U-Boot
Threads by month
- ----- 2025 -----
- May
- April
- March
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
January 2022
- 197 participants
- 699 discussions

21 Jan '22
The available ram can be limited by ram_top as that depends on the
reserved memory nodes provided by the device-tree (via
board_get_usable_ram_top), so make sure to respect ram_top when setting
up bootm_size to avoid overlapping reserved memory regions (e.g. memory
used by OP-TEE).
The same logic is available in env_get_bootm_size when bootm_size is
not defined by the default environment.
Signed-off-by: Ricardo Salveti <ricardo(a)foundries.io>
---
Change in v2:
- Declare bootm_size based on ram top and base
board/xilinx/common/board.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/board/xilinx/common/board.c b/board/xilinx/common/board.c
index 78a5d0efa86..6fce23197a4 100644
--- a/board/xilinx/common/board.c
+++ b/board/xilinx/common/board.c
@@ -377,7 +377,7 @@ int board_late_init_xilinx(void)
u32 ret = 0;
int i, id, macid = 0;
struct xilinx_board_description *desc;
- phys_size_t bootm_size = gd->ram_size;
+ phys_size_t bootm_size = gd->ram_top - gd->ram_base;
if (!CONFIG_IS_ENABLED(MICROBLAZE)) {
ulong scriptaddr;
--
2.34.1
2
1

21 Jan '22
Hi,
Here is an RFC series of patches for the FWU Multi Bank Update
support for the DeveloperBox platform. This series depends on
Sughosh's Multi Bank Update v3 [1]. Thus if that is updated,
this must be rebased and updated too.
[1] https://patchwork.ozlabs.org/project/uboot/list/?series=281875
This series includes my previous DFU updates[2] as [01/14]-[05/14],
which is still under review in the U-Boot ML. For "nicely" indent
the dfu_alt_info lines, I need that series. :-)
[2] https://patchwork.ozlabs.org/project/uboot/list/?series=275293
I also added some patches which updates Sughosh's series as [06/14]
- [08/14]. Thus the [09/14] - [14/14] are the changes for DeveloperBox.
Unlike the STM32MP board, DeveloperBox (SynQuacer) loads the firmware
from SPI NOR flash. Thus it doesn't use GPT partitions to store the
firmware banks and the FWU metadata. Instead, it stores those data
at fixed address areas on SPI NOR flash. I carefully chose the areas
which doesn't overlap the previous firmware and EDK2.
I introduced fwu_metadata_sf.c driver for this FWU multi bank support
on SPI flash, which does not use GPT too.
Since there is no GPT, the location GUID for images and the image
GUID for banks are Null GUID. Anyway, for managing firmware image
banks, we only need the ImageType GUID.
And the SynQuacer also does not have any non-volatile register.
Thus this allocates the platform defined boot index on the SPI flash
too.
So, in summary, on the DeveloperBox, this FWU Multi Bank update is
only for avoidance of unexpected bricking by firmware update. If there
are multiple banks, when the user (or firmware developer) update it
with a wrong image, they can revert the wrong one. Even if it does
not boot, SCP firmware can detect it and roll back to the previous
bank. But please note that this is not "security" enhancement at all
at least on the DeveloperBox because all images are still on normal
SPI NOR flash. This is rather like a "safety" feature like a fool proof.
NOTE: To use this series, you also need to update SCP firmware[3] and
TF-A[4] on the DeveloperBox. Those are under cleaning up.
[3] https://git.linaro.org/people/masami.hiramatsu/SCP-firmware.git/
[4] https://git.linaro.org/people/masami.hiramatsu/arm-trusted-firmware.git/
Thank you,
---
Masami Hiramatsu (14):
DFU: Do not copy the entity name over the buffer size
DFU: Accept redundant spaces and tabs in dfu_alt_info
DFU: Check the number of arguments and argument string strictly
doc: usage: DFU: Fix dfu_alt_info document
cmd/dfu: Enable 'dfu list' command without DFU_OVER_USB
FWU: Calculate CRC32 in gpt_update_mdata()
FWU: Free metadata copy if gpt_get_mdata() failed
FWU: Move FWU metadata operation code in fwu_mdata.c
synquacer: Update for TBBR based new FIP layout
FWU: Reboot soon after successfully install the new firmware
FWU: Add FWU Multi Bank Update on SPI Flash
FWU: synquacer: Add FWU Multi bank update support for DeveloperBox
FWU: synquacer: Initialize broken metadata
configs: synquacer: Add FWU support for DeveloperBox
.../dts/synquacer-sc2a11-developerbox-u-boot.dtsi | 26 +-
board/socionext/developerbox/Kconfig | 31 +++
board/socionext/developerbox/Makefile | 1
board/socionext/developerbox/fwu_plat.c | 217 ++++++++++++++++++
cmd/dfu.c | 6
configs/synquacer_developerbox_defconfig | 12 +
doc/usage/dfu.rst | 45 +++-
drivers/dfu/dfu.c | 37 ++-
drivers/dfu/dfu_mmc.c | 55 +++--
drivers/dfu/dfu_mtd.c | 34 ++-
drivers/dfu/dfu_nand.c | 34 ++-
drivers/dfu/dfu_ram.c | 24 +-
drivers/dfu/dfu_sf.c | 34 ++-
drivers/dfu/dfu_virt.c | 5
include/configs/synquacer.h | 14 +
include/dfu.h | 33 ++-
include/efi_loader.h | 3
include/fwu.h | 22 +-
lib/efi_loader/efi_capsule.c | 10 +
lib/efi_loader/efi_firmware.c | 14 +
lib/fwu_updates/Kconfig | 43 ++++
lib/fwu_updates/Makefile | 5
lib/fwu_updates/fwu_mdata.c | 123 ++++++----
lib/fwu_updates/fwu_mdata_gpt_blk.c | 109 +--------
lib/fwu_updates/fwu_mdata_sf.c | 241 ++++++++++++++++++++
25 files changed, 888 insertions(+), 290 deletions(-)
create mode 100644 board/socionext/developerbox/fwu_plat.c
create mode 100644 lib/fwu_updates/fwu_mdata_sf.c
--
Masami Hiramatsu <masami.hiramatsu(a)linaro.org>
2
22
Pogoplug V4 specifications:
Kirkwood 88F6192 SoC
800 MHz CPU
1Gbs Ethernet
128 MB RAM
128 MB NAND
1x USB 2.0
2x USB 3.0 (on PCIe bus)
1 SDHC slot
1x External SATA port (USM enclosure form factor slot)
Changes in v3:
- Migrate symbols from board include header to Kconfig
- Squash board file small patches into one patch
- Migrate config symbols from board include header to defconfig
- Remove obsolete config symbols from header file
- Don't use ifdefs for unselectable config symbols in header file
Changes in v2:
- Use mainline Linux DTS version
- Move constants to .c file and remove header file
- Use canonical format for defconfig file
Tony Dinh (4):
arm: kirkwood: Pogoplug-V4 : Add DTS files
arm: kirkwood: Pogoplug-V4 : Add Kconfig files
arm: kirkwood: Pogoplug-V4 : Add board implementation files
arm: kirkwood: Pogoplug V4 : Add board include header and defconfig
files
arch/arm/dts/Makefile | 1 +
arch/arm/dts/kirkwood-pogoplug-series-4.dts | 180 ++++++++++++++++
arch/arm/mach-kirkwood/Kconfig | 6 +
board/cloudengines/pogo_v4/Kconfig | 16 ++
board/cloudengines/pogo_v4/MAINTAINERS | 6 +
board/cloudengines/pogo_v4/Makefile | 10 +
board/cloudengines/pogo_v4/kwbimage.cfg | 148 +++++++++++++
board/cloudengines/pogo_v4/pogo_v4.c | 220 ++++++++++++++++++++
configs/pogo_v4_defconfig | 79 +++++++
include/configs/pogo_v4.h | 56 +++++
10 files changed, 722 insertions(+)
create mode 100644 arch/arm/dts/kirkwood-pogoplug-series-4.dts
create mode 100644 board/cloudengines/pogo_v4/Kconfig
create mode 100644 board/cloudengines/pogo_v4/MAINTAINERS
create mode 100644 board/cloudengines/pogo_v4/Makefile
create mode 100644 board/cloudengines/pogo_v4/kwbimage.cfg
create mode 100644 board/cloudengines/pogo_v4/pogo_v4.c
create mode 100644 configs/pogo_v4_defconfig
create mode 100644 include/configs/pogo_v4.h
--
2.30.2
2
6

[PATCH v9 00/11] efi_loader: capsule: improve capsule authentication support
by AKASHI Takahiro 20 Jan '22
by AKASHI Takahiro 20 Jan '22
20 Jan '22
As I proposed and discussed in [1] and [2], I have made a couple of
improvements on the current implementation of capsule update in this
patch set.
* add signing feature to mkeficapsule
* add "--guid" option to mkeficapsule
* add man page of mkeficapsule
* update uefi document regarding capsule update
* revise pytests
[1] https://lists.denx.de/pipermail/u-boot/2021-April/447918.html
[2] https://lists.denx.de/pipermail/u-boot/2021-July/455292.html
Prerequisite patches
====================
None
Test
====
* locally passed the pytest which is included in this patch series
on sandbox built.
(CONFIG_EFI_CAPSULE_AUTHENTICATE should explicitly be turned on
in order to exercise the authentication code.)
Changes
=======
v9 (Jan 18, 2022)
* rebased on v2022.01
* print the output messages to stderr (patch#1,#2, #4 and #6)
* use SIZE_MAX instead of (u32)!0U (patch#2)
* revise and re-format the man page of mkeficapsule (patch#5)
* add "code-block:: console" directives for command line examples
in a ReST document (patch#6)
* describe the case when a trailing '/' in EFITOOLS_PATH is needed
(patch#7)
* describe UUID data as a binary rather than a string (patch#8)
* drop fdtsig.sh-related patches (patch#12,#13 in v8)
v8 (Dec 20, 2021)
* rebase on v2022.01-rc3
* move the definition of CONFIG_TOOLS_MKEFICAPSULE to a proper patch
(patch#2)
v7 (Nov 16, 2021)
* rebased on pre-v2022.01-rc2
* drop already-merged patch
* check for a size of firmware binary file (patch#1)
* enable mkeficapsule in tools-only_defconfig (patch#2)
* define eficapsule.h and include it from mkeficapsule (patch#3)
Hopefully, the tool can now compile on non-linux host.
v6 (Nov 02, 2021)
* rebased on pre-v2022.01-rc1
* add patch#2 to rework/refactor the code for better readability (patch#2)
* use exit(EXIT_SUCCESS/FAILURE) (patch#3)
* truncate >80chars lines in pytest scripts (patch#6)
v5 (Oct 27, 2021)
* rebased on pre-v2022.01-rc1 (WIP/26Oct2021)
* drop already-merged patches
* drop __weak from efi_get_public_key_data() (patch#1)
* describe the format of public key node in device tree (patch#4)
* re-order patches by grouping closely-related patches (patch#6-8)
* modify pytest to make the test results correctly verified
either with or without CONFIG_EFI_CAPSULE_AUTHENTICATE (patch#9)
* add RFCs for embedding public keys during the build process (patch#10,11)
v4 (Oct 7, 2021)
* rebased on v2021.10
* align with "Revert "efi_capsule: Move signature from DTB to .rodata""
* add more missing *revert* commits (patch#1,#2,#3)
* add fdtsig.sh, replacing dtb support in mkeficapsule (patch#4)
* update/revise the man/uefi doc (patch#6,#7)
* fix a bug in parsing guid string (patch#8)
* add a test for "--guid" option (patch#10)
* use dtb-based authentication test as done in v1 (patch#11)
v3 (Aug 31, 2021)
* rebased on v2021.10-rc3
* remove pytest-related patches
* add function descriptions in mkeficapsule.c
* correct format specifiers in printf()
* let main() return 0 or -1 only
* update doc/develop/uefi/uefi.rst for syntax change of mkeficapsule
v2 (July 28, 2021)
* rebased on v2021.10-rc*
* removed dependency on target's configuration
* removed fdtsig.sh and others
* add man page
* update the UEFI document
* add dedicate defconfig for testing on sandbox
* add gitlab CI support
* add "--guid" option to mkeficapsule
(yet rather RFC)
Initial release (May 12, 2021)
* based on v2021.07-rc2
AKASHI Takahiro (11):
tools: mkeficapsule: output messages to stderr instead of stdout
tools: mkeficapsule: rework the code a little bit
tools: build mkeficapsule with tools-only_defconfig
tools: mkeficapsule: add firmware image signing
tools: mkeficapsule: add man page
doc: update UEFI document for usage of mkeficapsule
test/py: efi_capsule: add image authentication test
tools: mkeficapsule: allow for specifying GUID explicitly
test/py: efi_capsule: align with the syntax change of mkeficapsule
test/py: efi_capsule: add a test for "--guid" option
test/py: efi_capsule: check the results in case of
CAPSULE_AUTHENTICATE
MAINTAINERS | 1 +
configs/tools-only_defconfig | 1 +
doc/develop/uefi/uefi.rst | 147 ++--
doc/mkeficapsule.1 | 111 +++
.../py/tests/test_efi_capsule/capsule_defs.py | 5 +
test/py/tests/test_efi_capsule/conftest.py | 59 +-
test/py/tests/test_efi_capsule/signature.dts | 10 +
.../test_efi_capsule/test_capsule_firmware.py | 91 ++-
.../test_capsule_firmware_signed.py | 254 +++++++
tools/Kconfig | 8 +
tools/Makefile | 8 +-
tools/eficapsule.h | 115 +++
tools/mkeficapsule.c | 707 +++++++++++++++---
13 files changed, 1317 insertions(+), 200 deletions(-)
create mode 100644 doc/mkeficapsule.1
create mode 100644 test/py/tests/test_efi_capsule/signature.dts
create mode 100644 test/py/tests/test_efi_capsule/test_capsule_firmware_signed.py
create mode 100644 tools/eficapsule.h
--
2.33.0
3
17
Replace @return and @param.
Signed-off-by: Heinrich Schuchardt <heinrich.schuchardt(a)canonical.com>
---
lib/efi_loader/efi_file.c | 2 +-
lib/efi_loader/efi_freestanding.c | 8 ++++----
lib/efi_loader/efi_gop.c | 2 +-
lib/efi_loader/helloworld.c | 2 +-
lib/efi_selftest/dtbdump.c | 2 +-
lib/efi_selftest/efi_selftest.c | 4 ++--
lib/efi_selftest/efi_selftest_bitblt.c | 6 +++---
lib/efi_selftest/efi_selftest_block_device.c | 6 +++---
lib/efi_selftest/efi_selftest_config_table.c | 4 ++--
lib/efi_selftest/efi_selftest_console.c | 2 +-
lib/efi_selftest/efi_selftest_crc32.c | 4 ++--
lib/efi_selftest/efi_selftest_devicepath_util.c | 2 +-
lib/efi_selftest/efi_selftest_esrt.c | 6 +++---
lib/efi_selftest/efi_selftest_event_groups.c | 4 ++--
lib/efi_selftest/efi_selftest_events.c | 6 +++---
lib/efi_selftest/efi_selftest_exception.c | 4 ++--
lib/efi_selftest/efi_selftest_exitbootservices.c | 4 ++--
lib/efi_selftest/efi_selftest_fdt.c | 4 ++--
lib/efi_selftest/efi_selftest_gop.c | 6 +++---
lib/efi_selftest/efi_selftest_hii.c | 4 ++--
lib/efi_selftest/efi_selftest_load_file.c | 6 +++---
lib/efi_selftest/efi_selftest_loadimage.c | 6 +++---
lib/efi_selftest/efi_selftest_miniapp_exit.c | 4 ++--
lib/efi_selftest/efi_selftest_reset.c | 4 ++--
lib/efi_selftest/efi_selftest_rng.c | 4 ++--
lib/efi_selftest/efi_selftest_rtc.c | 4 ++--
.../efi_selftest_set_virtual_address_map.c | 4 ++--
lib/efi_selftest/efi_selftest_snp.c | 8 ++++----
lib/efi_selftest/efi_selftest_startimage_exit.c | 6 +++---
lib/efi_selftest/efi_selftest_startimage_return.c | 6 +++---
lib/efi_selftest/efi_selftest_tcg2.c | 4 ++--
lib/efi_selftest/efi_selftest_textinput.c | 4 ++--
lib/efi_selftest/efi_selftest_textinputex.c | 6 +++---
lib/efi_selftest/efi_selftest_textoutput.c | 2 +-
lib/efi_selftest/efi_selftest_tpl.c | 6 +++---
lib/efi_selftest/efi_selftest_unaligned.c | 4 ++--
lib/efi_selftest/efi_selftest_watchdog.c | 10 +++++-----
lib/efi_selftest/initrddump.c | 2 +-
38 files changed, 86 insertions(+), 86 deletions(-)
diff --git a/lib/efi_loader/efi_file.c b/lib/efi_loader/efi_file.c
index 6299fcbbf4..8d01f9ed84 100644
--- a/lib/efi_loader/efi_file.c
+++ b/lib/efi_loader/efi_file.c
@@ -1084,7 +1084,7 @@ static const struct efi_file_handle efi_file_handle_protocol = {
* efi_file_from_path() - open file via device path
*
* @fp: device path
- * @return: EFI_FILE_PROTOCOL for the file or NULL
+ * Return: EFI_FILE_PROTOCOL for the file or NULL
*/
struct efi_file_handle *efi_file_from_path(struct efi_device_path *fp)
{
diff --git a/lib/efi_loader/efi_freestanding.c b/lib/efi_loader/efi_freestanding.c
index bd0dff162f..c85df026f0 100644
--- a/lib/efi_loader/efi_freestanding.c
+++ b/lib/efi_loader/efi_freestanding.c
@@ -97,8 +97,8 @@ void *memset(void *s, int c, size_t n)
*
* We do nothing here.
*
- * @param func_ptr Pointer to function being entered
- * @param caller Pointer to function which called this function
+ * func_ptr: Pointer to function being entered
+ * caller: Pointer to function which called this function
*/
void __attribute__((no_instrument_function))
__cyg_profile_func_enter(void *func_ptr, void *caller)
@@ -113,8 +113,8 @@ __cyg_profile_func_enter(void *func_ptr, void *caller)
*
* We do nothing here.
*
- * @param func_ptr Pointer to function being entered
- * @param caller Pointer to function which called this function
+ * func_ptr: Pointer to function being entered
+ * caller: Pointer to function which called this function
*/
void __attribute__((no_instrument_function))
__cyg_profile_func_exit(void *func_ptr, void *caller)
diff --git a/lib/efi_loader/efi_gop.c b/lib/efi_loader/efi_gop.c
index 7683a34a96..2c81859807 100644
--- a/lib/efi_loader/efi_gop.c
+++ b/lib/efi_loader/efi_gop.c
@@ -407,7 +407,7 @@ out:
* @width: width of rectangle
* @height: height of rectangle
* @delta: length in bytes of a line in the pixel buffer (optional)
- * @return: status code
+ * Return: status code
*/
efi_status_t EFIAPI gop_blt(struct efi_gop *this, struct efi_gop_pixel *buffer,
u32 operation, efi_uintn_t sx,
diff --git a/lib/efi_loader/helloworld.c b/lib/efi_loader/helloworld.c
index 3f215e2a46..33e4fbc7c8 100644
--- a/lib/efi_loader/helloworld.c
+++ b/lib/efi_loader/helloworld.c
@@ -133,7 +133,7 @@ efi_status_t print_device_path(struct efi_device_path *device_path,
*
* @handle: handle of the loaded image
* @systab: system table
- * @return: status code
+ * Return: status code
*/
efi_status_t EFIAPI efi_main(efi_handle_t handle,
struct efi_system_table *systab)
diff --git a/lib/efi_selftest/dtbdump.c b/lib/efi_selftest/dtbdump.c
index ed3b985cab..6e1eaa4ef0 100644
--- a/lib/efi_selftest/dtbdump.c
+++ b/lib/efi_selftest/dtbdump.c
@@ -495,7 +495,7 @@ efi_status_t do_save(u16 *filename)
*
* @handle: handle of the loaded image
* @systab: system table
- * @return: status code
+ * Return: status code
*/
efi_status_t EFIAPI efi_main(efi_handle_t image_handle,
struct efi_system_table *systab)
diff --git a/lib/efi_selftest/efi_selftest.c b/lib/efi_selftest/efi_selftest.c
index 3da34b1d46..474a8b8728 100644
--- a/lib/efi_selftest/efi_selftest.c
+++ b/lib/efi_selftest/efi_selftest.c
@@ -149,7 +149,7 @@ static int teardown(struct efi_unit_test *test, unsigned int *failures)
* Check that a test requiring reset exists.
*
* @testname: name of the test
- * @return: test, or NULL if not found
+ * Return: test, or NULL if not found
*/
static bool need_reset(const u16 *testname)
{
@@ -170,7 +170,7 @@ static bool need_reset(const u16 *testname)
* Check that a test exists.
*
* @testname: name of the test
- * @return: test, or NULL if not found
+ * Return: test, or NULL if not found
*/
static struct efi_unit_test *find_test(const u16 *testname)
{
diff --git a/lib/efi_selftest/efi_selftest_bitblt.c b/lib/efi_selftest/efi_selftest_bitblt.c
index fb33150c4b..1def843505 100644
--- a/lib/efi_selftest/efi_selftest_bitblt.c
+++ b/lib/efi_selftest/efi_selftest_bitblt.c
@@ -94,7 +94,7 @@ static void EFIAPI notify(struct efi_event *event, void *context)
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -198,7 +198,7 @@ static int setup(const efi_handle_t handle,
/*
* Tear down unit test.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int teardown(void)
{
@@ -225,7 +225,7 @@ static int teardown(void)
/*
* Execute unit test.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_block_device.c b/lib/efi_selftest/efi_selftest_block_device.c
index ad53dac796..62b3e04db8 100644
--- a/lib/efi_selftest/efi_selftest_block_device.c
+++ b/lib/efi_selftest/efi_selftest_block_device.c
@@ -180,7 +180,7 @@ static efi_handle_t disk_handle;
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -240,7 +240,7 @@ static int setup(const efi_handle_t handle,
/*
* Tear down unit test.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int teardown(void)
{
@@ -292,7 +292,7 @@ static efi_uintn_t dp_size(struct efi_device_path *dp)
/*
* Execute unit test.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_config_table.c b/lib/efi_selftest/efi_selftest_config_table.c
index 2bf12b5bb6..1961e29934 100644
--- a/lib/efi_selftest/efi_selftest_config_table.c
+++ b/lib/efi_selftest/efi_selftest_config_table.c
@@ -68,7 +68,7 @@ static int check_table(const void *table)
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -85,7 +85,7 @@ static int setup(const efi_handle_t handle,
* A table is installed, updated, removed. The table entry and the
* triggering of events is checked.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_console.c b/lib/efi_selftest/efi_selftest_console.c
index ffd88a1e26..fb4fe467a2 100644
--- a/lib/efi_selftest/efi_selftest_console.c
+++ b/lib/efi_selftest/efi_selftest_console.c
@@ -249,7 +249,7 @@ void efi_st_printc(int color, const char *fmt, ...)
/*
* Reads an Unicode character from the input device.
*
- * @return: Unicode character
+ * Return: Unicode character
*/
u16 efi_st_get_key(void)
{
diff --git a/lib/efi_selftest/efi_selftest_crc32.c b/lib/efi_selftest/efi_selftest_crc32.c
index 19153c759a..f2be35314a 100644
--- a/lib/efi_selftest/efi_selftest_crc32.c
+++ b/lib/efi_selftest/efi_selftest_crc32.c
@@ -68,7 +68,7 @@ static int check_table(const void *table)
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -112,7 +112,7 @@ static int setup(const efi_handle_t handle,
*
* Check tables after ExitBootServices()
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_devicepath_util.c b/lib/efi_selftest/efi_selftest_devicepath_util.c
index c846e057d3..1801e30756 100644
--- a/lib/efi_selftest/efi_selftest_devicepath_util.c
+++ b/lib/efi_selftest/efi_selftest_devicepath_util.c
@@ -49,7 +49,7 @@ static int setup(const efi_handle_t img_handle,
*
* @length: length of the media device node
* @dp: device path
- * @return: status code
+ * Return: status code
*/
static int create_single_node_device_path(unsigned int length,
struct efi_device_path **dp)
diff --git a/lib/efi_selftest/efi_selftest_esrt.c b/lib/efi_selftest/efi_selftest_esrt.c
index 99251f22a5..f4e1e3ef37 100644
--- a/lib/efi_selftest/efi_selftest_esrt.c
+++ b/lib/efi_selftest/efi_selftest_esrt.c
@@ -108,7 +108,7 @@ static void *lib_test_get_esrt(void)
* @esrt: pointer to the ESRT
* @img_info: an image_info_descriptor output by the FMP get_image_info
*
- * @return: true if matching ESRT entry is found and if all the ESRT entry fields match the
+ * Return: true if matching ESRT entry is found and if all the ESRT entry fields match the
* corresponding @img_info fields.
*/
static bool lib_test_check_uuid_entry(struct efi_system_resource_table *esrt,
@@ -168,7 +168,7 @@ static bool lib_test_check_uuid_entry(struct efi_system_resource_table *esrt,
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -185,7 +185,7 @@ static int setup(const efi_handle_t handle,
*
* Uninstall the test FMP.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int teardown(void)
{
diff --git a/lib/efi_selftest/efi_selftest_event_groups.c b/lib/efi_selftest/efi_selftest_event_groups.c
index 6dcde50648..7a6d9fb162 100644
--- a/lib/efi_selftest/efi_selftest_event_groups.c
+++ b/lib/efi_selftest/efi_selftest_event_groups.c
@@ -38,7 +38,7 @@ static void EFIAPI notify(struct efi_event *event, void *context)
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -54,7 +54,7 @@ static int setup(const efi_handle_t handle,
* Create multiple events in an event group. Signal each event once and check
* that all events are notified once in each round.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_events.c b/lib/efi_selftest/efi_selftest_events.c
index 1077cbdf9e..90071536a2 100644
--- a/lib/efi_selftest/efi_selftest_events.c
+++ b/lib/efi_selftest/efi_selftest_events.c
@@ -39,7 +39,7 @@ static void EFIAPI notify(struct efi_event *event, void *context)
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -69,7 +69,7 @@ static int setup(const efi_handle_t handle,
*
* Close the events created in setup.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int teardown(void)
{
@@ -103,7 +103,7 @@ static int teardown(void)
* Run a 100 ms single shot timer and check that it is called once
* while waiting for 100 ms periodic timer for two periods.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_exception.c b/lib/efi_selftest/efi_selftest_exception.c
index d86228a892..dca7f7d343 100644
--- a/lib/efi_selftest/efi_selftest_exception.c
+++ b/lib/efi_selftest/efi_selftest_exception.c
@@ -99,7 +99,7 @@ static efi_status_t decompress(u8 **image)
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -118,7 +118,7 @@ static int setup(const efi_handle_t handle,
*
* Load and start the application image.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_exitbootservices.c b/lib/efi_selftest/efi_selftest_exitbootservices.c
index 59ab15407a..f5e0d9da89 100644
--- a/lib/efi_selftest/efi_selftest_exitbootservices.c
+++ b/lib/efi_selftest/efi_selftest_exitbootservices.c
@@ -63,7 +63,7 @@ static void EFIAPI ebs_notify(struct efi_event *event, void *context)
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -101,7 +101,7 @@ static int setup(const efi_handle_t handle,
* Call ExitBootServices again and check that the notification function is
* not called again.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_fdt.c b/lib/efi_selftest/efi_selftest_fdt.c
index 739f029b8c..70fe06e0c4 100644
--- a/lib/efi_selftest/efi_selftest_fdt.c
+++ b/lib/efi_selftest/efi_selftest_fdt.c
@@ -165,7 +165,7 @@ static void *efi_st_get_config_table(const efi_guid_t *guid)
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t img_handle,
const struct efi_system_table *systable)
@@ -192,7 +192,7 @@ static int setup(const efi_handle_t img_handle,
/*
* Execute unit test.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_gop.c b/lib/efi_selftest/efi_selftest_gop.c
index d64294ac79..e500752fda 100644
--- a/lib/efi_selftest/efi_selftest_gop.c
+++ b/lib/efi_selftest/efi_selftest_gop.c
@@ -18,7 +18,7 @@ static struct efi_gop *gop;
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -39,7 +39,7 @@ static int setup(const efi_handle_t handle,
/*
* Tear down unit test.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int teardown(void)
{
@@ -49,7 +49,7 @@ static int teardown(void)
/*
* Execute unit test.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_hii.c b/lib/efi_selftest/efi_selftest_hii.c
index f4b70f7950..66ccec1e3f 100644
--- a/lib/efi_selftest/efi_selftest_hii.c
+++ b/lib/efi_selftest/efi_selftest_hii.c
@@ -28,7 +28,7 @@ static struct efi_hii_string_protocol *hii_string_protocol;
* @handle: handle of the loaded image
* @systable: system table
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -1033,7 +1033,7 @@ static int test_hii_string_protocol(void)
/*
* Execute unit test.
*
- * @return: EFI_ST_SUCCESS for success, EFI_ST_FAILURE for failure
+ * Return: EFI_ST_SUCCESS for success, EFI_ST_FAILURE for failure
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_load_file.c b/lib/efi_selftest/efi_selftest_load_file.c
index bf955cbf66..bac0e6b61d 100644
--- a/lib/efi_selftest/efi_selftest_load_file.c
+++ b/lib/efi_selftest/efi_selftest_load_file.c
@@ -284,7 +284,7 @@ static struct efi_load_file_protocol lf2_prot = {load_file2};
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int efi_st_load_file_setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -326,7 +326,7 @@ static int efi_st_load_file_setup(const efi_handle_t handle,
/*
* Tear down unit test.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int efi_st_load_file_teardown(void)
{
@@ -377,7 +377,7 @@ static int efi_st_load_file_teardown(void)
* Try loading an image via the EFI_LOAD_FILE_PROTOCOL and the
* EFI_LOAD_FILE2_PROTOCOL. Finally execute the image.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int efi_st_load_file_execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_loadimage.c b/lib/efi_selftest/efi_selftest_loadimage.c
index 4975d80ff1..72c8d51687 100644
--- a/lib/efi_selftest/efi_selftest_loadimage.c
+++ b/lib/efi_selftest/efi_selftest_loadimage.c
@@ -411,7 +411,7 @@ static efi_status_t decompress(u8 **image)
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -447,7 +447,7 @@ static int setup(const efi_handle_t handle,
*
* Uninstall protocols and free memory.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int teardown(void)
{
@@ -486,7 +486,7 @@ static int teardown(void)
*
* Load and start the application image.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_miniapp_exit.c b/lib/efi_selftest/efi_selftest_miniapp_exit.c
index 6b5cfb01cf..2ea19f20ed 100644
--- a/lib/efi_selftest/efi_selftest_miniapp_exit.c
+++ b/lib/efi_selftest/efi_selftest_miniapp_exit.c
@@ -21,7 +21,7 @@ static efi_guid_t loaded_image_protocol_guid = EFI_LOADED_IMAGE_PROTOCOL_GUID;
*
* @image_handle: handle of the loaded image
* @systable: system table
- * @return: status code
+ * Return: status code
*/
static efi_status_t EFIAPI check_loaded_image_protocol
(efi_handle_t image_handle, struct efi_system_table *systable)
@@ -60,7 +60,7 @@ static efi_status_t EFIAPI check_loaded_image_protocol
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: status code
+ * Return: status code
*/
efi_status_t EFIAPI efi_main(efi_handle_t handle,
struct efi_system_table *systable)
diff --git a/lib/efi_selftest/efi_selftest_reset.c b/lib/efi_selftest/efi_selftest_reset.c
index 8b6ac24cb1..f888054894 100644
--- a/lib/efi_selftest/efi_selftest_reset.c
+++ b/lib/efi_selftest/efi_selftest_reset.c
@@ -17,7 +17,7 @@ static struct efi_runtime_services *runtime;
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -29,7 +29,7 @@ static int setup(const efi_handle_t handle,
/*
* Execute unit test.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_rng.c b/lib/efi_selftest/efi_selftest_rng.c
index fca9749d07..007d1c82e9 100644
--- a/lib/efi_selftest/efi_selftest_rng.c
+++ b/lib/efi_selftest/efi_selftest_rng.c
@@ -20,7 +20,7 @@ static efi_guid_t efi_rng_guid = EFI_RNG_PROTOCOL_GUID;
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -35,7 +35,7 @@ static int setup(const efi_handle_t handle,
* Retrieve available RNG algorithms.
* Retrieve two random values and compare them.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_rtc.c b/lib/efi_selftest/efi_selftest_rtc.c
index 6f7035dee6..e9e47e96c4 100644
--- a/lib/efi_selftest/efi_selftest_rtc.c
+++ b/lib/efi_selftest/efi_selftest_rtc.c
@@ -19,7 +19,7 @@ static struct efi_runtime_services *runtime;
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -35,7 +35,7 @@ static int setup(const efi_handle_t handle,
* Set a new value and read it back.
* Set the real time clock back the current time.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_set_virtual_address_map.c b/lib/efi_selftest/efi_selftest_set_virtual_address_map.c
index 8e2e8ba172..d28ed83eb3 100644
--- a/lib/efi_selftest/efi_selftest_set_virtual_address_map.c
+++ b/lib/efi_selftest/efi_selftest_set_virtual_address_map.c
@@ -73,7 +73,7 @@ static void EFIAPI notify(struct efi_event *event, void *context)
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -176,7 +176,7 @@ static int setup(const efi_handle_t handle,
* The triggering of the EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event is checked via
* the call count of the notification function.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_snp.c b/lib/efi_selftest/efi_selftest_snp.c
index 818cbfcacd..15af8d3e18 100644
--- a/lib/efi_selftest/efi_selftest_snp.c
+++ b/lib/efi_selftest/efi_selftest_snp.c
@@ -77,7 +77,7 @@ static unsigned int net_ip_id;
*
* @buf: IP header
* @len: length of header in bytes
- * @return: checksum
+ * Return: checksum
*/
static unsigned int efi_ip_checksum(const void *buf, size_t len)
{
@@ -175,7 +175,7 @@ static efi_status_t send_dhcp_discover(void)
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -282,7 +282,7 @@ static int setup(const efi_handle_t handle,
* A DHCP discover message is sent. The test is successful if a
* DHCP reply is received within 10 seconds.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
@@ -422,7 +422,7 @@ received:
* Close the timer event created in setup.
* Shut down the network adapter.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int teardown(void)
{
diff --git a/lib/efi_selftest/efi_selftest_startimage_exit.c b/lib/efi_selftest/efi_selftest_startimage_exit.c
index 5d4c0a6972..b65a10b7a4 100644
--- a/lib/efi_selftest/efi_selftest_startimage_exit.c
+++ b/lib/efi_selftest/efi_selftest_startimage_exit.c
@@ -79,7 +79,7 @@ static efi_status_t decompress(u8 **image)
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -96,7 +96,7 @@ static int setup(const efi_handle_t handle,
/*
* Tear down unit test.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int teardown(void)
{
@@ -117,7 +117,7 @@ static int teardown(void)
*
* Load and start the application image.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_startimage_return.c b/lib/efi_selftest/efi_selftest_startimage_return.c
index 44c23644ea..3e0c5a9ffb 100644
--- a/lib/efi_selftest/efi_selftest_startimage_return.c
+++ b/lib/efi_selftest/efi_selftest_startimage_return.c
@@ -79,7 +79,7 @@ static efi_status_t decompress(u8 **image)
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -96,7 +96,7 @@ static int setup(const efi_handle_t handle,
/*
* Tear down unit test.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int teardown(void)
{
@@ -117,7 +117,7 @@ static int teardown(void)
*
* Load and start the application image.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_tcg2.c b/lib/efi_selftest/efi_selftest_tcg2.c
index 2eed588eea..a2b4a79e9b 100644
--- a/lib/efi_selftest/efi_selftest_tcg2.c
+++ b/lib/efi_selftest/efi_selftest_tcg2.c
@@ -612,7 +612,7 @@ static efi_status_t setup_smbios_table(const struct efi_system_table *systable)
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: status code
+ * Return: status code
*/
static int efi_st_tcg2_setup(const efi_handle_t img_handle,
const struct efi_system_table *systable)
@@ -949,7 +949,7 @@ static int efi_st_tcg2_execute(void)
/*
* efi_st_tcg2_teardown() - Tear down unit test
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int efi_st_tcg2_teardown(void)
{
diff --git a/lib/efi_selftest/efi_selftest_textinput.c b/lib/efi_selftest/efi_selftest_textinput.c
index b90671cdd2..141856a4cf 100644
--- a/lib/efi_selftest/efi_selftest_textinput.c
+++ b/lib/efi_selftest/efi_selftest_textinput.c
@@ -21,7 +21,7 @@ static struct efi_boot_services *boottime;
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -34,7 +34,7 @@ static int setup(const efi_handle_t handle,
/*
* Execute unit test.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_textinputex.c b/lib/efi_selftest/efi_selftest_textinputex.c
index de44224ce1..bd221d6254 100644
--- a/lib/efi_selftest/efi_selftest_textinputex.c
+++ b/lib/efi_selftest/efi_selftest_textinputex.c
@@ -45,7 +45,7 @@ static efi_status_t EFIAPI efi_key_notify_function
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -93,7 +93,7 @@ static int setup(const efi_handle_t handle,
*
* Unregister notify function.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int teardown(void)
{
@@ -112,7 +112,7 @@ static int teardown(void)
/*
* Execute unit test.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_textoutput.c b/lib/efi_selftest/efi_selftest_textoutput.c
index a87f65e197..450fe97e62 100644
--- a/lib/efi_selftest/efi_selftest_textoutput.c
+++ b/lib/efi_selftest/efi_selftest_textoutput.c
@@ -15,7 +15,7 @@
/*
* Execute unit test.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_tpl.c b/lib/efi_selftest/efi_selftest_tpl.c
index 0c0e412ae2..f4e467267e 100644
--- a/lib/efi_selftest/efi_selftest_tpl.c
+++ b/lib/efi_selftest/efi_selftest_tpl.c
@@ -37,7 +37,7 @@ static void EFIAPI notify(struct efi_event *event, void *context)
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -68,7 +68,7 @@ static int setup(const efi_handle_t handle,
*
* Close the events created in setup.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int teardown(void)
{
@@ -106,7 +106,7 @@ static int teardown(void)
* Lower the TPL level and check that the queued notification
* function is called.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_unaligned.c b/lib/efi_selftest/efi_selftest_unaligned.c
index 1802948e67..6fce110b76 100644
--- a/lib/efi_selftest/efi_selftest_unaligned.c
+++ b/lib/efi_selftest/efi_selftest_unaligned.c
@@ -19,7 +19,7 @@ struct aligned_buffer {
* occurs.
*
* @addr: address to read
- * @return: value at the address
+ * Return: value at the address
*/
static inline u32 deref(u32 *addr)
{
@@ -37,7 +37,7 @@ static inline u32 deref(u32 *addr)
* Execute unit test.
* An unaligned memory access is executed. The result is checked.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/efi_selftest_watchdog.c b/lib/efi_selftest/efi_selftest_watchdog.c
index cbc6761721..a352d4a5ad 100644
--- a/lib/efi_selftest/efi_selftest_watchdog.c
+++ b/lib/efi_selftest/efi_selftest_watchdog.c
@@ -65,7 +65,7 @@ static void EFIAPI notify(struct efi_event *event, void *context)
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -98,7 +98,7 @@ static int setup(const efi_handle_t handle,
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup_timer(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -112,7 +112,7 @@ static int setup_timer(const efi_handle_t handle,
*
* @handle: handle of the loaded image
* @systable: system table
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int setup_reboot(const efi_handle_t handle,
const struct efi_system_table *systable)
@@ -126,7 +126,7 @@ static int setup_reboot(const efi_handle_t handle,
*
* Close the events created in setup.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int teardown(void)
{
@@ -166,7 +166,7 @@ static int teardown(void)
* Run a 1350 ms single shot timer and check that the 600ms timer has
* been called 2 times.
*
- * @return: EFI_ST_SUCCESS for success
+ * Return: EFI_ST_SUCCESS for success
*/
static int execute(void)
{
diff --git a/lib/efi_selftest/initrddump.c b/lib/efi_selftest/initrddump.c
index 325951b498..efdcf0dd50 100644
--- a/lib/efi_selftest/initrddump.c
+++ b/lib/efi_selftest/initrddump.c
@@ -405,7 +405,7 @@ out:
*
* @handle: handle of the loaded image
* @systab: system table
- * @return: status code
+ * Return: status code
*/
efi_status_t EFIAPI efi_main(efi_handle_t image_handle,
struct efi_system_table *systab)
--
2.33.1
1
0
Hi Tom,
please pull the next batch of mostly Marvell MVEBU related patches:
----------------------------------------------------------------
- fdt_support: Add fdt_for_each_node_by_compatible() helper macro (Marek)
- turris_omnia: Fixup SATA or PCIe nodes at runtime in DT blob (Pali)
- pci_mvebu: Add support for Kirkwood PCIe controllers (Pali)
- SPL: More verifications for kwbimage in SPL (Pali)
- mvebu: Remove comphy_update_map() (Pali)
- Minor misc stuff
----------------------------------------------------------------
Here the Azure build, without any issues:
https://dev.azure.com/sr0718/u-boot/_build/results?buildId=155&view=results
Thanks,
Stefan
The following changes since commit 068415eadefbbc81f14d4ce61fcf7a7eb39650d4:
Merge tag 'xilinx-for-v2022.04-rc1' of
https://source.denx.de/u-boot/custodians/u-boot-microblaze (2022-01-19
11:43:44 -0500)
are available in the Git repository at:
git@source.denx.de:u-boot/custodians/u-boot-marvell.git
for you to fetch changes up to 8f880c3d89432e9988b23bb7099d6360c14a206f:
arm: a37xx: Disable CONFIG_DEBUG_UART_ANNOUNCE (2022-01-20 14:46:03
+0100)
----------------------------------------------------------------
Heinrich Schuchardt (1):
drivers: octeon: get rid of Unicode in code
Marek Behún (5):
fdt_support: Add fdt_for_each_node_by_compatible() helper macro
arm: mvebu: spl: Print srcaddr in error message
arm: mvebu: spl: Use preferred types u8/u16/u32 instead of uintN_t
arm: mvebu: spl: Use IS_ENABLED() instead of #ifdef where possible
arm: mvebu: spl: Fix 100 column exceeds
Pali Rohár (10):
arm: mvebu: turris_omnia: Fixup SATA or PCIe nodes at runtime in
DT blob
pci: pci_mvebu: Add support for Kirkwood PCIe controllers
arm: mvebu: Check that kwbimage offset and blocksize are valid
SPL: Add struct spl_boot_device parameter into
spl_parse_board_header()
arm: mvebu: Check that kwbimage blockid matches boot mode
SPL: Add support for checking board / BootROM specific image types
arm: mvebu: Check for kwbimage data checksum
arm: mvebu: turris_mox: Convert comphy_update_map() to
board_fix_fdt()
phy: marvell: Remove unused function comphy_update_map()
arm: a37xx: Disable CONFIG_DEBUG_UART_ANNOUNCE
arch/arm/cpu/armv8/fsl-layerscape/fdt.c | 9 +-
arch/arm/cpu/armv8/fsl-layerscape/icid.c | 5 +-
arch/arm/mach-kirkwood/cpu.c | 4 +-
arch/arm/mach-kirkwood/include/mach/cpu.h | 3 +
arch/arm/mach-mvebu/spl.c | 133
+++++++++++++++++++---------
arch/arm/mach-sunxi/spl_spi_sunxi.c | 2 +-
arch/arm/mach-tegra/gpu.c | 5 +-
arch/mips/mach-octeon/octeon_fdt.c | 11 +--
arch/powerpc/cpu/mpc85xx/liodn.c | 9 +-
board/CZ.NIC/turris_mox/turris_mox.c | 48 ++++------
board/CZ.NIC/turris_omnia/turris_omnia.c | 91 ++++++++++++++++++-
board/Marvell/octeon_ebb7304/board.c | 9 +-
board/congatec/cgtqmx8/spl.c | 8 +-
board/freescale/lx2160a/lx2160a.c | 5 +-
common/fdt_support.c | 22 ++---
common/spl/spl.c | 13 ++-
common/spl/spl_ext.c | 9 +-
common/spl/spl_fat.c | 11 ++-
common/spl/spl_legacy.c | 3 +-
common/spl/spl_mmc.c | 43 +++++----
common/spl/spl_nand.c | 13 +--
common/spl/spl_net.c | 2 +-
common/spl/spl_nor.c | 4 +-
common/spl/spl_onenand.c | 2 +-
common/spl/spl_ram.c | 2 +-
common/spl/spl_sata.c | 9 +-
common/spl/spl_sdp.c | 2 +-
common/spl/spl_spi.c | 9 +-
common/spl/spl_ubi.c | 4 +-
common/spl/spl_usb.c | 4 +-
common/spl/spl_xip.c | 4 +-
common/spl/spl_ymodem.c | 4 +-
configs/mvebu_db-88f3720_defconfig | 1 -
configs/mvebu_espressobin-88f3720_defconfig | 1 -
configs/turris_mox_defconfig | 1 -
configs/turris_omnia_defconfig | 1 +
configs/uDPU_defconfig | 1 -
drivers/misc/fsl_portals.c | 6 +-
drivers/net/fm/fdt.c | 3 +-
drivers/pci/Kconfig | 6 +-
drivers/pci/pci_mvebu.c | 16 ++++
drivers/pci/pcie_layerscape_fixup_common.c | 12 +--
drivers/phy/marvell/comphy_a3700.c | 12 +--
drivers/phy/marvell/comphy_core.c | 9 --
drivers/phy/marvell/comphy_core.h | 9 ++
drivers/ram/octeon/octeon3_lmc.c | 34 +++----
drivers/usb/gadget/f_sdp.c | 13 +--
drivers/video/meson/simplefb_common.c | 9 +-
drivers/video/sunxi/simplefb_common.c | 7 +-
include/fdt_support.h | 6 ++
include/mvebu/comphy.h | 11 ---
include/sdp.h | 3 +-
include/spl.h | 7 ++
53 files changed, 396 insertions(+), 274 deletions(-)
2
1
I tested this patch and tried to run it on my LicheePi Nano. It works, but I found there is WARNINGs when compile the code:
-------
include/configs/sunxi-common.h:128:0: warning: "CONFIG_ENV_SECT_SIZE" redefined
#define CONFIG_ENV_SECT_SIZE 0x1000
In file included from ././include/linux/kconfig.h:4:0,
from <command-line>:0:
include/generated/autoconf.h:296:0: note: this is the location of the previous definition
#define CONFIG_ENV_SECT_SIZE 0x1
In file included from include/configs/suniv.h:12:0,
from include/config.h:4,
from include/common.h:16,
from lib/slre.c:24:
--------
And I think the problem is the CONFIG_ENV_SECT_SIZE should be (and required to) defined in the config file rather than at include/configs/sunxi-common.h:128
3
3
Hi Tom,
Here's a few changes :
- CONFIG_NET_RANDOM_ETHADDR cleanup for VIM3/L Android configs I missed
- raw parts for bootloader to flash bootloader with fastboot with Android configs
- Add missing serial# like sei510/610 in order to satisfy fastboot
The CI job is at https://source.denx.de/u-boot/custodians/u-boot-amlogic/pipelines/10491
Thanks,
Neil
The following changes since commit 068415eadefbbc81f14d4ce61fcf7a7eb39650d4:
Merge tag 'xilinx-for-v2022.04-rc1' of https://source.denx.de/u-boot/custodians/u-boot-microblaze (2022-01-19 11:43:44 -0500)
are available in the Git repository at:
https://source.denx.de/u-boot/custodians/u-boot-amlogic.git tags/u-boot-amlogic-20220120
for you to fetch changes up to 09c2debab70271fdb3b1ff89e0e7d186502c548d:
board: amlogic: vim3: configure serial# from ethaddr (2022-01-20 09:50:54 +0100)
----------------------------------------------------------------
- Disable CONFIG_NET_RANDOM_ETHADDR for android configs
- meson64_android: define raw parts for bootloader to permit flashing with fastboot
- vim3: configure serial# from ethaddr to permit using fastboot like sei510/610
----------------------------------------------------------------
Mattijs Korpershoek (3):
configs: amlogic: Disable CONFIG_NET_RANDOM_ETHADDR for android
configs: meson64_android: define raw parts for bootloader
board: amlogic: vim3: configure serial# from ethaddr
board/amlogic/vim3/vim3.c | 9 +++++++++
configs/khadas-vim3_android_ab_defconfig | 1 -
configs/khadas-vim3_android_defconfig | 1 -
configs/khadas-vim3l_android_ab_defconfig | 1 -
configs/khadas-vim3l_android_defconfig | 1 -
include/configs/meson64_android.h | 2 ++
6 files changed, 11 insertions(+), 4 deletions(-)
2
1
Dear Tom,
I put the patch to replace @return by Return: in code comments into a
separate pull request at it is touching so many files. As we have a lot
of churn in U-Boot we have to put in the patch close after preparation
otherwise rebasing will be an endless story.
Gitlab CI showed no issues:
https://source.denx.de/u-boot/custodians/u-boot-efi/-/pipelines/10699
The following changes since commit 6a685753ce8b6b02b67d64b239143bf19eda63c9:
Merge branch '2022-01-18-platform-updates' (2022-01-18 16:07:33 -0500)
are available in the Git repository at:
https://source.denx.de/u-boot/custodians/u-boot-efi.git
tags/doc-2022-04-rc1
for you to fetch changes up to 185f812c419f1b4f0d10d9787d59cf9f11a2a600:
doc: replace @return by Return: (2022-01-19 18:11:34 +0100)
----------------------------------------------------------------
Pull request doc-2022-04-rc1
Replace @return by Return: in code comments.
----------------------------------------------------------------
Heinrich Schuchardt (1):
doc: replace @return by Return:
arch/arm/cpu/armv7/s5p-common/timer.c | 2 +-
arch/arm/include/asm/arch-aspeed/scu_ast2500.h | 4 +-
arch/arm/include/asm/arch-aspeed/wdt.h | 4 +-
arch/arm/include/asm/arch-hi6220/pinmux.h | 2 +-
arch/arm/include/asm/arch-rockchip/clock.h | 8 +-
arch/arm/include/asm/arch-tegra/ap.h | 6 +-
arch/arm/include/asm/arch-tegra/clock.h | 30 +++----
arch/arm/include/asm/arch-tegra/funcmux.h | 2 +-
arch/arm/include/asm/arch-tegra/ivc.h | 12 +--
arch/arm/include/asm/arch-tegra/sys_proto.h | 6 +-
arch/arm/include/asm/arch-tegra/tegra_i2c.h | 2 +-
arch/arm/include/asm/arch-tegra/warmboot.h | 2 +-
arch/arm/include/asm/arch-tegra124/display.h | 4 +-
arch/arm/include/asm/arch-tegra20/emc.h | 4 +-
arch/arm/include/asm/omap_gpio.h | 2 +-
arch/arm/mach-bcm283x/include/mach/msg.h | 10 +--
arch/arm/mach-exynos/clock.c | 2 +-
arch/arm/mach-exynos/clock_init.h | 2 +-
arch/arm/mach-exynos/common_setup.h | 2 +-
arch/arm/mach-exynos/dmc_init_ddr3.c | 4 +-
arch/arm/mach-exynos/exynos5_setup.h | 4 +-
arch/arm/mach-exynos/include/mach/clk.h | 2 +-
arch/arm/mach-exynos/include/mach/pinmux.h | 4 +-
arch/arm/mach-exynos/include/mach/spl.h | 2 +-
arch/arm/mach-imx/ddrmc-vf610-calibration.h | 2 +-
arch/arm/mach-s5pc1xx/include/mach/pinmux.h | 4 +-
.../mach-stm32mp/cmd_stm32prog/stm32prog_serial.c | 4 +-
arch/arm/mach-tegra/clock.c | 10 +--
arch/arm/mach-tegra/tegra114/clock.c | 4 +-
arch/arm/mach-tegra/tegra124/clock.c | 6 +-
arch/arm/mach-tegra/tegra20/clock.c | 4 +-
arch/arm/mach-tegra/tegra20/emc.c | 4 +-
arch/arm/mach-tegra/tegra210/clock.c | 4 +-
arch/arm/mach-tegra/tegra30/clock.c | 4 +-
arch/microblaze/include/asm/microblaze_intc.h | 2 +-
arch/mips/mach-octeon/bootoctlinux.c | 6 +-
arch/mips/mach-octeon/cpu.c | 2 +-
arch/mips/mach-octeon/cvmx-bootmem.c | 8 +-
arch/mips/mach-octeon/cvmx-coremask.c | 6 +-
arch/mips/mach-octeon/cvmx-helper-cfg.c | 32 ++++----
arch/mips/mach-octeon/cvmx-helper-fdt.c | 32 ++++----
arch/mips/mach-octeon/cvmx-helper-jtag.c | 2 +-
arch/mips/mach-octeon/cvmx-helper-util.c | 12 +--
arch/mips/mach-octeon/cvmx-helper.c | 42 +++++-----
arch/mips/mach-octeon/cvmx-pcie.c | 40 ++++-----
arch/mips/mach-octeon/cvmx-qlm.c | 30 +++----
arch/mips/mach-octeon/include/mach/bootoct_cmd.h | 2 +-
arch/mips/mach-octeon/include/mach/cvmx-bootmem.h | 42 +++++-----
.../mips/mach-octeon/include/mach/cvmx-cmd-queue.h | 18 ++---
arch/mips/mach-octeon/include/mach/cvmx-coremask.h | 40 ++++-----
arch/mips/mach-octeon/include/mach/cvmx-error.h | 54 ++++++-------
arch/mips/mach-octeon/include/mach/cvmx-fpa.h | 10 +--
arch/mips/mach-octeon/include/mach/cvmx-fpa1.h | 6 +-
arch/mips/mach-octeon/include/mach/cvmx-fpa3.h | 10 +--
arch/mips/mach-octeon/include/mach/cvmx-fuse.h | 8 +-
.../include/mach/cvmx-global-resources.h | 12 +--
.../mach-octeon/include/mach/cvmx-helper-agl.h | 8 +-
.../mach-octeon/include/mach/cvmx-helper-bgx.h | 30 +++----
.../mach-octeon/include/mach/cvmx-helper-board.h | 28 +++----
.../mach-octeon/include/mach/cvmx-helper-cfg.h | 70 ++++++++--------
.../mach-octeon/include/mach/cvmx-helper-errata.h | 4 +-
.../mach-octeon/include/mach/cvmx-helper-fdt.h | 64 +++++++--------
.../mach-octeon/include/mach/cvmx-helper-fpa.h | 2 +-
.../mach-octeon/include/mach/cvmx-helper-gpio.h | 22 ++---
.../mach-octeon/include/mach/cvmx-helper-ilk.h | 8 +-
.../mach-octeon/include/mach/cvmx-helper-jtag.h | 2 +-
.../mach-octeon/include/mach/cvmx-helper-loop.h | 4 +-
.../mach-octeon/include/mach/cvmx-helper-npi.h | 4 +-
.../mach-octeon/include/mach/cvmx-helper-pki.h | 4 +-
.../mach-octeon/include/mach/cvmx-helper-pko3.h | 4 +-
.../mach-octeon/include/mach/cvmx-helper-rgmii.h | 12 +--
.../mach-octeon/include/mach/cvmx-helper-sfp.h | 30 +++----
.../mach-octeon/include/mach/cvmx-helper-sgmii.h | 10 +--
.../mach-octeon/include/mach/cvmx-helper-spi.h | 8 +-
.../mach-octeon/include/mach/cvmx-helper-srio.h | 10 +--
.../mach-octeon/include/mach/cvmx-helper-util.h | 26 +++---
.../mach-octeon/include/mach/cvmx-helper-xaui.h | 14 ++--
arch/mips/mach-octeon/include/mach/cvmx-helper.h | 62 +++++++-------
arch/mips/mach-octeon/include/mach/cvmx-hwfau.h | 48 +++++------
arch/mips/mach-octeon/include/mach/cvmx-hwpko.h | 24 +++---
arch/mips/mach-octeon/include/mach/cvmx-ipd.h | 4 +-
arch/mips/mach-octeon/include/mach/cvmx-pcie.h | 26 +++---
arch/mips/mach-octeon/include/mach/cvmx-pip.h | 2 +-
.../mach-octeon/include/mach/cvmx-pki-resources.h | 26 +++---
.../include/mach/cvmx-pko-internal-ports-range.h | 4 +-
.../mach-octeon/include/mach/cvmx-pko3-queue.h | 2 +-
arch/mips/mach-octeon/include/mach/cvmx-pow.h | 32 ++++----
arch/mips/mach-octeon/include/mach/cvmx-qlm.h | 22 ++---
arch/mips/mach-octeon/include/mach/cvmx-regs.h | 14 ++--
arch/mips/mach-octeon/include/mach/cvmx-scratch.h | 8 +-
arch/mips/mach-octeon/include/mach/cvmx-wqe.h | 10 +--
.../mips/mach-octeon/include/mach/octeon-feature.h | 2 +-
arch/mips/mach-octeon/include/mach/octeon-model.h | 2 +-
arch/mips/mach-octeon/include/mach/octeon_eth.h | 2 +-
arch/mips/mach-octeon/include/mach/octeon_fdt.h | 24 +++---
arch/mips/mach-octeon/include/mach/octeon_pci.h | 2 +-
arch/mips/mach-octeon/include/mach/octeon_qlm.h | 2 +-
arch/mips/mach-octeon/octeon_fdt.c | 22 ++---
arch/mips/mach-octeon/octeon_qlm.c | 18 ++---
arch/powerpc/cpu/mpc8xxx/fsl_pamu.c | 2 +-
arch/riscv/include/asm/smp.h | 10 +--
arch/riscv/include/asm/spl.h | 2 +-
arch/sandbox/cpu/cpu.c | 2 +-
arch/sandbox/cpu/os.c | 4 +-
arch/sandbox/cpu/state.c | 4 +-
arch/sandbox/include/asm/eth.h | 8 +-
arch/sandbox/include/asm/gpio.h | 12 +--
arch/sandbox/include/asm/sdl.h | 14 ++--
arch/sandbox/include/asm/state.h | 12 +--
arch/sandbox/include/asm/test.h | 30 +++----
arch/sandbox/include/asm/u-boot-sandbox.h | 4 +-
arch/x86/cpu/apollolake/fsp_bindings.c | 4 +-
arch/x86/cpu/broadwell/pch.c | 2 +-
arch/x86/cpu/broadwell/refcode.c | 2 +-
arch/x86/cpu/intel_common/lpc.c | 2 +-
arch/x86/cpu/intel_common/p2sb.c | 2 +-
arch/x86/cpu/ivybridge/bd82x6x.c | 4 +-
arch/x86/cpu/mp_init.c | 10 +--
arch/x86/cpu/mtrr.c | 2 +-
arch/x86/cpu/slimbootloader/sdram.c | 2 +-
arch/x86/include/asm/acpi_table.h | 16 ++--
.../x86/include/asm/arch-apollolake/fsp_bindings.h | 4 +-
arch/x86/include/asm/arch-apollolake/lpc.h | 2 +-
arch/x86/include/asm/arch-apollolake/systemagent.h | 6 +-
arch/x86/include/asm/arch-coreboot/timestamp.h | 2 +-
arch/x86/include/asm/arch-ivybridge/pch.h | 2 +-
arch/x86/include/asm/arch-ivybridge/sandybridge.h | 2 +-
arch/x86/include/asm/bootm.h | 2 +-
arch/x86/include/asm/cb_sysinfo.h | 4 +-
arch/x86/include/asm/coreboot_tables.h | 2 +-
arch/x86/include/asm/cpu.h | 10 +--
arch/x86/include/asm/cpu_common.h | 26 +++---
arch/x86/include/asm/cpu_x86.h | 2 +-
arch/x86/include/asm/e820.h | 2 +-
arch/x86/include/asm/fast_spi.h | 4 +-
arch/x86/include/asm/fsp/fsp_support.h | 34 ++++----
arch/x86/include/asm/fsp1/fsp_support.h | 8 +-
arch/x86/include/asm/fsp2/fsp_api.h | 4 +-
arch/x86/include/asm/fsp2/fsp_internal.h | 8 +-
arch/x86/include/asm/hob.h | 18 ++---
arch/x86/include/asm/i8254.h | 2 +-
arch/x86/include/asm/intel_acpi.h | 2 +-
arch/x86/include/asm/intel_opregion.h | 2 +-
arch/x86/include/asm/intel_pinctrl.h | 22 ++---
arch/x86/include/asm/lpc_common.h | 2 +-
arch/x86/include/asm/me_common.h | 6 +-
arch/x86/include/asm/microcode.h | 4 +-
arch/x86/include/asm/mp.h | 8 +-
arch/x86/include/asm/mrc_common.h | 2 +-
arch/x86/include/asm/mrccache.h | 10 +--
arch/x86/include/asm/mtrr.h | 8 +-
arch/x86/include/asm/pch_common.h | 2 +-
arch/x86/include/asm/pci.h | 6 +-
arch/x86/include/asm/sfi.h | 2 +-
arch/x86/include/asm/tables.h | 2 +-
arch/x86/include/asm/u-boot-x86.h | 4 +-
arch/x86/include/asm/zimage.h | 4 +-
arch/x86/lib/hob.c | 8 +-
arch/x86/lib/mrccache.c | 4 +-
board/Marvell/octeontx/board-fdt.c | 2 +-
board/Marvell/octeontx2/board-fdt.c | 2 +-
board/emulation/qemu-ppce500/qemu-ppce500.c | 2 +-
board/gdsys/a38x/hre.c | 14 ++--
board/google/chromebook_coral/coral.c | 2 +-
board/ti/dra7xx/evm.c | 2 +-
board/ti/omap5_uevm/evm.c | 6 +-
board/ti/panda/panda.c | 4 +-
board/ti/sdp4430/sdp.c | 4 +-
boot/android_ab.c | 10 +--
boot/bootm.c | 10 +--
boot/fdt_region.c | 2 +-
boot/image-android-dt.c | 4 +-
boot/image-board.c | 2 +-
boot/image-fdt.c | 2 +-
boot/image-fit-sig.c | 2 +-
boot/image-fit.c | 4 +-
boot/image.c | 6 +-
boot/pxe_utils.c | 2 +-
cmd/acpi.c | 2 +-
cmd/cramfs.c | 4 +-
cmd/cros_ec.c | 4 +-
cmd/gpt.c | 10 +--
cmd/jffs2.c | 16 ++--
cmd/mtdparts.c | 58 ++++++-------
cmd/pci.c | 2 +-
cmd/pinmux.c | 2 +-
cmd/setexpr.c | 2 +-
cmd/sf.c | 8 +-
cmd/tpm-common.c | 14 ++--
common/autoboot.c | 8 +-
common/board_r.c | 2 +-
common/bootstage.c | 4 +-
common/cli.c | 4 +-
common/command.c | 2 +-
common/console.c | 2 +-
common/edid.c | 4 +-
common/fdt_support.c | 2 +-
common/hash.c | 2 +-
common/log.c | 4 +-
common/spl/spl.c | 6 +-
common/stdio.c | 2 +-
disk/part.c | 2 +-
disk/part_efi.c | 2 +-
drivers/block/blk-uclass.c | 2 +-
drivers/block/blk_legacy.c | 2 +-
drivers/clk/aspeed/clk_ast2500.c | 4 +-
drivers/clk/aspeed/clk_ast2600.c | 2 +-
drivers/clk/microchip/mpfs_clk.h | 6 +-
drivers/core/acpi.c | 4 +-
drivers/core/device-remove.c | 2 +-
drivers/core/device.c | 2 +-
drivers/core/lists.c | 2 +-
drivers/core/of_access.c | 2 +-
drivers/core/root.c | 2 +-
drivers/core/uclass.c | 2 +-
drivers/crypto/ace_sha.h | 2 +-
drivers/crypto/fsl/fsl_hash.c | 6 +-
drivers/crypto/fsl/jobdesc.c | 4 +-
drivers/fastboot/fb_getvar.c | 2 +-
drivers/fastboot/fb_mmc.c | 4 +-
drivers/gpio/gpio-uclass.c | 4 +-
drivers/gpio/iproc_gpio.c | 2 +-
drivers/gpio/sunxi_gpio.c | 2 +-
drivers/gpio/tegra_gpio.c | 2 +-
drivers/i2c/designware_i2c.c | 8 +-
drivers/i2c/designware_i2c.h | 2 +-
drivers/i2c/i2c-uclass.c | 4 +-
drivers/i2c/mvtwsi.c | 30 +++----
drivers/i2c/octeon_i2c.c | 30 +++----
drivers/i2c/s3c24x0_i2c.c | 2 +-
drivers/input/cros_ec_keyb.c | 6 +-
drivers/input/i8042.c | 6 +-
drivers/input/input.c | 10 +--
drivers/input/key_matrix.c | 4 +-
drivers/input/tegra-kbc.c | 6 +-
drivers/misc/cros_ec.c | 20 ++---
drivers/misc/cros_ec_lpc.c | 2 +-
drivers/misc/cros_ec_sandbox.c | 8 +-
drivers/misc/cros_ec_spi.c | 2 +-
drivers/mmc/mmc.c | 4 +-
drivers/mmc/mmc_private.h | 6 +-
drivers/mmc/mmc_spi.c | 6 +-
drivers/mmc/octeontx_hsmmc.c | 36 ++++-----
drivers/mmc/sdhci-adma.c | 2 +-
drivers/mtd/mtd_uboot.c | 2 +-
drivers/mtd/mtdcore.c | 2 +-
drivers/mtd/mtdpart.c | 4 +-
drivers/mtd/nand/raw/cortina_nand.c | 20 ++---
drivers/mtd/nand/raw/nand_util.c | 22 ++---
drivers/mtd/nand/raw/octeontx_bch.c | 4 +-
drivers/mtd/nand/raw/octeontx_bch.h | 6 +-
drivers/mtd/nand/raw/octeontx_nand.c | 2 +-
drivers/mtd/nand/raw/omap_gpmc.c | 4 +-
drivers/mtd/nand/raw/tegra_nand.c | 16 ++--
drivers/mtd/onenand/onenand_base.c | 14 ++--
drivers/net/fec_mxc.c | 6 +-
drivers/net/octeontx2/cgx.c | 2 +-
drivers/net/octeontx2/cgx.h | 2 +-
drivers/net/octeontx2/lmt.h | 2 +-
drivers/net/octeontx2/nix.c | 2 +-
drivers/net/octeontx2/nix_af.c | 4 +-
drivers/net/octeontx2/rvu.h | 2 +-
drivers/net/octeontx2/rvu_common.c | 2 +-
drivers/net/pfe_eth/pfe_driver.c | 8 +-
drivers/net/pfe_eth/pfe_eth.c | 2 +-
drivers/net/pfe_eth/pfe_firmware.c | 8 +-
drivers/net/pfe_eth/pfe_hw.c | 6 +-
drivers/pci/pci-uclass.c | 6 +-
drivers/pci/pci_common.c | 2 +-
drivers/pci/pci_internal.h | 4 +-
drivers/pci/pci_rom.c | 2 +-
drivers/pinctrl/intel/pinctrl.c | 8 +-
drivers/power/exynos-tmu.c | 8 +-
drivers/power/palmas.c | 2 +-
drivers/power/regulator/tps65090_regulator.c | 2 +-
drivers/power/tps6586x.c | 2 +-
drivers/remoteproc/sandbox_testproc.c | 2 +-
drivers/remoteproc/stm32_copro.c | 14 ++--
drivers/serial/serial_bcm283x_mu.c | 2 +-
drivers/serial/serial_bcm283x_pl011.c | 2 +-
drivers/sound/hda_codec.c | 12 +--
drivers/sound/max98088.c | 12 +--
drivers/sound/max98090.c | 10 +--
drivers/sound/max98095.c | 12 +--
drivers/sound/maxim_codec.c | 6 +-
drivers/sound/maxim_codec.h | 6 +-
drivers/sound/samsung-i2s.c | 6 +-
drivers/sound/tegra_ahub.c | 2 +-
drivers/sound/tegra_i2s_priv.h | 2 +-
drivers/sound/wm8994.c | 14 ++--
drivers/spi/ich.c | 4 +-
drivers/spi/octeon_spi.c | 4 +-
drivers/tpm/cr50_i2c.c | 2 +-
drivers/tpm/sandbox_common.h | 2 +-
drivers/tpm/tpm2_tis_spi.c | 2 +-
drivers/tpm/tpm_atmel_twi.c | 2 +-
drivers/usb/host/ehci.h | 2 +-
drivers/usb/host/xhci-mem.c | 46 +++++------
drivers/usb/host/xhci-ring.c | 26 +++---
drivers/usb/host/xhci.c | 34 ++++----
drivers/usb/musb-new/musb_gadget.c | 2 +-
drivers/usb/musb-new/musb_gadget_ep0.c | 2 +-
drivers/usb/musb-new/usb-compat.h | 2 +-
drivers/video/bridge/ps862x.c | 2 +-
drivers/video/console_truetype.c | 6 +-
drivers/video/imx/ipu_common.c | 10 +--
drivers/video/imx/ipu_disp.c | 6 +-
drivers/video/imx/mxc_ipuv3_fb.c | 4 +-
drivers/video/meson/simplefb_common.h | 2 +-
drivers/video/panel-uclass.c | 2 +-
drivers/video/rockchip/rk_hdmi.h | 6 +-
drivers/video/rockchip/rk_vop.c | 2 +-
drivers/video/rockchip/rk_vop.h | 4 +-
drivers/video/sunxi/simplefb_common.h | 2 +-
drivers/video/tegra.c | 2 +-
drivers/video/ti/am335x-fb.c | 4 +-
drivers/video/video_bmp.c | 2 +-
drivers/video/videomodes.c | 2 +-
drivers/virtio/virtio_pci_modern.c | 4 +-
env/common.c | 6 +-
fs/cbfs/cbfs.c | 10 +--
fs/fat/fat.c | 8 +-
include/abuf.h | 4 +-
include/acpi/acpi_device.h | 22 ++---
include/acpi/acpi_dp.h | 26 +++---
include/acpi/acpi_s3.h | 2 +-
include/acpi/acpi_table.h | 6 +-
include/acpi/acpigen.h | 4 +-
include/ahci.h | 12 +--
include/android_ab.h | 2 +-
include/asm-generic/gpio.h | 56 ++++++-------
include/audio_codec.h | 2 +-
include/autoboot.h | 6 +-
include/backlight.h | 4 +-
include/binman.h | 10 +--
include/blk.h | 48 +++++------
include/boot_fit.h | 2 +-
include/bootcount.h | 6 +-
include/bootm.h | 6 +-
include/bootretry.h | 2 +-
include/bootstage.h | 16 ++--
include/button.h | 4 +-
include/cache.h | 6 +-
include/cbfs.h | 30 +++----
include/cli.h | 14 ++--
include/clk.h | 46 +++++------
include/clk/sunxi.h | 2 +-
include/command.h | 12 +--
include/compiler.h | 2 +-
include/console.h | 14 ++--
include/cpu_func.h | 2 +-
include/cros_ec.h | 82
+++++++++----------
include/crypt.h | 2 +-
include/display.h | 6 +-
include/display_options.h | 4 +-
include/dm/acpi.h | 14 ++--
include/dm/device-internal.h | 22 ++---
include/dm/pci.h | 4 +-
include/dm/test.h | 6 +-
include/dm/uclass-internal.h | 26 +++---
include/dm/util.h | 2 +-
include/dma.h | 24 +++---
include/dsi_host.h | 4 +-
include/dwmmc.h | 4 +-
include/edid.h | 10 +--
include/efi_loader.h | 6 +-
include/env.h | 50 ++++++------
include/env_internal.h | 6 +-
include/extension_board.h | 2 +-
include/fdt_region.h | 8 +-
include/fdt_support.h | 30 +++----
include/fdtdec.h | 94
+++++++++++-----------
include/fs.h | 16 ++--
include/fsl_ddr_sdram.h | 2 +-
include/generic-phy.h | 40 ++++-----
include/gzip.h | 10 +--
include/handoff.h | 2 +-
include/hash.h | 8 +-
include/hda_codec.h | 18 ++---
include/hw_sha.h | 6 +-
include/hwspinlock.h | 2 +-
include/i2c.h | 42 +++++-----
include/i2c_eeprom.h | 6 +-
include/i2s.h | 4 +-
include/ide.h | 2 +-
include/image.h | 56 ++++++-------
include/input.h | 16 ++--
include/iotrace.h | 4 +-
include/irq.h | 22 ++---
include/key_matrix.h | 4 +-
include/lcd.h | 12 +--
include/led.h | 8 +-
include/linux/clk-provider.h | 10 +--
include/linux/string.h | 6 +-
include/linux/zstd.h | 2 +-
include/log.h | 2 +-
include/mailbox-uclass.h | 4 +-
include/mailbox.h | 10 +--
include/memalign.h | 2 +-
include/membuff.h | 30 +++----
include/menu.h | 2 +-
include/miiphy.h | 4 +-
include/mmc.h | 22 ++---
include/net.h | 14 ++--
include/net/dsa.h | 8 +-
include/net/pcap.h | 12 +--
include/ns16550.h | 4 +-
include/of_live.h | 2 +-
include/p2sb.h | 10 +--
include/panel.h | 6 +-
include/part.h | 38 ++++-----
include/pch.h | 10 +--
include/pci.h | 58 ++++++-------
include/pci_ep.h | 28 +++----
include/pci_rom.h | 2 +-
include/phy-sun4i-usb.h | 4 +-
include/physmem.h | 2 +-
include/power-domain.h | 14 ++--
include/power/acpi_pmc.h | 10 +--
include/power/pmic.h | 14 ++--
include/power/regulator.h | 38 ++++-----
include/pwm.h | 6 +-
include/pxe_utils.h | 4 +-
include/ram.h | 2 +-
include/reboot-mode/reboot-mode.h | 2 +-
include/relocate.h | 8 +-
include/remoteproc.h | 34 ++++----
include/reset.h | 28 +++----
include/rtc.h | 34 ++++----
include/scmi_agent.h | 4 +-
include/scsi.h | 4 +-
include/sdhci.h | 4 +-
include/search.h | 2 +-
include/serial.h | 8 +-
include/smbios.h | 4 +-
include/smem.h | 6 +-
include/sort.h | 2 +-
include/sound.h | 6 +-
include/spi.h | 14 ++--
include/spi_flash.h | 10 +--
include/spl.h | 24 +++---
include/spl_gpio.h | 6 +-
include/spmi/spmi.h | 4 +-
include/syscon.h | 10 +--
include/test/suites.h | 2 +-
include/test/ut.h | 20 ++---
include/time.h | 10 +--
include/tmu.h | 4 +-
include/tpm-common.h | 10 +--
include/tpm-v1.h | 58 ++++++-------
include/tpm-v2.h | 36 ++++-----
include/tpm_api.h | 58 ++++++-------
include/tps6586x.h | 6 +-
include/trace.h | 2 +-
include/u-boot/crc.h | 10 +--
include/u-boot/ecdsa.h | 2 +-
include/u-boot/fdt-libcrypto.h | 2 +-
include/u-boot/hash-checksum.h | 2 +-
include/u-boot/lz4.h | 2 +-
include/u-boot/rsa.h | 4 +-
include/ufs.h | 6 +-
include/usb.h | 26 +++---
include/usb/xhci.h | 4 +-
include/usb_ether.h | 8 +-
include/video.h | 24 +++---
include/video_bridge.h | 8 +-
include/video_console.h | 18 ++---
include/video_osd.h | 8 +-
include/virtio.h | 26 +++---
include/vsprintf.h | 24 +++---
include/wait_bit.h | 2 +-
include/wdt.h | 2 +-
lib/acpi/acpi_device.c | 8 +-
lib/binman.c | 2 +-
lib/efi/efi_app.c | 2 +-
lib/efi/efi_stub.c | 2 +-
lib/efi_loader/efi_acpi.c | 2 +-
lib/efi_loader/efi_device_path.c | 6 +-
lib/efi_loader/efi_device_path_to_text.c | 8 +-
lib/efi_loader/efi_device_path_utilities.c | 16 ++--
lib/efi_loader/efi_memory.c | 4 +-
lib/efi_loader/efi_smbios.c | 2 +-
lib/efi_selftest/dtbdump.c | 2 +-
lib/efi_selftest/efi_selftest.c | 6 +-
lib/efi_selftest/efi_selftest_block_device.c | 12 +--
lib/efi_selftest/efi_selftest_controllers.c | 10 +--
lib/efi_selftest/efi_selftest_exception.c | 2 +-
lib/efi_selftest/efi_selftest_fdt.c | 2 +-
lib/efi_selftest/efi_selftest_load_file.c | 2 +-
lib/efi_selftest/efi_selftest_loadimage.c | 2 +-
lib/efi_selftest/efi_selftest_miniapp_exception.c | 2 +-
lib/efi_selftest/efi_selftest_miniapp_return.c | 2 +-
lib/efi_selftest/efi_selftest_startimage_exit.c | 2 +-
lib/efi_selftest/efi_selftest_startimage_return.c | 2 +-
lib/efi_selftest/efi_selftest_tcg2.c | 18 ++---
lib/fdtdec.c | 4 +-
lib/of_live.c | 2 +-
lib/rsa/rsa-mod-exp.c | 4 +-
lib/rsa/rsa-sign.c | 12 +--
lib/rsa/rsa-verify.c | 8 +-
lib/strto.c | 2 +-
lib/tpm-utils.h | 10 +--
lib/zstd/bitstream.h | 8 +-
lib/zstd/decompress.c | 6 +-
net/eth_internal.h | 2 +-
net/tftp.c | 2 +-
scripts/dtc/libfdt/fdt_rw.c | 2 +-
scripts/dtc/libfdt/libfdt.h | 4 +-
scripts/dtc/srcpos.c | 4 +-
scripts/dtc/srcpos.h | 2 +-
scripts/dtc/util.h | 12 +--
test/compression.c | 2 +-
test/dm/acpi.h | 4 +-
test/dm/core.c | 2 +-
test/dm/of_platdata.c | 2 +-
test/dm/test-dm.c | 2 +-
test/dm/video.c | 6 +-
test/log/syslog_test.h | 4 +-
test/test-main.c | 18 ++---
tools/fit_common.h | 4 +-
tools/ifdtool.c | 18 ++---
tools/image-host.c | 4 +-
tools/imagetool.h | 8 +-
tools/rkcommon.h | 8 +-
524 files changed, 2505 insertions(+), 2505 deletions(-)
2
1
After next branch was merged to v2022.01 release, U-Boot on A3720 started
printing "<debug_uart>" line on UART during booting. There is no need to
print this debug line by default, so disable it via config option
CONFIG_DEBUG_UART_ANNOUNCE in all config files for Armada 3720 boards.
Signed-off-by: Pali Rohár <pali(a)kernel.org>
---
configs/mvebu_db-88f3720_defconfig | 1 -
configs/mvebu_espressobin-88f3720_defconfig | 1 -
configs/turris_mox_defconfig | 1 -
configs/uDPU_defconfig | 1 -
4 files changed, 4 deletions(-)
diff --git a/configs/mvebu_db-88f3720_defconfig b/configs/mvebu_db-88f3720_defconfig
index 459750f6e748..6cc90fa54266 100644
--- a/configs/mvebu_db-88f3720_defconfig
+++ b/configs/mvebu_db-88f3720_defconfig
@@ -66,7 +66,6 @@ CONFIG_PHY=y
CONFIG_MVEBU_COMPHY_SUPPORT=y
CONFIG_PINCTRL=y
CONFIG_PINCTRL_ARMADA_37XX=y
-CONFIG_DEBUG_UART_ANNOUNCE=y
CONFIG_MVEBU_A3700_UART=y
CONFIG_MVEBU_A3700_SPI=y
CONFIG_USB=y
diff --git a/configs/mvebu_espressobin-88f3720_defconfig b/configs/mvebu_espressobin-88f3720_defconfig
index 76096992f3c2..6ba91f425128 100644
--- a/configs/mvebu_espressobin-88f3720_defconfig
+++ b/configs/mvebu_espressobin-88f3720_defconfig
@@ -83,7 +83,6 @@ CONFIG_MVEBU_COMPHY_SUPPORT=y
CONFIG_PINCTRL=y
CONFIG_PINCTRL_ARMADA_37XX=y
CONFIG_DM_REGULATOR_GPIO=y
-CONFIG_DEBUG_UART_ANNOUNCE=y
CONFIG_MVEBU_A3700_UART=y
CONFIG_MVEBU_A3700_SPI=y
CONFIG_USB=y
diff --git a/configs/turris_mox_defconfig b/configs/turris_mox_defconfig
index 02a4687a14bc..195cebe765d0 100644
--- a/configs/turris_mox_defconfig
+++ b/configs/turris_mox_defconfig
@@ -93,7 +93,6 @@ CONFIG_DM_RTC=y
CONFIG_RTC_DS1307=y
CONFIG_SCSI=y
CONFIG_DM_SCSI=y
-CONFIG_DEBUG_UART_ANNOUNCE=y
CONFIG_MVEBU_A3700_UART=y
CONFIG_MVEBU_A3700_SPI=y
CONFIG_USB=y
diff --git a/configs/uDPU_defconfig b/configs/uDPU_defconfig
index bb1f14902290..7698e080e2a2 100644
--- a/configs/uDPU_defconfig
+++ b/configs/uDPU_defconfig
@@ -82,7 +82,6 @@ CONFIG_PINCTRL=y
CONFIG_PINCTRL_ARMADA_37XX=y
CONFIG_DM_REGULATOR_FIXED=y
CONFIG_DM_REGULATOR_GPIO=y
-CONFIG_DEBUG_UART_ANNOUNCE=y
CONFIG_MVEBU_A3700_UART=y
CONFIG_MVEBU_A3700_SPI=y
CONFIG_SYSINFO=y
--
2.20.1
2
2