blob: 251125522ee034ec79475ffd2ea9ce391c57d4f0 [file] [log] [blame]
Angel Pons118a9c72020-04-02 23:48:34 +02001/* SPDX-License-Identifier: GPL-2.0-only */
Aaron Durbin0424c952015-03-28 23:56:22 -05002
3#include <boot_device.h>
Julius Wernercefe89e2019-11-06 19:29:44 -08004#include <cbmem.h>
Aaron Durbin0424c952015-03-28 23:56:22 -05005#include <console/console.h>
6#include <fmap.h>
Julius Wernerfdabf3f2020-05-06 17:06:35 -07007#include <metadata_hash.h>
Aaron Durbin0424c952015-03-28 23:56:22 -05008#include <stddef.h>
9#include <string.h>
Julius Wernercefe89e2019-11-06 19:29:44 -080010#include <symbols.h>
Krystian Hebel93f6b8a2020-09-30 18:23:14 +020011#include <endian.h>
Aaron Durbin0424c952015-03-28 23:56:22 -050012
Aaron Durbinbf1e4812016-05-10 15:12:08 -050013#include "fmap_config.h"
14
Aaron Durbin0424c952015-03-28 23:56:22 -050015/*
16 * See http://code.google.com/p/flashmap/ for more information on FMAP.
17 */
18
Arthur Heymansdba22d22019-11-20 19:57:49 +010019static int fmap_print_once;
Julius Wernerc8931972021-04-16 16:48:32 -070020static struct region_device fmap_cache;
Duncan Lauriebc2c0a32016-02-09 09:17:56 -080021
Julius Wernercefe89e2019-11-06 19:29:44 -080022#define print_once(...) do { \
Arthur Heymansdba22d22019-11-20 19:57:49 +010023 if (!fmap_print_once) \
Julius Wernercefe89e2019-11-06 19:29:44 -080024 printk(__VA_ARGS__); \
25 } while (0)
26
Furquan Shaikhb33a2b02019-09-26 23:51:46 -070027uint64_t get_fmap_flash_offset(void)
28{
29 return FMAP_OFFSET;
30}
31
Julius Wernerfdabf3f2020-05-06 17:06:35 -070032static int verify_fmap(const struct fmap *fmap)
Julius Wernercefe89e2019-11-06 19:29:44 -080033{
Julius Wernerfdabf3f2020-05-06 17:06:35 -070034 if (memcmp(fmap->signature, FMAP_SIGNATURE, sizeof(fmap->signature)))
35 return -1;
36
37 static bool done = false;
38 if (!CONFIG(CBFS_VERIFICATION) || !ENV_INITIAL_STAGE || done)
39 return 0; /* Only need to check hash in first stage. */
40
41 if (metadata_hash_verify_fmap(fmap, FMAP_SIZE) != VB2_SUCCESS)
42 return -1;
43
44 done = true;
45 return 0;
Julius Wernercefe89e2019-11-06 19:29:44 -080046}
47
48static void report(const struct fmap *fmap)
49{
50 print_once(BIOS_DEBUG, "FMAP: Found \"%s\" version %d.%d at %#x.\n",
51 fmap->name, fmap->ver_major, fmap->ver_minor, FMAP_OFFSET);
52 print_once(BIOS_DEBUG, "FMAP: base = %#llx size = %#x #areas = %d\n",
Krystian Hebel93f6b8a2020-09-30 18:23:14 +020053 (long long)le64toh(fmap->base), le32toh(fmap->size),
54 le16toh(fmap->nareas));
Arthur Heymansdba22d22019-11-20 19:57:49 +010055 fmap_print_once = 1;
Julius Wernercefe89e2019-11-06 19:29:44 -080056}
57
Julius Wernerc8931972021-04-16 16:48:32 -070058static void setup_preram_cache(struct region_device *cache_rdev)
Julius Wernercefe89e2019-11-06 19:29:44 -080059{
Julius Werner7fc92862019-11-18 13:01:06 -080060 if (CONFIG(NO_FMAP_CACHE))
61 return;
62
Josie Nordrumc3cc1582020-09-09 12:57:13 -060063 /* No need to use FMAP cache in SMM */
64 if (ENV_SMM)
65 return;
66
Julius Wernercefe89e2019-11-06 19:29:44 -080067 if (!ENV_ROMSTAGE_OR_BEFORE) {
68 /* We get here if ramstage makes an FMAP access before calling
69 cbmem_initialize(). We should avoid letting it come to that,
70 so print a warning. */
71 print_once(BIOS_WARNING,
72 "WARNING: Post-RAM FMAP access too early for cache!\n");
73 return;
74 }
75
Julius Wernercefe89e2019-11-06 19:29:44 -080076 struct fmap *fmap = (struct fmap *)_fmap_cache;
Martin Roth1594e8f2020-07-15 13:57:54 -060077 if (!(ENV_INITIAL_STAGE)) {
78 /* NOTE: This assumes that the first stage will make
Julius Wernercefe89e2019-11-06 19:29:44 -080079 at least one FMAP access (usually from finding CBFS). */
Julius Wernerfdabf3f2020-05-06 17:06:35 -070080 if (!verify_fmap(fmap))
Julius Wernercefe89e2019-11-06 19:29:44 -080081 goto register_cache;
82
Julius Wernere9665952022-01-21 17:06:20 -080083 printk(BIOS_ERR, "FMAP cache corrupted?!\n");
Julius Wernerfdabf3f2020-05-06 17:06:35 -070084 if (CONFIG(TOCTOU_SAFETY))
85 die("TOCTOU safety relies on FMAP cache");
Julius Wernercefe89e2019-11-06 19:29:44 -080086 }
87
88 /* In case we fail below, make sure the cache is invalid. */
89 memset(fmap->signature, 0, sizeof(fmap->signature));
90
91 boot_device_init();
92 const struct region_device *boot_rdev = boot_device_ro();
93 if (!boot_rdev)
94 return;
95
96 /* memlayout statically guarantees that the FMAP_CACHE is big enough. */
97 if (rdev_readat(boot_rdev, fmap, FMAP_OFFSET, FMAP_SIZE) != FMAP_SIZE)
98 return;
Julius Wernerfdabf3f2020-05-06 17:06:35 -070099 if (verify_fmap(fmap))
Julius Wernercefe89e2019-11-06 19:29:44 -0800100 return;
101 report(fmap);
102
103register_cache:
Julius Wernerc8931972021-04-16 16:48:32 -0700104 rdev_chain_mem(cache_rdev, fmap, FMAP_SIZE);
Julius Wernercefe89e2019-11-06 19:29:44 -0800105}
106
Furquan Shaikhb33a2b02019-09-26 23:51:46 -0700107static int find_fmap_directory(struct region_device *fmrd)
Aaron Durbin0424c952015-03-28 23:56:22 -0500108{
109 const struct region_device *boot;
110 struct fmap *fmap;
Aaron Durbinbf1e4812016-05-10 15:12:08 -0500111 size_t offset = FMAP_OFFSET;
Aaron Durbin0424c952015-03-28 23:56:22 -0500112
Julius Wernercefe89e2019-11-06 19:29:44 -0800113 /* Try FMAP cache first */
Julius Wernerc8931972021-04-16 16:48:32 -0700114 if (!region_device_sz(&fmap_cache))
Arthur Heymansdba22d22019-11-20 19:57:49 +0100115 setup_preram_cache(&fmap_cache);
Julius Wernerc8931972021-04-16 16:48:32 -0700116 if (region_device_sz(&fmap_cache))
117 return rdev_chain_full(fmrd, &fmap_cache);
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200118
Aaron Durbin0424c952015-03-28 23:56:22 -0500119 boot_device_init();
120 boot = boot_device_ro();
121
122 if (boot == NULL)
123 return -1;
124
Julius Wernercefe89e2019-11-06 19:29:44 -0800125 fmap = rdev_mmap(boot, offset, sizeof(struct fmap));
Aaron Durbin0424c952015-03-28 23:56:22 -0500126
127 if (fmap == NULL)
128 return -1;
129
Julius Wernerfdabf3f2020-05-06 17:06:35 -0700130 if (verify_fmap(fmap)) {
131 printk(BIOS_ERR, "FMAP missing or corrupted at offset 0x%zx!\n",
132 offset);
Aaron Durbin0424c952015-03-28 23:56:22 -0500133 rdev_munmap(boot, fmap);
134 return -1;
135 }
136
Julius Wernercefe89e2019-11-06 19:29:44 -0800137 report(fmap);
Aaron Durbin0424c952015-03-28 23:56:22 -0500138
139 rdev_munmap(boot, fmap);
140
Julius Wernercefe89e2019-11-06 19:29:44 -0800141 return rdev_chain(fmrd, boot, offset, FMAP_SIZE);
Aaron Durbin0424c952015-03-28 23:56:22 -0500142}
143
144int fmap_locate_area_as_rdev(const char *name, struct region_device *area)
145{
146 struct region ar;
147
148 if (fmap_locate_area(name, &ar))
149 return -1;
150
151 return boot_device_ro_subregion(&ar, area);
152}
153
Aaron Durbinbccaab82016-08-12 12:42:04 -0500154int fmap_locate_area_as_rdev_rw(const char *name, struct region_device *area)
155{
156 struct region ar;
157
158 if (fmap_locate_area(name, &ar))
159 return -1;
160
161 return boot_device_rw_subregion(&ar, area);
162}
163
Aaron Durbin0424c952015-03-28 23:56:22 -0500164int fmap_locate_area(const char *name, struct region *ar)
165{
166 struct region_device fmrd;
167 size_t offset;
168
Jakub Czapiga5446bdb2020-12-10 12:21:52 +0100169 if (name == NULL || ar == NULL)
170 return -1;
171
Aaron Durbin0424c952015-03-28 23:56:22 -0500172 if (find_fmap_directory(&fmrd))
173 return -1;
174
175 /* Start reading the areas just after fmap header. */
176 offset = sizeof(struct fmap);
177
178 while (1) {
179 struct fmap_area *area;
180
181 area = rdev_mmap(&fmrd, offset, sizeof(*area));
182
183 if (area == NULL)
184 return -1;
185
186 if (strcmp((const char *)area->name, name)) {
187 rdev_munmap(&fmrd, area);
188 offset += sizeof(struct fmap_area);
189 continue;
190 }
191
Duncan Lauriebc2c0a32016-02-09 09:17:56 -0800192 printk(BIOS_DEBUG, "FMAP: area %s found @ %x (%d bytes)\n",
Krystian Hebel93f6b8a2020-09-30 18:23:14 +0200193 name, le32toh(area->offset), le32toh(area->size));
Aaron Durbin0424c952015-03-28 23:56:22 -0500194
Krystian Hebel93f6b8a2020-09-30 18:23:14 +0200195 ar->offset = le32toh(area->offset);
196 ar->size = le32toh(area->size);
Aaron Durbin0424c952015-03-28 23:56:22 -0500197
198 rdev_munmap(&fmrd, area);
199
200 return 0;
201 }
202
203 printk(BIOS_DEBUG, "FMAP: area %s not found\n", name);
204
205 return -1;
206}
Patrick Georgi99526902015-07-09 11:27:44 +0200207
208int fmap_find_region_name(const struct region * const ar,
209 char name[FMAP_STRLEN])
210{
211 struct region_device fmrd;
212 size_t offset;
213
Jakub Czapiga5446bdb2020-12-10 12:21:52 +0100214 if (name == NULL || ar == NULL)
215 return -1;
216
Patrick Georgi99526902015-07-09 11:27:44 +0200217 if (find_fmap_directory(&fmrd))
218 return -1;
219
220 /* Start reading the areas just after fmap header. */
221 offset = sizeof(struct fmap);
222
223 while (1) {
224 struct fmap_area *area;
225
226 area = rdev_mmap(&fmrd, offset, sizeof(*area));
227
228 if (area == NULL)
229 return -1;
230
Krystian Hebel93f6b8a2020-09-30 18:23:14 +0200231 if ((ar->offset != le32toh(area->offset)) ||
232 (ar->size != le32toh(area->size))) {
Patrick Georgi99526902015-07-09 11:27:44 +0200233 rdev_munmap(&fmrd, area);
234 offset += sizeof(struct fmap_area);
235 continue;
236 }
237
238 printk(BIOS_DEBUG, "FMAP: area (%zx, %zx) found, named %s\n",
239 ar->offset, ar->size, area->name);
240
241 memcpy(name, area->name, FMAP_STRLEN);
242
243 rdev_munmap(&fmrd, area);
244
245 return 0;
246 }
247
248 printk(BIOS_DEBUG, "FMAP: area (%zx, %zx) not found\n",
249 ar->offset, ar->size);
250
251 return -1;
252}
T Michael Turney19fcc892019-03-20 14:37:34 -0700253
254ssize_t fmap_read_area(const char *name, void *buffer, size_t size)
255{
256 struct region_device rdev;
257 if (fmap_locate_area_as_rdev(name, &rdev))
258 return -1;
259 return rdev_readat(&rdev, buffer, 0,
260 MIN(size, region_device_sz(&rdev)));
261}
262
263ssize_t fmap_overwrite_area(const char *name, const void *buffer, size_t size)
264{
265 struct region_device rdev;
266
267 if (fmap_locate_area_as_rdev_rw(name, &rdev))
268 return -1;
269 if (size > region_device_sz(&rdev))
270 return -1;
271 if (rdev_eraseat(&rdev, 0, region_device_sz(&rdev)) < 0)
272 return -1;
273 return rdev_writeat(&rdev, buffer, 0, size);
274}
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200275
Julius Wernercefe89e2019-11-06 19:29:44 -0800276static void fmap_register_cbmem_cache(int unused)
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200277{
278 const struct cbmem_entry *e;
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200279
280 /* Find the FMAP cache installed by previous stage */
281 e = cbmem_entry_find(CBMEM_ID_FMAP);
282 /* Don't set fmap_cache so that find_fmap_directory will use regular path */
283 if (!e)
284 return;
285
Julius Wernerc8931972021-04-16 16:48:32 -0700286 rdev_chain_mem(&fmap_cache, cbmem_entry_start(e), cbmem_entry_size(e));
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200287}
288
289/*
290 * The main reason to copy the FMAP into CBMEM is to make it available to the
291 * OS on every architecture. As side effect use the CBMEM copy as cache.
292 */
Julius Wernercefe89e2019-11-06 19:29:44 -0800293static void fmap_setup_cbmem_cache(int unused)
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200294{
295 struct region_device fmrd;
296
297 if (find_fmap_directory(&fmrd))
298 return;
299
300 /* Reloads the FMAP even on ACPI S3 resume */
301 const size_t s = region_device_sz(&fmrd);
302 struct fmap *fmap = cbmem_add(CBMEM_ID_FMAP, s);
303 if (!fmap) {
Julius Wernere9665952022-01-21 17:06:20 -0800304 printk(BIOS_ERR, "Failed to allocate CBMEM\n");
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200305 return;
306 }
307
308 const ssize_t ret = rdev_readat(&fmrd, fmap, 0, s);
309 if (ret != s) {
Julius Wernere9665952022-01-21 17:06:20 -0800310 printk(BIOS_ERR, "Failed to read FMAP into CBMEM\n");
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200311 cbmem_entry_remove(cbmem_entry_find(CBMEM_ID_FMAP));
312 return;
313 }
314
315 /* Finally advertise the cache for the current stage */
Julius Wernercefe89e2019-11-06 19:29:44 -0800316 fmap_register_cbmem_cache(unused);
Patrick Rudolph6d787c22019-09-12 13:21:37 +0200317}
318
Julius Wernercefe89e2019-11-06 19:29:44 -0800319ROMSTAGE_CBMEM_INIT_HOOK(fmap_setup_cbmem_cache)
320RAMSTAGE_CBMEM_INIT_HOOK(fmap_register_cbmem_cache)
321POSTCAR_CBMEM_INIT_HOOK(fmap_register_cbmem_cache)