flash_map.c 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321
  1. /*
  2. * Copyright (c) 2017 Nordic Semiconductor ASA
  3. * Copyright (c) 2015 Runtime Inc
  4. * Copyright (c) 2017 Linaro Ltd
  5. * Copyright (c) 2020 Gerson Fernando Budke <nandojve@gmail.com>
  6. *
  7. * SPDX-License-Identifier: Apache-2.0
  8. */
  9. #include <zephyr/types.h>
  10. #include <stddef.h>
  11. #include <sys/types.h>
  12. #include <device.h>
  13. #include <storage/flash_map.h>
  14. #include <drivers/flash.h>
  15. #include <soc.h>
  16. #include <init.h>
  17. #if defined(CONFIG_FLASH_AREA_CHECK_INTEGRITY)
  18. #include <tinycrypt/constants.h>
  19. #include <tinycrypt/sha256.h>
  20. #include <string.h>
  21. #endif
  22. #if defined(CONFIG_FLASH_PAGE_LAYOUT)
  23. struct layout_data {
  24. uint32_t area_idx;
  25. uint32_t area_off;
  26. uint32_t area_len;
  27. void *ret; /* struct flash_area* or struct flash_sector* */
  28. uint32_t ret_idx;
  29. uint32_t ret_len;
  30. int status;
  31. };
  32. #endif /* CONFIG_FLASH_PAGE_LAYOUT */
  33. extern const struct flash_area *flash_map;
  34. extern const int flash_map_entries;
  35. static struct flash_area const *get_flash_area_from_id(int idx)
  36. {
  37. for (int i = 0; i < flash_map_entries; i++) {
  38. if (flash_map[i].fa_id == idx) {
  39. return &flash_map[i];
  40. }
  41. }
  42. return NULL;
  43. }
  44. void flash_area_foreach(flash_area_cb_t user_cb, void *user_data)
  45. {
  46. for (int i = 0; i < flash_map_entries; i++) {
  47. user_cb(&flash_map[i], user_data);
  48. }
  49. }
  50. int flash_area_open(uint8_t id, const struct flash_area **fap)
  51. {
  52. const struct flash_area *area;
  53. if (flash_map == NULL) {
  54. return -EACCES;
  55. }
  56. area = get_flash_area_from_id(id);
  57. if (area == NULL) {
  58. return -ENOENT;
  59. }
  60. *fap = area;
  61. return 0;
  62. }
  63. void flash_area_close(const struct flash_area *fa)
  64. {
  65. /* nothing to do for now */
  66. }
  67. static inline bool is_in_flash_area_bounds(const struct flash_area *fa,
  68. off_t off, size_t len)
  69. {
  70. return (off >= 0) && ((off + len) <= fa->fa_size);
  71. }
  72. #if defined(CONFIG_FLASH_PAGE_LAYOUT)
  73. /*
  74. * Check if a flash_page_foreach() callback should exit early, due to
  75. * one of the following conditions:
  76. *
  77. * - The flash page described by "info" is before the area of interest
  78. * described in "data"
  79. * - The flash page is after the end of the area
  80. * - There are too many flash pages on the device to fit in the array
  81. * held in data->ret. In this case, data->status is set to -ENOMEM.
  82. *
  83. * The value to return to flash_page_foreach() is stored in
  84. * "bail_value" if the callback should exit early.
  85. */
  86. static bool should_bail(const struct flash_pages_info *info,
  87. struct layout_data *data,
  88. bool *bail_value)
  89. {
  90. if (info->start_offset < data->area_off) {
  91. *bail_value = true;
  92. return true;
  93. } else if (info->start_offset >= data->area_off + data->area_len) {
  94. *bail_value = false;
  95. return true;
  96. } else if (data->ret_idx >= data->ret_len) {
  97. data->status = -ENOMEM;
  98. *bail_value = false;
  99. return true;
  100. }
  101. return false;
  102. }
  103. /*
  104. * Generic page layout discovery routine. This is kept separate to
  105. * support both the deprecated flash_area_to_sectors() and the current
  106. * flash_area_get_sectors(). A lot of this can be inlined once
  107. * flash_area_to_sectors() is removed.
  108. */
  109. static int flash_area_layout(int idx, uint32_t *cnt, void *ret,
  110. flash_page_cb cb, struct layout_data *cb_data)
  111. {
  112. const struct device *flash_dev;
  113. cb_data->area_idx = idx;
  114. const struct flash_area *fa;
  115. fa = get_flash_area_from_id(idx);
  116. if (fa == NULL) {
  117. return -EINVAL;
  118. }
  119. cb_data->area_idx = idx;
  120. cb_data->area_off = fa->fa_off;
  121. cb_data->area_len = fa->fa_size;
  122. cb_data->ret = ret;
  123. cb_data->ret_idx = 0U;
  124. cb_data->ret_len = *cnt;
  125. cb_data->status = 0;
  126. flash_dev = device_get_binding(fa->fa_dev_name);
  127. if (flash_dev == NULL) {
  128. return -ENODEV;
  129. }
  130. flash_page_foreach(flash_dev, cb, cb_data);
  131. if (cb_data->status == 0) {
  132. *cnt = cb_data->ret_idx;
  133. }
  134. return cb_data->status;
  135. }
  136. static bool get_sectors_cb(const struct flash_pages_info *info, void *datav)
  137. {
  138. struct layout_data *data = datav;
  139. struct flash_sector *ret = data->ret;
  140. bool bail;
  141. if (should_bail(info, data, &bail)) {
  142. return bail;
  143. }
  144. ret[data->ret_idx].fs_off = info->start_offset - data->area_off;
  145. ret[data->ret_idx].fs_size = info->size;
  146. data->ret_idx++;
  147. return true;
  148. }
  149. int flash_area_get_sectors(int idx, uint32_t *cnt, struct flash_sector *ret)
  150. {
  151. struct layout_data data;
  152. return flash_area_layout(idx, cnt, ret, get_sectors_cb, &data);
  153. }
  154. #endif /* CONFIG_FLASH_PAGE_LAYOUT */
  155. int flash_area_read(const struct flash_area *fa, off_t off, void *dst,
  156. size_t len)
  157. {
  158. const struct device *dev;
  159. if (!is_in_flash_area_bounds(fa, off, len)) {
  160. return -EINVAL;
  161. }
  162. dev = device_get_binding(fa->fa_dev_name);
  163. return flash_read(dev, fa->fa_off + off, dst, len);
  164. }
  165. int flash_area_write(const struct flash_area *fa, off_t off, const void *src,
  166. size_t len)
  167. {
  168. const struct device *flash_dev;
  169. int rc;
  170. if (!is_in_flash_area_bounds(fa, off, len)) {
  171. return -EINVAL;
  172. }
  173. flash_dev = device_get_binding(fa->fa_dev_name);
  174. rc = flash_write(flash_dev, fa->fa_off + off, (void *)src, len);
  175. return rc;
  176. }
  177. int flash_area_erase(const struct flash_area *fa, off_t off, size_t len)
  178. {
  179. const struct device *flash_dev;
  180. int rc;
  181. if (!is_in_flash_area_bounds(fa, off, len)) {
  182. return -EINVAL;
  183. }
  184. flash_dev = device_get_binding(fa->fa_dev_name);
  185. rc = flash_erase(flash_dev, fa->fa_off + off, len);
  186. return rc;
  187. }
  188. uint8_t flash_area_align(const struct flash_area *fa)
  189. {
  190. const struct device *dev;
  191. dev = device_get_binding(fa->fa_dev_name);
  192. return flash_get_write_block_size(dev);
  193. }
  194. int flash_area_has_driver(const struct flash_area *fa)
  195. {
  196. if (device_get_binding(fa->fa_dev_name) == NULL) {
  197. return -ENODEV;
  198. }
  199. return 1;
  200. }
  201. const struct device *flash_area_get_device(const struct flash_area *fa)
  202. {
  203. return device_get_binding(fa->fa_dev_name);
  204. }
  205. uint8_t flash_area_erased_val(const struct flash_area *fa)
  206. {
  207. const struct flash_parameters *param;
  208. param = flash_get_parameters(device_get_binding(fa->fa_dev_name));
  209. return param->erase_value;
  210. }
  211. #if defined(CONFIG_FLASH_AREA_CHECK_INTEGRITY)
  212. int flash_area_check_int_sha256(const struct flash_area *fa,
  213. const struct flash_area_check *fac)
  214. {
  215. unsigned char hash[TC_SHA256_DIGEST_SIZE];
  216. struct tc_sha256_state_struct sha;
  217. const struct device *dev;
  218. int to_read;
  219. int pos;
  220. int rc;
  221. if (fa == NULL || fac == NULL || fac->match == NULL ||
  222. fac->rbuf == NULL || fac->clen == 0 || fac->rblen == 0) {
  223. return -EINVAL;
  224. }
  225. if (!is_in_flash_area_bounds(fa, fac->off, fac->clen)) {
  226. return -EINVAL;
  227. }
  228. if (tc_sha256_init(&sha) != TC_CRYPTO_SUCCESS) {
  229. return -ESRCH;
  230. }
  231. dev = device_get_binding(fa->fa_dev_name);
  232. to_read = fac->rblen;
  233. for (pos = 0; pos < fac->clen; pos += to_read) {
  234. if (pos + to_read > fac->clen) {
  235. to_read = fac->clen - pos;
  236. }
  237. rc = flash_read(dev, (fa->fa_off + fac->off + pos),
  238. fac->rbuf, to_read);
  239. if (rc != 0) {
  240. return rc;
  241. }
  242. if (tc_sha256_update(&sha,
  243. fac->rbuf,
  244. to_read) != TC_CRYPTO_SUCCESS) {
  245. return -ESRCH;
  246. }
  247. }
  248. if (tc_sha256_final(hash, &sha) != TC_CRYPTO_SUCCESS) {
  249. return -ESRCH;
  250. }
  251. if (memcmp(hash, fac->match, TC_SHA256_DIGEST_SIZE)) {
  252. return -EILSEQ;
  253. }
  254. return 0;
  255. }
  256. #endif /* CONFIG_FLASH_AREA_CHECK_INTEGRITY */