15a7763bfSjmcp /* 25a7763bfSjmcp * CDDL HEADER START 35a7763bfSjmcp * 45a7763bfSjmcp * The contents of this file are subject to the terms of the 55a7763bfSjmcp * Common Development and Distribution License (the "License"). 65a7763bfSjmcp * You may not use this file except in compliance with the License. 75a7763bfSjmcp * 85a7763bfSjmcp * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 95a7763bfSjmcp * or http://www.opensolaris.org/os/licensing. 105a7763bfSjmcp * See the License for the specific language governing permissions 115a7763bfSjmcp * and limitations under the License. 125a7763bfSjmcp * 135a7763bfSjmcp * When distributing Covered Code, include this CDDL HEADER in each 145a7763bfSjmcp * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 155a7763bfSjmcp * If applicable, add the following below this CDDL HEADER, with the 165a7763bfSjmcp * fields enclosed by brackets "[]" replaced with your own identifying 175a7763bfSjmcp * information: Portions Copyright [yyyy] [name of copyright owner] 185a7763bfSjmcp * 195a7763bfSjmcp * CDDL HEADER END 205a7763bfSjmcp */ 215a7763bfSjmcp /* 2287d06e46Speihong huang * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 235a7763bfSjmcp * Use is subject to license terms. 245a7763bfSjmcp */ 255a7763bfSjmcp 265a7763bfSjmcp /* 275a7763bfSjmcp * fwflash.c 285a7763bfSjmcp */ 295a7763bfSjmcp #include <stdio.h> 305a7763bfSjmcp #include <stdlib.h> 315a7763bfSjmcp #include <unistd.h> 325a7763bfSjmcp #include <strings.h> 335a7763bfSjmcp #include <errno.h> 345a7763bfSjmcp #include <sys/queue.h> 355a7763bfSjmcp #include <signal.h> 365a7763bfSjmcp #include <locale.h> 375a7763bfSjmcp #include <sys/stat.h> 385a7763bfSjmcp #include <sys/types.h> 395a7763bfSjmcp #include <sys/param.h> 405a7763bfSjmcp #include <fcntl.h> 415a7763bfSjmcp #include <dlfcn.h> 425a7763bfSjmcp #include <dirent.h> 435a7763bfSjmcp #include <sys/varargs.h> 445a7763bfSjmcp #include <libintl.h> /* for gettext(3c) */ 455a7763bfSjmcp #include <libdevinfo.h> 465a7763bfSjmcp #include <fwflash/fwflash.h> 47c4800545Sjmcp #include <sys/modctl.h> /* for MAXMODCONFNAME */ 485a7763bfSjmcp 495a7763bfSjmcp 505a7763bfSjmcp #if !defined(lint) 515a7763bfSjmcp /* embedded software license agreement */ 525a7763bfSjmcp static char *sla [] = { "Copyright 2007 Sun Microsystems, Inc., 4150 Network " 535a7763bfSjmcp "Circle, Santa Clara, California 95054, U.S.A. All rights reserved. U.S. " 545a7763bfSjmcp "Government Rights - Commercial software. Government users are subject to the " 555a7763bfSjmcp "Sun Microsystems, Inc. standard license agreement and applicable provisions " 565a7763bfSjmcp "of the FAR and its supplements. Use is subject to license terms. Parts of " 575a7763bfSjmcp "the product may be derived from Berkeley BSD systems, licensed from the " 585a7763bfSjmcp "University of California. UNIX is a registered trademark in the U.S. and in " 595a7763bfSjmcp "other countries, exclusively licensed through X/Open Company, Ltd.Sun, Sun " 605a7763bfSjmcp "Microsystems, the Sun logo and Solaris are trademarks or registered " 615a7763bfSjmcp "trademarks of Sun Microsystems, Inc. in the U.S. and other countries. This " 625a7763bfSjmcp "product is covered and controlled by U.S. Export Control laws and may be " 635a7763bfSjmcp "subject to the export or import laws in other countries. Nuclear, missile, " 645a7763bfSjmcp "chemical biological weapons or nuclear maritime end uses or end users, " 655a7763bfSjmcp "whether direct or indirect, are strictly prohibited. Export or reexport " 665a7763bfSjmcp "to countries subject to U.S. embargo or to entities identified on U.S. export " 675a7763bfSjmcp "exclusion lists, including, but not limited to, the denied persons and " 685a7763bfSjmcp "specially designated nationals lists is strictly prohibited." }; 695a7763bfSjmcp #endif /* lint */ 705a7763bfSjmcp 715a7763bfSjmcp /* global arg list */ 725a7763bfSjmcp int fwflash_arg_list = 0; 735a7763bfSjmcp char *filelist[10]; 745a7763bfSjmcp 755a7763bfSjmcp /* are we writing to flash? */ 765a7763bfSjmcp static int fwflash_in_write = 0; 775a7763bfSjmcp 785a7763bfSjmcp /* 795a7763bfSjmcp * If we *must* track the version string for fwflash, then 805a7763bfSjmcp * we should do so in this common file rather than the header 815a7763bfSjmcp * file since it will then be in sync with what the customer 82f1c23465SJames C. McPherson * sees. We should deprecate the "-v" option since it is not 83f1c23465SJames C. McPherson * actually of any use - it doesn't line up with Mercurial's 84f1c23465SJames C. McPherson * concept of the changeset. 855a7763bfSjmcp */ 86*d65b419eSXinChen #define FWFLASH_VERSION "v1.8" 875a7763bfSjmcp #define FWFLASH_PROG_NAME "fwflash" 885a7763bfSjmcp 895a7763bfSjmcp static int get_fileopts(char *options); 905a7763bfSjmcp static int flash_device_list(); 915a7763bfSjmcp static int flash_load_plugins(); 925a7763bfSjmcp static int fwflash_update(char *device, char *filename, int flags); 935a7763bfSjmcp static int fwflash_read_file(char *device, char *filename); 945a7763bfSjmcp static int fwflash_list_fw(char *class); 955a7763bfSjmcp static int fwflash_load_verifier(char *drv, char *vendorid, char *fwimg); 965a7763bfSjmcp static void fwflash_intr(int sig); 975a7763bfSjmcp static void fwflash_handle_signals(void); 98f1c23465SJames C. McPherson static void fwflash_usage(char *arg); 995a7763bfSjmcp static void fwflash_version(void); 1005a7763bfSjmcp static int confirm_target(struct devicelist *thisdev, char *file); 1015a7763bfSjmcp 1025a7763bfSjmcp /* 1035a7763bfSjmcp * FWFlash main code 1045a7763bfSjmcp */ 1055a7763bfSjmcp int 106f8bf33c3SShantkumar Hiremath main(int argc, char **argv) 107f8bf33c3SShantkumar Hiremath { 1085a7763bfSjmcp int rv = FWFLASH_SUCCESS; 1095a7763bfSjmcp int i; 1105a7763bfSjmcp char ch; 1115a7763bfSjmcp char *read_file; 1125a7763bfSjmcp extern char *optarg; 1135a7763bfSjmcp char *devclass = NULL; 1145a7763bfSjmcp char *devpath = NULL; 1155a7763bfSjmcp 1165a7763bfSjmcp /* local variables from env */ 1175a7763bfSjmcp (void) setlocale(LC_ALL, ""); 1185a7763bfSjmcp 1195a7763bfSjmcp #if !defined(TEXT_DOMAIN) /* Should be defined by cc -D */ 1205a7763bfSjmcp #define TEXT_DOMAIN "SYS_TEST" /* Use this only if it isn't. */ 1215a7763bfSjmcp #endif 1225a7763bfSjmcp 1235a7763bfSjmcp (void) textdomain(TEXT_DOMAIN); 1245a7763bfSjmcp 1255a7763bfSjmcp read_file = NULL; 1265a7763bfSjmcp 1275a7763bfSjmcp if (argc < 2) { 1285a7763bfSjmcp /* no args supplied */ 1295a7763bfSjmcp fwflash_usage(NULL); 1305a7763bfSjmcp return (FWFLASH_FAILURE); 1315a7763bfSjmcp } 1325a7763bfSjmcp 13387d06e46Speihong huang while ((ch = getopt(argc, argv, "hvylc:f:r:Qd:")) != EOF) { 1345a7763bfSjmcp switch (ch) { 1355a7763bfSjmcp case 'h': 1365a7763bfSjmcp fwflash_arg_list |= FWFLASH_HELP_FLAG; 1375a7763bfSjmcp break; 1385a7763bfSjmcp case 'v': 1395a7763bfSjmcp fwflash_arg_list |= FWFLASH_VER_FLAG; 1405a7763bfSjmcp break; 1415a7763bfSjmcp case 'y': 1425a7763bfSjmcp fwflash_arg_list |= FWFLASH_YES_FLAG; 1435a7763bfSjmcp break; 1445a7763bfSjmcp case 'l': 1455a7763bfSjmcp fwflash_arg_list |= FWFLASH_LIST_FLAG; 1465a7763bfSjmcp break; 1475a7763bfSjmcp case 'c': 1485a7763bfSjmcp fwflash_arg_list |= FWFLASH_CLASS_FLAG; 1495a7763bfSjmcp /* we validate later */ 1505a7763bfSjmcp devclass = strdup(optarg); 1515a7763bfSjmcp break; 1525a7763bfSjmcp case 'd': 1535a7763bfSjmcp fwflash_arg_list |= FWFLASH_DEVICE_FLAG; 1545a7763bfSjmcp devpath = strdup(optarg); 1555a7763bfSjmcp break; 1565a7763bfSjmcp case 'f': 1575a7763bfSjmcp fwflash_arg_list |= FWFLASH_FW_FLAG; 1585a7763bfSjmcp if ((rv = get_fileopts(optarg)) != FWFLASH_SUCCESS) { 159f1c23465SJames C. McPherson fwflash_usage(NULL); 1605a7763bfSjmcp return (FWFLASH_FAILURE); 1615a7763bfSjmcp } 1625a7763bfSjmcp break; 1635a7763bfSjmcp case 'r': 1645a7763bfSjmcp fwflash_arg_list |= FWFLASH_READ_FLAG; 1655a7763bfSjmcp read_file = strdup(optarg); 1665a7763bfSjmcp break; 1675a7763bfSjmcp case 'Q': 1685a7763bfSjmcp /* NOT in the manpage */ 1695a7763bfSjmcp fwflash_debug = 1; 1705a7763bfSjmcp break; 1715a7763bfSjmcp /* illegal options */ 1725a7763bfSjmcp default: 1735a7763bfSjmcp fwflash_usage(optarg); 1745a7763bfSjmcp return (FWFLASH_FAILURE); 1755a7763bfSjmcp } 1765a7763bfSjmcp } 1775a7763bfSjmcp 1785a7763bfSjmcp /* Do Help */ 1795a7763bfSjmcp if ((fwflash_arg_list & FWFLASH_HELP_FLAG) || 1805a7763bfSjmcp ((fwflash_arg_list & FWFLASH_DEVICE_FLAG) && 1815a7763bfSjmcp !((fwflash_arg_list & FWFLASH_FW_FLAG) || 1825a7763bfSjmcp (fwflash_arg_list & FWFLASH_READ_FLAG)))) { 183f1c23465SJames C. McPherson fwflash_usage(NULL); 1845a7763bfSjmcp return (FWFLASH_SUCCESS); 1855a7763bfSjmcp } 1865a7763bfSjmcp 1875a7763bfSjmcp /* Do Version */ 1885a7763bfSjmcp if (fwflash_arg_list == FWFLASH_VER_FLAG) { 1895a7763bfSjmcp fwflash_version(); 1905a7763bfSjmcp return (FWFLASH_SUCCESS); 1915a7763bfSjmcp } 1925a7763bfSjmcp 1935a7763bfSjmcp /* generate global list of devices */ 1945a7763bfSjmcp if ((rv = flash_load_plugins()) != FWFLASH_SUCCESS) { 1955a7763bfSjmcp logmsg(MSG_ERROR, 1965a7763bfSjmcp gettext("Unable to load fwflash plugins\n")); 1975a7763bfSjmcp fwflash_intr(0); 1985a7763bfSjmcp return (rv); 1995a7763bfSjmcp } 2005a7763bfSjmcp 2015a7763bfSjmcp if ((rv = flash_device_list()) != FWFLASH_SUCCESS) { 2025a7763bfSjmcp logmsg(MSG_ERROR, 2035a7763bfSjmcp gettext("No flashable devices in this system\n")); 2045a7763bfSjmcp fwflash_intr(0); 2055a7763bfSjmcp return (rv); 2065a7763bfSjmcp } 2075a7763bfSjmcp 2085a7763bfSjmcp /* Do list */ 2095a7763bfSjmcp if (fwflash_arg_list == (FWFLASH_LIST_FLAG) || 2105a7763bfSjmcp fwflash_arg_list == (FWFLASH_LIST_FLAG | FWFLASH_CLASS_FLAG)) { 2115a7763bfSjmcp rv = fwflash_list_fw(devclass); 2125a7763bfSjmcp fwflash_intr(0); 2135a7763bfSjmcp return (rv); 2145a7763bfSjmcp } 2155a7763bfSjmcp 2165a7763bfSjmcp fwflash_handle_signals(); 2175a7763bfSjmcp 2185a7763bfSjmcp /* Do flash update (write) */ 2195a7763bfSjmcp if ((fwflash_arg_list == (FWFLASH_FW_FLAG | FWFLASH_DEVICE_FLAG)) || 2205a7763bfSjmcp (fwflash_arg_list == (FWFLASH_FW_FLAG | FWFLASH_DEVICE_FLAG | 2215a7763bfSjmcp FWFLASH_YES_FLAG))) { 2225a7763bfSjmcp /* the update function handles the real arg parsing */ 2235a7763bfSjmcp i = 0; 2245a7763bfSjmcp while (filelist[i] != NULL) { 2255a7763bfSjmcp if ((rv = fwflash_update(devpath, filelist[i], 2265a7763bfSjmcp fwflash_arg_list)) == FWFLASH_SUCCESS) { 2275a7763bfSjmcp /* failed ops have already been noted */ 2285a7763bfSjmcp logmsg(MSG_ERROR, 2295a7763bfSjmcp gettext("New firmware will be activated " 2305a7763bfSjmcp "after you reboot\n\n")); 2315a7763bfSjmcp } 2325a7763bfSjmcp ++i; 2335a7763bfSjmcp } 2345a7763bfSjmcp 2355a7763bfSjmcp fwflash_intr(0); 2365a7763bfSjmcp return (rv); 2375a7763bfSjmcp } 2385a7763bfSjmcp 2395a7763bfSjmcp /* Do flash read */ 2405a7763bfSjmcp if ((fwflash_arg_list == (FWFLASH_READ_FLAG | FWFLASH_DEVICE_FLAG)) || 2415a7763bfSjmcp (fwflash_arg_list == (FWFLASH_READ_FLAG | FWFLASH_DEVICE_FLAG | 2425a7763bfSjmcp FWFLASH_YES_FLAG))) { 2435a7763bfSjmcp rv = fwflash_read_file(devpath, read_file); 2445a7763bfSjmcp fwflash_intr(0); 2455a7763bfSjmcp return (rv); 2465a7763bfSjmcp } 2475a7763bfSjmcp 2485a7763bfSjmcp fwflash_usage(NULL); 2495a7763bfSjmcp 2505a7763bfSjmcp return (FWFLASH_FAILURE); 2515a7763bfSjmcp } 2525a7763bfSjmcp 2535a7763bfSjmcp 2545a7763bfSjmcp static int 255f8bf33c3SShantkumar Hiremath flash_load_plugins() 256f8bf33c3SShantkumar Hiremath { 2575a7763bfSjmcp 2585a7763bfSjmcp int rval = FWFLASH_SUCCESS; 2595a7763bfSjmcp DIR *dirp; 2605a7763bfSjmcp struct dirent *plugdir; 2615a7763bfSjmcp char *plugname; 2625a7763bfSjmcp struct fw_plugin *tmpplug; 2635a7763bfSjmcp struct pluginlist *tmpelem; 2645a7763bfSjmcp void *sym; 2655a7763bfSjmcp char *fwplugdirpath, *tempdirpath; 2665a7763bfSjmcp 2675a7763bfSjmcp 2685a7763bfSjmcp #define CLOSEFREE() { \ 2695a7763bfSjmcp (void) dlclose(tmpplug->handle); \ 2705a7763bfSjmcp free(tmpplug); } 2715a7763bfSjmcp 2725a7763bfSjmcp /* 2735a7763bfSjmcp * Procedure: 2745a7763bfSjmcp * 2755a7763bfSjmcp * cd /usr/lib/fwflash/identify 2765a7763bfSjmcp * open each .so file found therein 2775a7763bfSjmcp * dlopen(.sofile) 2785a7763bfSjmcp * if it's one of our plugins, add it to fw_pluginlist; 2795a7763bfSjmcp * 2805a7763bfSjmcp * functions we need here include dlopen and dlsym. 2815a7763bfSjmcp * 2825a7763bfSjmcp * If we get to the end and fw_pluginlist struct is empty, 2835a7763bfSjmcp * return FWFLASH_FAILURE so we return to the shell. 2845a7763bfSjmcp */ 2855a7763bfSjmcp 2865a7763bfSjmcp if ((fwplugdirpath = calloc(1, MAXPATHLEN + 1)) == NULL) { 2875a7763bfSjmcp logmsg(MSG_ERROR, 2885a7763bfSjmcp gettext("Unable to malloc %d bytes while " 2895a7763bfSjmcp "trying to load plugins: %s\n"), 2905a7763bfSjmcp MAXPATHLEN + 1, strerror(errno)); 2915a7763bfSjmcp return (FWFLASH_FAILURE); 2925a7763bfSjmcp } 2935a7763bfSjmcp 2945a7763bfSjmcp tempdirpath = getenv("FWPLUGINDIR"); 2955a7763bfSjmcp 2965a7763bfSjmcp if ((fwflash_debug > 0) && (tempdirpath != NULL)) { 2975a7763bfSjmcp (void) strlcpy(fwplugdirpath, tempdirpath, 2985a7763bfSjmcp strlen(tempdirpath) + 1); 2995a7763bfSjmcp } else { 3005a7763bfSjmcp (void) strlcpy(fwplugdirpath, FWPLUGINDIR, 3015a7763bfSjmcp strlen(FWPLUGINDIR) + 1); 3025a7763bfSjmcp } 3035a7763bfSjmcp 3045a7763bfSjmcp if ((dirp = opendir(fwplugdirpath)) == NULL) { 3055a7763bfSjmcp logmsg(MSG_ERROR, 306c4800545Sjmcp gettext("Unable to open %s\n"), 3075a7763bfSjmcp fwplugdirpath); 3085a7763bfSjmcp return (errno); 3095a7763bfSjmcp } 3105a7763bfSjmcp 3115a7763bfSjmcp if ((plugdir = calloc(1, sizeof (struct dirent) + MAXPATHLEN + 1)) 3125a7763bfSjmcp == NULL) { 3135a7763bfSjmcp logmsg(MSG_ERROR, 3145a7763bfSjmcp gettext("Unable to malloc %d bytes while " 3155a7763bfSjmcp "trying to load plugins: %s\n"), 3165a7763bfSjmcp MAXPATHLEN + 1 + sizeof (struct dirent), 3175a7763bfSjmcp strerror(errno)); 3185a7763bfSjmcp return (FWFLASH_FAILURE); 3195a7763bfSjmcp } 3205a7763bfSjmcp 3215a7763bfSjmcp if ((fw_pluginlist = calloc(1, sizeof (struct fw_plugin))) 3225a7763bfSjmcp == NULL) { 3235a7763bfSjmcp logmsg(MSG_ERROR, 3245a7763bfSjmcp gettext("Unable to malloc %d bytes while " 3255a7763bfSjmcp "trying to load plugins: %s\n"), 326*d65b419eSXinChen sizeof (struct fw_plugin), strerror(errno)); 3275a7763bfSjmcp return (FWFLASH_FAILURE); 3285a7763bfSjmcp } 3295a7763bfSjmcp 3305a7763bfSjmcp TAILQ_INIT(fw_pluginlist); 3315a7763bfSjmcp 3325a7763bfSjmcp while ((readdir_r(dirp, plugdir, &plugdir) == 0) && (plugdir != NULL)) { 3335a7763bfSjmcp 3345a7763bfSjmcp errno = 0; /* remove chance of false results */ 3355a7763bfSjmcp 3365a7763bfSjmcp if ((plugdir->d_name[0] == '.') || 3375a7763bfSjmcp (strstr(plugdir->d_name, ".so") == NULL)) { 3385a7763bfSjmcp continue; 3395a7763bfSjmcp } 3405a7763bfSjmcp 3415a7763bfSjmcp if ((plugname = calloc(1, MAXPATHLEN + 1)) == NULL) { 3425a7763bfSjmcp logmsg(MSG_ERROR, 3435a7763bfSjmcp gettext("Unable to malloc %d bytes while " 3445a7763bfSjmcp "trying to load plugins: %s\n"), 3455a7763bfSjmcp MAXPATHLEN + 1, strerror(errno)); 3465a7763bfSjmcp return (FWFLASH_FAILURE); 3475a7763bfSjmcp } 3485a7763bfSjmcp 3495a7763bfSjmcp (void) snprintf(plugname, MAXPATHLEN, "%s/%s", 3505a7763bfSjmcp fwplugdirpath, plugdir->d_name); 3515a7763bfSjmcp 3525a7763bfSjmcp /* start allocating storage */ 3535a7763bfSjmcp if ((tmpelem = calloc(1, sizeof (struct pluginlist))) 3545a7763bfSjmcp == NULL) { 3555a7763bfSjmcp logmsg(MSG_ERROR, 3565a7763bfSjmcp gettext("Unable to malloc %d bytes while " 3575a7763bfSjmcp "trying to load plugins: %s\n"), 3585a7763bfSjmcp sizeof (struct pluginlist), strerror(errno)); 3595a7763bfSjmcp return (FWFLASH_FAILURE); 3605a7763bfSjmcp } 3615a7763bfSjmcp 3625a7763bfSjmcp if ((tmpplug = calloc(1, sizeof (struct fw_plugin))) 3635a7763bfSjmcp == NULL) { 3645a7763bfSjmcp logmsg(MSG_ERROR, 3655a7763bfSjmcp gettext("Unable to malloc %d bytes while " 3665a7763bfSjmcp "trying to load plugins: %s\n"), 3675a7763bfSjmcp sizeof (struct fw_plugin), strerror(errno)); 3685a7763bfSjmcp return (FWFLASH_FAILURE); 3695a7763bfSjmcp } 3705a7763bfSjmcp 3715a7763bfSjmcp /* load 'er up! */ 3725a7763bfSjmcp tmpplug->handle = dlopen(plugname, RTLD_NOW); 3735a7763bfSjmcp if (tmpplug->handle == NULL) { 3745a7763bfSjmcp free(tmpplug); 3755a7763bfSjmcp continue; /* assume there are other plugins */ 3765a7763bfSjmcp } 3775a7763bfSjmcp 3785a7763bfSjmcp if ((tmpplug->filename = calloc(1, strlen(plugname) + 1)) 3795a7763bfSjmcp == NULL) { 3805a7763bfSjmcp logmsg(MSG_ERROR, 3815a7763bfSjmcp gettext("Unable to allocate %d bytes for plugin " 3825a7763bfSjmcp "filename %s:%s\n"), 3835a7763bfSjmcp strlen(plugname) + 1, plugname, 3845a7763bfSjmcp strerror(errno)); 3855a7763bfSjmcp return (rval); 3865a7763bfSjmcp } 3875a7763bfSjmcp 3885a7763bfSjmcp (void) strlcpy(tmpplug->filename, plugname, 3895a7763bfSjmcp strlen(plugname) + 1); 3905a7763bfSjmcp 3915a7763bfSjmcp /* now sanity check the file */ 3925a7763bfSjmcp if ((sym = dlsym(tmpplug->handle, "drivername")) 3935a7763bfSjmcp != NULL) { 3945a7763bfSjmcp /* max length of drivername */ 395c4800545Sjmcp tmpplug->drvname = calloc(1, MAXMODCONFNAME); 396c4800545Sjmcp 397c4800545Sjmcp /* are we doing double-time? */ 398c4800545Sjmcp if (strncmp((char *)sym, plugdir->d_name, 399c4800545Sjmcp MAXMODCONFNAME) != 0) { 400c4800545Sjmcp char *tempnm = calloc(1, MAXMODCONFNAME); 401c4800545Sjmcp 402*d65b419eSXinChen (void) memcpy(tempnm, plugdir->d_name, 403*d65b419eSXinChen MAXMODCONFNAME); 404c4800545Sjmcp (void) strlcpy(tmpplug->drvname, 405c4800545Sjmcp strtok(tempnm, "."), 406c4800545Sjmcp strlen(plugdir->d_name) + 1); 407c4800545Sjmcp free(tempnm); 408c4800545Sjmcp } else { 409c4800545Sjmcp (void) strlcpy(tmpplug->drvname, 410c4800545Sjmcp (char *)sym, strlen(sym) + 1); 411c4800545Sjmcp } 4125a7763bfSjmcp } else { 4135a7763bfSjmcp CLOSEFREE(); 4145a7763bfSjmcp continue; 4155a7763bfSjmcp } 4165a7763bfSjmcp if ((sym = dlsym(tmpplug->handle, "fw_readfw")) 4175a7763bfSjmcp != NULL) { 4185a7763bfSjmcp tmpplug->fw_readfw = (int (*)())sym; 4195a7763bfSjmcp } else { 4205a7763bfSjmcp CLOSEFREE(); 4215a7763bfSjmcp continue; 4225a7763bfSjmcp } 4235a7763bfSjmcp if ((sym = dlsym(tmpplug->handle, "fw_writefw")) 4245a7763bfSjmcp != NULL) { 4255a7763bfSjmcp tmpplug->fw_writefw = (int (*)())sym; 4265a7763bfSjmcp } else { 4275a7763bfSjmcp CLOSEFREE(); 4285a7763bfSjmcp continue; 4295a7763bfSjmcp } 4305a7763bfSjmcp 4315a7763bfSjmcp if ((sym = dlsym(tmpplug->handle, "fw_identify")) 4325a7763bfSjmcp != NULL) { 4335a7763bfSjmcp tmpplug->fw_identify = 4345a7763bfSjmcp (int (*)(int))sym; 4355a7763bfSjmcp } else { 4365a7763bfSjmcp CLOSEFREE(); 4375a7763bfSjmcp continue; 4385a7763bfSjmcp } 4395a7763bfSjmcp if ((sym = dlsym(tmpplug->handle, "fw_devinfo")) 4405a7763bfSjmcp != NULL) { 4415a7763bfSjmcp tmpplug->fw_devinfo = 4425a7763bfSjmcp (int (*)(struct devicelist *))sym; 4435a7763bfSjmcp } else { 4445a7763bfSjmcp CLOSEFREE(); 4455a7763bfSjmcp continue; 4465a7763bfSjmcp } 4475a7763bfSjmcp 448*d65b419eSXinChen if ((sym = dlsym(tmpplug->handle, "plugin_version")) 449*d65b419eSXinChen != NULL) { 450*d65b419eSXinChen if ((*(int *)sym) >= FWPLUGIN_VERSION_2) { 451*d65b419eSXinChen if ((sym = dlsym(tmpplug->handle, 452*d65b419eSXinChen "fw_cleanup")) != NULL) { 453*d65b419eSXinChen tmpplug->fw_cleanup = 454*d65b419eSXinChen (void (*)(struct devicelist *))sym; 455*d65b419eSXinChen } else { 456*d65b419eSXinChen logmsg(MSG_ERROR, 457*d65b419eSXinChen gettext("ERROR: v2 plugin (%s) " 458*d65b419eSXinChen "has no fw_cleanup function\n"), 459*d65b419eSXinChen tmpplug->filename); 460*d65b419eSXinChen CLOSEFREE(); 461*d65b419eSXinChen continue; 462*d65b419eSXinChen } 463*d65b419eSXinChen } else { 464*d65b419eSXinChen logmsg(MSG_INFO, 465*d65b419eSXinChen "Identification plugin %s defined " 466*d65b419eSXinChen "plugin_version < FWPLUGIN_VERSION_2 !"); 467*d65b419eSXinChen } 468*d65b419eSXinChen } 469*d65b419eSXinChen 470c4800545Sjmcp if ((tmpelem->drvname = calloc(1, MAXMODCONFNAME)) 4715a7763bfSjmcp == NULL) { 4725a7763bfSjmcp logmsg(MSG_ERROR, 473c4800545Sjmcp gettext("Unable to allocate space for a" 4745a7763bfSjmcp "drivername %s\n"), 4755a7763bfSjmcp tmpplug->drvname); 4765a7763bfSjmcp return (FWFLASH_FAILURE); 4775a7763bfSjmcp } 4785a7763bfSjmcp 4795a7763bfSjmcp (void) strlcpy(tmpelem->drvname, tmpplug->drvname, 4805a7763bfSjmcp strlen(tmpplug->drvname) + 1); 4815a7763bfSjmcp 4825a7763bfSjmcp if ((tmpelem->filename = calloc(1, 4835a7763bfSjmcp strlen(tmpplug->filename) + 1)) == NULL) { 4845a7763bfSjmcp logmsg(MSG_ERROR, 4855a7763bfSjmcp gettext("Unable to allocate %d bytes for " 4865a7763bfSjmcp "filename %s\n"), 4875a7763bfSjmcp strlen(tmpplug->filename) + 1, 488c4800545Sjmcp tmpplug->filename); 4895a7763bfSjmcp return (FWFLASH_FAILURE); 4905a7763bfSjmcp } 4915a7763bfSjmcp 4925a7763bfSjmcp (void) strlcpy(tmpelem->filename, plugname, 4935a7763bfSjmcp strlen(plugname) + 1); 4945a7763bfSjmcp tmpelem->plugin = tmpplug; 4955a7763bfSjmcp 4965a7763bfSjmcp /* CONSTCOND */ 4975a7763bfSjmcp TAILQ_INSERT_TAIL(fw_pluginlist, tmpelem, nextplugin); 4985a7763bfSjmcp } 4995a7763bfSjmcp 5005a7763bfSjmcp if ((plugdir == NULL) && TAILQ_EMPTY(fw_pluginlist)) { 5015a7763bfSjmcp return (FWFLASH_FAILURE); 5025a7763bfSjmcp } 5035a7763bfSjmcp 5045a7763bfSjmcp if (errno != 0) { 5055a7763bfSjmcp logmsg(MSG_ERROR, 5065a7763bfSjmcp gettext("Error reading directory entry in %s\n"), 5075a7763bfSjmcp fwplugdirpath); 5085a7763bfSjmcp rval = errno; 5095a7763bfSjmcp } 5105a7763bfSjmcp 511*d65b419eSXinChen free(fwplugdirpath); 512*d65b419eSXinChen free(plugdir); 5135a7763bfSjmcp (void) closedir(dirp); 5145a7763bfSjmcp return (rval); 5155a7763bfSjmcp } 5165a7763bfSjmcp 5175a7763bfSjmcp /* 5185a7763bfSjmcp * fwflash_load_verifier dlload()s the appropriate firmware image 5195a7763bfSjmcp * verification plugin, and attaches the designated fwimg's fd to 5205a7763bfSjmcp * the vrfyplugin structure so we only have to load the image in 5215a7763bfSjmcp * one place. 5225a7763bfSjmcp */ 5235a7763bfSjmcp int 524f8bf33c3SShantkumar Hiremath fwflash_load_verifier(char *drv, char *vendorid, char *fwimg) 525f8bf33c3SShantkumar Hiremath { 5265a7763bfSjmcp 5275a7763bfSjmcp int rv = FWFLASH_FAILURE; 5285a7763bfSjmcp int imgfd; 5295a7763bfSjmcp char *fwvrfydirpath, *tempdirpath, *filename; 5305a7763bfSjmcp char *clean; /* for the space-removed vid */ 5315a7763bfSjmcp struct stat fwstat; 5325a7763bfSjmcp struct vrfyplugin *vrfy; 5335a7763bfSjmcp void *vrfysym; 5345a7763bfSjmcp 5355a7763bfSjmcp /* 5365a7763bfSjmcp * To make flashing multiple firmware images somewhat more 5375a7763bfSjmcp * efficient, we start this function by checking whether a 5385a7763bfSjmcp * verifier for this device has already been loaded. If it 5395a7763bfSjmcp * has been loaded, we replace the imgfile information, and 5405a7763bfSjmcp * then continue as if we were loading for the first time. 5415a7763bfSjmcp */ 5425a7763bfSjmcp 5435a7763bfSjmcp if (verifier != NULL) { 5445a7763bfSjmcp verifier->imgsize = 0; 5455a7763bfSjmcp verifier->flashbuf = 0; /* set by the verifier function */ 5465a7763bfSjmcp 547*d65b419eSXinChen if (verifier->imgfile != NULL) { 548*d65b419eSXinChen free(verifier->imgfile); 549*d65b419eSXinChen verifier->imgfile = NULL; 550*d65b419eSXinChen } 5515a7763bfSjmcp 552*d65b419eSXinChen if (verifier->fwimage != NULL) { 553*d65b419eSXinChen free(verifier->fwimage); 554*d65b419eSXinChen verifier->fwimage = NULL; 555*d65b419eSXinChen } 5565a7763bfSjmcp } else { 5575a7763bfSjmcp if ((fwvrfydirpath = calloc(1, MAXPATHLEN + 1)) == NULL) { 5585a7763bfSjmcp logmsg(MSG_ERROR, 5595a7763bfSjmcp gettext("Unable to allocate space for a firmware " 5605a7763bfSjmcp "verifier file(1)")); 5615a7763bfSjmcp return (rv); 5625a7763bfSjmcp } 5635a7763bfSjmcp 5645a7763bfSjmcp if ((filename = calloc(1, MAXPATHLEN + 1)) == NULL) { 5655a7763bfSjmcp logmsg(MSG_ERROR, 5665a7763bfSjmcp gettext("Unable to allocate space " 5675a7763bfSjmcp "for a firmware verifier file(2)")); 568*d65b419eSXinChen free(fwvrfydirpath); 5695a7763bfSjmcp return (rv); 5705a7763bfSjmcp } 5715a7763bfSjmcp 5725a7763bfSjmcp /* 573*d65b419eSXinChen * Since SCSI devices can have a vendor id of up to 8 574*d65b419eSXinChen * left-aligned and _space-padded_ characters, we first need to 575*d65b419eSXinChen * strip off any space characters before we try to make a 576*d65b419eSXinChen * filename out of it 5775a7763bfSjmcp */ 5785a7763bfSjmcp clean = strtok(vendorid, " "); 5795a7763bfSjmcp if (clean == NULL) { 5805a7763bfSjmcp /* invalid vendorid, something's really wrong */ 5815a7763bfSjmcp logmsg(MSG_ERROR, 5825a7763bfSjmcp gettext("Invalid vendorid (null) specified for " 5835a7763bfSjmcp "device\n")); 584*d65b419eSXinChen free(filename); 585*d65b419eSXinChen free(fwvrfydirpath); 5865a7763bfSjmcp return (rv); 5875a7763bfSjmcp } 5885a7763bfSjmcp 5895a7763bfSjmcp tempdirpath = getenv("FWVERIFYPLUGINDIR"); 5905a7763bfSjmcp 5915a7763bfSjmcp if ((fwflash_debug > 0) && (tempdirpath != NULL)) { 5925a7763bfSjmcp (void) strlcpy(fwvrfydirpath, tempdirpath, 5935a7763bfSjmcp strlen(tempdirpath) + 1); 5945a7763bfSjmcp } else { 5955a7763bfSjmcp (void) strlcpy(fwvrfydirpath, FWVERIFYPLUGINDIR, 5965a7763bfSjmcp strlen(FWVERIFYPLUGINDIR) + 1); 5975a7763bfSjmcp } 5985a7763bfSjmcp 5995a7763bfSjmcp if ((vrfy = calloc(1, sizeof (struct vrfyplugin))) == NULL) { 6005a7763bfSjmcp logmsg(MSG_ERROR, 6015a7763bfSjmcp gettext("Unable to allocate space " 6025a7763bfSjmcp "for a firmware verifier structure")); 6035a7763bfSjmcp free(filename); 6045a7763bfSjmcp free(fwvrfydirpath); 605*d65b419eSXinChen return (rv); 6065a7763bfSjmcp } 6075a7763bfSjmcp 6085a7763bfSjmcp errno = 0; /* false positive removal */ 6095a7763bfSjmcp 610*d65b419eSXinChen (void) snprintf(filename, MAXPATHLEN, "%s/%s-%s.so", 6115a7763bfSjmcp fwvrfydirpath, drv, clean); 612*d65b419eSXinChen if ((vrfy->handle = dlopen(filename, RTLD_NOW)) == NULL) { 613*d65b419eSXinChen logmsg(MSG_INFO, gettext(dlerror())); 614*d65b419eSXinChen logmsg(MSG_INFO, 615*d65b419eSXinChen gettext("\nUnable to open verification plugin " 616*d65b419eSXinChen "%s. Looking for %s-GENERIC plugin instead.\n"), 617*d65b419eSXinChen filename, drv); 618*d65b419eSXinChen 619*d65b419eSXinChen /* Try the drv-GENERIC.so form, _then_ die */ 620*d65b419eSXinChen bzero(filename, strlen(filename) + 1); 621*d65b419eSXinChen (void) snprintf(filename, MAXPATHLEN, 622*d65b419eSXinChen "%s/%s-GENERIC.so", fwvrfydirpath, drv); 623*d65b419eSXinChen 624*d65b419eSXinChen if ((vrfy->handle = dlopen(filename, RTLD_NOW)) 625*d65b419eSXinChen == NULL) { 626*d65b419eSXinChen logmsg(MSG_INFO, gettext(dlerror())); 627*d65b419eSXinChen logmsg(MSG_ERROR, 628*d65b419eSXinChen gettext("\nUnable to open either " 629*d65b419eSXinChen "verification plugin %s/%s-%s.so or " 630*d65b419eSXinChen "generic plugin %s.\nUnable to verify " 631*d65b419eSXinChen "firmware image. Aborting.\n"), 632*d65b419eSXinChen fwvrfydirpath, drv, clean, filename); 633*d65b419eSXinChen free(filename); 634*d65b419eSXinChen free(fwvrfydirpath); 635*d65b419eSXinChen return (rv); 636*d65b419eSXinChen } 637*d65b419eSXinChen } 6385a7763bfSjmcp 6395a7763bfSjmcp if ((vrfy->filename = calloc(1, strlen(filename) + 1)) 6405a7763bfSjmcp == NULL) { 6415a7763bfSjmcp logmsg(MSG_ERROR, 6425a7763bfSjmcp gettext("Unable to allocate space to store " 6435a7763bfSjmcp "a verifier filename\n")); 6445a7763bfSjmcp free(filename); 6455a7763bfSjmcp free(fwvrfydirpath); 6465a7763bfSjmcp free(vrfy->handle); 647*d65b419eSXinChen return (rv); 6485a7763bfSjmcp } 6495a7763bfSjmcp (void) strlcpy(vrfy->filename, filename, strlen(filename) + 1); 6505a7763bfSjmcp 6515a7763bfSjmcp if ((vrfysym = dlsym(vrfy->handle, "vendorvrfy")) == NULL) { 6525a7763bfSjmcp logmsg(MSG_ERROR, 6535a7763bfSjmcp gettext("%s is an invalid firmware verification " 6545a7763bfSjmcp "plugin."), filename); 6555a7763bfSjmcp (void) dlclose(vrfy->handle); 6565a7763bfSjmcp free(filename); 6575a7763bfSjmcp free(fwvrfydirpath); 6585a7763bfSjmcp free(vrfy); 659*d65b419eSXinChen return (rv); 6605a7763bfSjmcp } else { 6615a7763bfSjmcp vrfy->vendorvrfy = 6625a7763bfSjmcp (int (*)(struct devicelist *))vrfysym; 6635a7763bfSjmcp } 6645a7763bfSjmcp 6655a7763bfSjmcp vrfysym = dlsym(vrfy->handle, "vendor"); 6665a7763bfSjmcp 6675a7763bfSjmcp if (vrfysym == NULL) { 6685a7763bfSjmcp logmsg(MSG_ERROR, 6695a7763bfSjmcp gettext("Invalid vendor (null) in verification " 6705a7763bfSjmcp "plugin %s\n"), filename); 6715a7763bfSjmcp (void) dlclose(vrfy->handle); 6725a7763bfSjmcp free(vrfy); 673*d65b419eSXinChen return (rv); 6745a7763bfSjmcp } else { 6755a7763bfSjmcp if (strncmp(vendorid, (char *)vrfysym, 6765a7763bfSjmcp strlen(vendorid)) != 0) { 6775a7763bfSjmcp logmsg(MSG_INFO, 6785a7763bfSjmcp "Using a sym-linked (%s -> %s) " 679*d65b419eSXinChen "verification plugin\n", 6805a7763bfSjmcp vendorid, vrfysym); 6815a7763bfSjmcp vrfy->vendor = calloc(1, strlen(vendorid) + 1); 6825a7763bfSjmcp } else { 6835a7763bfSjmcp vrfy->vendor = calloc(1, strlen(vrfysym) + 1); 6845a7763bfSjmcp } 6855a7763bfSjmcp (void) strlcpy(vrfy->vendor, (char *)vrfysym, 6865a7763bfSjmcp strlen(vendorid) + 1); 6875a7763bfSjmcp } 6885a7763bfSjmcp 6895a7763bfSjmcp verifier = vrfy; /* a convenience variable */ 690*d65b419eSXinChen free(filename); 691*d65b419eSXinChen free(fwvrfydirpath); 6925a7763bfSjmcp } 6935a7763bfSjmcp 6945a7763bfSjmcp /* 6955a7763bfSjmcp * We don't do any verification that the fw image file is in 6965a7763bfSjmcp * an approved location, but it's easy enough to modify this 6975a7763bfSjmcp * function to do so. The verification plugin should provide 6985a7763bfSjmcp * sufficient protection. 6995a7763bfSjmcp */ 7005a7763bfSjmcp 7015a7763bfSjmcp if ((imgfd = open(fwimg, O_RDONLY)) < 0) { 7025a7763bfSjmcp logmsg(MSG_ERROR, 7035a7763bfSjmcp gettext("Unable to open designated firmware " 7045a7763bfSjmcp "image file %s: %s\n"), 7055a7763bfSjmcp (fwimg != NULL) ? fwimg : "(null)", 7065a7763bfSjmcp strerror(errno)); 7075a7763bfSjmcp rv = FWFLASH_FAILURE; 7085a7763bfSjmcp goto cleanup; 7095a7763bfSjmcp } 7105a7763bfSjmcp 7115a7763bfSjmcp if (stat(fwimg, &fwstat) == -1) { 7125a7763bfSjmcp logmsg(MSG_ERROR, 7135a7763bfSjmcp gettext("Unable to stat() firmware image file " 7145a7763bfSjmcp "%s: %s\n"), 7155a7763bfSjmcp fwimg, strerror(errno)); 7165a7763bfSjmcp rv = FWFLASH_FAILURE; 7175a7763bfSjmcp goto cleanup; 7185a7763bfSjmcp } else { 7195a7763bfSjmcp verifier->imgsize = fwstat.st_size; 7205a7763bfSjmcp if ((verifier->fwimage = calloc(1, verifier->imgsize)) 7215a7763bfSjmcp == NULL) { 7225a7763bfSjmcp logmsg(MSG_ERROR, 7235a7763bfSjmcp gettext("Unable to load firmware image " 7245a7763bfSjmcp "%s: %s\n"), 7255a7763bfSjmcp fwimg, strerror(errno)); 7265a7763bfSjmcp rv = FWFLASH_FAILURE; 7275a7763bfSjmcp goto cleanup; 7285a7763bfSjmcp } 7295a7763bfSjmcp } 7305a7763bfSjmcp 7315a7763bfSjmcp errno = 0; 7325a7763bfSjmcp if ((rv = read(imgfd, verifier->fwimage, 7335a7763bfSjmcp (size_t)verifier->imgsize)) < verifier->imgsize) { 7345a7763bfSjmcp /* we haven't read enough data, bail */ 7355a7763bfSjmcp logmsg(MSG_ERROR, 7365a7763bfSjmcp gettext("Failed to read sufficient data " 7375a7763bfSjmcp "(got %d bytes, expected %d bytes) from " 7385a7763bfSjmcp "firmware image file %s: %s\n"), 7395a7763bfSjmcp rv, verifier->imgsize, 740*d65b419eSXinChen verifier->filename, strerror(errno)); 7415a7763bfSjmcp rv = FWFLASH_FAILURE; 7425a7763bfSjmcp } else { 7435a7763bfSjmcp rv = FWFLASH_SUCCESS; 7445a7763bfSjmcp } 7455a7763bfSjmcp 7465a7763bfSjmcp if ((verifier->imgfile = calloc(1, strlen(fwimg) + 1)) == NULL) { 7475a7763bfSjmcp logmsg(MSG_ERROR, 7485a7763bfSjmcp gettext("Unable to save name of firmware image\n")); 7495a7763bfSjmcp rv = FWFLASH_FAILURE; 7505a7763bfSjmcp } else { 7515a7763bfSjmcp (void) strlcpy(verifier->imgfile, fwimg, strlen(fwimg) + 1); 7525a7763bfSjmcp } 7535a7763bfSjmcp 7545a7763bfSjmcp if (rv != FWFLASH_SUCCESS) { 7555a7763bfSjmcp /* cleanup and let's get outta here */ 7565a7763bfSjmcp cleanup: 7575a7763bfSjmcp free(verifier->filename); 7585a7763bfSjmcp free(verifier->vendor); 7595a7763bfSjmcp 760*d65b419eSXinChen if (!(fwflash_arg_list & FWFLASH_READ_FLAG) && 761*d65b419eSXinChen verifier->fwimage) 7625a7763bfSjmcp free(verifier->fwimage); 7635a7763bfSjmcp 7645a7763bfSjmcp verifier->filename = NULL; 7655a7763bfSjmcp verifier->vendor = NULL; 7665a7763bfSjmcp verifier->vendorvrfy = NULL; 7675a7763bfSjmcp verifier->fwimage = NULL; 7685a7763bfSjmcp (void) dlclose(verifier->handle); 7695a7763bfSjmcp verifier->handle = NULL; 7705a7763bfSjmcp free(verifier); 7715a7763bfSjmcp if (imgfd >= 0) { 7725a7763bfSjmcp (void) close(imgfd); 7735a7763bfSjmcp } 7745a7763bfSjmcp verifier = NULL; 7755a7763bfSjmcp } 7765a7763bfSjmcp 7775a7763bfSjmcp return (rv); 7785a7763bfSjmcp } 7795a7763bfSjmcp 7805a7763bfSjmcp /* 7815a7763bfSjmcp * cycles through the global list of plugins to find 7825a7763bfSjmcp * each flashable device, which is added to fw_devices 7835a7763bfSjmcp * 7845a7763bfSjmcp * Each plugin's identify routine must allocated storage 7855a7763bfSjmcp * as required. 7865a7763bfSjmcp * 7875a7763bfSjmcp * Each plugin's identify routine must return 7885a7763bfSjmcp * FWFLASH_FAILURE if it cannot find any devices 7895a7763bfSjmcp * which it handles. 7905a7763bfSjmcp */ 7915a7763bfSjmcp static int 7925a7763bfSjmcp flash_device_list() 7935a7763bfSjmcp { 7945a7763bfSjmcp int rv = FWFLASH_FAILURE; 7955a7763bfSjmcp int startidx = 0; 7965a7763bfSjmcp int sumrv = 0; 7975a7763bfSjmcp struct pluginlist *plugins; 7985a7763bfSjmcp 7995a7763bfSjmcp /* we open rootnode here, and close it in fwflash_intr */ 800*d65b419eSXinChen if ((rootnode = di_init("/", DINFOCPYALL|DINFOFORCE)) == DI_NODE_NIL) { 8015a7763bfSjmcp logmsg(MSG_ERROR, 8025a7763bfSjmcp gettext("Unable to take device tree snapshot: %s\n"), 8035a7763bfSjmcp strerror(errno)); 8045a7763bfSjmcp return (rv); 8055a7763bfSjmcp } 8065a7763bfSjmcp 8075a7763bfSjmcp if ((fw_devices = calloc(1, sizeof (struct devicelist))) == NULL) { 8085a7763bfSjmcp logmsg(MSG_ERROR, 8095a7763bfSjmcp gettext("Unable to malloc %d bytes while " 8105a7763bfSjmcp "trying to find devices: %s\n"), 8115a7763bfSjmcp sizeof (struct devicelist), strerror(errno)); 8125a7763bfSjmcp return (FWFLASH_FAILURE); 8135a7763bfSjmcp } 8145a7763bfSjmcp 8155a7763bfSjmcp /* CONSTCOND */ 8165a7763bfSjmcp TAILQ_INIT(fw_devices); 8175a7763bfSjmcp 8185a7763bfSjmcp TAILQ_FOREACH(plugins, fw_pluginlist, nextplugin) { 8195a7763bfSjmcp self = plugins->plugin; 8205a7763bfSjmcp rv = plugins->plugin->fw_identify(startidx); 8215a7763bfSjmcp 8225a7763bfSjmcp logmsg(MSG_INFO, 8235a7763bfSjmcp gettext("fwflash:flash_device_list() got %d from " 8245a7763bfSjmcp "identify routine\n"), rv); 8255a7763bfSjmcp 8265a7763bfSjmcp /* only bump startidx if we've found at least one device */ 8275a7763bfSjmcp if (rv == FWFLASH_SUCCESS) { 8285a7763bfSjmcp startidx += 100; 8295a7763bfSjmcp sumrv++; 8305a7763bfSjmcp } else { 8315a7763bfSjmcp logmsg(MSG_INFO, 8325a7763bfSjmcp gettext("No flashable devices attached with " 8335a7763bfSjmcp "the %s driver in this system\n"), 8345a7763bfSjmcp plugins->drvname); 8355a7763bfSjmcp } 8365a7763bfSjmcp } 8375a7763bfSjmcp 8385a7763bfSjmcp if (sumrv > 0) 8395a7763bfSjmcp rv = FWFLASH_SUCCESS; 8405a7763bfSjmcp 8415a7763bfSjmcp return (rv); 8425a7763bfSjmcp } 8435a7763bfSjmcp 8445a7763bfSjmcp static int 8455a7763bfSjmcp fwflash_list_fw(char *class) 8465a7763bfSjmcp { 8475a7763bfSjmcp int rv = 0; 8485a7763bfSjmcp struct devicelist *curdev; 8495a7763bfSjmcp int header = 1; 8505a7763bfSjmcp 8515a7763bfSjmcp TAILQ_FOREACH(curdev, fw_devices, nextdev) { 8525a7763bfSjmcp 8535a7763bfSjmcp /* we're either class-conscious, or we're not */ 8545a7763bfSjmcp if (((class != NULL) && 8555a7763bfSjmcp ((strncmp(curdev->classname, "ALL", 3) == 0) || 8565a7763bfSjmcp (strcmp(curdev->classname, class) == 0))) || 8575a7763bfSjmcp (class == NULL)) { 8585a7763bfSjmcp 8595a7763bfSjmcp if (header != 0) { 8605a7763bfSjmcp (void) fprintf(stdout, 8615a7763bfSjmcp gettext("List of available devices:\n")); 8625a7763bfSjmcp header--; 8635a7763bfSjmcp } 8645a7763bfSjmcp /* 8655a7763bfSjmcp * If any plugin's fw_devinfo() function returns 8665a7763bfSjmcp * FWFLASH_FAILURE then we want to keep track of 8675a7763bfSjmcp * it. _Most_ plugins should always return 8685a7763bfSjmcp * FWFLASH_SUCCESS from this function. The only 8695a7763bfSjmcp * exception known at this point is the tavor plugin. 8705a7763bfSjmcp */ 8715a7763bfSjmcp rv += curdev->plugin->fw_devinfo(curdev); 8725a7763bfSjmcp } 8735a7763bfSjmcp } 8745a7763bfSjmcp return (rv); 8755a7763bfSjmcp } 8765a7763bfSjmcp 8775a7763bfSjmcp static int 878f1c23465SJames C. McPherson fwflash_update(char *device, char *filename, int flags) 879f1c23465SJames C. McPherson { 8805a7763bfSjmcp 8815a7763bfSjmcp int rv = FWFLASH_FAILURE; 8825a7763bfSjmcp int needsfree = 0; 883c4800545Sjmcp int found = 0; 8845a7763bfSjmcp struct devicelist *curdev; 8855a7763bfSjmcp char *realfile; 8865a7763bfSjmcp 8875a7763bfSjmcp /* 8885a7763bfSjmcp * Here's how we operate: 8895a7763bfSjmcp * 8905a7763bfSjmcp * We perform some basic checks on the args, then walk 8915a7763bfSjmcp * through the device list looking for the device which 8925a7763bfSjmcp * matches. We then load the appropriate verifier for the 8935a7763bfSjmcp * image file and device, verify the image, then call the 8945a7763bfSjmcp * fw_writefw() function of the appropriate plugin. 8955a7763bfSjmcp * 8965a7763bfSjmcp * There is no "force" flag to enable you to flash a firmware 8975a7763bfSjmcp * image onto an incompatible device because the verifier 8985a7763bfSjmcp * will return FWFLASH_FAILURE if the image doesn't match. 8995a7763bfSjmcp */ 9005a7763bfSjmcp 9015a7763bfSjmcp /* new firmware filename and device desc */ 9025a7763bfSjmcp if (filename == NULL) { 9035a7763bfSjmcp logmsg(MSG_ERROR, 9045a7763bfSjmcp gettext("Invalid firmware filename (null)\n")); 9055a7763bfSjmcp return (FWFLASH_FAILURE); 9065a7763bfSjmcp } 9075a7763bfSjmcp 9085a7763bfSjmcp if (device == NULL) { 9095a7763bfSjmcp logmsg(MSG_ERROR, 9105a7763bfSjmcp gettext("Invalid device requested (null)\n")); 9115a7763bfSjmcp return (FWFLASH_FAILURE); 9125a7763bfSjmcp } 9135a7763bfSjmcp 9145a7763bfSjmcp if ((realfile = calloc(1, PATH_MAX + 1)) == NULL) { 9155a7763bfSjmcp logmsg(MSG_ERROR, 9165a7763bfSjmcp gettext("Unable to allocate space for device " 917c4800545Sjmcp "filename, operation might fail if %s is" 9185a7763bfSjmcp "a symbolic link\n"), 9195a7763bfSjmcp device); 9205a7763bfSjmcp realfile = device; 9215a7763bfSjmcp } else { 9225a7763bfSjmcp /* 9235a7763bfSjmcp * If realpath() succeeds, then we have a valid 9245a7763bfSjmcp * device filename in realfile. 9255a7763bfSjmcp */ 9265a7763bfSjmcp if (realpath(device, realfile) == NULL) { 9275a7763bfSjmcp logmsg(MSG_ERROR, 9285a7763bfSjmcp gettext("Unable to resolve device filename" 9295a7763bfSjmcp ": %s\n"), 9305a7763bfSjmcp strerror(errno)); 9315a7763bfSjmcp /* tidy up */ 9325a7763bfSjmcp free(realfile); 9335a7763bfSjmcp /* realpath didn't succeed, use fallback */ 9345a7763bfSjmcp realfile = device; 9355a7763bfSjmcp } else { 9365a7763bfSjmcp needsfree = 1; 9375a7763bfSjmcp } 9385a7763bfSjmcp } 9395a7763bfSjmcp 9405a7763bfSjmcp logmsg(MSG_INFO, 9415a7763bfSjmcp gettext("fwflash_update: fw_filename (%s) device (%s)\n"), 9425a7763bfSjmcp filename, device); 9435a7763bfSjmcp 9445a7763bfSjmcp TAILQ_FOREACH(curdev, fw_devices, nextdev) { 9455a7763bfSjmcp if (strcmp(curdev->access_devname, realfile) == 0) { 946c4800545Sjmcp found++; 9475a7763bfSjmcp rv = fwflash_load_verifier(curdev->drvname, 9485a7763bfSjmcp curdev->ident->vid, filename); 9495a7763bfSjmcp if (rv == FWFLASH_FAILURE) { 9505a7763bfSjmcp logmsg(MSG_ERROR, 9515a7763bfSjmcp gettext("Unable to load verifier " 9525a7763bfSjmcp "for device %s\n"), 9535a7763bfSjmcp curdev->access_devname); 9545a7763bfSjmcp return (FWFLASH_FAILURE); 9555a7763bfSjmcp } 9565a7763bfSjmcp rv = verifier->vendorvrfy(curdev); 9575a7763bfSjmcp if (rv == FWFLASH_FAILURE) { 9585a7763bfSjmcp /* the verifier prints a message */ 9595a7763bfSjmcp logmsg(MSG_INFO, 9605a7763bfSjmcp "verifier (%s) for %s :: %s returned " 9615a7763bfSjmcp "FWFLASH_FAILURE\n", 9625a7763bfSjmcp verifier->filename, 9635a7763bfSjmcp filename, curdev->access_devname); 9645a7763bfSjmcp return (rv); 9655a7763bfSjmcp } 9665a7763bfSjmcp 967f1c23465SJames C. McPherson if (((flags & FWFLASH_YES_FLAG) == FWFLASH_YES_FLAG) || 9685a7763bfSjmcp (rv = confirm_target(curdev, filename)) == 9695a7763bfSjmcp FWFLASH_YES_FLAG) { 9705a7763bfSjmcp logmsg(MSG_INFO, 9715a7763bfSjmcp "about to flash using plugin %s\n", 9725a7763bfSjmcp curdev->plugin->filename); 9735a7763bfSjmcp rv = curdev->plugin->fw_writefw(curdev, 9745a7763bfSjmcp filename); 9755a7763bfSjmcp if (rv == FWFLASH_FAILURE) { 9765a7763bfSjmcp logmsg(MSG_ERROR, 9775a7763bfSjmcp gettext("Failed to flash " 9785a7763bfSjmcp "firmware file %s on " 9795a7763bfSjmcp "device %s: %d\n"), 9805a7763bfSjmcp filename, 9815a7763bfSjmcp curdev->access_devname, rv); 9825a7763bfSjmcp } 9835a7763bfSjmcp } else { 9845a7763bfSjmcp logmsg(MSG_ERROR, 9855a7763bfSjmcp gettext("Flash operation not confirmed " 9865a7763bfSjmcp "by user\n"), 9875a7763bfSjmcp curdev->access_devname); 9885a7763bfSjmcp rv = FWFLASH_FAILURE; 9895a7763bfSjmcp } 9905a7763bfSjmcp } 9915a7763bfSjmcp } 9925a7763bfSjmcp 993c4800545Sjmcp if (!found) 994c4800545Sjmcp /* report the same device that the user passed in */ 995c4800545Sjmcp logmsg(MSG_ERROR, 996c4800545Sjmcp gettext("Device %s does not appear " 997c4800545Sjmcp "to be flashable\n"), 998c4800545Sjmcp ((strncmp(device, realfile, strlen(device)) == 0) ? 999*d65b419eSXinChen realfile : device)); 1000c4800545Sjmcp 10015a7763bfSjmcp if (needsfree) 10025a7763bfSjmcp free(realfile); 10035a7763bfSjmcp 10045a7763bfSjmcp return (rv); 10055a7763bfSjmcp } 10065a7763bfSjmcp 10075a7763bfSjmcp /* 10085a7763bfSjmcp * We validate that the device path is in our global device list and 10095a7763bfSjmcp * that the filename exists, then palm things off to the relevant plugin. 10105a7763bfSjmcp */ 10115a7763bfSjmcp static int 10125a7763bfSjmcp fwflash_read_file(char *device, char *filename) 10135a7763bfSjmcp { 10145a7763bfSjmcp struct devicelist *curdev; 10155a7763bfSjmcp int rv; 1016f8bf33c3SShantkumar Hiremath int found = 0; 10175a7763bfSjmcp 10185a7763bfSjmcp /* new firmware filename and device desc */ 10195a7763bfSjmcp 10205a7763bfSjmcp TAILQ_FOREACH(curdev, fw_devices, nextdev) { 10215a7763bfSjmcp if (strncmp(curdev->access_devname, device, 10225a7763bfSjmcp MAXPATHLEN) == 0) { 10235a7763bfSjmcp rv = curdev->plugin->fw_readfw(curdev, filename); 10245a7763bfSjmcp 10255a7763bfSjmcp if (rv != FWFLASH_SUCCESS) 10265a7763bfSjmcp logmsg(MSG_ERROR, 10275a7763bfSjmcp gettext("Unable to write out firmware " 10285a7763bfSjmcp "image for %s to file %s\n"), 10295a7763bfSjmcp curdev->access_devname, filename); 1030f8bf33c3SShantkumar Hiremath found++; 10315a7763bfSjmcp } 10325a7763bfSjmcp 10335a7763bfSjmcp } 1034f8bf33c3SShantkumar Hiremath 1035f8bf33c3SShantkumar Hiremath if (!found) { 10365a7763bfSjmcp logmsg(MSG_ERROR, 10375a7763bfSjmcp gettext("No device matching %s was found.\n"), 10385a7763bfSjmcp device); 10395a7763bfSjmcp rv = FWFLASH_FAILURE; 10405a7763bfSjmcp } 10415a7763bfSjmcp 10425a7763bfSjmcp return (rv); 10435a7763bfSjmcp } 10445a7763bfSjmcp 10455a7763bfSjmcp static void 10465a7763bfSjmcp fwflash_usage(char *arg) 10475a7763bfSjmcp { 10485a7763bfSjmcp 10495a7763bfSjmcp (void) fprintf(stderr, "\n"); 10505a7763bfSjmcp if (arg != NULL) { 10515a7763bfSjmcp logmsg(MSG_ERROR, 10525a7763bfSjmcp gettext("Invalid argument (%s) supplied\n"), arg); 10535a7763bfSjmcp } 10545a7763bfSjmcp 10555a7763bfSjmcp (void) fprintf(stderr, "\n"); 10565a7763bfSjmcp 10575a7763bfSjmcp (void) fprintf(stdout, gettext("Usage:\n\t")); 10585a7763bfSjmcp (void) fprintf(stdout, gettext("fwflash [-l [-c device_class " 10595a7763bfSjmcp "| ALL]] | [-v] | [-h]\n\t")); 10605a7763bfSjmcp (void) fprintf(stdout, gettext("fwflash [-f file1,file2,file3" 10615a7763bfSjmcp ",... | -r file] [-y] -d device_path\n\n")); 10625a7763bfSjmcp (void) fprintf(stdout, "\n"); /* workaround for xgettext */ 10635a7763bfSjmcp 10645a7763bfSjmcp (void) fprintf(stdout, 10655a7763bfSjmcp gettext("\t-l\t\tlist flashable devices in this system\n" 10665a7763bfSjmcp "\t-c device_class limit search to a specific class\n" 10675a7763bfSjmcp "\t\t\teg IB for InfiniBand, ses for SCSI Enclosures\n" 10685a7763bfSjmcp "\t-v\t\tprint version number of fwflash utility\n" 1069f8bf33c3SShantkumar Hiremath "\t-h\t\tprint this usage message\n\n")); 10705a7763bfSjmcp (void) fprintf(stdout, 10715a7763bfSjmcp gettext("\t-f file1,file2,file3,...\n" 10725a7763bfSjmcp "\t\t\tfirmware image file list to flash\n" 10735a7763bfSjmcp "\t-r file\t\tfile to dump device firmware to\n" 10745a7763bfSjmcp "\t-y\t\tanswer Yes/Y/y to prompts\n" 10755a7763bfSjmcp "\t-d device_path\tpathname of device to be flashed\n\n")); 10765a7763bfSjmcp 10775a7763bfSjmcp (void) fprintf(stdout, 10785a7763bfSjmcp gettext("\tIf -d device_path is specified, then one of -f " 10795a7763bfSjmcp "<files>\n" 10805a7763bfSjmcp "\tor -r <file> must also be specified\n\n")); 10815a7763bfSjmcp 10825a7763bfSjmcp (void) fprintf(stdout, 10835a7763bfSjmcp gettext("\tIf multiple firmware images are required to be " 10845a7763bfSjmcp "flashed\n" 10855a7763bfSjmcp "\tthey must be listed together, separated by commas. The\n" 10865a7763bfSjmcp "\timages will be flashed in the order specified.\n\n")); 10875a7763bfSjmcp 10885a7763bfSjmcp (void) fprintf(stdout, "\n"); 10895a7763bfSjmcp } 10905a7763bfSjmcp 10915a7763bfSjmcp static void 10925a7763bfSjmcp fwflash_version(void) 10935a7763bfSjmcp { 10945a7763bfSjmcp (void) fprintf(stdout, gettext("\n%s: "), FWFLASH_PROG_NAME); 10955a7763bfSjmcp (void) fprintf(stdout, gettext("version %s\n"), 10965a7763bfSjmcp FWFLASH_VERSION); 10975a7763bfSjmcp } 10985a7763bfSjmcp 10995a7763bfSjmcp static void 11005a7763bfSjmcp fwflash_intr(int sig) 11015a7763bfSjmcp { 11025a7763bfSjmcp 11035a7763bfSjmcp struct devicelist *thisdev; 11045a7763bfSjmcp struct pluginlist *thisplug; 11055a7763bfSjmcp 11065a7763bfSjmcp (void) signal(SIGINT, SIG_IGN); 11075a7763bfSjmcp (void) signal(SIGTERM, SIG_IGN); 1108c4800545Sjmcp (void) signal(SIGABRT, SIG_IGN); 1109*d65b419eSXinChen 11105a7763bfSjmcp if (fwflash_in_write) { 11115a7763bfSjmcp (void) fprintf(stderr, 11125a7763bfSjmcp gettext("WARNING: firmware image may be corrupted\n\t")); 11135a7763bfSjmcp (void) fprintf(stderr, 11145a7763bfSjmcp gettext("Reflash firmware before rebooting!\n")); 11155a7763bfSjmcp } 11165a7763bfSjmcp 11175a7763bfSjmcp if (sig > 0) { 11185a7763bfSjmcp (void) logmsg(MSG_ERROR, gettext("\n")); 11195a7763bfSjmcp (void) logmsg(MSG_ERROR, 11205a7763bfSjmcp gettext("fwflash exiting due to signal (%d)\n"), sig); 11215a7763bfSjmcp } 11225a7763bfSjmcp 11235a7763bfSjmcp /* 11245a7763bfSjmcp * we need to close everything down properly, so 11255a7763bfSjmcp * call the plugin closure routines 11265a7763bfSjmcp */ 11275a7763bfSjmcp if (fw_devices != NULL) { 11285a7763bfSjmcp TAILQ_FOREACH(thisdev, fw_devices, nextdev) { 1129*d65b419eSXinChen if (thisdev->plugin->fw_cleanup != NULL) { 1130*d65b419eSXinChen /* 1131*d65b419eSXinChen * If we've got a cleanup routine, it 1132*d65b419eSXinChen * cleans up _everything_ for thisdev 1133*d65b419eSXinChen */ 1134*d65b419eSXinChen thisdev->plugin->fw_cleanup(thisdev); 1135*d65b419eSXinChen } else { 11365a7763bfSjmcp /* free the components first */ 11375a7763bfSjmcp free(thisdev->access_devname); 11385a7763bfSjmcp free(thisdev->drvname); 11395a7763bfSjmcp free(thisdev->classname); 1140c4800545Sjmcp if (thisdev->ident != NULL) 11415a7763bfSjmcp free(thisdev->ident); 1142*d65b419eSXinChen /* We don't free address[] for old plugins */ 11435a7763bfSjmcp thisdev->ident = NULL; 1144*d65b419eSXinChen thisdev->plugin = NULL; 1145*d65b419eSXinChen } 11465a7763bfSjmcp /* CONSTCOND */ 11475a7763bfSjmcp TAILQ_REMOVE(fw_devices, thisdev, nextdev); 11485a7763bfSjmcp } 11495a7763bfSjmcp } 11505a7763bfSjmcp 11515a7763bfSjmcp if (fw_pluginlist != NULL) { 11525a7763bfSjmcp TAILQ_FOREACH(thisplug, fw_pluginlist, nextplugin) { 11535a7763bfSjmcp free(thisplug->filename); 11545a7763bfSjmcp free(thisplug->drvname); 11555a7763bfSjmcp free(thisplug->plugin->filename); 11565a7763bfSjmcp free(thisplug->plugin->drvname); 11575a7763bfSjmcp thisplug->filename = NULL; 11585a7763bfSjmcp thisplug->drvname = NULL; 11595a7763bfSjmcp thisplug->plugin->filename = NULL; 11605a7763bfSjmcp thisplug->plugin->drvname = NULL; 11615a7763bfSjmcp thisplug->plugin->fw_readfw = NULL; 11625a7763bfSjmcp thisplug->plugin->fw_writefw = NULL; 11635a7763bfSjmcp thisplug->plugin->fw_identify = NULL; 11645a7763bfSjmcp thisplug->plugin->fw_devinfo = NULL; 1165*d65b419eSXinChen thisplug->plugin->fw_cleanup = NULL; 11665a7763bfSjmcp (void) dlclose(thisplug->plugin->handle); 11675a7763bfSjmcp thisplug->plugin->handle = NULL; 11685a7763bfSjmcp free(thisplug->plugin); 11695a7763bfSjmcp thisplug->plugin = NULL; 11705a7763bfSjmcp /* CONSTCOND */ 11715a7763bfSjmcp TAILQ_REMOVE(fw_pluginlist, thisplug, nextplugin); 11725a7763bfSjmcp } 11735a7763bfSjmcp } 11745a7763bfSjmcp 11755a7763bfSjmcp if (verifier != NULL) { 11765a7763bfSjmcp free(verifier->filename); 11775a7763bfSjmcp free(verifier->vendor); 1178c4800545Sjmcp free(verifier->imgfile); 1179c4800545Sjmcp free(verifier->fwimage); 11805a7763bfSjmcp verifier->filename = NULL; 11815a7763bfSjmcp verifier->vendor = NULL; 11825a7763bfSjmcp verifier->vendorvrfy = NULL; 1183c4800545Sjmcp verifier->imgfile = NULL; 1184c4800545Sjmcp verifier->fwimage = NULL; 11855a7763bfSjmcp (void) dlclose(verifier->handle); 11865a7763bfSjmcp verifier->handle = NULL; 11875a7763bfSjmcp free(verifier); 11885a7763bfSjmcp } 11895a7763bfSjmcp di_fini(rootnode); 1190*d65b419eSXinChen 1191*d65b419eSXinChen if (sig > 0) 1192*d65b419eSXinChen exit(FWFLASH_FAILURE); 11935a7763bfSjmcp } 11945a7763bfSjmcp 11955a7763bfSjmcp static void 11965a7763bfSjmcp fwflash_handle_signals(void) 11975a7763bfSjmcp { 11985a7763bfSjmcp if (signal(SIGINT, fwflash_intr) == SIG_ERR) { 11995a7763bfSjmcp perror("signal"); 12005a7763bfSjmcp exit(FWFLASH_FAILURE); 12015a7763bfSjmcp } 12025a7763bfSjmcp 12035a7763bfSjmcp if (signal(SIGTERM, fwflash_intr) == SIG_ERR) { 12045a7763bfSjmcp perror("signal"); 12055a7763bfSjmcp exit(FWFLASH_FAILURE); 12065a7763bfSjmcp } 12075a7763bfSjmcp } 12085a7763bfSjmcp 12095a7763bfSjmcp static int 12105a7763bfSjmcp confirm_target(struct devicelist *thisdev, char *file) 12115a7763bfSjmcp { 12125a7763bfSjmcp int resp; 12135a7763bfSjmcp 1214c4800545Sjmcp (void) fflush(stdin); 1215c4800545Sjmcp (void) printf(gettext("About to update firmware on %s\n"), 1216c4800545Sjmcp thisdev->access_devname); 1217*d65b419eSXinChen (void) printf(gettext("with file %s.\n" 1218*d65b419eSXinChen "Do you want to continue? (Y/N): "), file); 12195a7763bfSjmcp 12205a7763bfSjmcp resp = getchar(); 12215a7763bfSjmcp if (resp == 'Y' || resp == 'y') { 12225a7763bfSjmcp return (FWFLASH_YES_FLAG); 12235a7763bfSjmcp } else { 12245a7763bfSjmcp logmsg(MSG_INFO, "flash operation NOT confirmed.\n"); 12255a7763bfSjmcp } 12265a7763bfSjmcp 12275a7763bfSjmcp (void) fflush(stdin); 12285a7763bfSjmcp return (FWFLASH_FAILURE); 12295a7763bfSjmcp } 12305a7763bfSjmcp 12315a7763bfSjmcp int 12325a7763bfSjmcp get_fileopts(char *options) 12335a7763bfSjmcp { 12345a7763bfSjmcp 12355a7763bfSjmcp int i; 12365a7763bfSjmcp char *files; 12375a7763bfSjmcp 12385a7763bfSjmcp if (files = strtok(options, ",")) { 12395a7763bfSjmcp /* we have more than one */ 12405a7763bfSjmcp if ((filelist[0] = calloc(1, MAXPATHLEN + 1)) == NULL) { 12415a7763bfSjmcp logmsg(MSG_ERROR, 12425a7763bfSjmcp gettext("Unable to allocate space for " 12435a7763bfSjmcp "a firmware image filename\n")); 12445a7763bfSjmcp return (FWFLASH_FAILURE); 12455a7763bfSjmcp } 12465a7763bfSjmcp (void) strlcpy(filelist[0], files, strlen(files) + 1); 12475a7763bfSjmcp i = 1; 12485a7763bfSjmcp 12495a7763bfSjmcp logmsg(MSG_INFO, "fwflash: filelist[0]: %s\n", 12505a7763bfSjmcp filelist[0]); 12515a7763bfSjmcp 12525a7763bfSjmcp 12535a7763bfSjmcp while (files = strtok(NULL, ",")) { 12545a7763bfSjmcp if ((filelist[i] = calloc(1, MAXPATHLEN + 1)) 12555a7763bfSjmcp == NULL) { 12565a7763bfSjmcp logmsg(MSG_ERROR, 12575a7763bfSjmcp gettext("Unable to allocate space for " 12585a7763bfSjmcp "a firmware image filename\n")); 12595a7763bfSjmcp return (FWFLASH_FAILURE); 12605a7763bfSjmcp } 12615a7763bfSjmcp (void) strlcpy(filelist[i], files, 12625a7763bfSjmcp strlen(files) + 1); 12635a7763bfSjmcp logmsg(MSG_INFO, "fwflash: filelist[%d]: %s\n", 12645a7763bfSjmcp i, filelist[i]); 12655a7763bfSjmcp ++i; 12665a7763bfSjmcp } 12675a7763bfSjmcp } else { 12685a7763bfSjmcp if ((filelist[0] = calloc(1, MAXPATHLEN + 1)) == NULL) { 12695a7763bfSjmcp logmsg(MSG_ERROR, 12705a7763bfSjmcp gettext("Unable to allocate space for " 12715a7763bfSjmcp "a firmware image filename\n")); 12725a7763bfSjmcp return (FWFLASH_FAILURE); 12735a7763bfSjmcp } 12745a7763bfSjmcp (void) strlcpy(filelist[0], options, strlen(files) + 1); 12755a7763bfSjmcp logmsg(MSG_INFO, "fwflash: filelist[0]: %s\n", 12765a7763bfSjmcp filelist[0]); 12775a7763bfSjmcp } 12785a7763bfSjmcp return (FWFLASH_SUCCESS); 12795a7763bfSjmcp } 12805a7763bfSjmcp 12815a7763bfSjmcp /* 12825a7763bfSjmcp * code reuse - cheerfully borrowed from stmsboot_util.c 12835a7763bfSjmcp */ 12845a7763bfSjmcp void 1285*d65b419eSXinChen logmsg(int severity, const char *msg, ...) 1286*d65b419eSXinChen { 12875a7763bfSjmcp va_list ap; 12885a7763bfSjmcp 12895a7763bfSjmcp if ((severity > MSG_INFO) || 12905a7763bfSjmcp ((severity == MSG_INFO) && (fwflash_debug > 0))) { 12915a7763bfSjmcp (void) fprintf(stderr, "%s: ", FWFLASH_PROG_NAME); 12925a7763bfSjmcp va_start(ap, msg); 12935a7763bfSjmcp (void) vfprintf(stderr, msg, ap); 12945a7763bfSjmcp va_end(ap); 12955a7763bfSjmcp } 12965a7763bfSjmcp } 1297