blob: dd9e64a4e954e1eeb8a48e8f78c44a75e3a4edf9 [file] [log] [blame]
#include "config.h"
extern "C" {
#include "mbox.h"
#include "mboxd_msg.h"
};
#include "vpnor/mboxd_msg.hpp"
#include "vpnor/pnor_partition_table.hpp"
// clang-format off
const mboxd_mbox_handler vpnor_mbox_handlers[NUM_MBOX_CMDS] =
{
mbox_handle_reset,
mbox_handle_mbox_info,
mbox_handle_flash_info,
mbox_handle_read_window,
mbox_handle_close_window,
vpnor_handle_write_window,
mbox_handle_dirty_window,
mbox_handle_flush_window,
mbox_handle_ack,
mbox_handle_erase_window
};
// clang-format on
/* XXX: Maybe this should be a method on a class? */
static bool vpnor_partition_is_readonly(const pnor_partition& part)
{
return part.data.user.data[1] & PARTITION_READONLY;
}
int vpnor_handle_write_window(struct mbox_context* context,
union mbox_regs* req, struct mbox_msg* resp)
{
size_t offset = get_u16(&req->msg.args[0]);
offset <<= context->block_size_shift;
try
{
const pnor_partition& part = context->vpnor->table->partition(offset);
if (vpnor_partition_is_readonly(part))
{
return -MBOX_R_WINDOW_ERROR;
}
}
catch (const openpower::virtual_pnor::UnmappedOffset& e)
{
/*
* Writes to unmapped areas are not meaningful, so deny the request.
* This removes the ability for a compromised host to abuse unused
* space if any data was to be persisted (which it isn't).
*/
return -MBOX_R_WINDOW_ERROR;
}
/* Defer to the default handler */
return mbox_handle_write_window(context, req, resp);
}