From patchwork Tue Aug 22 06:54:47 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: tho1.nguyendat@toshiba.co.jp X-Patchwork-Id: 13360245 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7C516EE4996 for ; Tue, 22 Aug 2023 06:54:56 +0000 (UTC) Received: from mo-csw.securemx.jp (mo-csw.securemx.jp [210.130.202.132]) by mx.groups.io with SMTP id smtpd.web11.2892.1692687294136808917 for ; Mon, 21 Aug 2023 23:54:54 -0700 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: toshiba.co.jp, ip: 210.130.202.132, mailfrom: tho1.nguyendat@toshiba.co.jp) Received: by mo-csw.securemx.jp (mx-mo-csw1121) id 37M6spNH1710333; Tue, 22 Aug 2023 15:54:51 +0900 X-Iguazu-Qid: 2rWh7t7B1r2FmC8D2Q X-Iguazu-QSIG: v=2; s=0; t=1692687291; q=2rWh7t7B1r2FmC8D2Q; m=2xNE3EQJkGyvJQWJn3JAXP4K38qlueYYGBWwc/v/WVc= Received: from imx2-a.toshiba.co.jp (imx2-a.toshiba.co.jp [106.186.93.35]) by relay.securemx.jp (mx-mr1122) id 37M6snwZ209682 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT); Tue, 22 Aug 2023 15:54:50 +0900 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SVI1BY/hH5yDgFjaJkJVds+XIC633YnHkD0qPOqGEi/BjWtRcEFI9IodyMywgui70KKQGNuuyOehEcPKCaUr1azQhb1Hbklzh0xk/v8NZ1sz9ErfLW0DbzdFMKvEaqKbuKiKxzyDPUEl8AUeVVg+c4Y6OD313qcQS+nRkDIOI4nsVoZxhcL11yFtoG/OgCp6gozZ5xWjkSunWq6tRqtpAuL+XrePtbRUXCI9eAkh2nUkyy3FNb2TQGhVXV07Xfiu1VkhpUM355BJjYcTslKQeEHcEUnld/gk5XvJPqZA8Sjpw4rbLmXOD5/TcVWXh0+ZmtrV4U5ytWFAmSVccNiyXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=dn9HNC7/ykC1gSKEV/WepfTL+csPR7QcUnjP3iYhLuI=; b=dPnF0hn6DWmrTe7LNicSycEdjbSj4U9fHNu8Sx2oWyk/CqY7XrBbFj1Ksp/9COISpoRzMiaghYvaSjt81GMcpq3BidBclqmbWnVl5RvsXwLtBvAbNedgLVOWEuZRbJT/gdMHNQz6KDFAlh8UEJ7otTrk/kiv3FifmVnc7ObH7EoC8p5whUAQmI50zvQY+U6nD3uPIxGSGIXifHtqNaiq+wI7DAkB1agoG+2w4I5X9ZnmRT0c1v6FDZBTmLngzU/V8wUtkZItAorLYMoKojppx99j3WGJfwb2sLb2L43Qy43WBBrRErACefNYeWl1rwCPNZ7hqsNULrV7SJCxOL8JKw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=toshiba.co.jp; dmarc=pass action=none header.from=toshiba.co.jp; dkim=pass header.d=toshiba.co.jp; arc=none From: To: , CC: , Subject: [cip-dev] [isar-cip-core 3/3] Enable secured boot for BBB Thread-Topic: [cip-dev] [isar-cip-core 3/3] Enable secured boot for BBB Thread-Index: AQHZ1MUf4YOmmFxjs0uZbMwAx9pZXQ== Date: Tue, 22 Aug 2023 06:54:47 +0000 X-TSB-HOP2: ON Message-ID: Accept-Language: vi-VN, en-US Content-Language: vi-VN X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=toshiba.co.jp; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: OS3PR01MB5880:EE_|TYCPR01MB5773:EE_ x-ms-office365-filtering-correlation-id: c67ff23c-b1b2-4bb0-83bd-08dba2dcace6 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:OS3PR01MB5880.jpnprd01.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(39860400002)(346002)(376002)(396003)(136003)(366004)(1800799009)(451199024)(186009)(71200400001)(4326008)(8676002)(8936002)(316002)(478600001)(19627405001)(66556008)(66446008)(110136005)(91956017)(54906003)(64756008)(66476007)(76116006)(66946007)(41300700001)(7696005)(6506007)(55016003)(9686003)(38070700005)(122000001)(38100700002)(33656002)(26005)(53546011)(5660300002)(107886003)(2906002)(86362001)(52536014);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-2022-jp?b?N1hyazRZaGNXS0dQMTAx?= =?iso-2022-jp?b?N0tFR1dxOU1JZk9YMTJzeUhEbmNRQTZoQktyazB1bFNMMXRlVHd6Uk5X?= =?iso-2022-jp?b?UjRSbnlmb3MrSWlLY285WFprKzBLWGdNN2Z6b1o2d1JxT0gzei9EeWgr?= =?iso-2022-jp?b?em1JcjgvdlpLZG1Od0kwSHdobDYyUFBTOHZZdTRIenBpVGwxMkJxOXN2?= =?iso-2022-jp?b?akxKUFV6UlUvTmdMTkZlVk1IbWdLWVM1RDgzVWQ2QjB3Z21BN1o3VTZJ?= =?iso-2022-jp?b?MVhyVnMvd1dhZFVSenlPRnBQN0JRS3BNMHVzOTFPdHZJK0NVYlk1OHov?= =?iso-2022-jp?b?dmdzWkJPc2c5S1E2THBRbGp4RzBVMi9XcktQT3YwNzMzNGZVYU0xdERm?= =?iso-2022-jp?b?VnRzQzF0ZHVKdnhDWDhQSGs4YWpGMHdMMTlxcjdnVzNmKzF3S0VVTEpK?= =?iso-2022-jp?b?NHEwbi9zbzR5dDVHSmpNQUVDa3JxNWhFRTUyMlpnZnp6eWRsVzJKS1JT?= =?iso-2022-jp?b?cG9LaGp6RlNnKzlRZ3lUb3dXOW9oOGRNd3ZjcDIreXZuamRyZzQrVHZj?= =?iso-2022-jp?b?azV0RUIxYTE0SGlIclJKN1JENVZoNFF5NDJVMHhPdjh4M0kyZEhKaWM4?= =?iso-2022-jp?b?bEtTQUFmbnpWRDcxaGhwMm9GcmpaVVlEWmhJc3lrOXMvNUdlejFFUDBx?= =?iso-2022-jp?b?NnVHRWNCS0VEOEhlU1o1aVZTSXJ2dFYraHowYjdwWjQ0ZlROd3NWK2hX?= =?iso-2022-jp?b?Y0gwR09RM2x1WTRhN0ZHSkExSllLSGNYRTZTUXZuSHZXdEtQMzVCdHlR?= =?iso-2022-jp?b?Skg5emcyOTF6L0xJb3RvOGVuQVdNRmRLMC92aHVOOFpoSXVjUFA3bTdQ?= =?iso-2022-jp?b?NnU4VVZQQnEvRFByMGh0eTZUUXVEc3FKY3hNYjBNTzc0Z2c3SEcrZGpl?= =?iso-2022-jp?b?eU95aTBJMWp4NjBSclhFbW9PVFlaaS9lYUg0VFQwMFlsZTFudVFUTElY?= =?iso-2022-jp?b?Z09jc05kZUFCdjNrREU3NkJZQVBQSFh3ZU1iYjVOZ21xZFJnK2FnM1or?= =?iso-2022-jp?b?Y0g4RTdremRLL3B0MlNKajZ0bDlYZlJDdG9DU2l4T2NJYVJ4NXpIUVl4?= =?iso-2022-jp?b?OU5mRjVIdEk3K0NYT2l2aXJzM3duVnNNbmhZT2lHT29wREVIeXVWQmU1?= =?iso-2022-jp?b?UkhKNWsxU0FldXhvcDRhNCsyT3FwSDc0Q0h5RWY2MUsyRHhWYUdkSWJz?= =?iso-2022-jp?b?ejhrcXhXWWdrblg0UFNWYUNMWU9XdmZuYmNnMThkUkJoWS9lWGwxQytS?= =?iso-2022-jp?b?NVdZYnY2RFFSY1htVDI4a0JPaHhXaWlJZ3RwaUV5ZVA0eTFwSiswaHJY?= =?iso-2022-jp?b?UW5pbGk2dmFPV29Gbm5MdXEyanQxU3lodEEvM2V3QkVtRzZ1OGVsMjlE?= =?iso-2022-jp?b?aitkTFdVbUkwdms4MFFWazNSOStaY0tHb09TL2lzZ0RaRXVZVTlaUFhJ?= =?iso-2022-jp?b?MExaTEZjR2ZNcFkyeHVIRjFjL1RlWTRlclRkNTVvR3I2L2l5R1EwbjE0?= =?iso-2022-jp?b?eFhva0hIWEl6c3FaV1l4T290Q2ZZVndqb1NoVFZFdnI2bjBjVHgydFY0?= =?iso-2022-jp?b?SDhkQVQ5YmJ5MEtXWW5aMEpaSzNaN29pSXEvVTRweVpISkM1YVNlSnB0?= =?iso-2022-jp?b?VEZTdllTdEpOSm13VEJHMURQek1VYjhURlMzaFhiRDJBT0hPL0ZmemdY?= =?iso-2022-jp?b?MnV4T0h3QytHTXQ3SGRtTy9DamlJUmZVZ2FsNnJzSGY3WFVaSklyenV1?= =?iso-2022-jp?b?Y1FLS2g5K2NoZHkxd2pxZVErSkw1MDFTcVpXdzFJREI1dFByNWZYWnkr?= =?iso-2022-jp?b?akdNWlVXbjJWTXFyZmZjMnhaamNZN2Z2dzZYZEh4ODhEUDV1OVFuR1RU?= =?iso-2022-jp?b?MDhuaHc0TkduYUlPRWc5VVg1MW43Kzd5ZFRmaVZ4Rys0Ri9CNzNmZk1x?= =?iso-2022-jp?b?WVYyQWNRRXhzK3Fld09XZ3ljclVyeVRTY1gvUncxQnZ0WUFaZGEvMEJN?= =?iso-2022-jp?b?bll1aHdSbmYzR2duZG81UzZ6V0srdHA0cVdINlM1blVQRXozczdmRjRL?= =?iso-2022-jp?b?dFE1ZXRma2Z3ZmhBQXhvMnBJSEc3K0tKTHk5T0lQQ0dRcE95VEF5UGxN?= =?iso-2022-jp?b?QTRQUHhTcTk2NktTUlBxTWxzeE4rVDFJUWhKZlI0dS9LYVI3V3lsK2NK?= =?iso-2022-jp?b?NnZCaTdQWEluUDRMK3lxbnI3aGtGZHNmS1NaMFNUZnVlUkt4cUwra1Nx?= =?iso-2022-jp?b?UVZWYk1aTi8vUFJTN3dRcmNwU21YRTdQTUJ5L0JEMFA3V3RRZWluZkxQ?= =?iso-2022-jp?b?cE1CSGpCQ0tQQ2c9PQ==?= MIME-Version: 1.0 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 0nLNrKTPk/mBiUrr9bWeulP/ZIB7lLtTymZaSRu/h7CWGt5QMI37dVscqWFlMXTuWNa1cA9CB/3r+VEAk/ispnvve1A+CW8A3OBbnzQTW2tIe4eniShp86EIOagwH5hBegoRcvoXhTqB1XtfUO+lnKfZHsKC0eNoYMljgW1CZje0H2pMY9KoDfE4oL6P6gM3WeHIpWRg+xCY//HfJYTTZLpmv2jpX5raMiau7Eiof9tkpEJyD8ayJG+kfwiUYuY1f9ubPLLawLRjFDGPj9O910F8gA2mJcM6ed+iqaTh0KAZmN1Jct/93zPSPLXIVgqz34bPSh+YYOf6tNfe88y26+18QKddLZ2gB0GbMX5U59hIdjod0kq+tcomisZWwTzw1ZH9PREtaUj6n//VbY31tpvmaZFKyv3NIMjiHBIHTrfgOyRCOJYXdwkXL01Z8tNpvfl8X9Rc4rkzJUqWTX1wfnTUaLjAK3pObKO611S3A3/GvXTiCJhWeeHIVj6zJv8yjyav99uvBfkUVKehby3BuSgj1oPUcjnipr7FQBOneBXXfWn1jw/k88ZD7dSLTDJBqyMDaEzUtfBhq2P6k1RI0RqpzvmVhfDIw/UeyiX+JR1g2hNRF8aMLJKl7U4fWJwJicQcvcTLbpFG4dVUO+fXhGlqkabvcvsvRrSG+inmcNlCnrsfGNrPWh7Mqz2/FmnR3b4ZUcArSIW6T2LUOKQSNHmtZp2btVFNLwf9F6wDoRnPAY5aa3KKT05Fco+xltQ/uV1tOdxPSBtAgZ56nh9PeklMz/sNOqxmgpWhD8YcnbDwgQ99VG/7EwxwdfoeuRxjWcQuUOytdWGAXJJa7q4aFA== X-OriginatorOrg: toshiba.co.jp X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: OS3PR01MB5880.jpnprd01.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: c67ff23c-b1b2-4bb0-83bd-08dba2dcace6 X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Aug 2023 06:54:48.0012 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: f109924e-fb71-4ba0-b2cc-65dcdf6fbe4f X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 03nRKrSqZ8qgtmZvtNZ28E+d1JzOcF2vQVCUQ7XDzqXGn+jO7wO1ENbRi4ICAhx/ZAGrqxm3pjO/h28+gm4FLJHanWkHnZcw43WnCv4y1t0= X-MS-Exchange-Transport-CrossTenantHeadersStamped: TYCPR01MB5773 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 22 Aug 2023 06:54:56 -0000 X-Groupsio-URL: https://lists.cip-project.org/g/cip-dev/message/12814 From: Nguyen Dat Tho Date: Tue, 13 Dec 2022 10:14:04 +0700 Subject: [PATCH 3/3] u-boot: Add EFI secure boot dependency CONFIG_EFI_SECURE_BOOT depends on CONFIG_FIT_SIGNATURE. Enable CONFIG_FIT_SIGNATURE to make sure CONFIG_EFI_SECURE_BOOT enabled Signed-off-by: Nguyen Dat Tho --- recipes-bsp/u-boot/files/secure-boot.cfg.tmpl | 1 + 1 file changed, 1 insertion(+) -- 2.30.2 diff --git a/recipes-bsp/u-boot/files/secure-boot.cfg.tmpl b/recipes-bsp/u-boot/files/secure-boot.cfg.tmpl index 956dcbf..6111007 100644 --- a/recipes-bsp/u-boot/files/secure-boot.cfg.tmpl +++ b/recipes-bsp/u-boot/files/secure-boot.cfg.tmpl @@ -4,3 +4,4 @@ CONFIG_USE_BOOTCOMMAND=y CONFIG_BOOTCOMMAND="setenv scan_dev_for_boot 'if test -e ${devtype} ${devnum}:${distro_bootpart} efi/boot/boot${EFI_ARCH}.efi; then load ${devtype} ${devnum}:${distro_bootpart} ${kernel_addr_r} efi/boot/boot${EFI_ARCH}.efi; bootefi ${kernel_addr_r} ${fdtcontroladdr}; fi'; run distro_bootcmd; echo 'EFI Boot failed!'; sleep 1000; reset" CONFIG_EFI_VARIABLES_PRESEED=y CONFIG_EFI_SECURE_BOOT=y +CONFIG_FIT_SIGNATURE=y