Re: Pull request for UEFI sub-system for efi-2020-10-rc1 (2)

2020-07-11 Thread Heinrich Schuchardt
On 7/10/20 8:09 PM, Tom Rini wrote: > On Thu, Jul 09, 2020 at 06:12:02PM +0200, Heinrich Schuchardt wrote: > >> The following changes since commit 61608f395e7dcb2be6060407a72a1149b046430a: >> >> Merge branch '2020-07-08-misc-features-and-fixes' (2020-07-08 20:20:24 >> -0400) >> >> are available i

[PATCH v4 02/12] efi_loader: image_loader: retrieve authenticode only if it exists

2020-07-11 Thread Heinrich Schuchardt
From: AKASHI Takahiro Since the certificate table, which is indexed by IMAGE_DIRECTORY_ENTRY_SECURITY and contains authenticode in PE image, doesn't always exist, we should make sure that we will retrieve its pointer only if it exists. Signed-off-by: AKASHI Takahiro --- lib/efi_loader/efi_imag

[PATCH v4 00/12] efi_loader: rework/improve UEFI secure boot code

2020-07-11 Thread Heinrich Schuchardt
This is a respin of Takahiro's patch series adding a defined time stamp for time authenticated variables by calling sign-efi-sig-list with -t in patches 10 - 12. The original patch 01 of version 3 has been obsoleted by lib/crypto: use qualified path for x509_parser.h https://lists.denx.de

[PATCH v4 01/12] efi_loader: image_loader: add a check against certificate type of authenticode

2020-07-11 Thread Heinrich Schuchardt
From: AKASHI Takahiro UEFI specification requires that we shall support three type of certificates of authenticode in PE image: WIN_CERT_TYPE_EFI_GUID with the guid, EFI_CERT_TYPE_PCKS7_GUID WIN_CERT_TYPE_PKCS_SIGNED_DATA WIN_CERT_TYPE_EFI_PKCS1_15 As EDK2 does, we will support the first t

[PATCH v4 03/12] efi_loader: signature: fix a size check against revocation list

2020-07-11 Thread Heinrich Schuchardt
From: AKASHI Takahiro Since the size check against an entry in efi_search_siglist() is incorrect, this function will never find out a to-be-matched certificate and its associated revocation time in the signature list. Signed-off-by: AKASHI Takahiro --- lib/efi_loader/efi_signature.c | 5 +++--

[PATCH v4 05/12] efi_loader: image_loader: verification for all signatures should pass

2020-07-11 Thread Heinrich Schuchardt
From: AKASHI Takahiro A signed image may have multiple signatures in - each WIN_CERTIFICATE in authenticode, and/or - each SignerInfo in pkcs7 SignedData (of WIN_CERTIFICATE) In the initial implementation of efi_image_authenticate(), the criteria of verification check for multiple signatures

[PATCH v4 06/12] efi_loader: image_loader: add digest-based verification for signed image

2020-07-11 Thread Heinrich Schuchardt
From: AKASHI Takahiro In case that a type of certificate in "db" or "dbx" is EFI_CERT_X509_SHA256_GUID, it is actually not a certificate which contains a public key for RSA decryption, but a digest of image to be loaded. If the value matches to a value calculated from a given binary image, it is

[PATCH v4 09/12] test/py: efi_secboot: split "signed image" test case-1 into two cases

2020-07-11 Thread Heinrich Schuchardt
From: AKASHI Takahiro Split the existing test case-1 into case1 and a new case-2: case-1 for non-SecureBoot mode; case-2 for SecureBoot mode. In addition, one corner case is added to case-2; a image is signed but a corresponding certificate is not yet installed in "db." Signed-off-by: AKASHI Ta

[PATCH v4 11/12] test/py: efi_secboot: add a test for multiple signatures

2020-07-11 Thread Heinrich Schuchardt
From: AKASHI Takahiro In this test case, an image is signed multiple times with different keys. If any of signatures contained is not verified, the whole authentication check should fail. Signed-off-by: AKASHI Takahiro Provide a defined time stamp for dbx_hash1.auth. Signed-off-by: Heinrich Sc

[PATCH v4 07/12] test/py: efi_secboot: apply autopep8

2020-07-11 Thread Heinrich Schuchardt
From: AKASHI Takahiro Python's autopep8 can automatically correct some of warnings from pylint and rewrite the code in a pretty print format. So just do it. Suggested-by: Heinrich Schuchardt Signed-off-by: AKASHI Takahiro --- test/py/tests/test_efi_secboot/conftest.py| 74 ++--

[PATCH v4 04/12] efi_loader: signature: make efi_hash_regions more generic

2020-07-11 Thread Heinrich Schuchardt
From: AKASHI Takahiro There are a couple of occurrences of hash calculations in which a new efi_hash_regions will be commonly used. Signed-off-by: AKASHI Takahiro --- lib/efi_loader/efi_signature.c | 46 +- 1 file changed, 17 insertions(+), 29 deletions(-) diff

[PATCH v4 10/12] test/py: efi_secboot: add a test against certificate revocation

2020-07-11 Thread Heinrich Schuchardt
From: AKASHI Takahiro Revocation database (dbx) may have not only certificates, but also message digests of certificates with revocation time (EFI_CERT_X509_SHA256_GUILD). In this test case, if the database has such a digest and if the value matches to a certificate that created a given image's

[PATCH v4 12/12] test/py: efi_secboot: add a test for verifying with digest of signed image

2020-07-11 Thread Heinrich Schuchardt
From: AKASHI Takahiro Signature database (db or dbx) may have not only certificates that contain a public key for RSA decryption, but also digests of signed images. In this test case, if database has an image's digest (EFI_CERT_SHA256_GUID) and if the value matches to a hash value calculated fro

[PATCH v4 08/12] test/py: efi_secboot: more fixes against pylint

2020-07-11 Thread Heinrich Schuchardt
From: AKASHI Takahiro More fixes against pylint warnings that autopep8 didn't handle in the previous commit. Signed-off-by: AKASHI Takahiro --- test/py/tests/test_efi_secboot/conftest.py| 11 +-- .../py/tests/test_efi_secboot/test_authvar.py | 91 +-- test/py/tests/test_efi

Re: [PATCH 2/2] mtd: make spinand driver usable without CONFIG_DM

2020-07-11 Thread Jagan Teki
On Mon, Jun 22, 2020 at 9:25 PM Mikhail Kshevetskiy wrote: > > From: Mikhail Kshevetskiy > > Here is an example of spinand driver initialization without CONFIG_DM > enabled: > > void board_nand_init(void) > { > static struct spinand_devicespinand; > static struct mtd_info

Re: [PATCH 4/4] common: Add LX TestBox checks

2020-07-11 Thread Jagan Teki
On Fri, May 29, 2020 at 11:08 PM Benedikt Spranger wrote: > > The TestBox board is an open hardware enhancement for the Lamobo R1 router > board. The Testbox board is used in the CI-RT project to manage devices > under test (https://ci-rt.linutronix.de). > > The hardware project is located at http

Re: [PATCH] sunxi: Add Drejo DS167 board

2020-07-11 Thread Jagan Teki
On Sun, May 31, 2020 at 3:25 PM wrote: > > From: Sertac TULLUK > > drejo ds167 is an allwinner a20 based custom board > with twin LVDS LCD and TouchScreen, 7inch and 10.1inch. > The board has 1G RAM, 8G eMMC, AXP209 PMIC, 10/100 EMAC > SATA, 2x USB2.0, 1x USB OTG, 3x dry-contact input > 3x relay

Re: [PATCH] power: axp209: Limit inrush current for A20-OLinuXino_MICRO

2020-07-11 Thread Jagan Teki
On Tue, Jun 16, 2020 at 9:46 PM Cédric Félizard wrote: > > This commit enables the work done in commit ef52605e for the > A20-OLinuXino_MICRO{,-eMMC} boards. It was previously used only for the > A20-OLinuXino-Lime2{,-eMMC} boards but is also needed for the MICRO > boards. Without this, the board

Re: microSD Breakout Port

2020-07-11 Thread Jagan Teki
On Fri, Jun 26, 2020 at 5:28 AM Faruk Kılavuz wrote: > > Hello > > This is my first mail. I tried running uart-0 with microsd breakout method. I > have added the following codes to open the F port. > > diff --git a/arch/arm/include/asm/arch-sunxi/gpio.h > b/arch/arm/include/asm/arch-sunxi/gpio.h

Re: [PATCH 14/15] net: sun8i-emac: Lower MDIO frequency

2020-07-11 Thread Jagan Teki
On Mon, Jul 6, 2020 at 6:12 AM Andre Przywara wrote: > > When sending a command via the MDIO bus, the Designware MAC expects some > bits in the CMD register to describe the clock divider value between > the main clock and the MDIO clock. > So far we were omitting these bits, resulting in setting "

Re: [RFC PATCH v2] sunxi: Add UART4 console support for A64

2020-07-11 Thread Jagan Teki
On Wed, Jul 8, 2020 at 5:41 PM Nazım Gediz Aydındoğmuş wrote: > > UART4 port of A64 was in conflict with R_UART of older SoCs, like A23. > > This commit adds necessary definitions to use UART4 port on A64. > > Signed-off-by: Nazım Gediz Aydındoğmuş > Tested-by: Faruk Kılavuz > --- I think this

Re: [PATCH 2/2] mtd: make spinand driver usable without CONFIG_DM

2020-07-11 Thread Jagan Teki
On Sat, Jul 11, 2020 at 3:06 PM Mikhail Kshevetskiy wrote: > > On Sat, 11 Jul 2020 14:16:23 +0530 > Jagan Teki wrote: > > > On Mon, Jun 22, 2020 at 9:25 PM Mikhail Kshevetskiy > > wrote: > > > > > > From: Mikhail Kshevetskiy > > > > > > Here is an example of spinand driver initialization withou

[PATCH 0/1] fw_setenv always locks flash whenever it tries to write

2020-07-11 Thread Ivan Mikhaylov
fw_setenv usage always locks u-boot-env mtd device without questions. Locking of flash can be disruptive and may affect not only u-boot-env region due to different problems with chips and lock callbacks on kernel side. I'm not sure if my fix is right, but also I thought about possible option in fw_

[PATCH 1/1] fw_setenv: lock the flash only if it was locked before

2020-07-11 Thread Ivan Mikhaylov
u-boot-env flash region lock/unlock may affect other regions than u-boot-env, fw_setenv does this in a way 'Lock it in any cases'. Change this to 'lock it if it was locked before'. Signed-off-by: Ivan Mikhaylov --- tools/env/fw_env.c | 24 +++- 1 file changed, 19 insertions(+

Re: [PATCH 2/2] mtd: make spinand driver usable without CONFIG_DM

2020-07-11 Thread Mikhail Kshevetskiy
On Sat, 11 Jul 2020 14:16:23 +0530 Jagan Teki wrote: > On Mon, Jun 22, 2020 at 9:25 PM Mikhail Kshevetskiy > wrote: > > > > From: Mikhail Kshevetskiy > > > > Here is an example of spinand driver initialization without CONFIG_DM > > enabled: > > > > void board_nand_init(void) > > { > > s

Re: Pull request for UEFI sub-system for efi-2020-10-rc1 (2)

2020-07-11 Thread Tom Rini
On Sat, Jul 11, 2020 at 09:00:16AM +0200, Heinrich Schuchardt wrote: > On 7/10/20 8:09 PM, Tom Rini wrote: > > On Thu, Jul 09, 2020 at 06:12:02PM +0200, Heinrich Schuchardt wrote: > > > >> The following changes since commit > >> 61608f395e7dcb2be6060407a72a1149b046430a: > >> > >> Merge branch '2

[PATCH 01/12] net: dc2114x: Use PCI_DEVICE() to define PCI device compat list

2020-07-11 Thread Marek Vasut
Use this macro to fully fill the PCI device ID table. This is mandatory for the DM PCI support, which checks all the fields. Signed-off-by: Marek Vasut Cc: Joe Hershberger Cc: Ramon Fried --- drivers/net/dc2114x.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/

[PATCH 02/12] net: dc2114x: Support all DC2114x

2020-07-11 Thread Marek Vasut
For the usage in this driver, the chips are identical, so support all of them. Signed-off-by: Marek Vasut Cc: Joe Hershberger Cc: Ramon Fried --- drivers/net/dc2114x.c | 9 - 1 file changed, 9 deletions(-) diff --git a/drivers/net/dc2114x.c b/drivers/net/dc2114x.c index e537b29f3d..24

[PATCH 04/12] net: dc2114x: Drop update_srom()

2020-07-11 Thread Marek Vasut
This code is never used, remove it. Signed-off-by: Marek Vasut Cc: Joe Hershberger Cc: Ramon Fried --- drivers/net/dc2114x.c | 91 --- 1 file changed, 91 deletions(-) diff --git a/drivers/net/dc2114x.c b/drivers/net/dc2114x.c index 245218080e..af582c541

[PATCH 05/12] net: dc2114x: Use standard I/O accessors

2020-07-11 Thread Marek Vasut
The current dc21x4x driver accesses its memory mapped registers directly instead of using the standard I/O accessors. This can cause problems on some systems as the accesses can get out of order. So convert the direct volatile dereferences to use the normal in/out macros. Signed-off-by: Marek Vasu

[PATCH 03/12] net: dc2114x: Add Kconfig entries

2020-07-11 Thread Marek Vasut
Add Kconfig entries for the dc2114x driver and convert various boards. Signed-off-by: Marek Vasut Cc: Joe Hershberger Cc: Ramon Fried --- README | 3 --- configs/integratorap_cm720t_defconfig | 1 + configs/integratorap_cm920t_defconfig | 1 + configs/integ

[PATCH 07/12] net: dc2114x: Pass private data around

2020-07-11 Thread Marek Vasut
This patch replaces the various uses of struct eth_device for accessing device private data with struct dc2114x_priv, which is compatible both with DM and non-DM operation. Signed-off-by: Marek Vasut Cc: Joe Hershberger Cc: Ramon Fried --- drivers/net/dc2114x.c | 135 ++

[PATCH 06/12] net: dc2114x: Introduce private data

2020-07-11 Thread Marek Vasut
Introduce dc2114x_priv, which is a super-structure around eth_device and tracks per-device state and the device IO address. Signed-off-by: Marek Vasut Cc: Joe Hershberger Cc: Ramon Fried --- drivers/net/dc2114x.c | 25 ++--- 1 file changed, 18 insertions(+), 7 deletions(-)

[PATCH 11/12] net: dc2114x: Split common parts of non-DM functions out

2020-07-11 Thread Marek Vasut
Split the common code from the non-DM code, so it can be reused by the DM code later. As always, the recv() function had to be split into the actual receiving part and free_pkt part to fit with the DM. Signed-off-by: Marek Vasut Cc: Joe Hershberger Cc: Ramon Fried --- drivers/net/dc2114x.c | 1

[PATCH 10/12] net: dc2114x: Split RX path

2020-07-11 Thread Marek Vasut
Split the RX data check from the rest of the RX function, so that the check can be performed separately from the processing of the packet and the release of the received packet once the processing is finished. Signed-off-by: Marek Vasut Cc: Joe Hershberger Cc: Ramon Fried --- drivers/net/dc211

[PATCH 12/12] net: dc2114x: Add DM support

2020-07-11 Thread Marek Vasut
With all the changes in place, add support for DM into the dc2114x driver. Signed-off-by: Marek Vasut Cc: Joe Hershberger Cc: Ramon Fried --- drivers/net/dc2114x.c | 147 +- 1 file changed, 145 insertions(+), 2 deletions(-) diff --git a/drivers/net/dc21

[PATCH 09/12] net: dc2114x: Add RX/TX rings into the private data

2020-07-11 Thread Marek Vasut
The RX/TX DMA descriptor rings are per-device-instance private data, so move them into the private data. Signed-off-by: Marek Vasut Cc: Joe Hershberger Cc: Ramon Fried --- drivers/net/dc2114x.c | 92 +-- 1 file changed, 46 insertions(+), 46 deletions(-)

[PATCH 08/12] net: dc2114x: Pass PCI BDF into phys_to_bus()

2020-07-11 Thread Marek Vasut
This is a trick in preparation for adding DM support. By passing in the PCI BDF into the phys_to_bus() macros and calling that dev, we can substitute dev with udevice when DM support lands and do minor adjustment to the macros to support both DM and non-DM operation. No functional change. Signed-o

Re: Please pull u-boot-dm

2020-07-11 Thread Tom Rini
On Fri, Jul 10, 2020 at 11:07:38AM -0600, Simon Glass wrote: > Hi Tom, > > Results here: > > https://gitlab.denx.de/u-boot/custodians/u-boot-dm/pipelines/3981 > > > The following changes since commit 506d52308a2f5de48c2b9a08229fee9a0ee2842a: > > Merge https://gitlab.denx.de/u-boot/custodian

Re: [PATCH v2 1/1] CI: show skipped Python tests

2020-07-11 Thread Tom Rini
On Fri, Jul 10, 2020 at 10:04:40PM +0200, Heinrich Schuchardt wrote: > Call pytest3 with argument -ra to display the reason why Python tests are > skipped. > > The -r flag displays a test summary info for each test. -ra eliminates > this info for passed tests. > > Pros an cons were discussed in:

Re: [PATCH 01/10] Revert "ARM: uniphier: add weird workaround code for LD20"

2020-07-11 Thread Masahiro Yamada
On Thu, Jul 9, 2020 at 3:09 PM Masahiro Yamada wrote: > > This reverts commit 45f41c134baf5ff1bbf59d33027f6c79884fa4d9. > > This weird workaround was the best I came up with at that time > to boot U-Boot from TF-A. > > I noticed U-Boot successfully boots on LD20 (i.e. CA72 CPU) by using > the late

Re: [PATCH] ARM: uniphier: remove NAND reset code

2020-07-11 Thread Masahiro Yamada
On Fri, Jul 10, 2020 at 10:32 PM Masahiro Yamada wrote: > > Now that commit fceee65c878c ("mtd: nand: raw: denali: Assert reset > before deassert") added the reset assertion, this code in the board > file is unneeded. > > Signed-off-by: Masahiro Yamada > --- Applied to u-boot-uniphier. > arch

Re: [PATCH 1/3] serial: uniphier: use register macros instead of structure

2020-07-11 Thread Masahiro Yamada
On Fri, Jul 10, 2020 at 1:13 AM Masahiro Yamada wrote: > > After all, I am not a big fan of using a structure to represent the > hardware register map. > > You do not need to know the entire register map. > > Add only necessary register macros. > > Use FIELD_PREP() instead of maintaining a pair of

[GIT PULL] UniPhier SoC updates for v2020.10

2020-07-11 Thread Masahiro Yamada
Hi Tom, Please pull changes for v2020.10 Thanks. The following changes since commit 3113c84ba25ec3ceae072cc5ad450c4238425939: Merge tag 'rpi-next-2020.10' of https://gitlab.denx.de/u-boot/custodians/u-boot-raspberrypi (2020-07-10 14:31:22 -0400) are available in the Git repository at: ht

Re: [PATCH v3 14/25] x86: mp: Park CPUs before running the OS

2020-07-11 Thread Simon Glass
Hi Bin, On Tue, 7 Jul 2020 at 19:55, Simon Glass wrote: > > Hi Bin, > > On Tue, 7 Jul 2020 at 02:26, Bin Meng wrote: > > > > Hi Simon, > > > > On Mon, Jul 6, 2020 at 11:37 AM Simon Glass wrote: > > > > > > With the new MP features the CPUs are no-longer parked when the OS is run. > > > Fix this

[PATCH v5 14/25] x86: mp: Park CPUs before running the OS

2020-07-11 Thread Simon Glass
With the new MP features the CPUs are no-longer parked when the OS is run. Fix this by calling a special function to park them, just before the OS is started. Signed-off-by: Simon Glass Reviewed-by: Wolfgang Wallner --- Changes in v5: - Drop timing in mp_park_aps() Changes in v3: - Update the

Re: [PATCH 00/16] spi: dm-conversion (part3)

2020-07-11 Thread Jagan Teki
On Wed, Jul 8, 2020 at 6:25 PM Stefano Babic wrote: > > On 08.07.20 13:40, Jagan Teki wrote: > > On Sat, Jun 13, 2020 at 9:11 PM Tom Rini wrote: > >> > >> On Sat, Jun 13, 2020 at 07:24:39PM +0530, Jagan Teki wrote: > >> > >>> This series updated boards which are using mxc_spi > >>> driver. > >>>

Pull request: u-boot-spi/master

2020-07-11 Thread Jagan Teki
Hi Tom, This PR about dm migration and other SF fixes. Summary: - Enable DM_SPI on siemens omap boards (Jagan) - Dropped some non-dm supported omap3 boards (Jagan) - Dropped non-dm code in omap3 spi driver (Jagan) - Dropped non-dm code in kirkwood spi driver (Bhargav) Travis CI: https://travis-

Re: [GIT PULL] UniPhier SoC updates for v2020.10

2020-07-11 Thread Tom Rini
On Sat, Jul 11, 2020 at 11:35:12PM +0900, Masahiro Yamada wrote: > Hi Tom, > > Please pull changes for v2020.10 > Thanks. > > > > The following changes since commit 3113c84ba25ec3ceae072cc5ad450c4238425939: > > Merge tag 'rpi-next-2020.10' of > https://gitlab.denx.de/u-boot/custodians/u-boo

Re: Pull request for UEFI sub-system for efi-2020-10-rc1 (2)

2020-07-11 Thread Heinrich Schuchardt
On 7/11/20 2:16 PM, Tom Rini wrote: > On Sat, Jul 11, 2020 at 09:00:16AM +0200, Heinrich Schuchardt wrote: >> On 7/10/20 8:09 PM, Tom Rini wrote: >>> On Thu, Jul 09, 2020 at 06:12:02PM +0200, Heinrich Schuchardt wrote: >>> The following changes since commit 61608f395e7dcb2be6060407a72a11

[PATCH v4 02/17] efi_loader: display RO attribute in printenv -e

2020-07-11 Thread Heinrich Schuchardt
Let the 'printenv -e' command display the read only flag. If the variable is time authenticated write the time stamp. Avoid EFI_CALL() when calling SetVariable() and GetVariable(). Signed-off-by: Heinrich Schuchardt --- cmd/nvedit_efi.c | 24 1 file changed, 16 insertio

[PATCH v4 04/17] efi_loader: OsIndicationsSupported, PlatformLangCodes

2020-07-11 Thread Heinrich Schuchardt
UEFI variables OsIndicationsSupported, PlatformLangCodes should be read only. Avoid EFI_CALL() for SetVariable(). Signed-off-by: Heinrich Schuchardt --- lib/efi_loader/efi_setup.c | 59 -- 1 file changed, 31 insertions(+), 28 deletions(-) diff --git a/lib/ef

[PATCH v4 00/17] efi_loader: non-volatile and runtime variables

2020-07-11 Thread Heinrich Schuchardt
With this patch series file ubootefi.var in the EFI system partition is used for saving UEFI variables. Furthermore the UEFI variables are exposed for reading at runtime. v4: Correct appending of variables when using the memory based store. Performance enhancement for the memory b

[PATCH v4 05/17] efi_loader: simplify boot manager

2020-07-11 Thread Heinrich Schuchardt
Simplify the implementation of the UEFI boot manager: * avoid EFI_CALL for SetVariable() and GetVariable() * remove unnecessary type conversions Signed-off-by: Heinrich Schuchardt --- lib/efi_loader/efi_bootmgr.c | 28 1 file changed, 12 insertions(+), 16 deletions(

[PATCH v4 06/17] efi_loader: keep attributes in efi_set_variable_int

2020-07-11 Thread Heinrich Schuchardt
Do not change the value of parameter attributes in function efi_set_variable_int(). This allows to use it later. Do not use variable attr for different purposes but declare separate variables (attr and old_attr). Signed-off-by: Heinrich Schuchardt --- lib/efi_loader/efi_variable.c | 24

[PATCH v4 08/17] efi_loader: read-only AuditMode and DeployedMode

2020-07-11 Thread Heinrich Schuchardt
Set the read only property of the UEFI variables AuditMode and DeployedMode conforming to the UEFI specification. Signed-off-by: Heinrich Schuchardt --- lib/efi_loader/efi_variable.c | 22 +- 1 file changed, 13 insertions(+), 9 deletions(-) diff --git a/lib/efi_loader/efi_va

[PATCH v4 01/17] efi_loader: prepare for read only OP-TEE variables

2020-07-11 Thread Heinrich Schuchardt
We currently have two implementations of UEFI variables: * variables provided via an OP-TEE module * variables stored in the U-Boot environment Read only variables are up to now only implemented in the U-Boot environment implementation. Provide a common interface for both implementations that al

[PATCH v4 07/17] efi_loader: value of VendorKeys

2020-07-11 Thread Heinrich Schuchardt
According to the UEFI specification the variable VendorKeys is 1 if the "system is configured to use only vendor-provided keys". As we do not supply any vendor keys yet the variable VendorKeys must be zero. Signed-off-by: Heinrich Schuchardt --- lib/efi_loader/efi_variable.c | 75 +++---

[PATCH v4 03/17] efi_loader: separate UEFI variable API from implemementation

2020-07-11 Thread Heinrich Schuchardt
Separate the remaining UEFI variable API functions GetNextVariableName and QueryVariableInfo() from internal functions implementing them. Signed-off-by: Heinrich Schuchardt --- include/efi_variable.h| 39 +++ lib/efi_loader/efi_var_common.c | 62

[PATCH v4 10/17] efi_loader: UEFI variable persistence

2020-07-11 Thread Heinrich Schuchardt
Persist non-volatile UEFI variables in a file on the EFI system partition. The file is written whenever a non-volatile UEFI variable is changed after initialization of the UEFI sub-system. The file is read during the UEFI sub-system initialization to restore non-volatile UEFI variables. Signed-o

[PATCH v4 13/17] efi_loader: new function efi_memcpy_runtime()

2020-07-11 Thread Heinrich Schuchardt
Provide a memcpy() function that we can use at UEFI runtime. Signed-off-by: Heinrich Schuchardt --- include/efi_loader.h | 3 +++ lib/efi_loader/efi_runtime.c | 19 +++ 2 files changed, 22 insertions(+) diff --git a/include/efi_loader.h b/include/efi_loader.h index be6c

[PATCH v4 09/17] efi_loader: secure boot flag

2020-07-11 Thread Heinrich Schuchardt
In audit mode the UEFI variable SecureBoot is set to zero but the efi_secure_boot flag is set to true. The efi_secure_boot flag should match the UEFIvariable SecureBoot. Signed-off-by: Heinrich Schuchardt --- lib/efi_loader/efi_variable.c | 8 ++-- 1 file changed, 2 insertions(+), 6 deletio

[PATCH v4 14/17] efi_loader: memory buffer for variables

2020-07-11 Thread Heinrich Schuchardt
Saving UEFI variable as encoded U-Boot environment variables does not allow support at runtime. Provide functions to manage a memory buffer with UEFI variables. Signed-off-by: Heinrich Schuchardt --- v4: Use memmove() instead of a loop for copying Set efi_current_var in efi_var_m

[PATCH v4 12/17] efi_loader: optional pointer for ConvertPointer

2020-07-11 Thread Heinrich Schuchardt
If the EFI_OPTIONAL_PTR is set in DebugDisposition, a NULL pointer does not constitute an invalid parameter. Signed-off-by: Heinrich Schuchardt --- include/efi_api.h| 2 ++ lib/efi_loader/efi_runtime.c | 6 ++ 2 files changed, 8 insertions(+) diff --git a/include/efi_api.h b/inc

[PATCH v4 11/17] efi_loader: export efi_convert_pointer()

2020-07-11 Thread Heinrich Schuchardt
We need ConvertPointer() to adjust pointers when implementing runtime services within U-Boot. After ExitBootServices() gd is not available anymore. So we should not use EFI_ENTRY() and EFI_EXIT(). Signed-off-by: Heinrich Schuchardt --- include/efi_loader.h | 3 +++ lib/efi_loader/efi_r

[PATCH v4 16/17] efi_loader: enable UEFI variables at runtime

2020-07-11 Thread Heinrich Schuchardt
Enable UEFI variables at runtime. Signed-off-by: Heinrich Schuchardt --- lib/efi_loader/efi_runtime.c | 2 ++ lib/efi_loader/efi_var_file.c | 6 +++--- lib/efi_loader/efi_variable.c | 14 -- 3 files changed, 17 insertions(+), 5 deletions(-) diff --git a/lib/efi_loader/efi_runtime

[PATCH v4 17/17] efi_selftest: adjust runtime test for variables

2020-07-11 Thread Heinrich Schuchardt
As variable services are available at runtime we have to expect EFI_SUCCESS when calling the services. Signed-off-by: Heinrich Schuchardt --- lib/efi_selftest/efi_selftest_variables_runtime.c | 13 ++--- 1 file changed, 6 insertions(+), 7 deletions(-) diff --git a/lib/efi_selftest/efi_s

[PATCH v4 15/17] efi_loader: use memory based variable storage

2020-07-11 Thread Heinrich Schuchardt
Saving UEFI variable as encoded U-Boot environment variables does not allow implement run-time support. Use a memory buffer for storing UEFI variables. Signed-off-by: Heinrich Schuchardt --- v4: correct appending of variables --- lib/efi_loader/efi_variable.c | 562 ++---

Re: [PATCH v2 4/5] mips: cache: Make invalidate_dcache_range() weak to enable overwrite

2020-07-11 Thread Daniel Schwierzeck
> This patch adds __weak to invalidate_dcache_range() in lib/cache.c. This > makes it possible to overwrite this function by a platforms specific > version, which will be done for Octeon. > > Signed-off-by: Stefan Roese > --- > > (no changes since v1) > > arch/mips/lib/cache.c | 2 +- > 1 file

[PATCH 3/4] mips: refactor disabling of caches

2020-07-11 Thread Daniel Schwierzeck
Logically this code belongs to cache_init.S. If a complex SoC needs to replace the generic cache init, mips_cache_disable() can now be called from custom start.S files. Signed-off-by: Daniel Schwierzeck --- arch/mips/cpu/start.S | 9 - arch/mips/lib/cache_init.S | 6 ++ 2 file

[PATCH 1/4] mips: start.S: remove dead code

2020-07-11 Thread Daniel Schwierzeck
Since commit 703ec9ddf965 ("MIPS: Stop building position independent code") the relocation code was completely reworked and removed from start.S. Remove some left-overs of the old code. Signed-off-by: Daniel Schwierzeck --- arch/mips/cpu/start.S | 9 - 1 file changed, 9 deletions(-) di

[PATCH 0/4] MIPS: refactor and cleanup start.S (part 1)

2020-07-11 Thread Daniel Schwierzeck
This is the first part of upcoming refactorings in start.S to cleanup the multiple and hard-to-follow code flows as well as adding more extension points required for modern and complex multi-core SoC's. The first parts concentrates on caches. Daniel Schwierzeck (4): mips: start.S: remove dead

[PATCH 4/4] mips: add config options for generic cache setup code

2020-07-11 Thread Daniel Schwierzeck
Add an own Kconfig symbol for the initial disabling of caches invoked from generic start code. Also add an own Kconfig symbols for the initialization of caches invoked from generic start code. Until now both code paths could only be disabled with CONFIG_SKIP_LOWLEVEL_INIT. But this is not flexibl

[PATCH 2/4] mips: add KSEG1 wrapper for change_k0_cca

2020-07-11 Thread Daniel Schwierzeck
change_k0_cca() is called multiple times. Move the code for changing to KSEG1 to a macro to avoid code duplication. Also fix missing change to KSEG1 when changing to CONF_CM_CACHABLE_COW. Signed-off-by: Daniel Schwierzeck --- arch/mips/lib/cache_init.S | 32 ++-- 1

[PATCH 3/4] mips: sync asm/addrspace.h with Linux 5.7

2020-07-11 Thread Daniel Schwierzeck
Sync asm/addrspace.h with Linux 5.7 Signed-off-by: Daniel Schwierzeck --- arch/mips/include/asm/addrspace.h | 14 ++ 1 file changed, 2 insertions(+), 12 deletions(-) diff --git a/arch/mips/include/asm/addrspace.h b/arch/mips/include/asm/addrspace.h index ae6f586f00..8112ab833e 100

[PATCH 0/4] MIPS: sync asm header files with Linux 5.7 (part 1)

2020-07-11 Thread Daniel Schwierzeck
This is the first part of syncing the MIPS asm header files with Linux 5.7 to get the latest features for newer MIPS cores and MIPS architectures. This also prepares for the upcoming Octeon MIPS64 support. Daniel Schwierzeck (4): mips: remove deprecated UNCACHED_SDRAM() macro mips: sync asm

[PATCH 1/4] mips: remove deprecated UNCACHED_SDRAM() macro

2020-07-11 Thread Daniel Schwierzeck
This macro only served as a wrapper for CKSEG1ADDR() with an exception for CONFIG_TB0229. CONFIG_TB0229 doesn't exist, thus use CKSEG1ADDR() directly. This also prepares for an upcoming asm header sync with Linux. Signed-off-by: Daniel Schwierzeck --- arch/mips/include/asm/addrspace.h | 13 ---

[PATCH 2/4] mips: sync asm/asm.h with Linux 5.7

2020-07-11 Thread Daniel Schwierzeck
Sync asm/asm.h with Linux 5.7. Signed-off-by: Daniel Schwierzeck --- arch/mips/include/asm/asm.h | 130 +++- 1 file changed, 10 insertions(+), 120 deletions(-) diff --git a/arch/mips/include/asm/asm.h b/arch/mips/include/asm/asm.h index 7abcf6df07..a6876e1b07 10

[PATCH 4/4] mips: sync asm/mipsregs.h with Linux 5.7

2020-07-11 Thread Daniel Schwierzeck
Sync asm/mipsregs.h with Linux 5.7. Also replace the custom symbols EBASE_CPUNUM and EBASE_WG with the according symbols from Linux. Signed-off-by: Daniel Schwierzeck --- arch/mips/cpu/start.S|2 +- arch/mips/include/asm/compiler.h | 69 ++ arch/mips/include/asm/isa-rev.h |

Re: [PATCH 14/15] net: sun8i-emac: Lower MDIO frequency

2020-07-11 Thread André Przywara
On 11/07/2020 10:27, Jagan Teki wrote: Hi, > On Mon, Jul 6, 2020 at 6:12 AM Andre Przywara wrote: >> >> When sending a command via the MDIO bus, the Designware MAC expects some >> bits in the CMD register to describe the clock divider value between >> the main clock and the MDIO clock. >> So far

Re: [PATCH 2/3] msm_serial: Read bit rate register value from DT

2020-07-11 Thread Ramon Fried
On Mon, Jul 6, 2020 at 11:38 AM Robert Marko wrote: > > IPQ40xx and currently supported Snapdragon boards don't use the same one > so enable reading it from DT, if no DT property is found default value > is the same as the previous define. > > Signed-off-by: Robert Marko > --- > doc/device-tree-

Re: [PATCH 3/3] msm_gpio: Add support for Qualcomm IPQ40xx

2020-07-11 Thread Ramon Fried
On Mon, Jul 6, 2020 at 11:38 AM Robert Marko wrote: > > Snapdragon SoCs and IPQ40xx use common TLMM IP, > so existing driver supports IPQ40xx as well. > > So lets simply add a compatible for IPQ40xx. > > Signed-off-by: Robert Marko > --- > doc/device-tree-bindings/gpio/gpio-msm.txt | 3 ++- > dr

Re: Pull request for UEFI sub-system for efi-2020-10-rc1 (2)

2020-07-11 Thread Heinrich Schuchardt
On 7/12/20 12:05 AM, Heinrich Schuchardt wrote: > On 7/11/20 2:16 PM, Tom Rini wrote: >> On Sat, Jul 11, 2020 at 09:00:16AM +0200, Heinrich Schuchardt wrote: >>> On 7/10/20 8:09 PM, Tom Rini wrote: On Thu, Jul 09, 2020 at 06:12:02PM +0200, Heinrich Schuchardt wrote: > The following ch

Signing a fit with no images

2020-07-11 Thread Ranran
Hello, I am trying to sign a fit which contains no images. But mkimage returns the following error message "mkimage Can't add hashes to FIT blob: -1". Is it not allowed to sign a fit which contains no images ? Thanks