| // Copyright lowRISC contributors. |
| // Licensed under the Apache License, Version 2.0, see LICENSE for details. |
| // SPDX-License-Identifier: Apache-2.0 |
| |
| #include "sw/device/silicon_creator/rom/rom.h" |
| |
| #include <stdbool.h> |
| #include <stdint.h> |
| |
| #include "sw/device/lib/arch/device.h" |
| #include "sw/device/lib/base/bitfield.h" |
| #include "sw/device/lib/base/csr.h" |
| #include "sw/device/lib/base/hardened.h" |
| #include "sw/device/lib/base/macros.h" |
| #include "sw/device/lib/base/memory.h" |
| #include "sw/device/lib/base/stdasm.h" |
| #include "sw/device/silicon_creator/lib/base/boot_measurements.h" |
| #include "sw/device/silicon_creator/lib/base/sec_mmio.h" |
| #include "sw/device/silicon_creator/lib/boot_data.h" |
| #include "sw/device/silicon_creator/lib/cfi.h" |
| #include "sw/device/silicon_creator/lib/drivers/alert.h" |
| #include "sw/device/silicon_creator/lib/drivers/ast.h" |
| #include "sw/device/silicon_creator/lib/drivers/flash_ctrl.h" |
| #include "sw/device/silicon_creator/lib/drivers/ibex.h" |
| #include "sw/device/silicon_creator/lib/drivers/keymgr.h" |
| #include "sw/device/silicon_creator/lib/drivers/lifecycle.h" |
| #include "sw/device/silicon_creator/lib/drivers/otp.h" |
| #include "sw/device/silicon_creator/lib/drivers/pinmux.h" |
| #include "sw/device/silicon_creator/lib/drivers/retention_sram.h" |
| #include "sw/device/silicon_creator/lib/drivers/rnd.h" |
| #include "sw/device/silicon_creator/lib/drivers/rstmgr.h" |
| #include "sw/device/silicon_creator/lib/drivers/uart.h" |
| #include "sw/device/silicon_creator/lib/drivers/watchdog.h" |
| #include "sw/device/silicon_creator/lib/error.h" |
| #include "sw/device/silicon_creator/lib/shutdown.h" |
| #include "sw/device/silicon_creator/lib/sigverify/sigverify.h" |
| #include "sw/device/silicon_creator/rom/boot_policy.h" |
| #include "sw/device/silicon_creator/rom/bootstrap.h" |
| #include "sw/device/silicon_creator/rom/rom_epmp.h" |
| #include "sw/device/silicon_creator/rom/sigverify_keys.h" |
| |
| #include "hw/top_earlgrey/sw/autogen/top_earlgrey.h" |
| #include "otp_ctrl_regs.h" |
| |
| /** |
| * Table of forward branch Control Flow Integrity (CFI) counters. |
| * |
| * Columns: Name, Initital Value. |
| * |
| * Each counter is indexed by Name. The Initial Value is used to initialize the |
| * counters with unique values with a good hamming distance. The values are |
| * restricted to 11-bit to be able use immediate load instructions. |
| |
| * Encoding generated with |
| * $ ./util/design/sparse-fsm-encode.py -d 6 -m 6 -n 11 \ |
| * -s 1630646358 --language=c |
| * |
| * Minimum Hamming distance: 6 |
| * Maximum Hamming distance: 8 |
| * Minimum Hamming weight: 5 |
| * Maximum Hamming weight: 8 |
| */ |
| // clang-format off |
| #define ROM_CFI_FUNC_COUNTERS_TABLE(X) \ |
| X(kCfiRomMain, 0x14b) \ |
| X(kCfiRomInit, 0x7dc) \ |
| X(kCfiRomVerify, 0x5a7) \ |
| X(kCfiRomTryBoot, 0x235) \ |
| X(kCfiRomPreBootCheck, 0x43a) \ |
| X(kCfiRomBoot, 0x2e2) |
| // clang-format on |
| |
| // Define counters and constant values required by the CFI counter macros. |
| CFI_DEFINE_COUNTERS(rom_counters, ROM_CFI_FUNC_COUNTERS_TABLE); |
| |
| // Life cycle state of the chip. |
| lifecycle_state_t lc_state = (lifecycle_state_t)0; |
| // Boot data from flash. |
| boot_data_t boot_data = {0}; |
| |
| OT_ALWAYS_INLINE |
| static rom_error_t rom_irq_error(void) { |
| uint32_t mcause; |
| CSR_READ(CSR_REG_MCAUSE, &mcause); |
| // Shuffle the mcause bits into the uppermost byte of the word and report |
| // the cause as kErrorInterrupt. |
| // Based on the ibex verilog, it appears that the most significant bit |
| // indicates whether the cause is an exception (0) or external interrupt (1), |
| // and the 5 least significant bits indicate which exception/interrupt. |
| // |
| // Preserve the MSB and shift the 7 LSBs into the upper byte. |
| // (we preserve 7 instead of 5 because the verilog hardcodes the unused bits |
| // as zero and those would be the next bits used should the number of |
| // interrupt causes increase). |
| mcause = (mcause & 0x80000000) | ((mcause & 0x7f) << 24); |
| return kErrorInterrupt + mcause; |
| } |
| |
| /** |
| * Prints a status message indicating that the ROM is entering bootstrap mode. |
| */ |
| static void rom_bootstrap_message(void) { |
| uart_putchar('b'); |
| uart_putchar('o'); |
| uart_putchar('o'); |
| uart_putchar('t'); |
| uart_putchar('s'); |
| uart_putchar('t'); |
| uart_putchar('r'); |
| uart_putchar('a'); |
| uart_putchar('p'); |
| uart_putchar(':'); |
| uart_putchar('1'); |
| uart_putchar('\r'); |
| uart_putchar('\n'); |
| } |
| |
| /** |
| * Performs once-per-boot initialization of ROM modules and peripherals. |
| */ |
| static rom_error_t rom_init(void) { |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomInit, 1); |
| sec_mmio_init(); |
| // Initialize pinmux configuration so we can use the UART. |
| pinmux_init(); |
| // Configure UART0 as stdout. |
| uart_init(kUartNCOValue); |
| |
| // There are no conditional checks before writing to this CSR because it is |
| // expected that if relevant Ibex countermeasures are disabled, this will |
| // result in a nop. |
| CSR_WRITE(CSR_REG_SECURESEED, rnd_uint32()); |
| |
| // Write the OTP value to bits 0 to 5 of the cpuctrl CSR. |
| uint32_t cpuctrl_csr; |
| CSR_READ(CSR_REG_CPUCTRL, &cpuctrl_csr); |
| cpuctrl_csr = bitfield_field32_write( |
| cpuctrl_csr, (bitfield_field32_t){.mask = 0x3f, .index = 0}, |
| otp_read32(OTP_CTRL_PARAM_CREATOR_SW_CFG_CPUCTRL_OFFSET)); |
| CSR_WRITE(CSR_REG_CPUCTRL, cpuctrl_csr); |
| |
| lc_state = lifecycle_state_get(); |
| |
| // Update epmp config for debug rom according to lifecycle state. |
| rom_epmp_config_debug_rom(lc_state); |
| |
| // Re-initialize the watchdog timer. |
| watchdog_init(lc_state); |
| SEC_MMIO_WRITE_INCREMENT(kWatchdogSecMmioInit); |
| |
| // Initialize the shutdown policy. |
| HARDENED_RETURN_IF_ERROR(shutdown_init(lc_state)); |
| |
| flash_ctrl_init(); |
| SEC_MMIO_WRITE_INCREMENT(kFlashCtrlSecMmioInit); |
| |
| // Initialize in-memory copy of the ePMP register configuration. |
| rom_epmp_state_init(lc_state); |
| |
| // Check that AST is in the expected state. |
| HARDENED_RETURN_IF_ERROR(ast_check(lc_state)); |
| |
| // Initialize the retention RAM based on the reset reason and the OTP value. |
| // Note: Retention RAM is always reset on PoR regardless of the OTP value. |
| uint32_t reset_reasons = rstmgr_reason_get(); |
| uint32_t reset_mask = |
| (1 << kRstmgrReasonPowerOn) | |
| otp_read32(OTP_CTRL_PARAM_CREATOR_SW_CFG_RET_RAM_RESET_MASK_OFFSET); |
| if ((reset_reasons & reset_mask) != 0) { |
| retention_sram_init(); |
| } |
| // Store the reset reason in retention RAM and clear the register. |
| retention_sram_get()->reset_reasons = reset_reasons; |
| rstmgr_reason_clear(reset_reasons); |
| |
| // This function is a NOP unless ROM is built for an fpga. |
| device_fpga_version_print(); |
| |
| sec_mmio_check_values(rnd_uint32()); |
| sec_mmio_check_counters(/*expected_check_count=*/1); |
| |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomInit, 2); |
| return kErrorOk; |
| } |
| |
| /** |
| * Verifies a ROM_EXT. |
| * |
| * This function performs bounds checks on the fields of the manifest, checks |
| * its `identifier` and `security_version` fields, and verifies its signature. |
| * |
| * @param Manifest of the ROM_EXT to be verified. |
| * @param[out] flash_exec Value to write to the flash_ctrl EXEC register. |
| * @return Result of the operation. |
| */ |
| static rom_error_t rom_verify(const manifest_t *manifest, |
| uint32_t *flash_exec) { |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomVerify, 1); |
| *flash_exec = 0; |
| HARDENED_RETURN_IF_ERROR(boot_policy_manifest_check(manifest, &boot_data)); |
| |
| const sigverify_rsa_key_t *key; |
| HARDENED_RETURN_IF_ERROR(sigverify_rsa_key_get( |
| sigverify_rsa_key_id_get(&manifest->modulus), lc_state, &key)); |
| |
| uint32_t clobber_value = rnd_uint32(); |
| for (size_t i = 0; i < ARRAYSIZE(boot_measurements.rom_ext.data); ++i) { |
| boot_measurements.rom_ext.data[i] = clobber_value; |
| } |
| |
| hmac_sha256_init(); |
| // Invalidate the digest if the security version of the manifest is smaller |
| // than the minimum required security version. |
| if (launder32(manifest->security_version) < |
| boot_data.min_security_version_rom_ext) { |
| uint32_t extra_word = UINT32_MAX; |
| hmac_sha256_update(&extra_word, sizeof(extra_word)); |
| } |
| HARDENED_CHECK_GE(manifest->security_version, |
| boot_data.min_security_version_rom_ext); |
| |
| // Hash usage constraints. |
| manifest_usage_constraints_t usage_constraints_from_hw; |
| sigverify_usage_constraints_get(manifest->usage_constraints.selector_bits, |
| &usage_constraints_from_hw); |
| hmac_sha256_update(&usage_constraints_from_hw, |
| sizeof(usage_constraints_from_hw)); |
| // Hash the remaining part of the image. |
| manifest_digest_region_t digest_region = manifest_digest_region_get(manifest); |
| |
| hmac_sha256_update(digest_region.start, digest_region.length); |
| // Verify signature |
| hmac_digest_t act_digest; |
| hmac_sha256_final(&act_digest); |
| |
| static_assert(sizeof(boot_measurements.rom_ext) == sizeof(act_digest), |
| "Unexpected ROM_EXT digest size."); |
| memcpy(&boot_measurements.rom_ext, &act_digest, |
| sizeof(boot_measurements.rom_ext)); |
| |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomVerify, 2); |
| return sigverify_rsa_verify(&manifest->signature, key, &act_digest, lc_state, |
| flash_exec); |
| } |
| |
| /* These symbols are defined in |
| * `opentitan/sw/device/silicon_creator/rom/rom.ld`, and describes the |
| * location of the flash header. |
| */ |
| extern char _rom_ext_virtual_start_address[]; |
| extern char _rom_ext_virtual_size[]; |
| /** |
| * Compute the virtual address corresponding to the physical address `lma_addr`. |
| * |
| * @param manifest Pointer to the current manifest. |
| * @param lma_addr Load address or physical address. |
| * @return the computed virtual address. |
| */ |
| static inline uintptr_t rom_ext_vma_get(const manifest_t *manifest, |
| uintptr_t lma_addr) { |
| return (lma_addr - (uintptr_t)manifest + |
| (uintptr_t)_rom_ext_virtual_start_address); |
| } |
| |
| /** |
| * Performs consistency checks before booting a ROM_EXT. |
| * |
| * All of the checks in this function are expected to pass and any failures |
| * result in shutdown. |
| */ |
| static void rom_pre_boot_check(void) { |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomPreBootCheck, 1); |
| |
| // Check the alert_handler configuration. |
| SHUTDOWN_IF_ERROR(alert_config_check(lc_state)); |
| SHUTDOWN_IF_ERROR(rnd_health_config_check(lc_state)); |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomPreBootCheck, 2); |
| |
| // Check cached life cycle state against the value reported by hardware. |
| lifecycle_state_t lc_state_check = lifecycle_state_get(); |
| if (launder32(lc_state_check) != lc_state) { |
| HARDENED_UNREACHABLE(); |
| } |
| HARDENED_CHECK_EQ(lc_state_check, lc_state); |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomPreBootCheck, 3); |
| |
| // Check cached boot data. |
| rom_error_t boot_data_ok = boot_data_check(&boot_data); |
| if (launder32(boot_data_ok) != kErrorOk) { |
| HARDENED_UNREACHABLE(); |
| } |
| HARDENED_CHECK_EQ(boot_data_ok, kErrorOk); |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomPreBootCheck, 4); |
| |
| // Check the cpuctrl CSR. |
| uint32_t cpuctrl_csr; |
| uint32_t cpuctrl_otp = |
| otp_read32(OTP_CTRL_PARAM_CREATOR_SW_CFG_CPUCTRL_OFFSET); |
| CSR_READ(CSR_REG_CPUCTRL, &cpuctrl_csr); |
| // We only mask the 8th bit (`ic_scr_key_valid`) to include exception flags |
| // (bits 6 and 7) in the check. |
| cpuctrl_csr = bitfield_bit32_write(cpuctrl_csr, 8, false); |
| if (launder32(cpuctrl_csr) != cpuctrl_otp) { |
| HARDENED_UNREACHABLE(); |
| } |
| HARDENED_CHECK_EQ(cpuctrl_csr, cpuctrl_otp); |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomPreBootCheck, 5); |
| |
| sec_mmio_check_counters(/*expected_check_count=*/3); |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomPreBootCheck, 6); |
| } |
| |
| /** |
| * Boots a ROM_EXT. |
| * |
| * Note: This function should not return under normal conditions. Any returns |
| * from this function must result in shutdown. |
| * |
| * @param manifest Manifest of the ROM_EXT to boot. |
| * @param flash_exec Value to write to the flash_ctrl EXEC register. |
| * @return rom_error_t Result of the operation. |
| */ |
| static rom_error_t rom_boot(const manifest_t *manifest, uint32_t flash_exec) { |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomBoot, 1); |
| HARDENED_RETURN_IF_ERROR(keymgr_state_check(kKeymgrStateReset)); |
| |
| const keymgr_binding_value_t *attestation_measurement = |
| &manifest->binding_value; |
| uint32_t use_rom_ext_measurement = |
| otp_read32(OTP_CTRL_PARAM_OWNER_SW_CFG_ROM_KEYMGR_ROM_EXT_MEAS_EN_OFFSET); |
| if (launder32(use_rom_ext_measurement) == kHardenedBoolTrue) { |
| HARDENED_CHECK_EQ(use_rom_ext_measurement, kHardenedBoolTrue); |
| attestation_measurement = |
| (const keymgr_binding_value_t *)&boot_measurements.rom_ext; |
| } else { |
| HARDENED_CHECK_NE(use_rom_ext_measurement, kHardenedBoolTrue); |
| } |
| keymgr_sw_binding_set(&manifest->binding_value, attestation_measurement); |
| keymgr_creator_max_ver_set(manifest->max_key_version); |
| SEC_MMIO_WRITE_INCREMENT(kKeymgrSecMmioSwBindingSet + |
| kKeymgrSecMmioCreatorMaxVerSet); |
| |
| sec_mmio_check_counters(/*expected_check_count=*/2); |
| |
| // Configure address translation, compute the epmp regions and the entry |
| // point for the virtual address in case the address translation is enabled. |
| // Otherwise, compute the epmp regions and the entry point for the load |
| // address. |
| epmp_region_t text_region = manifest_code_region_get(manifest); |
| uintptr_t entry_point = manifest_entry_point_get(manifest); |
| switch (launder32(manifest->address_translation)) { |
| case kHardenedBoolTrue: |
| HARDENED_CHECK_EQ(manifest->address_translation, kHardenedBoolTrue); |
| ibex_addr_remap_0_set((uintptr_t)_rom_ext_virtual_start_address, |
| (uintptr_t)manifest, (size_t)_rom_ext_virtual_size); |
| SEC_MMIO_WRITE_INCREMENT(kAddressTranslationSecMmioConfigure); |
| |
| // Unlock read-only for the whole rom_ext virtual memory. |
| HARDENED_RETURN_IF_ERROR(epmp_state_check()); |
| rom_epmp_unlock_rom_ext_r( |
| (epmp_region_t){.start = (uintptr_t)_rom_ext_virtual_start_address, |
| .end = (uintptr_t)_rom_ext_virtual_start_address + |
| (uintptr_t)_rom_ext_virtual_size}); |
| |
| // Move the ROM_EXT execution section from the load address to the virtual |
| // address. |
| text_region.start = rom_ext_vma_get(manifest, text_region.start); |
| text_region.end = rom_ext_vma_get(manifest, text_region.end); |
| entry_point = rom_ext_vma_get(manifest, entry_point); |
| break; |
| case kHardenedBoolFalse: |
| HARDENED_CHECK_EQ(manifest->address_translation, kHardenedBoolFalse); |
| break; |
| default: |
| HARDENED_UNREACHABLE(); |
| } |
| |
| // Unlock execution of ROM_EXT executable code (text) sections. |
| HARDENED_RETURN_IF_ERROR(epmp_state_check()); |
| rom_epmp_unlock_rom_ext_rx(text_region); |
| HARDENED_RETURN_IF_ERROR(epmp_state_check()); |
| |
| CFI_FUNC_COUNTER_PREPCALL(rom_counters, kCfiRomBoot, 2, kCfiRomPreBootCheck); |
| rom_pre_boot_check(); |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomBoot, 4); |
| CFI_FUNC_COUNTER_CHECK(rom_counters, kCfiRomPreBootCheck, 7); |
| |
| // Enable execution of code from flash if signature is verified. |
| flash_ctrl_exec_set(flash_exec); |
| SEC_MMIO_WRITE_INCREMENT(kFlashCtrlSecMmioExecSet); |
| |
| sec_mmio_check_values(rnd_uint32()); |
| sec_mmio_check_counters(/*expected_check_count=*/5); |
| |
| // Jump to ROM_EXT entry point. |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomBoot, 5); |
| ((rom_ext_entry_point *)entry_point)(); |
| |
| return kErrorRomBootFailed; |
| } |
| |
| /** |
| * Attempts to boot ROM_EXTs in the order given by the boot policy module. |
| * |
| * @return Result of the last attempt. |
| */ |
| static rom_error_t rom_try_boot(void) { |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomTryBoot, 1); |
| |
| // Read boot data from flash |
| HARDENED_RETURN_IF_ERROR(boot_data_read(lc_state, &boot_data)); |
| |
| boot_policy_manifests_t manifests = boot_policy_manifests_get(); |
| uint32_t flash_exec = 0; |
| |
| CFI_FUNC_COUNTER_PREPCALL(rom_counters, kCfiRomTryBoot, 2, kCfiRomVerify); |
| rom_error_t error = rom_verify(manifests.ordered[0], &flash_exec); |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomTryBoot, 4); |
| |
| if (launder32(error) == kErrorOk) { |
| HARDENED_CHECK_EQ(error, kErrorOk); |
| CFI_FUNC_COUNTER_CHECK(rom_counters, kCfiRomVerify, 3); |
| CFI_FUNC_COUNTER_INIT(rom_counters, kCfiRomTryBoot); |
| CFI_FUNC_COUNTER_PREPCALL(rom_counters, kCfiRomTryBoot, 1, kCfiRomBoot); |
| HARDENED_RETURN_IF_ERROR(rom_boot(manifests.ordered[0], flash_exec)); |
| return kErrorRomBootFailed; |
| } |
| |
| CFI_FUNC_COUNTER_PREPCALL(rom_counters, kCfiRomTryBoot, 5, kCfiRomVerify); |
| HARDENED_RETURN_IF_ERROR(rom_verify(manifests.ordered[1], &flash_exec)); |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomTryBoot, 7); |
| CFI_FUNC_COUNTER_CHECK(rom_counters, kCfiRomVerify, 3); |
| |
| CFI_FUNC_COUNTER_PREPCALL(rom_counters, kCfiRomTryBoot, 8, kCfiRomBoot); |
| HARDENED_RETURN_IF_ERROR(rom_boot(manifests.ordered[1], flash_exec)); |
| return kErrorRomBootFailed; |
| } |
| |
| void rom_main(void) { |
| CFI_FUNC_COUNTER_INIT(rom_counters, kCfiRomMain); |
| |
| CFI_FUNC_COUNTER_PREPCALL(rom_counters, kCfiRomMain, 1, kCfiRomInit); |
| SHUTDOWN_IF_ERROR(rom_init()); |
| CFI_FUNC_COUNTER_INCREMENT(rom_counters, kCfiRomMain, 3); |
| CFI_FUNC_COUNTER_CHECK(rom_counters, kCfiRomInit, 3); |
| |
| hardened_bool_t bootstrap_req = bootstrap_requested(); |
| if (launder32(bootstrap_req) == kHardenedBoolTrue) { |
| HARDENED_CHECK_EQ(bootstrap_req, kHardenedBoolTrue); |
| rom_bootstrap_message(); |
| watchdog_disable(); |
| shutdown_finalize(bootstrap()); |
| } |
| |
| // `rom_try_boot` will not return unless there is an error. |
| CFI_FUNC_COUNTER_PREPCALL(rom_counters, kCfiRomMain, 4, kCfiRomTryBoot); |
| shutdown_finalize(rom_try_boot()); |
| } |
| |
| void rom_interrupt_handler(void) { |
| register rom_error_t error asm("a0") = rom_irq_error(); |
| asm volatile("tail shutdown_finalize;" ::"r"(error)); |
| OT_UNREACHABLE(); |
| } |
| |
| // We only need a single handler for all ROM interrupts, but we want to |
| // keep distinct symbols to make writing tests easier. In the ROM, |
| // alias all interrupt handler symbols to the single handler. |
| OT_ALIAS("rom_interrupt_handler") |
| noreturn void rom_exception_handler(void); |
| |
| OT_ALIAS("rom_interrupt_handler") |
| noreturn void rom_nmi_handler(void); |