blob: fc1da97b92a786fe72b2a953cf2be902389d95df [file] [log] [blame]
Andrew Duggan052556f2014-04-16 11:32:30 -07001/*
2 * Copyright (C) 2012 - 2014 Andrew Duggan
3 * Copyright (C) 2012 - 2014 Synaptics Inc
4 *
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 */
Andrew Duggan4e811252014-04-03 15:17:57 -070017
18#include <iostream>
19#include <fstream>
20#include <string.h>
21#include <stdint.h>
Andrew Dugganeda95782014-07-25 12:31:13 -070022#include <stdlib.h>
Andrew Duggan4e811252014-04-03 15:17:57 -070023
24#include "firmware_image.h"
25
26using namespace std;
27
28unsigned long FirmwareImage::Checksum(unsigned short * data, unsigned long len)
29{
30 unsigned long checksum = 0xFFFFFFFF;
31 unsigned long lsw = checksum & 0xFFFF;
32 unsigned long msw = checksum >> 16;
33
34 while (len--) {
35 lsw += *data++;
36 msw += lsw;
37 lsw = (lsw & 0xffff) + (lsw >> 16);
38 msw = (msw & 0xffff) + (msw >> 16);
39 }
40
41 checksum = msw << 16 | lsw;
42
43 return checksum;
44}
45
46int FirmwareImage::Initialize(const char * filename)
47{
Andrew Duggan4e811252014-04-03 15:17:57 -070048 if (!filename)
49 return UPDATE_FAIL_INVALID_PARAMETER;
50
51 ifstream ifsFile(filename, ios::in|ios::binary|ios::ate);
52 if (!ifsFile)
53 return UPDATE_FAIL_OPEN_FIRMWARE_IMAGE;
54
Andrew Dugganeda95782014-07-25 12:31:13 -070055 ifsFile.seekg(0, ios::end);
Andrew Duggan4e811252014-04-03 15:17:57 -070056 m_imageSize = (unsigned long)ifsFile.tellg();
57 m_memBlock = new unsigned char[m_imageSize];
58 ifsFile.seekg(0, ios::beg);
59 ifsFile.read((char*)m_memBlock, m_imageSize);
60
Andrew Duggan050db0e2014-07-29 12:42:49 -070061 if (m_imageSize < 0x100)
62 return UPDATE_FAIL_VERIFY_IMAGE;
Andrew Duggan4e811252014-04-03 15:17:57 -070063
Andrew Duggan4e811252014-04-03 15:17:57 -070064 m_checksum = extract_long(&m_memBlock[RMI_IMG_CHECKSUM_OFFSET]);
Andrew Duggan050db0e2014-07-29 12:42:49 -070065
66 unsigned long imageSizeMinusChecksum = m_imageSize - 4;
67 if ((imageSizeMinusChecksum % 2) != 0)
68 /*
69 * Since the header size is fixed and the firmware is
70 * in 16 byte blocks a valid image size should always be
71 * divisible by 2.
72 */
73 return UPDATE_FAIL_VERIFY_IMAGE;
74
75 unsigned long calculated_checksum = Checksum((uint16_t *)&(m_memBlock[4]),
Andrew Duggan28b86222014-09-16 16:45:23 -070076 imageSizeMinusChecksum >> 1);
Andrew Duggan050db0e2014-07-29 12:42:49 -070077
78 if (m_checksum != calculated_checksum) {
79 fprintf(stderr, "Firmware image checksum verification failed, saw 0x%08lX, calculated 0x%08lX\n",
80 m_checksum, calculated_checksum);
81 return UPDATE_FAIL_VERIFY_CHECKSUM;
82 }
83
Andrew Duggan4e811252014-04-03 15:17:57 -070084 m_io = m_memBlock[RMI_IMG_IO_OFFSET];
85 m_bootloaderVersion = m_memBlock[RMI_IMG_BOOTLOADER_VERSION_OFFSET];
86 m_firmwareSize = extract_long(&m_memBlock[RMI_IMG_IMAGE_SIZE_OFFSET]);
87 m_configSize = extract_long(&m_memBlock[RMI_IMG_CONFIG_SIZE_OFFSET]);
88 if (m_io == 1) {
89 m_firmwareBuildID = extract_long(&m_memBlock[RMI_IMG_FW_BUILD_ID_OFFSET]);
90 m_packageID = extract_long(&m_memBlock[RMI_IMG_PACKAGE_ID_OFFSET]);
91 }
92 memcpy(m_productID, &m_memBlock[RMI_IMG_PRODUCT_ID_OFFSET], RMI_PRODUCT_ID_LENGTH);
93 m_productID[RMI_PRODUCT_ID_LENGTH] = 0;
Andrew Duggand14ef282014-07-30 10:50:20 -070094 m_productInfo = extract_short(&m_memBlock[RMI_IMG_PRODUCT_INFO_OFFSET]);
Andrew Duggan4e811252014-04-03 15:17:57 -070095
96 m_firmwareData = &m_memBlock[RMI_IMG_FW_OFFSET];
97 m_configData = &m_memBlock[RMI_IMG_FW_OFFSET + m_firmwareSize];
98
99 switch (m_bootloaderVersion) {
100 case 2:
101 m_lockdownSize = RMI_IMG_LOCKDOWN_V2_SIZE;
102 m_lockdownData = &m_memBlock[RMI_IMG_LOCKDOWN_V2_OFFSET];
103 break;
104 case 3:
105 case 4:
106 m_lockdownSize = RMI_IMG_LOCKDOWN_V3_SIZE;
107 m_lockdownData = &m_memBlock[RMI_IMG_LOCKDOWN_V3_OFFSET];
108 break;
109 case 5:
Andrew Duggana90829b2014-05-23 12:34:31 -0700110 case 6:
Andrew Duggan4e811252014-04-03 15:17:57 -0700111 m_lockdownSize = RMI_IMG_LOCKDOWN_V5_SIZE;
112 m_lockdownData = &m_memBlock[RMI_IMG_LOCKDOWN_V5_OFFSET];
113 break;
Andrew Duggan4e811252014-04-03 15:17:57 -0700114 default:
115 return UPDATE_FAIL_UNSUPPORTED_IMAGE_VERSION;
116 }
117
Andrew Duggan050db0e2014-07-29 12:42:49 -0700118 fprintf(stdout, "Firmware Header:\n");
119 PrintHeaderInfo();
120
Andrew Duggan4e811252014-04-03 15:17:57 -0700121 return UPDATE_SUCCESS;
122}
123
124void FirmwareImage::PrintHeaderInfo()
125{
126 fprintf(stdout, "Checksum:\t\t0x%lx\n", m_checksum);
127 fprintf(stdout, "Firmware Size:\t\t%ld\n", m_firmwareSize);
128 fprintf(stdout, "Config Size:\t\t%ld\n", m_configSize);
129 fprintf(stdout, "Lockdown Size:\t\t%ld\n", m_lockdownSize);
130 fprintf(stdout, "Firmware Build ID:\t%ld\n", m_firmwareBuildID);
Andrew Duggand14ef282014-07-30 10:50:20 -0700131 fprintf(stdout, "Package ID:\t\t%d\n", m_packageID);
Andrew Duggan4e811252014-04-03 15:17:57 -0700132 fprintf(stdout, "Bootloader Version:\t%d\n", m_bootloaderVersion);
133 fprintf(stdout, "Product ID:\t\t%s\n", m_productID);
Andrew Duggand14ef282014-07-30 10:50:20 -0700134 fprintf(stdout, "Product Info:\t\t%d\n", m_productInfo);
Andrew Duggan4e811252014-04-03 15:17:57 -0700135 fprintf(stdout, "\n");
136}
137
Andrew Duggan28b86222014-09-16 16:45:23 -0700138int FirmwareImage::VerifyImageMatchesDevice(unsigned long deviceFirmwareSize,
139 unsigned long deviceConfigSize)
Andrew Duggan4e811252014-04-03 15:17:57 -0700140{
Andrew Duggan4e811252014-04-03 15:17:57 -0700141 if (m_firmwareSize != deviceFirmwareSize) {
142 fprintf(stderr, "Firmware image size verfication failed, size in image %ld did "
Andrew Duggan28b86222014-09-16 16:45:23 -0700143 "not match device size %ld\n", m_firmwareSize, deviceFirmwareSize);
Andrew Duggan4e811252014-04-03 15:17:57 -0700144 return UPDATE_FAIL_VERIFY_FIRMWARE_SIZE;
145 }
146
147 if (m_configSize != deviceConfigSize) {
148 fprintf(stderr, "Firmware image size verfication failed, size in image %ld did "
Andrew Duggan28b86222014-09-16 16:45:23 -0700149 "not match device size %ld\n", m_firmwareSize, deviceConfigSize);
Andrew Duggan4e811252014-04-03 15:17:57 -0700150 return UPDATE_FAIL_VERIFY_CONFIG_SIZE;
151 }
152
153 return UPDATE_SUCCESS;
154}
155
156FirmwareImage::~FirmwareImage()
157{
158 delete [] m_memBlock;
159 m_memBlock = NULL;
160}