mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-11-25 14:10:43 +00:00
11f29d4436
Currently -l option for mkimage and dumpimage ignores option -T and always tries to autodetect image type. With this change it is possible to tell mkimage and dumpimage to parse image file as specific type (and not random autodetected type). This allows to use mkimage -l or dumpimage -l as tool for validating image. params.type for -l option is now by default initialized to zero (IH_TYPE_INVALID) instead of IH_TYPE_KERNEL. imagetool_get_type() for IH_TYPE_INVALID returns NULL, which is assigned to tparams. mkimage and dumpimage code is extended to handle tparams with NULL for -l option. And imagetool_verify_print_header() is extended to do validation via tparams if is not NULL. Signed-off-by: Pali Rohár <pali@kernel.org> Reviewed-by: Simon Glass <sjg@chromium.org>
177 lines
3.6 KiB
C
177 lines
3.6 KiB
C
// SPDX-License-Identifier: GPL-2.0+
|
|
/*
|
|
* (C) Copyright 2013
|
|
*
|
|
* Written by Guilherme Maciel Ferreira <guilherme.maciel.ferreira@gmail.com>
|
|
*/
|
|
|
|
#include "imagetool.h"
|
|
|
|
#include <image.h>
|
|
|
|
struct image_type_params *imagetool_get_type(int type)
|
|
{
|
|
struct image_type_params **curr;
|
|
INIT_SECTION(image_type);
|
|
|
|
struct image_type_params **start = __start_image_type;
|
|
struct image_type_params **end = __stop_image_type;
|
|
|
|
for (curr = start; curr != end; curr++) {
|
|
if ((*curr)->check_image_type) {
|
|
if (!(*curr)->check_image_type(type))
|
|
return *curr;
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
static int imagetool_verify_print_header_by_type(
|
|
void *ptr,
|
|
struct stat *sbuf,
|
|
struct image_type_params *tparams,
|
|
struct image_tool_params *params);
|
|
|
|
int imagetool_verify_print_header(
|
|
void *ptr,
|
|
struct stat *sbuf,
|
|
struct image_type_params *tparams,
|
|
struct image_tool_params *params)
|
|
{
|
|
int retval = -1;
|
|
struct image_type_params **curr;
|
|
INIT_SECTION(image_type);
|
|
|
|
struct image_type_params **start = __start_image_type;
|
|
struct image_type_params **end = __stop_image_type;
|
|
|
|
if (tparams)
|
|
return imagetool_verify_print_header_by_type(ptr, sbuf, tparams, params);
|
|
|
|
for (curr = start; curr != end; curr++) {
|
|
if ((*curr)->verify_header) {
|
|
retval = (*curr)->verify_header((unsigned char *)ptr,
|
|
sbuf->st_size, params);
|
|
|
|
if (retval == 0) {
|
|
/*
|
|
* Print the image information if verify is
|
|
* successful
|
|
*/
|
|
if ((*curr)->print_header) {
|
|
if (!params->quiet)
|
|
(*curr)->print_header(ptr);
|
|
} else {
|
|
fprintf(stderr,
|
|
"%s: print_header undefined for %s\n",
|
|
params->cmdname, (*curr)->name);
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
return retval;
|
|
}
|
|
|
|
static int imagetool_verify_print_header_by_type(
|
|
void *ptr,
|
|
struct stat *sbuf,
|
|
struct image_type_params *tparams,
|
|
struct image_tool_params *params)
|
|
{
|
|
int retval;
|
|
|
|
retval = tparams->verify_header((unsigned char *)ptr, sbuf->st_size,
|
|
params);
|
|
|
|
if (retval == 0) {
|
|
/*
|
|
* Print the image information if verify is successful
|
|
*/
|
|
if (tparams->print_header) {
|
|
if (!params->quiet)
|
|
tparams->print_header(ptr);
|
|
} else {
|
|
fprintf(stderr,
|
|
"%s: print_header undefined for %s\n",
|
|
params->cmdname, tparams->name);
|
|
}
|
|
} else {
|
|
fprintf(stderr,
|
|
"%s: verify_header failed for %s with exit code %d\n",
|
|
params->cmdname, tparams->name, retval);
|
|
}
|
|
|
|
return retval;
|
|
}
|
|
|
|
int imagetool_save_subimage(
|
|
const char *file_name,
|
|
ulong file_data,
|
|
ulong file_len)
|
|
{
|
|
int dfd;
|
|
|
|
dfd = open(file_name, O_RDWR | O_CREAT | O_TRUNC | O_BINARY,
|
|
S_IRUSR | S_IWUSR);
|
|
if (dfd < 0) {
|
|
fprintf(stderr, "Can't open \"%s\": %s\n",
|
|
file_name, strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
if (write(dfd, (void *)file_data, file_len) != (ssize_t)file_len) {
|
|
fprintf(stderr, "Write error on \"%s\": %s\n",
|
|
file_name, strerror(errno));
|
|
close(dfd);
|
|
return -1;
|
|
}
|
|
|
|
close(dfd);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int imagetool_get_filesize(struct image_tool_params *params, const char *fname)
|
|
{
|
|
struct stat sbuf;
|
|
int fd;
|
|
|
|
fd = open(fname, O_RDONLY | O_BINARY);
|
|
if (fd < 0) {
|
|
fprintf(stderr, "%s: Can't open %s: %s\n",
|
|
params->cmdname, fname, strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
if (fstat(fd, &sbuf) < 0) {
|
|
fprintf(stderr, "%s: Can't stat %s: %s\n",
|
|
params->cmdname, fname, strerror(errno));
|
|
close(fd);
|
|
return -1;
|
|
}
|
|
close(fd);
|
|
|
|
return sbuf.st_size;
|
|
}
|
|
|
|
time_t imagetool_get_source_date(
|
|
const char *cmdname,
|
|
time_t fallback)
|
|
{
|
|
char *source_date_epoch = getenv("SOURCE_DATE_EPOCH");
|
|
|
|
if (source_date_epoch == NULL)
|
|
return fallback;
|
|
|
|
time_t time = (time_t) strtol(source_date_epoch, NULL, 10);
|
|
|
|
if (gmtime(&time) == NULL) {
|
|
fprintf(stderr, "%s: SOURCE_DATE_EPOCH is not valid\n",
|
|
cmdname);
|
|
time = 0;
|
|
}
|
|
|
|
return time;
|
|
}
|