From patchwork Mon Mar 28 02:43:50 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bin Meng X-Patchwork-Id: 1609996 X-Patchwork-Delegate: xypron.glpk@gmx.de Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20210112 header.b=jjEfqF0S; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Received: from phobos.denx.de (phobos.denx.de [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4KRcV63VH1z9sDX for ; Mon, 28 Mar 2022 13:44:30 +1100 (AEDT) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 0CD8A83AAF; Mon, 28 Mar 2022 04:44:14 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b="jjEfqF0S"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 3927B83AAF; Mon, 28 Mar 2022 04:44:07 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.2 Received: from mail-pj1-x102b.google.com (mail-pj1-x102b.google.com [IPv6:2607:f8b0:4864:20::102b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 3266C83ABA for ; Mon, 28 Mar 2022 04:44:01 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=bmeng.cn@gmail.com Received: by mail-pj1-x102b.google.com with SMTP id m22so12736146pja.0 for ; Sun, 27 Mar 2022 19:44:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=UlGCXdEfWprRj4E0/XJz43vZhFJStr3rdtqCOjaK+y4=; b=jjEfqF0SxXbl0bhUInvaUjbsr6L42wkMhdGuwBfi8IgX+cWcnGo/+m1YKyzzaTC91p yj/JzNl884xh5btUn5Gse6HGyB0Jb5Qt2a/N8lH0ow0Twqnd3FFtAuPzjH5amImPhtFP UxQA7yaQA21O1AK94TazpsuIIezZicSZivrLW/YkcNO/JBZq1IIHWCDVYoCBLAMCshL5 whW/xuBjzcxwAGEDsEVHhMYHCyL9Y9xg9UpzIf97+N5pwc2Ff+bXcJS9i2PZ+mY21L3B 3MqRm/JpRYNmV5ixqL8NgEHJOxBoPAWtuMR1SmHLD8RNa9+7pmfe01BlnhyB3LMh9YUr PVIQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=UlGCXdEfWprRj4E0/XJz43vZhFJStr3rdtqCOjaK+y4=; b=Lnf000X0rXD6AalokGL9+RR9TdLXFElysKnB1WLrXt9OzOzOZjTYfQfxstNsYKv8ui nyerPzEwbpeHKBy/rItpAy1dH5hr5vCDpvgCZfiD+axPtpLahSeQPzdlE8n3PSDAPNeq CL07YN0xquGw0yZpadRBrWrBPXSD5QBVfe9WeQotpPMXL4rwZP2gm/lsqXgSB50+Uo0a LVIm6zGqCM9o436tZwc4eIHI6qmTD7bKhr8GcvgBVNmznI+QBMQQI/WF0NdsMHWSndgZ IoXvYvzwFG+0X4AZGS62S+8e68+qszXLpWvngIwK983zy9+h4IkbJDfdbIf4qnDsr0qq SG1Q== X-Gm-Message-State: AOAM5329+YqPo86D0CaeZiiv9/VvakOVvivfmWmERxVr2OOQYokG68Pa a8a98KGNg8FoQ93ysXC2LjvydK7fhqM5cg== X-Google-Smtp-Source: ABdhPJypsfD7OZeDPZdicbDy4QmrR2T9w57wtknN9IMAElifqP5X6WHQPfx4zH1UOLnItSSEpUqRDA== X-Received: by 2002:a17:90b:4c41:b0:1c7:3fa8:9b6a with SMTP id np1-20020a17090b4c4100b001c73fa89b6amr38174064pjb.120.1648435439596; Sun, 27 Mar 2022 19:43:59 -0700 (PDT) Received: from pek-vx-bsp2.wrs.com (unknown-176-192.windriver.com. [147.11.176.192]) by smtp.gmail.com with ESMTPSA id p10-20020a637f4a000000b00373a2760775sm11266095pgn.2.2022.03.27.19.43.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 27 Mar 2022 19:43:59 -0700 (PDT) From: Bin Meng To: Tom Rini , U-Boot Mailing List Subject: [PATCH 2/3] doc: usage: Update vxworks doc to mention RISC-V support Date: Mon, 28 Mar 2022 10:43:50 +0800 Message-Id: <20220328024351.629189-2-bmeng.cn@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220328024351.629189-1-bmeng.cn@gmail.com> References: <20220328024351.629189-1-bmeng.cn@gmail.com> MIME-Version: 1.0 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.5 at phobos.denx.de X-Virus-Status: Clean At present the doc only mentions Arm, PowerPC and x86. RISC-V support has been added since VxWorks SR0650 support for a while, and U-Boot supports loading a RISC-V VxWorks kernel too. Let's document it. Signed-off-by: Bin Meng Reviewed-by: Heinrich Schuchardt --- doc/usage/os/vxworks.rst | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/doc/usage/os/vxworks.rst b/doc/usage/os/vxworks.rst index e696c639b2..e732f711fb 100644 --- a/doc/usage/os/vxworks.rst +++ b/doc/usage/os/vxworks.rst @@ -13,13 +13,13 @@ Status U-Boot supports loading VxWorks kernels via 'bootvx' and 'bootm' commands. For booting old kernels (6.9.x) on PowerPC and ARM, and all kernel versions on other architectures, 'bootvx' shall be used. For booting VxWorks 7 kernels -on PowerPC and ARM, 'bootm' shall be used. +on PowerPC/ARM/RISC-V, 'bootm' shall be used. With CONFIG_EFI_LOADER option, it's possible to chain load a VxWorks x86 kernel via the UEFI boot loader application for VxWorks loaded by 'bootefi' command. -VxWorks 7 on PowerPC and ARM ----------------------------- +VxWorks 7 on PowerPC/ARM/RISC-V +------------------------------- From VxWorks 7, VxWorks starts adopting device tree as its hardware description mechanism (for PowerPC and ARM), thus requiring boot interface changes. This section will describe the new interface. @@ -45,6 +45,11 @@ For ARM, the calling convention is shown below:: When using the Linux compatible standard DTB, the calling convention of VxWorks entry point is exactly the same as the Linux kernel. +For RISC-V, there is no legacy bootm flow as VxWorks always uses the same boot +interface as the Linux kernel, with the calling convention below:: + + void (*kernel_entry)(unsigned long hartid, void *fdt_addr) + When booting a VxWorks 7 kernel (uImage format), the parameters passed to bootm is like below::