blob: d3ff37019d6868fa6a89910373acca6607a475dc [file] [log] [blame]
Jacob Garber10999ea62020-05-18 13:36:58 -06001/* SPDX-License-Identifier: BSD-3-Clause */
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +08002
Jonathan Zhangb5392f92019-07-16 14:37:23 -07003#include <assert.h>
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +08004#include <console/console.h>
Hung-Te Linb15a0d02015-07-13 15:49:57 +08005#include <cbmem.h>
Nico Huberc00ffef2020-09-27 16:21:22 +02006#include <ctype.h>
Aaron Durbin0424c952015-03-28 23:56:22 -05007#include <fmap.h>
Julius Werner5f174582020-05-26 19:03:31 -07008#include <program_loading.h>
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +08009#include <string.h>
Julius Werner4f7a3612016-01-20 18:01:15 -080010#include <timestamp.h>
Nico Huberc00ffef2020-09-27 16:21:22 +020011#include <types.h>
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080012
Patrick Rudolph28cee592018-03-08 15:43:12 +010013#include "vpd.h"
Hung-Te Linc3455702019-05-27 11:02:00 +080014#include "vpd_decode.h"
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080015#include "vpd_tables.h"
16
Julius Werner5f174582020-05-26 19:03:31 -070017/* Currently we only support Google VPD 2.0, which has a fixed offset. */
18enum {
19 CROSVPD_CBMEM_MAGIC = 0x43524f53,
20 CROSVPD_CBMEM_VERSION = 0x0001,
21};
22
23struct vpd_cbmem {
24 uint32_t magic;
25 uint32_t version;
26 uint32_t ro_size;
27 uint32_t rw_size;
28 uint8_t blob[0];
29 /* The blob contains both RO and RW data. It starts with RO (0 ..
30 * ro_size) and then RW (ro_size .. ro_size+rw_size).
31 */
32};
33
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080034struct vpd_gets_arg {
35 const uint8_t *key;
36 const uint8_t *value;
37 int32_t key_len, value_len;
38 int matched;
39};
40
Julius Werner5f174582020-05-26 19:03:31 -070041static struct region_device ro_vpd, rw_vpd;
Hung-Te Linb15a0d02015-07-13 15:49:57 +080042
Jonathan Zhangb5392f92019-07-16 14:37:23 -070043/*
Julius Werner5f174582020-05-26 19:03:31 -070044 * Initializes a region_device to represent the requested VPD 2.0 formatted
45 * region on flash. On errors rdev->size will be set to 0.
Jonathan Zhangb5392f92019-07-16 14:37:23 -070046 */
Julius Werner5f174582020-05-26 19:03:31 -070047static void init_vpd_rdev(const char *fmap_name, struct region_device *rdev)
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080048{
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080049 struct google_vpd_info info;
Hung-Te Linb15a0d02015-07-13 15:49:57 +080050 int32_t size;
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080051
Julius Werner5f174582020-05-26 19:03:31 -070052 if (fmap_locate_area_as_rdev(fmap_name, rdev)) {
Hung-Te Linb15a0d02015-07-13 15:49:57 +080053 printk(BIOS_ERR, "%s: No %s FMAP section.\n", __func__,
54 fmap_name);
Julius Werner5f174582020-05-26 19:03:31 -070055 goto fail;
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080056 }
57
Julius Werner5f174582020-05-26 19:03:31 -070058 size = region_device_sz(rdev);
Aaron Durbin0424c952015-03-28 23:56:22 -050059
Hung-Te Linb15a0d02015-07-13 15:49:57 +080060 if ((size < GOOGLE_VPD_2_0_OFFSET + sizeof(info)) ||
Julius Werner5f174582020-05-26 19:03:31 -070061 rdev_chain(rdev, rdev, GOOGLE_VPD_2_0_OFFSET,
Hung-Te Linb15a0d02015-07-13 15:49:57 +080062 size - GOOGLE_VPD_2_0_OFFSET)) {
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080063 printk(BIOS_ERR, "%s: Too small (%d) for Google VPD 2.0.\n",
Hung-Te Linb15a0d02015-07-13 15:49:57 +080064 __func__, size);
Julius Werner5f174582020-05-26 19:03:31 -070065 goto fail;
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080066 }
67
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080068 /* Try if we can find a google_vpd_info, otherwise read whole VPD. */
Julius Werner5f174582020-05-26 19:03:31 -070069 if (rdev_readat(rdev, &info, 0, sizeof(info)) != sizeof(info)) {
Julius Wernerffc22602016-01-21 11:12:38 -080070 printk(BIOS_ERR, "ERROR: Failed to read %s header.\n",
71 fmap_name);
Julius Werner5f174582020-05-26 19:03:31 -070072 goto fail;
Julius Wernerffc22602016-01-21 11:12:38 -080073 }
74
75 if (memcmp(info.header.magic, VPD_INFO_MAGIC, sizeof(info.header.magic))
Julius Werner5f174582020-05-26 19:03:31 -070076 == 0) {
77 if (rdev_chain(rdev, rdev, sizeof(info), info.size)) {
78 printk(BIOS_ERR, "ERROR: %s info size too large.\n",
79 fmap_name);
80 goto fail;
81 }
Julius Wernerffc22602016-01-21 11:12:38 -080082 } else if (info.header.tlv.type == VPD_TYPE_TERMINATOR ||
83 info.header.tlv.type == VPD_TYPE_IMPLICIT_TERMINATOR) {
84 printk(BIOS_WARNING, "WARNING: %s is uninitialized or empty.\n",
85 fmap_name);
Julius Werner5f174582020-05-26 19:03:31 -070086 goto fail;
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +080087 }
88
Julius Werner5f174582020-05-26 19:03:31 -070089 return;
90
91fail:
92 memset(rdev, 0, sizeof(*rdev));
Hung-Te Linb15a0d02015-07-13 15:49:57 +080093}
94
Julius Werner5f174582020-05-26 19:03:31 -070095static int init_vpd_rdevs_from_cbmem(void)
Hung-Te Linb15a0d02015-07-13 15:49:57 +080096{
Julius Werner5f174582020-05-26 19:03:31 -070097 if (!cbmem_possibly_online())
98 return -1;
Jonathan Zhangb5392f92019-07-16 14:37:23 -070099
Julius Werner5f174582020-05-26 19:03:31 -0700100 struct vpd_cbmem *cbmem = cbmem_find(CBMEM_ID_VPD);
101 if (!cbmem)
102 return -1;
103
104 rdev_chain(&ro_vpd, &addrspace_32bit.rdev,
105 (uintptr_t)cbmem->blob, cbmem->ro_size);
106 rdev_chain(&rw_vpd, &addrspace_32bit.rdev,
107 (uintptr_t)cbmem->blob + cbmem->ro_size, cbmem->rw_size);
108
109 return 0;
110}
111
112static void init_vpd_rdevs(void)
113{
114 static bool done = false;
115
116 if (done)
Jonathan Zhangb5392f92019-07-16 14:37:23 -0700117 return;
118
Julius Werner5f174582020-05-26 19:03:31 -0700119 if (init_vpd_rdevs_from_cbmem() != 0) {
120 init_vpd_rdev("RO_VPD", &ro_vpd);
121 init_vpd_rdev("RW_VPD", &rw_vpd);
Hung-Te Linb15a0d02015-07-13 15:49:57 +0800122 }
Julius Werner5f174582020-05-26 19:03:31 -0700123
124 done = true;
Jonathan Zhangb5392f92019-07-16 14:37:23 -0700125}
126
Julius Werner5f174582020-05-26 19:03:31 -0700127static void cbmem_add_cros_vpd(int is_recovery)
Jonathan Zhangb5392f92019-07-16 14:37:23 -0700128{
Julius Werner5f174582020-05-26 19:03:31 -0700129 struct vpd_cbmem *cbmem;
Jonathan Zhangb5392f92019-07-16 14:37:23 -0700130
Julius Werner5f174582020-05-26 19:03:31 -0700131 timestamp_add_now(TS_START_COPYVPD);
132
133 init_vpd_rdevs();
134
135 /* Return if no VPD at all */
136 if (region_device_sz(&ro_vpd) == 0 && region_device_sz(&rw_vpd) == 0)
137 return;
138
139 size_t ro_size = region_device_sz(&ro_vpd);
140 size_t rw_size = region_device_sz(&rw_vpd);
141
142 cbmem = cbmem_add(CBMEM_ID_VPD, sizeof(*cbmem) + ro_size + rw_size);
143 if (!cbmem) {
144 printk(BIOS_ERR, "%s: Failed to allocate CBMEM (%zu+%zu).\n",
145 __func__, ro_size, rw_size);
146 return;
147 }
148
149 cbmem->magic = CROSVPD_CBMEM_MAGIC;
150 cbmem->version = CROSVPD_CBMEM_VERSION;
151 cbmem->ro_size = ro_size;
152 cbmem->rw_size = rw_size;
153
154 if (ro_size) {
155 if (rdev_readat(&ro_vpd, cbmem->blob, 0, ro_size) != ro_size) {
156 printk(BIOS_ERR, "ERROR: Couldn't read RO VPD\n");
157 cbmem->ro_size = ro_size = 0;
158 }
159 timestamp_add_now(TS_END_COPYVPD_RO);
160 }
161
162 if (rw_size) {
163 if (rdev_readat(&rw_vpd, cbmem->blob + ro_size, 0, rw_size)
164 != rw_size) {
165 printk(BIOS_ERR, "ERROR: Couldn't read RW VPD\n");
166 cbmem->rw_size = rw_size = 0;
167 }
168 timestamp_add_now(TS_END_COPYVPD_RW);
169 }
170
171 init_vpd_rdevs_from_cbmem();
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800172}
173
Hung-Te Linc3455702019-05-27 11:02:00 +0800174static int vpd_gets_callback(const uint8_t *key, uint32_t key_len,
175 const uint8_t *value, uint32_t value_len,
176 void *arg)
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800177{
178 struct vpd_gets_arg *result = (struct vpd_gets_arg *)arg;
179 if (key_len != result->key_len ||
180 memcmp(key, result->key, key_len) != 0)
Hung-Te Linc3455702019-05-27 11:02:00 +0800181 /* Returns VPD_DECODE_OK to continue parsing. */
182 return VPD_DECODE_OK;
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800183
184 result->matched = 1;
185 result->value = value;
186 result->value_len = value_len;
Hung-Te Linc3455702019-05-27 11:02:00 +0800187 /* Returns VPD_DECODE_FAIL to stop parsing. */
188 return VPD_DECODE_FAIL;
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800189}
190
Julius Werner5f174582020-05-26 19:03:31 -0700191static void vpd_find_in(struct region_device *rdev, struct vpd_gets_arg *arg)
192{
193 if (region_device_sz(rdev) == 0)
194 return;
195
196 uint32_t consumed = 0;
197 void *mapping = rdev_mmap_full(rdev);
198 while (vpd_decode_string(region_device_sz(rdev), mapping,
199 &consumed, vpd_gets_callback, arg) == VPD_DECODE_OK) {
200 /* Iterate until found or no more entries. */
201 }
202 rdev_munmap(rdev, mapping);
203}
204
Patrick Rudolph28cee592018-03-08 15:43:12 +0100205const void *vpd_find(const char *key, int *size, enum vpd_region region)
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800206{
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800207 struct vpd_gets_arg arg = {0};
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800208
209 arg.key = (const uint8_t *)key;
210 arg.key_len = strlen(key);
211
Julius Werner5f174582020-05-26 19:03:31 -0700212 init_vpd_rdevs();
Jonathan Zhangb5392f92019-07-16 14:37:23 -0700213
Jonathan Zhang9b110bf2020-05-28 13:35:44 -0700214 if (region == VPD_RW_THEN_RO)
215 vpd_find_in(&rw_vpd, &arg);
216
217 if (!arg.matched && (region == VPD_RO || region == VPD_RO_THEN_RW ||
218 region == VPD_RW_THEN_RO))
Julius Werner5f174582020-05-26 19:03:31 -0700219 vpd_find_in(&ro_vpd, &arg);
220
Jonathan Zhang9b110bf2020-05-28 13:35:44 -0700221 if (!arg.matched && (region == VPD_RW || region == VPD_RO_THEN_RW))
Julius Werner5f174582020-05-26 19:03:31 -0700222 vpd_find_in(&rw_vpd, &arg);
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800223
224 if (!arg.matched)
225 return NULL;
226
Vadim Bendebury127c3392014-10-22 17:39:24 -0700227 *size = arg.value_len;
228 return arg.value;
229}
230
Patrick Rudolph28cee592018-03-08 15:43:12 +0100231char *vpd_gets(const char *key, char *buffer, int size, enum vpd_region region)
Vadim Bendebury127c3392014-10-22 17:39:24 -0700232{
233 const void *string_address;
234 int string_size;
235
Patrick Rudolph28cee592018-03-08 15:43:12 +0100236 string_address = vpd_find(key, &string_size, region);
Vadim Bendebury127c3392014-10-22 17:39:24 -0700237
238 if (!string_address)
239 return NULL;
240
Jonathan Zhangb5392f92019-07-16 14:37:23 -0700241 assert(size > 0);
242 int copy_size = MIN(size - 1, string_size);
243 memcpy(buffer, string_address, copy_size);
244 buffer[copy_size] = '\0';
Hung-Te Lin6eaaafa2014-02-21 16:21:00 +0800245 return buffer;
246}
247
Jonathan Zhangb5392f92019-07-16 14:37:23 -0700248/*
249 * Find value of boolean type vpd key.
250 *
251 * During the process, necessary checking is done, such as making
252 * sure the value length is 1, and value is either '1' or '0'.
253 */
254bool vpd_get_bool(const char *key, enum vpd_region region, uint8_t *val)
255{
256 int size;
257 const char *value;
258
259 value = vpd_find(key, &size, region);
260 if (!value) {
261 printk(BIOS_CRIT, "problem returning from vpd_find.\n");
262 return false;
263 }
264
265 if (size != 1)
266 return false;
267
268 /* Make sure the value is either '1' or '0' */
269 if (*value == '1') {
270 *val = 1;
271 return true;
272 } else if (*value == '0') {
273 *val = 0;
274 return true;
275 } else
276 return false;
277}
Julius Werner5f174582020-05-26 19:03:31 -0700278
Nico Huberc00ffef2020-09-27 16:21:22 +0200279/*
280 * Find value of integer type by vpd key.
281 *
282 * Expects to find a decimal string, trailing chars are ignored.
283 * Returns true if the key is found and the value is not too long and
284 * starts with a decimal digit. Leaves `val` untouched if unsuccessful.
285 */
286bool vpd_get_int(const char *const key, const enum vpd_region region, int *const val)
287{
288 char value[11];
289
290 if (!vpd_gets(key, value, sizeof(value), region))
291 return false;
292
293 if (!isdigit(*value))
294 return false;
295
296 *val = (int)atol(value);
297 return true;
298}
299
Julius Werner5f174582020-05-26 19:03:31 -0700300ROMSTAGE_CBMEM_INIT_HOOK(cbmem_add_cros_vpd)