-----Original Message----- From: TF-A tf-a-bounces@lists.trustedfirmware.org On Behalf Of David Cerdeira via TF-A Sent: 04 June 2019 10:04 To: tf-a@lists.trustedfirmware.org Subject: [TF-A] Arm trusted firmware reads wrong fip file from flash on hikey960v2
Greetings, i’m having trouble getting arm trusted firmware to work on hikey960v2 I followed all the steps in this guide https://github.com/ARM-software/arm- trusted-firmware/blob/master/docs/plat/hikey960.rst, and the steps in https://optee.readthedocs.io/building/devices/hikey960.html The problem seems to be in reading the fip.bin, or rather the problem is writing the fip file as it seems it is not properly flashed. ATF bl2 fails to find the UUID of the BL2_SCP image in the fip.bin output by the build process, the fip file it reads from flash only has the BL31 and BL33 UUIDs.
I tried checking older versions of ATF, as I figured it might be a problem in current versions, but the same problems occurred.
Hi David, I don’t have much insight into platform specifics. One suggestion is to try with pre-built binaries and once they are working, replace with your custom ones. This page may help : http://releases.linaro.org/96boards/hikey/linaro/debian/15.11/
The Hikey Platform maintainers may be able to help more in this regard.
Best Regards Soby Mathew
At this moment I feel the problem is in the flashing step. I tried moving the partitions in the partition tables, as well as the value of the macro HIKEY960_FIP_BASE present in hikey960_def.h to match what I thought would be the writing position of the file in the partition, but without success.
If anyone could give me any idea as to what the problem might be, that’d be great Best regards, David Cerdeira -- TF-A mailing list TF-A@lists.trustedfirmware.org https://lists.trustedfirmware.org/mailman/listinfo/tf-a
tf-a@lists.trustedfirmware.org