Blame view

bootloader/u-boot_2015_04/common/image-android.c 3.13 KB
6b13f685e   김민수   BSP 최초 추가
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
  /*
   * Copyright (c) 2011 Sebastian Andrzej Siewior <bigeasy@linutronix.de>
   *
   * SPDX-License-Identifier:	GPL-2.0+
   */
  
  #include <common.h>
  #include <image.h>
  #include <android_image.h>
  #include <malloc.h>
  #include <errno.h>
  
  static char andr_tmp_str[ANDR_BOOT_ARGS_SIZE + 1];
  
  /**
   * android_image_get_kernel() - processes kernel part of Android boot images
   * @hdr:	Pointer to image header, which is at the start
   *			of the image.
   * @verify:	Checksum verification flag. Currently unimplemented.
   * @os_data:	Pointer to a ulong variable, will hold os data start
   *			address.
   * @os_len:	Pointer to a ulong variable, will hold os data length.
   *
   * This function returns the os image's start address and length. Also,
   * it appends the kernel command line to the bootargs env variable.
   *
   * Return: Zero, os start address and length on success,
   *		otherwise on failure.
   */
  int android_image_get_kernel(const struct andr_img_hdr *hdr, int verify,
  			     ulong *os_data, ulong *os_len)
  {
  	/*
  	 * Not all Android tools use the id field for signing the image with
  	 * sha1 (or anything) so we don't check it. It is not obvious that the
  	 * string is null terminated so we take care of this.
  	 */
  	strncpy(andr_tmp_str, hdr->name, ANDR_BOOT_NAME_SIZE);
  	andr_tmp_str[ANDR_BOOT_NAME_SIZE] = '\0';
  	if (strlen(andr_tmp_str))
  		printf("Android's image name: %s
  ", andr_tmp_str);
  
  	printf("Kernel load addr 0x%08x size %u KiB
  ",
  	       hdr->kernel_addr, DIV_ROUND_UP(hdr->kernel_size, 1024));
  
  	int len = 0;
  	if (*hdr->cmdline) {
  		printf("Kernel command line: %s
  ", hdr->cmdline);
  		len += strlen(hdr->cmdline);
  	}
  
  	char *bootargs = getenv("bootargs");
  	if (bootargs)
  		len += strlen(bootargs);
  
  	char *newbootargs = malloc(len + 2);
  	if (!newbootargs) {
  		puts("Error: malloc in android_image_get_kernel failed!
  ");
  		return -ENOMEM;
  	}
  	*newbootargs = '\0';
  
  	if (bootargs) {
  		strcpy(newbootargs, bootargs);
  		strcat(newbootargs, " ");
  	}
  	if (*hdr->cmdline)
  		strcat(newbootargs, hdr->cmdline);
  
  	setenv("bootargs", newbootargs);
  
  	if (os_data) {
  		*os_data = (ulong)hdr;
  		*os_data += hdr->page_size;
  	}
  	if (os_len)
  		*os_len = hdr->kernel_size;
  	return 0;
  }
  
  int android_image_check_header(const struct andr_img_hdr *hdr)
  {
  	return memcmp(ANDR_BOOT_MAGIC, hdr->magic, ANDR_BOOT_MAGIC_SIZE);
  }
  
  ulong android_image_get_end(const struct andr_img_hdr *hdr)
  {
  	ulong end;
  	/*
  	 * The header takes a full page, the remaining components are aligned
  	 * on page boundary
  	 */
  	end = (ulong)hdr;
  	end += hdr->page_size;
  	end += ALIGN(hdr->kernel_size, hdr->page_size);
  	end += ALIGN(hdr->ramdisk_size, hdr->page_size);
  	end += ALIGN(hdr->second_size, hdr->page_size);
  
  	return end;
  }
  
  ulong android_image_get_kload(const struct andr_img_hdr *hdr)
  {
  	return hdr->kernel_addr;
  }
  
  int android_image_get_ramdisk(const struct andr_img_hdr *hdr,
  			      ulong *rd_data, ulong *rd_len)
  {
  	if (!hdr->ramdisk_size)
  		return -1;
  
  	printf("RAM disk load addr 0x%08x size %u KiB
  ",
  	       hdr->ramdisk_addr, DIV_ROUND_UP(hdr->ramdisk_size, 1024));
  
  	*rd_data = (unsigned long)hdr;
  	*rd_data += hdr->page_size;
  	*rd_data += ALIGN(hdr->kernel_size, hdr->page_size);
  
  	*rd_len = hdr->ramdisk_size;
  	return 0;
  }