From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id AE15EC05027 for ; Fri, 3 Feb 2023 12:26:53 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 6ED4685F72; Fri, 3 Feb 2023 13:26:51 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=siemens.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; secure) header.d=siemens.com header.i=jan.kiszka@siemens.com header.b="AtG6Gzwl"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 2A50585CFD; Fri, 3 Feb 2023 13:26:46 +0100 (CET) Received: from mta-64-225.siemens.flowmailer.net (mta-64-225.siemens.flowmailer.net [185.136.64.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id E8F2585F26 for ; Fri, 3 Feb 2023 13:26:42 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=siemens.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=jan.kiszka@siemens.com Received: by mta-64-225.siemens.flowmailer.net with ESMTPSA id 202302031226420b3d1e4fcbc4b6d484 for ; Fri, 03 Feb 2023 13:26:42 +0100 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; s=fm1; d=siemens.com; i=jan.kiszka@siemens.com; h=Date:From:Subject:To:Message-ID:MIME-Version:Content-Type:Content-Transfer-Encoding:Cc; bh=2lNpV+4Dsw2ZotcVYbO2/+JvHAcHfdZw2mgSCUfJIlg=; b=AtG6GzwlCiNMr6pWTpoKBFiDhNP1xx08kx53o4H2p7UfrI9u9/zosD8ox+T6Dpav75LOYD wsVW2FSjMhnZGodaGeTrTHU/Wk8lWwPDO4LOZkvOj68YWXKDiALYVQpeAAMBEPM9lpxLmZck baI7pPJ/ZhEIDzruOOCWP133UcAl0=; From: Jan Kiszka To: U-Boot Mailing List Cc: chao zeng , Su Baocheng Subject: [PATCH V5 00/12] IOT2050-related enhancements Date: Fri, 3 Feb 2023 13:26:29 +0100 Message-Id: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Flowmailer-Platform: Siemens Feedback-ID: 519:519-294854:519-21489:flowmailer X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.6 at phobos.denx.de X-Virus-Status: Clean (Almost) flushing our upstream queue for the IOT2050 device, this mostly brings board-specific changes such as: - updated build process and firmware layout for PG1 vs. PG2 devices - more watchdog preparations - preparations for verified boot on IOT2050 Advanced devices This series depends on https://lore.kernel.org/u-boot/cover.1675426972.git.jan.kiszka@siemens.com/ ("env: Enhancements for establishing variable protection") Changes in v5: - factored out two patches Changes in v4: - rebased over latest master - make use of new CONFIG_EFI_SCROLL_ON_CLEAR_SCREEN Changes in v3: - further reworked patch 1 to load default env directly, leaving driver ordering alone Changes in v2: - rebased over latest master - reworked patch 1 to be less invasive to the code - added "iot2050: use the named gpio to control the user-button" Still in our backlog is support for a new variant that comes with M.2 slots. Related DT patches were sent to the kernel and are under review now. Jan CC: chao zeng CC: Su Baocheng Jan Kiszka (9): iot2050: Update firmware layout iot2050: Add watchdog start to bootcmd iot2050: Add CONFIG_ENV_FLAGS_LIST_STATIC arm: dts: iot2050: Allow verifying U-Boot proper by SPL tools: Add script for converting public key into device tree include iot2050: Add script for signing artifacts arm: dts: iot2050: Optionally embed OTP programming data into image doc: iot2050: Add a note about the watchdog firmware iot2050: Refresh defconfigs and activate CONFIG_EFI_SCROLL_ON_CLEAR_SCREEN Su Baocheng (2): board: siemens: iot2050: Split the build for PG1 and PG2 arm: dts: iot2050: Use the auto generator nodes for fdt chao zeng (1): board: siemens: iot2050: use the named gpio to control the user-button arch/arm/dts/k3-am65-iot2050-boot-image.dtsi | 134 ++++++------------ board/siemens/iot2050/Kconfig | 35 ++++- board/siemens/iot2050/board.c | 17 +-- ...ot2050_defconfig => iot2050_pg1_defconfig} | 13 +- ...ot2050_defconfig => iot2050_pg2_defconfig} | 15 +- doc/board/siemens/iot2050.rst | 79 ++++++++++- include/configs/iot2050.h | 17 +++ tools/binman/missing-blob-help | 14 +- tools/iot2050-sign-fw.sh | 51 +++++++ tools/key2dtsi.py | 64 +++++++++ 10 files changed, 309 insertions(+), 130 deletions(-) copy configs/{iot2050_defconfig => iot2050_pg1_defconfig} (93%) rename configs/{iot2050_defconfig => iot2050_pg2_defconfig} (91%) create mode 100755 tools/iot2050-sign-fw.sh create mode 100755 tools/key2dtsi.py -- 2.35.3