Age | Commit message (Collapse) | Author |
|
include/lcd.h:240: warning: function declaration isn't a prototype
BUG=none
TEST=build without above compiler warning
Review URL: http://codereview.chromium.org/6648027
Change-Id: I0dbfd8ebce4e71e28c073fd4f074d438211060ec
|
|
BUG=chromium-os:1305
TEST=emerge-tegra2_seaboard chromeos-u-boot-next successfully
Change-Id: Ia1382a4545c2209e830b14909af635753ad40472
Review URL: http://codereview.chromium.org/6651016
|
|
BUG=chromium-os:1304
TEST=MAKEALL successfully
Review URL: http://codereview.chromium.org/6628008
Change-Id: I71f6ab5afbc8e9c3a569f11c4f2184a1a15c56b1
|
|
Renaming the caller_internal_t for better reflecting its purpose.
BUG=chromium-os:1302
TEST=MAKEALL successfully
Review URL: http://codereview.chromium.org/6594066
Change-Id: I0e28c5934fdbd198ab4fdb278a33d4707767b3c6
|
|
Because read-only firmware may refer to boot stub and recovery
firmware.
BUG=chromium-os:1302
TEST=MAKEALL successfully
Review URL: http://codereview.chromium.org/6591037
Change-Id: I40b0b4f458675b1d129fd09dc1ac7504053883c3
|
|
These buffers will cache loaded firmware so that boot stub does not have to
load them again.
This CL also factors out the code that initialize struct fields used by
GetFirmwareBody().
BUG=chromium-os:1302
TEST=MAKEALL successfully
Review URL: http://codereview.chromium.org/6598032
Change-Id: I64d1e6f1e06edaa53bbf1e723bc0ea3aa88b6b6c
|
|
Caller to LoadFirmware is required to specify which firmware section to be
verified first.
BUG=chromium-os:1302
TEST=MAKEALL successfully
Review URL: http://codereview.chromium.org/6598031
Change-Id: I7fee789f3e8f7d2aa9d2e768c1cd1cb77fbb0e2e
|
|
BUG=None
TEST=None
Review URL: http://codereview.chromium.org/6602003
Change-Id: I6dd474c1d111499db8940a8aea43045b6e4e00a6
|
|
In order to run test cases in both Linux user mode and u-boot command
mode. The API header tlcl.h must be accessed by both ebuilds.
Change-Id: Ic027dc118f26666b88bf54c511e2455a55e4eb8f
BUG=chromium-os:10497
TEST=emerge vboot_reference-firmware successfully
Committed: http://chrome-svn/viewvc/chromeos?view=rev&revision=baa3bbe
Review URL: http://codereview.chromium.org/6469089
|
|
BUG=chromium-os:11368
TEST=manual
$ emerge-tegra2_seaboard chromeos-u-boot-next
$ emerge-tegra2_seaboard chromeos-bios
$ write_tegra_bios --board tegra2 --variant seaboard --bios /build/tegra2_seaboard/u-boot/image.bin
$ grep -m1 -E "^[0-9a-fA-F]{8} T _start$" /build/tegra2_seaboard/u-boot/System.map | cut -d " " -f 1
00e08000
$ grep -m1 CONFIG_OFFSET_GBB /build/tegra2_seaboard/u-boot/autoconf.mk | tr -d "\"" | cut -d = -f 2
0x000f0400
$ python -c 'print "0x%x" % (0xe08000 + 0xf0400)'
0xef8400
CrOS> cros bmpblk info 0xef8400 0
screens[0] info:
- BMP (1366 x 768) showed on (0, 0)
CrOS> cros bmpblk info 0xef8400 1
screens[1] info:
- BMP (1366 x 768) showed on (0, 0)
CrOS> cros bmpblk display 0xef8400 0
// The developer mode BMP is showing on LCD.
CrOS> cros bmpblk display 0xef8400 1
// The recovery mode BMP is showing on LCD.
Change-Id: I8bee7b74a3ca3006376838bd7de6a327bb253704
Review URL: http://codereview.chromium.org/6543008
|
|
BUG=none
TEST=emerge-tegra2_seaboard chromeos-u-boot-next
Review URL: http://codereview.chromium.org/6543034
Change-Id: I88dfd38aedd81281415ecb8156181a6cc4d46495
|
|
It is unnecessary to scan the whole flashrom to look for the flashmap because
the flashmap is stored in read-only part of flashrom.
Furthermore, boot stub should use static firmware layout rather than fmap; this
is faster and easier.
BUG=chromium-os:1302
TEST=Run following u-boot commands successfully
CrOS> cros load_fw 0x10000000 0x00400000 0x10500000
do_load_fw: params.firmware_root_key_blob: 10160180
do_load_fw: params.verification_block_0: 10200000
do_load_fw: params.verification_size_0: 00001128
do_load_fw: params.verification_block_1: 102e0000
do_load_fw: params.verification_size_1: 00001128
do_load_fw: params.kernel_sign_key_blob: 10500000
do_load_fw: params.kernel_sign_key_size: 00000838
DEBUG: LoadFirmware started...
DEBUG: TPM: Startup
DEBUG: TPM: command 0x99 send/receive failed: 0x800
DEBUG: TPM: Continue self test
DEBUG: TPM: command 0x53 send/receive failed: 0x800
DEBUG: Checking key block signature...
DEBUG: Firmware 0 is valid.
DEBUG: Checking key block signature...
DEBUG: Will boot firmware index 0
LoadFirmware returns: LOAD_FIRMWARE_SUCCESS
firmware_index: 0
CrOS> mw.b 0x10210100 0x33 0x100
CrOS> cros load_fw 0x10000000 0x00400000 0x10500000
do_load_fw: params.firmware_root_key_blob: 10160180
do_load_fw: params.verification_block_0: 10200000
do_load_fw: params.verification_size_0: 00001128
do_load_fw: params.verification_block_1: 102e0000
do_load_fw: params.verification_size_1: 00001128
do_load_fw: params.kernel_sign_key_blob: 10500000
do_load_fw: params.kernel_sign_key_size: 00000838
DEBUG: LoadFirmware started...
DEBUG: TPM: Startup
DEBUG: TPM: command 0x99 send/receive failed: 0x800
DEBUG: TPM: Continue self test
DEBUG: TPM: command 0x53 send/receive failed: 0x800
DEBUG: Checking key block signature...
DEBUG: In RSAVerify(): Hash check failed!
DEBUG: Firmware body verification failed.
DEBUG: Checking key block signature...
DEBUG: Firmware 1 is valid.
DEBUG: Will boot firmware index 1
LoadFirmware returns: LOAD_FIRMWARE_SUCCESS
firmware_index: 1
CrOS> mw.b 0x102f0100 0x33 0x100
CrOS> cros load_fw 0x10000000 0x00400000 0x10500000
do_load_fw: params.firmware_root_key_blob: 10160180
do_load_fw: params.verification_block_0: 10200000
do_load_fw: params.verification_size_0: 00001128
do_load_fw: params.verification_block_1: 102e0000
do_load_fw: params.verification_size_1: 00001128
do_load_fw: params.kernel_sign_key_blob: 10500000
do_load_fw: params.kernel_sign_key_size: 00000838
DEBUG: LoadFirmware started...
DEBUG: TPM: Startup
DEBUG: TPM: command 0x99 send/receive failed: 0x800
DEBUG: TPM: Continue self test
DEBUG: TPM: command 0x53 send/receive failed: 0x800
DEBUG: Checking key block signature...
DEBUG: In RSAVerify(): Hash check failed!
DEBUG: Firmware body verification failed.
DEBUG: Checking key block signature...
DEBUG: In RSAVerify(): Hash check failed!
DEBUG: Firmware body verification failed.
DEBUG: Alas, no good firmware.
LoadFirmware returns: LOAD_FIRMWARE_RECOVERY
Review URL: http://codereview.chromium.org/6258021
Change-Id: I6a2ca31e9f5e1295ce4e04c4097f087cee56b135
|
|
This CL is intended for parallelizing development and is not the final
implementation of the boot stub.
BUG=chromium-os:1302
TEST=build successfully
Review URL: http://codereview.chromium.org/6048006
Change-Id: I99ddbaae3e07581e9e2a024ba30dab2e2853f74e
|
|
Load kernel with BOOT_FLAG_DEVELOPER and BOOT_FLAG_SKIP_ADDR_CHECK flags on.
This CL depends on a previous CL implementing __aeabi_uldivmod.
BUG=None
TEST=Run u-boot command below with expected output
Note: Although the kernel is loaded successfully, the LoadKernel() still fails
because TPM stub functions are not implemented yet.
CrOS> usb start
CrOS> cros bootdev set usb 0
CrOS> cros load_k 0x10000000 0x01000000
DEBUG: GptNextKernelEntry looking at new prio partition 1
DEBUG: GptNextKernelEntry s1 t15 p15
DEBUG: GptNextKernelEntry looking at new prio partition 3
DEBUG: GptNextKernelEntry s0 t15 p0
DEBUG: GptNextKernelEntry looking at new prio partition 5
DEBUG: GptNextKernelEntry s0 t15 p0
DEBUG: GptNextKernelEntry likes that one
DEBUG: Found kernel entry at % size %
DEBUG: Checking key block hash only...
DEBUG: Kernel preamble is good.
DEBUG: Partiton is good.
DEBUG: Boot_flags = !is_normal
DEBUG: Updating GPT header 2
DEBUG: Updating GPT entries 2
DEBUG: Good_partition >= 0
DEBUG: TPM: Lock physical presence
DEBUG: TPM: command 0x4000000a send/receive failed: 0x800
DEBUG: Error locking kernel versions.
Internal error; reboot to recovery mode
Note: tegra2_seaboard build's kernel partition was invalid. You will see "Only invalid kernels found on device" on outputs when you are trying to load a tegra2_seaboard image. Please test with x86-generic image just for now.
Review URL: http://codereview.chromium.org/5273008
Change-Id: Id129bb9423d8580e88fe75dd511dfdd61187f275
|
|
The GetFirmwareBody is a part of the interface between bootloader and vboot
reference library. The test driver of loading firmware is in a separating CL.
See also CL:5278007
Change-Id: Id484f84f3f3e8492c4778f4030ac954d5beecd46
BUG=None
TEST=Build successfully
Review URL: http://codereview.chromium.org/5311005
|
|
BUG=None
TEST=See below
1. Run 'VBOOT_DEBUG=1 make all' successfully
2. On u-boot command prompt run the following:
(Assume you load a flashmap/bin/example.bin on address 0x02000000)
CrOS> cros fmap 0x02000000 0x0400
fmap_signature: 0x5f5f50414d465f5f
fmap_ver_major: 1
fmap_ver_minor: 0
fmap_base: 0x0000000000000000
fmap_size: 0x0400
fmap_name: "example"
fmap_nareas: 4
area_offset: 0x00000000
area_size: 0x00000080
area_name: "bootblock"
area_flags_raw: 0x01
area_flags: static
area_offset: 0x00000080
area_size: 0x00000080
area_name: "normal"
area_flags_raw: 0x03
area_flags: static compressed
area_offset: 0x00000100
area_size: 0x00000100
area_name: "fallback"
area_flags_raw: 0x03
area_flags: static compressed
area_offset: 0x00000200
area_size: 0x00000200
area_name: "data"
area_flags_raw: 0x00
Review URL: http://codereview.chromium.org/4446003
Change-Id: I90bdcd9e325c5287e16f61ae71dd0f0479f304a6
|
|
BUG=None
TEST=Manual
Test procedure:
1. Compile with VBOOT_DEBUG flag on successfully
2. Run u-boot on dev board as follows:
(Assume you have mmc device on dev board)
CrOS> mmc init
CrOS> cros bootdev set mmc 1
CrOS> cros bootdev
(info of mmc1)
CrOS> read mmc 1 0x20000000 1 2
CrOS> md.b 0x20000000
(mmc1 content)
CrOS> cros bootdev read 0x20001000 1 2
CrOS> md.b 0x20001000
(mmc1 content)
CrOS> cmp.b 0x20000000 0x20001000 0x400
(compare the blocks, should be identical)
Review URL: http://codereview.chromium.org/4001006
Change-Id: I339f9fb63862993f8b9ced80d4c27d6bef0c1bc6
|
|
BUG=None
TEST=Build and run u-boot successfully
Change-Id: I3f7643b7d4c193cd6ef6b982ebfb790d56c4d7ab
Review URL: http://codereview.chromium.org/3793012
|
|
Now that SPI/UART is fixed pretty well, we can move to a zero boot delay.
Hold down a key (e.g. space) before reset to interrupt boot, or use:
setenv bootdelay 2
to increase the boot delay to 2 seconds for development.
This speeds up the normal boot by 2 seconds.
BUG=chromium-os:13228
TEST=Try U-Boot on Seaboard, check it doesn't wait for a boot, but it can be
interrupted by holding down a key before reset.
Change-Id: I8c433761bd977f750cecd844976574f340c54988
Reviewed-on: http://gerrit.chromium.org/gerrit/400
Reviewed-by: Simon Glass <sjg@chromium.org>
Tested-by: Simon Glass <sjg@chromium.org>
|
|
In the scenario, a user inserts a USB storage and boots to recovery mode, we
required the user to plug the USB out first. However, in the meantime that the
system is scanning the USB, the user plugs it out. It may need ~50sec to resume
because there are many retry there. This change makes it no retry such that it
only takes <1sec to resume.
R=clchiou@chromium.org,sjg@chromium.org
BUG=chromium-os:10500
TEST=emerge-tegra2_seaboard chromeos-u-boot-next successfully.
When the system is scanning the USB storage, plug the USB out.
It takes <1sec to resume.
Review URL: http://codereview.chromium.org/6685083
Change-Id: I7d002a879bc8f93ccc354b5fc4a28b55a88276d1
Reviewed-on: http://gerrit.chromium.org/gerrit/397
Reviewed-by: Simon Glass <sjg@chromium.org>
Tested-by: Simon Glass <sjg@chromium.org>
|
|
This prints a tftp speed indication after the download completes. This is the
3.6 MiB/s indicator below.
Tegra2 (SeaBoard) # tftp ...
Using asx0 device
TFTP from server 172.22.72.144; our IP address is 172.22.73.81
Filename '/tftpboot/uImage-user-seaboard-1'.
Load address: 0x408000
Loading: ################################################# 3.6 MiB/s
done
BUG=chromium-os:13228
TEST=Boot on Seaboard, make sure message appears. Use 'time tftp ...' to make
sure that speed reported is approximately right.
Change-Id: I5e96e2ef6aa196a6fd8486f2dae0fe11f7464f20
Reviewed-on: http://gerrit.chromium.org/gerrit/225
Reviewed-by: Simon Glass <sjg@chromium.org>
Tested-by: Simon Glass <sjg@chromium.org>
|
|
The command "time" takes a command as its argument, executes the command, and reports how much time the command has used.
Example usage:
------------------------------------------------------------
CrOS> time sleep 1
time: 1.000 seconds, 1000 ticks
CrOS> time sleep 10
time: 10.000 seconds, 10000 ticks
------------------------------------------------------------
R=robotboy@chromium.org,sjg@chromium.org
BUG=none
TEST=see above
Review URL: http://codereview.chromium.org/6670118
Change-Id: I97cb234c68f29e5db1f5a66abbe32ec6e575b847
Reviewed-on: http://gerrit.chromium.org/gerrit/201
Reviewed-by: Simon Glass <sjg@chromium.org>
Tested-by: Simon Glass <sjg@chromium.org>
|
|
BUG=chromium-os:13228
TEST=time usb start
see that timing is produced
Tegra2 (SeaBoard) # time usb start
(Re)start USB...
USB: Register 10011 NbrPorts 1
USB EHCI 1.00
scanning bus for devices... 3 USB Device(s) found
scanning bus for storage devices... 0 Storage Device(s) found
scanning bus for ethernet devices... 1 Ethernet Device(s) found
time: 2.708 seconds, 2708 ticks
Tegra2 (SeaBoard) #
Change-Id: I93c53d4291ae4e6a97bdccb8250fb171bdb52cbf
Reviewed-on: http://gerrit.chromium.org/gerrit/218
Reviewed-by: Simon Glass <sjg@chromium.org>
Tested-by: Simon Glass <sjg@chromium.org>
|
|
The Asix driver takes the link down during init() and then brings it back up.
This commit changes this so that if a link has already been established
successfully we simply check that the link is still good.
This reduces the delay between successive network commands.
TEST=bootp; tftp ... - see that delay is now shorter than before.
Change-Id: I044e6d12f6c175a87ee3c93bf874b497f9379c3e
BUG=chromium-os:14082
TEST=run U-boot; usb start; bootp; bootp
See that second bootp happens quickly and link stays up.
Change-Id: I79fdf4f099041ed0a077e8a833d66076c1b28402
Reviewed-on: http://gerrit.chromium.org/gerrit/200
Reviewed-by: Vadim Bendebury <vbendeb@chromium.org>
Tested-by: Simon Glass <sjg@chromium.org>
Reviewed-by: Tom Warren <twarren@nvidia.com>
|
|
This defines the basics of a new boot time measurement feature. This allows
logging of very accurate time measurements as the boot proceeds, by using
an available microsecond counter.
To enable the feature, define CONFIG_BOOTSTAGE in your board config file.
Also available is CONFIG_BOOTSTAGE_REPORT which will cause a report to be
printed just before handing off to the OS.
BUG=chromium-os:13875
TEST=build and boot, check that progress is reported before running Linux:
Timer summary in microseconds:
Mark Elapsed Stage
0 0 awake
2,181,078 2,181,078 usb_start
11,861,817 9,680,739 bootp_start
11,884,610 22,793 bootp_stop
11,884,689 79 tftp start
15,271,536 3,386,847 tftp done
15,271,568 32 bootm_start
15,406,551 134,983 start_kernel
Change-Id: I71b89c8402dc5dec75e68333bd24a6bab7500a1b
Reviewed-on: http://gerrit.chromium.org/gerrit/197
Reviewed-by: Simon Glass <sjg@chromium.org>
Tested-by: Simon Glass <sjg@chromium.org>
|
|
This uses the SPI flash on Seaboard to store a 4KB environment.
Change-Id: I9378cbe14b4b87ec31cab2f8d96868f371ef2a2d
Reviewed-on: http://gerrit.chromium.org/gerrit/192
Tested-by: Simon Glass <sjg@chromium.org>
Reviewed-by: Tom Warren <twarren@nvidia.com>
Reviewed-by: Simon Glass <sjg@chromium.org>
|
|
On Seaboard the UART and SPI interfere with each other. This causes the UART
to receive spurious zero bytes after SPI transactions and also means that
SPI can corrupt a few output characters when it starts up if they are still
in the UART buffer.
This hack corrects this by making SPI record that it may have corrupted the
UART, and making the UART take evasive action.
BUG=chromium-os:13228
TEST=Try developer U-Boot on Seaboard, make sure it auto-boots OK now
Review URL: http://codereview.chromium.org/6715017
Change-Id: If2281357f177eeb3a19a170ddea22adbcf5942e9
Reviewed-on: http://gerrit.chromium.org/gerrit/191
Reviewed-by: Simon Glass <sjg@chromium.org>
Tested-by: Simon Glass <sjg@chromium.org>
|
|
Change-Id: I306129ca7b8851639d7a062d877933e7c520c7ca
Signed-off-by: Tom Warren <twarren@nvidia.com>
Reviewed-on: http://gerrit.chromium.org/gerrit/190
Reviewed-by: Simon Glass <sjg@chromium.org>
Tested-by: Simon Glass <sjg@chromium.org>
|
|
This improves the performance of U-Boot when accepting rapid input,
such as pasting a sequence of commands.
Without this patch, on P4080DS I see a maximum of around 5 mw.l lines can
be pasted. With this patch, it handles around 70 lines before lossage,
long enough for most things you'd paste.
Change-Id: Ic17bce2fe04a3526c2605ad6d58a0d1f172e728f
Signed-off-by: Scott Wood <scottwood@freescale.com>
Tested-by: Simon Glass <sjg@chromium.org>
Reviewed-on: http://gerrit.chromium.org/gerrit/404
Reviewed-by: Simon Glass <sjg@chromium.org>
|
|
This plumbs in support for the Cortex A9's data cache. Since armv7
instructions are used we need to ensure that none of these appear in the
instruction stream executed by the ARM7TDMI.
BUG=chromium-os:12253
TEST=build and boot U-Boot on Seaboard, check that it makes it to Linux
Tegra2 (SeaBoard) # dcache
Data (writethrough) Cache is ON
Tegra2 (SeaBoard) #
Change-Id: I91e6ef847abcb821dcaf482faa31d82b98ba93b8
Reviewed-on: http://gerrit.chromium.org/gerrit/198
Tested-by: Simon Glass <sjg@chromium.org>
Reviewed-by: Tom Warren <twarren@nvidia.com>
Reviewed-by: Simon Glass <sjg@chromium.org>
|
|
replace all occurences of CONFIG_L2_OFF with a more appropriate
CONFIG_SYS_NO_L2CACHE
CONFIG_SYS_NO_L2CACHE has been chosen to be in line with
CONFIG_SYS_NO_ICACHE and CONFIG_SYS_NO_DCACHE
Signed-off-by: Aneesh V <aneesh@ti.com>
|
|
- Add a framework for layered cache maintenance
- separate out SOC specific outer cache maintenance from
maintenance of caches known to CPU
- Add generic ARMv7 cache maintenance operations that affect all
caches known to ARMv7 CPUs. For instance in Cortex-A8 these
opertions will affect both L1 and L2 caches. In Cortex-A9
these will affect only L1 cache
- D-cache operations supported:
- Invalidate entire D-cache
- Invalidate D-cache range
- Flush(clean & invalidate) entire D-cache
- Flush D-cache range
- I-cache operations supported:
- Invalidate entire I-cache
- Add maintenance functions for TLB, branch predictor array etc.
- Enable -march=armv7-a so that armv7 assembly instructions can be
used
Signed-off-by: Aneesh V <aneesh@ti.com>
|
|
This enables networking booting using a USB dongle plugged into the side
seaboard port.
BUG=chromium-os:13875
TEST=build and boot, check that network boot completes
Change-Id: I673bbed5a58ce7981590e49157cbf570129ca1a0
Review URL: http://codereview.chromium.org/6880194
|
|
This adds basic USB support for port 0. The other port is not supported by this CL.
BUG=chromium-os:13875
TEST=Put USB stick in side port. Then:
Tegra2 (SeaBoard) # ext2load usb 0:3 10000000 /boot/vmlinuz
Loading file "/boot/vmlinuz" from usb device 0:3 (gpt3)
2745808 bytes read
Tegra2 (SeaBoard) #
Change-Id: I10f9228377ee7ed7817bb30bf665d69c5e74f239
Review URL: http://codereview.chromium.org/6896012
|
|
Change-Id: Id28ef0061004aa0f6a1d2948557642e27738a06f
Signed-off-by: Tom Warren <twarren@nvidia.com>
|
|
Signed-off-by: Wolfgang Denk <wd@denx.de>
|
|
* 'master' of git://git.denx.de/u-boot-arm:
run arm_pci_init after relocation
IXP42x PCI rewrite
update/fix PDNB3 board
update/fix IXDP425 / IXDPG425 boards
add dvlhost (dLAN 200 AV Wireless G) board
IXP NPE: add support for fixed-speed MII ports
update/fix AcTux4 board
update/fix AcTux3 board
update/fix AcTux2 board
update/fix AcTux1 board
use -ffunction-sections / --gc-sections on IXP42x
support CONFIG_SYS_LDSCRIPT on ARM
fix "depend" target in npe directory
Fix IXP code to work after relocation was added
trigger hardware watchdog in IXP42x serial driver
add support for IXP42x Rev. B1 and newer
add XScale sub architecture (IXP/PXA) to maintainer list
Conflicts:
arch/arm/lib/board.c
Signed-off-by: Wolfgang Denk <wd@denx.de>
|
|
Signed-off-by: Michael Schwingen <michael@schwingen.org>
|
|
Signed-off-by: Michael Schwingen <michael@schwingen.org>
|
|
Signed-off-by: Michael Schwingen <michael@schwingen.org>
|
|
Signed-off-by: Michael Schwingen <michael@schwingen.org>
|
|
Signed-off-by: Michael Schwingen <michael@schwingen.org>
|
|
Signed-off-by: Michael Schwingen <michael@schwingen.org>
|
|
Signed-off-by: Michael Schwingen <michael@schwingen.org>
|
|
The 'trab' board configuration is broken, and there is nobody who is
interested and willing to fix it. Drop it.
This includes support for VFD displays which have always been used by
this board only.
Signed-off-by: Wolfgang Denk <wd@denx.de>
|
|
Make AFEB9260 build again.
Based on fix for AT91SAM9260EK.
Signed-off-by: Sergey Lapin <slapin@ossfans.org>
|
|
Signed-off-by: Eric BĂ©nard <eric@eukrea.com>
|
|
Fix EMK TOP9000 board to build again:
- changes required due to ATMEL rework
Signed-off-by: Reinhard Meyer <u-boot@emk-elektronik.de>
|
|
Make ATMEL's at91sam9260/9g20/9xe-ek boards build again
Signed-off-by: Reinhard Meyer <u-boot@emk-elektronik.de>
|
|
Add support for Bluewater Systems AT91 based Snapper 9260 and 9G20
single board computer modules. Includes NAND flash and Ethernet
support.
Signed-off-by: Ryan Mallon <ryan@bluewatersys.com>
|