bl2_main.c 13.9 KB
Newer Older
1
/*
2
 * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved.
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions are met:
 *
 * Redistributions of source code must retain the above copyright notice, this
 * list of conditions and the following disclaimer.
 *
 * Redistributions in binary form must reproduce the above copyright notice,
 * this list of conditions and the following disclaimer in the documentation
 * and/or other materials provided with the distribution.
 *
 * Neither the name of ARM nor the names of its contributors may be used
 * to endorse or promote products derived from this software without specific
 * prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
 * POSSIBILITY OF SUCH DAMAGE.
 */

31
#include <arch.h>
32
#include <arch_helpers.h>
33
#include <assert.h>
34
#include <auth.h>
35
#include <bl_common.h>
36
#include <debug.h>
37
#include <platform.h>
38
#include <platform_def.h>
39
#include <stdint.h>
40
#include "bl2_private.h"
41

42
43
44
45
46
47
48
#if TRUSTED_BOARD_BOOT

#ifdef BL32_BASE
static int bl32_cert_error;
#endif

/*
49
50
51
52
53
 * Load and authenticate the key and content certificates for a BL3-x image.
 * The _blob values identify the authentication objects (an object may be seen
 * as a single stage in the authentication process). See auth.h for the complete
 * list of objects. The _id values are passed to the IO framework to identify
 * the images to load.
54
55
56
 *
 * Parameters:
 *   key_cert_blob: key certificate blob id (see auth.h)
57
 *   key_cert_id: key certificate image identifier (for IO framework)
58
 *   cont_cert_blob: content certificate blob id (see auth.h)
59
 *   cont_cert_id: content certificate image identifier (for IO framework)
60
61
62
63
64
 *   mem_layout: Trusted SRAM memory layout
 *   load_addr: load the certificates at this address
 *
 * Return: 0 = success, Otherwise = error
 */
65
66
static int load_cert_bl3x(unsigned int key_cert_blob, unsigned int key_cert_id,
			  unsigned int cont_cert_blob, unsigned int cont_cert_id,
67
68
69
70
71
72
73
			  meminfo_t *mem_layout, uint64_t load_addr)
{
	image_info_t image_info;
	int err;

	/* Load Key certificate */
	image_info.h.version = VERSION_1;
74
	err = load_image(mem_layout, key_cert_id, load_addr, &image_info, NULL);
75
	if (err) {
76
		ERROR("Cannot load key certificate id=%u\n", key_cert_id);
77
78
79
80
81
82
		return err;
	}

	err = auth_verify_obj(key_cert_blob, image_info.image_base,
			image_info.image_size);
	if (err) {
83
		ERROR("Invalid key certificate id=%u\n", key_cert_id);
84
85
86
87
88
		return err;
	}

	/* Load Content certificate */
	image_info.h.version = VERSION_1;
89
	err = load_image(mem_layout, cont_cert_id, load_addr, &image_info, NULL);
90
	if (err) {
91
92
		ERROR("Cannot load content certificate id=%u\n",
				cont_cert_id);
93
94
95
96
97
98
		return err;
	}

	err = auth_verify_obj(cont_cert_blob, image_info.image_base,
			image_info.image_size);
	if (err) {
99
		ERROR("Invalid content certificate id=%u\n", cont_cert_id);
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
		return err;
	}

	return 0;
}

/*
 * Load and authenticate the Trusted Key certificate the key and content
 * certificates for each of the BL3-x images.
 *
 * Return: 0 = success, Otherwise = error
 */
static int load_certs(void)
{
	const uint64_t load_addr = BL31_BASE;
	image_info_t image_info;
	meminfo_t *mem_layout;
	int err;

	/* Find out how much free trusted ram remains after BL2 load */
	mem_layout = bl2_plat_sec_mem_layout();

	/* Load the Trusted Key certificate in the BL31 region */
	image_info.h.version = VERSION_1;
124
	err = load_image(mem_layout, TRUSTED_KEY_CERT_ID, load_addr,
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
			 &image_info, NULL);
	if (err) {
		ERROR("Failed to load Trusted Key certificate.\n");
		return err;
	}

	/* Validate the certificate */
	err = auth_verify_obj(AUTH_TRUSTED_KEY_CERT, image_info.image_base,
			image_info.image_size);
	if (err) {
		ERROR("Invalid Trusted Key certificate.\n");
		return err;
	}

	/* Load and validate Key and Content certificates for BL3-x images */
#ifdef BL30_BASE
141
142
	err = load_cert_bl3x(AUTH_BL30_KEY_CERT, BL30_KEY_CERT_ID,
			     AUTH_BL30_IMG_CERT, BL30_CERT_ID,
143
144
145
146
147
148
149
			     mem_layout, load_addr);
	if (err) {
		ERROR("Failed to verify BL3-0 authenticity\n");
		return err;
	}
#endif /* BL30_BASE */

150
151
	err = load_cert_bl3x(AUTH_BL31_KEY_CERT, BL31_KEY_CERT_ID,
			     AUTH_BL31_IMG_CERT, BL31_CERT_ID,
152
153
154
155
156
157
158
159
160
			     mem_layout, load_addr);
	if (err) {
		ERROR("Failed to verify BL3-1 authenticity\n");
		return err;
	}

#ifdef BL32_BASE
	/* BL3-2 image is optional, but keep the return value in case the
	 * image is present but the certificate is missing */
161
162
	err = load_cert_bl3x(AUTH_BL32_KEY_CERT, BL32_KEY_CERT_ID,
			     AUTH_BL32_IMG_CERT, BL32_CERT_ID,
163
164
165
166
167
168
169
			     mem_layout, load_addr);
	if (err) {
		WARN("Failed to verify BL3-2 authenticity\n");
	}
	bl32_cert_error = err;
#endif /* BL32_BASE */

170
171
	err = load_cert_bl3x(AUTH_BL33_KEY_CERT, BL33_KEY_CERT_ID,
			     AUTH_BL33_IMG_CERT, BL33_CERT_ID,
172
173
174
175
176
177
178
179
180
181
182
			     mem_layout, load_addr);
	if (err) {
		ERROR("Failed to verify BL3-3 authenticity\n");
		return err;
	}

	return 0;
}

#endif /* TRUSTED_BOARD_BOOT */

183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
/*******************************************************************************
 * Load the BL3-0 image if there's one.
 * If a platform does not want to attempt to load BL3-0 image it must leave
 * BL30_BASE undefined.
 * Return 0 on success or if there's no BL3-0 image to load, a negative error
 * code otherwise.
 ******************************************************************************/
static int load_bl30(void)
{
	int e = 0;
#ifdef BL30_BASE
	meminfo_t bl30_mem_info;
	image_info_t bl30_image_info;

	/*
	 * It is up to the platform to specify where BL3-0 should be loaded if
	 * it exists. It could create space in the secure sram or point to a
	 * completely different memory.
	 *
	 * The entry point information is not relevant in this case as the AP
	 * won't execute the BL3-0 image.
	 */
Dan Handley's avatar
Dan Handley committed
205
	INFO("BL2: Loading BL3-0\n");
206
	bl2_plat_get_bl30_meminfo(&bl30_mem_info);
207
	bl30_image_info.h.version = VERSION_1;
208
	e = load_image(&bl30_mem_info,
209
		       BL30_IMAGE_ID,
210
211
212
213
		       BL30_BASE,
		       &bl30_image_info,
		       NULL);

214
215
216
	if (e)
		return e;

217
#if TRUSTED_BOARD_BOOT
218
219
220
221
222
223
224
225
226
227
228
	e = auth_verify_obj(AUTH_BL30_IMG,
			bl30_image_info.image_base,
			bl30_image_info.image_size);
	if (e) {
		ERROR("Failed to authenticate BL3-0 image.\n");
		return e;
	}

	/* After working with data, invalidate the data cache */
	inv_dcache_range(bl30_image_info.image_base,
			(size_t)bl30_image_info.image_size);
229
230
#endif /* TRUSTED_BOARD_BOOT */

231
232
233
234
235
	/* The subsequent handling of BL3-0 is platform specific */
	e = bl2_plat_handle_bl30(&bl30_image_info);
	if (e) {
		ERROR("Failure in platform-specific handling of BL3-0 image.\n");
		return e;
236
237
238
239
240
	}
#endif /* BL30_BASE */

	return e;
}
241

242
/*******************************************************************************
243
244
245
246
 * Load the BL3-1 image.
 * The bl2_to_bl31_params and bl31_ep_info params will be updated with the
 * relevant BL3-1 information.
 * Return 0 on success, a negative error code otherwise.
247
 ******************************************************************************/
248
249
static int load_bl31(bl31_params_t *bl2_to_bl31_params,
		     entry_point_info_t *bl31_ep_info)
250
{
251
	meminfo_t *bl2_tzram_layout;
252
	int e;
253

Dan Handley's avatar
Dan Handley committed
254
	INFO("BL2: Loading BL3-1\n");
255
256
	assert(bl2_to_bl31_params != NULL);
	assert(bl31_ep_info != NULL);
257
258

	/* Find out how much free trusted ram remains after BL2 load */
259
	bl2_tzram_layout = bl2_plat_sec_mem_layout();
260

261
	/* Set the X0 parameter to BL3-1 */
262
263
	bl31_ep_info->args.arg0 = (unsigned long)bl2_to_bl31_params;

264
	/* Load the BL3-1 image */
265
	e = load_image(bl2_tzram_layout,
266
		       BL31_IMAGE_ID,
267
268
269
		       BL31_BASE,
		       bl2_to_bl31_params->bl31_image_info,
		       bl31_ep_info);
270
271
	if (e)
		return e;
272

273
#if TRUSTED_BOARD_BOOT
274
275
276
277
278
279
280
281
282
283
	e = auth_verify_obj(AUTH_BL31_IMG,
			    bl2_to_bl31_params->bl31_image_info->image_base,
			    bl2_to_bl31_params->bl31_image_info->image_size);
	if (e) {
		ERROR("Failed to authenticate BL3-1 image.\n");
		return e;
	}

	/* After working with data, invalidate the data cache */
	inv_dcache_range(bl2_to_bl31_params->bl31_image_info->image_base,
284
285
286
			(size_t)bl2_to_bl31_params->bl31_image_info->image_size);
#endif /* TRUSTED_BOARD_BOOT */

287
288
	bl2_plat_set_bl31_ep_info(bl2_to_bl31_params->bl31_image_info,
				  bl31_ep_info);
289

290
291
	return e;
}
292

293
294
295
296
297
298
299
300
301
302
303
304
305
306
/*******************************************************************************
 * Load the BL3-2 image if there's one.
 * The bl2_to_bl31_params param will be updated with the relevant BL3-2
 * information.
 * If a platform does not want to attempt to load BL3-2 image it must leave
 * BL32_BASE undefined.
 * Return 0 on success or if there's no BL3-2 image to load, a negative error
 * code otherwise.
 ******************************************************************************/
static int load_bl32(bl31_params_t *bl2_to_bl31_params)
{
	int e = 0;
#ifdef BL32_BASE
	meminfo_t bl32_mem_info;
307

Dan Handley's avatar
Dan Handley committed
308
	INFO("BL2: Loading BL3-2\n");
309
	assert(bl2_to_bl31_params != NULL);
310

311
	/*
312
313
	 * It is up to the platform to specify where BL3-2 should be loaded if
	 * it exists. It could create space in the secure sram or point to a
314
	 * completely different memory.
315
	 */
316
	bl2_plat_get_bl32_meminfo(&bl32_mem_info);
317
	e = load_image(&bl32_mem_info,
318
		       BL32_IMAGE_ID,
319
320
321
322
		       BL32_BASE,
		       bl2_to_bl31_params->bl32_image_info,
		       bl2_to_bl31_params->bl32_ep_info);

323
324
325
	if (e)
		return e;

326
#if TRUSTED_BOARD_BOOT
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
	/* Image is present. Check if there is a valid certificate */
	if (bl32_cert_error) {
		ERROR("Failed to authenticate BL3-2 certificates.\n");
		return bl32_cert_error;
	}

	e = auth_verify_obj(AUTH_BL32_IMG,
			    bl2_to_bl31_params->bl32_image_info->image_base,
			    bl2_to_bl31_params->bl32_image_info->image_size);
	if (e) {
		ERROR("Failed to authenticate BL3-2 image.\n");
		return e;
	}
	/* After working with data, invalidate the data cache */
	inv_dcache_range(bl2_to_bl31_params->bl32_image_info->image_base,
342
343
344
			(size_t)bl2_to_bl31_params->bl32_image_info->image_size);
#endif /* TRUSTED_BOARD_BOOT */

345
346
347
	bl2_plat_set_bl32_ep_info(
		bl2_to_bl31_params->bl32_image_info,
		bl2_to_bl31_params->bl32_ep_info);
348
#endif /* BL32_BASE */
Achin Gupta's avatar
Achin Gupta committed
349

350
351
352
353
354
355
356
357
358
359
360
361
362
363
	return e;
}

/*******************************************************************************
 * Load the BL3-3 image.
 * The bl2_to_bl31_params param will be updated with the relevant BL3-3
 * information.
 * Return 0 on success, a negative error code otherwise.
 ******************************************************************************/
static int load_bl33(bl31_params_t *bl2_to_bl31_params)
{
	meminfo_t bl33_mem_info;
	int e;

Dan Handley's avatar
Dan Handley committed
364
	INFO("BL2: Loading BL3-3\n");
365
366
367
368
369
370
	assert(bl2_to_bl31_params != NULL);

	bl2_plat_get_bl33_meminfo(&bl33_mem_info);

	/* Load the BL3-3 image in non-secure memory provided by the platform */
	e = load_image(&bl33_mem_info,
371
		       BL33_IMAGE_ID,
372
373
374
375
		       plat_get_ns_image_entrypoint(),
		       bl2_to_bl31_params->bl33_image_info,
		       bl2_to_bl31_params->bl33_ep_info);

376
377
378
	if (e)
		return e;

379
#if TRUSTED_BOARD_BOOT
380
381
382
383
384
385
386
387
388
	e = auth_verify_obj(AUTH_BL33_IMG,
			    bl2_to_bl31_params->bl33_image_info->image_base,
			    bl2_to_bl31_params->bl33_image_info->image_size);
	if (e) {
		ERROR("Failed to authenticate BL3-3 image.\n");
		return e;
	}
	/* After working with data, invalidate the data cache */
	inv_dcache_range(bl2_to_bl31_params->bl33_image_info->image_base,
389
390
391
			(size_t)bl2_to_bl31_params->bl33_image_info->image_size);
#endif /* TRUSTED_BOARD_BOOT */

392
393
	bl2_plat_set_bl33_ep_info(bl2_to_bl31_params->bl33_image_info,
				  bl2_to_bl31_params->bl33_ep_info);
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408

	return e;
}

/*******************************************************************************
 * The only thing to do in BL2 is to load further images and pass control to
 * BL3-1. The memory occupied by BL2 will be reclaimed by BL3-x stages. BL2 runs
 * entirely in S-EL1.
 ******************************************************************************/
void bl2_main(void)
{
	bl31_params_t *bl2_to_bl31_params;
	entry_point_info_t *bl31_ep_info;
	int e;

Dan Handley's avatar
Dan Handley committed
409
410
411
	NOTICE("BL2: %s\n", version_string);
	NOTICE("BL2: %s\n", build_message);

412
413
414
	/* Perform remaining generic architectural setup in S-EL1 */
	bl2_arch_setup();

415
416
417
418
419
420
421
422
423
424
425
426
#if TRUSTED_BOARD_BOOT
	/* Initialize authentication module */
	auth_init();

	/* Validate the certificates involved in the Chain of Trust */
	e = load_certs();
	if (e) {
		ERROR("Chain of Trust invalid. Aborting...\n");
		panic();
	}
#endif /* TRUSTED_BOARD_BOOT */

427
428
429
430
431
432
433
434
435
	/*
	 * Load the subsequent bootloader images
	 */
	e = load_bl30();
	if (e) {
		ERROR("Failed to load BL3-0 (%i)\n", e);
		panic();
	}

Juan Castillo's avatar
Juan Castillo committed
436
437
438
	/* Perform platform setup in BL2 after loading BL3-0 */
	bl2_platform_setup();

439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
	/*
	 * Get a pointer to the memory the platform has set aside to pass
	 * information to BL3-1.
	 */
	bl2_to_bl31_params = bl2_plat_get_bl31_params();
	bl31_ep_info = bl2_plat_get_bl31_ep_info();

	e = load_bl31(bl2_to_bl31_params, bl31_ep_info);
	if (e) {
		ERROR("Failed to load BL3-1 (%i)\n", e);
		panic();
	}

	e = load_bl32(bl2_to_bl31_params);
	if (e)
		WARN("Failed to load BL3-2 (%i)\n", e);

	e = load_bl33(bl2_to_bl31_params);
	if (e) {
		ERROR("Failed to load BL3-3 (%i)\n", e);
		panic();
	}

462
463
464
	/* Flush the params to be passed to memory */
	bl2_plat_flush_bl31_params();

465
	/*
466
467
468
	 * Run BL3-1 via an SMC to BL1. Information on how to pass control to
	 * the BL3-2 (if present) and BL3-3 software images will be passed to
	 * BL3-1 as an argument.
469
	 */
470
	smc(RUN_IMAGE, (unsigned long)bl31_ep_info, 0, 0, 0, 0, 0, 0);
471
}