| // SPDX-License-Identifier: GPL-2.0+ |
| /* |
| * (C) Copyright 2020 |
| * Sam Protsenko <joe.skb7@gmail.com> |
| */ |
| |
| #include <android_image.h> |
| #include <common.h> |
| #include <command.h> |
| #include <image.h> |
| #include <mapmem.h> |
| |
| #define abootimg_addr() \ |
| (_abootimg_addr == -1 ? image_load_addr : _abootimg_addr) |
| |
| /* Please use abootimg_addr() macro to obtain the boot image address */ |
| static ulong _abootimg_addr = -1; |
| static ulong _avendor_bootimg_addr = -1; |
| |
| ulong get_abootimg_addr(void) |
| { |
| return (_abootimg_addr == -1 ? image_load_addr : _abootimg_addr); |
| } |
| |
| ulong get_avendor_bootimg_addr(void) |
| { |
| return _avendor_bootimg_addr; |
| } |
| |
| static int abootimg_get_ver(int argc, char *const argv[]) |
| { |
| const struct andr_boot_img_hdr_v0 *hdr; |
| int res = CMD_RET_SUCCESS; |
| |
| if (argc > 1) |
| return CMD_RET_USAGE; |
| |
| hdr = map_sysmem(abootimg_addr(), sizeof(*hdr)); |
| if (!is_android_boot_image_header(hdr)) { |
| printf("Error: Boot Image header is incorrect\n"); |
| res = CMD_RET_FAILURE; |
| goto exit; |
| } |
| |
| if (argc == 0) |
| printf("%u\n", hdr->header_version); |
| else |
| env_set_ulong(argv[0], hdr->header_version); |
| |
| exit: |
| unmap_sysmem(hdr); |
| return res; |
| } |
| |
| static int abootimg_get_recovery_dtbo(int argc, char *const argv[]) |
| { |
| ulong addr; |
| u32 size; |
| |
| if (argc > 2) |
| return CMD_RET_USAGE; |
| |
| if (!android_image_get_dtbo(abootimg_addr(), &addr, &size)) |
| return CMD_RET_FAILURE; |
| |
| if (argc == 0) { |
| printf("%lx\n", addr); |
| } else { |
| env_set_hex(argv[0], addr); |
| if (argc == 2) |
| env_set_hex(argv[1], size); |
| } |
| |
| return CMD_RET_SUCCESS; |
| } |
| |
| static int abootimg_get_dtb_load_addr(int argc, char *const argv[]) |
| { |
| if (argc > 1) |
| return CMD_RET_USAGE; |
| struct andr_image_data img_data = {0}; |
| const struct andr_boot_img_hdr_v0 *hdr; |
| const struct andr_vnd_boot_img_hdr *vhdr; |
| |
| hdr = map_sysmem(abootimg_addr(), sizeof(*hdr)); |
| if (get_avendor_bootimg_addr() != -1) |
| vhdr = map_sysmem(get_avendor_bootimg_addr(), sizeof(*vhdr)); |
| |
| if (!android_image_get_data(hdr, vhdr, &img_data)) { |
| if (get_avendor_bootimg_addr() != -1) |
| unmap_sysmem(vhdr); |
| unmap_sysmem(hdr); |
| return CMD_RET_FAILURE; |
| } |
| |
| if (get_avendor_bootimg_addr() != -1) |
| unmap_sysmem(vhdr); |
| unmap_sysmem(hdr); |
| |
| if (img_data.header_version < 2) { |
| printf("Error: header_version must be >= 2 for this\n"); |
| return CMD_RET_FAILURE; |
| } |
| |
| if (!img_data.dtb_load_addr) { |
| printf("Error: failed to read dtb_load_addr\n"); |
| return CMD_RET_FAILURE; |
| } |
| |
| if (argc == 0) |
| printf("%lx\n", (ulong)img_data.dtb_load_addr); |
| else |
| env_set_hex(argv[0], (ulong)img_data.dtb_load_addr); |
| |
| return CMD_RET_SUCCESS; |
| } |
| |
| static int abootimg_get_dtb_by_index(int argc, char *const argv[]) |
| { |
| const char *index_str; |
| u32 num; |
| char *endp; |
| ulong addr; |
| u32 size; |
| |
| if (argc < 1 || argc > 3) |
| return CMD_RET_USAGE; |
| |
| index_str = argv[0] + strlen("--index="); |
| if (index_str[0] == '\0') { |
| printf("Error: Wrong index num\n"); |
| return CMD_RET_FAILURE; |
| } |
| |
| num = simple_strtoul(index_str, &endp, 0); |
| if (*endp != '\0') { |
| printf("Error: Wrong index num\n"); |
| return CMD_RET_FAILURE; |
| } |
| |
| if (!android_image_get_dtb_by_index(abootimg_addr(), |
| get_avendor_bootimg_addr(), num, |
| &addr, &size)) { |
| return CMD_RET_FAILURE; |
| } |
| |
| if (argc == 1) { |
| printf("%lx\n", addr); |
| } else { |
| if (env_set_hex(argv[1], addr)) { |
| printf("Error: Can't set [addr_var]\n"); |
| return CMD_RET_FAILURE; |
| } |
| |
| if (argc == 3) { |
| if (env_set_hex(argv[2], size)) { |
| printf("Error: Can't set [size_var]\n"); |
| return CMD_RET_FAILURE; |
| } |
| } |
| } |
| |
| return CMD_RET_SUCCESS; |
| } |
| |
| static int abootimg_get_dtb(int argc, char *const argv[]) |
| { |
| if (argc < 1) |
| return CMD_RET_USAGE; |
| |
| if (strstr(argv[0], "--index=")) |
| return abootimg_get_dtb_by_index(argc, argv); |
| |
| return CMD_RET_USAGE; |
| } |
| |
| static int do_abootimg_addr(struct cmd_tbl *cmdtp, int flag, int argc, |
| char *const argv[]) |
| { |
| char *endp; |
| ulong img_addr; |
| |
| if (argc < 2 || argc > 3) |
| return CMD_RET_USAGE; |
| |
| img_addr = hextoul(argv[1], &endp); |
| if (*endp != '\0') { |
| printf("Error: Wrong image address\n"); |
| return CMD_RET_FAILURE; |
| } |
| |
| _abootimg_addr = img_addr; |
| |
| if (argc == 3) { |
| img_addr = simple_strtoul(argv[2], &endp, 16); |
| if (*endp != '\0') { |
| printf("Error: Wrong vendor image address\n"); |
| return CMD_RET_FAILURE; |
| } |
| |
| _avendor_bootimg_addr = img_addr; |
| } |
| |
| return CMD_RET_SUCCESS; |
| } |
| |
| static int do_abootimg_get(struct cmd_tbl *cmdtp, int flag, int argc, |
| char *const argv[]) |
| { |
| const char *param; |
| |
| if (argc < 2) |
| return CMD_RET_USAGE; |
| |
| param = argv[1]; |
| argc -= 2; |
| argv += 2; |
| if (!strcmp(param, "ver")) |
| return abootimg_get_ver(argc, argv); |
| else if (!strcmp(param, "recovery_dtbo")) |
| return abootimg_get_recovery_dtbo(argc, argv); |
| else if (!strcmp(param, "dtb_load_addr")) |
| return abootimg_get_dtb_load_addr(argc, argv); |
| else if (!strcmp(param, "dtb")) |
| return abootimg_get_dtb(argc, argv); |
| |
| return CMD_RET_USAGE; |
| } |
| |
| static int do_abootimg_dump(struct cmd_tbl *cmdtp, int flag, int argc, |
| char *const argv[]) |
| { |
| if (argc != 2) |
| return CMD_RET_USAGE; |
| |
| if (!strcmp(argv[1], "dtb")) { |
| if (android_image_print_dtb_contents(abootimg_addr())) |
| return CMD_RET_FAILURE; |
| } else { |
| return CMD_RET_USAGE; |
| } |
| |
| return CMD_RET_SUCCESS; |
| } |
| |
| static struct cmd_tbl cmd_abootimg_sub[] = { |
| U_BOOT_CMD_MKENT(addr, 3, 1, do_abootimg_addr, "", ""), |
| U_BOOT_CMD_MKENT(dump, 2, 1, do_abootimg_dump, "", ""), |
| U_BOOT_CMD_MKENT(get, 5, 1, do_abootimg_get, "", ""), |
| }; |
| |
| static int do_abootimg(struct cmd_tbl *cmdtp, int flag, int argc, |
| char *const argv[]) |
| { |
| struct cmd_tbl *cp; |
| |
| cp = find_cmd_tbl(argv[1], cmd_abootimg_sub, |
| ARRAY_SIZE(cmd_abootimg_sub)); |
| |
| /* Strip off leading 'abootimg' command argument */ |
| argc--; |
| argv++; |
| |
| if (!cp || argc > cp->maxargs) |
| return CMD_RET_USAGE; |
| if (flag == CMD_FLAG_REPEAT && !cmd_is_repeatable(cp)) |
| return CMD_RET_SUCCESS; |
| |
| return cp->cmd(cmdtp, flag, argc, argv); |
| } |
| |
| U_BOOT_CMD( |
| abootimg, CONFIG_SYS_MAXARGS, 0, do_abootimg, |
| "manipulate Android Boot Image", |
| "addr <boot_img_addr> [<vendor_boot_img_addr>]>\n" |
| " - set the address in RAM where boot image is located\n" |
| " ($loadaddr is used by default)\n" |
| "abootimg dump dtb\n" |
| " - print info for all DT blobs in DTB area\n" |
| "abootimg get ver [varname]\n" |
| " - get header version\n" |
| "abootimg get recovery_dtbo [addr_var [size_var]]\n" |
| " - get address and size (hex) of recovery DTBO area in the image\n" |
| " [addr_var]: variable name to contain DTBO area address\n" |
| " [size_var]: variable name to contain DTBO area size\n" |
| "abootimg get dtb_load_addr [varname]\n" |
| " - get load address (hex) of DTB, from image header\n" |
| "abootimg get dtb --index=<num> [addr_var [size_var]]\n" |
| " - get address and size (hex) of DT blob in the image by index\n" |
| " <num>: index number of desired DT blob in DTB area\n" |
| " [addr_var]: variable name to contain DT blob address\n" |
| " [size_var]: variable name to contain DT blob size" |
| ); |