From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 8E767C433F5 for ; Tue, 11 Jan 2022 17:58:24 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 3DF2381B4B; Tue, 11 Jan 2022 18:58:22 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b="mE2Pyx7J"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 4745183055; Tue, 11 Jan 2022 18:58:21 +0100 (CET) Received: from mail-ed1-x52a.google.com (mail-ed1-x52a.google.com [IPv6:2a00:1450:4864:20::52a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id A81EE81A03 for ; Tue, 11 Jan 2022 18:58:18 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=dsankouski@gmail.com Received: by mail-ed1-x52a.google.com with SMTP id o6so70454114edc.4 for ; Tue, 11 Jan 2022 09:58:18 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=XQQ+Nghk0xZfhoMkS2ZhwgIdmiD4s2FXCNyKZJmgTWQ=; b=mE2Pyx7JcyWhwNksNlj43C0bRY4PsU8FziYI+CltnLGg93VQdHB5tzqe/+uYX1+cdy VuVmH0OOttc16EKza/VYn6z5LCb4DtIhhPsKu5Ll90ude9BMEOEfwCnrDFGHtvlICdf9 /yKCUjilQS1gfHAfO2QrR9uxd60bbNZxvGxnDfuRLj1V12AD2STiit5yAG9fGCM982X7 aeEiT0i6H1muQjKRB0nqAjQDdIh+M8yMfYXT/FfUiF2qO43os/7YZCJYSUbsX/jQbNQR d1fO3vi1DG7L34OpbFANciJDoJaKYKyIqO+SpVRY0kv82Pdf9roTqXc53p1TvQXWPeem fbYA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=XQQ+Nghk0xZfhoMkS2ZhwgIdmiD4s2FXCNyKZJmgTWQ=; b=YOfNe/5MdmXJd0jwpWYIbmq92Wmffi7Rs70SUtOv2w+sxOGISHgMftuiI6nE3SblgP LJtq79u++6xzVsidAkFR8EKCG7pUlaEDNPEdQ8B1fkzljxKR+P4gMPSyxdzYlV4j60lx ZaqvbzvU/NZDB957P4/ySi8HDopABHv5L7lZPl4jF0fdbdREx0Dejf+yg653jDHuibsd jceuzL31bVQLTtGFNsz6vb4EZfyOnb3g4MIT8p41iol/uh2yvtqX7LWxW+r+k3X/qMZb heXue5/w9oCJgT4L8ZY5aXsgmkeQTODfMhPiiER2JDmqki3xeU/J/q3zqptOtiwcrKUx 6hIA== X-Gm-Message-State: AOAM532h7LiSNZ0l/b0UEbDM2O4qyToBzQzj37hBd21kGHY9vkaWYxHl 7P9aYmy0DCcJx6TOm7475ZgfrEho4P+ToA== X-Google-Smtp-Source: ABdhPJx8vgrj0ZFRST7+RwmIlSoRMc5BBevoNMb8oquRfxM9A4CyTty1pux94OAJP8vjuRyrzGB7Pg== X-Received: by 2002:a17:907:1606:: with SMTP id hb6mr4897119ejc.606.1641923898185; Tue, 11 Jan 2022 09:58:18 -0800 (PST) Received: from localhost.localdomain ([46.216.45.177]) by smtp.gmail.com with ESMTPSA id k16sm3815919ejk.172.2022.01.11.09.58.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 11 Jan 2022 09:58:17 -0800 (PST) From: Dzmitry Sankouski To: u-boot@lists.denx.de Cc: Dzmitry Sankouski Subject: [PATCH 0/2] get sdm845 boards u-boot usable as a secondary bootloader Date: Tue, 11 Jan 2022 20:58:15 +0300 Message-Id: <20220111175817.5973-1-dsankouski@gmail.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.2 at phobos.denx.de X-Virus-Status: Clean U-boot is intended to replace linux kernel in android boot image(ABL), and it's FIT payload to replace initramfs file. The boot process is similar to boot image with linux: - android bootloader (ABL) unpacks android boot image - ABL sets `linux,initrd-start property` in chosen node in unpacked FDT - ABL sets x0 register to FDT address, and passes control to u-boot - u-boot reads x0 register, and stores it in `abl_fdt_addr` env variable - u-boot reads `linux,initrd-start` property, and stores it in `abl_initrd_start_addr` In this way, u-boot bootcmd relies on `abl_initrd_start_addr` env variable, and boils down to `bootm $abl_initrd_start_addr`. If more control on boot process is desired, pack a boot script in FIT image, and put it to default configuration Dzmitry Sankouski (2): soc: sdm845: implement ABL info collecting, add bootcommand and usage doc board: starqltechn: get board usable - fix defconfig and strip config options arch/arm/mach-snapdragon/init_sdm845.c | 60 ++++++++++++++++++++---- configs/starqltechn_defconfig | 12 +++-- doc/board/qualcomm/sdm845.rst | 63 +++++++++++++++++++++++++- include/configs/sdm845.h | 5 ++ 4 files changed, 124 insertions(+), 16 deletions(-) -- 2.20.1