blob: 3130631a770cd8bda49d695a2d25c3b96c79e646 [file] [log] [blame]
Vladimir Serbinenko888d5592013-11-13 17:53:38 +01001/*
2 * This file is part of the coreboot project.
3 *
4 * Copyright (C) 2011 The Chromium OS Authors. All rights reserved.
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License as
8 * published by the Free Software Foundation; version 2 of
9 * the License.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston,
19 * MA 02110-1301 USA
20 */
21
22/*
23 * This is a ramstage driver for the Intel Management Engine found in the
24 * 6-series chipset. It handles the required boot-time messages over the
25 * MMIO-based Management Engine Interface to tell the ME that the BIOS is
26 * finished with POST. Additional messages are defined for debug but are
27 * not used unless the console loglevel is high enough.
28 */
29
30#include <arch/acpi.h>
31#include <arch/hlt.h>
32#include <arch/io.h>
33#include <console/console.h>
34#include <device/pci_ids.h>
35#include <device/pci_def.h>
36#include <string.h>
37#include <delay.h>
38#include <elog.h>
39
40#ifdef __SMM__
41#include <arch/pci_mmio_cfg.h>
42#else
43# include <device/device.h>
44# include <device/pci.h>
45#endif
46
47#include "me.h"
48#include "pch.h"
49
50#if CONFIG_CHROMEOS
51#include <vendorcode/google/chromeos/gnvs.h>
52#endif
53
54#ifndef __SMM__
55/* Path that the BIOS should take based on ME state */
56static const char *me_bios_path_values[] = {
57 [ME_NORMAL_BIOS_PATH] = "Normal",
58 [ME_S3WAKE_BIOS_PATH] = "S3 Wake",
59 [ME_ERROR_BIOS_PATH] = "Error",
60 [ME_RECOVERY_BIOS_PATH] = "Recovery",
61 [ME_DISABLE_BIOS_PATH] = "Disable",
62 [ME_FIRMWARE_UPDATE_BIOS_PATH] = "Firmware Update",
63};
64#endif
65
66/* MMIO base address for MEI interface */
67static u32 mei_base_address;
68
69#if CONFIG_DEBUG_INTEL_ME
70static void mei_dump(void *ptr, int dword, int offset, const char *type)
71{
72 struct mei_csr *csr;
73
74 printk(BIOS_SPEW, "%-9s[%02x] : ", type, offset);
75
76 switch (offset) {
77 case MEI_H_CSR:
78 case MEI_ME_CSR_HA:
79 csr = ptr;
80 if (!csr) {
81 printk(BIOS_SPEW, "ERROR: 0x%08x\n", dword);
82 break;
83 }
84 printk(BIOS_SPEW, "cbd=%u cbrp=%02u cbwp=%02u ready=%u "
85 "reset=%u ig=%u is=%u ie=%u\n", csr->buffer_depth,
86 csr->buffer_read_ptr, csr->buffer_write_ptr,
87 csr->ready, csr->reset, csr->interrupt_generate,
88 csr->interrupt_status, csr->interrupt_enable);
89 break;
90 case MEI_ME_CB_RW:
91 case MEI_H_CB_WW:
92 printk(BIOS_SPEW, "CB: 0x%08x\n", dword);
93 break;
94 default:
95 printk(BIOS_SPEW, "0x%08x\n", offset);
96 break;
97 }
98}
99#else
100# define mei_dump(ptr,dword,offset,type) do {} while (0)
101#endif
102
103/*
104 * ME/MEI access helpers using memcpy to avoid aliasing.
105 */
106
107static inline void mei_read_dword_ptr(void *ptr, int offset)
108{
109 u32 dword = read32(mei_base_address + offset);
110 memcpy(ptr, &dword, sizeof(dword));
111 mei_dump(ptr, dword, offset, "READ");
112}
113
114static inline void mei_write_dword_ptr(void *ptr, int offset)
115{
116 u32 dword = 0;
117 memcpy(&dword, ptr, sizeof(dword));
118 write32(mei_base_address + offset, dword);
119 mei_dump(ptr, dword, offset, "WRITE");
120}
121
122#ifndef __SMM__
123static inline void pci_read_dword_ptr(device_t dev, void *ptr, int offset)
124{
125 u32 dword = pci_read_config32(dev, offset);
126 memcpy(ptr, &dword, sizeof(dword));
127 mei_dump(ptr, dword, offset, "PCI READ");
128}
129#endif
130
131static inline void read_host_csr(struct mei_csr *csr)
132{
133 mei_read_dword_ptr(csr, MEI_H_CSR);
134}
135
136static inline void write_host_csr(struct mei_csr *csr)
137{
138 mei_write_dword_ptr(csr, MEI_H_CSR);
139}
140
141static inline void read_me_csr(struct mei_csr *csr)
142{
143 mei_read_dword_ptr(csr, MEI_ME_CSR_HA);
144}
145
146static inline void write_cb(u32 dword)
147{
148 write32(mei_base_address + MEI_H_CB_WW, dword);
149 mei_dump(NULL, dword, MEI_H_CB_WW, "WRITE");
150}
151
152static inline u32 read_cb(void)
153{
154 u32 dword = read32(mei_base_address + MEI_ME_CB_RW);
155 mei_dump(NULL, dword, MEI_ME_CB_RW, "READ");
156 return dword;
157}
158
159/* Wait for ME ready bit to be asserted */
160static int mei_wait_for_me_ready(void)
161{
162 struct mei_csr me;
163 unsigned try = ME_RETRY;
164
165 while (try--) {
166 read_me_csr(&me);
167 if (me.ready)
168 return 0;
169 udelay(ME_DELAY);
170 }
171
172 printk(BIOS_ERR, "ME: failed to become ready\n");
173 return -1;
174}
175
176static void mei_reset(void)
177{
178 struct mei_csr host;
179
180 if (mei_wait_for_me_ready() < 0)
181 return;
182
183 /* Reset host and ME circular buffers for next message */
184 read_host_csr(&host);
185 host.reset = 1;
186 host.interrupt_generate = 1;
187 write_host_csr(&host);
188
189 if (mei_wait_for_me_ready() < 0)
190 return;
191
192 /* Re-init and indicate host is ready */
193 read_host_csr(&host);
194 host.interrupt_generate = 1;
195 host.ready = 1;
196 host.reset = 0;
197 write_host_csr(&host);
198}
199
200static int mei_send_msg(struct mei_header *mei, struct mkhi_header *mkhi,
201 void *req_data)
202{
203 struct mei_csr host;
204 unsigned ndata, n;
205 u32 *data;
206
207 /* Number of dwords to write, ignoring MKHI */
208 ndata = mei->length >> 2;
209
210 /* Pad non-dword aligned request message length */
211 if (mei->length & 3)
212 ndata++;
213 if (!ndata) {
214 printk(BIOS_DEBUG, "ME: request does not include MKHI\n");
215 return -1;
216 }
217 ndata++; /* Add MEI header */
218
219 /*
220 * Make sure there is still room left in the circular buffer.
221 * Reset the buffer pointers if the requested message will not fit.
222 */
223 read_host_csr(&host);
224 if ((host.buffer_depth - host.buffer_write_ptr) < ndata) {
225 printk(BIOS_ERR, "ME: circular buffer full, resetting...\n");
226 mei_reset();
227 read_host_csr(&host);
228 }
229
230 /*
231 * This implementation does not handle splitting large messages
232 * across multiple transactions. Ensure the requested length
233 * will fit in the available circular buffer depth.
234 */
235 if ((host.buffer_depth - host.buffer_write_ptr) < ndata) {
236 printk(BIOS_ERR, "ME: message (%u) too large for buffer (%u)\n",
237 ndata + 2, host.buffer_depth);
238 return -1;
239 }
240
241 /* Write MEI header */
242 mei_write_dword_ptr(mei, MEI_H_CB_WW);
243 ndata--;
244
245 /* Write MKHI header */
246 mei_write_dword_ptr(mkhi, MEI_H_CB_WW);
247 ndata--;
248
249 /* Write message data */
250 data = req_data;
251 for (n = 0; n < ndata; ++n)
252 write_cb(*data++);
253
254 /* Generate interrupt to the ME */
255 read_host_csr(&host);
256 host.interrupt_generate = 1;
257 write_host_csr(&host);
258
259 /* Make sure ME is ready after sending request data */
260 return mei_wait_for_me_ready();
261}
262
263static int mei_recv_msg(struct mei_header *mei, struct mkhi_header *mkhi,
264 void *rsp_data, int rsp_bytes)
265{
266 struct mei_header mei_rsp;
267 struct mkhi_header mkhi_rsp;
268 struct mei_csr me, host;
269 unsigned ndata, n;
270 unsigned expected;
271 u32 *data;
272
273 /* Total number of dwords to read from circular buffer */
274 expected = (rsp_bytes + sizeof(mei_rsp) + sizeof(mkhi_rsp)) >> 2;
275 if (rsp_bytes & 3)
276 expected++;
277
278 /*
279 * The interrupt status bit does not appear to indicate that the
280 * message has actually been received. Instead we wait until the
281 * expected number of dwords are present in the circular buffer.
282 */
283 for (n = ME_RETRY; n; --n) {
284 read_me_csr(&me);
285 if ((me.buffer_write_ptr - me.buffer_read_ptr) >= expected)
286 break;
287 udelay(ME_DELAY);
288 }
289 if (!n) {
290 printk(BIOS_ERR, "ME: timeout waiting for data: expected "
291 "%u, available %u\n", expected,
292 me.buffer_write_ptr - me.buffer_read_ptr);
293 return -1;
294 }
295
296 /* Read and verify MEI response header from the ME */
297 mei_read_dword_ptr(&mei_rsp, MEI_ME_CB_RW);
298 if (!mei_rsp.is_complete) {
299 printk(BIOS_ERR, "ME: response is not complete\n");
300 return -1;
301 }
302
303 /* Handle non-dword responses and expect at least MKHI header */
304 ndata = mei_rsp.length >> 2;
305 if (mei_rsp.length & 3)
306 ndata++;
307 if (ndata != (expected - 1)) {
308 printk(BIOS_ERR, "ME: response is missing data\n");
309 return -1;
310 }
311
312 /* Read and verify MKHI response header from the ME */
313 mei_read_dword_ptr(&mkhi_rsp, MEI_ME_CB_RW);
314 if (!mkhi_rsp.is_response ||
315 mkhi->group_id != mkhi_rsp.group_id ||
316 mkhi->command != mkhi_rsp.command) {
317 printk(BIOS_ERR, "ME: invalid response, group %u ?= %u, "
318 "command %u ?= %u, is_response %u\n", mkhi->group_id,
319 mkhi_rsp.group_id, mkhi->command, mkhi_rsp.command,
320 mkhi_rsp.is_response);
321 return -1;
322 }
323 ndata--; /* MKHI header has been read */
324
325 /* Make sure caller passed a buffer with enough space */
326 if (ndata != (rsp_bytes >> 2)) {
327 printk(BIOS_ERR, "ME: not enough room in response buffer: "
328 "%u != %u\n", ndata, rsp_bytes >> 2);
329 return -1;
330 }
331
332 /* Read response data from the circular buffer */
333 data = rsp_data;
334 for (n = 0; n < ndata; ++n)
335 *data++ = read_cb();
336
337 /* Tell the ME that we have consumed the response */
338 read_host_csr(&host);
339 host.interrupt_status = 1;
340 host.interrupt_generate = 1;
341 write_host_csr(&host);
342
343 return mei_wait_for_me_ready();
344}
345
346static inline int mei_sendrecv(struct mei_header *mei, struct mkhi_header *mkhi,
347 void *req_data, void *rsp_data, int rsp_bytes)
348{
349 if (mei_send_msg(mei, mkhi, req_data) < 0)
350 return -1;
351 if (mei_recv_msg(mei, mkhi, rsp_data, rsp_bytes) < 0)
352 return -1;
353 return 0;
354}
355
356#ifdef __SMM__
357/* Send END OF POST message to the ME */
358static int mkhi_end_of_post(void)
359{
360 struct mkhi_header mkhi = {
361 .group_id = MKHI_GROUP_ID_GEN,
362 .command = MKHI_END_OF_POST,
363 };
364 struct mei_header mei = {
365 .is_complete = 1,
366 .host_address = MEI_HOST_ADDRESS,
367 .client_address = MEI_ADDRESS_MKHI,
368 .length = sizeof(mkhi),
369 };
370
371 /* Send request and wait for response */
372 if (mei_sendrecv(&mei, &mkhi, NULL, NULL, 0) < 0) {
373 printk(BIOS_ERR, "ME: END OF POST message failed\n");
374 return -1;
375 }
376
377 printk(BIOS_INFO, "ME: END OF POST message successful\n");
378 return 0;
379}
Vladimir Serbinenko888d5592013-11-13 17:53:38 +0100380
Vladimir Serbinenko888d5592013-11-13 17:53:38 +0100381static void intel_me7_finalize_smm(void)
382{
383 struct me_hfs hfs;
384 u32 reg32;
385
386 mei_base_address =
387 pci_read_config32(PCH_ME_DEV, PCI_BASE_ADDRESS_0) & ~0xf;
388
389 /* S3 path will have hidden this device already */
390 if (!mei_base_address || mei_base_address == 0xfffffff0)
391 return;
392
393 /* Make sure ME is in a mode that expects EOP */
394 reg32 = pci_read_config32(PCH_ME_DEV, PCI_ME_HFS);
395 memcpy(&hfs, &reg32, sizeof(u32));
396
397 /* Abort and leave device alone if not normal mode */
398 if (hfs.fpt_bad ||
399 hfs.working_state != ME_HFS_CWS_NORMAL ||
400 hfs.operation_mode != ME_HFS_MODE_NORMAL)
401 return;
402
403 /* Try to send EOP command so ME stops accepting other commands */
404 mkhi_end_of_post();
405
406 /* Make sure IO is disabled */
407 reg32 = pci_read_config32(PCH_ME_DEV, PCI_COMMAND);
408 reg32 &= ~(PCI_COMMAND_MASTER |
409 PCI_COMMAND_MEMORY | PCI_COMMAND_IO);
410 pci_write_config32(PCH_ME_DEV, PCI_COMMAND, reg32);
411
412 /* Hide the PCI device */
413 RCBA32_OR(FD2, PCH_DISABLE_MEI1);
414}
415
416void intel_me_finalize_smm(void)
417{
418 u32 did = pci_read_config32(PCH_ME_DEV, PCI_VENDOR_ID);
419 switch (did) {
420 case 0x1c3a8086:
421 intel_me7_finalize_smm();
422 break;
423 case 0x1e3a8086:
424 intel_me8_finalize_smm();
425 break;
426 default:
427 printk(BIOS_ERR, "No finalize handler for ME %08x.\n", did);
428 }
429}
430#else /* !__SMM__ */
431
432/* Determine the path that we should take based on ME status */
433static me_bios_path intel_me_path(device_t dev)
434{
435 me_bios_path path = ME_DISABLE_BIOS_PATH;
436 struct me_hfs hfs;
437 struct me_gmes gmes;
438
Vladimir Serbinenko888d5592013-11-13 17:53:38 +0100439 /* S3 wake skips all MKHI messages */
Kyösti Mälkkic3ed8862014-06-19 19:50:51 +0300440 if (acpi_is_wakeup_s3())
Vladimir Serbinenko888d5592013-11-13 17:53:38 +0100441 return ME_S3WAKE_BIOS_PATH;
Vladimir Serbinenko888d5592013-11-13 17:53:38 +0100442
443 pci_read_dword_ptr(dev, &hfs, PCI_ME_HFS);
444 pci_read_dword_ptr(dev, &gmes, PCI_ME_GMES);
445
446 /* Check and dump status */
447 intel_me_status(&hfs, &gmes);
448
449 /* Check Current Working State */
450 switch (hfs.working_state) {
451 case ME_HFS_CWS_NORMAL:
452 path = ME_NORMAL_BIOS_PATH;
453 break;
454 case ME_HFS_CWS_REC:
455 path = ME_RECOVERY_BIOS_PATH;
456 break;
457 default:
458 path = ME_DISABLE_BIOS_PATH;
459 break;
460 }
461
462 /* Check Current Operation Mode */
463 switch (hfs.operation_mode) {
464 case ME_HFS_MODE_NORMAL:
465 break;
466 case ME_HFS_MODE_DEBUG:
467 case ME_HFS_MODE_DIS:
468 case ME_HFS_MODE_OVER_JMPR:
469 case ME_HFS_MODE_OVER_MEI:
470 default:
471 path = ME_DISABLE_BIOS_PATH;
472 break;
473 }
474
475 /* Check for any error code and valid firmware */
476 if (hfs.error_code || hfs.fpt_bad)
477 path = ME_ERROR_BIOS_PATH;
478
479#if CONFIG_ELOG
480 if (path != ME_NORMAL_BIOS_PATH) {
481 struct elog_event_data_me_extended data = {
482 .current_working_state = hfs.working_state,
483 .operation_state = hfs.operation_state,
484 .operation_mode = hfs.operation_mode,
485 .error_code = hfs.error_code,
486 .progress_code = gmes.progress_code,
487 .current_pmevent = gmes.current_pmevent,
488 .current_state = gmes.current_state,
489 };
490 elog_add_event_byte(ELOG_TYPE_MANAGEMENT_ENGINE, path);
491 elog_add_event_raw(ELOG_TYPE_MANAGEMENT_ENGINE_EXT,
492 &data, sizeof(data));
493 }
494#endif
495
496 return path;
497}
498
499/* Prepare ME for MEI messages */
500static int intel_mei_setup(device_t dev)
501{
502 struct resource *res;
503 struct mei_csr host;
504 u32 reg32;
505
506 /* Find the MMIO base for the ME interface */
507 res = find_resource(dev, PCI_BASE_ADDRESS_0);
508 if (!res || res->base == 0 || res->size == 0) {
509 printk(BIOS_DEBUG, "ME: MEI resource not present!\n");
510 return -1;
511 }
512 mei_base_address = res->base;
513
514 /* Ensure Memory and Bus Master bits are set */
515 reg32 = pci_read_config32(dev, PCI_COMMAND);
516 reg32 |= PCI_COMMAND_MASTER | PCI_COMMAND_MEMORY;
517 pci_write_config32(dev, PCI_COMMAND, reg32);
518
519 /* Clean up status for next message */
520 read_host_csr(&host);
521 host.interrupt_generate = 1;
522 host.ready = 1;
523 host.reset = 0;
524 write_host_csr(&host);
525
526 return 0;
527}
528
529/* Read the Extend register hash of ME firmware */
530static int intel_me_extend_valid(device_t dev)
531{
532 struct me_heres status;
533 u32 extend[8] = {0};
534 int i, count = 0;
535
536 pci_read_dword_ptr(dev, &status, PCI_ME_HERES);
537 if (!status.extend_feature_present) {
538 printk(BIOS_ERR, "ME: Extend Feature not present\n");
539 return -1;
540 }
541
542 if (!status.extend_reg_valid) {
543 printk(BIOS_ERR, "ME: Extend Register not valid\n");
544 return -1;
545 }
546
547 switch (status.extend_reg_algorithm) {
548 case PCI_ME_EXT_SHA1:
549 count = 5;
550 printk(BIOS_DEBUG, "ME: Extend SHA-1: ");
551 break;
552 case PCI_ME_EXT_SHA256:
553 count = 8;
554 printk(BIOS_DEBUG, "ME: Extend SHA-256: ");
555 break;
556 default:
557 printk(BIOS_ERR, "ME: Extend Algorithm %d unknown\n",
558 status.extend_reg_algorithm);
559 return -1;
560 }
561
562 for (i = 0; i < count; ++i) {
563 extend[i] = pci_read_config32(dev, PCI_ME_HER(i));
564 printk(BIOS_DEBUG, "%08x", extend[i]);
565 }
566 printk(BIOS_DEBUG, "\n");
567
568#if CONFIG_CHROMEOS
569 /* Save hash in NVS for the OS to verify */
570 chromeos_set_me_hash(extend, count);
571#endif
572
573 return 0;
574}
575
576/* Hide the ME virtual PCI devices */
577static void intel_me_hide(device_t dev)
578{
579 dev->enabled = 0;
580 pch_enable(dev);
581}
582
583/* Check whether ME is present and do basic init */
584static void intel_me_init(device_t dev)
585{
586 me_bios_path path = intel_me_path(dev);
587
588 /* Do initial setup and determine the BIOS path */
589 printk(BIOS_NOTICE, "ME: BIOS path: %s\n", me_bios_path_values[path]);
590
591 switch (path) {
592 case ME_S3WAKE_BIOS_PATH:
593 intel_me_hide(dev);
594 break;
595
596 case ME_NORMAL_BIOS_PATH:
597 /* Validate the extend register */
598 if (intel_me_extend_valid(dev) < 0)
599 break; /* TODO: force recovery mode */
600
601 /* Prepare MEI MMIO interface */
602 if (intel_mei_setup(dev) < 0)
603 break;
604
Vladimir Serbinenko888d5592013-11-13 17:53:38 +0100605 /*
606 * Leave the ME unlocked in this path.
607 * It will be locked via SMI command later.
608 */
609 break;
610
611 case ME_ERROR_BIOS_PATH:
612 case ME_RECOVERY_BIOS_PATH:
613 case ME_DISABLE_BIOS_PATH:
614 case ME_FIRMWARE_UPDATE_BIOS_PATH:
615 break;
616 }
617}
618
619static void set_subsystem(device_t dev, unsigned vendor, unsigned device)
620{
621 if (!vendor || !device) {
622 pci_write_config32(dev, PCI_SUBSYSTEM_VENDOR_ID,
623 pci_read_config32(dev, PCI_VENDOR_ID));
624 } else {
625 pci_write_config32(dev, PCI_SUBSYSTEM_VENDOR_ID,
626 ((device & 0xffff) << 16) | (vendor & 0xffff));
627 }
628}
629
630static struct pci_operations pci_ops = {
631 .set_subsystem = set_subsystem,
632};
633
634static struct device_operations device_ops = {
635 .read_resources = pci_dev_read_resources,
636 .set_resources = pci_dev_set_resources,
637 .enable_resources = pci_dev_enable_resources,
638 .init = intel_me_init,
639 .scan_bus = scan_static_bus,
640 .ops_pci = &pci_ops,
641};
642
643static const unsigned short pci_device_ids[] = { 0x1c3a, 0x3b64,
644 0 };
645
646
647static const struct pci_driver intel_me __pci_driver = {
648 .ops = &device_ops,
649 .vendor = PCI_VENDOR_ID_INTEL,
650 .devices = pci_device_ids
651};
652
653#endif /* !__SMM__ */