diff options
Diffstat (limited to 'fastbootd/commands.c')
-rw-r--r-- | fastbootd/commands.c | 409 |
1 files changed, 0 insertions, 409 deletions
diff --git a/fastbootd/commands.c b/fastbootd/commands.c deleted file mode 100644 index 98b7866..0000000 --- a/fastbootd/commands.c +++ /dev/null @@ -1,409 +0,0 @@ -/* - * Copyright (c) 2009-2013, Google Inc. - * All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * * Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * * Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in - * the documentation and/or other materials provided with the - * distribution. - * * Neither the name of Google, Inc. nor the names of its contributors - * may be used to endorse or promote products derived from this - * software without specific prior written permission. - * - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS - * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE - * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, - * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, - * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS - * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED - * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, - * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT - * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - */ - -#include <inttypes.h> -#include <stdlib.h> -#include <unistd.h> -#include <sys/types.h> -#include <sys/mman.h> -#include <sys/stat.h> -#include <unistd.h> -#include <sys/reboot.h> -#include <fcntl.h> - -#include "bootimg.h" -#include "commands/boot.h" -#include "commands/flash.h" -#include "commands/partitions.h" -#include "commands/virtual_partitions.h" -#include "debug.h" -#include "protocol.h" -#include "trigger.h" -#include "utils.h" - -#define ATAGS_LOCATION "/proc/atags" - -static void cmd_boot(struct protocol_handle *phandle, const char *arg) -{ - int sz, atags_sz, new_atags_sz; - int rv; - unsigned kernel_actual; - unsigned ramdisk_actual; - unsigned second_actual; - void *kernel_ptr; - void *ramdisk_ptr; - void *second_ptr; - struct boot_img_hdr *hdr; - char *ptr = NULL; - char *atags_ptr = NULL; - char *new_atags = NULL; - int data_fd = 0; - - D(DEBUG, "cmd_boot %s\n", arg); - - if (phandle->download_fd < 0) { - fastboot_fail(phandle, "no kernel file"); - return; - } - - atags_ptr = read_atags(ATAGS_LOCATION, &atags_sz); - if (atags_ptr == NULL) { - fastboot_fail(phandle, "atags read error"); - goto error; - } - - // TODO: With cms we can also verify partition name included as - // cms signed attribute - if (flash_validate_certificate(phandle->download_fd, &data_fd) != 1) { - fastboot_fail(phandle, "Access forbiden you need the certificate"); - return; - } - - sz = get_file_size(data_fd); - - ptr = (char *) mmap(NULL, sz, PROT_READ, - MAP_POPULATE | MAP_PRIVATE, data_fd, 0); - - hdr = (struct boot_img_hdr *) ptr; - - if (ptr == MAP_FAILED) { - fastboot_fail(phandle, "internal fastbootd error"); - goto error; - } - - if ((size_t) sz < sizeof(*hdr)) { - fastboot_fail(phandle, "invalid bootimage header"); - goto error; - } - - kernel_actual = ROUND_TO_PAGE(hdr->kernel_size, hdr->page_size); - ramdisk_actual = ROUND_TO_PAGE(hdr->ramdisk_size, hdr->page_size); - second_actual = ROUND_TO_PAGE(hdr->second_size, hdr->page_size); - - new_atags = (char *) create_atags((unsigned *) atags_ptr, atags_sz, hdr, &new_atags_sz); - - if (new_atags == NULL) { - fastboot_fail(phandle, "atags generate error"); - goto error; - } - if (new_atags_sz > 0x4000) { - fastboot_fail(phandle, "atags file to large"); - goto error; - } - - if ((int) (hdr->page_size + kernel_actual + ramdisk_actual) < sz) { - fastboot_fail(phandle, "incomplete bootimage"); - goto error; - } - - kernel_ptr = (void *)((uintptr_t) ptr + hdr->page_size); - ramdisk_ptr = (void *)((uintptr_t) kernel_ptr + kernel_actual); - second_ptr = (void *)((uintptr_t) ramdisk_ptr + ramdisk_actual); - - D(INFO, "preparing to boot"); - // Prepares boot physical address. Addresses from header are ignored - rv = prepare_boot_linux(hdr->kernel_addr, kernel_ptr, kernel_actual, - hdr->ramdisk_addr, ramdisk_ptr, ramdisk_actual, - hdr->second_addr, second_ptr, second_actual, - hdr->tags_addr, new_atags, ROUND_TO_PAGE(new_atags_sz, hdr->page_size)); - if (rv < 0) { - fastboot_fail(phandle, "kexec prepare failed"); - goto error; - } - - fastboot_okay(phandle, ""); - - free(atags_ptr); - munmap(ptr, sz); - free(new_atags); - close(data_fd); - - D(INFO, "Kexec going to reboot"); - reboot(LINUX_REBOOT_CMD_KEXEC); - - fastboot_fail(phandle, "reboot error"); - - return; - -error: - - if (atags_ptr != NULL) - free(atags_ptr); - if (ptr != NULL) - munmap(ptr, sz); - -} - -static void cmd_erase(struct protocol_handle *phandle, const char *arg) -{ - int partition_fd; - char path[PATH_MAX]; - D(DEBUG, "cmd_erase %s\n", arg); - - if (flash_find_entry(arg, path, PATH_MAX)) { - fastboot_fail(phandle, "partition table doesn't exist"); - return; - } - - if (path == NULL) { - fastboot_fail(phandle, "Couldn't find partition"); - return; - } - - partition_fd = flash_get_partiton(path); - if (partition_fd < 0) { - fastboot_fail(phandle, "partiton file does not exists"); - } - - if (flash_erase(partition_fd)) { - fastboot_fail(phandle, "failed to erase partition"); - flash_close(partition_fd); - return; - } - - if (flash_close(partition_fd) < 0) { - D(ERR, "could not close device %s", strerror(errno)); - fastboot_fail(phandle, "failed to erase partition"); - return; - } - fastboot_okay(phandle, ""); -} - -static int GPT_header_location() { - const char *location_str = fastboot_getvar("gpt_sector"); - char *str; - int location; - - if (!strcmp("", location_str)) { - D(INFO, "GPT location not specified using second sector"); - return 1; - } - else { - location = strtoul(location_str, &str, 10); - D(INFO, "GPT location specified as %d", location); - - if (*str != '\0') - return -1; - - return location - 1; - } -} - -static void cmd_gpt_layout(struct protocol_handle *phandle, const char *arg) { - struct GPT_entry_table *oldtable; - int location; - struct GPT_content content; - const char *device; - device = fastboot_getvar("blockdev"); - - if (!strcmp(device, "")) { - fastboot_fail(phandle, "blockdev not defined in config file"); - return; - } - - //TODO: add same verification as in cmd_flash - if (phandle->download_fd < 0) { - fastboot_fail(phandle, "no layout file"); - return; - } - - location = GPT_header_location(); - oldtable = GPT_get_device(device, location); - - GPT_default_content(&content, oldtable); - if (oldtable == NULL) - D(WARN, "Could not get old gpt table"); - else - GPT_release_device(oldtable); - - if (!GPT_parse_file(phandle->download_fd, &content)) { - fastboot_fail(phandle, "Could not parse partition config file"); - return; - } - - if (trigger_gpt_layout(&content)) { - fastboot_fail(phandle, "Vendor forbids this opperation"); - GPT_release_content(&content); - return; - } - - if (!GPT_write_content(device, &content)) { - fastboot_fail(phandle, "Unable to write gpt file"); - GPT_release_content(&content); - return; - } - - GPT_release_content(&content); - fastboot_okay(phandle, ""); -} - -static void cmd_flash(struct protocol_handle *phandle, const char *arg) -{ - int partition; - uint64_t sz; - char data[BOOT_MAGIC_SIZE]; - char path[PATH_MAX]; - ssize_t header_sz = 0; - int data_fd = 0; - - D(DEBUG, "cmd_flash %s\n", arg); - - if (try_handle_virtual_partition(phandle, arg)) { - return; - } - - if (phandle->download_fd < 0) { - fastboot_fail(phandle, "no kernel file"); - return; - } - - if (flash_find_entry(arg, path, PATH_MAX)) { - fastboot_fail(phandle, "partition table doesn't exist"); - return; - } - - if (flash_validate_certificate(phandle->download_fd, &data_fd) != 1) { - fastboot_fail(phandle, "Access forbiden you need certificate"); - return; - } - - // TODO: Maybe its goot idea to check whether the partition is bootable - if (!strcmp(arg, "boot") || !strcmp(arg, "recovery")) { - if (read_data_once(data_fd, data, BOOT_MAGIC_SIZE) < BOOT_MAGIC_SIZE) { - fastboot_fail(phandle, "incoming data read error, cannot read boot header"); - return; - } - if (memcmp((void *)data, BOOT_MAGIC, BOOT_MAGIC_SIZE)) { - fastboot_fail(phandle, "image is not a boot image"); - return; - } - } - - partition = flash_get_partiton(path); - - sz = get_file_size64(data_fd); - - sz -= header_sz; - - if (sz > get_file_size64(partition)) { - flash_close(partition); - D(WARN, "size of file too large"); - fastboot_fail(phandle, "size of file too large"); - return; - } - - D(INFO, "writing %"PRId64" bytes to '%s'\n", sz, arg); - - if (flash_write(partition, phandle->download_fd, sz, header_sz)) { - fastboot_fail(phandle, "flash write failure"); - return; - } - D(INFO, "partition '%s' updated\n", arg); - - flash_close(partition); - close(data_fd); - - fastboot_okay(phandle, ""); -} - -static void cmd_continue(struct protocol_handle *phandle, const char *arg) -{ - fastboot_okay(phandle, ""); -#if 0 - udc_stop(); - - boot_linux_from_flash(); -#endif -} - -static void cmd_getvar(struct protocol_handle *phandle, const char *arg) -{ - const char *value; - D(DEBUG, "cmd_getvar %s\n", arg); - - value = fastboot_getvar(arg); - - fastboot_okay(phandle, value); -} - -static void cmd_download(struct protocol_handle *phandle, const char *arg) -{ - unsigned len = strtoul(arg, NULL, 16); - int old_fd; - - if (len > 256 * 1024 * 1024) { - fastboot_fail(phandle, "data too large"); - return; - } - - fastboot_data(phandle, len); - - old_fd = protocol_get_download(phandle); - if (old_fd >= 0) { - off_t len = lseek(old_fd, 0, SEEK_END); - D(INFO, "disposing of unused fd %d, size %ld", old_fd, len); - close(old_fd); - } - - phandle->download_fd = protocol_handle_download(phandle, len); - if (phandle->download_fd < 0) { - fastboot_fail(phandle, "download failed"); - return; - } - - fastboot_okay(phandle, ""); -} - -static void cmd_oem(struct protocol_handle *phandle, const char *arg) { - const char *response = ""; - - //TODO: Maybe it should get download descriptor also - if (trigger_oem_cmd(arg, &response)) - fastboot_fail(phandle, response); - else - fastboot_okay(phandle, response); -} - -void commands_init() -{ - virtual_partition_register("partition-table", cmd_gpt_layout); - - fastboot_register("boot", cmd_boot); - fastboot_register("erase:", cmd_erase); - fastboot_register("flash:", cmd_flash); - fastboot_register("continue", cmd_continue); - fastboot_register("getvar:", cmd_getvar); - fastboot_register("download:", cmd_download); - fastboot_register("oem", cmd_oem); - //fastboot_publish("version", "0.5"); - //fastboot_publish("product", "swordfish"); - //fastboot_publish("kernel", "lk"); -} |