret = CMD_RET_SUCCESS; | |
405 | error: | |
406 | return ret; | |
407 | } | |
408 | ||
15b505b0 SE |
409 | U_BOOT_CMD( |
410 | hab_status, CONFIG_SYS_MAXARGS, 1, do_hab_status, | |
411 | "display HAB status", | |
412 | "" | |
413 | ); | |
414 | ||
415 | U_BOOT_CMD( | |
c5800b25 | 416 | hab_auth_img, 4, 0, do_authenticate_image, |
15b505b0 | 417 | "authenticate image via HAB", |
c5800b25 | 418 | "addr length ivt_offset\n" |
15b505b0 | 419 | "addr - image hex address\n" |
c5800b25 | 420 | "length - image hex length\n" |
15b505b0 SE |
421 | "ivt_offset - hex offset of IVT in the image" |
422 | ); | |
423 | ||
9587b0d6 BD |
424 | U_BOOT_CMD( |
425 | hab_failsafe, CONFIG_SYS_MAXARGS, 1, do_hab_failsafe, | |
426 | "run BootROM failsafe routine", | |
427 | "" | |
428 | ); | |
15b505b0 | 429 | |
49e62426 BD |
430 | U_BOOT_CMD( |
431 | hab_auth_img_or_fail, 4, 0, | |
432 | do_authenticate_image_or_failover, | |
433 | "authenticate image via HAB on failure drop to USB BootROM mode", | |
434 | "addr length ivt_offset\n" | |
435 | "addr - image hex address\n" | |
436 | "length - image hex length\n" | |
437 | "ivt_offset - hex offset of IVT in the image" | |
438 | ); | |
439 | ||
b4eca2d7 SS |
440 | U_BOOT_CMD( |
441 | hab_version, 1, 0, do_hab_version, | |
442 | "print HAB major/minor version", | |
443 | "" | |
444 | ); | |
445 | ||
15b505b0 SE |
446 | #endif /* !defined(CONFIG_SPL_BUILD) */ |
447 | ||
ed286bc8 UG |
448 | /* Get CSF Header length */ |
449 | static int get_hab_hdr_len(struct hab_hdr *hdr) | |
450 | { | |
451 | return (size_t)((hdr->len[0] << 8) + (hdr->len[1])); | |
452 | } | |
453 | ||
454 | /* Check whether addr lies between start and | |
455 | * end and is within the length of the image | |
456 | */ | |
457 | static int chk_bounds(u8 *addr, size_t bytes, u8 *start, u8 *end) | |
458 | { | |
459 | size_t csf_size = (size_t)((end + 1) - addr); | |
460 | ||
461 | return (addr && (addr >= start) && (addr <= end) && | |
462 | (csf_size >= bytes)); | |
463 | } | |
464 | ||
465 | /* Get Length of each command in CSF */ | |
466 | static int get_csf_cmd_hdr_len(u8 *csf_hdr) | |
467 | { | |
468 | if (*csf_hdr == HAB_CMD_HDR) | |
469 | return sizeof(struct hab_hdr); | |
470 | ||
471 | return get_hab_hdr_len((struct hab_hdr *)csf_hdr); | |
472 | } | |
473 | ||
474 | /* Check if CSF is valid */ | |
475 | static bool csf_is_valid(struct ivt *ivt, ulong start_addr, size_t bytes) | |
476 | { | |
477 | u8 *start = (u8 *)start_addr; | |
478 | u8 *csf_hdr; | |
479 | u8 *end; | |
480 | ||
481 | size_t csf_hdr_len; | |
482 | size_t cmd_hdr_len; | |
483 | size_t offset = 0; | |
484 | ||
485 | if (bytes != 0) | |
486 | end = start + bytes - 1; | |
487 | else | |
488 | end = start; | |
489 | ||
490 | /* Verify if CSF pointer content is zero */ | |
491 | if (!ivt->csf) { | |
492 | puts("Error: CSF pointer is NULL\n"); | |
493 | return false; | |
494 | } | |
495 | ||
496 | csf_hdr = (u8 *)ivt->csf; | |
497 | ||
498 | /* Verify if CSF Header exist */ | |
499 | if (*csf_hdr != HAB_CMD_HDR) { | |
500 | puts("Error: CSF header command not found\n"); | |
501 | return false; | |
502 | } | |
503 | ||
504 | csf_hdr_len = get_hab_hdr_len((struct hab_hdr *)csf_hdr); | |
505 | ||
506 | /* Check if the CSF lies within the image bounds */ | |
507 | if (!chk_bounds(csf_hdr, csf_hdr_len, start, end)) { | |
508 | puts("Error: CSF lies outside the image bounds\n"); | |
509 | return false; | |
510 | } | |
511 | ||
512 | do { | |
20fa1dd3 UG |
513 | struct hab_hdr *cmd; |
514 | ||
515 | cmd = (struct hab_hdr *)&csf_hdr[offset]; | |
516 | ||
517 | switch (cmd->tag) { | |
518 | case (HAB_CMD_WRT_DAT): | |
519 | puts("Error: Deprecated write command found\n"); | |
520 | return false; | |
521 | case (HAB_CMD_CHK_DAT): | |
522 | puts("Error: Deprecated check command found\n"); | |
523 | return false; | |
524 | case (HAB_CMD_SET): | |
525 | if (cmd->par == HAB_PAR_MID) { | |
526 | puts("Error: Deprecated Set MID command found\n"); | |
527 | return false; | |
528 | } | |
529 | default: | |
530 | break; | |
531 | } | |
532 | ||
ed286bc8 UG |
533 | cmd_hdr_len = get_csf_cmd_hdr_len(&csf_hdr[offset]); |
534 | if (!cmd_hdr_len) { | |
535 | puts("Error: Invalid command length\n"); | |
536 | return false; | |
537 | } | |
538 | offset += cmd_hdr_len; | |
539 | ||
540 | } while (offset < csf_hdr_len); | |
541 | ||
542 | return true; | |
543 | } | |
544 | ||
07eefaf1 | 545 | bool imx_hab_is_enabled(void) |
15b505b0 SE |
546 | { |
547 | struct imx_sec_config_fuse_t *fuse = | |
548 | (struct imx_sec_config_fuse_t *)&imx_sec_config_fuse; | |
549 | uint32_t reg; | |
550 | int ret; | |
551 | ||
552 | ret = fuse_read(fuse->bank, fuse->word, ®); | |
553 | if (ret) { | |
554 | puts("\nSecure boot fuse read error\n"); | |
555 | return ret; | |
556 | } | |
557 | ||
558 | return (reg & IS_HAB_ENABLED_BIT) == IS_HAB_ENABLED_BIT; | |
559 | } | |
560 | ||
57f65486 BD |
561 | int imx_hab_authenticate_image(uint32_t ddr_start, uint32_t image_size, |
562 | uint32_t ivt_offset) | |
36c1ca4d NG |
563 | { |
564 | uint32_t load_addr = 0; | |
565 | size_t bytes; | |
c5800b25 | 566 | uint32_t ivt_addr = 0; |
9535b397 | 567 | int result = 1; |
36c1ca4d NG |
568 | ulong start; |
569 | hab_rvt_authenticate_image_t *hab_rvt_authenticate_image; | |
570 | hab_rvt_entry_t *hab_rvt_entry; | |
571 | hab_rvt_exit_t *hab_rvt_exit; | |
b7c3cae7 | 572 | hab_rvt_check_target_t *hab_rvt_check_target; |
49b6d058 BD |
573 | struct ivt *ivt; |
574 | struct ivt_header *ivt_hdr; | |
b7c3cae7 | 575 | enum hab_status status; |
36c1ca4d | 576 | |
7b889baf BL |
577 | hab_rvt_authenticate_image = |
578 | (hab_rvt_authenticate_image_t *)HAB_RVT_AUTHENTICATE_IMAGE; | |
579 | hab_rvt_entry = (hab_rvt_entry_t *)HAB_RVT_ENTRY; | |
580 | hab_rvt_exit = (hab_rvt_exit_t *)HAB_RVT_EXIT; | |
581 | hab_rvt_check_target = (hab_rvt_check_target_t *)HAB_RVT_CHECK_TARGET; | |
36c1ca4d | 582 | |
e5b30e4a | 583 | if (!imx_hab_is_enabled()) { |
d2c61800 | 584 | puts("hab fuse not enabled\n"); |
4467ae6c | 585 | return 0; |
d2c61800 | 586 | } |
36c1ca4d | 587 | |
d2c61800 BD |
588 | printf("\nAuthenticate image from DDR location 0x%x...\n", |
589 | ddr_start); | |
36c1ca4d | 590 | |
d2c61800 | 591 | hab_caam_clock_enable(1); |
36c1ca4d | 592 | |
c5800b25 BD |
593 | /* Calculate IVT address header */ |
594 | ivt_addr = ddr_start + ivt_offset; | |
49b6d058 BD |
595 | ivt = (struct ivt *)ivt_addr; |
596 | ivt_hdr = &ivt->hdr; | |
597 | ||
598 | /* Verify IVT header bugging out on error */ | |
599 | if (verify_ivt_header(ivt_hdr)) | |
669f2d18 | 600 | goto hab_authentication_exit; |
49b6d058 | 601 | |
e59eb9e0 BD |
602 | /* Verify IVT body */ |
603 | if (ivt->self != ivt_addr) { | |
604 | printf("ivt->self 0x%08x pointer is 0x%08x\n", | |
605 | ivt->self, ivt_addr); | |
669f2d18 | 606 | goto hab_authentication_exit; |
e59eb9e0 BD |
607 | } |
608 | ||
8c4037a0 | 609 | /* Verify if IVT DCD pointer is NULL */ |
b2ca8907 BML |
610 | if (ivt->dcd) { |
611 | puts("Error: DCD pointer must be NULL\n"); | |
612 | goto hab_authentication_exit; | |
613 | } | |
8c4037a0 | 614 | |
53c8a510 | 615 | start = ddr_start; |
c5800b25 | 616 | bytes = image_size; |
04099e9c | 617 | |
ed286bc8 UG |
618 | /* Verify CSF */ |
619 | if (!csf_is_valid(ivt, start, bytes)) | |
620 | goto hab_authentication_exit; | |
621 | ||
04099e9c BD |
622 | if (hab_rvt_entry() != HAB_SUCCESS) { |
623 | puts("hab entry function fail\n"); | |
2c6c68d2 | 624 | goto hab_exit_failure_print_status; |
04099e9c BD |
625 | } |
626 | ||
b7c3cae7 BD |
627 | status = hab_rvt_check_target(HAB_TGT_MEMORY, (void *)ddr_start, bytes); |
628 | if (status != HAB_SUCCESS) { | |
629 | printf("HAB check target 0x%08x-0x%08x fail\n", | |
630 | ddr_start, ddr_start + bytes); | |
2c6c68d2 | 631 | goto hab_exit_failure_print_status; |
b7c3cae7 | 632 | } |
36c1ca4d | 633 | #ifdef DEBUG |
c5800b25 | 634 | printf("\nivt_offset = 0x%x, ivt addr = 0x%x\n", ivt_offset, ivt_addr); |
824ef302 BD |
635 | printf("ivt entry = 0x%08x, dcd = 0x%08x, csf = 0x%08x\n", ivt->entry, |
636 | ivt->dcd, ivt->csf); | |
53c8a510 | 637 | puts("Dumping IVT\n"); |
c5800b25 | 638 | print_buffer(ivt_addr, (void *)(ivt_addr), 4, 0x8, 0); |
53c8a510 BD |
639 | |
640 | puts("Dumping CSF Header\n"); | |
fd15fe5f | 641 | print_buffer(ivt->csf, (void *)(ivt->csf), 4, 0x10, 0); |
36c1ca4d | 642 | |
15b505b0 | 643 | #if !defined(CONFIG_SPL_BUILD) |
53c8a510 | 644 | get_hab_status(); |
15b505b0 | 645 | #endif |
36c1ca4d | 646 | |
53c8a510 BD |
647 | puts("\nCalling authenticate_image in ROM\n"); |
648 | printf("\tivt_offset = 0x%x\n", ivt_offset); | |
649 | printf("\tstart = 0x%08lx\n", start); | |
650 | printf("\tbytes = 0x%x\n", bytes); | |
36c1ca4d | 651 | #endif |
53c8a510 BD |
652 | /* |
653 | * If the MMU is enabled, we have to notify the ROM | |
654 | * code, or it won't flush the caches when needed. | |
655 | * This is done, by setting the "pu_irom_mmu_enabled" | |
656 | * word to 1. You can find its address by looking in | |
657 | * the ROM map. This is critical for | |
658 | * authenticate_image(). If MMU is enabled, without | |
659 | * setting this bit, authentication will fail and may | |
660 | * crash. | |
661 | */ | |
662 | /* Check MMU enabled */ | |
663 | if (is_soc_type(MXC_SOC_MX6) && get_cr() & CR_M) { | |
664 | if (is_mx6dq()) { | |
665 | /* | |
666 | * This won't work on Rev 1.0.0 of | |
667 | * i.MX6Q/D, since their ROM doesn't | |
668 | * do cache flushes. don't think any | |
669 | * exist, so we ignore them. | |
670 | */ | |
671 | if (!is_mx6dqp()) | |
672 | writel(1, MX6DQ_PU_IROM_MMU_EN_VAR); | |
673 | } else if (is_mx6sdl()) { | |
674 | writel(1, MX6DLS_PU_IROM_MMU_EN_VAR); | |
675 | } else if (is_mx6sl()) { | |
676 | writel(1, MX6SL_PU_IROM_MMU_EN_VAR); | |
d2c61800 | 677 | } |
53c8a510 | 678 | } |
36c1ca4d | 679 | |
53c8a510 BD |
680 | load_addr = (uint32_t)hab_rvt_authenticate_image( |
681 | HAB_CID_UBOOT, | |
682 | ivt_offset, (void **)&start, | |
683 | (size_t *)&bytes, NULL); | |
684 | if (hab_rvt_exit() != HAB_SUCCESS) { | |
685 | puts("hab exit function fail\n"); | |
686 | load_addr = 0; | |
d2c61800 | 687 | } |
36c1ca4d | 688 | |
2c6c68d2 | 689 | hab_exit_failure_print_status: |
15b505b0 | 690 | #if !defined(CONFIG_SPL_BUILD) |
d2c61800 | 691 | get_hab_status(); |
15b505b0 | 692 | #endif |
2c6c68d2 | 693 | |
669f2d18 | 694 | hab_authentication_exit: |
2c6c68d2 | 695 | |
d2c61800 | 696 | if (load_addr != 0) |
9535b397 | 697 | result = 0; |
36c1ca4d NG |
698 | |
699 | return result; | |
700 | } |