Masahiro Yamada | 2a4fe4f | 2018-02-01 18:42:24 +0900 | [diff] [blame] | 1 | /* |
Yann Gautier | 8b61d88 | 2024-02-05 11:28:29 +0100 | [diff] [blame] | 2 | * Copyright (c) 2018-2024, Arm Limited and Contributors. All rights reserved. |
Masahiro Yamada | 2a4fe4f | 2018-02-01 18:42:24 +0900 | [diff] [blame] | 3 | * |
| 4 | * SPDX-License-Identifier: BSD-3-Clause |
| 5 | */ |
| 6 | |
Soby Mathew | 2f38ce3 | 2018-02-08 17:45:12 +0000 | [diff] [blame] | 7 | #include <assert.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 8 | |
| 9 | #include <arch_helpers.h> |
| 10 | #include <common/bl_common.h> |
| 11 | #include <common/debug.h> |
Raymond Mao | ab98f15 | 2024-11-14 13:28:36 -0800 | [diff] [blame] | 12 | #include <lib/transfer_list.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 13 | #include <lib/xlat_tables/xlat_tables_compat.h> |
| 14 | #include <plat/common/platform.h> |
Manish V Badarkhe | 80f13ee | 2020-07-23 20:23:01 +0100 | [diff] [blame] | 15 | #include <services/arm_arch_svc.h> |
Manish V Badarkhe | f809c6e | 2020-02-22 08:43:00 +0000 | [diff] [blame] | 16 | #include <smccc_helpers.h> |
Sumit Garg | 617e215 | 2019-11-15 15:34:55 +0530 | [diff] [blame] | 17 | #include <tools_share/firmware_encrypted.h> |
Masahiro Yamada | 2a4fe4f | 2018-02-01 18:42:24 +0900 | [diff] [blame] | 18 | |
| 19 | /* |
Soby Mathew | 2f38ce3 | 2018-02-08 17:45:12 +0000 | [diff] [blame] | 20 | * The following platform functions are weakly defined. The Platforms |
| 21 | * may redefine with strong definition. |
Masahiro Yamada | 2a4fe4f | 2018-02-01 18:42:24 +0900 | [diff] [blame] | 22 | */ |
Soby Mathew | 2f38ce3 | 2018-02-08 17:45:12 +0000 | [diff] [blame] | 23 | #pragma weak bl2_el3_plat_prepare_exit |
Masahiro Yamada | 2a4fe4f | 2018-02-01 18:42:24 +0900 | [diff] [blame] | 24 | #pragma weak plat_error_handler |
| 25 | #pragma weak bl2_plat_preload_setup |
Masahiro Yamada | 02a0d3d | 2018-02-01 16:45:51 +0900 | [diff] [blame] | 26 | #pragma weak bl2_plat_handle_pre_image_load |
| 27 | #pragma weak bl2_plat_handle_post_image_load |
Sumit Garg | 617e215 | 2019-11-15 15:34:55 +0530 | [diff] [blame] | 28 | #pragma weak plat_get_enc_key_info |
Manish V Badarkhe | 80f13ee | 2020-07-23 20:23:01 +0100 | [diff] [blame] | 29 | #pragma weak plat_is_smccc_feature_available |
Manish V Badarkhe | f809c6e | 2020-02-22 08:43:00 +0000 | [diff] [blame] | 30 | #pragma weak plat_get_soc_version |
| 31 | #pragma weak plat_get_soc_revision |
| 32 | |
| 33 | int32_t plat_get_soc_version(void) |
| 34 | { |
| 35 | return SMC_ARCH_CALL_NOT_SUPPORTED; |
| 36 | } |
| 37 | |
| 38 | int32_t plat_get_soc_revision(void) |
| 39 | { |
| 40 | return SMC_ARCH_CALL_NOT_SUPPORTED; |
| 41 | } |
Masahiro Yamada | 2a4fe4f | 2018-02-01 18:42:24 +0900 | [diff] [blame] | 42 | |
Manish V Badarkhe | 80f13ee | 2020-07-23 20:23:01 +0100 | [diff] [blame] | 43 | int32_t plat_is_smccc_feature_available(u_register_t fid __unused) |
| 44 | { |
| 45 | return SMC_ARCH_CALL_NOT_SUPPORTED; |
| 46 | } |
| 47 | |
Soby Mathew | 2f38ce3 | 2018-02-08 17:45:12 +0000 | [diff] [blame] | 48 | void bl2_el3_plat_prepare_exit(void) |
Masahiro Yamada | 43d20b3 | 2018-02-01 16:46:18 +0900 | [diff] [blame] | 49 | { |
Masahiro Yamada | 43d20b3 | 2018-02-01 16:46:18 +0900 | [diff] [blame] | 50 | } |
| 51 | |
Soby Mathew | 2f38ce3 | 2018-02-08 17:45:12 +0000 | [diff] [blame] | 52 | void __dead2 plat_error_handler(int err) |
Masahiro Yamada | 43d20b3 | 2018-02-01 16:46:18 +0900 | [diff] [blame] | 53 | { |
Maheedhar Bollapalli | 9bf4184 | 2024-04-25 10:34:02 +0530 | [diff] [blame^] | 54 | while (1) { |
Soby Mathew | 2f38ce3 | 2018-02-08 17:45:12 +0000 | [diff] [blame] | 55 | wfi(); |
Maheedhar Bollapalli | 9bf4184 | 2024-04-25 10:34:02 +0530 | [diff] [blame^] | 56 | } |
Masahiro Yamada | 43d20b3 | 2018-02-01 16:46:18 +0900 | [diff] [blame] | 57 | } |
| 58 | |
Masahiro Yamada | 2a4fe4f | 2018-02-01 18:42:24 +0900 | [diff] [blame] | 59 | void bl2_plat_preload_setup(void) |
| 60 | { |
| 61 | } |
| 62 | |
Masahiro Yamada | 02a0d3d | 2018-02-01 16:45:51 +0900 | [diff] [blame] | 63 | int bl2_plat_handle_pre_image_load(unsigned int image_id) |
| 64 | { |
| 65 | return 0; |
| 66 | } |
| 67 | |
| 68 | int bl2_plat_handle_post_image_load(unsigned int image_id) |
| 69 | { |
| 70 | return 0; |
| 71 | } |
| 72 | |
Roberto Vargas | 344ff02 | 2018-10-19 16:44:18 +0100 | [diff] [blame] | 73 | /* |
Sumit Garg | 617e215 | 2019-11-15 15:34:55 +0530 | [diff] [blame] | 74 | * Weak implementation to provide dummy decryption key only for test purposes, |
| 75 | * platforms must override this API for any real world firmware encryption |
| 76 | * use-case. |
| 77 | */ |
| 78 | int plat_get_enc_key_info(enum fw_enc_status_t fw_enc_status, uint8_t *key, |
| 79 | size_t *key_len, unsigned int *flags, |
| 80 | const uint8_t *img_id, size_t img_id_len) |
| 81 | { |
| 82 | #define DUMMY_FIP_ENC_KEY { 0x12, 0x34, 0x56, 0x78, 0x90, 0xab, 0xcd, 0xef, \ |
| 83 | 0x12, 0x34, 0x56, 0x78, 0x90, 0xab, 0xcd, 0xef, \ |
| 84 | 0x12, 0x34, 0x56, 0x78, 0x90, 0xab, 0xcd, 0xef, \ |
| 85 | 0x12, 0x34, 0x56, 0x78, 0x90, 0xab, 0xcd, 0xef } |
| 86 | |
| 87 | const uint8_t dummy_key[] = DUMMY_FIP_ENC_KEY; |
| 88 | |
| 89 | assert(*key_len >= sizeof(dummy_key)); |
| 90 | |
| 91 | *key_len = sizeof(dummy_key); |
| 92 | memcpy(key, dummy_key, *key_len); |
| 93 | *flags = 0; |
| 94 | |
| 95 | return 0; |
| 96 | } |
| 97 | |
| 98 | /* |
Roberto Vargas | 344ff02 | 2018-10-19 16:44:18 +0100 | [diff] [blame] | 99 | * Set up the page tables for the generic and platform-specific memory regions. |
| 100 | * The size of the Trusted SRAM seen by the BL image must be specified as well |
| 101 | * as an array specifying the generic memory regions which can be; |
| 102 | * - Code section; |
| 103 | * - Read-only data section; |
| 104 | * - Init code section, if applicable |
| 105 | * - Coherent memory region, if applicable. |
| 106 | */ |
| 107 | |
| 108 | void __init setup_page_tables(const mmap_region_t *bl_regions, |
| 109 | const mmap_region_t *plat_regions) |
| 110 | { |
| 111 | #if LOG_LEVEL >= LOG_LEVEL_VERBOSE |
| 112 | const mmap_region_t *regions = bl_regions; |
| 113 | |
| 114 | while (regions->size != 0U) { |
| 115 | VERBOSE("Region: 0x%lx - 0x%lx has attributes 0x%x\n", |
| 116 | regions->base_va, |
| 117 | regions->base_va + regions->size, |
| 118 | regions->attr); |
| 119 | regions++; |
| 120 | } |
| 121 | #endif |
| 122 | /* |
| 123 | * Map the Trusted SRAM with appropriate memory attributes. |
| 124 | * Subsequent mappings will adjust the attributes for specific regions. |
| 125 | */ |
| 126 | mmap_add(bl_regions); |
| 127 | |
| 128 | /* Now (re-)map the platform-specific memory regions */ |
| 129 | mmap_add(plat_regions); |
| 130 | |
| 131 | /* Create the page tables to reflect the above mappings */ |
| 132 | init_xlat_tables(); |
| 133 | } |
Raymond Mao | ab98f15 | 2024-11-14 13:28:36 -0800 | [diff] [blame] | 134 | |
| 135 | #if ((MEASURED_BOOT || DICE_PROTECTION_ENVIRONMENT) && TRANSFER_LIST) |
| 136 | int plat_handoff_mboot(const void *data, uint32_t data_size, void *tl_base) |
| 137 | { |
| 138 | if (!transfer_list_add(tl_base, TL_TAG_TPM_EVLOG, data_size, data)) |
| 139 | return -1; |
| 140 | |
| 141 | return 0; |
| 142 | } |
| 143 | #endif |