]>
Commit | Line | Data |
---|---|---|
83d290c5 | 1 | // SPDX-License-Identifier: GPL-2.0+ |
4bae9090 BS |
2 | /* |
3 | * (C) Copyright 2008 Semihalf | |
4 | * | |
5 | * Written by: Rafal Czubak <[email protected]> | |
6 | * Bartlomiej Sieka <[email protected]> | |
4bae9090 BS |
7 | */ |
8 | ||
9 | #include <common.h> | |
1eb69ae4 | 10 | #include <cpu_func.h> |
8e8ccfe1 | 11 | #include <image.h> |
4bae9090 | 12 | |
4bae9090 | 13 | #include <command.h> |
9fb625ce | 14 | #include <env.h> |
4bae9090 | 15 | #include <net.h> |
06370590 | 16 | #include <net/tftp.h> |
4bae9090 | 17 | #include <malloc.h> |
73f4ebb6 | 18 | #include <mapmem.h> |
c7ff5528 LM |
19 | #include <dfu.h> |
20 | #include <errno.h> | |
4bae9090 | 21 | |
50efdf2c | 22 | #if defined(CONFIG_DFU_TFTP) || defined(CONFIG_UPDATE_TFTP) |
4bae9090 BS |
23 | /* env variable holding the location of the update file */ |
24 | #define UPDATE_FILE_ENV "updatefile" | |
25 | ||
8885c5fe JH |
26 | extern ulong tftp_timeout_ms; |
27 | extern int tftp_timeout_count_max; | |
e856bdcf | 28 | #ifdef CONFIG_MTD_NOR_FLASH |
17ead040 TR |
29 | #include <flash.h> |
30 | #include <mtd/cfi_flash.h> | |
4bae9090 | 31 | static uchar *saved_prot_info; |
66a64723 | 32 | #endif |
4bae9090 BS |
33 | static int update_load(char *filename, ulong msec_max, int cnt_max, ulong addr) |
34 | { | |
35 | int size, rv; | |
36 | ulong saved_timeout_msecs; | |
37 | int saved_timeout_count; | |
38 | char *saved_netretry, *saved_bootfile; | |
39 | ||
40 | rv = 0; | |
41 | /* save used globals and env variable */ | |
8885c5fe JH |
42 | saved_timeout_msecs = tftp_timeout_ms; |
43 | saved_timeout_count = tftp_timeout_count_max; | |
00caae6d | 44 | saved_netretry = strdup(env_get("netretry")); |
1411157d | 45 | saved_bootfile = strdup(net_boot_file_name); |
4bae9090 BS |
46 | |
47 | /* set timeouts for auto-update */ | |
8885c5fe JH |
48 | tftp_timeout_ms = msec_max; |
49 | tftp_timeout_count_max = cnt_max; | |
4bae9090 BS |
50 | |
51 | /* we don't want to retry the connection if errors occur */ | |
382bee57 | 52 | env_set("netretry", "no"); |
4bae9090 BS |
53 | |
54 | /* download the update file */ | |
bb872dd9 | 55 | image_load_addr = addr; |
1411157d | 56 | copy_filename(net_boot_file_name, filename, sizeof(net_boot_file_name)); |
bc0571fc | 57 | size = net_loop(TFTPGET); |
4bae9090 BS |
58 | |
59 | if (size < 0) | |
60 | rv = 1; | |
61 | else if (size > 0) | |
62 | flush_cache(addr, size); | |
63 | ||
64 | /* restore changed globals and env variable */ | |
8885c5fe JH |
65 | tftp_timeout_ms = saved_timeout_msecs; |
66 | tftp_timeout_count_max = saved_timeout_count; | |
4bae9090 | 67 | |
382bee57 | 68 | env_set("netretry", saved_netretry); |
4bae9090 BS |
69 | if (saved_netretry != NULL) |
70 | free(saved_netretry); | |
71 | ||
72 | if (saved_bootfile != NULL) { | |
1411157d JH |
73 | copy_filename(net_boot_file_name, saved_bootfile, |
74 | sizeof(net_boot_file_name)); | |
4bae9090 BS |
75 | free(saved_bootfile); |
76 | } | |
77 | ||
78 | return rv; | |
79 | } | |
80 | ||
e856bdcf | 81 | #ifdef CONFIG_MTD_NOR_FLASH |
4bae9090 BS |
82 | static int update_flash_protect(int prot, ulong addr_first, ulong addr_last) |
83 | { | |
84 | uchar *sp_info_ptr; | |
85 | ulong s; | |
86 | int i, bank, cnt; | |
87 | flash_info_t *info; | |
88 | ||
89 | sp_info_ptr = NULL; | |
90 | ||
91 | if (prot == 0) { | |
92 | saved_prot_info = | |
98150e7e | 93 | calloc(CFI_FLASH_BANKS * CONFIG_SYS_MAX_FLASH_SECT, 1); |
4bae9090 BS |
94 | if (!saved_prot_info) |
95 | return 1; | |
96 | } | |
97 | ||
98150e7e | 98 | for (bank = 0; bank < CFI_FLASH_BANKS; ++bank) { |
4bae9090 BS |
99 | cnt = 0; |
100 | info = &flash_info[bank]; | |
101 | ||
102 | /* Nothing to do if the bank doesn't exist */ | |
103 | if (info->sector_count == 0) | |
104 | return 0; | |
105 | ||
106 | /* Point to current bank protection information */ | |
6d0f6bcf | 107 | sp_info_ptr = saved_prot_info + (bank * CONFIG_SYS_MAX_FLASH_SECT); |
4bae9090 BS |
108 | |
109 | /* | |
110 | * Adjust addr_first or addr_last if we are on bank boundary. | |
111 | * Address space between banks must be continuous for other | |
112 | * flash functions (like flash_sect_erase or flash_write) to | |
113 | * succeed. Banks must also be numbered in correct order, | |
114 | * according to increasing addresses. | |
115 | */ | |
116 | if (addr_last > info->start[0] + info->size - 1) | |
117 | addr_last = info->start[0] + info->size - 1; | |
118 | if (addr_first < info->start[0]) | |
119 | addr_first = info->start[0]; | |
120 | ||
121 | for (i = 0; i < info->sector_count; i++) { | |
122 | /* Save current information about protected sectors */ | |
123 | if (prot == 0) { | |
124 | s = info->start[i]; | |
125 | if ((s >= addr_first) && (s <= addr_last)) | |
126 | sp_info_ptr[i] = info->protect[i]; | |
127 | ||
128 | } | |
129 | ||
130 | /* Protect/unprotect sectors */ | |
131 | if (sp_info_ptr[i] == 1) { | |
6d0f6bcf | 132 | #if defined(CONFIG_SYS_FLASH_PROTECTION) |
4bae9090 BS |
133 | if (flash_real_protect(info, i, prot)) |
134 | return 1; | |
135 | #else | |
136 | info->protect[i] = prot; | |
137 | #endif | |
138 | cnt++; | |
139 | } | |
140 | } | |
141 | ||
142 | if (cnt) { | |
143 | printf("%sProtected %d sectors\n", | |
144 | prot ? "": "Un-", cnt); | |
145 | } | |
146 | } | |
147 | ||
148 | if((prot == 1) && saved_prot_info) | |
149 | free(saved_prot_info); | |
150 | ||
151 | return 0; | |
152 | } | |
66a64723 | 153 | #endif |
4bae9090 BS |
154 | |
155 | static int update_flash(ulong addr_source, ulong addr_first, ulong size) | |
156 | { | |
e856bdcf | 157 | #ifdef CONFIG_MTD_NOR_FLASH |
4bae9090 BS |
158 | ulong addr_last = addr_first + size - 1; |
159 | ||
160 | /* round last address to the sector boundary */ | |
161 | if (flash_sect_roundb(&addr_last) > 0) | |
162 | return 1; | |
163 | ||
164 | if (addr_first >= addr_last) { | |
165 | printf("Error: end address exceeds addressing space\n"); | |
166 | return 1; | |
167 | } | |
168 | ||
169 | /* remove protection on processed sectors */ | |
170 | if (update_flash_protect(0, addr_first, addr_last) > 0) { | |
171 | printf("Error: could not unprotect flash sectors\n"); | |
172 | return 1; | |
173 | } | |
174 | ||
175 | printf("Erasing 0x%08lx - 0x%08lx", addr_first, addr_last); | |
176 | if (flash_sect_erase(addr_first, addr_last) > 0) { | |
177 | printf("Error: could not erase flash\n"); | |
178 | return 1; | |
179 | } | |
180 | ||
181 | printf("Copying to flash..."); | |
182 | if (flash_write((char *)addr_source, addr_first, size) > 0) { | |
183 | printf("Error: could not copy to flash\n"); | |
184 | return 1; | |
185 | } | |
186 | printf("done\n"); | |
187 | ||
188 | /* enable protection on processed sectors */ | |
189 | if (update_flash_protect(1, addr_first, addr_last) > 0) { | |
190 | printf("Error: could not protect flash sectors\n"); | |
191 | return 1; | |
192 | } | |
66a64723 | 193 | #endif |
4bae9090 BS |
194 | return 0; |
195 | } | |
50efdf2c | 196 | #endif /* CONFIG_DFU_TFTP || CONFIG_UPDATE_TFTP */ |
4bae9090 BS |
197 | |
198 | static int update_fit_getparams(const void *fit, int noffset, ulong *addr, | |
199 | ulong *fladdr, ulong *size) | |
200 | { | |
201 | const void *data; | |
202 | ||
203 | if (fit_image_get_data(fit, noffset, &data, (size_t *)size)) | |
204 | return 1; | |
205 | ||
206 | if (fit_image_get_load(fit, noffset, (ulong *)fladdr)) | |
207 | return 1; | |
208 | ||
209 | *addr = (ulong)data; | |
210 | ||
211 | return 0; | |
212 | } | |
213 | ||
50efdf2c | 214 | #if defined(CONFIG_DFU_TFTP) || defined(CONFIG_UPDATE_TFTP) |
c7ff5528 | 215 | int update_tftp(ulong addr, char *interface, char *devstring) |
4bae9090 | 216 | { |
c7ff5528 | 217 | char *filename, *env_addr, *fit_image_name; |
4bae9090 | 218 | ulong update_addr, update_fladdr, update_size; |
c7ff5528 LM |
219 | int images_noffset, ndepth, noffset; |
220 | bool update_tftp_dfu; | |
8d6b7320 | 221 | int ret = 0; |
c7ff5528 LM |
222 | void *fit; |
223 | ||
224 | if (interface == NULL && devstring == NULL) { | |
225 | update_tftp_dfu = false; | |
226 | } else if (interface && devstring) { | |
227 | update_tftp_dfu = true; | |
228 | } else { | |
9b643e31 | 229 | pr_err("Interface: %s and devstring: %s not supported!\n", |
c7ff5528 LM |
230 | interface, devstring); |
231 | return -EINVAL; | |
232 | } | |
8d6b7320 AP |
233 | |
234 | /* use already present image */ | |
235 | if (addr) | |
236 | goto got_update_file; | |
4bae9090 BS |
237 | |
238 | printf("Auto-update from TFTP: "); | |
239 | ||
240 | /* get the file name of the update file */ | |
00caae6d | 241 | filename = env_get(UPDATE_FILE_ENV); |
4bae9090 BS |
242 | if (filename == NULL) { |
243 | printf("failed, env. variable '%s' not found\n", | |
244 | UPDATE_FILE_ENV); | |
8d6b7320 | 245 | return 1; |
4bae9090 BS |
246 | } |
247 | ||
248 | printf("trying update file '%s'\n", filename); | |
249 | ||
250 | /* get load address of downloaded update file */ | |
00caae6d SG |
251 | env_addr = env_get("loadaddr"); |
252 | if (env_addr) | |
7e5f460e | 253 | addr = hextoul(env_addr, NULL); |
4bae9090 BS |
254 | else |
255 | addr = CONFIG_UPDATE_LOAD_ADDR; | |
256 | ||
257 | ||
258 | if (update_load(filename, CONFIG_UPDATE_TFTP_MSEC_MAX, | |
259 | CONFIG_UPDATE_TFTP_CNT_MAX, addr)) { | |
260 | printf("Can't load update file, aborting auto-update\n"); | |
8d6b7320 | 261 | return 1; |
4bae9090 BS |
262 | } |
263 | ||
8d6b7320 | 264 | got_update_file: |
73f4ebb6 | 265 | fit = map_sysmem(addr, 0); |
4bae9090 | 266 | |
c5819701 | 267 | if (fit_check_format((void *)fit, IMAGE_SIZE_INVAL)) { |
4bae9090 BS |
268 | printf("Bad FIT format of the update file, aborting " |
269 | "auto-update\n"); | |
8d6b7320 | 270 | return 1; |
4bae9090 BS |
271 | } |
272 | ||
273 | /* process updates */ | |
274 | images_noffset = fdt_path_offset(fit, FIT_IMAGES_PATH); | |
275 | ||
276 | ndepth = 0; | |
277 | noffset = fdt_next_node(fit, images_noffset, &ndepth); | |
278 | while (noffset >= 0 && ndepth > 0) { | |
279 | if (ndepth != 1) | |
280 | goto next_node; | |
281 | ||
c7ff5528 LM |
282 | fit_image_name = (char *)fit_get_name(fit, noffset, NULL); |
283 | printf("Processing update '%s' :", fit_image_name); | |
4bae9090 | 284 | |
b8da8366 | 285 | if (!fit_image_verify(fit, noffset)) { |
4bae9090 | 286 | printf("Error: invalid update hash, aborting\n"); |
8d6b7320 | 287 | ret = 1; |
4bae9090 BS |
288 | goto next_node; |
289 | } | |
290 | ||
291 | printf("\n"); | |
292 | if (update_fit_getparams(fit, noffset, &update_addr, | |
293 | &update_fladdr, &update_size)) { | |
4e620eb9 | 294 | printf("Error: can't get update parameters, aborting\n"); |
8d6b7320 | 295 | ret = 1; |
4bae9090 BS |
296 | goto next_node; |
297 | } | |
c7ff5528 LM |
298 | |
299 | if (!update_tftp_dfu) { | |
300 | if (update_flash(update_addr, update_fladdr, | |
301 | update_size)) { | |
302 | printf("Error: can't flash update, aborting\n"); | |
303 | ret = 1; | |
304 | goto next_node; | |
305 | } | |
306 | } else if (fit_image_check_type(fit, noffset, | |
307 | IH_TYPE_FIRMWARE)) { | |
1c2d1293 AT |
308 | ret = dfu_write_by_name(fit_image_name, |
309 | (void *)update_addr, | |
045fd8b1 AT |
310 | update_size, interface, |
311 | devstring); | |
c7ff5528 LM |
312 | if (ret) |
313 | return ret; | |
4bae9090 BS |
314 | } |
315 | next_node: | |
316 | noffset = fdt_next_node(fit, noffset, &ndepth); | |
317 | } | |
318 | ||
8d6b7320 | 319 | return ret; |
4bae9090 | 320 | } |
50efdf2c | 321 | #endif /* CONFIG_DFU_UPDATE || CONFIG_UPDATE_TFTP */ |
3149e524 AT |
322 | |
323 | #ifdef CONFIG_UPDATE_FIT | |
324 | /** | |
325 | * fit_update - update storage with FIT image | |
326 | * @fit: Pointer to FIT image | |
327 | * | |
328 | * Update firmware on storage using FIT image as input. | |
329 | * The storage area to be update will be identified by the name | |
330 | * in FIT and matching it to "dfu_alt_info" variable. | |
331 | * | |
332 | * Return: 0 - on success, non-zero - otherwise | |
333 | */ | |
334 | int fit_update(const void *fit) | |
335 | { | |
336 | char *fit_image_name; | |
337 | ulong update_addr, update_fladdr, update_size; | |
338 | int images_noffset, ndepth, noffset; | |
339 | int ret = 0; | |
340 | ||
341 | if (!fit) | |
342 | return -EINVAL; | |
343 | ||
c5819701 | 344 | if (fit_check_format((void *)fit, IMAGE_SIZE_INVAL)) { |
3149e524 AT |
345 | printf("Bad FIT format of the update file, aborting auto-update\n"); |
346 | return -EINVAL; | |
347 | } | |
348 | ||
349 | /* process updates */ | |
350 | images_noffset = fdt_path_offset(fit, FIT_IMAGES_PATH); | |
351 | ||
352 | ndepth = 0; | |
353 | noffset = fdt_next_node(fit, images_noffset, &ndepth); | |
354 | while (noffset >= 0 && ndepth > 0) { | |
355 | if (ndepth != 1) | |
356 | goto next_node; | |
357 | ||
358 | fit_image_name = (char *)fit_get_name(fit, noffset, NULL); | |
359 | printf("Processing update '%s' :", fit_image_name); | |
360 | ||
361 | if (!fit_image_verify(fit, noffset)) { | |
362 | printf("Error: invalid update hash, aborting\n"); | |
363 | ret = 1; | |
364 | goto next_node; | |
365 | } | |
366 | ||
367 | printf("\n"); | |
368 | if (update_fit_getparams(fit, noffset, &update_addr, | |
369 | &update_fladdr, &update_size)) { | |
370 | printf("Error: can't get update parameters, aborting\n"); | |
371 | ret = 1; | |
372 | goto next_node; | |
373 | } | |
374 | ||
375 | if (fit_image_check_type(fit, noffset, IH_TYPE_FIRMWARE)) { | |
376 | ret = dfu_write_by_name(fit_image_name, | |
377 | (void *)update_addr, | |
378 | update_size, NULL, NULL); | |
379 | if (ret) | |
380 | return ret; | |
381 | } | |
382 | next_node: | |
383 | noffset = fdt_next_node(fit, noffset, &ndepth); | |
384 | } | |
385 | ||
386 | return ret; | |
387 | } | |
388 | #endif /* CONFIG_UPDATE_FIT */ |