mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-12-05 19:10:13 +00:00
30705cd892
On some image types like i.MX8 and i.MX8M, the verify_header function is not implemented. Before this commit, no check on tparams->verify_header was done causing a segfault if NULL. Now, a proper error message is printed. Signed-off-by: Nicolas Heemeryck <nicolas.heemeryck@gmail.com>
183 lines
3.8 KiB
C
183 lines
3.8 KiB
C
// SPDX-License-Identifier: GPL-2.0+
|
|
/*
|
|
* (C) Copyright 2013
|
|
*
|
|
* Written by Guilherme Maciel Ferreira <guilherme.maciel.ferreira@gmail.com>
|
|
*/
|
|
|
|
#include "imagetool.h"
|
|
|
|
#include <image.h>
|
|
|
|
struct image_type_params *imagetool_get_type(int type)
|
|
{
|
|
struct image_type_params **curr;
|
|
INIT_SECTION(image_type);
|
|
|
|
struct image_type_params **start = __start_image_type;
|
|
struct image_type_params **end = __stop_image_type;
|
|
|
|
for (curr = start; curr != end; curr++) {
|
|
if ((*curr)->check_image_type) {
|
|
if (!(*curr)->check_image_type(type))
|
|
return *curr;
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
static int imagetool_verify_print_header_by_type(
|
|
void *ptr,
|
|
struct stat *sbuf,
|
|
struct image_type_params *tparams,
|
|
struct image_tool_params *params);
|
|
|
|
int imagetool_verify_print_header(
|
|
void *ptr,
|
|
struct stat *sbuf,
|
|
struct image_type_params *tparams,
|
|
struct image_tool_params *params)
|
|
{
|
|
int retval = -1;
|
|
struct image_type_params **curr;
|
|
INIT_SECTION(image_type);
|
|
|
|
struct image_type_params **start = __start_image_type;
|
|
struct image_type_params **end = __stop_image_type;
|
|
|
|
if (tparams)
|
|
return imagetool_verify_print_header_by_type(ptr, sbuf, tparams, params);
|
|
|
|
for (curr = start; curr != end; curr++) {
|
|
if ((*curr)->verify_header) {
|
|
retval = (*curr)->verify_header((unsigned char *)ptr,
|
|
sbuf->st_size, params);
|
|
|
|
if (retval == 0) {
|
|
/*
|
|
* Print the image information if verify is
|
|
* successful
|
|
*/
|
|
if ((*curr)->print_header) {
|
|
if (!params->quiet)
|
|
(*curr)->print_header(ptr);
|
|
} else {
|
|
fprintf(stderr,
|
|
"%s: print_header undefined for %s\n",
|
|
params->cmdname, (*curr)->name);
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
return retval;
|
|
}
|
|
|
|
static int imagetool_verify_print_header_by_type(
|
|
void *ptr,
|
|
struct stat *sbuf,
|
|
struct image_type_params *tparams,
|
|
struct image_tool_params *params)
|
|
{
|
|
int retval = -1;
|
|
|
|
if (tparams->verify_header) {
|
|
retval = tparams->verify_header((unsigned char *)ptr,
|
|
sbuf->st_size, params);
|
|
|
|
if (retval == 0) {
|
|
/*
|
|
* Print the image information if verify is successful
|
|
*/
|
|
if (tparams->print_header) {
|
|
if (!params->quiet)
|
|
tparams->print_header(ptr);
|
|
} else {
|
|
fprintf(stderr,
|
|
"%s: print_header undefined for %s\n",
|
|
params->cmdname, tparams->name);
|
|
}
|
|
} else {
|
|
fprintf(stderr,
|
|
"%s: verify_header failed for %s with exit code %d\n",
|
|
params->cmdname, tparams->name, retval);
|
|
}
|
|
|
|
} else {
|
|
fprintf(stderr, "%s: print_header undefined for %s\n",
|
|
params->cmdname, tparams->name);
|
|
}
|
|
|
|
return retval;
|
|
}
|
|
|
|
int imagetool_save_subimage(
|
|
const char *file_name,
|
|
ulong file_data,
|
|
ulong file_len)
|
|
{
|
|
int dfd;
|
|
|
|
dfd = open(file_name, O_RDWR | O_CREAT | O_TRUNC | O_BINARY,
|
|
S_IRUSR | S_IWUSR);
|
|
if (dfd < 0) {
|
|
fprintf(stderr, "Can't open \"%s\": %s\n",
|
|
file_name, strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
if (write(dfd, (void *)file_data, file_len) != (ssize_t)file_len) {
|
|
fprintf(stderr, "Write error on \"%s\": %s\n",
|
|
file_name, strerror(errno));
|
|
close(dfd);
|
|
return -1;
|
|
}
|
|
|
|
close(dfd);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int imagetool_get_filesize(struct image_tool_params *params, const char *fname)
|
|
{
|
|
struct stat sbuf;
|
|
int fd;
|
|
|
|
fd = open(fname, O_RDONLY | O_BINARY);
|
|
if (fd < 0) {
|
|
fprintf(stderr, "%s: Can't open %s: %s\n",
|
|
params->cmdname, fname, strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
if (fstat(fd, &sbuf) < 0) {
|
|
fprintf(stderr, "%s: Can't stat %s: %s\n",
|
|
params->cmdname, fname, strerror(errno));
|
|
close(fd);
|
|
return -1;
|
|
}
|
|
close(fd);
|
|
|
|
return sbuf.st_size;
|
|
}
|
|
|
|
time_t imagetool_get_source_date(
|
|
const char *cmdname,
|
|
time_t fallback)
|
|
{
|
|
char *source_date_epoch = getenv("SOURCE_DATE_EPOCH");
|
|
|
|
if (source_date_epoch == NULL)
|
|
return fallback;
|
|
|
|
time_t time = (time_t) strtol(source_date_epoch, NULL, 10);
|
|
|
|
if (gmtime(&time) == NULL) {
|
|
fprintf(stderr, "%s: SOURCE_DATE_EPOCH is not valid\n",
|
|
cmdname);
|
|
time = 0;
|
|
}
|
|
|
|
return time;
|
|
}
|