mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-12-21 02:33:07 +00:00
352ed65df7
The M.2 slots of the related IOT2050 variant need to be configured according to the plugged cards. This tries to detect the card using the M.2 configuration pins of the B-key slot. If that fails, a U-Boot environment variable can be set to configure manually. This variable is write-permitted also in secure boot mode as it is not able to undermine the integrity of the booted system. The configuration is then applied to mux the serdes and to fix up the device tree passed to or loaded by the bootloader. The fix-ups are coming from device tree overlays that are embedded into the firmware image and there also integrity protected. The OS remains free to load a device tree to which they do not apply: U-Boot will not fail to boot in that case. Based on original patch by Chao Zeng. Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
165 lines
4.4 KiB
ReStructuredText
165 lines
4.4 KiB
ReStructuredText
.. SPDX-License-Identifier: GPL-2.0+
|
|
.. sectionauthor:: Jan Kiszka <jan.kiszka@siemens.com>
|
|
|
|
SIMATIC IOT2050 BASIC and ADVANCED
|
|
==================================
|
|
|
|
The SIMATIC IOT2050 is an open industrial IoT gateway that is using the TI
|
|
AM6528 GP (Basic variant) or the AM6548 HS (Advanced variant). The Advanced
|
|
variant is prepared for secure boot. M.2 Variant also uses the AM6548 HS.
|
|
Instead of a MiniPCI connector, it comes with two M.2 connectors and can
|
|
support 5G/WIFI/BT applications or connect an SSD.
|
|
|
|
The IOT2050 starts only from OSPI. It loads a Siemens-provided bootloader
|
|
called SE-Boot for the MCU domain (R5F cores), then hands over to ATF and
|
|
OP-TEE, before booting U-Boot on the A53 cores. This describes how to build all
|
|
open artifacts into a flashable image for the OSPI flash. The flash image will
|
|
work on both variants.
|
|
|
|
Dependencies
|
|
------------
|
|
|
|
ATF: Upstream release 2.4 or newer
|
|
OP-TEE: Upstream release 3.10.0 or newer
|
|
|
|
Binary dependencies can be found in
|
|
https://github.com/siemens/meta-iot2050/tree/master/recipes-bsp/u-boot/files/prebuild.
|
|
The following binaries from that source need to be present in the build folder:
|
|
|
|
- seboot_pg1.bin
|
|
- seboot_pg2.bin
|
|
|
|
When using the watchdog, a related firmware for the R5 core(s) is needed, e.g.
|
|
https://github.com/siemens/k3-rti-wdt. The name and location of the image is
|
|
configured via CONFIG_WDT_K3_RTI_FW_FILE.
|
|
|
|
For building an image containing the OTP key provisioning data, below binary
|
|
needs to be present in the build folder:
|
|
|
|
- otpcmd.bin
|
|
|
|
Regarding how to generating this otpcmd.bin, please refer to:
|
|
https://github.com/siemens/meta-iot2050/tree/master/recipes-bsp/secure-boot-otp-provisioning/files/make-otpcmd.sh
|
|
|
|
Building
|
|
--------
|
|
|
|
Make sure that CROSS_COMPILE is set appropriately:
|
|
|
|
.. code-block:: text
|
|
|
|
$ export CROSS_COMPILE=aarch64-linux-gnu-
|
|
|
|
ATF:
|
|
|
|
.. code-block:: text
|
|
|
|
$ make PLAT=k3 SPD=opteed K3_USART=1
|
|
|
|
OP-TEE:
|
|
|
|
.. code-block:: text
|
|
|
|
$ make PLATFORM=k3-am65x CFG_ARM64_core=y CFG_TEE_CORE_LOG_LEVEL=2 CFG_CONSOLE_UART=1 CFG_USER_TA_TARGETS="ta_arm64"
|
|
|
|
U-Boot:
|
|
|
|
.. code-block:: text
|
|
|
|
$ export ATF=/path/to/bl31.bin
|
|
$ export TEE=/path/to/tee-pager_v2.bin
|
|
|
|
# configure for PG1
|
|
$ make iot2050_pg1_defconfig
|
|
|
|
# or configure for PG2 or the M.2 variant
|
|
$ make iot2050_pg2_defconfig
|
|
|
|
$ make
|
|
|
|
Flashing
|
|
--------
|
|
|
|
Via U-Boot:
|
|
|
|
.. code-block:: text
|
|
|
|
IOT2050> sf probe
|
|
IOT2050> load mmc 0:1 $loadaddr /path/to/flash.bin
|
|
IOT2050> sf update $loadaddr 0x0 $filesize
|
|
|
|
Via external programmer Dediprog SF100 or SF600:
|
|
|
|
.. code-block:: text
|
|
|
|
$ dpcmd --vcc 2 -v -u flash.bin
|
|
|
|
Signing (optional)
|
|
------------------
|
|
|
|
To enable verified boot for the firmware artifacts after the Siemens-managed
|
|
first-stage loader (seboot_pg*.bin), the following steps need to be taken
|
|
before and after the build:
|
|
|
|
Generate dtsi holding the public key
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
.. code-block:: text
|
|
|
|
tools/key2dtsi.py -c -s key.pem public-key.dtsi
|
|
|
|
This will be used to embed the public key into U-Boot SPL and main so that each
|
|
step can validate signatures of the succeeding one.
|
|
|
|
Adjust U-Boot configuration
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Enabled at least the following options in U-Boot:
|
|
|
|
.. code-block:: text
|
|
|
|
CONFIG_SPL_FIT_SIGNATURE=y
|
|
CONFIG_DEVICE_TREE_INCLUDES="/path/to/public-key.dtsi"
|
|
CONFIG_RSA=y
|
|
|
|
Note that there are more configuration changes needed in order to lock-down
|
|
the command line and the boot process of U-Boot for secure scenarios. These are
|
|
not in scope here.
|
|
|
|
Build U-Boot
|
|
^^^^^^^^^^^^
|
|
|
|
See related section above.
|
|
|
|
Sign flash.bin
|
|
^^^^^^^^^^^^^^
|
|
|
|
In the build folder still containing artifacts from step 3, invoke:
|
|
|
|
.. code-block:: text
|
|
|
|
tools/iot2050-sign-fw.sh /path/to/key.pem
|
|
|
|
Flash signed flash.bin
|
|
^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
The signing has happen in-place in flash.bin, thus the flashing procedure
|
|
described above.
|
|
|
|
M.2 slot configuration
|
|
----------------------
|
|
|
|
The M.2 variant of the IOT2050 comes with one B-keyed and one E-keyed slot.
|
|
These are configured by U-Boot depending on the detected usage (auto
|
|
configuration). The device tree loaded later on for the OS will be fixed up
|
|
by U-Boot according to this configuration.
|
|
|
|
For the case auto configuration does not work reliably, it is possible to set
|
|
the U-Boot environment variable "m2_manual_config" to select the mode manually:
|
|
|
|
"0" - B-key: PCIe x2, USB 2.0
|
|
E-key: USB 2.0
|
|
"1" - B-key: PCIe, USB 2.0
|
|
E-key: PCIe, USB 2.0
|
|
"2" - B-key: USB 3.0,
|
|
E-key: PCIe, USB 2.0
|