From patchwork Tue Aug 29 07:01:47 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sumit Garg X-Patchwork-Id: 806984 X-Patchwork-Delegate: yorksun@freescale.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.denx.de (client-ip=81.169.180.215; helo=lists.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Received: from lists.denx.de (dione.denx.de [81.169.180.215]) by ozlabs.org (Postfix) with ESMTP id 3xhKl42xQRz9t38 for ; Tue, 29 Aug 2017 17:19:28 +1000 (AEST) Received: by lists.denx.de (Postfix, from userid 105) id CDA9BC21E29; Tue, 29 Aug 2017 07:07:02 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de X-Spam-Level: X-Spam-Status: No, score=-0.0 required=5.0 tests=BAD_ENC_HEADER, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL, SPF_HELO_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from lists.denx.de (localhost [IPv6:::1]) by lists.denx.de (Postfix) with ESMTP id C6A6AC21E2B; Tue, 29 Aug 2017 07:06:56 +0000 (UTC) Received: by lists.denx.de (Postfix, from userid 105) id 6EDB2C21E36; Tue, 29 Aug 2017 07:02:08 +0000 (UTC) Received: from NAM01-BY2-obe.outbound.protection.outlook.com (mail-by2nam01on0070.outbound.protection.outlook.com [104.47.34.70]) by lists.denx.de (Postfix) with ESMTPS id D5AEDC21E64 for ; Tue, 29 Aug 2017 07:02:07 +0000 (UTC) Received: from BN6PR03CA0095.namprd03.prod.outlook.com (10.164.122.161) by CO2PR03MB2262.namprd03.prod.outlook.com (10.166.92.143) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1385.9; Tue, 29 Aug 2017 07:02:05 +0000 Received: from BY2FFO11OLC015.protection.gbl (2a01:111:f400:7c0c::190) by BN6PR03CA0095.outlook.office365.com (2603:10b6:405:6f::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1385.9 via Frontend Transport; Tue, 29 Aug 2017 07:02:04 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BY2FFO11OLC015.mail.protection.outlook.com (10.1.15.59) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1341.15 via Frontend Transport; Tue, 29 Aug 2017 07:02:03 +0000 Received: from vinitha-OptiPlex-790.ap.freescale.net (vinitha-OptiPlex-790.ap.freescale.net [10.232.134.143]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id v7T71mN0006227; Tue, 29 Aug 2017 00:02:00 -0700 From: Sumit Garg To: Date: Tue, 29 Aug 2017 12:31:47 +0530 Message-ID: <1503990107-28658-3-git-send-email-sumit.garg@nxp.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1503990107-28658-1-git-send-email-sumit.garg@nxp.com> References: <1503990107-28658-1-git-send-email-sumit.garg@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131484637241635551; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39380400002)(39860400002)(2980300002)(1109001)(1110001)(339900001)(199003)(189002)(2906002)(626005)(54906002)(85426001)(104016004)(2950100002)(6916009)(36756003)(53936002)(4326008)(47776003)(68736007)(5660300001)(105606002)(106466001)(8936002)(97736004)(81166006)(50226002)(5003940100001)(110136004)(356003)(77096006)(50466002)(86362001)(575784001)(33646002)(2351001)(50986999)(76176999)(6666003)(8656003)(8676002)(305945005)(81156014)(498600001)(48376002)(189998001); DIR:OUT; SFP:1101; SCL:1; SRVR:CO2PR03MB2262; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BY2FFO11OLC015; 1:m5nwfYEHY+aRhwiY3n6IasnMjhwLvbWH+5EkWCPaeUY3mMIeKOC233DDODU2WfVKc7XTCJZtd2Wf42NFO/fi02+HCwR2kk2C0hvV2KvO5km5s+d15NJWUWDdpTvSz1KX MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: a314ed33-6ba6-4b54-72df-08d4eeabdaac X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(2017052603199)(201703131430075)(201703131517081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:CO2PR03MB2262; X-Microsoft-Exchange-Diagnostics: 1; CO2PR03MB2262; 3:epvItURKrE9MvCMWc9fGuGNh5pYR7u0T825MwKXa6j63cNLSPw3mImQuL61bvlLUvSMoNZYDnCoOw7oplX1RfGu134mtCWyHWDv+xn54DzA00+xsv5ijjlZcBHgzfP6QcwtwZ1eRNsqUk0oE4p/M6ddUjiSEiH6S75KfbE2ZJk5BKW/mlr0ZpxKl8JttluXb3/BNvUPNrqBYu4J2panHxLYz7sZjF5OrGWqErzcApNCansNCJ4nZuwTfo3nFA3AhYzlITQCNTEV8JL4snMNw0fnz0Buui2o3+0DjUjLmGlpe/F4GZmED/zIjodgJnzvFN/quNWHeB3je4sh5ciCQmEaGKHA0+m9BkUNMYSin5O4=; 25:LoM0IoH3Qa6j4qQjRRFn8jOQZ2r3NTgIqBZ5+Rx1m+GIq0aBIVDA0ds6Y5MNpzV4zeRoQ6CCpgDy5A9aNhgkTVat+9qjnGPcN741zd3G9O3jN/IKFk8wQqI7IqTEk2s55PM9V+sgZ8oMQ0usZ1OWKqfuGXOTzY0MB9VeMqvWdm7B/6OVs+gIq9PwfLziYA0YZOFRnW0MAaM4tY6WtfzJ0MV2pHgbIncmjSLokTkcXsZv5KkvxQ3BuhY++NkPOahtsstYeQR4j/e7kiotigT2rIlA0J8sl4zHufkHOwqk8xwZ6xr74JuLlKk65Z3OR6H39Z7MOh+j3hjjsbm6R7ZAog== X-MS-TrafficTypeDiagnostic: CO2PR03MB2262: X-Microsoft-Exchange-Diagnostics: 1; CO2PR03MB2262; 31:S/cb6mSHP3C/yqLKUK9U91nlGtQwT6sva/XTGM7Ibq3WeXJ+cnWXInEJzAwcGuGAdAWL7vogUOzRkovH534zAz0XDQPv+3pKikvAcIzVHFs5FBsDLFBHdcyrpFfLiml8clUJM89PIxIH5iCqlvqrWhbz/Wwz3kX0zNmYTQk/U6i/46KCfLf0orxykzaSstcEzOe0rFRiPkxDYEcXvvJh1OFI3I1lDarM7bIqVb4tEt4=; 4:+OPWCqoOiCD6GEs5OhMLJ/qkHPfVYMlAsP+k3+TjyNqf7A6FD1/tGWwHxRmnQw+UmdOl/OlGBE0m9EC+o6EbVubwRqlkPtng1vrKqmZ5oTAt5ab+KcTKkfC3Aj2eXQbwPZsT02zoQ5zygQefvTRH9HVBolthwKwTUkkeHrxb17RxL4ijkSQ14PmMyG+j7GgQq4s6kk8RW9MFpSKPJ0ZMXHKW2xT67WORuBVMlWaBG+u8f0zdwNXf/DTr54YtJcJ8QCWaI4Zc5ghEfg4xMHkTtL1uGj57NwerJVP4K2leSPE= X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(601004)(2401047)(13018025)(8121501046)(13016025)(5005006)(3002001)(10201501046)(93006095)(93001095)(100000703101)(100105400095)(6055026)(6096035)(20161123559100)(20161123565025)(20161123561025)(20161123556025)(201703131430075)(201703131441075)(201703131448075)(201703131433075)(201703161259150)(20161123563025)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:CO2PR03MB2262; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:CO2PR03MB2262; X-Forefront-PRVS: 0414DF926F X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CO2PR03MB2262; 23:enBLriApxooXKV0M8Jn8XU0MH3JjjOC2L1wyyb22f?= xJBUmkBPmcLH/Km/JA46PM+as4qnn0tOTkKLga22IggEOo8HBMgPyq+W0dwzxcSLagK7c/fafMgH0eVxka83TbHoBy13RF/8pP1CiMCCow998ijylDj00Bkx/XFeh67K3YX60sUd29JwJBO72tu2Esf3koRb/ZKwGk82dvRb95gy9DEPjt8R70xctsDIHbv8rK1hmCOTJJ7b2RXVrTEfRIT7H3pi+2KFuHUhciu6JS8xV4bVG9ZS5wBPaV01IY+P4nLqdW6UA1j5dbICTrQlUb4oJ7eg8fdKzmMYRWwcoI9rPBRxpZYvJpxNZHbH6qWC6XT5QOJMqdz17fl62smNSX9Xvpa0MMez4h8h37v6a8uvUvSVU0MLnPmbBeMfQMa/koh5bXEJUMYUpcZo/mDlKSXpBaoFqQKEPI1moIJVXYu+3B39Tq8vCV35ggVPTVBZYnzZRCGkQkJy0RevKXksKxKbqHIGJHtP5HFZTSRFgryYwxhg+vxtBztUCzvYR2KB7a3wdmldHAWmXKC4Mbgx/6OjhGDYv+GbhDY+MWmgHpECeNOPNwS1OTGv2+VvYItEeOCuwZpuF9uyI+OwSE/JVra2rFjcSpjgd0MNz88DJA26wqSvcV5mN0YH0cLfPFLBUPaFmMsmghtRZAW4XAECX216KN16DdfDr3Wyxg6sfd235NoYisw9FG40WVqbMcTxIfGD8dCW0IVWxXnmymLkgDUMB0ZulRb43cjsIcT86ibFUqD+3p2/la1JFVDRaEEuadpt74sXFbJeMijQbspjjB2K7qtjTGzTdcujBoFfkp1XGNjYRJDzzI6dmB9/V3CSCVxRPt3YbNDLpKUqKSCLQyxYnI/pxxeGN6CGU1zVbdJL7t4VfmsvZpFaMMU6UdMwUdNxqMNjCpOOuwfqJLmGp97ISXbFUIH81ojV4cNT3N/sqlaqZEWoiwUB27At4bCVE2Hgg0eap7QxkQZl+gA4g4vc/z3C+XA2Q6fKz1yhIA19hhOBjrgpkR6GC+Fz/cdyZ6z+01nL8EXYyTsHtoT7aV6NxFg26xwbA9ONpbMh/cqc6RTIILSBeKebGLxbD/9poN5KK2wAJz1ftSEqcMp9g61wJ1KYSwHgslGMTMDgiLLAQ== X-Microsoft-Exchange-Diagnostics: 1; CO2PR03MB2262; 6:I25yfU5XJi12YUTVltpGMHQHP4wIMhWKgb/r5UosEvTaoevlNWF+oKTK8plYBxacX1fxs9nZFetKIjFiBi/AcuIXb017dxyIbOsErEUCmoWF5wWg/IcgyAbpwbUW9ItylvnDV6n+LxTvRWwsiG9E5RxBjEaXVnQki4RWtH5cdvtAtwsoJA8rUUhLpZidCKbG9tyomqE0gcDVjAppJ7/Hiv9OOETLdgRcGM6sHsd4LZJ1qhFLvh2IFHh3WmFT7NrZK6xVRS96h1VHdSWUPkYM7NwhKkf+gu95fYmbEMNZn0VOCxobyMkQqUww1hBg2MD3WnXzVTFbEMDPyUI/0TSqZA==; 5:CCvGfUZ92Jixa8M2gmqwTuM7qRclGxqo0j/ZqQQ71gT0KtVhnwxt+90eJHvV13bVLmOECkFIZGY1naTDx8cB0tatpHZUdK/BKtpms3C+U4aBTK9DWZ6KKDzQWiwogvmQ59Rn/03ConoSsywUCu2INA==; 24:Dch6lOUH/G96BzZBDovyXLVpInnvOU1JuyhMhQetaTrCzpVzlRI2ZT+o6feIUhvVfoD1+PQ1H/PZ0Hm6+jYyb2LikzIQWfE+evSZh0g9Mv4=; 7:w6aQhfN7tb2g/0ftzJ3A0YvmKsfX86SzWNzTV2C6hM+HZoqWMn4RYKTE6dpfbJJBvwUd5oiGN4RmVvDlbnl717GeHnsff4tpqxbvweIFzFw+G1ptPT4PzG/xO+yZCF++6iBFfEW65FZu3I99QEdgePGkvKZes63iVPH+6lTrU2Yj3p+edlZvZMo0jlI3jDq0QBCmmhb41+odrYRvyHwUNVf5P3pODAm2CaBSXB/rhg4= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Aug 2017 07:02:03.9763 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR03MB2262 Cc: Udit Agarwal , ruchika.gupta@nxp.com Subject: [U-Boot] [PATCH 3/3] ls1088ardb: Add SD Secure boot target support X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.18 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" Signed-off-by: Udit Agarwal Signed-off-by: Sumit Garg --- Dependent on ls1088 base SD boot target. Also dependent on ls1088 QPSI secure boot target. arch/arm/include/asm/fsl_secure_boot.h | 16 ++++----- board/freescale/ls1088a/MAINTAINERS | 5 +++ .../ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig | 39 ++++++++++++++++++++++ include/configs/ls1088a_common.h | 15 ++++++++- 4 files changed, 66 insertions(+), 9 deletions(-) create mode 100644 configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig diff --git a/arch/arm/include/asm/fsl_secure_boot.h b/arch/arm/include/asm/fsl_secure_boot.h index 5ebe0cf..aa48024 100644 --- a/arch/arm/include/asm/fsl_secure_boot.h +++ b/arch/arm/include/asm/fsl_secure_boot.h @@ -26,6 +26,14 @@ #define CONFIG_KEY_REVOCATION +#if defined(CONFIG_FSL_LAYERSCAPE) +/* + * For fsl layerscape based platforms, ESBC image Address in Header + * is 64 bit. + */ +#define CONFIG_ESBC_ADDR_64BIT +#endif + #ifndef CONFIG_SPL_BUILD #ifndef CONFIG_SYS_RAMBOOT /* The key used for verification of next level images @@ -42,14 +50,6 @@ #endif -#if defined(CONFIG_FSL_LAYERSCAPE) -/* - * For fsl layerscape based platforms, ESBC image Address in Header - * is 64 bit. - */ -#define CONFIG_ESBC_ADDR_64BIT -#endif - #ifdef CONFIG_ARCH_LS2080A #define CONFIG_EXTRA_ENV \ "setenv fdt_high 0xa0000000;" \ diff --git a/board/freescale/ls1088a/MAINTAINERS b/board/freescale/ls1088a/MAINTAINERS index b3d5c38..de8a770 100644 --- a/board/freescale/ls1088a/MAINTAINERS +++ b/board/freescale/ls1088a/MAINTAINERS @@ -15,3 +15,8 @@ F: board/freescale/ls1088a/ F: include/configs/ls1088aqds.h F: configs/ls1088aqds_qspi_defconfig F: configs/ls1088aqds_sdcard_qspi_defconfig + +LS1088A_SECURE_BOOT BOARD +M: Sumit Garg +S: Maintained +F: configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig diff --git a/configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig b/configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig new file mode 100644 index 0000000..746637d --- /dev/null +++ b/configs/ls1088ardb_sdcard_qspi_SECURE_BOOT_defconfig @@ -0,0 +1,39 @@ +CONFIG_ARM=y +CONFIG_TARGET_LS1088ARDB=y +# CONFIG_SYS_MALLOC_F is not set +CONFIG_DM_SPI=y +CONFIG_DM_SPI_FLASH=y +CONFIG_DEFAULT_DEVICE_TREE="fsl-ls1088a-rdb" +CONFIG_FIT=y +CONFIG_FIT_VERBOSE=y +CONFIG_OF_BOARD_SETUP=y +CONFIG_SYS_EXTRA_OPTIONS="SD_BOOT_QSPI" +CONFIG_SECURE_BOOT=y +CONFIG_SD_BOOT=y +CONFIG_SPL=y +CONFIG_HUSH_PARSER=y +CONFIG_CMD_MMC=y +CONFIG_CMD_SF=y +CONFIG_CMD_I2C=y +# CONFIG_CMD_SETEXPR is not set +CONFIG_CMD_DHCP=y +CONFIG_CMD_PING=y +CONFIG_OF_CONTROL=y +CONFIG_NET_RANDOM_ETHADDR=y +CONFIG_DM=y +CONFIG_SPL_DM=y +CONFIG_SPI_FLASH=y +CONFIG_NETDEVICES=y +CONFIG_E1000=y +CONFIG_SYS_NS16550=y +CONFIG_FSL_DSPI=y +CONFIG_SYS_MMCSD_RAW_MODE_U_BOOT_USE_SECTOR=y +CONFIG_SYS_MMCSD_RAW_MODE_U_BOOT_SECTOR=0x8b0 +CONFIG_FSL_LS_PPA=y +CONFIG_SPL_BUILD=y +CONFIG_PARTITIONS=y +CONFIG_RSA=y +CONFIG_SPL_RSA=y +CONFIG_SPL_CRYPTO_SUPPORT=y +CONFIG_SPL_HASH_SUPPORT=y +# CONFIG_DISPLAY_BOARDINFO is not set diff --git a/include/configs/ls1088a_common.h b/include/configs/ls1088a_common.h index fb4c852..38d4643 100644 --- a/include/configs/ls1088a_common.h +++ b/include/configs/ls1088a_common.h @@ -248,7 +248,20 @@ unsigned long long get_qixis_addr(void); #define CONFIG_SYS_SPL_MALLOC_SIZE 0x00100000 #define CONFIG_SYS_SPL_MALLOC_START 0x80200000 -#define CONFIG_SYS_MONITOR_LEN (512 * 1024) + +#ifdef CONFIG_SECURE_BOOT +#define CONFIG_U_BOOT_HDR_SIZE (16 << 10) +/* + * HDR would be appended at end of image and copied to DDR along + * with U-Boot image. Here u-boot max. size is 512K. So if binary + * size increases then increase this size in case of secure boot as + * it uses raw u-boot image instead of fit image. + */ +#define CONFIG_SYS_MONITOR_LEN (0x100000 + CONFIG_U_BOOT_HDR_SIZE) +#else +#define CONFIG_SYS_MONITOR_LEN 0x100000 +#endif /* ifdef CONFIG_SECURE_BOOT */ + #endif #define CONFIG_SYS_BOOTM_LEN (64 << 20) /* Increase max gunzip size */