blob: 490ca53b510129fd81b8e8e673e542b79713acb0 [file] [log] [blame]
Chris Frantz84c3a4e2021-05-27 15:59:13 -07001// Copyright lowRISC contributors.
2// Licensed under the Apache License, Version 2.0, see LICENSE for details.
3// SPDX-License-Identifier: Apache-2.0
4
5#include "sw/device/silicon_creator/lib/shutdown.h"
6
7#include <assert.h>
8
9#include "sw/device/lib/base/bitfield.h"
10#include "sw/device/lib/base/macros.h"
11#include "sw/device/lib/base/memory.h"
12#include "sw/device/lib/base/stdasm.h"
13#include "sw/device/lib/runtime/print.h"
14#include "sw/device/silicon_creator/lib/base/abs_mmio.h"
15#include "sw/device/silicon_creator/lib/drivers/alert.h"
16#include "sw/device/silicon_creator/lib/drivers/lifecycle.h"
17
18#include "alert_handler_regs.h"
19#include "flash_ctrl_regs.h"
20#include "hw/top_earlgrey/sw/autogen/top_earlgrey.h"
21#include "keymgr_regs.h"
22#include "otp_ctrl_regs.h"
23#include "sram_ctrl_regs.h"
24
Michael Schaffner1a5d53a2021-06-03 17:44:17 -070025static_assert(ALERT_HANDLER_ALERT_CLASS_SHADOWED_MULTIREG_COUNT <=
Chris Frantz84c3a4e2021-05-27 15:59:13 -070026 OTP_CTRL_PARAM_ROM_ALERT_CLASSIFICATION_SIZE / 4,
27 "More alerts than alert classification OTP words!");
Michael Munday7434fc22021-09-14 11:34:32 +010028static_assert(ALERT_HANDLER_LOC_ALERT_CLASS_SHADOWED_MULTIREG_COUNT <=
29 OTP_CTRL_PARAM_ROM_LOCAL_ALERT_CLASSIFICATION_SIZE / 4,
30 "More local alerts than local alert classification OTP words!");
Chris Frantz84c3a4e2021-05-27 15:59:13 -070031
32#define NO_MODIFIERS
33
34#ifdef OT_OFF_TARGET_TEST
35// If we're building as a unit test, rename the shutdown functions so they
36// can be mocked and/or tested individually.
37// The unmodified function name will be declared as `extern` so the test
38// program can supply its own implementation. The implementation present
39// in this file will be named `unmocked_${name}` so the test program can
40// invoke it for testing.
41#define SHUTDOWN_FUNC(modifiers_, name_) \
42 extern void name_; \
43 void unmocked_##name_
44#else
45#define SHUTDOWN_FUNC(modifiers_, name_) \
46 static ALWAYS_INLINE modifiers_ void name_
47#endif
48
49// TODO: use the real OTP driver after it's converted to abs_mmio.
50#ifdef OT_OFF_TARGET_TEST
51extern uint32_t otp_read32(uint32_t address);
52#else
53inline uint32_t otp_read32(uint32_t address) {
Michael Schaffner968b8c82021-07-08 13:00:50 -070054 return abs_mmio_read32(TOP_EARLGREY_OTP_CTRL_CORE_BASE_ADDR +
Chris Frantz84c3a4e2021-05-27 15:59:13 -070055 OTP_CTRL_SW_CFG_WINDOW_REG_OFFSET + address);
56}
57#endif
58
59// Convert the alert class to an index.
60// This is required because I expect to change the constant definitions in
61// alert_class_t to have reasonable hamming distances.
62static size_t clsindex(alert_class_t cls) {
63 switch (cls) {
64 case kAlertClassA:
65 return 0;
66 case kAlertClassB:
67 return 1;
68 case kAlertClassC:
69 return 2;
70 case kAlertClassD:
71 return 3;
72 default:
73 return 0;
74 }
75}
76
77rom_error_t shutdown_init(lifecycle_state_t lc_state) {
78 // Are we in a lifecycle state which needs alert configuration?
79 uint32_t lc_shift;
80 switch (lc_state) {
81 case kLcStateProd:
82 lc_shift = 0;
83 break;
84 case kLcStateProdEnd:
85 lc_shift = 8;
86 break;
87 case kLcStateDev:
88 lc_shift = 16;
89 break;
90 case kLcStateRma:
91 lc_shift = 24;
92 break;
93 default:
94 // No alert init for any other lifecycle states.
95 return kErrorOk;
96 }
97
98 // Get the enable and escalation settings for all four alert classes.
99 // Each of these OTP words is composed of 4 byte enums with the enable and
100 // escalate configs per alert class (a/b/c/d).
101 uint32_t class_enable = otp_read32(OTP_CTRL_PARAM_ROM_ALERT_CLASS_EN_OFFSET);
102 uint32_t class_escalate =
103 otp_read32(OTP_CTRL_PARAM_ROM_ALERT_ESCALATION_OFFSET);
104 alert_enable_t enable[ALERT_CLASSES];
105 alert_escalate_t escalate[ALERT_CLASSES];
106 for (size_t i = 0; i < ALERT_CLASSES; ++i) {
107 enable[i] = (alert_enable_t)bitfield_field32_read(
108 class_enable, (bitfield_field32_t){.mask = 0xff, .index = i * 8});
109 escalate[i] = (alert_escalate_t)bitfield_field32_read(
110 class_escalate, (bitfield_field32_t){.mask = 0xff, .index = i * 8});
111 }
112
113 // For each alert, read its corresponding OTP word and extract the class
114 // configuration for the current lifecycle state.
115 rom_error_t error = kErrorOk;
Michael Schaffner1a5d53a2021-06-03 17:44:17 -0700116 for (size_t i = 0; i < ALERT_HANDLER_ALERT_CLASS_SHADOWED_MULTIREG_COUNT;
117 ++i) {
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700118 uint32_t value = otp_read32(OTP_CTRL_PARAM_ROM_ALERT_CLASSIFICATION_OFFSET +
119 i * sizeof(uint32_t));
120 alert_class_t cls = (alert_class_t)bitfield_field32_read(
121 value, (bitfield_field32_t){.mask = 0xff, .index = lc_shift});
122 rom_error_t e = alert_configure(i, cls, enable[clsindex(cls)]);
123 if (e != kErrorOk) {
124 // Keep going if there is an error programming one alert. We want to
125 // program them all.
126 error = e;
127 }
128 }
129
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700130 // For each local alert, read its corresponding OTP word and extract the class
131 // configuration for the current lifecycle state.
Michael Munday7434fc22021-09-14 11:34:32 +0100132 for (size_t i = 0; i < ALERT_HANDLER_LOC_ALERT_CLASS_SHADOWED_MULTIREG_COUNT;
133 ++i) {
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700134 uint32_t value = otp_read32(OTP_CTRL_PARAM_ROM_LOCAL_ALERT_CLASSIFICATION_OFFSET +
135 i * sizeof(uint32_t));
136 alert_class_t cls = (alert_class_t)bitfield_field32_read(
137 value, (bitfield_field32_t){.mask = 0xff, .index = lc_shift});
138 rom_error_t e = alert_local_configure(i, cls, enable[clsindex(cls)]);
139 if (e != kErrorOk) {
140 // Keep going if there is an error programming one alert. We want to
141 // program them all.
142 error = e;
143 }
144 }
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700145
146 // For each alert class, configure the various escalation parameters.
147 const alert_class_t kClasses[] = {
148 kAlertClassA,
149 kAlertClassB,
150 kAlertClassC,
151 kAlertClassD,
152 };
153 alert_class_config_t config;
154 for (size_t i = 0; i < ALERT_CLASSES; ++i) {
155 config.enabled = enable[i];
156 config.escalation = escalate[i];
157 config.accum_threshold = otp_read32(
158 OTP_CTRL_PARAM_ROM_ALERT_ACCUM_THRESH_OFFSET + i * sizeof(uint32_t));
159 config.timeout_cycles = otp_read32(
160 OTP_CTRL_PARAM_ROM_ALERT_TIMEOUT_CYCLES_OFFSET + i * sizeof(uint32_t));
161 for (size_t phase = 0; phase < ARRAYSIZE(config.phase_cycles); ++phase) {
162 config.phase_cycles[phase] = otp_read32(
163 OTP_CTRL_PARAM_ROM_ALERT_PHASE_CYCLES_OFFSET +
164 (i * ARRAYSIZE(config.phase_cycles) + phase) * sizeof(uint32_t));
165 }
166
167 rom_error_t e = alert_class_configure(kClasses[i], &config);
168 if (e != kErrorOk) {
169 // Keep going if there is an error programming an alert class. We want to
170 // program them all.
171 error = e;
172 }
173 }
174 return error;
175}
176
177uint32_t shutdown_redact(rom_error_t reason, shutdown_error_redact_t severity) {
178 uint32_t redacted = (uint32_t)reason;
179 if (reason == kErrorOk) {
180 return 0;
181 }
182 switch (severity) {
183 case kShutdownErrorRedactModule:
184 redacted = bitfield_field32_write(redacted, ROM_ERROR_FIELD_MODULE, 0);
185 FALLTHROUGH_INTENDED;
186 case kShutdownErrorRedactError:
187 redacted = bitfield_field32_write(redacted, ROM_ERROR_FIELD_ERROR, 0);
188 FALLTHROUGH_INTENDED;
189 case kShutdownErrorRedactNone:
190 break;
191 case kShutdownErrorRedactAll:
192 FALLTHROUGH_INTENDED;
193 default:
194 redacted = kErrorUnknown;
195 }
196 return redacted;
197}
198
199SHUTDOWN_FUNC(NO_MODIFIERS, shutdown_software_escalate(void)) {
200 // TODO(lowRISC/opentitan#7148): Use a software alert when available.
201 // For now, signal a fatal_intg_error from SRAM.
Michael Schaffner4e7114e2021-07-02 17:57:11 -0700202 enum { kBase = TOP_EARLGREY_SRAM_CTRL_MAIN_REGS_BASE_ADDR };
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700203 abs_mmio_write32(kBase + SRAM_CTRL_ALERT_TEST_REG_OFFSET, 1);
204}
205
206SHUTDOWN_FUNC(NO_MODIFIERS, shutdown_keymgr_kill(void)) {
207 enum {
208 kBase = TOP_EARLGREY_KEYMGR_BASE_ADDR,
209 };
210 uint32_t reg = bitfield_bit32_write(0, KEYMGR_CONTROL_START_BIT, true);
211 reg = bitfield_field32_write(reg, KEYMGR_CONTROL_DEST_SEL_FIELD,
212 KEYMGR_CONTROL_DEST_SEL_VALUE_NONE);
213 reg = bitfield_field32_write(reg, KEYMGR_CONTROL_OPERATION_FIELD,
214 KEYMGR_CONTROL_OPERATION_VALUE_DISABLE);
215 abs_mmio_write32(kBase + KEYMGR_CONTROL_REG_OFFSET, reg);
216 abs_mmio_write32(kBase + KEYMGR_SIDELOAD_CLEAR_REG_OFFSET, 1);
217}
218
219SHUTDOWN_FUNC(NO_MODIFIERS, shutdown_flash_kill(void)) {
220 enum { kBase = TOP_EARLGREY_FLASH_CTRL_CORE_BASE_ADDR };
221 // TODO(lowRISC/opentitan#7148): Add flash disable when the hw is implemented.
222 // abs_mmio_write32(kBase + FLASH_CTRL_FLASH_DISABLE_REG_OFFSET, 1);
223}
224
225SHUTDOWN_FUNC(noreturn, shutdown_hang(void)) {
Michael Schaffner4e7114e2021-07-02 17:57:11 -0700226 enum { kSramCtrlBase = TOP_EARLGREY_SRAM_CTRL_MAIN_REGS_BASE_ADDR };
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700227
228 // Disable SRAM execution and lock the register.
229 abs_mmio_write32(kSramCtrlBase + SRAM_CTRL_EXEC_EN_OFFSET, 0);
230 abs_mmio_write32(kSramCtrlBase + SRAM_CTRL_EXEC_REGWEN_REG_OFFSET, 0);
231
232 // Switch to assembly as RAM (incl. stack) is about to get scrambled.
233#ifdef OT_PLATFORM_RV32
234 while (true) {
235 asm volatile(
236 // Request a new scrambling key, then lock the SRAM control register.
237 "sw %[kRenewKey], %[kCtrlOffset](%[kMainRamCtrlBase]);"
238 "sw zero, %[kRegWriteEn](%[kMainRamCtrlBase]);"
239
240 // TODO(lowRISC/opentitan#7148): restrict the ePMP such that only
241 // ROM may execute. mundaym's suggestion: set entry 2 as a NAPOT
242 // region covering the entire address space, clear all its permission
243 // bits and set the lock bit, and then finally disable RLB to prevent
244 // any further modifications.
245
246 // Generate a halt-maze.
247 "1:"
248 "wfi; wfi; wfi; wfi; j 1b;"
249 "wfi; wfi; j 1b;"
250 "wfi; j 1b;"
251 "wfi;"
252 :
253 : [kRenewKey] "r"(1 << SRAM_CTRL_CTRL_RENEW_SCR_KEY_BIT),
254 [kCtrlOffset] "I"(SRAM_CTRL_CTRL_REG_OFFSET),
255 [kMainRamCtrlBase] "r"(kSramCtrlBase),
256 [kRegWriteEn] "I"(SRAM_CTRL_CTRL_REGWEN_REG_OFFSET));
257 }
258#endif
259}
260
Michael Munday292606a2021-09-17 11:09:53 +0100261#ifndef OT_OFF_TARGET_TEST
262/**
263 * The shutdown_finalize function goes into the .shutdown section which is
264 * placed by the linker script after all other executable code.
265 */
266__attribute__((section(".shutdown")))
267#endif
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700268void shutdown_finalize(rom_error_t reason) {
269 uint32_t redacted_error = shutdown_redact(
270 reason, otp_read32(OTP_CTRL_PARAM_ROM_ERROR_REPORTING_OFFSET));
Michael Munday292606a2021-09-17 11:09:53 +0100271
272 // TODO(lowRISC/opentitan#8236): base_printf is in the .text section.
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700273 base_printf("boot_fault: 0x%08x\n", redacted_error);
Michael Munday292606a2021-09-17 11:09:53 +0100274
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700275 shutdown_software_escalate();
276 shutdown_keymgr_kill();
277 shutdown_flash_kill();
278 // If we get here, we'll wait for the watchdog to reset the chip.
279 shutdown_hang();
280}