blob: 6eb1e5fe25f3bc544a58c79d2309764ab9cd5a94 [file] [log] [blame]
developeraf92c9a2022-06-13 11:42:18 +08001RAMFS_COPY_BIN='mkfs.f2fs blkid blockdev fw_printenv fw_setenv'
developer19d212a2022-07-01 10:15:25 +08002RAMFS_COPY_DATA="/etc/fw_env.config /var/lock/fw_printenv.lock"
developer6747cdd2021-09-29 17:00:51 +08003platform_do_upgrade() {
4 local board=$(board_name)
5
6 case "$board" in
7 *snand*)
developeraf92c9a2022-06-13 11:42:18 +08008 ubi_do_upgrade "$1"
developer6747cdd2021-09-29 17:00:51 +08009 ;;
developerd3cc7552021-12-12 23:29:45 +080010 *emmc*)
11 mtk_mmc_do_upgrade "$1"
12 ;;
13 *)
developer6747cdd2021-09-29 17:00:51 +080014 default_do_upgrade "$1"
15 ;;
16 esac
17}
18
19PART_NAME=firmware
20
21platform_check_image() {
22 local board=$(board_name)
23 local magic="$(get_magic_long "$1")"
24
25 [ "$#" -gt 1 ] && return 1
26
27 case "$board" in
developer7bf5a412022-01-10 11:52:53 +080028 *snand* |\
developerd3cc7552021-12-12 23:29:45 +080029 *emmc*)
developer6747cdd2021-09-29 17:00:51 +080030 # tar magic `ustar`
31 magic="$(dd if="$1" bs=1 skip=257 count=5 2>/dev/null)"
32
33 [ "$magic" != "ustar" ] && {
34 echo "Invalid image type."
35 return 1
36 }
37
38 return 0
39 ;;
40 *)
41 [ "$magic" != "d00dfeed" ] && {
42 echo "Invalid image type."
43 return 1
44 }
45 return 0
46 ;;
47 esac
48
49 return 0
50}
51