From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 79B8CC433EF for ; Mon, 16 May 2022 11:10:49 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 7E7D884279; Mon, 16 May 2022 13:10:44 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=mirx.dev Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=mirx.dev header.i=@mirx.dev header.b="JeL2HISG"; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=messagingengine.com header.i=@messagingengine.com header.b="t+PiUA1x"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 3DED884166; Mon, 16 May 2022 13:09:28 +0200 (CEST) Received: from wout5-smtp.messagingengine.com (wout5-smtp.messagingengine.com [64.147.123.21]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id DA6D48418D for ; Mon, 16 May 2022 13:08:51 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=mirx.dev Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=andrew@mirx.dev Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailout.west.internal (Postfix) with ESMTP id 4C19132000EB; Mon, 16 May 2022 07:08:49 -0400 (EDT) Received: from mailfrontend2 ([10.202.2.163]) by compute5.internal (MEProxy); Mon, 16 May 2022 07:08:50 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mirx.dev; h=cc :cc:content-transfer-encoding:date:date:from:from:in-reply-to :in-reply-to:message-id:mime-version:references:reply-to:sender :subject:subject:to:to; s=fm3; t=1652699328; x=1652785728; bh=Mu YDQtRtuphLEHPX1syMKpGVgy6JfToNIkwK+Xhi1Qg=; b=JeL2HISG1/7PmV15w9 bcU5eBpAZIKKTWFZAn20zPUEMOu4WghU5LzajgcF+NtbYyFVN/5+mptmHZjmOWyT G0xTBBNaowU4HkOoZLMmcSrRUxpFVR9Xd3enOBG6WLs/e7fGbxLciYYb46QcIx3L LH2cbmJzPvYSEjOfJO/Z1NLw8+6hikk3vegB7t0qhlrWqc+RqyqFM7LsP2b1YlkF 4PL5gc8uidon8jFdTM/IrwZWt1wVwxe095VCMciflh2Q4Pgg8Vz6zBRjce3NRGQu whzOoIATCdBeF5vEj5D5o2nQw7k2xqlGW4aKa0CbF36PYMQ7OL+dt/yw1EhDYT98 Oz6A== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-transfer-encoding:date:date :from:from:in-reply-to:in-reply-to:message-id:mime-version :references:reply-to:sender:subject:subject:to:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm1; t= 1652699328; x=1652785728; bh=MuYDQtRtuphLEHPX1syMKpGVgy6JfToNIkw K+Xhi1Qg=; b=t+PiUA1xF13DdeGEwertZFnha6GDcQv4J1W32sRzBDEs7uuqksv bG/YjykJRsQ70be+036BGBUQ2FKUL/WLY/7FTFwmvGlTzUqawaTFqlkXzm6Y8+wI HB2VKWKEjUHcPEUM9DRXBwRR8z/vh7epmuuCS3wfqVXpHEXT2tt7t4YzQlDckhAN TpsxUvwcZMtgO8voBLMfPVr1SKzfIGqunJsch6wR9JZyW2mWWCCly9eJ2wSlJlOH FT3mDcQ7xougTkDfeGzUoX1KrEFqT0lNRUgzlUWEGtwn7t+qKlYawDLn2f/O/4OX +H/icJ0PTzSN+2qu9nTOzpx3HG0uHwkwnxA== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvfedrheehgdefhecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenuc fjughrpefhvfevufffkffojghfggfgsedtkeertdertddtnecuhfhrohhmpeetnhgurhgv ficutegssghothhtuceorghnughrvgifsehmihhrgidruggvvheqnecuggftrfgrthhtvg hrnhepleeigeejjeegvdejjeetheevheetgedvffdtteegvdeltdejgeehkeekfeeviedt necuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomheprghnug hrvgifsehmihhrgidruggvvh X-ME-Proxy: Received: by mail.messagingengine.com (Postfix) with ESMTPA; Mon, 16 May 2022 07:08:44 -0400 (EDT) From: Andrew Abbott To: U-Boot Mailing List Cc: Jagan Teki , Johan Jonker , Simon Glass , Samuel Dionne-Riel , Peter Robinson , Kever Yang , Philipp Tomsich , Andrew Abbott , Alper Nebi Yasak , "Marty E. Plummer" , Philipp Tomsich Subject: [RFC PATCH v2 7/8] doc: rockchip: Update for new binman image generation Date: Mon, 16 May 2022 21:07:11 +1000 Message-Id: <20220516110712.178958-8-andrew@mirx.dev> X-Mailer: git-send-email 2.36.0 In-Reply-To: <20220516110712.178958-1-andrew@mirx.dev> References: <20220516110712.178958-1-andrew@mirx.dev> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.5 at phobos.denx.de X-Virus-Status: Clean Update the Rockchip documentation for image generation with binman, including the new automatically-created SPI image. Signed-off-by: Andrew Abbott --- Changes in v2: - Remove note from docs about different offsets in SPI flash for different SoCs - this was a bad assumption on my part, it doesn't work this way. - Update name of SD/MMC image in the docs from u-boot-rockchip-sdmmc.bin to u-boot-rockchip.bin. doc/board/rockchip/rockchip.rst | 29 +++++++---------------------- 1 file changed, 7 insertions(+), 22 deletions(-) diff --git a/doc/board/rockchip/rockchip.rst b/doc/board/rockchip/rockchip.rst index 4ca7b00b1f..a96ca0b582 100644 --- a/doc/board/rockchip/rockchip.rst +++ b/doc/board/rockchip/rockchip.rst @@ -172,8 +172,8 @@ Flashing SD Card ^^^^^^^ -All Rockchip platforms (except rk3128 which doesn't use SPL) are now -supporting a single boot image using binman and pad_cat. +All Rockchip platforms, (except rk3128 which doesn't use SPL) generate a +SD/MMC full boot image using binman. To write an image that boots from a SD card (assumed to be /dev/sda): @@ -224,31 +224,16 @@ is u-boot-dtb.img SPI ^^^ -The SPI boot method requires the generation of idbloader.img with help of the mkimage tool. +Some platforms also generate a SPI flash full boot image, controlled by the +CONFIG_ROCKCHIP_SPI_IMAGE configuration option. -SPL-alone SPI boot image: - -.. code-block:: bash - - ./tools/mkimage -n rk3399 -T rkspi -d spl/u-boot-spl.bin idbloader.img - -TPL+SPL SPI boot image: - -.. code-block:: bash - - ./tools/mkimage -n rk3399 -T rkspi -d tpl/u-boot-tpl.bin:spl/u-boot-spl.bin idbloader.img - -Copy SPI boot images into SD card and boot from SD: +This image can be copied onto an SD card and written to SPI flash: .. code-block:: bash sf probe - load mmc 1:1 $kernel_addr_r idbloader.img - sf erase 0 +$filesize - sf write $kernel_addr_r 0 ${filesize} - load mmc 1:1 ${kernel_addr_r} u-boot.itb - sf erase 0x60000 +$filesize - sf write $kernel_addr_r 0x60000 ${filesize} + load mmc 1:1 $kernel_addr_r u-boot-rockchip-spi.bin + sf update $kernel_addr_r 0 ${filesize} 2. Package the image with Rockchip miniloader --------------------------------------------- -- 2.36.0