blob: b863bab1969230a17afc871410b6d0fbd5c19f94 [file] [log] [blame]
Tom Rini10e47792018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Tom Rini108ee582016-03-16 09:10:08 -04002/*
Andrew F. Davis857005b2019-07-16 09:49:38 -04003 * K2x: Secure commands file
Tom Rini108ee582016-03-16 09:10:08 -04004 *
Andrew F. Davis857005b2019-07-16 09:49:38 -04005 * Copyright (C) 2012-2019 Texas Instruments Incorporated - http://www.ti.com/
Tom Rini108ee582016-03-16 09:10:08 -04006 */
7
Simon Glassf11478f2019-12-28 10:45:07 -07008#include <hang.h>
Simon Glass2dc9c342020-05-10 11:40:01 -06009#include <image.h>
Andrew F. Davis857005b2019-07-16 09:49:38 -040010#include <asm/unaligned.h>
Tom Rini108ee582016-03-16 09:10:08 -040011#include <common.h>
12#include <command.h>
13#include <mach/mon.h>
Vitaly Andrianov1b3b2442017-04-07 10:00:03 -050014#include <spl.h>
Tom Rini108ee582016-03-16 09:10:08 -040015asm(".arch_extension sec\n\t");
16
Madan Srinivase8856102017-07-17 12:59:15 -050017int mon_install(u32 addr, u32 dpsc, u32 freq, u32 bm_addr)
Tom Rini108ee582016-03-16 09:10:08 -040018{
19 int result;
20
21 __asm__ __volatile__ (
22 "stmfd r13!, {lr}\n"
23 "mov r0, %1\n"
24 "mov r1, %2\n"
25 "mov r2, %3\n"
Madan Srinivase8856102017-07-17 12:59:15 -050026 "mov r3, %4\n"
Tom Rini108ee582016-03-16 09:10:08 -040027 "blx r0\n"
Srinivas, Madan39354af2017-07-17 13:02:02 -050028 "mov %0, r0\n"
Tom Rini108ee582016-03-16 09:10:08 -040029 "ldmfd r13!, {lr}\n"
30 : "=&r" (result)
Madan Srinivase8856102017-07-17 12:59:15 -050031 : "r" (addr), "r" (dpsc), "r" (freq), "r" (bm_addr)
32 : "cc", "r0", "r1", "r2", "r3", "memory");
Tom Rini108ee582016-03-16 09:10:08 -040033 return result;
34}
35
36int mon_power_on(int core_id, void *ep)
37{
38 int result;
39
40 asm volatile (
41 "stmfd r13!, {lr}\n"
42 "mov r1, %1\n"
43 "mov r2, %2\n"
44 "mov r0, #0\n"
45 "smc #0\n"
Srinivas, Madan39354af2017-07-17 13:02:02 -050046 "mov %0, r0\n"
Tom Rini108ee582016-03-16 09:10:08 -040047 "ldmfd r13!, {lr}\n"
48 : "=&r" (result)
49 : "r" (core_id), "r" (ep)
50 : "cc", "r0", "r1", "r2", "memory");
51 return result;
52}
53
54int mon_power_off(int core_id)
55{
56 int result;
57
58 asm volatile (
59 "stmfd r13!, {lr}\n"
60 "mov r1, %1\n"
61 "mov r0, #1\n"
62 "smc #1\n"
Srinivas, Madan39354af2017-07-17 13:02:02 -050063 "mov %0, r0\n"
Tom Rini108ee582016-03-16 09:10:08 -040064 "ldmfd r13!, {lr}\n"
65 : "=&r" (result)
66 : "r" (core_id)
67 : "cc", "r0", "r1", "memory");
68 return result;
69}
Vitaly Andrianov1b3b2442017-04-07 10:00:03 -050070
71#ifdef CONFIG_TI_SECURE_DEVICE
72#define KS2_HS_SEC_HEADER_LEN 0x60
73#define KS2_HS_SEC_TAG_OFFSET 0x34
74#define KS2_AUTH_CMD 130
75
76/**
77 * k2_hs_bm_auth() - Invokes security functions using a
78 * proprietary TI interface. This binary and source for
79 * this is available in the secure development package or
80 * SECDEV. For details on how to access this please refer
81 * doc/README.ti-secure
82 *
83 * @cmd: Secure monitor command
84 * @arg1: Argument for command
85 *
86 * returns non-zero value on success, zero on error
87 */
88static int k2_hs_bm_auth(int cmd, void *arg1)
89{
90 int result;
91
92 asm volatile (
93 "stmfd r13!, {r4-r12, lr}\n"
94 "mov r0, %1\n"
95 "mov r1, %2\n"
96 "smc #2\n"
Srinivas, Madan39354af2017-07-17 13:02:02 -050097 "mov %0, r0\n"
Vitaly Andrianov1b3b2442017-04-07 10:00:03 -050098 "ldmfd r13!, {r4-r12, lr}\n"
99 : "=&r" (result)
100 : "r" (cmd), "r" (arg1)
101 : "cc", "r0", "r1", "memory");
102
103 return result;
104}
105
Lokesh Vutlab36dd3e2021-06-11 11:45:05 +0300106void board_fit_image_post_process(const void *fit, int node, void **p_image,
107 size_t *p_size)
Vitaly Andrianov1b3b2442017-04-07 10:00:03 -0500108{
109 int result = 0;
110 void *image = *p_image;
111
112 if (strncmp(image + KS2_HS_SEC_TAG_OFFSET, "KEYS", 4)) {
113 printf("No signature found in image!\n");
114 hang();
115 }
116
117 result = k2_hs_bm_auth(KS2_AUTH_CMD, image);
118 if (result == 0) {
119 printf("Authentication failed!\n");
120 hang();
121 }
122
123 /*
Andrew F. Davis5564f232017-06-29 08:38:25 -0500124 * Overwrite the image headers after authentication
125 * and decryption. Update size to reflect removal
Andrew F. Davis857005b2019-07-16 09:49:38 -0400126 * of header and restore original file size.
Andrew F. Davis5564f232017-06-29 08:38:25 -0500127 */
Andrew F. Davis857005b2019-07-16 09:49:38 -0400128 *p_size = get_unaligned_le32(image + (*p_size - 4));
Andrew F. Davis5564f232017-06-29 08:38:25 -0500129 memcpy(image, image + KS2_HS_SEC_HEADER_LEN, *p_size);
Vitaly Andrianov1b3b2442017-04-07 10:00:03 -0500130
131 /*
132 * Output notification of successful authentication to re-assure the
133 * user that the secure code is being processed as expected. However
134 * suppress any such log output in case of building for SPL and booting
135 * via YMODEM. This is done to avoid disturbing the YMODEM serial
136 * protocol transactions.
137 */
138 if (!(IS_ENABLED(CONFIG_SPL_BUILD) &&
139 IS_ENABLED(CONFIG_SPL_YMODEM_SUPPORT) &&
140 spl_boot_device() == BOOT_DEVICE_UART))
141 printf("Authentication passed\n");
142}
143#endif