Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/806984/?format=api
{ "id": 806984, "url": "http://patchwork.ozlabs.org/api/patches/806984/?format=api", "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/1503990107-28658-3-git-send-email-sumit.garg@nxp.com/", "project": { "id": 18, "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api", "name": "U-Boot", "link_name": "uboot", "list_id": "u-boot.lists.denx.de", "list_email": "u-boot@lists.denx.de", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<1503990107-28658-3-git-send-email-sumit.garg@nxp.com>", "list_archive_url": null, "date": "2017-08-29T07:01:47", "name": "[U-Boot,3/3] ls1088ardb: Add SD Secure boot target support", "commit_ref": null, "pull_url": null, "state": "superseded", "archived": false, "hash": "e3a4fa124d020b12fbd4f21460f5e68dc81429e3", "submitter": { "id": 68653, "url": "http://patchwork.ozlabs.org/api/people/68653/?format=api", "name": "Sumit Garg", "email": "sumit.garg@nxp.com" }, "delegate": { "id": 2666, "url": "http://patchwork.ozlabs.org/api/users/2666/?format=api", "username": "yorksun", "first_name": "York", "last_name": "Sun", "email": "yorksun@freescale.com" }, "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/1503990107-28658-3-git-send-email-sumit.garg@nxp.com/mbox/", "series": [ { "id": 318, "url": "http://patchwork.ozlabs.org/api/series/318/?format=api", "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=318", "date": "2017-08-29T07:01:46", "name": "[U-Boot,1/3] armv8: fsl-layerscape: SPL size reduction", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/318/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/806984/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/806984/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<u-boot-bounces@lists.denx.de>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@bilbo.ozlabs.org", "Authentication-Results": [ "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=lists.denx.de\n\t(client-ip=81.169.180.215; helo=lists.denx.de;\n\tenvelope-from=u-boot-bounces@lists.denx.de;\n\treceiver=<UNKNOWN>)", "spf=fail (sender IP is 192.88.168.50)\n\tsmtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed)\n\theader.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com;" ], "Received": [ "from lists.denx.de (dione.denx.de [81.169.180.215])\n\tby ozlabs.org (Postfix) with ESMTP id 3xhKl42xQRz9t38\n\tfor <incoming@patchwork.ozlabs.org>;\n\tTue, 29 Aug 2017 17:19:28 +1000 (AEST)", "by lists.denx.de (Postfix, from userid 105)\n\tid CDA9BC21E29; Tue, 29 Aug 2017 07:07:02 +0000 (UTC)", "from lists.denx.de (localhost [IPv6:::1])\n\tby lists.denx.de (Postfix) with ESMTP id C6A6AC21E2B;\n\tTue, 29 Aug 2017 07:06:56 +0000 (UTC)", "by lists.denx.de (Postfix, from userid 105)\n\tid 6EDB2C21E36; Tue, 29 Aug 2017 07:02:08 +0000 (UTC)", "from NAM01-BY2-obe.outbound.protection.outlook.com\n\t(mail-by2nam01on0070.outbound.protection.outlook.com [104.47.34.70])\n\tby lists.denx.de (Postfix) with ESMTPS id D5AEDC21E64\n\tfor <u-boot@lists.denx.de>; Tue, 29 Aug 2017 07:02:07 +0000 (UTC)", "from BN6PR03CA0095.namprd03.prod.outlook.com (10.164.122.161) by\n\tCO2PR03MB2262.namprd03.prod.outlook.com (10.166.92.143) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id\n\t15.1.1385.9; Tue, 29 Aug 2017 07:02:05 +0000", "from BY2FFO11OLC015.protection.gbl (2a01:111:f400:7c0c::190) by\n\tBN6PR03CA0095.outlook.office365.com (2603:10b6:405:6f::33) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1385.9 via\n\tFrontend Transport; Tue, 29 Aug 2017 07:02:04 +0000", "from tx30smr01.am.freescale.net (192.88.168.50) by\n\tBY2FFO11OLC015.mail.protection.outlook.com (10.1.15.59) with\n\tMicrosoft SMTP Server (version=TLS1_0,\n\tcipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1341.15\n\tvia Frontend Transport; Tue, 29 Aug 2017 07:02:03 +0000", "from vinitha-OptiPlex-790.ap.freescale.net\n\t(vinitha-OptiPlex-790.ap.freescale.net [10.232.134.143])\n\tby tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id\n\tv7T71mN0006227; Tue, 29 Aug 2017 00:02:00 -0700" ], "X-Spam-Checker-Version": "SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de", "X-Spam-Level": "", "X-Spam-Status": "No, score=-0.0 required=5.0 tests=BAD_ENC_HEADER,\n\tRCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL,\n\tSPF_HELO_PASS\n\tautolearn=unavailable autolearn_force=no version=3.4.0", "Received-SPF": "Fail (protection.outlook.com: domain of nxp.com does not\n\tdesignate 192.88.168.50 as permitted sender)\n\treceiver=protection.outlook.com; \n\tclient-ip=192.88.168.50; helo=tx30smr01.am.freescale.net;", "From": "Sumit Garg <sumit.garg@nxp.com>", "To": "<u-boot@lists.denx.de>", "Date": "Tue, 29 Aug 2017 12:31:47 +0530", "Message-ID": "<1503990107-28658-3-git-send-email-sumit.garg@nxp.com>", "X-Mailer": "git-send-email 2.7.4", "In-Reply-To": "<1503990107-28658-1-git-send-email-sumit.garg@nxp.com>", "References": "<1503990107-28658-1-git-send-email-sumit.garg@nxp.com>", "X-EOPAttributedMessage": "0", "X-Matching-Connectors": "131484637241635551;\n\t(91ab9b29-cfa4-454e-5278-08d120cd25b8); ()", "X-Forefront-Antispam-Report": "CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI;\n\tSFV:NSPM;\n\tSFS:(10009020)(6009001)(336005)(39380400002)(39860400002)(2980300002)(1109001)(1110001)(339900001)(199003)(189002)(2906002)(626005)(54906002)(85426001)(104016004)(2950100002)(6916009)(36756003)(53936002)(4326008)(47776003)(68736007)(5660300001)(105606002)(106466001)(8936002)(97736004)(81166006)(50226002)(5003940100001)(110136004)(356003)(77096006)(50466002)(86362001)(575784001)(33646002)(2351001)(50986999)(76176999)(6666003)(8656003)(8676002)(305945005)(81156014)(498600001)(48376002)(189998001);\n\tDIR:OUT; SFP:1101; SCL:1; SRVR:CO2PR03MB2262;\n\tH:tx30smr01.am.freescale.net; \n\tFPR:; SPF:Fail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en; ", "X-Microsoft-Exchange-Diagnostics": [ "1; BY2FFO11OLC015;\n\t1:m5nwfYEHY+aRhwiY3n6IasnMjhwLvbWH+5EkWCPaeUY3mMIeKOC233DDODU2WfVKc7XTCJZtd2Wf42NFO/fi02+HCwR2kk2C0hvV2KvO5km5s+d15NJWUWDdpTvSz1KX", "1; CO2PR03MB2262;\n\t3:epvItURKrE9MvCMWc9fGuGNh5pYR7u0T825MwKXa6j63cNLSPw3mImQuL61bvlLUvSMoNZYDnCoOw7oplX1RfGu134mtCWyHWDv+xn54DzA00+xsv5ijjlZcBHgzfP6QcwtwZ1eRNsqUk0oE4p/M6ddUjiSEiH6S75KfbE2ZJk5BKW/mlr0ZpxKl8JttluXb3/BNvUPNrqBYu4J2panHxLYz7sZjF5OrGWqErzcApNCansNCJ4nZuwTfo3nFA3AhYzlITQCNTEV8JL4snMNw0fnz0Buui2o3+0DjUjLmGlpe/F4GZmED/zIjodgJnzvFN/quNWHeB3je4sh5ciCQmEaGKHA0+m9BkUNMYSin5O4=;\n\t25:LoM0IoH3Qa6j4qQjRRFn8jOQZ2r3NTgIqBZ5+Rx1m+GIq0aBIVDA0ds6Y5MNpzV4zeRoQ6CCpgDy5A9aNhgkTVat+9qjnGPcN741zd3G9O3jN/IKFk8wQqI7IqTEk2s55PM9V+sgZ8oMQ0usZ1OWKqfuGXOTzY0MB9VeMqvWdm7B/6OVs+gIq9PwfLziYA0YZOFRnW0MAaM4tY6WtfzJ0MV2pHgbIncmjSLokTkcXsZv5KkvxQ3BuhY++NkPOahtsstYeQR4j/e7kiotigT2rIlA0J8sl4zHufkHOwqk8xwZ6xr74JuLlKk65Z3OR6H39Z7MOh+j3hjjsbm6R7ZAog==", "1; CO2PR03MB2262;\n\t31:S/cb6mSHP3C/yqLKUK9U91nlGtQwT6sva/XTGM7Ibq3WeXJ+cnWXInEJzAwcGuGAdAWL7vogUOzRkovH534zAz0XDQPv+3pKikvAcIzVHFs5FBsDLFBHdcyrpFfLiml8clUJM89PIxIH5iCqlvqrWhbz/Wwz3kX0zNmYTQk/U6i/46KCfLf0orxykzaSstcEzOe0rFRiPkxDYEcXvvJh1OFI3I1lDarM7bIqVb4tEt4=;\n\t4:+OPWCqoOiCD6GEs5OhMLJ/qkHPfVYMlAsP+k3+TjyNqf7A6FD1/tGWwHxRmnQw+UmdOl/OlGBE0m9EC+o6EbVubwRqlkPtng1vrKqmZ5oTAt5ab+KcTKkfC3Aj2eXQbwPZsT02zoQ5zygQefvTRH9HVBolthwKwTUkkeHrxb17RxL4ijkSQ14PmMyG+j7GgQq4s6kk8RW9MFpSKPJ0ZMXHKW2xT67WORuBVMlWaBG+u8f0zdwNXf/DTr54YtJcJ8QCWaI4Zc5ghEfg4xMHkTtL1uGj57NwerJVP4K2leSPE=", "=?us-ascii?Q?1; CO2PR03MB2262;\n\t23:enBLriApxooXKV0M8Jn8XU0MH3JjjOC2L1wyyb22f?=\n\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", "1; CO2PR03MB2262;\n\t6:I25yfU5XJi12YUTVltpGMHQHP4wIMhWKgb/r5UosEvTaoevlNWF+oKTK8plYBxacX1fxs9nZFetKIjFiBi/AcuIXb017dxyIbOsErEUCmoWF5wWg/IcgyAbpwbUW9ItylvnDV6n+LxTvRWwsiG9E5RxBjEaXVnQki4RWtH5cdvtAtwsoJA8rUUhLpZidCKbG9tyomqE0gcDVjAppJ7/Hiv9OOETLdgRcGM6sHsd4LZJ1qhFLvh2IFHh3WmFT7NrZK6xVRS96h1VHdSWUPkYM7NwhKkf+gu95fYmbEMNZn0VOCxobyMkQqUww1hBg2MD3WnXzVTFbEMDPyUI/0TSqZA==;\n\t5:CCvGfUZ92Jixa8M2gmqwTuM7qRclGxqo0j/ZqQQ71gT0KtVhnwxt+90eJHvV13bVLmOECkFIZGY1naTDx8cB0tatpHZUdK/BKtpms3C+U4aBTK9DWZ6KKDzQWiwogvmQ59Rn/03ConoSsywUCu2INA==;\n\t24:Dch6lOUH/G96BzZBDovyXLVpInnvOU1JuyhMhQetaTrCzpVzlRI2ZT+o6feIUhvVfoD1+PQ1H/PZ0Hm6+jYyb2LikzIQWfE+evSZh0g9Mv4=;\n\t7:w6aQhfN7tb2g/0ftzJ3A0YvmKsfX86SzWNzTV2C6hM+HZoqWMn4RYKTE6dpfbJJBvwUd5oiGN4RmVvDlbnl717GeHnsff4tpqxbvweIFzFw+G1ptPT4PzG/xO+yZCF++6iBFfEW65FZu3I99QEdgePGkvKZes63iVPH+6lTrU2Yj3p+edlZvZMo0jlI3jDq0QBCmmhb41+odrYRvyHwUNVf5P3pODAm2CaBSXB/rhg4=" ], "MIME-Version": "1.0", "X-MS-PublicTrafficType": "Email", "X-MS-Office365-Filtering-Correlation-Id": "a314ed33-6ba6-4b54-72df-08d4eeabdaac", "X-Microsoft-Antispam": "UriScan:; BCL:0; PCL:0;\n\tRULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(2017052603199)(201703131430075)(201703131517081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095);\n\tSRVR:CO2PR03MB2262; ", "X-MS-TrafficTypeDiagnostic": "CO2PR03MB2262:", "X-Exchange-Antispam-Report-Test": "UriScan:(185117386973197);", "X-Microsoft-Antispam-PRVS": "<CO2PR03MB2262FB6B74B0356EAA04D9A7989F0@CO2PR03MB2262.namprd03.prod.outlook.com>", "X-Exchange-Antispam-Report-CFA-Test": "BCL:0; PCL:0;\n\tRULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(601004)(2401047)(13018025)(8121501046)(13016025)(5005006)(3002001)(10201501046)(93006095)(93001095)(100000703101)(100105400095)(6055026)(6096035)(20161123559100)(20161123565025)(20161123561025)(20161123556025)(201703131430075)(201703131441075)(201703131448075)(201703131433075)(201703161259150)(20161123563025)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);\n\tSRVR:CO2PR03MB2262; BCL:0; PCL:0;\n\tRULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095);\n\tSRVR:CO2PR03MB2262; ", "X-Forefront-PRVS": "0414DF926F", "SpamDiagnosticOutput": "1:99", "SpamDiagnosticMetadata": "NSPM", "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "29 Aug 2017 07:02:03.9763\n\t(UTC)", "X-MS-Exchange-CrossTenant-Id": "5afe0b00-7697-4969-b663-5eab37d5f47e", "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e;\n\tIp=[192.88.168.50]; \n\tHelo=[tx30smr01.am.freescale.net]", "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem", "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "CO2PR03MB2262", "Cc": "Udit Agarwal <udit.agarwal@nxp.com>, ruchika.gupta@nxp.com", "Subject": "[U-Boot] [PATCH 3/3] ls1088ardb: Add SD Secure boot target support", "X-BeenThere": "u-boot@lists.denx.de", "X-Mailman-Version": "2.1.18", "Precedence": "list", "List-Id": "U-Boot discussion <u-boot.lists.denx.de>", "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n\t<mailto:u-boot-request@lists.denx.de?subject=unsubscribe>", "List-Archive": "<http://lists.denx.de/pipermail/u-boot/>", "List-Post": "<mailto:u-boot@lists.denx.de>", "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>", "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n\t<mailto:u-boot-request@lists.denx.de?subject=subscribe>", "Content-Type": "text/plain; charset=\"utf-8\"", "Content-Transfer-Encoding": "base64", "Errors-To": "u-boot-bounces@lists.denx.de", "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>" }, "content": "Signed-off-by: Udit Agarwal <udit.agarwal@nxp.com>\nSigned-off-by: Sumit Garg <sumit.garg@nxp.com>\n---\n\nDependent on ls1088 base SD boot target. Also dependent on ls1088\nQPSI secure boot target.\n\n arch/arm/include/asm/fsl_secure_boot.h | 16 ++++-----\n board/freescale/ls1088a/MAINTAINERS | 5 +++\n .../ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig | 39 ++++++++++++++++++++++\n include/configs/ls1088a_common.h | 15 ++++++++-\n 4 files changed, 66 insertions(+), 9 deletions(-)\n create mode 100644 configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig", "diff": "diff --git a/arch/arm/include/asm/fsl_secure_boot.h b/arch/arm/include/asm/fsl_secure_boot.h\nindex 5ebe0cf..aa48024 100644\n--- a/arch/arm/include/asm/fsl_secure_boot.h\n+++ b/arch/arm/include/asm/fsl_secure_boot.h\n@@ -26,6 +26,14 @@\n \n #define CONFIG_KEY_REVOCATION\n \n+#if defined(CONFIG_FSL_LAYERSCAPE)\n+/*\n+ * For fsl layerscape based platforms, ESBC image Address in Header\n+ * is 64 bit.\n+ */\n+#define CONFIG_ESBC_ADDR_64BIT\n+#endif\n+\n #ifndef CONFIG_SPL_BUILD\n #ifndef CONFIG_SYS_RAMBOOT\n /* The key used for verification of next level images\n@@ -42,14 +50,6 @@\n \n #endif\n \n-#if defined(CONFIG_FSL_LAYERSCAPE)\n-/*\n- * For fsl layerscape based platforms, ESBC image Address in Header\n- * is 64 bit.\n- */\n-#define CONFIG_ESBC_ADDR_64BIT\n-#endif\n-\n #ifdef CONFIG_ARCH_LS2080A\n #define CONFIG_EXTRA_ENV \\\n \t\"setenv fdt_high 0xa0000000;\"\t\\\ndiff --git a/board/freescale/ls1088a/MAINTAINERS b/board/freescale/ls1088a/MAINTAINERS\nindex b3d5c38..de8a770 100644\n--- a/board/freescale/ls1088a/MAINTAINERS\n+++ b/board/freescale/ls1088a/MAINTAINERS\n@@ -15,3 +15,8 @@ F:\tboard/freescale/ls1088a/\n F:\tinclude/configs/ls1088aqds.h\n F:\tconfigs/ls1088aqds_qspi_defconfig\n F:\tconfigs/ls1088aqds_sdcard_qspi_defconfig\n+\n+LS1088A_SECURE_BOOT BOARD\n+M:\tSumit Garg <sumit.garg@nxp.com>\n+S:\tMaintained\n+F:\tconfigs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig\ndiff --git a/configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig b/configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig\nnew file mode 100644\nindex 0000000..746637d\n--- /dev/null\n+++ b/configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig\n@@ -0,0 +1,39 @@\n+CONFIG_ARM=y\n+CONFIG_TARGET_LS1088ARDB=y\n+# CONFIG_SYS_MALLOC_F is not set\n+CONFIG_DM_SPI=y\n+CONFIG_DM_SPI_FLASH=y\n+CONFIG_DEFAULT_DEVICE_TREE=\"fsl-ls1088a-rdb\"\n+CONFIG_FIT=y\n+CONFIG_FIT_VERBOSE=y\n+CONFIG_OF_BOARD_SETUP=y\n+CONFIG_SYS_EXTRA_OPTIONS=\"SD_BOOT_QSPI\"\n+CONFIG_SECURE_BOOT=y\n+CONFIG_SD_BOOT=y\n+CONFIG_SPL=y\n+CONFIG_HUSH_PARSER=y\n+CONFIG_CMD_MMC=y\n+CONFIG_CMD_SF=y\n+CONFIG_CMD_I2C=y\n+# CONFIG_CMD_SETEXPR is not set\n+CONFIG_CMD_DHCP=y\n+CONFIG_CMD_PING=y\n+CONFIG_OF_CONTROL=y\n+CONFIG_NET_RANDOM_ETHADDR=y\n+CONFIG_DM=y\n+CONFIG_SPL_DM=y\n+CONFIG_SPI_FLASH=y\n+CONFIG_NETDEVICES=y\n+CONFIG_E1000=y\n+CONFIG_SYS_NS16550=y\n+CONFIG_FSL_DSPI=y\n+CONFIG_SYS_MMCSD_RAW_MODE_U_BOOT_USE_SECTOR=y\n+CONFIG_SYS_MMCSD_RAW_MODE_U_BOOT_SECTOR=0x8b0\n+CONFIG_FSL_LS_PPA=y\n+CONFIG_SPL_BUILD=y\n+CONFIG_PARTITIONS=y\n+CONFIG_RSA=y\n+CONFIG_SPL_RSA=y\n+CONFIG_SPL_CRYPTO_SUPPORT=y\n+CONFIG_SPL_HASH_SUPPORT=y\n+# CONFIG_DISPLAY_BOARDINFO is not set\ndiff --git a/include/configs/ls1088a_common.h b/include/configs/ls1088a_common.h\nindex fb4c852..38d4643 100644\n--- a/include/configs/ls1088a_common.h\n+++ b/include/configs/ls1088a_common.h\n@@ -248,7 +248,20 @@ unsigned long long get_qixis_addr(void);\n \n #define CONFIG_SYS_SPL_MALLOC_SIZE 0x00100000\n #define CONFIG_SYS_SPL_MALLOC_START 0x80200000\n-#define CONFIG_SYS_MONITOR_LEN (512 * 1024)\n+\n+#ifdef CONFIG_SECURE_BOOT\n+#define CONFIG_U_BOOT_HDR_SIZE\t\t(16 << 10)\n+/*\n+ * HDR would be appended at end of image and copied to DDR along\n+ * with U-Boot image. Here u-boot max. size is 512K. So if binary\n+ * size increases then increase this size in case of secure boot as\n+ * it uses raw u-boot image instead of fit image.\n+ */\n+#define CONFIG_SYS_MONITOR_LEN (0x100000 + CONFIG_U_BOOT_HDR_SIZE)\n+#else\n+#define CONFIG_SYS_MONITOR_LEN 0x100000\n+#endif /* ifdef CONFIG_SECURE_BOOT */\n+\n #endif\n #define CONFIG_SYS_BOOTM_LEN (64 << 20) /* Increase max gunzip size */\n \n", "prefixes": [ "U-Boot", "3/3" ] }