From patchwork Sat Jan 6 03:34:25 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sumit Garg X-Patchwork-Id: 856096 X-Patchwork-Delegate: yorksun@freescale.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.denx.de (client-ip=81.169.180.215; helo=lists.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Received: from lists.denx.de (dione.denx.de [81.169.180.215]) by ozlabs.org (Postfix) with ESMTP id 3zCqCH5WQWz9t2Q for ; Sat, 6 Jan 2018 03:00:59 +1100 (AEDT) Received: by lists.denx.de (Postfix, from userid 105) id 23053C21E9C; Fri, 5 Jan 2018 16:00:41 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de X-Spam-Level: X-Spam-Status: No, score=0.0 required=5.0 tests=BAD_ENC_HEADER, DATE_IN_FUTURE_06_12, RCVD_IN_MSPIKE_H2, SPF_HELO_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from lists.denx.de (localhost [IPv6:::1]) by lists.denx.de (Postfix) with ESMTP id DF47CC21E88; Fri, 5 Jan 2018 16:00:37 +0000 (UTC) Received: by lists.denx.de (Postfix, from userid 105) id D9C90C21E5D; Fri, 5 Jan 2018 16:00:31 +0000 (UTC) Received: from NAM03-BY2-obe.outbound.protection.outlook.com (mail-by2nam03on0077.outbound.protection.outlook.com [104.47.42.77]) by lists.denx.de (Postfix) with ESMTPS id 1213DC21DC1 for ; Fri, 5 Jan 2018 16:00:31 +0000 (UTC) Received: from BN3PR03CA0056.namprd03.prod.outlook.com (10.167.1.144) by MWHPR03MB2702.namprd03.prod.outlook.com (10.168.207.136) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.386.5; Fri, 5 Jan 2018 16:00:28 +0000 Received: from BN1BFFO11FD041.protection.gbl (2a01:111:f400:7c10::1:194) by BN3PR03CA0056.outlook.office365.com (2a01:111:e400:7a4d::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.386.5 via Frontend Transport; Fri, 5 Jan 2018 16:00:28 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BN1BFFO11FD041.mail.protection.outlook.com (10.58.144.104) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.20.345.12 via Frontend Transport; Fri, 5 Jan 2018 16:00:01 +0000 Received: from b49020-OptiPlex-790.ap.freescale.net (b49020-OptiPlex-790.ap.freescale.net [10.232.132.83]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id w05G02xv022633; Fri, 5 Jan 2018 09:00:25 -0700 From: Sumit Garg To: Date: Sat, 6 Jan 2018 09:04:25 +0530 Message-ID: <1515209665-615-3-git-send-email-sumit.garg@nxp.com> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1515209665-615-1-git-send-email-sumit.garg@nxp.com> References: <1515209665-615-1-git-send-email-sumit.garg@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131596416014881113; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(396003)(39860400002)(346002)(39380400002)(376002)(2980300002)(1110001)(1109001)(339900001)(199004)(189003)(53936002)(104016004)(97736004)(59450400001)(316002)(8676002)(106466001)(16586007)(81156014)(2906002)(2351001)(8936002)(2950100002)(85426001)(81166006)(105606002)(6916009)(498600001)(356003)(68736007)(51416003)(36756003)(4326008)(305945005)(8656006)(76176011)(50226002)(5660300001)(50466002)(47776003)(54906003)(48376002)(77096006)(86362001); DIR:OUT; SFP:1101; SCL:1; SRVR:MWHPR03MB2702; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BN1BFFO11FD041; 1:zg7cCbPdfxuWFlojczafTfsn3jx30h5k5cAP6OFOm9QyCQEaXWQG3cUIG5bbJADhzRiKxQEI7R9qq5grE/1ptdviHG94OtSld1OBTN86pvq2WuOAXWwZqy+ZpjEKUCmO MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 2c17910d-6e80-4c18-1159-08d5545560bf X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(4534020)(4628075)(201703131517081)(5600026)(4604075)(2017052603307); SRVR:MWHPR03MB2702; X-Microsoft-Exchange-Diagnostics: 1; MWHPR03MB2702; 3:ozR7Wmu9zrPsTqU4/rfAifsxdbThC1D6mA5zBbFtWjgUkue74UyO3aR15O9XlFmH8xA4YY9t+g7Kq3bOFwaSgqidGiPjVvdbG/LP8VRMBY2HzQMZF5zQHwPC8j+6lN6MCPGpkJPAQb/qQj7V5q7xRNuVnuYQNthkJLhH8lD+eE/rD4GbbblSvWFndD65EiqHnWRz3yULETwgRaYzC4ZOUcV040QhexjJsanSwuMX5KIu8207EZEqXMZN6JAYvavK7EkNREXdxzXadTdYK9GRnUruqjmrlmiRJv+fYyJCsms+xyvJV6i64Du0o87piZKrNudbBWFnIgVso0XsUFELAs36iRB9y3rJRac6i2Wbnz4=; 25:0plh/4+6KuWMrBviDmxJiC7d+//wwEIG6mvgfU8I0W67j7IaDa2joRc85Kf+6R3DooCQeWObr+9qsi+KqWIktVlUurBEYcD/JxXI/gSV/cUi7NTHoC/LxzlIzLzStM8HkqKb1ij29pp5CG5FH/nRoN9CcWVgRV9o8RTorKhQ0hdRKj2/Ld32E8YNBHPjB2ctTNfSFiLXszmBl96HCsgJ5OcidN0rkc5CirY1phMKRuquLoda/f2ktSk4WLHTeM4GMA4z5U7cw5Cw3SWsSGVFvk35JzfkaeVhR/eHrw0jdU/UXe5neVZmglpcvuIuyENEglsT6frlu3X4+DBNA5Echg== X-MS-TrafficTypeDiagnostic: MWHPR03MB2702: X-Microsoft-Exchange-Diagnostics: 1; MWHPR03MB2702; 31:vVOvb3TnuDVfWH5ceZf/QZd6ZLIFu1oCjFcJ6V3/zbSjzMwXyYP1i1/jM/rtZRT9SBNDQ4zg1oQe5zUGvDDgFK74uQm/Ad6jFcnPfpXx+aG2tFZxDH6HeftkGKRYV0kn/MuUFyk+mDEd2xuWOYzl466WWz9/pDEE+sc0qV5hY1OejL2YAhflWgzC8T8pD4TB5w2x/1d082OHTtNS/jmbiJBCj9eXIDH005t84kjvpXE=; 4:5rU22gjnPUW/3baitjH54C9qxneHbU15047TRLVg+UVxQ/bOziIUsbViS4AFmDksaEyJN9CYA36GU6bjXXJu7QeCBiTMlH3YswBmnxrmKzKd6LB+qmCev5UE1Y1CgEM2ka/S4elYrvbyxgDC8KCNYH1cQId2VNlVz9O7t4N2/VHtus+2yAfbzpQajaGJGBwGTjoQRZ/bQzEIOV7PZhRIr2kFeFTjjtDixtdxQE9qU9QpS4V/5hNZDAXIzo16H/6D7ipDMXXBCu65dEAznDvtvqkit3Sq2O+okB45V56hejWAMx0p8mqTlY4N717BD6xK X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6095135)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(3002001)(3231023)(944510075)(944921075)(946801075)(946901075)(6055026)(6096035)(201703131430075)(201703131448075)(201703131433075)(201703161259150)(201703151042153)(20161123565025)(20161123561025)(20161123563025)(20161123559100)(20161123556025)(201708071742011); SRVR:MWHPR03MB2702; BCL:0; PCL:0; RULEID:(100000803101)(100110400095)(400006); SRVR:MWHPR03MB2702; X-Forefront-PRVS: 05437568AA X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; MWHPR03MB2702; 23:qVDt5qNpL/5iCylhOxKyGWVOpMFUludDPYbSKxnJS?= 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 X-Microsoft-Exchange-Diagnostics: 1; MWHPR03MB2702; 6:u6zTrAzvLG1M63MSBrGIiIuBF7NZhdVS+l6n0SDC462/dbU8buZORJc384oHFY9Nj3Vr3IPOgstpo7ihnnk78z8Mbw0njtzZWrpB515yF/7nUNFqKXHgjzD+GB4bdJrPrIolNFiB8dsGAAjo71wRRuo7XUoaDplpBPKAuoyP1u/ot4lRk86uL8dBRKBtcGycZ2uKBoA4bY78FGwNOdtTv1Z1NEGinCvAErg1c6Tk0kgs8aqb0VvA5EoytadbrdgJ1xx6fbgoAAUidNsVK/FskpzLq6guTyN7ypZH3hU+uIiJFdjhop/HcAqwQEEuWlc/V+6Fn48eTLRqlNcyQ9NsFFpBJ2iJ6wOxox3w7JVih50=; 5:Mz7ogxiOtNAksINfi9wIZVyiEg8HNWJJJ8Dx84TwRvTotV+RiAuSlkNKvFwyFT79pQONhpI/t7jIVf2Z3277zVm2SHgBb9E2Hndb4jUrXqBbVkj1bMePR+gSDP3vSEpu67Q4+h1odJgm5rGiQ9RCie7hw/c2dSlB8D5hLzd9mo0=; 24:IUcEUrrMfuIt0OC+sunBcKEYrMva+p60M334F3Ee47RFOmrybhn2EOFMJ5Jrrr4eO8C4K3cFR5V+S1fy5x1U59mR3OEHhwdy7hc9mmlKAPE=; 7:ToyfbPkC1HRZMnmjNV0JZaTRlykY5e26cD62yd2zQ7Xke5tB4irPsy3ArFDakUhAVXRiXyXYt7J5UjYA/5ZS1Z+kIXPvzbreecZ/Y6TfQ/rRRZt+LXfRKNwVaIMbW2KHxzZVpigr/CW1XP0Agv9hS4DIXP+yoyVj858G8dNDaw9tOpmnnL4Kzy28jLox2iojTEY+QiEAlCkmjj7xPQGrtUZVmePF81q1gqgmJiz7pBHB8Hz+4CeT/1N9Umhu/mzr SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Jan 2018 16:00:01.2697 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 2c17910d-6e80-4c18-1159-08d5545560bf X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB2702 Cc: Udit Agarwal , ruchika.gupta@nxp.com Subject: [U-Boot] [PATCH v2 3/3] ls1088ardb: Add SD Secure boot target support X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.18 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" Signed-off-by: Udit Agarwal Signed-off-by: Sumit Garg --- Changes in v2: Rebased to top of master arch/arm/include/asm/fsl_secure_boot.h | 16 ++++---- board/freescale/ls1088a/MAINTAINERS | 5 +++ .../ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig | 45 ++++++++++++++++++++++ include/configs/ls1088a_common.h | 15 +++++++- 4 files changed, 72 insertions(+), 9 deletions(-) create mode 100644 configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig diff --git a/arch/arm/include/asm/fsl_secure_boot.h b/arch/arm/include/asm/fsl_secure_boot.h index ec6463d..3f30470 100644 --- a/arch/arm/include/asm/fsl_secure_boot.h +++ b/arch/arm/include/asm/fsl_secure_boot.h @@ -26,6 +26,14 @@ #define CONFIG_KEY_REVOCATION +#if defined(CONFIG_FSL_LAYERSCAPE) +/* + * For fsl layerscape based platforms, ESBC image Address in Header + * is 64 bit. + */ +#define CONFIG_ESBC_ADDR_64BIT +#endif + #ifndef CONFIG_SPL_BUILD #ifndef CONFIG_SYS_RAMBOOT /* The key used for verification of next level images @@ -42,14 +50,6 @@ #endif -#if defined(CONFIG_FSL_LAYERSCAPE) -/* - * For fsl layerscape based platforms, ESBC image Address in Header - * is 64 bit. - */ -#define CONFIG_ESBC_ADDR_64BIT -#endif - #ifdef CONFIG_ARCH_LS2080A #define CONFIG_EXTRA_ENV \ "setenv fdt_high 0xa0000000;" \ diff --git a/board/freescale/ls1088a/MAINTAINERS b/board/freescale/ls1088a/MAINTAINERS index de3961d..371e5db 100644 --- a/board/freescale/ls1088a/MAINTAINERS +++ b/board/freescale/ls1088a/MAINTAINERS @@ -27,3 +27,8 @@ M: Udit Agarwal M: Vinitha Pillai-B57223 S: Maintained F: configs/ls1088ardb_qspi_SECURE_BOOT_defconfig + +LS1088ARDB_SD_SECURE_BOOT BOARD +M: Sumit Garg +S: Maintained +F: configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig diff --git a/configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig b/configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig new file mode 100644 index 0000000..ba90e64 --- /dev/null +++ b/configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig @@ -0,0 +1,45 @@ +CONFIG_ARM=y +CONFIG_TARGET_LS1088ARDB=y +CONFIG_SPL_LIBCOMMON_SUPPORT=y +CONFIG_SPL_LIBGENERIC_SUPPORT=y +CONFIG_FSL_LS_PPA=y +CONFIG_SPL_MMC_SUPPORT=y +CONFIG_SPL_SERIAL_SUPPORT=y +CONFIG_SPL_DRIVERS_MISC_SUPPORT=y +CONFIG_DEFAULT_DEVICE_TREE="fsl-ls1088a-rdb" +CONFIG_DISTRO_DEFAULTS=y +# CONFIG_SYS_MALLOC_F is not set +CONFIG_FIT_VERBOSE=y +CONFIG_OF_BOARD_SETUP=y +CONFIG_SYS_EXTRA_OPTIONS="SD_BOOT_QSPI" +CONFIG_SECURE_BOOT=y +CONFIG_SD_BOOT=y +# CONFIG_USE_BOOTCOMMAND is not set +# CONFIG_DISPLAY_BOARDINFO is not set +CONFIG_SPL=y +CONFIG_SYS_MMCSD_RAW_MODE_U_BOOT_USE_SECTOR=y +CONFIG_SYS_MMCSD_RAW_MODE_U_BOOT_SECTOR=0x8b0 +CONFIG_SPL_ENV_SUPPORT=y +CONFIG_SPL_I2C_SUPPORT=y +CONFIG_SPL_MPC8XXX_INIT_DDR_SUPPORT=y +CONFIG_CMD_I2C=y +CONFIG_CMD_MMC=y +CONFIG_CMD_SF=y +# CONFIG_CMD_SETEXPR is not set +CONFIG_OF_CONTROL=y +CONFIG_ENV_IS_IN_MMC=y +CONFIG_NET_RANDOM_ETHADDR=y +CONFIG_DM=y +CONFIG_SPL_DM=y +CONFIG_SCSI_AHCI=y +CONFIG_DM_SPI_FLASH=y +CONFIG_SPI_FLASH=y +CONFIG_NETDEVICES=y +CONFIG_E1000=y +CONFIG_SYS_NS16550=y +CONFIG_DM_SPI=y +CONFIG_FSL_DSPI=y +CONFIG_RSA=y +CONFIG_SPL_RSA=y +CONFIG_SPL_CRYPTO_SUPPORT=y +CONFIG_SPL_HASH_SUPPORT=y diff --git a/include/configs/ls1088a_common.h b/include/configs/ls1088a_common.h index 13b5e8b..e684884 100644 --- a/include/configs/ls1088a_common.h +++ b/include/configs/ls1088a_common.h @@ -254,7 +254,20 @@ unsigned long long get_qixis_addr(void); #define CONFIG_SYS_SPL_MALLOC_SIZE 0x00100000 #define CONFIG_SYS_SPL_MALLOC_START 0x80200000 -#define CONFIG_SYS_MONITOR_LEN (512 * 1024) + +#ifdef CONFIG_SECURE_BOOT +#define CONFIG_U_BOOT_HDR_SIZE (16 << 10) +/* + * HDR would be appended at end of image and copied to DDR along + * with U-Boot image. Here u-boot max. size is 512K. So if binary + * size increases then increase this size in case of secure boot as + * it uses raw u-boot image instead of fit image. + */ +#define CONFIG_SYS_MONITOR_LEN (0x100000 + CONFIG_U_BOOT_HDR_SIZE) +#else +#define CONFIG_SYS_MONITOR_LEN 0x100000 +#endif /* ifdef CONFIG_SECURE_BOOT */ + #endif #define CONFIG_SYS_BOOTM_LEN (64 << 20) /* Increase max gunzip size */