Blame view

doc/README.mxsimage 6.54 KB
bce883707   Marek Vasut   ARM: mxs: tools: ...
1
2
3
4
5
6
7
8
9
10
11
12
  Freescale i.MX233/i.MX28 SB image generator via mkimage
  =======================================================
  
  This tool allows user to produce SB BootStream encrypted with a zero key.
  Such a BootStream is then bootable on i.MX23/i.MX28.
  
  Usage -- producing image:
  =========================
  The mxsimage tool is targeted to be a simple replacement for the elftosb2 .
  To generate an image, write an image configuration file and run:
  
   mkimage -A arm -O u-boot -T mxsimage -n <path to configuration file> \
93e145964   Wolfgang Denk   Coding Style clea...
13
  	 <output bootstream file>
bce883707   Marek Vasut   ARM: mxs: tools: ...
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
  
  The output bootstream file is usually using the .sb file extension. Note
  that the example configuration files for producing bootable BootStream with
  the U-Boot bootloader can be found under arch/arm/boot/cpu/arm926ejs/mxs/
  directory. See the following files:
  
   mxsimage.mx23.cfg -- This is an example configuration for i.MX23
   mxsimage.mx28.cfg -- This is an example configuration for i.MX28
  
  Each configuration file uses very simple instruction semantics and a few
  additional rules have to be followed so that a useful image can be produced.
  These semantics and rules will be outlined now.
  
  - Each line of the configuration file contains exactly one instruction.
  - Every numeric value must be encoded in hexadecimal and in format 0xabcdef12 .
  - The configuration file is a concatenation of blocks called "sections" and
    optionally "DCD blocks" (see below).
    - Each "section" is started by the "SECTION" instruction.
    - The "SECTION" instruction has the following semantics:
  
        SECTION u32_section_number [BOOTABLE]
        - u32_section_number :: User-selected ID of the section
        - BOOTABLE           :: Sets the section as bootable
  
    - A bootable section is one from which the BootROM starts executing
      subsequent instructions or code. Exactly one section must be selected
      as bootable, usually the one containing the instructions and data to
      load the bootloader.
  
    - A "SECTION" must be immediatelly followed by a "TAG" instruction.
    - The "TAG" instruction has the following semantics:
  
        TAG [LAST]
        - LAST               :: Flag denoting the last section in the file
  
    - After a "TAG" unstruction, any of the following instructions may follow
      in any order and any quantity:
  
        NOOP
        - This instruction does nothing
  
        LOAD     u32_address string_filename
        - Instructs the BootROM to load file pointed by "string_filename" onto
93e145964   Wolfgang Denk   Coding Style clea...
57
  	address "u32_address".
bce883707   Marek Vasut   ARM: mxs: tools: ...
58
59
60
  
        LOAD IVT u32_address u32_IVT_entry_point
        - Crafts and loads IVT onto address "u32_address" with the entry point
93e145964   Wolfgang Denk   Coding Style clea...
61
  	of u32_IVT_entry_point.
bce883707   Marek Vasut   ARM: mxs: tools: ...
62
63
64
65
        - i.MX28-specific instruction!
  
        LOAD DCD u32_address u32_DCD_block_ID
        - Loads the DCD block with ID "u32_DCD_block_ID" onto address
93e145964   Wolfgang Denk   Coding Style clea...
66
  	"u32_address" and executes the contents of this DCD block
bce883707   Marek Vasut   ARM: mxs: tools: ...
67
68
69
70
        - i.MX28-specific instruction!
  
        FILL u32_address u32_pattern u32_length
        - Starts to write memory from addres "u32_address" with a pattern
93e145964   Wolfgang Denk   Coding Style clea...
71
  	specified by "u32_pattern". Writes exactly "u32_length" bytes of the
bce883707   Marek Vasut   ARM: mxs: tools: ...
72
73
74
75
  	pattern.
  
        JUMP [HAB] u32_address [u32_r0_arg]
        - Jumps onto memory address specified by "u32_address" by setting this
93e145964   Wolfgang Denk   Coding Style clea...
76
  	address in PT. The BootROM will pass the "u32_r0_arg" value in ARM
bce883707   Marek Vasut   ARM: mxs: tools: ...
77
78
79
80
81
82
  	register "r0" to the executed code if this option is specified.
  	Otherwise, ARM register "r0" will default to value 0x00000000. The
  	optional "HAB" flag is i.MX28-specific flag turning on the HAB boot.
  
        CALL [HAB] u32_address [u32_r0_arg]
        - See JUMP instruction above, as the operation is exactly the same with
93e145964   Wolfgang Denk   Coding Style clea...
83
  	one difference. The CALL instruction does allow returning into the
bce883707   Marek Vasut   ARM: mxs: tools: ...
84
85
86
87
88
89
90
  	BootROM from the executed code. U-Boot makes use of this in it's SPL
  	code.
  
        MODE string_mode
        - Restart the CPU and start booting from device specified by the
  	"string_mode" argument. The "string_mode" differs for each CPU
  	and can be:
93e145964   Wolfgang Denk   Coding Style clea...
91
92
93
94
  	 i.MX23, string_mode = USB/I2C/SPI1_FLASH/SPI2_FLASH/NAND_BCH
  			       JTAG/SPI3_EEPROM/SD_SSP0/SD_SSP1
  	 i.MX28, string_mode = USB/I2C/SPI2_FLASH/SPI3_FLASH/NAND_BCH
  			       JTAG/SPI2_EEPROM/SD_SSP0/SD_SSP1
bce883707   Marek Vasut   ARM: mxs: tools: ...
95
96
97
98
99
100
  
    - An optional "DCD" blocks can be added at the begining of the configuration
      file. Note that the DCD is only supported on i.MX28.
      - The DCD blocks must be inserted before the first "section" in the
        configuration file.
      - The DCD block has the following semantics:
93e145964   Wolfgang Denk   Coding Style clea...
101
  	DCD u32_DCD_block_ID
bce883707   Marek Vasut   ARM: mxs: tools: ...
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
  	- u32_DCD_block_ID	:: The ID number of the DCD block, must match
  				   the ID number used by "LOAD DCD" instruction.
  
      - The DCD block must be followed by one of the following instructions. All
        of the instructions operate either on 1, 2 or 4 bytes. This is selected by
        the 'n' suffix of the instruction:
  
  	WRITE.n u32_address u32_value
  	- Write the "u32_value" to the "u32_address" address.
  
  	ORR.n u32_address u32_value
  	- Read the "u32_address", perform a bitwise-OR with the "u32_value" and
  	  write the result back to "u32_address".
  
  	ANDC.n u32_address u32_value
  	- Read the "u32_address", perform a bitwise-AND with the complement of
  	  "u32_value" and write the result back to "u32_address".
  
  	EQZ.n u32_address u32_count
  	- Read the "u32_address" at most "u32_count" times and test if the value
  	  read is zero. If it is, break the loop earlier.
  
  	NEZ.n u32_address u32_count
  	- Read the "u32_address" at most "u32_count" times and test if the value
  	  read is non-zero. If it is, break the loop earlier.
  
  	EQ.n u32_address u32_mask
  	- Read the "u32_address" in a loop and test if the result masked with
  	  "u32_mask" equals the "u32_mask". If the values are equal, break the
  	  reading loop.
  
  	NEQ.n u32_address u32_mask
  	- Read the "u32_address" in a loop and test if the result masked with
  	  "u32_mask" does not equal the "u32_mask". If the values are not equal,
  	  break the reading loop.
  
  	NOOP
  	- This instruction does nothing.
  
  - If the verbose output from the BootROM is enabled, the BootROM will produce a
    letter on the Debug UART for each instruction it started processing. Here is a
    mapping between the above instructions and the BootROM verbose output:
  
     H -- SB Image header loaded
     T -- TAG instruction
     N -- NOOP instruction
     L -- LOAD instruction
     F -- FILL instruction
     J -- JUMP instruction
     C -- CALL instruction
     M -- MODE instruction
  
  Usage -- verifying image:
  =========================
  
  The mxsimage can also verify and dump contents of an image. Use the following
  syntax to verify and dump contents of an image:
  
   mkimage -l <input bootstream file>
  
  This will output all the information from the SB image header and all the
  instructions contained in the SB image. It will also check if the various
  checksums in the SB image are correct.