162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 262306a36Sopenharmony_ci/* Copyright(c) 2022 Intel Corporation. */ 362306a36Sopenharmony_ci 462306a36Sopenharmony_ci#include <linux/firmware.h> 562306a36Sopenharmony_ci#include <asm/cpu.h> 662306a36Sopenharmony_ci#include <asm/microcode.h> 762306a36Sopenharmony_ci 862306a36Sopenharmony_ci#include "ifs.h" 962306a36Sopenharmony_ci 1062306a36Sopenharmony_ci#define IFS_CHUNK_ALIGNMENT 256 1162306a36Sopenharmony_ciunion meta_data { 1262306a36Sopenharmony_ci struct { 1362306a36Sopenharmony_ci u32 meta_type; // metadata type 1462306a36Sopenharmony_ci u32 meta_size; // size of this entire struct including hdrs. 1562306a36Sopenharmony_ci u32 test_type; // IFS test type 1662306a36Sopenharmony_ci u32 fusa_info; // Fusa info 1762306a36Sopenharmony_ci u32 total_images; // Total number of images 1862306a36Sopenharmony_ci u32 current_image; // Current Image # 1962306a36Sopenharmony_ci u32 total_chunks; // Total number of chunks in this image 2062306a36Sopenharmony_ci u32 starting_chunk; // Starting chunk number in this image 2162306a36Sopenharmony_ci u32 size_per_chunk; // size of each chunk 2262306a36Sopenharmony_ci u32 chunks_per_stride; // number of chunks in a stride 2362306a36Sopenharmony_ci }; 2462306a36Sopenharmony_ci u8 padding[IFS_CHUNK_ALIGNMENT]; 2562306a36Sopenharmony_ci}; 2662306a36Sopenharmony_ci 2762306a36Sopenharmony_ci#define IFS_HEADER_SIZE (sizeof(struct microcode_header_intel)) 2862306a36Sopenharmony_ci#define META_TYPE_IFS 1 2962306a36Sopenharmony_cistatic struct microcode_header_intel *ifs_header_ptr; /* pointer to the ifs image header */ 3062306a36Sopenharmony_cistatic u64 ifs_hash_ptr; /* Address of ifs metadata (hash) */ 3162306a36Sopenharmony_cistatic u64 ifs_test_image_ptr; /* 256B aligned address of test pattern */ 3262306a36Sopenharmony_cistatic DECLARE_COMPLETION(ifs_done); 3362306a36Sopenharmony_ci 3462306a36Sopenharmony_cistatic const char * const scan_hash_status[] = { 3562306a36Sopenharmony_ci [0] = "No error reported", 3662306a36Sopenharmony_ci [1] = "Attempt to copy scan hashes when copy already in progress", 3762306a36Sopenharmony_ci [2] = "Secure Memory not set up correctly", 3862306a36Sopenharmony_ci [3] = "FuSaInfo.ProgramID does not match or ff-mm-ss does not match", 3962306a36Sopenharmony_ci [4] = "Reserved", 4062306a36Sopenharmony_ci [5] = "Integrity check failed", 4162306a36Sopenharmony_ci [6] = "Scan reload or test is in progress" 4262306a36Sopenharmony_ci}; 4362306a36Sopenharmony_ci 4462306a36Sopenharmony_cistatic const char * const scan_authentication_status[] = { 4562306a36Sopenharmony_ci [0] = "No error reported", 4662306a36Sopenharmony_ci [1] = "Attempt to authenticate a chunk which is already marked as authentic", 4762306a36Sopenharmony_ci [2] = "Chunk authentication error. The hash of chunk did not match expected value" 4862306a36Sopenharmony_ci}; 4962306a36Sopenharmony_ci 5062306a36Sopenharmony_ci#define MC_HEADER_META_TYPE_END (0) 5162306a36Sopenharmony_ci 5262306a36Sopenharmony_cistruct metadata_header { 5362306a36Sopenharmony_ci unsigned int type; 5462306a36Sopenharmony_ci unsigned int blk_size; 5562306a36Sopenharmony_ci}; 5662306a36Sopenharmony_ci 5762306a36Sopenharmony_cistatic struct metadata_header *find_meta_data(void *ucode, unsigned int meta_type) 5862306a36Sopenharmony_ci{ 5962306a36Sopenharmony_ci struct microcode_header_intel *hdr = &((struct microcode_intel *)ucode)->hdr; 6062306a36Sopenharmony_ci struct metadata_header *meta_header; 6162306a36Sopenharmony_ci unsigned long data_size, total_meta; 6262306a36Sopenharmony_ci unsigned long meta_size = 0; 6362306a36Sopenharmony_ci 6462306a36Sopenharmony_ci data_size = intel_microcode_get_datasize(hdr); 6562306a36Sopenharmony_ci total_meta = hdr->metasize; 6662306a36Sopenharmony_ci if (!total_meta) 6762306a36Sopenharmony_ci return NULL; 6862306a36Sopenharmony_ci 6962306a36Sopenharmony_ci meta_header = (ucode + MC_HEADER_SIZE + data_size) - total_meta; 7062306a36Sopenharmony_ci 7162306a36Sopenharmony_ci while (meta_header->type != MC_HEADER_META_TYPE_END && 7262306a36Sopenharmony_ci meta_header->blk_size && 7362306a36Sopenharmony_ci meta_size < total_meta) { 7462306a36Sopenharmony_ci meta_size += meta_header->blk_size; 7562306a36Sopenharmony_ci if (meta_header->type == meta_type) 7662306a36Sopenharmony_ci return meta_header; 7762306a36Sopenharmony_ci 7862306a36Sopenharmony_ci meta_header = (void *)meta_header + meta_header->blk_size; 7962306a36Sopenharmony_ci } 8062306a36Sopenharmony_ci return NULL; 8162306a36Sopenharmony_ci} 8262306a36Sopenharmony_ci 8362306a36Sopenharmony_ci/* 8462306a36Sopenharmony_ci * To copy scan hashes and authenticate test chunks, the initiating cpu must point 8562306a36Sopenharmony_ci * to the EDX:EAX to the test image in linear address. 8662306a36Sopenharmony_ci * Run wrmsr(MSR_COPY_SCAN_HASHES) for scan hash copy and run wrmsr(MSR_AUTHENTICATE_AND_COPY_CHUNK) 8762306a36Sopenharmony_ci * for scan hash copy and test chunk authentication. 8862306a36Sopenharmony_ci */ 8962306a36Sopenharmony_cistatic void copy_hashes_authenticate_chunks(struct work_struct *work) 9062306a36Sopenharmony_ci{ 9162306a36Sopenharmony_ci struct ifs_work *local_work = container_of(work, struct ifs_work, w); 9262306a36Sopenharmony_ci union ifs_scan_hashes_status hashes_status; 9362306a36Sopenharmony_ci union ifs_chunks_auth_status chunk_status; 9462306a36Sopenharmony_ci struct device *dev = local_work->dev; 9562306a36Sopenharmony_ci int i, num_chunks, chunk_size; 9662306a36Sopenharmony_ci struct ifs_data *ifsd; 9762306a36Sopenharmony_ci u64 linear_addr, base; 9862306a36Sopenharmony_ci u32 err_code; 9962306a36Sopenharmony_ci 10062306a36Sopenharmony_ci ifsd = ifs_get_data(dev); 10162306a36Sopenharmony_ci /* run scan hash copy */ 10262306a36Sopenharmony_ci wrmsrl(MSR_COPY_SCAN_HASHES, ifs_hash_ptr); 10362306a36Sopenharmony_ci rdmsrl(MSR_SCAN_HASHES_STATUS, hashes_status.data); 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_ci /* enumerate the scan image information */ 10662306a36Sopenharmony_ci num_chunks = hashes_status.num_chunks; 10762306a36Sopenharmony_ci chunk_size = hashes_status.chunk_size * 1024; 10862306a36Sopenharmony_ci err_code = hashes_status.error_code; 10962306a36Sopenharmony_ci 11062306a36Sopenharmony_ci if (!hashes_status.valid) { 11162306a36Sopenharmony_ci ifsd->loading_error = true; 11262306a36Sopenharmony_ci if (err_code >= ARRAY_SIZE(scan_hash_status)) { 11362306a36Sopenharmony_ci dev_err(dev, "invalid error code 0x%x for hash copy\n", err_code); 11462306a36Sopenharmony_ci goto done; 11562306a36Sopenharmony_ci } 11662306a36Sopenharmony_ci dev_err(dev, "Hash copy error : %s", scan_hash_status[err_code]); 11762306a36Sopenharmony_ci goto done; 11862306a36Sopenharmony_ci } 11962306a36Sopenharmony_ci 12062306a36Sopenharmony_ci /* base linear address to the scan data */ 12162306a36Sopenharmony_ci base = ifs_test_image_ptr; 12262306a36Sopenharmony_ci 12362306a36Sopenharmony_ci /* scan data authentication and copy chunks to secured memory */ 12462306a36Sopenharmony_ci for (i = 0; i < num_chunks; i++) { 12562306a36Sopenharmony_ci linear_addr = base + i * chunk_size; 12662306a36Sopenharmony_ci linear_addr |= i; 12762306a36Sopenharmony_ci 12862306a36Sopenharmony_ci wrmsrl(MSR_AUTHENTICATE_AND_COPY_CHUNK, linear_addr); 12962306a36Sopenharmony_ci rdmsrl(MSR_CHUNKS_AUTHENTICATION_STATUS, chunk_status.data); 13062306a36Sopenharmony_ci 13162306a36Sopenharmony_ci ifsd->valid_chunks = chunk_status.valid_chunks; 13262306a36Sopenharmony_ci err_code = chunk_status.error_code; 13362306a36Sopenharmony_ci 13462306a36Sopenharmony_ci if (err_code) { 13562306a36Sopenharmony_ci ifsd->loading_error = true; 13662306a36Sopenharmony_ci if (err_code >= ARRAY_SIZE(scan_authentication_status)) { 13762306a36Sopenharmony_ci dev_err(dev, 13862306a36Sopenharmony_ci "invalid error code 0x%x for authentication\n", err_code); 13962306a36Sopenharmony_ci goto done; 14062306a36Sopenharmony_ci } 14162306a36Sopenharmony_ci dev_err(dev, "Chunk authentication error %s\n", 14262306a36Sopenharmony_ci scan_authentication_status[err_code]); 14362306a36Sopenharmony_ci goto done; 14462306a36Sopenharmony_ci } 14562306a36Sopenharmony_ci } 14662306a36Sopenharmony_cidone: 14762306a36Sopenharmony_ci complete(&ifs_done); 14862306a36Sopenharmony_ci} 14962306a36Sopenharmony_ci 15062306a36Sopenharmony_cistatic int validate_ifs_metadata(struct device *dev) 15162306a36Sopenharmony_ci{ 15262306a36Sopenharmony_ci struct ifs_data *ifsd = ifs_get_data(dev); 15362306a36Sopenharmony_ci union meta_data *ifs_meta; 15462306a36Sopenharmony_ci char test_file[64]; 15562306a36Sopenharmony_ci int ret = -EINVAL; 15662306a36Sopenharmony_ci 15762306a36Sopenharmony_ci snprintf(test_file, sizeof(test_file), "%02x-%02x-%02x-%02x.scan", 15862306a36Sopenharmony_ci boot_cpu_data.x86, boot_cpu_data.x86_model, 15962306a36Sopenharmony_ci boot_cpu_data.x86_stepping, ifsd->cur_batch); 16062306a36Sopenharmony_ci 16162306a36Sopenharmony_ci ifs_meta = (union meta_data *)find_meta_data(ifs_header_ptr, META_TYPE_IFS); 16262306a36Sopenharmony_ci if (!ifs_meta) { 16362306a36Sopenharmony_ci dev_err(dev, "IFS Metadata missing in file %s\n", test_file); 16462306a36Sopenharmony_ci return ret; 16562306a36Sopenharmony_ci } 16662306a36Sopenharmony_ci 16762306a36Sopenharmony_ci ifs_test_image_ptr = (u64)ifs_meta + sizeof(union meta_data); 16862306a36Sopenharmony_ci 16962306a36Sopenharmony_ci /* Scan chunk start must be 256 byte aligned */ 17062306a36Sopenharmony_ci if (!IS_ALIGNED(ifs_test_image_ptr, IFS_CHUNK_ALIGNMENT)) { 17162306a36Sopenharmony_ci dev_err(dev, "Scan pattern is not aligned on %d bytes aligned in %s\n", 17262306a36Sopenharmony_ci IFS_CHUNK_ALIGNMENT, test_file); 17362306a36Sopenharmony_ci return ret; 17462306a36Sopenharmony_ci } 17562306a36Sopenharmony_ci 17662306a36Sopenharmony_ci if (ifs_meta->current_image != ifsd->cur_batch) { 17762306a36Sopenharmony_ci dev_warn(dev, "Mismatch between filename %s and batch metadata 0x%02x\n", 17862306a36Sopenharmony_ci test_file, ifs_meta->current_image); 17962306a36Sopenharmony_ci return ret; 18062306a36Sopenharmony_ci } 18162306a36Sopenharmony_ci 18262306a36Sopenharmony_ci return 0; 18362306a36Sopenharmony_ci} 18462306a36Sopenharmony_ci 18562306a36Sopenharmony_ci/* 18662306a36Sopenharmony_ci * IFS requires scan chunks authenticated per each socket in the platform. 18762306a36Sopenharmony_ci * Once the test chunk is authenticated, it is automatically copied to secured memory 18862306a36Sopenharmony_ci * and proceed the authentication for the next chunk. 18962306a36Sopenharmony_ci */ 19062306a36Sopenharmony_cistatic int scan_chunks_sanity_check(struct device *dev) 19162306a36Sopenharmony_ci{ 19262306a36Sopenharmony_ci struct ifs_data *ifsd = ifs_get_data(dev); 19362306a36Sopenharmony_ci struct ifs_work local_work; 19462306a36Sopenharmony_ci int curr_pkg, cpu, ret; 19562306a36Sopenharmony_ci 19662306a36Sopenharmony_ci memset(ifs_pkg_auth, 0, (topology_max_packages() * sizeof(bool))); 19762306a36Sopenharmony_ci ret = validate_ifs_metadata(dev); 19862306a36Sopenharmony_ci if (ret) 19962306a36Sopenharmony_ci return ret; 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_ci ifsd->loading_error = false; 20262306a36Sopenharmony_ci ifsd->loaded_version = ifs_header_ptr->rev; 20362306a36Sopenharmony_ci 20462306a36Sopenharmony_ci /* copy the scan hash and authenticate per package */ 20562306a36Sopenharmony_ci cpus_read_lock(); 20662306a36Sopenharmony_ci for_each_online_cpu(cpu) { 20762306a36Sopenharmony_ci curr_pkg = topology_physical_package_id(cpu); 20862306a36Sopenharmony_ci if (ifs_pkg_auth[curr_pkg]) 20962306a36Sopenharmony_ci continue; 21062306a36Sopenharmony_ci reinit_completion(&ifs_done); 21162306a36Sopenharmony_ci local_work.dev = dev; 21262306a36Sopenharmony_ci INIT_WORK_ONSTACK(&local_work.w, copy_hashes_authenticate_chunks); 21362306a36Sopenharmony_ci schedule_work_on(cpu, &local_work.w); 21462306a36Sopenharmony_ci wait_for_completion(&ifs_done); 21562306a36Sopenharmony_ci if (ifsd->loading_error) { 21662306a36Sopenharmony_ci ret = -EIO; 21762306a36Sopenharmony_ci goto out; 21862306a36Sopenharmony_ci } 21962306a36Sopenharmony_ci ifs_pkg_auth[curr_pkg] = 1; 22062306a36Sopenharmony_ci } 22162306a36Sopenharmony_ci ret = 0; 22262306a36Sopenharmony_ciout: 22362306a36Sopenharmony_ci cpus_read_unlock(); 22462306a36Sopenharmony_ci 22562306a36Sopenharmony_ci return ret; 22662306a36Sopenharmony_ci} 22762306a36Sopenharmony_ci 22862306a36Sopenharmony_cistatic int image_sanity_check(struct device *dev, const struct microcode_header_intel *data) 22962306a36Sopenharmony_ci{ 23062306a36Sopenharmony_ci struct ucode_cpu_info uci; 23162306a36Sopenharmony_ci 23262306a36Sopenharmony_ci /* Provide a specific error message when loading an older/unsupported image */ 23362306a36Sopenharmony_ci if (data->hdrver != MC_HEADER_TYPE_IFS) { 23462306a36Sopenharmony_ci dev_err(dev, "Header version %d not supported\n", data->hdrver); 23562306a36Sopenharmony_ci return -EINVAL; 23662306a36Sopenharmony_ci } 23762306a36Sopenharmony_ci 23862306a36Sopenharmony_ci if (intel_microcode_sanity_check((void *)data, true, MC_HEADER_TYPE_IFS)) { 23962306a36Sopenharmony_ci dev_err(dev, "sanity check failed\n"); 24062306a36Sopenharmony_ci return -EINVAL; 24162306a36Sopenharmony_ci } 24262306a36Sopenharmony_ci 24362306a36Sopenharmony_ci intel_cpu_collect_info(&uci); 24462306a36Sopenharmony_ci 24562306a36Sopenharmony_ci if (!intel_find_matching_signature((void *)data, 24662306a36Sopenharmony_ci uci.cpu_sig.sig, 24762306a36Sopenharmony_ci uci.cpu_sig.pf)) { 24862306a36Sopenharmony_ci dev_err(dev, "cpu signature, processor flags not matching\n"); 24962306a36Sopenharmony_ci return -EINVAL; 25062306a36Sopenharmony_ci } 25162306a36Sopenharmony_ci 25262306a36Sopenharmony_ci return 0; 25362306a36Sopenharmony_ci} 25462306a36Sopenharmony_ci 25562306a36Sopenharmony_ci/* 25662306a36Sopenharmony_ci * Load ifs image. Before loading ifs module, the ifs image must be located 25762306a36Sopenharmony_ci * in /lib/firmware/intel/ifs_x/ and named as family-model-stepping-02x.{testname}. 25862306a36Sopenharmony_ci */ 25962306a36Sopenharmony_ciint ifs_load_firmware(struct device *dev) 26062306a36Sopenharmony_ci{ 26162306a36Sopenharmony_ci const struct ifs_test_caps *test = ifs_get_test_caps(dev); 26262306a36Sopenharmony_ci struct ifs_data *ifsd = ifs_get_data(dev); 26362306a36Sopenharmony_ci const struct firmware *fw; 26462306a36Sopenharmony_ci char scan_path[64]; 26562306a36Sopenharmony_ci int ret = -EINVAL; 26662306a36Sopenharmony_ci 26762306a36Sopenharmony_ci snprintf(scan_path, sizeof(scan_path), "intel/ifs_%d/%02x-%02x-%02x-%02x.scan", 26862306a36Sopenharmony_ci test->test_num, boot_cpu_data.x86, boot_cpu_data.x86_model, 26962306a36Sopenharmony_ci boot_cpu_data.x86_stepping, ifsd->cur_batch); 27062306a36Sopenharmony_ci 27162306a36Sopenharmony_ci ret = request_firmware_direct(&fw, scan_path, dev); 27262306a36Sopenharmony_ci if (ret) { 27362306a36Sopenharmony_ci dev_err(dev, "ifs file %s load failed\n", scan_path); 27462306a36Sopenharmony_ci goto done; 27562306a36Sopenharmony_ci } 27662306a36Sopenharmony_ci 27762306a36Sopenharmony_ci ret = image_sanity_check(dev, (struct microcode_header_intel *)fw->data); 27862306a36Sopenharmony_ci if (ret) 27962306a36Sopenharmony_ci goto release; 28062306a36Sopenharmony_ci 28162306a36Sopenharmony_ci ifs_header_ptr = (struct microcode_header_intel *)fw->data; 28262306a36Sopenharmony_ci ifs_hash_ptr = (u64)(ifs_header_ptr + 1); 28362306a36Sopenharmony_ci 28462306a36Sopenharmony_ci ret = scan_chunks_sanity_check(dev); 28562306a36Sopenharmony_ci if (ret) 28662306a36Sopenharmony_ci dev_err(dev, "Load failure for batch: %02x\n", ifsd->cur_batch); 28762306a36Sopenharmony_ci 28862306a36Sopenharmony_cirelease: 28962306a36Sopenharmony_ci release_firmware(fw); 29062306a36Sopenharmony_cidone: 29162306a36Sopenharmony_ci ifsd->loaded = (ret == 0); 29262306a36Sopenharmony_ci 29362306a36Sopenharmony_ci return ret; 29462306a36Sopenharmony_ci} 295