rv1126-uboot/drivers/usb/gadget/f_fastboot.c

1202 lines
30 KiB
C

/*
* (C) Copyright 2008 - 2009
* Windriver, <www.windriver.com>
* Tom Rix <Tom.Rix@windriver.com>
*
* Copyright 2011 Sebastian Andrzej Siewior <bigeasy@linutronix.de>
*
* Copyright 2014 Linaro, Ltd.
* Rob Herring <robh@kernel.org>
*
* SPDX-License-Identifier: GPL-2.0+
*/
#include <config.h>
#include <common.h>
#include <errno.h>
#include <fastboot.h>
#include <malloc.h>
#include <linux/usb/ch9.h>
#include <linux/usb/gadget.h>
#include <linux/usb/composite.h>
#include <linux/compiler.h>
#include <version.h>
#include <g_dnl.h>
#include <android_avb/avb_ops_user.h>
#include <android_avb/rk_avb_ops_user.h>
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
#include <fb_mmc.h>
#endif
#ifdef CONFIG_FASTBOOT_FLASH_NAND_DEV
#include <fb_nand.h>
#endif
#ifdef CONFIG_OPTEE_CLIENT
#include <optee_include/OpteeClientInterface.h>
#endif
#define FASTBOOT_VERSION "0.4"
#define FASTBOOT_INTERFACE_CLASS 0xff
#define FASTBOOT_INTERFACE_SUB_CLASS 0x42
#define FASTBOOT_INTERFACE_PROTOCOL 0x03
#define RX_ENDPOINT_MAXIMUM_PACKET_SIZE_2_0 (0x0200)
#define RX_ENDPOINT_MAXIMUM_PACKET_SIZE_1_1 (0x0040)
#define TX_ENDPOINT_MAXIMUM_PACKET_SIZE (0x0040)
#define EP_BUFFER_SIZE 4096
/*
* EP_BUFFER_SIZE must always be an integral multiple of maxpacket size
* (64 or 512 or 1024), else we break on certain controllers like DWC3
* that expect bulk OUT requests to be divisible by maxpacket size.
*/
struct f_fastboot {
struct usb_function usb_function;
/* IN/OUT EP's and corresponding requests */
struct usb_ep *in_ep, *out_ep;
struct usb_request *in_req, *out_req;
};
static inline struct f_fastboot *func_to_fastboot(struct usb_function *f)
{
return container_of(f, struct f_fastboot, usb_function);
}
static struct f_fastboot *fastboot_func;
static unsigned int download_size;
static unsigned int download_bytes;
static unsigned int upload_size;
static unsigned int upload_bytes;
static bool start_upload;
static struct usb_endpoint_descriptor fs_ep_in = {
.bLength = USB_DT_ENDPOINT_SIZE,
.bDescriptorType = USB_DT_ENDPOINT,
.bEndpointAddress = USB_DIR_IN,
.bmAttributes = USB_ENDPOINT_XFER_BULK,
.wMaxPacketSize = cpu_to_le16(64),
};
static struct usb_endpoint_descriptor fs_ep_out = {
.bLength = USB_DT_ENDPOINT_SIZE,
.bDescriptorType = USB_DT_ENDPOINT,
.bEndpointAddress = USB_DIR_OUT,
.bmAttributes = USB_ENDPOINT_XFER_BULK,
.wMaxPacketSize = cpu_to_le16(64),
};
static struct usb_endpoint_descriptor hs_ep_in = {
.bLength = USB_DT_ENDPOINT_SIZE,
.bDescriptorType = USB_DT_ENDPOINT,
.bEndpointAddress = USB_DIR_IN,
.bmAttributes = USB_ENDPOINT_XFER_BULK,
.wMaxPacketSize = cpu_to_le16(512),
};
static struct usb_endpoint_descriptor hs_ep_out = {
.bLength = USB_DT_ENDPOINT_SIZE,
.bDescriptorType = USB_DT_ENDPOINT,
.bEndpointAddress = USB_DIR_OUT,
.bmAttributes = USB_ENDPOINT_XFER_BULK,
.wMaxPacketSize = cpu_to_le16(512),
};
static struct usb_interface_descriptor interface_desc = {
.bLength = USB_DT_INTERFACE_SIZE,
.bDescriptorType = USB_DT_INTERFACE,
.bInterfaceNumber = 0x00,
.bAlternateSetting = 0x00,
.bNumEndpoints = 0x02,
.bInterfaceClass = FASTBOOT_INTERFACE_CLASS,
.bInterfaceSubClass = FASTBOOT_INTERFACE_SUB_CLASS,
.bInterfaceProtocol = FASTBOOT_INTERFACE_PROTOCOL,
};
static struct usb_descriptor_header *fb_fs_function[] = {
(struct usb_descriptor_header *)&interface_desc,
(struct usb_descriptor_header *)&fs_ep_in,
(struct usb_descriptor_header *)&fs_ep_out,
};
static struct usb_descriptor_header *fb_hs_function[] = {
(struct usb_descriptor_header *)&interface_desc,
(struct usb_descriptor_header *)&hs_ep_in,
(struct usb_descriptor_header *)&hs_ep_out,
NULL,
};
static struct usb_endpoint_descriptor *
fb_ep_desc(struct usb_gadget *g, struct usb_endpoint_descriptor *fs,
struct usb_endpoint_descriptor *hs)
{
if (gadget_is_dualspeed(g) && g->speed == USB_SPEED_HIGH)
return hs;
return fs;
}
/*
* static strings, in UTF-8
*/
static const char fastboot_name[] = "Android Fastboot";
static struct usb_string fastboot_string_defs[] = {
[0].s = fastboot_name,
{ } /* end of list */
};
static struct usb_gadget_strings stringtab_fastboot = {
.language = 0x0409, /* en-us */
.strings = fastboot_string_defs,
};
static struct usb_gadget_strings *fastboot_strings[] = {
&stringtab_fastboot,
NULL,
};
static void rx_handler_command(struct usb_ep *ep, struct usb_request *req);
static int strcmp_l1(const char *s1, const char *s2);
static void fastboot_complete(struct usb_ep *ep, struct usb_request *req)
{
int status = req->status;
if (!status)
return;
printf("status: %d ep '%s' trans: %d\n", status, ep->name, req->actual);
}
static int fastboot_bind(struct usb_configuration *c, struct usb_function *f)
{
int id;
struct usb_gadget *gadget = c->cdev->gadget;
struct f_fastboot *f_fb = func_to_fastboot(f);
const char *s;
/* DYNAMIC interface numbers assignments */
id = usb_interface_id(c, f);
if (id < 0)
return id;
interface_desc.bInterfaceNumber = id;
id = usb_string_id(c->cdev);
if (id < 0)
return id;
fastboot_string_defs[0].id = id;
interface_desc.iInterface = id;
f_fb->in_ep = usb_ep_autoconfig(gadget, &fs_ep_in);
if (!f_fb->in_ep)
return -ENODEV;
f_fb->in_ep->driver_data = c->cdev;
f_fb->out_ep = usb_ep_autoconfig(gadget, &fs_ep_out);
if (!f_fb->out_ep)
return -ENODEV;
f_fb->out_ep->driver_data = c->cdev;
f->descriptors = fb_fs_function;
if (gadget_is_dualspeed(gadget)) {
/* Assume endpoint addresses are the same for both speeds */
hs_ep_in.bEndpointAddress = fs_ep_in.bEndpointAddress;
hs_ep_out.bEndpointAddress = fs_ep_out.bEndpointAddress;
/* copy HS descriptors */
f->hs_descriptors = fb_hs_function;
}
s = env_get("serial#");
if (s)
g_dnl_set_serialnumber((char *)s);
return 0;
}
static void fastboot_unbind(struct usb_configuration *c, struct usb_function *f)
{
memset(fastboot_func, 0, sizeof(*fastboot_func));
}
static void fastboot_disable(struct usb_function *f)
{
struct f_fastboot *f_fb = func_to_fastboot(f);
usb_ep_disable(f_fb->out_ep);
usb_ep_disable(f_fb->in_ep);
if (f_fb->out_req) {
free(f_fb->out_req->buf);
usb_ep_free_request(f_fb->out_ep, f_fb->out_req);
f_fb->out_req = NULL;
}
if (f_fb->in_req) {
free(f_fb->in_req->buf);
usb_ep_free_request(f_fb->in_ep, f_fb->in_req);
f_fb->in_req = NULL;
}
}
static struct usb_request *fastboot_start_ep(struct usb_ep *ep)
{
struct usb_request *req;
req = usb_ep_alloc_request(ep, 0);
if (!req)
return NULL;
req->length = EP_BUFFER_SIZE;
req->buf = memalign(CONFIG_SYS_CACHELINE_SIZE, EP_BUFFER_SIZE);
if (!req->buf) {
usb_ep_free_request(ep, req);
return NULL;
}
memset(req->buf, 0, req->length);
return req;
}
static int fastboot_set_alt(struct usb_function *f,
unsigned interface, unsigned alt)
{
int ret;
struct usb_composite_dev *cdev = f->config->cdev;
struct usb_gadget *gadget = cdev->gadget;
struct f_fastboot *f_fb = func_to_fastboot(f);
const struct usb_endpoint_descriptor *d;
debug("%s: func: %s intf: %d alt: %d\n",
__func__, f->name, interface, alt);
d = fb_ep_desc(gadget, &fs_ep_out, &hs_ep_out);
ret = usb_ep_enable(f_fb->out_ep, d);
if (ret) {
puts("failed to enable out ep\n");
return ret;
}
f_fb->out_req = fastboot_start_ep(f_fb->out_ep);
if (!f_fb->out_req) {
puts("failed to alloc out req\n");
ret = -EINVAL;
goto err;
}
f_fb->out_req->complete = rx_handler_command;
d = fb_ep_desc(gadget, &fs_ep_in, &hs_ep_in);
ret = usb_ep_enable(f_fb->in_ep, d);
if (ret) {
puts("failed to enable in ep\n");
goto err;
}
f_fb->in_req = fastboot_start_ep(f_fb->in_ep);
if (!f_fb->in_req) {
puts("failed alloc req in\n");
ret = -EINVAL;
goto err;
}
f_fb->in_req->complete = fastboot_complete;
ret = usb_ep_queue(f_fb->out_ep, f_fb->out_req, 0);
if (ret)
goto err;
return 0;
err:
fastboot_disable(f);
return ret;
}
static int fastboot_add(struct usb_configuration *c)
{
struct f_fastboot *f_fb = fastboot_func;
int status;
debug("%s: cdev: 0x%p\n", __func__, c->cdev);
if (!f_fb) {
f_fb = memalign(CONFIG_SYS_CACHELINE_SIZE, sizeof(*f_fb));
if (!f_fb)
return -ENOMEM;
fastboot_func = f_fb;
memset(f_fb, 0, sizeof(*f_fb));
}
f_fb->usb_function.name = "f_fastboot";
f_fb->usb_function.bind = fastboot_bind;
f_fb->usb_function.unbind = fastboot_unbind;
f_fb->usb_function.set_alt = fastboot_set_alt;
f_fb->usb_function.disable = fastboot_disable;
f_fb->usb_function.strings = fastboot_strings;
status = usb_add_function(c, &f_fb->usb_function);
if (status) {
free(f_fb);
fastboot_func = f_fb;
}
return status;
}
DECLARE_GADGET_BIND_CALLBACK(usb_dnl_fastboot, fastboot_add);
static int fastboot_tx_write(const char *buffer, unsigned int buffer_size)
{
struct usb_request *in_req = fastboot_func->in_req;
int ret;
memcpy(in_req->buf, buffer, buffer_size);
in_req->length = buffer_size;
usb_ep_dequeue(fastboot_func->in_ep, in_req);
ret = usb_ep_queue(fastboot_func->in_ep, in_req, 0);
if (ret)
printf("Error %d on queue\n", ret);
return 0;
}
static int fastboot_tx_write_str(const char *buffer)
{
return fastboot_tx_write(buffer, strlen(buffer));
}
static void compl_do_reset(struct usb_ep *ep, struct usb_request *req)
{
do_reset(NULL, 0, 0, NULL);
}
int __weak fb_set_reboot_flag(void)
{
return -ENOSYS;
}
static void cb_reboot(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
if (!strcmp_l1("reboot-bootloader", cmd)) {
if (fb_set_reboot_flag()) {
fastboot_tx_write_str("FAILCannot set reboot flag");
return;
}
}
fastboot_func->in_req->complete = compl_do_reset;
fastboot_tx_write_str("OKAY");
}
static int strcmp_l1(const char *s1, const char *s2)
{
if (!s1 || !s2)
return -1;
return strncmp(s1, s2, strlen(s1));
}
static void cb_getvar(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
char response[FASTBOOT_RESPONSE_LEN];
const char *s;
size_t chars_left;
strcpy(response, "OKAY");
chars_left = sizeof(response) - strlen(response) - 1;
strsep(&cmd, ":");
if (!cmd) {
pr_err("missing variable");
fastboot_tx_write_str("FAILmissing var");
return;
}
if (!strcmp_l1("version", cmd)) {
strncat(response, FASTBOOT_VERSION, chars_left);
} else if (!strcmp_l1("bootloader-version", cmd)) {
strncat(response, U_BOOT_VERSION, chars_left);
} else if (!strcmp_l1("product", cmd)) {
strncat(response, CONFIG_SYS_BOARD, chars_left);
} else if (!strcmp_l1("variant", cmd)) {
strncat(response, "userdebug", chars_left);
} else if (!strcmp_l1("secure", cmd)) {
strncat(response, "no", chars_left);
} else if (!strcmp_l1("unlocked", cmd)) {
strncat(response, "yes", chars_left);
} else if (!strcmp_l1("off-mode-charge", cmd)) {
strncat(response, "0", chars_left);
} else if (!strcmp_l1("battery-voltage", cmd)) {
strncat(response, "7.4", chars_left);
} else if (!strcmp_l1("battery-soc-ok", cmd)) {
strncat(response, "yes", chars_left);
} else if (!strcmp_l1("downloadsize", cmd) ||
!strcmp_l1("max-download-size", cmd)) {
char str_num[12];
sprintf(str_num, "0x%08x", CONFIG_FASTBOOT_BUF_SIZE);
strncat(response, str_num, chars_left);
} else if (!strcmp_l1("serialno", cmd)) {
s = env_get("serial#");
if (s)
strncat(response, s, chars_left);
else
strcpy(response, "FAILValue not set");
} else if (strncmp("at-attest-dh", cmd, 12) == 0) {
#ifdef CONFIG_OPTEE_CLIENT
char dhbuf[8];
uint32_t dh_len = 8;
uint32_t res = trusty_attest_dh((uint8_t *)dhbuf, &dh_len);
if (res)
strcpy(response, "FAILdh not set");
else
strncat(response, dhbuf, chars_left);
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (strncmp("at-attest-uuid", cmd, 14) == 0) {
#ifdef CONFIG_OPTEE_CLIENT
char uuid[32] = {0};
uint32_t uuid_len = 32;
uint32_t res = trusty_attest_uuid((uint8_t *)uuid, &uuid_len);
if (res)
strcpy(response, "FAILuuid not set");
else
strncat(response, uuid, chars_left);
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (strncmp("at-vboot-state", cmd, 14) == 0) {
char uuid[32] = {0};
strncat(response, uuid, chars_left);
} else if (!strcmp_l1("slot-count", cmd)) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
char slot_count[2];
char temp;
slot_count[1] = '\0';
rk_avb_read_slot_count(&temp);
slot_count[0] = temp + 0x30;
strncat(response, slot_count, chars_left);
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (!strcmp_l1("current-slot", cmd)) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
char slot_surrent[8] = {0};
if (!rk_avb_get_current_slot(slot_surrent))
strncat(response, slot_surrent+1, chars_left);
else
strcpy(response, "FAILgeterror");
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (!strcmp_l1("slot-suffixes", cmd)) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
char slot_suffixes_temp[4];
char slot_suffixes[9];
int slot_cnt = 0;
memset(slot_suffixes_temp, 0, 4);
memset(slot_suffixes, 0, 9);
rk_avb_read_slot_suffixes(slot_suffixes_temp);
while (slot_suffixes_temp[slot_cnt] != '\0') {
slot_suffixes[slot_cnt * 2]
= slot_suffixes_temp[slot_cnt];
slot_suffixes[slot_cnt * 2 + 1] = ',';
slot_cnt++;
}
strncat(response, slot_suffixes, chars_left);
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (!strncmp("has-slot", cmd, 8)) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
char *part_name = cmd;
cmd = strsep(&part_name, ":");
if (!strcmp(part_name, "boot") ||
!strcmp(part_name, "system") ||
!strcmp(part_name, "vendor") ||
!strcmp(part_name, "vbmeta") ||
!strcmp(part_name, "oem")) {
strncat(response, "yes", chars_left);
} else {
strcpy(response, "FAILno");
}
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (!strncmp("slot-unbootable", cmd, 15)) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
char *slot_name = cmd;
cmd = strsep(&slot_name, ":");
if (!strcmp(slot_name, "a") ||
!strcmp(slot_name, "b")) {
strncat(response, "no", chars_left);
} else {
strcpy(response, "FAILno");
}
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (!strncmp("slot-successful", cmd, 15)) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
char *slot_name = cmd;
cmd = strsep(&slot_name, ":");
if (!strcmp(slot_name, "a") ||
!strcmp(slot_name, "b")) {
strncat(response, "no", chars_left);
} else {
strcpy(response, "FAILno");
}
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (!strncmp("slot-retry-count", cmd, 16)) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
char *slot_name = cmd;
char count[10] = {0};
static int cnt[2] = {0};
cmd = strsep(&slot_name, ":");
if (!strcmp(slot_name, "a")) {
sprintf(count, "%c", 0x30+cnt[0]);
strncat(response, count, chars_left);
if (cnt[0] > 0)
cnt[0]--;
} else if (!strcmp(slot_name, "b")) {
sprintf(count, "%c", 0x30+cnt[1]);
strncat(response, count, chars_left);
if (cnt[1] > 0)
cnt[1]--;
} else {
strcpy(response, "FAILno");
}
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (!strncmp("partition-type", cmd, 14) ||
!strncmp("partition-size", cmd, 14)) {
disk_partition_t part_info;
struct blk_desc *dev_desc;
char *part_name = cmd;
char part_size_str[20];
cmd = strsep(&part_name, ":");
dev_desc = blk_get_dev("mmc", 0);
if (!dev_desc) {
strcpy(response, "FAILblock device not found");
} else if (part_get_info_by_name(dev_desc, part_name, &part_info) < 0) {
strcpy(response, "FAILpartition not found");
} else if (!strncmp("partition-type", cmd, 14)) {
strncat(response, (char *)part_info.type, chars_left);
} else if (!strncmp("partition-size", cmd, 14)) {
sprintf(part_size_str, "0x%016x", (int)part_info.size);
strncat(response, part_size_str, chars_left);
}
} else {
char *envstr;
envstr = malloc(strlen("fastboot.") + strlen(cmd) + 1);
if (!envstr) {
fastboot_tx_write_str("FAILmalloc error");
return;
}
sprintf(envstr, "fastboot.%s", cmd);
s = env_get(envstr);
if (s) {
strncat(response, s, chars_left);
} else {
printf("WARNING: unknown variable: %s\n", cmd);
strcpy(response, "FAILVariable not implemented");
}
free(envstr);
}
fastboot_tx_write_str(response);
}
static unsigned int rx_bytes_expected(struct usb_ep *ep)
{
int rx_remain = download_size - download_bytes;
unsigned int rem;
unsigned int maxpacket = ep->maxpacket;
if (rx_remain <= 0)
return 0;
else if (rx_remain > EP_BUFFER_SIZE)
return EP_BUFFER_SIZE;
/*
* Some controllers e.g. DWC3 don't like OUT transfers to be
* not ending in maxpacket boundary. So just make them happy by
* always requesting for integral multiple of maxpackets.
* This shouldn't bother controllers that don't care about it.
*/
rem = rx_remain % maxpacket;
if (rem > 0)
rx_remain = rx_remain + (maxpacket - rem);
return rx_remain;
}
#define BYTES_PER_DOT 0x20000
static void rx_handler_dl_image(struct usb_ep *ep, struct usb_request *req)
{
char response[FASTBOOT_RESPONSE_LEN];
unsigned int transfer_size = download_size - download_bytes;
const unsigned char *buffer = req->buf;
unsigned int buffer_size = req->actual;
unsigned int pre_dot_num, now_dot_num;
if (req->status != 0) {
printf("Bad status: %d\n", req->status);
return;
}
if (buffer_size < transfer_size)
transfer_size = buffer_size;
memcpy((void *)CONFIG_FASTBOOT_BUF_ADDR + download_bytes,
buffer, transfer_size);
pre_dot_num = download_bytes / BYTES_PER_DOT;
download_bytes += transfer_size;
now_dot_num = download_bytes / BYTES_PER_DOT;
if (pre_dot_num != now_dot_num) {
putc('.');
if (!(now_dot_num % 74))
putc('\n');
}
/* Check if transfer is done */
if (download_bytes >= download_size) {
/*
* Reset global transfer variable, keep download_bytes because
* it will be used in the next possible flashing command
*/
download_size = 0;
req->complete = rx_handler_command;
req->length = EP_BUFFER_SIZE;
strcpy(response, "OKAY");
fastboot_tx_write_str(response);
printf("\ndownloading of %d bytes finished\n", download_bytes);
} else {
req->length = rx_bytes_expected(ep);
}
req->actual = 0;
usb_ep_queue(ep, req, 0);
}
static void cb_download(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
char response[FASTBOOT_RESPONSE_LEN];
strsep(&cmd, ":");
download_size = simple_strtoul(cmd, NULL, 16);
download_bytes = 0;
printf("Starting download of %d bytes\n", download_size);
if (0 == download_size) {
strcpy(response, "FAILdata invalid size");
} else if (download_size > CONFIG_FASTBOOT_BUF_SIZE) {
download_size = 0;
strcpy(response, "FAILdata too large");
} else {
sprintf(response, "DATA%08x", download_size);
req->complete = rx_handler_dl_image;
req->length = rx_bytes_expected(ep);
}
fastboot_tx_write_str(response);
}
static void tx_handler_ul(struct usb_ep *ep, struct usb_request *req)
{
unsigned int xfer_size = 0;
unsigned int pre_dot_num, now_dot_num;
unsigned int remain_size = 0;
unsigned int transferred_size = req->actual;
if (req->status != 0) {
printf("Bad status: %d\n", req->status);
return;
}
if (start_upload) {
pre_dot_num = upload_bytes / BYTES_PER_DOT;
upload_bytes += transferred_size;
now_dot_num = upload_bytes / BYTES_PER_DOT;
if (pre_dot_num != now_dot_num) {
putc('.');
if (!(now_dot_num % 74))
putc('\n');
}
}
remain_size = upload_size - upload_bytes;
xfer_size = (remain_size > EP_BUFFER_SIZE) ?
EP_BUFFER_SIZE : remain_size;
debug("%s: remain_size=%d, transferred_size=%d",
__func__, remain_size, transferred_size);
debug("xfer_size=%d, upload_bytes=%d, upload_size=%d!\n",
xfer_size, upload_bytes, upload_size);
if (remain_size <= 0) {
fastboot_func->in_req->complete = fastboot_complete;
fastboot_tx_write_str("OKAY");
printf("\nuploading of %d bytes finished\n", upload_bytes);
upload_bytes = 0;
upload_size = 0;
start_upload = false;
return;
}
/* Remove the transfer callback which response the upload */
/* request from host */
if (!upload_bytes)
start_upload = true;
fastboot_tx_write((char *)((phys_addr_t)CONFIG_FASTBOOT_BUF_ADDR + \
upload_bytes),
xfer_size);
}
static void cb_upload(struct usb_ep *ep, struct usb_request *req)
{
char response[FASTBOOT_RESPONSE_LEN];
printf("Starting upload of %d bytes\n", upload_size);
if (0 == upload_size) {
strcpy(response, "FAILdata invalid size");
} else {
start_upload = false;
sprintf(response, "DATA%08x", upload_size);
fastboot_func->in_req->complete = tx_handler_ul;
}
fastboot_tx_write_str(response);
}
static void do_bootm_on_complete(struct usb_ep *ep, struct usb_request *req)
{
char boot_addr_start[12];
char *bootm_args[] = { "bootm", boot_addr_start, NULL };
puts("Booting kernel..\n");
sprintf(boot_addr_start, "0x%lx", (long)CONFIG_FASTBOOT_BUF_ADDR);
do_bootm(NULL, 0, 2, bootm_args);
/* This only happens if image is somehow faulty so we start over */
do_reset(NULL, 0, 0, NULL);
}
static void cb_boot(struct usb_ep *ep, struct usb_request *req)
{
fastboot_func->in_req->complete = do_bootm_on_complete;
fastboot_tx_write_str("OKAY");
}
static void do_exit_on_complete(struct usb_ep *ep, struct usb_request *req)
{
g_dnl_trigger_detach();
}
static void cb_continue(struct usb_ep *ep, struct usb_request *req)
{
fastboot_func->in_req->complete = do_exit_on_complete;
fastboot_tx_write_str("OKAY");
}
static void cb_set_active(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
debug("%s: %s\n", __func__, cmd);
strsep(&cmd, ":");
if (!cmd) {
pr_err("missing slot name");
fastboot_tx_write_str("FAIL: missing slot name");
return;
}
#ifdef CONFIG_RK_AVB_LIBAVB_USER
unsigned int slot_number;
if (strncmp("a", cmd, 1) == 0) {
slot_number = 0;
rk_avb_set_slot_active(&slot_number);
} else if (strncmp("b", cmd, 1) == 0) {
slot_number = 1;
rk_avb_set_slot_active(&slot_number);
} else {
fastboot_tx_write_str("FAIL: unkown slot name");
return;
}
fastboot_tx_write_str("OKAY");
return;
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
}
#ifdef CONFIG_FASTBOOT_FLASH
static void cb_flash(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
char response[FASTBOOT_RESPONSE_LEN] = {0};
#ifdef CONFIG_RK_AVB_LIBAVB_USER
uint8_t flash_lock_state;
if (rk_avb_read_flash_lock_state(&flash_lock_state)) {
fastboot_tx_write_str("FAIL");
return;
}
if (flash_lock_state == 0) {
fastboot_tx_write_str("FAILThe device is locked, can not flash!");
printf("The device is locked, can not flash!\n");
return;
}
#endif
strsep(&cmd, ":");
if (!cmd) {
pr_err("missing partition name");
fastboot_tx_write_str("FAILmissing partition name");
return;
}
fastboot_fail("no flash device defined", response);
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
fb_mmc_flash_write(cmd, (void *)CONFIG_FASTBOOT_BUF_ADDR,
download_bytes, response);
#endif
#ifdef CONFIG_FASTBOOT_FLASH_NAND_DEV
fb_nand_flash_write(cmd, (void *)CONFIG_FASTBOOT_BUF_ADDR,
download_bytes, response);
#endif
fastboot_tx_write_str(response);
}
static void cb_flashing(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
if (strncmp("lock", cmd + 9, 4) == 0) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
uint8_t flash_lock_state;
flash_lock_state = 0;
if (rk_avb_write_flash_lock_state(flash_lock_state))
fastboot_tx_write_str("FAIL");
else
fastboot_tx_write_str("OKAY");
#else
fastboot_tx_write_str("FAILnot implemented");
#endif
} else if (strncmp("unlock", cmd + 9, 6) == 0) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
uint8_t flash_lock_state;
flash_lock_state = 1;
if (rk_avb_write_flash_lock_state(flash_lock_state))
fastboot_tx_write_str("FAIL");
else
fastboot_tx_write_str("OKAY");
#else
fastboot_tx_write_str("FAILnot implemented");
#endif
} else if (strncmp("lock_critical", cmd + 9, 12) == 0) {
fastboot_tx_write_str("FAILnot implemented");
} else if (strncmp("unlock_critical", cmd + 9, 14) == 0) {
fastboot_tx_write_str("FAILnot implemented");
} else if (strncmp("get_unlock_ability", cmd + 9, 17) == 0) {
fastboot_tx_write_str("FAILnot implemented");
} else if (strncmp("get_unlock_bootloader_nonce", cmd + 4, 27) == 0) {
fastboot_tx_write_str("FAILnot implemented");
} else if (strncmp("unlock_bootloader", cmd + 9, 17) == 0) {
fastboot_tx_write_str("FAILnot implemented");
} else if (strncmp("lock_bootloader", cmd + 9, 15) == 0) {
fastboot_tx_write_str("FAILnot implemented");
} else {
fastboot_tx_write_str("FAILunknown flashing command");
}
}
#endif
static void cb_oem(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
if (strncmp("format", cmd + 4, 6) == 0) {
char cmdbuf[32];
sprintf(cmdbuf, "gpt write mmc %x $partitions",
CONFIG_FASTBOOT_FLASH_MMC_DEV);
if (run_command(cmdbuf, 0))
fastboot_tx_write_str("FAIL");
else
fastboot_tx_write_str("OKAY");
} else
#endif
if (strncmp("unlock", cmd + 4, 8) == 0) {
fastboot_tx_write_str("FAILnot implemented");
} else if (strncmp("at-get-ca-request", cmd + 4, 17) == 0) {
#ifdef CONFIG_OPTEE_CLIENT
uint8_t operation_start[128];
uint8_t out[256];
uint32_t operation_size = download_bytes;
uint32_t out_len = 256;
uint32_t res = 0;
memcpy(operation_start, (void *)CONFIG_FASTBOOT_BUF_ADDR, download_bytes);
res = trusty_attest_get_ca(operation_start, &operation_size, out, &out_len);
if (res) {
fastboot_tx_write_str("FAILtrusty_attest_get_ca failed");
return;
}
upload_size = out_len;
memcpy((void *)CONFIG_FASTBOOT_BUF_ADDR, out, out_len);
fastboot_tx_write_str("OKAY");
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (strncmp("at-set-ca-response", cmd + 4, 18) == 0) {
#ifdef CONFIG_OPTEE_CLIENT
uint8_t ca_response[8*1024];
uint32_t ca_response_size = download_bytes;
uint32_t res = 0;
memcpy(ca_response, (void *)CONFIG_FASTBOOT_BUF_ADDR, download_bytes);
res = trusty_attest_set_ca(ca_response, &ca_response_size);
if (res) {
fastboot_tx_write_str("FAILtrusty_attest_set_ca failed");
} else {
fastboot_tx_write_str("OKAY");
}
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (strncmp("at-lock-vboot", cmd + 4, 13) == 0) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
uint8_t lock_state;
lock_state = 0;
if (rk_avb_write_lock_state(lock_state))
fastboot_tx_write_str("FAIL");
else
fastboot_tx_write_str("OKAY");
#else
fastboot_tx_write_str("FAILnot implemented");
#endif
} else if (strncmp("at-unlock-vboot", cmd + 4, 15) == 0) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
uint8_t lock_state;
if (rk_avb_read_lock_state(&lock_state))
fastboot_tx_write_str("FAIL");
if (lock_state >> 1 == 1) {
fastboot_tx_write_str("FAILThe vboot is disable!");
} else {
lock_state = 1;
if (rk_avb_write_lock_state(lock_state))
fastboot_tx_write_str("FAIL");
else
fastboot_tx_write_str("OKAY");
}
#else
fastboot_tx_write_str("FAILnot implemented");
#endif
} else if (strncmp("at-disable-unlock-vboot", cmd + 4, 23) == 0) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
uint8_t lock_state;
lock_state = 2;
if (rk_avb_write_lock_state(lock_state))
fastboot_tx_write_str("FAIL");
else
fastboot_tx_write_str("OKAY");
#else
fastboot_tx_write_str("FAILnot implemented");
#endif
} else if (strncmp("fuse at-perm-attr", cmd + 4, 16) == 0) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
if (PERM_ATTR_TOTAL_SIZE != download_bytes) {
printf("Permanent attribute size is not equal!\n");
fastboot_tx_write_str("FAIL");
return;
}
if (rk_avb_write_permanent_attributes((uint8_t *)(size_t)
CONFIG_FASTBOOT_BUF_ADDR,
download_bytes
- PERM_ATTR_DIGEST_SIZE)) {
fastboot_tx_write_str("FAIL");
return;
}
if (rk_avb_write_attribute_hash((uint8_t *)(size_t)
(CONFIG_FASTBOOT_BUF_ADDR
+ download_bytes
- PERM_ATTR_DIGEST_SIZE),
PERM_ATTR_DIGEST_SIZE)) {
fastboot_tx_write_str("FAIL");
return;
}
if (rk_avb_write_perm_attr_flag(1)) {
fastboot_tx_write_str("FAIL");
return;
}
fastboot_tx_write_str("OKAY");
#else
fastboot_tx_write_str("FAILnot implemented");
#endif
} else if (strncmp("fuse at-bootloader-vboot-key", cmd + 4, 27) == 0) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
if (download_bytes != VBOOT_KEY_HASH_SIZE) {
fastboot_tx_write_str("FAIL");
printf("The vboot key size error!\n");
}
if (rk_avb_write_vbootkey_hash((uint8_t *)
CONFIG_FASTBOOT_BUF_ADDR,
VBOOT_KEY_HASH_SIZE)) {
fastboot_tx_write_str("FAIL");
return;
}
fastboot_tx_write_str("OKAY");
#else
fastboot_tx_write_str("FAILnot implemented");
#endif
} else {
fastboot_tx_write_str("FAILunknown oem command");
}
}
#ifdef CONFIG_FASTBOOT_FLASH
static void cb_erase(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
char response[FASTBOOT_RESPONSE_LEN];
strsep(&cmd, ":");
if (!cmd) {
pr_err("missing partition name");
fastboot_tx_write_str("FAILmissing partition name");
return;
}
fastboot_fail("no flash device defined", response);
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
fb_mmc_erase(cmd, response);
#endif
#ifdef CONFIG_FASTBOOT_FLASH_NAND_DEV
fb_nand_erase(cmd, response);
#endif
fastboot_tx_write_str(response);
}
#endif
struct cmd_dispatch_info {
char *cmd;
void (*cb)(struct usb_ep *ep, struct usb_request *req);
};
static const struct cmd_dispatch_info cmd_dispatch_info[] = {
{
.cmd = "reboot",
.cb = cb_reboot,
}, {
.cmd = "getvar:",
.cb = cb_getvar,
}, {
.cmd = "download:",
.cb = cb_download,
}, {
.cmd = "upload",
.cb = cb_upload,
}, {
.cmd = "boot",
.cb = cb_boot,
}, {
.cmd = "continue",
.cb = cb_continue,
}, {
.cmd = "set_active",
.cb = cb_set_active,
},
#ifdef CONFIG_FASTBOOT_FLASH
{
.cmd = "flashing",
.cb = cb_flashing,
},
{
.cmd = "flash",
.cb = cb_flash,
}, {
.cmd = "erase",
.cb = cb_erase,
},
#endif
{
.cmd = "oem",
.cb = cb_oem,
},
};
static void rx_handler_command(struct usb_ep *ep, struct usb_request *req)
{
char *cmdbuf = req->buf;
void (*func_cb)(struct usb_ep *ep, struct usb_request *req) = NULL;
int i;
if (req->status != 0 || req->length == 0)
return;
for (i = 0; i < ARRAY_SIZE(cmd_dispatch_info); i++) {
if (!strcmp_l1(cmd_dispatch_info[i].cmd, cmdbuf)) {
func_cb = cmd_dispatch_info[i].cb;
break;
}
}
if (!func_cb) {
pr_err("unknown command: %.*s", req->actual, cmdbuf);
fastboot_tx_write_str("FAILunknown command");
} else {
if (req->actual < req->length) {
u8 *buf = (u8 *)req->buf;
buf[req->actual] = 0;
func_cb(ep, req);
} else {
pr_err("buffer overflow");
fastboot_tx_write_str("FAILbuffer overflow");
}
}
*cmdbuf = '\0';
req->actual = 0;
usb_ep_queue(ep, req, 0);
}