[Feature]add MT2731_MP2_MR2_SVN388 baseline version
Change-Id: Ief04314834b31e27effab435d3ca8ba33b499059
diff --git a/src/devtools/datool/tool/gen-dalk-from-lk.py b/src/devtools/datool/tool/gen-dalk-from-lk.py
new file mode 100755
index 0000000..52dffa9
--- /dev/null
+++ b/src/devtools/datool/tool/gen-dalk-from-lk.py
@@ -0,0 +1,197 @@
+#!/usr/bin/env python
+
+#
+# Copyright (C) 2015 MediaTek Inc. All rights reserved.
+# Tristan Shieh <tristan.shieh@mediatek.com>
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+# 1. Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+# 2. Redistributions in binary form must reproduce the above copyright
+# notice, this list of conditions and the following disclaimer in the
+# documentation and/or other materials provided with the distribution.
+#
+# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+# SUCH DAMAGE.
+#
+
+import os
+import struct
+import sys
+
+def read(path):
+ with open(path, "rb") as f:
+ return f.read()
+
+def write(path, data):
+ with open(path, "wb") as f:
+ f.write(data)
+
+def padding(data, size, pattern = '\0'):
+ return data + pattern * (size - len(data))
+
+LK_MEM_ADDRs = {'8135': 0x81e00000,
+ '8127': 0x81e00000,
+ '6595': 0x41e00000,
+ '8172': 0x41e00000,
+ '8173': 0x41e00000,
+ '7623': 0x81e00000,
+ '8163': 0x41e00000}
+
+BOOTARG_OFFSET = 0x80
+
+boot_args = {
+ '8135': struct.pack("26I",
+ 0x504c504c, 0x00000063, 0x00000000, 0x11009000,
+ 0x000e1000, 0x00500a01, 0x00000001, 0x34000000,
+ 0x10240d40, 0x02101010, 0x000a8200, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000231, 0x00000000,
+ 0x00000000, 0x00000000, 0x822041c1, 0x51200655,
+ 0x92124805, 0x18420000, 0x3a00a284, 0xc0444890,
+ 0x1980a991, 0x04000099),
+
+ '8127': struct.pack("27I",
+ 0x504C504C, 0x00000063, 0x00000000, 0x11002000,
+ 0x000E1000, 0x00000301, 0x00000001, 0x37C00000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000003,
+ 0x00000000, 0x00000000, 0x00002116, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0xAFB50204, 0x00000000,
+ 0x00000000, 0x00000000, 0x00008127),
+
+ '6595': struct.pack("26I",
+ 0x504c504c, 0x00000063, 0x00000000, 0x11002000,
+ 0x000e1000, 0xEBFE0101, 0x00000001, 0x80000000,
+ 0x00000000, 0xE59304C0, 0xE3500000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000231, 0x00000000,
+ 0x00000000, 0x00000000, 0x822041c1, 0x51200655,
+ 0x92124805, 0x18420000, 0x40079a84, 0xE1A09000,
+ 0x00000000, 0x00000000),
+
+ '8172': struct.pack("102I",
+ 0x504C504C, 0x00000063, 0x00000000, 0x11002000,
+ 0x000E1000, 0x00000301, 0x00000001, 0x76C00000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0xB6C00000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000A2B,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x42079A84,
+ 0x00000000, 0x00000000, 0x00000000, 0x002198C0,
+ 0x00000000, 0x00000000, 0x00000007, 0x00000005,
+ 0x0012FB00, 0x00000500, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0xB6C00000, 0x00000000,
+ 0x09400000, 0x00000000),
+
+ '8173': struct.pack("44I",
+ 0x504C504C, 0x00000063, 0x00000000, 0x11002000,
+ 0x000E1000, 0x00000301, 0x00000001, 0x7F800000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000001,
+ 0x00000000, 0x00000000, 0x000014E7, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x40079A84, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x001997C0, 0x00000000,
+ 0x00000007, 0x00000005, 0x0012C000, 0x00004000,
+ 0xBF800000, 0x00000000, 0x00800000, 0x00000000),
+
+ '7623': struct.pack("27I",
+ 0x504C504C, 0x00000063, 0x00000000, 0x11004000,
+ 0x000E1000, 0xFFFC4201, 0x00000001, 0x3FE00000,
+ 0xDFF4FFBF, 0xFE7FFFFF, 0xDFEFFFFF, 0x00000000,
+ 0x00000000, 0x00000000, 0x000011FD, 0xFFFDB7FE,
+ 0xF1FF2FFF, 0xFFFFFFAF, 0xFFF29FFF, 0xBF7BDE7F,
+ 0x3FFD997F, 0xFFEFFFBF, 0xAFB50204, 0xFECF3FFF,
+ 0x00000000, 0x00000000, 0x00008590),
+
+ '8163': struct.pack("88I",
+ 0x504C504C, 0x00000063, 0x00000000, 0x11002000,
+ 0x000E1000, 0xFFFF0301, 0x00000001, 0x3FC00000,
+ 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF,
+ 0x00000001, 0x00000000, 0x40000000, 0x00000000,
+ 0x3FC00000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000001, 0xFFFFFFFF,
+ 0x40000000, 0x00000000, 0x40000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x00000000,
+ 0x7FC00000, 0x00000000, 0x00400000, 0x00000000,
+ 0x00000000, 0x00000000, 0x00000000, 0x0000E4DC,
+ 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF,
+ 0xFFFFFFFF, 0xFFFFFFFF, 0xFFFFFFFF, 0x42058A04,
+ 0xFFFFFFFF, 0x00000000, 0x00000000, 0x00178980,
+ 0x11003000, 0x00000000, 0x00000006, 0x00000004,
+ 0x0012C000, 0x00004000, 0x2E312E30, 0x25003030)}
+
+def main(argv):
+ lk = read(argv[2])
+
+ print("CHIP_ID: %s" % argv[1])
+ boot_arg = boot_args[argv[1]]
+ LK_MEM_ADDR = LK_MEM_ADDRs[argv[1]]
+
+ lk_wrapper = struct.pack("21I",
+ #LK_WRAPPER:
+ 0xe1a0000f, # 0: mov r0, pc
+ 0xe2400008, # 4: sub r0, r0, #8
+ 0xe59f1030, # 8: ldr r1, [pc, #48] ; 40 <COPY+0x1c>
+ 0xe0800001, # c: add r0, r0, r1
+ 0xe59f102c, # 10: ldr r1, [pc, #44] ; 44 <COPY+0x20>
+ 0xe59f202c, # 14: ldr r2, [pc, #44] ; 48 <COPY+0x24>
+ 0xe0812002, # 18: add r2, r1, r2
+ 0xe59f3028, # 1c: ldr r3, [pc, #40] ; 4c <COPY+0x28>
+ 0xe0822003, # 20: add r2, r2, r3
+ #COPY:
+ 0xe1510002, # 24: cmp r1, r2
+ 0x34903004, # 28: ldrcc r3, [r0], #4
+ 0x34813004, # 2c: strcc r3, [r1], #4
+ 0x3afffffb, # 30: bcc 24 <COPY>
+ 0xe59f4008, # 34: ldr r4, [pc, #8] ; 44 <COPY+0x20>
+ 0xe59f5008, # 38: ldr r5, [pc, #8] ; 48 <COPY+0x24>
+ 0xe59ff00c, # 3c: ldr pc, [pc, #12] ; 50 <COPY+0x2c>
+ BOOTARG_OFFSET, # 40: BOOTARG_OFFSET .word 0x11111111
+ LK_MEM_ADDR - len(boot_arg), # 44: BOOTARG_ADDR .word 0x22222222
+ len(boot_arg), # 48: BOOTARG_SIZE .word 0x33333333
+ len(lk), # 4c: LK_SIZE .word 0x44444444
+ LK_MEM_ADDR # 50: LK_ADDR .word 0x55555555
+ )
+
+ o = padding(lk_wrapper, BOOTARG_OFFSET, '\0') + boot_arg + lk
+ # padding to even-sized output
+ write(argv[3], padding(o, len(o)+len(o)%2, '\0'))
+
+
+if __name__ == "__main__":
+ main(sys.argv)
+
+