mirror of
https://gitlab.com/qemu-project/qemu
synced 2024-11-05 20:35:44 +00:00
54ee564132
In order to correctly report secure boot running firmware the values of certain registers must be set. We don't yet have documentation from ASPEED on what they mean. The meaning is inferred from u-boot's use of them. Introduce properties so the settings can be configured per-machine. Reviewed-by: Peter Delevoryas <pdel@fb.com> Tested-by: Peter Delevoryas <pdel@fb.com> Signed-off-by: Joel Stanley <joel@jms.id.au> Message-Id: <20220628154740.1117349-4-clg@kaod.org> Signed-off-by: Cédric Le Goater <clg@kaod.org>
182 lines
4.7 KiB
C
182 lines
4.7 KiB
C
/*
|
|
* ASPEED Secure Boot Controller
|
|
*
|
|
* Copyright (C) 2021-2022 IBM Corp.
|
|
*
|
|
* Joel Stanley <joel@jms.id.au>
|
|
*
|
|
* SPDX-License-Identifier: GPL-2.0-or-later
|
|
*/
|
|
|
|
#include "qemu/osdep.h"
|
|
#include "qemu/log.h"
|
|
#include "qemu/error-report.h"
|
|
#include "hw/qdev-properties.h"
|
|
#include "hw/misc/aspeed_sbc.h"
|
|
#include "qapi/error.h"
|
|
#include "migration/vmstate.h"
|
|
|
|
#define R_PROT (0x000 / 4)
|
|
#define R_STATUS (0x014 / 4)
|
|
#define R_QSR (0x040 / 4)
|
|
|
|
/* R_STATUS */
|
|
#define ABR_EN BIT(14) /* Mirrors SCU510[11] */
|
|
#define ABR_IMAGE_SOURCE BIT(13)
|
|
#define SPI_ABR_IMAGE_SOURCE BIT(12)
|
|
#define SB_CRYPTO_KEY_EXP_DONE BIT(11)
|
|
#define SB_CRYPTO_BUSY BIT(10)
|
|
#define OTP_WP_EN BIT(9)
|
|
#define OTP_ADDR_WP_EN BIT(8)
|
|
#define LOW_SEC_KEY_EN BIT(7)
|
|
#define SECURE_BOOT_EN BIT(6)
|
|
#define UART_BOOT_EN BIT(5)
|
|
/* bit 4 reserved*/
|
|
#define OTP_CHARGE_PUMP_READY BIT(3)
|
|
#define OTP_IDLE BIT(2)
|
|
#define OTP_MEM_IDLE BIT(1)
|
|
#define OTP_COMPARE_STATUS BIT(0)
|
|
|
|
/* QSR */
|
|
#define QSR_RSA_MASK (0x3 << 12)
|
|
#define QSR_HASH_MASK (0x3 << 10)
|
|
|
|
static uint64_t aspeed_sbc_read(void *opaque, hwaddr addr, unsigned int size)
|
|
{
|
|
AspeedSBCState *s = ASPEED_SBC(opaque);
|
|
|
|
addr >>= 2;
|
|
|
|
if (addr >= ASPEED_SBC_NR_REGS) {
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
"%s: Out-of-bounds read at offset 0x%" HWADDR_PRIx "\n",
|
|
__func__, addr << 2);
|
|
return 0;
|
|
}
|
|
|
|
return s->regs[addr];
|
|
}
|
|
|
|
static void aspeed_sbc_write(void *opaque, hwaddr addr, uint64_t data,
|
|
unsigned int size)
|
|
{
|
|
AspeedSBCState *s = ASPEED_SBC(opaque);
|
|
|
|
addr >>= 2;
|
|
|
|
if (addr >= ASPEED_SBC_NR_REGS) {
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
"%s: Out-of-bounds write at offset 0x%" HWADDR_PRIx "\n",
|
|
__func__, addr << 2);
|
|
return;
|
|
}
|
|
|
|
switch (addr) {
|
|
case R_STATUS:
|
|
case R_QSR:
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
"%s: write to read only register 0x%" HWADDR_PRIx "\n",
|
|
__func__, addr << 2);
|
|
return;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
s->regs[addr] = data;
|
|
}
|
|
|
|
static const MemoryRegionOps aspeed_sbc_ops = {
|
|
.read = aspeed_sbc_read,
|
|
.write = aspeed_sbc_write,
|
|
.endianness = DEVICE_LITTLE_ENDIAN,
|
|
.valid = {
|
|
.min_access_size = 1,
|
|
.max_access_size = 4,
|
|
},
|
|
};
|
|
|
|
static void aspeed_sbc_reset(DeviceState *dev)
|
|
{
|
|
struct AspeedSBCState *s = ASPEED_SBC(dev);
|
|
|
|
memset(s->regs, 0, sizeof(s->regs));
|
|
|
|
/* Set secure boot enabled with RSA4096_SHA256 and enable eMMC ABR */
|
|
s->regs[R_STATUS] = OTP_IDLE | OTP_MEM_IDLE;
|
|
|
|
if (s->emmc_abr) {
|
|
s->regs[R_STATUS] &= ABR_EN;
|
|
}
|
|
|
|
if (s->signing_settings) {
|
|
s->regs[R_STATUS] &= SECURE_BOOT_EN;
|
|
}
|
|
|
|
s->regs[R_QSR] = s->signing_settings;
|
|
}
|
|
|
|
static void aspeed_sbc_realize(DeviceState *dev, Error **errp)
|
|
{
|
|
AspeedSBCState *s = ASPEED_SBC(dev);
|
|
SysBusDevice *sbd = SYS_BUS_DEVICE(dev);
|
|
|
|
memory_region_init_io(&s->iomem, OBJECT(s), &aspeed_sbc_ops, s,
|
|
TYPE_ASPEED_SBC, 0x1000);
|
|
|
|
sysbus_init_mmio(sbd, &s->iomem);
|
|
}
|
|
|
|
static const VMStateDescription vmstate_aspeed_sbc = {
|
|
.name = TYPE_ASPEED_SBC,
|
|
.version_id = 1,
|
|
.minimum_version_id = 1,
|
|
.fields = (VMStateField[]) {
|
|
VMSTATE_UINT32_ARRAY(regs, AspeedSBCState, ASPEED_SBC_NR_REGS),
|
|
VMSTATE_END_OF_LIST(),
|
|
}
|
|
};
|
|
|
|
static Property aspeed_sbc_properties[] = {
|
|
DEFINE_PROP_BOOL("emmc-abr", AspeedSBCState, emmc_abr, 0),
|
|
DEFINE_PROP_UINT32("signing-settings", AspeedSBCState, signing_settings, 0),
|
|
DEFINE_PROP_END_OF_LIST(),
|
|
};
|
|
|
|
static void aspeed_sbc_class_init(ObjectClass *klass, void *data)
|
|
{
|
|
DeviceClass *dc = DEVICE_CLASS(klass);
|
|
|
|
dc->realize = aspeed_sbc_realize;
|
|
dc->reset = aspeed_sbc_reset;
|
|
dc->vmsd = &vmstate_aspeed_sbc;
|
|
device_class_set_props(dc, aspeed_sbc_properties);
|
|
}
|
|
|
|
static const TypeInfo aspeed_sbc_info = {
|
|
.name = TYPE_ASPEED_SBC,
|
|
.parent = TYPE_SYS_BUS_DEVICE,
|
|
.instance_size = sizeof(AspeedSBCState),
|
|
.class_init = aspeed_sbc_class_init,
|
|
.class_size = sizeof(AspeedSBCClass)
|
|
};
|
|
|
|
static void aspeed_ast2600_sbc_class_init(ObjectClass *klass, void *data)
|
|
{
|
|
DeviceClass *dc = DEVICE_CLASS(klass);
|
|
|
|
dc->desc = "AST2600 Secure Boot Controller";
|
|
}
|
|
|
|
static const TypeInfo aspeed_ast2600_sbc_info = {
|
|
.name = TYPE_ASPEED_AST2600_SBC,
|
|
.parent = TYPE_ASPEED_SBC,
|
|
.class_init = aspeed_ast2600_sbc_class_init,
|
|
};
|
|
|
|
static void aspeed_sbc_register_types(void)
|
|
{
|
|
type_register_static(&aspeed_ast2600_sbc_info);
|
|
type_register_static(&aspeed_sbc_info);
|
|
}
|
|
|
|
type_init(aspeed_sbc_register_types);
|