/* * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * * Redistributions of source code must retain the above copyright notice, this * list of conditions and the following disclaimer. * * Redistributions in binary form must reproduce the above copyright notice, * this list of conditions and the following disclaimer in the documentation * and/or other materials provided with the distribution. * * Neither the name of ARM nor the names of its contributors may be used * to endorse or promote products derived from this software without specific * prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE. */ #include <arch.h> #include <arch_helpers.h> #include <assert.h> #include <auth.h> #include <bl_common.h> #include <debug.h> #include <platform.h> #include <platform_def.h> #include "bl2_private.h" #if TRUSTED_BOARD_BOOT #ifdef BL32_BASE static int bl32_cert_error; #endif /* * Load and authenticate the key and content certificates for a BL3-x image * * Parameters: * key_cert_blob: key certificate blob id (see auth.h) * key_cert_name: key certificate filename * cont_cert_blob: content certificate blob id (see auth.h) * cont_cert_name: content certificate filename * mem_layout: Trusted SRAM memory layout * load_addr: load the certificates at this address * * Return: 0 = success, Otherwise = error */ static int load_cert_bl3x(int key_cert_blob, const char *key_cert_name, int cont_cert_blob, const char *cont_cert_name, meminfo_t *mem_layout, uint64_t load_addr) { image_info_t image_info; int err; /* Load Key certificate */ image_info.h.version = VERSION_1; err = load_image(mem_layout, key_cert_name, load_addr, &image_info, NULL); if (err) { ERROR("Cannot load %s.\n", key_cert_name); return err; } err = auth_verify_obj(key_cert_blob, image_info.image_base, image_info.image_size); if (err) { ERROR("Invalid key certificate %s.\n", key_cert_name); return err; } /* Load Content certificate */ image_info.h.version = VERSION_1; err = load_image(mem_layout, cont_cert_name, load_addr, &image_info, NULL); if (err) { ERROR("Cannot load %s.\n", cont_cert_name); return err; } err = auth_verify_obj(cont_cert_blob, image_info.image_base, image_info.image_size); if (err) { ERROR("Invalid content certificate %s.\n", cont_cert_name); return err; } return 0; } /* * Load and authenticate the Trusted Key certificate the key and content * certificates for each of the BL3-x images. * * Return: 0 = success, Otherwise = error */ static int load_certs(void) { const uint64_t load_addr = BL31_BASE; image_info_t image_info; meminfo_t *mem_layout; int err; /* Find out how much free trusted ram remains after BL2 load */ mem_layout = bl2_plat_sec_mem_layout(); /* Load the Trusted Key certificate in the BL31 region */ image_info.h.version = VERSION_1; err = load_image(mem_layout, TRUSTED_KEY_CERT_NAME, load_addr, &image_info, NULL); if (err) { ERROR("Failed to load Trusted Key certificate.\n"); return err; } /* Validate the certificate */ err = auth_verify_obj(AUTH_TRUSTED_KEY_CERT, image_info.image_base, image_info.image_size); if (err) { ERROR("Invalid Trusted Key certificate.\n"); return err; } /* Load and validate Key and Content certificates for BL3-x images */ #ifdef BL30_BASE err = load_cert_bl3x(AUTH_BL30_KEY_CERT, BL30_KEY_CERT_NAME, AUTH_BL30_IMG_CERT, BL30_CERT_NAME, mem_layout, load_addr); if (err) { ERROR("Failed to verify BL3-0 authenticity\n"); return err; } #endif /* BL30_BASE */ err = load_cert_bl3x(AUTH_BL31_KEY_CERT, BL31_KEY_CERT_NAME, AUTH_BL31_IMG_CERT, BL31_CERT_NAME, mem_layout, load_addr); if (err) { ERROR("Failed to verify BL3-1 authenticity\n"); return err; } #ifdef BL32_BASE /* BL3-2 image is optional, but keep the return value in case the * image is present but the certificate is missing */ err = load_cert_bl3x(AUTH_BL32_KEY_CERT, BL32_KEY_CERT_NAME, AUTH_BL32_IMG_CERT, BL32_CERT_NAME, mem_layout, load_addr); if (err) { WARN("Failed to verify BL3-2 authenticity\n"); } bl32_cert_error = err; #endif /* BL32_BASE */ err = load_cert_bl3x(AUTH_BL33_KEY_CERT, BL33_KEY_CERT_NAME, AUTH_BL33_IMG_CERT, BL33_CERT_NAME, mem_layout, load_addr); if (err) { ERROR("Failed to verify BL3-3 authenticity\n"); return err; } return 0; } #endif /* TRUSTED_BOARD_BOOT */ /******************************************************************************* * Load the BL3-0 image if there's one. * If a platform does not want to attempt to load BL3-0 image it must leave * BL30_BASE undefined. * Return 0 on success or if there's no BL3-0 image to load, a negative error * code otherwise. ******************************************************************************/ static int load_bl30(void) { int e = 0; #ifdef BL30_BASE meminfo_t bl30_mem_info; image_info_t bl30_image_info; /* * It is up to the platform to specify where BL3-0 should be loaded if * it exists. It could create space in the secure sram or point to a * completely different memory. * * The entry point information is not relevant in this case as the AP * won't execute the BL3-0 image. */ INFO("BL2: Loading BL3-0\n"); bl2_plat_get_bl30_meminfo(&bl30_mem_info); bl30_image_info.h.version = VERSION_1; e = load_image(&bl30_mem_info, BL30_IMAGE_NAME, BL30_BASE, &bl30_image_info, NULL); if (e == 0) { #if TRUSTED_BOARD_BOOT e = auth_verify_obj(AUTH_BL30_IMG, bl30_image_info.image_base, bl30_image_info.image_size); if (e) { ERROR("Failed to authenticate BL3-0 image.\n"); panic(); } /* After working with data, invalidate the data cache */ inv_dcache_range(bl30_image_info.image_base, (size_t)bl30_image_info.image_size); #endif /* TRUSTED_BOARD_BOOT */ /* The subsequent handling of BL3-0 is platform specific */ bl2_plat_handle_bl30(&bl30_image_info); } #endif /* BL30_BASE */ return e; } /******************************************************************************* * Load the BL3-1 image. * The bl2_to_bl31_params and bl31_ep_info params will be updated with the * relevant BL3-1 information. * Return 0 on success, a negative error code otherwise. ******************************************************************************/ static int load_bl31(bl31_params_t *bl2_to_bl31_params, entry_point_info_t *bl31_ep_info) { meminfo_t *bl2_tzram_layout; int e; INFO("BL2: Loading BL3-1\n"); assert(bl2_to_bl31_params != NULL); assert(bl31_ep_info != NULL); /* Find out how much free trusted ram remains after BL2 load */ bl2_tzram_layout = bl2_plat_sec_mem_layout(); /* Set the X0 parameter to BL3-1 */ bl31_ep_info->args.arg0 = (unsigned long)bl2_to_bl31_params; /* Load the BL3-1 image */ e = load_image(bl2_tzram_layout, BL31_IMAGE_NAME, BL31_BASE, bl2_to_bl31_params->bl31_image_info, bl31_ep_info); if (e == 0) { #if TRUSTED_BOARD_BOOT e = auth_verify_obj(AUTH_BL31_IMG, bl2_to_bl31_params->bl31_image_info->image_base, bl2_to_bl31_params->bl31_image_info->image_size); if (e) { ERROR("Failed to authenticate BL3-1 image.\n"); panic(); } /* After working with data, invalidate the data cache */ inv_dcache_range(bl2_to_bl31_params->bl31_image_info->image_base, (size_t)bl2_to_bl31_params->bl31_image_info->image_size); #endif /* TRUSTED_BOARD_BOOT */ bl2_plat_set_bl31_ep_info(bl2_to_bl31_params->bl31_image_info, bl31_ep_info); } return e; } /******************************************************************************* * Load the BL3-2 image if there's one. * The bl2_to_bl31_params param will be updated with the relevant BL3-2 * information. * If a platform does not want to attempt to load BL3-2 image it must leave * BL32_BASE undefined. * Return 0 on success or if there's no BL3-2 image to load, a negative error * code otherwise. ******************************************************************************/ static int load_bl32(bl31_params_t *bl2_to_bl31_params) { int e = 0; #ifdef BL32_BASE meminfo_t bl32_mem_info; INFO("BL2: Loading BL3-2\n"); assert(bl2_to_bl31_params != NULL); /* * It is up to the platform to specify where BL3-2 should be loaded if * it exists. It could create space in the secure sram or point to a * completely different memory. */ bl2_plat_get_bl32_meminfo(&bl32_mem_info); e = load_image(&bl32_mem_info, BL32_IMAGE_NAME, BL32_BASE, bl2_to_bl31_params->bl32_image_info, bl2_to_bl31_params->bl32_ep_info); if (e == 0) { #if TRUSTED_BOARD_BOOT /* Image is present. Check if there is a valid certificate */ if (bl32_cert_error) { ERROR("Failed to authenticate BL3-2 certificates.\n"); panic(); } e = auth_verify_obj(AUTH_BL32_IMG, bl2_to_bl31_params->bl32_image_info->image_base, bl2_to_bl31_params->bl32_image_info->image_size); if (e) { ERROR("Failed to authenticate BL3-2 image.\n"); panic(); } /* After working with data, invalidate the data cache */ inv_dcache_range(bl2_to_bl31_params->bl32_image_info->image_base, (size_t)bl2_to_bl31_params->bl32_image_info->image_size); #endif /* TRUSTED_BOARD_BOOT */ bl2_plat_set_bl32_ep_info( bl2_to_bl31_params->bl32_image_info, bl2_to_bl31_params->bl32_ep_info); } #endif /* BL32_BASE */ return e; } /******************************************************************************* * Load the BL3-3 image. * The bl2_to_bl31_params param will be updated with the relevant BL3-3 * information. * Return 0 on success, a negative error code otherwise. ******************************************************************************/ static int load_bl33(bl31_params_t *bl2_to_bl31_params) { meminfo_t bl33_mem_info; int e; INFO("BL2: Loading BL3-3\n"); assert(bl2_to_bl31_params != NULL); bl2_plat_get_bl33_meminfo(&bl33_mem_info); /* Load the BL3-3 image in non-secure memory provided by the platform */ e = load_image(&bl33_mem_info, BL33_IMAGE_NAME, plat_get_ns_image_entrypoint(), bl2_to_bl31_params->bl33_image_info, bl2_to_bl31_params->bl33_ep_info); if (e == 0) { #if TRUSTED_BOARD_BOOT e = auth_verify_obj(AUTH_BL33_IMG, bl2_to_bl31_params->bl33_image_info->image_base, bl2_to_bl31_params->bl33_image_info->image_size); if (e) { ERROR("Failed to authenticate BL3-3 image.\n"); panic(); } /* After working with data, invalidate the data cache */ inv_dcache_range(bl2_to_bl31_params->bl33_image_info->image_base, (size_t)bl2_to_bl31_params->bl33_image_info->image_size); #endif /* TRUSTED_BOARD_BOOT */ bl2_plat_set_bl33_ep_info(bl2_to_bl31_params->bl33_image_info, bl2_to_bl31_params->bl33_ep_info); } return e; } /******************************************************************************* * The only thing to do in BL2 is to load further images and pass control to * BL3-1. The memory occupied by BL2 will be reclaimed by BL3-x stages. BL2 runs * entirely in S-EL1. ******************************************************************************/ void bl2_main(void) { bl31_params_t *bl2_to_bl31_params; entry_point_info_t *bl31_ep_info; int e; NOTICE("BL2: %s\n", version_string); NOTICE("BL2: %s\n", build_message); /* Perform remaining generic architectural setup in S-EL1 */ bl2_arch_setup(); #if TRUSTED_BOARD_BOOT /* Initialize authentication module */ auth_init(); /* Validate the certificates involved in the Chain of Trust */ e = load_certs(); if (e) { ERROR("Chain of Trust invalid. Aborting...\n"); panic(); } #endif /* TRUSTED_BOARD_BOOT */ /* * Load the subsequent bootloader images */ e = load_bl30(); if (e) { ERROR("Failed to load BL3-0 (%i)\n", e); ERROR("Please burn mcu image:\n"); ERROR(" sudo fastboot flash mcuimage mcuimage.bin\n"); } /* Perform platform setup in BL2 after loading BL3-0 */ bl2_platform_setup(); /* * Get a pointer to the memory the platform has set aside to pass * information to BL3-1. */ bl2_to_bl31_params = bl2_plat_get_bl31_params(); bl31_ep_info = bl2_plat_get_bl31_ep_info(); e = load_bl31(bl2_to_bl31_params, bl31_ep_info); if (e) { ERROR("Failed to load BL3-1 (%i)\n", e); panic(); } e = load_bl32(bl2_to_bl31_params); if (e) WARN("Failed to load BL3-2 (%i)\n", e); e = load_bl33(bl2_to_bl31_params); if (e) { ERROR("Failed to load BL3-3 (%i)\n", e); panic(); } /* Flush the params to be passed to memory */ bl2_plat_flush_bl31_params(); /* * Run BL3-1 via an SMC to BL1. Information on how to pass control to * the BL3-2 (if present) and BL3-3 software images will be passed to * BL3-1 as an argument. */ smc(RUN_IMAGE, (unsigned long)bl31_ep_info, 0, 0, 0, 0, 0, 0); }