1// SPDX-License-Identifier: GPL-2.0+
2/*
3 * (C) Copyright 2020
4 * Sam Protsenko <joe.skb7@gmail.com>
5 */
6
7#include <android_image.h>
8#include <common.h>
9#include <command.h>
10#include <image.h>
11#include <mapmem.h>
12
13#define abootimg_addr() \
14	(_abootimg_addr == -1 ? image_load_addr : _abootimg_addr)
15
16/* Please use abootimg_addr() macro to obtain the boot image address */
17static ulong _abootimg_addr = -1;
18static ulong _avendor_bootimg_addr = -1;
19
20ulong get_abootimg_addr(void)
21{
22	return (_abootimg_addr == -1 ? image_load_addr : _abootimg_addr);
23}
24
25ulong get_avendor_bootimg_addr(void)
26{
27	return _avendor_bootimg_addr;
28}
29
30static int abootimg_get_ver(int argc, char *const argv[])
31{
32	const struct andr_boot_img_hdr_v0 *hdr;
33	int res = CMD_RET_SUCCESS;
34
35	if (argc > 1)
36		return CMD_RET_USAGE;
37
38	hdr = map_sysmem(abootimg_addr(), sizeof(*hdr));
39	if (!is_android_boot_image_header(hdr)) {
40		printf("Error: Boot Image header is incorrect\n");
41		res = CMD_RET_FAILURE;
42		goto exit;
43	}
44
45	if (argc == 0)
46		printf("%u\n", hdr->header_version);
47	else
48		env_set_ulong(argv[0], hdr->header_version);
49
50exit:
51	unmap_sysmem(hdr);
52	return res;
53}
54
55static int abootimg_get_recovery_dtbo(int argc, char *const argv[])
56{
57	ulong addr;
58	u32 size;
59
60	if (argc > 2)
61		return CMD_RET_USAGE;
62
63	if (!android_image_get_dtbo(abootimg_addr(), &addr, &size))
64		return CMD_RET_FAILURE;
65
66	if (argc == 0) {
67		printf("%lx\n", addr);
68	} else {
69		env_set_hex(argv[0], addr);
70		if (argc == 2)
71			env_set_hex(argv[1], size);
72	}
73
74	return CMD_RET_SUCCESS;
75}
76
77static int abootimg_get_dtb_load_addr(int argc, char *const argv[])
78{
79	if (argc > 1)
80		return CMD_RET_USAGE;
81	struct andr_image_data img_data = {0};
82	const struct andr_boot_img_hdr_v0 *hdr;
83	const struct andr_vnd_boot_img_hdr *vhdr;
84
85	hdr = map_sysmem(abootimg_addr(), sizeof(*hdr));
86	if (get_avendor_bootimg_addr() != -1)
87		vhdr = map_sysmem(get_avendor_bootimg_addr(), sizeof(*vhdr));
88
89	if (!android_image_get_data(hdr, vhdr, &img_data)) {
90		if (get_avendor_bootimg_addr() != -1)
91			unmap_sysmem(vhdr);
92		unmap_sysmem(hdr);
93		return CMD_RET_FAILURE;
94	}
95
96	if (get_avendor_bootimg_addr() != -1)
97		unmap_sysmem(vhdr);
98	unmap_sysmem(hdr);
99
100	if (img_data.header_version < 2) {
101		printf("Error: header_version must be >= 2 for this\n");
102		return CMD_RET_FAILURE;
103	}
104
105	if (!img_data.dtb_load_addr) {
106		printf("Error: failed to read dtb_load_addr\n");
107		return CMD_RET_FAILURE;
108	}
109
110	if (argc == 0)
111		printf("%lx\n", (ulong)img_data.dtb_load_addr);
112	else
113		env_set_hex(argv[0], (ulong)img_data.dtb_load_addr);
114
115	return CMD_RET_SUCCESS;
116}
117
118static int abootimg_get_dtb_by_index(int argc, char *const argv[])
119{
120	const char *index_str;
121	u32 num;
122	char *endp;
123	ulong addr;
124	u32 size;
125
126	if (argc < 1 || argc > 3)
127		return CMD_RET_USAGE;
128
129	index_str = argv[0] + strlen("--index=");
130	if (index_str[0] == '\0') {
131		printf("Error: Wrong index num\n");
132		return CMD_RET_FAILURE;
133	}
134
135	num = simple_strtoul(index_str, &endp, 0);
136	if (*endp != '\0') {
137		printf("Error: Wrong index num\n");
138		return CMD_RET_FAILURE;
139	}
140
141	if (!android_image_get_dtb_by_index(abootimg_addr(),
142					    get_avendor_bootimg_addr(), num,
143					    &addr, &size)) {
144		return CMD_RET_FAILURE;
145	}
146
147	if (argc == 1) {
148		printf("%lx\n", addr);
149	} else {
150		if (env_set_hex(argv[1], addr)) {
151			printf("Error: Can't set [addr_var]\n");
152			return CMD_RET_FAILURE;
153		}
154
155		if (argc == 3) {
156			if (env_set_hex(argv[2], size)) {
157				printf("Error: Can't set [size_var]\n");
158				return CMD_RET_FAILURE;
159			}
160		}
161	}
162
163	return CMD_RET_SUCCESS;
164}
165
166static int abootimg_get_dtb(int argc, char *const argv[])
167{
168	if (argc < 1)
169		return CMD_RET_USAGE;
170
171	if (strstr(argv[0], "--index="))
172		return abootimg_get_dtb_by_index(argc, argv);
173
174	return CMD_RET_USAGE;
175}
176
177static int do_abootimg_addr(struct cmd_tbl *cmdtp, int flag, int argc,
178			    char *const argv[])
179{
180	char *endp;
181	ulong img_addr;
182
183	if (argc < 2 || argc > 3)
184		return CMD_RET_USAGE;
185
186	img_addr = hextoul(argv[1], &endp);
187	if (*endp != '\0') {
188		printf("Error: Wrong image address\n");
189		return CMD_RET_FAILURE;
190	}
191
192	_abootimg_addr = img_addr;
193
194	if (argc == 3) {
195		img_addr = simple_strtoul(argv[2], &endp, 16);
196		if (*endp != '\0') {
197			printf("Error: Wrong vendor image address\n");
198			return CMD_RET_FAILURE;
199		}
200
201		_avendor_bootimg_addr = img_addr;
202	}
203
204	return CMD_RET_SUCCESS;
205}
206
207static int do_abootimg_get(struct cmd_tbl *cmdtp, int flag, int argc,
208			   char *const argv[])
209{
210	const char *param;
211
212	if (argc < 2)
213		return CMD_RET_USAGE;
214
215	param = argv[1];
216	argc -= 2;
217	argv += 2;
218	if (!strcmp(param, "ver"))
219		return abootimg_get_ver(argc, argv);
220	else if (!strcmp(param, "recovery_dtbo"))
221		return abootimg_get_recovery_dtbo(argc, argv);
222	else if (!strcmp(param, "dtb_load_addr"))
223		return abootimg_get_dtb_load_addr(argc, argv);
224	else if (!strcmp(param, "dtb"))
225		return abootimg_get_dtb(argc, argv);
226
227	return CMD_RET_USAGE;
228}
229
230static int do_abootimg_dump(struct cmd_tbl *cmdtp, int flag, int argc,
231			    char *const argv[])
232{
233	if (argc != 2)
234		return CMD_RET_USAGE;
235
236	if (!strcmp(argv[1], "dtb")) {
237		if (android_image_print_dtb_contents(abootimg_addr()))
238			return CMD_RET_FAILURE;
239	} else {
240		return CMD_RET_USAGE;
241	}
242
243	return CMD_RET_SUCCESS;
244}
245
246static struct cmd_tbl cmd_abootimg_sub[] = {
247	U_BOOT_CMD_MKENT(addr, 3, 1, do_abootimg_addr, "", ""),
248	U_BOOT_CMD_MKENT(dump, 2, 1, do_abootimg_dump, "", ""),
249	U_BOOT_CMD_MKENT(get, 5, 1, do_abootimg_get, "", ""),
250};
251
252static int do_abootimg(struct cmd_tbl *cmdtp, int flag, int argc,
253		       char *const argv[])
254{
255	struct cmd_tbl *cp;
256
257	cp = find_cmd_tbl(argv[1], cmd_abootimg_sub,
258			  ARRAY_SIZE(cmd_abootimg_sub));
259
260	/* Strip off leading 'abootimg' command argument */
261	argc--;
262	argv++;
263
264	if (!cp || argc > cp->maxargs)
265		return CMD_RET_USAGE;
266	if (flag == CMD_FLAG_REPEAT && !cmd_is_repeatable(cp))
267		return CMD_RET_SUCCESS;
268
269	return cp->cmd(cmdtp, flag, argc, argv);
270}
271
272U_BOOT_CMD(
273	abootimg, CONFIG_SYS_MAXARGS, 0, do_abootimg,
274	"manipulate Android Boot Image",
275	"addr <boot_img_addr> [<vendor_boot_img_addr>]>\n"
276	"    - set the address in RAM where boot image is located\n"
277	"      ($loadaddr is used by default)\n"
278	"abootimg dump dtb\n"
279	"    - print info for all DT blobs in DTB area\n"
280	"abootimg get ver [varname]\n"
281	"    - get header version\n"
282	"abootimg get recovery_dtbo [addr_var [size_var]]\n"
283	"    - get address and size (hex) of recovery DTBO area in the image\n"
284	"      [addr_var]: variable name to contain DTBO area address\n"
285	"      [size_var]: variable name to contain DTBO area size\n"
286	"abootimg get dtb_load_addr [varname]\n"
287	"    - get load address (hex) of DTB, from image header\n"
288	"abootimg get dtb --index=<num> [addr_var [size_var]]\n"
289	"    - get address and size (hex) of DT blob in the image by index\n"
290	"      <num>: index number of desired DT blob in DTB area\n"
291	"      [addr_var]: variable name to contain DT blob address\n"
292	"      [size_var]: variable name to contain DT blob size"
293);
294