io_fip.c 12 KB
Newer Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
/*
 * Copyright (c) 2014, ARM Limited and Contributors. All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions are met:
 *
 * Redistributions of source code must retain the above copyright notice, this
 * list of conditions and the following disclaimer.
 *
 * Redistributions in binary form must reproduce the above copyright notice,
 * this list of conditions and the following disclaimer in the documentation
 * and/or other materials provided with the distribution.
 *
 * Neither the name of ARM nor the names of its contributors may be used
 * to endorse or promote products derived from this software without specific
 * prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
 * POSSIBILITY OF SUCH DAMAGE.
 */

#include <assert.h>
32
#include <bl_common.h>
33
34
#include <debug.h>
#include <errno.h>
35
36
37
#include <firmware_image_package.h>
#include <io_driver.h>
#include <io_fip.h>
38
39
#include <io_storage.h>
#include <platform.h>
40
#include <platform_def.h>
41
42
43
#include <stdint.h>
#include <string.h>
#include <uuid.h>
44
45
46
47
48
49
50
51
52
53
54
55

/* Useful for printing UUIDs when debugging.*/
#define PRINT_UUID2(x)								\
	"%08x-%04hx-%04hx-%02hhx%02hhx-%02hhx%02hhx%02hhx%02hhx%02hhx%02hhx",	\
		x.time_low, x.time_mid, x.time_hi_and_version,			\
		x.clock_seq_hi_and_reserved, x.clock_seq_low,			\
		x.node[0], x.node[1], x.node[2], x.node[3],			\
		x.node[4], x.node[5]

typedef struct {
	const char	*name;
	const uuid_t	 uuid;
56
} plat_fip_name_uuid_t;
57
58
59
60
61
62
63

typedef struct {
	/* Put file_pos above the struct to allow {0} on static init.
	 * It is a workaround for a known bug in GCC
	 * http://gcc.gnu.org/bugzilla/show_bug.cgi?id=53119
	 */
	unsigned int file_pos;
64
65
	fip_toc_entry_t entry;
} file_state_t;
66

67
static const plat_fip_name_uuid_t name_uuid[] = {
68
	{BL2_IMAGE_NAME, UUID_TRUSTED_BOOT_FIRMWARE_BL2},
69
70
71
72
#ifdef BL30_IMAGE_NAME
	/* BL3-0 is optional in the platform */
	{BL30_IMAGE_NAME, UUID_SCP_FIRMWARE_BL30},
#endif /* BL30_IMAGE_NAME */
73
	{BL31_IMAGE_NAME, UUID_EL3_RUNTIME_FIRMWARE_BL31},
74
75
#ifdef BL32_IMAGE_NAME
	/* BL3-2 is optional in the platform */
76
	{BL32_IMAGE_NAME, UUID_SECURE_PAYLOAD_BL32},
77
#endif /* BL32_IMAGE_NAME */
78
	{BL33_IMAGE_NAME, UUID_NON_TRUSTED_FIRMWARE_BL33},
79
80
81
#if TRUSTED_BOARD_BOOT
	/* Certificates */
	{BL2_CERT_NAME, UUID_TRUSTED_BOOT_FIRMWARE_BL2_CERT},
82
83
84
85
86
87
88
89
90
91
92
93
94
	{TRUSTED_KEY_CERT_NAME, UUID_TRUSTED_KEY_CERT},
#ifdef BL30_KEY_CERT_NAME
	{BL30_KEY_CERT_NAME, UUID_SCP_FIRMWARE_BL30_KEY_CERT},
#endif
	{BL31_KEY_CERT_NAME, UUID_EL3_RUNTIME_FIRMWARE_BL31_KEY_CERT},
	{BL32_KEY_CERT_NAME, UUID_SECURE_PAYLOAD_BL32_KEY_CERT},
	{BL33_KEY_CERT_NAME, UUID_NON_TRUSTED_FIRMWARE_BL33_KEY_CERT},
#ifdef BL30_CERT_NAME
	{BL30_CERT_NAME, UUID_SCP_FIRMWARE_BL30_CERT},
#endif
	{BL31_CERT_NAME, UUID_EL3_RUNTIME_FIRMWARE_BL31_CERT},
	{BL32_CERT_NAME, UUID_SECURE_PAYLOAD_BL32_CERT},
	{BL33_CERT_NAME, UUID_NON_TRUSTED_FIRMWARE_BL33_CERT},
95
#endif /* TRUSTED_BOARD_BOOT */
96
97
98
};

static const uuid_t uuid_null = {0};
99
static file_state_t current_file = {0};
100
101
static uintptr_t backend_dev_handle;
static uintptr_t backend_image_spec;
102
103
104


/* Firmware Image Package driver functions */
105
106
static int fip_dev_open(const uintptr_t dev_spec, io_dev_info_t **dev_info);
static int fip_file_open(io_dev_info_t *dev_info, const uintptr_t spec,
107
108
			  io_entity_t *entity);
static int fip_file_len(io_entity_t *entity, size_t *length);
109
static int fip_file_read(io_entity_t *entity, uintptr_t buffer, size_t length,
110
			  size_t *length_read);
111
static int fip_file_close(io_entity_t *entity);
112
static int fip_dev_init(io_dev_info_t *dev_info, const uintptr_t init_params);
113
static int fip_dev_close(io_dev_info_t *dev_info);
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130


static inline int copy_uuid(uuid_t *dst, const uuid_t *src)
{
	memcpy(dst, src, sizeof(uuid_t));
	return 0;
}


/* Return 0 for equal uuids. */
static inline int compare_uuids(const uuid_t *uuid1, const uuid_t *uuid2)
{
	return memcmp(uuid1, uuid2, sizeof(uuid_t));
}


/* TODO: We could check version numbers or do a package checksum? */
131
static inline int is_valid_header(fip_toc_header_t *header)
132
133
134
135
136
137
138
139
140
141
142
143
144
145
{
	if ((header->name == TOC_HEADER_NAME) && (header->serial_number != 0)) {
		return 1;
	} else {
		return 0;
	}
}


static int file_to_uuid(const char *filename, uuid_t *uuid)
{
	int i;
	int status = -EINVAL;

146
	for (i = 0; i < (sizeof(name_uuid) / sizeof(name_uuid[0])); i++) {
147
148
149
150
151
152
153
154
155
156
157
		if (strcmp(filename, name_uuid[i].name) == 0) {
			copy_uuid(uuid, &name_uuid[i].uuid);
			status = 0;
			break;
		}
	}
	return status;
}


/* Identify the device type as a virtual driver */
158
io_type_t device_type_fip(void)
159
160
161
162
163
{
	return IO_TYPE_FIRMWARE_IMAGE_PACKAGE;
}


164
static const io_dev_connector_t fip_dev_connector = {
165
166
167
168
	.dev_open = fip_dev_open
};


169
static const io_dev_funcs_t fip_dev_funcs = {
170
171
172
173
174
175
176
177
178
179
180
181
	.type = device_type_fip,
	.open = fip_file_open,
	.seek = NULL,
	.size = fip_file_len,
	.read = fip_file_read,
	.write = NULL,
	.close = fip_file_close,
	.dev_init = fip_dev_init,
	.dev_close = fip_dev_close,
};


182
183
/* No state associated with this device so structure can be const */
static const io_dev_info_t fip_dev_info = {
184
185
186
187
188
189
	.funcs = &fip_dev_funcs,
	.info = (uintptr_t)NULL
};


/* Open a connection to the FIP device */
190
static int fip_dev_open(const uintptr_t dev_spec __attribute__((unused)),
191
			 io_dev_info_t **dev_info)
192
193
{
	assert(dev_info != NULL);
194
	*dev_info = (io_dev_info_t *)&fip_dev_info; /* cast away const */
195
196
197
198
199
200

	return IO_SUCCESS;
}


/* Do some basic package checks. */
201
static int fip_dev_init(io_dev_info_t *dev_info, const uintptr_t init_params)
202
203
204
{
	int result = IO_FAIL;
	char *image_name = (char *)init_params;
205
	uintptr_t backend_handle;
206
	fip_toc_header_t header;
207
208
209
210
211
212
	size_t bytes_read;

	/* Obtain a reference to the image by querying the platform layer */
	result = plat_get_image_source(image_name, &backend_dev_handle,
				       &backend_image_spec);
	if (result != IO_SUCCESS) {
213
		WARN("Failed to obtain reference to image '%s' (%i)\n",
214
215
216
217
218
219
220
221
222
			image_name, result);
		result = IO_FAIL;
		goto fip_dev_init_exit;
	}

	/* Attempt to access the FIP image */
	result = io_open(backend_dev_handle, backend_image_spec,
			 &backend_handle);
	if (result != IO_SUCCESS) {
223
		WARN("Failed to access image '%s' (%i)\n", image_name, result);
224
225
226
227
		result = IO_FAIL;
		goto fip_dev_init_exit;
	}

228
229
	result = io_read(backend_handle, (uintptr_t)&header, sizeof(header),
			&bytes_read);
230
231
	if (result == IO_SUCCESS) {
		if (!is_valid_header(&header)) {
232
			WARN("Firmware Image Package header check failed.\n");
233
234
			result = IO_FAIL;
		} else {
Dan Handley's avatar
Dan Handley committed
235
			VERBOSE("FIP header looks OK.\n");
236
237
238
239
240
241
242
243
244
245
		}
	}

	io_close(backend_handle);

 fip_dev_init_exit:
	return result;
}

/* Close a connection to the FIP device */
246
static int fip_dev_close(io_dev_info_t *dev_info)
247
248
249
250
{
	/* TODO: Consider tracking open files and cleaning them up here */

	/* Clear the backend. */
251
252
	backend_dev_handle = (uintptr_t)NULL;
	backend_image_spec = (uintptr_t)NULL;
253
254
255
256
257
258

	return IO_SUCCESS;
}


/* Open a file for access from package. */
259
static int fip_file_open(io_dev_info_t *dev_info, const uintptr_t spec,
260
			 io_entity_t *entity)
261
262
{
	int result = IO_FAIL;
263
	uintptr_t backend_handle;
264
	uuid_t file_uuid;
265
	const io_file_spec_t *file_spec = (io_file_spec_t *)spec;
266
267
268
269
270
271
272
273
274
275
276
277
278
	size_t bytes_read;
	int found_file = 0;

	assert(file_spec != NULL);
	assert(entity != NULL);

	/* Can only have one file open at a time for the moment. We need to
	 * track state like file cursor position. We know the header lives at
	 * offset zero, so this entry should never be zero for an active file.
	 * When the system supports dynamic memory allocation we can allow more
	 * than one open file at a time if needed.
	 */
	if (current_file.entry.offset_address != 0) {
279
		WARN("fip_file_open : Only one open file at a time.\n");
280
281
282
283
284
285
286
		return IO_RESOURCES_EXHAUSTED;
	}

	/* Attempt to access the FIP image */
	result = io_open(backend_dev_handle, backend_image_spec,
			 &backend_handle);
	if (result != IO_SUCCESS) {
287
		WARN("Failed to open Firmware Image Package (%i)\n", result);
288
289
290
291
292
		result = IO_FAIL;
		goto fip_file_open_exit;
	}

	/* Seek past the FIP header into the Table of Contents */
293
	result = io_seek(backend_handle, IO_SEEK_SET, sizeof(fip_toc_header_t));
294
	if (result != IO_SUCCESS) {
295
		WARN("fip_file_open: failed to seek\n");
296
297
298
299
300
301
302
303
		result = IO_FAIL;
		goto fip_file_open_close;
	}

	file_to_uuid(file_spec->path, &file_uuid);

	found_file = 0;
	do {
304
305
		result = io_read(backend_handle,
				 (uintptr_t)&current_file.entry,
306
307
308
309
310
311
312
313
314
				 sizeof(current_file.entry),
				 &bytes_read);
		if (result == IO_SUCCESS) {
			if (compare_uuids(&current_file.entry.uuid,
					  &file_uuid) == 0) {
				found_file = 1;
				break;
			}
		} else {
315
			WARN("Failed to read FIP (%i)\n", result);
316
317
318
319
320
321
322
323
324
325
326
327
328
			goto fip_file_open_close;
		}
	} while (compare_uuids(&current_file.entry.uuid, &uuid_null) != 0);

	if (found_file == 1) {
		/* All fine. Update entity info with file state and return. Set
		 * the file position to 0. The 'current_file.entry' holds the
		 * base and size of the file.
		 */
		current_file.file_pos = 0;
		entity->info = (uintptr_t)&current_file;
	} else {
		/* Did not find the file in the FIP. */
329
		current_file.entry.offset_address = 0;
330
331
332
333
334
335
336
337
338
339
340
341
		result = IO_FAIL;
	}

 fip_file_open_close:
	io_close(backend_handle);

 fip_file_open_exit:
	return result;
}


/* Return the size of a file in package */
342
static int fip_file_len(io_entity_t *entity, size_t *length)
343
344
345
346
{
	assert(entity != NULL);
	assert(length != NULL);

347
	*length =  ((file_state_t *)entity->info)->entry.size;
348
349
350
351
352
353

	return IO_SUCCESS;
}


/* Read data from a file in package */
354
static int fip_file_read(io_entity_t *entity, uintptr_t buffer, size_t length,
355
356
357
			  size_t *length_read)
{
	int result = IO_FAIL;
358
	file_state_t *fp;
359
360
	size_t file_offset;
	size_t bytes_read;
361
	uintptr_t backend_handle;
362
363

	assert(entity != NULL);
364
	assert(buffer != (uintptr_t)NULL);
365
	assert(length_read != NULL);
366
	assert(entity->info != (uintptr_t)NULL);
367
368
369
370
371

	/* Open the backend, attempt to access the blob image */
	result = io_open(backend_dev_handle, backend_image_spec,
			 &backend_handle);
	if (result != IO_SUCCESS) {
372
		WARN("Failed to open FIP (%i)\n", result);
373
374
375
376
		result = IO_FAIL;
		goto fip_file_read_exit;
	}

377
	fp = (file_state_t *)entity->info;
378
379
380
381
382

	/* Seek to the position in the FIP where the payload lives */
	file_offset = fp->entry.offset_address + fp->file_pos;
	result = io_seek(backend_handle, IO_SEEK_SET, file_offset);
	if (result != IO_SUCCESS) {
383
		WARN("fip_file_read: failed to seek\n");
384
385
386
387
388
389
390
		result = IO_FAIL;
		goto fip_file_read_close;
	}

	result = io_read(backend_handle, buffer, length, &bytes_read);
	if (result != IO_SUCCESS) {
		/* We cannot read our data. Fail. */
391
		WARN("Failed to read payload (%i)\n", result);
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
		result = IO_FAIL;
		goto fip_file_read_close;
	} else {
		/* Set caller length and new file position. */
		*length_read = bytes_read;
		fp->file_pos += bytes_read;
	}

/* Close the backend. */
 fip_file_read_close:
	io_close(backend_handle);

 fip_file_read_exit:
	return result;
}


/* Close a file in package */
410
static int fip_file_close(io_entity_t *entity)
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
{
	/* Clear our current file pointer.
	 * If we had malloc() we would free() here.
	 */
	if (current_file.entry.offset_address != 0) {
		memset(&current_file, 0, sizeof(current_file));
	}

	/* Clear the Entity info. */
	entity->info = 0;

	return IO_SUCCESS;
}

/* Exported functions */

/* Register the Firmware Image Package driver with the IO abstraction */
428
int register_io_dev_fip(const io_dev_connector_t **dev_con)
429
430
431
432
433
434
435
436
437
438
{
	int result = IO_FAIL;
	assert(dev_con != NULL);

	result = io_register_device(&fip_dev_info);
	if (result == IO_SUCCESS)
		*dev_con = &fip_dev_connector;

	return result;
}