<div class="socmaildefaultfont" dir="ltr" style="font-family:Arial, Helvetica, sans-serif;font-size:10pt" ><div dir="ltr" style="font-family:Arial, Helvetica, sans-serif;font-size:10pt" ><div dir="ltr" >Thanks Troy. I got secure booting of the complete chain after copying to DRAM.</div>
<div dir="ltr" > </div>
<div dir="ltr" >Also for u-boot verification I had to add "u-boot,dm-pre-reloc;" to the ast2600-evb.dts file to enable the hace engine to be available before u-boot is relocated.</div>
<div dir="ltr" > </div>
<div dir="ltr" >Thanks,<br>Sandhya</div>
<div dir="ltr" > </div>
<blockquote data-history-content-modified="1" dir="ltr" style="border-left:solid #aaaaaa 2px; margin-left:5px; padding-left:5px; direction:ltr; margin-right:0px" >----- Original message -----<br>From: "Troy Lee" <leetroy@gmail.com><br>Sent by: "openbmc" <openbmc-bounces+sandhya.koteshwara=ibm.com@lists.ozlabs.org><br>To: "Sandhya Koteshwara" <Sandhya.Koteshwara@ibm.com><br>Cc: "OpenBMC Maillist" <openbmc@lists.ozlabs.org>, "Troy Lee" <troy_lee@aspeedtech.com><br>Subject: [EXTERNAL] Re: [PATCH u-boot v2019.04-aspeed-openbmc v1 1/2] ast2600: spl: Fixes boot from RAM device<br>Date: Mon, Jul 26, 2021 10:23 PM<br>
<div><font size="2" face="Default Monospace,Courier New,Courier,monospace" >Hi Sandhya,<br><br>The AST2600 hardware hash and crypto engine (HACE) can only exame data<br>in DRAM, please make sure you copy the kernel fit-image into dram<br>first.<br><br>Thanks,<br>Troy Lee<br>--<br>Yu-Ting Lee (Troy Lee) <LeeTroy@gmail.com><br><br>On Tue, Jul 27, 2021 at 1:53 AM Sandhya Koteshwara<br><Sandhya.Koteshwara@ibm.com> wrote:<br>><br>> Hi Troy, Joel,<br>><br>> I am looking to use these patches to secure boot OpenBMC from flash on the AST2600 evaluation board. Is there a relevant UBOOT_MACHINE configuration file I can use?<br>><br>> I am currently porting configuration for secure boot from the ast2600_openbmc_spl_emmc_defconfig to the ast2600_openbmc_spl_defconfig. I was only able to get the u-boot-spl to verify u-boot but kernel verification fails.<br>><br>> Thanks,<br>> Sandhya<br>><br>> ----- Original message -----<br>> From: Troy Lee <troy_lee@aspeedtech.com><br>> Sent by: "openbmc" <openbmc-bounces+sandhya.koteshwara=ibm.com@lists.ozlabs.org><br>> To: <leetroy@gmail.com>, <openbmc@lists.ozlabs.org>, <joel@jms.id.au><br>> Cc:<br>> Subject: [EXTERNAL] [PATCH u-boot v2019.04-aspeed-openbmc v1 1/2] ast2600: spl: Fixes boot from RAM device<br>> Date: Wed, Jun 23, 2021 2:08 AM<br>><br>> Reporting a BOOT_DEVICE_RAM can leverage common/spl/spl_ram.c<br>> to bring up u-boot.bin by memory offset 0x00010000.<br>><br>> Fixes: 13dd0b0f7273 ("ast2600: spl: Support common boot loader features")<br>> Signed-off-by: Troy Lee <troy_lee@aspeedtech.com><br>> ---<br>> arch/arm/mach-aspeed/ast2600/spl.c | 2 +-<br>> 1 file changed, 1 insertion(+), 1 deletion(-)<br>><br>> diff --git a/arch/arm/mach-aspeed/ast2600/spl.c b/arch/arm/mach-aspeed/ast2600/spl.c<br>> index 778b326755..c759a7575d 100644<br>> --- a/arch/arm/mach-aspeed/ast2600/spl.c<br>> +++ b/arch/arm/mach-aspeed/ast2600/spl.c<br>> @@ -66,7 +66,7 @@ u32 spl_boot_device(void)<br>> case AST_BOOTMODE_EMMC:<br>> return BOOT_DEVICE_MMC1;<br>> case AST_BOOTMODE_SPI:<br>> - return BOOT_DEVICE_SPI;<br>> + return BOOT_DEVICE_RAM;<br>> case AST_BOOTMODE_UART:<br>> return BOOT_DEVICE_UART;<br>> }<br>> --<br>> 2.17.1<br>><br>><br>><br>><br>></font></div></blockquote>
<div dir="ltr" > </div></div></div><BR>
<BR>