blob: 0c49ec9b23f37fe341c74201ce99ca6d3ea3678a [file] [log] [blame]
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +02001/*
Biju Das50bfdc42020-12-13 20:28:45 +00002 * Copyright (c) 2015-2021, Renesas Electronics Corporation. All rights reserved.
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +02003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +02007#include <errno.h>
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +02008#include <stdint.h>
9#include <string.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000010
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +020011#include <arch_helpers.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000012#include <common/bl_common.h>
13#include <common/debug.h>
14#include <drivers/auth/auth_mod.h>
15#include <drivers/io/io_driver.h>
16#include <drivers/io/io_storage.h>
17#include <lib/mmio.h>
18#include <plat/common/platform.h>
19#include <tools_share/firmware_image_package.h>
20#include <tools_share/uuid.h>
21
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +020022#include "io_rcar.h"
23#include "io_common.h"
24#include "io_private.h"
Biju Das50bfdc42020-12-13 20:28:45 +000025#include <platform_def.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000026
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +020027extern int32_t plat_get_drv_source(uint32_t id, uintptr_t *dev,
28 uintptr_t *image_spec);
29
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +020030static int32_t rcar_dev_open(const uintptr_t dev_spec __attribute__ ((unused)),
31 io_dev_info_t **dev_info);
32static int32_t rcar_dev_close(io_dev_info_t *dev_info);
33
34typedef struct {
35 const int32_t name;
36 const uint32_t offset;
37 const uint32_t attr;
38} plat_rcar_name_offset_t;
39
40typedef struct {
Biju Das50bfdc42020-12-13 20:28:45 +000041 /*
42 * Put position above the struct to allow {0} on static init.
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +020043 * It is a workaround for a known bug in GCC
44 * http://gcc.gnu.org/bugzilla/show_bug.cgi?id=53119
45 */
46 uint32_t position;
47 uint32_t no_load;
48 uintptr_t offset;
49 uint32_t size;
50 uintptr_t dst;
51 uintptr_t partition; /* for eMMC */
52 /* RCAR_EMMC_PARTITION_BOOT_0 */
53 /* RCAR_EMMC_PARTITION_BOOT_1 */
54 /* RCAR_EMMC_PARTITION_USER */
55} file_state_t;
56
57#define RCAR_GET_FLASH_ADR(a, b) ((uint32_t)((0x40000U * (a)) + (b)))
58#define RCAR_ATTR_SET_CALCADDR(a) ((a) & 0xF)
59#define RCAR_ATTR_SET_ISNOLOAD(a) (((a) & 0x1) << 16U)
60#define RCAR_ATTR_SET_CERTOFF(a) (((a) & 0xF) << 8U)
61#define RCAR_ATTR_SET_ALL(a, b, c) ((uint32_t)(RCAR_ATTR_SET_CALCADDR(a) |\
Biju Das50bfdc42020-12-13 20:28:45 +000062 RCAR_ATTR_SET_ISNOLOAD(b) |\
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +020063 RCAR_ATTR_SET_CERTOFF(c)))
64
65#define RCAR_ATTR_GET_CALCADDR(a) ((a) & 0xFU)
66#define RCAR_ATTR_GET_ISNOLOAD(a) (((a) >> 16) & 0x1U)
67#define RCAR_ATTR_GET_CERTOFF(a) ((uint32_t)(((a) >> 8) & 0xFU))
68
69#define RCAR_MAX_BL3X_IMAGE (8U)
70#define RCAR_SECTOR6_CERT_OFFSET (0x400U)
71#define RCAR_SDRAM_certESS (0x43F00000U)
72#define RCAR_CERT_SIZE (0x800U)
73#define RCAR_CERT_INFO_SIZE_OFFSET (0x264U)
74#define RCAR_CERT_INFO_DST_OFFSET (0x154U)
75#define RCAR_CERT_INFO_SIZE_OFFSET1 (0x364U)
76#define RCAR_CERT_INFO_DST_OFFSET1 (0x1D4U)
77#define RCAR_CERT_INFO_SIZE_OFFSET2 (0x464U)
78#define RCAR_CERT_INFO_DST_OFFSET2 (0x254U)
79#define RCAR_CERT_LOAD (1U)
80
81#define RCAR_FLASH_CERT_HEADER RCAR_GET_FLASH_ADR(6U, 0U)
82#define RCAR_EMMC_CERT_HEADER (0x00030000U)
83
84#define RCAR_COUNT_LOAD_BL33 (2U)
85#define RCAR_COUNT_LOAD_BL33X (3U)
86
87static const plat_rcar_name_offset_t name_offset[] = {
88 {BL31_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(0, 0, 0)},
89
90 /* BL3-2 is optional in the platform */
91 {BL32_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(1, 0, 1)},
92 {BL33_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(2, 0, 2)},
93 {BL332_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(3, 0, 3)},
94 {BL333_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(4, 0, 4)},
95 {BL334_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(5, 0, 5)},
96 {BL335_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(6, 0, 6)},
97 {BL336_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(7, 0, 7)},
98 {BL337_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(8, 0, 8)},
99 {BL338_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(9, 0, 9)},
100};
101
102#if TRUSTED_BOARD_BOOT
103static const plat_rcar_name_offset_t cert_offset[] = {
104 /* Certificates */
105 {TRUSTED_KEY_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)},
106 {SOC_FW_KEY_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)},
107 {TRUSTED_OS_FW_KEY_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)},
108 {NON_TRUSTED_FW_KEY_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)},
109 {SOC_FW_CONTENT_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)},
110 {TRUSTED_OS_FW_CONTENT_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 1)},
111 {NON_TRUSTED_FW_CONTENT_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 2)},
112 {BL332_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 3)},
113 {BL333_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 4)},
114 {BL334_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 5)},
115 {BL335_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 6)},
116 {BL336_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 7)},
117 {BL337_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 8)},
118 {BL338_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 9)},
119};
120#endif /* TRUSTED_BOARD_BOOT */
121
122static file_state_t current_file = { 0 };
123
124static uintptr_t rcar_handle, rcar_spec;
125static uint64_t rcar_image_header[RCAR_MAX_BL3X_IMAGE + 2U] = { 0U };
126static uint64_t rcar_image_header_prttn[RCAR_MAX_BL3X_IMAGE + 2U] = { 0U };
127static uint64_t rcar_image_number = { 0U };
128static uint32_t rcar_cert_load = { 0U };
129
130static io_type_t device_type_rcar(void)
131{
132 return IO_TYPE_FIRMWARE_IMAGE_PACKAGE;
133}
134
135int32_t rcar_get_certificate(const int32_t name, uint32_t *cert)
136{
137#if TRUSTED_BOARD_BOOT
138 int32_t i;
Biju Das50bfdc42020-12-13 20:28:45 +0000139
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200140 for (i = 0; i < ARRAY_SIZE(cert_offset); i++) {
Biju Das50bfdc42020-12-13 20:28:45 +0000141 if (name != cert_offset[i].name) {
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200142 continue;
Biju Das50bfdc42020-12-13 20:28:45 +0000143 }
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200144
145 *cert = RCAR_CERT_SIZE;
146 *cert *= RCAR_ATTR_GET_CERTOFF(cert_offset[i].attr);
147 *cert += RCAR_SDRAM_certESS;
148 return 0;
149 }
150#endif
151 return -EINVAL;
152}
153
Marek Vasut62ae5422021-03-21 00:55:48 +0100154#define MFISBTSTSR (0xE6260604U)
155#define MFISBTSTSR_BOOT_PARTITION (0x00000010U)
156
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200157static int32_t file_to_offset(const int32_t name, uintptr_t *offset,
158 uint32_t *cert, uint32_t *no_load,
159 uintptr_t *partition)
160{
161 uint32_t addr;
162 int32_t i;
163
164 for (i = 0; i < ARRAY_SIZE(name_offset); i++) {
Biju Das50bfdc42020-12-13 20:28:45 +0000165 if (name != name_offset[i].name) {
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200166 continue;
Biju Das50bfdc42020-12-13 20:28:45 +0000167 }
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200168
169 addr = RCAR_ATTR_GET_CALCADDR(name_offset[i].attr);
Biju Das50bfdc42020-12-13 20:28:45 +0000170 if (rcar_image_number + 2U < addr) {
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200171 continue;
Biju Das50bfdc42020-12-13 20:28:45 +0000172 }
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200173
174 *offset = rcar_image_header[addr];
Marek Vasut62ae5422021-03-21 00:55:48 +0100175
176 if (mmio_read_32(MFISBTSTSR) & MFISBTSTSR_BOOT_PARTITION)
177 *offset += 0x800000;
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200178 *cert = RCAR_CERT_SIZE;
179 *cert *= RCAR_ATTR_GET_CERTOFF(name_offset[i].attr);
180 *cert += RCAR_SDRAM_certESS;
181 *no_load = RCAR_ATTR_GET_ISNOLOAD(name_offset[i].attr);
182 *partition = rcar_image_header_prttn[addr];
183 return IO_SUCCESS;
184 }
185
186#if TRUSTED_BOARD_BOOT
187 for (i = 0; i < ARRAY_SIZE(cert_offset); i++) {
Biju Das50bfdc42020-12-13 20:28:45 +0000188 if (name != cert_offset[i].name) {
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200189 continue;
Biju Das50bfdc42020-12-13 20:28:45 +0000190 }
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200191
192 *no_load = RCAR_ATTR_GET_ISNOLOAD(cert_offset[i].attr);
193 *partition = 0U;
194 *offset = 0U;
195 *cert = 0U;
196 return IO_SUCCESS;
197 }
198#endif
199 return -EINVAL;
200}
201
202#define RCAR_BOOT_KEY_CERT_NEW (0xE6300F00U)
203#define RCAR_CERT_MAGIC_NUM (0xE291F358U)
204
205void rcar_read_certificate(uint64_t cert, uint32_t *len, uintptr_t *dst)
206{
207 uint32_t seed, val, info_1, info_2;
208 uintptr_t size, dsth, dstl;
209
210 cert &= 0xFFFFFFFFU;
211
212 seed = mmio_read_32(RCAR_BOOT_KEY_CERT_NEW);
213 val = mmio_read_32(RCAR_BOOT_KEY_CERT_NEW + 0xC);
214 info_1 = (val >> 18) & 0x3U;
215 val = mmio_read_32(cert + 0xC);
216 info_2 = (val >> 21) & 0x3;
217
218 if (seed == RCAR_CERT_MAGIC_NUM) {
219 if (info_1 != 1) {
220 ERROR("BL2: Cert is invalid.\n");
221 *dst = 0;
222 *len = 0;
223 return;
224 }
225
226 if (info_2 > 2) {
227 ERROR("BL2: Cert is invalid.\n");
228 *dst = 0;
229 *len = 0;
230 return;
231 }
232
233 switch (info_2) {
234 case 2:
235 size = cert + RCAR_CERT_INFO_SIZE_OFFSET2;
236 dstl = cert + RCAR_CERT_INFO_DST_OFFSET2;
237 break;
238 case 1:
239 size = cert + RCAR_CERT_INFO_SIZE_OFFSET1;
240 dstl = cert + RCAR_CERT_INFO_DST_OFFSET1;
241 break;
242 case 0:
243 size = cert + RCAR_CERT_INFO_SIZE_OFFSET;
244 dstl = cert + RCAR_CERT_INFO_DST_OFFSET;
245 break;
246 }
Tobias Rist55351b92023-03-07 09:00:09 +0100247 val = mmio_read_32(size);
248 if (val > (UINT32_MAX / 4)) {
249 ERROR("BL2: %s[%d] uint32 overflow!\n",
250 __func__, __LINE__);
251 *dst = 0;
252 *len = 0;
253 return;
254 }
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200255
Tobias Rist55351b92023-03-07 09:00:09 +0100256 *len = val * 4U;
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200257 dsth = dstl + 4U;
258 *dst = ((uintptr_t) mmio_read_32(dsth) << 32) +
259 ((uintptr_t) mmio_read_32(dstl));
260 return;
261 }
262
263 size = cert + RCAR_CERT_INFO_SIZE_OFFSET;
Yoshifumi Hosoya12d1e632023-04-23 19:14:51 +0900264 val = mmio_read_32(size);
265 if (val > (UINT32_MAX / 4)) {
266 ERROR("BL2: %s[%d] uint32 overflow!\n", __func__, __LINE__);
267 *dst = 0;
268 *len = 0;
269 return;
270 }
271 *len = val * 4U;
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200272 dstl = cert + RCAR_CERT_INFO_DST_OFFSET;
273 dsth = dstl + 4U;
274 *dst = ((uintptr_t) mmio_read_32(dsth) << 32) +
275 ((uintptr_t) mmio_read_32(dstl));
276}
277
278static int32_t check_load_area(uintptr_t dst, uintptr_t len)
279{
280 uint32_t legacy = dst + len <= UINT32_MAX - 1 ? 1 : 0;
281 uintptr_t dram_start, dram_end;
282 uintptr_t prot_start, prot_end;
283 int32_t result = IO_SUCCESS;
284
285 dram_start = legacy ? DRAM1_BASE : DRAM_40BIT_BASE;
286
287 dram_end = legacy ? DRAM1_BASE + DRAM1_SIZE :
288 DRAM_40BIT_BASE + DRAM_40BIT_SIZE;
289
290 prot_start = legacy ? DRAM_PROTECTED_BASE : DRAM_40BIT_PROTECTED_BASE;
291
292 prot_end = prot_start + DRAM_PROTECTED_SIZE;
293
Tobias Ristae508be2023-03-07 09:40:37 +0100294 if (dst < dram_start || len > dram_end || dst > dram_end - len) {
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200295 ERROR("BL2: dst address is on the protected area.\n");
296 result = IO_FAIL;
297 goto done;
298 }
299
300 /* load image is within SDRAM protected area */
301 if (dst >= prot_start && dst < prot_end) {
302 ERROR("BL2: dst address is on the protected area.\n");
303 result = IO_FAIL;
304 }
305
Tobias Ristae508be2023-03-07 09:40:37 +0100306 if (len > prot_start || (dst < prot_start && dst > prot_start - len)) {
307 ERROR("BL2: %s[%d] loaded data is on the protected area.\n",
308 __func__, __LINE__);
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200309 result = IO_FAIL;
310 }
311done:
Biju Das50bfdc42020-12-13 20:28:45 +0000312 if (result == IO_FAIL) {
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200313 ERROR("BL2: Out of range : dst=0x%lx len=0x%lx\n", dst, len);
Biju Das50bfdc42020-12-13 20:28:45 +0000314 }
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200315
316 return result;
317}
318
319static int32_t load_bl33x(void)
320{
321 static int32_t loaded = IO_NOT_SUPPORTED;
322 uintptr_t dst, partition, handle;
323 uint32_t noload, cert, len, i;
324 uintptr_t offset;
325 int32_t rc;
326 size_t cnt;
327 const int32_t img[] = {
328 BL33_IMAGE_ID,
329 BL332_IMAGE_ID,
330 BL333_IMAGE_ID,
331 BL334_IMAGE_ID,
332 BL335_IMAGE_ID,
333 BL336_IMAGE_ID,
334 BL337_IMAGE_ID,
335 BL338_IMAGE_ID
336 };
337
Biju Das50bfdc42020-12-13 20:28:45 +0000338 if (loaded != IO_NOT_SUPPORTED) {
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200339 return loaded;
Biju Das50bfdc42020-12-13 20:28:45 +0000340 }
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200341
342 for (i = 1; i < rcar_image_number; i++) {
343 rc = file_to_offset(img[i], &offset, &cert, &noload,
344 &partition);
345 if (rc != IO_SUCCESS) {
Biju Das50bfdc42020-12-13 20:28:45 +0000346 WARN("%s: failed to get offset\n", __func__);
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200347 loaded = IO_FAIL;
348 return loaded;
349 }
350
351 rcar_read_certificate((uint64_t) cert, &len, &dst);
352 ((io_drv_spec_t *) rcar_spec)->partition = partition;
353
354 rc = io_open(rcar_handle, rcar_spec, &handle);
355 if (rc != IO_SUCCESS) {
Biju Das50bfdc42020-12-13 20:28:45 +0000356 WARN("%s: Failed to open FIP (%i)\n", __func__, rc);
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200357 loaded = IO_FAIL;
358 return loaded;
359 }
360
361 rc = io_seek(handle, IO_SEEK_SET, offset);
362 if (rc != IO_SUCCESS) {
Biju Das50bfdc42020-12-13 20:28:45 +0000363 WARN("%s: failed to seek\n", __func__);
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200364 loaded = IO_FAIL;
365 return loaded;
366 }
367
368 rc = check_load_area(dst, len);
369 if (rc != IO_SUCCESS) {
Biju Das50bfdc42020-12-13 20:28:45 +0000370 WARN("%s: check load area\n", __func__);
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200371 loaded = IO_FAIL;
372 return loaded;
373 }
374
375 rc = io_read(handle, dst, len, &cnt);
376 if (rc != IO_SUCCESS) {
Biju Das50bfdc42020-12-13 20:28:45 +0000377 WARN("%s: failed to read\n", __func__);
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200378 loaded = IO_FAIL;
379 return loaded;
380 }
381#if TRUSTED_BOARD_BOOT
382 rc = auth_mod_verify_img(img[i], (void *)dst, len);
Biju Das50bfdc42020-12-13 20:28:45 +0000383 if (rc != 0) {
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200384 memset((void *)dst, 0x00, len);
385 loaded = IO_FAIL;
386 return loaded;
387 }
388#endif
389 io_close(handle);
390 }
391
392 loaded = IO_SUCCESS;
393
394 return loaded;
395}
396
397static int32_t rcar_dev_init(io_dev_info_t *dev_info, const uintptr_t name)
398{
Toshiyuki Ogasaharafe9bad82021-07-12 19:34:34 +0900399 static uint64_t header[64] __aligned(FLASH_TRANS_SIZE_UNIT) = {0UL};
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200400 uintptr_t handle;
401 ssize_t offset;
402 uint32_t i;
403 int32_t rc;
404 size_t cnt;
405
406 /* Obtain a reference to the image by querying the platform layer */
407 rc = plat_get_drv_source(name, &rcar_handle, &rcar_spec);
408 if (rc != IO_SUCCESS) {
409 WARN("Failed to obtain reference to img %ld (%i)\n", name, rc);
410 return IO_FAIL;
411 }
412
Biju Das50bfdc42020-12-13 20:28:45 +0000413 if (rcar_cert_load == RCAR_CERT_LOAD) {
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200414 return IO_SUCCESS;
Biju Das50bfdc42020-12-13 20:28:45 +0000415 }
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200416
417 rc = io_open(rcar_handle, rcar_spec, &handle);
418 if (rc != IO_SUCCESS) {
419 WARN("Failed to access img %ld (%i)\n", name, rc);
420 return IO_FAIL;
421 }
422
Biju Das50bfdc42020-12-13 20:28:45 +0000423 /*
424 * get start address list
425 * [0] address num
426 * [1] BL33-1 image address
427 * [2] BL33-2 image address
428 * [3] BL33-3 image address
429 * [4] BL33-4 image address
430 * [5] BL33-5 image address
431 * [6] BL33-6 image address
432 * [7] BL33-7 image address
433 * [8] BL33-8 image address
434 */
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200435 offset = name == EMMC_DEV_ID ? RCAR_EMMC_CERT_HEADER :
436 RCAR_FLASH_CERT_HEADER;
437 rc = io_seek(handle, IO_SEEK_SET, offset);
438 if (rc != IO_SUCCESS) {
439 WARN("Firmware Image Package header failed to seek\n");
440 goto error;
441 }
Toshiyuki Ogasahara67116a82021-07-13 14:20:57 +0900442
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200443 rc = io_read(handle, (uintptr_t) &header, sizeof(header), &cnt);
444 if (rc != IO_SUCCESS) {
445 WARN("Firmware Image Package header failed to read\n");
446 goto error;
447 }
448
Toshiyuki Ogasahara67116a82021-07-13 14:20:57 +0900449#if RCAR_BL2_DCACHE == 1
450 inv_dcache_range((uint64_t) header, sizeof(header));
451#endif
452
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200453 rcar_image_number = header[0];
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200454 if (rcar_image_number == 0 || rcar_image_number > RCAR_MAX_BL3X_IMAGE) {
455 WARN("Firmware Image Package header check failed.\n");
Toshiyuki Ogasaharafe9bad82021-07-12 19:34:34 +0900456 rc = IO_FAIL;
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200457 goto error;
458 }
459
Yoshifumi Hosoya473cfc82023-07-03 16:58:11 +0900460 for (i = 0; i < rcar_image_number + 2; i++) {
461 rcar_image_header[i] = header[i * 2 + 1];
462 rcar_image_header_prttn[i] = header[i * 2 + 2];
463 }
464
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200465 rc = io_seek(handle, IO_SEEK_SET, offset + RCAR_SECTOR6_CERT_OFFSET);
466 if (rc != IO_SUCCESS) {
467 WARN("Firmware Image Package header failed to seek cert\n");
468 goto error;
469 }
Toshiyuki Ogasahara67116a82021-07-13 14:20:57 +0900470
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200471 rc = io_read(handle, RCAR_SDRAM_certESS,
472 RCAR_CERT_SIZE * (2 + rcar_image_number), &cnt);
473 if (rc != IO_SUCCESS) {
474 WARN("cert file read error.\n");
475 goto error;
476 }
477
Toshiyuki Ogasahara67116a82021-07-13 14:20:57 +0900478#if RCAR_BL2_DCACHE == 1
479 inv_dcache_range(RCAR_SDRAM_certESS,
480 RCAR_CERT_SIZE * (2 + rcar_image_number));
481#endif
482
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200483 rcar_cert_load = RCAR_CERT_LOAD;
484error:
485
Biju Das50bfdc42020-12-13 20:28:45 +0000486 if (rc != IO_SUCCESS) {
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200487 rc = IO_FAIL;
Biju Das50bfdc42020-12-13 20:28:45 +0000488 }
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200489
490 io_close(handle);
491
492 return rc;
493
494}
495
496static int32_t rcar_file_open(io_dev_info_t *info, const uintptr_t file_spec,
497 io_entity_t *entity)
498{
499 const io_drv_spec_t *spec = (io_drv_spec_t *) file_spec;
500 uintptr_t partition, offset, dst;
501 uint32_t noload, cert, len;
502 int32_t rc;
503
Biju Das50bfdc42020-12-13 20:28:45 +0000504 /*
505 * Only one file open at a time. We need to track state (ie, file
506 * cursor position). Since the header lives at offset zero, this entry
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200507 * should never be zero in an active file.
508 * Once the system supports dynamic memory allocation we will allow more
Biju Das50bfdc42020-12-13 20:28:45 +0000509 * than one open file at a time.
510 */
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200511 if (current_file.offset != 0U) {
Biju Das50bfdc42020-12-13 20:28:45 +0000512 WARN("%s: Only one open file at a time.\n", __func__);
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200513 return IO_RESOURCES_EXHAUSTED;
514 }
515
516 rc = file_to_offset(spec->offset, &offset, &cert, &noload, &partition);
517 if (rc != IO_SUCCESS) {
518 WARN("Failed to open file name %ld (%i)\n", spec->offset, rc);
519 return IO_FAIL;
520 }
521
Biju Das50bfdc42020-12-13 20:28:45 +0000522 if (noload != 0U) {
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200523 current_file.offset = 1;
524 current_file.dst = 0;
525 current_file.size = 1;
526 current_file.position = 0;
527 current_file.no_load = noload;
528 current_file.partition = 0;
529 entity->info = (uintptr_t) &current_file;
530
531 return IO_SUCCESS;
532 }
533
534 rcar_read_certificate((uint64_t) cert, &len, &dst);
535
Biju Das50bfdc42020-12-13 20:28:45 +0000536 /* Baylibre: HACK */
537 if (spec->offset == BL31_IMAGE_ID && len < RCAR_TRUSTED_SRAM_SIZE) {
538 WARN("%s,%s\n", "r-car ignoring the BL31 size from certificate",
539 "using RCAR_TRUSTED_SRAM_SIZE instead");
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200540 len = RCAR_TRUSTED_SRAM_SIZE;
541 }
542
543 current_file.partition = partition;
544 current_file.no_load = noload;
545 current_file.offset = offset;
546 current_file.position = 0;
547 current_file.size = len;
548 current_file.dst = dst;
549 entity->info = (uintptr_t) &current_file;
550
551 return IO_SUCCESS;
552}
553
554static int32_t rcar_file_len(io_entity_t *entity, size_t *length)
555{
556 *length = ((file_state_t *) entity->info)->size;
557
558 NOTICE("%s: len: 0x%08lx\n", __func__, *length);
559
560 return IO_SUCCESS;
561}
562
563static int32_t rcar_file_read(io_entity_t *entity, uintptr_t buffer,
564 size_t length, size_t *cnt)
565{
566 file_state_t *fp = (file_state_t *) entity->info;
567 ssize_t offset = fp->offset + fp->position;
568 uintptr_t handle;
569 int32_t rc;
570
571#ifdef SPD_NONE
572 static uint32_t load_bl33x_counter = 1;
573#else
574 static uint32_t load_bl33x_counter;
575#endif
Biju Das50bfdc42020-12-13 20:28:45 +0000576 if (current_file.no_load != 0U) {
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200577 *cnt = length;
578 return IO_SUCCESS;
579 }
580
581 ((io_drv_spec_t *) rcar_spec)->partition = fp->partition;
582
583 rc = io_open(rcar_handle, rcar_spec, &handle);
584 if (rc != IO_SUCCESS) {
585 WARN("Failed to open FIP (%i)\n", rc);
586 return IO_FAIL;
587 }
588
589 rc = io_seek(handle, IO_SEEK_SET, offset);
590 if (rc != IO_SUCCESS) {
Biju Das50bfdc42020-12-13 20:28:45 +0000591 WARN("%s: failed to seek\n", __func__);
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200592 goto error;
593 }
594
595 if (load_bl33x_counter == RCAR_COUNT_LOAD_BL33) {
596 rc = check_load_area(buffer, length);
597 if (rc != IO_SUCCESS) {
Biju Das50bfdc42020-12-13 20:28:45 +0000598 WARN("%s: load area err\n", __func__);
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200599 goto error;
600 }
601 }
602
603 rc = io_read(handle, buffer, length, cnt);
604 if (rc != IO_SUCCESS) {
605 WARN("Failed to read payload (%i)\n", rc);
606 goto error;
607 }
608
609 fp->position += *cnt;
610 io_close(handle);
611
612 load_bl33x_counter += 1;
Biju Das50bfdc42020-12-13 20:28:45 +0000613 if (load_bl33x_counter == RCAR_COUNT_LOAD_BL33X) {
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200614 return load_bl33x();
Biju Das50bfdc42020-12-13 20:28:45 +0000615 }
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200616
617 return IO_SUCCESS;
618error:
619 io_close(handle);
620 return IO_FAIL;
621}
622
623static int32_t rcar_file_close(io_entity_t *entity)
624{
Biju Das50bfdc42020-12-13 20:28:45 +0000625 if (current_file.offset != 0U) {
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200626 memset(&current_file, 0, sizeof(current_file));
Biju Das50bfdc42020-12-13 20:28:45 +0000627 }
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200628
629 entity->info = 0U;
630
631 return IO_SUCCESS;
632}
633
634static const io_dev_funcs_t rcar_dev_funcs = {
635 .type = &device_type_rcar,
636 .open = &rcar_file_open,
637 .seek = NULL,
638 .size = &rcar_file_len,
639 .read = &rcar_file_read,
640 .write = NULL,
641 .close = &rcar_file_close,
642 .dev_init = &rcar_dev_init,
643 .dev_close = &rcar_dev_close,
644};
645
646static const io_dev_info_t rcar_dev_info = {
647 .funcs = &rcar_dev_funcs,
648 .info = (uintptr_t) 0
649};
650
651static const io_dev_connector_t rcar_dev_connector = {
652 .dev_open = &rcar_dev_open
653};
654
655static int32_t rcar_dev_open(const uintptr_t dev_spec __attribute__ ((unused)),
656 io_dev_info_t **dev_info)
657{
658 *dev_info = (io_dev_info_t *) &rcar_dev_info;
659
660 return IO_SUCCESS;
661}
662
663static int32_t rcar_dev_close(io_dev_info_t *dev_info)
664{
665 rcar_handle = 0;
666 rcar_spec = 0;
667
668 return IO_SUCCESS;
669}
670
671int32_t rcar_register_io_dev(const io_dev_connector_t **dev_con)
672{
673 int32_t result;
674
675 result = io_register_device(&rcar_dev_info);
Biju Das50bfdc42020-12-13 20:28:45 +0000676 if (result == IO_SUCCESS) {
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200677 *dev_con = &rcar_dev_connector;
Biju Das50bfdc42020-12-13 20:28:45 +0000678 }
Jorge Ramirez-Ortizeaa63b42018-09-23 09:40:45 +0200679
680 return result;
681}