mirror of
https://github.com/Telecominfraproject/OpenCellular.git
synced 2025-11-27 11:44:02 +00:00
The sw_wpsw_boot field only ever worked correctly on some platforms. It also isn't used anywhere in the codebase (only other reference is a comment about how it doesn't always work in factory_installer.sh), and it's no longer clear what it was meant for in the first place (b/35510092 hints at needing it for some planned feature that was never implemented). Let's get rid of it to avoid confusing people. If userspace tools need to know the software write-protect state, they can instead run flashrom directly. For feedback reports, this output is already included in the "verified boot" section. BRANCH=none BUG=chromium:508269,chromium:742685 TEST=none Change-Id: I8975b1e2c8e604b4cb48d092c13b923b4db2d207 Signed-off-by: Julius Werner <jwerner@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/575389 Reviewed-by: Hung-Te Lin <hungte@chromium.org> Reviewed-by: Aaron Durbin <adurbin@chromium.org> Reviewed-by: Randall Spangler <rspangler@chromium.org>
311 lines
10 KiB
C
311 lines
10 KiB
C
/* Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
|
|
* Use of this source code is governed by a BSD-style license that can be
|
|
* found in the LICENSE file.
|
|
*
|
|
* Chrome OS firmware/system interface utility
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#include "crossystem.h"
|
|
|
|
/*
|
|
* Call arch specific init, if provided, otherwise use the 'weak' stub.
|
|
*/
|
|
int __VbArchInit(void) { return 0; }
|
|
int VbArchInit(void) __attribute__((weak, alias("__VbArchInit")));
|
|
/* Flags for Param */
|
|
#define IS_STRING 0x01 /* String (not present = integer) */
|
|
#define CAN_WRITE 0x02 /* Writable (not present = read-only */
|
|
#define NO_PRINT_ALL 0x04 /* Don't print contents of parameter when
|
|
* doing a print-all */
|
|
|
|
typedef struct Param {
|
|
const char* name; /* Parameter name */
|
|
int flags; /* Flags (see above) */
|
|
const char* desc; /* Human-readable description */
|
|
const char* format; /* Format string, if non-NULL and 0==is_string*/
|
|
} Param;
|
|
|
|
/* List of parameters, terminated with a param with NULL name */
|
|
const Param sys_param_list[] = {
|
|
{"arch", IS_STRING, "Platform architecture"},
|
|
{"backup_nvram_request", CAN_WRITE,
|
|
"Backup the nvram somewhere at the next boot. Cleared on success."},
|
|
{"battery_cutoff_request", CAN_WRITE,
|
|
"Cut off battery and shutdown on next boot."},
|
|
{"block_devmode", CAN_WRITE, "Block all use of developer mode"},
|
|
{"clear_tpm_owner_request", CAN_WRITE, "Clear TPM owner on next boot"},
|
|
{"clear_tpm_owner_done", CAN_WRITE, "Clear TPM owner done"},
|
|
{"cros_debug", 0, "OS should allow debug features"},
|
|
{"dbg_reset", CAN_WRITE, "Debug reset mode request (writable)"},
|
|
{"debug_build", 0, "OS image built for debug features"},
|
|
{"dev_boot_usb", CAN_WRITE,
|
|
"Enable developer mode boot from USB/SD (writable)"},
|
|
{"dev_boot_legacy", CAN_WRITE,
|
|
"Enable developer mode boot Legacy OSes (writable)"},
|
|
{"dev_boot_signed_only", CAN_WRITE,
|
|
"Enable developer mode boot only from official kernels (writable)"},
|
|
{"dev_default_boot", IS_STRING|CAN_WRITE,
|
|
"default boot from legacy or usb (writable)"},
|
|
{"devsw_boot", 0, "Developer switch position at boot"},
|
|
{"devsw_cur", 0, "Developer switch current position"},
|
|
{"disable_dev_request", CAN_WRITE, "Disable virtual dev-mode on next boot"},
|
|
{"ecfw_act", IS_STRING, "Active EC firmware"},
|
|
{"fmap_base", 0, "Main firmware flashmap physical address", "0x%08x"},
|
|
{"fwb_tries", CAN_WRITE, "Try firmware B count (writable)"},
|
|
{"fw_vboot2", 0, "1 if firmware was selected by vboot2 or 0 otherwise"},
|
|
{"fwid", IS_STRING, "Active firmware ID"},
|
|
{"fwupdate_tries", CAN_WRITE,
|
|
"Times to try OS firmware update (writable, inside kern_nv)"},
|
|
{"fw_tried", IS_STRING, "Firmware tried this boot (vboot2)"},
|
|
{"fw_try_count", CAN_WRITE, "Number of times to try fw_try_next (writable)"},
|
|
{"fw_try_next", IS_STRING|CAN_WRITE,
|
|
"Firmware to try next (vboot2,writable)"},
|
|
{"fw_result", IS_STRING|CAN_WRITE,
|
|
"Firmware result this boot (vboot2,writable)"},
|
|
{"fw_prev_tried", IS_STRING, "Firmware tried on previous boot (vboot2)"},
|
|
{"fw_prev_result", IS_STRING, "Firmware result of previous boot (vboot2)"},
|
|
{"hwid", IS_STRING, "Hardware ID"},
|
|
{"inside_vm", 0, "Running in a VM?"},
|
|
{"kern_nv", 0, "Non-volatile field for kernel use", "0x%08x"},
|
|
{"kernkey_vfy", IS_STRING, "Type of verification done on kernel key block"},
|
|
{"loc_idx", CAN_WRITE, "Localization index for firmware screens (writable)"},
|
|
{"mainfw_act", IS_STRING, "Active main firmware"},
|
|
{"mainfw_type", IS_STRING, "Active main firmware type"},
|
|
{"nvram_cleared", CAN_WRITE, "Have NV settings been lost? Write 0 to clear"},
|
|
{"oprom_needed", CAN_WRITE, "Should we load the VGA Option ROM at boot?"},
|
|
{"phase_enforcement", 0,
|
|
"Board should have full security settings applied"},
|
|
{"recovery_reason", 0, "Recovery mode reason for current boot"},
|
|
{"recovery_request", CAN_WRITE, "Recovery mode request (writable)"},
|
|
{"recovery_subcode", CAN_WRITE, "Recovery reason subcode (writable)"},
|
|
{"recoverysw_boot", 0, "Recovery switch position at boot"},
|
|
{"recoverysw_cur", 0, "Recovery switch current position"},
|
|
{"recoverysw_ec_boot", 0, "Recovery switch position at EC boot"},
|
|
{"ro_fwid", IS_STRING, "Read-only firmware ID"},
|
|
{"tpm_attack", CAN_WRITE, "TPM was interrupted since this flag was cleared"},
|
|
{"tpm_fwver", 0, "Firmware version stored in TPM", "0x%08x"},
|
|
{"tpm_kernver", 0, "Kernel version stored in TPM", "0x%08x"},
|
|
{"tpm_rebooted", 0, "TPM requesting repeated reboot (vboot2)"},
|
|
{"try_ro_sync", 0, "try read only software sync"},
|
|
{"tried_fwb", 0, "Tried firmware B before A this boot"},
|
|
{"vdat_flags", 0, "Flags from VbSharedData", "0x%08x"},
|
|
{"vdat_lfdebug", IS_STRING|NO_PRINT_ALL,
|
|
"LoadFirmware() debug data (not in print-all)"},
|
|
{"vdat_lkdebug", IS_STRING|NO_PRINT_ALL,
|
|
"LoadKernel() debug data (not in print-all)"},
|
|
{"vdat_timers", IS_STRING, "Timer values from VbSharedData"},
|
|
{"wipeout_request", CAN_WRITE, "Firmware requested factory reset (wipeout)"},
|
|
{"wpsw_boot", 0, "Firmware write protect hardware switch position at boot"},
|
|
{"wpsw_cur", 0, "Firmware write protect hardware switch current position"},
|
|
/* Terminate with null name */
|
|
{NULL, 0, NULL}
|
|
};
|
|
|
|
|
|
/* Print help */
|
|
void PrintHelp(const char *progname) {
|
|
const Param *p;
|
|
|
|
printf("\nUsage:\n"
|
|
" %s [--all]\n"
|
|
" Prints all parameters with descriptions and current values.\n"
|
|
" If --all is specified, prints even normally hidden fields.\n"
|
|
" %s [param1 [param2 [...]]]\n"
|
|
" Prints the current value(s) of the parameter(s).\n"
|
|
" %s [param1=value1] [param2=value2 [...]]]\n"
|
|
" Sets the parameter(s) to the specified value(s).\n"
|
|
" %s [param1?value1] [param2?value2 [...]]]\n"
|
|
" Checks if the parameter(s) all contain the specified value(s).\n"
|
|
"Stops at the first error."
|
|
"\n"
|
|
"Valid parameters:\n", progname, progname, progname, progname);
|
|
for (p = sys_param_list; p->name; p++)
|
|
printf(" %-22s %s\n", p->name, p->desc);
|
|
}
|
|
|
|
|
|
/* Find the parameter in the list.
|
|
*
|
|
* Returns the parameter, or NULL if no match. */
|
|
const Param* FindParam(const char* name) {
|
|
const Param* p;
|
|
if (!name)
|
|
return NULL;
|
|
for (p = sys_param_list; p->name; p++) {
|
|
if (!strcasecmp(p->name, name))
|
|
return p;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
|
|
/* Set the specified parameter.
|
|
*
|
|
* Returns 0 if success, non-zero if error. */
|
|
int SetParam(const Param* p, const char* value) {
|
|
if (!(p->flags & CAN_WRITE))
|
|
return 1; /* Parameter is read-only */
|
|
|
|
if (p->flags & IS_STRING) {
|
|
return (0 == VbSetSystemPropertyString(p->name, value) ? 0 : 1);
|
|
} else {
|
|
char* e;
|
|
int i = (int)strtol(value, &e, 0);
|
|
if (!*value || (e && *e))
|
|
return 1;
|
|
return (0 == VbSetSystemPropertyInt(p->name, i) ? 0 : 1);
|
|
}
|
|
}
|
|
|
|
|
|
/* Compares the parameter with the expected value.
|
|
*
|
|
* Returns 0 if success (match), non-zero if error (mismatch). */
|
|
int CheckParam(const Param* p, char* expect) {
|
|
if (p->flags & IS_STRING) {
|
|
char buf[VB_MAX_STRING_PROPERTY];
|
|
const char* v = VbGetSystemPropertyString(p->name, buf, sizeof(buf));
|
|
if (!v || 0 != strcmp(v, expect))
|
|
return 1;
|
|
} else {
|
|
char* e;
|
|
int i = (int)strtol(expect, &e, 0);
|
|
int v = VbGetSystemPropertyInt(p->name);
|
|
if (!*expect || (e && *e))
|
|
return 1;
|
|
if (v == -1 || i != v)
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* Print the specified parameter.
|
|
*
|
|
* Returns 0 if success, non-zero if error. */
|
|
int PrintParam(const Param* p) {
|
|
if (p->flags & IS_STRING) {
|
|
char buf[VB_MAX_STRING_PROPERTY];
|
|
const char* v = VbGetSystemPropertyString(p->name, buf, sizeof(buf));
|
|
if (!v)
|
|
return 1;
|
|
printf("%s", v);
|
|
} else {
|
|
int v = VbGetSystemPropertyInt(p->name);
|
|
if (v == -1)
|
|
return 1;
|
|
printf(p->format ? p->format : "%d", v);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* Print all parameters with descriptions. If force_all!=0, prints even
|
|
* parameters that specify the NO_PRINT_ALL flag.
|
|
*
|
|
* Returns 0 if success, non-zero if error. */
|
|
int PrintAllParams(int force_all) {
|
|
const Param* p;
|
|
int retval = 0;
|
|
char buf[VB_MAX_STRING_PROPERTY];
|
|
const char* value;
|
|
|
|
for (p = sys_param_list; p->name; p++) {
|
|
if (0 == force_all && (p->flags & NO_PRINT_ALL))
|
|
continue;
|
|
if (p->flags & IS_STRING) {
|
|
value = VbGetSystemPropertyString(p->name, buf, sizeof(buf));
|
|
} else {
|
|
int v = VbGetSystemPropertyInt(p->name);
|
|
if (v == -1)
|
|
value = NULL;
|
|
else {
|
|
snprintf(buf, sizeof(buf), p->format ? p->format : "%d", v);
|
|
value = buf;
|
|
}
|
|
}
|
|
printf("%-22s = %-30s # %s\n",
|
|
p->name, (value ? value : "(error)"), p->desc);
|
|
}
|
|
return retval;
|
|
}
|
|
|
|
|
|
int main(int argc, char* argv[]) {
|
|
int retval = 0;
|
|
int i;
|
|
|
|
char* progname = strrchr(argv[0], '/');
|
|
if (progname)
|
|
progname++;
|
|
else
|
|
progname = argv[0];
|
|
|
|
if (VbArchInit()) {
|
|
fprintf(stderr, "Failed to initialize\n");
|
|
return -1;
|
|
}
|
|
|
|
/* If no args specified, print all params */
|
|
if (argc == 1)
|
|
return PrintAllParams(0);
|
|
/* --all or -a prints all params including normally hidden ones */
|
|
if (!strcasecmp(argv[1], "--all") || !strcmp(argv[1], "-a"))
|
|
return PrintAllParams(1);
|
|
|
|
/* Print help if needed */
|
|
if (!strcasecmp(argv[1], "-h") || !strcmp(argv[1], "-?")) {
|
|
PrintHelp(progname);
|
|
return 0;
|
|
}
|
|
|
|
/* Otherwise, loop through params and get/set them */
|
|
for (i = 1; i < argc && retval == 0; i++) {
|
|
char* has_set = strchr(argv[i], '=');
|
|
char* has_expect = strchr(argv[i], '?');
|
|
char* name = strtok(argv[i], "=?");
|
|
char* value = strtok(NULL, "=?");
|
|
const Param* p;
|
|
|
|
/* Make sure args are well-formed. '' or '=foo' or '?foo' not allowed. */
|
|
if (!name || has_set == argv[i] || has_expect == argv[i]) {
|
|
fprintf(stderr, "Poorly formed parameter\n");
|
|
PrintHelp(progname);
|
|
return 1;
|
|
}
|
|
if (!value)
|
|
value=""; /* Allow setting/checking an empty string ('foo=' or 'foo?') */
|
|
if (has_set && has_expect) {
|
|
fprintf(stderr, "Use either = or ? in a parameter, but not both.\n");
|
|
PrintHelp(progname);
|
|
return 1;
|
|
}
|
|
|
|
/* Find the parameter */
|
|
p = FindParam(name);
|
|
if (!p) {
|
|
fprintf(stderr, "Invalid parameter name: %s\n", name);
|
|
PrintHelp(progname);
|
|
return 1;
|
|
}
|
|
|
|
if (i > 1)
|
|
printf(" "); /* Output params space-delimited */
|
|
if (has_set) {
|
|
retval = SetParam(p, value);
|
|
if (retval) {
|
|
fprintf(stderr, "Parameter %s is read-only\n", name);
|
|
}
|
|
} else if (has_expect)
|
|
retval = CheckParam(p, value);
|
|
else
|
|
retval = PrintParam(p);
|
|
}
|
|
|
|
return retval;
|
|
}
|