1*df93d90aSSimon Glass /* 2*df93d90aSSimon Glass * Chromium OS cros_ec driver - sandbox emulation 3*df93d90aSSimon Glass * 4*df93d90aSSimon Glass * Copyright (c) 2013 The Chromium OS Authors. 5*df93d90aSSimon Glass * 6*df93d90aSSimon Glass * SPDX-License-Identifier: GPL-2.0+ 7*df93d90aSSimon Glass */ 8*df93d90aSSimon Glass 9*df93d90aSSimon Glass #include <common.h> 10*df93d90aSSimon Glass #include <cros_ec.h> 11*df93d90aSSimon Glass #include <ec_commands.h> 12*df93d90aSSimon Glass #include <errno.h> 13*df93d90aSSimon Glass #include <hash.h> 14*df93d90aSSimon Glass #include <malloc.h> 15*df93d90aSSimon Glass #include <os.h> 16*df93d90aSSimon Glass #include <sha256.h> 17*df93d90aSSimon Glass #include <spi.h> 18*df93d90aSSimon Glass #include <asm/state.h> 19*df93d90aSSimon Glass #include <asm/sdl.h> 20*df93d90aSSimon Glass #include <linux/input.h> 21*df93d90aSSimon Glass 22*df93d90aSSimon Glass /* 23*df93d90aSSimon Glass * Ultimately it shold be possible to connect an Chrome OS EC emulation 24*df93d90aSSimon Glass * to U-Boot and remove all of this code. But this provides a test 25*df93d90aSSimon Glass * environment for bringing up chromeos_sandbox and demonstrating its 26*df93d90aSSimon Glass * utility. 27*df93d90aSSimon Glass * 28*df93d90aSSimon Glass * This emulation includes the following: 29*df93d90aSSimon Glass * 30*df93d90aSSimon Glass * 1. Emulation of the keyboard, by converting keypresses received from SDL 31*df93d90aSSimon Glass * into key scan data, passed back from the EC as key scan messages. The 32*df93d90aSSimon Glass * key layout is read from the device tree. 33*df93d90aSSimon Glass * 34*df93d90aSSimon Glass * 2. Emulation of vboot context - so this can be read/written as required. 35*df93d90aSSimon Glass * 36*df93d90aSSimon Glass * 3. Save/restore of EC state, so that the vboot context, flash memory 37*df93d90aSSimon Glass * contents and current image can be preserved across boots. This is important 38*df93d90aSSimon Glass * since the EC is supposed to continue running even if the AP resets. 39*df93d90aSSimon Glass * 40*df93d90aSSimon Glass * 4. Some event support, in particular allowing Escape to be pressed on boot 41*df93d90aSSimon Glass * to enter recovery mode. The EC passes this to U-Boot through the normal 42*df93d90aSSimon Glass * event message. 43*df93d90aSSimon Glass * 44*df93d90aSSimon Glass * 5. Flash read/write/erase support, so that software sync works. The 45*df93d90aSSimon Glass * protect messages are supported but no protection is implemented. 46*df93d90aSSimon Glass * 47*df93d90aSSimon Glass * 6. Hashing of the EC image, again to support software sync. 48*df93d90aSSimon Glass * 49*df93d90aSSimon Glass * Other features can be added, although a better path is probably to link 50*df93d90aSSimon Glass * the EC image in with U-Boot (Vic has demonstrated a prototype for this). 51*df93d90aSSimon Glass */ 52*df93d90aSSimon Glass 53*df93d90aSSimon Glass DECLARE_GLOBAL_DATA_PTR; 54*df93d90aSSimon Glass 55*df93d90aSSimon Glass #define KEYBOARD_ROWS 8 56*df93d90aSSimon Glass #define KEYBOARD_COLS 13 57*df93d90aSSimon Glass 58*df93d90aSSimon Glass /* A single entry of the key matrix */ 59*df93d90aSSimon Glass struct ec_keymatrix_entry { 60*df93d90aSSimon Glass int row; /* key matrix row */ 61*df93d90aSSimon Glass int col; /* key matrix column */ 62*df93d90aSSimon Glass int keycode; /* corresponding linux key code */ 63*df93d90aSSimon Glass }; 64*df93d90aSSimon Glass 65*df93d90aSSimon Glass /** 66*df93d90aSSimon Glass * struct ec_state - Information about the EC state 67*df93d90aSSimon Glass * 68*df93d90aSSimon Glass * @vbnv_context: Vboot context data stored by EC 69*df93d90aSSimon Glass * @ec_config: FDT config information about the EC (e.g. flashmap) 70*df93d90aSSimon Glass * @flash_data: Contents of flash memory 71*df93d90aSSimon Glass * @flash_data_len: Size of flash memory 72*df93d90aSSimon Glass * @current_image: Current image the EC is running 73*df93d90aSSimon Glass * @matrix_count: Number of keys to decode in matrix 74*df93d90aSSimon Glass * @matrix: Information about keyboard matrix 75*df93d90aSSimon Glass * @keyscan: Current keyscan information (bit set for each row/column pressed) 76*df93d90aSSimon Glass * @recovery_req: Keyboard recovery requested 77*df93d90aSSimon Glass */ 78*df93d90aSSimon Glass struct ec_state { 79*df93d90aSSimon Glass uint8_t vbnv_context[EC_VBNV_BLOCK_SIZE]; 80*df93d90aSSimon Glass struct fdt_cros_ec ec_config; 81*df93d90aSSimon Glass uint8_t *flash_data; 82*df93d90aSSimon Glass int flash_data_len; 83*df93d90aSSimon Glass enum ec_current_image current_image; 84*df93d90aSSimon Glass int matrix_count; 85*df93d90aSSimon Glass struct ec_keymatrix_entry *matrix; /* the key matrix info */ 86*df93d90aSSimon Glass uint8_t keyscan[KEYBOARD_COLS]; 87*df93d90aSSimon Glass bool recovery_req; 88*df93d90aSSimon Glass } s_state, *state; 89*df93d90aSSimon Glass 90*df93d90aSSimon Glass /** 91*df93d90aSSimon Glass * cros_ec_read_state() - read the sandbox EC state from the state file 92*df93d90aSSimon Glass * 93*df93d90aSSimon Glass * If data is available, then blob and node will provide access to it. If 94*df93d90aSSimon Glass * not this function sets up an empty EC. 95*df93d90aSSimon Glass * 96*df93d90aSSimon Glass * @param blob: Pointer to device tree blob, or NULL if no data to read 97*df93d90aSSimon Glass * @param node: Node offset to read from 98*df93d90aSSimon Glass */ 99*df93d90aSSimon Glass static int cros_ec_read_state(const void *blob, int node) 100*df93d90aSSimon Glass { 101*df93d90aSSimon Glass struct ec_state *ec = &s_state; 102*df93d90aSSimon Glass const char *prop; 103*df93d90aSSimon Glass int len; 104*df93d90aSSimon Glass 105*df93d90aSSimon Glass /* Set everything to defaults */ 106*df93d90aSSimon Glass ec->current_image = EC_IMAGE_RO; 107*df93d90aSSimon Glass if (!blob) 108*df93d90aSSimon Glass return 0; 109*df93d90aSSimon Glass 110*df93d90aSSimon Glass /* Read the data if available */ 111*df93d90aSSimon Glass ec->current_image = fdtdec_get_int(blob, node, "current-image", 112*df93d90aSSimon Glass EC_IMAGE_RO); 113*df93d90aSSimon Glass prop = fdt_getprop(blob, node, "vbnv-context", &len); 114*df93d90aSSimon Glass if (prop && len == sizeof(ec->vbnv_context)) 115*df93d90aSSimon Glass memcpy(ec->vbnv_context, prop, len); 116*df93d90aSSimon Glass 117*df93d90aSSimon Glass prop = fdt_getprop(blob, node, "flash-data", &len); 118*df93d90aSSimon Glass if (prop) { 119*df93d90aSSimon Glass ec->flash_data_len = len; 120*df93d90aSSimon Glass ec->flash_data = os_malloc(len); 121*df93d90aSSimon Glass if (!ec->flash_data) 122*df93d90aSSimon Glass return -ENOMEM; 123*df93d90aSSimon Glass memcpy(ec->flash_data, prop, len); 124*df93d90aSSimon Glass debug("%s: Loaded EC flash data size %#x\n", __func__, len); 125*df93d90aSSimon Glass } 126*df93d90aSSimon Glass 127*df93d90aSSimon Glass return 0; 128*df93d90aSSimon Glass } 129*df93d90aSSimon Glass 130*df93d90aSSimon Glass /** 131*df93d90aSSimon Glass * cros_ec_write_state() - Write out our state to the state file 132*df93d90aSSimon Glass * 133*df93d90aSSimon Glass * The caller will ensure that there is a node ready for the state. The node 134*df93d90aSSimon Glass * may already contain the old state, in which case it is overridden. 135*df93d90aSSimon Glass * 136*df93d90aSSimon Glass * @param blob: Device tree blob holding state 137*df93d90aSSimon Glass * @param node: Node to write our state into 138*df93d90aSSimon Glass */ 139*df93d90aSSimon Glass static int cros_ec_write_state(void *blob, int node) 140*df93d90aSSimon Glass { 141*df93d90aSSimon Glass struct ec_state *ec = &s_state; 142*df93d90aSSimon Glass 143*df93d90aSSimon Glass /* We are guaranteed enough space to write basic properties */ 144*df93d90aSSimon Glass fdt_setprop_u32(blob, node, "current-image", ec->current_image); 145*df93d90aSSimon Glass fdt_setprop(blob, node, "vbnv-context", ec->vbnv_context, 146*df93d90aSSimon Glass sizeof(ec->vbnv_context)); 147*df93d90aSSimon Glass return state_setprop(node, "flash-data", ec->flash_data, 148*df93d90aSSimon Glass ec->ec_config.flash.length); 149*df93d90aSSimon Glass } 150*df93d90aSSimon Glass 151*df93d90aSSimon Glass SANDBOX_STATE_IO(cros_ec, "google,cros-ec", cros_ec_read_state, 152*df93d90aSSimon Glass cros_ec_write_state); 153*df93d90aSSimon Glass 154*df93d90aSSimon Glass /** 155*df93d90aSSimon Glass * Return the number of bytes used in the specified image. 156*df93d90aSSimon Glass * 157*df93d90aSSimon Glass * This is the actual size of code+data in the image, as opposed to the 158*df93d90aSSimon Glass * amount of space reserved in flash for that image. This code is similar to 159*df93d90aSSimon Glass * that used by the real EC code base. 160*df93d90aSSimon Glass * 161*df93d90aSSimon Glass * @param ec Current emulated EC state 162*df93d90aSSimon Glass * @param entry Flash map entry containing the image to check 163*df93d90aSSimon Glass * @return actual image size in bytes, 0 if the image contains no content or 164*df93d90aSSimon Glass * error. 165*df93d90aSSimon Glass */ 166*df93d90aSSimon Glass static int get_image_used(struct ec_state *ec, struct fmap_entry *entry) 167*df93d90aSSimon Glass { 168*df93d90aSSimon Glass int size; 169*df93d90aSSimon Glass 170*df93d90aSSimon Glass /* 171*df93d90aSSimon Glass * Scan backwards looking for 0xea byte, which is by definition the 172*df93d90aSSimon Glass * last byte of the image. See ec.lds.S for how this is inserted at 173*df93d90aSSimon Glass * the end of the image. 174*df93d90aSSimon Glass */ 175*df93d90aSSimon Glass for (size = entry->length - 1; 176*df93d90aSSimon Glass size > 0 && ec->flash_data[entry->offset + size] != 0xea; 177*df93d90aSSimon Glass size--) 178*df93d90aSSimon Glass ; 179*df93d90aSSimon Glass 180*df93d90aSSimon Glass return size ? size + 1 : 0; /* 0xea byte IS part of the image */ 181*df93d90aSSimon Glass } 182*df93d90aSSimon Glass 183*df93d90aSSimon Glass /** 184*df93d90aSSimon Glass * Read the key matrix from the device tree 185*df93d90aSSimon Glass * 186*df93d90aSSimon Glass * Keymap entries in the fdt take the form of 0xRRCCKKKK where 187*df93d90aSSimon Glass * RR=Row CC=Column KKKK=Key Code 188*df93d90aSSimon Glass * 189*df93d90aSSimon Glass * @param ec Current emulated EC state 190*df93d90aSSimon Glass * @param blob Device tree blob containing keyscan information 191*df93d90aSSimon Glass * @param node Keyboard node of device tree containing keyscan information 192*df93d90aSSimon Glass * @return 0 if ok, -1 on error 193*df93d90aSSimon Glass */ 194*df93d90aSSimon Glass static int keyscan_read_fdt_matrix(struct ec_state *ec, const void *blob, 195*df93d90aSSimon Glass int node) 196*df93d90aSSimon Glass { 197*df93d90aSSimon Glass const u32 *cell; 198*df93d90aSSimon Glass int upto; 199*df93d90aSSimon Glass int len; 200*df93d90aSSimon Glass 201*df93d90aSSimon Glass cell = fdt_getprop(blob, node, "linux,keymap", &len); 202*df93d90aSSimon Glass ec->matrix_count = len / 4; 203*df93d90aSSimon Glass ec->matrix = calloc(ec->matrix_count, sizeof(*ec->matrix)); 204*df93d90aSSimon Glass if (!ec->matrix) { 205*df93d90aSSimon Glass debug("%s: Out of memory for key matrix\n", __func__); 206*df93d90aSSimon Glass return -1; 207*df93d90aSSimon Glass } 208*df93d90aSSimon Glass 209*df93d90aSSimon Glass /* Now read the data */ 210*df93d90aSSimon Glass for (upto = 0; upto < ec->matrix_count; upto++) { 211*df93d90aSSimon Glass struct ec_keymatrix_entry *matrix = &ec->matrix[upto]; 212*df93d90aSSimon Glass u32 word; 213*df93d90aSSimon Glass 214*df93d90aSSimon Glass word = fdt32_to_cpu(*cell++); 215*df93d90aSSimon Glass matrix->row = word >> 24; 216*df93d90aSSimon Glass matrix->col = (word >> 16) & 0xff; 217*df93d90aSSimon Glass matrix->keycode = word & 0xffff; 218*df93d90aSSimon Glass 219*df93d90aSSimon Glass /* Hard-code some sanity limits for now */ 220*df93d90aSSimon Glass if (matrix->row >= KEYBOARD_ROWS || 221*df93d90aSSimon Glass matrix->col >= KEYBOARD_COLS) { 222*df93d90aSSimon Glass debug("%s: Matrix pos out of range (%d,%d)\n", 223*df93d90aSSimon Glass __func__, matrix->row, matrix->col); 224*df93d90aSSimon Glass return -1; 225*df93d90aSSimon Glass } 226*df93d90aSSimon Glass } 227*df93d90aSSimon Glass 228*df93d90aSSimon Glass if (upto != ec->matrix_count) { 229*df93d90aSSimon Glass debug("%s: Read mismatch from key matrix\n", __func__); 230*df93d90aSSimon Glass return -1; 231*df93d90aSSimon Glass } 232*df93d90aSSimon Glass 233*df93d90aSSimon Glass return 0; 234*df93d90aSSimon Glass } 235*df93d90aSSimon Glass 236*df93d90aSSimon Glass /** 237*df93d90aSSimon Glass * Return the next keyscan message contents 238*df93d90aSSimon Glass * 239*df93d90aSSimon Glass * @param ec Current emulated EC state 240*df93d90aSSimon Glass * @param scan Place to put keyscan bytes for the keyscan message (must hold 241*df93d90aSSimon Glass * enough space for a full keyscan) 242*df93d90aSSimon Glass * @return number of bytes of valid scan data 243*df93d90aSSimon Glass */ 244*df93d90aSSimon Glass static int cros_ec_keyscan(struct ec_state *ec, uint8_t *scan) 245*df93d90aSSimon Glass { 246*df93d90aSSimon Glass const struct ec_keymatrix_entry *matrix; 247*df93d90aSSimon Glass int bytes = KEYBOARD_COLS; 248*df93d90aSSimon Glass int key[8]; /* allow up to 8 keys to be pressed at once */ 249*df93d90aSSimon Glass int count; 250*df93d90aSSimon Glass int i; 251*df93d90aSSimon Glass 252*df93d90aSSimon Glass memset(ec->keyscan, '\0', bytes); 253*df93d90aSSimon Glass count = sandbox_sdl_scan_keys(key, ARRAY_SIZE(key)); 254*df93d90aSSimon Glass 255*df93d90aSSimon Glass /* Look up keycode in matrix */ 256*df93d90aSSimon Glass for (i = 0, matrix = ec->matrix; i < ec->matrix_count; i++, matrix++) { 257*df93d90aSSimon Glass bool found; 258*df93d90aSSimon Glass int j; 259*df93d90aSSimon Glass 260*df93d90aSSimon Glass for (found = false, j = 0; j < count; j++) { 261*df93d90aSSimon Glass if (matrix->keycode == key[j]) 262*df93d90aSSimon Glass found = true; 263*df93d90aSSimon Glass } 264*df93d90aSSimon Glass 265*df93d90aSSimon Glass if (found) { 266*df93d90aSSimon Glass debug("%d: %d,%d\n", matrix->keycode, matrix->row, 267*df93d90aSSimon Glass matrix->col); 268*df93d90aSSimon Glass ec->keyscan[matrix->col] |= 1 << matrix->row; 269*df93d90aSSimon Glass } 270*df93d90aSSimon Glass } 271*df93d90aSSimon Glass 272*df93d90aSSimon Glass memcpy(scan, ec->keyscan, bytes); 273*df93d90aSSimon Glass return bytes; 274*df93d90aSSimon Glass } 275*df93d90aSSimon Glass 276*df93d90aSSimon Glass /** 277*df93d90aSSimon Glass * Process an emulated EC command 278*df93d90aSSimon Glass * 279*df93d90aSSimon Glass * @param ec Current emulated EC state 280*df93d90aSSimon Glass * @param req_hdr Pointer to request header 281*df93d90aSSimon Glass * @param req_data Pointer to body of request 282*df93d90aSSimon Glass * @param resp_hdr Pointer to place to put response header 283*df93d90aSSimon Glass * @param resp_data Pointer to place to put response data, if any 284*df93d90aSSimon Glass * @return length of response data, or 0 for no response data, or -1 on error 285*df93d90aSSimon Glass */ 286*df93d90aSSimon Glass static int process_cmd(struct ec_state *ec, 287*df93d90aSSimon Glass struct ec_host_request *req_hdr, const void *req_data, 288*df93d90aSSimon Glass struct ec_host_response *resp_hdr, void *resp_data) 289*df93d90aSSimon Glass { 290*df93d90aSSimon Glass int len; 291*df93d90aSSimon Glass 292*df93d90aSSimon Glass /* TODO(sjg@chromium.org): Check checksums */ 293*df93d90aSSimon Glass debug("EC command %#0x\n", req_hdr->command); 294*df93d90aSSimon Glass 295*df93d90aSSimon Glass switch (req_hdr->command) { 296*df93d90aSSimon Glass case EC_CMD_HELLO: { 297*df93d90aSSimon Glass const struct ec_params_hello *req = req_data; 298*df93d90aSSimon Glass struct ec_response_hello *resp = resp_data; 299*df93d90aSSimon Glass 300*df93d90aSSimon Glass resp->out_data = req->in_data + 0x01020304; 301*df93d90aSSimon Glass len = sizeof(*resp); 302*df93d90aSSimon Glass break; 303*df93d90aSSimon Glass } 304*df93d90aSSimon Glass case EC_CMD_GET_VERSION: { 305*df93d90aSSimon Glass struct ec_response_get_version *resp = resp_data; 306*df93d90aSSimon Glass 307*df93d90aSSimon Glass strcpy(resp->version_string_ro, "sandbox_ro"); 308*df93d90aSSimon Glass strcpy(resp->version_string_rw, "sandbox_rw"); 309*df93d90aSSimon Glass resp->current_image = ec->current_image; 310*df93d90aSSimon Glass debug("Current image %d\n", resp->current_image); 311*df93d90aSSimon Glass len = sizeof(*resp); 312*df93d90aSSimon Glass break; 313*df93d90aSSimon Glass } 314*df93d90aSSimon Glass case EC_CMD_VBNV_CONTEXT: { 315*df93d90aSSimon Glass const struct ec_params_vbnvcontext *req = req_data; 316*df93d90aSSimon Glass struct ec_response_vbnvcontext *resp = resp_data; 317*df93d90aSSimon Glass 318*df93d90aSSimon Glass switch (req->op) { 319*df93d90aSSimon Glass case EC_VBNV_CONTEXT_OP_READ: 320*df93d90aSSimon Glass memcpy(resp->block, ec->vbnv_context, 321*df93d90aSSimon Glass sizeof(resp->block)); 322*df93d90aSSimon Glass len = sizeof(*resp); 323*df93d90aSSimon Glass break; 324*df93d90aSSimon Glass case EC_VBNV_CONTEXT_OP_WRITE: 325*df93d90aSSimon Glass memcpy(ec->vbnv_context, resp->block, 326*df93d90aSSimon Glass sizeof(resp->block)); 327*df93d90aSSimon Glass len = 0; 328*df93d90aSSimon Glass break; 329*df93d90aSSimon Glass default: 330*df93d90aSSimon Glass printf(" ** Unknown vbnv_context command %#02x\n", 331*df93d90aSSimon Glass req->op); 332*df93d90aSSimon Glass return -1; 333*df93d90aSSimon Glass } 334*df93d90aSSimon Glass break; 335*df93d90aSSimon Glass } 336*df93d90aSSimon Glass case EC_CMD_REBOOT_EC: { 337*df93d90aSSimon Glass const struct ec_params_reboot_ec *req = req_data; 338*df93d90aSSimon Glass 339*df93d90aSSimon Glass printf("Request reboot type %d\n", req->cmd); 340*df93d90aSSimon Glass switch (req->cmd) { 341*df93d90aSSimon Glass case EC_REBOOT_DISABLE_JUMP: 342*df93d90aSSimon Glass len = 0; 343*df93d90aSSimon Glass break; 344*df93d90aSSimon Glass case EC_REBOOT_JUMP_RW: 345*df93d90aSSimon Glass ec->current_image = EC_IMAGE_RW; 346*df93d90aSSimon Glass len = 0; 347*df93d90aSSimon Glass break; 348*df93d90aSSimon Glass default: 349*df93d90aSSimon Glass puts(" ** Unknown type"); 350*df93d90aSSimon Glass return -1; 351*df93d90aSSimon Glass } 352*df93d90aSSimon Glass break; 353*df93d90aSSimon Glass } 354*df93d90aSSimon Glass case EC_CMD_HOST_EVENT_GET_B: { 355*df93d90aSSimon Glass struct ec_response_host_event_mask *resp = resp_data; 356*df93d90aSSimon Glass 357*df93d90aSSimon Glass resp->mask = 0; 358*df93d90aSSimon Glass if (ec->recovery_req) { 359*df93d90aSSimon Glass resp->mask |= EC_HOST_EVENT_MASK( 360*df93d90aSSimon Glass EC_HOST_EVENT_KEYBOARD_RECOVERY); 361*df93d90aSSimon Glass } 362*df93d90aSSimon Glass 363*df93d90aSSimon Glass len = sizeof(*resp); 364*df93d90aSSimon Glass break; 365*df93d90aSSimon Glass } 366*df93d90aSSimon Glass case EC_CMD_VBOOT_HASH: { 367*df93d90aSSimon Glass const struct ec_params_vboot_hash *req = req_data; 368*df93d90aSSimon Glass struct ec_response_vboot_hash *resp = resp_data; 369*df93d90aSSimon Glass struct fmap_entry *entry; 370*df93d90aSSimon Glass int ret, size; 371*df93d90aSSimon Glass 372*df93d90aSSimon Glass entry = &state->ec_config.region[EC_FLASH_REGION_RW]; 373*df93d90aSSimon Glass 374*df93d90aSSimon Glass switch (req->cmd) { 375*df93d90aSSimon Glass case EC_VBOOT_HASH_RECALC: 376*df93d90aSSimon Glass case EC_VBOOT_HASH_GET: 377*df93d90aSSimon Glass size = SHA256_SUM_LEN; 378*df93d90aSSimon Glass len = get_image_used(ec, entry); 379*df93d90aSSimon Glass ret = hash_block("sha256", 380*df93d90aSSimon Glass ec->flash_data + entry->offset, 381*df93d90aSSimon Glass len, resp->hash_digest, &size); 382*df93d90aSSimon Glass if (ret) { 383*df93d90aSSimon Glass printf(" ** hash_block() failed\n"); 384*df93d90aSSimon Glass return -1; 385*df93d90aSSimon Glass } 386*df93d90aSSimon Glass resp->status = EC_VBOOT_HASH_STATUS_DONE; 387*df93d90aSSimon Glass resp->hash_type = EC_VBOOT_HASH_TYPE_SHA256; 388*df93d90aSSimon Glass resp->digest_size = size; 389*df93d90aSSimon Glass resp->reserved0 = 0; 390*df93d90aSSimon Glass resp->offset = entry->offset; 391*df93d90aSSimon Glass resp->size = len; 392*df93d90aSSimon Glass len = sizeof(*resp); 393*df93d90aSSimon Glass break; 394*df93d90aSSimon Glass default: 395*df93d90aSSimon Glass printf(" ** EC_CMD_VBOOT_HASH: Unknown command %d\n", 396*df93d90aSSimon Glass req->cmd); 397*df93d90aSSimon Glass return -1; 398*df93d90aSSimon Glass } 399*df93d90aSSimon Glass break; 400*df93d90aSSimon Glass } 401*df93d90aSSimon Glass case EC_CMD_FLASH_PROTECT: { 402*df93d90aSSimon Glass const struct ec_params_flash_protect *req = req_data; 403*df93d90aSSimon Glass struct ec_response_flash_protect *resp = resp_data; 404*df93d90aSSimon Glass uint32_t expect = EC_FLASH_PROTECT_ALL_NOW | 405*df93d90aSSimon Glass EC_FLASH_PROTECT_ALL_AT_BOOT; 406*df93d90aSSimon Glass 407*df93d90aSSimon Glass printf("mask=%#x, flags=%#x\n", req->mask, req->flags); 408*df93d90aSSimon Glass if (req->flags == expect || req->flags == 0) { 409*df93d90aSSimon Glass resp->flags = req->flags ? EC_FLASH_PROTECT_ALL_NOW : 410*df93d90aSSimon Glass 0; 411*df93d90aSSimon Glass resp->valid_flags = EC_FLASH_PROTECT_ALL_NOW; 412*df93d90aSSimon Glass resp->writable_flags = 0; 413*df93d90aSSimon Glass len = sizeof(*resp); 414*df93d90aSSimon Glass } else { 415*df93d90aSSimon Glass puts(" ** unexpected flash protect request\n"); 416*df93d90aSSimon Glass return -1; 417*df93d90aSSimon Glass } 418*df93d90aSSimon Glass break; 419*df93d90aSSimon Glass } 420*df93d90aSSimon Glass case EC_CMD_FLASH_REGION_INFO: { 421*df93d90aSSimon Glass const struct ec_params_flash_region_info *req = req_data; 422*df93d90aSSimon Glass struct ec_response_flash_region_info *resp = resp_data; 423*df93d90aSSimon Glass struct fmap_entry *entry; 424*df93d90aSSimon Glass 425*df93d90aSSimon Glass switch (req->region) { 426*df93d90aSSimon Glass case EC_FLASH_REGION_RO: 427*df93d90aSSimon Glass case EC_FLASH_REGION_RW: 428*df93d90aSSimon Glass case EC_FLASH_REGION_WP_RO: 429*df93d90aSSimon Glass entry = &state->ec_config.region[req->region]; 430*df93d90aSSimon Glass resp->offset = entry->offset; 431*df93d90aSSimon Glass resp->size = entry->length; 432*df93d90aSSimon Glass len = sizeof(*resp); 433*df93d90aSSimon Glass printf("EC flash region %d: offset=%#x, size=%#x\n", 434*df93d90aSSimon Glass req->region, resp->offset, resp->size); 435*df93d90aSSimon Glass break; 436*df93d90aSSimon Glass default: 437*df93d90aSSimon Glass printf("** Unknown flash region %d\n", req->region); 438*df93d90aSSimon Glass return -1; 439*df93d90aSSimon Glass } 440*df93d90aSSimon Glass break; 441*df93d90aSSimon Glass } 442*df93d90aSSimon Glass case EC_CMD_FLASH_ERASE: { 443*df93d90aSSimon Glass const struct ec_params_flash_erase *req = req_data; 444*df93d90aSSimon Glass 445*df93d90aSSimon Glass memset(ec->flash_data + req->offset, 446*df93d90aSSimon Glass ec->ec_config.flash_erase_value, 447*df93d90aSSimon Glass req->size); 448*df93d90aSSimon Glass len = 0; 449*df93d90aSSimon Glass break; 450*df93d90aSSimon Glass } 451*df93d90aSSimon Glass case EC_CMD_FLASH_WRITE: { 452*df93d90aSSimon Glass const struct ec_params_flash_write *req = req_data; 453*df93d90aSSimon Glass 454*df93d90aSSimon Glass memcpy(ec->flash_data + req->offset, req + 1, req->size); 455*df93d90aSSimon Glass len = 0; 456*df93d90aSSimon Glass break; 457*df93d90aSSimon Glass } 458*df93d90aSSimon Glass case EC_CMD_MKBP_STATE: 459*df93d90aSSimon Glass len = cros_ec_keyscan(ec, resp_data); 460*df93d90aSSimon Glass break; 461*df93d90aSSimon Glass default: 462*df93d90aSSimon Glass printf(" ** Unknown EC command %#02x\n", req_hdr->command); 463*df93d90aSSimon Glass return -1; 464*df93d90aSSimon Glass } 465*df93d90aSSimon Glass 466*df93d90aSSimon Glass return len; 467*df93d90aSSimon Glass } 468*df93d90aSSimon Glass 469*df93d90aSSimon Glass int cros_ec_sandbox_packet(struct cros_ec_dev *dev, int out_bytes, 470*df93d90aSSimon Glass int in_bytes) 471*df93d90aSSimon Glass { 472*df93d90aSSimon Glass struct ec_host_request *req_hdr = (struct ec_host_request *)dev->dout; 473*df93d90aSSimon Glass const void *req_data = req_hdr + 1; 474*df93d90aSSimon Glass struct ec_host_response *resp_hdr = (struct ec_host_response *)dev->din; 475*df93d90aSSimon Glass void *resp_data = resp_hdr + 1; 476*df93d90aSSimon Glass int len; 477*df93d90aSSimon Glass 478*df93d90aSSimon Glass len = process_cmd(&s_state, req_hdr, req_data, resp_hdr, resp_data); 479*df93d90aSSimon Glass if (len < 0) 480*df93d90aSSimon Glass return len; 481*df93d90aSSimon Glass 482*df93d90aSSimon Glass resp_hdr->struct_version = 3; 483*df93d90aSSimon Glass resp_hdr->result = EC_RES_SUCCESS; 484*df93d90aSSimon Glass resp_hdr->data_len = len; 485*df93d90aSSimon Glass resp_hdr->reserved = 0; 486*df93d90aSSimon Glass len += sizeof(*resp_hdr); 487*df93d90aSSimon Glass resp_hdr->checksum = 0; 488*df93d90aSSimon Glass resp_hdr->checksum = (uint8_t) 489*df93d90aSSimon Glass -cros_ec_calc_checksum((const uint8_t *)resp_hdr, len); 490*df93d90aSSimon Glass 491*df93d90aSSimon Glass return in_bytes; 492*df93d90aSSimon Glass } 493*df93d90aSSimon Glass 494*df93d90aSSimon Glass int cros_ec_sandbox_decode_fdt(struct cros_ec_dev *dev, const void *blob) 495*df93d90aSSimon Glass { 496*df93d90aSSimon Glass return 0; 497*df93d90aSSimon Glass } 498*df93d90aSSimon Glass 499*df93d90aSSimon Glass void cros_ec_check_keyboard(struct cros_ec_dev *dev) 500*df93d90aSSimon Glass { 501*df93d90aSSimon Glass struct ec_state *ec = &s_state; 502*df93d90aSSimon Glass ulong start; 503*df93d90aSSimon Glass 504*df93d90aSSimon Glass printf("Press keys for EC to detect on reset (ESC=recovery)..."); 505*df93d90aSSimon Glass start = get_timer(0); 506*df93d90aSSimon Glass while (get_timer(start) < 1000) 507*df93d90aSSimon Glass ; 508*df93d90aSSimon Glass putc('\n'); 509*df93d90aSSimon Glass if (!sandbox_sdl_key_pressed(KEY_ESC)) { 510*df93d90aSSimon Glass ec->recovery_req = true; 511*df93d90aSSimon Glass printf(" - EC requests recovery\n"); 512*df93d90aSSimon Glass } 513*df93d90aSSimon Glass } 514*df93d90aSSimon Glass 515*df93d90aSSimon Glass /** 516*df93d90aSSimon Glass * Initialize sandbox EC emulation. 517*df93d90aSSimon Glass * 518*df93d90aSSimon Glass * @param dev CROS_EC device 519*df93d90aSSimon Glass * @param blob Device tree blob 520*df93d90aSSimon Glass * @return 0 if ok, -1 on error 521*df93d90aSSimon Glass */ 522*df93d90aSSimon Glass int cros_ec_sandbox_init(struct cros_ec_dev *dev, const void *blob) 523*df93d90aSSimon Glass { 524*df93d90aSSimon Glass struct ec_state *ec = &s_state; 525*df93d90aSSimon Glass int node; 526*df93d90aSSimon Glass int err; 527*df93d90aSSimon Glass 528*df93d90aSSimon Glass state = &s_state; 529*df93d90aSSimon Glass err = cros_ec_decode_ec_flash(blob, &ec->ec_config); 530*df93d90aSSimon Glass if (err) 531*df93d90aSSimon Glass return err; 532*df93d90aSSimon Glass 533*df93d90aSSimon Glass node = fdtdec_next_compatible(blob, 0, COMPAT_GOOGLE_CROS_EC_KEYB); 534*df93d90aSSimon Glass if (node < 0) { 535*df93d90aSSimon Glass debug("%s: No cros_ec keyboard found\n", __func__); 536*df93d90aSSimon Glass } else if (keyscan_read_fdt_matrix(ec, blob, node)) { 537*df93d90aSSimon Glass debug("%s: Could not read key matrix\n", __func__); 538*df93d90aSSimon Glass return -1; 539*df93d90aSSimon Glass } 540*df93d90aSSimon Glass 541*df93d90aSSimon Glass /* If we loaded EC data, check that the length matches */ 542*df93d90aSSimon Glass if (ec->flash_data && 543*df93d90aSSimon Glass ec->flash_data_len != ec->ec_config.flash.length) { 544*df93d90aSSimon Glass printf("EC data length is %x, expected %x, discarding data\n", 545*df93d90aSSimon Glass ec->flash_data_len, ec->ec_config.flash.length); 546*df93d90aSSimon Glass os_free(ec->flash_data); 547*df93d90aSSimon Glass ec->flash_data = NULL; 548*df93d90aSSimon Glass } 549*df93d90aSSimon Glass 550*df93d90aSSimon Glass /* Otherwise allocate the memory */ 551*df93d90aSSimon Glass if (!ec->flash_data) { 552*df93d90aSSimon Glass ec->flash_data_len = ec->ec_config.flash.length; 553*df93d90aSSimon Glass ec->flash_data = os_malloc(ec->flash_data_len); 554*df93d90aSSimon Glass if (!ec->flash_data) 555*df93d90aSSimon Glass return -ENOMEM; 556*df93d90aSSimon Glass } 557*df93d90aSSimon Glass 558*df93d90aSSimon Glass return 0; 559*df93d90aSSimon Glass } 560