blob: 0e8c48053c87de9948ea9cc859b1ba45ec3e0d9f [file] [log] [blame]
Simon Glassb6396402014-06-12 07:24:46 -06001/*
2 * (C) Copyright 2000-2009
3 * Wolfgang Denk, DENX Software Engineering, wd@denx.de.
4 *
5 * SPDX-License-Identifier: GPL-2.0+
6 */
7
Simon Glassea51a622014-06-12 07:24:51 -06008#ifndef USE_HOSTCC
Simon Glassb6396402014-06-12 07:24:46 -06009#include <common.h>
Simon Glassea51a622014-06-12 07:24:51 -060010#include <bootstage.h>
Simon Glassb6396402014-06-12 07:24:46 -060011#include <bzlib.h>
Simon Glass90268b82014-10-19 21:11:24 -060012#include <errno.h>
Simon Glassb6396402014-06-12 07:24:46 -060013#include <fdt_support.h>
14#include <lmb.h>
15#include <malloc.h>
Joe Hershberger0eb25b62015-03-22 17:08:59 -050016#include <mapmem.h>
Simon Glassb6396402014-06-12 07:24:46 -060017#include <asm/io.h>
18#include <linux/lzo.h>
19#include <lzma/LzmaTypes.h>
20#include <lzma/LzmaDec.h>
21#include <lzma/LzmaTools.h>
Simon Glassb6396402014-06-12 07:24:46 -060022#if defined(CONFIG_CMD_USB)
23#include <usb.h>
24#endif
Simon Glassea51a622014-06-12 07:24:51 -060025#else
26#include "mkimage.h"
27#endif
Simon Glassb6396402014-06-12 07:24:46 -060028
Simon Glassea51a622014-06-12 07:24:51 -060029#include <command.h>
30#include <bootm.h>
31#include <image.h>
Simon Glassb6396402014-06-12 07:24:46 -060032
33#ifndef CONFIG_SYS_BOOTM_LEN
34/* use 8MByte as default max gunzip size */
35#define CONFIG_SYS_BOOTM_LEN 0x800000
36#endif
37
38#define IH_INITRD_ARCH IH_ARCH_DEFAULT
39
Simon Glassea51a622014-06-12 07:24:51 -060040#ifndef USE_HOSTCC
41
speriaka7b44c8c2019-10-04 12:56:40 +053042extern void board_usb_deinit(int id);
43
Simon Glassea51a622014-06-12 07:24:51 -060044DECLARE_GLOBAL_DATA_PTR;
45
Simon Glassb6396402014-06-12 07:24:46 -060046static const void *boot_get_kernel(cmd_tbl_t *cmdtp, int flag, int argc,
47 char * const argv[], bootm_headers_t *images,
48 ulong *os_data, ulong *os_len);
49
50#ifdef CONFIG_LMB
51static void boot_start_lmb(bootm_headers_t *images)
52{
53 ulong mem_start;
54 phys_size_t mem_size;
55
56 lmb_init(&images->lmb);
57
58 mem_start = getenv_bootm_low();
59 mem_size = getenv_bootm_size();
60
61 lmb_add(&images->lmb, (phys_addr_t)mem_start, mem_size);
62
63 arch_lmb_reserve(&images->lmb);
64 board_lmb_reserve(&images->lmb);
65}
66#else
67#define lmb_reserve(lmb, base, size)
68static inline void boot_start_lmb(bootm_headers_t *images) { }
69#endif
70
71static int bootm_start(cmd_tbl_t *cmdtp, int flag, int argc,
72 char * const argv[])
73{
74 memset((void *)&images, 0, sizeof(images));
75 images.verify = getenv_yesno("verify");
76
77 boot_start_lmb(&images);
78
79 bootstage_mark_name(BOOTSTAGE_ID_BOOTM_START, "bootm_start");
80 images.state = BOOTM_STATE_START;
81
82 return 0;
83}
84
85static int bootm_find_os(cmd_tbl_t *cmdtp, int flag, int argc,
86 char * const argv[])
87{
88 const void *os_hdr;
89 bool ep_found = false;
Simon Glass90268b82014-10-19 21:11:24 -060090 int ret;
Simon Glassb6396402014-06-12 07:24:46 -060091
92 /* get kernel image header, start address and length */
93 os_hdr = boot_get_kernel(cmdtp, flag, argc, argv,
94 &images, &images.os.image_start, &images.os.image_len);
95 if (images.os.image_len == 0) {
96 puts("ERROR: can't get kernel image!\n");
97 return 1;
98 }
99
100 /* get image parameters */
101 switch (genimg_get_format(os_hdr)) {
102#if defined(CONFIG_IMAGE_FORMAT_LEGACY)
103 case IMAGE_FORMAT_LEGACY:
104 images.os.type = image_get_type(os_hdr);
105 images.os.comp = image_get_comp(os_hdr);
106 images.os.os = image_get_os(os_hdr);
107
108 images.os.end = image_get_image_end(os_hdr);
109 images.os.load = image_get_load(os_hdr);
Simon Glass90268b82014-10-19 21:11:24 -0600110 images.os.arch = image_get_arch(os_hdr);
Simon Glassb6396402014-06-12 07:24:46 -0600111 break;
112#endif
113#if defined(CONFIG_FIT)
114 case IMAGE_FORMAT_FIT:
115 if (fit_image_get_type(images.fit_hdr_os,
116 images.fit_noffset_os,
117 &images.os.type)) {
118 puts("Can't get image type!\n");
119 bootstage_error(BOOTSTAGE_ID_FIT_TYPE);
120 return 1;
121 }
122
123 if (fit_image_get_comp(images.fit_hdr_os,
124 images.fit_noffset_os,
125 &images.os.comp)) {
126 puts("Can't get image compression!\n");
127 bootstage_error(BOOTSTAGE_ID_FIT_COMPRESSION);
128 return 1;
129 }
130
131 if (fit_image_get_os(images.fit_hdr_os, images.fit_noffset_os,
132 &images.os.os)) {
133 puts("Can't get image OS!\n");
134 bootstage_error(BOOTSTAGE_ID_FIT_OS);
135 return 1;
136 }
137
Simon Glass90268b82014-10-19 21:11:24 -0600138 if (fit_image_get_arch(images.fit_hdr_os,
139 images.fit_noffset_os,
140 &images.os.arch)) {
141 puts("Can't get image ARCH!\n");
142 return 1;
143 }
144
Simon Glassb6396402014-06-12 07:24:46 -0600145 images.os.end = fit_get_end(images.fit_hdr_os);
146
147 if (fit_image_get_load(images.fit_hdr_os, images.fit_noffset_os,
148 &images.os.load)) {
149 puts("Can't get image load address!\n");
150 bootstage_error(BOOTSTAGE_ID_FIT_LOADADDR);
151 return 1;
152 }
153 break;
154#endif
155#ifdef CONFIG_ANDROID_BOOT_IMAGE
156 case IMAGE_FORMAT_ANDROID:
157 images.os.type = IH_TYPE_KERNEL;
158 images.os.comp = IH_COMP_NONE;
159 images.os.os = IH_OS_LINUX;
Simon Glassb6396402014-06-12 07:24:46 -0600160
161 images.os.end = android_image_get_end(os_hdr);
162 images.os.load = android_image_get_kload(os_hdr);
Ahmad Draidi86f46952014-10-23 20:50:07 +0300163 images.ep = images.os.load;
164 ep_found = true;
Simon Glassb6396402014-06-12 07:24:46 -0600165 break;
166#endif
167 default:
168 puts("ERROR: unknown image format type!\n");
169 return 1;
170 }
171
Simon Glass90268b82014-10-19 21:11:24 -0600172 /* If we have a valid setup.bin, we will use that for entry (x86) */
Simon Glass5bda35c2014-10-10 08:21:57 -0600173 if (images.os.arch == IH_ARCH_I386 ||
174 images.os.arch == IH_ARCH_X86_64) {
Simon Glass90268b82014-10-19 21:11:24 -0600175 ulong len;
176
177 ret = boot_get_setup(&images, IH_ARCH_I386, &images.ep, &len);
178 if (ret < 0 && ret != -ENOENT) {
179 puts("Could not find a valid setup.bin for x86\n");
180 return 1;
181 }
182 /* Kernel entry point is the setup.bin */
183 } else if (images.legacy_hdr_valid) {
Simon Glassb6396402014-06-12 07:24:46 -0600184 images.ep = image_get_ep(&images.legacy_hdr_os_copy);
185#if defined(CONFIG_FIT)
186 } else if (images.fit_uname_os) {
187 int ret;
188
189 ret = fit_image_get_entry(images.fit_hdr_os,
190 images.fit_noffset_os, &images.ep);
191 if (ret) {
192 puts("Can't get entry point property!\n");
193 return 1;
194 }
195#endif
196 } else if (!ep_found) {
197 puts("Could not find kernel entry point!\n");
198 return 1;
199 }
200
201 if (images.os.type == IH_TYPE_KERNEL_NOLOAD) {
202 images.os.load = images.os.image_start;
203 images.ep += images.os.load;
204 }
205
206 images.os.start = (ulong)os_hdr;
207
208 return 0;
209}
210
Karl Apsited52e8572015-05-21 09:52:49 -0400211/**
212 * bootm_find_images - wrapper to find and locate various images
213 * @flag: Ignored Argument
214 * @argc: command argument count
215 * @argv: command argument list
216 *
217 * boot_find_images() will attempt to load an available ramdisk,
218 * flattened device tree, as well as specifically marked
219 * "loadable" images (loadables are FIT only)
220 *
221 * Note: bootm_find_images will skip an image if it is not found
222 *
223 * @return:
224 * 0, if all existing images were loaded correctly
225 * 1, if an image is found but corrupted, or invalid
226 */
227int bootm_find_images(int flag, int argc, char * const argv[])
Simon Glassb6396402014-06-12 07:24:46 -0600228{
229 int ret;
230
231 /* find ramdisk */
232 ret = boot_get_ramdisk(argc, argv, &images, IH_INITRD_ARCH,
233 &images.rd_start, &images.rd_end);
234 if (ret) {
235 puts("Ramdisk image is corrupt or invalid\n");
236 return 1;
237 }
238
Simon Glassb6396402014-06-12 07:24:46 -0600239#if defined(CONFIG_OF_LIBFDT)
Simon Glassb6396402014-06-12 07:24:46 -0600240 /* find flattened device tree */
241 ret = boot_get_fdt(flag, argc, argv, IH_ARCH_DEFAULT, &images,
242 &images.ft_addr, &images.ft_len);
243 if (ret) {
244 puts("Could not find a valid device tree\n");
245 return 1;
246 }
Joe Hershberger90fbee32015-02-04 21:56:53 -0600247 set_working_fdt_addr((ulong)images.ft_addr);
Simon Glassb6396402014-06-12 07:24:46 -0600248#endif
249
Karl Apsite84a07db2015-05-21 09:52:48 -0400250#if defined(CONFIG_FIT)
Karl Apsite84a07db2015-05-21 09:52:48 -0400251 /* find all of the loadables */
252 ret = boot_get_loadable(argc, argv, &images, IH_ARCH_DEFAULT,
253 NULL, NULL);
254 if (ret) {
255 printf("Loadable(s) is corrupt or invalid\n");
256 return 1;
257 }
Karl Apsite84a07db2015-05-21 09:52:48 -0400258#endif
259
Simon Glassb6396402014-06-12 07:24:46 -0600260 return 0;
261}
262
263static int bootm_find_other(cmd_tbl_t *cmdtp, int flag, int argc,
264 char * const argv[])
265{
266 if (((images.os.type == IH_TYPE_KERNEL) ||
267 (images.os.type == IH_TYPE_KERNEL_NOLOAD) ||
268 (images.os.type == IH_TYPE_MULTI)) &&
269 (images.os.os == IH_OS_LINUX ||
270 images.os.os == IH_OS_VXWORKS))
Karl Apsited52e8572015-05-21 09:52:49 -0400271 return bootm_find_images(flag, argc, argv);
Simon Glassb6396402014-06-12 07:24:46 -0600272
273 return 0;
274}
Simon Glass40e59752014-12-02 13:17:30 -0700275#endif /* USE_HOSTC */
276
Simon Glass8fd6a4b2014-12-02 13:17:36 -0700277/**
278 * print_decomp_msg() - Print a suitable decompression/loading message
279 *
280 * @type: OS type (IH_OS_...)
281 * @comp_type: Compression type being used (IH_COMP_...)
282 * @is_xip: true if the load address matches the image start
283 */
284static void print_decomp_msg(int comp_type, int type, bool is_xip)
Simon Glass40e59752014-12-02 13:17:30 -0700285{
Simon Glass8fd6a4b2014-12-02 13:17:36 -0700286 const char *name = genimg_get_type_name(type);
287
288 if (comp_type == IH_COMP_NONE)
289 printf(" %s %s ... ", is_xip ? "XIP" : "Loading", name);
290 else
291 printf(" Uncompressing %s ... ", name);
Simon Glass40e59752014-12-02 13:17:30 -0700292}
293
Simon Glass3086c052014-12-02 13:17:37 -0700294/**
295 * handle_decomp_error() - display a decompression error
296 *
297 * This function tries to produce a useful message. In the case where the
298 * uncompressed size is the same as the available space, we can assume that
299 * the image is too large for the buffer.
300 *
301 * @comp_type: Compression type being used (IH_COMP_...)
302 * @uncomp_size: Number of bytes uncompressed
303 * @unc_len: Amount of space available for decompression
304 * @ret: Error code to report
305 * @return BOOTM_ERR_RESET, indicating that the board must be reset
306 */
307static int handle_decomp_error(int comp_type, size_t uncomp_size,
308 size_t unc_len, int ret)
Simon Glass40e59752014-12-02 13:17:30 -0700309{
Simon Glass3086c052014-12-02 13:17:37 -0700310 const char *name = genimg_get_comp_name(comp_type);
311
312 if (uncomp_size >= unc_len)
313 printf("Image too large: increase CONFIG_SYS_BOOTM_LEN\n");
Simon Glass40e59752014-12-02 13:17:30 -0700314 else
Simon Glass3086c052014-12-02 13:17:37 -0700315 printf("%s: uncompress error %d\n", name, ret);
316
317 /*
318 * The decompression routines are now safe, so will not write beyond
319 * their bounds. Probably it is not necessary to reset, but maintain
320 * the current behaviour for now.
321 */
322 printf("Must RESET board to recover\n");
Simon Glass40e59752014-12-02 13:17:30 -0700323#ifndef USE_HOSTCC
324 bootstage_error(BOOTSTAGE_ID_DECOMP_IMAGE);
325#endif
326
327 return BOOTM_ERR_RESET;
328}
Simon Glassb6396402014-06-12 07:24:46 -0600329
Simon Glass081cc192014-12-02 13:17:33 -0700330int bootm_decomp_image(int comp, ulong load, ulong image_start, int type,
331 void *load_buf, void *image_buf, ulong image_len,
332 uint unc_len, ulong *load_end)
Simon Glassb6396402014-06-12 07:24:46 -0600333{
Simon Glass3086c052014-12-02 13:17:37 -0700334 int ret = 0;
335
Simon Glass2b164f12014-06-12 07:24:52 -0600336 *load_end = load;
Simon Glass8fd6a4b2014-12-02 13:17:36 -0700337 print_decomp_msg(comp, type, load == image_start);
Simon Glass3086c052014-12-02 13:17:37 -0700338
Gokul Sriram Palanisamy13e938b2016-10-26 17:04:12 +0530339#if defined(CONFIG_DTB_COMPRESSION)
340 if(type == IH_TYPE_FLATDT)
341 unc_len = CONFIG_DTB_LOAD_MAXLEN;
342#endif
343
Simon Glass3086c052014-12-02 13:17:37 -0700344 /*
345 * Load the image to the right place, decompressing if needed. After
346 * this, image_len will be set to the number of uncompressed bytes
347 * loaded, ret will be non-zero on error.
348 */
Simon Glassb6396402014-06-12 07:24:46 -0600349 switch (comp) {
350 case IH_COMP_NONE:
Simon Glass3086c052014-12-02 13:17:37 -0700351 if (load == image_start)
352 break;
353 if (image_len <= unc_len)
Simon Glassb6396402014-06-12 07:24:46 -0600354 memmove_wd(load_buf, image_buf, image_len, CHUNKSZ);
Simon Glass3086c052014-12-02 13:17:37 -0700355 else
356 ret = 1;
Simon Glassb6396402014-06-12 07:24:46 -0600357 break;
358#ifdef CONFIG_GZIP
Simon Glass40e59752014-12-02 13:17:30 -0700359 case IH_COMP_GZIP: {
Simon Glass40e59752014-12-02 13:17:30 -0700360 ret = gunzip(load_buf, unc_len, image_buf, &image_len);
Simon Glassb6396402014-06-12 07:24:46 -0600361 break;
Simon Glass40e59752014-12-02 13:17:30 -0700362 }
Simon Glassb6396402014-06-12 07:24:46 -0600363#endif /* CONFIG_GZIP */
364#ifdef CONFIG_BZIP2
Simon Glass40e59752014-12-02 13:17:30 -0700365 case IH_COMP_BZIP2: {
Simon Glass3086c052014-12-02 13:17:37 -0700366 uint size = unc_len;
Simon Glass40e59752014-12-02 13:17:30 -0700367
Simon Glassb6396402014-06-12 07:24:46 -0600368 /*
369 * If we've got less than 4 MB of malloc() space,
370 * use slower decompression algorithm which requires
371 * at most 2300 KB of memory.
372 */
Simon Glass3086c052014-12-02 13:17:37 -0700373 ret = BZ2_bzBuffToBuffDecompress(load_buf, &size,
Simon Glassb6396402014-06-12 07:24:46 -0600374 image_buf, image_len,
375 CONFIG_SYS_MALLOC_LEN < (4096 * 1024), 0);
Simon Glass3086c052014-12-02 13:17:37 -0700376 image_len = size;
Simon Glassb6396402014-06-12 07:24:46 -0600377 break;
Simon Glass40e59752014-12-02 13:17:30 -0700378 }
Simon Glassb6396402014-06-12 07:24:46 -0600379#endif /* CONFIG_BZIP2 */
380#ifdef CONFIG_LZMA
381 case IH_COMP_LZMA: {
382 SizeT lzma_len = unc_len;
Simon Glass2b164f12014-06-12 07:24:52 -0600383
Simon Glassb6396402014-06-12 07:24:46 -0600384 ret = lzmaBuffToBuffDecompress(load_buf, &lzma_len,
385 image_buf, image_len);
Simon Glass3086c052014-12-02 13:17:37 -0700386 image_len = lzma_len;
Simon Glassb6396402014-06-12 07:24:46 -0600387 break;
388 }
389#endif /* CONFIG_LZMA */
390#ifdef CONFIG_LZO
391 case IH_COMP_LZO: {
392 size_t size = unc_len;
393
Simon Glassb6396402014-06-12 07:24:46 -0600394 ret = lzop_decompress(image_buf, image_len, load_buf, &size);
Simon Glass3086c052014-12-02 13:17:37 -0700395 image_len = size;
Simon Glassb6396402014-06-12 07:24:46 -0600396 break;
397 }
398#endif /* CONFIG_LZO */
Julius Werner027b7282015-10-06 20:03:53 -0700399#ifdef CONFIG_LZ4
400 case IH_COMP_LZ4: {
401 size_t size = unc_len;
402
403 ret = ulz4fn(image_buf, image_len, load_buf, &size);
404 image_len = size;
405 break;
406 }
407#endif /* CONFIG_LZ4 */
Simon Glassb6396402014-06-12 07:24:46 -0600408 default:
409 printf("Unimplemented compression type %d\n", comp);
410 return BOOTM_ERR_UNIMPLEMENTED;
411 }
412
Simon Glass3086c052014-12-02 13:17:37 -0700413 if (ret)
414 return handle_decomp_error(comp, image_len, unc_len, ret);
415 *load_end = load + image_len;
416
Simon Glass2b164f12014-06-12 07:24:52 -0600417 puts("OK\n");
418
419 return 0;
420}
421
Simon Glassce1400f2014-06-12 07:24:53 -0600422#ifndef USE_HOSTCC
Gokul Sriram Palanisamy13e938b2016-10-26 17:04:12 +0530423int bootm_load_os(bootm_headers_t *images, unsigned long *load_end,
424 int boot_progress)
Simon Glass2b164f12014-06-12 07:24:52 -0600425{
426 image_info_t os = images->os;
427 ulong load = os.load;
428 ulong blob_start = os.start;
429 ulong blob_end = os.end;
430 ulong image_start = os.image_start;
431 ulong image_len = os.image_len;
432 bool no_overlap;
433 void *load_buf, *image_buf;
434 int err;
435
436 load_buf = map_sysmem(load, 0);
437 image_buf = map_sysmem(os.image_start, image_len);
Simon Glass081cc192014-12-02 13:17:33 -0700438 err = bootm_decomp_image(os.comp, load, os.image_start, os.type,
439 load_buf, image_buf, image_len,
440 CONFIG_SYS_BOOTM_LEN, load_end);
Simon Glass2b164f12014-06-12 07:24:52 -0600441 if (err) {
442 bootstage_error(BOOTSTAGE_ID_DECOMP_IMAGE);
443 return err;
444 }
Simon Glassb6396402014-06-12 07:24:46 -0600445 flush_cache(load, (*load_end - load) * sizeof(ulong));
446
Gokul Sriram Palanisamy13e938b2016-10-26 17:04:12 +0530447 debug(" %s loaded at 0x%08lx, end = 0x%08lx\n",
448 genimg_get_type_name(os.type), load, *load_end);
449 if (os.type == IH_TYPE_KERNEL)
450 bootstage_mark(BOOTSTAGE_ID_KERNEL_LOADED);
Simon Glassb6396402014-06-12 07:24:46 -0600451
Simon Glass2b164f12014-06-12 07:24:52 -0600452 no_overlap = (os.comp == IH_COMP_NONE && load == image_start);
453
Simon Glassb6396402014-06-12 07:24:46 -0600454 if (!no_overlap && (load < blob_end) && (*load_end > blob_start)) {
455 debug("images.os.start = 0x%lX, images.os.end = 0x%lx\n",
456 blob_start, blob_end);
457 debug("images.os.load = 0x%lx, load_end = 0x%lx\n", load,
458 *load_end);
459
460 /* Check what type of image this is. */
461 if (images->legacy_hdr_valid) {
462 if (image_get_type(&images->legacy_hdr_os_copy)
463 == IH_TYPE_MULTI)
464 puts("WARNING: legacy format multi component image overwritten\n");
465 return BOOTM_ERR_OVERLAP;
466 } else {
467 puts("ERROR: new format image overwritten - must RESET the board to recover\n");
468 bootstage_error(BOOTSTAGE_ID_OVERWRITTEN);
469 return BOOTM_ERR_RESET;
470 }
471 }
472
473 return 0;
474}
475
476/**
477 * bootm_disable_interrupts() - Disable interrupts in preparation for load/boot
478 *
479 * @return interrupt flag (0 if interrupts were disabled, non-zero if they were
480 * enabled)
481 */
482ulong bootm_disable_interrupts(void)
483{
484 ulong iflag;
485
486 /*
487 * We have reached the point of no return: we are going to
488 * overwrite all exception vector code, so we cannot easily
489 * recover from any failures any more...
490 */
491 iflag = disable_interrupts();
492#ifdef CONFIG_NETCONSOLE
493 /* Stop the ethernet stack if NetConsole could have left it up */
494 eth_halt();
Bernhard Nortmann4917c062015-09-14 15:29:45 +0200495# ifndef CONFIG_DM_ETH
Simon Glassb6396402014-06-12 07:24:46 -0600496 eth_unregister(eth_get_dev());
Bernhard Nortmann4917c062015-09-14 15:29:45 +0200497# endif
Simon Glassb6396402014-06-12 07:24:46 -0600498#endif
499
500#if defined(CONFIG_CMD_USB)
501 /*
502 * turn off USB to prevent the host controller from writing to the
503 * SDRAM while Linux is booting. This could happen (at least for OHCI
504 * controller), because the HCCA (Host Controller Communication Area)
505 * lies within the SDRAM and the host controller writes continously to
506 * this area (as busmaster!). The HccaFrameNumber is for example
507 * updated every 1 ms within the HCCA structure in SDRAM! For more
508 * details see the OpenHCI specification.
509 */
510 usb_stop();
511#endif
512 return iflag;
513}
514
515#if defined(CONFIG_SILENT_CONSOLE) && !defined(CONFIG_SILENT_U_BOOT_ONLY)
516
517#define CONSOLE_ARG "console="
518#define CONSOLE_ARG_LEN (sizeof(CONSOLE_ARG) - 1)
519
520static void fixup_silent_linux(void)
521{
522 char *buf;
523 const char *env_val;
524 char *cmdline = getenv("bootargs");
525 int want_silent;
526
527 /*
528 * Only fix cmdline when requested. The environment variable can be:
529 *
530 * no - we never fixup
531 * yes - we always fixup
532 * unset - we rely on the console silent flag
533 */
534 want_silent = getenv_yesno("silent_linux");
535 if (want_silent == 0)
536 return;
537 else if (want_silent == -1 && !(gd->flags & GD_FLG_SILENT))
538 return;
539
540 debug("before silent fix-up: %s\n", cmdline);
541 if (cmdline && (cmdline[0] != '\0')) {
542 char *start = strstr(cmdline, CONSOLE_ARG);
543
544 /* Allocate space for maximum possible new command line */
545 buf = malloc(strlen(cmdline) + 1 + CONSOLE_ARG_LEN + 1);
546 if (!buf) {
547 debug("%s: out of memory\n", __func__);
548 return;
549 }
550
551 if (start) {
552 char *end = strchr(start, ' ');
553 int num_start_bytes = start - cmdline + CONSOLE_ARG_LEN;
554
555 strncpy(buf, cmdline, num_start_bytes);
556 if (end)
557 strcpy(buf + num_start_bytes, end);
558 else
559 buf[num_start_bytes] = '\0';
560 } else {
561 sprintf(buf, "%s %s", cmdline, CONSOLE_ARG);
562 }
563 env_val = buf;
564 } else {
565 buf = NULL;
566 env_val = CONSOLE_ARG;
567 }
568
569 setenv("bootargs", env_val);
570 debug("after silent fix-up: %s\n", env_val);
571 free(buf);
572}
573#endif /* CONFIG_SILENT_CONSOLE */
574
575/**
576 * Execute selected states of the bootm command.
577 *
578 * Note the arguments to this state must be the first argument, Any 'bootm'
579 * or sub-command arguments must have already been taken.
580 *
581 * Note that if states contains more than one flag it MUST contain
582 * BOOTM_STATE_START, since this handles and consumes the command line args.
583 *
584 * Also note that aside from boot_os_fn functions and bootm_load_os no other
585 * functions we store the return value of in 'ret' may use a negative return
586 * value, without special handling.
587 *
588 * @param cmdtp Pointer to bootm command table entry
589 * @param flag Command flags (CMD_FLAG_...)
590 * @param argc Number of subcommand arguments (0 = no arguments)
591 * @param argv Arguments
592 * @param states Mask containing states to run (BOOTM_STATE_...)
593 * @param images Image header information
594 * @param boot_progress 1 to show boot progress, 0 to not do this
595 * @return 0 if ok, something else on error. Some errors will cause this
596 * function to perform a reboot! If states contains BOOTM_STATE_OS_GO
597 * then the intent is to boot an OS, so this function will not return
598 * unless the image type is standalone.
599 */
Prasanna Kumar Thoorvas Samyrao Muralidharan4c904e22019-10-01 16:31:42 +0530600void handle_noc_err(void);
Simon Glassb6396402014-06-12 07:24:46 -0600601int do_bootm_states(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[],
602 int states, bootm_headers_t *images, int boot_progress)
603{
604 boot_os_fn *boot_fn;
605 ulong iflag = 0;
606 int ret = 0, need_boot_fn;
speriaka7b44c8c2019-10-04 12:56:40 +0530607#ifdef CONFIG_USB_XHCI_IPQ
608 unsigned int i;
609#endif
Simon Glassb6396402014-06-12 07:24:46 -0600610
611 images->state |= states;
612
Prasanna Kumar Thoorvas Samyrao Muralidharan4c904e22019-10-01 16:31:42 +0530613 handle_noc_err();
614
Simon Glassb6396402014-06-12 07:24:46 -0600615 /*
616 * Work through the states and see how far we get. We stop on
617 * any error.
618 */
619 if (states & BOOTM_STATE_START)
620 ret = bootm_start(cmdtp, flag, argc, argv);
621
622 if (!ret && (states & BOOTM_STATE_FINDOS))
623 ret = bootm_find_os(cmdtp, flag, argc, argv);
624
625 if (!ret && (states & BOOTM_STATE_FINDOTHER)) {
626 ret = bootm_find_other(cmdtp, flag, argc, argv);
627 argc = 0; /* consume the args */
628 }
629
630 /* Load the OS */
631 if (!ret && (states & BOOTM_STATE_LOADOS)) {
632 ulong load_end;
633
634 iflag = bootm_disable_interrupts();
635 ret = bootm_load_os(images, &load_end, 0);
636 if (ret == 0)
637 lmb_reserve(&images->lmb, images->os.load,
638 (load_end - images->os.load));
639 else if (ret && ret != BOOTM_ERR_OVERLAP)
640 goto err;
641 else if (ret == BOOTM_ERR_OVERLAP)
642 ret = 0;
643#if defined(CONFIG_SILENT_CONSOLE) && !defined(CONFIG_SILENT_U_BOOT_ONLY)
644 if (images->os.os == IH_OS_LINUX)
645 fixup_silent_linux();
646#endif
647 }
648
649 /* Relocate the ramdisk */
650#ifdef CONFIG_SYS_BOOT_RAMDISK_HIGH
651 if (!ret && (states & BOOTM_STATE_RAMDISK)) {
652 ulong rd_len = images->rd_end - images->rd_start;
653
654 ret = boot_ramdisk_high(&images->lmb, images->rd_start,
655 rd_len, &images->initrd_start, &images->initrd_end);
656 if (!ret) {
657 setenv_hex("initrd_start", images->initrd_start);
658 setenv_hex("initrd_end", images->initrd_end);
659 }
660 }
661#endif
662#if defined(CONFIG_OF_LIBFDT) && defined(CONFIG_LMB)
663 if (!ret && (states & BOOTM_STATE_FDT)) {
664 boot_fdt_add_mem_rsv_regions(&images->lmb, images->ft_addr);
665 ret = boot_relocate_fdt(&images->lmb, &images->ft_addr,
666 &images->ft_len);
667 }
668#endif
669
670 /* From now on, we need the OS boot function */
671 if (ret)
672 return ret;
673 boot_fn = bootm_os_get_boot_func(images->os.os);
674 need_boot_fn = states & (BOOTM_STATE_OS_CMDLINE |
675 BOOTM_STATE_OS_BD_T | BOOTM_STATE_OS_PREP |
676 BOOTM_STATE_OS_FAKE_GO | BOOTM_STATE_OS_GO);
677 if (boot_fn == NULL && need_boot_fn) {
678 if (iflag)
679 enable_interrupts();
680 printf("ERROR: booting os '%s' (%d) is not supported\n",
681 genimg_get_os_name(images->os.os), images->os.os);
682 bootstage_error(BOOTSTAGE_ID_CHECK_BOOT_OS);
683 return 1;
684 }
685
686 /* Call various other states that are not generally used */
687 if (!ret && (states & BOOTM_STATE_OS_CMDLINE))
688 ret = boot_fn(BOOTM_STATE_OS_CMDLINE, argc, argv, images);
689 if (!ret && (states & BOOTM_STATE_OS_BD_T))
690 ret = boot_fn(BOOTM_STATE_OS_BD_T, argc, argv, images);
691 if (!ret && (states & BOOTM_STATE_OS_PREP))
692 ret = boot_fn(BOOTM_STATE_OS_PREP, argc, argv, images);
693
694#ifdef CONFIG_TRACE
695 /* Pretend to run the OS, then run a user command */
696 if (!ret && (states & BOOTM_STATE_OS_FAKE_GO)) {
697 char *cmd_list = getenv("fakegocmd");
698
699 ret = boot_selected_os(argc, argv, BOOTM_STATE_OS_FAKE_GO,
700 images, boot_fn);
701 if (!ret && cmd_list)
702 ret = run_command_list(cmd_list, -1, flag);
703 }
704#endif
705
706 /* Check for unsupported subcommand. */
707 if (ret) {
708 puts("subcommand not supported\n");
709 return ret;
710 }
711
712 /* Now run the OS! We hope this doesn't return */
speriaka7b44c8c2019-10-04 12:56:40 +0530713 if (!ret && (states & BOOTM_STATE_OS_GO)) {
714 board_pci_deinit();
715
716#ifdef CONFIG_USB_XHCI_IPQ
717 usb_stop();
718 for (i = 0; i < CONFIG_USB_MAX_CONTROLLER_COUNT; i++)
719 board_usb_deinit(i);
720#endif
Simon Glassb6396402014-06-12 07:24:46 -0600721 ret = boot_selected_os(argc, argv, BOOTM_STATE_OS_GO,
722 images, boot_fn);
speriaka7b44c8c2019-10-04 12:56:40 +0530723 }
Simon Glassb6396402014-06-12 07:24:46 -0600724
725 /* Deal with any fallout */
726err:
727 if (iflag)
728 enable_interrupts();
729
730 if (ret == BOOTM_ERR_UNIMPLEMENTED)
731 bootstage_error(BOOTSTAGE_ID_DECOMP_UNIMPL);
732 else if (ret == BOOTM_ERR_RESET)
733 do_reset(cmdtp, flag, argc, argv);
734
735 return ret;
736}
737
738#if defined(CONFIG_IMAGE_FORMAT_LEGACY)
739/**
740 * image_get_kernel - verify legacy format kernel image
741 * @img_addr: in RAM address of the legacy format image to be verified
742 * @verify: data CRC verification flag
743 *
744 * image_get_kernel() verifies legacy image integrity and returns pointer to
745 * legacy image header if image verification was completed successfully.
746 *
747 * returns:
748 * pointer to a legacy image header if valid image was found
749 * otherwise return NULL
750 */
751static image_header_t *image_get_kernel(ulong img_addr, int verify)
752{
753 image_header_t *hdr = (image_header_t *)img_addr;
754
755 if (!image_check_magic(hdr)) {
756 puts("Bad Magic Number\n");
757 bootstage_error(BOOTSTAGE_ID_CHECK_MAGIC);
758 return NULL;
759 }
760 bootstage_mark(BOOTSTAGE_ID_CHECK_HEADER);
761
762 if (!image_check_hcrc(hdr)) {
763 puts("Bad Header Checksum\n");
764 bootstage_error(BOOTSTAGE_ID_CHECK_HEADER);
765 return NULL;
766 }
767
768 bootstage_mark(BOOTSTAGE_ID_CHECK_CHECKSUM);
769 image_print_contents(hdr);
770
771 if (verify) {
772 puts(" Verifying Checksum ... ");
773 if (!image_check_dcrc(hdr)) {
774 printf("Bad Data CRC\n");
775 bootstage_error(BOOTSTAGE_ID_CHECK_CHECKSUM);
776 return NULL;
777 }
778 puts("OK\n");
779 }
780 bootstage_mark(BOOTSTAGE_ID_CHECK_ARCH);
781
782 if (!image_check_target_arch(hdr)) {
783 printf("Unsupported Architecture 0x%x\n", image_get_arch(hdr));
784 bootstage_error(BOOTSTAGE_ID_CHECK_ARCH);
785 return NULL;
786 }
787 return hdr;
788}
789#endif
790
791/**
792 * boot_get_kernel - find kernel image
793 * @os_data: pointer to a ulong variable, will hold os data start address
794 * @os_len: pointer to a ulong variable, will hold os data length
795 *
796 * boot_get_kernel() tries to find a kernel image, verifies its integrity
797 * and locates kernel data.
798 *
799 * returns:
800 * pointer to image header if valid image was found, plus kernel start
801 * address and length, otherwise NULL
802 */
803static const void *boot_get_kernel(cmd_tbl_t *cmdtp, int flag, int argc,
804 char * const argv[], bootm_headers_t *images,
805 ulong *os_data, ulong *os_len)
806{
807#if defined(CONFIG_IMAGE_FORMAT_LEGACY)
808 image_header_t *hdr;
809#endif
810 ulong img_addr;
811 const void *buf;
Simon Glassb6396402014-06-12 07:24:46 -0600812 const char *fit_uname_config = NULL;
813 const char *fit_uname_kernel = NULL;
Bryan Wu6c454fe2014-08-15 16:51:38 -0700814#if defined(CONFIG_FIT)
Simon Glassb6396402014-06-12 07:24:46 -0600815 int os_noffset;
816#endif
817
Bryan Wue6c88a62014-08-15 16:51:39 -0700818 img_addr = genimg_get_kernel_addr_fit(argc < 1 ? NULL : argv[0],
819 &fit_uname_config,
820 &fit_uname_kernel);
Simon Glassb6396402014-06-12 07:24:46 -0600821
822 bootstage_mark(BOOTSTAGE_ID_CHECK_MAGIC);
823
824 /* copy from dataflash if needed */
825 img_addr = genimg_get_image(img_addr);
826
827 /* check image type, for FIT images get FIT kernel node */
828 *os_data = *os_len = 0;
829 buf = map_sysmem(img_addr, 0);
830 switch (genimg_get_format(buf)) {
831#if defined(CONFIG_IMAGE_FORMAT_LEGACY)
832 case IMAGE_FORMAT_LEGACY:
833 printf("## Booting kernel from Legacy Image at %08lx ...\n",
834 img_addr);
835 hdr = image_get_kernel(img_addr, images->verify);
836 if (!hdr)
837 return NULL;
838 bootstage_mark(BOOTSTAGE_ID_CHECK_IMAGETYPE);
839
840 /* get os_data and os_len */
841 switch (image_get_type(hdr)) {
842 case IH_TYPE_KERNEL:
843 case IH_TYPE_KERNEL_NOLOAD:
844 *os_data = image_get_data(hdr);
845 *os_len = image_get_data_size(hdr);
846 break;
847 case IH_TYPE_MULTI:
848 image_multi_getimg(hdr, 0, os_data, os_len);
849 break;
850 case IH_TYPE_STANDALONE:
851 *os_data = image_get_data(hdr);
852 *os_len = image_get_data_size(hdr);
853 break;
854 default:
855 printf("Wrong Image Type for %s command\n",
856 cmdtp->name);
857 bootstage_error(BOOTSTAGE_ID_CHECK_IMAGETYPE);
858 return NULL;
859 }
860
861 /*
862 * copy image header to allow for image overwrites during
863 * kernel decompression.
864 */
865 memmove(&images->legacy_hdr_os_copy, hdr,
866 sizeof(image_header_t));
867
868 /* save pointer to image header */
869 images->legacy_hdr_os = hdr;
870
871 images->legacy_hdr_valid = 1;
872 bootstage_mark(BOOTSTAGE_ID_DECOMP_IMAGE);
873 break;
874#endif
875#if defined(CONFIG_FIT)
876 case IMAGE_FORMAT_FIT:
Simon Glass126cc862014-06-12 07:24:47 -0600877 os_noffset = fit_image_load(images, img_addr,
Simon Glassb6396402014-06-12 07:24:46 -0600878 &fit_uname_kernel, &fit_uname_config,
879 IH_ARCH_DEFAULT, IH_TYPE_KERNEL,
880 BOOTSTAGE_ID_FIT_KERNEL_START,
881 FIT_LOAD_IGNORED, os_data, os_len);
882 if (os_noffset < 0)
883 return NULL;
884
885 images->fit_hdr_os = map_sysmem(img_addr, 0);
886 images->fit_uname_os = fit_uname_kernel;
887 images->fit_uname_cfg = fit_uname_config;
888 images->fit_noffset_os = os_noffset;
889 break;
890#endif
891#ifdef CONFIG_ANDROID_BOOT_IMAGE
892 case IMAGE_FORMAT_ANDROID:
893 printf("## Booting Android Image at 0x%08lx ...\n", img_addr);
Simon Glass07c0cd72014-06-12 07:24:48 -0600894 if (android_image_get_kernel(buf, images->verify,
Simon Glassb6396402014-06-12 07:24:46 -0600895 os_data, os_len))
896 return NULL;
897 break;
898#endif
899 default:
900 printf("Wrong Image Format for %s command\n", cmdtp->name);
901 bootstage_error(BOOTSTAGE_ID_FIT_KERNEL_INFO);
902 return NULL;
903 }
904
905 debug(" kernel data at 0x%08lx, len = 0x%08lx (%ld)\n",
906 *os_data, *os_len, *os_len);
907
908 return buf;
909}
Simon Glassce1400f2014-06-12 07:24:53 -0600910#else /* USE_HOSTCC */
911
912void memmove_wd(void *to, void *from, size_t len, ulong chunksz)
913{
914 memmove(to, from, len);
915}
916
917static int bootm_host_load_image(const void *fit, int req_image_type)
918{
919 const char *fit_uname_config = NULL;
920 ulong data, len;
921 bootm_headers_t images;
922 int noffset;
923 ulong load_end;
924 uint8_t image_type;
925 uint8_t imape_comp;
926 void *load_buf;
927 int ret;
928
929 memset(&images, '\0', sizeof(images));
930 images.verify = 1;
931 noffset = fit_image_load(&images, (ulong)fit,
932 NULL, &fit_uname_config,
933 IH_ARCH_DEFAULT, req_image_type, -1,
934 FIT_LOAD_IGNORED, &data, &len);
935 if (noffset < 0)
936 return noffset;
937 if (fit_image_get_type(fit, noffset, &image_type)) {
938 puts("Can't get image type!\n");
939 return -EINVAL;
940 }
941
942 if (fit_image_get_comp(fit, noffset, &imape_comp)) {
943 puts("Can't get image compression!\n");
944 return -EINVAL;
945 }
946
947 /* Allow the image to expand by a factor of 4, should be safe */
948 load_buf = malloc((1 << 20) + len * 4);
Simon Glass081cc192014-12-02 13:17:33 -0700949 ret = bootm_decomp_image(imape_comp, 0, data, image_type, load_buf,
950 (void *)data, len, CONFIG_SYS_BOOTM_LEN,
951 &load_end);
Simon Glassce1400f2014-06-12 07:24:53 -0600952 free(load_buf);
Simon Glass081cc192014-12-02 13:17:33 -0700953
Simon Glassce1400f2014-06-12 07:24:53 -0600954 if (ret && ret != BOOTM_ERR_UNIMPLEMENTED)
955 return ret;
956
957 return 0;
958}
959
960int bootm_host_load_images(const void *fit, int cfg_noffset)
961{
962 static uint8_t image_types[] = {
963 IH_TYPE_KERNEL,
964 IH_TYPE_FLATDT,
965 IH_TYPE_RAMDISK,
966 };
967 int err = 0;
968 int i;
969
970 for (i = 0; i < ARRAY_SIZE(image_types); i++) {
971 int ret;
972
973 ret = bootm_host_load_image(fit, image_types[i]);
974 if (!err && ret && ret != -ENOENT)
975 err = ret;
976 }
977
978 /* Return the first error we found */
979 return err;
980}
Simon Glassea51a622014-06-12 07:24:51 -0600981
982#endif /* ndef USE_HOSTCC */