blob: 901a94e83e2e94316a3ba5354e2661431dd7bcc1 [file] [log] [blame]
Tamas Banf70ef8c2017-12-19 15:35:09 +00001/*
2 * Copyright (c) 2012-2014 Wind River Systems, Inc.
Sherry Zhang8faae452023-02-13 14:53:51 +08003 * Copyright (c) 2017-2023 Arm Limited.
Tamas Banf70ef8c2017-12-19 15:35:09 +00004 *
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 */
17
Balint Matyi2fe04922020-02-18 12:27:38 +000018#include "mcuboot_config/mcuboot_config.h"
Tamas Banf70ef8c2017-12-19 15:35:09 +000019#include <assert.h>
Tamas Banf70ef8c2017-12-19 15:35:09 +000020#include "target.h"
Kevin Pengbc5e5aa2019-10-16 10:55:17 +080021#include "tfm_hal_device_header.h"
Tamas Banbd3f7512018-01-26 15:45:03 +000022#include "mbedtls/memory_buffer_alloc.h"
David Vincze7d591a62020-09-23 18:25:56 +020023#include "bootutil/security_cnt.h"
Tamas Banf70ef8c2017-12-19 15:35:09 +000024#include "bootutil/bootutil_log.h"
25#include "bootutil/image.h"
26#include "bootutil/bootutil.h"
Raef Coles8efad882020-07-10 09:46:00 +010027#include "bootutil/boot_record.h"
Tamas Ban1bfc9da2020-07-09 13:55:38 +010028#include "bootutil/fault_injection_hardening.h"
David Vincze7d591a62020-09-23 18:25:56 +020029#include "flash_map_backend/flash_map_backend.h"
David Vincze225c58f2019-12-09 17:32:48 +010030#include "boot_hal.h"
David Vincze73dfbc52019-10-11 13:54:58 +020031#include "uart_stdout.h"
Raef Colesaefbe082021-06-18 08:53:43 +010032#include "tfm_plat_otp.h"
33#include "tfm_plat_provisioning.h"
Raef Colesf77cc172022-01-07 11:05:47 +000034#ifdef TEST_BL2
35#include "mcuboot_suites.h"
36#endif /* TEST_BL2 */
Tamas Banf70ef8c2017-12-19 15:35:09 +000037
Tamas Ban581034a2017-12-19 19:54:37 +000038/* Avoids the semihosting issue */
39#if defined (__ARMCC_VERSION) && (__ARMCC_VERSION >= 6010050)
40__asm(" .global __ARM_use_no_argv\n");
41#endif
42
Balint Matyi5c476312020-03-31 13:15:39 +010043#ifdef MCUBOOT_ENCRYPT_RSA
Sherry Zhangc7baf592021-07-15 14:54:17 +080044#define BL2_MBEDTLS_MEM_BUF_LEN 0x3000
Balint Matyi5c476312020-03-31 13:15:39 +010045#else
Tamas Banbd3f7512018-01-26 15:45:03 +000046#define BL2_MBEDTLS_MEM_BUF_LEN 0x2000
Balint Matyi5c476312020-03-31 13:15:39 +010047#endif
48
Tamas Banbd3f7512018-01-26 15:45:03 +000049/* Static buffer to be used by mbedtls for memory allocation */
50static uint8_t mbedtls_mem_buf[BL2_MBEDTLS_MEM_BUF_LEN];
Raef Coles7763a472022-11-10 17:11:40 +000051struct boot_rsp rsp;
Tamas Banf70ef8c2017-12-19 15:35:09 +000052
Tamas Banf70ef8c2017-12-19 15:35:09 +000053static void do_boot(struct boot_rsp *rsp)
54{
Michel Jaouen3ecd6222020-06-17 18:58:00 +020055 struct boot_arm_vector_table *vt;
Tamas Banf70ef8c2017-12-19 15:35:09 +000056 uintptr_t flash_base;
57 int rc;
58
59 /* The beginning of the image is the ARM vector table, containing
60 * the initial stack pointer address and the reset vector
61 * consecutively. Manually set the stack pointer and jump into the
62 * reset vector
63 */
64 rc = flash_device_base(rsp->br_flash_dev_id, &flash_base);
65 assert(rc == 0);
66
Oliver Swedef9982442018-08-24 18:37:44 +010067 if (rsp->br_hdr->ih_flags & IMAGE_F_RAM_LOAD) {
68 /* The image has been copied to SRAM, find the vector table
69 * at the load address instead of image's address in flash
70 */
Michel Jaouen3ecd6222020-06-17 18:58:00 +020071 vt = (struct boot_arm_vector_table *)(rsp->br_hdr->ih_load_addr +
Oliver Swedef9982442018-08-24 18:37:44 +010072 rsp->br_hdr->ih_hdr_size);
73 } else {
74 /* Using the flash address as not executing in SRAM */
Michel Jaouen3ecd6222020-06-17 18:58:00 +020075 vt = (struct boot_arm_vector_table *)(flash_base +
Oliver Swedef9982442018-08-24 18:37:44 +010076 rsp->br_image_off +
77 rsp->br_hdr->ih_hdr_size);
78 }
David Vinczeb57989f2018-09-24 10:59:04 +020079
Raef Colesf77cc172022-01-07 11:05:47 +000080#if MCUBOOT_LOG_LEVEL > MCUBOOT_LOG_LEVEL_OFF || TEST_BL2
David Vincze8da7f102018-09-24 10:53:46 +020081 stdio_uninit();
David Vincze73dfbc52019-10-11 13:54:58 +020082#endif
David Vincze7d591a62020-09-23 18:25:56 +020083
Michel Jaouen3ecd6222020-06-17 18:58:00 +020084 /* This function never returns, because it calls the secure application
David Vincze7d591a62020-09-23 18:25:56 +020085 * Reset_Handler().
David Vinczee0a3c2f2019-05-15 16:45:14 +020086 */
Michel Jaouen3ecd6222020-06-17 18:58:00 +020087 boot_platform_quit(vt);
Tamas Banf70ef8c2017-12-19 15:35:09 +000088}
Tamas Banf70ef8c2017-12-19 15:35:09 +000089
Tamas Ban581034a2017-12-19 19:54:37 +000090int main(void)
Tamas Banf70ef8c2017-12-19 15:35:09 +000091{
Sherry Zhang8faae452023-02-13 14:53:51 +080092 fih_ret fih_rc = FIH_FAILURE;
Raef Colesaefbe082021-06-18 08:53:43 +010093 enum tfm_plat_err_t plat_err;
Raef Coles55410492022-02-01 12:34:37 +000094 int32_t image_id;
Tamas Banf70ef8c2017-12-19 15:35:09 +000095
David Vincze7d591a62020-09-23 18:25:56 +020096 /* Initialise the mbedtls static memory allocator so that mbedtls allocates
97 * memory from the provided static buffer instead of from the heap.
98 */
99 mbedtls_memory_buffer_alloc_init(mbedtls_mem_buf, BL2_MBEDTLS_MEM_BUF_LEN);
100
Raef Colesf77cc172022-01-07 11:05:47 +0000101#if MCUBOOT_LOG_LEVEL > MCUBOOT_LOG_LEVEL_OFF || TEST_BL2
David Vincze7d591a62020-09-23 18:25:56 +0200102 stdio_init();
David Hu5cc9a3f2019-06-14 13:10:40 +0800103#endif
David Vinczee0a3c2f2019-05-15 16:45:14 +0200104
Andrei Narkevitchb0be4612020-01-27 17:26:19 -0800105 /* Perform platform specific initialization */
106 if (boot_platform_init() != 0) {
Tamas Ban37aedb52020-10-01 10:54:48 +0100107 BOOT_LOG_ERR("Platform init failed");
Tamas Ban1bfc9da2020-07-09 13:55:38 +0100108 FIH_PANIC;
Andrei Narkevitchb0be4612020-01-27 17:26:19 -0800109 }
110
Tamas Banf70ef8c2017-12-19 15:35:09 +0000111 BOOT_LOG_INF("Starting bootloader");
112
Raef Colesaefbe082021-06-18 08:53:43 +0100113 plat_err = tfm_plat_otp_init();
114 if (plat_err != TFM_PLAT_ERR_SUCCESS) {
115 BOOT_LOG_ERR("OTP system initialization failed");
116 FIH_PANIC;
117 }
118
119 if (tfm_plat_provisioning_is_required()) {
120 plat_err = tfm_plat_provisioning_perform();
121 if (plat_err != TFM_PLAT_ERR_SUCCESS) {
122 BOOT_LOG_ERR("Provisioning failed");
123 FIH_PANIC;
124 }
125 } else {
126 tfm_plat_provisioning_check_for_dummy_keys();
127 }
128
Tamas Ban1bfc9da2020-07-09 13:55:38 +0100129 FIH_CALL(boot_nv_security_counter_init, fih_rc);
Sherry Zhang8faae452023-02-13 14:53:51 +0800130 if (FIH_NOT_EQ(fih_rc, FIH_SUCCESS)) {
David Vincze060968d2019-05-23 01:13:14 +0200131 BOOT_LOG_ERR("Error while initializing the security counter");
Tamas Ban1bfc9da2020-07-09 13:55:38 +0100132 FIH_PANIC;
David Vincze060968d2019-05-23 01:13:14 +0200133 }
134
Raef Coles630d0b82021-04-26 11:08:43 +0100135 /* Perform platform specific post-initialization */
136 if (boot_platform_post_init() != 0) {
137 BOOT_LOG_ERR("Platform post init failed");
138 FIH_PANIC;
139 }
140
Raef Colesf77cc172022-01-07 11:05:47 +0000141#ifdef TEST_BL2
Raef Coles38675932022-01-18 12:56:40 +0000142 (void)run_mcuboot_testsuite();
Raef Colesf77cc172022-01-07 11:05:47 +0000143#endif /* TEST_BL2 */
144
Raef Coles55410492022-02-01 12:34:37 +0000145 /* Images are loaded in reverse order so that the last image loaded is the
146 * TF-M image, which means the response is filled correctly.
147 */
148 for (image_id = MCUBOOT_IMAGE_NUMBER - 1; image_id >= 0; image_id--) {
149 if (boot_platform_pre_load(image_id)) {
150 BOOT_LOG_ERR("Pre-load step for image %d failed", image_id);
151 FIH_PANIC;
152 }
153
Sherry Zhang8faae452023-02-13 14:53:51 +0800154 /* Primary goal to zeroize the 'rsp' is to avoid to accidentally load
155 * the NS image in case of a fault injection attack. However, it is
156 * done anyway as a good practice to sanitize memory.
157 */
158 memset(&rsp, 0, sizeof(struct boot_rsp));
Raef Coles55410492022-02-01 12:34:37 +0000159 FIH_CALL(boot_go_for_image_id, fih_rc, &rsp, image_id);
Sherry Zhang8faae452023-02-13 14:53:51 +0800160 if (FIH_NOT_EQ(fih_rc, FIH_SUCCESS)) {
Raef Coles55410492022-02-01 12:34:37 +0000161 BOOT_LOG_ERR("Unable to find bootable image");
162 FIH_PANIC;
163 }
164
165 if (boot_platform_post_load(image_id)) {
166 BOOT_LOG_ERR("Post-load step for image %d failed", image_id);
167 FIH_PANIC;
168 }
Tamas Banf70ef8c2017-12-19 15:35:09 +0000169 }
170
171 BOOT_LOG_INF("Bootloader chainload address offset: 0x%x",
172 rsp.br_image_off);
Tamas Banf70ef8c2017-12-19 15:35:09 +0000173 BOOT_LOG_INF("Jumping to the first image slot");
174 do_boot(&rsp);
175
176 BOOT_LOG_ERR("Never should get here");
Tamas Ban1bfc9da2020-07-09 13:55:38 +0100177 FIH_PANIC;
Tamas Banf70ef8c2017-12-19 15:35:09 +0000178}