blob: dc0ce01c358e2dd059cdde1f9b8e3f9031fd661f [file] [log] [blame]
Tom Rini83d290c2018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02002/*
3 * Copyright (C) 2016 Marvell International Ltd.
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +02004 * https://spdx.org/licenses
5 */
6
7#include <config.h>
8#include <common.h>
9#include <command.h>
Simon Glass7b51b572019-08-01 09:46:52 -060010#include <env.h>
Simon Glass8e8ccfe2019-12-28 10:45:03 -070011#include <image.h>
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +020012#include <vsprintf.h>
13#include <errno.h>
14#include <dm.h>
15
16#include <spi_flash.h>
17#include <spi.h>
18#include <nand.h>
19#include <usb.h>
20#include <fs.h>
21#include <mmc.h>
Konstantin Porotchkine559ef12017-01-08 16:52:06 +020022#ifdef CONFIG_BLK
23#include <blk.h>
24#endif
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +020025#include <u-boot/sha1.h>
26#include <u-boot/sha256.h>
27
28#ifndef CONFIG_SYS_MMC_ENV_DEV
29#define CONFIG_SYS_MMC_ENV_DEV 0
30#endif
31
32#if defined(CONFIG_ARMADA_8K)
33#define MAIN_HDR_MAGIC 0xB105B002
34
35struct mvebu_image_header {
36 u32 magic; /* 0-3 */
37 u32 prolog_size; /* 4-7 */
38 u32 prolog_checksum; /* 8-11 */
39 u32 boot_image_size; /* 12-15 */
40 u32 boot_image_checksum; /* 16-19 */
41 u32 rsrvd0; /* 20-23 */
42 u32 load_addr; /* 24-27 */
43 u32 exec_addr; /* 28-31 */
44 u8 uart_cfg; /* 32 */
45 u8 baudrate; /* 33 */
46 u8 ext_count; /* 34 */
47 u8 aux_flags; /* 35 */
48 u32 io_arg_0; /* 36-39 */
49 u32 io_arg_1; /* 40-43 */
50 u32 io_arg_2; /* 43-47 */
51 u32 io_arg_3; /* 48-51 */
52 u32 rsrvd1; /* 52-55 */
53 u32 rsrvd2; /* 56-59 */
54 u32 rsrvd3; /* 60-63 */
55};
56#elif defined(CONFIG_ARMADA_3700) /* A3700 */
57#define HASH_SUM_LEN 16
58#define IMAGE_VERSION_3_6_0 0x030600
59#define IMAGE_VERSION_3_5_0 0x030500
60
61struct common_tim_data {
62 u32 version;
63 u32 identifier;
64 u32 trusted;
65 u32 issue_date;
66 u32 oem_unique_id;
67 u32 reserved[5]; /* Reserve 20 bytes */
68 u32 boot_flash_sign;
69 u32 num_images;
70 u32 num_keys;
71 u32 size_of_reserved;
72};
73
74struct mvebu_image_info {
75 u32 image_id;
76 u32 next_image_id;
77 u32 flash_entry_addr;
78 u32 load_addr;
79 u32 image_size;
80 u32 image_size_to_hash;
81 u32 hash_algorithm_id;
82 u32 hash[HASH_SUM_LEN]; /* Reserve 512 bits for the hash */
83 u32 partition_number;
84 u32 enc_algorithm_id;
85 u32 encrypt_start_offset;
86 u32 encrypt_size;
87};
Joel Johnson658854a2020-04-17 09:38:06 -060088#endif
Joel Johnson8ec6db72020-04-17 09:38:04 -060089
90/* Structure of the main header, version 1 (Armada 370/38x/XP) */
91struct a38x_main_hdr_v1 {
92 u8 blockid; /* 0x0 */
93 u8 flags; /* 0x1 */
94 u16 reserved2; /* 0x2-0x3 */
95 u32 blocksize; /* 0x4-0x7 */
96 u8 version; /* 0x8 */
97 u8 headersz_msb; /* 0x9 */
98 u16 headersz_lsb; /* 0xA-0xB */
99 u32 srcaddr; /* 0xC-0xF */
100 u32 destaddr; /* 0x10-0x13 */
101 u32 execaddr; /* 0x14-0x17 */
102 u8 options; /* 0x18 */
103 u8 nandblocksize; /* 0x19 */
104 u8 nandbadblklocation; /* 0x1A */
105 u8 reserved4; /* 0x1B */
106 u16 reserved5; /* 0x1C-0x1D */
107 u8 ext; /* 0x1E */
108 u8 checksum; /* 0x1F */
109};
Joel Johnson658854a2020-04-17 09:38:06 -0600110
111struct a38x_boot_mode {
112 unsigned int id;
113 const char *name;
114};
115
116/* The blockid header field values used to indicate boot device of image */
117struct a38x_boot_mode a38x_boot_modes[] = {
118 { 0x4D, "i2c" },
119 { 0x5A, "spi" },
120 { 0x69, "uart" },
121 { 0x78, "sata" },
122 { 0x8B, "nand" },
123 { 0x9C, "pex" },
124 { 0xAE, "mmc" },
125 {},
126};
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200127
128struct bubt_dev {
129 char name[8];
130 size_t (*read)(const char *file_name);
131 int (*write)(size_t image_size);
132 int (*active)(void);
133};
134
135static ulong get_load_addr(void)
136{
137 const char *addr_str;
138 unsigned long addr;
139
Simon Glass00caae62017-08-03 12:22:12 -0600140 addr_str = env_get("loadaddr");
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200141 if (addr_str)
142 addr = simple_strtoul(addr_str, NULL, 16);
143 else
144 addr = CONFIG_SYS_LOAD_ADDR;
145
146 return addr;
147}
148
149/********************************************************************
150 * eMMC services
151 ********************************************************************/
Jean-Jacques Hiblotd6400c32018-01-04 15:23:32 +0100152#if CONFIG_IS_ENABLED(DM_MMC) && CONFIG_IS_ENABLED(MMC_WRITE)
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200153static int mmc_burn_image(size_t image_size)
154{
155 struct mmc *mmc;
156 lbaint_t start_lba;
157 lbaint_t blk_count;
158 ulong blk_written;
159 int err;
160 const u8 mmc_dev_num = CONFIG_SYS_MMC_ENV_DEV;
Konstantin Porotchkine559ef12017-01-08 16:52:06 +0200161#ifdef CONFIG_BLK
162 struct blk_desc *blk_desc;
163#endif
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200164 mmc = find_mmc_device(mmc_dev_num);
165 if (!mmc) {
166 printf("No SD/MMC/eMMC card found\n");
167 return -ENOMEDIUM;
168 }
169
170 err = mmc_init(mmc);
171 if (err) {
172 printf("%s(%d) init failed\n", IS_SD(mmc) ? "SD" : "MMC",
173 mmc_dev_num);
174 return err;
175 }
176
177#ifdef CONFIG_SYS_MMC_ENV_PART
178 if (mmc->part_num != CONFIG_SYS_MMC_ENV_PART) {
179 err = mmc_switch_part(mmc_dev_num, CONFIG_SYS_MMC_ENV_PART);
180 if (err) {
181 printf("MMC partition switch failed\n");
182 return err;
183 }
184 }
185#endif
186
187 /* SD reserves LBA-0 for MBR and boots from LBA-1,
188 * MMC/eMMC boots from LBA-0
189 */
190 start_lba = IS_SD(mmc) ? 1 : 0;
Konstantin Porotchkine559ef12017-01-08 16:52:06 +0200191#ifdef CONFIG_BLK
192 blk_count = image_size / mmc->write_bl_len;
193 if (image_size % mmc->write_bl_len)
194 blk_count += 1;
195
196 blk_desc = mmc_get_blk_desc(mmc);
197 if (!blk_desc) {
198 printf("Error - failed to obtain block descriptor\n");
199 return -ENODEV;
200 }
201 blk_written = blk_dwrite(blk_desc, start_lba, blk_count,
202 (void *)get_load_addr());
203#else
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200204 blk_count = image_size / mmc->block_dev.blksz;
205 if (image_size % mmc->block_dev.blksz)
206 blk_count += 1;
207
208 blk_written = mmc->block_dev.block_write(mmc_dev_num,
Konstantin Porotchkine559ef12017-01-08 16:52:06 +0200209 start_lba, blk_count,
210 (void *)get_load_addr());
211#endif /* CONFIG_BLK */
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200212 if (blk_written != blk_count) {
213 printf("Error - written %#lx blocks\n", blk_written);
214 return -ENOSPC;
215 }
216 printf("Done!\n");
217
218#ifdef CONFIG_SYS_MMC_ENV_PART
219 if (mmc->part_num != CONFIG_SYS_MMC_ENV_PART)
220 mmc_switch_part(mmc_dev_num, mmc->part_num);
221#endif
222
223 return 0;
224}
225
226static size_t mmc_read_file(const char *file_name)
227{
228 loff_t act_read = 0;
229 int rc;
230 struct mmc *mmc;
231 const u8 mmc_dev_num = CONFIG_SYS_MMC_ENV_DEV;
232
233 mmc = find_mmc_device(mmc_dev_num);
234 if (!mmc) {
235 printf("No SD/MMC/eMMC card found\n");
236 return 0;
237 }
238
239 if (mmc_init(mmc)) {
240 printf("%s(%d) init failed\n", IS_SD(mmc) ? "SD" : "MMC",
241 mmc_dev_num);
242 return 0;
243 }
244
245 /* Load from data partition (0) */
246 if (fs_set_blk_dev("mmc", "0", FS_TYPE_ANY)) {
247 printf("Error: MMC 0 not found\n");
248 return 0;
249 }
250
251 /* Perfrom file read */
252 rc = fs_read(file_name, get_load_addr(), 0, 0, &act_read);
253 if (rc)
254 return 0;
255
256 return act_read;
257}
258
259static int is_mmc_active(void)
260{
261 return 1;
262}
263#else /* CONFIG_DM_MMC */
264static int mmc_burn_image(size_t image_size)
265{
266 return -ENODEV;
267}
268
269static size_t mmc_read_file(const char *file_name)
270{
271 return 0;
272}
273
274static int is_mmc_active(void)
275{
276 return 0;
277}
278#endif /* CONFIG_DM_MMC */
279
280/********************************************************************
281 * SPI services
282 ********************************************************************/
283#ifdef CONFIG_SPI_FLASH
284static int spi_burn_image(size_t image_size)
285{
286 int ret;
287 struct spi_flash *flash;
288 u32 erase_bytes;
289
290 /* Probe the SPI bus to get the flash device */
291 flash = spi_flash_probe(CONFIG_ENV_SPI_BUS,
292 CONFIG_ENV_SPI_CS,
293 CONFIG_SF_DEFAULT_SPEED,
294 CONFIG_SF_DEFAULT_MODE);
295 if (!flash) {
296 printf("Failed to probe SPI Flash\n");
297 return -ENOMEDIUM;
298 }
299
300#ifdef CONFIG_SPI_FLASH_PROTECTION
301 spi_flash_protect(flash, 0);
302#endif
303 erase_bytes = image_size +
304 (flash->erase_size - image_size % flash->erase_size);
305 printf("Erasing %d bytes (%d blocks) at offset 0 ...",
306 erase_bytes, erase_bytes / flash->erase_size);
307 ret = spi_flash_erase(flash, 0, erase_bytes);
308 if (ret)
309 printf("Error!\n");
310 else
311 printf("Done!\n");
312
313 printf("Writing %d bytes from 0x%lx to offset 0 ...",
314 (int)image_size, get_load_addr());
315 ret = spi_flash_write(flash, 0, image_size, (void *)get_load_addr());
316 if (ret)
317 printf("Error!\n");
318 else
319 printf("Done!\n");
320
321#ifdef CONFIG_SPI_FLASH_PROTECTION
322 spi_flash_protect(flash, 1);
323#endif
324
325 return ret;
326}
327
328static int is_spi_active(void)
329{
330 return 1;
331}
332
333#else /* CONFIG_SPI_FLASH */
334static int spi_burn_image(size_t image_size)
335{
336 return -ENODEV;
337}
338
339static int is_spi_active(void)
340{
341 return 0;
342}
343#endif /* CONFIG_SPI_FLASH */
344
345/********************************************************************
346 * NAND services
347 ********************************************************************/
348#ifdef CONFIG_CMD_NAND
349static int nand_burn_image(size_t image_size)
350{
Konstantin Porotchkinf2ca24d2017-03-28 18:16:56 +0300351 int ret;
352 uint32_t block_size;
Grygorii Strashko7021c7e2017-06-26 19:13:02 -0500353 struct mtd_info *mtd;
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200354
Grygorii Strashko7021c7e2017-06-26 19:13:02 -0500355 mtd = get_nand_dev_by_index(nand_curr_device);
356 if (!mtd) {
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200357 puts("\nno devices available\n");
358 return -ENOMEDIUM;
359 }
Grygorii Strashko7021c7e2017-06-26 19:13:02 -0500360 block_size = mtd->erasesize;
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200361
362 /* Align U-Boot size to currently used blocksize */
363 image_size = ((image_size + (block_size - 1)) & (~(block_size - 1)));
364
Joel Johnsonf41b85e2020-04-17 09:38:05 -0600365 /* Erase the U-Boot image space */
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200366 printf("Erasing 0x%x - 0x%x:...", 0, (int)image_size);
Grygorii Strashko7021c7e2017-06-26 19:13:02 -0500367 ret = nand_erase(mtd, 0, image_size);
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200368 if (ret) {
369 printf("Error!\n");
370 goto error;
371 }
372 printf("Done!\n");
373
374 /* Write the image to flash */
Konstantin Porotchkinf2ca24d2017-03-28 18:16:56 +0300375 printf("Writing %d bytes from 0x%lx to offset 0 ... ",
376 (int)image_size, get_load_addr());
Grygorii Strashko7021c7e2017-06-26 19:13:02 -0500377 ret = nand_write(mtd, 0, &image_size, (void *)get_load_addr());
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200378 if (ret)
379 printf("Error!\n");
380 else
381 printf("Done!\n");
382
383error:
384 return ret;
385}
386
387static int is_nand_active(void)
388{
389 return 1;
390}
391
392#else /* CONFIG_CMD_NAND */
393static int nand_burn_image(size_t image_size)
394{
395 return -ENODEV;
396}
397
398static int is_nand_active(void)
399{
400 return 0;
401}
402#endif /* CONFIG_CMD_NAND */
403
404/********************************************************************
405 * USB services
406 ********************************************************************/
407#if defined(CONFIG_USB_STORAGE) && defined(CONFIG_BLK)
408static size_t usb_read_file(const char *file_name)
409{
410 loff_t act_read = 0;
411 struct udevice *dev;
412 int rc;
413
414 usb_stop();
415
416 if (usb_init() < 0) {
417 printf("Error: usb_init failed\n");
418 return 0;
419 }
420
421 /* Try to recognize storage devices immediately */
422 blk_first_device(IF_TYPE_USB, &dev);
423 if (!dev) {
424 printf("Error: USB storage device not found\n");
425 return 0;
426 }
427
428 /* Always load from usb 0 */
429 if (fs_set_blk_dev("usb", "0", FS_TYPE_ANY)) {
430 printf("Error: USB 0 not found\n");
431 return 0;
432 }
433
434 /* Perfrom file read */
435 rc = fs_read(file_name, get_load_addr(), 0, 0, &act_read);
436 if (rc)
437 return 0;
438
439 return act_read;
440}
441
442static int is_usb_active(void)
443{
444 return 1;
445}
446
447#else /* defined(CONFIG_USB_STORAGE) && defined (CONFIG_BLK) */
448static size_t usb_read_file(const char *file_name)
449{
450 return 0;
451}
452
453static int is_usb_active(void)
454{
455 return 0;
456}
457#endif /* defined(CONFIG_USB_STORAGE) && defined (CONFIG_BLK) */
458
459/********************************************************************
460 * Network services
461 ********************************************************************/
462#ifdef CONFIG_CMD_NET
463static size_t tftp_read_file(const char *file_name)
464{
Simon Glassbb872dd2019-12-28 10:45:02 -0700465 /*
466 * update global variable image_load_addr before tftp file from network
467 */
468 image_load_addr = get_load_addr();
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200469 return net_loop(TFTPGET);
470}
471
472static int is_tftp_active(void)
473{
474 return 1;
475}
476
477#else
478static size_t tftp_read_file(const char *file_name)
479{
480 return 0;
481}
482
483static int is_tftp_active(void)
484{
485 return 0;
486}
487#endif /* CONFIG_CMD_NET */
488
489enum bubt_devices {
490 BUBT_DEV_NET = 0,
491 BUBT_DEV_USB,
492 BUBT_DEV_MMC,
493 BUBT_DEV_SPI,
494 BUBT_DEV_NAND,
495
496 BUBT_MAX_DEV
497};
498
499struct bubt_dev bubt_devs[BUBT_MAX_DEV] = {
500 {"tftp", tftp_read_file, NULL, is_tftp_active},
501 {"usb", usb_read_file, NULL, is_usb_active},
502 {"mmc", mmc_read_file, mmc_burn_image, is_mmc_active},
503 {"spi", NULL, spi_burn_image, is_spi_active},
504 {"nand", NULL, nand_burn_image, is_nand_active},
505};
506
507static int bubt_write_file(struct bubt_dev *dst, size_t image_size)
508{
509 if (!dst->write) {
510 printf("Error: Write not supported on device %s\n", dst->name);
511 return -ENOTSUPP;
512 }
513
514 return dst->write(image_size);
515}
516
517#if defined(CONFIG_ARMADA_8K)
518u32 do_checksum32(u32 *start, int32_t len)
519{
520 u32 sum = 0;
521 u32 *startp = start;
522
523 do {
524 sum += *startp;
525 startp++;
526 len -= 4;
527 } while (len > 0);
528
529 return sum;
530}
531
532static int check_image_header(void)
533{
534 struct mvebu_image_header *hdr =
535 (struct mvebu_image_header *)get_load_addr();
536 u32 header_len = hdr->prolog_size;
537 u32 checksum;
538 u32 checksum_ref = hdr->prolog_checksum;
539
540 /*
541 * For now compare checksum, and magic. Later we can
542 * verify more stuff on the header like interface type, etc
543 */
544 if (hdr->magic != MAIN_HDR_MAGIC) {
545 printf("ERROR: Bad MAGIC 0x%08x != 0x%08x\n",
546 hdr->magic, MAIN_HDR_MAGIC);
547 return -ENOEXEC;
548 }
549
550 /* The checksum value is discarded from checksum calculation */
551 hdr->prolog_checksum = 0;
552
553 checksum = do_checksum32((u32 *)hdr, header_len);
554 if (checksum != checksum_ref) {
555 printf("Error: Bad Image checksum. 0x%x != 0x%x\n",
556 checksum, checksum_ref);
557 return -ENOEXEC;
558 }
559
560 /* Restore the checksum before writing */
561 hdr->prolog_checksum = checksum_ref;
562 printf("Image checksum...OK!\n");
563
564 return 0;
565}
566#elif defined(CONFIG_ARMADA_3700) /* Armada 3700 */
567static int check_image_header(void)
568{
569 struct common_tim_data *hdr = (struct common_tim_data *)get_load_addr();
570 int image_num;
571 u8 hash_160_output[SHA1_SUM_LEN];
572 u8 hash_256_output[SHA256_SUM_LEN];
573 sha1_context hash1_text;
574 sha256_context hash256_text;
575 u8 *hash_output;
576 u32 hash_algorithm_id;
577 u32 image_size_to_hash;
578 u32 flash_entry_addr;
579 u32 *hash_value;
580 u32 internal_hash[HASH_SUM_LEN];
581 const u8 *buff;
582 u32 num_of_image = hdr->num_images;
583 u32 version = hdr->version;
584 u32 trusted = hdr->trusted;
585
586 /* bubt checksum validation only supports nontrusted images */
587 if (trusted == 1) {
588 printf("bypass image validation, ");
589 printf("only untrusted image is supported now\n");
590 return 0;
591 }
592 /* only supports image version 3.5 and 3.6 */
593 if (version != IMAGE_VERSION_3_5_0 && version != IMAGE_VERSION_3_6_0) {
594 printf("Error: Unsupported Image version = 0x%08x\n", version);
595 return -ENOEXEC;
596 }
597 /* validate images hash value */
598 for (image_num = 0; image_num < num_of_image; image_num++) {
599 struct mvebu_image_info *info =
600 (struct mvebu_image_info *)(get_load_addr() +
601 sizeof(struct common_tim_data) +
602 image_num * sizeof(struct mvebu_image_info));
603 hash_algorithm_id = info->hash_algorithm_id;
604 image_size_to_hash = info->image_size_to_hash;
605 flash_entry_addr = info->flash_entry_addr;
606 hash_value = info->hash;
607 buff = (const u8 *)(get_load_addr() + flash_entry_addr);
608
609 if (image_num == 0) {
610 /*
611 * The first image includes hash values in its content.
612 * For hash calculation, we need to save the original
613 * hash values to a local variable that will be
614 * copied back for comparsion and set all zeros to
615 * the orignal hash values for calculating new value.
616 * First image original format :
617 * x...x (datum1) x...x(orig. hash values) x...x(datum2)
618 * Replaced first image format :
619 * x...x (datum1) 0...0(hash values) x...x(datum2)
620 */
621 memcpy(internal_hash, hash_value,
622 sizeof(internal_hash));
623 memset(hash_value, 0, sizeof(internal_hash));
624 }
625 if (image_size_to_hash == 0) {
626 printf("Warning: Image_%d hash checksum is disabled, ",
627 image_num);
628 printf("skip the image validation.\n");
629 continue;
630 }
631 switch (hash_algorithm_id) {
632 case SHA1_SUM_LEN:
633 sha1_starts(&hash1_text);
634 sha1_update(&hash1_text, buff, image_size_to_hash);
635 sha1_finish(&hash1_text, hash_160_output);
636 hash_output = hash_160_output;
637 break;
638 case SHA256_SUM_LEN:
639 sha256_starts(&hash256_text);
640 sha256_update(&hash256_text, buff, image_size_to_hash);
641 sha256_finish(&hash256_text, hash_256_output);
642 hash_output = hash_256_output;
643 break;
644 default:
645 printf("Error: Unsupported hash_algorithm_id = %d\n",
646 hash_algorithm_id);
647 return -ENOEXEC;
648 }
649 if (image_num == 0)
650 memcpy(hash_value, internal_hash,
651 sizeof(internal_hash));
652 if (memcmp(hash_value, hash_output, hash_algorithm_id) != 0) {
653 printf("Error: Image_%d checksum is not correct\n",
654 image_num);
655 return -ENOEXEC;
656 }
657 }
658 printf("Image checksum...OK!\n");
659
660 return 0;
661}
Joel Johnson8ec6db72020-04-17 09:38:04 -0600662#elif defined(CONFIG_ARMADA_38X)
663static size_t a38x_header_size(const struct a38x_main_hdr_v1 *h)
664{
665 if (h->version == 1)
666 return (h->headersz_msb << 16) | le16_to_cpu(h->headersz_lsb);
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200667
Joel Johnson8ec6db72020-04-17 09:38:04 -0600668 printf("Error: Invalid A38x image (header version 0x%x unknown)!\n",
669 h->version);
670 return 0;
671}
672
673static uint8_t image_checksum8(const void *start, size_t len)
674{
675 u8 csum = 0;
676 const u8 *p = start;
677
678 while (len) {
679 csum += *p;
680 ++p;
681 --len;
682 }
683
684 return csum;
685}
686
687static int check_image_header(void)
688{
689 u8 checksum;
690 const struct a38x_main_hdr_v1 *hdr =
691 (struct a38x_main_hdr_v1 *)get_load_addr();
692 const size_t image_size = a38x_header_size(hdr);
693
694 if (!image_size)
695 return -ENOEXEC;
696
697 checksum = image_checksum8(hdr, image_size);
698 checksum -= hdr->checksum;
699 if (checksum != hdr->checksum) {
700 printf("Error: Bad A38x image checksum. 0x%x != 0x%x\n",
701 checksum, hdr->checksum);
702 return -ENOEXEC;
703 }
704
705 printf("Image checksum...OK!\n");
706 return 0;
707}
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200708#else /* Not ARMADA? */
709static int check_image_header(void)
710{
711 printf("bubt cmd does not support this SoC device or family!\n");
712 return -ENOEXEC;
713}
714#endif
715
Joel Johnson658854a2020-04-17 09:38:06 -0600716static int bubt_check_boot_mode(const struct bubt_dev *dst)
717{
718 if (IS_ENABLED(CONFIG_ARMADA_38X)) {
719 int mode;
720 const struct a38x_main_hdr_v1 *hdr =
721 (struct a38x_main_hdr_v1 *)get_load_addr();
722
723 for (mode = 0; mode < ARRAY_SIZE(a38x_boot_modes); mode++) {
724 if (strcmp(a38x_boot_modes[mode].name, dst->name) == 0)
725 break;
726 }
727
728 if (a38x_boot_modes[mode].id == hdr->blockid)
729 return 0;
730
Joel Johnsonf60a66e2020-04-17 09:38:08 -0600731 for (int i = 0; i < ARRAY_SIZE(a38x_boot_modes); i++) {
732 if (a38x_boot_modes[i].id == hdr->blockid) {
733 printf("Error: A38x image meant to be "
734 "booted from \"%s\", not \"%s\"!\n",
735 a38x_boot_modes[i].name, dst->name);
736 return -ENOEXEC;
737 }
738 }
739
740 printf("Error: unknown boot device in A38x image header: "
741 "0x%x\n", hdr->blockid);
Joel Johnson658854a2020-04-17 09:38:06 -0600742 return -ENOEXEC;
743 } else {
744 return 0;
745 }
746}
747
748static int bubt_verify(const struct bubt_dev *dst)
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200749{
750 int err;
751
752 /* Check a correct image header exists */
753 err = check_image_header();
754 if (err) {
755 printf("Error: Image header verification failed\n");
756 return err;
757 }
758
Joel Johnson658854a2020-04-17 09:38:06 -0600759 err = bubt_check_boot_mode(dst);
760 if (err) {
761 printf("Error: Image boot mode verification failed\n");
762 return err;
763 }
764
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200765 return 0;
766}
767
768static int bubt_read_file(struct bubt_dev *src)
769{
770 size_t image_size;
771
772 if (!src->read) {
773 printf("Error: Read not supported on device \"%s\"\n",
774 src->name);
775 return 0;
776 }
777
778 image_size = src->read(net_boot_file_name);
779 if (image_size <= 0) {
780 printf("Error: Failed to read file %s from %s\n",
781 net_boot_file_name, src->name);
782 return 0;
783 }
784
785 return image_size;
786}
787
788static int bubt_is_dev_active(struct bubt_dev *dev)
789{
790 if (!dev->active) {
Joel Johnsonf41b85e2020-04-17 09:38:05 -0600791 printf("Device \"%s\" not supported by U-Boot image\n",
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200792 dev->name);
793 return 0;
794 }
795
796 if (!dev->active()) {
797 printf("Device \"%s\" is inactive\n", dev->name);
798 return 0;
799 }
800
801 return 1;
802}
803
804struct bubt_dev *find_bubt_dev(char *dev_name)
805{
806 int dev;
807
808 for (dev = 0; dev < BUBT_MAX_DEV; dev++) {
809 if (strcmp(bubt_devs[dev].name, dev_name) == 0)
810 return &bubt_devs[dev];
811 }
812
813 return 0;
814}
815
816#define DEFAULT_BUBT_SRC "tftp"
817
818#ifndef DEFAULT_BUBT_DST
819#ifdef CONFIG_MVEBU_SPI_BOOT
820#define DEFAULT_BUBT_DST "spi"
821#elif defined(CONFIG_MVEBU_NAND_BOOT)
822#define DEFAULT_BUBT_DST "nand"
823#elif defined(CONFIG_MVEBU_MMC_BOOT)
824#define DEFAULT_BUBT_DST "mmc"
825else
826#define DEFAULT_BUBT_DST "error"
827#endif
828#endif /* DEFAULT_BUBT_DST */
829
830int do_bubt_cmd(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
831{
832 struct bubt_dev *src, *dst;
833 size_t image_size;
834 char src_dev_name[8];
835 char dst_dev_name[8];
836 char *name;
837 int err;
838
839 if (argc < 2)
840 copy_filename(net_boot_file_name,
841 CONFIG_MVEBU_UBOOT_DFLT_NAME,
842 sizeof(net_boot_file_name));
843 else
844 copy_filename(net_boot_file_name, argv[1],
845 sizeof(net_boot_file_name));
846
847 if (argc >= 3) {
848 strncpy(dst_dev_name, argv[2], 8);
849 } else {
850 name = DEFAULT_BUBT_DST;
851 strncpy(dst_dev_name, name, 8);
852 }
853
854 if (argc >= 4)
855 strncpy(src_dev_name, argv[3], 8);
856 else
857 strncpy(src_dev_name, DEFAULT_BUBT_SRC, 8);
858
859 /* Figure out the destination device */
860 dst = find_bubt_dev(dst_dev_name);
861 if (!dst) {
862 printf("Error: Unknown destination \"%s\"\n", dst_dev_name);
863 return -EINVAL;
864 }
865
866 if (!bubt_is_dev_active(dst))
867 return -ENODEV;
868
869 /* Figure out the source device */
870 src = find_bubt_dev(src_dev_name);
871 if (!src) {
872 printf("Error: Unknown source \"%s\"\n", src_dev_name);
873 return 1;
874 }
875
876 if (!bubt_is_dev_active(src))
877 return -ENODEV;
878
Joel Johnsonf41b85e2020-04-17 09:38:05 -0600879 printf("Burning U-Boot image \"%s\" from \"%s\" to \"%s\"\n",
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200880 net_boot_file_name, src->name, dst->name);
881
882 image_size = bubt_read_file(src);
883 if (!image_size)
884 return -EIO;
885
Joel Johnson658854a2020-04-17 09:38:06 -0600886 err = bubt_verify(dst);
Konstantin Porotchkinfa61ef62016-12-08 12:22:28 +0200887 if (err)
888 return err;
889
890 err = bubt_write_file(dst, image_size);
891 if (err)
892 return err;
893
894 return 0;
895}
896
897U_BOOT_CMD(
898 bubt, 4, 0, do_bubt_cmd,
899 "Burn a u-boot image to flash",
900 "[file-name] [destination [source]]\n"
901 "\t-file-name The image file name to burn. Default = flash-image.bin\n"
902 "\t-destination Flash to burn to [spi, nand, mmc]. Default = active boot device\n"
903 "\t-source The source to load image from [tftp, usb, mmc]. Default = tftp\n"
904 "Examples:\n"
905 "\tbubt - Burn flash-image.bin from tftp to active boot device\n"
906 "\tbubt flash-image-new.bin nand - Burn flash-image-new.bin from tftp to NAND flash\n"
907 "\tbubt backup-flash-image.bin mmc usb - Burn backup-flash-image.bin from usb to MMC\n"
908
909);