Lines Matching +full:0 +full:x52
12 print(sys.argv[0] + " --arc-id 0x52 --image u-boot.bin --elf u-boot")
26 return sum(ba) & 0xFF
30 if arc_id not in [0x52, 0x53]:
59 image_copy_adr = 0x81000000
62 arc_id = 0x52 # 0x52 for 1st HSDK release (hardcoded in RTL)
63 magic1 = 0xdeadbeafaf # big endian byte order
64 flash_address = 0x0
65 flash_type = 0x0 # 0 - SPI flash, 1 - NOR flash
67 0x20202a2020202020202020202a20202020207c5c2e20202020202e2f7c20202020207c2d,
68 0x2e5c2020202f2e2d7c20202020205c2020602d2d2d6020202f20202020202f205f202020,
69 0x205f20205c20202020207c205f60712070205f207c2020202020272e5f3d2f205c3d5f2e,
70 0x272020202020202020605c202f60202020202020202020202020206f2020202020202020]
73 if opt in ('-h', "--help"): usage(0)
92 for i in range(12): file.write(0xFF.to_bytes(1, byteorder='little'))
95 file.write(0xFF.to_bytes(1, byteorder='little'))
97 for i in range(11): file.write(0xFF.to_bytes(1, byteorder='little'))
109 headerised_image_crc = hex(zlib.crc32(fi.read()) & 0xffffffff)
111 load_addr = 0x81000000
112 crc_store_adr = load_addr - 0x8
113 crc_calc_adr = crc_store_adr - 0x4
123 if load_size & 0xFFFF == 0:
126 errase_size = load_size - (load_size & 0xFFFF) + 0x10000
130 "fatload mmc 0:1 " + hex(load_addr) + " " + headerised_filename + " && " + \
131 "sf probe 0:0 && " + \
133 "sf protect unlock 0x0 " + hex(errase_size) + " && " + \
134 "sf erase 0x0 " + hex(errase_size) + " && " + \
135 "sf write " + hex(load_addr) + " 0x0 " + hex(load_size) + " && " + \
136 "sf protect lock 0x0 " + hex(errase_size)