spl: prevent loading args file in secure falcon mode

The expected payload for the SPL in secure falcon mode is a fitImage
that contains the kernel image and the DT. This removes the need to load
an additional args file, which exposes an additional attack vector since
it can not be verified.

Therefore this patch disables loading of the arg file when
SPL_OS_BOOT_SECURE is set.

Reviewed-by: Tom Rini <trini@konsulko.com>
Signed-off-by: Anshul Dalal <anshuld@ti.com>
This commit is contained in:
Anshul Dalal
2025-10-09 17:28:44 +05:30
committed by Tom Rini
parent b1a3ed0688
commit 82e04e768f

View File

@@ -796,6 +796,7 @@ config SPL_FS_LOAD_PAYLOAD_NAME
config SPL_FS_LOAD_KERNEL_NAME
string "File to load for the OS kernel from the filesystem"
depends on (SPL_FS_EXT4 || SPL_FS_FAT || SPL_FS_SQUASHFS) && SPL_OS_BOOT
default "fitImage" if SPL_OS_BOOT_SECURE
default "uImage"
help
Filename to read to load for the OS kernel when reading from the
@@ -1217,7 +1218,7 @@ config SPL_OS_BOOT_SECURE
config SPL_OS_BOOT_ARGS
bool "Allow SPL to load args for kernel in falcon mode"
depends on SPL_OS_BOOT || SPL_LOAD_FIT_OPENSBI_OS_BOOT
depends on (SPL_OS_BOOT || SPL_LOAD_FIT_OPENSBI_OS_BOOT) && !SPL_OS_BOOT_SECURE
help
This option enables the SPL to load an args file (usually the FDT)
alongside the kernel image in falcon boot mode.