blob: 60a422dfb74a6c683b3cf9d2b19b3ad1dbd0d151 [file] [log] [blame]
Tom Rini10e47792018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Sebastian Siewior686d6672014-05-05 15:08:09 -05002/*
3 * Copyright (c) 2011 Sebastian Andrzej Siewior <bigeasy@linutronix.de>
Sebastian Siewior686d6672014-05-05 15:08:09 -05004 */
5
Simon Glass5e6201b2019-08-01 09:46:51 -06006#include <env.h>
Sebastian Siewior686d6672014-05-05 15:08:09 -05007#include <image.h>
Sam Protsenko4fabf402020-01-24 17:53:40 +02008#include <image-android-dt.h>
Sebastian Siewior686d6672014-05-05 15:08:09 -05009#include <android_image.h>
Ahmad Draidi9a1cb5d2014-10-23 20:50:07 +030010#include <malloc.h>
11#include <errno.h>
Eugeniu Rosca1403f392019-04-08 17:35:27 +020012#include <asm/unaligned.h>
Sam Protsenko4fabf402020-01-24 17:53:40 +020013#include <mapmem.h>
Simon Glass3ba929a2020-10-30 21:38:53 -060014#include <linux/libfdt.h>
Sebastian Siewior686d6672014-05-05 15:08:09 -050015
Maxime Ripard17ef1f52015-04-24 12:53:12 +020016#define ANDROID_IMAGE_DEFAULT_KERNEL_ADDR 0x10008000
Neil Armstrong04ba5572024-10-17 16:44:44 +020017#define ANDROID_IMAGE_DEFAULT_RAMDISK_ADDR 0x11000000
Maxime Ripard17ef1f52015-04-24 12:53:12 +020018
Sebastian Siewior686d6672014-05-05 15:08:09 -050019static char andr_tmp_str[ANDR_BOOT_ARGS_SIZE + 1];
20
Safae Ouajih313cc842023-02-06 00:50:18 +010021static ulong checksum(const unsigned char *buffer, ulong size)
22{
23 ulong sum = 0;
24
25 for (ulong i = 0; i < size; i++)
26 sum += buffer[i];
27 return sum;
28}
29
30static bool is_trailer_present(ulong bootconfig_end_addr)
31{
32 return !strncmp((char *)(bootconfig_end_addr - BOOTCONFIG_MAGIC_SIZE),
33 BOOTCONFIG_MAGIC, BOOTCONFIG_MAGIC_SIZE);
34}
35
36static ulong add_trailer(ulong bootconfig_start_addr, ulong bootconfig_size)
37{
38 ulong end;
39 ulong sum;
40
41 if (!bootconfig_start_addr)
42 return -1;
43 if (!bootconfig_size)
44 return 0;
45
46 end = bootconfig_start_addr + bootconfig_size;
47 if (is_trailer_present(end))
48 return 0;
49
50 memcpy((void *)(end), &bootconfig_size, BOOTCONFIG_SIZE_SIZE);
51 sum = checksum((unsigned char *)bootconfig_start_addr, bootconfig_size);
52 memcpy((void *)(end + BOOTCONFIG_SIZE_SIZE), &sum,
53 BOOTCONFIG_CHECKSUM_SIZE);
54 memcpy((void *)(end + BOOTCONFIG_SIZE_SIZE + BOOTCONFIG_CHECKSUM_SIZE),
55 BOOTCONFIG_MAGIC, BOOTCONFIG_MAGIC_SIZE);
56
57 return BOOTCONFIG_TRAILER_SIZE;
58}
59
Mattijs Korpershoek2b5c70a2024-07-10 10:40:02 +020060__weak ulong get_avendor_bootimg_addr(void)
61{
62 return -1;
63}
64
Safae Ouajih889005f2023-02-06 00:50:12 +010065static void android_boot_image_v3_v4_parse_hdr(const struct andr_boot_img_hdr_v3 *hdr,
66 struct andr_image_data *data)
67{
68 ulong end;
69
70 data->kcmdline = hdr->cmdline;
71 data->header_version = hdr->header_version;
72
73 /*
74 * The header takes a full page, the remaining components are aligned
75 * on page boundary.
76 */
77 end = (ulong)hdr;
78 end += ANDR_GKI_PAGE_SIZE;
79 data->kernel_ptr = end;
80 data->kernel_size = hdr->kernel_size;
81 end += ALIGN(hdr->kernel_size, ANDR_GKI_PAGE_SIZE);
Roman Stratiienko227b4fa2024-05-19 13:09:51 +000082 data->ramdisk_ptr = end;
Safae Ouajih889005f2023-02-06 00:50:12 +010083 data->ramdisk_size = hdr->ramdisk_size;
84 data->boot_ramdisk_size = hdr->ramdisk_size;
85 end += ALIGN(hdr->ramdisk_size, ANDR_GKI_PAGE_SIZE);
86
87 if (hdr->header_version > 3)
88 end += ALIGN(hdr->signature_size, ANDR_GKI_PAGE_SIZE);
89
90 data->boot_img_total_size = end - (ulong)hdr;
91}
92
93static void android_vendor_boot_image_v3_v4_parse_hdr(const struct andr_vnd_boot_img_hdr
94 *hdr, struct andr_image_data *data)
95{
96 ulong end;
97
98 /*
99 * The header takes a full page, the remaining components are aligned
100 * on page boundary.
101 */
Safae Ouajih6665296e2023-02-06 00:50:14 +0100102 data->kcmdline_extra = hdr->cmdline;
Safae Ouajih889005f2023-02-06 00:50:12 +0100103 data->tags_addr = hdr->tags_addr;
104 data->image_name = hdr->name;
105 data->kernel_addr = hdr->kernel_addr;
106 data->ramdisk_addr = hdr->ramdisk_addr;
107 data->dtb_load_addr = hdr->dtb_addr;
Safae Ouajih313cc842023-02-06 00:50:18 +0100108 data->bootconfig_size = hdr->bootconfig_size;
Safae Ouajih889005f2023-02-06 00:50:12 +0100109 end = (ulong)hdr;
110 end += hdr->page_size;
111 if (hdr->vendor_ramdisk_size) {
112 data->vendor_ramdisk_ptr = end;
113 data->vendor_ramdisk_size = hdr->vendor_ramdisk_size;
114 data->ramdisk_size += hdr->vendor_ramdisk_size;
115 end += ALIGN(hdr->vendor_ramdisk_size, hdr->page_size);
116 }
117
118 data->dtb_ptr = end;
119 data->dtb_size = hdr->dtb_size;
120
121 end += ALIGN(hdr->dtb_size, hdr->page_size);
122 end += ALIGN(hdr->vendor_ramdisk_table_size, hdr->page_size);
Safae Ouajih313cc842023-02-06 00:50:18 +0100123 data->bootconfig_addr = end;
124 if (hdr->bootconfig_size) {
125 data->bootconfig_size += add_trailer(data->bootconfig_addr,
126 data->bootconfig_size);
127 data->ramdisk_size += data->bootconfig_size;
128 }
129 end += ALIGN(data->bootconfig_size, hdr->page_size);
Safae Ouajih889005f2023-02-06 00:50:12 +0100130 data->vendor_boot_img_total_size = end - (ulong)hdr;
131}
132
Safae Ouajih027191d2023-02-06 00:50:07 +0100133static void android_boot_image_v0_v1_v2_parse_hdr(const struct andr_boot_img_hdr_v0 *hdr,
134 struct andr_image_data *data)
135{
136 ulong end;
137
138 data->image_name = hdr->name;
139 data->kcmdline = hdr->cmdline;
140 data->kernel_addr = hdr->kernel_addr;
141 data->ramdisk_addr = hdr->ramdisk_addr;
142 data->header_version = hdr->header_version;
143 data->dtb_load_addr = hdr->dtb_addr;
144
145 end = (ulong)hdr;
146
147 /*
148 * The header takes a full page, the remaining components are aligned
149 * on page boundary
150 */
151
152 end += hdr->page_size;
153
154 data->kernel_ptr = end;
155 data->kernel_size = hdr->kernel_size;
156 end += ALIGN(hdr->kernel_size, hdr->page_size);
157
158 data->ramdisk_ptr = end;
159 data->ramdisk_size = hdr->ramdisk_size;
160 end += ALIGN(hdr->ramdisk_size, hdr->page_size);
161
162 data->second_ptr = end;
163 data->second_size = hdr->second_size;
164 end += ALIGN(hdr->second_size, hdr->page_size);
165
166 if (hdr->header_version >= 1) {
167 data->recovery_dtbo_ptr = end;
168 data->recovery_dtbo_size = hdr->recovery_dtbo_size;
169 end += ALIGN(hdr->recovery_dtbo_size, hdr->page_size);
170 }
171
172 if (hdr->header_version >= 2) {
173 data->dtb_ptr = end;
174 data->dtb_size = hdr->dtb_size;
175 end += ALIGN(hdr->dtb_size, hdr->page_size);
176 }
177
178 data->boot_img_total_size = end - (ulong)hdr;
179}
180
Julien Massonb238dee2024-11-21 11:59:55 +0100181bool android_image_get_bootimg_size(const void *hdr, u32 *boot_img_size)
182{
183 struct andr_image_data data;
184
185 if (!hdr || !boot_img_size) {
186 printf("hdr or boot_img_size can't be NULL\n");
187 return false;
188 }
189
190 if (!is_android_boot_image_header(hdr)) {
191 printf("Incorrect boot image header\n");
192 return false;
193 }
194
195 if (((struct andr_boot_img_hdr_v0 *)hdr)->header_version <= 2)
196 android_boot_image_v0_v1_v2_parse_hdr(hdr, &data);
197 else
198 android_boot_image_v3_v4_parse_hdr(hdr, &data);
199
200 *boot_img_size = data.boot_img_total_size;
201
202 return true;
203}
204
205bool android_image_get_vendor_bootimg_size(const void *hdr, u32 *vendor_boot_img_size)
206{
207 struct andr_image_data data;
208
209 if (!hdr || !vendor_boot_img_size) {
210 printf("hdr or vendor_boot_img_size can't be NULL\n");
211 return false;
212 }
213
214 if (!is_android_vendor_boot_image_header(hdr)) {
215 printf("Incorrect vendor boot image header\n");
216 return false;
217 }
218
219 android_vendor_boot_image_v3_v4_parse_hdr(hdr, &data);
220
221 *vendor_boot_img_size = data.vendor_boot_img_total_size;
222
223 return true;
224}
225
Safae Ouajihc60ae102023-02-06 00:50:11 +0100226bool android_image_get_data(const void *boot_hdr, const void *vendor_boot_hdr,
227 struct andr_image_data *data)
Safae Ouajih027191d2023-02-06 00:50:07 +0100228{
229 if (!boot_hdr || !data) {
230 printf("boot_hdr or data params can't be NULL\n");
231 return false;
232 }
233
234 if (!is_android_boot_image_header(boot_hdr)) {
235 printf("Incorrect boot image header\n");
236 return false;
237 }
238
Safae Ouajih889005f2023-02-06 00:50:12 +0100239 if (((struct andr_boot_img_hdr_v0 *)boot_hdr)->header_version > 2) {
240 if (!vendor_boot_hdr) {
241 printf("For boot header v3+ vendor boot image has to be provided\n");
242 return false;
243 }
244 if (!is_android_vendor_boot_image_header(vendor_boot_hdr)) {
245 printf("Incorrect vendor boot image header\n");
246 return false;
247 }
248 android_boot_image_v3_v4_parse_hdr(boot_hdr, data);
249 android_vendor_boot_image_v3_v4_parse_hdr(vendor_boot_hdr, data);
250 } else {
Safae Ouajih027191d2023-02-06 00:50:07 +0100251 android_boot_image_v0_v1_v2_parse_hdr(boot_hdr, data);
Safae Ouajih889005f2023-02-06 00:50:12 +0100252 }
Safae Ouajih027191d2023-02-06 00:50:07 +0100253
254 return true;
255}
256
Neil Armstrong7cb867d2024-10-17 16:44:43 +0200257static ulong android_image_get_kernel_addr(struct andr_image_data *img_data,
258 ulong comp)
Maxime Ripard17ef1f52015-04-24 12:53:12 +0200259{
260 /*
261 * All the Android tools that generate a boot.img use this
262 * address as the default.
263 *
264 * Even though it doesn't really make a lot of sense, and it
265 * might be valid on some platforms, we treat that adress as
266 * the default value for this field, and try to execute the
267 * kernel in place in such a case.
268 *
269 * Otherwise, we will return the actual value set by the user.
270 */
Neil Armstrong7cb867d2024-10-17 16:44:43 +0200271 if (img_data->kernel_addr == ANDROID_IMAGE_DEFAULT_KERNEL_ADDR) {
272 if (comp == IH_COMP_NONE)
273 return img_data->kernel_ptr;
274 return env_get_ulong("kernel_addr_r", 16, 0);
275 }
Maxime Ripard17ef1f52015-04-24 12:53:12 +0200276
Christian Gmeiner3fabf862020-05-29 17:53:45 +0200277 /*
278 * abootimg creates images where all load addresses are 0
279 * and we need to fix them.
280 */
Safae Ouajihbced1042023-02-06 00:50:08 +0100281 if (img_data->kernel_addr == 0 && img_data->ramdisk_addr == 0)
Christian Gmeiner3fabf862020-05-29 17:53:45 +0200282 return env_get_ulong("kernel_addr_r", 16, 0);
283
Safae Ouajihbced1042023-02-06 00:50:08 +0100284 return img_data->kernel_addr;
Maxime Ripard17ef1f52015-04-24 12:53:12 +0200285}
286
Ahmad Draidi9a1cb5d2014-10-23 20:50:07 +0300287/**
288 * android_image_get_kernel() - processes kernel part of Android boot images
Safae Ouajihc60ae102023-02-06 00:50:11 +0100289 * @hdr: Pointer to boot image header, which is at the start
Ahmad Draidi9a1cb5d2014-10-23 20:50:07 +0300290 * of the image.
Safae Ouajihc60ae102023-02-06 00:50:11 +0100291 * @vendor_boot_img: Pointer to vendor boot image header, which is at the
292 * start of the image.
Ahmad Draidi9a1cb5d2014-10-23 20:50:07 +0300293 * @verify: Checksum verification flag. Currently unimplemented.
294 * @os_data: Pointer to a ulong variable, will hold os data start
295 * address.
296 * @os_len: Pointer to a ulong variable, will hold os data length.
297 *
298 * This function returns the os image's start address and length. Also,
299 * it appends the kernel command line to the bootargs env variable.
300 *
301 * Return: Zero, os start address and length on success,
302 * otherwise on failure.
303 */
Safae Ouajih51c981b2023-02-06 00:50:17 +0100304int android_image_get_kernel(const void *hdr,
Safae Ouajihc60ae102023-02-06 00:50:11 +0100305 const void *vendor_boot_img, int verify,
Sebastian Siewior686d6672014-05-05 15:08:09 -0500306 ulong *os_data, ulong *os_len)
307{
Safae Ouajihbced1042023-02-06 00:50:08 +0100308 struct andr_image_data img_data = {0};
Neil Armstrongfd0318b2024-10-17 16:44:42 +0200309 ulong kernel_addr;
Safae Ouajihbced1042023-02-06 00:50:08 +0100310 const struct legacy_img_hdr *ihdr;
Neil Armstrong7cb867d2024-10-17 16:44:43 +0200311 ulong comp;
Safae Ouajihbced1042023-02-06 00:50:08 +0100312
Safae Ouajihc60ae102023-02-06 00:50:11 +0100313 if (!android_image_get_data(hdr, vendor_boot_img, &img_data))
Safae Ouajihbced1042023-02-06 00:50:08 +0100314 return -EINVAL;
315
Neil Armstrong7cb867d2024-10-17 16:44:43 +0200316 comp = android_image_get_kcomp(hdr, vendor_boot_img);
317
318 kernel_addr = android_image_get_kernel_addr(&img_data, comp);
Safae Ouajihbced1042023-02-06 00:50:08 +0100319 ihdr = (const struct legacy_img_hdr *)img_data.kernel_ptr;
Maxime Ripard17ef1f52015-04-24 12:53:12 +0200320
Sebastian Siewior686d6672014-05-05 15:08:09 -0500321 /*
322 * Not all Android tools use the id field for signing the image with
323 * sha1 (or anything) so we don't check it. It is not obvious that the
324 * string is null terminated so we take care of this.
325 */
Safae Ouajihbced1042023-02-06 00:50:08 +0100326 strlcpy(andr_tmp_str, img_data.image_name, ANDR_BOOT_NAME_SIZE);
Sebastian Siewior686d6672014-05-05 15:08:09 -0500327 andr_tmp_str[ANDR_BOOT_NAME_SIZE] = '\0';
328 if (strlen(andr_tmp_str))
329 printf("Android's image name: %s\n", andr_tmp_str);
330
Neil Armstrongfd0318b2024-10-17 16:44:42 +0200331 printf("Kernel load addr 0x%08lx size %u KiB\n",
Safae Ouajihbced1042023-02-06 00:50:08 +0100332 kernel_addr, DIV_ROUND_UP(img_data.kernel_size, 1024));
Ahmad Draidi9a1cb5d2014-10-23 20:50:07 +0300333
334 int len = 0;
Nicolas Belin5799ab12024-12-17 14:29:10 +0100335 char *bootargs = env_get("bootargs");
336
337 if (bootargs)
338 len += strlen(bootargs);
339
Safae Ouajihbced1042023-02-06 00:50:08 +0100340 if (*img_data.kcmdline) {
341 printf("Kernel command line: %s\n", img_data.kcmdline);
Nicolas Belin5799ab12024-12-17 14:29:10 +0100342 len += strlen(img_data.kcmdline) + (len ? 1 : 0); /* +1 for extra space */
Sebastian Siewior686d6672014-05-05 15:08:09 -0500343 }
Ahmad Draidi9a1cb5d2014-10-23 20:50:07 +0300344
Nicolas Belinb7ea2a52024-12-17 14:29:08 +0100345 if (*img_data.kcmdline_extra) {
Safae Ouajih6665296e2023-02-06 00:50:14 +0100346 printf("Kernel extra command line: %s\n", img_data.kcmdline_extra);
Nicolas Belin5799ab12024-12-17 14:29:10 +0100347 len += strlen(img_data.kcmdline_extra) + (len ? 1 : 0); /* +1 for extra space */
Safae Ouajih6665296e2023-02-06 00:50:14 +0100348 }
349
Nicolas Belin5799ab12024-12-17 14:29:10 +0100350 char *newbootargs = malloc(len + 1); /* +1 for the '\0' */
Ahmad Draidi9a1cb5d2014-10-23 20:50:07 +0300351 if (!newbootargs) {
352 puts("Error: malloc in android_image_get_kernel failed!\n");
353 return -ENOMEM;
354 }
Nicolas Belin5799ab12024-12-17 14:29:10 +0100355 *newbootargs = '\0'; /* set to Null in case no components below are present */
Ahmad Draidi9a1cb5d2014-10-23 20:50:07 +0300356
Nicolas Belin5799ab12024-12-17 14:29:10 +0100357 if (bootargs)
Ahmad Draidi9a1cb5d2014-10-23 20:50:07 +0300358 strcpy(newbootargs, bootargs);
Safae Ouajihbced1042023-02-06 00:50:08 +0100359
Nicolas Belin5799ab12024-12-17 14:29:10 +0100360 if (*img_data.kcmdline) {
361 if (*newbootargs) /* If there is something in newbootargs, a space is needed */
362 strcat(newbootargs, " ");
Safae Ouajihbced1042023-02-06 00:50:08 +0100363 strcat(newbootargs, img_data.kcmdline);
Nicolas Belin5799ab12024-12-17 14:29:10 +0100364 }
Ahmad Draidi9a1cb5d2014-10-23 20:50:07 +0300365
Nicolas Belinb7ea2a52024-12-17 14:29:08 +0100366 if (*img_data.kcmdline_extra) {
Nicolas Belin5799ab12024-12-17 14:29:10 +0100367 if (*newbootargs) /* If there is something in newbootargs, a space is needed */
368 strcat(newbootargs, " ");
Safae Ouajih6665296e2023-02-06 00:50:14 +0100369 strcat(newbootargs, img_data.kcmdline_extra);
370 }
371
Simon Glass6a38e412017-08-03 12:22:09 -0600372 env_set("bootargs", newbootargs);
Nicolas Belin52d1c2e2024-12-17 14:29:09 +0100373 free(newbootargs);
Sebastian Siewior686d6672014-05-05 15:08:09 -0500374
375 if (os_data) {
Roman Stratiienko73268582019-06-03 15:38:13 +0300376 if (image_get_magic(ihdr) == IH_MAGIC) {
377 *os_data = image_get_data(ihdr);
378 } else {
Safae Ouajihbced1042023-02-06 00:50:08 +0100379 *os_data = img_data.kernel_ptr;
Roman Stratiienko73268582019-06-03 15:38:13 +0300380 }
Sebastian Siewior686d6672014-05-05 15:08:09 -0500381 }
Roman Stratiienko73268582019-06-03 15:38:13 +0300382 if (os_len) {
383 if (image_get_magic(ihdr) == IH_MAGIC)
384 *os_len = image_get_data_size(ihdr);
385 else
Safae Ouajihbced1042023-02-06 00:50:08 +0100386 *os_len = img_data.kernel_size;
Roman Stratiienko73268582019-06-03 15:38:13 +0300387 }
Sebastian Siewior686d6672014-05-05 15:08:09 -0500388 return 0;
389}
390
Safae Ouajih889005f2023-02-06 00:50:12 +0100391bool is_android_vendor_boot_image_header(const void *vendor_boot_img)
392{
393 return !memcmp(VENDOR_BOOT_MAGIC, vendor_boot_img, ANDR_VENDOR_BOOT_MAGIC_SIZE);
394}
395
Safae Ouajih51c981b2023-02-06 00:50:17 +0100396bool is_android_boot_image_header(const void *hdr)
Sebastian Siewior686d6672014-05-05 15:08:09 -0500397{
Safae Ouajih88ad0c12023-02-06 00:50:05 +0100398 return !memcmp(ANDR_BOOT_MAGIC, hdr, ANDR_BOOT_MAGIC_SIZE);
Sebastian Siewior686d6672014-05-05 15:08:09 -0500399}
400
Safae Ouajihc60ae102023-02-06 00:50:11 +0100401ulong android_image_get_end(const struct andr_boot_img_hdr_v0 *hdr,
402 const void *vendor_boot_img)
Sebastian Siewior686d6672014-05-05 15:08:09 -0500403{
Safae Ouajihbced1042023-02-06 00:50:08 +0100404 struct andr_image_data img_data;
Sebastian Siewior686d6672014-05-05 15:08:09 -0500405
Safae Ouajihc60ae102023-02-06 00:50:11 +0100406 if (!android_image_get_data(hdr, vendor_boot_img, &img_data))
Safae Ouajihbced1042023-02-06 00:50:08 +0100407 return -EINVAL;
Sam Protsenko9e4982c2019-08-15 20:25:07 +0300408
Safae Ouajihbced1042023-02-06 00:50:08 +0100409 if (img_data.header_version > 2)
410 return 0;
Sam Protsenko9e4982c2019-08-15 20:25:07 +0300411
Safae Ouajihbced1042023-02-06 00:50:08 +0100412 return img_data.boot_img_total_size;
Sebastian Siewior686d6672014-05-05 15:08:09 -0500413}
414
Safae Ouajih51c981b2023-02-06 00:50:17 +0100415ulong android_image_get_kload(const void *hdr,
Safae Ouajihc60ae102023-02-06 00:50:11 +0100416 const void *vendor_boot_img)
Sebastian Siewior686d6672014-05-05 15:08:09 -0500417{
Safae Ouajihbced1042023-02-06 00:50:08 +0100418 struct andr_image_data img_data;
Neil Armstrong7cb867d2024-10-17 16:44:43 +0200419 ulong comp;
Safae Ouajihbced1042023-02-06 00:50:08 +0100420
Safae Ouajihc60ae102023-02-06 00:50:11 +0100421 if (!android_image_get_data(hdr, vendor_boot_img, &img_data))
Safae Ouajihbced1042023-02-06 00:50:08 +0100422 return -EINVAL;
423
Neil Armstrong7cb867d2024-10-17 16:44:43 +0200424 comp = android_image_get_kcomp(hdr, vendor_boot_img);
425
426 return android_image_get_kernel_addr(&img_data, comp);
Sebastian Siewior686d6672014-05-05 15:08:09 -0500427}
428
Safae Ouajih51c981b2023-02-06 00:50:17 +0100429ulong android_image_get_kcomp(const void *hdr,
Safae Ouajihc60ae102023-02-06 00:50:11 +0100430 const void *vendor_boot_img)
Eugeniu Rosca1403f392019-04-08 17:35:27 +0200431{
Safae Ouajih027191d2023-02-06 00:50:07 +0100432 struct andr_image_data img_data;
433 const void *p;
434
Safae Ouajihc60ae102023-02-06 00:50:11 +0100435 if (!android_image_get_data(hdr, vendor_boot_img, &img_data))
Safae Ouajih027191d2023-02-06 00:50:07 +0100436 return -EINVAL;
Eugeniu Rosca1403f392019-04-08 17:35:27 +0200437
Safae Ouajih027191d2023-02-06 00:50:07 +0100438 p = (const void *)img_data.kernel_ptr;
Simon Glassbb7d3bb2022-09-06 20:26:52 -0600439 if (image_get_magic((struct legacy_img_hdr *)p) == IH_MAGIC)
440 return image_get_comp((struct legacy_img_hdr *)p);
Roman Stratiienko73268582019-06-03 15:38:13 +0300441 else if (get_unaligned_le32(p) == LZ4F_MAGIC)
Eugeniu Rosca1403f392019-04-08 17:35:27 +0200442 return IH_COMP_LZ4;
443 else
Stephan Gerhold9e5111d2021-07-01 20:33:16 +0200444 return image_decomp_type(p, sizeof(u32));
Eugeniu Rosca1403f392019-04-08 17:35:27 +0200445}
446
Safae Ouajih5b01a882023-02-06 00:50:13 +0100447int android_image_get_ramdisk(const void *hdr, const void *vendor_boot_img,
448 ulong *rd_data, ulong *rd_len)
Sebastian Siewior686d6672014-05-05 15:08:09 -0500449{
Safae Ouajihbced1042023-02-06 00:50:08 +0100450 struct andr_image_data img_data = {0};
Safae Ouajih5b01a882023-02-06 00:50:13 +0100451 ulong ramdisk_ptr;
Safae Ouajihbced1042023-02-06 00:50:08 +0100452
Safae Ouajihc60ae102023-02-06 00:50:11 +0100453 if (!android_image_get_data(hdr, vendor_boot_img, &img_data))
Safae Ouajihbced1042023-02-06 00:50:08 +0100454 return -EINVAL;
455
Michael Walle955415b2024-07-29 23:36:57 +0200456 if (!img_data.ramdisk_size)
457 return -ENOENT;
Neil Armstrong04ba5572024-10-17 16:44:44 +0200458 /*
459 * Android tools can generate a boot.img with default load address
460 * or 0, even though it doesn't really make a lot of sense, and it
461 * might be valid on some platforms, we treat that address as
462 * the default value for this field, and try to pass ramdisk
463 * in place if possible.
464 */
Safae Ouajih5b01a882023-02-06 00:50:13 +0100465 if (img_data.header_version > 2) {
Neil Armstrong04ba5572024-10-17 16:44:44 +0200466 /* Ramdisk can't be used in-place, copy it to ramdisk_addr_r */
467 if (img_data.ramdisk_addr == ANDROID_IMAGE_DEFAULT_RAMDISK_ADDR) {
468 ramdisk_ptr = env_get_ulong("ramdisk_addr_r", 16, 0);
469 if (!ramdisk_ptr) {
470 printf("Invalid ramdisk_addr_r to copy ramdisk into\n");
471 return -EINVAL;
472 }
473 } else {
474 ramdisk_ptr = img_data.ramdisk_addr;
475 }
476 *rd_data = ramdisk_ptr;
Safae Ouajih5b01a882023-02-06 00:50:13 +0100477 memcpy((void *)(ramdisk_ptr), (void *)img_data.vendor_ramdisk_ptr,
478 img_data.vendor_ramdisk_size);
Roman Stratiienko227b4fa2024-05-19 13:09:51 +0000479 ramdisk_ptr += img_data.vendor_ramdisk_size;
480 memcpy((void *)(ramdisk_ptr), (void *)img_data.ramdisk_ptr,
Safae Ouajih313cc842023-02-06 00:50:18 +0100481 img_data.boot_ramdisk_size);
Roman Stratiienko227b4fa2024-05-19 13:09:51 +0000482 ramdisk_ptr += img_data.boot_ramdisk_size;
Safae Ouajih313cc842023-02-06 00:50:18 +0100483 if (img_data.bootconfig_size) {
484 memcpy((void *)
Roman Stratiienko227b4fa2024-05-19 13:09:51 +0000485 (ramdisk_ptr), (void *)img_data.bootconfig_addr,
Safae Ouajih313cc842023-02-06 00:50:18 +0100486 img_data.bootconfig_size);
487 }
Mattijs Korpershoek91359972024-10-03 14:42:39 +0200488 } else {
Neil Armstrong04ba5572024-10-17 16:44:44 +0200489 /* Ramdisk can be used in-place, use current ptr */
490 if (img_data.ramdisk_addr == 0 ||
491 img_data.ramdisk_addr == ANDROID_IMAGE_DEFAULT_RAMDISK_ADDR) {
492 *rd_data = img_data.ramdisk_ptr;
493 } else {
494 ramdisk_ptr = img_data.ramdisk_addr;
495 *rd_data = ramdisk_ptr;
496 memcpy((void *)(ramdisk_ptr), (void *)img_data.ramdisk_ptr,
497 img_data.ramdisk_size);
498 }
Safae Ouajih5b01a882023-02-06 00:50:13 +0100499 }
Ahmad Draidi9a1cb5d2014-10-23 20:50:07 +0300500
Safae Ouajihbced1042023-02-06 00:50:08 +0100501 printf("RAM disk load addr 0x%08lx size %u KiB\n",
Neil Armstrong04ba5572024-10-17 16:44:44 +0200502 *rd_data, DIV_ROUND_UP(img_data.ramdisk_size, 1024));
Sebastian Siewior686d6672014-05-05 15:08:09 -0500503
Safae Ouajihbced1042023-02-06 00:50:08 +0100504 *rd_len = img_data.ramdisk_size;
Sebastian Siewior686d6672014-05-05 15:08:09 -0500505 return 0;
506}
Michael Trimarchi44af20b2016-06-10 19:54:37 +0200507
Safae Ouajih51c981b2023-02-06 00:50:17 +0100508int android_image_get_second(const void *hdr, ulong *second_data, ulong *second_len)
Bin Chen909f1402018-01-27 16:59:08 +1100509{
Safae Ouajihbced1042023-02-06 00:50:08 +0100510 struct andr_image_data img_data;
511
Safae Ouajihc60ae102023-02-06 00:50:11 +0100512 if (!android_image_get_data(hdr, NULL, &img_data))
Safae Ouajihbced1042023-02-06 00:50:08 +0100513 return -EINVAL;
514
Safae Ouajih51c981b2023-02-06 00:50:17 +0100515 if (img_data.header_version > 2) {
516 printf("Second stage bootloader is only supported for boot image version <= 2\n");
517 return -EOPNOTSUPP;
518 }
519
Safae Ouajihbced1042023-02-06 00:50:08 +0100520 if (!img_data.second_size) {
Bin Chen909f1402018-01-27 16:59:08 +1100521 *second_data = *second_len = 0;
522 return -1;
523 }
524
Safae Ouajihbced1042023-02-06 00:50:08 +0100525 *second_data = img_data.second_ptr;
Bin Chen909f1402018-01-27 16:59:08 +1100526
527 printf("second address is 0x%lx\n",*second_data);
528
Safae Ouajihbced1042023-02-06 00:50:08 +0100529 *second_len = img_data.second_size;
Bin Chen909f1402018-01-27 16:59:08 +1100530 return 0;
531}
532
Sam Protsenko4fabf402020-01-24 17:53:40 +0200533/**
Sam Protsenko2666a1a2020-01-24 17:53:41 +0200534 * android_image_get_dtbo() - Get address and size of recovery DTBO image.
535 * @hdr_addr: Boot image header address
536 * @addr: If not NULL, will contain address of recovery DTBO image
537 * @size: If not NULL, will contain size of recovery DTBO image
538 *
539 * Get the address and size of DTBO image in "Recovery DTBO" area of Android
540 * Boot Image in RAM. The format of this image is Android DTBO (see
541 * corresponding "DTB/DTBO Partitions" AOSP documentation for details). Once
542 * the address is obtained from this function, one can use 'adtimg' U-Boot
543 * command or android_dt_*() functions to extract desired DTBO blob.
544 *
545 * This DTBO (included in boot image) is only needed for non-A/B devices, and it
546 * only can be found in recovery image. On A/B devices we can always rely on
547 * "dtbo" partition. See "Including DTBO in Recovery for Non-A/B Devices" in
548 * AOSP documentation for details.
549 *
550 * Return: true on success or false on error.
551 */
552bool android_image_get_dtbo(ulong hdr_addr, ulong *addr, u32 *size)
553{
Safae Ouajih8656e382023-02-06 00:50:03 +0100554 const struct andr_boot_img_hdr_v0 *hdr;
Sam Protsenko2666a1a2020-01-24 17:53:41 +0200555 ulong dtbo_img_addr;
556 bool ret = true;
557
558 hdr = map_sysmem(hdr_addr, sizeof(*hdr));
Safae Ouajih88ad0c12023-02-06 00:50:05 +0100559 if (!is_android_boot_image_header(hdr)) {
Sam Protsenko2666a1a2020-01-24 17:53:41 +0200560 printf("Error: Boot Image header is incorrect\n");
561 ret = false;
562 goto exit;
563 }
564
Safae Ouajih8d351582023-02-06 00:50:10 +0100565 if (hdr->header_version != 1 && hdr->header_version != 2) {
566 printf("Error: header version must be >= 1 and <= 2 to get dtbo\n");
Sam Protsenko2666a1a2020-01-24 17:53:41 +0200567 ret = false;
568 goto exit;
569 }
570
571 if (hdr->recovery_dtbo_size == 0) {
572 printf("Error: recovery_dtbo_size is 0\n");
573 ret = false;
574 goto exit;
575 }
576
577 /* Calculate the address of DTB area in boot image */
578 dtbo_img_addr = hdr_addr;
579 dtbo_img_addr += hdr->page_size;
580 dtbo_img_addr += ALIGN(hdr->kernel_size, hdr->page_size);
581 dtbo_img_addr += ALIGN(hdr->ramdisk_size, hdr->page_size);
582 dtbo_img_addr += ALIGN(hdr->second_size, hdr->page_size);
583
584 if (addr)
585 *addr = dtbo_img_addr;
586 if (size)
587 *size = hdr->recovery_dtbo_size;
588
589exit:
590 unmap_sysmem(hdr);
591 return ret;
592}
593
594/**
Sam Protsenko4fabf402020-01-24 17:53:40 +0200595 * android_image_get_dtb_img_addr() - Get the address of DTB area in boot image.
596 * @hdr_addr: Boot image header address
Safae Ouajihc60ae102023-02-06 00:50:11 +0100597 * @vhdr_addr: Vendor Boot image header address
Sam Protsenko4fabf402020-01-24 17:53:40 +0200598 * @addr: Will contain the address of DTB area in boot image
599 *
600 * Return: true on success or false on fail.
601 */
Safae Ouajihc60ae102023-02-06 00:50:11 +0100602static bool android_image_get_dtb_img_addr(ulong hdr_addr, ulong vhdr_addr, ulong *addr)
Sam Protsenko4fabf402020-01-24 17:53:40 +0200603{
Safae Ouajih8656e382023-02-06 00:50:03 +0100604 const struct andr_boot_img_hdr_v0 *hdr;
Safae Ouajih9a5cc7f2023-02-06 00:50:15 +0100605 const struct andr_vnd_boot_img_hdr *v_hdr;
Sam Protsenko4fabf402020-01-24 17:53:40 +0200606 ulong dtb_img_addr;
607 bool ret = true;
608
609 hdr = map_sysmem(hdr_addr, sizeof(*hdr));
Safae Ouajih88ad0c12023-02-06 00:50:05 +0100610 if (!is_android_boot_image_header(hdr)) {
Sam Protsenko4fabf402020-01-24 17:53:40 +0200611 printf("Error: Boot Image header is incorrect\n");
612 ret = false;
613 goto exit;
614 }
615
616 if (hdr->header_version < 2) {
617 printf("Error: header_version must be >= 2 to get dtb\n");
618 ret = false;
619 goto exit;
620 }
621
Safae Ouajih9a5cc7f2023-02-06 00:50:15 +0100622 if (hdr->header_version == 2) {
623 if (!hdr->dtb_size) {
624 printf("Error: dtb_size is 0\n");
625 ret = false;
626 goto exit;
627 }
628 /* Calculate the address of DTB area in boot image */
629 dtb_img_addr = hdr_addr;
630 dtb_img_addr += hdr->page_size;
631 dtb_img_addr += ALIGN(hdr->kernel_size, hdr->page_size);
632 dtb_img_addr += ALIGN(hdr->ramdisk_size, hdr->page_size);
633 dtb_img_addr += ALIGN(hdr->second_size, hdr->page_size);
634 dtb_img_addr += ALIGN(hdr->recovery_dtbo_size, hdr->page_size);
Sam Protsenko4fabf402020-01-24 17:53:40 +0200635
Safae Ouajih9a5cc7f2023-02-06 00:50:15 +0100636 *addr = dtb_img_addr;
637 }
Sam Protsenko4fabf402020-01-24 17:53:40 +0200638
Safae Ouajih9a5cc7f2023-02-06 00:50:15 +0100639 if (hdr->header_version > 2) {
640 v_hdr = map_sysmem(vhdr_addr, sizeof(*v_hdr));
641 if (!v_hdr->dtb_size) {
642 printf("Error: dtb_size is 0\n");
643 ret = false;
644 unmap_sysmem(v_hdr);
645 goto exit;
646 }
647 /* Calculate the address of DTB area in boot image */
648 dtb_img_addr = vhdr_addr;
649 dtb_img_addr += v_hdr->page_size;
650 if (v_hdr->vendor_ramdisk_size)
651 dtb_img_addr += ALIGN(v_hdr->vendor_ramdisk_size, v_hdr->page_size);
652 *addr = dtb_img_addr;
653 unmap_sysmem(v_hdr);
654 goto exit;
655 }
Sam Protsenko4fabf402020-01-24 17:53:40 +0200656exit:
657 unmap_sysmem(hdr);
658 return ret;
659}
660
661/**
662 * android_image_get_dtb_by_index() - Get address and size of blob in DTB area.
663 * @hdr_addr: Boot image header address
Safae Ouajihc60ae102023-02-06 00:50:11 +0100664 * @vendor_boot_img: Pointer to vendor boot image header, which is at the start of the image.
Sam Protsenko4fabf402020-01-24 17:53:40 +0200665 * @index: Index of desired DTB in DTB area (starting from 0)
666 * @addr: If not NULL, will contain address to specified DTB
667 * @size: If not NULL, will contain size of specified DTB
668 *
669 * Get the address and size of DTB blob by its index in DTB area of Android
670 * Boot Image in RAM.
671 *
672 * Return: true on success or false on error.
673 */
Safae Ouajihc60ae102023-02-06 00:50:11 +0100674bool android_image_get_dtb_by_index(ulong hdr_addr, ulong vendor_boot_img,
675 u32 index, ulong *addr, u32 *size)
Sam Protsenko4fabf402020-01-24 17:53:40 +0200676{
Safae Ouajihbced1042023-02-06 00:50:08 +0100677 struct andr_image_data img_data;
Safae Ouajih8656e382023-02-06 00:50:03 +0100678 const struct andr_boot_img_hdr_v0 *hdr;
Safae Ouajihc60ae102023-02-06 00:50:11 +0100679 const struct andr_vnd_boot_img_hdr *vhdr;
Safae Ouajihbced1042023-02-06 00:50:08 +0100680
681 hdr = map_sysmem(hdr_addr, sizeof(*hdr));
Safae Ouajihc60ae102023-02-06 00:50:11 +0100682 if (vendor_boot_img != -1)
683 vhdr = map_sysmem(vendor_boot_img, sizeof(*vhdr));
684 if (!android_image_get_data(hdr, vhdr, &img_data)) {
685 if (vendor_boot_img != -1)
686 unmap_sysmem(vhdr);
Safae Ouajihbced1042023-02-06 00:50:08 +0100687 unmap_sysmem(hdr);
688 return false;
689 }
Safae Ouajihc60ae102023-02-06 00:50:11 +0100690 if (vendor_boot_img != -1)
691 unmap_sysmem(vhdr);
Safae Ouajihbced1042023-02-06 00:50:08 +0100692 unmap_sysmem(hdr);
693
Sam Protsenko4fabf402020-01-24 17:53:40 +0200694 ulong dtb_img_addr; /* address of DTB part in boot image */
695 u32 dtb_img_size; /* size of DTB payload in boot image */
696 ulong dtb_addr; /* address of DTB blob with specified index */
697 u32 i; /* index iterator */
698
Safae Ouajihc60ae102023-02-06 00:50:11 +0100699 android_image_get_dtb_img_addr(hdr_addr, vendor_boot_img, &dtb_img_addr);
Sam Protsenko4fabf402020-01-24 17:53:40 +0200700 /* Check if DTB area of boot image is in DTBO format */
701 if (android_dt_check_header(dtb_img_addr)) {
702 return android_dt_get_fdt_by_index(dtb_img_addr, index, addr,
703 size);
704 }
705
706 /* Find out the address of DTB with specified index in concat blobs */
Safae Ouajihbced1042023-02-06 00:50:08 +0100707 dtb_img_size = img_data.dtb_size;
Sam Protsenko4fabf402020-01-24 17:53:40 +0200708 i = 0;
709 dtb_addr = dtb_img_addr;
710 while (dtb_addr < dtb_img_addr + dtb_img_size) {
711 const struct fdt_header *fdt;
712 u32 dtb_size;
713
714 fdt = map_sysmem(dtb_addr, sizeof(*fdt));
715 if (fdt_check_header(fdt) != 0) {
716 unmap_sysmem(fdt);
717 printf("Error: Invalid FDT header for index %u\n", i);
718 return false;
719 }
720
721 dtb_size = fdt_totalsize(fdt);
722 unmap_sysmem(fdt);
723
724 if (i == index) {
725 if (size)
726 *size = dtb_size;
727 if (addr)
728 *addr = dtb_addr;
729 return true;
730 }
731
732 dtb_addr += dtb_size;
733 ++i;
734 }
735
736 printf("Error: Index is out of bounds (%u/%u)\n", index, i);
737 return false;
738}
739
Simon Glass0e84d962024-09-29 19:49:50 -0600740#if !defined(CONFIG_XPL_BUILD)
Michael Trimarchi44af20b2016-06-10 19:54:37 +0200741/**
742 * android_print_contents - prints out the contents of the Android format image
743 * @hdr: pointer to the Android format image header
744 *
745 * android_print_contents() formats a multi line Android image contents
746 * description.
747 * The routine prints out Android image properties
748 *
749 * returns:
750 * no returned results
751 */
Safae Ouajih8656e382023-02-06 00:50:03 +0100752void android_print_contents(const struct andr_boot_img_hdr_v0 *hdr)
Michael Trimarchi44af20b2016-06-10 19:54:37 +0200753{
Safae Ouajiha148a822023-02-06 00:50:09 +0100754 if (hdr->header_version >= 3) {
755 printf("Content print is not supported for boot image header version > 2");
756 return;
757 }
Michael Trimarchi44af20b2016-06-10 19:54:37 +0200758 const char * const p = IMAGE_INDENT_STRING;
Alex Deymo41f513a2017-04-02 01:49:47 -0700759 /* os_version = ver << 11 | lvl */
760 u32 os_ver = hdr->os_version >> 11;
761 u32 os_lvl = hdr->os_version & ((1U << 11) - 1);
Michael Trimarchi44af20b2016-06-10 19:54:37 +0200762
Sam Protsenko9e4982c2019-08-15 20:25:07 +0300763 printf("%skernel size: %x\n", p, hdr->kernel_size);
764 printf("%skernel address: %x\n", p, hdr->kernel_addr);
765 printf("%sramdisk size: %x\n", p, hdr->ramdisk_size);
766 printf("%sramdisk address: %x\n", p, hdr->ramdisk_addr);
767 printf("%ssecond size: %x\n", p, hdr->second_size);
768 printf("%ssecond address: %x\n", p, hdr->second_addr);
769 printf("%stags address: %x\n", p, hdr->tags_addr);
770 printf("%spage size: %x\n", p, hdr->page_size);
Alex Deymo41f513a2017-04-02 01:49:47 -0700771 /* ver = A << 14 | B << 7 | C (7 bits for each of A, B, C)
772 * lvl = ((Y - 2000) & 127) << 4 | M (7 bits for Y, 4 bits for M) */
Sam Protsenko9e4982c2019-08-15 20:25:07 +0300773 printf("%sos_version: %x (ver: %u.%u.%u, level: %u.%u)\n",
Alex Deymo41f513a2017-04-02 01:49:47 -0700774 p, hdr->os_version,
775 (os_ver >> 7) & 0x7F, (os_ver >> 14) & 0x7F, os_ver & 0x7F,
776 (os_lvl >> 4) + 2000, os_lvl & 0x0F);
Sam Protsenko9e4982c2019-08-15 20:25:07 +0300777 printf("%sname: %s\n", p, hdr->name);
778 printf("%scmdline: %s\n", p, hdr->cmdline);
779 printf("%sheader_version: %d\n", p, hdr->header_version);
780
781 if (hdr->header_version >= 1) {
782 printf("%srecovery dtbo size: %x\n", p,
783 hdr->recovery_dtbo_size);
784 printf("%srecovery dtbo offset: %llx\n", p,
785 hdr->recovery_dtbo_offset);
786 printf("%sheader size: %x\n", p,
787 hdr->header_size);
788 }
789
Safae Ouajiha148a822023-02-06 00:50:09 +0100790 if (hdr->header_version == 2) {
Sam Protsenko9e4982c2019-08-15 20:25:07 +0300791 printf("%sdtb size: %x\n", p, hdr->dtb_size);
792 printf("%sdtb addr: %llx\n", p, hdr->dtb_addr);
793 }
Sam Protsenko4fabf402020-01-24 17:53:40 +0200794}
795
796/**
797 * android_image_print_dtb_info - Print info for one DTB blob in DTB area.
798 * @fdt: DTB header
799 * @index: Number of DTB blob in DTB area.
800 *
801 * Return: true on success or false on error.
802 */
803static bool android_image_print_dtb_info(const struct fdt_header *fdt,
804 u32 index)
805{
806 int root_node_off;
807 u32 fdt_size;
808 const char *model;
809 const char *compatible;
810
811 root_node_off = fdt_path_offset(fdt, "/");
812 if (root_node_off < 0) {
813 printf("Error: Root node not found\n");
814 return false;
815 }
816
817 fdt_size = fdt_totalsize(fdt);
818 compatible = fdt_getprop(fdt, root_node_off, "compatible",
819 NULL);
820 model = fdt_getprop(fdt, root_node_off, "model", NULL);
821
822 printf(" - DTB #%u:\n", index);
823 printf(" (DTB)size = %d\n", fdt_size);
824 printf(" (DTB)model = %s\n", model ? model : "(unknown)");
825 printf(" (DTB)compatible = %s\n",
826 compatible ? compatible : "(unknown)");
827
828 return true;
829}
830
831/**
832 * android_image_print_dtb_contents() - Print info for DTB blobs in DTB area.
833 * @hdr_addr: Boot image header address
834 *
835 * DTB payload in Android Boot Image v2+ can be in one of following formats:
836 * 1. Concatenated DTB blobs
837 * 2. Android DTBO format (see CONFIG_CMD_ADTIMG for details)
838 *
839 * This function does next:
840 * 1. Prints out the format used in DTB area
841 * 2. Iterates over all DTB blobs in DTB area and prints out the info for
842 * each blob.
843 *
844 * Return: true on success or false on error.
845 */
846bool android_image_print_dtb_contents(ulong hdr_addr)
847{
Safae Ouajih8656e382023-02-06 00:50:03 +0100848 const struct andr_boot_img_hdr_v0 *hdr;
Sam Protsenko4fabf402020-01-24 17:53:40 +0200849 bool res;
850 ulong dtb_img_addr; /* address of DTB part in boot image */
851 u32 dtb_img_size; /* size of DTB payload in boot image */
852 ulong dtb_addr; /* address of DTB blob with specified index */
853 u32 i; /* index iterator */
854
Safae Ouajihc60ae102023-02-06 00:50:11 +0100855 res = android_image_get_dtb_img_addr(hdr_addr, 0, &dtb_img_addr);
Sam Protsenko4fabf402020-01-24 17:53:40 +0200856 if (!res)
857 return false;
858
859 /* Check if DTB area of boot image is in DTBO format */
860 if (android_dt_check_header(dtb_img_addr)) {
861 printf("## DTB area contents (DTBO format):\n");
862 android_dt_print_contents(dtb_img_addr);
863 return true;
864 }
865
866 printf("## DTB area contents (concat format):\n");
867
868 /* Iterate over concatenated DTB blobs */
869 hdr = map_sysmem(hdr_addr, sizeof(*hdr));
870 dtb_img_size = hdr->dtb_size;
871 unmap_sysmem(hdr);
872 i = 0;
873 dtb_addr = dtb_img_addr;
874 while (dtb_addr < dtb_img_addr + dtb_img_size) {
875 const struct fdt_header *fdt;
876 u32 dtb_size;
877
878 fdt = map_sysmem(dtb_addr, sizeof(*fdt));
879 if (fdt_check_header(fdt) != 0) {
880 unmap_sysmem(fdt);
881 printf("Error: Invalid FDT header for index %u\n", i);
882 return false;
883 }
884
885 res = android_image_print_dtb_info(fdt, i);
886 if (!res) {
887 unmap_sysmem(fdt);
888 return false;
889 }
890
891 dtb_size = fdt_totalsize(fdt);
892 unmap_sysmem(fdt);
893 dtb_addr += dtb_size;
894 ++i;
895 }
896
897 return true;
Michael Trimarchi44af20b2016-06-10 19:54:37 +0200898}
899#endif