README.khadas-vim 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101
  1. U-Boot for Khadas VIM
  2. =======================
  3. Khadas VIM is an Open Source DIY Box manufactured by Shenzhen Wesion
  4. Technology Co., Ltd with the following specifications:
  5. - Amlogic S905X ARM Cortex-A53 quad-core SoC @ 1.5GHz
  6. - ARM Mali 450 GPU
  7. - 2GB DDR3 SDRAM
  8. - 10/100 Ethernet
  9. - HDMI 2.0 4K/60Hz display
  10. - 40-pin GPIO header
  11. - 2 x USB 2.0 Host, 1 x USB 2.0 Type-C OTG
  12. - 8GB/16GBeMMC
  13. - microSD
  14. - SDIO Wifi Module, Bluetooth
  15. - Two channels IR receiver
  16. Currently the u-boot port supports the following devices:
  17. - serial
  18. - eMMC, microSD
  19. - Ethernet
  20. - I2C
  21. - Regulators
  22. - Reset controller
  23. - Clock controller
  24. - USB Host
  25. - ADC
  26. U-Boot compilation
  27. ==================
  28. > export CROSS_COMPILE=aarch64-none-elf-
  29. > make khadas-vim_defconfig
  30. > make
  31. Image creation
  32. ==============
  33. Amlogic doesn't provide sources for the firmware and for tools needed
  34. to create the bootloader image, so it is necessary to obtain them from
  35. the git tree published by the board vendor:
  36. > wget https://releases.linaro.org/archive/13.11/components/toolchain/binaries/gcc-linaro-aarch64-none-elf-4.8-2013.11_linux.tar.xz
  37. > wget https://releases.linaro.org/archive/13.11/components/toolchain/binaries/gcc-linaro-arm-none-eabi-4.8-2013.11_linux.tar.xz
  38. > tar xvfJ gcc-linaro-aarch64-none-elf-4.8-2013.11_linux.tar.xz
  39. > tar xvfJ gcc-linaro-arm-none-eabi-4.8-2013.11_linux.tar.xz
  40. > export PATH=$PWD/gcc-linaro-aarch64-none-elf-4.8-2013.11_linux/bin:$PWD/gcc-linaro-arm-none-eabi-4.8-2013.11_linux/bin:$PATH
  41. > git clone https://github.com/khadas/u-boot -b Vim vim-u-boot
  42. > cd vim-u-boot
  43. > make kvim_defconfig
  44. > make CROSS_COMPILE=aarch64-none-elf-
  45. > export FIPDIR=$PWD/fip
  46. Go back to mainline U-Boot source tree then :
  47. > mkdir fip
  48. > cp $FIPDIR/gxl/bl2.bin fip/
  49. > cp $FIPDIR/gxl/acs.bin fip/
  50. > cp $FIPDIR/gxl/bl21.bin fip/
  51. > cp $FIPDIR/gxl/bl30.bin fip/
  52. > cp $FIPDIR/gxl/bl301.bin fip/
  53. > cp $FIPDIR/gxl/bl31.img fip/
  54. > cp u-boot.bin fip/bl33.bin
  55. > $FIPDIR/blx_fix.sh \
  56. fip/bl30.bin \
  57. fip/zero_tmp \
  58. fip/bl30_zero.bin \
  59. fip/bl301.bin \
  60. fip/bl301_zero.bin \
  61. fip/bl30_new.bin \
  62. bl30
  63. > python $FIPDIR/acs_tool.pyc fip/bl2.bin fip/bl2_acs.bin fip/acs.bin 0
  64. > $FIPDIR/blx_fix.sh \
  65. fip/bl2_acs.bin \
  66. fip/zero_tmp \
  67. fip/bl2_zero.bin \
  68. fip/bl21.bin \
  69. fip/bl21_zero.bin \
  70. fip/bl2_new.bin \
  71. bl2
  72. > $FIPDIR/gxl/aml_encrypt_gxl --bl3enc --input fip/bl30_new.bin
  73. > $FIPDIR/gxl/aml_encrypt_gxl --bl3enc --input fip/bl31.img
  74. > $FIPDIR/gxl/aml_encrypt_gxl --bl3enc --input fip/bl33.bin
  75. > $FIPDIR/gxl/aml_encrypt_gxl --bl2sig --input fip/bl2_new.bin --output fip/bl2.n.bin.sig
  76. > $FIPDIR/gxl/aml_encrypt_gxl --bootmk \
  77. --output fip/u-boot.bin \
  78. --bl2 fip/bl2.n.bin.sig \
  79. --bl30 fip/bl30_new.bin.enc \
  80. --bl31 fip/bl31.img.enc \
  81. --bl33 fip/bl33.bin.enc
  82. and then write the image to SD with:
  83. > DEV=/dev/your_sd_device
  84. > dd if=fip/u-boot.bin.sd.bin of=$DEV conv=fsync,notrunc bs=512 skip=1 seek=1
  85. > dd if=fip/u-boot.bin.sd.bin of=$DEV conv=fsync,notrunc bs=1 count=444