From patchwork Mon May 31 10:14:44 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michal Simek X-Patchwork-Id: 1485621 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=monstr-eu.20150623.gappssmtp.com header.i=@monstr-eu.20150623.gappssmtp.com header.a=rsa-sha256 header.s=20150623 header.b=jOkI7TEs; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4Ftrl15Bk4z9sVb for ; Mon, 31 May 2021 20:15:07 +1000 (AEST) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 26A1680F0E; Mon, 31 May 2021 12:14:55 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=fail (p=none dis=none) header.from=xilinx.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=monstr-eu.20150623.gappssmtp.com header.i=@monstr-eu.20150623.gappssmtp.com header.b="jOkI7TEs"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id D6D4A82CFE; Mon, 31 May 2021 12:14:52 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,SPF_HELO_NONE autolearn=ham autolearn_force=no version=3.4.2 Received: from mail-ej1-x62e.google.com (mail-ej1-x62e.google.com [IPv6:2a00:1450:4864:20::62e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 5EB9C8066C for ; Mon, 31 May 2021 12:14:49 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=fail (p=none dis=none) header.from=xilinx.com Authentication-Results: phobos.denx.de; spf=none smtp.mailfrom=monstr@monstr.eu Received: by mail-ej1-x62e.google.com with SMTP id lz27so15854421ejb.11 for ; Mon, 31 May 2021 03:14:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=monstr-eu.20150623.gappssmtp.com; s=20150623; h=sender:from:to:subject:date:message-id:mime-version :content-transfer-encoding; bh=K/KlW2a7fUGMsB1C2g2xcOO2B2ikScfbNHe0BmL8Vn0=; b=jOkI7TEs4RPkTBy0ZD7mL0RNm3ShZTQN6ekoxVgmvD2Ffl7Vzpvff1Ww+ivQdL6xlx Oe/SOpXy51yMqfo0X8u2NBcShcyihFlh2ir22DCa/HXk8Gkh54Q5l7qCNvj3IqMs2OY3 7nl1HZIXRvwJFEhhVq0EjGgseL8Kvm0589w7kYw1qkTiCZTGeRqVZ3jXi4om28Mu+oR9 H6r753uQB7WsuzApKlIUrvMS+HfFa27C9fDshhPpoctriFBqGdN3ulCxy0TZ1vJuZ63V JdRShmIt6gthtTC1wEHF4MaH7gs7LwVPIMTgDTjCZLcgDWWXTg8pUTEdgqwTD7FnVLr0 yCDA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:subject:date:message-id :mime-version:content-transfer-encoding; bh=K/KlW2a7fUGMsB1C2g2xcOO2B2ikScfbNHe0BmL8Vn0=; b=SmMytS8X7keTEM+6eZG/3LlW03W4zA1JdDcxlaXWi2iGOt8FMfxs9OvzPeHa2OET+P S+EDA2gAYu4KM0lkiFFAK2rctnOYrLqNjM8Ghg46fz7XpJjUXAGjLhXNSc0YTgPsSrJa woS5s6IVLQ92w7urd1Wk8bTnSNyBG511SR0PF3EYlB8ba42tADQIwpbr2tlMqPuL/qAd fu5qkxu+gMLrMWiK4DiDPcCG8dDX7naVXiM6UkCcPim5LSfvPCycYoFIWtoMVApQq92J tAzPUJYizMAyb4FCIO0ipOW0e+mobdkDV9krv7ZEczhEhGkt/C4M4Hzs28fBFM9dE46F /Qqw== X-Gm-Message-State: AOAM531p2nzOoebGc0qLY5FDB5ohEYmBXseKcoT5aY+azXFkKpHfgiAY I2Vck/4a3I4N0z/KfIxOxkGFsi+lntL7xrPA X-Google-Smtp-Source: ABdhPJza8n1J2dBe96OES9TESBFAvtQOp9bXnLj+yo/8ygPXjMT6/75MujtZUCWV9FdhkaKWq6YF+g== X-Received: by 2002:a17:906:8041:: with SMTP id x1mr435520ejw.81.1622456088837; Mon, 31 May 2021 03:14:48 -0700 (PDT) Received: from localhost ([2a02:768:2307:40d6::e05]) by smtp.gmail.com with ESMTPSA id r17sm6643519edt.33.2021.05.31.03.14.48 (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Mon, 31 May 2021 03:14:48 -0700 (PDT) From: Michal Simek To: u-boot@lists.denx.de, git@xilinx.com, Ricardo Salveti Subject: [PATCH 0/3] zynqmp: Add support for secure OS loading Date: Mon, 31 May 2021 12:14:44 +0200 Message-Id: X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.102.4 at phobos.denx.de X-Virus-Status: Clean Hi, this series is adding support for working with TEE in much easier and flexible way. TF-A can be placed to any location. When it is placed to DDR you should enable DT support which reserve location where TF-A is https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/10131 The similar DT support can be added to secure OS but I haven't sent that patches out in OPTEE case yet. Thanks, Michal Michal Simek (3): zynqmp: Do not place u-boot to reserved memory location zynqmp: Generate u-boot.its also with TEE dynamically zynqmp: Pass bl32 entry to TF-A via xilinx handoff structure arch/arm/mach-zynqmp/handoff.c | 19 +++++++++--- arch/arm/mach-zynqmp/mkimage_fit_atf.sh | 41 ++++++++++++++++++++++++- board/xilinx/zynqmp/zynqmp.c | 21 +++++++++++++ 3 files changed, 75 insertions(+), 6 deletions(-)