blob: c0d0d09411f0df2886db4fcec75a11ffae6ca23a [file] [log] [blame]
Simon Glass3b5866d2014-06-12 07:24:46 -06001/*
2 * (C) Copyright 2000-2009
3 * Wolfgang Denk, DENX Software Engineering, wd@denx.de.
4 *
5 * SPDX-License-Identifier: GPL-2.0+
6 */
7
Simon Glass0232ba72014-06-12 07:24:51 -06008#ifndef USE_HOSTCC
Simon Glass3b5866d2014-06-12 07:24:46 -06009#include <common.h>
Simon Glass0232ba72014-06-12 07:24:51 -060010#include <bootstage.h>
Simon Glass3b5866d2014-06-12 07:24:46 -060011#include <bzlib.h>
Simon Glass0129b522014-10-19 21:11:24 -060012#include <errno.h>
Simon Glass3b5866d2014-06-12 07:24:46 -060013#include <fdt_support.h>
14#include <lmb.h>
15#include <malloc.h>
Joe Hershberger65b905b2015-03-22 17:08:59 -050016#include <mapmem.h>
Simon Glass3b5866d2014-06-12 07:24:46 -060017#include <asm/io.h>
18#include <linux/lzo.h>
19#include <lzma/LzmaTypes.h>
20#include <lzma/LzmaDec.h>
21#include <lzma/LzmaTools.h>
Simon Glass3b5866d2014-06-12 07:24:46 -060022#if defined(CONFIG_CMD_USB)
23#include <usb.h>
24#endif
Simon Glass0232ba72014-06-12 07:24:51 -060025#else
26#include "mkimage.h"
27#endif
Simon Glass3b5866d2014-06-12 07:24:46 -060028
Simon Glass0232ba72014-06-12 07:24:51 -060029#include <command.h>
30#include <bootm.h>
31#include <image.h>
Simon Glass3b5866d2014-06-12 07:24:46 -060032
33#ifndef CONFIG_SYS_BOOTM_LEN
34/* use 8MByte as default max gunzip size */
35#define CONFIG_SYS_BOOTM_LEN 0x800000
36#endif
37
38#define IH_INITRD_ARCH IH_ARCH_DEFAULT
39
Simon Glass0232ba72014-06-12 07:24:51 -060040#ifndef USE_HOSTCC
41
42DECLARE_GLOBAL_DATA_PTR;
43
Simon Glass3b5866d2014-06-12 07:24:46 -060044static const void *boot_get_kernel(cmd_tbl_t *cmdtp, int flag, int argc,
45 char * const argv[], bootm_headers_t *images,
46 ulong *os_data, ulong *os_len);
47
48#ifdef CONFIG_LMB
49static void boot_start_lmb(bootm_headers_t *images)
50{
51 ulong mem_start;
52 phys_size_t mem_size;
53
54 lmb_init(&images->lmb);
55
56 mem_start = getenv_bootm_low();
57 mem_size = getenv_bootm_size();
58
59 lmb_add(&images->lmb, (phys_addr_t)mem_start, mem_size);
60
61 arch_lmb_reserve(&images->lmb);
62 board_lmb_reserve(&images->lmb);
63}
64#else
65#define lmb_reserve(lmb, base, size)
66static inline void boot_start_lmb(bootm_headers_t *images) { }
67#endif
68
69static int bootm_start(cmd_tbl_t *cmdtp, int flag, int argc,
70 char * const argv[])
71{
72 memset((void *)&images, 0, sizeof(images));
73 images.verify = getenv_yesno("verify");
74
75 boot_start_lmb(&images);
76
77 bootstage_mark_name(BOOTSTAGE_ID_BOOTM_START, "bootm_start");
78 images.state = BOOTM_STATE_START;
79
80 return 0;
81}
82
83static int bootm_find_os(cmd_tbl_t *cmdtp, int flag, int argc,
84 char * const argv[])
85{
86 const void *os_hdr;
87 bool ep_found = false;
Simon Glass0129b522014-10-19 21:11:24 -060088 int ret;
Simon Glass3b5866d2014-06-12 07:24:46 -060089
90 /* get kernel image header, start address and length */
91 os_hdr = boot_get_kernel(cmdtp, flag, argc, argv,
92 &images, &images.os.image_start, &images.os.image_len);
93 if (images.os.image_len == 0) {
94 puts("ERROR: can't get kernel image!\n");
95 return 1;
96 }
97
98 /* get image parameters */
99 switch (genimg_get_format(os_hdr)) {
100#if defined(CONFIG_IMAGE_FORMAT_LEGACY)
101 case IMAGE_FORMAT_LEGACY:
102 images.os.type = image_get_type(os_hdr);
103 images.os.comp = image_get_comp(os_hdr);
104 images.os.os = image_get_os(os_hdr);
105
106 images.os.end = image_get_image_end(os_hdr);
107 images.os.load = image_get_load(os_hdr);
Simon Glass0129b522014-10-19 21:11:24 -0600108 images.os.arch = image_get_arch(os_hdr);
Simon Glass3b5866d2014-06-12 07:24:46 -0600109 break;
110#endif
111#if defined(CONFIG_FIT)
112 case IMAGE_FORMAT_FIT:
113 if (fit_image_get_type(images.fit_hdr_os,
114 images.fit_noffset_os,
115 &images.os.type)) {
116 puts("Can't get image type!\n");
117 bootstage_error(BOOTSTAGE_ID_FIT_TYPE);
118 return 1;
119 }
120
121 if (fit_image_get_comp(images.fit_hdr_os,
122 images.fit_noffset_os,
123 &images.os.comp)) {
124 puts("Can't get image compression!\n");
125 bootstage_error(BOOTSTAGE_ID_FIT_COMPRESSION);
126 return 1;
127 }
128
129 if (fit_image_get_os(images.fit_hdr_os, images.fit_noffset_os,
130 &images.os.os)) {
131 puts("Can't get image OS!\n");
132 bootstage_error(BOOTSTAGE_ID_FIT_OS);
133 return 1;
134 }
135
Simon Glass0129b522014-10-19 21:11:24 -0600136 if (fit_image_get_arch(images.fit_hdr_os,
137 images.fit_noffset_os,
138 &images.os.arch)) {
139 puts("Can't get image ARCH!\n");
140 return 1;
141 }
142
Simon Glass3b5866d2014-06-12 07:24:46 -0600143 images.os.end = fit_get_end(images.fit_hdr_os);
144
145 if (fit_image_get_load(images.fit_hdr_os, images.fit_noffset_os,
146 &images.os.load)) {
147 puts("Can't get image load address!\n");
148 bootstage_error(BOOTSTAGE_ID_FIT_LOADADDR);
149 return 1;
150 }
151 break;
152#endif
153#ifdef CONFIG_ANDROID_BOOT_IMAGE
154 case IMAGE_FORMAT_ANDROID:
155 images.os.type = IH_TYPE_KERNEL;
156 images.os.comp = IH_COMP_NONE;
157 images.os.os = IH_OS_LINUX;
Simon Glass3b5866d2014-06-12 07:24:46 -0600158
159 images.os.end = android_image_get_end(os_hdr);
160 images.os.load = android_image_get_kload(os_hdr);
Ahmad Draidi9a1cb5d2014-10-23 20:50:07 +0300161 images.ep = images.os.load;
162 ep_found = true;
Simon Glass3b5866d2014-06-12 07:24:46 -0600163 break;
164#endif
165 default:
166 puts("ERROR: unknown image format type!\n");
167 return 1;
168 }
169
Simon Glass0129b522014-10-19 21:11:24 -0600170 /* If we have a valid setup.bin, we will use that for entry (x86) */
Simon Glass9d428302014-10-10 08:21:57 -0600171 if (images.os.arch == IH_ARCH_I386 ||
172 images.os.arch == IH_ARCH_X86_64) {
Simon Glass0129b522014-10-19 21:11:24 -0600173 ulong len;
174
175 ret = boot_get_setup(&images, IH_ARCH_I386, &images.ep, &len);
176 if (ret < 0 && ret != -ENOENT) {
177 puts("Could not find a valid setup.bin for x86\n");
178 return 1;
179 }
180 /* Kernel entry point is the setup.bin */
181 } else if (images.legacy_hdr_valid) {
Simon Glass3b5866d2014-06-12 07:24:46 -0600182 images.ep = image_get_ep(&images.legacy_hdr_os_copy);
183#if defined(CONFIG_FIT)
184 } else if (images.fit_uname_os) {
185 int ret;
186
187 ret = fit_image_get_entry(images.fit_hdr_os,
188 images.fit_noffset_os, &images.ep);
189 if (ret) {
190 puts("Can't get entry point property!\n");
191 return 1;
192 }
193#endif
194 } else if (!ep_found) {
195 puts("Could not find kernel entry point!\n");
196 return 1;
197 }
198
199 if (images.os.type == IH_TYPE_KERNEL_NOLOAD) {
200 images.os.load = images.os.image_start;
201 images.ep += images.os.load;
202 }
203
204 images.os.start = (ulong)os_hdr;
205
206 return 0;
207}
208
Karl Apsited686ce92015-05-21 09:52:49 -0400209/**
210 * bootm_find_images - wrapper to find and locate various images
211 * @flag: Ignored Argument
212 * @argc: command argument count
213 * @argv: command argument list
214 *
215 * boot_find_images() will attempt to load an available ramdisk,
216 * flattened device tree, as well as specifically marked
217 * "loadable" images (loadables are FIT only)
218 *
219 * Note: bootm_find_images will skip an image if it is not found
220 *
221 * @return:
222 * 0, if all existing images were loaded correctly
223 * 1, if an image is found but corrupted, or invalid
224 */
225int bootm_find_images(int flag, int argc, char * const argv[])
Simon Glass3b5866d2014-06-12 07:24:46 -0600226{
227 int ret;
228
229 /* find ramdisk */
230 ret = boot_get_ramdisk(argc, argv, &images, IH_INITRD_ARCH,
231 &images.rd_start, &images.rd_end);
232 if (ret) {
233 puts("Ramdisk image is corrupt or invalid\n");
234 return 1;
235 }
236
Simon Glass3b5866d2014-06-12 07:24:46 -0600237#if defined(CONFIG_OF_LIBFDT)
Simon Glass3b5866d2014-06-12 07:24:46 -0600238 /* find flattened device tree */
239 ret = boot_get_fdt(flag, argc, argv, IH_ARCH_DEFAULT, &images,
240 &images.ft_addr, &images.ft_len);
241 if (ret) {
242 puts("Could not find a valid device tree\n");
243 return 1;
244 }
Joe Hershberger3d4ea4c2015-02-04 21:56:53 -0600245 set_working_fdt_addr((ulong)images.ft_addr);
Simon Glass3b5866d2014-06-12 07:24:46 -0600246#endif
247
Karl Apsite1b21c282015-05-21 09:52:48 -0400248#if defined(CONFIG_FIT)
Karl Apsite1b21c282015-05-21 09:52:48 -0400249 /* find all of the loadables */
250 ret = boot_get_loadable(argc, argv, &images, IH_ARCH_DEFAULT,
251 NULL, NULL);
252 if (ret) {
253 printf("Loadable(s) is corrupt or invalid\n");
254 return 1;
255 }
Karl Apsite1b21c282015-05-21 09:52:48 -0400256#endif
257
Simon Glass3b5866d2014-06-12 07:24:46 -0600258 return 0;
259}
260
261static int bootm_find_other(cmd_tbl_t *cmdtp, int flag, int argc,
262 char * const argv[])
263{
264 if (((images.os.type == IH_TYPE_KERNEL) ||
265 (images.os.type == IH_TYPE_KERNEL_NOLOAD) ||
266 (images.os.type == IH_TYPE_MULTI)) &&
267 (images.os.os == IH_OS_LINUX ||
268 images.os.os == IH_OS_VXWORKS))
Karl Apsited686ce92015-05-21 09:52:49 -0400269 return bootm_find_images(flag, argc, argv);
Simon Glass3b5866d2014-06-12 07:24:46 -0600270
271 return 0;
272}
Simon Glass10ae4192014-12-02 13:17:30 -0700273#endif /* USE_HOSTC */
274
Simon Glass632570c2014-12-02 13:17:36 -0700275/**
276 * print_decomp_msg() - Print a suitable decompression/loading message
277 *
278 * @type: OS type (IH_OS_...)
279 * @comp_type: Compression type being used (IH_COMP_...)
280 * @is_xip: true if the load address matches the image start
281 */
282static void print_decomp_msg(int comp_type, int type, bool is_xip)
Simon Glass10ae4192014-12-02 13:17:30 -0700283{
Simon Glass632570c2014-12-02 13:17:36 -0700284 const char *name = genimg_get_type_name(type);
285
286 if (comp_type == IH_COMP_NONE)
287 printf(" %s %s ... ", is_xip ? "XIP" : "Loading", name);
288 else
289 printf(" Uncompressing %s ... ", name);
Simon Glass10ae4192014-12-02 13:17:30 -0700290}
291
Simon Glass4f6e6d72014-12-02 13:17:37 -0700292/**
293 * handle_decomp_error() - display a decompression error
294 *
295 * This function tries to produce a useful message. In the case where the
296 * uncompressed size is the same as the available space, we can assume that
297 * the image is too large for the buffer.
298 *
299 * @comp_type: Compression type being used (IH_COMP_...)
300 * @uncomp_size: Number of bytes uncompressed
301 * @unc_len: Amount of space available for decompression
302 * @ret: Error code to report
303 * @return BOOTM_ERR_RESET, indicating that the board must be reset
304 */
305static int handle_decomp_error(int comp_type, size_t uncomp_size,
306 size_t unc_len, int ret)
Simon Glass10ae4192014-12-02 13:17:30 -0700307{
Simon Glass4f6e6d72014-12-02 13:17:37 -0700308 const char *name = genimg_get_comp_name(comp_type);
309
310 if (uncomp_size >= unc_len)
311 printf("Image too large: increase CONFIG_SYS_BOOTM_LEN\n");
Simon Glass10ae4192014-12-02 13:17:30 -0700312 else
Simon Glass4f6e6d72014-12-02 13:17:37 -0700313 printf("%s: uncompress error %d\n", name, ret);
314
315 /*
316 * The decompression routines are now safe, so will not write beyond
317 * their bounds. Probably it is not necessary to reset, but maintain
318 * the current behaviour for now.
319 */
320 printf("Must RESET board to recover\n");
Simon Glass10ae4192014-12-02 13:17:30 -0700321#ifndef USE_HOSTCC
322 bootstage_error(BOOTSTAGE_ID_DECOMP_IMAGE);
323#endif
324
325 return BOOTM_ERR_RESET;
326}
Simon Glass3b5866d2014-06-12 07:24:46 -0600327
Simon Glass5aeccc22014-12-02 13:17:33 -0700328int bootm_decomp_image(int comp, ulong load, ulong image_start, int type,
329 void *load_buf, void *image_buf, ulong image_len,
330 uint unc_len, ulong *load_end)
Simon Glass3b5866d2014-06-12 07:24:46 -0600331{
Simon Glass4f6e6d72014-12-02 13:17:37 -0700332 int ret = 0;
333
Simon Glass686f3bb2014-06-12 07:24:52 -0600334 *load_end = load;
Simon Glass632570c2014-12-02 13:17:36 -0700335 print_decomp_msg(comp, type, load == image_start);
Simon Glass4f6e6d72014-12-02 13:17:37 -0700336
337 /*
338 * Load the image to the right place, decompressing if needed. After
339 * this, image_len will be set to the number of uncompressed bytes
340 * loaded, ret will be non-zero on error.
341 */
Simon Glass3b5866d2014-06-12 07:24:46 -0600342 switch (comp) {
343 case IH_COMP_NONE:
Simon Glass4f6e6d72014-12-02 13:17:37 -0700344 if (load == image_start)
345 break;
346 if (image_len <= unc_len)
Simon Glass3b5866d2014-06-12 07:24:46 -0600347 memmove_wd(load_buf, image_buf, image_len, CHUNKSZ);
Simon Glass4f6e6d72014-12-02 13:17:37 -0700348 else
349 ret = 1;
Simon Glass3b5866d2014-06-12 07:24:46 -0600350 break;
351#ifdef CONFIG_GZIP
Simon Glass10ae4192014-12-02 13:17:30 -0700352 case IH_COMP_GZIP: {
Simon Glass10ae4192014-12-02 13:17:30 -0700353 ret = gunzip(load_buf, unc_len, image_buf, &image_len);
Simon Glass3b5866d2014-06-12 07:24:46 -0600354 break;
Simon Glass10ae4192014-12-02 13:17:30 -0700355 }
Simon Glass3b5866d2014-06-12 07:24:46 -0600356#endif /* CONFIG_GZIP */
357#ifdef CONFIG_BZIP2
Simon Glass10ae4192014-12-02 13:17:30 -0700358 case IH_COMP_BZIP2: {
Simon Glass4f6e6d72014-12-02 13:17:37 -0700359 uint size = unc_len;
Simon Glass10ae4192014-12-02 13:17:30 -0700360
Simon Glass3b5866d2014-06-12 07:24:46 -0600361 /*
362 * If we've got less than 4 MB of malloc() space,
363 * use slower decompression algorithm which requires
364 * at most 2300 KB of memory.
365 */
Simon Glass4f6e6d72014-12-02 13:17:37 -0700366 ret = BZ2_bzBuffToBuffDecompress(load_buf, &size,
Simon Glass3b5866d2014-06-12 07:24:46 -0600367 image_buf, image_len,
368 CONFIG_SYS_MALLOC_LEN < (4096 * 1024), 0);
Simon Glass4f6e6d72014-12-02 13:17:37 -0700369 image_len = size;
Simon Glass3b5866d2014-06-12 07:24:46 -0600370 break;
Simon Glass10ae4192014-12-02 13:17:30 -0700371 }
Simon Glass3b5866d2014-06-12 07:24:46 -0600372#endif /* CONFIG_BZIP2 */
373#ifdef CONFIG_LZMA
374 case IH_COMP_LZMA: {
375 SizeT lzma_len = unc_len;
Simon Glass686f3bb2014-06-12 07:24:52 -0600376
Simon Glass3b5866d2014-06-12 07:24:46 -0600377 ret = lzmaBuffToBuffDecompress(load_buf, &lzma_len,
378 image_buf, image_len);
Simon Glass4f6e6d72014-12-02 13:17:37 -0700379 image_len = lzma_len;
Simon Glass3b5866d2014-06-12 07:24:46 -0600380 break;
381 }
382#endif /* CONFIG_LZMA */
383#ifdef CONFIG_LZO
384 case IH_COMP_LZO: {
385 size_t size = unc_len;
386
Simon Glass3b5866d2014-06-12 07:24:46 -0600387 ret = lzop_decompress(image_buf, image_len, load_buf, &size);
Simon Glass4f6e6d72014-12-02 13:17:37 -0700388 image_len = size;
Simon Glass3b5866d2014-06-12 07:24:46 -0600389 break;
390 }
391#endif /* CONFIG_LZO */
392 default:
393 printf("Unimplemented compression type %d\n", comp);
394 return BOOTM_ERR_UNIMPLEMENTED;
395 }
396
Simon Glass4f6e6d72014-12-02 13:17:37 -0700397 if (ret)
398 return handle_decomp_error(comp, image_len, unc_len, ret);
399 *load_end = load + image_len;
400
Simon Glass686f3bb2014-06-12 07:24:52 -0600401 puts("OK\n");
402
403 return 0;
404}
405
Simon Glassa51991d2014-06-12 07:24:53 -0600406#ifndef USE_HOSTCC
Simon Glass686f3bb2014-06-12 07:24:52 -0600407static int bootm_load_os(bootm_headers_t *images, unsigned long *load_end,
408 int boot_progress)
409{
410 image_info_t os = images->os;
411 ulong load = os.load;
412 ulong blob_start = os.start;
413 ulong blob_end = os.end;
414 ulong image_start = os.image_start;
415 ulong image_len = os.image_len;
416 bool no_overlap;
417 void *load_buf, *image_buf;
418 int err;
419
420 load_buf = map_sysmem(load, 0);
421 image_buf = map_sysmem(os.image_start, image_len);
Simon Glass5aeccc22014-12-02 13:17:33 -0700422 err = bootm_decomp_image(os.comp, load, os.image_start, os.type,
423 load_buf, image_buf, image_len,
424 CONFIG_SYS_BOOTM_LEN, load_end);
Simon Glass686f3bb2014-06-12 07:24:52 -0600425 if (err) {
426 bootstage_error(BOOTSTAGE_ID_DECOMP_IMAGE);
427 return err;
428 }
Simon Glass3b5866d2014-06-12 07:24:46 -0600429 flush_cache(load, (*load_end - load) * sizeof(ulong));
430
Simon Glass3b5866d2014-06-12 07:24:46 -0600431 debug(" kernel loaded at 0x%08lx, end = 0x%08lx\n", load, *load_end);
432 bootstage_mark(BOOTSTAGE_ID_KERNEL_LOADED);
433
Simon Glass686f3bb2014-06-12 07:24:52 -0600434 no_overlap = (os.comp == IH_COMP_NONE && load == image_start);
435
Simon Glass3b5866d2014-06-12 07:24:46 -0600436 if (!no_overlap && (load < blob_end) && (*load_end > blob_start)) {
437 debug("images.os.start = 0x%lX, images.os.end = 0x%lx\n",
438 blob_start, blob_end);
439 debug("images.os.load = 0x%lx, load_end = 0x%lx\n", load,
440 *load_end);
441
442 /* Check what type of image this is. */
443 if (images->legacy_hdr_valid) {
444 if (image_get_type(&images->legacy_hdr_os_copy)
445 == IH_TYPE_MULTI)
446 puts("WARNING: legacy format multi component image overwritten\n");
447 return BOOTM_ERR_OVERLAP;
448 } else {
449 puts("ERROR: new format image overwritten - must RESET the board to recover\n");
450 bootstage_error(BOOTSTAGE_ID_OVERWRITTEN);
451 return BOOTM_ERR_RESET;
452 }
453 }
454
455 return 0;
456}
457
458/**
459 * bootm_disable_interrupts() - Disable interrupts in preparation for load/boot
460 *
461 * @return interrupt flag (0 if interrupts were disabled, non-zero if they were
462 * enabled)
463 */
464ulong bootm_disable_interrupts(void)
465{
466 ulong iflag;
467
468 /*
469 * We have reached the point of no return: we are going to
470 * overwrite all exception vector code, so we cannot easily
471 * recover from any failures any more...
472 */
473 iflag = disable_interrupts();
474#ifdef CONFIG_NETCONSOLE
475 /* Stop the ethernet stack if NetConsole could have left it up */
476 eth_halt();
Bernhard Nortmann1167a6c2015-09-14 15:29:45 +0200477# ifndef CONFIG_DM_ETH
Simon Glass3b5866d2014-06-12 07:24:46 -0600478 eth_unregister(eth_get_dev());
Bernhard Nortmann1167a6c2015-09-14 15:29:45 +0200479# endif
Simon Glass3b5866d2014-06-12 07:24:46 -0600480#endif
481
482#if defined(CONFIG_CMD_USB)
483 /*
484 * turn off USB to prevent the host controller from writing to the
485 * SDRAM while Linux is booting. This could happen (at least for OHCI
486 * controller), because the HCCA (Host Controller Communication Area)
487 * lies within the SDRAM and the host controller writes continously to
488 * this area (as busmaster!). The HccaFrameNumber is for example
489 * updated every 1 ms within the HCCA structure in SDRAM! For more
490 * details see the OpenHCI specification.
491 */
492 usb_stop();
493#endif
494 return iflag;
495}
496
497#if defined(CONFIG_SILENT_CONSOLE) && !defined(CONFIG_SILENT_U_BOOT_ONLY)
498
499#define CONSOLE_ARG "console="
500#define CONSOLE_ARG_LEN (sizeof(CONSOLE_ARG) - 1)
501
502static void fixup_silent_linux(void)
503{
504 char *buf;
505 const char *env_val;
506 char *cmdline = getenv("bootargs");
507 int want_silent;
508
509 /*
510 * Only fix cmdline when requested. The environment variable can be:
511 *
512 * no - we never fixup
513 * yes - we always fixup
514 * unset - we rely on the console silent flag
515 */
516 want_silent = getenv_yesno("silent_linux");
517 if (want_silent == 0)
518 return;
519 else if (want_silent == -1 && !(gd->flags & GD_FLG_SILENT))
520 return;
521
522 debug("before silent fix-up: %s\n", cmdline);
523 if (cmdline && (cmdline[0] != '\0')) {
524 char *start = strstr(cmdline, CONSOLE_ARG);
525
526 /* Allocate space for maximum possible new command line */
527 buf = malloc(strlen(cmdline) + 1 + CONSOLE_ARG_LEN + 1);
528 if (!buf) {
529 debug("%s: out of memory\n", __func__);
530 return;
531 }
532
533 if (start) {
534 char *end = strchr(start, ' ');
535 int num_start_bytes = start - cmdline + CONSOLE_ARG_LEN;
536
537 strncpy(buf, cmdline, num_start_bytes);
538 if (end)
539 strcpy(buf + num_start_bytes, end);
540 else
541 buf[num_start_bytes] = '\0';
542 } else {
543 sprintf(buf, "%s %s", cmdline, CONSOLE_ARG);
544 }
545 env_val = buf;
546 } else {
547 buf = NULL;
548 env_val = CONSOLE_ARG;
549 }
550
551 setenv("bootargs", env_val);
552 debug("after silent fix-up: %s\n", env_val);
553 free(buf);
554}
555#endif /* CONFIG_SILENT_CONSOLE */
556
557/**
558 * Execute selected states of the bootm command.
559 *
560 * Note the arguments to this state must be the first argument, Any 'bootm'
561 * or sub-command arguments must have already been taken.
562 *
563 * Note that if states contains more than one flag it MUST contain
564 * BOOTM_STATE_START, since this handles and consumes the command line args.
565 *
566 * Also note that aside from boot_os_fn functions and bootm_load_os no other
567 * functions we store the return value of in 'ret' may use a negative return
568 * value, without special handling.
569 *
570 * @param cmdtp Pointer to bootm command table entry
571 * @param flag Command flags (CMD_FLAG_...)
572 * @param argc Number of subcommand arguments (0 = no arguments)
573 * @param argv Arguments
574 * @param states Mask containing states to run (BOOTM_STATE_...)
575 * @param images Image header information
576 * @param boot_progress 1 to show boot progress, 0 to not do this
577 * @return 0 if ok, something else on error. Some errors will cause this
578 * function to perform a reboot! If states contains BOOTM_STATE_OS_GO
579 * then the intent is to boot an OS, so this function will not return
580 * unless the image type is standalone.
581 */
582int do_bootm_states(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[],
583 int states, bootm_headers_t *images, int boot_progress)
584{
585 boot_os_fn *boot_fn;
586 ulong iflag = 0;
587 int ret = 0, need_boot_fn;
588
589 images->state |= states;
590
591 /*
592 * Work through the states and see how far we get. We stop on
593 * any error.
594 */
595 if (states & BOOTM_STATE_START)
596 ret = bootm_start(cmdtp, flag, argc, argv);
597
598 if (!ret && (states & BOOTM_STATE_FINDOS))
599 ret = bootm_find_os(cmdtp, flag, argc, argv);
600
601 if (!ret && (states & BOOTM_STATE_FINDOTHER)) {
602 ret = bootm_find_other(cmdtp, flag, argc, argv);
603 argc = 0; /* consume the args */
604 }
605
606 /* Load the OS */
607 if (!ret && (states & BOOTM_STATE_LOADOS)) {
608 ulong load_end;
609
610 iflag = bootm_disable_interrupts();
611 ret = bootm_load_os(images, &load_end, 0);
612 if (ret == 0)
613 lmb_reserve(&images->lmb, images->os.load,
614 (load_end - images->os.load));
615 else if (ret && ret != BOOTM_ERR_OVERLAP)
616 goto err;
617 else if (ret == BOOTM_ERR_OVERLAP)
618 ret = 0;
619#if defined(CONFIG_SILENT_CONSOLE) && !defined(CONFIG_SILENT_U_BOOT_ONLY)
620 if (images->os.os == IH_OS_LINUX)
621 fixup_silent_linux();
622#endif
623 }
624
625 /* Relocate the ramdisk */
626#ifdef CONFIG_SYS_BOOT_RAMDISK_HIGH
627 if (!ret && (states & BOOTM_STATE_RAMDISK)) {
628 ulong rd_len = images->rd_end - images->rd_start;
629
630 ret = boot_ramdisk_high(&images->lmb, images->rd_start,
631 rd_len, &images->initrd_start, &images->initrd_end);
632 if (!ret) {
633 setenv_hex("initrd_start", images->initrd_start);
634 setenv_hex("initrd_end", images->initrd_end);
635 }
636 }
637#endif
638#if defined(CONFIG_OF_LIBFDT) && defined(CONFIG_LMB)
639 if (!ret && (states & BOOTM_STATE_FDT)) {
640 boot_fdt_add_mem_rsv_regions(&images->lmb, images->ft_addr);
641 ret = boot_relocate_fdt(&images->lmb, &images->ft_addr,
642 &images->ft_len);
643 }
644#endif
645
646 /* From now on, we need the OS boot function */
647 if (ret)
648 return ret;
649 boot_fn = bootm_os_get_boot_func(images->os.os);
650 need_boot_fn = states & (BOOTM_STATE_OS_CMDLINE |
651 BOOTM_STATE_OS_BD_T | BOOTM_STATE_OS_PREP |
652 BOOTM_STATE_OS_FAKE_GO | BOOTM_STATE_OS_GO);
653 if (boot_fn == NULL && need_boot_fn) {
654 if (iflag)
655 enable_interrupts();
656 printf("ERROR: booting os '%s' (%d) is not supported\n",
657 genimg_get_os_name(images->os.os), images->os.os);
658 bootstage_error(BOOTSTAGE_ID_CHECK_BOOT_OS);
659 return 1;
660 }
661
662 /* Call various other states that are not generally used */
663 if (!ret && (states & BOOTM_STATE_OS_CMDLINE))
664 ret = boot_fn(BOOTM_STATE_OS_CMDLINE, argc, argv, images);
665 if (!ret && (states & BOOTM_STATE_OS_BD_T))
666 ret = boot_fn(BOOTM_STATE_OS_BD_T, argc, argv, images);
667 if (!ret && (states & BOOTM_STATE_OS_PREP))
668 ret = boot_fn(BOOTM_STATE_OS_PREP, argc, argv, images);
669
670#ifdef CONFIG_TRACE
671 /* Pretend to run the OS, then run a user command */
672 if (!ret && (states & BOOTM_STATE_OS_FAKE_GO)) {
673 char *cmd_list = getenv("fakegocmd");
674
675 ret = boot_selected_os(argc, argv, BOOTM_STATE_OS_FAKE_GO,
676 images, boot_fn);
677 if (!ret && cmd_list)
678 ret = run_command_list(cmd_list, -1, flag);
679 }
680#endif
681
682 /* Check for unsupported subcommand. */
683 if (ret) {
684 puts("subcommand not supported\n");
685 return ret;
686 }
687
688 /* Now run the OS! We hope this doesn't return */
689 if (!ret && (states & BOOTM_STATE_OS_GO))
690 ret = boot_selected_os(argc, argv, BOOTM_STATE_OS_GO,
691 images, boot_fn);
692
693 /* Deal with any fallout */
694err:
695 if (iflag)
696 enable_interrupts();
697
698 if (ret == BOOTM_ERR_UNIMPLEMENTED)
699 bootstage_error(BOOTSTAGE_ID_DECOMP_UNIMPL);
700 else if (ret == BOOTM_ERR_RESET)
701 do_reset(cmdtp, flag, argc, argv);
702
703 return ret;
704}
705
706#if defined(CONFIG_IMAGE_FORMAT_LEGACY)
707/**
708 * image_get_kernel - verify legacy format kernel image
709 * @img_addr: in RAM address of the legacy format image to be verified
710 * @verify: data CRC verification flag
711 *
712 * image_get_kernel() verifies legacy image integrity and returns pointer to
713 * legacy image header if image verification was completed successfully.
714 *
715 * returns:
716 * pointer to a legacy image header if valid image was found
717 * otherwise return NULL
718 */
719static image_header_t *image_get_kernel(ulong img_addr, int verify)
720{
721 image_header_t *hdr = (image_header_t *)img_addr;
722
723 if (!image_check_magic(hdr)) {
724 puts("Bad Magic Number\n");
725 bootstage_error(BOOTSTAGE_ID_CHECK_MAGIC);
726 return NULL;
727 }
728 bootstage_mark(BOOTSTAGE_ID_CHECK_HEADER);
729
730 if (!image_check_hcrc(hdr)) {
731 puts("Bad Header Checksum\n");
732 bootstage_error(BOOTSTAGE_ID_CHECK_HEADER);
733 return NULL;
734 }
735
736 bootstage_mark(BOOTSTAGE_ID_CHECK_CHECKSUM);
737 image_print_contents(hdr);
738
739 if (verify) {
740 puts(" Verifying Checksum ... ");
741 if (!image_check_dcrc(hdr)) {
742 printf("Bad Data CRC\n");
743 bootstage_error(BOOTSTAGE_ID_CHECK_CHECKSUM);
744 return NULL;
745 }
746 puts("OK\n");
747 }
748 bootstage_mark(BOOTSTAGE_ID_CHECK_ARCH);
749
750 if (!image_check_target_arch(hdr)) {
751 printf("Unsupported Architecture 0x%x\n", image_get_arch(hdr));
752 bootstage_error(BOOTSTAGE_ID_CHECK_ARCH);
753 return NULL;
754 }
755 return hdr;
756}
757#endif
758
759/**
760 * boot_get_kernel - find kernel image
761 * @os_data: pointer to a ulong variable, will hold os data start address
762 * @os_len: pointer to a ulong variable, will hold os data length
763 *
764 * boot_get_kernel() tries to find a kernel image, verifies its integrity
765 * and locates kernel data.
766 *
767 * returns:
768 * pointer to image header if valid image was found, plus kernel start
769 * address and length, otherwise NULL
770 */
771static const void *boot_get_kernel(cmd_tbl_t *cmdtp, int flag, int argc,
772 char * const argv[], bootm_headers_t *images,
773 ulong *os_data, ulong *os_len)
774{
775#if defined(CONFIG_IMAGE_FORMAT_LEGACY)
776 image_header_t *hdr;
777#endif
778 ulong img_addr;
779 const void *buf;
Simon Glass3b5866d2014-06-12 07:24:46 -0600780 const char *fit_uname_config = NULL;
781 const char *fit_uname_kernel = NULL;
Bryan Wuf5c377a2014-08-15 16:51:38 -0700782#if defined(CONFIG_FIT)
Simon Glass3b5866d2014-06-12 07:24:46 -0600783 int os_noffset;
784#endif
785
Bryan Wuc82ea372014-08-15 16:51:39 -0700786 img_addr = genimg_get_kernel_addr_fit(argc < 1 ? NULL : argv[0],
787 &fit_uname_config,
788 &fit_uname_kernel);
Simon Glass3b5866d2014-06-12 07:24:46 -0600789
790 bootstage_mark(BOOTSTAGE_ID_CHECK_MAGIC);
791
792 /* copy from dataflash if needed */
793 img_addr = genimg_get_image(img_addr);
794
795 /* check image type, for FIT images get FIT kernel node */
796 *os_data = *os_len = 0;
797 buf = map_sysmem(img_addr, 0);
798 switch (genimg_get_format(buf)) {
799#if defined(CONFIG_IMAGE_FORMAT_LEGACY)
800 case IMAGE_FORMAT_LEGACY:
801 printf("## Booting kernel from Legacy Image at %08lx ...\n",
802 img_addr);
803 hdr = image_get_kernel(img_addr, images->verify);
804 if (!hdr)
805 return NULL;
806 bootstage_mark(BOOTSTAGE_ID_CHECK_IMAGETYPE);
807
808 /* get os_data and os_len */
809 switch (image_get_type(hdr)) {
810 case IH_TYPE_KERNEL:
811 case IH_TYPE_KERNEL_NOLOAD:
812 *os_data = image_get_data(hdr);
813 *os_len = image_get_data_size(hdr);
814 break;
815 case IH_TYPE_MULTI:
816 image_multi_getimg(hdr, 0, os_data, os_len);
817 break;
818 case IH_TYPE_STANDALONE:
819 *os_data = image_get_data(hdr);
820 *os_len = image_get_data_size(hdr);
821 break;
822 default:
823 printf("Wrong Image Type for %s command\n",
824 cmdtp->name);
825 bootstage_error(BOOTSTAGE_ID_CHECK_IMAGETYPE);
826 return NULL;
827 }
828
829 /*
830 * copy image header to allow for image overwrites during
831 * kernel decompression.
832 */
833 memmove(&images->legacy_hdr_os_copy, hdr,
834 sizeof(image_header_t));
835
836 /* save pointer to image header */
837 images->legacy_hdr_os = hdr;
838
839 images->legacy_hdr_valid = 1;
840 bootstage_mark(BOOTSTAGE_ID_DECOMP_IMAGE);
841 break;
842#endif
843#if defined(CONFIG_FIT)
844 case IMAGE_FORMAT_FIT:
Simon Glassa0c0b632014-06-12 07:24:47 -0600845 os_noffset = fit_image_load(images, img_addr,
Simon Glass3b5866d2014-06-12 07:24:46 -0600846 &fit_uname_kernel, &fit_uname_config,
847 IH_ARCH_DEFAULT, IH_TYPE_KERNEL,
848 BOOTSTAGE_ID_FIT_KERNEL_START,
849 FIT_LOAD_IGNORED, os_data, os_len);
850 if (os_noffset < 0)
851 return NULL;
852
853 images->fit_hdr_os = map_sysmem(img_addr, 0);
854 images->fit_uname_os = fit_uname_kernel;
855 images->fit_uname_cfg = fit_uname_config;
856 images->fit_noffset_os = os_noffset;
857 break;
858#endif
859#ifdef CONFIG_ANDROID_BOOT_IMAGE
860 case IMAGE_FORMAT_ANDROID:
861 printf("## Booting Android Image at 0x%08lx ...\n", img_addr);
Simon Glass95040102014-06-12 07:24:48 -0600862 if (android_image_get_kernel(buf, images->verify,
Simon Glass3b5866d2014-06-12 07:24:46 -0600863 os_data, os_len))
864 return NULL;
865 break;
866#endif
867 default:
868 printf("Wrong Image Format for %s command\n", cmdtp->name);
869 bootstage_error(BOOTSTAGE_ID_FIT_KERNEL_INFO);
870 return NULL;
871 }
872
873 debug(" kernel data at 0x%08lx, len = 0x%08lx (%ld)\n",
874 *os_data, *os_len, *os_len);
875
876 return buf;
877}
Simon Glassa51991d2014-06-12 07:24:53 -0600878#else /* USE_HOSTCC */
879
880void memmove_wd(void *to, void *from, size_t len, ulong chunksz)
881{
882 memmove(to, from, len);
883}
884
885static int bootm_host_load_image(const void *fit, int req_image_type)
886{
887 const char *fit_uname_config = NULL;
888 ulong data, len;
889 bootm_headers_t images;
890 int noffset;
891 ulong load_end;
892 uint8_t image_type;
893 uint8_t imape_comp;
894 void *load_buf;
895 int ret;
896
897 memset(&images, '\0', sizeof(images));
898 images.verify = 1;
899 noffset = fit_image_load(&images, (ulong)fit,
900 NULL, &fit_uname_config,
901 IH_ARCH_DEFAULT, req_image_type, -1,
902 FIT_LOAD_IGNORED, &data, &len);
903 if (noffset < 0)
904 return noffset;
905 if (fit_image_get_type(fit, noffset, &image_type)) {
906 puts("Can't get image type!\n");
907 return -EINVAL;
908 }
909
910 if (fit_image_get_comp(fit, noffset, &imape_comp)) {
911 puts("Can't get image compression!\n");
912 return -EINVAL;
913 }
914
915 /* Allow the image to expand by a factor of 4, should be safe */
916 load_buf = malloc((1 << 20) + len * 4);
Simon Glass5aeccc22014-12-02 13:17:33 -0700917 ret = bootm_decomp_image(imape_comp, 0, data, image_type, load_buf,
918 (void *)data, len, CONFIG_SYS_BOOTM_LEN,
919 &load_end);
Simon Glassa51991d2014-06-12 07:24:53 -0600920 free(load_buf);
Simon Glass5aeccc22014-12-02 13:17:33 -0700921
Simon Glassa51991d2014-06-12 07:24:53 -0600922 if (ret && ret != BOOTM_ERR_UNIMPLEMENTED)
923 return ret;
924
925 return 0;
926}
927
928int bootm_host_load_images(const void *fit, int cfg_noffset)
929{
930 static uint8_t image_types[] = {
931 IH_TYPE_KERNEL,
932 IH_TYPE_FLATDT,
933 IH_TYPE_RAMDISK,
934 };
935 int err = 0;
936 int i;
937
938 for (i = 0; i < ARRAY_SIZE(image_types); i++) {
939 int ret;
940
941 ret = bootm_host_load_image(fit, image_types[i]);
942 if (!err && ret && ret != -ENOENT)
943 err = ret;
944 }
945
946 /* Return the first error we found */
947 return err;
948}
Simon Glass0232ba72014-06-12 07:24:51 -0600949
950#endif /* ndef USE_HOSTCC */