aboutsummaryrefslogtreecommitdiff
path: root/arch/arm/mach-imx/parse-container.c
diff options
context:
space:
mode:
Diffstat (limited to 'arch/arm/mach-imx/parse-container.c')
-rw-r--r--arch/arm/mach-imx/parse-container.c157
1 files changed, 0 insertions, 157 deletions
diff --git a/arch/arm/mach-imx/parse-container.c b/arch/arm/mach-imx/parse-container.c
deleted file mode 100644
index e2a9e2b273..0000000000
--- a/arch/arm/mach-imx/parse-container.c
+++ /dev/null
@@ -1,157 +0,0 @@
-// SPDX-License-Identifier: GPL-2.0+
-/*
- * Copyright 2018-2021 NXP
- */
-
-#include <common.h>
-#include <stdlib.h>
-#include <errno.h>
-#include <log.h>
-#include <spl.h>
-#include <asm/mach-imx/image.h>
-#ifdef CONFIG_AHAB_BOOT
-#include <asm/mach-imx/ahab.h>
-#endif
-
-static struct boot_img_t *read_auth_image(struct spl_image_info *spl_image,
- struct spl_load_info *info,
- struct container_hdr *container,
- int image_index,
- u32 container_sector)
-{
- struct boot_img_t *images;
- ulong sector;
- u32 sectors;
-
- if (image_index > container->num_images) {
- debug("Invalid image number\n");
- return NULL;
- }
-
- images = (struct boot_img_t *)((u8 *)container +
- sizeof(struct container_hdr));
-
- if (images[image_index].offset % info->bl_len) {
- printf("%s: image%d offset not aligned to %u\n",
- __func__, image_index, info->bl_len);
- return NULL;
- }
-
- sectors = roundup(images[image_index].size, info->bl_len) /
- info->bl_len;
- sector = images[image_index].offset / info->bl_len +
- container_sector;
-
- debug("%s: container: %p sector: %lu sectors: %u\n", __func__,
- container, sector, sectors);
- if (info->read(info, sector, sectors,
- (void *)images[image_index].entry) != sectors) {
- printf("%s wrong\n", __func__);
- return NULL;
- }
-
-#ifdef CONFIG_AHAB_BOOT
- if (ahab_verify_cntr_image(&images[image_index], image_index))
- return NULL;
-#endif
-
- return &images[image_index];
-}
-
-static int read_auth_container(struct spl_image_info *spl_image,
- struct spl_load_info *info, ulong sector)
-{
- struct container_hdr *container = NULL;
- u16 length;
- u32 sectors;
- int i, size, ret = 0;
-
- size = roundup(CONTAINER_HDR_ALIGNMENT, info->bl_len);
- sectors = size / info->bl_len;
-
- /*
- * It will not override the ATF code, so safe to use it here,
- * no need malloc
- */
- container = malloc(size);
- if (!container)
- return -ENOMEM;
-
- debug("%s: container: %p sector: %lu sectors: %u\n", __func__,
- container, sector, sectors);
- if (info->read(info, sector, sectors, container) != sectors) {
- ret = -EIO;
- goto end;
- }
-
- if (container->tag != 0x87 && container->version != 0x0) {
- printf("Wrong container header");
- ret = -ENOENT;
- goto end;
- }
-
- if (!container->num_images) {
- printf("Wrong container, no image found");
- ret = -ENOENT;
- goto end;
- }
-
- length = container->length_lsb + (container->length_msb << 8);
- debug("Container length %u\n", length);
-
- if (length > CONTAINER_HDR_ALIGNMENT) {
- size = roundup(length, info->bl_len);
- sectors = size / info->bl_len;
-
- free(container);
- container = malloc(size);
- if (!container)
- return -ENOMEM;
-
- debug("%s: container: %p sector: %lu sectors: %u\n",
- __func__, container, sector, sectors);
- if (info->read(info, sector, sectors, container) !=
- sectors) {
- ret = -EIO;
- goto end;
- }
- }
-
-#ifdef CONFIG_AHAB_BOOT
- ret = ahab_auth_cntr_hdr(container, length);
- if (ret)
- goto end_auth;
-#endif
-
- for (i = 0; i < container->num_images; i++) {
- struct boot_img_t *image = read_auth_image(spl_image, info,
- container, i,
- sector);
-
- if (!image) {
- ret = -EINVAL;
- goto end_auth;
- }
-
- if (i == 0) {
- spl_image->load_addr = image->dst;
- spl_image->entry_point = image->entry;
- }
- }
-
-end_auth:
-#ifdef CONFIG_AHAB_BOOT
- ahab_auth_release();
-#endif
-
-end:
- free(container);
-
- return ret;
-}
-
-int spl_load_imx_container(struct spl_image_info *spl_image,
- struct spl_load_info *info, ulong sector)
-{
- return read_auth_container(spl_image, info, sector);
-}