blob: 2abf28ea45bc6da08b050972584d2d6b36f04af8 [file] [log] [blame]
Tom Rini10e47792018-05-06 17:58:06 -04001/* SPDX-License-Identifier: GPL-2.0+ */
Stefano Babic83fd8582013-06-28 00:20:21 +02002/*
Ulises Cardenas8df2acd2015-07-02 21:26:30 -05003 * Copyright (C) 2012-2015 Freescale Semiconductor, Inc. All Rights Reserved.
Stefano Babic83fd8582013-06-28 00:20:21 +02004 *
Stefano Babic83fd8582013-06-28 00:20:21 +02005*/
6
7#ifndef __SECURE_MX6Q_H__
8#define __SECURE_MX6Q_H__
9
10#include <linux/types.h>
Bryan O'Donoghue316a0872018-03-09 13:07:19 +000011#include <linux/compiler.h>
Stefano Babic83fd8582013-06-28 00:20:21 +020012
Bryan O'Donoghuea6a54542018-01-12 12:40:02 +000013/*
14 * IVT header definitions
15 * Security Reference Manual for i.MX 7Dual and 7Solo Applications Processors,
16 * Rev. 0, 03/2017
17 * Section : 6.7.1.1
18 */
19#define IVT_HEADER_MAGIC 0xD1
20#define IVT_TOTAL_LENGTH 0x20
Bryan O'Donoghuea6a54542018-01-12 12:40:02 +000021
Bryan O'Donoghue0c7504e2018-03-09 13:07:20 +000022struct __packed ivt_header {
Bryan O'Donoghuea6a54542018-01-12 12:40:02 +000023 uint8_t magic;
24 uint16_t length;
25 uint8_t version;
Bryan O'Donoghue0c7504e2018-03-09 13:07:20 +000026};
Bryan O'Donoghuea6a54542018-01-12 12:40:02 +000027
28struct ivt {
29 struct ivt_header hdr; /* IVT header above */
30 uint32_t entry; /* Absolute address of first instruction */
31 uint32_t reserved1; /* Reserved should be zero */
32 uint32_t dcd; /* Absolute address of the image DCD */
33 uint32_t boot; /* Absolute address of the boot data */
34 uint32_t self; /* Absolute address of the IVT */
35 uint32_t csf; /* Absolute address of the CSF */
36 uint32_t reserved2; /* Reserved should be zero */
37};
38
Utkarsh Gupta2b1f4142018-02-20 01:19:24 +000039struct __packed hab_hdr {
40 u8 tag; /* Tag field */
41 u8 len[2]; /* Length field in bytes (big-endian) */
42 u8 par; /* Parameters field */
43};
44
Breno Lima3adb6f02021-03-25 17:30:13 +080045/* Default event structure */
46struct __packed evt_def {
47 struct hab_hdr hdr; /* Header */
48 uint32_t sts; /* Status */
49 uint32_t ctx; /* Default context */
50 uint8_t *data; /* Default data location */
51 size_t bytes; /* Size of default data */
52};
53
Stefano Babic83fd8582013-06-28 00:20:21 +020054/* -------- start of HAB API updates ------------*/
55/* The following are taken from HAB4 SIS */
56
57/* Status definitions */
58enum hab_status {
59 HAB_STS_ANY = 0x00,
60 HAB_FAILURE = 0x33,
61 HAB_WARNING = 0x69,
62 HAB_SUCCESS = 0xf0
63};
64
65/* Security Configuration definitions */
66enum hab_config {
Ulises Cardenas8df2acd2015-07-02 21:26:30 -050067 HAB_CFG_RETURN = 0x33, /* < Field Return IC */
68 HAB_CFG_OPEN = 0xf0, /* < Non-secure IC */
69 HAB_CFG_CLOSED = 0xcc /* < Secure IC */
Stefano Babic83fd8582013-06-28 00:20:21 +020070};
71
72/* State definitions */
73enum hab_state {
Ulises Cardenas8df2acd2015-07-02 21:26:30 -050074 HAB_STATE_INITIAL = 0x33, /* Initialising state (transitory) */
75 HAB_STATE_CHECK = 0x55, /* Check state (non-secure) */
76 HAB_STATE_NONSECURE = 0x66, /* Non-secure state */
77 HAB_STATE_TRUSTED = 0x99, /* Trusted state */
78 HAB_STATE_SECURE = 0xaa, /* Secure state */
79 HAB_STATE_FAIL_SOFT = 0xcc, /* Soft fail state */
80 HAB_STATE_FAIL_HARD = 0xff, /* Hard fail state (terminal) */
81 HAB_STATE_NONE = 0xf0, /* No security state machine */
Stefano Babic83fd8582013-06-28 00:20:21 +020082 HAB_STATE_MAX
83};
84
Ulises Cardenas8df2acd2015-07-02 21:26:30 -050085enum hab_reason {
86 HAB_RSN_ANY = 0x00, /* Match any reason */
87 HAB_ENG_FAIL = 0x30, /* Engine failure */
88 HAB_INV_ADDRESS = 0x22, /* Invalid address: access denied */
89 HAB_INV_ASSERTION = 0x0c, /* Invalid assertion */
90 HAB_INV_CALL = 0x28, /* Function called out of sequence */
91 HAB_INV_CERTIFICATE = 0x21, /* Invalid certificate */
92 HAB_INV_COMMAND = 0x06, /* Invalid command: command malformed */
93 HAB_INV_CSF = 0x11, /* Invalid csf */
94 HAB_INV_DCD = 0x27, /* Invalid dcd */
95 HAB_INV_INDEX = 0x0f, /* Invalid index: access denied */
96 HAB_INV_IVT = 0x05, /* Invalid ivt */
97 HAB_INV_KEY = 0x1d, /* Invalid key */
98 HAB_INV_RETURN = 0x1e, /* Failed callback function */
99 HAB_INV_SIGNATURE = 0x18, /* Invalid signature */
100 HAB_INV_SIZE = 0x17, /* Invalid data size */
101 HAB_MEM_FAIL = 0x2e, /* Memory failure */
102 HAB_OVR_COUNT = 0x2b, /* Expired poll count */
103 HAB_OVR_STORAGE = 0x2d, /* Exhausted storage region */
104 HAB_UNS_ALGORITHM = 0x12, /* Unsupported algorithm */
105 HAB_UNS_COMMAND = 0x03, /* Unsupported command */
106 HAB_UNS_ENGINE = 0x0a, /* Unsupported engine */
107 HAB_UNS_ITEM = 0x24, /* Unsupported configuration item */
108 HAB_UNS_KEY = 0x1b, /* Unsupported key type/parameters */
109 HAB_UNS_PROTOCOL = 0x14, /* Unsupported protocol */
110 HAB_UNS_STATE = 0x09, /* Unsuitable state */
111 HAB_RSN_MAX
112};
113
114enum hab_context {
115 HAB_CTX_ANY = 0x00, /* Match any context */
116 HAB_CTX_FAB = 0xff, /* Event logged in hab_fab_test() */
117 HAB_CTX_ENTRY = 0xe1, /* Event logged in hab_rvt.entry() */
118 HAB_CTX_TARGET = 0x33, /* Event logged in hab_rvt.check_target() */
119 HAB_CTX_AUTHENTICATE = 0x0a,/* Logged in hab_rvt.authenticate_image() */
120 HAB_CTX_DCD = 0xdd, /* Event logged in hab_rvt.run_dcd() */
121 HAB_CTX_CSF = 0xcf, /* Event logged in hab_rvt.run_csf() */
122 HAB_CTX_COMMAND = 0xc0, /* Event logged executing csf/dcd command */
123 HAB_CTX_AUT_DAT = 0xdb, /* Authenticated data block */
124 HAB_CTX_ASSERT = 0xa0, /* Event logged in hab_rvt.assert() */
125 HAB_CTX_EXIT = 0xee, /* Event logged in hab_rvt.exit() */
126 HAB_CTX_MAX
127};
128
Bryan O'Donoghued03dcea2018-01-12 12:40:08 +0000129enum hab_target {
130 HAB_TGT_MEMORY = 0x0f,
131 HAB_TGT_PERIPHERAL = 0xf0,
132 HAB_TGT_ANY = 0x55,
133};
134
Adrian Alonsoae1e8532015-10-12 13:48:11 -0500135struct imx_sec_config_fuse_t {
136 int bank;
137 int word;
138};
139
Stefano Babicf8b509b2019-09-20 08:47:53 +0200140#if defined(CONFIG_IMX_HAB)
Adrian Alonsoae1e8532015-10-12 13:48:11 -0500141extern struct imx_sec_config_fuse_t const imx_sec_config_fuse;
142#endif
143
Stefano Babic83fd8582013-06-28 00:20:21 +0200144/*Function prototype description*/
145typedef enum hab_status hab_rvt_report_event_t(enum hab_status, uint32_t,
146 uint8_t* , size_t*);
147typedef enum hab_status hab_rvt_report_status_t(enum hab_config *,
148 enum hab_state *);
149typedef enum hab_status hab_loader_callback_f_t(void**, size_t*, const void*);
150typedef enum hab_status hab_rvt_entry_t(void);
151typedef enum hab_status hab_rvt_exit_t(void);
152typedef void *hab_rvt_authenticate_image_t(uint8_t, ptrdiff_t,
153 void **, size_t *, hab_loader_callback_f_t);
Bryan O'Donoghued03dcea2018-01-12 12:40:08 +0000154typedef enum hab_status hab_rvt_check_target_t(enum hab_target, const void *,
155 size_t);
Bryan O'Donoghue529fd572018-01-12 12:40:17 +0000156typedef void hab_rvt_failsafe_t(void);
Stefano Babic83fd8582013-06-28 00:20:21 +0200157typedef void hapi_clock_init_t(void);
158
Ulises Cardenas8df2acd2015-07-02 21:26:30 -0500159#define HAB_ENG_ANY 0x00 /* Select first compatible engine */
160#define HAB_ENG_SCC 0x03 /* Security controller */
161#define HAB_ENG_RTIC 0x05 /* Run-time integrity checker */
162#define HAB_ENG_SAHARA 0x06 /* Crypto accelerator */
163#define HAB_ENG_CSU 0x0a /* Central Security Unit */
164#define HAB_ENG_SRTC 0x0c /* Secure clock */
165#define HAB_ENG_DCP 0x1b /* Data Co-Processor */
166#define HAB_ENG_CAAM 0x1d /* CAAM */
167#define HAB_ENG_SNVS 0x1e /* Secure Non-Volatile Storage */
168#define HAB_ENG_OCOTP 0x21 /* Fuse controller */
169#define HAB_ENG_DTCP 0x22 /* DTCP co-processor */
170#define HAB_ENG_ROM 0x36 /* Protected ROM area */
171#define HAB_ENG_HDCP 0x24 /* HDCP co-processor */
172#define HAB_ENG_RTL 0x77 /* RTL simulation engine */
173#define HAB_ENG_SW 0xff /* Software engine */
174
Peng Fan4f3cf8f2021-03-25 17:30:07 +0800175#ifdef CONFIG_ARM64
Ye Li953ef282021-03-25 17:30:15 +0800176#ifdef CONFIG_IMX8MQ
Peng Fan4f3cf8f2021-03-25 17:30:07 +0800177#define HAB_RVT_BASE 0x00000880
Ye Li953ef282021-03-25 17:30:15 +0800178#else
179#define HAB_RVT_BASE 0x00000900
180#endif
Peng Fan4f3cf8f2021-03-25 17:30:07 +0800181
182#define HAB_RVT_ENTRY (*(ulong *)(HAB_RVT_BASE + 0x08))
183#define HAB_RVT_EXIT (*(ulong *)(HAB_RVT_BASE + 0x10))
184#define HAB_RVT_CHECK_TARGET (*(ulong *)(HAB_RVT_BASE + 0x18))
185#define HAB_RVT_AUTHENTICATE_IMAGE (*(ulong *)(HAB_RVT_BASE + 0x20))
186#define HAB_RVT_REPORT_EVENT (*(ulong *)(HAB_RVT_BASE + 0x40))
187#define HAB_RVT_REPORT_STATUS (*(ulong *)(HAB_RVT_BASE + 0x48))
188#define HAB_RVT_FAILSAFE (*(ulong *)(HAB_RVT_BASE + 0x50))
189#else
190
Adrian Alonso994d9cf2015-10-12 13:48:09 -0500191#ifdef CONFIG_ROM_UNIFIED_SECTIONS
Nitin Garg416d53f2014-09-30 11:39:29 -0500192#define HAB_RVT_BASE 0x00000100
193#else
Breno Limaf4a72242018-02-20 01:19:26 +0000194#define HAB_RVT_BASE_NEW 0x00000098
195#define HAB_RVT_BASE_OLD 0x00000094
196#define HAB_RVT_BASE ((is_mx6dqp()) ? \
197 HAB_RVT_BASE_NEW : \
Breno Lima90ec0ea2021-03-25 17:30:19 +0800198 (is_mx6dq() && (soc_rev() >= CHIP_REV_1_3)) ? \
Breno Limaf4a72242018-02-20 01:19:26 +0000199 HAB_RVT_BASE_NEW : \
200 (is_mx6sdl() && (soc_rev() >= CHIP_REV_1_2)) ? \
201 HAB_RVT_BASE_NEW : HAB_RVT_BASE_OLD)
Nitin Garg416d53f2014-09-30 11:39:29 -0500202#endif
203
204#define HAB_RVT_ENTRY (*(uint32_t *)(HAB_RVT_BASE + 0x04))
205#define HAB_RVT_EXIT (*(uint32_t *)(HAB_RVT_BASE + 0x08))
Bryan O'Donoghued03dcea2018-01-12 12:40:08 +0000206#define HAB_RVT_CHECK_TARGET (*(uint32_t *)(HAB_RVT_BASE + 0x0C))
Nitin Garg416d53f2014-09-30 11:39:29 -0500207#define HAB_RVT_AUTHENTICATE_IMAGE (*(uint32_t *)(HAB_RVT_BASE + 0x10))
208#define HAB_RVT_REPORT_EVENT (*(uint32_t *)(HAB_RVT_BASE + 0x20))
209#define HAB_RVT_REPORT_STATUS (*(uint32_t *)(HAB_RVT_BASE + 0x24))
Bryan O'Donoghue529fd572018-01-12 12:40:17 +0000210#define HAB_RVT_FAILSAFE (*(uint32_t *)(HAB_RVT_BASE + 0x28))
Stefano Babic14404422014-06-10 10:26:22 +0200211
Peng Fan4f3cf8f2021-03-25 17:30:07 +0800212#endif /*CONFIG_ARM64*/
213
Stefano Babic83fd8582013-06-28 00:20:21 +0200214#define HAB_CID_ROM 0 /**< ROM Caller ID */
215#define HAB_CID_UBOOT 1 /**< UBOOT Caller ID*/
Ulises Cardenas8df2acd2015-07-02 21:26:30 -0500216
Sjoerd Simons27f3fae2019-06-18 23:08:59 +0200217#define HAB_TAG_RVT 0xDD /* ROM Vector Table */
Utkarsh Gupta2b1f4142018-02-20 01:19:24 +0000218#define HAB_CMD_HDR 0xD4 /* CSF Header */
Utkarsh Gupta09af35c2018-02-20 01:19:25 +0000219#define HAB_CMD_WRT_DAT 0xCC /* Write Data command tag */
220#define HAB_CMD_CHK_DAT 0xCF /* Check Data command tag */
221#define HAB_CMD_SET 0xB1 /* Set command tag */
222#define HAB_PAR_MID 0x01 /* MID parameter value */
Utkarsh Gupta2b1f4142018-02-20 01:19:24 +0000223
Bryan O'Donoghuef6bbd372018-01-12 12:39:59 +0000224#define IVT_SIZE 0x20
Bryan O'Donoghue73f9a722018-01-12 12:40:00 +0000225#define CSF_PAD_SIZE 0x2000
Bryan O'Donoghuef6bbd372018-01-12 12:39:59 +0000226
Breno Lima3adb6f02021-03-25 17:30:13 +0800227#define HAB_TAG_EVT 0xDB
228#define HAB_TAG_EVT_DEF 0x0C
229
230#define HAB_MAJ_VER 0x40
231#define HAB_MAJ_MASK 0xF0
232
Stefano Babic83fd8582013-06-28 00:20:21 +0200233/* ----------- end of HAB API updates ------------*/
234
Bryan O'Donoghue1efba6a2018-01-12 12:40:13 +0000235int imx_hab_authenticate_image(uint32_t ddr_start, uint32_t image_size,
236 uint32_t ivt_offset);
Bryan O'Donoghue47b3f342018-01-12 12:40:16 +0000237bool imx_hab_is_enabled(void);
Sven Ebenfeldeba5e332016-11-06 16:37:55 +0100238
Stefano Babic83fd8582013-06-28 00:20:21 +0200239#endif