abootimg.c 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258
  1. // SPDX-License-Identifier: GPL-2.0+
  2. /*
  3. * (C) Copyright 2020
  4. * Sam Protsenko <joe.skb7@gmail.com>
  5. */
  6. #include <android_image.h>
  7. #include <common.h>
  8. #include <mapmem.h>
  9. #define abootimg_addr() \
  10. (_abootimg_addr == -1 ? image_load_addr : _abootimg_addr)
  11. /* Please use abootimg_addr() macro to obtain the boot image address */
  12. static ulong _abootimg_addr = -1;
  13. static int abootimg_get_ver(int argc, char * const argv[])
  14. {
  15. const struct andr_img_hdr *hdr;
  16. int res = CMD_RET_SUCCESS;
  17. if (argc > 1)
  18. return CMD_RET_USAGE;
  19. hdr = map_sysmem(abootimg_addr(), sizeof(*hdr));
  20. if (android_image_check_header(hdr)) {
  21. printf("Error: Boot Image header is incorrect\n");
  22. res = CMD_RET_FAILURE;
  23. goto exit;
  24. }
  25. if (argc == 0)
  26. printf("%u\n", hdr->header_version);
  27. else
  28. env_set_ulong(argv[0], hdr->header_version);
  29. exit:
  30. unmap_sysmem(hdr);
  31. return res;
  32. }
  33. static int abootimg_get_recovery_dtbo(int argc, char * const argv[])
  34. {
  35. ulong addr;
  36. u32 size;
  37. if (argc > 2)
  38. return CMD_RET_USAGE;
  39. if (!android_image_get_dtbo(abootimg_addr(), &addr, &size))
  40. return CMD_RET_FAILURE;
  41. if (argc == 0) {
  42. printf("%lx\n", addr);
  43. } else {
  44. env_set_hex(argv[0], addr);
  45. if (argc == 2)
  46. env_set_hex(argv[1], size);
  47. }
  48. return CMD_RET_SUCCESS;
  49. }
  50. static int abootimg_get_dtb_load_addr(int argc, char * const argv[])
  51. {
  52. const struct andr_img_hdr *hdr;
  53. int res = CMD_RET_SUCCESS;
  54. if (argc > 1)
  55. return CMD_RET_USAGE;
  56. hdr = map_sysmem(abootimg_addr(), sizeof(*hdr));
  57. if (android_image_check_header(hdr)) {
  58. printf("Error: Boot Image header is incorrect\n");
  59. res = CMD_RET_FAILURE;
  60. goto exit;
  61. }
  62. if (hdr->header_version < 2) {
  63. printf("Error: header_version must be >= 2 for this\n");
  64. res = CMD_RET_FAILURE;
  65. goto exit;
  66. }
  67. if (argc == 0)
  68. printf("%lx\n", (ulong)hdr->dtb_addr);
  69. else
  70. env_set_hex(argv[0], (ulong)hdr->dtb_addr);
  71. exit:
  72. unmap_sysmem(hdr);
  73. return res;
  74. }
  75. static int abootimg_get_dtb_by_index(int argc, char * const argv[])
  76. {
  77. const char *index_str;
  78. u32 num;
  79. char *endp;
  80. ulong addr;
  81. u32 size;
  82. if (argc < 1 || argc > 3)
  83. return CMD_RET_USAGE;
  84. index_str = argv[0] + strlen("--index=");
  85. if (index_str[0] == '\0') {
  86. printf("Error: Wrong index num\n");
  87. return CMD_RET_FAILURE;
  88. }
  89. num = simple_strtoul(index_str, &endp, 0);
  90. if (*endp != '\0') {
  91. printf("Error: Wrong index num\n");
  92. return CMD_RET_FAILURE;
  93. }
  94. if (!android_image_get_dtb_by_index(abootimg_addr(), num,
  95. &addr, &size)) {
  96. return CMD_RET_FAILURE;
  97. }
  98. if (argc == 1) {
  99. printf("%lx\n", addr);
  100. } else {
  101. if (env_set_hex(argv[1], addr)) {
  102. printf("Error: Can't set [addr_var]\n");
  103. return CMD_RET_FAILURE;
  104. }
  105. if (argc == 3) {
  106. if (env_set_hex(argv[2], size)) {
  107. printf("Error: Can't set [size_var]\n");
  108. return CMD_RET_FAILURE;
  109. }
  110. }
  111. }
  112. return CMD_RET_SUCCESS;
  113. }
  114. static int abootimg_get_dtb(int argc, char * const argv[])
  115. {
  116. if (argc < 1)
  117. return CMD_RET_USAGE;
  118. if (strstr(argv[0], "--index="))
  119. return abootimg_get_dtb_by_index(argc, argv);
  120. return CMD_RET_USAGE;
  121. }
  122. static int do_abootimg_addr(cmd_tbl_t *cmdtp, int flag, int argc,
  123. char * const argv[])
  124. {
  125. char *endp;
  126. ulong img_addr;
  127. if (argc != 2)
  128. return CMD_RET_USAGE;
  129. img_addr = simple_strtoul(argv[1], &endp, 16);
  130. if (*endp != '\0') {
  131. printf("Error: Wrong image address\n");
  132. return CMD_RET_FAILURE;
  133. }
  134. _abootimg_addr = img_addr;
  135. return CMD_RET_SUCCESS;
  136. }
  137. static int do_abootimg_get(cmd_tbl_t *cmdtp, int flag, int argc,
  138. char * const argv[])
  139. {
  140. const char *param;
  141. if (argc < 2)
  142. return CMD_RET_USAGE;
  143. param = argv[1];
  144. argc -= 2;
  145. argv += 2;
  146. if (!strcmp(param, "ver"))
  147. return abootimg_get_ver(argc, argv);
  148. else if (!strcmp(param, "recovery_dtbo"))
  149. return abootimg_get_recovery_dtbo(argc, argv);
  150. else if (!strcmp(param, "dtb_load_addr"))
  151. return abootimg_get_dtb_load_addr(argc, argv);
  152. else if (!strcmp(param, "dtb"))
  153. return abootimg_get_dtb(argc, argv);
  154. return CMD_RET_USAGE;
  155. }
  156. static int do_abootimg_dump(cmd_tbl_t *cmdtp, int flag, int argc,
  157. char * const argv[])
  158. {
  159. if (argc != 2)
  160. return CMD_RET_USAGE;
  161. if (!strcmp(argv[1], "dtb")) {
  162. if (android_image_print_dtb_contents(abootimg_addr()))
  163. return CMD_RET_FAILURE;
  164. } else {
  165. return CMD_RET_USAGE;
  166. }
  167. return CMD_RET_SUCCESS;
  168. }
  169. static cmd_tbl_t cmd_abootimg_sub[] = {
  170. U_BOOT_CMD_MKENT(addr, 2, 1, do_abootimg_addr, "", ""),
  171. U_BOOT_CMD_MKENT(dump, 2, 1, do_abootimg_dump, "", ""),
  172. U_BOOT_CMD_MKENT(get, 5, 1, do_abootimg_get, "", ""),
  173. };
  174. static int do_abootimg(cmd_tbl_t *cmdtp, int flag, int argc,
  175. char * const argv[])
  176. {
  177. cmd_tbl_t *cp;
  178. cp = find_cmd_tbl(argv[1], cmd_abootimg_sub,
  179. ARRAY_SIZE(cmd_abootimg_sub));
  180. /* Strip off leading 'abootimg' command argument */
  181. argc--;
  182. argv++;
  183. if (!cp || argc > cp->maxargs)
  184. return CMD_RET_USAGE;
  185. if (flag == CMD_FLAG_REPEAT && !cmd_is_repeatable(cp))
  186. return CMD_RET_SUCCESS;
  187. return cp->cmd(cmdtp, flag, argc, argv);
  188. }
  189. U_BOOT_CMD(
  190. abootimg, CONFIG_SYS_MAXARGS, 0, do_abootimg,
  191. "manipulate Android Boot Image",
  192. "addr <addr>\n"
  193. " - set the address in RAM where boot image is located\n"
  194. " ($loadaddr is used by default)\n"
  195. "abootimg dump dtb\n"
  196. " - print info for all DT blobs in DTB area\n"
  197. "abootimg get ver [varname]\n"
  198. " - get header version\n"
  199. "abootimg get recovery_dtbo [addr_var [size_var]]\n"
  200. " - get address and size (hex) of recovery DTBO area in the image\n"
  201. " [addr_var]: variable name to contain DTBO area address\n"
  202. " [size_var]: variable name to contain DTBO area size\n"
  203. "abootimg get dtb_load_addr [varname]\n"
  204. " - get load address (hex) of DTB, from image header\n"
  205. "abootimg get dtb --index=<num> [addr_var [size_var]]\n"
  206. " - get address and size (hex) of DT blob in the image by index\n"
  207. " <num>: index number of desired DT blob in DTB area\n"
  208. " [addr_var]: variable name to contain DT blob address\n"
  209. " [size_var]: variable name to contain DT blob size"
  210. );