blob: 75f4601fdfb619ee49f03eee885799490a9a8941 [file] [log] [blame]
Tom Rini10e47792018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Simon Glassa7e2d4d2016-07-04 11:57:51 -06002/*
3 * Copyright (c) 2016 Google, Inc
Simon Glassa7e2d4d2016-07-04 11:57:51 -06004 */
5
6#include <common.h>
7#include <dm.h>
Simon Glassf11478f2019-12-28 10:45:07 -07008#include <hang.h>
Simon Glass9ee7b732022-02-28 15:13:46 -07009#include <handoff.h>
Simon Glass97589732020-05-10 11:40:02 -060010#include <init.h>
Simon Glass0f2af882020-05-10 11:40:05 -060011#include <log.h>
Simon Glassa7e2d4d2016-07-04 11:57:51 -060012#include <os.h>
Simon Glass4e9c1312016-07-04 11:57:55 -060013#include <spl.h>
Simon Glass3ba929a2020-10-30 21:38:53 -060014#include <asm/global_data.h>
Simon Glassa7e2d4d2016-07-04 11:57:51 -060015#include <asm/spl.h>
16#include <asm/state.h>
Simon Glass1ef74ab2021-03-07 17:35:12 -070017#include <test/ut.h>
Simon Glassa7e2d4d2016-07-04 11:57:51 -060018
19DECLARE_GLOBAL_DATA_PTR;
20
Simon Glass1cd06002021-07-05 16:32:45 -060021int sandbox_find_next_phase(char *fname, int maxlen, bool use_img)
22{
23 const char *cur_prefix, *next_prefix;
24 int ret;
25
26 cur_prefix = spl_phase_prefix(spl_phase());
27 next_prefix = spl_phase_prefix(spl_next_phase());
28 ret = os_find_u_boot(fname, maxlen, use_img, cur_prefix, next_prefix);
29 if (ret)
30 return log_msg_ret("find", ret);
31
32 return 0;
33}
34
Simon Glassc86e6202022-04-30 00:56:54 -060035/* SPL / TPL / VPL init function */
Simon Glassa7e2d4d2016-07-04 11:57:51 -060036void board_init_f(ulong flag)
37{
38 struct sandbox_state *state = state_get_current();
Simon Glassc86e6202022-04-30 00:56:54 -060039 int ret;
Simon Glassa7e2d4d2016-07-04 11:57:51 -060040
41 gd->arch.ram_buf = state->ram_buf;
42 gd->ram_size = state->ram_size;
Simon Glassc86e6202022-04-30 00:56:54 -060043
44 ret = spl_early_init();
45 if (ret) {
46 debug("spl_early_init() failed: %d\n", ret);
47 hang();
48 }
49 preloader_console_init();
Simon Glassa7e2d4d2016-07-04 11:57:51 -060050}
51
Simon Glass4aa6a9b2022-10-20 18:23:01 -060052void board_boot_order(u32 *spl_boot_list)
Simon Glassa7e2d4d2016-07-04 11:57:51 -060053{
Simon Glass4aa6a9b2022-10-20 18:23:01 -060054 spl_boot_list[0] = BOOT_DEVICE_BOARD;
Simon Glassa7e2d4d2016-07-04 11:57:51 -060055}
56
Simon Glass4aa6a9b2022-10-20 18:23:01 -060057static int spl_board_load_file(struct spl_image_info *spl_image,
58 struct spl_boot_device *bootdev)
Simon Glassa7e2d4d2016-07-04 11:57:51 -060059{
60 char fname[256];
61 int ret;
62
Simon Glass1cd06002021-07-05 16:32:45 -060063 ret = sandbox_find_next_phase(fname, sizeof(fname), false);
Simon Glasse8845d22016-11-30 15:30:56 -070064 if (ret) {
65 printf("(%s not found, error %d)\n", fname, ret);
Simon Glassa7e2d4d2016-07-04 11:57:51 -060066 return ret;
Simon Glasse8845d22016-11-30 15:30:56 -070067 }
Simon Glassa7e2d4d2016-07-04 11:57:51 -060068
Simon Glassedd094e2021-02-06 09:57:33 -070069 /*
70 * Set up spl_image to boot from jump_to_image_no_args(). Allocate this
71 * outsdide the RAM buffer (i.e. don't use strdup()).
72 */
73 spl_image->arg = os_malloc(strlen(fname) + 1);
Simon Glasscca25522018-11-15 18:44:08 -070074 if (!spl_image->arg)
Simon Glassedd094e2021-02-06 09:57:33 -070075 return log_msg_ret("exec", -ENOMEM);
76 strcpy(spl_image->arg, fname);
Simon Glass4aa6a9b2022-10-20 18:23:01 -060077 spl_image->flags = SPL_SANDBOXF_ARG_IS_FNAME;
Simon Glasscca25522018-11-15 18:44:08 -070078
79 return 0;
Simon Glassa7e2d4d2016-07-04 11:57:51 -060080}
Simon Glassa87cd0c2022-10-20 18:23:08 -060081SPL_LOAD_IMAGE_METHOD("sandbox_file", 9, BOOT_DEVICE_BOARD,
82 spl_board_load_file);
83
84static int load_from_image(struct spl_image_info *spl_image,
85 struct spl_boot_device *bootdev)
86{
87 struct sandbox_state *state = state_get_current();
88 enum u_boot_phase next_phase;
89 const char *fname;
90 ulong pos, size;
91 int full_size;
92 void *buf;
93 int ret;
94
95 if (!IS_ENABLED(CONFIG_SANDBOX_VPL))
96 return -ENOENT;
97
98 next_phase = spl_next_phase();
99 pos = spl_get_image_pos();
100 size = spl_get_image_size();
101 if (pos == BINMAN_SYM_MISSING || size == BINMAN_SYM_MISSING) {
102 log_debug("No image found\n");
103 return -ENOENT;
104 }
105 log_info("Reading from pos %lx size %lx\n", pos, size);
106
107 /*
108 * Set up spl_image to boot from jump_to_image_no_args(). Allocate this
109 * outside the RAM buffer (i.e. don't use strdup()).
110 */
111 fname = state->prog_fname ? state->prog_fname : state->argv[0];
112 ret = os_read_file(fname, &buf, &full_size);
113 if (ret)
114 return log_msg_ret("rd", -ENOMEM);
115 spl_image->flags = SPL_SANDBOXF_ARG_IS_BUF;
116 spl_image->arg = buf;
117 spl_image->offset = pos;
118 spl_image->size = size;
119
120 return 0;
121}
122SPL_LOAD_IMAGE_METHOD("sandbox_image", 7, BOOT_DEVICE_BOARD, load_from_image);
Simon Glass4e9c1312016-07-04 11:57:55 -0600123
124void spl_board_init(void)
125{
Simon Glassb5dfea82018-11-15 18:44:01 -0700126 struct sandbox_state *state = state_get_current();
Simon Glassb5dfea82018-11-15 18:44:01 -0700127
Simon Glassa4e289b2020-10-25 20:38:28 -0600128 if (state->run_unittests) {
Simon Glass1ef74ab2021-03-07 17:35:12 -0700129 struct unit_test *tests = UNIT_TEST_ALL_START();
130 const int count = UNIT_TEST_ALL_COUNT();
Simon Glassa4e289b2020-10-25 20:38:28 -0600131 int ret;
132
Simon Glass1ef74ab2021-03-07 17:35:12 -0700133 ret = ut_run_list("spl", NULL, tests, count,
Simon Glass1f1614b2022-10-20 18:22:50 -0600134 state->select_unittests, 1, false);
Simon Glassa4e289b2020-10-25 20:38:28 -0600135 /* continue execution into U-Boot */
136 }
Simon Glass4e9c1312016-07-04 11:57:55 -0600137}
Simon Glasscca25522018-11-15 18:44:08 -0700138
139void __noreturn jump_to_image_no_args(struct spl_image_info *spl_image)
140{
Simon Glass4aa6a9b2022-10-20 18:23:01 -0600141 switch (spl_image->flags) {
142 case SPL_SANDBOXF_ARG_IS_FNAME: {
143 const char *fname = spl_image->arg;
Simon Glasscca25522018-11-15 18:44:08 -0700144
Simon Glass4aa6a9b2022-10-20 18:23:01 -0600145 if (fname) {
146 os_fd_restore();
147 os_spl_to_uboot(fname);
148 } else {
149 log_err("No filename provided for U-Boot\n");
150 }
151 break;
152 }
Simon Glassa87cd0c2022-10-20 18:23:08 -0600153 case SPL_SANDBOXF_ARG_IS_BUF: {
154 int ret;
155
156 ret = os_jump_to_image(spl_image->arg + spl_image->offset,
157 spl_image->size);
158 if (ret)
159 log_err("Failed to load image\n");
160 break;
161 }
Simon Glass4aa6a9b2022-10-20 18:23:01 -0600162 default:
163 log_err("Invalid flags\n");
164 break;
Simon Glass38c2eae2018-11-23 21:29:25 -0700165 }
Simon Glasscca25522018-11-15 18:44:08 -0700166 hang();
167}
Simon Glassc5d27202019-09-25 08:11:18 -0600168
169int handoff_arch_save(struct spl_handoff *ho)
170{
171 ho->arch.magic = TEST_HANDOFF_MAGIC;
172
173 return 0;
174}