blob: 6b3ea8c61b69c180e146cf5607a7780e2726f996 [file] [log] [blame]
Simon Glassb6396402014-06-12 07:24:46 -06001/*
2 * (C) Copyright 2000-2009
3 * Wolfgang Denk, DENX Software Engineering, wd@denx.de.
4 *
5 * SPDX-License-Identifier: GPL-2.0+
6 */
7
Simon Glassea51a622014-06-12 07:24:51 -06008#ifndef USE_HOSTCC
Simon Glassb6396402014-06-12 07:24:46 -06009#include <common.h>
Simon Glassea51a622014-06-12 07:24:51 -060010#include <bootstage.h>
Simon Glassb6396402014-06-12 07:24:46 -060011#include <bzlib.h>
Simon Glass90268b82014-10-19 21:11:24 -060012#include <errno.h>
Simon Glassb6396402014-06-12 07:24:46 -060013#include <fdt_support.h>
14#include <lmb.h>
15#include <malloc.h>
16#include <asm/io.h>
17#include <linux/lzo.h>
18#include <lzma/LzmaTypes.h>
19#include <lzma/LzmaDec.h>
20#include <lzma/LzmaTools.h>
Simon Glassb6396402014-06-12 07:24:46 -060021#if defined(CONFIG_CMD_USB)
22#include <usb.h>
23#endif
Simon Glassea51a622014-06-12 07:24:51 -060024#else
25#include "mkimage.h"
26#endif
Simon Glassb6396402014-06-12 07:24:46 -060027
Simon Glassea51a622014-06-12 07:24:51 -060028#include <command.h>
29#include <bootm.h>
30#include <image.h>
Simon Glassb6396402014-06-12 07:24:46 -060031
32#ifndef CONFIG_SYS_BOOTM_LEN
33/* use 8MByte as default max gunzip size */
34#define CONFIG_SYS_BOOTM_LEN 0x800000
35#endif
36
37#define IH_INITRD_ARCH IH_ARCH_DEFAULT
38
Simon Glassea51a622014-06-12 07:24:51 -060039#ifndef USE_HOSTCC
40
41DECLARE_GLOBAL_DATA_PTR;
42
Simon Glassb6396402014-06-12 07:24:46 -060043static const void *boot_get_kernel(cmd_tbl_t *cmdtp, int flag, int argc,
44 char * const argv[], bootm_headers_t *images,
45 ulong *os_data, ulong *os_len);
46
47#ifdef CONFIG_LMB
48static void boot_start_lmb(bootm_headers_t *images)
49{
50 ulong mem_start;
51 phys_size_t mem_size;
52
53 lmb_init(&images->lmb);
54
55 mem_start = getenv_bootm_low();
56 mem_size = getenv_bootm_size();
57
58 lmb_add(&images->lmb, (phys_addr_t)mem_start, mem_size);
59
60 arch_lmb_reserve(&images->lmb);
61 board_lmb_reserve(&images->lmb);
62}
63#else
64#define lmb_reserve(lmb, base, size)
65static inline void boot_start_lmb(bootm_headers_t *images) { }
66#endif
67
68static int bootm_start(cmd_tbl_t *cmdtp, int flag, int argc,
69 char * const argv[])
70{
71 memset((void *)&images, 0, sizeof(images));
72 images.verify = getenv_yesno("verify");
73
74 boot_start_lmb(&images);
75
76 bootstage_mark_name(BOOTSTAGE_ID_BOOTM_START, "bootm_start");
77 images.state = BOOTM_STATE_START;
78
79 return 0;
80}
81
82static int bootm_find_os(cmd_tbl_t *cmdtp, int flag, int argc,
83 char * const argv[])
84{
85 const void *os_hdr;
86 bool ep_found = false;
Simon Glass90268b82014-10-19 21:11:24 -060087 int ret;
Simon Glassb6396402014-06-12 07:24:46 -060088
89 /* get kernel image header, start address and length */
90 os_hdr = boot_get_kernel(cmdtp, flag, argc, argv,
91 &images, &images.os.image_start, &images.os.image_len);
92 if (images.os.image_len == 0) {
93 puts("ERROR: can't get kernel image!\n");
94 return 1;
95 }
96
97 /* get image parameters */
98 switch (genimg_get_format(os_hdr)) {
99#if defined(CONFIG_IMAGE_FORMAT_LEGACY)
100 case IMAGE_FORMAT_LEGACY:
101 images.os.type = image_get_type(os_hdr);
102 images.os.comp = image_get_comp(os_hdr);
103 images.os.os = image_get_os(os_hdr);
104
105 images.os.end = image_get_image_end(os_hdr);
106 images.os.load = image_get_load(os_hdr);
Simon Glass90268b82014-10-19 21:11:24 -0600107 images.os.arch = image_get_arch(os_hdr);
Simon Glassb6396402014-06-12 07:24:46 -0600108 break;
109#endif
110#if defined(CONFIG_FIT)
111 case IMAGE_FORMAT_FIT:
112 if (fit_image_get_type(images.fit_hdr_os,
113 images.fit_noffset_os,
114 &images.os.type)) {
115 puts("Can't get image type!\n");
116 bootstage_error(BOOTSTAGE_ID_FIT_TYPE);
117 return 1;
118 }
119
120 if (fit_image_get_comp(images.fit_hdr_os,
121 images.fit_noffset_os,
122 &images.os.comp)) {
123 puts("Can't get image compression!\n");
124 bootstage_error(BOOTSTAGE_ID_FIT_COMPRESSION);
125 return 1;
126 }
127
128 if (fit_image_get_os(images.fit_hdr_os, images.fit_noffset_os,
129 &images.os.os)) {
130 puts("Can't get image OS!\n");
131 bootstage_error(BOOTSTAGE_ID_FIT_OS);
132 return 1;
133 }
134
Simon Glass90268b82014-10-19 21:11:24 -0600135 if (fit_image_get_arch(images.fit_hdr_os,
136 images.fit_noffset_os,
137 &images.os.arch)) {
138 puts("Can't get image ARCH!\n");
139 return 1;
140 }
141
Simon Glassb6396402014-06-12 07:24:46 -0600142 images.os.end = fit_get_end(images.fit_hdr_os);
143
144 if (fit_image_get_load(images.fit_hdr_os, images.fit_noffset_os,
145 &images.os.load)) {
146 puts("Can't get image load address!\n");
147 bootstage_error(BOOTSTAGE_ID_FIT_LOADADDR);
148 return 1;
149 }
150 break;
151#endif
152#ifdef CONFIG_ANDROID_BOOT_IMAGE
153 case IMAGE_FORMAT_ANDROID:
154 images.os.type = IH_TYPE_KERNEL;
155 images.os.comp = IH_COMP_NONE;
156 images.os.os = IH_OS_LINUX;
Simon Glassb6396402014-06-12 07:24:46 -0600157
158 images.os.end = android_image_get_end(os_hdr);
159 images.os.load = android_image_get_kload(os_hdr);
Ahmad Draidi86f46952014-10-23 20:50:07 +0300160 images.ep = images.os.load;
161 ep_found = true;
Simon Glassb6396402014-06-12 07:24:46 -0600162 break;
163#endif
164 default:
165 puts("ERROR: unknown image format type!\n");
166 return 1;
167 }
168
Simon Glass90268b82014-10-19 21:11:24 -0600169 /* If we have a valid setup.bin, we will use that for entry (x86) */
Simon Glass5bda35c2014-10-10 08:21:57 -0600170 if (images.os.arch == IH_ARCH_I386 ||
171 images.os.arch == IH_ARCH_X86_64) {
Simon Glass90268b82014-10-19 21:11:24 -0600172 ulong len;
173
174 ret = boot_get_setup(&images, IH_ARCH_I386, &images.ep, &len);
175 if (ret < 0 && ret != -ENOENT) {
176 puts("Could not find a valid setup.bin for x86\n");
177 return 1;
178 }
179 /* Kernel entry point is the setup.bin */
180 } else if (images.legacy_hdr_valid) {
Simon Glassb6396402014-06-12 07:24:46 -0600181 images.ep = image_get_ep(&images.legacy_hdr_os_copy);
182#if defined(CONFIG_FIT)
183 } else if (images.fit_uname_os) {
184 int ret;
185
186 ret = fit_image_get_entry(images.fit_hdr_os,
187 images.fit_noffset_os, &images.ep);
188 if (ret) {
189 puts("Can't get entry point property!\n");
190 return 1;
191 }
192#endif
193 } else if (!ep_found) {
194 puts("Could not find kernel entry point!\n");
195 return 1;
196 }
197
198 if (images.os.type == IH_TYPE_KERNEL_NOLOAD) {
199 images.os.load = images.os.image_start;
200 images.ep += images.os.load;
201 }
202
203 images.os.start = (ulong)os_hdr;
204
205 return 0;
206}
207
208static int bootm_find_ramdisk(int flag, int argc, char * const argv[])
209{
210 int ret;
211
212 /* find ramdisk */
213 ret = boot_get_ramdisk(argc, argv, &images, IH_INITRD_ARCH,
214 &images.rd_start, &images.rd_end);
215 if (ret) {
216 puts("Ramdisk image is corrupt or invalid\n");
217 return 1;
218 }
219
220 return 0;
221}
222
223#if defined(CONFIG_OF_LIBFDT)
224static int bootm_find_fdt(int flag, int argc, char * const argv[])
225{
226 int ret;
227
228 /* find flattened device tree */
229 ret = boot_get_fdt(flag, argc, argv, IH_ARCH_DEFAULT, &images,
230 &images.ft_addr, &images.ft_len);
231 if (ret) {
232 puts("Could not find a valid device tree\n");
233 return 1;
234 }
235
236 set_working_fdt_addr(images.ft_addr);
237
238 return 0;
239}
240#endif
241
242int bootm_find_ramdisk_fdt(int flag, int argc, char * const argv[])
243{
244 if (bootm_find_ramdisk(flag, argc, argv))
245 return 1;
246
247#if defined(CONFIG_OF_LIBFDT)
248 if (bootm_find_fdt(flag, argc, argv))
249 return 1;
250#endif
251
252 return 0;
253}
254
255static int bootm_find_other(cmd_tbl_t *cmdtp, int flag, int argc,
256 char * const argv[])
257{
258 if (((images.os.type == IH_TYPE_KERNEL) ||
259 (images.os.type == IH_TYPE_KERNEL_NOLOAD) ||
260 (images.os.type == IH_TYPE_MULTI)) &&
261 (images.os.os == IH_OS_LINUX ||
262 images.os.os == IH_OS_VXWORKS))
263 return bootm_find_ramdisk_fdt(flag, argc, argv);
264
265 return 0;
266}
Simon Glassce1400f2014-06-12 07:24:53 -0600267#endif /* USE_HOSTCC */
Simon Glassb6396402014-06-12 07:24:46 -0600268
Simon Glass2b164f12014-06-12 07:24:52 -0600269/**
270 * decomp_image() - decompress the operating system
271 *
272 * @comp: Compression algorithm that is used (IH_COMP_...)
273 * @load: Destination load address in U-Boot memory
274 * @image_start Image start address (where we are decompressing from)
275 * @type: OS type (IH_OS_...)
276 * @load_bug: Place to decompress to
277 * @image_buf: Address to decompress from
278 * @return 0 if OK, -ve on error (BOOTM_ERR_...)
279 */
280static int decomp_image(int comp, ulong load, ulong image_start, int type,
281 void *load_buf, void *image_buf, ulong image_len,
282 ulong *load_end)
Simon Glassb6396402014-06-12 07:24:46 -0600283{
Simon Glass2b164f12014-06-12 07:24:52 -0600284 const char *type_name = genimg_get_type_name(type);
285 __attribute__((unused)) uint unc_len = CONFIG_SYS_BOOTM_LEN;
Simon Glassb6396402014-06-12 07:24:46 -0600286
Simon Glass2b164f12014-06-12 07:24:52 -0600287 *load_end = load;
Simon Glassb6396402014-06-12 07:24:46 -0600288 switch (comp) {
289 case IH_COMP_NONE:
290 if (load == image_start) {
291 printf(" XIP %s ... ", type_name);
Simon Glassb6396402014-06-12 07:24:46 -0600292 } else {
293 printf(" Loading %s ... ", type_name);
294 memmove_wd(load_buf, image_buf, image_len, CHUNKSZ);
295 }
296 *load_end = load + image_len;
297 break;
298#ifdef CONFIG_GZIP
299 case IH_COMP_GZIP:
300 printf(" Uncompressing %s ... ", type_name);
301 if (gunzip(load_buf, unc_len, image_buf, &image_len) != 0) {
302 puts("GUNZIP: uncompress, out-of-mem or overwrite error - must RESET board to recover\n");
Simon Glassb6396402014-06-12 07:24:46 -0600303 return BOOTM_ERR_RESET;
304 }
305
306 *load_end = load + image_len;
307 break;
308#endif /* CONFIG_GZIP */
309#ifdef CONFIG_BZIP2
310 case IH_COMP_BZIP2:
311 printf(" Uncompressing %s ... ", type_name);
312 /*
313 * If we've got less than 4 MB of malloc() space,
314 * use slower decompression algorithm which requires
315 * at most 2300 KB of memory.
316 */
317 int i = BZ2_bzBuffToBuffDecompress(load_buf, &unc_len,
318 image_buf, image_len,
319 CONFIG_SYS_MALLOC_LEN < (4096 * 1024), 0);
320 if (i != BZ_OK) {
321 printf("BUNZIP2: uncompress or overwrite error %d - must RESET board to recover\n",
322 i);
Simon Glassb6396402014-06-12 07:24:46 -0600323 return BOOTM_ERR_RESET;
324 }
325
326 *load_end = load + unc_len;
327 break;
328#endif /* CONFIG_BZIP2 */
329#ifdef CONFIG_LZMA
330 case IH_COMP_LZMA: {
331 SizeT lzma_len = unc_len;
Simon Glass2b164f12014-06-12 07:24:52 -0600332 int ret;
333
Simon Glassb6396402014-06-12 07:24:46 -0600334 printf(" Uncompressing %s ... ", type_name);
335
336 ret = lzmaBuffToBuffDecompress(load_buf, &lzma_len,
337 image_buf, image_len);
338 unc_len = lzma_len;
339 if (ret != SZ_OK) {
340 printf("LZMA: uncompress or overwrite error %d - must RESET board to recover\n",
341 ret);
342 bootstage_error(BOOTSTAGE_ID_DECOMP_IMAGE);
343 return BOOTM_ERR_RESET;
344 }
345 *load_end = load + unc_len;
346 break;
347 }
348#endif /* CONFIG_LZMA */
349#ifdef CONFIG_LZO
350 case IH_COMP_LZO: {
351 size_t size = unc_len;
Simon Glass2b164f12014-06-12 07:24:52 -0600352 int ret;
Simon Glassb6396402014-06-12 07:24:46 -0600353
354 printf(" Uncompressing %s ... ", type_name);
355
356 ret = lzop_decompress(image_buf, image_len, load_buf, &size);
357 if (ret != LZO_E_OK) {
358 printf("LZO: uncompress or overwrite error %d - must RESET board to recover\n",
359 ret);
Simon Glassb6396402014-06-12 07:24:46 -0600360 return BOOTM_ERR_RESET;
361 }
362
363 *load_end = load + size;
364 break;
365 }
366#endif /* CONFIG_LZO */
367 default:
368 printf("Unimplemented compression type %d\n", comp);
369 return BOOTM_ERR_UNIMPLEMENTED;
370 }
371
Simon Glass2b164f12014-06-12 07:24:52 -0600372 puts("OK\n");
373
374 return 0;
375}
376
Simon Glassce1400f2014-06-12 07:24:53 -0600377#ifndef USE_HOSTCC
Simon Glass2b164f12014-06-12 07:24:52 -0600378static int bootm_load_os(bootm_headers_t *images, unsigned long *load_end,
379 int boot_progress)
380{
381 image_info_t os = images->os;
382 ulong load = os.load;
383 ulong blob_start = os.start;
384 ulong blob_end = os.end;
385 ulong image_start = os.image_start;
386 ulong image_len = os.image_len;
387 bool no_overlap;
388 void *load_buf, *image_buf;
389 int err;
390
391 load_buf = map_sysmem(load, 0);
392 image_buf = map_sysmem(os.image_start, image_len);
393 err = decomp_image(os.comp, load, os.image_start, os.type, load_buf,
394 image_buf, image_len, load_end);
395 if (err) {
396 bootstage_error(BOOTSTAGE_ID_DECOMP_IMAGE);
397 return err;
398 }
Simon Glassb6396402014-06-12 07:24:46 -0600399 flush_cache(load, (*load_end - load) * sizeof(ulong));
400
Simon Glassb6396402014-06-12 07:24:46 -0600401 debug(" kernel loaded at 0x%08lx, end = 0x%08lx\n", load, *load_end);
402 bootstage_mark(BOOTSTAGE_ID_KERNEL_LOADED);
403
Simon Glass2b164f12014-06-12 07:24:52 -0600404 no_overlap = (os.comp == IH_COMP_NONE && load == image_start);
405
Simon Glassb6396402014-06-12 07:24:46 -0600406 if (!no_overlap && (load < blob_end) && (*load_end > blob_start)) {
407 debug("images.os.start = 0x%lX, images.os.end = 0x%lx\n",
408 blob_start, blob_end);
409 debug("images.os.load = 0x%lx, load_end = 0x%lx\n", load,
410 *load_end);
411
412 /* Check what type of image this is. */
413 if (images->legacy_hdr_valid) {
414 if (image_get_type(&images->legacy_hdr_os_copy)
415 == IH_TYPE_MULTI)
416 puts("WARNING: legacy format multi component image overwritten\n");
417 return BOOTM_ERR_OVERLAP;
418 } else {
419 puts("ERROR: new format image overwritten - must RESET the board to recover\n");
420 bootstage_error(BOOTSTAGE_ID_OVERWRITTEN);
421 return BOOTM_ERR_RESET;
422 }
423 }
424
425 return 0;
426}
427
428/**
429 * bootm_disable_interrupts() - Disable interrupts in preparation for load/boot
430 *
431 * @return interrupt flag (0 if interrupts were disabled, non-zero if they were
432 * enabled)
433 */
434ulong bootm_disable_interrupts(void)
435{
436 ulong iflag;
437
438 /*
439 * We have reached the point of no return: we are going to
440 * overwrite all exception vector code, so we cannot easily
441 * recover from any failures any more...
442 */
443 iflag = disable_interrupts();
444#ifdef CONFIG_NETCONSOLE
445 /* Stop the ethernet stack if NetConsole could have left it up */
446 eth_halt();
447 eth_unregister(eth_get_dev());
448#endif
449
450#if defined(CONFIG_CMD_USB)
451 /*
452 * turn off USB to prevent the host controller from writing to the
453 * SDRAM while Linux is booting. This could happen (at least for OHCI
454 * controller), because the HCCA (Host Controller Communication Area)
455 * lies within the SDRAM and the host controller writes continously to
456 * this area (as busmaster!). The HccaFrameNumber is for example
457 * updated every 1 ms within the HCCA structure in SDRAM! For more
458 * details see the OpenHCI specification.
459 */
460 usb_stop();
461#endif
462 return iflag;
463}
464
465#if defined(CONFIG_SILENT_CONSOLE) && !defined(CONFIG_SILENT_U_BOOT_ONLY)
466
467#define CONSOLE_ARG "console="
468#define CONSOLE_ARG_LEN (sizeof(CONSOLE_ARG) - 1)
469
470static void fixup_silent_linux(void)
471{
472 char *buf;
473 const char *env_val;
474 char *cmdline = getenv("bootargs");
475 int want_silent;
476
477 /*
478 * Only fix cmdline when requested. The environment variable can be:
479 *
480 * no - we never fixup
481 * yes - we always fixup
482 * unset - we rely on the console silent flag
483 */
484 want_silent = getenv_yesno("silent_linux");
485 if (want_silent == 0)
486 return;
487 else if (want_silent == -1 && !(gd->flags & GD_FLG_SILENT))
488 return;
489
490 debug("before silent fix-up: %s\n", cmdline);
491 if (cmdline && (cmdline[0] != '\0')) {
492 char *start = strstr(cmdline, CONSOLE_ARG);
493
494 /* Allocate space for maximum possible new command line */
495 buf = malloc(strlen(cmdline) + 1 + CONSOLE_ARG_LEN + 1);
496 if (!buf) {
497 debug("%s: out of memory\n", __func__);
498 return;
499 }
500
501 if (start) {
502 char *end = strchr(start, ' ');
503 int num_start_bytes = start - cmdline + CONSOLE_ARG_LEN;
504
505 strncpy(buf, cmdline, num_start_bytes);
506 if (end)
507 strcpy(buf + num_start_bytes, end);
508 else
509 buf[num_start_bytes] = '\0';
510 } else {
511 sprintf(buf, "%s %s", cmdline, CONSOLE_ARG);
512 }
513 env_val = buf;
514 } else {
515 buf = NULL;
516 env_val = CONSOLE_ARG;
517 }
518
519 setenv("bootargs", env_val);
520 debug("after silent fix-up: %s\n", env_val);
521 free(buf);
522}
523#endif /* CONFIG_SILENT_CONSOLE */
524
525/**
526 * Execute selected states of the bootm command.
527 *
528 * Note the arguments to this state must be the first argument, Any 'bootm'
529 * or sub-command arguments must have already been taken.
530 *
531 * Note that if states contains more than one flag it MUST contain
532 * BOOTM_STATE_START, since this handles and consumes the command line args.
533 *
534 * Also note that aside from boot_os_fn functions and bootm_load_os no other
535 * functions we store the return value of in 'ret' may use a negative return
536 * value, without special handling.
537 *
538 * @param cmdtp Pointer to bootm command table entry
539 * @param flag Command flags (CMD_FLAG_...)
540 * @param argc Number of subcommand arguments (0 = no arguments)
541 * @param argv Arguments
542 * @param states Mask containing states to run (BOOTM_STATE_...)
543 * @param images Image header information
544 * @param boot_progress 1 to show boot progress, 0 to not do this
545 * @return 0 if ok, something else on error. Some errors will cause this
546 * function to perform a reboot! If states contains BOOTM_STATE_OS_GO
547 * then the intent is to boot an OS, so this function will not return
548 * unless the image type is standalone.
549 */
550int do_bootm_states(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[],
551 int states, bootm_headers_t *images, int boot_progress)
552{
553 boot_os_fn *boot_fn;
554 ulong iflag = 0;
555 int ret = 0, need_boot_fn;
556
557 images->state |= states;
558
559 /*
560 * Work through the states and see how far we get. We stop on
561 * any error.
562 */
563 if (states & BOOTM_STATE_START)
564 ret = bootm_start(cmdtp, flag, argc, argv);
565
566 if (!ret && (states & BOOTM_STATE_FINDOS))
567 ret = bootm_find_os(cmdtp, flag, argc, argv);
568
569 if (!ret && (states & BOOTM_STATE_FINDOTHER)) {
570 ret = bootm_find_other(cmdtp, flag, argc, argv);
571 argc = 0; /* consume the args */
572 }
573
574 /* Load the OS */
575 if (!ret && (states & BOOTM_STATE_LOADOS)) {
576 ulong load_end;
577
578 iflag = bootm_disable_interrupts();
579 ret = bootm_load_os(images, &load_end, 0);
580 if (ret == 0)
581 lmb_reserve(&images->lmb, images->os.load,
582 (load_end - images->os.load));
583 else if (ret && ret != BOOTM_ERR_OVERLAP)
584 goto err;
585 else if (ret == BOOTM_ERR_OVERLAP)
586 ret = 0;
587#if defined(CONFIG_SILENT_CONSOLE) && !defined(CONFIG_SILENT_U_BOOT_ONLY)
588 if (images->os.os == IH_OS_LINUX)
589 fixup_silent_linux();
590#endif
591 }
592
593 /* Relocate the ramdisk */
594#ifdef CONFIG_SYS_BOOT_RAMDISK_HIGH
595 if (!ret && (states & BOOTM_STATE_RAMDISK)) {
596 ulong rd_len = images->rd_end - images->rd_start;
597
598 ret = boot_ramdisk_high(&images->lmb, images->rd_start,
599 rd_len, &images->initrd_start, &images->initrd_end);
600 if (!ret) {
601 setenv_hex("initrd_start", images->initrd_start);
602 setenv_hex("initrd_end", images->initrd_end);
603 }
604 }
605#endif
606#if defined(CONFIG_OF_LIBFDT) && defined(CONFIG_LMB)
607 if (!ret && (states & BOOTM_STATE_FDT)) {
608 boot_fdt_add_mem_rsv_regions(&images->lmb, images->ft_addr);
609 ret = boot_relocate_fdt(&images->lmb, &images->ft_addr,
610 &images->ft_len);
611 }
612#endif
613
614 /* From now on, we need the OS boot function */
615 if (ret)
616 return ret;
617 boot_fn = bootm_os_get_boot_func(images->os.os);
618 need_boot_fn = states & (BOOTM_STATE_OS_CMDLINE |
619 BOOTM_STATE_OS_BD_T | BOOTM_STATE_OS_PREP |
620 BOOTM_STATE_OS_FAKE_GO | BOOTM_STATE_OS_GO);
621 if (boot_fn == NULL && need_boot_fn) {
622 if (iflag)
623 enable_interrupts();
624 printf("ERROR: booting os '%s' (%d) is not supported\n",
625 genimg_get_os_name(images->os.os), images->os.os);
626 bootstage_error(BOOTSTAGE_ID_CHECK_BOOT_OS);
627 return 1;
628 }
629
630 /* Call various other states that are not generally used */
631 if (!ret && (states & BOOTM_STATE_OS_CMDLINE))
632 ret = boot_fn(BOOTM_STATE_OS_CMDLINE, argc, argv, images);
633 if (!ret && (states & BOOTM_STATE_OS_BD_T))
634 ret = boot_fn(BOOTM_STATE_OS_BD_T, argc, argv, images);
635 if (!ret && (states & BOOTM_STATE_OS_PREP))
636 ret = boot_fn(BOOTM_STATE_OS_PREP, argc, argv, images);
637
638#ifdef CONFIG_TRACE
639 /* Pretend to run the OS, then run a user command */
640 if (!ret && (states & BOOTM_STATE_OS_FAKE_GO)) {
641 char *cmd_list = getenv("fakegocmd");
642
643 ret = boot_selected_os(argc, argv, BOOTM_STATE_OS_FAKE_GO,
644 images, boot_fn);
645 if (!ret && cmd_list)
646 ret = run_command_list(cmd_list, -1, flag);
647 }
648#endif
649
650 /* Check for unsupported subcommand. */
651 if (ret) {
652 puts("subcommand not supported\n");
653 return ret;
654 }
655
656 /* Now run the OS! We hope this doesn't return */
657 if (!ret && (states & BOOTM_STATE_OS_GO))
658 ret = boot_selected_os(argc, argv, BOOTM_STATE_OS_GO,
659 images, boot_fn);
660
661 /* Deal with any fallout */
662err:
663 if (iflag)
664 enable_interrupts();
665
666 if (ret == BOOTM_ERR_UNIMPLEMENTED)
667 bootstage_error(BOOTSTAGE_ID_DECOMP_UNIMPL);
668 else if (ret == BOOTM_ERR_RESET)
669 do_reset(cmdtp, flag, argc, argv);
670
671 return ret;
672}
673
674#if defined(CONFIG_IMAGE_FORMAT_LEGACY)
675/**
676 * image_get_kernel - verify legacy format kernel image
677 * @img_addr: in RAM address of the legacy format image to be verified
678 * @verify: data CRC verification flag
679 *
680 * image_get_kernel() verifies legacy image integrity and returns pointer to
681 * legacy image header if image verification was completed successfully.
682 *
683 * returns:
684 * pointer to a legacy image header if valid image was found
685 * otherwise return NULL
686 */
687static image_header_t *image_get_kernel(ulong img_addr, int verify)
688{
689 image_header_t *hdr = (image_header_t *)img_addr;
690
691 if (!image_check_magic(hdr)) {
692 puts("Bad Magic Number\n");
693 bootstage_error(BOOTSTAGE_ID_CHECK_MAGIC);
694 return NULL;
695 }
696 bootstage_mark(BOOTSTAGE_ID_CHECK_HEADER);
697
698 if (!image_check_hcrc(hdr)) {
699 puts("Bad Header Checksum\n");
700 bootstage_error(BOOTSTAGE_ID_CHECK_HEADER);
701 return NULL;
702 }
703
704 bootstage_mark(BOOTSTAGE_ID_CHECK_CHECKSUM);
705 image_print_contents(hdr);
706
707 if (verify) {
708 puts(" Verifying Checksum ... ");
709 if (!image_check_dcrc(hdr)) {
710 printf("Bad Data CRC\n");
711 bootstage_error(BOOTSTAGE_ID_CHECK_CHECKSUM);
712 return NULL;
713 }
714 puts("OK\n");
715 }
716 bootstage_mark(BOOTSTAGE_ID_CHECK_ARCH);
717
718 if (!image_check_target_arch(hdr)) {
719 printf("Unsupported Architecture 0x%x\n", image_get_arch(hdr));
720 bootstage_error(BOOTSTAGE_ID_CHECK_ARCH);
721 return NULL;
722 }
723 return hdr;
724}
725#endif
726
727/**
728 * boot_get_kernel - find kernel image
729 * @os_data: pointer to a ulong variable, will hold os data start address
730 * @os_len: pointer to a ulong variable, will hold os data length
731 *
732 * boot_get_kernel() tries to find a kernel image, verifies its integrity
733 * and locates kernel data.
734 *
735 * returns:
736 * pointer to image header if valid image was found, plus kernel start
737 * address and length, otherwise NULL
738 */
739static const void *boot_get_kernel(cmd_tbl_t *cmdtp, int flag, int argc,
740 char * const argv[], bootm_headers_t *images,
741 ulong *os_data, ulong *os_len)
742{
743#if defined(CONFIG_IMAGE_FORMAT_LEGACY)
744 image_header_t *hdr;
745#endif
746 ulong img_addr;
747 const void *buf;
Simon Glassb6396402014-06-12 07:24:46 -0600748 const char *fit_uname_config = NULL;
749 const char *fit_uname_kernel = NULL;
Bryan Wu6c454fe2014-08-15 16:51:38 -0700750#if defined(CONFIG_FIT)
Simon Glassb6396402014-06-12 07:24:46 -0600751 int os_noffset;
752#endif
753
Bryan Wue6c88a62014-08-15 16:51:39 -0700754 img_addr = genimg_get_kernel_addr_fit(argc < 1 ? NULL : argv[0],
755 &fit_uname_config,
756 &fit_uname_kernel);
Simon Glassb6396402014-06-12 07:24:46 -0600757
758 bootstage_mark(BOOTSTAGE_ID_CHECK_MAGIC);
759
760 /* copy from dataflash if needed */
761 img_addr = genimg_get_image(img_addr);
762
763 /* check image type, for FIT images get FIT kernel node */
764 *os_data = *os_len = 0;
765 buf = map_sysmem(img_addr, 0);
766 switch (genimg_get_format(buf)) {
767#if defined(CONFIG_IMAGE_FORMAT_LEGACY)
768 case IMAGE_FORMAT_LEGACY:
769 printf("## Booting kernel from Legacy Image at %08lx ...\n",
770 img_addr);
771 hdr = image_get_kernel(img_addr, images->verify);
772 if (!hdr)
773 return NULL;
774 bootstage_mark(BOOTSTAGE_ID_CHECK_IMAGETYPE);
775
776 /* get os_data and os_len */
777 switch (image_get_type(hdr)) {
778 case IH_TYPE_KERNEL:
779 case IH_TYPE_KERNEL_NOLOAD:
780 *os_data = image_get_data(hdr);
781 *os_len = image_get_data_size(hdr);
782 break;
783 case IH_TYPE_MULTI:
784 image_multi_getimg(hdr, 0, os_data, os_len);
785 break;
786 case IH_TYPE_STANDALONE:
787 *os_data = image_get_data(hdr);
788 *os_len = image_get_data_size(hdr);
789 break;
790 default:
791 printf("Wrong Image Type for %s command\n",
792 cmdtp->name);
793 bootstage_error(BOOTSTAGE_ID_CHECK_IMAGETYPE);
794 return NULL;
795 }
796
797 /*
798 * copy image header to allow for image overwrites during
799 * kernel decompression.
800 */
801 memmove(&images->legacy_hdr_os_copy, hdr,
802 sizeof(image_header_t));
803
804 /* save pointer to image header */
805 images->legacy_hdr_os = hdr;
806
807 images->legacy_hdr_valid = 1;
808 bootstage_mark(BOOTSTAGE_ID_DECOMP_IMAGE);
809 break;
810#endif
811#if defined(CONFIG_FIT)
812 case IMAGE_FORMAT_FIT:
Simon Glass126cc862014-06-12 07:24:47 -0600813 os_noffset = fit_image_load(images, img_addr,
Simon Glassb6396402014-06-12 07:24:46 -0600814 &fit_uname_kernel, &fit_uname_config,
815 IH_ARCH_DEFAULT, IH_TYPE_KERNEL,
816 BOOTSTAGE_ID_FIT_KERNEL_START,
817 FIT_LOAD_IGNORED, os_data, os_len);
818 if (os_noffset < 0)
819 return NULL;
820
821 images->fit_hdr_os = map_sysmem(img_addr, 0);
822 images->fit_uname_os = fit_uname_kernel;
823 images->fit_uname_cfg = fit_uname_config;
824 images->fit_noffset_os = os_noffset;
825 break;
826#endif
827#ifdef CONFIG_ANDROID_BOOT_IMAGE
828 case IMAGE_FORMAT_ANDROID:
829 printf("## Booting Android Image at 0x%08lx ...\n", img_addr);
Simon Glass07c0cd72014-06-12 07:24:48 -0600830 if (android_image_get_kernel(buf, images->verify,
Simon Glassb6396402014-06-12 07:24:46 -0600831 os_data, os_len))
832 return NULL;
833 break;
834#endif
835 default:
836 printf("Wrong Image Format for %s command\n", cmdtp->name);
837 bootstage_error(BOOTSTAGE_ID_FIT_KERNEL_INFO);
838 return NULL;
839 }
840
841 debug(" kernel data at 0x%08lx, len = 0x%08lx (%ld)\n",
842 *os_data, *os_len, *os_len);
843
844 return buf;
845}
Simon Glassce1400f2014-06-12 07:24:53 -0600846#else /* USE_HOSTCC */
847
848void memmove_wd(void *to, void *from, size_t len, ulong chunksz)
849{
850 memmove(to, from, len);
851}
852
853static int bootm_host_load_image(const void *fit, int req_image_type)
854{
855 const char *fit_uname_config = NULL;
856 ulong data, len;
857 bootm_headers_t images;
858 int noffset;
859 ulong load_end;
860 uint8_t image_type;
861 uint8_t imape_comp;
862 void *load_buf;
863 int ret;
864
865 memset(&images, '\0', sizeof(images));
866 images.verify = 1;
867 noffset = fit_image_load(&images, (ulong)fit,
868 NULL, &fit_uname_config,
869 IH_ARCH_DEFAULT, req_image_type, -1,
870 FIT_LOAD_IGNORED, &data, &len);
871 if (noffset < 0)
872 return noffset;
873 if (fit_image_get_type(fit, noffset, &image_type)) {
874 puts("Can't get image type!\n");
875 return -EINVAL;
876 }
877
878 if (fit_image_get_comp(fit, noffset, &imape_comp)) {
879 puts("Can't get image compression!\n");
880 return -EINVAL;
881 }
882
883 /* Allow the image to expand by a factor of 4, should be safe */
884 load_buf = malloc((1 << 20) + len * 4);
885 ret = decomp_image(imape_comp, 0, data, image_type, load_buf,
886 (void *)data, len, &load_end);
887 free(load_buf);
888 if (ret && ret != BOOTM_ERR_UNIMPLEMENTED)
889 return ret;
890
891 return 0;
892}
893
894int bootm_host_load_images(const void *fit, int cfg_noffset)
895{
896 static uint8_t image_types[] = {
897 IH_TYPE_KERNEL,
898 IH_TYPE_FLATDT,
899 IH_TYPE_RAMDISK,
900 };
901 int err = 0;
902 int i;
903
904 for (i = 0; i < ARRAY_SIZE(image_types); i++) {
905 int ret;
906
907 ret = bootm_host_load_image(fit, image_types[i]);
908 if (!err && ret && ret != -ENOENT)
909 err = ret;
910 }
911
912 /* Return the first error we found */
913 return err;
914}
Simon Glassea51a622014-06-12 07:24:51 -0600915
916#endif /* ndef USE_HOSTCC */