blob: fd8edc64fa235b1aa57ab444c7f928821b488c4c [file] [log] [blame]
Simon Glass5a5da7c2018-07-17 13:25:37 -06001Binman Entry Documentation
Heinrich Schuchardtb214e882023-10-28 11:59:32 +02002==========================
Simon Glass5a5da7c2018-07-17 13:25:37 -06003
4This file describes the entry types supported by binman. These entry types can
5be placed in an image one by one to build up a final firmware image. It is
6fairly easy to create new entry types. Just add a new file to the 'etype'
7directory. You can use the existing entries as examples.
8
9Note that some entries are subclasses of others, using and extending their
10features to produce new behaviours.
11
12
13
Simon Glass7081a942024-07-20 11:49:45 +010014.. _etype_alternates_fdt:
15
16Entry: alternates-fdt: Entry that generates alternative sections for each devicetree provided
17---------------------------------------------------------------------------------------------
18
19When creating an image designed to boot on multiple models, each model
20requires its own devicetree. This entry deals with selecting the correct
21devicetree from a directory containing them. Each one is read in turn, then
22used to produce section contents which are written to a file. This results
23in a number of images, one for each model.
24
25For example this produces images for each .dtb file in the 'dtb' directory::
26
27 alternates-fdt {
28 fdt-list-dir = "dtb";
29 filename-pattern = "NAME.bin";
30 fdt-phase = "tpl";
31
32 section {
33 u-boot-tpl {
34 };
35 };
36 };
37
38Each output file is named based on its input file, so an input file of
39`model1.dtb` results in an output file of `model1.bin` (i.e. the `NAME` in
40the `filename-pattern` property is replaced with the .dtb basename).
41
42Note that this entry type still produces contents for the 'main' image, in
43that case using the normal dtb provided to Binman, e.g. `u-boot-tpl.dtb`.
44But that image is unlikely to be useful, since it relates to whatever dtb
45happened to be the default when U-Boot builds
46(i.e. `CONFIG_DEFAULT_DEVICE_TREE`). However, Binman ensures that the size
47of each of the alternates is the same as the 'default' one, so they can in
48principle be 'slotted in' to the appropriate place in the main image.
49
50The optional `fdt-phase` property indicates the phase to build. In this
51case, it etype runs fdtgrep to obtain the devicetree subset for that phase,
52respecting the `bootph-xxx` tags in the devicetree.
53
54
55
Simon Glass228c9b82022-08-07 16:33:25 -060056.. _etype_atf_bl31:
57
Simon Glass96d340e2021-03-18 20:25:16 +130058Entry: atf-bl31: ARM Trusted Firmware (ATF) BL31 blob
59-----------------------------------------------------
Simon Glassdc2f81a2020-09-01 05:13:58 -060060
61Properties / Entry arguments:
62 - atf-bl31-path: Filename of file to read into entry. This is typically
63 called bl31.bin or bl31.elf
64
65This entry holds the run-time firmware, typically started by U-Boot SPL.
66See the U-Boot README for your architecture or board for how to use it. See
67https://github.com/ARM-software/arm-trusted-firmware for more information
68about ATF.
69
70
71
Simon Glass228c9b82022-08-07 16:33:25 -060072.. _etype_atf_fip:
73
Simon Glass75989722021-11-23 21:08:59 -070074Entry: atf-fip: ARM Trusted Firmware's Firmware Image Package (FIP)
75-------------------------------------------------------------------
76
77A FIP_ provides a way to group binaries in a firmware image, used by ARM's
78Trusted Firmware A (TF-A) code. It is a simple format consisting of a
79table of contents with information about the type, offset and size of the
80binaries in the FIP. It is quite similar to FMAP, with the major difference
81that it uses UUIDs to indicate the type of each entry.
82
83Note: It is recommended to always add an fdtmap to every image, as well as
84any FIPs so that binman and other tools can access the entire image
85correctly.
86
87The UUIDs correspond to useful names in `fiptool`, provided by ATF to
88operate on FIPs. Binman uses these names to make it easier to understand
89what is going on, although it is possible to provide a UUID if needed.
90
91The contents of the FIP are defined by subnodes of the atf-fip entry, e.g.::
92
93 atf-fip {
94 soc-fw {
95 filename = "bl31.bin";
96 };
97
98 scp-fwu-cfg {
99 filename = "bl2u.bin";
100 };
101
102 u-boot {
103 fip-type = "nt-fw";
104 };
105 };
106
107This describes a FIP with three entries: soc-fw, scp-fwu-cfg and nt-fw.
108You can use normal (non-external) binaries like U-Boot simply by adding a
109FIP type, with the `fip-type` property, as above.
110
111Since FIP exists to bring blobs together, Binman assumes that all FIP
112entries are external binaries. If a binary may not exist, you can use the
113`--allow-missing` flag to Binman, in which case the image is still created,
114even though it will not actually work.
115
116The size of the FIP depends on the size of the binaries. There is currently
117no way to specify a fixed size. If the `atf-fip` node has a `size` entry,
118this affects the space taken up by the `atf-fip` entry, but the FIP itself
119does not expand to use that space.
120
121Some other FIP features are available with Binman. The header and the
122entries have 64-bit flag works. The flag flags do not seem to be defined
123anywhere, but you can use `fip-hdr-flags` and fip-flags` to set the values
124of the header and entries respectively.
125
126FIP entries can be aligned to a particular power-of-two boundary. Use
127fip-align for this.
128
129Binman only understands the entry types that are included in its
130implementation. It is possible to specify a 16-byte UUID instead, using the
131fip-uuid property. In this case Binman doesn't know what its type is, so
132just uses the UUID. See the `u-boot` node in this example::
133
134 binman {
135 atf-fip {
136 fip-hdr-flags = /bits/ 64 <0x123>;
137 fip-align = <16>;
138 soc-fw {
139 fip-flags = /bits/ 64 <0x456>;
140 filename = "bl31.bin";
141 };
142
143 scp-fwu-cfg {
144 filename = "bl2u.bin";
145 };
146
147 u-boot {
148 fip-uuid = [fc 65 13 92 4a 5b 11 ec
149 94 35 ff 2d 1c fc 79 9c];
150 };
151 };
152 fdtmap {
153 };
154 };
155
156Binman allows reading and updating FIP entries after the image is created,
157provided that an FDPMAP is present too. Updates which change the size of a
158FIP entry will cause it to be expanded or contracted as needed.
159
160Properties for top-level atf-fip node
161~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
162
163fip-hdr-flags (64 bits)
164 Sets the flags for the FIP header.
165
166Properties for subnodes
167~~~~~~~~~~~~~~~~~~~~~~~
168
169fip-type (str)
170 FIP type to use for this entry. This is needed if the entry
171 name is not a valid type. Value types are defined in `fip_util.py`.
172 The FIP type defines the UUID that is used (they map 1:1).
173
174fip-uuid (16 bytes)
175 If there is no FIP-type name defined, or it is not supported by Binman,
176 this property sets the UUID. It should be a 16-byte value, following the
177 hex digits of the UUID.
178
179fip-flags (64 bits)
180 Set the flags for a FIP entry. Use in one of the subnodes of the
181 7atf-fip entry.
182
183fip-align
184 Set the alignment for a FIP entry, FIP entries can be aligned to a
185 particular power-of-two boundary. The default is 1.
186
187Adding new FIP-entry types
188~~~~~~~~~~~~~~~~~~~~~~~~~~
189
190When new FIP entries are defined by TF-A they appear in the
191`TF-A source tree`_. You can use `fip_util.py` to update Binman to support
192new types, then `send a patch`_ to the U-Boot mailing list. There are two
193source files that the tool examples:
194
195- `include/tools_share/firmware_image_package.h` has the UUIDs
196- `tools/fiptool/tbbr_config.c` has the name and descripion for each UUID
197
198To run the tool::
199
200 $ tools/binman/fip_util.py -s /path/to/arm-trusted-firmware
201 Warning: UUID 'UUID_NON_TRUSTED_WORLD_KEY_CERT' is not mentioned in tbbr_config.c file
202 Existing code in 'tools/binman/fip_util.py' is up-to-date
203
204If it shows there is an update, it writes a new version of `fip_util.py`
205to `fip_util.py.out`. You can change the output file using the `-i` flag.
206If you have a problem, use `-D` to enable traceback debugging.
207
208FIP commentary
209~~~~~~~~~~~~~~
210
211As a side effect of use of UUIDs, FIP does not support multiple
212entries of the same type, such as might be used to store fonts or graphics
213icons, for example. For verified boot it could be used for each part of the
214image (e.g. separate FIPs for A and B) but cannot describe the whole
215firmware image. As with FMAP there is no hierarchy defined, although FMAP
216works around this by having 'section' areas which encompass others. A
217similar workaround would be possible with FIP but is not currently defined.
218
219It is recommended to always add an fdtmap to every image, as well as any
220FIPs so that binman and other tools can access the entire image correctly.
221
222.. _FIP: https://trustedfirmware-a.readthedocs.io/en/latest/design/firmware-design.html#firmware-image-package-fip
223.. _`TF-A source tree`: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git
224.. _`send a patch`: https://www.denx.de/wiki/U-Boot/Patches
225
226
227
Simon Glass228c9b82022-08-07 16:33:25 -0600228.. _etype_blob:
229
Simon Glass96d340e2021-03-18 20:25:16 +1300230Entry: blob: Arbitrary binary blob
231----------------------------------
Simon Glass5a5da7c2018-07-17 13:25:37 -0600232
233Note: This should not be used by itself. It is normally used as a parent
234class by other entry types.
235
236Properties / Entry arguments:
237 - filename: Filename of file to read into entry
Simon Glass83d73c22018-09-14 04:57:26 -0600238 - compress: Compression algorithm to use:
239 none: No compression
240 lz4: Use lz4 compression (via 'lz4' command-line utility)
Simon Glass5a5da7c2018-07-17 13:25:37 -0600241
242This entry reads data from a file and places it in the entry. The
243default filename is often specified specified by the subclass. See for
Simon Glassadc59ea2021-03-18 20:24:54 +1300244example the 'u-boot' entry which provides the filename 'u-boot.bin'.
Simon Glass5a5da7c2018-07-17 13:25:37 -0600245
Simon Glass83d73c22018-09-14 04:57:26 -0600246If compression is enabled, an extra 'uncomp-size' property is written to
247the node (if enabled with -u) which provides the uncompressed size of the
248data.
249
Simon Glass5a5da7c2018-07-17 13:25:37 -0600250
251
Simon Glass228c9b82022-08-07 16:33:25 -0600252.. _etype_blob_dtb:
253
Simon Glass6ed45ba2018-09-14 04:57:24 -0600254Entry: blob-dtb: A blob that holds a device tree
255------------------------------------------------
256
257This is a blob containing a device tree. The contents of the blob are
258obtained from the list of available device-tree files, managed by the
259'state' module.
260
Simon Glass237ac962023-01-07 14:07:10 -0700261Additional attributes:
262 prepend: Header used (e.g. 'length')
263
Simon Glass5a5da7c2018-07-17 13:25:37 -0600264
265
Simon Glass228c9b82022-08-07 16:33:25 -0600266.. _etype_blob_ext:
267
Simon Glass96d340e2021-03-18 20:25:16 +1300268Entry: blob-ext: Externally built binary blob
269---------------------------------------------
Simon Glassce867ad2020-07-09 18:39:36 -0600270
271Note: This should not be used by itself. It is normally used as a parent
272class by other entry types.
273
Simon Glass4f9f1052020-07-09 18:39:38 -0600274If the file providing this blob is missing, binman can optionally ignore it
275and produce a broken image with a warning.
276
Simon Glassce867ad2020-07-09 18:39:36 -0600277See 'blob' for Properties / Entry arguments.
278
279
280
Simon Glass228c9b82022-08-07 16:33:25 -0600281.. _etype_blob_ext_list:
282
Simon Glasscc2c5002021-11-23 21:09:52 -0700283Entry: blob-ext-list: List of externally built binary blobs
284-----------------------------------------------------------
285
286This is like blob-ext except that a number of blobs can be provided,
287typically with some sort of relationship, e.g. all are DDC parameters.
288
289If any of the external files needed by this llist is missing, binman can
290optionally ignore it and produce a broken image with a warning.
291
292Args:
293 filenames: List of filenames to read and include
294
295
296
Simon Glass228c9b82022-08-07 16:33:25 -0600297.. _etype_blob_named_by_arg:
298
Simon Glassec127af2018-07-17 13:25:39 -0600299Entry: blob-named-by-arg: A blob entry which gets its filename property from its subclass
300-----------------------------------------------------------------------------------------
301
302Properties / Entry arguments:
303 - <xxx>-path: Filename containing the contents of this entry (optional,
Simon Glass3decfa32020-09-01 05:13:54 -0600304 defaults to None)
Simon Glassec127af2018-07-17 13:25:39 -0600305
306where <xxx> is the blob_fname argument to the constructor.
307
308This entry cannot be used directly. Instead, it is used as a parent class
309for another entry, which defined blob_fname. This parameter is used to
310set the entry-arg or property containing the filename. The entry-arg or
311property is in turn used to set the actual filename.
312
313See cros_ec_rw for an example of this.
314
315
316
Simon Glass228c9b82022-08-07 16:33:25 -0600317.. _etype_blob_phase:
318
Simon Glass06684922021-03-18 20:25:07 +1300319Entry: blob-phase: Section that holds a phase binary
320----------------------------------------------------
321
322This is a base class that should not normally be used directly. It is used
323when converting a 'u-boot' entry automatically into a 'u-boot-expanded'
324entry; similarly for SPL.
325
326
327
Simon Glass228c9b82022-08-07 16:33:25 -0600328.. _etype_cbfs:
329
Simon Glass96d340e2021-03-18 20:25:16 +1300330Entry: cbfs: Coreboot Filesystem (CBFS)
331---------------------------------------
Simon Glassac62fba2019-07-08 13:18:53 -0600332
333A CBFS provides a way to group files into a group. It has a simple directory
334structure and allows the position of individual files to be set, since it is
335designed to support execute-in-place in an x86 SPI-flash device. Where XIP
336is not used, it supports compression and storing ELF files.
337
338CBFS is used by coreboot as its way of orgnanising SPI-flash contents.
339
Simon Glass6bc43092021-03-18 20:25:15 +1300340The contents of the CBFS are defined by subnodes of the cbfs entry, e.g.::
Simon Glassac62fba2019-07-08 13:18:53 -0600341
342 cbfs {
343 size = <0x100000>;
344 u-boot {
345 cbfs-type = "raw";
346 };
347 u-boot-dtb {
348 cbfs-type = "raw";
349 };
350 };
351
352This creates a CBFS 1MB in size two files in it: u-boot.bin and u-boot.dtb.
353Note that the size is required since binman does not support calculating it.
354The contents of each entry is just what binman would normally provide if it
355were not a CBFS node. A blob type can be used to import arbitrary files as
Simon Glass6bc43092021-03-18 20:25:15 +1300356with the second subnode below::
Simon Glassac62fba2019-07-08 13:18:53 -0600357
358 cbfs {
359 size = <0x100000>;
360 u-boot {
361 cbfs-name = "BOOT";
362 cbfs-type = "raw";
363 };
364
365 dtb {
366 type = "blob";
367 filename = "u-boot.dtb";
368 cbfs-type = "raw";
369 cbfs-compress = "lz4";
Simon Glasse073d4e2019-07-08 13:18:56 -0600370 cbfs-offset = <0x100000>;
Simon Glassac62fba2019-07-08 13:18:53 -0600371 };
372 };
373
374This creates a CBFS 1MB in size with u-boot.bin (named "BOOT") and
375u-boot.dtb (named "dtb") and compressed with the lz4 algorithm.
376
377
378Properties supported in the top-level CBFS node:
379
380cbfs-arch:
381 Defaults to "x86", but you can specify the architecture if needed.
382
383
384Properties supported in the CBFS entry subnodes:
385
386cbfs-name:
387 This is the name of the file created in CBFS. It defaults to the entry
388 name (which is the node name), but you can override it with this
389 property.
390
391cbfs-type:
392 This is the CBFS file type. The following are supported:
393
394 raw:
395 This is a 'raw' file, although compression is supported. It can be
396 used to store any file in CBFS.
397
398 stage:
399 This is an ELF file that has been loaded (i.e. mapped to memory), so
400 appears in the CBFS as a flat binary. The input file must be an ELF
401 image, for example this puts "u-boot" (the ELF image) into a 'stage'
Simon Glass6bc43092021-03-18 20:25:15 +1300402 entry::
Simon Glassac62fba2019-07-08 13:18:53 -0600403
404 cbfs {
405 size = <0x100000>;
406 u-boot-elf {
407 cbfs-name = "BOOT";
408 cbfs-type = "stage";
409 };
410 };
411
Simon Glass6bc43092021-03-18 20:25:15 +1300412 You can use your own ELF file with something like::
Simon Glassac62fba2019-07-08 13:18:53 -0600413
414 cbfs {
415 size = <0x100000>;
416 something {
417 type = "blob";
418 filename = "cbfs-stage.elf";
419 cbfs-type = "stage";
420 };
421 };
422
423 As mentioned, the file is converted to a flat binary, so it is
424 equivalent to adding "u-boot.bin", for example, but with the load and
425 start addresses specified by the ELF. At present there is no option
426 to add a flat binary with a load/start address, similar to the
427 'add-flat-binary' option in cbfstool.
428
Simon Glasse073d4e2019-07-08 13:18:56 -0600429cbfs-offset:
430 This is the offset of the file's data within the CBFS. It is used to
431 specify where the file should be placed in cases where a fixed position
432 is needed. Typical uses are for code which is not relocatable and must
433 execute in-place from a particular address. This works because SPI flash
434 is generally mapped into memory on x86 devices. The file header is
435 placed before this offset so that the data start lines up exactly with
436 the chosen offset. If this property is not provided, then the file is
437 placed in the next available spot.
Simon Glassac62fba2019-07-08 13:18:53 -0600438
439The current implementation supports only a subset of CBFS features. It does
440not support other file types (e.g. payload), adding multiple files (like the
441'files' entry with a pattern supported by binman), putting files at a
442particular offset in the CBFS and a few other things.
443
444Of course binman can create images containing multiple CBFSs, simply by
Simon Glass6bc43092021-03-18 20:25:15 +1300445defining these in the binman config::
Simon Glassac62fba2019-07-08 13:18:53 -0600446
447
448 binman {
449 size = <0x800000>;
450 cbfs {
451 offset = <0x100000>;
452 size = <0x100000>;
453 u-boot {
454 cbfs-type = "raw";
455 };
456 u-boot-dtb {
457 cbfs-type = "raw";
458 };
459 };
460
461 cbfs2 {
462 offset = <0x700000>;
463 size = <0x100000>;
464 u-boot {
465 cbfs-type = "raw";
466 };
467 u-boot-dtb {
468 cbfs-type = "raw";
469 };
470 image {
471 type = "blob";
472 filename = "image.jpg";
473 };
474 };
475 };
476
477This creates an 8MB image with two CBFSs, one at offset 1MB, one at 7MB,
478both of size 1MB.
479
480
481
Simon Glass228c9b82022-08-07 16:33:25 -0600482.. _etype_collection:
483
Simon Glass189f2912021-03-21 18:24:31 +1300484Entry: collection: An entry which contains a collection of other entries
485------------------------------------------------------------------------
486
487Properties / Entry arguments:
488 - content: List of phandles to entries to include
489
490This allows reusing the contents of other entries. The contents of the
491listed entries are combined to form this entry. This serves as a useful
492base class for entry types which need to process data from elsewhere in
493the image, not necessarily child entries.
494
Simon Glassd626e822022-08-13 11:40:50 -0600495The entries can generally be anywhere in the same image, even if they are in
496a different section from this entry.
497
Simon Glass189f2912021-03-21 18:24:31 +1300498
499
Simon Glass228c9b82022-08-07 16:33:25 -0600500.. _etype_cros_ec_rw:
501
Simon Glassec127af2018-07-17 13:25:39 -0600502Entry: cros-ec-rw: A blob entry which contains a Chromium OS read-write EC image
503--------------------------------------------------------------------------------
504
505Properties / Entry arguments:
506 - cros-ec-rw-path: Filename containing the EC image
507
508This entry holds a Chromium OS EC (embedded controller) image, for use in
509updating the EC on startup via software sync.
510
511
512
Sughosh Ganub6176112023-08-22 23:09:59 +0530513.. _etype_efi_capsule:
514
Simon Glasse344f832024-06-23 11:55:02 -0600515Entry: efi-capsule: Generate EFI capsules
516-----------------------------------------
Sughosh Ganub6176112023-08-22 23:09:59 +0530517
Simon Glasse344f832024-06-23 11:55:02 -0600518The parameters needed for generation of the capsules can
519be provided as properties in the entry.
Sughosh Ganub6176112023-08-22 23:09:59 +0530520
521Properties / Entry arguments:
522 - image-index: Unique number for identifying corresponding
523 payload image. Number between 1 and descriptor count, i.e.
524 the total number of firmware images that can be updated. Mandatory
525 property.
526 - image-guid: Image GUID which will be used for identifying the
527 updatable image on the board. Mandatory property.
528 - hardware-instance: Optional number for identifying unique
529 hardware instance of a device in the system. Default value of 0
530 for images where value is not to be used.
531 - fw-version: Value of image version that can be put on the capsule
532 through the Firmware Management Protocol(FMP) header.
533 - monotonic-count: Count used when signing an image.
534 - private-key: Path to PEM formatted .key private key file. Mandatory
535 property for generating signed capsules.
536 - public-key-cert: Path to PEM formatted .crt public key certificate
537 file. Mandatory property for generating signed capsules.
538 - oem-flags - OEM flags to be passed through capsule header.
539
Simon Glasse344f832024-06-23 11:55:02 -0600540Since this is a subclass of Entry_section, all properties of the parent
541class also apply here. Except for the properties stated as mandatory, the
542rest of the properties are optional.
Sughosh Ganub6176112023-08-22 23:09:59 +0530543
544For more details on the description of the capsule format, and the capsule
545update functionality, refer Section 8.5 and Chapter 23 in the `UEFI
546specification`_.
547
548The capsule parameters like image index and image GUID are passed as
549properties in the entry. The payload to be used in the capsule is to be
550provided as a subnode of the capsule entry.
551
552A typical capsule entry node would then look something like this::
553
554 capsule {
Simon Glasse344f832024-06-23 11:55:02 -0600555 type = "efi-capsule";
556 image-index = <0x1>;
557 /* Image GUID for testing capsule update */
558 image-guid = SANDBOX_UBOOT_IMAGE_GUID;
559 hardware-instance = <0x0>;
560 private-key = "path/to/the/private/key";
561 public-key-cert = "path/to/the/public-key-cert";
562 oem-flags = <0x8000>;
Sughosh Ganub6176112023-08-22 23:09:59 +0530563
Simon Glasse344f832024-06-23 11:55:02 -0600564 u-boot {
565 };
Sughosh Ganub6176112023-08-22 23:09:59 +0530566 };
567
568In the above example, the capsule payload is the U-Boot image. The
569capsule entry would read the contents of the payload and put them
570into the capsule. Any external file can also be specified as the
571payload using the blob-ext subnode.
572
573.. _`UEFI specification`: https://uefi.org/sites/default/files/resources/UEFI_Spec_2_10_Aug29.pdf
574
575
576
Sughosh Ganu74aae502023-10-10 14:40:59 +0530577.. _etype_efi_empty_capsule:
578
Simon Glasse344f832024-06-23 11:55:02 -0600579Entry: efi-empty-capsule: Generate EFI empty capsules
580-----------------------------------------------------
Sughosh Ganu74aae502023-10-10 14:40:59 +0530581
582The parameters needed for generation of the empty capsules can
583be provided as properties in the entry.
584
585Properties / Entry arguments:
586 - image-guid: Image GUID which will be used for identifying the
587 updatable image on the board. Mandatory for accept capsule.
588 - capsule-type - String to indicate type of capsule to generate. Valid
589 values are 'accept' and 'revert'.
590
591For more details on the description of the capsule format, and the capsule
592update functionality, refer Section 8.5 and Chapter 23 in the `UEFI
593specification`_. For more information on the empty capsule, refer the
594sections 2.3.2 and 2.3.3 in the `Dependable Boot specification`_.
595
Simon Glasse344f832024-06-23 11:55:02 -0600596A typical accept empty capsule entry node would then look something like
597this::
Sughosh Ganu74aae502023-10-10 14:40:59 +0530598
599 empty-capsule {
Simon Glasse344f832024-06-23 11:55:02 -0600600 type = "efi-empty-capsule";
601 /* GUID of image being accepted */
602 image-type-id = SANDBOX_UBOOT_IMAGE_GUID;
603 capsule-type = "accept";
Sughosh Ganu74aae502023-10-10 14:40:59 +0530604 };
605
Simon Glasse344f832024-06-23 11:55:02 -0600606A typical revert empty capsule entry node would then look something like
607this::
Sughosh Ganu74aae502023-10-10 14:40:59 +0530608
609 empty-capsule {
Simon Glasse344f832024-06-23 11:55:02 -0600610 type = "efi-empty-capsule";
611 capsule-type = "revert";
Sughosh Ganu74aae502023-10-10 14:40:59 +0530612 };
613
614The empty capsules do not have any input payload image.
615
616.. _`UEFI specification`: https://uefi.org/sites/default/files/resources/UEFI_Spec_2_10_Aug29.pdf
617.. _`Dependable Boot specification`: https://git.codelinaro.org/linaro/dependable-boot/mbfw/uploads/6f7ddfe3be24e18d4319e108a758d02e/mbfw.pdf
618
619
620
Christian Taedcke473e5202023-07-17 09:05:52 +0200621.. _etype_encrypted:
622
623Entry: encrypted: Externally built encrypted binary blob
624--------------------------------------------------------
625
626This entry provides the functionality to include information about how to
627decrypt an encrypted binary. This information is added to the
628resulting device tree by adding a new cipher node in the entry's parent
629node (i.e. the binary).
630
631The key that must be used to decrypt the binary is either directly embedded
632in the device tree or indirectly by specifying a key source. The key source
633can be used as an id of a key that is stored in an external device.
634
635Using an embedded key
636~~~~~~~~~~~~~~~~~~~~~
637
638This is an example using an embedded key::
639
640 blob-ext {
641 filename = "encrypted-blob.bin";
642 };
643
644 encrypted {
645 algo = "aes256-gcm";
646 iv-filename = "encrypted-blob.bin.iv";
647 key-filename = "encrypted-blob.bin.key";
648 };
649
650This entry generates the following device tree structure form the example
651above::
652
653 data = [...]
654 cipher {
655 algo = "aes256-gcm";
656 key = <0x...>;
657 iv = <0x...>;
658 };
659
660The data property is generated by the blob-ext etype, the cipher node and
661its content is generated by this etype.
662
663Using an external key
664~~~~~~~~~~~~~~~~~~~~~
665
666Instead of embedding the key itself into the device tree, it is also
667possible to address an externally stored key by specifying a 'key-source'
668instead of the 'key'::
669
670 blob-ext {
671 filename = "encrypted-blob.bin";
672 };
673
674 encrypted {
675 algo = "aes256-gcm";
676 iv-filename = "encrypted-blob.bin.iv";
677 key-source = "external-key-id";
678 };
679
680This entry generates the following device tree structure form the example
681above::
682
683 data = [...]
684 cipher {
685 algo = "aes256-gcm";
686 key-source = "external-key-id";
687 iv = <0x...>;
688 };
689
690Properties
691~~~~~~~~~~
692
693Properties / Entry arguments:
694 - algo: The encryption algorithm. Currently no algorithm is supported
695 out-of-the-box. Certain algorithms will be added in future
696 patches.
697 - iv-filename: The name of the file containing the initialization
698 vector (in short iv). See
699 https://en.wikipedia.org/wiki/Initialization_vector
700 - key-filename: The name of the file containing the key. Either
701 key-filename or key-source must be provided.
702 - key-source: The key that should be used. Either key-filename or
703 key-source must be provided.
704
705
706
Simon Glass228c9b82022-08-07 16:33:25 -0600707.. _etype_fdtmap:
708
Simon Glass086cec92019-07-08 14:25:27 -0600709Entry: fdtmap: An entry which contains an FDT map
710-------------------------------------------------
711
712Properties / Entry arguments:
713 None
714
715An FDT map is just a header followed by an FDT containing a list of all the
Simon Glass12bb1a92019-07-20 12:23:51 -0600716entries in the image. The root node corresponds to the image node in the
717original FDT, and an image-name property indicates the image name in that
718original tree.
Simon Glass086cec92019-07-08 14:25:27 -0600719
720The header is the string _FDTMAP_ followed by 8 unused bytes.
721
722When used, this entry will be populated with an FDT map which reflects the
723entries in the current image. Hierarchy is preserved, and all offsets and
724sizes are included.
725
726Note that the -u option must be provided to ensure that binman updates the
727FDT with the position of each entry.
728
Simon Glass6bc43092021-03-18 20:25:15 +1300729Example output for a simple image with U-Boot and an FDT map::
Simon Glass086cec92019-07-08 14:25:27 -0600730
Simon Glass6bc43092021-03-18 20:25:15 +1300731 / {
732 image-name = "binman";
733 size = <0x00000112>;
Simon Glass086cec92019-07-08 14:25:27 -0600734 image-pos = <0x00000000>;
735 offset = <0x00000000>;
Simon Glass6bc43092021-03-18 20:25:15 +1300736 u-boot {
737 size = <0x00000004>;
738 image-pos = <0x00000000>;
739 offset = <0x00000000>;
740 };
741 fdtmap {
742 size = <0x0000010e>;
743 image-pos = <0x00000004>;
744 offset = <0x00000004>;
745 };
Simon Glass086cec92019-07-08 14:25:27 -0600746 };
Simon Glass086cec92019-07-08 14:25:27 -0600747
Simon Glass12bb1a92019-07-20 12:23:51 -0600748If allow-repack is used then 'orig-offset' and 'orig-size' properties are
749added as necessary. See the binman README.
750
Simon Glass943bf782021-11-23 21:09:50 -0700751When extracting files, an alternative 'fdt' format is available for fdtmaps.
752Use `binman extract -F fdt ...` to use this. It will export a devicetree,
753without the fdtmap header, so it can be viewed with `fdtdump`.
754
Simon Glass086cec92019-07-08 14:25:27 -0600755
756
Simon Glass228c9b82022-08-07 16:33:25 -0600757.. _etype_files:
758
Simon Glass96d340e2021-03-18 20:25:16 +1300759Entry: files: A set of files arranged in a section
760--------------------------------------------------
Simon Glass0a98b282018-09-14 04:57:28 -0600761
762Properties / Entry arguments:
763 - pattern: Filename pattern to match the files to include
Simon Glass9248c8d2020-10-26 17:40:07 -0600764 - files-compress: Compression algorithm to use:
Simon Glass0a98b282018-09-14 04:57:28 -0600765 none: No compression
766 lz4: Use lz4 compression (via 'lz4' command-line utility)
Simon Glass4ce40772021-03-18 20:24:53 +1300767 - files-align: Align each file to the given alignment
Simon Glass0a98b282018-09-14 04:57:28 -0600768
769This entry reads a number of files and places each in a separate sub-entry
770within this entry. To access these you need to enable device-tree updates
771at run-time so you can obtain the file positions.
772
773
774
Simon Glass228c9b82022-08-07 16:33:25 -0600775.. _etype_fill:
776
Simon Glass3af8e492018-07-17 13:25:40 -0600777Entry: fill: An entry which is filled to a particular byte value
778----------------------------------------------------------------
779
780Properties / Entry arguments:
781 - fill-byte: Byte to use to fill the entry
782
783Note that the size property must be set since otherwise this entry does not
784know how large it should be.
785
786You can often achieve the same effect using the pad-byte property of the
787overall image, in that the space between entries will then be padded with
788that byte. But this entry is sometimes useful for explicitly setting the
789byte value of a region.
790
791
792
Simon Glass228c9b82022-08-07 16:33:25 -0600793.. _etype_fit:
794
Simon Glass96d340e2021-03-18 20:25:16 +1300795Entry: fit: Flat Image Tree (FIT)
796---------------------------------
Simon Glassfdc34362020-07-09 18:39:45 -0600797
798This calls mkimage to create a FIT (U-Boot Flat Image Tree) based on the
799input provided.
800
801Nodes for the FIT should be written out in the binman configuration just as
802they would be in a file passed to mkimage.
803
Simon Glass6bc43092021-03-18 20:25:15 +1300804For example, this creates an image containing a FIT with U-Boot SPL::
Simon Glassfdc34362020-07-09 18:39:45 -0600805
806 binman {
807 fit {
808 description = "Test FIT";
Simon Glass6cf99532020-09-01 05:13:59 -0600809 fit,fdt-list = "of-list";
Simon Glassfdc34362020-07-09 18:39:45 -0600810
811 images {
812 kernel@1 {
813 description = "SPL";
814 os = "u-boot";
815 type = "rkspi";
816 arch = "arm";
817 compression = "none";
818 load = <0>;
819 entry = <0>;
820
821 u-boot-spl {
822 };
823 };
824 };
825 };
826 };
827
Simon Glass6a0b5f82022-02-08 11:50:03 -0700828More complex setups can be created, with generated nodes, as described
829below.
830
831Properties (in the 'fit' node itself)
832~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
833
834Special properties have a `fit,` prefix, indicating that they should be
835processed but not included in the final FIT.
836
837The top-level 'fit' node supports the following special properties:
838
839 fit,external-offset
840 Indicates that the contents of the FIT are external and provides the
841 external offset. This is passed to mkimage via the -E and -p flags.
842
Jonas Karlman9b2fd2d2023-01-21 19:01:39 +0000843 fit,align
844 Indicates what alignment to use for the FIT and its external data,
845 and provides the alignment to use. This is passed to mkimage via
846 the -B flag.
847
Simon Glass6a0b5f82022-02-08 11:50:03 -0700848 fit,fdt-list
849 Indicates the entry argument which provides the list of device tree
850 files for the gen-fdt-nodes operation (as below). This is often
851 `of-list` meaning that `-a of-list="dtb1 dtb2..."` should be passed
852 to binman.
853
Simon Glassb1e40ee2023-07-18 07:23:59 -0600854 fit,fdt-list-val
855 As an alternative to fit,fdt-list the list of device tree files
856 can be provided in this property as a string list, e.g.::
857
858 fit,fdt-list-val = "dtb1", "dtb2";
859
Simon Glass9db7a3a2024-07-20 11:49:46 +0100860 fit,fdt-list-dir
861 As an alternative to fit,fdt-list the list of device tree files
862 can be provided as a directory. Each .dtb file in the directory is
863 processed, , e.g.::
864
865 fit,fdt-list-dir = "arch/arm/dts
866
Simon Glass6a0b5f82022-02-08 11:50:03 -0700867Substitutions
868~~~~~~~~~~~~~
869
870Node names and property values support a basic string-substitution feature.
871Available substitutions for '@' nodes (and property values) are:
872
873SEQ:
874 Sequence number of the generated fdt (1, 2, ...)
875NAME
876 Name of the dtb as provided (i.e. without adding '.dtb')
877
878The `default` property, if present, will be automatically set to the name
879if of configuration whose devicetree matches the `default-dt` entry
880argument, e.g. with `-a default-dt=sun50i-a64-pine64-lts`.
881
882Available substitutions for property values in these nodes are:
883
884DEFAULT-SEQ:
885 Sequence number of the default fdt, as provided by the 'default-dt'
886 entry argument
887
888Available operations
889~~~~~~~~~~~~~~~~~~~~
890
891You can add an operation to an '@' node to indicate which operation is
892required::
893
894 @fdt-SEQ {
895 fit,operation = "gen-fdt-nodes";
896 ...
897 };
898
899Available operations are:
900
901gen-fdt-nodes
902 Generate FDT nodes as above. This is the default if there is no
903 `fit,operation` property.
904
Simon Glass40c8bdd2022-03-05 20:19:12 -0700905split-elf
906 Split an ELF file into a separate node for each segment.
907
Simon Glass6a0b5f82022-02-08 11:50:03 -0700908Generating nodes from an FDT list (gen-fdt-nodes)
909~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
910
Simon Glass6cf99532020-09-01 05:13:59 -0600911U-Boot supports creating fdt and config nodes automatically. To do this,
Simon Glass98e0de32022-02-08 11:50:02 -0700912pass an `of-list` property (e.g. `-a of-list=file1 file2`). This tells
913binman that you want to generates nodes for two files: `file1.dtb` and
914`file2.dtb`. The `fit,fdt-list` property (see above) indicates that
915`of-list` should be used. If the property is missing you will get an error.
Simon Glass6cf99532020-09-01 05:13:59 -0600916
Simon Glass6bc43092021-03-18 20:25:15 +1300917Then add a 'generator node', a node with a name starting with '@'::
Simon Glass6cf99532020-09-01 05:13:59 -0600918
919 images {
920 @fdt-SEQ {
921 description = "fdt-NAME";
922 type = "flat_dt";
923 compression = "none";
924 };
925 };
926
Simon Glass98e0de32022-02-08 11:50:02 -0700927This tells binman to create nodes `fdt-1` and `fdt-2` for each of your two
Simon Glass6cf99532020-09-01 05:13:59 -0600928files. All the properties you specify will be included in the node. This
929node acts like a template to generate the nodes. The generator node itself
930does not appear in the output - it is replaced with what binman generates.
Simon Glass98e0de32022-02-08 11:50:02 -0700931A 'data' property is created with the contents of the FDT file.
Simon Glass6cf99532020-09-01 05:13:59 -0600932
Simon Glass6bc43092021-03-18 20:25:15 +1300933You can create config nodes in a similar way::
Simon Glass6cf99532020-09-01 05:13:59 -0600934
935 configurations {
936 default = "@config-DEFAULT-SEQ";
937 @config-SEQ {
938 description = "NAME";
Samuel Holland68158d52020-10-21 21:12:14 -0500939 firmware = "atf";
940 loadables = "uboot";
Simon Glass6cf99532020-09-01 05:13:59 -0600941 fdt = "fdt-SEQ";
Simon Glass57902e62024-07-20 11:49:47 +0100942 fit,compatible; // optional
Simon Glass6cf99532020-09-01 05:13:59 -0600943 };
944 };
945
Simon Glass98e0de32022-02-08 11:50:02 -0700946This tells binman to create nodes `config-1` and `config-2`, i.e. a config
947for each of your two files.
Simon Glass6cf99532020-09-01 05:13:59 -0600948
Simon Glass6cf99532020-09-01 05:13:59 -0600949Note that if no devicetree files are provided (with '-a of-list' as above)
950then no nodes will be generated.
951
Simon Glass57902e62024-07-20 11:49:47 +0100952The 'fit,compatible' property (if present) is replaced with the compatible
953string from the root node of the devicetree, so that things work correctly
954with FIT's configuration-matching algortihm.
955
Simon Glass40c8bdd2022-03-05 20:19:12 -0700956Generating nodes from an ELF file (split-elf)
957~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
958
959This uses the node as a template to generate multiple nodes. The following
960special properties are available:
961
962split-elf
963 Split an ELF file into a separate node for each segment. This uses the
964 node as a template to generate multiple nodes. The following special
965 properties are available:
966
967 fit,load
968 Generates a `load = <...>` property with the load address of the
969 segment
970
971 fit,entry
972 Generates a `entry = <...>` property with the entry address of the
973 ELF. This is only produced for the first entry
974
975 fit,data
976 Generates a `data = <...>` property with the contents of the segment
977
Jonas Karlmanf584d442023-01-21 19:02:12 +0000978 fit,firmware
979 Generates a `firmware = <...>` property. Provides a list of possible
980 nodes to be used as the `firmware` property value. The first valid
981 node is picked as the firmware. Any remaining valid nodes is
982 prepended to the `loadable` property generated by `fit,loadables`
983
Simon Glass40c8bdd2022-03-05 20:19:12 -0700984 fit,loadables
985 Generates a `loadable = <...>` property with a list of the generated
986 nodes (including all nodes if this operation is used multiple times)
987
988
989Here is an example showing ATF, TEE and a device tree all combined::
990
991 fit {
992 description = "test-desc";
993 #address-cells = <1>;
994 fit,fdt-list = "of-list";
995
996 images {
997 u-boot {
998 description = "U-Boot (64-bit)";
999 type = "standalone";
1000 os = "U-Boot";
1001 arch = "arm64";
1002 compression = "none";
Simon Glass98463902022-10-20 18:22:39 -06001003 load = <CONFIG_TEXT_BASE>;
Simon Glass40c8bdd2022-03-05 20:19:12 -07001004 u-boot-nodtb {
1005 };
1006 };
1007 @fdt-SEQ {
1008 description = "fdt-NAME.dtb";
1009 type = "flat_dt";
1010 compression = "none";
1011 };
1012 @atf-SEQ {
1013 fit,operation = "split-elf";
1014 description = "ARM Trusted Firmware";
1015 type = "firmware";
1016 arch = "arm64";
1017 os = "arm-trusted-firmware";
1018 compression = "none";
1019 fit,load;
1020 fit,entry;
1021 fit,data;
1022
1023 atf-bl31 {
1024 };
Jonas Karlman00b3d532023-01-21 19:01:48 +00001025 hash {
1026 algo = "sha256";
1027 };
Simon Glass40c8bdd2022-03-05 20:19:12 -07001028 };
1029
1030 @tee-SEQ {
1031 fit,operation = "split-elf";
1032 description = "TEE";
1033 type = "tee";
1034 arch = "arm64";
1035 os = "tee";
1036 compression = "none";
1037 fit,load;
1038 fit,entry;
1039 fit,data;
1040
1041 tee-os {
1042 };
Jonas Karlman00b3d532023-01-21 19:01:48 +00001043 hash {
1044 algo = "sha256";
1045 };
Simon Glass40c8bdd2022-03-05 20:19:12 -07001046 };
1047 };
1048
1049 configurations {
1050 default = "@config-DEFAULT-SEQ";
1051 @config-SEQ {
1052 description = "conf-NAME.dtb";
1053 fdt = "fdt-SEQ";
Jonas Karlmanf584d442023-01-21 19:02:12 +00001054 fit,firmware = "atf-1", "u-boot";
Simon Glass40c8bdd2022-03-05 20:19:12 -07001055 fit,loadables;
1056 };
1057 };
1058 };
1059
1060If ATF-BL31 is available, this generates a node for each segment in the
1061ELF file, for example::
1062
1063 images {
1064 atf-1 {
1065 data = <...contents of first segment...>;
1066 data-offset = <0x00000000>;
1067 entry = <0x00040000>;
1068 load = <0x00040000>;
1069 compression = "none";
1070 os = "arm-trusted-firmware";
1071 arch = "arm64";
1072 type = "firmware";
1073 description = "ARM Trusted Firmware";
Jonas Karlman00b3d532023-01-21 19:01:48 +00001074 hash {
1075 algo = "sha256";
1076 value = <...hash of first segment...>;
1077 };
Simon Glass40c8bdd2022-03-05 20:19:12 -07001078 };
1079 atf-2 {
1080 data = <...contents of second segment...>;
1081 load = <0xff3b0000>;
1082 compression = "none";
1083 os = "arm-trusted-firmware";
1084 arch = "arm64";
1085 type = "firmware";
1086 description = "ARM Trusted Firmware";
Jonas Karlman00b3d532023-01-21 19:01:48 +00001087 hash {
1088 algo = "sha256";
1089 value = <...hash of second segment...>;
1090 };
Simon Glass40c8bdd2022-03-05 20:19:12 -07001091 };
1092 };
1093
1094The same applies for OP-TEE if that is available.
1095
1096If each binary is not available, the relevant template node (@atf-SEQ or
1097@tee-SEQ) is removed from the output.
1098
1099This also generates a `config-xxx` node for each device tree in `of-list`.
1100Note that the U-Boot build system uses `-a of-list=$(CONFIG_OF_LIST)`
1101so you can use `CONFIG_OF_LIST` to define that list. In this example it is
1102set up for `firefly-rk3399` with a single device tree and the default set
1103with `-a default-dt=$(CONFIG_DEFAULT_DEVICE_TREE)`, so the resulting output
1104is::
1105
1106 configurations {
1107 default = "config-1";
1108 config-1 {
Jonas Karlmanf584d442023-01-21 19:02:12 +00001109 loadables = "u-boot", "atf-2", "atf-3", "tee-1", "tee-2";
Simon Glass40c8bdd2022-03-05 20:19:12 -07001110 description = "rk3399-firefly.dtb";
1111 fdt = "fdt-1";
Jonas Karlmanf584d442023-01-21 19:02:12 +00001112 firmware = "atf-1";
Simon Glass40c8bdd2022-03-05 20:19:12 -07001113 };
1114 };
1115
Jonas Karlmanf584d442023-01-21 19:02:12 +00001116U-Boot SPL can then load the firmware (ATF) and all the loadables (U-Boot
1117proper, ATF and TEE), then proceed with the boot.
Simon Glass40c8bdd2022-03-05 20:19:12 -07001118
Simon Glassfdc34362020-07-09 18:39:45 -06001119
1120
Simon Glass228c9b82022-08-07 16:33:25 -06001121.. _etype_fmap:
1122
Simon Glass11e36cc2018-07-17 13:25:38 -06001123Entry: fmap: An entry which contains an Fmap section
1124----------------------------------------------------
1125
1126Properties / Entry arguments:
1127 None
1128
1129FMAP is a simple format used by flashrom, an open-source utility for
1130reading and writing the SPI flash, typically on x86 CPUs. The format
1131provides flashrom with a list of areas, so it knows what it in the flash.
1132It can then read or write just a single area, instead of the whole flash.
1133
1134The format is defined by the flashrom project, in the file lib/fmap.h -
1135see www.flashrom.org/Flashrom for more information.
1136
1137When used, this entry will be populated with an FMAP which reflects the
1138entries in the current image. Note that any hierarchy is squashed, since
Simon Glass17365752021-04-03 11:05:10 +13001139FMAP does not support this. Sections are represented as an area appearing
1140before its contents, so that it is possible to reconstruct the hierarchy
1141from the FMAP by using the offset information. This convention does not
1142seem to be documented, but is used in Chromium OS.
1143
Simon Glass9dbb02b2023-02-12 17:11:15 -07001144To mark an area as preserved, use the normal 'preserved' flag in the entry.
1145This will result in the corresponding FMAP area having the
1146FMAP_AREA_PRESERVE flag. This flag does not automatically propagate down to
1147child entries.
1148
Simon Glass17365752021-04-03 11:05:10 +13001149CBFS entries appear as a single entry, i.e. the sub-entries are ignored.
Simon Glass11e36cc2018-07-17 13:25:38 -06001150
1151
1152
Simon Glass228c9b82022-08-07 16:33:25 -06001153.. _etype_gbb:
1154
Simon Glass0ef87aa2018-07-17 13:25:44 -06001155Entry: gbb: An entry which contains a Chromium OS Google Binary Block
1156---------------------------------------------------------------------
1157
1158Properties / Entry arguments:
1159 - hardware-id: Hardware ID to use for this build (a string)
1160 - keydir: Directory containing the public keys to use
1161 - bmpblk: Filename containing images used by recovery
1162
1163Chromium OS uses a GBB to store various pieces of information, in particular
1164the root and recovery keys that are used to verify the boot process. Some
1165more details are here:
1166
1167 https://www.chromium.org/chromium-os/firmware-porting-guide/2-concepts
1168
1169but note that the page dates from 2013 so is quite out of date. See
1170README.chromium for how to obtain the required keys and tools.
1171
1172
1173
Simon Glass228c9b82022-08-07 16:33:25 -06001174.. _etype_image_header:
1175
Simon Glasscf228942019-07-08 14:25:28 -06001176Entry: image-header: An entry which contains a pointer to the FDT map
1177---------------------------------------------------------------------
1178
1179Properties / Entry arguments:
1180 location: Location of header ("start" or "end" of image). This is
1181 optional. If omitted then the entry must have an offset property.
1182
1183This adds an 8-byte entry to the start or end of the image, pointing to the
1184location of the FDT map. The format is a magic number followed by an offset
1185from the start or end of the image, in twos-compliment format.
1186
1187This entry must be in the top-level part of the image.
1188
1189NOTE: If the location is at the start/end, you will probably need to specify
1190sort-by-offset for the image, unless you actually put the image header
1191first/last in the entry list.
1192
1193
1194
Simon Glass228c9b82022-08-07 16:33:25 -06001195.. _etype_intel_cmc:
1196
Simon Glass96d340e2021-03-18 20:25:16 +13001197Entry: intel-cmc: Intel Chipset Micro Code (CMC) file
1198-----------------------------------------------------
Simon Glass5a5da7c2018-07-17 13:25:37 -06001199
1200Properties / Entry arguments:
1201 - filename: Filename of file to read into entry
1202
1203This file contains microcode for some devices in a special format. An
1204example filename is 'Microcode/C0_22211.BIN'.
1205
1206See README.x86 for information about x86 binary blobs.
1207
1208
1209
Simon Glass228c9b82022-08-07 16:33:25 -06001210.. _etype_intel_descriptor:
1211
Simon Glass5a5da7c2018-07-17 13:25:37 -06001212Entry: intel-descriptor: Intel flash descriptor block (4KB)
1213-----------------------------------------------------------
1214
1215Properties / Entry arguments:
1216 filename: Filename of file containing the descriptor. This is typically
1217 a 4KB binary file, sometimes called 'descriptor.bin'
1218
1219This entry is placed at the start of flash and provides information about
1220the SPI flash regions. In particular it provides the base address and
1221size of the ME (Management Engine) region, allowing us to place the ME
1222binary in the right place.
1223
1224With this entry in your image, the position of the 'intel-me' entry will be
1225fixed in the image, which avoids you needed to specify an offset for that
1226region. This is useful, because it is not possible to change the position
1227of the ME region without updating the descriptor.
1228
1229See README.x86 for information about x86 binary blobs.
1230
1231
1232
Simon Glass228c9b82022-08-07 16:33:25 -06001233.. _etype_intel_fit:
1234
Simon Glass5af12072019-08-24 07:22:50 -06001235Entry: intel-fit: Intel Firmware Image Table (FIT)
1236--------------------------------------------------
1237
1238This entry contains a dummy FIT as required by recent Intel CPUs. The FIT
1239contains information about the firmware and microcode available in the
1240image.
1241
1242At present binman only supports a basic FIT with no microcode.
1243
1244
1245
Simon Glass228c9b82022-08-07 16:33:25 -06001246.. _etype_intel_fit_ptr:
1247
Simon Glass5af12072019-08-24 07:22:50 -06001248Entry: intel-fit-ptr: Intel Firmware Image Table (FIT) pointer
1249--------------------------------------------------------------
1250
1251This entry contains a pointer to the FIT. It is required to be at address
12520xffffffc0 in the image.
1253
1254
1255
Simon Glass228c9b82022-08-07 16:33:25 -06001256.. _etype_intel_fsp:
1257
Simon Glass96d340e2021-03-18 20:25:16 +13001258Entry: intel-fsp: Intel Firmware Support Package (FSP) file
1259-----------------------------------------------------------
Simon Glass5a5da7c2018-07-17 13:25:37 -06001260
1261Properties / Entry arguments:
1262 - filename: Filename of file to read into entry
1263
1264This file contains binary blobs which are used on some devices to make the
1265platform work. U-Boot executes this code since it is not possible to set up
1266the hardware using U-Boot open-source code. Documentation is typically not
1267available in sufficient detail to allow this.
1268
1269An example filename is 'FSP/QUEENSBAY_FSP_GOLD_001_20-DECEMBER-2013.fd'
1270
1271See README.x86 for information about x86 binary blobs.
1272
1273
1274
Simon Glass228c9b82022-08-07 16:33:25 -06001275.. _etype_intel_fsp_m:
1276
Simon Glass96d340e2021-03-18 20:25:16 +13001277Entry: intel-fsp-m: Intel Firmware Support Package (FSP) memory init
1278--------------------------------------------------------------------
Simon Glassea0fff92019-08-24 07:23:07 -06001279
1280Properties / Entry arguments:
1281 - filename: Filename of file to read into entry
1282
1283This file contains a binary blob which is used on some devices to set up
1284SDRAM. U-Boot executes this code in SPL so that it can make full use of
1285memory. Documentation is typically not available in sufficient detail to
1286allow U-Boot do this this itself..
1287
1288An example filename is 'fsp_m.bin'
1289
1290See README.x86 for information about x86 binary blobs.
1291
1292
1293
Simon Glass228c9b82022-08-07 16:33:25 -06001294.. _etype_intel_fsp_s:
1295
Simon Glass96d340e2021-03-18 20:25:16 +13001296Entry: intel-fsp-s: Intel Firmware Support Package (FSP) silicon init
1297---------------------------------------------------------------------
Simon Glassbc6a88f2019-10-20 21:31:35 -06001298
1299Properties / Entry arguments:
1300 - filename: Filename of file to read into entry
1301
1302This file contains a binary blob which is used on some devices to set up
1303the silicon. U-Boot executes this code in U-Boot proper after SDRAM is
1304running, so that it can make full use of memory. Documentation is typically
1305not available in sufficient detail to allow U-Boot do this this itself.
1306
1307An example filename is 'fsp_s.bin'
1308
1309See README.x86 for information about x86 binary blobs.
1310
1311
1312
Simon Glass228c9b82022-08-07 16:33:25 -06001313.. _etype_intel_fsp_t:
1314
Simon Glass96d340e2021-03-18 20:25:16 +13001315Entry: intel-fsp-t: Intel Firmware Support Package (FSP) temp ram init
1316----------------------------------------------------------------------
Simon Glass998d1482019-10-20 21:31:36 -06001317
1318Properties / Entry arguments:
1319 - filename: Filename of file to read into entry
1320
1321This file contains a binary blob which is used on some devices to set up
1322temporary memory (Cache-as-RAM or CAR). U-Boot executes this code in TPL so
1323that it has access to memory for its stack and initial storage.
1324
1325An example filename is 'fsp_t.bin'
1326
1327See README.x86 for information about x86 binary blobs.
1328
1329
1330
Simon Glass228c9b82022-08-07 16:33:25 -06001331.. _etype_intel_ifwi:
1332
Simon Glass96d340e2021-03-18 20:25:16 +13001333Entry: intel-ifwi: Intel Integrated Firmware Image (IFWI) file
1334--------------------------------------------------------------
Simon Glasse073d4e2019-07-08 13:18:56 -06001335
1336Properties / Entry arguments:
1337 - filename: Filename of file to read into entry. This is either the
1338 IFWI file itself, or a file that can be converted into one using a
1339 tool
1340 - convert-fit: If present this indicates that the ifwitool should be
1341 used to convert the provided file into a IFWI.
1342
1343This file contains code and data used by the SoC that is required to make
1344it work. It includes U-Boot TPL, microcode, things related to the CSE
1345(Converged Security Engine, the microcontroller that loads all the firmware)
1346and other items beyond the wit of man.
1347
1348A typical filename is 'ifwi.bin' for an IFWI file, or 'fitimage.bin' for a
1349file that will be converted to an IFWI.
1350
1351The position of this entry is generally set by the intel-descriptor entry.
1352
1353The contents of the IFWI are specified by the subnodes of the IFWI node.
1354Each subnode describes an entry which is placed into the IFWFI with a given
1355sub-partition (and optional entry name).
1356
Simon Glass3da9ce82019-08-24 07:22:47 -06001357Properties for subnodes:
Simon Glass6bc43092021-03-18 20:25:15 +13001358 - ifwi-subpart: sub-parition to put this entry into, e.g. "IBBP"
1359 - ifwi-entry: entry name t use, e.g. "IBBL"
1360 - ifwi-replace: if present, indicates that the item should be replaced
1361 in the IFWI. Otherwise it is added.
Simon Glass3da9ce82019-08-24 07:22:47 -06001362
Simon Glasse073d4e2019-07-08 13:18:56 -06001363See README.x86 for information about x86 binary blobs.
1364
1365
1366
Simon Glass228c9b82022-08-07 16:33:25 -06001367.. _etype_intel_me:
1368
Simon Glass96d340e2021-03-18 20:25:16 +13001369Entry: intel-me: Intel Management Engine (ME) file
1370--------------------------------------------------
Simon Glass5a5da7c2018-07-17 13:25:37 -06001371
1372Properties / Entry arguments:
1373 - filename: Filename of file to read into entry
1374
1375This file contains code used by the SoC that is required to make it work.
1376The Management Engine is like a background task that runs things that are
Thomas Hebb32f2ca22019-11-13 18:18:03 -08001377not clearly documented, but may include keyboard, display and network
Simon Glass5a5da7c2018-07-17 13:25:37 -06001378access. For platform that use ME it is not possible to disable it. U-Boot
1379does not directly execute code in the ME binary.
1380
1381A typical filename is 'me.bin'.
1382
Simon Glassfa1c9372019-07-08 13:18:38 -06001383The position of this entry is generally set by the intel-descriptor entry.
1384
Simon Glass5a5da7c2018-07-17 13:25:37 -06001385See README.x86 for information about x86 binary blobs.
1386
1387
1388
Simon Glass228c9b82022-08-07 16:33:25 -06001389.. _etype_intel_mrc:
1390
Simon Glass96d340e2021-03-18 20:25:16 +13001391Entry: intel-mrc: Intel Memory Reference Code (MRC) file
1392--------------------------------------------------------
Simon Glass5a5da7c2018-07-17 13:25:37 -06001393
1394Properties / Entry arguments:
1395 - filename: Filename of file to read into entry
1396
1397This file contains code for setting up the SDRAM on some Intel systems. This
1398is executed by U-Boot when needed early during startup. A typical filename
1399is 'mrc.bin'.
1400
1401See README.x86 for information about x86 binary blobs.
1402
1403
1404
Simon Glass228c9b82022-08-07 16:33:25 -06001405.. _etype_intel_refcode:
1406
Simon Glass96d340e2021-03-18 20:25:16 +13001407Entry: intel-refcode: Intel Reference Code file
1408-----------------------------------------------
Simon Glass5385f5a2019-05-17 22:00:53 -06001409
1410Properties / Entry arguments:
1411 - filename: Filename of file to read into entry
1412
1413This file contains code for setting up the platform on some Intel systems.
1414This is executed by U-Boot when needed early during startup. A typical
1415filename is 'refcode.bin'.
1416
1417See README.x86 for information about x86 binary blobs.
1418
1419
1420
Simon Glass228c9b82022-08-07 16:33:25 -06001421.. _etype_intel_vbt:
1422
Simon Glass96d340e2021-03-18 20:25:16 +13001423Entry: intel-vbt: Intel Video BIOS Table (VBT) file
1424---------------------------------------------------
Simon Glass5a5da7c2018-07-17 13:25:37 -06001425
1426Properties / Entry arguments:
1427 - filename: Filename of file to read into entry
1428
1429This file contains code that sets up the integrated graphics subsystem on
1430some Intel SoCs. U-Boot executes this when the display is started up.
1431
1432See README.x86 for information about Intel binary blobs.
1433
1434
1435
Simon Glass228c9b82022-08-07 16:33:25 -06001436.. _etype_intel_vga:
1437
Simon Glass96d340e2021-03-18 20:25:16 +13001438Entry: intel-vga: Intel Video Graphics Adaptor (VGA) file
1439---------------------------------------------------------
Simon Glass5a5da7c2018-07-17 13:25:37 -06001440
1441Properties / Entry arguments:
1442 - filename: Filename of file to read into entry
1443
1444This file contains code that sets up the integrated graphics subsystem on
1445some Intel SoCs. U-Boot executes this when the display is started up.
1446
1447This is similar to the VBT file but in a different format.
1448
1449See README.x86 for information about Intel binary blobs.
1450
1451
1452
Simon Glass228c9b82022-08-07 16:33:25 -06001453.. _etype_mkimage:
1454
Simon Glass96d340e2021-03-18 20:25:16 +13001455Entry: mkimage: Binary produced by mkimage
1456------------------------------------------
Simon Glass0dc706f2020-07-09 18:39:31 -06001457
1458Properties / Entry arguments:
Simon Glasse9b5e312022-08-13 11:40:47 -06001459 - args: Arguments to pass
Simon Glassdfe1db42022-08-13 11:40:48 -06001460 - data-to-imagename: Indicates that the -d data should be passed in as
1461 the image name also (-n)
Quentin Schulz4d91df02022-09-02 15:10:48 +02001462 - multiple-data-files: boolean to tell binman to pass all files as
1463 datafiles to mkimage instead of creating a temporary file the result
1464 of datafiles concatenation
Simon Glass237ac962023-01-07 14:07:10 -07001465 - filename: filename of output binary generated by mkimage
Simon Glass0dc706f2020-07-09 18:39:31 -06001466
Simon Glasse9b5e312022-08-13 11:40:47 -06001467The data passed to mkimage via the -d flag is collected from subnodes of the
1468mkimage node, e.g.::
Simon Glass0dc706f2020-07-09 18:39:31 -06001469
1470 mkimage {
Simon Glass237ac962023-01-07 14:07:10 -07001471 filename = "imximage.bin";
Simon Glass0dc706f2020-07-09 18:39:31 -06001472 args = "-n test -T imximage";
1473
1474 u-boot-spl {
1475 };
1476 };
1477
Simon Glasse9b5e312022-08-13 11:40:47 -06001478This calls mkimage to create an imximage with `u-boot-spl.bin` as the data
Simon Glass237ac962023-01-07 14:07:10 -07001479file, with mkimage being called like this::
Simon Glasse9b5e312022-08-13 11:40:47 -06001480
1481 mkimage -d <data_file> -n test -T imximage <output_file>
1482
1483The output from mkimage then becomes part of the image produced by
Simon Glass237ac962023-01-07 14:07:10 -07001484binman but also is written into `imximage.bin` file. If you need to put
1485multiple things in the data file, you can use a section, or just multiple
1486subnodes like this::
Simon Glasse9b5e312022-08-13 11:40:47 -06001487
1488 mkimage {
1489 args = "-n test -T imximage";
1490
1491 u-boot-spl {
1492 };
1493
1494 u-boot-tpl {
1495 };
1496 };
Simon Glass0dc706f2020-07-09 18:39:31 -06001497
Simon Glass237ac962023-01-07 14:07:10 -07001498Note that binman places the contents (here SPL and TPL) into a single file
1499and passes that to mkimage using the -d option.
1500
Quentin Schulz4d91df02022-09-02 15:10:48 +02001501To pass all datafiles untouched to mkimage::
1502
1503 mkimage {
Simon Glass237ac962023-01-07 14:07:10 -07001504 args = "-n rk3399 -T rkspi";
1505 multiple-data-files;
Quentin Schulz4d91df02022-09-02 15:10:48 +02001506
Simon Glass237ac962023-01-07 14:07:10 -07001507 u-boot-tpl {
1508 };
Quentin Schulz4d91df02022-09-02 15:10:48 +02001509
Simon Glass237ac962023-01-07 14:07:10 -07001510 u-boot-spl {
1511 };
Quentin Schulz4d91df02022-09-02 15:10:48 +02001512 };
1513
1514This calls mkimage to create a Rockchip RK3399-specific first stage
1515bootloader, made of TPL+SPL. Since this first stage bootloader requires to
1516align the TPL and SPL but also some weird hacks that is handled by mkimage
1517directly, binman is told to not perform the concatenation of datafiles prior
1518to passing the data to mkimage.
1519
Simon Glass5c044ff2022-02-08 11:49:58 -07001520To use CONFIG options in the arguments, use a string list instead, as in
1521this example which also produces four arguments::
1522
1523 mkimage {
1524 args = "-n", CONFIG_SYS_SOC, "-T imximage";
1525
1526 u-boot-spl {
1527 };
1528 };
1529
Simon Glassdfe1db42022-08-13 11:40:48 -06001530If you need to pass the input data in with the -n argument as well, then use
1531the 'data-to-imagename' property::
1532
1533 mkimage {
1534 args = "-T imximage";
Simon Glass237ac962023-01-07 14:07:10 -07001535 data-to-imagename;
Simon Glassdfe1db42022-08-13 11:40:48 -06001536
1537 u-boot-spl {
1538 };
1539 };
1540
1541That will pass the data to mkimage both as the data file (with -d) and as
Simon Glass237ac962023-01-07 14:07:10 -07001542the image name (with -n). In both cases, a filename is passed as the
1543argument, with the actual data being in that file.
Simon Glass5c044ff2022-02-08 11:49:58 -07001544
Simon Glass237ac962023-01-07 14:07:10 -07001545If need to pass different data in with -n, then use an `imagename` subnode::
Simon Glass9db9e932022-08-13 11:40:49 -06001546
1547 mkimage {
1548 args = "-T imximage";
1549
1550 imagename {
1551 blob {
1552 filename = "spl/u-boot-spl.cfgout"
1553 };
1554 };
1555
1556 u-boot-spl {
1557 };
1558 };
1559
1560This will pass in u-boot-spl as the input data and the .cfgout file as the
1561-n data.
1562
Simon Glass0dc706f2020-07-09 18:39:31 -06001563
Simon Glass237ac962023-01-07 14:07:10 -07001564
Simon Glass62ef2f72023-01-11 16:10:14 -07001565.. _etype_null:
1566
1567Entry: null: An entry which has no contents of its own
1568------------------------------------------------------
1569
1570Note that the size property must be set since otherwise this entry does not
1571know how large it should be.
1572
1573The contents are set by the containing section, e.g. the section's pad
1574byte.
1575
1576
1577
Simon Glasse1b59472024-06-23 11:55:03 -06001578.. _etype_nxp_imx8mcst:
1579
1580Entry: nxp-imx8mcst: NXP i.MX8M CST .cfg file generator and cst invoker
1581-----------------------------------------------------------------------
1582
1583Properties / Entry arguments:
1584 - nxp,loader-address - loader address (SPL text base)
1585
1586
1587
1588.. _etype_nxp_imx8mimage:
1589
1590Entry: nxp-imx8mimage: NXP i.MX8M imx8mimage .cfg file generator and mkimage invoker
1591------------------------------------------------------------------------------------
1592
1593Properties / Entry arguments:
1594 - nxp,boot-from - device to boot from (e.g. 'sd')
1595 - nxp,loader-address - loader address (SPL text base)
1596 - nxp,rom-version - BootROM version ('2' for i.MX8M Nano and Plus)
1597
1598
1599
Simon Glass228c9b82022-08-07 16:33:25 -06001600.. _etype_opensbi:
1601
Bin Meng4c4d6072021-05-10 20:23:33 +08001602Entry: opensbi: RISC-V OpenSBI fw_dynamic blob
1603----------------------------------------------
1604
1605Properties / Entry arguments:
1606 - opensbi-path: Filename of file to read into entry. This is typically
1607 called fw_dynamic.bin
1608
1609This entry holds the run-time firmware, typically started by U-Boot SPL.
1610See the U-Boot README for your architecture or board for how to use it. See
1611https://github.com/riscv/opensbi for more information about OpenSBI.
1612
1613
1614
Simon Glass228c9b82022-08-07 16:33:25 -06001615.. _etype_powerpc_mpc85xx_bootpg_resetvec:
1616
Jagdish Gediya9d368f32018-09-03 21:35:08 +05301617Entry: powerpc-mpc85xx-bootpg-resetvec: PowerPC mpc85xx bootpg + resetvec code for U-Boot
1618-----------------------------------------------------------------------------------------
1619
1620Properties / Entry arguments:
1621 - filename: Filename of u-boot-br.bin (default 'u-boot-br.bin')
1622
Thomas Hebb32f2ca22019-11-13 18:18:03 -08001623This entry is valid for PowerPC mpc85xx cpus. This entry holds
Jagdish Gediya9d368f32018-09-03 21:35:08 +05301624'bootpg + resetvec' code for PowerPC mpc85xx CPUs which needs to be
1625placed at offset 'RESET_VECTOR_ADDRESS - 0xffc'.
1626
1627
1628
Simon Glass228c9b82022-08-07 16:33:25 -06001629.. _etype_pre_load:
1630
Philippe Reynesb1c50932022-03-28 22:57:04 +02001631Entry: pre-load: Pre load image header
1632--------------------------------------
1633
1634Properties / Entry arguments:
Simon Glass24474dc2022-08-13 11:40:43 -06001635 - pre-load-key-path: Path of the directory that store key (provided by
1636 the environment variable PRE_LOAD_KEY_PATH)
Philippe Reynesb1c50932022-03-28 22:57:04 +02001637 - content: List of phandles to entries to sign
1638 - algo-name: Hash and signature algo to use for the signature
1639 - padding-name: Name of the padding (pkcs-1.5 or pss)
1640 - key-name: Filename of the private key to sign
1641 - header-size: Total size of the header
1642 - version: Version of the header
1643
1644This entry creates a pre-load header that contains a global
1645image signature.
1646
1647For example, this creates an image with a pre-load header and a binary::
1648
1649 binman {
1650 image2 {
1651 filename = "sandbox.bin";
1652
1653 pre-load {
1654 content = <&image>;
1655 algo-name = "sha256,rsa2048";
1656 padding-name = "pss";
1657 key-name = "private.pem";
1658 header-size = <4096>;
1659 version = <1>;
1660 };
1661
1662 image: blob-ext {
1663 filename = "sandbox.itb";
1664 };
1665 };
1666 };
1667
1668
1669
Jonas Karlman05b978b2023-02-25 19:01:33 +00001670.. _etype_rockchip_tpl:
1671
1672Entry: rockchip-tpl: Rockchip TPL binary
1673----------------------------------------
1674
1675Properties / Entry arguments:
1676 - rockchip-tpl-path: Filename of file to read into the entry,
1677 typically <soc>_ddr_<version>.bin
1678
1679This entry holds an external TPL binary used by some Rockchip SoCs
1680instead of normal U-Boot TPL, typically to initialize DRAM.
1681
1682
1683
Simon Glass228c9b82022-08-07 16:33:25 -06001684.. _etype_scp:
1685
Simon Glass96d340e2021-03-18 20:25:16 +13001686Entry: scp: System Control Processor (SCP) firmware blob
1687--------------------------------------------------------
Simon Glassf3243302020-10-26 17:39:59 -06001688
1689Properties / Entry arguments:
1690 - scp-path: Filename of file to read into the entry, typically scp.bin
1691
1692This entry holds firmware for an external platform-specific coprocessor.
1693
1694
1695
Simon Glass228c9b82022-08-07 16:33:25 -06001696.. _etype_section:
1697
Simon Glass5a5da7c2018-07-17 13:25:37 -06001698Entry: section: Entry that contains other entries
1699-------------------------------------------------
1700
Simon Glass3f495f12021-11-23 11:03:49 -07001701A section is an entry which can contain other entries, thus allowing
1702hierarchical images to be created. See 'Sections and hierarchical images'
1703in the binman README for more information.
Simon Glass6bc43092021-03-18 20:25:15 +13001704
Simon Glass3f495f12021-11-23 11:03:49 -07001705The base implementation simply joins the various entries together, using
1706various rules about alignment, etc.
Simon Glass6bc43092021-03-18 20:25:15 +13001707
Simon Glass3f495f12021-11-23 11:03:49 -07001708Subclassing
1709~~~~~~~~~~~
Simon Glass5a5da7c2018-07-17 13:25:37 -06001710
Simon Glass3f495f12021-11-23 11:03:49 -07001711This class can be subclassed to support other file formats which hold
1712multiple entries, such as CBFS. To do this, override the following
1713functions. The documentation here describes what your function should do.
1714For example code, see etypes which subclass `Entry_section`, or `cbfs.py`
1715for a more involved example::
Simon Glass3decfa32020-09-01 05:13:54 -06001716
Simon Glass3f495f12021-11-23 11:03:49 -07001717 $ grep -l \(Entry_section tools/binman/etype/*.py
1718
1719ReadNode()
1720 Call `super().ReadNode()`, then read any special properties for the
1721 section. Then call `self.ReadEntries()` to read the entries.
1722
1723 Binman calls this at the start when reading the image description.
1724
1725ReadEntries()
1726 Read in the subnodes of the section. This may involve creating entries
1727 of a particular etype automatically, as well as reading any special
1728 properties in the entries. For each entry, entry.ReadNode() should be
1729 called, to read the basic entry properties. The properties should be
1730 added to `self._entries[]`, in the correct order, with a suitable name.
1731
1732 Binman calls this at the start when reading the image description.
1733
1734BuildSectionData(required)
1735 Create the custom file format that you want and return it as bytes.
1736 This likely sets up a file header, then loops through the entries,
1737 adding them to the file. For each entry, call `entry.GetData()` to
1738 obtain the data. If that returns None, and `required` is False, then
1739 this method must give up and return None. But if `required` is True then
1740 it should assume that all data is valid.
1741
1742 Binman calls this when packing the image, to find out the size of
1743 everything. It is called again at the end when building the final image.
1744
1745SetImagePos(image_pos):
1746 Call `super().SetImagePos(image_pos)`, then set the `image_pos` values
1747 for each of the entries. This should use the custom file format to find
1748 the `start offset` (and `image_pos`) of each entry. If the file format
1749 uses compression in such a way that there is no offset available (other
1750 than reading the whole file and decompressing it), then the offsets for
1751 affected entries can remain unset (`None`). The size should also be set
1752 if possible.
1753
1754 Binman calls this after the image has been packed, to update the
1755 location that all the entries ended up at.
1756
Simon Glass943bf782021-11-23 21:09:50 -07001757ReadChildData(child, decomp, alt_format):
Simon Glass3f495f12021-11-23 11:03:49 -07001758 The default version of this may be good enough, if you are able to
1759 implement SetImagePos() correctly. But that is a bit of a bypass, so
1760 you can override this method to read from your custom file format. It
1761 should read the entire entry containing the custom file using
1762 `super().ReadData(True)`, then parse the file to get the data for the
1763 given child, then return that data.
1764
1765 If your file format supports compression, the `decomp` argument tells
1766 you whether to return the compressed data (`decomp` is False) or to
1767 uncompress it first, then return the uncompressed data (`decomp` is
1768 True). This is used by the `binman extract -U` option.
1769
Simon Glass943bf782021-11-23 21:09:50 -07001770 If your entry supports alternative formats, the alt_format provides the
1771 alternative format that the user has selected. Your function should
1772 return data in that format. This is used by the 'binman extract -l'
1773 option.
1774
Simon Glass3f495f12021-11-23 11:03:49 -07001775 Binman calls this when reading in an image, in order to populate all the
1776 entries with the data from that image (`binman ls`).
1777
1778WriteChildData(child):
1779 Binman calls this after `child.data` is updated, to inform the custom
1780 file format about this, in case it needs to do updates.
1781
1782 The default version of this does nothing and probably needs to be
1783 overridden for the 'binman replace' command to work. Your version should
1784 use `child.data` to update the data for that child in the custom file
1785 format.
1786
1787 Binman calls this when updating an image that has been read in and in
1788 particular to update the data for a particular entry (`binman replace`)
1789
1790Properties / Entry arguments
1791~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1792
1793See :ref:`develop/package/binman:Image description format` for more
1794information.
1795
1796align-default
1797 Default alignment for this section, if no alignment is given in the
1798 entry
1799
1800pad-byte
1801 Pad byte to use when padding
1802
1803sort-by-offset
1804 True if entries should be sorted by offset, False if they must be
1805 in-order in the device tree description
1806
1807end-at-4gb
1808 Used to build an x86 ROM which ends at 4GB (2^32)
1809
1810name-prefix
1811 Adds a prefix to the name of every entry in the section when writing out
1812 the map
1813
1814skip-at-start
1815 Number of bytes before the first entry starts. These effectively adjust
1816 the starting offset of entries. For example, if this is 16, then the
1817 first entry would start at 16. An entry with offset = 20 would in fact
1818 be written at offset 4 in the image file, since the first 16 bytes are
1819 skipped when writing.
Simon Glass17365752021-04-03 11:05:10 +13001820
Simon Glass237ac962023-01-07 14:07:10 -07001821filename
1822 filename to write the unpadded section contents to within the output
1823 directory (None to skip this).
1824
Simon Glass8beb11e2019-07-08 14:25:47 -06001825Since a section is also an entry, it inherits all the properies of entries
1826too.
1827
Simon Glass3f495f12021-11-23 11:03:49 -07001828Note that the `allow_missing` member controls whether this section permits
1829external blobs to be missing their contents. The option will produce an
1830image but of course it will not work. It is useful to make sure that
1831Continuous Integration systems can build without the binaries being
1832available. This is set by the `SetAllowMissing()` method, if
1833`--allow-missing` is passed to binman.
Simon Glass5a5da7c2018-07-17 13:25:37 -06001834
1835
1836
Simon Glass228c9b82022-08-07 16:33:25 -06001837.. _etype_tee_os:
1838
Roger Quadros47f420a2022-02-19 20:50:04 +02001839Entry: tee-os: Entry containing an OP-TEE Trusted OS (TEE) blob
1840---------------------------------------------------------------
1841
1842Properties / Entry arguments:
1843 - tee-os-path: Filename of file to read into entry. This is typically
Simon Glass2f80c5e2023-01-07 14:07:14 -07001844 called tee.bin or tee.elf
Roger Quadros47f420a2022-02-19 20:50:04 +02001845
1846This entry holds the run-time firmware, typically started by U-Boot SPL.
1847See the U-Boot README for your architecture or board for how to use it. See
1848https://github.com/OP-TEE/optee_os for more information about OP-TEE.
1849
Simon Glass2f80c5e2023-01-07 14:07:14 -07001850Note that if the file is in ELF format, it must go in a FIT. In that case,
1851this entry will mark itself as absent, providing the data only through the
1852read_elf_segments() method.
1853
1854Marking this entry as absent means that it if is used in the wrong context
1855it can be automatically dropped. Thus it is possible to add an OP-TEE entry
1856like this::
1857
1858 binman {
1859 tee-os {
1860 };
1861 };
1862
1863and pass either an ELF or plain binary in with -a tee-os-path <filename>
1864and have binman do the right thing:
1865
1866 - include the entry if tee.bin is provided and it does NOT have the v1
1867 header
1868 - drop it otherwise
1869
1870When used within a FIT, we can do::
1871
1872 binman {
1873 fit {
1874 tee-os {
1875 };
1876 };
1877 };
1878
1879which will split the ELF into separate nodes for each segment, if an ELF
1880file is provided (see :ref:`etype_fit`), or produce a single node if the
1881OP-TEE binary v1 format is provided (see optee_doc_) .
1882
1883.. _optee_doc: https://optee.readthedocs.io/en/latest/architecture/core.html#partitioning-of-the-binary
1884
Roger Quadros47f420a2022-02-19 20:50:04 +02001885
1886
Simon Glass228c9b82022-08-07 16:33:25 -06001887.. _etype_text:
1888
Simon Glass5a5da7c2018-07-17 13:25:37 -06001889Entry: text: An entry which contains text
1890-----------------------------------------
1891
1892The text can be provided either in the node itself or by a command-line
1893argument. There is a level of indirection to allow multiple text strings
1894and sharing of text.
1895
1896Properties / Entry arguments:
1897 text-label: The value of this string indicates the property / entry-arg
1898 that contains the string to place in the entry
1899 <xxx> (actual name is the value of text-label): contains the string to
1900 place in the entry.
Simon Glassaa88b502019-07-08 13:18:40 -06001901 <text>: The text to place in the entry (overrides the above mechanism).
1902 This is useful when the text is constant.
Simon Glass5a5da7c2018-07-17 13:25:37 -06001903
Simon Glass6bc43092021-03-18 20:25:15 +13001904Example node::
Simon Glass5a5da7c2018-07-17 13:25:37 -06001905
1906 text {
1907 size = <50>;
1908 text-label = "message";
1909 };
1910
1911You can then use:
1912
1913 binman -amessage="this is my message"
1914
1915and binman will insert that string into the entry.
1916
Simon Glass6bc43092021-03-18 20:25:15 +13001917It is also possible to put the string directly in the node::
Simon Glass5a5da7c2018-07-17 13:25:37 -06001918
1919 text {
1920 size = <8>;
1921 text-label = "message";
1922 message = "a message directly in the node"
1923 };
1924
Simon Glass6bc43092021-03-18 20:25:15 +13001925or just::
Simon Glassaa88b502019-07-08 13:18:40 -06001926
1927 text {
1928 size = <8>;
1929 text = "some text directly in the node"
1930 };
1931
Simon Glass5a5da7c2018-07-17 13:25:37 -06001932The text is not itself nul-terminated. This can be achieved, if required,
1933by setting the size of the entry to something larger than the text.
1934
1935
1936
Neha Malcom Francis6c66ccf2023-07-22 00:14:24 +05301937.. _etype_ti_board_config:
1938
1939Entry: ti-board-config: An entry containing a TI schema validated board config binary
1940-------------------------------------------------------------------------------------
1941
1942This etype supports generation of two kinds of board configuration
1943binaries: singular board config binary as well as combined board config
1944binary.
1945
1946Properties / Entry arguments:
1947 - config-file: File containing board configuration data in YAML
1948 - schema-file: File containing board configuration YAML schema against
1949 which the config file is validated
1950
1951Output files:
1952 - board config binary: File containing board configuration binary
1953
1954These above parameters are used only when the generated binary is
1955intended to be a single board configuration binary. Example::
1956
1957 my-ti-board-config {
1958 ti-board-config {
1959 config = "board-config.yaml";
1960 schema = "schema.yaml";
1961 };
1962 };
1963
1964To generate a combined board configuration binary, we pack the
1965needed individual binaries into a ti-board-config binary. In this case,
1966the available supported subnode names are board-cfg, pm-cfg, sec-cfg and
1967rm-cfg. The final binary is prepended with a header containing details about
1968the included board config binaries. Example::
1969
1970 my-combined-ti-board-config {
1971 ti-board-config {
1972 board-cfg {
1973 config = "board-cfg.yaml";
1974 schema = "schema.yaml";
1975 };
1976 sec-cfg {
1977 config = "sec-cfg.yaml";
1978 schema = "schema.yaml";
1979 };
1980 }
1981 }
1982
1983
1984
Neha Malcom Francis23d2ef92023-12-05 15:12:18 +05301985.. _etype_ti_dm:
1986
1987Entry: ti-dm: TI Device Manager (DM) blob
1988-----------------------------------------
1989
1990Properties / Entry arguments:
1991 - ti-dm-path: Filename of file to read into the entry, typically ti-dm.bin
1992
1993This entry holds the device manager responsible for resource and power management
1994in K3 devices. See https://software-dl.ti.com/tisci/esd/latest/ for more information
1995about TI DM.
1996
1997
1998
Neha Malcom Francis78144822023-07-22 00:14:25 +05301999.. _etype_ti_secure:
2000
2001Entry: ti-secure: Entry containing a TI x509 certificate binary
2002---------------------------------------------------------------
2003
2004Properties / Entry arguments:
2005 - content: List of phandles to entries to sign
2006 - keyfile: Filename of file containing key to sign binary with
2007 - sha: Hash function to be used for signing
Simon Glass638aa1132024-06-23 11:55:04 -06002008 - auth-in-place: This is an integer field that contains two pieces
2009 of information:
2010
2011 - Lower Byte - Remains 0x02 as per our use case
2012 ( 0x02: Move the authenticated binary back to the header )
2013 - Upper Byte - The Host ID of the core owning the firewall
Neha Malcom Francis78144822023-07-22 00:14:25 +05302014
2015Output files:
2016 - input.<unique_name> - input file passed to openssl
2017 - config.<unique_name> - input file generated for openssl (which is
2018 used as the config file)
2019 - cert.<unique_name> - output file generated by openssl (which is
2020 used as the entry contents)
2021
Simon Glass638aa1132024-06-23 11:55:04 -06002022Depending on auth-in-place information in the inputs, we read the
2023firewall nodes that describe the configurations of firewall that TIFS
2024will be doing after reading the certificate.
2025
2026The syntax of the firewall nodes are as such::
2027
2028 firewall-257-0 {
2029 id = <257>; /* The ID of the firewall being configured */
2030 region = <0>; /* Region number to configure */
2031
2032 control = /* The control register */
2033 <(FWCTRL_EN | FWCTRL_LOCK | FWCTRL_BG | FWCTRL_CACHE)>;
2034
2035 permissions = /* The permission registers */
2036 <((FWPRIVID_ALL << FWPRIVID_SHIFT) |
2037 FWPERM_SECURE_PRIV_RWCD |
2038 FWPERM_SECURE_USER_RWCD |
2039 FWPERM_NON_SECURE_PRIV_RWCD |
2040 FWPERM_NON_SECURE_USER_RWCD)>;
2041
2042 /* More defines can be found in k3-security.h */
2043
2044 start_address = /* The Start Address of the firewall */
2045 <0x0 0x0>;
2046 end_address = /* The End Address of the firewall */
2047 <0xff 0xffffffff>;
2048 };
2049
2050
Neha Malcom Francis78144822023-07-22 00:14:25 +05302051openssl signs the provided data, using the TI templated config file and
2052writes the signature in this entry. This allows verification that the
2053data is genuine.
2054
2055
2056
2057.. _etype_ti_secure_rom:
2058
2059Entry: ti-secure-rom: Entry containing a TI x509 certificate binary for images booted by ROM
2060--------------------------------------------------------------------------------------------
2061
2062Properties / Entry arguments:
2063 - keyfile: Filename of file containing key to sign binary with
2064 - combined: boolean if device follows combined boot flow
2065 - countersign: boolean if device contains countersigned system firmware
2066 - load: load address of SPL
2067 - sw-rev: software revision
2068 - sha: Hash function to be used for signing
2069 - core: core on which bootloader runs, valid cores are 'secure' and 'public'
2070 - content: phandle of SPL in case of legacy bootflow or phandles of component binaries
2071 in case of combined bootflow
Neha Malcom Francisa4ed4c82023-10-23 13:31:02 +05302072 - core-opts (optional): lockstep (0) or split (2) mode set to 0 by default
Neha Malcom Francis78144822023-07-22 00:14:25 +05302073
2074The following properties are only for generating a combined bootflow binary:
2075 - sysfw-inner-cert: boolean if binary contains sysfw inner certificate
2076 - dm-data: boolean if binary contains dm-data binary
2077 - content-sbl: phandle of SPL binary
2078 - content-sysfw: phandle of sysfw binary
2079 - content-sysfw-data: phandle of sysfw-data or tifs-data binary
2080 - content-sysfw-inner-cert (optional): phandle of sysfw inner certificate binary
2081 - content-dm-data (optional): phandle of dm-data binary
2082 - load-sysfw: load address of sysfw binary
2083 - load-sysfw-data: load address of sysfw-data or tifs-data binary
2084 - load-sysfw-inner-cert (optional): load address of sysfw inner certificate binary
2085 - load-dm-data (optional): load address of dm-data binary
2086
2087Output files:
2088 - input.<unique_name> - input file passed to openssl
2089 - config.<unique_name> - input file generated for openssl (which is
2090 used as the config file)
2091 - cert.<unique_name> - output file generated by openssl (which is
2092 used as the entry contents)
2093
2094openssl signs the provided data, using the TI templated config file and
2095writes the signature in this entry. This allows verification that the
2096data is genuine.
2097
2098
2099
Simon Glass228c9b82022-08-07 16:33:25 -06002100.. _etype_u_boot:
2101
Simon Glass5a5da7c2018-07-17 13:25:37 -06002102Entry: u-boot: U-Boot flat binary
2103---------------------------------
2104
2105Properties / Entry arguments:
2106 - filename: Filename of u-boot.bin (default 'u-boot.bin')
2107
2108This is the U-Boot binary, containing relocation information to allow it
2109to relocate itself at runtime. The binary typically includes a device tree
Simon Glass06684922021-03-18 20:25:07 +13002110blob at the end of it.
Simon Glass5a5da7c2018-07-17 13:25:37 -06002111
Simon Glass23ab4e02023-01-07 14:07:11 -07002112U-Boot can access binman symbols at runtime. See :ref:`binman_fdt`.
Simon Glass5a5da7c2018-07-17 13:25:37 -06002113
Simon Glass06684922021-03-18 20:25:07 +13002114Note that this entry is automatically replaced with u-boot-expanded unless
Simon Glass3d433382021-03-21 18:24:30 +13002115--no-expanded is used or the node has a 'no-expanded' property.
Simon Glass06684922021-03-18 20:25:07 +13002116
Simon Glass5a5da7c2018-07-17 13:25:37 -06002117
2118
Simon Glass228c9b82022-08-07 16:33:25 -06002119.. _etype_u_boot_dtb:
2120
Simon Glass5a5da7c2018-07-17 13:25:37 -06002121Entry: u-boot-dtb: U-Boot device tree
2122-------------------------------------
2123
2124Properties / Entry arguments:
2125 - filename: Filename of u-boot.dtb (default 'u-boot.dtb')
2126
2127This is the U-Boot device tree, containing configuration information for
2128U-Boot. U-Boot needs this to know what devices are present and which drivers
2129to activate.
2130
Simon Glass6ed45ba2018-09-14 04:57:24 -06002131Note: This is mostly an internal entry type, used by others. This allows
2132binman to know which entries contain a device tree.
2133
Simon Glass5a5da7c2018-07-17 13:25:37 -06002134
2135
Simon Glass228c9b82022-08-07 16:33:25 -06002136.. _etype_u_boot_dtb_with_ucode:
2137
Simon Glass5a5da7c2018-07-17 13:25:37 -06002138Entry: u-boot-dtb-with-ucode: A U-Boot device tree file, with the microcode removed
2139-----------------------------------------------------------------------------------
2140
2141Properties / Entry arguments:
2142 - filename: Filename of u-boot.dtb (default 'u-boot.dtb')
2143
2144See Entry_u_boot_ucode for full details of the three entries involved in
2145this process. This entry provides the U-Boot device-tree file, which
2146contains the microcode. If the microcode is not being collated into one
2147place then the offset and size of the microcode is recorded by this entry,
Simon Glassadc59ea2021-03-18 20:24:54 +13002148for use by u-boot-with-ucode_ptr. If it is being collated, then this
Simon Glass5a5da7c2018-07-17 13:25:37 -06002149entry deletes the microcode from the device tree (to save space) and makes
Simon Glassadc59ea2021-03-18 20:24:54 +13002150it available to u-boot-ucode.
Simon Glass5a5da7c2018-07-17 13:25:37 -06002151
2152
2153
Simon Glass228c9b82022-08-07 16:33:25 -06002154.. _etype_u_boot_elf:
2155
Simon Glassfe1ae3e2018-09-14 04:57:35 -06002156Entry: u-boot-elf: U-Boot ELF image
2157-----------------------------------
2158
2159Properties / Entry arguments:
2160 - filename: Filename of u-boot (default 'u-boot')
2161
2162This is the U-Boot ELF image. It does not include a device tree but can be
2163relocated to any address for execution.
2164
2165
2166
Simon Glass228c9b82022-08-07 16:33:25 -06002167.. _etype_u_boot_env:
2168
Simon Glassf3243302020-10-26 17:39:59 -06002169Entry: u-boot-env: An entry which contains a U-Boot environment
2170---------------------------------------------------------------
2171
2172Properties / Entry arguments:
2173 - filename: File containing the environment text, with each line in the
2174 form var=value
2175
2176
2177
Simon Glass228c9b82022-08-07 16:33:25 -06002178.. _etype_u_boot_expanded:
2179
Simon Glass06684922021-03-18 20:25:07 +13002180Entry: u-boot-expanded: U-Boot flat binary broken out into its component parts
2181------------------------------------------------------------------------------
2182
2183This is a section containing the U-Boot binary and a devicetree. Using this
2184entry type automatically creates this section, with the following entries
2185in it:
2186
2187 u-boot-nodtb
2188 u-boot-dtb
2189
2190Having the devicetree separate allows binman to update it in the final
2191image, so that the entries positions are provided to the running U-Boot.
2192
2193
2194
Simon Glass228c9b82022-08-07 16:33:25 -06002195.. _etype_u_boot_img:
2196
Simon Glass5a5da7c2018-07-17 13:25:37 -06002197Entry: u-boot-img: U-Boot legacy image
2198--------------------------------------
2199
2200Properties / Entry arguments:
2201 - filename: Filename of u-boot.img (default 'u-boot.img')
2202
2203This is the U-Boot binary as a packaged image, in legacy format. It has a
2204header which allows it to be loaded at the correct address for execution.
2205
2206You should use FIT (Flat Image Tree) instead of the legacy image for new
2207applications.
2208
2209
2210
Simon Glass228c9b82022-08-07 16:33:25 -06002211.. _etype_u_boot_nodtb:
2212
Simon Glass5a5da7c2018-07-17 13:25:37 -06002213Entry: u-boot-nodtb: U-Boot flat binary without device tree appended
2214--------------------------------------------------------------------
2215
2216Properties / Entry arguments:
Simon Glassadc59ea2021-03-18 20:24:54 +13002217 - filename: Filename to include (default 'u-boot-nodtb.bin')
Simon Glass5a5da7c2018-07-17 13:25:37 -06002218
2219This is the U-Boot binary, containing relocation information to allow it
2220to relocate itself at runtime. It does not include a device tree blob at
Simon Glassadc59ea2021-03-18 20:24:54 +13002221the end of it so normally cannot work without it. You can add a u-boot-dtb
Simon Glass06684922021-03-18 20:25:07 +13002222entry after this one, or use a u-boot entry instead, normally expands to a
2223section containing u-boot and u-boot-dtb
Simon Glass5a5da7c2018-07-17 13:25:37 -06002224
2225
2226
Simon Glass228c9b82022-08-07 16:33:25 -06002227.. _etype_u_boot_spl:
2228
Simon Glass5a5da7c2018-07-17 13:25:37 -06002229Entry: u-boot-spl: U-Boot SPL binary
2230------------------------------------
2231
2232Properties / Entry arguments:
2233 - filename: Filename of u-boot-spl.bin (default 'spl/u-boot-spl.bin')
2234
2235This is the U-Boot SPL (Secondary Program Loader) binary. This is a small
2236binary which loads before U-Boot proper, typically into on-chip SRAM. It is
2237responsible for locating, loading and jumping to U-Boot. Note that SPL is
2238not relocatable so must be loaded to the correct address in SRAM, or written
Simon Glassb8ef5b62018-07-17 13:25:48 -06002239to run from the correct address if direct flash execution is possible (e.g.
Simon Glass5a5da7c2018-07-17 13:25:37 -06002240on x86 devices).
2241
Simon Glass23ab4e02023-01-07 14:07:11 -07002242SPL can access binman symbols at runtime. See :ref:`binman_fdt`.
Simon Glass5a5da7c2018-07-17 13:25:37 -06002243
2244in the binman README for more information.
2245
2246The ELF file 'spl/u-boot-spl' must also be available for this to work, since
2247binman uses that to look up symbols to write into the SPL binary.
2248
Simon Glass06684922021-03-18 20:25:07 +13002249Note that this entry is automatically replaced with u-boot-spl-expanded
Simon Glass3d433382021-03-21 18:24:30 +13002250unless --no-expanded is used or the node has a 'no-expanded' property.
Simon Glass06684922021-03-18 20:25:07 +13002251
Simon Glass5a5da7c2018-07-17 13:25:37 -06002252
2253
Simon Glass228c9b82022-08-07 16:33:25 -06002254.. _etype_u_boot_spl_bss_pad:
2255
Simon Glass5a5da7c2018-07-17 13:25:37 -06002256Entry: u-boot-spl-bss-pad: U-Boot SPL binary padded with a BSS region
2257---------------------------------------------------------------------
2258
2259Properties / Entry arguments:
2260 None
2261
Simon Glassdccdc382021-03-18 20:24:55 +13002262This holds the padding added after the SPL binary to cover the BSS (Block
2263Started by Symbol) region. This region holds the various variables used by
2264SPL. It is set to 0 by SPL when it starts up. If you want to append data to
2265the SPL image (such as a device tree file), you must pad out the BSS region
2266to avoid the data overlapping with U-Boot variables. This entry is useful in
2267that case. It automatically pads out the entry size to cover both the code,
2268data and BSS.
2269
2270The contents of this entry will a certain number of zero bytes, determined
2271by __bss_size
Simon Glass5a5da7c2018-07-17 13:25:37 -06002272
2273The ELF file 'spl/u-boot-spl' must also be available for this to work, since
2274binman uses that to look up the BSS address.
2275
2276
2277
Simon Glass228c9b82022-08-07 16:33:25 -06002278.. _etype_u_boot_spl_dtb:
2279
Simon Glass5a5da7c2018-07-17 13:25:37 -06002280Entry: u-boot-spl-dtb: U-Boot SPL device tree
2281---------------------------------------------
2282
2283Properties / Entry arguments:
2284 - filename: Filename of u-boot.dtb (default 'spl/u-boot-spl.dtb')
2285
2286This is the SPL device tree, containing configuration information for
2287SPL. SPL needs this to know what devices are present and which drivers
2288to activate.
2289
2290
2291
Simon Glass228c9b82022-08-07 16:33:25 -06002292.. _etype_u_boot_spl_elf:
2293
Simon Glassfe1ae3e2018-09-14 04:57:35 -06002294Entry: u-boot-spl-elf: U-Boot SPL ELF image
2295-------------------------------------------
2296
2297Properties / Entry arguments:
Simon Glassa6a520e2019-07-08 13:18:45 -06002298 - filename: Filename of SPL u-boot (default 'spl/u-boot-spl')
Simon Glassfe1ae3e2018-09-14 04:57:35 -06002299
2300This is the U-Boot SPL ELF image. It does not include a device tree but can
2301be relocated to any address for execution.
2302
2303
2304
Simon Glass228c9b82022-08-07 16:33:25 -06002305.. _etype_u_boot_spl_expanded:
2306
Simon Glass06684922021-03-18 20:25:07 +13002307Entry: u-boot-spl-expanded: U-Boot SPL flat binary broken out into its component parts
2308--------------------------------------------------------------------------------------
2309
2310Properties / Entry arguments:
2311 - spl-dtb: Controls whether this entry is selected (set to 'y' or '1' to
2312 select)
2313
2314This is a section containing the U-Boot binary, BSS padding if needed and a
2315devicetree. Using this entry type automatically creates this section, with
2316the following entries in it:
2317
2318 u-boot-spl-nodtb
2319 u-boot-spl-bss-pad
2320 u-boot-dtb
2321
2322Having the devicetree separate allows binman to update it in the final
2323image, so that the entries positions are provided to the running U-Boot.
2324
2325This entry is selected based on the value of the 'spl-dtb' entryarg. If
2326this is non-empty (and not 'n' or '0') then this expanded entry is selected.
2327
2328
2329
Simon Glass228c9b82022-08-07 16:33:25 -06002330.. _etype_u_boot_spl_nodtb:
2331
Simon Glass5a5da7c2018-07-17 13:25:37 -06002332Entry: u-boot-spl-nodtb: SPL binary without device tree appended
2333----------------------------------------------------------------
2334
2335Properties / Entry arguments:
Simon Glassadc59ea2021-03-18 20:24:54 +13002336 - filename: Filename to include (default 'spl/u-boot-spl-nodtb.bin')
Simon Glass5a5da7c2018-07-17 13:25:37 -06002337
2338This is the U-Boot SPL binary, It does not include a device tree blob at
2339the end of it so may not be able to work without it, assuming SPL needs
Simon Glassadc59ea2021-03-18 20:24:54 +13002340a device tree to operate on your platform. You can add a u-boot-spl-dtb
Simon Glass06684922021-03-18 20:25:07 +13002341entry after this one, or use a u-boot-spl entry instead' which normally
2342expands to a section containing u-boot-spl-dtb, u-boot-spl-bss-pad and
2343u-boot-spl-dtb
Simon Glass5a5da7c2018-07-17 13:25:37 -06002344
Simon Glass23ab4e02023-01-07 14:07:11 -07002345SPL can access binman symbols at runtime. See :ref:`binman_fdt`.
Simon Glassf5898822021-03-18 20:24:56 +13002346
Simon Glassf5898822021-03-18 20:24:56 +13002347The ELF file 'spl/u-boot-spl' must also be available for this to work, since
2348binman uses that to look up symbols to write into the SPL binary.
2349
Simon Glass5a5da7c2018-07-17 13:25:37 -06002350
2351
Lukas Funke56098432023-07-18 13:53:15 +02002352.. _etype_u_boot_spl_pubkey_dtb:
2353
2354Entry: u-boot-spl-pubkey-dtb: U-Boot SPL device tree including public key
2355-------------------------------------------------------------------------
2356
2357Properties / Entry arguments:
2358 - key-name-hint: Public key name without extension (.crt).
2359 Default is determined by underlying
2360 bintool (fdt_add_pubkey), usually 'key'.
2361 - algo: (Optional) Algorithm used for signing. Default is determined by
2362 underlying bintool (fdt_add_pubkey), usually 'sha1,rsa2048'
2363 - required: (Optional) If present this indicates that the key must be
2364 verified for the image / configuration to be
2365 considered valid
2366
2367The following example shows an image containing an SPL which
2368is packed together with the dtb. Binman will add a signature
2369node to the dtb.
2370
2371Example node::
2372
2373 image {
2374 ...
2375 spl {
2376 filename = "spl.bin"
2377
2378 u-boot-spl-nodtb {
2379 };
2380 u-boot-spl-pubkey-dtb {
2381 algo = "sha384,rsa4096";
2382 required = "conf";
2383 key-name-hint = "dev";
2384 };
2385 };
2386 ...
2387 }
2388
2389
2390
Simon Glass228c9b82022-08-07 16:33:25 -06002391.. _etype_u_boot_spl_with_ucode_ptr:
2392
Simon Glass5a5da7c2018-07-17 13:25:37 -06002393Entry: u-boot-spl-with-ucode-ptr: U-Boot SPL with embedded microcode pointer
2394----------------------------------------------------------------------------
2395
Simon Glassf0253632018-09-14 04:57:32 -06002396This is used when SPL must set up the microcode for U-Boot.
2397
Simon Glass5a5da7c2018-07-17 13:25:37 -06002398See Entry_u_boot_ucode for full details of the entries involved in this
2399process.
2400
2401
2402
Simon Glass228c9b82022-08-07 16:33:25 -06002403.. _etype_u_boot_tpl:
2404
Simon Glassb8ef5b62018-07-17 13:25:48 -06002405Entry: u-boot-tpl: U-Boot TPL binary
2406------------------------------------
2407
2408Properties / Entry arguments:
2409 - filename: Filename of u-boot-tpl.bin (default 'tpl/u-boot-tpl.bin')
2410
2411This is the U-Boot TPL (Tertiary Program Loader) binary. This is a small
2412binary which loads before SPL, typically into on-chip SRAM. It is
2413responsible for locating, loading and jumping to SPL, the next-stage
2414loader. Note that SPL is not relocatable so must be loaded to the correct
2415address in SRAM, or written to run from the correct address if direct
2416flash execution is possible (e.g. on x86 devices).
2417
Simon Glass23ab4e02023-01-07 14:07:11 -07002418SPL can access binman symbols at runtime. See :ref:`binman_fdt`.
Simon Glassb8ef5b62018-07-17 13:25:48 -06002419
2420in the binman README for more information.
2421
2422The ELF file 'tpl/u-boot-tpl' must also be available for this to work, since
2423binman uses that to look up symbols to write into the TPL binary.
2424
Simon Glass06684922021-03-18 20:25:07 +13002425Note that this entry is automatically replaced with u-boot-tpl-expanded
Simon Glass3d433382021-03-21 18:24:30 +13002426unless --no-expanded is used or the node has a 'no-expanded' property.
Simon Glass06684922021-03-18 20:25:07 +13002427
Simon Glassb8ef5b62018-07-17 13:25:48 -06002428
2429
Simon Glass228c9b82022-08-07 16:33:25 -06002430.. _etype_u_boot_tpl_bss_pad:
2431
Simon Glassd26efc82021-03-18 20:24:58 +13002432Entry: u-boot-tpl-bss-pad: U-Boot TPL binary padded with a BSS region
2433---------------------------------------------------------------------
2434
2435Properties / Entry arguments:
2436 None
2437
2438This holds the padding added after the TPL binary to cover the BSS (Block
2439Started by Symbol) region. This region holds the various variables used by
2440TPL. It is set to 0 by TPL when it starts up. If you want to append data to
2441the TPL image (such as a device tree file), you must pad out the BSS region
2442to avoid the data overlapping with U-Boot variables. This entry is useful in
2443that case. It automatically pads out the entry size to cover both the code,
2444data and BSS.
2445
2446The contents of this entry will a certain number of zero bytes, determined
2447by __bss_size
2448
2449The ELF file 'tpl/u-boot-tpl' must also be available for this to work, since
2450binman uses that to look up the BSS address.
2451
2452
2453
Simon Glass228c9b82022-08-07 16:33:25 -06002454.. _etype_u_boot_tpl_dtb:
2455
Simon Glassb8ef5b62018-07-17 13:25:48 -06002456Entry: u-boot-tpl-dtb: U-Boot TPL device tree
2457---------------------------------------------
2458
2459Properties / Entry arguments:
2460 - filename: Filename of u-boot.dtb (default 'tpl/u-boot-tpl.dtb')
2461
2462This is the TPL device tree, containing configuration information for
2463TPL. TPL needs this to know what devices are present and which drivers
2464to activate.
2465
2466
2467
Simon Glass228c9b82022-08-07 16:33:25 -06002468.. _etype_u_boot_tpl_dtb_with_ucode:
2469
Simon Glassf0253632018-09-14 04:57:32 -06002470Entry: u-boot-tpl-dtb-with-ucode: U-Boot TPL with embedded microcode pointer
2471----------------------------------------------------------------------------
2472
2473This is used when TPL must set up the microcode for U-Boot.
2474
2475See Entry_u_boot_ucode for full details of the entries involved in this
2476process.
2477
2478
2479
Simon Glass228c9b82022-08-07 16:33:25 -06002480.. _etype_u_boot_tpl_elf:
2481
Simon Glass4c650252019-07-08 13:18:46 -06002482Entry: u-boot-tpl-elf: U-Boot TPL ELF image
2483-------------------------------------------
2484
2485Properties / Entry arguments:
2486 - filename: Filename of TPL u-boot (default 'tpl/u-boot-tpl')
2487
2488This is the U-Boot TPL ELF image. It does not include a device tree but can
2489be relocated to any address for execution.
2490
2491
2492
Simon Glass228c9b82022-08-07 16:33:25 -06002493.. _etype_u_boot_tpl_expanded:
2494
Simon Glass06684922021-03-18 20:25:07 +13002495Entry: u-boot-tpl-expanded: U-Boot TPL flat binary broken out into its component parts
2496--------------------------------------------------------------------------------------
2497
2498Properties / Entry arguments:
2499 - tpl-dtb: Controls whether this entry is selected (set to 'y' or '1' to
2500 select)
2501
2502This is a section containing the U-Boot binary, BSS padding if needed and a
2503devicetree. Using this entry type automatically creates this section, with
2504the following entries in it:
2505
2506 u-boot-tpl-nodtb
2507 u-boot-tpl-bss-pad
2508 u-boot-dtb
2509
2510Having the devicetree separate allows binman to update it in the final
2511image, so that the entries positions are provided to the running U-Boot.
2512
2513This entry is selected based on the value of the 'tpl-dtb' entryarg. If
2514this is non-empty (and not 'n' or '0') then this expanded entry is selected.
2515
2516
2517
Simon Glass228c9b82022-08-07 16:33:25 -06002518.. _etype_u_boot_tpl_nodtb:
2519
Simon Glass77a64e02021-03-18 20:24:57 +13002520Entry: u-boot-tpl-nodtb: TPL binary without device tree appended
2521----------------------------------------------------------------
2522
2523Properties / Entry arguments:
2524 - filename: Filename to include (default 'tpl/u-boot-tpl-nodtb.bin')
2525
2526This is the U-Boot TPL binary, It does not include a device tree blob at
2527the end of it so may not be able to work without it, assuming TPL needs
2528a device tree to operate on your platform. You can add a u-boot-tpl-dtb
Simon Glass06684922021-03-18 20:25:07 +13002529entry after this one, or use a u-boot-tpl entry instead, which normally
2530expands to a section containing u-boot-tpl-dtb, u-boot-tpl-bss-pad and
2531u-boot-tpl-dtb
Simon Glass77a64e02021-03-18 20:24:57 +13002532
Simon Glass23ab4e02023-01-07 14:07:11 -07002533TPL can access binman symbols at runtime. See :ref:`binman_fdt`.
Simon Glass77a64e02021-03-18 20:24:57 +13002534
Simon Glass77a64e02021-03-18 20:24:57 +13002535The ELF file 'tpl/u-boot-tpl' must also be available for this to work, since
2536binman uses that to look up symbols to write into the TPL binary.
2537
2538
2539
Simon Glass228c9b82022-08-07 16:33:25 -06002540.. _etype_u_boot_tpl_with_ucode_ptr:
2541
Simon Glassf0253632018-09-14 04:57:32 -06002542Entry: u-boot-tpl-with-ucode-ptr: U-Boot TPL with embedded microcode pointer
2543----------------------------------------------------------------------------
2544
2545See Entry_u_boot_ucode for full details of the entries involved in this
2546process.
2547
2548
2549
Simon Glass228c9b82022-08-07 16:33:25 -06002550.. _etype_u_boot_ucode:
2551
Simon Glass5a5da7c2018-07-17 13:25:37 -06002552Entry: u-boot-ucode: U-Boot microcode block
2553-------------------------------------------
2554
2555Properties / Entry arguments:
2556 None
2557
2558The contents of this entry are filled in automatically by other entries
2559which must also be in the image.
2560
2561U-Boot on x86 needs a single block of microcode. This is collected from
2562the various microcode update nodes in the device tree. It is also unable
2563to read the microcode from the device tree on platforms that use FSP
2564(Firmware Support Package) binaries, because the API requires that the
2565microcode is supplied before there is any SRAM available to use (i.e.
2566the FSP sets up the SRAM / cache-as-RAM but does so in the call that
2567requires the microcode!). To keep things simple, all x86 platforms handle
2568microcode the same way in U-Boot (even non-FSP platforms). This is that
2569a table is placed at _dt_ucode_base_size containing the base address and
2570size of the microcode. This is either passed to the FSP (for FSP
2571platforms), or used to set up the microcode (for non-FSP platforms).
2572This all happens in the build system since it is the only way to get
2573the microcode into a single blob and accessible without SRAM.
2574
2575There are two cases to handle. If there is only one microcode blob in
2576the device tree, then the ucode pointer it set to point to that. This
2577entry (u-boot-ucode) is empty. If there is more than one update, then
2578this entry holds the concatenation of all updates, and the device tree
2579entry (u-boot-dtb-with-ucode) is updated to remove the microcode. This
2580last step ensures that that the microcode appears in one contiguous
2581block in the image and is not unnecessarily duplicated in the device
2582tree. It is referred to as 'collation' here.
2583
2584Entry types that have a part to play in handling microcode:
2585
2586 Entry_u_boot_with_ucode_ptr:
2587 Contains u-boot-nodtb.bin (i.e. U-Boot without the device tree).
2588 It updates it with the address and size of the microcode so that
2589 U-Boot can find it early on start-up.
2590 Entry_u_boot_dtb_with_ucode:
2591 Contains u-boot.dtb. It stores the microcode in a
2592 'self.ucode_data' property, which is then read by this class to
2593 obtain the microcode if needed. If collation is performed, it
2594 removes the microcode from the device tree.
2595 Entry_u_boot_ucode:
2596 This class. If collation is enabled it reads the microcode from
2597 the Entry_u_boot_dtb_with_ucode entry, and uses it as the
2598 contents of this entry.
2599
2600
2601
Simon Glass237ac962023-01-07 14:07:10 -07002602.. _etype_u_boot_vpl:
2603
2604Entry: u-boot-vpl: U-Boot VPL binary
2605------------------------------------
2606
2607Properties / Entry arguments:
2608 - filename: Filename of u-boot-vpl.bin (default 'vpl/u-boot-vpl.bin')
2609
2610This is the U-Boot VPL (Verifying Program Loader) binary. This is a small
2611binary which loads before SPL, typically into on-chip SRAM. It is
2612responsible for locating, loading and jumping to SPL, the next-stage
2613loader. Note that VPL is not relocatable so must be loaded to the correct
2614address in SRAM, or written to run from the correct address if direct
2615flash execution is possible (e.g. on x86 devices).
2616
Simon Glass23ab4e02023-01-07 14:07:11 -07002617SPL can access binman symbols at runtime. See :ref:`binman_fdt`.
Simon Glass237ac962023-01-07 14:07:10 -07002618
2619in the binman README for more information.
2620
2621The ELF file 'vpl/u-boot-vpl' must also be available for this to work, since
2622binman uses that to look up symbols to write into the VPL binary.
2623
Simon Glass19009862024-07-20 11:49:39 +01002624Note that this entry is automatically replaced with u-boot-vpl-expanded
2625unless --no-expanded is used or the node has a 'no-expanded' property.
2626
Simon Glass237ac962023-01-07 14:07:10 -07002627
2628
2629.. _etype_u_boot_vpl_bss_pad:
2630
2631Entry: u-boot-vpl-bss-pad: U-Boot VPL binary padded with a BSS region
2632---------------------------------------------------------------------
2633
2634Properties / Entry arguments:
2635 None
2636
2637This holds the padding added after the VPL binary to cover the BSS (Block
2638Started by Symbol) region. This region holds the various variables used by
2639VPL. It is set to 0 by VPL when it starts up. If you want to append data to
2640the VPL image (such as a device tree file), you must pad out the BSS region
2641to avoid the data overlapping with U-Boot variables. This entry is useful in
2642that case. It automatically pads out the entry size to cover both the code,
2643data and BSS.
2644
2645The contents of this entry will a certain number of zero bytes, determined
2646by __bss_size
2647
2648The ELF file 'vpl/u-boot-vpl' must also be available for this to work, since
2649binman uses that to look up the BSS address.
2650
2651
2652
2653.. _etype_u_boot_vpl_dtb:
2654
2655Entry: u-boot-vpl-dtb: U-Boot VPL device tree
2656---------------------------------------------
2657
2658Properties / Entry arguments:
2659 - filename: Filename of u-boot.dtb (default 'vpl/u-boot-vpl.dtb')
2660
2661This is the VPL device tree, containing configuration information for
2662VPL. VPL needs this to know what devices are present and which drivers
2663to activate.
2664
2665
2666
2667.. _etype_u_boot_vpl_elf:
2668
2669Entry: u-boot-vpl-elf: U-Boot VPL ELF image
2670-------------------------------------------
2671
2672Properties / Entry arguments:
2673 - filename: Filename of VPL u-boot (default 'vpl/u-boot-vpl')
2674
2675This is the U-Boot VPL ELF image. It does not include a device tree but can
2676be relocated to any address for execution.
2677
2678
2679
2680.. _etype_u_boot_vpl_expanded:
2681
2682Entry: u-boot-vpl-expanded: U-Boot VPL flat binary broken out into its component parts
2683--------------------------------------------------------------------------------------
2684
2685Properties / Entry arguments:
2686 - vpl-dtb: Controls whether this entry is selected (set to 'y' or '1' to
2687 select)
2688
2689This is a section containing the U-Boot binary, BSS padding if needed and a
2690devicetree. Using this entry type automatically creates this section, with
2691the following entries in it:
2692
2693 u-boot-vpl-nodtb
2694 u-boot-vpl-bss-pad
2695 u-boot-dtb
2696
2697Having the devicetree separate allows binman to update it in the final
2698image, so that the entries positions are provided to the running U-Boot.
2699
2700This entry is selected based on the value of the 'vpl-dtb' entryarg. If
2701this is non-empty (and not 'n' or '0') then this expanded entry is selected.
2702
2703
2704
2705.. _etype_u_boot_vpl_nodtb:
2706
2707Entry: u-boot-vpl-nodtb: VPL binary without device tree appended
2708----------------------------------------------------------------
2709
2710Properties / Entry arguments:
2711 - filename: Filename to include (default 'vpl/u-boot-vpl-nodtb.bin')
2712
2713This is the U-Boot VPL binary, It does not include a device tree blob at
2714the end of it so may not be able to work without it, assuming VPL needs
Simon Glass19009862024-07-20 11:49:39 +01002715a device tree to operate on your platform. You can add a u-boot-vpl-dtb
2716entry after this one, or use a u-boot-vpl entry instead, which normally
Simon Glass237ac962023-01-07 14:07:10 -07002717expands to a section containing u-boot-vpl-dtb, u-boot-vpl-bss-pad and
2718u-boot-vpl-dtb
2719
Simon Glass23ab4e02023-01-07 14:07:11 -07002720VPL can access binman symbols at runtime. See :ref:`binman_fdt`.
Simon Glass237ac962023-01-07 14:07:10 -07002721
2722The ELF file 'vpl/u-boot-vpl' must also be available for this to work, since
2723binman uses that to look up symbols to write into the VPL binary.
2724
2725
2726
Simon Glass228c9b82022-08-07 16:33:25 -06002727.. _etype_u_boot_with_ucode_ptr:
2728
Simon Glass5a5da7c2018-07-17 13:25:37 -06002729Entry: u-boot-with-ucode-ptr: U-Boot with embedded microcode pointer
2730--------------------------------------------------------------------
2731
2732Properties / Entry arguments:
Masahiro Yamadaf6a8c0f2019-12-14 13:47:26 +09002733 - filename: Filename of u-boot-nodtb.bin (default 'u-boot-nodtb.bin')
Simon Glassf0693032018-09-14 04:57:07 -06002734 - optional-ucode: boolean property to make microcode optional. If the
2735 u-boot.bin image does not include microcode, no error will
2736 be generated.
Simon Glass5a5da7c2018-07-17 13:25:37 -06002737
2738See Entry_u_boot_ucode for full details of the three entries involved in
2739this process. This entry updates U-Boot with the offset and size of the
2740microcode, to allow early x86 boot code to find it without doing anything
Simon Glassadc59ea2021-03-18 20:24:54 +13002741complicated. Otherwise it is the same as the u-boot entry.
Simon Glass5a5da7c2018-07-17 13:25:37 -06002742
2743
2744
Simon Glass228c9b82022-08-07 16:33:25 -06002745.. _etype_vblock:
2746
Simon Glass24d0d3c2018-07-17 13:25:47 -06002747Entry: vblock: An entry which contains a Chromium OS verified boot block
2748------------------------------------------------------------------------
2749
2750Properties / Entry arguments:
Simon Glass5385f5a2019-05-17 22:00:53 -06002751 - content: List of phandles to entries to sign
Simon Glass24d0d3c2018-07-17 13:25:47 -06002752 - keydir: Directory containing the public keys to use
2753 - keyblock: Name of the key file to use (inside keydir)
2754 - signprivate: Name of provide key file to use (inside keydir)
2755 - version: Version number of the vblock (typically 1)
2756 - kernelkey: Name of the kernel key to use (inside keydir)
2757 - preamble-flags: Value of the vboot preamble flags (typically 0)
2758
Simon Glassa326b492018-09-14 04:57:11 -06002759Output files:
2760 - input.<unique_name> - input file passed to futility
2761 - vblock.<unique_name> - output file generated by futility (which is
2762 used as the entry contents)
2763
Jagdish Gediya9d368f32018-09-03 21:35:08 +05302764Chromium OS signs the read-write firmware and kernel, writing the signature
Simon Glass24d0d3c2018-07-17 13:25:47 -06002765in this block. This allows U-Boot to verify that the next firmware stage
2766and kernel are genuine.
2767
2768
2769
Simon Glass953d4172023-03-02 17:02:45 -07002770.. _etype_x509_cert:
2771
2772Entry: x509-cert: An entry which contains an X509 certificate
2773-------------------------------------------------------------
2774
2775Properties / Entry arguments:
2776 - content: List of phandles to entries to sign
2777
2778Output files:
2779 - input.<unique_name> - input file passed to openssl
2780 - cert.<unique_name> - output file generated by openssl (which is
2781 used as the entry contents)
2782
2783openssl signs the provided data, writing the signature in this entry. This
2784allows verification that the data is genuine
2785
2786
2787
Simon Glass228c9b82022-08-07 16:33:25 -06002788.. _etype_x86_reset16:
2789
Simon Glass2250ee62019-08-24 07:22:48 -06002790Entry: x86-reset16: x86 16-bit reset code for U-Boot
2791----------------------------------------------------
2792
2793Properties / Entry arguments:
2794 - filename: Filename of u-boot-x86-reset16.bin (default
2795 'u-boot-x86-reset16.bin')
2796
2797x86 CPUs start up in 16-bit mode, even if they are 32-bit CPUs. This code
2798must be placed at a particular address. This entry holds that code. It is
2799typically placed at offset CONFIG_RESET_VEC_LOC. The code is responsible
2800for jumping to the x86-start16 code, which continues execution.
2801
2802For 64-bit U-Boot, the 'x86_reset16_spl' entry type is used instead.
2803
2804
2805
Simon Glass228c9b82022-08-07 16:33:25 -06002806.. _etype_x86_reset16_spl:
2807
Simon Glass2250ee62019-08-24 07:22:48 -06002808Entry: x86-reset16-spl: x86 16-bit reset code for U-Boot
2809--------------------------------------------------------
2810
2811Properties / Entry arguments:
2812 - filename: Filename of u-boot-x86-reset16.bin (default
2813 'u-boot-x86-reset16.bin')
2814
2815x86 CPUs start up in 16-bit mode, even if they are 32-bit CPUs. This code
2816must be placed at a particular address. This entry holds that code. It is
2817typically placed at offset CONFIG_RESET_VEC_LOC. The code is responsible
2818for jumping to the x86-start16 code, which continues execution.
2819
2820For 32-bit U-Boot, the 'x86_reset_spl' entry type is used instead.
2821
2822
2823
Simon Glass228c9b82022-08-07 16:33:25 -06002824.. _etype_x86_reset16_tpl:
2825
Simon Glass2250ee62019-08-24 07:22:48 -06002826Entry: x86-reset16-tpl: x86 16-bit reset code for U-Boot
2827--------------------------------------------------------
2828
2829Properties / Entry arguments:
2830 - filename: Filename of u-boot-x86-reset16.bin (default
2831 'u-boot-x86-reset16.bin')
2832
2833x86 CPUs start up in 16-bit mode, even if they are 32-bit CPUs. This code
2834must be placed at a particular address. This entry holds that code. It is
2835typically placed at offset CONFIG_RESET_VEC_LOC. The code is responsible
2836for jumping to the x86-start16 code, which continues execution.
2837
2838For 32-bit U-Boot, the 'x86_reset_tpl' entry type is used instead.
2839
2840
2841
Simon Glass228c9b82022-08-07 16:33:25 -06002842.. _etype_x86_start16:
2843
Simon Glass5a5da7c2018-07-17 13:25:37 -06002844Entry: x86-start16: x86 16-bit start-up code for U-Boot
2845-------------------------------------------------------
2846
2847Properties / Entry arguments:
Simon Glass5e239182019-08-24 07:22:49 -06002848 - filename: Filename of u-boot-x86-start16.bin (default
2849 'u-boot-x86-start16.bin')
Simon Glass5a5da7c2018-07-17 13:25:37 -06002850
2851x86 CPUs start up in 16-bit mode, even if they are 32-bit CPUs. This code
Simon Glass5e239182019-08-24 07:22:49 -06002852must be placed in the top 64KB of the ROM. The reset code jumps to it. This
2853entry holds that code. It is typically placed at offset
2854CONFIG_SYS_X86_START16. The code is responsible for changing to 32-bit mode
2855and jumping to U-Boot's entry point, which requires 32-bit mode (for 32-bit
2856U-Boot).
Simon Glass5a5da7c2018-07-17 13:25:37 -06002857
2858For 64-bit U-Boot, the 'x86_start16_spl' entry type is used instead.
2859
2860
2861
Simon Glass228c9b82022-08-07 16:33:25 -06002862.. _etype_x86_start16_spl:
2863
Simon Glass5a5da7c2018-07-17 13:25:37 -06002864Entry: x86-start16-spl: x86 16-bit start-up code for SPL
2865--------------------------------------------------------
2866
2867Properties / Entry arguments:
Simon Glass5e239182019-08-24 07:22:49 -06002868 - filename: Filename of spl/u-boot-x86-start16-spl.bin (default
2869 'spl/u-boot-x86-start16-spl.bin')
Simon Glass5a5da7c2018-07-17 13:25:37 -06002870
Simon Glass5e239182019-08-24 07:22:49 -06002871x86 CPUs start up in 16-bit mode, even if they are 32-bit CPUs. This code
2872must be placed in the top 64KB of the ROM. The reset code jumps to it. This
2873entry holds that code. It is typically placed at offset
2874CONFIG_SYS_X86_START16. The code is responsible for changing to 32-bit mode
2875and jumping to U-Boot's entry point, which requires 32-bit mode (for 32-bit
2876U-Boot).
Simon Glass5a5da7c2018-07-17 13:25:37 -06002877
Simon Glass5e239182019-08-24 07:22:49 -06002878For 32-bit U-Boot, the 'x86-start16' entry type is used instead.
Simon Glass5a5da7c2018-07-17 13:25:37 -06002879
2880
2881
Simon Glass228c9b82022-08-07 16:33:25 -06002882.. _etype_x86_start16_tpl:
2883
Simon Glass35b384c2018-09-14 04:57:10 -06002884Entry: x86-start16-tpl: x86 16-bit start-up code for TPL
2885--------------------------------------------------------
2886
2887Properties / Entry arguments:
Simon Glass5e239182019-08-24 07:22:49 -06002888 - filename: Filename of tpl/u-boot-x86-start16-tpl.bin (default
2889 'tpl/u-boot-x86-start16-tpl.bin')
Simon Glass35b384c2018-09-14 04:57:10 -06002890
Simon Glass5e239182019-08-24 07:22:49 -06002891x86 CPUs start up in 16-bit mode, even if they are 32-bit CPUs. This code
2892must be placed in the top 64KB of the ROM. The reset code jumps to it. This
2893entry holds that code. It is typically placed at offset
2894CONFIG_SYS_X86_START16. The code is responsible for changing to 32-bit mode
2895and jumping to U-Boot's entry point, which requires 32-bit mode (for 32-bit
2896U-Boot).
Simon Glass35b384c2018-09-14 04:57:10 -06002897
Simon Glass5e239182019-08-24 07:22:49 -06002898If TPL is not being used, the 'x86-start16-spl or 'x86-start16' entry types
Simon Glass35b384c2018-09-14 04:57:10 -06002899may be used instead.
2900
2901
2902
Lukas Funke7fcfa9d2023-08-03 17:22:15 +02002903.. _etype_xilinx_bootgen:
2904
2905Entry: xilinx-bootgen: Signed SPL boot image for Xilinx ZynqMP devices
2906----------------------------------------------------------------------
2907
2908Properties / Entry arguments:
2909 - auth-params: (Optional) Authentication parameters passed to bootgen
2910 - fsbl-config: (Optional) FSBL parameters passed to bootgen
2911 - keysrc-enc: (Optional) Key source when using decryption engine
2912 - pmufw-filename: Filename of PMU firmware. Default: pmu-firmware.elf
2913 - psk-key-name-hint: Name of primary secret key to use for signing the
2914 secondardy public key. Format: .pem file
2915 - ssk-key-name-hint: Name of secondardy secret key to use for signing
2916 the boot image. Format: .pem file
2917
2918The etype is used to create a boot image for Xilinx ZynqMP
2919devices.
2920
2921Information for signed images:
2922
2923In AMD/Xilinx SoCs, two pairs of public and secret keys are used
2924- primary and secondary. The function of the primary public/secret key pair
2925is to authenticate the secondary public/secret key pair.
2926The function of the secondary key is to sign/verify the boot image. [1]
2927
2928AMD/Xilinx uses the following terms for private/public keys [1]:
2929
2930 PSK = Primary Secret Key (Used to sign Secondary Public Key)
2931 PPK = Primary Public Key (Used to verify Secondary Public Key)
2932 SSK = Secondary Secret Key (Used to sign the boot image/partitions)
2933 SPK = Used to verify the actual boot image
2934
2935The following example builds a signed boot image. The fuses of
2936the primary public key (ppk) should be fused together with the RSA_EN flag.
2937
2938Example node::
2939
2940 spl {
2941 filename = "boot.signed.bin";
2942
2943 xilinx-bootgen {
2944 psk-key-name-hint = "psk0";
2945 ssk-key-name-hint = "ssk0";
2946 auth-params = "ppk_select=0", "spk_id=0x00000000";
2947
2948 u-boot-spl-nodtb {
2949 };
2950 u-boot-spl-pubkey-dtb {
2951 algo = "sha384,rsa4096";
2952 required = "conf";
2953 key-name-hint = "dev";
2954 };
2955 };
2956 };
2957
2958For testing purposes, e.g. if no RSA_EN should be fused, one could add
2959the "bh_auth_enable" flag in the fsbl-config field. This will skip the
2960verification of the ppk fuses and boot the image, even if ppk hash is
2961invalid.
2962
2963Example node::
2964
2965 xilinx-bootgen {
2966 psk-key-name-hint = "psk0";
2967 psk-key-name-hint = "ssk0";
2968 ...
2969 fsbl-config = "bh_auth_enable";
2970 ...
2971 };
2972
2973[1] https://docs.xilinx.com/r/en-US/ug1283-bootgen-user-guide/Using-Authentication
2974
2975
2976
2977