From patchwork Tue Apr 4 22:42:58 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ruchika Gupta X-Patchwork-Id: 746899 X-Patchwork-Delegate: yorksun@freescale.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from lists.denx.de (dione.denx.de [81.169.180.215]) by ozlabs.org (Postfix) with ESMTP id 3vyGRh71P8z9s9c for ; Wed, 5 Apr 2017 03:38:56 +1000 (AEST) Received: by lists.denx.de (Postfix, from userid 105) id ACE0BC21CCA; Tue, 4 Apr 2017 17:38:20 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de X-Spam-Level: ** X-Spam-Status: No, score=2.4 required=5.0 tests=BAD_ENC_HEADER, DATE_IN_FUTURE_03_06, RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL, SPF_HELO_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from lists.denx.de (localhost [IPv6:::1]) by lists.denx.de (Postfix) with ESMTP id 33BCAC21CCA; Tue, 4 Apr 2017 17:38:05 +0000 (UTC) Received: by lists.denx.de (Postfix, from userid 105) id 95763C21C83; Tue, 4 Apr 2017 17:38:01 +0000 (UTC) Received: from NAM03-DM3-obe.outbound.protection.outlook.com (mail-dm3nam03on0064.outbound.protection.outlook.com [104.47.41.64]) by lists.denx.de (Postfix) with ESMTPS id 9E495C21C2E for ; Tue, 4 Apr 2017 17:37:55 +0000 (UTC) Received: from BY2PR03CA042.namprd03.prod.outlook.com (10.141.249.15) by BL2PR03MB274.namprd03.prod.outlook.com (10.255.231.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1005.10; Tue, 4 Apr 2017 17:37:52 +0000 Received: from BL2FFO11FD031.protection.gbl (2a01:111:f400:7c09::172) by BY2PR03CA042.outlook.office365.com (2a01:111:e400:2c5d::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1005.10 via Frontend Transport; Tue, 4 Apr 2017 17:37:52 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BL2FFO11FD031.mail.protection.outlook.com (10.173.160.71) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1005.5 via Frontend Transport; Tue, 4 Apr 2017 17:37:52 +0000 Received: from perf-idc04.ap.freescale.net (perf-idc04.ap.freescale.net [10.232.14.49]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id v34HbiEU029879; Tue, 4 Apr 2017 10:37:50 -0700 From: Ruchika Gupta To: , Date: Wed, 5 Apr 2017 04:12:58 +0530 Message-ID: <1491345778-6890-2-git-send-email-ruchika.gupta@nxp.com> X-Mailer: git-send-email 1.8.1.4 In-Reply-To: <1491345778-6890-1-git-send-email-ruchika.gupta@nxp.com> References: <1491345778-6890-1-git-send-email-ruchika.gupta@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131358010722895880; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39450400003)(39840400002)(39380400002)(39850400002)(39860400002)(39400400002)(39410400002)(2980300002)(1109001)(1110001)(339900001)(189002)(199003)(9170700003)(47776003)(6636002)(2950100002)(38730400002)(356003)(4720700003)(105606002)(76176999)(4326008)(50986999)(5660300001)(305945005)(104016004)(77096006)(8656002)(85426001)(50466002)(53936002)(36756003)(2906002)(50226002)(106466001)(6306002)(5003940100001)(48376002)(54906002)(8936002)(86362001)(8676002)(81166006)(33646002)(189998001); DIR:OUT; SFP:1101; SCL:1; SRVR:BL2PR03MB274; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; MLV:ovrnspm; MX:1; A:1; PTR:InfoDomainNonexistent; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BL2FFO11FD031; 1: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 MIME-Version: 1.0 X-MS-Office365-Filtering-Correlation-Id: 91c7bfd3-4994-421a-4808-08d47b815201 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(201703131430075)(201703131517081); SRVR:BL2PR03MB274; X-Microsoft-Exchange-Diagnostics: 1; BL2PR03MB274; 3:Qb7YxNupZLRj6M5RVCUp8ZQZlBT2LctHnfIBO3QWpGlDX+evkBphSlYW/ToqTqNETagFVaa1hayTagBk97yV8+B7qN2lDpPxFkHNMuKQgVg7y2SV1FWaeFL6vk+ENOFgQtqDA7Km8ts29JDJ98khs8rtfJkXIi7ztXIhYE41E3ArWmLOx+hlz4vMyeQfKJP1D4xbVGDNmLnA3ZkAzFLFkvmbQC9+mFCKzrLeECMNKzgslPOrqeLgL7+l+M7e+fnLzuUuQ4Toeq8HpWai2C7ERWsn0mEkX+jvDHmyI4oHI5y7JkGo2pC6BViU6k6iJ/AM0xeA7RRDte2Eg2Ib9kRsbgCush5p6kZRDC09/BJts9y85wiqdsrsiaWkRQbqXB61gj9Nn1jkVKWymudq31Fc9NW0BqMAoNPWlLmkszFiqbUPKSdcR0nTVWrq2Yd4ff0c; 25:YCs4gg5CsETf+eoTFr5koPt3G4Ik2BKp3AetgwdcL89fPNJm4EBx/V0xNlhgu6XospEcUj4d4YBciqBrFbrdNbWc25EPWWKTlbbDyrqXjx+oc8Mns3TWRAG2oYSfDzvuq6NLwz5rIQZVzH+Esoz2U3IzBmBrLH4/wkrsxETW/EkkRi5OTniYO1SrGV9XzttmL8f6RTpwK87f7eLkVSyutNvi8vK5PpEpVrt0QrlwjMIATK3aslS+QwFL9schrC2ZNZdcYPYVP4QN45MJHgOIJop0f9zt3x/qt6chqqc8dbQ7FnyrF6558wEIrs0MBH/eD7m8Bnc618N6OBzYBy7D6/VGjPxlWyj17guuf38YEqJuuqcsa4Y5AlJNAyQqHswfpUmUbWPhLsDWIU6HwrqCUJEIT6kBNvANbn1iACW92rDTRJjouLKKAaJsd0+MtttnAZc19kbwU2iUDSI77aKXEA== X-Microsoft-Exchange-Diagnostics: 1; BL2PR03MB274; 31:fJ+VTjrQxSq4tkXmvVeMVaT7XO+yaByzfNg8w5GnAq+V+A96znWxM+abWmi/brA3wih8txxqH4SpOXGVGaR77sEoVr6Y2JjmG1ZQ3Ke6oeL2rBjzkWNrN82eztCBdfAS7T3dcse8i32QUeGi3QHjwqHmMymyakUrPU25PiBvenSe2DydASU1WZPESNivjAvj8Yl+rnNXUAacPoC06IgsP0d4asI3TmTR8FfjivLKzXuzMk6Meni9Dgp4SB7zzvS8TQfuVs/Y9Nrasq0ce0uC4g== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6095135)(601004)(2401047)(13015025)(13024025)(13023025)(13018025)(13017025)(8121501046)(5005006)(3002001)(10201501046)(93006095)(93001095)(6055026)(6096035)(20161123565025)(20161123561025)(20161123556025)(20161123563025)(201703131430075)(201703131441075)(201703131448075)(201703131433075)(201703161259075); SRVR:BL2PR03MB274; BCL:0; PCL:0; RULEID:(400006); SRVR:BL2PR03MB274; X-Microsoft-Exchange-Diagnostics: 1; BL2PR03MB274; 4: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 X-Forefront-PRVS: 0267E514F9 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BL2PR03MB274; 23:HmO5OJycPjKh1fIq2Zxi9u7JVd4fuyxEbR/bt1kk1v?= =?us-ascii?Q?lkK2RSg83Xns9RJV3t4Z9LihLSg/iwzHyM60TDpjV90+DAs9Mh1npcjbhIAj?= =?us-ascii?Q?RKSNnfGr/TcXtMBajaTFcN5Det+WUdK1BHP8Kki+LkPiCruRES5pIGURadhR?= =?us-ascii?Q?1kUd1p9R6j7r1sAMLrTkIw5KbNsAWfx8ENAiCij8ovMyvnsrNCquNMBRB/0d?= =?us-ascii?Q?/HIBGGe0lC6Szwe8d1hGeKRHmNUH7Kx3O/GeoxAiskzrn2Pc4vmQbT+kAxzt?= =?us-ascii?Q?bX7g5gQy/pLXO2iMQ/B4P5KqylTom/KbxGNIFzB3XcLK6SCGNLFsqhDV0Up7?= =?us-ascii?Q?R5gDl2yKPMCsteLLE9E+uh4Gtn9XCO9Qr6YElAwFtW3z5TxsWXqE0sg4/PuR?= =?us-ascii?Q?D0RbPTY+kwwD/EeglPH45XOVHmZx0IWj1Mbn3yEH8PlMZZFoAi4l7zAjpuuP?= =?us-ascii?Q?0KNOQtCF7lNXqwaz6eeM31kyc3hg496X3iPMYhEydAQtAHglVmm5SzELKtxZ?= =?us-ascii?Q?o1IlzgNEslJ24ANZLwALL3aIKqFeKOFU8kG3D2aEi4Tupph3BCotX6sWnT5Y?= =?us-ascii?Q?jNo8qWBzIxWMI23tUudPn/v183NpPdDr55IWjXCS0mlR8fMDxUEk4mD2//13?= =?us-ascii?Q?BE625bFsAKwWFwPYYHNDLfFrFurvqRzwFzJkEOaQlChXBEy7Aavy9vp2xvwe?= =?us-ascii?Q?xsP9AAxMjRLPWSyj2mmK8efF+JjQmQCb5CBHOi6m/kLRFk0E6xMzHv8ywXge?= =?us-ascii?Q?oNoQneu9YaIM5x1CqCYNQTa2bGIalkkRiMgVPZQys5IBgzbtjMPNdIyCRfiO?= =?us-ascii?Q?ZIN80pz9/OAQNOt6Qn35hW2Vhxlil5Z+dHIe5XYnptH1Q/9DKFs7oBMUwmdM?= =?us-ascii?Q?s6jcxmmV31QJmqOovqLlVc5YyfwQ7tl1wPm+T21iql9Hueasky2gdXmi5RCz?= =?us-ascii?Q?7IGCB2oaawLii0X7bFPljtDTqeesnjv0BrDeH5hqiEOnE24uuFjLCELEiW3k?= =?us-ascii?Q?pKA3aJlYsQx4HEm6iKC7fev9qkfkvDMbwxYZqxF5WLCKEOOKpRnzj+T+jwyp?= =?us-ascii?Q?LDhyJZ92SMFNzxY/ZsKE02ht5OBcWsgzAWMaWlPL36lDBg3TPW3FKaRL/+3R?= =?us-ascii?Q?KRj0R7j1bFM8VpfnQ6R8wgi2CdulRI+UGXGZUIO9hhDa+IMTHwTdppSXBo2i?= =?us-ascii?Q?fi/Ha5kI+haWp9OCbIOzYBEKhm35mFMUQS?= X-Microsoft-Exchange-Diagnostics: 1; BL2PR03MB274; 6:+yAYzej1O5+kNPrHIhxO7EQFFEkyCyrlpv/MB+zaQH6ybbDxGOsinbk4+yry5gL2UKOdsNhkLFGDWl/m6WCROHGDbBz7Wa9vtQsVfr2A3HbWf+Tx+XFfujvCnhhREqcfHoKlY80OrBZsPtnBaoFP01LAgCar9CTJzxWG9xBF1GtsvY77h150Kaz3H2g7/FrIFnroFNnTB6wlX6hTGesTcOyG5m1pjJXx569dcOlrQHAtxZPRdhwSdMnBj6u74As5x1CPM6apupRXVjjZ64xjhAvIQt0rckFM8XP8aOFlU3l0AJ3Jnu1Bikwpr0N1yNnhu+lKqU71dxJejPq244xKRx2CC6TSCgKQWPjTEnF6soOH1ct0GKIXvMMogRl/nwE73PNy7UCdRiff3EztnEpgfg==; 5:MQ15ZEhJMgMh+V2DkvtUM69YqdjwTJsI6K17ODMzm2LsgFeAwemMtXefNgapB03r4wVlLBYH8BjbzXPDUEsTzT+glImkrGcR9NUIaZf4oZfI9wLevIfMF0OgmaTM/g0tH4zp6BlC269vFh6jxqaUoHvxFfSQiqj6X6kUQrMoVX0E39l6V9U44BNcuaZfg/U/; 24:Z9D2GfAoQrsVx1hVja1ew+GXItRuuqD1cn2E21bPMwcfGdio10XIXeSgEKS3wyjB7bCOJIjcejCFSL1QTooL/lyEuGwB5SlPRKPtzXZTR+E= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BL2PR03MB274; 7:AcEmFmVukr61UJECN+k1UFt5a41HXzU2dEbabW+lxW4LSk5nOZ4OTQhoEikGxh/SaAuMxi0kEZYQBPvWQbxhh/pITbsGGpplaXVgajZsHooKIJ7In62CmZmYEfzORhB8jCGc46r1fd8N4XGWbrSbkXw9RD81sCJsklMKv0VEK7hFBGBbSusOGqEhhwpwV8op0FTpwcCZGdLUL8xUvoZ1SYJvR3POx+rKGHj1PIoBa3POihCthZ43s5KuSQTqMN6KZ5Zb+Z4fzW8aJWebFSM9YslIxI7mKlchbQAFJ8XdapjClGntr0ScVjRHWJyadipAwL4qShDojFMF6IJFAvDGjA== X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Apr 2017 17:37:52.1023 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL2PR03MB274 Cc: Ruchika Gupta , Vinitha Pillai Subject: [U-Boot] [PATCH 3/3][v4] arm: ls1046ardb: Add SD secure boot target X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.18 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" - Add SD secure boot target for ls1046ardb. - Change the u-boot size defined by a macro for copying the main U-Boot by SPL to also include the u-boot Secure Boot header size as header is appended to u-boot image. So header will also be copied from SD to DDR. - CONFIG_MAX_SPL_SIZE is limited to 90K.SPL is copied to OCRAM (128K) where 32K are reserved for use by boot ROM and 6K for the header - Reduce the size of CAAM driver for SPL Blobification functions and descriptors, that are not required at the time of SPL are disabled. Further error code conversion to strings is disabled for SPL build. Signed-off-by: Vinitha Pillai Signed-off-by: Sumit Garg Signed-off-by: Ruchika Gupta --- Changes in v4: Removed spl_board_init from board specific file. Changes in v3: Resend Changes in v2: - Rebased patches to latest dependent patch set - With the dependent path set , spl imag size increased to 94K. So - additionally reduce the spl image size by removing the functions from - CAAM driver that are not required in SPL flow Dependent patch set: SECURE boot target addition for NOR on LS1043, LS1046 https://patchwork.ozlabs.org/patch/742548/ https://patchwork.ozlabs.org/patch/742552/ https://patchwork.ozlabs.org/patch/742549/ https://patchwork.ozlabs.org/patch/742551/ https://patchwork.ozlabs.org/patch/742550/ https://patchwork.ozlabs.org/patch/742553/ https://patchwork.ozlabs.org/patch/742554/ and SPL size reduction patches https://patchwork.ozlabs.org/patch/744755/ https://patchwork.ozlabs.org/patch/744756/ arch/arm/include/asm/fsl_secure_boot.h | 2 +- configs/ls1046ardb_sdcard_SECURE_BOOT_defconfig | 45 +++++++++++++++++++++++++ drivers/crypto/fsl/jobdesc.c | 4 +-- drivers/crypto/fsl/jr.c | 19 ++++++----- include/configs/ls1046a_common.h | 17 ++++++++-- 5 files changed, 72 insertions(+), 15 deletions(-) create mode 100644 configs/ls1046ardb_sdcard_SECURE_BOOT_defconfig diff --git a/arch/arm/include/asm/fsl_secure_boot.h b/arch/arm/include/asm/fsl_secure_boot.h index 9ca7abe..97eab64 100644 --- a/arch/arm/include/asm/fsl_secure_boot.h +++ b/arch/arm/include/asm/fsl_secure_boot.h @@ -88,7 +88,7 @@ /* For SD boot address and size are assigned in terms of sector * offset and no. of sectors respectively. */ -#if defined(CONFIG_LS1043A) +#if defined(CONFIG_LS1043A) || defined(CONFIG_ARCH_LS1046A) #define CONFIG_BS_HDR_ADDR_DEVICE 0x00000920 #else #define CONFIG_BS_HDR_ADDR_DEVICE 0x00000900 diff --git a/configs/ls1046ardb_sdcard_SECURE_BOOT_defconfig b/configs/ls1046ardb_sdcard_SECURE_BOOT_defconfig new file mode 100644 index 0000000..a41ec80 --- /dev/null +++ b/configs/ls1046ardb_sdcard_SECURE_BOOT_defconfig @@ -0,0 +1,45 @@ +CONFIG_ARM=y +CONFIG_TARGET_LS1046ARDB=y +CONFIG_DEFAULT_DEVICE_TREE="fsl-ls1046a-rdb" +CONFIG_FIT=y +CONFIG_FIT_VERBOSE=y +CONFIG_OF_BOARD_SETUP=y +CONFIG_SYS_EXTRA_OPTIONS="RAMBOOT_PBL,SPL_FSL_PBL" +CONFIG_SECURE_BOOT=y +CONFIG_SD_BOOT=y +CONFIG_BOOTDELAY=10 +CONFIG_SPL=y +CONFIG_SYS_MMCSD_RAW_MODE_U_BOOT_USE_SECTOR=y +CONFIG_SYS_MMCSD_RAW_MODE_U_BOOT_SECTOR=0x110 +CONFIG_HUSH_PARSER=y +# CONFIG_CMD_IMLS is not set +CONFIG_CMD_GPT=y +CONFIG_CMD_MMC=y +CONFIG_CMD_SF=y +CONFIG_CMD_I2C=y +CONFIG_CMD_DHCP=y +CONFIG_CMD_MII=y +CONFIG_CMD_PING=y +CONFIG_CMD_CACHE=y +CONFIG_CMD_EXT2=y +CONFIG_CMD_FAT=y +# CONFIG_SPL_EFI_PARTITION is not set +CONFIG_OF_CONTROL=y +CONFIG_DM=y +CONFIG_SPL_DM=y +CONFIG_SPI_FLASH=y +CONFIG_NETDEVICES=y +CONFIG_E1000=y +CONFIG_PCI=y +CONFIG_DM_PCI=y +CONFIG_DM_PCI_COMPAT=y +CONFIG_PCIE_LAYERSCAPE=y +CONFIG_SYS_NS16550=y +CONFIG_DM_SPI=y +CONFIG_FSL_QSPI=y +CONFIG_USB=y +CONFIG_DM_USB=y +CONFIG_RSA=y +CONFIG_SPL_RSA=y +CONFIG_SPL_CRYPTO_SUPPORT=y +CONFIG_SPL_HASH_SUPPORT=y diff --git a/drivers/crypto/fsl/jobdesc.c b/drivers/crypto/fsl/jobdesc.c index 6125bbb..375ff9d 100644 --- a/drivers/crypto/fsl/jobdesc.c +++ b/drivers/crypto/fsl/jobdesc.c @@ -204,7 +204,7 @@ void inline_cnstr_jobdesc_hash(uint32_t *desc, append_store(desc, dma_addr_out, storelen, LDST_CLASS_2_CCB | LDST_SRCDST_BYTE_CONTEXT); } - +#ifndef CONFIG_SPL_BUILD void inline_cnstr_jobdesc_blob_encap(uint32_t *desc, uint8_t *key_idnfr, uint8_t *plain_txt, uint8_t *enc_blob, uint32_t in_sz) @@ -252,7 +252,7 @@ void inline_cnstr_jobdesc_blob_decap(uint32_t *desc, uint8_t *key_idnfr, append_operation(desc, OP_TYPE_DECAP_PROTOCOL | OP_PCLID_BLOB); } - +#endif /* * Descriptor to instantiate RNG State Handle 0 in normal mode and * load the JDKEK, TDKEK and TDSK registers diff --git a/drivers/crypto/fsl/jr.c b/drivers/crypto/fsl/jr.c index 1b88229..163e729 100644 --- a/drivers/crypto/fsl/jr.c +++ b/drivers/crypto/fsl/jr.c @@ -342,7 +342,9 @@ static void desc_done(uint32_t status, void *arg) { struct result *x = arg; x->status = status; +#ifndef CONFIG_SPL_BUILD caam_jr_strstatus(status); +#endif x->done = 1; } @@ -436,7 +438,11 @@ static inline int sec_reset_idx(uint8_t sec_idx) return 0; } - +int sec_reset(void) +{ + return sec_reset_idx(0); +} +#ifndef CONFIG_SPL_BUILD static int instantiate_rng(uint8_t sec_idx) { struct result op; @@ -472,11 +478,6 @@ static int instantiate_rng(uint8_t sec_idx) return ret; } -int sec_reset(void) -{ - return sec_reset_idx(0); -} - static u8 get_rng_vid(uint8_t sec_idx) { ccsr_sec_t *sec = (void *)SEC_ADDR(sec_idx); @@ -561,7 +562,7 @@ static int rng_init(uint8_t sec_idx) return ret; } - +#endif int sec_init_idx(uint8_t sec_idx) { ccsr_sec_t *sec = (void *)SEC_ADDR(sec_idx); @@ -634,7 +635,7 @@ int sec_init_idx(uint8_t sec_idx) pamu_enable(); #endif - +#ifndef CONFIG_SPL_BUILD if (get_rng_vid(sec_idx) >= 4) { if (rng_init(sec_idx) < 0) { printf("SEC%u: RNG instantiation failed\n", sec_idx); @@ -642,7 +643,7 @@ int sec_init_idx(uint8_t sec_idx) } printf("SEC%u: RNG instantiated\n", sec_idx); } - +#endif return ret; } diff --git a/include/configs/ls1046a_common.h b/include/configs/ls1046a_common.h index b77edda..180cf92 100644 --- a/include/configs/ls1046a_common.h +++ b/include/configs/ls1046a_common.h @@ -24,7 +24,6 @@ #define CONFIG_GICV2 #include - /* Link Definitions */ #define CONFIG_SYS_INIT_SP_ADDR (CONFIG_SYS_FSL_OCRAM_BASE + 0xfff0) @@ -78,7 +77,19 @@ #define CONFIG_SYS_SPL_MALLOC_START (CONFIG_SPL_BSS_START_ADDR + \ CONFIG_SPL_BSS_MAX_SIZE) #define CONFIG_SYS_SPL_MALLOC_SIZE 0x100000 -#define CONFIG_SYS_MONITOR_LEN 0xa0000 + +#ifdef CONFIG_SECURE_BOOT +#define CONFIG_U_BOOT_HDR_SIZE (16 << 10) +/* + * HDR would be appended at end of image and copied to DDR along + * with U-Boot image. Here u-boot max. size is 512K. So if binary + * size increases then increase this size in case of secure boot as + * it uses raw u-boot image instead of fit image. + */ +#define CONFIG_SYS_MONITOR_LEN (0x100000 + CONFIG_U_BOOT_HDR_SIZE) +#else +#define CONFIG_SYS_MONITOR_LEN 0x100000 +#endif /* ifdef CONFIG_SECURE_BOOT */ #endif /* NAND SPL */ @@ -98,7 +109,7 @@ #define CONFIG_SPL_NAND_SUPPORT #define CONFIG_SPL_DRIVERS_MISC_SUPPORT #define CONFIG_SPL_TEXT_BASE 0x10000000 -#define CONFIG_SPL_MAX_SIZE 0x1d000 /* 116 KiB */ +#define CONFIG_SPL_MAX_SIZE 0x17000 /* 90 KiB */ #define CONFIG_SPL_STACK 0x1001f000 #define CONFIG_SYS_NAND_U_BOOT_DST CONFIG_SYS_TEXT_BASE #define CONFIG_SYS_NAND_U_BOOT_START CONFIG_SYS_TEXT_BASE