bl2_main.c 13.4 KB
Newer Older
1
/*
2
 * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved.
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions are met:
 *
 * Redistributions of source code must retain the above copyright notice, this
 * list of conditions and the following disclaimer.
 *
 * Redistributions in binary form must reproduce the above copyright notice,
 * this list of conditions and the following disclaimer in the documentation
 * and/or other materials provided with the distribution.
 *
 * Neither the name of ARM nor the names of its contributors may be used
 * to endorse or promote products derived from this software without specific
 * prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
 * POSSIBILITY OF SUCH DAMAGE.
 */

31
#include <arch.h>
32
#include <arch_helpers.h>
33
#include <assert.h>
34
#include <auth.h>
35
#include <bl_common.h>
36
#include <debug.h>
37
#include <platform.h>
38
#include <platform_def.h>
39
#include "bl2_private.h"
40

41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
#if TRUSTED_BOARD_BOOT

#ifdef BL32_BASE
static int bl32_cert_error;
#endif

/*
 * Load and authenticate the key and content certificates for a BL3-x image
 *
 * Parameters:
 *   key_cert_blob: key certificate blob id (see auth.h)
 *   key_cert_name: key certificate filename
 *   cont_cert_blob: content certificate blob id (see auth.h)
 *   cont_cert_name: content certificate filename
 *   mem_layout: Trusted SRAM memory layout
 *   load_addr: load the certificates at this address
 *
 * Return: 0 = success, Otherwise = error
 */
static int load_cert_bl3x(int key_cert_blob, const char *key_cert_name,
			  int cont_cert_blob, const char *cont_cert_name,
			  meminfo_t *mem_layout, uint64_t load_addr)
{
	image_info_t image_info;
	int err;

	/* Load Key certificate */
	image_info.h.version = VERSION_1;
	err = load_image(mem_layout, key_cert_name, load_addr, &image_info, NULL);
	if (err) {
		ERROR("Cannot load %s.\n", key_cert_name);
		return err;
	}

	err = auth_verify_obj(key_cert_blob, image_info.image_base,
			image_info.image_size);
	if (err) {
		ERROR("Invalid key certificate %s.\n", key_cert_name);
		return err;
	}

	/* Load Content certificate */
	image_info.h.version = VERSION_1;
	err = load_image(mem_layout, cont_cert_name, load_addr, &image_info, NULL);
	if (err) {
		ERROR("Cannot load %s.\n", cont_cert_name);
		return err;
	}

	err = auth_verify_obj(cont_cert_blob, image_info.image_base,
			image_info.image_size);
	if (err) {
		ERROR("Invalid content certificate %s.\n", cont_cert_name);
		return err;
	}

	return 0;
}

/*
 * Load and authenticate the Trusted Key certificate the key and content
 * certificates for each of the BL3-x images.
 *
 * Return: 0 = success, Otherwise = error
 */
static int load_certs(void)
{
	const uint64_t load_addr = BL31_BASE;
	image_info_t image_info;
	meminfo_t *mem_layout;
	int err;

	/* Find out how much free trusted ram remains after BL2 load */
	mem_layout = bl2_plat_sec_mem_layout();

	/* Load the Trusted Key certificate in the BL31 region */
	image_info.h.version = VERSION_1;
	err = load_image(mem_layout, TRUSTED_KEY_CERT_NAME, load_addr,
			 &image_info, NULL);
	if (err) {
		ERROR("Failed to load Trusted Key certificate.\n");
		return err;
	}

	/* Validate the certificate */
	err = auth_verify_obj(AUTH_TRUSTED_KEY_CERT, image_info.image_base,
			image_info.image_size);
	if (err) {
		ERROR("Invalid Trusted Key certificate.\n");
		return err;
	}

	/* Load and validate Key and Content certificates for BL3-x images */
#ifdef BL30_BASE
	err = load_cert_bl3x(AUTH_BL30_KEY_CERT, BL30_KEY_CERT_NAME,
			     AUTH_BL30_IMG_CERT, BL30_CERT_NAME,
			     mem_layout, load_addr);
	if (err) {
		ERROR("Failed to verify BL3-0 authenticity\n");
		return err;
	}
#endif /* BL30_BASE */

	err = load_cert_bl3x(AUTH_BL31_KEY_CERT, BL31_KEY_CERT_NAME,
			     AUTH_BL31_IMG_CERT, BL31_CERT_NAME,
			     mem_layout, load_addr);
	if (err) {
		ERROR("Failed to verify BL3-1 authenticity\n");
		return err;
	}

#ifdef BL32_BASE
	/* BL3-2 image is optional, but keep the return value in case the
	 * image is present but the certificate is missing */
	err = load_cert_bl3x(AUTH_BL32_KEY_CERT, BL32_KEY_CERT_NAME,
			     AUTH_BL32_IMG_CERT, BL32_CERT_NAME,
			     mem_layout, load_addr);
	if (err) {
		WARN("Failed to verify BL3-2 authenticity\n");
	}
	bl32_cert_error = err;
#endif /* BL32_BASE */

	err = load_cert_bl3x(AUTH_BL33_KEY_CERT, BL33_KEY_CERT_NAME,
			     AUTH_BL33_IMG_CERT, BL33_CERT_NAME,
			     mem_layout, load_addr);
	if (err) {
		ERROR("Failed to verify BL3-3 authenticity\n");
		return err;
	}

	return 0;
}

#endif /* TRUSTED_BOARD_BOOT */

177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
/*******************************************************************************
 * Load the BL3-0 image if there's one.
 * If a platform does not want to attempt to load BL3-0 image it must leave
 * BL30_BASE undefined.
 * Return 0 on success or if there's no BL3-0 image to load, a negative error
 * code otherwise.
 ******************************************************************************/
static int load_bl30(void)
{
	int e = 0;
#ifdef BL30_BASE
	meminfo_t bl30_mem_info;
	image_info_t bl30_image_info;

	/*
	 * It is up to the platform to specify where BL3-0 should be loaded if
	 * it exists. It could create space in the secure sram or point to a
	 * completely different memory.
	 *
	 * The entry point information is not relevant in this case as the AP
	 * won't execute the BL3-0 image.
	 */
Dan Handley's avatar
Dan Handley committed
199
	INFO("BL2: Loading BL3-0\n");
200
	bl2_plat_get_bl30_meminfo(&bl30_mem_info);
201
	bl30_image_info.h.version = VERSION_1;
202
203
204
205
206
207
208
	e = load_image(&bl30_mem_info,
		       BL30_IMAGE_NAME,
		       BL30_BASE,
		       &bl30_image_info,
		       NULL);

	if (e == 0) {
209
210
211
212
213
214
215
216
217
218
219
220
221
222
#if TRUSTED_BOARD_BOOT
		e = auth_verify_obj(AUTH_BL30_IMG,
				bl30_image_info.image_base,
				bl30_image_info.image_size);
		if (e) {
			ERROR("Failed to authenticate BL3-0 image.\n");
			panic();
		}

		/* After working with data, invalidate the data cache */
		inv_dcache_range(bl30_image_info.image_base,
				 (size_t)bl30_image_info.image_size);
#endif /* TRUSTED_BOARD_BOOT */

223
224
225
226
227
228
229
		/* The subsequent handling of BL3-0 is platform specific */
		bl2_plat_handle_bl30(&bl30_image_info);
	}
#endif /* BL30_BASE */

	return e;
}
230

231
/*******************************************************************************
232
233
234
235
 * Load the BL3-1 image.
 * The bl2_to_bl31_params and bl31_ep_info params will be updated with the
 * relevant BL3-1 information.
 * Return 0 on success, a negative error code otherwise.
236
 ******************************************************************************/
237
238
static int load_bl31(bl31_params_t *bl2_to_bl31_params,
		     entry_point_info_t *bl31_ep_info)
239
{
240
	meminfo_t *bl2_tzram_layout;
241
	int e;
242

Dan Handley's avatar
Dan Handley committed
243
	INFO("BL2: Loading BL3-1\n");
244
245
	assert(bl2_to_bl31_params != NULL);
	assert(bl31_ep_info != NULL);
246
247

	/* Find out how much free trusted ram remains after BL2 load */
248
	bl2_tzram_layout = bl2_plat_sec_mem_layout();
249

250
	/* Set the X0 parameter to BL3-1 */
251
252
	bl31_ep_info->args.arg0 = (unsigned long)bl2_to_bl31_params;

253
	/* Load the BL3-1 image */
254
	e = load_image(bl2_tzram_layout,
255
256
257
258
		       BL31_IMAGE_NAME,
		       BL31_BASE,
		       bl2_to_bl31_params->bl31_image_info,
		       bl31_ep_info);
259

260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
	if (e == 0) {
#if TRUSTED_BOARD_BOOT
		e = auth_verify_obj(AUTH_BL31_IMG,
			bl2_to_bl31_params->bl31_image_info->image_base,
			bl2_to_bl31_params->bl31_image_info->image_size);
		if (e) {
			ERROR("Failed to authenticate BL3-1 image.\n");
			panic();
		}

		/* After working with data, invalidate the data cache */
		inv_dcache_range(bl2_to_bl31_params->bl31_image_info->image_base,
			(size_t)bl2_to_bl31_params->bl31_image_info->image_size);
#endif /* TRUSTED_BOARD_BOOT */

275
276
		bl2_plat_set_bl31_ep_info(bl2_to_bl31_params->bl31_image_info,
					  bl31_ep_info);
277
	}
278

279
280
	return e;
}
281

282
283
284
285
286
287
288
289
290
291
292
293
294
295
/*******************************************************************************
 * Load the BL3-2 image if there's one.
 * The bl2_to_bl31_params param will be updated with the relevant BL3-2
 * information.
 * If a platform does not want to attempt to load BL3-2 image it must leave
 * BL32_BASE undefined.
 * Return 0 on success or if there's no BL3-2 image to load, a negative error
 * code otherwise.
 ******************************************************************************/
static int load_bl32(bl31_params_t *bl2_to_bl31_params)
{
	int e = 0;
#ifdef BL32_BASE
	meminfo_t bl32_mem_info;
296

Dan Handley's avatar
Dan Handley committed
297
	INFO("BL2: Loading BL3-2\n");
298
	assert(bl2_to_bl31_params != NULL);
299

300
	/*
301
302
	 * It is up to the platform to specify where BL3-2 should be loaded if
	 * it exists. It could create space in the secure sram or point to a
303
	 * completely different memory.
304
	 */
305
	bl2_plat_get_bl32_meminfo(&bl32_mem_info);
306
307
308
309
310
311
	e = load_image(&bl32_mem_info,
		       BL32_IMAGE_NAME,
		       BL32_BASE,
		       bl2_to_bl31_params->bl32_image_info,
		       bl2_to_bl31_params->bl32_ep_info);

312
	if (e == 0) {
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
#if TRUSTED_BOARD_BOOT
		/* Image is present. Check if there is a valid certificate */
		if (bl32_cert_error) {
			ERROR("Failed to authenticate BL3-2 certificates.\n");
			panic();
		}

		e = auth_verify_obj(AUTH_BL32_IMG,
			bl2_to_bl31_params->bl32_image_info->image_base,
			bl2_to_bl31_params->bl32_image_info->image_size);
		if (e) {
			ERROR("Failed to authenticate BL3-2 image.\n");
			panic();
		}
		/* After working with data, invalidate the data cache */
		inv_dcache_range(bl2_to_bl31_params->bl32_image_info->image_base,
			(size_t)bl2_to_bl31_params->bl32_image_info->image_size);
#endif /* TRUSTED_BOARD_BOOT */

332
333
334
		bl2_plat_set_bl32_ep_info(
			bl2_to_bl31_params->bl32_image_info,
			bl2_to_bl31_params->bl32_ep_info);
Achin Gupta's avatar
Achin Gupta committed
335
	}
336
#endif /* BL32_BASE */
Achin Gupta's avatar
Achin Gupta committed
337

338
339
340
341
342
343
344
345
346
347
348
349
350
351
	return e;
}

/*******************************************************************************
 * Load the BL3-3 image.
 * The bl2_to_bl31_params param will be updated with the relevant BL3-3
 * information.
 * Return 0 on success, a negative error code otherwise.
 ******************************************************************************/
static int load_bl33(bl31_params_t *bl2_to_bl31_params)
{
	meminfo_t bl33_mem_info;
	int e;

Dan Handley's avatar
Dan Handley committed
352
	INFO("BL2: Loading BL3-3\n");
353
354
355
356
357
358
359
360
361
362
363
	assert(bl2_to_bl31_params != NULL);

	bl2_plat_get_bl33_meminfo(&bl33_mem_info);

	/* Load the BL3-3 image in non-secure memory provided by the platform */
	e = load_image(&bl33_mem_info,
		       BL33_IMAGE_NAME,
		       plat_get_ns_image_entrypoint(),
		       bl2_to_bl31_params->bl33_image_info,
		       bl2_to_bl31_params->bl33_ep_info);

364
365
366
367
368
369
370
371
372
373
374
375
376
377
	if (e == 0) {
#if TRUSTED_BOARD_BOOT
		e = auth_verify_obj(AUTH_BL33_IMG,
				bl2_to_bl31_params->bl33_image_info->image_base,
				bl2_to_bl31_params->bl33_image_info->image_size);
		if (e) {
			ERROR("Failed to authenticate BL3-3 image.\n");
			panic();
		}
		/* After working with data, invalidate the data cache */
		inv_dcache_range(bl2_to_bl31_params->bl33_image_info->image_base,
			(size_t)bl2_to_bl31_params->bl33_image_info->image_size);
#endif /* TRUSTED_BOARD_BOOT */

378
379
		bl2_plat_set_bl33_ep_info(bl2_to_bl31_params->bl33_image_info,
					  bl2_to_bl31_params->bl33_ep_info);
380
	}
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395

	return e;
}

/*******************************************************************************
 * The only thing to do in BL2 is to load further images and pass control to
 * BL3-1. The memory occupied by BL2 will be reclaimed by BL3-x stages. BL2 runs
 * entirely in S-EL1.
 ******************************************************************************/
void bl2_main(void)
{
	bl31_params_t *bl2_to_bl31_params;
	entry_point_info_t *bl31_ep_info;
	int e;

Dan Handley's avatar
Dan Handley committed
396
397
398
	NOTICE("BL2: %s\n", version_string);
	NOTICE("BL2: %s\n", build_message);

399
400
401
	/* Perform remaining generic architectural setup in S-EL1 */
	bl2_arch_setup();

402
403
404
405
406
407
408
409
410
411
412
413
#if TRUSTED_BOARD_BOOT
	/* Initialize authentication module */
	auth_init();

	/* Validate the certificates involved in the Chain of Trust */
	e = load_certs();
	if (e) {
		ERROR("Chain of Trust invalid. Aborting...\n");
		panic();
	}
#endif /* TRUSTED_BOARD_BOOT */

414
415
416
417
418
419
420
421
422
	/*
	 * Load the subsequent bootloader images
	 */
	e = load_bl30();
	if (e) {
		ERROR("Failed to load BL3-0 (%i)\n", e);
		panic();
	}

Juan Castillo's avatar
Juan Castillo committed
423
424
425
	/* Perform platform setup in BL2 after loading BL3-0 */
	bl2_platform_setup();

426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
	/*
	 * Get a pointer to the memory the platform has set aside to pass
	 * information to BL3-1.
	 */
	bl2_to_bl31_params = bl2_plat_get_bl31_params();
	bl31_ep_info = bl2_plat_get_bl31_ep_info();

	e = load_bl31(bl2_to_bl31_params, bl31_ep_info);
	if (e) {
		ERROR("Failed to load BL3-1 (%i)\n", e);
		panic();
	}

	e = load_bl32(bl2_to_bl31_params);
	if (e)
		WARN("Failed to load BL3-2 (%i)\n", e);

	e = load_bl33(bl2_to_bl31_params);
	if (e) {
		ERROR("Failed to load BL3-3 (%i)\n", e);
		panic();
	}

449
450
451
	/* Flush the params to be passed to memory */
	bl2_plat_flush_bl31_params();

452
	/*
453
454
455
	 * Run BL3-1 via an SMC to BL1. Information on how to pass control to
	 * the BL3-2 (if present) and BL3-3 software images will be passed to
	 * BL3-1 as an argument.
456
	 */
457
	smc(RUN_IMAGE, (unsigned long)bl31_ep_info, 0, 0, 0, 0, 0, 0);
458
}