1 /*
2  * Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved.
3  *
4  * Redistribution and use in source and binary forms, with or without
5  * modification, are permitted provided that the following conditions are met:
6  *
7  * Redistributions of source code must retain the above copyright notice, this
8  * list of conditions and the following disclaimer.
9  *
10  * Redistributions in binary form must reproduce the above copyright notice,
11  * this list of conditions and the following disclaimer in the documentation
12  * and/or other materials provided with the distribution.
13  *
14  * Neither the name of ARM nor the names of its contributors may be used
15  * to endorse or promote products derived from this software without specific
16  * prior written permission.
17  *
18  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28  * POSSIBILITY OF SUCH DAMAGE.
29  */
30 
31 #include <arch.h>
32 #include <arch_helpers.h>
33 #include <assert.h>
34 #include <auth.h>
35 #include <bl_common.h>
36 #include <debug.h>
37 #include <platform.h>
38 #include <platform_def.h>
39 #include "bl2_private.h"
40 
41 #if TRUSTED_BOARD_BOOT
42 
43 #ifdef BL32_BASE
44 static int bl32_cert_error;
45 #endif
46 
47 /*
48  * Load and authenticate the key and content certificates for a BL3-x image
49  *
50  * Parameters:
51  *   key_cert_blob: key certificate blob id (see auth.h)
52  *   key_cert_name: key certificate filename
53  *   cont_cert_blob: content certificate blob id (see auth.h)
54  *   cont_cert_name: content certificate filename
55  *   mem_layout: Trusted SRAM memory layout
56  *   load_addr: load the certificates at this address
57  *
58  * Return: 0 = success, Otherwise = error
59  */
load_cert_bl3x(int key_cert_blob,const char * key_cert_name,int cont_cert_blob,const char * cont_cert_name,meminfo_t * mem_layout,uint64_t load_addr)60 static int load_cert_bl3x(int key_cert_blob, const char *key_cert_name,
61 			  int cont_cert_blob, const char *cont_cert_name,
62 			  meminfo_t *mem_layout, uint64_t load_addr)
63 {
64 	image_info_t image_info;
65 	int err;
66 
67 	/* Load Key certificate */
68 	image_info.h.version = VERSION_1;
69 	err = load_image(mem_layout, key_cert_name, load_addr, &image_info, NULL);
70 	if (err) {
71 		ERROR("Cannot load %s.\n", key_cert_name);
72 		return err;
73 	}
74 
75 	err = auth_verify_obj(key_cert_blob, image_info.image_base,
76 			image_info.image_size);
77 	if (err) {
78 		ERROR("Invalid key certificate %s.\n", key_cert_name);
79 		return err;
80 	}
81 
82 	/* Load Content certificate */
83 	image_info.h.version = VERSION_1;
84 	err = load_image(mem_layout, cont_cert_name, load_addr, &image_info, NULL);
85 	if (err) {
86 		ERROR("Cannot load %s.\n", cont_cert_name);
87 		return err;
88 	}
89 
90 	err = auth_verify_obj(cont_cert_blob, image_info.image_base,
91 			image_info.image_size);
92 	if (err) {
93 		ERROR("Invalid content certificate %s.\n", cont_cert_name);
94 		return err;
95 	}
96 
97 	return 0;
98 }
99 
100 /*
101  * Load and authenticate the Trusted Key certificate the key and content
102  * certificates for each of the BL3-x images.
103  *
104  * Return: 0 = success, Otherwise = error
105  */
load_certs(void)106 static int load_certs(void)
107 {
108 	const uint64_t load_addr = BL31_BASE;
109 	image_info_t image_info;
110 	meminfo_t *mem_layout;
111 	int err;
112 
113 	/* Find out how much free trusted ram remains after BL2 load */
114 	mem_layout = bl2_plat_sec_mem_layout();
115 
116 	/* Load the Trusted Key certificate in the BL31 region */
117 	image_info.h.version = VERSION_1;
118 	err = load_image(mem_layout, TRUSTED_KEY_CERT_NAME, load_addr,
119 			 &image_info, NULL);
120 	if (err) {
121 		ERROR("Failed to load Trusted Key certificate.\n");
122 		return err;
123 	}
124 
125 	/* Validate the certificate */
126 	err = auth_verify_obj(AUTH_TRUSTED_KEY_CERT, image_info.image_base,
127 			image_info.image_size);
128 	if (err) {
129 		ERROR("Invalid Trusted Key certificate.\n");
130 		return err;
131 	}
132 
133 	/* Load and validate Key and Content certificates for BL3-x images */
134 #ifdef BL30_BASE
135 	err = load_cert_bl3x(AUTH_BL30_KEY_CERT, BL30_KEY_CERT_NAME,
136 			     AUTH_BL30_IMG_CERT, BL30_CERT_NAME,
137 			     mem_layout, load_addr);
138 	if (err) {
139 		ERROR("Failed to verify BL3-0 authenticity\n");
140 		return err;
141 	}
142 #endif /* BL30_BASE */
143 
144 	err = load_cert_bl3x(AUTH_BL31_KEY_CERT, BL31_KEY_CERT_NAME,
145 			     AUTH_BL31_IMG_CERT, BL31_CERT_NAME,
146 			     mem_layout, load_addr);
147 	if (err) {
148 		ERROR("Failed to verify BL3-1 authenticity\n");
149 		return err;
150 	}
151 
152 #ifdef BL32_BASE
153 	/* BL3-2 image is optional, but keep the return value in case the
154 	 * image is present but the certificate is missing */
155 	err = load_cert_bl3x(AUTH_BL32_KEY_CERT, BL32_KEY_CERT_NAME,
156 			     AUTH_BL32_IMG_CERT, BL32_CERT_NAME,
157 			     mem_layout, load_addr);
158 	if (err) {
159 		WARN("Failed to verify BL3-2 authenticity\n");
160 	}
161 	bl32_cert_error = err;
162 #endif /* BL32_BASE */
163 
164 	err = load_cert_bl3x(AUTH_BL33_KEY_CERT, BL33_KEY_CERT_NAME,
165 			     AUTH_BL33_IMG_CERT, BL33_CERT_NAME,
166 			     mem_layout, load_addr);
167 	if (err) {
168 		ERROR("Failed to verify BL3-3 authenticity\n");
169 		return err;
170 	}
171 
172 	return 0;
173 }
174 
175 #endif /* TRUSTED_BOARD_BOOT */
176 
177 /*******************************************************************************
178  * Load the BL3-0 image if there's one.
179  * If a platform does not want to attempt to load BL3-0 image it must leave
180  * BL30_BASE undefined.
181  * Return 0 on success or if there's no BL3-0 image to load, a negative error
182  * code otherwise.
183  ******************************************************************************/
load_bl30(void)184 static int load_bl30(void)
185 {
186 	int e = 0;
187 #ifdef BL30_BASE
188 	meminfo_t bl30_mem_info;
189 	image_info_t bl30_image_info;
190 
191 	/*
192 	 * It is up to the platform to specify where BL3-0 should be loaded if
193 	 * it exists. It could create space in the secure sram or point to a
194 	 * completely different memory.
195 	 *
196 	 * The entry point information is not relevant in this case as the AP
197 	 * won't execute the BL3-0 image.
198 	 */
199 	INFO("BL2: Loading BL3-0\n");
200 	bl2_plat_get_bl30_meminfo(&bl30_mem_info);
201 	bl30_image_info.h.version = VERSION_1;
202 	e = load_image(&bl30_mem_info,
203 		       BL30_IMAGE_NAME,
204 		       BL30_BASE,
205 		       &bl30_image_info,
206 		       NULL);
207 
208 	if (e == 0) {
209 #if TRUSTED_BOARD_BOOT
210 		e = auth_verify_obj(AUTH_BL30_IMG,
211 				bl30_image_info.image_base,
212 				bl30_image_info.image_size);
213 		if (e) {
214 			ERROR("Failed to authenticate BL3-0 image.\n");
215 			panic();
216 		}
217 
218 		/* After working with data, invalidate the data cache */
219 		inv_dcache_range(bl30_image_info.image_base,
220 				 (size_t)bl30_image_info.image_size);
221 #endif /* TRUSTED_BOARD_BOOT */
222 
223 		/* The subsequent handling of BL3-0 is platform specific */
224 		bl2_plat_handle_bl30(&bl30_image_info);
225 	}
226 #endif /* BL30_BASE */
227 
228 	return e;
229 }
230 
231 /*******************************************************************************
232  * Load the BL3-1 image.
233  * The bl2_to_bl31_params and bl31_ep_info params will be updated with the
234  * relevant BL3-1 information.
235  * Return 0 on success, a negative error code otherwise.
236  ******************************************************************************/
load_bl31(bl31_params_t * bl2_to_bl31_params,entry_point_info_t * bl31_ep_info)237 static int load_bl31(bl31_params_t *bl2_to_bl31_params,
238 		     entry_point_info_t *bl31_ep_info)
239 {
240 	meminfo_t *bl2_tzram_layout;
241 	int e;
242 
243 	INFO("BL2: Loading BL3-1\n");
244 	assert(bl2_to_bl31_params != NULL);
245 	assert(bl31_ep_info != NULL);
246 
247 	/* Find out how much free trusted ram remains after BL2 load */
248 	bl2_tzram_layout = bl2_plat_sec_mem_layout();
249 
250 	/* Set the X0 parameter to BL3-1 */
251 	bl31_ep_info->args.arg0 = (unsigned long)bl2_to_bl31_params;
252 
253 	/* Load the BL3-1 image */
254 	e = load_image(bl2_tzram_layout,
255 		       BL31_IMAGE_NAME,
256 		       BL31_BASE,
257 		       bl2_to_bl31_params->bl31_image_info,
258 		       bl31_ep_info);
259 
260 	if (e == 0) {
261 #if TRUSTED_BOARD_BOOT
262 		e = auth_verify_obj(AUTH_BL31_IMG,
263 			bl2_to_bl31_params->bl31_image_info->image_base,
264 			bl2_to_bl31_params->bl31_image_info->image_size);
265 		if (e) {
266 			ERROR("Failed to authenticate BL3-1 image.\n");
267 			panic();
268 		}
269 
270 		/* After working with data, invalidate the data cache */
271 		inv_dcache_range(bl2_to_bl31_params->bl31_image_info->image_base,
272 			(size_t)bl2_to_bl31_params->bl31_image_info->image_size);
273 #endif /* TRUSTED_BOARD_BOOT */
274 
275 		bl2_plat_set_bl31_ep_info(bl2_to_bl31_params->bl31_image_info,
276 					  bl31_ep_info);
277 	}
278 
279 	return e;
280 }
281 
282 /*******************************************************************************
283  * Load the BL3-2 image if there's one.
284  * The bl2_to_bl31_params param will be updated with the relevant BL3-2
285  * information.
286  * If a platform does not want to attempt to load BL3-2 image it must leave
287  * BL32_BASE undefined.
288  * Return 0 on success or if there's no BL3-2 image to load, a negative error
289  * code otherwise.
290  ******************************************************************************/
load_bl32(bl31_params_t * bl2_to_bl31_params)291 static int load_bl32(bl31_params_t *bl2_to_bl31_params)
292 {
293 	int e = 0;
294 #ifdef BL32_BASE
295 	meminfo_t bl32_mem_info;
296 
297 	INFO("BL2: Loading BL3-2\n");
298 	assert(bl2_to_bl31_params != NULL);
299 
300 	/*
301 	 * It is up to the platform to specify where BL3-2 should be loaded if
302 	 * it exists. It could create space in the secure sram or point to a
303 	 * completely different memory.
304 	 */
305 	bl2_plat_get_bl32_meminfo(&bl32_mem_info);
306 	e = load_image(&bl32_mem_info,
307 		       BL32_IMAGE_NAME,
308 		       BL32_BASE,
309 		       bl2_to_bl31_params->bl32_image_info,
310 		       bl2_to_bl31_params->bl32_ep_info);
311 
312 	if (e == 0) {
313 #if TRUSTED_BOARD_BOOT
314 		/* Image is present. Check if there is a valid certificate */
315 		if (bl32_cert_error) {
316 			ERROR("Failed to authenticate BL3-2 certificates.\n");
317 			panic();
318 		}
319 
320 		e = auth_verify_obj(AUTH_BL32_IMG,
321 			bl2_to_bl31_params->bl32_image_info->image_base,
322 			bl2_to_bl31_params->bl32_image_info->image_size);
323 		if (e) {
324 			ERROR("Failed to authenticate BL3-2 image.\n");
325 			panic();
326 		}
327 		/* After working with data, invalidate the data cache */
328 		inv_dcache_range(bl2_to_bl31_params->bl32_image_info->image_base,
329 			(size_t)bl2_to_bl31_params->bl32_image_info->image_size);
330 #endif /* TRUSTED_BOARD_BOOT */
331 
332 		bl2_plat_set_bl32_ep_info(
333 			bl2_to_bl31_params->bl32_image_info,
334 			bl2_to_bl31_params->bl32_ep_info);
335 	}
336 #endif /* BL32_BASE */
337 
338 	return e;
339 }
340 
341 /*******************************************************************************
342  * Load the BL3-3 image.
343  * The bl2_to_bl31_params param will be updated with the relevant BL3-3
344  * information.
345  * Return 0 on success, a negative error code otherwise.
346  ******************************************************************************/
load_bl33(bl31_params_t * bl2_to_bl31_params)347 static int load_bl33(bl31_params_t *bl2_to_bl31_params)
348 {
349 	meminfo_t bl33_mem_info;
350 	int e;
351 
352 	INFO("BL2: Loading BL3-3\n");
353 	assert(bl2_to_bl31_params != NULL);
354 
355 	bl2_plat_get_bl33_meminfo(&bl33_mem_info);
356 
357 	/* Load the BL3-3 image in non-secure memory provided by the platform */
358 	e = load_image(&bl33_mem_info,
359 		       BL33_IMAGE_NAME,
360 		       plat_get_ns_image_entrypoint(),
361 		       bl2_to_bl31_params->bl33_image_info,
362 		       bl2_to_bl31_params->bl33_ep_info);
363 
364 	if (e == 0) {
365 #if TRUSTED_BOARD_BOOT
366 		e = auth_verify_obj(AUTH_BL33_IMG,
367 				bl2_to_bl31_params->bl33_image_info->image_base,
368 				bl2_to_bl31_params->bl33_image_info->image_size);
369 		if (e) {
370 			ERROR("Failed to authenticate BL3-3 image.\n");
371 			panic();
372 		}
373 		/* After working with data, invalidate the data cache */
374 		inv_dcache_range(bl2_to_bl31_params->bl33_image_info->image_base,
375 			(size_t)bl2_to_bl31_params->bl33_image_info->image_size);
376 #endif /* TRUSTED_BOARD_BOOT */
377 
378 		bl2_plat_set_bl33_ep_info(bl2_to_bl31_params->bl33_image_info,
379 					  bl2_to_bl31_params->bl33_ep_info);
380 	}
381 
382 	return e;
383 }
384 
385 /*******************************************************************************
386  * The only thing to do in BL2 is to load further images and pass control to
387  * BL3-1. The memory occupied by BL2 will be reclaimed by BL3-x stages. BL2 runs
388  * entirely in S-EL1.
389  ******************************************************************************/
bl2_main(void)390 void bl2_main(void)
391 {
392 	bl31_params_t *bl2_to_bl31_params;
393 	entry_point_info_t *bl31_ep_info;
394 	int e;
395 
396 	NOTICE("BL2: %s\n", version_string);
397 	NOTICE("BL2: %s\n", build_message);
398 
399 	/* Perform remaining generic architectural setup in S-EL1 */
400 	bl2_arch_setup();
401 
402 #if TRUSTED_BOARD_BOOT
403 	/* Initialize authentication module */
404 	auth_init();
405 
406 	/* Validate the certificates involved in the Chain of Trust */
407 	e = load_certs();
408 	if (e) {
409 		ERROR("Chain of Trust invalid. Aborting...\n");
410 		panic();
411 	}
412 #endif /* TRUSTED_BOARD_BOOT */
413 
414 	/*
415 	 * Load the subsequent bootloader images
416 	 */
417 	e = load_bl30();
418 	if (e) {
419 		ERROR("Failed to load BL3-0 (%i)\n", e);
420 		ERROR("Please burn mcu image:\n");
421 		ERROR("  sudo fastboot flash mcuimage mcuimage.bin\n");
422 	}
423 
424 	/* Perform platform setup in BL2 after loading BL3-0 */
425 	bl2_platform_setup();
426 
427 	/*
428 	 * Get a pointer to the memory the platform has set aside to pass
429 	 * information to BL3-1.
430 	 */
431 	bl2_to_bl31_params = bl2_plat_get_bl31_params();
432 	bl31_ep_info = bl2_plat_get_bl31_ep_info();
433 
434 	e = load_bl31(bl2_to_bl31_params, bl31_ep_info);
435 	if (e) {
436 		ERROR("Failed to load BL3-1 (%i)\n", e);
437 		panic();
438 	}
439 
440 	e = load_bl32(bl2_to_bl31_params);
441 	if (e)
442 		WARN("Failed to load BL3-2 (%i)\n", e);
443 
444 	e = load_bl33(bl2_to_bl31_params);
445 	if (e) {
446 		ERROR("Failed to load BL3-3 (%i)\n", e);
447 		panic();
448 	}
449 
450 	/* Flush the params to be passed to memory */
451 	bl2_plat_flush_bl31_params();
452 
453 	/*
454 	 * Run BL3-1 via an SMC to BL1. Information on how to pass control to
455 	 * the BL3-2 (if present) and BL3-3 software images will be passed to
456 	 * BL3-1 as an argument.
457 	 */
458 	smc(RUN_IMAGE, (unsigned long)bl31_ep_info, 0, 0, 0, 0, 0, 0);
459 }
460