mirror of
https://github.com/Telecominfraproject/OpenCellular.git
synced 2026-01-16 18:11:22 +00:00
This change adds a new NV and GBB flag for controlling USB device mode behavior, adding an additional step to enable UDC on systems that support it. Users of this feature will need to first enable developer mode and then enable UDC separately by running "crossystem dev_enable_udc=1". Alternatively those without write protect enabled can set a GBB flag to have UDC enabled by default while in developer mode. This is based on the security reviewed proposal at https://docs.google.com/document/d/1b6avd9xvhvljN_NKtctWrClj4mSYZ_uPmp7MmAnPwqs BUG=b:74339386 BRANCH=poppy TEST=manual testing on Eve device Change-Id: I6f440320f28b033639b53246d3034bc8acc37a33 Signed-off-by: Duncan Laurie <dlaurie@google.com> Reviewed-on: https://chromium-review.googlesource.com/1010769 Reviewed-by: Randall Spangler <rspangler@chromium.org> Reviewed-by: Furquan Shaikh <furquan@chromium.org>
315 lines
11 KiB
C
315 lines
11 KiB
C
/* Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
|
|
* Use of this source code is governed by a BSD-style license that can be
|
|
* found in the LICENSE file.
|
|
*
|
|
* Chrome OS firmware/system interface utility
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#include "crossystem.h"
|
|
|
|
/*
|
|
* Call arch specific init, if provided, otherwise use the 'weak' stub.
|
|
*/
|
|
int __VbArchInit(void) { return 0; }
|
|
int VbArchInit(void) __attribute__((weak, alias("__VbArchInit")));
|
|
/* Flags for Param */
|
|
#define IS_STRING 0x01 /* String (not present = integer) */
|
|
#define CAN_WRITE 0x02 /* Writable (not present = read-only */
|
|
#define NO_PRINT_ALL 0x04 /* Don't print contents of parameter when
|
|
* doing a print-all */
|
|
|
|
typedef struct Param {
|
|
const char* name; /* Parameter name */
|
|
int flags; /* Flags (see above) */
|
|
const char* desc; /* Human-readable description */
|
|
const char* format; /* Format string, if non-NULL and 0==is_string*/
|
|
} Param;
|
|
|
|
/* List of parameters, terminated with a param with NULL name */
|
|
const Param sys_param_list[] = {
|
|
{"arch", IS_STRING, "Platform architecture"},
|
|
{"backup_nvram_request", CAN_WRITE,
|
|
"Backup the nvram somewhere at the next boot. Cleared on success."},
|
|
{"battery_cutoff_request", CAN_WRITE,
|
|
"Cut off battery and shutdown on next boot."},
|
|
{"block_devmode", CAN_WRITE, "Block all use of developer mode"},
|
|
{"clear_tpm_owner_request", CAN_WRITE, "Clear TPM owner on next boot"},
|
|
{"clear_tpm_owner_done", CAN_WRITE, "Clear TPM owner done"},
|
|
{"cros_debug", 0, "OS should allow debug features"},
|
|
{"dbg_reset", CAN_WRITE, "Debug reset mode request (writable)"},
|
|
{"debug_build", 0, "OS image built for debug features"},
|
|
{"dev_boot_usb", CAN_WRITE,
|
|
"Enable developer mode boot from USB/SD (writable)"},
|
|
{"dev_boot_legacy", CAN_WRITE,
|
|
"Enable developer mode boot Legacy OSes (writable)"},
|
|
{"dev_boot_signed_only", CAN_WRITE,
|
|
"Enable developer mode boot only from official kernels (writable)"},
|
|
{"dev_default_boot", IS_STRING|CAN_WRITE,
|
|
"default boot from disk, legacy or usb (writable)"},
|
|
{"dev_enable_udc", CAN_WRITE, "Enable USB Device Controller"},
|
|
{"devsw_boot", 0, "Developer switch position at boot"},
|
|
{"devsw_cur", 0, "Developer switch current position"},
|
|
{"disable_dev_request", CAN_WRITE, "Disable virtual dev-mode on next boot"},
|
|
{"ecfw_act", IS_STRING, "Active EC firmware"},
|
|
{"fmap_base", 0, "Main firmware flashmap physical address", "0x%08x"},
|
|
{"fwb_tries", CAN_WRITE, "Try firmware B count (writable)"},
|
|
{"fw_vboot2", 0, "1 if firmware was selected by vboot2 or 0 otherwise"},
|
|
{"fwid", IS_STRING, "Active firmware ID"},
|
|
{"fwupdate_tries", CAN_WRITE,
|
|
"Times to try OS firmware update (writable, inside kern_nv)"},
|
|
{"fw_tried", IS_STRING, "Firmware tried this boot (vboot2)"},
|
|
{"fw_try_count", CAN_WRITE, "Number of times to try fw_try_next (writable)"},
|
|
{"fw_try_next", IS_STRING|CAN_WRITE,
|
|
"Firmware to try next (vboot2,writable)"},
|
|
{"fw_result", IS_STRING|CAN_WRITE,
|
|
"Firmware result this boot (vboot2,writable)"},
|
|
{"fw_prev_tried", IS_STRING, "Firmware tried on previous boot (vboot2)"},
|
|
{"fw_prev_result", IS_STRING, "Firmware result of previous boot (vboot2)"},
|
|
{"hwid", IS_STRING, "Hardware ID"},
|
|
{"inside_vm", 0, "Running in a VM?"},
|
|
{"kern_nv", 0, "Non-volatile field for kernel use", "0x%04x"},
|
|
{"kernel_max_rollforward", CAN_WRITE, "Max kernel version to store into TPM",
|
|
"0x%08x"},
|
|
{"kernkey_vfy", IS_STRING, "Type of verification done on kernel key block"},
|
|
{"loc_idx", CAN_WRITE, "Localization index for firmware screens (writable)"},
|
|
{"mainfw_act", IS_STRING, "Active main firmware"},
|
|
{"mainfw_type", IS_STRING, "Active main firmware type"},
|
|
{"nvram_cleared", CAN_WRITE, "Have NV settings been lost? Write 0 to clear"},
|
|
{"oprom_needed", CAN_WRITE, "Should we load the VGA Option ROM at boot?"},
|
|
{"phase_enforcement", 0,
|
|
"Board should have full security settings applied"},
|
|
{"recovery_reason", 0, "Recovery mode reason for current boot"},
|
|
{"recovery_request", CAN_WRITE, "Recovery mode request (writable)"},
|
|
{"recovery_subcode", CAN_WRITE, "Recovery reason subcode (writable)"},
|
|
{"recoverysw_boot", 0, "Recovery switch position at boot"},
|
|
{"recoverysw_cur", 0, "Recovery switch current position"},
|
|
{"recoverysw_ec_boot", 0, "Recovery switch position at EC boot"},
|
|
{"ro_fwid", IS_STRING, "Read-only firmware ID"},
|
|
{"tpm_attack", CAN_WRITE, "TPM was interrupted since this flag was cleared"},
|
|
{"tpm_fwver", 0, "Firmware version stored in TPM", "0x%08x"},
|
|
{"tpm_kernver", 0, "Kernel version stored in TPM", "0x%08x"},
|
|
{"tpm_rebooted", 0, "TPM requesting repeated reboot (vboot2)"},
|
|
{"try_ro_sync", 0, "try read only software sync"},
|
|
{"tried_fwb", 0, "Tried firmware B before A this boot"},
|
|
{"vdat_flags", 0, "Flags from VbSharedData", "0x%08x"},
|
|
{"vdat_lfdebug", IS_STRING|NO_PRINT_ALL,
|
|
"LoadFirmware() debug data (not in print-all)"},
|
|
{"vdat_lkdebug", IS_STRING|NO_PRINT_ALL,
|
|
"LoadKernel() debug data (not in print-all)"},
|
|
{"vdat_timers", IS_STRING, "Timer values from VbSharedData"},
|
|
{"wipeout_request", CAN_WRITE, "Firmware requested factory reset (wipeout)"},
|
|
{"wpsw_boot", 0, "Firmware write protect hardware switch position at boot"},
|
|
{"wpsw_cur", 0, "Firmware write protect hardware switch current position"},
|
|
/* Terminate with null name */
|
|
{NULL, 0, NULL}
|
|
};
|
|
|
|
|
|
/* Print help */
|
|
void PrintHelp(const char *progname) {
|
|
const Param *p;
|
|
|
|
printf("\nUsage:\n"
|
|
" %s [--all]\n"
|
|
" Prints all parameters with descriptions and current values.\n"
|
|
" If --all is specified, prints even normally hidden fields.\n"
|
|
" %s [param1 [param2 [...]]]\n"
|
|
" Prints the current value(s) of the parameter(s).\n"
|
|
" %s [param1=value1] [param2=value2 [...]]]\n"
|
|
" Sets the parameter(s) to the specified value(s).\n"
|
|
" %s [param1?value1] [param2?value2 [...]]]\n"
|
|
" Checks if the parameter(s) all contain the specified value(s).\n"
|
|
"Stops at the first error."
|
|
"\n"
|
|
"Valid parameters:\n", progname, progname, progname, progname);
|
|
for (p = sys_param_list; p->name; p++)
|
|
printf(" %-22s %s\n", p->name, p->desc);
|
|
}
|
|
|
|
|
|
/* Find the parameter in the list.
|
|
*
|
|
* Returns the parameter, or NULL if no match. */
|
|
const Param* FindParam(const char* name) {
|
|
const Param* p;
|
|
if (!name)
|
|
return NULL;
|
|
for (p = sys_param_list; p->name; p++) {
|
|
if (!strcasecmp(p->name, name))
|
|
return p;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
|
|
/* Set the specified parameter.
|
|
*
|
|
* Returns 0 if success, non-zero if error. */
|
|
int SetParam(const Param* p, const char* value) {
|
|
if (!(p->flags & CAN_WRITE))
|
|
return 1; /* Parameter is read-only */
|
|
|
|
if (p->flags & IS_STRING) {
|
|
return (0 == VbSetSystemPropertyString(p->name, value) ? 0 : 1);
|
|
} else {
|
|
char* e;
|
|
int i = (int)strtol(value, &e, 0);
|
|
if (!*value || (e && *e))
|
|
return 1;
|
|
return (0 == VbSetSystemPropertyInt(p->name, i) ? 0 : 1);
|
|
}
|
|
}
|
|
|
|
|
|
/* Compares the parameter with the expected value.
|
|
*
|
|
* Returns 0 if success (match), non-zero if error (mismatch). */
|
|
int CheckParam(const Param* p, char* expect) {
|
|
if (p->flags & IS_STRING) {
|
|
char buf[VB_MAX_STRING_PROPERTY];
|
|
const char* v = VbGetSystemPropertyString(p->name, buf, sizeof(buf));
|
|
if (!v || 0 != strcmp(v, expect))
|
|
return 1;
|
|
} else {
|
|
char* e;
|
|
int i = (int)strtol(expect, &e, 0);
|
|
int v = VbGetSystemPropertyInt(p->name);
|
|
if (!*expect || (e && *e))
|
|
return 1;
|
|
if (v == -1 || i != v)
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* Print the specified parameter.
|
|
*
|
|
* Returns 0 if success, non-zero if error. */
|
|
int PrintParam(const Param* p) {
|
|
if (p->flags & IS_STRING) {
|
|
char buf[VB_MAX_STRING_PROPERTY];
|
|
const char* v = VbGetSystemPropertyString(p->name, buf, sizeof(buf));
|
|
if (!v)
|
|
return 1;
|
|
printf("%s", v);
|
|
} else {
|
|
int v = VbGetSystemPropertyInt(p->name);
|
|
if (v == -1)
|
|
return 1;
|
|
printf(p->format ? p->format : "%d", v);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* Print all parameters with descriptions. If force_all!=0, prints even
|
|
* parameters that specify the NO_PRINT_ALL flag.
|
|
*
|
|
* Returns 0 if success, non-zero if error. */
|
|
int PrintAllParams(int force_all) {
|
|
const Param* p;
|
|
int retval = 0;
|
|
char buf[VB_MAX_STRING_PROPERTY];
|
|
const char* value;
|
|
|
|
for (p = sys_param_list; p->name; p++) {
|
|
if (0 == force_all && (p->flags & NO_PRINT_ALL))
|
|
continue;
|
|
if (p->flags & IS_STRING) {
|
|
value = VbGetSystemPropertyString(p->name, buf, sizeof(buf));
|
|
} else {
|
|
int v = VbGetSystemPropertyInt(p->name);
|
|
if (v == -1)
|
|
value = NULL;
|
|
else {
|
|
snprintf(buf, sizeof(buf), p->format ? p->format : "%d", v);
|
|
value = buf;
|
|
}
|
|
}
|
|
printf("%-22s = %-30s # %s\n",
|
|
p->name, (value ? value : "(error)"), p->desc);
|
|
}
|
|
return retval;
|
|
}
|
|
|
|
|
|
int main(int argc, char* argv[]) {
|
|
int retval = 0;
|
|
int i;
|
|
|
|
char* progname = strrchr(argv[0], '/');
|
|
if (progname)
|
|
progname++;
|
|
else
|
|
progname = argv[0];
|
|
|
|
if (VbArchInit()) {
|
|
fprintf(stderr, "Failed to initialize\n");
|
|
return -1;
|
|
}
|
|
|
|
/* If no args specified, print all params */
|
|
if (argc == 1)
|
|
return PrintAllParams(0);
|
|
/* --all or -a prints all params including normally hidden ones */
|
|
if (!strcasecmp(argv[1], "--all") || !strcmp(argv[1], "-a"))
|
|
return PrintAllParams(1);
|
|
|
|
/* Print help if needed */
|
|
if (!strcasecmp(argv[1], "-h") || !strcmp(argv[1], "-?") ||
|
|
!strcmp(argv[1], "--help")) {
|
|
PrintHelp(progname);
|
|
return 0;
|
|
}
|
|
|
|
/* Otherwise, loop through params and get/set them */
|
|
for (i = 1; i < argc && retval == 0; i++) {
|
|
char* has_set = strchr(argv[i], '=');
|
|
char* has_expect = strchr(argv[i], '?');
|
|
char* name = strtok(argv[i], "=?");
|
|
char* value = strtok(NULL, "=?");
|
|
const Param* p;
|
|
|
|
/* Make sure args are well-formed. '' or '=foo' or '?foo' not allowed. */
|
|
if (!name || has_set == argv[i] || has_expect == argv[i]) {
|
|
fprintf(stderr, "Poorly formed parameter\n");
|
|
PrintHelp(progname);
|
|
return 1;
|
|
}
|
|
if (!value)
|
|
value=""; /* Allow setting/checking an empty string ('foo=' or 'foo?') */
|
|
if (has_set && has_expect) {
|
|
fprintf(stderr, "Use either = or ? in a parameter, but not both.\n");
|
|
PrintHelp(progname);
|
|
return 1;
|
|
}
|
|
|
|
/* Find the parameter */
|
|
p = FindParam(name);
|
|
if (!p) {
|
|
fprintf(stderr, "Invalid parameter name: %s\n", name);
|
|
PrintHelp(progname);
|
|
return 1;
|
|
}
|
|
|
|
if (i > 1)
|
|
printf(" "); /* Output params space-delimited */
|
|
if (has_set) {
|
|
retval = SetParam(p, value);
|
|
if (retval) {
|
|
fprintf(stderr, "Parameter %s is read-only\n", name);
|
|
}
|
|
} else if (has_expect)
|
|
retval = CheckParam(p, value);
|
|
else
|
|
retval = PrintParam(p);
|
|
}
|
|
|
|
return retval;
|
|
}
|