From: Michael Walle Date: Wed, 6 May 2026 12:34:11 +0000 (+0200) Subject: caam: don't write memory at 0 on PPC X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=09bc47cc337522b4b8fe8ed037676d1601547f91;p=thirdparty%2Fu-boot.git caam: don't write memory at 0 on PPC For non-secure boot environments pamu_init() isn't called but the CAAM will still call sec_config_pamu_table() -> config_pamu() which then uses an uninitialized ppaact variable. In fact, that variable is initialized with 0, so the config_pamu() will happily assume the structure is there and will operate on that memory. Call pamu_init() in the non-secure boot case, too. Signed-off-by: Michael Walle Signed-off-by: Peng Fan --- diff --git a/arch/powerpc/cpu/mpc85xx/cpu_init.c b/arch/powerpc/cpu/mpc85xx/cpu_init.c index 739d14f8002..414782c835f 100644 --- a/arch/powerpc/cpu/mpc85xx/cpu_init.c +++ b/arch/powerpc/cpu/mpc85xx/cpu_init.c @@ -41,10 +41,12 @@ #ifdef CONFIG_FSL_CAAM #include #endif -#if defined(CONFIG_NXP_ESBC) && defined(CONFIG_FSL_CORENET) +#if defined(CONFIG_FSL_CORENET) #include +#if defined(CONFIG_NXP_ESBC) #include #endif +#endif #ifdef CONFIG_SYS_QE_FMAN_FW_IN_NAND #include #include @@ -899,6 +901,8 @@ int cpu_init_r(void) #if defined(CONFIG_NXP_ESBC) && defined(CONFIG_FSL_CORENET) if (pamu_init() < 0) fsl_secboot_handle_error(ERROR_ESBC_PAMU_INIT); +#elif defined(CONFIG_FSL_CORENET) + pamu_init(); #endif #ifdef CONFIG_FSL_CAAM