From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 6E134C433F5 for ; Mon, 25 Apr 2022 00:05:22 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 5123383E49; Mon, 25 Apr 2022 02:05:13 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=mirx.dev Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=mirx.dev header.i=@mirx.dev header.b="wpLV1PgU"; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=messagingengine.com header.i=@messagingengine.com header.b="WO6Ro58X"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 9A70583DF3; Mon, 25 Apr 2022 02:04:41 +0200 (CEST) Received: from wout3-smtp.messagingengine.com (wout3-smtp.messagingengine.com [64.147.123.19]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 8C03183AFF for ; Mon, 25 Apr 2022 02:04:34 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=mirx.dev Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=andrew@mirx.dev Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.west.internal (Postfix) with ESMTP id 29DD33201FB7; Sun, 24 Apr 2022 20:04:32 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 24 Apr 2022 20:04:33 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mirx.dev; h=cc :cc:content-transfer-encoding:date:date:from:from:in-reply-to :in-reply-to:message-id:mime-version:references:reply-to:sender :subject:subject:to:to; s=fm3; t=1650845071; x=1650931471; bh=1j 0zCdW9YQal7yGe9z2mb1FhxXVT38ppsc7EVLwLmFY=; b=wpLV1PgUT9Ikm4r3g9 npyafTECXmA3BUVSe4u7z4OTvlicj0QtqH1WkBWn/MrY68wEfINI9suq+c+Hr+P9 ollQrK6gfH1617FgMZTwAPvWLMFhT/ZLXtriWLTfaQagCYd36ADSdCYN4LIUwOHY /1FvRr5HZQRx78TJ931i8gECrDcJpZ7WgkM9LJlPTm5lbP/4n15+KBJV7mC+FF0T +MKI6RsRcVkB39tOKmoJyvIqeDdVxN26uDR+eQLw+A2N+eyn58HyflE3liaBJMyW Lft2NIEVx4db3VgSN/hb1taA60gWO20ndpPyiNMbeDzDplp0uSopfditSz6uFAHY FroA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-transfer-encoding:date:date :from:from:in-reply-to:in-reply-to:message-id:mime-version :references:reply-to:sender:subject:subject:to:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm1; t= 1650845071; x=1650931471; bh=1j0zCdW9YQal7yGe9z2mb1FhxXVT38ppsc7 EVLwLmFY=; b=WO6Ro58X7Unt0xIKNd96dD2lCjjFkJdbTZdnkhJROfViS+8D1PM 7SWgSWeVjAC/K74pImgIiA7303MHxmEJ0rzjxT8OXwajMcPZct38b4R8Vun939nU CvIdlie0yKrk14FOhKYJkz2Gv5ve7J0PasXV8yt0+PfgcfLNxcw2/cfkuZA7L8kD HvBFey5cQMA39Jd0qeXHRC9HDjW+6WsG67si6lup0rdroc4MQ51sVT2TWhMBYFxn bKJzBk6z5XWX/ZA4BND1z2X1NGDRDU0WCHFea5efJ8y2xznhFCvL2TNz8g7hr+Db hOGY5EBiT6qZ9WwRweUUwc/VUGzHZnbYSlg== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvfedruddtgdeftdcutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenuc fjughrpefhvfevufffkffojghfggfgsedtkeertdertddtnecuhfhrohhmpeetnhgurhgv ficutegssghothhtuceorghnughrvgifsehmihhrgidruggvvheqnecuggftrfgrthhtvg hrnhepleeigeejjeegvdejjeetheevheetgedvffdtteegvdeltdejgeehkeekfeeviedt necuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomheprghnug hrvgifsehmihhrgidruggvvh X-ME-Proxy: Received: by mail.messagingengine.com (Postfix) with ESMTPA; Sun, 24 Apr 2022 20:04:27 -0400 (EDT) From: Andrew Abbott To: u-boot@lists.denx.de Cc: Andrew Abbott , Simon Glass , Philipp Tomsich , Kever Yang , Peter Robinson , Akash Gajjar , Jagan Teki , Samuel Dionne-Riel Subject: [RFC PATCH 7/8] doc: rockchip: Update for new binman image generation Date: Mon, 25 Apr 2022 10:03:28 +1000 Message-Id: <20220425000329.28124-8-andrew@mirx.dev> X-Mailer: git-send-email 2.35.3 In-Reply-To: <20220425000329.28124-1-andrew@mirx.dev> References: <20220425000329.28124-1-andrew@mirx.dev> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.5 at phobos.denx.de X-Virus-Status: Clean Signed-off-by: Andrew Abbott --- doc/board/rockchip/rockchip.rst | 34 +++++++++++---------------------- 1 file changed, 11 insertions(+), 23 deletions(-) diff --git a/doc/board/rockchip/rockchip.rst b/doc/board/rockchip/rockchip.rst index 4ca7b00b1f..1639ce4f72 100644 --- a/doc/board/rockchip/rockchip.rst +++ b/doc/board/rockchip/rockchip.rst @@ -172,14 +172,14 @@ Flashing SD Card ^^^^^^^ -All Rockchip platforms (except rk3128 which doesn't use SPL) are now -supporting a single boot image using binman and pad_cat. +All Rockchip platforms, (except rk3128 which doesn't use SPL) generate a +SD/MMC full boot image using binman. To write an image that boots from a SD card (assumed to be /dev/sda): .. code-block:: bash - sudo dd if=u-boot-rockchip.bin of=/dev/sda seek=64 + sudo dd if=u-boot-rockchip-sdmmc.bin of=/dev/sda seek=64 sync eMMC @@ -224,31 +224,19 @@ is u-boot-dtb.img SPI ^^^ -The SPI boot method requires the generation of idbloader.img with help of the mkimage tool. +Some platforms also generate a SPI flash full boot image, controlled by the +CONFIG_ROCKCHIP_SPI_IMAGE configuration option. -SPL-alone SPI boot image: +This image can be copied onto an SD card and written to SPI flash. Note that +the offset at which the image should be written to is different between SoCs. -.. code-block:: bash - - ./tools/mkimage -n rk3399 -T rkspi -d spl/u-boot-spl.bin idbloader.img - -TPL+SPL SPI boot image: - -.. code-block:: bash - - ./tools/mkimage -n rk3399 -T rkspi -d tpl/u-boot-tpl.bin:spl/u-boot-spl.bin idbloader.img +* RK3399: 0x0 -Copy SPI boot images into SD card and boot from SD: - -.. code-block:: bash +Replace with the offset for your SoC:: sf probe - load mmc 1:1 $kernel_addr_r idbloader.img - sf erase 0 +$filesize - sf write $kernel_addr_r 0 ${filesize} - load mmc 1:1 ${kernel_addr_r} u-boot.itb - sf erase 0x60000 +$filesize - sf write $kernel_addr_r 0x60000 ${filesize} + load mmc 1:1 $kernel_addr_r u-boot-rockchip-spi.bin + sf update $kernel_addr_r ${filesize} 2. Package the image with Rockchip miniloader --------------------------------------------- -- 2.35.3