From 2b6c948039b0d69e15c39be2a917d8eb05e04562 Mon Sep 17 00:00:00 2001 From: Aote Jin Date: Mon, 4 Mar 2024 17:25:36 +0800 Subject: [PATCH] - Rewording some phrase --- chapter2.adoc | 25 +++++++++++++++++++------ chapter3.adoc | 20 ++++++++++++++------ contributors.adoc | 4 ++-- header.adoc | 5 ++--- 4 files changed, 37 insertions(+), 17 deletions(-) diff --git a/chapter2.adoc b/chapter2.adoc index c0a903f..80f0f00 100644 --- a/chapter2.adoc +++ b/chapter2.adoc @@ -1,13 +1,13 @@ [[chapter2]] -== ISA extension Zedsec +== Zedsec (ISA extension) This chapter introduces the Zedsec ISA extension, designed to enhance security by controlling external debugger access. The extension regulates how the hart responds to external debugger requests and apples protection mechanisms to enforce debug policies based on privilege levels. === Debuggable/traceable privilege level -image::Smsdedbg.png[The debug access control regulation] +image::new_pic.png[The debug access control regulation] -The extension imposes restrictions on debug and trace capabilities in alignment with RISC-V privilege modes. Debuggable/traceable privilege levels are determined by sideband signals mdbgen/mtrcen and CSR fields mseccfg.sdbgen/mseccfg.strcen. In the absence of the security extension, debug requests are accommodated across all privilege levels. To improve system security, debug access is restricted to instances where the hart's privilege level is equal to or lower than the designated *debuggable privilege level*. This measure prevents unauthorized access to resources allocated to higher privilege levels by the debugger. Similarly, trace capability is limited to the *traceable privilege level*, with trace output being restricted if the hart's privilege level exceeds the *traceable privilege level*. +The extension imposes restrictions on debug and trace capabilities in alignment with RISC-V privilege modes. Debuggable/traceable privilege levels are determined by input ports mdbgen/mtrcen and CSR fields mseccfg.sdbgen/mseccfg.strcen. In the absence of the security extension, debug requests are accommodated across all privilege levels. To improve system security, debug access is restricted to instances where the hart's privilege level is equal to or lower than the designated *debuggable privilege level*. This measure prevents unauthorized access to resources allocated to higher privilege levels by the debugger. Similarly, trace capability is limited to the *traceable privilege level*, with trace output being restricted if the hart's privilege level exceeds the *traceable privilege level*. [options="header"] |=========================================================== @@ -32,10 +32,23 @@ The privilege level of the hart is determined by code execution, while the debug === Machine Security Configuration (mseccfg, at 0x747 on RV64, 0x747(low 32 bits) and 0x757(high 32 bits) on RV32) -The regulation of supervisor/hypervisor mode debug/trace operations will be managed by the machine mode. The **sdbgen** and **strcen** fields have been added as R/W fields in mseccfg to enforce the debug/trace policies for supervisor/hypervisor mode. These fields are only R/W in machine mode. +[caption="Register {counter:rimage}: ", reftext="Register {rimage}"] +[title="`sdbgen` and `strcen` fields in mseccfg"] +[id=mseccfg-dt] +[wavedrom, ,svg] +.... +{reg: [ + {bits: 4, name: 'WPRP'}, + {bits: 1, name: 'strcen'}, + {bits: 1, name: 'sdbgen'}, + {bits: 26, name: 'WPRP'}, +], config:{lanes: 2, hspace:1024}} +.... + +The regulation of supervisor/hypervisor mode debug/trace operations will be managed by the machine mode. The `sdbgen` and `strcen` fields have been added as R/W fields in mseccfg to enforce the debug/trace policies for supervisor/hypervisor mode. These fields are only R/W in machine mode. [NOTE] -Application-level debugging is primarily accomplished through self-hostmaked debugging, allowing the management of debug policies at the operating system level. As a result, user-level debugging management is not addressed within this extension. +Application-level debugging is primarily accomplished through self-hosted debugging, allowing the management of debug policies at the operating system level. As a result, user-level debugging management is not addressed within this extension. In scenarios where supervisor mode is bypassed and machine mode directly launches user mode code execution, the supervisor mode runtime must facilitate self-hosted debugging. Otherwise, the use of an external debugger under these circumstances could potentially result in privilege escalation. === Debug Control and Status (dcsr, at 0x7b0) @@ -131,4 +144,4 @@ The beneath fields are redefined for tmexttrigger. | select | Selects any combination of up to 16 TM external trigger inputs that cause this trigger to fire The legal value must be constrained by *debuggable privilege level* according to trigger input type. | WARL | 0 |======================================================================================================================================================================================================================================================================== - +The textra32, textra64 provides additional filtering capbility for triggers. They are permitted for access in Debug Mode, as they do not affact the trigger firing/matching when triggers are supressed by *debuggable privilege level*. diff --git a/chapter3.adoc b/chapter3.adoc index 7671186..0071eb1 100644 --- a/chapter3.adoc +++ b/chapter3.adoc @@ -1,5 +1,5 @@ [[chapter3]] -== Debug security enforcement +== Debug Module Security Extension (non-ISA extension) This chapter outlines the security enhancements implemented in the Debug Module and trace function. Access by external debuggers will be restricted, and trace output will be limited when privilege levels are insufficient. @@ -16,11 +16,14 @@ The External Debug Security Extension imposes additional security constraints an === Machine mode debug and trace control -Access to machine mode debug/trace functionality must be granted by a trusted entity, such as the Root of Trust (RoT). A combination of sideband signals propagating to hart, mdbgen and mtrcen, is introduced to manage the machine mode debug/trace policy. These signals are exclusively controlled by the RoT entity, which is responsible for booting and attesting the hart. +Access to machine mode debug/trace functionality must be granted by a trusted entity, such as the Root of Trust (RoT). A combination of input port propagating signals to hart, mdbgen and mtrcen, are introduced to manage the machine mode debug/trace policy. These signals are exclusively controlled by the RoT entity, which is responsible for booting and attesting the hart. The mdbgen and mtrcen signals must be lockable by the RoT to prevent unauthorized modification of their values. -The sub-machine mode access control mechanisms are addressed in chapter 3. +The sub-machine mode access control mechanisms are addressed in (<>). + +[NOTE] +If the machine mode ROM serves as the RoT, the ROM itself is responsible for managing mdbgen and mtrcen. The value of input ports could be bundled in an MMIO (Memory-Mapped I/O) outside the hart, such as in the Debug Module. Physical protections over the signals are implementation-specific and will not be discussed in this document. === Halt @@ -34,6 +37,14 @@ Reset operations must be safeguarded against various attacks. The RISC-V Debug S +Operation | Permit condition | +halt | +abstract commands | +hartreset | +resethaltreq | + ndmreset | + keepalive | + === Relaxed permission checks The field relaxedpriv in abstractcs allows for relaxed permission checks, such as bypassing PMA, PMP, MMU, etc. However, this relaxation violates security requirements, and the extension mandates that relaxedpriv be hardwired to 0x0. @@ -58,6 +69,3 @@ The keepalive operation shall only be accessible when machine mode is permitted The trace function might implement filtering feature, which can filter trace packets based on the hart privilege level. However, this filtering lacks protection by any security rules. The extension mandates that the trace output be regulated by the **traceable privilege level**. If the privilege level of the hart exceeds the **traceable privilege level**, the output will be clamped. - -[NOTE] -If the machine mode ROM serves as the RoT, the ROM itself is responsible for managing mdbgen and mtrcen. The sideband signals could be bundled in an MMIO (Memory-Mapped I/O) outside the hart, such as in the Debug Module. Physical protections over the signals are implementation-specific and will not be discussed in this document. diff --git a/contributors.adoc b/contributors.adoc index 13fd776..5a2e0a5 100644 --- a/contributors.adoc +++ b/contributors.adoc @@ -3,5 +3,5 @@ This RISC-V specification has been contributed to directly or indirectly by: [%hardbreaks] -* Author1 -* Author2 +* Aote Jin +* Joe Xie diff --git a/header.adoc b/header.adoc index 8ef25af..b638808 100644 --- a/header.adoc +++ b/header.adoc @@ -1,7 +1,6 @@ -= RISC-V Example Specification Document (Zexmpl) -Authors: Author 1, Author 2 += RISC-V External Eebug Security Extension :docgroup: RISC-V Task Group -:description: RISC-V Example Specification Document (Zexmpl) +:description: RISC-V External Eebug Security Extension :company: RISC-V.org :revdate: 1/2023 :revnumber: 1.0