summaryrefslogtreecommitdiff
path: root/configs/am62x_evm_a53_defconfig
diff options
context:
space:
mode:
authorPraneeth Bajjuri <[email protected]>2023-04-05 17:40:47 -0500
committerTom Rini <[email protected]>2023-05-04 13:03:54 -0400
commit8f3e2d14a6cd0fb0441f4c1fcd5b4c7bc5ad54a2 (patch)
tree00cdb866c47845a00e4cd7b47f7a7c8a9bf6e470 /configs/am62x_evm_a53_defconfig
parent8048a34376b1fa5856d646e188311533c51729fc (diff)
configs: am62x: enable secure device configs by default
Enable the CONFIG_TI_SECURE_DEVICE by default Non-HS devices will continue to boot due to runtime device type detection. TI's security enforcing SoCs will authenticate each binary it loads by comparing it's signature with keys etched into the SoC during the boot up process. The am62x family of SoCs by default will have some level of security enforcement checking. To keep things as simple as possible, enable the CONFIG_TI_SECURE_DEVICE options by default so all levels of secure SoCs will work out of the box Signed-off-by: Praneeth Bajjuri <[email protected]> Signed-off-by: Kamlesh Gurudasani <[email protected]> Signed-off-by: Bryan Brattlof <[email protected]>
Diffstat (limited to 'configs/am62x_evm_a53_defconfig')
-rw-r--r--configs/am62x_evm_a53_defconfig1
1 files changed, 1 insertions, 0 deletions
diff --git a/configs/am62x_evm_a53_defconfig b/configs/am62x_evm_a53_defconfig
index 832243a7312..a2cd4f703dc 100644
--- a/configs/am62x_evm_a53_defconfig
+++ b/configs/am62x_evm_a53_defconfig
@@ -1,5 +1,6 @@
CONFIG_ARM=y
CONFIG_ARCH_K3=y
+CONFIG_TI_SECURE_DEVICE=y
CONFIG_SYS_MALLOC_F_LEN=0x8000
CONFIG_SPL_LIBCOMMON_SUPPORT=y
CONFIG_SPL_LIBGENERIC_SUPPORT=y