blob: 744b1c20aa83f2f4743975dfdd132c40c5ab9c51 [file] [log] [blame]
Tom Rini83d290c2018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02002/*
3 * Copyright (C) 2016 Marvell International Ltd.
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02004 * https://spdx.org/licenses
5 */
6
7#include <config.h>
8#include <common.h>
9#include <command.h>
Simon Glass7b51b572019-08-01 09:46:52 -060010#include <env.h>
Simon Glass8e8ccfe2019-12-28 10:45:03 -070011#include <image.h>
Simon Glass90526e92020-05-10 11:39:56 -060012#include <net.h>
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +020013#include <vsprintf.h>
14#include <errno.h>
15#include <dm.h>
Pali Rohárf7b0bbc2022-08-23 14:52:24 +020016#include <fuse.h>
17#include <mach/efuse.h>
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +020018
19#include <spi_flash.h>
20#include <spi.h>
21#include <nand.h>
Pali Rohárc8f50092023-01-22 01:25:12 +010022#include <scsi.h>
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +020023#include <usb.h>
24#include <fs.h>
25#include <mmc.h>
Konstantin Porotchkine559ef12017-01-08 16:52:06 +020026#ifdef CONFIG_BLK
27#include <blk.h>
28#endif
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +020029#include <u-boot/sha1.h>
30#include <u-boot/sha256.h>
Pali Rohár93c13582022-07-26 16:11:58 +020031#include <u-boot/sha512.h>
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +020032
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +020033#if defined(CONFIG_ARMADA_8K)
34#define MAIN_HDR_MAGIC 0xB105B002
35
36struct mvebu_image_header {
37 u32 magic; /* 0-3 */
38 u32 prolog_size; /* 4-7 */
39 u32 prolog_checksum; /* 8-11 */
40 u32 boot_image_size; /* 12-15 */
41 u32 boot_image_checksum; /* 16-19 */
42 u32 rsrvd0; /* 20-23 */
43 u32 load_addr; /* 24-27 */
44 u32 exec_addr; /* 28-31 */
45 u8 uart_cfg; /* 32 */
46 u8 baudrate; /* 33 */
47 u8 ext_count; /* 34 */
48 u8 aux_flags; /* 35 */
49 u32 io_arg_0; /* 36-39 */
50 u32 io_arg_1; /* 40-43 */
51 u32 io_arg_2; /* 43-47 */
52 u32 io_arg_3; /* 48-51 */
53 u32 rsrvd1; /* 52-55 */
54 u32 rsrvd2; /* 56-59 */
55 u32 rsrvd3; /* 60-63 */
56};
57#elif defined(CONFIG_ARMADA_3700) /* A3700 */
58#define HASH_SUM_LEN 16
59#define IMAGE_VERSION_3_6_0 0x030600
60#define IMAGE_VERSION_3_5_0 0x030500
61
Pali Rohár5d2f7d32022-07-26 16:11:56 +020062struct tim_boot_flash_sign {
63 unsigned int id;
64 const char *name;
65};
66
67struct tim_boot_flash_sign tim_boot_flash_signs[] = {
68 { 0x454d4d08, "mmc" },
69 { 0x454d4d0b, "mmc" },
70 { 0x5350490a, "spi" },
71 { 0x5350491a, "nand" },
72 { 0x55415223, "uart" },
73 { 0x53415432, "sata" },
74 {},
75};
76
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +020077struct common_tim_data {
78 u32 version;
79 u32 identifier;
80 u32 trusted;
81 u32 issue_date;
82 u32 oem_unique_id;
83 u32 reserved[5]; /* Reserve 20 bytes */
84 u32 boot_flash_sign;
85 u32 num_images;
86 u32 num_keys;
87 u32 size_of_reserved;
88};
89
90struct mvebu_image_info {
91 u32 image_id;
92 u32 next_image_id;
93 u32 flash_entry_addr;
94 u32 load_addr;
95 u32 image_size;
96 u32 image_size_to_hash;
97 u32 hash_algorithm_id;
98 u32 hash[HASH_SUM_LEN]; /* Reserve 512 bits for the hash */
99 u32 partition_number;
100 u32 enc_algorithm_id;
101 u32 encrypt_start_offset;
102 u32 encrypt_size;
103};
Pali Rohár5d2f7d32022-07-26 16:11:56 +0200104#elif defined(CONFIG_ARMADA_32BIT)
Joel Johnson8ec6db72020-04-17 09:38:04 -0600105
Pali Rohár7af368f2021-10-22 12:41:10 +0200106/* Structure of the main header, version 1 (Armada 370/XP/375/38x/39x) */
Joel Johnson8ec6db72020-04-17 09:38:04 -0600107struct a38x_main_hdr_v1 {
108 u8 blockid; /* 0x0 */
109 u8 flags; /* 0x1 */
Pali Rohár33cdd9e2021-10-22 12:37:48 +0200110 u16 nandpagesize; /* 0x2-0x3 */
Joel Johnson8ec6db72020-04-17 09:38:04 -0600111 u32 blocksize; /* 0x4-0x7 */
112 u8 version; /* 0x8 */
113 u8 headersz_msb; /* 0x9 */
114 u16 headersz_lsb; /* 0xA-0xB */
115 u32 srcaddr; /* 0xC-0xF */
116 u32 destaddr; /* 0x10-0x13 */
117 u32 execaddr; /* 0x14-0x17 */
118 u8 options; /* 0x18 */
119 u8 nandblocksize; /* 0x19 */
120 u8 nandbadblklocation; /* 0x1A */
121 u8 reserved4; /* 0x1B */
122 u16 reserved5; /* 0x1C-0x1D */
123 u8 ext; /* 0x1E */
124 u8 checksum; /* 0x1F */
125};
Joel Johnson658854a2020-04-17 09:38:06 -0600126
Pali Rohárf7b0bbc2022-08-23 14:52:24 +0200127/*
128 * Header for the optional headers, version 1 (Armada 370/XP/375/38x/39x)
129 */
130struct a38x_opt_hdr_v1 {
131 u8 headertype;
132 u8 headersz_msb;
133 u16 headersz_lsb;
134 u8 data[0];
135};
136#define A38X_OPT_HDR_V1_SECURE_TYPE 0x1
137
Joel Johnson658854a2020-04-17 09:38:06 -0600138struct a38x_boot_mode {
139 unsigned int id;
140 const char *name;
141};
142
143/* The blockid header field values used to indicate boot device of image */
144struct a38x_boot_mode a38x_boot_modes[] = {
145 { 0x4D, "i2c" },
146 { 0x5A, "spi" },
147 { 0x69, "uart" },
148 { 0x78, "sata" },
149 { 0x8B, "nand" },
150 { 0x9C, "pex" },
151 { 0xAE, "mmc" },
152 {},
153};
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200154
Pali Rohár5d2f7d32022-07-26 16:11:56 +0200155#endif
156
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200157struct bubt_dev {
158 char name[8];
159 size_t (*read)(const char *file_name);
160 int (*write)(size_t image_size);
161 int (*active)(void);
162};
163
164static ulong get_load_addr(void)
165{
166 const char *addr_str;
167 unsigned long addr;
168
Simon Glass00caae62017-08-03 12:22:12 -0600169 addr_str = env_get("loadaddr");
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200170 if (addr_str)
Simon Glass7e5f4602021-07-24 09:03:29 -0600171 addr = hextoul(addr_str, NULL);
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200172 else
173 addr = CONFIG_SYS_LOAD_ADDR;
174
175 return addr;
176}
177
178/********************************************************************
179 * eMMC services
180 ********************************************************************/
Jean-Jacques Hiblotd6400c32018-01-04 15:23:32 +0100181#if CONFIG_IS_ENABLED(DM_MMC) && CONFIG_IS_ENABLED(MMC_WRITE)
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200182static int mmc_burn_image(size_t image_size)
183{
184 struct mmc *mmc;
185 lbaint_t start_lba;
186 lbaint_t blk_count;
187 ulong blk_written;
188 int err;
189 const u8 mmc_dev_num = CONFIG_SYS_MMC_ENV_DEV;
Konstantin Porotchkine559ef12017-01-08 16:52:06 +0200190#ifdef CONFIG_BLK
191 struct blk_desc *blk_desc;
192#endif
Pali Rohárfc10a922023-01-21 22:58:28 +0100193#ifdef CONFIG_SUPPORT_EMMC_BOOT
194 u8 part;
195 u8 orig_part;
196#endif
197
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200198 mmc = find_mmc_device(mmc_dev_num);
199 if (!mmc) {
200 printf("No SD/MMC/eMMC card found\n");
201 return -ENOMEDIUM;
202 }
203
204 err = mmc_init(mmc);
205 if (err) {
206 printf("%s(%d) init failed\n", IS_SD(mmc) ? "SD" : "MMC",
207 mmc_dev_num);
208 return err;
209 }
210
Pali Rohárfc10a922023-01-21 22:58:28 +0100211#ifdef CONFIG_BLK
212 blk_desc = mmc_get_blk_desc(mmc);
213 if (!blk_desc) {
214 printf("Error - failed to obtain block descriptor\n");
215 return -ENODEV;
216 }
217#endif
218
219#ifdef CONFIG_SUPPORT_EMMC_BOOT
220#ifdef CONFIG_BLK
221 orig_part = blk_desc->hwpart;
222#else
223 orig_part = mmc->block_dev.hwpart;
224#endif
225
Pali Rohár8b882062023-03-11 11:44:27 +0100226 part = EXT_CSD_EXTRACT_BOOT_PART(mmc->part_config);
Pali Rohárfc10a922023-01-21 22:58:28 +0100227 if (part == 7)
228 part = 0;
229
230#ifdef CONFIG_BLK
231 err = blk_dselect_hwpart(blk_desc, part);
232#else
233 err = mmc_switch_part(mmc, part);
234#endif
235
236 if (err) {
237 printf("Error - MMC partition switch failed\n");
238 return err;
239 }
240#endif
241
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200242 /* SD reserves LBA-0 for MBR and boots from LBA-1,
Josua Mayer3a80ec02023-10-25 10:22:54 +0200243 * MMC/eMMC boots from LBA-0 and LBA-4096
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200244 */
Josua Mayer3a80ec02023-10-25 10:22:54 +0200245 if (IS_SD(mmc))
246 start_lba = 1;
247#ifdef CONFIG_SUPPORT_EMMC_BOOT
248 else if (part)
249 start_lba = 0;
250#endif
251 else
252 start_lba = 4096;
Konstantin Porotchkine559ef12017-01-08 16:52:06 +0200253#ifdef CONFIG_BLK
254 blk_count = image_size / mmc->write_bl_len;
255 if (image_size % mmc->write_bl_len)
256 blk_count += 1;
257
Konstantin Porotchkine559ef12017-01-08 16:52:06 +0200258 blk_written = blk_dwrite(blk_desc, start_lba, blk_count,
259 (void *)get_load_addr());
260#else
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200261 blk_count = image_size / mmc->block_dev.blksz;
262 if (image_size % mmc->block_dev.blksz)
263 blk_count += 1;
264
265 blk_written = mmc->block_dev.block_write(mmc_dev_num,
Konstantin Porotchkine559ef12017-01-08 16:52:06 +0200266 start_lba, blk_count,
267 (void *)get_load_addr());
268#endif /* CONFIG_BLK */
Pali Rohárfc10a922023-01-21 22:58:28 +0100269
270#ifdef CONFIG_SUPPORT_EMMC_BOOT
271#ifdef CONFIG_BLK
272 err = blk_dselect_hwpart(blk_desc, orig_part);
273#else
274 err = mmc_switch_part(mmc, orig_part);
275#endif
276 if (err)
277 printf("Error - MMC failed to switch back to original partition\n");
278#endif
279
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200280 if (blk_written != blk_count) {
281 printf("Error - written %#lx blocks\n", blk_written);
282 return -ENOSPC;
283 }
284 printf("Done!\n");
285
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200286 return 0;
287}
288
289static size_t mmc_read_file(const char *file_name)
290{
291 loff_t act_read = 0;
292 int rc;
293 struct mmc *mmc;
294 const u8 mmc_dev_num = CONFIG_SYS_MMC_ENV_DEV;
295
296 mmc = find_mmc_device(mmc_dev_num);
297 if (!mmc) {
298 printf("No SD/MMC/eMMC card found\n");
299 return 0;
300 }
301
302 if (mmc_init(mmc)) {
303 printf("%s(%d) init failed\n", IS_SD(mmc) ? "SD" : "MMC",
304 mmc_dev_num);
305 return 0;
306 }
307
308 /* Load from data partition (0) */
309 if (fs_set_blk_dev("mmc", "0", FS_TYPE_ANY)) {
310 printf("Error: MMC 0 not found\n");
311 return 0;
312 }
313
314 /* Perfrom file read */
315 rc = fs_read(file_name, get_load_addr(), 0, 0, &act_read);
316 if (rc)
317 return 0;
318
319 return act_read;
320}
321
322static int is_mmc_active(void)
323{
324 return 1;
325}
326#else /* CONFIG_DM_MMC */
327static int mmc_burn_image(size_t image_size)
328{
329 return -ENODEV;
330}
331
332static size_t mmc_read_file(const char *file_name)
333{
334 return 0;
335}
336
337static int is_mmc_active(void)
338{
339 return 0;
340}
341#endif /* CONFIG_DM_MMC */
342
343/********************************************************************
Pali Rohárc8f50092023-01-22 01:25:12 +0100344 * SATA services
345 ********************************************************************/
346#if defined(CONFIG_SCSI) && defined(CONFIG_BLK)
347static int sata_burn_image(size_t image_size)
348{
349#if defined(CONFIG_ARMADA_3700) || defined(CONFIG_ARMADA_32BIT)
350 lbaint_t start_lba;
351 lbaint_t blk_count;
352 ulong blk_written;
353 struct blk_desc *blk_desc;
354#ifdef CONFIG_ARMADA_3700
355 struct disk_partition info;
356 int part;
357#endif
358
359 scsi_scan(false);
360
361 blk_desc = blk_get_devnum_by_uclass_id(UCLASS_SCSI, 0);
362 if (!blk_desc)
363 return -ENODEV;
364
365#ifdef CONFIG_ARMADA_3700
366 /*
367 * 64-bit Armada 3700 BootROM loads SATA firmware from
368 * GPT 'Marvell Armada 3700 Boot partition' or from
369 * MBR 'M' (0x4d) partition.
370 */
371 switch (blk_desc->part_type) {
372 case PART_TYPE_DOS:
373 for (part = 1; part <= 4; part++) {
374 info.sys_ind = 0;
375 if (part_get_info(blk_desc, part, &info))
376 continue;
377 if (info.sys_ind == 'M')
378 break;
379 }
380 if (part > 4) {
381 printf("Error - cannot find MBR 'M' (0x4d) partition on SATA disk\n");
382 return -ENODEV;
383 }
384 start_lba = info.start;
385 break;
386 case PART_TYPE_EFI:
387 for (part = 1; part <= 64; part++) {
388 info.type_guid[0] = 0;
389 if (part_get_info(blk_desc, part, &info))
390 continue;
391 /* Check for GPT type GUID of 'Marvell Armada 3700 Boot partition' */
392 if (strcmp(info.type_guid, "6828311A-BA55-42A4-BCDE-A89BB5EDECAE") == 0)
393 break;
394 }
395 if (part > 64) {
396 printf("Error - cannot find GPT 'Marvell Armada 3700 Boot partition' on SATA disk\n");
397 return -ENODEV;
398 }
399 start_lba = info.start;
400 break;
401 default:
402 printf("Error - no partitions on SATA disk\n");
403 return -ENODEV;
404 }
405#else
406 /* 32-bit Armada BootROM loads SATA firmware from the sector 1. */
407 start_lba = 1;
408#endif
409
410 blk_count = image_size / blk_desc->blksz;
411 if (image_size % blk_desc->blksz)
412 blk_count += 1;
413
414 blk_written = blk_dwrite(blk_desc, start_lba, blk_count,
415 (void *)get_load_addr());
416
417 if (blk_written != blk_count) {
418 printf("Error - written %#lx blocks\n", blk_written);
419 return -ENOSPC;
420 }
421
422 printf("Done!\n");
423 return 0;
424#else
425 return -ENODEV;
426#endif
427}
428
Pali Rohár4bf91e22023-01-21 23:29:36 +0100429static size_t sata_read_file(const char *file_name)
430{
431 loff_t act_read = 0;
432 struct udevice *dev;
433 int rc;
434
435 /* try to recognize storage devices immediately */
436 scsi_scan(false);
437
438 /* Try to recognize storage devices immediately */
439 blk_first_device(UCLASS_SCSI, &dev);
440 if (!dev) {
441 printf("Error: SATA device not found\n");
442 return 0;
443 }
444
445 /* Always load from scsi 0 */
446 if (fs_set_blk_dev("scsi", "0", FS_TYPE_ANY)) {
447 printf("Error: SATA 0 not found\n");
448 return 0;
449 }
450
451 /* Perfrom file read */
452 rc = fs_read(file_name, get_load_addr(), 0, 0, &act_read);
453 if (rc)
454 return 0;
455
456 return act_read;
457}
458
Pali Rohárc8f50092023-01-22 01:25:12 +0100459static int is_sata_active(void)
460{
461 return 1;
462}
463#else /* CONFIG_SCSI */
464static int sata_burn_image(size_t image_size)
465{
466 return -ENODEV;
467}
468
Pali Rohár4bf91e22023-01-21 23:29:36 +0100469static size_t sata_read_file(const char *file_name)
470{
471 return 0;
472}
473
Pali Rohárc8f50092023-01-22 01:25:12 +0100474static int is_sata_active(void)
475{
476 return 0;
477}
478#endif /* CONFIG_SCSI */
479
480/********************************************************************
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200481 * SPI services
482 ********************************************************************/
483#ifdef CONFIG_SPI_FLASH
484static int spi_burn_image(size_t image_size)
485{
486 int ret;
487 struct spi_flash *flash;
488 u32 erase_bytes;
489
490 /* Probe the SPI bus to get the flash device */
Tom Rini7e6a6fd2021-12-11 14:55:48 -0500491 flash = spi_flash_probe(CONFIG_SF_DEFAULT_BUS,
492 CONFIG_SF_DEFAULT_CS,
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200493 CONFIG_SF_DEFAULT_SPEED,
494 CONFIG_SF_DEFAULT_MODE);
495 if (!flash) {
496 printf("Failed to probe SPI Flash\n");
497 return -ENOMEDIUM;
498 }
499
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200500 erase_bytes = image_size +
501 (flash->erase_size - image_size % flash->erase_size);
502 printf("Erasing %d bytes (%d blocks) at offset 0 ...",
503 erase_bytes, erase_bytes / flash->erase_size);
504 ret = spi_flash_erase(flash, 0, erase_bytes);
505 if (ret)
506 printf("Error!\n");
507 else
508 printf("Done!\n");
509
510 printf("Writing %d bytes from 0x%lx to offset 0 ...",
511 (int)image_size, get_load_addr());
512 ret = spi_flash_write(flash, 0, image_size, (void *)get_load_addr());
513 if (ret)
514 printf("Error!\n");
515 else
516 printf("Done!\n");
517
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200518 return ret;
519}
520
521static int is_spi_active(void)
522{
523 return 1;
524}
525
526#else /* CONFIG_SPI_FLASH */
527static int spi_burn_image(size_t image_size)
528{
529 return -ENODEV;
530}
531
532static int is_spi_active(void)
533{
534 return 0;
535}
536#endif /* CONFIG_SPI_FLASH */
537
538/********************************************************************
539 * NAND services
540 ********************************************************************/
541#ifdef CONFIG_CMD_NAND
542static int nand_burn_image(size_t image_size)
543{
Konstantin Porotchkinf2ca24d2017-03-28 18:16:56 +0300544 int ret;
545 uint32_t block_size;
Grygorii Strashko7021c7e2017-06-26 19:13:02 -0500546 struct mtd_info *mtd;
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200547
Grygorii Strashko7021c7e2017-06-26 19:13:02 -0500548 mtd = get_nand_dev_by_index(nand_curr_device);
549 if (!mtd) {
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200550 puts("\nno devices available\n");
551 return -ENOMEDIUM;
552 }
Grygorii Strashko7021c7e2017-06-26 19:13:02 -0500553 block_size = mtd->erasesize;
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200554
555 /* Align U-Boot size to currently used blocksize */
556 image_size = ((image_size + (block_size - 1)) & (~(block_size - 1)));
557
Joel Johnsonf41b85e2020-04-17 09:38:05 -0600558 /* Erase the U-Boot image space */
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200559 printf("Erasing 0x%x - 0x%x:...", 0, (int)image_size);
Grygorii Strashko7021c7e2017-06-26 19:13:02 -0500560 ret = nand_erase(mtd, 0, image_size);
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200561 if (ret) {
562 printf("Error!\n");
563 goto error;
564 }
565 printf("Done!\n");
566
567 /* Write the image to flash */
Konstantin Porotchkinf2ca24d2017-03-28 18:16:56 +0300568 printf("Writing %d bytes from 0x%lx to offset 0 ... ",
569 (int)image_size, get_load_addr());
Grygorii Strashko7021c7e2017-06-26 19:13:02 -0500570 ret = nand_write(mtd, 0, &image_size, (void *)get_load_addr());
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200571 if (ret)
572 printf("Error!\n");
573 else
574 printf("Done!\n");
575
576error:
577 return ret;
578}
579
580static int is_nand_active(void)
581{
582 return 1;
583}
584
585#else /* CONFIG_CMD_NAND */
586static int nand_burn_image(size_t image_size)
587{
588 return -ENODEV;
589}
590
591static int is_nand_active(void)
592{
593 return 0;
594}
595#endif /* CONFIG_CMD_NAND */
596
597/********************************************************************
598 * USB services
599 ********************************************************************/
600#if defined(CONFIG_USB_STORAGE) && defined(CONFIG_BLK)
601static size_t usb_read_file(const char *file_name)
602{
603 loff_t act_read = 0;
604 struct udevice *dev;
605 int rc;
606
607 usb_stop();
608
609 if (usb_init() < 0) {
610 printf("Error: usb_init failed\n");
611 return 0;
612 }
613
614 /* Try to recognize storage devices immediately */
Simon Glasse33a5c62022-08-11 19:34:59 -0600615 blk_first_device(UCLASS_USB, &dev);
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200616 if (!dev) {
617 printf("Error: USB storage device not found\n");
618 return 0;
619 }
620
621 /* Always load from usb 0 */
622 if (fs_set_blk_dev("usb", "0", FS_TYPE_ANY)) {
623 printf("Error: USB 0 not found\n");
624 return 0;
625 }
626
627 /* Perfrom file read */
628 rc = fs_read(file_name, get_load_addr(), 0, 0, &act_read);
629 if (rc)
630 return 0;
631
632 return act_read;
633}
634
635static int is_usb_active(void)
636{
637 return 1;
638}
639
640#else /* defined(CONFIG_USB_STORAGE) && defined (CONFIG_BLK) */
641static size_t usb_read_file(const char *file_name)
642{
643 return 0;
644}
645
646static int is_usb_active(void)
647{
648 return 0;
649}
650#endif /* defined(CONFIG_USB_STORAGE) && defined (CONFIG_BLK) */
651
652/********************************************************************
653 * Network services
654 ********************************************************************/
655#ifdef CONFIG_CMD_NET
656static size_t tftp_read_file(const char *file_name)
657{
Pali Rohár4b9521f2022-07-26 16:11:57 +0200658 int ret;
659
Simon Glassbb872dd2019-12-28 10:45:02 -0700660 /*
661 * update global variable image_load_addr before tftp file from network
662 */
663 image_load_addr = get_load_addr();
Pali Rohár4b9521f2022-07-26 16:11:57 +0200664 ret = net_loop(TFTPGET);
665 return ret > 0 ? ret : 0;
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200666}
667
668static int is_tftp_active(void)
669{
670 return 1;
671}
672
673#else
674static size_t tftp_read_file(const char *file_name)
675{
676 return 0;
677}
678
679static int is_tftp_active(void)
680{
681 return 0;
682}
683#endif /* CONFIG_CMD_NET */
684
685enum bubt_devices {
686 BUBT_DEV_NET = 0,
687 BUBT_DEV_USB,
688 BUBT_DEV_MMC,
Pali Rohárc8f50092023-01-22 01:25:12 +0100689 BUBT_DEV_SATA,
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200690 BUBT_DEV_SPI,
691 BUBT_DEV_NAND,
692
693 BUBT_MAX_DEV
694};
695
Pali Rohár40e3204c2023-01-10 22:47:17 +0100696static struct bubt_dev bubt_devs[BUBT_MAX_DEV] = {
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200697 {"tftp", tftp_read_file, NULL, is_tftp_active},
698 {"usb", usb_read_file, NULL, is_usb_active},
699 {"mmc", mmc_read_file, mmc_burn_image, is_mmc_active},
Pali Rohár4bf91e22023-01-21 23:29:36 +0100700 {"sata", sata_read_file, sata_burn_image, is_sata_active},
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200701 {"spi", NULL, spi_burn_image, is_spi_active},
702 {"nand", NULL, nand_burn_image, is_nand_active},
703};
704
705static int bubt_write_file(struct bubt_dev *dst, size_t image_size)
706{
707 if (!dst->write) {
708 printf("Error: Write not supported on device %s\n", dst->name);
709 return -ENOTSUPP;
710 }
711
712 return dst->write(image_size);
713}
714
715#if defined(CONFIG_ARMADA_8K)
Pali Rohár40e3204c2023-01-10 22:47:17 +0100716static u32 do_checksum32(u32 *start, int32_t len)
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200717{
718 u32 sum = 0;
719 u32 *startp = start;
720
721 do {
722 sum += *startp;
723 startp++;
724 len -= 4;
725 } while (len > 0);
726
727 return sum;
728}
729
730static int check_image_header(void)
731{
732 struct mvebu_image_header *hdr =
733 (struct mvebu_image_header *)get_load_addr();
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200734 u32 checksum;
Pali Rohárf5860c52023-01-29 18:49:04 +0100735 u32 checksum_ref;
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200736
737 /*
738 * For now compare checksum, and magic. Later we can
739 * verify more stuff on the header like interface type, etc
740 */
741 if (hdr->magic != MAIN_HDR_MAGIC) {
742 printf("ERROR: Bad MAGIC 0x%08x != 0x%08x\n",
743 hdr->magic, MAIN_HDR_MAGIC);
744 return -ENOEXEC;
745 }
746
Pali Rohárf5860c52023-01-29 18:49:04 +0100747 checksum_ref = hdr->prolog_checksum;
748 checksum = do_checksum32((u32 *)hdr, hdr->prolog_size);
Pali Rohár7d9c0832023-01-29 18:38:11 +0100749 checksum -= hdr->prolog_checksum;
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200750 if (checksum != checksum_ref) {
Pali Rohárf5860c52023-01-29 18:49:04 +0100751 printf("Error: Bad Prolog checksum. 0x%x != 0x%x\n",
752 checksum, checksum_ref);
753 return -ENOEXEC;
754 }
755
756 checksum_ref = hdr->boot_image_checksum;
757 checksum = do_checksum32((u32 *)((u8 *)hdr + hdr->prolog_size), hdr->boot_image_size);
758 if (checksum != checksum_ref) {
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200759 printf("Error: Bad Image checksum. 0x%x != 0x%x\n",
760 checksum, checksum_ref);
761 return -ENOEXEC;
762 }
763
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200764 printf("Image checksum...OK!\n");
765
766 return 0;
767}
768#elif defined(CONFIG_ARMADA_3700) /* Armada 3700 */
769static int check_image_header(void)
770{
771 struct common_tim_data *hdr = (struct common_tim_data *)get_load_addr();
772 int image_num;
773 u8 hash_160_output[SHA1_SUM_LEN];
774 u8 hash_256_output[SHA256_SUM_LEN];
Pali Rohár93c13582022-07-26 16:11:58 +0200775 u8 hash_512_output[SHA512_SUM_LEN];
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200776 sha1_context hash1_text;
777 sha256_context hash256_text;
Pali Rohár93c13582022-07-26 16:11:58 +0200778 sha512_context hash512_text;
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200779 u8 *hash_output;
780 u32 hash_algorithm_id;
781 u32 image_size_to_hash;
782 u32 flash_entry_addr;
783 u32 *hash_value;
784 u32 internal_hash[HASH_SUM_LEN];
785 const u8 *buff;
786 u32 num_of_image = hdr->num_images;
787 u32 version = hdr->version;
788 u32 trusted = hdr->trusted;
789
790 /* bubt checksum validation only supports nontrusted images */
791 if (trusted == 1) {
792 printf("bypass image validation, ");
793 printf("only untrusted image is supported now\n");
794 return 0;
795 }
796 /* only supports image version 3.5 and 3.6 */
797 if (version != IMAGE_VERSION_3_5_0 && version != IMAGE_VERSION_3_6_0) {
798 printf("Error: Unsupported Image version = 0x%08x\n", version);
799 return -ENOEXEC;
800 }
801 /* validate images hash value */
802 for (image_num = 0; image_num < num_of_image; image_num++) {
803 struct mvebu_image_info *info =
804 (struct mvebu_image_info *)(get_load_addr() +
805 sizeof(struct common_tim_data) +
806 image_num * sizeof(struct mvebu_image_info));
807 hash_algorithm_id = info->hash_algorithm_id;
808 image_size_to_hash = info->image_size_to_hash;
809 flash_entry_addr = info->flash_entry_addr;
810 hash_value = info->hash;
811 buff = (const u8 *)(get_load_addr() + flash_entry_addr);
812
813 if (image_num == 0) {
814 /*
815 * The first image includes hash values in its content.
816 * For hash calculation, we need to save the original
817 * hash values to a local variable that will be
818 * copied back for comparsion and set all zeros to
819 * the orignal hash values for calculating new value.
820 * First image original format :
821 * x...x (datum1) x...x(orig. hash values) x...x(datum2)
822 * Replaced first image format :
823 * x...x (datum1) 0...0(hash values) x...x(datum2)
824 */
825 memcpy(internal_hash, hash_value,
826 sizeof(internal_hash));
827 memset(hash_value, 0, sizeof(internal_hash));
828 }
829 if (image_size_to_hash == 0) {
830 printf("Warning: Image_%d hash checksum is disabled, ",
831 image_num);
832 printf("skip the image validation.\n");
833 continue;
834 }
835 switch (hash_algorithm_id) {
836 case SHA1_SUM_LEN:
837 sha1_starts(&hash1_text);
838 sha1_update(&hash1_text, buff, image_size_to_hash);
839 sha1_finish(&hash1_text, hash_160_output);
840 hash_output = hash_160_output;
841 break;
842 case SHA256_SUM_LEN:
843 sha256_starts(&hash256_text);
844 sha256_update(&hash256_text, buff, image_size_to_hash);
845 sha256_finish(&hash256_text, hash_256_output);
846 hash_output = hash_256_output;
847 break;
Pali Rohár93c13582022-07-26 16:11:58 +0200848 case SHA512_SUM_LEN:
849 sha512_starts(&hash512_text);
850 sha512_update(&hash512_text, buff, image_size_to_hash);
851 sha512_finish(&hash512_text, hash_512_output);
852 hash_output = hash_512_output;
853 break;
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200854 default:
855 printf("Error: Unsupported hash_algorithm_id = %d\n",
856 hash_algorithm_id);
857 return -ENOEXEC;
858 }
859 if (image_num == 0)
860 memcpy(hash_value, internal_hash,
861 sizeof(internal_hash));
862 if (memcmp(hash_value, hash_output, hash_algorithm_id) != 0) {
863 printf("Error: Image_%d checksum is not correct\n",
864 image_num);
865 return -ENOEXEC;
866 }
867 }
868 printf("Image checksum...OK!\n");
869
870 return 0;
871}
Pali Rohár5d2f7d32022-07-26 16:11:56 +0200872#elif defined(CONFIG_ARMADA_32BIT)
Joel Johnson8ec6db72020-04-17 09:38:04 -0600873static size_t a38x_header_size(const struct a38x_main_hdr_v1 *h)
874{
875 if (h->version == 1)
876 return (h->headersz_msb << 16) | le16_to_cpu(h->headersz_lsb);
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200877
Joel Johnson8ec6db72020-04-17 09:38:04 -0600878 printf("Error: Invalid A38x image (header version 0x%x unknown)!\n",
879 h->version);
880 return 0;
881}
882
883static uint8_t image_checksum8(const void *start, size_t len)
884{
885 u8 csum = 0;
886 const u8 *p = start;
887
888 while (len) {
889 csum += *p;
890 ++p;
891 --len;
892 }
893
894 return csum;
895}
896
Pali Rohár5a065342022-08-23 14:52:23 +0200897static uint32_t image_checksum32(const void *start, size_t len)
898{
899 u32 csum = 0;
900 const u32 *p = start;
901
902 while (len) {
903 csum += *p;
904 ++p;
905 len -= sizeof(u32);
906 }
907
908 return csum;
909}
910
Joel Johnson8ec6db72020-04-17 09:38:04 -0600911static int check_image_header(void)
912{
913 u8 checksum;
Pali Rohár5a065342022-08-23 14:52:23 +0200914 u32 checksum32, exp_checksum32;
915 u32 offset, size;
Joel Johnson8ec6db72020-04-17 09:38:04 -0600916 const struct a38x_main_hdr_v1 *hdr =
917 (struct a38x_main_hdr_v1 *)get_load_addr();
Pali Roháre7813da2023-01-08 14:31:28 +0100918 const size_t hdr_size = a38x_header_size(hdr);
Joel Johnson8ec6db72020-04-17 09:38:04 -0600919
Pali Roháre7813da2023-01-08 14:31:28 +0100920 if (!hdr_size)
Joel Johnson8ec6db72020-04-17 09:38:04 -0600921 return -ENOEXEC;
922
Pali Roháre7813da2023-01-08 14:31:28 +0100923 checksum = image_checksum8(hdr, hdr_size);
Joel Johnson8ec6db72020-04-17 09:38:04 -0600924 checksum -= hdr->checksum;
925 if (checksum != hdr->checksum) {
Pali Rohár5a065342022-08-23 14:52:23 +0200926 printf("Error: Bad A38x image header checksum. 0x%x != 0x%x\n",
Joel Johnson8ec6db72020-04-17 09:38:04 -0600927 checksum, hdr->checksum);
928 return -ENOEXEC;
929 }
930
Pali Rohár5a065342022-08-23 14:52:23 +0200931 offset = le32_to_cpu(hdr->srcaddr);
932 size = le32_to_cpu(hdr->blocksize);
933
Pali Rohár4548b372023-04-11 20:35:51 +0200934 if (hdr->blockid == 0x78) { /* SATA id */
935 struct blk_desc *blk_dev = IS_ENABLED(BLK) ? blk_get_devnum_by_uclass_id(UCLASS_SCSI, 0) : NULL;
936 unsigned long blksz = blk_dev ? blk_dev->blksz : 512;
937 offset *= blksz;
938 }
Pali Rohár5a065342022-08-23 14:52:23 +0200939
Pali Rohár5a065342022-08-23 14:52:23 +0200940 if (offset % 4 != 0 || size < 4 || size % 4 != 0) {
941 printf("Error: Bad A38x image blocksize.\n");
942 return -ENOEXEC;
943 }
944
945 checksum32 = image_checksum32((u8 *)hdr + offset, size - 4);
946 exp_checksum32 = *(u32 *)((u8 *)hdr + offset + size - 4);
947 if (checksum32 != exp_checksum32) {
948 printf("Error: Bad A38x image data checksum. 0x%08x != 0x%08x\n",
949 checksum32, exp_checksum32);
950 return -ENOEXEC;
951 }
952
Joel Johnson8ec6db72020-04-17 09:38:04 -0600953 printf("Image checksum...OK!\n");
954 return 0;
955}
Pali Rohárf7b0bbc2022-08-23 14:52:24 +0200956
957#if defined(CONFIG_ARMADA_38X)
958static int a38x_image_is_secure(const struct a38x_main_hdr_v1 *hdr)
959{
Pali Roháre7813da2023-01-08 14:31:28 +0100960 const size_t hdr_size = a38x_header_size(hdr);
Pali Rohárf7b0bbc2022-08-23 14:52:24 +0200961 struct a38x_opt_hdr_v1 *ohdr;
962 u32 ohdr_size;
963
964 if (hdr->version != 1)
965 return 0;
966
967 if (!hdr->ext)
968 return 0;
969
970 ohdr = (struct a38x_opt_hdr_v1 *)(hdr + 1);
971 do {
972 if (ohdr->headertype == A38X_OPT_HDR_V1_SECURE_TYPE)
973 return 1;
974
975 ohdr_size = (ohdr->headersz_msb << 16) | le16_to_cpu(ohdr->headersz_lsb);
976
977 if (!*((u8 *)ohdr + ohdr_size - 4))
978 break;
979
980 ohdr = (struct a38x_opt_hdr_v1 *)((u8 *)ohdr + ohdr_size);
Pali Roháre7813da2023-01-08 14:31:28 +0100981 if ((u8 *)ohdr >= (u8 *)hdr + hdr_size)
Pali Rohárf7b0bbc2022-08-23 14:52:24 +0200982 break;
983 } while (1);
984
985 return 0;
986}
987#endif
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200988#else /* Not ARMADA? */
989static int check_image_header(void)
990{
991 printf("bubt cmd does not support this SoC device or family!\n");
992 return -ENOEXEC;
993}
994#endif
995
Pali Rohárc624c1c2023-02-20 22:42:54 +0100996#if defined(CONFIG_ARMADA_3700) || defined(CONFIG_ARMADA_38X)
Pali Rohárf7b0bbc2022-08-23 14:52:24 +0200997static u64 fuse_read_u64(u32 bank)
998{
999 u32 val[2];
1000 int ret;
1001
1002 ret = fuse_read(bank, 0, &val[0]);
1003 if (ret < 0)
1004 return -1;
1005
1006 ret = fuse_read(bank, 1, &val[1]);
1007 if (ret < 0)
1008 return -1;
1009
1010 return ((u64)val[1] << 32) | val[0];
1011}
1012#endif
1013
1014#if defined(CONFIG_ARMADA_3700)
1015static inline u8 maj3(u8 val)
1016{
1017 /* return majority vote of 3 bits */
1018 return ((val & 0x7) == 3 || (val & 0x7) > 4) ? 1 : 0;
1019}
1020#endif
1021
Joel Johnson658854a2020-04-17 09:38:06 -06001022static int bubt_check_boot_mode(const struct bubt_dev *dst)
1023{
Pali Rohár5d2f7d32022-07-26 16:11:56 +02001024#if defined(CONFIG_ARMADA_3700) || defined(CONFIG_ARMADA_32BIT)
Pali Rohárc624c1c2023-02-20 22:42:54 +01001025 int mode;
1026#if defined(CONFIG_ARMADA_3700) || defined(CONFIG_ARMADA_38X)
1027 int secure_mode;
1028#endif
Pali Rohár5d2f7d32022-07-26 16:11:56 +02001029#if defined(CONFIG_ARMADA_3700)
1030 const struct tim_boot_flash_sign *boot_modes = tim_boot_flash_signs;
1031 const struct common_tim_data *hdr =
1032 (struct common_tim_data *)get_load_addr();
1033 u32 id = hdr->boot_flash_sign;
Pali Rohárf7b0bbc2022-08-23 14:52:24 +02001034 int is_secure = hdr->trusted != 0;
1035 u64 otp_secure_bits = fuse_read_u64(1);
1036 int otp_secure_boot = ((maj3(otp_secure_bits >> 0) << 0) |
1037 (maj3(otp_secure_bits >> 4) << 1)) == 2;
1038 unsigned int otp_boot_device = (maj3(otp_secure_bits >> 48) << 0) |
1039 (maj3(otp_secure_bits >> 52) << 1) |
1040 (maj3(otp_secure_bits >> 56) << 2) |
1041 (maj3(otp_secure_bits >> 60) << 3);
Pali Rohár5d2f7d32022-07-26 16:11:56 +02001042#elif defined(CONFIG_ARMADA_32BIT)
1043 const struct a38x_boot_mode *boot_modes = a38x_boot_modes;
1044 const struct a38x_main_hdr_v1 *hdr =
1045 (struct a38x_main_hdr_v1 *)get_load_addr();
1046 u32 id = hdr->blockid;
Pali Rohárf7b0bbc2022-08-23 14:52:24 +02001047#if defined(CONFIG_ARMADA_38X)
1048 int is_secure = a38x_image_is_secure(hdr);
1049 u64 otp_secure_bits = fuse_read_u64(EFUSE_LINE_SECURE_BOOT);
1050 int otp_secure_boot = otp_secure_bits & 0x1;
1051 unsigned int otp_boot_device = (otp_secure_bits >> 8) & 0x7;
1052#endif
Pali Rohár5d2f7d32022-07-26 16:11:56 +02001053#endif
Joel Johnson658854a2020-04-17 09:38:06 -06001054
Pali Rohár5d2f7d32022-07-26 16:11:56 +02001055 for (mode = 0; boot_modes[mode].name; mode++) {
1056 if (boot_modes[mode].id == id)
1057 break;
Joel Johnson658854a2020-04-17 09:38:06 -06001058 }
Pali Rohár5d2f7d32022-07-26 16:11:56 +02001059
1060 if (!boot_modes[mode].name) {
1061 printf("Error: unknown boot device in image header: 0x%x\n", id);
1062 return -ENOEXEC;
1063 }
1064
Pali Rohárf7b0bbc2022-08-23 14:52:24 +02001065 if (strcmp(boot_modes[mode].name, dst->name) != 0) {
1066 printf("Error: image meant to be booted from \"%s\", not \"%s\"!\n",
1067 boot_modes[mode].name, dst->name);
1068 return -ENOEXEC;
1069 }
Pali Rohár5d2f7d32022-07-26 16:11:56 +02001070
Pali Rohárf7b0bbc2022-08-23 14:52:24 +02001071#if defined(CONFIG_ARMADA_38X) || defined(CONFIG_ARMADA_3700)
1072 if (otp_secure_bits == (u64)-1) {
1073 printf("Error: cannot read OTP secure bits\n");
1074 return -ENOEXEC;
1075 } else {
1076 if (otp_secure_boot && !is_secure) {
1077 printf("Error: secure boot is enabled in OTP but image does not have secure boot header!\n");
1078 return -ENOEXEC;
1079 } else if (!otp_secure_boot && is_secure) {
1080#if defined(CONFIG_ARMADA_3700)
1081 /*
1082 * Armada 3700 BootROM rejects trusted image when secure boot is not enabled.
1083 * Armada 385 BootROM accepts image with secure boot header also when secure boot is not enabled.
1084 */
1085 printf("Error: secure boot is disabled in OTP but image has secure boot header!\n");
1086 return -ENOEXEC;
Pali Rohár5d2f7d32022-07-26 16:11:56 +02001087#endif
Pali Rohárf7b0bbc2022-08-23 14:52:24 +02001088 } else if (otp_boot_device && otp_boot_device != id) {
1089 for (secure_mode = 0; boot_modes[secure_mode].name; secure_mode++) {
1090 if (boot_modes[secure_mode].id == otp_boot_device)
1091 break;
1092 }
1093 printf("Error: boot source is set to \"%s\" in OTP but image is for \"%s\"!\n",
1094 boot_modes[secure_mode].name ?: "unknown", dst->name);
1095 return -ENOEXEC;
1096 }
1097 }
1098#endif
1099#endif
1100 return 0;
Joel Johnson658854a2020-04-17 09:38:06 -06001101}
1102
1103static int bubt_verify(const struct bubt_dev *dst)
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02001104{
1105 int err;
1106
1107 /* Check a correct image header exists */
1108 err = check_image_header();
1109 if (err) {
1110 printf("Error: Image header verification failed\n");
1111 return err;
1112 }
1113
Joel Johnson658854a2020-04-17 09:38:06 -06001114 err = bubt_check_boot_mode(dst);
1115 if (err) {
1116 printf("Error: Image boot mode verification failed\n");
1117 return err;
1118 }
1119
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02001120 return 0;
1121}
1122
1123static int bubt_read_file(struct bubt_dev *src)
1124{
1125 size_t image_size;
1126
1127 if (!src->read) {
1128 printf("Error: Read not supported on device \"%s\"\n",
1129 src->name);
1130 return 0;
1131 }
1132
1133 image_size = src->read(net_boot_file_name);
1134 if (image_size <= 0) {
1135 printf("Error: Failed to read file %s from %s\n",
1136 net_boot_file_name, src->name);
1137 return 0;
1138 }
1139
1140 return image_size;
1141}
1142
1143static int bubt_is_dev_active(struct bubt_dev *dev)
1144{
1145 if (!dev->active) {
Joel Johnsonf41b85e2020-04-17 09:38:05 -06001146 printf("Device \"%s\" not supported by U-Boot image\n",
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02001147 dev->name);
1148 return 0;
1149 }
1150
1151 if (!dev->active()) {
1152 printf("Device \"%s\" is inactive\n", dev->name);
1153 return 0;
1154 }
1155
1156 return 1;
1157}
1158
Pali Rohár40e3204c2023-01-10 22:47:17 +01001159static struct bubt_dev *find_bubt_dev(char *dev_name)
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02001160{
1161 int dev;
1162
1163 for (dev = 0; dev < BUBT_MAX_DEV; dev++) {
1164 if (strcmp(bubt_devs[dev].name, dev_name) == 0)
1165 return &bubt_devs[dev];
1166 }
1167
1168 return 0;
1169}
1170
1171#define DEFAULT_BUBT_SRC "tftp"
1172
1173#ifndef DEFAULT_BUBT_DST
1174#ifdef CONFIG_MVEBU_SPI_BOOT
1175#define DEFAULT_BUBT_DST "spi"
1176#elif defined(CONFIG_MVEBU_NAND_BOOT)
1177#define DEFAULT_BUBT_DST "nand"
1178#elif defined(CONFIG_MVEBU_MMC_BOOT)
1179#define DEFAULT_BUBT_DST "mmc"
Pali Rohárc8f50092023-01-22 01:25:12 +01001180#elif defined(CONFIG_MVEBU_SATA_BOOT)
1181#define DEFAULT_BUBT_DST "sata"
Konstantin Porotchkin9f27bcc2021-03-17 18:53:43 +02001182#else
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02001183#define DEFAULT_BUBT_DST "error"
1184#endif
1185#endif /* DEFAULT_BUBT_DST */
1186
Pali Rohár40e3204c2023-01-10 22:47:17 +01001187static int do_bubt_cmd(struct cmd_tbl *cmdtp, int flag, int argc, char *const argv[])
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02001188{
1189 struct bubt_dev *src, *dst;
1190 size_t image_size;
1191 char src_dev_name[8];
1192 char dst_dev_name[8];
1193 char *name;
1194 int err;
1195
1196 if (argc < 2)
1197 copy_filename(net_boot_file_name,
1198 CONFIG_MVEBU_UBOOT_DFLT_NAME,
1199 sizeof(net_boot_file_name));
1200 else
1201 copy_filename(net_boot_file_name, argv[1],
1202 sizeof(net_boot_file_name));
1203
1204 if (argc >= 3) {
1205 strncpy(dst_dev_name, argv[2], 8);
1206 } else {
1207 name = DEFAULT_BUBT_DST;
1208 strncpy(dst_dev_name, name, 8);
1209 }
1210
1211 if (argc >= 4)
1212 strncpy(src_dev_name, argv[3], 8);
1213 else
1214 strncpy(src_dev_name, DEFAULT_BUBT_SRC, 8);
1215
1216 /* Figure out the destination device */
1217 dst = find_bubt_dev(dst_dev_name);
1218 if (!dst) {
1219 printf("Error: Unknown destination \"%s\"\n", dst_dev_name);
Pali Rohár09b0e202022-07-26 16:11:59 +02001220 return 1;
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02001221 }
1222
1223 if (!bubt_is_dev_active(dst))
Pali Rohár09b0e202022-07-26 16:11:59 +02001224 return 1;
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02001225
1226 /* Figure out the source device */
1227 src = find_bubt_dev(src_dev_name);
1228 if (!src) {
1229 printf("Error: Unknown source \"%s\"\n", src_dev_name);
1230 return 1;
1231 }
1232
1233 if (!bubt_is_dev_active(src))
1234 return -ENODEV;
1235
Joel Johnsonf41b85e2020-04-17 09:38:05 -06001236 printf("Burning U-Boot image \"%s\" from \"%s\" to \"%s\"\n",
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02001237 net_boot_file_name, src->name, dst->name);
1238
1239 image_size = bubt_read_file(src);
1240 if (!image_size)
Pali Rohár09b0e202022-07-26 16:11:59 +02001241 return 1;
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02001242
Joel Johnson658854a2020-04-17 09:38:06 -06001243 err = bubt_verify(dst);
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02001244 if (err)
Pali Rohár09b0e202022-07-26 16:11:59 +02001245 return 1;
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02001246
1247 err = bubt_write_file(dst, image_size);
1248 if (err)
Pali Rohár09b0e202022-07-26 16:11:59 +02001249 return 1;
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02001250
1251 return 0;
1252}
1253
1254U_BOOT_CMD(
1255 bubt, 4, 0, do_bubt_cmd,
1256 "Burn a u-boot image to flash",
1257 "[file-name] [destination [source]]\n"
Pali Rohár32771532021-01-27 11:56:02 +01001258 "\t-file-name The image file name to burn. Default = " CONFIG_MVEBU_UBOOT_DFLT_NAME "\n"
Pali Rohárc8f50092023-01-22 01:25:12 +01001259 "\t-destination Flash to burn to [spi, nand, mmc, sata]. Default = " DEFAULT_BUBT_DST "\n"
Pali Rohár4bf91e22023-01-21 23:29:36 +01001260 "\t-source The source to load image from [tftp, usb, mmc, sata]. Default = " DEFAULT_BUBT_SRC "\n"
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02001261 "Examples:\n"
1262 "\tbubt - Burn flash-image.bin from tftp to active boot device\n"
1263 "\tbubt flash-image-new.bin nand - Burn flash-image-new.bin from tftp to NAND flash\n"
1264 "\tbubt backup-flash-image.bin mmc usb - Burn backup-flash-image.bin from usb to MMC\n"
1265
1266);