abootimg.c 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260
  1. // SPDX-License-Identifier: GPL-2.0+
  2. /*
  3. * (C) Copyright 2020
  4. * Sam Protsenko <joe.skb7@gmail.com>
  5. */
  6. #include <android_image.h>
  7. #include <common.h>
  8. #include <command.h>
  9. #include <image.h>
  10. #include <mapmem.h>
  11. #define abootimg_addr() \
  12. (_abootimg_addr == -1 ? image_load_addr : _abootimg_addr)
  13. /* Please use abootimg_addr() macro to obtain the boot image address */
  14. static ulong _abootimg_addr = -1;
  15. static int abootimg_get_ver(int argc, char *const argv[])
  16. {
  17. const struct andr_img_hdr *hdr;
  18. int res = CMD_RET_SUCCESS;
  19. if (argc > 1)
  20. return CMD_RET_USAGE;
  21. hdr = map_sysmem(abootimg_addr(), sizeof(*hdr));
  22. if (android_image_check_header(hdr)) {
  23. printf("Error: Boot Image header is incorrect\n");
  24. res = CMD_RET_FAILURE;
  25. goto exit;
  26. }
  27. if (argc == 0)
  28. printf("%u\n", hdr->header_version);
  29. else
  30. env_set_ulong(argv[0], hdr->header_version);
  31. exit:
  32. unmap_sysmem(hdr);
  33. return res;
  34. }
  35. static int abootimg_get_recovery_dtbo(int argc, char *const argv[])
  36. {
  37. ulong addr;
  38. u32 size;
  39. if (argc > 2)
  40. return CMD_RET_USAGE;
  41. if (!android_image_get_dtbo(abootimg_addr(), &addr, &size))
  42. return CMD_RET_FAILURE;
  43. if (argc == 0) {
  44. printf("%lx\n", addr);
  45. } else {
  46. env_set_hex(argv[0], addr);
  47. if (argc == 2)
  48. env_set_hex(argv[1], size);
  49. }
  50. return CMD_RET_SUCCESS;
  51. }
  52. static int abootimg_get_dtb_load_addr(int argc, char *const argv[])
  53. {
  54. const struct andr_img_hdr *hdr;
  55. int res = CMD_RET_SUCCESS;
  56. if (argc > 1)
  57. return CMD_RET_USAGE;
  58. hdr = map_sysmem(abootimg_addr(), sizeof(*hdr));
  59. if (android_image_check_header(hdr)) {
  60. printf("Error: Boot Image header is incorrect\n");
  61. res = CMD_RET_FAILURE;
  62. goto exit;
  63. }
  64. if (hdr->header_version < 2) {
  65. printf("Error: header_version must be >= 2 for this\n");
  66. res = CMD_RET_FAILURE;
  67. goto exit;
  68. }
  69. if (argc == 0)
  70. printf("%lx\n", (ulong)hdr->dtb_addr);
  71. else
  72. env_set_hex(argv[0], (ulong)hdr->dtb_addr);
  73. exit:
  74. unmap_sysmem(hdr);
  75. return res;
  76. }
  77. static int abootimg_get_dtb_by_index(int argc, char *const argv[])
  78. {
  79. const char *index_str;
  80. u32 num;
  81. char *endp;
  82. ulong addr;
  83. u32 size;
  84. if (argc < 1 || argc > 3)
  85. return CMD_RET_USAGE;
  86. index_str = argv[0] + strlen("--index=");
  87. if (index_str[0] == '\0') {
  88. printf("Error: Wrong index num\n");
  89. return CMD_RET_FAILURE;
  90. }
  91. num = simple_strtoul(index_str, &endp, 0);
  92. if (*endp != '\0') {
  93. printf("Error: Wrong index num\n");
  94. return CMD_RET_FAILURE;
  95. }
  96. if (!android_image_get_dtb_by_index(abootimg_addr(), num,
  97. &addr, &size)) {
  98. return CMD_RET_FAILURE;
  99. }
  100. if (argc == 1) {
  101. printf("%lx\n", addr);
  102. } else {
  103. if (env_set_hex(argv[1], addr)) {
  104. printf("Error: Can't set [addr_var]\n");
  105. return CMD_RET_FAILURE;
  106. }
  107. if (argc == 3) {
  108. if (env_set_hex(argv[2], size)) {
  109. printf("Error: Can't set [size_var]\n");
  110. return CMD_RET_FAILURE;
  111. }
  112. }
  113. }
  114. return CMD_RET_SUCCESS;
  115. }
  116. static int abootimg_get_dtb(int argc, char *const argv[])
  117. {
  118. if (argc < 1)
  119. return CMD_RET_USAGE;
  120. if (strstr(argv[0], "--index="))
  121. return abootimg_get_dtb_by_index(argc, argv);
  122. return CMD_RET_USAGE;
  123. }
  124. static int do_abootimg_addr(struct cmd_tbl *cmdtp, int flag, int argc,
  125. char *const argv[])
  126. {
  127. char *endp;
  128. ulong img_addr;
  129. if (argc != 2)
  130. return CMD_RET_USAGE;
  131. img_addr = hextoul(argv[1], &endp);
  132. if (*endp != '\0') {
  133. printf("Error: Wrong image address\n");
  134. return CMD_RET_FAILURE;
  135. }
  136. _abootimg_addr = img_addr;
  137. return CMD_RET_SUCCESS;
  138. }
  139. static int do_abootimg_get(struct cmd_tbl *cmdtp, int flag, int argc,
  140. char *const argv[])
  141. {
  142. const char *param;
  143. if (argc < 2)
  144. return CMD_RET_USAGE;
  145. param = argv[1];
  146. argc -= 2;
  147. argv += 2;
  148. if (!strcmp(param, "ver"))
  149. return abootimg_get_ver(argc, argv);
  150. else if (!strcmp(param, "recovery_dtbo"))
  151. return abootimg_get_recovery_dtbo(argc, argv);
  152. else if (!strcmp(param, "dtb_load_addr"))
  153. return abootimg_get_dtb_load_addr(argc, argv);
  154. else if (!strcmp(param, "dtb"))
  155. return abootimg_get_dtb(argc, argv);
  156. return CMD_RET_USAGE;
  157. }
  158. static int do_abootimg_dump(struct cmd_tbl *cmdtp, int flag, int argc,
  159. char *const argv[])
  160. {
  161. if (argc != 2)
  162. return CMD_RET_USAGE;
  163. if (!strcmp(argv[1], "dtb")) {
  164. if (android_image_print_dtb_contents(abootimg_addr()))
  165. return CMD_RET_FAILURE;
  166. } else {
  167. return CMD_RET_USAGE;
  168. }
  169. return CMD_RET_SUCCESS;
  170. }
  171. static struct cmd_tbl cmd_abootimg_sub[] = {
  172. U_BOOT_CMD_MKENT(addr, 2, 1, do_abootimg_addr, "", ""),
  173. U_BOOT_CMD_MKENT(dump, 2, 1, do_abootimg_dump, "", ""),
  174. U_BOOT_CMD_MKENT(get, 5, 1, do_abootimg_get, "", ""),
  175. };
  176. static int do_abootimg(struct cmd_tbl *cmdtp, int flag, int argc,
  177. char *const argv[])
  178. {
  179. struct cmd_tbl *cp;
  180. cp = find_cmd_tbl(argv[1], cmd_abootimg_sub,
  181. ARRAY_SIZE(cmd_abootimg_sub));
  182. /* Strip off leading 'abootimg' command argument */
  183. argc--;
  184. argv++;
  185. if (!cp || argc > cp->maxargs)
  186. return CMD_RET_USAGE;
  187. if (flag == CMD_FLAG_REPEAT && !cmd_is_repeatable(cp))
  188. return CMD_RET_SUCCESS;
  189. return cp->cmd(cmdtp, flag, argc, argv);
  190. }
  191. U_BOOT_CMD(
  192. abootimg, CONFIG_SYS_MAXARGS, 0, do_abootimg,
  193. "manipulate Android Boot Image",
  194. "addr <addr>\n"
  195. " - set the address in RAM where boot image is located\n"
  196. " ($loadaddr is used by default)\n"
  197. "abootimg dump dtb\n"
  198. " - print info for all DT blobs in DTB area\n"
  199. "abootimg get ver [varname]\n"
  200. " - get header version\n"
  201. "abootimg get recovery_dtbo [addr_var [size_var]]\n"
  202. " - get address and size (hex) of recovery DTBO area in the image\n"
  203. " [addr_var]: variable name to contain DTBO area address\n"
  204. " [size_var]: variable name to contain DTBO area size\n"
  205. "abootimg get dtb_load_addr [varname]\n"
  206. " - get load address (hex) of DTB, from image header\n"
  207. "abootimg get dtb --index=<num> [addr_var [size_var]]\n"
  208. " - get address and size (hex) of DT blob in the image by index\n"
  209. " <num>: index number of desired DT blob in DTB area\n"
  210. " [addr_var]: variable name to contain DT blob address\n"
  211. " [size_var]: variable name to contain DT blob size"
  212. );