Blame view
include/image.h
49.6 KB
83d290c56 SPDX: Convert all... |
1 |
/* SPDX-License-Identifier: GPL-2.0+ */ |
5b1d71372 Initial revision |
2 |
/* |
b97a2a0a2 [new uImage] Defi... |
3 4 |
* (C) Copyright 2008 Semihalf * |
f08abe311 Remove unnnecessa... |
5 |
* (C) Copyright 2000-2005 |
5b1d71372 Initial revision |
6 |
* Wolfgang Denk, DENX Software Engineering, wd@denx.de. |
f08abe311 Remove unnnecessa... |
7 8 9 10 11 12 |
******************************************************************** * NOTE: This header file defines an interface to U-Boot. Including * this (unmodified) header file in another file is considered normal * use of U-Boot, and does *not* fall under the heading of "derived * work". ******************************************************************** |
5b1d71372 Initial revision |
13 14 15 16 |
*/ #ifndef __IMAGE_H__ #define __IMAGE_H__ |
375660907 compiler.h: unify... |
17 |
#include "compiler.h" |
2f220500a include/image.h: ... |
18 |
#include <asm/byteorder.h> |
7f13b374f ARM: image: Add o... |
19 |
#include <stdbool.h> |
375660907 compiler.h: unify... |
20 |
|
13d06981a image: Add device... |
21 22 |
/* Define this to avoid #ifdefs later on */ struct lmb; |
641599a63 image.h: add forw... |
23 |
struct fdt_region; |
13d06981a image: Add device... |
24 |
|
375660907 compiler.h: unify... |
25 |
#ifdef USE_HOSTCC |
26e355d13 Fix musl build |
26 |
#include <sys/types.h> |
9d25438fe [new uImage] Add ... |
27 28 |
/* new uImage format support enabled on host */ |
aa34fbc08 fdt: Allow libfdt... |
29 30 |
#define IMAGE_ENABLE_FIT 1 #define IMAGE_ENABLE_OF_LIBFDT 1 |
9d25438fe [new uImage] Add ... |
31 |
#define CONFIG_FIT_VERBOSE 1 /* enable fit_format_{error,warning}() */ |
061daa0b6 rsa: add support ... |
32 |
#define CONFIG_FIT_ENABLE_RSASSA_PSS_SUPPORT 1 |
0db7f6859 FIT: Rename FIT_D... |
33 |
#define CONFIG_FIT_ENABLE_SHA256_SUPPORT |
089df18bf lib: move hash CO... |
34 35 |
#define CONFIG_SHA1 #define CONFIG_SHA256 |
75d3e8fbd [new uImage] Pull... |
36 |
|
ab9efc665 image: Move hash ... |
37 |
#define IMAGE_ENABLE_IGNORE 0 |
1fe7d9389 image: Remove rem... |
38 |
#define IMAGE_INDENT_STRING "" |
ab9efc665 image: Move hash ... |
39 |
|
def0819e9 FDT: don't use pr... |
40 41 42 |
#else #include <lmb.h> |
def0819e9 FDT: don't use pr... |
43 |
#include <asm/u-boot.h> |
5daa1c18b image.h: avoid co... |
44 |
#include <command.h> |
def0819e9 FDT: don't use pr... |
45 |
|
ab9efc665 image: Move hash ... |
46 47 |
/* Take notice of the 'ignore' property for hashes */ #define IMAGE_ENABLE_IGNORE 1 |
1fe7d9389 image: Remove rem... |
48 |
#define IMAGE_INDENT_STRING " " |
ab9efc665 image: Move hash ... |
49 |
|
aa34fbc08 fdt: Allow libfdt... |
50 51 |
#define IMAGE_ENABLE_FIT CONFIG_IS_ENABLED(FIT) #define IMAGE_ENABLE_OF_LIBFDT CONFIG_IS_ENABLED(OF_LIBFDT) |
73223f0e1 Kconfig: Move CON... |
52 |
|
9d25438fe [new uImage] Add ... |
53 |
#endif /* USE_HOSTCC */ |
d5934ad77 [new uImage] Add ... |
54 |
|
73223f0e1 Kconfig: Move CON... |
55 |
#if IMAGE_ENABLE_FIT |
1de7bb4f2 Prevent a buffer ... |
56 |
#include <hash.h> |
b08c8c487 libfdt: move head... |
57 |
#include <linux/libfdt.h> |
5dfb52138 [new uImage] New ... |
58 |
#include <fdt_support.h> |
87ebee39e image: Add CONFIG... |
59 |
# ifdef CONFIG_SPL_BUILD |
6f41751f4 Revert "image.h: ... |
60 61 62 63 64 65 66 67 68 |
# ifdef CONFIG_SPL_CRC32_SUPPORT # define IMAGE_ENABLE_CRC32 1 # endif # ifdef CONFIG_SPL_MD5_SUPPORT # define IMAGE_ENABLE_MD5 1 # endif # ifdef CONFIG_SPL_SHA1_SUPPORT # define IMAGE_ENABLE_SHA1 1 # endif |
87ebee39e image: Add CONFIG... |
69 |
# else |
87ebee39e image: Add CONFIG... |
70 71 72 73 |
# define IMAGE_ENABLE_CRC32 1 # define IMAGE_ENABLE_MD5 1 # define IMAGE_ENABLE_SHA1 1 # endif |
6f41751f4 Revert "image.h: ... |
74 |
|
6f41751f4 Revert "image.h: ... |
75 76 77 78 79 80 81 82 83 84 85 |
#ifndef IMAGE_ENABLE_CRC32 #define IMAGE_ENABLE_CRC32 0 #endif #ifndef IMAGE_ENABLE_MD5 #define IMAGE_ENABLE_MD5 0 #endif #ifndef IMAGE_ENABLE_SHA1 #define IMAGE_ENABLE_SHA1 0 #endif |
0db7f6859 FIT: Rename FIT_D... |
86 87 |
#if defined(CONFIG_FIT_ENABLE_SHA256_SUPPORT) || \ defined(CONFIG_SPL_SHA256_SUPPORT) |
0db7f6859 FIT: Rename FIT_D... |
88 89 |
#define IMAGE_ENABLE_SHA256 1 #else |
6f41751f4 Revert "image.h: ... |
90 91 |
#define IMAGE_ENABLE_SHA256 0 #endif |
73223f0e1 Kconfig: Move CON... |
92 |
#endif /* IMAGE_ENABLE_FIT */ |
13d06981a image: Add device... |
93 |
|
6f41751f4 Revert "image.h: ... |
94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 |
#ifdef CONFIG_SYS_BOOT_GET_CMDLINE # define IMAGE_BOOT_GET_CMDLINE 1 #else # define IMAGE_BOOT_GET_CMDLINE 0 #endif #ifdef CONFIG_OF_BOARD_SETUP # define IMAGE_OF_BOARD_SETUP 1 #else # define IMAGE_OF_BOARD_SETUP 0 #endif #ifdef CONFIG_OF_SYSTEM_SETUP # define IMAGE_OF_SYSTEM_SETUP 1 #else # define IMAGE_OF_SYSTEM_SETUP 0 #endif |
c654b5172 fdt: Add ft_syste... |
111 |
|
8e8ccfe1a common: Move the ... |
112 113 114 |
extern ulong image_load_addr; /* Default Load Address */ extern ulong image_save_addr; /* Default Save Address */ extern ulong image_save_size; /* Default Save Size */ |
56d7ab747 image: Create a t... |
115 116 117 118 119 120 121 122 |
enum ih_category { IH_ARCH, IH_COMP, IH_OS, IH_TYPE, IH_COUNT, }; |
5b1d71372 Initial revision |
123 124 |
/* * Operating System Codes |
ff87b0810 image: fix IH_ARC... |
125 126 |
* * The following are exposed to uImage header. |
24431adc3 Restore compatibi... |
127 128 |
* New IDs *MUST* be appended at the end of the list and *NEVER* * inserted for backward compatibility. |
5b1d71372 Initial revision |
129 |
*/ |
555f45d8f image: Convert th... |
130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 |
enum { IH_OS_INVALID = 0, /* Invalid OS */ IH_OS_OPENBSD, /* OpenBSD */ IH_OS_NETBSD, /* NetBSD */ IH_OS_FREEBSD, /* FreeBSD */ IH_OS_4_4BSD, /* 4.4BSD */ IH_OS_LINUX, /* Linux */ IH_OS_SVR4, /* SVR4 */ IH_OS_ESIX, /* Esix */ IH_OS_SOLARIS, /* Solaris */ IH_OS_IRIX, /* Irix */ IH_OS_SCO, /* SCO */ IH_OS_DELL, /* Dell */ IH_OS_NCR, /* NCR */ IH_OS_LYNXOS, /* LynxOS */ IH_OS_VXWORKS, /* VxWorks */ IH_OS_PSOS, /* pSOS */ IH_OS_QNX, /* QNX */ IH_OS_U_BOOT, /* Firmware */ IH_OS_RTEMS, /* RTEMS */ IH_OS_ARTOS, /* ARTOS */ IH_OS_UNITY, /* Unity OS */ IH_OS_INTEGRITY, /* INTEGRITY */ IH_OS_OSE, /* OSE */ IH_OS_PLAN9, /* Plan 9 */ IH_OS_OPENRTOS, /* OpenRTOS */ |
4914af128 image: add IH_OS_... |
156 |
IH_OS_ARM_TRUSTED_FIRMWARE, /* ARM Trusted Firmware */ |
45b55712d image: Add IH_OS_... |
157 |
IH_OS_TEE, /* Trusted Execution Environment */ |
5e30e45c8 spl: support boot... |
158 |
IH_OS_OPENSBI, /* RISC-V OpenSBI */ |
a031b03f6 image: Add IH_OS_... |
159 |
IH_OS_EFI, /* EFI Firmware (e.g. GRUB2) */ |
555f45d8f image: Convert th... |
160 161 162 |
IH_OS_COUNT, }; |
5b1d71372 Initial revision |
163 164 165 |
/* * CPU Architecture Codes (supported by Linux) |
ff87b0810 image: fix IH_ARC... |
166 167 |
* * The following are exposed to uImage header. |
24431adc3 Restore compatibi... |
168 169 |
* New IDs *MUST* be appended at the end of the list and *NEVER* * inserted for backward compatibility. |
5b1d71372 Initial revision |
170 |
*/ |
555f45d8f image: Convert th... |
171 172 173 174 175 176 177 178 179 180 181 182 183 184 |
enum { IH_ARCH_INVALID = 0, /* Invalid CPU */ IH_ARCH_ALPHA, /* Alpha */ IH_ARCH_ARM, /* ARM */ IH_ARCH_I386, /* Intel x86 */ IH_ARCH_IA64, /* IA64 */ IH_ARCH_MIPS, /* MIPS */ IH_ARCH_MIPS64, /* MIPS 64 Bit */ IH_ARCH_PPC, /* PowerPC */ IH_ARCH_S390, /* IBM S390 */ IH_ARCH_SH, /* SuperH */ IH_ARCH_SPARC, /* Sparc */ IH_ARCH_SPARC64, /* Sparc 64 Bit */ IH_ARCH_M68K, /* M68K */ |
ff87b0810 image: fix IH_ARC... |
185 |
IH_ARCH_NIOS, /* Nios-32 */ |
555f45d8f image: Convert th... |
186 187 188 189 190 191 192 193 194 195 196 |
IH_ARCH_MICROBLAZE, /* MicroBlaze */ IH_ARCH_NIOS2, /* Nios-II */ IH_ARCH_BLACKFIN, /* Blackfin */ IH_ARCH_AVR32, /* AVR32 */ IH_ARCH_ST200, /* STMicroelectronics ST200 */ IH_ARCH_SANDBOX, /* Sandbox architecture (test only) */ IH_ARCH_NDS32, /* ANDES Technology - NDS32 */ IH_ARCH_OPENRISC, /* OpenRISC 1000 */ IH_ARCH_ARM64, /* ARM64 */ IH_ARCH_ARC, /* Synopsys DesignWare ARC */ IH_ARCH_X86_64, /* AMD x86_64, Intel and Via */ |
de5e5cea0 xtensa: add suppo... |
197 |
IH_ARCH_XTENSA, /* Xtensa */ |
068feb9b8 riscv: Modify gen... |
198 |
IH_ARCH_RISCV, /* RISC-V */ |
555f45d8f image: Convert th... |
199 200 201 |
IH_ARCH_COUNT, }; |
5b1d71372 Initial revision |
202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 |
/* * Image Types * * "Standalone Programs" are directly runnable in the environment * provided by U-Boot; it is expected that (if they behave * well) you can continue to work in U-Boot after return from * the Standalone Program. * "OS Kernel Images" are usually images of some Embedded OS which * will take over control completely. Usually these programs * will install their own set of exception handlers, device * drivers, set up the MMU, etc. - this means, that you cannot * expect to re-enter U-Boot except by resetting the CPU. * "RAMDisk Images" are more or less just data blocks, and their * parameters (address, size) are passed to an OS kernel that is * being started. * "Multi-File Images" contain several images, typically an OS * (Linux) kernel image and one or more data images like * RAMDisks. This construct is useful for instance when you want * to boot over the network using BOOTP etc., where the boot * server provides just a single image file, but you want to get * for instance an OS kernel and a RAMDisk image. * * "Multi-File Images" start with a list of image sizes, each * image size (in bytes) specified by an "uint32_t" in network * byte order. This list is terminated by an "(uint32_t)0". * Immediately after the terminating 0 follow the images, one by * one, all aligned on "uint32_t" boundaries (size rounded up to |
e1599e83d * Patch by Gridis... |
230 |
* a multiple of 4 bytes - except for the last file). |
5b1d71372 Initial revision |
231 232 233 234 235 236 237 238 |
* * "Firmware Images" are binary images containing firmware (like * U-Boot or FPGA images) which usually will be programmed to * flash memory. * * "Script files" are command sequences that will be executed by * U-Boot's command interpreter; this feature is especially * useful when you configure U-Boot to use a real shell (hush) |
27b207fd0 * Implement new m... |
239 |
* as command interpreter (=> Shell Scripts). |
ff87b0810 image: fix IH_ARC... |
240 241 |
* * The following are exposed to uImage header. |
24431adc3 Restore compatibi... |
242 243 |
* New IDs *MUST* be appended at the end of the list and *NEVER* * inserted for backward compatibility. |
5b1d71372 Initial revision |
244 |
*/ |
555f45d8f image: Convert th... |
245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 |
enum { IH_TYPE_INVALID = 0, /* Invalid Image */ IH_TYPE_STANDALONE, /* Standalone Program */ IH_TYPE_KERNEL, /* OS Kernel Image */ IH_TYPE_RAMDISK, /* RAMDisk Image */ IH_TYPE_MULTI, /* Multi-File Image */ IH_TYPE_FIRMWARE, /* Firmware Image */ IH_TYPE_SCRIPT, /* Script file */ IH_TYPE_FILESYSTEM, /* Filesystem Image (any type) */ IH_TYPE_FLATDT, /* Binary Flat Device Tree Blob */ IH_TYPE_KWBIMAGE, /* Kirkwood Boot Image */ IH_TYPE_IMXIMAGE, /* Freescale IMXBoot Image */ IH_TYPE_UBLIMAGE, /* Davinci UBL Image */ IH_TYPE_OMAPIMAGE, /* TI OMAP Config Header Image */ IH_TYPE_AISIMAGE, /* TI Davinci AIS Image */ /* OS Kernel Image, can run from any load address */ IH_TYPE_KERNEL_NOLOAD, IH_TYPE_PBLIMAGE, /* Freescale PBL Boot Image */ IH_TYPE_MXSIMAGE, /* Freescale MXSBoot Image */ IH_TYPE_GPIMAGE, /* TI Keystone GPHeader Image */ IH_TYPE_ATMELIMAGE, /* ATMEL ROM bootable Image */ |
662abc4fc image: socfpga: A... |
266 |
IH_TYPE_SOCFPGAIMAGE, /* Altera SOCFPGA CV/AV Preloader */ |
555f45d8f image: Convert th... |
267 268 269 270 271 272 273 274 |
IH_TYPE_X86_SETUP, /* x86 setup.bin Image */ IH_TYPE_LPC32XXIMAGE, /* x86 setup.bin Image */ IH_TYPE_LOADABLE, /* A list of typeless images */ IH_TYPE_RKIMAGE, /* Rockchip Boot Image */ IH_TYPE_RKSD, /* Rockchip SD card */ IH_TYPE_RKSPI, /* Rockchip SPI image */ IH_TYPE_ZYNQIMAGE, /* Xilinx Zynq Boot Image */ IH_TYPE_ZYNQMPIMAGE, /* Xilinx ZynqMP Boot Image */ |
6915dcf35 tools: zynqmpimag... |
275 |
IH_TYPE_ZYNQMPBIF, /* Xilinx ZynqMP Boot Image (bif) */ |
555f45d8f image: Convert th... |
276 |
IH_TYPE_FPGA, /* FPGA Image */ |
ed0c2c0a9 tools: mkimage: a... |
277 |
IH_TYPE_VYBRIDIMAGE, /* VYBRID .vyb Image */ |
7e719ee7d image: Add Truste... |
278 |
IH_TYPE_TEE, /* Trusted Execution Environment OS Image */ |
d21bd69b6 tools: mkimage: a... |
279 |
IH_TYPE_FIRMWARE_IVT, /* Firmware Image with HABv4 IVT */ |
6442c9643 image: Add TI PMM... |
280 |
IH_TYPE_PMMC, /* TI Power Management Micro-Controller Firmware */ |
81260e333 tools/mkimage: ad... |
281 |
IH_TYPE_STM32IMAGE, /* STMicroelectronics STM32 Image */ |
662abc4fc image: socfpga: A... |
282 |
IH_TYPE_SOCFPGAIMAGE_V1, /* Altera SOCFPGA A10 Preloader */ |
3b975a147 tools: MediaTek: ... |
283 |
IH_TYPE_MTKIMAGE, /* MediaTek BootROM loadable Image */ |
24431adc3 Restore compatibi... |
284 285 |
IH_TYPE_IMX8MIMAGE, /* Freescale IMX8MBoot Image */ IH_TYPE_IMX8IMAGE, /* Freescale IMX8Boot Image */ |
e7fabe75a image: add new "c... |
286 |
IH_TYPE_COPRO, /* Coprocessor Image for remoteproc*/ |
555f45d8f image: Convert th... |
287 288 289 |
IH_TYPE_COUNT, /* Number of image types */ }; |
5b9d44df2 mkimage: Display ... |
290 |
|
5b1d71372 Initial revision |
291 292 |
/* * Compression Types |
ff87b0810 image: fix IH_ARC... |
293 294 |
* * The following are exposed to uImage header. |
24431adc3 Restore compatibi... |
295 296 |
* New IDs *MUST* be appended at the end of the list and *NEVER* * inserted for backward compatibility. |
5b1d71372 Initial revision |
297 |
*/ |
555f45d8f image: Convert th... |
298 299 300 301 302 303 304 305 306 307 |
enum { IH_COMP_NONE = 0, /* No Compression Used */ IH_COMP_GZIP, /* gzip Compression Used */ IH_COMP_BZIP2, /* bzip2 Compression Used */ IH_COMP_LZMA, /* lzma Compression Used */ IH_COMP_LZO, /* lzo Compression Used */ IH_COMP_LZ4, /* lz4 Compression Used */ IH_COMP_COUNT, }; |
5b1d71372 Initial revision |
308 |
|
829ceb282 image: android: a... |
309 |
#define LZ4F_MAGIC 0x184D2204 /* LZ4 Magic Number */ |
5b1d71372 Initial revision |
310 311 |
#define IH_MAGIC 0x27051956 /* Image Magic Number */ #define IH_NMLEN 32 /* Image Name Length */ |
1411fb37b tools: imximage: ... |
312 313 |
/* Reused from common.h */ #define ROUND(a, b) (((a) + (b) - 1) & ~((b) - 1)) |
5b1d71372 Initial revision |
314 |
/* |
9a4daad0a [new uImage] Upda... |
315 316 |
* Legacy format image header, * all data in network byte order (aka natural aka bigendian). |
5b1d71372 Initial revision |
317 |
*/ |
5b1d71372 Initial revision |
318 |
typedef struct image_header { |
1af5e97d8 tools: image.h: U... |
319 320 321 322 323 324 325 |
uint32_t ih_magic; /* Image Header Magic Number */ uint32_t ih_hcrc; /* Image Header CRC Checksum */ uint32_t ih_time; /* Image Creation Timestamp */ uint32_t ih_size; /* Image Data Size */ uint32_t ih_load; /* Data Load Address */ uint32_t ih_ep; /* Entry Point Address */ uint32_t ih_dcrc; /* Image Data CRC Checksum */ |
5b1d71372 Initial revision |
326 327 328 329 330 331 |
uint8_t ih_os; /* Operating System */ uint8_t ih_arch; /* CPU architecture */ uint8_t ih_type; /* Image Type */ uint8_t ih_comp; /* Compression Type */ uint8_t ih_name[IH_NMLEN]; /* Image Name */ } image_header_t; |
396f635b8 bootm: refactor i... |
332 333 334 335 336 |
typedef struct image_info { ulong start, end; /* start/end of blob */ ulong image_start, image_len; /* start of image within blob, len of image */ ulong load; /* load addr for the image */ uint8_t comp, type, os; /* compression, type of image, os type */ |
90268b878 x86: Support load... |
337 |
uint8_t arch; /* CPU architecture */ |
396f635b8 bootm: refactor i... |
338 |
} image_info_t; |
559316faf [new uImage] Move... |
339 |
/* |
d5934ad77 [new uImage] Add ... |
340 341 342 343 344 345 |
* Legacy and FIT format headers used by do_bootm() and do_bootm_<os>() * routines. */ typedef struct bootm_headers { /* * Legacy os image header, if it is a multi component image |
9a4daad0a [new uImage] Upda... |
346 |
* then boot_get_ramdisk() and get_fdt() will attempt to get |
d5934ad77 [new uImage] Add ... |
347 348 |
* data from second and third component accordingly. */ |
cb1c48969 Restore the abili... |
349 350 |
image_header_t *legacy_hdr_os; /* image header pointer */ image_header_t legacy_hdr_os_copy; /* header copy */ |
d5934ad77 [new uImage] Add ... |
351 |
ulong legacy_hdr_valid; |
73223f0e1 Kconfig: Move CON... |
352 |
#if IMAGE_ENABLE_FIT |
f773bea8e [new uImage] Add ... |
353 |
const char *fit_uname_cfg; /* configuration node unit name */ |
d5934ad77 [new uImage] Add ... |
354 |
void *fit_hdr_os; /* os FIT image header */ |
eb6175edd [new uImage] Make... |
355 |
const char *fit_uname_os; /* os subimage node unit name */ |
3dfe11014 [new uImage] Add ... |
356 |
int fit_noffset_os; /* os subimage node offset */ |
d5934ad77 [new uImage] Add ... |
357 358 |
void *fit_hdr_rd; /* init ramdisk FIT image header */ |
3dfe11014 [new uImage] Add ... |
359 360 |
const char *fit_uname_rd; /* init ramdisk subimage node unit name */ int fit_noffset_rd; /* init ramdisk subimage node offset */ |
d5934ad77 [new uImage] Add ... |
361 |
|
d5934ad77 [new uImage] Add ... |
362 |
void *fit_hdr_fdt; /* FDT blob FIT image header */ |
3dfe11014 [new uImage] Add ... |
363 364 |
const char *fit_uname_fdt; /* FDT blob subimage node unit name */ int fit_noffset_fdt;/* FDT blob subimage node offset */ |
90268b878 x86: Support load... |
365 366 367 368 |
void *fit_hdr_setup; /* x86 setup FIT image header */ const char *fit_uname_setup; /* x86 setup subimage node name */ int fit_noffset_setup;/* x86 setup subimage node offset */ |
d5934ad77 [new uImage] Add ... |
369 |
#endif |
1ec73761d [new uImage] Fix ... |
370 |
|
49c3a861d bootm: Add subcom... |
371 |
#ifndef USE_HOSTCC |
396f635b8 bootm: refactor i... |
372 |
image_info_t os; /* os image info */ |
c160a9544 bootm: refactor e... |
373 |
ulong ep; /* entry point of OS */ |
c4f9419c6 bootm: refactor r... |
374 |
ulong rd_start, rd_end;/* ramdisk start/end */ |
06a09918f bootm: refactor f... |
375 |
char *ft_addr; /* flat dev tree address */ |
06a09918f bootm: refactor f... |
376 |
ulong ft_len; /* length of flat device tree */ |
49c3a861d bootm: Add subcom... |
377 378 379 380 381 382 |
ulong initrd_start; ulong initrd_end; ulong cmdline_start; ulong cmdline_end; bd_t *kbd; #endif |
00caae6d4 env: Rename geten... |
383 |
int verify; /* env_get("verify")[0] != 'n' */ |
49c3a861d bootm: Add subcom... |
384 385 |
#define BOOTM_STATE_START (0x00000001) |
35fc84fa1 Refactor the boot... |
386 387 388 389 390 391 392 393 |
#define BOOTM_STATE_FINDOS (0x00000002) #define BOOTM_STATE_FINDOTHER (0x00000004) #define BOOTM_STATE_LOADOS (0x00000008) #define BOOTM_STATE_RAMDISK (0x00000010) #define BOOTM_STATE_FDT (0x00000020) #define BOOTM_STATE_OS_CMDLINE (0x00000040) #define BOOTM_STATE_OS_BD_T (0x00000080) #define BOOTM_STATE_OS_PREP (0x00000100) |
d0ae31eb0 Add a 'fake' go c... |
394 395 |
#define BOOTM_STATE_OS_FAKE_GO (0x00000200) /* 'Almost' run the OS */ #define BOOTM_STATE_OS_GO (0x00000400) |
49c3a861d bootm: Add subcom... |
396 |
int state; |
a16028da6 lmb: only force o... |
397 |
#ifdef CONFIG_LMB |
e906cfae0 bootm: move lmb i... |
398 399 |
struct lmb lmb; /* for memory mgmt */ #endif |
d5934ad77 [new uImage] Add ... |
400 |
} bootm_headers_t; |
1648a3750 Add cmd_spl command |
401 |
extern bootm_headers_t images; |
d5934ad77 [new uImage] Add ... |
402 |
/* |
559316faf [new uImage] Move... |
403 404 |
* Some systems (for example LWMON) have very short watchdog periods; * we must make sure to split long operations like memmove() or |
7590378fb Use watchdog-awar... |
405 |
* checksum calculations into reasonable chunks. |
559316faf [new uImage] Move... |
406 |
*/ |
7590378fb Use watchdog-awar... |
407 |
#ifndef CHUNKSZ |
559316faf [new uImage] Move... |
408 |
#define CHUNKSZ (64 * 1024) |
7590378fb Use watchdog-awar... |
409 410 411 412 413 414 415 416 417 418 419 420 421 |
#endif #ifndef CHUNKSZ_CRC32 #define CHUNKSZ_CRC32 (64 * 1024) #endif #ifndef CHUNKSZ_MD5 #define CHUNKSZ_MD5 (64 * 1024) #endif #ifndef CHUNKSZ_SHA1 #define CHUNKSZ_SHA1 (64 * 1024) #endif |
559316faf [new uImage] Move... |
422 |
|
375660907 compiler.h: unify... |
423 424 |
#define uimage_to_cpu(x) be32_to_cpu(x) #define cpu_to_uimage(x) cpu_to_be32(x) |
9a4daad0a [new uImage] Upda... |
425 |
|
b029dddc9 mkimage: Make tab... |
426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 |
/* * Translation table for entries of a specific type; used by * get_table_entry_id() and get_table_entry_name(). */ typedef struct table_entry { int id; char *sname; /* short (input) name to find table entry */ char *lname; /* long (output) name to print for messages */ } table_entry_t; /* * get_table_entry_id() scans the translation table trying to find an * entry that matches the given short name. If a matching entry is * found, it's id is returned to the caller. */ |
7edb186fc image: constify l... |
441 |
int get_table_entry_id(const table_entry_t *table, |
b029dddc9 mkimage: Make tab... |
442 443 444 445 446 447 |
const char *table_name, const char *name); /* * get_table_entry_name() scans the translation table trying to find * an entry that matches the given id. If a matching entry is found, * its long name is returned to the caller. */ |
7edb186fc image: constify l... |
448 |
char *get_table_entry_name(const table_entry_t *table, char *msg, int id); |
b029dddc9 mkimage: Make tab... |
449 |
|
712fbcf38 checkpatch whites... |
450 |
const char *genimg_get_os_name(uint8_t os); |
cef2e5148 image: Add functi... |
451 452 453 454 455 456 457 458 |
/** * genimg_get_os_short_name() - get the short name for an OS * * @param os OS (IH_OS_...) * @return OS short name, or "unknown" if unknown */ const char *genimg_get_os_short_name(uint8_t comp); |
712fbcf38 checkpatch whites... |
459 |
const char *genimg_get_arch_name(uint8_t arch); |
cef2e5148 image: Add functi... |
460 461 462 463 464 465 466 467 |
/** * genimg_get_arch_short_name() - get the short name for an architecture * * @param arch Architecture type (IH_ARCH_...) * @return architecture short name, or "unknown" if unknown */ const char *genimg_get_arch_short_name(uint8_t arch); |
712fbcf38 checkpatch whites... |
468 |
const char *genimg_get_type_name(uint8_t type); |
5b9d44df2 mkimage: Display ... |
469 470 471 472 473 474 475 476 |
/** * genimg_get_type_short_name() - get the short name for an image type * * @param type Image type (IH_TYPE_...) * @return image short name, or "unknown" if unknown */ const char *genimg_get_type_short_name(uint8_t type); |
712fbcf38 checkpatch whites... |
477 |
const char *genimg_get_comp_name(uint8_t comp); |
cef2e5148 image: Add functi... |
478 479 480 481 482 483 484 485 |
/** * genimg_get_comp_short_name() - get the short name for a compression method * * @param comp compression method (IH_COMP_...) * @return compression method short name, or "unknown" if unknown */ const char *genimg_get_comp_short_name(uint8_t comp); |
1426220b0 image: Add functi... |
486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 |
/** * genimg_get_cat_name() - Get the name of an item in a category * * @category: Category of item * @id: Item ID * @return name of item, or "Unknown ..." if unknown */ const char *genimg_get_cat_name(enum ih_category category, uint id); /** * genimg_get_cat_short_name() - Get the short name of an item in a category * * @category: Category of item * @id: Item ID * @return short name of item, or "Unknown ..." if unknown */ const char *genimg_get_cat_short_name(enum ih_category category, uint id); /** * genimg_get_cat_count() - Get the number of items in a category * * @category: Category to check * @return the number of items in the category (IH_xxx_COUNT) */ int genimg_get_cat_count(enum ih_category category); /** * genimg_get_cat_desc() - Get the description of a category * * @return the description of a category, e.g. "architecture". This * effectively converts the enum to a string. */ const char *genimg_get_cat_desc(enum ih_category category); |
712fbcf38 checkpatch whites... |
519 520 521 522 523 |
int genimg_get_os_id(const char *name); int genimg_get_arch_id(const char *name); int genimg_get_type_id(const char *name); int genimg_get_comp_id(const char *name); void genimg_print_size(uint32_t size); |
570abb0ad [new uImage] Shar... |
524 |
|
859e92b77 image: Move times... |
525 526 527 528 529 530 531 |
#if defined(CONFIG_TIMESTAMP) || defined(CONFIG_CMD_DATE) || \ defined(USE_HOSTCC) #define IMAGE_ENABLE_TIMESTAMP 1 #else #define IMAGE_ENABLE_TIMESTAMP 0 #endif void genimg_print_time(time_t timestamp); |
782cfbb25 image: Introduce ... |
532 533 534 535 |
/* What to do with a image load address ('load = <> 'in the FIT) */ enum fit_load_op { FIT_LOAD_IGNORED, /* Ignore load address */ FIT_LOAD_OPTIONAL, /* Can be provided, but optional */ |
fe20a81a6 Fix test failure ... |
536 |
FIT_LOAD_OPTIONAL_NON_ZERO, /* Optional, a value of 0 is ignored */ |
782cfbb25 image: Introduce ... |
537 538 |
FIT_LOAD_REQUIRED, /* Must be provided */ }; |
90268b878 x86: Support load... |
539 540 |
int boot_get_setup(bootm_headers_t *images, uint8_t arch, ulong *setup_start, ulong *setup_len); |
9a4daad0a [new uImage] Upda... |
541 542 543 |
#ifndef USE_HOSTCC /* Image format types, returned by _get_format() routine */ #define IMAGE_FORMAT_INVALID 0x00 |
c76c93a3d configs: Rename C... |
544 |
#if defined(CONFIG_LEGACY_IMAGE_FORMAT) |
9a4daad0a [new uImage] Upda... |
545 |
#define IMAGE_FORMAT_LEGACY 0x01 /* legacy image_header based format */ |
21d29f7f9 bootm: make use o... |
546 |
#endif |
9a4daad0a [new uImage] Upda... |
547 |
#define IMAGE_FORMAT_FIT 0x02 /* new, libfdt based format */ |
9ace3fc81 image: add suppor... |
548 |
#define IMAGE_FORMAT_ANDROID 0x03 /* Android boot image */ |
9a4daad0a [new uImage] Upda... |
549 |
|
6c454fedf image: fix bootm ... |
550 551 552 |
ulong genimg_get_kernel_addr_fit(char * const img_addr, const char **fit_uname_config, const char **fit_uname_kernel); |
0f64140b6 image: introduce ... |
553 |
ulong genimg_get_kernel_addr(char * const img_addr); |
35e7b0f17 sandbox: image: A... |
554 |
int genimg_get_format(const void *img_addr); |
712fbcf38 checkpatch whites... |
555 |
int genimg_has_config(bootm_headers_t *images); |
9a4daad0a [new uImage] Upda... |
556 |
|
62afc6018 image: Add boot_g... |
557 558 |
int boot_get_fpga(int argc, char * const argv[], bootm_headers_t *images, uint8_t arch, const ulong *ld_start, ulong * const ld_len); |
712fbcf38 checkpatch whites... |
559 |
int boot_get_ramdisk(int argc, char * const argv[], bootm_headers_t *images, |
d985c8498 [new uImage] Remo... |
560 |
uint8_t arch, ulong *rd_start, ulong *rd_end); |
84a07dbfd add boot_get_load... |
561 562 563 564 565 566 567 568 569 570 571 572 573 |
/** * boot_get_loadable - routine to load a list of binaries to memory * @argc: Ignored Argument * @argv: Ignored Argument * @images: pointer to the bootm images structure * @arch: expected architecture for the image * @ld_start: Ignored Argument * @ld_len: Ignored Argument * * boot_get_loadable() will take the given FIT configuration, and look * for a field named "loadables". Loadables, is a list of elements in * the FIT given as strings. exe: |
b2267e8a2 fix incorrect usa... |
574 |
* loadables = "linux_kernel", "fdt-2"; |
84a07dbfd add boot_get_load... |
575 576 577 578 579 580 581 582 583 584 585 |
* this function will attempt to parse each string, and load the * corresponding element from the FIT into memory. Once placed, * no aditional actions are taken. * * @return: * 0, if only valid images or no images are found * error code, if an error occurs during fit_image_load */ int boot_get_loadable(int argc, char * const argv[], bootm_headers_t *images, uint8_t arch, const ulong *ld_start, ulong * const ld_len); #endif /* !USE_HOSTCC */ |
9a4daad0a [new uImage] Upda... |
586 |
|
90268b878 x86: Support load... |
587 588 |
int boot_get_setup_fit(bootm_headers_t *images, uint8_t arch, ulong *setup_start, ulong *setup_len); |
782cfbb25 image: Introduce ... |
589 |
/** |
169043d82 fit: Introduce me... |
590 591 592 593 594 595 596 597 598 |
* boot_get_fdt_fit() - load a DTB from a FIT file (applying overlays) * * This deals with all aspects of loading an DTB from a FIT. * The correct base image based on configuration will be selected, and * then any overlays specified will be applied (as present in fit_uname_configp). * * @param images Boot images structure * @param addr Address of FIT in memory * @param fit_unamep On entry this is the requested image name |
b2267e8a2 fix incorrect usa... |
599 |
* (e.g. "kernel") or NULL to use the default. On exit |
169043d82 fit: Introduce me... |
600 601 |
* points to the selected image name * @param fit_uname_configp On entry this is the requested configuration |
b2267e8a2 fix incorrect usa... |
602 |
* name (e.g. "conf-1") or NULL to use the default. On |
169043d82 fit: Introduce me... |
603 604 605 606 607 608 609 610 611 612 613 614 |
* exit points to the selected configuration name. * @param arch Expected architecture (IH_ARCH_...) * @param datap Returns address of loaded image * @param lenp Returns length of loaded image * * @return node offset of base image, or -ve error code on error */ int boot_get_fdt_fit(bootm_headers_t *images, ulong addr, const char **fit_unamep, const char **fit_uname_configp, int arch, ulong *datap, ulong *lenp); /** |
782cfbb25 image: Introduce ... |
615 616 617 618 619 620 621 |
* fit_image_load() - load an image from a FIT * * This deals with all aspects of loading an image from a FIT, including * selecting the right image based on configuration, verifying it, printing * out progress messages, checking the type/arch/os and optionally copying it * to the right load address. * |
126cc8642 image: Remove the... |
622 623 |
* The property to look up is defined by image_type. * |
782cfbb25 image: Introduce ... |
624 |
* @param images Boot images structure |
782cfbb25 image: Introduce ... |
625 626 |
* @param addr Address of FIT in memory * @param fit_unamep On entry this is the requested image name |
b2267e8a2 fix incorrect usa... |
627 |
* (e.g. "kernel") or NULL to use the default. On exit |
782cfbb25 image: Introduce ... |
628 |
* points to the selected image name |
f320a4d84 bootm: Use select... |
629 |
* @param fit_uname_configp On entry this is the requested configuration |
b2267e8a2 fix incorrect usa... |
630 |
* name (e.g. "conf-1") or NULL to use the default. On |
f320a4d84 bootm: Use select... |
631 |
* exit points to the selected configuration name. |
782cfbb25 image: Introduce ... |
632 633 634 635 636 637 638 639 640 641 |
* @param arch Expected architecture (IH_ARCH_...) * @param image_type Required image type (IH_TYPE_...). If this is * IH_TYPE_KERNEL then we allow IH_TYPE_KERNEL_NOLOAD * also. * @param bootstage_id ID of starting bootstage to use for progress updates. * This will be added to the BOOTSTAGE_SUB values when * calling bootstage_mark() * @param load_op Decribes what to do with the load address * @param datap Returns address of loaded image * @param lenp Returns length of loaded image |
ce1400f69 Enhance fit_check... |
642 |
* @return node offset of image, or -ve error code on error |
782cfbb25 image: Introduce ... |
643 |
*/ |
126cc8642 image: Remove the... |
644 |
int fit_image_load(bootm_headers_t *images, ulong addr, |
f320a4d84 bootm: Use select... |
645 |
const char **fit_unamep, const char **fit_uname_configp, |
782cfbb25 image: Introduce ... |
646 647 |
int arch, int image_type, int bootstage_id, enum fit_load_op load_op, ulong *datap, ulong *lenp); |
220a3a44a common: Rename an... |
648 649 650 651 652 653 654 655 656 657 658 |
/** * image_source_script() - Execute a script * * Executes a U-Boot script at a particular address in memory. The script should * have a header (FIT or legacy) with the script type (IH_TYPE_SCRIPT). * * @addr: Address of script * @fit_uname: FIT subimage name * @return result code (enum command_ret_t) */ int image_source_script(ulong addr, const char *fit_uname); |
ce1400f69 Enhance fit_check... |
659 |
#ifndef USE_HOSTCC |
782cfbb25 image: Introduce ... |
660 661 662 |
/** * fit_get_node_from_config() - Look up an image a FIT by type * |
b2267e8a2 fix incorrect usa... |
663 |
* This looks in the selected conf- node (images->fit_uname_cfg) for a |
782cfbb25 image: Introduce ... |
664 665 666 667 668 669 |
* particular image type (e.g. "kernel") and then finds the image that is * referred to. * * For example, for something like: * * images { |
b2267e8a2 fix incorrect usa... |
670 |
* kernel { |
782cfbb25 image: Introduce ... |
671 672 673 674 |
* ... * }; * }; * configurations { |
b2267e8a2 fix incorrect usa... |
675 676 |
* conf-1 { * kernel = "kernel"; |
782cfbb25 image: Introduce ... |
677 678 679 680 |
* }; * }; * * the function will return the node offset of the kernel@1 node, assuming |
b2267e8a2 fix incorrect usa... |
681 |
* that conf-1 is the chosen configuration. |
782cfbb25 image: Introduce ... |
682 683 684 685 686 687 688 |
* * @param images Boot images structure * @param prop_name Property name to look up (FIT_..._PROP) * @param addr Address of FIT in memory */ int fit_get_node_from_config(bootm_headers_t *images, const char *prop_name, ulong addr); |
53f375fa8 image: Use fit_im... |
689 690 691 |
int boot_get_fdt(int flag, int argc, char * const argv[], uint8_t arch, bootm_headers_t *images, char **of_flat_tree, ulong *of_size); |
55b0a3931 Respect memreserv... |
692 |
void boot_fdt_add_mem_rsv_regions(struct lmb *lmb, void *fdt_blob); |
712fbcf38 checkpatch whites... |
693 |
int boot_relocate_fdt(struct lmb *lmb, char **of_flat_tree, ulong *of_size); |
06a09918f bootm: refactor f... |
694 |
|
712fbcf38 checkpatch whites... |
695 |
int boot_ramdisk_high(struct lmb *lmb, ulong rd_data, ulong rd_len, |
9a4daad0a [new uImage] Upda... |
696 |
ulong *initrd_start, ulong *initrd_end); |
712fbcf38 checkpatch whites... |
697 |
int boot_get_cmdline(struct lmb *lmb, ulong *cmd_start, ulong *cmd_end); |
fca43cc80 boot: change some... |
698 |
#ifdef CONFIG_SYS_BOOT_GET_KBD |
712fbcf38 checkpatch whites... |
699 |
int boot_get_kbd(struct lmb *lmb, bd_t **kbd); |
fca43cc80 boot: change some... |
700 |
#endif /* CONFIG_SYS_BOOT_GET_KBD */ |
570abb0ad [new uImage] Shar... |
701 |
#endif /* !USE_HOSTCC */ |
b97a2a0a2 [new uImage] Defi... |
702 |
|
9a4daad0a [new uImage] Upda... |
703 704 705 |
/*******************************************************************/ /* Legacy format specific code (prefixed with image_) */ /*******************************************************************/ |
712fbcf38 checkpatch whites... |
706 |
static inline uint32_t image_get_header_size(void) |
b97a2a0a2 [new uImage] Defi... |
707 |
{ |
712fbcf38 checkpatch whites... |
708 |
return (sizeof(image_header_t)); |
b97a2a0a2 [new uImage] Defi... |
709 710 711 |
} #define image_get_hdr_l(f) \ |
3a2003f61 tools/mkimage: fi... |
712 |
static inline uint32_t image_get_##f(const image_header_t *hdr) \ |
b97a2a0a2 [new uImage] Defi... |
713 |
{ \ |
712fbcf38 checkpatch whites... |
714 |
return uimage_to_cpu(hdr->ih_##f); \ |
b97a2a0a2 [new uImage] Defi... |
715 |
} |
712fbcf38 checkpatch whites... |
716 717 718 719 720 721 722 |
image_get_hdr_l(magic) /* image_get_magic */ image_get_hdr_l(hcrc) /* image_get_hcrc */ image_get_hdr_l(time) /* image_get_time */ image_get_hdr_l(size) /* image_get_size */ image_get_hdr_l(load) /* image_get_load */ image_get_hdr_l(ep) /* image_get_ep */ image_get_hdr_l(dcrc) /* image_get_dcrc */ |
b97a2a0a2 [new uImage] Defi... |
723 724 |
#define image_get_hdr_b(f) \ |
3a2003f61 tools/mkimage: fi... |
725 |
static inline uint8_t image_get_##f(const image_header_t *hdr) \ |
b97a2a0a2 [new uImage] Defi... |
726 727 728 |
{ \ return hdr->ih_##f; \ } |
712fbcf38 checkpatch whites... |
729 730 731 732 |
image_get_hdr_b(os) /* image_get_os */ image_get_hdr_b(arch) /* image_get_arch */ image_get_hdr_b(type) /* image_get_type */ image_get_hdr_b(comp) /* image_get_comp */ |
b97a2a0a2 [new uImage] Defi... |
733 |
|
712fbcf38 checkpatch whites... |
734 |
static inline char *image_get_name(const image_header_t *hdr) |
b97a2a0a2 [new uImage] Defi... |
735 736 737 |
{ return (char *)hdr->ih_name; } |
712fbcf38 checkpatch whites... |
738 |
static inline uint32_t image_get_data_size(const image_header_t *hdr) |
b97a2a0a2 [new uImage] Defi... |
739 |
{ |
712fbcf38 checkpatch whites... |
740 |
return image_get_size(hdr); |
b97a2a0a2 [new uImage] Defi... |
741 |
} |
f13e7b2e9 [new uImage] Clea... |
742 743 744 745 746 747 748 749 750 751 752 753 |
/** * image_get_data - get image payload start address * @hdr: image header * * image_get_data() returns address of the image payload. For single * component images it is image data start. For multi component * images it points to the null terminated table of sub-images sizes. * * returns: * image payload data start address */ |
712fbcf38 checkpatch whites... |
754 |
static inline ulong image_get_data(const image_header_t *hdr) |
f13e7b2e9 [new uImage] Clea... |
755 |
{ |
712fbcf38 checkpatch whites... |
756 |
return ((ulong)hdr + image_get_header_size()); |
f13e7b2e9 [new uImage] Clea... |
757 |
} |
712fbcf38 checkpatch whites... |
758 |
static inline uint32_t image_get_image_size(const image_header_t *hdr) |
b97a2a0a2 [new uImage] Defi... |
759 |
{ |
712fbcf38 checkpatch whites... |
760 |
return (image_get_size(hdr) + image_get_header_size()); |
b97a2a0a2 [new uImage] Defi... |
761 |
} |
712fbcf38 checkpatch whites... |
762 |
static inline ulong image_get_image_end(const image_header_t *hdr) |
b97a2a0a2 [new uImage] Defi... |
763 |
{ |
712fbcf38 checkpatch whites... |
764 |
return ((ulong)hdr + image_get_image_size(hdr)); |
b97a2a0a2 [new uImage] Defi... |
765 766 767 768 769 |
} #define image_set_hdr_l(f) \ static inline void image_set_##f(image_header_t *hdr, uint32_t val) \ { \ |
712fbcf38 checkpatch whites... |
770 |
hdr->ih_##f = cpu_to_uimage(val); \ |
b97a2a0a2 [new uImage] Defi... |
771 |
} |
712fbcf38 checkpatch whites... |
772 773 774 775 776 777 778 |
image_set_hdr_l(magic) /* image_set_magic */ image_set_hdr_l(hcrc) /* image_set_hcrc */ image_set_hdr_l(time) /* image_set_time */ image_set_hdr_l(size) /* image_set_size */ image_set_hdr_l(load) /* image_set_load */ image_set_hdr_l(ep) /* image_set_ep */ image_set_hdr_l(dcrc) /* image_set_dcrc */ |
b97a2a0a2 [new uImage] Defi... |
779 780 781 782 783 784 |
#define image_set_hdr_b(f) \ static inline void image_set_##f(image_header_t *hdr, uint8_t val) \ { \ hdr->ih_##f = val; \ } |
712fbcf38 checkpatch whites... |
785 786 787 788 |
image_set_hdr_b(os) /* image_set_os */ image_set_hdr_b(arch) /* image_set_arch */ image_set_hdr_b(type) /* image_set_type */ image_set_hdr_b(comp) /* image_set_comp */ |
b97a2a0a2 [new uImage] Defi... |
789 |
|
712fbcf38 checkpatch whites... |
790 |
static inline void image_set_name(image_header_t *hdr, const char *name) |
b97a2a0a2 [new uImage] Defi... |
791 |
{ |
712fbcf38 checkpatch whites... |
792 |
strncpy(image_get_name(hdr), name, IH_NMLEN); |
b97a2a0a2 [new uImage] Defi... |
793 |
} |
712fbcf38 checkpatch whites... |
794 795 |
int image_check_hcrc(const image_header_t *hdr); int image_check_dcrc(const image_header_t *hdr); |
af13cdbc0 [new uImage] Add ... |
796 |
#ifndef USE_HOSTCC |
723806cc5 env: Rename some ... |
797 798 799 |
ulong env_get_bootm_low(void); phys_size_t env_get_bootm_size(void); phys_size_t env_get_bootm_mapsize(void); |
af13cdbc0 [new uImage] Add ... |
800 |
#endif |
ce1400f69 Enhance fit_check... |
801 |
void memmove_wd(void *to, void *from, size_t len, ulong chunksz); |
b97a2a0a2 [new uImage] Defi... |
802 |
|
712fbcf38 checkpatch whites... |
803 |
static inline int image_check_magic(const image_header_t *hdr) |
b97a2a0a2 [new uImage] Defi... |
804 |
{ |
712fbcf38 checkpatch whites... |
805 |
return (image_get_magic(hdr) == IH_MAGIC); |
b97a2a0a2 [new uImage] Defi... |
806 |
} |
712fbcf38 checkpatch whites... |
807 |
static inline int image_check_type(const image_header_t *hdr, uint8_t type) |
b97a2a0a2 [new uImage] Defi... |
808 |
{ |
712fbcf38 checkpatch whites... |
809 |
return (image_get_type(hdr) == type); |
b97a2a0a2 [new uImage] Defi... |
810 |
} |
712fbcf38 checkpatch whites... |
811 |
static inline int image_check_arch(const image_header_t *hdr, uint8_t arch) |
b97a2a0a2 [new uImage] Defi... |
812 |
{ |
4ac0a32e2 armv8: Support lo... |
813 814 |
return (image_get_arch(hdr) == arch) || (image_get_arch(hdr) == IH_ARCH_ARM && arch == IH_ARCH_ARM64); |
b97a2a0a2 [new uImage] Defi... |
815 |
} |
712fbcf38 checkpatch whites... |
816 |
static inline int image_check_os(const image_header_t *hdr, uint8_t os) |
b97a2a0a2 [new uImage] Defi... |
817 |
{ |
712fbcf38 checkpatch whites... |
818 |
return (image_get_os(hdr) == os); |
b97a2a0a2 [new uImage] Defi... |
819 |
} |
712fbcf38 checkpatch whites... |
820 821 |
ulong image_multi_count(const image_header_t *hdr); void image_multi_getimg(const image_header_t *hdr, ulong idx, |
42b73e8ee [new uImage] Fact... |
822 |
ulong *data, ulong *len); |
712fbcf38 checkpatch whites... |
823 |
void image_print_contents(const void *hdr); |
570abb0ad [new uImage] Shar... |
824 |
|
b97a2a0a2 [new uImage] Defi... |
825 |
#ifndef USE_HOSTCC |
712fbcf38 checkpatch whites... |
826 |
static inline int image_check_target_arch(const image_header_t *hdr) |
b97a2a0a2 [new uImage] Defi... |
827 |
{ |
476af299b image: push defau... |
828 829 |
#ifndef IH_ARCH_DEFAULT # error "please define IH_ARCH_DEFAULT in your arch asm/u-boot.h" |
b97a2a0a2 [new uImage] Defi... |
830 |
#endif |
476af299b image: push defau... |
831 |
return image_check_arch(hdr, IH_ARCH_DEFAULT); |
b97a2a0a2 [new uImage] Defi... |
832 |
} |
5dfb52138 [new uImage] New ... |
833 |
#endif /* USE_HOSTCC */ |
5b1d71372 Initial revision |
834 |
|
13d06981a image: Add device... |
835 |
/** |
2090854cd common: Move boot... |
836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 |
* image_decomp() - decompress an image * * @comp: Compression algorithm that is used (IH_COMP_...) * @load: Destination load address in U-Boot memory * @image_start Image start address (where we are decompressing from) * @type: OS type (IH_OS_...) * @load_bug: Place to decompress to * @image_buf: Address to decompress from * @image_len: Number of bytes in @image_buf to decompress * @unc_len: Available space for decompression * @return 0 if OK, -ve on error (BOOTM_ERR_...) */ int image_decomp(int comp, ulong load, ulong image_start, int type, void *load_buf, void *image_buf, ulong image_len, uint unc_len, ulong *load_end); /** |
13d06981a image: Add device... |
853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 |
* Set up properties in the FDT * * This sets up properties in the FDT that is to be passed to linux. * * @images: Images information * @blob: FDT to update * @of_size: Size of the FDT * @lmb: Points to logical memory block structure * @return 0 if ok, <0 on failure */ int image_setup_libfdt(bootm_headers_t *images, void *blob, int of_size, struct lmb *lmb); /** * Set up the FDT to use for booting a kernel * * This performs ramdisk setup, sets up the FDT if required, and adds * paramters to the FDT if libfdt is available. * * @param images Images information * @return 0 if ok, <0 on failure */ int image_setup_linux(bootm_headers_t *images); |
a5266d6b5 bootm: Clean up b... |
876 877 878 879 880 881 882 883 884 |
/** * bootz_setup() - Extract stat and size of a Linux xImage * * @image: Address of image * @start: Returns start address of image * @end : Returns end address of image * @return 0 if OK, 1 if the image was not recognised */ int bootz_setup(ulong image, ulong *start, ulong *end); |
6808ef9ac move booti_setup ... |
885 886 887 888 889 890 |
/** * Return the correct start address and size of a Linux aarch64 Image. * * @image: Address of image * @start: Returns start address of image * @size : Returns size image |
7f13b374f ARM: image: Add o... |
891 |
* @force_reloc: Ignore image->ep field, always place image to RAM start |
6808ef9ac move booti_setup ... |
892 893 |
* @return 0 if OK, 1 if the image was not recognised */ |
7f13b374f ARM: image: Add o... |
894 895 |
int booti_setup(ulong image, ulong *relocated_addr, ulong *size, bool force_reloc); |
a5266d6b5 bootm: Clean up b... |
896 |
|
d5934ad77 [new uImage] Add ... |
897 |
/*******************************************************************/ |
9a4daad0a [new uImage] Upda... |
898 |
/* New uImage format specific code (prefixed with fit_) */ |
d5934ad77 [new uImage] Add ... |
899 |
/*******************************************************************/ |
5dfb52138 [new uImage] New ... |
900 901 902 |
#define FIT_IMAGES_PATH "/images" #define FIT_CONFS_PATH "/configurations" |
72188f546 image: Use consta... |
903 |
/* hash/signature/key node */ |
5dfb52138 [new uImage] New ... |
904 905 906 |
#define FIT_HASH_NODENAME "hash" #define FIT_ALGO_PROP "algo" #define FIT_VALUE_PROP "value" |
8ac88f2d2 fdt: Check for a ... |
907 |
#define FIT_IGNORE_PROP "uboot-ignore" |
3e569a6b1 image: Add signin... |
908 |
#define FIT_SIG_NODENAME "signature" |
72188f546 image: Use consta... |
909 910 |
#define FIT_KEY_REQUIRED "required" #define FIT_KEY_HINT "key-name-hint" |
5dfb52138 [new uImage] New ... |
911 |
|
7298e4225 mkimage: fit: add... |
912 913 914 |
/* cipher node */ #define FIT_CIPHER_NODENAME "cipher" #define FIT_ALGO_PROP "algo" |
5dfb52138 [new uImage] New ... |
915 916 |
/* image node */ #define FIT_DATA_PROP "data" |
a1be94b65 SPL: Add FIT data... |
917 |
#define FIT_DATA_POSITION_PROP "data-position" |
db1b79b88 splash: add suppo... |
918 919 |
#define FIT_DATA_OFFSET_PROP "data-offset" #define FIT_DATA_SIZE_PROP "data-size" |
5dfb52138 [new uImage] New ... |
920 921 922 923 924 925 926 927 928 929 930 931 932 |
#define FIT_TIMESTAMP_PROP "timestamp" #define FIT_DESC_PROP "description" #define FIT_ARCH_PROP "arch" #define FIT_TYPE_PROP "type" #define FIT_OS_PROP "os" #define FIT_COMP_PROP "compression" #define FIT_ENTRY_PROP "entry" #define FIT_LOAD_PROP "load" /* configuration node */ #define FIT_KERNEL_PROP "kernel" #define FIT_RAMDISK_PROP "ramdisk" #define FIT_FDT_PROP "fdt" |
ecf8cd653 mkimage will now ... |
933 |
#define FIT_LOADABLE_PROP "loadables" |
5dfb52138 [new uImage] New ... |
934 |
#define FIT_DEFAULT_PROP "default" |
90268b878 x86: Support load... |
935 |
#define FIT_SETUP_PROP "setup" |
ed0cea7c5 mkimage: Report i... |
936 |
#define FIT_FPGA_PROP "fpga" |
1f8e4bf55 image: fit: Show ... |
937 |
#define FIT_FIRMWARE_PROP "firmware" |
0298d2037 fit: Add standalo... |
938 |
#define FIT_STANDALONE_PROP "standalone" |
5dfb52138 [new uImage] New ... |
939 |
|
1de7bb4f2 Prevent a buffer ... |
940 |
#define FIT_MAX_HASH_LEN HASH_MAX_DIGEST_SIZE |
5dfb52138 [new uImage] New ... |
941 |
|
f1dcee59a spl: Add an optio... |
942 |
#if IMAGE_ENABLE_FIT |
5dfb52138 [new uImage] New ... |
943 |
/* cmdline argument format parsing */ |
314f634b4 image/fit: drop i... |
944 |
int fit_parse_conf(const char *spec, ulong addr_curr, |
f50433d67 [new uImage] Add ... |
945 |
ulong *addr, const char **conf_name); |
314f634b4 image/fit: drop i... |
946 |
int fit_parse_subimage(const char *spec, ulong addr_curr, |
f50433d67 [new uImage] Add ... |
947 |
ulong *addr, const char **image_name); |
d5934ad77 [new uImage] Add ... |
948 |
|
39931f966 dumpimage: fit: e... |
949 |
int fit_get_subimage_count(const void *fit, int images_noffset); |
712fbcf38 checkpatch whites... |
950 951 |
void fit_print_contents(const void *fit); void fit_image_print(const void *fit, int noffset, const char *p); |
5dfb52138 [new uImage] New ... |
952 953 954 955 956 957 958 959 |
/** * fit_get_end - get FIT image size * @fit: pointer to the FIT format image header * * returns: * size of the FIT image (blob) in memory */ |
712fbcf38 checkpatch whites... |
960 |
static inline ulong fit_get_size(const void *fit) |
5dfb52138 [new uImage] New ... |
961 |
{ |
712fbcf38 checkpatch whites... |
962 |
return fdt_totalsize(fit); |
5dfb52138 [new uImage] New ... |
963 964 965 966 967 968 969 970 971 |
} /** * fit_get_end - get FIT image end * @fit: pointer to the FIT format image header * * returns: * end address of the FIT image (blob) in memory */ |
7a80de464 image: Correct th... |
972 |
ulong fit_get_end(const void *fit); |
5dfb52138 [new uImage] New ... |
973 974 975 976 977 978 979 980 981 |
/** * fit_get_name - get FIT node name * @fit: pointer to the FIT format image header * * returns: * NULL, on error * pointer to node name, on success */ |
712fbcf38 checkpatch whites... |
982 |
static inline const char *fit_get_name(const void *fit_hdr, |
5dfb52138 [new uImage] New ... |
983 984 |
int noffset, int *len) { |
712fbcf38 checkpatch whites... |
985 |
return fdt_get_name(fit_hdr, noffset, len); |
5dfb52138 [new uImage] New ... |
986 |
} |
712fbcf38 checkpatch whites... |
987 988 989 990 991 992 993 994 995 996 997 |
int fit_get_desc(const void *fit, int noffset, char **desc); int fit_get_timestamp(const void *fit, int noffset, time_t *timestamp); int fit_image_get_node(const void *fit, const char *image_uname); int fit_image_get_os(const void *fit, int noffset, uint8_t *os); int fit_image_get_arch(const void *fit, int noffset, uint8_t *arch); int fit_image_get_type(const void *fit, int noffset, uint8_t *type); int fit_image_get_comp(const void *fit, int noffset, uint8_t *comp); int fit_image_get_load(const void *fit, int noffset, ulong *load); int fit_image_get_entry(const void *fit, int noffset, ulong *entry); int fit_image_get_data(const void *fit, int noffset, |
5dfb52138 [new uImage] New ... |
998 |
const void **data, size_t *size); |
db1b79b88 splash: add suppo... |
999 |
int fit_image_get_data_offset(const void *fit, int noffset, int *data_offset); |
a1be94b65 SPL: Add FIT data... |
1000 1001 |
int fit_image_get_data_position(const void *fit, int noffset, int *data_position); |
db1b79b88 splash: add suppo... |
1002 |
int fit_image_get_data_size(const void *fit, int noffset, int *data_size); |
4df357811 u-boot: fit: add ... |
1003 1004 |
int fit_image_get_data_size_unciphered(const void *fit, int noffset, size_t *data_size); |
c3c863880 add FIT data-posi... |
1005 1006 |
int fit_image_get_data_and_size(const void *fit, int noffset, const void **data, size_t *size); |
5dfb52138 [new uImage] New ... |
1007 |
|
712fbcf38 checkpatch whites... |
1008 1009 |
int fit_image_hash_get_algo(const void *fit, int noffset, char **algo); int fit_image_hash_get_value(const void *fit, int noffset, uint8_t **value, |
5dfb52138 [new uImage] New ... |
1010 |
int *value_len); |
712fbcf38 checkpatch whites... |
1011 |
int fit_set_timestamp(void *fit, int noffset, time_t timestamp); |
bbb467dc3 image: Rename fit... |
1012 |
|
7298e4225 mkimage: fit: add... |
1013 1014 1015 |
int fit_cipher_data(const char *keydir, void *keydest, void *fit, const char *comment, int require_keys, const char *engine_id, const char *cmdname); |
bbb467dc3 image: Rename fit... |
1016 |
/** |
56518e710 image: Support si... |
1017 |
* fit_add_verification_data() - add verification data to FIT image nodes |
bbb467dc3 image: Rename fit... |
1018 |
* |
56518e710 image: Support si... |
1019 1020 1021 1022 1023 |
* @keydir: Directory containing keys * @kwydest: FDT blob to write public key information to * @fit: Pointer to the FIT format image header * @comment: Comment to add to signature nodes * @require_keys: Mark all keys as 'required' |
f1ca1fdeb mkimage: Add supp... |
1024 |
* @engine_id: Engine to use for signing |
795f452ee mkimage: fit_imag... |
1025 |
* @cmdname: Command name used when reporting errors |
56518e710 image: Support si... |
1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 |
* * Adds hash values for all component images in the FIT blob. * Hashes are calculated for all component images which have hash subnodes * with algorithm property set to one of the supported hash algorithms. * * Also add signatures if signature nodes are present. * * returns * 0, on success * libfdt error code, on failure |
bbb467dc3 image: Rename fit... |
1036 |
*/ |
56518e710 image: Support si... |
1037 |
int fit_add_verification_data(const char *keydir, void *keydest, void *fit, |
f1ca1fdeb mkimage: Add supp... |
1038 |
const char *comment, int require_keys, |
795f452ee mkimage: fit_imag... |
1039 |
const char *engine_id, const char *cmdname); |
5dfb52138 [new uImage] New ... |
1040 |
|
5c643db4c SPL: Add signatur... |
1041 1042 |
int fit_image_verify_with_data(const void *fit, int image_noffset, const void *data, size_t size); |
b8da83665 image: Rename fit... |
1043 |
int fit_image_verify(const void *fit, int noffset); |
782cfbb25 image: Introduce ... |
1044 |
int fit_config_verify(const void *fit, int conf_noffset); |
b8da83665 image: Rename fit... |
1045 |
int fit_all_image_verify(const void *fit); |
4df357811 u-boot: fit: add ... |
1046 |
int fit_config_decrypt(const void *fit, int conf_noffset); |
712fbcf38 checkpatch whites... |
1047 1048 1049 1050 1051 |
int fit_image_check_os(const void *fit, int noffset, uint8_t os); int fit_image_check_arch(const void *fit, int noffset, uint8_t arch); int fit_image_check_type(const void *fit, int noffset, uint8_t type); int fit_image_check_comp(const void *fit, int noffset, uint8_t comp); int fit_check_format(const void *fit); |
5dfb52138 [new uImage] New ... |
1052 |
|
d95f6ec73 fdt: Add option t... |
1053 |
int fit_conf_find_compat(const void *fit, const void *fdt); |
390b26dc2 image: Correct co... |
1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 |
/** * fit_conf_get_node - get node offset for configuration of a given unit name * @fit: pointer to the FIT format image header * @conf_uname: configuration node unit name (NULL to use default) * * fit_conf_get_node() finds a configuration (within the '/configurations' * parent node) of a provided unit name. If configuration is found its node * offset is returned to the caller. * * When NULL is provided in second argument fit_conf_get_node() will search * for a default configuration node instead. Default configuration node unit * name is retrieved from FIT_DEFAULT_PROP property of the '/configurations' * node. * * returns: * configuration node offset when found (>=0) * negative number on failure (FDT_ERR_* code) */ |
712fbcf38 checkpatch whites... |
1073 |
int fit_conf_get_node(const void *fit, const char *conf_uname); |
390b26dc2 image: Correct co... |
1074 |
|
0a42a132a ARM: socfpga: Add... |
1075 1076 1077 1078 |
int fit_conf_get_prop_node_count(const void *fit, int noffset, const char *prop_name); int fit_conf_get_prop_node_index(const void *fit, int noffset, const char *prop_name, int index); |
5dfb52138 [new uImage] New ... |
1079 |
|
003efd7da image: Export fit... |
1080 1081 1082 1083 1084 1085 |
/** * fit_conf_get_prop_node() - Get node refered to by a configuration * @fit: FIT to check * @noffset: Offset of conf@xxx node to check * @prop_name: Property to read from the conf node * |
b2267e8a2 fix incorrect usa... |
1086 1087 |
* The conf- nodes contain references to other nodes, using properties * like 'kernel = "kernel"'. Given such a property name (e.g. "kernel"), |
003efd7da image: Export fit... |
1088 |
* return the offset of the node referred to (e.g. offset of node |
b2267e8a2 fix incorrect usa... |
1089 |
* "/images/kernel". |
003efd7da image: Export fit... |
1090 1091 1092 |
*/ int fit_conf_get_prop_node(const void *fit, int noffset, const char *prop_name); |
61a439a87 image: Export fit... |
1093 1094 |
int fit_check_ramdisk(const void *fit, int os_noffset, uint8_t arch, int verify); |
604f23dde image: Move HOSTC... |
1095 1096 |
int calculate_hash(const void *data, int data_len, const char *algo, uint8_t *value, int *value_len); |
782cfbb25 image: Introduce ... |
1097 |
/* |
3e569a6b1 image: Add signin... |
1098 1099 |
* At present we only support signing on the host, and verification on the * device |
782cfbb25 image: Introduce ... |
1100 |
*/ |
89665f2eb Refactor IMAGE_EN... |
1101 1102 |
#if defined(USE_HOSTCC) # if defined(CONFIG_FIT_SIGNATURE) |
3e569a6b1 image: Add signin... |
1103 |
# define IMAGE_ENABLE_SIGN 1 |
29a23f9d6 tools, fit_check_... |
1104 |
# define IMAGE_ENABLE_VERIFY 1 |
89665f2eb Refactor IMAGE_EN... |
1105 1106 |
# include <openssl/evp.h> # else |
3e569a6b1 image: Add signin... |
1107 |
# define IMAGE_ENABLE_SIGN 0 |
89665f2eb Refactor IMAGE_EN... |
1108 |
# define IMAGE_ENABLE_VERIFY 0 |
782cfbb25 image: Introduce ... |
1109 1110 |
# endif #else |
3e569a6b1 image: Add signin... |
1111 |
# define IMAGE_ENABLE_SIGN 0 |
89665f2eb Refactor IMAGE_EN... |
1112 |
# define IMAGE_ENABLE_VERIFY CONFIG_IS_ENABLED(FIT_SIGNATURE) |
782cfbb25 image: Introduce ... |
1113 1114 1115 |
#endif #ifdef USE_HOSTCC |
29a23f9d6 tools, fit_check_... |
1116 1117 1118 |
void *image_get_host_blob(void); void image_set_host_blob(void *host_blob); # define gd_fdt_blob() image_get_host_blob() |
782cfbb25 image: Introduce ... |
1119 1120 1121 1122 1123 1124 1125 1126 1127 |
#else # define gd_fdt_blob() (gd->fdt_blob) #endif #ifdef CONFIG_FIT_BEST_MATCH #define IMAGE_ENABLE_BEST_MATCH 1 #else #define IMAGE_ENABLE_BEST_MATCH 0 #endif |
3e569a6b1 image: Add signin... |
1128 1129 1130 1131 1132 1133 |
/* Information passed to the signing routines */ struct image_sign_info { const char *keydir; /* Directory conaining keys */ const char *keyname; /* Name of key to use */ void *fit; /* Pointer to FIT blob */ int node_offset; /* Offset of signature node */ |
83dd98e01 image: Combine im... |
1134 1135 |
const char *name; /* Algorithm name */ struct checksum_algo *checksum; /* Checksum algorithm information */ |
20031567e rsa: add a struct... |
1136 |
struct padding_algo *padding; /* Padding algorithm information */ |
83dd98e01 image: Combine im... |
1137 |
struct crypto_algo *crypto; /* Crypto algorithm information */ |
3e569a6b1 image: Add signin... |
1138 1139 1140 |
const void *fdt_blob; /* FDT containing public keys */ int required_keynode; /* Node offset of key to use: -1=any */ const char *require_keys; /* Value for 'required' property */ |
f1ca1fdeb mkimage: Add supp... |
1141 |
const char *engine_id; /* Engine to use for signing */ |
3e569a6b1 image: Add signin... |
1142 |
}; |
7298e4225 mkimage: fit: add... |
1143 |
|
73223f0e1 Kconfig: Move CON... |
1144 |
#endif /* Allow struct image_region to always be defined for rsa.h */ |
3e569a6b1 image: Add signin... |
1145 1146 1147 1148 1149 1150 |
/* A part of an image, used for hashing */ struct image_region { const void *data; int size; }; |
73223f0e1 Kconfig: Move CON... |
1151 |
#if IMAGE_ENABLE_FIT |
646257d1f rsa: add sha256-r... |
1152 |
#if IMAGE_ENABLE_VERIFY |
2b9912e6a includes: move op... |
1153 |
# include <u-boot/rsa-checksum.h> |
646257d1f rsa: add sha256-r... |
1154 1155 1156 1157 |
#endif struct checksum_algo { const char *name; const int checksum_len; |
da29f2991 rsa: Verify RSA p... |
1158 1159 |
const int der_len; const uint8_t *der_prefix; |
646257d1f rsa: add sha256-r... |
1160 |
#if IMAGE_ENABLE_SIGN |
29a23f9d6 tools, fit_check_... |
1161 1162 |
const EVP_MD *(*calculate_sign)(void); #endif |
b37b46f04 rsa: Use checksum... |
1163 1164 1165 |
int (*calculate)(const char *name, const struct image_region region[], int region_count, uint8_t *checksum); |
646257d1f rsa: add sha256-r... |
1166 |
}; |
0c1d74fda image: Add crypto... |
1167 |
struct crypto_algo { |
3e569a6b1 image: Add signin... |
1168 |
const char *name; /* Name of algorithm */ |
0c1d74fda image: Add crypto... |
1169 |
const int key_len; |
3e569a6b1 image: Add signin... |
1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 |
/** * sign() - calculate and return signature for given input data * * @info: Specifies key and FIT information * @data: Pointer to the input data * @data_len: Data length * @sigp: Set to an allocated buffer holding the signature * @sig_len: Set to length of the calculated hash * * This computes input data signature according to selected algorithm. * Resulting signature value is placed in an allocated buffer, the * pointer is returned as *sigp. The length of the calculated * signature is returned via the sig_len pointer argument. The caller * should free *sigp. * * @return: 0, on success, -ve on error */ int (*sign)(struct image_sign_info *info, const struct image_region region[], int region_count, uint8_t **sigp, uint *sig_len); /** * add_verify_data() - Add verification information to FDT * * Add public key information to the FDT node, suitable for * verification at run-time. The information added depends on the * algorithm being used. * * @info: Specifies key and FIT information * @keydest: Destination FDT blob for public key data * @return: 0, on success, -ve on error */ int (*add_verify_data)(struct image_sign_info *info, void *keydest); /** * verify() - Verify a signature against some data * * @info: Specifies key and FIT information * @data: Pointer to the input data * @data_len: Data length * @sig: Signature * @sig_len: Number of bytes in signature * @return 0 if verified, -ve on error */ int (*verify)(struct image_sign_info *info, const struct image_region region[], int region_count, uint8_t *sig, uint sig_len); |
0c1d74fda image: Add crypto... |
1218 |
}; |
646257d1f rsa: add sha256-r... |
1219 |
|
20031567e rsa: add a struct... |
1220 1221 1222 1223 1224 1225 |
struct padding_algo { const char *name; int (*verify)(struct image_sign_info *info, uint8_t *pad, int pad_len, const uint8_t *hash, int hash_len); }; |
83dd98e01 image: Combine im... |
1226 1227 1228 1229 1230 1231 1232 |
/** * image_get_checksum_algo() - Look up a checksum algorithm * * @param full_name Name of algorithm in the form "checksum,crypto" * @return pointer to algorithm information, or NULL if not found */ struct checksum_algo *image_get_checksum_algo(const char *full_name); |
3e569a6b1 image: Add signin... |
1233 1234 |
/** |
83dd98e01 image: Combine im... |
1235 |
* image_get_crypto_algo() - Look up a cryptosystem algorithm |
3e569a6b1 image: Add signin... |
1236 |
* |
83dd98e01 image: Combine im... |
1237 |
* @param full_name Name of algorithm in the form "checksum,crypto" |
3e569a6b1 image: Add signin... |
1238 1239 |
* @return pointer to algorithm information, or NULL if not found */ |
83dd98e01 image: Combine im... |
1240 |
struct crypto_algo *image_get_crypto_algo(const char *full_name); |
3e569a6b1 image: Add signin... |
1241 |
|
56518e710 image: Support si... |
1242 |
/** |
20031567e rsa: add a struct... |
1243 1244 1245 1246 1247 1248 1249 1250 |
* image_get_padding_algo() - Look up a padding algorithm * * @param name Name of padding algorithm * @return pointer to algorithm information, or NULL if not found */ struct padding_algo *image_get_padding_algo(const char *name); /** |
56518e710 image: Support si... |
1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 |
* fit_image_verify_required_sigs() - Verify signatures marked as 'required' * * @fit: FIT to check * @image_noffset: Offset of image node to check * @data: Image data to check * @size: Size of image data * @sig_blob: FDT containing public keys * @no_sigsp: Returns 1 if no signatures were required, and * therefore nothing was checked. The caller may wish * to fall back to other mechanisms, or refuse to * boot. * @return 0 if all verified ok, <0 on error */ int fit_image_verify_required_sigs(const void *fit, int image_noffset, const char *data, size_t size, const void *sig_blob, int *no_sigsp); /** * fit_image_check_sig() - Check a single image signature node * * @fit: FIT to check * @noffset: Offset of signature node to check * @data: Image data to check * @size: Size of image data * @required_keynode: Offset in the control FDT of the required key node, * if any. If this is given, then the image wil not * pass verification unless that key is used. If this is * -1 then any signature will do. * @err_msgp: In the event of an error, this will be pointed to a * help error string to display to the user. * @return 0 if all verified ok, <0 on error */ int fit_image_check_sig(const void *fit, int noffset, const void *data, size_t size, int required_keynode, char **err_msgp); |
4df357811 u-boot: fit: add ... |
1285 1286 1287 1288 |
int fit_image_decrypt_data(const void *fit, int image_noffset, int cipher_noffset, const void *data, size_t size, void **data_unciphered, size_t *size_unciphered); |
4d0985295 image: Add suppor... |
1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 |
/** * fit_region_make_list() - Make a list of regions to hash * * Given a list of FIT regions (offset, size) provided by libfdt, create * a list of regions (void *, size) for use by the signature creationg * and verification code. * * @fit: FIT image to process * @fdt_regions: Regions as returned by libfdt * @count: Number of regions returned by libfdt * @region: Place to put list of regions (NULL to allocate it) * @return pointer to list of regions, or NULL if out of memory */ struct image_region *fit_region_make_list(const void *fit, struct fdt_region *fdt_regions, int count, struct image_region *region); |
56518e710 image: Support si... |
1305 |
|
712fbcf38 checkpatch whites... |
1306 |
static inline int fit_image_check_target_arch(const void *fdt, int node) |
5dfb52138 [new uImage] New ... |
1307 |
{ |
29a23f9d6 tools, fit_check_... |
1308 |
#ifndef USE_HOSTCC |
7566832a8 image: Fix invert... |
1309 |
return fit_image_check_arch(fdt, node, IH_ARCH_DEFAULT); |
29a23f9d6 tools, fit_check_... |
1310 1311 1312 |
#else return 0; #endif |
5dfb52138 [new uImage] New ... |
1313 |
} |
5dfb52138 [new uImage] New ... |
1314 |
|
7298e4225 mkimage: fit: add... |
1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 |
/* * At present we only support ciphering on the host, and unciphering on the * device */ #if defined(USE_HOSTCC) # if defined(CONFIG_FIT_CIPHER) # define IMAGE_ENABLE_ENCRYPT 1 # define IMAGE_ENABLE_DECRYPT 1 # include <openssl/evp.h> # else # define IMAGE_ENABLE_ENCRYPT 0 # define IMAGE_ENABLE_DECRYPT 0 # endif #else # define IMAGE_ENABLE_ENCRYPT 0 # define IMAGE_ENABLE_DECRYPT CONFIG_IS_ENABLED(FIT_CIPHER) #endif /* Information passed to the ciphering routines */ struct image_cipher_info { const char *keydir; /* Directory containing keys */ const char *keyname; /* Name of key to use */ const char *ivname; /* Name of IV to use */ const void *fit; /* Pointer to FIT blob */ int node_noffset; /* Offset of the cipher node */ const char *name; /* Algorithm name */ struct cipher_algo *cipher; /* Cipher algorithm information */ const void *fdt_blob; /* FDT containing key and IV */ const void *key; /* Value of the key */ const void *iv; /* Value of the IV */ size_t size_unciphered; /* Size of the unciphered data */ }; struct cipher_algo { const char *name; /* Name of algorithm */ int key_len; /* Length of the key */ int iv_len; /* Length of the IV */ #if IMAGE_ENABLE_ENCRYPT const EVP_CIPHER * (*calculate_type)(void); #endif int (*encrypt)(struct image_cipher_info *info, const unsigned char *data, int data_len, unsigned char **cipher, int *cipher_len); int (*add_cipher_data)(struct image_cipher_info *info, void *keydest); |
4df357811 u-boot: fit: add ... |
1363 1364 1365 1366 |
int (*decrypt)(struct image_cipher_info *info, const void *cipher, size_t cipher_len, void **data, size_t *data_len); |
7298e4225 mkimage: fit: add... |
1367 1368 1369 1370 1371 |
}; int fit_image_cipher_get_algo(const void *fit, int noffset, char **algo); struct cipher_algo *image_get_cipher_algo(const char *full_name); |
d5934ad77 [new uImage] Add ... |
1372 |
#ifdef CONFIG_FIT_VERBOSE |
712fbcf38 checkpatch whites... |
1373 |
#define fit_unsupported(msg) printf("! %s:%d " \ |
d5934ad77 [new uImage] Add ... |
1374 1375 1376 |
"FIT images not supported for '%s' ", \ __FILE__, __LINE__, (msg)) |
712fbcf38 checkpatch whites... |
1377 |
#define fit_unsupported_reset(msg) printf("! %s:%d " \ |
d5934ad77 [new uImage] Add ... |
1378 1379 1380 1381 1382 1383 1384 1385 |
"FIT images not supported for '%s' " \ "- must reset board to recover! ", \ __FILE__, __LINE__, (msg)) #else #define fit_unsupported(msg) #define fit_unsupported_reset(msg) #endif /* CONFIG_FIT_VERBOSE */ |
f50433d67 [new uImage] Add ... |
1386 |
#endif /* CONFIG_FIT */ |
5ad03eb38 [new uImage] Fact... |
1387 |
|
9ace3fc81 image: add suppor... |
1388 1389 1390 1391 1392 1393 1394 |
#if defined(CONFIG_ANDROID_BOOT_IMAGE) struct andr_img_hdr; int android_image_check_header(const struct andr_img_hdr *hdr); int android_image_get_kernel(const struct andr_img_hdr *hdr, int verify, ulong *os_data, ulong *os_len); int android_image_get_ramdisk(const struct andr_img_hdr *hdr, ulong *rd_data, ulong *rd_len); |
104816142 parse the second ... |
1395 1396 |
int android_image_get_second(const struct andr_img_hdr *hdr, ulong *second_data, ulong *second_len); |
7f2531502 image: android: A... |
1397 |
bool android_image_get_dtbo(ulong hdr_addr, ulong *addr, u32 *size); |
c3bfad825 image: android: A... |
1398 1399 |
bool android_image_get_dtb_by_index(ulong hdr_addr, u32 index, ulong *addr, u32 *size); |
9ace3fc81 image: add suppor... |
1400 1401 |
ulong android_image_get_end(const struct andr_img_hdr *hdr); ulong android_image_get_kload(const struct andr_img_hdr *hdr); |
829ceb282 image: android: a... |
1402 |
ulong android_image_get_kcomp(const struct andr_img_hdr *hdr); |
4f1318b29 common: image: mi... |
1403 |
void android_print_contents(const struct andr_img_hdr *hdr); |
c3bfad825 image: android: A... |
1404 1405 1406 |
#if !defined(CONFIG_SPL_BUILD) bool android_image_print_dtb_contents(ulong hdr_addr); #endif |
a2018ab0d MLK-18591-3 andro... |
1407 |
bool image_arm64(void *images); |
9ace3fc81 image: add suppor... |
1408 1409 |
#endif /* CONFIG_ANDROID_BOOT_IMAGE */ |
4b307f238 spl: Add a way fo... |
1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 |
/** * board_fit_config_name_match() - Check for a matching board name * * This is used when SPL loads a FIT containing multiple device tree files * and wants to work out which one to use. The description of each one is * passed to this function. The description comes from the 'description' field * in each (FDT) image node. * * @name: Device tree description * @return 0 if this device tree should be used, non-zero to try the next */ int board_fit_config_name_match(const char *name); |
a5c7e41be image: Fixes buil... |
1422 1423 |
#if defined(CONFIG_SPL_FIT_IMAGE_POST_PROCESS) || \ defined(CONFIG_FIT_IMAGE_POST_PROCESS) |
da74d1f34 spl: fit: add sup... |
1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 |
/** * board_fit_image_post_process() - Do any post-process on FIT binary data * * This is used to do any sort of image manipulation, verification, decryption * etc. in a platform or board specific way. Obviously, anything done here would * need to be comprehended in how the images were prepared before being injected * into the FIT creation (i.e. the binary blobs would have been pre-processed * before being added to the FIT image). * * @image: pointer to the image start pointer * @size: pointer to the image size * @return no return value (failure should be handled internally) */ void board_fit_image_post_process(void **p_image, size_t *p_size); #endif /* CONFIG_SPL_FIT_IMAGE_POST_PROCESS */ |
3863f840f spl: fit: Break o... |
1439 |
#define FDT_ERROR ((ulong)(-1)) |
92926bc80 boot_fit: Create ... |
1440 |
ulong fdt_getprop_u32(const void *fdt, int node, const char *prop); |
02035d008 fit: If no matchi... |
1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 |
/** * fit_find_config_node() - Find the node for the best DTB in a FIT image * * A FIT image contains one or more DTBs. This function parses the * configurations described in the FIT images and returns the node of * the first matching DTB. To check if a DTB matches a board, this function * calls board_fit_config_name_match(). If no matching DTB is found, it returns * the node described by the default configuration if it exists. * * @fdt: pointer to flat device tree * @return the node if found, -ve otherwise */ |
92926bc80 boot_fit: Create ... |
1454 |
int fit_find_config_node(const void *fdt); |
d7be50921 image: Add FIT im... |
1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 |
/** * Mapping of image types to function handlers to be invoked on the associated * loaded images * * @type: Type of image, I.E. IH_TYPE_* * @handler: Function to call on loaded image */ struct fit_loadable_tbl { int type; /** * handler() - Process a loaded image * * @data: Pointer to start of loaded image data * @size: Size of loaded image data */ void (*handler)(ulong data, size_t size); }; /* * Define a FIT loadable image type handler * * _type is a valid uimage_type ID as defined in the "Image Type" enum above * _handler is the handler function to call after this image type is loaded */ #define U_BOOT_FIT_LOADABLE_HANDLER(_type, _handler) \ ll_entry_declare(struct fit_loadable_tbl, _function, fit_loadable) = { \ .type = _type, \ .handler = _handler, \ } |
f13e7b2e9 [new uImage] Clea... |
1484 |
#endif /* __IMAGE_H__ */ |