blob: 4664911878bd789c4fd57bdced1a8f38bd542136 [file] [log] [blame] [edit]
/*
* (C) Copyright 2008 - 2009
* Windriver, <www.windriver.com>
* Tom Rix <Tom.Rix@windriver.com>
*
* Copyright 2011 Sebastian Andrzej Siewior <bigeasy@linutronix.de>
*
* Copyright 2014 Linaro, Ltd.
* Rob Herring <robh@kernel.org>
*
* SPDX-License-Identifier: GPL-2.0+
*/
#include <config.h>
#include <common.h>
#include <errno.h>
#include <malloc.h>
#include <linux/usb/ch9.h>
#include <linux/usb/gadget.h>
#include <linux/usb/composite.h>
#include <linux/compiler.h>
#include <version.h>
#include <g_dnl.h>
#include <asm/arch/cpu.h>
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
#include <fb_mmc.h>
#include <fb_storage.h>
#include <fb_fastboot.h>
#include <emmc_partitions.h>
#endif
#ifdef CONFIG_FASTBOOT_FLASH_NAND_DEV
#include <fb_nand.h>
#endif
#include <partition_table.h>
#include <android_image.h>
#include <android_vab.h>
#include <image.h>
#ifdef CONFIG_AML_ANTIROLLBACK
#include <anti-rollback.h>
#endif
DECLARE_GLOBAL_DATA_PTR;
#define FASTBOOT_VERSION "0.4"
#define FASTBOOT_INTERFACE_CLASS 0xff
#define FASTBOOT_INTERFACE_SUB_CLASS 0x42
#define FASTBOOT_INTERFACE_PROTOCOL 0x03
#define ENDPOINT_MAXIMUM_PACKET_SIZE_2_0 (0x0200)
#ifdef CONFIG_DEVICE_PRODUCT
#define DEVICE_PRODUCT CONFIG_DEVICE_PRODUCT
#endif
#define DEVICE_SERIAL "1234567890"
#define FB_ERR(fmt ...) printf("[ERR]%sL%d:", __func__, __LINE__),printf(fmt)
#define FB_MSG(fmt ...) printf("[MSG]"fmt)
#define FB_WRN(fmt ...) printf("[WRN]"fmt)
#define FB_DBG(...)
#define FB_HERE() printf("f(%s)L%d\n", __func__, __LINE__)
extern void f_dwc_otg_pullup(int is_on);
extern int store_read_ops(
unsigned char *partition_name,
unsigned char * buf, uint64_t off, uint64_t size);
extern int store_write_ops(
unsigned char *partition_name,
unsigned char * buf, uint64_t off, uint64_t size);
#ifdef CONFIG_BOOTLOADER_CONTROL_BLOCK
extern int is_partition_logical(char* parition_name);
#endif
/* The 64 defined bytes plus \0 */
#define EP_BUFFER_SIZE 4096
struct f_fastboot {
struct usb_function usb_function;
/* IN/OUT EP's and corresponding requests */
struct usb_ep *in_ep, *out_ep;
struct usb_request *in_req, *out_req;
};
static inline struct f_fastboot *func_to_fastboot(struct usb_function *f)
{
return container_of(f, struct f_fastboot, usb_function);
}
static struct f_fastboot *fastboot_func;
static unsigned int download_size;
static unsigned int download_bytes;
static struct usb_endpoint_descriptor ep_in = {
.bLength = USB_DT_ENDPOINT_SIZE,
.bDescriptorType = USB_DT_ENDPOINT,
.bEndpointAddress = USB_DIR_IN,
.bmAttributes = USB_ENDPOINT_XFER_BULK,
.wMaxPacketSize = ENDPOINT_MAXIMUM_PACKET_SIZE_2_0,
.bInterval = 0x00,
};
static struct usb_endpoint_descriptor ep_out = {
.bLength = USB_DT_ENDPOINT_SIZE,
.bDescriptorType = USB_DT_ENDPOINT,
.bEndpointAddress = USB_DIR_OUT,
.bmAttributes = USB_ENDPOINT_XFER_BULK,
.wMaxPacketSize = ENDPOINT_MAXIMUM_PACKET_SIZE_2_0,
.bInterval = 0x00,
};
static struct usb_interface_descriptor interface_desc = {
.bLength = USB_DT_INTERFACE_SIZE,
.bDescriptorType = USB_DT_INTERFACE,
.bInterfaceNumber = 0x00,
.bAlternateSetting = 0x00,
.bNumEndpoints = 0x02,
.bInterfaceClass = FASTBOOT_INTERFACE_CLASS,
.bInterfaceSubClass = FASTBOOT_INTERFACE_SUB_CLASS,
.bInterfaceProtocol = FASTBOOT_INTERFACE_PROTOCOL,
};
static struct usb_descriptor_header *fb_runtime_descs[] = {
(struct usb_descriptor_header *)&interface_desc,
(struct usb_descriptor_header *)&ep_in,
(struct usb_descriptor_header *)&ep_out,
NULL,
};
/*
* static strings, in UTF-8
*/
static const char fastboot_name[] = "Android Fastboot";
static struct usb_string fastboot_string_defs[] = {
[0].s = fastboot_name,
{ } /* end of list */
};
static struct usb_gadget_strings stringtab_fastboot = {
.language = 0x0409, /* en-us */
.strings = fastboot_string_defs,
};
static struct usb_gadget_strings *fastboot_strings[] = {
&stringtab_fastboot,
NULL,
};
#define DRAM_UBOOT_RESERVE 0x01000000
unsigned int ddr_size_usable(unsigned int addr_start)
{
unsigned int ddr_size=0;
unsigned int free_size = 0;
int i;
for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++)
ddr_size += gd->bd->bi_dram[i].size;
free_size = (ddr_size - DRAM_UBOOT_RESERVE - addr_start - CONFIG_SYS_MALLOC_LEN - CONFIG_SYS_MEM_TOP_HIDE);
#if defined CONFIG_FASTBOOT_MAX_DOWN_SIZE
if (free_size > CONFIG_FASTBOOT_MAX_DOWN_SIZE)
free_size = CONFIG_FASTBOOT_MAX_DOWN_SIZE;
#endif
return free_size;
}
static void rx_handler_command(struct usb_ep *ep, struct usb_request *req);
static char response_str[RESPONSE_LEN + 1];
void fastboot_fail(const char *s)
{
strncpy(response_str, "FAIL", 5);
if (s)strncat(response_str, s, RESPONSE_LEN - 4 - 1) ;
}
void fastboot_okay(const char *s)
{
strncpy(response_str, "OKAY", 5);
if (s)strncat(response_str, s, RESPONSE_LEN - 4 - 1) ;
}
void fastboot_busy(const char* s)
{
strncpy(response_str, "INFO", 4 + 1);//add terminated 0
if (s)strncat(response_str, s, RESPONSE_LEN - 4 - 1) ;
}
int fastboot_is_busy(void)
{
return !strncmp("INFO", response_str, strlen("INFO"));
}
//cb for bulk in_req->complete
static void fastboot_complete(struct usb_ep *ep, struct usb_request *req)
{
int status = req->status;
if ( fastboot_is_busy() && fastboot_func) {
struct usb_ep* out_ep = fastboot_func->out_ep;
struct usb_request* out_req = fastboot_func->out_req;
rx_handler_command(out_ep, out_req);
return;
}
if (!status)
return;
printf("status: %d ep '%s' trans: %d\n", status, ep->name, req->actual);
}
static int fastboot_bind(struct usb_configuration *c, struct usb_function *f)
{
int id;
struct usb_gadget *gadget = c->cdev->gadget;
struct f_fastboot *f_fb = func_to_fastboot(f);
/* DYNAMIC interface numbers assignments */
id = usb_interface_id(c, f);
if (id < 0)
return id;
interface_desc.bInterfaceNumber = id;
id = usb_string_id(c->cdev);
if (id < 0)
return id;
fastboot_string_defs[0].id = id;
interface_desc.iInterface = id;
f_fb->in_ep = usb_ep_autoconfig(gadget, &ep_in);
if (!f_fb->in_ep)
return -ENODEV;
f_fb->in_ep->driver_data = c->cdev;
f_fb->out_ep = usb_ep_autoconfig(gadget, &ep_out);
if (!f_fb->out_ep)
return -ENODEV;
f_fb->out_ep->driver_data = c->cdev;
return 0;
}
static void fastboot_unbind(struct usb_configuration *c, struct usb_function *f)
{
memset(fastboot_func, 0, sizeof(*fastboot_func));
}
static void fastboot_disable(struct usb_function *f)
{
struct f_fastboot *f_fb = func_to_fastboot(f);
usb_ep_disable(f_fb->out_ep);
usb_ep_disable(f_fb->in_ep);
if (f_fb->out_req) {
free(f_fb->out_req->buf);
usb_ep_free_request(f_fb->out_ep, f_fb->out_req);
f_fb->out_req = NULL;
}
if (f_fb->in_req) {
free(f_fb->in_req->buf);
usb_ep_free_request(f_fb->in_ep, f_fb->in_req);
f_fb->in_req = NULL;
}
}
static struct usb_request *fastboot_start_ep(struct usb_ep *ep)
{
struct usb_request *req;
req = usb_ep_alloc_request(ep, 0);
if (!req)
return NULL;
req->length = EP_BUFFER_SIZE;
req->buf = memalign(CONFIG_SYS_CACHELINE_SIZE, EP_BUFFER_SIZE);
if (!req->buf) {
usb_ep_free_request(ep, req);
return NULL;
}
memset(req->buf, 0, req->length);
return req;
}
static int fastboot_set_alt(struct usb_function *f,
unsigned interface, unsigned alt)
{
int ret;
struct f_fastboot *f_fb = func_to_fastboot(f);
debug("%s: func: %s intf: %d alt: %d\n",
__func__, f->name, interface, alt);
/* make sure we don't enable the ep twice */
ret = usb_ep_enable(f_fb->out_ep, &ep_out);
if (ret) {
puts("failed to enable out ep\n");
return ret;
}
f_fb->out_req = fastboot_start_ep(f_fb->out_ep);
if (!f_fb->out_req) {
puts("failed to alloc out req\n");
ret = -EINVAL;
goto err;
}
f_fb->out_req->complete = rx_handler_command;
ret = usb_ep_enable(f_fb->in_ep, &ep_in);
if (ret) {
puts("failed to enable in ep\n");
goto err;
}
f_fb->in_req = fastboot_start_ep(f_fb->in_ep);
if (!f_fb->in_req) {
puts("failed alloc req in\n");
ret = -EINVAL;
goto err;
}
f_fb->in_req->complete = fastboot_complete;
ret = usb_ep_queue(f_fb->out_ep, f_fb->out_req, 0);
if (ret)
goto err;
return 0;
err:
fastboot_disable(f);
return ret;
}
static int fastboot_setup(struct usb_function *f,
const struct usb_ctrlrequest *ctrl)
{
int value = -EOPNOTSUPP;
struct f_fastboot *f_fb = func_to_fastboot(f);
/* composite driver infrastructure handles everything; interface
* activation uses set_alt().
*/
if (((ctrl->bRequestType & USB_RECIP_MASK) == USB_RECIP_ENDPOINT)
&& (ctrl->bRequest == USB_REQ_CLEAR_FEATURE)
&& (ctrl->wValue== USB_ENDPOINT_HALT)) {
switch (ctrl->wIndex & 0xfe) {
case USB_DIR_OUT:
value = ctrl->wLength;
usb_ep_clear_halt(f_fb->out_ep);
break;
case USB_DIR_IN:
value = ctrl->wLength;
usb_ep_clear_halt(f_fb->in_ep);
break;
default:
printf("unknown usb_ctrlrequest\n");
break;
}
}
return value;
}
static int fastboot_add(struct usb_configuration *c)
{
struct f_fastboot *f_fb;
int status;
if (fastboot_func == NULL) {
f_fb = memalign(CONFIG_SYS_CACHELINE_SIZE, sizeof(*f_fb));
if (!f_fb)
return -ENOMEM;
fastboot_func = f_fb;
memset(f_fb, 0, sizeof(*f_fb));
} else {
f_fb = fastboot_func;
}
f_fb->usb_function.name = "f_fastboot";
f_fb->usb_function.hs_descriptors = fb_runtime_descs;
f_fb->usb_function.bind = fastboot_bind;
f_fb->usb_function.unbind = fastboot_unbind;
f_fb->usb_function.set_alt = fastboot_set_alt;
f_fb->usb_function.disable = fastboot_disable;
f_fb->usb_function.strings = fastboot_strings;
f_fb->usb_function.setup = fastboot_setup;
status = usb_add_function(c, &f_fb->usb_function);
if (status) {
free(f_fb);
fastboot_func = NULL;
}
return status;
}
DECLARE_GADGET_BIND_CALLBACK(usb_dnl_fastboot, fastboot_add);
static int fastboot_tx_write(const char *buffer, unsigned int buffer_size)
{
struct usb_request *in_req = fastboot_func->in_req;
int ret;
memcpy(in_req->buf, buffer, buffer_size);
in_req->length = buffer_size;
ret = usb_ep_queue(fastboot_func->in_ep, in_req, 0);
if (ret)
printf("Error %d on queue\n", ret);
return 0;
}
static int fastboot_tx_write_str(const char *buffer)
{
return fastboot_tx_write(buffer, strlen(buffer));
}
static void compl_do_reset(struct usb_ep *ep, struct usb_request *req)
{
do_reset(NULL, 0, 0, NULL);
}
static void compl_do_reboot_bootloader(struct usb_ep *ep, struct usb_request *req)
{
if (dynamic_partition)
run_command("reboot bootloader", 0);
else
run_command("reboot fastboot", 0);
}
static void compl_do_reboot_fastboot(struct usb_ep *ep, struct usb_request *req)
{
f_dwc_otg_pullup(0);
run_command("reboot fastboot", 0);
}
static void cb_reboot(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
printf("cmd cb_reboot is %s\n", cmd);
strsep(&cmd, "-");
if (!cmd) {
fastboot_func->in_req->complete = compl_do_reset;
fastboot_tx_write_str("OKAY");
return;
}
printf("cmd cb_reboot is %s\n", cmd);
if (strcmp(cmd, "bootloader") == 0)
fastboot_func->in_req->complete = compl_do_reboot_bootloader;
else if (strcmp(cmd, "fastboot") == 0)
fastboot_func->in_req->complete = compl_do_reboot_fastboot;
fastboot_tx_write_str("OKAY");
}
static int strcmp_l1(const char *s1, const char *s2)
{
if (!s1 || !s2)
return -1;
return strncmp(s1, s2, strlen(s1));
}
int get_mergestatus(struct misc_virtual_ab_message *message)
{
char *partition = "misc";
char vab_buf[1024] = {0};
if (store_read_ops((unsigned char *)partition,
(unsigned char *)vab_buf, SYSTEM_SPACE_OFFSET_IN_MISC, 1024) < 0) {
printf("failed to store read %s.\n", partition);
return -1;
}
run_command("get_valid_slot", 0);
int current_slot = 0;
char *slot;
slot = getenv("slot-suffixes");
if (strcmp(slot, "0") == 0) {
current_slot = 0;
} else if (strcmp(slot, "1") == 0) {
current_slot = 1;
}
memcpy(message, vab_buf, sizeof(struct misc_virtual_ab_message));
printf("message.merge_status: %d\n", message->merge_status);
printf("message.source_slot: %d\n", message->source_slot);
if (message->merge_status == SNAPSHOTTED && current_slot == message->source_slot) {
message->merge_status = NONE;
printf("set message.merge_status NONE\n");
}
return 0;
}
int set_mergestatus_cancel(struct misc_virtual_ab_message *message)
{
char *partition = "misc";
char vab_buf[1024] = {0};
if (store_read_ops((unsigned char *)partition,
(unsigned char *)vab_buf, SYSTEM_SPACE_OFFSET_IN_MISC, 1024) < 0) {
printf("failed to store read %s.\n", partition);
return -1;
}
memcpy(message, vab_buf, sizeof(struct misc_virtual_ab_message));
printf("message.merge_status: %d\n", message->merge_status);
if (message->merge_status == SNAPSHOTTED || message->merge_status == MERGING) {
message->merge_status = CANCELLED;
printf("set message.merge_status CANCELLED\n");
}
store_write_ops((unsigned char *)partition, (unsigned char *)vab_buf, SYSTEM_SPACE_OFFSET_IN_MISC, 1024);
return 0;
}
void dump_lock_info(LockData_t* info)
{
#if 0
printf("info->version_major = %d\n", info->version_major);
printf("info->version_minor = %d\n", info->version_minor);
printf("info->unlock_ability = %d\n", info->unlock_ability);
printf("info->lock_state = %d\n", info->lock_state);
printf("info->lock_critical_state = %d\n", info->lock_critical_state);
printf("info->lock_bootloader = %d\n", info->lock_bootloader);
#endif
}
static int check_lock(void)
{
char *lock_s;
LockData_t* info;
lock_s = getenv("lock");
if (!lock_s) {
printf("lock state is NULL \n");
lock_s = "10101000";
setenv("lock", "10101000");
run_command("defenv_reserv; saveenv;", 0);
}
printf("lock state: %s\n", lock_s);
info = malloc(sizeof(struct LockData));
if (info) {
memset(info,0,LOCK_DATA_SIZE);
info->version_major = (int)(lock_s[0] - '0');
info->version_minor = (int)(lock_s[1] - '0');
info->unlock_ability = (int)(lock_s[2] - '0');
info->lock_state = (int)(lock_s[4] - '0');
info->lock_critical_state = (int)(lock_s[5] - '0');
info->lock_bootloader = (int)(lock_s[6] - '0');
//dump_lock_info(info);
} else
return 0;
if ((info->lock_state == 1 ) || ( info->lock_critical_state == 1 )) {
free (info);
return 1;
}
else {
free (info);
return 0;
}
}
static const char* getvar_list[] = {
"version-baseband", "version-bootloader", "version", "hw-revision", "max-download-size",
"serialno", "product", "off-mode-charge", "variant", "battery-soc-ok",
"battery-voltage", "partition-type:boot", "partition-size:boot",
"partition-type:system", "partition-size:system", "partition-type:vendor", "partition-size:vendor",
"partition-type:odm", "partition-size:odm", "partition-type:data", "partition-size:data",
"erase-block-size", "logical-block-size", "secure", "unlocked",
};
static const char* getvar_list_dynamic[] = {
"hw-revision", "battery-voltage", "is-userspace", "is-logical:data",
"is-logical:metadata", "is-logical:misc", "is-logical:super", "is-logical:boot",
"is-logical:system", "is-logical:vendor", "is-logical:product", "is-logical:odm",
"slot-count", "max-download-size", "serialno", "product", "unlocked", "has-slot:data",
"has-slot:metadata", "has-slot:misc", "has-slot:super", "has-slot:boot",
"has-slot:system", "has-slot:vendor", "has-slot:product", "has-slot:odm",
"secure", "super-partition-name", "version-baseband", "version-bootloader",
"partition-size:boot", "partition-size:metadata", "partition-size:misc",
"partition-size:super", "partition-size:data", "version",
};
static const char* getvar_list_dynamic_ab[] = {
"hw-revision", "battery-voltage", "is-userspace", "is-logical:data",
"is-logical:metadata_a", "is-logical:metadata_b", "is-logical:misc", "is-logical:super",
"is-logical:boot_a", "is-logical:boot_b", "is-logical:system_a", "is-logical:system_b",
"is-logical:vendor_a", "is-logical:vendor_b", "is-logical:product_a", "is-logical:product_b",
"is-logical:odm_a", "is-logical:odm_b",
"slot-count", "max-download-size", "serialno", "product", "unlocked", "has-slot:data",
"has-slot:metadata", "has-slot:misc", "has-slot:super", "has-slot:boot",
"has-slot:system", "has-slot:vendor", "has-slot:product", "has-slot:odm", "current-slot",
"secure", "super-partition-name", "version-baseband", "version-bootloader",
"partition-size:super", "partition-size:metadata_a", "partition-size:metadata_b",
"partition-size:boot_a", "partition-size:boot_b", "partition-size:misc",
"partition-size:data", "version",
};
static const char* getvar_list_ab[] = {
"version-baseband", "version-bootloader", "version", "hw-revision", "max-download-size",
"serialno", "product", "off-mode-charge", "variant", "battery-soc-ok",
"battery-voltage", "partition-type:boot_a", "partition-size:boot_a",
"partition-type:system_a", "partition-size:system_a", "partition-type:vendor_a", "partition-size:vendor_a",
"partition-type:odm_a", "partition-size:odm_a", "partition-type:data", "partition-size:data",
"erase-block-size", "logical-block-size", "secure", "unlocked",
"slot-count", "slot-suffixes","current-slot", "has-slot:bootloader", "has-slot:boot",
"has-slot:system", "has-slot:vendor", "has-slot:odm", "has-slot:vbmeta",
"has-slot:metadata", "has-slot:product", "has-slot:dtbo",
"slot-successful:a", "slot-unbootable:a", "slot-retry-count:a",
"slot-successful:b", "slot-unbootable:b", "slot-retry-count:b",
};
static void cb_getvar(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
char cmdBuf[RESPONSE_LEN];
char* response = response_str;
char *s;
char *s1;
char *s2;
char *s3;
char s_version[24];
size_t chars_left;
run_command("get_valid_slot", 0);
strcpy(response, "OKAY");
chars_left = sizeof(response_str) - strlen(response) - 1;
memcpy(cmdBuf, cmd, strnlen(cmd, RESPONSE_LEN-1)+1);
cmd = cmdBuf;
strsep(&cmd, ":");
printf("cb_getvar: %s\n", cmd);
if (!cmd) {
error("missing variable\n");
fastboot_tx_write_str("FAILmissing var");
return;
}
if (!strncmp(cmd, "all", 3)) {
static int cmdIndex = 0;
int getvar_num = 0;
if (dynamic_partition && has_boot_slot == 1 && strlen(getvar_list_dynamic_ab[cmdIndex]) < 64) {
strcpy(cmd, getvar_list_dynamic_ab[cmdIndex]);
getvar_num = (sizeof(getvar_list_dynamic_ab) / sizeof(getvar_list_dynamic_ab[0]));
} else if (has_boot_slot == 1 && strlen(getvar_list_ab[cmdIndex]) < 64) {
strcpy(cmd, getvar_list_ab[cmdIndex]);
getvar_num = (sizeof(getvar_list_ab) / sizeof(getvar_list_ab[0]));
} else if (dynamic_partition && strlen(getvar_list_dynamic[cmdIndex]) < 64) {
strcpy(cmd, getvar_list_dynamic[cmdIndex]);//only support no-arg cmd
getvar_num = (sizeof(getvar_list_dynamic) / sizeof(getvar_list_dynamic[0]));
} else if (strlen(getvar_list[cmdIndex]) < 64) {
strcpy(cmd, getvar_list[cmdIndex]);//only support no-arg cmd
getvar_num = (sizeof(getvar_list) / sizeof(getvar_list[0]));
}
printf("getvar_num: %d\n", getvar_num);
if ( ++cmdIndex >= getvar_num) cmdIndex = 0;
else fastboot_busy(NULL);
FB_MSG("all cmd:%s\n", cmd);
strncat(response, cmd, chars_left);
strncat(response, ":", 1);
chars_left -= strlen(cmd) + 1;
}
strcpy(s_version, "01.01.");
printf("U_BOOT_DATE_TIME: %s\n", U_BOOT_DATE_TIME);
strcat(s_version, U_BOOT_DATE_TIME);
printf("s_version: %s\n", s_version);
if (!strcmp_l1("version-baseband", cmd)) {
strncat(response, "N/A", chars_left);
} else if (!strcmp_l1("version-bootloader", cmd)) {
strncat(response, s_version, chars_left);
} else if (!strcmp_l1("hw-revision", cmd)) {
strncat(response, "0", chars_left);
} else if (!strcmp_l1("version", cmd)) {
strncat(response, FASTBOOT_VERSION, chars_left);
} else if (!strcmp_l1("bootloader-version", cmd)) {
strncat(response, s_version, chars_left);
} else if (!strcmp_l1("off-mode-charge", cmd)) {
strncat(response, "0", chars_left);
} else if (!strcmp_l1("variant", cmd)) {
strncat(response, "US", chars_left);
} else if (!strcmp_l1("battery-soc-ok", cmd)) {
strncat(response, "yes", chars_left);
} else if (!strcmp_l1("battery-voltage", cmd)) {
strncat(response, "4", chars_left);
} else if (!strcmp_l1("is-userspace", cmd)) {
if (dynamic_partition) {
strncat(response, "no", chars_left);
} else {
error("unknown variable: %s\n", cmd);
strcpy(response, "FAILVariable not implemented");
}
} else if (!strcmp_l1("is-logical", cmd)) {
strsep(&cmd, ":");
printf("partition is %s\n", cmd);
if (!dynamic_partition) {
strncat(response, "no", chars_left);
} else {
#ifdef CONFIG_BOOTLOADER_CONTROL_BLOCK
if (is_partition_logical(cmd) == 0) {
error("%s is logic partition\n", cmd);
strncat(response, "yes", chars_left);
} else {
strncat(response, "no", chars_left);
}
#else
strncat(response, "no", chars_left);
#endif
}
} else if (!strcmp_l1("super-partition-name", cmd)) {
char *slot_name;
slot_name = getenv("slot-suffixes");
if (has_boot_slot == 0) {
strncat(response, "super", chars_left);
} else {
printf("slot-suffixes: %s\n", slot_name);
if (strcmp(slot_name, "0") == 0) {
printf("active_slot is %s\n", "a");
strncat(response, "super_a", chars_left);
} else if (strcmp(slot_name, "1") == 0) {
printf("active_slot is %s\n", "b");
strncat(response, "super_b", chars_left);
}
}
} else if (!strcmp_l1("downloadsize", cmd) ||
!strcmp_l1("max-download-size", cmd)) {
char str_num[12];
sprintf(str_num, "0x%08x", ddr_size_usable(CONFIG_USB_FASTBOOT_BUF_ADDR));
strncat(response, str_num, chars_left);
} else if (!strcmp_l1("serialno", cmd)) {
//s = getenv("serial");
s = get_usid_string();
if (s)
strncat(response, s, chars_left);
else
strncat(response, DEVICE_SERIAL, chars_left);
} else if (!strcmp_l1("product", cmd)) {
#ifdef DEVICE_PRODUCT
s1 = DEVICE_PRODUCT;
printf("DEVICE_PRODUCT: %s\n", s1);
#else
s1 = getenv("device_product");
printf("device_product: %s\n", s1);
#endif
strncat(response, s1, chars_left);
} else if (!strcmp_l1("slot-count", cmd)) {
if (has_boot_slot == 1)
strncat(response, "2", chars_left);
else
strncat(response, "0", chars_left);
} else if (!strcmp_l1("slot-suffixes", cmd)) {
s2 = getenv("slot-suffixes");
printf("slot-suffixes: %s\n", s2);
if (!strcmp(s2, "-1") == 0)
strncat(response, s2, chars_left);
else
strncat(response, "0", chars_left);
} else if (!strcmp_l1("current-slot", cmd)) {
s3 = getenv("slot-suffixes");
printf("slot-suffixes: %s\n", s3);
if (strcmp(s3, "0") == 0) {
printf("active_slot is %s\n", "a");
strncat(response, "a", chars_left);
} else if (strcmp(s3, "1") == 0) {
printf("active_slot is %s\n", "b");
strncat(response, "b", chars_left);
}
} else if (!strcmp_l1("has-slot:bootloader", cmd)) {
printf("do not has slot bootloader\n");
strncat(response, "no", chars_left);
} else if (!strcmp_l1("has-slot:boot", cmd)) {
if (has_boot_slot == 1) {
printf("has boot slot\n");
strncat(response, "yes", chars_left);
} else
strncat(response, "no", chars_left);
} else if (!strcmp_l1("has-slot:vendor_boot", cmd)) {
if (has_boot_slot == 1) {
printf("has vendor_boot slot\n");
strncat(response, "yes", chars_left);
} else
strncat(response, "no", chars_left);
} else if (!strcmp_l1("has-slot:recovery", cmd)) {
if (has_boot_slot == 1) {
printf("has recovery slot\n");
strncat(response, "yes", chars_left);
} else
strncat(response, "no", chars_left);
} else if (!strcmp_l1("has-slot:system", cmd)) {
if (dynamic_partition) {
strncat(response, "no", chars_left);
} else {
if (has_system_slot == 1) {
printf("has system slot\n");
strncat(response, "yes", chars_left);
} else
strncat(response, "no", chars_left);
}
} else if (!strcmp_l1("has-slot:vendor", cmd)) {
if (dynamic_partition) {
strncat(response, "no", chars_left);
} else {
if (has_boot_slot == 1) {
printf("has vendor slot\n");
strncat(response, "yes", chars_left);
} else
strncat(response, "no", chars_left);
}
} else if (!strcmp_l1("has-slot:vbmeta", cmd)) {
if (has_boot_slot == 1) {
printf("has vbmeta slot\n");
strncat(response, "yes", chars_left);
} else
strncat(response, "no", chars_left);
} else if (!strcmp_l1("has-slot:product", cmd)) {
if (dynamic_partition) {
strncat(response, "no", chars_left);
} else {
if (has_boot_slot == 1) {
printf("has product slot\n");
strncat(response, "yes", chars_left);
} else
strncat(response, "no", chars_left);
}
} else if (!strcmp_l1("has-slot:super", cmd)) {
if (!dynamic_partition) {
strncat(response, "no", chars_left);
} else {
if (has_boot_slot == 1) {
printf("has product slot\n");
strncat(response, "yes", chars_left);
} else
strncat(response, "no", chars_left);
}
} else if (!strcmp_l1("has-slot:metadata", cmd)) {
strncat(response, "no", chars_left);
} else if (!strcmp_l1("has-slot:dtbo", cmd)) {
if (has_boot_slot == 1) {
printf("has dtbo slot\n");
strncat(response, "yes", chars_left);
} else
strncat(response, "no", chars_left);
} else if (!strcmp_l1("has-slot:data", cmd)) {
strncat(response, "no", chars_left);
} else if (!strcmp_l1("has-slot:misc", cmd)) {
strncat(response, "no", chars_left);
} else if (!strcmp_l1("has-slot:env", cmd)) {
strncat(response, "no", chars_left);
} else if (!strcmp_l1("has-slot:factory", cmd)) {
strncat(response, "no", chars_left);
} else if (!strcmp_l1("has-slot:odm", cmd)) {
if (has_boot_slot == 1) {
printf("has odm slot\n");
strncat(response, "yes", chars_left);
} else
strncat(response, "no", chars_left);
} else if (!strncmp("partition-size", cmd, strlen("partition-size"))) {
char str_num[20];
struct partitions *pPartition;
uint64_t sz;
strsep(&cmd, ":");
printf("partition is %s\n", cmd);
if (strcmp(cmd, "userdata") == 0) {
strcpy(cmd, "data");
printf("partition is %s\n", cmd);
}
if (!strncmp("mbr", cmd, strlen("mbr"))) {
strcpy(response, "FAILVariable not implemented");
} else {
if (!strncmp("bootloader-", cmd, strlen("bootloader-"))) {
strsep(&cmd, "-");
mmc_boot_size(cmd, &sz);
printf("size:%016llx\n", sz);
sprintf(str_num, "%016llx", sz);
} else {
pPartition = find_mmc_partition_by_name(cmd);
if (pPartition) {
printf("size:%016llx\n", pPartition->size);
if (strcmp(cmd, "data") == 0) {
printf("reserve 0x4000 for fde data\n");
sz = pPartition->size - 0x4000;
printf("data size :%016llx\n", sz);
sprintf(str_num, "%016llx", sz);
} else {
sprintf(str_num, "%016llx", pPartition->size);
}
} else {
printf("find_mmc_partition_by_name fail\n");
sprintf(str_num, "get fail");
}
}
strncat(response, str_num, chars_left);
}
} else if (!strcmp_l1("partition-type:cache", cmd)) {
if (has_boot_slot == 0) {
strncat(response, "ext4", chars_left);
}
} else if (!strcmp_l1("partition-type:data", cmd)) {
strncat(response, "ext4", chars_left);
} else if (!strcmp_l1("partition-type:userdata", cmd)) {
strncat(response, "ext4", chars_left);
} else if (!strcmp_l1("partition-type:system", cmd)) {
strncat(response, "ext4", chars_left);
} else if (!strcmp_l1("partition-type:vendor", cmd)) {
strncat(response, "ext4", chars_left);
} else if (!strcmp_l1("partition-type:odm", cmd)) {
strncat(response, "ext4", chars_left);
} else if (!strcmp_l1("partition-type:tee", cmd)) {
strncat(response, "ext4", chars_left);
} else if (!strcmp_l1("partition-type:param", cmd)) {
strncat(response, "ext4", chars_left);
} else if (!strcmp_l1("partition-type:product", cmd)) {
strncat(response, "ext4", chars_left);
} else if (!strcmp_l1("partition-type:metadata", cmd)) {
strncat(response, "ext4", chars_left);
} else if (!strncmp("partition-type", cmd, strlen("partition-type"))) {
strncat(response, "raw", chars_left);
} else if (!strcmp_l1("erase-block-size", cmd) ||
!strcmp_l1("logical-block-size", cmd)) {
strncat(response, "2000", chars_left);
} else if (!strcmp_l1("secure", cmd)) {
if (check_lock()) {
strncat(response, "yes", chars_left);
} else {
strncat(response, "no", chars_left);
}
} else if (!strcmp_l1("unlocked", cmd)) {
if (check_lock()) {
strncat(response, "no", chars_left);
} else {
strncat(response, "yes", chars_left);
}
} else if (!strcmp_l1("snapshot-update-status", cmd)) {
if (has_boot_slot == 1) {
struct misc_virtual_ab_message message;
get_mergestatus(&message);
switch (message.merge_status) {
case SNAPSHOTTED:
strncat(response, "snapshotted", chars_left);
break;
case MERGING:
strncat(response, "merging", chars_left);
break;
default:
strncat(response, "none", chars_left);
break;
}
}
} else if (!strcmp_l1("slot-successful", cmd)) {
char str[128];
strsep(&cmd, ":");
printf("cmd is %s\n", cmd);
int ret;
if (has_boot_slot == 1) {
printf("has boot slot\n");
sprintf(str, "get_slot_state %s successful", cmd);
printf("command: %s\n", str);
ret = run_command(str, 0);
printf("ret = %d\n", ret);
if (ret == 0)
strncat(response, "no", chars_left);
else
strncat(response, "yes", chars_left);
} else
strcpy(response, "FAILVariable not implemented in non ab mode");
} else if (!strcmp_l1("slot-unbootable", cmd)) {
char str[128];
strsep(&cmd, ":");
printf("cmd is %s\n", cmd);
int ret;
if (has_boot_slot == 1) {
printf("has boot slot\n");
sprintf(str, "get_slot_state %s unbootable", cmd);
printf("command: %s\n", str);
ret = run_command(str, 0);
printf("ret = %d\n", ret);
if (ret == 0)
strncat(response, "yes", chars_left);
else
strncat(response, "no", chars_left);
} else
strcpy(response, "FAILVariable not implemented in non ab mode");
} else if (!strcmp_l1("slot-retry-count", cmd)) {
char str[128];
strsep(&cmd, ":");
printf("cmd is %s\n", cmd);
int ret;
if (has_boot_slot == 1) {
char str_num[12];
printf("has boot slot\n");
sprintf(str, "get_slot_state %s retry-count", cmd);
printf("command: %s\n", str);
ret = run_command(str, 0);
printf("ret = %d\n", ret);
sprintf(str_num, "%d", ret);
strncat(response, str_num, chars_left);
} else
strcpy(response, "FAILVariable not implemented in non ab mode");
} else {
error("unknown variable: %s\n", cmd);
strcpy(response, "FAILVariable not implemented");
}
fastboot_tx_write_str(response);
}
static unsigned int rx_bytes_expected(void)
{
int rx_remain = download_size - download_bytes;
if (rx_remain < 0)
return 0;
if (rx_remain > EP_BUFFER_SIZE)
return EP_BUFFER_SIZE;
return rx_remain;
}
#define BYTES_PER_DOT 0x20000
static void rx_handler_dl_image(struct usb_ep *ep, struct usb_request *req)
{
char response[RESPONSE_LEN];
unsigned int transfer_size = download_size - download_bytes;
const unsigned char *buffer = req->buf;
unsigned int buffer_size = req->actual;
unsigned int pre_dot_num, now_dot_num;
if (req->status != 0) {
printf("Bad status: %d\n", req->status);
return;
}
if (buffer_size < transfer_size)
transfer_size = buffer_size;
memcpy((void *)CONFIG_USB_FASTBOOT_BUF_ADDR + download_bytes,
buffer, transfer_size);
pre_dot_num = download_bytes / BYTES_PER_DOT;
download_bytes += transfer_size;
now_dot_num = download_bytes / BYTES_PER_DOT;
if (pre_dot_num != now_dot_num) {
putc('.');
if (!(now_dot_num % 74))
putc('\n');
}
/* Check if transfer is done */
if (download_bytes >= download_size) {
/*
* Reset global transfer variable, keep download_bytes because
* it will be used in the next possible flashing command
*/
download_size = 0;
req->complete = rx_handler_command;
req->length = EP_BUFFER_SIZE;
sprintf(response, "OKAY");
fastboot_tx_write_str(response);
printf("\ndownloading of %d bytes finished\n", download_bytes);
} else {
req->length = rx_bytes_expected();
if (req->length < ep->maxpacket)
req->length = ep->maxpacket;
}
req->actual = 0;
usb_ep_queue(ep, req, 0);
}
static void cb_download(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
char response[RESPONSE_LEN];
printf("cmd cb_download is %s\n", cmd);
strsep(&cmd, ":");
download_size = simple_strtoul(cmd, NULL, 16);
download_bytes = 0;
printf("Starting download of %d bytes\n", download_size);
if (0 == download_size) {
sprintf(response, "FAILdata invalid size");
} else if (download_size > ddr_size_usable(CONFIG_USB_FASTBOOT_BUF_ADDR)) {
download_size = 0;
sprintf(response, "FAILdata too large");
} else {
sprintf(response, "DATA%08x", download_size);
req->complete = rx_handler_dl_image;
req->length = rx_bytes_expected();
if (req->length < ep->maxpacket)
req->length = ep->maxpacket;
}
fastboot_tx_write_str(response);
}
typedef struct andr_img_hdr boot_img_hdr;
static void do_bootm_on_complete(struct usb_ep *ep, struct usb_request *req)
{
char boot_addr_start[12];
unsigned kernel_size;
unsigned ramdisk_size;
boot_img_hdr *hdr_addr = NULL;
int genFmt = 0;
unsigned actualBootImgSz = 0;
unsigned dtbSz = 0;
unsigned char* loadaddr = 0;
puts("Booting kernel...\n");
sprintf(boot_addr_start, "bootm 0x%lx", load_addr);
printf("boot_addr_start %s\n", boot_addr_start);
loadaddr = (unsigned char*)CONFIG_USB_FASTBOOT_BUF_ADDR;
hdr_addr = (boot_img_hdr*)loadaddr;
genFmt = genimg_get_format(hdr_addr);
if (IMAGE_FORMAT_ANDROID != genFmt) {
printf("Fmt unsupported!genFmt 0x%x != 0x%x\n", genFmt, IMAGE_FORMAT_ANDROID);
return;
}
kernel_size =(hdr_addr->kernel_size + (hdr_addr->page_size-1)+hdr_addr->page_size)&(~(hdr_addr->page_size -1));
ramdisk_size =(hdr_addr->ramdisk_size + (hdr_addr->page_size-1))&(~(hdr_addr->page_size -1));
dtbSz = hdr_addr->second_size;
actualBootImgSz = kernel_size + ramdisk_size + dtbSz;
printf("kernel_size 0x%x, page_size 0x%x, totalSz 0x%x\n", hdr_addr->kernel_size, hdr_addr->page_size, kernel_size);
printf("ramdisk_size 0x%x, totalSz 0x%x\n", hdr_addr->ramdisk_size, ramdisk_size);
printf("dtbSz 0x%x, Total actualBootImgSz 0x%x\n", dtbSz, actualBootImgSz);
memcpy((void *)load_addr, (void *)CONFIG_USB_FASTBOOT_BUF_ADDR, actualBootImgSz);
flush_cache(load_addr,(unsigned long)actualBootImgSz);
run_command(boot_addr_start, 0);
/* This only happens if image is somehow faulty so we start over */
do_reset(NULL, 0, 0, NULL);
}
static void cb_boot(struct usb_ep *ep, struct usb_request *req)
{
fastboot_func->in_req->complete = do_bootm_on_complete;
fastboot_tx_write_str("OKAY");
}
static void do_exit_on_complete(struct usb_ep *ep, struct usb_request *req)
{
puts("Booting kernel..\n");
run_command("run storeboot", 0);
/* This only happens if image is somehow faulty so we start over */
do_reset(NULL, 0, 0, NULL);
}
static void cb_continue(struct usb_ep *ep, struct usb_request *req)
{
fastboot_func->in_req->complete = do_exit_on_complete;
fastboot_tx_write_str("OKAY");
}
static void cb_flashing(struct usb_ep *ep, struct usb_request *req)
{
char *cmd;
char* response = response_str;
char* lock_s;
LockData_t* info;
size_t chars_left;
char lock_d[LOCK_DATA_SIZE];
lock_s = getenv("lock");
if (!lock_s) {
printf("lock state is NULL \n");
strcpy(lock_d, "10101000");
lock_s = "10101000";
setenv("lock", "10101000");
run_command("defenv_reserv; saveenv;", 0);
} else {
printf("lock state: %s\n", lock_s);
if (strlen(lock_s) > 15)
strncpy(lock_d, lock_s, 15);
else
strncpy(lock_d, lock_s, strlen(lock_s));
}
info = malloc(sizeof(struct LockData));
if (!info) {
error("malloc error\n");
fastboot_tx_write_str("FAILmalloc error");
return;
}
memset(info,0,LOCK_DATA_SIZE);
info->version_major = (int)(lock_d[0] - '0');
info->version_minor = (int)(lock_d[1] - '0');
info->unlock_ability = (int)(lock_d[2] - '0');
info->lock_state = (int)(lock_d[4] - '0');
info->lock_critical_state = (int)(lock_d[5] - '0');
info->lock_bootloader = (int)(lock_d[6] - '0');
dump_lock_info(info);
strcpy(response, "OKAY");
chars_left = sizeof(response_str) - strlen(response) - 1;
cmd = strchr(req->buf, ' ');
if (!cmd) {
error("missing variable\n");
fastboot_tx_write_str("FAILmissing var");
free(info);
return;
}
cmd += 1;
printf("cb_flashing: %s\n", cmd);
if (!strcmp_l1("unlock_critical", cmd)) {
info->lock_critical_state = 0;
} else if (!strcmp_l1("lock_critical", cmd)) {
info->lock_critical_state = 1;
} else if (!strcmp_l1("get_unlock_ability", cmd)) {
char str[32];
static bool is_unlock_ability_sent = false;
if (is_unlock_ability_sent) {
is_unlock_ability_sent = false;
} else {
sprintf(str, "get_unlock_ability: %d",
info->unlock_ability);
fastboot_busy(str);
is_unlock_ability_sent = true;
}
} else if (!strcmp_l1("get_unlock_bootloader_nonce", cmd)) {
char str_num[8];
sprintf(str_num, "%d", info->lock_critical_state);
strncat(response, str_num, chars_left);
} else if (!strcmp_l1("unlock_bootloader", cmd)) {
strncat(response, "please run flashing unlock & flashing unlock_critical before write", chars_left);
} else if (!strcmp_l1("lock_bootloader", cmd)) {
info->lock_bootloader = 1;
} else if (!strcmp_l1("unlock", cmd)) {
if (info->lock_state == 1 ) {
char *avb_s;
avb_s = getenv("avb2");
if (avb_s == NULL) {
run_command("get_avb_mode;", 0);
avb_s = getenv("avb2");
}
printf("avb2: %s\n", avb_s);
if (strcmp(avb_s, "1") == 0) {
#ifdef CONFIG_AML_ANTIROLLBACK
if (avb_unlock()) {
printf("unlocking device. Erasing userdata partition!\n");
run_command("store erase partition data", 0);
run_command("store erase partition metadata", 0);
} else {
printf("unlock failed!\n");
}
#else
printf("unlocking device. Erasing userdata partition!\n");
run_command("store erase partition data", 0);
run_command("store erase partition metadata", 0);
#endif
}
}
info->lock_state = 0;
info->lock_critical_state = 0;
} else if (!strcmp_l1("lock", cmd)) {
if (info->lock_state == 0 ) {
char *avb_s;
avb_s = getenv("avb2");
if (avb_s == NULL) {
run_command("get_avb_mode;", 0);
avb_s = getenv("avb2");
}
printf("avb2: %s\n", avb_s);
if (strcmp(avb_s, "1") == 0) {
#ifdef CONFIG_AML_ANTIROLLBACK
if (avb_lock()) {
printf("lock failed!\n");
} else {
printf("locking device. Erasing userdata partition!\n");
run_command("store erase partition data", 0);
run_command("store erase partition metadata", 0);
}
#else
printf("locking device. Erasing userdata partition!\n");
run_command("store erase partition data", 0);
run_command("store erase partition metadata", 0);
#endif
}
}
info->lock_state = 1;
} else {
error("unknown variable: %s\n", cmd);
strcpy(response, "FAILVariable not implemented");
}
dump_lock_info(info);
sprintf(lock_d, "%d%d%d0%d%d%d0", info->version_major, info->version_minor, info->unlock_ability, info->lock_state, info->lock_critical_state, info->lock_bootloader);
printf("lock_d state: %s\n", lock_d);
setenv("lock", lock_d);
run_command("defenv_reserv; saveenv;", 0);
printf("response: %s\n", response);
free(info);
fastboot_tx_write_str(response);
}
#ifdef CONFIG_FASTBOOT_FLASH
static void cb_flash(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
char* response = response_str;
printf("cmd cb_flash is %s\n", cmd);
strsep(&cmd, ":");
if (!cmd) {
error("missing partition name\n");
fastboot_tx_write_str("FAILmissing partition name");
return;
}
if (check_lock()) {
error("device is locked, can not run this cmd.Please flashing unlock & flashing unlock_critical\n");
fastboot_tx_write_str("FAILlocked device");
return;
}
#ifdef CONFIG_BOOTLOADER_CONTROL_BLOCK
if (dynamic_partition) {
if (is_partition_logical(cmd) == 0) {
error("%s is logic partition, can not write here.......\n", cmd);
fastboot_tx_write_str("FAILlogic partition");
return;
}
}
#endif
printf("partition is %s\n", cmd);
if (strcmp(cmd, "userdata") == 0) {
strcpy(cmd, "data");
printf("partition is %s\n", cmd);
}
if (strcmp(cmd, "dts") == 0) {
strcpy(cmd, "dtb");
printf("partition is %s\n", cmd);
}
//strcpy(response, "FAILno flash device defined");
if (is_mainstorage_emmc()) {
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
fb_mmc_flash_write(cmd, (void *)CONFIG_USB_FASTBOOT_BUF_ADDR,
download_bytes);
#endif
} else if (is_mainstorage_nand()) {
#ifdef CONFIG_FASTBOOT_FLASH_NAND_DEV
fb_nand_flash_write(cmd, (void *)CONFIG_USB_FASTBOOT_BUF_ADDR,
download_bytes);
#else
fastboot_fail("not support nftl\n");
#endif
} else {
printf("error: no valid fastboot device\n");
fastboot_fail("no vaild device\n");
}
fastboot_tx_write_str(response);
}
#endif
static void cb_set_active(struct usb_ep *ep, struct usb_request *req)
{
char *cmd = req->buf;
//char response[RESPONSE_LEN];
int ret = 0;
char str[128];
printf("cmd cb_set_active is %s\n", cmd);
strsep(&cmd, ":");
if (!cmd) {
error("missing slot name\n");
fastboot_tx_write_str("FAILmissing slot name");
return;
}
if (check_lock()) {
error("device is locked, can not run this cmd.Please flashing unlock & flashing unlock_critical\n");
fastboot_tx_write_str("FAILlocked device");
return;
}
struct misc_virtual_ab_message message;
get_mergestatus(&message);
if (message.merge_status == MERGING) {
fastboot_tx_write_str("FAILin merge state, cannot set active");
return;
}
sprintf(str, "set_active_slot %s", cmd);
printf("command: %s\n", str);
ret = run_command(str, 0);
printf("ret = %d\n", ret);
if (ret == 0)
fastboot_tx_write_str("OKAY");
else
fastboot_tx_write_str("FAILset slot error");
}
static void cb_flashall(struct usb_ep *ep, struct usb_request *req)
{
char* response = response_str;
char *cmd = req->buf;
printf("cmd cb_flashall is %s\n", cmd);
if (check_lock()) {
error("device is locked, can not run this cmd.Please flashing unlock & flashing unlock_critical\n");
fastboot_tx_write_str("FAILlocked device");
return;
}
//strcpy(response, "FAILno flash device defined");
if (is_mainstorage_emmc()) {
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
fb_mmc_flash_write(cmd, (void *)CONFIG_USB_FASTBOOT_BUF_ADDR,
download_bytes);
#endif
} else if (is_mainstorage_nand()) {
#ifdef CONFIG_FASTBOOT_FLASH_NAND_DEV
fb_nand_flash_write(cmd, (void *)CONFIG_USB_FASTBOOT_BUF_ADDR,
download_bytes);
#else
fastboot_fail("not support nftl\n");
#endif
} else {
printf("error: no valid fastboot device\n");
fastboot_fail("no vaild device\n");
}
fastboot_tx_write_str(response);
}
static void cb_erase(struct usb_ep *ep, struct usb_request *req)
{
char* response = response_str;
char *cmd = req->buf;
printf("cmd cb_erase is %s\n", cmd);
strsep(&cmd, ":");
if (!cmd) {
error("missing partition name\n");
fastboot_tx_write_str("FAILmissing partition name");
return;
}
if (check_lock()) {
error("device is locked, can not run this cmd.Please flashing unlock & flashing unlock_critical\n");
fastboot_tx_write_str("FAILlocked device");
return;
}
struct misc_virtual_ab_message message;
get_mergestatus(&message);
printf("partition is %s\n", cmd);
if (strcmp(cmd, "userdata") == 0) {
strcpy(cmd, "data");
printf("partition is %s\n", cmd);
if (message.merge_status == SNAPSHOTTED || message.merge_status == MERGING) {
fastboot_tx_write_str("FAILin merge state, cannot erase");
return;
}
}
if (strcmp(cmd, "dts") == 0) {
strcpy(cmd, "dtb");
printf("partition is %s\n", cmd);
}
//strcpy(response, "FAILno erase device defined");
if (is_mainstorage_emmc()) {
#ifdef CONFIG_FASTBOOT_FLASH_MMC_DEV
fb_mmc_erase_write(cmd, (void *)CONFIG_USB_FASTBOOT_BUF_ADDR);
#endif
} else if (is_mainstorage_nand()) {
#ifdef CONFIG_FASTBOOT_FLASH_NAND_DEV
fb_nand_erase(cmd, (void *)CONFIG_USB_FASTBOOT_BUF_ADDR);
#else
fastboot_fail("not support nftl\n");
#endif
} else {
printf("error: no valid fastboot device\n");
fastboot_fail("no vaild device\n");
}
fastboot_tx_write_str(response);
}
static void cb_devices(struct usb_ep *ep, struct usb_request *req)
{
char response[RESPONSE_LEN];
char *cmd = req->buf;
printf("cmd is %s\n", cmd);
strcpy(response, "AMLOGIC");
fastboot_tx_write_str(response);
}
static void cb_snapshot_update_cmd(struct usb_ep *ep, struct usb_request *req)
{
char *cmd;
cmd = req->buf;
strsep(&cmd, ":");
printf("snapshot-update: %s\n", cmd);
if (!cmd) {
error("missing variable\n");
fastboot_tx_write_str("FAILmissing var");
return;
}
if (check_lock()) {
error("device is locked, can not run this cmd.Please flashing unlock & flashing unlock_critical\n");
fastboot_tx_write_str("FAILlocked device");
return;
}
if (!strcmp_l1("cancel", cmd)) {
struct misc_virtual_ab_message message;
set_mergestatus_cancel(&message);
}
fastboot_tx_write_str("OKAY");
}
static void cb_oem_cmd(struct usb_ep *ep, struct usb_request *req)
{
char* cmd = req->buf;
int i = 0, len = 0, j = 0;
char cmd_str[RESPONSE_LEN];
printf("oem cmd[%s]\n", cmd);
strsep(&cmd, " ");
printf("To run cmd[%s]\n", cmd);
len = strlen(cmd);
for (i = 0, j = 0; i < len; i++) {
if (cmd[i]!='\'') {
cmd_str[j++] = cmd[i];
}
}
cmd_str[j] = '\0';
printf("cmd_str2: %s\n", cmd_str);
run_command(cmd_str, 0);
fastboot_tx_write_str("OKAY");
return;
}
struct cmd_dispatch_info {
char *cmd;
void (*cb)(struct usb_ep *ep, struct usb_request *req);
};
static const struct cmd_dispatch_info cmd_dispatch_info[] = {
{
.cmd = "reboot",
.cb = cb_reboot,
}, {
.cmd = "getvar:",
.cb = cb_getvar,
}, {
.cmd = "download:",
.cb = cb_download,
}, {
.cmd = "boot",
.cb = cb_boot,
}, {
.cmd = "continue",
.cb = cb_continue,
}, {
.cmd = "flashing",
.cb = cb_flashing,
},
#ifdef CONFIG_FASTBOOT_FLASH
{
.cmd = "flash",
.cb = cb_flash,
},
#endif
{
.cmd = "update",
.cb = cb_download,
},
{
.cmd = "flashall",
.cb = cb_flashall,
},
{
.cmd = "erase",
.cb = cb_erase,
},
{
.cmd = "devices",
.cb = cb_devices,
},
{
.cmd = "reboot-bootloader",
.cb = cb_reboot,
},
{
.cmd = "reboot-fastboot",
.cb = cb_reboot,
},
{
.cmd = "set_active",
.cb = cb_set_active,
},
{
.cmd = "oem",
.cb = cb_oem_cmd,
},
{
.cmd = "snapshot-update",
.cb = cb_snapshot_update_cmd,
}
};
//cb for out_req->complete
static void rx_handler_command(struct usb_ep *ep, struct usb_request *req)
{
char *cmdbuf = req->buf;
void (*func_cb)(struct usb_ep *ep, struct usb_request *req) = NULL;
int i;
for (i = 0; i < ARRAY_SIZE(cmd_dispatch_info); i++) {
if (!strcmp_l1(cmd_dispatch_info[i].cmd, cmdbuf)) {
func_cb = cmd_dispatch_info[i].cb;
break;
}
}
if (!func_cb) {
error("unknown command: %s\n", cmdbuf);
fastboot_tx_write_str("FAILunknown command");
} else {
if (req->actual < req->length) {
u8 *buf = (u8 *)req->buf;
buf[req->actual] = 0;
func_cb(ep, req);
} else {
error("buffer overflow\n");
fastboot_tx_write_str("FAILbuffer overflow");
}
}
if (req->status == 0 && !fastboot_is_busy()) {
*cmdbuf = '\0';
req->actual = 0;
usb_ep_queue(ep, req, 0);
}
}