123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141 |
- #include <common.h>
- #include <command.h>
- #include <mach/mon.h>
- #include <spl.h>
- asm(".arch_extension sec\n\t");
- int mon_install(u32 addr, u32 dpsc, u32 freq, u32 bm_addr)
- {
- int result;
- __asm__ __volatile__ (
- "stmfd r13!, {lr}\n"
- "mov r0, %1\n"
- "mov r1, %2\n"
- "mov r2, %3\n"
- "mov r3, %4\n"
- "blx r0\n"
- "mov %0, r0\n"
- "ldmfd r13!, {lr}\n"
- : "=&r" (result)
- : "r" (addr), "r" (dpsc), "r" (freq), "r" (bm_addr)
- : "cc", "r0", "r1", "r2", "r3", "memory");
- return result;
- }
- int mon_power_on(int core_id, void *ep)
- {
- int result;
- asm volatile (
- "stmfd r13!, {lr}\n"
- "mov r1, %1\n"
- "mov r2, %2\n"
- "mov r0, #0\n"
- "smc #0\n"
- "mov %0, r0\n"
- "ldmfd r13!, {lr}\n"
- : "=&r" (result)
- : "r" (core_id), "r" (ep)
- : "cc", "r0", "r1", "r2", "memory");
- return result;
- }
- int mon_power_off(int core_id)
- {
- int result;
- asm volatile (
- "stmfd r13!, {lr}\n"
- "mov r1, %1\n"
- "mov r0, #1\n"
- "smc #1\n"
- "mov %0, r0\n"
- "ldmfd r13!, {lr}\n"
- : "=&r" (result)
- : "r" (core_id)
- : "cc", "r0", "r1", "memory");
- return result;
- }
- #ifdef CONFIG_TI_SECURE_DEVICE
- #define KS2_HS_SEC_HEADER_LEN 0x60
- #define KS2_HS_SEC_TAG_OFFSET 0x34
- #define KS2_AUTH_CMD 130
- static int k2_hs_bm_auth(int cmd, void *arg1)
- {
- int result;
- asm volatile (
- "stmfd r13!, {r4-r12, lr}\n"
- "mov r0, %1\n"
- "mov r1, %2\n"
- "smc #2\n"
- "mov %0, r0\n"
- "ldmfd r13!, {r4-r12, lr}\n"
- : "=&r" (result)
- : "r" (cmd), "r" (arg1)
- : "cc", "r0", "r1", "memory");
- return result;
- }
- void board_fit_image_post_process(void **p_image, size_t *p_size)
- {
- int result = 0;
- void *image = *p_image;
- if (strncmp(image + KS2_HS_SEC_TAG_OFFSET, "KEYS", 4)) {
- printf("No signature found in image!\n");
- hang();
- }
- result = k2_hs_bm_auth(KS2_AUTH_CMD, image);
- if (result == 0) {
- printf("Authentication failed!\n");
- hang();
- }
-
- *p_size -= KS2_HS_SEC_HEADER_LEN;
- memcpy(image, image + KS2_HS_SEC_HEADER_LEN, *p_size);
-
- if (!(IS_ENABLED(CONFIG_SPL_BUILD) &&
- IS_ENABLED(CONFIG_SPL_YMODEM_SUPPORT) &&
- spl_boot_device() == BOOT_DEVICE_UART))
- printf("Authentication passed\n");
- }
- #endif
|