From patchwork Fri Jan 12 12:39:57 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bryan O'Donoghue X-Patchwork-Id: 124316 Delivered-To: patch@linaro.org Received: by 10.140.22.227 with SMTP id 90csp2016834qgn; Fri, 12 Jan 2018 04:45:07 -0800 (PST) X-Google-Smtp-Source: ACJfBos7fTMWfE8wFx/y5n1DKXthVaG7vDGaFYH8x45ABea3N8yTb3dneYVFk4J9B6/H1+rDtz0S X-Received: by 10.80.231.145 with SMTP id b17mr36042685edn.190.1515761107060; Fri, 12 Jan 2018 04:45:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1515761107; cv=none; d=google.com; s=arc-20160816; b=H2UzxEEVldCKgKMTvc+8Vf1+FND/u6TYC4W2N1JsReo+LnMb5q9V/9OTHA7Xu/XmJl xwQztU+tGg5+0RTjSH3GzNPZmOBW5zfECSYTcsBYrd78pSGgDjHXtn6B1bxbj9bmn6YQ XdQlLEr7rY/3Nyny2mHtcEJSOqylmEArhhXpAuxFwnsdqp7g9lFuh5oSVWGzEO7M5MkK QQDcaN1jZB6RTPoRFB4WUIkJWk1tyER5ebf2Ij5xY5MKvBLUT0EM+e4S7VGHPq66IIB3 LfPMf+Bvyg9RO55OhVuAWcEHmVPoUd08YkSf8RxFsHz5cZ9ifproO7ffsnu4nCmdhNwK KGbA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:content-transfer-encoding:mime-version :list-subscribe:list-help:list-post:list-archive:list-unsubscribe :list-id:precedence:subject:cc:references:in-reply-to:message-id :date:to:from:dkim-signature:arc-authentication-results; bh=TetUHm3dU1dpuciloTFNs9+SylnQ4ODAPZjEEHqmm4A=; b=d5jpBp1xelcSat8IfsU/tt6e2lVqsVgI86LrefFfvjzMI2Q4MjINrItnrNb7v45Q48 /ss/yj4RqNTQhKXmCjYUSmo76n6m6jDl8d56zEFn1LUVdZ8Aspb2IWvJ/IerVRpY5/bN ejJgFSWoXgQiGkDee4K9Qx9zW+QUBGctQdtT76aqNTd9W8tWcWsFkqNBaMRB2PL57czH jQhgXqTLY4WEYHVKO6KwEILYEKa2IZdzywSocDT4LNdcPvhjbA3ZBvfZGHv19X7fhbqc Jzp0fYFjq91CFB1np45VKu66RUeWJtY3YcR5EsiK1xrdqeCqJxS7JAf2jyFGXdKLftE8 Ng4g== ARC-Authentication-Results: i=1; mx.google.com; dkim=neutral (body hash did not verify) header.i=@linaro.org header.s=google header.b=YsNTT9I6; spf=pass (google.com: best guess record for domain of u-boot-bounces@lists.denx.de designates 81.169.180.215 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lists.denx.de (dione.denx.de. [81.169.180.215]) by mx.google.com with ESMTP id o4si6090989edc.118.2018.01.12.04.45.06; Fri, 12 Jan 2018 04:45:07 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of u-boot-bounces@lists.denx.de designates 81.169.180.215 as permitted sender) client-ip=81.169.180.215; Authentication-Results: mx.google.com; dkim=neutral (body hash did not verify) header.i=@linaro.org header.s=google header.b=YsNTT9I6; spf=pass (google.com: best guess record for domain of u-boot-bounces@lists.denx.de designates 81.169.180.215 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: by lists.denx.de (Postfix, from userid 105) id 9ED20C220AD; Fri, 12 Jan 2018 12:43:13 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de X-Spam-Level: X-Spam-Status: No, score=-0.0 required=5.0 tests=RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL, T_DKIM_INVALID autolearn=unavailable autolearn_force=no version=3.4.0 Received: from lists.denx.de (localhost [IPv6:::1]) by lists.denx.de (Postfix) with ESMTP id 822B5C221F1; Fri, 12 Jan 2018 12:40:51 +0000 (UTC) Received: by lists.denx.de (Postfix, from userid 105) id 77C32C221DF; Fri, 12 Jan 2018 12:40:32 +0000 (UTC) Received: from mail-wm0-f68.google.com (mail-wm0-f68.google.com [74.125.82.68]) by lists.denx.de (Postfix) with ESMTPS id C20C5C22157 for ; Fri, 12 Jan 2018 12:40:26 +0000 (UTC) Received: by mail-wm0-f68.google.com with SMTP id r78so11664325wme.0 for ; Fri, 12 Jan 2018 04:40:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=t1yE75he4CwZhe9fZUxRQZpJGDDreHJlq37nxEaqs/k=; b=YsNTT9I6E6s1F0/h6/Sr5IHIfJd0vg053yXSPFdGYYPqUJd429rJcm1GkSCFW/w7Fs WGDiwfCxS2O7S0ch7oyIviTI52sJ+F1GiT8cfycBlLg8JmPRecG/PROVWC4ZsJwvlVGZ hl50UEMfDscgZcLAdKo6SFlT3mNVJMu+TWHvg= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=t1yE75he4CwZhe9fZUxRQZpJGDDreHJlq37nxEaqs/k=; b=JxjXpvyYU5rp+lOSuZRi0DQR9dibnnuMbi6X+7Aw55VBEa68P5UHFf5X0DmcxzKgoL ssIlnahpGjf3UkuDNmWZYiD4GxcfXlhdNL11qeIU1PfSRDb+3icZwNFYr0eKb8cT+PCd JIgc6VO19o7dNIaBhLRaCiONj6IoJcByD3gMcAvZGxHEptEUyHB+x/vKc/xd1gfAK915 6RI+1qQYLKbOkQu7QZ/PlV9U3Le0mlbhUldkevmbch1ZJmolX0O1pVXc0pjzVgTTQCZQ XO77eFxT8v3rCRBTaSg/Kbk96KkKgR24i4lWCij2j/8cnaLolvkrft4xvuowg801rPvP fLZQ== X-Gm-Message-State: AKwxytdLhEVxO6Rye98sCq3dhswBWQrCV7evldeCLfVSPWFwvZGSCuXh zNjeux66N8iyPS/kbWCWtraHzFi10FE= X-Received: by 10.80.165.21 with SMTP id y21mr11501386edb.148.1515760826053; Fri, 12 Jan 2018 04:40:26 -0800 (PST) Received: from localhost.localdomain ([109.255.42.2]) by smtp.gmail.com with ESMTPSA id w2sm13893585edb.4.2018.01.12.04.40.24 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 12 Jan 2018 04:40:25 -0800 (PST) From: Bryan O'Donoghue To: u-boot@lists.denx.de, brenomatheus@gmail.com Date: Fri, 12 Jan 2018 12:39:57 +0000 Message-Id: <1515760819-15116-4-git-send-email-bryan.odonoghue@linaro.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1515760819-15116-1-git-send-email-bryan.odonoghue@linaro.org> References: <1515760819-15116-1-git-send-email-bryan.odonoghue@linaro.org> Cc: Fabio Estevam Subject: [U-Boot] [PATCH v6 03/25] arm: imx: hab: Optimise flow of authenticate_image on is_enabled fail X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.18 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" There is no need to call is_enabled() twice in authenticate_image - it does nothing but add an additional layer of indentation. We can check for is_enabled() at the start of the function and return the result code directly. Signed-off-by: Bryan O'Donoghue Cc: Stefano Babic Cc: Fabio Estevam Cc: Peng Fan Cc: Albert Aribaud Cc: Sven Ebenfeld Cc: George McCollister Cc: Breno Matheus Lima Tested-by: Breno Lima Reviewed-by: Fabio Estevam --- arch/arm/mach-imx/hab.c | 138 ++++++++++++++++++++++++------------------------ 1 file changed, 69 insertions(+), 69 deletions(-) diff --git a/arch/arm/mach-imx/hab.c b/arch/arm/mach-imx/hab.c index 9fe6d43..6f86c02 100644 --- a/arch/arm/mach-imx/hab.c +++ b/arch/arm/mach-imx/hab.c @@ -428,91 +428,91 @@ int authenticate_image(uint32_t ddr_start, uint32_t image_size) hab_rvt_entry = hab_rvt_entry_p; hab_rvt_exit = hab_rvt_exit_p; - if (is_hab_enabled()) { - printf("\nAuthenticate image from DDR location 0x%x...\n", - ddr_start); + if (!is_hab_enabled()) { + puts("hab fuse not enabled\n"); + return result; + } - hab_caam_clock_enable(1); + printf("\nAuthenticate image from DDR location 0x%x...\n", + ddr_start); - if (hab_rvt_entry() == HAB_SUCCESS) { - /* If not already aligned, Align to ALIGN_SIZE */ - ivt_offset = (image_size + ALIGN_SIZE - 1) & - ~(ALIGN_SIZE - 1); + hab_caam_clock_enable(1); - start = ddr_start; - bytes = ivt_offset + IVT_SIZE + CSF_PAD_SIZE; + if (hab_rvt_entry() == HAB_SUCCESS) { + /* If not already aligned, Align to ALIGN_SIZE */ + ivt_offset = (image_size + ALIGN_SIZE - 1) & + ~(ALIGN_SIZE - 1); + + start = ddr_start; + bytes = ivt_offset + IVT_SIZE + CSF_PAD_SIZE; #ifdef DEBUG - printf("\nivt_offset = 0x%x, ivt addr = 0x%x\n", - ivt_offset, ddr_start + ivt_offset); - puts("Dumping IVT\n"); - print_buffer(ddr_start + ivt_offset, - (void *)(ddr_start + ivt_offset), - 4, 0x8, 0); - - puts("Dumping CSF Header\n"); - print_buffer(ddr_start + ivt_offset+IVT_SIZE, - (void *)(ddr_start + ivt_offset+IVT_SIZE), - 4, 0x10, 0); + printf("\nivt_offset = 0x%x, ivt addr = 0x%x\n", + ivt_offset, ddr_start + ivt_offset); + puts("Dumping IVT\n"); + print_buffer(ddr_start + ivt_offset, + (void *)(ddr_start + ivt_offset), + 4, 0x8, 0); + + puts("Dumping CSF Header\n"); + print_buffer(ddr_start + ivt_offset + IVT_SIZE, + (void *)(ddr_start + ivt_offset + IVT_SIZE), + 4, 0x10, 0); #if !defined(CONFIG_SPL_BUILD) - get_hab_status(); + get_hab_status(); #endif - puts("\nCalling authenticate_image in ROM\n"); - printf("\tivt_offset = 0x%x\n", ivt_offset); - printf("\tstart = 0x%08lx\n", start); - printf("\tbytes = 0x%x\n", bytes); + puts("\nCalling authenticate_image in ROM\n"); + printf("\tivt_offset = 0x%x\n", ivt_offset); + printf("\tstart = 0x%08lx\n", start); + printf("\tbytes = 0x%x\n", bytes); #endif - /* - * If the MMU is enabled, we have to notify the ROM - * code, or it won't flush the caches when needed. - * This is done, by setting the "pu_irom_mmu_enabled" - * word to 1. You can find its address by looking in - * the ROM map. This is critical for - * authenticate_image(). If MMU is enabled, without - * setting this bit, authentication will fail and may - * crash. - */ - /* Check MMU enabled */ - if (is_soc_type(MXC_SOC_MX6) && get_cr() & CR_M) { - if (is_mx6dq()) { - /* - * This won't work on Rev 1.0.0 of - * i.MX6Q/D, since their ROM doesn't - * do cache flushes. don't think any - * exist, so we ignore them. - */ - if (!is_mx6dqp()) - writel(1, MX6DQ_PU_IROM_MMU_EN_VAR); - } else if (is_mx6sdl()) { - writel(1, MX6DLS_PU_IROM_MMU_EN_VAR); - } else if (is_mx6sl()) { - writel(1, MX6SL_PU_IROM_MMU_EN_VAR); - } + /* + * If the MMU is enabled, we have to notify the ROM + * code, or it won't flush the caches when needed. + * This is done, by setting the "pu_irom_mmu_enabled" + * word to 1. You can find its address by looking in + * the ROM map. This is critical for + * authenticate_image(). If MMU is enabled, without + * setting this bit, authentication will fail and may + * crash. + */ + /* Check MMU enabled */ + if (is_soc_type(MXC_SOC_MX6) && get_cr() & CR_M) { + if (is_mx6dq()) { + /* + * This won't work on Rev 1.0.0 of + * i.MX6Q/D, since their ROM doesn't + * do cache flushes. don't think any + * exist, so we ignore them. + */ + if (!is_mx6dqp()) + writel(1, MX6DQ_PU_IROM_MMU_EN_VAR); + } else if (is_mx6sdl()) { + writel(1, MX6DLS_PU_IROM_MMU_EN_VAR); + } else if (is_mx6sl()) { + writel(1, MX6SL_PU_IROM_MMU_EN_VAR); } + } - load_addr = (uint32_t)hab_rvt_authenticate_image( - HAB_CID_UBOOT, - ivt_offset, (void **)&start, - (size_t *)&bytes, NULL); - if (hab_rvt_exit() != HAB_SUCCESS) { - puts("hab exit function fail\n"); - load_addr = 0; - } - } else { - puts("hab entry function fail\n"); + load_addr = (uint32_t)hab_rvt_authenticate_image( + HAB_CID_UBOOT, + ivt_offset, (void **)&start, + (size_t *)&bytes, NULL); + if (hab_rvt_exit() != HAB_SUCCESS) { + puts("hab exit function fail\n"); + load_addr = 0; } + } else { + puts("hab entry function fail\n"); + } - hab_caam_clock_enable(0); + hab_caam_clock_enable(0); #if !defined(CONFIG_SPL_BUILD) - get_hab_status(); + get_hab_status(); #endif - } else { - puts("hab fuse not enabled\n"); - } - - if ((!is_hab_enabled()) || (load_addr != 0)) + if (load_addr != 0) result = 0; return result;