644 board/efi/efi-arm_app/board.c
> create mode 100644 board/efi/efi-arm_app/config.mk
> create mode 100644 board/efi/efi-arm_app/efi-arm_app.env
> create mode 100644 configs/efi-arm_app64_defconfig
> create mode 100644 drivers/video/vesa_helper.c
> rename {arch/x86/cpu => lib}/efi/sdram.c (94%)
>
> --
> 2.43.0
>
It looks like some patches, such as "efi: x86: Move EFI SDRAM-handling
into a common file,"
depend on another patch series from Matthew Garrett [1], which has
already been merged into "ci/master.".
Could you please provide a link to that branch (assuming it's [1])? I
wasn't able to
find it in the custodian trees.
[1] https://www.mail-archive.com/u-boot@lists.denx.de/msg528541.html
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
As Mattijs Korpershoek is in fact doing overall
maintenance of AVB/AB code, move myself to reviewers.
CC: Mattijs Korpershoek
Signed-off-by: Igor Opaniuk
---
MAINTAINERS | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/MAINTAINERS b/MAINTAINERS
index ba31f86feb
mer_cancel_sysctr_alarm() RPC call */
>
> +/* siemens specific API extension from Siemens */
please drop one "siemens"
> +#define TIMER_FUNC_CTRL_PMIC_WDOG 20U /*!< Index for
> sc_timer_ctrl_pmic_wdog() RPC call */
> +
> #endif /* SC_RPC_H */
> diff --git a/include/f
> int flags = HASH_FLAG_ENV;
>
> - if (argc < (HARGS - 1))
> + if (argc < 4)
> return CMD_RET_USAGE;
>
> #if IS_ENABLED(CONFIG_HASH_VERIFY)
> --
> 2.45.2
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
SLOT_NAME(slot);
> + slot_suffix[0] = '_';
> + slot_suffix[1] = BOOT_SLOT_NAME(slot);
> if (memcmp(abc->slot_suffix, slot_suffix,
> sizeof(slot_suffix))) {
> memcpy(abc-
if (android_image_get_dtb_by_index((ulong)hdr, 0,
> + if (android_image_get_dtb_by_index((ulong)hdr,
> get_avendor_bootimg_addr(),
>dtb_idx, &fdt_addr,
> &fdt_size)) {
> fdt_blob = (char *)map_sysmem(fdt_addr, 0);
>
data = ops_data;
>
> ops_data->ops.read_from_partition = read_from_partition;
> +#ifdef CONFIG_ANDROID_BOOT_IMAGE
Please use CONFIG_IS_ENABLED() macro
> + ops_data->ops.get_preloaded_partition = get_preloaded_partition;
> +#endif
> ops_data->ops.write_to_partition = write_to_partition;
> ops_data->ops.validate_vbmeta_public_key = validate_vbmeta_public_key;
> ops_data->ops.read_rollback_index = read_rollback_index;
> --
> 2.40.1
>
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
ge.h b/include/image.h
> index c5b288f62b..7d8ff40c3f 100644
> --- a/include/image.h
> +++ b/include/image.h
> @@ -1826,6 +1826,18 @@ struct andr_image_data;
> bool android_image_get_data(const void *boot_hdr, const void
> *vendor_boot_hdr,
> struct andr_image_data *data);
>
> +/**
> + * android_image_get_valuable_size() - get the size of the android image
> + *
> + * This function checks if the image is Android boot image and returns the
> + * valuable size of the image.
> + *
> + * @hdr_addr: Boot image header address (boot or vendor_boot)
> + *
> + * @return size of the image on success, 0 on failure
> + */
> +size_t android_image_get_valuable_size(const void *hdr_addr);
> +
> struct andr_boot_img_hdr_v0;
>
> /**
> --
> 2.40.1
>
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
img_data.ramdisk_ptr, DIV_ROUND_UP(img_data.ramdisk_size,
> 1024));
> + img_data.ramdisk_addr, DIV_ROUND_UP(img_data.ramdisk_size,
> 1024));
>
> - *rd_data = img_data.ramdisk_ptr;
> + *rd_data = img_data.ramdisk_addr;
>
> *rd_len = img_data.ramdisk_size;
> return 0;
> --
> 2.40.1
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
oid_bootmeth_ids[] = {
> + { .compatible = "u-boot,android" },
> + { }
> +};
> +
> +U_BOOT_DRIVER(bootmeth_android) = {
> + .name = "bootmeth_android",
> + .id = UCLASS_BOOTMETH,
> + .of_match = android_bootmeth_ids,
> + .ops= &android_bootmeth_ops,
> + .bind = android_bootmeth_bind,
> +};
> diff --git a/boot/bootmeth_android.h b/boot/bootmeth_android.h
> new file mode 100644
> index ..411c2f2d15e7
> --- /dev/null
> +++ b/boot/bootmeth_android.h
> @@ -0,0 +1,27 @@
> +/* SPDX-License-Identifier: GPL-2.0+ */
> +/*
> + * Bootmethod for Android
> + *
> + * Copyright (C) 2024 BayLibre, SAS
> + * Written by Mattijs Korpershoek
> + */
> +
> +enum android_boot_mode {
> + ANDROID_BOOT_MODE_NORMAL = 0,
> +
> + /* Android "recovery" is a special boot mode that uses another
> ramdisk.
> +* It can be used to "factory reset" a board or to flash logical
> partitions
> +* It operates in 2 modes: adb or fastbootd
> +* To enter recovery from Android, we can do:
> +* $ adb reboot recovery
> +* $ adb reboot fastboot
> +*/
> + ANDROID_BOOT_MODE_RECOVERY,
> +
> + /* Android "bootloader" is for accessing/reflashing physical
> partitions
> +* Typically, this will launch a fastboot process in U-Boot.
> +* To enter "bootloader" from Android, we can do:
> +* $ adb reboot bootloader
> +*/
> + ANDROID_BOOT_MODE_BOOTLOADER,
> +};
> diff --git a/doc/develop/bootstd.rst b/doc/develop/bootstd.rst
> index a07a72581e7a..709fa9e64ff3 100644
> --- a/doc/develop/bootstd.rst
> +++ b/doc/develop/bootstd.rst
> @@ -95,6 +95,7 @@ bootflows.
>
> Note: it is possible to have a bootmeth that uses a partition or a whole
> device
> directly, but it is more common to use a filesystem.
> +For example, the Android bootmeth uses a whole device.
>
> Note that some bootmeths are 'global', meaning that they select the bootdev
> themselves. Examples include VBE and EFI boot manager. In this case, they
> @@ -277,6 +278,9 @@ script_offset_f
> script_size_f
> Size of the script to load, e.g. 0x2000
>
> +vendor_boot_comp_addr_r
> +Address to which to load the vendor_boot Android image, e.g. 0xe000
> +
> Some variables are set by script bootmeth:
>
> devtype
> @@ -418,6 +422,7 @@ Bootmeth drivers are provided for:
> - EFI boot using bootefi from disk
> - VBE
> - EFI boot using boot manager
> + - Android bootflow (boot image v4)
>
>
> Command interface
> @@ -786,6 +791,7 @@ To do
> Some things that need to be done to completely replace the distro-boot
> scripts:
>
> - implement extensions (devicetree overlays with add-on boards)
> +- implement legacy (boot image v2) android boot flow
>
> Other ideas:
>
>
> --
> 2.45.0
>
Some comments after a quick "scan". Will take a more detailed look a
bit later today/tomorrow.
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
Android vendor boot image address
> + *
> + * Return: no returned results
> + */
> +void set_avendor_bootimg_addr(ulong addr);
> +
> /**
> * board_fit_config_name_match() - Check for a matching board name
> *
>
> --
> 2.45.0
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
is used (e.g. ethernet)
> + */
> +int bootflow_iter_check_mmc(const struct bootflow_iter *iter);
> +
> /**
> * bootflow_iter_check_sf() - Check that a bootflow uses SPI FLASH
> *
>
> --
> 2.45.0
>
Reviewed-by: Igor Opaniuk
A bit offtopic (just an idea for futu
oid_image_get_data() declaration, and just use
andr_boot_img_hdr_v0 *boot_hdr as first param instead (like it's done
for example in
android_boot_image_v0_v1_v2_parse_hdr()) and then rely on implicit
cast when this
function is used.
this is of course all a matter of preference, just thinking out loud
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
> fdt_blob = (char *)map_sysmem(fdt_addr, 0);
> if (fdt_check_header(fdt_blob))
>
> --
> 2.45.0
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
such as prbing or removing a device. Subsystems can
> + operations, such as probing or removing a device. Subsystems can
> register a 'spy' function that is called when the event occurs. Such
> subsystems must select this option.
>
> --
> 2
ved immediately afterward, but too late to be
> handled by the suspend main loop. In case either of the IWDG is
> enabled, ping it first and then return to the OS.
>
> Signed-off-by: Marek Vasut
> ---
> Cc: Igor Opaniuk
> Cc: Patrice Chotard
> Cc: Patrick Delaunay
> Cc: Si
--- a/boot/image.c
> +++ b/boot/image.c
> @@ -26,8 +26,6 @@
> #endif
>
> #include
> -#include
> -#include
> #include
> #include
>
> --
> 2.25.1
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
/kp_imx6q_tpc.h:84:#include
./include/configs/imx8mp_venice.h:21:#include
./include/configs/stm32f746-disco.h:30:#include
...
Hope this helps.
[1] https://developer.toradex.com/linux-bsp/os-development/boot/distro-boot/
--
Best regards - Atentamente - Meilleures salutations
Igor Opa
On Tue, Apr 30, 2024 at 7:44 PM Tom Rini wrote:
>
> Remove from this board vendor directory and when needed
> add missing include files directly.
>
> Signed-off-by: Tom Rini
> ---
> Cc: Peter Griffin
> Cc: Manivannan Sadhasivam
> Cc: Jorge Ramirez-Ortiz
> Cc:
Add additional check for buffer size when reading out persistent
storage value and provide back actual value size.
Signed-off-by: Igor Opaniuk
---
drivers/tee/sandbox.c | 10 +++---
1 file changed, 7 insertions(+), 3 deletions(-)
diff --git a/drivers/tee/sandbox.c b/drivers/tee/sandbox.c
USE_DT=y
> +CONFIG_BUTTON=y
> +CONFIG_BUTTON_GPIO=y
> CONFIG_CLK_SCMI=y
> CONFIG_SET_DFU_ALT_INFO=y
> CONFIG_USB_FUNCTION_FASTBOOT=y
> --
> 2.25.1
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
OWNLOAD=y
> CONFIG_ERRNO_STR=y
> # CONFIG_LMB_USE_MAX_REGIONS is not set
> CONFIG_LMB_MEMORY_REGIONS=2
> --
> 2.25.1
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
> press_up_down_enter_and_wait(0, 3, True, None)
> -# Check the curren BootOrder
> + # Check the current BootOrder
> for i in ('test 3', 'Quit'):
> u_boot_console.p.expect([i])
>
> --
> 2.43.0
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
}
> if (level == 0) {
> err = zio_read(bp, endian, buf, 0, data);
> endian = (zfs_to_cpu64(bp->blk_prop, endian) >>
> 63) & 1;
> --
> 2.44.0
>
>
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk <http://ua.linkedin.com/in/iopaniuk>
Apalodimas
Signed-off-by: Igor Opaniuk
---
Changes in v5:
- Extended commit message for "cmd: optee_rpmb: close tee session"
- Added R-b tag
Changes in v4:
- Rebased on the latest master and excluded "tee: sandbox: fix spelling errors",
as it was merged already by Heinrich Schu
Add read/write tests for optee_rpmb cmd.
Signed-off-by: Igor Opaniuk
---
(no changes since v1)
test/py/tests/test_optee_rpmb.py | 20
1 file changed, 20 insertions(+)
create mode 100644 test/py/tests/test_optee_rpmb.py
diff --git a/test/py/tests/test_optee_rpmb.py b
ted-by: Mattijs Korpershoek
Signed-off-by: Igor Opaniuk
---
(no changes since v2)
Changes in v2:
- Applied R-b and T-b tags
cmd/Kconfig | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/cmd/Kconfig b/cmd/Kconfig
index 61e280fb1a4..227d66a7eea 100644
--- a/cmd/Kconfig
+++ b/cmd/K
registered in OP-TEE OS core (obvious resource leak).
Signed-off-by: Igor Opaniuk
---
Changes in v5:
- Extended commit message, added more details about the reasons why the
change was needed
cmd/optee_rpmb.c | 23 +--
1 file changed, 17 insertions(+), 6 deletions(-)
diff
Fix OPTEE_TA_AVB symbol description in Kconfig:
s/"write"rb"/"write_rb"/g
Reviewed-by: Heinrich Schuchardt
Reviewed-by: Ilias Apalodimas
Signed-off-by: Igor Opaniuk
---
(no changes since v2)
Changes in v2:
- Applied R-b tags
drivers/tee/optee/Kconfig | 2 +-
1
Changes in v3:
- Added calls for closing tee session after every read/write operation
Changes in v2:
- Fixed chimp_optee.c:37:9: error: implicit declaration of function 'memset'
- Applied R-b and T-b tags
Igor Opaniuk (5):
tee: optee: fix description in Kconfig
cmd: optee_rpmb: close te
Ilias,
On Thu, Apr 4, 2024 at 1:00 PM Ilias Apalodimas
wrote:
> Hi Igor,
>
> On Thu, 4 Apr 2024 at 13:18, Igor Opaniuk wrote:
> >
> > Hi Ilias,
> >
> > On Thu, Apr 4, 2024 at 10:54 AM Ilias Apalodimas <
> ilias.apalodi...@linaro.org> wrote:
> >&g
HI Ilias
On Thu, Apr 4, 2024 at 12:15 PM Igor Opaniuk wrote:
> Hi Ilias,
>
> On Thu, Apr 4, 2024 at 10:40 AM Ilias Apalodimas <
> ilias.apalodi...@linaro.org> wrote:
>
>> Hi Igor,
>>
>> I was about to apply the series, but noticed neither me or Jens we
Add orphaned TEE/OP-TEE-related files to TEE subsystem entry in
MAINTAINERS. This includes:
- optee_rpmb cmd and test for it
- Misc. OP-TEE tests
- OP-TEE SCMI agent implementation
- Documentation, including device tree bindings
Signed-off-by: Igor Opaniuk
---
MAINTAINERS | 9 +
1 file
Jens were
> cc'ed
> > on this. Adding Jens to the party
> >
> > On Thu, Apr 04, 2024 at 10:13:49AM +0200, Igor Opaniuk wrote:
> > > Add calls for closing tee session after every read/write operation.
> >
> > What the patch is pretty obvious, but I am mis
tion by patman. Looks like there is
no
entry in MAINTAINERS for this specific file, that's why only Tom was added.
I'll send a patch for that if you don't mind.
> On Thu, Apr 04, 2024 at 10:13:49AM +0200, Igor Opaniuk wrote:
> > Add calls for closing tee session after every
The usage of the common.h include file is deprecated [1], and has already
been removed from several files.
Get rid of all inclusions in the "drivers/tee" directory, and replace it
with required include files directly where needed.
[1] doc/develop/codingstyle.rst
Signed-off-by: Ig
Add read/write tests for optee_rpmb cmd.
Signed-off-by: Igor Opaniuk
---
(no changes since v1)
test/py/tests/test_optee_rpmb.py | 20
1 file changed, 20 insertions(+)
create mode 100644 test/py/tests/test_optee_rpmb.py
diff --git a/test/py/tests/test_optee_rpmb.py b
ted-by: Mattijs Korpershoek
Signed-off-by: Igor Opaniuk
---
(no changes since v2)
Changes in v2:
- Applied R-b and T-b tags
cmd/Kconfig | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/cmd/Kconfig b/cmd/Kconfig
index 61e280fb1a4..227d66a7eea 100644
--- a/cmd/Kconfig
+++ b/cmd/K
Add calls for closing tee session after every read/write operation.
Signed-off-by: Igor Opaniuk
---
(no changes since v1)
cmd/optee_rpmb.c | 23 +--
1 file changed, 17 insertions(+), 6 deletions(-)
diff --git a/cmd/optee_rpmb.c b/cmd/optee_rpmb.c
index e0e44bbed04
Fix OPTEE_TA_AVB symbol description in Kconfig:
s/"write"rb"/"write_rb"/g
Reviewed-by: Heinrich Schuchardt
Reviewed-by: Ilias Apalodimas
Signed-off-by: Igor Opaniuk
---
(no changes since v2)
Changes in v2:
- Applied R-b tags
drivers/tee/optee/Kconfig | 2 +-
1
imp_optee.c:37:9: error: implicit declaration of function 'memset'
- Applied R-b and T-b tags
Igor Opaniuk (5):
tee: optee: fix description in Kconfig
cmd: optee_rpmb: close tee session
cmd: optee_rpmb: build cmd for sandbox
test: py: add optee_rpmb tests
tee: remove common.h
gor
[1] include/configs/mvebu_armada-37xx.h
[2] include/config_distro_bootcmd.h
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk <http://ua.linkedin.com/in/iopaniuk>
Ilias,
On Mon, Mar 4, 2024 at 6:45 PM Igor Opaniuk wrote:
> - Address some spelling errors and typos
> - Support CMD_OPTEE_RPMB for SANDBOX configurations and add python tests
> - Remove common.h inclusion for drivers/tee
> - Add calls for closing tee session after every read/wri
trol_store(dev_desc, part_info, abc,
> > -ANDROID_AB_BACKUP_OFFSET);
> > - if (ret < 0) {
> > - free(backup_abc);
> > - free(abc);
> > - return ret;
> > + if (CONFIG_ANDROID_AB_BACKUP_OFFSET) {
> >
log_err("ANDROID: Invalid backup CRC-32 ");
> log_err("expected %.8x, found %.8x),",
> crc32_le, backup_abc->crc32_le);
> #endif
> --
> 2.34.1
>
>
Reviewed-by: Igor Opaniuk
--
Best regards -
o that updates could be
> > > brought in with greater ease.
> >
> > Yeah. For this kind of thing you wouldn't want to make a bunch of
> > checkpatch changes. They sometimes pull crypto and compression
> > libraries into the Linux kernel pretty much unmodified
onditionals instead (with CONFIG_VAL macro) as explained in [1].
-
> 2.43.2
>
>
>
>
> CONFIDENTIALITY NOTICE: This email and any attachments are for the sole
> use of the intended recipient(s) and contain information that may be Garmin
> con
Hi Ilias,
On Mon, Mar 4, 2024 at 12:16 PM Ilias Apalodimas <
ilias.apalodi...@linaro.org> wrote:
> Hi Igor,
>
> On Sun, 3 Mar 2024 at 00:01, Igor Opaniuk wrote:
> >
> >
> > - Address some spelling errors and typos
> > - Support CMD_OPTEE_RPMB for SAND
The usage of the common.h include file is deprecated [1], and has already
been removed from several files.
Get rid of all inclusions in the "drivers/tee" directory, and replace it
with required include files directly where needed.
[1] doc/develop/codingstyle.rst
Signed-off-by: Ig
Add read/write tests for optee_rpmb cmd.
Signed-off-by: Igor Opaniuk
---
(no changes since v1)
test/py/tests/test_optee_rpmb.py | 20
1 file changed, 20 insertions(+)
create mode 100644 test/py/tests/test_optee_rpmb.py
diff --git a/test/py/tests/test_optee_rpmb.py b
ted-by: Mattijs Korpershoek
Signed-off-by: Igor Opaniuk
---
(no changes since v2)
Changes in v2:
- Applied R-b and T-b tags
cmd/Kconfig | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/cmd/Kconfig b/cmd/Kconfig
index a86b5705174..8ad8c0c542c 100644
--- a/cmd/Kconfig
+++ b/cmd/K
Add calls for closing tee session after every read/write operation.
Signed-off-by: Igor Opaniuk
---
(no changes since v1)
cmd/optee_rpmb.c | 23 +--
1 file changed, 17 insertions(+), 6 deletions(-)
diff --git a/cmd/optee_rpmb.c b/cmd/optee_rpmb.c
index e0e44bbed04
Fix spelling errors in comments.
Reviewed-by: Heinrich Schuchardt
Reviewed-by: Ilias Apalodimas
Signed-off-by: Igor Opaniuk
---
(no changes since v2)
Changes in v2:
- Applied R-b tags
drivers/tee/sandbox.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/drivers
Fix OPTEE_TA_AVB symbol description in Kconfig:
s/"write"rb"/"write_rb"/g
Reviewed-by: Heinrich Schuchardt
Reviewed-by: Ilias Apalodimas
Signed-off-by: Igor Opaniuk
---
(no changes since v2)
Changes in v2:
- Applied R-b tags
drivers/tee/optee/Kconfig | 2 +-
1
/results?buildId=28&view=results
Changes in v3:
- Added calls for closing tee session after every read/write operation
Changes in v2:
- Fixed chimp_optee.c:37:9: error: implicit declaration of function 'memset'
- Applied R-b and T-b tags
Igor Opaniuk (6):
tee: optee: fix description in
Hi Ilias,
On Mon, Mar 4, 2024 at 12:16 PM Ilias Apalodimas <
ilias.apalodi...@linaro.org> wrote:
> Hi Igor,
>
> On Sun, 3 Mar 2024 at 00:01, Igor Opaniuk wrote:
> >
> >
> > - Address some spelling errors and typos
> > - Support CMD_OPTEE_RPMB for SAND
Hello Ilias,
On Fri, Mar 1, 2024 at 10:41 AM Ilias Apalodimas <
ilias.apalodi...@linaro.org> wrote:
> Hi Igor,
>
> On Thu, 29 Feb 2024 at 21:11, Igor Opaniuk wrote:
> >
> > Hi Ilias,
> >
> > On Wed, Feb 14, 2024 at 7:34 PM Igor Opaniuk
> wrote:
&g
The usage of the common.h include file is deprecated [1], and has already
been removed from several files.
Get rid of all inclusions in the "drivers/tee" directory, and replace it
with required include files directly where needed.
[1] doc/develop/codingstyle.rst
Signed-off-by: Ig
Add read/write tests for optee_rpmb cmd.
Signed-off-by: Igor Opaniuk
---
(no changes since v1)
test/py/tests/test_optee_rpmb.py | 20
1 file changed, 20 insertions(+)
create mode 100644 test/py/tests/test_optee_rpmb.py
diff --git a/test/py/tests/test_optee_rpmb.py b
ted-by: Mattijs Korpershoek
Signed-off-by: Igor Opaniuk
---
Changes in v2:
- Applied R-b and T-b tags
cmd/Kconfig | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/cmd/Kconfig b/cmd/Kconfig
index a86b5705174..8ad8c0c542c 100644
--- a/cmd/Kconfig
+++ b/cmd/Kconfig
@@ -1370,7 +
Fix spelling errors in comments.
Reviewed-by: Heinrich Schuchardt
Reviewed-by: Ilias Apalodimas
Signed-off-by: Igor Opaniuk
---
Changes in v2:
- Applied R-b tags
drivers/tee/sandbox.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/drivers/tee/sandbox.c b/drivers
Fix OPTEE_TA_AVB symbol description in Kconfig:
s/"write"rb"/"write_rb"/g
Reviewed-by: Heinrich Schuchardt
Reviewed-by: Ilias Apalodimas
Signed-off-by: Igor Opaniuk
---
Changes in v2:
- Applied R-b tags
drivers/tee/optee/Kconfig | 2 +-
1 file changed, 1 insertio
- Address some spelling errors and typos
- Support CMD_OPTEE_RPMB for SANDBOX configurations and add python tests
- Remove common.h inclusion for drivers/tee
Changes in v2:
- Fixed chimp_optee.c:37:9: error: implicit declaration of function 'memset'
- Applied R-b and T-b tags
Igor
Hi Tom,
On Sat, Mar 2, 2024 at 12:31 AM Tom Rini wrote:
> On Sun, Feb 11, 2024 at 07:56:16PM +0100, Igor Opaniuk wrote:
>
> > From: Igor Opaniuk
> >
> > Drop old implementation and use hash_command() instead, as
> > how it's currently done for c
Drop old implementation and use hash_command() instead, as
how it's currently done for crc32 and sha1sum cmds.
Test:
=> md5sum 0x6000 0x200
md5 for 6000 ... 61ff ==> e6bbbe95f5b41996f4a9b9af7bbd4050
Signed-off-by: Igor Opaniuk
---
Changes in v2:
- Addressed build iss
Hello Tom,
On Sun, Feb 11, 2024 at 7:56 PM Igor Opaniuk
wrote:
> From: Igor Opaniuk
>
> Drop old implementation and use hash_command() instead, as
> how it's currently done for crc32 and sha1sum cmds.
>
> Test:
> => md5sum 0x6000 0x200
&g
Hi Ilias,
On Wed, Feb 14, 2024 at 7:34 PM Igor Opaniuk
wrote:
> - Address some spelling errors and typos
> - Support CMD_OPTEE_RPMB for SANDBOX configurations and add python tests
> - Remove common.h inclusion for drivers/tee
>
> Igor Opaniuk (5):
> tee: optee: fix desc
+CC Mattijs
On Mon, Feb 19, 2024 at 11:16 AM Igor Opaniuk
wrote:
> This takes the latest changes from AOSP from [1][2] (as this
> header was split on two) with minimal changes (this could lead
> to warnings reported by checkpatch).
>
> Some local changes have been appli
> >>
> >> - The less simple one (and hopefully not too controversial) adds an ecdsa
> >>> verify driver (UCLASS_ECDSA) which utilizes tinycrypt to do the crypto
> >>> work.
> >>>
> >>
> >> Do we already use tiny crypt in the project, if not things like license
> >> need to be taken into account in the context of the GPLv2
> >>
> >> Please advise on how best to proceed. Happy to work within the confines of
> >>> what works best for the larger group.
> >>>
> >>> Thanks,
> >>> Bob Wolff
> >>>
> >>
--
Best regards - Freundliche Grüsse - Meilleures salutations
Igor Opaniuk
Senior Software Engineer, Embedded & Security
E: igor.opan...@foundries.io
W: www.foundries.io
(tdx_carrier_board_name)
> @@ -188,6 +184,46 @@ static int settings_r(void)
> }
> EVENT_SPY_SIMPLE(EVT_SETTINGS_R, settings_r);
>
> +static int tdx_detect(struct udevice *dev)
> +{
> + return valid_cfgblock ? 0 : -EINVAL;
> +}
> +
> +static int tdx_get_str(struct udevice *dev, int id, size_t size, char *val)
> +{
> + int ret = -ENOTSUPP;
> +
> + switch (id) {
> + case SYSINFO_ID_BOARD_MODEL:
> + snprintf(val, size,
> +"Toradex %04d %s %s",
> +tdx_hw_tag.prodid,
> +toradex_modules[tdx_hw_tag.prodid].name,
> +tdx_board_rev_str);
> +
> + ret = 0;
> + }
> +
> + return ret;
> +}
> +
> +static const struct udevice_id sysinfo_tdx_ids[] = {
> + { .compatible = "toradex,sysinfo" },
> + { /* sentinel */ }
> +};
> +
> +static const struct sysinfo_ops sysinfo_tdx_ops = {
> + .detect = tdx_detect,
> + .get_str= tdx_get_str,
> +};
> +
> +U_BOOT_DRIVER(sysinfo_toradex) = {
> + .name = "sysinfo_toradex",
> + .id = UCLASS_SYSINFO,
> + .of_match = sysinfo_tdx_ids,
> + .ops= &sysinfo_tdx_ops,
> +};
> +
> #ifdef CONFIG_TDX_CFG_BLOCK_USB_GADGET_PID
> int g_dnl_bind_fixup(struct usb_device_descriptor *dev, const char *name)
> {
> --
> 2.39.2
>
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
http://ua.linkedin.com/in/iopaniuk
Hi Sam,
On Tue, Feb 20, 2024 at 7:29 PM Sam Protsenko
wrote:
>
> On Mon, Feb 19, 2024 at 4:16 AM Igor Opaniuk wrote:
> >
> > This takes the latest changes from AOSP from [1][2] (as this
> > header was split on two) with minimal changes (this could lead
> > to w
ux-gnu/10.1.0/libgcc.a(lse-init.o): in
function `init_have_lse_atomics':
lse-init.c:(.text.startup+0xc): undefined reference to `__getauxval'
This is happening because we are linking against our own libcflat which
doesn't implement the function __getauxval().
Disable the use of the
.h
[2]
https://android.googlesource.com/platform/hardware/interfaces/+/main/boot/1.1/default/boot_control/include/private/boot_control_definition.h
CC: Alex Deymo
CC: Sam Protsenko
CC: Eugeniu Rosca
CC: Simon Glass
Signed-off-by: Igor Opaniuk
---
include/android_bootloader_me
The usage of the common.h include file is deprecated [1], and has already
been removed from several files.
Get rid of all inclusions in the "drivers/tee" directory, and replace it
with required include files directly where needed.
[1] doc/develop/codingstyle.rst
Signed-off-by: Ig
Add read/write tests for optee_rpmb cmd.
Signed-off-by: Igor Opaniuk
---
test/py/tests/test_optee_rpmb.py | 20
1 file changed, 20 insertions(+)
create mode 100644 test/py/tests/test_optee_rpmb.py
diff --git a/test/py/tests/test_optee_rpmb.py b/test/py/tests
Fix spelling errors in comments.
Signed-off-by: Igor Opaniuk
---
drivers/tee/sandbox.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/drivers/tee/sandbox.c b/drivers/tee/sandbox.c
index 86219a9bb1a..ec66401878c 100644
--- a/drivers/tee/sandbox.c
+++ b/drivers/tee
Fix OPTEE_TA_AVB symbol description in Kconfig:
s/"write"rb"/"write_rb"/g
Signed-off-by: Igor Opaniuk
---
drivers/tee/optee/Kconfig | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/tee/optee/Kconfig b/drivers/tee/optee/Kconfig
index 9dc65b
Support CMD_OPTEE_RPMB for SANDBOX configurations.
Test:
$ ./u-boot -d arch/sandbox/dts/test.dtb
...
=> optee_rpmb write_pvalue test_variable test_value
Wrote 11 bytes
=> optee_rpmb read_pvalue test_variable 11
Read 11 bytes, value = test_value
Signed-off-by: Igor Opaniuk
---
cmd/Kconf
- Address some spelling errors and typos
- Support CMD_OPTEE_RPMB for SANDBOX configurations and add python tests
- Remove common.h inclusion for drivers/tee
Igor Opaniuk (5):
tee: optee: fix description in Kconfig
tee: sandbox: fix spelling errors
cmd: optee_rpmb: build cmd for sandbox
Hi Mattijs,
On Tue, Feb 13, 2024 at 9:13 AM Mattijs Korpershoek
wrote:
>
> Hi Igor,
>
> On lun., févr. 12, 2024 at 09:05, Igor Opaniuk wrote:
>
> > Hi Dan,
> >
> > On Mon, Feb 12, 2024 at 8:05 AM Dan Carpenter
> > wrote:
> >>
> >> On
From: Igor Opaniuk
Add information about a custodian tree [1] for AVB/AB, which is
maintained by Mattijs Korpershoek.
[1] https://source.denx.de/u-boot/custodians/u-boot-dfu
Signed-off-by: Igor Opaniuk
---
MAINTAINERS | 2 ++
1 file changed, 2 insertions(+)
diff --git a/MAINTAINERS b
From: Igor Opaniuk
Add information about a custodian tree [1] for AVB/AB, which is
maintained by Mattijs Korpershoek.
[1] https://source.denx.de/u-boot/custodians/u-boot-dfu
Signed-off-by: Igor Opaniuk
---
MAINTAINERS | 2 ++
1 file changed, 2 insertions(+)
diff --git a/MAINTAINERS b
From: Igor Opaniuk
Add support for the SHA-512 Secure Hash Algorithm which uses ARMv8 Crypto
Extensions. The CPU should support ARMv8.2 instruction set and implement
SHA512H, SHA512H2, SHA512SU0, and SHA512SU1 instructions.
This information can be obtained from ID_AA64ISAR0_EL1 (AArch64
b/configs/khadas-vim3l_android_defconfig
> @@ -3,6 +3,7 @@ CONFIG_SYS_BOARD="vim3"
> CONFIG_SYS_CONFIG_NAME="khadas-vim3l_android"
> CONFIG_ARCH_MESON=y
> CONFIG_TEXT_BASE=0x0100
> +CONFIG_SYS_MALLOC_LEN=0x0800
> CONFIG_NR_DRAM_BANKS=1
>
Hi Dan,
On Mon, Feb 12, 2024 at 8:05 AM Dan Carpenter wrote:
>
> On Fri, Feb 09, 2024 at 08:20:39PM +0100, Igor Opaniuk wrote:
> > From: Igor Opaniuk
> >
> > mmc_switch_part() is used for switching between hw partitions
> > on eMMC (boot0, boot1, user, rpmb).
>
From: Igor Opaniuk
Drop old implementation and use hash_command() instead, as
how it's currently done for crc32 and sha1sum cmds.
Test:
=> md5sum 0x6000 0x200
md5 for 6000 ... 61ff ==> e6bbbe95f5b41996f4a9b9af7bbd4050
Signed-off-by: Igor Opaniuk
---
cmd/md5
and
nitpick: s/ccode/code/g
> +replace it with any required include files directly is much appreciated.
>
> If your file uses driver model, include in the C file. Do not include
> dm.h in a header file. Try to use forward declarations (e.g. ``struct
> --
> 2.34.1
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
http://ua.linkedin.com/in/iopaniuk
Hi Tom,
On Sun, Feb 11, 2024 at 1:37 AM Tom Rini wrote:
>
> On Sat, Feb 10, 2024 at 01:07:09PM +0100, Igor Opaniuk wrote:
>
> > From: Igor Opaniuk
> >
> > Add support for the SHA-512 Secure Hash Algorithm which uses ARMv8 Crypto
> > Extensions. The CPU should su
Hello Marc,
On Sun, Feb 11, 2024 at 12:12 AM Marc Zyngier wrote:
>
> [Fixing Ard's email address for something more current.]
>
> On Sat, 10 Feb 2024 12:07:09 +0000,
> Igor Opaniuk wrote:
> >
> > From: Igor Opaniuk
> >
> > Add support for the SH
From: Igor Opaniuk
Add support for the SHA-512 Secure Hash Algorithm which uses ARMv8 Crypto
Extensions. The CPU should support ARMv8.2 instruction set and implement
SHA512H, SHA512H2, SHA512SU0, and SHA512SU1 instructions.
This information can be obtained from ID_AA64ISAR0_EL1 (AArch64
@@
>
> #include
> #include
> +#include
> #include
> #include
> #include
> @@ -99,7 +100,6 @@ int power_init_board(void)
> return 0;
> }
>
> -extern int imx9_probe_mu(void *ctx, struct event *event);
> void board_init_f(ulong dummy)
> {
>
From: Igor Opaniuk
Sync usage info with the one cmd/avb.c.
Signed-off-by: Igor Opaniuk
---
Changes in v2:
- Address Mattijs comment about usage info, sync with cmd/avb.c
doc/android/avb2.rst | 16 +++-
1 file changed, 11 insertions(+), 5 deletions(-)
diff --git a/doc/android
From: Igor Opaniuk
Use existing str_avb_slot_error() function for obtaining
verification fail reason details.
Take into account device lock state for setting correct
androidboot.verifiedbootstate kernel cmdline parameter.
Reviewed-by: Mattijs Korpershoek
Signed-off-by: Igor Opaniuk
From: Igor Opaniuk
Introduce str_avb_io_error() and str_avb_slot_error() functions,
that provide a pointer to AVB runtime error message.
Reviewed-by: Mattijs Korpershoek
Signed-off-by: Igor Opaniuk
---
Changes in v2:
- Mattijs Korpershoek R-b tag applied
common/avb_verify.c | 49
From: Igor Opaniuk
Simplify and add more context for prints where it's needed.
Signed-off-by: Igor Opaniuk
---
Changes in v2:
- Drop AVB_OPS_CHECK macro and leave previous check
cmd/avb.c | 123 +-
1 file changed, 75 insertions(+
From: Igor Opaniuk
Make error prints more verbose with additional context.
Also s/print/debug/g for prints, which might be relevant only
for debugging purposes.
Reviewed-by: Mattijs Korpershoek
Signed-off-by: Igor Opaniuk
---
Changes in v2:
- Mattijs Korpershoek R-b tag applied
common
From: Igor Opaniuk
Move SPDX license identifiers to the first line, so it conforms
to license placement rule [1]:
Placement:
The SPDX license identifier in kernel files shall be added at the first
possible line in a file which can contain a comment. For the majority
of files this is the first
From: Igor Opaniuk
mmc_switch_part() is used for switching between hw partitions
on eMMC (boot0, boot1, user, rpmb).
There is no need to do that for SD card.
Reviewed-by: Mattijs Korpershoek
Signed-off-by: Igor Opaniuk
---
Changes in v2:
- Mattijs Korpershoek R-b tag applied
common
only for eMMC.
- Rework do_avb_verify_part, take into account device lock state for setting
correct
androidboot.verifiedbootstate.
- Adjust AVB documentation, sync usage info with the one cmd/avb.c.
Igor Opaniuk (7):
common: avb_verify: don't call mmc_switch_part for SD
avb: move SP
Hello Mattijs,
On Fri, Feb 9, 2024 at 11:30 AM Mattijs Korpershoek
wrote:
>
> Hi Igor,
>
> On ven., févr. 09, 2024 at 11:14, Igor Opaniuk wrote:
>
> > Hi everyone,
> >
> > I'm currently planning a big overhaul of the current implementation of
> > AV
1 - 100 of 973 matches
Mail list logo