From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 0F521C4332F for ; Sat, 24 Dec 2022 01:16:21 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 15A21854D0; Sat, 24 Dec 2022 02:15:52 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=quarantine dis=none) header.from=ti.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; unprotected) header.d=ti.com header.i=@ti.com header.b="UIKTJRIl"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 369178523F; Sat, 24 Dec 2022 02:15:46 +0100 (CET) Received: from lelv0142.ext.ti.com (lelv0142.ext.ti.com [198.47.23.249]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 1960C854B2 for ; Sat, 24 Dec 2022 02:15:40 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=quarantine dis=none) header.from=ti.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=bb@ti.com Received: from fllv0035.itg.ti.com ([10.64.41.0]) by lelv0142.ext.ti.com (8.15.2/8.15.2) with ESMTP id 2BO1Fd7O074419; Fri, 23 Dec 2022 19:15:39 -0600 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=ti-com-17Q1; t=1671844539; bh=Gbj9U4Ax4ZANSEIferKcGLuf+gw80f8ZJfofacy+IGc=; h=From:To:CC:Subject:Date:In-Reply-To:References; b=UIKTJRIl4OvOD1wNXg4KpBrZxB+N/z+0Et0fulgP+2H9A0uQDPiLpfXtawROutttR 41Me7ssHRAiC0JPmdic07IHFwFClUj3D+i11uyIBpcL1B/1zceUuovCjScFAY/f0RA wHtq/rDVlwDkUuliDsQBhVPVmNCVE2b6sHAhS0Fk= Received: from DFLE113.ent.ti.com (dfle113.ent.ti.com [10.64.6.34]) by fllv0035.itg.ti.com (8.15.2/8.15.2) with ESMTPS id 2BO1FdLl028618 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=FAIL); Fri, 23 Dec 2022 19:15:39 -0600 Received: from DFLE111.ent.ti.com (10.64.6.32) by DFLE113.ent.ti.com (10.64.6.34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2507.16; Fri, 23 Dec 2022 19:15:38 -0600 Received: from fllv0040.itg.ti.com (10.64.41.20) by DFLE111.ent.ti.com (10.64.6.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2507.16 via Frontend Transport; Fri, 23 Dec 2022 19:15:38 -0600 Received: from localhost (ileaxei01-snat2.itg.ti.com [10.180.69.6]) by fllv0040.itg.ti.com (8.15.2/8.15.2) with ESMTP id 2BO1FcP3078690; Fri, 23 Dec 2022 19:15:38 -0600 From: Bryan Brattlof To: Tom Rini , Vignesh Raghavendra , Andrew Davis , Judith Mendez , Kamlesh Gurudasani CC: UBoot Mailing List , Bryan Brattlof Subject: [PATCH 2/5] configs: am62a: move stack and heap to HSM RAM Date: Fri, 23 Dec 2022 19:15:22 -0600 Message-ID: <20221224011525.4696-3-bb@ti.com> X-Mailer: git-send-email 2.39.0 In-Reply-To: <20221224011525.4696-1-bb@ti.com> References: <20221224011525.4696-1-bb@ti.com> MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=1296; i=bb@ti.com; h=from:subject; bh=xZXm7Ky0uwGvkBaoNyPfaF06gAxt6YvAQw2OVe6N7ko=; b=owNCWmg5MUFZJlNZDHmXOwAAbX/////Zm3/xv/6de7fZ+uvu79Hr7/23+0v/5s0qt1XrteewARtW CHqA9TIBkAAAADQBoAAeoAABo0Gg9IZAaabUaAGQDQAaDQeoNPU9T1GntFEBoNBoNNGmmQNDQA0MjC BkNGmmQaeoAAB6T0mmgzUAGjJo00xNGQyYjIABpkAdBkNGmmjTQAaGhoDEDQZBk0aAAxNAaYgNNojB Mg9QYQNAAZAxqBoDCaADh9aGtgoLLN8juDGwIEQLHQGKUSzImjdtdO9YgxNeMjA1W+kTIT9nlK0LMn HG74PtNYkcRIyTxonRTQhnCB1zwWcWz6Cy6jM4Bu5NtyWoByF1rMm6zQViwZwV6hLOqn/yZkAOpwz9 AI9DSmejfBGfcm0Wp0+j9C4e4fUgLWYaBjdAxekP6p10t/LWMeAlC5VczpJqqL32AcihVK+YJUhKfi /yDiZ+b9eg8LBcTvC56Rn66YUIaRwaUbg1sjV1gdM9XCpNEcJxipAQiI5FpQOy/GnUqhgm41/VpnGD LwAP43K9YKzD3ncrFWs55CUSuCTpEJqoBg4Cff0k6gDElIbGn6L7T0oPlqcrI0UOrEIb+39MQIH9EE f/lAUWbnjFrDBIr6ZChQCXoDyzuNpF5xeyudgHfww1TfFhIx0BQnqeaYlsN/xdyRThQkAx5lzs X-Developer-Key: i=bb@ti.com; a=openpgp; fpr=D3D177E40A38DF4D1853FEEF41B90D5D71D56CE0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-EXCLAIMER-MD-CONFIG: e1e8a2fd-e40a-4ac6-ac9b-f7e9cc9ee180 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.6 at phobos.denx.de X-Virus-Status: Clean Texas Instruments has begun enabling security setting on the SoCs they produce to instruct ROM and TIFS to begin protecting the Security Management Subsystem (SMS) from other binaries we load into the chip by default. One way ROM does this is by enabling firewalls to protect the OCSRAM region it's using during bootup. Only after TIFS has started (and had time to disable the OCSRAM firewall region) will we have write access to the region. This means we will need to move the stack & heap from OCSRAM to HSM RAM and reduce the size of BSS and the SPL to allow it to fit properly. Signed-off-by: Bryan Brattlof --- configs/am62ax_evm_r5_defconfig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/configs/am62ax_evm_r5_defconfig b/configs/am62ax_evm_r5_defconfig index bfffb8eef77d8..0e48f0afa20a5 100644 --- a/configs/am62ax_evm_r5_defconfig +++ b/configs/am62ax_evm_r5_defconfig @@ -19,7 +19,7 @@ CONFIG_SPL_SIZE_LIMIT_PROVIDE_STACK=0x3500 CONFIG_SPL_FS_FAT=y CONFIG_SPL_LIBDISK_SUPPORT=y CONFIG_HAS_CUSTOM_SYS_INIT_SP_ADDR=y -CONFIG_CUSTOM_SYS_INIT_SP_ADDR=0x7000ffff +CONFIG_CUSTOM_SYS_INIT_SP_ADDR=0x43c3a7f0 CONFIG_SPL_LOAD_FIT=y CONFIG_SPL_LOAD_FIT_ADDRESS=0x80080000 CONFIG_SPL_FIT_IMAGE_POST_PROCESS=y -- 2.39.0