2014-05-05 20:08:10 +00:00
|
|
|
/*
|
|
|
|
* (C) Copyright 2008 - 2009
|
|
|
|
* Windriver, <www.windriver.com>
|
|
|
|
* Tom Rix <Tom.Rix@windriver.com>
|
|
|
|
*
|
|
|
|
* Copyright 2011 Sebastian Andrzej Siewior <bigeasy@linutronix.de>
|
|
|
|
*
|
|
|
|
* Copyright 2014 Linaro, Ltd.
|
|
|
|
* Rob Herring <robh@kernel.org>
|
|
|
|
*
|
|
|
|
* SPDX-License-Identifier: GPL-2.0+
|
|
|
|
*/
|
2014-08-26 18:47:29 +00:00
|
|
|
#include <config.h>
|
2014-05-05 20:08:10 +00:00
|
|
|
#include <common.h>
|
|
|
|
#include <errno.h>
|
2015-10-15 12:34:13 +00:00
|
|
|
#include <fastboot.h>
|
2014-05-05 20:08:10 +00:00
|
|
|
#include <malloc.h>
|
|
|
|
#include <linux/usb/ch9.h>
|
|
|
|
#include <linux/usb/gadget.h>
|
|
|
|
#include <linux/usb/composite.h>
|
|
|
|
#include <linux/compiler.h>
|
|
|
|
#include <version.h>
|
|
|
|
#include <g_dnl.h>
|
2014-08-26 18:47:28 +00:00
|
|
|
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
|
|
|
|
#include <fb_mmc.h>
|
|
|
|
#endif
|
2015-10-15 12:34:17 +00:00
|
|
|
#ifdef CONFIG_FASTBOOT_FLASH_NAND_DEV
|
|
|
|
#include <fb_nand.h>
|
|
|
|
#endif
|
2014-05-05 20:08:10 +00:00
|
|
|
|
|
|
|
#define FASTBOOT_VERSION "0.4"
|
|
|
|
|
|
|
|
#define FASTBOOT_INTERFACE_CLASS 0xff
|
|
|
|
#define FASTBOOT_INTERFACE_SUB_CLASS 0x42
|
|
|
|
#define FASTBOOT_INTERFACE_PROTOCOL 0x03
|
|
|
|
|
|
|
|
#define RX_ENDPOINT_MAXIMUM_PACKET_SIZE_2_0 (0x0200)
|
|
|
|
#define RX_ENDPOINT_MAXIMUM_PACKET_SIZE_1_1 (0x0040)
|
|
|
|
#define TX_ENDPOINT_MAXIMUM_PACKET_SIZE (0x0040)
|
|
|
|
|
|
|
|
#define EP_BUFFER_SIZE 4096
|
2016-04-19 07:16:59 +00:00
|
|
|
/*
|
|
|
|
* EP_BUFFER_SIZE must always be an integral multiple of maxpacket size
|
|
|
|
* (64 or 512 or 1024), else we break on certain controllers like DWC3
|
|
|
|
* that expect bulk OUT requests to be divisible by maxpacket size.
|
|
|
|
*/
|
2014-05-05 20:08:10 +00:00
|
|
|
|
|
|
|
struct f_fastboot {
|
|
|
|
struct usb_function usb_function;
|
|
|
|
|
2014-08-26 18:47:29 +00:00
|
|
|
/* IN/OUT EP's and corresponding requests */
|
2014-05-05 20:08:10 +00:00
|
|
|
struct usb_ep *in_ep, *out_ep;
|
|
|
|
struct usb_request *in_req, *out_req;
|
|
|
|
};
|
|
|
|
|
|
|
|
static inline struct f_fastboot *func_to_fastboot(struct usb_function *f)
|
|
|
|
{
|
|
|
|
return container_of(f, struct f_fastboot, usb_function);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct f_fastboot *fastboot_func;
|
fastboot: Implement flashing session counter
The fastboot flash command that writes an image to a partition works in
several steps:
1 - Retrieve the maximum size the device can download through the
"max-download-size" variable
2 - Retrieve the partition type through the "partition-type:%s" variable,
that indicates whether or not the partition needs to be erased (even
though the fastboot client has minimal support for that)
3a - If the image is smaller than what the device can handle, send the image
and flash it.
3b - If the image is larger than what the device can handle, create a
sparse image, and split it in several chunks that would fit. Send the
chunk, flash it, repeat until we have no more data to send.
However, in the 3b case, the subsequent transfers have no particular
identifiers, the protocol just assumes that you would resume the writes
where you left it.
While doing so works well, it also means that flashing two subsequent
images on the same partition (for example because the user made a mistake)
would not work withouth flashing another partition or rebooting the board,
which is not really intuitive.
Since we have always the same pattern, we can however maintain a counter
that will be reset every time the client will retrieve max-download-size,
and incremented after each buffer will be flashed, that will allow us to
tell whether we should simply resume the flashing where we were, or start
back at the beginning of the partition.
Signed-off-by: Maxime Ripard <maxime.ripard@free-electrons.com>
Reviewed-by: Tom Rini <trini@konsulko.com>
2015-10-15 12:34:15 +00:00
|
|
|
static unsigned int fastboot_flash_session_id;
|
2014-05-05 20:08:10 +00:00
|
|
|
static unsigned int download_size;
|
|
|
|
static unsigned int download_bytes;
|
|
|
|
|
|
|
|
static struct usb_endpoint_descriptor fs_ep_in = {
|
|
|
|
.bLength = USB_DT_ENDPOINT_SIZE,
|
|
|
|
.bDescriptorType = USB_DT_ENDPOINT,
|
|
|
|
.bEndpointAddress = USB_DIR_IN,
|
|
|
|
.bmAttributes = USB_ENDPOINT_XFER_BULK,
|
2016-04-12 12:51:48 +00:00
|
|
|
.wMaxPacketSize = cpu_to_le16(64),
|
2014-05-05 20:08:10 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static struct usb_endpoint_descriptor fs_ep_out = {
|
|
|
|
.bLength = USB_DT_ENDPOINT_SIZE,
|
|
|
|
.bDescriptorType = USB_DT_ENDPOINT,
|
|
|
|
.bEndpointAddress = USB_DIR_OUT,
|
|
|
|
.bmAttributes = USB_ENDPOINT_XFER_BULK,
|
2016-04-12 12:51:48 +00:00
|
|
|
.wMaxPacketSize = cpu_to_le16(64),
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct usb_endpoint_descriptor hs_ep_in = {
|
|
|
|
.bLength = USB_DT_ENDPOINT_SIZE,
|
|
|
|
.bDescriptorType = USB_DT_ENDPOINT,
|
|
|
|
.bEndpointAddress = USB_DIR_IN,
|
|
|
|
.bmAttributes = USB_ENDPOINT_XFER_BULK,
|
|
|
|
.wMaxPacketSize = cpu_to_le16(512),
|
2014-05-05 20:08:10 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static struct usb_endpoint_descriptor hs_ep_out = {
|
|
|
|
.bLength = USB_DT_ENDPOINT_SIZE,
|
|
|
|
.bDescriptorType = USB_DT_ENDPOINT,
|
|
|
|
.bEndpointAddress = USB_DIR_OUT,
|
|
|
|
.bmAttributes = USB_ENDPOINT_XFER_BULK,
|
2016-04-12 12:51:48 +00:00
|
|
|
.wMaxPacketSize = cpu_to_le16(512),
|
2014-05-05 20:08:10 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static struct usb_interface_descriptor interface_desc = {
|
|
|
|
.bLength = USB_DT_INTERFACE_SIZE,
|
|
|
|
.bDescriptorType = USB_DT_INTERFACE,
|
|
|
|
.bInterfaceNumber = 0x00,
|
|
|
|
.bAlternateSetting = 0x00,
|
|
|
|
.bNumEndpoints = 0x02,
|
|
|
|
.bInterfaceClass = FASTBOOT_INTERFACE_CLASS,
|
|
|
|
.bInterfaceSubClass = FASTBOOT_INTERFACE_SUB_CLASS,
|
|
|
|
.bInterfaceProtocol = FASTBOOT_INTERFACE_PROTOCOL,
|
|
|
|
};
|
|
|
|
|
2016-04-12 12:51:48 +00:00
|
|
|
static struct usb_descriptor_header *fb_fs_function[] = {
|
2014-05-05 20:08:10 +00:00
|
|
|
(struct usb_descriptor_header *)&interface_desc,
|
|
|
|
(struct usb_descriptor_header *)&fs_ep_in,
|
2016-04-12 12:51:48 +00:00
|
|
|
(struct usb_descriptor_header *)&fs_ep_out,
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct usb_descriptor_header *fb_hs_function[] = {
|
|
|
|
(struct usb_descriptor_header *)&interface_desc,
|
|
|
|
(struct usb_descriptor_header *)&hs_ep_in,
|
2014-05-05 20:08:10 +00:00
|
|
|
(struct usb_descriptor_header *)&hs_ep_out,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
2016-04-13 08:30:00 +00:00
|
|
|
static struct usb_endpoint_descriptor *
|
|
|
|
fb_ep_desc(struct usb_gadget *g, struct usb_endpoint_descriptor *fs,
|
|
|
|
struct usb_endpoint_descriptor *hs)
|
|
|
|
{
|
|
|
|
if (gadget_is_dualspeed(g) && g->speed == USB_SPEED_HIGH)
|
|
|
|
return hs;
|
|
|
|
return fs;
|
|
|
|
}
|
|
|
|
|
2014-05-05 20:08:10 +00:00
|
|
|
/*
|
|
|
|
* static strings, in UTF-8
|
|
|
|
*/
|
|
|
|
static const char fastboot_name[] = "Android Fastboot";
|
|
|
|
|
|
|
|
static struct usb_string fastboot_string_defs[] = {
|
|
|
|
[0].s = fastboot_name,
|
|
|
|
{ } /* end of list */
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct usb_gadget_strings stringtab_fastboot = {
|
|
|
|
.language = 0x0409, /* en-us */
|
|
|
|
.strings = fastboot_string_defs,
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct usb_gadget_strings *fastboot_strings[] = {
|
|
|
|
&stringtab_fastboot,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
static void rx_handler_command(struct usb_ep *ep, struct usb_request *req);
|
2015-02-25 14:10:47 +00:00
|
|
|
static int strcmp_l1(const char *s1, const char *s2);
|
2014-05-05 20:08:10 +00:00
|
|
|
|
2015-10-15 12:34:13 +00:00
|
|
|
|
|
|
|
void fastboot_fail(char *response, const char *reason)
|
|
|
|
{
|
|
|
|
strncpy(response, "FAIL\0", 5);
|
|
|
|
strncat(response, reason, FASTBOOT_RESPONSE_LEN - 4 - 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
void fastboot_okay(char *response, const char *reason)
|
|
|
|
{
|
|
|
|
strncpy(response, "OKAY\0", 5);
|
|
|
|
strncat(response, reason, FASTBOOT_RESPONSE_LEN - 4 - 1);
|
|
|
|
}
|
|
|
|
|
2014-05-05 20:08:10 +00:00
|
|
|
static void fastboot_complete(struct usb_ep *ep, struct usb_request *req)
|
|
|
|
{
|
|
|
|
int status = req->status;
|
|
|
|
if (!status)
|
|
|
|
return;
|
|
|
|
printf("status: %d ep '%s' trans: %d\n", status, ep->name, req->actual);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fastboot_bind(struct usb_configuration *c, struct usb_function *f)
|
|
|
|
{
|
|
|
|
int id;
|
|
|
|
struct usb_gadget *gadget = c->cdev->gadget;
|
|
|
|
struct f_fastboot *f_fb = func_to_fastboot(f);
|
2015-02-13 06:33:43 +00:00
|
|
|
const char *s;
|
2014-05-05 20:08:10 +00:00
|
|
|
|
|
|
|
/* DYNAMIC interface numbers assignments */
|
|
|
|
id = usb_interface_id(c, f);
|
|
|
|
if (id < 0)
|
|
|
|
return id;
|
|
|
|
interface_desc.bInterfaceNumber = id;
|
|
|
|
|
|
|
|
id = usb_string_id(c->cdev);
|
|
|
|
if (id < 0)
|
|
|
|
return id;
|
|
|
|
fastboot_string_defs[0].id = id;
|
|
|
|
interface_desc.iInterface = id;
|
|
|
|
|
|
|
|
f_fb->in_ep = usb_ep_autoconfig(gadget, &fs_ep_in);
|
|
|
|
if (!f_fb->in_ep)
|
|
|
|
return -ENODEV;
|
|
|
|
f_fb->in_ep->driver_data = c->cdev;
|
|
|
|
|
|
|
|
f_fb->out_ep = usb_ep_autoconfig(gadget, &fs_ep_out);
|
|
|
|
if (!f_fb->out_ep)
|
|
|
|
return -ENODEV;
|
|
|
|
f_fb->out_ep->driver_data = c->cdev;
|
|
|
|
|
2016-04-12 12:51:48 +00:00
|
|
|
f->descriptors = fb_fs_function;
|
|
|
|
|
|
|
|
if (gadget_is_dualspeed(gadget)) {
|
|
|
|
/* Assume endpoint addresses are the same for both speeds */
|
|
|
|
hs_ep_in.bEndpointAddress = fs_ep_in.bEndpointAddress;
|
|
|
|
hs_ep_out.bEndpointAddress = fs_ep_out.bEndpointAddress;
|
|
|
|
/* copy HS descriptors */
|
|
|
|
f->hs_descriptors = fb_hs_function;
|
|
|
|
}
|
2014-05-05 20:08:10 +00:00
|
|
|
|
2015-02-13 06:33:43 +00:00
|
|
|
s = getenv("serial#");
|
|
|
|
if (s)
|
|
|
|
g_dnl_set_serialnumber((char *)s);
|
|
|
|
|
2014-05-05 20:08:10 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void fastboot_unbind(struct usb_configuration *c, struct usb_function *f)
|
|
|
|
{
|
|
|
|
memset(fastboot_func, 0, sizeof(*fastboot_func));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void fastboot_disable(struct usb_function *f)
|
|
|
|
{
|
|
|
|
struct f_fastboot *f_fb = func_to_fastboot(f);
|
|
|
|
|
|
|
|
usb_ep_disable(f_fb->out_ep);
|
|
|
|
usb_ep_disable(f_fb->in_ep);
|
|
|
|
|
|
|
|
if (f_fb->out_req) {
|
|
|
|
free(f_fb->out_req->buf);
|
|
|
|
usb_ep_free_request(f_fb->out_ep, f_fb->out_req);
|
|
|
|
f_fb->out_req = NULL;
|
|
|
|
}
|
|
|
|
if (f_fb->in_req) {
|
|
|
|
free(f_fb->in_req->buf);
|
|
|
|
usb_ep_free_request(f_fb->in_ep, f_fb->in_req);
|
|
|
|
f_fb->in_req = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct usb_request *fastboot_start_ep(struct usb_ep *ep)
|
|
|
|
{
|
|
|
|
struct usb_request *req;
|
|
|
|
|
|
|
|
req = usb_ep_alloc_request(ep, 0);
|
|
|
|
if (!req)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
req->length = EP_BUFFER_SIZE;
|
|
|
|
req->buf = memalign(CONFIG_SYS_CACHELINE_SIZE, EP_BUFFER_SIZE);
|
|
|
|
if (!req->buf) {
|
|
|
|
usb_ep_free_request(ep, req);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(req->buf, 0, req->length);
|
|
|
|
return req;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fastboot_set_alt(struct usb_function *f,
|
|
|
|
unsigned interface, unsigned alt)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct usb_composite_dev *cdev = f->config->cdev;
|
|
|
|
struct usb_gadget *gadget = cdev->gadget;
|
|
|
|
struct f_fastboot *f_fb = func_to_fastboot(f);
|
2016-04-13 08:30:00 +00:00
|
|
|
const struct usb_endpoint_descriptor *d;
|
2014-05-05 20:08:10 +00:00
|
|
|
|
|
|
|
debug("%s: func: %s intf: %d alt: %d\n",
|
|
|
|
__func__, f->name, interface, alt);
|
|
|
|
|
2016-04-13 08:30:00 +00:00
|
|
|
d = fb_ep_desc(gadget, &fs_ep_out, &hs_ep_out);
|
|
|
|
ret = usb_ep_enable(f_fb->out_ep, d);
|
2014-05-05 20:08:10 +00:00
|
|
|
if (ret) {
|
|
|
|
puts("failed to enable out ep\n");
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
f_fb->out_req = fastboot_start_ep(f_fb->out_ep);
|
|
|
|
if (!f_fb->out_req) {
|
|
|
|
puts("failed to alloc out req\n");
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
f_fb->out_req->complete = rx_handler_command;
|
|
|
|
|
2016-04-13 08:30:00 +00:00
|
|
|
d = fb_ep_desc(gadget, &fs_ep_in, &hs_ep_in);
|
|
|
|
ret = usb_ep_enable(f_fb->in_ep, d);
|
2014-05-05 20:08:10 +00:00
|
|
|
if (ret) {
|
|
|
|
puts("failed to enable in ep\n");
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
f_fb->in_req = fastboot_start_ep(f_fb->in_ep);
|
|
|
|
if (!f_fb->in_req) {
|
|
|
|
puts("failed alloc req in\n");
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
f_fb->in_req->complete = fastboot_complete;
|
|
|
|
|
|
|
|
ret = usb_ep_queue(f_fb->out_ep, f_fb->out_req, 0);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
err:
|
|
|
|
fastboot_disable(f);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fastboot_add(struct usb_configuration *c)
|
|
|
|
{
|
|
|
|
struct f_fastboot *f_fb = fastboot_func;
|
|
|
|
int status;
|
|
|
|
|
|
|
|
debug("%s: cdev: 0x%p\n", __func__, c->cdev);
|
|
|
|
|
|
|
|
if (!f_fb) {
|
|
|
|
f_fb = memalign(CONFIG_SYS_CACHELINE_SIZE, sizeof(*f_fb));
|
|
|
|
if (!f_fb)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
fastboot_func = f_fb;
|
|
|
|
memset(f_fb, 0, sizeof(*f_fb));
|
|
|
|
}
|
|
|
|
|
|
|
|
f_fb->usb_function.name = "f_fastboot";
|
|
|
|
f_fb->usb_function.bind = fastboot_bind;
|
|
|
|
f_fb->usb_function.unbind = fastboot_unbind;
|
|
|
|
f_fb->usb_function.set_alt = fastboot_set_alt;
|
|
|
|
f_fb->usb_function.disable = fastboot_disable;
|
|
|
|
f_fb->usb_function.strings = fastboot_strings;
|
|
|
|
|
|
|
|
status = usb_add_function(c, &f_fb->usb_function);
|
|
|
|
if (status) {
|
|
|
|
free(f_fb);
|
|
|
|
fastboot_func = f_fb;
|
|
|
|
}
|
|
|
|
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
DECLARE_GADGET_BIND_CALLBACK(usb_dnl_fastboot, fastboot_add);
|
|
|
|
|
2014-08-26 18:47:29 +00:00
|
|
|
static int fastboot_tx_write(const char *buffer, unsigned int buffer_size)
|
2014-05-05 20:08:10 +00:00
|
|
|
{
|
|
|
|
struct usb_request *in_req = fastboot_func->in_req;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
memcpy(in_req->buf, buffer, buffer_size);
|
|
|
|
in_req->length = buffer_size;
|
usb: gadget: fastboot: Dequeue the previous IN request for the current request
Recent versions of the fastboot tool will query the partition type before doing
an operation on a partition (such as erase, flash, etc). It will then submit
the operation as soon as the response for the partition type is received.
Usually, the MUSB controller will see that the partition type request return
status was read by the host at the very same time as the actual operation
request is submitted by the host. However, the operation will be read first
(int_rx is handled first in musb_interrupt) and after it is completed, the
fastboot USB gadget driver will send another return status. Hence, this happens
before the musb gadget framework has had a chance to handle the previous
acknowledgement that the host read the return status and dequeue the request.
The host will then usually empty the FIFO by the time musb_interrupt gets around
handling the return status acknowledgement (for the previous request, this is
still on the same musb_interrupt call), so no other interrupt is generated and
the most recent return status acknowledgement remains unaccounted for.
It will then be used as a response for the next command, and the proper response
for it will be delayed to the next command, and so on.
Dequeuing the previous IN request in the fastboot code ensures that no previous
return status remains. It is acceptable to do it since there is no callback to
it anyways.
Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
2015-07-04 14:46:16 +00:00
|
|
|
|
|
|
|
usb_ep_dequeue(fastboot_func->in_ep, in_req);
|
|
|
|
|
2014-05-05 20:08:10 +00:00
|
|
|
ret = usb_ep_queue(fastboot_func->in_ep, in_req, 0);
|
|
|
|
if (ret)
|
|
|
|
printf("Error %d on queue\n", ret);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fastboot_tx_write_str(const char *buffer)
|
|
|
|
{
|
|
|
|
return fastboot_tx_write(buffer, strlen(buffer));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void compl_do_reset(struct usb_ep *ep, struct usb_request *req)
|
|
|
|
{
|
|
|
|
do_reset(NULL, 0, 0, NULL);
|
|
|
|
}
|
|
|
|
|
2015-02-25 14:10:47 +00:00
|
|
|
int __weak fb_set_reboot_flag(void)
|
|
|
|
{
|
|
|
|
return -ENOSYS;
|
|
|
|
}
|
|
|
|
|
2014-05-05 20:08:10 +00:00
|
|
|
static void cb_reboot(struct usb_ep *ep, struct usb_request *req)
|
|
|
|
{
|
2015-02-25 14:10:47 +00:00
|
|
|
char *cmd = req->buf;
|
|
|
|
if (!strcmp_l1("reboot-bootloader", cmd)) {
|
|
|
|
if (fb_set_reboot_flag()) {
|
|
|
|
fastboot_tx_write_str("FAILCannot set reboot flag");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2014-05-05 20:08:10 +00:00
|
|
|
fastboot_func->in_req->complete = compl_do_reset;
|
|
|
|
fastboot_tx_write_str("OKAY");
|
|
|
|
}
|
|
|
|
|
|
|
|
static int strcmp_l1(const char *s1, const char *s2)
|
|
|
|
{
|
|
|
|
if (!s1 || !s2)
|
|
|
|
return -1;
|
|
|
|
return strncmp(s1, s2, strlen(s1));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void cb_getvar(struct usb_ep *ep, struct usb_request *req)
|
|
|
|
{
|
|
|
|
char *cmd = req->buf;
|
2015-10-15 12:34:13 +00:00
|
|
|
char response[FASTBOOT_RESPONSE_LEN];
|
2014-05-05 20:08:10 +00:00
|
|
|
const char *s;
|
2014-06-13 22:57:14 +00:00
|
|
|
size_t chars_left;
|
2014-05-05 20:08:10 +00:00
|
|
|
|
|
|
|
strcpy(response, "OKAY");
|
2014-06-13 22:57:14 +00:00
|
|
|
chars_left = sizeof(response) - strlen(response) - 1;
|
|
|
|
|
2014-05-05 20:08:10 +00:00
|
|
|
strsep(&cmd, ":");
|
|
|
|
if (!cmd) {
|
2016-01-27 23:02:41 +00:00
|
|
|
error("missing variable");
|
2014-05-05 20:08:10 +00:00
|
|
|
fastboot_tx_write_str("FAILmissing var");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!strcmp_l1("version", cmd)) {
|
2014-06-13 22:57:14 +00:00
|
|
|
strncat(response, FASTBOOT_VERSION, chars_left);
|
2014-05-05 20:08:10 +00:00
|
|
|
} else if (!strcmp_l1("bootloader-version", cmd)) {
|
2014-06-13 22:57:14 +00:00
|
|
|
strncat(response, U_BOOT_VERSION, chars_left);
|
2014-09-30 19:05:40 +00:00
|
|
|
} else if (!strcmp_l1("downloadsize", cmd) ||
|
|
|
|
!strcmp_l1("max-download-size", cmd)) {
|
2014-05-05 20:08:10 +00:00
|
|
|
char str_num[12];
|
|
|
|
|
2015-07-20 10:38:22 +00:00
|
|
|
sprintf(str_num, "0x%08x", CONFIG_FASTBOOT_BUF_SIZE);
|
2014-06-13 22:57:14 +00:00
|
|
|
strncat(response, str_num, chars_left);
|
fastboot: Implement flashing session counter
The fastboot flash command that writes an image to a partition works in
several steps:
1 - Retrieve the maximum size the device can download through the
"max-download-size" variable
2 - Retrieve the partition type through the "partition-type:%s" variable,
that indicates whether or not the partition needs to be erased (even
though the fastboot client has minimal support for that)
3a - If the image is smaller than what the device can handle, send the image
and flash it.
3b - If the image is larger than what the device can handle, create a
sparse image, and split it in several chunks that would fit. Send the
chunk, flash it, repeat until we have no more data to send.
However, in the 3b case, the subsequent transfers have no particular
identifiers, the protocol just assumes that you would resume the writes
where you left it.
While doing so works well, it also means that flashing two subsequent
images on the same partition (for example because the user made a mistake)
would not work withouth flashing another partition or rebooting the board,
which is not really intuitive.
Since we have always the same pattern, we can however maintain a counter
that will be reset every time the client will retrieve max-download-size,
and incremented after each buffer will be flashed, that will allow us to
tell whether we should simply resume the flashing where we were, or start
back at the beginning of the partition.
Signed-off-by: Maxime Ripard <maxime.ripard@free-electrons.com>
Reviewed-by: Tom Rini <trini@konsulko.com>
2015-10-15 12:34:15 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* This also indicates the start of a new flashing
|
|
|
|
* "session", in which we could have 1-N buffers to
|
|
|
|
* write to a partition.
|
|
|
|
*
|
|
|
|
* Reset our session counter.
|
|
|
|
*/
|
|
|
|
fastboot_flash_session_id = 0;
|
2014-05-05 20:08:10 +00:00
|
|
|
} else if (!strcmp_l1("serialno", cmd)) {
|
|
|
|
s = getenv("serial#");
|
|
|
|
if (s)
|
2014-06-13 22:57:14 +00:00
|
|
|
strncat(response, s, chars_left);
|
2014-05-05 20:08:10 +00:00
|
|
|
else
|
|
|
|
strcpy(response, "FAILValue not set");
|
|
|
|
} else {
|
2016-03-17 16:21:23 +00:00
|
|
|
char envstr[32];
|
|
|
|
|
|
|
|
snprintf(envstr, sizeof(envstr) - 1, "fastboot.%s", cmd);
|
|
|
|
s = getenv(envstr);
|
|
|
|
if (s) {
|
|
|
|
strncat(response, s, chars_left);
|
|
|
|
} else {
|
|
|
|
printf("WARNING: unknown variable: %s\n", cmd);
|
|
|
|
strcpy(response, "FAILVariable not implemented");
|
|
|
|
}
|
2014-05-05 20:08:10 +00:00
|
|
|
}
|
|
|
|
fastboot_tx_write_str(response);
|
|
|
|
}
|
|
|
|
|
2016-04-19 07:16:59 +00:00
|
|
|
static unsigned int rx_bytes_expected(struct usb_ep *ep)
|
2014-05-05 20:08:10 +00:00
|
|
|
{
|
|
|
|
int rx_remain = download_size - download_bytes;
|
2016-04-19 07:16:59 +00:00
|
|
|
unsigned int rem;
|
|
|
|
unsigned int maxpacket = ep->maxpacket;
|
|
|
|
|
|
|
|
if (rx_remain <= 0)
|
2014-05-05 20:08:10 +00:00
|
|
|
return 0;
|
2016-04-19 07:16:59 +00:00
|
|
|
else if (rx_remain > EP_BUFFER_SIZE)
|
2014-05-05 20:08:10 +00:00
|
|
|
return EP_BUFFER_SIZE;
|
2016-04-19 07:16:59 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Some controllers e.g. DWC3 don't like OUT transfers to be
|
|
|
|
* not ending in maxpacket boundary. So just make them happy by
|
|
|
|
* always requesting for integral multiple of maxpackets.
|
|
|
|
* This shouldn't bother controllers that don't care about it.
|
|
|
|
*/
|
|
|
|
rem = rx_remain % maxpacket;
|
|
|
|
if (rem > 0)
|
2015-02-16 20:32:36 +00:00
|
|
|
rx_remain = rx_remain + (maxpacket - rem);
|
2016-04-19 07:16:59 +00:00
|
|
|
|
2014-05-05 20:08:10 +00:00
|
|
|
return rx_remain;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define BYTES_PER_DOT 0x20000
|
|
|
|
static void rx_handler_dl_image(struct usb_ep *ep, struct usb_request *req)
|
|
|
|
{
|
2015-10-15 12:34:13 +00:00
|
|
|
char response[FASTBOOT_RESPONSE_LEN];
|
2014-05-05 20:08:10 +00:00
|
|
|
unsigned int transfer_size = download_size - download_bytes;
|
|
|
|
const unsigned char *buffer = req->buf;
|
|
|
|
unsigned int buffer_size = req->actual;
|
2014-09-19 06:15:12 +00:00
|
|
|
unsigned int pre_dot_num, now_dot_num;
|
2014-05-05 20:08:10 +00:00
|
|
|
|
|
|
|
if (req->status != 0) {
|
|
|
|
printf("Bad status: %d\n", req->status);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (buffer_size < transfer_size)
|
|
|
|
transfer_size = buffer_size;
|
|
|
|
|
2015-07-20 10:38:22 +00:00
|
|
|
memcpy((void *)CONFIG_FASTBOOT_BUF_ADDR + download_bytes,
|
2014-05-05 20:08:10 +00:00
|
|
|
buffer, transfer_size);
|
|
|
|
|
2014-09-19 06:15:12 +00:00
|
|
|
pre_dot_num = download_bytes / BYTES_PER_DOT;
|
2014-05-05 20:08:10 +00:00
|
|
|
download_bytes += transfer_size;
|
2014-09-19 06:15:12 +00:00
|
|
|
now_dot_num = download_bytes / BYTES_PER_DOT;
|
|
|
|
|
|
|
|
if (pre_dot_num != now_dot_num) {
|
|
|
|
putc('.');
|
|
|
|
if (!(now_dot_num % 74))
|
|
|
|
putc('\n');
|
|
|
|
}
|
2014-05-05 20:08:10 +00:00
|
|
|
|
|
|
|
/* Check if transfer is done */
|
|
|
|
if (download_bytes >= download_size) {
|
|
|
|
/*
|
|
|
|
* Reset global transfer variable, keep download_bytes because
|
|
|
|
* it will be used in the next possible flashing command
|
|
|
|
*/
|
|
|
|
download_size = 0;
|
|
|
|
req->complete = rx_handler_command;
|
|
|
|
req->length = EP_BUFFER_SIZE;
|
|
|
|
|
2015-12-30 13:05:58 +00:00
|
|
|
strcpy(response, "OKAY");
|
2014-05-05 20:08:10 +00:00
|
|
|
fastboot_tx_write_str(response);
|
|
|
|
|
|
|
|
printf("\ndownloading of %d bytes finished\n", download_bytes);
|
|
|
|
} else {
|
2016-04-19 07:16:59 +00:00
|
|
|
req->length = rx_bytes_expected(ep);
|
2014-05-05 20:08:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
req->actual = 0;
|
|
|
|
usb_ep_queue(ep, req, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void cb_download(struct usb_ep *ep, struct usb_request *req)
|
|
|
|
{
|
|
|
|
char *cmd = req->buf;
|
2015-10-15 12:34:13 +00:00
|
|
|
char response[FASTBOOT_RESPONSE_LEN];
|
2014-05-05 20:08:10 +00:00
|
|
|
|
|
|
|
strsep(&cmd, ":");
|
|
|
|
download_size = simple_strtoul(cmd, NULL, 16);
|
|
|
|
download_bytes = 0;
|
|
|
|
|
|
|
|
printf("Starting download of %d bytes\n", download_size);
|
|
|
|
|
|
|
|
if (0 == download_size) {
|
2015-12-30 13:05:58 +00:00
|
|
|
strcpy(response, "FAILdata invalid size");
|
2015-07-20 10:38:22 +00:00
|
|
|
} else if (download_size > CONFIG_FASTBOOT_BUF_SIZE) {
|
2014-05-05 20:08:10 +00:00
|
|
|
download_size = 0;
|
2015-12-30 13:05:58 +00:00
|
|
|
strcpy(response, "FAILdata too large");
|
2014-05-05 20:08:10 +00:00
|
|
|
} else {
|
|
|
|
sprintf(response, "DATA%08x", download_size);
|
|
|
|
req->complete = rx_handler_dl_image;
|
2016-04-19 07:16:59 +00:00
|
|
|
req->length = rx_bytes_expected(ep);
|
2014-05-05 20:08:10 +00:00
|
|
|
}
|
|
|
|
fastboot_tx_write_str(response);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void do_bootm_on_complete(struct usb_ep *ep, struct usb_request *req)
|
|
|
|
{
|
|
|
|
char boot_addr_start[12];
|
|
|
|
char *bootm_args[] = { "bootm", boot_addr_start, NULL };
|
|
|
|
|
|
|
|
puts("Booting kernel..\n");
|
|
|
|
|
|
|
|
sprintf(boot_addr_start, "0x%lx", load_addr);
|
|
|
|
do_bootm(NULL, 0, 2, bootm_args);
|
|
|
|
|
|
|
|
/* This only happens if image is somehow faulty so we start over */
|
|
|
|
do_reset(NULL, 0, 0, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void cb_boot(struct usb_ep *ep, struct usb_request *req)
|
|
|
|
{
|
|
|
|
fastboot_func->in_req->complete = do_bootm_on_complete;
|
|
|
|
fastboot_tx_write_str("OKAY");
|
|
|
|
}
|
|
|
|
|
2014-12-10 20:43:04 +00:00
|
|
|
static void do_exit_on_complete(struct usb_ep *ep, struct usb_request *req)
|
|
|
|
{
|
|
|
|
g_dnl_trigger_detach();
|
|
|
|
}
|
|
|
|
|
|
|
|
static void cb_continue(struct usb_ep *ep, struct usb_request *req)
|
|
|
|
{
|
|
|
|
fastboot_func->in_req->complete = do_exit_on_complete;
|
|
|
|
fastboot_tx_write_str("OKAY");
|
|
|
|
}
|
|
|
|
|
2014-08-26 18:47:28 +00:00
|
|
|
#ifdef CONFIG_FASTBOOT_FLASH
|
|
|
|
static void cb_flash(struct usb_ep *ep, struct usb_request *req)
|
|
|
|
{
|
|
|
|
char *cmd = req->buf;
|
2015-10-15 12:34:13 +00:00
|
|
|
char response[FASTBOOT_RESPONSE_LEN];
|
2014-08-26 18:47:28 +00:00
|
|
|
|
|
|
|
strsep(&cmd, ":");
|
|
|
|
if (!cmd) {
|
2016-01-27 23:02:41 +00:00
|
|
|
error("missing partition name");
|
2014-08-26 18:47:28 +00:00
|
|
|
fastboot_tx_write_str("FAILmissing partition name");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
strcpy(response, "FAILno flash device defined");
|
|
|
|
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
|
fastboot: Implement flashing session counter
The fastboot flash command that writes an image to a partition works in
several steps:
1 - Retrieve the maximum size the device can download through the
"max-download-size" variable
2 - Retrieve the partition type through the "partition-type:%s" variable,
that indicates whether or not the partition needs to be erased (even
though the fastboot client has minimal support for that)
3a - If the image is smaller than what the device can handle, send the image
and flash it.
3b - If the image is larger than what the device can handle, create a
sparse image, and split it in several chunks that would fit. Send the
chunk, flash it, repeat until we have no more data to send.
However, in the 3b case, the subsequent transfers have no particular
identifiers, the protocol just assumes that you would resume the writes
where you left it.
While doing so works well, it also means that flashing two subsequent
images on the same partition (for example because the user made a mistake)
would not work withouth flashing another partition or rebooting the board,
which is not really intuitive.
Since we have always the same pattern, we can however maintain a counter
that will be reset every time the client will retrieve max-download-size,
and incremented after each buffer will be flashed, that will allow us to
tell whether we should simply resume the flashing where we were, or start
back at the beginning of the partition.
Signed-off-by: Maxime Ripard <maxime.ripard@free-electrons.com>
Reviewed-by: Tom Rini <trini@konsulko.com>
2015-10-15 12:34:15 +00:00
|
|
|
fb_mmc_flash_write(cmd, fastboot_flash_session_id,
|
|
|
|
(void *)CONFIG_FASTBOOT_BUF_ADDR,
|
2014-08-26 18:47:28 +00:00
|
|
|
download_bytes, response);
|
2015-10-15 12:34:17 +00:00
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_FASTBOOT_FLASH_NAND_DEV
|
|
|
|
fb_nand_flash_write(cmd, fastboot_flash_session_id,
|
|
|
|
(void *)CONFIG_FASTBOOT_BUF_ADDR,
|
|
|
|
download_bytes, response);
|
2014-08-26 18:47:28 +00:00
|
|
|
#endif
|
fastboot: Implement flashing session counter
The fastboot flash command that writes an image to a partition works in
several steps:
1 - Retrieve the maximum size the device can download through the
"max-download-size" variable
2 - Retrieve the partition type through the "partition-type:%s" variable,
that indicates whether or not the partition needs to be erased (even
though the fastboot client has minimal support for that)
3a - If the image is smaller than what the device can handle, send the image
and flash it.
3b - If the image is larger than what the device can handle, create a
sparse image, and split it in several chunks that would fit. Send the
chunk, flash it, repeat until we have no more data to send.
However, in the 3b case, the subsequent transfers have no particular
identifiers, the protocol just assumes that you would resume the writes
where you left it.
While doing so works well, it also means that flashing two subsequent
images on the same partition (for example because the user made a mistake)
would not work withouth flashing another partition or rebooting the board,
which is not really intuitive.
Since we have always the same pattern, we can however maintain a counter
that will be reset every time the client will retrieve max-download-size,
and incremented after each buffer will be flashed, that will allow us to
tell whether we should simply resume the flashing where we were, or start
back at the beginning of the partition.
Signed-off-by: Maxime Ripard <maxime.ripard@free-electrons.com>
Reviewed-by: Tom Rini <trini@konsulko.com>
2015-10-15 12:34:15 +00:00
|
|
|
fastboot_flash_session_id++;
|
2014-08-26 18:47:28 +00:00
|
|
|
fastboot_tx_write_str(response);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2015-01-26 21:49:00 +00:00
|
|
|
static void cb_oem(struct usb_ep *ep, struct usb_request *req)
|
|
|
|
{
|
|
|
|
char *cmd = req->buf;
|
2015-10-15 20:04:04 +00:00
|
|
|
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
|
2015-01-26 21:49:01 +00:00
|
|
|
if (strncmp("format", cmd + 4, 6) == 0) {
|
|
|
|
char cmdbuf[32];
|
|
|
|
sprintf(cmdbuf, "gpt write mmc %x $partitions",
|
|
|
|
CONFIG_FASTBOOT_FLASH_MMC_DEV);
|
|
|
|
if (run_command(cmdbuf, 0))
|
|
|
|
fastboot_tx_write_str("FAIL");
|
|
|
|
else
|
|
|
|
fastboot_tx_write_str("OKAY");
|
|
|
|
} else
|
|
|
|
#endif
|
2015-01-26 21:49:00 +00:00
|
|
|
if (strncmp("unlock", cmd + 4, 8) == 0) {
|
|
|
|
fastboot_tx_write_str("FAILnot implemented");
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
fastboot_tx_write_str("FAILunknown oem command");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-02-17 13:18:23 +00:00
|
|
|
#ifdef CONFIG_FASTBOOT_FLASH
|
|
|
|
static void cb_erase(struct usb_ep *ep, struct usb_request *req)
|
|
|
|
{
|
|
|
|
char *cmd = req->buf;
|
2015-10-15 12:34:13 +00:00
|
|
|
char response[FASTBOOT_RESPONSE_LEN];
|
2015-02-17 13:18:23 +00:00
|
|
|
|
|
|
|
strsep(&cmd, ":");
|
|
|
|
if (!cmd) {
|
|
|
|
error("missing partition name");
|
|
|
|
fastboot_tx_write_str("FAILmissing partition name");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
strcpy(response, "FAILno flash device defined");
|
|
|
|
|
|
|
|
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
|
|
|
|
fb_mmc_erase(cmd, response);
|
2015-10-15 12:34:17 +00:00
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_FASTBOOT_FLASH_NAND_DEV
|
|
|
|
fb_nand_erase(cmd, response);
|
2015-02-17 13:18:23 +00:00
|
|
|
#endif
|
|
|
|
fastboot_tx_write_str(response);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2014-05-05 20:08:10 +00:00
|
|
|
struct cmd_dispatch_info {
|
|
|
|
char *cmd;
|
|
|
|
void (*cb)(struct usb_ep *ep, struct usb_request *req);
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct cmd_dispatch_info cmd_dispatch_info[] = {
|
|
|
|
{
|
|
|
|
.cmd = "reboot",
|
|
|
|
.cb = cb_reboot,
|
|
|
|
}, {
|
|
|
|
.cmd = "getvar:",
|
|
|
|
.cb = cb_getvar,
|
|
|
|
}, {
|
|
|
|
.cmd = "download:",
|
|
|
|
.cb = cb_download,
|
|
|
|
}, {
|
|
|
|
.cmd = "boot",
|
|
|
|
.cb = cb_boot,
|
2014-12-10 20:43:04 +00:00
|
|
|
}, {
|
|
|
|
.cmd = "continue",
|
|
|
|
.cb = cb_continue,
|
2014-05-05 20:08:10 +00:00
|
|
|
},
|
2014-08-26 18:47:28 +00:00
|
|
|
#ifdef CONFIG_FASTBOOT_FLASH
|
|
|
|
{
|
|
|
|
.cmd = "flash",
|
|
|
|
.cb = cb_flash,
|
2015-02-17 13:18:23 +00:00
|
|
|
}, {
|
|
|
|
.cmd = "erase",
|
|
|
|
.cb = cb_erase,
|
2014-08-26 18:47:28 +00:00
|
|
|
},
|
|
|
|
#endif
|
2015-01-26 21:49:00 +00:00
|
|
|
{
|
|
|
|
.cmd = "oem",
|
|
|
|
.cb = cb_oem,
|
|
|
|
},
|
2014-05-05 20:08:10 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static void rx_handler_command(struct usb_ep *ep, struct usb_request *req)
|
|
|
|
{
|
|
|
|
char *cmdbuf = req->buf;
|
|
|
|
void (*func_cb)(struct usb_ep *ep, struct usb_request *req) = NULL;
|
|
|
|
int i;
|
|
|
|
|
2015-07-04 14:46:15 +00:00
|
|
|
if (req->status != 0 || req->length == 0)
|
|
|
|
return;
|
|
|
|
|
2014-05-05 20:08:10 +00:00
|
|
|
for (i = 0; i < ARRAY_SIZE(cmd_dispatch_info); i++) {
|
|
|
|
if (!strcmp_l1(cmd_dispatch_info[i].cmd, cmdbuf)) {
|
|
|
|
func_cb = cmd_dispatch_info[i].cb;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-26 18:47:29 +00:00
|
|
|
if (!func_cb) {
|
2016-01-27 23:02:41 +00:00
|
|
|
error("unknown command: %s", cmdbuf);
|
2014-05-05 20:08:10 +00:00
|
|
|
fastboot_tx_write_str("FAILunknown command");
|
2014-08-26 18:47:29 +00:00
|
|
|
} else {
|
2014-10-01 21:30:56 +00:00
|
|
|
if (req->actual < req->length) {
|
|
|
|
u8 *buf = (u8 *)req->buf;
|
|
|
|
buf[req->actual] = 0;
|
|
|
|
func_cb(ep, req);
|
|
|
|
} else {
|
2016-01-27 23:02:41 +00:00
|
|
|
error("buffer overflow");
|
2014-10-01 21:30:56 +00:00
|
|
|
fastboot_tx_write_str("FAILbuffer overflow");
|
|
|
|
}
|
2014-08-26 18:47:29 +00:00
|
|
|
}
|
2014-05-05 20:08:10 +00:00
|
|
|
|
2015-07-04 14:46:15 +00:00
|
|
|
*cmdbuf = '\0';
|
|
|
|
req->actual = 0;
|
|
|
|
usb_ep_queue(ep, req, 0);
|
2014-05-05 20:08:10 +00:00
|
|
|
}
|