Hi Peter,
On 2019/11/15 下午9:17, Peter Robinson wrote:
On Wed, Nov 13, 2019 at 3:14 AM Kever Yang wrote:
Add vdd_log node according to rock960 schematic V13.
This patch affect two boards:
- Rock960 Model A
- Ficus
Signed-off-by: Kever Yang
Is there a reason this is getting added to the -u-bo
Hi Heinrich,
(+Chris)
On 16.11.19 11:11, Heinrich Schuchardt wrote:
Hello Stefan,
Gray reporting this bug unfortunately did not provide enough information
to analyze his issue.
Are you aware of any restrictions of the Kirkwood 88F6281 SoC concerning
unaligned access after enabling the unalign
We only need to build and link input.o when we have any of
CONFIG_KEYBOARD, CONFIG_DM_KEYBOARD (and SPL/TPL variants) or
CONFIG_TEGRA_KEYBOARD set.
Signed-off-by: Tom Rini
---
drivers/input/Makefile | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/input/Makefile
On 11/13/19 1:53 AM, AKASHI Takahiro wrote:
Provide test cases for
* image authentication for signed images
(test_efi_secboot/test_signed.py)
* image authentication for unsigned images
(test_efi_secboot/test_unsigned.py)
Signed-off-by: AKASHI Takahiro
---
test/py/tests/test_efi_se
On 11/13/19 1:53 AM, AKASHI Takahiro wrote:
Provide a couple of test cases for variable authentication.
Please, tell us more in the commit message.
Signed-off-by: AKASHI Takahiro
---
.../py/tests/test_efi_secboot/test_authvar.py | 289 ++
1 file changed, 289 insertions(+)
On 11/13/19 1:53 AM, AKASHI Takahiro wrote:
A fixture for UEFI secure boot tests (image authentication and variable
authentication) is defined. A small file system with test data in a single
partition formatted in fat is created.
Why do we need a file system? That seems overly complicated.
Can
On 11/13/19 1:53 AM, AKASHI Takahiro wrote:
A signature database variable is associated with a specific guid.
For convenience, if user doesn't supply any guid info, "env set|print -e"
should complement it.
If secure boot is enforced, users should not be able to change any
security relevant vari
On 11/13/19 1:52 AM, AKASHI Takahiro wrote:
With this commit, EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS
is supported for authenticated variables and the system secure state
will transfer between setup mode and user mode as UEFI specification
section 32.3 describes.
Internally, authentic
On 11/13/19 1:52 AM, AKASHI Takahiro wrote:
In this commit, implemented are a couple of helper functions which will be
used to materialize variable authentication as well as image authentication
in later patches.
In which patch do you implement the unit tests for the new functions? I
would expe
That's not correct and it breaks SMBUS-style reads and and writes for
some chips (e.g. SYR82X/SYR83X).
Stop bit should be sent only after the last message.
Signed-off-by: Vasily Khoruzhick
---
drivers/i2c/rk_i2c.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/drivers/
SYR82X and SYR83X are almost identical to FAN53555, the only difference
is different die ID and revision, voltage ranges and steps.
Signed-off-by: Vasily Khoruzhick
---
drivers/power/pmic/fan53555.c | 7 +++--
drivers/power/regulator/fan53555.c | 45 ++
include/
On 11/13/19 1:52 AM, AKASHI Takahiro wrote:
This commit allows us to use common/image-sig.c even if CONFIG_FIT
is disabled but CONFIG_EFI_LOADER is enabled.
Signed-off-by: AKASHI Takahiro
---
include/image.h | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/inclu
On 11/13/19 1:52 AM, AKASHI Takahiro wrote:
The index (IMAGE_DIRECTORY_ENTRY_CERTTABLE) in a table points to
a region containing authentication information (image's signature)
in PE format.
WIN_CERTIFICATE structure defines an embedded signature format.
Those definitions will be used in my UEFI
According to discussion in the Linux PCI list [1], the dma-ranges should
be continuous and describe the entire inbound window which the controller
can address and not take into account the possible DRAM holes.
Temporarily disable this code which updates the dma-ranges until this
meaning is sorted
On 11/15/19 6:20 PM, Thor Thayer wrote:
>
> Enable TCU access through the Stratix10 CCU so that the
> SMMU can access the SDRAM.
>
[...]
Looks good to me. Ley, can you take a look?
Thanks!
___
U-Boot mailing list
U-Boot@lists.denx.de
https://lists.den
Hello Stefan,
Gray reporting this bug unfortunately did not provide enough information
to analyze his issue.
Are you aware of any restrictions of the Kirkwood 88F6281 SoC concerning
unaligned access after enabling the unaligned flag?
Do you have access to a device with a Kirkwood processor
16 matches
Mail list logo