aspeed_sbc.c 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182
  1. /*
  2. * ASPEED Secure Boot Controller
  3. *
  4. * Copyright (C) 2021-2022 IBM Corp.
  5. *
  6. * Joel Stanley <joel@jms.id.au>
  7. *
  8. * SPDX-License-Identifier: GPL-2.0-or-later
  9. */
  10. #include "qemu/osdep.h"
  11. #include "qemu/log.h"
  12. #include "qemu/error-report.h"
  13. #include "hw/qdev-properties.h"
  14. #include "hw/misc/aspeed_sbc.h"
  15. #include "qapi/error.h"
  16. #include "migration/vmstate.h"
  17. #define R_PROT (0x000 / 4)
  18. #define R_STATUS (0x014 / 4)
  19. #define R_QSR (0x040 / 4)
  20. /* R_STATUS */
  21. #define ABR_EN BIT(14) /* Mirrors SCU510[11] */
  22. #define ABR_IMAGE_SOURCE BIT(13)
  23. #define SPI_ABR_IMAGE_SOURCE BIT(12)
  24. #define SB_CRYPTO_KEY_EXP_DONE BIT(11)
  25. #define SB_CRYPTO_BUSY BIT(10)
  26. #define OTP_WP_EN BIT(9)
  27. #define OTP_ADDR_WP_EN BIT(8)
  28. #define LOW_SEC_KEY_EN BIT(7)
  29. #define SECURE_BOOT_EN BIT(6)
  30. #define UART_BOOT_EN BIT(5)
  31. /* bit 4 reserved*/
  32. #define OTP_CHARGE_PUMP_READY BIT(3)
  33. #define OTP_IDLE BIT(2)
  34. #define OTP_MEM_IDLE BIT(1)
  35. #define OTP_COMPARE_STATUS BIT(0)
  36. /* QSR */
  37. #define QSR_RSA_MASK (0x3 << 12)
  38. #define QSR_HASH_MASK (0x3 << 10)
  39. static uint64_t aspeed_sbc_read(void *opaque, hwaddr addr, unsigned int size)
  40. {
  41. AspeedSBCState *s = ASPEED_SBC(opaque);
  42. addr >>= 2;
  43. if (addr >= ASPEED_SBC_NR_REGS) {
  44. qemu_log_mask(LOG_GUEST_ERROR,
  45. "%s: Out-of-bounds read at offset 0x%" HWADDR_PRIx "\n",
  46. __func__, addr << 2);
  47. return 0;
  48. }
  49. return s->regs[addr];
  50. }
  51. static void aspeed_sbc_write(void *opaque, hwaddr addr, uint64_t data,
  52. unsigned int size)
  53. {
  54. AspeedSBCState *s = ASPEED_SBC(opaque);
  55. addr >>= 2;
  56. if (addr >= ASPEED_SBC_NR_REGS) {
  57. qemu_log_mask(LOG_GUEST_ERROR,
  58. "%s: Out-of-bounds write at offset 0x%" HWADDR_PRIx "\n",
  59. __func__, addr << 2);
  60. return;
  61. }
  62. switch (addr) {
  63. case R_STATUS:
  64. case R_QSR:
  65. qemu_log_mask(LOG_GUEST_ERROR,
  66. "%s: write to read only register 0x%" HWADDR_PRIx "\n",
  67. __func__, addr << 2);
  68. return;
  69. default:
  70. break;
  71. }
  72. s->regs[addr] = data;
  73. }
  74. static const MemoryRegionOps aspeed_sbc_ops = {
  75. .read = aspeed_sbc_read,
  76. .write = aspeed_sbc_write,
  77. .endianness = DEVICE_LITTLE_ENDIAN,
  78. .valid = {
  79. .min_access_size = 1,
  80. .max_access_size = 4,
  81. },
  82. };
  83. static void aspeed_sbc_reset(DeviceState *dev)
  84. {
  85. struct AspeedSBCState *s = ASPEED_SBC(dev);
  86. memset(s->regs, 0, sizeof(s->regs));
  87. /* Set secure boot enabled with RSA4096_SHA256 and enable eMMC ABR */
  88. s->regs[R_STATUS] = OTP_IDLE | OTP_MEM_IDLE;
  89. if (s->emmc_abr) {
  90. s->regs[R_STATUS] &= ABR_EN;
  91. }
  92. if (s->signing_settings) {
  93. s->regs[R_STATUS] &= SECURE_BOOT_EN;
  94. }
  95. s->regs[R_QSR] = s->signing_settings;
  96. }
  97. static void aspeed_sbc_realize(DeviceState *dev, Error **errp)
  98. {
  99. AspeedSBCState *s = ASPEED_SBC(dev);
  100. SysBusDevice *sbd = SYS_BUS_DEVICE(dev);
  101. memory_region_init_io(&s->iomem, OBJECT(s), &aspeed_sbc_ops, s,
  102. TYPE_ASPEED_SBC, 0x1000);
  103. sysbus_init_mmio(sbd, &s->iomem);
  104. }
  105. static const VMStateDescription vmstate_aspeed_sbc = {
  106. .name = TYPE_ASPEED_SBC,
  107. .version_id = 1,
  108. .minimum_version_id = 1,
  109. .fields = (VMStateField[]) {
  110. VMSTATE_UINT32_ARRAY(regs, AspeedSBCState, ASPEED_SBC_NR_REGS),
  111. VMSTATE_END_OF_LIST(),
  112. }
  113. };
  114. static Property aspeed_sbc_properties[] = {
  115. DEFINE_PROP_BOOL("emmc-abr", AspeedSBCState, emmc_abr, 0),
  116. DEFINE_PROP_UINT32("signing-settings", AspeedSBCState, signing_settings, 0),
  117. DEFINE_PROP_END_OF_LIST(),
  118. };
  119. static void aspeed_sbc_class_init(ObjectClass *klass, void *data)
  120. {
  121. DeviceClass *dc = DEVICE_CLASS(klass);
  122. dc->realize = aspeed_sbc_realize;
  123. dc->reset = aspeed_sbc_reset;
  124. dc->vmsd = &vmstate_aspeed_sbc;
  125. device_class_set_props(dc, aspeed_sbc_properties);
  126. }
  127. static const TypeInfo aspeed_sbc_info = {
  128. .name = TYPE_ASPEED_SBC,
  129. .parent = TYPE_SYS_BUS_DEVICE,
  130. .instance_size = sizeof(AspeedSBCState),
  131. .class_init = aspeed_sbc_class_init,
  132. .class_size = sizeof(AspeedSBCClass)
  133. };
  134. static void aspeed_ast2600_sbc_class_init(ObjectClass *klass, void *data)
  135. {
  136. DeviceClass *dc = DEVICE_CLASS(klass);
  137. dc->desc = "AST2600 Secure Boot Controller";
  138. }
  139. static const TypeInfo aspeed_ast2600_sbc_info = {
  140. .name = TYPE_ASPEED_AST2600_SBC,
  141. .parent = TYPE_ASPEED_SBC,
  142. .class_init = aspeed_ast2600_sbc_class_init,
  143. };
  144. static void aspeed_sbc_register_types(void)
  145. {
  146. type_register_static(&aspeed_ast2600_sbc_info);
  147. type_register_static(&aspeed_sbc_info);
  148. }
  149. type_init(aspeed_sbc_register_types);