blob: 4e563a8294086b7dec641395343e020f7dc4a799 [file] [log] [blame] [edit]
/*
* Copyright (c) 2011 Sebastian Andrzej Siewior <bigeasy@linutronix.de>
*
* SPDX-License-Identifier: GPL-2.0+
*/
#include <common.h>
#include <image.h>
#include <android_image.h>
#include <malloc.h>
#include <errno.h>
#define KDTB_MAGIC "KDTB"
#define KDTB_MAGIC_SZ (sizeof(KDTB_MAGIC) - 1)
// The Kernel is packed along with its dtb file
// The format is [header][kernel][dtb file]
// This is the header
typedef struct __attribute__((__packed__)) KDTB_HEADER {
char magic[KDTB_MAGIC_SZ];
uint32_t kernel_size;
uint32_t dtb_size;
} KDTB_HEADER;
typedef struct KDTB_PARSED {
unsigned char *kernel_addr;
uint32_t kernel_size;
unsigned char *dtb_addr;
uint32_t dtb_size;
} KDTB_PARSED;
static int parse_kern_dtb(unsigned char *kern_dtb, unsigned kern_dtb_size,
KDTB_PARSED *parsed) {
KDTB_HEADER header;
memcpy(&header, kern_dtb, sizeof(header));
if (memcmp(KDTB_MAGIC, header.magic, KDTB_MAGIC_SZ) != 0) {
return ANDR_BOOT_KDTB_NOT_FOUND;
}
unsigned expected_kernel_size =
header.kernel_size + header.dtb_size + sizeof(header);
if (expected_kernel_size != kern_dtb_size) {
printf("the expected kern-dtb size is: %u\n", expected_kernel_size);
printf("the actual kern-dtb size is: %u\n", kern_dtb_size);
// For now, don't error out on this condition. Seems the
// hdr->kernel_size value is not used in current code, so there is no
// way to assert this.
}
parsed->kernel_addr = kern_dtb + sizeof(header);
if ((uintptr_t)parsed->kernel_addr & 0x3) {
printf("Kernel must be 4 byte aligned\n");
return ANDR_BOOT_KDTB_INVALID;
}
parsed->kernel_size = header.kernel_size;
parsed->dtb_addr = parsed->kernel_addr + header.kernel_size;
parsed->dtb_size = header.dtb_size;
return 0;
}
static const unsigned char lzop_magic[] = {
0x89, 0x4c, 0x5a, 0x4f, 0x00, 0x0d, 0x0a, 0x1a, 0x0a
};
static const unsigned char gzip_magic[] = {
0x1f, 0x8b
};
static char andr_tmp_str[ANDR_BOOT_ARGS_SIZE + 1];
/**
* android_image_get_kernel() - processes kernel part of Android boot images
* @hdr: Pointer to image header, which is at the start
* of the image.
* @verify: Checksum verification flag. Currently unimplemented.
* @os_data: Pointer to a ulong variable, will hold os data start
* address.
* @os_len: Pointer to a ulong variable, will hold os data length.
*
* This function returns the os image's start address and length. Also,
* it appends the kernel command line to the bootargs env variable.
*
* Return: Zero, os start address and length on success,
* otherwise on failure.
*/
int android_image_get_kernel(const struct andr_img_hdr *hdr, int verify,
ulong *os_data, ulong *os_len)
{
/*
* Not all Android tools use the id field for signing the image with
* sha1 (or anything) so we don't check it. It is not obvious that the
* string is null terminated so we take care of this.
*/
ulong end;
strncpy(andr_tmp_str, hdr->name, ANDR_BOOT_NAME_SIZE);
andr_tmp_str[ANDR_BOOT_NAME_SIZE] = '\0';
if (strlen(andr_tmp_str))
printf("Android's image name: %s\n", andr_tmp_str);
debug("Kernel load addr 0x%08x size %u KiB\n",
hdr->kernel_addr, DIV_ROUND_UP(hdr->kernel_size, 1024));
int len = 0;
if (*hdr->cmdline) {
printf("Boot image kernel command line: %s\n", hdr->cmdline);
len += strlen(hdr->cmdline);
}
char *bootargs = getenv("bootargs");
if (bootargs)
len += strlen(bootargs);
char *newbootargs = malloc(len + 2);
if (!newbootargs) {
puts("Error: malloc in android_image_get_kernel failed!\n");
return -ENOMEM;
}
*newbootargs = '\0';
if (*hdr->cmdline) {
strcpy(newbootargs, hdr->cmdline);
strcat(newbootargs, " ");
}
if (bootargs) {
strcat(newbootargs, bootargs);
}
printf("Full kernel command line: %s\n", newbootargs);
setenv("bootargs", newbootargs);
// Kernel or kernel-dtb file exists at this location.
void *kernel = (unsigned char *)hdr + hdr->page_size;
KDTB_PARSED parsed = {0};
int ret = parse_kern_dtb(kernel, hdr->kernel_size, &parsed);
if (ret == ANDR_BOOT_KDTB_INVALID)
return ret;
if (ret == 0) {
// kernel-dtb file found.
printf("found kdtb.\n");
if (os_data) {
*os_data = (ulong)parsed.kernel_addr;
}
if (os_len)
*os_len = parsed.kernel_size;
images.ft_len = parsed.dtb_size;
images.ft_addr = (char *)parsed.dtb_addr;
end = (ulong)hdr;
end += hdr->page_size;
end += ALIGN(hdr->kernel_size, hdr->page_size);
images.rd_start = end;
return 0;
}
if (os_data) {
*os_data = (ulong)kernel;
}
if (os_len)
*os_len = hdr->kernel_size;
#if defined(CONFIG_ANDROID_IMG)
images.ft_len = (ulong)(hdr->second_size);
end = (ulong)hdr;
end += hdr->page_size;
end += ALIGN(hdr->kernel_size, hdr->page_size);
images.rd_start = end;
end += ALIGN(hdr->ramdisk_size, hdr->page_size);
images.ft_addr = (char *)end;
#endif
return 0;
}
int android_image_check_header(const struct andr_img_hdr *hdr)
{
return memcmp(ANDR_BOOT_MAGIC, hdr->magic, ANDR_BOOT_MAGIC_SIZE);
}
ulong android_image_get_end(const struct andr_img_hdr *hdr)
{
ulong end;
/*
* The header takes a full page, the remaining components are aligned
* on page boundary
*/
end = (ulong)hdr;
end += hdr->page_size;
end += ALIGN(hdr->kernel_size, hdr->page_size);
end += ALIGN(hdr->ramdisk_size, hdr->page_size);
end += ALIGN(hdr->second_size, hdr->page_size);
return end;
}
ulong android_image_get_kload(const struct andr_img_hdr *hdr)
{
return hdr->kernel_addr;
}
int android_image_get_ramdisk(const struct andr_img_hdr *hdr,
ulong *rd_data, ulong *rd_len)
{
if (!hdr->ramdisk_size)
return -1;
debug("RAM disk load addr 0x%08x size %u KiB\n",
hdr->ramdisk_addr, DIV_ROUND_UP(hdr->ramdisk_size, 1024));
*rd_data = (unsigned long)hdr;
*rd_data += hdr->page_size;
*rd_data += ALIGN(hdr->kernel_size, hdr->page_size);
*rd_len = hdr->ramdisk_size;
return 0;
}
ulong android_image_get_comp(const struct andr_img_hdr *os_hdr)
{
int i;
unsigned char *src = (unsigned char *)os_hdr + os_hdr->page_size;
KDTB_PARSED parsed = {0};
if (parse_kern_dtb(src, 0, &parsed) == 0) {
src = parsed.kernel_addr;
}
unsigned char *begin = src;
/* read magic: 9 first bytes */
for (i = 0; i < ARRAY_SIZE(lzop_magic); i++) {
if (*src++ != lzop_magic[i])
break;
}
if (i == ARRAY_SIZE(lzop_magic))
return IH_COMP_LZO;
src = begin;
for (i = 0; i < ARRAY_SIZE(gzip_magic); i++) {
if (*src++ != gzip_magic[i])
break;
}
if (i == ARRAY_SIZE(gzip_magic))
return IH_COMP_GZIP;
return IH_COMP_NONE;
}
int android_image_need_move(ulong *img_addr, const struct andr_img_hdr *hdr)
{
ulong kernel_load_addr = android_image_get_kload(hdr);
ulong img_start = *img_addr;
ulong val = 0;
if (kernel_load_addr > img_start)
val = kernel_load_addr - img_start;
else
val = img_start - kernel_load_addr;
if (android_image_get_comp(hdr) == IH_COMP_NONE)
return 0;
if (val < 32*1024*1024) {
ulong total_size = android_image_get_end(hdr)-(ulong)hdr;
void *reloc_addr = malloc(total_size);
if (!reloc_addr) {
puts("Error: malloc in android_image_need_move failed!\n");
return -ENOMEM;
}
printf("reloc_addr =%lx\n", (ulong)reloc_addr);
memset(reloc_addr, 0, total_size);
memmove(reloc_addr, hdr, total_size);
*img_addr = (ulong)reloc_addr;
printf("copy done\n");
}
return 0;
}