Blame view
common/image-android.c
11.9 KB
9ace3fc81 image: add suppor... |
1 2 3 |
/* * Copyright (c) 2011 Sebastian Andrzej Siewior <bigeasy@linutronix.de> * |
2c840c82b MLK-18591-3 andro... |
4 5 6 |
* Copyright (C) 2015-2016 Freescale Semiconductor, Inc. * Copyright 2017 NXP * |
9ace3fc81 image: add suppor... |
7 8 9 10 11 12 |
* SPDX-License-Identifier: GPL-2.0+ */ #include <common.h> #include <image.h> #include <android_image.h> |
86f4695bd image: Fix Androi... |
13 14 |
#include <malloc.h> #include <errno.h> |
2c840c82b MLK-18591-3 andro... |
15 16 17 18 19 |
#include <asm/bootm.h> #include <asm/mach-imx/boot_mode.h> #include <asm/arch/sys_proto.h> #include <fsl_fastboot.h> #include <asm/setup.h> |
028b25c76 MA-12703 Android:... |
20 |
#include <dm.h> |
9ace3fc81 image: add suppor... |
21 |
|
87f02d5ae image: android: h... |
22 |
#define ANDROID_IMAGE_DEFAULT_KERNEL_ADDR 0x10008000 |
9ace3fc81 image: add suppor... |
23 |
static char andr_tmp_str[ANDR_BOOT_ARGS_SIZE + 1]; |
87f02d5ae image: android: h... |
24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 |
static ulong android_image_get_kernel_addr(const struct andr_img_hdr *hdr) { /* * All the Android tools that generate a boot.img use this * address as the default. * * Even though it doesn't really make a lot of sense, and it * might be valid on some platforms, we treat that adress as * the default value for this field, and try to execute the * kernel in place in such a case. * * Otherwise, we will return the actual value set by the user. */ if (hdr->kernel_addr == ANDROID_IMAGE_DEFAULT_KERNEL_ADDR) return (ulong)hdr + hdr->page_size; return hdr->kernel_addr; } |
86f4695bd image: Fix Androi... |
42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 |
/** * android_image_get_kernel() - processes kernel part of Android boot images * @hdr: Pointer to image header, which is at the start * of the image. * @verify: Checksum verification flag. Currently unimplemented. * @os_data: Pointer to a ulong variable, will hold os data start * address. * @os_len: Pointer to a ulong variable, will hold os data length. * * This function returns the os image's start address and length. Also, * it appends the kernel command line to the bootargs env variable. * * Return: Zero, os start address and length on success, * otherwise on failure. */ |
9ace3fc81 image: add suppor... |
57 58 59 |
int android_image_get_kernel(const struct andr_img_hdr *hdr, int verify, ulong *os_data, ulong *os_len) { |
2c840c82b MLK-18591-3 andro... |
60 |
extern boot_metric metrics; |
87f02d5ae image: android: h... |
61 |
u32 kernel_addr = android_image_get_kernel_addr(hdr); |
9ace3fc81 image: add suppor... |
62 63 64 65 66 67 68 69 70 71 72 73 74 |
/* * Not all Android tools use the id field for signing the image with * sha1 (or anything) so we don't check it. It is not obvious that the * string is null terminated so we take care of this. */ strncpy(andr_tmp_str, hdr->name, ANDR_BOOT_NAME_SIZE); andr_tmp_str[ANDR_BOOT_NAME_SIZE] = '\0'; if (strlen(andr_tmp_str)) printf("Android's image name: %s ", andr_tmp_str); printf("Kernel load addr 0x%08x size %u KiB ", |
87f02d5ae image: android: h... |
75 |
kernel_addr, DIV_ROUND_UP(hdr->kernel_size, 1024)); |
86f4695bd image: Fix Androi... |
76 |
|
2c840c82b MLK-18591-3 andro... |
77 78 |
char newbootargs[512] = {0}; char commandline[2048] = {0}; |
028b25c76 MA-12703 Android:... |
79 |
int offset; |
2c840c82b MLK-18591-3 andro... |
80 81 82 83 84 85 86 87 88 89 |
char *bootargs = env_get("bootargs"); if (bootargs) { if (strlen(bootargs) + 1 > sizeof(commandline)) { printf("bootargs is too long! "); return -1; } else strncpy(commandline, bootargs, sizeof(commandline) - 1); |
028b25c76 MA-12703 Android:... |
90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 |
} else { offset = fdt_path_offset(gd->fdt_blob, "/chosen"); if (offset > 0) { bootargs = (char *)fdt_getprop(gd->fdt_blob, offset, "bootargs", NULL); if (bootargs) sprintf(commandline, "%s ", bootargs); } if (*hdr->cmdline) { if (strlen(hdr->cmdline) + 1 > sizeof(commandline) - strlen(commandline)) { printf("cmdline in bootimg is too long! "); return -1; } else strncat(commandline, hdr->cmdline, sizeof(commandline) - strlen(commandline)); |
2c840c82b MLK-18591-3 andro... |
108 |
} |
86f4695bd image: Fix Androi... |
109 |
} |
434e104b7 Set different boo... |
110 111 112 113 114 115 116 |
/* Add 'bootargs_ram_capacity' to hold the parameters based on different ram capacity */ char *bootargs_ram_capacity = env_get("bootargs_ram_capacity"); if (bootargs_ram_capacity) { strncat(commandline, " ", sizeof(commandline) - strlen(commandline)); strncat(commandline, bootargs_ram_capacity, sizeof(commandline) - strlen(commandline)); } |
2c840c82b MLK-18591-3 andro... |
117 118 119 |
#ifdef CONFIG_SERIAL_TAG struct tag_serialnr serialnr; get_board_serial(&serialnr); |
86f4695bd image: Fix Androi... |
120 |
|
2c840c82b MLK-18591-3 andro... |
121 122 123 124 125 |
sprintf(newbootargs, " androidboot.serialno=%08x%08x", serialnr.high, serialnr.low); strncat(commandline, newbootargs, sizeof(commandline) - strlen(commandline)); |
6e57497c1 MA-13748 Pass BDA... |
126 127 128 129 130 131 132 133 134 135 136 |
char bd_addr[16]={0}; sprintf(bd_addr, "%08x%08x", serialnr.high, serialnr.low); sprintf(newbootargs, " androidboot.btmacaddr=%c%c:%c%c:%c%c:%c%c:%c%c:%c%c", bd_addr[0],bd_addr[1],bd_addr[2],bd_addr[3],bd_addr[4],bd_addr[5], bd_addr[6],bd_addr[7],bd_addr[8],bd_addr[9],bd_addr[10],bd_addr[11]); strncat(commandline, newbootargs, sizeof(commandline) - strlen(commandline)); |
2c840c82b MLK-18591-3 andro... |
137 138 139 140 141 142 143 144 145 |
#endif /* append soc type into bootargs */ char *soc_type = env_get("soc_type"); if (soc_type) { sprintf(newbootargs, " androidboot.soc_type=%s", soc_type); strncat(commandline, newbootargs, sizeof(commandline) - strlen(commandline)); |
86f4695bd image: Fix Androi... |
146 |
} |
86f4695bd image: Fix Androi... |
147 |
|
15ecd669a env variable to s... |
148 149 |
char *storage_type = env_get("storage_type"); if (storage_type) { |
2c840c82b MLK-18591-3 andro... |
150 |
sprintf(newbootargs, |
15ecd669a env variable to s... |
151 152 |
" androidboot.storage_type=%s", storage_type); |
2c840c82b MLK-18591-3 andro... |
153 |
strncat(commandline, newbootargs, sizeof(commandline) - strlen(commandline)); |
15ecd669a env variable to s... |
154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 |
} else { int bootdev = get_boot_device(); if (bootdev == SD1_BOOT || bootdev == SD2_BOOT || bootdev == SD3_BOOT || bootdev == SD4_BOOT) { sprintf(newbootargs, " androidboot.storage_type=sd"); } else if (bootdev == MMC1_BOOT || bootdev == MMC2_BOOT || bootdev == MMC3_BOOT || bootdev == MMC4_BOOT) { sprintf(newbootargs, " androidboot.storage_type=emmc"); } else if (bootdev == NAND_BOOT) { sprintf(newbootargs, " androidboot.storage_type=nand"); } else printf("boot device type is incorrect. "); strncat(commandline, newbootargs, sizeof(commandline) - strlen(commandline)); if (bootloader_gpt_overlay()) { sprintf(newbootargs, " gpt"); strncat(commandline, newbootargs, sizeof(commandline) - strlen(commandline)); } |
9ace3fc81 image: add suppor... |
175 |
} |
86f4695bd image: Fix Androi... |
176 |
|
2c840c82b MLK-18591-3 andro... |
177 178 179 180 181 182 183 |
/* boot metric variables */ metrics.ble_1 = get_timer(0); sprintf(newbootargs, " androidboot.boottime=1BLL:%d,1BLE:%d,KL:%d,KD:%d,AVB:%d,ODT:%d,SW:%d", metrics.bll_1, metrics.ble_1, metrics.kl, metrics.kd, metrics.avb, metrics.odt, metrics.sw); strncat(commandline, newbootargs, sizeof(commandline) - strlen(commandline)); |
02b8787d0 MA-12335 Canonica... |
184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 |
#if defined(CONFIG_ARCH_MX6) || defined(CONFIG_ARCH_MX7) || \ defined(CONFIG_ARCH_MX7ULP) || defined(CONFIG_ARCH_IMX8M) char cause[18]; memset(cause, '\0', sizeof(cause)); get_reboot_reason(cause); if (strstr(cause, "POR")) sprintf(newbootargs," androidboot.bootreason=cold,powerkey"); else if (strstr(cause, "WDOG") || strstr(cause, "WDG")) sprintf(newbootargs," androidboot.bootreason=watchdog"); else sprintf(newbootargs," androidboot.bootreason=reboot"); #else sprintf(newbootargs," androidboot.bootreason=reboot"); #endif strncat(commandline, newbootargs, sizeof(commandline) - strlen(commandline)); |
2c840c82b MLK-18591-3 andro... |
200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 |
#ifdef CONFIG_AVB_SUPPORT /* secondary cmdline added by avb */ char *bootargs_sec = env_get("bootargs_sec"); if (bootargs_sec) { strncat(commandline, " ", sizeof(commandline) - strlen(commandline)); strncat(commandline, bootargs_sec, sizeof(commandline) - strlen(commandline)); } #endif #ifdef CONFIG_SYSTEM_RAMDISK_SUPPORT /* Normal boot: * cmdline to bypass ramdisk in boot.img, but use the system.img * Recovery boot: * Use the ramdisk in boot.img */ char *bootargs_3rd = env_get("bootargs_3rd"); if (bootargs_3rd) { strncat(commandline, " ", sizeof(commandline) - strlen(commandline)); strncat(commandline, bootargs_3rd, sizeof(commandline) - strlen(commandline)); } #endif |
4d7f5fd7a MA-12943 [VTS] Fi... |
220 221 222 223 224 225 226 227 |
/* VTS need this commandline to verify fdt overlay. Pass the * dtb index as "0" here since we only have one dtb in dtbo * partition and haven't enabled the dtb overlay. */ #if defined(CONFIG_ANDROID_SUPPORT) || defined(CONFIG_ANDROID_AUTO_SUPPORT) sprintf(newbootargs," androidboot.dtbo_idx=0"); strncat(commandline, newbootargs, sizeof(commandline) - strlen(commandline)); #endif |
8cd43400c MA-13276 [Auto] G... |
228 |
char *keystore = env_get("keystore"); |
eb1892df1 MA-13480-1 [Auto]... |
229 230 231 232 233 |
if ((keystore == NULL) || strncmp(keystore, "trusty", sizeof("trusty"))) { char *bootargs_trusty = "androidboot.keystore=software"; strncat(commandline, " ", sizeof(commandline) - strlen(commandline)); strncat(commandline, bootargs_trusty, sizeof(commandline) - strlen(commandline)); } else { |
8cd43400c MA-13276 [Auto] G... |
234 235 236 237 |
char *bootargs_trusty = "androidboot.keystore=trusty"; strncat(commandline, " ", sizeof(commandline) - strlen(commandline)); strncat(commandline, bootargs_trusty, sizeof(commandline) - strlen(commandline)); } |
a0759c1bd MA-12886 Set keym... |
238 |
|
24e33164c MA-14120 Add conf... |
239 |
#ifdef CONFIG_APPEND_BOOTARGS |
2c840c82b MLK-18591-3 andro... |
240 241 242 243 244 245 246 247 248 249 250 251 252 |
/* Add 'append_bootargs' to hold some paramemters which need to be appended * to bootargs */ char *append_bootargs = env_get("append_bootargs"); if (append_bootargs) { if (strlen(append_bootargs) + 2 > (sizeof(commandline) - strlen(commandline))) { printf("The 'append_bootargs' is too long to be appended to bootargs "); } else { strncat(commandline, " ", sizeof(commandline) - strlen(commandline)); strncat(commandline, append_bootargs, sizeof(commandline) - strlen(commandline)); } } |
24e33164c MA-14120 Add conf... |
253 |
#endif |
2c840c82b MLK-18591-3 andro... |
254 |
|
d71dcb917 MA-12915 [AUTO] O... |
255 256 |
debug("Kernel command line: %s ", commandline); |
2c840c82b MLK-18591-3 andro... |
257 |
env_set("bootargs", commandline); |
9ace3fc81 image: add suppor... |
258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 |
if (os_data) { *os_data = (ulong)hdr; *os_data += hdr->page_size; } if (os_len) *os_len = hdr->kernel_size; return 0; } int android_image_check_header(const struct andr_img_hdr *hdr) { return memcmp(ANDR_BOOT_MAGIC, hdr->magic, ANDR_BOOT_MAGIC_SIZE); } ulong android_image_get_end(const struct andr_img_hdr *hdr) { |
86f4695bd image: Fix Androi... |
275 |
ulong end; |
9ace3fc81 image: add suppor... |
276 277 278 279 |
/* * The header takes a full page, the remaining components are aligned * on page boundary */ |
86f4695bd image: Fix Androi... |
280 281 282 283 284 |
end = (ulong)hdr; end += hdr->page_size; end += ALIGN(hdr->kernel_size, hdr->page_size); end += ALIGN(hdr->ramdisk_size, hdr->page_size); end += ALIGN(hdr->second_size, hdr->page_size); |
9ace3fc81 image: add suppor... |
285 |
|
86f4695bd image: Fix Androi... |
286 |
return end; |
9ace3fc81 image: add suppor... |
287 288 289 290 |
} ulong android_image_get_kload(const struct andr_img_hdr *hdr) { |
87f02d5ae image: android: h... |
291 |
return android_image_get_kernel_addr(hdr); |
9ace3fc81 image: add suppor... |
292 293 294 295 296 |
} int android_image_get_ramdisk(const struct andr_img_hdr *hdr, ulong *rd_data, ulong *rd_len) { |
9950098e3 image: fix suppor... |
297 298 |
if (!hdr->ramdisk_size) { *rd_data = *rd_len = 0; |
9ace3fc81 image: add suppor... |
299 |
return -1; |
9950098e3 image: fix suppor... |
300 |
} |
86f4695bd image: Fix Androi... |
301 302 303 304 |
printf("RAM disk load addr 0x%08x size %u KiB ", hdr->ramdisk_addr, DIV_ROUND_UP(hdr->ramdisk_size, 1024)); |
9ace3fc81 image: add suppor... |
305 306 307 308 309 310 311 |
*rd_data = (unsigned long)hdr; *rd_data += hdr->page_size; *rd_data += ALIGN(hdr->kernel_size, hdr->page_size); *rd_len = hdr->ramdisk_size; return 0; } |
4f1318b29 common: image: mi... |
312 |
|
104816142 parse the second ... |
313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 |
int android_image_get_second(const struct andr_img_hdr *hdr, ulong *second_data, ulong *second_len) { if (!hdr->second_size) { *second_data = *second_len = 0; return -1; } *second_data = (unsigned long)hdr; *second_data += hdr->page_size; *second_data += ALIGN(hdr->kernel_size, hdr->page_size); *second_data += ALIGN(hdr->ramdisk_size, hdr->page_size); printf("second address is 0x%lx ",*second_data); *second_len = hdr->second_size; return 0; } |
4f1318b29 common: image: mi... |
332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 |
#if !defined(CONFIG_SPL_BUILD) /** * android_print_contents - prints out the contents of the Android format image * @hdr: pointer to the Android format image header * * android_print_contents() formats a multi line Android image contents * description. * The routine prints out Android image properties * * returns: * no returned results */ void android_print_contents(const struct andr_img_hdr *hdr) { const char * const p = IMAGE_INDENT_STRING; |
210a7176e image: Update inc... |
347 348 349 |
/* os_version = ver << 11 | lvl */ u32 os_ver = hdr->os_version >> 11; u32 os_lvl = hdr->os_version & ((1U << 11) - 1); |
4f1318b29 common: image: mi... |
350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 |
printf("%skernel size: %x ", p, hdr->kernel_size); printf("%skernel address: %x ", p, hdr->kernel_addr); printf("%sramdisk size: %x ", p, hdr->ramdisk_size); printf("%sramdisk addrress: %x ", p, hdr->ramdisk_addr); printf("%ssecond size: %x ", p, hdr->second_size); printf("%ssecond address: %x ", p, hdr->second_addr); printf("%stags address: %x ", p, hdr->tags_addr); printf("%spage size: %x ", p, hdr->page_size); |
210a7176e image: Update inc... |
367 368 369 370 371 372 373 |
/* ver = A << 14 | B << 7 | C (7 bits for each of A, B, C) * lvl = ((Y - 2000) & 127) << 4 | M (7 bits for Y, 4 bits for M) */ printf("%sos_version: %x (ver: %u.%u.%u, level: %u.%u) ", p, hdr->os_version, (os_ver >> 7) & 0x7F, (os_ver >> 14) & 0x7F, os_ver & 0x7F, (os_lvl >> 4) + 2000, os_lvl & 0x0F); |
4f1318b29 common: image: mi... |
374 375 376 377 378 379 |
printf("%sname: %s ", p, hdr->name); printf("%scmdline: %s ", p, hdr->cmdline); } #endif |
2c840c82b MLK-18591-3 andro... |
380 381 382 383 384 385 386 387 388 389 390 391 392 |
#define ARM64_IMAGE_MAGIC 0x644d5241 bool image_arm64(void *images) { struct header_image *ih; ih = (struct header_image *)images; debug("image magic: %x ", ih->magic); if (ih->magic == le32_to_cpu(ARM64_IMAGE_MAGIC)) return true; return false; } |