xref: /rk3399_ARM-atf/drivers/renesas/common/io/io_rcar.c (revision 231358f880934fa9b83d532771fc4b50b81ca230)
1 /*
2  * Copyright (c) 2015-2021, Renesas Electronics Corporation. All rights reserved.
3  *
4  * SPDX-License-Identifier: BSD-3-Clause
5  */
6 
7 #include <errno.h>
8 #include <stdint.h>
9 #include <string.h>
10 
11 #include <arch_helpers.h>
12 #include <common/bl_common.h>
13 #include <common/debug.h>
14 #include <drivers/auth/auth_mod.h>
15 #include <drivers/io/io_driver.h>
16 #include <drivers/io/io_storage.h>
17 #include <lib/mmio.h>
18 #include <plat/common/platform.h>
19 #include <tools_share/firmware_image_package.h>
20 #include <tools_share/uuid.h>
21 
22 #include "io_rcar.h"
23 #include "io_common.h"
24 #include "io_private.h"
25 #include <platform_def.h>
26 
27 extern int32_t plat_get_drv_source(uint32_t id, uintptr_t *dev,
28 				   uintptr_t *image_spec);
29 
30 static int32_t rcar_dev_open(const uintptr_t dev_spec __attribute__ ((unused)),
31 			     io_dev_info_t **dev_info);
32 static int32_t rcar_dev_close(io_dev_info_t *dev_info);
33 
34 typedef struct {
35 	const int32_t name;
36 	const uint32_t offset;
37 	const uint32_t attr;
38 } plat_rcar_name_offset_t;
39 
40 typedef struct {
41 	/*
42 	 * Put position above the struct to allow {0} on static init.
43 	 * It is a workaround for a known bug in GCC
44 	 * http://gcc.gnu.org/bugzilla/show_bug.cgi?id=53119
45 	 */
46 	uint32_t position;
47 	uint32_t no_load;
48 	uintptr_t offset;
49 	uint32_t size;
50 	uintptr_t dst;
51 	uintptr_t partition;	/* for eMMC */
52 	/* RCAR_EMMC_PARTITION_BOOT_0 */
53 	/* RCAR_EMMC_PARTITION_BOOT_1 */
54 	/* RCAR_EMMC_PARTITION_USER   */
55 } file_state_t;
56 
57 #define RCAR_GET_FLASH_ADR(a, b)	((uint32_t)((0x40000U * (a)) + (b)))
58 #define RCAR_ATTR_SET_CALCADDR(a)	((a) & 0xF)
59 #define RCAR_ATTR_SET_ISNOLOAD(a)	(((a) & 0x1) << 16U)
60 #define RCAR_ATTR_SET_CERTOFF(a)	(((a) & 0xF) << 8U)
61 #define RCAR_ATTR_SET_ALL(a, b, c)	((uint32_t)(RCAR_ATTR_SET_CALCADDR(a) |\
62 					RCAR_ATTR_SET_ISNOLOAD(b) |\
63 					RCAR_ATTR_SET_CERTOFF(c)))
64 
65 #define RCAR_ATTR_GET_CALCADDR(a)	((a) & 0xFU)
66 #define RCAR_ATTR_GET_ISNOLOAD(a)	(((a) >> 16) & 0x1U)
67 #define RCAR_ATTR_GET_CERTOFF(a)	((uint32_t)(((a) >> 8) & 0xFU))
68 
69 #define RCAR_MAX_BL3X_IMAGE		(8U)
70 #define RCAR_SECTOR6_CERT_OFFSET	(0x400U)
71 #define RCAR_SDRAM_certESS		(0x43F00000U)
72 #define RCAR_CERT_SIZE			(0x800U)
73 #define RCAR_CERT_INFO_SIZE_OFFSET	(0x264U)
74 #define RCAR_CERT_INFO_DST_OFFSET	(0x154U)
75 #define RCAR_CERT_INFO_SIZE_OFFSET1	(0x364U)
76 #define RCAR_CERT_INFO_DST_OFFSET1	(0x1D4U)
77 #define RCAR_CERT_INFO_SIZE_OFFSET2	(0x464U)
78 #define RCAR_CERT_INFO_DST_OFFSET2	(0x254U)
79 #define RCAR_CERT_LOAD			(1U)
80 
81 #define RCAR_FLASH_CERT_HEADER		RCAR_GET_FLASH_ADR(6U, 0U)
82 #define RCAR_EMMC_CERT_HEADER		(0x00030000U)
83 
84 #define RCAR_COUNT_LOAD_BL33		(2U)
85 #define RCAR_COUNT_LOAD_BL33X		(3U)
86 
87 static const plat_rcar_name_offset_t name_offset[] = {
88 	{BL31_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(0, 0, 0)},
89 
90 	/* BL3-2 is optional in the platform */
91 	{BL32_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(1, 0, 1)},
92 	{BL33_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(2, 0, 2)},
93 	{BL332_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(3, 0, 3)},
94 	{BL333_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(4, 0, 4)},
95 	{BL334_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(5, 0, 5)},
96 	{BL335_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(6, 0, 6)},
97 	{BL336_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(7, 0, 7)},
98 	{BL337_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(8, 0, 8)},
99 	{BL338_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(9, 0, 9)},
100 };
101 
102 #if TRUSTED_BOARD_BOOT
103 static const plat_rcar_name_offset_t cert_offset[] = {
104 	/* Certificates */
105 	{TRUSTED_KEY_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)},
106 	{SOC_FW_KEY_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)},
107 	{TRUSTED_OS_FW_KEY_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)},
108 	{NON_TRUSTED_FW_KEY_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)},
109 	{SOC_FW_CONTENT_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)},
110 	{TRUSTED_OS_FW_CONTENT_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 1)},
111 	{NON_TRUSTED_FW_CONTENT_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 2)},
112 	{BL332_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 3)},
113 	{BL333_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 4)},
114 	{BL334_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 5)},
115 	{BL335_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 6)},
116 	{BL336_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 7)},
117 	{BL337_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 8)},
118 	{BL338_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 9)},
119 };
120 #endif /* TRUSTED_BOARD_BOOT */
121 
122 static file_state_t current_file = { 0 };
123 
124 static uintptr_t rcar_handle, rcar_spec;
125 static uint64_t rcar_image_header[RCAR_MAX_BL3X_IMAGE + 2U] = { 0U };
126 static uint64_t rcar_image_header_prttn[RCAR_MAX_BL3X_IMAGE + 2U] = { 0U };
127 static uint64_t rcar_image_number = { 0U };
128 static uint32_t rcar_cert_load = { 0U };
129 
130 static io_type_t device_type_rcar(void)
131 {
132 	return IO_TYPE_FIRMWARE_IMAGE_PACKAGE;
133 }
134 
135 int32_t rcar_get_certificate(const int32_t name, uint32_t *cert)
136 {
137 #if TRUSTED_BOARD_BOOT
138 	int32_t i;
139 
140 	for (i = 0; i < ARRAY_SIZE(cert_offset); i++) {
141 		if (name != cert_offset[i].name) {
142 			continue;
143 		}
144 
145 		*cert = RCAR_CERT_SIZE;
146 		*cert *= RCAR_ATTR_GET_CERTOFF(cert_offset[i].attr);
147 		*cert += RCAR_SDRAM_certESS;
148 		return 0;
149 	}
150 #endif
151 	return -EINVAL;
152 }
153 
154 #define MFISBTSTSR			(0xE6260604U)
155 #define MFISBTSTSR_BOOT_PARTITION	(0x00000010U)
156 
157 static int32_t file_to_offset(const int32_t name, uintptr_t *offset,
158 			      uint32_t *cert, uint32_t *no_load,
159 			      uintptr_t *partition)
160 {
161 	uint32_t addr;
162 	int32_t i;
163 
164 	for (i = 0; i < ARRAY_SIZE(name_offset); i++) {
165 		if (name != name_offset[i].name) {
166 			continue;
167 		}
168 
169 		addr = RCAR_ATTR_GET_CALCADDR(name_offset[i].attr);
170 		if (rcar_image_number + 2U < addr) {
171 			continue;
172 		}
173 
174 		*offset = rcar_image_header[addr];
175 
176 		if (mmio_read_32(MFISBTSTSR) & MFISBTSTSR_BOOT_PARTITION)
177 			*offset += 0x800000;
178 		*cert = RCAR_CERT_SIZE;
179 		*cert *= RCAR_ATTR_GET_CERTOFF(name_offset[i].attr);
180 		*cert += RCAR_SDRAM_certESS;
181 		*no_load = RCAR_ATTR_GET_ISNOLOAD(name_offset[i].attr);
182 		*partition = rcar_image_header_prttn[addr];
183 		return IO_SUCCESS;
184 	}
185 
186 #if TRUSTED_BOARD_BOOT
187 	for (i = 0; i < ARRAY_SIZE(cert_offset); i++) {
188 		if (name != cert_offset[i].name) {
189 			continue;
190 		}
191 
192 		*no_load = RCAR_ATTR_GET_ISNOLOAD(cert_offset[i].attr);
193 		*partition = 0U;
194 		*offset = 0U;
195 		*cert = 0U;
196 		return IO_SUCCESS;
197 	}
198 #endif
199 	return -EINVAL;
200 }
201 
202 #define RCAR_BOOT_KEY_CERT_NEW	(0xE6300F00U)
203 #define	RCAR_CERT_MAGIC_NUM	(0xE291F358U)
204 
205 void rcar_read_certificate(uint64_t cert, uint32_t *len, uintptr_t *dst)
206 {
207 	uint32_t seed, val, info_1, info_2;
208 	uintptr_t size, dsth, dstl;
209 
210 	cert &= 0xFFFFFFFFU;
211 
212 	seed = mmio_read_32(RCAR_BOOT_KEY_CERT_NEW);
213 	val = mmio_read_32(RCAR_BOOT_KEY_CERT_NEW + 0xC);
214 	info_1 = (val >> 18) & 0x3U;
215 	val = mmio_read_32(cert + 0xC);
216 	info_2 = (val >> 21) & 0x3;
217 
218 	if (seed == RCAR_CERT_MAGIC_NUM) {
219 		if (info_1 != 1) {
220 			ERROR("BL2: Cert is invalid.\n");
221 			*dst = 0;
222 			*len = 0;
223 			return;
224 		}
225 
226 		if (info_2 > 2) {
227 			ERROR("BL2: Cert is invalid.\n");
228 			*dst = 0;
229 			*len = 0;
230 			return;
231 		}
232 
233 		switch (info_2) {
234 		case 2:
235 			size = cert + RCAR_CERT_INFO_SIZE_OFFSET2;
236 			dstl = cert + RCAR_CERT_INFO_DST_OFFSET2;
237 			break;
238 		case 1:
239 			size = cert + RCAR_CERT_INFO_SIZE_OFFSET1;
240 			dstl = cert + RCAR_CERT_INFO_DST_OFFSET1;
241 			break;
242 		case 0:
243 			size = cert + RCAR_CERT_INFO_SIZE_OFFSET;
244 			dstl = cert + RCAR_CERT_INFO_DST_OFFSET;
245 			break;
246 		}
247 		val = mmio_read_32(size);
248 		if (val > (UINT32_MAX / 4)) {
249 			ERROR("BL2: %s[%d] uint32 overflow!\n",
250 				__func__, __LINE__);
251 			*dst = 0;
252 			*len = 0;
253 			return;
254 		}
255 
256 		*len = val * 4U;
257 		dsth = dstl + 4U;
258 		*dst = ((uintptr_t) mmio_read_32(dsth) << 32) +
259 		    ((uintptr_t) mmio_read_32(dstl));
260 		return;
261 	}
262 
263 	size = cert + RCAR_CERT_INFO_SIZE_OFFSET;
264 	val = mmio_read_32(size);
265 	if (val > (UINT32_MAX / 4)) {
266 		ERROR("BL2: %s[%d] uint32 overflow!\n", __func__, __LINE__);
267 		*dst = 0;
268 		*len = 0;
269 		return;
270 	}
271 	*len = val * 4U;
272 	dstl = cert + RCAR_CERT_INFO_DST_OFFSET;
273 	dsth = dstl + 4U;
274 	*dst = ((uintptr_t) mmio_read_32(dsth) << 32) +
275 	    ((uintptr_t) mmio_read_32(dstl));
276 }
277 
278 static int32_t check_load_area(uintptr_t dst, uintptr_t len)
279 {
280 	uint32_t legacy = dst + len <= UINT32_MAX - 1 ? 1 : 0;
281 	uintptr_t dram_start, dram_end;
282 	uintptr_t prot_start, prot_end;
283 	int32_t result = IO_SUCCESS;
284 
285 	dram_start = legacy ? DRAM1_BASE : DRAM_40BIT_BASE;
286 
287 	dram_end = legacy ? DRAM1_BASE + DRAM1_SIZE :
288 	    DRAM_40BIT_BASE + DRAM_40BIT_SIZE;
289 
290 	prot_start = legacy ? DRAM_PROTECTED_BASE : DRAM_40BIT_PROTECTED_BASE;
291 
292 	prot_end = prot_start + DRAM_PROTECTED_SIZE;
293 
294 	if (dst < dram_start || len > dram_end || dst > dram_end - len) {
295 		ERROR("BL2: dst address is on the protected area.\n");
296 		result = IO_FAIL;
297 		goto done;
298 	}
299 
300 	/* load image is within SDRAM protected area */
301 	if (dst >= prot_start && dst < prot_end) {
302 		ERROR("BL2: dst address is on the protected area.\n");
303 		result = IO_FAIL;
304 	}
305 
306 	if (len > prot_start || (dst < prot_start && dst > prot_start - len)) {
307 		ERROR("BL2: %s[%d] loaded data is on the protected area.\n",
308 			__func__, __LINE__);
309 		result = IO_FAIL;
310 	}
311 done:
312 	if (result == IO_FAIL) {
313 		ERROR("BL2: Out of range : dst=0x%lx len=0x%lx\n", dst, len);
314 	}
315 
316 	return result;
317 }
318 
319 static int32_t load_bl33x(void)
320 {
321 	static int32_t loaded = IO_NOT_SUPPORTED;
322 	uintptr_t dst, partition, handle;
323 	uint32_t noload, cert, len, i;
324 	uintptr_t offset;
325 	int32_t rc;
326 	size_t cnt;
327 	const int32_t img[] = {
328 		BL33_IMAGE_ID,
329 		BL332_IMAGE_ID,
330 		BL333_IMAGE_ID,
331 		BL334_IMAGE_ID,
332 		BL335_IMAGE_ID,
333 		BL336_IMAGE_ID,
334 		BL337_IMAGE_ID,
335 		BL338_IMAGE_ID
336 	};
337 
338 	if (loaded != IO_NOT_SUPPORTED) {
339 		return loaded;
340 	}
341 
342 	for (i = 1; i < rcar_image_number; i++) {
343 		rc = file_to_offset(img[i], &offset, &cert, &noload,
344 				    &partition);
345 		if (rc != IO_SUCCESS) {
346 			WARN("%s: failed to get offset\n", __func__);
347 			loaded = IO_FAIL;
348 			return loaded;
349 		}
350 
351 		rcar_read_certificate((uint64_t) cert, &len, &dst);
352 		((io_drv_spec_t *) rcar_spec)->partition = partition;
353 
354 		rc = io_open(rcar_handle, rcar_spec, &handle);
355 		if (rc != IO_SUCCESS) {
356 			WARN("%s: Failed to open FIP (%i)\n", __func__, rc);
357 			loaded = IO_FAIL;
358 			return loaded;
359 		}
360 
361 		rc = io_seek(handle, IO_SEEK_SET, offset);
362 		if (rc != IO_SUCCESS) {
363 			WARN("%s: failed to seek\n", __func__);
364 			loaded = IO_FAIL;
365 			return loaded;
366 		}
367 
368 		rc = check_load_area(dst, len);
369 		if (rc != IO_SUCCESS) {
370 			WARN("%s: check load area\n", __func__);
371 			loaded = IO_FAIL;
372 			return loaded;
373 		}
374 
375 		rc = io_read(handle, dst, len, &cnt);
376 		if (rc != IO_SUCCESS) {
377 			WARN("%s: failed to read\n", __func__);
378 			loaded = IO_FAIL;
379 			return loaded;
380 		}
381 #if TRUSTED_BOARD_BOOT
382 		rc = auth_mod_verify_img(img[i], (void *)dst, len);
383 		if (rc != 0) {
384 			memset((void *)dst, 0x00, len);
385 			loaded = IO_FAIL;
386 			return loaded;
387 		}
388 #endif
389 		io_close(handle);
390 	}
391 
392 	loaded = IO_SUCCESS;
393 
394 	return loaded;
395 }
396 
397 static int32_t rcar_dev_init(io_dev_info_t *dev_info, const uintptr_t name)
398 {
399 	static uint64_t header[64] __aligned(FLASH_TRANS_SIZE_UNIT) = {0UL};
400 	uintptr_t handle;
401 	ssize_t offset;
402 	uint32_t i;
403 	int32_t rc;
404 	size_t cnt;
405 
406 	/* Obtain a reference to the image by querying the platform layer */
407 	rc = plat_get_drv_source(name, &rcar_handle, &rcar_spec);
408 	if (rc != IO_SUCCESS) {
409 		WARN("Failed to obtain reference to img %ld (%i)\n", name, rc);
410 		return IO_FAIL;
411 	}
412 
413 	if (rcar_cert_load == RCAR_CERT_LOAD) {
414 		return IO_SUCCESS;
415 	}
416 
417 	rc = io_open(rcar_handle, rcar_spec, &handle);
418 	if (rc != IO_SUCCESS) {
419 		WARN("Failed to access img %ld (%i)\n", name, rc);
420 		return IO_FAIL;
421 	}
422 
423 	/*
424 	 * get start address list
425 	 * [0] address num
426 	 * [1] BL33-1 image address
427 	 * [2] BL33-2 image address
428 	 * [3] BL33-3 image address
429 	 * [4] BL33-4 image address
430 	 * [5] BL33-5 image address
431 	 * [6] BL33-6 image address
432 	 * [7] BL33-7 image address
433 	 * [8] BL33-8 image address
434 	 */
435 	offset = name == EMMC_DEV_ID ? RCAR_EMMC_CERT_HEADER :
436 	    RCAR_FLASH_CERT_HEADER;
437 	rc = io_seek(handle, IO_SEEK_SET, offset);
438 	if (rc != IO_SUCCESS) {
439 		WARN("Firmware Image Package header failed to seek\n");
440 		goto error;
441 	}
442 
443 	rc = io_read(handle, (uintptr_t) &header, sizeof(header), &cnt);
444 	if (rc != IO_SUCCESS) {
445 		WARN("Firmware Image Package header failed to read\n");
446 		goto error;
447 	}
448 
449 #if RCAR_BL2_DCACHE == 1
450 	inv_dcache_range((uint64_t) header, sizeof(header));
451 #endif
452 
453 	rcar_image_number = header[0];
454 	if (rcar_image_number == 0 || rcar_image_number > RCAR_MAX_BL3X_IMAGE) {
455 		WARN("Firmware Image Package header check failed.\n");
456 		rc = IO_FAIL;
457 		goto error;
458 	}
459 
460 	for (i = 0; i < rcar_image_number + 2; i++) {
461 		rcar_image_header[i] = header[i * 2 + 1];
462 		rcar_image_header_prttn[i] = header[i * 2 + 2];
463 	}
464 
465 	rc = io_seek(handle, IO_SEEK_SET, offset + RCAR_SECTOR6_CERT_OFFSET);
466 	if (rc != IO_SUCCESS) {
467 		WARN("Firmware Image Package header failed to seek cert\n");
468 		goto error;
469 	}
470 
471 	rc = io_read(handle, RCAR_SDRAM_certESS,
472 		     RCAR_CERT_SIZE * (2 + rcar_image_number), &cnt);
473 	if (rc != IO_SUCCESS) {
474 		WARN("cert file read error.\n");
475 		goto error;
476 	}
477 
478 #if RCAR_BL2_DCACHE == 1
479 	inv_dcache_range(RCAR_SDRAM_certESS,
480 			 RCAR_CERT_SIZE * (2 + rcar_image_number));
481 #endif
482 
483 	rcar_cert_load = RCAR_CERT_LOAD;
484 error:
485 
486 	if (rc != IO_SUCCESS) {
487 		rc = IO_FAIL;
488 	}
489 
490 	io_close(handle);
491 
492 	return rc;
493 
494 }
495 
496 static int32_t rcar_file_open(io_dev_info_t *info, const uintptr_t file_spec,
497 			      io_entity_t *entity)
498 {
499 	const io_drv_spec_t *spec = (io_drv_spec_t *) file_spec;
500 	uintptr_t partition, offset, dst;
501 	uint32_t noload, cert, len;
502 	int32_t rc;
503 
504 	/*
505 	 * Only one file open at a time. We need to  track state (ie, file
506 	 * cursor position). Since the header lives at offset zero, this entry
507 	 * should never be zero in an active file.
508 	 * Once the system supports dynamic memory allocation we will allow more
509 	 * than one open file at a time.
510 	 */
511 	if (current_file.offset != 0U) {
512 		WARN("%s: Only one open file at a time.\n", __func__);
513 		return IO_RESOURCES_EXHAUSTED;
514 	}
515 
516 	rc = file_to_offset(spec->offset, &offset, &cert, &noload, &partition);
517 	if (rc != IO_SUCCESS) {
518 		WARN("Failed to open file name %ld (%i)\n", spec->offset, rc);
519 		return IO_FAIL;
520 	}
521 
522 	if (noload != 0U) {
523 		current_file.offset = 1;
524 		current_file.dst = 0;
525 		current_file.size = 1;
526 		current_file.position = 0;
527 		current_file.no_load = noload;
528 		current_file.partition = 0;
529 		entity->info = (uintptr_t) &current_file;
530 
531 		return IO_SUCCESS;
532 	}
533 
534 	rcar_read_certificate((uint64_t) cert, &len, &dst);
535 
536 	/* Baylibre: HACK */
537 	if (spec->offset == BL31_IMAGE_ID && len < RCAR_TRUSTED_SRAM_SIZE) {
538 		WARN("%s,%s\n", "r-car ignoring the BL31 size from certificate",
539 		     "using RCAR_TRUSTED_SRAM_SIZE instead");
540 		len = RCAR_TRUSTED_SRAM_SIZE;
541 	}
542 
543 	current_file.partition = partition;
544 	current_file.no_load = noload;
545 	current_file.offset = offset;
546 	current_file.position = 0;
547 	current_file.size = len;
548 	current_file.dst = dst;
549 	entity->info = (uintptr_t) &current_file;
550 
551 	return IO_SUCCESS;
552 }
553 
554 static int32_t rcar_file_len(io_entity_t *entity, size_t *length)
555 {
556 	*length = ((file_state_t *) entity->info)->size;
557 
558 	NOTICE("%s: len: 0x%08lx\n", __func__, *length);
559 
560 	return IO_SUCCESS;
561 }
562 
563 static int32_t rcar_file_read(io_entity_t *entity, uintptr_t buffer,
564 			      size_t length, size_t *cnt)
565 {
566 	file_state_t *fp = (file_state_t *) entity->info;
567 	ssize_t offset = fp->offset + fp->position;
568 	uintptr_t handle;
569 	int32_t rc;
570 
571 #ifdef SPD_NONE
572 	static uint32_t load_bl33x_counter = 1;
573 #else
574 	static uint32_t load_bl33x_counter;
575 #endif
576 	if (current_file.no_load != 0U) {
577 		*cnt = length;
578 		return IO_SUCCESS;
579 	}
580 
581 	((io_drv_spec_t *) rcar_spec)->partition = fp->partition;
582 
583 	rc = io_open(rcar_handle, rcar_spec, &handle);
584 	if (rc != IO_SUCCESS) {
585 		WARN("Failed to open FIP (%i)\n", rc);
586 		return IO_FAIL;
587 	}
588 
589 	rc = io_seek(handle, IO_SEEK_SET, offset);
590 	if (rc != IO_SUCCESS) {
591 		WARN("%s: failed to seek\n", __func__);
592 		goto error;
593 	}
594 
595 	if (load_bl33x_counter == RCAR_COUNT_LOAD_BL33) {
596 		rc = check_load_area(buffer, length);
597 		if (rc != IO_SUCCESS) {
598 			WARN("%s: load area err\n", __func__);
599 			goto error;
600 		}
601 	}
602 
603 	rc = io_read(handle, buffer, length, cnt);
604 	if (rc != IO_SUCCESS) {
605 		WARN("Failed to read payload (%i)\n", rc);
606 		goto error;
607 	}
608 
609 	fp->position += *cnt;
610 	io_close(handle);
611 
612 	load_bl33x_counter += 1;
613 	if (load_bl33x_counter == RCAR_COUNT_LOAD_BL33X) {
614 		return load_bl33x();
615 	}
616 
617 	return IO_SUCCESS;
618 error:
619 	io_close(handle);
620 	return IO_FAIL;
621 }
622 
623 static int32_t rcar_file_close(io_entity_t *entity)
624 {
625 	if (current_file.offset != 0U) {
626 		memset(&current_file, 0, sizeof(current_file));
627 	}
628 
629 	entity->info = 0U;
630 
631 	return IO_SUCCESS;
632 }
633 
634 static const io_dev_funcs_t rcar_dev_funcs = {
635 	.type = &device_type_rcar,
636 	.open = &rcar_file_open,
637 	.seek = NULL,
638 	.size = &rcar_file_len,
639 	.read = &rcar_file_read,
640 	.write = NULL,
641 	.close = &rcar_file_close,
642 	.dev_init = &rcar_dev_init,
643 	.dev_close = &rcar_dev_close,
644 };
645 
646 static const io_dev_info_t rcar_dev_info = {
647 	.funcs = &rcar_dev_funcs,
648 	.info = (uintptr_t) 0
649 };
650 
651 static const io_dev_connector_t rcar_dev_connector = {
652 	.dev_open = &rcar_dev_open
653 };
654 
655 static int32_t rcar_dev_open(const uintptr_t dev_spec __attribute__ ((unused)),
656 			     io_dev_info_t **dev_info)
657 {
658 	*dev_info = (io_dev_info_t *) &rcar_dev_info;
659 
660 	return IO_SUCCESS;
661 }
662 
663 static int32_t rcar_dev_close(io_dev_info_t *dev_info)
664 {
665 	rcar_handle = 0;
666 	rcar_spec = 0;
667 
668 	return IO_SUCCESS;
669 }
670 
671 int32_t rcar_register_io_dev(const io_dev_connector_t **dev_con)
672 {
673 	int32_t result;
674 
675 	result = io_register_device(&rcar_dev_info);
676 	if (result == IO_SUCCESS) {
677 		*dev_con = &rcar_dev_connector;
678 	}
679 
680 	return result;
681 }
682