summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorBreno Lima <breno.lima@nxp.com>2019-02-15 16:09:08 -0200
committerYe Li <ye.li@nxp.com>2022-04-06 18:02:49 +0800
commitf85c55844ae1b47030bf393bd8a468a0f0d1c7ef (patch)
tree5b475dfcd795faa08fb1ba0aef47ef813bc2ffe4 /doc
parent659dde321d22bbd090916404076d1a7008d050d5 (diff)
MLK-20935-1 doc: imx: habv4: Add section to avoid crash when OP-TEE is enabled
Starting in L4.14.78 release, the OP-TEE CAAM driver does not set the JROWN_NS field in case LMID is locked. We need to include the Unlock MID command in CSF file otherwise device will fail to boot in HAB closed mode. Add section to avoid crash when OP-TEE is enabled. Reported-by: Frank Zhang <frank.zhang@nxp.com> Signed-off-by: Breno Lima <breno.lima@nxp.com> Reviewed-by: Ye Li <ye.li@nxp.com> (cherry picked from commit af03284ad38bd03ef1f0d4942842629db93d2c11) (cherry picked from commit 66f05532d587e50631eef066c4190936e0d33583) (cherry picked from commit c2ffee032e21bbd9fa9e43cc60b60dd039a61133) (cherry picked from commit b06f0a8d6eb0f04c2f3b692ebf34e1247ec1f64a) (cherry picked from commit a731ecb1ae20fe39bf0a97772bbdf0c11c8b7413)
Diffstat (limited to 'doc')
-rw-r--r--doc/imx/habv4/guides/mx6_mx7_secure_boot.txt17
1 files changed, 17 insertions, 0 deletions
diff --git a/doc/imx/habv4/guides/mx6_mx7_secure_boot.txt b/doc/imx/habv4/guides/mx6_mx7_secure_boot.txt
index 53f71fbc3e..7439402b6e 100644
--- a/doc/imx/habv4/guides/mx6_mx7_secure_boot.txt
+++ b/doc/imx/habv4/guides/mx6_mx7_secure_boot.txt
@@ -110,6 +110,23 @@ the U-Boot build, the example below is a log for mx7dsabresd_defconfig target:
Block = 0x877ff400 0x00000000 0x0009ec00 "u-boot-dtb.imx"
+1.3.1 Avoiding Kernel crash when OP-TEE is enabled
+---------------------------------------------------
+
+For devices prior to HAB v4.4.0, the HAB code locks the Job Ring and DECO
+master ID registers in HAB closed configuration. In case the user specific
+application requires any changes in CAAM MID registers it's necessary to
+add the "Unlock CAAM MID" command in CSF file.
+
+The current NXP OP-TEE implementation expects the CAAM registers to be unlocked
+when configuring CAAM to operate in non-secure TrustZone world.
+
+- Add Unlock MID command in CSF:
+
+ [Unlock]
+ Engine = CAAM
+ Features = MID
+
1.4 Signing the U-Boot binary
------------------------------