a.git/commit/?h=refs/heads/integration&id=ab2b325c1ab895e626d4e11a9f26b9e7c968f8d8
Signed-off-by: Igor Opaniuk
Co-developed-by: Oleksandr Suvorov
Signed-off-by: Oleksandr Suvorov
---
arch/arm/mach-stm32mp/cpu.c | 23 +++
arch/arm/mach-stm32mp/include/mach
From: Igor Opaniuk
Introduce RSA_SOFTWARE_EXP_TINY Kconfig option, which does not require
DM to be enabled. This can be handy on devices, where SPL + signed
U-Boot FIT image setup is used, where it isn't possible to enable SPL_DM
mainly due to SRAM size constraits.
For example, on iMX8MM
Hi Simon,
On Thu, Apr 29, 2021 at 7:10 PM Simon Glass wrote:
>
> Hi Igor,
>
> On Fri, 16 Apr 2021 at 01:10, Igor Opaniuk wrote:
> >
> > From: Igor Opaniuk
> >
> > Introduce RSA_SOFTWARE_EXP_TINY Kconfig option, which does not require
> > DM to be en
From: Igor Opaniuk
s/psci_features/psci_features_req/g for the case when both
ARCH_SUPPORT_PSCI=y and ARM_PSCI_FW=y, that leads to these
compilation issues:
drivers/firmware/psci.c:69:12: error: conflicting types for 'psci_features'
69 | static int psci_features(u32 ps
From: Igor Opaniuk
s/psci_features/psci_features_req/g for the case when both
ARCH_SUPPORT_PSCI=y and ARM_PSCI_FW=y, that leads to these
compilation issues:
drivers/firmware/psci.c:69:12: error: conflicting types for 'psci_features'
69 | static int psci_features(u32 ps
From: Igor Opaniuk
s/psci_features/request_psci_features/g for the case when both
ARCH_SUPPORT_PSCI=y and ARM_PSCI_FW=y, that leads to these
compilation issues:
drivers/firmware/psci.c:69:12: error: conflicting types for 'psci_features'
69 | static int psci_features(u32 ps
ved immediately afterward, but too late to be
> handled by the suspend main loop. In case either of the IWDG is
> enabled, ping it first and then return to the OS.
>
> Signed-off-by: Marek Vasut
> ---
> Cc: Igor Opaniuk
> Cc: Patrice Chotard
> Cc: Patrick Delaunay
> Cc: Si
such as prbing or removing a device. Subsystems can
> + operations, such as probing or removing a device. Subsystems can
> register a 'spy' function that is called when the event occurs. Such
> subsystems must select this option.
>
> --
> 2
> fdt_blob = (char *)map_sysmem(fdt_addr, 0);
> if (fdt_check_header(fdt_blob))
>
> --
> 2.45.0
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
oid_image_get_data() declaration, and just use
andr_boot_img_hdr_v0 *boot_hdr as first param instead (like it's done
for example in
android_boot_image_v0_v1_v2_parse_hdr()) and then rely on implicit
cast when this
function is used.
this is of course all a matter of preference, just thinking out loud
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
is used (e.g. ethernet)
> + */
> +int bootflow_iter_check_mmc(const struct bootflow_iter *iter);
> +
> /**
> * bootflow_iter_check_sf() - Check that a bootflow uses SPI FLASH
> *
>
> --
> 2.45.0
>
Reviewed-by: Igor Opaniuk
A bit offtopic (just an idea for futu
Android vendor boot image address
> + *
> + * Return: no returned results
> + */
> +void set_avendor_bootimg_addr(ulong addr);
> +
> /**
> * board_fit_config_name_match() - Check for a matching board name
> *
>
> --
> 2.45.0
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
oid_bootmeth_ids[] = {
> + { .compatible = "u-boot,android" },
> + { }
> +};
> +
> +U_BOOT_DRIVER(bootmeth_android) = {
> + .name = "bootmeth_android",
> + .id = UCLASS_BOOTMETH,
> + .of_match = android_bootmeth_ids,
> + .ops= &android_bootmeth_ops,
> + .bind = android_bootmeth_bind,
> +};
> diff --git a/boot/bootmeth_android.h b/boot/bootmeth_android.h
> new file mode 100644
> index ..411c2f2d15e7
> --- /dev/null
> +++ b/boot/bootmeth_android.h
> @@ -0,0 +1,27 @@
> +/* SPDX-License-Identifier: GPL-2.0+ */
> +/*
> + * Bootmethod for Android
> + *
> + * Copyright (C) 2024 BayLibre, SAS
> + * Written by Mattijs Korpershoek
> + */
> +
> +enum android_boot_mode {
> + ANDROID_BOOT_MODE_NORMAL = 0,
> +
> + /* Android "recovery" is a special boot mode that uses another
> ramdisk.
> +* It can be used to "factory reset" a board or to flash logical
> partitions
> +* It operates in 2 modes: adb or fastbootd
> +* To enter recovery from Android, we can do:
> +* $ adb reboot recovery
> +* $ adb reboot fastboot
> +*/
> + ANDROID_BOOT_MODE_RECOVERY,
> +
> + /* Android "bootloader" is for accessing/reflashing physical
> partitions
> +* Typically, this will launch a fastboot process in U-Boot.
> +* To enter "bootloader" from Android, we can do:
> +* $ adb reboot bootloader
> +*/
> + ANDROID_BOOT_MODE_BOOTLOADER,
> +};
> diff --git a/doc/develop/bootstd.rst b/doc/develop/bootstd.rst
> index a07a72581e7a..709fa9e64ff3 100644
> --- a/doc/develop/bootstd.rst
> +++ b/doc/develop/bootstd.rst
> @@ -95,6 +95,7 @@ bootflows.
>
> Note: it is possible to have a bootmeth that uses a partition or a whole
> device
> directly, but it is more common to use a filesystem.
> +For example, the Android bootmeth uses a whole device.
>
> Note that some bootmeths are 'global', meaning that they select the bootdev
> themselves. Examples include VBE and EFI boot manager. In this case, they
> @@ -277,6 +278,9 @@ script_offset_f
> script_size_f
> Size of the script to load, e.g. 0x2000
>
> +vendor_boot_comp_addr_r
> +Address to which to load the vendor_boot Android image, e.g. 0xe000
> +
> Some variables are set by script bootmeth:
>
> devtype
> @@ -418,6 +422,7 @@ Bootmeth drivers are provided for:
> - EFI boot using bootefi from disk
> - VBE
> - EFI boot using boot manager
> + - Android bootflow (boot image v4)
>
>
> Command interface
> @@ -786,6 +791,7 @@ To do
> Some things that need to be done to completely replace the distro-boot
> scripts:
>
> - implement extensions (devicetree overlays with add-on boards)
> +- implement legacy (boot image v2) android boot flow
>
> Other ideas:
>
>
> --
> 2.45.0
>
Some comments after a quick "scan". Will take a more detailed look a
bit later today/tomorrow.
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
img_data.ramdisk_ptr, DIV_ROUND_UP(img_data.ramdisk_size,
> 1024));
> + img_data.ramdisk_addr, DIV_ROUND_UP(img_data.ramdisk_size,
> 1024));
>
> - *rd_data = img_data.ramdisk_ptr;
> + *rd_data = img_data.ramdisk_addr;
>
> *rd_len = img_data.ramdisk_size;
> return 0;
> --
> 2.40.1
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
ge.h b/include/image.h
> index c5b288f62b..7d8ff40c3f 100644
> --- a/include/image.h
> +++ b/include/image.h
> @@ -1826,6 +1826,18 @@ struct andr_image_data;
> bool android_image_get_data(const void *boot_hdr, const void
> *vendor_boot_hdr,
> struct andr_image_data *data);
>
> +/**
> + * android_image_get_valuable_size() - get the size of the android image
> + *
> + * This function checks if the image is Android boot image and returns the
> + * valuable size of the image.
> + *
> + * @hdr_addr: Boot image header address (boot or vendor_boot)
> + *
> + * @return size of the image on success, 0 on failure
> + */
> +size_t android_image_get_valuable_size(const void *hdr_addr);
> +
> struct andr_boot_img_hdr_v0;
>
> /**
> --
> 2.40.1
>
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
data = ops_data;
>
> ops_data->ops.read_from_partition = read_from_partition;
> +#ifdef CONFIG_ANDROID_BOOT_IMAGE
Please use CONFIG_IS_ENABLED() macro
> + ops_data->ops.get_preloaded_partition = get_preloaded_partition;
> +#endif
> ops_data->ops.write_to_partition = write_to_partition;
> ops_data->ops.validate_vbmeta_public_key = validate_vbmeta_public_key;
> ops_data->ops.read_rollback_index = read_rollback_index;
> --
> 2.40.1
>
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
if (android_image_get_dtb_by_index((ulong)hdr, 0,
> + if (android_image_get_dtb_by_index((ulong)hdr,
> get_avendor_bootimg_addr(),
>dtb_idx, &fdt_addr,
> &fdt_size)) {
> fdt_blob = (char *)map_sysmem(fdt_addr, 0);
>
NTAINERS
> index 3c73d8c35c4a..4978470c1664 100644
> --- a/MAINTAINERS
> +++ b/MAINTAINERS
> @@ -70,6 +70,7 @@ F: test/py/tests/test_android/test_ab.py
>
> ANDROID AVB
> M: Igor Opaniuk
> +M: Mattijs Korpershoek
> S: Maintained
> F: cmd/avb.c
>
On Fri, Jan 12, 2024 at 11:08 AM Igor Opaniuk wrote:
>
> Hello Mattijs,
>
> On Fri, Jan 12, 2024 at 9:41 AM Mattijs Korpershoek
> wrote:
> >
> > Igor has not been active for quite some time on lore:
> > https://lore.kernel.org/all/?q=igor.opan...@gmail.com
>
4fec063a242f..3c73d8c35c4a 100644
> --- a/MAINTAINERS
> +++ b/MAINTAINERS
> @@ -59,6 +59,7 @@ F:lib/acpi/
>
> ANDROID AB
> M: Igor Opaniuk
> +M: Mattijs Korpershoek
> R: Sam Protsenko
> S: Maintained
> F: boot/android_ab.c
>
> --
> 2.4
quot;, serial_string);
> -
> - return 0;
> -}
> -
> __weak void stm32mp_misc_init(void)
> {
> }
> diff --git a/arch/arm/mach-stm32mp/stm32mp2/cpu.c
> b/arch/arm/mach-stm32mp/stm32mp2/cpu.c
> index c0f6519e8d7c..301e365cf4f4 100644
> --- a/arch/arm/mach-stm32mp/stm32mp2/cpu.c
> +++ b/arch/arm/mach-stm32mp/stm32mp2/cpu.c
> @@ -69,6 +69,8 @@ void enable_caches(void)
>
> int arch_misc_init(void)
> {
> + setup_serial_number();
> +
> return 0;
> }
>
> --
> 2.25.1
>
Reviewed-by: Igor Opaniuk
--
Best regards - Freundliche Grüsse - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
+48 666 108 041
http://ua.linkedin.com/in/iopaniuk
@@ -67,17 +67,6 @@ void enable_caches(void)
> dcache_enable();
> }
>
> -/* used when CONFIG_DISPLAY_CPUINFO is activated */
> -int print_cpuinfo(void)
> -{
> - char name[SOC_NAME_SIZE];
> -
> - get_soc_name(name);
> - printf("CPU:
gt; +++ b/arch/arm/mach-stm32mp/include/mach/stm32.h
> @@ -197,7 +197,8 @@ enum forced_boot_mode {
> #ifdef CONFIG_STM32MP25X
> #define BSEC_OTP_SERIAL5
> #define BSEC_OTP_RPN 9
> -#define BSEC_OTP_PKG 246
> +#define BSEC_OTP_PKG 122
> +#define BSEC_OTP_MAC 247
&
EN=0x18
> CONFIG_CUSTOM_SYS_INIT_SP_ADDR=0xc040
> CONFIG_ENV_OFFSET=0x90
> CONFIG_DEFAULT_DEVICE_TREE="stm32mp135f-dk"
> -CONFIG_STM32MP13x=y
> +CONFIG_STM32MP13X=y
> CONFIG_DDR_CACHEABLE_SIZE=0x800
> CONFIG_CMD_STM32KEY=y
> -CONFIG_TARGET_ST_STM32MP13x=y
> +CONFIG_TARGET_ST_STM32MP13X=y
> CONFIG_ENV_OFFSET_REDUND=0x94
> CONFIG_CMD_STM32PROG=y
> # CONFIG_ARMV7_NONSEC is not set
> diff --git a/drivers/clk/stm32/Kconfig b/drivers/clk/stm32/Kconfig
> index 7a34ea23c381..7dbddd032b89 100644
> --- a/drivers/clk/stm32/Kconfig
> +++ b/drivers/clk/stm32/Kconfig
> @@ -31,7 +31,7 @@ config CLK_STM32MP1
> config CLK_STM32MP13
> bool "Enable RCC clock driver for STM32MP13"
> depends on ARCH_STM32MP && CLK
> - default y if STM32MP13x
> + default y if STM32MP13X
> select CLK_STM32_CORE
> help
> Enable the STM32 clock (RCC) driver. Enable support for
> --
> 2.25.1
>
Reviewed-by: Igor Opaniuk
--
Best regards - Freundliche Grüsse - Meilleures salutations
Igor Opaniuk
Senior Software Engineer, Embedded & Security
E: igor.opan...@foundries.io
W: www.foundries.io
Add implementation of sc_pm_reset_reason() call for obtaining
reset reason.
Signed-off-by: Igor Opaniuk
---
drivers/misc/imx8/scu_api.c| 22 ++
include/firmware/imx/sci/sci.h | 6 ++
2 files changed, 28 insertions(+)
diff --git a/drivers/misc/imx8/scu_api.c b
Add support for printing reset cause during boot.
Signed-off-by: Igor Opaniuk
---
arch/arm/mach-imx/imx8/cpu.c | 41
1 file changed, 41 insertions(+)
diff --git a/arch/arm/mach-imx/imx8/cpu.c b/arch/arm/mach-imx/imx8/cpu.c
index 39ac0bc4140..0b91e448a5d
what objections/suggestions do you
have in mind?
Thanks!
Regards,
Igor
On Thu, Feb 11, 2021 at 4:39 PM Igor Opaniuk wrote:
>
> Hi Heinrich,
>
> On Thu, Feb 11, 2021 at 5:34 PM Heinrich Schuchardt
> wrote:
> >
> > On 11.02.21 15:56, Ard Biesheuvel wrote:
> > >
Set CONFIG_NET_RANDOM_ETHADDR=y, which sets random eth address in
case there is no configuration provided neither in CONFIG_ETHADDR
nor in "ethaddr" env variable.
This fixes the problem:
poplar# dhcp
Error: ethernet@9841000 address not set.
Signed-off-by: Igor Opaniuk
---
Adjust mem layout, providing more space for linux kernel image.
This fixes the problem:
ERROR: FDT image overlaps OS image (OS=0x3000..0x3258)
Signed-off-by: Igor Opaniuk
---
include/configs/poplar.h | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/include
On Tue, Apr 30, 2024 at 7:44 PM Tom Rini wrote:
>
> Remove from this board vendor directory and when needed
> add missing include files directly.
>
> Signed-off-by: Tom Rini
> ---
> Cc: Peter Griffin
> Cc: Manivannan Sadhasivam
> Cc: Jorge Ramirez-Ortiz
> Cc:
/kp_imx6q_tpc.h:84:#include
./include/configs/imx8mp_venice.h:21:#include
./include/configs/stm32f746-disco.h:30:#include
...
Hope this helps.
[1] https://developer.toradex.com/linux-bsp/os-development/boot/distro-boot/
--
Best regards - Atentamente - Meilleures salutations
Igor Opa
--- a/boot/image.c
> +++ b/boot/image.c
> @@ -26,8 +26,6 @@
> #endif
>
> #include
> -#include
> -#include
> #include
> #include
>
> --
> 2.25.1
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
gor
[1] include/configs/mvebu_armada-37xx.h
[2] include/config_distro_bootcmd.h
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk <http://ua.linkedin.com/in/iopaniuk>
imp_optee.c:37:9: error: implicit declaration of function 'memset'
- Applied R-b and T-b tags
Igor Opaniuk (5):
tee: optee: fix description in Kconfig
cmd: optee_rpmb: close tee session
cmd: optee_rpmb: build cmd for sandbox
test: py: add optee_rpmb tests
tee: remove common.h
Fix OPTEE_TA_AVB symbol description in Kconfig:
s/"write"rb"/"write_rb"/g
Reviewed-by: Heinrich Schuchardt
Reviewed-by: Ilias Apalodimas
Signed-off-by: Igor Opaniuk
---
(no changes since v2)
Changes in v2:
- Applied R-b tags
drivers/tee/optee/Kconfig | 2 +-
1
Add calls for closing tee session after every read/write operation.
Signed-off-by: Igor Opaniuk
---
(no changes since v1)
cmd/optee_rpmb.c | 23 +--
1 file changed, 17 insertions(+), 6 deletions(-)
diff --git a/cmd/optee_rpmb.c b/cmd/optee_rpmb.c
index e0e44bbed04
ted-by: Mattijs Korpershoek
Signed-off-by: Igor Opaniuk
---
(no changes since v2)
Changes in v2:
- Applied R-b and T-b tags
cmd/Kconfig | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/cmd/Kconfig b/cmd/Kconfig
index 61e280fb1a4..227d66a7eea 100644
--- a/cmd/Kconfig
+++ b/cmd/K
Add read/write tests for optee_rpmb cmd.
Signed-off-by: Igor Opaniuk
---
(no changes since v1)
test/py/tests/test_optee_rpmb.py | 20
1 file changed, 20 insertions(+)
create mode 100644 test/py/tests/test_optee_rpmb.py
diff --git a/test/py/tests/test_optee_rpmb.py b
The usage of the common.h include file is deprecated [1], and has already
been removed from several files.
Get rid of all inclusions in the "drivers/tee" directory, and replace it
with required include files directly where needed.
[1] doc/develop/codingstyle.rst
Signed-off-by: Ig
tion by patman. Looks like there is
no
entry in MAINTAINERS for this specific file, that's why only Tom was added.
I'll send a patch for that if you don't mind.
> On Thu, Apr 04, 2024 at 10:13:49AM +0200, Igor Opaniuk wrote:
> > Add calls for closing tee session after every
Jens were
> cc'ed
> > on this. Adding Jens to the party
> >
> > On Thu, Apr 04, 2024 at 10:13:49AM +0200, Igor Opaniuk wrote:
> > > Add calls for closing tee session after every read/write operation.
> >
> > What the patch is pretty obvious, but I am mis
Add orphaned TEE/OP-TEE-related files to TEE subsystem entry in
MAINTAINERS. This includes:
- optee_rpmb cmd and test for it
- Misc. OP-TEE tests
- OP-TEE SCMI agent implementation
- Documentation, including device tree bindings
Signed-off-by: Igor Opaniuk
---
MAINTAINERS | 9 +
1 file
HI Ilias
On Thu, Apr 4, 2024 at 12:15 PM Igor Opaniuk wrote:
> Hi Ilias,
>
> On Thu, Apr 4, 2024 at 10:40 AM Ilias Apalodimas <
> ilias.apalodi...@linaro.org> wrote:
>
>> Hi Igor,
>>
>> I was about to apply the series, but noticed neither me or Jens we
Ilias,
On Thu, Apr 4, 2024 at 1:00 PM Ilias Apalodimas
wrote:
> Hi Igor,
>
> On Thu, 4 Apr 2024 at 13:18, Igor Opaniuk wrote:
> >
> > Hi Ilias,
> >
> > On Thu, Apr 4, 2024 at 10:54 AM Ilias Apalodimas <
> ilias.apalodi...@linaro.org> wrote:
> >&g
Changes in v3:
- Added calls for closing tee session after every read/write operation
Changes in v2:
- Fixed chimp_optee.c:37:9: error: implicit declaration of function 'memset'
- Applied R-b and T-b tags
Igor Opaniuk (5):
tee: optee: fix description in Kconfig
cmd: optee_rpmb: close te
Fix OPTEE_TA_AVB symbol description in Kconfig:
s/"write"rb"/"write_rb"/g
Reviewed-by: Heinrich Schuchardt
Reviewed-by: Ilias Apalodimas
Signed-off-by: Igor Opaniuk
---
(no changes since v2)
Changes in v2:
- Applied R-b tags
drivers/tee/optee/Kconfig | 2 +-
1
registered in OP-TEE OS core (obvious resource leak).
Signed-off-by: Igor Opaniuk
---
Changes in v5:
- Extended commit message, added more details about the reasons why the
change was needed
cmd/optee_rpmb.c | 23 +--
1 file changed, 17 insertions(+), 6 deletions(-)
diff
ted-by: Mattijs Korpershoek
Signed-off-by: Igor Opaniuk
---
(no changes since v2)
Changes in v2:
- Applied R-b and T-b tags
cmd/Kconfig | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/cmd/Kconfig b/cmd/Kconfig
index 61e280fb1a4..227d66a7eea 100644
--- a/cmd/Kconfig
+++ b/cmd/K
Add read/write tests for optee_rpmb cmd.
Signed-off-by: Igor Opaniuk
---
(no changes since v1)
test/py/tests/test_optee_rpmb.py | 20
1 file changed, 20 insertions(+)
create mode 100644 test/py/tests/test_optee_rpmb.py
diff --git a/test/py/tests/test_optee_rpmb.py b
Apalodimas
Signed-off-by: Igor Opaniuk
---
Changes in v5:
- Extended commit message for "cmd: optee_rpmb: close tee session"
- Added R-b tag
Changes in v4:
- Rebased on the latest master and excluded "tee: sandbox: fix spelling errors",
as it was merged already by Heinrich Schu
}
> if (level == 0) {
> err = zio_read(bp, endian, buf, 0, data);
> endian = (zfs_to_cpu64(bp->blk_prop, endian) >>
> 63) & 1;
> --
> 2.44.0
>
>
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk <http://ua.linkedin.com/in/iopaniuk>
> press_up_down_enter_and_wait(0, 3, True, None)
> -# Check the curren BootOrder
> + # Check the current BootOrder
> for i in ('test 3', 'Quit'):
> u_boot_console.p.expect([i])
>
> --
> 2.43.0
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
OWNLOAD=y
> CONFIG_ERRNO_STR=y
> # CONFIG_LMB_USE_MAX_REGIONS is not set
> CONFIG_LMB_MEMORY_REGIONS=2
> --
> 2.25.1
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
USE_DT=y
> +CONFIG_BUTTON=y
> +CONFIG_BUTTON_GPIO=y
> CONFIG_CLK_SCMI=y
> CONFIG_SET_DFU_ALT_INFO=y
> CONFIG_USB_FUNCTION_FASTBOOT=y
> --
> 2.25.1
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
https://www.linkedin.com/in/iopaniuk
Add additional check for buffer size when reading out persistent
storage value and provide back actual value size.
Signed-off-by: Igor Opaniuk
---
drivers/tee/sandbox.c | 10 +++---
1 file changed, 7 insertions(+), 3 deletions(-)
diff --git a/drivers/tee/sandbox.c b/drivers/tee/sandbox.c
init -
This patches rounds down to the nearest multiple of 2MB when
CONFIG_ARMV7_LPAE=y.
Fixes: 3fa914af82("arm: qemu: implement enable_caches()")
Signed-off-by: Igor Opaniuk
---
Changes in v2:
- Adjust commit message, add more details
board/emulation/qemu-arm/qemu-arm.c | 12 ++
Reviewed-by: Igor Opaniuk
On Wed, Jan 31, 2024 at 3:15 PM Weizhao Ouyang wrote:
>
> The 'rng list' command probes all RNG devices and list those devices
> that are successfully probed. Also update the help info.
>
> Reviewed-by: Heinrich Schuchardt
> Signed-off-by:
ARCH_FEATURES0x8001
>
> +#define ARM_SMCCC_VERSION_1_0 0x1
> +#define ARM_SMCCC_VERSION_1_1 0x10001
> +#define ARM_SMCCC_VERSION_1_2 0x10002
> +#define ARM_SMCCC_VERSION_1_3 0x10003
> +
> #define ARM_SMCCC_RET_
On Thu, Feb 1, 2024 at 4:07 AM Bryan Brattlof wrote:
>
> Include the part number for TI's am62px family of SoCs so we can
> properly identify it during boot
>
> Signed-off-by: Bryan Brattlof
Reviewed-by: Igor Opaniuk
> ---
> arch/arm/mach-k3/include/mach/hardwa
.data = &am62x_pd_platdata,
> },
> #endif
> -#ifdef CONFIG_SOC_K3_AM62A7
> +#if IS_ENABLED(CONFIG_SOC_K3_AM62A7)
> {
> .family = "AM62AX",
> .data = &am62ax_pd_platdata,
> --
> 2.43.0
>
Reviewed-by: Igor Opaniuk
--
Best regards - Freundliche Grüsse - Meilleures salutations
Igor Opaniuk
Senior Software Engineer, Embedded & Security
E: igor.opan...@foundries.io
W: www.foundries.io
0x1e, val);
> -
> - return 0;
> -}
> -
> -int board_phy_config(struct phy_device *phydev)
> -{
> - ar8031_phy_fixup(phydev);
> -
> - if (phydev->drv->config)
> - phydev->drv->config(phydev);
> -
> - return 0;
>
1,6 +21,9 @@ CONFIG_SPL_SERIAL=y
> CONFIG_SPL=y
> CONFIG_SPL_LIBDISK_SUPPORT=y
> CONFIG_PCI=y
> +CONFIG_LTO=y
> +CONFIG_HAS_BOARD_SIZE_LIMIT=y
> +CONFIG_BOARD_SIZE_LIMIT=715766
> CONFIG_FIT=y
> CONFIG_SPL_FIT_PRINT=y
> CONFIG_SPL_LOAD_FIT=y
> --
> 2.34.1
>
On Fri, Feb 2, 2024 at 9:34 PM Igor Opaniuk wrote:
>
> On Fri, Feb 2, 2024 at 5:04 PM Fabio Estevam wrote:
> >
> > From: Fabio Estevam
> >
> > U-Boot binary has grown in such a way that it goes beyond the reserved
> > area for the environment variables.
>
Hello Weizhao,
On Fri, Feb 2, 2024 at 4:43 AM Weizhao Ouyang wrote:
>
> Hi Igor,
>
> On Thu, Feb 1, 2024 at 10:36 PM Igor Opaniuk
> wrote:
> >
> > Hello Weizhao,
> >
> > On Wed, Jan 31, 2024 at 3:15 PM Weizhao Ouyang wrote:
> > >
> > >
rd/toradex/common/tdx-cfg-block.h
> index b783537ce76..021cc21b5e2 100644
> --- a/board/toradex/common/tdx-cfg-block.h
> +++ b/board/toradex/common/tdx-cfg-block.h
> @@ -111,6 +111,7 @@ enum {
> APALIS_IMX6Q_NOWINCE,
> APALIS_IMX6D_IT_NOWINCE,
> APALIS
Add myself as co-maintainer for Poplar board, as I'm currently
working on it (re-testing releases, addressing issues etc).
CC: Jorge Ramirez-Ortiz
CC: Shawn Guo
Signed-off-by: Igor Opaniuk
---
board/hisilicon/poplar/MAINTAINERS | 1 +
1 file changed, 1 insertion(+)
diff --git a/
Hi Yang,
On Sat, Feb 3, 2024 at 10:59 AM Yang Xiwen wrote:
>
> On 2/3/2024 5:45 PM, Yang Xiwen wrote:
> > On 2/3/2024 4:32 PM, Jorge Ramirez-Ortiz, Gmail wrote:
> >> On 03/02/24 07:54:22, Shawn Guo wrote:
> >>> On Sat, Feb 3, 2024 at 5:44 AM Igor Opaniuk
> >
lock state for setting
correct
androidboot.verifiedbootstate.
- Adjust AVB documentation, add info about slot_suffix param.
Igor Opaniuk (7):
common: avb_verify: don't call mmc_switch_part for SD
avb: move SPDX license itdentifiers to the first line
common: avb_verify: rework error/de
From: Igor Opaniuk
mmc_switch_part() is used for switching between hw partitions
on eMMC (boot0, boot1, user, rpmb).
There is no need to do that for SD card.
Signed-off-by: Igor Opaniuk
---
common/avb_verify.c | 8 +---
1 file changed, 5 insertions(+), 3 deletions(-)
diff --git a/common
From: Igor Opaniuk
Move SPDX license identifiers to the first line, so it conforms
to license placement rule [1]:
Placement:
The SPDX license identifier in kernel files shall be added at the first
possible line in a file which can contain a comment. For the majority
of files this is the first
From: Igor Opaniuk
Make error prints more verbose with additional context.
Also s/print/debug/g for prints, which might be relevant only
for debugging purposes.
Signed-off-by: Igor Opaniuk
---
common/avb_verify.c | 31 ++-
1 file changed, 18 insertions(+), 13
From: Igor Opaniuk
Introduce AVB_OPS_CHECK macro for checking AvbOps before using
it to avoid code duplication.
Simplify and add more context for prints where it's needed.
Signed-off-by: Igor Opaniuk
---
cmd/avb.c | 156 --
1 file ch
From: Igor Opaniuk
Introduce str_avb_io_error() and str_avb_slot_error() functions,
that provide a pointer to AVB runtime error message.
Signed-off-by: Igor Opaniuk
---
common/avb_verify.c | 49
include/avb_verify.h | 3 ++-
2 files changed, 51
From: Igor Opaniuk
Use existing str_avb_slot_error() function for obtaining
verification fail reason details.
Take into account device lock state for setting correct
androidboot.verifiedbootstate kernel cmdline parameter.
Signed-off-by: Igor Opaniuk
---
cmd/avb.c | 50
From: Igor Opaniuk
Add info about slot_suffix param for avb verify.
Signed-off-by: Igor Opaniuk
---
doc/android/avb2.rst | 8 +---
1 file changed, 5 insertions(+), 3 deletions(-)
diff --git a/doc/android/avb2.rst b/doc/android/avb2.rst
index a072119574f..c0b2bedb831 100644
--- a/doc
From: Igor Opaniuk
Add correct check for parameter count.
This fixes this issue when `hash` cmd is invoked without params:
=> hash
data abort
pc : [] lr : []
reloc pc : [<60019204>]lr : [<5afcffa8>]
sp : ba6dd9c8 ip : bf7391f0 fp : bf74ec14
r10: 0001 r9 :
oaded when booting from a SPI flash memory.
> +
> +config SYS_K3_SPL_ATF
> + bool "Start Cortex-A from SPL"
> + help
> + Enabling this will try to start Cortex-A (typically with ATF)
> + after SPL from R5.
> --
> 2.39.2
>
Reviewed-by: Igo
g at one of the load instruction.
> + *
> +* To avoid the above two conditions disable linefill optimization
> +* inside Cortex R5F.
> +*/
> + asm("mrc p15, 0, %0, c1, c0, 1" : "=r" (actlr));
> + actlr |= (1 << 13); /* Set DLFO bit */
> + asm("mcr p15, 0, %0, c1, c0, 1" : : "r" (actlr));
> +}
> --
> 2.39.2
>
Reviewed-by: Igor Opaniuk
--
Best regards - Freundliche Grüsse - Meilleures salutations
Igor Opaniuk
Senior Software Engineer, Embedded & Security
E: igor.opan...@foundries.io
W: www.foundries.io
or hash calculation.
Comments/objections are welcome!
Regards,
Igor
--
Best regards - Freundliche Grüsse - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
+48 666 108 041
http://ua.linkedin.com/in/iopaniuk
Hi Tom,
On Wed, Feb 7, 2024 at 2:48 PM Tom Rini wrote:
>
> On Wed, Feb 07, 2024 at 02:00:16PM +0100, Igor Opaniuk wrote:
> > Hello,
> >
> > I was playing a bit with different hash functions recently, and
> > it turned out that md5sum, crc32, sha1 cmds just duplica
y
> help
> activate the command "stm32prog usb" for STM32MP soc family
> --
> 2.25.1
>
Reviewed-by: Igor Opaniuk
--
Best regards - Freundliche Grüsse - Meilleures salutations
Igor Opaniuk
Senior Software Engineer, Embedded & Security
E: igor.opan...@foundries.io
W: www.foundries.io
Hi Tom,
On Wed, Feb 7, 2024 at 1:01 AM Igor Opaniuk wrote:
>
> From: Igor Opaniuk
>
> Add correct check for parameter count.
>
> This fixes this issue when `hash` cmd is invoked without params:
>
> => hash
> data abort
> pc : [] lr : []
> reloc
Hello Tom, Peter,
On Wed, Feb 7, 2024 at 3:16 PM Peter Robinson wrote:
>
> On Wed, 7 Feb 2024 at 13:48, Tom Rini wrote:
> >
> > On Wed, Feb 07, 2024 at 02:00:16PM +0100, Igor Opaniuk wrote:
> > > Hello,
> > >
> > > I was playing a bit with different
Hi Mattijs,
On Thu, Feb 8, 2024 at 3:12 PM Mattijs Korpershoek
wrote:
>
> Hi Igor,
>
> Thank you for the patch.
>
> On mar., févr. 06, 2024 at 23:31, Igor Opaniuk
> wrote:
>
> > From: Igor Opaniuk
> >
> > Add info about slot_suffix param for avb v
Hi Mattijs,
On Thu, Feb 8, 2024 at 3:00 PM Mattijs Korpershoek
wrote:
>
> Hi Igor,
>
> Thank you for the patch.
>
> On mar., févr. 06, 2024 at 23:31, Igor Opaniuk
> wrote:
>
> > From: Igor Opaniuk
> >
> > Introduce AVB_OPS_CHECK macro for checkin
Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
http://ua.linkedin.com/in/iopaniuk
Hello Mattijs,
On Fri, Feb 9, 2024 at 11:30 AM Mattijs Korpershoek
wrote:
>
> Hi Igor,
>
> On ven., févr. 09, 2024 at 11:14, Igor Opaniuk wrote:
>
> > Hi everyone,
> >
> > I'm currently planning a big overhaul of the current implementation of
> > AV
only for eMMC.
- Rework do_avb_verify_part, take into account device lock state for setting
correct
androidboot.verifiedbootstate.
- Adjust AVB documentation, sync usage info with the one cmd/avb.c.
Igor Opaniuk (7):
common: avb_verify: don't call mmc_switch_part for SD
avb: move SP
From: Igor Opaniuk
mmc_switch_part() is used for switching between hw partitions
on eMMC (boot0, boot1, user, rpmb).
There is no need to do that for SD card.
Reviewed-by: Mattijs Korpershoek
Signed-off-by: Igor Opaniuk
---
Changes in v2:
- Mattijs Korpershoek R-b tag applied
common
From: Igor Opaniuk
Move SPDX license identifiers to the first line, so it conforms
to license placement rule [1]:
Placement:
The SPDX license identifier in kernel files shall be added at the first
possible line in a file which can contain a comment. For the majority
of files this is the first
From: Igor Opaniuk
Make error prints more verbose with additional context.
Also s/print/debug/g for prints, which might be relevant only
for debugging purposes.
Reviewed-by: Mattijs Korpershoek
Signed-off-by: Igor Opaniuk
---
Changes in v2:
- Mattijs Korpershoek R-b tag applied
common
From: Igor Opaniuk
Simplify and add more context for prints where it's needed.
Signed-off-by: Igor Opaniuk
---
Changes in v2:
- Drop AVB_OPS_CHECK macro and leave previous check
cmd/avb.c | 123 +-
1 file changed, 75 insertions(+
From: Igor Opaniuk
Introduce str_avb_io_error() and str_avb_slot_error() functions,
that provide a pointer to AVB runtime error message.
Reviewed-by: Mattijs Korpershoek
Signed-off-by: Igor Opaniuk
---
Changes in v2:
- Mattijs Korpershoek R-b tag applied
common/avb_verify.c | 49
From: Igor Opaniuk
Use existing str_avb_slot_error() function for obtaining
verification fail reason details.
Take into account device lock state for setting correct
androidboot.verifiedbootstate kernel cmdline parameter.
Reviewed-by: Mattijs Korpershoek
Signed-off-by: Igor Opaniuk
From: Igor Opaniuk
Sync usage info with the one cmd/avb.c.
Signed-off-by: Igor Opaniuk
---
Changes in v2:
- Address Mattijs comment about usage info, sync with cmd/avb.c
doc/android/avb2.rst | 16 +++-
1 file changed, 11 insertions(+), 5 deletions(-)
diff --git a/doc/android
@@
>
> #include
> #include
> +#include
> #include
> #include
> #include
> @@ -99,7 +100,6 @@ int power_init_board(void)
> return 0;
> }
>
> -extern int imx9_probe_mu(void *ctx, struct event *event);
> void board_init_f(ulong dummy)
> {
>
From: Igor Opaniuk
Add support for the SHA-512 Secure Hash Algorithm which uses ARMv8 Crypto
Extensions. The CPU should support ARMv8.2 instruction set and implement
SHA512H, SHA512H2, SHA512SU0, and SHA512SU1 instructions.
This information can be obtained from ID_AA64ISAR0_EL1 (AArch64
Hello Marc,
On Sun, Feb 11, 2024 at 12:12 AM Marc Zyngier wrote:
>
> [Fixing Ard's email address for something more current.]
>
> On Sat, 10 Feb 2024 12:07:09 +0000,
> Igor Opaniuk wrote:
> >
> > From: Igor Opaniuk
> >
> > Add support for the SH
Hi Tom,
On Sun, Feb 11, 2024 at 1:37 AM Tom Rini wrote:
>
> On Sat, Feb 10, 2024 at 01:07:09PM +0100, Igor Opaniuk wrote:
>
> > From: Igor Opaniuk
> >
> > Add support for the SHA-512 Secure Hash Algorithm which uses ARMv8 Crypto
> > Extensions. The CPU should su
and
nitpick: s/ccode/code/g
> +replace it with any required include files directly is much appreciated.
>
> If your file uses driver model, include in the C file. Do not include
> dm.h in a header file. Try to use forward declarations (e.g. ``struct
> --
> 2.34.1
>
Reviewed-by: Igor Opaniuk
--
Best regards - Atentamente - Meilleures salutations
Igor Opaniuk
mailto: igor.opan...@gmail.com
skype: igor.opanyuk
http://ua.linkedin.com/in/iopaniuk
1 - 100 of 973 matches
Mail list logo