diff options
author | Bryan Brattlof <bb@ti.com> | 2022-12-23 19:15:23 -0600 |
---|---|---|
committer | Tom Rini <trini@konsulko.com> | 2023-01-10 15:39:07 -0500 |
commit | b672e8581070497c1859910ce0def6eaf4a49860 (patch) | |
tree | e536c0ae7512f68e6a3b8a990b4d1d11bbda5155 /arch/arm/mach-k3/Kconfig | |
parent | 940b7128c9d14225b1ce05c586b2023fcbb50454 (diff) | |
download | u-boot-b672e8581070497c1859910ce0def6eaf4a49860.tar.gz |
arm: mach-k3: copy bootindex to OCRAM for main domain SPL
Texas Instruments has begun enabling security settings on the SoCs it
produces to instruct ROM and TIFS to begin protecting the Security
Management Subsystem (SMS) from other binaries we load into the chip by
default.
One way ROM and TIFS do this is by enabling firewalls to protect the
OCSRAM and HSM RAM regions they're using during bootup.
The HSM RAM the wakeup SPL is in is firewalled by TIFS to protect
itself from the main domain applications. This means the 'bootindex'
value in HSM RAM, left by ROM to indicate if we're using the primary
or secondary boot-method, must be moved to OCSRAM (that TIFS has open
for us) before we make the jump to the main domain so the main domain's
bootloaders can keep access to this information.
Signed-off-by: Bryan Brattlof <bb@ti.com>
Diffstat (limited to 'arch/arm/mach-k3/Kconfig')
-rw-r--r-- | arch/arm/mach-k3/Kconfig | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/arch/arm/mach-k3/Kconfig b/arch/arm/mach-k3/Kconfig index 87da6b49ee..a8c3a593d5 100644 --- a/arch/arm/mach-k3/Kconfig +++ b/arch/arm/mach-k3/Kconfig @@ -69,7 +69,9 @@ config SYS_K3_BOOT_PARAM_TABLE_INDEX default 0x41cffbfc if SOC_K3_J721E default 0x41cfdbfc if SOC_K3_J721S2 default 0x701bebfc if SOC_K3_AM642 - default 0x43c3f290 if SOC_K3_AM625 || SOC_K3_AM62A7 + default 0x43c3f290 if SOC_K3_AM625 + default 0x43c3f290 if SOC_K3_AM62A7 && CPU_V7R + default 0x7000f290 if SOC_K3_AM62A7 && ARM64 help Address at which ROM stores the value which determines if SPL is booted up by primary boot media or secondary boot media. |