[Feature]add MT2731_MP2_MR2_SVN388 baseline version

Change-Id: Ief04314834b31e27effab435d3ca8ba33b499059
diff --git a/src/devtools/datool/tool/gen-dalk-from-lk.py b/src/devtools/datool/tool/gen-dalk-from-lk.py
new file mode 100755
index 0000000..52dffa9
--- /dev/null
+++ b/src/devtools/datool/tool/gen-dalk-from-lk.py
@@ -0,0 +1,197 @@
+#!/usr/bin/env python
+
+#
+# Copyright (C) 2015 MediaTek Inc. All rights reserved.
+# Tristan Shieh <tristan.shieh@mediatek.com>
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+# 1. Redistributions of source code must retain the above copyright
+#    notice, this list of conditions and the following disclaimer.
+# 2. Redistributions in binary form must reproduce the above copyright
+#    notice, this list of conditions and the following disclaimer in the
+#    documentation and/or other materials provided with the distribution.
+#
+# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+# ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+# SUCH DAMAGE.
+#
+
+import os
+import struct
+import sys
+
+def read(path):
+        with open(path, "rb") as f:
+                return f.read()
+
+def write(path, data):
+        with open(path, "wb") as f:
+                f.write(data)
+
+def padding(data, size, pattern = '\0'):
+        return data + pattern * (size - len(data))
+
+LK_MEM_ADDRs = {'8135': 0x81e00000,
+                '8127': 0x81e00000,
+                '6595': 0x41e00000,
+                '8172': 0x41e00000,
+                '8173': 0x41e00000,
+                '7623': 0x81e00000,
+                '8163': 0x41e00000}
+
+BOOTARG_OFFSET = 0x80
+
+boot_args = {
+        '8135': struct.pack("26I",
+        0x504c504c, 0x00000063, 0x00000000, 0x11009000,
+        0x000e1000, 0x00500a01, 0x00000001, 0x34000000,
+        0x10240d40, 0x02101010, 0x000a8200, 0x00000000,
+        0x00000000, 0x00000000, 0x00000231, 0x00000000,
+        0x00000000, 0x00000000, 0x822041c1, 0x51200655,
+        0x92124805, 0x18420000, 0x3a00a284, 0xc0444890,
+        0x1980a991, 0x04000099),
+
+        '8127': struct.pack("27I",
+        0x504C504C, 0x00000063, 0x00000000, 0x11002000,
+        0x000E1000, 0x00000301, 0x00000001, 0x37C00000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000003,
+        0x00000000, 0x00000000, 0x00002116, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0xAFB50204, 0x00000000,
+        0x00000000, 0x00000000, 0x00008127),
+
+        '6595': struct.pack("26I",
+        0x504c504c, 0x00000063, 0x00000000, 0x11002000,
+        0x000e1000, 0xEBFE0101, 0x00000001, 0x80000000,
+        0x00000000, 0xE59304C0, 0xE3500000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000231, 0x00000000,
+        0x00000000, 0x00000000, 0x822041c1, 0x51200655,
+        0x92124805, 0x18420000, 0x40079a84, 0xE1A09000,
+        0x00000000, 0x00000000),
+
+        '8172': struct.pack("102I",
+        0x504C504C, 0x00000063, 0x00000000, 0x11002000,
+        0x000E1000, 0x00000301, 0x00000001, 0x76C00000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0xB6C00000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000A2B,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x42079A84,
+        0x00000000, 0x00000000, 0x00000000, 0x002198C0,
+        0x00000000, 0x00000000, 0x00000007, 0x00000005,
+        0x0012FB00, 0x00000500, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0xB6C00000, 0x00000000,
+        0x09400000, 0x00000000),
+
+        '8173': struct.pack("44I",
+        0x504C504C, 0x00000063, 0x00000000, 0x11002000,
+        0x000E1000, 0x00000301, 0x00000001, 0x7F800000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000001,
+        0x00000000, 0x00000000, 0x000014E7, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x40079A84, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x001997C0, 0x00000000,
+        0x00000007, 0x00000005, 0x0012C000, 0x00004000,
+        0xBF800000, 0x00000000, 0x00800000, 0x00000000),
+
+        '7623': struct.pack("27I",
+        0x504C504C, 0x00000063, 0x00000000, 0x11004000,
+        0x000E1000, 0xFFFC4201, 0x00000001, 0x3FE00000,
+        0xDFF4FFBF, 0xFE7FFFFF, 0xDFEFFFFF, 0x00000000,
+        0x00000000, 0x00000000, 0x000011FD, 0xFFFDB7FE,
+        0xF1FF2FFF, 0xFFFFFFAF, 0xFFF29FFF, 0xBF7BDE7F,
+        0x3FFD997F, 0xFFEFFFBF, 0xAFB50204, 0xFECF3FFF,
+        0x00000000, 0x00000000, 0x00008590),
+
+        '8163': struct.pack("88I",
+        0x504C504C, 0x00000063, 0x00000000, 0x11002000,
+        0x000E1000, 0xFFFF0301, 0x00000001, 0x3FC00000,
+        0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF,
+        0x00000001, 0x00000000, 0x40000000, 0x00000000,
+        0x3FC00000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000001, 0xFFFFFFFF,
+        0x40000000, 0x00000000, 0x40000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x00000000,
+        0x7FC00000, 0x00000000, 0x00400000, 0x00000000,
+        0x00000000, 0x00000000, 0x00000000, 0x0000E4DC,
+        0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF,
+        0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0x42058A04,
+        0xFFFFFFFF, 0x00000000, 0x00000000, 0x00178980,
+        0x11003000, 0x00000000, 0x00000006, 0x00000004,
+        0x0012C000, 0x00004000, 0x2E312E30, 0x25003030)}
+
+def main(argv):
+        lk = read(argv[2])
+
+        print("CHIP_ID: %s" % argv[1])
+        boot_arg = boot_args[argv[1]]
+        LK_MEM_ADDR = LK_MEM_ADDRs[argv[1]]
+
+        lk_wrapper = struct.pack("21I",
+					#LK_WRAPPER:
+         0xe1a0000f, 			#   0:	mov     r0, pc
+         0xe2400008, 			#   4:	sub     r0, r0, #8
+         0xe59f1030, 			#   8:	ldr     r1, [pc, #48]   ; 40 <COPY+0x1c>
+         0xe0800001, 			#   c:	add     r0, r0, r1
+         0xe59f102c, 			#  10:	ldr     r1, [pc, #44]   ; 44 <COPY+0x20>
+         0xe59f202c, 			#  14:	ldr     r2, [pc, #44]   ; 48 <COPY+0x24>
+         0xe0812002, 			#  18:	add     r2, r1, r2
+         0xe59f3028, 			#  1c:	ldr     r3, [pc, #40]   ; 4c <COPY+0x28>
+         0xe0822003, 			#  20:	add     r2, r2, r3
+					#COPY:
+         0xe1510002, 			#  24:	cmp     r1, r2
+         0x34903004, 			#  28:	ldrcc   r3, [r0], #4
+         0x34813004, 			#  2c:	strcc   r3, [r1], #4
+         0x3afffffb, 			#  30:	bcc     24 <COPY>
+         0xe59f4008, 			#  34:	ldr     r4, [pc, #8]    ; 44 <COPY+0x20>
+         0xe59f5008, 			#  38:	ldr     r5, [pc, #8]    ; 48 <COPY+0x24>
+         0xe59ff00c, 			#  3c:	ldr     pc, [pc, #12]   ; 50 <COPY+0x2c>
+         BOOTARG_OFFSET,		#  40:	BOOTARG_OFFSET  .word   0x11111111
+         LK_MEM_ADDR - len(boot_arg),	#  44:	BOOTARG_ADDR    .word   0x22222222
+         len(boot_arg),			#  48:	BOOTARG_SIZE    .word   0x33333333
+         len(lk),			#  4c:	LK_SIZE         .word   0x44444444
+         LK_MEM_ADDR			#  50:	LK_ADDR         .word   0x55555555
+        )
+
+        o = padding(lk_wrapper, BOOTARG_OFFSET, '\0') + boot_arg + lk
+        # padding to even-sized output
+        write(argv[3], padding(o, len(o)+len(o)%2, '\0'))
+
+
+if __name__ == "__main__":
+        main(sys.argv)
+
+