On Fri, 2016-02-26 at 08:25 +0100, Sascha Hauer wrote:
> BTW I noticed the xload defconfig does not build anymore with this patch
> applied because the image gets too big. I searched for the reason at got
> a step closer. The SDRAM sequencer code is compiled into the image
> multiple times, one tim
Hi Steffen,
On Fri, Feb 26, 2016 at 01:04:44PM +0100, Steffen Trumtrar wrote:
> Instead of generating pseudo random numbers, get random bytes
> from an optional HW generator, if enabled and registered.
>
> Signed-off-by: Steffen Trumtrar
> ---
> lib/random.c | 19 +++
> 1 file c
Upstream has dropped those from the base dtsi, as long as we can't
fully switch to the upstream board DT add the correct alias to the
barebox copy.
Signed-off-by: Lucas Stach
---
arch/arm/dts/tegra30-beaver.dts | 1 +
1 file changed, 1 insertion(+)
diff --git a/arch/arm/dts/tegra30-beaver.dts b
Remove the fixed malloc area size from the defconfig and allow
barebox to calculate the size dynamically.
Signed-off-by: Lucas Stach
---
arch/arm/configs/tegra_v7_defconfig | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/arm/configs/tegra_v7_defconfig
b/arch/arm/configs
From: Lucas Stach
When the kernel load address is chosen by the user/image we need
to check if the kernel needs to relocate itself before decompression.
If that's the case the spacing behind the kernel must allow for this
relocation without overwriting anything placed behind the kernel.
Signed-o
From: Lucas Stach
Instead of having the same logic for uImage and zImage types duplicated
in the code, split it out into a separate function. This does not change
the behavior of the calculation.
Signed-off-by: Lucas Stach
---
arch/arm/lib/bootm.c | 74 ++---
From: Lucas Stach
Before the conversion to use the partition string instead of a plain
integer the default was partition 0, now it's just a NULL pointer.
There are a lot of places where strtoul is called on the partition string
which crashes when encountering the NULL pointer. Instead of fixing
On Fri, 26 Feb 2016 16:19:44 +0100
yegorsli...@googlemail.com wrote:
> From: Yegor Yefremov
>
> Signed-off-by: Yegor Yefremov
> ---
> include/linux/fs.h | 27 +++
> 1 file changed, 27 insertions(+)
>
> diff --git a/include/linux/fs.h b/include/linux/fs.h
> index 7e9886
The struct is based on the Linux v4.5-rc5 crypto codebase.
As the crypto handling in barebox is implemented much simpler,
the struct is also shrunk to the bare minimum.
Signed-off-by: Steffen Trumtrar
---
include/crypto.h | 29 +
1 file changed, 29 insertions(+)
crea
Import just the DES defines part from the v4.0 Linux Kernel
crypto des header.
Signed-off-by: Steffen Trumtrar
---
include/crypto/des.h | 16
1 file changed, 16 insertions(+)
create mode 100644 include/crypto/des.h
diff --git a/include/crypto/des.h b/include/crypto/des.h
new f
Signed-off-by: Steffen Trumtrar
---
arch/arm/mach-imx/clk-imx25.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/arch/arm/mach-imx/clk-imx25.c b/arch/arm/mach-imx/clk-imx25.c
index 7d100783763c..1503128fea5b 100644
--- a/arch/arm/mach-imx/clk-imx25.c
+++ b/arch/arm/mach-imx
The Security Controller (SCC) is found on (at least) i.MX25 SoCs.
It is not a crypto engine in the usual sense. The only supported
algorithm in hardware is 3DES and the key is not configurable, but
is fused in the hardware.
The SCC can be handed some block of data in the red memory space
and it wi
Signed-off-by: Steffen Trumtrar
---
arch/arm/dts/imx25.dtsi | 11 +++
1 file changed, 11 insertions(+)
diff --git a/arch/arm/dts/imx25.dtsi b/arch/arm/dts/imx25.dtsi
index 13fbcc4f8da6..1f3cdf0fe6ba 100644
--- a/arch/arm/dts/imx25.dtsi
+++ b/arch/arm/dts/imx25.dtsi
@@ -23,6 +23,17 @@
From: Yegor Yefremov
The driver was imported from Linux 4.4.
Current implementation supports only XZ decompressor.
Tested-by: Antony Pavlov
Signed-off-by: Yegor Yefremov
---
Changes:
v4: - add promt to mount examples
- rework squashfs_read to enable non linear reading
From: Yegor Yefremov
Signed-off-by: Yegor Yefremov
---
include/linux/types.h | 16
1 file changed, 16 insertions(+)
diff --git a/include/linux/types.h b/include/linux/types.h
index 9f8eb67..f64ec4a 100644
--- a/include/linux/types.h
+++ b/include/linux/types.h
@@ -157,6 +157,2
From: Yegor Yefremov
Signed-off-by: Yegor Yefremov
---
include/linux/fs.h | 27 +++
1 file changed, 27 insertions(+)
diff --git a/include/linux/fs.h b/include/linux/fs.h
index 7e9886a..e11a602 100644
--- a/include/linux/fs.h
+++ b/include/linux/fs.h
@@ -19,6 +19,26 @@
Convert the i.MX6 CAAM RNG to the HWRNG "framework".
Signed-off-by: Steffen Trumtrar
---
- this patch depends on next and the series
"HWRNG: add support for HW Random Number Generators"
drivers/crypto/caam/Kconfig | 1 +
drivers/crypto/caam/caamrng.c | 39 ++-
On Fri, Feb 26, 2016 at 10:32:25AM +0100, gianluca wrote:
> On 02/25/2016 08:27 PM, Andrey Smirnov wrote:
> >On Thu, Feb 25, 2016 at 5:50 AM, gianluca wrote:
> >>Hello list,
> >>I am trying to bootup my custom designed board (actually a rev.0, but I know
> >>it will need a rev.1 ASAP ;-).
> >>
> >
Signed-off-by: Steffen Trumtrar
---
arch/arm/mach-imx/clk-imx25.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/arch/arm/mach-imx/clk-imx25.c b/arch/arm/mach-imx/clk-imx25.c
index 7d100783763c..8fe60e354af9 100644
--- a/arch/arm/mach-imx/clk-imx25.c
+++ b/arch/arm/mach-
Instead of generating pseudo random numbers, get random bytes
from an optional HW generator, if enabled and registered.
Signed-off-by: Steffen Trumtrar
---
lib/random.c | 19 +++
1 file changed, 19 insertions(+)
diff --git a/lib/random.c b/lib/random.c
index 210fea99466e..ff82dd
The driver is ported from Freescales Linux git and can be
found in the
vendor/freescale/imx_2.6.35_maintain
branch.
According to that code, the RNGC is found on Freescales i.MX3/5 SoCs.
The i.MX2x actually has an RNGB, which has no driver implementation
in Freescales kernel. However as i
Hi!
This series adds support for registering a /dev/hwrng like in a
linux system.
Tested with the i.MX25 RNG, that is also added.
Regards,
Steffen
Steffen Trumtrar (5):
drivers: add simple hw_random implementation
lib: random: get_random_bytes from HWRNG if present
ARM: imx25: clk: add rn
Signed-off-by: Steffen Trumtrar
---
arch/arm/dts/imx25.dtsi | 11 +++
1 file changed, 11 insertions(+)
diff --git a/arch/arm/dts/imx25.dtsi b/arch/arm/dts/imx25.dtsi
index 13fbcc4f8da6..612b6c99d226 100644
--- a/arch/arm/dts/imx25.dtsi
+++ b/arch/arm/dts/imx25.dtsi
@@ -23,6 +23,17 @@
Add a simple hw_random implementation based on code from
Linux v4.5-rc5.
All the entropypool initialization stuff is left out and
the obsolete data_read/data_present calls are omitted.
Signed-off-by: Steffen Trumtrar
---
drivers/Kconfig| 1 +
drivers/Makefile | 1 +
dr
On 02/25/2016 08:27 PM, Andrey Smirnov wrote:
On Thu, Feb 25, 2016 at 5:50 AM, gianluca wrote:
Hello list,
I am trying to bootup my custom designed board (actually a rev.0, but I know
it will need a rev.1 ASAP ;-).
I started with the latest (2016.02) barebox version, adding my board to the
Kco
Hi,
I managed to boot a 'raw' image. It is quite straightforward in fact.
Here is what I do:
addpart /dev/mem 0x1000@0x1002(sys)
uncompress raw.boot /dev/mem.sys
go 0x1002
Thank you for your help :)
--
Philippe LEDUC
ledphili...@gmail.com
2016-02-25 10:50 GMT+01:00 Philippe Leduc
Signed-off-by: Teresa Remmet
---
common/oftree.c | 10 +-
include/of.h| 2 +-
2 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/common/oftree.c b/common/oftree.c
index 3103bb1..e98b908 100644
--- a/common/oftree.c
+++ b/common/oftree.c
@@ -140,16 +140,16 @@ static int of
Hi
Am Freitag, 26. Februar 2016, 08:25:06 schrieb Sascha Hauer:
> On Thu, Feb 25, 2016 at 11:29:42AM +0100, Tim Sander wrote:
> > v7: eof whitespace fixes
> >
> > A Patch for supporting the Terasic DE0 NANO-SoC with barebox.
> > The pretty similar Socrates Board was taken as a starting point with
28 matches
Mail list logo