| /OK3568_Linux_fs/buildroot/boot/arm-trusted-firmware/ |
| H A D | Config.in | 2 bool "ARM Trusted Firmware (ATF)" 6 Enable this option if you want to build the ATF for your ARM 13 prompt "ATF Version" 15 Select the specific ATF version you want to use 36 string "URL of custom ATF tarball" 41 string "ATF version" 67 string "ATF platform" 77 To use this device tree source file, the ATF configuration 85 platforms were ATF encapsulates the second stage bootloader 93 U-Boot) encapsulates ATF BL31. [all …]
|
| H A D | arm-trusted-firmware.mk | 10 # Handle custom ATF tarballs as specified by the configuration 18 # Handle stable official ATF versions 121 # fiptool only exists in newer (>= 1.3) versions of ATF, so we build 148 $(ARM_TRUSTED_FIRMWARE_IMG_DIR)/atf-uboot.ub 151 $(INSTALL) -m 0644 $(ARM_TRUSTED_FIRMWARE_IMG_DIR)/atf-uboot.ub \ 152 $(BINARIES_DIR)/atf-uboot.ub
|
| /OK3568_Linux_fs/u-boot/fit/ |
| H A D | u-boot.its | 5 * Simple U-boot fit source file containing ATF/OP-TEE/U-Boot/dtb/MCU 11 description = "FIT Image with ATF/OP-TEE/U-Boot/MCU"; 28 atf-1 { 40 atf-2 { 52 atf-3 { 64 atf-4 { 76 atf-5 { 88 atf-6 { 130 firmware = "atf-1"; 131 loadables = "uboot", "atf-2", "atf-3", "atf-4", "atf-5", "atf-6", "optee";
|
| /OK3568_Linux_fs/u-boot/arch/arm/mach-rockchip/ |
| H A D | fit_nodes.sh | 116 for ATF in `ls -1 -S bl31_0x*.bin` 118 ATF_LOAD_ADDR=`echo ${ATF} | awk -F "_" '{ printf $2 }' | awk -F "." '{ printf $1 }'` 119 # only atf-1 support compress 121 openssl dgst -sha256 -binary -out ${ATF}.digest ${ATF} 122 ${COMPRESS_CMD} ${ATF} 124 echo " atf-${NUM} { 126 data = /incbin/(\"./${ATF}${SUFFIX}\"); 136 value = /incbin/(\"./${ATF}.digest\"); 141 echo " atf-${NUM} { 143 data = /incbin/(\"./${ATF}\"); [all …]
|
| H A D | make_fit_atf.py | 36 description = "Configuration to load ATF before U-Boot"; 64 Append ATF DT node to input FIT dts file. 105 print >> file, '\t\t\tdescription = "Rockchip armv8 with ATF";' 107 print >> file, '\t\t\tfirmware = "atf@1";' 110 print >> file, '"atf@%d"' % (i+1), 141 Generate FIT script for ATF image. 189 with open(file_name, "wb") as atf: 190 atf.write(seg.data());
|
| /OK3568_Linux_fs/u-boot/doc/mvebu/cmd/ |
| H A D | bubt.txt | 1 BUBT (Burn ATF) command 3 Bubt command is used to burn a new ATF image to flash device. 5 The bubt command gets the following parameters: ATF file name, destination device and source device. 24 1. Fetch the requested ATF image from an available interface (USB/SD/SATA/XDB, etc.) 60 3. Write the ATF image: 61 - NAND: # nand write <load_address> 0 <ATF Size> 62 - SPI: # sf write <load_address> 0 <ATF Size> 63 - SD/eMMC: # mmc write <load_address> [0|1] <ATF Size>/<block_size>
|
| /OK3568_Linux_fs/buildroot/package/atf/ |
| H A D | Config.in | 2 bool "atf" 6 ATF, or Automated Testing Framework, is a collection of 9 https://github.com/jmmv/atf 11 comment "atf needs a toolchain w/ C++"
|
| H A D | atf.mk | 3 # atf 8 ATF_SITE = https://github.com/jmmv/atf/releases/download/atf-$(ATF_VERSION)
|
| /OK3568_Linux_fs/u-boot/board/sunxi/ |
| H A D | mksunxi_fit_atf.sh | 12 echo "Please read the section on ARM Trusted Firmware (ATF) in board/sunxi/README.sunxi64" >&2 20 description = "Configuration to load ATF before U-Boot"; 32 atf@1 { 71 loadables = "atf@1";
|
| H A D | README.sunxi64 | 14 - Build the ARM Trusted Firmware binary (see "ARM Trusted Firmware (ATF)" below) 23 ARM Trusted Firmware (ATF) build and the U-Boot proper. 24 The SPL will load both ATF and U-Boot proper along with the right device 25 tree blob (.dtb) and will pass execution to ATF (in EL3), which in turn will 27 As the ATF binary will become part of the U-Boot image file, you will need 30 ARM Trusted Firmware (ATF)
|
| /OK3568_Linux_fs/buildroot/package/lutok/ |
| H A D | lutok.mk | 11 # --without-atf disables the atf-based lutok tests 12 LUTOK_CONF_OPTS = --without-doxygen --without-atf
|
| /OK3568_Linux_fs/buildroot/board/zynqmp/patches/uboot/ |
| H A D | 0002-arm64-zynqmp-Enable-booting-to-ATF.patch | 4 Subject: [PATCH] arm64: zynqmp: Enable booting to ATF 6 U-Boot is now able to boot to ARM Trusted Firmware (ATF). The boot 7 flow is SPL(EL3) loads ATF and full u-boot and jump to ATF(EL3) which
|
| /OK3568_Linux_fs/u-boot/board/theobroma-systems/lion_rk3368/ |
| H A D | fit_spl_atf.its | 12 description = "FIT image with U-Boot proper, ATF bl31, DTB"; 25 atf { 48 firmware = "atf";
|
| H A D | README | 3 Get the Source and build ATF 24 Build the full U-Boot and a FIT image including the ATF 33 (U-Boot proper, ATF, devicetree) to offset 256k card.
|
| /OK3568_Linux_fs/u-boot/board/theobroma-systems/puma_rk3399/ |
| H A D | fit_spl_atf.its | 12 description = "FIT image with U-Boot proper, ATF bl31, M0 Firmware, DTB"; 25 atf { 54 firmware = "atf";
|
| H A D | README | 29 Get the Source and build ATF/Cortex-M0 binaries 35 Compile the ATF 62 Create the FIT image containing U-Boot proper, ATF, M0 Firmware, devicetree
|
| /OK3568_Linux_fs/u-boot/doc/uImage.FIT/ |
| H A D | multi_spl.its | 31 atf { 86 loadables = "uboot", "atf", "kernel", "initrd"; 92 loadables = "uboot", "atf", "mgmt-firmware";
|
| /OK3568_Linux_fs/u-boot/include/configs/ |
| H A D | xilinx_zynqmp.h | 34 /* Generic Timer Definitions - setup in EL3. Setup by ATF for other cases */ 222 "atf-uboot.ub ram 0x10000000 0x1000000;" \ 242 /* ATF is my kernel image */ 243 #define CONFIG_SPL_FS_LOAD_KERNEL_NAME "atf-uboot.ub"
|
| /OK3568_Linux_fs/u-boot/board/rockchip/evb_rk3328/ |
| H A D | README | 18 In order to support Arm Trust Firmware(ATF), we need to use the 21 * load and verify ATF image 35 Compile ATF
|
| /OK3568_Linux_fs/buildroot/board/freescale/common/imx/ |
| H A D | imx8-bootloader-prepare.sh | 42 cp ${BINARIES_DIR}/bl31.bin ${BINARIES_DIR}/u-boot-atf.bin 43 dd if=${BINARIES_DIR}/u-boot-hash.bin of=${BINARIES_DIR}/u-boot-atf.bin bs=1K seek=128 45 …-c -scfw ${BINARIES_DIR}/mx8qm-mek-scfw-tcm.bin -ap ${BINARIES_DIR}/u-boot-atf.bin a53 0x80000000 … 47 …-c -scfw ${BINARIES_DIR}/mx8qx-mek-scfw-tcm.bin -ap ${BINARIES_DIR}/u-boot-atf.bin a35 0x80000000 …
|
| /OK3568_Linux_fs/u-boot/board/cavium/thunderx/ |
| H A D | Kconfig | 20 bool "Enable ATF query commands" 23 Enable vendor specific ATF query commands such as SPI and SD/MMC
|
| /OK3568_Linux_fs/buildroot/boot/binaries-marvell/ |
| H A D | Config.in | 7 reset and system control. ATF Boot Loader stage 2 (BL2) loads 10 firmware, which is needed to build ATF.
|
| /OK3568_Linux_fs/kernel/drivers/firmware/ |
| H A D | rockchip_sip.c | 220 pr_err("no ATF memory for init\n"); in sip_smc_get_dram_map() 319 * AArch32 is not allowed to call SMC64(ATF framework does not support), so we 321 * mode. Let ATF support SIP_UARTDBG_CFG, and we just initialize SIP_UARTDBG_FN 352 * 64-bit ATF + 64-bit kernel in sip_fiq_debugger_get_pt_regs() 366 * 64-bit ATF + 32-bit kernel in sip_fiq_debugger_get_pt_regs() 661 * 1. 64-bit ATF + 64-bit kernel; in sip_firmware_init() 662 * 2. 64-bit ATF + 32-bit kernel; in sip_firmware_init()
|
| /OK3568_Linux_fs/u-boot/board/hisilicon/hikey/ |
| H A D | README | 25 The HiKey U-Boot port has been tested with l-loader, booting ATF, which then boots 56 Compile ARM Trusted Firmware (ATF) 101 have ATF, booting u-boot from eMMC. On 'new' boards I've had to do the 102 flashing twice in the past to avoid an ATF error. 108 ATF, U-Boot and Kernel sources): -
|
| /OK3568_Linux_fs/kernel/arch/arm64/boot/dts/rockchip/ |
| H A D | rk3358m-vehicle-v10.dts | 30 atf: atf@40000 { label
|