On Thu, May 18, 2023 at 12:44:17PM +0530, Manorit Chawdhry wrote:

> K3 GP devices allows booting the secure binaries on them by bypassing
> the x509 header on them.
> 
> ATF and OPTEE firewalling required the rproc_load to be called before
> authentication. This change caused the failure for GP devices that
> strips off the headers. The boot vector had been set before the headers
> were stripped off causing the runtime stripping to fail and stripping
> becoming in-effective.
> 
> Separate out the secure binary check on GP/HS devices so that the
> boot_vector could be stripped before calling rproc_load. This allows
> keeping the authentication later when the cluster is on along with
> allowing the stripping of the binaries in case of gp devices.
> 
> Fixes: 1e00e9be62e5 ("arm: mach-k3: common: re-locate authentication for 
> atf/optee")
> 
> Signed-off-by: Manorit Chawdhry <m-chawd...@ti.com>

Applied to u-boot/master, thanks!

-- 
Tom

Attachment: signature.asc
Description: PGP signature

Reply via email to