From patchwork Wed Jan 22 10:32:34 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Priyanka Singh X-Patchwork-Id: 1227162 X-Patchwork-Delegate: priyanka.jain@nxp.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=85.214.62.61; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: ozlabs.org; dmarc=pass (p=none dis=none) header.from=nxp.com Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=nxp.com header.i=@nxp.com header.a=rsa-sha256 header.s=selector2 header.b=hIP6oQia; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 482hYm2TW7z9sQp for ; Wed, 22 Jan 2020 21:32:44 +1100 (AEDT) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 15FC7817BD; Wed, 22 Jan 2020 11:32:39 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=nxp.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; unprotected) header.d=nxp.com header.i=@nxp.com header.b="hIP6oQia"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 0C515818C1; Wed, 22 Jan 2020 11:32:38 +0100 (CET) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU, FORGED_SPF_HELO, SPF_HELO_PASS, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.2 Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-vi1eur04on0616.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0e::616]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 132C181749 for ; Wed, 22 Jan 2020 11:32:35 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=nxp.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=priyanka.singh@nxp.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eaeZJiAZVy5h4XsYVsaGcbfiG2cSOvqL3914oHV/Y+G1O8+Ur8/7yqjtfF+o20vniZ7z1mRgTjmRR6iDCmEZnyIKGB3E/FGS93XNcxrFrWVEzfnETJtVps1YEZt5DJ4/UYQ2HPpk2JPyHBc6c4fAwWSs8lKzp8tTXhv7ZfV/YKyawSRxmuK9I6RaVpeu4tnjtOEkib4KHtHoi+5dVDHybc/mhsa2N5KGyBtJ7jzWIaJu2G5/Tew1bdUejggxbkjgMjni006kDJNj2vER7L9jrxjO4/uZ2SCzgkqqt/CdS0EDPDOot2aV3aW3ER7a6OlqaMx8xkJxFgd2MZclnRi/9Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rMlsQZLW/YEzZFpuwdAbtD1P43zb0jDF5shrFzI8YhM=; b=UPMdF+OVSlF/CR3RhFjEUJF4qi1Ki+6Ac1Z0DOZL8fBFqBnvbTtdvYvTI32cdQjyzdRP3391Rzi4jaZUGIlVS6ukbLPbFDQFJpdG8CSJqkjhPIToT9ezSy+nf6sC+NGFzIslhFU93SN7OknPFeTRjwYMfx144/UN6NMv/hFggysMI43tAQK8BReUfvg8j1t8wBU68TSAlmYmYkQCCFzRqsXXg3D1B8rfKX5o0TNKHTmVBphfzXQXrjm2BgH8MGI7whdGAu+P8dNAncCTulD2R6CCvOysqjGpA+T/+CUrhdu+si3Cp0vH+uuBpkx8CY+Bb/5eKpmEYEzZmJ7CJTCXSw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rMlsQZLW/YEzZFpuwdAbtD1P43zb0jDF5shrFzI8YhM=; b=hIP6oQia3FRwvmqnO2wDGMHAIw1Yny8SDZSFof8rNvY0mwCPRHTebnLesvEt+Xa9wUAkLLeqyC17BpCwvNomk1dm08iSV08Yhzeq53Td2fm6xbaxgxASJOQbUqqc773haitMh+0sTWrLg2fseXNthffItaHYNvzkq9bPuBweFwg= Received: from AM0PR04MB4689.eurprd04.prod.outlook.com (20.176.214.77) by AM0PR04MB5586.eurprd04.prod.outlook.com (20.178.202.88) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2644.24; Wed, 22 Jan 2020 10:32:34 +0000 Received: from AM0PR04MB4689.eurprd04.prod.outlook.com ([fe80::740a:62d9:67f2:34dd]) by AM0PR04MB4689.eurprd04.prod.outlook.com ([fe80::740a:62d9:67f2:34dd%7]) with mapi id 15.20.2644.027; Wed, 22 Jan 2020 10:32:34 +0000 Received: from lsv03194.swis.in-blr01.nxp.com (14.142.151.118) by SG2PR06CA0092.apcprd06.prod.outlook.com (2603:1096:3:14::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2644.19 via Frontend Transport; Wed, 22 Jan 2020 10:32:32 +0000 From: Priyanka Singh To: "u-boot@lists.denx.de" Subject: [PATCH 1/2] armv8: ls1088a: Updates secure boot headers offset Thread-Topic: [PATCH 1/2] armv8: ls1088a: Updates secure boot headers offset Thread-Index: AQHV0Q9CN/pOjwQSJEWbOW5bRb42Bg== Date: Wed, 22 Jan 2020 10:32:34 +0000 Message-ID: <20200122103205.31240-1-priyanka.singh@nxp.com> Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: SG2PR06CA0092.apcprd06.prod.outlook.com (2603:1096:3:14::18) To AM0PR04MB4689.eurprd04.prod.outlook.com (2603:10a6:208:bf::13) authentication-results: spf=none (sender IP is ) smtp.mailfrom=priyanka.singh@nxp.com; x-ms-exchange-messagesentrepresentingtype: 1 x-mailer: git-send-email 2.17.1 x-originating-ip: [14.142.151.118] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: b3cb7b99-c2b8-44d6-4e5c-08d79f266474 x-ms-traffictypediagnostic: AM0PR04MB5586:|AM0PR04MB5586: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:3173; x-forefront-prvs: 029097202E x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(39860400002)(376002)(346002)(366004)(136003)(396003)(199004)(189003)(16526019)(186003)(36756003)(54906003)(26005)(956004)(316002)(6486002)(55236004)(15650500001)(2616005)(1076003)(86362001)(52116002)(4326008)(7696005)(478600001)(6916009)(8936002)(44832011)(2906002)(5660300002)(81166006)(66446008)(81156014)(71200400001)(64756008)(8676002)(66946007)(1006002)(66556008)(66476007)(110426005); DIR:OUT; SFP:1101; SCL:1; SRVR:AM0PR04MB5586; H:AM0PR04MB4689.eurprd04.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; received-spf: None (protection.outlook.com: nxp.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 MIME-Version: 1.0 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: b3cb7b99-c2b8-44d6-4e5c-08d79f266474 X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jan 2020 10:32:34.0451 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: V58txC9kyiDgqh1ilnpsN/gG4HgiHI4NshGrpVthgIHbSXyRb7cn/DNvpXHMTFxVHqYwsou+MXN19+Gkv/eBTw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB5586 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.26 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Udit Agarwal , Ruchika Gupta , Arun Pathak Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.101.4 at phobos.denx.de X-Virus-Status: Clean Updates the secure boot headers offsets of Kernel and other firmware images for SD and QSPI boot sources used by esbc_validate command. Signed-off-by: Priyanka Singh --- include/configs/ls1088aqds.h | 6 ++-- include/configs/ls1088ardb.h | 60 ++++++++++++++++++------------------ 2 files changed, 33 insertions(+), 33 deletions(-) diff --git a/include/configs/ls1088aqds.h b/include/configs/ls1088aqds.h index 85e20617e6..f3a87df26a 100644 --- a/include/configs/ls1088aqds.h +++ b/include/configs/ls1088aqds.h @@ -1,6 +1,6 @@ /* SPDX-License-Identifier: GPL-2.0+ */ /* - * Copyright 2017 NXP + * Copyright 2017, 2020 NXP */ #ifndef __LS1088A_QDS_H @@ -421,9 +421,9 @@ unsigned long get_board_ddr_clk(void); "kernel_load=0xa0000000\0" \ "kernel_size=0x2800000\0" \ "mcinitcmd=sf probe 0:0;sf read 0xa0a00000 0xa00000 0x100000;" \ - "sf read 0xa0700000 0x700000 0x4000; esbc_validate 0xa0700000;" \ + "sf read 0xa0640000 0x640000 0x4000; esbc_validate 0xa0640000;" \ "sf read 0xa0e00000 0xe00000 0x100000;" \ - "sf read 0xa0740000 0x740000 0x4000;esbc_validate 0xa0740000;" \ + "sf read 0xa0680000 0x680000 0x4000;esbc_validate 0xa0680000;" \ "fsl_mc start mc 0xa0a00000 0xa0e00000\0" \ "mcmemsize=0x70000000 \0" #else /* if !(CONFIG_SECURE_BOOT) */ diff --git a/include/configs/ls1088ardb.h b/include/configs/ls1088ardb.h index 50de658d2e..a5cccbd250 100644 --- a/include/configs/ls1088ardb.h +++ b/include/configs/ls1088ardb.h @@ -1,6 +1,6 @@ /* SPDX-License-Identifier: GPL-2.0+ */ /* - * Copyright 2017 NXP + * Copyright 2017, 2020 NXP */ #ifndef __LS1088A_RDB_H @@ -309,19 +309,19 @@ "sf probe 0:0;sf read 0x80000000 0xA00000 0x100000;" \ "sf read 0x80100000 0xE00000 0x100000;" \ "env exists secureboot && " \ - "sf read 0x80700000 0x700000 0x40000 && " \ - "sf read 0x80740000 0x740000 0x40000 && " \ - "esbc_validate 0x80700000 && " \ - "esbc_validate 0x80740000 ;" \ + "sf read 0x80640000 0x640000 0x40000 && " \ + "sf read 0x80680000 0x680000 0x40000 && " \ + "esbc_validate 0x80640000 && " \ + "esbc_validate 0x80680000 ;" \ "fsl_mc start mc 0x80000000 0x80100000\0" #define SD_MC_INIT_CMD \ "mmcinfo;mmc read 0x80000000 0x5000 0x800;" \ "mmc read 0x80100000 0x7000 0x800;" \ "env exists secureboot && " \ - "mmc read 0x80700000 0x3800 0x20 && " \ - "mmc read 0x80740000 0x3A00 0x20 && " \ - "esbc_validate 0x80700000 && " \ - "esbc_validate 0x80740000 ;" \ + "mmc read 0x80640000 0x3200 0x20 && " \ + "mmc read 0x80680000 0x3400 0x20 && " \ + "esbc_validate 0x80640000 && " \ + "esbc_validate 0x80680000 ;" \ "fsl_mc start mc 0x80000000 0x80100000\0" #else #if defined(CONFIG_QSPI_BOOT) @@ -329,10 +329,10 @@ "mcinitcmd=sf probe 0:0;sf read 0x80000000 0xA00000 0x100000;" \ "sf read 0x80100000 0xE00000 0x100000;" \ "env exists secureboot && " \ - "sf read 0x80700000 0x700000 0x40000 && " \ - "sf read 0x80740000 0x740000 0x40000 && " \ - "esbc_validate 0x80700000 && " \ - "esbc_validate 0x80740000 ;" \ + "sf read 0x80640000 0x640000 0x40000 && " \ + "sf read 0x80680000 0x680000 0x40000 && " \ + "esbc_validate 0x80640000 && " \ + "esbc_validate 0x80680000 ;" \ "fsl_mc start mc 0x80000000 0x80100000\0" \ "mcmemsize=0x70000000\0" #elif defined(CONFIG_SD_BOOT) @@ -340,10 +340,10 @@ "mcinitcmd=mmcinfo;mmc read 0x80000000 0x5000 0x800;" \ "mmc read 0x80100000 0x7000 0x800;" \ "env exists secureboot && " \ - "mmc read 0x80700000 0x3800 0x20 && " \ - "mmc read 0x80740000 0x3A00 0x20 && " \ - "esbc_validate 0x80700000 && " \ - "esbc_validate 0x80740000 ;" \ + "mmc read 0x80640000 0x3200 0x20 && " \ + "mmc read 0x80680000 0x3400 0x20 && " \ + "esbc_validate 0x80640000 && " \ + "esbc_validate 0x80680000 ;" \ "fsl_mc start mc 0x80000000 0x80100000\0" \ "mcmemsize=0x70000000\0" #endif @@ -361,13 +361,13 @@ "fdt_addr=0x64f00000\0" \ "kernel_addr=0x1000000\0" \ "kernel_addr_sd=0x8000\0" \ - "kernelhdr_addr_sd=0x4000\0" \ + "kernelhdr_addr_sd=0x3000\0" \ "kernel_start=0x580100000\0" \ - "kernelheader_start=0x580800000\0" \ + "kernelheader_start=0x580600000\0" \ "scriptaddr=0x80000000\0" \ "scripthdraddr=0x80080000\0" \ "fdtheader_addr_r=0x80100000\0" \ - "kernelheader_addr=0x800000\0" \ + "kernelheader_addr=0x600000\0" \ "kernelheader_addr_r=0x80200000\0" \ "kernel_addr_r=0x81000000\0" \ "kernelheader_size=0x40000\0" \ @@ -430,13 +430,13 @@ "fdt_addr=0x64f00000\0" \ "kernel_addr=0x1000000\0" \ "kernel_addr_sd=0x8000\0" \ - "kernelhdr_addr_sd=0x4000\0" \ + "kernelhdr_addr_sd=0x3000\0" \ "kernel_start=0x580100000\0" \ "kernelheader_start=0x580800000\0" \ "scriptaddr=0x80000000\0" \ "scripthdraddr=0x80080000\0" \ "fdtheader_addr_r=0x80100000\0" \ - "kernelheader_addr=0x800000\0" \ + "kernelheader_addr=0x600000\0" \ "kernelheader_addr_r=0x80200000\0" \ "kernel_addr_r=0x81000000\0" \ "kernelheader_size=0x40000\0" \ @@ -493,8 +493,8 @@ #define QSPI_NOR_BOOTCOMMAND \ "sf read 0x80001000 0xd00000 0x100000;" \ "env exists mcinitcmd && env exists secureboot " \ - " && sf read 0x80780000 0x780000 0x100000 " \ - "&& esbc_validate 0x80780000;env exists mcinitcmd " \ + " && sf read 0x806C0000 0x6C0000 0x100000 " \ + "&& esbc_validate 0x806C0000;env exists mcinitcmd " \ "&& fsl_mc lazyapply dpl 0x80001000;" \ "run distro_bootcmd;run qspi_bootcmd;" \ "env exists secureboot && esbc_halt;" @@ -502,8 +502,8 @@ "env exists mcinitcmd && mmcinfo; " \ "mmc read 0x80001000 0x6800 0x800; " \ "env exists mcinitcmd && env exists secureboot " \ - " && mmc read 0x80780000 0x3C00 0x20 " \ - "&& esbc_validate 0x80780000;env exists mcinitcmd " \ + " && mmc read 0x806C0000 0x3600 0x20 " \ + "&& esbc_validate 0x806C0000;env exists mcinitcmd " \ "&& fsl_mc lazyapply dpl 0x80001000;" \ "run distro_bootcmd;run sd_bootcmd;" \ "env exists secureboot && esbc_halt;" @@ -513,8 +513,8 @@ #define CONFIG_BOOTCOMMAND \ "sf read 0x80001000 0xd00000 0x100000;" \ "env exists mcinitcmd && env exists secureboot " \ - " && sf read 0x80780000 0x780000 0x100000 " \ - "&& esbc_validate 0x80780000;env exists mcinitcmd " \ + " && sf read 0x806C0000 0x6C0000 0x100000 " \ + "&& esbc_validate 0x806C0000;env exists mcinitcmd " \ "&& fsl_mc lazyapply dpl 0x80001000;" \ "run distro_bootcmd;run qspi_bootcmd;" \ "env exists secureboot && esbc_halt;" @@ -525,8 +525,8 @@ "env exists mcinitcmd && mmcinfo; " \ "mmc read 0x80001000 0x6800 0x800; " \ "env exists mcinitcmd && env exists secureboot " \ - " && mmc read 0x80780000 0x3C00 0x20 " \ - "&& esbc_validate 0x80780000;env exists mcinitcmd " \ + " && mmc read 0x806C0000 0x3600 0x20 " \ + "&& esbc_validate 0x806C0000;env exists mcinitcmd " \ "&& fsl_mc lazyapply dpl 0x80001000;" \ "run distro_bootcmd;run sd_bootcmd;" \ "env exists secureboot && esbc_halt;" From patchwork Wed Jan 22 10:32:38 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Priyanka Singh X-Patchwork-Id: 1227163 X-Patchwork-Delegate: priyanka.jain@nxp.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=85.214.62.61; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: ozlabs.org; dmarc=pass (p=none dis=none) header.from=nxp.com Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=nxp.com header.i=@nxp.com header.a=rsa-sha256 header.s=selector2 header.b=p5htBRNU; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 482hYs6pzgz9sPn for ; Wed, 22 Jan 2020 21:32:49 +1100 (AEDT) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 8B2AF8194B; Wed, 22 Jan 2020 11:32:44 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=nxp.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; unprotected) header.d=nxp.com header.i=@nxp.com header.b="p5htBRNU"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id BF4418194B; Wed, 22 Jan 2020 11:32:42 +0100 (CET) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU, FORGED_SPF_HELO, SPF_HELO_PASS, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.2 Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2062e.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e1a::62e]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id C5B83818C8 for ; Wed, 22 Jan 2020 11:32:39 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=nxp.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=priyanka.singh@nxp.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cFrPwBhteoBdon7yB5iLew6P1JIpVcmDJfNTvQI7YC5LFO1H/oPLEn2xX8B5fmAC8Vi3LqAnBq96YzYlqSHYHpSpUsgBIDJJpS3S9zesSuqaZSX9g8ZWhz9nrVYUpYQWoHtAuZsM8r04D/o9UhNmHLjDZUhnMAM7mWDsu6rdKJKof/qGap+zifh7zxP0clV0j+Nr+uHLhlDkPDvrL14udjXD/1A9tjGmHhUzkeY+t7FnAc1dAfK+ZWqsW6DohmCXAAm59JG5S5wjmLihUmRjHGzytnt79Tqfmp1Z87aEbgMZXMjcujaLgRlSn+32iABAOrt0Wn9JrOh1G8up8ZA67g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Nm7OcgZkdFGfNPT81IYoSb5YMq7vFJ6erzyTgYI1GHs=; b=fM8LA8qiMS0+FBtIGgsXn+M3J2ooe8sUZD0qnguJCp/qIdiW3YZ96tDRoUcglkeCwUmY6FusqO6Jtkd+TRGh+J0jXe07f5Trs7A3NoStc8cyCXRGyk7gzpQCMoUsVraKXmgog5RT1YD41POZNaIoJOFV9DCJNZYILDkXrPfq9As/oOx8gQummhcxIHMo07FMnvGasg/1K5wsl3G5IS6LOB6xIUHj7hNyQWVs8SYbKPhwThpk3Oyz4jdYdRyYzAz0BGKnhGPpSS1yUFraxjE0y8Cp5DjzvS1wRGfWNq8gg2la+o8L2QIVs/Sq5BzJ9FyImV6g8DeYwdkt/k7zZ+RZhw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Nm7OcgZkdFGfNPT81IYoSb5YMq7vFJ6erzyTgYI1GHs=; b=p5htBRNUVptYBtZTlI+oUQmbwuyCZN8tGIHweUH4U5jitPHSLMalsxlXRdrrACrzREUmLrr3Syfn9hYl04CGiXordDQTqgINox0y3jGQs6SsJfLxHHp9uuux/jy6CHhiExw2Bzz5qBuTaxNip0SNLH8wA13JMsQGgSYt1ARyS48= Received: from AM0PR04MB4689.eurprd04.prod.outlook.com (20.176.214.77) by AM0PR04MB5586.eurprd04.prod.outlook.com (20.178.202.88) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2644.24; Wed, 22 Jan 2020 10:32:38 +0000 Received: from AM0PR04MB4689.eurprd04.prod.outlook.com ([fe80::740a:62d9:67f2:34dd]) by AM0PR04MB4689.eurprd04.prod.outlook.com ([fe80::740a:62d9:67f2:34dd%7]) with mapi id 15.20.2644.027; Wed, 22 Jan 2020 10:32:38 +0000 Received: from lsv03194.swis.in-blr01.nxp.com (14.142.151.118) by SG2PR06CA0092.apcprd06.prod.outlook.com (2603:1096:3:14::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2644.19 via Frontend Transport; Wed, 22 Jan 2020 10:32:36 +0000 From: Priyanka Singh To: "u-boot@lists.denx.de" Subject: [PATCH 2/2] armv8: ls2088a: Updates secure boot headers offset Thread-Topic: [PATCH 2/2] armv8: ls2088a: Updates secure boot headers offset Thread-Index: AQHV0Q9EZAOflV+VsE2HLkCmR/YOFg== Date: Wed, 22 Jan 2020 10:32:38 +0000 Message-ID: <20200122103205.31240-2-priyanka.singh@nxp.com> References: <20200122103205.31240-1-priyanka.singh@nxp.com> In-Reply-To: <20200122103205.31240-1-priyanka.singh@nxp.com> Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: SG2PR06CA0092.apcprd06.prod.outlook.com (2603:1096:3:14::18) To AM0PR04MB4689.eurprd04.prod.outlook.com (2603:10a6:208:bf::13) authentication-results: spf=none (sender IP is ) smtp.mailfrom=priyanka.singh@nxp.com; x-ms-exchange-messagesentrepresentingtype: 1 x-mailer: git-send-email 2.17.1 x-originating-ip: [14.142.151.118] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: a6332abe-00dd-4516-97d7-08d79f2666f1 x-ms-traffictypediagnostic: AM0PR04MB5586:|AM0PR04MB5586: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:4125; x-forefront-prvs: 029097202E x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(39860400002)(376002)(346002)(366004)(136003)(396003)(199004)(189003)(16526019)(186003)(36756003)(54906003)(26005)(956004)(316002)(6486002)(55236004)(15650500001)(2616005)(1076003)(86362001)(52116002)(4326008)(7696005)(478600001)(6916009)(8936002)(44832011)(2906002)(5660300002)(81166006)(66446008)(81156014)(71200400001)(64756008)(8676002)(66946007)(1006002)(66556008)(66476007)(110426005); DIR:OUT; SFP:1101; SCL:1; SRVR:AM0PR04MB5586; H:AM0PR04MB4689.eurprd04.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; received-spf: None (protection.outlook.com: nxp.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: DlTPGQM9Az2v3G0MAzzn7qZe8zVUQPzoLQQz2JRvXTelTqs284Z/US0OLC4nX5eduv4O7NoxOhuKfT5W25SQb0m1ZmSOIJ0QFXxSPztKmiC85Yixqtv+6akfvLVdl1aHbX+mj4UErOeO/Gg9N9MFYWoo7vOVQLKdMqDiBReBYYR9JfUHxKXrYPuTkFYkzKy0V7dU1D/MmopifT5u80mzEz/ky2YSemwpE4uqlIw29n02NYOFJ3KqyQZSi3e+P94JmYHQlkGPk29b2sJxOjK5I5Pt5lOL/NNcETgketa0CsZSSUHwqtGUdysODasiqwuNw5hIdZin9/EgeUL3DsEFNAxqCOFUjkWDs17KY+f2gpb++1i2hSH1nndKagTzTRvpY74dLPXCisscH6Jk9gPS2ppeWixgcolbk9ciyZPPRC5gKO1o0XnaPb03ygx1jfwOnfe9eSUAMgm8M/KHKw+CdsbcG5I9OpNoIksbYZXLfjUk2BBWqaZc7KQ6oazHQVJu MIME-Version: 1.0 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: a6332abe-00dd-4516-97d7-08d79f2666f1 X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jan 2020 10:32:38.2106 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: RnZttbtr2Hd99wlWfZ+p6BKZ4N0zY1dw7+gMy7y8tmQyzMnU8vAc8M+UU6GmvBqKTb5ZgZUmDGVpdg7x+Jic9Q== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB5586 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.26 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Udit Agarwal , Ruchika Gupta , Arun Pathak Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.101.4 at phobos.denx.de X-Virus-Status: Clean Updates the secure boot headers offsets of Kernel and other firmware images for SD and NOR boot sources used by esbc_validate command. Signed-off-by: Priyanka Singh --- include/configs/ls2080aqds.h | 12 ++++----- include/configs/ls2080ardb.h | 52 ++++++++++++++++++------------------ 2 files changed, 32 insertions(+), 32 deletions(-) diff --git a/include/configs/ls2080aqds.h b/include/configs/ls2080aqds.h index e2a897557d..f71bf95978 100644 --- a/include/configs/ls2080aqds.h +++ b/include/configs/ls2080aqds.h @@ -1,6 +1,6 @@ /* SPDX-License-Identifier: GPL-2.0+ */ /* - * Copyright 2017, 2019 NXP + * Copyright 2017, 2019-2020 NXP * Copyright 2015 Freescale Semiconductor */ @@ -365,8 +365,8 @@ unsigned long get_board_ddr_clk(void); "kernel_load=0xa0000000\0" \ "kernel_size=0x2800000\0" \ "mcmemsize=0x40000000\0" \ - "mcinitcmd=esbc_validate 0x580700000;" \ - "esbc_validate 0x580740000;" \ + "mcinitcmd=esbc_validate 0x580640000;" \ + "esbc_validate 0x580680000;" \ "fsl_mc start mc 0x580a00000" \ " 0x580e00000 \0" #else @@ -394,7 +394,7 @@ unsigned long get_board_ddr_clk(void); "kernel_size=0x2800000\0" \ "kernel_size_sd=0x14000\0" \ "load_addr=0xa0000000\0" \ - "kernelheader_addr=0x580800000\0" \ + "kernelheader_addr=0x580600000\0" \ "kernelheader_addr_r=0x80200000\0" \ "kernelheader_size=0x40000\0" \ "BOARD=ls2088aqds\0" \ @@ -447,7 +447,7 @@ unsigned long get_board_ddr_clk(void); #ifdef CONFIG_TFABOOT #define SD_BOOTCOMMAND \ "env exists mcinitcmd && env exists secureboot "\ - "&& mmcinfo && mmc read $load_addr 0x3c00 0x800 " \ + "&& mmcinfo && mmc read $load_addr 0x3600 0x800 " \ "&& esbc_validate $load_addr; " \ "env exists mcinitcmd && run mcinitcmd " \ "&& mmc read 0x80d00000 0x6800 0x800 " \ @@ -457,7 +457,7 @@ unsigned long get_board_ddr_clk(void); #define IFC_NOR_BOOTCOMMAND \ "env exists mcinitcmd && env exists secureboot "\ - "&& esbc_validate 0x580780000; env exists mcinitcmd "\ + "&& esbc_validate 0x5806C0000; env exists mcinitcmd "\ "&& fsl_mc lazyapply dpl 0x580d00000;" \ "run nor_bootcmd; " \ "env exists secureboot && esbc_halt;" diff --git a/include/configs/ls2080ardb.h b/include/configs/ls2080ardb.h index ee9b3484dd..6be1ac95c3 100644 --- a/include/configs/ls2080ardb.h +++ b/include/configs/ls2080ardb.h @@ -1,6 +1,6 @@ /* SPDX-License-Identifier: GPL-2.0+ */ /* - * Copyright 2017, 2019 NXP + * Copyright 2017, 2019-2020 NXP * Copyright 2015 Freescale Semiconductor */ @@ -340,46 +340,46 @@ unsigned long get_board_sys_clk(void); #ifdef CONFIG_TFABOOT #define QSPI_MC_INIT_CMD \ "env exists secureboot && " \ - "esbc_validate 0x20700000 && " \ - "esbc_validate 0x20740000;" \ + "esbc_validate 0x20640000 && " \ + "esbc_validate 0x20680000;" \ "fsl_mc start mc 0x20a00000 0x20e00000 \0" #define SD_MC_INIT_CMD \ "mmcinfo;mmc read 0x80a00000 0x5000 0x1200;" \ "mmc read 0x80e00000 0x7000 0x800;" \ "env exists secureboot && " \ - "mmc read 0x80700000 0x3800 0x20 && " \ - "mmc read 0x80740000 0x3A00 0x20 && " \ - "esbc_validate 0x80700000 && " \ - "esbc_validate 0x80740000 ;" \ + "mmc read 0x80640000 0x3200 0x20 && " \ + "mmc read 0x80680000 0x3400 0x20 && " \ + "esbc_validate 0x80640000 && " \ + "esbc_validate 0x80680000 ;" \ "fsl_mc start mc 0x80a00000 0x80e00000\0" #define IFC_MC_INIT_CMD \ "env exists secureboot && " \ - "esbc_validate 0x580700000 && " \ - "esbc_validate 0x580740000; " \ + "esbc_validate 0x580640000 && " \ + "esbc_validate 0x580680000; " \ "fsl_mc start mc 0x580a00000 0x580e00000 \0" #else #ifdef CONFIG_QSPI_BOOT #define MC_INIT_CMD \ "mcinitcmd=env exists secureboot && " \ - "esbc_validate 0x20700000 && " \ - "esbc_validate 0x20740000;" \ + "esbc_validate 0x20640000 && " \ + "esbc_validate 0x20680000;" \ "fsl_mc start mc 0x20a00000 0x20e00000 \0" #elif defined(CONFIG_SD_BOOT) #define MC_INIT_CMD \ "mcinitcmd=mmcinfo;mmc read 0x80000000 0x5000 0x800;" \ "mmc read 0x80100000 0x7000 0x800;" \ "env exists secureboot && " \ - "mmc read 0x80700000 0x3800 0x20 && " \ - "mmc read 0x80740000 0x3A00 0x20 && " \ - "esbc_validate 0x80700000 && " \ - "esbc_validate 0x80740000 ;" \ + "mmc read 0x80640000 0x3200 0x20 && " \ + "mmc read 0x80680000 0x3400 0x20 && " \ + "esbc_validate 0x80640000 && " \ + "esbc_validate 0x80680000 ;" \ "fsl_mc start mc 0x80000000 0x80100000\0" \ "mcmemsize=0x70000000\0" #else #define MC_INIT_CMD \ "mcinitcmd=env exists secureboot && " \ - "esbc_validate 0x580700000 && " \ - "esbc_validate 0x580740000; " \ + "esbc_validate 0x580640000 && " \ + "esbc_validate 0x580680000; " \ "fsl_mc start mc 0x580a00000 0x580e00000 \0" #endif #endif @@ -401,7 +401,7 @@ unsigned long get_board_sys_clk(void); "scripthdraddr=0x80080000\0" \ "fdtheader_addr_r=0x80100000\0" \ "kernelheader_addr_r=0x80200000\0" \ - "kernelheader_addr=0x580800000\0" \ + "kernelheader_addr=0x580600000\0" \ "kernel_addr_r=0x81000000\0" \ "kernelheader_size=0x40000\0" \ "fdt_addr_r=0x90000000\0" \ @@ -459,12 +459,12 @@ unsigned long get_board_sys_clk(void); "fdt_addr=0x64f00000\0" \ "kernel_addr=0x581000000\0" \ "kernel_start=0x1000000\0" \ - "kernelheader_start=0x800000\0" \ + "kernelheader_start=0x600000\0" \ "scriptaddr=0x80000000\0" \ "scripthdraddr=0x80080000\0" \ "fdtheader_addr_r=0x80100000\0" \ "kernelheader_addr_r=0x80200000\0" \ - "kernelheader_addr=0x580800000\0" \ + "kernelheader_addr=0x580600000\0" \ "kernel_addr_r=0x81000000\0" \ "kernelheader_size=0x40000\0" \ "fdt_addr_r=0x90000000\0" \ @@ -518,7 +518,7 @@ unsigned long get_board_sys_clk(void); #ifdef CONFIG_TFABOOT #define QSPI_NOR_BOOTCOMMAND \ "env exists mcinitcmd && env exists secureboot "\ - "&& esbc_validate 0x20780000; " \ + "&& esbc_validate 0x206C0000; " \ "env exists mcinitcmd && " \ "fsl_mc lazyapply dpl 0x20d00000; " \ "run distro_bootcmd;run qspi_bootcmd; " \ @@ -527,7 +527,7 @@ unsigned long get_board_sys_clk(void); /* Try to boot an on-SD kernel first, then do normal distro boot */ #define SD_BOOTCOMMAND \ "env exists mcinitcmd && env exists secureboot "\ - "&& mmcinfo && mmc read $load_addr 0x3c00 0x800 " \ + "&& mmcinfo && mmc read $load_addr 0x3600 0x800 " \ "&& esbc_validate $load_addr; " \ "env exists mcinitcmd && run mcinitcmd " \ "&& mmc read 0x80d00000 0x6800 0x800 " \ @@ -538,7 +538,7 @@ unsigned long get_board_sys_clk(void); /* Try to boot an on-NOR kernel first, then do normal distro boot */ #define IFC_NOR_BOOTCOMMAND \ "env exists mcinitcmd && env exists secureboot "\ - "&& esbc_validate 0x580780000; env exists mcinitcmd "\ + "&& esbc_validate 0x5806C0000; env exists mcinitcmd "\ "&& fsl_mc lazyapply dpl 0x580d00000;" \ "run distro_bootcmd;run nor_bootcmd; " \ "env exists secureboot && esbc_halt;" @@ -548,7 +548,7 @@ unsigned long get_board_sys_clk(void); /* Try to boot an on-QSPI kernel first, then do normal distro boot */ #define CONFIG_BOOTCOMMAND \ "env exists mcinitcmd && env exists secureboot "\ - "&& esbc_validate 0x20780000; " \ + "&& esbc_validate 0x206C0000; " \ "env exists mcinitcmd && " \ "fsl_mc lazyapply dpl 0x20d00000; " \ "run distro_bootcmd;run qspi_bootcmd; " \ @@ -557,7 +557,7 @@ unsigned long get_board_sys_clk(void); /* Try to boot an on-SD kernel first, then do normal distro boot */ #define CONFIG_BOOTCOMMAND \ "env exists mcinitcmd && env exists secureboot "\ - "&& mmcinfo && mmc read $load_addr 0x3c00 0x800 " \ + "&& mmcinfo && mmc read $load_addr 0x3600 0x800 " \ "&& esbc_validate $load_addr; " \ "env exists mcinitcmd && run mcinitcmd " \ "&& mmc read 0x88000000 0x6800 0x800 " \ @@ -568,7 +568,7 @@ unsigned long get_board_sys_clk(void); /* Try to boot an on-NOR kernel first, then do normal distro boot */ #define CONFIG_BOOTCOMMAND \ "env exists mcinitcmd && env exists secureboot "\ - "&& esbc_validate 0x580780000; env exists mcinitcmd "\ + "&& esbc_validate 0x5806C0000; env exists mcinitcmd "\ "&& fsl_mc lazyapply dpl 0x580d00000;" \ "run distro_bootcmd;run nor_bootcmd; " \ "env exists secureboot && esbc_halt;"