[PATCH u-boot v2019.04-aspeed-openbmc v3 1/4] ast2600: Allow selection of SPL boot devices
Joel Stanley
joel at jms.id.au
Thu Jan 28 12:02:16 AEDT 2021
On Thu, 28 Jan 2021 at 00:51, Andrew Jeffery <andrew at aj.id.au> wrote:
>
>
>
> On Thu, 28 Jan 2021, at 10:45, Joel Stanley wrote:
> > The AST2600 SPL can boot from a number of sources, with or without the
> > AST2600 secure boot feature. It may be desirable to disable some of
> > these, so put them behind the defines for the drivers that are used.
> >
> > Reviewed-by: Klaus Heinrich Kiwi <klaus at linux.vnet.ibm.com>
> > Signed-off-by: Joel Stanley <joel at jms.id.au>
> > ---
> > arch/arm/mach-aspeed/ast2600/Kconfig | 12 ++++++++++++
> > arch/arm/mach-aspeed/ast2600/spl_boot.c | 9 +++++++++
> > 2 files changed, 21 insertions(+)
> >
> > diff --git a/arch/arm/mach-aspeed/ast2600/Kconfig
> > b/arch/arm/mach-aspeed/ast2600/Kconfig
> > index dd991e87c795..518f41b558d3 100644
> > --- a/arch/arm/mach-aspeed/ast2600/Kconfig
> > +++ b/arch/arm/mach-aspeed/ast2600/Kconfig
> > @@ -53,6 +53,18 @@ config TARGET_SLT_AST2600
> >
> > endchoice
> >
> > +config ASPEED_SECBOOT_BL2
> > + bool "ASPEED secure boot BL2 support"
> > + depends on ASPEED_AST2600
> > + help
> > + Enable ASPEED's "secboot" secure boot support for verifying
> > + the SPL's playload ("BL2").
> > +
> > + Enable this is if you're using secure boot support in the AST2600
> > (or similar)
> > + to verify your u-boot proper.
> > +
> > + Disable this is if you are using u-boot's vboot to verify u-boot.
> > +
> > source "board/aspeed/evb_ast2600a0/Kconfig"
> > source "board/aspeed/evb_ast2600a1/Kconfig"
> > source "board/aspeed/ncsi_ast2600a0/Kconfig"
> > diff --git a/arch/arm/mach-aspeed/ast2600/spl_boot.c
> > b/arch/arm/mach-aspeed/ast2600/spl_boot.c
> > index 58a22f646e08..98cf72bf440d 100644
> > --- a/arch/arm/mach-aspeed/ast2600/spl_boot.c
> > +++ b/arch/arm/mach-aspeed/ast2600/spl_boot.c
> > @@ -42,6 +42,7 @@ static int aspeed_secboot_spl_ram_load_image(struct
> > spl_image_info *spl_image,
> > }
> > SPL_LOAD_IMAGE_METHOD("RAM with Aspeed Secure Boot", 0,
> > ASPEED_SECBOOT_DEVICE_RAM, aspeed_secboot_spl_ram_load_image);
>
> The orthogonal groups of MMC/RAM vs secure/not makes it hard to read :( But it
> looks like your IS_ENABLED(ASPEED_SECBOOT_BL2) #ifdef-ery has missed
> aspeed_secboot_spl_ram_load_image()?
Yeah, it could include that. I'll send a follow up once this series has gone in.
Cheers,
Joel
More information about the openbmc
mailing list