[PATCH v2 3/6] pci: msc01: convert to driver model

2021-07-15 Thread Daniel Schwierzeck
This driver is currently only used on MIPS Malta boards. Signed-off-by: Daniel Schwierzeck Reviewed-by: Simon Glass --- Changes in v2: - add empty line before return statements drivers/pci/pci_msc01.c | 72 - 1 file changed, 71 insertions(+), 1 deleti

[PATCH v2 4/6] MIPS: malta: add DT bindings for PCI host controller

2021-07-15 Thread Daniel Schwierzeck
Add DT binding for GT64120 and MSC01 PCI controllers. Only GT64120 is enabled by default to support Qemu. The MSC01 node will be dynamically enabled by Malta board code dependent on the plugged core card. Signed-off-by: Daniel Schwierzeck --- (no changes since v1) arch/mips/dts/mti,malta.dts |

[PATCH v2 5/6] MIPS: malta: add support for PCI driver model

2021-07-15 Thread Daniel Schwierzeck
As almost all peripherals are connected via PCI dependent on the used core card, PCI setup is always required. Thus run pci_init() including PCI scanning and probing and core card specific setups in board_early_init_r(). Also prepare support for dynamically managing the status of the different PCI

[PATCH v2 6/6] MIPS: malta: enable PCI driver model

2021-07-15 Thread Daniel Schwierzeck
Enable DM_PCI and DM_ETH on MIPS Malta. Signed-off-by: Daniel Schwierzeck --- (no changes since v1) arch/mips/Kconfig | 4 1 file changed, 4 insertions(+) diff --git a/arch/mips/Kconfig b/arch/mips/Kconfig index e54801673b..6b1f10d9a0 100644 --- a/arch/mips/Kconfig +++ b/arch/mips/Kconf

Re: [PATCH 9/9] sandbox: tpm: Support extending a PCR multiple times

2021-07-15 Thread Ilias Apalodimas
On Mon, Jul 05, 2021 at 09:48:49AM -0600, Simon Glass wrote: > It is fairly easy to handle this case and it makes the emulator more > useful, since PCRs are commonly extended several times. > > Add support for this, using U-Boot's sha256 support. > > Signed-off-by: Simon Glass > --- > > driver

Re: [PATCH v4 1/5] spl: mmc: Support OP-TEE payloads in Falcon mode

2021-07-15 Thread Alex G.
On 7/15/21 1:27 PM, Patrick DELAUNAY wrote: Hi, [snip] When I merge this patch on master branch, I get the error: arm:  +   imx6dl_mamoj +spl/u-boot-spl.bin exceeds file size limit: +  limit:  0xefa0 bytes +  actual: 0xf41d bytes +  excess: 0x47d bytes +make[1]: *** [Makefile:1997: spl/u-

[PATCH v5 0/5] stm32mp: Enable OP-TEE and TZC support in SPL

2021-07-15 Thread Alexandru Gagniuc
v4 branch was reported to have some issues with SPL becoming too big on some platforms (e.g. imx6dl_mamoj) This is fixed by dropping the call to genimg_get_os_name(). Alexandru Gagniuc (5): spl: mmc: Support OP-TEE payloads in Falcon mode spl: Introduce spl_board_prepare_for_optee() hook arm

[PATCH v5 1/5] spl: mmc: Support OP-TEE payloads in Falcon mode

2021-07-15 Thread Alexandru Gagniuc
In general, Falcon mode means we're booting a linux kernel directly. With FIT images, however, an OP-TEE secure kernel can be booted before linux. Thus, if the next stage is an IH_OS_TEE, this isn't necessarily a problem. Of course, a general solution would involve mmc_load_image_raw_os() only loa

[PATCH v5 2/5] spl: Introduce spl_board_prepare_for_optee() hook

2021-07-15 Thread Alexandru Gagniuc
OP-TEE requires some particular setup, which is not needed for linux or other payloads. Add a hook for platform-specific code to perform any OP-TEE related configuration and initialization. A weak function is used because it is symmetrical to other spl_board_prepare_for_*() implementations. A solu

[PATCH v5 4/5] stm32mp1: spl: Configure TrustZone controller for OP-TEE

2021-07-15 Thread Alexandru Gagniuc
OP-TEE is very particular about how the TZC should be configured. When booting an OP-TEE payload, an incorrect TZC configuration will result in a panic. Most information can be derived from the SPL devicetree. The only information we don't have is the split between TZDRAM and shared memory. This h

[PATCH v5 3/5] arm: stm32mp: Implement support for TZC 400 controller

2021-07-15 Thread Alexandru Gagniuc
The purpose of this change is to allow configuring TrustZone (TZC) memory permissions. For example, OP-TEE expects TZC regions to be configured in a very particular way. The API presented here is intended to allow exactly that. UCLASS support is not implemented, because it would not be too useful.

[PATCH v5 5/5] ARM: dts: stm32mp: Add OP-TEE reserved memory to SPL dtb

2021-07-15 Thread Alexandru Gagniuc
Add the "/reserved-memory/optee" node to the SPL devicetree. The purpose is to allow configuring TZC regions when booting OP-TEE. Signed-off-by: Alexandru Gagniuc Reviewed-by: Simon Glass --- arch/arm/dts/stm32mp157a-dk1-u-boot.dtsi | 3 +++ 1 file changed, 3 insertions(+) diff --git a/arch/ar

Re: [PATCH 9/9] sandbox: tpm: Support extending a PCR multiple times

2021-07-15 Thread Ilias Apalodimas
On Thu, 15 Jul 2021 at 22:04, Ilias Apalodimas wrote: > > On Mon, Jul 05, 2021 at 09:48:49AM -0600, Simon Glass wrote: > > It is fairly easy to handle this case and it makes the emulator more > > useful, since PCRs are commonly extended several times. > > > > Add support for this, using U-Boot's s

Re: u-boot and mtdparts

2021-07-15 Thread Tom Rini
On Thu, Jul 15, 2021 at 08:13:55PM +0200, Marek Behún wrote: > Hello Tom and others, > > many boards still use the obsolete mtdparts command. > What is the plan with this command? Do we still want to support it? > > Recently as discovered by Masami, my patch > mtd: spi-nor: allow registering

Re: [PATCH 17/27] ppc: Remove T1023RBD boards and T1024RDB_SECURE_BOOT

2021-07-15 Thread Tom Rini
On Thu, Jul 15, 2021 at 10:24:09AM +0200, gianluca wrote: > Hello list! > I know this mail will be OT, but I am worried about what will happen to a > new project using the PowerPC T2080,e6500 64-bit PPC on this web site: > > https://www.powerpc-notebook.org > > I suspect the same architecture wi

u-boot@lists.denx.de

2021-07-15 Thread Andre Przywara
On Thu, 15 Jul 2021 13:18:59 +0300 Ivan Uvarov wrote: Hi Ivan, > The Forlinx OKA40i-C devboard makes use of UARTs 0,2,3,4,5 and 7 of the R40 > SoC, of which UART 0 is connected to an RS232 converter, UART 5 routed to > an RS485 converter, and the rest broken out directly via labeled headers. > T

using binman fails boot

2021-07-15 Thread Tim Harvey
Greetings, I'm taking a look at moving imx8mm-venice to use binman for packaging. After doing so U-Boot proper fails to boot: U-Boot SPL 2021.07-00475-g1126252f40 (Jul 15 2021 - 11:09:02 -0700) GSC : v58 0xf098 RST:VIN Thermal Protection Disabled Model : GW7300-00-B1B Serial : 852420 MFGDa

Re: [PATCH 2/2] arm: allwinner: r40: add devicetree for Forlinx FETA40i-C & OKA40i-C

2021-07-15 Thread Andre Przywara
On Thu, 15 Jul 2021 13:19:00 +0300 Ivan Uvarov wrote: Hi Ivan, thanks for sending this upstream! > The FETA40i-C is a SoM by Forlinx based on the Allwinner R40/A40i. > > SoM specifications: > > - SoC: R40 or A40i > - PMIC: AXP221S > - RAM: 1GiB/2GiB DDR3 (dual-rank) > - eMMC: 8GB, > - Mates w

Re: [TF-A] Proposal: TF-A to adopt hand-off blocks (HOBs) for information passing between boot stages

2021-07-15 Thread Julius Werner
> - fuller implementation with more features Is that a good thing? Didn't we just have a long discussion eschewing a heavy-handed, bulky hand-off block design in favor of more simple and flexible structures? I think simplicity is key for this and the bl_aux_params are trying to be about as simple

[PATCH] efi_loader: set partition GUID in device path for SIG_TYPE_GUID

2021-07-15 Thread Alfonso Sánchez-Beato
Previously, the GPT device GUID was being used instead of the partition, which was incorrect. Signed-off-by: Alfonso Sánchez-Beato Reviewed-by: Heinrich Schuchardt --- lib/efi_loader/efi_device_path.c | 7 +-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/lib/efi_loader/efi_

[RESEND PATCH v3 3/4] NSA310S : Use Ethernet PHY name from device tree

2021-07-15 Thread Tony Dinh
In DM Ethernet, the old "egiga0" name is no longer valid, so replace it with Ethernet PHY name from device tree. Also, Ethernet PHY address is available so read it from device tree. Reviewed-by: Stefan Roese Signed-off-by: Tony Dinh --- Changes in v3: - Get eth0 PHY address from device tree Ch

Re: using binman fails boot

2021-07-15 Thread Simon Glass
Hi Tim, On Thu, 15 Jul 2021 at 16:58, Tim Harvey wrote: > > Greetings, > > I'm taking a look at moving imx8mm-venice to use binman for packaging. > After doing so U-Boot proper fails to boot: > > U-Boot SPL 2021.07-00475-g1126252f40 (Jul 15 2021 - 11:09:02 -0700) > GSC : v58 0xf098 RST:VIN Th

Re: [PATCH] Disable timer check in file loading

2021-07-15 Thread Michael Chang
On Thu, Jul 15, 2021 at 04:51:35PM +0200, Heinrich Schuchardt wrote: > On 7/8/21 10:22 AM, Michael Chang wrote: > > The u-boot efi console service registers a timer to poll the keyboard > > input in every 50ns. In the efi block io service, this timer is > > The event is triggered every 5000 ns not

[PATCH v2 00/14] aspeed: Support secure boot chain with FIT image verification

2021-07-15 Thread Chia-Wei Wang
This patch series intends to provide a secure boot chain from SPL to Linux kernel based on the hash and signature verification of FIT image paradigm. To improve the performance and save code size (SPL is limited to 64KB due to HW-RoT), the drviers of two HW crypto engine HACE and ARCY are also a

[PATCH v2 04/14] ast2600: spl: Add HACE probing

2021-07-15 Thread Chia-Wei Wang
From: Joel Stanley Probe HACE driver in SPL board init if enabled. Signed-off-by: Joel Stanley Signed-off-by: Chia-Wei Wang --- arch/arm/mach-aspeed/ast2600/spl.c | 14 ++ 1 file changed, 14 insertions(+) diff --git a/arch/arm/mach-aspeed/ast2600/spl.c b/arch/arm/mach-aspeed/ast

[PATCH v2 02/14] clk: ast2600: Add YCLK control for HACE

2021-07-15 Thread Chia-Wei Wang
From: Joel Stanley Add YCLK enable for HACE, the HW hash engine of ASPEED AST2600 SoCs. Signed-off-by: Joel Stanley Signed-off-by: Chia-Wei Wang --- .../arm/include/asm/arch-aspeed/scu_ast2600.h | 5 +++-- drivers/clk/aspeed/clk_ast2600.c | 20 +++ 2 files change

[PATCH v2 03/14] crypto: aspeed: Add AST2600 HACE support

2021-07-15 Thread Chia-Wei Wang
From: Joel Stanley Hash and Crypto Engine (HACE) is designed to accelerate the throughput of hash data digest, and symmetric-key encryption. Signed-off-by: Joel Stanley Signed-off-by: Chia-Wei Wang --- drivers/crypto/Kconfig | 2 + drivers/crypto/Makefile | 1 + d

[PATCH v2 01/14] aspeed: ast2600: Enlarge SRAM size

2021-07-15 Thread Chia-Wei Wang
The AST2600 SRAM has been extended to 88KB since A1 chip revision. This patch updates the SRAM size to offer more space for early stack/heap use. Signed-off-by: Chia-Wei Wang --- arch/arm/include/asm/arch-aspeed/platform.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/

[PATCH v2 08/14] crypto: aspeed: Add AST2600 ARCY support

2021-07-15 Thread Chia-Wei Wang
ARCY is deisnged to accerlerate ECC/RSA digital signature generation and verification. Signed-off-by: Chia-Wei Wang --- drivers/crypto/aspeed/Kconfig | 10 ++ drivers/crypto/aspeed/Makefile | 1 + drivers/crypto/aspeed/aspeed_arcy.c | 182 lib/rsa/Kconf

[PATCH v2 09/14] ast2600: spl: Add ARCY probing

2021-07-15 Thread Chia-Wei Wang
Probe ARCY driver in SPL board init if enabled. Signed-off-by: Chia-Wei Wang --- arch/arm/mach-aspeed/ast2600/spl.c | 6 ++ 1 file changed, 6 insertions(+) diff --git a/arch/arm/mach-aspeed/ast2600/spl.c b/arch/arm/mach-aspeed/ast2600/spl.c index a0fc420ff1..2172bb4ae7 100644 --- a/arch/ar

[PATCH v2 07/14] clk: ast2600: Add RSACLK control for ARCY

2021-07-15 Thread Chia-Wei Wang
Add RSACLK enable for ARCY, the HW RSA/ECC crypto engine of ASPEED AST26xx SoCs. Signed-off-by: Chia-Wei Wang --- arch/arm/include/asm/arch-aspeed/scu_ast2600.h | 1 + drivers/clk/aspeed/clk_ast2600.c | 15 +++ 2 files changed, 16 insertions(+) diff --git a/arch/arm/i

[PATCH v2 10/14] ARM: dts: ast2600: Add ARCY to device tree

2021-07-15 Thread Chia-Wei Wang
Add ARCY DTS node and enable it for AST2600 EVB. Signed-off-by: Chia-Wei Wang --- arch/arm/dts/ast2600-evb.dts | 5 + arch/arm/dts/ast2600.dtsi| 9 + 2 files changed, 14 insertions(+) diff --git a/arch/arm/dts/ast2600-evb.dts b/arch/arm/dts/ast2600-evb.dts index adb80a30ef..fd4e

[PATCH v2 11/14] ast2600: spl: Locate load buffer in DRAM space

2021-07-15 Thread Chia-Wei Wang
Return CONFIG_SYS_LOAD_ADDR pointing to DRAM space for spl_get_load_buffer() to allow generic SPL image loading code (e.g. FIT and Ymodem) to store data in DRAM. Signed-off-by: Chia-Wei Wang --- arch/arm/mach-aspeed/ast2600/spl.c | 9 + 1 file changed, 1 insertion(+), 8 deletions(-) dif

[PATCH v2 06/14] common: fit: Use hash.c to call CRC/SHA function

2021-07-15 Thread Chia-Wei Wang
From: Joel Stanley Currently the FIT verification calls directly into SW implemented functions to get a CRC/SHA/MD5 hash. This patch removes duplcated algorithm lookup and use hash_lookup_algo to get the hashing function with HW accelearation supported if configured. The MD5 direct call remains

[PATCH v2 05/14] ARM: dts: ast2600: Add HACE to device tree

2021-07-15 Thread Chia-Wei Wang
From: Joel Stanley Add HACE DTS node and enable it for AST2600 EVB. Signed-off-by: Joel Stanley Signed-off-by: Chia-Wei Wang --- arch/arm/dts/ast2600-evb.dts | 5 + arch/arm/dts/ast2600.dtsi| 8 2 files changed, 13 insertions(+) diff --git a/arch/arm/dts/ast2600-evb.dts b/ar

[PATCH v2 14/14] configs: ast2600: Boot kernel FIT in DRAM

2021-07-15 Thread Chia-Wei Wang
AST2600 leverages the FIT hash/signature verification to fulfill secure boot trust chain. To improve the performance and save SW code size for those crypto operations, the two HW crypto engine, HACE and ARCY, are enabled. However, both of the engines can only access to data stored in DRAM space. T

[PATCH v2 13/14] configs: aspeed: Make EXTRA_ENV_SETTINGS board specific

2021-07-15 Thread Chia-Wei Wang
Move CONFIG_EXTRA_ENV_SETTINGS to board-specific configuration headers. Signed-off-by: Chia-Wei Wang --- include/configs/aspeed-common.h | 9 - include/configs/evb_ast2500.h | 6 ++ include/configs/evb_ast2600.h | 6 ++ 3 files changed, 12 insertions(+), 9 deletions(-) diff

Re: [PATCH 1/3] efi_capsule: Move signature from DTB to .rodata

2021-07-15 Thread Masami Hiramatsu
2021年7月16日(金) 2:00 Ilias Apalodimas : > > The capsule signature is now part of our DTB. This is problematic when a > user is allowed to change/fixup that DTB from U-Boots command line since he > can overwrite the signature as well. > So Instead of adding the key on the DTB, embed it in the u-boot

[PATCH v2 12/14] configs: ast2600-evb: Enable SPL FIT support

2021-07-15 Thread Chia-Wei Wang
Enable SPL FIT image load and verification support. The HW accelerated SHA is also available with the newly added support of the HACE HW hash engine. Signed-off-by: Chia-Wei Wang --- configs/evb-ast2600_defconfig | 24 +--- 1 file changed, 21 insertions(+), 3 deletions(-) di

Re: [PATCH 2/3] mkeficapsule: Remove dtb related options

2021-07-15 Thread Masami Hiramatsu
2021年7月16日(金) 2:00 Ilias Apalodimas : > > commit 322c813f4bec ("mkeficapsule: Add support for embedding public key in a > dtb") > added a bunch of options enabling the addition of the capsule public key > in a dtb. Since now we embeded the key in U-Boot's .rodata we don't this > this functionalit

Re: [PATCH] smbios: Fix calculating BIOS Release Date

2021-07-15 Thread Heinrich Schuchardt
On 4/22/21 6:09 PM, Pali Rohár wrote: BIOS Release Date must be in format mm/dd/ and must be release date. %s/BIOS/The SMBIOS/ Please add a reference to the System Management BIOS (SMBIOS) Reference Specification here an as comment in the code. U-Boot currently sets BIOS Release Date fro

Re: [PATCH] efi_loader: Use %pD to log device-path instead of local efi_dp_str()

2021-07-15 Thread Heinrich Schuchardt
On 7/14/21 7:19 AM, Masami Hiramatsu wrote: Use %pD to log device-path instead of using efi_dp_str() and efi_free_pool() locally in find_boot_device(). This is a cleanup patch, no feature update nor fix. Suggested-by: Heinrich Schuchardt Signed-off-by: Masami Hiramatsu Reviewed-by: Heinrich

Re: [PATCH 1/3] efi_capsule: Move signature from DTB to .rodata

2021-07-15 Thread Sughosh Ganu
On Thu, 15 Jul 2021 at 22:30, Ilias Apalodimas wrote: > The capsule signature is now part of our DTB. This is problematic when a > user is allowed to change/fixup that DTB from U-Boots command line since he > can overwrite the signature as well. > So Instead of adding the key on the DTB, embed i

Re: [PATCH 3/3] doc: Update CapsuleUpdate READMEs

2021-07-15 Thread Heinrich Schuchardt
On 7/15/21 7:00 PM, Ilias Apalodimas wrote: Since we removed embeddingg the capsule key into a .dtb and fixed authenticated capsule updates for all boards, move the relevant documentation in the efi file and update it accordingly Signed-off-by: Ilias Apalodimas --- doc/board/emulation/qemu_ca

<    1   2