From patchwork Fri Jan 12 12:40:19 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bryan O'Donoghue X-Patchwork-Id: 859877 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.denx.de (client-ip=81.169.180.215; helo=lists.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=linaro.org header.i=@linaro.org header.b="UvrUo7pj"; dkim-atps=neutral Received: from lists.denx.de (dione.denx.de [81.169.180.215]) by ozlabs.org (Postfix) with ESMTP id 3zJ2gx6fVNz9sQm for ; Fri, 12 Jan 2018 23:51:57 +1100 (AEDT) Received: by lists.denx.de (Postfix, from userid 105) id 6D9F5C221B9; Fri, 12 Jan 2018 12:45:05 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de X-Spam-Level: X-Spam-Status: No, score=-0.0 required=5.0 tests=RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL, T_DKIM_INVALID autolearn=unavailable autolearn_force=no version=3.4.0 Received: from lists.denx.de (localhost [IPv6:::1]) by lists.denx.de (Postfix) with ESMTP id 17030C22201; Fri, 12 Jan 2018 12:41:19 +0000 (UTC) Received: by lists.denx.de (Postfix, from userid 105) id 28048C22173; Fri, 12 Jan 2018 12:40:56 +0000 (UTC) Received: from mail-wm0-f66.google.com (mail-wm0-f66.google.com [74.125.82.66]) by lists.denx.de (Postfix) with ESMTPS id 7694FC221D5 for ; Fri, 12 Jan 2018 12:40:52 +0000 (UTC) Received: by mail-wm0-f66.google.com with SMTP id v123so2393295wmd.5 for ; Fri, 12 Jan 2018 04:40:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=l5VurfZpfkRpBG+7zTVuxyVFyXYTJYgNF7ZfMIDaCys=; b=UvrUo7pj0dNgopg3BcL4j5wa2BHYqs5p/pJ+Mvmk3OimH/ZB9Z7S6c/NG537iDpTyF MMB/a1/HU0JTw+szxV5g+t19SDpD6/A9uLCg/GULwR8wo8zr7SfpYgGj7edLgqsaTLBH 9PQkzcVy7QhQxSzQMQAnSjfH5fduoqlao0/xo= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=l5VurfZpfkRpBG+7zTVuxyVFyXYTJYgNF7ZfMIDaCys=; b=BAlouqRS9CkamYDtcB9PpoXU0xkjMNkdR03gOvdH5MQSUUwmMwoQ19BMfqTjie7AXo G73us5bW4uAo09N8c6ElqERlMjj83upv1xAwWuiBMDdZBWgzzJ6kUcbS77trOyyEh3cQ xlqHQuN0LZaVEQ8Yjsbl59xwS1cG+IhAvlxNZYnH0G7rMYMMjz2pt2S3nUhk+5Dgl3FZ rbeHrKqMTq9pk+OpirWWFPjqylQ51umxKfAK8gqS5v4zjwqPVc8cOO3MvIfMo69y4gyI 3Faq+8Kmftip3ZvjFLOGVk6AyDYSGiud2KG1ptCtsVik1MJKB79brtg5/uDJHqXsEE9N XPbw== X-Gm-Message-State: AKwxyteCEEHsVg61Hy1K92HG3rO70lsXiDdZehZ9W20o/bI4vuKVPHEq blkOg0TdRv/6Ode5BmXfC6938g5eflc= X-Google-Smtp-Source: ACJfBouQicEc2i5xHkJdQd3UvkEWKnaBSVlE/kZWgGncIV/56iybn4HBEqyHiG4dA9gyd946spVu0w== X-Received: by 10.80.245.172 with SMTP id u41mr16884482edm.163.1515760851984; Fri, 12 Jan 2018 04:40:51 -0800 (PST) Received: from localhost.localdomain ([109.255.42.2]) by smtp.gmail.com with ESMTPSA id w2sm13893585edb.4.2018.01.12.04.40.50 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 12 Jan 2018 04:40:51 -0800 (PST) From: Bryan O'Donoghue To: u-boot@lists.denx.de, brenomatheus@gmail.com Date: Fri, 12 Jan 2018 12:40:19 +0000 Message-Id: <1515760819-15116-26-git-send-email-bryan.odonoghue@linaro.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1515760819-15116-1-git-send-email-bryan.odonoghue@linaro.org> References: <1515760819-15116-1-git-send-email-bryan.odonoghue@linaro.org> Cc: Fabio Estevam Subject: [U-Boot] [PATCH v6 25/25] arm: imx: hab: Add hab_failsafe console command X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.18 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" hab_failsafe when called puts the part into BootROM recovery mode. This will allow u-boot scripts to script the dropping down into recovery mode. => hab_failsafe Shows the i.MX7 appear as "hiddev0,hidraw5: USB HID v1.10 Device [Freescale SemiConductor Inc SP Blank ULT1] " in a Linux dmesg thus allowing download of a new image via the BootROM USB download protocol routine. Signed-off-by: Bryan O'Donoghue Cc: Stefano Babic Cc: Fabio Estevam Cc: Peng Fan Cc: Albert Aribaud Cc: Sven Ebenfeld Cc: George McCollister Cc: Breno Matheus Lima Tested-by: Breno Lima Reviewed-by: Fabio Estevam --- arch/arm/mach-imx/hab.c | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) diff --git a/arch/arm/mach-imx/hab.c b/arch/arm/mach-imx/hab.c index 1236717..5f19777 100644 --- a/arch/arm/mach-imx/hab.c +++ b/arch/arm/mach-imx/hab.c @@ -414,6 +414,22 @@ static int do_authenticate_image(cmd_tbl_t *cmdtp, int flag, int argc, return rcode; } +static int do_hab_failsafe(cmd_tbl_t *cmdtp, int flag, int argc, + char * const argv[]) +{ + hab_rvt_failsafe_t *hab_rvt_failsafe; + + if (argc != 1) { + cmd_usage(cmdtp); + return 1; + } + + hab_rvt_failsafe = hab_rvt_failsafe_p; + hab_rvt_failsafe(); + + return 0; +} + U_BOOT_CMD( hab_status, CONFIG_SYS_MAXARGS, 1, do_hab_status, "display HAB status", @@ -429,6 +445,11 @@ U_BOOT_CMD( "ivt_offset - hex offset of IVT in the image" ); +U_BOOT_CMD( + hab_failsafe, CONFIG_SYS_MAXARGS, 1, do_hab_failsafe, + "run BootROM failsafe routine", + "" + ); #endif /* !defined(CONFIG_SPL_BUILD) */