acpi: Add IORT helper functions
[coreboot2.git] / util / intelmetool / intelmetool.c
blob317ca0b3fa95602a7fb3a2cab96bb7285d47fac4
1 /* intelmetool Dump interesting things about Management Engine even if hidden */
2 /* SPDX-License-Identifier: GPL-2.0-or-later */
4 #include <stdio.h>
5 #include <inttypes.h>
6 #include <stdlib.h>
7 #include <getopt.h>
8 #include <unistd.h>
9 #include <string.h>
10 #include <cpuid.h>
11 #include <sys/io.h>
13 #ifdef __NetBSD__
14 #include <machine/sysarch.h>
15 #endif
17 #include "intelmetool.h"
18 #include "me.h"
19 #include "mmap.h"
20 #include "msr.h"
21 #include "rcba.h"
23 extern int fd_mem;
24 int debug = 0;
26 static uint32_t fd2 = 0;
27 static int ME_major_ver = 0;
28 static int ME_minor_ver = 0;
30 static void dumpmem(uint8_t *phys, uint32_t size)
32 uint32_t i;
33 printf("Dumping cloned ME memory:\n");
34 for (i = 0; i < size; i++) {
35 printf("%02X",*((uint8_t *) (phys + i)));
37 printf("\n");
40 static void zeroit(uint8_t *phys, uint32_t size)
42 uint32_t i;
43 for (i = 0; i < size; i++) {
44 *((uint8_t *) (phys + i)) = 0x00;
48 static void dumpmemfile(uint8_t *phys, uint32_t size)
50 FILE *fp = fopen("medump.bin", "w");
51 uint32_t i;
52 for (i = 0; i < size; i++) {
53 fprintf(fp, "%c", *((uint8_t *) (phys + i)));
55 fclose(fp);
58 static int isCPUGenuineIntel(void)
60 regs_t regs;
61 unsigned int level = 0;
62 unsigned int eax = 0;
64 __get_cpuid(level, &eax, &regs.ebx, &regs.ecx, &regs.edx);
66 return !strncmp((char *)&regs, "GenuineIntel", CPU_ID_SIZE-1);
69 /* You need >4GB total ram, in kernel cmdline, use 'mem=1000m'
70 * then this code will clone to absolute memory address 0xe0000000
71 * which can be read using a mmap tool at that offset.
72 * Real ME memory is located around top of memory minus 64MB. (I think)
73 * so we avoid cloning to this part.
75 static void dump_me_memory(void)
77 uintptr_t me_clone = 0x60000000;
78 uint8_t *dump;
80 dump = map_physical_exact((off_t)me_clone, (void *)me_clone, 0x2000000);
81 if (dump == NULL) {
82 printf("Could not map ME memory\n");
83 return;
85 zeroit(dump, 0x2000000);
86 printf("Send magic command for memory clone\n");
88 mei_reset();
89 usleep(ME_COMMAND_DELAY);
90 void* ptr = &me_clone;
91 int err = mkhi_debug_me_memory(ptr);
93 if (!err) {
94 printf("Wait a second...");
95 usleep(ME_COMMAND_DELAY);
96 printf("done\n\nHere are the first bytes:\n");
97 dumpmemfile(dump, 0x2000000);
98 //printf("Try reading 0x%zx with other mmap tool...\n"
99 // "Press enter to quit, you only get one chance to run"
100 // "this tool before reboot required for some reason\n",
101 // me_clone);
102 while (getc(stdin) != '\n') {};
103 unmap_physical(dump, 0x2000000);
107 static int pci_platform_scan(void)
109 struct pci_access *pacc;
110 struct pci_dev *dev;
111 char namebuf[1024];
112 const char *name;
114 pacc = pci_alloc();
115 pacc->method = PCI_ACCESS_I386_TYPE1;
117 pci_init(pacc);
118 pci_scan_bus(pacc);
120 for (dev=pacc->devices; dev; dev=dev->next) {
121 pci_fill_info(dev, PCI_FILL_IDENT | PCI_FILL_BASES |
122 PCI_FILL_SIZES | PCI_FILL_CLASS);
123 name = pci_lookup_name(pacc, namebuf, sizeof(namebuf),
124 PCI_LOOKUP_DEVICE, dev->vendor_id, dev->device_id);
125 if (name == NULL)
126 name = "<unknown>";
127 if (dev->vendor_id != PCI_VENDOR_ID_INTEL)
128 continue;
130 if (PCI_DEV_NO_ME(dev->device_id)) {
131 printf(CGRN "Good news, you have a `%s` so you have "
132 "no ME present at all, continuing...\n\n"
133 RESET, name);
134 break;
135 } else if (PCI_DEV_HAS_ME_DISABLE(dev->device_id)) {
136 printf(CGRN "Good news, you have a `%s` so ME is "
137 "present but can be disabled, continuing...\n\n"
138 RESET, name);
139 break;
140 } else if (PCI_DEV_HAS_ME_DIFFICULT(dev->device_id)) {
141 printf(CRED "Bad news, you have a `%s` so you have ME "
142 "hardware on board and you can't control or "
143 "disable it, continuing...\n\n" RESET, name);
144 break;
145 } else if (PCI_DEV_CAN_DISABLE_ME_IF_PRESENT(dev->device_id)) {
146 printf(CYEL "Not sure if ME hardware is present "
147 "because you have a `%s`, but it is possible to "
148 "disable it if you do, continuing...\n\n" RESET,
149 name);
150 break;
151 } else if (PCI_DEV_ME_NOT_SURE(dev->device_id)) {
152 printf(CYEL "Found `%s`. Not sure whether you have ME "
153 "hardware, exiting\n\n" RESET, name);
154 pci_cleanup(pacc);
155 return 1;
159 if (dev != NULL &&
160 !PCI_DEV_HAS_ME_DISABLE(dev->device_id) &&
161 !PCI_DEV_HAS_ME_DIFFICULT(dev->device_id) &&
162 !PCI_DEV_CAN_DISABLE_ME_IF_PRESENT(dev->device_id) &&
163 !PCI_DEV_ME_NOT_SURE(dev->device_id)) {
164 printf(CCYN "ME is not present on your board or unknown\n\n"
165 RESET);
166 pci_cleanup(pacc);
167 return 1;
170 pci_cleanup(pacc);
172 return 0;
175 static int activate_me(void)
177 const uint32_t rcba = get_rcba_phys();
178 if (debug)
179 printf("RCBA addr: 0x%08x\n", rcba);
180 if (rcba > 0) {
181 if (read_rcba32(FD2, &fd2)) {
182 printf("Error reading RCBA\n");
183 return 1;
185 if (write_rcba32(FD2, fd2 & ~0x2)) {
186 printf("Error writing RCBA\n");
187 return 1;
189 if (debug && (fd2 & 0x2))
190 printf("MEI was hidden on PCI, now unlocked\n");
191 else if (debug)
192 printf("MEI not hidden on PCI, checking if visible\n");
195 return 0;
198 static void rehide_me(void)
200 const uint32_t rcba = get_rcba_phys();
201 if (rcba > 0) {
202 if (fd2 & 0x2) {
203 if (debug)
204 printf("Re-hiding MEI device...");
205 if (read_rcba32(FD2, &fd2)) {
206 printf("Error reading RCBA\n");
207 return;
209 if (write_rcba32(FD2, fd2 | 0x2)) {
210 printf("Error writing RCBA\n");
211 return;
213 if (debug)
214 printf("done\n");
219 static struct pci_dev *pci_me_interface_scan(const char **name, char *namebuf,
220 int namebuf_size)
222 struct pci_access *pacc;
223 struct pci_dev *dev;
224 int me = 0;
226 pacc = pci_alloc();
227 pacc->method = PCI_ACCESS_I386_TYPE1;
229 pci_init(pacc);
230 pci_scan_bus(pacc);
232 for (dev=pacc->devices; dev; dev=dev->next) {
233 pci_fill_info(dev, PCI_FILL_IDENT | PCI_FILL_BASES |
234 PCI_FILL_SIZES | PCI_FILL_CLASS);
235 *name = pci_lookup_name(pacc, namebuf, namebuf_size,
236 PCI_LOOKUP_DEVICE, dev->vendor_id, dev->device_id);
237 if (dev->vendor_id != PCI_VENDOR_ID_INTEL)
238 continue;
240 if (PCI_DEV_HAS_SUPPORTED_ME(dev->device_id)) {
241 me = 1;
242 break;
246 if (!me) {
247 rehide_me();
249 pci_cleanup(pacc);
250 return NULL;
253 return dev;
256 static void dump_me_info(void)
258 struct pci_dev *dev;
259 uint32_t stat, stat2;
260 char namebuf[1024];
261 const char *name = NULL;
263 if (pci_platform_scan())
264 return;
266 dev = pci_me_interface_scan(&name, namebuf, sizeof(namebuf));
267 if (!dev) {
268 if (debug)
269 printf("ME PCI device is hidden\n");
271 if (activate_me())
272 return;
273 dev = pci_me_interface_scan(&name, namebuf, sizeof(namebuf));
274 if (!dev) {
275 printf("Can't find ME PCI device\n");
276 return;
280 if (name == NULL)
281 name = "<unknown>";
283 printf("MEI found: [%x:%x] %s\n\n",
284 dev->vendor_id, dev->device_id, name);
285 stat = pci_read_long(dev, 0x40);
286 printf("ME Status : 0x%x\n", stat);
287 stat2 = pci_read_long(dev, 0x48);
288 printf("ME Status 2 : 0x%x\n\n", stat2);
290 intel_me_status(stat, stat2);
291 printf("\n");
292 intel_me_extend_valid(dev);
293 printf("\n");
295 if (stat & 0xf000)
296 printf("ME: has a broken implementation on your board with "
297 "this firmware\n");
299 if (intel_mei_setup(dev))
300 goto out;
301 usleep(ME_COMMAND_DELAY);
302 mei_reset();
303 usleep(ME_COMMAND_DELAY);
304 if (mkhi_get_fw_version(&ME_major_ver, &ME_minor_ver))
305 goto out;
306 usleep(ME_COMMAND_DELAY);
307 mei_reset();
308 usleep(ME_COMMAND_DELAY);
309 if (mkhi_get_fwcaps())
310 goto out;
311 usleep(ME_COMMAND_DELAY);
313 out:
314 rehide_me();
317 static void print_btg_bool_param(const char *name, u8 state)
319 printf("%-20s : %s\n", name, state ? "ON" : "OFF");
322 static void dump_bootguard_info(void)
324 struct pci_dev *dev;
325 char namebuf[1024];
326 const char *name = NULL;
328 if (pci_platform_scan())
329 return;
331 dev = pci_me_interface_scan(&name, namebuf, sizeof(namebuf));
332 if (!dev) {
333 if (debug)
334 printf("ME PCI device is hidden\n");
336 if (activate_me())
337 return;
338 dev = pci_me_interface_scan(&name, namebuf, sizeof(namebuf));
339 if (!dev) {
340 printf("Can't find ME PCI device\n");
341 return;
345 /* ME_major_ver is zero on some platforms (Mac) */
346 if (ME_major_ver &&
347 (ME_major_ver < 9 ||
348 (ME_major_ver == 9 && ME_minor_ver < 5))) {
349 printf(CGRN "Your system isn't Boot Guard ready.\n"
350 "You can flash other firmware!\n" RESET);
351 rehide_me();
352 return;
355 if (pci_read_long(dev, 0x40) & 0x10)
356 printf(CYEL "Your southbridge configuration is insecure!!\n"
357 "Boot Guard keys can be overwritten or wiped, or you are "
358 "in developer mode.\n"
359 RESET);
360 rehide_me();
362 union {
363 struct {
364 u8 nem_enabled : 1; /* [ 0.. 0] */
365 u8 tpm_type : 2; /* [ 2.. 1] */
366 u8 tpm_success : 1; /* [ 3.. 3] */
367 u8 facb_fpf : 1; /* [ 4.. 4] */
368 u8 measured_boot : 1; /* [ 5.. 5] */
369 u8 verified_boot : 1; /* [ 6.. 6] */
370 u8 module_revoked : 1; /* [ 7.. 7] */
371 u32 : 24;
372 u8 btg_capability : 1; /* [32..32] */
373 u32 : 31;
375 u64 raw;
376 } btg;
378 if (msr_bootguard(&btg.raw) < 0) {
379 printf("Could not read the BOOTGUARD_SACM_INFO MSR.\n");
380 return;
383 printf("Boot Guard MSR Output : 0x%" PRIx64 "\n", btg.raw);
385 if (!btg.btg_capability) {
386 printf(CGRN "Your system isn't Boot Guard ready.\n"
387 "You can flash other firmware!\n" RESET);
388 return;
391 print_btg_bool_param("Measured boot", btg.measured_boot);
392 print_btg_bool_param("Verified boot", btg.verified_boot);
393 print_btg_bool_param("FACB in FPFs", btg.facb_fpf);
394 print_btg_bool_param("Module revoked", btg.module_revoked);
395 if (btg.measured_boot) {
396 const char *const tpm_type_strs[] = {
397 "None",
398 "TPM 1.2",
399 "TPM 2.0",
400 "PTT",
402 printf("%-20s : %s\n", "TPM type", tpm_type_strs[btg.tpm_type]);
403 print_btg_bool_param("TPM success", btg.tpm_success);
405 if (btg.verified_boot) {
406 print_btg_bool_param("NEM enabled", btg.nem_enabled);
407 if (btg.nem_enabled)
408 printf(CRED "Verified boot is enabled and ACM has enabled "
409 "Cache-As-RAM.\nYou can't flash other firmware!\n" RESET);
410 else
411 printf(CYEL "Verified boot is enabled, but ACM did not enable "
412 "Cache-As-RAM.\nIt might be possible to flash other firmware.\n"
413 RESET);
414 } else {
415 printf(CGRN "Your system is Boot Guard ready but verified boot is disabled.\n"
416 "You can flash other firmware!\n" RESET);
420 static void print_version(void)
422 printf("intelmetool v%s -- ", INTELMETOOL_VERSION);
423 printf("Copyright (C) 2015 Damien Zammit\n");
424 printf("Copyright (C) 2017 Philipp Deppenwiese\n");
425 printf("Copyright (C) 2017 Patrick Rudolph\n\n");
426 printf(GPLV2COPYRIGHT);
429 static void print_usage(const char *name)
431 printf("usage: %s [-vh?smdb]\n", name);
432 printf("\n"
433 " -v | --version: print the version\n"
434 " -h | --help: print this help\n\n"
435 " -d | --debug: enable debug output\n"
436 " -m | --me dump all me information on console\n"
437 " -b | --bootguard dump bootguard state of the platform\n"
438 "\n");
439 exit(1);
442 int main(int argc, char *argv[])
444 int opt, option_index = 0;
445 unsigned cmd_exec = 0;
447 static struct option long_options[] = {
448 {"version", 0, 0, 'v'},
449 {"help", 0, 0, 'h'},
450 {"me", 0, 0, 'm'},
451 {"bootguard", 0, 0, 'b'},
452 {"debug", 0, 0, 'd'},
453 {0, 0, 0, 0}
456 while ((opt = getopt_long(argc, argv, "vh?smdb",
457 long_options, &option_index)) != EOF) {
458 switch (opt) {
459 case 'v':
460 print_version();
461 exit(0);
462 break;
463 case 's': /* Legacy fallthrough */
464 case 'm':
465 cmd_exec = 1;
466 break;
467 case 'b':
468 cmd_exec = 2;
469 break;
470 case 'd':
471 debug = 1;
472 break;
473 case 'h':
474 case '?':
475 default:
476 print_usage(argv[0]);
477 exit(0);
478 break;
482 if (!cmd_exec)
483 print_usage(argv[0]);
485 #if defined(__FreeBSD__)
486 if (open("/dev/io", O_RDWR) < 0) {
487 perror("/dev/io");
488 #elif defined(__NetBSD__)
489 # ifdef __i386__
490 if (i386_iopl(3)) {
491 perror("iopl");
492 # else
493 if (x86_64_iopl(3)) {
494 perror("iopl");
495 # endif
496 #else
497 if (iopl(3)) {
498 perror("iopl");
499 #endif
500 printf("You need to be root.\n");
501 exit(1);
504 #ifndef __DARWIN__
505 fd_mem = open("/dev/mem", O_RDWR);
506 if (fd_mem < 0) {
507 perror("Can not open /dev/mem. Do you have disabled "
508 "Secure Boot ?");
509 exit(1);
512 if (!isCPUGenuineIntel()) {
513 perror("Error CPU is not from Intel.");
514 exit(1);
516 #endif
518 if (cmd_exec & 3)
519 dump_me_info();
520 if (cmd_exec & 2)
521 dump_bootguard_info();
523 return 0;