summaryrefslogtreecommitdiff
path: root/common
diff options
context:
space:
mode:
authorSean Anderson <seanga2@gmail.com>2023-10-14 16:47:45 -0400
committerTom Rini <trini@konsulko.com>2023-10-17 20:50:52 -0400
commit12b3339070bcab746355647a6aae7498f28c4add (patch)
tree52d5be93e9e388e681164ff7a928caea9fa1d574 /common
parentab12179b3e9fa8a9c54f9cd5ad6b2c0c185a2191 (diff)
downloadu-boot-12b3339070bcab746355647a6aae7498f28c4add.tar.gz
u-boot-12b3339070bcab746355647a6aae7498f28c4add.tar.bz2
u-boot-12b3339070bcab746355647a6aae7498f28c4add.zip
Move i.MX8 container image loading support to common/spl
To facilitate testing loading i.MX8 container images, move the parse-container code to common/spl. Signed-off-by: Sean Anderson <seanga2@gmail.com>
Diffstat (limited to 'common')
-rw-r--r--common/spl/Kconfig14
-rw-r--r--common/spl/Makefile1
-rw-r--r--common/spl/spl_imx_container.c158
3 files changed, 173 insertions, 0 deletions
diff --git a/common/spl/Kconfig b/common/spl/Kconfig
index 4632359794..ad574a600e 100644
--- a/common/spl/Kconfig
+++ b/common/spl/Kconfig
@@ -330,6 +330,20 @@ config SPL_LEGACY_IMAGE_CRC_CHECK
If disabled, Legacy images are booted if the image magic and size
are correct, without further integrity checks.
+config SPL_LOAD_IMX_CONTAINER
+ bool "Enable SPL loading and booting of i.MX8 Containers"
+ depends on SPL
+ help
+ Support booting U-Boot from an i.MX8 container image. If you are not
+ using i.MX8, say 'n'.
+
+config IMX_CONTAINER_CFG
+ string "i.MX8 Container config file"
+ depends on SPL && SPL_LOAD_IMX_CONTAINER
+ help
+ Specify the cfg file for generating the container image which will be
+ loaded by SPL.
+
config SPL_SYS_MALLOC_SIMPLE
bool "Only use malloc_simple functions in the SPL"
help
diff --git a/common/spl/Makefile b/common/spl/Makefile
index bad2bbf6cf..4f8eb2ec0c 100644
--- a/common/spl/Makefile
+++ b/common/spl/Makefile
@@ -28,6 +28,7 @@ obj-$(CONFIG_$(SPL_TPL_)OPENSBI) += spl_opensbi.o
obj-$(CONFIG_$(SPL_TPL_)USB_STORAGE) += spl_usb.o
obj-$(CONFIG_$(SPL_TPL_)FS_FAT) += spl_fat.o
obj-$(CONFIG_$(SPL_TPL_)FS_EXT4) += spl_ext.o
+obj-$(CONFIG_$(SPL_TPL_)LOAD_IMX_CONTAINER) += spl_imx_container.o
obj-$(CONFIG_$(SPL_TPL_)SATA) += spl_sata.o
obj-$(CONFIG_$(SPL_TPL_)NVME) += spl_nvme.o
obj-$(CONFIG_$(SPL_TPL_)SEMIHOSTING) += spl_semihosting.o
diff --git a/common/spl/spl_imx_container.c b/common/spl/spl_imx_container.c
new file mode 100644
index 0000000000..c29cb15f55
--- /dev/null
+++ b/common/spl/spl_imx_container.c
@@ -0,0 +1,158 @@
+// SPDX-License-Identifier: GPL-2.0+
+/*
+ * Copyright 2018-2021 NXP
+ */
+
+#define LOG_CATEGORY LOGC_ARCH
+#include <common.h>
+#include <stdlib.h>
+#include <errno.h>
+#include <imx_container.h>
+#include <log.h>
+#include <spl.h>
+#ifdef CONFIG_AHAB_BOOT
+#include <asm/mach-imx/ahab.h>
+#endif
+
+static struct boot_img_t *read_auth_image(struct spl_image_info *spl_image,
+ struct spl_load_info *info,
+ struct container_hdr *container,
+ int image_index,
+ u32 container_sector)
+{
+ struct boot_img_t *images;
+ ulong sector;
+ u32 sectors;
+
+ if (image_index > container->num_images) {
+ debug("Invalid image number\n");
+ return NULL;
+ }
+
+ images = (struct boot_img_t *)((u8 *)container +
+ sizeof(struct container_hdr));
+
+ if (images[image_index].offset % info->bl_len) {
+ printf("%s: image%d offset not aligned to %u\n",
+ __func__, image_index, info->bl_len);
+ return NULL;
+ }
+
+ sectors = roundup(images[image_index].size, info->bl_len) /
+ info->bl_len;
+ sector = images[image_index].offset / info->bl_len +
+ container_sector;
+
+ debug("%s: container: %p sector: %lu sectors: %u\n", __func__,
+ container, sector, sectors);
+ if (info->read(info, sector, sectors,
+ (void *)images[image_index].dst) != sectors) {
+ printf("%s wrong\n", __func__);
+ return NULL;
+ }
+
+#ifdef CONFIG_AHAB_BOOT
+ if (ahab_verify_cntr_image(&images[image_index], image_index))
+ return NULL;
+#endif
+
+ return &images[image_index];
+}
+
+static int read_auth_container(struct spl_image_info *spl_image,
+ struct spl_load_info *info, ulong sector)
+{
+ struct container_hdr *container = NULL;
+ u16 length;
+ u32 sectors;
+ int i, size, ret = 0;
+
+ size = roundup(CONTAINER_HDR_ALIGNMENT, info->bl_len);
+ sectors = size / info->bl_len;
+
+ /*
+ * It will not override the ATF code, so safe to use it here,
+ * no need malloc
+ */
+ container = malloc(size);
+ if (!container)
+ return -ENOMEM;
+
+ debug("%s: container: %p sector: %lu sectors: %u\n", __func__,
+ container, sector, sectors);
+ if (info->read(info, sector, sectors, container) != sectors) {
+ ret = -EIO;
+ goto end;
+ }
+
+ if (!valid_container_hdr(container)) {
+ log_err("Wrong container header\n");
+ ret = -ENOENT;
+ goto end;
+ }
+
+ if (!container->num_images) {
+ log_err("Wrong container, no image found\n");
+ ret = -ENOENT;
+ goto end;
+ }
+
+ length = container->length_lsb + (container->length_msb << 8);
+ debug("Container length %u\n", length);
+
+ if (length > CONTAINER_HDR_ALIGNMENT) {
+ size = roundup(length, info->bl_len);
+ sectors = size / info->bl_len;
+
+ free(container);
+ container = malloc(size);
+ if (!container)
+ return -ENOMEM;
+
+ debug("%s: container: %p sector: %lu sectors: %u\n",
+ __func__, container, sector, sectors);
+ if (info->read(info, sector, sectors, container) !=
+ sectors) {
+ ret = -EIO;
+ goto end;
+ }
+ }
+
+#ifdef CONFIG_AHAB_BOOT
+ ret = ahab_auth_cntr_hdr(container, length);
+ if (ret)
+ goto end_auth;
+#endif
+
+ for (i = 0; i < container->num_images; i++) {
+ struct boot_img_t *image = read_auth_image(spl_image, info,
+ container, i,
+ sector);
+
+ if (!image) {
+ ret = -EINVAL;
+ goto end_auth;
+ }
+
+ if (i == 0) {
+ spl_image->load_addr = image->dst;
+ spl_image->entry_point = image->entry;
+ }
+ }
+
+end_auth:
+#ifdef CONFIG_AHAB_BOOT
+ ahab_auth_release();
+#endif
+
+end:
+ free(container);
+
+ return ret;
+}
+
+int spl_load_imx_container(struct spl_image_info *spl_image,
+ struct spl_load_info *info, ulong sector)
+{
+ return read_auth_container(spl_image, info, sector);
+}