{"id":806984,"url":"http://patchwork.ozlabs.org/api/1.2/patches/806984/?format=json","web_url":"http://patchwork.ozlabs.org/project/uboot/patch/1503990107-28658-3-git-send-email-sumit.garg@nxp.com/","project":{"id":18,"url":"http://patchwork.ozlabs.org/api/1.2/projects/18/?format=json","name":"U-Boot","link_name":"uboot","list_id":"u-boot.lists.denx.de","list_email":"u-boot@lists.denx.de","web_url":null,"scm_url":null,"webscm_url":null,"list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<1503990107-28658-3-git-send-email-sumit.garg@nxp.com>","list_archive_url":null,"date":"2017-08-29T07:01:47","name":"[U-Boot,3/3] ls1088ardb: Add SD Secure boot target support","commit_ref":null,"pull_url":null,"state":"superseded","archived":false,"hash":"e3a4fa124d020b12fbd4f21460f5e68dc81429e3","submitter":{"id":68653,"url":"http://patchwork.ozlabs.org/api/1.2/people/68653/?format=json","name":"Sumit Garg","email":"sumit.garg@nxp.com"},"delegate":{"id":2666,"url":"http://patchwork.ozlabs.org/api/1.2/users/2666/?format=json","username":"yorksun","first_name":"York","last_name":"Sun","email":"yorksun@freescale.com"},"mbox":"http://patchwork.ozlabs.org/project/uboot/patch/1503990107-28658-3-git-send-email-sumit.garg@nxp.com/mbox/","series":[{"id":318,"url":"http://patchwork.ozlabs.org/api/1.2/series/318/?format=json","web_url":"http://patchwork.ozlabs.org/project/uboot/list/?series=318","date":"2017-08-29T07:01:46","name":"[U-Boot,1/3] armv8: fsl-layerscape: SPL size reduction","version":1,"mbox":"http://patchwork.ozlabs.org/series/318/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/806984/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/806984/checks/","tags":{},"related":[],"headers":{"Return-Path":"<u-boot-bounces@lists.denx.de>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@bilbo.ozlabs.org","Authentication-Results":["ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=lists.denx.de\n\t(client-ip=81.169.180.215; helo=lists.denx.de;\n\tenvelope-from=u-boot-bounces@lists.denx.de;\n\treceiver=<UNKNOWN>)","spf=fail (sender IP is 192.88.168.50)\n\tsmtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed)\n\theader.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com;"],"Received":["from lists.denx.de (dione.denx.de [81.169.180.215])\n\tby ozlabs.org (Postfix) with ESMTP id 3xhKl42xQRz9t38\n\tfor <incoming@patchwork.ozlabs.org>;\n\tTue, 29 Aug 2017 17:19:28 +1000 (AEST)","by lists.denx.de (Postfix, from userid 105)\n\tid CDA9BC21E29; Tue, 29 Aug 2017 07:07:02 +0000 (UTC)","from lists.denx.de (localhost [IPv6:::1])\n\tby lists.denx.de (Postfix) with ESMTP id C6A6AC21E2B;\n\tTue, 29 Aug 2017 07:06:56 +0000 (UTC)","by lists.denx.de (Postfix, from userid 105)\n\tid 6EDB2C21E36; Tue, 29 Aug 2017 07:02:08 +0000 (UTC)","from NAM01-BY2-obe.outbound.protection.outlook.com\n\t(mail-by2nam01on0070.outbound.protection.outlook.com [104.47.34.70])\n\tby lists.denx.de (Postfix) with ESMTPS id D5AEDC21E64\n\tfor <u-boot@lists.denx.de>; Tue, 29 Aug 2017 07:02:07 +0000 (UTC)","from BN6PR03CA0095.namprd03.prod.outlook.com (10.164.122.161) by\n\tCO2PR03MB2262.namprd03.prod.outlook.com (10.166.92.143) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id\n\t15.1.1385.9; Tue, 29 Aug 2017 07:02:05 +0000","from BY2FFO11OLC015.protection.gbl (2a01:111:f400:7c0c::190) by\n\tBN6PR03CA0095.outlook.office365.com (2603:10b6:405:6f::33) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1385.9 via\n\tFrontend Transport; Tue, 29 Aug 2017 07:02:04 +0000","from tx30smr01.am.freescale.net (192.88.168.50) by\n\tBY2FFO11OLC015.mail.protection.outlook.com (10.1.15.59) with\n\tMicrosoft SMTP Server (version=TLS1_0,\n\tcipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1341.15\n\tvia Frontend Transport; Tue, 29 Aug 2017 07:02:03 +0000","from vinitha-OptiPlex-790.ap.freescale.net\n\t(vinitha-OptiPlex-790.ap.freescale.net [10.232.134.143])\n\tby tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id\n\tv7T71mN0006227; Tue, 29 Aug 2017 00:02:00 -0700"],"X-Spam-Checker-Version":"SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de","X-Spam-Level":"","X-Spam-Status":"No, score=-0.0 required=5.0 tests=BAD_ENC_HEADER,\n\tRCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL,\n\tSPF_HELO_PASS\n\tautolearn=unavailable autolearn_force=no version=3.4.0","Received-SPF":"Fail (protection.outlook.com: domain of nxp.com does not\n\tdesignate 192.88.168.50 as permitted sender)\n\treceiver=protection.outlook.com; \n\tclient-ip=192.88.168.50; helo=tx30smr01.am.freescale.net;","From":"Sumit Garg <sumit.garg@nxp.com>","To":"<u-boot@lists.denx.de>","Date":"Tue, 29 Aug 2017 12:31:47 +0530","Message-ID":"<1503990107-28658-3-git-send-email-sumit.garg@nxp.com>","X-Mailer":"git-send-email 2.7.4","In-Reply-To":"<1503990107-28658-1-git-send-email-sumit.garg@nxp.com>","References":"<1503990107-28658-1-git-send-email-sumit.garg@nxp.com>","X-EOPAttributedMessage":"0","X-Matching-Connectors":"131484637241635551;\n\t(91ab9b29-cfa4-454e-5278-08d120cd25b8); ()","X-Forefront-Antispam-Report":"CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI;\n\tSFV:NSPM;\n\tSFS:(10009020)(6009001)(336005)(39380400002)(39860400002)(2980300002)(1109001)(1110001)(339900001)(199003)(189002)(2906002)(626005)(54906002)(85426001)(104016004)(2950100002)(6916009)(36756003)(53936002)(4326008)(47776003)(68736007)(5660300001)(105606002)(106466001)(8936002)(97736004)(81166006)(50226002)(5003940100001)(110136004)(356003)(77096006)(50466002)(86362001)(575784001)(33646002)(2351001)(50986999)(76176999)(6666003)(8656003)(8676002)(305945005)(81156014)(498600001)(48376002)(189998001);\n\tDIR:OUT; SFP:1101; SCL:1; SRVR:CO2PR03MB2262;\n\tH:tx30smr01.am.freescale.net; \n\tFPR:; SPF:Fail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en; ","X-Microsoft-Exchange-Diagnostics":["1; BY2FFO11OLC015;\n\t1:m5nwfYEHY+aRhwiY3n6IasnMjhwLvbWH+5EkWCPaeUY3mMIeKOC233DDODU2WfVKc7XTCJZtd2Wf42NFO/fi02+HCwR2kk2C0hvV2KvO5km5s+d15NJWUWDdpTvSz1KX","1; CO2PR03MB2262;\n\t3:epvItURKrE9MvCMWc9fGuGNh5pYR7u0T825MwKXa6j63cNLSPw3mImQuL61bvlLUvSMoNZYDnCoOw7oplX1RfGu134mtCWyHWDv+xn54DzA00+xsv5ijjlZcBHgzfP6QcwtwZ1eRNsqUk0oE4p/M6ddUjiSEiH6S75KfbE2ZJk5BKW/mlr0ZpxKl8JttluXb3/BNvUPNrqBYu4J2panHxLYz7sZjF5OrGWqErzcApNCansNCJ4nZuwTfo3nFA3AhYzlITQCNTEV8JL4snMNw0fnz0Buui2o3+0DjUjLmGlpe/F4GZmED/zIjodgJnzvFN/quNWHeB3je4sh5ciCQmEaGKHA0+m9BkUNMYSin5O4=;\n\t25:LoM0IoH3Qa6j4qQjRRFn8jOQZ2r3NTgIqBZ5+Rx1m+GIq0aBIVDA0ds6Y5MNpzV4zeRoQ6CCpgDy5A9aNhgkTVat+9qjnGPcN741zd3G9O3jN/IKFk8wQqI7IqTEk2s55PM9V+sgZ8oMQ0usZ1OWKqfuGXOTzY0MB9VeMqvWdm7B/6OVs+gIq9PwfLziYA0YZOFRnW0MAaM4tY6WtfzJ0MV2pHgbIncmjSLokTkcXsZv5KkvxQ3BuhY++NkPOahtsstYeQR4j/e7kiotigT2rIlA0J8sl4zHufkHOwqk8xwZ6xr74JuLlKk65Z3OR6H39Z7MOh+j3hjjsbm6R7ZAog==","1; CO2PR03MB2262;\n\t31:S/cb6mSHP3C/yqLKUK9U91nlGtQwT6sva/XTGM7Ibq3WeXJ+cnWXInEJzAwcGuGAdAWL7vogUOzRkovH534zAz0XDQPv+3pKikvAcIzVHFs5FBsDLFBHdcyrpFfLiml8clUJM89PIxIH5iCqlvqrWhbz/Wwz3kX0zNmYTQk/U6i/46KCfLf0orxykzaSstcEzOe0rFRiPkxDYEcXvvJh1OFI3I1lDarM7bIqVb4tEt4=;\n\t4:+OPWCqoOiCD6GEs5OhMLJ/qkHPfVYMlAsP+k3+TjyNqf7A6FD1/tGWwHxRmnQw+UmdOl/OlGBE0m9EC+o6EbVubwRqlkPtng1vrKqmZ5oTAt5ab+KcTKkfC3Aj2eXQbwPZsT02zoQ5zygQefvTRH9HVBolthwKwTUkkeHrxb17RxL4ijkSQ14PmMyG+j7GgQq4s6kk8RW9MFpSKPJ0ZMXHKW2xT67WORuBVMlWaBG+u8f0zdwNXf/DTr54YtJcJ8QCWaI4Zc5ghEfg4xMHkTtL1uGj57NwerJVP4K2leSPE=","=?us-ascii?Q?1; CO2PR03MB2262;\n\t23:enBLriApxooXKV0M8Jn8XU0MH3JjjOC2L1wyyb22f?=\n\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","1; CO2PR03MB2262;\n\t6:I25yfU5XJi12YUTVltpGMHQHP4wIMhWKgb/r5UosEvTaoevlNWF+oKTK8plYBxacX1fxs9nZFetKIjFiBi/AcuIXb017dxyIbOsErEUCmoWF5wWg/IcgyAbpwbUW9ItylvnDV6n+LxTvRWwsiG9E5RxBjEaXVnQki4RWtH5cdvtAtwsoJA8rUUhLpZidCKbG9tyomqE0gcDVjAppJ7/Hiv9OOETLdgRcGM6sHsd4LZJ1qhFLvh2IFHh3WmFT7NrZK6xVRS96h1VHdSWUPkYM7NwhKkf+gu95fYmbEMNZn0VOCxobyMkQqUww1hBg2MD3WnXzVTFbEMDPyUI/0TSqZA==;\n\t5:CCvGfUZ92Jixa8M2gmqwTuM7qRclGxqo0j/ZqQQ71gT0KtVhnwxt+90eJHvV13bVLmOECkFIZGY1naTDx8cB0tatpHZUdK/BKtpms3C+U4aBTK9DWZ6KKDzQWiwogvmQ59Rn/03ConoSsywUCu2INA==;\n\t24:Dch6lOUH/G96BzZBDovyXLVpInnvOU1JuyhMhQetaTrCzpVzlRI2ZT+o6feIUhvVfoD1+PQ1H/PZ0Hm6+jYyb2LikzIQWfE+evSZh0g9Mv4=;\n\t7:w6aQhfN7tb2g/0ftzJ3A0YvmKsfX86SzWNzTV2C6hM+HZoqWMn4RYKTE6dpfbJJBvwUd5oiGN4RmVvDlbnl717GeHnsff4tpqxbvweIFzFw+G1ptPT4PzG/xO+yZCF++6iBFfEW65FZu3I99QEdgePGkvKZes63iVPH+6lTrU2Yj3p+edlZvZMo0jlI3jDq0QBCmmhb41+odrYRvyHwUNVf5P3pODAm2CaBSXB/rhg4="],"MIME-Version":"1.0","X-MS-PublicTrafficType":"Email","X-MS-Office365-Filtering-Correlation-Id":"a314ed33-6ba6-4b54-72df-08d4eeabdaac","X-Microsoft-Antispam":"UriScan:; BCL:0; PCL:0;\n\tRULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(2017052603199)(201703131430075)(201703131517081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095);\n\tSRVR:CO2PR03MB2262; ","X-MS-TrafficTypeDiagnostic":"CO2PR03MB2262:","X-Exchange-Antispam-Report-Test":"UriScan:(185117386973197);","X-Microsoft-Antispam-PRVS":"<CO2PR03MB2262FB6B74B0356EAA04D9A7989F0@CO2PR03MB2262.namprd03.prod.outlook.com>","X-Exchange-Antispam-Report-CFA-Test":"BCL:0; PCL:0;\n\tRULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(601004)(2401047)(13018025)(8121501046)(13016025)(5005006)(3002001)(10201501046)(93006095)(93001095)(100000703101)(100105400095)(6055026)(6096035)(20161123559100)(20161123565025)(20161123561025)(20161123556025)(201703131430075)(201703131441075)(201703131448075)(201703131433075)(201703161259150)(20161123563025)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);\n\tSRVR:CO2PR03MB2262; BCL:0; PCL:0;\n\tRULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095);\n\tSRVR:CO2PR03MB2262; ","X-Forefront-PRVS":"0414DF926F","SpamDiagnosticOutput":"1:99","SpamDiagnosticMetadata":"NSPM","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"29 Aug 2017 07:02:03.9763\n\t(UTC)","X-MS-Exchange-CrossTenant-Id":"5afe0b00-7697-4969-b663-5eab37d5f47e","X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp":"TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e;\n\tIp=[192.88.168.50]; \n\tHelo=[tx30smr01.am.freescale.net]","X-MS-Exchange-CrossTenant-FromEntityHeader":"HybridOnPrem","X-MS-Exchange-Transport-CrossTenantHeadersStamped":"CO2PR03MB2262","Cc":"Udit Agarwal <udit.agarwal@nxp.com>, ruchika.gupta@nxp.com","Subject":"[U-Boot] [PATCH 3/3] ls1088ardb: Add SD Secure boot target support","X-BeenThere":"u-boot@lists.denx.de","X-Mailman-Version":"2.1.18","Precedence":"list","List-Id":"U-Boot discussion <u-boot.lists.denx.de>","List-Unsubscribe":"<https://lists.denx.de/options/u-boot>,\n\t<mailto:u-boot-request@lists.denx.de?subject=unsubscribe>","List-Archive":"<http://lists.denx.de/pipermail/u-boot/>","List-Post":"<mailto:u-boot@lists.denx.de>","List-Help":"<mailto:u-boot-request@lists.denx.de?subject=help>","List-Subscribe":"<https://lists.denx.de/listinfo/u-boot>,\n\t<mailto:u-boot-request@lists.denx.de?subject=subscribe>","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"base64","Errors-To":"u-boot-bounces@lists.denx.de","Sender":"\"U-Boot\" <u-boot-bounces@lists.denx.de>"},"content":"Signed-off-by: Udit Agarwal <udit.agarwal@nxp.com>\nSigned-off-by: Sumit Garg <sumit.garg@nxp.com>\n---\n\nDependent on ls1088 base SD boot target. Also dependent on ls1088\nQPSI secure boot target.\n\n arch/arm/include/asm/fsl_secure_boot.h             | 16 ++++-----\n board/freescale/ls1088a/MAINTAINERS                |  5 +++\n .../ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig   | 39 ++++++++++++++++++++++\n include/configs/ls1088a_common.h                   | 15 ++++++++-\n 4 files changed, 66 insertions(+), 9 deletions(-)\n create mode 100644 configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig","diff":"diff --git a/arch/arm/include/asm/fsl_secure_boot.h b/arch/arm/include/asm/fsl_secure_boot.h\nindex 5ebe0cf..aa48024 100644\n--- a/arch/arm/include/asm/fsl_secure_boot.h\n+++ b/arch/arm/include/asm/fsl_secure_boot.h\n@@ -26,6 +26,14 @@\n \n #define CONFIG_KEY_REVOCATION\n \n+#if defined(CONFIG_FSL_LAYERSCAPE)\n+/*\n+ * For fsl layerscape based platforms, ESBC image Address in Header\n+ * is 64 bit.\n+ */\n+#define CONFIG_ESBC_ADDR_64BIT\n+#endif\n+\n #ifndef CONFIG_SPL_BUILD\n #ifndef CONFIG_SYS_RAMBOOT\n /* The key used for verification of next level images\n@@ -42,14 +50,6 @@\n \n #endif\n \n-#if defined(CONFIG_FSL_LAYERSCAPE)\n-/*\n- * For fsl layerscape based platforms, ESBC image Address in Header\n- * is 64 bit.\n- */\n-#define CONFIG_ESBC_ADDR_64BIT\n-#endif\n-\n #ifdef CONFIG_ARCH_LS2080A\n #define CONFIG_EXTRA_ENV \\\n \t\"setenv fdt_high 0xa0000000;\"\t\\\ndiff --git a/board/freescale/ls1088a/MAINTAINERS b/board/freescale/ls1088a/MAINTAINERS\nindex b3d5c38..de8a770 100644\n--- a/board/freescale/ls1088a/MAINTAINERS\n+++ b/board/freescale/ls1088a/MAINTAINERS\n@@ -15,3 +15,8 @@ F:\tboard/freescale/ls1088a/\n F:\tinclude/configs/ls1088aqds.h\n F:\tconfigs/ls1088aqds_qspi_defconfig\n F:\tconfigs/ls1088aqds_sdcard_qspi_defconfig\n+\n+LS1088A_SECURE_BOOT BOARD\n+M:\tSumit Garg <sumit.garg@nxp.com>\n+S:\tMaintained\n+F:\tconfigs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig\ndiff --git a/configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig b/configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig\nnew file mode 100644\nindex 0000000..746637d\n--- /dev/null\n+++ b/configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig\n@@ -0,0 +1,39 @@\n+CONFIG_ARM=y\n+CONFIG_TARGET_LS1088ARDB=y\n+# CONFIG_SYS_MALLOC_F is not set\n+CONFIG_DM_SPI=y\n+CONFIG_DM_SPI_FLASH=y\n+CONFIG_DEFAULT_DEVICE_TREE=\"fsl-ls1088a-rdb\"\n+CONFIG_FIT=y\n+CONFIG_FIT_VERBOSE=y\n+CONFIG_OF_BOARD_SETUP=y\n+CONFIG_SYS_EXTRA_OPTIONS=\"SD_BOOT_QSPI\"\n+CONFIG_SECURE_BOOT=y\n+CONFIG_SD_BOOT=y\n+CONFIG_SPL=y\n+CONFIG_HUSH_PARSER=y\n+CONFIG_CMD_MMC=y\n+CONFIG_CMD_SF=y\n+CONFIG_CMD_I2C=y\n+# CONFIG_CMD_SETEXPR is not set\n+CONFIG_CMD_DHCP=y\n+CONFIG_CMD_PING=y\n+CONFIG_OF_CONTROL=y\n+CONFIG_NET_RANDOM_ETHADDR=y\n+CONFIG_DM=y\n+CONFIG_SPL_DM=y\n+CONFIG_SPI_FLASH=y\n+CONFIG_NETDEVICES=y\n+CONFIG_E1000=y\n+CONFIG_SYS_NS16550=y\n+CONFIG_FSL_DSPI=y\n+CONFIG_SYS_MMCSD_RAW_MODE_U_BOOT_USE_SECTOR=y\n+CONFIG_SYS_MMCSD_RAW_MODE_U_BOOT_SECTOR=0x8b0\n+CONFIG_FSL_LS_PPA=y\n+CONFIG_SPL_BUILD=y\n+CONFIG_PARTITIONS=y\n+CONFIG_RSA=y\n+CONFIG_SPL_RSA=y\n+CONFIG_SPL_CRYPTO_SUPPORT=y\n+CONFIG_SPL_HASH_SUPPORT=y\n+# CONFIG_DISPLAY_BOARDINFO is not set\ndiff --git a/include/configs/ls1088a_common.h b/include/configs/ls1088a_common.h\nindex fb4c852..38d4643 100644\n--- a/include/configs/ls1088a_common.h\n+++ b/include/configs/ls1088a_common.h\n@@ -248,7 +248,20 @@ unsigned long long get_qixis_addr(void);\n \n #define CONFIG_SYS_SPL_MALLOC_SIZE     0x00100000\n #define CONFIG_SYS_SPL_MALLOC_START    0x80200000\n-#define CONFIG_SYS_MONITOR_LEN         (512 * 1024)\n+\n+#ifdef CONFIG_SECURE_BOOT\n+#define CONFIG_U_BOOT_HDR_SIZE\t\t(16 << 10)\n+/*\n+ * HDR would be appended at end of image and copied to DDR along\n+ * with U-Boot image. Here u-boot max. size is 512K. So if binary\n+ * size increases then increase this size in case of secure boot as\n+ * it uses raw u-boot image instead of fit image.\n+ */\n+#define CONFIG_SYS_MONITOR_LEN         (0x100000 + CONFIG_U_BOOT_HDR_SIZE)\n+#else\n+#define CONFIG_SYS_MONITOR_LEN         0x100000\n+#endif /* ifdef CONFIG_SECURE_BOOT */\n+\n #endif\n #define CONFIG_SYS_BOOTM_LEN   (64 << 20)      /* Increase max gunzip size */\n \n","prefixes":["U-Boot","3/3"]}