Hi Peng, On 25-08-21, Peng Fan wrote: > Hi Marco, > > > Subject: Re: [PATCH v18 0/7] firmware: imx: driver for NXP secure- > > enclave > > > > > Shawn mentioned for the v17, he wanted to test this [1]. Marco had > > > some concerns on the general approach [2]. How can we move on? > > > > > > FWIW I have tested the v15 of this series with the ELE OTP driver [3] > > > on > > > i.MX93 and we use this currently in our downstream kernel. > > > > From my pov, this series causes more confusions till the ELE FW fix is > > available because you need to be really careful during the integration > > in case of a verified-boot setup which are the most common setups > > these days. > > > > Not sure why NXP doesn't just add the OP-TEE support for the required > > features e.g. eFuses, watchdog, HWRNG. The whole Linux part is mostly > > in place. > > You mean let OP-TEE handle eFuses, watchdog, HWRNG, then linux > relies on OP-TEE to use the features? Exactly, due to the FW issue only one MU can be used. OP-TEE could use the secure MU and Linux uses the features via OP-TEE because these features are not very timing critical and some features are _only_ available through OP-TEE, e.g. writing eFuses after the device was locked-down. Regards, Marco > > Thanks, > Peng. > > > > > Regards, > > Marco > > > > > > > > [1] > > > > > https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2F > > patc > > > hwork.kernel.org%2Fproject%2Flinux- > > mm%2Fpatch%2F20250424111632.103637- > > > 1- > > lorenzo.stoakes%40oracle.com%2F%2326356782&data=05%7C02%7C > > peng.fan%4 > > > > > 0nxp.com%7C1ac2ac137e8a41d871c508dde098450d%7C686ea1d3bc > > 2b4c6fa92cd99c > > > > > 5c301635%7C0%7C0%7C638913666802700666%7CUnknown%7CTW > > FpbGZsb3d8eyJFbXB0 > > > > > eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiT > > WFpbCIsIl > > > > > dUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=%2FSC9WU4CoKtPrVuhjL > > uLC7trQhAcbEkaCu > > > xohN%2FIuM0%3D&reserved=0 > > > [2] > > > > > https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2F > > patc > > > hwork.kernel.org%2Fproject%2Flinux-arm- > > kernel%2Fpatch%2F20250619-imx-s > > > e-if-v18-3- > > c98391ba446d%40nxp.com%2F%2326443037&data=05%7C02%7Cpe > > ng.fa > > > > > n%40nxp.com%7C1ac2ac137e8a41d871c508dde098450d%7C686ea1 > > d3bc2b4c6fa92cd > > > > > 99c5c301635%7C0%7C0%7C638913666802714776%7CUnknown%7C > > TWFpbGZsb3d8eyJFb > > > > > XB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOI > > joiTWFpbCI > > > > > sIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=B%2BUZWN6OjkEu27C > > By1%2FFKte9Uw9NQ > > > DA%2Be9EdPZhtAUk%3D&reserved=0 > > > [3] > > > > > https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2F > > patc > > > hwork.kernel.org%2Fproject%2Flinux-arm- > > kernel%2Fpatch%2F20250416142715 > > > .1042363-2- > > frieder%40fris.de%2F&data=05%7C02%7Cpeng.fan%40nxp.com%7C1a > > > > > c2ac137e8a41d871c508dde098450d%7C686ea1d3bc2b4c6fa92cd99c > > 5c301635%7C0% > > > > > 7C0%7C638913666802731697%7CUnknown%7CTWFpbGZsb3d8eyJFb > > XB0eU1hcGkiOnRyd > > > > > WUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoy > > fQ%3D%3 > > > > > D%7C0%7C%7C%7C&sdata=RilSInf5N%2FfrF04qOubqT2yNjC%2FwAhy > > Oe6GIEfwtIGs%3 > > > D&reserved=0 > > > > >