xref: /arm-trusted-firmware/plat/imx/imx8m/imx_hab.c (revision 91f16700b400a8c0651d24a598fc48ee2997a0d7)
1*91f16700Schasinglulu /*
2*91f16700Schasinglulu  * Copyright 2017-2020 NXP
3*91f16700Schasinglulu  * Copyright 2022 Leica Geosystems AG
4*91f16700Schasinglulu  *
5*91f16700Schasinglulu  * SPDX-License-Identifier: BSD-3-Clause
6*91f16700Schasinglulu  */
7*91f16700Schasinglulu 
8*91f16700Schasinglulu #include <common/runtime_svc.h>
9*91f16700Schasinglulu #include <imx_sip_svc.h>
10*91f16700Schasinglulu 
11*91f16700Schasinglulu #define HAB_CID_ATF	U(2)	/* TF-A Caller ID */
12*91f16700Schasinglulu 
13*91f16700Schasinglulu /* HAB Status definitions */
14*91f16700Schasinglulu enum hab_status {
15*91f16700Schasinglulu 	HAB_STS_ANY = 0x00,	/* Match any status in report_event() */
16*91f16700Schasinglulu 	HAB_FAILURE = 0x33,	/* Operation failed */
17*91f16700Schasinglulu 	HAB_WARNING = 0x69,	/* Operation completed with warning */
18*91f16700Schasinglulu 	HAB_SUCCESS = 0xf0	/* Operation completed successfully */
19*91f16700Schasinglulu };
20*91f16700Schasinglulu 
21*91f16700Schasinglulu /* HAB Configuration definitions */
22*91f16700Schasinglulu enum hab_config {
23*91f16700Schasinglulu 	HAB_CFG_RETURN = 0x33,	/* Field Return IC */
24*91f16700Schasinglulu 	HAB_CFG_OPEN   = 0xf0,	/* Non-secure IC */
25*91f16700Schasinglulu 	HAB_CFG_CLOSED = 0xcc	/* Secure IC */
26*91f16700Schasinglulu };
27*91f16700Schasinglulu 
28*91f16700Schasinglulu /* HAB State definitions */
29*91f16700Schasinglulu enum hab_state {
30*91f16700Schasinglulu 	HAB_STATE_INITIAL   = 0x33,	/* Initializing state (transitory) */
31*91f16700Schasinglulu 	HAB_STATE_CHECK     = 0x55,	/* Check state (non-secure) */
32*91f16700Schasinglulu 	HAB_STATE_NONSECURE = 0x66,	/* Non-secure state */
33*91f16700Schasinglulu 	HAB_STATE_TRUSTED   = 0x99,	/* Trusted state */
34*91f16700Schasinglulu 	HAB_STATE_SECURE    = 0xaa,	/* Secure state */
35*91f16700Schasinglulu 	HAB_STATE_FAIL_SOFT = 0xcc,	/* Soft fail state */
36*91f16700Schasinglulu 	HAB_STATE_FAIL_HARD = 0xff,	/* Hard fail state (terminal) */
37*91f16700Schasinglulu 	HAB_STATE_NONE      = 0xf0	/* No security state machine */
38*91f16700Schasinglulu };
39*91f16700Schasinglulu 
40*91f16700Schasinglulu /* HAB Verification Target definitions */
41*91f16700Schasinglulu enum hab_target {
42*91f16700Schasinglulu 	HAB_TGT_MEMORY     = 0x0f,	/* Check memory allowed list */
43*91f16700Schasinglulu 	HAB_TGT_PERIPHERAL = 0xf0,	/* Check peripheral allowed list */
44*91f16700Schasinglulu 	HAB_TGT_ANY        = 0x55	/* Check memory & peripheral allowed list */
45*91f16700Schasinglulu };
46*91f16700Schasinglulu 
47*91f16700Schasinglulu /* Authenticate Image Loader Callback prototype */
48*91f16700Schasinglulu typedef enum hab_status hab_loader_callback_f_t(void **, size_t *, const void *);
49*91f16700Schasinglulu 
50*91f16700Schasinglulu /*
51*91f16700Schasinglulu  * HAB Rom VectorTable (RVT) structure.
52*91f16700Schasinglulu  * This table provides function pointers into the HAB library in ROM for
53*91f16700Schasinglulu  * use by post-ROM boot sequence components.
54*91f16700Schasinglulu  * Functions are ordered in the structure below based on the offsets in ROM
55*91f16700Schasinglulu  * image, and shall not be changed!
56*91f16700Schasinglulu  * Details on API allocation offsets and function description could be
57*91f16700Schasinglulu  * found in following documents from NXP:
58*91f16700Schasinglulu  * - High Assurance Boot Version 4 Application Programming Interface
59*91f16700Schasinglulu  *   Reference Manual (available in CST package)
60*91f16700Schasinglulu  * - HABv4 RVT Guidelines and Recommendations (AN12263)
61*91f16700Schasinglulu  */
62*91f16700Schasinglulu struct hab_rvt_api {
63*91f16700Schasinglulu 	uint64_t	hdr;
64*91f16700Schasinglulu 	enum hab_status (*entry)(void);
65*91f16700Schasinglulu 	enum hab_status (*exit)(void);
66*91f16700Schasinglulu 	enum hab_status (*check_target)(enum hab_target type, const void *start, size_t bytes);
67*91f16700Schasinglulu 	void* (*authenticate_image)(uint8_t cid, long ivt_offset, void **start,
68*91f16700Schasinglulu 		size_t *bytes, hab_loader_callback_f_t loader);
69*91f16700Schasinglulu 	enum hab_status (*run_dcd)(const uint8_t *dcd);
70*91f16700Schasinglulu 	enum hab_status (*run_csf)(const uint8_t *csf, uint8_t cid, uint32_t srkmask);
71*91f16700Schasinglulu 	enum hab_status (*assert)(long type, const void *data, uint32_t count);
72*91f16700Schasinglulu 	enum hab_status (*report_event)(enum hab_status status, uint32_t index,
73*91f16700Schasinglulu 		uint8_t *event, size_t *bytes);
74*91f16700Schasinglulu 	enum hab_status (*report_status)(enum hab_config *config, enum hab_state *state);
75*91f16700Schasinglulu 	void (*failsafe)(void);
76*91f16700Schasinglulu 	void* (*authenticate_image_no_dcd)(uint8_t cid, long ivt_offset, void **start,
77*91f16700Schasinglulu 		size_t *bytes, hab_loader_callback_f_t loader);
78*91f16700Schasinglulu 	uint32_t (*get_version)(void);
79*91f16700Schasinglulu 	enum hab_status (*authenticate_container)(uint8_t cid, long ivt_offset, void **start,
80*91f16700Schasinglulu 		size_t *bytes, hab_loader_callback_f_t loader, uint32_t srkmask, int skip_dcd);
81*91f16700Schasinglulu };
82*91f16700Schasinglulu 
83*91f16700Schasinglulu struct hab_rvt_api *g_hab_rvt_api = (struct hab_rvt_api *)HAB_RVT_BASE;
84*91f16700Schasinglulu 
85*91f16700Schasinglulu /*******************************************************************************
86*91f16700Schasinglulu  * Handler for servicing HAB SMC calls
87*91f16700Schasinglulu  ******************************************************************************/
88*91f16700Schasinglulu int imx_hab_handler(uint32_t smc_fid,
89*91f16700Schasinglulu 			u_register_t x1,
90*91f16700Schasinglulu 			u_register_t x2,
91*91f16700Schasinglulu 			u_register_t x3,
92*91f16700Schasinglulu 			u_register_t x4)
93*91f16700Schasinglulu {
94*91f16700Schasinglulu 	switch (x1) {
95*91f16700Schasinglulu 	case IMX_SIP_HAB_ENTRY:
96*91f16700Schasinglulu 		return g_hab_rvt_api->entry();
97*91f16700Schasinglulu 	case IMX_SIP_HAB_EXIT:
98*91f16700Schasinglulu 		return g_hab_rvt_api->exit();
99*91f16700Schasinglulu 	case IMX_SIP_HAB_CHECK_TARGET:
100*91f16700Schasinglulu 		return g_hab_rvt_api->check_target((enum hab_target)x2,
101*91f16700Schasinglulu 			(const void *)x3, (size_t)x4);
102*91f16700Schasinglulu 	case IMX_SIP_HAB_AUTH_IMG:
103*91f16700Schasinglulu 		return (unsigned long)g_hab_rvt_api->authenticate_image(HAB_CID_ATF,
104*91f16700Schasinglulu 			x2, (void **)x3, (size_t *)x4, NULL);
105*91f16700Schasinglulu 	case IMX_SIP_HAB_REPORT_EVENT:
106*91f16700Schasinglulu 		return g_hab_rvt_api->report_event(HAB_FAILURE,
107*91f16700Schasinglulu 			(uint32_t)x2, (uint8_t *)x3, (size_t *)x4);
108*91f16700Schasinglulu 	case IMX_SIP_HAB_REPORT_STATUS:
109*91f16700Schasinglulu 		return g_hab_rvt_api->report_status((enum hab_config *)x2,
110*91f16700Schasinglulu 			(enum hab_state *)x3);
111*91f16700Schasinglulu 	case IMX_SIP_HAB_FAILSAFE:
112*91f16700Schasinglulu 		g_hab_rvt_api->failsafe();
113*91f16700Schasinglulu 		break;
114*91f16700Schasinglulu 	case IMX_SIP_HAB_AUTH_IMG_NO_DCD:
115*91f16700Schasinglulu 		return (unsigned long)g_hab_rvt_api->authenticate_image_no_dcd(
116*91f16700Schasinglulu 			HAB_CID_ATF, x2, (void **)x3, (size_t *)x4, NULL);
117*91f16700Schasinglulu 	case IMX_SIP_HAB_GET_VERSION:
118*91f16700Schasinglulu 		return g_hab_rvt_api->get_version();
119*91f16700Schasinglulu 	default:
120*91f16700Schasinglulu 		return SMC_UNK;
121*91f16700Schasinglulu 	};
122*91f16700Schasinglulu 
123*91f16700Schasinglulu 	return SMC_OK;
124*91f16700Schasinglulu }
125