On Tue, Jul 20, 2021 at 09:39:12AM +0300, Ilias Apalodimas wrote:
> Akashi-san,
>
> On Tue, Jul 20, 2021 at 11:13:40AM +0900, AKASHI Takahiro wrote:
> > On Thu, May 20, 2021 at 04:06:12AM +0200, Heinrich Schuchardt wrote:
> > > On 5/10/21 10:19 AM, AKASHI Takahiro wrote:
> > > > It will probably b
Move CONFIG_EXTRA_ENV_SETTINGS to board-specific
configuration headers.
Signed-off-by: Chia-Wei Wang
---
include/configs/aspeed-common.h | 9 -
include/configs/evb_ast2500.h | 6 ++
include/configs/evb_ast2600.h | 6 ++
3 files changed, 12 insertions(+), 9 deletions(-)
diff
AST2600 leverages the FIT hash/signature verification to fulfill
secure boot trust chain. To improve the performance and save SW
code size for those crypto operations, the two HW crypto engine,
HACE and ARCY, are enabled.
However, both of the engines can only access to data stored in
DRAM space. T
Enable SPL FIT image load and verification support.
The HW accelerated SHA is also available with the
newly added support of the HACE HW hash engine.
Signed-off-by: Chia-Wei Wang
---
configs/evb-ast2600_defconfig | 24 +---
1 file changed, 21 insertions(+), 3 deletions(-)
di
Probe ARCY driver in SPL board init if enabled.
Signed-off-by: Chia-Wei Wang
---
arch/arm/mach-aspeed/ast2600/spl.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/arch/arm/mach-aspeed/ast2600/spl.c
b/arch/arm/mach-aspeed/ast2600/spl.c
index a0fc420ff1..2172bb4ae7 100644
--- a/arch/ar
From: Joel Stanley
Currently the FIT verification calls directly into
SW implemented functions to get a CRC/SHA/MD5 hash.
This patch removes duplcated algorithm lookup and use
hash_lookup_algo to get the hashing function with HW
accelearation supported if configured.
The MD5 direct call remains
Add ARCY DTS node and enable it for AST2600 EVB.
Signed-off-by: Chia-Wei Wang
---
arch/arm/dts/ast2600-evb.dts | 5 +
arch/arm/dts/ast2600.dtsi| 9 +
2 files changed, 14 insertions(+)
diff --git a/arch/arm/dts/ast2600-evb.dts b/arch/arm/dts/ast2600-evb.dts
index adb80a30ef..fd4e
ARCY is deisnged to accerlerate ECC/RSA digital signature
generation and verification.
Signed-off-by: Chia-Wei Wang
---
drivers/crypto/aspeed/Kconfig | 10 ++
drivers/crypto/aspeed/Makefile | 1 +
drivers/crypto/aspeed/aspeed_arcy.c | 182
lib/rsa/Kconf
Akashi-san,
On Tue, Jul 20, 2021 at 11:13:40AM +0900, AKASHI Takahiro wrote:
> On Thu, May 20, 2021 at 04:06:12AM +0200, Heinrich Schuchardt wrote:
> > On 5/10/21 10:19 AM, AKASHI Takahiro wrote:
> > > It will probably be a common error case that a certificate (public key)
> > > is not provided by
Return CONFIG_SYS_LOAD_ADDR pointing to DRAM space for
spl_get_load_buffer() to allow generic SPL image loading
code (e.g. FIT and Ymodem) to store data in DRAM.
Signed-off-by: Chia-Wei Wang
---
arch/arm/mach-aspeed/ast2600/spl.c | 9 +
1 file changed, 1 insertion(+), 8 deletions(-)
dif
From: Joel Stanley
Probe HACE driver in SPL board init if enabled.
Signed-off-by: Joel Stanley
Signed-off-by: Chia-Wei Wang
---
arch/arm/mach-aspeed/ast2600/spl.c | 14 ++
1 file changed, 14 insertions(+)
diff --git a/arch/arm/mach-aspeed/ast2600/spl.c
b/arch/arm/mach-aspeed/ast
Add RSACLK enable for ARCY, the HW RSA/ECC crypto engine
of ASPEED AST2600 SoCs.
Signed-off-by: Chia-Wei Wang
---
arch/arm/include/asm/arch-aspeed/scu_ast2600.h | 1 +
drivers/clk/aspeed/clk_ast2600.c | 15 +++
2 files changed, 16 insertions(+)
diff --git a/arch/arm/i
From: Joel Stanley
Hash and Crypto Engine (HACE) is designed to accelerate the
throughput of hash data digest, and symmetric-key encryption.
Signed-off-by: Joel Stanley
Signed-off-by: Chia-Wei Wang
---
drivers/crypto/Kconfig | 2 +
drivers/crypto/Makefile | 1 +
d
The AST2600 SRAM has been extended to 88KB since A1
chip revision. This patch updates the SRAM size to
offer more space for early stack/heap use.
Signed-off-by: Chia-Wei Wang
---
arch/arm/include/asm/arch-aspeed/platform.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/
From: Joel Stanley
Add YCLK enable for HACE, the HW hash engine of
ASPEED AST2600 SoCs.
Signed-off-by: Joel Stanley
Signed-off-by: Chia-Wei Wang
---
.../arm/include/asm/arch-aspeed/scu_ast2600.h | 5 +++--
drivers/clk/aspeed/clk_ast2600.c | 20 +++
2 files change
From: Joel Stanley
Add HACE DTS node and enable it for AST2600 EVB.
Signed-off-by: Joel Stanley
Signed-off-by: Chia-Wei Wang
---
arch/arm/dts/ast2600-evb.dts | 5 +
arch/arm/dts/ast2600.dtsi| 9 +
2 files changed, 14 insertions(+)
diff --git a/arch/arm/dts/ast2600-evb.dts b/a
This patch series intends to provide a secure boot chain from SPL to Linux
kernel
based on the hash and signature verification of FIT image paradigm.
To improve the performance and save code size (SPL is limited to 64KB due to
HW-RoT),
the drviers of two HW crypto engine HACE and ARCY are also a
On Wed, Jul 14, 2021 at 2:56 PM Leo Liang wrote:
>
> Hi Zong,
>
> On Fri, Jul 09, 2021 at 04:06:01PM +0800, Zong Li wrote:
> > This patch reverts the following commits:
> > - 4b4159d0f3 ("riscv: dts: add dts for unmatched rev1")
> > - ffe9a394df ("board: sifive: support spl multi-dtb on unmatche
This patch reverts the following commits:
- 4b4159d0f3 ("riscv: dts: add dts for unmatched rev1")
- ffe9a394df ("board: sifive: support spl multi-dtb on unmatched board")
We won't plan to support unmatched that the revision below 3 in u-boot,
so they can be dropped because they might be useless.
After the commit c70f44817d46 ("efi_loader: simplify 'printenv -e'"),
"-all" option is no longer necessary.
Just remove them in the test script.
Fixes: c70f44817d46 ("efi_loader: simplify 'printenv -e'")
Signed-off-by: AKASHI Takahiro
---
v2:
no change
---
test/py/tests/test_efi_capsule/test_
In the commit c982874e930d ("efi_loader: refactor
efi_setup_loaded_image()"), setjmp-related definitions were moved to
efi_loaded_image_obj in efi_loader.h. So setjmp.h is no longer
refererenced in efi_api.h.
This also fixes some error when efi_api.h will be included in
mkeficapsule.c.
Fixes: c98
efi_guid_capsule_root_cert_guid is never used.
Just remove it.
Signed-off-by: AKASHI Takahiro
---
v2:
correct the commit message
---
lib/efi_loader/efi_capsule.c | 3 ---
1 file changed, 3 deletions(-)
diff --git a/lib/efi_loader/efi_capsule.c b/lib/efi_loader/efi_capsule.c
index f9b0ef591cc
If capsule authentication is disabled and yet a capsule file is signed,
its signature must be removed from image data to flush.
Otherwise, the firmware will be corrupted after update.
Fixes: 04be98bd6bcf ("efi: capsule: Add support for uefi capsule
authentication")
Signed-off-by: AKASHI Ta
Please ignore this patch as I mistakenly sent out v1.
-Takahiro Akashi
On Tue, Jul 20, 2021 at 02:44:42PM +0900, AKASHI Takahiro wrote:
> If capsule authentication is disabled and yet a capsule file is signed,
> its signature must be removed from image data to flush.
> Otherwise, the firmware wil
If capsule authentication is disabled and yet a capsule file is signed,
its signature must be removed from image data to flush.
Otherwise, the firmware will be corrupted after update.
Fixes: 04be98bd6bcf ("efi: capsule: Add support for uefi capsule
authentication")
Signed-off-by: AKASHI Ta
On 7/20/21 2:23 PM, Lokesh Vutla wrote:
>
>
> On 20/07/21 10:51 am, Jaehoon Chung wrote:
>> Hi Lokesh,
>>
>> On 7/20/21 1:10 PM, Lokesh Vutla wrote:
>>> +Tom
>>>
>>> On 20/07/21 3:45 am, Jaehoon Chung wrote:
Hi Aswath,
On 7/19/21 3:48 PM, Aswath Govindraju wrote:
> Hi Peng,
>>>
On 20/07/21 10:51 am, Jaehoon Chung wrote:
> Hi Lokesh,
>
> On 7/20/21 1:10 PM, Lokesh Vutla wrote:
>> +Tom
>>
>> On 20/07/21 3:45 am, Jaehoon Chung wrote:
>>> Hi Aswath,
>>>
>>> On 7/19/21 3:48 PM, Aswath Govindraju wrote:
Hi Peng,
On 09/06/21 8:56 pm, Aswath Govindraju wrote:
>
Hi Lokesh,
On 7/20/21 1:10 PM, Lokesh Vutla wrote:
> +Tom
>
> On 20/07/21 3:45 am, Jaehoon Chung wrote:
>> Hi Aswath,
>>
>> On 7/19/21 3:48 PM, Aswath Govindraju wrote:
>>> Hi Peng,
>>>
>>> On 09/06/21 8:56 pm, Aswath Govindraju wrote:
Hi Peng,
On 10/05/21 7:18 pm, Aswath Govindraj
On 7/20/21 12:59 AM, Heinrich Schuchardt wrote:
Am 20. Juli 2021 03:11:34 MESZ schrieb Sean Anderson :
On 7/19/21 4:28 PM, Heinrich Schuchardt wrote:
Let the sbi command display:
* SBI implementation version
* machine vendor ID
* machine architecture ID
* machine implementation ID
With this p
The architecture is arm (i.MX 6UL board) and I've successfully added HAB.
I want to include OpenSSL library into the U-Boot now. Can you comment on this?
Kind regards,
Daniel Selvan D.
--
P Please consider the environment before printing this email.
From: "Jojan"
To: "u-boot" ,
Am 20. Juli 2021 03:11:34 MESZ schrieb Sean Anderson :
>On 7/19/21 4:28 PM, Heinrich Schuchardt wrote:
>> Let the sbi command display:
>>
>> * SBI implementation version
>> * machine vendor ID
>> * machine architecture ID
>> * machine implementation ID
>>
>> With this patch the output for the HiF
+Tom
On 20/07/21 3:45 am, Jaehoon Chung wrote:
> Hi Aswath,
>
> On 7/19/21 3:48 PM, Aswath Govindraju wrote:
>> Hi Peng,
>>
>> On 09/06/21 8:56 pm, Aswath Govindraju wrote:
>>> Hi Peng,
>>>
>>> On 10/05/21 7:18 pm, Aswath Govindraju wrote:
Hi Peng,
On 07/04/21 3:52 am, Jaehoon Chun
Hello Tim,
On 20.07.21 00:23, Tim Harvey wrote:
> On Sun, Jul 18, 2021 at 9:01 PM Heiko Schocher wrote:
>>
>> Hello Tim,
>>
>> On 12.07.21 18:06, Tim Harvey wrote:
>>> On Sat, Jul 10, 2021 at 5:24 AM Heiko Schocher wrote:
Hi Tim, Stefano,
On 10.07.21 11:14, Stefano Babic wrot
From: "Ying-Chun Liu (PaulLiu)"
Add initial support for Advantech RSB-3720 board.
The initial support includes:
- MMC
- eMMC
- I2C
- FEC
- Serial console
Signed-off-by: Darren Huang
Signed-off-by: Kevin12.Chen
Signed-off-by: Phill.Liu
Signed-off-by: Tim Liang
Signed-off-by: wei.zeng
Si
On Thu, May 20, 2021 at 05:14:36AM +0200, Heinrich Schuchardt wrote:
> On 5/10/21 10:21 AM, AKASHI Takahiro wrote:
>
> In the subject: %s/aligned/align/
I think that the passive usage is grammatically correct here,
but I can fix it if you like.
> > After the commit c70f44817d46 ("efi_loader: sim
On Thu, May 20, 2021 at 04:48:23AM +0200, Heinrich Schuchardt wrote:
> On 5/10/21 10:21 AM, AKASHI Takahiro wrote:
> > In the commit c982874e930d ("efi_loader: refactor
> > efi_setup_loaded_image()"), setjmp-related definitions were moved to
> > efi_loaded_image_obj in efi_loader.h. So setjmp.h is
On Thu, May 20, 2021 at 04:37:58AM +0200, Heinrich Schuchardt wrote:
> On 5/10/21 10:20 AM, AKASHI Takahiro wrote:
> > If capsule authentication is disabled and yet a capsule file is signed,
> > its signature must be removed from image data to flush.
> > Otherwise, the firmware will be corrupted af
On Thu, May 20, 2021 at 04:06:12AM +0200, Heinrich Schuchardt wrote:
> On 5/10/21 10:19 AM, AKASHI Takahiro wrote:
> > It will probably be a common error case that a certificate (public key)
> > is not provided by the system while capsule authentication is enabled.
> > So add a debug message.
> >
On Tue, May 18, 2021 at 10:32:28PM +0200, Heinrich Schuchardt wrote:
> On 5/10/21 10:20 AM, AKASHI Takahiro wrote:
> > EFI_FIRMWARE_MANAGEMENT_CAPSULE_ID_GUID is never used.
> > Just remove it.
> >
> > Signed-off-by: AKASHI Takahiro
> > ---
> > lib/efi_loader/efi_capsule.c | 3 ---
> > 1 file
On 7/19/21 4:28 PM, Heinrich Schuchardt wrote:
Let the sbi command display:
* SBI implementation version
* machine vendor ID
* machine architecture ID
* machine implementation ID
With this patch the output for the HiFive Unmatched looks like
=> sbi
SBI 0.3
OpenSBI 0.9
Machi
On 7/19/21 4:28 PM, Heinrich Schuchardt wrote:
Provide library functions to read:
* SBI implementation version
* machine vendor ID
* machine architecture ID
* machine implementation ID
Signed-off-by: Heinrich Schuchardt
---
arch/riscv/include/asm/sbi.h | 4 ++
arch/riscv/lib/sbi.c
Hi Daniel,
Am Montag, den 19.07.2021, 18:34 +0100 schrieb Daniel Golle:
> Hi,
>
> I writing in the hope that someone has a good idea about why U-boot
> is
> handing over a broken memory address for a loaded ramdisk which
> results
> in Linux crashing very early on boot on MediaTek's MT7623N SoC
>
Hi again,
On Mon, Jul 19, 2021 at 06:34:38PM +0100, Daniel Golle wrote:
> ...
>Loading Ramdisk to ff4b9000, end ff9fab18 ... OK
>^^
>Using Device Tree in place at 889f9288, end 88a04534
>
> Starting kernel ...
> ...
> [0.00] Zone ranges:
On Sat, Jul 17, 2021 at 7:22 PM Simon Glass wrote:
>
> Hi Tim,
>
> On Fri, 16 Jul 2021 at 17:15, Tim Harvey wrote:
> >
> > On Fri, Jul 16, 2021 at 3:11 PM Simon Glass wrote:
> > >
> > > () which has
> > > Hi Tim,
> > >
> > > On Fri, 16 Jul 2021 at 15:43, Tim Harvey wrote:
> > > >
> > > > On Thu
On Sun, Jul 18, 2021 at 9:01 PM Heiko Schocher wrote:
>
> Hello Tim,
>
> On 12.07.21 18:06, Tim Harvey wrote:
> > On Sat, Jul 10, 2021 at 5:24 AM Heiko Schocher wrote:
> >>
> >> Hi Tim, Stefano,
> >>
> >> On 10.07.21 11:14, Stefano Babic wrote:
> >>> Hi Tim,
> >>>
> >>> On 10.07.21 02:05, Tim Har
Hi Aswath,
On 7/19/21 3:48 PM, Aswath Govindraju wrote:
> Hi Peng,
>
> On 09/06/21 8:56 pm, Aswath Govindraju wrote:
>> Hi Peng,
>>
>> On 10/05/21 7:18 pm, Aswath Govindraju wrote:
>>> Hi Peng,
>>>
>>> On 07/04/21 3:52 am, Jaehoon Chung wrote:
On 4/5/21 11:44 PM, Aswath Govindraju wrote:
>>>
On Mon, Jul 19, 2021 at 11:52:09PM +0200, Heinrich Schuchardt wrote:
>
>
> On 19.07.21 23:38, Heinrich Schuchardt wrote:
> > Booting Ubuntu Impish showed the following output:
> >
> > relocaddr = 0xfff6
> >
> > Loading Ramdisk to fa118000, end f19d ...
> >
> > The i
On 19.07.21 23:38, Heinrich Schuchardt wrote:
Booting Ubuntu Impish showed the following output:
relocaddr = 0xfff6
Loading Ramdisk to fa118000, end f19d ...
The initrd is overwriting the U-Boot binary. Booting fails.
There is no need to copy the initrd from $ra
Booting Ubuntu Impish showed the following output:
relocaddr = 0xfff6
Loading Ramdisk to fa118000, end f19d ...
The initrd is overwriting the U-Boot binary. Booting fails.
There is no need to copy the initrd from $ramdisk_addr_r.
Set init_high = ~0UL to use zero copy.
On Mon, Jul 19, 2021 at 9:15 PM Fabio Estevam wrote:
>
> Do not pass the console baudrate to the 'console' variable
> to avoid the baudrate being passed twice when extlinux.conf
> contains the standard: console=${console},${baudrate} format.
Maybe we could deal with this using the stdout-path met
On Mon, Jul 19, 2021 at 02:37:11PM +0200, Stefan Roese wrote:
> Hi Tom,
>
> please pull the next batch of Marvell MVEBU related patches. Here the
> summary log:
>
Applied to u-boot/master, thanks!
--
Tom
signature.asc
Description: PGP signature
On Mon, Jul 19, 2021 at 11:05:27AM +0530, Lokesh Vutla wrote:
> Hi Tom,
> Please find the PR for master branch targeted for v2021.10-rc1 tag.
> Details about the PR are updated in the tag message.
>
> Gitlab CI report:
> https://source.denx.de/u-boot/custodians/u-boot-ti/-/pipelines/8254
>
On Mon, Jul 19, 2021 at 9:15 PM Fabio Estevam wrote:
>
> After the conversion to DM_MMC, the rootfs becomes mmc 1, so
> adjust it accordingly.
Should this be fixed with an alias in the dts, what's now on mmc 0?
> Signed-off-by: Fabio Estevam
> ---
> include/configs/mx6cuboxi.h | 2 +-
> 1 file
The series provides library functions to read
* SBI implementation version
* machine vendor ID
* machine architecture ID
* machine implementation ID
and enhances the sbi command to display this information.
Heinrich Schuchardt (2):
riscv: provide missing base extension functions
cmd/sbi: add
Provide library functions to read:
* SBI implementation version
* machine vendor ID
* machine architecture ID
* machine implementation ID
Signed-off-by: Heinrich Schuchardt
---
arch/riscv/include/asm/sbi.h | 4 ++
arch/riscv/lib/sbi.c | 71
2 files
Let the sbi command display:
* SBI implementation version
* machine vendor ID
* machine architecture ID
* machine implementation ID
With this patch the output for the HiFive Unmatched looks like
=> sbi
SBI 0.3
OpenSBI 0.9
Machine:
Vendor ID 489
Architecture ID 800
*sig_size isn't set until later so use the correct variables.
Signed-off-by: Donald Chan
---
lib/rsa/rsa-sign.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/lib/rsa/rsa-sign.c b/lib/rsa/rsa-sign.c
index f70f352311..5b85d61a13 100644
--- a/lib/rsa/rsa-sign.c
+++ b/lib/rsa/
Do not pass the console baudrate to the 'console' variable
to avoid the baudrate being passed twice when extlinux.conf
contains the standard: console=${console},${baudrate} format.
cat /proc/cmdline
root=PARTUUID=-01 rootwait rw console=ttymxc0,115200,115200
Signed-off-by: Fabio Estevam
After the conversion to DM_MMC, the rootfs becomes mmc 1, so
adjust it accordingly.
Signed-off-by: Fabio Estevam
---
include/configs/mx6cuboxi.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/include/configs/mx6cuboxi.h b/include/configs/mx6cuboxi.h
index 55717c77ab38..1a06f
Hi,
I writing in the hope that someone has a good idea about why U-boot is
handing over a broken memory address for a loaded ramdisk which results
in Linux crashing very early on boot on MediaTek's MT7623N SoC (ARMv7).
If anyone has a good idea why this is happening, I'd be very glad, as
this curr
From: "Ying-Chun Liu (PaulLiu)"
Add board dts for imx8mm-cl-iot-gate
Signed-off-by: Darren Huang
Signed-off-by: Kevin12.Chen
Signed-off-by: Phill.Liu
Signed-off-by: Tim Liang
Signed-off-by: wei.zeng
Signed-off-by: Ying-Chun Liu (PaulLiu)
Cc: uboot-imx
---
v2: update dts
---
arch/arm/dts/
From: "Ying-Chun Liu (PaulLiu)"
Add initial support for Advantech RSB-3720 board.
The initial support includes:
- MMC
- eMMC
- I2C
- FEC
- Serial console
Ying-Chun Liu (PaulLiu) (2):
arm: dts: add imx8mp-rsb3720-a1 dts file
arm: imx8m: add support for Advantech RSB-3720
v2: update dts
Hi,
I would also like to add OpenSSL library into U-Boot. Can you help me on this?
Kind regards,
Daniel Selvan D.
--
P Please consider the environment before printing this email.
pl01x_putc() might return -EAGAIN if there was no space in FIFO. In that
case, high-level caller should wait until there is space and resend the
character.
Signed-off-by: Chen Baozi
Reviewed-by: Stefan Roese
---
drivers/serial/serial_pl01x.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(
From: Peng Fan
Add i.MX8ULP dtsi
Signed-off-by: Peng Fan
---
arch/arm/dts/imx8ulp-pinfunc.h| 978 ++
arch/arm/dts/imx8ulp.dtsi | 728
include/dt-bindings/clock/imx8ulp-clock.h | 247 ++
3 files changed, 1953 insertions(+)
cr
Hi,
I would like to compile U-Boot with OpenSSL library and I'm using OpenSSL
functions in Freescale's " hab.c ". I do not know how to add the ssl & crypto
libraries to U-Boot's makefile (as there are many). I'm quite new to these kind
of work, hence I request someone to provide some detailed
Jian-Hong Pan 於 2021年7月7日 週三 下午12:23寫道:
>
> Hi,
>
> I tried to boot Linux next kernel at tag 5.13.0-next-20210701 from
> latest U-Boot at commit 1311dd37ec ("Merge branch
> '2021-07-01-update-CI-containers'") on Raspberry Pi 400.
> * U-Boot goes with the bcm2711-rpi-400.dtb from Raspberry Pi OS
>
Signed-off-by: Thomas Perrot
---
lib/rsa/rsa-verify.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/lib/rsa/rsa-verify.c b/lib/rsa/rsa-verify.c
index bb8cc61d94b5..3840764e420e 100644
--- a/lib/rsa/rsa-verify.c
+++ b/lib/rsa/rsa-verify.c
@@ -556,7 +556,7 @@ int rsa_verify(st
Hi Marek,
On 19.07.21 14:50, Marek Behún wrote:
Hi Stefan,
just noticed that this patch and patch 37 need rebase (some lines are
at different offset in tools/Makefile).
The fix is pretty simple, but I can send v3, if you want.
No need, thanks. I'll try to resolve the merge conflict myself, o
Hi Stefan,
just noticed that this patch and patch 37 need rebase (some lines are
at different offset in tools/Makefile).
The fix is pretty simple, but I can send v3, if you want.
Marek
Hi Tom,
please pull the next batch of Marvell MVEBU related patches. Here the
summary log:
- Marvell SheevaPlug: Convert Ethernet and SATA to Driver Model (Tony)
- Zyxel NSA310S NAS: Convert to Driver Model (Tony)
- Turris_omnia: A
On 14.07.21 06:35, Tony Dinh wrote:
- Add DM_ETH, SATA_MV and associated configs to sheevaplug_defconfig
- Remove IDE, and add SATA configs in board file sheevaplug.h
- Replace old device name "egiga0" with Ethernet PHY name from device
tree.
- Replace the old Ethernet PHY addr lookup with a dev
On 01.07.21 06:26, Tony Dinh wrote:
- Add device tree kirkwood-nsa310s.dts
- Add DM_USB, DM_ETH, DM_SATA and associated configs to nsa310s_defconfig
- Move some miscellaneous configs from board file to nsa310s_defconfig
- Replace old device name "egiga0" with Ethernet PHY name
from device tree k
On Sun, Jul 18, 2021 at 09:07:54PM -0400, Tom Rini wrote:
> As we have now completed the DM_VIDEO and DM_SPI_FLASH migrations we can
> remove the checks.
>
> Signed-off-by: Tom Rini
Applied to u-boot/master, thanks!
--
Tom
signature.asc
Description: PGP signature
On Mon, Jul 12, 2021 at 12:42:14PM -0400, Tom Rini wrote:
> This board has not been converted to CONFIG_DM_MMC by the deadline.
> Remove it. As this is also the last in family remove the related
> support as well.
>
> Cc: Angelo Durgehello
> Cc: TsiChung Liew
> Signed-off-by: Tom Rini
Applie
On Mon, Jul 12, 2021 at 12:42:13PM -0400, Tom Rini wrote:
> This board has not been converted to CONFIG_DM_MMC by the deadline.
> Remove it. As this is also the last in family remove the related
> support as well.
>
> Cc: Angelo Durgehello
> Signed-off-by: Tom Rini
Applied to u-boot/master, t
On Mon, Jul 12, 2021 at 12:42:12PM -0400, Tom Rini wrote:
> This board has not been converted to CONFIG_DM_MMC by the deadline.
> Remove it.
>
> Cc: Angelo Durgehello
> Signed-off-by: Tom Rini
Applied to u-boot/master, thanks!
--
Tom
signature.asc
Description: PGP signature
On Mon, Jul 12, 2021 at 12:42:11PM -0400, Tom Rini wrote:
> This board has not been converted to CONFIG_DM_MMC by the deadline.
> Remove it.
>
> Cc: Angelo Durgehello
> Cc: TsiChung Liew
> Signed-off-by: Tom Rini
Applied to u-boot/master, thanks!
--
Tom
signature.asc
Description: PGP sign
On Mon, Jul 12, 2021 at 12:42:10PM -0400, Tom Rini wrote:
> As this platform already enables CONFIG_DM and CONFIG_OF_CONTROL,
> migrating to DM_USB and DM_SPI_FLASH is just a matter of enabling the
> correct options.
>
> Cc: Gregory CLEMENT
> u-boot@lists.denx.de (open list)
> Reported-by: Marek
On Fri, Jul 09, 2021 at 10:11:55AM -0400, Tom Rini wrote:
> As the logic here is only used when we have a USB host controller, test
> on CONFIG_USB_HOST rather than CONFIG_USB in general. This lets us move
> towards using CONFIG_USB only as a menu symbol to say that we have some
> form of USB, an
On Fri, Jul 09, 2021 at 10:11:56AM -0400, Tom Rini wrote:
> As the deadline for migration to DM_USB, when using a USB host
> controller has now gone two years past the deadline, enforce migration.
> This is done by:
>
> - Ensuring that all host controller options (other than the very legacy
> o
On Fri, Jul 09, 2021 at 10:11:54AM -0400, Tom Rini wrote:
> Reuse the common logic to allow for BOOT_TARGET_DEVICES to list USB as a
> possibility if we're building for a platform that will have USB but not
> if we don't, so that we don't hit the link-time check for trying to have
> USB boot on a
On Fri, Jul 09, 2021 at 10:11:53AM -0400, Tom Rini wrote:
> These USB defines do not change the build as there is no USB support
> enabled currently.
>
> Cc: Ian Ray
> Cc: Sebastian Reichel
> Signed-off-by: Tom Rini
> Reviewed-by: Sebastian Reichel
Applied to u-boot/master, thanks!
--
Tom
On Fri, May 14, 2021 at 09:34:32PM -0400, Tom Rini wrote:
> As the migration deadline has passed, require that DM_PCI be used.
>
> Signed-off-by: Tom Rini
Applied to u-boot/master, thanks!
--
Tom
signature.asc
Description: PGP signature
From: Frieder Schrempf
The Kontron SoM-Line i.MX8MM (N801x) by Kontron Electronics GmbH is a SoM
module with an i.MX8M-Mini SoC, 1/2/4 GB LPDDR4 RAM, SPI NOR, eMMC and PMIC.
The matching evaluation boards (Board-Line) have 2 Ethernets, USB 2.0,
HDMI/LVDS,
SD card, CAN, RS485 and much more.
Sig
From: Frieder Schrempf
This adds support for i.MX6UL/ULL-based evaluation kits with SoMs by
Kontron Electronics GmbH.
Currently there are the following SoM flavors (SoM-Line):
* N6310: SOM with i.MX6UL-2, 256MB RAM, 256MB SPI NAND
* N6311: SOM with i.MX6UL-2, 512MB RAM, 512MB SPI NAND
* N6
From: Pali Rohár
The kwbimage library does not support extracting subimages. Implement it.
Signed-off-by: Pali Rohár
Reviewed-by: Marek Behún
---
tools/kwbimage.c | 72 ++--
1 file changed, 64 insertions(+), 8 deletions(-)
diff --git a/tools/kwbima
From: Pali Rohár
Extracting is now supported by dumpimage, so mention it in help instead
of `kwbimage -x`.
Signed-off-by: Pali Rohár
Reviewed-by: Marek Behún
---
tools/kwbimage.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/kwbimage.c b/tools/kwbimage.c
index 5665
From: Pali Rohár
Now it is possible to use BootROM to load and boot main U-Boot binary. It
is just required to disable config option CONFIG_SPL_SPI_FLASH_SUPPORT.
gdsys a38x config file (controlcenterdc_defconfig) does not have that
option enabled so there is no need to provide custom spl_board_
From: Pali Rohár
Macro CONFIG_SYS_U_BOOT_OFFS is set but not used anymore. Remove it.
Signed-off-by: Pali Rohár
Reviewed-by: Marek Behún
Reviewed-by: Chris Packham
---
include/configs/clearfog.h| 6 +-
include/configs/controlcenterdc.h | 6 --
include/configs/db-88f6720.h
From: Pali Rohár
This padding depends on board config file and therefore it makes the
mkimage binary tool board specific, which is not correct. One cannot use
mkimage tool built as a result for board A to generate images for board
B, even if both A and B are on the same platform.
This CONFIG_SYS
From: Pali Rohár
The SPL code now already parses kwbimage v1 headers where all necessary
information about how to load and execute main U-Boot is present. The
legacy 64-byte U-Boot header is not used anymore.
Remove this 64-byte header by putting u-boot.bin binary (instead of
u-boot.img) into kw
From: Pali Rohár
Now that proper load and execution addresses are set in v1 kwbimage we
can use it for loading and booting main U-Boot binary.
Use the new spl_parse_board_header() function to implement parsing the
kwbimage v1 header. Use information from this header to locate offset and
size of
From: Pali Rohár
Some image types (e.g. kwbimage v1) store the offset to SPL binary and
offset to main U-Boot binary in their headers. To avoid reading SPL
binary when loading main U-Boot, add support for specifying offset in
struct spl_image_info, which defines the offset from the beginning of
t
From: Pali Rohár
Platform specific BootROM may use its own image type for loading SPL or
main U-Boot binary. In some cases it makes sense to not use BootROM
supplied code for booting main U-Boot binary but rather to use U-Boot SPL
to load main U-Boot binary, e.g. when U-Boot SPL can load main U-B
From: Pali Rohár
Current code uses hack in board_init_f() which calls return_to_bootrom()
to skip U-Boot SPL code and return back to BootROM to load U-Boot via
UART or from NAND.
This change migrates that hack from the board_init_f() function and
changes it to return BOOT_DEVICE_BOOTROM instead
From: Pali Rohár
U-Boot's SPL framework already has an API for loading U-Boot via
BootROM.
Implement the function board_return_to_bootrom() for mvebu SPL code.
Signed-off-by: Pali Rohár
Reviewed-by: Marek Behún
Reviewed-by: Stefan Roese
Reviewed-by: Chris Packham
Tested-by: Chris Packham
-
From: Pali Rohár
This function does not return, so add the appropriate compiler flag.
Signed-off-by: Pali Rohár
Reviewed-by: Marek Behún
Reviewed-by: Stefan Roese
Reviewed-by: Chris Packham
Tested-by: Chris Packham
---
arch/arm/mach-mvebu/include/mach/cpu.h | 2 +-
1 file changed, 1 insert
From: Pali Rohár
Register r0 should be set to return value 0x0 - NO_ERR.
Set r0 with return value after all registers are restored from the
stack, so that the return value is always correct.
Signed-off-by: Pali Rohár
Fixes: 944c7a317675 ("arm: mvebu: Add option to use UART xmodem protocol via
From: Pali Rohár
Function image_version() returns unsigned value, so it can never be
negative. Explicitly check for two supported image versions: v0 and v1.
Signed-off-by: Pali Rohár
Reviewed-by: Marek Behún
---
tools/kwboot.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git
1 - 100 of 193 matches
Mail list logo