README 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. U-Boot for Khadas VIM
  2. =======================
  3. Khadas VIM is an Open Source DIY Box manufactured by Shenzhen Wesion
  4. Technology Co., Ltd with the following specifications:
  5. - Amlogic S905x ARM Cortex-A53 quad-core SoC @ 2GHz
  6. - ARM Mali 450 GPU
  7. - 2GB DDR3 SDRAM
  8. - 10/100 Ethernet
  9. - HDMI 2.0 4K/60Hz display
  10. - 40-pin GPIO header
  11. - 2 x USB 2.0 Host, 1 x USB 2.0 Type-C OTG
  12. - 8GB/16GBeMMC
  13. - microSD
  14. - SDIO Wifi Module, Bluetooth
  15. - Two channels IR receiver
  16. Currently the u-boot port supports the following devices:
  17. - serial
  18. - eMMC, microSD
  19. - Ethernet
  20. U-Boot compilation
  21. ==================
  22. > export ARCH=arm
  23. > export CROSS_COMPILE=aarch64-none-elf-
  24. > make khadas-vim_defconfig
  25. > make
  26. Image creation
  27. ==============
  28. Amlogic doesn't provide sources for the firmware and for tools needed
  29. to create the bootloader image, so it is necessary to obtain them from
  30. the git tree published by the board vendor:
  31. > wget https://releases.linaro.org/archive/13.11/components/toolchain/binaries/gcc-linaro-aarch64-none-elf-4.8-2013.11_linux.tar.xz
  32. > wget https://releases.linaro.org/archive/13.11/components/toolchain/binaries/gcc-linaro-arm-none-eabi-4.8-2013.11_linux.tar.xz
  33. > tar xvfJ gcc-linaro-aarch64-none-elf-4.8-2013.11_linux.tar.xz
  34. > tar xvfJ gcc-linaro-arm-none-eabi-4.8-2013.11_linux.tar.xz
  35. > export PATH=$PWD/gcc-linaro-aarch64-none-elf-4.8-2013.11_linux/bin:$PWD/gcc-linaro-arm-none-eabi-4.8-2013.11_linux/bin:$PATH
  36. > git clone https://github.com/khadas/u-boot -b Vim vim-u-boot
  37. > cd vim-u-boot
  38. > make kvim_defconfig
  39. > make
  40. > export FIPDIR=$PWD/fip
  41. Go back to mainline U-Boot source tree then :
  42. > mkdir fip
  43. > cp $FIPDIR/gxl/bl2.bin fip/
  44. > cp $FIPDIR/gxl/acs.bin fip/
  45. > cp $FIPDIR/gxl/bl21.bin fip/
  46. > cp $FIPDIR/gxl/bl30.bin fip/
  47. > cp $FIPDIR/gxl/bl301.bin fip/
  48. > cp $FIPDIR/gxl/bl31.img fip/
  49. > cp u-boot.bin fip/bl33.bin
  50. > $FIPDIR/blx_fix.sh \
  51. fip/bl30.bin \
  52. fip/zero_tmp \
  53. fip/bl30_zero.bin \
  54. fip/bl301.bin \
  55. fip/bl301_zero.bin \
  56. fip/bl30_new.bin \
  57. bl30
  58. > $FIPDIR/acs_tool.pyc fip/bl2.bin fip/bl2_acs.bin fip/acs.bin 0
  59. > $FIPDIR/blx_fix.sh \
  60. fip/bl2_acs.bin \
  61. fip/zero_tmp \
  62. fip/bl2_zero.bin \
  63. fip/bl21.bin \
  64. fip/bl21_zero.bin \
  65. fip/bl2_new.bin \
  66. bl2
  67. > $FIPDIR/gxl/aml_encrypt_gxl --bl3enc --input fip/bl30_new.bin
  68. > $FIPDIR/gxl/aml_encrypt_gxl --bl3enc --input fip/bl31.img
  69. > $FIPDIR/gxl/aml_encrypt_gxl --bl3enc --input fip/bl33.bin
  70. > $FIPDIR/gxl/aml_encrypt_gxl --bl2sig --input fip/bl2_new.bin --output fip/bl2.n.bin.sig
  71. > $FIPDIR/gxl/aml_encrypt_gxl --bootmk \
  72. --output fip/u-boot.bin \
  73. --bl2 fip/bl2.n.bin.sig \
  74. --bl30 fip/bl30_new.bin.enc \
  75. --bl31 fip/bl31.img.enc \
  76. --bl33 fip/bl33.bin.enc
  77. and then write the image to SD with:
  78. > DEV=/dev/your_sd_device
  79. > dd if=fip/u-boot.bin.sd.bin of=$DEV conv=fsync,notrunc bs=512 skip=1 seek=1
  80. > dd if=fip/u-boot.bin.sd.bin of=$DEV conv=fsync,notrunc bs=1 count=444