Message ID | 20241209084531.1412473-1-a-shenai@ti.com |
---|---|
State | Superseded |
Delegated to: | Ryan Eatmon |
Headers | show |
Series | [meta-ti,master/scarthgap,v3] recipes-security: optee: Remove softare PRNG for am62pxx | expand |
Hi, s/softare/software in commit message title On 09/12/24 14:15, Aashvij Shenai wrote: > With the latest TIFS fix [1], AM62P is able to leverage the hardware-TRNG > instead of having to fallback into the software-PRNG. > > Backgroud: s/Backgroud/Background -- Chirag > The default priv-id for A53 cores in SYSFW for AM62P was chosen to be 4 > while the other K3 SOCs were configured at 1. Any firewall TISCI API > call that used 1 would not be able to run on AM62P. The TIFS fix changes > the AM62P value from 4 to 1. > > [1] - > https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/commit/?h=ti-linux-firmware&id=98de0a4290ec200cc224d4a5a6f42d2126230e2f > > Signed-off-by: Aashvij Shenai <a-shenai@ti.com> > --- > > Changelog: > v2 -> v3: > - Updated commit message to give background and branch link > - Updated commit title to conform to standard > > v1 -> v2: > - Updated commit message to include fix and moved test logs > > Testlogs: https://gist.github.com/AashvijShenai/9ea3e128ab29f703c2b6d988cfd0b82a > > --- > meta-ti-bsp/recipes-security/optee/optee-os-ti-overrides.inc | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/meta-ti-bsp/recipes-security/optee/optee-os-ti-overrides.inc b/meta-ti-bsp/recipes-security/optee/optee-os-ti-overrides.inc > index 43b8ce1c..f131f1ff 100644 > --- a/meta-ti-bsp/recipes-security/optee/optee-os-ti-overrides.inc > +++ b/meta-ti-bsp/recipes-security/optee/optee-os-ti-overrides.inc > @@ -6,7 +6,7 @@ EXTRA_OEMAKE:remove = "CFG_MAP_EXT_DT_SECURE=y" > EXTRA_OEMAKE:append:k3 = "${@ ' CFG_CONSOLE_UART='+ d.getVar('OPTEE_K3_USART') if d.getVar('OPTEE_K3_USART') else ''}" > > EXTRA_OEMAKE:append:am62xx = " CFG_TEE_CORE_LOG_LEVEL=1" > -EXTRA_OEMAKE:append:am62pxx = " CFG_WITH_SOFTWARE_PRNG=y CFG_TEE_CORE_LOG_LEVEL=1" > +EXTRA_OEMAKE:append:am62pxx = " CFG_TEE_CORE_LOG_LEVEL=1" > EXTRA_OEMAKE:append:am62axx = " CFG_TEE_CORE_LOG_LEVEL=1" > EXTRA_OEMAKE:append:j722s = " CFG_TEE_CORE_LOG_LEVEL=1" >
diff --git a/meta-ti-bsp/recipes-security/optee/optee-os-ti-overrides.inc b/meta-ti-bsp/recipes-security/optee/optee-os-ti-overrides.inc index 43b8ce1c..f131f1ff 100644 --- a/meta-ti-bsp/recipes-security/optee/optee-os-ti-overrides.inc +++ b/meta-ti-bsp/recipes-security/optee/optee-os-ti-overrides.inc @@ -6,7 +6,7 @@ EXTRA_OEMAKE:remove = "CFG_MAP_EXT_DT_SECURE=y" EXTRA_OEMAKE:append:k3 = "${@ ' CFG_CONSOLE_UART='+ d.getVar('OPTEE_K3_USART') if d.getVar('OPTEE_K3_USART') else ''}" EXTRA_OEMAKE:append:am62xx = " CFG_TEE_CORE_LOG_LEVEL=1" -EXTRA_OEMAKE:append:am62pxx = " CFG_WITH_SOFTWARE_PRNG=y CFG_TEE_CORE_LOG_LEVEL=1" +EXTRA_OEMAKE:append:am62pxx = " CFG_TEE_CORE_LOG_LEVEL=1" EXTRA_OEMAKE:append:am62axx = " CFG_TEE_CORE_LOG_LEVEL=1" EXTRA_OEMAKE:append:j722s = " CFG_TEE_CORE_LOG_LEVEL=1"
With the latest TIFS fix [1], AM62P is able to leverage the hardware-TRNG instead of having to fallback into the software-PRNG. Backgroud: The default priv-id for A53 cores in SYSFW for AM62P was chosen to be 4 while the other K3 SOCs were configured at 1. Any firewall TISCI API call that used 1 would not be able to run on AM62P. The TIFS fix changes the AM62P value from 4 to 1. [1] - https://git.ti.com/cgit/processor-firmware/ti-linux-firmware/commit/?h=ti-linux-firmware&id=98de0a4290ec200cc224d4a5a6f42d2126230e2f Signed-off-by: Aashvij Shenai <a-shenai@ti.com> --- Changelog: v2 -> v3: - Updated commit message to give background and branch link - Updated commit title to conform to standard v1 -> v2: - Updated commit message to include fix and moved test logs Testlogs: https://gist.github.com/AashvijShenai/9ea3e128ab29f703c2b6d988cfd0b82a --- meta-ti-bsp/recipes-security/optee/optee-os-ti-overrides.inc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)