From nobody Mon May 31 12:33:57 2021 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 76DF3BFDFD3; Mon, 31 May 2021 12:34:07 +0000 (UTC) (envelope-from dsl@mcusim.org) Received: from mcusim.org (mcusim.org [176.58.93.53]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4FtvqL2zWMz4jpL; Mon, 31 May 2021 12:34:06 +0000 (UTC) (envelope-from dsl@mcusim.org) Received: from x230.ds (unknown [83.28.234.19]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mcusim.org (Postfix) with ESMTPSA id 5E02876478; Mon, 31 May 2021 14:33:59 +0200 (CEST) Date: Mon, 31 May 2021 14:33:57 +0200 From: Dmitry Salychev To: freebsd-arm@freebsd.org Cc: freebsd-hackers@freebsd.org Subject: U-Boot for HoneyComb LX2 Message-ID: List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspamd-Queue-Id: 4FtvqL2zWMz4jpL X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=pass (policy=reject) header.from=mcusim.org; spf=pass (mx1.freebsd.org: domain of dsl@mcusim.org designates 176.58.93.53 as permitted sender) smtp.mailfrom=dsl@mcusim.org X-Spamd-Result: default: False [-1.80 / 15.00]; RCVD_TLS_ALL(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; RBL_DBL_DONT_QUERY_IPS(0.00)[176.58.93.53:from]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+a]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_SPAM_SHORT(1.00)[1.000]; SPAMHAUS_ZRD(0.00)[176.58.93.53:from:127.0.2.255]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[mcusim.org,reject]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:36236, ipnet:176.58.93.0/24, country:US]; RCVD_COUNT_TWO(0.00)[2]; MAILMAN_DEST(0.00)[freebsd-arm,freebsd-hackers]; RECEIVED_SPAMHAUS_PBL(0.00)[83.28.234.19:received] X-Spam: Yes X-ThisMailContainsUnwantedMimeParts: N Hi, I'm working on three ports to compile BL2, BL31, BL32 and BL33 (u-boot) bootloaders for HoneyComb LX2 in FreeBSD. They're based on what NXP shared in their Layerscape SDK and patches from SolidRun [1]. I've managed to compile Reset Configuration Word (rcw), u-boot and ARM trusted firmware (atf) and write them to one of the existing images shared by SolidRun [2]. However, my HoneyComb LX2 is on a way to me and this is why I cannot try to boot the resulted image on my own. I'm really interested how far it'll go, but I don't expect anything beyond u-boot. Could somebody who has HoneyComb do me a favor and try to boot that image of mine? It should work with DDR4-3200 only: ftp://mcusim.org/ftp/lx2160acex7_2000_700_3200_8_5_2-2fff64e_changed_bld.img.xz If you want to take a look at the sysutils/rcw-lx2160acex7, sysutils/u-boot-lx2160acex7 and sysutils/atf-lx2160acex7, here is the link: https://github.com/mcusim/freebsd-ports Thanks in advance. Regards, Dmitry [1] https://github.com/SolidRun/lx2160a_build [2] https://images.solid-run.com/LX2k/lx2160a_build/