blob: 595998c4fabbd19116af18252b680a541fcce82a [file] [log] [blame]
Loic Devulderd17b8092018-10-03 12:02:07 +02001U-Boot for Khadas VIM2
2=======================
3
4Khadas VIM2 is an Open Source DIY Box manufactured by Shenzhen Wesion
5Technology Co., Ltd with the following specifications:
6
7 - Amlogic S912 ARM Cortex-A53 octo-core SoC @ 1.5GHz
8 - ARM Mali T860 GPU
9 - 2/3GB DDR4 SDRAM
10 - 10/100/1000 Ethernet
11 - HDMI 2.0 4K/60Hz display
12 - 40-pin GPIO header
13 - 2 x USB 2.0 Host, 1 x USB 2.0 Type-C OTG
14 - 16GB/32GB/64GB eMMC
15 - 2MB SPI Flash
16 - microSD
17 - SDIO Wifi Module, Bluetooth
18 - Two channels IR receiver
19
20Currently the u-boot port supports the following devices:
21 - serial
22 - eMMC, microSD
23 - Ethernet
24 - I2C
25 - Regulators
26 - Reset controller
27 - Clock controller
28 - USB Host
29 - ADC
30
31U-Boot compilation
32==================
33
Loic Devulderd17b8092018-10-03 12:02:07 +020034 > export CROSS_COMPILE=aarch64-none-elf-
35 > make khadas-vim2_defconfig
36 > make
37
38Image creation
39==============
40
41Amlogic doesn't provide sources for the firmware and for tools needed
42to create the bootloader image, so it is necessary to obtain them from
43the git tree published by the board vendor:
44
45 > wget https://releases.linaro.org/archive/13.11/components/toolchain/binaries/gcc-linaro-aarch64-none-elf-4.8-2013.11_linux.tar.xz
46 > wget https://releases.linaro.org/archive/13.11/components/toolchain/binaries/gcc-linaro-arm-none-eabi-4.8-2013.11_linux.tar.xz
47 > tar xvfJ gcc-linaro-aarch64-none-elf-4.8-2013.11_linux.tar.xz
48 > tar xvfJ gcc-linaro-arm-none-eabi-4.8-2013.11_linux.tar.xz
49 > export PATH=$PWD/gcc-linaro-aarch64-none-elf-4.8-2013.11_linux/bin:$PWD/gcc-linaro-arm-none-eabi-4.8-2013.11_linux/bin:$PATH
Neil Armstronge2531272019-04-10 16:22:41 +020050 > git clone https://github.com/khadas/u-boot -b khadas-vim-v2015.01 vim-u-boot
Loic Devulderd17b8092018-10-03 12:02:07 +020051 > cd vim-u-boot
Neil Armstronge2531272019-04-10 16:22:41 +020052 > make kvim2_defconfig
Loic Devulderd17b8092018-10-03 12:02:07 +020053 > make
54 > export FIPDIR=$PWD/fip
55
56Go back to mainline U-Boot source tree then :
57 > mkdir fip
58
59 > cp $FIPDIR/gxl/bl2.bin fip/
60 > cp $FIPDIR/gxl/acs.bin fip/
61 > cp $FIPDIR/gxl/bl21.bin fip/
62 > cp $FIPDIR/gxl/bl30.bin fip/
63 > cp $FIPDIR/gxl/bl301.bin fip/
64 > cp $FIPDIR/gxl/bl31.img fip/
65 > cp u-boot.bin fip/bl33.bin
66
67 > $FIPDIR/blx_fix.sh \
68 fip/bl30.bin \
69 fip/zero_tmp \
70 fip/bl30_zero.bin \
71 fip/bl301.bin \
72 fip/bl301_zero.bin \
73 fip/bl30_new.bin \
74 bl30
75
76 > python $FIPDIR/acs_tool.pyc fip/bl2.bin fip/bl2_acs.bin fip/acs.bin 0
77
78 > $FIPDIR/blx_fix.sh \
79 fip/bl2_acs.bin \
80 fip/zero_tmp \
81 fip/bl2_zero.bin \
82 fip/bl21.bin \
83 fip/bl21_zero.bin \
84 fip/bl2_new.bin \
85 bl2
86
87 > $FIPDIR/gxl/aml_encrypt_gxl --bl3enc --input fip/bl30_new.bin
88 > $FIPDIR/gxl/aml_encrypt_gxl --bl3enc --input fip/bl31.img
89 > $FIPDIR/gxl/aml_encrypt_gxl --bl3enc --input fip/bl33.bin
90 > $FIPDIR/gxl/aml_encrypt_gxl --bl2sig --input fip/bl2_new.bin --output fip/bl2.n.bin.sig
91 > $FIPDIR/gxl/aml_encrypt_gxl --bootmk \
92 --output fip/u-boot.bin \
93 --bl2 fip/bl2.n.bin.sig \
94 --bl30 fip/bl30_new.bin.enc \
95 --bl31 fip/bl31.img.enc \
96 --bl33 fip/bl33.bin.enc
97
98and then write the image to SD with:
99
100 > DEV=/dev/your_sd_device
101 > dd if=fip/u-boot.bin.sd.bin of=$DEV conv=fsync,notrunc bs=512 skip=1 seek=1
102 > dd if=fip/u-boot.bin.sd.bin of=$DEV conv=fsync,notrunc bs=1 count=444