aboutsummaryrefslogtreecommitdiff
path: root/cmd/booti.c
diff options
context:
space:
mode:
authorthead_admin <occ_thead@service.alibaba.com>2022-09-13 11:04:33 +0800
committerthead_admin <occ_thead@service.alibaba.com>2022-09-13 11:04:33 +0800
commit43db9e00d5837c100c0b2fbbee64a08ab807d1e0 (patch)
treeb40c0eed02935b6682e8c5c975e3016b6b2f55fe /cmd/booti.c
Linux_SDK_V0.9.5Linux_SDK_V0.9.5
Diffstat (limited to 'cmd/booti.c')
-rw-r--r--cmd/booti.c160
1 files changed, 160 insertions, 0 deletions
diff --git a/cmd/booti.c b/cmd/booti.c
new file mode 100644
index 00000000..e770c21e
--- /dev/null
+++ b/cmd/booti.c
@@ -0,0 +1,160 @@
+// SPDX-License-Identifier: GPL-2.0+
+/*
+ * (C) Copyright 2000-2009
+ * Wolfgang Denk, DENX Software Engineering, wd@denx.de.
+ */
+
+#include <common.h>
+#include <bootm.h>
+#include <command.h>
+#include <image.h>
+#include <irq_func.h>
+#include <lmb.h>
+#include <mapmem.h>
+#include <linux/kernel.h>
+#include <linux/sizes.h>
+
+/*
+ * Image booting support
+ */
+static int booti_start(cmd_tbl_t *cmdtp, int flag, int argc,
+ char * const argv[], bootm_headers_t *images)
+{
+ int ret;
+ ulong ld;
+ ulong relocated_addr;
+ ulong image_size;
+
+ ret = do_bootm_states(cmdtp, flag, argc, argv, BOOTM_STATE_START,
+ images, 1);
+
+ /* Setup Linux kernel Image entry point */
+ if (!argc) {
+ ld = load_addr;
+ debug("* kernel: default image load address = 0x%08lx\n",
+ load_addr);
+ } else {
+ ld = simple_strtoul(argv[0], NULL, 16);
+ debug("* kernel: cmdline image address = 0x%08lx\n", ld);
+ }
+
+ ret = booti_setup(ld, &relocated_addr, &image_size, false);
+ if (ret != 0)
+ return 1;
+
+ /* Handle BOOTM_STATE_LOADOS */
+ if (relocated_addr != ld) {
+ debug("Moving Image from 0x%lx to 0x%lx\n", ld, relocated_addr);
+ memmove((void *)relocated_addr, (void *)ld, image_size);
+ }
+
+ images->ep = relocated_addr;
+ images->os.start = relocated_addr;
+ images->os.end = relocated_addr + image_size;
+
+ lmb_reserve(&images->lmb, images->ep, le32_to_cpu(image_size));
+
+ /*
+ * Handle the BOOTM_STATE_FINDOTHER state ourselves as we do not
+ * have a header that provide this informaiton.
+ */
+ if (bootm_find_images(flag, argc, argv))
+ return 1;
+
+ return 0;
+}
+
+int do_booti(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
+{
+ int ret;
+
+ /* Consume 'booti' */
+ argc--; argv++;
+
+ if (booti_start(cmdtp, flag, argc, argv, &images))
+ return 1;
+
+ /*
+ * We are doing the BOOTM_STATE_LOADOS state ourselves, so must
+ * disable interrupts ourselves
+ */
+ bootm_disable_interrupts();
+
+ images.os.os = IH_OS_LINUX;
+#ifdef CONFIG_RISCV_SMODE
+ images.os.arch = IH_ARCH_RISCV;
+#elif CONFIG_ARM64
+ images.os.arch = IH_ARCH_ARM64;
+#endif
+ ret = do_bootm_states(cmdtp, flag, argc, argv,
+#ifdef CONFIG_SYS_BOOT_RAMDISK_HIGH
+ BOOTM_STATE_RAMDISK |
+#endif
+ BOOTM_STATE_OS_PREP | BOOTM_STATE_OS_FAKE_GO |
+ BOOTM_STATE_OS_GO,
+ &images, 1);
+
+ return ret;
+}
+
+/*******************************************************************/
+/* sboot - boot security image */
+/*******************************************************************/
+#ifdef CONFIG_TARGET_LIGHT_C910
+
+#if CONFIG_IS_ENABLED(LIGHT_SEC_UPGRADE)
+extern int light_vimage(int argc, char *const argv[]);
+int do_vimage(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
+{
+ if (light_vimage(argc, argv) != 0)
+ return 1;
+ return 0;
+}
+
+U_BOOT_CMD(
+ vimage, CONFIG_SYS_MAXARGS, 1, do_vimage,
+ "verify image file with known pubkey which reside in father image or itself!",
+ "vimage addr imgname[[tee/tf] - verify specifed image resides in addr\n"
+);
+
+#endif
+
+#if CONFIG_IS_ENABLED(LIGHT_SEC_BOOT_WITH_VERIFY_VAL_A) || CONFIG_IS_ENABLED(LIGHT_SEC_BOOT_WITH_VERIFY_VAL_B) || CONFIG_IS_ENABLED(LIGHT_SEC_BOOT_WITH_VERIFY_ANT_EVT)
+extern int light_secboot(int argc, char * const argv[]);
+int do_secboot(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
+{
+ if (light_secboot(argc, argv) != 0)
+ return -1;
+
+ return 0;
+}
+U_BOOT_CMD(
+ secboot, CONFIG_SYS_MAXARGS, 1, do_secboot,
+ "verify image file with known pubkey which reside in father image or itself!",
+ "vimage addr imgname[[tee/tf] - verify specifed image resides in addr\n"
+);
+
+#endif
+
+#endif
+
+#ifdef CONFIG_SYS_LONGHELP
+static char booti_help_text[] =
+ "[addr [initrd[:size]] [fdt]]\n"
+ " - boot Linux 'Image' stored at 'addr'\n"
+ "\tThe argument 'initrd' is optional and specifies the address\n"
+ "\tof an initrd in memory. The optional parameter ':size' allows\n"
+ "\tspecifying the size of a RAW initrd.\n"
+#if defined(CONFIG_OF_LIBFDT)
+ "\tSince booting a Linux kernel requires a flat device-tree, a\n"
+ "\tthird argument providing the address of the device-tree blob\n"
+ "\tis required. To boot a kernel with a device-tree blob but\n"
+ "\twithout an initrd image, use a '-' for the initrd argument.\n"
+#endif
+ "";
+#endif
+
+U_BOOT_CMD(
+ booti, CONFIG_SYS_MAXARGS, 1, do_booti,
+ "boot Linux kernel 'Image' format from memory", booti_help_text
+);