blob: 8d7b6a8f7182927fdd2d4a20f279d1ee285fe701 [file] [log] [blame]
Angel Pons118a9c72020-04-02 23:48:34 +02001/* SPDX-License-Identifier: GPL-2.0-only */
Aaron Durbin0424c952015-03-28 23:56:22 -05002
3#include <boot_device.h>
Julius Wernercefe89e2019-11-06 19:29:44 -08004#include <cbmem.h>
Aaron Durbin0424c952015-03-28 23:56:22 -05005#include <console/console.h>
6#include <fmap.h>
Julius Wernerfdabf3f2020-05-06 17:06:35 -07007#include <metadata_hash.h>
Aaron Durbin0424c952015-03-28 23:56:22 -05008#include <stddef.h>
9#include <string.h>
Julius Wernercefe89e2019-11-06 19:29:44 -080010#include <symbols.h>
Krystian Hebel93f6b8a2020-09-30 18:23:14 +020011#include <endian.h>
Aaron Durbin0424c952015-03-28 23:56:22 -050012
Aaron Durbinbf1e4812016-05-10 15:12:08 -050013#include "fmap_config.h"
14
Aaron Durbin0424c952015-03-28 23:56:22 -050015/*
16 * See http://code.google.com/p/flashmap/ for more information on FMAP.
17 */
18
Arthur Heymansdba22d22019-11-20 19:57:49 +010019static int fmap_print_once;
Julius Wernerc8931972021-04-16 16:48:32 -070020static struct region_device fmap_cache;
Duncan Lauriebc2c0a32016-02-09 09:17:56 -080021
Julius Wernercefe89e2019-11-06 19:29:44 -080022#define print_once(...) do { \
Arthur Heymansdba22d22019-11-20 19:57:49 +010023 if (!fmap_print_once) \
Julius Wernercefe89e2019-11-06 19:29:44 -080024 printk(__VA_ARGS__); \
25 } while (0)
26
Furquan Shaikhb33a2b02019-09-26 23:51:46 -070027uint64_t get_fmap_flash_offset(void)
28{
29 return FMAP_OFFSET;
30}
31
Julius Wernerfdabf3f2020-05-06 17:06:35 -070032static int verify_fmap(const struct fmap *fmap)
Julius Wernercefe89e2019-11-06 19:29:44 -080033{
Julius Wernerfdabf3f2020-05-06 17:06:35 -070034 if (memcmp(fmap->signature, FMAP_SIGNATURE, sizeof(fmap->signature)))
35 return -1;
36
37 static bool done = false;
38 if (!CONFIG(CBFS_VERIFICATION) || !ENV_INITIAL_STAGE || done)
39 return 0; /* Only need to check hash in first stage. */
40
Julius Werner682cb3b2023-11-02 15:44:12 -070041 /* On error we need to die right here, lest we risk a TOCTOU attack where the cache is
42 filled with a tampered FMAP but the later fallback path is fed a valid one. */
Julius Wernerfdabf3f2020-05-06 17:06:35 -070043 if (metadata_hash_verify_fmap(fmap, FMAP_SIZE) != VB2_SUCCESS)
Julius Werner682cb3b2023-11-02 15:44:12 -070044 die("FMAP verification failure");
Julius Wernerfdabf3f2020-05-06 17:06:35 -070045
46 done = true;
47 return 0;
Julius Wernercefe89e2019-11-06 19:29:44 -080048}
49
50static void report(const struct fmap *fmap)
51{
52 print_once(BIOS_DEBUG, "FMAP: Found \"%s\" version %d.%d at %#x.\n",
53 fmap->name, fmap->ver_major, fmap->ver_minor, FMAP_OFFSET);
54 print_once(BIOS_DEBUG, "FMAP: base = %#llx size = %#x #areas = %d\n",
Krystian Hebel93f6b8a2020-09-30 18:23:14 +020055 (long long)le64toh(fmap->base), le32toh(fmap->size),
56 le16toh(fmap->nareas));
Arthur Heymansdba22d22019-11-20 19:57:49 +010057 fmap_print_once = 1;
Julius Wernercefe89e2019-11-06 19:29:44 -080058}
59
Julius Wernerc8931972021-04-16 16:48:32 -070060static void setup_preram_cache(struct region_device *cache_rdev)
Julius Wernercefe89e2019-11-06 19:29:44 -080061{
Julius Werner7fc92862019-11-18 13:01:06 -080062 if (CONFIG(NO_FMAP_CACHE))
63 return;
64
Josie Nordrumc3cc1582020-09-09 12:57:13 -060065 /* No need to use FMAP cache in SMM */
66 if (ENV_SMM)
67 return;
68
Julius Wernercefe89e2019-11-06 19:29:44 -080069 if (!ENV_ROMSTAGE_OR_BEFORE) {
70 /* We get here if ramstage makes an FMAP access before calling
71 cbmem_initialize(). We should avoid letting it come to that,
72 so print a warning. */
73 print_once(BIOS_WARNING,
74 "WARNING: Post-RAM FMAP access too early for cache!\n");
75 return;
76 }
77
Julius Wernercefe89e2019-11-06 19:29:44 -080078 struct fmap *fmap = (struct fmap *)_fmap_cache;
Martin Roth1594e8f2020-07-15 13:57:54 -060079 if (!(ENV_INITIAL_STAGE)) {
80 /* NOTE: This assumes that the first stage will make
Julius Wernercefe89e2019-11-06 19:29:44 -080081 at least one FMAP access (usually from finding CBFS). */
Julius Wernerfdabf3f2020-05-06 17:06:35 -070082 if (!verify_fmap(fmap))
Julius Wernercefe89e2019-11-06 19:29:44 -080083 goto register_cache;
84
Julius Wernere9665952022-01-21 17:06:20 -080085 printk(BIOS_ERR, "FMAP cache corrupted?!\n");
Julius Wernerfdabf3f2020-05-06 17:06:35 -070086 if (CONFIG(TOCTOU_SAFETY))
87 die("TOCTOU safety relies on FMAP cache");
Julius Wernercefe89e2019-11-06 19:29:44 -080088 }
89
90 /* In case we fail below, make sure the cache is invalid. */
91 memset(fmap->signature, 0, sizeof(fmap->signature));
92
93 boot_device_init();
94 const struct region_device *boot_rdev = boot_device_ro();
95 if (!boot_rdev)
96 return;
97
98 /* memlayout statically guarantees that the FMAP_CACHE is big enough. */
99 if (rdev_readat(boot_rdev, fmap, FMAP_OFFSET, FMAP_SIZE) != FMAP_SIZE)
100 return;
Julius Wernerfdabf3f2020-05-06 17:06:35 -0700101 if (verify_fmap(fmap))
Julius Wernercefe89e2019-11-06 19:29:44 -0800102 return;
103 report(fmap);
104
105register_cache:
Julius Wernerc8931972021-04-16 16:48:32 -0700106 rdev_chain_mem(cache_rdev, fmap, FMAP_SIZE);
Julius Wernercefe89e2019-11-06 19:29:44 -0800107}
108
Furquan Shaikhb33a2b02019-09-26 23:51:46 -0700109static int find_fmap_directory(struct region_device *fmrd)
Aaron Durbin0424c952015-03-28 23:56:22 -0500110{
111 const struct region_device *boot;
112 struct fmap *fmap;
Aaron Durbinbf1e4812016-05-10 15:12:08 -0500113 size_t offset = FMAP_OFFSET;
Aaron Durbin0424c952015-03-28 23:56:22 -0500114
Julius Wernercefe89e2019-11-06 19:29:44 -0800115 /* Try FMAP cache first */
Julius Wernerc8931972021-04-16 16:48:32 -0700116 if (!region_device_sz(&fmap_cache))
Arthur Heymansdba22d22019-11-20 19:57:49 +0100117 setup_preram_cache(&fmap_cache);
Julius Wernerc8931972021-04-16 16:48:32 -0700118 if (region_device_sz(&fmap_cache))
119 return rdev_chain_full(fmrd, &fmap_cache);
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200120
Aaron Durbin0424c952015-03-28 23:56:22 -0500121 boot_device_init();
122 boot = boot_device_ro();
123
124 if (boot == NULL)
125 return -1;
126
Julius Werner5bc5b1d2023-11-06 16:51:27 -0800127 fmap = rdev_mmap(boot, offset, FMAP_SIZE);
Aaron Durbin0424c952015-03-28 23:56:22 -0500128
129 if (fmap == NULL)
130 return -1;
131
Julius Wernerfdabf3f2020-05-06 17:06:35 -0700132 if (verify_fmap(fmap)) {
133 printk(BIOS_ERR, "FMAP missing or corrupted at offset 0x%zx!\n",
134 offset);
Aaron Durbin0424c952015-03-28 23:56:22 -0500135 rdev_munmap(boot, fmap);
136 return -1;
137 }
138
Julius Wernercefe89e2019-11-06 19:29:44 -0800139 report(fmap);
Aaron Durbin0424c952015-03-28 23:56:22 -0500140
141 rdev_munmap(boot, fmap);
142
Julius Wernercefe89e2019-11-06 19:29:44 -0800143 return rdev_chain(fmrd, boot, offset, FMAP_SIZE);
Aaron Durbin0424c952015-03-28 23:56:22 -0500144}
145
146int fmap_locate_area_as_rdev(const char *name, struct region_device *area)
147{
148 struct region ar;
149
150 if (fmap_locate_area(name, &ar))
151 return -1;
152
153 return boot_device_ro_subregion(&ar, area);
154}
155
Aaron Durbinbccaab82016-08-12 12:42:04 -0500156int fmap_locate_area_as_rdev_rw(const char *name, struct region_device *area)
157{
158 struct region ar;
159
160 if (fmap_locate_area(name, &ar))
161 return -1;
162
163 return boot_device_rw_subregion(&ar, area);
164}
165
Aaron Durbin0424c952015-03-28 23:56:22 -0500166int fmap_locate_area(const char *name, struct region *ar)
167{
168 struct region_device fmrd;
169 size_t offset;
170
Jakub Czapiga5446bdb2020-12-10 12:21:52 +0100171 if (name == NULL || ar == NULL)
172 return -1;
173
Aaron Durbin0424c952015-03-28 23:56:22 -0500174 if (find_fmap_directory(&fmrd))
175 return -1;
176
177 /* Start reading the areas just after fmap header. */
178 offset = sizeof(struct fmap);
179
180 while (1) {
181 struct fmap_area *area;
182
183 area = rdev_mmap(&fmrd, offset, sizeof(*area));
184
185 if (area == NULL)
186 return -1;
187
188 if (strcmp((const char *)area->name, name)) {
189 rdev_munmap(&fmrd, area);
190 offset += sizeof(struct fmap_area);
191 continue;
192 }
193
Duncan Lauriebc2c0a32016-02-09 09:17:56 -0800194 printk(BIOS_DEBUG, "FMAP: area %s found @ %x (%d bytes)\n",
Krystian Hebel93f6b8a2020-09-30 18:23:14 +0200195 name, le32toh(area->offset), le32toh(area->size));
Aaron Durbin0424c952015-03-28 23:56:22 -0500196
Krystian Hebel93f6b8a2020-09-30 18:23:14 +0200197 ar->offset = le32toh(area->offset);
198 ar->size = le32toh(area->size);
Aaron Durbin0424c952015-03-28 23:56:22 -0500199
200 rdev_munmap(&fmrd, area);
201
202 return 0;
203 }
204
205 printk(BIOS_DEBUG, "FMAP: area %s not found\n", name);
206
207 return -1;
208}
Patrick Georgi99526902015-07-09 11:27:44 +0200209
210int fmap_find_region_name(const struct region * const ar,
211 char name[FMAP_STRLEN])
212{
213 struct region_device fmrd;
214 size_t offset;
215
Jakub Czapiga5446bdb2020-12-10 12:21:52 +0100216 if (name == NULL || ar == NULL)
217 return -1;
218
Patrick Georgi99526902015-07-09 11:27:44 +0200219 if (find_fmap_directory(&fmrd))
220 return -1;
221
222 /* Start reading the areas just after fmap header. */
223 offset = sizeof(struct fmap);
224
225 while (1) {
226 struct fmap_area *area;
227
228 area = rdev_mmap(&fmrd, offset, sizeof(*area));
229
230 if (area == NULL)
231 return -1;
232
Krystian Hebel93f6b8a2020-09-30 18:23:14 +0200233 if ((ar->offset != le32toh(area->offset)) ||
234 (ar->size != le32toh(area->size))) {
Patrick Georgi99526902015-07-09 11:27:44 +0200235 rdev_munmap(&fmrd, area);
236 offset += sizeof(struct fmap_area);
237 continue;
238 }
239
240 printk(BIOS_DEBUG, "FMAP: area (%zx, %zx) found, named %s\n",
241 ar->offset, ar->size, area->name);
242
243 memcpy(name, area->name, FMAP_STRLEN);
244
245 rdev_munmap(&fmrd, area);
246
247 return 0;
248 }
249
250 printk(BIOS_DEBUG, "FMAP: area (%zx, %zx) not found\n",
251 ar->offset, ar->size);
252
253 return -1;
254}
T Michael Turney19fcc892019-03-20 14:37:34 -0700255
256ssize_t fmap_read_area(const char *name, void *buffer, size_t size)
257{
258 struct region_device rdev;
259 if (fmap_locate_area_as_rdev(name, &rdev))
260 return -1;
261 return rdev_readat(&rdev, buffer, 0,
262 MIN(size, region_device_sz(&rdev)));
263}
264
265ssize_t fmap_overwrite_area(const char *name, const void *buffer, size_t size)
266{
267 struct region_device rdev;
268
269 if (fmap_locate_area_as_rdev_rw(name, &rdev))
270 return -1;
271 if (size > region_device_sz(&rdev))
272 return -1;
273 if (rdev_eraseat(&rdev, 0, region_device_sz(&rdev)) < 0)
274 return -1;
275 return rdev_writeat(&rdev, buffer, 0, size);
276}
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200277
Kyösti Mälkki845f2322022-04-06 10:53:17 +0300278static void fmap_register_cbmem_cache(void)
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200279{
280 const struct cbmem_entry *e;
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200281
282 /* Find the FMAP cache installed by previous stage */
283 e = cbmem_entry_find(CBMEM_ID_FMAP);
284 /* Don't set fmap_cache so that find_fmap_directory will use regular path */
285 if (!e)
286 return;
287
Julius Wernerc8931972021-04-16 16:48:32 -0700288 rdev_chain_mem(&fmap_cache, cbmem_entry_start(e), cbmem_entry_size(e));
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200289}
290
291/*
292 * The main reason to copy the FMAP into CBMEM is to make it available to the
293 * OS on every architecture. As side effect use the CBMEM copy as cache.
294 */
Kyösti Mälkki845f2322022-04-06 10:53:17 +0300295static void fmap_add_cbmem_cache(void)
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200296{
297 struct region_device fmrd;
298
299 if (find_fmap_directory(&fmrd))
300 return;
301
302 /* Reloads the FMAP even on ACPI S3 resume */
303 const size_t s = region_device_sz(&fmrd);
304 struct fmap *fmap = cbmem_add(CBMEM_ID_FMAP, s);
305 if (!fmap) {
Julius Wernere9665952022-01-21 17:06:20 -0800306 printk(BIOS_ERR, "Failed to allocate CBMEM\n");
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200307 return;
308 }
309
310 const ssize_t ret = rdev_readat(&fmrd, fmap, 0, s);
311 if (ret != s) {
Julius Wernere9665952022-01-21 17:06:20 -0800312 printk(BIOS_ERR, "Failed to read FMAP into CBMEM\n");
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200313 cbmem_entry_remove(cbmem_entry_find(CBMEM_ID_FMAP));
314 return;
315 }
Kyösti Mälkki845f2322022-04-06 10:53:17 +0300316}
317
318static void fmap_setup_cbmem_cache(int unused)
319{
Kyösti Mälkkifa3bc042022-03-31 07:40:10 +0300320 if (ENV_CREATES_CBMEM)
Kyösti Mälkki845f2322022-04-06 10:53:17 +0300321 fmap_add_cbmem_cache();
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200322
323 /* Finally advertise the cache for the current stage */
Kyösti Mälkki845f2322022-04-06 10:53:17 +0300324 fmap_register_cbmem_cache();
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200325}
326
Kyösti Mälkkifa3bc042022-03-31 07:40:10 +0300327CBMEM_READY_HOOK(fmap_setup_cbmem_cache);