xref: /openbmc/u-boot/arch/arm/mach-keystone/mon.c (revision 57efeb04)
1 // SPDX-License-Identifier: GPL-2.0+
2 /*
3  * K2HK: secure kernel command file
4  *
5  * (C) Copyright 2012-2014
6  *     Texas Instruments Incorporated, <www.ti.com>
7  */
8 
9 #include <common.h>
10 #include <command.h>
11 #include <mach/mon.h>
12 #include <spl.h>
13 asm(".arch_extension sec\n\t");
14 
15 int mon_install(u32 addr, u32 dpsc, u32 freq, u32 bm_addr)
16 {
17 	int result;
18 
19 	__asm__ __volatile__ (
20 		"stmfd r13!, {lr}\n"
21 		"mov r0, %1\n"
22 		"mov r1, %2\n"
23 		"mov r2, %3\n"
24 		"mov r3, %4\n"
25 		"blx r0\n"
26 		"mov %0, r0\n"
27 		"ldmfd r13!, {lr}\n"
28 		: "=&r" (result)
29 		: "r" (addr), "r" (dpsc), "r" (freq), "r" (bm_addr)
30 		: "cc", "r0", "r1", "r2", "r3", "memory");
31 	return result;
32 }
33 
34 int mon_power_on(int core_id, void *ep)
35 {
36 	int result;
37 
38 	asm volatile (
39 		"stmfd  r13!, {lr}\n"
40 		"mov r1, %1\n"
41 		"mov r2, %2\n"
42 		"mov r0, #0\n"
43 		"smc	#0\n"
44 		"mov %0, r0\n"
45 		"ldmfd  r13!, {lr}\n"
46 		: "=&r" (result)
47 		: "r" (core_id), "r" (ep)
48 		: "cc", "r0", "r1", "r2", "memory");
49 	return  result;
50 }
51 
52 int mon_power_off(int core_id)
53 {
54 	int result;
55 
56 	asm volatile (
57 		"stmfd  r13!, {lr}\n"
58 		"mov r1, %1\n"
59 		"mov r0, #1\n"
60 		"smc	#1\n"
61 		"mov %0, r0\n"
62 		"ldmfd  r13!, {lr}\n"
63 		: "=&r" (result)
64 		: "r" (core_id)
65 		: "cc", "r0", "r1", "memory");
66 	return  result;
67 }
68 
69 #ifdef CONFIG_TI_SECURE_DEVICE
70 #define KS2_HS_SEC_HEADER_LEN	0x60
71 #define KS2_HS_SEC_TAG_OFFSET	0x34
72 #define KS2_AUTH_CMD		130
73 
74 /**
75  * k2_hs_bm_auth() - Invokes security functions using a
76  * proprietary TI interface. This binary and source for
77  * this is available in the secure development package or
78  * SECDEV. For details on how to access this please refer
79  * doc/README.ti-secure
80  *
81  * @cmd: Secure monitor command
82  * @arg1: Argument for command
83  *
84  * returns non-zero value on success, zero on error
85  */
86 static int k2_hs_bm_auth(int cmd, void *arg1)
87 {
88 	int result;
89 
90 	asm volatile (
91 		"stmfd  r13!, {r4-r12, lr}\n"
92 		"mov r0, %1\n"
93 		"mov r1, %2\n"
94 		"smc #2\n"
95 		"mov %0, r0\n"
96 		"ldmfd r13!, {r4-r12, lr}\n"
97 		: "=&r" (result)
98 		: "r" (cmd), "r" (arg1)
99 		: "cc", "r0", "r1", "memory");
100 
101 	return  result;
102 }
103 
104 void board_fit_image_post_process(void **p_image, size_t *p_size)
105 {
106 	int result = 0;
107 	void *image = *p_image;
108 
109 	if (strncmp(image + KS2_HS_SEC_TAG_OFFSET, "KEYS", 4)) {
110 		printf("No signature found in image!\n");
111 		hang();
112 	}
113 
114 	result = k2_hs_bm_auth(KS2_AUTH_CMD, image);
115 	if (result == 0) {
116 		printf("Authentication failed!\n");
117 		hang();
118 	}
119 
120 	/*
121 	 * Overwrite the image headers after authentication
122 	 * and decryption. Update size to reflect removal
123 	 * of header.
124 	 */
125 	*p_size -= KS2_HS_SEC_HEADER_LEN;
126 	memcpy(image, image + KS2_HS_SEC_HEADER_LEN, *p_size);
127 
128 	/*
129 	 * Output notification of successful authentication to re-assure the
130 	 * user that the secure code is being processed as expected. However
131 	 * suppress any such log output in case of building for SPL and booting
132 	 * via YMODEM. This is done to avoid disturbing the YMODEM serial
133 	 * protocol transactions.
134 	 */
135 	if (!(IS_ENABLED(CONFIG_SPL_BUILD) &&
136 	      IS_ENABLED(CONFIG_SPL_YMODEM_SUPPORT) &&
137 	      spl_boot_device() == BOOT_DEVICE_UART))
138 		printf("Authentication passed\n");
139 }
140 #endif
141