From nobody Sat Feb 26 22:44:04 2022 X-Original-To: freebsd-riscv@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id AB1B519EDF35 for ; Sat, 26 Feb 2022 22:44:14 +0000 (UTC) (envelope-from freebsd-riscv@dino.sk) Received: from mailhost.netlabit.sk (mailhost.netlabit.sk [84.245.65.72]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4K5hXF3ytvz3FD2 for ; Sat, 26 Feb 2022 22:44:13 +0000 (UTC) (envelope-from freebsd-riscv@dino.sk) Received: from zeta.dino.sk (fw3.dino.sk [84.245.95.254]) (AUTH: LOGIN milan, TLS: TLSv1/SSLv3,256bits,AES256-SHA) by mailhost.netlabit.sk with ESMTPSA; Sat, 26 Feb 2022 23:44:05 +0100 id 00DD6044.621AAD35.000141A5 Date: Sat, 26 Feb 2022 23:44:04 +0100 From: Milan Obuch To: freebsd-riscv@freebsd.org Subject: PolarFire SoC based board working Message-ID: <20220226234404.7e2da95b@zeta.dino.sk> X-Mailer: Claws Mail 3.18.0git333 (GTK+ 2.24.33; i386-portbld-freebsd11.4) List-Id: FreeBSD on the RISC-V instruction set architecture List-Archive: https://lists.freebsd.org/archives/freebsd-riscv List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-riscv@freebsd.org X-BeenThere: freebsd-riscv@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 4K5hXF3ytvz3FD2 X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of freebsd-riscv@dino.sk designates 84.245.65.72 as permitted sender) smtp.mailfrom=freebsd-riscv@dino.sk X-Spamd-Result: default: False [-1.29 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.99)[-0.991]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; DMARC_NA(0.00)[dino.sk]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-0.999]; MID_RHS_MATCH_FROMTLD(0.00)[]; NEURAL_SPAM_SHORT(1.00)[1.000]; MLMMJ_DEST(0.00)[freebsd-riscv]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:5578, ipnet:84.245.64.0/18, country:SK]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-ThisMailContainsUnwantedMimeParts: N Hi, at https://dmesgd.nycbug.org/index.cgi?do=view&id=6455 is uploaded dmesg from system build using (almost) stock FreeBSD sources. This system uses PolarFire SoC combining RISC V cores with FPGA from Microchip. I use SoM and carrier board from Conclusive Engineering (www.conclusive.pl). Notes: - dmesg uploaded uses network driver (cgem) as kernel module. As there is SGMII between MAC (in SoC) and PHY, if_cgem.c needs a bit of patching. Another patch is needed for building miibus.ko (preliminary review at https://reviews.freebsd.org/D34256). - only one UART is shown here, however there are five in total. With simple tweak in FDT, all are working. - with some more patches, GPIO does work as well, verified partially (some hardware design in FPGA is probably necessary for full verification, not done yet). - another device requiring patches is SD/MMC driver. It works only in read only mode presently, I did not find the reason, yet. In dmesg given at URL above, memdisk is used for root filesystem. - manual intervention is required at the moment when loader starts, selecting safe mode. - when 'random: randomdev_wait_until_seeded unblock wait' lines started appearing, I used ctrl-C to unblock wait manually. I have probably patch dealing with this issue, test needed. PolarFire SoC is used for Icicle board as well, it would be good to know if some FreeBSD developer has this board... Regards, Milan