bl2_main.c 13.5 KB
Newer Older
1
/*
2
 * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved.
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions are met:
 *
 * Redistributions of source code must retain the above copyright notice, this
 * list of conditions and the following disclaimer.
 *
 * Redistributions in binary form must reproduce the above copyright notice,
 * this list of conditions and the following disclaimer in the documentation
 * and/or other materials provided with the distribution.
 *
 * Neither the name of ARM nor the names of its contributors may be used
 * to endorse or promote products derived from this software without specific
 * prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
 * POSSIBILITY OF SUCH DAMAGE.
 */

31
#include <arch.h>
32
#include <arch_helpers.h>
33
#include <assert.h>
34
#include <auth.h>
35
#include <bl_common.h>
36
#include <debug.h>
37
#include <platform.h>
38
#include <platform_def.h>
39
#include "bl2_private.h"
40

41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
#if TRUSTED_BOARD_BOOT

#ifdef BL32_BASE
static int bl32_cert_error;
#endif

/*
 * Load and authenticate the key and content certificates for a BL3-x image
 *
 * Parameters:
 *   key_cert_blob: key certificate blob id (see auth.h)
 *   key_cert_name: key certificate filename
 *   cont_cert_blob: content certificate blob id (see auth.h)
 *   cont_cert_name: content certificate filename
 *   mem_layout: Trusted SRAM memory layout
 *   load_addr: load the certificates at this address
 *
 * Return: 0 = success, Otherwise = error
 */
static int load_cert_bl3x(int key_cert_blob, const char *key_cert_name,
			  int cont_cert_blob, const char *cont_cert_name,
			  meminfo_t *mem_layout, uint64_t load_addr)
{
	image_info_t image_info;
	int err;

	/* Load Key certificate */
	image_info.h.version = VERSION_1;
	err = load_image(mem_layout, key_cert_name, load_addr, &image_info, NULL);
	if (err) {
		ERROR("Cannot load %s.\n", key_cert_name);
		return err;
	}

	err = auth_verify_obj(key_cert_blob, image_info.image_base,
			image_info.image_size);
	if (err) {
		ERROR("Invalid key certificate %s.\n", key_cert_name);
		return err;
	}

	/* Load Content certificate */
	image_info.h.version = VERSION_1;
	err = load_image(mem_layout, cont_cert_name, load_addr, &image_info, NULL);
	if (err) {
		ERROR("Cannot load %s.\n", cont_cert_name);
		return err;
	}

	err = auth_verify_obj(cont_cert_blob, image_info.image_base,
			image_info.image_size);
	if (err) {
		ERROR("Invalid content certificate %s.\n", cont_cert_name);
		return err;
	}

	return 0;
}

/*
 * Load and authenticate the Trusted Key certificate the key and content
 * certificates for each of the BL3-x images.
 *
 * Return: 0 = success, Otherwise = error
 */
static int load_certs(void)
{
	const uint64_t load_addr = BL31_BASE;
	image_info_t image_info;
	meminfo_t *mem_layout;
	int err;

	/* Find out how much free trusted ram remains after BL2 load */
	mem_layout = bl2_plat_sec_mem_layout();

	/* Load the Trusted Key certificate in the BL31 region */
	image_info.h.version = VERSION_1;
	err = load_image(mem_layout, TRUSTED_KEY_CERT_NAME, load_addr,
			 &image_info, NULL);
	if (err) {
		ERROR("Failed to load Trusted Key certificate.\n");
		return err;
	}

	/* Validate the certificate */
	err = auth_verify_obj(AUTH_TRUSTED_KEY_CERT, image_info.image_base,
			image_info.image_size);
	if (err) {
		ERROR("Invalid Trusted Key certificate.\n");
		return err;
	}

	/* Load and validate Key and Content certificates for BL3-x images */
#ifdef BL30_BASE
	err = load_cert_bl3x(AUTH_BL30_KEY_CERT, BL30_KEY_CERT_NAME,
			     AUTH_BL30_IMG_CERT, BL30_CERT_NAME,
			     mem_layout, load_addr);
	if (err) {
		ERROR("Failed to verify BL3-0 authenticity\n");
		return err;
	}
#endif /* BL30_BASE */

	err = load_cert_bl3x(AUTH_BL31_KEY_CERT, BL31_KEY_CERT_NAME,
			     AUTH_BL31_IMG_CERT, BL31_CERT_NAME,
			     mem_layout, load_addr);
	if (err) {
		ERROR("Failed to verify BL3-1 authenticity\n");
		return err;
	}

#ifdef BL32_BASE
	/* BL3-2 image is optional, but keep the return value in case the
	 * image is present but the certificate is missing */
	err = load_cert_bl3x(AUTH_BL32_KEY_CERT, BL32_KEY_CERT_NAME,
			     AUTH_BL32_IMG_CERT, BL32_CERT_NAME,
			     mem_layout, load_addr);
	if (err) {
		WARN("Failed to verify BL3-2 authenticity\n");
	}
	bl32_cert_error = err;
#endif /* BL32_BASE */

	err = load_cert_bl3x(AUTH_BL33_KEY_CERT, BL33_KEY_CERT_NAME,
			     AUTH_BL33_IMG_CERT, BL33_CERT_NAME,
			     mem_layout, load_addr);
	if (err) {
		ERROR("Failed to verify BL3-3 authenticity\n");
		return err;
	}

	return 0;
}

#endif /* TRUSTED_BOARD_BOOT */

177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
/*******************************************************************************
 * Load the BL3-0 image if there's one.
 * If a platform does not want to attempt to load BL3-0 image it must leave
 * BL30_BASE undefined.
 * Return 0 on success or if there's no BL3-0 image to load, a negative error
 * code otherwise.
 ******************************************************************************/
static int load_bl30(void)
{
	int e = 0;
#ifdef BL30_BASE
	meminfo_t bl30_mem_info;
	image_info_t bl30_image_info;

	/*
	 * It is up to the platform to specify where BL3-0 should be loaded if
	 * it exists. It could create space in the secure sram or point to a
	 * completely different memory.
	 *
	 * The entry point information is not relevant in this case as the AP
	 * won't execute the BL3-0 image.
	 */
Dan Handley's avatar
Dan Handley committed
199
	INFO("BL2: Loading BL3-0\n");
200
	bl2_plat_get_bl30_meminfo(&bl30_mem_info);
201
	bl30_image_info.h.version = VERSION_1;
202
203
204
205
206
207
	e = load_image(&bl30_mem_info,
		       BL30_IMAGE_NAME,
		       BL30_BASE,
		       &bl30_image_info,
		       NULL);

208
209
210
	if (e)
		return e;

211
#if TRUSTED_BOARD_BOOT
212
213
214
215
216
217
218
219
220
221
222
	e = auth_verify_obj(AUTH_BL30_IMG,
			bl30_image_info.image_base,
			bl30_image_info.image_size);
	if (e) {
		ERROR("Failed to authenticate BL3-0 image.\n");
		return e;
	}

	/* After working with data, invalidate the data cache */
	inv_dcache_range(bl30_image_info.image_base,
			(size_t)bl30_image_info.image_size);
223
224
#endif /* TRUSTED_BOARD_BOOT */

225
226
227
228
229
	/* The subsequent handling of BL3-0 is platform specific */
	e = bl2_plat_handle_bl30(&bl30_image_info);
	if (e) {
		ERROR("Failure in platform-specific handling of BL3-0 image.\n");
		return e;
230
231
232
233
234
	}
#endif /* BL30_BASE */

	return e;
}
235

236
/*******************************************************************************
237
238
239
240
 * Load the BL3-1 image.
 * The bl2_to_bl31_params and bl31_ep_info params will be updated with the
 * relevant BL3-1 information.
 * Return 0 on success, a negative error code otherwise.
241
 ******************************************************************************/
242
243
static int load_bl31(bl31_params_t *bl2_to_bl31_params,
		     entry_point_info_t *bl31_ep_info)
244
{
245
	meminfo_t *bl2_tzram_layout;
246
	int e;
247

Dan Handley's avatar
Dan Handley committed
248
	INFO("BL2: Loading BL3-1\n");
249
250
	assert(bl2_to_bl31_params != NULL);
	assert(bl31_ep_info != NULL);
251
252

	/* Find out how much free trusted ram remains after BL2 load */
253
	bl2_tzram_layout = bl2_plat_sec_mem_layout();
254

255
	/* Set the X0 parameter to BL3-1 */
256
257
	bl31_ep_info->args.arg0 = (unsigned long)bl2_to_bl31_params;

258
	/* Load the BL3-1 image */
259
	e = load_image(bl2_tzram_layout,
260
261
262
263
		       BL31_IMAGE_NAME,
		       BL31_BASE,
		       bl2_to_bl31_params->bl31_image_info,
		       bl31_ep_info);
264
265
	if (e)
		return e;
266

267
#if TRUSTED_BOARD_BOOT
268
269
270
271
272
273
274
275
276
277
	e = auth_verify_obj(AUTH_BL31_IMG,
			    bl2_to_bl31_params->bl31_image_info->image_base,
			    bl2_to_bl31_params->bl31_image_info->image_size);
	if (e) {
		ERROR("Failed to authenticate BL3-1 image.\n");
		return e;
	}

	/* After working with data, invalidate the data cache */
	inv_dcache_range(bl2_to_bl31_params->bl31_image_info->image_base,
278
279
280
			(size_t)bl2_to_bl31_params->bl31_image_info->image_size);
#endif /* TRUSTED_BOARD_BOOT */

281
282
	bl2_plat_set_bl31_ep_info(bl2_to_bl31_params->bl31_image_info,
				  bl31_ep_info);
283

284
285
	return e;
}
286

287
288
289
290
291
292
293
294
295
296
297
298
299
300
/*******************************************************************************
 * Load the BL3-2 image if there's one.
 * The bl2_to_bl31_params param will be updated with the relevant BL3-2
 * information.
 * If a platform does not want to attempt to load BL3-2 image it must leave
 * BL32_BASE undefined.
 * Return 0 on success or if there's no BL3-2 image to load, a negative error
 * code otherwise.
 ******************************************************************************/
static int load_bl32(bl31_params_t *bl2_to_bl31_params)
{
	int e = 0;
#ifdef BL32_BASE
	meminfo_t bl32_mem_info;
301

Dan Handley's avatar
Dan Handley committed
302
	INFO("BL2: Loading BL3-2\n");
303
	assert(bl2_to_bl31_params != NULL);
304

305
	/*
306
307
	 * It is up to the platform to specify where BL3-2 should be loaded if
	 * it exists. It could create space in the secure sram or point to a
308
	 * completely different memory.
309
	 */
310
	bl2_plat_get_bl32_meminfo(&bl32_mem_info);
311
312
313
314
315
316
	e = load_image(&bl32_mem_info,
		       BL32_IMAGE_NAME,
		       BL32_BASE,
		       bl2_to_bl31_params->bl32_image_info,
		       bl2_to_bl31_params->bl32_ep_info);

317
318
319
	if (e)
		return e;

320
#if TRUSTED_BOARD_BOOT
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
	/* Image is present. Check if there is a valid certificate */
	if (bl32_cert_error) {
		ERROR("Failed to authenticate BL3-2 certificates.\n");
		return bl32_cert_error;
	}

	e = auth_verify_obj(AUTH_BL32_IMG,
			    bl2_to_bl31_params->bl32_image_info->image_base,
			    bl2_to_bl31_params->bl32_image_info->image_size);
	if (e) {
		ERROR("Failed to authenticate BL3-2 image.\n");
		return e;
	}
	/* After working with data, invalidate the data cache */
	inv_dcache_range(bl2_to_bl31_params->bl32_image_info->image_base,
336
337
338
			(size_t)bl2_to_bl31_params->bl32_image_info->image_size);
#endif /* TRUSTED_BOARD_BOOT */

339
340
341
	bl2_plat_set_bl32_ep_info(
		bl2_to_bl31_params->bl32_image_info,
		bl2_to_bl31_params->bl32_ep_info);
342
#endif /* BL32_BASE */
Achin Gupta's avatar
Achin Gupta committed
343

344
345
346
347
348
349
350
351
352
353
354
355
356
357
	return e;
}

/*******************************************************************************
 * Load the BL3-3 image.
 * The bl2_to_bl31_params param will be updated with the relevant BL3-3
 * information.
 * Return 0 on success, a negative error code otherwise.
 ******************************************************************************/
static int load_bl33(bl31_params_t *bl2_to_bl31_params)
{
	meminfo_t bl33_mem_info;
	int e;

Dan Handley's avatar
Dan Handley committed
358
	INFO("BL2: Loading BL3-3\n");
359
360
361
362
363
364
365
366
367
368
369
	assert(bl2_to_bl31_params != NULL);

	bl2_plat_get_bl33_meminfo(&bl33_mem_info);

	/* Load the BL3-3 image in non-secure memory provided by the platform */
	e = load_image(&bl33_mem_info,
		       BL33_IMAGE_NAME,
		       plat_get_ns_image_entrypoint(),
		       bl2_to_bl31_params->bl33_image_info,
		       bl2_to_bl31_params->bl33_ep_info);

370
371
372
	if (e)
		return e;

373
#if TRUSTED_BOARD_BOOT
374
375
376
377
378
379
380
381
382
	e = auth_verify_obj(AUTH_BL33_IMG,
			    bl2_to_bl31_params->bl33_image_info->image_base,
			    bl2_to_bl31_params->bl33_image_info->image_size);
	if (e) {
		ERROR("Failed to authenticate BL3-3 image.\n");
		return e;
	}
	/* After working with data, invalidate the data cache */
	inv_dcache_range(bl2_to_bl31_params->bl33_image_info->image_base,
383
384
385
			(size_t)bl2_to_bl31_params->bl33_image_info->image_size);
#endif /* TRUSTED_BOARD_BOOT */

386
387
	bl2_plat_set_bl33_ep_info(bl2_to_bl31_params->bl33_image_info,
				  bl2_to_bl31_params->bl33_ep_info);
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402

	return e;
}

/*******************************************************************************
 * The only thing to do in BL2 is to load further images and pass control to
 * BL3-1. The memory occupied by BL2 will be reclaimed by BL3-x stages. BL2 runs
 * entirely in S-EL1.
 ******************************************************************************/
void bl2_main(void)
{
	bl31_params_t *bl2_to_bl31_params;
	entry_point_info_t *bl31_ep_info;
	int e;

Dan Handley's avatar
Dan Handley committed
403
404
405
	NOTICE("BL2: %s\n", version_string);
	NOTICE("BL2: %s\n", build_message);

406
407
408
	/* Perform remaining generic architectural setup in S-EL1 */
	bl2_arch_setup();

409
410
411
412
413
414
415
416
417
418
419
420
#if TRUSTED_BOARD_BOOT
	/* Initialize authentication module */
	auth_init();

	/* Validate the certificates involved in the Chain of Trust */
	e = load_certs();
	if (e) {
		ERROR("Chain of Trust invalid. Aborting...\n");
		panic();
	}
#endif /* TRUSTED_BOARD_BOOT */

421
422
423
424
425
426
427
428
429
	/*
	 * Load the subsequent bootloader images
	 */
	e = load_bl30();
	if (e) {
		ERROR("Failed to load BL3-0 (%i)\n", e);
		panic();
	}

Juan Castillo's avatar
Juan Castillo committed
430
431
432
	/* Perform platform setup in BL2 after loading BL3-0 */
	bl2_platform_setup();

433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
	/*
	 * Get a pointer to the memory the platform has set aside to pass
	 * information to BL3-1.
	 */
	bl2_to_bl31_params = bl2_plat_get_bl31_params();
	bl31_ep_info = bl2_plat_get_bl31_ep_info();

	e = load_bl31(bl2_to_bl31_params, bl31_ep_info);
	if (e) {
		ERROR("Failed to load BL3-1 (%i)\n", e);
		panic();
	}

	e = load_bl32(bl2_to_bl31_params);
	if (e)
		WARN("Failed to load BL3-2 (%i)\n", e);

	e = load_bl33(bl2_to_bl31_params);
	if (e) {
		ERROR("Failed to load BL3-3 (%i)\n", e);
		panic();
	}

456
457
458
	/* Flush the params to be passed to memory */
	bl2_plat_flush_bl31_params();

459
	/*
460
461
462
	 * Run BL3-1 via an SMC to BL1. Information on how to pass control to
	 * the BL3-2 (if present) and BL3-3 software images will be passed to
	 * BL3-1 as an argument.
463
	 */
464
	smc(RUN_IMAGE, (unsigned long)bl31_ep_info, 0, 0, 0, 0, 0, 0);
465
}