blob: 5facbd06d5ef134fc60f13a170cc17380b36eebf [file] [log] [blame]
Chris Frantz84c3a4e2021-05-27 15:59:13 -07001// Copyright lowRISC contributors.
2// Licensed under the Apache License, Version 2.0, see LICENSE for details.
3// SPDX-License-Identifier: Apache-2.0
4
5#include "sw/device/silicon_creator/lib/shutdown.h"
6
7#include <assert.h>
8
Jade Philipoom94cdcea2022-01-27 09:17:47 +00009#include "sw/device/lib/base/abs_mmio.h"
Chris Frantz84c3a4e2021-05-27 15:59:13 -070010#include "sw/device/lib/base/bitfield.h"
11#include "sw/device/lib/base/macros.h"
12#include "sw/device/lib/base/memory.h"
13#include "sw/device/lib/base/stdasm.h"
Chris Frantz84c3a4e2021-05-27 15:59:13 -070014#include "sw/device/silicon_creator/lib/drivers/alert.h"
15#include "sw/device/silicon_creator/lib/drivers/lifecycle.h"
Michael Munday23c2cae2021-09-10 13:55:42 +010016#include "sw/device/silicon_creator/lib/drivers/otp.h"
Michael Munday435f5cd2021-10-13 21:45:54 +010017#include "sw/device/silicon_creator/lib/log.h"
Chris Frantz84c3a4e2021-05-27 15:59:13 -070018
19#include "alert_handler_regs.h"
20#include "flash_ctrl_regs.h"
21#include "hw/top_earlgrey/sw/autogen/top_earlgrey.h"
22#include "keymgr_regs.h"
Michael Munday23c2cae2021-09-10 13:55:42 +010023#include "lc_ctrl_regs.h"
Chris Frantz84c3a4e2021-05-27 15:59:13 -070024#include "otp_ctrl_regs.h"
Alphan Ulusoy6968f4f2022-01-17 10:03:10 -050025#include "rv_core_ibex_regs.h"
Chris Frantz84c3a4e2021-05-27 15:59:13 -070026#include "sram_ctrl_regs.h"
27
Michael Schaffner1a5d53a2021-06-03 17:44:17 -070028static_assert(ALERT_HANDLER_ALERT_CLASS_SHADOWED_MULTIREG_COUNT <=
Chris Frantz84c3a4e2021-05-27 15:59:13 -070029 OTP_CTRL_PARAM_ROM_ALERT_CLASSIFICATION_SIZE / 4,
30 "More alerts than alert classification OTP words!");
Michael Munday7434fc22021-09-14 11:34:32 +010031static_assert(ALERT_HANDLER_LOC_ALERT_CLASS_SHADOWED_MULTIREG_COUNT <=
32 OTP_CTRL_PARAM_ROM_LOCAL_ALERT_CLASSIFICATION_SIZE / 4,
33 "More local alerts than local alert classification OTP words!");
Chris Frantz84c3a4e2021-05-27 15:59:13 -070034
35#define NO_MODIFIERS
36
37#ifdef OT_OFF_TARGET_TEST
38// If we're building as a unit test, rename the shutdown functions so they
39// can be mocked and/or tested individually.
40// The unmodified function name will be declared as `extern` so the test
41// program can supply its own implementation. The implementation present
42// in this file will be named `unmocked_${name}` so the test program can
43// invoke it for testing.
44#define SHUTDOWN_FUNC(modifiers_, name_) \
45 extern void name_; \
46 void unmocked_##name_
47#else
48#define SHUTDOWN_FUNC(modifiers_, name_) \
49 static ALWAYS_INLINE modifiers_ void name_
50#endif
51
Chris Frantz84c3a4e2021-05-27 15:59:13 -070052// Convert the alert class to an index.
53// This is required because I expect to change the constant definitions in
54// alert_class_t to have reasonable hamming distances.
55static size_t clsindex(alert_class_t cls) {
56 switch (cls) {
57 case kAlertClassA:
58 return 0;
59 case kAlertClassB:
60 return 1;
61 case kAlertClassC:
62 return 2;
63 case kAlertClassD:
64 return 3;
65 default:
66 return 0;
67 }
68}
69
70rom_error_t shutdown_init(lifecycle_state_t lc_state) {
71 // Are we in a lifecycle state which needs alert configuration?
72 uint32_t lc_shift;
73 switch (lc_state) {
Alphan Ulusoy7bb57152022-01-26 16:25:56 -050074 case kLcStateTest:
Michael Munday0c972812021-09-14 13:53:06 +010075 // Don't configure alerts during manufacturing as OTP may not have been
76 // programmed yet.
77 return kErrorOk;
Chris Frantz84c3a4e2021-05-27 15:59:13 -070078 case kLcStateProd:
79 lc_shift = 0;
80 break;
81 case kLcStateProdEnd:
82 lc_shift = 8;
83 break;
84 case kLcStateDev:
85 lc_shift = 16;
86 break;
87 case kLcStateRma:
88 lc_shift = 24;
89 break;
90 default:
Michael Munday0c972812021-09-14 13:53:06 +010091 // Invalid lifecycle state.
92 shutdown_finalize(kErrorShutdownBadLcState);
93
94 // Reachable if using a mock implementation of `shutdown_finalize`.
95 return kErrorShutdownBadLcState;
Chris Frantz84c3a4e2021-05-27 15:59:13 -070096 }
97
98 // Get the enable and escalation settings for all four alert classes.
99 // Each of these OTP words is composed of 4 byte enums with the enable and
100 // escalate configs per alert class (a/b/c/d).
101 uint32_t class_enable = otp_read32(OTP_CTRL_PARAM_ROM_ALERT_CLASS_EN_OFFSET);
102 uint32_t class_escalate =
103 otp_read32(OTP_CTRL_PARAM_ROM_ALERT_ESCALATION_OFFSET);
104 alert_enable_t enable[ALERT_CLASSES];
105 alert_escalate_t escalate[ALERT_CLASSES];
106 for (size_t i = 0; i < ALERT_CLASSES; ++i) {
107 enable[i] = (alert_enable_t)bitfield_field32_read(
108 class_enable, (bitfield_field32_t){.mask = 0xff, .index = i * 8});
109 escalate[i] = (alert_escalate_t)bitfield_field32_read(
110 class_escalate, (bitfield_field32_t){.mask = 0xff, .index = i * 8});
111 }
112
113 // For each alert, read its corresponding OTP word and extract the class
114 // configuration for the current lifecycle state.
115 rom_error_t error = kErrorOk;
Michael Schaffner1a5d53a2021-06-03 17:44:17 -0700116 for (size_t i = 0; i < ALERT_HANDLER_ALERT_CLASS_SHADOWED_MULTIREG_COUNT;
117 ++i) {
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700118 uint32_t value = otp_read32(OTP_CTRL_PARAM_ROM_ALERT_CLASSIFICATION_OFFSET +
119 i * sizeof(uint32_t));
120 alert_class_t cls = (alert_class_t)bitfield_field32_read(
121 value, (bitfield_field32_t){.mask = 0xff, .index = lc_shift});
122 rom_error_t e = alert_configure(i, cls, enable[clsindex(cls)]);
123 if (e != kErrorOk) {
124 // Keep going if there is an error programming one alert. We want to
125 // program them all.
126 error = e;
127 }
128 }
129
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700130 // For each local alert, read its corresponding OTP word and extract the class
131 // configuration for the current lifecycle state.
Michael Munday7434fc22021-09-14 11:34:32 +0100132 for (size_t i = 0; i < ALERT_HANDLER_LOC_ALERT_CLASS_SHADOWED_MULTIREG_COUNT;
133 ++i) {
Michael Munday32cc6a72021-09-30 13:55:53 +0100134 uint32_t value =
135 otp_read32(OTP_CTRL_PARAM_ROM_LOCAL_ALERT_CLASSIFICATION_OFFSET +
136 i * sizeof(uint32_t));
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700137 alert_class_t cls = (alert_class_t)bitfield_field32_read(
138 value, (bitfield_field32_t){.mask = 0xff, .index = lc_shift});
139 rom_error_t e = alert_local_configure(i, cls, enable[clsindex(cls)]);
140 if (e != kErrorOk) {
141 // Keep going if there is an error programming one alert. We want to
142 // program them all.
143 error = e;
144 }
145 }
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700146
147 // For each alert class, configure the various escalation parameters.
148 const alert_class_t kClasses[] = {
149 kAlertClassA,
150 kAlertClassB,
151 kAlertClassC,
152 kAlertClassD,
153 };
154 alert_class_config_t config;
155 for (size_t i = 0; i < ALERT_CLASSES; ++i) {
156 config.enabled = enable[i];
157 config.escalation = escalate[i];
158 config.accum_threshold = otp_read32(
159 OTP_CTRL_PARAM_ROM_ALERT_ACCUM_THRESH_OFFSET + i * sizeof(uint32_t));
160 config.timeout_cycles = otp_read32(
161 OTP_CTRL_PARAM_ROM_ALERT_TIMEOUT_CYCLES_OFFSET + i * sizeof(uint32_t));
162 for (size_t phase = 0; phase < ARRAYSIZE(config.phase_cycles); ++phase) {
163 config.phase_cycles[phase] = otp_read32(
164 OTP_CTRL_PARAM_ROM_ALERT_PHASE_CYCLES_OFFSET +
165 (i * ARRAYSIZE(config.phase_cycles) + phase) * sizeof(uint32_t));
166 }
167
168 rom_error_t e = alert_class_configure(kClasses[i], &config);
169 if (e != kErrorOk) {
170 // Keep going if there is an error programming an alert class. We want to
171 // program them all.
172 error = e;
173 }
174 }
175 return error;
176}
177
Michael Munday23c2cae2021-09-10 13:55:42 +0100178/**
179 * Implementation of `shutdown_redact` that is guaranteed to be inlined.
180 *
181 * This function must be inlined because it is called from `shutdown_finalize`.
182 */
183static ALWAYS_INLINE uint32_t
184shutdown_redact_inline(rom_error_t reason, shutdown_error_redact_t severity) {
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700185 uint32_t redacted = (uint32_t)reason;
186 if (reason == kErrorOk) {
187 return 0;
188 }
189 switch (severity) {
190 case kShutdownErrorRedactModule:
191 redacted = bitfield_field32_write(redacted, ROM_ERROR_FIELD_MODULE, 0);
192 FALLTHROUGH_INTENDED;
193 case kShutdownErrorRedactError:
194 redacted = bitfield_field32_write(redacted, ROM_ERROR_FIELD_ERROR, 0);
195 FALLTHROUGH_INTENDED;
196 case kShutdownErrorRedactNone:
197 break;
198 case kShutdownErrorRedactAll:
199 FALLTHROUGH_INTENDED;
200 default:
201 redacted = kErrorUnknown;
202 }
203 return redacted;
204}
205
Michael Munday23c2cae2021-09-10 13:55:42 +0100206uint32_t shutdown_redact(rom_error_t reason, shutdown_error_redact_t severity) {
207 return shutdown_redact_inline(reason, severity);
208}
209
210/**
211 * Implementation of `shutdown_redact_policy` that is guaranteed to be inlined.
212 *
213 * This function must be inlined because it is called from `shutdown_finalize`.
214 */
215static ALWAYS_INLINE shutdown_error_redact_t
216shutdown_redact_policy_inline(void) {
217 // Determine the error code redaction policy to apply according to the
218 // lifecycle state and OTP configuration.
219 //
220 // Note that we cannot use the lifecycle or OTP libraries since an error
221 // may trigger a call to `shutdown_finalize`.
Alphan Ulusoy7bb57152022-01-26 16:25:56 -0500222 uint32_t raw_state =
223 bitfield_field32_read(abs_mmio_read32(TOP_EARLGREY_LC_CTRL_BASE_ADDR +
224 LC_CTRL_LC_STATE_REG_OFFSET),
225 LC_CTRL_LC_STATE_STATE_FIELD);
226 switch (raw_state) {
227 case LC_CTRL_LC_STATE_STATE_VALUE_TEST_UNLOCKED0:
228 case LC_CTRL_LC_STATE_STATE_VALUE_TEST_UNLOCKED1:
229 case LC_CTRL_LC_STATE_STATE_VALUE_TEST_UNLOCKED2:
230 case LC_CTRL_LC_STATE_STATE_VALUE_TEST_UNLOCKED3:
231 case LC_CTRL_LC_STATE_STATE_VALUE_TEST_UNLOCKED4:
232 case LC_CTRL_LC_STATE_STATE_VALUE_TEST_UNLOCKED5:
233 case LC_CTRL_LC_STATE_STATE_VALUE_TEST_UNLOCKED6:
234 case LC_CTRL_LC_STATE_STATE_VALUE_TEST_UNLOCKED7:
235 case LC_CTRL_LC_STATE_STATE_VALUE_RMA:
Michael Mundaya76b48d2021-11-23 14:41:44 +0000236 // No error redaction in TEST_UNLOCKED and RMA states.
Michael Munday23c2cae2021-09-10 13:55:42 +0100237 return kShutdownErrorRedactNone;
Alphan Ulusoy7bb57152022-01-26 16:25:56 -0500238 case LC_CTRL_LC_STATE_STATE_VALUE_DEV:
239 case LC_CTRL_LC_STATE_STATE_VALUE_PROD:
240 case LC_CTRL_LC_STATE_STATE_VALUE_PROD_END:
Michael Munday23c2cae2021-09-10 13:55:42 +0100241 // In production states use the redaction level specified in OTP.
242 return (shutdown_error_redact_t)abs_mmio_read32(
243 TOP_EARLGREY_OTP_CTRL_CORE_BASE_ADDR +
244 OTP_CTRL_SW_CFG_WINDOW_REG_OFFSET +
245 OTP_CTRL_PARAM_ROM_ERROR_REPORTING_OFFSET);
246 default:
247 // Redact everything if in an unexpected lifecycle state.
248 return kShutdownErrorRedactAll;
249 }
250}
251
252shutdown_error_redact_t shutdown_redact_policy(void) {
253 return shutdown_redact_policy_inline();
254}
255
256SHUTDOWN_FUNC(NO_MODIFIERS, shutdown_report_error(rom_error_t reason)) {
257 // Call the inline variant of `shutdown_redact_policy` because we want to
258 // guarantee that we won't jump to a different function.
259 shutdown_error_redact_t policy = shutdown_redact_policy_inline();
260
261 // Call the inline variant of `shutdown_redact` because we want to guarantee
262 // that we won't jump to a different function.
263 uint32_t redacted_error = shutdown_redact_inline(reason, policy);
264
Michael Munday435f5cd2021-10-13 21:45:54 +0100265 // TODO(lowRISC/opentitan#8236): log_printf is in the .text section.
266 log_printf("boot_fault: 0x%x\n", (unsigned int)redacted_error);
Michael Munday23c2cae2021-09-10 13:55:42 +0100267}
268
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700269SHUTDOWN_FUNC(NO_MODIFIERS, shutdown_software_escalate(void)) {
Alphan Ulusoy6968f4f2022-01-17 10:03:10 -0500270 enum { kBase = TOP_EARLGREY_RV_CORE_IBEX_CFG_BASE_ADDR };
271 // Setting rv_core_ibex.SW_FATAL_ERR (rw0c) to any value other than
272 // `kMultiBitBool4False` will continuously cause alert events.
273 abs_mmio_write32(kBase + RV_CORE_IBEX_SW_FATAL_ERR_REG_OFFSET, 0);
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700274}
275
276SHUTDOWN_FUNC(NO_MODIFIERS, shutdown_keymgr_kill(void)) {
277 enum {
278 kBase = TOP_EARLGREY_KEYMGR_BASE_ADDR,
279 };
Timothy Chenb8a10932022-01-27 20:47:28 -0800280 uint32_t reg =
281 bitfield_field32_write(0, KEYMGR_CONTROL_SHADOWED_DEST_SEL_FIELD,
282 KEYMGR_CONTROL_SHADOWED_DEST_SEL_VALUE_NONE);
283 reg = bitfield_field32_write(reg, KEYMGR_CONTROL_SHADOWED_OPERATION_FIELD,
284 KEYMGR_CONTROL_SHADOWED_OPERATION_VALUE_DISABLE);
285 abs_mmio_write32_shadowed(kBase + KEYMGR_CONTROL_SHADOWED_REG_OFFSET, reg);
286
287 abs_mmio_write32(kBase + KEYMGR_START_REG_OFFSET, 1);
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700288 abs_mmio_write32(kBase + KEYMGR_SIDELOAD_CLEAR_REG_OFFSET, 1);
289}
290
291SHUTDOWN_FUNC(NO_MODIFIERS, shutdown_flash_kill(void)) {
292 enum { kBase = TOP_EARLGREY_FLASH_CTRL_CORE_BASE_ADDR };
Michael Munday319dbc82021-12-07 15:14:55 +0000293 // Setting DIS (rw0c) to a value other than 5 will disable flash permanently.
294 abs_mmio_write32(kBase + FLASH_CTRL_DIS_REG_OFFSET, 0);
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700295}
296
297SHUTDOWN_FUNC(noreturn, shutdown_hang(void)) {
Michael Schaffner4e7114e2021-07-02 17:57:11 -0700298 enum { kSramCtrlBase = TOP_EARLGREY_SRAM_CTRL_MAIN_REGS_BASE_ADDR };
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700299
300 // Disable SRAM execution and lock the register.
301 abs_mmio_write32(kSramCtrlBase + SRAM_CTRL_EXEC_EN_OFFSET, 0);
302 abs_mmio_write32(kSramCtrlBase + SRAM_CTRL_EXEC_REGWEN_REG_OFFSET, 0);
303
304 // Switch to assembly as RAM (incl. stack) is about to get scrambled.
305#ifdef OT_PLATFORM_RV32
306 while (true) {
307 asm volatile(
308 // Request a new scrambling key, then lock the SRAM control register.
309 "sw %[kRenewKey], %[kCtrlOffset](%[kMainRamCtrlBase]);"
310 "sw zero, %[kRegWriteEn](%[kMainRamCtrlBase]);"
311
312 // TODO(lowRISC/opentitan#7148): restrict the ePMP such that only
313 // ROM may execute. mundaym's suggestion: set entry 2 as a NAPOT
314 // region covering the entire address space, clear all its permission
315 // bits and set the lock bit, and then finally disable RLB to prevent
316 // any further modifications.
317
318 // Generate a halt-maze.
319 "1:"
320 "wfi; wfi; wfi; wfi; j 1b;"
321 "wfi; wfi; j 1b;"
322 "wfi; j 1b;"
323 "wfi;"
324 :
325 : [kRenewKey] "r"(1 << SRAM_CTRL_CTRL_RENEW_SCR_KEY_BIT),
326 [kCtrlOffset] "I"(SRAM_CTRL_CTRL_REG_OFFSET),
327 [kMainRamCtrlBase] "r"(kSramCtrlBase),
328 [kRegWriteEn] "I"(SRAM_CTRL_CTRL_REGWEN_REG_OFFSET));
329 }
330#endif
331}
332
Michael Munday292606a2021-09-17 11:09:53 +0100333#ifndef OT_OFF_TARGET_TEST
334/**
335 * The shutdown_finalize function goes into the .shutdown section which is
336 * placed by the linker script after all other executable code.
337 */
338__attribute__((section(".shutdown")))
339#endif
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700340void shutdown_finalize(rom_error_t reason) {
Michael Munday23c2cae2021-09-10 13:55:42 +0100341 shutdown_report_error(reason);
Chris Frantz84c3a4e2021-05-27 15:59:13 -0700342 shutdown_software_escalate();
343 shutdown_keymgr_kill();
344 shutdown_flash_kill();
345 // If we get here, we'll wait for the watchdog to reset the chip.
346 shutdown_hang();
347}