imr.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601
  1. /**
  2. * imr.c -- Intel Isolated Memory Region driver
  3. *
  4. * Copyright(c) 2013 Intel Corporation.
  5. * Copyright(c) 2015 Bryan O'Donoghue <pure.logic@nexus-software.ie>
  6. *
  7. * IMR registers define an isolated region of memory that can
  8. * be masked to prohibit certain system agents from accessing memory.
  9. * When a device behind a masked port performs an access - snooped or
  10. * not, an IMR may optionally prevent that transaction from changing
  11. * the state of memory or from getting correct data in response to the
  12. * operation.
  13. *
  14. * Write data will be dropped and reads will return 0xFFFFFFFF, the
  15. * system will reset and system BIOS will print out an error message to
  16. * inform the user that an IMR has been violated.
  17. *
  18. * This code is based on the Linux MTRR code and reference code from
  19. * Intel's Quark BSP EFI, Linux and grub code.
  20. *
  21. * See quark-x1000-datasheet.pdf for register definitions.
  22. * http://www.intel.com/content/dam/www/public/us/en/documents/datasheets/quark-x1000-datasheet.pdf
  23. */
  24. #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  25. #include <asm-generic/sections.h>
  26. #include <asm/cpu_device_id.h>
  27. #include <asm/imr.h>
  28. #include <asm/iosf_mbi.h>
  29. #include <linux/debugfs.h>
  30. #include <linux/init.h>
  31. #include <linux/mm.h>
  32. #include <linux/types.h>
  33. struct imr_device {
  34. struct dentry *file;
  35. bool init;
  36. struct mutex lock;
  37. int max_imr;
  38. int reg_base;
  39. };
  40. static struct imr_device imr_dev;
  41. /*
  42. * IMR read/write mask control registers.
  43. * See quark-x1000-datasheet.pdf sections 12.7.4.5 and 12.7.4.6 for
  44. * bit definitions.
  45. *
  46. * addr_hi
  47. * 31 Lock bit
  48. * 30:24 Reserved
  49. * 23:2 1 KiB aligned lo address
  50. * 1:0 Reserved
  51. *
  52. * addr_hi
  53. * 31:24 Reserved
  54. * 23:2 1 KiB aligned hi address
  55. * 1:0 Reserved
  56. */
  57. #define IMR_LOCK BIT(31)
  58. struct imr_regs {
  59. u32 addr_lo;
  60. u32 addr_hi;
  61. u32 rmask;
  62. u32 wmask;
  63. };
  64. #define IMR_NUM_REGS (sizeof(struct imr_regs)/sizeof(u32))
  65. #define IMR_SHIFT 8
  66. #define imr_to_phys(x) ((x) << IMR_SHIFT)
  67. #define phys_to_imr(x) ((x) >> IMR_SHIFT)
  68. /**
  69. * imr_is_enabled - true if an IMR is enabled false otherwise.
  70. *
  71. * Determines if an IMR is enabled based on address range and read/write
  72. * mask. An IMR set with an address range set to zero and a read/write
  73. * access mask set to all is considered to be disabled. An IMR in any
  74. * other state - for example set to zero but without read/write access
  75. * all is considered to be enabled. This definition of disabled is how
  76. * firmware switches off an IMR and is maintained in kernel for
  77. * consistency.
  78. *
  79. * @imr: pointer to IMR descriptor.
  80. * @return: true if IMR enabled false if disabled.
  81. */
  82. static inline int imr_is_enabled(struct imr_regs *imr)
  83. {
  84. return !(imr->rmask == IMR_READ_ACCESS_ALL &&
  85. imr->wmask == IMR_WRITE_ACCESS_ALL &&
  86. imr_to_phys(imr->addr_lo) == 0 &&
  87. imr_to_phys(imr->addr_hi) == 0);
  88. }
  89. /**
  90. * imr_read - read an IMR at a given index.
  91. *
  92. * Requires caller to hold imr mutex.
  93. *
  94. * @idev: pointer to imr_device structure.
  95. * @imr_id: IMR entry to read.
  96. * @imr: IMR structure representing address and access masks.
  97. * @return: 0 on success or error code passed from mbi_iosf on failure.
  98. */
  99. static int imr_read(struct imr_device *idev, u32 imr_id, struct imr_regs *imr)
  100. {
  101. u32 reg = imr_id * IMR_NUM_REGS + idev->reg_base;
  102. int ret;
  103. ret = iosf_mbi_read(QRK_MBI_UNIT_MM, MBI_REG_READ, reg++, &imr->addr_lo);
  104. if (ret)
  105. return ret;
  106. ret = iosf_mbi_read(QRK_MBI_UNIT_MM, MBI_REG_READ, reg++, &imr->addr_hi);
  107. if (ret)
  108. return ret;
  109. ret = iosf_mbi_read(QRK_MBI_UNIT_MM, MBI_REG_READ, reg++, &imr->rmask);
  110. if (ret)
  111. return ret;
  112. return iosf_mbi_read(QRK_MBI_UNIT_MM, MBI_REG_READ, reg++, &imr->wmask);
  113. }
  114. /**
  115. * imr_write - write an IMR at a given index.
  116. *
  117. * Requires caller to hold imr mutex.
  118. * Note lock bits need to be written independently of address bits.
  119. *
  120. * @idev: pointer to imr_device structure.
  121. * @imr_id: IMR entry to write.
  122. * @imr: IMR structure representing address and access masks.
  123. * @return: 0 on success or error code passed from mbi_iosf on failure.
  124. */
  125. static int imr_write(struct imr_device *idev, u32 imr_id, struct imr_regs *imr)
  126. {
  127. unsigned long flags;
  128. u32 reg = imr_id * IMR_NUM_REGS + idev->reg_base;
  129. int ret;
  130. local_irq_save(flags);
  131. ret = iosf_mbi_write(QRK_MBI_UNIT_MM, MBI_REG_WRITE, reg++, imr->addr_lo);
  132. if (ret)
  133. goto failed;
  134. ret = iosf_mbi_write(QRK_MBI_UNIT_MM, MBI_REG_WRITE, reg++, imr->addr_hi);
  135. if (ret)
  136. goto failed;
  137. ret = iosf_mbi_write(QRK_MBI_UNIT_MM, MBI_REG_WRITE, reg++, imr->rmask);
  138. if (ret)
  139. goto failed;
  140. ret = iosf_mbi_write(QRK_MBI_UNIT_MM, MBI_REG_WRITE, reg++, imr->wmask);
  141. if (ret)
  142. goto failed;
  143. local_irq_restore(flags);
  144. return 0;
  145. failed:
  146. /*
  147. * If writing to the IOSF failed then we're in an unknown state,
  148. * likely a very bad state. An IMR in an invalid state will almost
  149. * certainly lead to a memory access violation.
  150. */
  151. local_irq_restore(flags);
  152. WARN(ret, "IOSF-MBI write fail range 0x%08x-0x%08x unreliable\n",
  153. imr_to_phys(imr->addr_lo), imr_to_phys(imr->addr_hi) + IMR_MASK);
  154. return ret;
  155. }
  156. /**
  157. * imr_dbgfs_state_show - print state of IMR registers.
  158. *
  159. * @s: pointer to seq_file for output.
  160. * @unused: unused parameter.
  161. * @return: 0 on success or error code passed from mbi_iosf on failure.
  162. */
  163. static int imr_dbgfs_state_show(struct seq_file *s, void *unused)
  164. {
  165. phys_addr_t base;
  166. phys_addr_t end;
  167. int i;
  168. struct imr_device *idev = s->private;
  169. struct imr_regs imr;
  170. size_t size;
  171. int ret = -ENODEV;
  172. mutex_lock(&idev->lock);
  173. for (i = 0; i < idev->max_imr; i++) {
  174. ret = imr_read(idev, i, &imr);
  175. if (ret)
  176. break;
  177. /*
  178. * Remember to add IMR_ALIGN bytes to size to indicate the
  179. * inherent IMR_ALIGN size bytes contained in the masked away
  180. * lower ten bits.
  181. */
  182. if (imr_is_enabled(&imr)) {
  183. base = imr_to_phys(imr.addr_lo);
  184. end = imr_to_phys(imr.addr_hi) + IMR_MASK;
  185. size = end - base + 1;
  186. } else {
  187. base = 0;
  188. end = 0;
  189. size = 0;
  190. }
  191. seq_printf(s, "imr%02i: base=%pa, end=%pa, size=0x%08zx "
  192. "rmask=0x%08x, wmask=0x%08x, %s, %s\n", i,
  193. &base, &end, size, imr.rmask, imr.wmask,
  194. imr_is_enabled(&imr) ? "enabled " : "disabled",
  195. imr.addr_lo & IMR_LOCK ? "locked" : "unlocked");
  196. }
  197. mutex_unlock(&idev->lock);
  198. return ret;
  199. }
  200. DEFINE_SHOW_ATTRIBUTE(imr_dbgfs_state);
  201. /**
  202. * imr_debugfs_register - register debugfs hooks.
  203. *
  204. * @idev: pointer to imr_device structure.
  205. * @return: 0 on success - errno on failure.
  206. */
  207. static int imr_debugfs_register(struct imr_device *idev)
  208. {
  209. idev->file = debugfs_create_file("imr_state", 0444, NULL, idev,
  210. &imr_dbgfs_state_fops);
  211. return PTR_ERR_OR_ZERO(idev->file);
  212. }
  213. /**
  214. * imr_check_params - check passed address range IMR alignment and non-zero size
  215. *
  216. * @base: base address of intended IMR.
  217. * @size: size of intended IMR.
  218. * @return: zero on valid range -EINVAL on unaligned base/size.
  219. */
  220. static int imr_check_params(phys_addr_t base, size_t size)
  221. {
  222. if ((base & IMR_MASK) || (size & IMR_MASK)) {
  223. pr_err("base %pa size 0x%08zx must align to 1KiB\n",
  224. &base, size);
  225. return -EINVAL;
  226. }
  227. if (size == 0)
  228. return -EINVAL;
  229. return 0;
  230. }
  231. /**
  232. * imr_raw_size - account for the IMR_ALIGN bytes that addr_hi appends.
  233. *
  234. * IMR addr_hi has a built in offset of plus IMR_ALIGN (0x400) bytes from the
  235. * value in the register. We need to subtract IMR_ALIGN bytes from input sizes
  236. * as a result.
  237. *
  238. * @size: input size bytes.
  239. * @return: reduced size.
  240. */
  241. static inline size_t imr_raw_size(size_t size)
  242. {
  243. return size - IMR_ALIGN;
  244. }
  245. /**
  246. * imr_address_overlap - detects an address overlap.
  247. *
  248. * @addr: address to check against an existing IMR.
  249. * @imr: imr being checked.
  250. * @return: true for overlap false for no overlap.
  251. */
  252. static inline int imr_address_overlap(phys_addr_t addr, struct imr_regs *imr)
  253. {
  254. return addr >= imr_to_phys(imr->addr_lo) && addr <= imr_to_phys(imr->addr_hi);
  255. }
  256. /**
  257. * imr_add_range - add an Isolated Memory Region.
  258. *
  259. * @base: physical base address of region aligned to 1KiB.
  260. * @size: physical size of region in bytes must be aligned to 1KiB.
  261. * @read_mask: read access mask.
  262. * @write_mask: write access mask.
  263. * @return: zero on success or negative value indicating error.
  264. */
  265. int imr_add_range(phys_addr_t base, size_t size,
  266. unsigned int rmask, unsigned int wmask)
  267. {
  268. phys_addr_t end;
  269. unsigned int i;
  270. struct imr_device *idev = &imr_dev;
  271. struct imr_regs imr;
  272. size_t raw_size;
  273. int reg;
  274. int ret;
  275. if (WARN_ONCE(idev->init == false, "driver not initialized"))
  276. return -ENODEV;
  277. ret = imr_check_params(base, size);
  278. if (ret)
  279. return ret;
  280. /* Tweak the size value. */
  281. raw_size = imr_raw_size(size);
  282. end = base + raw_size;
  283. /*
  284. * Check for reserved IMR value common to firmware, kernel and grub
  285. * indicating a disabled IMR.
  286. */
  287. imr.addr_lo = phys_to_imr(base);
  288. imr.addr_hi = phys_to_imr(end);
  289. imr.rmask = rmask;
  290. imr.wmask = wmask;
  291. if (!imr_is_enabled(&imr))
  292. return -ENOTSUPP;
  293. mutex_lock(&idev->lock);
  294. /*
  295. * Find a free IMR while checking for an existing overlapping range.
  296. * Note there's no restriction in silicon to prevent IMR overlaps.
  297. * For the sake of simplicity and ease in defining/debugging an IMR
  298. * memory map we exclude IMR overlaps.
  299. */
  300. reg = -1;
  301. for (i = 0; i < idev->max_imr; i++) {
  302. ret = imr_read(idev, i, &imr);
  303. if (ret)
  304. goto failed;
  305. /* Find overlap @ base or end of requested range. */
  306. ret = -EINVAL;
  307. if (imr_is_enabled(&imr)) {
  308. if (imr_address_overlap(base, &imr))
  309. goto failed;
  310. if (imr_address_overlap(end, &imr))
  311. goto failed;
  312. } else {
  313. reg = i;
  314. }
  315. }
  316. /* Error out if we have no free IMR entries. */
  317. if (reg == -1) {
  318. ret = -ENOMEM;
  319. goto failed;
  320. }
  321. pr_debug("add %d phys %pa-%pa size %zx mask 0x%08x wmask 0x%08x\n",
  322. reg, &base, &end, raw_size, rmask, wmask);
  323. /* Enable IMR at specified range and access mask. */
  324. imr.addr_lo = phys_to_imr(base);
  325. imr.addr_hi = phys_to_imr(end);
  326. imr.rmask = rmask;
  327. imr.wmask = wmask;
  328. ret = imr_write(idev, reg, &imr);
  329. if (ret < 0) {
  330. /*
  331. * In the highly unlikely event iosf_mbi_write failed
  332. * attempt to rollback the IMR setup skipping the trapping
  333. * of further IOSF write failures.
  334. */
  335. imr.addr_lo = 0;
  336. imr.addr_hi = 0;
  337. imr.rmask = IMR_READ_ACCESS_ALL;
  338. imr.wmask = IMR_WRITE_ACCESS_ALL;
  339. imr_write(idev, reg, &imr);
  340. }
  341. failed:
  342. mutex_unlock(&idev->lock);
  343. return ret;
  344. }
  345. EXPORT_SYMBOL_GPL(imr_add_range);
  346. /**
  347. * __imr_remove_range - delete an Isolated Memory Region.
  348. *
  349. * This function allows you to delete an IMR by its index specified by reg or
  350. * by address range specified by base and size respectively. If you specify an
  351. * index on its own the base and size parameters are ignored.
  352. * imr_remove_range(0, base, size); delete IMR at index 0 base/size ignored.
  353. * imr_remove_range(-1, base, size); delete IMR from base to base+size.
  354. *
  355. * @reg: imr index to remove.
  356. * @base: physical base address of region aligned to 1 KiB.
  357. * @size: physical size of region in bytes aligned to 1 KiB.
  358. * @return: -EINVAL on invalid range or out or range id
  359. * -ENODEV if reg is valid but no IMR exists or is locked
  360. * 0 on success.
  361. */
  362. static int __imr_remove_range(int reg, phys_addr_t base, size_t size)
  363. {
  364. phys_addr_t end;
  365. bool found = false;
  366. unsigned int i;
  367. struct imr_device *idev = &imr_dev;
  368. struct imr_regs imr;
  369. size_t raw_size;
  370. int ret = 0;
  371. if (WARN_ONCE(idev->init == false, "driver not initialized"))
  372. return -ENODEV;
  373. /*
  374. * Validate address range if deleting by address, else we are
  375. * deleting by index where base and size will be ignored.
  376. */
  377. if (reg == -1) {
  378. ret = imr_check_params(base, size);
  379. if (ret)
  380. return ret;
  381. }
  382. /* Tweak the size value. */
  383. raw_size = imr_raw_size(size);
  384. end = base + raw_size;
  385. mutex_lock(&idev->lock);
  386. if (reg >= 0) {
  387. /* If a specific IMR is given try to use it. */
  388. ret = imr_read(idev, reg, &imr);
  389. if (ret)
  390. goto failed;
  391. if (!imr_is_enabled(&imr) || imr.addr_lo & IMR_LOCK) {
  392. ret = -ENODEV;
  393. goto failed;
  394. }
  395. found = true;
  396. } else {
  397. /* Search for match based on address range. */
  398. for (i = 0; i < idev->max_imr; i++) {
  399. ret = imr_read(idev, i, &imr);
  400. if (ret)
  401. goto failed;
  402. if (!imr_is_enabled(&imr) || imr.addr_lo & IMR_LOCK)
  403. continue;
  404. if ((imr_to_phys(imr.addr_lo) == base) &&
  405. (imr_to_phys(imr.addr_hi) == end)) {
  406. found = true;
  407. reg = i;
  408. break;
  409. }
  410. }
  411. }
  412. if (!found) {
  413. ret = -ENODEV;
  414. goto failed;
  415. }
  416. pr_debug("remove %d phys %pa-%pa size %zx\n", reg, &base, &end, raw_size);
  417. /* Tear down the IMR. */
  418. imr.addr_lo = 0;
  419. imr.addr_hi = 0;
  420. imr.rmask = IMR_READ_ACCESS_ALL;
  421. imr.wmask = IMR_WRITE_ACCESS_ALL;
  422. ret = imr_write(idev, reg, &imr);
  423. failed:
  424. mutex_unlock(&idev->lock);
  425. return ret;
  426. }
  427. /**
  428. * imr_remove_range - delete an Isolated Memory Region by address
  429. *
  430. * This function allows you to delete an IMR by an address range specified
  431. * by base and size respectively.
  432. * imr_remove_range(base, size); delete IMR from base to base+size.
  433. *
  434. * @base: physical base address of region aligned to 1 KiB.
  435. * @size: physical size of region in bytes aligned to 1 KiB.
  436. * @return: -EINVAL on invalid range or out or range id
  437. * -ENODEV if reg is valid but no IMR exists or is locked
  438. * 0 on success.
  439. */
  440. int imr_remove_range(phys_addr_t base, size_t size)
  441. {
  442. return __imr_remove_range(-1, base, size);
  443. }
  444. EXPORT_SYMBOL_GPL(imr_remove_range);
  445. /**
  446. * imr_clear - delete an Isolated Memory Region by index
  447. *
  448. * This function allows you to delete an IMR by an address range specified
  449. * by the index of the IMR. Useful for initial sanitization of the IMR
  450. * address map.
  451. * imr_ge(base, size); delete IMR from base to base+size.
  452. *
  453. * @reg: imr index to remove.
  454. * @return: -EINVAL on invalid range or out or range id
  455. * -ENODEV if reg is valid but no IMR exists or is locked
  456. * 0 on success.
  457. */
  458. static inline int imr_clear(int reg)
  459. {
  460. return __imr_remove_range(reg, 0, 0);
  461. }
  462. /**
  463. * imr_fixup_memmap - Tear down IMRs used during bootup.
  464. *
  465. * BIOS and Grub both setup IMRs around compressed kernel, initrd memory
  466. * that need to be removed before the kernel hands out one of the IMR
  467. * encased addresses to a downstream DMA agent such as the SD or Ethernet.
  468. * IMRs on Galileo are setup to immediately reset the system on violation.
  469. * As a result if you're running a root filesystem from SD - you'll need
  470. * the boot-time IMRs torn down or you'll find seemingly random resets when
  471. * using your filesystem.
  472. *
  473. * @idev: pointer to imr_device structure.
  474. * @return:
  475. */
  476. static void __init imr_fixup_memmap(struct imr_device *idev)
  477. {
  478. phys_addr_t base = virt_to_phys(&_text);
  479. size_t size = virt_to_phys(&__end_rodata) - base;
  480. unsigned long start, end;
  481. int i;
  482. int ret;
  483. /* Tear down all existing unlocked IMRs. */
  484. for (i = 0; i < idev->max_imr; i++)
  485. imr_clear(i);
  486. start = (unsigned long)_text;
  487. end = (unsigned long)__end_rodata - 1;
  488. /*
  489. * Setup an unlocked IMR around the physical extent of the kernel
  490. * from the beginning of the .text secton to the end of the
  491. * .rodata section as one physically contiguous block.
  492. *
  493. * We don't round up @size since it is already PAGE_SIZE aligned.
  494. * See vmlinux.lds.S for details.
  495. */
  496. ret = imr_add_range(base, size, IMR_CPU, IMR_CPU);
  497. if (ret < 0) {
  498. pr_err("unable to setup IMR for kernel: %zu KiB (%lx - %lx)\n",
  499. size / 1024, start, end);
  500. } else {
  501. pr_info("protecting kernel .text - .rodata: %zu KiB (%lx - %lx)\n",
  502. size / 1024, start, end);
  503. }
  504. }
  505. static const struct x86_cpu_id imr_ids[] __initconst = {
  506. { X86_VENDOR_INTEL, 5, 9 }, /* Intel Quark SoC X1000. */
  507. {}
  508. };
  509. /**
  510. * imr_init - entry point for IMR driver.
  511. *
  512. * return: -ENODEV for no IMR support 0 if good to go.
  513. */
  514. static int __init imr_init(void)
  515. {
  516. struct imr_device *idev = &imr_dev;
  517. int ret;
  518. if (!x86_match_cpu(imr_ids) || !iosf_mbi_available())
  519. return -ENODEV;
  520. idev->max_imr = QUARK_X1000_IMR_MAX;
  521. idev->reg_base = QUARK_X1000_IMR_REGBASE;
  522. idev->init = true;
  523. mutex_init(&idev->lock);
  524. ret = imr_debugfs_register(idev);
  525. if (ret != 0)
  526. pr_warn("debugfs register failed!\n");
  527. imr_fixup_memmap(idev);
  528. return 0;
  529. }
  530. device_initcall(imr_init);