Skip to content

Commit

Permalink
hss: e51-lockdown: Add description for lockdown
Browse files Browse the repository at this point in the history
Signed-off-by: Ivan Griffin <ivan.griffin@microchip.com>
  • Loading branch information
Ivan Griffin committed Jul 23, 2024
1 parent a63b29f commit 659cd04
Show file tree
Hide file tree
Showing 14 changed files with 181 additions and 0 deletions.
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -39,6 +39,7 @@
- [Cryptography with OpenSSL](./how-to/cryptography-with-openssl.md)

- HSS And U-Boot
- [E51 Lockdown Service](./hss-and-u-boot/e51-lockdown-service.md)
- [HSS Payloads](./hss-and-u-boot/hss-payloads.md)
- [Profiling](./hss-and-u-boot/profiling.md)
- [Reboot](./hss-and-u-boot/reboot.md)
Expand Down
1 change: 1 addition & 0 deletions hss-and-u-boot/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
# HSS And U-Boot Index

- HSS And U-Boot
- [E51 Lockdown Service](./e51-lockdown-service.md)
- [HSS Payloads](./hss-payloads.md)
- [Profiling](./profiling.md)
- [Reboot](./reboot.md)
Expand Down
179 changes: 179 additions & 0 deletions hss-and-u-boot/e51-lockdown-service.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,179 @@
# PolarFire SoC: Hart Software Services E51 Lockdown Service

* [Overview](#overview)
* [What is the HSS exactly?](#what-is-the-HSS-exactly)
* [System Startup](#system-startup)
* [Focusing on the HSS portion of System Startup](#focusing-on-the-HSS-portion-of-system-startup)
* [E51 Lockdown](#e51-lockdown)
* [Reducing Footprint](#reducing-footprint)
* [Conclusions](#conclusions)

<a name="overview"></a>

## Overview

This document introduced the HSS E51 Lockdown Service, which is intended
to provide a convenient mechanism for customers to limit and restrict
what code runs on the E51 once the system has successfully booted.

We'll describe what the HSS is, and how it is responsible for system
startup. We'll look in more detail at the way the services provided by
the HSS are structured. Finally, we'll look at how the E51 Lockdown
Service interacts with these services and provides hooks for the
developer to take control of what the E51 is going to do after a
successful system boot-up.

<a name="what-is-the-HSS-exacty"></a>

## What is the HSS exactly?

The Hart Software Services (HSS) is a zero-stage boot loader, system
monitor and Runtime Services Provider for Applications:

* The HSS supports early system setup, and DDR training.

* The HSS supports secure boot and hardware partitioning/separation

* The HSS supports booting from eMMC/SDCard and QSPI.

Normally (especially with AMP applications), it is expected that the HSS
will stay resident to allow per-context reboot (i.e reboot one context
only, without full-chip reboot), and to allow the HSS to monitor health
(ECCs, Lock Status Bits, Bus Errors, SBI errors, PMP violations, etc).

However, it is possible to put the HSS into lockdown mode once the U54
Application Harts have booted.

<a name="system-startup"></a>

## System Startup

In order to understand exactly what the E51 Lockdown Service does, let's
start with some background on the way the HSS starts the system and gets
it up and running.

The HSS starts running from eNVM, where it decompressed itself from eNVM
to L2-Scratch memory.

![](images/e51-lockdown-service/image1.png)

Once decompression has completed, it jumps from eNVM to L2Scratch into
an executable consisting of three components:

* mpfs-hal and bare metal drivers

* OpenSBI (modified slightly for AMP purposes)

* HSS services (state machines run in a superloop)

![](images/e51-lockdown-service/image2.png)

The HSS service "Startup" initializes the hardware (mpfs-hal, trains DDR, etc.)
and OpenSBI.

![A diagram of a computer Description automatically generated with
medium confidence](images/e51-lockdown-service/image3.png)

The HSS then fetches the application workload (payload.bin) file from
external storage -- eMMC/SD/QSPI.

![](images/e51-lockdown-service/image4.png)

The HSS parses the data chunks from the payload.bin file, copying them
as required to their final runtime destinations. Once this is complete,
it runs the applications encapsulated in the payload.bin by starting
their respective AMP context(s).

![](images/e51-lockdown-service/image5.png)

Finally, the HSS instructs the U54 Application harts to start running
the application payload code, and any second stage boot loaders run on
them (e.g. U-Boot to bring-up Linux)...

![](images/e51-lockdown-service/image6.png)

<a name="focusing-on-the-HSS-portion-of-system-startup"></a>

### Focusing on the HSS portion of System Startup

At this point, let's focus specifically on the HSS aspects of system
start-up and look in more detail on the various services it runs.

![](images/e51-lockdown-service/image7.png)

The HSS implements its services as state machines that are run by a
superloop. Each time around the loop, every service is given an
opportunity to run and to progress state.

State machines synchronize with each other using notifications of
events, which trigger state machines of interest to progress.

![](images/e51-lockdown-service/image8.png)

For example, once inter-hart comms (IHC + IPI) is brought up, the DDR
state machine starts and farms DDR training work off to U54\_1. Once DDR
training is complete, any boot service depending on it can start, etc.

<a name="e51-lockdown"></a>

## E51 Lockdown

The v2024.06 release of the HSS introduced the Lockdown Service.

It can be enabled using the Kconfig option CONFIG\_SERVICE\_LOCKDOWN.

The lockdown service is intended to allow restriction of the activities
of the HSS after it boots the U54 application Harts.

![](images/e51-lockdown-service/image9.png)

The Lockdown Service is triggered by EVENT\_BOOT\_COMPLETE.

Once it starts, it blocks all other state machines from running.

It calls two weakly bound functions:

* e51\_pmp\_lockdown() and

* e51\_lockdown()

These functions are intended to be overridden by board-specific code.
The default implementation will just service the watchdog at this point
in the E51. See services/lockdown/lockdown\_service.c for details.

![](images/e51-lockdown-service/image10.png)

<a name="reducing-footprint"></a>

### Reducing Footprint

In addition to using the Lockdown Service, depending on what choices are
made as regards PMP-restricting the E51 (and thus HSS), it may make
sense to disable services not of interest to reduce the footprint of the
HSS.

These include the scrub, tinycli, usbdmsc, beu and healthmon services.

* These services will \*not\* be run once lockdown is active, but they
also won't be automatically removed from the build.

* They can be individually disabled using Kconfig.

![](images/e51-lockdown-service/image11.png)

<A name="conclusions"></a>

## Conclusions

This document introduced the HSS E51 Lockdown Service, which is intended
to provide a convenient mechanism for customers to limit and restrict
what code runs on the E51 once the system has successfully booted.

At the most extreme level (with no watchdog support), it is possible to
have the E51 remain in the equivalent of a `while (1) { ; }` loop. With
watchdog support enabled, the E51 will need to service the watchdogs but
nothing else.

E51 Lockdown can help a designer concerned with system integrity and
security to ensure that the HSS is locked down and locked out from
accessing any sensitive application data.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 659cd04

Please sign in to comment.