scripts: sd_fusing: Add entry for raw binary bootcode for LicheePi4A 45/315645/2
authorMarek Szyprowski <m.szyprowski@samsung.com>
Tue, 6 Aug 2024 12:12:30 +0000 (14:12 +0200)
committerMarek Szyprowski <m.szyprowski@samsung.com>
Tue, 6 Aug 2024 12:20:56 +0000 (14:20 +0200)
The content of the bootcode will be moved from sd_fusing.py script to the
boot images, so add a new raw binary entry for the bootcode.bin file for
the LicheePi4A platform.

Signed-off-by: Marek Szyprowski <m.szyprowski@samsung.com>
Change-Id: If399c8ae19789acf98b014fcac6307fadc564f5c

scripts/tizen/sd_fusing.py

index 2954838c632cfdc3566750a8bbcf67ef928e72b1..dc0015e492225de4263052b36efeafc1257d555a 100755 (executable)
@@ -613,6 +613,11 @@ class LicheePi4A(InitParams, SdFusingTargetAB):
         {"size": 64,   "name": "reserved1"},
         {"size": 125,  "name": "reserved2"},
     ]
+    raw_binary_table = [
+        {"name":       "bootcode",
+         "start_sector": 0, # part of protective MBR (bootcode)
+         "binaries":   "bootcode.bin", },
+    ]
 
     # bootcode written to the protective MBR, aka RV64 'J 0x4400' (sector 34)
     bootcode = b'\x6f\x40\x00\x40'
@@ -660,6 +665,11 @@ class LicheePi4ASuper(InitParams, SdFusingTargetAB):
         {"size": 64,   "name": "reserved1"},
         {"size": 125,  "name": "reserved2"}
     ]
+    raw_binary_table = [
+        {"name":       "bootcode",
+         "start_sector": 0, # part of protective MBR (bootcode)
+         "binaries":   "bootcode.bin", },
+    ]
 
     # bootcode written to the protective MBR, aka RV64 'J 0x4400' (sector 34)
     bootcode = b'\x6f\x40\x00\x40'