2018-05-06 21:58:06 +00:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0+ */
|
2002-11-03 00:07:02 +00:00
|
|
|
/*
|
2008-01-08 17:14:09 +00:00
|
|
|
* (C) Copyright 2008 Semihalf
|
|
|
|
*
|
2005-11-25 15:38:03 +00:00
|
|
|
* (C) Copyright 2000-2005
|
2002-11-03 00:07:02 +00:00
|
|
|
* Wolfgang Denk, DENX Software Engineering, wd@denx.de.
|
2005-11-25 15:38:03 +00:00
|
|
|
********************************************************************
|
|
|
|
* NOTE: This header file defines an interface to U-Boot. Including
|
|
|
|
* this (unmodified) header file in another file is considered normal
|
|
|
|
* use of U-Boot, and does *not* fall under the heading of "derived
|
|
|
|
* work".
|
|
|
|
********************************************************************
|
2002-11-03 00:07:02 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef __IMAGE_H__
|
|
|
|
#define __IMAGE_H__
|
|
|
|
|
2009-07-02 23:23:25 +00:00
|
|
|
#include "compiler.h"
|
2012-10-29 13:34:30 +00:00
|
|
|
#include <asm/byteorder.h>
|
2018-06-13 04:13:32 +00:00
|
|
|
#include <stdbool.h>
|
2009-07-02 23:23:25 +00:00
|
|
|
|
2013-05-08 08:06:01 +00:00
|
|
|
/* Define this to avoid #ifdefs later on */
|
|
|
|
struct lmb;
|
2018-03-21 09:03:35 +00:00
|
|
|
struct fdt_region;
|
2013-05-08 08:06:01 +00:00
|
|
|
|
2009-07-02 23:23:25 +00:00
|
|
|
#ifdef USE_HOSTCC
|
2015-04-22 19:36:22 +00:00
|
|
|
#include <sys/types.h>
|
2021-09-26 01:43:20 +00:00
|
|
|
#include <linux/kconfig.h>
|
2008-03-11 11:34:47 +00:00
|
|
|
|
2013-05-08 08:05:58 +00:00
|
|
|
#define IMAGE_INDENT_STRING ""
|
2013-05-07 06:11:58 +00:00
|
|
|
|
2008-10-21 09:23:56 +00:00
|
|
|
#else
|
|
|
|
|
|
|
|
#include <lmb.h>
|
|
|
|
#include <asm/u-boot.h>
|
2010-01-21 09:03:20 +00:00
|
|
|
#include <command.h>
|
2021-07-14 22:05:39 +00:00
|
|
|
#include <linker_lists.h>
|
2008-10-21 09:23:56 +00:00
|
|
|
|
2013-05-08 08:05:58 +00:00
|
|
|
#define IMAGE_INDENT_STRING " "
|
2013-05-07 06:11:58 +00:00
|
|
|
|
2008-03-11 11:34:47 +00:00
|
|
|
#endif /* USE_HOSTCC */
|
2008-02-04 07:28:09 +00:00
|
|
|
|
2014-05-30 18:59:00 +00:00
|
|
|
#include <hash.h>
|
2018-03-04 16:20:11 +00:00
|
|
|
#include <linux/libfdt.h>
|
2008-02-29 20:24:06 +00:00
|
|
|
#include <fdt_support.h>
|
2021-09-26 01:43:33 +00:00
|
|
|
#include <u-boot/hash-checksum.h>
|
2013-05-08 08:06:01 +00:00
|
|
|
|
2019-12-28 17:45:03 +00:00
|
|
|
extern ulong image_load_addr; /* Default Load Address */
|
|
|
|
extern ulong image_save_addr; /* Default Save Address */
|
|
|
|
extern ulong image_save_size; /* Default Save Size */
|
2022-03-28 20:56:59 +00:00
|
|
|
extern ulong image_load_offset; /* Default Load Address Offset */
|
2019-12-28 17:45:03 +00:00
|
|
|
|
2021-02-16 00:08:09 +00:00
|
|
|
/* An invalid size, meaning that the image size is not known */
|
|
|
|
#define IMAGE_SIZE_INVAL (-1UL)
|
|
|
|
|
2016-06-30 16:52:14 +00:00
|
|
|
enum ih_category {
|
|
|
|
IH_ARCH,
|
|
|
|
IH_COMP,
|
|
|
|
IH_OS,
|
|
|
|
IH_TYPE,
|
|
|
|
|
|
|
|
IH_COUNT,
|
|
|
|
};
|
|
|
|
|
2002-11-03 00:07:02 +00:00
|
|
|
/*
|
|
|
|
* Operating System Codes
|
2016-07-21 06:16:00 +00:00
|
|
|
*
|
|
|
|
* The following are exposed to uImage header.
|
2018-12-17 10:02:00 +00:00
|
|
|
* New IDs *MUST* be appended at the end of the list and *NEVER*
|
|
|
|
* inserted for backward compatibility.
|
2002-11-03 00:07:02 +00:00
|
|
|
*/
|
2016-06-30 16:52:13 +00:00
|
|
|
enum {
|
|
|
|
IH_OS_INVALID = 0, /* Invalid OS */
|
|
|
|
IH_OS_OPENBSD, /* OpenBSD */
|
|
|
|
IH_OS_NETBSD, /* NetBSD */
|
|
|
|
IH_OS_FREEBSD, /* FreeBSD */
|
|
|
|
IH_OS_4_4BSD, /* 4.4BSD */
|
|
|
|
IH_OS_LINUX, /* Linux */
|
|
|
|
IH_OS_SVR4, /* SVR4 */
|
|
|
|
IH_OS_ESIX, /* Esix */
|
|
|
|
IH_OS_SOLARIS, /* Solaris */
|
|
|
|
IH_OS_IRIX, /* Irix */
|
|
|
|
IH_OS_SCO, /* SCO */
|
|
|
|
IH_OS_DELL, /* Dell */
|
|
|
|
IH_OS_NCR, /* NCR */
|
|
|
|
IH_OS_LYNXOS, /* LynxOS */
|
|
|
|
IH_OS_VXWORKS, /* VxWorks */
|
|
|
|
IH_OS_PSOS, /* pSOS */
|
|
|
|
IH_OS_QNX, /* QNX */
|
|
|
|
IH_OS_U_BOOT, /* Firmware */
|
|
|
|
IH_OS_RTEMS, /* RTEMS */
|
|
|
|
IH_OS_ARTOS, /* ARTOS */
|
|
|
|
IH_OS_UNITY, /* Unity OS */
|
|
|
|
IH_OS_INTEGRITY, /* INTEGRITY */
|
|
|
|
IH_OS_OSE, /* OSE */
|
|
|
|
IH_OS_PLAN9, /* Plan 9 */
|
|
|
|
IH_OS_OPENRTOS, /* OpenRTOS */
|
2017-09-13 19:29:29 +00:00
|
|
|
IH_OS_ARM_TRUSTED_FIRMWARE, /* ARM Trusted Firmware */
|
2018-03-13 16:50:35 +00:00
|
|
|
IH_OS_TEE, /* Trusted Execution Environment */
|
2019-08-21 19:14:44 +00:00
|
|
|
IH_OS_OPENSBI, /* RISC-V OpenSBI */
|
2019-12-24 16:05:38 +00:00
|
|
|
IH_OS_EFI, /* EFI Firmware (e.g. GRUB2) */
|
2016-06-30 16:52:13 +00:00
|
|
|
|
|
|
|
IH_OS_COUNT,
|
|
|
|
};
|
2002-11-03 00:07:02 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* CPU Architecture Codes (supported by Linux)
|
2016-07-21 06:16:00 +00:00
|
|
|
*
|
|
|
|
* The following are exposed to uImage header.
|
2018-12-17 10:02:00 +00:00
|
|
|
* New IDs *MUST* be appended at the end of the list and *NEVER*
|
|
|
|
* inserted for backward compatibility.
|
2002-11-03 00:07:02 +00:00
|
|
|
*/
|
2016-06-30 16:52:13 +00:00
|
|
|
enum {
|
|
|
|
IH_ARCH_INVALID = 0, /* Invalid CPU */
|
|
|
|
IH_ARCH_ALPHA, /* Alpha */
|
|
|
|
IH_ARCH_ARM, /* ARM */
|
|
|
|
IH_ARCH_I386, /* Intel x86 */
|
|
|
|
IH_ARCH_IA64, /* IA64 */
|
|
|
|
IH_ARCH_MIPS, /* MIPS */
|
|
|
|
IH_ARCH_MIPS64, /* MIPS 64 Bit */
|
|
|
|
IH_ARCH_PPC, /* PowerPC */
|
|
|
|
IH_ARCH_S390, /* IBM S390 */
|
|
|
|
IH_ARCH_SH, /* SuperH */
|
|
|
|
IH_ARCH_SPARC, /* Sparc */
|
|
|
|
IH_ARCH_SPARC64, /* Sparc 64 Bit */
|
|
|
|
IH_ARCH_M68K, /* M68K */
|
2016-07-21 06:16:00 +00:00
|
|
|
IH_ARCH_NIOS, /* Nios-32 */
|
2016-06-30 16:52:13 +00:00
|
|
|
IH_ARCH_MICROBLAZE, /* MicroBlaze */
|
|
|
|
IH_ARCH_NIOS2, /* Nios-II */
|
|
|
|
IH_ARCH_BLACKFIN, /* Blackfin */
|
|
|
|
IH_ARCH_AVR32, /* AVR32 */
|
|
|
|
IH_ARCH_ST200, /* STMicroelectronics ST200 */
|
|
|
|
IH_ARCH_SANDBOX, /* Sandbox architecture (test only) */
|
|
|
|
IH_ARCH_NDS32, /* ANDES Technology - NDS32 */
|
|
|
|
IH_ARCH_OPENRISC, /* OpenRISC 1000 */
|
|
|
|
IH_ARCH_ARM64, /* ARM64 */
|
|
|
|
IH_ARCH_ARC, /* Synopsys DesignWare ARC */
|
|
|
|
IH_ARCH_X86_64, /* AMD x86_64, Intel and Via */
|
2016-08-10 15:36:43 +00:00
|
|
|
IH_ARCH_XTENSA, /* Xtensa */
|
2017-12-26 05:55:58 +00:00
|
|
|
IH_ARCH_RISCV, /* RISC-V */
|
2016-06-30 16:52:13 +00:00
|
|
|
|
|
|
|
IH_ARCH_COUNT,
|
|
|
|
};
|
2002-11-03 00:07:02 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Image Types
|
|
|
|
*
|
|
|
|
* "Standalone Programs" are directly runnable in the environment
|
|
|
|
* provided by U-Boot; it is expected that (if they behave
|
|
|
|
* well) you can continue to work in U-Boot after return from
|
|
|
|
* the Standalone Program.
|
|
|
|
* "OS Kernel Images" are usually images of some Embedded OS which
|
|
|
|
* will take over control completely. Usually these programs
|
|
|
|
* will install their own set of exception handlers, device
|
|
|
|
* drivers, set up the MMU, etc. - this means, that you cannot
|
|
|
|
* expect to re-enter U-Boot except by resetting the CPU.
|
|
|
|
* "RAMDisk Images" are more or less just data blocks, and their
|
|
|
|
* parameters (address, size) are passed to an OS kernel that is
|
|
|
|
* being started.
|
|
|
|
* "Multi-File Images" contain several images, typically an OS
|
|
|
|
* (Linux) kernel image and one or more data images like
|
|
|
|
* RAMDisks. This construct is useful for instance when you want
|
|
|
|
* to boot over the network using BOOTP etc., where the boot
|
|
|
|
* server provides just a single image file, but you want to get
|
|
|
|
* for instance an OS kernel and a RAMDisk image.
|
|
|
|
*
|
|
|
|
* "Multi-File Images" start with a list of image sizes, each
|
|
|
|
* image size (in bytes) specified by an "uint32_t" in network
|
|
|
|
* byte order. This list is terminated by an "(uint32_t)0".
|
|
|
|
* Immediately after the terminating 0 follow the images, one by
|
|
|
|
* one, all aligned on "uint32_t" boundaries (size rounded up to
|
2004-10-10 23:27:33 +00:00
|
|
|
* a multiple of 4 bytes - except for the last file).
|
2002-11-03 00:07:02 +00:00
|
|
|
*
|
|
|
|
* "Firmware Images" are binary images containing firmware (like
|
|
|
|
* U-Boot or FPGA images) which usually will be programmed to
|
|
|
|
* flash memory.
|
|
|
|
*
|
|
|
|
* "Script files" are command sequences that will be executed by
|
|
|
|
* U-Boot's command interpreter; this feature is especially
|
|
|
|
* useful when you configure U-Boot to use a real shell (hush)
|
2003-07-24 23:38:38 +00:00
|
|
|
* as command interpreter (=> Shell Scripts).
|
2016-07-21 06:16:00 +00:00
|
|
|
*
|
|
|
|
* The following are exposed to uImage header.
|
2018-12-17 10:02:00 +00:00
|
|
|
* New IDs *MUST* be appended at the end of the list and *NEVER*
|
|
|
|
* inserted for backward compatibility.
|
2002-11-03 00:07:02 +00:00
|
|
|
*/
|
|
|
|
|
2016-06-30 16:52:13 +00:00
|
|
|
enum {
|
|
|
|
IH_TYPE_INVALID = 0, /* Invalid Image */
|
|
|
|
IH_TYPE_STANDALONE, /* Standalone Program */
|
|
|
|
IH_TYPE_KERNEL, /* OS Kernel Image */
|
|
|
|
IH_TYPE_RAMDISK, /* RAMDisk Image */
|
|
|
|
IH_TYPE_MULTI, /* Multi-File Image */
|
|
|
|
IH_TYPE_FIRMWARE, /* Firmware Image */
|
|
|
|
IH_TYPE_SCRIPT, /* Script file */
|
|
|
|
IH_TYPE_FILESYSTEM, /* Filesystem Image (any type) */
|
|
|
|
IH_TYPE_FLATDT, /* Binary Flat Device Tree Blob */
|
|
|
|
IH_TYPE_KWBIMAGE, /* Kirkwood Boot Image */
|
|
|
|
IH_TYPE_IMXIMAGE, /* Freescale IMXBoot Image */
|
|
|
|
IH_TYPE_UBLIMAGE, /* Davinci UBL Image */
|
|
|
|
IH_TYPE_OMAPIMAGE, /* TI OMAP Config Header Image */
|
|
|
|
IH_TYPE_AISIMAGE, /* TI Davinci AIS Image */
|
|
|
|
/* OS Kernel Image, can run from any load address */
|
|
|
|
IH_TYPE_KERNEL_NOLOAD,
|
|
|
|
IH_TYPE_PBLIMAGE, /* Freescale PBL Boot Image */
|
|
|
|
IH_TYPE_MXSIMAGE, /* Freescale MXSBoot Image */
|
|
|
|
IH_TYPE_GPIMAGE, /* TI Keystone GPHeader Image */
|
|
|
|
IH_TYPE_ATMELIMAGE, /* ATMEL ROM bootable Image */
|
2018-04-15 11:15:33 +00:00
|
|
|
IH_TYPE_SOCFPGAIMAGE, /* Altera SOCFPGA CV/AV Preloader */
|
2016-06-30 16:52:13 +00:00
|
|
|
IH_TYPE_X86_SETUP, /* x86 setup.bin Image */
|
|
|
|
IH_TYPE_LPC32XXIMAGE, /* x86 setup.bin Image */
|
|
|
|
IH_TYPE_LOADABLE, /* A list of typeless images */
|
|
|
|
IH_TYPE_RKIMAGE, /* Rockchip Boot Image */
|
|
|
|
IH_TYPE_RKSD, /* Rockchip SD card */
|
|
|
|
IH_TYPE_RKSPI, /* Rockchip SPI image */
|
|
|
|
IH_TYPE_ZYNQIMAGE, /* Xilinx Zynq Boot Image */
|
|
|
|
IH_TYPE_ZYNQMPIMAGE, /* Xilinx ZynqMP Boot Image */
|
2018-04-13 12:18:52 +00:00
|
|
|
IH_TYPE_ZYNQMPBIF, /* Xilinx ZynqMP Boot Image (bif) */
|
2016-06-30 16:52:13 +00:00
|
|
|
IH_TYPE_FPGA, /* FPGA Image */
|
2016-09-26 07:08:06 +00:00
|
|
|
IH_TYPE_VYBRIDIMAGE, /* VYBRID .vyb Image */
|
2016-11-29 22:33:21 +00:00
|
|
|
IH_TYPE_TEE, /* Trusted Execution Environment OS Image */
|
2016-11-06 15:37:56 +00:00
|
|
|
IH_TYPE_FIRMWARE_IVT, /* Firmware Image with HABv4 IVT */
|
2017-07-31 15:58:20 +00:00
|
|
|
IH_TYPE_PMMC, /* TI Power Management Micro-Controller Firmware */
|
2018-03-12 09:46:04 +00:00
|
|
|
IH_TYPE_STM32IMAGE, /* STMicroelectronics STM32 Image */
|
2018-04-15 11:15:33 +00:00
|
|
|
IH_TYPE_SOCFPGAIMAGE_V1, /* Altera SOCFPGA A10 Preloader */
|
2018-11-15 02:07:49 +00:00
|
|
|
IH_TYPE_MTKIMAGE, /* MediaTek BootROM loadable Image */
|
2018-12-17 10:02:00 +00:00
|
|
|
IH_TYPE_IMX8MIMAGE, /* Freescale IMX8MBoot Image */
|
|
|
|
IH_TYPE_IMX8IMAGE, /* Freescale IMX8Boot Image */
|
2019-08-02 13:07:19 +00:00
|
|
|
IH_TYPE_COPRO, /* Coprocessor Image for remoteproc*/
|
2018-12-20 01:15:18 +00:00
|
|
|
IH_TYPE_SUNXI_EGON, /* Allwinner eGON Boot Image */
|
2022-03-18 05:00:43 +00:00
|
|
|
IH_TYPE_SUNXI_TOC0, /* Allwinner TOC0 Boot Image */
|
2016-06-30 16:52:13 +00:00
|
|
|
|
|
|
|
IH_TYPE_COUNT, /* Number of image types */
|
|
|
|
};
|
2015-06-23 21:38:25 +00:00
|
|
|
|
2002-11-03 00:07:02 +00:00
|
|
|
/*
|
|
|
|
* Compression Types
|
2016-07-21 06:16:00 +00:00
|
|
|
*
|
|
|
|
* The following are exposed to uImage header.
|
2018-12-17 10:02:00 +00:00
|
|
|
* New IDs *MUST* be appended at the end of the list and *NEVER*
|
|
|
|
* inserted for backward compatibility.
|
2002-11-03 00:07:02 +00:00
|
|
|
*/
|
2016-06-30 16:52:13 +00:00
|
|
|
enum {
|
|
|
|
IH_COMP_NONE = 0, /* No Compression Used */
|
|
|
|
IH_COMP_GZIP, /* gzip Compression Used */
|
|
|
|
IH_COMP_BZIP2, /* bzip2 Compression Used */
|
|
|
|
IH_COMP_LZMA, /* lzma Compression Used */
|
|
|
|
IH_COMP_LZO, /* lzo Compression Used */
|
|
|
|
IH_COMP_LZ4, /* lz4 Compression Used */
|
2020-04-25 17:37:21 +00:00
|
|
|
IH_COMP_ZSTD, /* zstd Compression Used */
|
2016-06-30 16:52:13 +00:00
|
|
|
|
|
|
|
IH_COMP_COUNT,
|
|
|
|
};
|
2002-11-03 00:07:02 +00:00
|
|
|
|
2019-04-08 15:35:27 +00:00
|
|
|
#define LZ4F_MAGIC 0x184D2204 /* LZ4 Magic Number */
|
2002-11-03 00:07:02 +00:00
|
|
|
#define IH_MAGIC 0x27051956 /* Image Magic Number */
|
|
|
|
#define IH_NMLEN 32 /* Image Name Length */
|
|
|
|
|
2013-01-03 08:24:33 +00:00
|
|
|
/* Reused from common.h */
|
|
|
|
#define ROUND(a, b) (((a) + (b) - 1) & ~((b) - 1))
|
|
|
|
|
2002-11-03 00:07:02 +00:00
|
|
|
/*
|
2008-02-29 13:58:34 +00:00
|
|
|
* Legacy format image header,
|
|
|
|
* all data in network byte order (aka natural aka bigendian).
|
2002-11-03 00:07:02 +00:00
|
|
|
*/
|
|
|
|
typedef struct image_header {
|
2019-10-27 12:19:40 +00:00
|
|
|
uint32_t ih_magic; /* Image Header Magic Number */
|
|
|
|
uint32_t ih_hcrc; /* Image Header CRC Checksum */
|
|
|
|
uint32_t ih_time; /* Image Creation Timestamp */
|
|
|
|
uint32_t ih_size; /* Image Data Size */
|
|
|
|
uint32_t ih_load; /* Data Load Address */
|
|
|
|
uint32_t ih_ep; /* Entry Point Address */
|
|
|
|
uint32_t ih_dcrc; /* Image Data CRC Checksum */
|
2002-11-03 00:07:02 +00:00
|
|
|
uint8_t ih_os; /* Operating System */
|
|
|
|
uint8_t ih_arch; /* CPU architecture */
|
|
|
|
uint8_t ih_type; /* Image Type */
|
|
|
|
uint8_t ih_comp; /* Compression Type */
|
|
|
|
uint8_t ih_name[IH_NMLEN]; /* Image Name */
|
|
|
|
} image_header_t;
|
|
|
|
|
2008-08-15 13:24:41 +00:00
|
|
|
typedef struct image_info {
|
|
|
|
ulong start, end; /* start/end of blob */
|
|
|
|
ulong image_start, image_len; /* start of image within blob, len of image */
|
|
|
|
ulong load; /* load addr for the image */
|
|
|
|
uint8_t comp, type, os; /* compression, type of image, os type */
|
2014-10-20 03:11:24 +00:00
|
|
|
uint8_t arch; /* CPU architecture */
|
2008-08-15 13:24:41 +00:00
|
|
|
} image_info_t;
|
|
|
|
|
2008-02-04 07:28:09 +00:00
|
|
|
/*
|
|
|
|
* Legacy and FIT format headers used by do_bootm() and do_bootm_<os>()
|
|
|
|
* routines.
|
|
|
|
*/
|
2022-09-07 02:26:50 +00:00
|
|
|
struct bootm_headers {
|
2008-02-04 07:28:09 +00:00
|
|
|
/*
|
|
|
|
* Legacy os image header, if it is a multi component image
|
2008-02-29 13:58:34 +00:00
|
|
|
* then boot_get_ramdisk() and get_fdt() will attempt to get
|
2008-02-04 07:28:09 +00:00
|
|
|
* data from second and third component accordingly.
|
|
|
|
*/
|
2008-04-11 09:07:49 +00:00
|
|
|
image_header_t *legacy_hdr_os; /* image header pointer */
|
|
|
|
image_header_t legacy_hdr_os_copy; /* header copy */
|
2008-02-04 07:28:09 +00:00
|
|
|
ulong legacy_hdr_valid;
|
|
|
|
|
2021-09-26 01:43:35 +00:00
|
|
|
/*
|
|
|
|
* The fit_ members are only used with FIT, but it involves a lot of
|
|
|
|
* #ifdefs to avoid compiling that code. Since FIT is the standard
|
|
|
|
* format, even for SPL, this extra data size seems worth it.
|
|
|
|
*/
|
2008-03-12 09:35:46 +00:00
|
|
|
const char *fit_uname_cfg; /* configuration node unit name */
|
|
|
|
|
2008-02-04 07:28:09 +00:00
|
|
|
void *fit_hdr_os; /* os FIT image header */
|
2008-03-10 16:53:49 +00:00
|
|
|
const char *fit_uname_os; /* os subimage node unit name */
|
2008-03-12 09:32:59 +00:00
|
|
|
int fit_noffset_os; /* os subimage node offset */
|
2008-02-04 07:28:09 +00:00
|
|
|
|
|
|
|
void *fit_hdr_rd; /* init ramdisk FIT image header */
|
2008-03-12 09:32:59 +00:00
|
|
|
const char *fit_uname_rd; /* init ramdisk subimage node unit name */
|
|
|
|
int fit_noffset_rd; /* init ramdisk subimage node offset */
|
2008-02-04 07:28:09 +00:00
|
|
|
|
|
|
|
void *fit_hdr_fdt; /* FDT blob FIT image header */
|
2008-03-12 09:32:59 +00:00
|
|
|
const char *fit_uname_fdt; /* FDT blob subimage node unit name */
|
|
|
|
int fit_noffset_fdt;/* FDT blob subimage node offset */
|
2014-10-20 03:11:24 +00:00
|
|
|
|
|
|
|
void *fit_hdr_setup; /* x86 setup FIT image header */
|
|
|
|
const char *fit_uname_setup; /* x86 setup subimage node name */
|
|
|
|
int fit_noffset_setup;/* x86 setup subimage node offset */
|
2008-03-12 09:35:52 +00:00
|
|
|
|
bootm: Add subcommands
Add the ability to break the steps of the bootm command into several
subcommands: start, loados, ramdisk, fdt, bdt, cmdline, prep, go.
This allows us to do things like manipulate device trees before
they are passed to a booting kernel or setup memory for a secondary
core in multicore situations.
Not all OS types support all subcommands (currently only start, loados,
ramdisk, fdt, and go are supported).
Signed-off-by: Kumar Gala <galak@kernel.crashing.org>
2008-10-21 22:25:45 +00:00
|
|
|
#ifndef USE_HOSTCC
|
2008-08-15 13:24:41 +00:00
|
|
|
image_info_t os; /* os image info */
|
2008-08-15 13:24:36 +00:00
|
|
|
ulong ep; /* entry point of OS */
|
|
|
|
|
2008-08-15 13:24:37 +00:00
|
|
|
ulong rd_start, rd_end;/* ramdisk start/end */
|
|
|
|
|
2008-08-15 13:24:38 +00:00
|
|
|
char *ft_addr; /* flat dev tree address */
|
|
|
|
ulong ft_len; /* length of flat device tree */
|
|
|
|
|
bootm: Add subcommands
Add the ability to break the steps of the bootm command into several
subcommands: start, loados, ramdisk, fdt, bdt, cmdline, prep, go.
This allows us to do things like manipulate device trees before
they are passed to a booting kernel or setup memory for a secondary
core in multicore situations.
Not all OS types support all subcommands (currently only start, loados,
ramdisk, fdt, and go are supported).
Signed-off-by: Kumar Gala <galak@kernel.crashing.org>
2008-10-21 22:25:45 +00:00
|
|
|
ulong initrd_start;
|
|
|
|
ulong initrd_end;
|
|
|
|
ulong cmdline_start;
|
|
|
|
ulong cmdline_end;
|
2020-06-26 06:13:33 +00:00
|
|
|
struct bd_info *kbd;
|
bootm: Add subcommands
Add the ability to break the steps of the bootm command into several
subcommands: start, loados, ramdisk, fdt, bdt, cmdline, prep, go.
This allows us to do things like manipulate device trees before
they are passed to a booting kernel or setup memory for a secondary
core in multicore situations.
Not all OS types support all subcommands (currently only start, loados,
ramdisk, fdt, and go are supported).
Signed-off-by: Kumar Gala <galak@kernel.crashing.org>
2008-10-21 22:25:45 +00:00
|
|
|
#endif
|
|
|
|
|
2017-08-03 18:22:12 +00:00
|
|
|
int verify; /* env_get("verify")[0] != 'n' */
|
bootm: Add subcommands
Add the ability to break the steps of the bootm command into several
subcommands: start, loados, ramdisk, fdt, bdt, cmdline, prep, go.
This allows us to do things like manipulate device trees before
they are passed to a booting kernel or setup memory for a secondary
core in multicore situations.
Not all OS types support all subcommands (currently only start, loados,
ramdisk, fdt, and go are supported).
Signed-off-by: Kumar Gala <galak@kernel.crashing.org>
2008-10-21 22:25:45 +00:00
|
|
|
|
2022-09-07 02:26:49 +00:00
|
|
|
#define BOOTM_STATE_START 0x00000001
|
|
|
|
#define BOOTM_STATE_FINDOS 0x00000002
|
|
|
|
#define BOOTM_STATE_FINDOTHER 0x00000004
|
|
|
|
#define BOOTM_STATE_LOADOS 0x00000008
|
|
|
|
#define BOOTM_STATE_RAMDISK 0x00000010
|
|
|
|
#define BOOTM_STATE_FDT 0x00000020
|
|
|
|
#define BOOTM_STATE_OS_CMDLINE 0x00000040
|
|
|
|
#define BOOTM_STATE_OS_BD_T 0x00000080
|
|
|
|
#define BOOTM_STATE_OS_PREP 0x00000100
|
|
|
|
#define BOOTM_STATE_OS_FAKE_GO 0x00000200 /* 'Almost' run the OS */
|
|
|
|
#define BOOTM_STATE_OS_GO 0x00000400
|
|
|
|
#define BOOTM_STATE_PRE_LOAD 0x00000800
|
bootm: Add subcommands
Add the ability to break the steps of the bootm command into several
subcommands: start, loados, ramdisk, fdt, bdt, cmdline, prep, go.
This allows us to do things like manipulate device trees before
they are passed to a booting kernel or setup memory for a secondary
core in multicore situations.
Not all OS types support all subcommands (currently only start, loados,
ramdisk, fdt, and go are supported).
Signed-off-by: Kumar Gala <galak@kernel.crashing.org>
2008-10-21 22:25:45 +00:00
|
|
|
int state;
|
|
|
|
|
2021-03-10 09:16:25 +00:00
|
|
|
#if defined(CONFIG_LMB) && !defined(USE_HOSTCC)
|
2008-08-15 13:24:40 +00:00
|
|
|
struct lmb lmb; /* for memory mgmt */
|
|
|
|
#endif
|
2022-09-07 02:26:50 +00:00
|
|
|
};
|
2008-02-04 07:28:09 +00:00
|
|
|
|
2022-08-28 18:32:53 +00:00
|
|
|
#ifdef CONFIG_LMB
|
|
|
|
#define images_lmb(_images) (&(_images)->lmb)
|
|
|
|
#else
|
|
|
|
#define images_lmb(_images) NULL
|
|
|
|
#endif
|
|
|
|
|
2022-09-07 02:26:50 +00:00
|
|
|
extern struct bootm_headers images;
|
2012-03-15 04:01:34 +00:00
|
|
|
|
2008-01-08 17:11:44 +00:00
|
|
|
/*
|
|
|
|
* Some systems (for example LWMON) have very short watchdog periods;
|
|
|
|
* we must make sure to split long operations like memmove() or
|
2008-04-25 11:54:02 +00:00
|
|
|
* checksum calculations into reasonable chunks.
|
2008-01-08 17:11:44 +00:00
|
|
|
*/
|
2008-04-25 11:54:02 +00:00
|
|
|
#ifndef CHUNKSZ
|
2008-01-08 17:11:44 +00:00
|
|
|
#define CHUNKSZ (64 * 1024)
|
2008-04-25 11:54:02 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef CHUNKSZ_CRC32
|
|
|
|
#define CHUNKSZ_CRC32 (64 * 1024)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef CHUNKSZ_MD5
|
|
|
|
#define CHUNKSZ_MD5 (64 * 1024)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef CHUNKSZ_SHA1
|
|
|
|
#define CHUNKSZ_SHA1 (64 * 1024)
|
|
|
|
#endif
|
2008-01-08 17:11:44 +00:00
|
|
|
|
2009-07-02 23:23:25 +00:00
|
|
|
#define uimage_to_cpu(x) be32_to_cpu(x)
|
|
|
|
#define cpu_to_uimage(x) cpu_to_be32(x)
|
2008-02-29 13:58:34 +00:00
|
|
|
|
2009-09-07 09:29:08 +00:00
|
|
|
/*
|
|
|
|
* Translation table for entries of a specific type; used by
|
|
|
|
* get_table_entry_id() and get_table_entry_name().
|
|
|
|
*/
|
|
|
|
typedef struct table_entry {
|
|
|
|
int id;
|
|
|
|
char *sname; /* short (input) name to find table entry */
|
|
|
|
char *lname; /* long (output) name to print for messages */
|
|
|
|
} table_entry_t;
|
|
|
|
|
2020-03-06 00:24:22 +00:00
|
|
|
/*
|
|
|
|
* Compression type and magic number mapping table.
|
|
|
|
*/
|
|
|
|
struct comp_magic_map {
|
|
|
|
int comp_id;
|
|
|
|
const char *name;
|
|
|
|
unsigned char magic[2];
|
|
|
|
};
|
|
|
|
|
2009-09-07 09:29:08 +00:00
|
|
|
/*
|
|
|
|
* get_table_entry_id() scans the translation table trying to find an
|
|
|
|
* entry that matches the given short name. If a matching entry is
|
|
|
|
* found, it's id is returned to the caller.
|
|
|
|
*/
|
2010-10-20 11:17:39 +00:00
|
|
|
int get_table_entry_id(const table_entry_t *table,
|
2009-09-07 09:29:08 +00:00
|
|
|
const char *table_name, const char *name);
|
|
|
|
/*
|
|
|
|
* get_table_entry_name() scans the translation table trying to find
|
|
|
|
* an entry that matches the given id. If a matching entry is found,
|
|
|
|
* its long name is returned to the caller.
|
|
|
|
*/
|
2010-10-20 11:17:39 +00:00
|
|
|
char *get_table_entry_name(const table_entry_t *table, char *msg, int id);
|
2009-09-07 09:29:08 +00:00
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
const char *genimg_get_os_name(uint8_t os);
|
2016-02-23 05:55:50 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* genimg_get_os_short_name() - get the short name for an OS
|
|
|
|
*
|
|
|
|
* @param os OS (IH_OS_...)
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: OS short name, or "unknown" if unknown
|
2016-02-23 05:55:50 +00:00
|
|
|
*/
|
|
|
|
const char *genimg_get_os_short_name(uint8_t comp);
|
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
const char *genimg_get_arch_name(uint8_t arch);
|
2016-02-23 05:55:50 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* genimg_get_arch_short_name() - get the short name for an architecture
|
|
|
|
*
|
|
|
|
* @param arch Architecture type (IH_ARCH_...)
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: architecture short name, or "unknown" if unknown
|
2016-02-23 05:55:50 +00:00
|
|
|
*/
|
|
|
|
const char *genimg_get_arch_short_name(uint8_t arch);
|
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
const char *genimg_get_type_name(uint8_t type);
|
2015-06-23 21:38:25 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* genimg_get_type_short_name() - get the short name for an image type
|
|
|
|
*
|
|
|
|
* @param type Image type (IH_TYPE_...)
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: image short name, or "unknown" if unknown
|
2015-06-23 21:38:25 +00:00
|
|
|
*/
|
|
|
|
const char *genimg_get_type_short_name(uint8_t type);
|
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
const char *genimg_get_comp_name(uint8_t comp);
|
2016-02-23 05:55:50 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* genimg_get_comp_short_name() - get the short name for a compression method
|
|
|
|
*
|
|
|
|
* @param comp compression method (IH_COMP_...)
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: compression method short name, or "unknown" if unknown
|
2016-02-23 05:55:50 +00:00
|
|
|
*/
|
|
|
|
const char *genimg_get_comp_short_name(uint8_t comp);
|
|
|
|
|
2016-06-30 16:52:16 +00:00
|
|
|
/**
|
|
|
|
* genimg_get_cat_name() - Get the name of an item in a category
|
|
|
|
*
|
|
|
|
* @category: Category of item
|
|
|
|
* @id: Item ID
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: name of item, or "Unknown ..." if unknown
|
2016-06-30 16:52:16 +00:00
|
|
|
*/
|
|
|
|
const char *genimg_get_cat_name(enum ih_category category, uint id);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* genimg_get_cat_short_name() - Get the short name of an item in a category
|
|
|
|
*
|
|
|
|
* @category: Category of item
|
|
|
|
* @id: Item ID
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: short name of item, or "Unknown ..." if unknown
|
2016-06-30 16:52:16 +00:00
|
|
|
*/
|
|
|
|
const char *genimg_get_cat_short_name(enum ih_category category, uint id);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* genimg_get_cat_count() - Get the number of items in a category
|
|
|
|
*
|
|
|
|
* @category: Category to check
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: the number of items in the category (IH_xxx_COUNT)
|
2016-06-30 16:52:16 +00:00
|
|
|
*/
|
|
|
|
int genimg_get_cat_count(enum ih_category category);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* genimg_get_cat_desc() - Get the description of a category
|
|
|
|
*
|
2020-10-07 02:22:24 +00:00
|
|
|
* @category: Category to check
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: the description of a category, e.g. "architecture". This
|
2016-06-30 16:52:16 +00:00
|
|
|
* effectively converts the enum to a string.
|
|
|
|
*/
|
|
|
|
const char *genimg_get_cat_desc(enum ih_category category);
|
|
|
|
|
2020-10-07 02:21:25 +00:00
|
|
|
/**
|
|
|
|
* genimg_cat_has_id() - Check whether a category has an item
|
|
|
|
*
|
|
|
|
* @category: Category to check
|
|
|
|
* @id: Item ID
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: true or false as to whether a category has an item
|
2020-10-07 02:21:25 +00:00
|
|
|
*/
|
|
|
|
bool genimg_cat_has_id(enum ih_category category, uint id);
|
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
int genimg_get_os_id(const char *name);
|
|
|
|
int genimg_get_arch_id(const char *name);
|
|
|
|
int genimg_get_type_id(const char *name);
|
|
|
|
int genimg_get_comp_id(const char *name);
|
|
|
|
void genimg_print_size(uint32_t size);
|
2008-02-29 14:59:59 +00:00
|
|
|
|
2021-09-26 01:43:33 +00:00
|
|
|
#if defined(CONFIG_TIMESTAMP) || defined(CONFIG_CMD_DATE) || defined(USE_HOSTCC)
|
2013-05-07 06:11:51 +00:00
|
|
|
#define IMAGE_ENABLE_TIMESTAMP 1
|
|
|
|
#else
|
|
|
|
#define IMAGE_ENABLE_TIMESTAMP 0
|
|
|
|
#endif
|
|
|
|
void genimg_print_time(time_t timestamp);
|
|
|
|
|
2013-05-16 13:53:21 +00:00
|
|
|
/* What to do with a image load address ('load = <> 'in the FIT) */
|
|
|
|
enum fit_load_op {
|
|
|
|
FIT_LOAD_IGNORED, /* Ignore load address */
|
|
|
|
FIT_LOAD_OPTIONAL, /* Can be provided, but optional */
|
2014-08-22 20:26:43 +00:00
|
|
|
FIT_LOAD_OPTIONAL_NON_ZERO, /* Optional, a value of 0 is ignored */
|
2013-05-16 13:53:21 +00:00
|
|
|
FIT_LOAD_REQUIRED, /* Must be provided */
|
|
|
|
};
|
|
|
|
|
2022-09-07 02:26:50 +00:00
|
|
|
int boot_get_setup(struct bootm_headers *images, uint8_t arch, ulong *setup_start,
|
2014-10-20 03:11:24 +00:00
|
|
|
ulong *setup_len);
|
|
|
|
|
2008-02-29 13:58:34 +00:00
|
|
|
/* Image format types, returned by _get_format() routine */
|
|
|
|
#define IMAGE_FORMAT_INVALID 0x00
|
|
|
|
#define IMAGE_FORMAT_LEGACY 0x01 /* legacy image_header based format */
|
|
|
|
#define IMAGE_FORMAT_FIT 0x02 /* new, libfdt based format */
|
2014-05-05 20:08:09 +00:00
|
|
|
#define IMAGE_FORMAT_ANDROID 0x03 /* Android boot image */
|
2008-02-29 13:58:34 +00:00
|
|
|
|
2014-08-15 23:51:38 +00:00
|
|
|
ulong genimg_get_kernel_addr_fit(char * const img_addr,
|
|
|
|
const char **fit_uname_config,
|
|
|
|
const char **fit_uname_kernel);
|
2014-08-01 00:39:58 +00:00
|
|
|
ulong genimg_get_kernel_addr(char * const img_addr);
|
2013-05-07 06:12:03 +00:00
|
|
|
int genimg_get_format(const void *img_addr);
|
2022-09-07 02:26:50 +00:00
|
|
|
int genimg_has_config(struct bootm_headers *images);
|
2008-02-29 13:58:34 +00:00
|
|
|
|
2022-09-07 02:26:50 +00:00
|
|
|
int boot_get_fpga(int argc, char *const argv[], struct bootm_headers *images,
|
2020-05-10 17:40:03 +00:00
|
|
|
uint8_t arch, const ulong *ld_start, ulong * const ld_len);
|
2022-09-07 02:26:50 +00:00
|
|
|
int boot_get_ramdisk(int argc, char *const argv[], struct bootm_headers *images,
|
2020-05-10 17:40:03 +00:00
|
|
|
uint8_t arch, ulong *rd_start, ulong *rd_end);
|
2015-05-21 13:52:48 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* boot_get_loadable - routine to load a list of binaries to memory
|
|
|
|
* @argc: Ignored Argument
|
|
|
|
* @argv: Ignored Argument
|
|
|
|
* @images: pointer to the bootm images structure
|
|
|
|
* @arch: expected architecture for the image
|
|
|
|
* @ld_start: Ignored Argument
|
|
|
|
* @ld_len: Ignored Argument
|
|
|
|
*
|
|
|
|
* boot_get_loadable() will take the given FIT configuration, and look
|
|
|
|
* for a field named "loadables". Loadables, is a list of elements in
|
|
|
|
* the FIT given as strings. exe:
|
2017-12-04 02:05:10 +00:00
|
|
|
* loadables = "linux_kernel", "fdt-2";
|
2015-05-21 13:52:48 +00:00
|
|
|
* this function will attempt to parse each string, and load the
|
|
|
|
* corresponding element from the FIT into memory. Once placed,
|
|
|
|
* no aditional actions are taken.
|
|
|
|
*
|
|
|
|
* @return:
|
|
|
|
* 0, if only valid images or no images are found
|
|
|
|
* error code, if an error occurs during fit_image_load
|
|
|
|
*/
|
2022-09-07 02:26:50 +00:00
|
|
|
int boot_get_loadable(int argc, char *const argv[], struct bootm_headers *images,
|
2020-05-10 17:40:03 +00:00
|
|
|
uint8_t arch, const ulong *ld_start, ulong *const ld_len);
|
2008-02-29 13:58:34 +00:00
|
|
|
|
2022-09-07 02:26:50 +00:00
|
|
|
int boot_get_setup_fit(struct bootm_headers *images, uint8_t arch,
|
2014-10-20 03:11:24 +00:00
|
|
|
ulong *setup_start, ulong *setup_len);
|
|
|
|
|
2017-09-04 20:12:16 +00:00
|
|
|
/**
|
|
|
|
* boot_get_fdt_fit() - load a DTB from a FIT file (applying overlays)
|
|
|
|
*
|
|
|
|
* This deals with all aspects of loading an DTB from a FIT.
|
|
|
|
* The correct base image based on configuration will be selected, and
|
|
|
|
* then any overlays specified will be applied (as present in fit_uname_configp).
|
|
|
|
*
|
|
|
|
* @param images Boot images structure
|
|
|
|
* @param addr Address of FIT in memory
|
|
|
|
* @param fit_unamep On entry this is the requested image name
|
2017-12-04 02:05:10 +00:00
|
|
|
* (e.g. "kernel") or NULL to use the default. On exit
|
2017-09-04 20:12:16 +00:00
|
|
|
* points to the selected image name
|
|
|
|
* @param fit_uname_configp On entry this is the requested configuration
|
2017-12-04 02:05:10 +00:00
|
|
|
* name (e.g. "conf-1") or NULL to use the default. On
|
2017-09-04 20:12:16 +00:00
|
|
|
* exit points to the selected configuration name.
|
|
|
|
* @param arch Expected architecture (IH_ARCH_...)
|
|
|
|
* @param datap Returns address of loaded image
|
|
|
|
* @param lenp Returns length of loaded image
|
|
|
|
*
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: node offset of base image, or -ve error code on error
|
2017-09-04 20:12:16 +00:00
|
|
|
*/
|
2022-09-07 02:26:50 +00:00
|
|
|
int boot_get_fdt_fit(struct bootm_headers *images, ulong addr,
|
|
|
|
const char **fit_unamep, const char **fit_uname_configp,
|
|
|
|
int arch, ulong *datap, ulong *lenp);
|
2017-09-04 20:12:16 +00:00
|
|
|
|
2013-05-16 13:53:21 +00:00
|
|
|
/**
|
|
|
|
* fit_image_load() - load an image from a FIT
|
|
|
|
*
|
|
|
|
* This deals with all aspects of loading an image from a FIT, including
|
|
|
|
* selecting the right image based on configuration, verifying it, printing
|
|
|
|
* out progress messages, checking the type/arch/os and optionally copying it
|
|
|
|
* to the right load address.
|
|
|
|
*
|
2014-06-12 13:24:47 +00:00
|
|
|
* The property to look up is defined by image_type.
|
|
|
|
*
|
2013-05-16 13:53:21 +00:00
|
|
|
* @param images Boot images structure
|
|
|
|
* @param addr Address of FIT in memory
|
|
|
|
* @param fit_unamep On entry this is the requested image name
|
2017-12-04 02:05:10 +00:00
|
|
|
* (e.g. "kernel") or NULL to use the default. On exit
|
2013-05-16 13:53:21 +00:00
|
|
|
* points to the selected image name
|
2013-07-11 06:08:10 +00:00
|
|
|
* @param fit_uname_configp On entry this is the requested configuration
|
2017-12-04 02:05:10 +00:00
|
|
|
* name (e.g. "conf-1") or NULL to use the default. On
|
2013-07-11 06:08:10 +00:00
|
|
|
* exit points to the selected configuration name.
|
2013-05-16 13:53:21 +00:00
|
|
|
* @param arch Expected architecture (IH_ARCH_...)
|
|
|
|
* @param image_type Required image type (IH_TYPE_...). If this is
|
|
|
|
* IH_TYPE_KERNEL then we allow IH_TYPE_KERNEL_NOLOAD
|
|
|
|
* also.
|
|
|
|
* @param bootstage_id ID of starting bootstage to use for progress updates.
|
|
|
|
* This will be added to the BOOTSTAGE_SUB values when
|
|
|
|
* calling bootstage_mark()
|
|
|
|
* @param load_op Decribes what to do with the load address
|
|
|
|
* @param datap Returns address of loaded image
|
|
|
|
* @param lenp Returns length of loaded image
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: node offset of image, or -ve error code on error
|
2013-05-16 13:53:21 +00:00
|
|
|
*/
|
2022-09-07 02:26:50 +00:00
|
|
|
int fit_image_load(struct bootm_headers *images, ulong addr,
|
2013-07-11 06:08:10 +00:00
|
|
|
const char **fit_unamep, const char **fit_uname_configp,
|
2013-05-16 13:53:21 +00:00
|
|
|
int arch, int image_type, int bootstage_id,
|
|
|
|
enum fit_load_op load_op, ulong *datap, ulong *lenp);
|
|
|
|
|
2019-12-28 17:45:04 +00:00
|
|
|
/**
|
|
|
|
* image_source_script() - Execute a script
|
|
|
|
*
|
|
|
|
* Executes a U-Boot script at a particular address in memory. The script should
|
|
|
|
* have a header (FIT or legacy) with the script type (IH_TYPE_SCRIPT).
|
|
|
|
*
|
|
|
|
* @addr: Address of script
|
|
|
|
* @fit_uname: FIT subimage name
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: result code (enum command_ret_t)
|
2019-12-28 17:45:04 +00:00
|
|
|
*/
|
|
|
|
int image_source_script(ulong addr, const char *fit_uname);
|
|
|
|
|
2013-05-16 13:53:21 +00:00
|
|
|
/**
|
|
|
|
* fit_get_node_from_config() - Look up an image a FIT by type
|
|
|
|
*
|
2017-12-04 02:05:10 +00:00
|
|
|
* This looks in the selected conf- node (images->fit_uname_cfg) for a
|
2013-05-16 13:53:21 +00:00
|
|
|
* particular image type (e.g. "kernel") and then finds the image that is
|
|
|
|
* referred to.
|
|
|
|
*
|
|
|
|
* For example, for something like:
|
|
|
|
*
|
|
|
|
* images {
|
2017-12-04 02:05:10 +00:00
|
|
|
* kernel {
|
2013-05-16 13:53:21 +00:00
|
|
|
* ...
|
|
|
|
* };
|
|
|
|
* };
|
|
|
|
* configurations {
|
2017-12-04 02:05:10 +00:00
|
|
|
* conf-1 {
|
|
|
|
* kernel = "kernel";
|
2013-05-16 13:53:21 +00:00
|
|
|
* };
|
|
|
|
* };
|
|
|
|
*
|
|
|
|
* the function will return the node offset of the kernel@1 node, assuming
|
2017-12-04 02:05:10 +00:00
|
|
|
* that conf-1 is the chosen configuration.
|
2013-05-16 13:53:21 +00:00
|
|
|
*
|
|
|
|
* @param images Boot images structure
|
|
|
|
* @param prop_name Property name to look up (FIT_..._PROP)
|
|
|
|
* @param addr Address of FIT in memory
|
|
|
|
*/
|
2022-09-07 02:26:50 +00:00
|
|
|
int fit_get_node_from_config(struct bootm_headers *images,
|
|
|
|
const char *prop_name, ulong addr);
|
2013-05-16 13:53:21 +00:00
|
|
|
|
2020-05-10 17:40:03 +00:00
|
|
|
int boot_get_fdt(int flag, int argc, char *const argv[], uint8_t arch,
|
2022-09-07 02:26:50 +00:00
|
|
|
struct bootm_headers *images,
|
2013-05-16 13:53:23 +00:00
|
|
|
char **of_flat_tree, ulong *of_size);
|
2011-03-28 09:59:01 +00:00
|
|
|
void boot_fdt_add_mem_rsv_regions(struct lmb *lmb, void *fdt_blob);
|
2011-10-18 11:11:49 +00:00
|
|
|
int boot_relocate_fdt(struct lmb *lmb, char **of_flat_tree, ulong *of_size);
|
2008-08-15 13:24:38 +00:00
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
int boot_ramdisk_high(struct lmb *lmb, ulong rd_data, ulong rd_len,
|
2008-02-29 13:58:34 +00:00
|
|
|
ulong *initrd_start, ulong *initrd_end);
|
2011-10-18 11:11:49 +00:00
|
|
|
int boot_get_cmdline(struct lmb *lmb, ulong *cmd_start, ulong *cmd_end);
|
2020-06-26 06:13:33 +00:00
|
|
|
int boot_get_kbd(struct lmb *lmb, struct bd_info **kbd);
|
2008-01-08 17:14:09 +00:00
|
|
|
|
2008-02-29 13:58:34 +00:00
|
|
|
/*******************************************************************/
|
|
|
|
/* Legacy format specific code (prefixed with image_) */
|
|
|
|
/*******************************************************************/
|
2011-10-18 11:11:49 +00:00
|
|
|
static inline uint32_t image_get_header_size(void)
|
2008-01-08 17:14:09 +00:00
|
|
|
{
|
2011-10-18 11:11:49 +00:00
|
|
|
return (sizeof(image_header_t));
|
2008-01-08 17:14:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#define image_get_hdr_l(f) \
|
2009-08-19 09:42:56 +00:00
|
|
|
static inline uint32_t image_get_##f(const image_header_t *hdr) \
|
2008-01-08 17:14:09 +00:00
|
|
|
{ \
|
2011-10-18 11:11:49 +00:00
|
|
|
return uimage_to_cpu(hdr->ih_##f); \
|
2008-01-08 17:14:09 +00:00
|
|
|
}
|
2011-10-18 11:11:49 +00:00
|
|
|
image_get_hdr_l(magic) /* image_get_magic */
|
|
|
|
image_get_hdr_l(hcrc) /* image_get_hcrc */
|
|
|
|
image_get_hdr_l(time) /* image_get_time */
|
|
|
|
image_get_hdr_l(size) /* image_get_size */
|
|
|
|
image_get_hdr_l(load) /* image_get_load */
|
|
|
|
image_get_hdr_l(ep) /* image_get_ep */
|
|
|
|
image_get_hdr_l(dcrc) /* image_get_dcrc */
|
2008-01-08 17:14:09 +00:00
|
|
|
|
|
|
|
#define image_get_hdr_b(f) \
|
2009-08-19 09:42:56 +00:00
|
|
|
static inline uint8_t image_get_##f(const image_header_t *hdr) \
|
2008-01-08 17:14:09 +00:00
|
|
|
{ \
|
|
|
|
return hdr->ih_##f; \
|
|
|
|
}
|
2011-10-18 11:11:49 +00:00
|
|
|
image_get_hdr_b(os) /* image_get_os */
|
|
|
|
image_get_hdr_b(arch) /* image_get_arch */
|
|
|
|
image_get_hdr_b(type) /* image_get_type */
|
|
|
|
image_get_hdr_b(comp) /* image_get_comp */
|
2008-01-08 17:14:09 +00:00
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
static inline char *image_get_name(const image_header_t *hdr)
|
2008-01-08 17:14:09 +00:00
|
|
|
{
|
|
|
|
return (char *)hdr->ih_name;
|
|
|
|
}
|
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
static inline uint32_t image_get_data_size(const image_header_t *hdr)
|
2008-01-08 17:14:09 +00:00
|
|
|
{
|
2011-10-18 11:11:49 +00:00
|
|
|
return image_get_size(hdr);
|
2008-01-08 17:14:09 +00:00
|
|
|
}
|
2008-01-08 17:12:17 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* image_get_data - get image payload start address
|
|
|
|
* @hdr: image header
|
|
|
|
*
|
|
|
|
* image_get_data() returns address of the image payload. For single
|
|
|
|
* component images it is image data start. For multi component
|
|
|
|
* images it points to the null terminated table of sub-images sizes.
|
|
|
|
*
|
|
|
|
* returns:
|
|
|
|
* image payload data start address
|
|
|
|
*/
|
2011-10-18 11:11:49 +00:00
|
|
|
static inline ulong image_get_data(const image_header_t *hdr)
|
2008-01-08 17:12:17 +00:00
|
|
|
{
|
2011-10-18 11:11:49 +00:00
|
|
|
return ((ulong)hdr + image_get_header_size());
|
2008-01-08 17:12:17 +00:00
|
|
|
}
|
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
static inline uint32_t image_get_image_size(const image_header_t *hdr)
|
2008-01-08 17:14:09 +00:00
|
|
|
{
|
2011-10-18 11:11:49 +00:00
|
|
|
return (image_get_size(hdr) + image_get_header_size());
|
2008-01-08 17:14:09 +00:00
|
|
|
}
|
2011-10-18 11:11:49 +00:00
|
|
|
static inline ulong image_get_image_end(const image_header_t *hdr)
|
2008-01-08 17:14:09 +00:00
|
|
|
{
|
2011-10-18 11:11:49 +00:00
|
|
|
return ((ulong)hdr + image_get_image_size(hdr));
|
2008-01-08 17:14:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#define image_set_hdr_l(f) \
|
|
|
|
static inline void image_set_##f(image_header_t *hdr, uint32_t val) \
|
|
|
|
{ \
|
2011-10-18 11:11:49 +00:00
|
|
|
hdr->ih_##f = cpu_to_uimage(val); \
|
2008-01-08 17:14:09 +00:00
|
|
|
}
|
2011-10-18 11:11:49 +00:00
|
|
|
image_set_hdr_l(magic) /* image_set_magic */
|
|
|
|
image_set_hdr_l(hcrc) /* image_set_hcrc */
|
|
|
|
image_set_hdr_l(time) /* image_set_time */
|
|
|
|
image_set_hdr_l(size) /* image_set_size */
|
|
|
|
image_set_hdr_l(load) /* image_set_load */
|
|
|
|
image_set_hdr_l(ep) /* image_set_ep */
|
|
|
|
image_set_hdr_l(dcrc) /* image_set_dcrc */
|
2008-01-08 17:14:09 +00:00
|
|
|
|
|
|
|
#define image_set_hdr_b(f) \
|
|
|
|
static inline void image_set_##f(image_header_t *hdr, uint8_t val) \
|
|
|
|
{ \
|
|
|
|
hdr->ih_##f = val; \
|
|
|
|
}
|
2011-10-18 11:11:49 +00:00
|
|
|
image_set_hdr_b(os) /* image_set_os */
|
|
|
|
image_set_hdr_b(arch) /* image_set_arch */
|
|
|
|
image_set_hdr_b(type) /* image_set_type */
|
|
|
|
image_set_hdr_b(comp) /* image_set_comp */
|
2008-01-08 17:14:09 +00:00
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
static inline void image_set_name(image_header_t *hdr, const char *name)
|
2008-01-08 17:14:09 +00:00
|
|
|
{
|
2011-10-18 11:11:49 +00:00
|
|
|
strncpy(image_get_name(hdr), name, IH_NMLEN);
|
2008-01-08 17:14:09 +00:00
|
|
|
}
|
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
int image_check_hcrc(const image_header_t *hdr);
|
|
|
|
int image_check_dcrc(const image_header_t *hdr);
|
2008-01-08 17:11:45 +00:00
|
|
|
#ifndef USE_HOSTCC
|
2017-08-03 18:22:15 +00:00
|
|
|
ulong env_get_bootm_low(void);
|
|
|
|
phys_size_t env_get_bootm_size(void);
|
|
|
|
phys_size_t env_get_bootm_mapsize(void);
|
2008-01-08 17:11:45 +00:00
|
|
|
#endif
|
2014-06-12 13:24:53 +00:00
|
|
|
void memmove_wd(void *to, void *from, size_t len, ulong chunksz);
|
2008-01-08 17:14:09 +00:00
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
static inline int image_check_magic(const image_header_t *hdr)
|
2008-01-08 17:14:09 +00:00
|
|
|
{
|
2011-10-18 11:11:49 +00:00
|
|
|
return (image_get_magic(hdr) == IH_MAGIC);
|
2008-01-08 17:14:09 +00:00
|
|
|
}
|
2011-10-18 11:11:49 +00:00
|
|
|
static inline int image_check_type(const image_header_t *hdr, uint8_t type)
|
2008-01-08 17:14:09 +00:00
|
|
|
{
|
2011-10-18 11:11:49 +00:00
|
|
|
return (image_get_type(hdr) == type);
|
2008-01-08 17:14:09 +00:00
|
|
|
}
|
2011-10-18 11:11:49 +00:00
|
|
|
static inline int image_check_arch(const image_header_t *hdr, uint8_t arch)
|
2008-01-08 17:14:09 +00:00
|
|
|
{
|
2021-03-15 05:11:12 +00:00
|
|
|
/* Let's assume that sandbox can load any architecture */
|
2021-09-26 01:43:33 +00:00
|
|
|
if (!tools_build() && IS_ENABLED(CONFIG_SANDBOX))
|
2021-03-15 05:11:12 +00:00
|
|
|
return true;
|
2017-06-06 07:32:40 +00:00
|
|
|
return (image_get_arch(hdr) == arch) ||
|
|
|
|
(image_get_arch(hdr) == IH_ARCH_ARM && arch == IH_ARCH_ARM64);
|
2008-01-08 17:14:09 +00:00
|
|
|
}
|
2011-10-18 11:11:49 +00:00
|
|
|
static inline int image_check_os(const image_header_t *hdr, uint8_t os)
|
2008-01-08 17:14:09 +00:00
|
|
|
{
|
2011-10-18 11:11:49 +00:00
|
|
|
return (image_get_os(hdr) == os);
|
2008-01-08 17:14:09 +00:00
|
|
|
}
|
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
ulong image_multi_count(const image_header_t *hdr);
|
|
|
|
void image_multi_getimg(const image_header_t *hdr, ulong idx,
|
2008-01-31 12:20:07 +00:00
|
|
|
ulong *data, ulong *len);
|
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
void image_print_contents(const void *hdr);
|
2008-02-29 14:59:59 +00:00
|
|
|
|
2008-01-08 17:14:09 +00:00
|
|
|
#ifndef USE_HOSTCC
|
2011-10-18 11:11:49 +00:00
|
|
|
static inline int image_check_target_arch(const image_header_t *hdr)
|
2008-01-08 17:14:09 +00:00
|
|
|
{
|
2011-10-03 14:50:33 +00:00
|
|
|
#ifndef IH_ARCH_DEFAULT
|
|
|
|
# error "please define IH_ARCH_DEFAULT in your arch asm/u-boot.h"
|
2008-01-08 17:14:09 +00:00
|
|
|
#endif
|
2011-10-03 14:50:33 +00:00
|
|
|
return image_check_arch(hdr, IH_ARCH_DEFAULT);
|
2008-01-08 17:14:09 +00:00
|
|
|
}
|
2008-02-29 20:24:06 +00:00
|
|
|
#endif /* USE_HOSTCC */
|
2002-11-03 00:07:02 +00:00
|
|
|
|
2020-03-06 00:24:22 +00:00
|
|
|
/**
|
|
|
|
* image_decomp_type() - Find out compression type of an image
|
|
|
|
*
|
|
|
|
* @buf: Address in U-Boot memory where image is loaded.
|
|
|
|
* @len: Length of the compressed image.
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: compression type or IH_COMP_NONE if not compressed.
|
2020-03-06 00:24:22 +00:00
|
|
|
*
|
|
|
|
* Note: Only following compression types are supported now.
|
|
|
|
* lzo, lzma, gzip, bzip2
|
|
|
|
*/
|
|
|
|
int image_decomp_type(const unsigned char *buf, ulong len);
|
|
|
|
|
2019-07-25 02:37:54 +00:00
|
|
|
/**
|
|
|
|
* image_decomp() - decompress an image
|
|
|
|
*
|
|
|
|
* @comp: Compression algorithm that is used (IH_COMP_...)
|
|
|
|
* @load: Destination load address in U-Boot memory
|
|
|
|
* @image_start Image start address (where we are decompressing from)
|
|
|
|
* @type: OS type (IH_OS_...)
|
|
|
|
* @load_bug: Place to decompress to
|
|
|
|
* @image_buf: Address to decompress from
|
|
|
|
* @image_len: Number of bytes in @image_buf to decompress
|
|
|
|
* @unc_len: Available space for decompression
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: 0 if OK, -ve on error (BOOTM_ERR_...)
|
2019-07-25 02:37:54 +00:00
|
|
|
*/
|
|
|
|
int image_decomp(int comp, ulong load, ulong image_start, int type,
|
|
|
|
void *load_buf, void *image_buf, ulong image_len,
|
|
|
|
uint unc_len, ulong *load_end);
|
|
|
|
|
2013-05-08 08:06:01 +00:00
|
|
|
/**
|
|
|
|
* Set up properties in the FDT
|
|
|
|
*
|
|
|
|
* This sets up properties in the FDT that is to be passed to linux.
|
|
|
|
*
|
|
|
|
* @images: Images information
|
|
|
|
* @blob: FDT to update
|
|
|
|
* @of_size: Size of the FDT
|
|
|
|
* @lmb: Points to logical memory block structure
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: 0 if ok, <0 on failure
|
2013-05-08 08:06:01 +00:00
|
|
|
*/
|
2022-09-07 02:26:50 +00:00
|
|
|
int image_setup_libfdt(struct bootm_headers *images, void *blob,
|
2013-05-08 08:06:01 +00:00
|
|
|
int of_size, struct lmb *lmb);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set up the FDT to use for booting a kernel
|
|
|
|
*
|
|
|
|
* This performs ramdisk setup, sets up the FDT if required, and adds
|
|
|
|
* paramters to the FDT if libfdt is available.
|
|
|
|
*
|
|
|
|
* @param images Images information
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: 0 if ok, <0 on failure
|
2013-05-08 08:06:01 +00:00
|
|
|
*/
|
2022-09-07 02:26:50 +00:00
|
|
|
int image_setup_linux(struct bootm_headers *images);
|
2013-05-08 08:06:01 +00:00
|
|
|
|
2013-07-04 20:26:10 +00:00
|
|
|
/**
|
|
|
|
* bootz_setup() - Extract stat and size of a Linux xImage
|
|
|
|
*
|
|
|
|
* @image: Address of image
|
|
|
|
* @start: Returns start address of image
|
|
|
|
* @end : Returns end address of image
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: 0 if OK, 1 if the image was not recognised
|
2013-07-04 20:26:10 +00:00
|
|
|
*/
|
|
|
|
int bootz_setup(ulong image, ulong *start, ulong *end);
|
|
|
|
|
2018-01-27 05:59:09 +00:00
|
|
|
/**
|
|
|
|
* Return the correct start address and size of a Linux aarch64 Image.
|
|
|
|
*
|
|
|
|
* @image: Address of image
|
|
|
|
* @start: Returns start address of image
|
|
|
|
* @size : Returns size image
|
2018-06-13 04:13:32 +00:00
|
|
|
* @force_reloc: Ignore image->ep field, always place image to RAM start
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: 0 if OK, 1 if the image was not recognised
|
2018-01-27 05:59:09 +00:00
|
|
|
*/
|
2018-06-13 04:13:32 +00:00
|
|
|
int booti_setup(ulong image, ulong *relocated_addr, ulong *size,
|
|
|
|
bool force_reloc);
|
2013-07-04 20:26:10 +00:00
|
|
|
|
2008-02-04 07:28:09 +00:00
|
|
|
/*******************************************************************/
|
2008-02-29 13:58:34 +00:00
|
|
|
/* New uImage format specific code (prefixed with fit_) */
|
2008-02-04 07:28:09 +00:00
|
|
|
/*******************************************************************/
|
2008-02-29 20:24:06 +00:00
|
|
|
|
|
|
|
#define FIT_IMAGES_PATH "/images"
|
|
|
|
#define FIT_CONFS_PATH "/configurations"
|
|
|
|
|
2020-03-18 17:44:06 +00:00
|
|
|
/* hash/signature/key node */
|
2008-02-29 20:24:06 +00:00
|
|
|
#define FIT_HASH_NODENAME "hash"
|
|
|
|
#define FIT_ALGO_PROP "algo"
|
|
|
|
#define FIT_VALUE_PROP "value"
|
2012-08-17 10:34:39 +00:00
|
|
|
#define FIT_IGNORE_PROP "uboot-ignore"
|
2013-06-13 22:10:00 +00:00
|
|
|
#define FIT_SIG_NODENAME "signature"
|
2020-03-18 17:44:06 +00:00
|
|
|
#define FIT_KEY_REQUIRED "required"
|
|
|
|
#define FIT_KEY_HINT "key-name-hint"
|
2008-02-29 20:24:06 +00:00
|
|
|
|
2019-12-18 17:25:41 +00:00
|
|
|
/* cipher node */
|
|
|
|
#define FIT_CIPHER_NODENAME "cipher"
|
|
|
|
#define FIT_ALGO_PROP "algo"
|
|
|
|
|
2008-02-29 20:24:06 +00:00
|
|
|
/* image node */
|
|
|
|
#define FIT_DATA_PROP "data"
|
2017-12-05 05:20:59 +00:00
|
|
|
#define FIT_DATA_POSITION_PROP "data-position"
|
2017-01-13 11:20:14 +00:00
|
|
|
#define FIT_DATA_OFFSET_PROP "data-offset"
|
|
|
|
#define FIT_DATA_SIZE_PROP "data-size"
|
2008-02-29 20:24:06 +00:00
|
|
|
#define FIT_TIMESTAMP_PROP "timestamp"
|
|
|
|
#define FIT_DESC_PROP "description"
|
|
|
|
#define FIT_ARCH_PROP "arch"
|
|
|
|
#define FIT_TYPE_PROP "type"
|
|
|
|
#define FIT_OS_PROP "os"
|
|
|
|
#define FIT_COMP_PROP "compression"
|
|
|
|
#define FIT_ENTRY_PROP "entry"
|
|
|
|
#define FIT_LOAD_PROP "load"
|
|
|
|
|
|
|
|
/* configuration node */
|
|
|
|
#define FIT_KERNEL_PROP "kernel"
|
|
|
|
#define FIT_RAMDISK_PROP "ramdisk"
|
|
|
|
#define FIT_FDT_PROP "fdt"
|
2015-05-21 13:52:47 +00:00
|
|
|
#define FIT_LOADABLE_PROP "loadables"
|
2008-02-29 20:24:06 +00:00
|
|
|
#define FIT_DEFAULT_PROP "default"
|
2014-10-20 03:11:24 +00:00
|
|
|
#define FIT_SETUP_PROP "setup"
|
2016-05-17 11:58:44 +00:00
|
|
|
#define FIT_FPGA_PROP "fpga"
|
2018-03-26 14:31:26 +00:00
|
|
|
#define FIT_FIRMWARE_PROP "firmware"
|
2018-05-12 22:22:54 +00:00
|
|
|
#define FIT_STANDALONE_PROP "standalone"
|
2008-02-29 20:24:06 +00:00
|
|
|
|
2014-05-30 18:59:00 +00:00
|
|
|
#define FIT_MAX_HASH_LEN HASH_MAX_DIGEST_SIZE
|
2008-02-29 20:24:06 +00:00
|
|
|
|
|
|
|
/* cmdline argument format parsing */
|
2012-04-22 06:59:06 +00:00
|
|
|
int fit_parse_conf(const char *spec, ulong addr_curr,
|
2008-02-21 16:20:20 +00:00
|
|
|
ulong *addr, const char **conf_name);
|
2012-04-22 06:59:06 +00:00
|
|
|
int fit_parse_subimage(const char *spec, ulong addr_curr,
|
2008-02-21 16:20:20 +00:00
|
|
|
ulong *addr, const char **image_name);
|
2008-02-04 07:28:09 +00:00
|
|
|
|
2015-01-15 04:54:42 +00:00
|
|
|
int fit_get_subimage_count(const void *fit, int images_noffset);
|
2011-10-18 11:11:49 +00:00
|
|
|
void fit_print_contents(const void *fit);
|
|
|
|
void fit_image_print(const void *fit, int noffset, const char *p);
|
2008-02-29 20:24:06 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* fit_get_end - get FIT image size
|
|
|
|
* @fit: pointer to the FIT format image header
|
|
|
|
*
|
|
|
|
* returns:
|
|
|
|
* size of the FIT image (blob) in memory
|
|
|
|
*/
|
2011-10-18 11:11:49 +00:00
|
|
|
static inline ulong fit_get_size(const void *fit)
|
2008-02-29 20:24:06 +00:00
|
|
|
{
|
2011-10-18 11:11:49 +00:00
|
|
|
return fdt_totalsize(fit);
|
2008-02-29 20:24:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* fit_get_end - get FIT image end
|
|
|
|
* @fit: pointer to the FIT format image header
|
|
|
|
*
|
|
|
|
* returns:
|
|
|
|
* end address of the FIT image (blob) in memory
|
|
|
|
*/
|
2016-02-24 16:14:42 +00:00
|
|
|
ulong fit_get_end(const void *fit);
|
2008-02-29 20:24:06 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* fit_get_name - get FIT node name
|
|
|
|
* @fit: pointer to the FIT format image header
|
|
|
|
*
|
|
|
|
* returns:
|
|
|
|
* NULL, on error
|
|
|
|
* pointer to node name, on success
|
|
|
|
*/
|
2011-10-18 11:11:49 +00:00
|
|
|
static inline const char *fit_get_name(const void *fit_hdr,
|
2008-02-29 20:24:06 +00:00
|
|
|
int noffset, int *len)
|
|
|
|
{
|
2011-10-18 11:11:49 +00:00
|
|
|
return fdt_get_name(fit_hdr, noffset, len);
|
2008-02-29 20:24:06 +00:00
|
|
|
}
|
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
int fit_get_desc(const void *fit, int noffset, char **desc);
|
|
|
|
int fit_get_timestamp(const void *fit, int noffset, time_t *timestamp);
|
|
|
|
|
|
|
|
int fit_image_get_node(const void *fit, const char *image_uname);
|
|
|
|
int fit_image_get_os(const void *fit, int noffset, uint8_t *os);
|
|
|
|
int fit_image_get_arch(const void *fit, int noffset, uint8_t *arch);
|
|
|
|
int fit_image_get_type(const void *fit, int noffset, uint8_t *type);
|
|
|
|
int fit_image_get_comp(const void *fit, int noffset, uint8_t *comp);
|
|
|
|
int fit_image_get_load(const void *fit, int noffset, ulong *load);
|
|
|
|
int fit_image_get_entry(const void *fit, int noffset, ulong *entry);
|
|
|
|
int fit_image_get_data(const void *fit, int noffset,
|
2008-02-29 20:24:06 +00:00
|
|
|
const void **data, size_t *size);
|
2017-01-13 11:20:14 +00:00
|
|
|
int fit_image_get_data_offset(const void *fit, int noffset, int *data_offset);
|
2017-12-05 05:20:59 +00:00
|
|
|
int fit_image_get_data_position(const void *fit, int noffset,
|
|
|
|
int *data_position);
|
2017-01-13 11:20:14 +00:00
|
|
|
int fit_image_get_data_size(const void *fit, int noffset, int *data_size);
|
2019-12-18 17:25:42 +00:00
|
|
|
int fit_image_get_data_size_unciphered(const void *fit, int noffset,
|
|
|
|
size_t *data_size);
|
2018-05-19 10:21:37 +00:00
|
|
|
int fit_image_get_data_and_size(const void *fit, int noffset,
|
|
|
|
const void **data, size_t *size);
|
2008-02-29 20:24:06 +00:00
|
|
|
|
2022-08-16 15:16:03 +00:00
|
|
|
/**
|
|
|
|
* fit_get_data_node() - Get verified image data for an image
|
|
|
|
* @fit: Pointer to the FIT format image header
|
|
|
|
* @image_uname: The name of the image node
|
|
|
|
* @data: A pointer which will be filled with the location of the image data
|
|
|
|
* @size: A pointer which will be filled with the size of the image data
|
|
|
|
*
|
|
|
|
* This function looks up the location and size of an image specified by its
|
|
|
|
* name. For example, if you had a FIT like::
|
|
|
|
*
|
|
|
|
* images {
|
|
|
|
* my-firmware {
|
|
|
|
* ...
|
|
|
|
* };
|
|
|
|
* };
|
|
|
|
*
|
|
|
|
* Then you could look up the data location and size of the my-firmware image
|
|
|
|
* by calling this function with @image_uname set to "my-firmware". This
|
|
|
|
* function also verifies the image data (if enabled) before returning. The
|
|
|
|
* image description is printed out on success. @data and @size will not be
|
|
|
|
* modified on faulure.
|
|
|
|
*
|
|
|
|
* Return:
|
|
|
|
* * 0 on success
|
|
|
|
* * -EINVAL if the image could not be verified
|
|
|
|
* * -ENOENT if there was a problem getting the data/size
|
|
|
|
* * Another negative error if there was a problem looking up the image node.
|
|
|
|
*/
|
|
|
|
int fit_get_data_node(const void *fit, const char *image_uname,
|
|
|
|
const void **data, size_t *size);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* fit_get_data_conf_prop() - Get verified image data for a property in /conf
|
|
|
|
* @fit: Pointer to the FIT format image header
|
|
|
|
* @prop_name: The name of the property in /conf referencing the image
|
|
|
|
* @data: A pointer which will be filled with the location of the image data
|
|
|
|
* @size: A pointer which will be filled with the size of the image data
|
|
|
|
*
|
|
|
|
* This function looks up the location and size of an image specified by a
|
|
|
|
* property in /conf. For example, if you had a FIT like::
|
|
|
|
*
|
|
|
|
* images {
|
|
|
|
* my-firmware {
|
|
|
|
* ...
|
|
|
|
* };
|
|
|
|
* };
|
|
|
|
*
|
|
|
|
* configurations {
|
|
|
|
* default = "conf-1";
|
|
|
|
* conf-1 {
|
|
|
|
* some-firmware = "my-firmware";
|
|
|
|
* };
|
|
|
|
* };
|
|
|
|
*
|
|
|
|
* Then you could look up the data location and size of the my-firmware image
|
|
|
|
* by calling this function with @prop_name set to "some-firmware". This
|
|
|
|
* function also verifies the image data (if enabled) before returning. The
|
|
|
|
* image description is printed out on success. @data and @size will not be
|
|
|
|
* modified on faulure.
|
|
|
|
*
|
|
|
|
* Return:
|
|
|
|
* * 0 on success
|
|
|
|
* * -EINVAL if the image could not be verified
|
|
|
|
* * -ENOENT if there was a problem getting the data/size
|
|
|
|
* * Another negative error if there was a problem looking up the configuration
|
|
|
|
* or image node.
|
|
|
|
*/
|
|
|
|
int fit_get_data_conf_prop(const void *fit, const char *prop_name,
|
|
|
|
const void **data, size_t *size);
|
|
|
|
|
2022-01-14 09:21:17 +00:00
|
|
|
int fit_image_hash_get_algo(const void *fit, int noffset, const char **algo);
|
2011-10-18 11:11:49 +00:00
|
|
|
int fit_image_hash_get_value(const void *fit, int noffset, uint8_t **value,
|
2008-02-29 20:24:06 +00:00
|
|
|
int *value_len);
|
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
int fit_set_timestamp(void *fit, int noffset, time_t timestamp);
|
2013-05-07 06:12:01 +00:00
|
|
|
|
2022-03-28 20:57:02 +00:00
|
|
|
/**
|
|
|
|
* fit_pre_load_data() - add public key to fdt blob
|
|
|
|
*
|
|
|
|
* Adds public key to the node pre load.
|
|
|
|
*
|
|
|
|
* @keydir: Directory containing keys
|
|
|
|
* @keydest: FDT blob to write public key
|
|
|
|
* @fit: Pointer to the FIT format image header
|
|
|
|
*
|
|
|
|
* returns:
|
|
|
|
* 0, on success
|
|
|
|
* < 0, on failure
|
|
|
|
*/
|
|
|
|
int fit_pre_load_data(const char *keydir, void *keydest, void *fit);
|
|
|
|
|
2019-12-18 17:25:41 +00:00
|
|
|
int fit_cipher_data(const char *keydir, void *keydest, void *fit,
|
|
|
|
const char *comment, int require_keys,
|
|
|
|
const char *engine_id, const char *cmdname);
|
|
|
|
|
2021-11-12 19:28:13 +00:00
|
|
|
#define NODE_MAX_NAME_LEN 80
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct image_summary - Provides information about signing info added
|
|
|
|
*
|
|
|
|
* @sig_offset: Offset of the node in the blob devicetree where the signature
|
|
|
|
* was wriiten
|
|
|
|
* @sig_path: Path to @sig_offset
|
|
|
|
* @keydest_offset: Offset of the node in the keydest devicetree where the
|
|
|
|
* public key was written (-1 if none)
|
|
|
|
* @keydest_path: Path to @keydest_offset
|
|
|
|
*/
|
|
|
|
struct image_summary {
|
|
|
|
int sig_offset;
|
|
|
|
char sig_path[NODE_MAX_NAME_LEN];
|
|
|
|
int keydest_offset;
|
|
|
|
char keydest_path[NODE_MAX_NAME_LEN];
|
|
|
|
};
|
|
|
|
|
2013-05-07 06:12:01 +00:00
|
|
|
/**
|
2013-06-13 22:10:01 +00:00
|
|
|
* fit_add_verification_data() - add verification data to FIT image nodes
|
2013-05-07 06:12:01 +00:00
|
|
|
*
|
2013-06-13 22:10:01 +00:00
|
|
|
* @keydir: Directory containing keys
|
2021-11-12 19:28:06 +00:00
|
|
|
* @kwydest: FDT blob to write public key information to (NULL if none)
|
2013-06-13 22:10:01 +00:00
|
|
|
* @fit: Pointer to the FIT format image header
|
|
|
|
* @comment: Comment to add to signature nodes
|
|
|
|
* @require_keys: Mark all keys as 'required'
|
2017-01-06 19:14:17 +00:00
|
|
|
* @engine_id: Engine to use for signing
|
2018-06-20 20:10:52 +00:00
|
|
|
* @cmdname: Command name used when reporting errors
|
2022-01-14 09:21:19 +00:00
|
|
|
* @algo_name: Algorithm name, or NULL if to be read from FIT
|
2021-11-12 19:28:13 +00:00
|
|
|
* @summary: Returns information about what data was written
|
2013-06-13 22:10:01 +00:00
|
|
|
*
|
|
|
|
* Adds hash values for all component images in the FIT blob.
|
|
|
|
* Hashes are calculated for all component images which have hash subnodes
|
|
|
|
* with algorithm property set to one of the supported hash algorithms.
|
|
|
|
*
|
|
|
|
* Also add signatures if signature nodes are present.
|
|
|
|
*
|
|
|
|
* returns
|
|
|
|
* 0, on success
|
|
|
|
* libfdt error code, on failure
|
2013-05-07 06:12:01 +00:00
|
|
|
*/
|
2021-02-19 18:45:17 +00:00
|
|
|
int fit_add_verification_data(const char *keydir, const char *keyfile,
|
|
|
|
void *keydest, void *fit, const char *comment,
|
|
|
|
int require_keys, const char *engine_id,
|
2021-11-12 19:28:13 +00:00
|
|
|
const char *cmdname, const char *algo_name,
|
|
|
|
struct image_summary *summary);
|
2008-02-29 20:24:06 +00:00
|
|
|
|
2021-11-12 19:28:10 +00:00
|
|
|
/**
|
|
|
|
* fit_image_verify_with_data() - Verify an image with given data
|
|
|
|
*
|
|
|
|
* @fit: Pointer to the FIT format image header
|
|
|
|
* @image_offset: Offset in @fit of image to verify
|
|
|
|
* @key_blob: FDT containing public keys
|
|
|
|
* @data: Image data to verify
|
|
|
|
* @size: Size of image data
|
|
|
|
*/
|
2018-02-27 08:55:58 +00:00
|
|
|
int fit_image_verify_with_data(const void *fit, int image_noffset,
|
2021-11-12 19:28:10 +00:00
|
|
|
const void *key_blob, const void *data,
|
|
|
|
size_t size);
|
|
|
|
|
2013-05-07 06:11:57 +00:00
|
|
|
int fit_image_verify(const void *fit, int noffset);
|
2013-05-16 13:53:21 +00:00
|
|
|
int fit_config_verify(const void *fit, int conf_noffset);
|
2013-05-07 06:11:57 +00:00
|
|
|
int fit_all_image_verify(const void *fit);
|
2019-12-18 17:25:42 +00:00
|
|
|
int fit_config_decrypt(const void *fit, int conf_noffset);
|
2011-10-18 11:11:49 +00:00
|
|
|
int fit_image_check_os(const void *fit, int noffset, uint8_t os);
|
|
|
|
int fit_image_check_arch(const void *fit, int noffset, uint8_t arch);
|
|
|
|
int fit_image_check_type(const void *fit, int noffset, uint8_t type);
|
|
|
|
int fit_image_check_comp(const void *fit, int noffset, uint8_t comp);
|
2021-02-16 00:08:09 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* fit_check_format() - Check that the FIT is valid
|
|
|
|
*
|
|
|
|
* This performs various checks on the FIT to make sure it is suitable for
|
|
|
|
* use, looking for mandatory properties, nodes, etc.
|
|
|
|
*
|
|
|
|
* If FIT_FULL_CHECK is enabled, it also runs it through libfdt to make
|
|
|
|
* sure that there are no strange tags or broken nodes in the FIT.
|
|
|
|
*
|
|
|
|
* @fit: pointer to the FIT format image header
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: 0 if OK, -ENOEXEC if not an FDT file, -EINVAL if the full FDT check
|
2021-02-16 00:08:09 +00:00
|
|
|
* failed (e.g. due to bad structure), -ENOMSG if the description is
|
2021-02-24 13:50:32 +00:00
|
|
|
* missing, -EBADMSG if the timestamp is missing, -ENOENT if the /images
|
2021-02-16 00:08:09 +00:00
|
|
|
* path is missing
|
|
|
|
*/
|
|
|
|
int fit_check_format(const void *fit, ulong size);
|
2008-02-29 20:24:06 +00:00
|
|
|
|
fdt: Add option to default to most compatible conf in a fit image
When booting a fit image with multiple configurations, the user either has to
specify which configuration to use explicitly, or there has to be a default
defined which is chosen automatically. This change adds an option to change
that behavior so that a configuration can be selected explicitly, or the
configuration which has the device tree that claims to be compatible with the
earliest item in U-Boot's device tree.
In other words, if U-Boot claimed to be compatible with A, B, and then C, and
the configurations claimed to be compatible with A, D and B, D and D, E, the
first configuration, A, D, would be chosen. Both the first and second
configurations match, but the first one matches a more specific entry in
U-Boot's device tree. The order in the kernel's device tree is ignored.
Signed-off-by: Gabe Black <gabeblack@google.com>
Commit-Ready: Gabe Black <gabeblack@chromium.org>
Signed-off-by: Simon Glass <sjg@chromium.org>
2012-10-25 16:31:10 +00:00
|
|
|
int fit_conf_find_compat(const void *fit, const void *fdt);
|
2020-03-18 17:43:55 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* fit_conf_get_node - get node offset for configuration of a given unit name
|
|
|
|
* @fit: pointer to the FIT format image header
|
|
|
|
* @conf_uname: configuration node unit name (NULL to use default)
|
|
|
|
*
|
|
|
|
* fit_conf_get_node() finds a configuration (within the '/configurations'
|
|
|
|
* parent node) of a provided unit name. If configuration is found its node
|
|
|
|
* offset is returned to the caller.
|
|
|
|
*
|
|
|
|
* When NULL is provided in second argument fit_conf_get_node() will search
|
|
|
|
* for a default configuration node instead. Default configuration node unit
|
|
|
|
* name is retrieved from FIT_DEFAULT_PROP property of the '/configurations'
|
|
|
|
* node.
|
|
|
|
*
|
|
|
|
* returns:
|
|
|
|
* configuration node offset when found (>=0)
|
|
|
|
* negative number on failure (FDT_ERR_* code)
|
|
|
|
*/
|
2011-10-18 11:11:49 +00:00
|
|
|
int fit_conf_get_node(const void *fit, const char *conf_uname);
|
2020-03-18 17:43:55 +00:00
|
|
|
|
2019-05-07 09:42:28 +00:00
|
|
|
int fit_conf_get_prop_node_count(const void *fit, int noffset,
|
|
|
|
const char *prop_name);
|
|
|
|
int fit_conf_get_prop_node_index(const void *fit, int noffset,
|
|
|
|
const char *prop_name, int index);
|
2008-02-29 20:24:06 +00:00
|
|
|
|
2013-05-07 06:12:00 +00:00
|
|
|
/**
|
|
|
|
* fit_conf_get_prop_node() - Get node refered to by a configuration
|
|
|
|
* @fit: FIT to check
|
|
|
|
* @noffset: Offset of conf@xxx node to check
|
|
|
|
* @prop_name: Property to read from the conf node
|
|
|
|
*
|
2017-12-04 02:05:10 +00:00
|
|
|
* The conf- nodes contain references to other nodes, using properties
|
|
|
|
* like 'kernel = "kernel"'. Given such a property name (e.g. "kernel"),
|
2013-05-07 06:12:00 +00:00
|
|
|
* return the offset of the node referred to (e.g. offset of node
|
2017-12-04 02:05:10 +00:00
|
|
|
* "/images/kernel".
|
2013-05-07 06:12:00 +00:00
|
|
|
*/
|
|
|
|
int fit_conf_get_prop_node(const void *fit, int noffset,
|
|
|
|
const char *prop_name);
|
|
|
|
|
2013-05-07 06:11:52 +00:00
|
|
|
int fit_check_ramdisk(const void *fit, int os_noffset,
|
|
|
|
uint8_t arch, int verify);
|
|
|
|
|
2013-05-07 06:11:54 +00:00
|
|
|
int calculate_hash(const void *data, int data_len, const char *algo,
|
|
|
|
uint8_t *value, int *value_len);
|
|
|
|
|
2013-05-16 13:53:21 +00:00
|
|
|
/*
|
2013-06-13 22:10:00 +00:00
|
|
|
* At present we only support signing on the host, and verification on the
|
|
|
|
* device
|
2013-05-16 13:53:21 +00:00
|
|
|
*/
|
2019-04-18 20:34:55 +00:00
|
|
|
#if defined(USE_HOSTCC)
|
|
|
|
# if defined(CONFIG_FIT_SIGNATURE)
|
2013-06-13 22:10:00 +00:00
|
|
|
# define IMAGE_ENABLE_SIGN 1
|
2020-02-21 06:12:55 +00:00
|
|
|
# define FIT_IMAGE_ENABLE_VERIFY 1
|
2019-04-18 20:34:55 +00:00
|
|
|
# include <openssl/evp.h>
|
|
|
|
# else
|
2013-06-13 22:10:00 +00:00
|
|
|
# define IMAGE_ENABLE_SIGN 0
|
2020-02-21 06:12:55 +00:00
|
|
|
# define FIT_IMAGE_ENABLE_VERIFY 0
|
2013-05-16 13:53:21 +00:00
|
|
|
# endif
|
|
|
|
#else
|
2013-06-13 22:10:00 +00:00
|
|
|
# define IMAGE_ENABLE_SIGN 0
|
2020-02-21 06:12:55 +00:00
|
|
|
# define FIT_IMAGE_ENABLE_VERIFY CONFIG_IS_ENABLED(FIT_SIGNATURE)
|
2013-05-16 13:53:21 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef USE_HOSTCC
|
2014-03-03 11:19:30 +00:00
|
|
|
void *image_get_host_blob(void);
|
|
|
|
void image_set_host_blob(void *host_blob);
|
|
|
|
# define gd_fdt_blob() image_get_host_blob()
|
2013-05-16 13:53:21 +00:00
|
|
|
#else
|
|
|
|
# define gd_fdt_blob() (gd->fdt_blob)
|
|
|
|
#endif
|
|
|
|
|
2021-02-19 18:45:17 +00:00
|
|
|
/*
|
|
|
|
* Information passed to the signing routines
|
|
|
|
*
|
|
|
|
* Either 'keydir', 'keyname', or 'keyfile' can be NULL. However, either
|
|
|
|
* 'keyfile', or both 'keydir' and 'keyname' should have valid values. If
|
|
|
|
* neither are valid, some operations might fail with EINVAL.
|
|
|
|
*/
|
2013-06-13 22:10:00 +00:00
|
|
|
struct image_sign_info {
|
|
|
|
const char *keydir; /* Directory conaining keys */
|
|
|
|
const char *keyname; /* Name of key to use */
|
2021-02-19 18:45:17 +00:00
|
|
|
const char *keyfile; /* Filename of private or public key */
|
2021-10-18 05:49:03 +00:00
|
|
|
const void *fit; /* Pointer to FIT blob */
|
2013-06-13 22:10:00 +00:00
|
|
|
int node_offset; /* Offset of signature node */
|
2016-11-08 18:53:41 +00:00
|
|
|
const char *name; /* Algorithm name */
|
|
|
|
struct checksum_algo *checksum; /* Checksum algorithm information */
|
2018-11-14 12:51:00 +00:00
|
|
|
struct padding_algo *padding; /* Padding algorithm information */
|
2016-11-08 18:53:41 +00:00
|
|
|
struct crypto_algo *crypto; /* Crypto algorithm information */
|
2013-06-13 22:10:00 +00:00
|
|
|
const void *fdt_blob; /* FDT containing public keys */
|
|
|
|
int required_keynode; /* Node offset of key to use: -1=any */
|
|
|
|
const char *require_keys; /* Value for 'required' property */
|
2017-01-06 19:14:17 +00:00
|
|
|
const char *engine_id; /* Engine to use for signing */
|
2020-02-21 06:12:57 +00:00
|
|
|
/*
|
|
|
|
* Note: the following two fields are always valid even w/o
|
|
|
|
* RSA_VERIFY_WITH_PKEY in order to make sure this structure is
|
|
|
|
* the same on target and host. Otherwise, vboot test may fail.
|
|
|
|
*/
|
|
|
|
const void *key; /* Pointer to public key in DER */
|
|
|
|
int keylen; /* Length of public key */
|
2013-06-13 22:10:00 +00:00
|
|
|
};
|
2019-12-18 17:25:41 +00:00
|
|
|
|
2013-06-13 22:10:00 +00:00
|
|
|
/* A part of an image, used for hashing */
|
|
|
|
struct image_region {
|
|
|
|
const void *data;
|
|
|
|
int size;
|
|
|
|
};
|
|
|
|
|
2014-03-03 11:19:26 +00:00
|
|
|
struct checksum_algo {
|
|
|
|
const char *name;
|
|
|
|
const int checksum_len;
|
2016-11-08 18:53:40 +00:00
|
|
|
const int der_len;
|
|
|
|
const uint8_t *der_prefix;
|
2014-03-03 11:19:26 +00:00
|
|
|
#if IMAGE_ENABLE_SIGN
|
2014-03-03 11:19:30 +00:00
|
|
|
const EVP_MD *(*calculate_sign)(void);
|
|
|
|
#endif
|
2015-01-23 10:31:59 +00:00
|
|
|
int (*calculate)(const char *name,
|
2021-09-26 01:43:33 +00:00
|
|
|
const struct image_region *region,
|
2015-01-23 10:31:59 +00:00
|
|
|
int region_count, uint8_t *checksum);
|
2014-03-03 11:19:26 +00:00
|
|
|
};
|
|
|
|
|
2016-11-08 18:53:41 +00:00
|
|
|
struct crypto_algo {
|
2013-06-13 22:10:00 +00:00
|
|
|
const char *name; /* Name of algorithm */
|
2016-11-08 18:53:41 +00:00
|
|
|
const int key_len;
|
2013-06-13 22:10:00 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* sign() - calculate and return signature for given input data
|
|
|
|
*
|
|
|
|
* @info: Specifies key and FIT information
|
|
|
|
* @data: Pointer to the input data
|
|
|
|
* @data_len: Data length
|
|
|
|
* @sigp: Set to an allocated buffer holding the signature
|
|
|
|
* @sig_len: Set to length of the calculated hash
|
|
|
|
*
|
|
|
|
* This computes input data signature according to selected algorithm.
|
|
|
|
* Resulting signature value is placed in an allocated buffer, the
|
|
|
|
* pointer is returned as *sigp. The length of the calculated
|
|
|
|
* signature is returned via the sig_len pointer argument. The caller
|
|
|
|
* should free *sigp.
|
|
|
|
*
|
|
|
|
* @return: 0, on success, -ve on error
|
|
|
|
*/
|
|
|
|
int (*sign)(struct image_sign_info *info,
|
|
|
|
const struct image_region region[],
|
|
|
|
int region_count, uint8_t **sigp, uint *sig_len);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* add_verify_data() - Add verification information to FDT
|
|
|
|
*
|
|
|
|
* Add public key information to the FDT node, suitable for
|
|
|
|
* verification at run-time. The information added depends on the
|
|
|
|
* algorithm being used.
|
|
|
|
*
|
|
|
|
* @info: Specifies key and FIT information
|
|
|
|
* @keydest: Destination FDT blob for public key data
|
2021-11-12 19:28:11 +00:00
|
|
|
* @return: node offset within the FDT blob where the data was written,
|
|
|
|
* or -ve on error
|
2013-06-13 22:10:00 +00:00
|
|
|
*/
|
|
|
|
int (*add_verify_data)(struct image_sign_info *info, void *keydest);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* verify() - Verify a signature against some data
|
|
|
|
*
|
|
|
|
* @info: Specifies key and FIT information
|
|
|
|
* @data: Pointer to the input data
|
|
|
|
* @data_len: Data length
|
|
|
|
* @sig: Signature
|
|
|
|
* @sig_len: Number of bytes in signature
|
|
|
|
* @return 0 if verified, -ve on error
|
|
|
|
*/
|
|
|
|
int (*verify)(struct image_sign_info *info,
|
|
|
|
const struct image_region region[], int region_count,
|
|
|
|
uint8_t *sig, uint sig_len);
|
2016-11-08 18:53:41 +00:00
|
|
|
};
|
2014-03-03 11:19:26 +00:00
|
|
|
|
2021-07-14 22:05:39 +00:00
|
|
|
/* Declare a new U-Boot crypto algorithm handler */
|
|
|
|
#define U_BOOT_CRYPTO_ALGO(__name) \
|
|
|
|
ll_entry_declare(struct crypto_algo, __name, cryptos)
|
|
|
|
|
2018-11-14 12:51:00 +00:00
|
|
|
struct padding_algo {
|
|
|
|
const char *name;
|
|
|
|
int (*verify)(struct image_sign_info *info,
|
2022-03-09 09:27:15 +00:00
|
|
|
const uint8_t *pad, int pad_len,
|
2018-11-14 12:51:00 +00:00
|
|
|
const uint8_t *hash, int hash_len);
|
|
|
|
};
|
|
|
|
|
image: rsa: Move padding_algos to linker lists
We are not guaranteed to have the padding_pkcs_15_verify symbol since
commit 92c960bc1d ("lib: rsa: Remove #ifdefs from rsa.h"), and
commit 61416fe9df ("Kconfig: FIT_SIGNATURE should not select RSA_VERIFY")
The padding_algos only make sense with RSA verification, which can now
be disabled in lieu of ECDSA. In fact this will lead to build failures
because of the missing symbol mentioned earlier.
To resolve this, move the padding_algos to a linker list, with
declarations moved to rsa_verify.c. This is consistent with commit
6909edb4ce ("image: rsa: Move verification algorithm to a linker list")
One could argue that the added #ifdef USE_HOSTCC is ugly, and should
be hidden within the U_BOOT_PADDING_ALGO() macro. However, this would
be inconsistent with the "cryptos" list. This logic for was not
previously explored:
Without knowledge of the U_BOOT_PADDING_ALGO() macro, its use is
similar to something being declared. However, should #ifndef
USE_HOSTCC be part of the macro, it would not be obvious that it
behaves differently on host code and target code. Having the #ifndef
outside the macro makes this obvious.
Also, the #ifdef is not always necessary. For example ecda-verify
makes use of U_BOOT_CRYPTO_ALGO() without any accompanying #ifdefs.
The fundamental issue is a lack of separation of host and target code
in rsa_verify. Therefore, the declaration of a padding algo with the
external #ifdef is more readable and consistent.
Signed-off-by: Alexandru Gagniuc <mr.nuke.me@gmail.com>
2021-08-18 22:49:02 +00:00
|
|
|
/* Declare a new U-Boot padding algorithm handler */
|
|
|
|
#define U_BOOT_PADDING_ALGO(__name) \
|
|
|
|
ll_entry_declare(struct padding_algo, __name, paddings)
|
|
|
|
|
2016-11-08 18:53:41 +00:00
|
|
|
/**
|
|
|
|
* image_get_checksum_algo() - Look up a checksum algorithm
|
|
|
|
*
|
|
|
|
* @param full_name Name of algorithm in the form "checksum,crypto"
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: pointer to algorithm information, or NULL if not found
|
2016-11-08 18:53:41 +00:00
|
|
|
*/
|
|
|
|
struct checksum_algo *image_get_checksum_algo(const char *full_name);
|
2013-06-13 22:10:00 +00:00
|
|
|
|
|
|
|
/**
|
2016-11-08 18:53:41 +00:00
|
|
|
* image_get_crypto_algo() - Look up a cryptosystem algorithm
|
2013-06-13 22:10:00 +00:00
|
|
|
*
|
2016-11-08 18:53:41 +00:00
|
|
|
* @param full_name Name of algorithm in the form "checksum,crypto"
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: pointer to algorithm information, or NULL if not found
|
2013-06-13 22:10:00 +00:00
|
|
|
*/
|
2016-11-08 18:53:41 +00:00
|
|
|
struct crypto_algo *image_get_crypto_algo(const char *full_name);
|
2013-06-13 22:10:00 +00:00
|
|
|
|
2018-11-14 12:51:00 +00:00
|
|
|
/**
|
|
|
|
* image_get_padding_algo() - Look up a padding algorithm
|
|
|
|
*
|
|
|
|
* @param name Name of padding algorithm
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: pointer to algorithm information, or NULL if not found
|
2018-11-14 12:51:00 +00:00
|
|
|
*/
|
|
|
|
struct padding_algo *image_get_padding_algo(const char *name);
|
|
|
|
|
2022-03-28 20:56:59 +00:00
|
|
|
/**
|
|
|
|
* image_pre_load() - Manage pre load header
|
|
|
|
*
|
|
|
|
* Manage the pre-load header before launching the image.
|
|
|
|
* It checks the signature of the image. It also set the
|
|
|
|
* variable image_load_offset to skip this header before
|
|
|
|
* launching the image.
|
|
|
|
*
|
|
|
|
* @param addr Address of the image
|
|
|
|
* @return: 0 on success, -ve on error
|
|
|
|
*/
|
|
|
|
int image_pre_load(ulong addr);
|
|
|
|
|
2013-06-13 22:10:01 +00:00
|
|
|
/**
|
|
|
|
* fit_image_verify_required_sigs() - Verify signatures marked as 'required'
|
|
|
|
*
|
|
|
|
* @fit: FIT to check
|
|
|
|
* @image_noffset: Offset of image node to check
|
|
|
|
* @data: Image data to check
|
|
|
|
* @size: Size of image data
|
2021-11-12 19:28:10 +00:00
|
|
|
* @key_blob: FDT containing public keys
|
2013-06-13 22:10:01 +00:00
|
|
|
* @no_sigsp: Returns 1 if no signatures were required, and
|
|
|
|
* therefore nothing was checked. The caller may wish
|
|
|
|
* to fall back to other mechanisms, or refuse to
|
|
|
|
* boot.
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: 0 if all verified ok, <0 on error
|
2013-06-13 22:10:01 +00:00
|
|
|
*/
|
|
|
|
int fit_image_verify_required_sigs(const void *fit, int image_noffset,
|
2021-11-12 19:28:10 +00:00
|
|
|
const char *data, size_t size, const void *key_blob,
|
2013-06-13 22:10:01 +00:00
|
|
|
int *no_sigsp);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* fit_image_check_sig() - Check a single image signature node
|
|
|
|
*
|
|
|
|
* @fit: FIT to check
|
|
|
|
* @noffset: Offset of signature node to check
|
|
|
|
* @data: Image data to check
|
|
|
|
* @size: Size of image data
|
2021-11-12 19:28:10 +00:00
|
|
|
* @keyblob: Key blob to check (typically the control FDT)
|
|
|
|
* @required_keynode: Offset in the keyblob of the required key node,
|
2013-06-13 22:10:01 +00:00
|
|
|
* if any. If this is given, then the image wil not
|
|
|
|
* pass verification unless that key is used. If this is
|
|
|
|
* -1 then any signature will do.
|
|
|
|
* @err_msgp: In the event of an error, this will be pointed to a
|
|
|
|
* help error string to display to the user.
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: 0 if all verified ok, <0 on error
|
2013-06-13 22:10:01 +00:00
|
|
|
*/
|
|
|
|
int fit_image_check_sig(const void *fit, int noffset, const void *data,
|
2021-11-12 19:28:10 +00:00
|
|
|
size_t size, const void *key_blob, int required_keynode,
|
|
|
|
char **err_msgp);
|
2013-06-13 22:10:01 +00:00
|
|
|
|
2019-12-18 17:25:42 +00:00
|
|
|
int fit_image_decrypt_data(const void *fit,
|
|
|
|
int image_noffset, int cipher_noffset,
|
|
|
|
const void *data, size_t size,
|
|
|
|
void **data_unciphered, size_t *size_unciphered);
|
|
|
|
|
2013-06-13 22:10:09 +00:00
|
|
|
/**
|
|
|
|
* fit_region_make_list() - Make a list of regions to hash
|
|
|
|
*
|
|
|
|
* Given a list of FIT regions (offset, size) provided by libfdt, create
|
|
|
|
* a list of regions (void *, size) for use by the signature creationg
|
|
|
|
* and verification code.
|
|
|
|
*
|
|
|
|
* @fit: FIT image to process
|
|
|
|
* @fdt_regions: Regions as returned by libfdt
|
|
|
|
* @count: Number of regions returned by libfdt
|
|
|
|
* @region: Place to put list of regions (NULL to allocate it)
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: pointer to list of regions, or NULL if out of memory
|
2013-06-13 22:10:09 +00:00
|
|
|
*/
|
|
|
|
struct image_region *fit_region_make_list(const void *fit,
|
|
|
|
struct fdt_region *fdt_regions, int count,
|
|
|
|
struct image_region *region);
|
2013-06-13 22:10:01 +00:00
|
|
|
|
2011-10-18 11:11:49 +00:00
|
|
|
static inline int fit_image_check_target_arch(const void *fdt, int node)
|
2008-02-29 20:24:06 +00:00
|
|
|
{
|
2014-03-03 11:19:30 +00:00
|
|
|
#ifndef USE_HOSTCC
|
2011-10-27 08:58:25 +00:00
|
|
|
return fit_image_check_arch(fdt, node, IH_ARCH_DEFAULT);
|
2014-03-03 11:19:30 +00:00
|
|
|
#else
|
|
|
|
return 0;
|
|
|
|
#endif
|
2008-02-29 20:24:06 +00:00
|
|
|
}
|
|
|
|
|
2019-12-18 17:25:41 +00:00
|
|
|
/*
|
|
|
|
* At present we only support ciphering on the host, and unciphering on the
|
|
|
|
* device
|
|
|
|
*/
|
|
|
|
#if defined(USE_HOSTCC)
|
|
|
|
# if defined(CONFIG_FIT_CIPHER)
|
|
|
|
# define IMAGE_ENABLE_ENCRYPT 1
|
|
|
|
# define IMAGE_ENABLE_DECRYPT 1
|
|
|
|
# include <openssl/evp.h>
|
|
|
|
# else
|
|
|
|
# define IMAGE_ENABLE_ENCRYPT 0
|
|
|
|
# define IMAGE_ENABLE_DECRYPT 0
|
|
|
|
# endif
|
|
|
|
#else
|
|
|
|
# define IMAGE_ENABLE_ENCRYPT 0
|
|
|
|
# define IMAGE_ENABLE_DECRYPT CONFIG_IS_ENABLED(FIT_CIPHER)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Information passed to the ciphering routines */
|
|
|
|
struct image_cipher_info {
|
|
|
|
const char *keydir; /* Directory containing keys */
|
|
|
|
const char *keyname; /* Name of key to use */
|
|
|
|
const char *ivname; /* Name of IV to use */
|
|
|
|
const void *fit; /* Pointer to FIT blob */
|
|
|
|
int node_noffset; /* Offset of the cipher node */
|
|
|
|
const char *name; /* Algorithm name */
|
|
|
|
struct cipher_algo *cipher; /* Cipher algorithm information */
|
|
|
|
const void *fdt_blob; /* FDT containing key and IV */
|
|
|
|
const void *key; /* Value of the key */
|
|
|
|
const void *iv; /* Value of the IV */
|
|
|
|
size_t size_unciphered; /* Size of the unciphered data */
|
|
|
|
};
|
|
|
|
|
|
|
|
struct cipher_algo {
|
|
|
|
const char *name; /* Name of algorithm */
|
|
|
|
int key_len; /* Length of the key */
|
|
|
|
int iv_len; /* Length of the IV */
|
|
|
|
|
|
|
|
#if IMAGE_ENABLE_ENCRYPT
|
|
|
|
const EVP_CIPHER * (*calculate_type)(void);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
int (*encrypt)(struct image_cipher_info *info,
|
|
|
|
const unsigned char *data, int data_len,
|
|
|
|
unsigned char **cipher, int *cipher_len);
|
|
|
|
|
|
|
|
int (*add_cipher_data)(struct image_cipher_info *info,
|
2020-09-17 13:01:46 +00:00
|
|
|
void *keydest, void *fit, int node_noffset);
|
2019-12-18 17:25:42 +00:00
|
|
|
|
|
|
|
int (*decrypt)(struct image_cipher_info *info,
|
|
|
|
const void *cipher, size_t cipher_len,
|
|
|
|
void **data, size_t *data_len);
|
2019-12-18 17:25:41 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
int fit_image_cipher_get_algo(const void *fit, int noffset, char **algo);
|
|
|
|
|
|
|
|
struct cipher_algo *image_get_cipher_algo(const char *full_name);
|
|
|
|
|
2014-05-05 20:08:09 +00:00
|
|
|
struct andr_img_hdr;
|
|
|
|
int android_image_check_header(const struct andr_img_hdr *hdr);
|
|
|
|
int android_image_get_kernel(const struct andr_img_hdr *hdr, int verify,
|
|
|
|
ulong *os_data, ulong *os_len);
|
|
|
|
int android_image_get_ramdisk(const struct andr_img_hdr *hdr,
|
|
|
|
ulong *rd_data, ulong *rd_len);
|
2018-01-27 05:59:08 +00:00
|
|
|
int android_image_get_second(const struct andr_img_hdr *hdr,
|
|
|
|
ulong *second_data, ulong *second_len);
|
2020-01-24 15:53:41 +00:00
|
|
|
bool android_image_get_dtbo(ulong hdr_addr, ulong *addr, u32 *size);
|
2020-01-24 15:53:40 +00:00
|
|
|
bool android_image_get_dtb_by_index(ulong hdr_addr, u32 index, ulong *addr,
|
|
|
|
u32 *size);
|
2014-05-05 20:08:09 +00:00
|
|
|
ulong android_image_get_end(const struct andr_img_hdr *hdr);
|
|
|
|
ulong android_image_get_kload(const struct andr_img_hdr *hdr);
|
2019-04-08 15:35:27 +00:00
|
|
|
ulong android_image_get_kcomp(const struct andr_img_hdr *hdr);
|
2016-06-10 17:54:37 +00:00
|
|
|
void android_print_contents(const struct andr_img_hdr *hdr);
|
2020-01-24 15:53:40 +00:00
|
|
|
bool android_image_print_dtb_contents(ulong hdr_addr);
|
2014-05-05 20:08:09 +00:00
|
|
|
|
2016-02-23 05:55:55 +00:00
|
|
|
/**
|
|
|
|
* board_fit_config_name_match() - Check for a matching board name
|
|
|
|
*
|
|
|
|
* This is used when SPL loads a FIT containing multiple device tree files
|
|
|
|
* and wants to work out which one to use. The description of each one is
|
|
|
|
* passed to this function. The description comes from the 'description' field
|
|
|
|
* in each (FDT) image node.
|
|
|
|
*
|
|
|
|
* @name: Device tree description
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: 0 if this device tree should be used, non-zero to try the next
|
2016-02-23 05:55:55 +00:00
|
|
|
*/
|
|
|
|
int board_fit_config_name_match(const char *name);
|
|
|
|
|
2016-06-27 14:19:21 +00:00
|
|
|
/**
|
|
|
|
* board_fit_image_post_process() - Do any post-process on FIT binary data
|
|
|
|
*
|
|
|
|
* This is used to do any sort of image manipulation, verification, decryption
|
|
|
|
* etc. in a platform or board specific way. Obviously, anything done here would
|
|
|
|
* need to be comprehended in how the images were prepared before being injected
|
|
|
|
* into the FIT creation (i.e. the binary blobs would have been pre-processed
|
|
|
|
* before being added to the FIT image).
|
|
|
|
*
|
2021-06-11 08:45:05 +00:00
|
|
|
* @fit: pointer to fit image
|
|
|
|
* @node: offset of image node
|
2016-06-27 14:19:21 +00:00
|
|
|
* @image: pointer to the image start pointer
|
|
|
|
* @size: pointer to the image size
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: no return value (failure should be handled internally)
|
2016-06-27 14:19:21 +00:00
|
|
|
*/
|
2021-06-11 08:45:05 +00:00
|
|
|
void board_fit_image_post_process(const void *fit, int node, void **p_image,
|
|
|
|
size_t *p_size);
|
2016-06-27 14:19:21 +00:00
|
|
|
|
2017-06-16 22:25:05 +00:00
|
|
|
#define FDT_ERROR ((ulong)(-1))
|
|
|
|
|
2017-06-16 22:25:06 +00:00
|
|
|
ulong fdt_getprop_u32(const void *fdt, int node, const char *prop);
|
2017-09-15 10:57:27 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* fit_find_config_node() - Find the node for the best DTB in a FIT image
|
|
|
|
*
|
|
|
|
* A FIT image contains one or more DTBs. This function parses the
|
|
|
|
* configurations described in the FIT images and returns the node of
|
|
|
|
* the first matching DTB. To check if a DTB matches a board, this function
|
|
|
|
* calls board_fit_config_name_match(). If no matching DTB is found, it returns
|
|
|
|
* the node described by the default configuration if it exists.
|
|
|
|
*
|
|
|
|
* @fdt: pointer to flat device tree
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: the node if found, -ve otherwise
|
2017-09-15 10:57:27 +00:00
|
|
|
*/
|
2017-06-16 22:25:06 +00:00
|
|
|
int fit_find_config_node(const void *fdt);
|
|
|
|
|
2016-11-29 22:33:20 +00:00
|
|
|
/**
|
|
|
|
* Mapping of image types to function handlers to be invoked on the associated
|
|
|
|
* loaded images
|
|
|
|
*
|
|
|
|
* @type: Type of image, I.E. IH_TYPE_*
|
|
|
|
* @handler: Function to call on loaded image
|
|
|
|
*/
|
|
|
|
struct fit_loadable_tbl {
|
|
|
|
int type;
|
|
|
|
/**
|
|
|
|
* handler() - Process a loaded image
|
|
|
|
*
|
|
|
|
* @data: Pointer to start of loaded image data
|
|
|
|
* @size: Size of loaded image data
|
|
|
|
*/
|
|
|
|
void (*handler)(ulong data, size_t size);
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Define a FIT loadable image type handler
|
|
|
|
*
|
|
|
|
* _type is a valid uimage_type ID as defined in the "Image Type" enum above
|
|
|
|
* _handler is the handler function to call after this image type is loaded
|
|
|
|
*/
|
|
|
|
#define U_BOOT_FIT_LOADABLE_HANDLER(_type, _handler) \
|
|
|
|
ll_entry_declare(struct fit_loadable_tbl, _function, fit_loadable) = { \
|
|
|
|
.type = _type, \
|
|
|
|
.handler = _handler, \
|
|
|
|
}
|
|
|
|
|
2020-10-29 04:47:43 +00:00
|
|
|
/**
|
|
|
|
* fit_update - update storage with FIT image
|
|
|
|
* @fit: Pointer to FIT image
|
|
|
|
*
|
|
|
|
* Update firmware on storage using FIT image as input.
|
|
|
|
* The storage area to be update will be identified by the name
|
|
|
|
* in FIT and matching it to "dfu_alt_info" variable.
|
|
|
|
*
|
|
|
|
* Return: 0 on success, non-zero otherwise
|
|
|
|
*/
|
|
|
|
int fit_update(const void *fit);
|
|
|
|
|
2008-01-08 17:12:17 +00:00
|
|
|
#endif /* __IMAGE_H__ */
|