1 // SPDX-License-Identifier: GPL-2.0+
4 * Sam Protsenko <joe.skb7@gmail.com>
7 #include <android_image.h>
12 #define abootimg_addr() \
13 (_abootimg_addr == -1 ? image_load_addr : _abootimg_addr)
15 /* Please use abootimg_addr() macro to obtain the boot image address */
16 static ulong _abootimg_addr = -1;
18 static int abootimg_get_ver(int argc, char * const argv[])
20 const struct andr_img_hdr *hdr;
21 int res = CMD_RET_SUCCESS;
26 hdr = map_sysmem(abootimg_addr(), sizeof(*hdr));
27 if (android_image_check_header(hdr)) {
28 printf("Error: Boot Image header is incorrect\n");
29 res = CMD_RET_FAILURE;
34 printf("%u\n", hdr->header_version);
36 env_set_ulong(argv[0], hdr->header_version);
43 static int abootimg_get_recovery_dtbo(int argc, char * const argv[])
51 if (!android_image_get_dtbo(abootimg_addr(), &addr, &size))
52 return CMD_RET_FAILURE;
55 printf("%lx\n", addr);
57 env_set_hex(argv[0], addr);
59 env_set_hex(argv[1], size);
62 return CMD_RET_SUCCESS;
65 static int abootimg_get_dtb_load_addr(int argc, char * const argv[])
67 const struct andr_img_hdr *hdr;
68 int res = CMD_RET_SUCCESS;
73 hdr = map_sysmem(abootimg_addr(), sizeof(*hdr));
74 if (android_image_check_header(hdr)) {
75 printf("Error: Boot Image header is incorrect\n");
76 res = CMD_RET_FAILURE;
80 if (hdr->header_version < 2) {
81 printf("Error: header_version must be >= 2 for this\n");
82 res = CMD_RET_FAILURE;
87 printf("%lx\n", (ulong)hdr->dtb_addr);
89 env_set_hex(argv[0], (ulong)hdr->dtb_addr);
96 static int abootimg_get_dtb_by_index(int argc, char * const argv[])
98 const char *index_str;
104 if (argc < 1 || argc > 3)
105 return CMD_RET_USAGE;
107 index_str = argv[0] + strlen("--index=");
108 if (index_str[0] == '\0') {
109 printf("Error: Wrong index num\n");
110 return CMD_RET_FAILURE;
113 num = simple_strtoul(index_str, &endp, 0);
115 printf("Error: Wrong index num\n");
116 return CMD_RET_FAILURE;
119 if (!android_image_get_dtb_by_index(abootimg_addr(), num,
121 return CMD_RET_FAILURE;
125 printf("%lx\n", addr);
127 if (env_set_hex(argv[1], addr)) {
128 printf("Error: Can't set [addr_var]\n");
129 return CMD_RET_FAILURE;
133 if (env_set_hex(argv[2], size)) {
134 printf("Error: Can't set [size_var]\n");
135 return CMD_RET_FAILURE;
140 return CMD_RET_SUCCESS;
143 static int abootimg_get_dtb(int argc, char * const argv[])
146 return CMD_RET_USAGE;
148 if (strstr(argv[0], "--index="))
149 return abootimg_get_dtb_by_index(argc, argv);
151 return CMD_RET_USAGE;
154 static int do_abootimg_addr(cmd_tbl_t *cmdtp, int flag, int argc,
161 return CMD_RET_USAGE;
163 img_addr = simple_strtoul(argv[1], &endp, 16);
165 printf("Error: Wrong image address\n");
166 return CMD_RET_FAILURE;
169 _abootimg_addr = img_addr;
170 return CMD_RET_SUCCESS;
173 static int do_abootimg_get(cmd_tbl_t *cmdtp, int flag, int argc,
179 return CMD_RET_USAGE;
184 if (!strcmp(param, "ver"))
185 return abootimg_get_ver(argc, argv);
186 else if (!strcmp(param, "recovery_dtbo"))
187 return abootimg_get_recovery_dtbo(argc, argv);
188 else if (!strcmp(param, "dtb_load_addr"))
189 return abootimg_get_dtb_load_addr(argc, argv);
190 else if (!strcmp(param, "dtb"))
191 return abootimg_get_dtb(argc, argv);
193 return CMD_RET_USAGE;
196 static int do_abootimg_dump(cmd_tbl_t *cmdtp, int flag, int argc,
200 return CMD_RET_USAGE;
202 if (!strcmp(argv[1], "dtb")) {
203 if (android_image_print_dtb_contents(abootimg_addr()))
204 return CMD_RET_FAILURE;
206 return CMD_RET_USAGE;
209 return CMD_RET_SUCCESS;
212 static cmd_tbl_t cmd_abootimg_sub[] = {
213 U_BOOT_CMD_MKENT(addr, 2, 1, do_abootimg_addr, "", ""),
214 U_BOOT_CMD_MKENT(dump, 2, 1, do_abootimg_dump, "", ""),
215 U_BOOT_CMD_MKENT(get, 5, 1, do_abootimg_get, "", ""),
218 static int do_abootimg(cmd_tbl_t *cmdtp, int flag, int argc,
223 cp = find_cmd_tbl(argv[1], cmd_abootimg_sub,
224 ARRAY_SIZE(cmd_abootimg_sub));
226 /* Strip off leading 'abootimg' command argument */
230 if (!cp || argc > cp->maxargs)
231 return CMD_RET_USAGE;
232 if (flag == CMD_FLAG_REPEAT && !cmd_is_repeatable(cp))
233 return CMD_RET_SUCCESS;
235 return cp->cmd(cmdtp, flag, argc, argv);
239 abootimg, CONFIG_SYS_MAXARGS, 0, do_abootimg,
240 "manipulate Android Boot Image",
242 " - set the address in RAM where boot image is located\n"
243 " ($loadaddr is used by default)\n"
244 "abootimg dump dtb\n"
245 " - print info for all DT blobs in DTB area\n"
246 "abootimg get ver [varname]\n"
247 " - get header version\n"
248 "abootimg get recovery_dtbo [addr_var [size_var]]\n"
249 " - get address and size (hex) of recovery DTBO area in the image\n"
250 " [addr_var]: variable name to contain DTBO area address\n"
251 " [size_var]: variable name to contain DTBO area size\n"
252 "abootimg get dtb_load_addr [varname]\n"
253 " - get load address (hex) of DTB, from image header\n"
254 "abootimg get dtb --index=<num> [addr_var [size_var]]\n"
255 " - get address and size (hex) of DT blob in the image by index\n"
256 " <num>: index number of desired DT blob in DTB area\n"
257 " [addr_var]: variable name to contain DT blob address\n"
258 " [size_var]: variable name to contain DT blob size"