blob: f5ac81ebfda007e56841b5388c90e339e0313226 [file] [log] [blame]
Jacob Garber10999ea62020-05-18 13:36:58 -06001/* SPDX-License-Identifier: BSD-3-Clause */
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +08002
Jonathan Zhangb5392f92019-07-16 14:37:23 -07003#include <assert.h>
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +08004#include <console/console.h>
Hung-Te Linb15a0d02015-07-13 15:49:57 +08005#include <cbmem.h>
Aaron Durbin0424c952015-03-28 23:56:22 -05006#include <fmap.h>
Julius Werner5f174582020-05-26 19:03:31 -07007#include <program_loading.h>
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +08008#include <string.h>
Julius Werner4f7a3612016-01-20 18:01:15 -08009#include <timestamp.h>
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080010
Patrick Rudolph28cee592018-03-08 15:43:12 +010011#include "vpd.h"
Hung-Te Linc3455702019-05-27 11:02:00 +080012#include "vpd_decode.h"
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080013#include "vpd_tables.h"
14
Julius Werner5f174582020-05-26 19:03:31 -070015/* Currently we only support Google VPD 2.0, which has a fixed offset. */
16enum {
17 CROSVPD_CBMEM_MAGIC = 0x43524f53,
18 CROSVPD_CBMEM_VERSION = 0x0001,
19};
20
21struct vpd_cbmem {
22 uint32_t magic;
23 uint32_t version;
24 uint32_t ro_size;
25 uint32_t rw_size;
26 uint8_t blob[0];
27 /* The blob contains both RO and RW data. It starts with RO (0 ..
28 * ro_size) and then RW (ro_size .. ro_size+rw_size).
29 */
30};
31
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080032struct vpd_gets_arg {
33 const uint8_t *key;
34 const uint8_t *value;
35 int32_t key_len, value_len;
36 int matched;
37};
38
Julius Werner5f174582020-05-26 19:03:31 -070039static struct region_device ro_vpd, rw_vpd;
Hung-Te Linb15a0d02015-07-13 15:49:57 +080040
Jonathan Zhangb5392f92019-07-16 14:37:23 -070041/*
Julius Werner5f174582020-05-26 19:03:31 -070042 * Initializes a region_device to represent the requested VPD 2.0 formatted
43 * region on flash. On errors rdev->size will be set to 0.
Jonathan Zhangb5392f92019-07-16 14:37:23 -070044 */
Julius Werner5f174582020-05-26 19:03:31 -070045static void init_vpd_rdev(const char *fmap_name, struct region_device *rdev)
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080046{
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080047 struct google_vpd_info info;
Hung-Te Linb15a0d02015-07-13 15:49:57 +080048 int32_t size;
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080049
Julius Werner5f174582020-05-26 19:03:31 -070050 if (fmap_locate_area_as_rdev(fmap_name, rdev)) {
Hung-Te Linb15a0d02015-07-13 15:49:57 +080051 printk(BIOS_ERR, "%s: No %s FMAP section.\n", __func__,
52 fmap_name);
Julius Werner5f174582020-05-26 19:03:31 -070053 goto fail;
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080054 }
55
Julius Werner5f174582020-05-26 19:03:31 -070056 size = region_device_sz(rdev);
Aaron Durbin0424c952015-03-28 23:56:22 -050057
Hung-Te Linb15a0d02015-07-13 15:49:57 +080058 if ((size < GOOGLE_VPD_2_0_OFFSET + sizeof(info)) ||
Julius Werner5f174582020-05-26 19:03:31 -070059 rdev_chain(rdev, rdev, GOOGLE_VPD_2_0_OFFSET,
Hung-Te Linb15a0d02015-07-13 15:49:57 +080060 size - GOOGLE_VPD_2_0_OFFSET)) {
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080061 printk(BIOS_ERR, "%s: Too small (%d) for Google VPD 2.0.\n",
Hung-Te Linb15a0d02015-07-13 15:49:57 +080062 __func__, size);
Julius Werner5f174582020-05-26 19:03:31 -070063 goto fail;
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080064 }
65
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080066 /* Try if we can find a google_vpd_info, otherwise read whole VPD. */
Julius Werner5f174582020-05-26 19:03:31 -070067 if (rdev_readat(rdev, &info, 0, sizeof(info)) != sizeof(info)) {
Julius Wernerffc22602016-01-21 11:12:38 -080068 printk(BIOS_ERR, "ERROR: Failed to read %s header.\n",
69 fmap_name);
Julius Werner5f174582020-05-26 19:03:31 -070070 goto fail;
Julius Wernerffc22602016-01-21 11:12:38 -080071 }
72
73 if (memcmp(info.header.magic, VPD_INFO_MAGIC, sizeof(info.header.magic))
Julius Werner5f174582020-05-26 19:03:31 -070074 == 0) {
75 if (rdev_chain(rdev, rdev, sizeof(info), info.size)) {
76 printk(BIOS_ERR, "ERROR: %s info size too large.\n",
77 fmap_name);
78 goto fail;
79 }
Julius Wernerffc22602016-01-21 11:12:38 -080080 } else if (info.header.tlv.type == VPD_TYPE_TERMINATOR ||
81 info.header.tlv.type == VPD_TYPE_IMPLICIT_TERMINATOR) {
82 printk(BIOS_WARNING, "WARNING: %s is uninitialized or empty.\n",
83 fmap_name);
Julius Werner5f174582020-05-26 19:03:31 -070084 goto fail;
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080085 }
86
Julius Werner5f174582020-05-26 19:03:31 -070087 return;
88
89fail:
90 memset(rdev, 0, sizeof(*rdev));
Hung-Te Linb15a0d02015-07-13 15:49:57 +080091}
92
Julius Werner5f174582020-05-26 19:03:31 -070093static int init_vpd_rdevs_from_cbmem(void)
Hung-Te Linb15a0d02015-07-13 15:49:57 +080094{
Julius Werner5f174582020-05-26 19:03:31 -070095 if (!cbmem_possibly_online())
96 return -1;
Jonathan Zhangb5392f92019-07-16 14:37:23 -070097
Julius Werner5f174582020-05-26 19:03:31 -070098 struct vpd_cbmem *cbmem = cbmem_find(CBMEM_ID_VPD);
99 if (!cbmem)
100 return -1;
101
102 rdev_chain(&ro_vpd, &addrspace_32bit.rdev,
103 (uintptr_t)cbmem->blob, cbmem->ro_size);
104 rdev_chain(&rw_vpd, &addrspace_32bit.rdev,
105 (uintptr_t)cbmem->blob + cbmem->ro_size, cbmem->rw_size);
106
107 return 0;
108}
109
110static void init_vpd_rdevs(void)
111{
112 static bool done = false;
113
114 if (done)
Jonathan Zhangb5392f92019-07-16 14:37:23 -0700115 return;
116
Julius Werner5f174582020-05-26 19:03:31 -0700117 if (init_vpd_rdevs_from_cbmem() != 0) {
118 init_vpd_rdev("RO_VPD", &ro_vpd);
119 init_vpd_rdev("RW_VPD", &rw_vpd);
Hung-Te Linb15a0d02015-07-13 15:49:57 +0800120 }
Julius Werner5f174582020-05-26 19:03:31 -0700121
122 done = true;
Jonathan Zhangb5392f92019-07-16 14:37:23 -0700123}
124
Julius Werner5f174582020-05-26 19:03:31 -0700125static void cbmem_add_cros_vpd(int is_recovery)
Jonathan Zhangb5392f92019-07-16 14:37:23 -0700126{
Julius Werner5f174582020-05-26 19:03:31 -0700127 struct vpd_cbmem *cbmem;
Jonathan Zhangb5392f92019-07-16 14:37:23 -0700128
Julius Werner5f174582020-05-26 19:03:31 -0700129 timestamp_add_now(TS_START_COPYVPD);
130
131 init_vpd_rdevs();
132
133 /* Return if no VPD at all */
134 if (region_device_sz(&ro_vpd) == 0 && region_device_sz(&rw_vpd) == 0)
135 return;
136
137 size_t ro_size = region_device_sz(&ro_vpd);
138 size_t rw_size = region_device_sz(&rw_vpd);
139
140 cbmem = cbmem_add(CBMEM_ID_VPD, sizeof(*cbmem) + ro_size + rw_size);
141 if (!cbmem) {
142 printk(BIOS_ERR, "%s: Failed to allocate CBMEM (%zu+%zu).\n",
143 __func__, ro_size, rw_size);
144 return;
145 }
146
147 cbmem->magic = CROSVPD_CBMEM_MAGIC;
148 cbmem->version = CROSVPD_CBMEM_VERSION;
149 cbmem->ro_size = ro_size;
150 cbmem->rw_size = rw_size;
151
152 if (ro_size) {
153 if (rdev_readat(&ro_vpd, cbmem->blob, 0, ro_size) != ro_size) {
154 printk(BIOS_ERR, "ERROR: Couldn't read RO VPD\n");
155 cbmem->ro_size = ro_size = 0;
156 }
157 timestamp_add_now(TS_END_COPYVPD_RO);
158 }
159
160 if (rw_size) {
161 if (rdev_readat(&rw_vpd, cbmem->blob + ro_size, 0, rw_size)
162 != rw_size) {
163 printk(BIOS_ERR, "ERROR: Couldn't read RW VPD\n");
164 cbmem->rw_size = rw_size = 0;
165 }
166 timestamp_add_now(TS_END_COPYVPD_RW);
167 }
168
169 init_vpd_rdevs_from_cbmem();
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800170}
171
Hung-Te Linc3455702019-05-27 11:02:00 +0800172static int vpd_gets_callback(const uint8_t *key, uint32_t key_len,
173 const uint8_t *value, uint32_t value_len,
174 void *arg)
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800175{
176 struct vpd_gets_arg *result = (struct vpd_gets_arg *)arg;
177 if (key_len != result->key_len ||
178 memcmp(key, result->key, key_len) != 0)
Hung-Te Linc3455702019-05-27 11:02:00 +0800179 /* Returns VPD_DECODE_OK to continue parsing. */
180 return VPD_DECODE_OK;
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800181
182 result->matched = 1;
183 result->value = value;
184 result->value_len = value_len;
Hung-Te Linc3455702019-05-27 11:02:00 +0800185 /* Returns VPD_DECODE_FAIL to stop parsing. */
186 return VPD_DECODE_FAIL;
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800187}
188
Julius Werner5f174582020-05-26 19:03:31 -0700189static void vpd_find_in(struct region_device *rdev, struct vpd_gets_arg *arg)
190{
191 if (region_device_sz(rdev) == 0)
192 return;
193
194 uint32_t consumed = 0;
195 void *mapping = rdev_mmap_full(rdev);
196 while (vpd_decode_string(region_device_sz(rdev), mapping,
197 &consumed, vpd_gets_callback, arg) == VPD_DECODE_OK) {
198 /* Iterate until found or no more entries. */
199 }
200 rdev_munmap(rdev, mapping);
201}
202
Patrick Rudolph28cee592018-03-08 15:43:12 +0100203const void *vpd_find(const char *key, int *size, enum vpd_region region)
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800204{
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800205 struct vpd_gets_arg arg = {0};
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800206
207 arg.key = (const uint8_t *)key;
208 arg.key_len = strlen(key);
209
Julius Werner5f174582020-05-26 19:03:31 -0700210 init_vpd_rdevs();
Jonathan Zhangb5392f92019-07-16 14:37:23 -0700211
Julius Werner5f174582020-05-26 19:03:31 -0700212 if (region != VPD_RW)
213 vpd_find_in(&ro_vpd, &arg);
214
215 if (!arg.matched && region != VPD_RO)
216 vpd_find_in(&rw_vpd, &arg);
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800217
218 if (!arg.matched)
219 return NULL;
220
Vadim Bendebury127c3392014-10-22 17:39:24 -0700221 *size = arg.value_len;
222 return arg.value;
223}
224
Patrick Rudolph28cee592018-03-08 15:43:12 +0100225char *vpd_gets(const char *key, char *buffer, int size, enum vpd_region region)
Vadim Bendebury127c3392014-10-22 17:39:24 -0700226{
227 const void *string_address;
228 int string_size;
229
Patrick Rudolph28cee592018-03-08 15:43:12 +0100230 string_address = vpd_find(key, &string_size, region);
Vadim Bendebury127c3392014-10-22 17:39:24 -0700231
232 if (!string_address)
233 return NULL;
234
Jonathan Zhangb5392f92019-07-16 14:37:23 -0700235 assert(size > 0);
236 int copy_size = MIN(size - 1, string_size);
237 memcpy(buffer, string_address, copy_size);
238 buffer[copy_size] = '\0';
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800239 return buffer;
240}
241
Jonathan Zhangb5392f92019-07-16 14:37:23 -0700242/*
243 * Find value of boolean type vpd key.
244 *
245 * During the process, necessary checking is done, such as making
246 * sure the value length is 1, and value is either '1' or '0'.
247 */
248bool vpd_get_bool(const char *key, enum vpd_region region, uint8_t *val)
249{
250 int size;
251 const char *value;
252
253 value = vpd_find(key, &size, region);
254 if (!value) {
255 printk(BIOS_CRIT, "problem returning from vpd_find.\n");
256 return false;
257 }
258
259 if (size != 1)
260 return false;
261
262 /* Make sure the value is either '1' or '0' */
263 if (*value == '1') {
264 *val = 1;
265 return true;
266 } else if (*value == '0') {
267 *val = 0;
268 return true;
269 } else
270 return false;
271}
Julius Werner5f174582020-05-26 19:03:31 -0700272
273ROMSTAGE_CBMEM_INIT_HOOK(cbmem_add_cros_vpd)