From patchwork Fri Jul 13 16:03:25 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Igor Opaniuk X-Patchwork-Id: 141912 Delivered-To: patch@linaro.org Received: by 2002:a2e:9754:0:0:0:0:0 with SMTP id f20-v6csp976699ljj; Fri, 13 Jul 2018 09:03:38 -0700 (PDT) X-Google-Smtp-Source: AAOMgpeqbob+ukaq8gxk7zqaSbzqMzvjPNLDtQa2gS5cPhtwUzfq7M3gVsfc3omT3n6/0aXLNxms X-Received: by 2002:a50:bb41:: with SMTP id y59-v6mr8088831ede.10.1531497818314; Fri, 13 Jul 2018 09:03:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531497818; cv=none; d=google.com; s=arc-20160816; b=Zf5XTkO+vd9N4ePXgUqjtKVVdET98YpdQx2pRVtrzYyCAoYcBIXwGQajT5ubPVl9xK hANPjzCjsk/q2kTCXSwPs8M2l2jW9TyROpP918u+qPh52SRB2DV6TVCW47x/cZEfadUq dYEoCcDK2+WEScAeXHCA4jcVsjyGrcU3YrK44Zn1jx4eqWXkIDW4xvrGM6ODx4PHlQNU 7Sm88JAeux3v3cWM68rI3qEqDUndNMSwPHBoCwGFcB2oHdEcGnA3SfR2XD9fpoZSeE+j k72ZufyxhaVnDcveQP3il7QhkS8fL+IcLZ1TX8Bwqxbkxvh4F1Tbg5PjVkkTBQgRPo/e 76pg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:content-transfer-encoding:mime-version :list-subscribe:list-help:list-post:list-archive:list-unsubscribe :list-id:precedence:subject:cc:message-id:date:to:from :dkim-signature:arc-authentication-results; bh=bQhbpEhb4pYXtAd2Ob9xA0RB7DY7zrUFoJmlyUxqYsE=; b=J5K8DtpnIdcWUCrHZBmInj1SwXeg/ywZudigBpQ+HQcdTrI8eXZSlXR8HGNzTHWdMa OuekUPucyuXSPpUnHdmyftsCC+KEVAX7mPSDaVZXRUMELgbNBVJg4HF/958pKcJZI2fF phhDyvZY+fPL/7OjUDqjCXtASpbVfpIvUVR7qus/lF605uRbwzI2pLfvwnSyPKuHbbOx l01oAjZt76nUvq38OLvsCXf20aadM9m2cyL52cVhfiCqaaLGTJaJ7i3op8FBdA6M1kQ9 8xHa36KQqpXwM104aRWLrY14zAK46t51tmsWqJe3hUYynncyHiTXHO41peySxmSz/iC/ f+wQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=neutral (body hash did not verify) header.i=@linaro.org header.s=google header.b=i31jz5NK; spf=pass (google.com: best guess record for domain of u-boot-bounces@lists.denx.de designates 81.169.180.215 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lists.denx.de (dione.denx.de. [81.169.180.215]) by mx.google.com with ESMTP id q15-v6si2916630edd.134.2018.07.13.09.03.37; Fri, 13 Jul 2018 09:03:38 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of u-boot-bounces@lists.denx.de designates 81.169.180.215 as permitted sender) client-ip=81.169.180.215; Authentication-Results: mx.google.com; dkim=neutral (body hash did not verify) header.i=@linaro.org header.s=google header.b=i31jz5NK; spf=pass (google.com: best guess record for domain of u-boot-bounces@lists.denx.de designates 81.169.180.215 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: by lists.denx.de (Postfix, from userid 105) id D3544C22050; Fri, 13 Jul 2018 16:03:34 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de X-Spam-Level: X-Spam-Status: No, score=0.0 required=5.0 tests=RCVD_IN_MSPIKE_H2, T_DKIM_INVALID autolearn=unavailable autolearn_force=no version=3.4.0 Received: from lists.denx.de (localhost [IPv6:::1]) by lists.denx.de (Postfix) with ESMTP id 39547C21F7E; Fri, 13 Jul 2018 16:03:32 +0000 (UTC) Received: by lists.denx.de (Postfix, from userid 105) id 1FBE9C21F7E; Fri, 13 Jul 2018 16:03:31 +0000 (UTC) Received: from mail-lj1-f193.google.com (mail-lj1-f193.google.com [209.85.208.193]) by lists.denx.de (Postfix) with ESMTPS id B6A0BC21C2C for ; Fri, 13 Jul 2018 16:03:30 +0000 (UTC) Received: by mail-lj1-f193.google.com with SMTP id 1-v6so24848294ljv.9 for ; Fri, 13 Jul 2018 09:03:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id; bh=i1jRbfWRZOrp1EoPWwhGhXOu/aYPQg5Ge5u5KX/nvCA=; b=i31jz5NKS5fOAp4u5MEnyx7eTUAfPyrWlSMTcznKY0obBLVF5hwotZfar1fO1qulqB 1/x43iDO48Bp+mETqEhkm6e3NwSc90ndYk2BZ3tFoXCnzHRjADP8Q1QNmg5CYNWzha5N 0e1VcUFT3/Z1vcjuRGdmRJ3RjiuVeXoCtQfds= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=i1jRbfWRZOrp1EoPWwhGhXOu/aYPQg5Ge5u5KX/nvCA=; b=BzDB9CMre5PNBNCEjbGDi6pdgwWnrlPPZzj1ajKREOkvEt7fwndlx5TX3WiZrb5/Bf 1RmzphWXYPE5YVhcJEABE0M/wgFthEdsoBK+Yi0ihUnDrtAxBDltIp0aoLEuuPvDvBP7 LbG2TKA7lzMCbHmx/IVF0RmulHRD7uHOvrkKEzJf7x5EzsdJB/nTIgdBUYTTJXGmgyws brT/ZE9KTzaCdyKofIRp4eTsMyr77/PAmvKfFWzr9r1o8SYIbg63SnxGrkJZat4d3ajX x3KTmgUN2F9+0MeOUYA2++USFLu8DyKdWzCbjLkKy7u1nRJfNtOWoq5m7bbNjFULIaWQ nvYQ== X-Gm-Message-State: AOUpUlGlt+y5m/dIZhE+1JjmwhSaC+dlPhog++IV7b+crVBVcRX82YMf r9pXif7f0H69Bfr2KfxqQUQVpN4Xdzt5tg== X-Received: by 2002:a2e:144f:: with SMTP id 15-v6mr3536279lju.122.1531497809754; Fri, 13 Jul 2018 09:03:29 -0700 (PDT) Received: from localhost ([46.211.143.111]) by smtp.gmail.com with ESMTPSA id a9-v6sm6859520lfi.59.2018.07.13.09.03.28 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 13 Jul 2018 09:03:28 -0700 (PDT) From: Igor Opaniuk To: u-boot@lists.denx.de Date: Fri, 13 Jul 2018 19:03:25 +0300 Message-Id: <1531497807-4292-1-git-send-email-igor.opaniuk@linaro.org> X-Mailer: git-send-email 2.7.4 Cc: trini@konsulko.com, praneeth@ti.com, misael.lopez@ti.com, erosca@de.adit-jv.com, joakim.bech@linaro.org Subject: [U-Boot] [PATCH 0/2] avb 2.0: fix multiple compilation issues in sandbox X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.18 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" This series of two patches fixes compilation issues when AVB 2.0 is enabled for the 'sandbox' architecture: 1. Since libavb library alone is highly portable, it introduce dedicated Kconfig symbol for AVB compiler-dependent operations, so it's possible to build libavb separately. 2. Add CONFIG_FASTBOOT dependency, as fastboot buffer is re-used in partition verification operations. 3. Use blk_dread()/blk_dwrite() in mmc_read()/mmc_write() AVB operation implementations. This fixes compilation issues when CONFIG_BLK is enabled. Igor Opaniuk (2): avb2.0: add proper dependencies avb2.0: use block API in AVB ops cmd/Kconfig | 2 +- common/Kconfig | 7 +++++++ common/avb_verify.c | 9 +++++---- doc/README.avb2 | 1 + 4 files changed, 14 insertions(+), 5 deletions(-) --- 2.7.4