| /* |
| * Copyright (c) 2016, NVIDIA CORPORATION. All rights reserved. |
| * |
| * Permission is hereby granted, free of charge, to any person obtaining a |
| * copy of this software and associated documentation files (the "Software"), |
| * to deal in the Software without restriction, including without limitation |
| * the rights to use, copy, modify, merge, publish, distribute, sublicense, |
| * and/or sell copies of the Software, and to permit persons to whom the |
| * Software is furnished to do so, subject to the following conditions: |
| * |
| * The above copyright notice and this permission notice shall be included in |
| * all copies or substantial portions of the Software. |
| * |
| * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR |
| * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, |
| * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL |
| * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER |
| * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING |
| * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER |
| * DEALINGS IN THE SOFTWARE. |
| */ |
| |
| /* |
| * Secure boot is the process by which NVIDIA-signed firmware is loaded into |
| * some of the falcons of a GPU. For production devices this is the only way |
| * for the firmware to access useful (but sensitive) registers. |
| * |
| * A Falcon microprocessor supporting advanced security modes can run in one of |
| * three modes: |
| * |
| * - Non-secure (NS). In this mode, functionality is similar to Falcon |
| * architectures before security modes were introduced (pre-Maxwell), but |
| * capability is restricted. In particular, certain registers may be |
| * inaccessible for reads and/or writes, and physical memory access may be |
| * disabled (on certain Falcon instances). This is the only possible mode that |
| * can be used if you don't have microcode cryptographically signed by NVIDIA. |
| * |
| * - Heavy Secure (HS). In this mode, the microprocessor is a black box - it's |
| * not possible to read or write any Falcon internal state or Falcon registers |
| * from outside the Falcon (for example, from the host system). The only way |
| * to enable this mode is by loading microcode that has been signed by NVIDIA. |
| * (The loading process involves tagging the IMEM block as secure, writing the |
| * signature into a Falcon register, and starting execution. The hardware will |
| * validate the signature, and if valid, grant HS privileges.) |
| * |
| * - Light Secure (LS). In this mode, the microprocessor has more privileges |
| * than NS but fewer than HS. Some of the microprocessor state is visible to |
| * host software to ease debugging. The only way to enable this mode is by HS |
| * microcode enabling LS mode. Some privileges available to HS mode are not |
| * available here. LS mode is introduced in GM20x. |
| * |
| * Secure boot consists in temporarily switching a HS-capable falcon (typically |
| * PMU) into HS mode in order to validate the LS firmwares of managed falcons, |
| * load them, and switch managed falcons into LS mode. Once secure boot |
| * completes, no falcon remains in HS mode. |
| * |
| * Secure boot requires a write-protected memory region (WPR) which can only be |
| * written by the secure falcon. On dGPU, the driver sets up the WPR region in |
| * video memory. On Tegra, it is set up by the bootloader and its location and |
| * size written into memory controller registers. |
| * |
| * The secure boot process takes place as follows: |
| * |
| * 1) A LS blob is constructed that contains all the LS firmwares we want to |
| * load, along with their signatures and bootloaders. |
| * |
| * 2) A HS blob (also called ACR) is created that contains the signed HS |
| * firmware in charge of loading the LS firmwares into their respective |
| * falcons. |
| * |
| * 3) The HS blob is loaded (via its own bootloader) and executed on the |
| * HS-capable falcon. It authenticates itself, switches the secure falcon to |
| * HS mode and setup the WPR region around the LS blob (dGPU) or copies the |
| * LS blob into the WPR region (Tegra). |
| * |
| * 4) The LS blob is now secure from all external tampering. The HS falcon |
| * checks the signatures of the LS firmwares and, if valid, switches the |
| * managed falcons to LS mode and makes them ready to run the LS firmware. |
| * |
| * 5) The managed falcons remain in LS mode and can be started. |
| * |
| */ |
| |
| #include "priv.h" |
| #include "acr.h" |
| |
| #include <subdev/mc.h> |
| #include <subdev/timer.h> |
| #include <subdev/pmu.h> |
| #include <engine/sec2.h> |
| |
| const char * |
| nvkm_secboot_falcon_name[] = { |
| [NVKM_SECBOOT_FALCON_PMU] = "PMU", |
| [NVKM_SECBOOT_FALCON_RESERVED] = "<reserved>", |
| [NVKM_SECBOOT_FALCON_FECS] = "FECS", |
| [NVKM_SECBOOT_FALCON_GPCCS] = "GPCCS", |
| [NVKM_SECBOOT_FALCON_SEC2] = "SEC2", |
| [NVKM_SECBOOT_FALCON_END] = "<invalid>", |
| }; |
| /** |
| * nvkm_secboot_reset() - reset specified falcon |
| */ |
| int |
| nvkm_secboot_reset(struct nvkm_secboot *sb, unsigned long falcon_mask) |
| { |
| /* Unmanaged falcon? */ |
| if ((falcon_mask | sb->acr->managed_falcons) != sb->acr->managed_falcons) { |
| nvkm_error(&sb->subdev, "cannot reset unmanaged falcon!\n"); |
| return -EINVAL; |
| } |
| |
| return sb->acr->func->reset(sb->acr, sb, falcon_mask); |
| } |
| |
| /** |
| * nvkm_secboot_is_managed() - check whether a given falcon is securely-managed |
| */ |
| bool |
| nvkm_secboot_is_managed(struct nvkm_secboot *sb, enum nvkm_secboot_falcon fid) |
| { |
| if (!sb) |
| return false; |
| |
| return sb->acr->managed_falcons & BIT(fid); |
| } |
| |
| static int |
| nvkm_secboot_oneinit(struct nvkm_subdev *subdev) |
| { |
| struct nvkm_secboot *sb = nvkm_secboot(subdev); |
| int ret = 0; |
| |
| switch (sb->acr->boot_falcon) { |
| case NVKM_SECBOOT_FALCON_PMU: |
| sb->halt_falcon = sb->boot_falcon = subdev->device->pmu->falcon; |
| break; |
| case NVKM_SECBOOT_FALCON_SEC2: |
| /* we must keep SEC2 alive forever since ACR will run on it */ |
| nvkm_engine_ref(&subdev->device->sec2->engine); |
| sb->boot_falcon = subdev->device->sec2->falcon; |
| sb->halt_falcon = subdev->device->pmu->falcon; |
| break; |
| default: |
| nvkm_error(subdev, "Unmanaged boot falcon %s!\n", |
| nvkm_secboot_falcon_name[sb->acr->boot_falcon]); |
| return -EINVAL; |
| } |
| nvkm_debug(subdev, "using %s falcon for ACR\n", sb->boot_falcon->name); |
| |
| /* Call chip-specific init function */ |
| if (sb->func->oneinit) |
| ret = sb->func->oneinit(sb); |
| if (ret) { |
| nvkm_error(subdev, "Secure Boot initialization failed: %d\n", |
| ret); |
| return ret; |
| } |
| |
| return 0; |
| } |
| |
| static int |
| nvkm_secboot_fini(struct nvkm_subdev *subdev, bool suspend) |
| { |
| struct nvkm_secboot *sb = nvkm_secboot(subdev); |
| int ret = 0; |
| |
| if (sb->func->fini) |
| ret = sb->func->fini(sb, suspend); |
| |
| return ret; |
| } |
| |
| static void * |
| nvkm_secboot_dtor(struct nvkm_subdev *subdev) |
| { |
| struct nvkm_secboot *sb = nvkm_secboot(subdev); |
| void *ret = NULL; |
| |
| if (sb->func->dtor) |
| ret = sb->func->dtor(sb); |
| |
| return ret; |
| } |
| |
| static const struct nvkm_subdev_func |
| nvkm_secboot = { |
| .oneinit = nvkm_secboot_oneinit, |
| .fini = nvkm_secboot_fini, |
| .dtor = nvkm_secboot_dtor, |
| }; |
| |
| int |
| nvkm_secboot_ctor(const struct nvkm_secboot_func *func, struct nvkm_acr *acr, |
| struct nvkm_device *device, int index, |
| struct nvkm_secboot *sb) |
| { |
| unsigned long fid; |
| |
| nvkm_subdev_ctor(&nvkm_secboot, device, index, &sb->subdev); |
| sb->func = func; |
| sb->acr = acr; |
| acr->subdev = &sb->subdev; |
| |
| nvkm_debug(&sb->subdev, "securely managed falcons:\n"); |
| for_each_set_bit(fid, &sb->acr->managed_falcons, |
| NVKM_SECBOOT_FALCON_END) |
| nvkm_debug(&sb->subdev, "- %s\n", |
| nvkm_secboot_falcon_name[fid]); |
| |
| return 0; |
| } |