diff options
-rw-r--r-- | src/ec/google/chromeec/Makefile.inc | 8 | ||||
-rw-r--r-- | src/ec/google/chromeec/ec.c | 21 | ||||
-rw-r--r-- | src/ec/google/chromeec/ec.h | 8 | ||||
-rw-r--r-- | src/ec/google/chromeec/vstore.c | 108 |
4 files changed, 141 insertions, 4 deletions
diff --git a/src/ec/google/chromeec/Makefile.inc b/src/ec/google/chromeec/Makefile.inc index 89d64ca9ca..59758ca87c 100644 --- a/src/ec/google/chromeec/Makefile.inc +++ b/src/ec/google/chromeec/Makefile.inc @@ -1,21 +1,21 @@ ifeq ($(CONFIG_EC_GOOGLE_CHROMEEC),y) -ramstage-y += ec.c crosec_proto.c +ramstage-y += ec.c crosec_proto.c vstore.c ramstage-$(CONFIG_EC_GOOGLE_CHROMEEC_I2C) += ec_i2c.c ramstage-$(CONFIG_EC_GOOGLE_CHROMEEC_LPC) += ec_lpc.c ramstage-$(CONFIG_EC_GOOGLE_CHROMEEC_MEC) += ec_mec.c ramstage-$(CONFIG_EC_GOOGLE_CHROMEEC_SPI) += ec_spi.c -smm-y += ec.c crosec_proto.c +smm-y += ec.c crosec_proto.c vstore.c smm-$(CONFIG_EC_GOOGLE_CHROMEEC_I2C) += ec_i2c.c smm-$(CONFIG_EC_GOOGLE_CHROMEEC_LPC) += ec_lpc.c smm-$(CONFIG_EC_GOOGLE_CHROMEEC_MEC) += ec_mec.c smm-$(CONFIG_EC_GOOGLE_CHROMEEC_SPI) += ec_spi.c -romstage-y += ec.c crosec_proto.c +romstage-y += ec.c crosec_proto.c vstore.c romstage-$(CONFIG_EC_GOOGLE_CHROMEEC_I2C) += ec_i2c.c romstage-$(CONFIG_EC_GOOGLE_CHROMEEC_LPC) += ec_lpc.c romstage-$(CONFIG_EC_GOOGLE_CHROMEEC_MEC) += ec_mec.c romstage-$(CONFIG_EC_GOOGLE_CHROMEEC_SPI) += ec_spi.c -verstage-y += ec.c crosec_proto.c +verstage-y += ec.c crosec_proto.c vstore.c verstage-$(CONFIG_EC_GOOGLE_CHROMEEC_I2C) += ec_i2c.c verstage-$(CONFIG_EC_GOOGLE_CHROMEEC_LPC) += ec_lpc.c verstage-$(CONFIG_EC_GOOGLE_CHROMEEC_MEC) += ec_mec.c diff --git a/src/ec/google/chromeec/ec.c b/src/ec/google/chromeec/ec.c index 5db387009e..87ab13acec 100644 --- a/src/ec/google/chromeec/ec.c +++ b/src/ec/google/chromeec/ec.c @@ -121,6 +121,27 @@ int google_chromeec_clear_events_b(u32 mask) EC_CMD_HOST_EVENT_CLEAR_B, mask); } +int google_chromeec_check_feature(int feature) +{ + struct chromeec_command cmd; + struct ec_response_get_features r; + + cmd.cmd_code = EC_CMD_GET_FEATURES; + cmd.cmd_version = 0; + cmd.cmd_size_in = 0; + cmd.cmd_data_out = &r; + cmd.cmd_size_out = sizeof(r); + cmd.cmd_dev_index = 0; + + if (google_chromeec_command(&cmd) != 0) + return -1; + + if (feature >= 8 * sizeof(r.flags)) + return -1; + + return r.flags[feature / 32] & EC_FEATURE_MASK_0(feature); +} + #ifndef __SMM__ #ifdef __PRE_RAM__ void google_chromeec_check_ec_image(int expected_type) diff --git a/src/ec/google/chromeec/ec.h b/src/ec/google/chromeec/ec.h index 6693b3c6d1..7f52362f2d 100644 --- a/src/ec/google/chromeec/ec.h +++ b/src/ec/google/chromeec/ec.h @@ -19,6 +19,7 @@ #define _EC_GOOGLE_CHROMEEC_EC_H #include <stddef.h> #include <stdint.h> +#include "ec_commands.h" #ifndef __PRE_RAM__ int google_chromeec_i2c_xfer(uint8_t chip, uint8_t addr, int alen, @@ -41,6 +42,7 @@ void google_chromeec_check_ec_image(int expected_type); void google_chromeec_check_pd_image(int expected_type); #endif +int google_chromeec_check_feature(int feature); uint8_t google_chromeec_calc_checksum(const uint8_t *data, int size); u16 google_chromeec_get_board_version(void); u32 google_chromeec_get_events_b(void); @@ -51,6 +53,12 @@ void google_chromeec_log_events(u32 mask); int google_chromeec_vbnv_context(int is_read, uint8_t *data, int len); uint8_t google_chromeec_get_switches(void); +/* Temporary secure storage commands */ +int google_chromeec_vstore_supported(void); +int google_chromeec_vstore_info(uint32_t *locked); +int google_chromeec_vstore_read(int slot, uint8_t *data); +int google_chromeec_vstore_write(int slot, uint8_t *data, size_t size); + /* For MEC, access ranges 0x800 thru 0x9ff using EMI interface instead of LPC */ #define MEC_EMI_RANGE_START EC_HOST_CMD_REGION0 #define MEC_EMI_RANGE_END (EC_LPC_ADDR_MEMMAP + EC_MEMMAP_SIZE) diff --git a/src/ec/google/chromeec/vstore.c b/src/ec/google/chromeec/vstore.c new file mode 100644 index 0000000000..fd0a7e7366 --- /dev/null +++ b/src/ec/google/chromeec/vstore.c @@ -0,0 +1,108 @@ +/* + * This file is part of the coreboot project. + * + * Copyright (C) 2015 Google Inc. + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; version 2 of the License + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + */ + + +#include <console/console.h> +#include <stdint.h> +#include <string.h> +#include <stdlib.h> +#include "ec.h" +#include "ec_commands.h" + +/* + * google_chromeec_vstore_supported - Check if vstore is supported + */ +int google_chromeec_vstore_supported(void) +{ + return google_chromeec_check_feature(EC_FEATURE_VSTORE); +} + +/* + * google_chromeec_vstore_info - Query EC for vstore information + * + * Returns the number of vstore slots supported by the EC, with the + * mask of locked slots saved into passed parameter if it is present. + */ +int google_chromeec_vstore_info(uint32_t *locked) +{ + struct ec_response_vstore_info info; + struct chromeec_command cmd = { + .cmd_code = EC_CMD_VSTORE_INFO, + .cmd_size_out = sizeof(info), + .cmd_data_out = &info, + }; + + if (google_chromeec_command(&cmd) != 0) + return 0; + + if (locked) + *locked = info.slot_locked; + return info.slot_count; +} + +/* + * google_chromeec_vstore_read - Read data from EC vstore slot + * + * @slot: vstore slot to read from + * @data: buffer to store read data, must be EC_VSTORE_SLOT_SIZE bytes + */ +int google_chromeec_vstore_read(int slot, uint8_t *data) +{ + struct ec_params_vstore_read req = { + .slot = slot, + }; + struct chromeec_command cmd = { + .cmd_code = EC_CMD_VSTORE_READ, + .cmd_size_in = sizeof(req), + .cmd_data_in = &req, + .cmd_size_out = EC_VSTORE_SLOT_SIZE, + .cmd_data_out = data, + }; + + if (!data || req.slot >= EC_VSTORE_SLOT_MAX) + return -1; + + return google_chromeec_command(&cmd); +} + +/* + * google_chromeec_vstore_write - Save data into EC vstore slot + * + * @slot: vstore slot to write into + * @data: data to write + * @size: size of data in bytes + * + * Maximum size of data is EC_VSTORE_SLOT_SIZE. It is the callers + * responsibility to check the number of implemented slots by + * querying the vstore info. + */ +int google_chromeec_vstore_write(int slot, uint8_t *data, size_t size) +{ + struct ec_params_vstore_write req = { + .slot = slot, + }; + struct chromeec_command cmd = { + .cmd_code = EC_CMD_VSTORE_WRITE, + .cmd_size_in = sizeof(req), + .cmd_data_in = &req, + }; + + if (req.slot >= EC_VSTORE_SLOT_MAX || size > EC_VSTORE_SLOT_SIZE) + return -1; + + memcpy(req.data, data, size); + + return google_chromeec_command(&cmd); +} |