blob: bd38b22e58b58b2363a8c3fe220c27f205beeaa1 [file] [log] [blame]
developer01dcd472022-02-10 10:30:49 +08001RAMFS_COPY_BIN='mkfs.f2fs blkid blockdev fw_printenv fw_setenv'
2RAMFS_COPY_DATA="/etc/fw_env.config /var/lock/fw_printenv.lock"
developer8262b0d2021-11-12 09:02:17 +08003
developerfd40db22021-04-29 10:08:25 +08004platform_do_upgrade() {
5 local board=$(board_name)
6
7 case "$board" in
developer3395eb42021-06-15 16:01:34 +08008 *snand*)
developer97370402022-06-13 11:20:05 +08009 ubi_do_upgrade "$1"
developerfd40db22021-04-29 10:08:25 +080010 ;;
developer8262b0d2021-11-12 09:02:17 +080011 *emmc*)
12 mtk_mmc_do_upgrade "$1"
13 ;;
developerfd40db22021-04-29 10:08:25 +080014 *)
15 default_do_upgrade "$1"
16 ;;
17 esac
18}
19
20PART_NAME=firmware
21
22platform_check_image() {
23 local board=$(board_name)
24 local magic="$(get_magic_long "$1")"
25
26 [ "$#" -gt 1 ] && return 1
27
28 case "$board" in
developer8262b0d2021-11-12 09:02:17 +080029 *snand* |\
30 *emmc*)
developerfd40db22021-04-29 10:08:25 +080031 # tar magic `ustar`
32 magic="$(dd if="$1" bs=1 skip=257 count=5 2>/dev/null)"
33
34 [ "$magic" != "ustar" ] && {
35 echo "Invalid image type."
36 return 1
37 }
38
39 return 0
40 ;;
41 *)
42 [ "$magic" != "d00dfeed" ] && {
43 echo "Invalid image type."
44 return 1
45 }
46 return 0
47 ;;
48 esac
49
50 return 0
51}