| // Copyright lowRISC contributors. |
| // Licensed under the Apache License, Version 2.0, see LICENSE for details. |
| // SPDX-License-Identifier: Apache-2.0 |
| |
| #include "sw/device/boot_rom/bootstrap.h" |
| |
| #include "sw/device/boot_rom/spiflash_frame.h" |
| #include "sw/device/lib/arch/device.h" |
| #include "sw/device/lib/base/log.h" |
| #include "sw/device/lib/base/memory.h" |
| #include "sw/device/lib/base/mmio.h" |
| #include "sw/device/lib/dif/dif_gpio.h" |
| #include "sw/device/lib/flash_ctrl.h" |
| #include "sw/device/lib/hw_sha256.h" |
| #include "sw/device/lib/runtime/hart.h" |
| #include "sw/device/lib/spi_device.h" |
| |
| #include "hw/top_earlgrey/sw/autogen/top_earlgrey.h" |
| |
| #define GPIO_BOOTSTRAP_BIT_MASK 0x00020000u |
| |
| /** |
| * Check if flash is blank to determine if bootstrap is needed. |
| * |
| * TODO: Update this to check bootstrap pin instead in Verilator. |
| */ |
| static bool bootstrap_requested(void) { |
| // The following flash empty-sniff-check is done this way due to the lack of |
| // clear eflash reset in SIM environments. |
| if (kDeviceType == kDeviceSimVerilator) { |
| mmio_region_t flash_region = mmio_region_from_addr(FLASH_MEM_BASE_ADDR); |
| uint32_t value = mmio_region_read32(flash_region, 0x0); |
| return value == 0 || value == UINT32_MAX; |
| } |
| |
| // Initialize GPIO device. |
| dif_gpio_t gpio; |
| dif_gpio_config_t gpio_config = { |
| .base_addr = mmio_region_from_addr(TOP_EARLGREY_GPIO_BASE_ADDR)}; |
| if (dif_gpio_init(&gpio_config, &gpio) != kDifGpioOk) { |
| LOG_ERROR("Failed to initialize GPIO for bootstrap checking."); |
| return false; |
| } |
| |
| uint32_t gpio_in; |
| if (dif_gpio_all_read(&gpio, &gpio_in) != kDifGpioOk) { |
| LOG_ERROR("Failed to read GPIO for bootstrap checking."); |
| return false; |
| } |
| return (gpio_in & GPIO_BOOTSTRAP_BIT_MASK) != 0; |
| } |
| |
| /** |
| * Erase all flash, and verify blank. |
| */ |
| static int erase_flash(void) { |
| if (flash_bank_erase(FLASH_BANK_0) != 0) { |
| return E_BS_ERASE; |
| } |
| if (flash_bank_erase(FLASH_BANK_1) != 0) { |
| return E_BS_ERASE; |
| } |
| if (flash_check_empty() == 0) { |
| return E_BS_NOTEMPTY; |
| } |
| |
| return 0; |
| } |
| |
| /** |
| * Compares the SHA256 hash of the recieved data with the recieved hash. |
| * |
| * Returns true if the hashes match. |
| */ |
| static bool check_frame_hash(const spiflash_frame_t *frame) { |
| uint8_t hash[sizeof(frame->header.hash)]; |
| uint8_t *data = ((uint8_t *)frame) + sizeof(hash); |
| hw_SHA256_hash(data, sizeof(spiflash_frame_t) - sizeof(hash), hash); |
| |
| return memcmp(hash, frame->header.hash, sizeof(hash)) == 0; |
| } |
| |
| /** |
| * Load spiflash frames from the SPI interface. |
| * |
| * This function checks that the sequence numbers and hashes of the frames are |
| * correct before programming them into flash. |
| * */ |
| static int bootstrap_flash(void) { |
| uint8_t ack[SHA256_DIGEST_SIZE] = {0}; |
| uint32_t expected_frame_num = 0; |
| while (true) { |
| if (spid_bytes_available() >= sizeof(spiflash_frame_t)) { |
| spiflash_frame_t frame; |
| spid_read_nb(&frame, sizeof(spiflash_frame_t)); |
| |
| uint32_t frame_num = SPIFLASH_FRAME_NUM(frame.header.frame_num); |
| LOG_INFO("Processing frame #%d, expecting #%d", frame_num, |
| expected_frame_num); |
| |
| if (frame_num == expected_frame_num) { |
| if (!check_frame_hash(&frame)) { |
| LOG_ERROR("Detected hash mismatch on frame #%d", frame_num); |
| spid_send(ack, sizeof(ack)); |
| continue; |
| } |
| |
| hw_SHA256_hash(&frame, sizeof(spiflash_frame_t), ack); |
| spid_send(ack, sizeof(ack)); |
| |
| if (expected_frame_num == 0) { |
| flash_default_region_access(/*rd_en=*/true, /*prog_en=*/true, |
| /*erase_en=*/true); |
| int flash_error = erase_flash(); |
| if (flash_error != 0) { |
| return flash_error; |
| } |
| LOG_INFO("Flash erase successful"); |
| } |
| |
| if (flash_write(frame.header.flash_offset, kDataPartition, frame.data, |
| SPIFLASH_FRAME_DATA_WORDS) != 0) { |
| return E_BS_WRITE; |
| } |
| |
| ++expected_frame_num; |
| if (SPIFLASH_FRAME_IS_EOF(frame.header.frame_num)) { |
| LOG_INFO("Bootstrap: DONE!"); |
| return 0; |
| } |
| } else { |
| // Send previous ack if unable to verify current frame. |
| spid_send(ack, sizeof(ack)); |
| } |
| } |
| } |
| } |
| |
| int bootstrap(void) { |
| if (!bootstrap_requested()) { |
| return 0; |
| } |
| // SPI device is only initialized in bootstrap mode. |
| LOG_INFO("Bootstrap requested, initialising HW..."); |
| spid_init(); |
| flash_init_block(); |
| |
| LOG_INFO("HW initialisation completed, waiting for SPI input..."); |
| int error = bootstrap_flash(); |
| if (error != 0) { |
| error |= erase_flash(); |
| LOG_ERROR("Bootstrap error: 0x%x", error); |
| } |
| |
| // Always make sure to revert flash_ctrl access to default settings. |
| // bootstrap_flash enables access to flash to perform update. |
| flash_default_region_access(/*rd_en=*/false, /*prog_en=*/false, |
| /*erase_en=*/false); |
| return error; |
| } |