11 Jan, 2018

1 commit


09 Aug, 2017

1 commit

  • Fix the size calculation in the verify boot. The original
    patch 266b5c0cdbd1150cf5e6bde0d473e5d2f0f60812 was merged
    but this was not the correct version. The correct version
    subtracted the header.

    Fixes: 266b5c0cdbd1 ("arm: am33xx: security: adds auth support for encrypted images")
    Signed-off-by: Madan Srinivas
    Signed-off-by: Dan Murphy

    Madan Srinivas
     

26 Jul, 2017

1 commit


25 Jul, 2017

1 commit

  • This patch adds support for authentication of both plain
    text and encrypted binaries. A new SECDEV package is needed
    to enable encryption of binaries by default for AM3x.

    The ROM authentication API detects encrypted images at
    runtime and automatically decrypts the image if the
    signature verification passes.

    Addition of encryption on AM3x results in a change in the
    image format. On AM4x, AM5x and, on AM3x devices signing
    clear test images, the signature is appended to the end of the
    binary.

    On AM3x, when the SECDEV package is used to create signed
    and encrypted images, the signature is added as a header
    to the start of the binary. So the binary size calculation
    has been updated to reflect this change.

    The signing tools and encrypted image format for AM3x
    cannot be changed to behave like AM4x and AM5x to
    maintain backward compatibility with older Sitara
    M-Shield releases.

    Adding encryption support also increases the size of
    the PPA. As the SPL is loaded right after the PPA for
    any peripheral boot, this increase in PPA size results
    in the SPL load address moving by 0x200 bytes (for UART boot).
    Memory boot modes like MMC are not affected, as the ROM
    loads the PPA and SPL in two separate steps.

    Acked-by: Andrew F. Davis
    Signed-off-by: Madan Srinivas

    Madan Srinivas
     

15 Jul, 2017

1 commit


27 Jun, 2017

3 commits


17 Jun, 2017

1 commit


24 May, 2017

3 commits


22 May, 2017

4 commits

  • One some keystone2 platforms like K2G ICE, there is an option
    to switch between 24MHz or 25MHz as sysclk. But the existing
    driver assumes it is always 24MHz. Add support for getting
    all reference clocks dynamically by reading boot pins.

    Signed-off-by: Lokesh Vutla

    Lokesh Vutla
     
  • K2G supports various sysclk frequencies which can be
    determined using sysboot pins. PLLs should be configured
    based on this sysclock frequency. Add PLL configurations
    for all supported sysclk frequencies.

    Signed-off-by: Lokesh Vutla

    Lokesh Vutla
     
  • am335x supports various sysclk frequencies which can be determined
    using sysboot pins. PLLs should be configures based on this
    sysclk frequency. Add PLL configurations for all supported
    frequencies.

    Signed-off-by: Lokesh Vutla

    Lokesh Vutla
     
  • Update MPU frequencies and voltages as per the latest
    DM[1] dated: OCT 2011 Revised APRIL 2016, Section 5.4.
    Below is the consolidated data:

    MPU values for PG 2.0 and later(Package ZCZ and ZCE):

    -------------------------------------------------------
    | | ZCZ | ZCE |
    |-------------------------------------------------------|
    | | VDD[V] | ARM [MHz] | VDD[V] | ARM [MHz] |
    |-------|----------|------------|----------|------------|
    | NITRO | 1.325 | 1000 | NA | NA |
    |-------|----------|------------|----------|------------|
    | TURBO | 1.26 | 800 | NA | NA |
    |-------|----------|------------|----------|------------|
    |OPP120 | 1.20 | 720 | NA | NA |
    |-------|----------|------------|----------|------------|
    |OPP100 | 1.10 | 600 | 1.10 | 600 |
    |-------|----------|------------|----------|------------|
    | OPP50 | 0.95 | 300 | 0.95 | 300 |
    -------------------------------------------------------

    There is no eFuse blown on PG1.0 Silicons due to which there is
    no way to detect the maximum frequencies supported. So default
    to OPP100 for which both frequency and voltages are common on both
    the packages.

    [1] http://www.ti.com/lit/ds/symlink/am3356.pdf

    Signed-off-by: Lokesh Vutla

    Lokesh Vutla
     

10 May, 2017

1 commit


07 May, 2017

3 commits


04 May, 2017

3 commits


27 Apr, 2017

1 commit


21 Apr, 2017

1 commit

  • On early K2 devices (eg. K2HK) the secure ROM code does not support
    loading secure code to firewall protected memory, before decrypting,
    authenticating and executing it.

    To load the boot monitor on these devices, it is necessary to first
    authenticate and run a copy loop from non-secure memory that copies
    the boot monitor behind firewall protected memory, before decrypting
    and executing it.

    On K2G, the secure ROM does not allow secure code executing from
    unprotected memory. Further, ROM first copies the signed and encrypted
    image into firewall protected memory, then decrypts, authenticates
    and executes it.

    As a result of this, we cannot use the copy loop for K2G. The
    mon_install has to be modified to pass the address the signed and
    encrypted secure boot monitor image to the authentication API.

    For backward compatibility with other K2 devices and K2G GP,
    the mon_install API still supports a single argument. In this case
    the second argument is set to 0 by u-boot and is ignored by ROM

    Signed-off-by: Thanh Tran
    Signed-off-by: Madan Srinivas

    Madan Srinivas
     

20 Apr, 2017

1 commit


11 Apr, 2017

5 commits


31 Mar, 2017

1 commit


16 Mar, 2017

1 commit


03 Mar, 2017

1 commit


22 Feb, 2017

1 commit


17 Feb, 2017

1 commit


16 Feb, 2017

4 commits