From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 504E2C433F5 for ; Tue, 11 Jan 2022 16:02:14 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 4735880384; Tue, 11 Jan 2022 17:02:12 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b="izbf3hZ9"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 5AB9983081; Tue, 11 Jan 2022 17:02:10 +0100 (CET) Received: from mail-ed1-x52d.google.com (mail-ed1-x52d.google.com [IPv6:2a00:1450:4864:20::52d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id C80B1801EA for ; Tue, 11 Jan 2022 17:02:07 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=dsankouski@gmail.com Received: by mail-ed1-x52d.google.com with SMTP id q25so60468076edb.2 for ; Tue, 11 Jan 2022 08:02:07 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=XQQ+Nghk0xZfhoMkS2ZhwgIdmiD4s2FXCNyKZJmgTWQ=; b=izbf3hZ9Qu282jnZXF3FEp1/VF53IGDRApV7DL87s8xMzLsQGPgGyqbIO/ACCidKfE STIbShubGYzbClVcLXcR98Mri6WF/HNNncbzvEtP4nGdWoCHBQ0qcTGBcx8Psz0q/TaH a7I8ijqACNKcVcbB+9QJFTjDf1gBR/aI5IBMhZ8ROAgmFNyAbTXngaGaoDRKHsjTeNzN Mw+84U9G18P8cTv48+UCcQkd2VVgOKuMzL3ggSpiBhQgRtxb/dcW63X3iMgd7sMBT+7M mG0DAP8Gef81TRPQlhfcFmfzC9hS1vaFyZsDDPs4k1FNxujkIdiLkVtfhvdSAECh8byd 6Xqw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=XQQ+Nghk0xZfhoMkS2ZhwgIdmiD4s2FXCNyKZJmgTWQ=; b=UllFMvJmSnLuAFKySH1ptdlcQ/tq0p+Ym/5lek924F5/Cfi/tdrrrbNoEGXuf2PrHW u2+bYhQWw/BeAQRN/tzPU9k2GLnZRypnOGnragAzvdGEp5EMQal1lgA5FMUSVKrJQM2b ERugiYid+nLJ75rLRqUOKU+Xpb3LU0sT9wLylZ82rKH/E1OqqYfTI/y2hkpdXwSHCVS4 TYkbOwAJgR83FyEQhs+2xdb9A59kSLG2eD7Xtpmb6RqQ0oVpFVnmTUdXUKWxdXQSbYdP Mke+LTTc/CYeSxpfepRvgFDNpLSKRycMIs3wwvu1BQlpMMY5cE01wIeLDvHjL1uDAsNx 5v9A== X-Gm-Message-State: AOAM531W1CkYp87uGb9FJK0v4MR4DeCJ3Vr97ARU8feH9NcgRd7NnFvL 066mItYAy0nHbaKlZReXWRouk0ZesCesgQ== X-Google-Smtp-Source: ABdhPJxo4GXpYQUybWrzDGE8S+6+qBYBfy6iE51q/vNFfxD4OXNv24i5h5D3fiw5x51jZMEGAZCHmg== X-Received: by 2002:a17:907:e8d:: with SMTP id ho13mr1386531ejc.477.1641916927141; Tue, 11 Jan 2022 08:02:07 -0800 (PST) Received: from localhost.localdomain ([46.216.45.177]) by smtp.gmail.com with ESMTPSA id g16sm3683665ejt.202.2022.01.11.08.02.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 11 Jan 2022 08:02:06 -0800 (PST) From: Dzmitry Sankouski To: u-boot@lists.denx.de Cc: Dzmitry Sankouski Subject: [PATCH 0/2] get sdm845 boards u-boot usable as a secondary bootloader Date: Tue, 11 Jan 2022 19:01:57 +0300 Message-Id: <20220111160159.5476-1-dsankouski@gmail.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.2 at phobos.denx.de X-Virus-Status: Clean U-boot is intended to replace linux kernel in android boot image(ABL), and it's FIT payload to replace initramfs file. The boot process is similar to boot image with linux: - android bootloader (ABL) unpacks android boot image - ABL sets `linux,initrd-start property` in chosen node in unpacked FDT - ABL sets x0 register to FDT address, and passes control to u-boot - u-boot reads x0 register, and stores it in `abl_fdt_addr` env variable - u-boot reads `linux,initrd-start` property, and stores it in `abl_initrd_start_addr` In this way, u-boot bootcmd relies on `abl_initrd_start_addr` env variable, and boils down to `bootm $abl_initrd_start_addr`. If more control on boot process is desired, pack a boot script in FIT image, and put it to default configuration Dzmitry Sankouski (2): soc: sdm845: implement ABL info collecting, add bootcommand and usage doc board: starqltechn: get board usable - fix defconfig and strip config options arch/arm/mach-snapdragon/init_sdm845.c | 60 ++++++++++++++++++++---- configs/starqltechn_defconfig | 12 +++-- doc/board/qualcomm/sdm845.rst | 63 +++++++++++++++++++++++++- include/configs/sdm845.h | 5 ++ 4 files changed, 124 insertions(+), 16 deletions(-) -- 2.20.1