From patchwork Mon Jan 8 19:57:46 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sumit Garg X-Patchwork-Id: 856750 X-Patchwork-Delegate: yorksun@freescale.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.denx.de (client-ip=81.169.180.215; helo=lists.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Received: from lists.denx.de (dione.denx.de [81.169.180.215]) by ozlabs.org (Postfix) with ESMTP id 3zFSwL116dz9s0g for ; Mon, 8 Jan 2018 19:23:46 +1100 (AEDT) Received: by lists.denx.de (Postfix, from userid 105) id 6FE0DC21F68; Mon, 8 Jan 2018 08:23:41 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de X-Spam-Level: X-Spam-Status: No, score=-0.0 required=5.0 tests=BAD_ENC_HEADER, DATE_IN_FUTURE_06_12, RCVD_IN_MSPIKE_H4, RCVD_IN_MSPIKE_WL, SPF_HELO_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from lists.denx.de (localhost [IPv6:::1]) by lists.denx.de (Postfix) with ESMTP id 00523C21F16; Mon, 8 Jan 2018 08:23:39 +0000 (UTC) Received: by lists.denx.de (Postfix, from userid 105) id 7ACC4C21F16; Mon, 8 Jan 2018 08:23:37 +0000 (UTC) Received: from NAM03-DM3-obe.outbound.protection.outlook.com (mail-dm3nam03on0057.outbound.protection.outlook.com [104.47.41.57]) by lists.denx.de (Postfix) with ESMTPS id 8725EC21EB1 for ; Mon, 8 Jan 2018 08:23:36 +0000 (UTC) Received: from BN3PR03CA0066.namprd03.prod.outlook.com (10.167.1.154) by CO2PR03MB2359.namprd03.prod.outlook.com (10.166.93.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.386.5; Mon, 8 Jan 2018 08:23:33 +0000 Received: from BY2FFO11OLC008.protection.gbl (2a01:111:f400:7c0c::168) by BN3PR03CA0066.outlook.office365.com (2a01:111:e400:7a4d::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.386.5 via Frontend Transport; Mon, 8 Jan 2018 08:23:26 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BY2FFO11OLC008.mail.protection.outlook.com (10.1.14.255) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.20.345.12 via Frontend Transport; Mon, 8 Jan 2018 08:22:57 +0000 Received: from b49020-OptiPlex-790.ap.freescale.net (b49020-OptiPlex-790.ap.freescale.net [10.232.132.83]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id w088NMEv006062; Mon, 8 Jan 2018 01:23:23 -0700 From: Sumit Garg To: Date: Tue, 9 Jan 2018 01:27:46 +0530 Message-ID: <1515441466-23640-1-git-send-email-sumit.garg@nxp.com> X-Mailer: git-send-email 1.9.1 X-EOPAttributedMessage: 0 X-Matching-Connectors: 131598733772874486; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(346002)(376002)(396003)(39860400002)(39380400002)(2980300002)(1110001)(1109001)(339900001)(199004)(189003)(97736004)(51416003)(8656006)(50466002)(47776003)(68736007)(53936002)(2351001)(4326008)(305945005)(104016004)(2906002)(498600001)(6666003)(6916009)(105606002)(5660300001)(36756003)(48376002)(106466001)(356003)(77096006)(8676002)(81156014)(81166006)(50226002)(86362001)(8936002)(316002)(15760500003)(54906003)(85426001)(16586007); DIR:OUT; SFP:1101; SCL:1; SRVR:CO2PR03MB2359; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BY2FFO11OLC008; 1:KY4vsh59qXBL0zbudU6O8mNj4DnlcIJ0O4RIOGyXOk6HjLz+8tP5atSv8rSK0IHW7wHaSDAEZ5WCGGe2Wig520Fu/x+dgzeMmojc5eeE4DGL5NGEV2SYwGLxD0FDTtVg MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 66c377dd-074a-4d2b-62f6-08d5567105e3 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(4534020)(4628075)(201703131517081)(5600026)(4604075)(2017052603307); SRVR:CO2PR03MB2359; X-Microsoft-Exchange-Diagnostics: 1; CO2PR03MB2359; 3:/ddgZycppeCv/aULm26R58TjlRjdPsOxIGZ6xlWdes6H1ffs0kQSp6lE2G4jxYELM9lEFG3OcISFYP6+OJeZF0LfcUzElzAYDz2toqgluj47Sc2wWIr8tgXdmjBjNtCjrlH44/pOGCoFGYTCn3eiTfDA9tGz0XPbvU4BABZzansiUOv3J9z6lOOFDbrgQkNOIsGa9SPfQR4v7s/NqzAWZA7sEoWCLDkxKdq2K//KSppJqHwZt3zAkMcoHPCBdvzzKFsLloljrXgBEB1S0brSMpTxC1EgMvvWC9zaB2VbTDR1HSpiEcoHfTi80uBh0whQr6OhQJ5XRWq68MLKFcwaPTNIXapdGjsh3Q0U17iw6lQ=; 25:YhU36KNSSjtl9d0mrgahnEOhHrre3hT3jpmcUkOOLw7a8HXlnaYOLgokdb1tc+sBeM5TSUG7uf09c+Dx7WLTTz+bQkO/TaCOGl/n3ViROu5O7hXM1uT6/RYbyLxY+3v9scEG2x0Iw/PtLPOc60l6Vq241MauEtd+RybnXQJXRBRo+k5GE7981AXmvMjf7zf1D9DXhzyCHs6jHeQltb8N+eZX01RJJhZgZcc4++9RjyeZCIfcJ/ZTUZIvGv6CuRsfPcz9hEqitJFM5Q4fM6iWZJR6SQLiquZYeIn4P0dcJBgoiNMP5Atv/iiR7lGUHD1M6zpL2LNKYncZXKf54gYy3w== X-MS-TrafficTypeDiagnostic: CO2PR03MB2359: X-Microsoft-Exchange-Diagnostics: 1; CO2PR03MB2359; 31:o6+aGU+I7QudhC+bfdwnHY0V/i6it+TSWJbeSn6EJM6Ip3cc7/tmo7oEPH6R1E7qTybptU7zJmOHvNqsdCKrIWN9hyU05sqBe6/ezfUQ7QB+zXpvWyVMq0gNBTXytmpwAkfVdl14nnGF4+O63jKAz5s2oVmV2t4ym6AlI3fCsW/E25cKKapA0dN9mDboqOZGSjLt5TIsrF/h9Bdrn258cGG5sCsxbZtWmF+vHVDU6nQ=; 4:yEA8jTQLPg0fLFnL4ATu73h+JMSyxlILowQ/igqA1jF293/Xnvs6HWi8c76N9IXJeIm1ohpBDoJ+A9x60xQdxdQGx1sHe3U/YnHjdR2Va3SmAxU+vFQx013MeYchRraUVyWQp4Wb6hOss7dpE66kdsO+Lb22Lt6B92Z+3rMEszUtgwEVT+/wsLkAnvrrRmSmVgmQ+b25QPMVXgvgVdAyNg6qo6k5+pvrBJMIUn3MEu4XyAckSiDrYDv+hvPfuMbvCtNYRSYU/khCLijH2ixnBtbo1SfT03pfYs1i5Cfqibt5HhhBSBCreHZi/IUxa2Tc X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6095135)(2401047)(8121501046)(5005006)(93006095)(93001095)(3002001)(3231023)(944510075)(944921075)(946801075)(946901075)(10201501046)(6055026)(6096035)(20161123563025)(20161123565025)(20161123556025)(201703131430075)(201703131448075)(201703131433075)(201703161259150)(201703151042153)(20161123561025)(20161123559100)(201708071742011); SRVR:CO2PR03MB2359; BCL:0; PCL:0; RULEID:(100000803101)(100110400095)(400006); SRVR:CO2PR03MB2359; X-Forefront-PRVS: 054642504A X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CO2PR03MB2359; 23:yAwQTthuuSvfWAnQ6q4uqWlRdLaOGoLm0nAbY2wDP?= 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 X-Microsoft-Exchange-Diagnostics: 1; CO2PR03MB2359; 6:Cx382rgxamEQYknE13Wbswr8zXze7HWlwaUIkRjDMziWEh9uPdCJW3u+qpR659033g0JvWU/abd7hapPnm5SIDrB+LukLVs06om9EUzZxecOjGJ8W+8r2UCTvih0NfTmu7gwZM/R9NIC3PsXG+CyEtcALIJErFujYgucQatHSMWEonJT4TuPrIGhk50ulLExmyjaq3ESr2h1gVLPEilsWZ/4hGmL4SEvVCoy9jcpeUeMNO0XbRyP+nWPogyJ0KatAw5+/Jwb7hrSWsKcUkR2q/pvsPVdTPFlRLM2znUa0BuAsTNuviEghuv3EmsZoow90eD6BvbhyNAyomu36b44jhD5tabzstcermlvpPvdVPg=; 5:ocLVIxt1YFmNUnMCCZ0is6EtgHbvs2I6HqQJHB9GZVHPz69a0HgRL5SgXRxV8of5dibDQTjF/b4KeJpOHxxAF2nwUjJCt3JBfvDocVkuQUmATKoDHQqVG8Xe/HIiUENMXPF65tdsjzkylShVpx5XddgaZl9gGULKUQHldShj6LY=; 24:pU78zWX9b3BBFjsRXdoWYHuduDiebXVTiPYB9aFxEqub7GoklrNIajnMIvbz88DavZuiSYTZ0qWRHB9YFA2aEl462efGg9ygzkNKnsQSssM=; 7:Et4I+khExJV3RBY80RgbYZYBv8kNQ7lQ1tPA/eY1G9II8r5yWt0qbpkyBDjhoBj+WxOTGH39ZkSDWHUX5qfUCp6wP+qMzkMJnhKcouY5XLGGXfcmxqS5xbX71WJmfMzHaX0jLtNrDZAx2xzXjchfveiExDoahCjy7mT1upSok0ogGrg08l2QfT8FC414lWhgfPxauwmsLXhTYXyMSP0JBQbFmr6/yARJdurTeN++8TG7PVGlGQCH0YfhLFRPtcUp SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Jan 2018 08:22:57.1002 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 66c377dd-074a-4d2b-62f6-08d5567105e3 X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR03MB2359 Cc: trini@konsulko.com, ruchika.gupta@nxp.com Subject: [U-Boot] [PATCH v3] configs: SECURE_BOOT: Enable CONFIG_CMD_EXT4_WRITE X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.18 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" As part of chain of trust with confidentiality along with distro boot, linux kernel image needs to be stored in encrypted form on ext4 boot partition. So enable CONFIG_CMD_EXT4_WRITE in case of Secure boot on ARM based platforms. Signed-off-by: Sumit Garg Reviewed-by: Tom Rini --- Changes in v3: Enable CMD_EXT4_WRITE option for ARM platforms only. Changes in v2: Instead of adding CMD_EXT4_WRITE option in each defconfig, added this option in Kconfig. board/freescale/common/Kconfig | 2 ++ 1 file changed, 2 insertions(+) diff --git a/board/freescale/common/Kconfig b/board/freescale/common/Kconfig index 8a5c456..280f7d4 100644 --- a/board/freescale/common/Kconfig +++ b/board/freescale/common/Kconfig @@ -7,6 +7,8 @@ config CHAIN_OF_TRUST select SHA_HW_ACCEL select SHA_PROG_HW_ACCEL select ENV_IS_NOWHERE + select CMD_EXT4 if ARM + select CMD_EXT4_WRITE if ARM bool default y