blob: d4f474d6f13d4eff1a92a91324a90370f84b0805 [file] [log] [blame]
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301/* SPDX-License-Identifier: GPL-2.0-only */
Elyes HAOUAS944da482021-02-01 21:30:13 +01002
Krishna P Bhat De3178a12022-04-21 16:40:06 +05303#include <acpi/acpi.h>
Sridhar Siricilla0aa1ac42022-03-09 20:35:32 +05304#include <arch/cpu.h>
Krishna P Bhat De3178a12022-04-21 16:40:06 +05305#include <bootstate.h>
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05306#include <console/console.h>
Rizwan Qureshiec321092019-09-06 20:28:43 +05307#include <cbfs.h>
Rizwan Qureshiec321092019-09-06 20:28:43 +05308#include <commonlib/region.h>
9#include <fmap.h>
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053010#include <intelblocks/cse.h>
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +053011#include <intelblocks/cse_layout.h>
Sridhar Siricilla0aa1ac42022-03-09 20:35:32 +053012#include <intelbasecode/debug_feature.h>
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053013#include <security/vboot/vboot_common.h>
Sridhar Siricilla87e36c42020-05-03 19:08:18 +053014#include <security/vboot/misc.h>
Rizwan Qureshiec321092019-09-06 20:28:43 +053015#include <soc/intel/common/reset.h>
Krishna P Bhat De3178a12022-04-21 16:40:06 +053016#include <timestamp.h>
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +053017
18#define BPDT_HEADER_SZ sizeof(struct bpdt_header)
19#define BPDT_ENTRY_SZ sizeof(struct bpdt_entry)
20#define SUBPART_HEADER_SZ sizeof(struct subpart_hdr)
21#define SUBPART_ENTRY_SZ sizeof(struct subpart_entry)
22#define SUBPART_MANIFEST_HDR_SZ sizeof(struct subpart_entry_manifest_header)
Rizwan Qureshiec321092019-09-06 20:28:43 +053023
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053024/* Converts bp index to boot partition string */
25#define GET_BP_STR(bp_index) (bp_index ? "RW" : "RO")
26
Rizwan Qureshiec321092019-09-06 20:28:43 +053027/* CSE RW boot partition signature */
28#define CSE_RW_SIGNATURE 0x000055aa
29
30/* CSE RW boot partition signature size */
31#define CSE_RW_SIGN_SIZE sizeof(uint32_t)
32
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053033/*
Sridhar Siricilla99dbca32020-05-12 21:05:04 +053034 * CSE Firmware supports 3 boot partitions. For CSE Lite SKU, only 2 boot partitions are
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053035 * used and 3rd boot partition is set to BP_STATUS_PARTITION_NOT_PRESENT.
Sridhar Siricilla99dbca32020-05-12 21:05:04 +053036 * CSE Lite SKU Image Layout:
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053037 * ------------- ------------------- ---------------------
38 * |CSE REGION | => | RO | RW | DATA | => | BP1 | BP2 | DATA |
39 * ------------- ------------------- ---------------------
40 */
41#define CSE_MAX_BOOT_PARTITIONS 3
42
Sridhar Siricilla99dbca32020-05-12 21:05:04 +053043/* CSE Lite SKU's valid bootable partition identifiers */
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053044enum boot_partition_id {
Rizwan Qureshiec321092019-09-06 20:28:43 +053045 /* RO(BP1) contains recovery/minimal boot firmware */
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053046 RO = 0,
47
Rizwan Qureshiec321092019-09-06 20:28:43 +053048 /* RW(BP2) contains fully functional CSE firmware */
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053049 RW = 1
50};
51
52/*
53 * Boot partition status.
54 * The status is returned in response to MKHI_BUP_COMMON_GET_BOOT_PARTITION_INFO cmd.
55 */
56enum bp_status {
57 /* This value is returned when a partition has no errors */
58 BP_STATUS_SUCCESS = 0,
59
60 /*
61 * This value is returned when a partition should be present based on layout, but it is
62 * not valid.
63 */
64 BP_STATUS_GENERAL_FAILURE = 1,
65
66 /* This value is returned when a partition is not present per initial image layout */
67 BP_STATUS_PARTITION_NOT_PRESENT = 2,
68
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +053069 /*
70 * This value is returned when unexpected issues are detected in CSE Data area
71 * and CSE TCB-SVN downgrade scenario.
72 */
73 BP_STATUS_DATA_FAILURE = 3,
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053074};
75
76/*
77 * Boot Partition Info Flags
78 * The flags are returned in response to MKHI_BUP_COMMON_GET_BOOT_PARTITION_INFO cmd.
79 */
80enum bp_info_flags {
81
82 /* Redundancy Enabled: It indicates CSE supports RO(BP1) and RW(BP2) regions */
83 BP_INFO_REDUNDANCY_EN = 1 << 0,
84
85 /* It indicates RO(BP1) supports Minimal Recovery Mode */
86 BP_INFO_MIN_RECOV_MODE_EN = 1 << 1,
87
88 /*
89 * Read-only Config Enabled: It indicates HW protection to CSE RO region is enabled.
90 * The option is relevant only if the BP_INFO_MIN_RECOV_MODE_EN flag is enabled.
91 */
92 BP_INFO_READ_ONLY_CFG = 1 << 2,
93};
94
Sridhar Siricillaf87ff332019-09-12 17:18:20 +053095/* CSE boot partition entry info */
96struct cse_bp_entry {
97 /* Boot partition version */
98 struct fw_version fw_ver;
99
100 /* Boot partition status */
101 uint32_t status;
102
103 /* Starting offset of the partition within CSE region */
104 uint32_t start_offset;
105
106 /* Ending offset of the partition within CSE region */
107 uint32_t end_offset;
108 uint8_t reserved[12];
109} __packed;
110
111/* CSE boot partition info */
112struct cse_bp_info {
113 /* Number of boot partitions */
114 uint8_t total_number_of_bp;
115
116 /* Current boot partition */
117 uint8_t current_bp;
118
119 /* Next boot partition */
120 uint8_t next_bp;
121
122 /* Boot Partition Info Flags */
123 uint8_t flags;
124
125 /* Boot Partition Entry Info */
126 struct cse_bp_entry bp_entries[CSE_MAX_BOOT_PARTITIONS];
127} __packed;
128
129struct get_bp_info_rsp {
130 struct mkhi_hdr hdr;
131 struct cse_bp_info bp_info;
132} __packed;
133
Sridhar Siricilla52479c72022-03-30 09:25:49 +0530134static const char * const cse_regions[] = {"RO", "RW"};
Bora Guvendikf33c9bf2021-11-05 23:09:25 -0700135
136bool cse_get_boot_performance_data(struct cse_boot_perf_rsp *boot_perf_rsp)
137{
138 struct cse_boot_perf_req {
139 struct mkhi_hdr hdr;
140 uint32_t reserved;
141 } __packed;
142
143 struct cse_boot_perf_req req = {
144 .hdr.group_id = MKHI_GROUP_ID_BUP_COMMON,
145 .hdr.command = MKHI_BUP_COMMON_GET_BOOT_PERF_DATA,
146 .reserved = 0,
147 };
148
149 size_t resp_size = sizeof(struct cse_boot_perf_rsp);
150
Sridhar Siricilla6836da22022-02-23 23:36:45 +0530151 if (heci_send_receive(&req, sizeof(req), boot_perf_rsp, &resp_size,
Bora Guvendikf33c9bf2021-11-05 23:09:25 -0700152 HECI_MKHI_ADDR)) {
153 printk(BIOS_ERR, "cse_lite: Could not get boot performance data\n");
154 return false;
155 }
156
157 if (boot_perf_rsp->hdr.result) {
158 printk(BIOS_ERR, "cse_lite: Get boot performance data resp failed: %d\n",
159 boot_perf_rsp->hdr.result);
160 return false;
161 }
162
163 return true;
164}
165
166
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530167static uint8_t cse_get_current_bp(const struct cse_bp_info *cse_bp_info)
168{
169 return cse_bp_info->current_bp;
170}
171
172static const struct cse_bp_entry *cse_get_bp_entry(enum boot_partition_id bp,
173 const struct cse_bp_info *cse_bp_info)
174{
175 return &cse_bp_info->bp_entries[bp];
176}
177
178static void cse_print_boot_partition_info(const struct cse_bp_info *cse_bp_info)
179{
180 const struct cse_bp_entry *cse_bp;
181
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530182 printk(BIOS_DEBUG, "cse_lite: Number of partitions = %d\n",
183 cse_bp_info->total_number_of_bp);
184 printk(BIOS_DEBUG, "cse_lite: Current partition = %s\n",
185 GET_BP_STR(cse_bp_info->current_bp));
186 printk(BIOS_DEBUG, "cse_lite: Next partition = %s\n", GET_BP_STR(cse_bp_info->next_bp));
187 printk(BIOS_DEBUG, "cse_lite: Flags = 0x%x\n", cse_bp_info->flags);
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530188
189 /* Log version info of RO & RW partitions */
190 cse_bp = cse_get_bp_entry(RO, cse_bp_info);
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530191 printk(BIOS_DEBUG, "cse_lite: %s version = %d.%d.%d.%d (Status=0x%x, Start=0x%x, End=0x%x)\n",
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530192 GET_BP_STR(RO), cse_bp->fw_ver.major, cse_bp->fw_ver.minor,
193 cse_bp->fw_ver.hotfix, cse_bp->fw_ver.build,
194 cse_bp->status, cse_bp->start_offset,
195 cse_bp->end_offset);
196
197 cse_bp = cse_get_bp_entry(RW, cse_bp_info);
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530198 printk(BIOS_DEBUG, "cse_lite: %s version = %d.%d.%d.%d (Status=0x%x, Start=0x%x, End=0x%x)\n",
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530199 GET_BP_STR(RW), cse_bp->fw_ver.major, cse_bp->fw_ver.minor,
200 cse_bp->fw_ver.hotfix, cse_bp->fw_ver.build,
201 cse_bp->status, cse_bp->start_offset,
202 cse_bp->end_offset);
203}
204
205/*
206 * Checks prerequisites for MKHI_BUP_COMMON_GET_BOOT_PARTITION_INFO and
207 * MKHI_BUP_COMMON_SET_BOOT_PARTITION_INFO HECI commands.
208 * It allows execution of the Boot Partition commands in below scenarios:
209 * - When CSE boots from RW partition (COM: Normal and CWS: Normal)
210 * - When CSE boots from RO partition (COM: Soft Temp Disable and CWS: Normal)
211 * - After HMRFPO_ENABLE command is issued to CSE (COM: SECOVER_MEI_MSG and CWS: Normal)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530212 * The prerequisite check should be handled in cse_get_bp_info() and
213 * cse_set_next_boot_partition() since the CSE's current operation mode is changed between these
214 * cmd handler calls.
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530215 */
216static bool cse_is_bp_cmd_info_possible(void)
217{
218 if (cse_is_hfs1_cws_normal()) {
219 if (cse_is_hfs1_com_normal())
220 return true;
221 if (cse_is_hfs1_com_secover_mei_msg())
222 return true;
223 if (cse_is_hfs1_com_soft_temp_disable())
224 return true;
225 }
226 return false;
227}
228
229static bool cse_get_bp_info(struct get_bp_info_rsp *bp_info_rsp)
230{
231 struct get_bp_info_req {
232 struct mkhi_hdr hdr;
233 uint8_t reserved[4];
234 } __packed;
235
236 struct get_bp_info_req info_req = {
237 .hdr.group_id = MKHI_GROUP_ID_BUP_COMMON,
238 .hdr.command = MKHI_BUP_COMMON_GET_BOOT_PARTITION_INFO,
239 .reserved = {0},
240 };
241
242 if (!cse_is_bp_cmd_info_possible()) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530243 printk(BIOS_ERR, "cse_lite: CSE does not meet prerequisites\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530244 return false;
245 }
246
247 size_t resp_size = sizeof(struct get_bp_info_rsp);
248
Sridhar Siricilla6836da22022-02-23 23:36:45 +0530249 if (heci_send_receive(&info_req, sizeof(info_req), bp_info_rsp, &resp_size,
Rizwan Qureshi957857d2021-08-30 16:43:57 +0530250 HECI_MKHI_ADDR)) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530251 printk(BIOS_ERR, "cse_lite: Could not get partition info\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530252 return false;
253 }
254
255 if (bp_info_rsp->hdr.result) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530256 printk(BIOS_ERR, "cse_lite: Get partition info resp failed: %d\n",
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530257 bp_info_rsp->hdr.result);
258 return false;
259 }
260
261 cse_print_boot_partition_info(&bp_info_rsp->bp_info);
262
263 return true;
264}
265/*
266 * It sends HECI command to notify CSE about its next boot partition. When coreboot wants
267 * CSE to boot from certain partition (BP1 <RO> or BP2 <RW>), then this command can be used.
268 * The CSE's valid bootable partitions are BP1(RO) and BP2(RW).
269 * This function must be used before EOP.
270 * Returns false on failure and true on success.
271 */
272static bool cse_set_next_boot_partition(enum boot_partition_id bp)
273{
274 struct set_boot_partition_info_req {
275 struct mkhi_hdr hdr;
276 uint8_t next_bp;
277 uint8_t reserved[3];
278 } __packed;
279
280 struct set_boot_partition_info_req switch_req = {
281 .hdr.group_id = MKHI_GROUP_ID_BUP_COMMON,
282 .hdr.command = MKHI_BUP_COMMON_SET_BOOT_PARTITION_INFO,
283 .next_bp = bp,
284 .reserved = {0},
285 };
286
287 if (bp != RO && bp != RW) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530288 printk(BIOS_ERR, "cse_lite: Incorrect partition id(%d) is provided", bp);
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530289 return false;
290 }
291
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530292 printk(BIOS_INFO, "cse_lite: Set Boot Partition Info Command (%s)\n", GET_BP_STR(bp));
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530293
294 if (!cse_is_bp_cmd_info_possible()) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530295 printk(BIOS_ERR, "cse_lite: CSE does not meet prerequisites\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530296 return false;
297 }
298
299 struct mkhi_hdr switch_resp;
300 size_t sw_resp_sz = sizeof(struct mkhi_hdr);
301
Sridhar Siricilla6836da22022-02-23 23:36:45 +0530302 if (heci_send_receive(&switch_req, sizeof(switch_req), &switch_resp, &sw_resp_sz,
Rizwan Qureshi957857d2021-08-30 16:43:57 +0530303 HECI_MKHI_ADDR))
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530304 return false;
305
306 if (switch_resp.result) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +0530307 printk(BIOS_ERR, "cse_lite: Set Boot Partition Info Response Failed: %d\n",
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530308 switch_resp.result);
309 return false;
310 }
311
312 return true;
313}
314
V Sowmyaf9905522020-11-12 20:19:04 +0530315static bool cse_data_clear_request(const struct cse_bp_info *cse_bp_info)
316{
317 struct data_clr_request {
318 struct mkhi_hdr hdr;
319 uint8_t reserved[4];
320 } __packed;
321
322 struct data_clr_request data_clr_rq = {
323 .hdr.group_id = MKHI_GROUP_ID_BUP_COMMON,
324 .hdr.command = MKHI_BUP_COMMON_DATA_CLEAR,
325 .reserved = {0},
326 };
327
328 if (!cse_is_hfs1_cws_normal() || !cse_is_hfs1_com_soft_temp_disable() ||
329 cse_get_current_bp(cse_bp_info) != RO) {
330 printk(BIOS_ERR, "cse_lite: CSE doesn't meet DATA CLEAR cmd prerequisites\n");
331 return false;
332 }
333
334 printk(BIOS_DEBUG, "cse_lite: Sending DATA CLEAR HECI command\n");
335
336 struct mkhi_hdr data_clr_rsp;
337 size_t data_clr_rsp_sz = sizeof(data_clr_rsp);
338
Sridhar Siricilla6836da22022-02-23 23:36:45 +0530339 if (heci_send_receive(&data_clr_rq, sizeof(data_clr_rq), &data_clr_rsp,
Rizwan Qureshi957857d2021-08-30 16:43:57 +0530340 &data_clr_rsp_sz, HECI_MKHI_ADDR)) {
V Sowmyaf9905522020-11-12 20:19:04 +0530341 return false;
342 }
343
344 if (data_clr_rsp.result) {
345 printk(BIOS_ERR, "cse_lite: CSE DATA CLEAR command response failed: %d\n",
346 data_clr_rsp.result);
347 return false;
348 }
349
350 return true;
351}
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530352
Karthikeyan Ramasubramanianf9cc6372020-08-04 16:38:58 -0600353__weak void cse_board_reset(void)
354{
355 /* Default weak implementation, does nothing. */
356}
357
Rizwan Qureshiec321092019-09-06 20:28:43 +0530358/* Set the CSE's next boot partition and issues system reset */
359static bool cse_set_and_boot_from_next_bp(enum boot_partition_id bp)
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530360{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530361 if (!cse_set_next_boot_partition(bp))
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530362 return false;
363
Karthikeyan Ramasubramanianf9cc6372020-08-04 16:38:58 -0600364 /* Allow the board to perform a reset for CSE RO<->RW jump */
365 cse_board_reset();
366
367 /* If board does not perform the reset, then perform global_reset */
Furquan Shaikhb13bd1e2020-09-21 22:44:27 +0000368 do_global_reset();
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530369
Rizwan Qureshiec321092019-09-06 20:28:43 +0530370 die("cse_lite: Failed to reset the system\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530371
372 /* Control never reaches here */
373 return false;
374}
375
Rizwan Qureshiec321092019-09-06 20:28:43 +0530376static bool cse_boot_to_rw(const struct cse_bp_info *cse_bp_info)
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530377{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530378 if (cse_get_current_bp(cse_bp_info) == RW)
379 return true;
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530380
Rizwan Qureshiec321092019-09-06 20:28:43 +0530381 return cse_set_and_boot_from_next_bp(RW);
382}
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530383
V Sowmyaf9905522020-11-12 20:19:04 +0530384/* Check if CSE RW data partition is valid or not */
385static bool cse_is_rw_dp_valid(const struct cse_bp_info *cse_bp_info)
386{
387 const struct cse_bp_entry *rw_bp;
388
389 rw_bp = cse_get_bp_entry(RW, cse_bp_info);
390 return rw_bp->status != BP_STATUS_DATA_FAILURE;
391}
392
393/*
394 * It returns true if RW partition doesn't indicate BP_STATUS_DATA_FAILURE
395 * otherwise false if any operation fails.
396 */
397static bool cse_fix_data_failure_err(const struct cse_bp_info *cse_bp_info)
398{
399 /*
400 * If RW partition status indicates BP_STATUS_DATA_FAILURE,
401 * - Send DATA CLEAR HECI command to CSE
402 * - Send SET BOOT PARTITION INFO(RW) command to set CSE's next partition
403 * - Issue GLOBAL RESET HECI command.
404 */
405 if (cse_is_rw_dp_valid(cse_bp_info))
406 return true;
407
408 if (!cse_data_clear_request(cse_bp_info))
409 return false;
410
411 return cse_boot_to_rw(cse_bp_info);
412}
413
V Sowmyaf9905522020-11-12 20:19:04 +0530414static const struct fw_version *cse_get_bp_entry_version(enum boot_partition_id bp,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530415 const struct cse_bp_info *bp_info)
V Sowmyaf9905522020-11-12 20:19:04 +0530416{
417 const struct cse_bp_entry *cse_bp;
418
419 cse_bp = cse_get_bp_entry(bp, bp_info);
420 return &cse_bp->fw_ver;
421}
422
423static const struct fw_version *cse_get_rw_version(const struct cse_bp_info *cse_bp_info)
424{
425 return cse_get_bp_entry_version(RW, cse_bp_info);
426}
427
428static void cse_get_bp_entry_range(const struct cse_bp_info *cse_bp_info,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530429 enum boot_partition_id bp, uint32_t *start_offset, uint32_t *end_offset)
V Sowmyaf9905522020-11-12 20:19:04 +0530430{
431 const struct cse_bp_entry *cse_bp;
432
433 cse_bp = cse_get_bp_entry(bp, cse_bp_info);
434
435 if (start_offset)
436 *start_offset = cse_bp->start_offset;
437
438 if (end_offset)
439 *end_offset = cse_bp->end_offset;
440
441}
442
443static bool cse_is_rw_bp_status_valid(const struct cse_bp_info *cse_bp_info)
444{
445 const struct cse_bp_entry *rw_bp;
446
447 rw_bp = cse_get_bp_entry(RW, cse_bp_info);
448
449 if (rw_bp->status == BP_STATUS_PARTITION_NOT_PRESENT ||
450 rw_bp->status == BP_STATUS_GENERAL_FAILURE) {
451 printk(BIOS_ERR, "cse_lite: RW BP (status:%u) is not valid\n", rw_bp->status);
452 return false;
453 }
454 return true;
455}
456
Rizwan Qureshiec321092019-09-06 20:28:43 +0530457static bool cse_boot_to_ro(const struct cse_bp_info *cse_bp_info)
458{
459 if (cse_get_current_bp(cse_bp_info) == RO)
460 return true;
461
462 return cse_set_and_boot_from_next_bp(RO);
463}
464
465static bool cse_get_rw_rdev(struct region_device *rdev)
466{
467 if (fmap_locate_area_as_rdev_rw(CONFIG_SOC_INTEL_CSE_FMAP_NAME, rdev) < 0) {
468 printk(BIOS_ERR, "cse_lite: Failed to locate %s in FMAP\n",
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530469 CONFIG_SOC_INTEL_CSE_FMAP_NAME);
Rizwan Qureshiec321092019-09-06 20:28:43 +0530470 return false;
471 }
472
473 return true;
474}
475
Rizwan Qureshiec321092019-09-06 20:28:43 +0530476static bool cse_is_rw_bp_sign_valid(const struct region_device *target_rdev)
477{
478 uint32_t cse_bp_sign;
479
480 if (rdev_readat(target_rdev, &cse_bp_sign, 0, CSE_RW_SIGN_SIZE) != CSE_RW_SIGN_SIZE) {
481 printk(BIOS_ERR, "cse_lite: Failed to read RW boot partition signature\n");
482 return false;
483 }
484
485 return cse_bp_sign == CSE_RW_SIGNATURE;
486}
487
488static bool cse_get_target_rdev(const struct cse_bp_info *cse_bp_info,
489 struct region_device *target_rdev)
490{
491 struct region_device cse_region_rdev;
492 size_t size;
493 uint32_t start_offset;
494 uint32_t end_offset;
495
496 if (!cse_get_rw_rdev(&cse_region_rdev))
497 return false;
498
499 cse_get_bp_entry_range(cse_bp_info, RW, &start_offset, &end_offset);
500 size = end_offset + 1 - start_offset;
501
502 if (rdev_chain(target_rdev, &cse_region_rdev, start_offset, size))
503 return false;
504
505 printk(BIOS_DEBUG, "cse_lite: CSE RW partition: offset = 0x%x, size = 0x%x\n",
506 (uint32_t)start_offset, (uint32_t) size);
507
508 return true;
509}
510
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530511static const char *cse_get_source_rdev_fmap(void)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530512{
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530513 struct vb2_context *ctx = vboot_get_context();
514 if (ctx == NULL)
515 return NULL;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530516
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530517 if (vboot_is_firmware_slot_a(ctx))
518 return CONFIG_SOC_INTEL_CSE_RW_A_FMAP_NAME;
519
520 return CONFIG_SOC_INTEL_CSE_RW_B_FMAP_NAME;
521}
522
Rizwan Qureshiec321092019-09-06 20:28:43 +0530523/*
Sridhar Siricillab9277ba2021-11-27 13:57:40 +0530524 * Compare versions of CSE CBFS sub-component and CSE sub-component partition
525 * In case of CSE component comparison:
Rizwan Qureshiec321092019-09-06 20:28:43 +0530526 * If ver_cmp_status = 0, no update is required
527 * If ver_cmp_status < 0, coreboot downgrades CSE RW region
528 * If ver_cmp_status > 0, coreboot upgrades CSE RW region
529 */
Sridhar Siricillab9277ba2021-11-27 13:57:40 +0530530static int cse_compare_sub_part_version(const struct fw_version *a, const struct fw_version *b)
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530531{
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700532 if (a->major != b->major)
533 return a->major - b->major;
534 else if (a->minor != b->minor)
535 return a->minor - b->minor;
536 else if (a->hotfix != b->hotfix)
537 return a->hotfix - b->hotfix;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530538 else
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700539 return a->build - b->build;
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530540}
541
542/* The function calculates SHA-256 of CSE RW blob and compares it with the provided SHA value */
543static bool cse_verify_cbfs_rw_sha256(const uint8_t *expected_rw_blob_sha,
544 const void *rw_blob, const size_t rw_blob_sz)
545
546{
547 uint8_t rw_comp_sha[VB2_SHA256_DIGEST_SIZE];
548
549 if (vb2_digest_buffer(rw_blob, rw_blob_sz, VB2_HASH_SHA256, rw_comp_sha,
550 VB2_SHA256_DIGEST_SIZE)) {
551 printk(BIOS_ERR, "cse_lite: CSE CBFS RW's SHA-256 calculation has failed\n");
552 return false;
553 }
554
555 if (memcmp(expected_rw_blob_sha, rw_comp_sha, VB2_SHA256_DIGEST_SIZE)) {
556 printk(BIOS_ERR, "cse_lite: Computed CBFS RW's SHA-256 does not match with"
557 "the provided SHA in the metadata\n");
558 return false;
559 }
560 printk(BIOS_SPEW, "cse_lite: Computed SHA of CSE CBFS RW Image matches the"
561 " provided hash in the metadata\n");
562 return true;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530563}
564
565static bool cse_erase_rw_region(const struct region_device *target_rdev)
566{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530567 if (rdev_eraseat(target_rdev, 0, region_device_sz(target_rdev)) < 0) {
568 printk(BIOS_ERR, "cse_lite: CSE RW partition could not be erased\n");
569 return false;
570 }
571 return true;
572}
573
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530574static bool cse_copy_rw(const struct region_device *target_rdev, const void *buf,
575 size_t offset, size_t size)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530576{
577 if (rdev_writeat(target_rdev, buf, offset, size) < 0) {
578 printk(BIOS_ERR, "cse_lite: Failed to update CSE firmware\n");
579 return false;
580 }
581
582 return true;
583}
584
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700585enum cse_update_status {
586 CSE_UPDATE_NOT_REQUIRED,
587 CSE_UPDATE_UPGRADE,
588 CSE_UPDATE_DOWNGRADE,
589 CSE_UPDATE_CORRUPTED,
590 CSE_UPDATE_METADATA_ERROR,
591};
Rizwan Qureshiec321092019-09-06 20:28:43 +0530592
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700593static bool read_ver_field(const char *start, char **curr, size_t size, uint16_t *ver_field)
594{
595 if ((*curr - start) >= size) {
596 printk(BIOS_ERR, "cse_lite: Version string read overflow!\n");
597 return false;
598 }
599
600 *ver_field = skip_atoi(curr);
601 (*curr)++;
602 return true;
603}
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +0530604
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700605static enum cse_update_status cse_check_update_status(const struct cse_bp_info *cse_bp_info,
606 struct region_device *target_rdev)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530607{
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700608 int ret;
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700609 struct fw_version cbfs_rw_version;
610 char *version_str, *ptr;
611 size_t size;
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700612
613 if (!cse_is_rw_bp_sign_valid(target_rdev))
614 return CSE_UPDATE_CORRUPTED;
615
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700616 ptr = version_str = cbfs_map(CONFIG_SOC_INTEL_CSE_RW_VERSION_CBFS_NAME, &size);
617 if (!version_str) {
618 printk(BIOS_ERR, "cse_lite: Failed to get %s\n",
619 CONFIG_SOC_INTEL_CSE_RW_VERSION_CBFS_NAME);
620 return CSE_UPDATE_METADATA_ERROR;
621 }
622
623 if (!read_ver_field(version_str, &ptr, size, &cbfs_rw_version.major) ||
624 !read_ver_field(version_str, &ptr, size, &cbfs_rw_version.minor) ||
625 !read_ver_field(version_str, &ptr, size, &cbfs_rw_version.hotfix) ||
626 !read_ver_field(version_str, &ptr, size, &cbfs_rw_version.build)) {
627 cbfs_unmap(version_str);
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700628 return CSE_UPDATE_METADATA_ERROR;
629 }
630
631 printk(BIOS_DEBUG, "cse_lite: CSE CBFS RW version : %d.%d.%d.%d\n",
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700632 cbfs_rw_version.major,
633 cbfs_rw_version.minor,
634 cbfs_rw_version.hotfix,
635 cbfs_rw_version.build);
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700636
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700637 cbfs_unmap(version_str);
638
Sridhar Siricillab9277ba2021-11-27 13:57:40 +0530639 ret = cse_compare_sub_part_version(&cbfs_rw_version, cse_get_rw_version(cse_bp_info));
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700640 if (ret == 0)
641 return CSE_UPDATE_NOT_REQUIRED;
642 else if (ret < 0)
643 return CSE_UPDATE_DOWNGRADE;
644 else
645 return CSE_UPDATE_UPGRADE;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530646}
647
648static bool cse_write_rw_region(const struct region_device *target_rdev,
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530649 const void *cse_cbfs_rw, const size_t cse_cbfs_rw_sz)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530650{
Rizwan Qureshiec321092019-09-06 20:28:43 +0530651 /* Points to CSE CBFS RW image after boot partition signature */
652 uint8_t *cse_cbfs_rw_wo_sign = (uint8_t *)cse_cbfs_rw + CSE_RW_SIGN_SIZE;
653
654 /* Size of CSE CBFS RW image without boot partition signature */
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530655 uint32_t cse_cbfs_rw_wo_sign_sz = cse_cbfs_rw_sz - CSE_RW_SIGN_SIZE;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530656
657 /* Update except CSE RW signature */
658 if (!cse_copy_rw(target_rdev, cse_cbfs_rw_wo_sign, CSE_RW_SIGN_SIZE,
659 cse_cbfs_rw_wo_sign_sz))
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530660 return false;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530661
662 /* Update CSE RW signature to indicate update is complete */
663 if (!cse_copy_rw(target_rdev, (void *)cse_cbfs_rw, 0, CSE_RW_SIGN_SIZE))
Rizwan Qureshiec321092019-09-06 20:28:43 +0530664 return false;
665
666 printk(BIOS_INFO, "cse_lite: CSE RW Update Successful\n");
667 return true;
668}
669
Sridhar Siricilla0aa1ac42022-03-09 20:35:32 +0530670static bool is_cse_fw_update_enabled(void)
671{
672 if (!CONFIG(SOC_INTEL_CSE_RW_UPDATE))
673 return false;
674
675 if (CONFIG(SOC_INTEL_COMMON_BASECODE_DEBUG_FEATURE))
676 return !is_debug_cse_fw_update_disable();
677
678 return true;
679}
680
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530681static enum csme_failure_reason cse_update_rw(const struct cse_bp_info *cse_bp_info,
682 const void *cse_cbfs_rw, const size_t cse_blob_sz,
683 struct region_device *target_rdev)
684{
Sridhar Siricillaabeb6882020-12-07 15:55:10 +0530685 if (region_device_sz(target_rdev) < cse_blob_sz) {
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530686 printk(BIOS_ERR, "RW update does not fit. CSE RW flash region size: %zx,"
687 "Update blob size:%zx\n", region_device_sz(target_rdev), cse_blob_sz);
Sridhar Siricillaabeb6882020-12-07 15:55:10 +0530688 return CSE_LITE_SKU_LAYOUT_MISMATCH_ERROR;
689 }
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530690
691 if (!cse_erase_rw_region(target_rdev))
692 return CSE_LITE_SKU_FW_UPDATE_ERROR;
693
694 if (!cse_write_rw_region(target_rdev, cse_cbfs_rw, cse_blob_sz))
695 return CSE_LITE_SKU_FW_UPDATE_ERROR;
696
Tim Wawrzynczake380a432021-06-18 09:54:55 -0600697 return CSE_NO_ERROR;
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530698}
699
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +0530700static bool cse_prep_for_rw_update(const struct cse_bp_info *cse_bp_info,
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700701 enum cse_update_status status)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530702{
703 /*
704 * To set CSE's operation mode to HMRFPO mode:
705 * 1. Ensure CSE to boot from RO(BP1)
706 * 2. Send HMRFPO_ENABLE command to CSE
707 */
708 if (!cse_boot_to_ro(cse_bp_info))
709 return false;
710
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700711 if ((status == CSE_UPDATE_DOWNGRADE) || (status == CSE_UPDATE_CORRUPTED)) {
712 if (!cse_data_clear_request(cse_bp_info)) {
713 printk(BIOS_ERR, "cse_lite: CSE data clear failed!\n");
714 return false;
715 }
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +0530716 }
717
Rizwan Qureshiec321092019-09-06 20:28:43 +0530718 return cse_hmrfpo_enable();
719}
720
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530721static enum csme_failure_reason cse_trigger_fw_update(const struct cse_bp_info *cse_bp_info,
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700722 enum cse_update_status status,
723 struct region_device *target_rdev)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530724{
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530725 enum csme_failure_reason rv;
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700726 uint8_t *cbfs_rw_hash;
Krishna P Bhat D75a423e2022-04-20 15:50:06 +0530727 void *cse_cbfs_rw = NULL;
Julius Werner18881f992021-04-13 15:28:12 -0700728 size_t size;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530729
Julius Werner18881f992021-04-13 15:28:12 -0700730 const char *area_name = cse_get_source_rdev_fmap();
731 if (!area_name)
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530732 return CSE_LITE_SKU_RW_BLOB_NOT_FOUND;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530733
Krishna P Bhat D75a423e2022-04-20 15:50:06 +0530734 if (CONFIG(SOC_INTEL_CSE_LITE_COMPRESS_ME_RW)) {
735 cse_cbfs_rw = cbfs_unverified_area_cbmem_alloc(area_name,
736 CONFIG_SOC_INTEL_CSE_RW_CBFS_NAME, CBMEM_ID_CSE_UPDATE, &size);
737 } else {
738 cse_cbfs_rw = cbfs_unverified_area_map(area_name,
739 CONFIG_SOC_INTEL_CSE_RW_CBFS_NAME, &size);
740 }
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530741 if (!cse_cbfs_rw) {
742 printk(BIOS_ERR, "cse_lite: CSE CBFS RW blob could not be mapped\n");
743 return CSE_LITE_SKU_RW_BLOB_NOT_FOUND;
744 }
745
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700746 cbfs_rw_hash = cbfs_map(CONFIG_SOC_INTEL_CSE_RW_HASH_CBFS_NAME, NULL);
747 if (!cbfs_rw_hash) {
748 printk(BIOS_ERR, "cse_lite: Failed to get %s\n",
749 CONFIG_SOC_INTEL_CSE_RW_HASH_CBFS_NAME);
750 rv = CSE_LITE_SKU_RW_METADATA_NOT_FOUND;
751 goto error_exit;
752 }
753
Julius Werner18881f992021-04-13 15:28:12 -0700754 if (!cse_verify_cbfs_rw_sha256(cbfs_rw_hash, cse_cbfs_rw, size)) {
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530755 rv = CSE_LITE_SKU_RW_BLOB_SHA256_MISMATCH;
756 goto error_exit;
757 }
758
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700759 if (!cse_prep_for_rw_update(cse_bp_info, status)) {
Tim Wawrzynczake380a432021-06-18 09:54:55 -0600760 rv = CSE_COMMUNICATION_ERROR;
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530761 goto error_exit;
762 }
763
Julius Werner18881f992021-04-13 15:28:12 -0700764 rv = cse_update_rw(cse_bp_info, cse_cbfs_rw, size, target_rdev);
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530765
766error_exit:
Furquan Shaikhd2da8702021-10-07 00:08:59 -0700767 cbfs_unmap(cbfs_rw_hash);
Julius Werner18881f992021-04-13 15:28:12 -0700768 cbfs_unmap(cse_cbfs_rw);
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530769 return rv;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530770}
771
Sridhar Siricilla361e3642020-10-18 20:14:07 +0530772static uint8_t cse_fw_update(const struct cse_bp_info *cse_bp_info)
Rizwan Qureshiec321092019-09-06 20:28:43 +0530773{
774 struct region_device target_rdev;
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700775 enum cse_update_status status;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530776
777 if (!cse_get_target_rdev(cse_bp_info, &target_rdev)) {
778 printk(BIOS_ERR, "cse_lite: Failed to get CSE RW Partition\n");
779 return CSE_LITE_SKU_RW_ACCESS_ERROR;
780 }
781
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700782 status = cse_check_update_status(cse_bp_info, &target_rdev);
783 if (status == CSE_UPDATE_NOT_REQUIRED)
784 return CSE_NO_ERROR;
785 if (status == CSE_UPDATE_METADATA_ERROR)
786 return CSE_LITE_SKU_RW_METADATA_NOT_FOUND;
Rizwan Qureshiec321092019-09-06 20:28:43 +0530787
Furquan Shaikhc45e0be2021-10-06 23:28:03 -0700788 printk(BIOS_DEBUG, "cse_lite: CSE RW update is initiated\n");
789 return cse_trigger_fw_update(cse_bp_info, status, &target_rdev);
Sridhar Siricillaf87ff332019-09-12 17:18:20 +0530790}
791
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530792static const char *cse_sub_part_str(enum bpdt_entry_type type)
793{
794 switch (type) {
795 case IOM_FW:
796 return "IOM";
797 case NPHY_FW:
798 return "NPHY";
799 default:
800 return "Unknown";
801 }
802}
803
Sridhar Siricilla52479c72022-03-30 09:25:49 +0530804static bool cse_locate_area_as_rdev_rw(const struct cse_bp_info *cse_bp_info,
805 size_t bp, struct region_device *cse_rdev)
806{
807 struct region_device cse_region_rdev;
808 uint32_t size;
809 uint32_t start_offset;
810 uint32_t end_offset;
811
812 if (!cse_get_rw_rdev(&cse_region_rdev))
813 return false;
814
815 if (!strcmp(cse_regions[bp], "RO"))
816 cse_get_bp_entry_range(cse_bp_info, RO, &start_offset, &end_offset);
817 else
818 cse_get_bp_entry_range(cse_bp_info, RW, &start_offset, &end_offset);
819
820 size = end_offset + 1 - start_offset;
821
822 if (rdev_chain(cse_rdev, &cse_region_rdev, start_offset, size))
823 return false;
824
825 printk(BIOS_DEBUG, "cse_lite: CSE %s partition: offset = 0x%x, size = 0x%x\n",
826 cse_regions[bp], start_offset, size);
827 return true;
828}
829
830static bool cse_sub_part_get_target_rdev(const struct cse_bp_info *cse_bp_info,
831 struct region_device *target_rdev, size_t bp, enum bpdt_entry_type type)
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530832{
833 struct bpdt_header bpdt_hdr;
834 struct region_device cse_rdev;
835 struct bpdt_entry bpdt_entries[MAX_SUBPARTS];
836 uint8_t i;
837
Sridhar Siricilla52479c72022-03-30 09:25:49 +0530838 if (!cse_locate_area_as_rdev_rw(cse_bp_info, bp, &cse_rdev)) {
839 printk(BIOS_ERR, "cse_lite: Failed to locate %s in the CSE Region\n",
840 cse_regions[bp]);
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530841 return false;
842 }
843
844 if ((rdev_readat(&cse_rdev, &bpdt_hdr, 0, BPDT_HEADER_SZ)) != BPDT_HEADER_SZ) {
845 printk(BIOS_ERR, "cse_lite: Failed to read BPDT header from CSE region\n");
846 return false;
847 }
848
849 if ((rdev_readat(&cse_rdev, bpdt_entries, BPDT_HEADER_SZ,
850 (bpdt_hdr.descriptor_count * BPDT_ENTRY_SZ))) !=
851 (bpdt_hdr.descriptor_count * BPDT_ENTRY_SZ)) {
852 printk(BIOS_ERR, "cse_lite: Failed to read BPDT entries from CSE region\n");
853 return false;
854 }
855
856 /* walk through BPDT entries to identify sub-partition's payload offset and size */
857 for (i = 0; i < bpdt_hdr.descriptor_count; i++) {
858 if (bpdt_entries[i].type == type) {
859 printk(BIOS_INFO, "cse_lite: Sub-partition %s- offset = 0x%x,"
860 "size = 0x%x\n", cse_sub_part_str(type), bpdt_entries[i].offset,
861 bpdt_entries[i].size);
862
863 if (rdev_chain(target_rdev, &cse_rdev, bpdt_entries[i].offset,
864 bpdt_entries[i].size))
865 return false;
866 else
867 return true;
868 }
869 }
870
871 printk(BIOS_ERR, "cse_lite: Sub-partition %s is not found\n", cse_sub_part_str(type));
872 return false;
873}
874
875static bool cse_get_sub_part_fw_version(enum bpdt_entry_type type,
876 const struct region_device *rdev,
877 struct fw_version *fw_ver)
878{
879 struct subpart_entry subpart_entry;
880 struct subpart_entry_manifest_header man_hdr;
881
882 if ((rdev_readat(rdev, &subpart_entry, SUBPART_HEADER_SZ, SUBPART_ENTRY_SZ))
883 != SUBPART_ENTRY_SZ) {
884 printk(BIOS_ERR, "cse_lite: Failed to read %s sub partition entry\n",
885 cse_sub_part_str(type));
886 return false;
887 }
888
889 if ((rdev_readat(rdev, &man_hdr, subpart_entry.offset_bytes, SUBPART_MANIFEST_HDR_SZ))
890 != SUBPART_MANIFEST_HDR_SZ) {
891 printk(BIOS_ERR, "cse_lite: Failed to read %s Sub part entry #0 manifest\n",
892 cse_sub_part_str(type));
893 return false;
894 }
895
896 fw_ver->major = man_hdr.binary_version.major;
897 fw_ver->minor = man_hdr.binary_version.minor;
898 fw_ver->hotfix = man_hdr.binary_version.hotfix;
899 fw_ver->build = man_hdr.binary_version.build;
900
901 return true;
902}
903
904static void cse_sub_part_get_source_fw_version(void *subpart_cbfs_rw, struct fw_version *fw_ver)
905{
906 uint8_t *ptr = (uint8_t *)subpart_cbfs_rw;
907 struct subpart_entry *subpart_entry;
908 struct subpart_entry_manifest_header *man_hdr;
909
910 subpart_entry = (struct subpart_entry *) (ptr + SUBPART_HEADER_SZ);
911 man_hdr = (struct subpart_entry_manifest_header *) (ptr + subpart_entry->offset_bytes);
912
913 fw_ver->major = man_hdr->binary_version.major;
914 fw_ver->minor = man_hdr->binary_version.minor;
915 fw_ver->hotfix = man_hdr->binary_version.hotfix;
916 fw_ver->build = man_hdr->binary_version.build;
917}
918
919static bool cse_prep_for_component_update(const struct cse_bp_info *cse_bp_info)
920{
921 /*
922 * To set CSE's operation mode to HMRFPO mode:
923 * 1. Ensure CSE to boot from RO(BP1)
924 * 2. Send HMRFPO_ENABLE command to CSE
925 */
926 if (!cse_boot_to_ro(cse_bp_info))
927 return false;
928
929 return cse_hmrfpo_enable();
930}
931
932static uint8_t cse_sub_part_trigger_update(enum bpdt_entry_type type, uint8_t bp,
933 const void *subpart_cbfs_rw, const size_t blob_sz,
934 struct region_device *target_rdev)
935{
936 if (region_device_sz(target_rdev) < blob_sz) {
937 printk(BIOS_ERR, "cse_lite: %s Target sub-partition size: %zx, "
938 "smaller than blob size:%zx, abort update\n",
939 cse_sub_part_str(type), region_device_sz(target_rdev), blob_sz);
940 return CSE_LITE_SKU_SUB_PART_LAYOUT_MISMATCH_ERROR;
941 }
942
943 /* Erase CSE Lite sub-partition */
944 if (!cse_erase_rw_region(target_rdev))
945 return CSE_LITE_SKU_SUB_PART_UPDATE_FAIL;
946
947 /* Update CSE Lite sub-partition */
948 if (!cse_copy_rw(target_rdev, (void *)subpart_cbfs_rw, 0, blob_sz))
949 return CSE_LITE_SKU_SUB_PART_UPDATE_FAIL;
950
951 printk(BIOS_INFO, "cse_lite: CSE %s %s Update successful\n", GET_BP_STR(bp),
952 cse_sub_part_str(type));
953
954 return CSE_LITE_SKU_PART_UPDATE_SUCCESS;
955}
956
957static uint8_t handle_cse_sub_part_fw_update_rv(uint8_t rv)
958{
959 switch (rv) {
960 case CSE_LITE_SKU_PART_UPDATE_SUCCESS:
961 case CSE_LITE_SKU_SUB_PART_UPDATE_NOT_REQ:
962 return rv;
963 default:
964 cse_trigger_vboot_recovery(rv);
965 }
966 /* Control never reaches here */
967 return rv;
968}
969
970static enum csme_failure_reason cse_sub_part_fw_component_update(enum bpdt_entry_type type,
971 const struct cse_bp_info *cse_bp_info, const char *name)
972{
973 struct region_device target_rdev;
974 struct fw_version target_fw_ver, source_fw_ver;
975 enum csme_failure_reason rv;
976 size_t size;
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530977
978 void *subpart_cbfs_rw = cbfs_map(name, &size);
979 if (!subpart_cbfs_rw) {
980 printk(BIOS_ERR, "cse_lite: Not able to map %s CBFS file\n",
981 cse_sub_part_str(type));
982 return CSE_LITE_SKU_SUB_PART_BLOB_ACCESS_ERR;
983 }
984
985 cse_sub_part_get_source_fw_version(subpart_cbfs_rw, &source_fw_ver);
986 printk(BIOS_INFO, "cse_lite: CBFS %s FW Version: %x.%x.%x.%x\n", cse_sub_part_str(type),
987 source_fw_ver.major, source_fw_ver.minor, source_fw_ver.hotfix,
988 source_fw_ver.build);
989
990 /* Trigger sub-partition update in CSE RO and CSE RW */
991 for (size_t bp = 0; bp < ARRAY_SIZE(cse_regions); bp++) {
Sridhar Siricilla52479c72022-03-30 09:25:49 +0530992 if (!cse_sub_part_get_target_rdev(cse_bp_info, &target_rdev, bp, type)) {
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +0530993 rv = CSE_LITE_SKU_SUB_PART_ACCESS_ERR;
994 goto error_exit;
995 }
996
997 if (!cse_get_sub_part_fw_version(type, &target_rdev, &target_fw_ver)) {
998 rv = CSE_LITE_SKU_SUB_PART_ACCESS_ERR;
999 goto error_exit;
1000 }
1001
1002 printk(BIOS_INFO, "cse_lite: %s %s FW Version: %x.%x.%x.%x\n", cse_regions[bp],
1003 cse_sub_part_str(type), target_fw_ver.major,
1004 target_fw_ver.minor, target_fw_ver.hotfix, target_fw_ver.build);
1005
1006 if (!cse_compare_sub_part_version(&target_fw_ver, &source_fw_ver)) {
1007 printk(BIOS_INFO, "cse_lite: %s %s update is not required\n",
1008 cse_regions[bp], cse_sub_part_str(type));
1009 rv = CSE_LITE_SKU_SUB_PART_UPDATE_NOT_REQ;
1010 continue;
1011 }
1012
1013 printk(BIOS_INFO, "CSE %s %s Update initiated\n", GET_BP_STR(bp),
1014 cse_sub_part_str(type));
1015
1016 if (!cse_prep_for_component_update(cse_bp_info)) {
1017 rv = CSE_LITE_SKU_SUB_PART_ACCESS_ERR;
1018 goto error_exit;
1019 }
1020
1021 rv = cse_sub_part_trigger_update(type, bp, subpart_cbfs_rw,
1022 size, &target_rdev);
1023
1024 if (rv != CSE_LITE_SKU_PART_UPDATE_SUCCESS)
1025 goto error_exit;
1026 }
1027error_exit:
1028 cbfs_unmap(subpart_cbfs_rw);
1029 return rv;
1030}
1031
1032static uint8_t cse_sub_part_fw_update(const struct cse_bp_info *cse_bp_info)
1033{
1034 if (skip_cse_sub_part_update()) {
1035 printk(BIOS_INFO, "CSE Sub-partition update not required\n");
1036 return CSE_LITE_SKU_SUB_PART_UPDATE_NOT_REQ;
1037 }
1038
1039 int rv;
1040 rv = cse_sub_part_fw_component_update(IOM_FW, cse_bp_info,
1041 CONFIG_SOC_INTEL_CSE_IOM_CBFS_NAME);
1042
1043 handle_cse_sub_part_fw_update_rv(rv);
1044
1045 rv = cse_sub_part_fw_component_update(NPHY_FW, cse_bp_info,
1046 CONFIG_SOC_INTEL_CSE_NPHY_CBFS_NAME);
1047
1048 return handle_cse_sub_part_fw_update_rv(rv);
1049}
1050
Sridhar Siricilla1a2b7022020-12-04 02:22:28 +05301051void cse_fw_sync(void)
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301052{
1053 static struct get_bp_info_rsp cse_bp_info;
1054
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +05301055 /*
1056 * If system is in recovery mode, skip CSE Lite update if CSE sub-partition update
1057 * is not enabled and continue to update CSE sub-partitions.
1058 */
1059 if (vboot_recovery_mode_enabled() && !CONFIG(SOC_INTEL_CSE_SUB_PART_UPDATE)) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +05301060 printk(BIOS_DEBUG, "cse_lite: Skip switching to RW in the recovery path\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301061 return;
1062 }
1063
Sridhar Siricilla99dbca32020-05-12 21:05:04 +05301064 /* If CSE SKU type is not Lite, skip enabling CSE Lite SKU */
1065 if (!cse_is_hfs3_fw_sku_lite()) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +05301066 printk(BIOS_ERR, "cse_lite: Not a CSE Lite SKU\n");
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301067 return;
1068 }
1069
1070 if (!cse_get_bp_info(&cse_bp_info)) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +05301071 printk(BIOS_ERR, "cse_lite: Failed to get CSE boot partition info\n");
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +05301072
1073 /* If system is in recovery mode, don't trigger recovery again */
1074 if (!vboot_recovery_mode_enabled()) {
1075 cse_trigger_vboot_recovery(CSE_COMMUNICATION_ERROR);
1076 } else {
1077 printk(BIOS_ERR, "cse_lite: System is already in Recovery Mode, "
1078 "so no action\n");
1079 return;
1080 }
1081 }
1082
1083 /*
1084 * If system is in recovery mode, CSE Lite update has to be skipped but CSE
1085 * sub-partitions like NPHY and IOM have to to be updated. If CSE sub-parition update
1086 * fails during recovery, just continue to boot.
1087 */
1088 if (CONFIG(SOC_INTEL_CSE_SUB_PART_UPDATE) && vboot_recovery_mode_enabled()) {
1089 if (cse_sub_part_fw_update(&cse_bp_info.bp_info) ==
1090 CSE_LITE_SKU_PART_UPDATE_SUCCESS) {
1091 cse_board_reset();
1092 do_global_reset();
1093 die("ERROR: GLOBAL RESET Failed to reset the system\n");
1094 }
1095
1096 return;
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301097 }
1098
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +05301099 if (!cse_fix_data_failure_err(&cse_bp_info.bp_info))
Tim Wawrzynczak09635f42021-06-18 10:08:47 -06001100 cse_trigger_vboot_recovery(CSE_LITE_SKU_DATA_WIPE_ERROR);
Sridhar Siricilla2f6d5552020-04-19 23:39:02 +05301101
Sridhar Siricilla361e3642020-10-18 20:14:07 +05301102 /*
Sridhar Siricilla0aa1ac42022-03-09 20:35:32 +05301103 * cse firmware update is skipped if SOC_INTEL_CSE_RW_UPDATE is not defined and
1104 * runtime debug control flag is not enabled. The driver triggers recovery if CSE CBFS
1105 * RW metadata or CSE CBFS RW blob is not available.
Sridhar Siricilla361e3642020-10-18 20:14:07 +05301106 */
Sridhar Siricilla0aa1ac42022-03-09 20:35:32 +05301107 if (is_cse_fw_update_enabled()) {
Sridhar Siricilla4c2890d2020-12-09 00:28:30 +05301108 uint8_t rv;
1109 rv = cse_fw_update(&cse_bp_info.bp_info);
1110 if (rv)
Tim Wawrzynczak09635f42021-06-18 10:08:47 -06001111 cse_trigger_vboot_recovery(rv);
Sridhar Siricilla4c2890d2020-12-09 00:28:30 +05301112 }
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301113
Krishna Prasad Bhat333edcc2021-11-26 06:52:27 +05301114 if (CONFIG(SOC_INTEL_CSE_SUB_PART_UPDATE))
1115 cse_sub_part_fw_update(&cse_bp_info.bp_info);
1116
Sridahr Siricilla54b03562021-06-18 10:59:30 +05301117 if (!cse_is_rw_bp_status_valid(&cse_bp_info.bp_info))
Tim Wawrzynczakf2801f42021-06-22 11:25:14 -06001118 cse_trigger_vboot_recovery(CSE_LITE_SKU_RW_JUMP_ERROR);
Sridahr Siricilla54b03562021-06-18 10:59:30 +05301119
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301120 if (!cse_boot_to_rw(&cse_bp_info.bp_info)) {
Sridhar Siricilla9f71b172020-06-01 14:50:52 +05301121 printk(BIOS_ERR, "cse_lite: Failed to switch to RW\n");
Tim Wawrzynczak09635f42021-06-18 10:08:47 -06001122 cse_trigger_vboot_recovery(CSE_LITE_SKU_RW_SWITCH_ERROR);
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301123 }
Sridhar Siricillaf87ff332019-09-12 17:18:20 +05301124}
Krishna P Bhat De3178a12022-04-21 16:40:06 +05301125
1126static void ramstage_cse_fw_sync(void *unused)
1127{
1128 bool s3wake;
1129 s3wake = acpi_get_sleep_type() == ACPI_S3;
1130
1131 if (CONFIG(SOC_INTEL_CSE_LITE_SYNC_IN_RAMSTAGE) && !s3wake) {
1132 timestamp_add_now(TS_CSE_FW_SYNC_START);
1133 cse_fw_sync();
1134 timestamp_add_now(TS_CSE_FW_SYNC_END);
1135 }
1136}
1137
1138BOOT_STATE_INIT_ENTRY(BS_PRE_DEVICE, BS_ON_EXIT, ramstage_cse_fw_sync, NULL);