mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-12-24 20:13:39 +00:00
ab12179b3e
Make sure we have an IMX header before calling spl_load_imx_container, since if we don't it will fail with -ENOENT. This allows us to fall back to legacy/raw images if they are also enabled. This is a functional change, one which likely should have been in place from the start, but a functional change nonetheless. Previously, all non-IMX8 images (except FITs without FIT_FULL) would be optimized out if the only image load method enabled supported IMX8 images. With this change, support for other image types now has an effect. There are seven boards with SPL_LOAD_IMX_CONTAINER enabled: three with SPL_BOOTROM_SUPPORT: imx93_11x11_evk_ld imx93_11x11_evk imx8ulp_evk and four with SPL_MMC: deneb imx8qxp_mek giedi imx8qm_mek All of these boards also have SPL_RAW_IMAGE_SUPPORT and SPL_LEGACY_IMAGE_FORMAT enabled as well. However, none have FIT support enabled. Of the six load methods affected by this patch, only SPL_MMC and SPL_BOOTROM_SUPPORT are enabled with SPL_LOAD_IMX_CONTAINER. spl_romapi_load_image_seekable does not support legacy or raw images, so there is no growth. However, mmc_load_image_raw_sector does support loading legacy/raw images. Since these images could not have been booted before, I have disabled support for legacy/raw images on these four boards. This reduces bloat from around 800 bytes to around 200. There are no in-tree boards with SPL_LOAD_IMX_CONTAINER and AHAB_BOOT both enabled, so we do not need to worry about potentially falling back to legacy images in a secure boot scenario. Future work could include merging imx_container.h with imx8image.h, since they appear to define mostly the same structures. Signed-off-by: Sean Anderson <seanga2@gmail.com>
406 lines
10 KiB
C
406 lines
10 KiB
C
// SPDX-License-Identifier: GPL-2.0+
|
|
/*
|
|
* Copyright 2008-2015 Freescale Semiconductor, Inc.
|
|
* Copyright 2022 NXP
|
|
*
|
|
* Command for encapsulating DEK blob
|
|
*/
|
|
|
|
#include <common.h>
|
|
#include <command.h>
|
|
#include <log.h>
|
|
#include <malloc.h>
|
|
#include <memalign.h>
|
|
#include <asm/byteorder.h>
|
|
#include <linux/compiler.h>
|
|
#include <fsl_sec.h>
|
|
#include <asm/arch/clock.h>
|
|
#include <mapmem.h>
|
|
#include <tee.h>
|
|
#ifdef CONFIG_IMX_SECO_DEK_ENCAP
|
|
#include <imx_container.h>
|
|
#include <firmware/imx/sci/sci.h>
|
|
#endif
|
|
#ifdef CONFIG_IMX_ELE_DEK_ENCAP
|
|
#include <imx_container.h>
|
|
#include <asm/mach-imx/ele_api.h>
|
|
#endif
|
|
|
|
#include <cpu_func.h>
|
|
|
|
/**
|
|
* blob_dek() - Encapsulate the DEK as a blob using CAM's Key
|
|
* @src: - Address of data to be encapsulated
|
|
* @dst: - Desination address of encapsulated data
|
|
* @len: - Size of data to be encapsulated
|
|
*
|
|
* Returns zero on success,and negative on error.
|
|
*/
|
|
#ifdef CONFIG_IMX_CAAM_DEK_ENCAP
|
|
static int blob_encap_dek(u32 src_addr, u32 dst_addr, u32 len)
|
|
{
|
|
u8 *src_ptr, *dst_ptr;
|
|
|
|
src_ptr = map_sysmem(src_addr, len / 8);
|
|
dst_ptr = map_sysmem(dst_addr, BLOB_SIZE(len / 8));
|
|
|
|
hab_caam_clock_enable(1);
|
|
|
|
u32 out_jr_size = sec_in32(CFG_SYS_FSL_JR0_ADDR +
|
|
FSL_CAAM_ORSR_JRa_OFFSET);
|
|
if (out_jr_size != FSL_CAAM_MAX_JR_SIZE)
|
|
sec_init();
|
|
|
|
if (!((len == 128) | (len == 192) | (len == 256))) {
|
|
debug("Invalid DEK size. Valid sizes are 128, 192 and 256b\n");
|
|
return -1;
|
|
}
|
|
|
|
len /= 8;
|
|
return blob_dek(src_ptr, dst_ptr, len);
|
|
}
|
|
#endif /* CONFIG_IMX_CAAM_DEK_ENCAP */
|
|
|
|
#ifdef CONFIG_IMX_OPTEE_DEK_ENCAP
|
|
|
|
#define PTA_DEK_BLOB_PTA_UUID {0xef477737, 0x0db1, 0x4a9d, \
|
|
{0x84, 0x37, 0xf2, 0xf5, 0x35, 0xc0, 0xbd, 0x92} }
|
|
|
|
#define OPTEE_BLOB_HDR_SIZE 8
|
|
|
|
static int blob_encap_dek(u32 src_addr, u32 dst_addr, u32 len)
|
|
{
|
|
struct udevice *dev = NULL;
|
|
struct tee_shm *shm_input, *shm_output;
|
|
struct tee_open_session_arg arg = {0};
|
|
struct tee_invoke_arg arg_func = {0};
|
|
const struct tee_optee_ta_uuid uuid = PTA_DEK_BLOB_PTA_UUID;
|
|
struct tee_param param[4] = {0};
|
|
int ret;
|
|
|
|
/* Get tee device */
|
|
dev = tee_find_device(NULL, NULL, NULL, NULL);
|
|
if (!dev) {
|
|
printf("Cannot get OP-TEE device\n");
|
|
return -1;
|
|
}
|
|
|
|
/* Set TA UUID */
|
|
tee_optee_ta_uuid_to_octets(arg.uuid, &uuid);
|
|
|
|
/* Open TA session */
|
|
ret = tee_open_session(dev, &arg, 0, NULL);
|
|
if (ret < 0) {
|
|
printf("Cannot open session with PTA Blob 0x%X\n", ret);
|
|
return -1;
|
|
}
|
|
|
|
/* Allocate shared input and output buffers for TA */
|
|
ret = tee_shm_register(dev, (void *)(ulong)src_addr, len / 8, 0x0, &shm_input);
|
|
if (ret < 0) {
|
|
printf("Cannot register input shared memory 0x%X\n", ret);
|
|
goto error;
|
|
}
|
|
|
|
ret = tee_shm_register(dev, (void *)(ulong)dst_addr,
|
|
BLOB_SIZE(len / 8) + OPTEE_BLOB_HDR_SIZE,
|
|
0x0, &shm_output);
|
|
if (ret < 0) {
|
|
printf("Cannot register output shared memory 0x%X\n", ret);
|
|
tee_shm_free(shm_input);
|
|
goto error;
|
|
}
|
|
|
|
param[0].u.memref.shm = shm_input;
|
|
param[0].u.memref.size = shm_input->size;
|
|
param[0].attr = TEE_PARAM_ATTR_TYPE_MEMREF_INPUT;
|
|
param[1].u.memref.shm = shm_output;
|
|
param[1].u.memref.size = shm_output->size;
|
|
param[1].attr = TEE_PARAM_ATTR_TYPE_MEMREF_OUTPUT;
|
|
param[2].attr = TEE_PARAM_ATTR_TYPE_NONE;
|
|
param[3].attr = TEE_PARAM_ATTR_TYPE_NONE;
|
|
|
|
arg_func.func = 0;
|
|
arg_func.session = arg.session;
|
|
|
|
/* Generate DEK blob */
|
|
arg_func.session = arg.session;
|
|
ret = tee_invoke_func(dev, &arg_func, 4, param);
|
|
if (ret < 0)
|
|
printf("Cannot generate Blob with PTA DEK Blob 0x%X\n", ret);
|
|
|
|
/* Free shared memory */
|
|
tee_shm_free(shm_input);
|
|
tee_shm_free(shm_output);
|
|
|
|
error:
|
|
/* Close session */
|
|
ret = tee_close_session(dev, arg.session);
|
|
if (ret < 0)
|
|
printf("Cannot close session with PTA DEK Blob 0x%X\n", ret);
|
|
|
|
return ret;
|
|
}
|
|
#endif /* CONFIG_IMX_OPTEE_DEK_ENCAP */
|
|
#ifdef CONFIG_IMX_SECO_DEK_ENCAP
|
|
|
|
#define DEK_BLOB_KEY_ID 0x0
|
|
|
|
#define AHAB_PRIVATE_KEY 0x81
|
|
#define AHAB_VERSION 0x00
|
|
#define AHAB_MODE_CBC 0x67
|
|
#define AHAB_ALG_AES 0x55
|
|
#define AHAB_128_AES_KEY 0x10
|
|
#define AHAB_192_AES_KEY 0x18
|
|
#define AHAB_256_AES_KEY 0x20
|
|
#define AHAB_FLAG_KEK 0x80
|
|
#define AHAB_DEK_BLOB 0x01
|
|
|
|
#define DEK_BLOB_HDR_SIZE 8
|
|
#define SECO_PT 2U
|
|
|
|
static int blob_encap_dek(u32 src_addr, u32 dst_addr, u32 len)
|
|
{
|
|
int err;
|
|
sc_rm_mr_t mr_input, mr_output;
|
|
struct generate_key_blob_hdr hdr;
|
|
u8 in_size, out_size;
|
|
u8 *src_ptr, *dst_ptr;
|
|
int ret = 0;
|
|
int i;
|
|
|
|
/* Set sizes */
|
|
in_size = sizeof(struct generate_key_blob_hdr) + len / 8;
|
|
out_size = BLOB_SIZE(len / 8) + DEK_BLOB_HDR_SIZE;
|
|
|
|
/* Get src and dst virtual addresses */
|
|
src_ptr = map_sysmem(src_addr, in_size);
|
|
dst_ptr = map_sysmem(dst_addr, out_size);
|
|
|
|
/* Check addr input */
|
|
if (!(src_ptr && dst_ptr)) {
|
|
debug("src_addr or dst_addr invalid\n");
|
|
return -1;
|
|
}
|
|
|
|
/* Build key header */
|
|
hdr.version = AHAB_VERSION;
|
|
hdr.length_lsb = sizeof(struct generate_key_blob_hdr) + len / 8;
|
|
hdr.length_msb = 0x00;
|
|
hdr.tag = AHAB_PRIVATE_KEY;
|
|
hdr.flags = AHAB_DEK_BLOB;
|
|
hdr.algorithm = AHAB_ALG_AES;
|
|
hdr.mode = AHAB_MODE_CBC;
|
|
|
|
switch (len) {
|
|
case 128:
|
|
hdr.size = AHAB_128_AES_KEY;
|
|
break;
|
|
case 192:
|
|
hdr.size = AHAB_192_AES_KEY;
|
|
break;
|
|
case 256:
|
|
hdr.size = AHAB_256_AES_KEY;
|
|
break;
|
|
default:
|
|
/* Not supported */
|
|
debug("Invalid DEK size. Valid sizes are 128, 192 and 256b\n");
|
|
return -1;
|
|
}
|
|
|
|
/* Build input message */
|
|
memmove((void *)(src_ptr + sizeof(struct generate_key_blob_hdr)),
|
|
(void *)src_ptr, len / 8);
|
|
memcpy((void *)src_ptr, (void *)&hdr,
|
|
sizeof(struct generate_key_blob_hdr));
|
|
|
|
/* Flush the cache before triggering the CAAM DMA */
|
|
flush_dcache_range(src_addr, src_addr + in_size);
|
|
|
|
/* Find input memory region */
|
|
err = sc_rm_find_memreg((-1), &mr_input, src_addr & ~(CONFIG_SYS_CACHELINE_SIZE - 1),
|
|
ALIGN(src_addr + in_size, CONFIG_SYS_CACHELINE_SIZE));
|
|
if (err) {
|
|
printf("Error: find memory region 0x%X\n", src_addr);
|
|
return -ENOMEM;
|
|
}
|
|
|
|
/* Find output memory region */
|
|
err = sc_rm_find_memreg((-1), &mr_output, dst_addr & ~(CONFIG_SYS_CACHELINE_SIZE - 1),
|
|
ALIGN(dst_addr + out_size, CONFIG_SYS_CACHELINE_SIZE));
|
|
if (err) {
|
|
printf("Error: find memory region 0x%X\n", dst_addr);
|
|
return -ENOMEM;
|
|
}
|
|
|
|
/* Set memory region permissions for SECO */
|
|
err = sc_rm_set_memreg_permissions(-1, mr_input, SECO_PT,
|
|
SC_RM_PERM_FULL);
|
|
if (err) {
|
|
printf("Set permission failed for input memory region\n");
|
|
ret = -EPERM;
|
|
goto error;
|
|
}
|
|
|
|
err = sc_rm_set_memreg_permissions(-1, mr_output, SECO_PT,
|
|
SC_RM_PERM_FULL);
|
|
if (err) {
|
|
printf("Set permission failed for output memory region\n");
|
|
ret = -EPERM;
|
|
goto error;
|
|
}
|
|
|
|
/* Flush output data before SECO operation */
|
|
flush_dcache_range((ulong)dst_ptr, (ulong)(dst_ptr +
|
|
roundup(out_size, ARCH_DMA_MINALIGN)));
|
|
|
|
/* Generate DEK blob */
|
|
err = sc_seco_gen_key_blob((-1), 0x0, src_addr, dst_addr, out_size);
|
|
if (err) {
|
|
ret = -EPERM;
|
|
goto error;
|
|
}
|
|
|
|
/* Invalidate output buffer */
|
|
invalidate_dcache_range((ulong)dst_ptr, (ulong)(dst_ptr +
|
|
roundup(out_size, ARCH_DMA_MINALIGN)));
|
|
|
|
printf("DEK Blob\n");
|
|
for (i = 0; i < DEK_BLOB_HDR_SIZE + BLOB_SIZE(len / 8); i++)
|
|
printf("%02X", dst_ptr[i]);
|
|
printf("\n");
|
|
|
|
error:
|
|
/* Remove memory region permission to SECO */
|
|
err = sc_rm_set_memreg_permissions(-1, mr_input, SECO_PT,
|
|
SC_RM_PERM_NONE);
|
|
if (err) {
|
|
printf("Error: remove permission failed for input\n");
|
|
ret = -EPERM;
|
|
}
|
|
|
|
err = sc_rm_set_memreg_permissions(-1, mr_output, SECO_PT,
|
|
SC_RM_PERM_NONE);
|
|
if (err) {
|
|
printf("Error: remove permission failed for output\n");
|
|
ret = -EPERM;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
#endif /* CONFIG_IMX_SECO_DEK_ENCAP */
|
|
|
|
#ifdef CONFIG_IMX_ELE_DEK_ENCAP
|
|
|
|
#define DEK_BLOB_HDR_SIZE 8
|
|
#define AHAB_PRIVATE_KEY 0x81
|
|
#define AHAB_DEK_BLOB 0x01
|
|
#define AHAB_ALG_AES 0x03
|
|
#define AHAB_128_AES_KEY 0x10
|
|
#define AHAB_192_AES_KEY 0x18
|
|
#define AHAB_256_AES_KEY 0x20
|
|
|
|
static int blob_encap_dek(u32 src_addr, u32 dst_addr, u32 len)
|
|
{
|
|
u8 in_size, out_size;
|
|
u8 *src_ptr, *dst_ptr;
|
|
struct generate_key_blob_hdr hdr;
|
|
|
|
/* Set sizes */
|
|
in_size = sizeof(struct generate_key_blob_hdr) + len / 8;
|
|
out_size = BLOB_SIZE(len / 8) + DEK_BLOB_HDR_SIZE;
|
|
|
|
/* Get src and dst virtual addresses */
|
|
src_ptr = map_sysmem(src_addr, in_size);
|
|
dst_ptr = map_sysmem(dst_addr, out_size);
|
|
|
|
/* Check addr input */
|
|
if (!(src_ptr && dst_ptr)) {
|
|
debug("src_addr or dst_addr invalid\n");
|
|
return -1;
|
|
}
|
|
|
|
/* Build key header */
|
|
hdr.version = 0x0;
|
|
hdr.length_lsb = in_size;
|
|
hdr.length_msb = 0x00;
|
|
hdr.tag = AHAB_PRIVATE_KEY;
|
|
hdr.flags = AHAB_DEK_BLOB;
|
|
hdr.algorithm = AHAB_ALG_AES;
|
|
hdr.mode = 0x0; /* Not used by the ELE */
|
|
|
|
switch (len) {
|
|
case 128:
|
|
hdr.size = AHAB_128_AES_KEY;
|
|
break;
|
|
case 192:
|
|
hdr.size = AHAB_192_AES_KEY;
|
|
break;
|
|
case 256:
|
|
hdr.size = AHAB_256_AES_KEY;
|
|
break;
|
|
default:
|
|
/* Not supported */
|
|
debug("Invalid DEK size. Valid sizes are 128, 192 and 256b\n");
|
|
return -1;
|
|
}
|
|
|
|
/* Move input key and append blob header */
|
|
memmove((void *)(src_ptr + sizeof(struct generate_key_blob_hdr)),
|
|
(void *)src_ptr, len / 8);
|
|
memcpy((void *)src_ptr, (void *)&hdr,
|
|
sizeof(struct generate_key_blob_hdr));
|
|
|
|
/* Flush the cache */
|
|
flush_dcache_range(src_addr, src_addr + in_size);
|
|
flush_dcache_range((ulong)dst_ptr, (ulong)(dst_ptr +
|
|
roundup(out_size, ARCH_DMA_MINALIGN)));
|
|
|
|
/* Call ELE */
|
|
if (ele_generate_dek_blob(0x00, src_addr, dst_addr, out_size))
|
|
return -1;
|
|
|
|
/* Invalidate output buffer */
|
|
invalidate_dcache_range((ulong)dst_ptr, (ulong)(dst_ptr +
|
|
roundup(out_size, ARCH_DMA_MINALIGN)));
|
|
|
|
return 0;
|
|
}
|
|
#endif /* CONFIG_IMX_ELE_DEK_ENCAP */
|
|
|
|
/**
|
|
* do_dek_blob() - Handle the "dek_blob" command-line command
|
|
* @cmdtp: Command data struct pointer
|
|
* @flag: Command flag
|
|
* @argc: Command-line argument count
|
|
* @argv: Array of command-line arguments
|
|
*
|
|
* Returns zero on success, CMD_RET_USAGE in case of misuse and negative
|
|
* on error.
|
|
*/
|
|
static int do_dek_blob(struct cmd_tbl *cmdtp, int flag, int argc,
|
|
char *const argv[])
|
|
{
|
|
uint32_t src_addr, dst_addr, len;
|
|
|
|
if (argc != 4)
|
|
return CMD_RET_USAGE;
|
|
|
|
src_addr = hextoul(argv[1], NULL);
|
|
dst_addr = hextoul(argv[2], NULL);
|
|
len = dectoul(argv[3], NULL);
|
|
|
|
return blob_encap_dek(src_addr, dst_addr, len);
|
|
}
|
|
|
|
/***************************************************/
|
|
static char dek_blob_help_text[] =
|
|
"src dst len - Encapsulate and create blob of data\n"
|
|
" $len bits long at address $src and\n"
|
|
" store the result at address $dst.\n";
|
|
|
|
U_BOOT_CMD(
|
|
dek_blob, 4, 1, do_dek_blob,
|
|
"Data Encryption Key blob encapsulation",
|
|
dek_blob_help_text
|
|
);
|