On Thu, May 18, 2023 at 12:44:17PM +0530, Manorit Chawdhry wrote: > K3 GP devices allows booting the secure binaries on them by bypassing > the x509 header on them. > > ATF and OPTEE firewalling required the rproc_load to be called before > authentication. This change caused the failure for GP devices that > strips off the headers. The boot vector had been set before the headers > were stripped off causing the runtime stripping to fail and stripping > becoming in-effective. > > Separate out the secure binary check on GP/HS devices so that the > boot_vector could be stripped before calling rproc_load. This allows > keeping the authentication later when the cluster is on along with > allowing the stripping of the binaries in case of gp devices. > > Fixes: 1e00e9be62e5 ("arm: mach-k3: common: re-locate authentication for > atf/optee") > > Signed-off-by: Manorit Chawdhry <m-chawd...@ti.com>
Applied to u-boot/master, thanks! -- Tom
signature.asc
Description: PGP signature