From patchwork Fri Apr 22 18:27:39 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sean Anderson X-Patchwork-Id: 1621088 X-Patchwork-Delegate: trini@ti.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=seco.com header.i=@seco.com header.a=rsa-sha256 header.s=selector1 header.b=Gm2CGZwr; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=85.214.62.61; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4KlNFs139fz9s0r for ; Sat, 23 Apr 2022 04:28:33 +1000 (AEST) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 86ECD83D91; Fri, 22 Apr 2022 20:28:28 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=reject dis=none) header.from=seco.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=seco.com header.i=@seco.com header.b="Gm2CGZwr"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id BB05683E28; Fri, 22 Apr 2022 20:28:10 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.2 Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on20613.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e1b::613]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id D476381DCD for ; Fri, 22 Apr 2022 20:28:01 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=reject dis=none) header.from=seco.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=sean.anderson@seco.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QUe6u0g1kWRb2FBBle1oUZD6QOcAG98EPayT52dadup5sc+tb0ZXPxsSo/WYcIlii/LbP3Nvq8sGEMdn3U/B42qk3Bo36UDudvIf3TZdULWSmmZ3d7UOKiNlmiBwkS7jINVWPwmzS68kzubJ0U7HaXNN7t2Sy1fGqE8/JHj629fSwANoeefAyprRbtWi9seWyUFExTKwfzEhDDjcUXz5SgrO8YxCPYR+Ofkjghpx9BsFwH3q4fFlJsVrpl0tyn87YFTAfiZj5oj2GEdOEtuo1SWevWE3xaq+2pQu3Sr0uhmRBllzZKcMfZH6MNaTgsxQ4Gq43icCu3+hrm5cHOZhcw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=oGFyBIdCjlDmq8bE/NtzCcvXQ6FTzBwY2+AwJp6eyOo=; b=VwZci8d8X5+ovgWDTVGTRP1gqTrtfJ12ZmWnVQclxEWIOnRY5GYHVMXL9xfj+IsFmNrX2le58XGahuOCOVIXDZptNtJgzW9K4g/7QxS7t3AUUgQ7A/MOX/hYoW/PQodO5nPXO8caQ/oSRrF9eN1/FTQtczrWQ8bemgnIlFHCi2MiwRaMVz1PQFnMyrCgPE8ph14qBriLBT7WdxXMre91svXGL2ix1mjkqSEDxN5OcJtbOTNc1HzlI8nWWvJjFTq/ZMYiMNAh3htBqTGQL1HniedWYoL/FlqR5+w4xZj9oS5Wb9g0QgYjK2XMcb7eIoJcmO+TD006xIhsny0rYEIvNA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=seco.com; dmarc=pass action=none header.from=seco.com; dkim=pass header.d=seco.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=seco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=oGFyBIdCjlDmq8bE/NtzCcvXQ6FTzBwY2+AwJp6eyOo=; b=Gm2CGZwrT1m1KwEWFoKOGwUggHTNdOqa9C6ws6kdTF2/SpXefA5q0nVXgt9fpvGqDcgLKPjYglQo5NjUrxBLA0aT492OBmepqo0INNLxKvMDj6RylIxDAxIrcKjdpISlLEf0MYv0mJ4ulArnfeMYyBcVSzfkDTcSi6/bPuPJzxU3LbLdDCcTQMk6Cq8NkzEmWct+gUKZSJd4qAIOwYoMEInBZvAmZl54IgLuPxOBd4up/pKxYSn7190vTS8m6pkol0JIHfLkAvx6Ni/uCdjt+U0DYeSqkaPJWMNFhf2tFzxeUIn+I/ea09IAnPlnlLCId7Wgu+JZCPg/SoRNnbPdwQ== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=seco.com; Received: from DB7PR03MB4972.eurprd03.prod.outlook.com (2603:10a6:10:7d::22) by DBBPR03MB5462.eurprd03.prod.outlook.com (2603:10a6:10:f6::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5186.15; Fri, 22 Apr 2022 18:28:00 +0000 Received: from DB7PR03MB4972.eurprd03.prod.outlook.com ([fe80::714d:2b6:a995:51bd]) by DB7PR03MB4972.eurprd03.prod.outlook.com ([fe80::714d:2b6:a995:51bd%4]) with mapi id 15.20.5186.015; Fri, 22 Apr 2022 18:28:00 +0000 From: Sean Anderson To: Simon Glass Cc: =?utf-8?q?Pali_Roh=C3=A1r?= , =?utf-8?q?Marek_Beh=C3=BA?= =?utf-8?q?n?= , u-boot@lists.denx.de, Stefan Roese , Marek Vasut , Sean Anderson Subject: [PATCH v2 1/9] spl: Add generic spl_load function Date: Fri, 22 Apr 2022 14:27:39 -0400 Message-Id: <20220422182748.2309992-2-sean.anderson@seco.com> X-Mailer: git-send-email 2.35.1.1320.gc452695387.dirty In-Reply-To: <20220422182748.2309992-1-sean.anderson@seco.com> References: <20220422182748.2309992-1-sean.anderson@seco.com> X-ClientProxiedBy: BL1P223CA0005.NAMP223.PROD.OUTLOOK.COM (2603:10b6:208:2c4::10) To DB7PR03MB4972.eurprd03.prod.outlook.com (2603:10a6:10:7d::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 49d24e6a-1db0-408a-78cf-08da248dd45d X-MS-TrafficTypeDiagnostic: DBBPR03MB5462:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB7PR03MB4972.eurprd03.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(508600001)(52116002)(107886003)(2906002)(38350700002)(38100700002)(316002)(36756003)(54906003)(6916009)(66476007)(66556008)(66946007)(44832011)(6666004)(6512007)(6506007)(6486002)(5660300002)(4326008)(86362001)(8936002)(8676002)(83380400001)(186003)(26005)(2616005)(1076003)(41533002); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: seco.com X-MS-Exchange-CrossTenant-Network-Message-Id: 49d24e6a-1db0-408a-78cf-08da248dd45d X-MS-Exchange-CrossTenant-AuthSource: DB7PR03MB4972.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Apr 2022 18:27:59.9949 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: bebe97c3-6438-442e-ade3-ff17aa50e733 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: vKfGvt6IDCDLxZBAjMJyGTHdBXhTmxikWkDYdemiOsU4aL5AOgy3KpxcEBS17eI3JURtMnAecp9bCoLr2tL4mw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR03MB5462 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.5 at phobos.denx.de X-Virus-Status: Clean Implementers of SPL_LOAD_IMAGE_METHOD have to correctly determine what type of image is being loaded and then call the appropriate image load function correctly. This is tricky, because some image load functions expect the whole image to already be loaded (CONFIG_SPL_LOAD_FIT_FULL), some will load the image automatically using spl_load_info.read() (CONFIG_SPL_LOAD_FIT/CONFIG_SPL_LOAD_IMX_CONTAINER), and some just parse the header and expect the caller to do the actual loading afterwards (legacy/raw images). Load methods often only support a subset of the above methods, meaning that not all image types can be used with all load methods. Further, the code to invoke these functions is duplicated between different load functions. To address this problem, this commit introduces a "spl_load" function. It aims to handle image detection and correct invocation of each of the parse/load functions. spl_simple_read is a wrapper around spl_load_info.read with get_aligned_image* functions inlined for size purposes. Additionally, we assume that bl_len is a power of 2 so we can do bitshifts instead of divisions (which is smaller and faster). Signed-off-by: Sean Anderson Reviewed-by: Stefan Roese --- Changes in v2: - Use reverse-xmas-tree style for locals in spl_simple_read. This is not complete, since overhead depends on bl_mask. common/spl/spl.c | 61 ++++++++++++++++++++++++++++++++++++++++++++++++ include/spl.h | 30 +++++++++++++++++++++++- 2 files changed, 90 insertions(+), 1 deletion(-) diff --git a/common/spl/spl.c b/common/spl/spl.c index c9750ee163..f0c271fa20 100644 --- a/common/spl/spl.c +++ b/common/spl/spl.c @@ -399,6 +399,67 @@ int spl_parse_image_header(struct spl_image_info *spl_image, return 0; } +static int spl_simple_read(struct spl_load_info *info, void *buf, size_t size, + size_t offset) +{ + size_t bl_len = info->filename ? ARCH_DMA_MINALIGN : bl_len; + size_t bl_mask = bl_len - 1; + size_t overhead = offset & bl_mask; + size_t bl_shift = ffs(bl_mask); + int ret; + + buf -= overhead; + size = (size + overhead + bl_mask) >> bl_shift; + offset = offset >> bl_shift; + + ret = info->read(info, offset, size, buf); + return ret == size ? 0 : -EIO; +} + +int spl_load(struct spl_image_info *spl_image, + const struct spl_boot_device *bootdev, struct spl_load_info *info, + struct image_header *header, size_t size, size_t sector) +{ + int ret; + size_t offset = sector * info->bl_len; + + if (image_get_magic(header) == FDT_MAGIC) { + if (IS_ENABLED(CONFIG_SPL_LOAD_FIT_FULL)) { + void *buf; + + /* + * In order to support verifying images in the FIT, we + * need to load the whole FIT into memory. Try and + * guess how much we need to load by using the total + * size. This will fail for FITs with external data, + * but there's not much we can do about that. + */ + if (!size) + size = roundup(fdt_totalsize(header), 4); + buf = spl_get_load_buffer(0, size); + ret = spl_simple_read(info, buf, size, offset); + if (ret) + return ret; + + return spl_parse_image_header(spl_image, bootdev, buf); + } + + if (IS_ENABLED(CONFIG_SPL_LOAD_FIT)) + return spl_load_simple_fit(spl_image, info, sector, + header); + } + + if (IS_ENABLED(CONFIG_SPL_LOAD_IMX_CONTAINER)) + return spl_load_imx_container(spl_image, info, sector); + + ret = spl_parse_image_header(spl_image, bootdev, header); + if (ret) + return ret; + + return spl_simple_read(info, (void *)spl_image->load_addr, + spl_image->size, offset + spl_image->offset); +} + __weak void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image) { typedef void __noreturn (*image_entry_noargs_t)(void); diff --git a/include/spl.h b/include/spl.h index 6134aba857..025fffb895 100644 --- a/include/spl.h +++ b/include/spl.h @@ -237,7 +237,7 @@ struct spl_image_info { * * @dev: Pointer to the device, e.g. struct mmc * * @priv: Private data for the device - * @bl_len: Block length for reading in bytes + * @bl_len: Block length for reading in bytes; must be a power of 2 * @filename: Name of the fit image file. * @read: Function to call to read from the device */ @@ -609,6 +609,34 @@ int spl_load_image_ext_os(struct spl_image_info *spl_image, struct spl_boot_device *bootdev, struct blk_desc *block_dev, int partition); +/** + * spl_load() - Parse a header and load the image + * @spl_image: Image data which will be filled in by this function + * @bootdev: The device to load from + * @info: Describes how to load additional information from @bootdev. At the + * minimum, read() and bl_len must be populated. + * @header: The image header. This should already have been loaded. It may be + * clobbered by the load process (if e.g. the load address overlaps). + * @size: The size of the image, if it is known in advance. Some boot devices + * (such as filesystems) know how big an image is before parsing the + * header. If this information is unknown, then the size will be + * determined from the header. + * @sectors: The offset from the start if @bootdev, in units of @info->bl_len. + * This should have the offset @header was loaded from. It will be + * added to any offsets passed to @info->read(). + * + * This function determines the image type (FIT, legacy, i.MX, raw, etc), calls + * the appropriate parsing function, determines the load address, and the loads + * the image from storage. It is designed to replace ad-hoc image loading which + * may not support all image types (especially when config options are + * involved). + * + * Return: 0 on success, or a negative error on failure + */ +int spl_load(struct spl_image_info *spl_image, + const struct spl_boot_device *bootdev, struct spl_load_info *info, + struct image_header *header, size_t size, size_t sector); + /** * spl_early_init() - Set up device tree and driver model in SPL if enabled *