fel.c 38.5 KB
Newer Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
/*
 * Copyright (C) 2012  Henrik Nordstrom <henrik@henriknordstrom.net>
 *
 * This program is free software: you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, either version 2 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */

18
19
#include "common.h"
#include "portable_endian.h"
20
#include "fel_lib.h"
21

22
23
#include <assert.h>
#include <ctype.h>
24
#include <errno.h>
25
26
27
28
#include <stdarg.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
29
#include <unistd.h>
30
#include <sys/stat.h>
31

32
static bool verbose = false; /* If set, makes the 'fel' tool more talkative */
33
34
static uint32_t uboot_entry = 0; /* entry point (address) of U-Boot */
static uint32_t uboot_size  = 0; /* size of U-Boot binary */
35
36
37
38
39
40
41
42
43
44

static void pr_info(const char *fmt, ...)
{
	va_list arglist;
	if (verbose) {
		va_start(arglist, fmt);
		vprintf(fmt, arglist);
		va_end(arglist);
	}
}
45

46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
/* Constants taken from ${U-BOOT}/include/image.h */
#define IH_MAGIC	0x27051956	/* Image Magic Number	*/
#define IH_ARCH_ARM		2	/* ARM			*/
#define IH_TYPE_INVALID		0	/* Invalid Image	*/
#define IH_TYPE_FIRMWARE	5	/* Firmware Image	*/
#define IH_TYPE_SCRIPT		6	/* Script file		*/
#define IH_NMLEN		32	/* Image Name Length	*/

/* Additional error codes, newly introduced for get_image_type() */
#define IH_TYPE_ARCH_MISMATCH	-1

#define HEADER_NAME_OFFSET	32	/* offset of name field	*/
#define HEADER_SIZE		(HEADER_NAME_OFFSET + IH_NMLEN)

/*
 * Utility function to determine the image type from a mkimage-compatible
 * header at given buffer (address).
 *
 * For invalid headers (insufficient size or 'magic' mismatch) the function
 * will return IH_TYPE_INVALID. Negative return values might indicate
 * special error conditions, e.g. IH_TYPE_ARCH_MISMATCH signals that the
 * image doesn't match the expected (ARM) architecture.
 * Otherwise the function will return the "ih_type" field for valid headers.
 */
int get_image_type(const uint8_t *buf, size_t len)
{
	uint32_t *buf32 = (uint32_t *)buf;

	if (len <= HEADER_SIZE) /* insufficient length/size */
		return IH_TYPE_INVALID;
	if (be32toh(buf32[0]) != IH_MAGIC) /* signature mismatch */
		return IH_TYPE_INVALID;
	/* For sunxi, we always expect ARM architecture here */
	if (buf[29] != IH_ARCH_ARM)
		return IH_TYPE_ARCH_MISMATCH;

	/* assume a valid header, and return ih_type */
	return buf[30];
}

86
void aw_fel_print_version(feldev_handle *dev)
87
{
88
	struct aw_fel_version buf = dev->soc_version;
89
	const char *soc_name = dev->soc_name;
90

91
92
	if (soc_name[0] == '0') /* hexadecimal ID -> unknown SoC */
		soc_name = "unknown";
Henrik Nordstrom's avatar
Henrik Nordstrom committed
93

94
95
96
97
	printf("%.8s soc=%08x(%s) %08x ver=%04x %02x %02x scratchpad=%08x %08x %08x\n",
		buf.signature, buf.soc_id, soc_name, buf.unknown_0a,
		buf.protocol, buf.unknown_12, buf.unknown_13,
		buf.scratchpad, buf.pad[0], buf.pad[1]);
98
99
}

100
/*
101
102
 * This wrapper for the FEL write functionality safeguards against overwriting
 * an already loaded U-Boot binary.
103
104
 * The return value represents elapsed time in seconds (needed for execution).
 */
105
double aw_write_buffer(feldev_handle *dev, void *buf, uint32_t offset,
106
		       size_t len, bool progress)
107
108
109
110
111
112
113
{
	/* safeguard against overwriting an already loaded U-Boot binary */
	if (uboot_size > 0 && offset <= uboot_entry + uboot_size
			   && offset + len >= uboot_entry)
	{
		fprintf(stderr, "ERROR: Attempt to overwrite U-Boot! "
			"Request 0x%08X-0x%08X overlaps 0x%08X-0x%08X.\n",
114
			offset, (uint32_t)(offset + len),
115
116
117
118
			uboot_entry, uboot_entry + uboot_size);
		exit(1);
	}
	double start = gettime();
119
	aw_fel_write_buffer(dev, buf, offset, len, progress);
120
121
122
	return gettime() - start;
}

123
124
125
126
127
128
void hexdump(void *data, uint32_t offset, size_t size)
{
	size_t j;
	unsigned char *buf = data;
	for (j = 0; j < size; j+=16) {
		size_t i;
129
		printf("%08zx: ", offset + j);
130
		for (i = 0; i < 16; i++) {
131
			if (j + i < size)
132
				printf("%02x ", buf[j+i]);
133
			else
134
135
				printf("__ ");
		}
136
		putchar(' ');
137
		for (i = 0; i < 16; i++) {
138
139
140
141
			if (j + i >= size)
				putchar('.');
			else
				putchar(isprint(buf[j+i]) ? buf[j+i] : '.');
142
		}
143
		putchar('\n');
144
145
	}
}
146

147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
unsigned int file_size(const char *filename)
{
	struct stat st;
	if (stat(filename, &st) != 0) {
		fprintf(stderr, "stat() error on file \"%s\": %s\n", filename,
			strerror(errno));
		exit(1);
	}
	if (!S_ISREG(st.st_mode)) {
		fprintf(stderr, "error: \"%s\" is not a regular file\n", filename);
		exit(1);
	}
	return st.st_size;
}

162
163
164
165
int save_file(const char *name, void *data, size_t size)
{
	FILE *out = fopen(name, "wb");
	int rc;
166
	if (!out) {
167
		perror("Failed to open output file");
168
169
		exit(1);
	}
170
171
172
173
174
	rc = fwrite(data, size, 1, out);
	fclose(out);
	return rc;
}

175
176
177
178
179
180
181
182
183
184
void *load_file(const char *name, size_t *size)
{
	size_t bufsize = 8192;
	size_t offset = 0;
	char *buf = malloc(bufsize);
	FILE *in;
	if (strcmp(name, "-") == 0)
		in = stdin;
	else
		in = fopen(name, "rb");
185
	if (!in) {
186
		perror("Failed to open input file");
187
188
		exit(1);
	}
189
	
Bernhard Nortmann's avatar
Bernhard Nortmann committed
190
	while (true) {
191
192
		ssize_t len = bufsize - offset;
		ssize_t n = fread(buf+offset, 1, len, in);
193
		offset += n;
194
		if (n < len)
195
196
197
198
199
200
201
202
203
204
205
			break;
		bufsize <<= 1;
		buf = realloc(buf, bufsize);
	}
	if (size) 
		*size = offset;
	if (in != stdin)
		fclose(in);
	return buf;
}

206
void aw_fel_hexdump(feldev_handle *dev, uint32_t offset, size_t size)
207
208
{
	unsigned char buf[size];
209
	aw_fel_read(dev, offset, buf, size);
210
211
212
	hexdump(buf, offset, size);
}

213
void aw_fel_dump(feldev_handle *dev, uint32_t offset, size_t size)
214
215
{
	unsigned char buf[size];
216
	aw_fel_read(dev, offset, buf, size);
217
218
	fwrite(buf, size, 1, stdout);
}
219
void aw_fel_fill(feldev_handle *dev, uint32_t offset, size_t size, unsigned char value)
220
221
{
	unsigned char buf[size];
Henrik Nordstrom's avatar
Henrik Nordstrom committed
222
	memset(buf, value, size);
223
	aw_write_buffer(dev, buf, offset, size, false);
224
225
}

226
227
228
229
static uint32_t fel_to_spl_thunk[] = {
	#include "fel-to-spl-thunk.h"
};

230
231
232
#define	DRAM_BASE		0x40000000
#define	DRAM_SIZE		0x80000000

233
uint32_t aw_read_arm_cp_reg(feldev_handle *dev, soc_info_t *soc_info,
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
			    uint32_t coproc, uint32_t opc1, uint32_t crn,
			    uint32_t crm, uint32_t opc2)
{
	uint32_t val = 0;
	uint32_t opcode = 0xEE000000 | (1 << 20) | (1 << 4) |
			  ((opc1 & 7) << 21)    |
			  ((crn & 15) << 16)    |
			  ((coproc & 15) << 8)  |
			  ((opc2 & 7) << 5)     |
			  (crm & 15);
	uint32_t arm_code[] = {
		htole32(opcode),     /* mrc  coproc, opc1, r0, crn, crm, opc2 */
		htole32(0xe58f0000), /* str  r0, [pc]                         */
		htole32(0xe12fff1e), /* bx   lr                               */
	};
249
250
251
	aw_fel_write(dev, arm_code, soc_info->scratch_addr, sizeof(arm_code));
	aw_fel_execute(dev, soc_info->scratch_addr);
	aw_fel_read(dev, soc_info->scratch_addr + 12, &val, sizeof(val));
252
253
254
	return le32toh(val);
}

255
void aw_write_arm_cp_reg(feldev_handle *dev, soc_info_t *soc_info,
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
			 uint32_t coproc, uint32_t opc1, uint32_t crn,
			 uint32_t crm, uint32_t opc2, uint32_t val)
{
	uint32_t opcode = 0xEE000000 | (0 << 20) | (1 << 4) |
			  ((opc1 & 7) << 21)                |
			  ((crn & 15) << 16)                |
			  ((coproc & 15) << 8)              |
			  ((opc2 & 7) << 5)                 |
			  (crm & 15);
	uint32_t arm_code[] = {
		htole32(0xe59f000c), /* ldr  r0, [pc, #12]                    */
		htole32(opcode),     /* mcr  coproc, opc1, r0, crn, crm, opc2 */
		htole32(0xf57ff04f), /* dsb  sy                               */
		htole32(0xf57ff06f), /* isb  sy                               */
		htole32(0xe12fff1e), /* bx   lr                               */
		htole32(val)
	};
273
274
	aw_fel_write(dev, arm_code, soc_info->scratch_addr, sizeof(arm_code));
	aw_fel_execute(dev, soc_info->scratch_addr);
275
276
}

277
/* "readl" of a single value */
278
uint32_t fel_readl(feldev_handle *dev, uint32_t addr)
279
280
{
	uint32_t val;
281
	fel_readl_n(dev, addr, &val, 1);
282
283
284
285
	return val;
}

/* "writel" of a single value */
286
void fel_writel(feldev_handle *dev, uint32_t addr, uint32_t val)
287
{
288
	fel_writel_n(dev, addr, &val, 1);
289
290
}

291
void aw_fel_print_sid(feldev_handle *dev)
292
{
293
	soc_info_t *soc_info = dev->soc_info;
294
295
296
297
	if (soc_info->sid_addr) {
		pr_info("SID key (e-fuses) at 0x%08X\n", soc_info->sid_addr);

		uint32_t key[4];
298
		fel_readl_n(dev, soc_info->sid_addr, key, 4);
299
300

		unsigned int i;
Bernhard Nortmann's avatar
Bernhard Nortmann committed
301
		/* output SID in "xxxxxxxx:xxxxxxxx:xxxxxxxx:xxxxxxxx" format */
302
		for (i = 0; i <= 3; i++)
Bernhard Nortmann's avatar
Bernhard Nortmann committed
303
			printf("%08x%c", key[i], i < 3 ? ':' : '\n');
304
	} else {
305
306
		printf("SID registers for your SoC (%s) are unknown or inaccessible.\n",
			dev->soc_name);
307
308
309
	}
}

310
void aw_enable_l2_cache(feldev_handle *dev, soc_info_t *soc_info)
311
312
313
314
315
316
317
318
{
	uint32_t arm_code[] = {
		htole32(0xee112f30), /* mrc        15, 0, r2, cr1, cr0, {1}  */
		htole32(0xe3822002), /* orr        r2, r2, #2                */
		htole32(0xee012f30), /* mcr        15, 0, r2, cr1, cr0, {1}  */
		htole32(0xe12fff1e), /* bx         lr                        */
	};

319
320
	aw_fel_write(dev, arm_code, soc_info->scratch_addr, sizeof(arm_code));
	aw_fel_execute(dev, soc_info->scratch_addr);
321
322
}

323
void aw_get_stackinfo(feldev_handle *dev, soc_info_t *soc_info,
324
                      uint32_t *sp_irq, uint32_t *sp)
325
326
327
328
329
330
331
332
333
334
335
{
	uint32_t results[2] = { 0 };
#if 0
	/* Does not work on Cortex-A8 (needs Virtualization Extensions) */
	uint32_t arm_code[] = {
		htole32(0xe1010300), /* mrs        r0, SP_irq                */
		htole32(0xe58f0004), /* str        r0, [pc, #4]              */
		htole32(0xe58fd004), /* str        sp, [pc, #4]              */
		htole32(0xe12fff1e), /* bx         lr                        */
	};

336
337
338
	aw_fel_write(dev, arm_code, soc_info->scratch_addr, sizeof(arm_code));
	aw_fel_execute(dev, soc_info->scratch_addr);
	aw_fel_read(dev, soc_info->scratch_addr + 0x10, results, 8);
339
340
341
342
343
344
345
346
347
348
349
350
351
352
#else
	/* Works everywhere */
	uint32_t arm_code[] = {
		htole32(0xe10f0000), /* mrs        r0, CPSR                  */
		htole32(0xe3c0101f), /* bic        r1, r0, #31               */
		htole32(0xe3811012), /* orr        r1, r1, #18               */
		htole32(0xe121f001), /* msr        CPSR_c, r1                */
		htole32(0xe1a0100d), /* mov        r1, sp                    */
		htole32(0xe121f000), /* msr        CPSR_c, r0                */
		htole32(0xe58f1004), /* str        r1, [pc, #4]              */
		htole32(0xe58fd004), /* str        sp, [pc, #4]              */
		htole32(0xe12fff1e), /* bx         lr                        */
	};

353
354
355
	aw_fel_write(dev, arm_code, soc_info->scratch_addr, sizeof(arm_code));
	aw_fel_execute(dev, soc_info->scratch_addr);
	aw_fel_read(dev, soc_info->scratch_addr + 0x24, results, 8);
356
357
358
359
360
#endif
	*sp_irq = le32toh(results[0]);
	*sp     = le32toh(results[1]);
}

361
uint32_t aw_get_ttbr0(feldev_handle *dev, soc_info_t *soc_info)
362
{
363
	return aw_read_arm_cp_reg(dev, soc_info, 15, 0, 2, 0, 0);
364
365
}

366
uint32_t aw_get_ttbcr(feldev_handle *dev, soc_info_t *soc_info)
367
{
368
	return aw_read_arm_cp_reg(dev, soc_info, 15, 0, 2, 0, 2);
369
370
}

371
uint32_t aw_get_dacr(feldev_handle *dev, soc_info_t *soc_info)
372
{
373
	return aw_read_arm_cp_reg(dev, soc_info, 15, 0, 3, 0, 0);
374
375
}

376
uint32_t aw_get_sctlr(feldev_handle *dev, soc_info_t *soc_info)
377
{
378
	return aw_read_arm_cp_reg(dev, soc_info, 15, 0, 1, 0, 0);
379
380
}

381
void aw_set_ttbr0(feldev_handle *dev, soc_info_t *soc_info,
382
383
		  uint32_t ttbr0)
{
384
	return aw_write_arm_cp_reg(dev, soc_info, 15, 0, 2, 0, 0, ttbr0);
385
386
}

387
void aw_set_ttbcr(feldev_handle *dev, soc_info_t *soc_info,
388
389
		  uint32_t ttbcr)
{
390
	return aw_write_arm_cp_reg(dev, soc_info, 15, 0, 2, 0, 2, ttbcr);
391
392
}

393
void aw_set_dacr(feldev_handle *dev, soc_info_t *soc_info,
394
395
		 uint32_t dacr)
{
396
	aw_write_arm_cp_reg(dev, soc_info, 15, 0, 3, 0, 0, dacr);
397
398
}

399
void aw_set_sctlr(feldev_handle *dev, soc_info_t *soc_info,
400
401
		  uint32_t sctlr)
{
402
	aw_write_arm_cp_reg(dev, soc_info, 15, 0, 1, 0, 0, sctlr);
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
}

/*
 * Reconstruct the same MMU translation table as used by the A20 BROM.
 * We are basically reverting the changes, introduced in newer SoC
 * variants. This works fine for the SoC variants with the memory
 * layout similar to A20 (the SRAM is in the first megabyte of the
 * address space and the BROM is in the last megabyte of the address
 * space).
 */
uint32_t *aw_generate_mmu_translation_table(void)
{
	uint32_t *tt = malloc(4096 * sizeof(uint32_t));
	uint32_t i;

	/*
	 * Direct mapping using 1MB sections with TEXCB=00000 (Strongly
	 * ordered) for all memory except the first and the last sections,
	 * which have TEXCB=00100 (Normal). Domain bits are set to 1111
	 * and AP bits are set to 11, but this is mostly irrelevant.
	 */
	for (i = 0; i < 4096; i++)
		tt[i] = 0x00000DE2 | (i << 20);
	tt[0x000] |= 0x1000;
	tt[0xFFF] |= 0x1000;

	return tt;
}

432
uint32_t *aw_backup_and_disable_mmu(feldev_handle *dev,
433
                                    soc_info_t *soc_info)
434
{
435
	uint32_t *tt = NULL;
436
	uint32_t sctlr, ttbr0, ttbcr, dacr;
437
438
439
	uint32_t i;

	uint32_t arm_code[] = {
440
		/* Disable I-cache, MMU and branch prediction */
441
442
		htole32(0xee110f10), /* mrc        15, 0, r0, cr1, cr0, {0}  */
		htole32(0xe3c00001), /* bic        r0, r0, #1                */
443
444
		htole32(0xe3c00a01), /* bic        r0, r0, #4096             */
		htole32(0xe3c00b02), /* bic        r0, r0, #2048             */
445
446
447
448
449
		htole32(0xee010f10), /* mcr        15, 0, r0, cr1, cr0, {0}  */
		/* Return back to FEL */
		htole32(0xe12fff1e), /* bx         lr                        */
	};

450
451
452
453
454
455
456
457
458
459
460
	/*
	 * Below are some checks for the register values, which are known
	 * to be initialized in this particular way by the existing BROM
	 * implementations. We don't strictly need them to exactly match,
	 * but still have these safety guards in place in order to detect
	 * and review any potential configuration changes in future SoC
	 * variants (if one of these checks fails, then it is not a serious
	 * problem but more likely just an indication that one of these
	 * checks needs to be relaxed).
	 */

461
	/* Basically, ignore M/Z/I/V/UNK bits and expect no TEX remap */
462
	sctlr = aw_get_sctlr(dev, soc_info);
463
	if ((sctlr & ~((0x7 << 11) | (1 << 6) | 1)) != 0x00C50038) {
464
465
466
467
		fprintf(stderr, "Unexpected SCTLR (%08X)\n", sctlr);
		exit(1);
	}

468
	if (!(sctlr & 1)) {
469
470
		pr_info("MMU is not enabled by BROM\n");
		return NULL;
471
472
	}

473
	dacr = aw_get_dacr(dev, soc_info);
474
475
476
477
478
	if (dacr != 0x55555555) {
		fprintf(stderr, "Unexpected DACR (%08X)\n", dacr);
		exit(1);
	}

479
	ttbcr = aw_get_ttbcr(dev, soc_info);
480
481
	if (ttbcr != 0x00000000) {
		fprintf(stderr, "Unexpected TTBCR (%08X)\n", ttbcr);
482
483
484
		exit(1);
	}

485
	ttbr0 = aw_get_ttbr0(dev, soc_info);
486
487
488
489
490
	if (ttbr0 & 0x3FFF) {
		fprintf(stderr, "Unexpected TTBR0 (%08X)\n", ttbr0);
		exit(1);
	}

491
	tt = malloc(16 * 1024);
492
	pr_info("Reading the MMU translation table from 0x%08X\n", ttbr0);
493
	aw_fel_read(dev, ttbr0, tt, 16 * 1024);
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
	for (i = 0; i < 4096; i++)
		tt[i] = le32toh(tt[i]);

	/* Basic sanity checks to be sure that this is a valid table */
	for (i = 0; i < 4096; i++) {
		if (((tt[i] >> 1) & 1) != 1 || ((tt[i] >> 18) & 1) != 0) {
			fprintf(stderr, "MMU: not a section descriptor\n");
			exit(1);
		}
		if ((tt[i] >> 20) != i) {
			fprintf(stderr, "MMU: not a direct mapping\n");
			exit(1);
		}
	}

509
	pr_info("Disabling I-cache, MMU and branch prediction...");
510
511
	aw_fel_write(dev, arm_code, soc_info->scratch_addr, sizeof(arm_code));
	aw_fel_execute(dev, soc_info->scratch_addr);
512
513
514
515
516
	pr_info(" done.\n");

	return tt;
}

517
void aw_restore_and_enable_mmu(feldev_handle *dev,
518
                               soc_info_t *soc_info,
519
                               uint32_t *tt)
520
521
{
	uint32_t i;
522
	uint32_t ttbr0 = aw_get_ttbr0(dev, soc_info);
523
524

	uint32_t arm_code[] = {
525
526
527
528
529
530
531
532
		/* Invalidate I-cache, TLB and BTB */
		htole32(0xe3a00000), /* mov        r0, #0                    */
		htole32(0xee080f17), /* mcr        15, 0, r0, cr8, cr7, {0}  */
		htole32(0xee070f15), /* mcr        15, 0, r0, cr7, cr5, {0}  */
		htole32(0xee070fd5), /* mcr        15, 0, r0, cr7, cr5, {6}  */
		htole32(0xf57ff04f), /* dsb        sy                        */
		htole32(0xf57ff06f), /* isb        sy                        */
		/* Enable I-cache, MMU and branch prediction */
533
534
		htole32(0xee110f10), /* mrc        15, 0, r0, cr1, cr0, {0}  */
		htole32(0xe3800001), /* orr        r0, r0, #1                */
535
536
		htole32(0xe3800a01), /* orr        r0, r0, #4096             */
		htole32(0xe3800b02), /* orr        r0, r0, #2048             */
537
538
539
540
541
		htole32(0xee010f10), /* mcr        15, 0, r0, cr1, cr0, {0}  */
		/* Return back to FEL */
		htole32(0xe12fff1e), /* bx         lr                        */
	};

542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
	pr_info("Setting write-combine mapping for DRAM.\n");
	for (i = (DRAM_BASE >> 20); i < ((DRAM_BASE + DRAM_SIZE) >> 20); i++) {
		/* Clear TEXCB bits */
		tt[i] &= ~((7 << 12) | (1 << 3) | (1 << 2));
		/* Set TEXCB to 00100 (Normal uncached mapping) */
		tt[i] |= (1 << 12);
	}

	pr_info("Setting cached mapping for BROM.\n");
	/* Clear TEXCB bits first */
	tt[0xFFF] &= ~((7 << 12) | (1 << 3) | (1 << 2));
	/* Set TEXCB to 00111 (Normal write-back cached mapping) */
	tt[0xFFF] |= (1 << 12) | /* TEX */
		     (1 << 3)  | /* C */
		     (1 << 2);   /* B */

558
559
560
	pr_info("Writing back the MMU translation table.\n");
	for (i = 0; i < 4096; i++)
		tt[i] = htole32(tt[i]);
561
	aw_fel_write(dev, tt, ttbr0, 16 * 1024);
562

563
	pr_info("Enabling I-cache, MMU and branch prediction...");
564
565
	aw_fel_write(dev, arm_code, soc_info->scratch_addr, sizeof(arm_code));
	aw_fel_execute(dev, soc_info->scratch_addr);
566
567
568
569
570
	pr_info(" done.\n");

	free(tt);
}

571
572
573
574
/*
 * Maximum size of SPL, at the same time this is the start offset
 * of the main U-Boot image within u-boot-sunxi-with-spl.bin
 */
575
#define SPL_LEN_LIMIT 0x8000
576

577
void aw_fel_write_and_execute_spl(feldev_handle *dev, uint8_t *buf, size_t len)
578
{
579
	soc_info_t *soc_info = dev->soc_info;
580
581
582
583
	sram_swap_buffers *swap_buffers;
	char header_signature[9] = { 0 };
	size_t i, thunk_size;
	uint32_t *thunk_buf;
584
	uint32_t sp, sp_irq;
585
	uint32_t spl_checksum, spl_len, spl_len_limit = SPL_LEN_LIMIT;
586
	uint32_t *buf32 = (uint32_t *)buf;
587
	uint32_t cur_addr = soc_info->spl_addr;
588
	uint32_t *tt = NULL;
589

590
	if (!soc_info || !soc_info->swap_buffers) {
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
		fprintf(stderr, "SPL: Unsupported SoC type\n");
		exit(1);
	}

	if (len < 32 || memcmp(buf + 4, "eGON.BT0", 8) != 0) {
		fprintf(stderr, "SPL: eGON header is not found\n");
		exit(1);
	}

	spl_checksum = 2 * le32toh(buf32[3]) - 0x5F0A6C39;
	spl_len = le32toh(buf32[4]);

	if (spl_len > len || (spl_len % 4) != 0) {
		fprintf(stderr, "SPL: bad length in the eGON header\n");
		exit(1);
	}

	len = spl_len;
	for (i = 0; i < len / 4; i++)
		spl_checksum -= le32toh(buf32[i]);

	if (spl_checksum != 0) {
		fprintf(stderr, "SPL: checksum check failed\n");
		exit(1);
	}

617
	if (soc_info->needs_l2en) {
618
		pr_info("Enabling the L2 cache\n");
619
		aw_enable_l2_cache(dev, soc_info);
620
621
	}

622
	aw_get_stackinfo(dev, soc_info, &sp_irq, &sp);
623
624
	pr_info("Stack pointers: sp_irq=0x%08X, sp=0x%08X\n", sp_irq, sp);

625
	tt = aw_backup_and_disable_mmu(dev, soc_info);
626
627
	if (!tt && soc_info->mmu_tt_addr) {
		if (soc_info->mmu_tt_addr & 0x3FFF) {
628
629
630
631
			fprintf(stderr, "SPL: 'mmu_tt_addr' must be 16K aligned\n");
			exit(1);
		}
		pr_info("Generating the new MMU translation table at 0x%08X\n",
632
		        soc_info->mmu_tt_addr);
633
634
635
636
637
638
639
640
641
642
		/*
		 * These settings are used by the BROM in A10/A13/A20 and
		 * we replicate them here when enabling the MMU. The DACR
		 * value 0x55555555 means that accesses are checked against
		 * the permission bits in the translation tables for all
		 * domains. The TTBCR value 0x00000000 means that the short
		 * descriptor translation table format is used, TTBR0 is used
		 * for all the possible virtual addresses (N=0) and that the
		 * translation table must be aligned at a 16K boundary.
		 */
643
644
645
		aw_set_dacr(dev, soc_info, 0x55555555);
		aw_set_ttbcr(dev, soc_info, 0x00000000);
		aw_set_ttbr0(dev, soc_info, soc_info->mmu_tt_addr);
646
647
		tt = aw_generate_mmu_translation_table();
	}
648

649
	swap_buffers = soc_info->swap_buffers;
650
	for (i = 0; swap_buffers[i].size; i++) {
651
652
653
		if ((swap_buffers[i].buf2 >= soc_info->spl_addr) &&
		    (swap_buffers[i].buf2 < soc_info->spl_addr + spl_len_limit))
			spl_len_limit = swap_buffers[i].buf2 - soc_info->spl_addr;
654
655
		if (len > 0 && cur_addr < swap_buffers[i].buf1) {
			uint32_t tmp = swap_buffers[i].buf1 - cur_addr;
656
657
			if (tmp > len)
				tmp = len;
658
			aw_fel_write(dev, buf, cur_addr, tmp);
659
			cur_addr += tmp;
660
661
662
			buf += tmp;
			len -= tmp;
		}
663
		if (len > 0 && cur_addr == swap_buffers[i].buf1) {
664
665
666
			uint32_t tmp = swap_buffers[i].size;
			if (tmp > len)
				tmp = len;
667
			aw_fel_write(dev, buf, swap_buffers[i].buf2, tmp);
668
			cur_addr += tmp;
669
670
671
672
673
674
			buf += tmp;
			len -= tmp;
		}
	}

	/* Clarify the SPL size limitations, and bail out if they are not met */
675
676
	if (soc_info->thunk_addr < spl_len_limit)
		spl_len_limit = soc_info->thunk_addr;
677
678
679
680
681
682
683
684
685

	if (spl_len > spl_len_limit) {
		fprintf(stderr, "SPL: too large (need %d, have %d)\n",
			(int)spl_len, (int)spl_len_limit);
		exit(1);
	}

	/* Write the remaining part of the SPL */
	if (len > 0)
686
		aw_fel_write(dev, buf, cur_addr, len);
687

688
	thunk_size = sizeof(fel_to_spl_thunk) + sizeof(soc_info->spl_addr) +
689
		     (i + 1) * sizeof(*swap_buffers);
690

691
	if (thunk_size > soc_info->thunk_size) {
692
		fprintf(stderr, "SPL: bad thunk size (need %d, have %d)\n",
693
			(int)sizeof(fel_to_spl_thunk), soc_info->thunk_size);
694
695
696
697
698
699
		exit(1);
	}

	thunk_buf = malloc(thunk_size);
	memcpy(thunk_buf, fel_to_spl_thunk, sizeof(fel_to_spl_thunk));
	memcpy(thunk_buf + sizeof(fel_to_spl_thunk) / sizeof(uint32_t),
700
	       &soc_info->spl_addr, sizeof(soc_info->spl_addr));
701
	memcpy(thunk_buf + sizeof(fel_to_spl_thunk) / sizeof(uint32_t) + 1,
702
703
704
705
706
	       swap_buffers, (i + 1) * sizeof(*swap_buffers));

	for (i = 0; i < thunk_size / sizeof(uint32_t); i++)
		thunk_buf[i] = htole32(thunk_buf[i]);

707
	pr_info("=> Executing the SPL...");
708
709
	aw_fel_write(dev, thunk_buf, soc_info->thunk_addr, thunk_size);
	aw_fel_execute(dev, soc_info->thunk_addr);
710
	pr_info(" done.\n");
711
712
713
714
715
716
717

	free(thunk_buf);

	/* TODO: Try to find and fix the bug, which needs this workaround */
	usleep(250000);

	/* Read back the result and check if everything was fine */
718
	aw_fel_read(dev, soc_info->spl_addr + 4, header_signature, 8);
719
720
721
722
723
	if (strcmp(header_signature, "eGON.FEL") != 0) {
		fprintf(stderr, "SPL: failure code '%s'\n",
			header_signature);
		exit(1);
	}
724

725
	/* re-enable the MMU if it was enabled by BROM */
Bernhard Nortmann's avatar
Bernhard Nortmann committed
726
	if (tt != NULL)
727
		aw_restore_and_enable_mmu(dev, soc_info, tt);
728
729
}

730
731
732
733
734
735
/*
 * This function tests a given buffer address and length for a valid U-Boot
 * image. Upon success, the image data gets transferred to the default memory
 * address stored within the image header; and the function preserves the
 * U-Boot entry point (offset) and size values.
 */
736
void aw_fel_write_uboot_image(feldev_handle *dev, uint8_t *buf, size_t len)
737
738
739
740
741
742
{
	if (len <= HEADER_SIZE)
		return; /* Insufficient size (no actual data), just bail out */

	uint32_t *buf32 = (uint32_t *)buf;

743
744
745
746
747
748
749
750
751
752
753
754
755
756
	/* Check for a valid mkimage header */
	int image_type = get_image_type(buf, len);
	if (image_type <= IH_TYPE_INVALID) {
		switch (image_type) {
		case IH_TYPE_INVALID:
			fprintf(stderr, "Invalid U-Boot image: bad size or signature\n");
			break;
		case IH_TYPE_ARCH_MISMATCH:
			fprintf(stderr, "Invalid U-Boot image: wrong architecture\n");
			break;
		default:
			fprintf(stderr, "Invalid U-Boot image: error code %d\n",
				image_type);
		}
757
758
		exit(1);
	}
759
760
761
	if (image_type != IH_TYPE_FIRMWARE) {
		fprintf(stderr, "U-Boot image type mismatch: "
			"expected IH_TYPE_FIRMWARE, got %02X\n", image_type);
762
763
764
765
		exit(1);
	}
	uint32_t data_size = be32toh(buf32[3]); /* Image Data Size */
	uint32_t load_addr = be32toh(buf32[4]); /* Data Load Address */
766
	if (data_size != len - HEADER_SIZE) {
767
		fprintf(stderr, "U-Boot image data size mismatch: "
768
			"expected %zu, got %u\n", len - HEADER_SIZE, data_size);
769
770
771
772
773
774
		exit(1);
	}
	/* TODO: Verify image data integrity using the checksum field ih_dcrc,
	 * available from be32toh(buf32[6])
	 *
	 * However, this requires CRC routines that mimic their U-Boot
Bernhard Nortmann's avatar
Bernhard Nortmann committed
775
	 * counterparts, namely image_check_dcrc() in ${U-BOOT}/common/image.c
776
777
778
779
780
781
782
783
784
785
786
	 * and crc_wd() in ${U-BOOT}/lib/crc32.c
	 *
	 * It should be investigated if existing CRC routines in sunxi-tools
	 * could be factored out and reused for this purpose - e.g. calc_crc32()
	 * from nand-part-main.c
	 */

	/* If we get here, we're "good to go" (i.e. actually write the data) */
	pr_info("Writing image \"%.*s\", %u bytes @ 0x%08X.\n",
		IH_NMLEN, buf + HEADER_NAME_OFFSET, data_size, load_addr);

787
	aw_write_buffer(dev, buf + HEADER_SIZE, load_addr, data_size, false);
788
789
790
791
792
793
794
795
796

	/* keep track of U-Boot memory region in global vars */
	uboot_entry = load_addr;
	uboot_size = data_size;
}

/*
 * This function handles the common part of both "spl" and "uboot" commands.
 */
797
void aw_fel_process_spl_and_uboot(feldev_handle *dev, const char *filename)
798
799
800
801
802
{
	/* load file into memory buffer */
	size_t size;
	uint8_t *buf = load_file(filename, &size);
	/* write and execute the SPL from the buffer */
803
	aw_fel_write_and_execute_spl(dev, buf, size);
804
	/* check for optional main U-Boot binary (and transfer it, if applicable) */
805
	if (size > SPL_LEN_LIMIT)
806
		aw_fel_write_uboot_image(dev, buf + SPL_LEN_LIMIT, size - SPL_LEN_LIMIT);
807
	free(buf);
808
809
}

810
811
812
813
814
815
816
817
818
819
/*
 * Test the SPL header for our "sunxi" variant. We want to make sure that
 * we can safely use specific header fields to pass information to U-Boot.
 * In case of a missing signature (e.g. Allwinner boot0) or header version
 * mismatch, this function will return "false". If all seems fine,
 * the result is "true".
 */
#define SPL_SIGNATURE			"SPL" /* marks "sunxi" header */
#define SPL_MIN_VERSION			1 /* minimum required version */
#define SPL_MAX_VERSION			1 /* maximum supported version */
820
bool have_sunxi_spl(feldev_handle *dev, uint32_t spl_addr)
821
822
823
{
	uint8_t spl_signature[4];

824
	aw_fel_read(dev, spl_addr + 0x14,
825
826
827
		&spl_signature, sizeof(spl_signature));

	if (memcmp(spl_signature, SPL_SIGNATURE, 3) != 0)
828
		return false; /* signature mismatch, no "sunxi" SPL */
829
830
831
832
833
834

	if (spl_signature[3] < SPL_MIN_VERSION) {
		fprintf(stderr, "sunxi SPL version mismatch: "
			"found 0x%02X < required minimum 0x%02X\n",
			spl_signature[3], SPL_MIN_VERSION);
		fprintf(stderr, "You need to update your U-Boot (mksunxiboot) to a more recent version.\n");
835
		return false;
836
837
838
839
840
841
	}
	if (spl_signature[3] > SPL_MAX_VERSION) {
		fprintf(stderr, "sunxi SPL version mismatch: "
			"found 0x%02X > maximum supported 0x%02X\n",
			spl_signature[3], SPL_MAX_VERSION);
		fprintf(stderr, "You need a more recent version of this (sunxi-tools) fel utility.\n");
842
		return false;
843
	}
844
	return true; /* sunxi SPL and suitable version */
845
846
847
848
}

/*
 * Pass information to U-Boot via specialized fields in the SPL header
849
850
 * (see "boot_file_head" in ${U-BOOT}/arch/arm/include/asm/arch-sunxi/spl.h),
 * providing the boot script address (DRAM location of boot.scr).
851
 */
852
void pass_fel_information(feldev_handle *dev,
853
			  uint32_t script_address, uint32_t uEnv_length)
854
{
855
	soc_info_t *soc_info = dev->soc_info;
856
857

	/* write something _only_ if we have a suitable SPL header */
858
	if (have_sunxi_spl(dev, soc_info->spl_addr)) {
859
860
861
862
863
864
865
		pr_info("Passing boot info via sunxi SPL: "
			"script address = 0x%08X, uEnv length = %u\n",
			script_address, uEnv_length);
		uint32_t transfer[] = {
			htole32(script_address),
			htole32(uEnv_length)
		};
866
		aw_fel_write(dev, transfer,
867
			soc_info->spl_addr + 0x18, sizeof(transfer));
868
869
870
	}
}

871
872
873
874
875
876
877
878
879
/*
 * This function stores a given entry point to the RVBAR address for CPU0,
 * and then writes the Reset Management Register to request a warm boot.
 * It is useful with some AArch64 transitions, e.g. when passing control to
 * ARM Trusted Firmware (ATF) during the boot process of Pine64.
 *
 * The code was inspired by
 * https://github.com/apritzel/u-boot/commit/fda6bd1bf285c44f30ea15c7e6231bf53c31d4a8
 */
880
void aw_rmr_request(feldev_handle *dev, uint32_t entry_point, bool aarch64)
881
{
882
	soc_info_t *soc_info = dev->soc_info;
883
884
	if (!soc_info->rvbar_reg) {
		fprintf(stderr, "ERROR: Can't issue RMR request!\n"
885
886
			"RVBAR is not supported or unknown for your SoC (%s).\n",
			dev->soc_name);
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
		return;
	}

	uint32_t rmr_mode = (1 << 1) | (aarch64 ? 1 : 0); /* RR, AA64 flag */
	uint32_t arm_code[] = {
		htole32(0xe59f0028), /* ldr        r0, [rvbar_reg]          */
		htole32(0xe59f1028), /* ldr        r1, [entry_point]        */
		htole32(0xe5801000), /* str        r1, [r0]                 */
		htole32(0xf57ff04f), /* dsb        sy                       */
		htole32(0xf57ff06f), /* isb        sy                       */

		htole32(0xe59f101c), /* ldr        r1, [rmr_mode]           */
		htole32(0xee1c0f50), /* mrc        15, 0, r0, cr12, cr0, {2}*/
		htole32(0xe1800001), /* orr        r0, r0, r1               */
		htole32(0xee0c0f50), /* mcr        15, 0, r0, cr12, cr0, {2}*/
		htole32(0xf57ff06f), /* isb        sy                       */

		htole32(0xe320f003), /* loop:      wfi                      */
		htole32(0xeafffffd), /* b          <loop>                   */

		htole32(soc_info->rvbar_reg),
		htole32(entry_point),
		htole32(rmr_mode)
	};
	/* scratch buffer setup: transfers ARM code and parameter values */
912
	aw_fel_write(dev, arm_code, soc_info->scratch_addr, sizeof(arm_code));
913
914
915
916
	/* execute the thunk code (triggering a warm reset on the SoC) */
	pr_info("Store entry point 0x%08X to RVBAR 0x%08X, "
		"and request warm reset with RMR mode %u...",
		entry_point, soc_info->rvbar_reg, rmr_mode);
917
	aw_fel_execute(dev, soc_info->scratch_addr);
918
919
920
	pr_info(" done.\n");
}

921
922
923
924
925
926
927
928
/* check buffer for magic "#=uEnv", indicating uEnv.txt compatible format */
static bool is_uEnv(void *buffer, size_t size)
{
	if (size <= 6)
		return false; /* insufficient size */
	return memcmp(buffer, "#=uEnv", 6) == 0;
}

929
/* private helper function, gets used for "write*" and "multi*" transfers */
930
static unsigned int file_upload(feldev_handle *dev, size_t count,
931
				size_t argc, char **argv, progress_cb_t callback)
932
933
934
935
936
937
938
939
940
941
942
943
944
{
	if (argc < count * 2) {
		fprintf(stderr, "error: too few arguments for uploading %zu files\n",
			count);
		exit(1);
	}

	/* get all file sizes, keeping track of total bytes */
	size_t size = 0;
	unsigned int i;
	for (i = 0; i < count; i++)
		size += file_size(argv[i * 2 + 1]);

945
	progress_start(callback, size); /* set total size and progress callback */
946
947
948
949
950
951

	/* now transfer each file in turn */
	for (i = 0; i < count; i++) {
		void *buf = load_file(argv[i * 2 + 1], &size);
		if (size > 0) {
			uint32_t offset = strtoul(argv[i * 2], NULL, 0);
952
			aw_write_buffer(dev, buf, offset, size, callback != NULL);
953

Bernhard Nortmann's avatar
Bernhard Nortmann committed
954
			/* If we transferred a script, try to inform U-Boot about its address. */
955
			if (get_image_type(buf, size) == IH_TYPE_SCRIPT)
956
				pass_fel_information(dev, offset, 0);
957
			if (is_uEnv(buf, size)) /* uEnv-style data */
958
				pass_fel_information(dev, offset, size);
959
960
961
962
		}
		free(buf);
	}

Bernhard Nortmann's avatar
Bernhard Nortmann committed
963
	return i; /* return number of files that were processed */
964
965
}

966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
static void felusb_list_devices(void)
{
	size_t devices; /* FEL device count */
	feldev_list_entry *list, *entry;

	list = list_fel_devices(&devices);
	for (entry = list; entry->soc_version.soc_id; entry++) {
		printf("USB device %03d:%03d   Allwinner %-8s",
			entry->busnum, entry->devnum, entry->soc_name);
		/* output SID only if non-zero */
		if (entry->SID[0] | entry->SID[1] | entry->SID[2] | entry->SID[3])
			printf("%08x:%08x:%08x:%08x",
			       entry->SID[0], entry->SID[1], entry->SID[2], entry->SID[3]);
		putchar('\n');
	}
	free(list);

	if (verbose && devices == 0)
		fprintf(stderr, "No Allwinner devices in FEL mode detected.\n");

	feldev_done(NULL);
	exit(devices > 0 ? EXIT_SUCCESS : EXIT_FAILURE);
}

990
991
int main(int argc, char **argv)
{
992
	bool uboot_autostart = false; /* flag for "uboot" command = U-Boot autostart */
993
	bool pflag_active = false; /* -p switch, causing "write" to output progress */
994
	bool device_list = false; /* -l switch, prints device list and exits */
995
	feldev_handle *handle;
996
	int busnum = -1, devnum = -1;
997
998

	if (argc <= 1) {
999
		puts("sunxi-fel " VERSION "\n");
1000
1001
		printf("Usage: %s [options] command arguments... [command...]\n"
			"	-v, --verbose			Verbose logging\n"
1002
			"	-p, --progress			\"write\" transfers show a progress bar\n"
1003
			"	-l, --list			Enumerate all (USB) FEL devices and exit\n"
1004
			"	-d, --dev bus:devnum		Use specific USB bus and device number\n"
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
			"\n"
			"	spl file			Load and execute U-Boot SPL\n"
			"		If file additionally contains a main U-Boot binary\n"
			"		(u-boot-sunxi-with-spl.bin), this command also transfers that\n"
			"		to memory (default address from image), but won't execute it.\n"
			"\n"
			"	uboot file-with-spl		like \"spl\", but actually starts U-Boot\n"
			"		U-Boot execution will take place when the fel utility exits.\n"
			"		This allows combining \"uboot\" with further \"write\" commands\n"
			"		(to transfer other files needed for the boot).\n"
			"\n"
1016
1017
1018
			"	hex[dump] address length	Dumps memory region in hex\n"
			"	dump address length		Binary memory dump\n"
			"	exe[cute] address		Call function address\n"
1019
			"	reset64 address			RMR request for AArch64 warm boot\n"
1020
1021
			"	readl address			Read 32-bit value from device memory\n"
			"	writel address value		Write 32-bit value to device memory\n"
1022
			"	read address length file	Write memory contents into file\n"
1023
			"	write address file		Store file contents into memory\n"
1024
			"	write-with-progress addr file	\"write\" with progress bar\n"
1025
1026
			"	write-with-gauge addr file	Output progress for \"dialog --gauge\"\n"
			"	write-with-xgauge addr file	Extended gauge output (updates prompt)\n"
1027
1028
			"	multi[write] # addr file ...	\"write-with-progress\" multiple files,\n"
			"					sharing a common progress status\n"
1029
1030
1031
			"	multi[write]-with-gauge ...	like their \"write-with-*\" counterpart,\n"
			"	multi[write]-with-xgauge ...	  but following the 'multi' syntax:\n"
			"					  <#> addr file [addr file [...]]\n"
1032
			"	echo-gauge \"some text\"		Update prompt/caption for gauge output\n"
1033
			"	ver[sion]			Show BROM version\n"
1034
			"	sid				Retrieve and output 128-bit SID key\n"
1035
			"	clear address length		Clear memory\n"
Henrik Nordstrom's avatar
Henrik Nordstrom committed
1036
			"	fill address length value	Fill memory\n"
1037
1038
			, argv[0]
		);
1039
		exit(0);
1040
1041
	}

1042
1043
1044
1045
1046
1047
	/* process all "prefix"-type arguments first */
	while (argc > 1) {
		if (strcmp(argv[1], "--verbose") == 0 || strcmp(argv[1], "-v") == 0)
			verbose = true;
		else if (strcmp(argv[1], "--progress") == 0 || strcmp(argv[1], "-p") == 0)
			pflag_active = true;
1048
1049
1050
		else if (strcmp(argv[1], "--list") == 0 || strcmp(argv[1], "-l") == 0
			 || strcmp(argv[1], "list") == 0)
			device_list = true;
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
		else if (strncmp(argv[1], "--dev", 5) == 0 || strncmp(argv[1], "-d", 2) == 0) {
			char *dev_arg = argv[1];
			dev_arg += strspn(dev_arg, "-dev="); /* skip option chars, ignore '=' */
			if (*dev_arg == 0 && argc > 2) { /* at end of argument, use the next one instead */
				dev_arg = argv[2];
				argc -= 1;
				argv += 1;
			}
			if (sscanf(dev_arg, "%d:%d", &busnum, &devnum) != 2
			    || busnum <= 0 || devnum <= 0) {
				fprintf(stderr, "ERROR: Expected 'bus:devnum', got '%s'.\n", dev_arg);
				exit(1);
			}
1064
			pr_info("Selecting USB Bus %03d Device %03d\n", busnum, devnum);
1065
1066
1067
1068
		} else
			break; /* no valid (prefix) option detected, exit loop */
		argc -= 1;
		argv += 1;
1069
	}
1070

1071
1072
1073
	if (device_list)
		felusb_list_devices(); /* and exit program afterwards */

1074
	handle = feldev_open(busnum, devnum, AW_USB_VENDOR_ID, AW_USB_PRODUCT_ID);
1075

1076
1077
	while (argc > 1 ) {
		int skip = 1;
1078

1079
		if (strncmp(argv[1], "hex", 3) == 0 && argc > 3) {
1080
1081
1082
1083
1084
			aw_fel_hexdump(handle, strtoul(argv[2], NULL, 0), strtoul(argv[3], NULL, 0));
			skip = 3;
		} else if (strncmp(argv[1], "dump", 4) == 0 && argc > 3) {
			aw_fel_dump(handle, strtoul(argv[2], NULL, 0), strtoul(argv[3], NULL, 0));
			skip = 3;
1085
		} else if (strcmp(argv[1], "readl") == 0 && argc > 2) {
1086
			printf("0x%08x\n", fel_readl(handle, strtoul(argv[2], NULL, 0)));
1087
1088
			skip = 2;
		} else if (strcmp(argv[1], "writel") == 0 && argc > 3) {
1089
			fel_writel(handle, strtoul(argv[2], NULL, 0), strtoul(argv[3], NULL, 0));
1090
			skip = 3;
1091
		} else if (strncmp(argv[1], "exe", 3) == 0 && argc > 2) {
1092
1093
			aw_fel_execute(handle, strtoul(argv[2], NULL, 0));
			skip=3;
1094
1095
1096
1097
1098
		} else if (strcmp(argv[1], "reset64") == 0 && argc > 2) {
			aw_rmr_request(handle, strtoul(argv[2], NULL, 0), true);
			/* Cancel U-Boot autostart, and stop processing args */
			uboot_autostart = false;
			break;
1099
		} else if (strncmp(argv[1], "ver", 3) == 0) {
1100
			aw_fel_print_version(handle);
1101
1102
		} else if (strcmp(argv[1], "sid") == 0) {
			aw_fel_print_sid(handle);
1103
		} else if (strcmp(argv[1], "write") == 0 && argc > 3) {
1104
1105
			skip += 2 * file_upload(handle, 1, argc - 2, argv + 2,
					pflag_active ? progress_bar : NULL);
1106
1107
1108
		} else if (strcmp(argv[1], "write-with-progress") == 0 && argc > 3) {
			skip += 2 * file_upload(handle, 1, argc - 2, argv + 2,
						progress_bar);
1109
1110
1111
1112
1113
1114
		} else if (strcmp(argv[1], "write-with-gauge") == 0 && argc > 3) {
			skip += 2 * file_upload(handle, 1, argc - 2, argv + 2,
						progress_gauge);
		} else if (strcmp(argv[1], "write-with-xgauge") == 0 && argc > 3) {
			skip += 2 * file_upload(handle, 1, argc - 2, argv + 2,
						progress_gauge_xxx);
1115
1116
1117
1118
1119
		} else if ((strcmp(argv[1], "multiwrite") == 0 ||
			    strcmp(argv[1], "multi") == 0) && argc > 4) {
			size_t count = strtoul(argv[2], NULL, 0); /* file count */
			skip = 2 + 2 * file_upload(handle, count, argc - 3,
						   argv + 3, progress_bar);
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
		} else if ((strcmp(argv[1], "multiwrite-with-gauge") == 0 ||
			    strcmp(argv[1], "multi-with-gauge") == 0) && argc > 4) {
			size_t count = strtoul(argv[2], NULL, 0); /* file count */
			skip = 2 + 2 * file_upload(handle, count, argc - 3,
						   argv + 3, progress_gauge);
		} else if ((strcmp(argv[1], "multiwrite-with-xgauge") == 0 ||
			    strcmp(argv[1], "multi-with-xgauge") == 0) && argc > 4) {
			size_t count = strtoul(argv[2], NULL, 0); /* file count */
			skip = 2 + 2 * file_upload(handle, count, argc - 3,
						   argv + 3, progress_gauge_xxx);
1130
1131
1132
1133
		} else if ((strcmp(argv[1], "echo-gauge") == 0) && argc > 2) {
			skip = 2;
			printf("XXX\n0\n%s\nXXX\n", argv[2]);
			fflush(stdout);
1134
1135
1136
1137
1138
1139
1140
		} else if (strcmp(argv[1], "read") == 0 && argc > 4) {
			size_t size = strtoul(argv[3], NULL, 0);
			void *buf = malloc(size);
			aw_fel_read(handle, strtoul(argv[2], NULL, 0), buf, size);
			save_file(argv[4], buf, size);
			free(buf);
			skip=4;
1141
		} else if (strcmp(argv[1], "clear") == 0 && argc > 2) {
Henrik Nordstrom's avatar
Henrik Nordstrom committed
1142
			aw_fel_fill(handle, strtoul(argv[2], NULL, 0), strtoul(argv[3], NULL, 0), 0);
1143
			skip=3;
Henrik Nordstrom's avatar
Henrik Nordstrom committed
1144
1145
1146
		} else if (strcmp(argv[1], "fill") == 0 && argc > 3) {
			aw_fel_fill(handle, strtoul(argv[2], NULL, 0), strtoul(argv[3], NULL, 0), (unsigned char)strtoul(argv[4], NULL, 0));
			skip=4;
1147
		} else if (strcmp(argv[1], "spl") == 0 && argc > 2) {
1148
1149
1150
1151
			aw_fel_process_spl_and_uboot(handle, argv[2]);
			skip=2;
		} else if (strcmp(argv[1], "uboot") == 0 && argc > 2) {
			aw_fel_process_spl_and_uboot(handle, argv[2]);
1152
1153
			uboot_autostart = (uboot_entry > 0 && uboot_size > 0);
			if (!uboot_autostart)
1154
				printf("Warning: \"uboot\" command failed to detect image! Can't execute U-Boot.\n");
1155
			skip=2;
1156
1157
1158
1159
1160
1161
1162
1163
		} else {
			fprintf(stderr,"Invalid command %s\n", argv[1]);
			exit(1);
		}
		argc-=skip;
		argv+=skip;
	}

Bernhard Nortmann's avatar
Bernhard Nortmann committed
1164
	/* auto-start U-Boot if requested (by the "uboot" command) */
1165
	if (uboot_autostart) {
1166
1167
1168
1169
		pr_info("Starting U-Boot (0x%08X).\n", uboot_entry);
		aw_fel_execute(handle, uboot_entry);
	}

1170
	feldev_done(handle);
1171

1172
1173
	return 0;
}