mirror of
https://github.com/Telecominfraproject/OpenCellular.git
synced 2026-01-10 17:41:54 +00:00
Check the flash protection at startup, if the RDP is still at level 0 (no read protection) or if the RO partition is not write protected : - set the write protection on the first 16KB of flash (4 LSB of WRP0) - push the RDP to level 1, so SWD/serial monitor needs to fully erase the part before re-writing the code or the write-protection. Signed-off-by: Vincent Palatin <vpalatin@chromium.org> BRANCH=samus BUG=chrome-os-partner:34935 TEST=dump the content of the option bytes. Change-Id: I11af64365a6fbc34327b2e463eb8e2d369ffacd2 Reviewed-on: https://chromium-review.googlesource.com/238262 Reviewed-by: Alec Berg <alecaberg@chromium.org> Commit-Queue: Vincent Palatin <vpalatin@chromium.org> Trybot-Ready: Vincent Palatin <vpalatin@chromium.org> Tested-by: Vincent Palatin <vpalatin@chromium.org>
102 lines
2.4 KiB
C
102 lines
2.4 KiB
C
/* Copyright (c) 2014 The Chromium OS Authors. All rights reserved.
|
|
* Use of this source code is governed by a BSD-style license that can be
|
|
* found in the LICENSE file.
|
|
*/
|
|
/* Tiny charger configuration */
|
|
|
|
#include "common.h"
|
|
#include "debug.h"
|
|
#include "registers.h"
|
|
#include "rsa.h"
|
|
#include "sha256.h"
|
|
#include "system.h"
|
|
#include "task.h"
|
|
#include "usb_pd.h"
|
|
#include "util.h"
|
|
#include "version.h"
|
|
|
|
/* Insert the RSA public key definition */
|
|
const struct rsa_public_key pkey __attribute__((section(".rsa_pubkey"))) =
|
|
#include "gen_pub_key.h"
|
|
/* The RSA signature is stored at the end of the RW firmware */
|
|
static const void *rw_sig = (void *)CONFIG_FLASH_BASE + CONFIG_FW_RW_OFF
|
|
+ CONFIG_FW_RW_SIZE - RSANUMBYTES;
|
|
/* Large 768-Byte buffer for RSA computation : could be re-use afterwards... */
|
|
static uint32_t rsa_workbuf[3 * RSANUMWORDS];
|
|
|
|
extern void pd_rx_handler(void);
|
|
|
|
/* RW firmware reset vector */
|
|
static uint32_t * const rw_rst =
|
|
(uint32_t *)(CONFIG_FLASH_BASE+CONFIG_FW_RW_OFF+4);
|
|
|
|
/* External interrupt EXTINT7 for external comparator on PA7 */
|
|
void pd_rx_interrupt(void)
|
|
{
|
|
/* trigger reception handling */
|
|
pd_rx_handler();
|
|
}
|
|
DECLARE_IRQ(STM32_IRQ_EXTI4_15, pd_rx_interrupt, 1);
|
|
|
|
static void jump_to_rw(void)
|
|
{
|
|
void (*jump_rw_rst)(void) = (void *)*rw_rst;
|
|
|
|
debug_printf("Jump to RW\n");
|
|
/* Disable interrupts */
|
|
asm volatile("cpsid i");
|
|
/* Call RW firmware reset vector */
|
|
jump_rw_rst();
|
|
}
|
|
|
|
int is_ro_mode(void)
|
|
{
|
|
return (uint32_t)&jump_to_rw < (uint32_t)rw_rst;
|
|
}
|
|
|
|
static int check_rw_valid(void)
|
|
{
|
|
int good;
|
|
void *rw_hash;
|
|
|
|
/* Check if we have a RW firmware flashed */
|
|
if (*rw_rst == 0xffffffff)
|
|
return 0;
|
|
|
|
/* calculate hash of RW */
|
|
rw_hash = flash_hash_rw();
|
|
|
|
good = rsa_verify(&pkey, (void *)rw_sig, rw_hash, rsa_workbuf);
|
|
if (!good) {
|
|
debug_printf("RSA verify FAILED\n");
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
extern void pd_task(void);
|
|
|
|
int main(void)
|
|
{
|
|
hardware_init();
|
|
debug_printf("Power supply started ... %s\n",
|
|
is_ro_mode() ? "RO" : "RW");
|
|
|
|
/* the RO partition protection is not enabled : do it */
|
|
if (!flash_physical_is_permanently_protected())
|
|
flash_physical_permanent_protect();
|
|
|
|
/* Verify RW firmware and use it if valid */
|
|
if (is_ro_mode() && check_rw_valid())
|
|
jump_to_rw();
|
|
|
|
/* background loop for PD events */
|
|
pd_task();
|
|
|
|
debug_printf("background loop exited !\n");
|
|
/* we should never reach that point */
|
|
system_reset(0);
|
|
return 0;
|
|
}
|