Message ID | 20230405224047.14363-1-praneeth@ti.com |
---|---|
State | Accepted |
Commit | 8f3e2d14a6cd0fb0441f4c1fcd5b4c7bc5ad54a2 |
Delegated to: | Tom Rini |
Headers | show |
Series | configs: am62x: enable secure device configs by default | expand |
On Wed, Apr 05, 2023 at 05:40:47PM -0500, Praneeth Bajjuri wrote: > Enable the CONFIG_TI_SECURE_DEVICE by default > > Non-HS devices will continue to boot due to runtime device type detection. > > TI's security enforcing SoCs will authenticate each binary it loads by > comparing it's signature with keys etched into the SoC during the boot > up process. The am62x family of SoCs by default will have some level of > security enforcement checking. To keep things as simple as possible, > enable the CONFIG_TI_SECURE_DEVICE options by default so all levels of > secure SoCs will work out of the box > > Signed-off-by: Praneeth Bajjuri <praneeth@ti.com> > Signed-off-by: Kamlesh Gurudasani <kamlesh@ti.com> > Signed-off-by: Bryan Brattlof <bb@ti.com> Applied to u-boot/master, thanks!
diff --git a/configs/am62x_evm_a53_defconfig b/configs/am62x_evm_a53_defconfig index cc9c8eab3e..fc76d88727 100644 --- a/configs/am62x_evm_a53_defconfig +++ b/configs/am62x_evm_a53_defconfig @@ -1,5 +1,6 @@ CONFIG_ARM=y CONFIG_ARCH_K3=y +CONFIG_TI_SECURE_DEVICE=y CONFIG_SYS_MALLOC_F_LEN=0x8000 CONFIG_SPL_LIBCOMMON_SUPPORT=y CONFIG_SPL_LIBGENERIC_SUPPORT=y diff --git a/configs/am62x_evm_r5_defconfig b/configs/am62x_evm_r5_defconfig index 44a9130d99..cab8c820f9 100644 --- a/configs/am62x_evm_r5_defconfig +++ b/configs/am62x_evm_r5_defconfig @@ -1,5 +1,6 @@ CONFIG_ARM=y CONFIG_ARCH_K3=y +CONFIG_TI_SECURE_DEVICE=y CONFIG_SYS_MALLOC_LEN=0x08000000 CONFIG_SYS_MALLOC_F_LEN=0x9000 CONFIG_SPL_LIBCOMMON_SUPPORT=y