1 // SPDX-License-Identifier: GPL-2.0+
3 * (C) Copyright 2000, 2001
4 * Rich Ireland, Enterasys Networks, rireland@enterasys.com.
31 * Map op to supported operations. We don't use a table since we
32 * would just have to relocate it from flash anyway.
34 static int fpga_get_op(char *opstr)
38 if (!strcmp("info", opstr))
40 else if (!strcmp("loadb", opstr))
42 else if (!strcmp("load", opstr))
44 #if defined(CONFIG_CMD_FPGA_LOADP)
45 else if (!strcmp("loadp", opstr))
48 #if defined(CONFIG_CMD_FPGA_LOADBP)
49 else if (!strcmp("loadbp", opstr))
52 #if defined(CONFIG_CMD_FPGA_LOADFS)
53 else if (!strcmp("loadfs", opstr))
56 #if defined(CONFIG_CMD_FPGA_LOADMK)
57 else if (!strcmp("loadmk", opstr))
60 else if (!strcmp("dump", opstr))
62 #if defined(CONFIG_CMD_FPGA_LOAD_SECURE)
63 else if (!strcmp("loads", opstr))
70 /* ------------------------------------------------------------------------- */
72 * fpga <op> <device number> <data addr> <datasize>
73 * where op is 'load', 'dump', or 'info'
74 * If there is no device number field, the fpga environment variable is used.
75 * If there is no data addr field, the fpgadata environment variable is used.
76 * The info command requires no data address field.
78 int do_fpga(cmd_tbl_t *cmdtp, int flag, int argc, char *const argv[])
80 int op, dev = FPGA_INVALID_DEVICE;
82 void *fpga_data = NULL;
83 char *devstr = env_get("fpga");
84 char *datastr = env_get("fpgadata");
86 #if defined(CONFIG_FIT)
87 const char *fit_uname = NULL;
90 #if defined(CONFIG_CMD_FPGA_LOADFS)
91 fpga_fs_info fpga_fsinfo;
92 fpga_fsinfo.fstype = FS_TYPE_ANY;
94 #if defined(CONFIG_CMD_FPGA_LOAD_SECURE)
95 struct fpga_secure_info fpga_sec_info;
97 memset(&fpga_sec_info, 0, sizeof(fpga_sec_info));
101 dev = (int) simple_strtoul(devstr, NULL, 16);
103 fpga_data = (void *)simple_strtoul(datastr, NULL, 16);
105 if (argc > 9 || argc < 2) {
106 debug("%s: Too many or too few args (%d)\n", __func__, argc);
107 return CMD_RET_USAGE;
110 op = fpga_get_op(argv[1]);
114 printf("Unknown fpga operation \"%s\"\n", argv[1]);
115 return CMD_RET_USAGE;
116 #if defined(CONFIG_CMD_FPGA_LOADFS)
119 return CMD_RET_USAGE;
120 fpga_fsinfo.blocksize = (unsigned int)
121 simple_strtoul(argv[5], NULL, 16);
122 fpga_fsinfo.interface = argv[6];
123 fpga_fsinfo.dev_part = argv[7];
124 fpga_fsinfo.filename = argv[8];
129 #if defined(CONFIG_CMD_FPGA_LOAD_SECURE)
132 return CMD_RET_USAGE;
134 fpga_sec_info.userkey_addr = (u8 *)(uintptr_t)
135 simple_strtoull(argv[7],
137 fpga_sec_info.encflag = (u8)simple_strtoul(argv[6], NULL, 16);
138 fpga_sec_info.authflag = (u8)simple_strtoul(argv[5], NULL, 16);
140 if (fpga_sec_info.authflag >= FPGA_NO_ENC_OR_NO_AUTH &&
141 fpga_sec_info.encflag >= FPGA_NO_ENC_OR_NO_AUTH) {
142 puts("ERR: Use <fpga load> for NonSecure bitstream\n");
143 return CMD_RET_USAGE;
146 if (fpga_sec_info.encflag == FPGA_ENC_USR_KEY &&
147 !fpga_sec_info.userkey_addr) {
148 puts("ERR: User key not provided\n");
149 return CMD_RET_USAGE;
160 case 5: /* fpga <op> <dev> <data> <datasize> */
161 data_size = simple_strtoul(argv[4], NULL, 16);
163 puts("Zero data_size\n");
164 return CMD_RET_USAGE;
166 case 4: /* fpga <op> <dev> <data> */
167 #if defined(CONFIG_FIT)
168 if (fit_parse_subimage(argv[3], (ulong)fpga_data,
169 &fit_addr, &fit_uname)) {
170 fpga_data = (void *)fit_addr;
171 debug("* fpga: subimage '%s' from FIT image ",
173 debug("at 0x%08lx\n", fit_addr);
177 fpga_data = (void *)simple_strtoul(argv[3], NULL, 16);
178 debug("* fpga: cmdline image address = 0x%08lx\n",
181 debug("%s: fpga_data = 0x%lx\n", __func__, (ulong)fpga_data);
183 puts("Zero fpga_data address\n");
184 return CMD_RET_USAGE;
186 case 3: /* fpga <op> <dev | data addr> */
187 dev = (int)simple_strtoul(argv[2], NULL, 16);
188 debug("%s: device = %d\n", __func__, dev);
191 if (dev == FPGA_INVALID_DEVICE) {
192 puts("FPGA device not specified\n");
193 return CMD_RET_USAGE;
202 rc = fpga_load(dev, fpga_data, data_size, BIT_FULL);
205 #if defined(CONFIG_CMD_FPGA_LOADP)
207 rc = fpga_load(dev, fpga_data, data_size, BIT_PARTIAL);
212 rc = fpga_loadbitstream(dev, fpga_data, data_size, BIT_FULL);
215 #if defined(CONFIG_CMD_FPGA_LOADBP)
217 rc = fpga_loadbitstream(dev, fpga_data, data_size, BIT_PARTIAL);
221 #if defined(CONFIG_CMD_FPGA_LOADFS)
223 rc = fpga_fsload(dev, fpga_data, data_size, &fpga_fsinfo);
227 #if defined(CONFIG_CMD_FPGA_LOAD_SECURE)
229 rc = fpga_loads(dev, fpga_data, data_size, &fpga_sec_info);
233 #if defined(CONFIG_CMD_FPGA_LOADMK)
235 switch (genimg_get_format(fpga_data)) {
236 #if defined(CONFIG_IMAGE_FORMAT_LEGACY)
237 case IMAGE_FORMAT_LEGACY:
239 image_header_t *hdr =
240 (image_header_t *)fpga_data;
244 comp = image_get_comp(hdr);
245 if (comp == IH_COMP_GZIP) {
246 #if defined(CONFIG_GZIP)
247 ulong image_buf = image_get_data(hdr);
248 data = image_get_load(hdr);
249 ulong image_size = ~0UL;
251 if (gunzip((void *)data, ~0UL,
254 puts("GUNZIP: error\n");
257 data_size = image_size;
259 puts("Gunzip image is not supported\n");
263 data = (ulong)image_get_data(hdr);
264 data_size = image_get_data_size(hdr);
266 rc = fpga_load(dev, (void *)data, data_size,
271 #if defined(CONFIG_FIT)
272 case IMAGE_FORMAT_FIT:
274 const void *fit_hdr = (const void *)fpga_data;
276 const void *fit_data;
278 if (fit_uname == NULL) {
279 puts("No FIT subimage unit name\n");
283 if (!fit_check_format(fit_hdr)) {
284 puts("Bad FIT image format\n");
288 /* get fpga component image node offset */
289 noffset = fit_image_get_node(fit_hdr,
292 printf("Can't find '%s' FIT subimage\n",
297 /* verify integrity */
298 if (!fit_image_verify(fit_hdr, noffset)) {
299 puts ("Bad Data Hash\n");
303 /* get fpga subimage data address and length */
304 if (fit_image_get_data(fit_hdr, noffset,
305 &fit_data, &data_size)) {
306 puts("Fpga subimage data not found\n");
310 rc = fpga_load(dev, fit_data, data_size,
316 puts("** Unknown image type\n");
324 rc = fpga_dump(dev, fpga_data, data_size);
328 printf("Unknown operation\n");
329 return CMD_RET_USAGE;
334 static cmd_tbl_t fpga_commands[] = {
337 static int do_fpga_wrapper(cmd_tbl_t *cmdtp, int flag, int argc,
344 return CMD_RET_USAGE;
346 fpga_cmd = find_cmd_tbl(argv[1], fpga_commands,
347 ARRAY_SIZE(fpga_commands));
349 /* This should be removed when all functions are converted */
351 return do_fpga(cmdtp, flag, argc, argv);
353 /* FIXME This can't be reached till all functions are converted */
355 debug("fpga: non existing command\n");
356 return CMD_RET_USAGE;
362 if (argc > fpga_cmd->maxargs) {
363 debug("fpga: more parameters passed\n");
364 return CMD_RET_USAGE;
367 ret = fpga_cmd->cmd(fpga_cmd, flag, argc, argv);
369 return cmd_process_error(fpga_cmd, ret);
372 #if defined(CONFIG_CMD_FPGA_LOADFS) || defined(CONFIG_CMD_FPGA_LOAD_SECURE)
373 U_BOOT_CMD(fpga, 9, 1, do_fpga_wrapper,
375 U_BOOT_CMD(fpga, 6, 1, do_fpga_wrapper,
377 "loadable FPGA image support",
378 "[operation type] [device number] [image address] [image size]\n"
380 " dump\t[dev] [address] [size]\tLoad device to memory buffer\n"
381 " info\t[dev]\t\t\tlist known device information\n"
382 " load\t[dev] [address] [size]\tLoad device from memory buffer\n"
383 #if defined(CONFIG_CMD_FPGA_LOADP)
384 " loadp\t[dev] [address] [size]\t"
385 "Load device from memory buffer with partial bitstream\n"
387 " loadb\t[dev] [address] [size]\t"
388 "Load device from bitstream buffer (Xilinx only)\n"
389 #if defined(CONFIG_CMD_FPGA_LOADBP)
390 " loadbp\t[dev] [address] [size]\t"
391 "Load device from bitstream buffer with partial bitstream"
394 #if defined(CONFIG_CMD_FPGA_LOADFS)
395 "Load device from filesystem (FAT by default) (Xilinx only)\n"
396 " loadfs [dev] [address] [image size] [blocksize] <interface>\n"
397 " [<dev[:part]>] <filename>\n"
399 #if defined(CONFIG_CMD_FPGA_LOADMK)
400 " loadmk [dev] [address]\tLoad device generated with mkimage"
401 #if defined(CONFIG_FIT)
403 "\tFor loadmk operating on FIT format uImage address must include\n"
404 "\tsubimage unit name in the form of addr:<subimg_uname>"
407 #if defined(CONFIG_CMD_FPGA_LOAD_SECURE)
408 "Load encrypted bitstream (Xilinx only)\n"
409 " loads [dev] [address] [size] [auth-OCM-0/DDR-1/noauth-2]\n"
410 " [enc-devkey(0)/userkey(1)/nenc(2) [Userkey address]\n"
411 "Loads the secure bistreams(authenticated/encrypted/both\n"
412 "authenticated and encrypted) of [size] from [address].\n"
413 "The auth-OCM/DDR flag specifies to perform authentication\n"
414 "in OCM or in DDR. 0 for OCM, 1 for DDR, 2 for no authentication.\n"
415 "The enc flag specifies which key to be used for decryption\n"
416 "0-device key, 1-user key, 2-no encryption.\n"
417 "The optional Userkey address specifies from which address key\n"
418 "has to be used for decryption if user key is selected.\n"
419 "NOTE: the sceure bitstream has to be created using xilinx\n"
420 "bootgen tool only.\n"