BA
/
BaBoRo_test2
Backup 1
mbed-os/tools/targets/REALTEK_RTL8195AM.py
- Committer:
- borlanic
- Date:
- 2018-04-24
- Revision:
- 0:02dd72d1d465
File content as of revision 0:02dd72d1d465:
""" Realtek Semiconductor Corp. RTL8195A elf2bin script """ import sys, array, struct, os, re, subprocess import hashlib import shutil import time import binascii from tools.paths import TOOLS_BOOTLOADERS from tools.toolchains import TOOLCHAIN_PATHS # Constant Variables TAG = 0x81950001 VER = 0x81950001 CAMPAIGN = binascii.hexlify('FFFFFFFFFFFFFFFF') RAM2_HEADER = { 'tag': 0, 'ver': 0, 'timestamp': 0, 'size': 72, 'hash': 'FF', 'campaign': 'FF', 'crc32': 0xFFFFFFFF, } def format_number(number, width): # convert to string line = format(number, '0%dx' % (width)) if len(line) > width: print "[ERROR] 0x%s cannot fit in width %d" % (line, width) sys.exit(-1) # cut string to list & reverse line = [line[i:i+2] for i in range(0, len(line), 2)] line.reverse() return binascii.a2b_hex("".join(line)) def format_string(string): return binascii.a2b_hex(string) def write_number(value, width, output): output.write(format_number(value, width)) def write_string(value, width, output): output.write(format_string(value)) def append_image_file(image, output): input = open(image, "rb") output.write(input.read()) input.close() def write_padding_bytes(output_name, size): current_size = os.stat(output_name).st_size padcount = size - current_size if padcount < 0: print "[ERROR] image is larger than expected size" sys.exit(-1) output = open(output_name, "ab") output.write('\377' * padcount) output.close() def crc32_checksum(string): return binascii.crc32(string) & 0xFFFFFFFF def sha256_checksum(filename, block_size=65536): sha256 = hashlib.sha256() with open(filename, 'rb') as f: for block in iter(lambda: f.read(block_size), b''): sha256.update(block) return sha256.hexdigest() def epoch_timestamp(): epoch = int(time.time()) return epoch def find_symbol(toolchain, mapfile, symbol): ret = None HEX = '0x0{,8}(?P<addr>[0-9A-Fa-f]{8})' if toolchain == "GCC_ARM": SYM = re.compile(r'^\s+' + HEX + r'\s+' + symbol + '\r?$') elif toolchain in ["ARM_STD", "ARM", "ARM_MICRO"]: SYM = re.compile(r'^\s+' + HEX + r'\s+0x[0-9A-Fa-f]{8}\s+Code.*\s+i\.' + symbol + r'\s+.*$') elif toolchain == "IAR": SYM = re.compile(r'^' + symbol + r'\s+' + HEX + '\s+.*$') with open(mapfile, 'r') as infile: for line in infile: match = re.match(SYM, line) if match: ret = match.group("addr") if not ret: print "[ERROR] cannot find the address of symbol " + symbol return 0 return int(ret,16) | 1 def parse_load_segment_gcc(image_elf): # Program Headers: # Type Offset VirtAddr PhysAddr FileSiz MemSiz Flg Align # LOAD 0x000034 0x10006000 0x10006000 0x026bc 0x026bc RW 0x8 # LOAD 0x0026f0 0x30000000 0x30000000 0x06338 0x06338 RWE 0x4 segment_list = [] cmd = os.path.join(TOOLCHAIN_PATHS['GCC_ARM'], 'arm-none-eabi-readelf') cmd = '"' + cmd + '"' + ' -l ' + image_elf for line in subprocess.check_output(cmd, shell=True, universal_newlines=True).split("\n"): if not line.startswith(" LOAD"): continue segment = line.split() if len(segment) != 8: continue offset = int(segment[1][2:], 16) addr = int(segment[2][2:], 16) size = int(segment[4][2:], 16) if addr != 0 and size != 0: segment_list.append((offset, addr, size)) return segment_list def parse_load_segment_armcc(image_elf): # ==================================== # # ** Program header #2 # # Type : PT_LOAD (1) # File Offset : 52 (0x34) # Virtual Addr : 0x30000000 # Physical Addr : 0x30000000 # Size in file : 27260 bytes (0x6a7c) # Size in memory: 42168 bytes (0xa4b8) # Flags : PF_X + PF_W + PF_R + PF_ARM_ENTRY (0x80000007) # Alignment : 8 # (offset, addr, size) = (0, 0, 0) segment_list = [] in_segment = False cmd = os.path.join(TOOLCHAIN_PATHS['ARM'], 'bin', 'fromelf') cmd = '"' + cmd + '"' + ' --text -v --only=none ' + image_elf for line in subprocess.check_output(cmd, shell=True, universal_newlines=True).split("\n"): if line == "": pass elif line.startswith("** Program header"): in_segment = True elif in_segment == False: pass elif line.startswith("============"): if addr != 0 and size != 0: segment_list.append((offset, addr, size)) in_segment = False (offset, addr, size) = (0, 0, 0) elif line.startswith(" Type"): if not re.match(r'\s+Type\s+:\s+PT_LOAD\s.*$', line): in_segment = False elif line.startswith(" File Offset"): match = re.match(r'^\s+File Offset\s+:\s+(?P<offset>\d+).*$', line) if match: offset = int(match.group("offset")) elif line.startswith(" Virtual Addr"): match = re.match(r'^\s+Virtual Addr\s+:\s+0x(?P<addr>[0-9a-f]+).*$', line) if match: addr = int(match.group("addr"), 16) elif line.startswith(" Size in file"): match = re.match(r'^\s+Size in file\s+:.*\(0x(?P<size>[0-9a-f]+)\).*$', line) if match: size = int(match.group("size"), 16) return segment_list def parse_load_segment_iar(image_elf): # SEGMENTS: # # Type Offset Virtual Physical File Sz Mem Sz Flags Align # ---- ------ ------- -------- ------- ------ ----- ----- # 0: load 0x34 0x10006000 0x10006000 0x26bc 0x26bc 0x6 WR 0x8 # 1: load 0x26f0 0x30000000 0x30000000 0x6338 0x6338 0x7 XWR 0x4 # # SECTIONS: # # Name Type Addr Offset Size Aln Lnk Inf ESz Flags # ---- ---- ---- ------ ---- --- --- --- --- ----- # 1: .shstrtab strtab 0xfc4d8 0x60 0x4 # 2: .strtab strtab 0xfc538 0xbb3f 0x4 segment_list = [] in_segment = False cmd = os.path.join(TOOLCHAIN_PATHS['IAR'], 'bin', 'ielfdumparm') cmd = '"' + cmd + '"' + ' ' + image_elf for line in subprocess.check_output(cmd, shell=True, universal_newlines=True).split("\n"): if line.startswith(" SEGMENTS:"): in_segment = True elif in_segment == False: pass elif line.startswith(" SECTIONS:"): break elif re.match(r'^\s+\w+:\s+load\s+.*$', line): segment = line.split() offset = int(segment[2][2:], 16) addr = int(segment[3][2:], 16) size = int(segment[5][2:], 16) if addr != 0 and size != 0: segment_list.append((offset, addr, size)) return segment_list def parse_load_segment(toolchain, image_elf): if toolchain == "GCC_ARM": return parse_load_segment_gcc(image_elf) elif toolchain in ["ARM_STD", "ARM", "ARM_MICRO"]: return parse_load_segment_armcc(image_elf) elif toolchain == "IAR": return parse_load_segment_iar(image_elf) else: return [] def create_payload(image_elf, ram2_bin, entry, segment): file_elf = open(image_elf, "rb") file_bin = open(ram2_bin, "wb") write_number(int(entry), 8, file_bin) write_number(int(len(segment)), 8, file_bin) write_number(0xFFFFFFFF, 8, file_bin) write_number(0xFFFFFFFF, 8, file_bin) for (offset, addr, size) in segment: file_elf.seek(offset) # write image header - size & addr write_number(addr, 8, file_bin) write_number(size, 8, file_bin) # write load segment file_bin.write(file_elf.read(size)) delta = size % 4 if delta != 0: padding = 4 - delta write_number(0x0, padding * 2, file_bin) file_bin.close() file_elf.close() def create_daplink(image_bin, ram1_bin, ram2_bin): # remove target binary file/path if os.path.isfile(image_bin): os.remove(image_bin) else: shutil.rmtree(image_bin) RAM2_HEADER['tag'] = format_number(TAG, 8) RAM2_HEADER['ver'] = format_number(VER, 8) RAM2_HEADER['timestamp'] = format_number(epoch_timestamp(), 16) RAM2_HEADER['size'] = format_number(os.stat(ram2_bin).st_size + 72, 8) RAM2_HEADER['hash'] = format_string(sha256_checksum(ram2_bin)) RAM2_HEADER['campaign'] = format_string(CAMPAIGN) output = open(image_bin, "wb") append_image_file(ram1_bin, output) append_image_file(ram2_bin, output) output.seek(0xb000) line = "" for key in ['tag', 'ver', 'timestamp', 'size', 'hash', 'campaign']: line += RAM2_HEADER[key] output.write(RAM2_HEADER[key]) RAM2_HEADER['crc32'] = format_number(crc32_checksum(line), 8) output.write(RAM2_HEADER['crc32']) output.close() # ---------------------------- # main function # ---------------------------- def rtl8195a_elf2bin(t_self, image_elf, image_bin): image_name = list(os.path.splitext(image_elf))[:-1] image_map = ".".join(image_name + ['map']) ram1_bin = os.path.join(TOOLS_BOOTLOADERS, "REALTEK_RTL8195AM", "ram_1.bin") ram2_bin = ".".join(image_name) + '-payload.bin' entry = find_symbol(t_self.name, image_map, "PLAT_Start") segment = parse_load_segment(t_self.name, image_elf) create_payload(image_elf, ram2_bin, entry, segment) create_daplink(image_bin, ram1_bin, ram2_bin)