2
* ASPEED Secure Boot Controller
4
* Copyright (C) 2021-2022 IBM Corp.
6
* Joel Stanley <joel@jms.id.au>
8
* SPDX-License-Identifier: GPL-2.0-or-later
11
#include "qemu/osdep.h"
13
#include "qemu/error-report.h"
14
#include "hw/qdev-properties.h"
15
#include "hw/misc/aspeed_sbc.h"
16
#include "qapi/error.h"
17
#include "migration/vmstate.h"
19
#define R_PROT (0x000 / 4)
20
#define R_STATUS (0x014 / 4)
21
#define R_QSR (0x040 / 4)
24
#define ABR_EN BIT(14) /* Mirrors SCU510[11] */
25
#define ABR_IMAGE_SOURCE BIT(13)
26
#define SPI_ABR_IMAGE_SOURCE BIT(12)
27
#define SB_CRYPTO_KEY_EXP_DONE BIT(11)
28
#define SB_CRYPTO_BUSY BIT(10)
29
#define OTP_WP_EN BIT(9)
30
#define OTP_ADDR_WP_EN BIT(8)
31
#define LOW_SEC_KEY_EN BIT(7)
32
#define SECURE_BOOT_EN BIT(6)
33
#define UART_BOOT_EN BIT(5)
35
#define OTP_CHARGE_PUMP_READY BIT(3)
36
#define OTP_IDLE BIT(2)
37
#define OTP_MEM_IDLE BIT(1)
38
#define OTP_COMPARE_STATUS BIT(0)
41
#define QSR_RSA_MASK (0x3 << 12)
42
#define QSR_HASH_MASK (0x3 << 10)
44
static uint64_t aspeed_sbc_read(void *opaque, hwaddr addr, unsigned int size)
46
AspeedSBCState *s = ASPEED_SBC(opaque);
50
if (addr >= ASPEED_SBC_NR_REGS) {
51
qemu_log_mask(LOG_GUEST_ERROR,
52
"%s: Out-of-bounds read at offset 0x%" HWADDR_PRIx "\n",
60
static void aspeed_sbc_write(void *opaque, hwaddr addr, uint64_t data,
63
AspeedSBCState *s = ASPEED_SBC(opaque);
67
if (addr >= ASPEED_SBC_NR_REGS) {
68
qemu_log_mask(LOG_GUEST_ERROR,
69
"%s: Out-of-bounds write at offset 0x%" HWADDR_PRIx "\n",
77
qemu_log_mask(LOG_GUEST_ERROR,
78
"%s: write to read only register 0x%" HWADDR_PRIx "\n",
88
static const MemoryRegionOps aspeed_sbc_ops = {
89
.read = aspeed_sbc_read,
90
.write = aspeed_sbc_write,
91
.endianness = DEVICE_LITTLE_ENDIAN,
98
static void aspeed_sbc_reset(DeviceState *dev)
100
struct AspeedSBCState *s = ASPEED_SBC(dev);
102
memset(s->regs, 0, sizeof(s->regs));
104
/* Set secure boot enabled with RSA4096_SHA256 and enable eMMC ABR */
105
s->regs[R_STATUS] = OTP_IDLE | OTP_MEM_IDLE;
108
s->regs[R_STATUS] &= ABR_EN;
111
if (s->signing_settings) {
112
s->regs[R_STATUS] &= SECURE_BOOT_EN;
115
s->regs[R_QSR] = s->signing_settings;
118
static void aspeed_sbc_realize(DeviceState *dev, Error **errp)
120
AspeedSBCState *s = ASPEED_SBC(dev);
121
SysBusDevice *sbd = SYS_BUS_DEVICE(dev);
123
memory_region_init_io(&s->iomem, OBJECT(s), &aspeed_sbc_ops, s,
124
TYPE_ASPEED_SBC, 0x1000);
126
sysbus_init_mmio(sbd, &s->iomem);
129
static const VMStateDescription vmstate_aspeed_sbc = {
130
.name = TYPE_ASPEED_SBC,
132
.minimum_version_id = 1,
133
.fields = (const VMStateField[]) {
134
VMSTATE_UINT32_ARRAY(regs, AspeedSBCState, ASPEED_SBC_NR_REGS),
135
VMSTATE_END_OF_LIST(),
139
static Property aspeed_sbc_properties[] = {
140
DEFINE_PROP_BOOL("emmc-abr", AspeedSBCState, emmc_abr, 0),
141
DEFINE_PROP_UINT32("signing-settings", AspeedSBCState, signing_settings, 0),
142
DEFINE_PROP_END_OF_LIST(),
145
static void aspeed_sbc_class_init(ObjectClass *klass, void *data)
147
DeviceClass *dc = DEVICE_CLASS(klass);
149
dc->realize = aspeed_sbc_realize;
150
dc->reset = aspeed_sbc_reset;
151
dc->vmsd = &vmstate_aspeed_sbc;
152
device_class_set_props(dc, aspeed_sbc_properties);
155
static const TypeInfo aspeed_sbc_info = {
156
.name = TYPE_ASPEED_SBC,
157
.parent = TYPE_SYS_BUS_DEVICE,
158
.instance_size = sizeof(AspeedSBCState),
159
.class_init = aspeed_sbc_class_init,
160
.class_size = sizeof(AspeedSBCClass)
163
static void aspeed_ast2600_sbc_class_init(ObjectClass *klass, void *data)
165
DeviceClass *dc = DEVICE_CLASS(klass);
167
dc->desc = "AST2600 Secure Boot Controller";
170
static const TypeInfo aspeed_ast2600_sbc_info = {
171
.name = TYPE_ASPEED_AST2600_SBC,
172
.parent = TYPE_ASPEED_SBC,
173
.class_init = aspeed_ast2600_sbc_class_init,
176
static void aspeed_sbc_register_types(void)
178
type_register_static(&aspeed_ast2600_sbc_info);
179
type_register_static(&aspeed_sbc_info);
182
type_init(aspeed_sbc_register_types);