/* * Copyright (c) 2019-2023, ARM Limited. All rights reserved. * * SPDX-License-Identifier: BSD-3-Clause */ #include #include #include #include #include #include #include #include #include #include #include #if PSA_FWU_SUPPORT /* metadata entry details */ static io_block_spec_t fwu_metadata_spec; #endif /* PSA_FWU_SUPPORT */ io_block_spec_t fip_block_spec = { /* * This is fixed FIP address used by BL1, BL2 loads partition table * to get FIP address. */ #if ARM_GPT_SUPPORT .offset = PLAT_ARM_FLASH_IMAGE_BASE + PLAT_ARM_FIP_OFFSET_IN_GPT, #else .offset = PLAT_ARM_FLASH_IMAGE_BASE, #endif /* ARM_GPT_SUPPORT */ .length = PLAT_ARM_FLASH_IMAGE_MAX_SIZE }; #if ARM_GPT_SUPPORT static const io_block_spec_t gpt_spec = { .offset = PLAT_ARM_FLASH_IMAGE_BASE, /* * PLAT_PARTITION_BLOCK_SIZE = 512 * PLAT_PARTITION_MAX_ENTRIES = 128 * each sector has 4 partition entries, and there are * 2 reserved sectors i.e. protective MBR and primary * GPT header hence length gets calculated as, * length = PLAT_PARTITION_BLOCK_SIZE * (128/4 + 2) */ .length = LBA(PLAT_PARTITION_MAX_ENTRIES / 4 + 2), }; /* * length will be assigned at runtime based on MBR header data. * Backup GPT Header is present in Last LBA-1 and its entries * are last 32 blocks starts at LBA-33, On runtime update these * before device usage. Update offset to beginning LBA-33 and * length to LBA-33. */ static io_block_spec_t bkup_gpt_spec = { .offset = PLAT_ARM_FLASH_IMAGE_BASE, .length = 0, }; #endif /* ARM_GPT_SUPPORT */ const io_uuid_spec_t arm_uuid_spec[MAX_NUMBER_IDS] = { [BL2_IMAGE_ID] = {UUID_TRUSTED_BOOT_FIRMWARE_BL2}, [TB_FW_CONFIG_ID] = {UUID_TB_FW_CONFIG}, [FW_CONFIG_ID] = {UUID_FW_CONFIG}, #if !ARM_IO_IN_DTB [SCP_BL2_IMAGE_ID] = {UUID_SCP_FIRMWARE_SCP_BL2}, [BL31_IMAGE_ID] = {UUID_EL3_RUNTIME_FIRMWARE_BL31}, [BL32_IMAGE_ID] = {UUID_SECURE_PAYLOAD_BL32}, [BL32_EXTRA1_IMAGE_ID] = {UUID_SECURE_PAYLOAD_BL32_EXTRA1}, [BL32_EXTRA2_IMAGE_ID] = {UUID_SECURE_PAYLOAD_BL32_EXTRA2}, [BL33_IMAGE_ID] = {UUID_NON_TRUSTED_FIRMWARE_BL33}, [HW_CONFIG_ID] = {UUID_HW_CONFIG}, [SOC_FW_CONFIG_ID] = {UUID_SOC_FW_CONFIG}, [TOS_FW_CONFIG_ID] = {UUID_TOS_FW_CONFIG}, [NT_FW_CONFIG_ID] = {UUID_NT_FW_CONFIG}, [RMM_IMAGE_ID] = {UUID_REALM_MONITOR_MGMT_FIRMWARE}, #if ETHOSN_NPU_TZMP1 [ETHOSN_NPU_FW_IMAGE_ID] = {UUID_ETHOSN_FW}, #endif /* ETHOSN_NPU_TZMP1 */ #endif /* ARM_IO_IN_DTB */ #if TRUSTED_BOARD_BOOT [TRUSTED_BOOT_FW_CERT_ID] = {UUID_TRUSTED_BOOT_FW_CERT}, #if !ARM_IO_IN_DTB [CCA_CONTENT_CERT_ID] = {UUID_CCA_CONTENT_CERT}, [CORE_SWD_KEY_CERT_ID] = {UUID_CORE_SWD_KEY_CERT}, [PLAT_KEY_CERT_ID] = {UUID_PLAT_KEY_CERT}, [TRUSTED_KEY_CERT_ID] = {UUID_TRUSTED_KEY_CERT}, [SCP_FW_KEY_CERT_ID] = {UUID_SCP_FW_KEY_CERT}, [SOC_FW_KEY_CERT_ID] = {UUID_SOC_FW_KEY_CERT}, [TRUSTED_OS_FW_KEY_CERT_ID] = {UUID_TRUSTED_OS_FW_KEY_CERT}, [NON_TRUSTED_FW_KEY_CERT_ID] = {UUID_NON_TRUSTED_FW_KEY_CERT}, [SCP_FW_CONTENT_CERT_ID] = {UUID_SCP_FW_CONTENT_CERT}, [SOC_FW_CONTENT_CERT_ID] = {UUID_SOC_FW_CONTENT_CERT}, [TRUSTED_OS_FW_CONTENT_CERT_ID] = {UUID_TRUSTED_OS_FW_CONTENT_CERT}, [NON_TRUSTED_FW_CONTENT_CERT_ID] = {UUID_NON_TRUSTED_FW_CONTENT_CERT}, #if defined(SPD_spmd) [SIP_SP_CONTENT_CERT_ID] = {UUID_SIP_SECURE_PARTITION_CONTENT_CERT}, [PLAT_SP_CONTENT_CERT_ID] = {UUID_PLAT_SECURE_PARTITION_CONTENT_CERT}, #endif #if ETHOSN_NPU_TZMP1 [ETHOSN_NPU_FW_KEY_CERT_ID] = {UUID_ETHOSN_FW_KEY_CERTIFICATE}, [ETHOSN_NPU_FW_CONTENT_CERT_ID] = {UUID_ETHOSN_FW_CONTENT_CERTIFICATE}, #endif /* ETHOSN_NPU_TZMP1 */ #endif /* ARM_IO_IN_DTB */ #endif /* TRUSTED_BOARD_BOOT */ }; /* By default, ARM platforms load images from the FIP */ struct plat_io_policy policies[MAX_NUMBER_IDS] = { #if ARM_GPT_SUPPORT [GPT_IMAGE_ID] = { &memmap_dev_handle, (uintptr_t)&gpt_spec, open_memmap }, [BKUP_GPT_IMAGE_ID] = { &memmap_dev_handle, (uintptr_t)&bkup_gpt_spec, open_memmap }, #endif /* ARM_GPT_SUPPORT */ #if PSA_FWU_SUPPORT [FWU_METADATA_IMAGE_ID] = { &memmap_dev_handle, /* filled runtime from partition information */ (uintptr_t)&fwu_metadata_spec, open_memmap }, [BKUP_FWU_METADATA_IMAGE_ID] = { &memmap_dev_handle, /* filled runtime from partition information */ (uintptr_t)&fwu_metadata_spec, open_memmap }, #endif /* PSA_FWU_SUPPORT */ [FIP_IMAGE_ID] = { &memmap_dev_handle, (uintptr_t)&fip_block_spec, open_memmap }, [BL2_IMAGE_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[BL2_IMAGE_ID], open_fip }, [TB_FW_CONFIG_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[TB_FW_CONFIG_ID], open_fip }, [FW_CONFIG_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[FW_CONFIG_ID], open_fip }, #if !ARM_IO_IN_DTB [SCP_BL2_IMAGE_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[SCP_BL2_IMAGE_ID], open_fip }, [BL31_IMAGE_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[BL31_IMAGE_ID], open_fip }, [BL32_IMAGE_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[BL32_IMAGE_ID], open_fip }, [BL32_EXTRA1_IMAGE_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[BL32_EXTRA1_IMAGE_ID], open_fip }, [BL32_EXTRA2_IMAGE_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[BL32_EXTRA2_IMAGE_ID], open_fip }, [BL33_IMAGE_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[BL33_IMAGE_ID], open_fip }, [RMM_IMAGE_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[RMM_IMAGE_ID], open_fip }, [HW_CONFIG_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[HW_CONFIG_ID], open_fip }, [SOC_FW_CONFIG_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[SOC_FW_CONFIG_ID], open_fip }, [TOS_FW_CONFIG_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[TOS_FW_CONFIG_ID], open_fip }, [NT_FW_CONFIG_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[NT_FW_CONFIG_ID], open_fip }, #if ETHOSN_NPU_TZMP1 [ETHOSN_NPU_FW_IMAGE_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[ETHOSN_NPU_FW_IMAGE_ID], open_fip }, #endif /* ETHOSN_NPU_TZMP1 */ #endif /* ARM_IO_IN_DTB */ #if TRUSTED_BOARD_BOOT [TRUSTED_BOOT_FW_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[TRUSTED_BOOT_FW_CERT_ID], open_fip }, #if !ARM_IO_IN_DTB [CCA_CONTENT_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[CCA_CONTENT_CERT_ID], open_fip }, [CORE_SWD_KEY_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[CORE_SWD_KEY_CERT_ID], open_fip }, [PLAT_KEY_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[PLAT_KEY_CERT_ID], open_fip }, [TRUSTED_KEY_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[TRUSTED_KEY_CERT_ID], open_fip }, [SCP_FW_KEY_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[SCP_FW_KEY_CERT_ID], open_fip }, [SOC_FW_KEY_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[SOC_FW_KEY_CERT_ID], open_fip }, [TRUSTED_OS_FW_KEY_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[TRUSTED_OS_FW_KEY_CERT_ID], open_fip }, [NON_TRUSTED_FW_KEY_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[NON_TRUSTED_FW_KEY_CERT_ID], open_fip }, [SCP_FW_CONTENT_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[SCP_FW_CONTENT_CERT_ID], open_fip }, [SOC_FW_CONTENT_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[SOC_FW_CONTENT_CERT_ID], open_fip }, [TRUSTED_OS_FW_CONTENT_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[TRUSTED_OS_FW_CONTENT_CERT_ID], open_fip }, [NON_TRUSTED_FW_CONTENT_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[NON_TRUSTED_FW_CONTENT_CERT_ID], open_fip }, #if defined(SPD_spmd) [SIP_SP_CONTENT_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[SIP_SP_CONTENT_CERT_ID], open_fip }, [PLAT_SP_CONTENT_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[PLAT_SP_CONTENT_CERT_ID], open_fip }, #endif #if ETHOSN_NPU_TZMP1 [ETHOSN_NPU_FW_KEY_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[ETHOSN_NPU_FW_KEY_CERT_ID], open_fip }, [ETHOSN_NPU_FW_CONTENT_CERT_ID] = { &fip_dev_handle, (uintptr_t)&arm_uuid_spec[ETHOSN_NPU_FW_CONTENT_CERT_ID], open_fip }, #endif /* ETHOSN_NPU_TZMP1 */ #endif /* ARM_IO_IN_DTB */ #endif /* TRUSTED_BOARD_BOOT */ }; #ifdef IMAGE_BL2 #define FCONF_ARM_IO_UUID_NUM_BASE U(10) #if ETHOSN_NPU_TZMP1 #define FCONF_ARM_IO_UUID_NUM_NPU U(1) #else #define FCONF_ARM_IO_UUID_NUM_NPU U(0) #endif /* ETHOSN_NPU_TZMP1 */ #if TRUSTED_BOARD_BOOT #define FCONF_ARM_IO_UUID_NUM_TBB U(12) #else #define FCONF_ARM_IO_UUID_NUM_TBB U(0) #endif /* TRUSTED_BOARD_BOOT */ #if TRUSTED_BOARD_BOOT && defined(SPD_spmd) #define FCONF_ARM_IO_UUID_NUM_SPD U(2) #else #define FCONF_ARM_IO_UUID_NUM_SPD U(0) #endif /* TRUSTED_BOARD_BOOT && defined(SPD_spmd) */ #if TRUSTED_BOARD_BOOT && ETHOSN_NPU_TZMP1 #define FCONF_ARM_IO_UUID_NUM_NPU_TBB U(2) #else #define FCONF_ARM_IO_UUID_NUM_NPU_TBB U(0) #endif /* TRUSTED_BOARD_BOOT && ETHOSN_NPU_TZMP1 */ #define FCONF_ARM_IO_UUID_NUMBER FCONF_ARM_IO_UUID_NUM_BASE + \ FCONF_ARM_IO_UUID_NUM_NPU + \ FCONF_ARM_IO_UUID_NUM_TBB + \ FCONF_ARM_IO_UUID_NUM_SPD + \ FCONF_ARM_IO_UUID_NUM_NPU_TBB static io_uuid_spec_t fconf_arm_uuids[FCONF_ARM_IO_UUID_NUMBER]; static OBJECT_POOL_ARRAY(fconf_arm_uuids_pool, fconf_arm_uuids); struct policies_load_info { unsigned int image_id; const char *name; }; /* image id to property name table */ static const struct policies_load_info load_info[FCONF_ARM_IO_UUID_NUMBER] = { {SCP_BL2_IMAGE_ID, "scp_bl2_uuid"}, {BL31_IMAGE_ID, "bl31_uuid"}, {BL32_IMAGE_ID, "bl32_uuid"}, {BL32_EXTRA1_IMAGE_ID, "bl32_extra1_uuid"}, {BL32_EXTRA2_IMAGE_ID, "bl32_extra2_uuid"}, {BL33_IMAGE_ID, "bl33_uuid"}, {HW_CONFIG_ID, "hw_cfg_uuid"}, {SOC_FW_CONFIG_ID, "soc_fw_cfg_uuid"}, {TOS_FW_CONFIG_ID, "tos_fw_cfg_uuid"}, {NT_FW_CONFIG_ID, "nt_fw_cfg_uuid"}, #if ETHOSN_NPU_TZMP1 {ETHOSN_NPU_FW_IMAGE_ID, "ethosn_npu_fw_uuid"}, #endif /* ETHOSN_NPU_TZMP1 */ #if TRUSTED_BOARD_BOOT {CCA_CONTENT_CERT_ID, "cca_cert_uuid"}, {CORE_SWD_KEY_CERT_ID, "core_swd_cert_uuid"}, {PLAT_KEY_CERT_ID, "plat_cert_uuid"}, {TRUSTED_KEY_CERT_ID, "t_key_cert_uuid"}, {SCP_FW_KEY_CERT_ID, "scp_fw_key_uuid"}, {SOC_FW_KEY_CERT_ID, "soc_fw_key_uuid"}, {TRUSTED_OS_FW_KEY_CERT_ID, "tos_fw_key_cert_uuid"}, {NON_TRUSTED_FW_KEY_CERT_ID, "nt_fw_key_cert_uuid"}, {SCP_FW_CONTENT_CERT_ID, "scp_fw_content_cert_uuid"}, {SOC_FW_CONTENT_CERT_ID, "soc_fw_content_cert_uuid"}, {TRUSTED_OS_FW_CONTENT_CERT_ID, "tos_fw_content_cert_uuid"}, {NON_TRUSTED_FW_CONTENT_CERT_ID, "nt_fw_content_cert_uuid"}, #if defined(SPD_spmd) {SIP_SP_CONTENT_CERT_ID, "sip_sp_content_cert_uuid"}, {PLAT_SP_CONTENT_CERT_ID, "plat_sp_content_cert_uuid"}, #endif #if ETHOSN_NPU_TZMP1 {ETHOSN_NPU_FW_KEY_CERT_ID, "ethosn_npu_fw_key_cert_uuid"}, {ETHOSN_NPU_FW_CONTENT_CERT_ID, "ethosn_npu_fw_content_cert_uuid"}, #endif /* ETHOSN_NPU_TZMP1 */ #endif /* TRUSTED_BOARD_BOOT */ }; int fconf_populate_arm_io_policies(uintptr_t config) { int err, node; unsigned int i; union uuid_helper_t uuid_helper; io_uuid_spec_t *uuid_ptr; /* As libfdt uses void *, we can't avoid this cast */ const void *dtb = (void *)config; /* Assert the node offset point to "arm,io-fip-handle" compatible property */ const char *compatible_str = "arm,io-fip-handle"; node = fdt_node_offset_by_compatible(dtb, -1, compatible_str); if (node < 0) { ERROR("FCONF: Can't find %s compatible in dtb\n", compatible_str); return node; } /* Locate the uuid cells and read the value for all the load info uuid */ for (i = 0; i < FCONF_ARM_IO_UUID_NUMBER; i++) { uuid_ptr = pool_alloc(&fconf_arm_uuids_pool); err = fdtw_read_uuid(dtb, node, load_info[i].name, 16, (uint8_t *)&uuid_helper); if (err < 0) { WARN("FCONF: Read cell failed for %s\n", load_info[i].name); return err; } VERBOSE("FCONF: arm-io_policies.%s cell found with value = " "%02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x\n", load_info[i].name, uuid_helper.uuid_struct.time_low[0], uuid_helper.uuid_struct.time_low[1], uuid_helper.uuid_struct.time_low[2], uuid_helper.uuid_struct.time_low[3], uuid_helper.uuid_struct.time_mid[0], uuid_helper.uuid_struct.time_mid[1], uuid_helper.uuid_struct.time_hi_and_version[0], uuid_helper.uuid_struct.time_hi_and_version[1], uuid_helper.uuid_struct.clock_seq_hi_and_reserved, uuid_helper.uuid_struct.clock_seq_low, uuid_helper.uuid_struct.node[0], uuid_helper.uuid_struct.node[1], uuid_helper.uuid_struct.node[2], uuid_helper.uuid_struct.node[3], uuid_helper.uuid_struct.node[4], uuid_helper.uuid_struct.node[5]); uuid_ptr->uuid = uuid_helper.uuid_struct; policies[load_info[i].image_id].image_spec = (uintptr_t)uuid_ptr; policies[load_info[i].image_id].dev_handle = &fip_dev_handle; policies[load_info[i].image_id].check = open_fip; } return 0; } #if ARM_IO_IN_DTB FCONF_REGISTER_POPULATOR(TB_FW, arm_io, fconf_populate_arm_io_policies); #endif /* ARM_IO_IN_DTB */ #endif /* IMAGE_BL2 */