[1/1] armv8: lx2160a: Updates secure boot headers offset
diff mbox series

Message ID 20200122103100.31186-1-priyanka.singh@nxp.com
State Accepted
Commit 20858a2be03b2a1d3f38cf50ad8c305f27528b67
Delegated to: Priyanka Jain
Headers show
Series
  • [1/1] armv8: lx2160a: Updates secure boot headers offset
Related show

Commit Message

Priyanka Singh Jan. 22, 2020, 10:31 a.m. UTC
Updates the secure boot headers offsets of Kernel and other
firmware images for SD and XSPI boot sources used by
esbc_validate command.

Signed-off-by: Priyanka Singh <priyanka.singh@nxp.com>
---
 include/configs/lx2160a_common.h | 22 +++++++++++-----------
 1 file changed, 11 insertions(+), 11 deletions(-)

Comments

Priyanka Jain (OSS) Feb. 5, 2020, 6:44 a.m. UTC | #1
>-----Original Message-----
>From: U-Boot <u-boot-bounces@lists.denx.de> On Behalf Of Priyanka Singh
>Sent: Wednesday, January 22, 2020 4:01 PM
>To: u-boot@lists.denx.de
>Cc: Udit Agarwal <udit.agarwal@nxp.com>; Ruchika Gupta
><ruchika.gupta@nxp.com>; Arun Pathak <arun.pathak@nxp.com>
>Subject: [PATCH 1/1] armv8: lx2160a: Updates secure boot headers offset
>
>Updates the secure boot headers offsets of Kernel and other firmware images
>for SD and XSPI boot sources used by esbc_validate command.
>
>Signed-off-by: Priyanka Singh <priyanka.singh@nxp.com>
>---
Series applied on u-boot-fsl-qoriq/master. Awaiting upstream 
-priyankajain

Patch
diff mbox series

diff --git a/include/configs/lx2160a_common.h b/include/configs/lx2160a_common.h
index 909d047d7d..0b0075a406 100644
--- a/include/configs/lx2160a_common.h
+++ b/include/configs/lx2160a_common.h
@@ -207,18 +207,18 @@  int select_i2c_ch_pca9547_sec(unsigned char ch);
 /* Initial environment variables */
 #define XSPI_MC_INIT_CMD			\
 	"env exists secureboot && "		\
-	"esbc_validate 0x20700000 && "		\
-	"esbc_validate 0x20740000 ;"		\
+	"esbc_validate 0x20640000 && "		\
+	"esbc_validate 0x20680000 ;"		\
 	"fsl_mc start mc 0x20a00000 0x20e00000\0"
 
 #define SD_MC_INIT_CMD				\
 	"mmc read 0x80a00000 0x5000 0x1200;"	\
 	"mmc read 0x80e00000 0x7000 0x800;"	\
 	"env exists secureboot && "		\
-	"mmc read 0x80700000 0x3800 0x20 && "	\
-	"mmc read 0x80740000 0x3A00 0x20 && "	\
-	"esbc_validate 0x80700000 && "		\
-	"esbc_validate 0x80740000 ;"		\
+	"mmc read 0x80640000 0x3200 0x20 && "	\
+	"mmc read 0x80680000 0x3400 0x20 && "	\
+	"esbc_validate 0x80640000 && "		\
+	"esbc_validate 0x80680000 ;"		\
 	"fsl_mc start mc 0x80a00000 0x80e00000\0"
 
 #define EXTRA_ENV_SETTINGS			\
@@ -229,7 +229,7 @@  int select_i2c_ch_pca9547_sec(unsigned char ch);
 	"initrd_high=0xffffffffffffffff\0"	\
 	"fdt_addr=0x64f00000\0"			\
 	"kernel_start=0x1000000\0"		\
-	"kernelheader_start=0x7C0000\0"		\
+	"kernelheader_start=0x600000\0"		\
 	"scriptaddr=0x80000000\0"		\
 	"scripthdraddr=0x80080000\0"		\
 	"fdtheader_addr_r=0x80100000\0"		\
@@ -240,7 +240,7 @@  int select_i2c_ch_pca9547_sec(unsigned char ch);
 	"load_addr=0xa0000000\0"		\
 	"kernel_size=0x2800000\0"		\
 	"kernel_addr_sd=0x8000\0"		\
-	"kernelhdr_addr_sd=0x3E00\0"            \
+	"kernelhdr_addr_sd=0x3000\0"            \
 	"kernel_size_sd=0x1d000\0"              \
 	"kernelhdr_size_sd=0x20\0"              \
 	"console=ttyAMA0,38400n8\0"		\
@@ -268,7 +268,7 @@  int select_i2c_ch_pca9547_sec(unsigned char ch);
 
 #define XSPI_NOR_BOOTCOMMAND						\
 			"env exists mcinitcmd && env exists secureboot "\
-			"&& esbc_validate 0x20780000; "			\
+			"&& esbc_validate 0x206C0000; "			\
 			"env exists mcinitcmd && "			\
 			"fsl_mc lazyapply dpl 0x20d00000; "		\
 			"run distro_bootcmd;run xspi_bootcmd; "		\
@@ -278,8 +278,8 @@  int select_i2c_ch_pca9547_sec(unsigned char ch);
 		"env exists mcinitcmd && mmcinfo; "		\
 		"mmc read 0x80d00000 0x6800 0x800; "		\
 		"env exists mcinitcmd && env exists secureboot "	\
-		" && mmc read 0x80780000 0x3C00 0x20 "		\
-		"&& esbc_validate 0x80780000;env exists mcinitcmd "	\
+		" && mmc read 0x806C0000 0x3600 0x20 "		\
+		"&& esbc_validate 0x806C0000;env exists mcinitcmd "	\
 		"&& fsl_mc lazyapply dpl 0x80d00000;"		\
 		"run distro_bootcmd;run sd_bootcmd;"		\
 		"env exists secureboot && esbc_halt;"