]> git.dujemihanovic.xyz Git - u-boot.git/commitdiff
include: env: ti: Add support for secure firmwares
authorUdit Kumar <u-kumar1@ti.com>
Tue, 21 May 2024 10:56:47 +0000 (16:26 +0530)
committerTom Rini <trini@konsulko.com>
Fri, 7 Jun 2024 20:00:43 +0000 (14:00 -0600)
Secure firmwares must be loaded if SOC is secure,
currently rproc framework chooses non-secure firmware always.

So adding support to load secure firmware, when SOC is secure

Signed-off-by: Manorit Chawdhry <m-chawdhry@ti.com>
Signed-off-by: Udit Kumar <u-kumar1@ti.com>
Signed-off-by: Simon Glass <sjg@chromium.org>
Reviewed-by: Andy Shevchenko <andriy.shevchenko@linux.intel.com> # Intel Edison
Reviewed-by: Bin Meng <bmeng.cn@gmail.com>
include/env/ti/k3_rproc.env
include/env/ti/ti_common.env

index 87d9d76eba46237c996a7647f32ac19e242c0839..d4f0f1708ca257a85e9bea19386c9c609c179ac8 100644 (file)
@@ -13,11 +13,15 @@ rproc_load_and_boot_one=
 boot_rprocs_mmc=
        env set rproc_id;
        env set rproc_fw;
+       env set secure_suffix;
+       if test ${secure_rprocs} -eq 1; then
+               env set secure_suffix -sec;
+       fi;
        for i in ${rproc_fw_binaries} ; do
                if test -z "${rproc_id}" ; then
                        env set rproc_id $i;
                else
-                       env set rproc_fw $i;
+                       env set rproc_fw $i${secure_suffix};
                        run rproc_load_and_boot_one;
                        env set rproc_id;
                        env set rproc_fw;
index 02b410c3adc4255fdc4cbd7ab5853d495756fce0..c5c36421770c47fc34795a858d22f339863648b9 100644 (file)
@@ -12,6 +12,7 @@ bootm_size=0x10000000
 boot_fdt=try
 
 boot_fit=0
+secure_rprocs=0
 addr_fit=0x90000000
 name_fit=fitImage
 update_to_fit=setenv loadaddr ${addr_fit}; setenv bootfile ${name_fit}