rk3568_ubuntu_r60_v1.3.2/u-boot/drivers/usb/gadget/f_fastboot.c
2023-11-03 06:12:44 +00:00

2401 lines
59 KiB
C

/*
* (C) Copyright 2008 - 2009
* Windriver, <www.windriver.com>
* Tom Rix <Tom.Rix@windriver.com>
*
* Copyright 2011 Sebastian Andrzej Siewior <bigeasy@linutronix.de>
*
* Copyright 2014 Linaro, Ltd.
* Rob Herring <robh@kernel.org>
*
* SPDX-License-Identifier: GPL-2.0+
*/
#include <config.h>
#include <common.h>
#include <console.h>
#include <android_bootloader.h>
#include <errno.h>
#include <fastboot.h>
#include <malloc.h>
#include <linux/usb/ch9.h>
#include <linux/usb/gadget.h>
#include <linux/usb/composite.h>
#include <linux/compiler.h>
#include <u-boot/sha256.h>
#include <version.h>
#include <g_dnl.h>
#include <fs.h>
#include <android_avb/avb_ops_user.h>
#include <android_avb/rk_avb_ops_user.h>
#include <dm/uclass.h>
#include <power/fuel_gauge.h>
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
#include <fb_mmc.h>
#endif
#ifdef CONFIG_FASTBOOT_FLASH_NAND_DEV
#include <fb_nand.h>
#endif
#ifdef CONFIG_OPTEE_CLIENT
#include <optee_include/OpteeClientInterface.h>
#endif
#include <boot_rkimg.h>
#include <optee_include/tee_client_api.h>
#ifdef CONFIG_FASTBOOT_OEM_UNLOCK
#include <keymaster.h>
#endif
#ifdef CONFIG_ANDROID_AB
#include <android_ab.h>
#endif
#define FASTBOOT_VERSION "0.4"
#define FASTBOOT_INTERFACE_CLASS 0xff
#define FASTBOOT_INTERFACE_SUB_CLASS 0x42
#define FASTBOOT_INTERFACE_PROTOCOL 0x03
#define RX_ENDPOINT_MAXIMUM_PACKET_SIZE_2_0 (0x0200)
#define RX_ENDPOINT_MAXIMUM_PACKET_SIZE_1_1 (0x0040)
#define TX_ENDPOINT_MAXIMUM_PACKET_SIZE (0x0040)
#define EP_BUFFER_SIZE 4096
#define SLEEP_COUNT 20000
#define MAX_PART_NUM_STR_SIZE 4
#define PARTITION_TYPE_STRINGS "partition-type"
/*
* EP_BUFFER_SIZE must always be an integral multiple of maxpacket size
* (64 or 512 or 1024), else we break on certain controllers like DWC3
* that expect bulk OUT requests to be divisible by maxpacket size.
*/
struct f_fastboot {
struct usb_function usb_function;
/* IN/OUT EP's and corresponding requests */
struct usb_ep *in_ep, *out_ep;
struct usb_request *in_req, *out_req;
};
static inline struct f_fastboot *func_to_fastboot(struct usb_function *f)
{
return container_of(f, struct f_fastboot, usb_function);
}
static struct f_fastboot *fastboot_func;
static unsigned int download_size;
static unsigned int download_bytes;
static unsigned int upload_size;
static unsigned int upload_bytes;
static bool start_upload;
static unsigned intthread_wakeup_needed;
static struct usb_endpoint_descriptor fs_ep_in = {
.bLength = USB_DT_ENDPOINT_SIZE,
.bDescriptorType = USB_DT_ENDPOINT,
.bEndpointAddress = USB_DIR_IN,
.bmAttributes = USB_ENDPOINT_XFER_BULK,
.wMaxPacketSize = cpu_to_le16(64),
};
static struct usb_endpoint_descriptor fs_ep_out = {
.bLength = USB_DT_ENDPOINT_SIZE,
.bDescriptorType = USB_DT_ENDPOINT,
.bEndpointAddress = USB_DIR_OUT,
.bmAttributes = USB_ENDPOINT_XFER_BULK,
.wMaxPacketSize = cpu_to_le16(64),
};
static struct usb_endpoint_descriptor hs_ep_in = {
.bLength = USB_DT_ENDPOINT_SIZE,
.bDescriptorType = USB_DT_ENDPOINT,
.bEndpointAddress = USB_DIR_IN,
.bmAttributes = USB_ENDPOINT_XFER_BULK,
.wMaxPacketSize = cpu_to_le16(512),
};
static struct usb_endpoint_descriptor hs_ep_out = {
.bLength = USB_DT_ENDPOINT_SIZE,
.bDescriptorType = USB_DT_ENDPOINT,
.bEndpointAddress = USB_DIR_OUT,
.bmAttributes = USB_ENDPOINT_XFER_BULK,
.wMaxPacketSize = cpu_to_le16(512),
};
static struct usb_endpoint_descriptor ss_ep_in = {
.bLength = USB_DT_ENDPOINT_SIZE,
.bDescriptorType = USB_DT_ENDPOINT,
.bEndpointAddress = USB_DIR_IN,
.bmAttributes = USB_ENDPOINT_XFER_BULK,
.wMaxPacketSize = cpu_to_le16(1024),
};
static struct usb_ss_ep_comp_descriptor ss_ep_in_comp_desc = {
.bLength = sizeof(ss_ep_in_comp_desc),
.bDescriptorType = USB_DT_SS_ENDPOINT_COMP,
/* .bMaxBurst = DYNAMIC, */
};
static struct usb_endpoint_descriptor ss_ep_out = {
.bLength = USB_DT_ENDPOINT_SIZE,
.bDescriptorType = USB_DT_ENDPOINT,
.bEndpointAddress = USB_DIR_OUT,
.bmAttributes = USB_ENDPOINT_XFER_BULK,
.wMaxPacketSize = cpu_to_le16(1024),
};
static struct usb_ss_ep_comp_descriptor ss_ep_out_comp_desc = {
.bLength = sizeof(ss_ep_out_comp_desc),
.bDescriptorType = USB_DT_SS_ENDPOINT_COMP,
/* .bMaxBurst = DYNAMIC, */
};
static struct usb_interface_descriptor interface_desc = {
.bLength = USB_DT_INTERFACE_SIZE,
.bDescriptorType = USB_DT_INTERFACE,
.bInterfaceNumber = 0x00,
.bAlternateSetting = 0x00,
.bNumEndpoints = 0x02,
.bInterfaceClass = FASTBOOT_INTERFACE_CLASS,
.bInterfaceSubClass = FASTBOOT_INTERFACE_SUB_CLASS,
.bInterfaceProtocol = FASTBOOT_INTERFACE_PROTOCOL,
};
static struct usb_descriptor_header *fb_fs_function[] = {
(struct usb_descriptor_header *)&interface_desc,
(struct usb_descriptor_header *)&fs_ep_in,
(struct usb_descriptor_header *)&fs_ep_out,
};
static struct usb_descriptor_header *fb_hs_function[] = {
(struct usb_descriptor_header *)&interface_desc,
(struct usb_descriptor_header *)&hs_ep_in,
(struct usb_descriptor_header *)&hs_ep_out,
NULL,
};
static struct usb_descriptor_header *fb_ss_function[] = {
(struct usb_descriptor_header *)&interface_desc,
(struct usb_descriptor_header *)&ss_ep_in,
(struct usb_descriptor_header *)&ss_ep_in_comp_desc,
(struct usb_descriptor_header *)&ss_ep_out,
(struct usb_descriptor_header *)&ss_ep_out_comp_desc,
NULL,
};
static struct usb_endpoint_descriptor *
fb_ep_desc(struct usb_gadget *g, struct usb_endpoint_descriptor *fs,
struct usb_endpoint_descriptor *hs,
struct usb_endpoint_descriptor *ss,
struct usb_ss_ep_comp_descriptor *comp_desc,
struct usb_ep *ep)
{
struct usb_endpoint_descriptor *speed_desc = NULL;
/* select desired speed */
switch (g->speed) {
case USB_SPEED_SUPER:
if (gadget_is_superspeed(g)) {
speed_desc = ss;
ep->comp_desc = comp_desc;
break;
}
/* else: Fall trough */
case USB_SPEED_HIGH:
if (gadget_is_dualspeed(g)) {
speed_desc = hs;
break;
}
/* else: fall through */
default:
speed_desc = fs;
}
return speed_desc;
}
/*
* static strings, in UTF-8
*/
static const char fastboot_name[] = "Android Fastboot";
static struct usb_string fastboot_string_defs[] = {
[0].s = fastboot_name,
{ } /* end of list */
};
static struct usb_gadget_strings stringtab_fastboot = {
.language = 0x0409, /* en-us */
.strings = fastboot_string_defs,
};
static struct usb_gadget_strings *fastboot_strings[] = {
&stringtab_fastboot,
NULL,
};
static void rx_handler_command(struct usb_ep *ep, struct usb_request *req);
static int strcmp_l1(const char *s1, const char *s2);
static void wakeup_thread(void)
{
intthread_wakeup_needed = false;
}
static void busy_indicator(void)
{
static int state;
switch (state) {
case 0:
puts("\r|"); break;
case 1:
puts("\r/"); break;
case 2:
puts("\r-"); break;
case 3:
puts("\r\\"); break;
case 4:
puts("\r|"); break;
case 5:
puts("\r/"); break;
case 6:
puts("\r-"); break;
case 7:
puts("\r\\"); break;
default:
state = 0;
}
if (state++ == 8)
state = 0;
}
static int fb_get_fstype(const char *ifname, const int part_num,
const char **fs_type)
{
char part_num_str[MAX_PART_NUM_STR_SIZE] = {0};
snprintf(part_num_str, ARRAY_SIZE(part_num_str), ":%x", part_num);
if (fs_set_blk_dev(ifname, part_num_str, FS_TYPE_ANY))
return -1;
if (fs_get_fstype(fs_type))
return -1;
return 0;
}
static int sleep_thread(void)
{
int rc = 0;
int i = 0, k = 0;
/* Wait until a signal arrives or we are woken up */
for (;;) {
if (!intthread_wakeup_needed)
break;
if (++i == SLEEP_COUNT) {
busy_indicator();
i = 0;
k++;
}
if (k == 10) {
/* Handle CTRL+C */
if (ctrlc())
return -EPIPE;
/* Check cable connection */
if (!g_dnl_board_usb_cable_connected())
return -EIO;
k = 0;
}
usb_gadget_handle_interrupts(0);
}
intthread_wakeup_needed = true;
return rc;
}
static void fastboot_complete(struct usb_ep *ep, struct usb_request *req)
{
int status = req->status;
wakeup_thread();
if (!status)
return;
printf("status: %d ep '%s' trans: %d\n", status, ep->name, req->actual);
}
static int fastboot_bind(struct usb_configuration *c, struct usb_function *f)
{
int id;
struct usb_gadget *gadget = c->cdev->gadget;
struct f_fastboot *f_fb = func_to_fastboot(f);
const char *s;
/* DYNAMIC interface numbers assignments */
id = usb_interface_id(c, f);
if (id < 0)
return id;
interface_desc.bInterfaceNumber = id;
id = usb_string_id(c->cdev);
if (id < 0)
return id;
fastboot_string_defs[0].id = id;
interface_desc.iInterface = id;
f_fb->in_ep = usb_ep_autoconfig(gadget, &fs_ep_in);
if (!f_fb->in_ep)
return -ENODEV;
f_fb->in_ep->driver_data = c->cdev;
f_fb->out_ep = usb_ep_autoconfig(gadget, &fs_ep_out);
if (!f_fb->out_ep)
return -ENODEV;
f_fb->out_ep->driver_data = c->cdev;
f->descriptors = fb_fs_function;
if (gadget_is_dualspeed(gadget)) {
/* Assume endpoint addresses are the same for both speeds */
hs_ep_in.bEndpointAddress = fs_ep_in.bEndpointAddress;
hs_ep_out.bEndpointAddress = fs_ep_out.bEndpointAddress;
/* copy HS descriptors */
f->hs_descriptors = fb_hs_function;
}
if (gadget_is_superspeed(gadget)) {
/* Assume endpoint addresses are the same as full speed */
ss_ep_in.bEndpointAddress = fs_ep_in.bEndpointAddress;
ss_ep_out.bEndpointAddress = fs_ep_out.bEndpointAddress;
/* copy SS descriptors */
f->ss_descriptors = fb_ss_function;
}
s = env_get("serial#");
if (s)
g_dnl_set_serialnumber((char *)s);
return 0;
}
static void fastboot_unbind(struct usb_configuration *c, struct usb_function *f)
{
memset(fastboot_func, 0, sizeof(*fastboot_func));
}
static void fastboot_disable(struct usb_function *f)
{
struct f_fastboot *f_fb = func_to_fastboot(f);
usb_ep_disable(f_fb->out_ep);
usb_ep_disable(f_fb->in_ep);
if (f_fb->out_req) {
free(f_fb->out_req->buf);
usb_ep_free_request(f_fb->out_ep, f_fb->out_req);
f_fb->out_req = NULL;
}
if (f_fb->in_req) {
free(f_fb->in_req->buf);
usb_ep_free_request(f_fb->in_ep, f_fb->in_req);
f_fb->in_req = NULL;
}
}
static struct usb_request *fastboot_start_ep(struct usb_ep *ep)
{
struct usb_request *req;
req = usb_ep_alloc_request(ep, 0);
if (!req)
return NULL;
req->length = EP_BUFFER_SIZE;
req->buf = memalign(CONFIG_SYS_CACHELINE_SIZE, EP_BUFFER_SIZE);
if (!req->buf) {
usb_ep_free_request(ep, req);
return NULL;
}
memset(req->buf, 0, req->length);
return req;
}
static int fastboot_set_alt(struct usb_function *f,
unsigned interface, unsigned alt)
{
int ret;
struct usb_composite_dev *cdev = f->config->cdev;
struct usb_gadget *gadget = cdev->gadget;
struct f_fastboot *f_fb = func_to_fastboot(f);
const struct usb_endpoint_descriptor *d;
debug("%s: func: %s intf: %d alt: %d\n",
__func__, f->name, interface, alt);
d = fb_ep_desc(gadget, &fs_ep_out, &hs_ep_out, &ss_ep_out,
&ss_ep_out_comp_desc, f_fb->out_ep);
ret = usb_ep_enable(f_fb->out_ep, d);
if (ret) {
puts("failed to enable out ep\n");
return ret;
}
f_fb->out_req = fastboot_start_ep(f_fb->out_ep);
if (!f_fb->out_req) {
puts("failed to alloc out req\n");
ret = -EINVAL;
goto err;
}
f_fb->out_req->complete = rx_handler_command;
d = fb_ep_desc(gadget, &fs_ep_in, &hs_ep_in, &ss_ep_in,
&ss_ep_in_comp_desc, f_fb->in_ep);
ret = usb_ep_enable(f_fb->in_ep, d);
if (ret) {
puts("failed to enable in ep\n");
goto err;
}
f_fb->in_req = fastboot_start_ep(f_fb->in_ep);
if (!f_fb->in_req) {
puts("failed alloc req in\n");
ret = -EINVAL;
goto err;
}
f_fb->in_req->complete = fastboot_complete;
ret = usb_ep_queue(f_fb->out_ep, f_fb->out_req, 0);
if (ret)
goto err;
return 0;
err:
fastboot_disable(f);
return ret;
}
static int fastboot_add(struct usb_configuration *c)
{
struct f_fastboot *f_fb = fastboot_func;
int status;
debug("%s: cdev: 0x%p\n", __func__, c->cdev);
if (!f_fb) {
f_fb = memalign(CONFIG_SYS_CACHELINE_SIZE, sizeof(*f_fb));
if (!f_fb)
return -ENOMEM;
fastboot_func = f_fb;
memset(f_fb, 0, sizeof(*f_fb));
}
f_fb->usb_function.name = "f_fastboot";
f_fb->usb_function.bind = fastboot_bind;
f_fb->usb_function.unbind = fastboot_unbind;
f_fb->usb_function.set_alt = fastboot_set_alt;
f_fb->usb_function.disable = fastboot_disable;
f_fb->usb_function.strings = fastboot_strings;
status = usb_add_function(c, &f_fb->usb_function);
if (status) {
free(f_fb);
fastboot_func = f_fb;
}
return status;
}
DECLARE_GADGET_BIND_CALLBACK(usb_dnl_fastboot, fastboot_add);
static int fastboot_tx_write(const char *buffer, unsigned int buffer_size)
{
struct usb_request *in_req = fastboot_func->in_req;
int ret;
memcpy(in_req->buf, buffer, buffer_size);
in_req->length = buffer_size;
usb_ep_dequeue(fastboot_func->in_ep, in_req);
ret = usb_ep_queue(fastboot_func->in_ep, in_req, 0);
if (ret)
printf("Error %d on queue\n", ret);
return 0;
}
static int fastboot_tx_write_str(const char *buffer)
{
int ret;
ret = sleep_thread();
if (ret < 0)
printf("warning: 0x%x, usb transmission is abnormal!\n", ret);
return fastboot_tx_write(buffer, strlen(buffer));
}
static void compl_do_reset(struct usb_ep *ep, struct usb_request *req)
{
do_reset(NULL, 0, 0, NULL);
}
int __weak fb_set_reboot_flag(void)
{
return -ENOSYS;
}
static void cb_reboot(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
if (!strcmp_l1("reboot-bootloader", cmd)) {
if (fb_set_reboot_flag()) {
fastboot_tx_write_str("FAILCannot set reboot flag");
return;
}
}
#ifdef CONFIG_ANDROID_BOOTLOADER
if (!strcmp_l1("reboot-fastboot", cmd)) {
if (android_bcb_write("boot-fastboot")) {
fastboot_tx_write_str("FAILCannot set boot-fastboot");
return;
}
}
if (!strcmp_l1("reboot-recovery", cmd)) {
if (android_bcb_write("boot-recovery")) {
fastboot_tx_write_str("FAILCannot set boot-recovery");
return;
}
}
#endif
fastboot_func->in_req->complete = compl_do_reset;
fastboot_tx_write_str("OKAY");
}
static int strcmp_l1(const char *s1, const char *s2)
{
if (!s1 || !s2)
return -1;
return strncmp(s1, s2, strlen(s1));
}
struct name_string {
const char *str;
int expects_args;
char delim;
};
#define NAME_NO_ARGS(s) {.str = s, .expects_args = 0}
#define NAME_ARGS(s, d) {.str = s, .expects_args = 1, .delim = d}
static size_t name_check_match(const char *str, size_t len,
const struct name_string *name)
{
size_t str_len = strlen(name->str);
/* If name len is greater than input, return 0. */
if (str_len > len)
return 0;
/* If name str does not match input string, return 0. */
if (memcmp(name->str, str, str_len))
return 0;
if (name->expects_args) {
/* string should have space for delim */
if (len == str_len)
return 0;
/* Check delim match */
if (name->delim != str[str_len])
return 0;
} else {
/* Name str len should match input len */
if (str_len != len)
return 0;
}
return str_len + name->expects_args;
}
static void fb_add_string(char *dst, size_t chars_left,
const char *str, const char *args)
{
if (!str)
return;
int ret = snprintf(dst, chars_left, str, args);
if (ret < 0)
pr_err("snprintf is error!");
}
static void fb_add_number(char *dst, size_t chars_left,
const char *format, size_t num)
{
if (!format)
return;
int ret = snprintf(dst, chars_left, format, num);
if (ret > chars_left)
pr_err("snprintf is error!");
}
static int fb_read_var(char *cmd, char *response,
fb_getvar_t var, size_t chars_left)
{
const char *s;
int ret = 0;
switch (var) {
case FB_VERSION:
fb_add_string(response, chars_left, FASTBOOT_VERSION, NULL);
break;
case FB_BOOTLOADER_VERSION:
fb_add_string(response, chars_left, U_BOOT_VERSION, NULL);
break;
case FB_BASEBAND_VERSION:
fb_add_string(response, chars_left, "N/A", NULL);
break;
case FB_PRODUCT:
fb_add_string(response, chars_left, CONFIG_SYS_BOARD, NULL);
break;
case FB_SERIAL_NO:
s = env_get("serial#");
if (s)
fb_add_string(response, chars_left, s, NULL);
else
ret = -1;
break;
case FB_SECURE:
fb_add_string(response, chars_left, "yes", NULL);
break;
case FB_VARIANT:
fb_add_string(response, chars_left, "userdebug", NULL);
break;
case FB_DWNLD_SIZE:
fb_add_number(response, chars_left, "0x%08x",
CONFIG_FASTBOOT_BUF_SIZE);
break;
case FB_PART_SIZE:
case FB_PART_TYPE: {
char *part_name = cmd;
cmd = strsep(&part_name, ":");
if (!cmd || !part_name) {
fb_add_string(response, chars_left,
"argument Invalid!", NULL);
ret = -1;
break;
}
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
disk_partition_t part_info;
struct blk_desc *dev_desc;
int part_num = -1;
const char *fs_type = NULL;
#ifdef CONFIG_RKIMG_BOOTLOADER
dev_desc = rockchip_get_bootdev();
#else
dev_desc = NULL;
#endif
if (!dev_desc) {
fb_add_string(response, chars_left,
"block device not found", NULL);
ret = -1;
break;
}
part_num = part_get_info_by_name(dev_desc, part_name,
&part_info);
if (part_num < 0) {
fb_add_string(response, chars_left,
"partition not found", NULL);
ret = -1;
} else if (!strncmp(PARTITION_TYPE_STRINGS, cmd,
strlen(PARTITION_TYPE_STRINGS))) {
if (fb_get_fstype("mmc", part_num, &fs_type)) {
fb_add_string(response, chars_left,
(char *)part_info.type, NULL);
} else {
fb_add_string(response, chars_left,
fs_type, NULL);
}
} else if (!strncmp("partition-size", cmd, 14)) {
u64 part_size;
part_size = (uint64_t)part_info.size;
snprintf(response, chars_left, "0x%llx",
part_size * dev_desc->blksz);
}
#else
fb_add_string(response, chars_left, "not implemented", NULL);
ret = -1;
#endif
break;
}
case FB_BLK_SIZE: {
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
struct blk_desc *dev_desc;
#ifdef CONFIG_RKIMG_BOOTLOADER
dev_desc = rockchip_get_bootdev();
#else
dev_desc = NULL;
#endif
if (!dev_desc) {
fb_add_string(response, chars_left,
"block device not found", NULL);
ret = -1;
} else {
fb_add_number(response, chars_left,
"0x%lx", dev_desc->blksz);
}
#else
fb_add_string(response, chars_left, "not implemented", NULL);
ret = -1;
#endif
break;
}
case FB_ERASE_SIZE: {
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
lbaint_t erase_grp_size;
erase_grp_size = fb_mmc_get_erase_grp_size();
if (erase_grp_size < 0) {
fb_add_string(response, chars_left,
"block device not found", NULL);
ret = -1;
} else {
fb_add_number(response, chars_left, "0x"LBAF"",
erase_grp_size);
}
#else
fb_add_string(response, chars_left, "not implemented", NULL);
ret = -1;
#endif
break;
}
case FB_UNLOCKED: {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
uint8_t flash_lock_state = 0;
if (rk_avb_read_flash_lock_state(&flash_lock_state))
fb_add_string(response, chars_left, "yes", NULL);
else
fb_add_string(response, chars_left, "no", NULL);
#else
fb_add_string(response, chars_left, "not implemented", NULL);
ret = -1;
#endif
break;
}
case FB_OFF_MODE_CHARGE: {
fb_add_string(response, chars_left, "not implemented", NULL);
break;
}
case FB_BATT_VOLTAGE: {
fb_add_string(response, chars_left, "not implemented", NULL);
break;
}
case FB_BATT_SOC_OK: {
fb_add_string(response, chars_left, "no", NULL);
break;
}
case FB_IS_USERSPACE: {
fb_add_string(response, chars_left, "no", NULL);
break;
}
#ifdef CONFIG_RK_AVB_LIBAVB_USER
case FB_HAS_COUNT: {
char slot_count[2];
char temp;
slot_count[1] = '\0';
if (rk_avb_read_slot_count(&temp) < 0) {
fb_add_number(response, chars_left, "%d", 0);
ret = -1;
break;
}
slot_count[0] = temp + 0x30;
fb_add_string(response, chars_left, slot_count, NULL);
break;
}
case FB_HAS_SLOT: {
char *part_name = cmd;
int has_slot = -1;
cmd = strsep(&part_name, ":");
if (!cmd || !part_name) {
fb_add_string(response, chars_left,
"argument Invalid!", NULL);
ret = -1;
break;
}
has_slot = rk_avb_get_part_has_slot_info(part_name);
if (has_slot < 0)
fb_add_string(response, chars_left, "no", NULL);
else
fb_add_string(response, chars_left, "yes", NULL);
break;
}
case FB_CURR_SLOT: {
char slot_surrent[8] = {0};
if (!rk_avb_get_current_slot(slot_surrent)) {
fb_add_string(response, chars_left,
slot_surrent + 1, NULL);
} else {
fb_add_string(response, chars_left, "get error", NULL);
ret = -1;
}
break;
}
case FB_SLOT_SUFFIXES: {
char slot_suffixes_temp[4] = {0};
char slot_suffixes[9] = {0};
int slot_cnt = 0;
rk_avb_read_slot_suffixes(slot_suffixes_temp);
while (slot_suffixes_temp[slot_cnt] != '\0') {
slot_suffixes[slot_cnt * 2]
= slot_suffixes_temp[slot_cnt];
slot_suffixes[slot_cnt * 2 + 1] = ',';
slot_cnt++;
}
slot_suffixes[(slot_cnt - 1) * 2 + 1] = '\0';
fb_add_string(response, chars_left, slot_suffixes, NULL);
break;
}
case FB_SLOT_SUCCESSFUL:{
char *slot_name = cmd;
AvbABData ab_info;
cmd = strsep(&slot_name, ":");
if (!cmd || !slot_name) {
fb_add_string(response, chars_left,
"argument Invalid!", NULL);
ret = -1;
break;
}
if (rk_avb_get_ab_info(&ab_info) < 0) {
fb_add_string(response, chars_left,
"get ab info failed!", NULL);
ret = -1;
break;
}
if (!strcmp(slot_name, "a")) {
if (ab_info.slots[0].successful_boot)
fb_add_string(response, chars_left,
"yes", NULL);
else
fb_add_string(response, chars_left,
"no", NULL);
} else if (!strcmp(slot_name, "b")) {
if (ab_info.slots[1].successful_boot)
fb_add_string(response, chars_left,
"yes", NULL);
else
fb_add_string(response, chars_left,
"no", NULL);
} else {
fb_add_string(response, chars_left, "no", NULL);
}
break;
}
case FB_SLOT_UNBOOTABLE: {
char *slot_name = cmd;
AvbABData ab_info;
cmd = strsep(&slot_name, ":");
if (!cmd || !slot_name) {
fb_add_string(response, chars_left,
"argument Invalid!", NULL);
ret = -1;
break;
}
if (rk_avb_get_ab_info(&ab_info) < 0) {
fb_add_string(response, chars_left,
"get ab info failed!", NULL);
ret = -1;
break;
}
if (!strcmp(slot_name, "a")) {
if (!ab_info.slots[0].successful_boot &&
!ab_info.slots[0].tries_remaining &&
!ab_info.slots[0].priority)
fb_add_string(response, chars_left,
"yes", NULL);
else
fb_add_string(response, chars_left, "no", NULL);
} else if (!strcmp(slot_name, "b")) {
if (!ab_info.slots[1].successful_boot &&
!ab_info.slots[1].tries_remaining &&
!ab_info.slots[1].priority)
fb_add_string(response, chars_left,
"yes", NULL);
else
fb_add_string(response, chars_left, "no", NULL);
} else {
fb_add_string(response, chars_left, "no", NULL);
}
break;
}
case FB_SLOT_RETRY_COUNT: {
char *slot_name = cmd;
AvbABData ab_info;
cmd = strsep(&slot_name, ":");
if (!cmd || !slot_name) {
fb_add_string(response, chars_left,
"argument Invalid!", NULL);
ret = -1;
break;
}
if (rk_avb_get_ab_info(&ab_info) < 0) {
fb_add_string(response, chars_left,
"get ab info failed!", NULL);
ret = -1;
break;
}
if (!strcmp(slot_name, "a")) {
fb_add_number(response, chars_left,
"%d", ab_info.slots[0].tries_remaining);
} else if (!strcmp(slot_name, "b")) {
fb_add_number(response, chars_left, "%d",
ab_info.slots[1].tries_remaining);
} else {
strcpy(response, "FAILno");
}
break;
}
case FB_AT_VBST: {
char vbst[VBOOT_STATE_SIZE] = {0};
char *p_vbst;
strcpy(response, "INFO");
rk_avb_get_at_vboot_state(vbst);
p_vbst = vbst;
do {
cmd = strsep(&p_vbst, "\n");
if (strlen(cmd) > 0) {
memcpy(&response[4], cmd, chars_left);
fastboot_tx_write_str(response);
}
} while (strlen(cmd));
break;
}
case FB_SNAPSHOT_STATUS: {
#ifdef CONFIG_ANDROID_AB
struct misc_virtual_ab_message state;
memset(&state, 0x0, sizeof(state));
if (read_misc_virtual_ab_message(&state) != 0) {
printf("FB_SNAPSHOT_STATUS read_misc_virtual_ab_message failed!\n");
fb_add_string(response, chars_left, "get error", NULL);
ret = -1;
}
if (state.magic != MISC_VIRTUAL_AB_MAGIC_HEADER) {
printf("FB_SNAPSHOT_STATUS not virtual A/B metadata!\n");
fb_add_string(response, chars_left, "get error", NULL);
ret = -1;
}
if (state.merge_status == ENUM_MERGE_STATUS_MERGING) {
fb_add_string(response, chars_left, "merging", NULL);
} else if (state.merge_status == ENUM_MERGE_STATUS_SNAPSHOTTED) {
fb_add_string(response, chars_left, "snapshotted", NULL);
} else {
fb_add_string(response, chars_left, "none", NULL);
}
#else
fb_add_string(response, chars_left, "get error", NULL);
ret = -1;
#endif
break;
}
#endif
#ifdef CONFIG_OPTEE_CLIENT
case FB_AT_DH: {
char dhbuf[ATTEST_DH_SIZE];
uint32_t dh_len = ATTEST_DH_SIZE;
uint32_t res = trusty_attest_dh((uint8_t *)dhbuf, &dh_len);
if (res) {
fb_add_string(response, chars_left, "dh not set", NULL);
ret = -1;
} else {
fb_add_string(response, chars_left, dhbuf, NULL);
}
break;
}
case FB_AT_UUID: {
char uuid[ATTEST_UUID_SIZE] = {0};
uint32_t uuid_len = ATTEST_UUID_SIZE;
uint32_t res = trusty_attest_uuid((uint8_t *)uuid, &uuid_len);
uuid[ATTEST_UUID_SIZE - 1] = 0;
if (res) {
fb_add_string(response, chars_left, "dh not set", NULL);
ret = -1;
} else {
fb_add_string(response, chars_left, uuid, NULL);
}
break;
}
#endif
default: {
char *envstr;
envstr = malloc(strlen("fastboot.") + strlen(cmd) + 1);
if (!envstr) {
fb_add_string(response, chars_left,
"malloc error", NULL);
ret = -1;
break;
}
sprintf(envstr, "fastboot.%s", cmd);
s = env_get(envstr);
if (s) {
strncat(response, s, chars_left);
} else {
printf("WARNING: unknown variable: %s\n", cmd);
fb_add_string(response, chars_left,
"not implemented", NULL);
}
free(envstr);
break;
}
}
return ret;
}
static const struct {
/*
*any changes to this array require an update to the corresponding
*enum in fastboot.h
*/
struct name_string name;
fb_getvar_t var;
} getvar_table[] = {
{ NAME_NO_ARGS("version"), FB_VERSION},
{ NAME_NO_ARGS("version-bootloader"), FB_BOOTLOADER_VERSION},
{ NAME_NO_ARGS("version-baseband"), FB_BASEBAND_VERSION},
{ NAME_NO_ARGS("product"), FB_PRODUCT},
{ NAME_NO_ARGS("serialno"), FB_SERIAL_NO},
{ NAME_NO_ARGS("secure"), FB_SECURE},
{ NAME_NO_ARGS("max-download-size"), FB_DWNLD_SIZE},
{ NAME_NO_ARGS("logical-block-size"), FB_BLK_SIZE},
{ NAME_NO_ARGS("erase-block-size"), FB_ERASE_SIZE},
{ NAME_ARGS("partition-type", ':'), FB_PART_TYPE},
{ NAME_ARGS("partition-size", ':'), FB_PART_SIZE},
{ NAME_NO_ARGS("unlocked"), FB_UNLOCKED},
{ NAME_NO_ARGS("off-mode-charge"), FB_OFF_MODE_CHARGE},
{ NAME_NO_ARGS("battery-voltage"), FB_BATT_VOLTAGE},
{ NAME_NO_ARGS("variant"), FB_VARIANT},
{ NAME_NO_ARGS("battery-soc-ok"), FB_BATT_SOC_OK},
{ NAME_NO_ARGS("is-userspace"), FB_IS_USERSPACE},
#ifdef CONFIG_RK_AVB_LIBAVB_USER
/* Slots related */
{ NAME_NO_ARGS("slot-count"), FB_HAS_COUNT},
{ NAME_ARGS("has-slot", ':'), FB_HAS_SLOT},
{ NAME_NO_ARGS("current-slot"), FB_CURR_SLOT},
{ NAME_NO_ARGS("slot-suffixes"), FB_SLOT_SUFFIXES},
{ NAME_ARGS("slot-successful", ':'), FB_SLOT_SUCCESSFUL},
{ NAME_ARGS("slot-unbootable", ':'), FB_SLOT_UNBOOTABLE},
{ NAME_ARGS("slot-retry-count", ':'), FB_SLOT_RETRY_COUNT},
{ NAME_NO_ARGS("at-vboot-state"), FB_AT_VBST},
{ NAME_NO_ARGS("snapshot-update-status"), FB_SNAPSHOT_STATUS},
#endif
/*
* OEM specific :
* Spec says names starting with lowercase letter are reserved.
*/
#ifdef CONFIG_OPTEE_CLIENT
{ NAME_NO_ARGS("at-attest-dh"), FB_AT_DH},
{ NAME_NO_ARGS("at-attest-uuid"), FB_AT_UUID},
#endif
};
static int fb_getvar_single(char *cmd, char *response, size_t chars_left)
{
int i;
size_t match_len = 0;
size_t len = strlen(cmd);
for (i = 0; i < ARRAY_SIZE(getvar_table); i++) {
match_len = name_check_match(cmd, len, &getvar_table[i].name);
if (match_len)
break;
}
if (match_len == 0) {
fb_add_string(response, chars_left, "unknown variable", NULL);
return -1;
}
if (fb_read_var(cmd, response, getvar_table[i].var, chars_left) < 0)
return -1;
return 0;
}
static void fb_getvar_all(void)
{
char response[FASTBOOT_RESPONSE_LEN] = {0};
char resp_tmp[FASTBOOT_RESPONSE_LEN] = {0};
char *actual_resp;
size_t chars_left;
int i, p;
disk_partition_t part_info;
struct blk_desc *dev_desc;
strcpy(response, "INFO");
chars_left = sizeof(response) - strlen(response) - 1;
actual_resp = response + strlen(response);
for (i = 0; i < ARRAY_SIZE(getvar_table); i++) {
fb_getvar_t var = getvar_table[i].var;
switch (var) {
case FB_PART_TYPE:
case FB_PART_SIZE: {
const char *fs_type = NULL;
#ifdef CONFIG_RKIMG_BOOTLOADER
dev_desc = rockchip_get_bootdev();
#else
dev_desc = NULL;
#endif
if (!dev_desc) {
fb_add_string(actual_resp, chars_left,
"%s:block device not found",
getvar_table[i].name.str);
fastboot_tx_write_str(response);
break;
}
for (p = 1; p <= MAX_SEARCH_PARTITIONS; p++) {
if (part_get_info(dev_desc, p,
&part_info) < 0) {
break;
}
if (var == FB_PART_TYPE) {
fs_type = NULL;
if (fb_get_fstype("mmc", p,
&fs_type)) {
fb_add_string(
resp_tmp,
FASTBOOT_RESPONSE_LEN,
(char *)part_info.type,
NULL);
} else {
fb_add_string(
resp_tmp,
FASTBOOT_RESPONSE_LEN,
fs_type,
NULL);
}
snprintf(actual_resp,
chars_left,
"%s:%s:%s",
getvar_table[i].name.str,
part_info.name,
resp_tmp);
} else {
uint64_t part_size;
part_size = (uint64_t)part_info.size;
snprintf(actual_resp,
chars_left,
"%s:%s:0x%llx",
getvar_table[i].name.str,
part_info.name,
part_size * dev_desc->blksz);
}
fastboot_tx_write_str(response);
}
break;
}
#ifdef CONFIG_RK_AVB_LIBAVB_USER
case FB_HAS_SLOT: {
uchar *ptr_name_tmp;
char c = '_';
int has_slot = -1;
#ifdef CONFIG_RKIMG_BOOTLOADER
dev_desc = rockchip_get_bootdev();
#else
dev_desc = NULL;
#endif
if (!dev_desc) {
fb_add_string(actual_resp, chars_left,
"%s:block device not found",
getvar_table[i].name.str);
fastboot_tx_write_str(response);
break;
}
for (p = 1; p <= MAX_SEARCH_PARTITIONS; p++) {
if (part_get_info(dev_desc, p,
&part_info) < 0) {
break;
} else {
ptr_name_tmp = (uchar *)strrchr(
(char *)part_info.name, c);
if (ptr_name_tmp &&
part_info.name[ptr_name_tmp -
part_info.name + 2] == '\0')
fb_add_string(
resp_tmp,
ptr_name_tmp -
part_info.name + 1,
(char *)part_info.name,
NULL);
else
strcpy(resp_tmp,
(char *)part_info.name);
has_slot = rk_avb_get_part_has_slot_info(
resp_tmp);
if (has_slot < 0) {
snprintf(actual_resp,
chars_left,
"%s:%s:no",
getvar_table[i].name.str,
resp_tmp);
} else {
snprintf(actual_resp,
chars_left,
"%s:%s:yes",
getvar_table[i].name.str,
resp_tmp);
p++;
}
fastboot_tx_write_str(response);
}
}
break;
}
case FB_SLOT_SUCCESSFUL: {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
AvbABData ab_info;
if (rk_avb_get_ab_info(&ab_info) < 0) {
fb_add_string(actual_resp,
chars_left,
"%s:get ab info failed!",
getvar_table[i].name.str);
fastboot_tx_write_str(response);
break;
}
if (ab_info.slots[0].successful_boot)
fb_add_string(actual_resp, chars_left,
"%s:a:yes",
getvar_table[i].name.str);
else
fb_add_string(actual_resp, chars_left,
"%s:a:no",
getvar_table[i].name.str);
fastboot_tx_write_str(response);
if (ab_info.slots[1].successful_boot)
fb_add_string(actual_resp, chars_left,
"%s:b:yes",
getvar_table[i].name.str);
else
fb_add_string(actual_resp, chars_left,
"%s:b:no",
getvar_table[i].name.str);
fastboot_tx_write_str(response);
#else
fb_add_string(actual_resp, chars_left,
"%s:not find ab info!",
getvar_table[i].name.str);
fastboot_tx_write_str(response);
#endif
break;
}
case FB_SLOT_UNBOOTABLE: {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
AvbABData ab_info;
if (rk_avb_get_ab_info(&ab_info) < 0) {
fb_add_string(actual_resp, chars_left,
"%s:not find ab info!",
getvar_table[i].name.str);
fastboot_tx_write_str(response);
break;
}
if (!ab_info.slots[0].successful_boot &&
!ab_info.slots[0].tries_remaining &&
!ab_info.slots[0].priority)
fb_add_string(actual_resp, chars_left,
"%s:a:yes",
getvar_table[i].name.str);
else
fb_add_string(actual_resp, chars_left,
"%s:a:no",
getvar_table[i].name.str);
fastboot_tx_write_str(response);
if (!ab_info.slots[1].successful_boot &&
!ab_info.slots[1].tries_remaining &&
!ab_info.slots[1].priority)
fb_add_string(actual_resp, chars_left,
"%s:b:yes",
getvar_table[i].name.str);
else
fb_add_string(actual_resp, chars_left,
"%s:b:no",
getvar_table[i].name.str);
fastboot_tx_write_str(response);
#else
fb_add_string(actual_resp, chars_left,
"%s:not find ab info!",
getvar_table[i].name.str);
fastboot_tx_write_str(response);
#endif
break;
}
case FB_SLOT_RETRY_COUNT: {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
AvbABData ab_info;
if (rk_avb_get_ab_info(&ab_info) < 0) {
fb_add_string(actual_resp, chars_left,
"%s:not find ab info!",
getvar_table[i].name.str);
fastboot_tx_write_str(response);
break;
}
snprintf(actual_resp, chars_left, "%s:a:%d",
getvar_table[i].name.str,
ab_info.slots[1].tries_remaining);
fastboot_tx_write_str(response);
snprintf(actual_resp, chars_left, "%s:b:%d",
getvar_table[i].name.str,
ab_info.slots[1].tries_remaining);
fastboot_tx_write_str(response);
#else
fb_add_string(actual_resp, chars_left,
"%s:not find ab info!",
getvar_table[i].name.str);
fastboot_tx_write_str(response);
#endif
break;
}
#endif
#ifdef CONFIG_RK_AVB_LIBAVB_USER
case FB_AT_VBST:
break;
#endif
default:
fb_getvar_single((char *)getvar_table[i].name.str,
resp_tmp, FASTBOOT_RESPONSE_LEN);
snprintf(actual_resp, chars_left, "%s:%s",
getvar_table[i].name.str, resp_tmp);
fastboot_tx_write_str(response);
}
}
}
#ifdef CONFIG_ANDROID_AB
static int get_current_slot(void)
{
#ifdef CONFIG_RK_AVB_LIBAVB_USER
char cmd[8] = {0};
unsigned int slot_number = -1;
memset(cmd, 0x0, sizeof(cmd));
rk_avb_get_current_slot(cmd);
if (strncmp("_a", cmd, 2) == 0) {
slot_number = 0;
} else if (strncmp("_b", cmd, 2) == 0) {
slot_number = 1;
} else {
pr_err("%s: FAILunkown slot name\n", __func__);
return -1;
}
return slot_number;
#else
pr_err("%s: FAILnot implemented\n", __func__);
return -1;
#endif
}
#ifdef CONFIG_FASTBOOT_FLASH
static int should_prevent_userdata_wipe(void)
{
struct misc_virtual_ab_message state;
memset(&state, 0x0, sizeof(state));
if (read_misc_virtual_ab_message(&state) != 0) {
pr_err("%s: read_misc_virtual_ab_message failed!\n", __func__);
return 0;
}
if (state.magic != MISC_VIRTUAL_AB_MAGIC_HEADER) {
pr_err("%s: NOT virtual A/B metadata!\n", __func__);
return 0;
}
if (state.merge_status == (uint8_t)ENUM_MERGE_STATUS_MERGING ||
(state.merge_status == (uint8_t)ENUM_MERGE_STATUS_SNAPSHOTTED &&
state.source_slot != get_current_slot())) {
return 1;
}
return 0;
}
#endif
static int get_virtual_ab_merge_status(void)
{
struct misc_virtual_ab_message state;
memset(&state, 0x0, sizeof(state));
if (read_misc_virtual_ab_message(&state) != 0) {
pr_err("%s: read_misc_virtual_ab_message failed!\n", __func__);
return -1;
}
if (state.magic != MISC_VIRTUAL_AB_MAGIC_HEADER) {
pr_err("%s: NOT virtual A/B metadata!\n", __func__);
return -1;
}
return state.merge_status;
}
#endif
static void cb_getvar(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
char response[FASTBOOT_RESPONSE_LEN] = {0};
const char *str_read_all = "all";
size_t len = 0;
size_t chars_left;
strsep(&cmd, ":");
if (!cmd) {
pr_err("missing variable");
fastboot_tx_write_str("FAILmissing var");
return;
}
len = strlen(cmd);
if (len == strlen(str_read_all) &&
(strncmp(cmd, str_read_all, len) == 0)) {
fb_getvar_all();
fastboot_tx_write_str("OKAYDone!");
} else {
strcpy(response, "OKAY");
chars_left = sizeof(response) - strlen(response) - 1;
if (fb_getvar_single(cmd, &response[strlen(response)],
chars_left) < 0) {
strcpy(cmd, "FAILunknown variable");
strncat(cmd, &response[strlen(response)], chars_left);
fastboot_tx_write_str(cmd);
return;
}
fastboot_tx_write_str(response);
}
return;
}
static unsigned int rx_bytes_expected(struct usb_ep *ep)
{
int rx_remain = download_size - download_bytes;
unsigned int rem;
unsigned int maxpacket = ep->maxpacket;
if (rx_remain <= 0)
return 0;
else if (rx_remain > EP_BUFFER_SIZE)
return EP_BUFFER_SIZE;
/*
* Some controllers e.g. DWC3 don't like OUT transfers to be
* not ending in maxpacket boundary. So just make them happy by
* always requesting for integral multiple of maxpackets.
* This shouldn't bother controllers that don't care about it.
*/
rem = rx_remain % maxpacket;
if (rem > 0)
rx_remain = rx_remain + (maxpacket - rem);
return rx_remain;
}
#define BYTES_PER_DOT 0x20000
static void rx_handler_dl_image(struct usb_ep *ep, struct usb_request *req)
{
char response[FASTBOOT_RESPONSE_LEN];
unsigned int transfer_size = download_size - download_bytes;
const unsigned char *buffer = req->buf;
unsigned int buffer_size = req->actual;
unsigned int pre_dot_num, now_dot_num;
if (req->status != 0) {
printf("Bad status: %d\n", req->status);
return;
}
if (buffer_size < transfer_size)
transfer_size = buffer_size;
memcpy((void *)CONFIG_FASTBOOT_BUF_ADDR + download_bytes,
buffer, transfer_size);
pre_dot_num = download_bytes / BYTES_PER_DOT;
download_bytes += transfer_size;
now_dot_num = download_bytes / BYTES_PER_DOT;
if (pre_dot_num != now_dot_num) {
putc('.');
if (!(now_dot_num % 74))
putc('\n');
}
/* Check if transfer is done */
if (download_bytes >= download_size) {
/*
* Reset global transfer variable, keep download_bytes because
* it will be used in the next possible flashing command
*/
download_size = 0;
req->complete = rx_handler_command;
req->length = EP_BUFFER_SIZE;
strcpy(response, "OKAY");
fastboot_tx_write_str(response);
printf("\ndownloading of %d bytes finished\n", download_bytes);
} else {
req->length = rx_bytes_expected(ep);
}
req->actual = 0;
usb_ep_queue(ep, req, 0);
}
static void cb_download(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
char response[FASTBOOT_RESPONSE_LEN];
strsep(&cmd, ":");
download_size = simple_strtoul(cmd, NULL, 16);
download_bytes = 0;
printf("Starting download of %d bytes\n", download_size);
if (0 == download_size) {
strcpy(response, "FAILdata invalid size");
} else if (download_size > CONFIG_FASTBOOT_BUF_SIZE) {
download_size = 0;
strcpy(response, "FAILdata too large");
} else {
sprintf(response, "DATA%08x", download_size);
req->complete = rx_handler_dl_image;
req->length = rx_bytes_expected(ep);
}
fastboot_tx_write_str(response);
}
static void tx_handler_ul(struct usb_ep *ep, struct usb_request *req)
{
unsigned int xfer_size = 0;
unsigned int pre_dot_num, now_dot_num;
unsigned int remain_size = 0;
unsigned int transferred_size = req->actual;
if (req->status != 0) {
printf("Bad status: %d\n", req->status);
return;
}
if (start_upload) {
pre_dot_num = upload_bytes / BYTES_PER_DOT;
upload_bytes += transferred_size;
now_dot_num = upload_bytes / BYTES_PER_DOT;
if (pre_dot_num != now_dot_num) {
putc('.');
if (!(now_dot_num % 74))
putc('\n');
}
}
remain_size = upload_size - upload_bytes;
xfer_size = (remain_size > EP_BUFFER_SIZE) ?
EP_BUFFER_SIZE : remain_size;
debug("%s: remain_size=%d, transferred_size=%d",
__func__, remain_size, transferred_size);
debug("xfer_size=%d, upload_bytes=%d, upload_size=%d!\n",
xfer_size, upload_bytes, upload_size);
if (remain_size <= 0) {
fastboot_func->in_req->complete = fastboot_complete;
wakeup_thread();
fastboot_tx_write_str("OKAY");
printf("\nuploading of %d bytes finished\n", upload_bytes);
upload_bytes = 0;
upload_size = 0;
start_upload = false;
return;
}
/* Remove the transfer callback which response the upload */
/* request from host */
if (!upload_bytes)
start_upload = true;
fastboot_tx_write((char *)((phys_addr_t)CONFIG_FASTBOOT_BUF_ADDR + \
upload_bytes),
xfer_size);
}
static void cb_upload(struct usb_ep *ep, struct usb_request *req)
{
char response[FASTBOOT_RESPONSE_LEN];
printf("Starting upload of %d bytes\n", upload_size);
if (0 == upload_size) {
strcpy(response, "FAILdata invalid size");
} else {
start_upload = false;
sprintf(response, "DATA%08x", upload_size);
fastboot_func->in_req->complete = tx_handler_ul;
}
fastboot_tx_write_str(response);
}
static void do_bootm_on_complete(struct usb_ep *ep, struct usb_request *req)
{
char boot_addr_start[12];
char *bootm_args[] = { "bootm", boot_addr_start, NULL };
puts("Booting kernel..\n");
sprintf(boot_addr_start, "0x%lx", (long)CONFIG_FASTBOOT_BUF_ADDR);
do_bootm(NULL, 0, 2, bootm_args);
/* This only happens if image is somehow faulty so we start over */
do_reset(NULL, 0, 0, NULL);
}
static void cb_boot(struct usb_ep *ep, struct usb_request *req)
{
fastboot_func->in_req->complete = do_bootm_on_complete;
fastboot_tx_write_str("OKAY");
}
static void do_exit_on_complete(struct usb_ep *ep, struct usb_request *req)
{
g_dnl_trigger_detach();
}
static void cb_continue(struct usb_ep *ep, struct usb_request *req)
{
fastboot_func->in_req->complete = do_exit_on_complete;
fastboot_tx_write_str("OKAY");
}
static void cb_set_active(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
debug("%s: %s\n", __func__, cmd);
strsep(&cmd, ":");
if (!cmd) {
pr_err("missing slot name");
fastboot_tx_write_str("FAILmissing slot name");
return;
}
#ifdef CONFIG_ANDROID_AB
if (get_virtual_ab_merge_status() == ENUM_MERGE_STATUS_MERGING) {
pr_err("virtual A/B is merging, abort the operation");
fastboot_tx_write_str("FAILvirtual A/B is merging, abort");
return;
}
#endif
#ifdef CONFIG_RK_AVB_LIBAVB_USER
unsigned int slot_number;
if (strncmp("a", cmd, 1) == 0) {
slot_number = 0;
rk_avb_set_slot_active(&slot_number);
} else if (strncmp("b", cmd, 1) == 0) {
slot_number = 1;
rk_avb_set_slot_active(&slot_number);
} else {
fastboot_tx_write_str("FAILunkown slot name");
return;
}
fastboot_tx_write_str("OKAY");
return;
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
}
#ifdef CONFIG_FASTBOOT_FLASH
static void cb_flash(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
char response[FASTBOOT_RESPONSE_LEN] = {0};
#ifdef CONFIG_RK_AVB_LIBAVB_USER
uint8_t flash_lock_state;
if (rk_avb_read_flash_lock_state(&flash_lock_state)) {
/* write the device flashing unlock when first read */
if (rk_avb_write_flash_lock_state(1)) {
fastboot_tx_write_str("FAILflash lock state write failure");
return;
}
if (rk_avb_read_flash_lock_state(&flash_lock_state)) {
fastboot_tx_write_str("FAILflash lock state read failure");
return;
}
}
if (flash_lock_state == 0) {
fastboot_tx_write_str("FAILThe device is locked, can not flash!");
printf("The device is locked, can not flash!\n");
return;
}
#endif
strsep(&cmd, ":");
if (!cmd) {
pr_err("missing partition name");
fastboot_tx_write_str("FAILmissing partition name");
return;
}
#ifdef CONFIG_ANDROID_AB
if ((strcmp(cmd, PART_USERDATA) == 0) || (strcmp(cmd, PART_METADATA) == 0)) {
if (should_prevent_userdata_wipe()) {
pr_err("FAILThe virtual A/B merging, can not flash userdata or metadata!\n");
fastboot_tx_write_str("FAILvirtual A/B merging,abort flash!");
return;
}
}
#endif
fastboot_fail("no flash device defined", response);
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
fb_mmc_flash_write(cmd, (void *)CONFIG_FASTBOOT_BUF_ADDR,
download_bytes, response);
#endif
#ifdef CONFIG_FASTBOOT_FLASH_NAND_DEV
fb_nand_flash_write(cmd, (void *)CONFIG_FASTBOOT_BUF_ADDR,
download_bytes, response);
#endif
fastboot_tx_write_str(response);
}
static void cb_flashing(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
if (strncmp("lock", cmd + 9, 4) == 0) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
uint8_t flash_lock_state;
flash_lock_state = 0;
if (rk_avb_write_flash_lock_state(flash_lock_state))
fastboot_tx_write_str("FAILflash lock state"
" write failure");
else
fastboot_tx_write_str("OKAY");
#else
fastboot_tx_write_str("FAILnot implemented");
#endif
} else if (strncmp("unlock", cmd + 9, 6) == 0) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
uint8_t flash_lock_state;
flash_lock_state = 1;
if (rk_avb_write_flash_lock_state(flash_lock_state))
fastboot_tx_write_str("FAILflash lock state"
" write failure");
else
fastboot_tx_write_str("OKAY");
#else
fastboot_tx_write_str("FAILnot implemented");
#endif
} else if (strncmp("lock_critical", cmd + 9, 12) == 0) {
fastboot_tx_write_str("FAILnot implemented");
} else if (strncmp("unlock_critical", cmd + 9, 14) == 0) {
fastboot_tx_write_str("FAILnot implemented");
} else if (strncmp("get_unlock_ability", cmd + 9, 17) == 0) {
fastboot_tx_write_str("FAILnot implemented");
} else if (strncmp("get_unlock_bootloader_nonce", cmd + 4, 27) == 0) {
fastboot_tx_write_str("FAILnot implemented");
} else if (strncmp("unlock_bootloader", cmd + 9, 17) == 0) {
fastboot_tx_write_str("FAILnot implemented");
} else if (strncmp("lock_bootloader", cmd + 9, 15) == 0) {
fastboot_tx_write_str("FAILnot implemented");
} else {
fastboot_tx_write_str("FAILunknown flashing command");
}
}
#endif
static void cb_oem_perm_attr(void)
{
#ifdef CONFIG_RK_AVB_LIBAVB_USER
#ifndef CONFIG_ROCKCHIP_PRELOADER_PUB_KEY
sha256_context ctx;
uint8_t digest[SHA256_SUM_LEN] = {0};
uint8_t digest_temp[SHA256_SUM_LEN] = {0};
uint8_t perm_attr_temp[PERM_ATTR_TOTAL_SIZE] = {0};
uint8_t flag = 0;
#endif
if (PERM_ATTR_TOTAL_SIZE != download_bytes) {
printf("Permanent attribute size is not equal!\n");
fastboot_tx_write_str("FAILincorrect perm attribute size");
return;
}
#ifndef CONFIG_ROCKCHIP_PRELOADER_PUB_KEY
if (rk_avb_read_perm_attr_flag(&flag)) {
printf("rk_avb_read_perm_attr_flag error!\n");
fastboot_tx_write_str("FAILperm attr read failed");
return;
}
if (flag == PERM_ATTR_SUCCESS_FLAG) {
if (rk_avb_read_attribute_hash(digest_temp,
SHA256_SUM_LEN)) {
printf("The efuse IO can not be used!\n");
fastboot_tx_write_str("FAILefuse IO can not be used");
return;
}
if (memcmp(digest, digest_temp, SHA256_SUM_LEN) != 0) {
if (rk_avb_read_permanent_attributes(perm_attr_temp,
PERM_ATTR_TOTAL_SIZE)) {
printf("rk_avb_write_permanent_attributes error!\n");
fastboot_tx_write_str("FAILread perm attr error");
return;
}
sha256_starts(&ctx);
sha256_update(&ctx,
(const uint8_t *)perm_attr_temp,
PERM_ATTR_TOTAL_SIZE);
sha256_finish(&ctx, digest);
if (memcmp(digest, digest_temp, SHA256_SUM_LEN) == 0) {
printf("The hash has been written!\n");
fastboot_tx_write_str("OKAY");
return;
}
}
if (rk_avb_write_perm_attr_flag(0)) {
fastboot_tx_write_str("FAILperm attr flag write failure");
return;
}
}
#endif
if (rk_avb_write_permanent_attributes((uint8_t *)
CONFIG_FASTBOOT_BUF_ADDR,
download_bytes)) {
if (rk_avb_write_perm_attr_flag(0)) {
fastboot_tx_write_str("FAILperm attr flag write failure");
return;
}
fastboot_tx_write_str("FAILperm attr write failed");
return;
}
#ifndef CONFIG_ROCKCHIP_PRELOADER_PUB_KEY
memset(digest, 0, SHA256_SUM_LEN);
sha256_starts(&ctx);
sha256_update(&ctx, (const uint8_t *)CONFIG_FASTBOOT_BUF_ADDR,
PERM_ATTR_TOTAL_SIZE);
sha256_finish(&ctx, digest);
if (rk_avb_write_attribute_hash((uint8_t *)digest,
SHA256_SUM_LEN)) {
if (rk_avb_read_attribute_hash(digest_temp,
SHA256_SUM_LEN)) {
printf("The efuse IO can not be used!\n");
fastboot_tx_write_str("FAILefuse IO can not be used");
return;
}
if (memcmp(digest, digest_temp, SHA256_SUM_LEN) != 0) {
if (rk_avb_write_perm_attr_flag(0)) {
fastboot_tx_write_str("FAILperm attr flag write failure");
return;
}
printf("The hash has been written, but is different!\n");
fastboot_tx_write_str("FAILhash comparison failure");
return;
}
}
#endif
if (rk_avb_write_perm_attr_flag(PERM_ATTR_SUCCESS_FLAG)) {
fastboot_tx_write_str("FAILperm attr flag write failure");
return;
}
fastboot_tx_write_str("OKAY");
#else
fastboot_tx_write_str("FAILnot implemented");
#endif
}
static void cb_oem_perm_attr_rsa_cer(void)
{
#ifdef CONFIG_RK_AVB_LIBAVB_USER
if (download_bytes != 256) {
printf("Permanent attribute rsahash size is not equal!\n");
fastboot_tx_write_str("FAILperm attribute rsahash size error");
return;
}
if (rk_avb_set_perm_attr_cer((uint8_t *)CONFIG_FASTBOOT_BUF_ADDR,
download_bytes)) {
fastboot_tx_write_str("FAILSet perm attr cer fail!");
return;
}
fastboot_tx_write_str("OKAY");
#else
fastboot_tx_write_str("FAILnot implemented");
#endif
}
static void cb_oem(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
if (strncmp("format", cmd + 4, 6) == 0) {
char cmdbuf[32];
sprintf(cmdbuf, "gpt write mmc %x $partitions",
CONFIG_FASTBOOT_FLASH_MMC_DEV);
#ifdef CONFIG_ANDROID_AB
if (should_prevent_userdata_wipe()) {
printf("FAILThe virtual A/B merging, can not format!\n");
fastboot_tx_write_str("FAILvirtual A/B merging,abort format!");
} else {
if (run_command(cmdbuf, 0))
fastboot_tx_write_str("FAILmmc write failure");
else
fastboot_tx_write_str("OKAY");
}
#else
if (run_command(cmdbuf, 0))
fastboot_tx_write_str("FAILmmc write failure");
else
fastboot_tx_write_str("OKAY");
#endif
} else
#endif
if (strncmp("unlock", cmd + 4, 8) == 0) {
#ifdef CONFIG_FASTBOOT_OEM_UNLOCK
#ifdef CONFIG_RK_AVB_LIBAVB_USER
fastboot_tx_write_str("FAILnot implemented");
return;
#else
uint8_t unlock = 0;
TEEC_Result result;
debug("oem unlock\n");
result = trusty_read_oem_unlock(&unlock);
if (result) {
printf("read oem unlock status with error : 0x%x\n", result);
fastboot_tx_write_str("FAILRead oem unlock status failed");
return;
}
if (unlock) {
printf("oem unlock ignored, device already unlocked\n");
fastboot_tx_write_str("FAILalready unlocked");
return;
}
printf("oem unlock requested:\n");
printf("\tUnlocking forces a factory reset and could\n");
printf("\topen your device up to a world of hurt. If you\n");
printf("\tare sure you know what you're doing, then accept\n");
printf("\tvia 'fastboot oem unlock_accept'.\n");
env_set("unlock", "unlock");
fastboot_tx_write_str("OKAY");
#endif
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (strncmp("unlock_accept", cmd + 4, 13) == 0) {
#ifdef CONFIG_FASTBOOT_OEM_UNLOCK
#ifdef CONFIG_RK_AVB_LIBAVB_USER
fastboot_tx_write_str("FAILnot implemented");
return;
#else
char *unlock = env_get("unlock");
TEEC_Result result;
debug("oem unlock_accept\n");
if (unlock == NULL || strncmp("unlock", unlock, 6) != 0) {
printf("oem unlock_accept ignored, not pending\n");
fastboot_tx_write_str("FAILoem unlock not requested");
return;
}
env_set("unlock", "");
printf("Erasing userdata partition\n");
struct blk_desc *dev_desc;
disk_partition_t part_info;
dev_desc = rockchip_get_bootdev();
if (!dev_desc) {
printf("%s: dev_desc is NULL!\n", __func__);
return;
}
int ret = part_get_info_by_name(dev_desc, "userdata",
&part_info);
if (ret < 0) {
printf("not found userdata partition");
printf("Erase failed with error %d\n", ret);
fastboot_tx_write_str("FAILErasing userdata failed");
return;
}
ret = blk_derase(dev_desc, part_info.start, part_info.size);
if (ret != part_info.size) {
printf("Erase failed with error %d\n", ret);
fastboot_tx_write_str("FAILErasing userdata failed");
return;
}
printf("Erasing succeeded\n");
result = trusty_write_oem_unlock(1);
if (result) {
printf("write oem unlock status with error : 0x%x\n", result);
fastboot_tx_write_str("FAILWrite oem unlock status failed");
return;
}
fastboot_tx_write_str("OKAY");
/*
* now reboot into recovery to do a format of the
* userdata partition so it's ready to use on next boot
*/
board_run_recovery_wipe_data();
#endif
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (strncmp("lock", cmd + 4, 8) == 0) {
#ifdef CONFIG_FASTBOOT_OEM_UNLOCK
#ifdef CONFIG_RK_AVB_LIBAVB_USER
fastboot_tx_write_str("FAILnot implemented");
return;
#else
TEEC_Result result;
uint8_t unlock = 0;
trusty_read_oem_unlock(&unlock);
if (!unlock) {
printf("oem lock ignored, already locked\n");
fastboot_tx_write_str("FAILalready locked");
return;
}
result = trusty_write_oem_unlock(0);
if (result) {
printf("write oem unlock status with error : 0x%x\n", result);
fastboot_tx_write_str("FAILWrite oem unlock status failed");
return;
}
fastboot_tx_write_str("OKAY");
#endif
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (strncmp("at-get-ca-request", cmd + 4, 17) == 0) {
#ifdef CONFIG_OPTEE_CLIENT
uint8_t out[ATTEST_CA_OUT_SIZE];
uint32_t operation_size = download_bytes;
uint32_t out_len = ATTEST_CA_OUT_SIZE;
uint32_t res = 0;
res = trusty_attest_get_ca((uint8_t *)CONFIG_FASTBOOT_BUF_ADDR,
&operation_size, out, &out_len);
if (res) {
fastboot_tx_write_str("FAILtrusty_attest_get_ca failed");
return;
}
upload_size = out_len;
memcpy((void *)CONFIG_FASTBOOT_BUF_ADDR, out, out_len);
fastboot_tx_write_str("OKAY");
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (strncmp("at-set-ca-response", cmd + 4, 18) == 0) {
#ifdef CONFIG_OPTEE_CLIENT
uint32_t ca_response_size = download_bytes;
uint32_t res = 0;
res = trusty_attest_set_ca((uint8_t *)CONFIG_FASTBOOT_BUF_ADDR,
&ca_response_size);
if (res)
fastboot_tx_write_str("FAILtrusty_attest_set_ca failed");
else
fastboot_tx_write_str("OKAY");
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (strncmp("at-get-vboot-unlock-challenge", cmd + 4, 29) == 0) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
uint32_t challenge_len = 0;
int ret = 0;
ret = rk_generate_unlock_challenge((void *)CONFIG_FASTBOOT_BUF_ADDR, &challenge_len);
if (ret == 0) {
upload_size = challenge_len;
fastboot_tx_write_str("OKAY");
} else {
fastboot_tx_write_str("FAILgenerate unlock challenge fail!");
}
#else
fastboot_tx_write_str("FAILnot implemented");
return;
#endif
} else if (strncmp("at-lock-vboot", cmd + 4, 13) == 0) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
uint8_t lock_state;
lock_state = 0;
if (rk_avb_write_lock_state(lock_state))
fastboot_tx_write_str("FAILwrite lock state failed");
else
fastboot_tx_write_str("OKAY");
#else
fastboot_tx_write_str("FAILnot implemented");
#endif
} else if (strncmp("at-unlock-vboot", cmd + 4, 15) == 0) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
uint8_t lock_state;
char out_is_trusted = true;
if (rk_avb_read_lock_state(&lock_state))
fastboot_tx_write_str("FAILlock sate read failure");
if (lock_state >> 1 == 1) {
fastboot_tx_write_str("FAILThe vboot is disable!");
} else {
lock_state = 1;
#ifdef CONFIG_RK_AVB_LIBAVB_ENABLE_ATH_UNLOCK
if (rk_auth_unlock((void *)CONFIG_FASTBOOT_BUF_ADDR,
&out_is_trusted)) {
printf("rk_auth_unlock ops error!\n");
fastboot_tx_write_str("FAILrk_auth_unlock ops error!");
return;
}
#endif
if (out_is_trusted == true) {
if (rk_avb_write_lock_state(lock_state))
fastboot_tx_write_str("FAILwrite lock state failed");
else
fastboot_tx_write_str("OKAY");
} else {
fastboot_tx_write_str("FAILauthenticated unlock fail");
}
}
#else
fastboot_tx_write_str("FAILnot implemented");
#endif
} else if (strncmp("fuse at-perm-attr", cmd + 4, 16) == 0) {
cb_oem_perm_attr();
} else if (strncmp("fuse at-rsa-perm-attr", cmd + 4, 25) == 0) {
cb_oem_perm_attr_rsa_cer();
} else if (strncmp("fuse at-bootloader-vboot-key", cmd + 4, 27) == 0) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
sha256_context ctx;
uint8_t digest[SHA256_SUM_LEN];
if (download_bytes != VBOOT_KEY_HASH_SIZE) {
fastboot_tx_write_str("FAILinvalid vboot key length");
printf("The vboot key size error!\n");
return;
}
sha256_starts(&ctx);
sha256_update(&ctx, (const uint8_t *)CONFIG_FASTBOOT_BUF_ADDR,
VBOOT_KEY_SIZE);
sha256_finish(&ctx, digest);
if (rk_avb_write_vbootkey_hash((uint8_t *)digest,
SHA256_SUM_LEN)) {
fastboot_tx_write_str("FAILvbootkey hash write failure");
return;
}
fastboot_tx_write_str("OKAY");
#else
fastboot_tx_write_str("FAILnot implemented");
#endif
} else if (strncmp("init-ab-metadata", cmd + 4, 16) == 0) {
#ifdef CONFIG_RK_AVB_LIBAVB_USER
if (rk_avb_init_ab_metadata()) {
fastboot_tx_write_str("FAILinit ab data fail!");
return;
}
fastboot_tx_write_str("OKAY");
#else
fastboot_tx_write_str("FAILnot implemented");
#endif
} else {
fastboot_tx_write_str("FAILunknown oem command");
}
}
#ifdef CONFIG_FASTBOOT_FLASH
static void cb_erase(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
char response[FASTBOOT_RESPONSE_LEN] = {0};
strsep(&cmd, ":");
if (!cmd) {
pr_err("missing partition name");
fastboot_tx_write_str("FAILmissing partition name");
return;
}
#ifdef CONFIG_ANDROID_AB
if ((strcmp(cmd, PART_USERDATA) == 0) || (strcmp(cmd, PART_METADATA) == 0)) {
if (should_prevent_userdata_wipe()) {
pr_err("virtual A/B merging, can not erase userdata or metadata!\n");
fastboot_tx_write_str("FAILvirtual A/B merging,abort erase!");
return;
}
}
#endif
fastboot_fail("no flash device defined", response);
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
fb_mmc_erase(cmd, response);
#endif
#ifdef CONFIG_FASTBOOT_FLASH_NAND_DEV
fb_nand_erase(cmd, response);
#endif
fastboot_tx_write_str(response);
}
#endif
struct cmd_dispatch_info {
char *cmd;
void (*cb)(struct usb_ep *ep, struct usb_request *req);
};
static const struct cmd_dispatch_info cmd_dispatch_info[] = {
{
.cmd = "reboot",
.cb = cb_reboot,
}, {
.cmd = "getvar:",
.cb = cb_getvar,
}, {
.cmd = "download:",
.cb = cb_download,
}, {
.cmd = "upload",
.cb = cb_upload,
}, {
.cmd = "boot",
.cb = cb_boot,
}, {
.cmd = "continue",
.cb = cb_continue,
}, {
.cmd = "set_active",
.cb = cb_set_active,
},
#ifdef CONFIG_FASTBOOT_FLASH
{
.cmd = "flashing",
.cb = cb_flashing,
},
{
.cmd = "flash",
.cb = cb_flash,
}, {
.cmd = "erase",
.cb = cb_erase,
},
#endif
{
.cmd = "oem",
.cb = cb_oem,
},
};
static void rx_handler_command(struct usb_ep *ep, struct usb_request *req)
{
char *cmdbuf = req->buf;
void (*func_cb)(struct usb_ep *ep, struct usb_request *req) = NULL;
int i;
if (req->status != 0 || req->length == 0)
return;
for (i = 0; i < ARRAY_SIZE(cmd_dispatch_info); i++) {
if (!strcmp_l1(cmd_dispatch_info[i].cmd, cmdbuf)) {
func_cb = cmd_dispatch_info[i].cb;
break;
}
}
if (!func_cb) {
pr_err("unknown command: %.*s", req->actual, cmdbuf);
fastboot_tx_write_str("FAILunknown command");
} else {
if (req->actual < req->length) {
u8 *buf = (u8 *)req->buf;
buf[req->actual] = 0;
func_cb(ep, req);
} else {
pr_err("buffer overflow");
fastboot_tx_write_str("FAILbuffer overflow");
}
}
*cmdbuf = '\0';
req->actual = 0;
usb_ep_queue(ep, req, 0);
}