1*91f16700Schasinglulu /* 2*91f16700Schasinglulu * Copyright 2017-2020 NXP 3*91f16700Schasinglulu * Copyright 2022 Leica Geosystems AG 4*91f16700Schasinglulu * 5*91f16700Schasinglulu * SPDX-License-Identifier: BSD-3-Clause 6*91f16700Schasinglulu */ 7*91f16700Schasinglulu 8*91f16700Schasinglulu #include <common/runtime_svc.h> 9*91f16700Schasinglulu #include <imx_sip_svc.h> 10*91f16700Schasinglulu 11*91f16700Schasinglulu #define HAB_CID_ATF U(2) /* TF-A Caller ID */ 12*91f16700Schasinglulu 13*91f16700Schasinglulu /* HAB Status definitions */ 14*91f16700Schasinglulu enum hab_status { 15*91f16700Schasinglulu HAB_STS_ANY = 0x00, /* Match any status in report_event() */ 16*91f16700Schasinglulu HAB_FAILURE = 0x33, /* Operation failed */ 17*91f16700Schasinglulu HAB_WARNING = 0x69, /* Operation completed with warning */ 18*91f16700Schasinglulu HAB_SUCCESS = 0xf0 /* Operation completed successfully */ 19*91f16700Schasinglulu }; 20*91f16700Schasinglulu 21*91f16700Schasinglulu /* HAB Configuration definitions */ 22*91f16700Schasinglulu enum hab_config { 23*91f16700Schasinglulu HAB_CFG_RETURN = 0x33, /* Field Return IC */ 24*91f16700Schasinglulu HAB_CFG_OPEN = 0xf0, /* Non-secure IC */ 25*91f16700Schasinglulu HAB_CFG_CLOSED = 0xcc /* Secure IC */ 26*91f16700Schasinglulu }; 27*91f16700Schasinglulu 28*91f16700Schasinglulu /* HAB State definitions */ 29*91f16700Schasinglulu enum hab_state { 30*91f16700Schasinglulu HAB_STATE_INITIAL = 0x33, /* Initializing state (transitory) */ 31*91f16700Schasinglulu HAB_STATE_CHECK = 0x55, /* Check state (non-secure) */ 32*91f16700Schasinglulu HAB_STATE_NONSECURE = 0x66, /* Non-secure state */ 33*91f16700Schasinglulu HAB_STATE_TRUSTED = 0x99, /* Trusted state */ 34*91f16700Schasinglulu HAB_STATE_SECURE = 0xaa, /* Secure state */ 35*91f16700Schasinglulu HAB_STATE_FAIL_SOFT = 0xcc, /* Soft fail state */ 36*91f16700Schasinglulu HAB_STATE_FAIL_HARD = 0xff, /* Hard fail state (terminal) */ 37*91f16700Schasinglulu HAB_STATE_NONE = 0xf0 /* No security state machine */ 38*91f16700Schasinglulu }; 39*91f16700Schasinglulu 40*91f16700Schasinglulu /* HAB Verification Target definitions */ 41*91f16700Schasinglulu enum hab_target { 42*91f16700Schasinglulu HAB_TGT_MEMORY = 0x0f, /* Check memory allowed list */ 43*91f16700Schasinglulu HAB_TGT_PERIPHERAL = 0xf0, /* Check peripheral allowed list */ 44*91f16700Schasinglulu HAB_TGT_ANY = 0x55 /* Check memory & peripheral allowed list */ 45*91f16700Schasinglulu }; 46*91f16700Schasinglulu 47*91f16700Schasinglulu /* Authenticate Image Loader Callback prototype */ 48*91f16700Schasinglulu typedef enum hab_status hab_loader_callback_f_t(void **, size_t *, const void *); 49*91f16700Schasinglulu 50*91f16700Schasinglulu /* 51*91f16700Schasinglulu * HAB Rom VectorTable (RVT) structure. 52*91f16700Schasinglulu * This table provides function pointers into the HAB library in ROM for 53*91f16700Schasinglulu * use by post-ROM boot sequence components. 54*91f16700Schasinglulu * Functions are ordered in the structure below based on the offsets in ROM 55*91f16700Schasinglulu * image, and shall not be changed! 56*91f16700Schasinglulu * Details on API allocation offsets and function description could be 57*91f16700Schasinglulu * found in following documents from NXP: 58*91f16700Schasinglulu * - High Assurance Boot Version 4 Application Programming Interface 59*91f16700Schasinglulu * Reference Manual (available in CST package) 60*91f16700Schasinglulu * - HABv4 RVT Guidelines and Recommendations (AN12263) 61*91f16700Schasinglulu */ 62*91f16700Schasinglulu struct hab_rvt_api { 63*91f16700Schasinglulu uint64_t hdr; 64*91f16700Schasinglulu enum hab_status (*entry)(void); 65*91f16700Schasinglulu enum hab_status (*exit)(void); 66*91f16700Schasinglulu enum hab_status (*check_target)(enum hab_target type, const void *start, size_t bytes); 67*91f16700Schasinglulu void* (*authenticate_image)(uint8_t cid, long ivt_offset, void **start, 68*91f16700Schasinglulu size_t *bytes, hab_loader_callback_f_t loader); 69*91f16700Schasinglulu enum hab_status (*run_dcd)(const uint8_t *dcd); 70*91f16700Schasinglulu enum hab_status (*run_csf)(const uint8_t *csf, uint8_t cid, uint32_t srkmask); 71*91f16700Schasinglulu enum hab_status (*assert)(long type, const void *data, uint32_t count); 72*91f16700Schasinglulu enum hab_status (*report_event)(enum hab_status status, uint32_t index, 73*91f16700Schasinglulu uint8_t *event, size_t *bytes); 74*91f16700Schasinglulu enum hab_status (*report_status)(enum hab_config *config, enum hab_state *state); 75*91f16700Schasinglulu void (*failsafe)(void); 76*91f16700Schasinglulu void* (*authenticate_image_no_dcd)(uint8_t cid, long ivt_offset, void **start, 77*91f16700Schasinglulu size_t *bytes, hab_loader_callback_f_t loader); 78*91f16700Schasinglulu uint32_t (*get_version)(void); 79*91f16700Schasinglulu enum hab_status (*authenticate_container)(uint8_t cid, long ivt_offset, void **start, 80*91f16700Schasinglulu size_t *bytes, hab_loader_callback_f_t loader, uint32_t srkmask, int skip_dcd); 81*91f16700Schasinglulu }; 82*91f16700Schasinglulu 83*91f16700Schasinglulu struct hab_rvt_api *g_hab_rvt_api = (struct hab_rvt_api *)HAB_RVT_BASE; 84*91f16700Schasinglulu 85*91f16700Schasinglulu /******************************************************************************* 86*91f16700Schasinglulu * Handler for servicing HAB SMC calls 87*91f16700Schasinglulu ******************************************************************************/ 88*91f16700Schasinglulu int imx_hab_handler(uint32_t smc_fid, 89*91f16700Schasinglulu u_register_t x1, 90*91f16700Schasinglulu u_register_t x2, 91*91f16700Schasinglulu u_register_t x3, 92*91f16700Schasinglulu u_register_t x4) 93*91f16700Schasinglulu { 94*91f16700Schasinglulu switch (x1) { 95*91f16700Schasinglulu case IMX_SIP_HAB_ENTRY: 96*91f16700Schasinglulu return g_hab_rvt_api->entry(); 97*91f16700Schasinglulu case IMX_SIP_HAB_EXIT: 98*91f16700Schasinglulu return g_hab_rvt_api->exit(); 99*91f16700Schasinglulu case IMX_SIP_HAB_CHECK_TARGET: 100*91f16700Schasinglulu return g_hab_rvt_api->check_target((enum hab_target)x2, 101*91f16700Schasinglulu (const void *)x3, (size_t)x4); 102*91f16700Schasinglulu case IMX_SIP_HAB_AUTH_IMG: 103*91f16700Schasinglulu return (unsigned long)g_hab_rvt_api->authenticate_image(HAB_CID_ATF, 104*91f16700Schasinglulu x2, (void **)x3, (size_t *)x4, NULL); 105*91f16700Schasinglulu case IMX_SIP_HAB_REPORT_EVENT: 106*91f16700Schasinglulu return g_hab_rvt_api->report_event(HAB_FAILURE, 107*91f16700Schasinglulu (uint32_t)x2, (uint8_t *)x3, (size_t *)x4); 108*91f16700Schasinglulu case IMX_SIP_HAB_REPORT_STATUS: 109*91f16700Schasinglulu return g_hab_rvt_api->report_status((enum hab_config *)x2, 110*91f16700Schasinglulu (enum hab_state *)x3); 111*91f16700Schasinglulu case IMX_SIP_HAB_FAILSAFE: 112*91f16700Schasinglulu g_hab_rvt_api->failsafe(); 113*91f16700Schasinglulu break; 114*91f16700Schasinglulu case IMX_SIP_HAB_AUTH_IMG_NO_DCD: 115*91f16700Schasinglulu return (unsigned long)g_hab_rvt_api->authenticate_image_no_dcd( 116*91f16700Schasinglulu HAB_CID_ATF, x2, (void **)x3, (size_t *)x4, NULL); 117*91f16700Schasinglulu case IMX_SIP_HAB_GET_VERSION: 118*91f16700Schasinglulu return g_hab_rvt_api->get_version(); 119*91f16700Schasinglulu default: 120*91f16700Schasinglulu return SMC_UNK; 121*91f16700Schasinglulu }; 122*91f16700Schasinglulu 123*91f16700Schasinglulu return SMC_OK; 124*91f16700Schasinglulu } 125