679 lines
18 KiB
Bash
Executable File
679 lines
18 KiB
Bash
Executable File
#!/bin/bash
|
|
#
|
|
# Copyright (c) 2020 Fuzhou Rockchip Electronics Co., Ltd
|
|
#
|
|
# SPDX-License-Identifier: GPL-2.0
|
|
#
|
|
set -e
|
|
|
|
FIT_DIR="fit"
|
|
IMG_UBOOT="uboot.img"
|
|
IMG_BOOT="boot.img"
|
|
IMG_RECOVERY="recovery.img"
|
|
ITB_UBOOT="${FIT_DIR}/uboot.itb"
|
|
ITB_BOOT="${FIT_DIR}/boot.itb"
|
|
ITB_RECOVERY="${FIT_DIR}/recovery.itb"
|
|
SIG_BIN="data2sign.bin"
|
|
SIG_UBOOT="${FIT_DIR}/uboot.data2sign"
|
|
SIG_BOOT="${FIT_DIR}/boot.data2sign"
|
|
SIG_RECOVERY="${FIT_DIR}/recovery.data2sign"
|
|
# offs
|
|
OFFS_NS_UBOOT="0xc00"
|
|
OFFS_S_UBOOT="0xc00"
|
|
OFFS_NS_BOOT="0x800"
|
|
OFFS_S_BOOT="0xc00"
|
|
OFFS_NS_RECOVERY="0x800"
|
|
OFFS_S_RECOVERY="0xc00"
|
|
# file
|
|
CHIP_FILE="arch/arm/lib/.asm-offsets.s.cmd"
|
|
# placeholder address
|
|
FDT_ADDR_PLACEHOLDER="0xffffff00"
|
|
KERNEL_ADDR_PLACEHOLDER="0xffffff01"
|
|
RAMDISK_ADDR_PLACEHOLDER="0xffffff02"
|
|
# tools
|
|
MKIMAGE="./tools/mkimage"
|
|
FIT_UNPACK="./scripts/fit-unpack.sh"
|
|
CHECK_SIGN="./tools/fit_check_sign"
|
|
# key
|
|
KEY_DIR="keys/"
|
|
RSA_PRI_KEY="keys/dev.key"
|
|
RSA_PUB_KEY="keys/dev.crt"
|
|
SIGNATURE_KEY_NODE="/signature/key-dev"
|
|
SPL_DTB="spl/u-boot-spl.dtb"
|
|
UBOOT_DTB="u-boot.dtb"
|
|
# its
|
|
ITS_UBOOT="u-boot.its"
|
|
ITS_BOOT="boot.its"
|
|
ITS_RECOVERY="recovery.its"
|
|
ARG_VER_UBOOT="0"
|
|
ARG_VER_BOOT="0"
|
|
ARG_VER_RECOVERY="0"
|
|
|
|
function help()
|
|
{
|
|
echo
|
|
echo "usage:"
|
|
echo " $0 [args]"
|
|
echo
|
|
echo "args:"
|
|
echo " --rollback-index-recovery <decimal integer>"
|
|
echo " --rollback-index-boot <decimal integer>"
|
|
echo " --rollback-index-uboot <decimal integer>"
|
|
echo " --version-recovery <decimal integer>"
|
|
echo " --version-boot <decimal integer>"
|
|
echo " --version-uboot <decimal integer>"
|
|
echo " --boot_img <boot image>"
|
|
echo " --recovery_img <recovery image>"
|
|
echo " --args <arg>"
|
|
echo " --ini-loader <loader ini file>"
|
|
echo " --ini-trust <trust ini file>"
|
|
echo " --no-check"
|
|
echo " --spl-new"
|
|
echo
|
|
}
|
|
|
|
function arg_check_decimal()
|
|
{
|
|
if [ -z $1 ]; then
|
|
help
|
|
exit 1
|
|
fi
|
|
|
|
decimal=`echo $1 |sed 's/[0-9]//g'`
|
|
if [ ! -z ${decimal} ]; then
|
|
echo "ERROR: $1 is not decimal integer"
|
|
help
|
|
exit 1
|
|
fi
|
|
}
|
|
|
|
function check_its()
|
|
{
|
|
cat $1 | while read line
|
|
do
|
|
file=`echo ${line} | sed -n "/incbin/p" | awk -F '"' '{ printf $2 }' | tr -d ' '`
|
|
if [ ! -f ${file} ]; then
|
|
echo "ERROR: No ${file}"
|
|
exit 1
|
|
fi
|
|
done
|
|
}
|
|
|
|
function validate_arg()
|
|
{
|
|
case $1 in
|
|
--no-check|--spl-new|--burn-key-hash)
|
|
shift=1
|
|
;;
|
|
--ini-trust|--ini-loader|--rollback-index-boot|--rollback-index-recovery|--rollback-index-uboot|--boot_img|--recovery_img|--version-uboot|--version-boot|--version-recovery)
|
|
shift=2
|
|
;;
|
|
*)
|
|
shift=0
|
|
;;
|
|
esac
|
|
echo ${shift}
|
|
}
|
|
|
|
function fit_process_args()
|
|
{
|
|
if [ $# -eq 0 ]; then
|
|
help
|
|
exit 0
|
|
fi
|
|
|
|
while [ $# -gt 0 ]; do
|
|
case $1 in
|
|
--args)
|
|
ARG_VALIDATE=$2
|
|
shift 2
|
|
;;
|
|
--boot_img) # boot.img
|
|
ARG_BOOT_IMG=$2
|
|
shift 2
|
|
;;
|
|
--recovery_img) # recovery.img
|
|
ARG_RECOVERY_IMG=$2
|
|
shift 2
|
|
;;
|
|
--boot_img_dir) # boot.img components directory
|
|
ARG_BOOT_IMG_DIR=$2
|
|
shift 2
|
|
;;
|
|
--no-check) # No hostcc fit signature check
|
|
ARG_NO_CHECK="y"
|
|
shift 1
|
|
;;
|
|
--ini-trust) # Assign trust ini file
|
|
ARG_INI_TRUST=$2
|
|
shift 2
|
|
;;
|
|
--ini-loader) # Assign loader ini file
|
|
ARG_INI_LOADER=$2
|
|
shift 2
|
|
;;
|
|
--spl-new) # Use current build u-boot-spl.bin to pack loader
|
|
ARG_SPL_NEW="y"
|
|
shift 1
|
|
;;
|
|
--rollback-index-boot)
|
|
ARG_ROLLBACK_IDX_BOOT=$2
|
|
arg_check_decimal $2
|
|
shift 2
|
|
;;
|
|
--rollback-index-recovery)
|
|
ARG_ROLLBACK_IDX_RECOVERY=$2
|
|
arg_check_decimal $2
|
|
shift 2
|
|
;;
|
|
--rollback-index-uboot)
|
|
ARG_ROLLBACK_IDX_UBOOT=$2
|
|
arg_check_decimal $2
|
|
shift 2
|
|
;;
|
|
--version-uboot)
|
|
ARG_VER_UBOOT=$2
|
|
arg_check_decimal $2
|
|
shift 2
|
|
;;
|
|
--version-boot)
|
|
ARG_VER_BOOT=$2
|
|
arg_check_decimal $2
|
|
shift 2
|
|
;;
|
|
--version-recovery)
|
|
ARG_VER_RECOVERY=$2
|
|
arg_check_decimal $2
|
|
shift 2
|
|
;;
|
|
--burn-key-hash)
|
|
ARG_BURN_KEY_HASH="y"
|
|
shift 1
|
|
;;
|
|
*)
|
|
help
|
|
exit 1
|
|
;;
|
|
esac
|
|
done
|
|
|
|
if grep -q '^CONFIG_FIT_SIGNATURE=y' .config ; then
|
|
ARG_SIGN="y"
|
|
fi
|
|
}
|
|
|
|
function fit_raw_compile()
|
|
{
|
|
# Verified-boot: should rebuild code but don't need to repack images.
|
|
if [ "${ARG_SIGN}" == "y" ]; then
|
|
./make.sh --raw-compile
|
|
fi
|
|
rm ${FIT_DIR} -rf && mkdir -p ${FIT_DIR}
|
|
}
|
|
|
|
function fit_gen_uboot_itb()
|
|
{
|
|
# generate u-boot.its file
|
|
./make.sh itb ${ARG_INI_TRUST}
|
|
|
|
# check existance of file in its
|
|
check_its ${ITS_UBOOT}
|
|
|
|
if [ "${ARG_SIGN}" != "y" ]; then
|
|
${MKIMAGE} -f ${ITS_UBOOT} -E -p ${OFFS_NS_UBOOT} ${ITB_UBOOT} -v ${ARG_VER_UBOOT}
|
|
if [ "${ARG_SPL_NEW}" == "y" ]; then
|
|
./make.sh --spl ${ARG_INI_LOADER}
|
|
echo "pack loader with new: spl/u-boot-spl.bin"
|
|
else
|
|
./make.sh loader ${ARG_INI_LOADER}
|
|
fi
|
|
else
|
|
if [ ! -f ${RSA_PRI_KEY} ]; then
|
|
echo "ERROR: No ${RSA_PRI_KEY} "
|
|
exit 1
|
|
elif [ ! -f ${RSA_PUB_KEY} ]; then
|
|
echo "ERROR: No ${RSA_PUB_KEY} "
|
|
exit 1
|
|
fi
|
|
|
|
if ! grep -q '^CONFIG_SPL_FIT_SIGNATURE=y' .config ; then
|
|
echo "ERROR: CONFIG_SPL_FIT_SIGNATURE is disabled"
|
|
exit 1
|
|
fi
|
|
|
|
# rollback-index
|
|
if grep -q '^CONFIG_SPL_FIT_ROLLBACK_PROTECT=y' .config ; then
|
|
ARG_SPL_ROLLBACK_PROTECT="y"
|
|
if [ -z ${ARG_ROLLBACK_IDX_UBOOT} ]; then
|
|
echo "ERROR: No arg \"--rollback-index-uboot <n>\""
|
|
exit 1
|
|
fi
|
|
fi
|
|
|
|
if [ "${ARG_SPL_ROLLBACK_PROTECT}" == "y" ]; then
|
|
VERSION=`grep 'rollback-index' ${ITS_UBOOT} | awk -F '=' '{ printf $2 }' | tr -d ' '`
|
|
sed -i "s/rollback-index = ${VERSION}/rollback-index = <${ARG_ROLLBACK_IDX_UBOOT}>;/g" ${ITS_UBOOT}
|
|
fi
|
|
|
|
# Generally, boot.img is signed before uboot.img, so the ras key can be found
|
|
# in u-boot.dtb. If not found, let's insert rsa key anyway.
|
|
if ! fdtget -l ${UBOOT_DTB} /signature >/dev/null 2>&1 ; then
|
|
${MKIMAGE} -f ${ITS_UBOOT} -k ${KEY_DIR} -K ${UBOOT_DTB} -E -p ${OFFS_S_UBOOT} -r ${ITB_UBOOT} -v ${ARG_VER_UBOOT}
|
|
echo "## Adding RSA public key into ${UBOOT_DTB}"
|
|
fi
|
|
|
|
# Pack
|
|
${MKIMAGE} -f ${ITS_UBOOT} -k ${KEY_DIR} -K ${SPL_DTB} -E -p ${OFFS_S_UBOOT} -r ${ITB_UBOOT} -v ${ARG_VER_UBOOT}
|
|
mv ${SIG_BIN} ${SIG_UBOOT}
|
|
|
|
# burn-key-hash
|
|
if [ "${ARG_BURN_KEY_HASH}" == "y" ]; then
|
|
fdtput -tx ${SPL_DTB} ${SIGNATURE_KEY_NODE} burn-key-hash 0x1
|
|
fi
|
|
|
|
# rollback-index read back check
|
|
if [ "${ARG_SPL_ROLLBACK_PROTECT}" == "y" ]; then
|
|
VERSION=`fdtget -ti ${ITB_UBOOT} /configurations/conf rollback-index`
|
|
if [ "${VERSION}" != "${ARG_ROLLBACK_IDX_UBOOT}" ]; then
|
|
echo "ERROR: Failed to set rollback-index for ${ITB_UBOOT}";
|
|
exit 1
|
|
fi
|
|
fi
|
|
|
|
# burn-key-hash read back check
|
|
if [ "${ARG_BURN_KEY_HASH}" == "y" ]; then
|
|
if [ "`fdtget -ti ${SPL_DTB} ${SIGNATURE_KEY_NODE} burn-key-hash`" != "1" ]; then
|
|
echo "ERROR: Failed to set burn-key-hash for ${SPL_DTB}";
|
|
exit 1
|
|
fi
|
|
fi
|
|
|
|
# host check signature
|
|
if [ "${ARG_NO_CHECK}" != "y" ]; then
|
|
if [ "${ARG_SPL_NEW}" == "y" ]; then
|
|
${CHECK_SIGN} -f ${ITB_UBOOT} -k ${SPL_DTB} -s
|
|
else
|
|
spl_file="../rkbin/"`sed -n "/FlashBoot=/s/FlashBoot=//p" ${ARG_INI_LOADER} |tr -d '\r'`
|
|
offs=`fdtdump -s ${spl_file} | head -1 | awk -F ":" '{ print $2 }' | sed "s/ found fdt at offset //g" | tr -d " "`
|
|
if [ -z ${offs} ]; then
|
|
echo "ERROR: invalid ${spl_file} , unable to find fdt blob"
|
|
fi
|
|
offs=`printf %d ${offs} ` # hex -> dec
|
|
dd if=${spl_file} of=spl/u-boot-spl-old.dtb bs=${offs} skip=1 >/dev/null 2>&1
|
|
${CHECK_SIGN} -f ${ITB_UBOOT} -k spl/u-boot-spl-old.dtb -s
|
|
fi
|
|
fi
|
|
|
|
# minimize u-boot-spl.dtb: clear as 0 but not remove property.
|
|
if grep -q '^CONFIG_SPL_FIT_HW_CRYPTO=y' .config ; then
|
|
fdtput -tx ${SPL_DTB} ${SIGNATURE_KEY_NODE} rsa,r-squared 0x0
|
|
if grep -q '^CONFIG_SPL_ROCKCHIP_CRYPTO_V1=y' .config ; then
|
|
fdtput -tx ${SPL_DTB} ${SIGNATURE_KEY_NODE} rsa,np 0x0
|
|
fdtput -r ${SPL_DTB} ${SIGNATURE_KEY_NODE}/hash@np
|
|
else
|
|
fdtput -tx ${SPL_DTB} ${SIGNATURE_KEY_NODE} rsa,c 0x0
|
|
fdtput -r ${SPL_DTB} ${SIGNATURE_KEY_NODE}/hash@c
|
|
fi
|
|
else
|
|
fdtput -tx ${SPL_DTB} ${SIGNATURE_KEY_NODE} rsa,c 0x0
|
|
fdtput -tx ${SPL_DTB} ${SIGNATURE_KEY_NODE} rsa,np 0x0
|
|
fdtput -tx ${SPL_DTB} ${SIGNATURE_KEY_NODE} rsa,exponent-BN 0x0
|
|
fdtput -r ${SPL_DTB} ${SIGNATURE_KEY_NODE}/hash@c
|
|
fdtput -r ${SPL_DTB} ${SIGNATURE_KEY_NODE}/hash@np
|
|
fi
|
|
|
|
# repack spl
|
|
rm -f *_loader_*.bin
|
|
if [ "${ARG_SPL_NEW}" == "y" ]; then
|
|
cat spl/u-boot-spl-nodtb.bin > spl/u-boot-spl.bin
|
|
if ! grep -q '^CONFIG_SPL_SEPARATE_BSS=y' .config ; then
|
|
cat spl/u-boot-spl-pad.bin >> spl/u-boot-spl.bin
|
|
fi
|
|
cat ${SPL_DTB} >> spl/u-boot-spl.bin
|
|
|
|
./make.sh --spl ${ARG_INI_LOADER}
|
|
echo "## pack loader with new: spl/u-boot-spl.bin"
|
|
else
|
|
./make.sh loader ${ARG_INI_LOADER}
|
|
fi
|
|
|
|
if [ "${ARG_BURN_KEY_HASH}" == "y" ]; then
|
|
echo "## ${SPL_DTB}: burn-key-hash=1"
|
|
fi
|
|
fi
|
|
|
|
rm -f u-boot.itb u-boot.img u-boot-dtb.img
|
|
mv ${ITS_UBOOT} ${FIT_DIR}
|
|
}
|
|
|
|
function fit_gen_boot_itb()
|
|
{
|
|
if [ ! -z ${ARG_BOOT_IMG} ]; then
|
|
${FIT_UNPACK} -f ${ARG_BOOT_IMG} -o ${FIT_DIR}/unpack
|
|
ITS_BOOT="${FIT_DIR}/unpack/image.its"
|
|
else
|
|
compression=`awk -F"," '/COMPRESSION=/ { printf $1 }' ${ARG_INI_TRUST} | tr -d ' ' | cut -c 13-`
|
|
if [ -z "${compression}" ]; then
|
|
compression="none"
|
|
fi
|
|
./arch/arm/mach-rockchip/make_fit_boot.sh -c ${compression} > ${ITS_BOOT}
|
|
check_its ${ITS_BOOT}
|
|
fi
|
|
|
|
if [ "${ARG_SIGN}" != "y" ]; then
|
|
${MKIMAGE} -f ${ITS_BOOT} -E -p ${OFFS_NS_BOOT} ${ITB_BOOT} -v ${ARG_VER_BOOT}
|
|
else
|
|
if [ ! -f ${RSA_PRI_KEY} ]; then
|
|
echo "ERROR: No ${RSA_PRI_KEY}"
|
|
exit 1
|
|
elif [ ! -f ${RSA_PUB_KEY} ]; then
|
|
echo "ERROR: No ${RSA_PUB_KEY}"
|
|
exit 1
|
|
fi
|
|
|
|
if ! grep -q '^CONFIG_FIT_SIGNATURE=y' .config ; then
|
|
echo "ERROR: CONFIG_FIT_SIGNATURE is disabled"
|
|
exit 1
|
|
fi
|
|
|
|
if grep -q '^CONFIG_FIT_ROLLBACK_PROTECT=y' .config ; then
|
|
ARG_ROLLBACK_PROTECT="y"
|
|
if [ -z ${ARG_ROLLBACK_IDX_BOOT} ]; then
|
|
echo "ERROR: No arg \"--rollback-index-boot <n>\""
|
|
exit 1
|
|
fi
|
|
fi
|
|
|
|
# fixup
|
|
COMMON_FILE=`sed -n "/_common.h/p" ${CHIP_FILE} | awk '{ print $1 }'`
|
|
FDT_ADDR_R=`awk /fdt_addr_r/ ${COMMON_FILE} | awk -F '=' '{ print $2 }' | awk -F '\\' '{ print $1 }'`
|
|
KERNEL_ADDR_R=`awk /kernel_addr_r/ ${COMMON_FILE} | awk -F '=' '{ print $2 }' | awk -F '\\' '{ print $1 }'`
|
|
RMADISK_ADDR_R=`awk /ramdisk_addr_r/ ${COMMON_FILE} | awk -F '=' '{ print $2 }' | awk -F '\\' '{ print $1 }'`
|
|
sed -i "s/${FDT_ADDR_PLACEHOLDER}/${FDT_ADDR_R}/g" ${ITS_BOOT}
|
|
sed -i "s/${KERNEL_ADDR_PLACEHOLDER}/${KERNEL_ADDR_R}/g" ${ITS_BOOT}
|
|
sed -i "s/${RAMDISK_ADDR_PLACEHOLDER}/${RMADISK_ADDR_R}/g" ${ITS_BOOT}
|
|
if grep -q '^CONFIG_ARM64=y' .config ; then
|
|
sed -i 's/arch = "arm";/arch = "arm64";/g' ${ITS_BOOT}
|
|
fi
|
|
|
|
if [ "${ARG_ROLLBACK_PROTECT}" == "y" ]; then
|
|
VERSION=`grep 'rollback-index' ${ITS_BOOT} | awk -F '=' '{ printf $2 }' | tr -d ' '`
|
|
sed -i "s/rollback-index = ${VERSION}/rollback-index = <${ARG_ROLLBACK_IDX_BOOT}>;/g" ${ITS_BOOT}
|
|
fi
|
|
|
|
${MKIMAGE} -f ${ITS_BOOT} -k ${KEY_DIR} -K ${UBOOT_DTB} -E -p ${OFFS_S_BOOT} -r ${ITB_BOOT} -v ${ARG_VER_BOOT}
|
|
mv ${SIG_BIN} ${SIG_BOOT}
|
|
|
|
# rollback-index read back check
|
|
if [ "${ARG_ROLLBACK_PROTECT}" == "y" ]; then
|
|
VERSION=`fdtget -ti ${ITB_BOOT} /configurations/conf rollback-index`
|
|
if [ "${VERSION}" != "${ARG_ROLLBACK_IDX_BOOT}" ]; then
|
|
echo "ERROR: Failed to set rollback-index for ${ITB_BOOT}";
|
|
exit 1
|
|
fi
|
|
fi
|
|
|
|
# host check signature
|
|
if [ "${ARG_NO_CHECK}" != "y" ]; then
|
|
${CHECK_SIGN} -f ${ITB_BOOT} -k ${UBOOT_DTB}
|
|
fi
|
|
|
|
# minimize u-boot.dtb: clearn as 0 but not remove property.
|
|
if grep -q '^CONFIG_FIT_HW_CRYPTO=y' .config ; then
|
|
fdtput -tx ${UBOOT_DTB} ${SIGNATURE_KEY_NODE} rsa,r-squared 0x0
|
|
if grep -q '^CONFIG_ROCKCHIP_CRYPTO_V1=y' .config ; then
|
|
fdtput -tx ${UBOOT_DTB} ${SIGNATURE_KEY_NODE} rsa,np 0x0
|
|
else
|
|
fdtput -tx ${UBOOT_DTB} ${SIGNATURE_KEY_NODE} rsa,c 0x0
|
|
fi
|
|
else
|
|
fdtput -tx ${UBOOT_DTB} ${SIGNATURE_KEY_NODE} rsa,c 0x0
|
|
fdtput -tx ${UBOOT_DTB} ${SIGNATURE_KEY_NODE} rsa,np 0x0
|
|
fdtput -tx ${UBOOT_DTB} ${SIGNATURE_KEY_NODE} rsa,exponent-BN 0x0
|
|
fi
|
|
fdtput -r ${UBOOT_DTB} ${SIGNATURE_KEY_NODE}/hash@c
|
|
fdtput -r ${UBOOT_DTB} ${SIGNATURE_KEY_NODE}/hash@np
|
|
fi
|
|
|
|
mv ${ITS_BOOT} ${FIT_DIR}
|
|
}
|
|
|
|
function fit_gen_recovery_itb()
|
|
{
|
|
if [ ! -z ${ARG_RECOVERY_IMG} ]; then
|
|
${FIT_UNPACK} -f ${ARG_RECOVERY_IMG} -o ${FIT_DIR}/unpack
|
|
ITS_RECOVERY="${FIT_DIR}/unpack/image.its"
|
|
else
|
|
echo "ERROR: No recovery.img"
|
|
exit 1
|
|
fi
|
|
|
|
if [ "${ARG_SIGN}" != "y" ]; then
|
|
${MKIMAGE} -f ${ITS_RECOVERY} -E -p ${OFFS_NS_RECOVERY} ${ITB_RECOVERY} -v ${ARG_VER_RECOVERY}
|
|
else
|
|
if [ ! -f ${RSA_PRI_KEY} ]; then
|
|
echo "ERROR: No ${RSA_PRI_KEY}"
|
|
exit 1
|
|
elif [ ! -f ${RSA_PUB_KEY} ]; then
|
|
echo "ERROR: No ${RSA_PUB_KEY}"
|
|
exit 1
|
|
fi
|
|
|
|
if ! grep -q '^CONFIG_FIT_SIGNATURE=y' .config ; then
|
|
echo "ERROR: CONFIG_FIT_SIGNATURE is disabled"
|
|
exit 1
|
|
fi
|
|
|
|
if grep -q '^CONFIG_FIT_ROLLBACK_PROTECT=y' .config ; then
|
|
ARG_ROLLBACK_PROTECT="y"
|
|
if [ -z ${ARG_ROLLBACK_IDX_RECOVERY} ]; then
|
|
echo "ERROR: No arg \"--rollback-index-recovery <n>\""
|
|
exit 1
|
|
fi
|
|
fi
|
|
|
|
# fixup
|
|
COMMON_FILE=`sed -n "/_common.h/p" ${CHIP_FILE} | awk '{ print $1 }'`
|
|
FDT_ADDR_R=`awk /fdt_addr_r/ ${COMMON_FILE} | awk -F '=' '{ print $2 }' | awk -F '\\' '{ print $1 }'`
|
|
KERNEL_ADDR_R=`awk /kernel_addr_r/ ${COMMON_FILE} | awk -F '=' '{ print $2 }' | awk -F '\\' '{ print $1 }'`
|
|
RMADISK_ADDR_R=`awk /ramdisk_addr_r/ ${COMMON_FILE} | awk -F '=' '{ print $2 }' | awk -F '\\' '{ print $1 }'`
|
|
sed -i "s/${FDT_ADDR_PLACEHOLDER}/${FDT_ADDR_R}/g" ${ITS_RECOVERY}
|
|
sed -i "s/${KERNEL_ADDR_PLACEHOLDER}/${KERNEL_ADDR_R}/g" ${ITS_RECOVERY}
|
|
sed -i "s/${RAMDISK_ADDR_PLACEHOLDER}/${RMADISK_ADDR_R}/g" ${ITS_RECOVERY}
|
|
if grep -q '^CONFIG_ARM64=y' .config ; then
|
|
sed -i 's/arch = "arm";/arch = "arm64";/g' ${ITS_RECOVERY}
|
|
fi
|
|
|
|
if [ "${ARG_ROLLBACK_PROTECT}" == "y" ]; then
|
|
VERSION=`grep 'rollback-index' ${ITS_RECOVERY} | awk -F '=' '{ printf $2 }' | tr -d ' '`
|
|
sed -i "s/rollback-index = ${VERSION}/rollback-index = <${ARG_ROLLBACK_IDX_RECOVERY}>;/g" ${ITS_RECOVERY}
|
|
fi
|
|
|
|
${MKIMAGE} -f ${ITS_RECOVERY} -k ${KEY_DIR} -K ${UBOOT_DTB} -E -p ${OFFS_S_RECOVERY} -r ${ITB_RECOVERY} -v ${ARG_VER_RECOVERY}
|
|
mv ${SIG_BIN} ${SIG_RECOVERY}
|
|
|
|
# rollback-index read back check
|
|
if [ "${ARG_ROLLBACK_PROTECT}" == "y" ]; then
|
|
VERSION=`fdtget -ti ${ITB_RECOVERY} /configurations/conf rollback-index`
|
|
if [ "${VERSION}" != "${ARG_ROLLBACK_IDX_RECOVERY}" ]; then
|
|
echo "ERROR: Failed to set rollback-index for ${ITB_RECOVERY}";
|
|
exit 1
|
|
fi
|
|
fi
|
|
|
|
# host check signature
|
|
if [ "${ARG_NO_CHECK}" != "y" ]; then
|
|
${CHECK_SIGN} -f ${ITB_RECOVERY} -k ${UBOOT_DTB}
|
|
fi
|
|
|
|
# minimize u-boot.dtb: clearn as 0 but not remove property.
|
|
if grep -q '^CONFIG_FIT_HW_CRYPTO=y' .config ; then
|
|
fdtput -tx ${UBOOT_DTB} ${SIGNATURE_KEY_NODE} rsa,r-squared 0x0
|
|
if grep -q '^CONFIG_ROCKCHIP_CRYPTO_V1=y' .config ; then
|
|
fdtput -tx ${UBOOT_DTB} ${SIGNATURE_KEY_NODE} rsa,np 0x0
|
|
else
|
|
fdtput -tx ${UBOOT_DTB} ${SIGNATURE_KEY_NODE} rsa,c 0x0
|
|
fi
|
|
else
|
|
fdtput -tx ${UBOOT_DTB} ${SIGNATURE_KEY_NODE} rsa,c 0x0
|
|
fdtput -tx ${UBOOT_DTB} ${SIGNATURE_KEY_NODE} rsa,np 0x0
|
|
fdtput -tx ${UBOOT_DTB} ${SIGNATURE_KEY_NODE} rsa,exponent-BN 0x0
|
|
fi
|
|
fdtput -r ${UBOOT_DTB} ${SIGNATURE_KEY_NODE}/hash@c
|
|
fdtput -r ${UBOOT_DTB} ${SIGNATURE_KEY_NODE}/hash@np
|
|
fi
|
|
|
|
mv ${ITS_RECOVERY} ${FIT_DIR}
|
|
}
|
|
|
|
function fit_gen_uboot_img()
|
|
{
|
|
ITB=$1
|
|
|
|
if [ -z ${ITB} ]; then
|
|
ITB=${ITB_UBOOT}
|
|
fi
|
|
|
|
ITB_MAX_NUM=`sed -n "/SPL_FIT_IMAGE_MULTIPLE/p" .config | awk -F "=" '{ print $2 }'`
|
|
ITB_MAX_KB=`sed -n "/SPL_FIT_IMAGE_KB/p" .config | awk -F "=" '{ print $2 }'`
|
|
ITB_MAX_BS=$((ITB_MAX_KB*1024))
|
|
ITB_BS=`ls -l ${ITB} | awk '{ print $5 }'`
|
|
|
|
if [ ${ITB_BS} -gt ${ITB_MAX_BS} ]; then
|
|
echo "ERROR: pack ${IMG_UBOOT} failed! ${ITB} actual: ${ITB_BS} bytes, max limit: ${ITB_MAX_BS} bytes"
|
|
exit 1
|
|
fi
|
|
|
|
rm -f ${IMG_UBOOT}
|
|
for ((i = 0; i < ${ITB_MAX_NUM}; i++));
|
|
do
|
|
cat ${ITB} >> ${IMG_UBOOT}
|
|
truncate -s %${ITB_MAX_KB}K ${IMG_UBOOT}
|
|
done
|
|
}
|
|
|
|
function fit_gen_boot_img()
|
|
{
|
|
ITB=$1
|
|
|
|
if [ -z ${ITB} ]; then
|
|
ITB=${ITB_BOOT}
|
|
fi
|
|
|
|
if [ "${ITB}" != "${IMG_BOOT}" ]; then
|
|
cp ${ITB} ${IMG_BOOT} -f
|
|
fi
|
|
}
|
|
|
|
function fit_gen_recovery_img()
|
|
{
|
|
ITB=$1
|
|
|
|
if [ -z ${ITB} ]; then
|
|
ITB=${ITB_RECOVERY}
|
|
fi
|
|
|
|
if [ "${ITB}" != "${IMG_RECOVERY}" ]; then
|
|
cp ${ITB} ${IMG_RECOVERY} -f
|
|
fi
|
|
}
|
|
|
|
function fit_msg_uboot()
|
|
{
|
|
if [ "${ARG_SIGN}" != "y" ]; then
|
|
MSG_SIGN="no-signed"
|
|
else
|
|
MSG_SIGN="signed"
|
|
fi
|
|
|
|
VERSION=`fdtget -ti ${ITB_UBOOT} / version`
|
|
if [ "${VERSION}" != "" ]; then
|
|
MSG_VER=", version=${VERSION}"
|
|
fi
|
|
|
|
if [ "${ARG_SPL_ROLLBACK_PROTECT}" == "y" ]; then
|
|
echo "Image(${MSG_SIGN}${MSG_VER}, rollback-index=${ARG_ROLLBACK_IDX_UBOOT}): ${IMG_UBOOT} (with uboot, trust...) is ready"
|
|
else
|
|
echo "Image(${MSG_SIGN}${MSG_VER}): ${IMG_UBOOT} (FIT with uboot, trust...) is ready"
|
|
fi
|
|
}
|
|
|
|
function fit_msg_boot()
|
|
{
|
|
if [ -z "${ARG_BOOT_IMG}" ]; then
|
|
return;
|
|
fi
|
|
|
|
if [ "${ARG_SIGN}" != "y" ]; then
|
|
MSG_SIGN="no-signed"
|
|
else
|
|
MSG_SIGN="signed"
|
|
fi
|
|
|
|
VERSION=`fdtget -ti ${ITB_BOOT} / version`
|
|
if [ "${VERSION}" != "" ]; then
|
|
MSG_VER=", version=${VERSION}"
|
|
fi
|
|
|
|
if [ "${ARG_ROLLBACK_PROTECT}" == "y" ]; then
|
|
echo "Image(${MSG_SIGN}${MSG_VER}, rollback-index=${ARG_ROLLBACK_IDX_BOOT}): ${IMG_BOOT} is ready"
|
|
else
|
|
echo "Image(${MSG_SIGN}${MSG_VER}): ${IMG_BOOT} (FIT with kernel, fdt, resource...) is ready"
|
|
fi
|
|
}
|
|
|
|
function fit_msg_recovery()
|
|
{
|
|
if [ -z "${ARG_RECOVERY_IMG}" ]; then
|
|
return;
|
|
fi
|
|
|
|
if [ "${ARG_SIGN}" != "y" ]; then
|
|
MSG_SIGN="no-signed"
|
|
else
|
|
MSG_SIGN="signed"
|
|
fi
|
|
|
|
VERSION=`fdtget -ti ${ITB_RECOVERY} / version`
|
|
if [ "${VERSION}" != "" ]; then
|
|
MSG_VER=", version=${VERSION}"
|
|
fi
|
|
|
|
if [ "${ARG_ROLLBACK_PROTECT}" == "y" ]; then
|
|
echo "Image(${MSG_SIGN}${MSG_VER}, rollback-index=${ARG_ROLLBACK_IDX_RECOVERY}): ${IMG_RECOVERY} is ready"
|
|
else
|
|
echo "Image(${MSG_SIGN}${MSG_VER}): ${IMG_RECOVERY} (FIT with kernel, fdt, resource...) is ready"
|
|
fi
|
|
}
|
|
|
|
function fit_msg_loader()
|
|
{
|
|
LOADER=`ls *loader*.bin`
|
|
echo "Image(no-signed): ${LOADER} (with spl, ddr, usbplug) is ready"
|
|
}
|
|
|
|
fit_process_args $*
|
|
|
|
if [ ! -z "${ARG_VALIDATE}" ]; then
|
|
validate_arg ${ARG_VALIDATE}
|
|
else
|
|
fit_raw_compile
|
|
if [ ! -z "${ARG_RECOVERY_IMG}" ]; then
|
|
fit_gen_recovery_itb
|
|
fit_gen_recovery_img
|
|
fi
|
|
# "--boot_img_dir" is for U-Boot debug only
|
|
if [ ! -z "${ARG_BOOT_IMG}" -o ! -z "${ARG_BOOT_IMG_DIR}" ]; then
|
|
fit_gen_boot_itb
|
|
fit_gen_boot_img
|
|
fi
|
|
fit_gen_uboot_itb
|
|
fit_gen_uboot_img
|
|
|
|
echo
|
|
fit_msg_uboot
|
|
fit_msg_recovery
|
|
fit_msg_boot
|
|
fit_msg_loader
|
|
fi
|