From patchwork Fri Jun 4 23:00:30 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bin Meng X-Patchwork-Id: 1488159 X-Patchwork-Delegate: uboot@andestech.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20161025 header.b=tPmJdyJ5; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4FxdXn105qz9sRN for ; Sat, 5 Jun 2021 09:00:54 +1000 (AEST) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 3D21482EF0; Sat, 5 Jun 2021 01:00:43 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b="tPmJdyJ5"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 5F16A82EF5; Sat, 5 Jun 2021 01:00:42 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FROM,SPF_HELO_NONE autolearn=ham autolearn_force=no version=3.4.2 Received: from mail-pj1-x1033.google.com (mail-pj1-x1033.google.com [IPv6:2607:f8b0:4864:20::1033]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 6633382EC9 for ; Sat, 5 Jun 2021 01:00:39 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=bmeng.cn@gmail.com Received: by mail-pj1-x1033.google.com with SMTP id i22so6380232pju.0 for ; Fri, 04 Jun 2021 16:00:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=m3EmPSsodu13eLqmPIaKgVJ6kk9XwOb5R5l9G6QYPCw=; b=tPmJdyJ5jeGcoxygg8EQ/LtIn0ZX/N+czBCCEAkMEI+ee9JtRaZ4K3IiJZ73HkCAHc gx1T+ZBUV0hRWXbmBLa+iNy8dvu2mNtrtDVzDBfjAjemnBpDq5jNc6nNWUJAgloOdnaS BB85oQwKbT/DyK5M0o6rxNSJbSNqigWv9vmAXwRSf8zdBf3C0x0YUjbQrxnhV7DR0EBP aa3XxihN6jFsvYmDSseYdcQnK/n2psJRWzIUB1Ew/JrpbXbsUUnXQ+3s3g6E48wKDAlk BxSYaho0ydnNCdecPFKqEksC6/suXotyznSCPdQSj99WzWag3ZXhn7KxkrXDtLpJbzQi sUag== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=m3EmPSsodu13eLqmPIaKgVJ6kk9XwOb5R5l9G6QYPCw=; b=XWAUvyzS0mLLoPnrmICcanp1zvbw9NjqbePtp0Fdv4EPfv1irYIu/3jJjJSNatiD1X TG1MLCT4+enAcjDC+GCPDCBOe/ByI75YdCRgNAc2Y0vLimMk62wOwz03YcKeGL85xmqP 6qEOyl95P8RHPDAUZTttH00q3Kstio1w+QpqnCsS8f6UtcQ44NRo89M4E22PlNcd/pt2 GVRm0KB/le9eaqHOdcLLv+3X6dtW5UBsCrMEZPLcDr1ksWSU+W25x1Rp8B61Dhb6GeX7 2lf3ZbGFdxU9XZjOT/OuvACQOdZeAsea8PVISFm/xyj38yxhCzjm61mfxmtYllBmFiIB B03A== X-Gm-Message-State: AOAM5318e+ZMhI3K2yPolLMfdjFNc/Cvsr7wsGd9Q42+J3MrimAQHZIV vih8L31Js22nWzoIsUadM0k= X-Google-Smtp-Source: ABdhPJxfJPjSn9fqt1ZddYmI+1UrkGX5AzFhDU9sQQKJzxU+k3zP8bsB8mp+c4YjuiCb2tZwFdR/kg== X-Received: by 2002:a17:90a:2f01:: with SMTP id s1mr7260166pjd.204.1622847637739; Fri, 04 Jun 2021 16:00:37 -0700 (PDT) Received: from i9-aorus-gtx1080.localdomain (144.168.56.201.16clouds.com. [144.168.56.201]) by smtp.gmail.com with ESMTPSA id k25sm2555695pfk.33.2021.06.04.16.00.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 04 Jun 2021 16:00:37 -0700 (PDT) From: Bin Meng To: Rick Chen , Leo Liang , u-boot@lists.denx.de Cc: Bin Meng Subject: [PATCH] riscv: ae350: doc: Remove CONFIG_SKIP_LOWLEVEL_INIT Date: Sat, 5 Jun 2021 07:00:30 +0800 Message-Id: <20210604230030.19510-1-bmeng.cn@gmail.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.102.4 at phobos.denx.de X-Virus-Status: Clean The doc says CONFIG_SKIP_LOWLEVEL_INIT is in ax25-ae350.h, while actually it is not. Remove it. Signed-off-by: Bin Meng Reviewed-by: Rick Chen --- doc/board/AndesTech/ax25-ae350.rst | 19 ++++--------------- 1 file changed, 4 insertions(+), 15 deletions(-) diff --git a/doc/board/AndesTech/ax25-ae350.rst b/doc/board/AndesTech/ax25-ae350.rst index 923649240e..b46f427f4b 100644 --- a/doc/board/AndesTech/ax25-ae350.rst +++ b/doc/board/AndesTech/ax25-ae350.rst @@ -58,15 +58,6 @@ Platform Level Interrupt Controller (PLIC) - Configurable number of targets: 1-16 - Preempted interrupt priority stack -Configurations --------------- - -CONFIG_SKIP_LOWLEVEL_INIT: - -If you want to boot this system from SPI ROM and bypass e-bios (the -other boot loader on ROM). You should undefine CONFIG_SKIP_LOWLEVEL_INIT -in "include/configs/ax25-ae350.h". - Build and boot steps -------------------- @@ -89,12 +80,10 @@ Verification: Steps ----- -1. Define CONFIG_SKIP_LOWLEVEL_INIT to build u-boot which is loaded via gdb from ram. -2. Undefine CONFIG_SKIP_LOWLEVEL_INIT to build u-boot which is booted from spi rom. -3. Ping a server by mac driver -4. Scan sd card and copy u-boot image which is booted from flash to ram by sd driver. -5. Burn this u-boot image to spi rom by spi driver -6. Re-boot u-boot from spi flash with power off and power on. +1. Ping a server by mac driver +2. Scan sd card and copy u-boot image which is booted from flash to ram by sd driver +3. Burn this u-boot image to spi rom by spi driver +4. Re-boot u-boot from spi flash with power off and power on Messages of U-Boot boot on AE350 board --------------------------------------