blob: faadd377fd6712b0bd8796b0ea7c69f715fa9676 [file] [log] [blame]
Andrew Walbran68a8c162022-03-07 15:38:42 +00001// Copyright 2022, The Android Open Source Project
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15//! pVM firmware.
16
17#![no_main]
18#![no_std]
Pierre-Clément Tosifc531152022-10-20 12:22:23 +010019#![feature(default_alloc_error_handler)]
Andrew Walbran68a8c162022-03-07 15:38:42 +000020
Pierre-Clément Tosidb74cb12022-12-08 13:56:25 +000021extern crate alloc;
22
Pierre-Clément Tosi4ef75222022-10-26 17:40:50 +010023mod avb;
Pierre-Clément Tosi20b60962022-10-17 13:35:27 +010024mod config;
Jaewan Kimba8929b2023-01-13 11:13:29 +090025mod debug_policy;
Pierre-Clément Tosi4f4f5eb2022-12-08 14:31:42 +000026mod dice;
Pierre-Clément Tosi5bbfca52022-10-21 12:14:35 +010027mod entry;
Andrew Walbrandfb73372022-04-21 10:52:27 +000028mod exceptions;
Pierre-Clément Tosia0934c12022-11-25 20:54:11 +000029mod fdt;
Pierre-Clément Tosifc531152022-10-20 12:22:23 +010030mod heap;
Pierre-Clément Tosida4440a2022-08-22 18:06:32 +010031mod helpers;
Andrew Walbranba47d1d2022-12-14 15:21:44 +000032mod hvc;
Pierre-Clément Tosia0934c12022-11-25 20:54:11 +000033mod memory;
Pierre-Clément Tosi072969b2022-10-19 17:32:24 +010034mod mmio_guard;
Pierre-Clément Tosia8a4a202022-11-03 14:16:46 +000035mod mmu;
Pierre-Clément Tosida4440a2022-08-22 18:06:32 +010036mod smccc;
Andrew Walbran848decf2022-12-15 14:39:38 +000037mod virtio;
Andrew Walbran68a8c162022-03-07 15:38:42 +000038
Pierre-Clément Tosidb74cb12022-12-08 13:56:25 +000039use alloc::boxed::Box;
40
Andrew Walbrand1d03182022-12-09 18:20:01 +000041use crate::{
Pierre-Clément Tosi2d652982023-01-09 19:30:17 +000042 avb::PUBLIC_KEY,
Pierre-Clément Tosi4f4f5eb2022-12-08 14:31:42 +000043 dice::derive_next_bcc,
Andrew Walbrand1d03182022-12-09 18:20:01 +000044 entry::RebootReason,
Pierre-Clément Tosidb74cb12022-12-08 13:56:25 +000045 fdt::add_dice_node,
46 helpers::flush,
Pierre-Clément Tosi4f4f5eb2022-12-08 14:31:42 +000047 helpers::GUEST_PAGE_SIZE,
Andrew Walbrand1d03182022-12-09 18:20:01 +000048 memory::MemoryTracker,
Andrew Walbranb398fc82023-01-24 14:45:46 +000049 virtio::pci::{self, find_virtio_devices},
Andrew Walbrand1d03182022-12-09 18:20:01 +000050};
Pierre-Clément Tosi4f4f5eb2022-12-08 14:31:42 +000051use ::dice::bcc;
Andrew Walbran730375d2022-12-21 14:04:34 +000052use fdtpci::{PciError, PciInfo};
Andrew Walbran19690632022-12-07 16:41:30 +000053use libfdt::Fdt;
Pierre-Clément Tosi8edf72e2022-12-06 16:02:57 +000054use log::{debug, error, info, trace};
Pierre-Clément Tosi2d652982023-01-09 19:30:17 +000055use pvmfw_avb::verify_payload;
Andrew Walbran68a8c162022-03-07 15:38:42 +000056
Pierre-Clément Tosi4f4f5eb2022-12-08 14:31:42 +000057const NEXT_BCC_SIZE: usize = GUEST_PAGE_SIZE;
58
Alice Wang28cbcf12022-12-01 07:58:28 +000059fn main(
Pierre-Clément Tosidb74cb12022-12-08 13:56:25 +000060 fdt: &mut Fdt,
Alice Wang28cbcf12022-12-01 07:58:28 +000061 signed_kernel: &[u8],
62 ramdisk: Option<&[u8]>,
Pierre-Clément Tosi8edf72e2022-12-06 16:02:57 +000063 bcc: &bcc::Handover,
Andrew Walbran19690632022-12-07 16:41:30 +000064 memory: &mut MemoryTracker,
Alice Wang0a688d22022-12-02 09:48:41 +000065) -> Result<(), RebootReason> {
Pierre-Clément Tosi37105a62022-10-18 12:21:48 +010066 info!("pVM firmware");
Pierre-Clément Tosia0934c12022-11-25 20:54:11 +000067 debug!("FDT: {:?}", fdt as *const libfdt::Fdt);
68 debug!("Signed kernel: {:?} ({:#x} bytes)", signed_kernel.as_ptr(), signed_kernel.len());
Alice Wanga78279c2022-12-16 12:41:19 +000069 debug!("AVB public key: addr={:?}, size={:#x} ({1})", PUBLIC_KEY.as_ptr(), PUBLIC_KEY.len());
Pierre-Clément Tosia0934c12022-11-25 20:54:11 +000070 if let Some(rd) = ramdisk {
71 debug!("Ramdisk: {:?} ({:#x} bytes)", rd.as_ptr(), rd.len());
72 } else {
73 debug!("Ramdisk: None");
74 }
Pierre-Clément Tosi8edf72e2022-12-06 16:02:57 +000075 trace!("BCC: {bcc:x?}");
Andrew Walbran19690632022-12-07 16:41:30 +000076
77 // Set up PCI bus for VirtIO devices.
Andrew Walbrand1d03182022-12-09 18:20:01 +000078 let pci_info = PciInfo::from_fdt(fdt).map_err(handle_pci_error)?;
79 debug!("PCI: {:#x?}", pci_info);
Andrew Walbranb398fc82023-01-24 14:45:46 +000080 let mut pci_root = pci::initialise(pci_info, memory)?;
Andrew Walbran0a8dac72022-12-21 13:49:06 +000081 find_virtio_devices(&mut pci_root).map_err(handle_pci_error)?;
Andrew Walbran19690632022-12-07 16:41:30 +000082
Alice Wang6b486f12023-01-06 13:12:16 +000083 verify_payload(signed_kernel, ramdisk, PUBLIC_KEY).map_err(|e| {
Pierre-Clément Tosi2d652982023-01-09 19:30:17 +000084 error!("Failed to verify the payload: {e}");
85 RebootReason::PayloadVerificationError
86 })?;
87
Pierre-Clément Tosi4f4f5eb2022-12-08 14:31:42 +000088 let debug_mode = false; // TODO(b/256148034): Derive the DICE mode from the received initrd.
89 const HASH_SIZE: usize = 64;
90 let mut hashes = [0; HASH_SIZE * 2]; // TODO(b/256148034): Extract AvbHashDescriptor digests.
91 hashes[..HASH_SIZE].copy_from_slice(&::dice::hash(signed_kernel).map_err(|_| {
92 error!("Failed to hash the kernel");
93 RebootReason::InternalError
94 })?);
95 // Note: Using signed_kernel currently makes the DICE code input depend on its VBMeta fields.
96 let code_hash = if let Some(rd) = ramdisk {
97 hashes[HASH_SIZE..].copy_from_slice(&::dice::hash(rd).map_err(|_| {
98 error!("Failed to hash the ramdisk");
99 RebootReason::InternalError
100 })?);
101 &hashes[..]
102 } else {
103 &hashes[..HASH_SIZE]
104 };
Pierre-Clément Tosidb74cb12022-12-08 13:56:25 +0000105 let next_bcc = heap::aligned_boxed_slice(NEXT_BCC_SIZE, GUEST_PAGE_SIZE).ok_or_else(|| {
106 error!("Failed to allocate the next-stage BCC");
107 RebootReason::InternalError
108 })?;
109 // By leaking the slice, its content will be left behind for the next stage.
110 let next_bcc = Box::leak(next_bcc);
Pierre-Clément Tosi4f4f5eb2022-12-08 14:31:42 +0000111 let next_bcc_size =
112 derive_next_bcc(bcc, next_bcc, code_hash, debug_mode, PUBLIC_KEY).map_err(|e| {
113 error!("Failed to derive next-stage DICE secrets: {e:?}");
114 RebootReason::SecretDerivationError
115 })?;
116 trace!("Next BCC: {:x?}", bcc::Handover::new(&next_bcc[..next_bcc_size]));
117
Pierre-Clément Tosidb74cb12022-12-08 13:56:25 +0000118 flush(next_bcc);
119
120 add_dice_node(fdt, next_bcc.as_ptr() as usize, NEXT_BCC_SIZE).map_err(|e| {
121 error!("Failed to add DICE node to device tree: {e}");
122 RebootReason::InternalError
123 })?;
124
Alice Wang4379c832022-12-05 15:50:20 +0000125 info!("Starting payload...");
Alice Wang28cbcf12022-12-01 07:58:28 +0000126 Ok(())
Pierre-Clément Tosi263ffd52022-10-05 20:27:50 +0100127}
Andrew Walbrand1d03182022-12-09 18:20:01 +0000128
129/// Logs the given PCI error and returns the appropriate `RebootReason`.
130fn handle_pci_error(e: PciError) -> RebootReason {
131 error!("{}", e);
132 match e {
133 PciError::FdtErrorPci(_)
134 | PciError::FdtNoPci
135 | PciError::FdtErrorReg(_)
136 | PciError::FdtMissingReg
137 | PciError::FdtRegEmpty
138 | PciError::FdtRegMissingSize
139 | PciError::CamWrongSize(_)
140 | PciError::FdtErrorRanges(_)
141 | PciError::FdtMissingRanges
142 | PciError::RangeAddressMismatch { .. }
143 | PciError::NoSuitableRange => RebootReason::InvalidFdt,
Andrew Walbrand1d03182022-12-09 18:20:01 +0000144 }
145}