blob: ca6d7d3e82d54f7e3047ab1b1bea5fbb6e66bf79 [file] [log] [blame]
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301/* SPDX-License-Identifier: GPL-2.0-only */
Elyes HAOUAS944da482021-02-01 21:30:13 +01002
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05303#include <console/console.h>
Rizwan Qureshiec321092019-09-06 20:28:43 +05304#include <cbfs.h>
Rizwan Qureshiec321092019-09-06 20:28:43 +05305#include <commonlib/region.h>
6#include <fmap.h>
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05307#include <intelblocks/cse.h>
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +05308#include <intelblocks/cse_layout.h>
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05309#include <security/vboot/vboot_common.h>
Sridhar Siricilla87e36c42020-05-03 19:08:18 +053010#include <security/vboot/misc.h>
Rizwan Qureshiec321092019-09-06 20:28:43 +053011#include <soc/intel/common/reset.h>
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +053012#include <arch/cpu.h>
13
14#define BPDT_HEADER_SZ sizeof(struct bpdt_header)
15#define BPDT_ENTRY_SZ sizeof(struct bpdt_entry)
16#define SUBPART_HEADER_SZ sizeof(struct subpart_hdr)
17#define SUBPART_ENTRY_SZ sizeof(struct subpart_entry)
18#define SUBPART_MANIFEST_HDR_SZ sizeof(struct subpart_entry_manifest_header)
Rizwan Qureshiec321092019-09-06 20:28:43 +053019
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053020/* Converts bp index to boot partition string */
21#define GET_BP_STR(bp_index) (bp_index ? "RW" : "RO")
22
Rizwan Qureshiec321092019-09-06 20:28:43 +053023/* CSE RW boot partition signature */
24#define CSE_RW_SIGNATURE 0x000055aa
25
26/* CSE RW boot partition signature size */
27#define CSE_RW_SIGN_SIZE sizeof(uint32_t)
28
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053029/*
Sridhar Siricilla99dbca32020-05-12 21:05:04 +053030 * CSE Firmware supports 3 boot partitions. For CSE Lite SKU, only 2 boot partitions are
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053031 * used and 3rd boot partition is set to BP_STATUS_PARTITION_NOT_PRESENT.
Sridhar Siricilla99dbca32020-05-12 21:05:04 +053032 * CSE Lite SKU Image Layout:
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053033 * ------------- ------------------- ---------------------
34 * |CSE REGION | => | RO | RW | DATA | => | BP1 | BP2 | DATA |
35 * ------------- ------------------- ---------------------
36 */
37#define CSE_MAX_BOOT_PARTITIONS 3
38
Sridhar Siricilla99dbca32020-05-12 21:05:04 +053039/* CSE Lite SKU's valid bootable partition identifiers */
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053040enum boot_partition_id {
Rizwan Qureshiec321092019-09-06 20:28:43 +053041 /* RO(BP1) contains recovery/minimal boot firmware */
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053042 RO = 0,
43
Rizwan Qureshiec321092019-09-06 20:28:43 +053044 /* RW(BP2) contains fully functional CSE firmware */
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053045 RW = 1
46};
47
48/*
49 * Boot partition status.
50 * The status is returned in response to MKHI_BUP_COMMON_GET_BOOT_PARTITION_INFO cmd.
51 */
52enum bp_status {
53 /* This value is returned when a partition has no errors */
54 BP_STATUS_SUCCESS = 0,
55
56 /*
57 * This value is returned when a partition should be present based on layout, but it is
58 * not valid.
59 */
60 BP_STATUS_GENERAL_FAILURE = 1,
61
62 /* This value is returned when a partition is not present per initial image layout */
63 BP_STATUS_PARTITION_NOT_PRESENT = 2,
64
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +053065 /*
66 * This value is returned when unexpected issues are detected in CSE Data area
67 * and CSE TCB-SVN downgrade scenario.
68 */
69 BP_STATUS_DATA_FAILURE = 3,
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053070};
71
72/*
73 * Boot Partition Info Flags
74 * The flags are returned in response to MKHI_BUP_COMMON_GET_BOOT_PARTITION_INFO cmd.
75 */
76enum bp_info_flags {
77
78 /* Redundancy Enabled: It indicates CSE supports RO(BP1) and RW(BP2) regions */
79 BP_INFO_REDUNDANCY_EN = 1 << 0,
80
81 /* It indicates RO(BP1) supports Minimal Recovery Mode */
82 BP_INFO_MIN_RECOV_MODE_EN = 1 << 1,
83
84 /*
85 * Read-only Config Enabled: It indicates HW protection to CSE RO region is enabled.
86 * The option is relevant only if the BP_INFO_MIN_RECOV_MODE_EN flag is enabled.
87 */
88 BP_INFO_READ_ONLY_CFG = 1 << 2,
89};
90
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053091/* CSE boot partition entry info */
92struct cse_bp_entry {
93 /* Boot partition version */
94 struct fw_version fw_ver;
95
96 /* Boot partition status */
97 uint32_t status;
98
99 /* Starting offset of the partition within CSE region */
100 uint32_t start_offset;
101
102 /* Ending offset of the partition within CSE region */
103 uint32_t end_offset;
104 uint8_t reserved[12];
105} __packed;
106
107/* CSE boot partition info */
108struct cse_bp_info {
109 /* Number of boot partitions */
110 uint8_t total_number_of_bp;
111
112 /* Current boot partition */
113 uint8_t current_bp;
114
115 /* Next boot partition */
116 uint8_t next_bp;
117
118 /* Boot Partition Info Flags */
119 uint8_t flags;
120
121 /* Boot Partition Entry Info */
122 struct cse_bp_entry bp_entries[CSE_MAX_BOOT_PARTITIONS];
123} __packed;
124
125struct get_bp_info_rsp {
126 struct mkhi_hdr hdr;
127 struct cse_bp_info bp_info;
128} __packed;
129
Sridhar Siricilla52479c72022-03-30 09:25:49 +0530130static const char * const cse_regions[] = {"RO", "RW"};
Bora Guvendikf33c9bf2021-11-05 23:09:25 -0700131
132bool cse_get_boot_performance_data(struct cse_boot_perf_rsp *boot_perf_rsp)
133{
134 struct cse_boot_perf_req {
135 struct mkhi_hdr hdr;
136 uint32_t reserved;
137 } __packed;
138
139 struct cse_boot_perf_req req = {
140 .hdr.group_id = MKHI_GROUP_ID_BUP_COMMON,
141 .hdr.command = MKHI_BUP_COMMON_GET_BOOT_PERF_DATA,
142 .reserved = 0,
143 };
144
145 size_t resp_size = sizeof(struct cse_boot_perf_rsp);
146
Sridhar Siricilla6836da22022-02-23 23:36:45 +0530147 if (heci_send_receive(&req, sizeof(req), boot_perf_rsp, &resp_size,
Bora Guvendikf33c9bf2021-11-05 23:09:25 -0700148 HECI_MKHI_ADDR)) {
149 printk(BIOS_ERR, "cse_lite: Could not get boot performance data\n");
150 return false;
151 }
152
153 if (boot_perf_rsp->hdr.result) {
154 printk(BIOS_ERR, "cse_lite: Get boot performance data resp failed: %d\n",
155 boot_perf_rsp->hdr.result);
156 return false;
157 }
158
159 return true;
160}
161
162
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530163static uint8_t cse_get_current_bp(const struct cse_bp_info *cse_bp_info)
164{
165 return cse_bp_info->current_bp;
166}
167
168static const struct cse_bp_entry *cse_get_bp_entry(enum boot_partition_id bp,
169 const struct cse_bp_info *cse_bp_info)
170{
171 return &cse_bp_info->bp_entries[bp];
172}
173
174static void cse_print_boot_partition_info(const struct cse_bp_info *cse_bp_info)
175{
176 const struct cse_bp_entry *cse_bp;
177
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530178 printk(BIOS_DEBUG, "cse_lite: Number of partitions = %d\n",
179 cse_bp_info->total_number_of_bp);
180 printk(BIOS_DEBUG, "cse_lite: Current partition = %s\n",
181 GET_BP_STR(cse_bp_info->current_bp));
182 printk(BIOS_DEBUG, "cse_lite: Next partition = %s\n", GET_BP_STR(cse_bp_info->next_bp));
183 printk(BIOS_DEBUG, "cse_lite: Flags = 0x%x\n", cse_bp_info->flags);
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530184
185 /* Log version info of RO & RW partitions */
186 cse_bp = cse_get_bp_entry(RO, cse_bp_info);
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530187 printk(BIOS_DEBUG, "cse_lite: %s version = %d.%d.%d.%d (Status=0x%x, Start=0x%x, End=0x%x)\n",
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530188 GET_BP_STR(RO), cse_bp->fw_ver.major, cse_bp->fw_ver.minor,
189 cse_bp->fw_ver.hotfix, cse_bp->fw_ver.build,
190 cse_bp->status, cse_bp->start_offset,
191 cse_bp->end_offset);
192
193 cse_bp = cse_get_bp_entry(RW, cse_bp_info);
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530194 printk(BIOS_DEBUG, "cse_lite: %s version = %d.%d.%d.%d (Status=0x%x, Start=0x%x, End=0x%x)\n",
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530195 GET_BP_STR(RW), cse_bp->fw_ver.major, cse_bp->fw_ver.minor,
196 cse_bp->fw_ver.hotfix, cse_bp->fw_ver.build,
197 cse_bp->status, cse_bp->start_offset,
198 cse_bp->end_offset);
199}
200
201/*
202 * Checks prerequisites for MKHI_BUP_COMMON_GET_BOOT_PARTITION_INFO and
203 * MKHI_BUP_COMMON_SET_BOOT_PARTITION_INFO HECI commands.
204 * It allows execution of the Boot Partition commands in below scenarios:
205 * - When CSE boots from RW partition (COM: Normal and CWS: Normal)
206 * - When CSE boots from RO partition (COM: Soft Temp Disable and CWS: Normal)
207 * - After HMRFPO_ENABLE command is issued to CSE (COM: SECOVER_MEI_MSG and CWS: Normal)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530208 * The prerequisite check should be handled in cse_get_bp_info() and
209 * cse_set_next_boot_partition() since the CSE's current operation mode is changed between these
210 * cmd handler calls.
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530211 */
212static bool cse_is_bp_cmd_info_possible(void)
213{
214 if (cse_is_hfs1_cws_normal()) {
215 if (cse_is_hfs1_com_normal())
216 return true;
217 if (cse_is_hfs1_com_secover_mei_msg())
218 return true;
219 if (cse_is_hfs1_com_soft_temp_disable())
220 return true;
221 }
222 return false;
223}
224
225static bool cse_get_bp_info(struct get_bp_info_rsp *bp_info_rsp)
226{
227 struct get_bp_info_req {
228 struct mkhi_hdr hdr;
229 uint8_t reserved[4];
230 } __packed;
231
232 struct get_bp_info_req info_req = {
233 .hdr.group_id = MKHI_GROUP_ID_BUP_COMMON,
234 .hdr.command = MKHI_BUP_COMMON_GET_BOOT_PARTITION_INFO,
235 .reserved = {0},
236 };
237
238 if (!cse_is_bp_cmd_info_possible()) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530239 printk(BIOS_ERR, "cse_lite: CSE does not meet prerequisites\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530240 return false;
241 }
242
243 size_t resp_size = sizeof(struct get_bp_info_rsp);
244
Sridhar Siricilla6836da22022-02-23 23:36:45 +0530245 if (heci_send_receive(&info_req, sizeof(info_req), bp_info_rsp, &resp_size,
Rizwan Qureshi957857d2021-08-30 16:43:57 +0530246 HECI_MKHI_ADDR)) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530247 printk(BIOS_ERR, "cse_lite: Could not get partition info\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530248 return false;
249 }
250
251 if (bp_info_rsp->hdr.result) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530252 printk(BIOS_ERR, "cse_lite: Get partition info resp failed: %d\n",
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530253 bp_info_rsp->hdr.result);
254 return false;
255 }
256
257 cse_print_boot_partition_info(&bp_info_rsp->bp_info);
258
259 return true;
260}
261/*
262 * It sends HECI command to notify CSE about its next boot partition. When coreboot wants
263 * CSE to boot from certain partition (BP1 <RO> or BP2 <RW>), then this command can be used.
264 * The CSE's valid bootable partitions are BP1(RO) and BP2(RW).
265 * This function must be used before EOP.
266 * Returns false on failure and true on success.
267 */
268static bool cse_set_next_boot_partition(enum boot_partition_id bp)
269{
270 struct set_boot_partition_info_req {
271 struct mkhi_hdr hdr;
272 uint8_t next_bp;
273 uint8_t reserved[3];
274 } __packed;
275
276 struct set_boot_partition_info_req switch_req = {
277 .hdr.group_id = MKHI_GROUP_ID_BUP_COMMON,
278 .hdr.command = MKHI_BUP_COMMON_SET_BOOT_PARTITION_INFO,
279 .next_bp = bp,
280 .reserved = {0},
281 };
282
283 if (bp != RO && bp != RW) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530284 printk(BIOS_ERR, "cse_lite: Incorrect partition id(%d) is provided", bp);
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530285 return false;
286 }
287
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530288 printk(BIOS_INFO, "cse_lite: Set Boot Partition Info Command (%s)\n", GET_BP_STR(bp));
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530289
290 if (!cse_is_bp_cmd_info_possible()) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530291 printk(BIOS_ERR, "cse_lite: CSE does not meet prerequisites\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530292 return false;
293 }
294
295 struct mkhi_hdr switch_resp;
296 size_t sw_resp_sz = sizeof(struct mkhi_hdr);
297
Sridhar Siricilla6836da22022-02-23 23:36:45 +0530298 if (heci_send_receive(&switch_req, sizeof(switch_req), &switch_resp, &sw_resp_sz,
Rizwan Qureshi957857d2021-08-30 16:43:57 +0530299 HECI_MKHI_ADDR))
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530300 return false;
301
302 if (switch_resp.result) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530303 printk(BIOS_ERR, "cse_lite: Set Boot Partition Info Response Failed: %d\n",
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530304 switch_resp.result);
305 return false;
306 }
307
308 return true;
309}
310
V Sowmyaf9905522020-11-12 20:19:04 +0530311static bool cse_data_clear_request(const struct cse_bp_info *cse_bp_info)
312{
313 struct data_clr_request {
314 struct mkhi_hdr hdr;
315 uint8_t reserved[4];
316 } __packed;
317
318 struct data_clr_request data_clr_rq = {
319 .hdr.group_id = MKHI_GROUP_ID_BUP_COMMON,
320 .hdr.command = MKHI_BUP_COMMON_DATA_CLEAR,
321 .reserved = {0},
322 };
323
324 if (!cse_is_hfs1_cws_normal() || !cse_is_hfs1_com_soft_temp_disable() ||
325 cse_get_current_bp(cse_bp_info) != RO) {
326 printk(BIOS_ERR, "cse_lite: CSE doesn't meet DATA CLEAR cmd prerequisites\n");
327 return false;
328 }
329
330 printk(BIOS_DEBUG, "cse_lite: Sending DATA CLEAR HECI command\n");
331
332 struct mkhi_hdr data_clr_rsp;
333 size_t data_clr_rsp_sz = sizeof(data_clr_rsp);
334
Sridhar Siricilla6836da22022-02-23 23:36:45 +0530335 if (heci_send_receive(&data_clr_rq, sizeof(data_clr_rq), &data_clr_rsp,
Rizwan Qureshi957857d2021-08-30 16:43:57 +0530336 &data_clr_rsp_sz, HECI_MKHI_ADDR)) {
V Sowmyaf9905522020-11-12 20:19:04 +0530337 return false;
338 }
339
340 if (data_clr_rsp.result) {
341 printk(BIOS_ERR, "cse_lite: CSE DATA CLEAR command response failed: %d\n",
342 data_clr_rsp.result);
343 return false;
344 }
345
346 return true;
347}
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530348
Karthikeyan Ramasubramanianf9cc6372020-08-04 16:38:58 -0600349__weak void cse_board_reset(void)
350{
351 /* Default weak implementation, does nothing. */
352}
353
Rizwan Qureshiec321092019-09-06 20:28:43 +0530354/* Set the CSE's next boot partition and issues system reset */
355static bool cse_set_and_boot_from_next_bp(enum boot_partition_id bp)
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530356{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530357 if (!cse_set_next_boot_partition(bp))
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530358 return false;
359
Karthikeyan Ramasubramanianf9cc6372020-08-04 16:38:58 -0600360 /* Allow the board to perform a reset for CSE RO<->RW jump */
361 cse_board_reset();
362
363 /* If board does not perform the reset, then perform global_reset */
Furquan Shaikhb13bd1e2020-09-21 22:44:27 +0000364 do_global_reset();
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530365
Rizwan Qureshiec321092019-09-06 20:28:43 +0530366 die("cse_lite: Failed to reset the system\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530367
368 /* Control never reaches here */
369 return false;
370}
371
Rizwan Qureshiec321092019-09-06 20:28:43 +0530372static bool cse_boot_to_rw(const struct cse_bp_info *cse_bp_info)
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530373{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530374 if (cse_get_current_bp(cse_bp_info) == RW)
375 return true;
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530376
Rizwan Qureshiec321092019-09-06 20:28:43 +0530377 return cse_set_and_boot_from_next_bp(RW);
378}
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530379
V Sowmyaf9905522020-11-12 20:19:04 +0530380/* Check if CSE RW data partition is valid or not */
381static bool cse_is_rw_dp_valid(const struct cse_bp_info *cse_bp_info)
382{
383 const struct cse_bp_entry *rw_bp;
384
385 rw_bp = cse_get_bp_entry(RW, cse_bp_info);
386 return rw_bp->status != BP_STATUS_DATA_FAILURE;
387}
388
389/*
390 * It returns true if RW partition doesn't indicate BP_STATUS_DATA_FAILURE
391 * otherwise false if any operation fails.
392 */
393static bool cse_fix_data_failure_err(const struct cse_bp_info *cse_bp_info)
394{
395 /*
396 * If RW partition status indicates BP_STATUS_DATA_FAILURE,
397 * - Send DATA CLEAR HECI command to CSE
398 * - Send SET BOOT PARTITION INFO(RW) command to set CSE's next partition
399 * - Issue GLOBAL RESET HECI command.
400 */
401 if (cse_is_rw_dp_valid(cse_bp_info))
402 return true;
403
404 if (!cse_data_clear_request(cse_bp_info))
405 return false;
406
407 return cse_boot_to_rw(cse_bp_info);
408}
409
V Sowmyaf9905522020-11-12 20:19:04 +0530410static const struct fw_version *cse_get_bp_entry_version(enum boot_partition_id bp,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530411 const struct cse_bp_info *bp_info)
V Sowmyaf9905522020-11-12 20:19:04 +0530412{
413 const struct cse_bp_entry *cse_bp;
414
415 cse_bp = cse_get_bp_entry(bp, bp_info);
416 return &cse_bp->fw_ver;
417}
418
419static const struct fw_version *cse_get_rw_version(const struct cse_bp_info *cse_bp_info)
420{
421 return cse_get_bp_entry_version(RW, cse_bp_info);
422}
423
424static void cse_get_bp_entry_range(const struct cse_bp_info *cse_bp_info,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530425 enum boot_partition_id bp, uint32_t *start_offset, uint32_t *end_offset)
V Sowmyaf9905522020-11-12 20:19:04 +0530426{
427 const struct cse_bp_entry *cse_bp;
428
429 cse_bp = cse_get_bp_entry(bp, cse_bp_info);
430
431 if (start_offset)
432 *start_offset = cse_bp->start_offset;
433
434 if (end_offset)
435 *end_offset = cse_bp->end_offset;
436
437}
438
439static bool cse_is_rw_bp_status_valid(const struct cse_bp_info *cse_bp_info)
440{
441 const struct cse_bp_entry *rw_bp;
442
443 rw_bp = cse_get_bp_entry(RW, cse_bp_info);
444
445 if (rw_bp->status == BP_STATUS_PARTITION_NOT_PRESENT ||
446 rw_bp->status == BP_STATUS_GENERAL_FAILURE) {
447 printk(BIOS_ERR, "cse_lite: RW BP (status:%u) is not valid\n", rw_bp->status);
448 return false;
449 }
450 return true;
451}
452
Rizwan Qureshiec321092019-09-06 20:28:43 +0530453static bool cse_boot_to_ro(const struct cse_bp_info *cse_bp_info)
454{
455 if (cse_get_current_bp(cse_bp_info) == RO)
456 return true;
457
458 return cse_set_and_boot_from_next_bp(RO);
459}
460
461static bool cse_get_rw_rdev(struct region_device *rdev)
462{
463 if (fmap_locate_area_as_rdev_rw(CONFIG_SOC_INTEL_CSE_FMAP_NAME, rdev) < 0) {
464 printk(BIOS_ERR, "cse_lite: Failed to locate %s in FMAP\n",
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530465 CONFIG_SOC_INTEL_CSE_FMAP_NAME);
Rizwan Qureshiec321092019-09-06 20:28:43 +0530466 return false;
467 }
468
469 return true;
470}
471
Rizwan Qureshiec321092019-09-06 20:28:43 +0530472static bool cse_is_rw_bp_sign_valid(const struct region_device *target_rdev)
473{
474 uint32_t cse_bp_sign;
475
476 if (rdev_readat(target_rdev, &cse_bp_sign, 0, CSE_RW_SIGN_SIZE) != CSE_RW_SIGN_SIZE) {
477 printk(BIOS_ERR, "cse_lite: Failed to read RW boot partition signature\n");
478 return false;
479 }
480
481 return cse_bp_sign == CSE_RW_SIGNATURE;
482}
483
484static bool cse_get_target_rdev(const struct cse_bp_info *cse_bp_info,
485 struct region_device *target_rdev)
486{
487 struct region_device cse_region_rdev;
488 size_t size;
489 uint32_t start_offset;
490 uint32_t end_offset;
491
492 if (!cse_get_rw_rdev(&cse_region_rdev))
493 return false;
494
495 cse_get_bp_entry_range(cse_bp_info, RW, &start_offset, &end_offset);
496 size = end_offset + 1 - start_offset;
497
498 if (rdev_chain(target_rdev, &cse_region_rdev, start_offset, size))
499 return false;
500
501 printk(BIOS_DEBUG, "cse_lite: CSE RW partition: offset = 0x%x, size = 0x%x\n",
502 (uint32_t)start_offset, (uint32_t) size);
503
504 return true;
505}
506
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530507static const char *cse_get_source_rdev_fmap(void)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530508{
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530509 struct vb2_context *ctx = vboot_get_context();
510 if (ctx == NULL)
511 return NULL;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530512
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530513 if (vboot_is_firmware_slot_a(ctx))
514 return CONFIG_SOC_INTEL_CSE_RW_A_FMAP_NAME;
515
516 return CONFIG_SOC_INTEL_CSE_RW_B_FMAP_NAME;
517}
518
Rizwan Qureshiec321092019-09-06 20:28:43 +0530519/*
Sridhar Siricillab9277ba2021-11-27 13:57:40 +0530520 * Compare versions of CSE CBFS sub-component and CSE sub-component partition
521 * In case of CSE component comparison:
Rizwan Qureshiec321092019-09-06 20:28:43 +0530522 * If ver_cmp_status = 0, no update is required
523 * If ver_cmp_status < 0, coreboot downgrades CSE RW region
524 * If ver_cmp_status > 0, coreboot upgrades CSE RW region
525 */
Sridhar Siricillab9277ba2021-11-27 13:57:40 +0530526static int cse_compare_sub_part_version(const struct fw_version *a, const struct fw_version *b)
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530527{
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700528 if (a->major != b->major)
529 return a->major - b->major;
530 else if (a->minor != b->minor)
531 return a->minor - b->minor;
532 else if (a->hotfix != b->hotfix)
533 return a->hotfix - b->hotfix;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530534 else
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700535 return a->build - b->build;
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530536}
537
538/* The function calculates SHA-256 of CSE RW blob and compares it with the provided SHA value */
539static bool cse_verify_cbfs_rw_sha256(const uint8_t *expected_rw_blob_sha,
540 const void *rw_blob, const size_t rw_blob_sz)
541
542{
543 uint8_t rw_comp_sha[VB2_SHA256_DIGEST_SIZE];
544
545 if (vb2_digest_buffer(rw_blob, rw_blob_sz, VB2_HASH_SHA256, rw_comp_sha,
546 VB2_SHA256_DIGEST_SIZE)) {
547 printk(BIOS_ERR, "cse_lite: CSE CBFS RW's SHA-256 calculation has failed\n");
548 return false;
549 }
550
551 if (memcmp(expected_rw_blob_sha, rw_comp_sha, VB2_SHA256_DIGEST_SIZE)) {
552 printk(BIOS_ERR, "cse_lite: Computed CBFS RW's SHA-256 does not match with"
553 "the provided SHA in the metadata\n");
554 return false;
555 }
556 printk(BIOS_SPEW, "cse_lite: Computed SHA of CSE CBFS RW Image matches the"
557 " provided hash in the metadata\n");
558 return true;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530559}
560
561static bool cse_erase_rw_region(const struct region_device *target_rdev)
562{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530563 if (rdev_eraseat(target_rdev, 0, region_device_sz(target_rdev)) < 0) {
564 printk(BIOS_ERR, "cse_lite: CSE RW partition could not be erased\n");
565 return false;
566 }
567 return true;
568}
569
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530570static bool cse_copy_rw(const struct region_device *target_rdev, const void *buf,
571 size_t offset, size_t size)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530572{
573 if (rdev_writeat(target_rdev, buf, offset, size) < 0) {
574 printk(BIOS_ERR, "cse_lite: Failed to update CSE firmware\n");
575 return false;
576 }
577
578 return true;
579}
580
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700581enum cse_update_status {
582 CSE_UPDATE_NOT_REQUIRED,
583 CSE_UPDATE_UPGRADE,
584 CSE_UPDATE_DOWNGRADE,
585 CSE_UPDATE_CORRUPTED,
586 CSE_UPDATE_METADATA_ERROR,
587};
Rizwan Qureshiec321092019-09-06 20:28:43 +0530588
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700589static bool read_ver_field(const char *start, char **curr, size_t size, uint16_t *ver_field)
590{
591 if ((*curr - start) >= size) {
592 printk(BIOS_ERR, "cse_lite: Version string read overflow!\n");
593 return false;
594 }
595
596 *ver_field = skip_atoi(curr);
597 (*curr)++;
598 return true;
599}
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +0530600
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700601static enum cse_update_status cse_check_update_status(const struct cse_bp_info *cse_bp_info,
602 struct region_device *target_rdev)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530603{
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700604 int ret;
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700605 struct fw_version cbfs_rw_version;
606 char *version_str, *ptr;
607 size_t size;
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700608
609 if (!cse_is_rw_bp_sign_valid(target_rdev))
610 return CSE_UPDATE_CORRUPTED;
611
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700612 ptr = version_str = cbfs_map(CONFIG_SOC_INTEL_CSE_RW_VERSION_CBFS_NAME, &size);
613 if (!version_str) {
614 printk(BIOS_ERR, "cse_lite: Failed to get %s\n",
615 CONFIG_SOC_INTEL_CSE_RW_VERSION_CBFS_NAME);
616 return CSE_UPDATE_METADATA_ERROR;
617 }
618
619 if (!read_ver_field(version_str, &ptr, size, &cbfs_rw_version.major) ||
620 !read_ver_field(version_str, &ptr, size, &cbfs_rw_version.minor) ||
621 !read_ver_field(version_str, &ptr, size, &cbfs_rw_version.hotfix) ||
622 !read_ver_field(version_str, &ptr, size, &cbfs_rw_version.build)) {
623 cbfs_unmap(version_str);
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700624 return CSE_UPDATE_METADATA_ERROR;
625 }
626
627 printk(BIOS_DEBUG, "cse_lite: CSE CBFS RW version : %d.%d.%d.%d\n",
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700628 cbfs_rw_version.major,
629 cbfs_rw_version.minor,
630 cbfs_rw_version.hotfix,
631 cbfs_rw_version.build);
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700632
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700633 cbfs_unmap(version_str);
634
Sridhar Siricillab9277ba2021-11-27 13:57:40 +0530635 ret = cse_compare_sub_part_version(&cbfs_rw_version, cse_get_rw_version(cse_bp_info));
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700636 if (ret == 0)
637 return CSE_UPDATE_NOT_REQUIRED;
638 else if (ret < 0)
639 return CSE_UPDATE_DOWNGRADE;
640 else
641 return CSE_UPDATE_UPGRADE;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530642}
643
644static bool cse_write_rw_region(const struct region_device *target_rdev,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530645 const void *cse_cbfs_rw, const size_t cse_cbfs_rw_sz)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530646{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530647 /* Points to CSE CBFS RW image after boot partition signature */
648 uint8_t *cse_cbfs_rw_wo_sign = (uint8_t *)cse_cbfs_rw + CSE_RW_SIGN_SIZE;
649
650 /* Size of CSE CBFS RW image without boot partition signature */
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530651 uint32_t cse_cbfs_rw_wo_sign_sz = cse_cbfs_rw_sz - CSE_RW_SIGN_SIZE;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530652
653 /* Update except CSE RW signature */
654 if (!cse_copy_rw(target_rdev, cse_cbfs_rw_wo_sign, CSE_RW_SIGN_SIZE,
655 cse_cbfs_rw_wo_sign_sz))
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530656 return false;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530657
658 /* Update CSE RW signature to indicate update is complete */
659 if (!cse_copy_rw(target_rdev, (void *)cse_cbfs_rw, 0, CSE_RW_SIGN_SIZE))
Rizwan Qureshiec321092019-09-06 20:28:43 +0530660 return false;
661
662 printk(BIOS_INFO, "cse_lite: CSE RW Update Successful\n");
663 return true;
664}
665
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530666static enum csme_failure_reason cse_update_rw(const struct cse_bp_info *cse_bp_info,
667 const void *cse_cbfs_rw, const size_t cse_blob_sz,
668 struct region_device *target_rdev)
669{
Sridhar Siricillaabeb6882020-12-07 15:55:10 +0530670 if (region_device_sz(target_rdev) < cse_blob_sz) {
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530671 printk(BIOS_ERR, "RW update does not fit. CSE RW flash region size: %zx,"
672 "Update blob size:%zx\n", region_device_sz(target_rdev), cse_blob_sz);
Sridhar Siricillaabeb6882020-12-07 15:55:10 +0530673 return CSE_LITE_SKU_LAYOUT_MISMATCH_ERROR;
674 }
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530675
676 if (!cse_erase_rw_region(target_rdev))
677 return CSE_LITE_SKU_FW_UPDATE_ERROR;
678
679 if (!cse_write_rw_region(target_rdev, cse_cbfs_rw, cse_blob_sz))
680 return CSE_LITE_SKU_FW_UPDATE_ERROR;
681
Tim Wawrzynczake380a432021-06-18 09:54:55 -0600682 return CSE_NO_ERROR;
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530683}
684
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +0530685static bool cse_prep_for_rw_update(const struct cse_bp_info *cse_bp_info,
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700686 enum cse_update_status status)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530687{
688 /*
689 * To set CSE's operation mode to HMRFPO mode:
690 * 1. Ensure CSE to boot from RO(BP1)
691 * 2. Send HMRFPO_ENABLE command to CSE
692 */
693 if (!cse_boot_to_ro(cse_bp_info))
694 return false;
695
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700696 if ((status == CSE_UPDATE_DOWNGRADE) || (status == CSE_UPDATE_CORRUPTED)) {
697 if (!cse_data_clear_request(cse_bp_info)) {
698 printk(BIOS_ERR, "cse_lite: CSE data clear failed!\n");
699 return false;
700 }
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +0530701 }
702
Rizwan Qureshiec321092019-09-06 20:28:43 +0530703 return cse_hmrfpo_enable();
704}
705
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530706static enum csme_failure_reason cse_trigger_fw_update(const struct cse_bp_info *cse_bp_info,
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700707 enum cse_update_status status,
708 struct region_device *target_rdev)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530709{
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530710 enum csme_failure_reason rv;
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700711 uint8_t *cbfs_rw_hash;
Julius Werner18881f992021-04-13 15:28:12 -0700712 size_t size;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530713
Julius Werner18881f992021-04-13 15:28:12 -0700714 const char *area_name = cse_get_source_rdev_fmap();
715 if (!area_name)
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530716 return CSE_LITE_SKU_RW_BLOB_NOT_FOUND;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530717
Julius Werner18881f992021-04-13 15:28:12 -0700718 void *cse_cbfs_rw = cbfs_unverified_area_map(area_name,
719 CONFIG_SOC_INTEL_CSE_RW_CBFS_NAME, &size);
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530720 if (!cse_cbfs_rw) {
721 printk(BIOS_ERR, "cse_lite: CSE CBFS RW blob could not be mapped\n");
722 return CSE_LITE_SKU_RW_BLOB_NOT_FOUND;
723 }
724
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700725 cbfs_rw_hash = cbfs_map(CONFIG_SOC_INTEL_CSE_RW_HASH_CBFS_NAME, NULL);
726 if (!cbfs_rw_hash) {
727 printk(BIOS_ERR, "cse_lite: Failed to get %s\n",
728 CONFIG_SOC_INTEL_CSE_RW_HASH_CBFS_NAME);
729 rv = CSE_LITE_SKU_RW_METADATA_NOT_FOUND;
730 goto error_exit;
731 }
732
Julius Werner18881f992021-04-13 15:28:12 -0700733 if (!cse_verify_cbfs_rw_sha256(cbfs_rw_hash, cse_cbfs_rw, size)) {
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530734 rv = CSE_LITE_SKU_RW_BLOB_SHA256_MISMATCH;
735 goto error_exit;
736 }
737
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700738 if (!cse_prep_for_rw_update(cse_bp_info, status)) {
Tim Wawrzynczake380a432021-06-18 09:54:55 -0600739 rv = CSE_COMMUNICATION_ERROR;
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530740 goto error_exit;
741 }
742
Julius Werner18881f992021-04-13 15:28:12 -0700743 rv = cse_update_rw(cse_bp_info, cse_cbfs_rw, size, target_rdev);
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530744
745error_exit:
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700746 cbfs_unmap(cbfs_rw_hash);
Julius Werner18881f992021-04-13 15:28:12 -0700747 cbfs_unmap(cse_cbfs_rw);
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530748 return rv;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530749}
750
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530751static uint8_t cse_fw_update(const struct cse_bp_info *cse_bp_info)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530752{
753 struct region_device target_rdev;
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700754 enum cse_update_status status;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530755
756 if (!cse_get_target_rdev(cse_bp_info, &target_rdev)) {
757 printk(BIOS_ERR, "cse_lite: Failed to get CSE RW Partition\n");
758 return CSE_LITE_SKU_RW_ACCESS_ERROR;
759 }
760
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700761 status = cse_check_update_status(cse_bp_info, &target_rdev);
762 if (status == CSE_UPDATE_NOT_REQUIRED)
763 return CSE_NO_ERROR;
764 if (status == CSE_UPDATE_METADATA_ERROR)
765 return CSE_LITE_SKU_RW_METADATA_NOT_FOUND;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530766
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700767 printk(BIOS_DEBUG, "cse_lite: CSE RW update is initiated\n");
768 return cse_trigger_fw_update(cse_bp_info, status, &target_rdev);
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530769}
770
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530771static const char *cse_sub_part_str(enum bpdt_entry_type type)
772{
773 switch (type) {
774 case IOM_FW:
775 return "IOM";
776 case NPHY_FW:
777 return "NPHY";
778 default:
779 return "Unknown";
780 }
781}
782
Sridhar Siricilla52479c72022-03-30 09:25:49 +0530783static bool cse_locate_area_as_rdev_rw(const struct cse_bp_info *cse_bp_info,
784 size_t bp, struct region_device *cse_rdev)
785{
786 struct region_device cse_region_rdev;
787 uint32_t size;
788 uint32_t start_offset;
789 uint32_t end_offset;
790
791 if (!cse_get_rw_rdev(&cse_region_rdev))
792 return false;
793
794 if (!strcmp(cse_regions[bp], "RO"))
795 cse_get_bp_entry_range(cse_bp_info, RO, &start_offset, &end_offset);
796 else
797 cse_get_bp_entry_range(cse_bp_info, RW, &start_offset, &end_offset);
798
799 size = end_offset + 1 - start_offset;
800
801 if (rdev_chain(cse_rdev, &cse_region_rdev, start_offset, size))
802 return false;
803
804 printk(BIOS_DEBUG, "cse_lite: CSE %s partition: offset = 0x%x, size = 0x%x\n",
805 cse_regions[bp], start_offset, size);
806 return true;
807}
808
809static bool cse_sub_part_get_target_rdev(const struct cse_bp_info *cse_bp_info,
810 struct region_device *target_rdev, size_t bp, enum bpdt_entry_type type)
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530811{
812 struct bpdt_header bpdt_hdr;
813 struct region_device cse_rdev;
814 struct bpdt_entry bpdt_entries[MAX_SUBPARTS];
815 uint8_t i;
816
Sridhar Siricilla52479c72022-03-30 09:25:49 +0530817 if (!cse_locate_area_as_rdev_rw(cse_bp_info, bp, &cse_rdev)) {
818 printk(BIOS_ERR, "cse_lite: Failed to locate %s in the CSE Region\n",
819 cse_regions[bp]);
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530820 return false;
821 }
822
823 if ((rdev_readat(&cse_rdev, &bpdt_hdr, 0, BPDT_HEADER_SZ)) != BPDT_HEADER_SZ) {
824 printk(BIOS_ERR, "cse_lite: Failed to read BPDT header from CSE region\n");
825 return false;
826 }
827
828 if ((rdev_readat(&cse_rdev, bpdt_entries, BPDT_HEADER_SZ,
829 (bpdt_hdr.descriptor_count * BPDT_ENTRY_SZ))) !=
830 (bpdt_hdr.descriptor_count * BPDT_ENTRY_SZ)) {
831 printk(BIOS_ERR, "cse_lite: Failed to read BPDT entries from CSE region\n");
832 return false;
833 }
834
835 /* walk through BPDT entries to identify sub-partition's payload offset and size */
836 for (i = 0; i < bpdt_hdr.descriptor_count; i++) {
837 if (bpdt_entries[i].type == type) {
838 printk(BIOS_INFO, "cse_lite: Sub-partition %s- offset = 0x%x,"
839 "size = 0x%x\n", cse_sub_part_str(type), bpdt_entries[i].offset,
840 bpdt_entries[i].size);
841
842 if (rdev_chain(target_rdev, &cse_rdev, bpdt_entries[i].offset,
843 bpdt_entries[i].size))
844 return false;
845 else
846 return true;
847 }
848 }
849
850 printk(BIOS_ERR, "cse_lite: Sub-partition %s is not found\n", cse_sub_part_str(type));
851 return false;
852}
853
854static bool cse_get_sub_part_fw_version(enum bpdt_entry_type type,
855 const struct region_device *rdev,
856 struct fw_version *fw_ver)
857{
858 struct subpart_entry subpart_entry;
859 struct subpart_entry_manifest_header man_hdr;
860
861 if ((rdev_readat(rdev, &subpart_entry, SUBPART_HEADER_SZ, SUBPART_ENTRY_SZ))
862 != SUBPART_ENTRY_SZ) {
863 printk(BIOS_ERR, "cse_lite: Failed to read %s sub partition entry\n",
864 cse_sub_part_str(type));
865 return false;
866 }
867
868 if ((rdev_readat(rdev, &man_hdr, subpart_entry.offset_bytes, SUBPART_MANIFEST_HDR_SZ))
869 != SUBPART_MANIFEST_HDR_SZ) {
870 printk(BIOS_ERR, "cse_lite: Failed to read %s Sub part entry #0 manifest\n",
871 cse_sub_part_str(type));
872 return false;
873 }
874
875 fw_ver->major = man_hdr.binary_version.major;
876 fw_ver->minor = man_hdr.binary_version.minor;
877 fw_ver->hotfix = man_hdr.binary_version.hotfix;
878 fw_ver->build = man_hdr.binary_version.build;
879
880 return true;
881}
882
883static void cse_sub_part_get_source_fw_version(void *subpart_cbfs_rw, struct fw_version *fw_ver)
884{
885 uint8_t *ptr = (uint8_t *)subpart_cbfs_rw;
886 struct subpart_entry *subpart_entry;
887 struct subpart_entry_manifest_header *man_hdr;
888
889 subpart_entry = (struct subpart_entry *) (ptr + SUBPART_HEADER_SZ);
890 man_hdr = (struct subpart_entry_manifest_header *) (ptr + subpart_entry->offset_bytes);
891
892 fw_ver->major = man_hdr->binary_version.major;
893 fw_ver->minor = man_hdr->binary_version.minor;
894 fw_ver->hotfix = man_hdr->binary_version.hotfix;
895 fw_ver->build = man_hdr->binary_version.build;
896}
897
898static bool cse_prep_for_component_update(const struct cse_bp_info *cse_bp_info)
899{
900 /*
901 * To set CSE's operation mode to HMRFPO mode:
902 * 1. Ensure CSE to boot from RO(BP1)
903 * 2. Send HMRFPO_ENABLE command to CSE
904 */
905 if (!cse_boot_to_ro(cse_bp_info))
906 return false;
907
908 return cse_hmrfpo_enable();
909}
910
911static uint8_t cse_sub_part_trigger_update(enum bpdt_entry_type type, uint8_t bp,
912 const void *subpart_cbfs_rw, const size_t blob_sz,
913 struct region_device *target_rdev)
914{
915 if (region_device_sz(target_rdev) < blob_sz) {
916 printk(BIOS_ERR, "cse_lite: %s Target sub-partition size: %zx, "
917 "smaller than blob size:%zx, abort update\n",
918 cse_sub_part_str(type), region_device_sz(target_rdev), blob_sz);
919 return CSE_LITE_SKU_SUB_PART_LAYOUT_MISMATCH_ERROR;
920 }
921
922 /* Erase CSE Lite sub-partition */
923 if (!cse_erase_rw_region(target_rdev))
924 return CSE_LITE_SKU_SUB_PART_UPDATE_FAIL;
925
926 /* Update CSE Lite sub-partition */
927 if (!cse_copy_rw(target_rdev, (void *)subpart_cbfs_rw, 0, blob_sz))
928 return CSE_LITE_SKU_SUB_PART_UPDATE_FAIL;
929
930 printk(BIOS_INFO, "cse_lite: CSE %s %s Update successful\n", GET_BP_STR(bp),
931 cse_sub_part_str(type));
932
933 return CSE_LITE_SKU_PART_UPDATE_SUCCESS;
934}
935
936static uint8_t handle_cse_sub_part_fw_update_rv(uint8_t rv)
937{
938 switch (rv) {
939 case CSE_LITE_SKU_PART_UPDATE_SUCCESS:
940 case CSE_LITE_SKU_SUB_PART_UPDATE_NOT_REQ:
941 return rv;
942 default:
943 cse_trigger_vboot_recovery(rv);
944 }
945 /* Control never reaches here */
946 return rv;
947}
948
949static enum csme_failure_reason cse_sub_part_fw_component_update(enum bpdt_entry_type type,
950 const struct cse_bp_info *cse_bp_info, const char *name)
951{
952 struct region_device target_rdev;
953 struct fw_version target_fw_ver, source_fw_ver;
954 enum csme_failure_reason rv;
955 size_t size;
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530956
957 void *subpart_cbfs_rw = cbfs_map(name, &size);
958 if (!subpart_cbfs_rw) {
959 printk(BIOS_ERR, "cse_lite: Not able to map %s CBFS file\n",
960 cse_sub_part_str(type));
961 return CSE_LITE_SKU_SUB_PART_BLOB_ACCESS_ERR;
962 }
963
964 cse_sub_part_get_source_fw_version(subpart_cbfs_rw, &source_fw_ver);
965 printk(BIOS_INFO, "cse_lite: CBFS %s FW Version: %x.%x.%x.%x\n", cse_sub_part_str(type),
966 source_fw_ver.major, source_fw_ver.minor, source_fw_ver.hotfix,
967 source_fw_ver.build);
968
969 /* Trigger sub-partition update in CSE RO and CSE RW */
970 for (size_t bp = 0; bp < ARRAY_SIZE(cse_regions); bp++) {
Sridhar Siricilla52479c72022-03-30 09:25:49 +0530971 if (!cse_sub_part_get_target_rdev(cse_bp_info, &target_rdev, bp, type)) {
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530972 rv = CSE_LITE_SKU_SUB_PART_ACCESS_ERR;
973 goto error_exit;
974 }
975
976 if (!cse_get_sub_part_fw_version(type, &target_rdev, &target_fw_ver)) {
977 rv = CSE_LITE_SKU_SUB_PART_ACCESS_ERR;
978 goto error_exit;
979 }
980
981 printk(BIOS_INFO, "cse_lite: %s %s FW Version: %x.%x.%x.%x\n", cse_regions[bp],
982 cse_sub_part_str(type), target_fw_ver.major,
983 target_fw_ver.minor, target_fw_ver.hotfix, target_fw_ver.build);
984
985 if (!cse_compare_sub_part_version(&target_fw_ver, &source_fw_ver)) {
986 printk(BIOS_INFO, "cse_lite: %s %s update is not required\n",
987 cse_regions[bp], cse_sub_part_str(type));
988 rv = CSE_LITE_SKU_SUB_PART_UPDATE_NOT_REQ;
989 continue;
990 }
991
992 printk(BIOS_INFO, "CSE %s %s Update initiated\n", GET_BP_STR(bp),
993 cse_sub_part_str(type));
994
995 if (!cse_prep_for_component_update(cse_bp_info)) {
996 rv = CSE_LITE_SKU_SUB_PART_ACCESS_ERR;
997 goto error_exit;
998 }
999
1000 rv = cse_sub_part_trigger_update(type, bp, subpart_cbfs_rw,
1001 size, &target_rdev);
1002
1003 if (rv != CSE_LITE_SKU_PART_UPDATE_SUCCESS)
1004 goto error_exit;
1005 }
1006error_exit:
1007 cbfs_unmap(subpart_cbfs_rw);
1008 return rv;
1009}
1010
1011static uint8_t cse_sub_part_fw_update(const struct cse_bp_info *cse_bp_info)
1012{
1013 if (skip_cse_sub_part_update()) {
1014 printk(BIOS_INFO, "CSE Sub-partition update not required\n");
1015 return CSE_LITE_SKU_SUB_PART_UPDATE_NOT_REQ;
1016 }
1017
1018 int rv;
1019 rv = cse_sub_part_fw_component_update(IOM_FW, cse_bp_info,
1020 CONFIG_SOC_INTEL_CSE_IOM_CBFS_NAME);
1021
1022 handle_cse_sub_part_fw_update_rv(rv);
1023
1024 rv = cse_sub_part_fw_component_update(NPHY_FW, cse_bp_info,
1025 CONFIG_SOC_INTEL_CSE_NPHY_CBFS_NAME);
1026
1027 return handle_cse_sub_part_fw_update_rv(rv);
1028}
1029
Sridhar Siricilla1a2b7022020-12-04 02:22:28 +05301030void cse_fw_sync(void)
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301031{
1032 static struct get_bp_info_rsp cse_bp_info;
1033
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +05301034 /*
1035 * If system is in recovery mode, skip CSE Lite update if CSE sub-partition update
1036 * is not enabled and continue to update CSE sub-partitions.
1037 */
1038 if (vboot_recovery_mode_enabled() && !CONFIG(SOC_INTEL_CSE_SUB_PART_UPDATE)) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +05301039 printk(BIOS_DEBUG, "cse_lite: Skip switching to RW in the recovery path\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301040 return;
1041 }
1042
Sridhar Siricilla99dbca32020-05-12 21:05:04 +05301043 /* If CSE SKU type is not Lite, skip enabling CSE Lite SKU */
1044 if (!cse_is_hfs3_fw_sku_lite()) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +05301045 printk(BIOS_ERR, "cse_lite: Not a CSE Lite SKU\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301046 return;
1047 }
1048
1049 if (!cse_get_bp_info(&cse_bp_info)) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +05301050 printk(BIOS_ERR, "cse_lite: Failed to get CSE boot partition info\n");
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +05301051
1052 /* If system is in recovery mode, don't trigger recovery again */
1053 if (!vboot_recovery_mode_enabled()) {
1054 cse_trigger_vboot_recovery(CSE_COMMUNICATION_ERROR);
1055 } else {
1056 printk(BIOS_ERR, "cse_lite: System is already in Recovery Mode, "
1057 "so no action\n");
1058 return;
1059 }
1060 }
1061
1062 /*
1063 * If system is in recovery mode, CSE Lite update has to be skipped but CSE
1064 * sub-partitions like NPHY and IOM have to to be updated. If CSE sub-parition update
1065 * fails during recovery, just continue to boot.
1066 */
1067 if (CONFIG(SOC_INTEL_CSE_SUB_PART_UPDATE) && vboot_recovery_mode_enabled()) {
1068 if (cse_sub_part_fw_update(&cse_bp_info.bp_info) ==
1069 CSE_LITE_SKU_PART_UPDATE_SUCCESS) {
1070 cse_board_reset();
1071 do_global_reset();
1072 die("ERROR: GLOBAL RESET Failed to reset the system\n");
1073 }
1074
1075 return;
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301076 }
1077
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +05301078 if (!cse_fix_data_failure_err(&cse_bp_info.bp_info))
Tim Wawrzynczak09635f42021-06-18 10:08:47 -06001079 cse_trigger_vboot_recovery(CSE_LITE_SKU_DATA_WIPE_ERROR);
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +05301080
Sridhar Siricilla361e3642020-10-18 20:14:07 +05301081 /*
1082 * If SOC_INTEL_CSE_RW_UPDATE is defined , then trigger CSE firmware update. The driver
1083 * triggers recovery if CSE CBFS RW metadata or CSE CBFS RW blob is not available.
1084 */
Sridhar Siricilla4c2890d2020-12-09 00:28:30 +05301085 if (CONFIG(SOC_INTEL_CSE_RW_UPDATE)) {
1086 uint8_t rv;
1087 rv = cse_fw_update(&cse_bp_info.bp_info);
1088 if (rv)
Tim Wawrzynczak09635f42021-06-18 10:08:47 -06001089 cse_trigger_vboot_recovery(rv);
Sridhar Siricilla4c2890d2020-12-09 00:28:30 +05301090 }
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301091
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +05301092 if (CONFIG(SOC_INTEL_CSE_SUB_PART_UPDATE))
1093 cse_sub_part_fw_update(&cse_bp_info.bp_info);
1094
Sridahr Siricilla54b03562021-06-18 10:59:30 +05301095 if (!cse_is_rw_bp_status_valid(&cse_bp_info.bp_info))
Tim Wawrzynczakf2801f42021-06-22 11:25:14 -06001096 cse_trigger_vboot_recovery(CSE_LITE_SKU_RW_JUMP_ERROR);
Sridahr Siricilla54b03562021-06-18 10:59:30 +05301097
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301098 if (!cse_boot_to_rw(&cse_bp_info.bp_info)) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +05301099 printk(BIOS_ERR, "cse_lite: Failed to switch to RW\n");
Tim Wawrzynczak09635f42021-06-18 10:08:47 -06001100 cse_trigger_vboot_recovery(CSE_LITE_SKU_RW_SWITCH_ERROR);
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301101 }
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301102}