summaryrefslogtreecommitdiff
path: root/arch/arm/mach-k3/Kconfig
diff options
context:
space:
mode:
authorBryan Brattlof <bb@ti.com>2022-12-23 19:15:23 -0600
committerTom Rini <trini@konsulko.com>2023-01-10 15:39:07 -0500
commitb672e8581070497c1859910ce0def6eaf4a49860 (patch)
treee536c0ae7512f68e6a3b8a990b4d1d11bbda5155 /arch/arm/mach-k3/Kconfig
parent940b7128c9d14225b1ce05c586b2023fcbb50454 (diff)
downloadu-boot-b672e8581070497c1859910ce0def6eaf4a49860.tar.gz
arm: mach-k3: copy bootindex to OCRAM for main domain SPL
Texas Instruments has begun enabling security settings on the SoCs it produces to instruct ROM and TIFS to begin protecting the Security Management Subsystem (SMS) from other binaries we load into the chip by default. One way ROM and TIFS do this is by enabling firewalls to protect the OCSRAM and HSM RAM regions they're using during bootup. The HSM RAM the wakeup SPL is in is firewalled by TIFS to protect itself from the main domain applications. This means the 'bootindex' value in HSM RAM, left by ROM to indicate if we're using the primary or secondary boot-method, must be moved to OCSRAM (that TIFS has open for us) before we make the jump to the main domain so the main domain's bootloaders can keep access to this information. Signed-off-by: Bryan Brattlof <bb@ti.com>
Diffstat (limited to 'arch/arm/mach-k3/Kconfig')
-rw-r--r--arch/arm/mach-k3/Kconfig4
1 files changed, 3 insertions, 1 deletions
diff --git a/arch/arm/mach-k3/Kconfig b/arch/arm/mach-k3/Kconfig
index 87da6b49ee..a8c3a593d5 100644
--- a/arch/arm/mach-k3/Kconfig
+++ b/arch/arm/mach-k3/Kconfig
@@ -69,7 +69,9 @@ config SYS_K3_BOOT_PARAM_TABLE_INDEX
default 0x41cffbfc if SOC_K3_J721E
default 0x41cfdbfc if SOC_K3_J721S2
default 0x701bebfc if SOC_K3_AM642
- default 0x43c3f290 if SOC_K3_AM625 || SOC_K3_AM62A7
+ default 0x43c3f290 if SOC_K3_AM625
+ default 0x43c3f290 if SOC_K3_AM62A7 && CPU_V7R
+ default 0x7000f290 if SOC_K3_AM62A7 && ARM64
help
Address at which ROM stores the value which determines if SPL
is booted up by primary boot media or secondary boot media.