From patchwork Thu Jun 14 16:55:21 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Simon Glass X-Patchwork-Id: 929590 X-Patchwork-Delegate: sjg@chromium.org Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.denx.de (client-ip=81.169.180.215; helo=lists.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=chromium.org Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=google.com header.i=@google.com header.b="f1GVQ2mT"; dkim-atps=neutral Received: from lists.denx.de (dione.denx.de [81.169.180.215]) by ozlabs.org (Postfix) with ESMTP id 41690H06W8z9s01 for ; Fri, 15 Jun 2018 03:02:22 +1000 (AEST) Received: by lists.denx.de (Postfix, from userid 105) id A37FBC21E35; Thu, 14 Jun 2018 16:57:11 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de X-Spam-Level: X-Spam-Status: No, score=-0.0 required=5.0 tests=RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL, T_DKIM_INVALID autolearn=unavailable autolearn_force=no version=3.4.0 Received: from lists.denx.de (localhost [IPv6:::1]) by lists.denx.de (Postfix) with ESMTP id 36A60C21E1A; Thu, 14 Jun 2018 16:55:44 +0000 (UTC) Received: by lists.denx.de (Postfix, from userid 105) id 0B2AAC21E3E; Thu, 14 Jun 2018 16:55:40 +0000 (UTC) Received: from mail-it0-f67.google.com (mail-it0-f67.google.com [209.85.214.67]) by lists.denx.de (Postfix) with ESMTPS id C691EC21DFB for ; Thu, 14 Jun 2018 16:55:35 +0000 (UTC) Received: by mail-it0-f67.google.com with SMTP id 188-v6so9610588ita.5 for ; Thu, 14 Jun 2018 09:55:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=sender:from:to:cc:subject:date:message-id:in-reply-to:references; bh=aYInXOzQD2MbVlrTa+xBi3oMuMZ6gCQfLm/LJ++rTGo=; b=f1GVQ2mTM+h39CChvPpgG8XeKxRCXi7VxqxLQkSQmvogwOySmDSAqVlBW9ap/VtDbY QC4ytGHQA42Dsy3uo1FUdmKp22qOxWaE1ch31Wg5+PEaAoG3RXSI7qNMw97gqpTekcJf RA9rwMszcj47/s4eENvcB++CeSW3PMzOmbf/EiT1COqFCTvqNrcNq6t3nUXvp1FIYaCi z3Px5CLBiI/W4sWqicoXN5NRRDoTWSz2MtopjnZu37XP3N6/2et+Na+i0C/w08ayyxT3 Okfm3neaoTHELaNGvN0AE5HQP+5V/mWoQqRp/L+OCLwOE4S1H2W6MIRDOBRur3MKK2zD bXKw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:cc:subject:date:message-id :in-reply-to:references; bh=aYInXOzQD2MbVlrTa+xBi3oMuMZ6gCQfLm/LJ++rTGo=; b=NCTP9noWT57fj3yYc+QVvFmWvTIJY5EAU3xwCN5AloihL1ZgWYJsZebgNIQLTeQZJ3 HJqGDjjpAZb5hG5JC26Azi6ueiQmA4AcxQwQBObuLB5/gTndj3/1JCX4HxJs/zKot/e6 y4BWbKzec655sVDm+HHQZslAHpWh6N7aesEbOmWT4RU2UNIHgNOqxwYreSQk0a3Oabf/ 7Z6OZiJOHTKLx5qLDyC9R3G1ufhdbFV/HxSfwZKaDM+RNkkq08i0Ov7HL3EOob2XzYwb K92r1q5mzqB6jGCA5geOY7IHZ9q/GtyLbzj4dvEsEv5vXBInsiIKKghUoVOe5UnC2eW/ YiWg== X-Gm-Message-State: APt69E1MzN/2uWJJrp63M4Q2xuvEXnHUAEiOMGs3vjRy/5SKftqLGO/s o2gCF9sCQ7nPt6seAsamzmaogA== X-Google-Smtp-Source: ADUXVKK7I9y4LmlteM/1c9PFjZ9y/oSljj628Cq22bP/hG+KztrG+beYhJs90nY1umrNzNQB8L3BhA== X-Received: by 2002:a24:1d8f:: with SMTP id 137-v6mr3090487itj.41.1528995334232; Thu, 14 Jun 2018 09:55:34 -0700 (PDT) Received: from kiwi.bld.corp.google.com ([100.67.80.24]) by smtp.gmail.com with ESMTPSA id o80-v6sm2162290ito.44.2018.06.14.09.55.31 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Thu, 14 Jun 2018 09:55:32 -0700 (PDT) Received: by kiwi.bld.corp.google.com (Postfix, from userid 121222) id B8D551406CE; Thu, 14 Jun 2018 10:55:30 -0600 (MDT) From: Simon Glass To: U-Boot Mailing List Date: Thu, 14 Jun 2018 10:55:21 -0600 Message-Id: <20180614165526.183597-7-sjg@chromium.org> X-Mailer: git-send-email 2.18.0.rc1.244.gcf134e6275-goog In-Reply-To: <20180614165526.183597-1-sjg@chromium.org> References: <20180614165526.183597-1-sjg@chromium.org> Cc: Andy Shevchenko , Heinrich Schuchardt , Alexander Graf Subject: [U-Boot] [PATCH v7 06/10] efi: sandbox: Enable EFI loader build for sandbox X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.18 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" This allows this feature to build within sandbox. This is for testing purposes only since it is not possible for sandbox to load native code. Signed-off-by: Simon Glass --- Changes in v7: - Update patch subject s/builder/build/ Changes in v6: None Changes in v5: None Changes in v4: None Changes in v3: - Init the 'rows' and 'cols' vars to avoid a compiler error (gcc 4.8.4) Changes in v2: None lib/efi_loader/Kconfig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/efi_loader/Kconfig b/lib/efi_loader/Kconfig index df58e633d1..d471e6f4a4 100644 --- a/lib/efi_loader/Kconfig +++ b/lib/efi_loader/Kconfig @@ -1,6 +1,6 @@ config EFI_LOADER bool "Support running EFI Applications in U-Boot" - depends on (ARM || X86 || RISCV) && OF_LIBFDT + depends on (ARM || X86 || RISCV || SANDBOX) && OF_LIBFDT # We do not support bootefi booting ARMv7 in non-secure mode depends on !ARMV7_NONSEC # We need EFI_STUB_64BIT to be set on x86_64 with EFI_STUB