blob: 7ac3bdcbaf1df140c8b08e0d177c4f5df4e58979 [file] [log] [blame]
Neil Armstrong84e5e8e2020-06-11 10:53:49 +02001.. SPDX-License-Identifier: GPL-2.0+
2
3U-Boot for Khadas VIM2
4=======================
5
6Khadas VIM2 is an Open Source DIY Box manufactured by Shenzhen Wesion
7Technology Co., Ltd with the following specifications:
8
9 - Amlogic S912 ARM Cortex-A53 octo-core SoC @ 1.5GHz
10 - ARM Mali T860 GPU
11 - 2/3GB DDR4 SDRAM
12 - 10/100/1000 Ethernet
13 - HDMI 2.0 4K/60Hz display
14 - 40-pin GPIO header
15 - 2 x USB 2.0 Host, 1 x USB 2.0 Type-C OTG
16 - 16GB/32GB/64GB eMMC
17 - 2MB SPI Flash
18 - microSD
19 - SDIO Wifi Module, Bluetooth
20 - Two channels IR receiver
21
22U-Boot compilation
23------------------
24
25.. code-block:: bash
26
27 $ export CROSS_COMPILE=aarch64-none-elf-
28 $ make khadas-vim2_defconfig
29 $ make
30
31Image creation
32--------------
33
Neil Armstrong2ea98682022-03-02 10:42:22 +010034For simplified usage, pleaser refer to :doc:`pre-generated-fip` with codename `khadas-vim2`
35
Neil Armstrong84e5e8e2020-06-11 10:53:49 +020036Amlogic doesn't provide sources for the firmware and for tools needed
37to create the bootloader image, so it is necessary to obtain them from
38the git tree published by the board vendor:
39
40.. code-block:: bash
41
42 $ wget https://releases.linaro.org/archive/13.11/components/toolchain/binaries/gcc-linaro-aarch64-none-elf-4.8-2013.11_linux.tar.xz
43 $ wget https://releases.linaro.org/archive/13.11/components/toolchain/binaries/gcc-linaro-arm-none-eabi-4.8-2013.11_linux.tar.xz
44 $ tar xvfJ gcc-linaro-aarch64-none-elf-4.8-2013.11_linux.tar.xz
45 $ tar xvfJ gcc-linaro-arm-none-eabi-4.8-2013.11_linux.tar.xz
46 $ export PATH=$PWD/gcc-linaro-aarch64-none-elf-4.8-2013.11_linux/bin:$PWD/gcc-linaro-arm-none-eabi-4.8-2013.11_linux/bin:$PATH
47 $ git clone https://github.com/khadas/u-boot -b khadas-vim-v2015.01 vim-u-boot
48 $ cd vim-u-boot
49 $ make kvim2_defconfig
50 $ make
51 $ export FIPDIR=$PWD/fip
52
53Go back to mainline U-Boot source tree then :
54
55.. code-block:: bash
56
57 $ mkdir fip
58
59 $ cp $FIPDIR/gxl/bl2.bin fip/
60 $ cp $FIPDIR/gxl/acs.bin fip/
61 $ cp $FIPDIR/gxl/bl21.bin fip/
62 $ cp $FIPDIR/gxl/bl30.bin fip/
63 $ cp $FIPDIR/gxl/bl301.bin fip/
64 $ cp $FIPDIR/gxl/bl31.img fip/
65 $ cp u-boot.bin fip/bl33.bin
66
67 $ $FIPDIR/blx_fix.sh \
68 fip/bl30.bin \
69 fip/zero_tmp \
70 fip/bl30_zero.bin \
71 fip/bl301.bin \
72 fip/bl301_zero.bin \
73 fip/bl30_new.bin \
74 bl30
75
76 $ python $FIPDIR/acs_tool.pyc fip/bl2.bin fip/bl2_acs.bin fip/acs.bin 0
77
78 $ $FIPDIR/blx_fix.sh \
79 fip/bl2_acs.bin \
80 fip/zero_tmp \
81 fip/bl2_zero.bin \
82 fip/bl21.bin \
83 fip/bl21_zero.bin \
84 fip/bl2_new.bin \
85 bl2
86
87 $ $FIPDIR/gxl/aml_encrypt_gxl --bl3enc --input fip/bl30_new.bin
88 $ $FIPDIR/gxl/aml_encrypt_gxl --bl3enc --input fip/bl31.img
89 $ $FIPDIR/gxl/aml_encrypt_gxl --bl3enc --input fip/bl33.bin
90 $ $FIPDIR/gxl/aml_encrypt_gxl --bl2sig --input fip/bl2_new.bin --output fip/bl2.n.bin.sig
91 $ $FIPDIR/gxl/aml_encrypt_gxl --bootmk \
92 --output fip/u-boot.bin \
93 --bl2 fip/bl2.n.bin.sig \
94 --bl30 fip/bl30_new.bin.enc \
95 --bl31 fip/bl31.img.enc \
96 --bl33 fip/bl33.bin.enc
97
98and then write the image to SD with:
99
100.. code-block:: bash
101
102 $ DEV=/dev/your_sd_device
103 $ dd if=fip/u-boot.bin.sd.bin of=$DEV conv=fsync,notrunc bs=512 skip=1 seek=1
104 $ dd if=fip/u-boot.bin.sd.bin of=$DEV conv=fsync,notrunc bs=1 count=444