mail archive of the barebox mailing list
 help / color / mirror / Atom feed
* [PATCH master] nvmem: bsec: make OP-TEE TA interaction optional
@ 2024-05-24 10:35 Ahmad Fatoum
  2024-05-24 11:41 ` Sascha Hauer
  0 siblings, 1 reply; 2+ messages in thread
From: Ahmad Fatoum @ 2024-05-24 10:35 UTC (permalink / raw)
  To: barebox; +Cc: Xogium, Ahmad Fatoum

When targeting older OP-TEE versions, a PTA for BSEC access may not be
available. Allow disabling STM32_BSEC_OPTEE_TA in this case, so the
driver falls back to the secure monitor call silicon provider service.

Reported-by: Xogium <contact@xogium.me>
Signed-off-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
---
 drivers/nvmem/Kconfig | 7 +++++--
 1 file changed, 5 insertions(+), 2 deletions(-)

diff --git a/drivers/nvmem/Kconfig b/drivers/nvmem/Kconfig
index 255198b2ad81..349471ce3932 100644
--- a/drivers/nvmem/Kconfig
+++ b/drivers/nvmem/Kconfig
@@ -91,10 +91,13 @@ config STM32_BSEC_WRITE
 	    mw -l -d /dev/stm32-bsec 0x000000e8+4 0x0000bc9a
 
 config STM32_BSEC_OPTEE_TA
-	def_bool STM32_BSEC && OPTEE
+	bool "Support BSEC access over OP-TEE TA"
+	depends on STM32_BSEC && OPTEE
+	default y
 	help
 	  Say y here to enable the accesses to STM32MP SoC OTPs by the OP-TEE
-	  trusted application STM32MP BSEC.
+	  trusted application STM32MP BSEC in addition to the older SMC SiP
+	  service.
 
 config KVX_OTP_NV
 	tristate "kalray KVX OTP Non volatile regs Support"
-- 
2.39.2




^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2024-05-24 11:42 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-05-24 10:35 [PATCH master] nvmem: bsec: make OP-TEE TA interaction optional Ahmad Fatoum
2024-05-24 11:41 ` Sascha Hauer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox