Home
last modified time | relevance | path

Searched full:atf (Results 1 – 25 of 93) sorted by relevance

1234

/openbmc/u-boot/tools/
H A Dk3_fit_atf.sh5 # ATF, OPTEE, SPL and multiple device trees (given on the command line).
10 [ -z "$ATF" ] && ATF="bl31.bin"
12 if [ ! -f $ATF ]; then
13 echo "WARNING ATF file $ATF NOT found, resulting binary is non-functional" >&2
14 ATF=/dev/null
28 description = "Configuration to load ATF and SPL";
32 atf {
34 data = /incbin/("$ATF");
89 firmware = "atf";
/openbmc/u-boot/arch/arm/mach-k3/
H A Dcommon.c22 * Cortex-A core which runs ATF. Make sure DT reflects the same. in jump_to_image_no_args()
26 panic("%s: ATF failed to initialize on rproc (%d)\n", __func__, in jump_to_image_no_args()
31 panic("%s: ATF failed to load on rproc (%d)\n", __func__, ret); in jump_to_image_no_args()
33 /* Add an extra newline to differentiate the ATF logs from SPL */ in jump_to_image_no_args()
34 printf("Starting ATF on ARM64 core...\n\n"); in jump_to_image_no_args()
38 panic("%s: ATF failed to start on rproc (%d)\n", __func__, ret); in jump_to_image_no_args()
40 debug("ATF started. Waiting indefinitely...\n"); in jump_to_image_no_args()
/openbmc/u-boot/doc/mvebu/cmd/
H A Dbubt.txt1 BUBT (Burn ATF) command
3 Bubt command is used to burn a new ATF image to flash device.
5 The bubt command gets the following parameters: ATF file name, destination device and source device.
24 1. Fetch the requested ATF image from an available interface (USB/SD/SATA/XDB, etc.)
51 3. Write the ATF image:
52 - NAND: # nand write <load_address> 0 <ATF Size>
53 - SPI: # sf write <load_address> 0 <ATF Size>
54 - SD/eMMC: # mmc write <load_address> [0|1] <ATF Size>/<block_size>
/openbmc/u-boot/board/sunxi/
H A Dmksunxi_fit_atf.sh12 echo "Please read the section on ARM Trusted Firmware (ATF) in board/sunxi/README.sunxi64" >&2
26 description = "Configuration to load ATF before U-Boot";
38 atf {
77 loadables = "atf";
H A DREADME.sunxi6414 - Build the ARM Trusted Firmware binary (see "ARM Trusted Firmware (ATF)" below)
28 ARM Trusted Firmware (ATF) build and the U-Boot proper.
29 The SPL will load both ATF and U-Boot proper along with the right device
30 tree blob (.dtb) and will pass execution to ATF (in EL3), which in turn will
32 As the ATF binary will become part of the U-Boot image file, you will need
35 ARM Trusted Firmware (ATF)
37 Checkout the latest master branch from the official ATF repository [1] and
52 As sometimes the ATF build process is a bit picky about the toolchain used,
53 or if you can't be bothered with building ATF, there are known working
/openbmc/u-boot/board/theobroma-systems/lion_rk3368/
H A Dfit_spl_atf.its11 description = "FIT image with U-Boot proper, ATF bl31, DTB";
24 atf {
47 firmware = "atf";
H A DREADME3 Get the Source and build ATF
24 Build the full U-Boot and a FIT image including the ATF
33 (U-Boot proper, ATF, devicetree) to offset 256k card.
/openbmc/u-boot/arch/arm/mach-imx/
H A Dmkimage_fit_atf.sh53 description = "Configuration to load ATF before U-Boot";
64 atf@1 {
118 loadables = "atf@1", "tee@1";
127 loadables = "atf@1";
/openbmc/u-boot/board/theobroma-systems/puma_rk3399/
H A Dfit_spl_atf.its11 description = "FIT image with U-Boot proper, ATF bl31, M0 Firmware, DTB";
24 atf {
53 firmware = "atf";
H A DREADME29 Get the Source and build ATF/Cortex-M0 binaries
35 Compile the ATF
62 Create the FIT image containing U-Boot proper, ATF, M0 Firmware, devicetree
/openbmc/u-boot/board/hisilicon/hikey/
H A DREADME24 The HiKey U-Boot port has been tested with l-loader, booting ATF, which then boots
38 > git clone https://github.com/96boards-hikey/atf-fastboot
57 Compile ARM Trusted Firmware (ATF)
68 Compile ATF Fastboot
71 > cd ~/hikey/src/atf-fastboot
79 > ln -sf ~/hikey/src/atf-fastboot/build/hikey/debug/bl1.bin fastboot.bin
114 have ATF, booting u-boot from eMMC.
/openbmc/openbmc/meta-ampere/meta-common/recipes-ampere/host/ac01-boot-progress/
H A Dampere_boot_progress.sh61 boot_stage_str="ATF BL1 (Code=${ueficode})"
73 boot_stage_str="ATF BL2 (Code=${ueficode})"
77 boot_stage_str="ATF BL31 (Code=${ueficode})"
81 boot_stage_str="ATF BL32 (Code=${ueficode})"
/openbmc/u-boot/arch/arm/mach-rockchip/
H A Dmake_fit_atf.py33 description = "Configuration to load ATF before U-Boot";
59 Append ATF DT node to input FIT dts file.
122 Generate FIT script for ATF image.
171 with open(file_name, "wb") as atf:
172 atf.write(seg.data());
/openbmc/u-boot/doc/uImage.FIT/
H A Dmulti_spl.its31 atf {
86 loadables = "uboot", "atf", "kernel", "initrd";
92 loadables = "uboot", "atf", "mgmt-firmware";
/openbmc/u-boot/board/freescale/imx8qxp_mek/
H A DREADME15 $ git clone https://source.codeaurora.org/external/imx/imx-atf
16 $ cd imx-atf/
32 $ cp imx-atf/build/imx8qxp/release/bl31.bin .
/openbmc/u-boot/board/cavium/thunderx/
H A DKconfig20 bool "Enable ATF query commands"
23 Enable vendor specific ATF query commands such as SPI and SD/MMC
H A Datf.c11 #include <cavium/atf.h>
294 atf, 10, 1, do_atf,
295 "issue calls to ATF",
306 "\t ver - print ATF call set versions\n"
/openbmc/u-boot/board/rockchip/evb_rk3328/
H A DREADME18 In order to support Arm Trust Firmware(ATF), we need to use the
21 * load and verify ATF image
35 Compile ATF
/openbmc/u-boot/include/configs/
H A Dxilinx_zynqmp.h31 /* Generic Timer Definitions - setup in EL3. Setup by ATF for other cases */
217 "atf-uboot.ub ram 0x10000000 0x1000000;" \
243 /* ATF is my kernel image */
244 #define CONFIG_SPL_FS_LOAD_KERNEL_NAME "atf-uboot.ub"
H A Dhikey.h25 /* CONFIG_SYS_TEXT_BASE needs to align with where ATF loads bl33.bin */
29 /* 1008 MB (the last 16Mb are secured for TrustZone by ATF*/
/openbmc/openbmc/meta-ampere/meta-common/recipes-extended/rsyslog/rsyslog/
H A Drsyslog.logrotate34 # Keep up to 2 64k files for atf console logs
35 /var/log/obmc-console-atf.log
H A Dhostconsole.conf11 action(type="omfile" file="/var/log/obmc-console-atf.log" template="ConsoleTemplate")
41 Socket="/run/rsyslog/console/atf"
/openbmc/u-boot/board/ti/am65x/
H A DREADME82 | | |<--------|-----------------------|---->|*ATF/OPTEE*| |
110 2. ATF:
127 2. ATF:
141 $ make ARCH=arm CROSS_COMPILE=aarch64-linux-gnu- ATF=<path to ATF dir>/build/k3/generic/release/bl3…
178 | | A53 ATF | |
/openbmc/u-boot/board/freescale/imx8mq_evk/
H A DREADME13 Get ATF from: https://source.codeaurora.org/external/imx/imx-atf
/openbmc/u-boot/board/rockchip/evb_rk3399/
H A DREADME21 In order to support Arm Trust Firmware(ATF), we can use either SPL or
24 * load and verify ATF image
45 Compile ATF

1234