[U-Boot] [PATCH v2 0/7] Adds support for secure boot on Keystone SoCs (K2E)

Lokesh Vutla lokeshvutla at ti.com
Fri Sep 2 06:25:21 CEST 2016



On Thursday 01 September 2016 10:34 AM, Madan Srinivas wrote:
> This series adds support for secure keystone family of devices, more
> specifically for K2E (Edison).This work is similar to what has already
> been done for the AM43xx and AM57xx SoCs and leverages much of the
> infrastructure from them.
> 
> The big difference here is the ROM on keystone2 devices does not provide
> any APIs for image authentication. Rather, the image authentication and
> decryption routines and other security functions are provided by
> software and can run on the ARM in Trustzone as well as on secure DSPs.
> 
> A component known as the boot monitor acts as they gateway to this secure
> processing, and abstracts out the details from the public world. Unlike
> OMAP class devices, where u-boot calls ROM APIs, u-boot calls into the boot-
> monitor on keystone devices.
> 
> Other than this difference, most of the secure framework for AMxx and
> DRAxx devices have been re-used.
> 
> Couple of other points to note :-
> 
> 	-Support for SPL on secure keystone devices is still TBD,
> 	so boot from SPI flash, which needs SPL, is not supported currently
> 	on K2 devices.
> 
> 	-A single image will work across all other boot media for secure K2
> 	devices.

Overall looks good to me. What happened to the early abort seen on H2 HS
devices. How are you handling it?

Thanks and regards,
Lokesh

> 
> Changes in v2:
> - Corrects typo in commit message for PATCH 1/7 in this series
> - The following changes are  made to mon.c based on review comments
> 	Adds NULL pointer check before calling authentication interface
> 	Removes an unnecessary printf
> 	Updates size of signed FIT blob after post processing removes header
> - Adds a new name for the signed output image in config_secure.mk
>   to keep it in line with the image name used by non-secure keystone
>   devices.
> - Changes the target for secure keystone devices in config.mk
>   to u-boot_HS_MLO to keep it in line with the MLO target that
>   is built for non-secure keystone devices.
> - Updates k2e_hs_evm_defconfig to reduce the delta seen if one
>   regenerates it using savedefconfig or similar tools.
> 
> Madan Srinivas (4):
>   include: image.h: Fixes build warning with
>     CONFIG_FIT_IMAGE_POST_PROCESS
>   arm: omap-common: adds secure image name common to OMAP and keystone
>   arm: mach-keystone: config.mk: Adds support for secure images on K2
>   doc: Updates info on using keystone secure devices from TI
> 
> Vitaly Andrianov (3):
>   arm: mach-keystone: Implements FIT post-processing call for keystone
>     SoCs
>   arm: omap-common: Enable support for K2 HS devices in u-boot
>   configs: Adds a defconfig for K2E High Security EVM
> 
>  arch/arm/cpu/armv7/omap-common/Kconfig          |  2 +-
>  arch/arm/cpu/armv7/omap-common/config_secure.mk |  6 +++
>  arch/arm/mach-keystone/config.mk                |  6 +++
>  arch/arm/mach-keystone/mon.c                    | 55 +++++++++++++++++++++++++
>  configs/k2e_hs_evm_defconfig                    | 43 +++++++++++++++++++
>  doc/README.ti-secure                            | 20 +++++++++
>  include/image.h                                 |  3 +-
>  7 files changed, 133 insertions(+), 2 deletions(-)
>  create mode 100644 configs/k2e_hs_evm_defconfig
> 


More information about the U-Boot mailing list