[RFC PATCH v2 2/2] board: ad401: example of fastboot oem board realization

Alexey Romanov avromanov at salutedevices.com
Mon Mar 4 15:03:01 CET 2024


Hello Mattijs,

On Thu, Feb 15, 2024 at 10:24:11AM +0100, Mattijs Korpershoek wrote:
> On jeu., f'evr. 01, 2024 at 12:20, Alexey Romanov <avromanov at salutedevices.com> wrote:
> 
> > An example of how we use fastboot oeam board subcommand
> > for Sean Anderson.
> >
> > 1 - OEM_BOARD_WRITE_BOOTLOADER_CMD:
> >
> > We use it for custom Amlogic bootloader + tpl
> > flashing protocol.
> >
> > 2 - OEM_BOARD_ERASE_CMD:
> >
> > Custom logic for erasing the env-emulated partition,
> > which isn't in the mtd markup map.
> >
> > Example of the script which completely flashes the device:
> >
> >   $ fastboot erase bootloader
> >   $ fastboot stage u-boot.bin
> >   $ fastboot oem board:write_bootloader
> >   $ fastboot reboot-bootloader
> >   $ fastboot oem board:erase_env
> >   $ fastboot erase misc
> >   $ fastboot erase super
> >   $ fastboot flash super rootfs
> >   $ fastboot reboot
> >
> > Signed-off-by: Alexey Romanov <avromanov at salutedevices.com>
> > ---
> >  board/amlogic/ad401/fastboot.c | 222 +++++++++++++++++++++++++++++++++
> >  1 file changed, 222 insertions(+)
> >  create mode 100644 board/amlogic/ad401/fastboot.c
> >
> > diff --git a/board/amlogic/ad401/fastboot.c b/board/amlogic/ad401/fastboot.c
> > new file mode 100644
> > index 0000000000..01da8efa5b
> > --- /dev/null
> > +++ b/board/amlogic/ad401/fastboot.c
> > @@ -0,0 +1,222 @@
> > +// SPDX-License-Identifier: GPL-2.0+
> > +/*
> > + * (C) Copyright 2023 SaluteDevices, Inc.
> > + */
> > +
> > +#include <common.h>
> > +#include <env.h>
> > +#include <fastboot.h>
> > +#include <nand.h>
> > +#include <asm/arch/nand.h>
> > +#include <jffs2/load_kernel.h>
> > +#include <linux/sizes.h>
> > +#include <linux/types.h>
> > +#include <linux/mtd/mtd.h>
> > +
> > +enum {
> > +	OEM_BOARD_ERASE_CMD,
> > +	OEM_BOARD_WRITE_BOOTLOADER_CMD,
> > +};
> > +
> > +struct defenv {
> > +	char *name;
> > +	char value[256];
> > +};
> > +
> > +static void save_defenv(struct defenv *e, size_t cnt)
> > +{
> > +	int i;
> > +
> > +	for (i = 0; i < cnt; i++) {
> > +		const char *env_val = env_get(e[i].name);
> > +
> > +		if (env_val)
> > +			strlcpy(e[i].value, env_val, sizeof(e[i].value));
> > +		else
> > +			e[i].value[0] = '\0';
> > +	}
> > +}
> > +
> > +static void set_defenv(struct defenv *e, size_t cnt)
> > +{
> > +	int i;
> > +
> > +	for (i = 0; i < cnt; i++)
> > +		env_set(e[i].name, e[i].value);
> > +}
> > +
> > +static int fastboot_erase_env(void)
> > +{
> > +	char *const defenv_names[] = { "lock", "mtdparts", "mtdids" };
> > +	struct defenv env[ARRAY_SIZE(defenv_names)];
> > +	int err, i;
> > +
> > +	for (i = 0; i < ARRAY_SIZE(env); i++)
> > +		env[i].name = defenv_names[i];
> > +
> > +	printf("ENV is being erased...\n");
> > +
> > +	/*
> > +	 * Reset environment to the default, excluding 'lock' variable,
> > +	 * because it reflects the fastboot's state after execution of
> > +	 * 'flashing unlock' command, hence it must survive the env-erasing.
> > +	 * Otherwise, further erase commands will fail on check_lock().
> > +	 *
> > +	 * Also, we have to save 'mtdparts' and 'mtdids' variables
> > +	 * because they are necessary to obtain partition map.
> > +	 */
> > +
> > +	save_defenv(env, ARRAY_SIZE(env));
> > +	env_set_default(NULL, 0);
> > +	set_defenv(env, ARRAY_SIZE(env));
> > +
> > +	err = env_save();
> > +	if (err) {
> > +		pr_err("Can't overwrite ENV-partition\n");
> > +		return err;
> > +	}
> 
> Hmm so the fastboot locked state is saved in the U-Boot environment.
> There is probably a good reason for this (no secure storage for
> example). But this does not feel board specific.
> 
> Wouldn't it be better if we could just run "fastboot erase bootenv" and
> that the generic fastboot code does the right thing?

Are you proposing to modify the code of fastboot in such a way
that if user send 'erase bootenv' string, then we call generic
function to cleanup environment, instead of try to search (and erase)
in partition schema 'bootenv' partition?

> (which is env default, and ignoring some magic/specific variables)
> 
> > +
> > +	return 0;
> > +}
> > +
> > +static int fastboot_nand_write_tpl(struct mtd_info *mtd, void *buffer,
> > +				   u32 offset, size_t size, int flags)
> > +{
> > +	int boot_cpy_num = meson_bootloader_copy_num(BOOT_TPL);
> > +	u64 size_per_copy = meson_bootloader_copy_size(mtd, BOOT_TPL);
> > +	int i;
> > +
> > +	for (i = 0; i < boot_cpy_num; i++) {
> > +		size_t retlen, len = size;
> > +		int ret;
> > +
> > +		ret = nand_write_skip_bad(mtd, offset + (i * size_per_copy),
> > +					  &len, &retlen, offset + size_per_copy,
> > +					  buffer, flags);
> > +		if (ret)
> > +			return ret;
> > +	}
> > +
> > +	return 0;
> > +}
> > +
> > +static int fastboot_nand_write_bl2(struct mtd_info *mtd, void *buffer,
> > +				   u32 offset, size_t size, int flags)
> > +{
> > +	int boot_cpy_num = meson_bootloader_copy_num(BOOT_BL2);
> > +	u64 size_per_copy = meson_bootloader_copy_size(mtd, BOOT_BL2);
> > +	int i;
> > +
> > +	for (i = 0; i < boot_cpy_num; i++) {
> > +		int ret;
> > +
> > +		ret = meson_bootloader_write_bl2(mtd, buffer,
> > +						 offset + (i * size_per_copy),
> > +					         size, flags);
> > +		if (ret)
> > +			return ret;
> > +	}
> > +
> > +	return meson_bootloader_write_info_pages();
> > +}
> > +
> > +static int fastboot_nand_write_bootloader(void *buffer, u32 size)
> > +{
> > +	struct part_info *part;
> > +	struct mtd_info *mtd = NULL;
> > +	struct mtd_device *dev;
> > +	u8 pnum;
> > +	int ret;
> > +
> > +	if (size < BL2_SIZE)
> > +		return 0;
> > +
> > +	if (!buffer)
> > +		return -EINVAL;
> > +
> > +	ret = mtdparts_init();
> > +	if (ret) {
> > +		pr_err("Cannot initialize MTD partitions\n");
> > +		return ret;
> > +	}
> > +
> > +	ret = find_dev_and_part("bootloader", &dev, &pnum, &part);
> > +	if (ret) {
> > +		pr_err("cannot find 'bootloader' partition\n");
> > +		return ret;
> > +	}
> > +
> > +	mtd = get_nand_dev_by_index(dev->id->num);
> > +	if (!mtd)
> > +		return -EINVAL;
> > +
> > +	ret = fastboot_nand_write_bl2(mtd, buffer, part->offset,
> > +				      BL2_SIZE, WITH_WR_VERIFY);
> > +	if (ret) {
> > +		pr_err("fastboot: failed to write BL2\n");
> > +		return ret;
> > +	}
> > +
> > +	ret = find_dev_and_part("tpl", &dev, &pnum, &part);
> > +	if (ret) {
> > +		pr_err("cannot find 'bootloader' partition\n");
> > +		return ret;
> > +	}
> > +
> > +	mtd = get_nand_dev_by_index(dev->id->num);
> > +	if (!mtd)
> > +		return -EINVAL;
> > +
> > +	ret = fastboot_nand_write_tpl(mtd, buffer + BL2_SIZE, part->offset,
> > +				      size - BL2_SIZE, WITH_WR_VERIFY);
> > +	if (ret) {
> > +		pr_err("fastboot: failed to write TPL\n");
> > +		return ret;
> > +	}
> > +
> > +	return 0;
> > +}
> > +
> > +int get_oem_board_command(const char *cmd)
> > +{
> > +	const char *oem_commands[] = {
> > +		[OEM_BOARD_ERASE_CMD] = "erase_env",
> > +		[OEM_BOARD_WRITE_BOOTLOADER_CMD] = "write_bootloader",
> > +	};
> > +	int i;
> > +
> > +	for (i = 0; i < ARRAY_SIZE(oem_commands); i++)
> > +		if (!strcmp(cmd, oem_commands[i]))
> > +			return i;
> > +
> > +	return -EINVAL;
> > +}
> > +
> > +void fastboot_oem_board(const char *cmd_parameter, void *data, u32 size,
> > +			char *response)
> > +{
> > +	char buf[128] = { 0 };
> > +	int ret, cmd;
> > +
> > +	cmd = get_oem_board_command(cmd_parameter);
> > +
> > +	switch (cmd) {
> > +		case OEM_BOARD_ERASE_CMD:
> > +			ret = fastboot_erase_env();
> > +			break;
> > +		case OEM_BOARD_WRITE_BOOTLOADER_CMD:
> > +			ret = fastboot_nand_write_bootloader(data, size);
> > +			break;
> > +		default:
> > +			snprintf(buf, sizeof(buf),
> > +				 "Command 'oem board %s' not supported",
> > +				 cmd_parameter);
> > +			fastboot_fail(buf, response);
> > +			return;
> > +	}
> > +
> > +	if (ret < 0)
> > +		fastboot_fail("Failed to erase env partition", response);
> > +	else
> > +		fastboot_okay(NULL, response);
> > +}
> > -- 
> > 2.30.1

-- 
Thank you,
Alexey


More information about the U-Boot mailing list