cmds.c 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * (C) Copyright 2018 Xilinx, Inc.
  4. * Siva Durga Prasad Paladugu <siva.durga.paladugu@xilinx.com>
  5. */
  6. #include <common.h>
  7. #include <malloc.h>
  8. #include <asm/arch/sys_proto.h>
  9. #include <asm/io.h>
  10. static int zynqmp_verify_secure(u8 *key_ptr, u8 *src_ptr, u32 len)
  11. {
  12. int ret;
  13. u32 src_lo, src_hi;
  14. u32 key_lo = 0;
  15. u32 key_hi = 0;
  16. u32 ret_payload[PAYLOAD_ARG_CNT];
  17. u64 addr;
  18. if ((ulong)src_ptr != ALIGN((ulong)src_ptr,
  19. CONFIG_SYS_CACHELINE_SIZE)) {
  20. printf("Failed: source address not aligned:%p\n", src_ptr);
  21. return -EINVAL;
  22. }
  23. src_lo = lower_32_bits((ulong)src_ptr);
  24. src_hi = upper_32_bits((ulong)src_ptr);
  25. flush_dcache_range((ulong)src_ptr, (ulong)(src_ptr + len));
  26. if (key_ptr) {
  27. key_lo = lower_32_bits((ulong)key_ptr);
  28. key_hi = upper_32_bits((ulong)key_ptr);
  29. flush_dcache_range((ulong)key_ptr,
  30. (ulong)(key_ptr + KEY_PTR_LEN));
  31. }
  32. ret = invoke_smc(ZYNQMP_SIP_SVC_PM_SECURE_IMG_LOAD, src_lo, src_hi,
  33. key_lo, key_hi, ret_payload);
  34. if (ret) {
  35. printf("Failed: secure op status:0x%x\n", ret);
  36. } else {
  37. addr = (u64)ret_payload[1] << 32 | ret_payload[2];
  38. printf("Verified image at 0x%llx\n", addr);
  39. env_set_hex("zynqmp_verified_img_addr", addr);
  40. }
  41. return ret;
  42. }
  43. /**
  44. * do_zynqmp - Handle the "zynqmp" command-line command
  45. * @cmdtp: Command data struct pointer
  46. * @flag: Command flag
  47. * @argc: Command-line argument count
  48. * @argv: Array of command-line arguments
  49. *
  50. * Processes the zynqmp specific commands
  51. *
  52. * Return: return 0 on success and CMD_RET_USAGE incase of misuse and error
  53. */
  54. static int do_zynqmp(cmd_tbl_t *cmdtp, int flag, int argc,
  55. char *const argv[])
  56. {
  57. u64 src_addr;
  58. u32 len;
  59. u8 *key_ptr = NULL;
  60. u8 *src_ptr;
  61. int ret;
  62. if (argc > 5 || argc < 4 || strncmp(argv[1], "secure", 6))
  63. return CMD_RET_USAGE;
  64. src_addr = simple_strtoull(argv[2], NULL, 16);
  65. len = simple_strtoul(argv[3], NULL, 16);
  66. if (argc > 4)
  67. key_ptr = (uint8_t *)(uintptr_t)simple_strtoull(argv[4],
  68. NULL, 16);
  69. src_ptr = (uint8_t *)(uintptr_t)src_addr;
  70. ret = zynqmp_verify_secure(key_ptr, src_ptr, len);
  71. if (ret)
  72. return CMD_RET_FAILURE;
  73. return CMD_RET_SUCCESS;
  74. }
  75. /***************************************************/
  76. #ifdef CONFIG_SYS_LONGHELP
  77. static char zynqmp_help_text[] =
  78. "secure src len [key_addr] - verifies secure images of $len bytes\n"
  79. " long at address $src. Optional key_addr\n"
  80. " can be specified if user key needs to\n"
  81. " be used for decryption\n";
  82. #endif
  83. U_BOOT_CMD(
  84. zynqmp, 5, 1, do_zynqmp,
  85. "Verify and load secure images",
  86. zynqmp_help_text
  87. )