blob: 599d0b23f88658ed9a9585228c23484de0018cdb [file] [log] [blame] [edit]
// SPDX-License-Identifier: GPL-2.0+
/*
* (C) Copyright 2000-2009
* Wolfgang Denk, DENX Software Engineering, wd@denx.de.
*/
/*
* Boot support
*/
#include <common.h>
#include <bootm.h>
#include <command.h>
#include <env.h>
#include <errno.h>
#include <image.h>
#include <malloc.h>
#include <nand.h>
#include <asm/byteorder.h>
#include <asm/global_data.h>
#include <linux/ctype.h>
#include <linux/err.h>
#include <u-boot/zlib.h>
#include <mapmem.h>
#include <amlogic/libavb/libavb.h>
#include <amlogic/partition_table.h>
#if CONFIG_IS_ENABLED(AML_ANTIROLLBACK) || CONFIG_IS_ENABLED(AML_AVB2_ANTIROLLBACK)
#include <amlogic/anti-rollback.h>
#endif
#include <amlogic/aml_efuse.h>
#include <version.h>
#include <amlogic/image_check.h>
#include <asm/amlogic/arch/bl31_apis.h>
#include <amlogic/aml_rollback.h>
DECLARE_GLOBAL_DATA_PTR;
#if defined(CONFIG_CMD_IMI)
static int image_info(unsigned long addr);
#endif
#if defined(CONFIG_CMD_IMLS)
#include <flash.h>
#include <mtd/cfi_flash.h>
#endif
#if defined(CONFIG_CMD_IMLS) || defined(CONFIG_CMD_IMLS_NAND)
static int do_imls(struct cmd_tbl *cmdtp, int flag, int argc,
char *const argv[]);
#endif
/* we overload the cmd field with our state machine info instead of a
* function pointer */
static struct cmd_tbl cmd_bootm_sub[] = {
U_BOOT_CMD_MKENT(start, 0, 1, (void *)BOOTM_STATE_START, "", ""),
U_BOOT_CMD_MKENT(loados, 0, 1, (void *)BOOTM_STATE_LOADOS, "", ""),
#ifdef CONFIG_CMD_BOOTM_PRE_LOAD
U_BOOT_CMD_MKENT(preload, 0, 1, (void *)BOOTM_STATE_PRE_LOAD, "", ""),
#endif
#ifdef CONFIG_SYS_BOOT_RAMDISK_HIGH
U_BOOT_CMD_MKENT(ramdisk, 0, 1, (void *)BOOTM_STATE_RAMDISK, "", ""),
#endif
#ifdef CONFIG_OF_LIBFDT
U_BOOT_CMD_MKENT(fdt, 0, 1, (void *)BOOTM_STATE_FDT, "", ""),
#endif
U_BOOT_CMD_MKENT(cmdline, 0, 1, (void *)BOOTM_STATE_OS_CMDLINE, "", ""),
U_BOOT_CMD_MKENT(bdt, 0, 1, (void *)BOOTM_STATE_OS_BD_T, "", ""),
U_BOOT_CMD_MKENT(prep, 0, 1, (void *)BOOTM_STATE_OS_PREP, "", ""),
U_BOOT_CMD_MKENT(fake, 0, 1, (void *)BOOTM_STATE_OS_FAKE_GO, "", ""),
U_BOOT_CMD_MKENT(go, 0, 1, (void *)BOOTM_STATE_OS_GO, "", ""),
};
#if defined(CONFIG_CMD_BOOTM_PRE_LOAD)
static ulong bootm_get_addr(int argc, char *const argv[])
{
ulong addr;
if (argc > 0)
addr = hextoul(argv[0], NULL);
else
addr = image_load_addr;
return addr;
}
#endif
static int do_bootm_subcommand(struct cmd_tbl *cmdtp, int flag, int argc,
char *const argv[])
{
int ret = 0;
long state;
struct cmd_tbl *c;
c = find_cmd_tbl(argv[0], &cmd_bootm_sub[0], ARRAY_SIZE(cmd_bootm_sub));
argc--; argv++;
if (c) {
state = (long)c->cmd;
if (state == BOOTM_STATE_START)
state |= BOOTM_STATE_PRE_LOAD | BOOTM_STATE_FINDOS |
BOOTM_STATE_FINDOTHER;
#if defined(CONFIG_CMD_BOOTM_PRE_LOAD)
if (state == BOOTM_STATE_PRE_LOAD)
state |= BOOTM_STATE_START;
#endif
} else {
/* Unrecognized command */
return CMD_RET_USAGE;
}
if (((state & BOOTM_STATE_START) != BOOTM_STATE_START) &&
images.state >= state) {
printf("Trying to execute a command out of order\n");
return CMD_RET_USAGE;
}
ret = do_bootm_states(cmdtp, flag, argc, argv, state, &images, 0);
#if defined(CONFIG_CMD_BOOTM_PRE_LOAD)
if (!ret && (state & BOOTM_STATE_PRE_LOAD))
env_set_hex("loadaddr_verified",
bootm_get_addr(argc, argv) + image_load_offset);
#endif
return ret ? CMD_RET_FAILURE : 0;
}
#if CONFIG_IS_ENABLED(CMD_BOOTCTOL_AVB)
#ifdef CONFIG_AVB2
#if CONFIG_IS_ENABLED(AML_ANTIROLLBACK) || CONFIG_IS_ENABLED(AML_AVB2_ANTIROLLBACK)
static void bootm_avb_bootctl_anti_rollback(int rc, AvbSlotVerifyData *out_data)
{
if (rc == AVB_SLOT_VERIFY_RESULT_OK && is_avb_arb_available() &&
!set_successful_boot() &&
out_data) {
u32 i = 0;
u32 version = 0;
for (i = 0; i < AVB_MAX_NUMBER_OF_ROLLBACK_INDEX_LOCATIONS; i++) {
u64 rb_idx = out_data->rollback_indexes[i];
if (rb_idx != 0 && get_avb_antirollback(i, &version) &&
version < (u32)rb_idx &&
!set_avb_antirollback(i, (u32)rb_idx)) {
printf("rollback(%d) = %u failed\n",
i, (u32)rb_idx);
}
}
}
if (is_avb_arb_available() &&
rc == AVB_SLOT_VERIFY_RESULT_ERROR_ROLLBACK_INDEX &&
has_boot_slot == 1) {
printf("ab mode\n");
update_rollback();
env_set("write_boot", "0");
run_command("saveenv", 0);
run_command("reset", 0);
}
}
#endif
#endif
static int bootm_avb_bootctl(void)
{
int rc = 0;
#ifdef CONFIG_AVB2
char *newbootargs = NULL;
AvbSlotVerifyData *out_data = NULL;
char *bootargs = NULL;
char *avb_cmdline = "\0";
const char *bootstate_o = "androidboot.verifiedbootstate=orange";
const char *bootstate_g = "androidboot.verifiedbootstate=green";
const char *bootstate = "\0";
u8 vbmeta_digest[AVB_SHA256_DIGEST_SIZE];
const int is_dev_unlocked = is_device_unlocked();
rc = avb_verify(&out_data);
if (is_dev_unlocked) {
printf("unlock state, ignore the avb check\n");
bootstate = bootstate_o;
/* return ok due to ignore error */
rc = AVB_SLOT_VERIFY_RESULT_OK;
} else {
printf("lock state, need avb check\n");
printf("avb verification: locked = %d, result = %d\n",
!is_dev_unlocked, rc);
#if CONFIG_IS_ENABLED(AML_ANTIROLLBACK) || CONFIG_IS_ENABLED(AML_AVB2_ANTIROLLBACK)
bootm_avb_bootctl_anti_rollback(rc, out_data);
#endif
if (rc != AVB_SLOT_VERIFY_RESULT_OK)
goto out;
else
bootstate = bootstate_g;
}
if (out_data) {
/* Trying to set boot params */
keymaster_boot_params boot_params;
AvbVBMetaImageHeader toplevel_vbmeta;
avb_vbmeta_image_header_to_host_byte_order
((const AvbVBMetaImageHeader *)
out_data->vbmeta_images[0].vbmeta_data,
&toplevel_vbmeta);
boot_params.boot_patchlevel =
avb_get_boot_patchlevel_from_vbmeta(out_data);
create_csrs();
boot_params.device_locked = is_dev_unlocked ? 0 : 1;
if (is_dev_unlocked ||
(toplevel_vbmeta.flags &
AVB_VBMETA_IMAGE_FLAGS_VERIFICATION_DISABLED) ||
(toplevel_vbmeta.flags &
AVB_VBMETA_IMAGE_FLAGS_HASHTREE_DISABLED)) {
bootstate = bootstate_o;
boot_params.verified_boot_state = 2;
} else {
bootstate = bootstate_g;
boot_params.verified_boot_state = 0;
}
memcpy(boot_params.verified_boot_key, boot_key_hash,
sizeof(boot_params.verified_boot_key));
avb_slot_verify_data_calculate_vbmeta_digest(out_data,
AVB_DIGEST_TYPE_SHA256,
vbmeta_digest);
memcpy(boot_params.verified_boot_hash, vbmeta_digest,
sizeof(boot_params.verified_boot_hash));
if (set_boot_params(&boot_params) < 0)
printf("failed to set boot params.\n");
}
/* complete env string */
bootargs = env_get("bootconfig");
if (!bootargs)
bootargs = "\0";
if (out_data && out_data->cmdline)
avb_cmdline = out_data->cmdline;
newbootargs = malloc(strlen(bootargs) + strlen(avb_cmdline)
+ strlen(bootstate) + 1 + 1 + 1); // spaces and EOL
if (!newbootargs) {
printf("failed to allocate buffer for bootarg\n");
goto out;
}
sprintf(newbootargs, "%s %s %s", bootargs,
avb_cmdline, bootstate);
env_set("bootconfig", newbootargs);
free(newbootargs);
out:
if (out_data)
avb_slot_verify_data_free(out_data);
#endif
return rc;
}
#endif
/*******************************************************************/
/* bootm - boot application image from image in memory */
/*******************************************************************/
int do_bootm(struct cmd_tbl *cmdtp, int flag, int argc, char *const argv[])
{
int states;
int ret;
if (IS_ENABLED(CONFIG_AMLOGIC_MODIFY)) {
/* add reboot_mode in bootargs for kernel command line */
char *pbootargs = env_get("bootargs");
char *preboot_mode = env_get("reboot_mode");
char *recoverystr = "factory_reset";
char *precovery_mode = env_get("recovery_mode");
//if recovery mode need set reboot_mode factory_reset
//for drm driver init recovery by reboot_mode
if (precovery_mode && !strcmp(precovery_mode, "true"))
preboot_mode = recoverystr;
if (pbootargs && preboot_mode) {
int nlen = strlen(pbootargs) + strlen(preboot_mode) + 16;
char *pnewargs = malloc(nlen);
if (pnewargs) {
memset((void *)pnewargs, 0, nlen);
sprintf(pnewargs, "%s reboot_mode=%s\n", pbootargs, preboot_mode);
env_set("bootargs", pnewargs);
free(pnewargs);
pnewargs = NULL;
} else {
puts("Error: malloc in pnewbootargs failed!\n");
}
} else {
puts("Error: add reboot_mode in bootargs failed!\n");
}
}
#if !defined(CONFIG_SKIP_KERNEL_DTB_SECBOOT_CHECK) && defined(CONFIG_IMAGE_CHECK)
char argv0_new[12] = {0};
char *argv_new = (char *)&argv0_new;
#endif
#ifdef CONFIG_NEEDS_MANUAL_RELOC
static int relocated = 0;
if (!relocated) {
int i;
/* relocate names of sub-command table */
for (i = 0; i < ARRAY_SIZE(cmd_bootm_sub); i++)
cmd_bootm_sub[i].name += gd->reloc_off;
relocated = 1;
}
#endif
/* determine if we have a sub command */
argc--; argv++;
if (argc > 0) {
char *endp;
hextoul(argv[0], &endp);
/* endp pointing to NULL means that argv[0] was just a
* valid number, pass it along to the normal bootm processing
*
* If endp is ':' or '#' assume a FIT identifier so pass
* along for normal processing.
*
* Right now we assume the first arg should never be '-'
*/
if ((*endp != 0) && (*endp != ':') && (*endp != '#'))
return do_bootm_subcommand(cmdtp, flag, argc, argv);
}
#if !defined(CONFIG_SKIP_KERNEL_DTB_SECBOOT_CHECK) && defined(CONFIG_IMAGE_CHECK)
unsigned int loadaddr = GXB_IMG_LOAD_ADDR; //default load address
if (argc > 0)
{
char *endp;
loadaddr = simple_strtoul(argv[0], &endp, 16);
//printf("aml log : addr = 0x%x\n",loadaddr);
}
if (IS_FEAT_BOOT_VERIFY()) {
int ret = 0;
ret = secure_image_check((u8 *)(unsigned long)loadaddr,
GXB_IMG_SIZE, GXB_IMG_DEC_ALL);
if (ret) {
printf("\naml log : Sig Check %d\n", ret);
return ret;
}
/* Override load address argument to skip secure boot header.
* Only skip if secure boot so normal boot can use plain boot.img+
*/
ulong img_addr, ncheckoffset;
img_addr = genimg_get_kernel_addr(argc < 1 ? NULL : argv[0]);
ncheckoffset = android_image_check_offset();
img_addr += ncheckoffset;
snprintf(argv0_new, sizeof(argv0_new), "%lx", img_addr);
argc = 1;
argv = (char **)&argv_new;
}
#endif
#ifdef CONFIG_AMLOGIC_MODIFY
char *fastboot_step = env_get("fastboot_step");
if (fastboot_step && (strcmp(fastboot_step, "2") == 0)) {
//come to here, means new burn bootloader.img is OK, reset env
printf("new burn bootloader.img is OK, write other bootloader\n");
char *gpt_mode = env_get("gpt_mode");
char *nocs_mode = env_get("nocs_mode");
if ((gpt_mode && !strcmp(gpt_mode, "true")) ||
(nocs_mode && !strcmp(nocs_mode, "true"))) {
printf("gpt or disable user bootloader mode\n");
run_command("copy_slot_bootable 2 1", 0);
} else {
printf("normal mode\n");
run_command("copy_slot_bootable 1 0", 0);
run_command("copy_slot_bootable 1 2", 0);
}
env_set("fastboot_step", "0");
#if CONFIG_IS_ENABLED(AML_UPDATE_ENV)
run_command("update_env_part -p fastboot_step;", 0);
#else
run_command("defenv_reserve;setenv fastboot_step 0;saveenv;", 0);
#endif
}
#endif
#if CONFIG_IS_ENABLED(CMD_BOOTCTOL_AVB)
ret = bootm_avb_bootctl();
if (ret) {
printf("bootm_avb_bootctl failed(%d)\n", ret);
return CMD_RET_FAILURE;
}
#endif
states = BOOTM_STATE_START | BOOTM_STATE_FINDOS | BOOTM_STATE_PRE_LOAD |
BOOTM_STATE_FINDOTHER | BOOTM_STATE_LOADOS |
BOOTM_STATE_OS_PREP | BOOTM_STATE_OS_FAKE_GO |
BOOTM_STATE_OS_GO;
if (IS_ENABLED(CONFIG_SYS_BOOT_RAMDISK_HIGH))
states |= BOOTM_STATE_RAMDISK;
if (IS_ENABLED(CONFIG_PPC) || IS_ENABLED(CONFIG_MIPS))
states |= BOOTM_STATE_OS_CMDLINE;
ret = do_bootm_states(cmdtp, flag, argc, argv, states, &images, 1);
return ret ? CMD_RET_FAILURE : 0;
}
int bootm_maybe_autostart(struct cmd_tbl *cmdtp, const char *cmd)
{
if (env_get_autostart()) {
char *local_args[2];
local_args[0] = (char *)cmd;
local_args[1] = NULL;
printf("Automatic boot of image at addr 0x%08lX ...\n",
image_load_addr);
return do_bootm(cmdtp, 0, 1, local_args);
}
return 0;
}
#ifdef CONFIG_SYS_LONGHELP
static char bootm_help_text[] =
"[addr [arg ...]]\n - boot application image stored in memory\n"
"\tpassing arguments 'arg ...'; when booting a Linux kernel,\n"
"\t'arg' can be the address of an initrd image\n"
#if defined(CONFIG_OF_LIBFDT)
"\tWhen booting a Linux kernel which requires a flat device-tree\n"
"\ta third argument is required which is the address of the\n"
"\tdevice-tree blob. To boot that kernel without an initrd image,\n"
"\tuse a '-' for the second argument. If you do not pass a third\n"
"\ta bd_info struct will be passed instead\n"
#endif
#if defined(CONFIG_FIT)
"\t\nFor the new multi component uImage format (FIT) addresses\n"
"\tmust be extended to include component or configuration unit name:\n"
"\taddr:<subimg_uname> - direct component image specification\n"
"\taddr#<conf_uname> - configuration specification\n"
"\tUse iminfo command to get the list of existing component\n"
"\timages and configurations.\n"
#endif
"\nSub-commands to do part of the bootm sequence. The sub-commands "
"must be\n"
"issued in the order below (it's ok to not issue all sub-commands):\n"
"\tstart [addr [arg ...]]\n"
#if defined(CONFIG_CMD_BOOTM_PRE_LOAD)
"\tpreload [addr [arg ..]] - run only the preload stage\n"
#endif
"\tloados - load OS image\n"
#if defined(CONFIG_SYS_BOOT_RAMDISK_HIGH)
"\tramdisk - relocate initrd, set env initrd_start/initrd_end\n"
#endif
#if defined(CONFIG_OF_LIBFDT)
"\tfdt - relocate flat device tree\n"
#endif
"\tcmdline - OS specific command line processing/setup\n"
"\tbdt - OS specific bd_info processing\n"
"\tprep - OS specific prep before relocation or go\n"
#if defined(CONFIG_TRACE)
"\tfake - OS specific fake start without go\n"
#endif
"\tgo - start OS";
#endif
U_BOOT_CMD(
bootm, CONFIG_SYS_MAXARGS, 1, do_bootm,
"boot application image from memory", bootm_help_text
);
/*******************************************************************/
/* bootd - boot default image */
/*******************************************************************/
#if defined(CONFIG_CMD_BOOTD)
int do_bootd(struct cmd_tbl *cmdtp, int flag, int argc, char *const argv[])
{
return run_command(env_get("bootcmd"), flag);
}
U_BOOT_CMD(
boot, 1, 1, do_bootd,
"boot default, i.e., run 'bootcmd'",
""
);
/* keep old command name "bootd" for backward compatibility */
U_BOOT_CMD(
bootd, 1, 1, do_bootd,
"boot default, i.e., run 'bootcmd'",
""
);
#endif
/*******************************************************************/
/* iminfo - print header info for a requested image */
/*******************************************************************/
#if defined(CONFIG_CMD_IMI)
static int do_iminfo(struct cmd_tbl *cmdtp, int flag, int argc,
char *const argv[])
{
int arg;
ulong addr;
int rcode = 0;
if (argc < 2) {
return image_info(image_load_addr);
}
for (arg = 1; arg < argc; ++arg) {
addr = hextoul(argv[arg], NULL);
if (image_info(addr) != 0)
rcode = 1;
}
return rcode;
}
static int image_info(ulong addr)
{
void *hdr = (void *)map_sysmem(addr, 0);
printf("\n## Checking Image at %08lx ...\n", addr);
switch (genimg_get_format(hdr)) {
#if defined(CONFIG_LEGACY_IMAGE_FORMAT)
case IMAGE_FORMAT_LEGACY:
puts(" Legacy image found\n");
if (!image_check_magic(hdr)) {
puts(" Bad Magic Number\n");
unmap_sysmem(hdr);
return 1;
}
if (!image_check_hcrc(hdr)) {
puts(" Bad Header Checksum\n");
unmap_sysmem(hdr);
return 1;
}
image_print_contents(hdr);
puts(" Verifying Checksum ... ");
if (!image_check_dcrc(hdr)) {
puts(" Bad Data CRC\n");
unmap_sysmem(hdr);
return 1;
}
puts("OK\n");
unmap_sysmem(hdr);
return 0;
#endif
#if defined(CONFIG_ANDROID_BOOT_IMAGE)
case IMAGE_FORMAT_ANDROID:
puts(" Android image found\n");
android_print_contents(hdr);
unmap_sysmem(hdr);
return 0;
#endif
#if defined(CONFIG_FIT)
case IMAGE_FORMAT_FIT:
puts(" FIT image found\n");
if (fit_check_format(hdr, IMAGE_SIZE_INVAL)) {
puts("Bad FIT image format!\n");
unmap_sysmem(hdr);
return 1;
}
fit_print_contents(hdr);
if (!fit_all_image_verify(hdr)) {
puts("Bad hash in FIT image!\n");
unmap_sysmem(hdr);
return 1;
}
unmap_sysmem(hdr);
return 0;
#endif
default:
puts("Unknown image format!\n");
break;
}
unmap_sysmem(hdr);
return 1;
}
U_BOOT_CMD(
iminfo, CONFIG_SYS_MAXARGS, 1, do_iminfo,
"print header information for application image",
"addr [addr ...]\n"
" - print header information for application image starting at\n"
" address 'addr' in memory; this includes verification of the\n"
" image contents (magic number, header and payload checksums)"
);
#endif
/*******************************************************************/
/* imls - list all images found in flash */
/*******************************************************************/
#if defined(CONFIG_CMD_IMLS)
static int do_imls_nor(void)
{
flash_info_t *info;
int i, j;
void *hdr;
for (i = 0, info = &flash_info[0];
i < CFI_FLASH_BANKS; ++i, ++info) {
if (info->flash_id == FLASH_UNKNOWN)
goto next_bank;
for (j = 0; j < info->sector_count; ++j) {
hdr = (void *)info->start[j];
if (!hdr)
goto next_sector;
switch (genimg_get_format(hdr)) {
#if defined(CONFIG_LEGACY_IMAGE_FORMAT)
case IMAGE_FORMAT_LEGACY:
if (!image_check_hcrc(hdr))
goto next_sector;
printf("Legacy Image at %08lX:\n", (ulong)hdr);
image_print_contents(hdr);
puts(" Verifying Checksum ... ");
if (!image_check_dcrc(hdr)) {
puts("Bad Data CRC\n");
} else {
puts("OK\n");
}
break;
#endif
#if defined(CONFIG_FIT)
case IMAGE_FORMAT_FIT:
if (fit_check_format(hdr, IMAGE_SIZE_INVAL))
goto next_sector;
printf("FIT Image at %08lX:\n", (ulong)hdr);
fit_print_contents(hdr);
break;
#endif
default:
goto next_sector;
}
next_sector: ;
}
next_bank: ;
}
return 0;
}
#endif
#if defined(CONFIG_CMD_IMLS_NAND)
static int nand_imls_legacyimage(struct mtd_info *mtd, int nand_dev,
loff_t off, size_t len)
{
void *imgdata;
int ret;
imgdata = malloc(len);
if (!imgdata) {
printf("May be a Legacy Image at NAND device %d offset %08llX:\n",
nand_dev, off);
printf(" Low memory(cannot allocate memory for image)\n");
return -ENOMEM;
}
ret = nand_read_skip_bad(mtd, off, &len, NULL, mtd->size, imgdata);
if (ret < 0 && ret != -EUCLEAN) {
free(imgdata);
return ret;
}
if (!image_check_hcrc(imgdata)) {
free(imgdata);
return 0;
}
printf("Legacy Image at NAND device %d offset %08llX:\n",
nand_dev, off);
image_print_contents(imgdata);
puts(" Verifying Checksum ... ");
if (!image_check_dcrc(imgdata))
puts("Bad Data CRC\n");
else
puts("OK\n");
free(imgdata);
return 0;
}
static int nand_imls_fitimage(struct mtd_info *mtd, int nand_dev, loff_t off,
size_t len)
{
void *imgdata;
int ret;
imgdata = malloc(len);
if (!imgdata) {
printf("May be a FIT Image at NAND device %d offset %08llX:\n",
nand_dev, off);
printf(" Low memory(cannot allocate memory for image)\n");
return -ENOMEM;
}
ret = nand_read_skip_bad(mtd, off, &len, NULL, mtd->size, imgdata);
if (ret < 0 && ret != -EUCLEAN) {
free(imgdata);
return ret;
}
if (fit_check_format(imgdata, IMAGE_SIZE_INVAL)) {
free(imgdata);
return 0;
}
printf("FIT Image at NAND device %d offset %08llX:\n", nand_dev, off);
fit_print_contents(imgdata);
free(imgdata);
return 0;
}
static int do_imls_nand(void)
{
struct mtd_info *mtd;
int nand_dev = nand_curr_device;
size_t len;
loff_t off;
u32 buffer[16];
if (nand_dev < 0 || nand_dev >= CONFIG_SYS_MAX_NAND_DEVICE) {
puts("\nNo NAND devices available\n");
return -ENODEV;
}
printf("\n");
for (nand_dev = 0; nand_dev < CONFIG_SYS_MAX_NAND_DEVICE; nand_dev++) {
mtd = get_nand_dev_by_index(nand_dev);
if (!mtd->name || !mtd->size)
continue;
for (off = 0; off < mtd->size; off += mtd->erasesize) {
const struct legacy_img_hdr *header;
int ret;
if (nand_block_isbad(mtd, off))
continue;
len = sizeof(buffer);
ret = nand_read(mtd, off, &len, (u8 *)buffer);
if (ret < 0 && ret != -EUCLEAN) {
printf("NAND read error %d at offset %08llX\n",
ret, off);
continue;
}
switch (genimg_get_format(buffer)) {
#if defined(CONFIG_LEGACY_IMAGE_FORMAT)
case IMAGE_FORMAT_LEGACY:
header = (const struct legacy_img_hdr *)buffer;
len = image_get_image_size(header);
nand_imls_legacyimage(mtd, nand_dev, off, len);
break;
#endif
#if defined(CONFIG_FIT)
case IMAGE_FORMAT_FIT:
len = fit_get_size(buffer);
nand_imls_fitimage(mtd, nand_dev, off, len);
break;
#endif
}
}
}
return 0;
}
#endif
#if defined(CONFIG_CMD_IMLS) || defined(CONFIG_CMD_IMLS_NAND)
static int do_imls(struct cmd_tbl *cmdtp, int flag, int argc,
char *const argv[])
{
int ret_nor = 0, ret_nand = 0;
#if defined(CONFIG_CMD_IMLS)
ret_nor = do_imls_nor();
#endif
#if defined(CONFIG_CMD_IMLS_NAND)
ret_nand = do_imls_nand();
#endif
if (ret_nor)
return ret_nor;
if (ret_nand)
return ret_nand;
return (0);
}
U_BOOT_CMD(
imls, 1, 1, do_imls,
"list all images found in flash",
"\n"
" - Prints information about all images found at sector/block\n"
" boundaries in nor/nand flash."
);
#endif