On 7/10/20 8:09 PM, Tom Rini wrote:
> On Thu, Jul 09, 2020 at 06:12:02PM +0200, Heinrich Schuchardt wrote:
>
>> The following changes since commit 61608f395e7dcb2be6060407a72a1149b046430a:
>>
>> Merge branch '2020-07-08-misc-features-and-fixes' (2020-07-08 20:20:24
>> -0400)
>>
>> are available i
From: AKASHI Takahiro
Since the certificate table, which is indexed by
IMAGE_DIRECTORY_ENTRY_SECURITY and contains authenticode in PE image,
doesn't always exist, we should make sure that we will retrieve its pointer
only if it exists.
Signed-off-by: AKASHI Takahiro
---
lib/efi_loader/efi_imag
This is a respin of Takahiro's patch series adding a defined time stamp
for time authenticated variables by calling sign-efi-sig-list with -t in
patches 10 - 12.
The original patch 01 of version 3 has been obsoleted by
lib/crypto: use qualified path for x509_parser.h
https://lists.denx.de
From: AKASHI Takahiro
UEFI specification requires that we shall support three type of
certificates of authenticode in PE image:
WIN_CERT_TYPE_EFI_GUID with the guid, EFI_CERT_TYPE_PCKS7_GUID
WIN_CERT_TYPE_PKCS_SIGNED_DATA
WIN_CERT_TYPE_EFI_PKCS1_15
As EDK2 does, we will support the first t
From: AKASHI Takahiro
Since the size check against an entry in efi_search_siglist() is
incorrect, this function will never find out a to-be-matched certificate
and its associated revocation time in the signature list.
Signed-off-by: AKASHI Takahiro
---
lib/efi_loader/efi_signature.c | 5 +++--
From: AKASHI Takahiro
A signed image may have multiple signatures in
- each WIN_CERTIFICATE in authenticode, and/or
- each SignerInfo in pkcs7 SignedData (of WIN_CERTIFICATE)
In the initial implementation of efi_image_authenticate(), the criteria
of verification check for multiple signatures
From: AKASHI Takahiro
In case that a type of certificate in "db" or "dbx" is
EFI_CERT_X509_SHA256_GUID, it is actually not a certificate which contains
a public key for RSA decryption, but a digest of image to be loaded.
If the value matches to a value calculated from a given binary image, it is
From: AKASHI Takahiro
Split the existing test case-1 into case1 and a new case-2:
case-1 for non-SecureBoot mode; case-2 for SecureBoot mode.
In addition, one corner case is added to case-2; a image is signed
but a corresponding certificate is not yet installed in "db."
Signed-off-by: AKASHI Ta
From: AKASHI Takahiro
In this test case, an image is signed multiple times with different
keys. If any of signatures contained is not verified, the whole
authentication check should fail.
Signed-off-by: AKASHI Takahiro
Provide a defined time stamp for dbx_hash1.auth.
Signed-off-by: Heinrich Sc
From: AKASHI Takahiro
Python's autopep8 can automatically correct some of warnings from pylint
and rewrite the code in a pretty print format. So just do it.
Suggested-by: Heinrich Schuchardt
Signed-off-by: AKASHI Takahiro
---
test/py/tests/test_efi_secboot/conftest.py| 74 ++--
From: AKASHI Takahiro
There are a couple of occurrences of hash calculations in which a new
efi_hash_regions will be commonly used.
Signed-off-by: AKASHI Takahiro
---
lib/efi_loader/efi_signature.c | 46 +-
1 file changed, 17 insertions(+), 29 deletions(-)
diff
From: AKASHI Takahiro
Revocation database (dbx) may have not only certificates, but also
message digests of certificates with revocation time
(EFI_CERT_X509_SHA256_GUILD).
In this test case, if the database has such a digest and if the value
matches to a certificate that created a given image's
From: AKASHI Takahiro
Signature database (db or dbx) may have not only certificates that contain
a public key for RSA decryption, but also digests of signed images.
In this test case, if database has an image's digest (EFI_CERT_SHA256_GUID)
and if the value matches to a hash value calculated fro
From: AKASHI Takahiro
More fixes against pylint warnings that autopep8 didn't handle
in the previous commit.
Signed-off-by: AKASHI Takahiro
---
test/py/tests/test_efi_secboot/conftest.py| 11 +--
.../py/tests/test_efi_secboot/test_authvar.py | 91 +--
test/py/tests/test_efi
On Mon, Jun 22, 2020 at 9:25 PM Mikhail Kshevetskiy
wrote:
>
> From: Mikhail Kshevetskiy
>
> Here is an example of spinand driver initialization without CONFIG_DM
> enabled:
>
> void board_nand_init(void)
> {
> static struct spinand_devicespinand;
> static struct mtd_info
On Fri, May 29, 2020 at 11:08 PM Benedikt Spranger
wrote:
>
> The TestBox board is an open hardware enhancement for the Lamobo R1 router
> board. The Testbox board is used in the CI-RT project to manage devices
> under test (https://ci-rt.linutronix.de).
>
> The hardware project is located at http
On Sun, May 31, 2020 at 3:25 PM wrote:
>
> From: Sertac TULLUK
>
> drejo ds167 is an allwinner a20 based custom board
> with twin LVDS LCD and TouchScreen, 7inch and 10.1inch.
> The board has 1G RAM, 8G eMMC, AXP209 PMIC, 10/100 EMAC
> SATA, 2x USB2.0, 1x USB OTG, 3x dry-contact input
> 3x relay
On Tue, Jun 16, 2020 at 9:46 PM Cédric Félizard wrote:
>
> This commit enables the work done in commit ef52605e for the
> A20-OLinuXino_MICRO{,-eMMC} boards. It was previously used only for the
> A20-OLinuXino-Lime2{,-eMMC} boards but is also needed for the MICRO
> boards. Without this, the board
On Fri, Jun 26, 2020 at 5:28 AM Faruk Kılavuz wrote:
>
> Hello
>
> This is my first mail. I tried running uart-0 with microsd breakout method. I
> have added the following codes to open the F port.
>
> diff --git a/arch/arm/include/asm/arch-sunxi/gpio.h
> b/arch/arm/include/asm/arch-sunxi/gpio.h
On Mon, Jul 6, 2020 at 6:12 AM Andre Przywara wrote:
>
> When sending a command via the MDIO bus, the Designware MAC expects some
> bits in the CMD register to describe the clock divider value between
> the main clock and the MDIO clock.
> So far we were omitting these bits, resulting in setting "
On Wed, Jul 8, 2020 at 5:41 PM Nazım Gediz Aydındoğmuş
wrote:
>
> UART4 port of A64 was in conflict with R_UART of older SoCs, like A23.
>
> This commit adds necessary definitions to use UART4 port on A64.
>
> Signed-off-by: Nazım Gediz Aydındoğmuş
> Tested-by: Faruk Kılavuz
> ---
I think this
On Sat, Jul 11, 2020 at 3:06 PM Mikhail Kshevetskiy
wrote:
>
> On Sat, 11 Jul 2020 14:16:23 +0530
> Jagan Teki wrote:
>
> > On Mon, Jun 22, 2020 at 9:25 PM Mikhail Kshevetskiy
> > wrote:
> > >
> > > From: Mikhail Kshevetskiy
> > >
> > > Here is an example of spinand driver initialization withou
fw_setenv usage always locks u-boot-env mtd device without questions.
Locking of flash can be disruptive and may affect not only u-boot-env
region due to different problems with chips and lock callbacks on kernel
side. I'm not sure if my fix is right, but also I thought about possible option
in fw_
u-boot-env flash region lock/unlock may affect other regions than
u-boot-env, fw_setenv does this in a way 'Lock it in any cases'.
Change this to 'lock it if it was locked before'.
Signed-off-by: Ivan Mikhaylov
---
tools/env/fw_env.c | 24 +++-
1 file changed, 19 insertions(+
On Sat, 11 Jul 2020 14:16:23 +0530
Jagan Teki wrote:
> On Mon, Jun 22, 2020 at 9:25 PM Mikhail Kshevetskiy
> wrote:
> >
> > From: Mikhail Kshevetskiy
> >
> > Here is an example of spinand driver initialization without CONFIG_DM
> > enabled:
> >
> > void board_nand_init(void)
> > {
> > s
On Sat, Jul 11, 2020 at 09:00:16AM +0200, Heinrich Schuchardt wrote:
> On 7/10/20 8:09 PM, Tom Rini wrote:
> > On Thu, Jul 09, 2020 at 06:12:02PM +0200, Heinrich Schuchardt wrote:
> >
> >> The following changes since commit
> >> 61608f395e7dcb2be6060407a72a1149b046430a:
> >>
> >> Merge branch '2
Use this macro to fully fill the PCI device ID table. This is mandatory
for the DM PCI support, which checks all the fields.
Signed-off-by: Marek Vasut
Cc: Joe Hershberger
Cc: Ramon Fried
---
drivers/net/dc2114x.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/
For the usage in this driver, the chips are identical,
so support all of them.
Signed-off-by: Marek Vasut
Cc: Joe Hershberger
Cc: Ramon Fried
---
drivers/net/dc2114x.c | 9 -
1 file changed, 9 deletions(-)
diff --git a/drivers/net/dc2114x.c b/drivers/net/dc2114x.c
index e537b29f3d..24
This code is never used, remove it.
Signed-off-by: Marek Vasut
Cc: Joe Hershberger
Cc: Ramon Fried
---
drivers/net/dc2114x.c | 91 ---
1 file changed, 91 deletions(-)
diff --git a/drivers/net/dc2114x.c b/drivers/net/dc2114x.c
index 245218080e..af582c541
The current dc21x4x driver accesses its memory mapped registers directly
instead of using the standard I/O accessors. This can cause problems on
some systems as the accesses can get out of order. So convert the direct
volatile dereferences to use the normal in/out macros.
Signed-off-by: Marek Vasu
Add Kconfig entries for the dc2114x driver and convert various boards.
Signed-off-by: Marek Vasut
Cc: Joe Hershberger
Cc: Ramon Fried
---
README | 3 ---
configs/integratorap_cm720t_defconfig | 1 +
configs/integratorap_cm920t_defconfig | 1 +
configs/integ
This patch replaces the various uses of struct eth_device for accessing
device private data with struct dc2114x_priv, which is compatible both
with DM and non-DM operation.
Signed-off-by: Marek Vasut
Cc: Joe Hershberger
Cc: Ramon Fried
---
drivers/net/dc2114x.c | 135 ++
Introduce dc2114x_priv, which is a super-structure around eth_device
and tracks per-device state and the device IO address.
Signed-off-by: Marek Vasut
Cc: Joe Hershberger
Cc: Ramon Fried
---
drivers/net/dc2114x.c | 25 ++---
1 file changed, 18 insertions(+), 7 deletions(-)
Split the common code from the non-DM code, so it can be reused by
the DM code later. As always, the recv() function had to be split
into the actual receiving part and free_pkt part to fit with the
DM.
Signed-off-by: Marek Vasut
Cc: Joe Hershberger
Cc: Ramon Fried
---
drivers/net/dc2114x.c | 1
Split the RX data check from the rest of the RX function, so that
the check can be performed separately from the processing of the
packet and the release of the received packet once the processing
is finished.
Signed-off-by: Marek Vasut
Cc: Joe Hershberger
Cc: Ramon Fried
---
drivers/net/dc211
With all the changes in place, add support for DM into the
dc2114x driver.
Signed-off-by: Marek Vasut
Cc: Joe Hershberger
Cc: Ramon Fried
---
drivers/net/dc2114x.c | 147 +-
1 file changed, 145 insertions(+), 2 deletions(-)
diff --git a/drivers/net/dc21
The RX/TX DMA descriptor rings are per-device-instance private data,
so move them into the private data.
Signed-off-by: Marek Vasut
Cc: Joe Hershberger
Cc: Ramon Fried
---
drivers/net/dc2114x.c | 92 +--
1 file changed, 46 insertions(+), 46 deletions(-)
This is a trick in preparation for adding DM support. By passing in
the PCI BDF into the phys_to_bus() macros and calling that dev, we
can substitute dev with udevice when DM support lands and do minor
adjustment to the macros to support both DM and non-DM operation.
No functional change.
Signed-o
On Fri, Jul 10, 2020 at 11:07:38AM -0600, Simon Glass wrote:
> Hi Tom,
>
> Results here:
>
> https://gitlab.denx.de/u-boot/custodians/u-boot-dm/pipelines/3981
>
>
> The following changes since commit 506d52308a2f5de48c2b9a08229fee9a0ee2842a:
>
> Merge https://gitlab.denx.de/u-boot/custodian
On Fri, Jul 10, 2020 at 10:04:40PM +0200, Heinrich Schuchardt wrote:
> Call pytest3 with argument -ra to display the reason why Python tests are
> skipped.
>
> The -r flag displays a test summary info for each test. -ra eliminates
> this info for passed tests.
>
> Pros an cons were discussed in:
On Thu, Jul 9, 2020 at 3:09 PM Masahiro Yamada
wrote:
>
> This reverts commit 45f41c134baf5ff1bbf59d33027f6c79884fa4d9.
>
> This weird workaround was the best I came up with at that time
> to boot U-Boot from TF-A.
>
> I noticed U-Boot successfully boots on LD20 (i.e. CA72 CPU) by using
> the late
On Fri, Jul 10, 2020 at 10:32 PM Masahiro Yamada
wrote:
>
> Now that commit fceee65c878c ("mtd: nand: raw: denali: Assert reset
> before deassert") added the reset assertion, this code in the board
> file is unneeded.
>
> Signed-off-by: Masahiro Yamada
> ---
Applied to u-boot-uniphier.
> arch
On Fri, Jul 10, 2020 at 1:13 AM Masahiro Yamada
wrote:
>
> After all, I am not a big fan of using a structure to represent the
> hardware register map.
>
> You do not need to know the entire register map.
>
> Add only necessary register macros.
>
> Use FIELD_PREP() instead of maintaining a pair of
Hi Tom,
Please pull changes for v2020.10
Thanks.
The following changes since commit 3113c84ba25ec3ceae072cc5ad450c4238425939:
Merge tag 'rpi-next-2020.10' of
https://gitlab.denx.de/u-boot/custodians/u-boot-raspberrypi
(2020-07-10 14:31:22 -0400)
are available in the Git repository at:
ht
Hi Bin,
On Tue, 7 Jul 2020 at 19:55, Simon Glass wrote:
>
> Hi Bin,
>
> On Tue, 7 Jul 2020 at 02:26, Bin Meng wrote:
> >
> > Hi Simon,
> >
> > On Mon, Jul 6, 2020 at 11:37 AM Simon Glass wrote:
> > >
> > > With the new MP features the CPUs are no-longer parked when the OS is run.
> > > Fix this
With the new MP features the CPUs are no-longer parked when the OS is run.
Fix this by calling a special function to park them, just before the OS is
started.
Signed-off-by: Simon Glass
Reviewed-by: Wolfgang Wallner
---
Changes in v5:
- Drop timing in mp_park_aps()
Changes in v3:
- Update the
On Wed, Jul 8, 2020 at 6:25 PM Stefano Babic wrote:
>
> On 08.07.20 13:40, Jagan Teki wrote:
> > On Sat, Jun 13, 2020 at 9:11 PM Tom Rini wrote:
> >>
> >> On Sat, Jun 13, 2020 at 07:24:39PM +0530, Jagan Teki wrote:
> >>
> >>> This series updated boards which are using mxc_spi
> >>> driver.
> >>>
Hi Tom,
This PR about dm migration and other SF fixes.
Summary:
- Enable DM_SPI on siemens omap boards (Jagan)
- Dropped some non-dm supported omap3 boards (Jagan)
- Dropped non-dm code in omap3 spi driver (Jagan)
- Dropped non-dm code in kirkwood spi driver (Bhargav)
Travis CI:
https://travis-
On Sat, Jul 11, 2020 at 11:35:12PM +0900, Masahiro Yamada wrote:
> Hi Tom,
>
> Please pull changes for v2020.10
> Thanks.
>
>
>
> The following changes since commit 3113c84ba25ec3ceae072cc5ad450c4238425939:
>
> Merge tag 'rpi-next-2020.10' of
> https://gitlab.denx.de/u-boot/custodians/u-boo
On 7/11/20 2:16 PM, Tom Rini wrote:
> On Sat, Jul 11, 2020 at 09:00:16AM +0200, Heinrich Schuchardt wrote:
>> On 7/10/20 8:09 PM, Tom Rini wrote:
>>> On Thu, Jul 09, 2020 at 06:12:02PM +0200, Heinrich Schuchardt wrote:
>>>
The following changes since commit
61608f395e7dcb2be6060407a72a11
Let the 'printenv -e' command display the read only flag.
If the variable is time authenticated write the time stamp.
Avoid EFI_CALL() when calling SetVariable() and GetVariable().
Signed-off-by: Heinrich Schuchardt
---
cmd/nvedit_efi.c | 24
1 file changed, 16 insertio
UEFI variables OsIndicationsSupported, PlatformLangCodes should be read
only.
Avoid EFI_CALL() for SetVariable().
Signed-off-by: Heinrich Schuchardt
---
lib/efi_loader/efi_setup.c | 59 --
1 file changed, 31 insertions(+), 28 deletions(-)
diff --git a/lib/ef
With this patch series file ubootefi.var in the EFI system partition is
used for saving UEFI variables.
Furthermore the UEFI variables are exposed for reading at runtime.
v4:
Correct appending of variables when using the memory based store.
Performance enhancement for the memory b
Simplify the implementation of the UEFI boot manager:
* avoid EFI_CALL for SetVariable() and GetVariable()
* remove unnecessary type conversions
Signed-off-by: Heinrich Schuchardt
---
lib/efi_loader/efi_bootmgr.c | 28
1 file changed, 12 insertions(+), 16 deletions(
Do not change the value of parameter attributes in function
efi_set_variable_int(). This allows to use it later.
Do not use variable attr for different purposes but declare separate
variables (attr and old_attr).
Signed-off-by: Heinrich Schuchardt
---
lib/efi_loader/efi_variable.c | 24
Set the read only property of the UEFI variables AuditMode and DeployedMode
conforming to the UEFI specification.
Signed-off-by: Heinrich Schuchardt
---
lib/efi_loader/efi_variable.c | 22 +-
1 file changed, 13 insertions(+), 9 deletions(-)
diff --git a/lib/efi_loader/efi_va
We currently have two implementations of UEFI variables:
* variables provided via an OP-TEE module
* variables stored in the U-Boot environment
Read only variables are up to now only implemented in the U-Boot
environment implementation.
Provide a common interface for both implementations that al
According to the UEFI specification the variable VendorKeys is 1 if the
"system is configured to use only vendor-provided keys".
As we do not supply any vendor keys yet the variable VendorKeys must be
zero.
Signed-off-by: Heinrich Schuchardt
---
lib/efi_loader/efi_variable.c | 75 +++---
Separate the remaining UEFI variable API functions GetNextVariableName and
QueryVariableInfo() from internal functions implementing them.
Signed-off-by: Heinrich Schuchardt
---
include/efi_variable.h| 39 +++
lib/efi_loader/efi_var_common.c | 62
Persist non-volatile UEFI variables in a file on the EFI system partition.
The file is written whenever a non-volatile UEFI variable is changed after
initialization of the UEFI sub-system.
The file is read during the UEFI sub-system initialization to restore
non-volatile UEFI variables.
Signed-o
Provide a memcpy() function that we can use at UEFI runtime.
Signed-off-by: Heinrich Schuchardt
---
include/efi_loader.h | 3 +++
lib/efi_loader/efi_runtime.c | 19 +++
2 files changed, 22 insertions(+)
diff --git a/include/efi_loader.h b/include/efi_loader.h
index be6c
In audit mode the UEFI variable SecureBoot is set to zero but the
efi_secure_boot flag is set to true.
The efi_secure_boot flag should match the UEFIvariable SecureBoot.
Signed-off-by: Heinrich Schuchardt
---
lib/efi_loader/efi_variable.c | 8 ++--
1 file changed, 2 insertions(+), 6 deletio
Saving UEFI variable as encoded U-Boot environment variables does not allow
support at runtime.
Provide functions to manage a memory buffer with UEFI variables.
Signed-off-by: Heinrich Schuchardt
---
v4:
Use memmove() instead of a loop for copying
Set efi_current_var in efi_var_m
If the EFI_OPTIONAL_PTR is set in DebugDisposition, a NULL pointer does not
constitute an invalid parameter.
Signed-off-by: Heinrich Schuchardt
---
include/efi_api.h| 2 ++
lib/efi_loader/efi_runtime.c | 6 ++
2 files changed, 8 insertions(+)
diff --git a/include/efi_api.h b/inc
We need ConvertPointer() to adjust pointers when implementing runtime
services within U-Boot.
After ExitBootServices() gd is not available anymore. So we should not use
EFI_ENTRY() and EFI_EXIT().
Signed-off-by: Heinrich Schuchardt
---
include/efi_loader.h | 3 +++
lib/efi_loader/efi_r
Enable UEFI variables at runtime.
Signed-off-by: Heinrich Schuchardt
---
lib/efi_loader/efi_runtime.c | 2 ++
lib/efi_loader/efi_var_file.c | 6 +++---
lib/efi_loader/efi_variable.c | 14 --
3 files changed, 17 insertions(+), 5 deletions(-)
diff --git a/lib/efi_loader/efi_runtime
As variable services are available at runtime we have to expect EFI_SUCCESS
when calling the services.
Signed-off-by: Heinrich Schuchardt
---
lib/efi_selftest/efi_selftest_variables_runtime.c | 13 ++---
1 file changed, 6 insertions(+), 7 deletions(-)
diff --git a/lib/efi_selftest/efi_s
Saving UEFI variable as encoded U-Boot environment variables does not allow
implement run-time support.
Use a memory buffer for storing UEFI variables.
Signed-off-by: Heinrich Schuchardt
---
v4:
correct appending of variables
---
lib/efi_loader/efi_variable.c | 562 ++---
> This patch adds __weak to invalidate_dcache_range() in lib/cache.c. This
> makes it possible to overwrite this function by a platforms specific
> version, which will be done for Octeon.
>
> Signed-off-by: Stefan Roese
> ---
>
> (no changes since v1)
>
> arch/mips/lib/cache.c | 2 +-
> 1 file
Logically this code belongs to cache_init.S.
If a complex SoC needs to replace the generic cache init,
mips_cache_disable() can now be called from custom start.S files.
Signed-off-by: Daniel Schwierzeck
---
arch/mips/cpu/start.S | 9 -
arch/mips/lib/cache_init.S | 6 ++
2 file
Since commit 703ec9ddf965 ("MIPS: Stop building position independent code")
the relocation code was completely reworked and removed from start.S.
Remove some left-overs of the old code.
Signed-off-by: Daniel Schwierzeck
---
arch/mips/cpu/start.S | 9 -
1 file changed, 9 deletions(-)
di
This is the first part of upcoming refactorings in start.S to
cleanup the multiple and hard-to-follow code flows as well as
adding more extension points required for modern and complex
multi-core SoC's. The first parts concentrates on caches.
Daniel Schwierzeck (4):
mips: start.S: remove dead
Add an own Kconfig symbol for the initial disabling of caches
invoked from generic start code.
Also add an own Kconfig symbols for the initialization of caches
invoked from generic start code.
Until now both code paths could only be disabled with
CONFIG_SKIP_LOWLEVEL_INIT. But this is not flexibl
change_k0_cca() is called multiple times. Move the code for
changing to KSEG1 to a macro to avoid code duplication.
Also fix missing change to KSEG1 when changing to CONF_CM_CACHABLE_COW.
Signed-off-by: Daniel Schwierzeck
---
arch/mips/lib/cache_init.S | 32 ++--
1
Sync asm/addrspace.h with Linux 5.7
Signed-off-by: Daniel Schwierzeck
---
arch/mips/include/asm/addrspace.h | 14 ++
1 file changed, 2 insertions(+), 12 deletions(-)
diff --git a/arch/mips/include/asm/addrspace.h
b/arch/mips/include/asm/addrspace.h
index ae6f586f00..8112ab833e 100
This is the first part of syncing the MIPS asm header files with
Linux 5.7 to get the latest features for newer MIPS cores and
MIPS architectures. This also prepares for the upcoming Octeon
MIPS64 support.
Daniel Schwierzeck (4):
mips: remove deprecated UNCACHED_SDRAM() macro
mips: sync asm
This macro only served as a wrapper for CKSEG1ADDR() with an
exception for CONFIG_TB0229. CONFIG_TB0229 doesn't exist, thus
use CKSEG1ADDR() directly.
This also prepares for an upcoming asm header sync with Linux.
Signed-off-by: Daniel Schwierzeck
---
arch/mips/include/asm/addrspace.h | 13 ---
Sync asm/asm.h with Linux 5.7.
Signed-off-by: Daniel Schwierzeck
---
arch/mips/include/asm/asm.h | 130 +++-
1 file changed, 10 insertions(+), 120 deletions(-)
diff --git a/arch/mips/include/asm/asm.h b/arch/mips/include/asm/asm.h
index 7abcf6df07..a6876e1b07 10
Sync asm/mipsregs.h with Linux 5.7. Also replace the custom
symbols EBASE_CPUNUM and EBASE_WG with the according symbols
from Linux.
Signed-off-by: Daniel Schwierzeck
---
arch/mips/cpu/start.S|2 +-
arch/mips/include/asm/compiler.h | 69 ++
arch/mips/include/asm/isa-rev.h |
On 11/07/2020 10:27, Jagan Teki wrote:
Hi,
> On Mon, Jul 6, 2020 at 6:12 AM Andre Przywara wrote:
>>
>> When sending a command via the MDIO bus, the Designware MAC expects some
>> bits in the CMD register to describe the clock divider value between
>> the main clock and the MDIO clock.
>> So far
On Mon, Jul 6, 2020 at 11:38 AM Robert Marko wrote:
>
> IPQ40xx and currently supported Snapdragon boards don't use the same one
> so enable reading it from DT, if no DT property is found default value
> is the same as the previous define.
>
> Signed-off-by: Robert Marko
> ---
> doc/device-tree-
On Mon, Jul 6, 2020 at 11:38 AM Robert Marko wrote:
>
> Snapdragon SoCs and IPQ40xx use common TLMM IP,
> so existing driver supports IPQ40xx as well.
>
> So lets simply add a compatible for IPQ40xx.
>
> Signed-off-by: Robert Marko
> ---
> doc/device-tree-bindings/gpio/gpio-msm.txt | 3 ++-
> dr
On 7/12/20 12:05 AM, Heinrich Schuchardt wrote:
> On 7/11/20 2:16 PM, Tom Rini wrote:
>> On Sat, Jul 11, 2020 at 09:00:16AM +0200, Heinrich Schuchardt wrote:
>>> On 7/10/20 8:09 PM, Tom Rini wrote:
On Thu, Jul 09, 2020 at 06:12:02PM +0200, Heinrich Schuchardt wrote:
> The following ch
Hello,
I am trying to sign a fit which contains no images.
But mkimage returns the following error message "mkimage Can't add
hashes to FIT blob: -1".
Is it not allowed to sign a fit which contains no images ?
Thanks
84 matches
Mail list logo