[U-Boot] [PATCH v3 0/7] Determine Boot mode at run time
Tom Rini
trini at konsulko.com
Wed Jan 27 15:07:35 CET 2016
On Wed, Jan 27, 2016 at 07:18:13AM +0000, Aneesh Bansal wrote:
> > -----Original Message-----
> > From: Tom Rini [mailto:trini at konsulko.com]
> > Sent: Monday, January 25, 2016 9:06 PM
> > To: Aneesh Bansal <aneesh.bansal at nxp.com>
> > Cc: u-boot at lists.denx.de; Ruchika Gupta <ruchika.gupta at nxp.com>
> > Subject: Re: [U-Boot] [PATCH v3 0/7] Determine Boot mode at run time
> >
> > On Fri, Jan 22, 2016 at 04:37:21PM +0530, Aneesh Bansal wrote:
> >
> > > There are two phases in Secure Boot
> > > 1. ISBC: In BootROM, validate the BootLoader (U-Boot).
> > > 2. ESBC: In U-Boot, continuing the Chain of Trust by
> > > validating and booting LINUX.
> > >
> > > For ESBC phase, there is no difference in SoC's based on ARM or
> > > PowerPC cores.
> > >
> > > But the exit conditions after ISBC phase i.e. entry conditions for
> > > U-Boot are different for ARM and PowerPC.
> > > PowerPC:
> > > ========
> > > If Secure Boot is executed, a separate U-Boot target is required which
> > > must be compiled with a diffrent Text Base as compared to Non-Secure Boot.
> > > There are some LAW and TLB settings which are required specifically
> > > for Secure Boot scenario.
> > >
> > > ARM:
> > > ====
> > > ARM based SoC's have a fixed memory map and exit conditions from
> > > BootROM are same irrespective of boot mode (Secure or Non-Secure).
> > >
> > > This patchset is aimed at removing the requirement for a separate
> > > Secure Boot target for ARM based SoC's.
> > >
> > > Another Security Requirement for running CHAIN_OF_TRUST is that U-Boot
> > > environemnt must not be picked from flash/external memory. This cannot
> > > be done based on bootmode at run time in current U-Boot architecture.
> > > Once this dependency is resolved, no separate SECURE_BOOT target will be
> > required for ARM based SoC's.
> > >
> > > Currently, the only code under CONFIG_SECURE_BOOT for ARM SoC's is
> > > defining CONFIG_ENV_IS_NOWHERE
> > >
> > > The patches have been tested on LS1043, LS1021, P3041 and T1024.
> > >
> > > The patch set is dependent on following:
> > > http://patchwork.ozlabs.org/patch/553826/
> > >
> > > Aneesh Bansal (7):
> > > include/configs: make secure boot header file include uniform
> > > include/configs: move definition of CONFIG_CMD_BLOB
> > > SECURE_BOOT: split the secure boot functionality in two parts
> > > create function to determine boot mode
> > > enable chain of trust for ARM platforms
> > > enable chain of trust for PowerPC platforms
> > > SECURE_BOOT: change error handler for esbc_validate
> > >
> > > arch/arm/cpu/armv8/fsl-layerscape/soc.c | 6 ++
> > > .../include/asm/arch-fsl-layerscape/immap_lsch2.h | 3 +
> > > arch/arm/include/asm/arch-ls102xa/immap_ls102xa.h | 2 +
> > > arch/arm/include/asm/fsl_secure_boot.h | 20 +++-
> > > arch/powerpc/cpu/mpc85xx/cpu_init.c | 14 +++
> > > arch/powerpc/include/asm/fsl_secure_boot.h | 47 ++++++---
> > > arch/powerpc/include/asm/immap_85xx.h | 3 +
> > > board/freescale/common/Makefile | 1 +
> > > board/freescale/common/cmd_esbc_validate.c | 7 +-
> > > board/freescale/common/fsl_chain_of_trust.c | 70 +++++++++++++
> > > board/freescale/common/fsl_validate.c | 7 ++
> > > board/freescale/ls1021aqds/ls1021aqds.c | 4 +
> > > board/freescale/ls1021atwr/ls1021atwr.c | 4 +
> > > include/config_fsl_chain_trust.h | 101 ++++++++++++++++++
> > > include/config_fsl_secboot.h | 116 ---------------------
> > > include/configs/B4860QDS.h | 4 -
> > > include/configs/BSC9132QDS.h | 4 -
> > > include/configs/P1010RDB.h | 4 -
> > > include/configs/P2041RDB.h | 4 -
> > > include/configs/T102xQDS.h | 10 +-
> > > include/configs/T102xRDB.h | 10 +-
> > > include/configs/T1040QDS.h | 3 -
> > > include/configs/T104xRDB.h | 3 -
> > > include/configs/T208xQDS.h | 4 -
> > > include/configs/T208xRDB.h | 4 -
> > > include/configs/T4240QDS.h | 4 -
> > > include/configs/T4240RDB.h | 9 --
> > > include/configs/corenet_ds.h | 4 -
> > > include/configs/ls1021aqds.h | 5 +-
> > > include/configs/ls1021atwr.h | 5 +-
> > > include/configs/ls1043a_common.h | 8 ++
> > > include/configs/ls1043aqds.h | 2 +
> > > include/configs/ls1043ardb.h | 8 --
> > > include/fsl_validate.h | 2 +
> > > 34 files changed, 299 insertions(+), 203 deletions(-) create mode
> > > 100644 board/freescale/common/fsl_chain_of_trust.c
> > > create mode 100644 include/config_fsl_chain_trust.h delete mode
> > > 100644 include/config_fsl_secboot.h
> >
> > Looking at the config file changes, I think we need to move a bunch of this stuff to
> > Kconfig so that we can get these consistent and correct each time.
> >
> > --
> > Tom
>
> The patches move the common configs/defines from platform specific files to a common file fsl_secure_boot.h.
> This is also done with the intention of making it consistent and avoiding correction each time for a new platform.
>
> I will later work on restructuring the code to use Kconfig on top of these patches.
OK, thanks.
--
Tom
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <http://lists.denx.de/pipermail/u-boot/attachments/20160127/bf62a0c7/attachment.sig>
More information about the U-Boot
mailing list