blob: 8e89723334d99412e1e6432ed3bc9ac2d369257c [file] [log] [blame]
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301/* SPDX-License-Identifier: GPL-2.0-only */
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05302#include <bootstate.h>
3#include <console/console.h>
Rizwan Qureshiec321092019-09-06 20:28:43 +05304#include <boot_device.h>
5#include <cbfs.h>
6#include <commonlib/cbfs.h>
7#include <commonlib/region.h>
8#include <fmap.h>
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05309#include <intelblocks/cse.h>
10#include <security/vboot/vboot_common.h>
Sridhar Siricilla87e36c42020-05-03 19:08:18 +053011#include <security/vboot/misc.h>
Rizwan Qureshiec321092019-09-06 20:28:43 +053012#include <soc/intel/common/reset.h>
13
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053014/* Converts bp index to boot partition string */
15#define GET_BP_STR(bp_index) (bp_index ? "RW" : "RO")
16
Rizwan Qureshiec321092019-09-06 20:28:43 +053017/* CSE RW boot partition signature */
18#define CSE_RW_SIGNATURE 0x000055aa
19
20/* CSE RW boot partition signature size */
21#define CSE_RW_SIGN_SIZE sizeof(uint32_t)
22
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053023/*
Sridhar Siricilla99dbca32020-05-12 21:05:04 +053024 * CSE Firmware supports 3 boot partitions. For CSE Lite SKU, only 2 boot partitions are
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053025 * used and 3rd boot partition is set to BP_STATUS_PARTITION_NOT_PRESENT.
Sridhar Siricilla99dbca32020-05-12 21:05:04 +053026 * CSE Lite SKU Image Layout:
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053027 * ------------- ------------------- ---------------------
28 * |CSE REGION | => | RO | RW | DATA | => | BP1 | BP2 | DATA |
29 * ------------- ------------------- ---------------------
30 */
31#define CSE_MAX_BOOT_PARTITIONS 3
32
Sridhar Siricilla99dbca32020-05-12 21:05:04 +053033/* CSE Lite SKU's valid bootable partition identifiers */
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053034enum boot_partition_id {
Rizwan Qureshiec321092019-09-06 20:28:43 +053035 /* RO(BP1) contains recovery/minimal boot firmware */
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053036 RO = 0,
37
Rizwan Qureshiec321092019-09-06 20:28:43 +053038 /* RW(BP2) contains fully functional CSE firmware */
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053039 RW = 1
40};
41
Sridhar Siricilla87e36c42020-05-03 19:08:18 +053042/* CSE recovery sub-error codes */
43enum csme_failure_reason {
Sridhar Siricilla361e3642020-10-18 20:14:07 +053044
45 /* No error */
46 CSE_LITE_SKU_NO_ERROR = 0,
47
Sridhar Siricilla87e36c42020-05-03 19:08:18 +053048 /* Unspecified error */
49 CSE_LITE_SKU_UNSPECIFIED = 1,
50
51 /* CSE fails to boot from RW */
52 CSE_LITE_SKU_RW_JUMP_ERROR = 2,
53
54 /* CSE RW boot partition access error */
55 CSE_LITE_SKU_RW_ACCESS_ERROR = 3,
56
57 /* Fails to set next boot partition as RW */
58 CSE_LITE_SKU_RW_SWITCH_ERROR = 4,
59
60 /* CSE firmware update failure */
61 CSE_LITE_SKU_FW_UPDATE_ERROR = 5,
62
63 /* Fails to communicate with CSE */
64 CSE_LITE_SKU_COMMUNICATION_ERROR = 6,
65
66 /* Fails to wipe CSE runtime data */
Sridhar Siricilla361e3642020-10-18 20:14:07 +053067 CSE_LITE_SKU_DATA_WIPE_ERROR = 7,
68
69 /* CSE RW is not found */
70 CSE_LITE_SKU_RW_BLOB_NOT_FOUND = 8,
71
72 /* CSE CBFS RW SHA-256 mismatch with the provided SHA */
73 CSE_LITE_SKU_RW_BLOB_SHA256_MISMATCH = 9,
74
75 /* CSE CBFS RW metadata is not found */
76 CSE_LITE_SKU_RW_METADATA_NOT_FOUND = 10,
Sridhar Siricillaabeb6882020-12-07 15:55:10 +053077
78 /* CSE CBFS RW blob layout is not correct */
79 CSE_LITE_SKU_LAYOUT_MISMATCH_ERROR = 11,
Sridhar Siricilla87e36c42020-05-03 19:08:18 +053080};
81
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053082/*
83 * Boot partition status.
84 * The status is returned in response to MKHI_BUP_COMMON_GET_BOOT_PARTITION_INFO cmd.
85 */
86enum bp_status {
87 /* This value is returned when a partition has no errors */
88 BP_STATUS_SUCCESS = 0,
89
90 /*
91 * This value is returned when a partition should be present based on layout, but it is
92 * not valid.
93 */
94 BP_STATUS_GENERAL_FAILURE = 1,
95
96 /* This value is returned when a partition is not present per initial image layout */
97 BP_STATUS_PARTITION_NOT_PRESENT = 2,
98
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +053099 /*
100 * This value is returned when unexpected issues are detected in CSE Data area
101 * and CSE TCB-SVN downgrade scenario.
102 */
103 BP_STATUS_DATA_FAILURE = 3,
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530104};
105
106/*
107 * Boot Partition Info Flags
108 * The flags are returned in response to MKHI_BUP_COMMON_GET_BOOT_PARTITION_INFO cmd.
109 */
110enum bp_info_flags {
111
112 /* Redundancy Enabled: It indicates CSE supports RO(BP1) and RW(BP2) regions */
113 BP_INFO_REDUNDANCY_EN = 1 << 0,
114
115 /* It indicates RO(BP1) supports Minimal Recovery Mode */
116 BP_INFO_MIN_RECOV_MODE_EN = 1 << 1,
117
118 /*
119 * Read-only Config Enabled: It indicates HW protection to CSE RO region is enabled.
120 * The option is relevant only if the BP_INFO_MIN_RECOV_MODE_EN flag is enabled.
121 */
122 BP_INFO_READ_ONLY_CFG = 1 << 2,
123};
124
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530125/* CSE boot partition entry info */
126struct cse_bp_entry {
127 /* Boot partition version */
128 struct fw_version fw_ver;
129
130 /* Boot partition status */
131 uint32_t status;
132
133 /* Starting offset of the partition within CSE region */
134 uint32_t start_offset;
135
136 /* Ending offset of the partition within CSE region */
137 uint32_t end_offset;
138 uint8_t reserved[12];
139} __packed;
140
141/* CSE boot partition info */
142struct cse_bp_info {
143 /* Number of boot partitions */
144 uint8_t total_number_of_bp;
145
146 /* Current boot partition */
147 uint8_t current_bp;
148
149 /* Next boot partition */
150 uint8_t next_bp;
151
152 /* Boot Partition Info Flags */
153 uint8_t flags;
154
155 /* Boot Partition Entry Info */
156 struct cse_bp_entry bp_entries[CSE_MAX_BOOT_PARTITIONS];
157} __packed;
158
159struct get_bp_info_rsp {
160 struct mkhi_hdr hdr;
161 struct cse_bp_info bp_info;
162} __packed;
163
Sridhar Siricilla33aa1152020-06-26 14:29:40 +0530164static void cse_log_status_registers(void)
165{
166 printk(BIOS_DEBUG, "cse_lite: CSE status registers: HFSTS1: 0x%x, HFSTS2: 0x%x "
167 "HFSTS3: 0x%x\n", me_read_config32(PCI_ME_HFSTS1),
168 me_read_config32(PCI_ME_HFSTS2), me_read_config32(PCI_ME_HFSTS3));
169}
170
Sridhar Siricilla87e36c42020-05-03 19:08:18 +0530171static void cse_trigger_recovery(uint8_t rec_sub_code)
172{
Sridhar Siricilla33aa1152020-06-26 14:29:40 +0530173 /* Log CSE Firmware Status Registers to help debugging */
174 cse_log_status_registers();
Sridhar Siricilla87e36c42020-05-03 19:08:18 +0530175 if (CONFIG(VBOOT)) {
Subrata Banik754de4d2020-09-15 15:16:42 +0530176 struct vb2_context *ctx = vboot_get_context();
177 if (ctx == NULL)
178 goto failure;
Sridhar Siricilla87e36c42020-05-03 19:08:18 +0530179 vb2api_fail(ctx, VB2_RECOVERY_INTEL_CSE_LITE_SKU, rec_sub_code);
180 vboot_save_data(ctx);
181 vboot_reboot();
182 }
Subrata Banik754de4d2020-09-15 15:16:42 +0530183failure:
Sridhar Siricilla87e36c42020-05-03 19:08:18 +0530184 die("cse_lite: Failed to trigger recovery mode(recovery subcode:%d)\n", rec_sub_code);
185}
186
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530187static uint8_t cse_get_current_bp(const struct cse_bp_info *cse_bp_info)
188{
189 return cse_bp_info->current_bp;
190}
191
192static const struct cse_bp_entry *cse_get_bp_entry(enum boot_partition_id bp,
193 const struct cse_bp_info *cse_bp_info)
194{
195 return &cse_bp_info->bp_entries[bp];
196}
197
198static void cse_print_boot_partition_info(const struct cse_bp_info *cse_bp_info)
199{
200 const struct cse_bp_entry *cse_bp;
201
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530202 printk(BIOS_DEBUG, "cse_lite: Number of partitions = %d\n",
203 cse_bp_info->total_number_of_bp);
204 printk(BIOS_DEBUG, "cse_lite: Current partition = %s\n",
205 GET_BP_STR(cse_bp_info->current_bp));
206 printk(BIOS_DEBUG, "cse_lite: Next partition = %s\n", GET_BP_STR(cse_bp_info->next_bp));
207 printk(BIOS_DEBUG, "cse_lite: Flags = 0x%x\n", cse_bp_info->flags);
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530208
209 /* Log version info of RO & RW partitions */
210 cse_bp = cse_get_bp_entry(RO, cse_bp_info);
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530211 printk(BIOS_DEBUG, "cse_lite: %s version = %d.%d.%d.%d (Status=0x%x, Start=0x%x, End=0x%x)\n",
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530212 GET_BP_STR(RO), cse_bp->fw_ver.major, cse_bp->fw_ver.minor,
213 cse_bp->fw_ver.hotfix, cse_bp->fw_ver.build,
214 cse_bp->status, cse_bp->start_offset,
215 cse_bp->end_offset);
216
217 cse_bp = cse_get_bp_entry(RW, cse_bp_info);
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530218 printk(BIOS_DEBUG, "cse_lite: %s version = %d.%d.%d.%d (Status=0x%x, Start=0x%x, End=0x%x)\n",
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530219 GET_BP_STR(RW), cse_bp->fw_ver.major, cse_bp->fw_ver.minor,
220 cse_bp->fw_ver.hotfix, cse_bp->fw_ver.build,
221 cse_bp->status, cse_bp->start_offset,
222 cse_bp->end_offset);
223}
224
225/*
226 * Checks prerequisites for MKHI_BUP_COMMON_GET_BOOT_PARTITION_INFO and
227 * MKHI_BUP_COMMON_SET_BOOT_PARTITION_INFO HECI commands.
228 * It allows execution of the Boot Partition commands in below scenarios:
229 * - When CSE boots from RW partition (COM: Normal and CWS: Normal)
230 * - When CSE boots from RO partition (COM: Soft Temp Disable and CWS: Normal)
231 * - After HMRFPO_ENABLE command is issued to CSE (COM: SECOVER_MEI_MSG and CWS: Normal)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530232 * The prerequisite check should be handled in cse_get_bp_info() and
233 * cse_set_next_boot_partition() since the CSE's current operation mode is changed between these
234 * cmd handler calls.
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530235 */
236static bool cse_is_bp_cmd_info_possible(void)
237{
238 if (cse_is_hfs1_cws_normal()) {
239 if (cse_is_hfs1_com_normal())
240 return true;
241 if (cse_is_hfs1_com_secover_mei_msg())
242 return true;
243 if (cse_is_hfs1_com_soft_temp_disable())
244 return true;
245 }
246 return false;
247}
248
249static bool cse_get_bp_info(struct get_bp_info_rsp *bp_info_rsp)
250{
251 struct get_bp_info_req {
252 struct mkhi_hdr hdr;
253 uint8_t reserved[4];
254 } __packed;
255
256 struct get_bp_info_req info_req = {
257 .hdr.group_id = MKHI_GROUP_ID_BUP_COMMON,
258 .hdr.command = MKHI_BUP_COMMON_GET_BOOT_PARTITION_INFO,
259 .reserved = {0},
260 };
261
262 if (!cse_is_bp_cmd_info_possible()) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530263 printk(BIOS_ERR, "cse_lite: CSE does not meet prerequisites\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530264 return false;
265 }
266
267 size_t resp_size = sizeof(struct get_bp_info_rsp);
268
269 if (!heci_send_receive(&info_req, sizeof(info_req), bp_info_rsp, &resp_size)) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530270 printk(BIOS_ERR, "cse_lite: Could not get partition info\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530271 return false;
272 }
273
274 if (bp_info_rsp->hdr.result) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530275 printk(BIOS_ERR, "cse_lite: Get partition info resp failed: %d\n",
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530276 bp_info_rsp->hdr.result);
277 return false;
278 }
279
280 cse_print_boot_partition_info(&bp_info_rsp->bp_info);
281
282 return true;
283}
284/*
285 * It sends HECI command to notify CSE about its next boot partition. When coreboot wants
286 * CSE to boot from certain partition (BP1 <RO> or BP2 <RW>), then this command can be used.
287 * The CSE's valid bootable partitions are BP1(RO) and BP2(RW).
288 * This function must be used before EOP.
289 * Returns false on failure and true on success.
290 */
291static bool cse_set_next_boot_partition(enum boot_partition_id bp)
292{
293 struct set_boot_partition_info_req {
294 struct mkhi_hdr hdr;
295 uint8_t next_bp;
296 uint8_t reserved[3];
297 } __packed;
298
299 struct set_boot_partition_info_req switch_req = {
300 .hdr.group_id = MKHI_GROUP_ID_BUP_COMMON,
301 .hdr.command = MKHI_BUP_COMMON_SET_BOOT_PARTITION_INFO,
302 .next_bp = bp,
303 .reserved = {0},
304 };
305
306 if (bp != RO && bp != RW) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530307 printk(BIOS_ERR, "cse_lite: Incorrect partition id(%d) is provided", bp);
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530308 return false;
309 }
310
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530311 printk(BIOS_INFO, "cse_lite: Set Boot Partition Info Command (%s)\n", GET_BP_STR(bp));
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530312
313 if (!cse_is_bp_cmd_info_possible()) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530314 printk(BIOS_ERR, "cse_lite: CSE does not meet prerequisites\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530315 return false;
316 }
317
318 struct mkhi_hdr switch_resp;
319 size_t sw_resp_sz = sizeof(struct mkhi_hdr);
320
321 if (!heci_send_receive(&switch_req, sizeof(switch_req), &switch_resp, &sw_resp_sz))
322 return false;
323
324 if (switch_resp.result) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530325 printk(BIOS_ERR, "cse_lite: Set Boot Partition Info Response Failed: %d\n",
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530326 switch_resp.result);
327 return false;
328 }
329
330 return true;
331}
332
V Sowmyaf9905522020-11-12 20:19:04 +0530333static bool cse_data_clear_request(const struct cse_bp_info *cse_bp_info)
334{
335 struct data_clr_request {
336 struct mkhi_hdr hdr;
337 uint8_t reserved[4];
338 } __packed;
339
340 struct data_clr_request data_clr_rq = {
341 .hdr.group_id = MKHI_GROUP_ID_BUP_COMMON,
342 .hdr.command = MKHI_BUP_COMMON_DATA_CLEAR,
343 .reserved = {0},
344 };
345
346 if (!cse_is_hfs1_cws_normal() || !cse_is_hfs1_com_soft_temp_disable() ||
347 cse_get_current_bp(cse_bp_info) != RO) {
348 printk(BIOS_ERR, "cse_lite: CSE doesn't meet DATA CLEAR cmd prerequisites\n");
349 return false;
350 }
351
352 printk(BIOS_DEBUG, "cse_lite: Sending DATA CLEAR HECI command\n");
353
354 struct mkhi_hdr data_clr_rsp;
355 size_t data_clr_rsp_sz = sizeof(data_clr_rsp);
356
357 if (!heci_send_receive(&data_clr_rq, sizeof(data_clr_rq), &data_clr_rsp,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530358 &data_clr_rsp_sz)) {
V Sowmyaf9905522020-11-12 20:19:04 +0530359 return false;
360 }
361
362 if (data_clr_rsp.result) {
363 printk(BIOS_ERR, "cse_lite: CSE DATA CLEAR command response failed: %d\n",
364 data_clr_rsp.result);
365 return false;
366 }
367
368 return true;
369}
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530370
Karthikeyan Ramasubramanianf9cc6372020-08-04 16:38:58 -0600371__weak void cse_board_reset(void)
372{
373 /* Default weak implementation, does nothing. */
374}
375
Rizwan Qureshiec321092019-09-06 20:28:43 +0530376/* Set the CSE's next boot partition and issues system reset */
377static bool cse_set_and_boot_from_next_bp(enum boot_partition_id bp)
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530378{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530379 if (!cse_set_next_boot_partition(bp))
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530380 return false;
381
Karthikeyan Ramasubramanianf9cc6372020-08-04 16:38:58 -0600382 /* Allow the board to perform a reset for CSE RO<->RW jump */
383 cse_board_reset();
384
385 /* If board does not perform the reset, then perform global_reset */
Furquan Shaikhb13bd1e2020-09-21 22:44:27 +0000386 do_global_reset();
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530387
Rizwan Qureshiec321092019-09-06 20:28:43 +0530388 die("cse_lite: Failed to reset the system\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530389
390 /* Control never reaches here */
391 return false;
392}
393
Rizwan Qureshiec321092019-09-06 20:28:43 +0530394static bool cse_boot_to_rw(const struct cse_bp_info *cse_bp_info)
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530395{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530396 if (cse_get_current_bp(cse_bp_info) == RW)
397 return true;
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530398
Rizwan Qureshiec321092019-09-06 20:28:43 +0530399 return cse_set_and_boot_from_next_bp(RW);
400}
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530401
V Sowmyaf9905522020-11-12 20:19:04 +0530402/* Check if CSE RW data partition is valid or not */
403static bool cse_is_rw_dp_valid(const struct cse_bp_info *cse_bp_info)
404{
405 const struct cse_bp_entry *rw_bp;
406
407 rw_bp = cse_get_bp_entry(RW, cse_bp_info);
408 return rw_bp->status != BP_STATUS_DATA_FAILURE;
409}
410
411/*
412 * It returns true if RW partition doesn't indicate BP_STATUS_DATA_FAILURE
413 * otherwise false if any operation fails.
414 */
415static bool cse_fix_data_failure_err(const struct cse_bp_info *cse_bp_info)
416{
417 /*
418 * If RW partition status indicates BP_STATUS_DATA_FAILURE,
419 * - Send DATA CLEAR HECI command to CSE
420 * - Send SET BOOT PARTITION INFO(RW) command to set CSE's next partition
421 * - Issue GLOBAL RESET HECI command.
422 */
423 if (cse_is_rw_dp_valid(cse_bp_info))
424 return true;
425
426 if (!cse_data_clear_request(cse_bp_info))
427 return false;
428
429 return cse_boot_to_rw(cse_bp_info);
430}
431
432#if CONFIG(SOC_INTEL_CSE_RW_UPDATE)
433static const struct fw_version *cse_get_bp_entry_version(enum boot_partition_id bp,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530434 const struct cse_bp_info *bp_info)
V Sowmyaf9905522020-11-12 20:19:04 +0530435{
436 const struct cse_bp_entry *cse_bp;
437
438 cse_bp = cse_get_bp_entry(bp, bp_info);
439 return &cse_bp->fw_ver;
440}
441
442static const struct fw_version *cse_get_rw_version(const struct cse_bp_info *cse_bp_info)
443{
444 return cse_get_bp_entry_version(RW, cse_bp_info);
445}
446
447static void cse_get_bp_entry_range(const struct cse_bp_info *cse_bp_info,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530448 enum boot_partition_id bp, uint32_t *start_offset, uint32_t *end_offset)
V Sowmyaf9905522020-11-12 20:19:04 +0530449{
450 const struct cse_bp_entry *cse_bp;
451
452 cse_bp = cse_get_bp_entry(bp, cse_bp_info);
453
454 if (start_offset)
455 *start_offset = cse_bp->start_offset;
456
457 if (end_offset)
458 *end_offset = cse_bp->end_offset;
459
460}
461
462static bool cse_is_rw_bp_status_valid(const struct cse_bp_info *cse_bp_info)
463{
464 const struct cse_bp_entry *rw_bp;
465
466 rw_bp = cse_get_bp_entry(RW, cse_bp_info);
467
468 if (rw_bp->status == BP_STATUS_PARTITION_NOT_PRESENT ||
469 rw_bp->status == BP_STATUS_GENERAL_FAILURE) {
470 printk(BIOS_ERR, "cse_lite: RW BP (status:%u) is not valid\n", rw_bp->status);
471 return false;
472 }
473 return true;
474}
475
Rizwan Qureshiec321092019-09-06 20:28:43 +0530476static bool cse_boot_to_ro(const struct cse_bp_info *cse_bp_info)
477{
478 if (cse_get_current_bp(cse_bp_info) == RO)
479 return true;
480
481 return cse_set_and_boot_from_next_bp(RO);
482}
483
484static bool cse_get_rw_rdev(struct region_device *rdev)
485{
486 if (fmap_locate_area_as_rdev_rw(CONFIG_SOC_INTEL_CSE_FMAP_NAME, rdev) < 0) {
487 printk(BIOS_ERR, "cse_lite: Failed to locate %s in FMAP\n",
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530488 CONFIG_SOC_INTEL_CSE_FMAP_NAME);
Rizwan Qureshiec321092019-09-06 20:28:43 +0530489 return false;
490 }
491
492 return true;
493}
494
Rizwan Qureshiec321092019-09-06 20:28:43 +0530495static bool cse_is_rw_bp_sign_valid(const struct region_device *target_rdev)
496{
497 uint32_t cse_bp_sign;
498
499 if (rdev_readat(target_rdev, &cse_bp_sign, 0, CSE_RW_SIGN_SIZE) != CSE_RW_SIGN_SIZE) {
500 printk(BIOS_ERR, "cse_lite: Failed to read RW boot partition signature\n");
501 return false;
502 }
503
504 return cse_bp_sign == CSE_RW_SIGNATURE;
505}
506
507static bool cse_get_target_rdev(const struct cse_bp_info *cse_bp_info,
508 struct region_device *target_rdev)
509{
510 struct region_device cse_region_rdev;
511 size_t size;
512 uint32_t start_offset;
513 uint32_t end_offset;
514
515 if (!cse_get_rw_rdev(&cse_region_rdev))
516 return false;
517
518 cse_get_bp_entry_range(cse_bp_info, RW, &start_offset, &end_offset);
519 size = end_offset + 1 - start_offset;
520
521 if (rdev_chain(target_rdev, &cse_region_rdev, start_offset, size))
522 return false;
523
524 printk(BIOS_DEBUG, "cse_lite: CSE RW partition: offset = 0x%x, size = 0x%x\n",
525 (uint32_t)start_offset, (uint32_t) size);
526
527 return true;
528}
529
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530530static const char *cse_get_source_rdev_fmap(void)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530531{
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530532 struct vb2_context *ctx = vboot_get_context();
533 if (ctx == NULL)
534 return NULL;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530535
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530536 if (vboot_is_firmware_slot_a(ctx))
537 return CONFIG_SOC_INTEL_CSE_RW_A_FMAP_NAME;
538
539 return CONFIG_SOC_INTEL_CSE_RW_B_FMAP_NAME;
540}
541
542static bool cse_get_source_rdev(struct region_device *rdev)
543{
544 const char *reg_name;
545 uint32_t cbfs_type = CBFS_TYPE_RAW;
546 struct cbfsf fh;
547
548 reg_name = cse_get_source_rdev_fmap();
549
550 if (reg_name == NULL)
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530551 return false;
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530552
553 if (cbfs_locate_file_in_region(&fh, reg_name, CONFIG_SOC_INTEL_CSE_RW_CBFS_NAME,
554 &cbfs_type) < 0)
555 return false;
556
557 cbfs_file_data(rdev, &fh);
558
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530559 return true;
560}
561
Rizwan Qureshiec321092019-09-06 20:28:43 +0530562/*
563 * Compare versions of CSE CBFS RW and CSE RW partition
564 * If ver_cmp_status = 0, no update is required
565 * If ver_cmp_status < 0, coreboot downgrades CSE RW region
566 * If ver_cmp_status > 0, coreboot upgrades CSE RW region
567 */
568static int cse_check_version_mismatch(const struct cse_bp_info *cse_bp_info,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530569 const struct cse_rw_metadata *source_metadata)
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530570{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530571 const struct fw_version *cse_rw_ver;
572
Rizwan Qureshiec321092019-09-06 20:28:43 +0530573 printk(BIOS_DEBUG, "cse_lite: CSE CBFS RW version : %d.%d.%d.%d\n",
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530574 source_metadata->version.major,
575 source_metadata->version.minor,
576 source_metadata->version.hotfix,
577 source_metadata->version.build);
Rizwan Qureshiec321092019-09-06 20:28:43 +0530578
579 cse_rw_ver = cse_get_rw_version(cse_bp_info);
580
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530581 if (source_metadata->version.major != cse_rw_ver->major)
582 return source_metadata->version.major - cse_rw_ver->major;
583 else if (source_metadata->version.minor != cse_rw_ver->minor)
584 return source_metadata->version.minor - cse_rw_ver->minor;
585 else if (source_metadata->version.hotfix != cse_rw_ver->hotfix)
586 return source_metadata->version.hotfix - cse_rw_ver->hotfix;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530587 else
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530588 return source_metadata->version.build - cse_rw_ver->build;
589}
590
591/* The function calculates SHA-256 of CSE RW blob and compares it with the provided SHA value */
592static bool cse_verify_cbfs_rw_sha256(const uint8_t *expected_rw_blob_sha,
593 const void *rw_blob, const size_t rw_blob_sz)
594
595{
596 uint8_t rw_comp_sha[VB2_SHA256_DIGEST_SIZE];
597
598 if (vb2_digest_buffer(rw_blob, rw_blob_sz, VB2_HASH_SHA256, rw_comp_sha,
599 VB2_SHA256_DIGEST_SIZE)) {
600 printk(BIOS_ERR, "cse_lite: CSE CBFS RW's SHA-256 calculation has failed\n");
601 return false;
602 }
603
604 if (memcmp(expected_rw_blob_sha, rw_comp_sha, VB2_SHA256_DIGEST_SIZE)) {
605 printk(BIOS_ERR, "cse_lite: Computed CBFS RW's SHA-256 does not match with"
606 "the provided SHA in the metadata\n");
607 return false;
608 }
609 printk(BIOS_SPEW, "cse_lite: Computed SHA of CSE CBFS RW Image matches the"
610 " provided hash in the metadata\n");
611 return true;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530612}
613
614static bool cse_erase_rw_region(const struct region_device *target_rdev)
615{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530616 if (rdev_eraseat(target_rdev, 0, region_device_sz(target_rdev)) < 0) {
617 printk(BIOS_ERR, "cse_lite: CSE RW partition could not be erased\n");
618 return false;
619 }
620 return true;
621}
622
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530623static bool cse_copy_rw(const struct region_device *target_rdev, const void *buf,
624 size_t offset, size_t size)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530625{
626 if (rdev_writeat(target_rdev, buf, offset, size) < 0) {
627 printk(BIOS_ERR, "cse_lite: Failed to update CSE firmware\n");
628 return false;
629 }
630
631 return true;
632}
633
634static bool cse_is_rw_version_latest(const struct cse_bp_info *cse_bp_info,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530635 const struct cse_rw_metadata *source_metadata)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530636{
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530637 return !cse_check_version_mismatch(cse_bp_info, source_metadata);
Rizwan Qureshiec321092019-09-06 20:28:43 +0530638}
639
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +0530640static bool cse_is_downgrade_instance(const struct cse_bp_info *cse_bp_info,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530641 const struct cse_rw_metadata *source_metadata)
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +0530642{
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530643 return cse_check_version_mismatch(cse_bp_info, source_metadata) < 0;
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +0530644}
645
Rizwan Qureshiec321092019-09-06 20:28:43 +0530646static bool cse_is_update_required(const struct cse_bp_info *cse_bp_info,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530647 const struct cse_rw_metadata *source_metadata,
648 struct region_device *target_rdev)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530649{
650 return (!cse_is_rw_bp_sign_valid(target_rdev) ||
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530651 !cse_is_rw_version_latest(cse_bp_info, source_metadata));
Rizwan Qureshiec321092019-09-06 20:28:43 +0530652}
653
654static bool cse_write_rw_region(const struct region_device *target_rdev,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530655 const void *cse_cbfs_rw, const size_t cse_cbfs_rw_sz)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530656{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530657 /* Points to CSE CBFS RW image after boot partition signature */
658 uint8_t *cse_cbfs_rw_wo_sign = (uint8_t *)cse_cbfs_rw + CSE_RW_SIGN_SIZE;
659
660 /* Size of CSE CBFS RW image without boot partition signature */
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530661 uint32_t cse_cbfs_rw_wo_sign_sz = cse_cbfs_rw_sz - CSE_RW_SIGN_SIZE;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530662
663 /* Update except CSE RW signature */
664 if (!cse_copy_rw(target_rdev, cse_cbfs_rw_wo_sign, CSE_RW_SIGN_SIZE,
665 cse_cbfs_rw_wo_sign_sz))
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530666 return false;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530667
668 /* Update CSE RW signature to indicate update is complete */
669 if (!cse_copy_rw(target_rdev, (void *)cse_cbfs_rw, 0, CSE_RW_SIGN_SIZE))
Rizwan Qureshiec321092019-09-06 20:28:43 +0530670 return false;
671
672 printk(BIOS_INFO, "cse_lite: CSE RW Update Successful\n");
673 return true;
674}
675
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530676static enum csme_failure_reason cse_update_rw(const struct cse_bp_info *cse_bp_info,
677 const void *cse_cbfs_rw, const size_t cse_blob_sz,
678 struct region_device *target_rdev)
679{
Sridhar Siricillaabeb6882020-12-07 15:55:10 +0530680 if (region_device_sz(target_rdev) < cse_blob_sz) {
681 printk(BIOS_ERR, "RW update does not fit. CSE RW flash region size: %zx, Update blob size:%zx\n",
682 region_device_sz(target_rdev), cse_blob_sz);
683 return CSE_LITE_SKU_LAYOUT_MISMATCH_ERROR;
684 }
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530685
686 if (!cse_erase_rw_region(target_rdev))
687 return CSE_LITE_SKU_FW_UPDATE_ERROR;
688
689 if (!cse_write_rw_region(target_rdev, cse_cbfs_rw, cse_blob_sz))
690 return CSE_LITE_SKU_FW_UPDATE_ERROR;
691
692 return CSE_LITE_SKU_NO_ERROR;
693}
694
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +0530695static bool cse_prep_for_rw_update(const struct cse_bp_info *cse_bp_info,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530696 const struct cse_rw_metadata *source_metadata)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530697{
698 /*
699 * To set CSE's operation mode to HMRFPO mode:
700 * 1. Ensure CSE to boot from RO(BP1)
701 * 2. Send HMRFPO_ENABLE command to CSE
702 */
703 if (!cse_boot_to_ro(cse_bp_info))
704 return false;
705
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530706 if (cse_is_downgrade_instance(cse_bp_info, source_metadata) &&
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +0530707 !cse_data_clear_request(cse_bp_info)) {
708 printk(BIOS_ERR, "cse_lite: CSE FW downgrade is aborted\n");
709 return false;
710 }
711
Rizwan Qureshiec321092019-09-06 20:28:43 +0530712 return cse_hmrfpo_enable();
713}
714
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530715static enum csme_failure_reason cse_trigger_fw_update(const struct cse_bp_info *cse_bp_info,
716 const struct cse_rw_metadata *source_metadata,
717 struct region_device *target_rdev)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530718{
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530719 struct region_device source_rdev;
720 enum csme_failure_reason rv;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530721
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530722 if (!cse_get_source_rdev(&source_rdev))
723 return CSE_LITE_SKU_RW_BLOB_NOT_FOUND;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530724
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530725 void *cse_cbfs_rw = rdev_mmap_full(&source_rdev);
726
727 if (!cse_cbfs_rw) {
728 printk(BIOS_ERR, "cse_lite: CSE CBFS RW blob could not be mapped\n");
729 return CSE_LITE_SKU_RW_BLOB_NOT_FOUND;
730 }
731
732 if (!cse_verify_cbfs_rw_sha256(source_metadata->sha256, cse_cbfs_rw,
733 region_device_sz(&source_rdev))) {
734 rv = CSE_LITE_SKU_RW_BLOB_SHA256_MISMATCH;
735 goto error_exit;
736 }
737
738 if (!cse_prep_for_rw_update(cse_bp_info, source_metadata)) {
739 rv = CSE_LITE_SKU_COMMUNICATION_ERROR;
740 goto error_exit;
741 }
742
743 rv = cse_update_rw(cse_bp_info, cse_cbfs_rw, region_device_sz(&source_rdev),
744 target_rdev);
745
746error_exit:
747 rdev_munmap(&source_rdev, cse_cbfs_rw);
748 return rv;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530749}
750
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530751static uint8_t cse_fw_update(const struct cse_bp_info *cse_bp_info)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530752{
753 struct region_device target_rdev;
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530754 struct cse_rw_metadata source_metadata;
755
756 /* Read CSE CBFS RW metadata */
V Sowmya13695162020-12-04 09:40:12 +0530757 if (cbfs_load(CONFIG_SOC_INTEL_CSE_RW_METADATA_CBFS_NAME, &source_metadata,
758 sizeof(source_metadata)) != sizeof(source_metadata)) {
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530759 printk(BIOS_ERR, "cse_lite: Failed to get CSE CBFS RW metadata\n");
760 return CSE_LITE_SKU_RW_METADATA_NOT_FOUND;
761 }
Rizwan Qureshiec321092019-09-06 20:28:43 +0530762
763 if (!cse_get_target_rdev(cse_bp_info, &target_rdev)) {
764 printk(BIOS_ERR, "cse_lite: Failed to get CSE RW Partition\n");
765 return CSE_LITE_SKU_RW_ACCESS_ERROR;
766 }
767
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530768 if (cse_is_update_required(cse_bp_info, &source_metadata, &target_rdev)) {
Rizwan Qureshiec321092019-09-06 20:28:43 +0530769 printk(BIOS_DEBUG, "cse_lite: CSE RW update is initiated\n");
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530770 return cse_trigger_fw_update(cse_bp_info, &source_metadata, &target_rdev);
Rizwan Qureshiec321092019-09-06 20:28:43 +0530771 }
772
773 if (!cse_is_rw_bp_status_valid(cse_bp_info))
774 return CSE_LITE_SKU_RW_JUMP_ERROR;
775
776 return 0;
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530777}
V Sowmyaf9905522020-11-12 20:19:04 +0530778#endif
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530779
780void cse_fw_sync(void *unused)
781{
782 static struct get_bp_info_rsp cse_bp_info;
783
784 if (vboot_recovery_mode_enabled()) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530785 printk(BIOS_DEBUG, "cse_lite: Skip switching to RW in the recovery path\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530786 return;
787 }
788
Sridhar Siricilla99dbca32020-05-12 21:05:04 +0530789 /* If CSE SKU type is not Lite, skip enabling CSE Lite SKU */
790 if (!cse_is_hfs3_fw_sku_lite()) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530791 printk(BIOS_ERR, "cse_lite: Not a CSE Lite SKU\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530792 return;
793 }
794
795 if (!cse_get_bp_info(&cse_bp_info)) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530796 printk(BIOS_ERR, "cse_lite: Failed to get CSE boot partition info\n");
Sridhar Siricilla87e36c42020-05-03 19:08:18 +0530797 cse_trigger_recovery(CSE_LITE_SKU_COMMUNICATION_ERROR);
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530798 }
799
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +0530800 if (!cse_fix_data_failure_err(&cse_bp_info.bp_info))
801 cse_trigger_recovery(CSE_LITE_SKU_DATA_WIPE_ERROR);
802
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530803 /*
804 * If SOC_INTEL_CSE_RW_UPDATE is defined , then trigger CSE firmware update. The driver
805 * triggers recovery if CSE CBFS RW metadata or CSE CBFS RW blob is not available.
806 */
V Sowmyaf9905522020-11-12 20:19:04 +0530807#if CONFIG(SOC_INTEL_CSE_RW_UPDATE)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530808 uint8_t rv;
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530809 rv = cse_fw_update(&cse_bp_info.bp_info);
810 if (rv)
811 cse_trigger_recovery(rv);
V Sowmyaf9905522020-11-12 20:19:04 +0530812#endif
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530813
814 if (!cse_boot_to_rw(&cse_bp_info.bp_info)) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530815 printk(BIOS_ERR, "cse_lite: Failed to switch to RW\n");
Sridhar Siricilla87e36c42020-05-03 19:08:18 +0530816 cse_trigger_recovery(CSE_LITE_SKU_RW_SWITCH_ERROR);
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530817 }
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530818}
819
820BOOT_STATE_INIT_ENTRY(BS_PRE_DEVICE, BS_ON_ENTRY, cse_fw_sync, NULL);