10 Nov, 2017

1 commit


03 Nov, 2017

1 commit

  • The u-boot meets break, when host build server has installed swig and libpython3-dev,
    but no libpython-dev installed.

    tools/libfdt_wrap.c:147:21: fatal error: Python.h: No such file or directory

    The root cause is tools/makefile checks the Python.h before building a libfdt Python module.
    Since the u-boot is using "python" command not "python3", we should change to check the Python.h
    under python2.x directory not every python directory (like python3.x). Otherwise when a python3
    develop package is installed, the script will get the file and start to build libfdt if swig
    is installed as well.

    Signed-off-by: Ye Li
    Acked-by: Peng Fan

    Ye Li
     

06 Apr, 2017

1 commit

  • The tools/makefile will build a libfdt Python module if swig is available.
    But actually it not only need swig but also need python libary. We will get
    build break below when python is not installed. It is better to add more
    check for python lib.

    Because applications may install some python libs, but not the full libpython-dev,
    then the Python.h is missed. We check Python.h to instead checking libs.

    tools/libfdt_wrap.c:147:21: fatal error: Python.h: No such file or directory

    Signed-off-by: Ye Li

    Ye Li
     

05 Apr, 2017

2 commits

  • Since from mx7, we use fixed IVT offset for all boot devices.
    Introduce a new configuration CONFIG_IMX_FIXED_IVT_OFFSET for this.

    Signed-off-by: Peng Fan
    Signed-off-by: Ye.Li
    (cherry picked from commit 88e0a3552b08627b18d98380a32dbafacb18854b)
    (cherry picked from commit 3d52e221ed444dab96038a2417d1dcb2217ad593)
    (cherry picked from commit 13d39c51bbaabbcf3b72516d8ac3f1853f686ace)

    Ye.Li
     
  • Use NXP logo.
    The vendor and board dir not changed, only replace the contents
    of freescale.bmp.

    Signed-off-by: Peng Fan
    (cherry picked from commit 0b381fdf1a45cb06a057724e708ce0bbeee67f4d)

    Peng Fan
     

12 Mar, 2017

1 commit


10 Mar, 2017

2 commits


17 Feb, 2017

2 commits


10 Feb, 2017

1 commit


09 Feb, 2017

2 commits

  • Tom Rini
     
  • The previous commit ("add a new command to show .config contents")
    improves the basic infrastructure of "embed a compressed file into
    the U-Boot image, and print it by a command". The same pattern for
    the "license" command.

    This commit reworks the command to improve the following:

    [1] Improve log style

    Kbuild style log

    GZIP cmd/license_data.gz
    CHK cmd/license_data_gz.h
    UPD cmd/license_data_gz.h
    CHK cmd/license_data_size.h
    UPD cmd/license_data_size.h

    instead of the bare Make log:

    cat ./Licenses/gpl-2.0.txt | gzip -9 -c | \
    tools/bin2header license_gzip > ./include/license.h

    [2] Collect related code into the "cmd" directory

    Prior to this commit, the license.h was created by tools/Makefile,
    placed under the "include" directory, included from cmd/license.c,
    and deleted by the top-level Makefile. It is not a good idea to
    scatter related code.

    [3] Drop the fixed-malloc size LICENSE_MAX

    Just allocate the minimum required size of buffer because we know
    the size of the original gpl-2.0.txt.

    [4] Fix more issues

    Terminate the buffer with zero to prevent puts() from over-running.
    Add "static" to do_license.

    Signed-off-by: Masahiro Yamada
    Reviewed-by: Simon Glass

    Masahiro Yamada
     

08 Feb, 2017

6 commits


07 Feb, 2017

2 commits


02 Feb, 2017

1 commit


01 Feb, 2017

8 commits

  • The patch implements secure booting for the mvebu architecture.

    This includes:
    - The addition of secure headers and all needed signatures and keys in
    mkimage
    - Commands capable of writing the board's efuses to both write the
    needed cryptographic data and enable the secure booting mechanism
    - The creation of convenience text files containing the necessary
    commands to write the efuses

    The KAK and CSK keys are expected to reside in the files kwb_kak.key and
    kwb_csk.key (OpenSSL 2048 bit private keys) in the top-level directory.

    Signed-off-by: Reinhard Pfau
    Signed-off-by: Mario Six
    Reviewed-by: Stefan Roese
    Reviewed-by: Simon Glass
    Signed-off-by: Stefan Roese

    Mario Six
     
  • The function image_create_config_parse_oneline is pretty complex, and
    since more parameters will be added to support secure booting, we
    refactor the function to make it more readable.

    Also, when a line contained just a keyword without any parameters,
    strtok_r returned NULL, which was then indiscriminately fed into atoi,
    causing a segfault. To correct this, we add a NULL check before feeding
    the extracted token to atoi, and print an error message in case the
    token is NULL.

    Signed-off-by: Mario Six
    Reviewed-by: Stefan Roese
    Signed-off-by: Stefan Roese

    Mario Six
     
  • In preparation of adding the creation of secure headers, we factor the
    add_binary_header_v1 function out of the image_create_v1 function.

    Signed-off-by: Mario Six
    Reviewed-by: Stefan Roese
    Signed-off-by: Stefan Roese

    Mario Six
     
  • The parameter 'params' of the image_headersz_v1 function is never used
    by the function.

    Hence, remove it.

    Signed-off-by: Mario Six
    Reviewed-by: Stefan Roese
    Signed-off-by: Stefan Roese

    Mario Six
     
  • This patch reduces the scope of some variables.

    Signed-off-by: Mario Six
    Reviewed-by: Stefan Roese
    Signed-off-by: Stefan Roese

    Mario Six
     
  • Arithmetic with void pointers, e.g. a - b where both a and b are void
    pointers, is undefined in the C standard. Since we are operating with
    byte data here, we switch the void pointers to uint8_t pointers, and add
    the necessary casts.

    Signed-off-by: Mario Six
    Reviewed-by: Stefan Roese
    Signed-off-by: Stefan Roese

    Mario Six
     
  • Fix some style violations:

    - nine instances of missing blank lines after declarations
    - one overly long line
    - one split string (which also rewords an error message more concisely)
    - two superfluous else

    Signed-off-by: Mario Six
    Reviewed-by: Stefan Roese
    Signed-off-by: Stefan Roese

    Mario Six
     
  • To enable secure boot, we need to jump back into the BootROM to continue
    the SoC's boot process instead of letting the SPL load and run the main
    U-Boot image.

    But, since the u-boot-spl.img (including the 64 byte header) is loaded
    by the SoC as the main image, we need to compensate for the header
    length to get a correct entry point.

    Thus, we subtract the header size from the destination address, so that
    the execution address points at the actual entry point of the image.

    The current boards ignore both parameters anyway, so this change shouldn't
    concern them.

    Signed-off-by: Mario Six
    Reviewed-by: Stefan Roese
    Signed-off-by: Stefan Roese

    Mario Six
     

29 Jan, 2017

1 commit


27 Jan, 2017

1 commit

  • We can use the same header length calculations for both imximage v1 and
    v2. This addresses TODO comments about imximage v1 in the current code.

    With this patch applied, *header_size_ptr in imximage_set_header() will
    have the correct value for both imximage v1 and v2. This is necessary
    for people wanting to add proprietary data behind the created imximage.

    Signed-off-by: Martin Kaiser
    Cc: sbabic@denx.de

    Martin Kaiser
     

24 Jan, 2017

1 commit

  • When we have python building tools for the host it will not check HOSTXX
    variables but only XX variables, for example LDFLAGS and not
    HOSTLDFLAGS.

    Cc: Simon Glass
    Reported-by: Heiko Schocher
    Fixes: 1905c8fc711a ("build: Always build the libfdt python module")
    Signed-off-by: Tom Rini
    Reviewed-by: Simon Glass
    Tested-by: Simon Glass
    Tested-by: Heiko Schocher

    Tom Rini
     

21 Jan, 2017

3 commits


15 Jan, 2017

1 commit

  • Add support for signing with the pkcs11 engine. This allows FIT images
    to be signed with keys securely stored on a smartcard, hardware security
    module, etc without exposing the keys.

    Support for other engines can be added in the future by modifying
    rsa_engine_get_pub_key() and rsa_engine_get_priv_key() to construct
    correct key_id strings.

    Signed-off-by: George McCollister

    George McCollister
     

03 Jan, 2017

3 commits