
Hello everyone!
Texas Instruments has started to enable security settings inside all the boot ROM and TIFS firmware in all of their SoCs. One of the few changes this brings is ROM and TIFS will now begin protecting the RAM regions they're using with firewalls.
This means the wakeup domain's SPL will need to move the stack and heap to HSM RAM to ensure it stays within its allotted memory regions as well as move the needed boot information to the main domain's bootloaders that will no longer have access to HSM RAM.
We will also need to edit the bootcmd to pull in the kernel and dtb's fitImage if uboot is enforcing the high security bootflow. While we're editing this bootcmd, we can also take the opportunity to convert it to a distro_bootcmd macro.
Thanks for reviewing! ~Bryan
Bryan Brattlof (5): configs: restrict am62ax wakup SPL size configs: am62a: move stack and heap to HSM RAM arm: mach-k3: copy bootindex to OCRAM for main domain SPL configs: am62a: convert bootcmd to distro_bootcmd configs: am62a: use kernel fitImage when using secure bootflow
arch/arm/mach-k3/Kconfig | 4 ++- arch/arm/mach-k3/am62a7_init.c | 16 +++++++-- .../arm/mach-k3/include/mach/am62a_hardware.h | 17 +++++++++- configs/am62ax_evm_a53_defconfig | 1 - configs/am62ax_evm_r5_defconfig | 15 +++++--- include/configs/am62ax_evm.h | 34 +++++++++++++++++-- 6 files changed, 74 insertions(+), 13 deletions(-)
base-commit: 52d91e1c20b399ddab276e2c03e5788ed5e5fdd2