Home
last modified time | relevance | path

Searched full:atf (Results 1 – 25 of 181) sorted by relevance

12345678

/OK3568_Linux_fs/buildroot/boot/arm-trusted-firmware/
H A DConfig.in2 bool "ARM Trusted Firmware (ATF)"
6 Enable this option if you want to build the ATF for your ARM
13 prompt "ATF Version"
15 Select the specific ATF version you want to use
36 string "URL of custom ATF tarball"
41 string "ATF version"
67 string "ATF platform"
77 To use this device tree source file, the ATF configuration
85 platforms were ATF encapsulates the second stage bootloader
93 U-Boot) encapsulates ATF BL31.
[all …]
H A Darm-trusted-firmware.mk10 # Handle custom ATF tarballs as specified by the configuration
18 # Handle stable official ATF versions
121 # fiptool only exists in newer (>= 1.3) versions of ATF, so we build
148 $(ARM_TRUSTED_FIRMWARE_IMG_DIR)/atf-uboot.ub
151 $(INSTALL) -m 0644 $(ARM_TRUSTED_FIRMWARE_IMG_DIR)/atf-uboot.ub \
152 $(BINARIES_DIR)/atf-uboot.ub
/OK3568_Linux_fs/u-boot/fit/
H A Du-boot.its5 * Simple U-boot fit source file containing ATF/OP-TEE/U-Boot/dtb/MCU
11 description = "FIT Image with ATF/OP-TEE/U-Boot/MCU";
28 atf-1 {
40 atf-2 {
52 atf-3 {
64 atf-4 {
76 atf-5 {
88 atf-6 {
130 firmware = "atf-1";
131 loadables = "uboot", "atf-2", "atf-3", "atf-4", "atf-5", "atf-6", "optee";
/OK3568_Linux_fs/u-boot/arch/arm/mach-rockchip/
H A Dfit_nodes.sh116 for ATF in `ls -1 -S bl31_0x*.bin`
118 ATF_LOAD_ADDR=`echo ${ATF} | awk -F "_" '{ printf $2 }' | awk -F "." '{ printf $1 }'`
119 # only atf-1 support compress
121 openssl dgst -sha256 -binary -out ${ATF}.digest ${ATF}
122 ${COMPRESS_CMD} ${ATF}
124 echo " atf-${NUM} {
126 data = /incbin/(\"./${ATF}${SUFFIX}\");
136 value = /incbin/(\"./${ATF}.digest\");
141 echo " atf-${NUM} {
143 data = /incbin/(\"./${ATF}\");
[all …]
H A Dmake_fit_atf.py36 description = "Configuration to load ATF before U-Boot";
64 Append ATF DT node to input FIT dts file.
105 print >> file, '\t\t\tdescription = "Rockchip armv8 with ATF";'
107 print >> file, '\t\t\tfirmware = "atf@1";'
110 print >> file, '"atf@%d"' % (i+1),
141 Generate FIT script for ATF image.
189 with open(file_name, "wb") as atf:
190 atf.write(seg.data());
/OK3568_Linux_fs/u-boot/doc/mvebu/cmd/
H A Dbubt.txt1 BUBT (Burn ATF) command
3 Bubt command is used to burn a new ATF image to flash device.
5 The bubt command gets the following parameters: ATF file name, destination device and source device.
24 1. Fetch the requested ATF image from an available interface (USB/SD/SATA/XDB, etc.)
60 3. Write the ATF image:
61 - NAND: # nand write <load_address> 0 <ATF Size>
62 - SPI: # sf write <load_address> 0 <ATF Size>
63 - SD/eMMC: # mmc write <load_address> [0|1] <ATF Size>/<block_size>
/OK3568_Linux_fs/buildroot/package/atf/
H A DConfig.in2 bool "atf"
6 ATF, or Automated Testing Framework, is a collection of
9 https://github.com/jmmv/atf
11 comment "atf needs a toolchain w/ C++"
H A Datf.mk3 # atf
8 ATF_SITE = https://github.com/jmmv/atf/releases/download/atf-$(ATF_VERSION)
/OK3568_Linux_fs/u-boot/board/sunxi/
H A Dmksunxi_fit_atf.sh12 echo "Please read the section on ARM Trusted Firmware (ATF) in board/sunxi/README.sunxi64" >&2
20 description = "Configuration to load ATF before U-Boot";
32 atf@1 {
71 loadables = "atf@1";
H A DREADME.sunxi6414 - Build the ARM Trusted Firmware binary (see "ARM Trusted Firmware (ATF)" below)
23 ARM Trusted Firmware (ATF) build and the U-Boot proper.
24 The SPL will load both ATF and U-Boot proper along with the right device
25 tree blob (.dtb) and will pass execution to ATF (in EL3), which in turn will
27 As the ATF binary will become part of the U-Boot image file, you will need
30 ARM Trusted Firmware (ATF)
/OK3568_Linux_fs/buildroot/package/lutok/
H A Dlutok.mk11 # --without-atf disables the atf-based lutok tests
12 LUTOK_CONF_OPTS = --without-doxygen --without-atf
/OK3568_Linux_fs/buildroot/board/zynqmp/patches/uboot/
H A D0002-arm64-zynqmp-Enable-booting-to-ATF.patch4 Subject: [PATCH] arm64: zynqmp: Enable booting to ATF
6 U-Boot is now able to boot to ARM Trusted Firmware (ATF). The boot
7 flow is SPL(EL3) loads ATF and full u-boot and jump to ATF(EL3) which
/OK3568_Linux_fs/u-boot/board/theobroma-systems/lion_rk3368/
H A Dfit_spl_atf.its12 description = "FIT image with U-Boot proper, ATF bl31, DTB";
25 atf {
48 firmware = "atf";
H A DREADME3 Get the Source and build ATF
24 Build the full U-Boot and a FIT image including the ATF
33 (U-Boot proper, ATF, devicetree) to offset 256k card.
/OK3568_Linux_fs/u-boot/board/theobroma-systems/puma_rk3399/
H A Dfit_spl_atf.its12 description = "FIT image with U-Boot proper, ATF bl31, M0 Firmware, DTB";
25 atf {
54 firmware = "atf";
H A DREADME29 Get the Source and build ATF/Cortex-M0 binaries
35 Compile the ATF
62 Create the FIT image containing U-Boot proper, ATF, M0 Firmware, devicetree
/OK3568_Linux_fs/u-boot/doc/uImage.FIT/
H A Dmulti_spl.its31 atf {
86 loadables = "uboot", "atf", "kernel", "initrd";
92 loadables = "uboot", "atf", "mgmt-firmware";
/OK3568_Linux_fs/u-boot/include/configs/
H A Dxilinx_zynqmp.h34 /* Generic Timer Definitions - setup in EL3. Setup by ATF for other cases */
222 "atf-uboot.ub ram 0x10000000 0x1000000;" \
242 /* ATF is my kernel image */
243 #define CONFIG_SPL_FS_LOAD_KERNEL_NAME "atf-uboot.ub"
/OK3568_Linux_fs/u-boot/board/rockchip/evb_rk3328/
H A DREADME18 In order to support Arm Trust Firmware(ATF), we need to use the
21 * load and verify ATF image
35 Compile ATF
/OK3568_Linux_fs/buildroot/board/freescale/common/imx/
H A Dimx8-bootloader-prepare.sh42 cp ${BINARIES_DIR}/bl31.bin ${BINARIES_DIR}/u-boot-atf.bin
43 dd if=${BINARIES_DIR}/u-boot-hash.bin of=${BINARIES_DIR}/u-boot-atf.bin bs=1K seek=128
45 …-c -scfw ${BINARIES_DIR}/mx8qm-mek-scfw-tcm.bin -ap ${BINARIES_DIR}/u-boot-atf.bin a53 0x80000000 …
47 …-c -scfw ${BINARIES_DIR}/mx8qx-mek-scfw-tcm.bin -ap ${BINARIES_DIR}/u-boot-atf.bin a35 0x80000000 …
/OK3568_Linux_fs/u-boot/board/cavium/thunderx/
H A DKconfig20 bool "Enable ATF query commands"
23 Enable vendor specific ATF query commands such as SPI and SD/MMC
/OK3568_Linux_fs/buildroot/boot/binaries-marvell/
H A DConfig.in7 reset and system control. ATF Boot Loader stage 2 (BL2) loads
10 firmware, which is needed to build ATF.
/OK3568_Linux_fs/kernel/drivers/firmware/
H A Drockchip_sip.c220 pr_err("no ATF memory for init\n"); in sip_smc_get_dram_map()
319 * AArch32 is not allowed to call SMC64(ATF framework does not support), so we
321 * mode. Let ATF support SIP_UARTDBG_CFG, and we just initialize SIP_UARTDBG_FN
352 * 64-bit ATF + 64-bit kernel in sip_fiq_debugger_get_pt_regs()
366 * 64-bit ATF + 32-bit kernel in sip_fiq_debugger_get_pt_regs()
661 * 1. 64-bit ATF + 64-bit kernel; in sip_firmware_init()
662 * 2. 64-bit ATF + 32-bit kernel; in sip_firmware_init()
/OK3568_Linux_fs/u-boot/board/hisilicon/hikey/
H A DREADME25 The HiKey U-Boot port has been tested with l-loader, booting ATF, which then boots
56 Compile ARM Trusted Firmware (ATF)
101 have ATF, booting u-boot from eMMC. On 'new' boards I've had to do the
102 flashing twice in the past to avoid an ATF error.
108 ATF, U-Boot and Kernel sources): -
/OK3568_Linux_fs/kernel/arch/arm64/boot/dts/rockchip/
H A Drk3358m-vehicle-v10.dts30 atf: atf@40000 { label

12345678