From patchwork Tue Apr 24 17:34:10 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bryan O'Donoghue X-Patchwork-Id: 134163 Delivered-To: patch@linaro.org Received: by 10.46.151.6 with SMTP id r6csp2509364lji; Tue, 24 Apr 2018 10:34:28 -0700 (PDT) X-Google-Smtp-Source: AIpwx49cWd2gfr/3i9ZG8ijvtvu4hrS/Ibz1Ph1NC/kQL3ZgrQpM3hGlgcXF2fiMXcu1ZfpK3u8B X-Received: by 10.80.211.3 with SMTP id g3mr34160702edh.15.1524591268551; Tue, 24 Apr 2018 10:34:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524591268; cv=none; d=google.com; s=arc-20160816; b=OKIfqoONof6s1ZBpaiU/SBher9Y9/qhNkV/9BKH6LvlzK0F9nwywfIYKx3aioo8oCo UO31szBnw+X4hBoJu0LH7tnYTs+qWZlcCSxGRzet8sXvbrQdpKVjLETPQ/tLPdmZ0oC1 PUh37+hgrdzNwk20kaDYhg2Eo+Zb9TButflItuINrr5mrth4T/tZ+IPiwuBTzLF00BGs dbp6LL1a6bdpjYdSuEiVRwbdH7ecUDKmpF5FNU3OQ/wcJfGxpOp0/s+OMHqb0TeqhJVG 6wFyWLJnWIInKtSEUjxO0QFRly6J8PWkMW2fNNR6IuhztbnbGF6apKL+0Q9DTdYQpu1A k3Ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:content-transfer-encoding:mime-version :list-subscribe:list-help:list-post:list-archive:list-unsubscribe :list-id:precedence:subject:message-id:date:to:from:dkim-signature :arc-authentication-results; bh=ulDNhpdhjvtRbOB53zjE9KryUypLnuTrqt3id2t9QvE=; b=stRtvTxg0AF+TlvdaTRy81kD/lDJ9JUT/30gDm5aIe4akWekmeU9gmvKob9NyrVw+i B4WHKSfJ6XooZJVZaJrYmDYfGXjz5uZmYKCR1PnK8V6FlaIp1vvwSpKZvPMKvsLkElxo /MQoa1EofTlX4p8AP3g3KdObFefWN6BdjElx9OQ0kH2p7VMWatg9FzBn5heD9kCm5KjG qHwudhqkddgbu3RK5sHiXednJthunc/gNhW0gb3VU55+TSHRArU02F1sl5eSIdFIMCJ6 HYZNpEq4odbY88cJ19O919ec6m6FpwmuMUscaE3QN7+EfE+5sSGn9AixRNG/lE0CCuGO K9cg== ARC-Authentication-Results: i=1; mx.google.com; dkim=neutral (body hash did not verify) header.i=@linaro.org header.s=google header.b=A98anQod; spf=pass (google.com: best guess record for domain of u-boot-bounces@lists.denx.de designates 81.169.180.215 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lists.denx.de (dione.denx.de. [81.169.180.215]) by mx.google.com with ESMTP id f50si1699334edf.227.2018.04.24.10.34.28; Tue, 24 Apr 2018 10:34:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of u-boot-bounces@lists.denx.de designates 81.169.180.215 as permitted sender) client-ip=81.169.180.215; Authentication-Results: mx.google.com; dkim=neutral (body hash did not verify) header.i=@linaro.org header.s=google header.b=A98anQod; spf=pass (google.com: best guess record for domain of u-boot-bounces@lists.denx.de designates 81.169.180.215 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: by lists.denx.de (Postfix, from userid 105) id C38B7C21F1A; Tue, 24 Apr 2018 17:34:19 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de X-Spam-Level: X-Spam-Status: No, score=-0.0 required=5.0 tests=RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL, T_DKIM_INVALID autolearn=unavailable autolearn_force=no version=3.4.0 Received: from lists.denx.de (localhost [IPv6:::1]) by lists.denx.de (Postfix) with ESMTP id 6194AC21E75; Tue, 24 Apr 2018 17:34:17 +0000 (UTC) Received: by lists.denx.de (Postfix, from userid 105) id 66DA1C21E2B; Tue, 24 Apr 2018 17:34:16 +0000 (UTC) Received: from mail-wm0-f65.google.com (mail-wm0-f65.google.com [74.125.82.65]) by lists.denx.de (Postfix) with ESMTPS id E97CFC21E6A for ; Tue, 24 Apr 2018 17:34:15 +0000 (UTC) Received: by mail-wm0-f65.google.com with SMTP id j4so2615461wme.1 for ; Tue, 24 Apr 2018 10:34:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id; bh=Maej045hU8JgD0UBYzRAsGiMXPQZ28yz8U6STSfeJ1s=; b=A98anQodiv1cUVV6lnWD0pq+4TNfojWJtQuxixvUScBITPwANZn6cFvEdZR1ydLHw3 zNjsgPWHBnIxNtEXLbIn/nbQUXGW4FgWgEUIn4TsfDQ8DmkoXgow6Br6Jf2gLGpuwtYg OfXBRCg6I9xxc7Iy1QX0Dphg6nCMU520zuijg= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=Maej045hU8JgD0UBYzRAsGiMXPQZ28yz8U6STSfeJ1s=; b=uQI9emWa/K7MHySww4jzGFR1F71cSsKVHTV6j2GKieoe9XSDXzrrK6R8F8XKtE9j+g T/xhVl+DUANsLE4hzkkUW+1rssdfOV9/0StAGPFtKteVrLNe9VdvV663YGmbDUWkRZ2a rY9JPUqmec2QJcbMNhifHp4BnKxC24dM3/kzLda2S9RNNoa5Wq0Wxbr3UZI0FZChMoO4 niFtliTC3vuKXl3Y4PlBAVLsBJbq3qPFfOoZ3uNSnQC90OQd42sAhCReqPgckp8B/6uG 5x82A4xN+ZBK/evbJhJghohVCBiJlbZdG4vgDjjny4Lxdsrk7ctYLvnT49S+8Y0xVXg/ PzHQ== X-Gm-Message-State: ALQs6tA2pNqWlV9wPvQrtsUtJjBc9FLR+a44sTOdwMMpQ2Y2AKPCTyNB /53eqTIxP9M6S+hATu9b7io9JWuGptE= X-Received: by 10.167.216.132 with SMTP id u4mr6339407edq.52.1524591255399; Tue, 24 Apr 2018 10:34:15 -0700 (PDT) Received: from event-horizon.net ([109.255.42.2]) by smtp.gmail.com with ESMTPSA id i15sm9537663edb.56.2018.04.24.10.34.14 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 24 Apr 2018 10:34:14 -0700 (PDT) From: Bryan O'Donoghue To: u-boot@lists.denx.de, sbabic@denx.de, fabio.estevam@nxp.com, breno.lima@nxp.com Date: Tue, 24 Apr 2018 18:34:10 +0100 Message-Id: <20180424173413.11068-1-bryan.odonoghue@linaro.org> X-Mailer: git-send-email 2.17.0 Subject: [U-Boot] [PATCH v4 0/3] WaRP7 unify secure and non-secure defconfigs X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.18 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" This tree here is pullable http://git.linaro.org/landing-teams/working/mbl/u-boot.git/log/?h=linaro-mbl%2bbod-nouart V4: - Adds Tested-by/Reviewed-by from Beno and Fabio as indicated for my patches - Resends Pierre-Jean's patch Since my parallel patchset relies on this patch I'm sending it again with my own series to make sure it doesn't get lost. To Pierre-Jean's patch I've added - Reviewed-by as Fabio indicated - Signed-off-by from me too V3: - Remove warp7_secure_defconfig from board/warp7/MAINTAINERS - Add RB-tag from Fabio as indicated V2: Maintaining a secure and non-secure defconfig is a PITA. Having discussed an observed bug with the non-secure boot-path with Fabio and undertaken to ensure both upstream and NXP BSP kernels would work - this patchset does two things. 1. Switches on CONFIG_ARMV7_BOOT_SEC_DEFAULT for warp7_defconfig 2. Removes warp7_secure_defconfig in its entirety I have an upcoming set of patches that uses the secure defconfig which I've already verified can simply be merged into mainline WaRP7 as-is so, in this context there appears to be no justification for keeping separate configuration files. Fix the bug and zap the fat ! Bryan O'Donoghue (2): warp7: defconfig: Fix CAAM on boot with tip-of-tree warp7: secure_defconfig: Remove secure_defconfig Pierre-Jean TEXIER (1): warp7: configs: enable CONFIG_CMD_FS_GENERIC board/warp7/MAINTAINERS | 1 - configs/warp7_defconfig | 2 ++ 2 files changed, 2 insertions(+), 1 deletion(-)