2022-11-25 20:16:20 +08:00
|
|
|
/**
|
|
|
|
******************************************************************************
|
|
|
|
* @file blsp_eflash_loader_cmds.c
|
|
|
|
* @version V1.2
|
|
|
|
* @date
|
|
|
|
* @brief This file is the peripheral case header file
|
|
|
|
******************************************************************************
|
|
|
|
* @attention
|
|
|
|
*
|
|
|
|
* <h2><center>© COPYRIGHT(c) 2018 Bouffalo Lab</center></h2>
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without modification,
|
|
|
|
* are permitted provided that the following conditions are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
|
|
* and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of Bouffalo Lab nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
|
|
* DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
|
|
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
|
|
|
|
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
******************************************************************************
|
|
|
|
*/
|
|
|
|
#include "bflb_eflash_loader.h"
|
|
|
|
#include "stdio.h"
|
|
|
|
#include "stdint.h"
|
|
|
|
#include "string.h"
|
2023-02-24 21:33:12 +08:00
|
|
|
|
2022-11-25 20:16:20 +08:00
|
|
|
#include "partition.h"
|
|
|
|
#include "bflb_flash.h"
|
|
|
|
#include "bflb_sec_sha.h"
|
|
|
|
#include "blsp_media_boot.h"
|
|
|
|
#include "blsp_common.h"
|
2022-12-21 20:59:44 +08:00
|
|
|
#include "bflb_flash.h"
|
2022-11-25 20:16:20 +08:00
|
|
|
|
|
|
|
#define BFLB_EFLASH_LOADER_CHECK_LEN 2048
|
|
|
|
#define BFLB_EFLASH_MAX_SIZE 2 * 1024 * 1024
|
|
|
|
|
2023-01-17 20:54:15 +08:00
|
|
|
// 4bytes、32bit数据大小端转化
|
|
|
|
#define L2B32(Little) (((Little & 0xff) << 24) | (((Little) & 0xff00) << 8) | (((Little) & 0xff0000) >> 8) | ((Little >> 24) & 0xff))
|
2022-11-25 20:16:20 +08:00
|
|
|
|
|
|
|
#if BLSP_BOOT2_SUPPORT_EFLASH_LOADER_RAM
|
|
|
|
static struct image_cfg_t image_cfg;
|
|
|
|
static struct bootrom_img_ctrl_t img_ctrl;
|
|
|
|
static struct segment_header_t segment_hdr;
|
|
|
|
uint32_t eflash_loader_cmd_ack_buf[16];
|
|
|
|
/*for bl602*/
|
|
|
|
static int32_t bflb_bootrom_cmd_get_bootinfo(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_bootrom_cmd_load_bootheader(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_bootrom_cmd_load_segheader(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_bootrom_cmd_load_segdata(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_bootrom_cmd_check_img(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_bootrom_cmd_run(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static void bflb_bootrom_cmd_ack(uint32_t result);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if BLSP_BOOT2_SUPPORT_EFLASH_LOADER_FLASH
|
|
|
|
static uint32_t g_eflash_loader_error = 0;
|
|
|
|
/* for bl702 */
|
|
|
|
static int32_t bflb_eflash_loader_cmd_read_jedec_id(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_eflash_loader_cmd_reset(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_eflash_loader_cmd_erase_flash(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_eflash_loader_cmd_write_flash(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_eflash_loader_cmd_read_flash(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_eflash_loader_cmd_readSha_flash(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_eflash_loader_cmd_xip_readSha_flash(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_eflash_loader_cmd_write_flash_check(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_eflash_loader_cmd_set_flash_para(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_eflash_loader_cmd_xip_read_flash_start(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_eflash_loader_cmd_xip_read_flash_finish(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_eflash_loader_cmd_clock_set(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
static int32_t bflb_eflash_loader_cmd_read_mac_addr(uint16_t cmd, uint8_t *data, uint16_t len);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if BLSP_BOOT2_SUPPORT_EFLASH_LOADER_FLASH || BLSP_BOOT2_SUPPORT_EFLASH_LOADER_RAM
|
2023-02-24 21:33:12 +08:00
|
|
|
static ATTR_TCM_CONST_SECTION const struct eflash_loader_cmd_cfg_t eflash_loader_cmds[] = {
|
2022-11-25 20:16:20 +08:00
|
|
|
#if BLSP_BOOT2_SUPPORT_EFLASH_LOADER_RAM
|
|
|
|
/*for bl602*/
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_GET_BOOTINFO, EFLASH_LOADER_CMD_ENABLE, bflb_bootrom_cmd_get_bootinfo },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_LOAD_BOOTHEADER, EFLASH_LOADER_CMD_ENABLE, bflb_bootrom_cmd_load_bootheader },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_LOAD_SEGHEADER, EFLASH_LOADER_CMD_ENABLE, bflb_bootrom_cmd_load_segheader },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_LOAD_SEGDATA, EFLASH_LOADER_CMD_ENABLE, bflb_bootrom_cmd_load_segdata },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_CHECK_IMG, EFLASH_LOADER_CMD_ENABLE, bflb_bootrom_cmd_check_img },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_RUN, EFLASH_LOADER_CMD_ENABLE, bflb_bootrom_cmd_run },
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if BLSP_BOOT2_SUPPORT_EFLASH_LOADER_FLASH
|
|
|
|
/* for bl702,bl808,bl606p,bl618,wb03 */
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_RESET, EFLASH_LOADER_CMD_ENABLE, bflb_eflash_loader_cmd_reset },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_FLASH_ERASE, EFLASH_LOADER_CMD_ENABLE, bflb_eflash_loader_cmd_erase_flash },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_FLASH_WRITE, EFLASH_LOADER_CMD_ENABLE, bflb_eflash_loader_cmd_write_flash },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_FLASH_READ, EFLASH_LOADER_CMD_ENABLE, bflb_eflash_loader_cmd_read_flash },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_FLASH_WRITE_CHECK, EFLASH_LOADER_CMD_ENABLE, bflb_eflash_loader_cmd_write_flash_check },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_FLASH_SET_PARA, EFLASH_LOADER_CMD_ENABLE, bflb_eflash_loader_cmd_set_flash_para },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_FLASH_READSHA, EFLASH_LOADER_CMD_ENABLE, bflb_eflash_loader_cmd_readSha_flash },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_FLASH_XIP_READSHA, EFLASH_LOADER_CMD_ENABLE, bflb_eflash_loader_cmd_xip_readSha_flash },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_XIP_READ_START, EFLASH_LOADER_CMD_ENABLE, bflb_eflash_loader_cmd_xip_read_flash_start },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_XIP_READ_FINISH, EFLASH_LOADER_CMD_ENABLE, bflb_eflash_loader_cmd_xip_read_flash_finish },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_FLASH_READ_JEDECID, EFLASH_LOADER_CMD_ENABLE, bflb_eflash_loader_cmd_read_jedec_id },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_CLK_SET, EFLASH_LOADER_CMD_ENABLE, bflb_eflash_loader_cmd_clock_set },
|
|
|
|
{ BFLB_EFLASH_LOADER_CMD_EFUSE_READ_MAC_ADDR, EFLASH_LOADER_CMD_ENABLE, bflb_eflash_loader_cmd_read_mac_addr },
|
|
|
|
#endif
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if BLSP_BOOT2_SUPPORT_EFLASH_LOADER_RAM
|
|
|
|
/* ack host with command process result */
|
|
|
|
static void bflb_bootrom_cmd_ack(uint32_t result)
|
|
|
|
{
|
|
|
|
if (result == 0) {
|
|
|
|
/*OK*/
|
|
|
|
eflash_loader_cmd_ack_buf[0] = BFLB_BOOTROM_CMD_ACK;
|
|
|
|
bflb_eflash_loader_if_write((uint32_t *)eflash_loader_cmd_ack_buf, 2);
|
|
|
|
return;
|
|
|
|
} else {
|
|
|
|
/* FL+Error code(2bytes) */
|
|
|
|
eflash_loader_cmd_ack_buf[0] = BFLB_BOOTROM_CMD_NACK | ((result << 16) & 0xffff0000);
|
|
|
|
bflb_eflash_loader_if_write(eflash_loader_cmd_ack_buf, 4);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* for bl602 eflash loader */
|
|
|
|
static int32_t bflb_bootrom_cmd_get_bootinfo(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
/*OK(2)+len(2)+bootrom version(4)+OTP(16)*/
|
|
|
|
uint8_t *bootinfo = (uint8_t *)eflash_loader_cmd_ack_buf;
|
|
|
|
uint8_t otp_cfg[20] = { 0x00, 0x00, 0x00, 0x00, 0x03, 0x10, 0xc1, 0x02, 0x0d, 0xd2, 0x1d, 0xcf, 0x0e, 0xb4, 0x18, 0x00, 0x2f, 0xf4, 0xfb, 0x08 };
|
|
|
|
|
|
|
|
//LOG_F("get bootinfo\r\n");
|
|
|
|
|
|
|
|
eflash_loader_cmd_ack_buf[0] = BFLB_BOOTROM_CMD_ACK;
|
|
|
|
bootinfo[2] = 0x18;
|
|
|
|
bootinfo[3] = 00;
|
|
|
|
*((uint32_t *)(bootinfo + 4)) = BFLB_BOOTROM_VERSION;
|
|
|
|
memcpy(bootinfo + 8, &otp_cfg, 20);
|
|
|
|
|
|
|
|
bflb_eflash_loader_if_write(eflash_loader_cmd_ack_buf, bootinfo[2] + 4);
|
|
|
|
|
|
|
|
return BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
int32_t bflb_bootrom_parse_bootheader(uint8_t *data)
|
|
|
|
{
|
|
|
|
struct bootheader_t *header = (struct bootheader_t *)data;
|
|
|
|
uint32_t crc;
|
|
|
|
uint32_t crcpass = 0;
|
|
|
|
|
|
|
|
if (header->bootcfg.bval.crc_ignore == 1 && header->crc32 == BOOTROM_DEADBEEF_VAL) {
|
|
|
|
crcpass = 1;
|
|
|
|
} else {
|
|
|
|
crc = BFLB_Soft_CRC32((uint8_t *)header, sizeof(struct bootheader_t) - sizeof(header->crc32));
|
|
|
|
if (header->crc32 == crc) {
|
|
|
|
crcpass = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (crcpass) {
|
|
|
|
if (header->bootcfg.bval.notload_in_bootrom) {
|
|
|
|
return BFLB_EFLASH_LOADER_IMG_BOOTHEADER_NOT_LOAD_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* for boot2, one CPU only */
|
|
|
|
/*get which CPU's img it is*/
|
|
|
|
|
|
|
|
if (0 == memcmp((void *)&header->magiccode, "BFNP", sizeof(header->magiccode))) {
|
|
|
|
//current_cpu=i;
|
|
|
|
img_ctrl.pkhash_src = 0; //boot_cpu_cfg[i].pkhash_src;
|
|
|
|
} else {
|
|
|
|
return BFLB_EFLASH_LOADER_IMG_BOOTHEADER_MAGIC_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
image_cfg.entrypoint = 0;
|
|
|
|
/* set image valid 0 as default */
|
|
|
|
image_cfg.img_valid = 0;
|
|
|
|
|
|
|
|
/* deal with pll config */
|
|
|
|
//bflb_bootrom_clk_set_from_user(&header->clkCfg,1);
|
|
|
|
|
|
|
|
/* encrypt and sign */
|
|
|
|
image_cfg.encrypt_type = header->bootcfg.bval.encrypt_type;
|
|
|
|
image_cfg.sign_type = header->bootcfg.bval.sign;
|
|
|
|
image_cfg.key_sel = header->bootcfg.bval.key_sel;
|
|
|
|
|
|
|
|
/* xip relative */
|
|
|
|
image_cfg.no_segment = header->bootcfg.bval.no_segment;
|
|
|
|
image_cfg.cache_select = header->bootcfg.bval.cache_select;
|
|
|
|
image_cfg.aes_region_lock = header->bootcfg.bval.aes_region_lock;
|
|
|
|
image_cfg.halt_ap = header->bootcfg.bval.halt_ap;
|
|
|
|
image_cfg.cache_way_disable = header->bootcfg.bval.cache_way_disable;
|
|
|
|
|
|
|
|
image_cfg.hash_ignore = header->bootcfg.bval.hash_ignore;
|
|
|
|
/* firmware len*/
|
|
|
|
image_cfg.img_segment_info.segment_cnt = header->img_segment_info.segment_cnt;
|
|
|
|
|
|
|
|
/*boot entry and flash offset */
|
|
|
|
image_cfg.entrypoint = header->bootentry;
|
|
|
|
image_cfg.img_start.flashoffset = header->img_start.flashoffset;
|
|
|
|
|
|
|
|
if (image_cfg.img_segment_info.segment_cnt == 0) {
|
|
|
|
return BFLB_EFLASH_LOADER_IMG_SEGMENT_CNT_ERROR;
|
|
|
|
}
|
|
|
|
/*clear segment_cnt*/
|
|
|
|
img_ctrl.segment_cnt = 0;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
return BFLB_EFLASH_LOADER_IMG_BOOTHEADER_CRC_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
return BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t bflb_bootrom_cmd_load_bootheader(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
int32_t ret = BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
|
|
|
|
//LOG_F("load bootheader\r\n");
|
|
|
|
|
|
|
|
if (len != sizeof(struct bootheader_t)) {
|
|
|
|
ret = BFLB_EFLASH_LOADER_IMG_BOOTHEADER_LEN_ERROR;
|
|
|
|
} else {
|
|
|
|
ret = bflb_bootrom_parse_bootheader(data);
|
|
|
|
|
|
|
|
if (BFLB_EFLASH_LOADER_SUCCESS == ret) {
|
|
|
|
if (image_cfg.sign_type) {
|
|
|
|
img_ctrl.state = BOOTROM_IMG_PK;
|
|
|
|
} else if (image_cfg.encrypt_type) {
|
|
|
|
img_ctrl.state = BOOTROM_IMG_AESIV;
|
|
|
|
} else {
|
|
|
|
img_ctrl.state = BOOTROM_IMG_SEGHEADER;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bflb_bootrom_cmd_ack(ret);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t bflb_bootrom_is_boot_dst_valid(uint32_t addr, uint32_t len)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int32_t bflb_bootrom_parse_seg_header(uint8_t *data)
|
|
|
|
{
|
|
|
|
struct segment_header_t *hdr;
|
|
|
|
|
|
|
|
hdr = (struct segment_header_t *)data;
|
|
|
|
|
|
|
|
if (hdr->crc32 == BFLB_Soft_CRC32(hdr, sizeof(struct segment_header_t) - 4)) {
|
|
|
|
memcpy(&segment_hdr, hdr, sizeof(struct segment_header_t));
|
|
|
|
if (bflb_bootrom_is_boot_dst_valid(segment_hdr.destaddr, segment_hdr.len) == 1) {
|
|
|
|
return BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
} else {
|
|
|
|
return BFLB_EFLASH_LOADER_IMG_SECTIONHEADER_DST_ERROR;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return BFLB_EFLASH_LOADER_IMG_SECTIONHEADER_CRC_ERROR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t bflb_bootrom_cmd_load_segheader(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
int32_t ret = BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
uint8_t *segdatainfo = (uint8_t *)eflash_loader_cmd_ack_buf;
|
|
|
|
|
|
|
|
//LOG_F("load SegHdr\r\n");
|
|
|
|
|
|
|
|
if (img_ctrl.state != BOOTROM_IMG_SEGHEADER) {
|
|
|
|
ret = BFLB_EFLASH_LOADER_CMD_SEQ_ERROR;
|
|
|
|
} else {
|
|
|
|
if (len != sizeof(struct segment_header_t)) {
|
|
|
|
ret = BFLB_EFLASH_LOADER_IMG_SECTIONHEADER_LEN_ERROR;
|
|
|
|
} else {
|
|
|
|
memset(&segment_hdr, 0, sizeof(struct segment_header_t));
|
|
|
|
img_ctrl.segdata_recv_len = 0;
|
|
|
|
ret = bflb_bootrom_parse_seg_header(data);
|
|
|
|
if (ret == BFLB_EFLASH_LOADER_SUCCESS) {
|
|
|
|
//bflb_bootrom_printe("dest=%08x,len=%d\r\n",segment_hdr.destaddr,segment_hdr.len);
|
|
|
|
img_ctrl.state = BOOTROM_IMG_SEGDATA;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* if segheader is encrypted, then ack segment len*/
|
|
|
|
if (ret == BFLB_EFLASH_LOADER_SUCCESS) {
|
|
|
|
/*ack segdata len*/
|
|
|
|
eflash_loader_cmd_ack_buf[0] = BFLB_BOOTROM_CMD_ACK;
|
|
|
|
segdatainfo[2] = sizeof(segment_hdr);
|
|
|
|
segdatainfo[3] = 0x00;
|
|
|
|
memcpy(&segdatainfo[4], (void *)&segment_hdr, sizeof(segment_hdr));
|
|
|
|
bflb_eflash_loader_if_write(eflash_loader_cmd_ack_buf, segdatainfo[2] + 4);
|
|
|
|
} else {
|
|
|
|
bflb_bootrom_cmd_ack(ret);
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t bflb_bootrom_cmd_load_segdata(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
int32_t ret = BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
|
|
|
|
//LOG_F("load SegData\r\n");
|
|
|
|
|
|
|
|
if (img_ctrl.state != BOOTROM_IMG_SEGDATA) {
|
|
|
|
ret = BFLB_EFLASH_LOADER_CMD_SEQ_ERROR;
|
|
|
|
goto finished;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (image_cfg.encrypt_type && len % 16 != 0) {
|
|
|
|
ret = BFLB_EFLASH_LOADER_IMG_SECTIONDATA_LEN_ERROR;
|
|
|
|
//bflb_bootrom_printe("len error,len=%d\r\n",len);
|
|
|
|
goto finished;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (img_ctrl.segdata_recv_len + len > segment_hdr.len) {
|
|
|
|
ret = BFLB_EFLASH_LOADER_IMG_SECTIONDATA_TLEN_ERROR;
|
|
|
|
//bflb_bootrom_printe("tlen error,receive=%d,indicator=%d\r\n",
|
|
|
|
//img_ctrl.segdata_recv_len+len,segment_hdr.len);
|
|
|
|
goto finished;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*no encryption,copy directlly */
|
2022-12-21 20:59:44 +08:00
|
|
|
arch_memcpy_fast((void *)segment_hdr.destaddr, data, len);
|
2022-11-25 20:16:20 +08:00
|
|
|
//LOG_F("segment_hdr.destaddr 0x%08x, len %d,data %02x %02x %02x %02x \r\n", segment_hdr.destaddr, len, data[0], data[1], data[2], data[3]);
|
|
|
|
img_ctrl.segdata_recv_len += len;
|
|
|
|
segment_hdr.destaddr += len;
|
|
|
|
|
|
|
|
if (img_ctrl.segdata_recv_len >= segment_hdr.len) {
|
|
|
|
/*finish loading one segment*/
|
|
|
|
img_ctrl.segment_cnt++;
|
|
|
|
if (img_ctrl.segment_cnt == image_cfg.img_segment_info.segment_cnt) {
|
|
|
|
img_ctrl.state = BOOTROM_IMG_CHECK;
|
|
|
|
} else {
|
|
|
|
img_ctrl.state = BOOTROM_IMG_SEGHEADER;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
finished:
|
|
|
|
bflb_bootrom_cmd_ack(ret);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t bflb_bootrom_cmd_check_img(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
int32_t ret = BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
|
|
|
|
//LOG_F("check img\r\n");
|
|
|
|
|
|
|
|
if (img_ctrl.state != BOOTROM_IMG_CHECK) {
|
|
|
|
ret = BFLB_EFLASH_LOADER_IMG_HALFBAKED_ERROR;
|
|
|
|
bflb_bootrom_cmd_ack(ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*default,set state to BOOTROM_IMG_BOOTHEADER*/
|
|
|
|
img_ctrl.state = BOOTROM_IMG_BOOTHEADER;
|
|
|
|
|
|
|
|
/*finally, check hash and signature*/
|
|
|
|
ret = BFLB_EFLASH_LOADER_SUCCESS; //bflb_bootrom_check_hash();
|
|
|
|
if (ret == BFLB_EFLASH_LOADER_SUCCESS) {
|
|
|
|
ret = BFLB_EFLASH_LOADER_SUCCESS; //bflb_bootrom_check_signature();
|
|
|
|
bflb_bootrom_cmd_ack(ret);
|
|
|
|
if (ret == BFLB_EFLASH_LOADER_SUCCESS) {
|
|
|
|
img_ctrl.state = BOOTROM_IMG_RUN;
|
|
|
|
image_cfg.img_valid = 1;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
bflb_bootrom_cmd_ack(ret);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void bflb_eflash_loader_exit_delay_us(uint32_t cnt)
|
|
|
|
{
|
|
|
|
volatile uint32_t i = (32 / 5) * cnt;
|
|
|
|
while (i--)
|
|
|
|
;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void bflb_eflash_loader_jump_entry(void)
|
|
|
|
{
|
|
|
|
pentry_t pentry = 0;
|
|
|
|
|
|
|
|
/* deal NP's entry point */
|
|
|
|
if (image_cfg.img_valid) {
|
|
|
|
pentry = (pentry_t)image_cfg.entrypoint;
|
|
|
|
//LOG_F("image_cfg.entrypoint 0x%08x\r\n", image_cfg.entrypoint);
|
|
|
|
if (pentry != NULL) {
|
|
|
|
pentry();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*if cann't jump(open jtag only?),stay here */
|
|
|
|
while (1) {
|
|
|
|
/*use soft delay only */
|
|
|
|
bflb_eflash_loader_exit_delay_us(100);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t bflb_bootrom_cmd_run(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
int32_t ret = BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
|
|
|
|
//LOG_F("run\r\n");
|
|
|
|
|
|
|
|
if (img_ctrl.state != BOOTROM_IMG_RUN) {
|
|
|
|
ret = BFLB_EFLASH_LOADER_CMD_SEQ_ERROR;
|
|
|
|
bflb_bootrom_cmd_ack(ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
bflb_bootrom_cmd_ack(ret);
|
|
|
|
//bflb_eflash_loader_usart_if_wait_tx_idle(BFLB_BOOTROM_IF_TX_IDLE_TIMEOUT);
|
|
|
|
bflb_mtimer_delay_ms(BFLB_BOOTROM_IF_TX_IDLE_TIMEOUT);
|
|
|
|
|
|
|
|
/* get msp and pc value */
|
|
|
|
|
|
|
|
//LOG_F("image_cfg.img_valid %d\r\n", image_cfg.img_valid);
|
|
|
|
|
|
|
|
if (image_cfg.img_valid) {
|
|
|
|
if (image_cfg.entrypoint == 0) {
|
|
|
|
if (image_cfg.img_start.ramaddr != 0) {
|
|
|
|
image_cfg.entrypoint = image_cfg.img_start.ramaddr;
|
|
|
|
} else {
|
|
|
|
image_cfg.entrypoint = BLSP_BOOT2_TCM_BASE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
//LOG_F("jump\r\n");
|
|
|
|
|
|
|
|
/*jump to entry */
|
|
|
|
bflb_eflash_loader_jump_entry();
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if BLSP_BOOT2_SUPPORT_EFLASH_LOADER_FLASH
|
|
|
|
/* ack host with command process result */
|
|
|
|
ATTR_TCM_SECTION static void bflb_eflash_loader_cmd_ack(uint32_t result)
|
|
|
|
{
|
|
|
|
if (result == 0) {
|
|
|
|
/*OK*/
|
|
|
|
g_eflash_loader_cmd_ack_buf[0] = BFLB_EFLASH_LOADER_CMD_ACK;
|
|
|
|
bflb_eflash_loader_if_write((uint32_t *)g_eflash_loader_cmd_ack_buf, 2);
|
|
|
|
return;
|
|
|
|
} else {
|
|
|
|
/* FL+Error code(2bytes) */
|
|
|
|
g_eflash_loader_cmd_ack_buf[0] = BFLB_EFLASH_LOADER_CMD_NACK | ((result << 16) & 0xffff0000);
|
|
|
|
bflb_eflash_loader_if_write(g_eflash_loader_cmd_ack_buf, 4);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void bflb_eflash_loader_cmd_response(uint32_t *data, uint32_t len)
|
|
|
|
{
|
|
|
|
bflb_eflash_loader_if_write(data, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t bflb_eflash_loader_cmd_read_jedec_id(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
uint32_t ackdata[2];
|
|
|
|
uint8_t *tmp_buf;
|
|
|
|
//LOG_F("JID\n");
|
|
|
|
ackdata[0] = BFLB_EFLASH_LOADER_CMD_ACK;
|
|
|
|
tmp_buf = (uint8_t *)ackdata;
|
|
|
|
/*ack read jedec ID */
|
|
|
|
tmp_buf[2] = 4;
|
|
|
|
tmp_buf[3] = 0;
|
2023-01-17 20:54:15 +08:00
|
|
|
ackdata[1] = bflb_flash_get_jedec_id();
|
2022-11-25 20:16:20 +08:00
|
|
|
ackdata[1] &= 0x00ffffff;
|
|
|
|
ackdata[1] |= 0x80000000;
|
2023-01-17 20:54:15 +08:00
|
|
|
ackdata[1] = (ackdata[1]) << 8;
|
|
|
|
ackdata[1] |= 0x80;
|
|
|
|
ackdata[1] = L2B32(ackdata[1]);
|
2022-11-25 20:16:20 +08:00
|
|
|
bflb_eflash_loader_if_write((uint32_t *)ackdata, 4 + 4);
|
|
|
|
return BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t bflb_eflash_loader_cmd_reset(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
int32_t ret = BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
//pt_table_dump();
|
|
|
|
//LOG_F("RST\n");
|
|
|
|
|
|
|
|
bflb_eflash_loader_cmd_ack(ret);
|
|
|
|
bflb_eflash_loader_if_wait_tx_idle(BFLB_EFLASH_LOADER_IF_TX_IDLE_TIMEOUT);
|
|
|
|
|
|
|
|
/* add for bl702, will impact on boot pin read */
|
|
|
|
hal_boot2_set_psmode_status(0x594c440B);
|
|
|
|
|
|
|
|
/* FPGA POR RST NOT work,so add system reset */
|
2022-12-21 20:59:44 +08:00
|
|
|
arch_delay_us(10);
|
2022-11-25 20:16:20 +08:00
|
|
|
hal_boot2_sw_system_reset();
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2023-02-24 21:33:12 +08:00
|
|
|
static int32_t ATTR_TCM_SECTION bflb_eflash_loader_cmd_erase_flash(uint16_t cmd, uint8_t *data, uint16_t len)
|
2022-11-25 20:16:20 +08:00
|
|
|
{
|
|
|
|
int32_t ret = BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
uint32_t startaddr, endaddr;
|
|
|
|
|
|
|
|
//LOG_F("E\n");
|
|
|
|
|
|
|
|
if (len != 8) {
|
|
|
|
ret = BFLB_EFLASH_LOADER_FLASH_ERASE_PARA_ERROR;
|
|
|
|
} else {
|
|
|
|
/*clean write error, since write usually behand erase*/
|
|
|
|
g_eflash_loader_error = BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
|
2023-02-24 21:33:12 +08:00
|
|
|
arch_memcpy(&startaddr, data, 4);
|
|
|
|
arch_memcpy(&endaddr, data + 4, 4);
|
2022-11-25 20:16:20 +08:00
|
|
|
|
|
|
|
//LOG_F("from%08xto%08x\n", startaddr, endaddr);
|
|
|
|
|
2022-12-21 20:59:44 +08:00
|
|
|
if (SUCCESS != bflb_flash_erase(startaddr, endaddr - startaddr + 1)) {
|
2022-11-25 20:16:20 +08:00
|
|
|
//LOG_F("fail\n");
|
|
|
|
ret = BFLB_EFLASH_LOADER_FLASH_ERASE_ERROR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bflb_eflash_loader_cmd_ack(ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t ATTR_TCM_SECTION bflb_eflash_loader_cmd_write_flash(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
int32_t ret = BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
uint32_t startaddr, write_len;
|
|
|
|
|
|
|
|
//LOG_F("W\n");
|
|
|
|
|
|
|
|
if (len <= 4) {
|
|
|
|
ret = BFLB_EFLASH_LOADER_FLASH_WRITE_PARA_ERROR;
|
|
|
|
} else {
|
2023-02-24 21:33:12 +08:00
|
|
|
arch_memcpy(&startaddr, data, 4);
|
2022-11-25 20:16:20 +08:00
|
|
|
write_len = len - 4;
|
|
|
|
//LOG_F("to%08x,%d\n", startaddr, write_len);
|
|
|
|
if (startaddr < 0xffffffff) {
|
2022-12-21 20:59:44 +08:00
|
|
|
if (SUCCESS != bflb_flash_write(startaddr, data + 4, write_len)) {
|
2022-11-25 20:16:20 +08:00
|
|
|
/*error , response again with error */
|
|
|
|
//LOG_F("fail\r\n");
|
|
|
|
ret = BFLB_EFLASH_LOADER_FLASH_WRITE_ERROR;
|
|
|
|
g_eflash_loader_error = ret;
|
|
|
|
} else {
|
|
|
|
bflb_eflash_loader_cmd_ack(ret);
|
|
|
|
return BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
ret = BFLB_EFLASH_LOADER_FLASH_WRITE_ADDR_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
//LOG_F("%d\n", bflb_platform_get_time_us());
|
|
|
|
}
|
|
|
|
|
|
|
|
bflb_eflash_loader_cmd_ack(ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t bflb_eflash_loader_cmd_read_flash(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
int32_t ret = BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
uint32_t startaddr, read_len;
|
|
|
|
uint8_t *ackdata = (uint8_t *)g_boot2_read_buf;
|
|
|
|
|
|
|
|
if (len != 8) {
|
|
|
|
ret = BFLB_EFLASH_LOADER_FLASH_WRITE_PARA_ERROR;
|
|
|
|
bflb_eflash_loader_cmd_ack(ret);
|
|
|
|
} else {
|
|
|
|
memcpy(&startaddr, data, 4);
|
|
|
|
memcpy(&read_len, data + 4, 4);
|
|
|
|
|
|
|
|
ackdata[0] = 'O';
|
|
|
|
ackdata[1] = 'K';
|
|
|
|
ackdata[2] = read_len & 0xff;
|
|
|
|
ackdata[3] = (read_len >> 8) & 0xff;
|
2022-12-21 20:59:44 +08:00
|
|
|
bflb_flash_read(startaddr, &ackdata[4], read_len);
|
2022-11-25 20:16:20 +08:00
|
|
|
|
|
|
|
bflb_eflash_loader_cmd_response((uint32_t *)ackdata, read_len + 4);
|
|
|
|
}
|
|
|
|
return BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t bflb_eflash_loader_cmd_xip_read_flash_start(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
int32_t ret = BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
|
|
|
|
bflb_eflash_loader_cmd_ack(ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t bflb_eflash_loader_cmd_xip_read_flash_finish(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
int32_t ret = BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
|
|
|
|
//LOG_F("exit\n");
|
|
|
|
bflb_eflash_loader_cmd_ack(ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t bflb_eflash_loader_cmd_readSha_flash(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
return BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t bflb_eflash_loader_cmd_xip_readSha_flash(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
int32_t ret = BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
uint32_t startaddr, read_len;
|
|
|
|
//SEC_Eng_SHA256_Ctx sha_ctx;
|
|
|
|
//SEC_ENG_SHA_ID_Type shaId = SEC_ENG_SHA_ID0;
|
|
|
|
uint16_t sha_len = 32;
|
|
|
|
uint8_t ackdata[32 + 4];
|
|
|
|
//LOG_F("XRSha\n");
|
|
|
|
simple_malloc_init(g_malloc_buf, sizeof(g_malloc_buf));
|
|
|
|
uint8_t *g_sha_in_buf = vmalloc(BFLB_EFLASH_LOADER_READBUF_SIZE);
|
|
|
|
if (len != 8) {
|
|
|
|
ret = BFLB_EFLASH_LOADER_FLASH_WRITE_PARA_ERROR;
|
|
|
|
bflb_eflash_loader_cmd_ack(ret);
|
|
|
|
} else {
|
|
|
|
memcpy(&startaddr, data, 4);
|
|
|
|
memcpy(&read_len, data + 4, 4);
|
|
|
|
|
|
|
|
//LOG_F("from%08x,%d\n", startaddr, read_len);
|
|
|
|
//LOG_F("!!!Be careful that SHA input data should locate at OCRAM \n");
|
|
|
|
bflb_sha_init(sha, SHA_MODE_SHA256);
|
|
|
|
bflb_sha256_start(sha, &ctx_sha256);
|
|
|
|
|
|
|
|
while (read_len > 0) {
|
|
|
|
if (read_len > BFLB_EFLASH_LOADER_READBUF_SIZE) {
|
|
|
|
blsp_mediaboot_read(startaddr, g_sha_in_buf, BFLB_EFLASH_LOADER_READBUF_SIZE);
|
|
|
|
/*cal sha here*/
|
|
|
|
bflb_sha256_update(sha, &ctx_sha256, g_sha_in_buf, BFLB_EFLASH_LOADER_READBUF_SIZE);
|
|
|
|
read_len -= BFLB_EFLASH_LOADER_READBUF_SIZE;
|
|
|
|
startaddr += BFLB_EFLASH_LOADER_READBUF_SIZE;
|
|
|
|
} else {
|
|
|
|
blsp_mediaboot_read(startaddr, g_sha_in_buf, read_len);
|
|
|
|
/*cal sha here*/
|
|
|
|
bflb_sha256_update(sha, &ctx_sha256, g_sha_in_buf, read_len);
|
|
|
|
read_len -= read_len;
|
|
|
|
startaddr += read_len;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bflb_sha256_finish(sha, &ctx_sha256, (uint8_t *)&ackdata[4]);
|
|
|
|
|
|
|
|
for (sha_len = 0; sha_len < 32; sha_len++) {
|
|
|
|
//LOG_F("\r\n");
|
|
|
|
//LOG_F("%02x ", ackdata[4 + sha_len]);
|
|
|
|
}
|
|
|
|
|
|
|
|
sha_len = 32;
|
|
|
|
/*ack read data */
|
|
|
|
ackdata[0] = BFLB_EFLASH_LOADER_CMD_ACK & 0xff;
|
|
|
|
ackdata[1] = (BFLB_EFLASH_LOADER_CMD_ACK >> 8) & 0xff;
|
|
|
|
ackdata[2] = sha_len & 0xff;
|
|
|
|
ackdata[3] = (sha_len >> 8) & 0xff;
|
|
|
|
bflb_eflash_loader_if_write((uint32_t *)ackdata, sha_len + 4);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
ATTR_TCM_SECTION static int32_t bflb_eflash_loader_cmd_write_flash_check(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
//LOG_F("WC\n");
|
|
|
|
|
|
|
|
bflb_eflash_loader_cmd_ack(g_eflash_loader_error);
|
|
|
|
|
|
|
|
return BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t bflb_eflash_loader_cmd_set_flash_para(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
bflb_eflash_loader_cmd_ack(BFLB_EFLASH_LOADER_SUCCESS);
|
|
|
|
return BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t bflb_eflash_loader_cmd_read_mac_addr(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
uint32_t crc = 0;
|
|
|
|
uint8_t ackdata[14];
|
|
|
|
|
|
|
|
ackdata[0] = BFLB_EFLASH_LOADER_CMD_ACK & 0xff;
|
|
|
|
ackdata[1] = (BFLB_EFLASH_LOADER_CMD_ACK >> 8) & 0xff;
|
|
|
|
ackdata[2] = 10;
|
|
|
|
ackdata[3] = 0;
|
|
|
|
ackdata[4] = ackdata[5] = ackdata[6] = ackdata[7] = ackdata[8] = ackdata[9] = 0x22; /* fake for download */
|
|
|
|
|
|
|
|
crc = BFLB_Soft_CRC32((uint8_t *)ackdata + 4, 6);
|
|
|
|
memcpy(ackdata + 10, (uint8_t *)&crc, 4);
|
|
|
|
bflb_eflash_loader_if_write((uint32_t *)ackdata, 14);
|
|
|
|
|
|
|
|
return BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int32_t bflb_eflash_loader_cmd_clock_set(uint16_t cmd, uint8_t *data, uint16_t len)
|
|
|
|
{
|
|
|
|
bflb_eflash_loader_cmd_ack(BFLB_EFLASH_LOADER_SUCCESS);
|
|
|
|
return BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2023-02-24 21:33:12 +08:00
|
|
|
int32_t ATTR_TCM_SECTION bflb_eflash_loader_cmd_process(uint8_t cmdid, uint8_t *data, uint16_t len)
|
2022-11-25 20:16:20 +08:00
|
|
|
{
|
|
|
|
int32_t ret = BFLB_EFLASH_LOADER_SUCCESS;
|
|
|
|
#if BLSP_BOOT2_SUPPORT_EFLASH_LOADER_FLASH || BLSP_BOOT2_SUPPORT_EFLASH_LOADER_RAM
|
|
|
|
int i = 0;
|
|
|
|
for (i = 0; i < sizeof(eflash_loader_cmds) / sizeof(eflash_loader_cmds[0]); i++) {
|
|
|
|
if (eflash_loader_cmds[i].cmd == cmdid) {
|
|
|
|
if (EFLASH_LOADER_CMD_ENABLE == eflash_loader_cmds[i].enabled && NULL != eflash_loader_cmds[i].cmd_process) {
|
|
|
|
ret = eflash_loader_cmds[i].cmd_process(cmdid, data, len);
|
|
|
|
} else {
|
|
|
|
return BFLB_EFLASH_LOADER_CMD_ID_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|