]> git.ipfire.org Git - people/ms/u-boot.git/blob - common/bootm.c
81e32617c30c4f0a329e9f85dfaf85d142c334f8
[people/ms/u-boot.git] / common / bootm.c
1 /*
2 * (C) Copyright 2000-2009
3 * Wolfgang Denk, DENX Software Engineering, wd@denx.de.
4 *
5 * SPDX-License-Identifier: GPL-2.0+
6 */
7
8 #ifndef USE_HOSTCC
9 #include <common.h>
10 #include <bootstage.h>
11 #include <bzlib.h>
12 #include <errno.h>
13 #include <fdt_support.h>
14 #include <lmb.h>
15 #include <malloc.h>
16 #include <asm/io.h>
17 #include <linux/lzo.h>
18 #include <lzma/LzmaTypes.h>
19 #include <lzma/LzmaDec.h>
20 #include <lzma/LzmaTools.h>
21 #if defined(CONFIG_CMD_USB)
22 #include <usb.h>
23 #endif
24 #else
25 #include "mkimage.h"
26 #endif
27
28 #include <command.h>
29 #include <bootm.h>
30 #include <image.h>
31
32 #ifndef CONFIG_SYS_BOOTM_LEN
33 /* use 8MByte as default max gunzip size */
34 #define CONFIG_SYS_BOOTM_LEN 0x800000
35 #endif
36
37 #define IH_INITRD_ARCH IH_ARCH_DEFAULT
38
39 #ifndef USE_HOSTCC
40
41 DECLARE_GLOBAL_DATA_PTR;
42
43 static const void *boot_get_kernel(cmd_tbl_t *cmdtp, int flag, int argc,
44 char * const argv[], bootm_headers_t *images,
45 ulong *os_data, ulong *os_len);
46
47 #ifdef CONFIG_LMB
48 static void boot_start_lmb(bootm_headers_t *images)
49 {
50 ulong mem_start;
51 phys_size_t mem_size;
52
53 lmb_init(&images->lmb);
54
55 mem_start = getenv_bootm_low();
56 mem_size = getenv_bootm_size();
57
58 lmb_add(&images->lmb, (phys_addr_t)mem_start, mem_size);
59
60 arch_lmb_reserve(&images->lmb);
61 board_lmb_reserve(&images->lmb);
62 }
63 #else
64 #define lmb_reserve(lmb, base, size)
65 static inline void boot_start_lmb(bootm_headers_t *images) { }
66 #endif
67
68 static int bootm_start(cmd_tbl_t *cmdtp, int flag, int argc,
69 char * const argv[])
70 {
71 memset((void *)&images, 0, sizeof(images));
72 images.verify = getenv_yesno("verify");
73
74 boot_start_lmb(&images);
75
76 bootstage_mark_name(BOOTSTAGE_ID_BOOTM_START, "bootm_start");
77 images.state = BOOTM_STATE_START;
78
79 return 0;
80 }
81
82 static int bootm_find_os(cmd_tbl_t *cmdtp, int flag, int argc,
83 char * const argv[])
84 {
85 const void *os_hdr;
86 bool ep_found = false;
87 int ret;
88
89 /* get kernel image header, start address and length */
90 os_hdr = boot_get_kernel(cmdtp, flag, argc, argv,
91 &images, &images.os.image_start, &images.os.image_len);
92 if (images.os.image_len == 0) {
93 puts("ERROR: can't get kernel image!\n");
94 return 1;
95 }
96
97 /* get image parameters */
98 switch (genimg_get_format(os_hdr)) {
99 #if defined(CONFIG_IMAGE_FORMAT_LEGACY)
100 case IMAGE_FORMAT_LEGACY:
101 images.os.type = image_get_type(os_hdr);
102 images.os.comp = image_get_comp(os_hdr);
103 images.os.os = image_get_os(os_hdr);
104
105 images.os.end = image_get_image_end(os_hdr);
106 images.os.load = image_get_load(os_hdr);
107 images.os.arch = image_get_arch(os_hdr);
108 break;
109 #endif
110 #if defined(CONFIG_FIT)
111 case IMAGE_FORMAT_FIT:
112 if (fit_image_get_type(images.fit_hdr_os,
113 images.fit_noffset_os,
114 &images.os.type)) {
115 puts("Can't get image type!\n");
116 bootstage_error(BOOTSTAGE_ID_FIT_TYPE);
117 return 1;
118 }
119
120 if (fit_image_get_comp(images.fit_hdr_os,
121 images.fit_noffset_os,
122 &images.os.comp)) {
123 puts("Can't get image compression!\n");
124 bootstage_error(BOOTSTAGE_ID_FIT_COMPRESSION);
125 return 1;
126 }
127
128 if (fit_image_get_os(images.fit_hdr_os, images.fit_noffset_os,
129 &images.os.os)) {
130 puts("Can't get image OS!\n");
131 bootstage_error(BOOTSTAGE_ID_FIT_OS);
132 return 1;
133 }
134
135 if (fit_image_get_arch(images.fit_hdr_os,
136 images.fit_noffset_os,
137 &images.os.arch)) {
138 puts("Can't get image ARCH!\n");
139 return 1;
140 }
141
142 images.os.end = fit_get_end(images.fit_hdr_os);
143
144 if (fit_image_get_load(images.fit_hdr_os, images.fit_noffset_os,
145 &images.os.load)) {
146 puts("Can't get image load address!\n");
147 bootstage_error(BOOTSTAGE_ID_FIT_LOADADDR);
148 return 1;
149 }
150 break;
151 #endif
152 #ifdef CONFIG_ANDROID_BOOT_IMAGE
153 case IMAGE_FORMAT_ANDROID:
154 images.os.type = IH_TYPE_KERNEL;
155 images.os.comp = IH_COMP_NONE;
156 images.os.os = IH_OS_LINUX;
157
158 images.os.end = android_image_get_end(os_hdr);
159 images.os.load = android_image_get_kload(os_hdr);
160 images.ep = images.os.load;
161 ep_found = true;
162 break;
163 #endif
164 default:
165 puts("ERROR: unknown image format type!\n");
166 return 1;
167 }
168
169 /* If we have a valid setup.bin, we will use that for entry (x86) */
170 if (images.os.arch == IH_ARCH_I386) {
171 ulong len;
172
173 ret = boot_get_setup(&images, IH_ARCH_I386, &images.ep, &len);
174 if (ret < 0 && ret != -ENOENT) {
175 puts("Could not find a valid setup.bin for x86\n");
176 return 1;
177 }
178 /* Kernel entry point is the setup.bin */
179 } else if (images.legacy_hdr_valid) {
180 images.ep = image_get_ep(&images.legacy_hdr_os_copy);
181 #if defined(CONFIG_FIT)
182 } else if (images.fit_uname_os) {
183 int ret;
184
185 ret = fit_image_get_entry(images.fit_hdr_os,
186 images.fit_noffset_os, &images.ep);
187 if (ret) {
188 puts("Can't get entry point property!\n");
189 return 1;
190 }
191 #endif
192 } else if (!ep_found) {
193 puts("Could not find kernel entry point!\n");
194 return 1;
195 }
196
197 if (images.os.type == IH_TYPE_KERNEL_NOLOAD) {
198 images.os.load = images.os.image_start;
199 images.ep += images.os.load;
200 }
201
202 images.os.start = (ulong)os_hdr;
203
204 return 0;
205 }
206
207 static int bootm_find_ramdisk(int flag, int argc, char * const argv[])
208 {
209 int ret;
210
211 /* find ramdisk */
212 ret = boot_get_ramdisk(argc, argv, &images, IH_INITRD_ARCH,
213 &images.rd_start, &images.rd_end);
214 if (ret) {
215 puts("Ramdisk image is corrupt or invalid\n");
216 return 1;
217 }
218
219 return 0;
220 }
221
222 #if defined(CONFIG_OF_LIBFDT)
223 static int bootm_find_fdt(int flag, int argc, char * const argv[])
224 {
225 int ret;
226
227 /* find flattened device tree */
228 ret = boot_get_fdt(flag, argc, argv, IH_ARCH_DEFAULT, &images,
229 &images.ft_addr, &images.ft_len);
230 if (ret) {
231 puts("Could not find a valid device tree\n");
232 return 1;
233 }
234
235 set_working_fdt_addr(images.ft_addr);
236
237 return 0;
238 }
239 #endif
240
241 int bootm_find_ramdisk_fdt(int flag, int argc, char * const argv[])
242 {
243 if (bootm_find_ramdisk(flag, argc, argv))
244 return 1;
245
246 #if defined(CONFIG_OF_LIBFDT)
247 if (bootm_find_fdt(flag, argc, argv))
248 return 1;
249 #endif
250
251 return 0;
252 }
253
254 static int bootm_find_other(cmd_tbl_t *cmdtp, int flag, int argc,
255 char * const argv[])
256 {
257 if (((images.os.type == IH_TYPE_KERNEL) ||
258 (images.os.type == IH_TYPE_KERNEL_NOLOAD) ||
259 (images.os.type == IH_TYPE_MULTI)) &&
260 (images.os.os == IH_OS_LINUX ||
261 images.os.os == IH_OS_VXWORKS))
262 return bootm_find_ramdisk_fdt(flag, argc, argv);
263
264 return 0;
265 }
266 #endif /* USE_HOSTCC */
267
268 /**
269 * decomp_image() - decompress the operating system
270 *
271 * @comp: Compression algorithm that is used (IH_COMP_...)
272 * @load: Destination load address in U-Boot memory
273 * @image_start Image start address (where we are decompressing from)
274 * @type: OS type (IH_OS_...)
275 * @load_bug: Place to decompress to
276 * @image_buf: Address to decompress from
277 * @return 0 if OK, -ve on error (BOOTM_ERR_...)
278 */
279 static int decomp_image(int comp, ulong load, ulong image_start, int type,
280 void *load_buf, void *image_buf, ulong image_len,
281 ulong *load_end)
282 {
283 const char *type_name = genimg_get_type_name(type);
284 __attribute__((unused)) uint unc_len = CONFIG_SYS_BOOTM_LEN;
285
286 *load_end = load;
287 switch (comp) {
288 case IH_COMP_NONE:
289 if (load == image_start) {
290 printf(" XIP %s ... ", type_name);
291 } else {
292 printf(" Loading %s ... ", type_name);
293 memmove_wd(load_buf, image_buf, image_len, CHUNKSZ);
294 }
295 *load_end = load + image_len;
296 break;
297 #ifdef CONFIG_GZIP
298 case IH_COMP_GZIP:
299 printf(" Uncompressing %s ... ", type_name);
300 if (gunzip(load_buf, unc_len, image_buf, &image_len) != 0) {
301 puts("GUNZIP: uncompress, out-of-mem or overwrite error - must RESET board to recover\n");
302 return BOOTM_ERR_RESET;
303 }
304
305 *load_end = load + image_len;
306 break;
307 #endif /* CONFIG_GZIP */
308 #ifdef CONFIG_BZIP2
309 case IH_COMP_BZIP2:
310 printf(" Uncompressing %s ... ", type_name);
311 /*
312 * If we've got less than 4 MB of malloc() space,
313 * use slower decompression algorithm which requires
314 * at most 2300 KB of memory.
315 */
316 int i = BZ2_bzBuffToBuffDecompress(load_buf, &unc_len,
317 image_buf, image_len,
318 CONFIG_SYS_MALLOC_LEN < (4096 * 1024), 0);
319 if (i != BZ_OK) {
320 printf("BUNZIP2: uncompress or overwrite error %d - must RESET board to recover\n",
321 i);
322 return BOOTM_ERR_RESET;
323 }
324
325 *load_end = load + unc_len;
326 break;
327 #endif /* CONFIG_BZIP2 */
328 #ifdef CONFIG_LZMA
329 case IH_COMP_LZMA: {
330 SizeT lzma_len = unc_len;
331 int ret;
332
333 printf(" Uncompressing %s ... ", type_name);
334
335 ret = lzmaBuffToBuffDecompress(load_buf, &lzma_len,
336 image_buf, image_len);
337 unc_len = lzma_len;
338 if (ret != SZ_OK) {
339 printf("LZMA: uncompress or overwrite error %d - must RESET board to recover\n",
340 ret);
341 bootstage_error(BOOTSTAGE_ID_DECOMP_IMAGE);
342 return BOOTM_ERR_RESET;
343 }
344 *load_end = load + unc_len;
345 break;
346 }
347 #endif /* CONFIG_LZMA */
348 #ifdef CONFIG_LZO
349 case IH_COMP_LZO: {
350 size_t size = unc_len;
351 int ret;
352
353 printf(" Uncompressing %s ... ", type_name);
354
355 ret = lzop_decompress(image_buf, image_len, load_buf, &size);
356 if (ret != LZO_E_OK) {
357 printf("LZO: uncompress or overwrite error %d - must RESET board to recover\n",
358 ret);
359 return BOOTM_ERR_RESET;
360 }
361
362 *load_end = load + size;
363 break;
364 }
365 #endif /* CONFIG_LZO */
366 default:
367 printf("Unimplemented compression type %d\n", comp);
368 return BOOTM_ERR_UNIMPLEMENTED;
369 }
370
371 puts("OK\n");
372
373 return 0;
374 }
375
376 #ifndef USE_HOSTCC
377 static int bootm_load_os(bootm_headers_t *images, unsigned long *load_end,
378 int boot_progress)
379 {
380 image_info_t os = images->os;
381 ulong load = os.load;
382 ulong blob_start = os.start;
383 ulong blob_end = os.end;
384 ulong image_start = os.image_start;
385 ulong image_len = os.image_len;
386 bool no_overlap;
387 void *load_buf, *image_buf;
388 int err;
389
390 load_buf = map_sysmem(load, 0);
391 image_buf = map_sysmem(os.image_start, image_len);
392 err = decomp_image(os.comp, load, os.image_start, os.type, load_buf,
393 image_buf, image_len, load_end);
394 if (err) {
395 bootstage_error(BOOTSTAGE_ID_DECOMP_IMAGE);
396 return err;
397 }
398 flush_cache(load, (*load_end - load) * sizeof(ulong));
399
400 debug(" kernel loaded at 0x%08lx, end = 0x%08lx\n", load, *load_end);
401 bootstage_mark(BOOTSTAGE_ID_KERNEL_LOADED);
402
403 no_overlap = (os.comp == IH_COMP_NONE && load == image_start);
404
405 if (!no_overlap && (load < blob_end) && (*load_end > blob_start)) {
406 debug("images.os.start = 0x%lX, images.os.end = 0x%lx\n",
407 blob_start, blob_end);
408 debug("images.os.load = 0x%lx, load_end = 0x%lx\n", load,
409 *load_end);
410
411 /* Check what type of image this is. */
412 if (images->legacy_hdr_valid) {
413 if (image_get_type(&images->legacy_hdr_os_copy)
414 == IH_TYPE_MULTI)
415 puts("WARNING: legacy format multi component image overwritten\n");
416 return BOOTM_ERR_OVERLAP;
417 } else {
418 puts("ERROR: new format image overwritten - must RESET the board to recover\n");
419 bootstage_error(BOOTSTAGE_ID_OVERWRITTEN);
420 return BOOTM_ERR_RESET;
421 }
422 }
423
424 return 0;
425 }
426
427 /**
428 * bootm_disable_interrupts() - Disable interrupts in preparation for load/boot
429 *
430 * @return interrupt flag (0 if interrupts were disabled, non-zero if they were
431 * enabled)
432 */
433 ulong bootm_disable_interrupts(void)
434 {
435 ulong iflag;
436
437 /*
438 * We have reached the point of no return: we are going to
439 * overwrite all exception vector code, so we cannot easily
440 * recover from any failures any more...
441 */
442 iflag = disable_interrupts();
443 #ifdef CONFIG_NETCONSOLE
444 /* Stop the ethernet stack if NetConsole could have left it up */
445 eth_halt();
446 eth_unregister(eth_get_dev());
447 #endif
448
449 #if defined(CONFIG_CMD_USB)
450 /*
451 * turn off USB to prevent the host controller from writing to the
452 * SDRAM while Linux is booting. This could happen (at least for OHCI
453 * controller), because the HCCA (Host Controller Communication Area)
454 * lies within the SDRAM and the host controller writes continously to
455 * this area (as busmaster!). The HccaFrameNumber is for example
456 * updated every 1 ms within the HCCA structure in SDRAM! For more
457 * details see the OpenHCI specification.
458 */
459 usb_stop();
460 #endif
461 return iflag;
462 }
463
464 #if defined(CONFIG_SILENT_CONSOLE) && !defined(CONFIG_SILENT_U_BOOT_ONLY)
465
466 #define CONSOLE_ARG "console="
467 #define CONSOLE_ARG_LEN (sizeof(CONSOLE_ARG) - 1)
468
469 static void fixup_silent_linux(void)
470 {
471 char *buf;
472 const char *env_val;
473 char *cmdline = getenv("bootargs");
474 int want_silent;
475
476 /*
477 * Only fix cmdline when requested. The environment variable can be:
478 *
479 * no - we never fixup
480 * yes - we always fixup
481 * unset - we rely on the console silent flag
482 */
483 want_silent = getenv_yesno("silent_linux");
484 if (want_silent == 0)
485 return;
486 else if (want_silent == -1 && !(gd->flags & GD_FLG_SILENT))
487 return;
488
489 debug("before silent fix-up: %s\n", cmdline);
490 if (cmdline && (cmdline[0] != '\0')) {
491 char *start = strstr(cmdline, CONSOLE_ARG);
492
493 /* Allocate space for maximum possible new command line */
494 buf = malloc(strlen(cmdline) + 1 + CONSOLE_ARG_LEN + 1);
495 if (!buf) {
496 debug("%s: out of memory\n", __func__);
497 return;
498 }
499
500 if (start) {
501 char *end = strchr(start, ' ');
502 int num_start_bytes = start - cmdline + CONSOLE_ARG_LEN;
503
504 strncpy(buf, cmdline, num_start_bytes);
505 if (end)
506 strcpy(buf + num_start_bytes, end);
507 else
508 buf[num_start_bytes] = '\0';
509 } else {
510 sprintf(buf, "%s %s", cmdline, CONSOLE_ARG);
511 }
512 env_val = buf;
513 } else {
514 buf = NULL;
515 env_val = CONSOLE_ARG;
516 }
517
518 setenv("bootargs", env_val);
519 debug("after silent fix-up: %s\n", env_val);
520 free(buf);
521 }
522 #endif /* CONFIG_SILENT_CONSOLE */
523
524 /**
525 * Execute selected states of the bootm command.
526 *
527 * Note the arguments to this state must be the first argument, Any 'bootm'
528 * or sub-command arguments must have already been taken.
529 *
530 * Note that if states contains more than one flag it MUST contain
531 * BOOTM_STATE_START, since this handles and consumes the command line args.
532 *
533 * Also note that aside from boot_os_fn functions and bootm_load_os no other
534 * functions we store the return value of in 'ret' may use a negative return
535 * value, without special handling.
536 *
537 * @param cmdtp Pointer to bootm command table entry
538 * @param flag Command flags (CMD_FLAG_...)
539 * @param argc Number of subcommand arguments (0 = no arguments)
540 * @param argv Arguments
541 * @param states Mask containing states to run (BOOTM_STATE_...)
542 * @param images Image header information
543 * @param boot_progress 1 to show boot progress, 0 to not do this
544 * @return 0 if ok, something else on error. Some errors will cause this
545 * function to perform a reboot! If states contains BOOTM_STATE_OS_GO
546 * then the intent is to boot an OS, so this function will not return
547 * unless the image type is standalone.
548 */
549 int do_bootm_states(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[],
550 int states, bootm_headers_t *images, int boot_progress)
551 {
552 boot_os_fn *boot_fn;
553 ulong iflag = 0;
554 int ret = 0, need_boot_fn;
555
556 images->state |= states;
557
558 /*
559 * Work through the states and see how far we get. We stop on
560 * any error.
561 */
562 if (states & BOOTM_STATE_START)
563 ret = bootm_start(cmdtp, flag, argc, argv);
564
565 if (!ret && (states & BOOTM_STATE_FINDOS))
566 ret = bootm_find_os(cmdtp, flag, argc, argv);
567
568 if (!ret && (states & BOOTM_STATE_FINDOTHER)) {
569 ret = bootm_find_other(cmdtp, flag, argc, argv);
570 argc = 0; /* consume the args */
571 }
572
573 /* Load the OS */
574 if (!ret && (states & BOOTM_STATE_LOADOS)) {
575 ulong load_end;
576
577 iflag = bootm_disable_interrupts();
578 ret = bootm_load_os(images, &load_end, 0);
579 if (ret == 0)
580 lmb_reserve(&images->lmb, images->os.load,
581 (load_end - images->os.load));
582 else if (ret && ret != BOOTM_ERR_OVERLAP)
583 goto err;
584 else if (ret == BOOTM_ERR_OVERLAP)
585 ret = 0;
586 #if defined(CONFIG_SILENT_CONSOLE) && !defined(CONFIG_SILENT_U_BOOT_ONLY)
587 if (images->os.os == IH_OS_LINUX)
588 fixup_silent_linux();
589 #endif
590 }
591
592 /* Relocate the ramdisk */
593 #ifdef CONFIG_SYS_BOOT_RAMDISK_HIGH
594 if (!ret && (states & BOOTM_STATE_RAMDISK)) {
595 ulong rd_len = images->rd_end - images->rd_start;
596
597 ret = boot_ramdisk_high(&images->lmb, images->rd_start,
598 rd_len, &images->initrd_start, &images->initrd_end);
599 if (!ret) {
600 setenv_hex("initrd_start", images->initrd_start);
601 setenv_hex("initrd_end", images->initrd_end);
602 }
603 }
604 #endif
605 #if defined(CONFIG_OF_LIBFDT) && defined(CONFIG_LMB)
606 if (!ret && (states & BOOTM_STATE_FDT)) {
607 boot_fdt_add_mem_rsv_regions(&images->lmb, images->ft_addr);
608 ret = boot_relocate_fdt(&images->lmb, &images->ft_addr,
609 &images->ft_len);
610 }
611 #endif
612
613 /* From now on, we need the OS boot function */
614 if (ret)
615 return ret;
616 boot_fn = bootm_os_get_boot_func(images->os.os);
617 need_boot_fn = states & (BOOTM_STATE_OS_CMDLINE |
618 BOOTM_STATE_OS_BD_T | BOOTM_STATE_OS_PREP |
619 BOOTM_STATE_OS_FAKE_GO | BOOTM_STATE_OS_GO);
620 if (boot_fn == NULL && need_boot_fn) {
621 if (iflag)
622 enable_interrupts();
623 printf("ERROR: booting os '%s' (%d) is not supported\n",
624 genimg_get_os_name(images->os.os), images->os.os);
625 bootstage_error(BOOTSTAGE_ID_CHECK_BOOT_OS);
626 return 1;
627 }
628
629 /* Call various other states that are not generally used */
630 if (!ret && (states & BOOTM_STATE_OS_CMDLINE))
631 ret = boot_fn(BOOTM_STATE_OS_CMDLINE, argc, argv, images);
632 if (!ret && (states & BOOTM_STATE_OS_BD_T))
633 ret = boot_fn(BOOTM_STATE_OS_BD_T, argc, argv, images);
634 if (!ret && (states & BOOTM_STATE_OS_PREP))
635 ret = boot_fn(BOOTM_STATE_OS_PREP, argc, argv, images);
636
637 #ifdef CONFIG_TRACE
638 /* Pretend to run the OS, then run a user command */
639 if (!ret && (states & BOOTM_STATE_OS_FAKE_GO)) {
640 char *cmd_list = getenv("fakegocmd");
641
642 ret = boot_selected_os(argc, argv, BOOTM_STATE_OS_FAKE_GO,
643 images, boot_fn);
644 if (!ret && cmd_list)
645 ret = run_command_list(cmd_list, -1, flag);
646 }
647 #endif
648
649 /* Check for unsupported subcommand. */
650 if (ret) {
651 puts("subcommand not supported\n");
652 return ret;
653 }
654
655 /* Now run the OS! We hope this doesn't return */
656 if (!ret && (states & BOOTM_STATE_OS_GO))
657 ret = boot_selected_os(argc, argv, BOOTM_STATE_OS_GO,
658 images, boot_fn);
659
660 /* Deal with any fallout */
661 err:
662 if (iflag)
663 enable_interrupts();
664
665 if (ret == BOOTM_ERR_UNIMPLEMENTED)
666 bootstage_error(BOOTSTAGE_ID_DECOMP_UNIMPL);
667 else if (ret == BOOTM_ERR_RESET)
668 do_reset(cmdtp, flag, argc, argv);
669
670 return ret;
671 }
672
673 #if defined(CONFIG_IMAGE_FORMAT_LEGACY)
674 /**
675 * image_get_kernel - verify legacy format kernel image
676 * @img_addr: in RAM address of the legacy format image to be verified
677 * @verify: data CRC verification flag
678 *
679 * image_get_kernel() verifies legacy image integrity and returns pointer to
680 * legacy image header if image verification was completed successfully.
681 *
682 * returns:
683 * pointer to a legacy image header if valid image was found
684 * otherwise return NULL
685 */
686 static image_header_t *image_get_kernel(ulong img_addr, int verify)
687 {
688 image_header_t *hdr = (image_header_t *)img_addr;
689
690 if (!image_check_magic(hdr)) {
691 puts("Bad Magic Number\n");
692 bootstage_error(BOOTSTAGE_ID_CHECK_MAGIC);
693 return NULL;
694 }
695 bootstage_mark(BOOTSTAGE_ID_CHECK_HEADER);
696
697 if (!image_check_hcrc(hdr)) {
698 puts("Bad Header Checksum\n");
699 bootstage_error(BOOTSTAGE_ID_CHECK_HEADER);
700 return NULL;
701 }
702
703 bootstage_mark(BOOTSTAGE_ID_CHECK_CHECKSUM);
704 image_print_contents(hdr);
705
706 if (verify) {
707 puts(" Verifying Checksum ... ");
708 if (!image_check_dcrc(hdr)) {
709 printf("Bad Data CRC\n");
710 bootstage_error(BOOTSTAGE_ID_CHECK_CHECKSUM);
711 return NULL;
712 }
713 puts("OK\n");
714 }
715 bootstage_mark(BOOTSTAGE_ID_CHECK_ARCH);
716
717 if (!image_check_target_arch(hdr)) {
718 printf("Unsupported Architecture 0x%x\n", image_get_arch(hdr));
719 bootstage_error(BOOTSTAGE_ID_CHECK_ARCH);
720 return NULL;
721 }
722 return hdr;
723 }
724 #endif
725
726 /**
727 * boot_get_kernel - find kernel image
728 * @os_data: pointer to a ulong variable, will hold os data start address
729 * @os_len: pointer to a ulong variable, will hold os data length
730 *
731 * boot_get_kernel() tries to find a kernel image, verifies its integrity
732 * and locates kernel data.
733 *
734 * returns:
735 * pointer to image header if valid image was found, plus kernel start
736 * address and length, otherwise NULL
737 */
738 static const void *boot_get_kernel(cmd_tbl_t *cmdtp, int flag, int argc,
739 char * const argv[], bootm_headers_t *images,
740 ulong *os_data, ulong *os_len)
741 {
742 #if defined(CONFIG_IMAGE_FORMAT_LEGACY)
743 image_header_t *hdr;
744 #endif
745 ulong img_addr;
746 const void *buf;
747 const char *fit_uname_config = NULL;
748 const char *fit_uname_kernel = NULL;
749 #if defined(CONFIG_FIT)
750 int os_noffset;
751 #endif
752
753 img_addr = genimg_get_kernel_addr_fit(argc < 1 ? NULL : argv[0],
754 &fit_uname_config,
755 &fit_uname_kernel);
756
757 bootstage_mark(BOOTSTAGE_ID_CHECK_MAGIC);
758
759 /* copy from dataflash if needed */
760 img_addr = genimg_get_image(img_addr);
761
762 /* check image type, for FIT images get FIT kernel node */
763 *os_data = *os_len = 0;
764 buf = map_sysmem(img_addr, 0);
765 switch (genimg_get_format(buf)) {
766 #if defined(CONFIG_IMAGE_FORMAT_LEGACY)
767 case IMAGE_FORMAT_LEGACY:
768 printf("## Booting kernel from Legacy Image at %08lx ...\n",
769 img_addr);
770 hdr = image_get_kernel(img_addr, images->verify);
771 if (!hdr)
772 return NULL;
773 bootstage_mark(BOOTSTAGE_ID_CHECK_IMAGETYPE);
774
775 /* get os_data and os_len */
776 switch (image_get_type(hdr)) {
777 case IH_TYPE_KERNEL:
778 case IH_TYPE_KERNEL_NOLOAD:
779 *os_data = image_get_data(hdr);
780 *os_len = image_get_data_size(hdr);
781 break;
782 case IH_TYPE_MULTI:
783 image_multi_getimg(hdr, 0, os_data, os_len);
784 break;
785 case IH_TYPE_STANDALONE:
786 *os_data = image_get_data(hdr);
787 *os_len = image_get_data_size(hdr);
788 break;
789 default:
790 printf("Wrong Image Type for %s command\n",
791 cmdtp->name);
792 bootstage_error(BOOTSTAGE_ID_CHECK_IMAGETYPE);
793 return NULL;
794 }
795
796 /*
797 * copy image header to allow for image overwrites during
798 * kernel decompression.
799 */
800 memmove(&images->legacy_hdr_os_copy, hdr,
801 sizeof(image_header_t));
802
803 /* save pointer to image header */
804 images->legacy_hdr_os = hdr;
805
806 images->legacy_hdr_valid = 1;
807 bootstage_mark(BOOTSTAGE_ID_DECOMP_IMAGE);
808 break;
809 #endif
810 #if defined(CONFIG_FIT)
811 case IMAGE_FORMAT_FIT:
812 os_noffset = fit_image_load(images, img_addr,
813 &fit_uname_kernel, &fit_uname_config,
814 IH_ARCH_DEFAULT, IH_TYPE_KERNEL,
815 BOOTSTAGE_ID_FIT_KERNEL_START,
816 FIT_LOAD_IGNORED, os_data, os_len);
817 if (os_noffset < 0)
818 return NULL;
819
820 images->fit_hdr_os = map_sysmem(img_addr, 0);
821 images->fit_uname_os = fit_uname_kernel;
822 images->fit_uname_cfg = fit_uname_config;
823 images->fit_noffset_os = os_noffset;
824 break;
825 #endif
826 #ifdef CONFIG_ANDROID_BOOT_IMAGE
827 case IMAGE_FORMAT_ANDROID:
828 printf("## Booting Android Image at 0x%08lx ...\n", img_addr);
829 if (android_image_get_kernel(buf, images->verify,
830 os_data, os_len))
831 return NULL;
832 break;
833 #endif
834 default:
835 printf("Wrong Image Format for %s command\n", cmdtp->name);
836 bootstage_error(BOOTSTAGE_ID_FIT_KERNEL_INFO);
837 return NULL;
838 }
839
840 debug(" kernel data at 0x%08lx, len = 0x%08lx (%ld)\n",
841 *os_data, *os_len, *os_len);
842
843 return buf;
844 }
845 #else /* USE_HOSTCC */
846
847 void memmove_wd(void *to, void *from, size_t len, ulong chunksz)
848 {
849 memmove(to, from, len);
850 }
851
852 static int bootm_host_load_image(const void *fit, int req_image_type)
853 {
854 const char *fit_uname_config = NULL;
855 ulong data, len;
856 bootm_headers_t images;
857 int noffset;
858 ulong load_end;
859 uint8_t image_type;
860 uint8_t imape_comp;
861 void *load_buf;
862 int ret;
863
864 memset(&images, '\0', sizeof(images));
865 images.verify = 1;
866 noffset = fit_image_load(&images, (ulong)fit,
867 NULL, &fit_uname_config,
868 IH_ARCH_DEFAULT, req_image_type, -1,
869 FIT_LOAD_IGNORED, &data, &len);
870 if (noffset < 0)
871 return noffset;
872 if (fit_image_get_type(fit, noffset, &image_type)) {
873 puts("Can't get image type!\n");
874 return -EINVAL;
875 }
876
877 if (fit_image_get_comp(fit, noffset, &imape_comp)) {
878 puts("Can't get image compression!\n");
879 return -EINVAL;
880 }
881
882 /* Allow the image to expand by a factor of 4, should be safe */
883 load_buf = malloc((1 << 20) + len * 4);
884 ret = decomp_image(imape_comp, 0, data, image_type, load_buf,
885 (void *)data, len, &load_end);
886 free(load_buf);
887 if (ret && ret != BOOTM_ERR_UNIMPLEMENTED)
888 return ret;
889
890 return 0;
891 }
892
893 int bootm_host_load_images(const void *fit, int cfg_noffset)
894 {
895 static uint8_t image_types[] = {
896 IH_TYPE_KERNEL,
897 IH_TYPE_FLATDT,
898 IH_TYPE_RAMDISK,
899 };
900 int err = 0;
901 int i;
902
903 for (i = 0; i < ARRAY_SIZE(image_types); i++) {
904 int ret;
905
906 ret = bootm_host_load_image(fit, image_types[i]);
907 if (!err && ret && ret != -ENOENT)
908 err = ret;
909 }
910
911 /* Return the first error we found */
912 return err;
913 }
914
915 #endif /* ndef USE_HOSTCC */