incubator-nuttx/boards/risc-v/k210/maix-bit
Nathan Hartman 03802dad13 NuttX graduated the Incubator; update repository links 2022-11-26 11:58:15 -08:00
..
configs boards/xxx: Remove CONFIG_SCHED_ATEXIT/ONEXIT from all defconfigs 2022-05-25 15:28:43 +08:00
include boards: k210: Add initial gpio user space support 2021-10-17 17:29:59 +09:00
kernel Remove the unnecessary cast for main_t, NULL and argv 2022-10-18 08:51:45 +02:00
scripts risc-v: Move "LDFLAGS += -melf32lriscv" from Make.defs to Toolchain.defs 2022-05-16 11:17:08 +03:00
src arch/risc-v: Remove FAR from chip and board folder 2022-04-19 00:22:45 +03:00
Kconfig Squashed commit of the following: 2019-12-31 09:06:20 -06:00
README-qemu.txt NuttX graduated the Incubator; update repository links 2022-11-26 11:58:15 -08:00
README.txt NuttX graduated the Incubator; update repository links 2022-11-26 11:58:15 -08:00

README.txt

1. Download and install toolchain and openocd-k210

  $ curl https://static.dev.sifive.com/dev-tools/riscv64-unknown-elf-gcc-8.3.0-2019.08.0-x86_64-linux-ubuntu14.tar.gz
  $ export PATH=$PATH:/$TOOL_CHAIN_PATH/bin

2. Build openocd-k210

  $ git clone https://github.com/kendryte/openocd-kendryte
  $ cd openocd-kendryte
  $ ./bootstrap & ./configure & make

3. Configure and build NuttX

  $ mkdir ./nuttx; cd ./nuttx
  $ git clone https://github.com/apache/nuttx.git nuttx
  $ git clone https://github.com/apache/nuttx-apps.git apps
  $ cd nuttx
  $ make distclean
  $ ./tools/configure.sh maix-bit:nsh
  $ make V=1

4. Download and run the nuttx from SRAM (not SPI-Flash)

  $ picocom -b 115200 /dev/ttyUSB0
  $ sudo ./src/openocd -s ./tcl -f ./tcl/kendryte.cfg -m 0
  $ riscv64-unknown-elf-gdb ./nuttx
  (gdb) target extended-remote :3333
  (gdb) load nuttx
  (gdb) c

5. Write nuttx.bin to SPI-Flash

  $ pip3 install kflash
  $ kflash -p /dev/ttyUSB0 -b 1500000 ./nuttx/nuttx.bin

  NOTE: The kflash_gui is not recommended because it's unstable

6. TODO

  Support peripherals such as GPIO/SPI/I2C/...
  Support FPU
  Support RISC-V U-mode including memory protection