a2c7606454f8beed93cd52bedebe0584704752a8
[oweals/u-boot.git] / board / amlogic / p212 / README.khadas-vim
1 U-Boot for Khadas VIM
2 =======================
3
4 Khadas VIM is an Open Source DIY Box manufactured by Shenzhen Wesion
5 Technology Co., Ltd with the following specifications:
6
7  - Amlogic S905X ARM Cortex-A53 quad-core SoC @ 1.5GHz
8  - ARM Mali 450 GPU
9  - 2GB DDR3 SDRAM
10  - 10/100 Ethernet
11  - HDMI 2.0 4K/60Hz display
12  - 40-pin GPIO header
13  - 2 x USB 2.0 Host, 1 x USB 2.0 Type-C OTG
14  - 8GB/16GBeMMC
15  - microSD
16  - SDIO Wifi Module, Bluetooth
17  - Two channels IR receiver
18
19 Currently the u-boot port supports the following devices:
20  - serial
21  - eMMC, microSD
22  - Ethernet
23  - I2C
24  - Regulators
25  - Reset controller
26  - Clock controller
27  - USB Host
28  - ADC
29
30 U-Boot compilation
31 ==================
32
33  > export ARCH=arm
34  > export CROSS_COMPILE=aarch64-none-elf-
35  > make khadas-vim_defconfig
36  > make
37
38 Image creation
39 ==============
40
41 Amlogic doesn't provide sources for the firmware and for tools needed
42 to create the bootloader image, so it is necessary to obtain them from
43 the git tree published by the board vendor:
44
45  > wget https://releases.linaro.org/archive/13.11/components/toolchain/binaries/gcc-linaro-aarch64-none-elf-4.8-2013.11_linux.tar.xz
46  > wget https://releases.linaro.org/archive/13.11/components/toolchain/binaries/gcc-linaro-arm-none-eabi-4.8-2013.11_linux.tar.xz
47  > tar xvfJ gcc-linaro-aarch64-none-elf-4.8-2013.11_linux.tar.xz
48  > tar xvfJ gcc-linaro-arm-none-eabi-4.8-2013.11_linux.tar.xz
49  > export PATH=$PWD/gcc-linaro-aarch64-none-elf-4.8-2013.11_linux/bin:$PWD/gcc-linaro-arm-none-eabi-4.8-2013.11_linux/bin:$PATH
50  > git clone https://github.com/khadas/u-boot -b Vim vim-u-boot
51  > cd vim-u-boot
52  > make kvim_defconfig
53  > make CROSS_COMPILE=aarch64-none-elf-
54  > export FIPDIR=$PWD/fip
55
56 Go back to mainline U-Boot source tree then :
57  > mkdir fip
58
59  > cp $FIPDIR/gxl/bl2.bin fip/
60  > cp $FIPDIR/gxl/acs.bin fip/
61  > cp $FIPDIR/gxl/bl21.bin fip/
62  > cp $FIPDIR/gxl/bl30.bin fip/
63  > cp $FIPDIR/gxl/bl301.bin fip/
64  > cp $FIPDIR/gxl/bl31.img fip/
65  > cp u-boot.bin fip/bl33.bin
66
67  > $FIPDIR/blx_fix.sh \
68         fip/bl30.bin \
69         fip/zero_tmp \
70         fip/bl30_zero.bin \
71         fip/bl301.bin \
72         fip/bl301_zero.bin \
73         fip/bl30_new.bin \
74         bl30
75
76  > python $FIPDIR/acs_tool.pyc fip/bl2.bin fip/bl2_acs.bin fip/acs.bin 0
77
78  > $FIPDIR/blx_fix.sh \
79         fip/bl2_acs.bin \
80         fip/zero_tmp \
81         fip/bl2_zero.bin \
82         fip/bl21.bin \
83         fip/bl21_zero.bin \
84         fip/bl2_new.bin \
85         bl2
86
87  > $FIPDIR/gxl/aml_encrypt_gxl --bl3enc --input fip/bl30_new.bin
88  > $FIPDIR/gxl/aml_encrypt_gxl --bl3enc --input fip/bl31.img
89  > $FIPDIR/gxl/aml_encrypt_gxl --bl3enc --input fip/bl33.bin
90  > $FIPDIR/gxl/aml_encrypt_gxl --bl2sig --input fip/bl2_new.bin --output fip/bl2.n.bin.sig
91  > $FIPDIR/gxl/aml_encrypt_gxl --bootmk \
92                 --output fip/u-boot.bin \
93                 --bl2 fip/bl2.n.bin.sig \
94                 --bl30 fip/bl30_new.bin.enc \
95                 --bl31 fip/bl31.img.enc \
96                 --bl33 fip/bl33.bin.enc
97
98 and then write the image to SD with:
99
100  > DEV=/dev/your_sd_device
101  > dd if=fip/u-boot.bin.sd.bin of=$DEV conv=fsync,notrunc bs=512 skip=1 seek=1
102  > dd if=fip/u-boot.bin.sd.bin of=$DEV conv=fsync,notrunc bs=1 count=444