]>
Commit | Line | Data |
---|---|---|
83d290c5 | 1 | // SPDX-License-Identifier: GPL-2.0+ |
b6396403 SG |
2 | /* |
3 | * (C) Copyright 2000-2009 | |
4 | * Wolfgang Denk, DENX Software Engineering, [email protected]. | |
b6396403 SG |
5 | */ |
6 | ||
ea51a628 | 7 | #ifndef USE_HOSTCC |
b6396403 | 8 | #include <common.h> |
ea51a628 | 9 | #include <bootstage.h> |
1eb69ae4 | 10 | #include <cpu_func.h> |
c7694dd4 | 11 | #include <env.h> |
90268b87 | 12 | #include <errno.h> |
b6396403 | 13 | #include <fdt_support.h> |
36bf446b | 14 | #include <irq_func.h> |
b6396403 SG |
15 | #include <lmb.h> |
16 | #include <malloc.h> | |
0eb25b61 | 17 | #include <mapmem.h> |
90526e9f SG |
18 | #include <net.h> |
19 | #include <asm/cache.h> | |
b6396403 | 20 | #include <asm/io.h> |
b6396403 SG |
21 | #if defined(CONFIG_CMD_USB) |
22 | #include <usb.h> | |
23 | #endif | |
ea51a628 SG |
24 | #else |
25 | #include "mkimage.h" | |
26 | #endif | |
b6396403 | 27 | |
ea51a628 SG |
28 | #include <command.h> |
29 | #include <bootm.h> | |
30 | #include <image.h> | |
b6396403 SG |
31 | |
32 | #ifndef CONFIG_SYS_BOOTM_LEN | |
33 | /* use 8MByte as default max gunzip size */ | |
34 | #define CONFIG_SYS_BOOTM_LEN 0x800000 | |
35 | #endif | |
36 | ||
37 | #define IH_INITRD_ARCH IH_ARCH_DEFAULT | |
38 | ||
ea51a628 SG |
39 | #ifndef USE_HOSTCC |
40 | ||
41 | DECLARE_GLOBAL_DATA_PTR; | |
42 | ||
5db28905 TR |
43 | bootm_headers_t images; /* pointers to os/initrd/fdt images */ |
44 | ||
b6396403 SG |
45 | static const void *boot_get_kernel(cmd_tbl_t *cmdtp, int flag, int argc, |
46 | char * const argv[], bootm_headers_t *images, | |
47 | ulong *os_data, ulong *os_len); | |
48 | ||
329da485 SG |
49 | __weak void board_quiesce_devices(void) |
50 | { | |
51 | } | |
52 | ||
b6396403 SG |
53 | #ifdef CONFIG_LMB |
54 | static void boot_start_lmb(bootm_headers_t *images) | |
55 | { | |
56 | ulong mem_start; | |
57 | phys_size_t mem_size; | |
58 | ||
723806cc SG |
59 | mem_start = env_get_bootm_low(); |
60 | mem_size = env_get_bootm_size(); | |
b6396403 | 61 | |
9cc2323f SG |
62 | lmb_init_and_reserve_range(&images->lmb, (phys_addr_t)mem_start, |
63 | mem_size, NULL); | |
b6396403 SG |
64 | } |
65 | #else | |
66 | #define lmb_reserve(lmb, base, size) | |
67 | static inline void boot_start_lmb(bootm_headers_t *images) { } | |
68 | #endif | |
69 | ||
70 | static int bootm_start(cmd_tbl_t *cmdtp, int flag, int argc, | |
71 | char * const argv[]) | |
72 | { | |
73 | memset((void *)&images, 0, sizeof(images)); | |
bfebc8c9 | 74 | images.verify = env_get_yesno("verify"); |
b6396403 SG |
75 | |
76 | boot_start_lmb(&images); | |
77 | ||
78 | bootstage_mark_name(BOOTSTAGE_ID_BOOTM_START, "bootm_start"); | |
79 | images.state = BOOTM_STATE_START; | |
80 | ||
81 | return 0; | |
82 | } | |
83 | ||
84 | static int bootm_find_os(cmd_tbl_t *cmdtp, int flag, int argc, | |
85 | char * const argv[]) | |
86 | { | |
87 | const void *os_hdr; | |
88 | bool ep_found = false; | |
90268b87 | 89 | int ret; |
b6396403 SG |
90 | |
91 | /* get kernel image header, start address and length */ | |
92 | os_hdr = boot_get_kernel(cmdtp, flag, argc, argv, | |
93 | &images, &images.os.image_start, &images.os.image_len); | |
94 | if (images.os.image_len == 0) { | |
95 | puts("ERROR: can't get kernel image!\n"); | |
96 | return 1; | |
97 | } | |
98 | ||
99 | /* get image parameters */ | |
100 | switch (genimg_get_format(os_hdr)) { | |
c76c93a3 | 101 | #if CONFIG_IS_ENABLED(LEGACY_IMAGE_FORMAT) |
b6396403 SG |
102 | case IMAGE_FORMAT_LEGACY: |
103 | images.os.type = image_get_type(os_hdr); | |
104 | images.os.comp = image_get_comp(os_hdr); | |
105 | images.os.os = image_get_os(os_hdr); | |
106 | ||
107 | images.os.end = image_get_image_end(os_hdr); | |
108 | images.os.load = image_get_load(os_hdr); | |
90268b87 | 109 | images.os.arch = image_get_arch(os_hdr); |
b6396403 SG |
110 | break; |
111 | #endif | |
73223f0e | 112 | #if IMAGE_ENABLE_FIT |
b6396403 SG |
113 | case IMAGE_FORMAT_FIT: |
114 | if (fit_image_get_type(images.fit_hdr_os, | |
115 | images.fit_noffset_os, | |
116 | &images.os.type)) { | |
117 | puts("Can't get image type!\n"); | |
118 | bootstage_error(BOOTSTAGE_ID_FIT_TYPE); | |
119 | return 1; | |
120 | } | |
121 | ||
122 | if (fit_image_get_comp(images.fit_hdr_os, | |
123 | images.fit_noffset_os, | |
124 | &images.os.comp)) { | |
125 | puts("Can't get image compression!\n"); | |
126 | bootstage_error(BOOTSTAGE_ID_FIT_COMPRESSION); | |
127 | return 1; | |
128 | } | |
129 | ||
130 | if (fit_image_get_os(images.fit_hdr_os, images.fit_noffset_os, | |
131 | &images.os.os)) { | |
132 | puts("Can't get image OS!\n"); | |
133 | bootstage_error(BOOTSTAGE_ID_FIT_OS); | |
134 | return 1; | |
135 | } | |
136 | ||
90268b87 SG |
137 | if (fit_image_get_arch(images.fit_hdr_os, |
138 | images.fit_noffset_os, | |
139 | &images.os.arch)) { | |
140 | puts("Can't get image ARCH!\n"); | |
141 | return 1; | |
142 | } | |
143 | ||
b6396403 SG |
144 | images.os.end = fit_get_end(images.fit_hdr_os); |
145 | ||
146 | if (fit_image_get_load(images.fit_hdr_os, images.fit_noffset_os, | |
147 | &images.os.load)) { | |
148 | puts("Can't get image load address!\n"); | |
149 | bootstage_error(BOOTSTAGE_ID_FIT_LOADADDR); | |
150 | return 1; | |
151 | } | |
152 | break; | |
153 | #endif | |
154 | #ifdef CONFIG_ANDROID_BOOT_IMAGE | |
155 | case IMAGE_FORMAT_ANDROID: | |
156 | images.os.type = IH_TYPE_KERNEL; | |
829ceb28 | 157 | images.os.comp = android_image_get_kcomp(os_hdr); |
b6396403 | 158 | images.os.os = IH_OS_LINUX; |
b6396403 SG |
159 | |
160 | images.os.end = android_image_get_end(os_hdr); | |
161 | images.os.load = android_image_get_kload(os_hdr); | |
86f4695b AD |
162 | images.ep = images.os.load; |
163 | ep_found = true; | |
b6396403 SG |
164 | break; |
165 | #endif | |
166 | default: | |
167 | puts("ERROR: unknown image format type!\n"); | |
168 | return 1; | |
169 | } | |
170 | ||
90268b87 | 171 | /* If we have a valid setup.bin, we will use that for entry (x86) */ |
5bda35cf SG |
172 | if (images.os.arch == IH_ARCH_I386 || |
173 | images.os.arch == IH_ARCH_X86_64) { | |
90268b87 SG |
174 | ulong len; |
175 | ||
176 | ret = boot_get_setup(&images, IH_ARCH_I386, &images.ep, &len); | |
177 | if (ret < 0 && ret != -ENOENT) { | |
178 | puts("Could not find a valid setup.bin for x86\n"); | |
179 | return 1; | |
180 | } | |
181 | /* Kernel entry point is the setup.bin */ | |
182 | } else if (images.legacy_hdr_valid) { | |
b6396403 | 183 | images.ep = image_get_ep(&images.legacy_hdr_os_copy); |
73223f0e | 184 | #if IMAGE_ENABLE_FIT |
b6396403 SG |
185 | } else if (images.fit_uname_os) { |
186 | int ret; | |
187 | ||
188 | ret = fit_image_get_entry(images.fit_hdr_os, | |
189 | images.fit_noffset_os, &images.ep); | |
190 | if (ret) { | |
191 | puts("Can't get entry point property!\n"); | |
192 | return 1; | |
193 | } | |
194 | #endif | |
195 | } else if (!ep_found) { | |
196 | puts("Could not find kernel entry point!\n"); | |
197 | return 1; | |
198 | } | |
199 | ||
200 | if (images.os.type == IH_TYPE_KERNEL_NOLOAD) { | |
487b5fa6 MV |
201 | if (CONFIG_IS_ENABLED(CMD_BOOTI) && |
202 | images.os.arch == IH_ARCH_ARM64) { | |
203 | ulong image_addr; | |
204 | ulong image_size; | |
205 | ||
206 | ret = booti_setup(images.os.image_start, &image_addr, | |
207 | &image_size, true); | |
208 | if (ret != 0) | |
209 | return 1; | |
210 | ||
211 | images.os.type = IH_TYPE_KERNEL; | |
212 | images.os.load = image_addr; | |
213 | images.ep = image_addr; | |
214 | } else { | |
215 | images.os.load = images.os.image_start; | |
216 | images.ep += images.os.image_start; | |
217 | } | |
b6396403 SG |
218 | } |
219 | ||
7a80de46 | 220 | images.os.start = map_to_sysmem(os_hdr); |
b6396403 SG |
221 | |
222 | return 0; | |
223 | } | |
224 | ||
d52e8575 KA |
225 | /** |
226 | * bootm_find_images - wrapper to find and locate various images | |
227 | * @flag: Ignored Argument | |
228 | * @argc: command argument count | |
229 | * @argv: command argument list | |
230 | * | |
231 | * boot_find_images() will attempt to load an available ramdisk, | |
232 | * flattened device tree, as well as specifically marked | |
233 | * "loadable" images (loadables are FIT only) | |
234 | * | |
235 | * Note: bootm_find_images will skip an image if it is not found | |
236 | * | |
237 | * @return: | |
238 | * 0, if all existing images were loaded correctly | |
239 | * 1, if an image is found but corrupted, or invalid | |
240 | */ | |
241 | int bootm_find_images(int flag, int argc, char * const argv[]) | |
b6396403 SG |
242 | { |
243 | int ret; | |
244 | ||
245 | /* find ramdisk */ | |
246 | ret = boot_get_ramdisk(argc, argv, &images, IH_INITRD_ARCH, | |
247 | &images.rd_start, &images.rd_end); | |
248 | if (ret) { | |
249 | puts("Ramdisk image is corrupt or invalid\n"); | |
250 | return 1; | |
251 | } | |
252 | ||
aa34fbc0 | 253 | #if IMAGE_ENABLE_OF_LIBFDT |
b6396403 SG |
254 | /* find flattened device tree */ |
255 | ret = boot_get_fdt(flag, argc, argv, IH_ARCH_DEFAULT, &images, | |
256 | &images.ft_addr, &images.ft_len); | |
257 | if (ret) { | |
258 | puts("Could not find a valid device tree\n"); | |
259 | return 1; | |
260 | } | |
596be5f3 SG |
261 | if (CONFIG_IS_ENABLED(CMD_FDT)) |
262 | set_working_fdt_addr(map_to_sysmem(images.ft_addr)); | |
b6396403 SG |
263 | #endif |
264 | ||
73223f0e | 265 | #if IMAGE_ENABLE_FIT |
8b93a92f | 266 | #if defined(CONFIG_FPGA) |
62afc601 MS |
267 | /* find bitstreams */ |
268 | ret = boot_get_fpga(argc, argv, &images, IH_ARCH_DEFAULT, | |
269 | NULL, NULL); | |
270 | if (ret) { | |
271 | printf("FPGA image is corrupted or invalid\n"); | |
272 | return 1; | |
273 | } | |
274 | #endif | |
275 | ||
84a07dbf KA |
276 | /* find all of the loadables */ |
277 | ret = boot_get_loadable(argc, argv, &images, IH_ARCH_DEFAULT, | |
278 | NULL, NULL); | |
279 | if (ret) { | |
280 | printf("Loadable(s) is corrupt or invalid\n"); | |
281 | return 1; | |
282 | } | |
84a07dbf KA |
283 | #endif |
284 | ||
b6396403 SG |
285 | return 0; |
286 | } | |
287 | ||
288 | static int bootm_find_other(cmd_tbl_t *cmdtp, int flag, int argc, | |
289 | char * const argv[]) | |
290 | { | |
291 | if (((images.os.type == IH_TYPE_KERNEL) || | |
292 | (images.os.type == IH_TYPE_KERNEL_NOLOAD) || | |
293 | (images.os.type == IH_TYPE_MULTI)) && | |
294 | (images.os.os == IH_OS_LINUX || | |
295 | images.os.os == IH_OS_VXWORKS)) | |
d52e8575 | 296 | return bootm_find_images(flag, argc, argv); |
b6396403 SG |
297 | |
298 | return 0; | |
299 | } | |
40e5975f SG |
300 | #endif /* USE_HOSTC */ |
301 | ||
2090854c | 302 | #if !defined(USE_HOSTCC) || defined(CONFIG_FIT_SIGNATURE) |
3086c055 SG |
303 | /** |
304 | * handle_decomp_error() - display a decompression error | |
305 | * | |
306 | * This function tries to produce a useful message. In the case where the | |
307 | * uncompressed size is the same as the available space, we can assume that | |
308 | * the image is too large for the buffer. | |
309 | * | |
310 | * @comp_type: Compression type being used (IH_COMP_...) | |
311 | * @uncomp_size: Number of bytes uncompressed | |
2090854c JW |
312 | * @ret: errno error code received from compression library |
313 | * @return Appropriate BOOTM_ERR_ error code | |
3086c055 | 314 | */ |
2090854c | 315 | static int handle_decomp_error(int comp_type, size_t uncomp_size, int ret) |
40e5975f | 316 | { |
3086c055 SG |
317 | const char *name = genimg_get_comp_name(comp_type); |
318 | ||
2090854c JW |
319 | /* ENOSYS means unimplemented compression type, don't reset. */ |
320 | if (ret == -ENOSYS) | |
321 | return BOOTM_ERR_UNIMPLEMENTED; | |
322 | ||
323 | if (uncomp_size >= CONFIG_SYS_BOOTM_LEN) | |
3086c055 | 324 | printf("Image too large: increase CONFIG_SYS_BOOTM_LEN\n"); |
40e5975f | 325 | else |
3086c055 SG |
326 | printf("%s: uncompress error %d\n", name, ret); |
327 | ||
328 | /* | |
329 | * The decompression routines are now safe, so will not write beyond | |
330 | * their bounds. Probably it is not necessary to reset, but maintain | |
331 | * the current behaviour for now. | |
332 | */ | |
333 | printf("Must RESET board to recover\n"); | |
40e5975f SG |
334 | #ifndef USE_HOSTCC |
335 | bootstage_error(BOOTSTAGE_ID_DECOMP_IMAGE); | |
336 | #endif | |
337 | ||
338 | return BOOTM_ERR_RESET; | |
339 | } | |
2090854c | 340 | #endif |
2b164f1c | 341 | |
ce1400f6 | 342 | #ifndef USE_HOSTCC |
cc955358 | 343 | static int bootm_load_os(bootm_headers_t *images, int boot_progress) |
2b164f1c SG |
344 | { |
345 | image_info_t os = images->os; | |
346 | ulong load = os.load; | |
cc955358 | 347 | ulong load_end; |
2b164f1c SG |
348 | ulong blob_start = os.start; |
349 | ulong blob_end = os.end; | |
350 | ulong image_start = os.image_start; | |
351 | ulong image_len = os.image_len; | |
bbac9222 | 352 | ulong flush_start = ALIGN_DOWN(load, ARCH_DMA_MINALIGN); |
2b164f1c SG |
353 | bool no_overlap; |
354 | void *load_buf, *image_buf; | |
355 | int err; | |
356 | ||
357 | load_buf = map_sysmem(load, 0); | |
358 | image_buf = map_sysmem(os.image_start, image_len); | |
2090854c JW |
359 | err = image_decomp(os.comp, load, os.image_start, os.type, |
360 | load_buf, image_buf, image_len, | |
361 | CONFIG_SYS_BOOTM_LEN, &load_end); | |
2b164f1c | 362 | if (err) { |
2090854c | 363 | err = handle_decomp_error(os.comp, load_end - load, err); |
2b164f1c SG |
364 | bootstage_error(BOOTSTAGE_ID_DECOMP_IMAGE); |
365 | return err; | |
366 | } | |
bbac9222 | 367 | |
b4353b37 | 368 | flush_cache(flush_start, ALIGN(load_end, ARCH_DMA_MINALIGN) - flush_start); |
b6396403 | 369 | |
cc955358 | 370 | debug(" kernel loaded at 0x%08lx, end = 0x%08lx\n", load, load_end); |
b6396403 SG |
371 | bootstage_mark(BOOTSTAGE_ID_KERNEL_LOADED); |
372 | ||
2b164f1c SG |
373 | no_overlap = (os.comp == IH_COMP_NONE && load == image_start); |
374 | ||
cc955358 | 375 | if (!no_overlap && load < blob_end && load_end > blob_start) { |
b6396403 SG |
376 | debug("images.os.start = 0x%lX, images.os.end = 0x%lx\n", |
377 | blob_start, blob_end); | |
378 | debug("images.os.load = 0x%lx, load_end = 0x%lx\n", load, | |
cc955358 | 379 | load_end); |
b6396403 SG |
380 | |
381 | /* Check what type of image this is. */ | |
382 | if (images->legacy_hdr_valid) { | |
383 | if (image_get_type(&images->legacy_hdr_os_copy) | |
384 | == IH_TYPE_MULTI) | |
385 | puts("WARNING: legacy format multi component image overwritten\n"); | |
386 | return BOOTM_ERR_OVERLAP; | |
387 | } else { | |
388 | puts("ERROR: new format image overwritten - must RESET the board to recover\n"); | |
389 | bootstage_error(BOOTSTAGE_ID_OVERWRITTEN); | |
390 | return BOOTM_ERR_RESET; | |
391 | } | |
392 | } | |
393 | ||
cc955358 TR |
394 | lmb_reserve(&images->lmb, images->os.load, (load_end - |
395 | images->os.load)); | |
b6396403 SG |
396 | return 0; |
397 | } | |
398 | ||
399 | /** | |
400 | * bootm_disable_interrupts() - Disable interrupts in preparation for load/boot | |
401 | * | |
402 | * @return interrupt flag (0 if interrupts were disabled, non-zero if they were | |
403 | * enabled) | |
404 | */ | |
405 | ulong bootm_disable_interrupts(void) | |
406 | { | |
407 | ulong iflag; | |
408 | ||
409 | /* | |
410 | * We have reached the point of no return: we are going to | |
411 | * overwrite all exception vector code, so we cannot easily | |
412 | * recover from any failures any more... | |
413 | */ | |
414 | iflag = disable_interrupts(); | |
415 | #ifdef CONFIG_NETCONSOLE | |
416 | /* Stop the ethernet stack if NetConsole could have left it up */ | |
417 | eth_halt(); | |
4917c061 | 418 | # ifndef CONFIG_DM_ETH |
b6396403 | 419 | eth_unregister(eth_get_dev()); |
4917c061 | 420 | # endif |
b6396403 SG |
421 | #endif |
422 | ||
423 | #if defined(CONFIG_CMD_USB) | |
424 | /* | |
425 | * turn off USB to prevent the host controller from writing to the | |
426 | * SDRAM while Linux is booting. This could happen (at least for OHCI | |
427 | * controller), because the HCCA (Host Controller Communication Area) | |
428 | * lies within the SDRAM and the host controller writes continously to | |
429 | * this area (as busmaster!). The HccaFrameNumber is for example | |
430 | * updated every 1 ms within the HCCA structure in SDRAM! For more | |
431 | * details see the OpenHCI specification. | |
432 | */ | |
433 | usb_stop(); | |
434 | #endif | |
435 | return iflag; | |
436 | } | |
437 | ||
438 | #if defined(CONFIG_SILENT_CONSOLE) && !defined(CONFIG_SILENT_U_BOOT_ONLY) | |
439 | ||
440 | #define CONSOLE_ARG "console=" | |
441 | #define CONSOLE_ARG_LEN (sizeof(CONSOLE_ARG) - 1) | |
442 | ||
443 | static void fixup_silent_linux(void) | |
444 | { | |
445 | char *buf; | |
446 | const char *env_val; | |
00caae6d | 447 | char *cmdline = env_get("bootargs"); |
b6396403 SG |
448 | int want_silent; |
449 | ||
450 | /* | |
451 | * Only fix cmdline when requested. The environment variable can be: | |
452 | * | |
453 | * no - we never fixup | |
454 | * yes - we always fixup | |
455 | * unset - we rely on the console silent flag | |
456 | */ | |
bfebc8c9 | 457 | want_silent = env_get_yesno("silent_linux"); |
b6396403 SG |
458 | if (want_silent == 0) |
459 | return; | |
460 | else if (want_silent == -1 && !(gd->flags & GD_FLG_SILENT)) | |
461 | return; | |
462 | ||
463 | debug("before silent fix-up: %s\n", cmdline); | |
464 | if (cmdline && (cmdline[0] != '\0')) { | |
465 | char *start = strstr(cmdline, CONSOLE_ARG); | |
466 | ||
467 | /* Allocate space for maximum possible new command line */ | |
468 | buf = malloc(strlen(cmdline) + 1 + CONSOLE_ARG_LEN + 1); | |
469 | if (!buf) { | |
470 | debug("%s: out of memory\n", __func__); | |
471 | return; | |
472 | } | |
473 | ||
474 | if (start) { | |
475 | char *end = strchr(start, ' '); | |
476 | int num_start_bytes = start - cmdline + CONSOLE_ARG_LEN; | |
477 | ||
478 | strncpy(buf, cmdline, num_start_bytes); | |
479 | if (end) | |
480 | strcpy(buf + num_start_bytes, end); | |
481 | else | |
482 | buf[num_start_bytes] = '\0'; | |
483 | } else { | |
484 | sprintf(buf, "%s %s", cmdline, CONSOLE_ARG); | |
485 | } | |
486 | env_val = buf; | |
487 | } else { | |
488 | buf = NULL; | |
489 | env_val = CONSOLE_ARG; | |
490 | } | |
491 | ||
382bee57 | 492 | env_set("bootargs", env_val); |
b6396403 SG |
493 | debug("after silent fix-up: %s\n", env_val); |
494 | free(buf); | |
495 | } | |
496 | #endif /* CONFIG_SILENT_CONSOLE */ | |
497 | ||
498 | /** | |
499 | * Execute selected states of the bootm command. | |
500 | * | |
501 | * Note the arguments to this state must be the first argument, Any 'bootm' | |
502 | * or sub-command arguments must have already been taken. | |
503 | * | |
504 | * Note that if states contains more than one flag it MUST contain | |
505 | * BOOTM_STATE_START, since this handles and consumes the command line args. | |
506 | * | |
507 | * Also note that aside from boot_os_fn functions and bootm_load_os no other | |
508 | * functions we store the return value of in 'ret' may use a negative return | |
509 | * value, without special handling. | |
510 | * | |
511 | * @param cmdtp Pointer to bootm command table entry | |
512 | * @param flag Command flags (CMD_FLAG_...) | |
513 | * @param argc Number of subcommand arguments (0 = no arguments) | |
514 | * @param argv Arguments | |
515 | * @param states Mask containing states to run (BOOTM_STATE_...) | |
516 | * @param images Image header information | |
517 | * @param boot_progress 1 to show boot progress, 0 to not do this | |
518 | * @return 0 if ok, something else on error. Some errors will cause this | |
519 | * function to perform a reboot! If states contains BOOTM_STATE_OS_GO | |
520 | * then the intent is to boot an OS, so this function will not return | |
521 | * unless the image type is standalone. | |
522 | */ | |
523 | int do_bootm_states(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[], | |
524 | int states, bootm_headers_t *images, int boot_progress) | |
525 | { | |
526 | boot_os_fn *boot_fn; | |
527 | ulong iflag = 0; | |
528 | int ret = 0, need_boot_fn; | |
529 | ||
530 | images->state |= states; | |
531 | ||
532 | /* | |
533 | * Work through the states and see how far we get. We stop on | |
534 | * any error. | |
535 | */ | |
536 | if (states & BOOTM_STATE_START) | |
537 | ret = bootm_start(cmdtp, flag, argc, argv); | |
538 | ||
539 | if (!ret && (states & BOOTM_STATE_FINDOS)) | |
540 | ret = bootm_find_os(cmdtp, flag, argc, argv); | |
541 | ||
ba079840 | 542 | if (!ret && (states & BOOTM_STATE_FINDOTHER)) |
b6396403 | 543 | ret = bootm_find_other(cmdtp, flag, argc, argv); |
b6396403 SG |
544 | |
545 | /* Load the OS */ | |
546 | if (!ret && (states & BOOTM_STATE_LOADOS)) { | |
b6396403 | 547 | iflag = bootm_disable_interrupts(); |
cc955358 TR |
548 | ret = bootm_load_os(images, 0); |
549 | if (ret && ret != BOOTM_ERR_OVERLAP) | |
b6396403 SG |
550 | goto err; |
551 | else if (ret == BOOTM_ERR_OVERLAP) | |
552 | ret = 0; | |
b6396403 SG |
553 | } |
554 | ||
555 | /* Relocate the ramdisk */ | |
556 | #ifdef CONFIG_SYS_BOOT_RAMDISK_HIGH | |
557 | if (!ret && (states & BOOTM_STATE_RAMDISK)) { | |
558 | ulong rd_len = images->rd_end - images->rd_start; | |
559 | ||
560 | ret = boot_ramdisk_high(&images->lmb, images->rd_start, | |
561 | rd_len, &images->initrd_start, &images->initrd_end); | |
562 | if (!ret) { | |
018f5303 SG |
563 | env_set_hex("initrd_start", images->initrd_start); |
564 | env_set_hex("initrd_end", images->initrd_end); | |
b6396403 SG |
565 | } |
566 | } | |
567 | #endif | |
aa34fbc0 | 568 | #if IMAGE_ENABLE_OF_LIBFDT && defined(CONFIG_LMB) |
b6396403 SG |
569 | if (!ret && (states & BOOTM_STATE_FDT)) { |
570 | boot_fdt_add_mem_rsv_regions(&images->lmb, images->ft_addr); | |
571 | ret = boot_relocate_fdt(&images->lmb, &images->ft_addr, | |
572 | &images->ft_len); | |
573 | } | |
574 | #endif | |
575 | ||
576 | /* From now on, we need the OS boot function */ | |
577 | if (ret) | |
578 | return ret; | |
579 | boot_fn = bootm_os_get_boot_func(images->os.os); | |
580 | need_boot_fn = states & (BOOTM_STATE_OS_CMDLINE | | |
581 | BOOTM_STATE_OS_BD_T | BOOTM_STATE_OS_PREP | | |
582 | BOOTM_STATE_OS_FAKE_GO | BOOTM_STATE_OS_GO); | |
583 | if (boot_fn == NULL && need_boot_fn) { | |
584 | if (iflag) | |
585 | enable_interrupts(); | |
586 | printf("ERROR: booting os '%s' (%d) is not supported\n", | |
587 | genimg_get_os_name(images->os.os), images->os.os); | |
588 | bootstage_error(BOOTSTAGE_ID_CHECK_BOOT_OS); | |
589 | return 1; | |
590 | } | |
591 | ||
19e8649e | 592 | |
b6396403 SG |
593 | /* Call various other states that are not generally used */ |
594 | if (!ret && (states & BOOTM_STATE_OS_CMDLINE)) | |
595 | ret = boot_fn(BOOTM_STATE_OS_CMDLINE, argc, argv, images); | |
596 | if (!ret && (states & BOOTM_STATE_OS_BD_T)) | |
597 | ret = boot_fn(BOOTM_STATE_OS_BD_T, argc, argv, images); | |
19e8649e HP |
598 | if (!ret && (states & BOOTM_STATE_OS_PREP)) { |
599 | #if defined(CONFIG_SILENT_CONSOLE) && !defined(CONFIG_SILENT_U_BOOT_ONLY) | |
600 | if (images->os.os == IH_OS_LINUX) | |
601 | fixup_silent_linux(); | |
602 | #endif | |
b6396403 | 603 | ret = boot_fn(BOOTM_STATE_OS_PREP, argc, argv, images); |
19e8649e | 604 | } |
b6396403 SG |
605 | |
606 | #ifdef CONFIG_TRACE | |
607 | /* Pretend to run the OS, then run a user command */ | |
608 | if (!ret && (states & BOOTM_STATE_OS_FAKE_GO)) { | |
00caae6d | 609 | char *cmd_list = env_get("fakegocmd"); |
b6396403 SG |
610 | |
611 | ret = boot_selected_os(argc, argv, BOOTM_STATE_OS_FAKE_GO, | |
612 | images, boot_fn); | |
613 | if (!ret && cmd_list) | |
614 | ret = run_command_list(cmd_list, -1, flag); | |
615 | } | |
616 | #endif | |
617 | ||
618 | /* Check for unsupported subcommand. */ | |
619 | if (ret) { | |
620 | puts("subcommand not supported\n"); | |
621 | return ret; | |
622 | } | |
623 | ||
624 | /* Now run the OS! We hope this doesn't return */ | |
625 | if (!ret && (states & BOOTM_STATE_OS_GO)) | |
626 | ret = boot_selected_os(argc, argv, BOOTM_STATE_OS_GO, | |
627 | images, boot_fn); | |
628 | ||
629 | /* Deal with any fallout */ | |
630 | err: | |
631 | if (iflag) | |
632 | enable_interrupts(); | |
633 | ||
634 | if (ret == BOOTM_ERR_UNIMPLEMENTED) | |
635 | bootstage_error(BOOTSTAGE_ID_DECOMP_UNIMPL); | |
636 | else if (ret == BOOTM_ERR_RESET) | |
637 | do_reset(cmdtp, flag, argc, argv); | |
638 | ||
639 | return ret; | |
640 | } | |
641 | ||
c76c93a3 | 642 | #if CONFIG_IS_ENABLED(LEGACY_IMAGE_FORMAT) |
b6396403 SG |
643 | /** |
644 | * image_get_kernel - verify legacy format kernel image | |
645 | * @img_addr: in RAM address of the legacy format image to be verified | |
646 | * @verify: data CRC verification flag | |
647 | * | |
648 | * image_get_kernel() verifies legacy image integrity and returns pointer to | |
649 | * legacy image header if image verification was completed successfully. | |
650 | * | |
651 | * returns: | |
652 | * pointer to a legacy image header if valid image was found | |
653 | * otherwise return NULL | |
654 | */ | |
655 | static image_header_t *image_get_kernel(ulong img_addr, int verify) | |
656 | { | |
657 | image_header_t *hdr = (image_header_t *)img_addr; | |
658 | ||
659 | if (!image_check_magic(hdr)) { | |
660 | puts("Bad Magic Number\n"); | |
661 | bootstage_error(BOOTSTAGE_ID_CHECK_MAGIC); | |
662 | return NULL; | |
663 | } | |
664 | bootstage_mark(BOOTSTAGE_ID_CHECK_HEADER); | |
665 | ||
666 | if (!image_check_hcrc(hdr)) { | |
667 | puts("Bad Header Checksum\n"); | |
668 | bootstage_error(BOOTSTAGE_ID_CHECK_HEADER); | |
669 | return NULL; | |
670 | } | |
671 | ||
672 | bootstage_mark(BOOTSTAGE_ID_CHECK_CHECKSUM); | |
673 | image_print_contents(hdr); | |
674 | ||
675 | if (verify) { | |
676 | puts(" Verifying Checksum ... "); | |
677 | if (!image_check_dcrc(hdr)) { | |
678 | printf("Bad Data CRC\n"); | |
679 | bootstage_error(BOOTSTAGE_ID_CHECK_CHECKSUM); | |
680 | return NULL; | |
681 | } | |
682 | puts("OK\n"); | |
683 | } | |
684 | bootstage_mark(BOOTSTAGE_ID_CHECK_ARCH); | |
685 | ||
686 | if (!image_check_target_arch(hdr)) { | |
687 | printf("Unsupported Architecture 0x%x\n", image_get_arch(hdr)); | |
688 | bootstage_error(BOOTSTAGE_ID_CHECK_ARCH); | |
689 | return NULL; | |
690 | } | |
691 | return hdr; | |
692 | } | |
693 | #endif | |
694 | ||
695 | /** | |
696 | * boot_get_kernel - find kernel image | |
697 | * @os_data: pointer to a ulong variable, will hold os data start address | |
698 | * @os_len: pointer to a ulong variable, will hold os data length | |
699 | * | |
700 | * boot_get_kernel() tries to find a kernel image, verifies its integrity | |
701 | * and locates kernel data. | |
702 | * | |
703 | * returns: | |
704 | * pointer to image header if valid image was found, plus kernel start | |
705 | * address and length, otherwise NULL | |
706 | */ | |
707 | static const void *boot_get_kernel(cmd_tbl_t *cmdtp, int flag, int argc, | |
708 | char * const argv[], bootm_headers_t *images, | |
709 | ulong *os_data, ulong *os_len) | |
710 | { | |
c76c93a3 | 711 | #if CONFIG_IS_ENABLED(LEGACY_IMAGE_FORMAT) |
b6396403 SG |
712 | image_header_t *hdr; |
713 | #endif | |
714 | ulong img_addr; | |
715 | const void *buf; | |
b6396403 SG |
716 | const char *fit_uname_config = NULL; |
717 | const char *fit_uname_kernel = NULL; | |
73223f0e | 718 | #if IMAGE_ENABLE_FIT |
b6396403 SG |
719 | int os_noffset; |
720 | #endif | |
721 | ||
e6c88a6b BW |
722 | img_addr = genimg_get_kernel_addr_fit(argc < 1 ? NULL : argv[0], |
723 | &fit_uname_config, | |
724 | &fit_uname_kernel); | |
b6396403 SG |
725 | |
726 | bootstage_mark(BOOTSTAGE_ID_CHECK_MAGIC); | |
727 | ||
b6396403 SG |
728 | /* check image type, for FIT images get FIT kernel node */ |
729 | *os_data = *os_len = 0; | |
730 | buf = map_sysmem(img_addr, 0); | |
731 | switch (genimg_get_format(buf)) { | |
c76c93a3 | 732 | #if CONFIG_IS_ENABLED(LEGACY_IMAGE_FORMAT) |
b6396403 SG |
733 | case IMAGE_FORMAT_LEGACY: |
734 | printf("## Booting kernel from Legacy Image at %08lx ...\n", | |
735 | img_addr); | |
736 | hdr = image_get_kernel(img_addr, images->verify); | |
737 | if (!hdr) | |
738 | return NULL; | |
739 | bootstage_mark(BOOTSTAGE_ID_CHECK_IMAGETYPE); | |
740 | ||
741 | /* get os_data and os_len */ | |
742 | switch (image_get_type(hdr)) { | |
743 | case IH_TYPE_KERNEL: | |
744 | case IH_TYPE_KERNEL_NOLOAD: | |
745 | *os_data = image_get_data(hdr); | |
746 | *os_len = image_get_data_size(hdr); | |
747 | break; | |
748 | case IH_TYPE_MULTI: | |
749 | image_multi_getimg(hdr, 0, os_data, os_len); | |
750 | break; | |
751 | case IH_TYPE_STANDALONE: | |
752 | *os_data = image_get_data(hdr); | |
753 | *os_len = image_get_data_size(hdr); | |
754 | break; | |
755 | default: | |
756 | printf("Wrong Image Type for %s command\n", | |
757 | cmdtp->name); | |
758 | bootstage_error(BOOTSTAGE_ID_CHECK_IMAGETYPE); | |
759 | return NULL; | |
760 | } | |
761 | ||
762 | /* | |
763 | * copy image header to allow for image overwrites during | |
764 | * kernel decompression. | |
765 | */ | |
766 | memmove(&images->legacy_hdr_os_copy, hdr, | |
767 | sizeof(image_header_t)); | |
768 | ||
769 | /* save pointer to image header */ | |
770 | images->legacy_hdr_os = hdr; | |
771 | ||
772 | images->legacy_hdr_valid = 1; | |
773 | bootstage_mark(BOOTSTAGE_ID_DECOMP_IMAGE); | |
774 | break; | |
775 | #endif | |
73223f0e | 776 | #if IMAGE_ENABLE_FIT |
b6396403 | 777 | case IMAGE_FORMAT_FIT: |
126cc864 | 778 | os_noffset = fit_image_load(images, img_addr, |
b6396403 SG |
779 | &fit_uname_kernel, &fit_uname_config, |
780 | IH_ARCH_DEFAULT, IH_TYPE_KERNEL, | |
781 | BOOTSTAGE_ID_FIT_KERNEL_START, | |
782 | FIT_LOAD_IGNORED, os_data, os_len); | |
783 | if (os_noffset < 0) | |
784 | return NULL; | |
785 | ||
786 | images->fit_hdr_os = map_sysmem(img_addr, 0); | |
787 | images->fit_uname_os = fit_uname_kernel; | |
788 | images->fit_uname_cfg = fit_uname_config; | |
789 | images->fit_noffset_os = os_noffset; | |
790 | break; | |
791 | #endif | |
792 | #ifdef CONFIG_ANDROID_BOOT_IMAGE | |
793 | case IMAGE_FORMAT_ANDROID: | |
794 | printf("## Booting Android Image at 0x%08lx ...\n", img_addr); | |
07c0cd71 | 795 | if (android_image_get_kernel(buf, images->verify, |
b6396403 SG |
796 | os_data, os_len)) |
797 | return NULL; | |
798 | break; | |
799 | #endif | |
800 | default: | |
801 | printf("Wrong Image Format for %s command\n", cmdtp->name); | |
802 | bootstage_error(BOOTSTAGE_ID_FIT_KERNEL_INFO); | |
803 | return NULL; | |
804 | } | |
805 | ||
806 | debug(" kernel data at 0x%08lx, len = 0x%08lx (%ld)\n", | |
807 | *os_data, *os_len, *os_len); | |
808 | ||
809 | return buf; | |
810 | } | |
f6c6df7e HS |
811 | |
812 | /** | |
813 | * switch_to_non_secure_mode() - switch to non-secure mode | |
814 | * | |
815 | * This routine is overridden by architectures requiring this feature. | |
816 | */ | |
817 | void __weak switch_to_non_secure_mode(void) | |
818 | { | |
819 | } | |
820 | ||
ce1400f6 SG |
821 | #else /* USE_HOSTCC */ |
822 | ||
93e07880 | 823 | #if defined(CONFIG_FIT_SIGNATURE) |
8a9d0373 SG |
824 | static int bootm_host_load_image(const void *fit, int req_image_type, |
825 | int cfg_noffset) | |
ce1400f6 SG |
826 | { |
827 | const char *fit_uname_config = NULL; | |
828 | ulong data, len; | |
829 | bootm_headers_t images; | |
830 | int noffset; | |
831 | ulong load_end; | |
832 | uint8_t image_type; | |
833 | uint8_t imape_comp; | |
834 | void *load_buf; | |
835 | int ret; | |
836 | ||
8a9d0373 | 837 | fit_uname_config = fdt_get_name(fit, cfg_noffset, NULL); |
ce1400f6 SG |
838 | memset(&images, '\0', sizeof(images)); |
839 | images.verify = 1; | |
840 | noffset = fit_image_load(&images, (ulong)fit, | |
841 | NULL, &fit_uname_config, | |
842 | IH_ARCH_DEFAULT, req_image_type, -1, | |
843 | FIT_LOAD_IGNORED, &data, &len); | |
844 | if (noffset < 0) | |
845 | return noffset; | |
846 | if (fit_image_get_type(fit, noffset, &image_type)) { | |
847 | puts("Can't get image type!\n"); | |
848 | return -EINVAL; | |
849 | } | |
850 | ||
851 | if (fit_image_get_comp(fit, noffset, &imape_comp)) { | |
852 | puts("Can't get image compression!\n"); | |
853 | return -EINVAL; | |
854 | } | |
855 | ||
856 | /* Allow the image to expand by a factor of 4, should be safe */ | |
857 | load_buf = malloc((1 << 20) + len * 4); | |
2090854c JW |
858 | ret = image_decomp(imape_comp, 0, data, image_type, load_buf, |
859 | (void *)data, len, CONFIG_SYS_BOOTM_LEN, | |
860 | &load_end); | |
ce1400f6 | 861 | free(load_buf); |
081cc197 | 862 | |
2090854c JW |
863 | if (ret) { |
864 | ret = handle_decomp_error(imape_comp, load_end - 0, ret); | |
865 | if (ret != BOOTM_ERR_UNIMPLEMENTED) | |
866 | return ret; | |
867 | } | |
ce1400f6 SG |
868 | |
869 | return 0; | |
870 | } | |
871 | ||
872 | int bootm_host_load_images(const void *fit, int cfg_noffset) | |
873 | { | |
874 | static uint8_t image_types[] = { | |
875 | IH_TYPE_KERNEL, | |
876 | IH_TYPE_FLATDT, | |
877 | IH_TYPE_RAMDISK, | |
878 | }; | |
879 | int err = 0; | |
880 | int i; | |
881 | ||
882 | for (i = 0; i < ARRAY_SIZE(image_types); i++) { | |
883 | int ret; | |
884 | ||
8a9d0373 | 885 | ret = bootm_host_load_image(fit, image_types[i], cfg_noffset); |
ce1400f6 SG |
886 | if (!err && ret && ret != -ENOENT) |
887 | err = ret; | |
888 | } | |
889 | ||
890 | /* Return the first error we found */ | |
891 | return err; | |
892 | } | |
93e07880 | 893 | #endif |
ea51a628 SG |
894 | |
895 | #endif /* ndef USE_HOSTCC */ |