1 /* 2 * Copyright (c) 2015-2021, Renesas Electronics Corporation. All rights reserved. 3 * 4 * SPDX-License-Identifier: BSD-3-Clause 5 */ 6 7 #include <errno.h> 8 #include <stdint.h> 9 #include <string.h> 10 11 #include <arch_helpers.h> 12 #include <common/bl_common.h> 13 #include <common/debug.h> 14 #include <drivers/auth/auth_mod.h> 15 #include <drivers/io/io_driver.h> 16 #include <drivers/io/io_storage.h> 17 #include <lib/mmio.h> 18 #include <plat/common/platform.h> 19 #include <tools_share/firmware_image_package.h> 20 #include <tools_share/uuid.h> 21 22 #include "io_rcar.h" 23 #include "io_common.h" 24 #include "io_private.h" 25 #include <platform_def.h> 26 27 extern int32_t plat_get_drv_source(uint32_t id, uintptr_t *dev, 28 uintptr_t *image_spec); 29 30 static int32_t rcar_dev_open(const uintptr_t dev_spec __attribute__ ((unused)), 31 io_dev_info_t **dev_info); 32 static int32_t rcar_dev_close(io_dev_info_t *dev_info); 33 34 typedef struct { 35 const int32_t name; 36 const uint32_t offset; 37 const uint32_t attr; 38 } plat_rcar_name_offset_t; 39 40 typedef struct { 41 /* 42 * Put position above the struct to allow {0} on static init. 43 * It is a workaround for a known bug in GCC 44 * http://gcc.gnu.org/bugzilla/show_bug.cgi?id=53119 45 */ 46 uint32_t position; 47 uint32_t no_load; 48 uintptr_t offset; 49 uint32_t size; 50 uintptr_t dst; 51 uintptr_t partition; /* for eMMC */ 52 /* RCAR_EMMC_PARTITION_BOOT_0 */ 53 /* RCAR_EMMC_PARTITION_BOOT_1 */ 54 /* RCAR_EMMC_PARTITION_USER */ 55 } file_state_t; 56 57 #define RCAR_GET_FLASH_ADR(a, b) ((uint32_t)((0x40000U * (a)) + (b))) 58 #define RCAR_ATTR_SET_CALCADDR(a) ((a) & 0xF) 59 #define RCAR_ATTR_SET_ISNOLOAD(a) (((a) & 0x1) << 16U) 60 #define RCAR_ATTR_SET_CERTOFF(a) (((a) & 0xF) << 8U) 61 #define RCAR_ATTR_SET_ALL(a, b, c) ((uint32_t)(RCAR_ATTR_SET_CALCADDR(a) |\ 62 RCAR_ATTR_SET_ISNOLOAD(b) |\ 63 RCAR_ATTR_SET_CERTOFF(c))) 64 65 #define RCAR_ATTR_GET_CALCADDR(a) ((a) & 0xFU) 66 #define RCAR_ATTR_GET_ISNOLOAD(a) (((a) >> 16) & 0x1U) 67 #define RCAR_ATTR_GET_CERTOFF(a) ((uint32_t)(((a) >> 8) & 0xFU)) 68 69 #define RCAR_MAX_BL3X_IMAGE (8U) 70 #define RCAR_SECTOR6_CERT_OFFSET (0x400U) 71 #define RCAR_SDRAM_certESS (0x43F00000U) 72 #define RCAR_CERT_SIZE (0x800U) 73 #define RCAR_CERT_INFO_SIZE_OFFSET (0x264U) 74 #define RCAR_CERT_INFO_DST_OFFSET (0x154U) 75 #define RCAR_CERT_INFO_SIZE_OFFSET1 (0x364U) 76 #define RCAR_CERT_INFO_DST_OFFSET1 (0x1D4U) 77 #define RCAR_CERT_INFO_SIZE_OFFSET2 (0x464U) 78 #define RCAR_CERT_INFO_DST_OFFSET2 (0x254U) 79 #define RCAR_CERT_LOAD (1U) 80 81 #define RCAR_FLASH_CERT_HEADER RCAR_GET_FLASH_ADR(6U, 0U) 82 #define RCAR_EMMC_CERT_HEADER (0x00030000U) 83 84 #define RCAR_COUNT_LOAD_BL33 (2U) 85 #define RCAR_COUNT_LOAD_BL33X (3U) 86 87 static const plat_rcar_name_offset_t name_offset[] = { 88 {BL31_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(0, 0, 0)}, 89 90 /* BL3-2 is optional in the platform */ 91 {BL32_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(1, 0, 1)}, 92 {BL33_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(2, 0, 2)}, 93 {BL332_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(3, 0, 3)}, 94 {BL333_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(4, 0, 4)}, 95 {BL334_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(5, 0, 5)}, 96 {BL335_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(6, 0, 6)}, 97 {BL336_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(7, 0, 7)}, 98 {BL337_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(8, 0, 8)}, 99 {BL338_IMAGE_ID, 0U, RCAR_ATTR_SET_ALL(9, 0, 9)}, 100 }; 101 102 #if TRUSTED_BOARD_BOOT 103 static const plat_rcar_name_offset_t cert_offset[] = { 104 /* Certificates */ 105 {TRUSTED_KEY_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)}, 106 {SOC_FW_KEY_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)}, 107 {TRUSTED_OS_FW_KEY_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)}, 108 {NON_TRUSTED_FW_KEY_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)}, 109 {SOC_FW_CONTENT_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 0)}, 110 {TRUSTED_OS_FW_CONTENT_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 1)}, 111 {NON_TRUSTED_FW_CONTENT_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 2)}, 112 {BL332_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 3)}, 113 {BL333_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 4)}, 114 {BL334_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 5)}, 115 {BL335_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 6)}, 116 {BL336_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 7)}, 117 {BL337_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 8)}, 118 {BL338_CERT_ID, 0U, RCAR_ATTR_SET_ALL(0, 1, 9)}, 119 }; 120 #endif /* TRUSTED_BOARD_BOOT */ 121 122 static file_state_t current_file = { 0 }; 123 124 static uintptr_t rcar_handle, rcar_spec; 125 static uint64_t rcar_image_header[RCAR_MAX_BL3X_IMAGE + 2U] = { 0U }; 126 static uint64_t rcar_image_header_prttn[RCAR_MAX_BL3X_IMAGE + 2U] = { 0U }; 127 static uint64_t rcar_image_number = { 0U }; 128 static uint32_t rcar_cert_load = { 0U }; 129 130 static io_type_t device_type_rcar(void) 131 { 132 return IO_TYPE_FIRMWARE_IMAGE_PACKAGE; 133 } 134 135 int32_t rcar_get_certificate(const int32_t name, uint32_t *cert) 136 { 137 #if TRUSTED_BOARD_BOOT 138 int32_t i; 139 140 for (i = 0; i < ARRAY_SIZE(cert_offset); i++) { 141 if (name != cert_offset[i].name) { 142 continue; 143 } 144 145 *cert = RCAR_CERT_SIZE; 146 *cert *= RCAR_ATTR_GET_CERTOFF(cert_offset[i].attr); 147 *cert += RCAR_SDRAM_certESS; 148 return 0; 149 } 150 #endif 151 return -EINVAL; 152 } 153 154 #define MFISBTSTSR (0xE6260604U) 155 #define MFISBTSTSR_BOOT_PARTITION (0x00000010U) 156 157 static int32_t file_to_offset(const int32_t name, uintptr_t *offset, 158 uint32_t *cert, uint32_t *no_load, 159 uintptr_t *partition) 160 { 161 uint32_t addr; 162 int32_t i; 163 164 for (i = 0; i < ARRAY_SIZE(name_offset); i++) { 165 if (name != name_offset[i].name) { 166 continue; 167 } 168 169 addr = RCAR_ATTR_GET_CALCADDR(name_offset[i].attr); 170 if (rcar_image_number + 2U < addr) { 171 continue; 172 } 173 174 *offset = rcar_image_header[addr]; 175 176 if (mmio_read_32(MFISBTSTSR) & MFISBTSTSR_BOOT_PARTITION) 177 *offset += 0x800000; 178 *cert = RCAR_CERT_SIZE; 179 *cert *= RCAR_ATTR_GET_CERTOFF(name_offset[i].attr); 180 *cert += RCAR_SDRAM_certESS; 181 *no_load = RCAR_ATTR_GET_ISNOLOAD(name_offset[i].attr); 182 *partition = rcar_image_header_prttn[addr]; 183 return IO_SUCCESS; 184 } 185 186 #if TRUSTED_BOARD_BOOT 187 for (i = 0; i < ARRAY_SIZE(cert_offset); i++) { 188 if (name != cert_offset[i].name) { 189 continue; 190 } 191 192 *no_load = RCAR_ATTR_GET_ISNOLOAD(cert_offset[i].attr); 193 *partition = 0U; 194 *offset = 0U; 195 *cert = 0U; 196 return IO_SUCCESS; 197 } 198 #endif 199 return -EINVAL; 200 } 201 202 #define RCAR_BOOT_KEY_CERT_NEW (0xE6300F00U) 203 #define RCAR_CERT_MAGIC_NUM (0xE291F358U) 204 205 void rcar_read_certificate(uint64_t cert, uint32_t *len, uintptr_t *dst) 206 { 207 uint32_t seed, val, info_1, info_2; 208 uintptr_t size, dsth, dstl; 209 210 cert &= 0xFFFFFFFFU; 211 212 seed = mmio_read_32(RCAR_BOOT_KEY_CERT_NEW); 213 val = mmio_read_32(RCAR_BOOT_KEY_CERT_NEW + 0xC); 214 info_1 = (val >> 18) & 0x3U; 215 val = mmio_read_32(cert + 0xC); 216 info_2 = (val >> 21) & 0x3; 217 218 if (seed == RCAR_CERT_MAGIC_NUM) { 219 if (info_1 != 1) { 220 ERROR("BL2: Cert is invalid.\n"); 221 *dst = 0; 222 *len = 0; 223 return; 224 } 225 226 if (info_2 > 2) { 227 ERROR("BL2: Cert is invalid.\n"); 228 *dst = 0; 229 *len = 0; 230 return; 231 } 232 233 switch (info_2) { 234 case 2: 235 size = cert + RCAR_CERT_INFO_SIZE_OFFSET2; 236 dstl = cert + RCAR_CERT_INFO_DST_OFFSET2; 237 break; 238 case 1: 239 size = cert + RCAR_CERT_INFO_SIZE_OFFSET1; 240 dstl = cert + RCAR_CERT_INFO_DST_OFFSET1; 241 break; 242 case 0: 243 size = cert + RCAR_CERT_INFO_SIZE_OFFSET; 244 dstl = cert + RCAR_CERT_INFO_DST_OFFSET; 245 break; 246 } 247 val = mmio_read_32(size); 248 if (val > (UINT32_MAX / 4)) { 249 ERROR("BL2: %s[%d] uint32 overflow!\n", 250 __func__, __LINE__); 251 *dst = 0; 252 *len = 0; 253 return; 254 } 255 256 *len = val * 4U; 257 dsth = dstl + 4U; 258 *dst = ((uintptr_t) mmio_read_32(dsth) << 32) + 259 ((uintptr_t) mmio_read_32(dstl)); 260 return; 261 } 262 263 size = cert + RCAR_CERT_INFO_SIZE_OFFSET; 264 val = mmio_read_32(size); 265 if (val > (UINT32_MAX / 4)) { 266 ERROR("BL2: %s[%d] uint32 overflow!\n", __func__, __LINE__); 267 *dst = 0; 268 *len = 0; 269 return; 270 } 271 *len = val * 4U; 272 dstl = cert + RCAR_CERT_INFO_DST_OFFSET; 273 dsth = dstl + 4U; 274 *dst = ((uintptr_t) mmio_read_32(dsth) << 32) + 275 ((uintptr_t) mmio_read_32(dstl)); 276 } 277 278 static int32_t check_load_area(uintptr_t dst, uintptr_t len) 279 { 280 uint32_t legacy = dst + len <= UINT32_MAX - 1 ? 1 : 0; 281 uintptr_t dram_start, dram_end; 282 uintptr_t prot_start, prot_end; 283 int32_t result = IO_SUCCESS; 284 285 dram_start = legacy ? DRAM1_BASE : DRAM_40BIT_BASE; 286 287 dram_end = legacy ? DRAM1_BASE + DRAM1_SIZE : 288 DRAM_40BIT_BASE + DRAM_40BIT_SIZE; 289 290 prot_start = legacy ? DRAM_PROTECTED_BASE : DRAM_40BIT_PROTECTED_BASE; 291 292 prot_end = prot_start + DRAM_PROTECTED_SIZE; 293 294 if (dst < dram_start || len > dram_end || dst > dram_end - len) { 295 ERROR("BL2: dst address is on the protected area.\n"); 296 result = IO_FAIL; 297 goto done; 298 } 299 300 /* load image is within SDRAM protected area */ 301 if (dst >= prot_start && dst < prot_end) { 302 ERROR("BL2: dst address is on the protected area.\n"); 303 result = IO_FAIL; 304 } 305 306 if (len > prot_start || (dst < prot_start && dst > prot_start - len)) { 307 ERROR("BL2: %s[%d] loaded data is on the protected area.\n", 308 __func__, __LINE__); 309 result = IO_FAIL; 310 } 311 done: 312 if (result == IO_FAIL) { 313 ERROR("BL2: Out of range : dst=0x%lx len=0x%lx\n", dst, len); 314 } 315 316 return result; 317 } 318 319 static int32_t load_bl33x(void) 320 { 321 static int32_t loaded = IO_NOT_SUPPORTED; 322 uintptr_t dst, partition, handle; 323 uint32_t noload, cert, len, i; 324 uintptr_t offset; 325 int32_t rc; 326 size_t cnt; 327 const int32_t img[] = { 328 BL33_IMAGE_ID, 329 BL332_IMAGE_ID, 330 BL333_IMAGE_ID, 331 BL334_IMAGE_ID, 332 BL335_IMAGE_ID, 333 BL336_IMAGE_ID, 334 BL337_IMAGE_ID, 335 BL338_IMAGE_ID 336 }; 337 338 if (loaded != IO_NOT_SUPPORTED) { 339 return loaded; 340 } 341 342 for (i = 1; i < rcar_image_number; i++) { 343 rc = file_to_offset(img[i], &offset, &cert, &noload, 344 &partition); 345 if (rc != IO_SUCCESS) { 346 WARN("%s: failed to get offset\n", __func__); 347 loaded = IO_FAIL; 348 return loaded; 349 } 350 351 rcar_read_certificate((uint64_t) cert, &len, &dst); 352 ((io_drv_spec_t *) rcar_spec)->partition = partition; 353 354 rc = io_open(rcar_handle, rcar_spec, &handle); 355 if (rc != IO_SUCCESS) { 356 WARN("%s: Failed to open FIP (%i)\n", __func__, rc); 357 loaded = IO_FAIL; 358 return loaded; 359 } 360 361 rc = io_seek(handle, IO_SEEK_SET, offset); 362 if (rc != IO_SUCCESS) { 363 WARN("%s: failed to seek\n", __func__); 364 loaded = IO_FAIL; 365 return loaded; 366 } 367 368 rc = check_load_area(dst, len); 369 if (rc != IO_SUCCESS) { 370 WARN("%s: check load area\n", __func__); 371 loaded = IO_FAIL; 372 return loaded; 373 } 374 375 rc = io_read(handle, dst, len, &cnt); 376 if (rc != IO_SUCCESS) { 377 WARN("%s: failed to read\n", __func__); 378 loaded = IO_FAIL; 379 return loaded; 380 } 381 #if TRUSTED_BOARD_BOOT 382 rc = auth_mod_verify_img(img[i], (void *)dst, len); 383 if (rc != 0) { 384 memset((void *)dst, 0x00, len); 385 loaded = IO_FAIL; 386 return loaded; 387 } 388 #endif 389 io_close(handle); 390 } 391 392 loaded = IO_SUCCESS; 393 394 return loaded; 395 } 396 397 static int32_t rcar_dev_init(io_dev_info_t *dev_info, const uintptr_t name) 398 { 399 static uint64_t header[64] __aligned(FLASH_TRANS_SIZE_UNIT) = {0UL}; 400 uintptr_t handle; 401 ssize_t offset; 402 uint32_t i; 403 int32_t rc; 404 size_t cnt; 405 406 /* Obtain a reference to the image by querying the platform layer */ 407 rc = plat_get_drv_source(name, &rcar_handle, &rcar_spec); 408 if (rc != IO_SUCCESS) { 409 WARN("Failed to obtain reference to img %ld (%i)\n", name, rc); 410 return IO_FAIL; 411 } 412 413 if (rcar_cert_load == RCAR_CERT_LOAD) { 414 return IO_SUCCESS; 415 } 416 417 rc = io_open(rcar_handle, rcar_spec, &handle); 418 if (rc != IO_SUCCESS) { 419 WARN("Failed to access img %ld (%i)\n", name, rc); 420 return IO_FAIL; 421 } 422 423 /* 424 * get start address list 425 * [0] address num 426 * [1] BL33-1 image address 427 * [2] BL33-2 image address 428 * [3] BL33-3 image address 429 * [4] BL33-4 image address 430 * [5] BL33-5 image address 431 * [6] BL33-6 image address 432 * [7] BL33-7 image address 433 * [8] BL33-8 image address 434 */ 435 offset = name == EMMC_DEV_ID ? RCAR_EMMC_CERT_HEADER : 436 RCAR_FLASH_CERT_HEADER; 437 rc = io_seek(handle, IO_SEEK_SET, offset); 438 if (rc != IO_SUCCESS) { 439 WARN("Firmware Image Package header failed to seek\n"); 440 goto error; 441 } 442 443 rc = io_read(handle, (uintptr_t) &header, sizeof(header), &cnt); 444 if (rc != IO_SUCCESS) { 445 WARN("Firmware Image Package header failed to read\n"); 446 goto error; 447 } 448 449 #if RCAR_BL2_DCACHE == 1 450 inv_dcache_range((uint64_t) header, sizeof(header)); 451 #endif 452 453 rcar_image_number = header[0]; 454 if (rcar_image_number == 0 || rcar_image_number > RCAR_MAX_BL3X_IMAGE) { 455 WARN("Firmware Image Package header check failed.\n"); 456 rc = IO_FAIL; 457 goto error; 458 } 459 460 for (i = 0; i < rcar_image_number + 2; i++) { 461 rcar_image_header[i] = header[i * 2 + 1]; 462 rcar_image_header_prttn[i] = header[i * 2 + 2]; 463 } 464 465 rc = io_seek(handle, IO_SEEK_SET, offset + RCAR_SECTOR6_CERT_OFFSET); 466 if (rc != IO_SUCCESS) { 467 WARN("Firmware Image Package header failed to seek cert\n"); 468 goto error; 469 } 470 471 rc = io_read(handle, RCAR_SDRAM_certESS, 472 RCAR_CERT_SIZE * (2 + rcar_image_number), &cnt); 473 if (rc != IO_SUCCESS) { 474 WARN("cert file read error.\n"); 475 goto error; 476 } 477 478 #if RCAR_BL2_DCACHE == 1 479 inv_dcache_range(RCAR_SDRAM_certESS, 480 RCAR_CERT_SIZE * (2 + rcar_image_number)); 481 #endif 482 483 rcar_cert_load = RCAR_CERT_LOAD; 484 error: 485 486 if (rc != IO_SUCCESS) { 487 rc = IO_FAIL; 488 } 489 490 io_close(handle); 491 492 return rc; 493 494 } 495 496 static int32_t rcar_file_open(io_dev_info_t *info, const uintptr_t file_spec, 497 io_entity_t *entity) 498 { 499 const io_drv_spec_t *spec = (io_drv_spec_t *) file_spec; 500 uintptr_t partition, offset, dst; 501 uint32_t noload, cert, len; 502 int32_t rc; 503 504 /* 505 * Only one file open at a time. We need to track state (ie, file 506 * cursor position). Since the header lives at offset zero, this entry 507 * should never be zero in an active file. 508 * Once the system supports dynamic memory allocation we will allow more 509 * than one open file at a time. 510 */ 511 if (current_file.offset != 0U) { 512 WARN("%s: Only one open file at a time.\n", __func__); 513 return IO_RESOURCES_EXHAUSTED; 514 } 515 516 rc = file_to_offset(spec->offset, &offset, &cert, &noload, &partition); 517 if (rc != IO_SUCCESS) { 518 WARN("Failed to open file name %ld (%i)\n", spec->offset, rc); 519 return IO_FAIL; 520 } 521 522 if (noload != 0U) { 523 current_file.offset = 1; 524 current_file.dst = 0; 525 current_file.size = 1; 526 current_file.position = 0; 527 current_file.no_load = noload; 528 current_file.partition = 0; 529 entity->info = (uintptr_t) ¤t_file; 530 531 return IO_SUCCESS; 532 } 533 534 rcar_read_certificate((uint64_t) cert, &len, &dst); 535 536 /* Baylibre: HACK */ 537 if (spec->offset == BL31_IMAGE_ID && len < RCAR_TRUSTED_SRAM_SIZE) { 538 WARN("%s,%s\n", "r-car ignoring the BL31 size from certificate", 539 "using RCAR_TRUSTED_SRAM_SIZE instead"); 540 len = RCAR_TRUSTED_SRAM_SIZE; 541 } 542 543 current_file.partition = partition; 544 current_file.no_load = noload; 545 current_file.offset = offset; 546 current_file.position = 0; 547 current_file.size = len; 548 current_file.dst = dst; 549 entity->info = (uintptr_t) ¤t_file; 550 551 return IO_SUCCESS; 552 } 553 554 static int32_t rcar_file_len(io_entity_t *entity, size_t *length) 555 { 556 *length = ((file_state_t *) entity->info)->size; 557 558 NOTICE("%s: len: 0x%08lx\n", __func__, *length); 559 560 return IO_SUCCESS; 561 } 562 563 static int32_t rcar_file_read(io_entity_t *entity, uintptr_t buffer, 564 size_t length, size_t *cnt) 565 { 566 file_state_t *fp = (file_state_t *) entity->info; 567 ssize_t offset = fp->offset + fp->position; 568 uintptr_t handle; 569 int32_t rc; 570 571 #ifdef SPD_NONE 572 static uint32_t load_bl33x_counter = 1; 573 #else 574 static uint32_t load_bl33x_counter; 575 #endif 576 if (current_file.no_load != 0U) { 577 *cnt = length; 578 return IO_SUCCESS; 579 } 580 581 ((io_drv_spec_t *) rcar_spec)->partition = fp->partition; 582 583 rc = io_open(rcar_handle, rcar_spec, &handle); 584 if (rc != IO_SUCCESS) { 585 WARN("Failed to open FIP (%i)\n", rc); 586 return IO_FAIL; 587 } 588 589 rc = io_seek(handle, IO_SEEK_SET, offset); 590 if (rc != IO_SUCCESS) { 591 WARN("%s: failed to seek\n", __func__); 592 goto error; 593 } 594 595 if (load_bl33x_counter == RCAR_COUNT_LOAD_BL33) { 596 rc = check_load_area(buffer, length); 597 if (rc != IO_SUCCESS) { 598 WARN("%s: load area err\n", __func__); 599 goto error; 600 } 601 } 602 603 rc = io_read(handle, buffer, length, cnt); 604 if (rc != IO_SUCCESS) { 605 WARN("Failed to read payload (%i)\n", rc); 606 goto error; 607 } 608 609 fp->position += *cnt; 610 io_close(handle); 611 612 load_bl33x_counter += 1; 613 if (load_bl33x_counter == RCAR_COUNT_LOAD_BL33X) { 614 return load_bl33x(); 615 } 616 617 return IO_SUCCESS; 618 error: 619 io_close(handle); 620 return IO_FAIL; 621 } 622 623 static int32_t rcar_file_close(io_entity_t *entity) 624 { 625 if (current_file.offset != 0U) { 626 memset(¤t_file, 0, sizeof(current_file)); 627 } 628 629 entity->info = 0U; 630 631 return IO_SUCCESS; 632 } 633 634 static const io_dev_funcs_t rcar_dev_funcs = { 635 .type = &device_type_rcar, 636 .open = &rcar_file_open, 637 .seek = NULL, 638 .size = &rcar_file_len, 639 .read = &rcar_file_read, 640 .write = NULL, 641 .close = &rcar_file_close, 642 .dev_init = &rcar_dev_init, 643 .dev_close = &rcar_dev_close, 644 }; 645 646 static const io_dev_info_t rcar_dev_info = { 647 .funcs = &rcar_dev_funcs, 648 .info = (uintptr_t) 0 649 }; 650 651 static const io_dev_connector_t rcar_dev_connector = { 652 .dev_open = &rcar_dev_open 653 }; 654 655 static int32_t rcar_dev_open(const uintptr_t dev_spec __attribute__ ((unused)), 656 io_dev_info_t **dev_info) 657 { 658 *dev_info = (io_dev_info_t *) &rcar_dev_info; 659 660 return IO_SUCCESS; 661 } 662 663 static int32_t rcar_dev_close(io_dev_info_t *dev_info) 664 { 665 rcar_handle = 0; 666 rcar_spec = 0; 667 668 return IO_SUCCESS; 669 } 670 671 int32_t rcar_register_io_dev(const io_dev_connector_t **dev_con) 672 { 673 int32_t result; 674 675 result = io_register_device(&rcar_dev_info); 676 if (result == IO_SUCCESS) { 677 *dev_con = &rcar_dev_connector; 678 } 679 680 return result; 681 } 682