From patchwork Tue Aug 21 11:35:37 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Haojian Zhuang X-Patchwork-Id: 144712 Delivered-To: patch@linaro.org Received: by 2002:a2e:9754:0:0:0:0:0 with SMTP id f20-v6csp5155736ljj; Tue, 21 Aug 2018 04:35:58 -0700 (PDT) X-Google-Smtp-Source: AA+uWPzdoas+aaelm1UHCNvZqlOy5cv1O3SigujOe1AuDJGh93z+nz/R5bjRB7yFhUVe+/DMlQ5O X-Received: by 2002:a62:d113:: with SMTP id z19-v6mr52059261pfg.98.1534851357972; Tue, 21 Aug 2018 04:35:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534851357; cv=none; d=google.com; s=arc-20160816; b=GBGwv6aODXD5v6+2mJoIAMM0TWRlUP+TC5jT9OqDZ7ACAMqT9JFxrQwFvvwfHHt6P2 CF8A24MAU9Q7WLggi16SzHbDjTLrPjfOZdsU5RqtEyVbdj/mkHRXEoxtggTAItnC3PZ1 9qk5PgK8TC7d2ELNHWPwpLcLD4ZRSQ8u4fkm1geBp3YMmEjjkU75+bZZ1B++HNurqhlu oxOrfnSr9GnP7FBnCKnkPvcYGdMyb5moCKu/YvmJRzLNnIKwrejasEy8SN0n8W0MdVk4 dOtdAYMqs1zef6uldPYllc07oKCJeFKaujjhmP1EN3YnUwO9+srwWkY9oRz4/UG9PLco CZ4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:content-transfer-encoding:mime-version :list-subscribe:list-help:list-post:list-archive:list-unsubscribe :list-id:precedence:subject:references:in-reply-to:message-id:date :to:from:dkim-signature:delivered-to:arc-authentication-results; bh=mbCKBnSh22e8ZSk453apdB2B29IUnouunl7VwaHgj3k=; b=rntCf3IA+Y7rDgqj3JyU73w6D337Vr8GTt5IO9vBDL7vjx6QSEm6rM90iotj448m8m 6L5KFGhrRBX9qxV++T4GPWSJvHUOuEqKTbenfANG5KgAMIM2Z9Y5O9GryoY1udCADKWV nPL5eySgP5UOkF4WC0vuLnXPqlgxM1UnHt10l7yHF3WZZuZVDgW8f+3+1r64LL+f8ouP s3+nexyVLci4vV0qWVd41z8MfrgSPgpCT31p9R0BXtPUiGP8pv57o6iN6BBzNKWvHKJa qMwOHU+cTwTfMae1Y4JWzzw1a/BnvIJyFKvFfsFuFfN1aQuM1CUCHVhGFlV8KXat0UKI nvUw== ARC-Authentication-Results: i=1; mx.google.com; dkim=neutral (body hash did not verify) header.i=@linaro.org header.s=google header.b=hSJv0pGZ; spf=pass (google.com: best guess record for domain of edk2-devel-bounces@lists.01.org designates 198.145.21.10 as permitted sender) smtp.mailfrom=edk2-devel-bounces@lists.01.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from ml01.01.org (ml01.01.org. [198.145.21.10]) by mx.google.com with ESMTPS id cd3-v6si5658556plb.47.2018.08.21.04.35.55 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 21 Aug 2018 04:35:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of edk2-devel-bounces@lists.01.org designates 198.145.21.10 as permitted sender) client-ip=198.145.21.10; Authentication-Results: mx.google.com; dkim=neutral (body hash did not verify) header.i=@linaro.org header.s=google header.b=hSJv0pGZ; spf=pass (google.com: best guess record for domain of edk2-devel-bounces@lists.01.org designates 198.145.21.10 as permitted sender) smtp.mailfrom=edk2-devel-bounces@lists.01.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id E294F210F93D2; Tue, 21 Aug 2018 04:35:53 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Delivered-To: edk2-devel@lists.01.org Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=2607:f8b0:4864:20::533; helo=mail-pg1-x533.google.com; envelope-from=haojian.zhuang@linaro.org; receiver=edk2-devel@lists.01.org Received: from mail-pg1-x533.google.com (mail-pg1-x533.google.com [IPv6:2607:f8b0:4864:20::533]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 8840D210F92B5 for ; Tue, 21 Aug 2018 04:35:52 -0700 (PDT) Received: by mail-pg1-x533.google.com with SMTP id z4-v6so3338175pgv.2 for ; Tue, 21 Aug 2018 04:35:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=YkCA8wLagkg1Te4mGO5McjcOV6oSNsQ/75gO0fSTuwA=; b=hSJv0pGZUgq0+iJlSkYws7/p+99HBQ9eOA2oyoBF2GI34ZxyiePgjjaSzOiG5LxvNT FDAkA7RWsy3uOhyujTM10PJaOltSsEkLuc/qdQtfS58AOG45z1MTaD+qEBGRdbggbOtp m9Xphlg+tN2TyHe+2oVVNTv9Nctyk0tmfRHHM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=YkCA8wLagkg1Te4mGO5McjcOV6oSNsQ/75gO0fSTuwA=; b=OG/exucEnIP0QtNZGa0dXjhxFFM1Ru/UtgLcsdymBxuS1p4cugF5xkTCG7nzOby/hv 1uPFT5QbLhxfx1J2wDrUnWR5ov0mKDJvmgf0YJQ0lDEqkicEb0LZB9ejzzY5rgiRDVRf MhnzNU/2RDeU4cGOLDpHFv6Pbf4RDTJl7x3askH7tLDNJElSyZUCe/gsnix9NVl+WY/V 7wq8e3ER04y7ZrR0NNwkz3hxuO0pkRN0/knQB6w/AnzSJILmCflpmbKj87oojskZ7/I0 DuxcwILPdIaWeMMXJIBBGnaLtU18Bpna7ufALWkvSUkmjwYmRlKebcvzoc/3mMbYqwkL 70oQ== X-Gm-Message-State: AOUpUlFCB9XNwOJyDz87PJHq1syjWYgmDK1WKfbzgXZjC6TkLb9w4uhU 9umSWspulZN1dGDtUZPbM5CgKObJkzoOOQ== X-Received: by 2002:a63:c24c:: with SMTP id l12-v6mr19666840pgg.255.1534851351282; Tue, 21 Aug 2018 04:35:51 -0700 (PDT) Received: from localhost.localdomain ([64.64.108.219]) by smtp.gmail.com with ESMTPSA id s14-v6sm21678388pfj.105.2018.08.21.04.35.48 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 21 Aug 2018 04:35:50 -0700 (PDT) From: Haojian Zhuang To: edk2-devel@lists.01.org Date: Tue, 21 Aug 2018 19:35:37 +0800 Message-Id: <1534851338-21419-4-git-send-email-haojian.zhuang@linaro.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1534851338-21419-1-git-send-email-haojian.zhuang@linaro.org> References: <1534851338-21419-1-git-send-email-haojian.zhuang@linaro.org> Subject: [edk2] [PATCH edk-platforms v1 3/4] Platform/HiKey: add fastboot platform driver X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" Implement Android Fastboot protocol on HiKey platform. Cc: Leif Lindholm Cc: Ard Biesheuvel Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Haojian Zhuang --- Platform/Hisilicon/HiKey/HiKeyFastbootDxe/HiKeyFastbootDxe.inf | 61 ++ Platform/Hisilicon/HiKey/HiKeyFastbootDxe/HiKeyFastbootDxe.c | 630 ++++++++++++++++++++ 2 files changed, 691 insertions(+) -- 2.7.4 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel diff --git a/Platform/Hisilicon/HiKey/HiKeyFastbootDxe/HiKeyFastbootDxe.inf b/Platform/Hisilicon/HiKey/HiKeyFastbootDxe/HiKeyFastbootDxe.inf new file mode 100644 index 000000000000..2f2f1c4cb0a0 --- /dev/null +++ b/Platform/Hisilicon/HiKey/HiKeyFastbootDxe/HiKeyFastbootDxe.inf @@ -0,0 +1,61 @@ +#/** @file +# +# Copyright (c) 2014, ARM Ltd. All rights reserved.
+# Copyright (c) 2018, Linaro. All rights reserved. +# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the BSD License +# which accompanies this distribution. The full text of the license may be found at +# http://opensource.org/licenses/bsd-license.php +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. +# +# +#**/ + +[Defines] + INF_VERSION = 0x00010019 + BASE_NAME = HiKeyFastbootDxe + FILE_GUID = 8e335c38-c4e1-494e-8011-37a858d9763d + MODULE_TYPE = UEFI_DRIVER + VERSION_STRING = 1.0 + ENTRY_POINT = HiKeyFastbootPlatformEntryPoint + +[Sources.common] + HiKeyFastbootDxe.c + +[LibraryClasses] + BaseLib + BaseMemoryLib + CacheMaintenanceLib + DebugLib + DevicePathLib + IoLib + MemoryAllocationLib + PcdLib + UefiBootServicesTableLib + UefiRuntimeServicesTableLib + UefiDriverEntryPoint + UsbSerialNumberLib + TimerLib + +[Protocols] + gAndroidFastbootPlatformProtocolGuid + gEfiBlockIoProtocolGuid + gEfiDiskIoProtocolGuid + gEfiEraseBlockProtocolGuid + gEfiSimpleTextOutProtocolGuid + +[Packages] + ArmPlatformPkg/ArmPlatformPkg.dec + ArmPkg/ArmPkg.dec + EmbeddedPkg/EmbeddedPkg.dec + MdePkg/MdePkg.dec + MdeModulePkg/MdeModulePkg.dec + Platform/Hisilicon/HiKey/HiKey.dec + Platform/Hisilicon/Library/UsbSerialNumberLib/UsbSerialNumberLib.dec + +[Pcd] + gEfiMdeModulePkgTokenSpaceGuid.PcdFirmwareVendor + gHiKeyTokenSpaceGuid.PcdAndroidFastbootNvmDevicePath + gHiKeyTokenSpaceGuid.PcdArmFastbootFlashLimit diff --git a/Platform/Hisilicon/HiKey/HiKeyFastbootDxe/HiKeyFastbootDxe.c b/Platform/Hisilicon/HiKey/HiKeyFastbootDxe/HiKeyFastbootDxe.c new file mode 100644 index 000000000000..f5a9c53b6a23 --- /dev/null +++ b/Platform/Hisilicon/HiKey/HiKeyFastbootDxe/HiKeyFastbootDxe.c @@ -0,0 +1,630 @@ +/** @file + + Copyright (c) 2014, ARM Ltd. All rights reserved.
+ Copyright (c) 2018, Linaro. All rights reserved. + + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BSD License + which accompanies this distribution. The full text of the license may be found at + http://opensource.org/licenses/bsd-license.php + + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. + +**/ + +/* + Implementation of the Android Fastboot Platform protocol, to be used by the + Fastboot UEFI application, for Hisilicon HiKey platform. +*/ + +#include +#include +#include +#include +#include + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#define PARTITION_NAME_MAX_LENGTH (72/2) + +#define SERIAL_NUMBER_LBA 1024 +#define RANDOM_MAX 0x7FFFFFFFFFFFFFFF +#define RANDOM_MAGIC 0x9A4DBEAF + +#define ADB_REBOOT_ADDRESS 0x05F01000 +#define ADB_REBOOT_BOOTLOADER 0x77665500 + +#define MMC_BLOCK_SIZE 512 +#define HIKEY_ERASE_SIZE 4096 + +typedef struct _FASTBOOT_PARTITION_LIST { + LIST_ENTRY Link; + CHAR16 PartitionName[PARTITION_NAME_MAX_LENGTH]; + EFI_LBA StartingLBA; + EFI_LBA EndingLBA; +} FASTBOOT_PARTITION_LIST; + +STATIC LIST_ENTRY mPartitionListHead; +STATIC EFI_HANDLE mFlashHandle; +STATIC EFI_BLOCK_IO_PROTOCOL *mFlashBlockIo; +STATIC EFI_SIMPLE_TEXT_OUTPUT_PROTOCOL *mTextOut; + +/* + Helper to free the partition list +*/ +STATIC +VOID +FreePartitionList ( + VOID + ) +{ + FASTBOOT_PARTITION_LIST *Entry; + FASTBOOT_PARTITION_LIST *NextEntry; + + Entry = (FASTBOOT_PARTITION_LIST *) GetFirstNode (&mPartitionListHead); + while (!IsNull (&mPartitionListHead, &Entry->Link)) { + NextEntry = (FASTBOOT_PARTITION_LIST *) GetNextNode (&mPartitionListHead, &Entry->Link); + + RemoveEntryList (&Entry->Link); + FreePool (Entry); + + Entry = NextEntry; + } +} + +/* + Read the PartitionName fields from the GPT partition entries, putting them + into an allocated array that should later be freed. +*/ +STATIC +EFI_STATUS +ReadPartitionEntries ( + IN EFI_BLOCK_IO_PROTOCOL *BlockIo, + OUT EFI_PARTITION_ENTRY **PartitionEntries, + OUT UINTN *PartitionNumbers + ) +{ + EFI_STATUS Status; + UINT32 MediaId; + UINTN BlockSize; + UINTN PageCount; + UINTN Count, EndLBA; + EFI_PARTITION_TABLE_HEADER *GptHeader; + EFI_PARTITION_ENTRY *Entry; + VOID *Buffer; + + if ((PartitionEntries == NULL) || (PartitionNumbers == NULL)) { + return EFI_INVALID_PARAMETER; + } + + MediaId = BlockIo->Media->MediaId; + BlockSize = BlockIo->Media->BlockSize; + + // + // Read size of Partition entry and number of entries from GPT header + // + + PageCount = EFI_SIZE_TO_PAGES (34 * BlockSize); + Buffer = AllocatePages (PageCount); + if (Buffer == NULL) { + return EFI_OUT_OF_RESOURCES; + } + + Status = BlockIo->ReadBlocks (BlockIo, MediaId, 0, PageCount * EFI_PAGE_SIZE, Buffer); + if (EFI_ERROR (Status)) { + return Status; + } + GptHeader = (EFI_PARTITION_TABLE_HEADER *)(Buffer + BlockSize); + + // Check there is a GPT on the media + if (GptHeader->Header.Signature != EFI_PTAB_HEADER_ID || + GptHeader->MyLBA != 1) { + DEBUG ((EFI_D_ERROR, + "Fastboot platform: No GPT on flash. " + "Fastboot on HiKey does not support MBR.\n" + )); + return EFI_DEVICE_ERROR; + } + + Entry = (EFI_PARTITION_ENTRY *)(Buffer + (2 * BlockSize)); + EndLBA = GptHeader->FirstUsableLBA - 1; + Count = 0; + while (1) { + if ((Entry->StartingLBA > EndLBA) && (Entry->EndingLBA <= GptHeader->LastUsableLBA)) { + Count++; + EndLBA = Entry->EndingLBA; + Entry++; + } else { + break; + } + } + if (Count == 0) { + return EFI_INVALID_PARAMETER; + } + if (Count > GptHeader->NumberOfPartitionEntries) { + Count = GptHeader->NumberOfPartitionEntries; + } + + *PartitionEntries = (EFI_PARTITION_ENTRY *)((UINTN)Buffer + (2 * BlockSize)); + *PartitionNumbers = Count; + return EFI_SUCCESS; +} + +EFI_STATUS +LoadPtable ( + VOID + ) +{ + EFI_STATUS Status; + EFI_DEVICE_PATH_PROTOCOL *FlashDevicePath; + EFI_DEVICE_PATH_PROTOCOL *FlashDevicePathDup; + UINTN PartitionNumbers = 0; + UINTN LoopIndex; + EFI_PARTITION_ENTRY *PartitionEntries = NULL; + FASTBOOT_PARTITION_LIST *Entry; + + InitializeListHead (&mPartitionListHead); + + Status = gBS->LocateProtocol (&gEfiSimpleTextOutProtocolGuid, NULL, (VOID **) &mTextOut); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, + "Fastboot platform: Couldn't open Text Output Protocol: %r\n", Status + )); + return Status; + } + + // + // Get EFI_HANDLES for all the partitions on the block devices pointed to by + // PcdFastbootFlashDevicePath, also saving their GPT partition labels. + // There's no way to find all of a device's children, so we get every handle + // in the system supporting EFI_BLOCK_IO_PROTOCOL and then filter out ones + // that don't represent partitions on the flash device. + // + FlashDevicePath = ConvertTextToDevicePath ((CHAR16*)FixedPcdGetPtr (PcdAndroidFastbootNvmDevicePath)); + + // Create another device path pointer because LocateDevicePath will modify it. + FlashDevicePathDup = FlashDevicePath; + Status = gBS->LocateDevicePath (&gEfiBlockIoProtocolGuid, &FlashDevicePathDup, &mFlashHandle); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "Warning: Couldn't locate Android NVM device (status: %r)\n", Status)); + // Failing to locate partitions should not prevent to do other Android FastBoot actions + return EFI_SUCCESS; + } + + + Status = gBS->OpenProtocol ( + mFlashHandle, + &gEfiBlockIoProtocolGuid, + (VOID **) &mFlashBlockIo, + gImageHandle, + NULL, + EFI_OPEN_PROTOCOL_GET_PROTOCOL + ); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "Fastboot platform: Couldn't open Android NVM device (status: %r)\n", Status)); + return EFI_DEVICE_ERROR; + } + + // Read the GPT partition entry array into memory so we can get the partition names + Status = ReadPartitionEntries (mFlashBlockIo, &PartitionEntries, &PartitionNumbers); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "Warning: Failed to read partitions from Android NVM device (status: %r)\n", Status)); + // Failing to locate partitions should not prevent to do other Android FastBoot actions + return EFI_SUCCESS; + } + for (LoopIndex = 0; LoopIndex < PartitionNumbers; LoopIndex++) { + // Create entry + Entry = AllocatePool (sizeof (FASTBOOT_PARTITION_LIST)); + if (Entry == NULL) { + Status = EFI_BUFFER_TOO_SMALL; + FreePartitionList (); + goto Exit; + } + StrnCpy ( + Entry->PartitionName, + PartitionEntries[LoopIndex].PartitionName, + PARTITION_NAME_MAX_LENGTH + ); + Entry->StartingLBA = PartitionEntries[LoopIndex].StartingLBA; + Entry->EndingLBA = PartitionEntries[LoopIndex].EndingLBA; + InsertTailList (&mPartitionListHead, &Entry->Link); + } +Exit: + FreePages ( + (VOID *)((UINTN)PartitionEntries - (2 * mFlashBlockIo->Media->BlockSize)), + EFI_SIZE_TO_PAGES (34 * mFlashBlockIo->Media->BlockSize) + ); + return Status; +} + +/* + Initialise: Open the Android NVM device and find the partitions on it. Save them in + a list along with the "PartitionName" fields for their GPT entries. + We will use these partition names as the key in + HiKeyFastbootPlatformFlashPartition. +*/ +EFI_STATUS +HiKeyFastbootPlatformInit ( + VOID + ) +{ + return LoadPtable (); +} + +VOID +HiKeyFastbootPlatformUnInit ( + VOID + ) +{ + FreePartitionList (); +} + +EFI_STATUS +HiKeyFlashPtable ( + IN UINTN Size, + IN VOID *Image + ) +{ + EFI_STATUS Status; + EFI_DISK_IO_PROTOCOL *DiskIo; + UINT32 MediaId; + VOID *Buffer; + UINT32 EntrySize, EntryOffset; + UINTN BlockSize; + + MediaId = mFlashBlockIo->Media->MediaId; + BlockSize = mFlashBlockIo->Media->BlockSize; + Status = gBS->OpenProtocol ( + mFlashHandle, + &gEfiDiskIoProtocolGuid, + (VOID **) &DiskIo, + gImageHandle, + NULL, + EFI_OPEN_PROTOCOL_GET_PROTOCOL + ); + if (EFI_ERROR (Status)) { + return Status; + } + Buffer = Image; + if (AsciiStrnCmp (Buffer, "ENTRYHDR", 8) != 0) { + DEBUG ((EFI_D_ERROR, "It should be raw ptable image\n")); + Status = DiskIo->WriteDisk (DiskIo, MediaId, 0, Size, Image); + if (EFI_ERROR (Status)) { + return Status; + } + } else { + /* ptable with entry header */ + Buffer += 8; + if (AsciiStrnCmp (Buffer, "primary", 7) != 0) { + DEBUG ((EFI_D_ERROR, "unknown ptable imag\n")); + return EFI_UNSUPPORTED; + } + Buffer += 8; + EntryOffset = *(UINT32 *)Buffer * BlockSize; + Buffer += 4; + EntrySize = *(UINT32 *)Buffer * BlockSize; + if ((EntrySize + BlockSize) > Size) { + DEBUG ((DEBUG_ERROR, "Entry size doesn't match\n")); + return EFI_UNSUPPORTED; + } + Buffer = Image + BlockSize; + Status = DiskIo->WriteDisk (DiskIo, MediaId, EntryOffset, EntrySize, Buffer); + if (EFI_ERROR (Status)) { + return Status; + } + } + FreePartitionList (); + Status = LoadPtable (); + return Status; +} + +EFI_STATUS +HiKeyFastbootPlatformFlashPartition ( + IN CHAR8 *PartitionName, + IN UINTN Size, + IN VOID *Image + ) +{ + EFI_STATUS Status; + UINTN PartitionSize; + FASTBOOT_PARTITION_LIST *Entry; + CHAR16 PartitionNameUnicode[60]; + BOOLEAN PartitionFound; + EFI_DISK_IO_PROTOCOL *DiskIo; + UINTN BlockSize; + + // Support the pseudo partition name, such as "ptable". + if (AsciiStrCmp (PartitionName, "ptable") == 0) { + return HiKeyFlashPtable (Size, Image); + } + + AsciiStrToUnicodeStr (PartitionName, PartitionNameUnicode); + PartitionFound = FALSE; + Entry = (FASTBOOT_PARTITION_LIST *) GetFirstNode (&(mPartitionListHead)); + while (!IsNull (&mPartitionListHead, &Entry->Link)) { + // Search the partition list for the partition named by PartitionName + if (StrCmp (Entry->PartitionName, PartitionNameUnicode) == 0) { + PartitionFound = TRUE; + break; + } + + Entry = (FASTBOOT_PARTITION_LIST *) GetNextNode (&mPartitionListHead, &(Entry)->Link); + } + if (!PartitionFound) { + return EFI_NOT_FOUND; + } + + // Check image will fit on device + BlockSize = mFlashBlockIo->Media->BlockSize; + PartitionSize = (Entry->EndingLBA - Entry->StartingLBA + 1) * BlockSize; + if (PartitionSize < Size) { + DEBUG ((DEBUG_ERROR, "Partition not big enough.\n")); + DEBUG ((DEBUG_ERROR, "Partition Size:\t%ld\nImage Size:\t%ld\n", PartitionSize, Size)); + + return EFI_VOLUME_FULL; + } + Status = gBS->OpenProtocol ( + mFlashHandle, + &gEfiDiskIoProtocolGuid, + (VOID **) &DiskIo, + gImageHandle, + NULL, + EFI_OPEN_PROTOCOL_GET_PROTOCOL + ); + ASSERT_EFI_ERROR (Status); + + Status = DiskIo->WriteDisk ( + DiskIo, + mFlashBlockIo->Media->MediaId, + Entry->StartingLBA * BlockSize, + Size, + Image + ); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "Failed to write %d bytes into 0x%x, Status:%r\n", Size, Entry->StartingLBA * BlockSize, Status)); + return Status; + } + + mFlashBlockIo->FlushBlocks(mFlashBlockIo); + MicroSecondDelay (50000); + + return Status; +} + +EFI_STATUS +HiKeyErasePtable ( + VOID + ) +{ + EFI_STATUS Status; + EFI_ERASE_BLOCK_PROTOCOL *EraseBlockProtocol; + + Status = gBS->OpenProtocol ( + mFlashHandle, + &gEfiEraseBlockProtocolGuid, + (VOID **) &EraseBlockProtocol, + gImageHandle, + NULL, + EFI_OPEN_PROTOCOL_GET_PROTOCOL + ); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "Fastboot platform: could not open Erase Block IO: %r\n", Status)); + return EFI_DEVICE_ERROR; + } + Status = EraseBlockProtocol->EraseBlocks ( + EraseBlockProtocol, + mFlashBlockIo->Media->MediaId, + 0, + NULL, + 34 * mFlashBlockIo->Media->BlockSize + ); + if (EFI_ERROR (Status)) { + return Status; + } + FreePartitionList (); + return Status; +} + +EFI_STATUS +HiKeyFastbootPlatformErasePartition ( + IN CHAR8 *PartitionName + ) +{ + EFI_STATUS Status; + EFI_ERASE_BLOCK_PROTOCOL *EraseBlockProtocol; + UINTN Size; + BOOLEAN PartitionFound; + CHAR16 PartitionNameUnicode[60]; + FASTBOOT_PARTITION_LIST *Entry; + + AsciiStrToUnicodeStr (PartitionName, PartitionNameUnicode); + + // Support the pseudo partition name, such as "ptable". + if (AsciiStrCmp (PartitionName, "ptable") == 0) { + return HiKeyErasePtable (); + } + + PartitionFound = FALSE; + Entry = (FASTBOOT_PARTITION_LIST *) GetFirstNode (&mPartitionListHead); + while (!IsNull (&mPartitionListHead, &Entry->Link)) { + // Search the partition list for the partition named by PartitionName + if (StrCmp (Entry->PartitionName, PartitionNameUnicode) == 0) { + PartitionFound = TRUE; + break; + } + Entry = (FASTBOOT_PARTITION_LIST *) GetNextNode (&mPartitionListHead, &Entry->Link); + } + if (!PartitionFound) { + return EFI_NOT_FOUND; + } + + Status = gBS->OpenProtocol ( + mFlashHandle, + &gEfiEraseBlockProtocolGuid, + (VOID **) &EraseBlockProtocol, + gImageHandle, + NULL, + EFI_OPEN_PROTOCOL_GET_PROTOCOL + ); + if (EFI_ERROR (Status)) { + return Status; + } + Size = (Entry->EndingLBA - Entry->StartingLBA + 1) * mFlashBlockIo->Media->BlockSize; + Status = EraseBlockProtocol->EraseBlocks ( + EraseBlockProtocol, + mFlashBlockIo->Media->MediaId, + Entry->StartingLBA, + NULL, + Size + ); + return Status; +} + +EFI_STATUS +HiKeyFastbootPlatformGetVar ( + IN CHAR8 *Name, + OUT CHAR8 *Value + ) +{ + EFI_STATUS Status; + UINT64 PartitionSize; + FASTBOOT_PARTITION_LIST *Entry; + CHAR16 PartitionNameUnicode[60]; + BOOLEAN PartitionFound; + CHAR16 UnicodeSN[SERIAL_NUMBER_SIZE]; + + if (!AsciiStrCmp (Name, "max-download-size")) { + AsciiStrCpy (Value, FixedPcdGetPtr (PcdArmFastbootFlashLimit)); + } else if (!AsciiStrCmp (Name, "product")) { + AsciiStrCpy (Value, FixedPcdGetPtr (PcdFirmwareVendor)); + } else if (!AsciiStrCmp (Name, "serialno")) { + Status = LoadSNFromBlock (mFlashHandle, SERIAL_NUMBER_LBA, UnicodeSN); + if (EFI_ERROR (Status)) { + *Value = '\0'; + return Status; + } + UnicodeStrToAsciiStr (UnicodeSN, Value); + } else if ( !AsciiStrnCmp (Name, "partition-size", 14)) { + AsciiStrToUnicodeStr ((Name + 15), PartitionNameUnicode); + PartitionFound = FALSE; + Entry = (FASTBOOT_PARTITION_LIST *) GetFirstNode (&(mPartitionListHead)); + while (!IsNull (&mPartitionListHead, &Entry->Link)) { + // Search the partition list for the partition named by PartitionName + if (StrCmp (Entry->PartitionName, PartitionNameUnicode) == 0) { + PartitionFound = TRUE; + break; + } + + Entry = (FASTBOOT_PARTITION_LIST *) GetNextNode (&mPartitionListHead, &(Entry)->Link); + } + if (!PartitionFound) { + *Value = '\0'; + return EFI_NOT_FOUND; + } + + PartitionSize = (Entry->EndingLBA - Entry->StartingLBA + 1) * mFlashBlockIo->Media->BlockSize; + DEBUG ((DEBUG_ERROR, "Fastboot platform: check for partition-size:%a 0X%llx\n", Name, PartitionSize)); + AsciiSPrint (Value, 12, "0x%llx", PartitionSize); + } else if ( !AsciiStrnCmp (Name, "partition-type", 14)) { + DEBUG ((DEBUG_ERROR, "Fastboot platform: check for partition-type:%a\n", (Name + 15))); + if ( !AsciiStrnCmp ( (Name + 15) , "system", 6) || !AsciiStrnCmp ( (Name + 15) , "userdata", 8) + || !AsciiStrnCmp ( (Name + 15) , "cache", 5) + || !AsciiStrnCmp ( (Name + 15) , "vendor", 6)) { + AsciiStrCpy (Value, "ext4"); + } else { + AsciiStrCpy (Value, "raw"); + } + } else if ( !AsciiStrCmp (Name, "erase-block-size")) { + AsciiSPrint (Value, 12, "0x%llx", HIKEY_ERASE_SIZE); + } else if ( !AsciiStrCmp (Name, "logical-block-size")) { + AsciiSPrint (Value, 12, "0x%llx", HIKEY_ERASE_SIZE); + } else { + *Value = '\0'; + } + return EFI_SUCCESS; +} + +EFI_STATUS +HiKeyFastbootPlatformOemCommand ( + IN CHAR8 *Command + ) +{ + EFI_STATUS Status; + CHAR16 UnicodeSN[SERIAL_NUMBER_SIZE]; + UINTN Size; + + Size = AsciiStrLen ("serialno"); + if (AsciiStrCmp (Command, "Demonstrate") == 0) { + DEBUG ((DEBUG_ERROR, "ARM OEM Fastboot command 'Demonstrate' received.\n")); + return EFI_SUCCESS; + } else if (AsciiStrnCmp (Command, "serialno", Size) == 0) { + while (*(Command + Size) == ' ') { + Size++; + } + if (AsciiStrnCmp (Command + Size, "set", AsciiStrLen ("set")) == 0) { + Size += AsciiStrLen ("set"); + while (*(Command + Size) == ' ') { + Size++; + } + Status = AssignUsbSN (Command + Size, UnicodeSN); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "Failed to set USB Serial Number.\n")); + return Status; + } + } else { + Status = GenerateUsbSN (UnicodeSN); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "Failed to generate USB Serial Number.\n")); + return Status; + } + } + Status = StoreSNToBlock (mFlashHandle, SERIAL_NUMBER_LBA, UnicodeSN); + return Status; + } else if (AsciiStrCmp (Command, "reboot-bootloader") == 0) { + MmioWrite32 (ADB_REBOOT_ADDRESS, ADB_REBOOT_BOOTLOADER); + WriteBackInvalidateDataCacheRange ((VOID *)ADB_REBOOT_ADDRESS, 4); + return EFI_SUCCESS; + } else { + DEBUG ((DEBUG_ERROR, + "HiKey: Unrecognised Fastboot OEM command: %s\n", + Command + )); + return EFI_NOT_FOUND; + } +} + +FASTBOOT_PLATFORM_PROTOCOL mPlatformProtocol = { + HiKeyFastbootPlatformInit, + HiKeyFastbootPlatformUnInit, + HiKeyFastbootPlatformFlashPartition, + HiKeyFastbootPlatformErasePartition, + HiKeyFastbootPlatformGetVar, + HiKeyFastbootPlatformOemCommand +}; + +EFI_STATUS +EFIAPI +HiKeyFastbootPlatformEntryPoint ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE *SystemTable + ) +{ + return gBS->InstallProtocolInterface ( + &ImageHandle, + &gAndroidFastbootPlatformProtocolGuid, + EFI_NATIVE_INTERFACE, + &mPlatformProtocol + ); +}