From patchwork Thu Jul 2 20:27:59 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ulises.Cardenas@freescale.com X-Patchwork-Id: 490804 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from theia.denx.de (theia.denx.de [85.214.87.163]) by ozlabs.org (Postfix) with ESMTP id DE07A140280 for ; Fri, 3 Jul 2015 06:47:38 +1000 (AEST) Received: from localhost (localhost [127.0.0.1]) by theia.denx.de (Postfix) with ESMTP id 2C9B64B72D; Thu, 2 Jul 2015 22:47:35 +0200 (CEST) Received: from theia.denx.de ([127.0.0.1]) by localhost (theia.denx.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3OcVd4zZh-yv; Thu, 2 Jul 2015 22:47:34 +0200 (CEST) Received: from theia.denx.de (localhost [127.0.0.1]) by theia.denx.de (Postfix) with ESMTP id 807C54B734; Thu, 2 Jul 2015 22:47:34 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by theia.denx.de (Postfix) with ESMTP id 222884B734 for ; Thu, 2 Jul 2015 22:47:29 +0200 (CEST) Received: from theia.denx.de ([127.0.0.1]) by localhost (theia.denx.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 013xTTINFG86 for ; Thu, 2 Jul 2015 22:47:29 +0200 (CEST) X-Greylist: delayed 897 seconds by postgrey-1.34 at theia; Thu, 02 Jul 2015 22:47:23 CEST X-policyd-weight: NOT_IN_SBL_XBL_SPAMHAUS=-1.5 NOT_IN_SPAMCOP=-1.5 NOT_IN_BL_NJABL=-1.5 (only DNSBL check requested) Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2on0110.outbound.protection.outlook.com [207.46.100.110]) by theia.denx.de (Postfix) with ESMTPS id 3C6004B72D for ; Thu, 2 Jul 2015 22:47:23 +0200 (CEST) Received: from BN3PR0301CA0058.namprd03.prod.outlook.com (10.160.152.154) by BY1PR0301MB1221.namprd03.prod.outlook.com (10.161.203.17) with Microsoft SMTP Server (TLS) id 15.1.201.16; Thu, 2 Jul 2015 20:32:22 +0000 Received: from BN1AFFO11FD024.protection.gbl (2a01:111:f400:7c10::127) by BN3PR0301CA0058.outlook.office365.com (2a01:111:e400:401e::26) with Microsoft SMTP Server (TLS) id 15.1.201.16 via Frontend Transport; Thu, 2 Jul 2015 20:32:22 +0000 Authentication-Results: spf=fail (sender IP is 192.88.158.2) smtp.mailfrom=freescale.com; freescale.mail.onmicrosoft.com; dkim=none (message not signed) header.d=none; Received-SPF: Fail (protection.outlook.com: domain of freescale.com does not designate 192.88.158.2 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.158.2; helo=az84smr01.freescale.net; Received: from az84smr01.freescale.net (192.88.158.2) by BN1AFFO11FD024.mail.protection.outlook.com (10.58.52.84) with Microsoft SMTP Server (TLS) id 15.1.201.10 via Frontend Transport; Thu, 2 Jul 2015 20:32:20 +0000 Received: from helix.am.freescale.net (helix.am.freescale.net [10.81.16.42]) by az84smr01.freescale.net (8.14.3/8.14.0) with ESMTP id t62KWIJO015896; Thu, 2 Jul 2015 13:32:18 -0700 From: To: Date: Thu, 2 Jul 2015 15:27:59 -0500 Message-ID: <1435868879-28152-1-git-send-email-Ulises.Cardenas@freescale.com> X-Mailer: git-send-email 2.3.2 X-EOPAttributedMessage: 0 X-Microsoft-Exchange-Diagnostics: 1; BN1AFFO11FD024; 1:miLk5FEqy0IAmXC4uF0Y+egrOnREUC9Ey+mZ6BBzvizoQzfz0XrHKVNoc7q9uBPO0KPjow7TDVU9ybxlXM7adyCpvsd/Do2M7g0AmpZ7WW9a2rmi4VHYdYi5CnNaomaByVA5BJjam5kssYgxd5K6xSIap7Xv/9SOZFPIAGEpQIoqwQsXllM5QVFUXoMuIgRvn94zBI0xpQlhoJDEpKS/Kue4HwdQAjBxfT3HU7nqY6qPEtD3OykfuEh5AV50tAis03cDYyJzdE3nRr15xnyp4dij7T8FbzlC7XByQ7i1C8yCnVOk8TJid/54nG/iBmO/1aU1eVu1Muos0+gx+VzYHw== X-Forefront-Antispam-Report: CIP:192.88.158.2; CTRY:US; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(10019020)(6009001)(2980300002)(339900001)(92566002)(36756003)(2351001)(5001960100002)(229853001)(106466001)(50226001)(189998001)(104016003)(47776003)(110136002)(48376002)(77096005)(107886002)(85426001)(2371004)(77156002)(62966003)(86152002)(86362001)(575784001)(19580405001)(87936001)(46102003)(50466002)(6806004)(50986999)(105606002)(19580395003)(4001450100001)(4001430100001); DIR:OUT; SFP:1102; SCL:1; SRVR:BY1PR0301MB1221; H:az84smr01.freescale.net; FPR:; SPF:Fail; MLV:sfv; LANG:en; MIME-Version: 1.0 X-Microsoft-Exchange-Diagnostics: 1; BY1PR0301MB1221; 2:EFlTddiB+SKkxsCMYBXjAvZll8Bgbot0YnNXWqtJZWWEwb5ZEVfsrQX83AAaEmty; 3:A7SUmKK4fdTlRcDyMwLBqAHLwSAWz/WvUv+/A1r2gqa+qYBnLCT2V190yTsDyx6jnEmCgp2lvIZycwjGNvkYGsJIjp7LoiOF0GwLSbvfzObx5VQpOIFSq/YDNpNxvRa2BvWlWNL5kG1TccibsMOZIFAeCLJwgwNYOGalcUHFKEZbRtDN8Dlica/QD3oW+uDKdVLX8hCMVwoeVNyg35WrxOVZ22lApIb8IRA6Lk/6r54=; 25:qoBMmwYFGnLz6J5fEp4DJY/gN11tqqt48ty1DgubrV2bKbTaSp5qKXlyvHfxY87e5ZYYj+xBW1bXEx9BnKQ4j3lMMCKrfCEOPW8bOLX6uxMqLFciRUm59Lit8Kf1W1h+o2K1rILlP/Fu+fMN0tsWruG7M1RGkEa0kLaw7sTWH1RDbv5+GQ2We5OUFvdqXMCFlzdJm1CpoxbtrRhWsIm1gF7wlUsLPtze6M+bVa9LovC0cKlq06cCKdVnlut48X/LS5nKNA44c9NDLhfiYpZIcQ==; 20:NtTaqmFYgN5kXap7/9rg3OtXGe5FEoeSeS68kK7vsT5QkjwnNgpXS/MsqT6Iw7IHGp3N3eY2DALd6aU2bfg5/0ELla3BV7H6Rdvj40jjeb8Yd+3JbqBWMqEkTsKPoUxmFo7kMPS7Rc5PvtZde09nZ8mZFGe9MUFPNVkgOHBP5QyIXNXEHDQUMoGGYsFblLUKP7W6vUWLFaO1zbXZxJHxptTGl3wwgdvv/B5py8dxLfuvjkDpv5Tm2uAUpLwHL50w+AGxkHCLk7/00ULxlIuMFT7bf+0naUm/B2GCoJywoSHn3vrXL4zn53a0HqWMVmdTE678HJGhfr/F0ApcRhi6Ttun943S0PXpDfNQbjiLNVE= X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BY1PR0301MB1221; X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(601004)(5005006)(3002001); SRVR:BY1PR0301MB1221; BCL:0; PCL:0; RULEID:; SRVR:BY1PR0301MB1221; X-Microsoft-Exchange-Diagnostics: 1; BY1PR0301MB1221; 4:SHS1pGcG0YIM/WMoPNzoSqrqn90FqirWBUfEhLljr1B3Zz5O8hPs5t7MS8OdXkoD9ZNO+V9gCXpU/ARPSILU/IXbjWro/P7XPXSLy42CWFQ9a8pCpvMtI2X5ysQ/CNtHUSP6O8KPmEd0LZC79r/N/vOxpDQP8tj9yXgs3P3x/fIYPKdGgtZwbWQ1jH5eaY6tnR4F5P+dAlQ7lc5buOiwVeXk5CS/MMEiFi0iCwpzdN2+f1Jw36jxRxGdeLFgkYVxcVJFEDClTu59guN1nPD+KN6aixvNLH96g0n/7j4IS7k= X-Forefront-PRVS: 06259BA5A2 X-Microsoft-Exchange-Diagnostics: 1; BY1PR0301MB1221; 23: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 X-Microsoft-Exchange-Diagnostics: 1; BY1PR0301MB1221; 5:4UmhhPutEkpZQ/1yYhk73K2xlZuCQ+AuDxvNLklKZd06OutTIQ4ON1vfDihFechrWE6BMF0fpx3rdbXPL+ugxk521XTGDU1N9zxnNKKKiE4DoNYOL70F3KAOO4mMTwpeKN+QY81ykZHgOPuYRSuqRQ==; 24:jCUkqgx/KynZAb+zewnCq3HTkPYfbJkp1aSjl61kMMqwdW93xNSugw3DhmmKwNhuFIG69zeJeupqQ5ovgRFBYCDgSq0wvuMlX6TPdSY/vew=; 20:1RE4vgETrMx1KLGNThMWhqMLE2StWVNh0/6r3y7ZZObvbGLlWlgwpS25GYzvO33yCeM2IXAFslG8EF6oaj2weA== X-OriginatorOrg: freescale.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Jul 2015 20:32:20.5571 (UTC) X-MS-Exchange-CrossTenant-Id: 710a03f5-10f6-4d38-9ff4-a80b81da590d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=710a03f5-10f6-4d38-9ff4-a80b81da590d; Ip=[192.88.158.2]; Helo=[az84smr01.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY1PR0301MB1221 Cc: u-boot@lists.denx.de, Ulises Cardenas Subject: [U-Boot] [PATCH] iMX: adding parsing to hab_status command X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.15 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" From: Ulises Cardenas hab_status command returns a memory dump of the hab event log. But the raw data is not human-readable. Parsing such data into readable event will help to minimize debbuging time. Signed-off-by: Ulises Cardenas --- arch/arm/cpu/armv7/mx6/hab.c | 228 +++++++++++++++++++++++++++++++++++- arch/arm/include/asm/arch-mx6/hab.h | 85 ++++++++++++-- 2 files changed, 300 insertions(+), 13 deletions(-) diff --git a/arch/arm/cpu/armv7/mx6/hab.c b/arch/arm/cpu/armv7/mx6/hab.c index 8dee595..c715545 100644 --- a/arch/arm/cpu/armv7/mx6/hab.c +++ b/arch/arm/cpu/armv7/mx6/hab.c @@ -1,5 +1,5 @@ /* - * Copyright (C) 2010-2014 Freescale Semiconductor, Inc. + * Copyright (C) 2010-2015 Freescale Semiconductor, Inc. * * SPDX-License-Identifier: GPL-2.0+ */ @@ -111,6 +111,220 @@ * +------------+ + CSF_PAD_SIZE */ +#define MAX_RECORD_BYTES (8*1024) /* 4 kbytes */ + +struct record { + uint8_t tag; /* Tag */ + uint8_t len[2]; /* Length */ + uint8_t par; /* Version */ + uint8_t contents[MAX_RECORD_BYTES];/* Record Data */ + bool any_rec_flag; +}; + +char *rsn_str[] = {"RSN = HAB_RSN_ANY (0x00)\n", + "RSN = HAB_ENG_FAIL (0x30)\n", + "RSN = HAB_INV_ADDRESS (0x22)\n", + "RSN = HAB_INV_ASSERTION (0x0C)\n", + "RSN = HAB_INV_CALL (0x28)\n", + "RSN = HAB_INV_CERTIFICATE (0x21)\n", + "RSN = HAB_INV_COMMAND (0x06)\n", + "RSN = HAB_INV_CSF (0x11)\n", + "RSN = HAB_INV_DCD (0x27)\n", + "RSN = HAB_INV_INDEX (0x0F)\n", + "RSN = HAB_INV_IVT (0x05)\n", + "RSN = HAB_INV_KEY (0x1D)\n", + "RSN = HAB_INV_RETURN (0x1E)\n", + "RSN = HAB_INV_SIGNATURE (0x18)\n", + "RSN = HAB_INV_SIZE (0x17)\n", + "RSN = HAB_MEM_FAIL (0x2E)\n", + "RSN = HAB_OVR_COUNT (0x2B)\n", + "RSN = HAB_OVR_STORAGE (0x2D)\n", + "RSN = HAB_UNS_ALGORITHM (0x12)\n", + "RSN = HAB_UNS_COMMAND (0x03)\n", + "RSN = HAB_UNS_ENGINE (0x0A)\n", + "RSN = HAB_UNS_ITEM (0x24)\n", + "RSN = HAB_UNS_KEY (0x1B)\n", + "RSN = HAB_UNS_PROTOCOL (0x14)\n", + "RSN = HAB_UNS_STATE (0x09)\n", + "RSN = INVALID\n"}; + +char *sts_str[] = {"STS = HAB_SUCCESS (0xF0)\n", + "STS = HAB_FAILURE (0x33)\n", + "STS = HAB_WARNING (0x69)\n", + "STS = INVALID\n"}; + +char *eng_str[] = {"ENG = HAB_ENG_ANY (0x00)\n", + "ENG = HAB_ENG_SCC (0x03)\n", + "ENG = HAB_ENG_RTIC (0x05)\n", + "ENG = HAB_ENG_SAHARA (0x06)\n", + "ENG = HAB_ENG_CSU (0x0A)\n", + "ENG = HAB_ENG_SRTC (0x0C)\n", + "ENG = HAB_ENG_DCP (0x1B)\n", + "ENG = HAB_ENG_CAAM (0x1D)\n", + "ENG = HAB_ENG_SNVS (0x1E)\n", + "ENG = HAB_ENG_OCOTP (0x21)\n", + "ENG = HAB_ENG_DTCP (0x22)\n", + "ENG = HAB_ENG_ROM (0x36)\n", + "ENG = HAB_ENG_HDCP (0x24)\n", + "ENG = HAB_ENG_RTL (0x77)\n", + "ENG = HAB_ENG_SW (0xFF)\n", + "ENG = INVALID\n"}; + +char *ctx_str[] = {"CTX = HAB_CTX_ANY(0x00)\n", + "CTX = HAB_CTX_FAB (0xFF)\n", + "CTX = HAB_CTX_ENTRY (0xE1)\n", + "CTX = HAB_CTX_TARGET (0x33)\n", + "CTX = HAB_CTX_AUTHENTICATE (0x0A)\n", + "CTX = HAB_CTX_DCD (0xDD)\n", + "CTX = HAB_CTX_CSF (0xCF)\n", + "CTX = HAB_CTX_COMMAND (0xC0)\n", + "CTX = HAB_CTX_AUT_DAT (0xDB)\n", + "CTX = HAB_CTX_ASSERT (0xA0)\n", + "CTX = HAB_CTX_EXIT (0xEE)\n", + "CTX = INVALID\n"}; + +static inline uint8_t get_rsn_idx(uint8_t rsn) +{ + uint8_t result; + if (rsn == HAB_RSN_ANY) + result = 0; + else if (rsn == HAB_ENG_FAIL) + result = 1; + else if (rsn == HAB_INV_ADDRESS) + result = 2; + else if (rsn == HAB_INV_ASSERTION) + result = 3; + else if (rsn == HAB_INV_CALL) + result = 4; + else if (rsn == HAB_INV_CERTIFICATE) + result = 5; + else if (rsn == HAB_INV_COMMAND) + result = 6; + else if (rsn == HAB_INV_CSF) + result = 7; + else if (rsn == HAB_INV_DCD) + result = 8; + else if (rsn == HAB_INV_INDEX) + result = 9; + else if (rsn == HAB_INV_IVT) + result = 10; + else if (rsn == HAB_INV_KEY) + result = 11; + else if (rsn == HAB_INV_RETURN) + result = 12; + else if (rsn == HAB_INV_SIGNATURE) + result = 13; + else if (rsn == HAB_INV_SIZE) + result = 14; + else if (rsn == HAB_MEM_FAIL) + result = 15; + else if (rsn == HAB_OVR_COUNT) + result = 16; + else if (rsn == HAB_OVR_STORAGE) + result = 17; + else if (rsn == HAB_UNS_ALGORITHM) + result = 18; + else if (rsn == HAB_UNS_COMMAND) + result = 19; + else if (rsn == HAB_UNS_ENGINE) + result = 20; + else if (rsn == HAB_UNS_ITEM) + result = 21; + else if (rsn == HAB_UNS_KEY) + result = 22; + else if (rsn == HAB_UNS_PROTOCOL) + result = 23; + else if (rsn == HAB_UNS_STATE) + result = 24; + else + result = 25; + + return result; +} + +static inline uint8_t get_sts_idx(uint8_t sts) +{ + uint8_t result; + if (sts == HAB_SUCCESS) + result = 0; + else if (sts == HAB_FAILURE) + result = 1; + else if (sts == HAB_WARNING) + result = 2; + else + result = 3; + + return result; +} + +static inline uint8_t get_eng_idx(uint8_t eng) +{ + uint8_t result; + if (eng == HAB_ENG_ANY) + result = 0; + else if (eng == HAB_ENG_SCC) + result = 1; + else if (eng == HAB_ENG_RTIC) + result = 2; + else if (eng == HAB_ENG_SAHARA) + result = 3; + else if (eng == HAB_ENG_CSU) + result = 4; + else if (eng == HAB_ENG_SRTC) + result = 5; + else if (eng == HAB_ENG_DCP) + result = 6; + else if (eng == HAB_ENG_CAAM) + result = 7; + else if (eng == HAB_ENG_SNVS) + result = 8; + else if (eng == HAB_ENG_OCOTP) + result = 9; + else if (eng == HAB_ENG_DTCP) + result = 10; + else if (eng == HAB_ENG_ROM) + result = 11; + else if (eng == HAB_ENG_HDCP) + result = 12; + else if (eng == HAB_ENG_RTL) + result = 13; + else if (eng == HAB_ENG_SW) + result = 14; + else + result = 9; + return result; +} + +static inline uint8_t get_ctx_idx(uint8_t ctx) +{ + uint8_t result; + if (ctx == HAB_CTX_ANY) + result = 0; + else if (ctx == HAB_CTX_FAB) + result = 1; + else if (ctx == HAB_CTX_ENTRY) + result = 2; + else if (ctx == HAB_CTX_TARGET) + result = 3; + else if (ctx == HAB_CTX_AUTHENTICATE) + result = 4; + else if (ctx == HAB_CTX_DCD) + result = 5; + else if (ctx == HAB_CTX_CSF) + result = 6; + else if (ctx == HAB_CTX_COMMAND) + result = 7; + else if (ctx == HAB_CTX_AUT_DAT) + result = 8; + else if (ctx == HAB_CTX_ASSERT) + result = 9; + else if (ctx == HAB_CTX_EXIT) + result = 10; + else + result = 11; + return result; +} + bool is_hab_enabled(void) { struct ocotp_regs *ocotp = (struct ocotp_regs *)OCOTP_BASE_ADDR; @@ -122,6 +336,16 @@ bool is_hab_enabled(void) return (reg & 0x2) == 0x2; } +void process_event_record(uint8_t *event_data, size_t bytes) +{ + struct record *rec = (struct record *)event_data; + + printf("\n\n%s", sts_str[get_sts_idx(rec->contents[0])]); + printf("%s", rsn_str[get_rsn_idx(rec->contents[1])]); + printf("%s", ctx_str[get_ctx_idx(rec->contents[2])]); + printf("%s", eng_str[get_eng_idx(rec->contents[3])]); +} + void display_event(uint8_t *event_data, size_t bytes) { uint32_t i; @@ -137,6 +361,8 @@ void display_event(uint8_t *event_data, size_t bytes) else printf(" 0x%02x", event_data[i]); } + + process_event_record(event_data, bytes); } int get_hab_status(void) diff --git a/arch/arm/include/asm/arch-mx6/hab.h b/arch/arm/include/asm/arch-mx6/hab.h index c9e5318..6b043a9 100644 --- a/arch/arm/include/asm/arch-mx6/hab.h +++ b/arch/arm/include/asm/arch-mx6/hab.h @@ -1,5 +1,5 @@ /* - * Copyright (C) 2012 Freescale Semiconductor, Inc. All Rights Reserved. + * Copyright (C) 2012-2015 Freescale Semiconductor, Inc. All Rights Reserved. * * SPDX-License-Identifier: GPL-2.0+ * @@ -23,24 +23,68 @@ enum hab_status { /* Security Configuration definitions */ enum hab_config { - HAB_CFG_RETURN = 0x33, /**< Field Return IC */ - HAB_CFG_OPEN = 0xf0, /**< Non-secure IC */ - HAB_CFG_CLOSED = 0xcc /**< Secure IC */ + HAB_CFG_RETURN = 0x33, /* < Field Return IC */ + HAB_CFG_OPEN = 0xf0, /* < Non-secure IC */ + HAB_CFG_CLOSED = 0xcc /* < Secure IC */ }; /* State definitions */ enum hab_state { - HAB_STATE_INITIAL = 0x33, /**< Initialising state (transitory) */ - HAB_STATE_CHECK = 0x55, /**< Check state (non-secure) */ - HAB_STATE_NONSECURE = 0x66, /**< Non-secure state */ - HAB_STATE_TRUSTED = 0x99, /**< Trusted state */ - HAB_STATE_SECURE = 0xaa, /**< Secure state */ - HAB_STATE_FAIL_SOFT = 0xcc, /**< Soft fail state */ - HAB_STATE_FAIL_HARD = 0xff, /**< Hard fail state (terminal) */ - HAB_STATE_NONE = 0xf0, /**< No security state machine */ + HAB_STATE_INITIAL = 0x33, /* Initialising state (transitory) */ + HAB_STATE_CHECK = 0x55, /* Check state (non-secure) */ + HAB_STATE_NONSECURE = 0x66, /* Non-secure state */ + HAB_STATE_TRUSTED = 0x99, /* Trusted state */ + HAB_STATE_SECURE = 0xaa, /* Secure state */ + HAB_STATE_FAIL_SOFT = 0xcc, /* Soft fail state */ + HAB_STATE_FAIL_HARD = 0xff, /* Hard fail state (terminal) */ + HAB_STATE_NONE = 0xf0, /* No security state machine */ HAB_STATE_MAX }; +enum hab_reason { + HAB_RSN_ANY = 0x00, /* Match any reason */ + HAB_ENG_FAIL = 0x30, /* Engine failure */ + HAB_INV_ADDRESS = 0x22, /* Invalid address: access denied */ + HAB_INV_ASSERTION = 0x0c, /* Invalid assertion */ + HAB_INV_CALL = 0x28, /* Function called out of sequence */ + HAB_INV_CERTIFICATE = 0x21, /* Invalid certificate */ + HAB_INV_COMMAND = 0x06, /* Invalid command: command malformed */ + HAB_INV_CSF = 0x11, /* Invalid csf */ + HAB_INV_DCD = 0x27, /* Invalid dcd */ + HAB_INV_INDEX = 0x0f, /* Invalid index: access denied */ + HAB_INV_IVT = 0x05, /* Invalid ivt */ + HAB_INV_KEY = 0x1d, /* Invalid key */ + HAB_INV_RETURN = 0x1e, /* Failed callback function */ + HAB_INV_SIGNATURE = 0x18, /* Invalid signature */ + HAB_INV_SIZE = 0x17, /* Invalid data size */ + HAB_MEM_FAIL = 0x2e, /* Memory failure */ + HAB_OVR_COUNT = 0x2b, /* Expired poll count */ + HAB_OVR_STORAGE = 0x2d, /* Exhausted storage region */ + HAB_UNS_ALGORITHM = 0x12, /* Unsupported algorithm */ + HAB_UNS_COMMAND = 0x03, /* Unsupported command */ + HAB_UNS_ENGINE = 0x0a, /* Unsupported engine */ + HAB_UNS_ITEM = 0x24, /* Unsupported configuration item */ + HAB_UNS_KEY = 0x1b, /* Unsupported key type/parameters */ + HAB_UNS_PROTOCOL = 0x14, /* Unsupported protocol */ + HAB_UNS_STATE = 0x09, /* Unsuitable state */ + HAB_RSN_MAX +} hab_reason_t; + +enum hab_context { + HAB_CTX_ANY = 0x00, /* Match any context */ + HAB_CTX_FAB = 0xff, /* Event logged in hab_fab_test() */ + HAB_CTX_ENTRY = 0xe1, /* Event logged in hab_rvt.entry() */ + HAB_CTX_TARGET = 0x33, /* Event logged in hab_rvt.check_target() */ + HAB_CTX_AUTHENTICATE = 0x0a,/* Logged in hab_rvt.authenticate_image() */ + HAB_CTX_DCD = 0xdd, /* Event logged in hab_rvt.run_dcd() */ + HAB_CTX_CSF = 0xcf, /* Event logged in hab_rvt.run_csf() */ + HAB_CTX_COMMAND = 0xc0, /* Event logged executing csf/dcd command */ + HAB_CTX_AUT_DAT = 0xdb, /* Authenticated data block */ + HAB_CTX_ASSERT = 0xa0, /* Event logged in hab_rvt.assert() */ + HAB_CTX_EXIT = 0xee, /* Event logged in hab_rvt.exit() */ + HAB_CTX_MAX +} hab_context_t; + /*Function prototype description*/ typedef enum hab_status hab_rvt_report_event_t(enum hab_status, uint32_t, uint8_t* , size_t*); @@ -53,6 +97,22 @@ typedef void *hab_rvt_authenticate_image_t(uint8_t, ptrdiff_t, void **, size_t *, hab_loader_callback_f_t); typedef void hapi_clock_init_t(void); +#define HAB_ENG_ANY 0x00 /* Select first compatible engine */ +#define HAB_ENG_SCC 0x03 /* Security controller */ +#define HAB_ENG_RTIC 0x05 /* Run-time integrity checker */ +#define HAB_ENG_SAHARA 0x06 /* Crypto accelerator */ +#define HAB_ENG_CSU 0x0a /* Central Security Unit */ +#define HAB_ENG_SRTC 0x0c /* Secure clock */ +#define HAB_ENG_DCP 0x1b /* Data Co-Processor */ +#define HAB_ENG_CAAM 0x1d /* CAAM */ +#define HAB_ENG_SNVS 0x1e /* Secure Non-Volatile Storage */ +#define HAB_ENG_OCOTP 0x21 /* Fuse controller */ +#define HAB_ENG_DTCP 0x22 /* DTCP co-processor */ +#define HAB_ENG_ROM 0x36 /* Protected ROM area */ +#define HAB_ENG_HDCP 0x24 /* HDCP co-processor */ +#define HAB_ENG_RTL 0x77 /* RTL simulation engine */ +#define HAB_ENG_SW 0xff /* Software engine */ + #ifdef CONFIG_MX6SX #define HAB_RVT_BASE 0x00000100 #else @@ -73,6 +133,7 @@ typedef void hapi_clock_init_t(void); #define HAB_CID_ROM 0 /**< ROM Caller ID */ #define HAB_CID_UBOOT 1 /**< UBOOT Caller ID*/ + /* ----------- end of HAB API updates ------------*/ #endif