Signed-off-by: Andrew F. Davis <a...@ti.com>
---
configs/A10-OLinuXino-Lime_defconfig| 1 +
configs/A10s-OLinuXino-M_defconfig | 1 +
configs/A13-OLinuXinoM_defconfig| 1 +
configs/A13-OLinuXino_defconfig
unsigned files. Fix this by not generating these
fake unsigned *_HS files.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
arch/arm/mach-omap2/config_secure.mk | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/arm/mach-omap2/config_secure.mk
b/arch/arm/mach
/moveconfig.py -s'.
Do this here.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
configs/A10-OLinuXino-Lime_defconfig | 2 +-
configs/A20-OLinuXino-Lime2_defconfig | 2 +-
configs/A20-OLinuXino-Lime_defconfig | 2 +-
configs/A20-OLinuXino_MICRO_def
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
configs/sandbox_defconfig | 1 +
configs/sandbox_noblk_defconfig | 1 +
configs/sandbox_spl_defconfig | 1 +
disk/Kconfig| 8
include/configs/sandbox.h | 1 -
5 files changed, 11 insertions(+), 1 de
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
Kconfig | 2 ++
disk/Kconfig | 11 +++
include/config_defaults.h | 1 -
3 files changed, 13 insertions(+), 1 deletion(-)
create mode 100644 disk/Kconfig
diff --git a/Kconfig b/Kconfig
index a
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
configs/CPCI4052_defconfig | 1 +
configs/M5253DEMO_defconfig | 1 +
configs/M5253EVBE_defconfig | 1 +
configs/MIP405T_defconfig
On 11/14/2016 06:33 PM, Simon Glass wrote:
> Hi Andrew,
>
> On 14 November 2016 at 15:05, Andrew F. Davis <a...@ti.com> wrote:
>> On 11/14/2016 02:44 PM, Simon Glass wrote:
>>> Hi Andrew,
>>>
>>> On 14 November 2016 at 12:14, And
Currently we let U-Boot find a spot at the end of DRAM at runtime, this
forces us to build an OPTEE image based on the size of DRAM for an EVM.
Add a default address that works across all current AM57xx EVMs.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
configs/am57xx_hs_evm_defconf
Currently we let U-Boot find a spot at the end of DRAM at runtime, this
forces us to build an OPTEE image based on the size of DRAM for an EVM.
Add a default address that works across all current DRA7xx EVMs.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
configs/dra7xx_hs_evm_defconf
ed-off-by: Harinarayan Bhatta <harinara...@ti.com>
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
arch/arm/include/asm/omap_sec_common.h | 6 ++
arch/arm/mach-omap2/omap5/sec-fxns.c | 108 +
include/tee/optee.h| 30 +
3
Add an OPTEE node to the FDT when TEE installation has completed
successfully. This informs the kernel of the presence of OPTEE.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
arch/arm/mach-omap2/omap5/fdt.c | 35 ++-
1 file changed, 34 insertions(+), 1 de
Populate the corresponding TEE image processing call to be
performed during FIT loadable processing.
Signed-off-by: Andrew F. Davis <a...@ti.com>
Reviewed-by: Tom Rini <tr...@konsulko.com>
---
board/ti/am57xx/board.c | 7 +++
1 file changed, 7 insertions(+)
diff --git a/boa
Add a new image type representing Trusted Execution Environment (TEE)
image types. For example, an OP-TEE OS binary image.
Signed-off-by: Andrew F. Davis <a...@ti.com>
Reviewed-by: Simon Glass <s...@chromium.org>
---
common/image.c | 1 +
include/image.h | 1 +
2 files changed,
node to kernel fdt, this was missing
from the last set to complete the working solution
Changes from v1:
- Added some additional documentation
- Last 4 patches are now the compleate working TEE loading solution for
our DRA7xx/AM57xx platforms, not just an example
Andrew F. Davis (5
or
loading this image.
Signed-off-by: Andrew F. Davis <a...@ti.com>
Reviewed-by: Simon Glass <s...@chromium.org>
---
common/image.c| 33 +
doc/uImage.FIT/source_file_format.txt | 4 +++-
include/image.h
Populate the corresponding TEE image processing call to be
performed during FIT loadable processing.
Signed-off-by: Andrew F. Davis <a...@ti.com>
Reviewed-by: Simon Glass <s...@chromium.org>
Reviewed-by: Tom Rini <tr...@konsulko.com>
---
board/ti/dra7xx/evm.c | 7 +++
Bhatta <harinara...@ti.com>
Signed-off-by: Andrew F. Davis <a...@ti.com>
Reviewed-by: Tom Rini <tr...@konsulko.com>
---
arch/arm/include/asm/omap_common.h | 1 +
arch/arm/mach-omap2/omap5/Makefile | 1 +
arch/arm/mach-omap2/omap5/sec_entry_cpu1.S | 123 ++
On 11/29/2016 02:18 PM, Tom Rini wrote:
> On Tue, Nov 29, 2016 at 01:03:37PM -0600, Andrew F. Davis wrote:
>
>> From: Harinarayan Bhatta <harinara...@ti.com>
>>
>> secure_tee_install is used to install and initialize a secure TEE OS such as
>> Linaro OP-TEE
ed-off-by: Harinarayan Bhatta <harinara...@ti.com>
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
arch/arm/include/asm/omap_sec_common.h | 6 ++
arch/arm/mach-omap2/omap5/sec-fxns.c | 114 +
2 files changed, 120 insertions(+)
diff --git a/ar
Populate the corresponding TEE image processing call to be
performed during FIT loadable processing.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
board/ti/am57xx/board.c | 7 +++
1 file changed, 7 insertions(+)
diff --git a/board/ti/am57xx/board.c b/board/ti/am57xx/board.c
index f
Add a new image type representing Trusted Execution Environment (TEE)
image types. For example, an OP-TEE OS binary image.
Signed-off-by: Andrew F. Davis <a...@ti.com>
Reviewed-by: Simon Glass <s...@chromium.org>
---
common/image.c | 1 +
include/image.h | 1 +
2 files changed,
DRA7xx/AM57xx platforms, not just an example
Andrew F. Davis (4):
image: Add FIT image loadable section custom processing
image: Add Trusted Execution Environment image type
board: ti: dra7xx: add FIT image TEE processing
board: ti: am57xx: add FIT image TEE processing
Harinarayan Bhatta (2
Bhatta <harinara...@ti.com>
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
arch/arm/include/asm/omap_common.h | 1 +
arch/arm/mach-omap2/omap5/Makefile | 1 +
arch/arm/mach-omap2/omap5/sec_entry_cpu1.S | 123 +
3 files changed, 125 insertio
Populate the corresponding TEE image processing call to be
performed during FIT loadable processing.
Signed-off-by: Andrew F. Davis <a...@ti.com>
Reviewed-by: Simon Glass <s...@chromium.org>
---
board/ti/dra7xx/evm.c | 7 +++
1 file changed, 7 insertions(+)
diff --git a/boa
or
loading this image.
Signed-off-by: Andrew F. Davis <a...@ti.com>
Reviewed-by: Simon Glass <s...@chromium.org>
---
common/image.c| 33 +
doc/uImage.FIT/source_file_format.txt | 4 +++-
include/image.h
On 11/23/2016 08:20 PM, Simon Glass wrote:
> Hi Andrew,
>
> On 21 November 2016 at 13:14, Andrew F. Davis <a...@ti.com> wrote:
>> To help automate the loading of custom image types we add the ability
>> to define custom handlers for the loadable section types. When w
the FIT header but instead
only update our local understanding of the image data. This also allows
us to re-run post-processing steps if needed.
Signed-off-by: Andrew F. Davis <a...@ti.com>
Tested-by: Carlos Hernandez <c...@ti.com>
---
common/image-fit.c | 29 ++---
Add a new image type representing Trusted Execution Environment (TEE)
image types. For example, an OP-TEE OS binary image.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
common/image.c | 1 +
include/image.h | 1 +
2 files changed, 2 insertions(+)
diff --git a/common/image.c b/common/i
Populate the corresponding TEE image processing call to be
performed during FIT loadable processing.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
board/ti/dra7xx/evm.c | 7 +++
1 file changed, 7 insertions(+)
diff --git a/board/ti/dra7xx/evm.c b/board/ti/dra7xx/evm.c
index 3
in this series is and example of how one can now add a
handler for an image type for their platform.
Thanks,
Andrew
[0] http://lists.denx.de/pipermail/u-boot/2016-November/272614.html
Andrew F. Davis (3):
image: Add FIT image loadable section custom processing
image: Add Trusted Execution Environment
or
loading this image.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
common/image.c | 33 +
include/image.h | 11 +++
2 files changed, 44 insertions(+)
diff --git a/common/image.c b/common/image.c
index 7604494..2aac90d 100644
--- a/common/image.c
+++
On 11/18/2016 11:56 AM, Andrew F. Davis wrote:
> The config option TARGET_K2x_EVM is set by the k2x defconfigs to pick
> a board target, but the header configs also set K2x_EVM. This config
> is redundant, remove it and use TARGET_K2x_EVM everywhere in its place.
>
> Signed-o
NFS loading support has been added to the default environment for
most boot components, as PMMC and MON loading were added later they
did not originally get the NFS commands added, add these now.
Signed-off-by: Andrew F. Davis <a...@ti.com>
Reviewed-by: Lokesh Vutla <lokeshvu.
The config option TARGET_K2x_EVM is set by the k2x defconfigs to pick
a board target, but the header configs also set K2x_EVM. This config
is redundant, remove it and use TARGET_K2x_EVM everywhere in its place.
Signed-off-by: Andrew F. Davis <a...@ti.com>
Reviewed-by: Lokesh Vutla <
On 11/14/2016 02:44 PM, Simon Glass wrote:
> Hi Andrew,
>
> On 14 November 2016 at 12:49, Andrew F. Davis <a...@ti.com> wrote:
>> To help automate the loading of a TEE image during the boot we add a new
>> FIT section type 'tee', when we see this type while loading
On 11/14/2016 06:34 PM, Simon Glass wrote:
> Hi Andrew,
>
> On 14 November 2016 at 14:55, Andrew F. Davis <a...@ti.com> wrote:
>> On 11/14/2016 02:44 PM, Simon Glass wrote:
>>> Hi Andrew,
>>>
>>> On 14 November 2016 at 12:49, Andrew F. Davis <a.
On 11/15/2016 01:55 AM, Michal Simek wrote:
> Hi Andrew,
>
> On 14.11.2016 20:49, Andrew F. Davis wrote:
>> To help automate the loading of a TEE image during the boot we add a new
>> FIT section type 'tee', when we see this type while loading the loadable
>> sec
On 11/14/2016 02:44 PM, Simon Glass wrote:
> Hi Andrew,
>
> On 14 November 2016 at 12:14, Andrew F. Davis <a...@ti.com> wrote:
>> Introduce CONFIG_SPL_ABORT_ON_NON_FIT_IMAGE. An SPL which define
>> this will abort image loading if the image is not a FIT image.
>>
Disable support for loading non-FIT images for AM57xx platforms using
the high-security (HS) device variant.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
configs/am57xx_hs_evm_defconfig | 1 +
1 file changed, 1 insertion(+)
diff --git a/configs/am57xx_hs_evm_defconfig b/c
Disable support for loading non-FIT images for DRA7xx platforms using
the high-security (HS) device variant.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
configs/dra7xx_hs_evm_defconfig | 1 +
1 file changed, 1 insertion(+)
diff --git a/configs/dra7xx_hs_evm_defconfig b/c
Introduce CONFIG_SPL_ABORT_ON_NON_FIT_IMAGE. An SPL which define
this will abort image loading if the image is not a FIT image.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
Kconfig | 9 +
common/spl/spl.c | 5 +
2 files changed, 14 insertions(+)
diff --git a/Kco
Disable support for loading non-FIT images for AM437x platforms using
the high-security (HS) device variant.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
configs/am43xx_hs_evm_defconfig | 1 +
1 file changed, 1 insertion(+)
diff --git a/configs/am43xx_hs_evm_defconfig b/c
OPTEE OS for the
AM57xx EVM";
kernel = "kernel@1";
fdt = "am57xx-evm.dtb";
loadables = "am57xx-evm.optee";
};
...
Thanks,
Andrew
[0] git://git.ti.com/ti-u-boot/ti-u-boot.git
Andrew F. Davis (1):
image
To help automate the loading of a TEE image during the boot we add a new
FIT section type 'tee', when we see this type while loading the loadable
sections we automatically call the platforms TEE processing function on
this image section.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
K
-archive.com/u-boot@lists.denx.de/msg219253.html
Changes from v1:
- Changed to abort on non-FIT so other boot methods can be attempted.
- Made this a default if SPL_FIT_SIGNATURE is selected.
Andrew F. Davis (4):
Introduce CONFIG_SPL_ABORT_ON_NON_FIT_IMAGE
ARM: AM57xx: Disable non-FIT based
The config option TARGET_K2E_EVM is set by the k2x defconfigs to pick
a board target, but the header configs also set K2E_EVM. This config
is redundant, remove it and use TARGET_K2E_EVM everywhere in its place.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
arch/arm/mach-keystone/Makefil
NFS loading support has been added to the default environment for
most boot components, as PMMC and MON loading were added later they
did not originally get the NFS commands added, add these now.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
include/configs/ti_armv7_keystone2.h | 3
On 10/31/2016 03:39 PM, Simon Glass wrote:
> This code currently always selects the second source. It only worked
> because both sources are set up.
>
> With the change to only init video devices that are present in the stdout
> environment variable, this fails. Fix it.
>
> Signed-off-by: Simon
On 10/06/2016 12:55 AM, Heiko Schocher wrote:
> This 2 patches move SPL_OS_BOOT and SYS_OS_BASE
> to Kconfig. Checked with tbot testcase:
> https://github.com/hsdenx/tbot/blob/master/src/tc/uboot/tc_uboot_check_kconfig.py
>
> result:
>
> Boards : 1213
> compile err : 13
> not checked : 1
>
On 09/23/2016 02:57 PM, Tom Rini wrote:
> On Tue, Sep 20, 2016 at 10:39:49AM -0500, Andrew F. Davis wrote:
>
>> When waiting for input in CYGACC_COMM_IF_GETC_TIMEOUT we delay 2
>> seconds by incrementing and checking a counter variable every 20
>> uSeconds. The overhead
and bring the timeout back closer to the correct time.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
common/xyzModem.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/common/xyzModem.c b/common/xyzModem.c
index 5656aac..390abdc 100644
--- a/common/xyzModem.c
+++ b/
On 08/26/2016 08:43 AM, Stefan Roese wrote:
> Hi Andrew,
>
> On 26.08.2016 15:40, Andrew F. Davis wrote:
>> On 08/26/2016 12:18 AM, Stefan Roese wrote:
>>> On 25.08.2016 20:43, Andrew F. Davis wrote:
>>>> When waiting for input in CYGACC_COMM_IF_
On 09/20/2016 12:50 AM, Heiko Schocher wrote:
> Hello Andrew,
>
> Am 19.09.2016 um 18:03 schrieb Andrew F. Davis:
>> BTW, the following addresses that bounce should be removed from wherever
>> you found them or added to .get_maintainer.ignore if they are part of
>>
On 09/20/2016 12:26 AM, Heiko Schocher wrote:
> Hello Andrew,
>
> Am 19.09.2016 um 17:38 schrieb Andrew F. Davis:
>> On 09/14/2016 12:03 AM, Heiko Schocher wrote:
>>> move the UBI config options into Kconfig.
>>>
>>> Signed-off-by: Heiko Schocher &
BTW, the following addresses that bounce should be removed from wherever
you found them or added to .get_maintainer.ignore if they are part of
old commits:
Bo Shen
Albert ARIBAUD
Gerald Kerma
Karl Beldan
the binary doesn't change I see no harm.
[snip]
> +config CMD_UBI
> + tristate "Enable UBI - Unsorted block images commands"
> + select CRC32
> + select MTD_UBI
> + help
> + UBI is a software layer above MTD layer which admits of LVM-like
On 09/02/2016 12:40 AM, Daniel Allred wrote:
> Adds a secure dram reservation fixup for secure
> devices, when a region in the emif has been set aside
> for secure world use. The size is defined by the
> CONFIG_TI_SECURE_EMIF_TOTAL_REGION_SIZE config option.
>
> Signed-off-by: Daniel Allred
On 09/02/2016 09:58 AM, Tom Rini wrote:
> On Fri, Sep 02, 2016 at 09:57:10AM -0500, Andrew F. Davis wrote:
>> On 09/02/2016 09:54 AM, Tom Rini wrote:
>>> On Tue, Aug 30, 2016 at 02:06:29PM -0500, Andrew F. Davis wrote:
>>>
>>>> Add a new defconfig file for th
On 09/02/2016 12:40 AM, Daniel Allred wrote:
> If the ending portion of the DRAM is reserved for secure
> world use, then u-boot cannot use this memory for its relocation
> purposes. To prevent issues, we mark this memory as PRAM and this
> prevents it from being used by u-boot at all.
>
>
On 09/02/2016 12:40 AM, Daniel Allred wrote:
> After EMIF DRAM is configured, but before it is used,
> calls are made on secure devices to reserve any configured
> memory region needed by the secure world and then to lock the
> EMIF firewall configuration. If any other firewall
> configuration
On 09/02/2016 12:40 AM, Daniel Allred wrote:
> Adds start address and size config options for setting aside
> a portion of the EMIF memory space for usage by security software
> (like a secure OS/TEE). There are two sizes, a total size and a
> protected size. The region is divided into protected
On 09/02/2016 09:54 AM, Tom Rini wrote:
> On Tue, Aug 30, 2016 at 02:06:29PM -0500, Andrew F. Davis wrote:
>
>> Add a new defconfig file for the AM335x High Security EVM. This config
>> is specific for the case of SD card booting, we the boot types to be
>> seperate de
<mad...@ti.com>
>
> Cc: Andrew F. Davis <a...@ti.com>
> ---
>
> Changes in v2:
> - Changes the target for secure keystone devices in config.mk
> to u-boot_HS_MLO to keep it in line with the MLO target that
> is built for non-secure keystone devices.
>
Th
On 08/31/2016 11:06 AM, Hannes Schmelzer wrote:
> On 08/30/2016 09:06 PM, Andrew F. Davis wrote:
>> The config option AM33XX is used in several boards and should be
>> defined as a stand-alone option for this SOC. We break this out
>> from target boards that use this S
with this patch.
This is similar to what has already been done in
9de852642cae ("arm: Kconfig: Add support for AM43xx SoC specific Kconfig")
and is done for the same reasons.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
arch/arm/Kconfig | 98
When CONFIG_FIT_IMAGE_POST_PROCESS or CONFIG_SPL_FIT_IMAGE_POST_PROCESS
is enabled board_fit_image_post_process will be called, add this
function to am33xx boards when CONFIG_TI_SECURE_DEVICE is set to
verify the loaded image.
Signed-off-by: Andrew F. Davis <a...@ti.com>
Reviewed-by: Tom Ri
in the file it loads.
Signed-off-by: Andrew F. Davis <a...@ti.com>
Reviewed-by: Tom Rini <tr...@konsulko.com>
---
arch/arm/cpu/armv7/am33xx/config.mk | 20 ++--
1 file changed, 18 insertions(+), 2 deletions(-)
diff --git a/arch/arm/cpu/armv7/am33xx/config.mk
b/arch/arm/cpu/
Like OMAP54xx and AM43xx family SoCs, AM33xx based SoCs have high
security enabled models. Allow AM33xx devices to be built with
HS Device Type Support.
Signed-off-by: Andrew F. Davis <a...@ti.com>
Reviewed-by: Tom Rini <tr...@konsulko.com>
---
arch/arm/cpu/armv7/omap-common/Kconf
system better than me.
- Separate additional AM33xx SOC based boards out from the SoC
definition in patch #1.
[0] https://www.mail-archive.com/u-boot@lists.denx.de/msg222736.html
Andrew F. Davis (10):
Kconfig: Separate AM33XX SOC config from target board config
am33xx: config.mk: Add support
the correct
value in their defconfig.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
arch/arm/cpu/armv7/am33xx/Kconfig | 3 ++-
include/configs/ti_am335x_common.h | 2 +-
2 files changed, 3 insertions(+), 2 deletions(-)
diff --git a/arch/arm/cpu/armv7/am33xx/Kconfig
b/arch/arm/cpu
this can be added back
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
configs/am335x_hs_evm_mmc_defconfig | 58 +
1 file changed, 58 insertions(+)
create mode 100644 configs/am335x_hs_evm_mmc_defconfig
diff --git a/configs/am335x_hs_evm_mmc_defcon
This config option seems to be unused and is probably vestigial.
Remove it.
Signed-off-by: Andrew F. Davis <a...@ti.com>
Reviewed-by: Tom Rini <tr...@konsulko.com>
---
include/configs/am335x_evm.h | 2 --
include/configs/am335x_shc.h | 2 --
include/configs/am335x_sl50.h | 2
compatible SPL images.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
arch/arm/cpu/armv7/am33xx/config.mk | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/arm/cpu/armv7/am33xx/config.mk
b/arch/arm/cpu/armv7/am33xx/config.mk
index 431cf62..87b76d9 100644
---
, so we disable attempting Falcon Mode.
Signed-off-by: Andrew F. Davis <a...@ti.com>
Reviewed-by: Tom Rini <tr...@konsulko.com>
---
include/configs/ti_armv7_common.h | 15 ++-
1 file changed, 10 insertions(+), 5 deletions(-)
diff --git a/include/configs/ti_armv7_common.
Add a section describing the additional boot types used on AM33xx
secure devices.
Signed-off-by: Andrew F. Davis <a...@ti.com>
Reviewed-by: Tom Rini <tr...@konsulko.com>
---
doc/README.ti-secure | 32
1 file changed, 32 insertions(+)
diff --git a/d
On 08/26/2016 12:01 AM, Lokesh Vutla wrote:
>
>
> On Friday 26 August 2016 03:15 AM, Andrew F. Davis wrote:
>> The SPL load address changes based on boot time in HS devices,
>> ISW_ENTRY_ADDR is used to set this address for AM43xx based SoCs
>> for similar reasons. Add
On 08/26/2016 04:27 PM, Tom Rini wrote:
> On Thu, Aug 25, 2016 at 04:45:31PM -0500, Andrew F. Davis wrote:
>
>> Currently U-Boot proper has Kconfig options that enable the generation
>> of U-Boot binaries that are capable of being booted from the selected
>> boot
On 08/26/2016 01:30 AM, Madan Srinivas wrote:
> From: Vitaly Andrianov
>
> Add a new defconfig file for the K2E High Security EVM.
>
> This defconfig is the same as for the non-secure part, except for:
> CONFIG_TI_SECURE_DEVICE option set to 'y'
> CONFIG_FIT option
On 08/26/2016 01:30 AM, Madan Srinivas wrote:
> Adds an additional image type needed for supporting secure keystone
> devices. The build generates u-boot_HS_XIP_X-LOADER which can
> be used to boot from all media on secure keystone devices.
>
> Signed-off-by: Madan Srinivas
> ---
On 08/26/2016 01:30 AM, Madan Srinivas wrote:
> As K2 can directly boot u-boot, re-use u-boot_HS_XIP_X-LOADER
> as the secure image while booting secure K2 devices. Updates the
> comments in the file to reflect this.
>
> Signed-off-by: Madan Srinivas
> ---
>
>
defined, which will result in an implicit declaration of function
> 'board_fit_image_post_process' warning while building u-boot. This
> patch fixes this warning.
>
> Signed-off-by: Madan Srinivas <mad...@ti.com>
Otherwise looks good to me,
Acked-by: Andrew F. Davis <a...@ti.com>
&
.
>
> This patch applies on top of the patch
> ti: omap-common: Allow AM33xx devices to be built securely
> sumitted by Andrew Davis
>
> Signed-off-by: Vitaly Andrianov <vita...@ti.com>
> Signed-off-by: Madan Srinivas <mad...@ti.com>
> ---
Acked-by: Andrew F. Davi
On 08/26/2016 12:18 AM, Stefan Roese wrote:
> On 25.08.2016 20:43, Andrew F. Davis wrote:
>> When waiting for input in CYGACC_COMM_IF_GETC_TIMEOUT we delay 2
>> seconds by incrementing and checking a counter variable every 20
>> uSeconds. The overhead in the loop calling tst
When CONFIG_FIT_IMAGE_POST_PROCESS or CONFIG_SPL_FIT_IMAGE_POST_PROCESS
is enabled board_fit_image_post_process will be called, add this
function to am33xx boards when CONFIG_TI_SECURE_DEVICE is set to
verify the loaded image.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
board/ti/
to enable the generation an SPL image
capable of being booted from SPI, and not have this depend on the SPL's
media loading capabilities.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
arch/arm/cpu/armv7/am33xx/config.mk | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ar
with this patch.
This is similar to what has already been done in
9de852642cae ("arm: Kconfig: Add support for AM43xx SoC specific Kconfig")
and is done for the same reasons.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
arch/arm/Kconfig | 98
Add a section describing the additional boot types used on AM33xx
secure devices.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
doc/README.ti-secure | 32
1 file changed, 32 insertions(+)
diff --git a/doc/README.ti-secure b/doc/README.ti-secure
index 5
The SPL load address changes based on boot time in HS devices,
ISW_ENTRY_ADDR is used to set this address for AM43xx based SoCs
for similar reasons. Add this same logic for AM33xx devices.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
include/configs/ti_am335x_common.h | 2 +-
1 file c
.html
Andrew F. Davis (11):
spl: Kconfig: Add SPL__BOOT as Kconfig option
Kconfig: Separate AM33XX SOC config from target board config
am33xx: config.mk: Add support for additional secure boot image types
doc: Update info on using AM33xx secure devices from TI
am33xx: config.mk: Fix option
This config option seems to be unused and is probably vestigial.
Remove it.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
include/configs/am335x_evm.h | 2 --
include/configs/am335x_shc.h | 2 --
include/configs/am335x_sl50.h | 2 --
include/configs/bav335x.h | 2 --
4 files chan
this can be added back
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
configs/am335x_hs_evm_mmc_defconfig | 58 +
1 file changed, 58 insertions(+)
create mode 100644 configs/am335x_hs_evm_mmc_defconfig
diff --git a/configs/am335x_hs_evm_mmc_defcon
, so we disable attempting Falcon Mode.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
include/configs/ti_armv7_common.h | 15 ++-
1 file changed, 10 insertions(+), 5 deletions(-)
diff --git a/include/configs/ti_armv7_common.h
b/include/configs/ti_armv7_common.h
index 9
Like OMAP54xx and AM43xx family SoCs, AM33xx based SoCs have high
security enabled models. Allow AM33xx devices to be built with
HS Device Type Support.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
arch/arm/cpu/armv7/omap-common/Kconfig | 2 +-
1 file changed, 1 insertion(+), 1 de
in the file it loads.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
arch/arm/cpu/armv7/am33xx/config.mk | 27 +--
1 file changed, 25 insertions(+), 2 deletions(-)
diff --git a/arch/arm/cpu/armv7/am33xx/config.mk
b/arch/arm/cpu/armv7/am33xx/config.mk
index d4eb21c..8
correct use of these options
we limit the menu to these devices for now. The only other users
of these seem to be some PPC boards that incorrectly use these as both
SPL and TPL build options.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
common/Kconfi
On 08/25/2016 02:02 PM, Troy Kisky wrote:
> On 8/25/2016 11:40 AM, Andrew F. Davis wrote:
>> When the inputed usec is too large we process it in chunks of
>> CONFIG_WD_PERIOD size. Subtracting this from usec until usec is
>> zero. If usec is not an integer multipl
and bring the timeout back closer to the correct time.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
common/xyzModem.c | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
diff --git a/common/xyzModem.c b/common/xyzModem.c
index 5656aac..c3f2afc 100644
--- a/common/xyzModem.c
+++ b/
-by: Andrew F. Davis <a...@ti.com>
---
lib/time.c | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/lib/time.c b/lib/time.c
index f37150f..4ec3cb9 100644
--- a/lib/time.c
+++ b/lib/time.c
@@ -145,14 +145,14 @@ void __weak __udelay(unsigned long usec)
void udelay(unsigne
and bring the timeout back closer to the correct time.
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
common/xyzModem.c | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
diff --git a/common/xyzModem.c b/common/xyzModem.c
index 5656aac..c3f2afc 100644
--- a/common/xyzModem.c
+++ b/
cation.
Signed-off-by: Andreas Dannenberg <dannenb...@ti.com>
Signed-off-by: Andrew F. Davis <a...@ti.com>
---
configs/am43xx_hs_evm_defconfig | 1 +
1 file changed, 1 insertion(+)
diff --git a/configs/am43xx_hs_evm_defconfig b/configs/am43xx_hs_evm_defconfig
index 1553196..55ae2fd 10
401 - 500 of 551 matches
Mail list logo