sgdisk --clear \
--new=1:2048:4095 --change-name=1:uboot --typecode=1:$(FSBL) \
--new=2:4096:69631 --change-name=2:bootloader --typecode=2:$(BBL) \
--new=3:264192: --change-name=3:root --typecode=3:$(LINUX) \
--
You received this message because you are subscribed to the Google Groups "RISC-V SW Dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to sw-dev+un...@groups.riscv.org.
To post to this group, send email to sw-...@groups.riscv.org.
Visit this group at https://groups.google.com/a/groups.riscv.org/group/sw-dev/.
To view this discussion on the web visit https://groups.google.com/a/groups.riscv.org/d/msgid/sw-dev/20181011132455.GA7242%40lst.de.
The SiFive FSBL is replaced with U-Boot and stores in SD card and runs in M-mode at present.The u-boot requires bbl image (bbl+vmlinux) to boot Linux at present.Our next step is to change M-mode to S-mode in u-boot and removing bbl from Linux image (bbl+vmlinux).
To view this discussion on the web visit https://groups.google.com/a/groups.riscv.org/d/msgid/sw-dev/dfaca48a-b9b5-4408-94a2-c26aa8523874%40groups.riscv.org.
--
You received this message because you are subscribed to the Google Groups "RISC-V SW Dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to sw-dev+un...@groups.riscv.org.
To post to this group, send email to sw-...@groups.riscv.org.
Visit this group at https://groups.google.com/a/groups.riscv.org/group/sw-dev/.
To view this discussion on the web visit https://groups.google.com/a/groups.riscv.org/d/msgid/sw-dev/20181012080840.GA27426%40lst.de.
Yes - for RISC-V U-boot, it's best to follow the example set by
the ARM64 U-boot folks and support booting in any mode:
https://github.com/theopolis/u-boot/blob/master/doc/README.arm64
- Paul
To view this discussion on the web visit https://groups.google.com/a/groups.riscv.org/d/msgid/sw-dev/CAP6exYKr_uHoX1FvKSTnPB8gPkYzYY0LOKB%2BbvTvYiyV%3DcfgfA%40mail.gmail.com.
I agree that we shouldn't trust vendor firmware. It is always buggy at best.
On Friday, 12 October 2018 22:12:08 UTC+1, alist...@gmail.com wrote:I agree that we shouldn't trust vendor firmware. It is always buggy at best.But once the source is open/available surely one can see what's going on and address problems/bugs as needed?
I agree that we shouldn't trust vendor firmware. It is always buggy at best.The problem that I see with starting coreboot or u-boot (the last stage bootloaders) in M mode is that we then end up with duplicated work between the projects.
This is where a model like Arm Trusted Firmware fits in well. We can see something like this:
(interested text removed :-)
The advantage I see with this is that we only need to implement the M mode functionality once and then coreboot, u-boot and anything else can utilise it. It also keeps bigger later stage boot loaders out of M mode which has a mild security benefit of smaller attack surfaces.
ron
I just see a lot of value in separating the firmware from the last stage bootloader. As part of this though we would need to come up with a firmware option that can be used for those who want to.
On Fri, Oct 12, 2018 at 10:12 PM <alist...@gmail.com> wrote:
> The problem that I see with starting coreboot or u-boot (the last stage bootloaders)
> in M mode is that we then end up with duplicated work between the projects.
yes. that has not stopped either project from continuing. it also
hasn't stopped libreboot, or grub, or the system which allows a linux
kernel to actually *be* the bootloader (which runs an initramfs and
calls kexec).
each of these bootloaders has different fans and userbases. they
don't necessarily talk to each other, and that's just how it is.
expecting each independent team to cooperate, particularly when some
of them are hard forks of other bootloader projects, is not realistic.
> This is where a model like Arm Trusted Firmware fits in well.
you mean, ARM _treacherous_ firmware? the "trust" you refer to is
directed at *manufacturers*, providing the specific goal of
*betraying* users. "Trust Us. We Will HELP You To Prevent And
Prohibit Users From Owning Their Devices".
l.
That seems a little harsh. ATF is open source and you can compile it yourself from the source to deploy. You are also free to re-write it if need be.
A mix-mash of ways seems like a dangerous path to lead to fragmentation and confusion and that is what I'm afraid of.