esp_efuse_fields.c 3.1 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283
  1. /*
  2. * SPDX-FileCopyrightText: 2017-2022 Espressif Systems (Shanghai) CO LTD
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. #include <stdlib.h>
  7. #include "sdkconfig.h"
  8. #include "esp_efuse.h"
  9. #include "esp_efuse_utility.h"
  10. #include "esp_efuse_table.h"
  11. #include "esp_types.h"
  12. #include "assert.h"
  13. #include "esp_err.h"
  14. #include "esp_fault.h"
  15. #include "esp_log.h"
  16. #include "soc/efuse_periph.h"
  17. #include "sys/param.h"
  18. static __attribute__((unused)) const char *TAG = "efuse";
  19. #ifdef CONFIG_BOOTLOADER_APP_SEC_VER_SIZE_EFUSE_FIELD
  20. #define APP_SEC_VER_SIZE_EFUSE_FIELD CONFIG_BOOTLOADER_APP_SEC_VER_SIZE_EFUSE_FIELD
  21. #else
  22. #define APP_SEC_VER_SIZE_EFUSE_FIELD 4 // smallest possible size for all chips
  23. #endif
  24. // Reset efuse write registers
  25. void esp_efuse_reset(void)
  26. {
  27. esp_efuse_utility_reset();
  28. }
  29. uint32_t esp_efuse_read_secure_version(void)
  30. {
  31. uint32_t secure_version = 0;
  32. size_t size = MIN(APP_SEC_VER_SIZE_EFUSE_FIELD, esp_efuse_get_field_size(ESP_EFUSE_SECURE_VERSION));
  33. esp_efuse_read_field_blob(ESP_EFUSE_SECURE_VERSION, &secure_version, size);
  34. return __builtin_popcount(secure_version & ((1ULL << size) - 1));
  35. }
  36. bool esp_efuse_check_secure_version(uint32_t secure_version)
  37. {
  38. uint32_t sec_ver_hw = esp_efuse_read_secure_version();
  39. /* Additional copies for Anti FI check */
  40. uint32_t sec_ver_hw_c1 = esp_efuse_read_secure_version();
  41. uint32_t sec_ver_hw_c2 = esp_efuse_read_secure_version();
  42. ESP_FAULT_ASSERT(sec_ver_hw == sec_ver_hw_c1);
  43. ESP_FAULT_ASSERT(sec_ver_hw == sec_ver_hw_c2);
  44. bool ret_status = (secure_version >= sec_ver_hw);
  45. /* Anti FI check */
  46. ESP_FAULT_ASSERT(ret_status == (secure_version >= sec_ver_hw));
  47. return ret_status;
  48. }
  49. esp_err_t esp_efuse_update_secure_version(uint32_t secure_version)
  50. {
  51. size_t size = MIN(APP_SEC_VER_SIZE_EFUSE_FIELD, esp_efuse_get_field_size(ESP_EFUSE_SECURE_VERSION));
  52. if (size < secure_version) {
  53. ESP_LOGE(TAG, "Max secure version is %d. Given %"PRIu32" version can not be written.", size, secure_version);
  54. return ESP_ERR_INVALID_ARG;
  55. }
  56. esp_efuse_coding_scheme_t coding_scheme = esp_efuse_get_coding_scheme(ESP_EFUSE_SECURE_VERSION_NUM_BLOCK);
  57. if (coding_scheme != EFUSE_CODING_SCHEME_NONE) {
  58. ESP_LOGE(TAG, "Anti rollback is not supported with any coding scheme.");
  59. return ESP_ERR_NOT_SUPPORTED;
  60. }
  61. uint32_t sec_ver_hw = esp_efuse_read_secure_version();
  62. // If secure_version is the same as in eFuse field than it is ok just go out.
  63. if (sec_ver_hw < secure_version) {
  64. uint32_t num_bit_hw = (1ULL << sec_ver_hw) - 1;
  65. uint32_t num_bit_app = (1ULL << secure_version) - 1;
  66. // Repeated programming of programmed bits is strictly forbidden
  67. uint32_t new_bits = num_bit_app - num_bit_hw; // get only new bits
  68. esp_efuse_write_field_blob(ESP_EFUSE_SECURE_VERSION, &new_bits, size);
  69. ESP_LOGI(TAG, "Anti-rollback is set. eFuse field is updated(%"PRIu32").", secure_version);
  70. } else if (sec_ver_hw > secure_version) {
  71. ESP_LOGE(TAG, "Anti-rollback is not set. secure_version of app is lower that eFuse field(%"PRIu32").", sec_ver_hw);
  72. return ESP_FAIL;
  73. }
  74. return ESP_OK;
  75. }