blob: 83f5eb1e8452f85a701e97be9e29ed9615aa95ce [file] [log] [blame]
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301/* SPDX-License-Identifier: GPL-2.0-only */
Elyes HAOUAS944da482021-02-01 21:30:13 +01002
Sridhar Siricilla0aa1ac42022-03-09 20:35:32 +05303#include <arch/cpu.h>
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05304#include <console/console.h>
Rizwan Qureshiec321092019-09-06 20:28:43 +05305#include <cbfs.h>
Rizwan Qureshiec321092019-09-06 20:28:43 +05306#include <commonlib/region.h>
7#include <fmap.h>
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05308#include <intelblocks/cse.h>
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +05309#include <intelblocks/cse_layout.h>
Sridhar Siricilla0aa1ac42022-03-09 20:35:32 +053010#include <intelbasecode/debug_feature.h>
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053011#include <security/vboot/vboot_common.h>
Sridhar Siricilla87e36c42020-05-03 19:08:18 +053012#include <security/vboot/misc.h>
Rizwan Qureshiec321092019-09-06 20:28:43 +053013#include <soc/intel/common/reset.h>
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +053014
15#define BPDT_HEADER_SZ sizeof(struct bpdt_header)
16#define BPDT_ENTRY_SZ sizeof(struct bpdt_entry)
17#define SUBPART_HEADER_SZ sizeof(struct subpart_hdr)
18#define SUBPART_ENTRY_SZ sizeof(struct subpart_entry)
19#define SUBPART_MANIFEST_HDR_SZ sizeof(struct subpart_entry_manifest_header)
Rizwan Qureshiec321092019-09-06 20:28:43 +053020
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053021/* Converts bp index to boot partition string */
22#define GET_BP_STR(bp_index) (bp_index ? "RW" : "RO")
23
Rizwan Qureshiec321092019-09-06 20:28:43 +053024/* CSE RW boot partition signature */
25#define CSE_RW_SIGNATURE 0x000055aa
26
27/* CSE RW boot partition signature size */
28#define CSE_RW_SIGN_SIZE sizeof(uint32_t)
29
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053030/*
Sridhar Siricilla99dbca32020-05-12 21:05:04 +053031 * CSE Firmware supports 3 boot partitions. For CSE Lite SKU, only 2 boot partitions are
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053032 * used and 3rd boot partition is set to BP_STATUS_PARTITION_NOT_PRESENT.
Sridhar Siricilla99dbca32020-05-12 21:05:04 +053033 * CSE Lite SKU Image Layout:
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053034 * ------------- ------------------- ---------------------
35 * |CSE REGION | => | RO | RW | DATA | => | BP1 | BP2 | DATA |
36 * ------------- ------------------- ---------------------
37 */
38#define CSE_MAX_BOOT_PARTITIONS 3
39
Sridhar Siricilla99dbca32020-05-12 21:05:04 +053040/* CSE Lite SKU's valid bootable partition identifiers */
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053041enum boot_partition_id {
Rizwan Qureshiec321092019-09-06 20:28:43 +053042 /* RO(BP1) contains recovery/minimal boot firmware */
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053043 RO = 0,
44
Rizwan Qureshiec321092019-09-06 20:28:43 +053045 /* RW(BP2) contains fully functional CSE firmware */
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053046 RW = 1
47};
48
49/*
50 * Boot partition status.
51 * The status is returned in response to MKHI_BUP_COMMON_GET_BOOT_PARTITION_INFO cmd.
52 */
53enum bp_status {
54 /* This value is returned when a partition has no errors */
55 BP_STATUS_SUCCESS = 0,
56
57 /*
58 * This value is returned when a partition should be present based on layout, but it is
59 * not valid.
60 */
61 BP_STATUS_GENERAL_FAILURE = 1,
62
63 /* This value is returned when a partition is not present per initial image layout */
64 BP_STATUS_PARTITION_NOT_PRESENT = 2,
65
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +053066 /*
67 * This value is returned when unexpected issues are detected in CSE Data area
68 * and CSE TCB-SVN downgrade scenario.
69 */
70 BP_STATUS_DATA_FAILURE = 3,
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053071};
72
73/*
74 * Boot Partition Info Flags
75 * The flags are returned in response to MKHI_BUP_COMMON_GET_BOOT_PARTITION_INFO cmd.
76 */
77enum bp_info_flags {
78
79 /* Redundancy Enabled: It indicates CSE supports RO(BP1) and RW(BP2) regions */
80 BP_INFO_REDUNDANCY_EN = 1 << 0,
81
82 /* It indicates RO(BP1) supports Minimal Recovery Mode */
83 BP_INFO_MIN_RECOV_MODE_EN = 1 << 1,
84
85 /*
86 * Read-only Config Enabled: It indicates HW protection to CSE RO region is enabled.
87 * The option is relevant only if the BP_INFO_MIN_RECOV_MODE_EN flag is enabled.
88 */
89 BP_INFO_READ_ONLY_CFG = 1 << 2,
90};
91
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053092/* CSE boot partition entry info */
93struct cse_bp_entry {
94 /* Boot partition version */
95 struct fw_version fw_ver;
96
97 /* Boot partition status */
98 uint32_t status;
99
100 /* Starting offset of the partition within CSE region */
101 uint32_t start_offset;
102
103 /* Ending offset of the partition within CSE region */
104 uint32_t end_offset;
105 uint8_t reserved[12];
106} __packed;
107
108/* CSE boot partition info */
109struct cse_bp_info {
110 /* Number of boot partitions */
111 uint8_t total_number_of_bp;
112
113 /* Current boot partition */
114 uint8_t current_bp;
115
116 /* Next boot partition */
117 uint8_t next_bp;
118
119 /* Boot Partition Info Flags */
120 uint8_t flags;
121
122 /* Boot Partition Entry Info */
123 struct cse_bp_entry bp_entries[CSE_MAX_BOOT_PARTITIONS];
124} __packed;
125
126struct get_bp_info_rsp {
127 struct mkhi_hdr hdr;
128 struct cse_bp_info bp_info;
129} __packed;
130
Sridhar Siricilla52479c72022-03-30 09:25:49 +0530131static const char * const cse_regions[] = {"RO", "RW"};
Bora Guvendikf33c9bf2021-11-05 23:09:25 -0700132
133bool cse_get_boot_performance_data(struct cse_boot_perf_rsp *boot_perf_rsp)
134{
135 struct cse_boot_perf_req {
136 struct mkhi_hdr hdr;
137 uint32_t reserved;
138 } __packed;
139
140 struct cse_boot_perf_req req = {
141 .hdr.group_id = MKHI_GROUP_ID_BUP_COMMON,
142 .hdr.command = MKHI_BUP_COMMON_GET_BOOT_PERF_DATA,
143 .reserved = 0,
144 };
145
146 size_t resp_size = sizeof(struct cse_boot_perf_rsp);
147
Sridhar Siricilla6836da22022-02-23 23:36:45 +0530148 if (heci_send_receive(&req, sizeof(req), boot_perf_rsp, &resp_size,
Bora Guvendikf33c9bf2021-11-05 23:09:25 -0700149 HECI_MKHI_ADDR)) {
150 printk(BIOS_ERR, "cse_lite: Could not get boot performance data\n");
151 return false;
152 }
153
154 if (boot_perf_rsp->hdr.result) {
155 printk(BIOS_ERR, "cse_lite: Get boot performance data resp failed: %d\n",
156 boot_perf_rsp->hdr.result);
157 return false;
158 }
159
160 return true;
161}
162
163
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530164static uint8_t cse_get_current_bp(const struct cse_bp_info *cse_bp_info)
165{
166 return cse_bp_info->current_bp;
167}
168
169static const struct cse_bp_entry *cse_get_bp_entry(enum boot_partition_id bp,
170 const struct cse_bp_info *cse_bp_info)
171{
172 return &cse_bp_info->bp_entries[bp];
173}
174
175static void cse_print_boot_partition_info(const struct cse_bp_info *cse_bp_info)
176{
177 const struct cse_bp_entry *cse_bp;
178
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530179 printk(BIOS_DEBUG, "cse_lite: Number of partitions = %d\n",
180 cse_bp_info->total_number_of_bp);
181 printk(BIOS_DEBUG, "cse_lite: Current partition = %s\n",
182 GET_BP_STR(cse_bp_info->current_bp));
183 printk(BIOS_DEBUG, "cse_lite: Next partition = %s\n", GET_BP_STR(cse_bp_info->next_bp));
184 printk(BIOS_DEBUG, "cse_lite: Flags = 0x%x\n", cse_bp_info->flags);
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530185
186 /* Log version info of RO & RW partitions */
187 cse_bp = cse_get_bp_entry(RO, cse_bp_info);
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530188 printk(BIOS_DEBUG, "cse_lite: %s version = %d.%d.%d.%d (Status=0x%x, Start=0x%x, End=0x%x)\n",
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530189 GET_BP_STR(RO), cse_bp->fw_ver.major, cse_bp->fw_ver.minor,
190 cse_bp->fw_ver.hotfix, cse_bp->fw_ver.build,
191 cse_bp->status, cse_bp->start_offset,
192 cse_bp->end_offset);
193
194 cse_bp = cse_get_bp_entry(RW, cse_bp_info);
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530195 printk(BIOS_DEBUG, "cse_lite: %s version = %d.%d.%d.%d (Status=0x%x, Start=0x%x, End=0x%x)\n",
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530196 GET_BP_STR(RW), cse_bp->fw_ver.major, cse_bp->fw_ver.minor,
197 cse_bp->fw_ver.hotfix, cse_bp->fw_ver.build,
198 cse_bp->status, cse_bp->start_offset,
199 cse_bp->end_offset);
200}
201
202/*
203 * Checks prerequisites for MKHI_BUP_COMMON_GET_BOOT_PARTITION_INFO and
204 * MKHI_BUP_COMMON_SET_BOOT_PARTITION_INFO HECI commands.
205 * It allows execution of the Boot Partition commands in below scenarios:
206 * - When CSE boots from RW partition (COM: Normal and CWS: Normal)
207 * - When CSE boots from RO partition (COM: Soft Temp Disable and CWS: Normal)
208 * - After HMRFPO_ENABLE command is issued to CSE (COM: SECOVER_MEI_MSG and CWS: Normal)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530209 * The prerequisite check should be handled in cse_get_bp_info() and
210 * cse_set_next_boot_partition() since the CSE's current operation mode is changed between these
211 * cmd handler calls.
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530212 */
213static bool cse_is_bp_cmd_info_possible(void)
214{
215 if (cse_is_hfs1_cws_normal()) {
216 if (cse_is_hfs1_com_normal())
217 return true;
218 if (cse_is_hfs1_com_secover_mei_msg())
219 return true;
220 if (cse_is_hfs1_com_soft_temp_disable())
221 return true;
222 }
223 return false;
224}
225
226static bool cse_get_bp_info(struct get_bp_info_rsp *bp_info_rsp)
227{
228 struct get_bp_info_req {
229 struct mkhi_hdr hdr;
230 uint8_t reserved[4];
231 } __packed;
232
233 struct get_bp_info_req info_req = {
234 .hdr.group_id = MKHI_GROUP_ID_BUP_COMMON,
235 .hdr.command = MKHI_BUP_COMMON_GET_BOOT_PARTITION_INFO,
236 .reserved = {0},
237 };
238
239 if (!cse_is_bp_cmd_info_possible()) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530240 printk(BIOS_ERR, "cse_lite: CSE does not meet prerequisites\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530241 return false;
242 }
243
244 size_t resp_size = sizeof(struct get_bp_info_rsp);
245
Sridhar Siricilla6836da22022-02-23 23:36:45 +0530246 if (heci_send_receive(&info_req, sizeof(info_req), bp_info_rsp, &resp_size,
Rizwan Qureshi957857d2021-08-30 16:43:57 +0530247 HECI_MKHI_ADDR)) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530248 printk(BIOS_ERR, "cse_lite: Could not get partition info\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530249 return false;
250 }
251
252 if (bp_info_rsp->hdr.result) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530253 printk(BIOS_ERR, "cse_lite: Get partition info resp failed: %d\n",
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530254 bp_info_rsp->hdr.result);
255 return false;
256 }
257
258 cse_print_boot_partition_info(&bp_info_rsp->bp_info);
259
260 return true;
261}
262/*
263 * It sends HECI command to notify CSE about its next boot partition. When coreboot wants
264 * CSE to boot from certain partition (BP1 <RO> or BP2 <RW>), then this command can be used.
265 * The CSE's valid bootable partitions are BP1(RO) and BP2(RW).
266 * This function must be used before EOP.
267 * Returns false on failure and true on success.
268 */
269static bool cse_set_next_boot_partition(enum boot_partition_id bp)
270{
271 struct set_boot_partition_info_req {
272 struct mkhi_hdr hdr;
273 uint8_t next_bp;
274 uint8_t reserved[3];
275 } __packed;
276
277 struct set_boot_partition_info_req switch_req = {
278 .hdr.group_id = MKHI_GROUP_ID_BUP_COMMON,
279 .hdr.command = MKHI_BUP_COMMON_SET_BOOT_PARTITION_INFO,
280 .next_bp = bp,
281 .reserved = {0},
282 };
283
284 if (bp != RO && bp != RW) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530285 printk(BIOS_ERR, "cse_lite: Incorrect partition id(%d) is provided", bp);
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530286 return false;
287 }
288
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530289 printk(BIOS_INFO, "cse_lite: Set Boot Partition Info Command (%s)\n", GET_BP_STR(bp));
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530290
291 if (!cse_is_bp_cmd_info_possible()) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530292 printk(BIOS_ERR, "cse_lite: CSE does not meet prerequisites\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530293 return false;
294 }
295
296 struct mkhi_hdr switch_resp;
297 size_t sw_resp_sz = sizeof(struct mkhi_hdr);
298
Sridhar Siricilla6836da22022-02-23 23:36:45 +0530299 if (heci_send_receive(&switch_req, sizeof(switch_req), &switch_resp, &sw_resp_sz,
Rizwan Qureshi957857d2021-08-30 16:43:57 +0530300 HECI_MKHI_ADDR))
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530301 return false;
302
303 if (switch_resp.result) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530304 printk(BIOS_ERR, "cse_lite: Set Boot Partition Info Response Failed: %d\n",
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530305 switch_resp.result);
306 return false;
307 }
308
309 return true;
310}
311
V Sowmyaf9905522020-11-12 20:19:04 +0530312static bool cse_data_clear_request(const struct cse_bp_info *cse_bp_info)
313{
314 struct data_clr_request {
315 struct mkhi_hdr hdr;
316 uint8_t reserved[4];
317 } __packed;
318
319 struct data_clr_request data_clr_rq = {
320 .hdr.group_id = MKHI_GROUP_ID_BUP_COMMON,
321 .hdr.command = MKHI_BUP_COMMON_DATA_CLEAR,
322 .reserved = {0},
323 };
324
325 if (!cse_is_hfs1_cws_normal() || !cse_is_hfs1_com_soft_temp_disable() ||
326 cse_get_current_bp(cse_bp_info) != RO) {
327 printk(BIOS_ERR, "cse_lite: CSE doesn't meet DATA CLEAR cmd prerequisites\n");
328 return false;
329 }
330
331 printk(BIOS_DEBUG, "cse_lite: Sending DATA CLEAR HECI command\n");
332
333 struct mkhi_hdr data_clr_rsp;
334 size_t data_clr_rsp_sz = sizeof(data_clr_rsp);
335
Sridhar Siricilla6836da22022-02-23 23:36:45 +0530336 if (heci_send_receive(&data_clr_rq, sizeof(data_clr_rq), &data_clr_rsp,
Rizwan Qureshi957857d2021-08-30 16:43:57 +0530337 &data_clr_rsp_sz, HECI_MKHI_ADDR)) {
V Sowmyaf9905522020-11-12 20:19:04 +0530338 return false;
339 }
340
341 if (data_clr_rsp.result) {
342 printk(BIOS_ERR, "cse_lite: CSE DATA CLEAR command response failed: %d\n",
343 data_clr_rsp.result);
344 return false;
345 }
346
347 return true;
348}
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530349
Karthikeyan Ramasubramanianf9cc6372020-08-04 16:38:58 -0600350__weak void cse_board_reset(void)
351{
352 /* Default weak implementation, does nothing. */
353}
354
Rizwan Qureshiec321092019-09-06 20:28:43 +0530355/* Set the CSE's next boot partition and issues system reset */
356static bool cse_set_and_boot_from_next_bp(enum boot_partition_id bp)
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530357{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530358 if (!cse_set_next_boot_partition(bp))
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530359 return false;
360
Karthikeyan Ramasubramanianf9cc6372020-08-04 16:38:58 -0600361 /* Allow the board to perform a reset for CSE RO<->RW jump */
362 cse_board_reset();
363
364 /* If board does not perform the reset, then perform global_reset */
Furquan Shaikhb13bd1e2020-09-21 22:44:27 +0000365 do_global_reset();
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530366
Rizwan Qureshiec321092019-09-06 20:28:43 +0530367 die("cse_lite: Failed to reset the system\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530368
369 /* Control never reaches here */
370 return false;
371}
372
Rizwan Qureshiec321092019-09-06 20:28:43 +0530373static bool cse_boot_to_rw(const struct cse_bp_info *cse_bp_info)
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530374{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530375 if (cse_get_current_bp(cse_bp_info) == RW)
376 return true;
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530377
Rizwan Qureshiec321092019-09-06 20:28:43 +0530378 return cse_set_and_boot_from_next_bp(RW);
379}
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530380
V Sowmyaf9905522020-11-12 20:19:04 +0530381/* Check if CSE RW data partition is valid or not */
382static bool cse_is_rw_dp_valid(const struct cse_bp_info *cse_bp_info)
383{
384 const struct cse_bp_entry *rw_bp;
385
386 rw_bp = cse_get_bp_entry(RW, cse_bp_info);
387 return rw_bp->status != BP_STATUS_DATA_FAILURE;
388}
389
390/*
391 * It returns true if RW partition doesn't indicate BP_STATUS_DATA_FAILURE
392 * otherwise false if any operation fails.
393 */
394static bool cse_fix_data_failure_err(const struct cse_bp_info *cse_bp_info)
395{
396 /*
397 * If RW partition status indicates BP_STATUS_DATA_FAILURE,
398 * - Send DATA CLEAR HECI command to CSE
399 * - Send SET BOOT PARTITION INFO(RW) command to set CSE's next partition
400 * - Issue GLOBAL RESET HECI command.
401 */
402 if (cse_is_rw_dp_valid(cse_bp_info))
403 return true;
404
405 if (!cse_data_clear_request(cse_bp_info))
406 return false;
407
408 return cse_boot_to_rw(cse_bp_info);
409}
410
V Sowmyaf9905522020-11-12 20:19:04 +0530411static const struct fw_version *cse_get_bp_entry_version(enum boot_partition_id bp,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530412 const struct cse_bp_info *bp_info)
V Sowmyaf9905522020-11-12 20:19:04 +0530413{
414 const struct cse_bp_entry *cse_bp;
415
416 cse_bp = cse_get_bp_entry(bp, bp_info);
417 return &cse_bp->fw_ver;
418}
419
420static const struct fw_version *cse_get_rw_version(const struct cse_bp_info *cse_bp_info)
421{
422 return cse_get_bp_entry_version(RW, cse_bp_info);
423}
424
425static void cse_get_bp_entry_range(const struct cse_bp_info *cse_bp_info,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530426 enum boot_partition_id bp, uint32_t *start_offset, uint32_t *end_offset)
V Sowmyaf9905522020-11-12 20:19:04 +0530427{
428 const struct cse_bp_entry *cse_bp;
429
430 cse_bp = cse_get_bp_entry(bp, cse_bp_info);
431
432 if (start_offset)
433 *start_offset = cse_bp->start_offset;
434
435 if (end_offset)
436 *end_offset = cse_bp->end_offset;
437
438}
439
440static bool cse_is_rw_bp_status_valid(const struct cse_bp_info *cse_bp_info)
441{
442 const struct cse_bp_entry *rw_bp;
443
444 rw_bp = cse_get_bp_entry(RW, cse_bp_info);
445
446 if (rw_bp->status == BP_STATUS_PARTITION_NOT_PRESENT ||
447 rw_bp->status == BP_STATUS_GENERAL_FAILURE) {
448 printk(BIOS_ERR, "cse_lite: RW BP (status:%u) is not valid\n", rw_bp->status);
449 return false;
450 }
451 return true;
452}
453
Rizwan Qureshiec321092019-09-06 20:28:43 +0530454static bool cse_boot_to_ro(const struct cse_bp_info *cse_bp_info)
455{
456 if (cse_get_current_bp(cse_bp_info) == RO)
457 return true;
458
459 return cse_set_and_boot_from_next_bp(RO);
460}
461
462static bool cse_get_rw_rdev(struct region_device *rdev)
463{
464 if (fmap_locate_area_as_rdev_rw(CONFIG_SOC_INTEL_CSE_FMAP_NAME, rdev) < 0) {
465 printk(BIOS_ERR, "cse_lite: Failed to locate %s in FMAP\n",
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530466 CONFIG_SOC_INTEL_CSE_FMAP_NAME);
Rizwan Qureshiec321092019-09-06 20:28:43 +0530467 return false;
468 }
469
470 return true;
471}
472
Rizwan Qureshiec321092019-09-06 20:28:43 +0530473static bool cse_is_rw_bp_sign_valid(const struct region_device *target_rdev)
474{
475 uint32_t cse_bp_sign;
476
477 if (rdev_readat(target_rdev, &cse_bp_sign, 0, CSE_RW_SIGN_SIZE) != CSE_RW_SIGN_SIZE) {
478 printk(BIOS_ERR, "cse_lite: Failed to read RW boot partition signature\n");
479 return false;
480 }
481
482 return cse_bp_sign == CSE_RW_SIGNATURE;
483}
484
485static bool cse_get_target_rdev(const struct cse_bp_info *cse_bp_info,
486 struct region_device *target_rdev)
487{
488 struct region_device cse_region_rdev;
489 size_t size;
490 uint32_t start_offset;
491 uint32_t end_offset;
492
493 if (!cse_get_rw_rdev(&cse_region_rdev))
494 return false;
495
496 cse_get_bp_entry_range(cse_bp_info, RW, &start_offset, &end_offset);
497 size = end_offset + 1 - start_offset;
498
499 if (rdev_chain(target_rdev, &cse_region_rdev, start_offset, size))
500 return false;
501
502 printk(BIOS_DEBUG, "cse_lite: CSE RW partition: offset = 0x%x, size = 0x%x\n",
503 (uint32_t)start_offset, (uint32_t) size);
504
505 return true;
506}
507
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530508static const char *cse_get_source_rdev_fmap(void)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530509{
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530510 struct vb2_context *ctx = vboot_get_context();
511 if (ctx == NULL)
512 return NULL;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530513
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530514 if (vboot_is_firmware_slot_a(ctx))
515 return CONFIG_SOC_INTEL_CSE_RW_A_FMAP_NAME;
516
517 return CONFIG_SOC_INTEL_CSE_RW_B_FMAP_NAME;
518}
519
Rizwan Qureshiec321092019-09-06 20:28:43 +0530520/*
Sridhar Siricillab9277ba2021-11-27 13:57:40 +0530521 * Compare versions of CSE CBFS sub-component and CSE sub-component partition
522 * In case of CSE component comparison:
Rizwan Qureshiec321092019-09-06 20:28:43 +0530523 * If ver_cmp_status = 0, no update is required
524 * If ver_cmp_status < 0, coreboot downgrades CSE RW region
525 * If ver_cmp_status > 0, coreboot upgrades CSE RW region
526 */
Sridhar Siricillab9277ba2021-11-27 13:57:40 +0530527static int cse_compare_sub_part_version(const struct fw_version *a, const struct fw_version *b)
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530528{
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700529 if (a->major != b->major)
530 return a->major - b->major;
531 else if (a->minor != b->minor)
532 return a->minor - b->minor;
533 else if (a->hotfix != b->hotfix)
534 return a->hotfix - b->hotfix;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530535 else
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700536 return a->build - b->build;
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530537}
538
539/* The function calculates SHA-256 of CSE RW blob and compares it with the provided SHA value */
540static bool cse_verify_cbfs_rw_sha256(const uint8_t *expected_rw_blob_sha,
541 const void *rw_blob, const size_t rw_blob_sz)
542
543{
544 uint8_t rw_comp_sha[VB2_SHA256_DIGEST_SIZE];
545
546 if (vb2_digest_buffer(rw_blob, rw_blob_sz, VB2_HASH_SHA256, rw_comp_sha,
547 VB2_SHA256_DIGEST_SIZE)) {
548 printk(BIOS_ERR, "cse_lite: CSE CBFS RW's SHA-256 calculation has failed\n");
549 return false;
550 }
551
552 if (memcmp(expected_rw_blob_sha, rw_comp_sha, VB2_SHA256_DIGEST_SIZE)) {
553 printk(BIOS_ERR, "cse_lite: Computed CBFS RW's SHA-256 does not match with"
554 "the provided SHA in the metadata\n");
555 return false;
556 }
557 printk(BIOS_SPEW, "cse_lite: Computed SHA of CSE CBFS RW Image matches the"
558 " provided hash in the metadata\n");
559 return true;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530560}
561
562static bool cse_erase_rw_region(const struct region_device *target_rdev)
563{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530564 if (rdev_eraseat(target_rdev, 0, region_device_sz(target_rdev)) < 0) {
565 printk(BIOS_ERR, "cse_lite: CSE RW partition could not be erased\n");
566 return false;
567 }
568 return true;
569}
570
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530571static bool cse_copy_rw(const struct region_device *target_rdev, const void *buf,
572 size_t offset, size_t size)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530573{
574 if (rdev_writeat(target_rdev, buf, offset, size) < 0) {
575 printk(BIOS_ERR, "cse_lite: Failed to update CSE firmware\n");
576 return false;
577 }
578
579 return true;
580}
581
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700582enum cse_update_status {
583 CSE_UPDATE_NOT_REQUIRED,
584 CSE_UPDATE_UPGRADE,
585 CSE_UPDATE_DOWNGRADE,
586 CSE_UPDATE_CORRUPTED,
587 CSE_UPDATE_METADATA_ERROR,
588};
Rizwan Qureshiec321092019-09-06 20:28:43 +0530589
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700590static bool read_ver_field(const char *start, char **curr, size_t size, uint16_t *ver_field)
591{
592 if ((*curr - start) >= size) {
593 printk(BIOS_ERR, "cse_lite: Version string read overflow!\n");
594 return false;
595 }
596
597 *ver_field = skip_atoi(curr);
598 (*curr)++;
599 return true;
600}
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +0530601
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700602static enum cse_update_status cse_check_update_status(const struct cse_bp_info *cse_bp_info,
603 struct region_device *target_rdev)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530604{
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700605 int ret;
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700606 struct fw_version cbfs_rw_version;
607 char *version_str, *ptr;
608 size_t size;
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700609
610 if (!cse_is_rw_bp_sign_valid(target_rdev))
611 return CSE_UPDATE_CORRUPTED;
612
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700613 ptr = version_str = cbfs_map(CONFIG_SOC_INTEL_CSE_RW_VERSION_CBFS_NAME, &size);
614 if (!version_str) {
615 printk(BIOS_ERR, "cse_lite: Failed to get %s\n",
616 CONFIG_SOC_INTEL_CSE_RW_VERSION_CBFS_NAME);
617 return CSE_UPDATE_METADATA_ERROR;
618 }
619
620 if (!read_ver_field(version_str, &ptr, size, &cbfs_rw_version.major) ||
621 !read_ver_field(version_str, &ptr, size, &cbfs_rw_version.minor) ||
622 !read_ver_field(version_str, &ptr, size, &cbfs_rw_version.hotfix) ||
623 !read_ver_field(version_str, &ptr, size, &cbfs_rw_version.build)) {
624 cbfs_unmap(version_str);
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700625 return CSE_UPDATE_METADATA_ERROR;
626 }
627
628 printk(BIOS_DEBUG, "cse_lite: CSE CBFS RW version : %d.%d.%d.%d\n",
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700629 cbfs_rw_version.major,
630 cbfs_rw_version.minor,
631 cbfs_rw_version.hotfix,
632 cbfs_rw_version.build);
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700633
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700634 cbfs_unmap(version_str);
635
Sridhar Siricillab9277ba2021-11-27 13:57:40 +0530636 ret = cse_compare_sub_part_version(&cbfs_rw_version, cse_get_rw_version(cse_bp_info));
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700637 if (ret == 0)
638 return CSE_UPDATE_NOT_REQUIRED;
639 else if (ret < 0)
640 return CSE_UPDATE_DOWNGRADE;
641 else
642 return CSE_UPDATE_UPGRADE;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530643}
644
645static bool cse_write_rw_region(const struct region_device *target_rdev,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530646 const void *cse_cbfs_rw, const size_t cse_cbfs_rw_sz)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530647{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530648 /* Points to CSE CBFS RW image after boot partition signature */
649 uint8_t *cse_cbfs_rw_wo_sign = (uint8_t *)cse_cbfs_rw + CSE_RW_SIGN_SIZE;
650
651 /* Size of CSE CBFS RW image without boot partition signature */
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530652 uint32_t cse_cbfs_rw_wo_sign_sz = cse_cbfs_rw_sz - CSE_RW_SIGN_SIZE;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530653
654 /* Update except CSE RW signature */
655 if (!cse_copy_rw(target_rdev, cse_cbfs_rw_wo_sign, CSE_RW_SIGN_SIZE,
656 cse_cbfs_rw_wo_sign_sz))
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530657 return false;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530658
659 /* Update CSE RW signature to indicate update is complete */
660 if (!cse_copy_rw(target_rdev, (void *)cse_cbfs_rw, 0, CSE_RW_SIGN_SIZE))
Rizwan Qureshiec321092019-09-06 20:28:43 +0530661 return false;
662
663 printk(BIOS_INFO, "cse_lite: CSE RW Update Successful\n");
664 return true;
665}
666
Sridhar Siricilla0aa1ac42022-03-09 20:35:32 +0530667static bool is_cse_fw_update_enabled(void)
668{
669 if (!CONFIG(SOC_INTEL_CSE_RW_UPDATE))
670 return false;
671
672 if (CONFIG(SOC_INTEL_COMMON_BASECODE_DEBUG_FEATURE))
673 return !is_debug_cse_fw_update_disable();
674
675 return true;
676}
677
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530678static enum csme_failure_reason cse_update_rw(const struct cse_bp_info *cse_bp_info,
679 const void *cse_cbfs_rw, const size_t cse_blob_sz,
680 struct region_device *target_rdev)
681{
Sridhar Siricillaabeb6882020-12-07 15:55:10 +0530682 if (region_device_sz(target_rdev) < cse_blob_sz) {
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530683 printk(BIOS_ERR, "RW update does not fit. CSE RW flash region size: %zx,"
684 "Update blob size:%zx\n", region_device_sz(target_rdev), cse_blob_sz);
Sridhar Siricillaabeb6882020-12-07 15:55:10 +0530685 return CSE_LITE_SKU_LAYOUT_MISMATCH_ERROR;
686 }
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530687
688 if (!cse_erase_rw_region(target_rdev))
689 return CSE_LITE_SKU_FW_UPDATE_ERROR;
690
691 if (!cse_write_rw_region(target_rdev, cse_cbfs_rw, cse_blob_sz))
692 return CSE_LITE_SKU_FW_UPDATE_ERROR;
693
Tim Wawrzynczake380a432021-06-18 09:54:55 -0600694 return CSE_NO_ERROR;
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530695}
696
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +0530697static bool cse_prep_for_rw_update(const struct cse_bp_info *cse_bp_info,
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700698 enum cse_update_status status)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530699{
700 /*
701 * To set CSE's operation mode to HMRFPO mode:
702 * 1. Ensure CSE to boot from RO(BP1)
703 * 2. Send HMRFPO_ENABLE command to CSE
704 */
705 if (!cse_boot_to_ro(cse_bp_info))
706 return false;
707
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700708 if ((status == CSE_UPDATE_DOWNGRADE) || (status == CSE_UPDATE_CORRUPTED)) {
709 if (!cse_data_clear_request(cse_bp_info)) {
710 printk(BIOS_ERR, "cse_lite: CSE data clear failed!\n");
711 return false;
712 }
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +0530713 }
714
Rizwan Qureshiec321092019-09-06 20:28:43 +0530715 return cse_hmrfpo_enable();
716}
717
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530718static enum csme_failure_reason cse_trigger_fw_update(const struct cse_bp_info *cse_bp_info,
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700719 enum cse_update_status status,
720 struct region_device *target_rdev)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530721{
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530722 enum csme_failure_reason rv;
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700723 uint8_t *cbfs_rw_hash;
Julius Werner18881f992021-04-13 15:28:12 -0700724 size_t size;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530725
Julius Werner18881f992021-04-13 15:28:12 -0700726 const char *area_name = cse_get_source_rdev_fmap();
727 if (!area_name)
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530728 return CSE_LITE_SKU_RW_BLOB_NOT_FOUND;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530729
Julius Werner18881f992021-04-13 15:28:12 -0700730 void *cse_cbfs_rw = cbfs_unverified_area_map(area_name,
731 CONFIG_SOC_INTEL_CSE_RW_CBFS_NAME, &size);
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530732 if (!cse_cbfs_rw) {
733 printk(BIOS_ERR, "cse_lite: CSE CBFS RW blob could not be mapped\n");
734 return CSE_LITE_SKU_RW_BLOB_NOT_FOUND;
735 }
736
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700737 cbfs_rw_hash = cbfs_map(CONFIG_SOC_INTEL_CSE_RW_HASH_CBFS_NAME, NULL);
738 if (!cbfs_rw_hash) {
739 printk(BIOS_ERR, "cse_lite: Failed to get %s\n",
740 CONFIG_SOC_INTEL_CSE_RW_HASH_CBFS_NAME);
741 rv = CSE_LITE_SKU_RW_METADATA_NOT_FOUND;
742 goto error_exit;
743 }
744
Julius Werner18881f992021-04-13 15:28:12 -0700745 if (!cse_verify_cbfs_rw_sha256(cbfs_rw_hash, cse_cbfs_rw, size)) {
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530746 rv = CSE_LITE_SKU_RW_BLOB_SHA256_MISMATCH;
747 goto error_exit;
748 }
749
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700750 if (!cse_prep_for_rw_update(cse_bp_info, status)) {
Tim Wawrzynczake380a432021-06-18 09:54:55 -0600751 rv = CSE_COMMUNICATION_ERROR;
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530752 goto error_exit;
753 }
754
Julius Werner18881f992021-04-13 15:28:12 -0700755 rv = cse_update_rw(cse_bp_info, cse_cbfs_rw, size, target_rdev);
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530756
757error_exit:
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700758 cbfs_unmap(cbfs_rw_hash);
Julius Werner18881f992021-04-13 15:28:12 -0700759 cbfs_unmap(cse_cbfs_rw);
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530760 return rv;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530761}
762
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530763static uint8_t cse_fw_update(const struct cse_bp_info *cse_bp_info)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530764{
765 struct region_device target_rdev;
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700766 enum cse_update_status status;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530767
768 if (!cse_get_target_rdev(cse_bp_info, &target_rdev)) {
769 printk(BIOS_ERR, "cse_lite: Failed to get CSE RW Partition\n");
770 return CSE_LITE_SKU_RW_ACCESS_ERROR;
771 }
772
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700773 status = cse_check_update_status(cse_bp_info, &target_rdev);
774 if (status == CSE_UPDATE_NOT_REQUIRED)
775 return CSE_NO_ERROR;
776 if (status == CSE_UPDATE_METADATA_ERROR)
777 return CSE_LITE_SKU_RW_METADATA_NOT_FOUND;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530778
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700779 printk(BIOS_DEBUG, "cse_lite: CSE RW update is initiated\n");
780 return cse_trigger_fw_update(cse_bp_info, status, &target_rdev);
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530781}
782
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530783static const char *cse_sub_part_str(enum bpdt_entry_type type)
784{
785 switch (type) {
786 case IOM_FW:
787 return "IOM";
788 case NPHY_FW:
789 return "NPHY";
790 default:
791 return "Unknown";
792 }
793}
794
Sridhar Siricilla52479c72022-03-30 09:25:49 +0530795static bool cse_locate_area_as_rdev_rw(const struct cse_bp_info *cse_bp_info,
796 size_t bp, struct region_device *cse_rdev)
797{
798 struct region_device cse_region_rdev;
799 uint32_t size;
800 uint32_t start_offset;
801 uint32_t end_offset;
802
803 if (!cse_get_rw_rdev(&cse_region_rdev))
804 return false;
805
806 if (!strcmp(cse_regions[bp], "RO"))
807 cse_get_bp_entry_range(cse_bp_info, RO, &start_offset, &end_offset);
808 else
809 cse_get_bp_entry_range(cse_bp_info, RW, &start_offset, &end_offset);
810
811 size = end_offset + 1 - start_offset;
812
813 if (rdev_chain(cse_rdev, &cse_region_rdev, start_offset, size))
814 return false;
815
816 printk(BIOS_DEBUG, "cse_lite: CSE %s partition: offset = 0x%x, size = 0x%x\n",
817 cse_regions[bp], start_offset, size);
818 return true;
819}
820
821static bool cse_sub_part_get_target_rdev(const struct cse_bp_info *cse_bp_info,
822 struct region_device *target_rdev, size_t bp, enum bpdt_entry_type type)
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530823{
824 struct bpdt_header bpdt_hdr;
825 struct region_device cse_rdev;
826 struct bpdt_entry bpdt_entries[MAX_SUBPARTS];
827 uint8_t i;
828
Sridhar Siricilla52479c72022-03-30 09:25:49 +0530829 if (!cse_locate_area_as_rdev_rw(cse_bp_info, bp, &cse_rdev)) {
830 printk(BIOS_ERR, "cse_lite: Failed to locate %s in the CSE Region\n",
831 cse_regions[bp]);
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530832 return false;
833 }
834
835 if ((rdev_readat(&cse_rdev, &bpdt_hdr, 0, BPDT_HEADER_SZ)) != BPDT_HEADER_SZ) {
836 printk(BIOS_ERR, "cse_lite: Failed to read BPDT header from CSE region\n");
837 return false;
838 }
839
840 if ((rdev_readat(&cse_rdev, bpdt_entries, BPDT_HEADER_SZ,
841 (bpdt_hdr.descriptor_count * BPDT_ENTRY_SZ))) !=
842 (bpdt_hdr.descriptor_count * BPDT_ENTRY_SZ)) {
843 printk(BIOS_ERR, "cse_lite: Failed to read BPDT entries from CSE region\n");
844 return false;
845 }
846
847 /* walk through BPDT entries to identify sub-partition's payload offset and size */
848 for (i = 0; i < bpdt_hdr.descriptor_count; i++) {
849 if (bpdt_entries[i].type == type) {
850 printk(BIOS_INFO, "cse_lite: Sub-partition %s- offset = 0x%x,"
851 "size = 0x%x\n", cse_sub_part_str(type), bpdt_entries[i].offset,
852 bpdt_entries[i].size);
853
854 if (rdev_chain(target_rdev, &cse_rdev, bpdt_entries[i].offset,
855 bpdt_entries[i].size))
856 return false;
857 else
858 return true;
859 }
860 }
861
862 printk(BIOS_ERR, "cse_lite: Sub-partition %s is not found\n", cse_sub_part_str(type));
863 return false;
864}
865
866static bool cse_get_sub_part_fw_version(enum bpdt_entry_type type,
867 const struct region_device *rdev,
868 struct fw_version *fw_ver)
869{
870 struct subpart_entry subpart_entry;
871 struct subpart_entry_manifest_header man_hdr;
872
873 if ((rdev_readat(rdev, &subpart_entry, SUBPART_HEADER_SZ, SUBPART_ENTRY_SZ))
874 != SUBPART_ENTRY_SZ) {
875 printk(BIOS_ERR, "cse_lite: Failed to read %s sub partition entry\n",
876 cse_sub_part_str(type));
877 return false;
878 }
879
880 if ((rdev_readat(rdev, &man_hdr, subpart_entry.offset_bytes, SUBPART_MANIFEST_HDR_SZ))
881 != SUBPART_MANIFEST_HDR_SZ) {
882 printk(BIOS_ERR, "cse_lite: Failed to read %s Sub part entry #0 manifest\n",
883 cse_sub_part_str(type));
884 return false;
885 }
886
887 fw_ver->major = man_hdr.binary_version.major;
888 fw_ver->minor = man_hdr.binary_version.minor;
889 fw_ver->hotfix = man_hdr.binary_version.hotfix;
890 fw_ver->build = man_hdr.binary_version.build;
891
892 return true;
893}
894
895static void cse_sub_part_get_source_fw_version(void *subpart_cbfs_rw, struct fw_version *fw_ver)
896{
897 uint8_t *ptr = (uint8_t *)subpart_cbfs_rw;
898 struct subpart_entry *subpart_entry;
899 struct subpart_entry_manifest_header *man_hdr;
900
901 subpart_entry = (struct subpart_entry *) (ptr + SUBPART_HEADER_SZ);
902 man_hdr = (struct subpart_entry_manifest_header *) (ptr + subpart_entry->offset_bytes);
903
904 fw_ver->major = man_hdr->binary_version.major;
905 fw_ver->minor = man_hdr->binary_version.minor;
906 fw_ver->hotfix = man_hdr->binary_version.hotfix;
907 fw_ver->build = man_hdr->binary_version.build;
908}
909
910static bool cse_prep_for_component_update(const struct cse_bp_info *cse_bp_info)
911{
912 /*
913 * To set CSE's operation mode to HMRFPO mode:
914 * 1. Ensure CSE to boot from RO(BP1)
915 * 2. Send HMRFPO_ENABLE command to CSE
916 */
917 if (!cse_boot_to_ro(cse_bp_info))
918 return false;
919
920 return cse_hmrfpo_enable();
921}
922
923static uint8_t cse_sub_part_trigger_update(enum bpdt_entry_type type, uint8_t bp,
924 const void *subpart_cbfs_rw, const size_t blob_sz,
925 struct region_device *target_rdev)
926{
927 if (region_device_sz(target_rdev) < blob_sz) {
928 printk(BIOS_ERR, "cse_lite: %s Target sub-partition size: %zx, "
929 "smaller than blob size:%zx, abort update\n",
930 cse_sub_part_str(type), region_device_sz(target_rdev), blob_sz);
931 return CSE_LITE_SKU_SUB_PART_LAYOUT_MISMATCH_ERROR;
932 }
933
934 /* Erase CSE Lite sub-partition */
935 if (!cse_erase_rw_region(target_rdev))
936 return CSE_LITE_SKU_SUB_PART_UPDATE_FAIL;
937
938 /* Update CSE Lite sub-partition */
939 if (!cse_copy_rw(target_rdev, (void *)subpart_cbfs_rw, 0, blob_sz))
940 return CSE_LITE_SKU_SUB_PART_UPDATE_FAIL;
941
942 printk(BIOS_INFO, "cse_lite: CSE %s %s Update successful\n", GET_BP_STR(bp),
943 cse_sub_part_str(type));
944
945 return CSE_LITE_SKU_PART_UPDATE_SUCCESS;
946}
947
948static uint8_t handle_cse_sub_part_fw_update_rv(uint8_t rv)
949{
950 switch (rv) {
951 case CSE_LITE_SKU_PART_UPDATE_SUCCESS:
952 case CSE_LITE_SKU_SUB_PART_UPDATE_NOT_REQ:
953 return rv;
954 default:
955 cse_trigger_vboot_recovery(rv);
956 }
957 /* Control never reaches here */
958 return rv;
959}
960
961static enum csme_failure_reason cse_sub_part_fw_component_update(enum bpdt_entry_type type,
962 const struct cse_bp_info *cse_bp_info, const char *name)
963{
964 struct region_device target_rdev;
965 struct fw_version target_fw_ver, source_fw_ver;
966 enum csme_failure_reason rv;
967 size_t size;
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530968
969 void *subpart_cbfs_rw = cbfs_map(name, &size);
970 if (!subpart_cbfs_rw) {
971 printk(BIOS_ERR, "cse_lite: Not able to map %s CBFS file\n",
972 cse_sub_part_str(type));
973 return CSE_LITE_SKU_SUB_PART_BLOB_ACCESS_ERR;
974 }
975
976 cse_sub_part_get_source_fw_version(subpart_cbfs_rw, &source_fw_ver);
977 printk(BIOS_INFO, "cse_lite: CBFS %s FW Version: %x.%x.%x.%x\n", cse_sub_part_str(type),
978 source_fw_ver.major, source_fw_ver.minor, source_fw_ver.hotfix,
979 source_fw_ver.build);
980
981 /* Trigger sub-partition update in CSE RO and CSE RW */
982 for (size_t bp = 0; bp < ARRAY_SIZE(cse_regions); bp++) {
Sridhar Siricilla52479c72022-03-30 09:25:49 +0530983 if (!cse_sub_part_get_target_rdev(cse_bp_info, &target_rdev, bp, type)) {
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530984 rv = CSE_LITE_SKU_SUB_PART_ACCESS_ERR;
985 goto error_exit;
986 }
987
988 if (!cse_get_sub_part_fw_version(type, &target_rdev, &target_fw_ver)) {
989 rv = CSE_LITE_SKU_SUB_PART_ACCESS_ERR;
990 goto error_exit;
991 }
992
993 printk(BIOS_INFO, "cse_lite: %s %s FW Version: %x.%x.%x.%x\n", cse_regions[bp],
994 cse_sub_part_str(type), target_fw_ver.major,
995 target_fw_ver.minor, target_fw_ver.hotfix, target_fw_ver.build);
996
997 if (!cse_compare_sub_part_version(&target_fw_ver, &source_fw_ver)) {
998 printk(BIOS_INFO, "cse_lite: %s %s update is not required\n",
999 cse_regions[bp], cse_sub_part_str(type));
1000 rv = CSE_LITE_SKU_SUB_PART_UPDATE_NOT_REQ;
1001 continue;
1002 }
1003
1004 printk(BIOS_INFO, "CSE %s %s Update initiated\n", GET_BP_STR(bp),
1005 cse_sub_part_str(type));
1006
1007 if (!cse_prep_for_component_update(cse_bp_info)) {
1008 rv = CSE_LITE_SKU_SUB_PART_ACCESS_ERR;
1009 goto error_exit;
1010 }
1011
1012 rv = cse_sub_part_trigger_update(type, bp, subpart_cbfs_rw,
1013 size, &target_rdev);
1014
1015 if (rv != CSE_LITE_SKU_PART_UPDATE_SUCCESS)
1016 goto error_exit;
1017 }
1018error_exit:
1019 cbfs_unmap(subpart_cbfs_rw);
1020 return rv;
1021}
1022
1023static uint8_t cse_sub_part_fw_update(const struct cse_bp_info *cse_bp_info)
1024{
1025 if (skip_cse_sub_part_update()) {
1026 printk(BIOS_INFO, "CSE Sub-partition update not required\n");
1027 return CSE_LITE_SKU_SUB_PART_UPDATE_NOT_REQ;
1028 }
1029
1030 int rv;
1031 rv = cse_sub_part_fw_component_update(IOM_FW, cse_bp_info,
1032 CONFIG_SOC_INTEL_CSE_IOM_CBFS_NAME);
1033
1034 handle_cse_sub_part_fw_update_rv(rv);
1035
1036 rv = cse_sub_part_fw_component_update(NPHY_FW, cse_bp_info,
1037 CONFIG_SOC_INTEL_CSE_NPHY_CBFS_NAME);
1038
1039 return handle_cse_sub_part_fw_update_rv(rv);
1040}
1041
Sridhar Siricilla1a2b7022020-12-04 02:22:28 +05301042void cse_fw_sync(void)
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301043{
1044 static struct get_bp_info_rsp cse_bp_info;
1045
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +05301046 /*
1047 * If system is in recovery mode, skip CSE Lite update if CSE sub-partition update
1048 * is not enabled and continue to update CSE sub-partitions.
1049 */
1050 if (vboot_recovery_mode_enabled() && !CONFIG(SOC_INTEL_CSE_SUB_PART_UPDATE)) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +05301051 printk(BIOS_DEBUG, "cse_lite: Skip switching to RW in the recovery path\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301052 return;
1053 }
1054
Sridhar Siricilla99dbca32020-05-12 21:05:04 +05301055 /* If CSE SKU type is not Lite, skip enabling CSE Lite SKU */
1056 if (!cse_is_hfs3_fw_sku_lite()) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +05301057 printk(BIOS_ERR, "cse_lite: Not a CSE Lite SKU\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301058 return;
1059 }
1060
1061 if (!cse_get_bp_info(&cse_bp_info)) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +05301062 printk(BIOS_ERR, "cse_lite: Failed to get CSE boot partition info\n");
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +05301063
1064 /* If system is in recovery mode, don't trigger recovery again */
1065 if (!vboot_recovery_mode_enabled()) {
1066 cse_trigger_vboot_recovery(CSE_COMMUNICATION_ERROR);
1067 } else {
1068 printk(BIOS_ERR, "cse_lite: System is already in Recovery Mode, "
1069 "so no action\n");
1070 return;
1071 }
1072 }
1073
1074 /*
1075 * If system is in recovery mode, CSE Lite update has to be skipped but CSE
1076 * sub-partitions like NPHY and IOM have to to be updated. If CSE sub-parition update
1077 * fails during recovery, just continue to boot.
1078 */
1079 if (CONFIG(SOC_INTEL_CSE_SUB_PART_UPDATE) && vboot_recovery_mode_enabled()) {
1080 if (cse_sub_part_fw_update(&cse_bp_info.bp_info) ==
1081 CSE_LITE_SKU_PART_UPDATE_SUCCESS) {
1082 cse_board_reset();
1083 do_global_reset();
1084 die("ERROR: GLOBAL RESET Failed to reset the system\n");
1085 }
1086
1087 return;
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301088 }
1089
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +05301090 if (!cse_fix_data_failure_err(&cse_bp_info.bp_info))
Tim Wawrzynczak09635f42021-06-18 10:08:47 -06001091 cse_trigger_vboot_recovery(CSE_LITE_SKU_DATA_WIPE_ERROR);
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +05301092
Sridhar Siricilla361e3642020-10-18 20:14:07 +05301093 /*
Sridhar Siricilla0aa1ac42022-03-09 20:35:32 +05301094 * cse firmware update is skipped if SOC_INTEL_CSE_RW_UPDATE is not defined and
1095 * runtime debug control flag is not enabled. The driver triggers recovery if CSE CBFS
1096 * RW metadata or CSE CBFS RW blob is not available.
Sridhar Siricilla361e3642020-10-18 20:14:07 +05301097 */
Sridhar Siricilla0aa1ac42022-03-09 20:35:32 +05301098 if (is_cse_fw_update_enabled()) {
Sridhar Siricilla4c2890d2020-12-09 00:28:30 +05301099 uint8_t rv;
1100 rv = cse_fw_update(&cse_bp_info.bp_info);
1101 if (rv)
Tim Wawrzynczak09635f42021-06-18 10:08:47 -06001102 cse_trigger_vboot_recovery(rv);
Sridhar Siricilla4c2890d2020-12-09 00:28:30 +05301103 }
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301104
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +05301105 if (CONFIG(SOC_INTEL_CSE_SUB_PART_UPDATE))
1106 cse_sub_part_fw_update(&cse_bp_info.bp_info);
1107
Sridahr Siricilla54b03562021-06-18 10:59:30 +05301108 if (!cse_is_rw_bp_status_valid(&cse_bp_info.bp_info))
Tim Wawrzynczakf2801f42021-06-22 11:25:14 -06001109 cse_trigger_vboot_recovery(CSE_LITE_SKU_RW_JUMP_ERROR);
Sridahr Siricilla54b03562021-06-18 10:59:30 +05301110
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301111 if (!cse_boot_to_rw(&cse_bp_info.bp_info)) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +05301112 printk(BIOS_ERR, "cse_lite: Failed to switch to RW\n");
Tim Wawrzynczak09635f42021-06-18 10:08:47 -06001113 cse_trigger_vboot_recovery(CSE_LITE_SKU_RW_SWITCH_ERROR);
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301114 }
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301115}