From patchwork Fri Oct 13 03:47:02 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Bajjuri, Praneeth" X-Patchwork-Id: 115688 Delivered-To: patch@linaro.org Received: by 10.140.22.163 with SMTP id 32csp256952qgn; Thu, 12 Oct 2017 20:47:38 -0700 (PDT) X-Google-Smtp-Source: AOwi7QCt2buKX+xr7C/RyM8TNiBbsspihqU/kEQg2Pgxf1x0hbULN065Ut/I/szUrpJmGlDt6UZ0 X-Received: by 10.80.195.89 with SMTP id q25mr445804edb.144.1507866458846; Thu, 12 Oct 2017 20:47:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1507866458; cv=none; d=google.com; s=arc-20160816; b=Aqr1XUjZFsu+2Wt3E1DU9SGtx+M3PNbKXMPghIaI3Pp0kaFnb90tQhJEzh7htPXNmv XyYmfuC4+Xg09SBay81Buh5Hs49XfC0jLjJmYpgLPEJeJME2nxIedmGKAWtbhYFtl5Ol h2TgN/3FkVqVL5Z3rOMvoB/0tAwNYDqoBdsCPToXzwHipDNMElWHfbVz7z7z5lbGm7UJ QNUj/RMqJd0BA7GCo4AVgpzW3PLsoY80TFzRKN3pV8SCT0YJ3y3/MI/6nTQX9VQHRgXI jvT1C3wTM4nZ0MUotKXw0VrneTQ2XRfRu9wQS5w2XJr20GUwgAkxiRphT5lNts+ToMoz Buvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:content-transfer-encoding:list-subscribe:list-help :list-post:list-archive:list-unsubscribe:list-id:precedence:subject :cc:mime-version:message-id:date:to:from:dkim-signature :arc-authentication-results; bh=w8W/U5XAdltXcDslMdJ8TkgxinP3CRX7HYV74fi/G4U=; b=I8sjveW5tyQE7Uw2tkBe+LicIgNR+iNi0zKlbgGfTo3s9kf4lkKDj95TWlXwHm046w W2M+juMLY+W4DE9SCeC5R5fJg0PdqhzXG8rWsLyUvFt2cYOjwiQbcmYxFLARVmPcbN/H E10v28vcJfiMl1RBfcXIsQuc13P65AuyIgXhMT2ECV72ayZ/qH2W8Z9YFYCRF0Mwz8GN /LiYTEs4XfF2DMlofTTQ+VI7cWP426WkbvqCW6kSmn5G/WsrT4kenrluSrSrQZG3SyZ1 Bq621M3suvj52tEFdt0Sv07NAaY8f5XmTTAAzigaWxZhoa6TkOk6XdeS3xkYPYbyuO8e APnA== ARC-Authentication-Results: i=1; mx.google.com; dkim=neutral (body hash did not verify) header.i=@ti.com header.s=ti-com-17Q1 header.b=E3YH1eKJ; spf=pass (google.com: best guess record for domain of u-boot-bounces@lists.denx.de designates 81.169.180.215 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dmarc=fail (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Return-Path: Received: from lists.denx.de (dione.denx.de. [81.169.180.215]) by mx.google.com with ESMTP id l33si244134edd.186.2017.10.12.20.47.38; Thu, 12 Oct 2017 20:47:38 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of u-boot-bounces@lists.denx.de designates 81.169.180.215 as permitted sender) client-ip=81.169.180.215; Authentication-Results: mx.google.com; dkim=neutral (body hash did not verify) header.i=@ti.com header.s=ti-com-17Q1 header.b=E3YH1eKJ; spf=pass (google.com: best guess record for domain of u-boot-bounces@lists.denx.de designates 81.169.180.215 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dmarc=fail (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Received: by lists.denx.de (Postfix, from userid 105) id DC033C21FB5; Fri, 13 Oct 2017 03:47:37 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de X-Spam-Level: X-Spam-Status: No, score=0.0 required=5.0 tests=T_DKIM_INVALID autolearn=unavailable autolearn_force=no version=3.4.0 Received: from lists.denx.de (localhost [IPv6:::1]) by lists.denx.de (Postfix) with ESMTP id 6E19DC21F6C; Fri, 13 Oct 2017 03:47:35 +0000 (UTC) Received: by lists.denx.de (Postfix, from userid 105) id 49517C21F21; Fri, 13 Oct 2017 03:47:34 +0000 (UTC) Received: from lelnx193.ext.ti.com (lelnx193.ext.ti.com [198.47.27.77]) by lists.denx.de (Postfix) with ESMTPS id 9B0A9C21F04 for ; Fri, 13 Oct 2017 03:47:33 +0000 (UTC) Received: from dlelxv90.itg.ti.com ([172.17.2.17]) by lelnx193.ext.ti.com (8.15.1/8.15.1) with ESMTP id v9D3lVmT028673; Thu, 12 Oct 2017 22:47:31 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ti.com; s=ti-com-17Q1; t=1507866451; bh=zsLSl/y1Ak4BL/+EiyUBhcrwAc0/J9PUXdQtMmj5u2Q=; h=From:To:CC:Subject:Date; b=E3YH1eKJOWFi/Ni9b/vwQ+llK33DlHgpMq5ryF/d+XPQ8PRFzMULKbiO/LZd9WzcE 6owJrHMO/v0oWd5wo5CtYAi2MVfS/n3zvOY1gG/jtHkSyU0fgxuJnnFsrBeJBKF9eL UTywICIWH1Ken5aA/D0lIBVwzZjRt6T89vCtVTFw= Received: from DLEE105.ent.ti.com (dlee105.ent.ti.com [157.170.170.35]) by dlelxv90.itg.ti.com (8.14.3/8.13.8) with ESMTP id v9D3lVRC006828; Thu, 12 Oct 2017 22:47:31 -0500 Received: from DLEE101.ent.ti.com (157.170.170.31) by DLEE105.ent.ti.com (157.170.170.35) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.845.34; Thu, 12 Oct 2017 22:47:30 -0500 Received: from dflp32.itg.ti.com (10.64.6.15) by DLEE101.ent.ti.com (157.170.170.31) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.845.34 via Frontend Transport; Thu, 12 Oct 2017 22:47:30 -0500 Received: from droidlinux (ileax41-snat.itg.ti.com [10.172.224.153]) by dflp32.itg.ti.com (8.14.3/8.13.8) with ESMTP id v9D3lUan018358; Thu, 12 Oct 2017 22:47:30 -0500 Received: from praneeth by droidlinux with local (Exim 4.82) (envelope-from ) id 1e2qwc-0002pF-Di; Thu, 12 Oct 2017 22:47:30 -0500 From: Praneeth Bajjuri To: Praneeth Bajjuri , Date: Thu, 12 Oct 2017 22:47:02 -0500 Message-ID: <1507866425-10827-1-git-send-email-praneeth@ti.com> X-Mailer: git-send-email 1.9.1 MIME-Version: 1.0 X-EXCLAIMER-MD-CONFIG: e1e8a2fd-e40a-4ac6-ac9b-f7e9cc9ee180 Cc: Tom Rini Subject: [U-Boot] [PATCH 1/4] arm: am57xx: Add vendor partition to Android GPT table for eMMC X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.18 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" Add vendor partition to Android GPT table for eMMC. A Vendor image contains SoC-specific code and configuration. Prior to Android 8.0, the vendor partition was optional ; files belonging to these images were placed in boot.img or system.img with symlinks (such as /vendor >/system/vendor ) when absent. Android 8.0 makes the vendor partition mandatory The goal is to modularize Android partitions with standard interface between the Android Platform (on system.img ) and vendor-provided code(on vendor.img). This standard interface enables the Android Platform to be updated without affecting the SoC partitions. This makes it possible to upgrade a device system.img from Android 8.0 to Android P while other images (such as vendor.img) remain at Android 8.0. This modularity enables timely Android platform upgrades (such as monthly security updates ) without requiring SoC/ODM partners to update SoC- and device-specific code. Signed-off-by: Praneeth Bajjuri Reviewed-by: Tom Rini --- include/configs/am57xx_evm.h | 1 + 1 file changed, 1 insertion(+) diff --git a/include/configs/am57xx_evm.h b/include/configs/am57xx_evm.h index 5427974..ebb0474 100644 --- a/include/configs/am57xx_evm.h +++ b/include/configs/am57xx_evm.h @@ -59,6 +59,7 @@ "name=recovery,size=10M,uuid=${uuid_gpt_recovery};" \ "name=boot,size=10M,uuid=${uuid_gpt_boot};" \ "name=system,size=768M,uuid=${uuid_gpt_system};" \ + "name=vendor,size=256M,uuid=${uuid_gpt_vendor};" \ "name=cache,size=256M,uuid=${uuid_gpt_cache};" \ "name=ipu1,size=1M,uuid=${uuid_gpt_ipu1};" \ "name=ipu2,size=1M,uuid=${uuid_gpt_ipu2};" \