blob: 6724fc3bc1a7158a87bc23ffecba4766c6db0d10 [file] [log] [blame]
Harry Liebel561cd332014-02-14 14:42:48 +00001/*
Douglas Raillarda8954fc2017-01-26 15:54:44 +00002 * Copyright (c) 2014-2017, ARM Limited and Contributors. All rights reserved.
Harry Liebel561cd332014-02-14 14:42:48 +00003 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
Harry Liebel561cd332014-02-14 14:42:48 +000031#include <assert.h>
Dan Handleyed6ff952014-05-14 17:44:19 +010032#include <bl_common.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010033#include <debug.h>
34#include <errno.h>
Dan Handley714a0d22014-04-09 13:13:04 +010035#include <firmware_image_package.h>
Dan Handley714a0d22014-04-09 13:13:04 +010036#include <io_driver.h>
37#include <io_fip.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010038#include <io_storage.h>
39#include <platform.h>
Dan Handleyed6ff952014-05-14 17:44:19 +010040#include <platform_def.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010041#include <stdint.h>
42#include <string.h>
Douglas Raillarda8954fc2017-01-26 15:54:44 +000043#include <utils.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010044#include <uuid.h>
Harry Liebel561cd332014-02-14 14:42:48 +000045
46/* Useful for printing UUIDs when debugging.*/
47#define PRINT_UUID2(x) \
48 "%08x-%04hx-%04hx-%02hhx%02hhx-%02hhx%02hhx%02hhx%02hhx%02hhx%02hhx", \
49 x.time_low, x.time_mid, x.time_hi_and_version, \
50 x.clock_seq_hi_and_reserved, x.clock_seq_low, \
51 x.node[0], x.node[1], x.node[2], x.node[3], \
52 x.node[4], x.node[5]
53
54typedef struct {
Harry Liebel561cd332014-02-14 14:42:48 +000055 /* Put file_pos above the struct to allow {0} on static init.
56 * It is a workaround for a known bug in GCC
57 * http://gcc.gnu.org/bugzilla/show_bug.cgi?id=53119
58 */
59 unsigned int file_pos;
Dan Handleye2712bc2014-04-10 15:37:22 +010060 fip_toc_entry_t entry;
61} file_state_t;
Harry Liebel561cd332014-02-14 14:42:48 +000062
Harry Liebel561cd332014-02-14 14:42:48 +000063static const uuid_t uuid_null = {0};
Dan Handleye2712bc2014-04-10 15:37:22 +010064static file_state_t current_file = {0};
Dan Handleya4cb68e2014-04-23 13:47:06 +010065static uintptr_t backend_dev_handle;
66static uintptr_t backend_image_spec;
Harry Liebel561cd332014-02-14 14:42:48 +000067
68
69/* Firmware Image Package driver functions */
Dan Handleya4cb68e2014-04-23 13:47:06 +010070static int fip_dev_open(const uintptr_t dev_spec, io_dev_info_t **dev_info);
71static int fip_file_open(io_dev_info_t *dev_info, const uintptr_t spec,
Dan Handleye2712bc2014-04-10 15:37:22 +010072 io_entity_t *entity);
73static int fip_file_len(io_entity_t *entity, size_t *length);
Dan Handleya4cb68e2014-04-23 13:47:06 +010074static int fip_file_read(io_entity_t *entity, uintptr_t buffer, size_t length,
Harry Liebel561cd332014-02-14 14:42:48 +000075 size_t *length_read);
Dan Handleye2712bc2014-04-10 15:37:22 +010076static int fip_file_close(io_entity_t *entity);
Dan Handleya4cb68e2014-04-23 13:47:06 +010077static int fip_dev_init(io_dev_info_t *dev_info, const uintptr_t init_params);
Dan Handleye2712bc2014-04-10 15:37:22 +010078static int fip_dev_close(io_dev_info_t *dev_info);
Harry Liebel561cd332014-02-14 14:42:48 +000079
Harry Liebel561cd332014-02-14 14:42:48 +000080
81/* Return 0 for equal uuids. */
82static inline int compare_uuids(const uuid_t *uuid1, const uuid_t *uuid2)
83{
84 return memcmp(uuid1, uuid2, sizeof(uuid_t));
85}
86
87
88/* TODO: We could check version numbers or do a package checksum? */
Dan Handleye2712bc2014-04-10 15:37:22 +010089static inline int is_valid_header(fip_toc_header_t *header)
Harry Liebel561cd332014-02-14 14:42:48 +000090{
91 if ((header->name == TOC_HEADER_NAME) && (header->serial_number != 0)) {
92 return 1;
93 } else {
94 return 0;
95 }
96}
97
98
Harry Liebel561cd332014-02-14 14:42:48 +000099/* Identify the device type as a virtual driver */
Dan Handleye2712bc2014-04-10 15:37:22 +0100100io_type_t device_type_fip(void)
Harry Liebel561cd332014-02-14 14:42:48 +0000101{
102 return IO_TYPE_FIRMWARE_IMAGE_PACKAGE;
103}
104
105
Dan Handleya4cb68e2014-04-23 13:47:06 +0100106static const io_dev_connector_t fip_dev_connector = {
Harry Liebel561cd332014-02-14 14:42:48 +0000107 .dev_open = fip_dev_open
108};
109
110
Dan Handleya4cb68e2014-04-23 13:47:06 +0100111static const io_dev_funcs_t fip_dev_funcs = {
Harry Liebel561cd332014-02-14 14:42:48 +0000112 .type = device_type_fip,
113 .open = fip_file_open,
114 .seek = NULL,
115 .size = fip_file_len,
116 .read = fip_file_read,
117 .write = NULL,
118 .close = fip_file_close,
119 .dev_init = fip_dev_init,
120 .dev_close = fip_dev_close,
121};
122
123
Dan Handleya4cb68e2014-04-23 13:47:06 +0100124/* No state associated with this device so structure can be const */
125static const io_dev_info_t fip_dev_info = {
Harry Liebel561cd332014-02-14 14:42:48 +0000126 .funcs = &fip_dev_funcs,
127 .info = (uintptr_t)NULL
128};
129
130
131/* Open a connection to the FIP device */
Soren Brinkmann46dd1702016-01-14 10:11:05 -0800132static int fip_dev_open(const uintptr_t dev_spec __unused,
Dan Handleye2712bc2014-04-10 15:37:22 +0100133 io_dev_info_t **dev_info)
Harry Liebel561cd332014-02-14 14:42:48 +0000134{
135 assert(dev_info != NULL);
Dan Handleya4cb68e2014-04-23 13:47:06 +0100136 *dev_info = (io_dev_info_t *)&fip_dev_info; /* cast away const */
Harry Liebel561cd332014-02-14 14:42:48 +0000137
Juan Castillo6e762062015-11-02 10:47:01 +0000138 return 0;
Harry Liebel561cd332014-02-14 14:42:48 +0000139}
140
141
142/* Do some basic package checks. */
Dan Handleya4cb68e2014-04-23 13:47:06 +0100143static int fip_dev_init(io_dev_info_t *dev_info, const uintptr_t init_params)
Harry Liebel561cd332014-02-14 14:42:48 +0000144{
Juan Castillo6e762062015-11-02 10:47:01 +0000145 int result;
Juan Castillo3a66aca2015-04-13 17:36:19 +0100146 unsigned int image_id = (unsigned int)init_params;
Dan Handleya4cb68e2014-04-23 13:47:06 +0100147 uintptr_t backend_handle;
Dan Handleye2712bc2014-04-10 15:37:22 +0100148 fip_toc_header_t header;
Harry Liebel561cd332014-02-14 14:42:48 +0000149 size_t bytes_read;
150
151 /* Obtain a reference to the image by querying the platform layer */
Juan Castillo3a66aca2015-04-13 17:36:19 +0100152 result = plat_get_image_source(image_id, &backend_dev_handle,
Harry Liebel561cd332014-02-14 14:42:48 +0000153 &backend_image_spec);
Juan Castillo6e762062015-11-02 10:47:01 +0000154 if (result != 0) {
Juan Castillo3a66aca2015-04-13 17:36:19 +0100155 WARN("Failed to obtain reference to image id=%u (%i)\n",
156 image_id, result);
Juan Castillo6e762062015-11-02 10:47:01 +0000157 result = -ENOENT;
Harry Liebel561cd332014-02-14 14:42:48 +0000158 goto fip_dev_init_exit;
159 }
160
161 /* Attempt to access the FIP image */
162 result = io_open(backend_dev_handle, backend_image_spec,
163 &backend_handle);
Juan Castillo6e762062015-11-02 10:47:01 +0000164 if (result != 0) {
Juan Castillo3a66aca2015-04-13 17:36:19 +0100165 WARN("Failed to access image id=%u (%i)\n", image_id, result);
Juan Castillo6e762062015-11-02 10:47:01 +0000166 result = -ENOENT;
Harry Liebel561cd332014-02-14 14:42:48 +0000167 goto fip_dev_init_exit;
168 }
169
Dan Handleya4cb68e2014-04-23 13:47:06 +0100170 result = io_read(backend_handle, (uintptr_t)&header, sizeof(header),
171 &bytes_read);
Juan Castillo6e762062015-11-02 10:47:01 +0000172 if (result == 0) {
Harry Liebel561cd332014-02-14 14:42:48 +0000173 if (!is_valid_header(&header)) {
Jeenu Viswambharan08c28d52014-02-20 12:03:31 +0000174 WARN("Firmware Image Package header check failed.\n");
Juan Castillo6e762062015-11-02 10:47:01 +0000175 result = -ENOENT;
Harry Liebel561cd332014-02-14 14:42:48 +0000176 } else {
Dan Handley91b624e2014-07-29 17:14:00 +0100177 VERBOSE("FIP header looks OK.\n");
Harry Liebel561cd332014-02-14 14:42:48 +0000178 }
179 }
180
181 io_close(backend_handle);
182
183 fip_dev_init_exit:
184 return result;
185}
186
187/* Close a connection to the FIP device */
Dan Handleye2712bc2014-04-10 15:37:22 +0100188static int fip_dev_close(io_dev_info_t *dev_info)
Harry Liebel561cd332014-02-14 14:42:48 +0000189{
190 /* TODO: Consider tracking open files and cleaning them up here */
191
192 /* Clear the backend. */
Dan Handleya4cb68e2014-04-23 13:47:06 +0100193 backend_dev_handle = (uintptr_t)NULL;
194 backend_image_spec = (uintptr_t)NULL;
Harry Liebel561cd332014-02-14 14:42:48 +0000195
Juan Castillo6e762062015-11-02 10:47:01 +0000196 return 0;
Harry Liebel561cd332014-02-14 14:42:48 +0000197}
198
199
200/* Open a file for access from package. */
Dan Handleya4cb68e2014-04-23 13:47:06 +0100201static int fip_file_open(io_dev_info_t *dev_info, const uintptr_t spec,
Dan Handleye2712bc2014-04-10 15:37:22 +0100202 io_entity_t *entity)
Harry Liebel561cd332014-02-14 14:42:48 +0000203{
Juan Castillo6e762062015-11-02 10:47:01 +0000204 int result;
Dan Handleya4cb68e2014-04-23 13:47:06 +0100205 uintptr_t backend_handle;
Juan Castillo3a66aca2015-04-13 17:36:19 +0100206 const io_uuid_spec_t *uuid_spec = (io_uuid_spec_t *)spec;
Harry Liebel561cd332014-02-14 14:42:48 +0000207 size_t bytes_read;
208 int found_file = 0;
209
Juan Castillo3a66aca2015-04-13 17:36:19 +0100210 assert(uuid_spec != NULL);
Harry Liebel561cd332014-02-14 14:42:48 +0000211 assert(entity != NULL);
212
213 /* Can only have one file open at a time for the moment. We need to
214 * track state like file cursor position. We know the header lives at
215 * offset zero, so this entry should never be zero for an active file.
216 * When the system supports dynamic memory allocation we can allow more
217 * than one open file at a time if needed.
218 */
219 if (current_file.entry.offset_address != 0) {
Jeenu Viswambharan08c28d52014-02-20 12:03:31 +0000220 WARN("fip_file_open : Only one open file at a time.\n");
Juan Castillo6e762062015-11-02 10:47:01 +0000221 return -ENOMEM;
Harry Liebel561cd332014-02-14 14:42:48 +0000222 }
223
224 /* Attempt to access the FIP image */
225 result = io_open(backend_dev_handle, backend_image_spec,
226 &backend_handle);
Juan Castillo6e762062015-11-02 10:47:01 +0000227 if (result != 0) {
Jeenu Viswambharan08c28d52014-02-20 12:03:31 +0000228 WARN("Failed to open Firmware Image Package (%i)\n", result);
Juan Castillo6e762062015-11-02 10:47:01 +0000229 result = -ENOENT;
Harry Liebel561cd332014-02-14 14:42:48 +0000230 goto fip_file_open_exit;
231 }
232
233 /* Seek past the FIP header into the Table of Contents */
Dan Handleye2712bc2014-04-10 15:37:22 +0100234 result = io_seek(backend_handle, IO_SEEK_SET, sizeof(fip_toc_header_t));
Juan Castillo6e762062015-11-02 10:47:01 +0000235 if (result != 0) {
Jeenu Viswambharan08c28d52014-02-20 12:03:31 +0000236 WARN("fip_file_open: failed to seek\n");
Juan Castillo6e762062015-11-02 10:47:01 +0000237 result = -ENOENT;
Harry Liebel561cd332014-02-14 14:42:48 +0000238 goto fip_file_open_close;
239 }
240
Harry Liebel561cd332014-02-14 14:42:48 +0000241 found_file = 0;
242 do {
Dan Handleya4cb68e2014-04-23 13:47:06 +0100243 result = io_read(backend_handle,
244 (uintptr_t)&current_file.entry,
Harry Liebel561cd332014-02-14 14:42:48 +0000245 sizeof(current_file.entry),
246 &bytes_read);
Juan Castillo6e762062015-11-02 10:47:01 +0000247 if (result == 0) {
Harry Liebel561cd332014-02-14 14:42:48 +0000248 if (compare_uuids(&current_file.entry.uuid,
Juan Castillo3a66aca2015-04-13 17:36:19 +0100249 &uuid_spec->uuid) == 0) {
Harry Liebel561cd332014-02-14 14:42:48 +0000250 found_file = 1;
251 break;
252 }
253 } else {
Jeenu Viswambharan08c28d52014-02-20 12:03:31 +0000254 WARN("Failed to read FIP (%i)\n", result);
Harry Liebel561cd332014-02-14 14:42:48 +0000255 goto fip_file_open_close;
256 }
257 } while (compare_uuids(&current_file.entry.uuid, &uuid_null) != 0);
258
259 if (found_file == 1) {
260 /* All fine. Update entity info with file state and return. Set
261 * the file position to 0. The 'current_file.entry' holds the
262 * base and size of the file.
263 */
264 current_file.file_pos = 0;
265 entity->info = (uintptr_t)&current_file;
266 } else {
267 /* Did not find the file in the FIP. */
Jeenu Viswambharandd3dc322014-02-20 11:51:00 +0000268 current_file.entry.offset_address = 0;
Juan Castillo6e762062015-11-02 10:47:01 +0000269 result = -ENOENT;
Harry Liebel561cd332014-02-14 14:42:48 +0000270 }
271
272 fip_file_open_close:
273 io_close(backend_handle);
274
275 fip_file_open_exit:
276 return result;
277}
278
279
280/* Return the size of a file in package */
Dan Handleye2712bc2014-04-10 15:37:22 +0100281static int fip_file_len(io_entity_t *entity, size_t *length)
Harry Liebel561cd332014-02-14 14:42:48 +0000282{
283 assert(entity != NULL);
284 assert(length != NULL);
285
Dan Handleye2712bc2014-04-10 15:37:22 +0100286 *length = ((file_state_t *)entity->info)->entry.size;
Harry Liebel561cd332014-02-14 14:42:48 +0000287
Juan Castillo6e762062015-11-02 10:47:01 +0000288 return 0;
Harry Liebel561cd332014-02-14 14:42:48 +0000289}
290
291
292/* Read data from a file in package */
Dan Handleya4cb68e2014-04-23 13:47:06 +0100293static int fip_file_read(io_entity_t *entity, uintptr_t buffer, size_t length,
Harry Liebel561cd332014-02-14 14:42:48 +0000294 size_t *length_read)
295{
Juan Castillo6e762062015-11-02 10:47:01 +0000296 int result;
Dan Handleye2712bc2014-04-10 15:37:22 +0100297 file_state_t *fp;
Harry Liebel561cd332014-02-14 14:42:48 +0000298 size_t file_offset;
299 size_t bytes_read;
Dan Handleya4cb68e2014-04-23 13:47:06 +0100300 uintptr_t backend_handle;
Harry Liebel561cd332014-02-14 14:42:48 +0000301
302 assert(entity != NULL);
Dan Handleya4cb68e2014-04-23 13:47:06 +0100303 assert(buffer != (uintptr_t)NULL);
Harry Liebel561cd332014-02-14 14:42:48 +0000304 assert(length_read != NULL);
Dan Handleya4cb68e2014-04-23 13:47:06 +0100305 assert(entity->info != (uintptr_t)NULL);
Harry Liebel561cd332014-02-14 14:42:48 +0000306
307 /* Open the backend, attempt to access the blob image */
308 result = io_open(backend_dev_handle, backend_image_spec,
309 &backend_handle);
Juan Castillo6e762062015-11-02 10:47:01 +0000310 if (result != 0) {
Jeenu Viswambharan08c28d52014-02-20 12:03:31 +0000311 WARN("Failed to open FIP (%i)\n", result);
Juan Castillo6e762062015-11-02 10:47:01 +0000312 result = -ENOENT;
Harry Liebel561cd332014-02-14 14:42:48 +0000313 goto fip_file_read_exit;
314 }
315
Dan Handleye2712bc2014-04-10 15:37:22 +0100316 fp = (file_state_t *)entity->info;
Harry Liebel561cd332014-02-14 14:42:48 +0000317
318 /* Seek to the position in the FIP where the payload lives */
319 file_offset = fp->entry.offset_address + fp->file_pos;
320 result = io_seek(backend_handle, IO_SEEK_SET, file_offset);
Juan Castillo6e762062015-11-02 10:47:01 +0000321 if (result != 0) {
Jeenu Viswambharan08c28d52014-02-20 12:03:31 +0000322 WARN("fip_file_read: failed to seek\n");
Juan Castillo6e762062015-11-02 10:47:01 +0000323 result = -ENOENT;
Harry Liebel561cd332014-02-14 14:42:48 +0000324 goto fip_file_read_close;
325 }
326
327 result = io_read(backend_handle, buffer, length, &bytes_read);
Juan Castillo6e762062015-11-02 10:47:01 +0000328 if (result != 0) {
Harry Liebel561cd332014-02-14 14:42:48 +0000329 /* We cannot read our data. Fail. */
Jeenu Viswambharan08c28d52014-02-20 12:03:31 +0000330 WARN("Failed to read payload (%i)\n", result);
Juan Castillo6e762062015-11-02 10:47:01 +0000331 result = -ENOENT;
Harry Liebel561cd332014-02-14 14:42:48 +0000332 goto fip_file_read_close;
333 } else {
334 /* Set caller length and new file position. */
335 *length_read = bytes_read;
336 fp->file_pos += bytes_read;
337 }
338
339/* Close the backend. */
340 fip_file_read_close:
341 io_close(backend_handle);
342
343 fip_file_read_exit:
344 return result;
345}
346
347
348/* Close a file in package */
Dan Handleye2712bc2014-04-10 15:37:22 +0100349static int fip_file_close(io_entity_t *entity)
Harry Liebel561cd332014-02-14 14:42:48 +0000350{
351 /* Clear our current file pointer.
352 * If we had malloc() we would free() here.
353 */
354 if (current_file.entry.offset_address != 0) {
Douglas Raillarda8954fc2017-01-26 15:54:44 +0000355 zeromem(&current_file, sizeof(current_file));
Harry Liebel561cd332014-02-14 14:42:48 +0000356 }
357
358 /* Clear the Entity info. */
359 entity->info = 0;
360
Juan Castillo6e762062015-11-02 10:47:01 +0000361 return 0;
Harry Liebel561cd332014-02-14 14:42:48 +0000362}
363
364/* Exported functions */
365
366/* Register the Firmware Image Package driver with the IO abstraction */
Dan Handleya4cb68e2014-04-23 13:47:06 +0100367int register_io_dev_fip(const io_dev_connector_t **dev_con)
Harry Liebel561cd332014-02-14 14:42:48 +0000368{
Juan Castillo6e762062015-11-02 10:47:01 +0000369 int result;
Harry Liebel561cd332014-02-14 14:42:48 +0000370 assert(dev_con != NULL);
371
372 result = io_register_device(&fip_dev_info);
Juan Castillo6e762062015-11-02 10:47:01 +0000373 if (result == 0)
Harry Liebel561cd332014-02-14 14:42:48 +0000374 *dev_con = &fip_dev_connector;
375
376 return result;
377}