值得信赖、免费 (libre)、支持 Linux、自托管 64 位 RISC-V 计算机
A trustworthy, free (libre), Linux capable, self-hosting 64bit RISC-V computer

原始链接: https://www.contrib.andrew.cmu.edu/~somlo/BTCP/

标题:在 FPGA 上使用免费工具构建值得信赖、开源、支持 Linux 的计算机 该项目旨在仅使用可信的免费软件和硬件描述语言(HDL)源代码从头开始创建一台免费/开源计算机。 计算机的硬件部分将构建在现场可编程门阵列(FPGA)上,通过开源设计和工具链确保完全透明。 动机:为了保证对硬件+软件系统的完全信任,构建计算机所涉及的每个软件(包括编译器及其各自的工具链)都必须在成品中可自由访问和自行运行,这一点至关重要。 这创建了一个自托管的免费/开源硬件+软件生态系统,与传统来源的系统相比,提供了显着的可信度优势。 我们选择使用 FPGA 来创建硬件,而不是控制硅铸造厂进行定制 ASIC 开发。 由于 FPGA 生产过程中没有进行专有制造,因此可以最大程度地减少特权升级等潜在威胁,从而使设计本质上更加安全。 有关此主题的进一步研究,请访问 [此链接](https://github.com/litex-hub/linux-on-litex-rocket) 并浏览项目文档。 其他资源: [1] 自托管演示:[链接] [2] 最新构建过程文档:[链接] [3] 项目存储库:[链接] [4] 早期实验和进展报告:[链接]

一位自称在 AMD(以前是 Xilinx)工作的人声称,一位戴着锡箔帽子的同事相信现场可编程门阵列 (FPGA) 中存在一个秘密隐藏的 CPU。 这种信念源于这样的假设:这些芯片隐藏着类似高级通用智能 (AGI) 的认知能力。 然而,AGI 目前还不存在。 相反,FPGA 的编程是在初始化期间通过 i2c 总线检索的。 要访问信息,只需监视该总线并拦截整个比特流,无需对 FPGA 本身进行大量修改。 此外,用户提出了“kill bit”,这是一种通过无线电信号或密钥禁用目标设备的简单机制,而​​不是引入复杂性难以想象的复杂隐藏CPU。 尽管人们普遍认为,FPGA 使得隐藏恶意组件变得具有挑战性,因为不同设计之间的逻辑结构存在显着差异,使得子图匹配算法不够充分。 总体而言,作者对开放硬件和软件协作的未来潜力表示兴奋,特别是在自托管 RISC-V 机器方面,并强调了近几十年来技术的显着进步。
相关文章

原文
A Trustworthy, Free (Libre), Linux Capable, Self-Hosting 64bit RISC-V Computer
Gabriel L. Somlo , 2019-07-04 ⎯ 2020-05-08

NEW: latest build process at https://github.com/litex-hub/linux-on-litex-rocket;

Or skip directly to the self-hosting demo.

1. Motivation

My goal is to build a Free/OpenSource computer from the ground up, so I may completely trust that the entire hardware+software system's behavior is 100% attributable to its fully available HDL (Hardware Description Language) and Software sources.
More importantly, I need all the compilers and associated toolchains involved in building the overall system (from HDL and Software sources) to be Free/OpenSource, and to be themselves buildable and runnable on the computer system being described. In other words, I need a self-hosting Free/OpenSource hardware+software stack! I don't own or otherwise control a silicon foundry, and therefore can't fabricate my own ASICs, so I will build the "hardware" component of this computer on an FPGA, ensuring that any programming of (and bitstream generation for) the FPGA happens with Free/OpenSource tools. I consider the tradeoff to be worthwhile and advantageous from a trustworthiness standpoint:
  • The chip foundry wouldn't know what the FPGA will be used for, and where the proverbial "privilege bit" will end up being laid out on the chip, which mitigates against Privilege Escalation hardware backdoors. Exposure is limited to DoS attacks being planted into the silicon during FPGA fabrication, which yields a significantly improved level of assurance (i.e., the computer may stop working altogether, but can't betray its owner to an adversary while pretending to operate correctly).
  • The FPGA is a regular grid of identical components, so (destructive) visual inspection (i.e., chemical ablation and TEM imaging) is more feasible than with a dedicated ASIC that has much less visual regularity and repeatability.
  • Having thus constrained the fabrication-stage attack surface, I can cover the remaining hardware attack vectors (malicious sources and/or toolchain) by insisting on buildable sources to everything, resulting in a finished product (i.e., deployed hardware+software computer) that is as trustowrthy as its openly auditable HDL+Software sources.
The following is a list of links to additional resources, documents and early experiments related to building the system described above:
联系我们 contact @ memedata.com