<feed xmlns='http://www.w3.org/2005/Atom'>
<title>u-boot.git/include/image.h, branch v2014.10-rc2</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<link rel='alternate' type='text/html' href='http://cgit.235523.xyz/u-boot.git/'/>
<entry>
<title>Fix test failure caused by bad handling of ramdisk</title>
<updated>2014-08-28T21:18:48+00:00</updated>
<author>
<name>Simon Glass</name>
<email>sjg@chromium.org</email>
</author>
<published>2014-08-22T20:26:43+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.235523.xyz/u-boot.git/commit/?id=fe20a81a6802bb871f4c3c46534310519c7d86d3'/>
<id>fe20a81a6802bb871f4c3c46534310519c7d86d3</id>
<content type='text'>
Commit e3a5bbce broke the FIT image tests by not loading a ramdisk even if
a load address is provided in the FIT. The rationale was that a load address
of 0 should be considered to mean 'do not load'.

Add a new load operation which supports this feature, so that the ramdisk
will be loaded if a non-zero load address is provided.

Signed-off-by: Simon Glass &lt;sjg@chromium.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Commit e3a5bbce broke the FIT image tests by not loading a ramdisk even if
a load address is provided in the FIT. The rationale was that a load address
of 0 should be considered to mean 'do not load'.

Add a new load operation which supports this feature, so that the ramdisk
will be loaded if a non-zero load address is provided.

Signed-off-by: Simon Glass &lt;sjg@chromium.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>image: fix bootm failure for FIT image</title>
<updated>2014-08-21T16:01:29+00:00</updated>
<author>
<name>Bryan Wu</name>
<email>cooloney@gmail.com</email>
</author>
<published>2014-08-15T23:51:38+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.235523.xyz/u-boot.git/commit/?id=6c454fedf5195e4160bd7aa398f7a4bb17d7157c'/>
<id>6c454fedf5195e4160bd7aa398f7a4bb17d7157c</id>
<content type='text'>
Commit b3dd64f5d537 "bootm: use genimg_get_kernel_addr()" introduced
a bug for booting FIT image. It's because calling fit_parse_config()
twice will give us wrong value in img_addr.

Add a new function genimg_get_kernel_addr_fit() whichl will always
return fit_uname_config and fit_uname_kernel for CONFIG_FIT.
genimg_get_kernel_addr() will ignore those to parameters.

Reported-by: York Sun &lt;yorksun@freescale.com&gt;
Signed-off-by: Bryan Wu &lt;pengw@nvidia.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Commit b3dd64f5d537 "bootm: use genimg_get_kernel_addr()" introduced
a bug for booting FIT image. It's because calling fit_parse_config()
twice will give us wrong value in img_addr.

Add a new function genimg_get_kernel_addr_fit() whichl will always
return fit_uname_config and fit_uname_kernel for CONFIG_FIT.
genimg_get_kernel_addr() will ignore those to parameters.

Reported-by: York Sun &lt;yorksun@freescale.com&gt;
Signed-off-by: Bryan Wu &lt;pengw@nvidia.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>image: introduce genimg_get_kernel_addr()</title>
<updated>2014-08-09T15:18:47+00:00</updated>
<author>
<name>Bryan Wu</name>
<email>cooloney@gmail.com</email>
</author>
<published>2014-08-01T00:39:58+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.235523.xyz/u-boot.git/commit/?id=0f64140b69ecf18f488164739374ca13aa0a5517'/>
<id>0f64140b69ecf18f488164739374ca13aa0a5517</id>
<content type='text'>
Kernel address is normally stored as a string argument of bootm or bootz.
This function is taken out from boot_get_kernel() of bootm.c, which can be
reused by others.

Signed-off-by: Bryan Wu &lt;pengw@nvidia.com&gt;
[trini: Fix warnings with CONFIG_FIT]
Signed-off-by: Tom Rini &lt;trini@ti.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Kernel address is normally stored as a string argument of bootm or bootz.
This function is taken out from boot_get_kernel() of bootm.c, which can be
reused by others.

Signed-off-by: Bryan Wu &lt;pengw@nvidia.com&gt;
[trini: Fix warnings with CONFIG_FIT]
Signed-off-by: Tom Rini &lt;trini@ti.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>fit: make sha256 support optional</title>
<updated>2014-07-07T23:47:19+00:00</updated>
<author>
<name>Dirk Eibach</name>
<email>dirk.eibach@gdsys.cc</email>
</author>
<published>2014-07-03T07:28:26+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.235523.xyz/u-boot.git/commit/?id=9a4f479b649a611478ff1b983c9a30f9150a696b'/>
<id>9a4f479b649a611478ff1b983c9a30f9150a696b</id>
<content type='text'>
sha256 has some beefy memory footprint.
Make it optional for constrained systems.

Signed-off-by: Dirk Eibach &lt;dirk.eibach@gdsys.cc&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
sha256 has some beefy memory footprint.
Make it optional for constrained systems.

Signed-off-by: Dirk Eibach &lt;dirk.eibach@gdsys.cc&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>includes: move openssl headers to include/u-boot</title>
<updated>2014-06-19T15:19:04+00:00</updated>
<author>
<name>Jeroen Hofstee</name>
<email>jeroen@myspectrum.nl</email>
</author>
<published>2014-06-12T20:27:12+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.235523.xyz/u-boot.git/commit/?id=2b9912e6a7df7b1f60beb7942bd0e6fa5f9d0167'/>
<id>2b9912e6a7df7b1f60beb7942bd0e6fa5f9d0167</id>
<content type='text'>
commit 18b06652cd "tools: include u-boot version of sha256.h"
unconditionally forced the sha256.h from u-boot to be used
for tools instead of the host version. This is fragile though
as it will also include the host version. Therefore move it
to include/u-boot to join u-boot/md5.h etc which were renamed
for the same reason.

cc: Simon Glass &lt;sjg@chromium.org&gt;
Signed-off-by: Jeroen Hofstee &lt;jeroen@myspectrum.nl&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit 18b06652cd "tools: include u-boot version of sha256.h"
unconditionally forced the sha256.h from u-boot to be used
for tools instead of the host version. This is fragile though
as it will also include the host version. Therefore move it
to include/u-boot to join u-boot/md5.h etc which were renamed
for the same reason.

cc: Simon Glass &lt;sjg@chromium.org&gt;
Signed-off-by: Jeroen Hofstee &lt;jeroen@myspectrum.nl&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Enhance fit_check_sign to check all images</title>
<updated>2014-06-19T15:19:02+00:00</updated>
<author>
<name>Simon Glass</name>
<email>sjg@chromium.org</email>
</author>
<published>2014-06-12T13:24:53+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.235523.xyz/u-boot.git/commit/?id=ce1400f6949bbfec01fe381a844b14844cb3be12'/>
<id>ce1400f6949bbfec01fe381a844b14844cb3be12</id>
<content type='text'>
At present this tool only checks the configuration signing. Have it also
look at each of the images in the configuration and confirm that they
verify.

Signed-off-by: Simon Glass &lt;sjg@chromium.org&gt;
Acked-by: Heiko Schocher &lt;hs@denx.de&gt; (v1)
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
At present this tool only checks the configuration signing. Have it also
look at each of the images in the configuration and confirm that they
verify.

Signed-off-by: Simon Glass &lt;sjg@chromium.org&gt;
Acked-by: Heiko Schocher &lt;hs@denx.de&gt; (v1)
</pre>
</div>
</content>
</entry>
<entry>
<title>image: Remove the fit_load_image() property parameter</title>
<updated>2014-06-19T15:18:59+00:00</updated>
<author>
<name>Simon Glass</name>
<email>sjg@chromium.org</email>
</author>
<published>2014-06-12T13:24:47+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.235523.xyz/u-boot.git/commit/?id=126cc864206e0a06635a4bf49b75de8d5a4a80d7'/>
<id>126cc864206e0a06635a4bf49b75de8d5a4a80d7</id>
<content type='text'>
This can be obtained by looking up the image type, so is redundant. It is
better to centralise this lookup to avoid errors.

Signed-off-by: Simon Glass &lt;sjg@chromium.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This can be obtained by looking up the image type, so is redundant. It is
better to centralise this lookup to avoid errors.

Signed-off-by: Simon Glass &lt;sjg@chromium.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Prevent a buffer overflow in mkimage when signing with SHA256</title>
<updated>2014-06-05T21:01:23+00:00</updated>
<author>
<name>Michael van der Westhuizen</name>
<email>michael@smart-africa.com</email>
</author>
<published>2014-05-30T18:59:00+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.235523.xyz/u-boot.git/commit/?id=1de7bb4f27745336c6d9cd5c2088748fcdaf699d'/>
<id>1de7bb4f27745336c6d9cd5c2088748fcdaf699d</id>
<content type='text'>
Due to the FIT_MAX_HASH_LEN constant not having been updated
to support SHA256 signatures one will always see a buffer
overflow in fit_image_process_hash when signing images that
use this larger hash.  This is exposed by vboot_test.sh.

Signed-off-by: Michael van der Westhuizen &lt;michael@smart-africa.com&gt;
Acked-by: Simon Glass &lt;sjg@chromium.org&gt;
[trini: Rework a bit so move the exportable parts of hash.h outside of
 !USE_HOSTCC and only need that as a new include to image.h]
Signed-off-by: Tom Rini &lt;trini@ti.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Due to the FIT_MAX_HASH_LEN constant not having been updated
to support SHA256 signatures one will always see a buffer
overflow in fit_image_process_hash when signing images that
use this larger hash.  This is exposed by vboot_test.sh.

Signed-off-by: Michael van der Westhuizen &lt;michael@smart-africa.com&gt;
Acked-by: Simon Glass &lt;sjg@chromium.org&gt;
[trini: Rework a bit so move the exportable parts of hash.h outside of
 !USE_HOSTCC and only need that as a new include to image.h]
Signed-off-by: Tom Rini &lt;trini@ti.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>bootm: make use of legacy image format configurable</title>
<updated>2014-06-05T18:44:56+00:00</updated>
<author>
<name>Heiko Schocher</name>
<email>hs@denx.de</email>
</author>
<published>2014-05-28T09:33:33+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.235523.xyz/u-boot.git/commit/?id=21d29f7f9f4888a4858b58b368ae7cf8783a6ebf'/>
<id>21d29f7f9f4888a4858b58b368ae7cf8783a6ebf</id>
<content type='text'>
make the use of legacy image format configurable through
the config define CONFIG_IMAGE_FORMAT_LEGACY.

When relying on signed FIT images with required signature check
the legacy image format should be disabled. Therefore introduce
this new define and enable legacy image format if CONFIG_FIT_SIGNATURE
is not set. If CONFIG_FIT_SIGNATURE is set disable per default
the legacy image format.

Signed-off-by: Heiko Schocher &lt;hs@denx.de&gt;
Cc: Simon Glass &lt;sjg@chromium.org&gt;
Cc: Lars Steubesand &lt;lars.steubesand@philips.com&gt;
Cc: Mike Pearce &lt;mike@kaew.be&gt;
Cc: Wolfgang Denk &lt;wd@denx.de&gt;
Cc: Tom Rini &lt;trini@ti.com&gt;
Cc: Michal Simek &lt;monstr@monstr.eu&gt;
Acked-by: Simon Glass &lt;sjg@chromium.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
make the use of legacy image format configurable through
the config define CONFIG_IMAGE_FORMAT_LEGACY.

When relying on signed FIT images with required signature check
the legacy image format should be disabled. Therefore introduce
this new define and enable legacy image format if CONFIG_FIT_SIGNATURE
is not set. If CONFIG_FIT_SIGNATURE is set disable per default
the legacy image format.

Signed-off-by: Heiko Schocher &lt;hs@denx.de&gt;
Cc: Simon Glass &lt;sjg@chromium.org&gt;
Cc: Lars Steubesand &lt;lars.steubesand@philips.com&gt;
Cc: Mike Pearce &lt;mike@kaew.be&gt;
Cc: Wolfgang Denk &lt;wd@denx.de&gt;
Cc: Tom Rini &lt;trini@ti.com&gt;
Cc: Michal Simek &lt;monstr@monstr.eu&gt;
Acked-by: Simon Glass &lt;sjg@chromium.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>mkimage: add atmelimage</title>
<updated>2014-05-26T22:10:48+00:00</updated>
<author>
<name>Andreas Bießmann</name>
<email>andreas.devel@googlemail.com</email>
</author>
<published>2014-05-19T12:23:39+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.235523.xyz/u-boot.git/commit/?id=7b1a411743db47648b2955c414a71836823acfd9'/>
<id>7b1a411743db47648b2955c414a71836823acfd9</id>
<content type='text'>
The new atmelimage converts a machine code BLOB to bootable ROM image. Atmel
ROM has no sophisticated image format, it only checks the first 7 ARM vectors.
The vectors can contain valid B or LDR opcodes, the 6'th vector contains the
image size to load.

Additionally the PMECC header can be written by the atmelimage target. The
parameters must be given via the -n switch as a coma separated list. For
example:

mkimage -T atmelimage \
 -n usePmecc=1,sectorPerPage=4,sectorSize=512,spareSize=64,eccBits=4,eccOffset=36 \
 -d spl/u-boot-spl.bin boot.bin

A provided image can be checked for correct header setup. It prints out the
PMECC header parameters if it has one and the 6'th interrupt vector content.

---8&lt;---
Image Type:	ATMEL ROM-Boot Image with PMECC Header
		PMECC header
		====================
		eccOffset:        36
		sectorSize:      512
		eccBitReq:         4
		spareSize:        64
		nbSectorPerPage:   4
		usePmecc:          1
		====================
		6'th vector has 17044 set
---&gt;8---

A SPL binary modified with the atmelimage mkimage target was succesfully
booted on a sama5d34ek via MMC and NAND.

Signed-off-by: Andreas Bießmann &lt;andreas.devel@googlemail.com&gt;
Cc: Bo Shen &lt;voice.shen@atmel.com&gt;
Cc: Heiko Schocher &lt;hs@denx.de&gt;
Tested-by: Bo Shen &lt;voice.shen@atmel.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The new atmelimage converts a machine code BLOB to bootable ROM image. Atmel
ROM has no sophisticated image format, it only checks the first 7 ARM vectors.
The vectors can contain valid B or LDR opcodes, the 6'th vector contains the
image size to load.

Additionally the PMECC header can be written by the atmelimage target. The
parameters must be given via the -n switch as a coma separated list. For
example:

mkimage -T atmelimage \
 -n usePmecc=1,sectorPerPage=4,sectorSize=512,spareSize=64,eccBits=4,eccOffset=36 \
 -d spl/u-boot-spl.bin boot.bin

A provided image can be checked for correct header setup. It prints out the
PMECC header parameters if it has one and the 6'th interrupt vector content.

---8&lt;---
Image Type:	ATMEL ROM-Boot Image with PMECC Header
		PMECC header
		====================
		eccOffset:        36
		sectorSize:      512
		eccBitReq:         4
		spareSize:        64
		nbSectorPerPage:   4
		usePmecc:          1
		====================
		6'th vector has 17044 set
---&gt;8---

A SPL binary modified with the atmelimage mkimage target was succesfully
booted on a sama5d34ek via MMC and NAND.

Signed-off-by: Andreas Bießmann &lt;andreas.devel@googlemail.com&gt;
Cc: Bo Shen &lt;voice.shen@atmel.com&gt;
Cc: Heiko Schocher &lt;hs@denx.de&gt;
Tested-by: Bo Shen &lt;voice.shen@atmel.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
