/openbmc/u-boot/tools/ |
H A D | k3_fit_atf.sh | 5 # ATF, OPTEE, SPL and multiple device trees (given on the command line). 10 [ -z "$ATF" ] && ATF="bl31.bin" 12 if [ ! -f $ATF ]; then 13 echo "WARNING ATF file $ATF NOT found, resulting binary is non-functional" >&2 14 ATF=/dev/null 28 description = "Configuration to load ATF and SPL"; 32 atf { 34 data = /incbin/("$ATF"); 89 firmware = "atf";
|
/openbmc/u-boot/arch/arm/mach-k3/ |
H A D | common.c | 22 * Cortex-A core which runs ATF. Make sure DT reflects the same. in jump_to_image_no_args() 26 panic("%s: ATF failed to initialize on rproc (%d)\n", __func__, in jump_to_image_no_args() 31 panic("%s: ATF failed to load on rproc (%d)\n", __func__, ret); in jump_to_image_no_args() 33 /* Add an extra newline to differentiate the ATF logs from SPL */ in jump_to_image_no_args() 34 printf("Starting ATF on ARM64 core...\n\n"); in jump_to_image_no_args() 38 panic("%s: ATF failed to start on rproc (%d)\n", __func__, ret); in jump_to_image_no_args() 40 debug("ATF started. Waiting indefinitely...\n"); in jump_to_image_no_args()
|
/openbmc/u-boot/doc/mvebu/cmd/ |
H A D | bubt.txt | 1 BUBT (Burn ATF) command 3 Bubt command is used to burn a new ATF image to flash device. 5 The bubt command gets the following parameters: ATF file name, destination device and source device. 24 1. Fetch the requested ATF image from an available interface (USB/SD/SATA/XDB, etc.) 51 3. Write the ATF image: 52 - NAND: # nand write <load_address> 0 <ATF Size> 53 - SPI: # sf write <load_address> 0 <ATF Size> 54 - SD/eMMC: # mmc write <load_address> [0|1] <ATF Size>/<block_size>
|
/openbmc/u-boot/board/sunxi/ |
H A D | mksunxi_fit_atf.sh | 12 echo "Please read the section on ARM Trusted Firmware (ATF) in board/sunxi/README.sunxi64" >&2 26 description = "Configuration to load ATF before U-Boot"; 38 atf { 77 loadables = "atf";
|
H A D | README.sunxi64 | 14 - Build the ARM Trusted Firmware binary (see "ARM Trusted Firmware (ATF)" below) 28 ARM Trusted Firmware (ATF) build and the U-Boot proper. 29 The SPL will load both ATF and U-Boot proper along with the right device 30 tree blob (.dtb) and will pass execution to ATF (in EL3), which in turn will 32 As the ATF binary will become part of the U-Boot image file, you will need 35 ARM Trusted Firmware (ATF) 37 Checkout the latest master branch from the official ATF repository [1] and 52 As sometimes the ATF build process is a bit picky about the toolchain used, 53 or if you can't be bothered with building ATF, there are known working
|
/openbmc/u-boot/board/theobroma-systems/lion_rk3368/ |
H A D | fit_spl_atf.its | 11 description = "FIT image with U-Boot proper, ATF bl31, DTB"; 24 atf { 47 firmware = "atf";
|
H A D | README | 3 Get the Source and build ATF 24 Build the full U-Boot and a FIT image including the ATF 33 (U-Boot proper, ATF, devicetree) to offset 256k card.
|
/openbmc/u-boot/arch/arm/mach-imx/ |
H A D | mkimage_fit_atf.sh | 53 description = "Configuration to load ATF before U-Boot"; 64 atf@1 { 118 loadables = "atf@1", "tee@1"; 127 loadables = "atf@1";
|
/openbmc/u-boot/board/theobroma-systems/puma_rk3399/ |
H A D | fit_spl_atf.its | 11 description = "FIT image with U-Boot proper, ATF bl31, M0 Firmware, DTB"; 24 atf { 53 firmware = "atf";
|
H A D | README | 29 Get the Source and build ATF/Cortex-M0 binaries 35 Compile the ATF 62 Create the FIT image containing U-Boot proper, ATF, M0 Firmware, devicetree
|
/openbmc/u-boot/board/hisilicon/hikey/ |
H A D | README | 24 The HiKey U-Boot port has been tested with l-loader, booting ATF, which then boots 38 > git clone https://github.com/96boards-hikey/atf-fastboot 57 Compile ARM Trusted Firmware (ATF) 68 Compile ATF Fastboot 71 > cd ~/hikey/src/atf-fastboot 79 > ln -sf ~/hikey/src/atf-fastboot/build/hikey/debug/bl1.bin fastboot.bin 114 have ATF, booting u-boot from eMMC.
|
/openbmc/openbmc/meta-ampere/meta-common/recipes-ampere/host/ac01-boot-progress/ |
H A D | ampere_boot_progress.sh | 61 boot_stage_str="ATF BL1 (Code=${ueficode})" 73 boot_stage_str="ATF BL2 (Code=${ueficode})" 77 boot_stage_str="ATF BL31 (Code=${ueficode})" 81 boot_stage_str="ATF BL32 (Code=${ueficode})"
|
/openbmc/u-boot/arch/arm/mach-rockchip/ |
H A D | make_fit_atf.py | 33 description = "Configuration to load ATF before U-Boot"; 59 Append ATF DT node to input FIT dts file. 122 Generate FIT script for ATF image. 171 with open(file_name, "wb") as atf: 172 atf.write(seg.data());
|
/openbmc/u-boot/doc/uImage.FIT/ |
H A D | multi_spl.its | 31 atf { 86 loadables = "uboot", "atf", "kernel", "initrd"; 92 loadables = "uboot", "atf", "mgmt-firmware";
|
/openbmc/u-boot/board/freescale/imx8qxp_mek/ |
H A D | README | 15 $ git clone https://source.codeaurora.org/external/imx/imx-atf 16 $ cd imx-atf/ 32 $ cp imx-atf/build/imx8qxp/release/bl31.bin .
|
/openbmc/u-boot/board/cavium/thunderx/ |
H A D | Kconfig | 20 bool "Enable ATF query commands" 23 Enable vendor specific ATF query commands such as SPI and SD/MMC
|
H A D | atf.c | 11 #include <cavium/atf.h> 294 atf, 10, 1, do_atf, 295 "issue calls to ATF", 306 "\t ver - print ATF call set versions\n"
|
/openbmc/u-boot/board/rockchip/evb_rk3328/ |
H A D | README | 18 In order to support Arm Trust Firmware(ATF), we need to use the 21 * load and verify ATF image 35 Compile ATF
|
/openbmc/u-boot/include/configs/ |
H A D | xilinx_zynqmp.h | 31 /* Generic Timer Definitions - setup in EL3. Setup by ATF for other cases */ 217 "atf-uboot.ub ram 0x10000000 0x1000000;" \ 243 /* ATF is my kernel image */ 244 #define CONFIG_SPL_FS_LOAD_KERNEL_NAME "atf-uboot.ub"
|
H A D | hikey.h | 25 /* CONFIG_SYS_TEXT_BASE needs to align with where ATF loads bl33.bin */ 29 /* 1008 MB (the last 16Mb are secured for TrustZone by ATF*/
|
/openbmc/openbmc/meta-ampere/meta-common/recipes-extended/rsyslog/rsyslog/ |
H A D | rsyslog.logrotate | 34 # Keep up to 2 64k files for atf console logs 35 /var/log/obmc-console-atf.log
|
H A D | hostconsole.conf | 11 action(type="omfile" file="/var/log/obmc-console-atf.log" template="ConsoleTemplate") 41 Socket="/run/rsyslog/console/atf"
|
/openbmc/u-boot/board/ti/am65x/ |
H A D | README | 82 | | |<--------|-----------------------|---->|*ATF/OPTEE*| | 110 2. ATF: 127 2. ATF: 141 $ make ARCH=arm CROSS_COMPILE=aarch64-linux-gnu- ATF=<path to ATF dir>/build/k3/generic/release/bl3… 178 | | A53 ATF | |
|
/openbmc/u-boot/board/freescale/imx8mq_evk/ |
H A D | README | 13 Get ATF from: https://source.codeaurora.org/external/imx/imx-atf
|
/openbmc/u-boot/board/rockchip/evb_rk3399/ |
H A D | README | 21 In order to support Arm Trust Firmware(ATF), we can use either SPL or 24 * load and verify ATF image 45 Compile ATF
|