blob: 4e1aa20780123a5f7341daac2ed8a98d94218bde [file] [log] [blame]
// Copyright lowRISC contributors.
// Licensed under the Apache License, Version 2.0, see LICENSE for details.
// SPDX-License-Identifier: Apache-2.0
#include "sw/device/silicon_creator/lib/boot_data.h"
#include <stddef.h>
#include <stdint.h>
#include "sw/device/lib/base/hardened.h"
#include "sw/device/lib/base/memory.h"
#include "sw/device/silicon_creator/lib/drivers/flash_ctrl.h"
#include "sw/device/silicon_creator/lib/drivers/hmac.h"
#include "sw/device/silicon_creator/lib/error.h"
#include "flash_ctrl_regs.h" // Generated.
#include "hw/top_earlgrey/sw/autogen/top_earlgrey.h"
static_assert(kBootDataEntriesPerPage ==
FLASH_CTRL_PARAM_BYTES_PER_PAGE / sizeof(boot_data_t),
"Number of boot data entries per page is incorrect");
static_assert(sizeof(boot_data_t) % FLASH_CTRL_PARAM_BYTES_PER_WORD == 0,
"Size of `boot_data_t` must be a multiple of flash word size.");
static_assert(!(FLASH_CTRL_PARAM_BYTES_PER_PAGE &
(FLASH_CTRL_PARAM_BYTES_PER_PAGE - 1)),
"Size of a flash page must be a power of two.");
static_assert(!(sizeof(boot_data_t) & (sizeof(boot_data_t) - 1)),
"Size of `boot_data_t` must be a power of two.");
/**
* Boot data flash info pages.
*/
static const flash_ctrl_info_page_t kPages[2] = {
kFlashCtrlInfoPageBootData0,
kFlashCtrlInfoPageBootData1,
};
/**
* A type that holds `kBootDataNumWords` words.
*/
typedef struct boot_data_buffer {
uint32_t data[kBootDataNumWords];
} boot_data_buffer_t;
/**
* Computes the SHA-256 digest of a boot data entry.
*
* The region covered by this digest starts immediately after the `identifier`
* field and ends at the end of the entry.
*
* @param boot_data A boot data entry.
* @param[out] digest Digest of the boot data entry.
* @return The result of the operation.
*/
static rom_error_t boot_data_digest_compute(const void *boot_data,
hmac_digest_t *digest) {
enum {
kDigestRegionOffset = sizeof((boot_data_t){0}.digest),
kDigestRegionSize = sizeof(boot_data_t) - kDigestRegionOffset,
};
static_assert(offsetof(boot_data_t, digest) == 0,
"`digest` must be the first field of `boot_data_t`.");
hmac_sha256_init();
RETURN_IF_ERROR(hmac_sha256_update(
(const char *)boot_data + kDigestRegionOffset, kDigestRegionSize));
RETURN_IF_ERROR(hmac_sha256_final(digest));
return kErrorOk;
}
/**
* Checks whether the digest of a boot data entry is valid.
*
* @param boot_data A buffer that holds a boot data entry.
* @param[out] is_valid Whether the digest of the entry is valid.
* @return The result of the operation.
*/
static rom_error_t boot_data_digest_is_valid(
const boot_data_buffer_t *boot_data, hardened_bool_t *is_valid) {
static_assert(offsetof(boot_data_t, digest) == 0,
"`digest` must be the first field of `boot_data_t`.");
*is_valid = kHardenedBoolFalse;
hmac_digest_t act_digest;
RETURN_IF_ERROR(boot_data_digest_compute(boot_data, &act_digest));
if (memcmp(&act_digest, boot_data, sizeof(act_digest.digest)) == 0) {
*is_valid = kHardenedBoolTrue;
}
return kErrorOk;
}
/**
* Checks whether a boot data entry is empty.
*
* @param boot_data A buffer that holds a boot data entry.
* @return Whether the entry is empty.
*/
static hardened_bool_t boot_data_is_empty(const boot_data_buffer_t *boot_data) {
for (size_t i = 0; i < kBootDataNumWords; ++i) {
if (boot_data->data[i] != kBootDataEmptyWordValue) {
return kHardenedBoolFalse;
}
}
return kHardenedBoolTrue;
}
/**
* Reads the identifier field of the boot data entry at the given page and
* index.
*
* @param page A boot data page.
* @param index Index of the entry to read in the given page.
* @param[out] identifier Identifier field of the entry.
* @return The result of the operation.
*/
static rom_error_t boot_data_identifier_read(flash_ctrl_info_page_t page,
size_t index,
uint32_t *identifier) {
static_assert(offsetof(boot_data_t, identifier) % sizeof(uint32_t) == 0,
"`identifier` must be word aligned.");
const uint32_t offset =
index * sizeof(boot_data_t) + offsetof(boot_data_t, identifier);
return flash_ctrl_info_read(page, offset, 1, identifier);
}
/**
* Reads the boot data entry at the given page and index.
*
* @param page A boot data page.
* @param index Index of the entry to read in the given page.
* @param[out] boot_data A buffer that will hold the entry.
* @return The result of the operation.
*/
static rom_error_t boot_data_entry_read(flash_ctrl_info_page_t page,
size_t index,
boot_data_buffer_t *boot_data) {
const uint32_t offset = index * sizeof(boot_data_t);
return flash_ctrl_info_read(page, offset, kBootDataNumWords, boot_data->data);
}
/**
* Populates the boot data entry at the given page and index.
*
* If `erase` is `kHardenedBoolTrue`, this function erases the given page before
* writing the new entry. This function also also verifies the newly written
* entry by reading it back. Reads, writes, and erases (if applicable) must be
* enabled for the given page before this function is called, see
* `boot_data_entry_write()`.
*
* @param page A boot data page.
* @param index Index of the entry to write in the given page.
* @param boot_data Entry to write.
* @param erase Whether to erase the page before writing the entry.
* @return The result of the operation.
*/
static rom_error_t boot_data_entry_write_impl(flash_ctrl_info_page_t page,
size_t index,
const boot_data_t *boot_data,
hardened_bool_t erase) {
boot_data_buffer_t buf;
memcpy(&buf, boot_data, sizeof(boot_data_t));
const uint32_t offset = index * sizeof(boot_data_t);
if (erase == kHardenedBoolTrue) {
RETURN_IF_ERROR(flash_ctrl_info_erase(page, kFlashCtrlEraseTypePage));
}
RETURN_IF_ERROR(
flash_ctrl_info_write(page, offset, kBootDataNumWords, buf.data));
RETURN_IF_ERROR(
flash_ctrl_info_read(page, offset, kBootDataNumWords, buf.data));
if (memcmp(&buf, boot_data, sizeof(boot_data_t)) != 0) {
return kErrorBootDataWriteCheck;
}
return kErrorOk;
}
/**
* Handles access permissions and populates the boot data entry at the given
* page and index.
*
* This function wraps the actual implementation to enable and disable reads,
* writes, and erases (if applicable) for the given page, see
* `boot_data_page_entry_write_impl()`.
*
* @param page A boot data page.
* @param index Index of the entry to write in the given page.
* @param boot_data Entry to write.
* @param erase Whether to erase the page before writing the entry.
* @return The result of the operation.
*/
static rom_error_t boot_data_entry_write(flash_ctrl_info_page_t page,
size_t index,
const boot_data_t *boot_data,
hardened_bool_t erase) {
flash_ctrl_info_mp_set(page, (flash_ctrl_mp_t){
.read = kHardenedBoolTrue,
.write = kHardenedBoolTrue,
.erase = erase,
});
rom_error_t error = boot_data_entry_write_impl(page, index, boot_data, erase);
flash_ctrl_info_mp_set(page, (flash_ctrl_mp_t){
.read = kHardenedBoolFalse,
.write = kHardenedBoolFalse,
.erase = kHardenedBoolFalse,
});
return error;
}
/**
* Invalidates the boot data entry at the given page and index.
*
* This function handles write permissions for the given page and sets the
* `identifier` field of the given entry to `kBootDataInvalidatedIdentifier`
* which will cause both the identifier and the digest checks to fail in
* subsequent reads.
*
* This function must be called only after the new entry is successfully
* written since writes can potentially be interrupted.
*
* @param page A boot data page.
* @param index Index of the entry to invalidate in the given page.
* @return The result of the operation.
*/
static rom_error_t boot_data_entry_invalidate(flash_ctrl_info_page_t page,
size_t index) {
static_assert(offsetof(boot_data_t, identifier) % sizeof(uint32_t) == 0,
"`identifier` must be word aligned.");
const uint32_t offset =
index * sizeof(boot_data_t) + offsetof(boot_data_t, identifier);
const uint32_t val = kBootDataInvalidatedIdentifier;
flash_ctrl_info_mp_set(page, (flash_ctrl_mp_t){
.read = kHardenedBoolFalse,
.write = kHardenedBoolTrue,
.erase = kHardenedBoolFalse,
});
rom_error_t error = flash_ctrl_info_write(page, offset, 1, &val);
flash_ctrl_info_mp_set(page, (flash_ctrl_mp_t){
.read = kHardenedBoolFalse,
.write = kHardenedBoolFalse,
.erase = kHardenedBoolFalse,
});
return error;
}
/**
* A struct that stores some information about the first empty and last valid
* entries in a flash info page.
*/
typedef struct boot_data_page_info {
/**
* Info page.
*/
flash_ctrl_info_page_t page;
/**
* Whether this page has an empty entry.
*/
hardened_bool_t has_empty_entry;
/**
* Index of the first empty entry.
*/
size_t first_empty_index;
/**
* Whether this page has a valid boot data entry.
*/
hardened_bool_t has_valid_entry;
/**
* Index of the last valid entry in the page.
*/
size_t last_valid_index;
/**
* Last valid entry in the page.
*/
boot_data_t last_valid_entry;
} boot_data_page_info_t;
/**
* Populates a page info struct for the given page.
*
* This function performs a forward search to find the first empty boot data
* entry followed by a backward search to find the last valid boot data entry.
* Reads must be enabled for the given page before this function is called, see
* `boot_data_page_info_get()`.
*
* @param page A boot data page.
* @param[out] page_info Page info struct for the given page.
* @return The result of the operation.
*/
static rom_error_t boot_data_page_info_get_impl(
flash_ctrl_info_page_t page, boot_data_page_info_t *page_info) {
uint32_t identifiers[kBootDataEntriesPerPage];
boot_data_buffer_t buf;
page_info->page = page;
page_info->has_empty_entry = kHardenedBoolFalse;
page_info->has_valid_entry = kHardenedBoolFalse;
// Perform a forward search to find the first empty entry.
for (size_t i = 0; i < kBootDataEntriesPerPage; ++i) {
// Read and cache the identifier to quickly determine if an entry can be
// empty or valid.
RETURN_IF_ERROR(boot_data_identifier_read(page, i, &identifiers[i]));
// Check all words of this entry only if it can be empty.
if (identifiers[i] == kBootDataEmptyWordValue) {
RETURN_IF_ERROR(boot_data_entry_read(page, i, &buf));
if (boot_data_is_empty(&buf) == kHardenedBoolTrue) {
page_info->first_empty_index = i;
page_info->has_empty_entry = kHardenedBoolTrue;
break;
}
}
}
// Perform a backward search to find the last valid entry.
size_t start_index = (page_info->has_empty_entry == kHardenedBoolTrue)
? page_info->first_empty_index - 1
: kBootDataEntriesPerPage - 1;
for (size_t i = start_index; i < kBootDataEntriesPerPage; --i) {
// Check the digest only if this entry can be valid.
if (identifiers[i] == kBootDataIdentifier) {
hardened_bool_t is_valid;
RETURN_IF_ERROR(boot_data_entry_read(page, i, &buf));
RETURN_IF_ERROR(boot_data_digest_is_valid(&buf, &is_valid));
if (is_valid == kHardenedBoolTrue) {
memcpy(&page_info->last_valid_entry, &buf, sizeof(boot_data_t));
page_info->last_valid_index = i;
page_info->has_valid_entry = kHardenedBoolTrue;
break;
}
}
}
return kErrorOk;
}
/**
* Handles read permissions and populates a page info struct for the given page.
*
* This function wraps the actual implementation to enable and disable reads for
* the given page, see `boot_data_page_info_get_impl()`.
*
* @param page A boot data page.
* @param[out] page_info Page info struct for the given page.
* @return The result of the operation.
*/
static rom_error_t boot_data_page_info_get(flash_ctrl_info_page_t page,
boot_data_page_info_t *page_info) {
flash_ctrl_info_mp_set(page, (flash_ctrl_mp_t){
.read = kHardenedBoolTrue,
.write = kHardenedBoolFalse,
.erase = kHardenedBoolFalse,
});
rom_error_t error = boot_data_page_info_get_impl(page, page_info);
flash_ctrl_info_mp_set(page, (flash_ctrl_mp_t){
.read = kHardenedBoolFalse,
.write = kHardenedBoolFalse,
.erase = kHardenedBoolFalse,
});
return error;
}
/**
* Finds the active info page and returns its page info struct.
*
* The active info page is the one that has the newest valid boot data entry,
* i.e. the entry with the greatest counter value.
*
* @param[out] page_info Page info struct of the active info page.
* @return The result of the operation.
*/
static rom_error_t boot_data_active_page_find(
boot_data_page_info_t *page_info) {
boot_data_page_info_t page_infos[2];
for (size_t i = 0; i < ARRAYSIZE(kPages); ++i) {
RETURN_IF_ERROR(boot_data_page_info_get(kPages[i], &page_infos[i]));
}
if (page_infos[0].has_valid_entry == kHardenedBoolTrue &&
page_infos[1].has_valid_entry == kHardenedBoolTrue) {
if (page_infos[0].last_valid_entry.counter >
page_infos[1].last_valid_entry.counter) {
*page_info = page_infos[0];
return kErrorOk;
} else if (page_infos[1].last_valid_entry.counter >
page_infos[0].last_valid_entry.counter) {
*page_info = page_infos[1];
return kErrorOk;
} else {
return kErrorBootDataNotFound;
}
} else if (page_infos[0].has_valid_entry == kHardenedBoolTrue) {
*page_info = page_infos[0];
return kErrorOk;
} else if (page_infos[1].has_valid_entry == kHardenedBoolTrue) {
*page_info = page_infos[1];
return kErrorOk;
}
return kErrorBootDataNotFound;
}
/**
* Default boot data to use if the device is in a non-prod state and there is
* no valid boot data entry in the flash info pages.
*/
boot_data_t kBootDataDefault = (boot_data_t){
.digest = {{0xadeb2cd1, 0x9aacb381, 0x45610eeb, 0x129e5fe4, 0x5b56c4ee,
0x438c2b8c, 0x94d04119, 0x7895f206}},
.identifier = kBootDataIdentifier,
// Note: This starts from 5 to have a slightly less trivial value in case we
// need to distinguish the default entry.
.counter = 5,
.min_security_version_rom_ext = 0,
};
/**
* Returns the default boot data.
*
* Default boot data can be used only in TEST_UNLOCKED, DEV, and RMA life cycle
* states.
*
* @param lc_state Life cycle state of the device.
* @param[out] boot_data Default boot data.
* @return The result of the operation.
*/
static rom_error_t boot_data_default_get(lifecycle_state_t lc_state,
boot_data_t *boot_data) {
// TODO(#8778): Default boot data.
switch (lc_state) {
case kLcStateTestUnlocked0:
case kLcStateTestUnlocked1:
case kLcStateTestUnlocked2:
case kLcStateTestUnlocked3:
case kLcStateTestUnlocked4:
case kLcStateTestUnlocked5:
case kLcStateTestUnlocked6:
case kLcStateTestUnlocked7:
case kLcStateDev:
case kLcStateRma:
*boot_data = kBootDataDefault;
return kErrorOk;
default:
return kErrorBootDataNotFound;
}
}
rom_error_t boot_data_read(lifecycle_state_t lc_state, boot_data_t *boot_data) {
boot_data_page_info_t active_page;
rom_error_t error = boot_data_active_page_find(&active_page);
switch (error) {
case kErrorOk:
*boot_data = active_page.last_valid_entry;
return kErrorOk;
case kErrorBootDataNotFound:
// TODO(#8779): Recovery paths for failures in prod life cycle states?
RETURN_IF_ERROR(boot_data_default_get(lc_state, boot_data));
return kErrorOk;
default:
return error;
}
}
rom_error_t boot_data_write(const boot_data_t *boot_data) {
boot_data_t new_entry = *boot_data;
new_entry.identifier = kBootDataIdentifier;
boot_data_page_info_t active_page;
rom_error_t error = boot_data_active_page_find(&active_page);
if (error == kErrorOk) {
// Note: Not checking for wraparound since a successful write will
// invalidate the old entry.
new_entry.counter = active_page.last_valid_entry.counter + 1;
RETURN_IF_ERROR(boot_data_digest_compute(&new_entry, &new_entry.digest));
if (active_page.has_empty_entry == kHardenedBoolTrue) {
RETURN_IF_ERROR(boot_data_entry_write(active_page.page,
active_page.first_empty_index,
&new_entry, kHardenedBoolFalse));
} else {
// Erase the other page and write the new entry there if the active page
// is full.
flash_ctrl_info_page_t new_page =
active_page.page == kPages[0] ? kPages[1] : kPages[0];
RETURN_IF_ERROR(
boot_data_entry_write(new_page, 0, &new_entry, kHardenedBoolTrue));
}
// Invalidate the previous entry so that there is only one valid entry
// across both pages.
RETURN_IF_ERROR(boot_data_entry_invalidate(active_page.page,
active_page.last_valid_index));
} else if (error == kErrorBootDataNotFound) {
// Erase the first page and write the entry there if the active page cannot
// be found, i.e. the storage is not initialized yet.
new_entry.counter = kBootDataDefault.counter + 1;
RETURN_IF_ERROR(boot_data_digest_compute(&new_entry, &new_entry.digest));
RETURN_IF_ERROR(
boot_data_entry_write(kPages[0], 0, &new_entry, kHardenedBoolTrue));
} else {
return error;
}
return kErrorOk;
}