]> git.karo-electronics.de Git - karo-tx-uboot.git/blob - tools/kwbimage.c
ARM: DRA7: emif: Fix disabling/enabling of refreshes
[karo-tx-uboot.git] / tools / kwbimage.c
1 /*
2  * Image manipulator for Marvell SoCs
3  *  supports Kirkwood, Dove, Armada 370, and Armada XP
4  *
5  * (C) Copyright 2013 Thomas Petazzoni
6  * <thomas.petazzoni@free-electrons.com>
7  *
8  * SPDX-License-Identifier:     GPL-2.0+
9  *
10  * Not implemented: support for the register headers and secure
11  * headers in v1 images
12  */
13
14 #include "imagetool.h"
15 #include <limits.h>
16 #include <image.h>
17 #include <stdint.h>
18 #include "kwbimage.h"
19
20 #define ALIGN_SUP(x, a) (((x) + (a - 1)) & ~(a - 1))
21
22 /* Structure of the main header, version 0 (Kirkwood, Dove) */
23 struct main_hdr_v0 {
24         uint8_t  blockid;               /*0     */
25         uint8_t  nandeccmode;           /*1     */
26         uint16_t nandpagesize;          /*2-3   */
27         uint32_t blocksize;             /*4-7   */
28         uint32_t rsvd1;                 /*8-11  */
29         uint32_t srcaddr;               /*12-15 */
30         uint32_t destaddr;              /*16-19 */
31         uint32_t execaddr;              /*20-23 */
32         uint8_t  satapiomode;           /*24    */
33         uint8_t  rsvd3;                 /*25    */
34         uint16_t ddrinitdelay;          /*26-27 */
35         uint16_t rsvd2;                 /*28-29 */
36         uint8_t  ext;                   /*30    */
37         uint8_t  checksum;              /*31    */
38 };
39
40 struct ext_hdr_v0_reg {
41         uint32_t raddr;
42         uint32_t rdata;
43 };
44
45 #define EXT_HDR_V0_REG_COUNT ((0x1dc - 0x20) / sizeof(struct ext_hdr_v0_reg))
46
47 struct ext_hdr_v0 {
48         uint32_t              offset;
49         uint8_t               reserved[0x20 - sizeof(uint32_t)];
50         struct ext_hdr_v0_reg rcfg[EXT_HDR_V0_REG_COUNT];
51         uint8_t               reserved2[7];
52         uint8_t               checksum;
53 };
54
55 /* Structure of the main header, version 1 (Armada 370, Armada XP) */
56 struct main_hdr_v1 {
57         uint8_t  blockid;               /* 0 */
58         uint8_t  reserved1;             /* 1 */
59         uint16_t reserved2;             /* 2-3 */
60         uint32_t blocksize;             /* 4-7 */
61         uint8_t  version;               /* 8 */
62         uint8_t  headersz_msb;          /* 9 */
63         uint16_t headersz_lsb;          /* A-B */
64         uint32_t srcaddr;               /* C-F */
65         uint32_t destaddr;              /* 10-13 */
66         uint32_t execaddr;              /* 14-17 */
67         uint8_t  reserved3;             /* 18 */
68         uint8_t  nandblocksize;         /* 19 */
69         uint8_t  nandbadblklocation;    /* 1A */
70         uint8_t  reserved4;             /* 1B */
71         uint16_t reserved5;             /* 1C-1D */
72         uint8_t  ext;                   /* 1E */
73         uint8_t  checksum;              /* 1F */
74 };
75
76 /*
77  * Header for the optional headers, version 1 (Armada 370, Armada XP)
78  */
79 struct opt_hdr_v1 {
80         uint8_t  headertype;
81         uint8_t  headersz_msb;
82         uint16_t headersz_lsb;
83         char     data[0];
84 };
85
86 /*
87  * Various values for the opt_hdr_v1->headertype field, describing the
88  * different types of optional headers. The "secure" header contains
89  * informations related to secure boot (encryption keys, etc.). The
90  * "binary" header contains ARM binary code to be executed prior to
91  * executing the main payload (usually the bootloader). This is
92  * typically used to execute DDR3 training code. The "register" header
93  * allows to describe a set of (address, value) tuples that are
94  * generally used to configure the DRAM controller.
95  */
96 #define OPT_HDR_V1_SECURE_TYPE   0x1
97 #define OPT_HDR_V1_BINARY_TYPE   0x2
98 #define OPT_HDR_V1_REGISTER_TYPE 0x3
99
100 #define KWBHEADER_V1_SIZE(hdr) \
101         (((hdr)->headersz_msb << 16) | (hdr)->headersz_lsb)
102
103 static struct image_cfg_element *image_cfg;
104 static int cfgn;
105
106 struct boot_mode {
107         unsigned int id;
108         const char *name;
109 };
110
111 struct boot_mode boot_modes[] = {
112         { 0x4D, "i2c"  },
113         { 0x5A, "spi"  },
114         { 0x8B, "nand" },
115         { 0x78, "sata" },
116         { 0x9C, "pex"  },
117         { 0x69, "uart" },
118         { 0xAE, "sdio" },
119         {},
120 };
121
122 struct nand_ecc_mode {
123         unsigned int id;
124         const char *name;
125 };
126
127 struct nand_ecc_mode nand_ecc_modes[] = {
128         { 0x00, "default" },
129         { 0x01, "hamming" },
130         { 0x02, "rs" },
131         { 0x03, "disabled" },
132         {},
133 };
134
135 /* Used to identify an undefined execution or destination address */
136 #define ADDR_INVALID ((uint32_t)-1)
137
138 #define BINARY_MAX_ARGS 8
139
140 /* In-memory representation of a line of the configuration file */
141 struct image_cfg_element {
142         enum {
143                 IMAGE_CFG_VERSION = 0x1,
144                 IMAGE_CFG_BOOT_FROM,
145                 IMAGE_CFG_DEST_ADDR,
146                 IMAGE_CFG_EXEC_ADDR,
147                 IMAGE_CFG_NAND_BLKSZ,
148                 IMAGE_CFG_NAND_BADBLK_LOCATION,
149                 IMAGE_CFG_NAND_ECC_MODE,
150                 IMAGE_CFG_NAND_PAGESZ,
151                 IMAGE_CFG_BINARY,
152                 IMAGE_CFG_PAYLOAD,
153                 IMAGE_CFG_DATA,
154         } type;
155         union {
156                 unsigned int version;
157                 unsigned int bootfrom;
158                 struct {
159                         const char *file;
160                         unsigned int args[BINARY_MAX_ARGS];
161                         unsigned int nargs;
162                 } binary;
163                 const char *payload;
164                 unsigned int dstaddr;
165                 unsigned int execaddr;
166                 unsigned int nandblksz;
167                 unsigned int nandbadblklocation;
168                 unsigned int nandeccmode;
169                 unsigned int nandpagesz;
170                 struct ext_hdr_v0_reg regdata;
171         };
172 };
173
174 #define IMAGE_CFG_ELEMENT_MAX 256
175
176 /*
177  * Byte 8 of the image header contains the version number. In the v0
178  * header, byte 8 was reserved, and always set to 0. In the v1 header,
179  * byte 8 has been changed to a proper field, set to 1.
180  */
181 static unsigned int image_version(void *header)
182 {
183         unsigned char *ptr = header;
184         return ptr[8];
185 }
186
187 /*
188  * Utility functions to manipulate boot mode and ecc modes (convert
189  * them back and forth between description strings and the
190  * corresponding numerical identifiers).
191  */
192
193 static const char *image_boot_mode_name(unsigned int id)
194 {
195         int i;
196         for (i = 0; boot_modes[i].name; i++)
197                 if (boot_modes[i].id == id)
198                         return boot_modes[i].name;
199         return NULL;
200 }
201
202 int image_boot_mode_id(const char *boot_mode_name)
203 {
204         int i;
205         for (i = 0; boot_modes[i].name; i++)
206                 if (!strcmp(boot_modes[i].name, boot_mode_name))
207                         return boot_modes[i].id;
208
209         return -1;
210 }
211
212 int image_nand_ecc_mode_id(const char *nand_ecc_mode_name)
213 {
214         int i;
215         for (i = 0; nand_ecc_modes[i].name; i++)
216                 if (!strcmp(nand_ecc_modes[i].name, nand_ecc_mode_name))
217                         return nand_ecc_modes[i].id;
218         return -1;
219 }
220
221 static struct image_cfg_element *
222 image_find_option(unsigned int optiontype)
223 {
224         int i;
225
226         for (i = 0; i < cfgn; i++) {
227                 if (image_cfg[i].type == optiontype)
228                         return &image_cfg[i];
229         }
230
231         return NULL;
232 }
233
234 static unsigned int
235 image_count_options(unsigned int optiontype)
236 {
237         int i;
238         unsigned int count = 0;
239
240         for (i = 0; i < cfgn; i++)
241                 if (image_cfg[i].type == optiontype)
242                         count++;
243
244         return count;
245 }
246
247 /*
248  * Compute a 8-bit checksum of a memory area. This algorithm follows
249  * the requirements of the Marvell SoC BootROM specifications.
250  */
251 static uint8_t image_checksum8(void *start, uint32_t len)
252 {
253         uint8_t csum = 0;
254         uint8_t *p = start;
255
256         /* check len and return zero checksum if invalid */
257         if (!len)
258                 return 0;
259
260         do {
261                 csum += *p;
262                 p++;
263         } while (--len);
264
265         return csum;
266 }
267
268 static uint32_t image_checksum32(void *start, uint32_t len)
269 {
270         uint32_t csum = 0;
271         uint32_t *p = start;
272
273         /* check len and return zero checksum if invalid */
274         if (!len)
275                 return 0;
276
277         if (len % sizeof(uint32_t)) {
278                 fprintf(stderr, "Length %d is not in multiple of %zu\n",
279                         len, sizeof(uint32_t));
280                 return 0;
281         }
282
283         do {
284                 csum += *p;
285                 p++;
286                 len -= sizeof(uint32_t);
287         } while (len > 0);
288
289         return csum;
290 }
291
292 static void *image_create_v0(size_t *imagesz, struct image_tool_params *params,
293                              int payloadsz)
294 {
295         struct image_cfg_element *e;
296         size_t headersz;
297         struct main_hdr_v0 *main_hdr;
298         struct ext_hdr_v0 *ext_hdr;
299         void *image;
300         int has_ext = 0;
301
302         /*
303          * Calculate the size of the header and the size of the
304          * payload
305          */
306         headersz  = sizeof(struct main_hdr_v0);
307
308         if (image_count_options(IMAGE_CFG_DATA) > 0) {
309                 has_ext = 1;
310                 headersz += sizeof(struct ext_hdr_v0);
311         }
312
313         if (image_count_options(IMAGE_CFG_PAYLOAD) > 1) {
314                 fprintf(stderr, "More than one payload, not possible\n");
315                 return NULL;
316         }
317
318         image = malloc(headersz);
319         if (!image) {
320                 fprintf(stderr, "Cannot allocate memory for image\n");
321                 return NULL;
322         }
323
324         memset(image, 0, headersz);
325
326         main_hdr = image;
327
328         /* Fill in the main header */
329         main_hdr->blocksize = payloadsz + sizeof(uint32_t) - headersz;
330         main_hdr->srcaddr   = headersz;
331         main_hdr->ext       = has_ext;
332         main_hdr->destaddr  = params->addr;
333         main_hdr->execaddr  = params->ep;
334
335         e = image_find_option(IMAGE_CFG_BOOT_FROM);
336         if (e)
337                 main_hdr->blockid = e->bootfrom;
338         e = image_find_option(IMAGE_CFG_NAND_ECC_MODE);
339         if (e)
340                 main_hdr->nandeccmode = e->nandeccmode;
341         e = image_find_option(IMAGE_CFG_NAND_PAGESZ);
342         if (e)
343                 main_hdr->nandpagesize = e->nandpagesz;
344         main_hdr->checksum = image_checksum8(image,
345                                              sizeof(struct main_hdr_v0));
346
347         /* Generate the ext header */
348         if (has_ext) {
349                 int cfgi, datai;
350
351                 ext_hdr = image + sizeof(struct main_hdr_v0);
352                 ext_hdr->offset = 0x40;
353
354                 for (cfgi = 0, datai = 0; cfgi < cfgn; cfgi++) {
355                         e = &image_cfg[cfgi];
356                         if (e->type != IMAGE_CFG_DATA)
357                                 continue;
358
359                         ext_hdr->rcfg[datai].raddr = e->regdata.raddr;
360                         ext_hdr->rcfg[datai].rdata = e->regdata.rdata;
361                         datai++;
362                 }
363
364                 ext_hdr->checksum = image_checksum8(ext_hdr,
365                                                     sizeof(struct ext_hdr_v0));
366         }
367
368         *imagesz = headersz;
369         return image;
370 }
371
372 static size_t image_headersz_v1(struct image_tool_params *params,
373                                 int *hasext)
374 {
375         struct image_cfg_element *binarye;
376         size_t headersz;
377         int ret;
378
379         /*
380          * Calculate the size of the header and the size of the
381          * payload
382          */
383         headersz = sizeof(struct main_hdr_v1);
384
385         if (image_count_options(IMAGE_CFG_BINARY) > 1) {
386                 fprintf(stderr, "More than one binary blob, not supported\n");
387                 return 0;
388         }
389
390         if (image_count_options(IMAGE_CFG_PAYLOAD) > 1) {
391                 fprintf(stderr, "More than one payload, not possible\n");
392                 return 0;
393         }
394
395         binarye = image_find_option(IMAGE_CFG_BINARY);
396         if (binarye) {
397                 struct stat s;
398
399                 ret = stat(binarye->binary.file, &s);
400                 if (ret < 0) {
401                         char cwd[PATH_MAX];
402                         char *dir = cwd;
403
404                         memset(cwd, 0, sizeof(cwd));
405                         if (!getcwd(cwd, sizeof(cwd))) {
406                                 dir = "current working directory";
407                                 perror("getcwd() failed");
408                         }
409
410                         fprintf(stderr,
411                                 "Didn't find the file '%s' in '%s' which is mandatory to generate the image\n"
412                                 "This file generally contains the DDR3 training code, and should be extracted from an existing bootable\n"
413                                 "image for your board. See 'kwbimage -x' to extract it from an existing image.\n",
414                                 binarye->binary.file, dir);
415                         return 0;
416                 }
417
418                 headersz += s.st_size +
419                         binarye->binary.nargs * sizeof(unsigned int);
420                 if (hasext)
421                         *hasext = 1;
422         }
423
424 #if defined(CONFIG_SYS_U_BOOT_OFFS)
425         if (headersz > CONFIG_SYS_U_BOOT_OFFS) {
426                 fprintf(stderr, "Error: Image header (incl. SPL image) too big!\n");
427                 fprintf(stderr, "header=0x%x CONFIG_SYS_U_BOOT_OFFS=0x%x!\n",
428                         (int)headersz, CONFIG_SYS_U_BOOT_OFFS);
429                 fprintf(stderr, "Increase CONFIG_SYS_U_BOOT_OFFS!\n");
430                 return 0;
431         } else {
432                 headersz = CONFIG_SYS_U_BOOT_OFFS;
433         }
434 #endif
435
436         /*
437          * The payload should be aligned on some reasonable
438          * boundary
439          */
440         return ALIGN_SUP(headersz, 4096);
441 }
442
443 static void *image_create_v1(size_t *imagesz, struct image_tool_params *params,
444                              int payloadsz)
445 {
446         struct image_cfg_element *e, *binarye;
447         struct main_hdr_v1 *main_hdr;
448         size_t headersz;
449         void *image, *cur;
450         int hasext = 0;
451         int ret;
452
453         /*
454          * Calculate the size of the header and the size of the
455          * payload
456          */
457         headersz = image_headersz_v1(params, &hasext);
458         if (headersz == 0)
459                 return NULL;
460
461         image = malloc(headersz);
462         if (!image) {
463                 fprintf(stderr, "Cannot allocate memory for image\n");
464                 return NULL;
465         }
466
467         memset(image, 0, headersz);
468
469         cur = main_hdr = image;
470         cur += sizeof(struct main_hdr_v1);
471
472         /* Fill the main header */
473         main_hdr->blocksize    = payloadsz - headersz + sizeof(uint32_t);
474         main_hdr->headersz_lsb = headersz & 0xFFFF;
475         main_hdr->headersz_msb = (headersz & 0xFFFF0000) >> 16;
476         main_hdr->destaddr     = params->addr;
477         main_hdr->execaddr     = params->ep;
478         main_hdr->srcaddr      = headersz;
479         main_hdr->ext          = hasext;
480         main_hdr->version      = 1;
481         e = image_find_option(IMAGE_CFG_BOOT_FROM);
482         if (e)
483                 main_hdr->blockid = e->bootfrom;
484         e = image_find_option(IMAGE_CFG_NAND_BLKSZ);
485         if (e)
486                 main_hdr->nandblocksize = e->nandblksz / (64 * 1024);
487         e = image_find_option(IMAGE_CFG_NAND_BADBLK_LOCATION);
488         if (e)
489                 main_hdr->nandbadblklocation = e->nandbadblklocation;
490
491         binarye = image_find_option(IMAGE_CFG_BINARY);
492         if (binarye) {
493                 struct opt_hdr_v1 *hdr = cur;
494                 unsigned int *args;
495                 size_t binhdrsz;
496                 struct stat s;
497                 int argi;
498                 FILE *bin;
499
500                 hdr->headertype = OPT_HDR_V1_BINARY_TYPE;
501
502                 bin = fopen(binarye->binary.file, "r");
503                 if (!bin) {
504                         fprintf(stderr, "Cannot open binary file %s\n",
505                                 binarye->binary.file);
506                         return NULL;
507                 }
508
509                 fstat(fileno(bin), &s);
510
511                 binhdrsz = sizeof(struct opt_hdr_v1) +
512                         (binarye->binary.nargs + 1) * sizeof(unsigned int) +
513                         s.st_size;
514                 binhdrsz = ALIGN_SUP(binhdrsz, 32);
515                 hdr->headersz_lsb = binhdrsz & 0xFFFF;
516                 hdr->headersz_msb = (binhdrsz & 0xFFFF0000) >> 16;
517
518                 cur += sizeof(struct opt_hdr_v1);
519
520                 args = cur;
521                 *args = binarye->binary.nargs;
522                 args++;
523                 for (argi = 0; argi < binarye->binary.nargs; argi++)
524                         args[argi] = binarye->binary.args[argi];
525
526                 cur += (binarye->binary.nargs + 1) * sizeof(unsigned int);
527
528                 ret = fread(cur, s.st_size, 1, bin);
529                 if (ret != 1) {
530                         fprintf(stderr,
531                                 "Could not read binary image %s\n",
532                                 binarye->binary.file);
533                         return NULL;
534                 }
535
536                 fclose(bin);
537
538                 cur += s.st_size;
539
540                 /*
541                  * For now, we don't support more than one binary
542                  * header, and no other header types are
543                  * supported. So, the binary header is necessarily the
544                  * last one
545                  */
546                 *((unsigned char *)cur) = 0;
547
548                 cur += sizeof(uint32_t);
549         }
550
551         /* Calculate and set the header checksum */
552         main_hdr->checksum = image_checksum8(main_hdr, headersz);
553
554         *imagesz = headersz;
555         return image;
556 }
557
558 static int image_create_config_parse_oneline(char *line,
559                                              struct image_cfg_element *el)
560 {
561         char *keyword, *saveptr;
562         char deliminiters[] = " \t";
563
564         keyword = strtok_r(line, deliminiters, &saveptr);
565         if (!strcmp(keyword, "VERSION")) {
566                 char *value = strtok_r(NULL, deliminiters, &saveptr);
567                 el->type = IMAGE_CFG_VERSION;
568                 el->version = atoi(value);
569         } else if (!strcmp(keyword, "BOOT_FROM")) {
570                 char *value = strtok_r(NULL, deliminiters, &saveptr);
571                 int ret = image_boot_mode_id(value);
572                 if (ret < 0) {
573                         fprintf(stderr,
574                                 "Invalid boot media '%s'\n", value);
575                         return -1;
576                 }
577                 el->type = IMAGE_CFG_BOOT_FROM;
578                 el->bootfrom = ret;
579         } else if (!strcmp(keyword, "NAND_BLKSZ")) {
580                 char *value = strtok_r(NULL, deliminiters, &saveptr);
581                 el->type = IMAGE_CFG_NAND_BLKSZ;
582                 el->nandblksz = strtoul(value, NULL, 16);
583         } else if (!strcmp(keyword, "NAND_BADBLK_LOCATION")) {
584                 char *value = strtok_r(NULL, deliminiters, &saveptr);
585                 el->type = IMAGE_CFG_NAND_BADBLK_LOCATION;
586                 el->nandbadblklocation =
587                         strtoul(value, NULL, 16);
588         } else if (!strcmp(keyword, "NAND_ECC_MODE")) {
589                 char *value = strtok_r(NULL, deliminiters, &saveptr);
590                 int ret = image_nand_ecc_mode_id(value);
591                 if (ret < 0) {
592                         fprintf(stderr,
593                                 "Invalid NAND ECC mode '%s'\n", value);
594                         return -1;
595                 }
596                 el->type = IMAGE_CFG_NAND_ECC_MODE;
597                 el->nandeccmode = ret;
598         } else if (!strcmp(keyword, "NAND_PAGE_SIZE")) {
599                 char *value = strtok_r(NULL, deliminiters, &saveptr);
600                 el->type = IMAGE_CFG_NAND_PAGESZ;
601                 el->nandpagesz = strtoul(value, NULL, 16);
602         } else if (!strcmp(keyword, "BINARY")) {
603                 char *value = strtok_r(NULL, deliminiters, &saveptr);
604                 int argi = 0;
605
606                 el->type = IMAGE_CFG_BINARY;
607                 el->binary.file = strdup(value);
608                 while (1) {
609                         value = strtok_r(NULL, deliminiters, &saveptr);
610                         if (!value)
611                                 break;
612                         el->binary.args[argi] = strtoul(value, NULL, 16);
613                         argi++;
614                         if (argi >= BINARY_MAX_ARGS) {
615                                 fprintf(stderr,
616                                         "Too many argument for binary\n");
617                                 return -1;
618                         }
619                 }
620                 el->binary.nargs = argi;
621         } else if (!strcmp(keyword, "DATA")) {
622                 char *value1 = strtok_r(NULL, deliminiters, &saveptr);
623                 char *value2 = strtok_r(NULL, deliminiters, &saveptr);
624
625                 if (!value1 || !value2) {
626                         fprintf(stderr,
627                                 "Invalid number of arguments for DATA\n");
628                         return -1;
629                 }
630
631                 el->type = IMAGE_CFG_DATA;
632                 el->regdata.raddr = strtoul(value1, NULL, 16);
633                 el->regdata.rdata = strtoul(value2, NULL, 16);
634         } else {
635                 fprintf(stderr, "Ignoring unknown line '%s'\n", line);
636         }
637
638         return 0;
639 }
640
641 /*
642  * Parse the configuration file 'fcfg' into the array of configuration
643  * elements 'image_cfg', and return the number of configuration
644  * elements in 'cfgn'.
645  */
646 static int image_create_config_parse(FILE *fcfg)
647 {
648         int ret;
649         int cfgi = 0;
650
651         /* Parse the configuration file */
652         while (!feof(fcfg)) {
653                 char *line;
654                 char buf[256];
655
656                 /* Read the current line */
657                 memset(buf, 0, sizeof(buf));
658                 line = fgets(buf, sizeof(buf), fcfg);
659                 if (!line)
660                         break;
661
662                 /* Ignore useless lines */
663                 if (line[0] == '\n' || line[0] == '#')
664                         continue;
665
666                 /* Strip final newline */
667                 if (line[strlen(line) - 1] == '\n')
668                         line[strlen(line) - 1] = 0;
669
670                 /* Parse the current line */
671                 ret = image_create_config_parse_oneline(line,
672                                                         &image_cfg[cfgi]);
673                 if (ret)
674                         return ret;
675
676                 cfgi++;
677
678                 if (cfgi >= IMAGE_CFG_ELEMENT_MAX) {
679                         fprintf(stderr,
680                                 "Too many configuration elements in .cfg file\n");
681                         return -1;
682                 }
683         }
684
685         cfgn = cfgi;
686         return 0;
687 }
688
689 static int image_get_version(void)
690 {
691         struct image_cfg_element *e;
692
693         e = image_find_option(IMAGE_CFG_VERSION);
694         if (!e)
695                 return -1;
696
697         return e->version;
698 }
699
700 static int image_version_file(const char *input)
701 {
702         FILE *fcfg;
703         int version;
704         int ret;
705
706         fcfg = fopen(input, "r");
707         if (!fcfg) {
708                 fprintf(stderr, "Could not open input file %s\n", input);
709                 return -1;
710         }
711
712         image_cfg = malloc(IMAGE_CFG_ELEMENT_MAX *
713                            sizeof(struct image_cfg_element));
714         if (!image_cfg) {
715                 fprintf(stderr, "Cannot allocate memory\n");
716                 fclose(fcfg);
717                 return -1;
718         }
719
720         memset(image_cfg, 0,
721                IMAGE_CFG_ELEMENT_MAX * sizeof(struct image_cfg_element));
722         rewind(fcfg);
723
724         ret = image_create_config_parse(fcfg);
725         fclose(fcfg);
726         if (ret) {
727                 free(image_cfg);
728                 return -1;
729         }
730
731         version = image_get_version();
732         /* Fallback to version 0 is no version is provided in the cfg file */
733         if (version == -1)
734                 version = 0;
735
736         free(image_cfg);
737
738         return version;
739 }
740
741 static void kwbimage_set_header(void *ptr, struct stat *sbuf, int ifd,
742                                 struct image_tool_params *params)
743 {
744         FILE *fcfg;
745         void *image = NULL;
746         int version;
747         size_t headersz = 0;
748         uint32_t checksum;
749         int ret;
750         int size;
751
752         fcfg = fopen(params->imagename, "r");
753         if (!fcfg) {
754                 fprintf(stderr, "Could not open input file %s\n",
755                         params->imagename);
756                 exit(EXIT_FAILURE);
757         }
758
759         image_cfg = malloc(IMAGE_CFG_ELEMENT_MAX *
760                            sizeof(struct image_cfg_element));
761         if (!image_cfg) {
762                 fprintf(stderr, "Cannot allocate memory\n");
763                 fclose(fcfg);
764                 exit(EXIT_FAILURE);
765         }
766
767         memset(image_cfg, 0,
768                IMAGE_CFG_ELEMENT_MAX * sizeof(struct image_cfg_element));
769         rewind(fcfg);
770
771         ret = image_create_config_parse(fcfg);
772         fclose(fcfg);
773         if (ret) {
774                 free(image_cfg);
775                 exit(EXIT_FAILURE);
776         }
777
778         version = image_get_version();
779         switch (version) {
780                 /*
781                  * Fallback to version 0 if no version is provided in the
782                  * cfg file
783                  */
784         case -1:
785         case 0:
786                 image = image_create_v0(&headersz, params, sbuf->st_size);
787                 break;
788
789         case 1:
790                 image = image_create_v1(&headersz, params, sbuf->st_size);
791                 break;
792
793         default:
794                 fprintf(stderr, "Unsupported version %d\n", version);
795                 free(image_cfg);
796                 exit(EXIT_FAILURE);
797         }
798
799         if (!image) {
800                 fprintf(stderr, "Could not create image\n");
801                 free(image_cfg);
802                 exit(EXIT_FAILURE);
803         }
804
805         free(image_cfg);
806
807         /* Build and add image checksum header */
808         checksum = image_checksum32((uint32_t *)ptr, sbuf->st_size);
809         size = write(ifd, &checksum, sizeof(uint32_t));
810         if (size != sizeof(uint32_t)) {
811                 fprintf(stderr, "Error:%s - Checksum write %d bytes %s\n",
812                         params->cmdname, size, params->imagefile);
813                 exit(EXIT_FAILURE);
814         }
815
816         sbuf->st_size += sizeof(uint32_t);
817
818         /* Finally copy the header into the image area */
819         memcpy(ptr, image, headersz);
820
821         free(image);
822 }
823
824 static void kwbimage_print_header(const void *ptr)
825 {
826         struct main_hdr_v0 *mhdr = (struct main_hdr_v0 *)ptr;
827
828         printf("Image Type:   MVEBU Boot from %s Image\n",
829                image_boot_mode_name(mhdr->blockid));
830         printf("Image version:%d\n", image_version((void *)ptr));
831         printf("Data Size:    ");
832         genimg_print_size(mhdr->blocksize - sizeof(uint32_t));
833         printf("Load Address: %08x\n", mhdr->destaddr);
834         printf("Entry Point:  %08x\n", mhdr->execaddr);
835 }
836
837 static int kwbimage_check_image_types(uint8_t type)
838 {
839         if (type == IH_TYPE_KWBIMAGE)
840                 return EXIT_SUCCESS;
841         else
842                 return EXIT_FAILURE;
843 }
844
845 static int kwbimage_verify_header(unsigned char *ptr, int image_size,
846                                   struct image_tool_params *params)
847 {
848         struct main_hdr_v0 *main_hdr;
849         struct ext_hdr_v0 *ext_hdr;
850         uint8_t checksum;
851
852         main_hdr = (void *)ptr;
853         checksum = image_checksum8(ptr,
854                                    sizeof(struct main_hdr_v0)
855                                    - sizeof(uint8_t));
856         if (checksum != main_hdr->checksum)
857                 return -FDT_ERR_BADSTRUCTURE;
858
859         /* Only version 0 extended header has checksum */
860         if (image_version((void *)ptr) == 0) {
861                 ext_hdr = (void *)ptr + sizeof(struct main_hdr_v0);
862                 checksum = image_checksum8(ext_hdr,
863                                            sizeof(struct ext_hdr_v0)
864                                            - sizeof(uint8_t));
865                 if (checksum != ext_hdr->checksum)
866                         return -FDT_ERR_BADSTRUCTURE;
867         }
868
869         return 0;
870 }
871
872 static int kwbimage_generate(struct image_tool_params *params,
873                              struct image_type_params *tparams)
874 {
875         int alloc_len;
876         void *hdr;
877         int version = 0;
878
879         version = image_version_file(params->imagename);
880         if (version == 0) {
881                 alloc_len = sizeof(struct main_hdr_v0) +
882                         sizeof(struct ext_hdr_v0);
883         } else {
884                 alloc_len = image_headersz_v1(params, NULL);
885         }
886
887         hdr = malloc(alloc_len);
888         if (!hdr) {
889                 fprintf(stderr, "%s: malloc return failure: %s\n",
890                         params->cmdname, strerror(errno));
891                 exit(EXIT_FAILURE);
892         }
893
894         memset(hdr, 0, alloc_len);
895         tparams->header_size = alloc_len;
896         tparams->hdr = hdr;
897
898         return 0;
899 }
900
901 /*
902  * Report Error if xflag is set in addition to default
903  */
904 static int kwbimage_check_params(struct image_tool_params *params)
905 {
906         if (!strlen(params->imagename)) {
907                 fprintf(stderr, "Error:%s - Configuration file not specified, "
908                         "it is needed for kwbimage generation\n",
909                         params->cmdname);
910                 return CFG_INVALID;
911         }
912
913         return (params->dflag && (params->fflag || params->lflag)) ||
914                 (params->fflag && (params->dflag || params->lflag)) ||
915                 (params->lflag && (params->dflag || params->fflag)) ||
916                 (params->xflag) || !(strlen(params->imagename));
917 }
918
919 /*
920  * kwbimage type parameters definition
921  */
922 U_BOOT_IMAGE_TYPE(
923         kwbimage,
924         "Marvell MVEBU Boot Image support",
925         0,
926         NULL,
927         kwbimage_check_params,
928         kwbimage_verify_header,
929         kwbimage_print_header,
930         kwbimage_set_header,
931         NULL,
932         kwbimage_check_image_types,
933         NULL,
934         kwbimage_generate
935 );