- 29 3月, 2016 20 次提交
-
-
由 Qianyu Gong 提交于
Clock phase and polarity for DSPI flash need to be set. Signed-off-by: NGong Qianyu <Qianyu.Gong@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Mingkai Hu 提交于
Signed-off-by: NMingkai Hu <mingkai.hu@nxp.com> Signed-off-by: NGong Qianyu <Qianyu.Gong@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Mingkai Hu 提交于
Signed-off-by: NMingkai Hu <mingkai.hu@nxp.com> Signed-off-by: NGong Qianyu <Qianyu.Gong@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Saksham Jain 提交于
Use a pointer to pass image address to fsl_secboot_validate(), instead of using environmental variable "img_addr". Signed-off-by: NAneesh Bansal <aneesh.bansal@nxp.com> Signed-off-by: NSaksham Jain <saksham.jain@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Saksham Jain 提交于
In case of fatal failure during secure boot execution (e.g. header not found), reset is asserted to stop execution. If the RESET_REQ is not tied to HRESET, this allows the execution to continue. Add esbh_halt() after the reset to make sure execution stops. Signed-off-by: NAneesh Bansal <aneesh.bansal@nxp.com> Signed-off-by: NSaksham Jain <saksham.jain@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Saksham Jain 提交于
For secure boot, currently we were using fixed bootargs for all SoCs. This is not needed and we can use the bootargs which are used in non-secure boot. Signed-off-by: NAneesh Bansal <aneesh.bansal@nxp.com> Signed-off-by: NSaksham Jain <saksham.jain@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Saksham Jain 提交于
This commit solves CAAM coherency issue on ls2080. When caches are enabled and CAAM's DMA's AXI transcations are not made cacheable, Core reads/writes data from/to caches and CAAM does from main memory. This forces data flushes to synchronize various data structures. But even if any data in proximity of these structures is read by core, these structures again are fetched in caches. To avoid this problem, either all the data that CAAM accesses can be made cache line aligned or CAAM transcations can be made cacheable. So, this commit makes CAAM transcations as write back with write and read allocate. Signed-off-by: NSaksham Jain <saksham.jain@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Saksham Jain 提交于
When MMU is disabled, 64-bit write must be aligned at 64-bit boundary. Becaue the memory location is not guaranteed to be 64-bit aligned, the 64-bit write needs to be split into two 32-bit writes to avoid the alignment exception. Signed-off-by: NAneesh Bansal <aneesh.bansal@nxp.com> Signed-off-by: NSaksham Jain <saksham.jain@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Saksham Jain 提交于
During secure boot, SMMU is enabled on POR by SP bootrom. SMMU needs to be put in bypass mode in uboot to enable CAAM transcations to pass through. For non-secure boot, SP BootROM doesn't enable SMMU, which is in bypass mode out of reset. Signed-off-by: NAneesh Bansal <aneesh.bansal@nxp.com> Signed-off-by: NSaksham Jain <saksham.jain@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Saksham Jain 提交于
The GUR (DCFG) registers in CCSR space are in little endian format. Define a config CONFIG_SYS_FSL_CCSR_GUR_LE in arch/arm/include/asm/arch-fsl-layerscape/config.h Signed-off-by: NAneesh Bansal <aneesh.bansal@nxp.com> Signed-off-by: NSaksham Jain <saksham.jain@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Saksham Jain 提交于
"fdt_high" env variable was set to 0xcfffffff for secure boot. Change it to 0xa0000000 for LS2080 to be consistent with non-secure boot targets. Signed-off-by: NAneesh Bansal <aneesh.bansal@nxp.com> Signed-off-by: NSaksham Jain <saksham.jain@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Saksham Jain 提交于
To unify steps for secure boot for xip (eg. NOR) and non-xip memories (eg. NAND, SD), bootscipts and its header are copied to main memory. Validation and execution are performed from there. For other ARM Platforms (ls1043 and ls1020), to avoid disruption of existing users, this copy step is not used for NOR boot. Signed-off-by: NAneesh Bansal <aneesh.bansal@nxp.com> Signed-off-by: NSaksham Jain <saksham.jain@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Saksham Jain 提交于
During secure boot, Linux image along with other images are validated using bootscript. This bootscript also needs to be validated before it executes. This requires a header for bootscript. When secure boot is enabled, default bootcmd is changed to first validate bootscript using the header and then execute the script. For ls2080, NOR memory map is different from other ARM SoCs. So a new address on NOR is used for this bootscript header (0x583920000). The Bootscript address is mentioned in this header along with addresses of other images. Signed-off-by: NAneesh Bansal <aneesh.bansal@nxp.com> Signed-off-by: NSaksham Jain <saksham.jain@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Saksham Jain 提交于
Sec_init has been called at the beginning to initialize SEC Block (CAAM) which is used by secure boot validation later for both ls2080a qds and rdb. 64-bit address in ESBC Header has been enabled. Secure boot defconfigs are created for boards (NOR boot). Signed-off-by: NSaksham Jain <saksham.jain@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Saksham Jain 提交于
For secure boot, a header is used to identify key table, signature and image address. A new header structure is added for lsch3. Currently key extension (IE) feature is not supported. Single key feature is not supported. Keys must be in table format. Hence, SRK (key table) must be present. Max key number has increase from 4 to 8. The 8th key is irrevocable. A new barker Code is used. Signed-off-by: NAneesh Bansal <aneesh.bansal@nxp.com> Signed-off-by: NSaksham Jain <saksham.jain@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Saksham Jain 提交于
Add configs for various IPs used during secure boot. Add address and endianness for SEC and Security Monitor. SRK are fuses in SFP (fuses for public key's hash). These are stored in little endian format. Signed-off-by: NAneesh Bansal <aneesh.bansal@nxp.com> Signed-off-by: NSaksham Jain <saksham.jain@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Saksham Jain 提交于
In LS2080, SFP has version 3.4. It is in little endian. The base address is 0x01e80200. SFP is used in Secure Boot to read fuses. Signed-off-by: NAneesh Bansal <aneesh.bansal@nxp.com> Signed-off-by: NSaksham Jain <saksham.jain@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Prabhakar Kushwaha 提交于
NULL pointer should be checked before any dereference. This patch move memest after the NULL pointer check. Signed-off-by: NPrabhakar Kushwaha <prabhakar.kushwaha@nxp.com> Reported-by: NJose Rivera <german.rivera@nxp.com> Acked-by: NJoe Hershberger <joe.hershberger@ni.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Prabhakar Kushwaha 提交于
Free dflt_dpio pointer after its usage during error handling Signed-off-by: NPrabhakar Kushwaha <prabhakar.kushwaha@nxp.com> Reported-by: NJose Rivera <german.rivera@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Qianyu Gong 提交于
The qspi_cfg register is set by PBI when booting from QSPI. No need to changing it again. Signed-off-by: NGong Qianyu <Qianyu.Gong@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
- 25 3月, 2016 2 次提交
-
-
由 Qianyu Gong 提交于
Signed-off-by: NGong Qianyu <Qianyu.Gong@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
由 Stuart Yoder 提交于
The fsl-mc node has been moved under /soc, so update the path references accordingly. Backwards compatibility is retained for /fsl-mc. Delete backwards compatibility for the completely obsolete /fsl,dprc@0. Signed-off-by: NStuart Yoder <stuart.yoder@nxp.com> Reviewed-by: NYork Sun <york.sun@nxp.com>
-
- 23 3月, 2016 18 次提交
-
-
由 Bin Meng 提交于
Introduce CONFIG_RTL8169 in Kconfig and move over boards' defconfig to use that. Signed-off-by: NBin Meng <bmeng.cn@gmail.com> Acked-by: NStephen Warren <swaren@nvidia.com> Acked-by: NJoe Hershberger <joe.hershberger@ni.com>
-
由 Bin Meng 提交于
Introduce CONFIG_RTL8139 in Kconfig and move over boards' defconfig to use that. Signed-off-by: NBin Meng <bmeng.cn@gmail.com> Acked-by: NJoe Hershberger <joe.hershberger@ni.com> [trini: Fixup MPC8641HPCN* and r2dplus configs] Signed-off-by: NTom Rini <trini@konsulko.com>
-
由 Bin Meng 提交于
Some boards' defconfig files are out of order. Clean this up. Signed-off-by: NBin Meng <bmeng.cn@gmail.com> Acked-by: NJoe Hershberger <joe.hershberger@ni.com>
-
由 Simon Glass 提交于
This should return 0 on success, not 1. Fix it. Signed-off-by: NSimon Glass <sjg@chromium.org> Acked-by: NMarek Vasut <marex@denx.de> Reviewed-by: NTom Rini <trini@konsulko.com>
-
由 Simon Glass 提交于
The error path for fit_import_data() is incorrect if the second open() call fails. Reported-by: Coverity (CID: 138489) Signed-off-by: NSimon Glass <sjg@chromium.org> Reviewed-by: NTom Rini <trini@konsulko.com>
-
由 Simon Glass 提交于
The file that is opened is not closed in all cases. Fix it. Reported-by: Coverity (CID: 138490) Signed-off-by: NSimon Glass <sjg@chromium.org> Reviewed-by: NTom Rini <trini@konsulko.com>
-
由 Simon Glass 提交于
Make sure that both the error path and normal return free the buffer and close the file. Reported-by: Coverity (CID: 138491) Signed-off-by: NSimon Glass <sjg@chromium.org> Reviewed-by: NTom Rini <trini@konsulko.com>
-
由 Simon Glass 提交于
The 'buf' variable is not freed. Fix it. Reported-by: Coverity (CID: 138492) Signed-off-by: NSimon Glass <sjg@chromium.org> Reviewed-by: NTom Rini <trini@konsulko.com>
-
由 Simon Glass 提交于
The 'fdt' variable is not unmapped in all error cases. Fix this. Reported-by: Coverity (CID: 138493) Signed-off-by: NSimon Glass <sjg@chromium.org> Reviewed-by: NTom Rini <trini@konsulko.com>
-
由 Simon Glass 提交于
The space allocated to fdt is not freed on error. Fix it. Reported-by: Coverity (CID: 138494) Signed-off-by: NSimon Glass <sjg@chromium.org> Reviewed-by: NTom Rini <trini@konsulko.com>
-
由 Simon Glass 提交于
There is a missing close() on the error path. Add it. Reported-by: Coverity (CID: 138496) Signed-off-by: NSimon Glass <sjg@chromium.org> Reviewed-by: NTom Rini <trini@konsulko.com>
-
由 Simon Glass 提交于
This cannot be NULL since part_get_info() calls this function and requires it to be non-NULL. Reported-by: Coverity (CID: 138497) Signed-off-by: NSimon Glass <sjg@chromium.org> Reviewed-by: NTom Rini <trini@konsulko.com>
-
由 Simon Glass 提交于
This cannot be NULL since part_print() calls this function and requires it to be non-NULL. Reported-by: Coverity (CID: 138498) Signed-off-by: NSimon Glass <sjg@chromium.org> Reviewed-by: NTom Rini <trini@konsulko.com>
-
由 Simon Glass 提交于
One of these is causing a coverity warning. Drop these functions and use the standard U-Boot ones instead. Reported-by: Coverity (CID: 138499) Signed-off-by: NSimon Glass <sjg@chromium.org> Reviewed-by: NTom Rini <trini@konsulko.com>
-
由 Simon Glass 提交于
The code flows through to the end of the function, so we don't need another close() before this. Remove it. Reported-by: Coverity (CID: 138503) Signed-off-by: NSimon Glass <sjg@chromium.org> Reviewed-by: NTom Rini <trini@konsulko.com>
-
由 Simon Glass 提交于
The code flows through to the end of the function, so we don't need another close() before this. Remove it. Reported-by: Coverity (CID: 138504) Signed-off-by: NSimon Glass <sjg@chromium.org> Reviewed-by: NTom Rini <trini@konsulko.com>
-
由 Simon Glass 提交于
The munmap() call unmaps the wrong memory buffer. Fix it. Reported-by: Coverity (CID: 138505) Reported-by: Coverity (CID: 138495) Signed-off-by: NSimon Glass <sjg@chromium.org> Reviewed-by: NTom Rini <trini@konsulko.com>
-
由 Vagrant Cascadian 提交于
Signed-off-by: NVagrant Cascadian <vagrant@debian.org> Acked-by: NMarek Vasut <marex@denx.de> Reviewed-by: NSimon Glass <sjg@chromium.org> Reviewed-by: NTom Rini <trini@konsulko.com>
-