123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114 |
- /*
- * Copyright 2015 Freescale Semiconductor, Inc.
- *
- * SPDX-License-Identifier: GPL-2.0+
- */
- #ifndef __CONFIG_FSL_CHAIN_TRUST_H
- #define __CONFIG_FSL_CHAIN_TRUST_H
- /* For secure boot, since ENVIRONMENT in flash/external memories is
- * not verified, undef CONFIG_ENV_xxx and set default env
- * (CONFIG_ENV_IS_NOWHERE)
- */
- #ifdef CONFIG_SECURE_BOOT
- #undef CONFIG_ENV_IS_IN_EEPROM
- #undef CONFIG_ENV_IS_IN_NAND
- #undef CONFIG_ENV_IS_IN_MMC
- #undef CONFIG_ENV_IS_IN_SPI_FLASH
- #undef CONFIG_ENV_IS_IN_FLASH
- #define CONFIG_ENV_IS_NOWHERE
- #endif
- #ifdef CONFIG_CHAIN_OF_TRUST
- #ifndef CONFIG_EXTRA_ENV
- #define CONFIG_EXTRA_ENV ""
- #endif
- /*
- * Control should not reach back to uboot after validation of images
- * for secure boot flow and therefore bootscript should have
- * the bootm command. If control reaches back to uboot anyhow
- * after validating images, core should just spin.
- */
- /*
- * Define the key hash for boot script here if public/private key pair used to
- * sign bootscript are different from the SRK hash put in the fuse
- * Example of defining KEY_HASH is
- * #define CONFIG_BOOTSCRIPT_KEY_HASH \
- * "41066b564c6ffcef40ccbc1e0a5d0d519604000c785d97bbefd25e4d288d1c8b"
- */
- #ifdef CONFIG_BOOTARGS
- #define CONFIG_SET_BOOTARGS "setenv bootargs \'" CONFIG_BOOTARGS" \';"
- #else
- #define CONFIG_SET_BOOTARGS "setenv bootargs \'root=/dev/ram " \
- "rw console=ttyS0,115200 ramdisk_size=600000\';"
- #endif
- #ifdef CONFIG_BOOTSCRIPT_KEY_HASH
- #define CONFIG_SECBOOT \
- "setenv bs_hdraddr " __stringify(CONFIG_BOOTSCRIPT_HDR_ADDR)";" \
- CONFIG_SET_BOOTARGS \
- CONFIG_EXTRA_ENV \
- "esbc_validate $bs_hdraddr " \
- __stringify(CONFIG_BOOTSCRIPT_KEY_HASH)";" \
- "source $img_addr;" \
- "esbc_halt\0"
- #else
- #define CONFIG_SECBOOT \
- "setenv bs_hdraddr " __stringify(CONFIG_BOOTSCRIPT_HDR_ADDR)";" \
- CONFIG_SET_BOOTARGS \
- CONFIG_EXTRA_ENV \
- "esbc_validate $bs_hdraddr;" \
- "source $img_addr;" \
- "esbc_halt\0"
- #endif
- #ifdef CONFIG_BOOTSCRIPT_COPY_RAM
- #define CONFIG_BS_COPY_ENV \
- "setenv bs_hdr_ram " __stringify(CONFIG_BS_HDR_ADDR_RAM)";" \
- "setenv bs_hdr_device " __stringify(CONFIG_BS_HDR_ADDR_DEVICE)";" \
- "setenv bs_hdr_size " __stringify(CONFIG_BS_HDR_SIZE)";" \
- "setenv bs_ram " __stringify(CONFIG_BS_ADDR_RAM)";" \
- "setenv bs_device " __stringify(CONFIG_BS_ADDR_DEVICE)";" \
- "setenv bs_size " __stringify(CONFIG_BS_SIZE)";"
- /* For secure boot flow, default environment used will be used */
- #if defined(CONFIG_SYS_RAMBOOT)
- #if defined(CONFIG_RAMBOOT_NAND)
- #define CONFIG_BS_COPY_CMD \
- "nand read $bs_hdr_ram $bs_hdr_device $bs_hdr_size ;" \
- "nand read $bs_ram $bs_device $bs_size ;"
- #endif /* CONFIG_RAMBOOT_NAND */
- #elif defined(CONFIG_SD_BOOT)
- #define CONFIG_BS_COPY_CMD \
- "mmc read $bs_hdr_ram $bs_hdr_device $bs_hdr_size ;" \
- "mmc read $bs_ram $bs_device $bs_size ;"
- #else /* CONFIG_SD_BOOT */
- #define CONFIG_BS_COPY_CMD \
- "cp.b $bs_hdr_device $bs_hdr_ram $bs_hdr_size ;" \
- "cp.b $bs_device $bs_ram $bs_size ;"
- #endif
- #endif /* CONFIG_BOOTSCRIPT_COPY_RAM */
- #ifndef CONFIG_BS_COPY_ENV
- #define CONFIG_BS_COPY_ENV
- #endif
- #ifndef CONFIG_BS_COPY_CMD
- #define CONFIG_BS_COPY_CMD
- #endif
- #define CONFIG_CHAIN_BOOT_CMD CONFIG_BS_COPY_ENV \
- CONFIG_BS_COPY_CMD \
- CONFIG_SECBOOT
- #endif
- #endif
|