Name Date Size #Lines LOC

..10-Mar-2023-

README.am335x-networkH A D07-Mar-20214.4 KiB9783

README.omap3H A D07-Mar-20212.1 KiB5342

README.spl-secure-bootH A D07-Mar-2021721 1914

README.am335x-network

1USING AM335x NETBOOT FEATURE
2
3 Some boards (like TI AM335x based ones) have quite big on-chip RAM and
4have support for booting via network in ROM. The following describes
5how to setup network booting and then optionally use this support to flash
6NAND and bricked (empty) board with only a network cable.
7
8 I. Building the required images
9  1. You have to enable generic SPL configuration options (see
10doc/README.SPL) as well as CONFIG_SPL_NET_SUPPORT,
11CONFIG_ETH_SUPPORT, CONFIG_SPL_LIBGENERIC_SUPPORT and
12CONFIG_SPL_LIBCOMMON_SUPPORT in your board configuration file to build
13SPL with support for booting over the network. Also you have to enable
14the driver for the NIC used and CONFIG_SPL_BOARD_INIT option if your
15board needs some board-specific initialization (TI AM335x EVM does).
16If you want SPL to use some Vendor Class Identifier (VCI) you can set
17one with CONFIG_SPL_NET_VCI_STRING option. am335x_evm configuration
18comes with support for network booting preconfigured.
19 2. Define CONFIG_BOOTCOMMAND for your board to load and run debrick
20script after boot:
21#define CONFIG_BOOTCOMMAND					\
22	"setenv autoload no; "					\
23	"bootp; "						\
24	"if tftp 80000000 debrick.scr; then "			\
25		"source 80000000; "				\
26	"fi"
27(Or create additional board configuration with such option).
28 3. Build U-Boot as usual
29  $ make <your_board_name>
30    You will need u-boot.img and spl/u-boot.bin images to perform
31network boot. Copy them to u-boot-restore.img and
32u-boot-spl-restore.bin respectively to distinguish this version
33(with automatic restore running) from the main one.
34
35 II. Host configuration.
36  1. Setup DHCP server (recommended server is ISC DHCPd).
37   - Install DHCP server and setup it to listen on the interface you
38chose to connect to the board (usually configured in
39/etc/default/dhcpd or /etc/default/isc-dhcp-server). Make sure there
40are no other active DHCP servers in the same network segment.
41   - Edit your dhcpd.conf and subnet declaration matching the address
42on the interface. Specify the range of assigned addresses and bootfile
43to use. IMPORTANT! Both RBL and SPL use the image filename provided
44in the BOOTP reply but obviously they need different images (RBL needs
45raw SPL image -- u-boot-spl-restore.bin while SPL needs main U-Boot
46image -- u-boot-restore.img). So you have to configure DHCP server to
47provide different image filenames to RBL and SPL (and possibly another
48one to main U-Boot). This can be done by checking Vendor Class
49Identifier (VCI) set by BOOTP client (RBL sets VCI to "DM814x ROM v1.0"
50and you can set VCI used by SPL with CONFIG_SPL_NET_VCI_STRING option,
51see above).
52   - If you plan to use TFTP server on another machine you have to set
53server-name option to point to it.
54   - Here is sample configuration for ISC DHCPd, assuming the interface
55used to connect to the board is eth0, and it has address 192.168.8.1:
56
57subnet 192.168.8.0 netmask 255.255.255.0 {
58  range dynamic-bootp 192.168.8.100 192.168.8.199;
59
60  if substring (option vendor-class-identifier, 0, 10) = "DM814x ROM" {
61    filename "u-boot-spl-restore.bin";
62  } elsif substring (option vendor-class-identifier, 0, 17) = "AM335x U-Boot SPL" {
63    filename "u-boot-restore.img";
64  } else {
65    filename "uImage";
66  }
67}
68
69  May the ROM bootloader sends another "vendor-class-identifier"
70  on the shc board with an AM335X it is:
71  "AM335x ROM"
72
73  2. Setup TFTP server.
74     Install TFTP server and put image files to it's root directory
75(likely /tftpboot or /var/lib/tftpboot or /srv/tftp). You will need
76u-boot.img and spl/u-boot-spl-bin files from U-Boot build directory.
77
78 III. Reflashing (debricking) the board.
79  1. Write debrick script. You will need to write a script that will
80be executed after network boot to perform actual rescue actions. You
81can use usual U-Boot commands from this script: tftp to load additional
82files, nand erase/nand write to erase/write the NAND flash.
83
84  2. Create script image from your script. From U-Boot build directory:
85
86$ ./tools/mkimage -A arm -O U-Boot -C none -T script -d <your script> debrick.scr
87
88This will create debrick.scr file with your script inside.
89
90  3. Copy debrick.scr to TFTP root directory. You also need to copy
91there all the files your script tries to load via TFTP. Example script
92loads u-boot.img and MLO. You have to create these files doing regular
93(not restore_flash) build and copy them to tftpboot directory.
94
95  4. Boot the board from the network, U-Boot will load debrick script
96and run it after boot.
97

README.omap3

1Overview of SPL on OMAP3 devices
2================================
3
4Introduction
5------------
6
7This document provides an overview of how SPL functions on OMAP3 (and related
8such as am35x and am37x) processors.
9
10Methodology
11-----------
12
13On these platforms the ROM supports trying a sequence of boot devices.  Once
14one has been used successfully to load SPL this information is stored in memory
15and the location stored in a register.  We will read this to determine where to
16read U-Boot from in turn.
17
18Memory Map
19----------
20
21This is an example of a typical setup.  See top-level README for documentation
22of which CONFIG variables control these values.  For a given board and the
23amount of DRAM available to it different values may need to be used.
24Note that the size of the SPL text rodata and data is enforced with a CONFIG
25option and growing over that size results in a link error.  The SPL stack
26starts at the top of SRAM (which is configurable) and grows downward.  The
27space between the top of SRAM and the enforced upper bound on the size of the
28SPL text, data and rodata is considered the safe stack area.  Details on
29confirming this behavior are shown below.
30
31A portion of the system memory map looks as follows:
32SRAM: 0x40200000 - 0x4020FFFF
33DDR1: 0x80000000 - 0xBFFFFFFF
34
35Option 1 (SPL only):
360x40200800 - 0x4020BBFF: Area for SPL text, data and rodata
370x4020E000 - 0x4020FFFC: Area for the SPL stack.
380x80000000 - 0x8007FFFF: Area for the SPL BSS.
390x80100000: CONFIG_SYS_TEXT_BASE of U-Boot
400x80208000 - 0x80307FFF: malloc() pool available to SPL.
41
42Option 2 (SPL or X-Loader):
430x40200800 - 0x4020BBFF: Area for SPL text, data and rodata
440x4020E000 - 0x4020FFFC: Area for the SPL stack.
450x80008000: CONFIG_SYS_TEXT_BASE of U-Boot
460x87000000 - 0x8707FFFF: Area for the SPL BSS.
470x87080000 - 0x870FFFFF: malloc() pool available to SPL.
48
49For the areas that reside within DDR1 they must not be used prior to s_init()
50completing.  Note that CONFIG_SYS_TEXT_BASE must be clear of the areas that SPL
51uses while running.  This is why we have two versions of the memory map that
52only vary in where the BSS and malloc pool reside.
53

README.spl-secure-boot

1Overview of SPL verified boot on powerpc/mpc85xx & arm/layerscape platforms
2===========================================================================
3
4Introduction
5------------
6
7This document provides an overview of how SPL verified boot works on powerpc/
8mpc85xx & arm/layerscape platforms.
9
10Methodology
11-----------
12
13The SPL image is responsible for loading the next stage boot loader, which is
14the main u-boot image. For secure boot process on these platforms ROM verifies
15SPL image, so to continue chain of trust SPL image verifies U-boot image using
16spl_validate_uboot(). This function uses QorIQ Trust Architecture header
17(appended to U-boot image) to validate the U-boot binary just before passing
18control to it.
19