blob: bdc1332790ebed99a0fa73585ad56cef8b2b1186 [file] [log] [blame]
Sampa Misra854e61f2019-08-22 04:36:47 -05001#include "config.h"
2
3#include "file_io_by_type.hpp"
4
George Liu6492f522020-06-16 10:34:05 +08005#include "libpldm/base.h"
6#include "oem/ibm/libpldm/file_io.h"
7
Deepak Kodihallid130e1a2020-06-17 05:55:32 -05008#include "common/utils.hpp"
Sampa Misrad823cc02020-03-24 04:53:20 -05009#include "file_io_type_cert.hpp"
Sampa Misra18967162020-01-14 02:31:41 -060010#include "file_io_type_dump.hpp"
Deepak Kodihallif6d3a832019-11-19 07:00:29 -060011#include "file_io_type_lid.hpp"
Sampa Misra854e61f2019-08-22 04:36:47 -050012#include "file_io_type_pel.hpp"
Sampa Misra854e61f2019-08-22 04:36:47 -050013#include "xyz/openbmc_project/Common/error.hpp"
14
15#include <stdint.h>
16#include <unistd.h>
17
George Liu6492f522020-06-16 10:34:05 +080018#include <xyz/openbmc_project/Logging/Entry/server.hpp>
19
Sampa Misra854e61f2019-08-22 04:36:47 -050020#include <exception>
21#include <filesystem>
Deepak Kodihalli75e02f82019-11-20 02:51:05 -060022#include <fstream>
Sampa Misraaa8ae722019-12-12 03:20:40 -060023#include <iostream>
Sampa Misra854e61f2019-08-22 04:36:47 -050024#include <vector>
Sampa Misra854e61f2019-08-22 04:36:47 -050025
26namespace pldm
27{
28namespace responder
29{
30
Sampa Misra854e61f2019-08-22 04:36:47 -050031using namespace sdbusplus::xyz::openbmc_project::Common::Error;
32
Deepak Kodihalli15211b42019-12-14 02:24:49 -060033int FileHandler::transferFileData(int32_t fd, bool upstream, uint32_t offset,
34 uint32_t& length, uint64_t address)
35{
36 dma::DMA xdmaInterface;
37 while (length > dma::maxSize)
38 {
39 auto rc = xdmaInterface.transferDataHost(fd, offset, dma::maxSize,
40 address, upstream);
41 if (rc < 0)
42 {
43 return PLDM_ERROR;
44 }
45 offset += dma::maxSize;
46 length -= dma::maxSize;
47 address += dma::maxSize;
48 }
49 auto rc =
50 xdmaInterface.transferDataHost(fd, offset, length, address, upstream);
51 return rc < 0 ? PLDM_ERROR : PLDM_SUCCESS;
52}
53
Ravi Tejace1c96f2020-10-05 23:13:01 -050054int FileHandler::transferFileDataToSocket(int32_t fd, uint32_t& length,
55 uint64_t address)
56{
57 dma::DMA xdmaInterface;
58 while (length > dma::maxSize)
59 {
60 auto rc =
61 xdmaInterface.transferHostDataToSocket(fd, dma::maxSize, address);
62 if (rc < 0)
63 {
64 return PLDM_ERROR;
65 }
66 length -= dma::maxSize;
67 address += dma::maxSize;
68 }
69 auto rc = xdmaInterface.transferHostDataToSocket(fd, length, address);
70 return rc < 0 ? PLDM_ERROR : PLDM_SUCCESS;
71}
72
Sampa Misra854e61f2019-08-22 04:36:47 -050073int FileHandler::transferFileData(const fs::path& path, bool upstream,
Deepak Kodihalli75e02f82019-11-20 02:51:05 -060074 uint32_t offset, uint32_t& length,
Sampa Misra854e61f2019-08-22 04:36:47 -050075 uint64_t address)
76{
Deepak Kodihalli15211b42019-12-14 02:24:49 -060077 bool fileExists = false;
Deepak Kodihallif6d3a832019-11-19 07:00:29 -060078 if (upstream)
79 {
Deepak Kodihalli15211b42019-12-14 02:24:49 -060080 fileExists = fs::exists(path);
81 if (!fileExists)
Deepak Kodihallif6d3a832019-11-19 07:00:29 -060082 {
Sampa Misraaa8ae722019-12-12 03:20:40 -060083 std::cerr << "File does not exist. PATH=" << path.c_str() << "\n";
Deepak Kodihallif6d3a832019-11-19 07:00:29 -060084 return PLDM_INVALID_FILE_HANDLE;
85 }
86
87 size_t fileSize = fs::file_size(path);
88 if (offset >= fileSize)
89 {
Sampa Misraaa8ae722019-12-12 03:20:40 -060090 std::cerr << "Offset exceeds file size, OFFSET=" << offset
91 << " FILE_SIZE=" << fileSize << "\n";
Deepak Kodihallif6d3a832019-11-19 07:00:29 -060092 return PLDM_DATA_OUT_OF_RANGE;
93 }
94 if (offset + length > fileSize)
95 {
96 length = fileSize - offset;
97 }
98 }
99
Deepak Kodihalli15211b42019-12-14 02:24:49 -0600100 int flags{};
101 if (upstream)
Sampa Misra854e61f2019-08-22 04:36:47 -0500102 {
Deepak Kodihalli15211b42019-12-14 02:24:49 -0600103 flags = O_RDONLY;
Sampa Misra854e61f2019-08-22 04:36:47 -0500104 }
Deepak Kodihalli15211b42019-12-14 02:24:49 -0600105 else if (fileExists)
106 {
107 flags = O_RDWR;
108 }
109 else
110 {
111 flags = O_WRONLY;
112 }
113 int file = open(path.string().c_str(), flags);
114 if (file == -1)
115 {
116 std::cerr << "File does not exist, PATH = " << path.string() << "\n";
117 ;
118 return PLDM_ERROR;
119 }
120 utils::CustomFD fd(file);
121
122 return transferFileData(fd(), upstream, offset, length, address);
Sampa Misra854e61f2019-08-22 04:36:47 -0500123}
124
125std::unique_ptr<FileHandler> getHandlerByType(uint16_t fileType,
126 uint32_t fileHandle)
127{
128 switch (fileType)
129 {
130 case PLDM_FILE_TYPE_PEL:
131 {
132 return std::make_unique<PelHandler>(fileHandle);
133 break;
134 }
Deepak Kodihallif6d3a832019-11-19 07:00:29 -0600135 case PLDM_FILE_TYPE_LID_PERM:
136 {
137 return std::make_unique<LidHandler>(fileHandle, true);
138 break;
139 }
140 case PLDM_FILE_TYPE_LID_TEMP:
141 {
142 return std::make_unique<LidHandler>(fileHandle, false);
143 break;
144 }
Sampa Misra3a0e3b92020-10-21 05:58:00 -0500145 case PLDM_FILE_TYPE_LID_MARKER:
146 {
147 return std::make_unique<LidHandler>(fileHandle, false,
148 PLDM_FILE_TYPE_LID_MARKER);
149 break;
150 }
Sampa Misra18967162020-01-14 02:31:41 -0600151 case PLDM_FILE_TYPE_DUMP:
152 {
153 return std::make_unique<DumpHandler>(fileHandle);
154 break;
155 }
Sampa Misrad823cc02020-03-24 04:53:20 -0500156 case PLDM_FILE_TYPE_CERT_SIGNING_REQUEST:
157 case PLDM_FILE_TYPE_SIGNED_CERT:
158 case PLDM_FILE_TYPE_ROOT_CERT:
159 {
160 return std::make_unique<CertHandler>(fileHandle, fileType);
161 break;
162 }
Sampa Misra854e61f2019-08-22 04:36:47 -0500163 default:
164 {
Sampa Misraaa8ae722019-12-12 03:20:40 -0600165 throw InternalFailure();
Sampa Misra854e61f2019-08-22 04:36:47 -0500166 break;
167 }
168 }
169 return nullptr;
170}
171
Deepak Kodihalli75e02f82019-11-20 02:51:05 -0600172int FileHandler::readFile(const std::string& filePath, uint32_t offset,
173 uint32_t& length, Response& response)
174{
175 if (!fs::exists(filePath))
176 {
Sampa Misraaa8ae722019-12-12 03:20:40 -0600177 std::cerr << "File does not exist, HANDLE=" << fileHandle
178 << " PATH=" << filePath.c_str() << "\n";
Deepak Kodihalli75e02f82019-11-20 02:51:05 -0600179 return PLDM_INVALID_FILE_HANDLE;
180 }
181
182 size_t fileSize = fs::file_size(filePath);
183 if (offset >= fileSize)
184 {
Sampa Misraaa8ae722019-12-12 03:20:40 -0600185 std::cerr << "Offset exceeds file size, OFFSET=" << offset
186 << " FILE_SIZE=" << fileSize << "\n";
Deepak Kodihalli75e02f82019-11-20 02:51:05 -0600187 return PLDM_DATA_OUT_OF_RANGE;
188 }
189
190 if (offset + length > fileSize)
191 {
192 length = fileSize - offset;
193 }
194
195 size_t currSize = response.size();
196 response.resize(currSize + length);
197 auto filePos = reinterpret_cast<char*>(response.data());
198 filePos += currSize;
199 std::ifstream stream(filePath, std::ios::in | std::ios::binary);
200 if (stream)
201 {
202 stream.seekg(offset);
203 stream.read(filePos, length);
204 return PLDM_SUCCESS;
205 }
Sampa Misraaa8ae722019-12-12 03:20:40 -0600206 std::cerr << "Unable to read file, FILE=" << filePath.c_str() << "\n";
Deepak Kodihalli75e02f82019-11-20 02:51:05 -0600207 return PLDM_ERROR;
208}
209
Sampa Misra854e61f2019-08-22 04:36:47 -0500210} // namespace responder
211} // namespace pldm