[U-Boot] exclude email by patman

2016-02-08 Thread york sun
Simon, Is there a way to exclude specific emails from the CC list when using patman? The no-longer-existed email address got rejected by SMTP server. York ___ U-Boot mailing list U-Boot@lists.denx.de http://lists.denx.de/mailman/listinfo/u-boot

[U-Boot] [RFC PATCH v1 1/2] arm: ls1021aqds: Convert to driver model and enable serial support

2016-02-08 Thread York Sun
Split duart configuration as device tree file. Move /chosen node out of board commone device tree. Convert ls1021aqds nor and SD configurations to driver model support (qspi already uses DM). Enable ns16550 DM serial driver for nor configurations. Signed-off-by: York Sun CC: Alison Wang CC: Bin

[U-Boot] [RFC PATCH v1 0/2] Convert ls1021aqds to use driver model for serial ports

2016-02-08 Thread York Sun
Since a recent merge 5160def "dm: lpuart: Drop the legacy code", ls1021aqds_ddr4_nor_lpuart and ls1021aqds_nor_lpuart failed to compile because they are using legacy driver for lpuart. Following ls1021atwr, ls1021aqds should be converted as well. Not tested on boards yet. Serial DM driver is not e

[U-Boot] [PATCH] OMAP3: omap3_logic: Grow SPL to 64K from 54K

2016-02-08 Thread Adam Ford
Based on the work done by Overo, this seems to help some compilers that have a hard time fitting all the code into the allocated space. Signed-off-by: Adam Ford --- include/configs/omap3_logic.h | 6 ++ 1 file changed, 6 insertions(+) diff --git a/include/configs/omap3_logic.h b/include/con

[U-Boot] [RFC PATCH v1 2/2] arm: ls1021aqds: Enable driver model lpuart serial driver

2016-02-08 Thread York Sun
Convert ls1021aqds_nor_lpuart and ls1021aqds_ddr4_nor_lpuart to driver model suport. Enable lpuart port driver. Signed-off-by: York Sun CC: Alison Wang CC: Bin Meng --- arch/arm/dts/Makefile|1 + arch/arm/dts/ls1021a-qds-lpuart.dts | 16

[U-Boot] [PATCH 1/2] test/py: don't import pexpect

2016-02-08 Thread Stephen Warren
From: Stephen Warren The code replaced pexpect with custom code long ago. Don't import the unused module so it doesn't need to be installed. Signed-off-by: Stephen Warren --- test/py/conftest.py | 1 - 1 file changed, 1 deletion(-) diff --git a/test/py/conftest.py b/test/py/conftest.py index

[U-Boot] [PATCH 2/2] Enable test/py for sandbox in Travis CI

2016-02-08 Thread Stephen Warren
From: Stephen Warren This provides runtime test coverage in Travis, in addition to the existing build coverage. Signed-off-by: Stephen Warren --- .travis.yml | 8 1 file changed, 8 insertions(+) diff --git a/.travis.yml b/.travis.yml index 8caaeb34553e..18bf2ed4fcdb 100644 --- a/.tra

[U-Boot] [PATCH] Makefile: remove BUILD_TAG from KBUILD_CFLAGS

2016-02-08 Thread Stephen Warren
From: Stephen Warren If BUILD_TAG is part of KBUILD_CFLAGS, then any time the value changes, all files get rebuilt. In a continuous integration environment, the value will change every build. This wastes time assuming that incremental builds would otherwise occur. To solve this, remove BUILD_TAG

[U-Boot] [PATCH] OMAP3LOGIC: Update maintainer

2016-02-08 Thread Adam Ford
I will take this over from Peter Barada, since I work with it daily at Logic PD. Signed-off-by: Adam Ford --- board/logicpd/omap3som/MAINTAINERS | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/board/logicpd/omap3som/MAINTAINERS b/board/logicpd/omap3som/MAINTAINERS index ffe2

[U-Boot] [PATCH] Fix variable documented in README.distro for PXE address.

2016-02-08 Thread Vagrant Cascadian
Fixes typo of pxe_addr_r with pxefile_addr_r. Signed-off-by: Vagrant Cascadian --- doc/README.distro | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/doc/README.distro b/doc/README.distro index 3715c8c..e1b7216 100644 --- a/doc/README.distro +++ b/doc/README.distro @@ -243,7

Re: [U-Boot] [PATCH] Fix variable documented in README.distro for PXE address.

2016-02-08 Thread Stephen Warren
On 02/08/2016 08:55 PM, Vagrant Cascadian wrote: > Fixes typo of pxe_addr_r with pxefile_addr_r. Reviewed-by: Stephen Warren ___ U-Boot mailing list U-Boot@lists.denx.de http://lists.denx.de/mailman/listinfo/u-boot

[U-Boot] [PATCH v4 01/14] armv8: ls2080: Add SFP Configs for LS2080/LS2085

2016-02-08 Thread Saksham Jain
In LS2080/LS2085, SFP is LE and Ver is 3.4 The base address is 0x01e80200 SFP will be used in Secure Boot to read fuses. Signed-off-by: Aneesh Bansal Signed-off-by: Saksham Jain --- Changes for v2: - No changes Changes for v3: - No changes Changes for v4: - Cleaned up com

[U-Boot] [PATCH v4 00/14] Add Support for Secure Boot on LS208x

2016-02-08 Thread Saksham Jain
Secure Boot ESBC has been enabled on FSL LS208x platforms. Changes for v2: - changed function fsl_secboot_validate to return address of image - corrected Bootscript header for ls1043 and ls1021 Changes for v3: - minor changes to remove compilation warnings Changes ofr v4:

[U-Boot] [PATCH v4 02/14] armv8: ls2080: Add Secure Boot configs: SEC, Security Monitor, SRK and RCW

2016-02-08 Thread Saksham Jain
For ls2080, Added configs for various IPs used during secure boot Added address and endianness for SEC and Security Monitor. SRK - Fuses in SFP (Fused for public keys hash) These are stored in LE format. Signed-off-by: Aneesh Bansal Signed-off-by: Saksham Jain --- Changes for v2: - No

[U-Boot] [PATCH v4 05/14] armv8: fsl-lsch3: Add bootscript header address for Secure Boot

2016-02-08 Thread Saksham Jain
During secure boot, Linux image along with other images are validated using bootscript. This bootscript also needs to be validated before it is executed. This requires a header for bootscript. When secure boot is enabled, default bootcmd is changed to first validate bootscript using the header and

[U-Boot] [PATCH v4 04/14] SECURE BOOT: Add Secure Boot support on ls2080aqds/rdb

2016-02-08 Thread Saksham Jain
Following changes have been made to enable secure boot: 1) Sec_init has been called in starting to initialize SEC Block (CAAM) which will be used for Secure Boot validation later for both ls2080a qds and rdb 2) 64Bit address in ESBC Header has been enabled as this SoC is based on armv8 3) Secure Bo

[U-Boot] [PATCH v4 03/14] SECURE BOOT: Add new ESBC header for ls-ch3 Secure Boot

2016-02-08 Thread Saksham Jain
For Secure Boot, a header is used to identify key table, signature and image address. For LS-CH3, there is a new header structure being used. The following changes are there in the new header: 1) Currently IE Table (Key extension) feature is not supported 2) Single Key feature is not supported. Ke

[U-Boot] [PATCH v4 06/14] SECURE BOOT: Copy Bootscript and header from NOR to DDR for LS2080/5

2016-02-08 Thread Saksham Jain
During Secure Boot, a bootscript is validated using its header. This patch copies both these images to DDR from NOR and then validates and executed them from DDR. (If NOR is the boot source for LS2080 and LS2085). This copy step is done to make this step common across booting sources. Because in c

[U-Boot] [PATCH v4 09/14] armv8: fsl-lsch3: Disable SMMU during Secure Boot

2016-02-08 Thread Saksham Jain
During secure boot, SMMU is enabled on POR by SP bootrom. SMMU needs to be put in Bypass mode in uboot to enable CAAM transcations to pass through. During Nonsecure Boot, SP BootROM doesn't enable SMMU and at reset SMMU is in bypass mode. Signed-off-by: Aneesh Bansal Signed-off-by: Saksham Jain

Re: [U-Boot] [U-Boot, PATCHv2] common/memsize.c: Simplify RAM size detection

2016-02-08 Thread Eddy Petrișor
2016-02-08 22:49 GMT+02:00 Tom Rini : > On Tue, Feb 02, 2016 at 10:15:28PM +0200, Eddy Petrișor wrote: > >> The case of memory of size 0 is not that different from a memory of any other >> size, so we remove the duplicate code and treat the small differences when it >> is the case. >> >> Signed-off

[U-Boot] [PATCH v4 08/14] armv8 : ls2080: Add config for endianess of CCSR GUR

2016-02-08 Thread Saksham Jain
The GUR (DCFG) registers in CCSR space are in LE format for ls2080/ls2085. Defined a config CONFIG_SYS_FSL_CCSR_GUR_LE in arch/arm/include/asm/arch-fsl-layerscape/config.h Signed-off-by: Aneesh Bansal Signed-off-by: Saksham Jain --- Changes for v2: - No changes Changes for v3: -

[U-Boot] [PATCH v4 07/14] SECURE BOOT: Change env variable "fdt_high" for LS2080a and LS2085a

2016-02-08 Thread Saksham Jain
"fdt_high" env variable has been changed to 0xa000 for ls2080a and ls2085a during Secure Boot. This env_varible is used to specify the upper limit to be used for copying flat device tree. This address must be visible to kernel. The "fdt_high" value has been set during Secure Boot to same value

[U-Boot] [PATCH v4 14/14] SECURE BOOT: Change fsl_secboot_validate function to output image addr

2016-02-08 Thread Saksham Jain
Currently, fsl_secboot_validate function used to set env variable "img_addr" to contain address of image being validated. The function has been changed to output image addr via argument img_addr_ptr. The command esbc_validate sets the env variable "img_addr". This change helps when fsl_secboot_va

[U-Boot] [PATCH v4 10/14] crypto/fsl: Correct 64bit Write when MMU disabled

2016-02-08 Thread Saksham Jain
When MMU is disabled, 64bit Write must be at a memory aligned at 64bit Boundary. So, this commit splits the 64bit write into 2 -32bit writes as the memory location is not guaranteed to be 64bit aligned. The alignment exception only occurs when MMU is disabled. Signed-off-by: Aneesh Bansal Signed-

[U-Boot] [PATCH v4 13/14] SECURE BOOT: Halt execution when secure boot fail after reset request

2016-02-08 Thread Saksham Jain
In case of fatal failure during secure boot execution (e.g. header not found) it is needed that the execution stops. Earlier, we were asserting reset request in case in case of failure. But if the RESET_REQ is not tied off to HRESET, this allows the execution to continue. This can either be taken

[U-Boot] [PATCH v4 12/14] SECURE_BOOT: Use default bootargs during Secure Boot

2016-02-08 Thread Saksham Jain
For secure boot, currently we were using fixed bootargs for all SoCs. This is not needed and we can use the bootargs which are used in non-secure boot. Incase bootargs are not defined for non-secure boot of any platform, we use default bootargs. Signed-off-by: Aneesh Bansal Signed-off-by: Saksham

[U-Boot] [PATCH v4 11/14] crypto/fsl: Make CAAM transactions cacheable

2016-02-08 Thread Saksham Jain
To solve CAAM coherency issue on ls2080a and ls2085a. When Caches are enabled and CAAM's DMA's AXI transcations are not made cacheable, Core reads/write data from/to Caches and CAAM does from Main Memory. This forces data flushes to synchronize various data structures But even if any data in proxim

<    1   2