From patchwork Tue Aug 11 14:46:03 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Usama Arif X-Patchwork-Id: 1343348 X-Patchwork-Delegate: trini@ti.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=arm.com Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=armh.onmicrosoft.com header.i=@armh.onmicrosoft.com header.a=rsa-sha256 header.s=selector2-armh-onmicrosoft-com header.b=BsNP6Q35; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.i=@armh.onmicrosoft.com header.a=rsa-sha256 header.s=selector2-armh-onmicrosoft-com header.b=BsNP6Q35; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4BQwj50qxPz9sRN for ; Wed, 12 Aug 2020 00:49:44 +1000 (AEST) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id BDCBC81988; Tue, 11 Aug 2020 16:49:40 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=arm.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; unprotected) header.d=armh.onmicrosoft.com header.i=@armh.onmicrosoft.com header.b="BsNP6Q35"; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.i=@armh.onmicrosoft.com header.b="BsNP6Q35"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id DAE7481BB4; Tue, 11 Aug 2020 16:46:33 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-0.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,FORGED_SPF_HELO,MSGID_FROM_MTA_HEADER,SPF_HELO_PASS, UNPARSEABLE_RELAY,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.2 Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-ve1eur03on0627.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe09::627]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 1A90A81988 for ; Tue, 11 Aug 2020 16:46:31 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=arm.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=Usama.Arif@arm.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KM/OmGdmkznSmGvNvUrsYlWBO4KtoPFb3W72r/GrhHA=; b=BsNP6Q35kF4HXAVNE4sAum+7Gp0Y9ZFA0dBRF1AN44HCEflEAcLA3bjrWYwddS4l4v3du3Y8GgoiHlbTQ4RpoO+K8GvIoVb8BV+fmuR60qD+3R0nCX1XO68hWbFy7lNVb6KqWLW8bOAsCvjWemHCVk1yyjJ458zVzw6QnpcWQls= Received: from DB6PR0501CA0015.eurprd05.prod.outlook.com (2603:10a6:4:8f::25) by AM6PR08MB4660.eurprd08.prod.outlook.com (2603:10a6:20b:c1::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3261.16; Tue, 11 Aug 2020 14:46:25 +0000 Received: from DB5EUR03FT024.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:8f:cafe::24) by DB6PR0501CA0015.outlook.office365.com (2603:10a6:4:8f::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3261.16 via Frontend Transport; Tue, 11 Aug 2020 14:46:25 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; lists.denx.de; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;lists.denx.de; dmarc=bestguesspass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT024.mail.protection.outlook.com (10.152.20.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3261.16 via Frontend Transport; Tue, 11 Aug 2020 14:46:25 +0000 Received: ("Tessian outbound 7fc8f57bdedc:v64"); Tue, 11 Aug 2020 14:46:25 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: a8ebdb965e4f0c40 X-CR-MTA-TID: 64aa7808 Received: from eac7ca967e24.2 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 74D9EB3C-B1CE-4E50-9B5F-DF374FFE49BD.1; Tue, 11 Aug 2020 14:46:19 +0000 Received: from EUR05-AM6-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id eac7ca967e24.2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Tue, 11 Aug 2020 14:46:19 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DxOBerrKE/e6TwRLJ+YAslUpAXPlZMB/gFiN8HDlaRm6aCmCkTVP307A6TF20Q0kSrvGG96K0COnOKFqid8Og+K+sHf/Zrwq3UnF8vCTFdmSLdpuN2/WdD7sAdXRwehT4HDCd5ZVRxpG8pjFj6yxjhg87uFdb/brggAsJhGrwZTN1FTRSjp1eqoRXdxA7HcZk52SURoJ6NxqybEm5dF7LL0eXzO8yBLJ2wY9ZA5SWgRKPDFI0VSZY6NVe5uY3VGZB5S7bStmoHDjycA6ESTWFz9TDEKSVAYhcv+DqQW0q8zx0gSd+IebVHkFqwW5jPwKjoX/O/Zz3T988SklVk27VQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KM/OmGdmkznSmGvNvUrsYlWBO4KtoPFb3W72r/GrhHA=; b=neiGueX/ySLKhy2DmtUfvn/lVblpnr1+LEHH1jL77+lqitPqTkGdcR03pqQ/ZQ9USHcpfz8BCNS9+ab5ELA6S9OGta5aqcAh0Mqt46yHhAh4tKdZ7UMb0okmx4dqUM6Nn7WpYTvvMdvfePibFB+z+CJkrX5rFp+LTFu/YOxY/V/wBhtWQddSlVvuntsnHC43YqZx/5hKd30kyx6JG4wxGkJcytVF/3tokOjSyjJe4stx4MovDlOJc/JdTlYMo1KI0rA3Qn/qbSTnP9KySZSp1knkbkIExE7LA7RyNm7+NvQvvauEq7NyDK+pFAl0V8ju4YiiP66PlFfcUezinKhujQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KM/OmGdmkznSmGvNvUrsYlWBO4KtoPFb3W72r/GrhHA=; b=BsNP6Q35kF4HXAVNE4sAum+7Gp0Y9ZFA0dBRF1AN44HCEflEAcLA3bjrWYwddS4l4v3du3Y8GgoiHlbTQ4RpoO+K8GvIoVb8BV+fmuR60qD+3R0nCX1XO68hWbFy7lNVb6KqWLW8bOAsCvjWemHCVk1yyjJ458zVzw6QnpcWQls= Authentication-Results-Original: lists.denx.de; dkim=none (message not signed) header.d=none; lists.denx.de; dmarc=none action=none header.from=arm.com; Received: from DB8PR08MB5481.eurprd08.prod.outlook.com (2603:10a6:10:114::9) by DB7PR08MB3465.eurprd08.prod.outlook.com (2603:10a6:10:50::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3261.19; Tue, 11 Aug 2020 14:46:18 +0000 Received: from DB8PR08MB5481.eurprd08.prod.outlook.com ([fe80::6939:c156:de89:adc5]) by DB8PR08MB5481.eurprd08.prod.outlook.com ([fe80::6939:c156:de89:adc5%7]) with mapi id 15.20.3261.025; Tue, 11 Aug 2020 14:46:18 +0000 From: Usama Arif To: u-boot@lists.denx.de Cc: nd@arm.com, Usama Arif , Igor Opaniuk Subject: [PATCH 1/2] avb: Make AVB independent of fastboot Date: Tue, 11 Aug 2020 15:46:03 +0100 Message-Id: <20200811144604.34293-1-usama.arif@arm.com> X-Mailer: git-send-email 2.17.1 X-ClientProxiedBy: LO2P123CA0016.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:a6::28) To DB8PR08MB5481.eurprd08.prod.outlook.com (2603:10a6:10:114::9) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from usaari01.cambridge.arm.com (217.140.106.52) by LO2P123CA0016.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:a6::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3261.19 via Frontend Transport; Tue, 11 Aug 2020 14:46:17 +0000 X-Mailer: git-send-email 2.17.1 X-Originating-IP: [217.140.106.52] X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: dedef436-79f0-41a0-a205-08d83e055258 X-MS-TrafficTypeDiagnostic: DB7PR08MB3465:|AM6PR08MB4660: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:10000;OLM:10000; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: EsOSU99mtc0tNmy2lnaWXPqKXS9nUIfZ5hMPCODmOW+pStJ/+20kBJv3r5W7iL1Wi1ZcvNz7fMQ/ziaqRn6lJrRj9rOr3lj604DiG8s7YbnedgUnMRsIyQnmCXRtHCWqfpUyQzU+wrT9zZhzo12YkGFI6czmMXsmuX+zyCoD0ORJza/hZdJBGUoo+97dnu4gPzNQOf2pk4rWxKeXp7mGHCNnaVz5KzDyAhNL6HYxAwXTljbz6YvsvGbmjSDCkX0NuvKA0rsOrRDUMptJuikrjT+3GrCShnzhgthoHWcUR2YMuQa4GPS/tGWkQfYSBMOT X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB8PR08MB5481.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(366004)(39860400002)(136003)(376002)(396003)(346002)(66476007)(8676002)(1076003)(16526019)(316002)(8936002)(186003)(6666004)(4326008)(478600001)(54906003)(83380400001)(7696005)(2616005)(52116002)(26005)(6916009)(66946007)(44832011)(36756003)(956004)(86362001)(2906002)(6486002)(66556008)(5660300002); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData: 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 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB3465 Original-Authentication-Results: lists.denx.de; dkim=none (message not signed) header.d=none; lists.denx.de; dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT024.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 7a738638-1fa1-422c-dfc2-08d83e054e0e X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: HU6So/6xR2sedjSKY59zoeYfszukVLxSKg+q4pCv4MLIhAJ9swgl0+P2nt8dKKOIB3yQ/VqLM7/REewgyBqsxNyKYzj4Z8aaakX3fbwpQQ581EkAyccI83I7NttbYhHH0+VAzLVwJ7zkfm9DkOtTXykwsZ/P1hQWuLgc8PJQcVLBLmWDWlGTy1F0YjXl5oLVc63YYH5m100dvQXqdENWpYBWBeGd3pqufcooqmgAESz3NEouoXNRRa4VY0u3E0O6u0ue85WS7vJr/hC9iKLyzLfqAQqkGuOQb9TT+9Homlrd8InM3c6TzaG4WnOdS7IsxYcR5NwTINKfupr12QV37lqv71j8yl/bPvi/h5b2jdd4fNsBQMY2mSk0w4OInBGYw0CMGcdSvzdx8CceoQsEVA== X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFTY:; SFS:(4636009)(396003)(136003)(346002)(376002)(39860400002)(46966005)(8936002)(36756003)(47076004)(316002)(8676002)(356005)(82310400002)(86362001)(4326008)(186003)(5660300002)(16526019)(26005)(7696005)(54906003)(6666004)(2906002)(70206006)(82740400003)(83380400001)(6916009)(6486002)(336012)(107886003)(44832011)(478600001)(956004)(2616005)(1076003)(70586007)(81166007); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Aug 2020 14:46:25.0154 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: dedef436-79f0-41a0-a205-08d83e055258 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT024.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4660 X-Mailman-Approved-At: Tue, 11 Aug 2020 16:49:39 +0200 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.102.3 at phobos.denx.de X-Virus-Status: Clean AVB only uses CONFIG_FASTBOOT_BUF_ADDR from fastboot for memory. This memory is used for assigning temporary buffers. This can be assigned a new variable and used as CONFIG_AVB_BUF_ADDR. This is to support future boards that support AVB but dont support USB and therefore dont support FASTBOOT. Signed-off-by: Usama Arif Cc: Igor Opaniuk Reviewed-by: Tom Rini Acked-by: Igor Opaniuk --- common/Kconfig | 18 +++++++++++++++++- common/avb_verify.c | 1 - configs/am57xx_evm_defconfig | 2 ++ configs/am57xx_hs_evm_defconfig | 2 ++ configs/am57xx_hs_evm_usb_defconfig | 2 ++ include/avb_verify.h | 4 ++-- 6 files changed, 25 insertions(+), 4 deletions(-) diff --git a/common/Kconfig b/common/Kconfig index 62d78c5bd7..bbacc33f80 100644 --- a/common/Kconfig +++ b/common/Kconfig @@ -986,7 +986,7 @@ config HASH config AVB_VERIFY bool "Build Android Verified Boot operations" - depends on LIBAVB && FASTBOOT + depends on LIBAVB depends on PARTITION_UUIDS help This option enables compilation of bootloader-dependent operations, @@ -995,6 +995,22 @@ config AVB_VERIFY * Helpers to access MMC, similar to drivers/fastboot/fb_mmc.c. * Helpers to alloc/init/free avb ops. +if AVB_VERIFY + +config AVB_BUF_ADDR + hex "Define AVB buffer address" + help + AVB requires a buffer for memory transactions. This variable defines the + buffer address. + +config AVB_BUF_SIZE + hex "Define AVB buffer SIZE" + help + AVB requires a buffer for memory transactions. This variable defines the + buffer size. + +endif # AVB_VERIFY + config SPL_HASH bool # "Support hashing API (SHA1, SHA256, etc.)" help diff --git a/common/avb_verify.c b/common/avb_verify.c index a2b739626b..db10d0f21f 100644 --- a/common/avb_verify.c +++ b/common/avb_verify.c @@ -7,7 +7,6 @@ #include #include #include -#include #include #include #include diff --git a/configs/am57xx_evm_defconfig b/configs/am57xx_evm_defconfig index 2e6787a906..41cd76d198 100644 --- a/configs/am57xx_evm_defconfig +++ b/configs/am57xx_evm_defconfig @@ -28,6 +28,8 @@ CONFIG_SYS_CONSOLE_INFO_QUIET=y CONFIG_VERSION_VARIABLE=y CONFIG_BOARD_EARLY_INIT_F=y CONFIG_AVB_VERIFY=y +CONFIG_AVB_BUF_ADDR=0x82000000 +CONFIG_AVB_BUF_SIZE=0x2F000000 CONFIG_ANDROID_AB=y CONFIG_SPL_SYS_MALLOC_SIMPLE=y CONFIG_SPL_SEPARATE_BSS=y diff --git a/configs/am57xx_hs_evm_defconfig b/configs/am57xx_hs_evm_defconfig index 808bd2881e..9505549439 100644 --- a/configs/am57xx_hs_evm_defconfig +++ b/configs/am57xx_hs_evm_defconfig @@ -33,6 +33,8 @@ CONFIG_SYS_CONSOLE_INFO_QUIET=y CONFIG_VERSION_VARIABLE=y CONFIG_BOARD_EARLY_INIT_F=y CONFIG_AVB_VERIFY=y +CONFIG_AVB_BUF_ADDR=0x82000000 +CONFIG_AVB_BUF_SIZE=0x2F000000 CONFIG_ANDROID_AB=y CONFIG_SPL_SYS_MALLOC_SIMPLE=y CONFIG_SPL_SEPARATE_BSS=y diff --git a/configs/am57xx_hs_evm_usb_defconfig b/configs/am57xx_hs_evm_usb_defconfig index 8698b7c8b5..73df983e2d 100644 --- a/configs/am57xx_hs_evm_usb_defconfig +++ b/configs/am57xx_hs_evm_usb_defconfig @@ -35,6 +35,8 @@ CONFIG_SYS_CONSOLE_INFO_QUIET=y CONFIG_VERSION_VARIABLE=y CONFIG_BOARD_EARLY_INIT_F=y CONFIG_AVB_VERIFY=y +CONFIG_AVB_BUF_ADDR=0x82000000 +CONFIG_AVB_BUF_SIZE=0x2F000000 CONFIG_ANDROID_AB=y CONFIG_SPL_SYS_MALLOC_SIMPLE=y CONFIG_SPL_SEPARATE_BSS=y diff --git a/include/avb_verify.h b/include/avb_verify.h index a8d7090f79..1e787ba666 100644 --- a/include/avb_verify.h +++ b/include/avb_verify.h @@ -72,12 +72,12 @@ static inline uint64_t calc_offset(struct mmc_part *part, int64_t offset) static inline size_t get_sector_buf_size(void) { - return (size_t)CONFIG_FASTBOOT_BUF_SIZE; + return (size_t)CONFIG_AVB_BUF_SIZE; } static inline void *get_sector_buf(void) { - return map_sysmem(CONFIG_FASTBOOT_BUF_ADDR, CONFIG_FASTBOOT_BUF_SIZE); + return map_sysmem(CONFIG_AVB_BUF_ADDR, CONFIG_AVB_BUF_SIZE); } static inline bool is_buf_unaligned(void *buffer)