Message ID | 20180516154233.21457-13-sjg@chromium.org |
---|---|
State | Superseded |
Delegated to: | Alexander Graf |
Headers | show
Return-Path: <u-boot-bounces@lists.denx.de> X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.denx.de (client-ip=81.169.180.215; helo=lists.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=<UNKNOWN>) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=chromium.org Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=google.com header.i=@google.com header.b="YzgNFwqI"; dkim-atps=neutral Received: from lists.denx.de (dione.denx.de [81.169.180.215]) by ozlabs.org (Postfix) with ESMTP id 40mJlw6PfWz9s33 for <incoming@patchwork.ozlabs.org>; Thu, 17 May 2018 01:49:48 +1000 (AEST) Received: by lists.denx.de (Postfix, from userid 105) id 624C3C21FC0; Wed, 16 May 2018 15:46:23 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de X-Spam-Level: X-Spam-Status: No, score=-0.0 required=5.0 tests=RCVD_IN_DNSWL_BLOCKED, RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL, T_DKIM_INVALID autolearn=unavailable autolearn_force=no version=3.4.0 Received: from lists.denx.de (localhost [IPv6:::1]) by lists.denx.de (Postfix) with ESMTP id 4AADCC21F98; Wed, 16 May 2018 15:43:49 +0000 (UTC) Received: by lists.denx.de (Postfix, from userid 105) id B1477C21F63; Wed, 16 May 2018 15:43:08 +0000 (UTC) Received: from mail-it0-f67.google.com (mail-it0-f67.google.com [209.85.214.67]) by lists.denx.de (Postfix) with ESMTPS id C28ABC21FD3 for <u-boot@lists.denx.de>; Wed, 16 May 2018 15:43:03 +0000 (UTC) Received: by mail-it0-f67.google.com with SMTP id z6-v6so2995140iti.4 for <u-boot@lists.denx.de>; Wed, 16 May 2018 08:43:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=sender:from:to:cc:subject:date:message-id:in-reply-to:references; bh=p+SsfdX78+uo7YT8wJiHSZ4caikgCsNzTdSRdUkCYYM=; b=YzgNFwqIJpaic5SZ9cJPTz3eVknztpG9hLJ79ToNxyJCpJKwIp+1Gge5qDKg4I9Yau I9pUFyZyXF2tlHxw9PWvMvWdIBxV4QO0QR9rbBGu13BhRU57GqmBgvUom2TMXTfwI985 yO8XoixAgz204V3EbwiEpqjfK4HVXutm5UHW6FFjNd6MStk4Dcqcm0YZug7wIeafoNsp HTezs1OHUUv40V9HbgL4e/kHxo/IKsE0ZbOGhm6KLIeeGVGEHxDVEK7VsbPd2VbAfxAb +rPymLRIllpcq4viqajVnBwj4lfvpmiHPibnCL1o0Qg2MAuQLYGh1k02XD28FFPci2tE 0umw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:cc:subject:date:message-id :in-reply-to:references; bh=p+SsfdX78+uo7YT8wJiHSZ4caikgCsNzTdSRdUkCYYM=; b=G6l+/j1ny9XDUkaubdcOd4S0A2/vobg8U4V4LhpqYN3pLVXmvqIHzqmBgjYqhnU4PJ oT23haEo8t8wnS5BNm469Z+Bk23Y+ld3FR3xoFiO4nWUWwiivGHqbRNbKkeZozLzGmao tqw+x+ZGmhkjqLL8M3DfloHqqhq38E+r13E9YO5B1KAyVXPu/6R+TNBvDERWHjo4O3Ni /dtP/MDIsPCVdVdz28VLqLPRD65N8pcFTAG2TjZiSrbIhFHi+9AZ4wjXA89hrpAEDkMg uzMBvXR0Ph2jHoaxWckx+ArTIXGNupWQeLIwsUHKH6QyZXKyiDVUcseZ4sALFLBEGTES gvuw== X-Gm-Message-State: ALKqPwdzyDha5ncjLCJdd0t93opgbDfwPA5dZWoIOS9ZpiZElpPKjqTg S7a97NdaTqqi0L347ia4PD6U5g== X-Google-Smtp-Source: AB8JxZqImf3ANsDdwH0VFnnOYSITo3HSRB5tri7M/lCLdi3Ut7KdKwAqnopr1DMrZ1Vlja5b4zSf1Q== X-Received: by 2002:a6b:440c:: with SMTP id r12-v6mr1627541ioa.126.1526485382252; Wed, 16 May 2018 08:43:02 -0700 (PDT) Received: from kiwi.bld.corp.google.com ([2620:15c:183:0:8223:87c:a681:66aa]) by smtp.gmail.com with ESMTPSA id e4-v6sm1416511iob.31.2018.05.16.08.43.00 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 16 May 2018 08:43:01 -0700 (PDT) Received: by kiwi.bld.corp.google.com (Postfix, from userid 121222) id 7F27D140208; Wed, 16 May 2018 09:43:00 -0600 (MDT) From: Simon Glass <sjg@chromium.org> To: U-Boot Mailing List <u-boot@lists.denx.de> Date: Wed, 16 May 2018 09:42:29 -0600 Message-Id: <20180516154233.21457-13-sjg@chromium.org> X-Mailer: git-send-email 2.17.0.441.gb46fe60e1d-goog In-Reply-To: <20180516154233.21457-1-sjg@chromium.org> References: <20180516154233.21457-1-sjg@chromium.org> Cc: Andy Shevchenko <andriy.shevchenko@linux.intel.com>, Heinrich Schuchardt <xypron.glpk@gmx.de>, Alexander Graf <agraf@suse.de> Subject: [U-Boot] [PATCH v4 12/16] efi: sandbox: Enable EFI loader builder for sandbox X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.18 Precedence: list List-Id: U-Boot discussion <u-boot.lists.denx.de> List-Unsubscribe: <https://lists.denx.de/options/u-boot>, <mailto:u-boot-request@lists.denx.de?subject=unsubscribe> List-Archive: <http://lists.denx.de/pipermail/u-boot/> List-Post: <mailto:u-boot@lists.denx.de> List-Help: <mailto:u-boot-request@lists.denx.de?subject=help> List-Subscribe: <https://lists.denx.de/listinfo/u-boot>, <mailto:u-boot-request@lists.denx.de?subject=subscribe> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" <u-boot-bounces@lists.denx.de> |
Series |
efi: Enable basic sandbox support for EFI loader
|
expand
|
diff --git a/lib/efi_loader/Kconfig b/lib/efi_loader/Kconfig index d38780b604e..96107a90a90 100644 --- a/lib/efi_loader/Kconfig +++ b/lib/efi_loader/Kconfig @@ -1,6 +1,6 @@ config EFI_LOADER bool "Support running EFI Applications in U-Boot" - depends on (ARM || X86) && OF_LIBFDT + depends on (ARM || X86 || SANDBOX) && OF_LIBFDT # We do not support bootefi booting ARMv7 in non-secure mode depends on !ARMV7_NONSEC # We need EFI_STUB_64BIT to be set on x86_64 with EFI_STUB
This allows this feature to build within sandbox. This is for testing purposes only since it is not possible for sandbox to load native code. Signed-off-by: Simon Glass <sjg@chromium.org> --- Changes in v4: None Changes in v3: - Init the 'rows' and 'cols' vars to avoid a compiler error (gcc 4.8.4) Changes in v2: None lib/efi_loader/Kconfig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)