blob: 0ad23e4ba95b3aa17e940a8b426fb6cb989255e1 [file] [log] [blame]
Tom Rini10e47792018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Simon Glassa7e2d4d2016-07-04 11:57:51 -06002/*
3 * Copyright (c) 2016 Google, Inc
Simon Glassa7e2d4d2016-07-04 11:57:51 -06004 */
5
Simon Glass6056e5a2024-08-07 16:47:38 -06006#define LOG_CATEGORY LOGC_BOOT
7
Simon Glassa7e2d4d2016-07-04 11:57:51 -06008#include <dm.h>
Simon Glassf11478f2019-12-28 10:45:07 -07009#include <hang.h>
Simon Glass9ee7b732022-02-28 15:13:46 -070010#include <handoff.h>
Simon Glass36611152024-08-07 16:47:21 -060011#include <image.h>
Simon Glass97589732020-05-10 11:40:02 -060012#include <init.h>
Simon Glass0f2af882020-05-10 11:40:05 -060013#include <log.h>
Simon Glass6056e5a2024-08-07 16:47:38 -060014#include <mapmem.h>
Simon Glassa7e2d4d2016-07-04 11:57:51 -060015#include <os.h>
Simon Glass4e9c1312016-07-04 11:57:55 -060016#include <spl.h>
Simon Glass6056e5a2024-08-07 16:47:38 -060017#include <upl.h>
Simon Glass3ba929a2020-10-30 21:38:53 -060018#include <asm/global_data.h>
Simon Glassa7e2d4d2016-07-04 11:57:51 -060019#include <asm/spl.h>
20#include <asm/state.h>
Simon Glass1ef74ab2021-03-07 17:35:12 -070021#include <test/ut.h>
Simon Glassa7e2d4d2016-07-04 11:57:51 -060022
23DECLARE_GLOBAL_DATA_PTR;
24
Simon Glass1cd06002021-07-05 16:32:45 -060025int sandbox_find_next_phase(char *fname, int maxlen, bool use_img)
26{
27 const char *cur_prefix, *next_prefix;
28 int ret;
29
Simon Glass6c6fcc62024-09-29 19:49:40 -060030 cur_prefix = xpl_prefix(xpl_phase());
31 next_prefix = xpl_prefix(xpl_next_phase());
Simon Glass1cd06002021-07-05 16:32:45 -060032 ret = os_find_u_boot(fname, maxlen, use_img, cur_prefix, next_prefix);
33 if (ret)
34 return log_msg_ret("find", ret);
35
36 return 0;
37}
38
Simon Glassc86e6202022-04-30 00:56:54 -060039/* SPL / TPL / VPL init function */
Simon Glassa7e2d4d2016-07-04 11:57:51 -060040void board_init_f(ulong flag)
41{
42 struct sandbox_state *state = state_get_current();
Simon Glassc86e6202022-04-30 00:56:54 -060043 int ret;
Simon Glassa7e2d4d2016-07-04 11:57:51 -060044
45 gd->arch.ram_buf = state->ram_buf;
46 gd->ram_size = state->ram_size;
Simon Glassc86e6202022-04-30 00:56:54 -060047
48 ret = spl_early_init();
49 if (ret) {
50 debug("spl_early_init() failed: %d\n", ret);
51 hang();
52 }
53 preloader_console_init();
Simon Glassa7e2d4d2016-07-04 11:57:51 -060054}
55
Simon Glass4aa6a9b2022-10-20 18:23:01 -060056void board_boot_order(u32 *spl_boot_list)
Simon Glassa7e2d4d2016-07-04 11:57:51 -060057{
Simon Glass9d246ae2024-09-25 12:44:53 +020058 struct sandbox_state *state = state_get_current();
59
Simon Glassd78aa752022-10-20 18:23:10 -060060 spl_boot_list[0] = BOOT_DEVICE_VBE;
Simon Glass9d246ae2024-09-25 12:44:53 +020061 spl_boot_list[1] = state->upl ? BOOT_DEVICE_UPL : BOOT_DEVICE_BOARD;
Simon Glassa7e2d4d2016-07-04 11:57:51 -060062}
63
Simon Glass4aa6a9b2022-10-20 18:23:01 -060064static int spl_board_load_file(struct spl_image_info *spl_image,
65 struct spl_boot_device *bootdev)
Simon Glassa7e2d4d2016-07-04 11:57:51 -060066{
67 char fname[256];
68 int ret;
69
Simon Glass1cd06002021-07-05 16:32:45 -060070 ret = sandbox_find_next_phase(fname, sizeof(fname), false);
Simon Glasse8845d22016-11-30 15:30:56 -070071 if (ret) {
72 printf("(%s not found, error %d)\n", fname, ret);
Simon Glassa7e2d4d2016-07-04 11:57:51 -060073 return ret;
Simon Glasse8845d22016-11-30 15:30:56 -070074 }
Simon Glassa7e2d4d2016-07-04 11:57:51 -060075
Simon Glassedd094e2021-02-06 09:57:33 -070076 /*
77 * Set up spl_image to boot from jump_to_image_no_args(). Allocate this
78 * outsdide the RAM buffer (i.e. don't use strdup()).
79 */
80 spl_image->arg = os_malloc(strlen(fname) + 1);
Simon Glasscca25522018-11-15 18:44:08 -070081 if (!spl_image->arg)
Simon Glassedd094e2021-02-06 09:57:33 -070082 return log_msg_ret("exec", -ENOMEM);
83 strcpy(spl_image->arg, fname);
Simon Glass4aa6a9b2022-10-20 18:23:01 -060084 spl_image->flags = SPL_SANDBOXF_ARG_IS_FNAME;
Simon Glasscca25522018-11-15 18:44:08 -070085
86 return 0;
Simon Glassa7e2d4d2016-07-04 11:57:51 -060087}
Simon Glassa87cd0c2022-10-20 18:23:08 -060088SPL_LOAD_IMAGE_METHOD("sandbox_file", 9, BOOT_DEVICE_BOARD,
89 spl_board_load_file);
90
91static int load_from_image(struct spl_image_info *spl_image,
92 struct spl_boot_device *bootdev)
93{
94 struct sandbox_state *state = state_get_current();
Simon Glassdb2d1012024-09-29 19:49:35 -060095 enum xpl_phase_t next_phase;
Simon Glassa87cd0c2022-10-20 18:23:08 -060096 const char *fname;
97 ulong pos, size;
98 int full_size;
99 void *buf;
100 int ret;
101
102 if (!IS_ENABLED(CONFIG_SANDBOX_VPL))
103 return -ENOENT;
104
Simon Glass6b7f9c02024-09-29 19:49:39 -0600105 next_phase = xpl_next_phase();
Simon Glassa87cd0c2022-10-20 18:23:08 -0600106 pos = spl_get_image_pos();
107 size = spl_get_image_size();
108 if (pos == BINMAN_SYM_MISSING || size == BINMAN_SYM_MISSING) {
109 log_debug("No image found\n");
110 return -ENOENT;
111 }
112 log_info("Reading from pos %lx size %lx\n", pos, size);
113
114 /*
115 * Set up spl_image to boot from jump_to_image_no_args(). Allocate this
116 * outside the RAM buffer (i.e. don't use strdup()).
117 */
118 fname = state->prog_fname ? state->prog_fname : state->argv[0];
119 ret = os_read_file(fname, &buf, &full_size);
120 if (ret)
121 return log_msg_ret("rd", -ENOMEM);
122 spl_image->flags = SPL_SANDBOXF_ARG_IS_BUF;
123 spl_image->arg = buf;
124 spl_image->offset = pos;
125 spl_image->size = size;
126
127 return 0;
128}
129SPL_LOAD_IMAGE_METHOD("sandbox_image", 7, BOOT_DEVICE_BOARD, load_from_image);
Simon Glass4e9c1312016-07-04 11:57:55 -0600130
Sughosh Ganuc5212462024-08-26 17:29:34 +0530131int dram_init_banksize(void)
132{
133 /* These are necessary so TFTP can use LMBs to check its load address */
134 gd->bd->bi_dram[0].start = gd->ram_base;
135 gd->bd->bi_dram[0].size = get_effective_memsize();
136
137 return 0;
138}
139
Simon Glass4e9c1312016-07-04 11:57:55 -0600140void spl_board_init(void)
141{
Simon Glassb5dfea82018-11-15 18:44:01 -0700142 struct sandbox_state *state = state_get_current();
Simon Glassb5dfea82018-11-15 18:44:01 -0700143
Heinrich Schuchardt0b465d62023-10-03 02:59:46 +0200144 if (!CONFIG_IS_ENABLED(UNIT_TEST))
145 return;
146
Simon Glassa4e289b2020-10-25 20:38:28 -0600147 if (state->run_unittests) {
Simon Glass1ef74ab2021-03-07 17:35:12 -0700148 struct unit_test *tests = UNIT_TEST_ALL_START();
149 const int count = UNIT_TEST_ALL_COUNT();
Simon Glass3869eb52025-01-20 14:25:26 -0700150 struct unit_test_state uts;
Simon Glassa4e289b2020-10-25 20:38:28 -0600151 int ret;
152
Simon Glass3869eb52025-01-20 14:25:26 -0700153 ut_init_state(&uts);
154 ret = ut_run_list(&uts, "spl", NULL, tests, count,
Simon Glass85ba7c32022-10-29 19:47:13 -0600155 state->select_unittests, 1, false, NULL);
Simon Glass3869eb52025-01-20 14:25:26 -0700156 ut_uninit_state(&uts);
Simon Glassa4e289b2020-10-25 20:38:28 -0600157 /* continue execution into U-Boot */
158 }
Simon Glass4e9c1312016-07-04 11:57:55 -0600159}
Simon Glasscca25522018-11-15 18:44:08 -0700160
161void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
162{
Simon Glass4aa6a9b2022-10-20 18:23:01 -0600163 switch (spl_image->flags) {
164 case SPL_SANDBOXF_ARG_IS_FNAME: {
165 const char *fname = spl_image->arg;
Simon Glasscca25522018-11-15 18:44:08 -0700166
Simon Glass4aa6a9b2022-10-20 18:23:01 -0600167 if (fname) {
168 os_fd_restore();
169 os_spl_to_uboot(fname);
170 } else {
171 log_err("No filename provided for U-Boot\n");
172 }
173 break;
174 }
Simon Glassa87cd0c2022-10-20 18:23:08 -0600175 case SPL_SANDBOXF_ARG_IS_BUF: {
176 int ret;
177
178 ret = os_jump_to_image(spl_image->arg + spl_image->offset,
179 spl_image->size);
180 if (ret)
181 log_err("Failed to load image\n");
182 break;
183 }
Simon Glass4aa6a9b2022-10-20 18:23:01 -0600184 default:
185 log_err("Invalid flags\n");
186 break;
Simon Glass38c2eae2018-11-23 21:29:25 -0700187 }
Simon Glasscca25522018-11-15 18:44:08 -0700188 hang();
189}
Simon Glassc5d27202019-09-25 08:11:18 -0600190
191int handoff_arch_save(struct spl_handoff *ho)
192{
193 ho->arch.magic = TEST_HANDOFF_MAGIC;
194
195 return 0;
196}
Simon Glass36611152024-08-07 16:47:21 -0600197
198/* Context used to hold file descriptor */
199struct load_ctx {
200 int fd;
201};
202
203static ulong read_fit_image(struct spl_load_info *load, ulong offset,
204 ulong size, void *buf)
205{
206 struct load_ctx *load_ctx = load->priv;
207 off_t ret;
208 ssize_t res;
209
210 ret = os_lseek(load_ctx->fd, offset, OS_SEEK_SET);
211 if (ret < 0) {
Simon Glass3dbd4ae2024-08-07 16:47:24 -0600212 printf("Failed to seek to %zx, got %zx\n", offset, ret);
213 return log_msg_ret("lse", ret);
Simon Glass36611152024-08-07 16:47:21 -0600214 }
215
216 res = os_read(load_ctx->fd, buf, size);
217 if (res < 0) {
Simon Glass3dbd4ae2024-08-07 16:47:24 -0600218 printf("Failed to read %lx bytes, got %ld\n", size, res);
219 return log_msg_ret("osr", res);
Simon Glass36611152024-08-07 16:47:21 -0600220 }
221
222 return size;
223}
224
225int sandbox_spl_load_fit(char *fname, int maxlen, struct spl_image_info *image)
226{
227 struct legacy_img_hdr *header;
228 struct load_ctx load_ctx;
229 struct spl_load_info load;
230 int ret;
231 int fd;
232
Simon Glasse8066862024-08-22 07:55:02 -0600233 spl_load_init(&load, read_fit_image, &load_ctx,
234 IS_ENABLED(CONFIG_SPL_LOAD_BLOCK) ? 512 : 1);
Simon Glass36611152024-08-07 16:47:21 -0600235
236 ret = sandbox_find_next_phase(fname, maxlen, true);
237 if (ret) {
238 printf("%s not found, error %d\n", fname, ret);
239 return log_msg_ret("nph", ret);
240 }
241
242 header = spl_get_load_buffer(-sizeof(*header), sizeof(*header));
243
244 log_debug("reading from %s\n", fname);
245 fd = os_open(fname, OS_O_RDONLY);
246 if (fd < 0) {
247 printf("Failed to open '%s'\n", fname);
248 return log_msg_ret("ope", -errno);
249 }
250 ret = os_read(fd, header, sizeof(*header));
251 if (ret != sizeof(*header)) {
Simon Glass3dbd4ae2024-08-07 16:47:24 -0600252 printf("Failed to read %lx bytes, got %d\n", sizeof(*header),
253 ret);
254 return log_msg_ret("rea", ret);
Simon Glass36611152024-08-07 16:47:21 -0600255 }
256 load_ctx.fd = fd;
257
258 load.priv = &load_ctx;
259
260 ret = spl_load_simple_fit(image, &load, 0, header);
261 if (ret)
262 return log_msg_ret("slf", ret);
263
264 return 0;
265}
Simon Glass6056e5a2024-08-07 16:47:38 -0600266
267static int upl_load_from_image(struct spl_image_info *spl_image,
268 struct spl_boot_device *bootdev)
269{
270 long long size;
271 char *fname;
272 int ret, fd;
273 ulong addr;
274
275 if (!CONFIG_IS_ENABLED(UPL_OUT))
276 return -ENOTSUPP;
277
278 spl_upl_init();
279 fname = os_malloc(256);
280
281 ret = sandbox_spl_load_fit(fname, 256, spl_image);
282 if (ret)
283 return log_msg_ret("fit", ret);
284 spl_image->flags = SPL_SANDBOXF_ARG_IS_BUF;
285 spl_image->arg = map_sysmem(spl_image->load_addr, 0);
286 /* size is set by load_simple_fit(), offset is left as 0 */
287
288 /* now read the whole FIT into memory */
289 fd = os_open(fname, OS_O_RDONLY);
290 if (fd < 0)
291 return log_msg_ret("op2", -ENOENT);
292 if (os_get_filesize(fname, &size))
293 return log_msg_ret("fis", -ENOENT);
294
295 /* place it after the loaded image, allowing plenty of space */
296 addr = ALIGN(spl_image->load_addr + size, 0x1000);
297 log_debug("Loading whole FIT to %lx\n", addr);
298 if (os_read(fd, map_sysmem(addr, 0), size) != size)
299 return log_msg_ret("rea", -EIO);
300 os_close(fd);
301
302 /* tell UPL where it is */
303 upl_set_fit_addr(addr);
304
305 return 0;
306}
307SPL_LOAD_IMAGE_METHOD("upl", 4, BOOT_DEVICE_UPL, upl_load_from_image);