mirror of
https://github.com/Telecominfraproject/OpenCellular.git
synced 2026-01-07 16:11:43 +00:00
This just adds the kernel_max_rollforward field to the nvstorage
libraries and crossystem. The firmware does not use it yet; that's
coming in a subsequent CL.
16 of the fields's 32 bits are taken from unused bytes of the kernel
field. This has no effect on existing usage.
BUG=chromium:783997
BRANCH=none
TEST=make runtests
Also manual testing. In a root shell:
crossystem kernel_max_rollforward --> Should default to 0
crossystem kernel_max_rollforward=0xfffffffe
crossystem kernel_max_rollforward --> Should be 0xfffffffe
(Note that setting it to 0xffffffff is indistinguishable from the
-1 value that the crossystem library uses to indicate error, so
0xffffffff isn't actually usable as a max rollforward limit. But
0xfffffffe is, and if we ever get so close to the limit that we
need to use 0xffffffff, something has already gone horribly wrong
with our versioning strategy...)
Change-Id: I008f412e6ed3c0b59beb9881268585af69d1ff2e
Signed-off-by: Randall Spangler <rspangler@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/765572
Reviewed-by: Julius Werner <jwerner@chromium.org>
314 lines
11 KiB
C
314 lines
11 KiB
C
/* Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
|
|
* Use of this source code is governed by a BSD-style license that can be
|
|
* found in the LICENSE file.
|
|
*
|
|
* Chrome OS firmware/system interface utility
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#include "crossystem.h"
|
|
|
|
/*
|
|
* Call arch specific init, if provided, otherwise use the 'weak' stub.
|
|
*/
|
|
int __VbArchInit(void) { return 0; }
|
|
int VbArchInit(void) __attribute__((weak, alias("__VbArchInit")));
|
|
/* Flags for Param */
|
|
#define IS_STRING 0x01 /* String (not present = integer) */
|
|
#define CAN_WRITE 0x02 /* Writable (not present = read-only */
|
|
#define NO_PRINT_ALL 0x04 /* Don't print contents of parameter when
|
|
* doing a print-all */
|
|
|
|
typedef struct Param {
|
|
const char* name; /* Parameter name */
|
|
int flags; /* Flags (see above) */
|
|
const char* desc; /* Human-readable description */
|
|
const char* format; /* Format string, if non-NULL and 0==is_string*/
|
|
} Param;
|
|
|
|
/* List of parameters, terminated with a param with NULL name */
|
|
const Param sys_param_list[] = {
|
|
{"arch", IS_STRING, "Platform architecture"},
|
|
{"backup_nvram_request", CAN_WRITE,
|
|
"Backup the nvram somewhere at the next boot. Cleared on success."},
|
|
{"battery_cutoff_request", CAN_WRITE,
|
|
"Cut off battery and shutdown on next boot."},
|
|
{"block_devmode", CAN_WRITE, "Block all use of developer mode"},
|
|
{"clear_tpm_owner_request", CAN_WRITE, "Clear TPM owner on next boot"},
|
|
{"clear_tpm_owner_done", CAN_WRITE, "Clear TPM owner done"},
|
|
{"cros_debug", 0, "OS should allow debug features"},
|
|
{"dbg_reset", CAN_WRITE, "Debug reset mode request (writable)"},
|
|
{"debug_build", 0, "OS image built for debug features"},
|
|
{"dev_boot_usb", CAN_WRITE,
|
|
"Enable developer mode boot from USB/SD (writable)"},
|
|
{"dev_boot_legacy", CAN_WRITE,
|
|
"Enable developer mode boot Legacy OSes (writable)"},
|
|
{"dev_boot_signed_only", CAN_WRITE,
|
|
"Enable developer mode boot only from official kernels (writable)"},
|
|
{"dev_default_boot", IS_STRING|CAN_WRITE,
|
|
"default boot from legacy or usb (writable)"},
|
|
{"devsw_boot", 0, "Developer switch position at boot"},
|
|
{"devsw_cur", 0, "Developer switch current position"},
|
|
{"disable_dev_request", CAN_WRITE, "Disable virtual dev-mode on next boot"},
|
|
{"ecfw_act", IS_STRING, "Active EC firmware"},
|
|
{"fmap_base", 0, "Main firmware flashmap physical address", "0x%08x"},
|
|
{"fwb_tries", CAN_WRITE, "Try firmware B count (writable)"},
|
|
{"fw_vboot2", 0, "1 if firmware was selected by vboot2 or 0 otherwise"},
|
|
{"fwid", IS_STRING, "Active firmware ID"},
|
|
{"fwupdate_tries", CAN_WRITE,
|
|
"Times to try OS firmware update (writable, inside kern_nv)"},
|
|
{"fw_tried", IS_STRING, "Firmware tried this boot (vboot2)"},
|
|
{"fw_try_count", CAN_WRITE, "Number of times to try fw_try_next (writable)"},
|
|
{"fw_try_next", IS_STRING|CAN_WRITE,
|
|
"Firmware to try next (vboot2,writable)"},
|
|
{"fw_result", IS_STRING|CAN_WRITE,
|
|
"Firmware result this boot (vboot2,writable)"},
|
|
{"fw_prev_tried", IS_STRING, "Firmware tried on previous boot (vboot2)"},
|
|
{"fw_prev_result", IS_STRING, "Firmware result of previous boot (vboot2)"},
|
|
{"hwid", IS_STRING, "Hardware ID"},
|
|
{"inside_vm", 0, "Running in a VM?"},
|
|
{"kern_nv", 0, "Non-volatile field for kernel use", "0x%04x"},
|
|
{"kernel_max_rollforward", CAN_WRITE, "Max kernel version to store into TPM",
|
|
"0x%08x"},
|
|
{"kernkey_vfy", IS_STRING, "Type of verification done on kernel key block"},
|
|
{"loc_idx", CAN_WRITE, "Localization index for firmware screens (writable)"},
|
|
{"mainfw_act", IS_STRING, "Active main firmware"},
|
|
{"mainfw_type", IS_STRING, "Active main firmware type"},
|
|
{"nvram_cleared", CAN_WRITE, "Have NV settings been lost? Write 0 to clear"},
|
|
{"oprom_needed", CAN_WRITE, "Should we load the VGA Option ROM at boot?"},
|
|
{"phase_enforcement", 0,
|
|
"Board should have full security settings applied"},
|
|
{"recovery_reason", 0, "Recovery mode reason for current boot"},
|
|
{"recovery_request", CAN_WRITE, "Recovery mode request (writable)"},
|
|
{"recovery_subcode", CAN_WRITE, "Recovery reason subcode (writable)"},
|
|
{"recoverysw_boot", 0, "Recovery switch position at boot"},
|
|
{"recoverysw_cur", 0, "Recovery switch current position"},
|
|
{"recoverysw_ec_boot", 0, "Recovery switch position at EC boot"},
|
|
{"ro_fwid", IS_STRING, "Read-only firmware ID"},
|
|
{"tpm_attack", CAN_WRITE, "TPM was interrupted since this flag was cleared"},
|
|
{"tpm_fwver", 0, "Firmware version stored in TPM", "0x%08x"},
|
|
{"tpm_kernver", 0, "Kernel version stored in TPM", "0x%08x"},
|
|
{"tpm_rebooted", 0, "TPM requesting repeated reboot (vboot2)"},
|
|
{"try_ro_sync", 0, "try read only software sync"},
|
|
{"tried_fwb", 0, "Tried firmware B before A this boot"},
|
|
{"vdat_flags", 0, "Flags from VbSharedData", "0x%08x"},
|
|
{"vdat_lfdebug", IS_STRING|NO_PRINT_ALL,
|
|
"LoadFirmware() debug data (not in print-all)"},
|
|
{"vdat_lkdebug", IS_STRING|NO_PRINT_ALL,
|
|
"LoadKernel() debug data (not in print-all)"},
|
|
{"vdat_timers", IS_STRING, "Timer values from VbSharedData"},
|
|
{"wipeout_request", CAN_WRITE, "Firmware requested factory reset (wipeout)"},
|
|
{"wpsw_boot", 0, "Firmware write protect hardware switch position at boot"},
|
|
{"wpsw_cur", 0, "Firmware write protect hardware switch current position"},
|
|
/* Terminate with null name */
|
|
{NULL, 0, NULL}
|
|
};
|
|
|
|
|
|
/* Print help */
|
|
void PrintHelp(const char *progname) {
|
|
const Param *p;
|
|
|
|
printf("\nUsage:\n"
|
|
" %s [--all]\n"
|
|
" Prints all parameters with descriptions and current values.\n"
|
|
" If --all is specified, prints even normally hidden fields.\n"
|
|
" %s [param1 [param2 [...]]]\n"
|
|
" Prints the current value(s) of the parameter(s).\n"
|
|
" %s [param1=value1] [param2=value2 [...]]]\n"
|
|
" Sets the parameter(s) to the specified value(s).\n"
|
|
" %s [param1?value1] [param2?value2 [...]]]\n"
|
|
" Checks if the parameter(s) all contain the specified value(s).\n"
|
|
"Stops at the first error."
|
|
"\n"
|
|
"Valid parameters:\n", progname, progname, progname, progname);
|
|
for (p = sys_param_list; p->name; p++)
|
|
printf(" %-22s %s\n", p->name, p->desc);
|
|
}
|
|
|
|
|
|
/* Find the parameter in the list.
|
|
*
|
|
* Returns the parameter, or NULL if no match. */
|
|
const Param* FindParam(const char* name) {
|
|
const Param* p;
|
|
if (!name)
|
|
return NULL;
|
|
for (p = sys_param_list; p->name; p++) {
|
|
if (!strcasecmp(p->name, name))
|
|
return p;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
|
|
/* Set the specified parameter.
|
|
*
|
|
* Returns 0 if success, non-zero if error. */
|
|
int SetParam(const Param* p, const char* value) {
|
|
if (!(p->flags & CAN_WRITE))
|
|
return 1; /* Parameter is read-only */
|
|
|
|
if (p->flags & IS_STRING) {
|
|
return (0 == VbSetSystemPropertyString(p->name, value) ? 0 : 1);
|
|
} else {
|
|
char* e;
|
|
int i = (int)strtol(value, &e, 0);
|
|
if (!*value || (e && *e))
|
|
return 1;
|
|
return (0 == VbSetSystemPropertyInt(p->name, i) ? 0 : 1);
|
|
}
|
|
}
|
|
|
|
|
|
/* Compares the parameter with the expected value.
|
|
*
|
|
* Returns 0 if success (match), non-zero if error (mismatch). */
|
|
int CheckParam(const Param* p, char* expect) {
|
|
if (p->flags & IS_STRING) {
|
|
char buf[VB_MAX_STRING_PROPERTY];
|
|
const char* v = VbGetSystemPropertyString(p->name, buf, sizeof(buf));
|
|
if (!v || 0 != strcmp(v, expect))
|
|
return 1;
|
|
} else {
|
|
char* e;
|
|
int i = (int)strtol(expect, &e, 0);
|
|
int v = VbGetSystemPropertyInt(p->name);
|
|
if (!*expect || (e && *e))
|
|
return 1;
|
|
if (v == -1 || i != v)
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* Print the specified parameter.
|
|
*
|
|
* Returns 0 if success, non-zero if error. */
|
|
int PrintParam(const Param* p) {
|
|
if (p->flags & IS_STRING) {
|
|
char buf[VB_MAX_STRING_PROPERTY];
|
|
const char* v = VbGetSystemPropertyString(p->name, buf, sizeof(buf));
|
|
if (!v)
|
|
return 1;
|
|
printf("%s", v);
|
|
} else {
|
|
int v = VbGetSystemPropertyInt(p->name);
|
|
if (v == -1)
|
|
return 1;
|
|
printf(p->format ? p->format : "%d", v);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* Print all parameters with descriptions. If force_all!=0, prints even
|
|
* parameters that specify the NO_PRINT_ALL flag.
|
|
*
|
|
* Returns 0 if success, non-zero if error. */
|
|
int PrintAllParams(int force_all) {
|
|
const Param* p;
|
|
int retval = 0;
|
|
char buf[VB_MAX_STRING_PROPERTY];
|
|
const char* value;
|
|
|
|
for (p = sys_param_list; p->name; p++) {
|
|
if (0 == force_all && (p->flags & NO_PRINT_ALL))
|
|
continue;
|
|
if (p->flags & IS_STRING) {
|
|
value = VbGetSystemPropertyString(p->name, buf, sizeof(buf));
|
|
} else {
|
|
int v = VbGetSystemPropertyInt(p->name);
|
|
if (v == -1)
|
|
value = NULL;
|
|
else {
|
|
snprintf(buf, sizeof(buf), p->format ? p->format : "%d", v);
|
|
value = buf;
|
|
}
|
|
}
|
|
printf("%-22s = %-30s # %s\n",
|
|
p->name, (value ? value : "(error)"), p->desc);
|
|
}
|
|
return retval;
|
|
}
|
|
|
|
|
|
int main(int argc, char* argv[]) {
|
|
int retval = 0;
|
|
int i;
|
|
|
|
char* progname = strrchr(argv[0], '/');
|
|
if (progname)
|
|
progname++;
|
|
else
|
|
progname = argv[0];
|
|
|
|
if (VbArchInit()) {
|
|
fprintf(stderr, "Failed to initialize\n");
|
|
return -1;
|
|
}
|
|
|
|
/* If no args specified, print all params */
|
|
if (argc == 1)
|
|
return PrintAllParams(0);
|
|
/* --all or -a prints all params including normally hidden ones */
|
|
if (!strcasecmp(argv[1], "--all") || !strcmp(argv[1], "-a"))
|
|
return PrintAllParams(1);
|
|
|
|
/* Print help if needed */
|
|
if (!strcasecmp(argv[1], "-h") || !strcmp(argv[1], "-?") ||
|
|
!strcmp(argv[1], "--help")) {
|
|
PrintHelp(progname);
|
|
return 0;
|
|
}
|
|
|
|
/* Otherwise, loop through params and get/set them */
|
|
for (i = 1; i < argc && retval == 0; i++) {
|
|
char* has_set = strchr(argv[i], '=');
|
|
char* has_expect = strchr(argv[i], '?');
|
|
char* name = strtok(argv[i], "=?");
|
|
char* value = strtok(NULL, "=?");
|
|
const Param* p;
|
|
|
|
/* Make sure args are well-formed. '' or '=foo' or '?foo' not allowed. */
|
|
if (!name || has_set == argv[i] || has_expect == argv[i]) {
|
|
fprintf(stderr, "Poorly formed parameter\n");
|
|
PrintHelp(progname);
|
|
return 1;
|
|
}
|
|
if (!value)
|
|
value=""; /* Allow setting/checking an empty string ('foo=' or 'foo?') */
|
|
if (has_set && has_expect) {
|
|
fprintf(stderr, "Use either = or ? in a parameter, but not both.\n");
|
|
PrintHelp(progname);
|
|
return 1;
|
|
}
|
|
|
|
/* Find the parameter */
|
|
p = FindParam(name);
|
|
if (!p) {
|
|
fprintf(stderr, "Invalid parameter name: %s\n", name);
|
|
PrintHelp(progname);
|
|
return 1;
|
|
}
|
|
|
|
if (i > 1)
|
|
printf(" "); /* Output params space-delimited */
|
|
if (has_set) {
|
|
retval = SetParam(p, value);
|
|
if (retval) {
|
|
fprintf(stderr, "Parameter %s is read-only\n", name);
|
|
}
|
|
} else if (has_expect)
|
|
retval = CheckParam(p, value);
|
|
else
|
|
retval = PrintParam(p);
|
|
}
|
|
|
|
return retval;
|
|
}
|