From patchwork Wed May 1 05:32:03 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Vabhav Sharma X-Patchwork-Id: 13650246 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 13884C4345F for ; Wed, 1 May 2024 05:33:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To: Message-Id:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=z3Izj5Zg52FTMXYbFcaJqPZ45V9w7lgB14GcNRyvcOM=; b=xKZf09U5gBV3xU 6K4uIKwosaq22dd2M2Xc4QLgxNMAuKbZtNFw2uOVGTO5w8W0760QDPL8stAHnREZprXbK2pFISU/V AFGiisQlrpLCWEtqggGHmuKZG10tGxlHftCBAEuyFSj0hxcgVq/mOQpOxrl7s542eb4o7iBdY6ojI ay/ZVqWWNI4qdFuVS8gHAT07M423zxxRcy1apjYwUBZC4zESeG3tg7MPxXx/lycPkJCRAXvVo1Uug 8nnmj/KUG13m3zYmtkIAqTqS3JqNyOZAkFDCV5C2mNPToSSYxk0wN4oXMz+uko2w6HNBRWacLokHJ 2JfrjwvKvSE12xDcjc1A==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.97.1 #2 (Red Hat Linux)) id 1s22aq-00000008ccj-28W4; Wed, 01 May 2024 05:33:24 +0000 Received: from mail-db3eur04on062e.outbound.protection.outlook.com ([2a01:111:f400:fe0c::62e] helo=EUR04-DB3-obe.outbound.protection.outlook.com) by bombadil.infradead.org with esmtps (Exim 4.97.1 #2 (Red Hat Linux)) id 1s22aR-00000008cUF-3aY3 for linux-arm-kernel@lists.infradead.org; Wed, 01 May 2024 05:33:02 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=h4KG2mcZ/1Mek9q/NLRYBRKX+VuyVVyqFIKAd0eULgytxYT04ZbIyWjqZahl1S/rKaOlgYWgumRwKgglZt0QxdTf3xkdzNow4Vhy4jfOzEB3tP+PD+qz8u+cgd6AI4EstR2HknE/blEW06nFMf/m0ifYVwlyo6Lh7Qz1hXa0/lwFji/pW+6huLy3/HxPR0Dw+hFU1AVNkx/qL+EJL1my01Wrp7GnLsWAXdkrYkeAkBiDFimLUU5XOgBWc61RCCZiTS0BdJ21Zsho++1dArrwazcqzpnap2M4VPAN98pH6/U/COn/e7Nf+76Lf9Dlv3obA/NQ4vOs4WGoKQJ70aQP6g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Out/W8/iZjCkWUDh5tusZTqTuI9w2WE09XFW9dv0T6g=; b=eFyd51yVSp4Glh0xv8AKmVzWQvcpYsK2/xhsrEXnTvuGUFk2gN6pvEd3BMAPrXopgwqbBvzl75f3soxjs9iTT3A59gnD4veZ7+rLIKRLsB3I8vckrWz5L6MVCJ914pEdkIKZPGguXuKjQOWOZl/+di/iOe/lRpsjcV8VTfrdon7omR4qKaYFaZjjhPqHbMRwA/D6pdjt+AWuF5+wdlaD7m6XZPbV5u2yjKdhtJKs//MzItThspHYF8KX0WPqwc+6Z5tVbaluB08+RlfMSGR3Ih4YUHxGd3zjjXL/UaeGWmvvGb86L7QujWI1uG9DQ5p6LYaTXAGrmNbsluwshlzDlQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Out/W8/iZjCkWUDh5tusZTqTuI9w2WE09XFW9dv0T6g=; b=iEKTF46ATqH2TQllBe+Um/u2YuD4aTGjvQTBDP8ZaZyXrKE4vlU2/CCGvWJeZgrs1Rw4bsugYn7MJyJJD9Si62iCNECjC2E6TJqRTBns+S0G9e1sJzFmpq4USz0LnNY6TdJebL3rhnwWXBNgfUcPFdAv+MYPTazLiR6t7kr3XPo= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from DB9PR04MB9354.eurprd04.prod.outlook.com (2603:10a6:10:36c::10) by GVXPR04MB10071.eurprd04.prod.outlook.com (2603:10a6:150:11a::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7519.36; Wed, 1 May 2024 05:32:47 +0000 Received: from DB9PR04MB9354.eurprd04.prod.outlook.com ([fe80::3cd3:1ff0:8bae:a7ab]) by DB9PR04MB9354.eurprd04.prod.outlook.com ([fe80::3cd3:1ff0:8bae:a7ab%3]) with mapi id 15.20.7519.031; Wed, 1 May 2024 05:32:46 +0000 From: Vabhav Sharma To: Rob Herring , Krzysztof Kozlowski , Conor Dooley , Pengutronix Kernel Team , Fabio Estevam , linux-imx@nxp.com, Ulf Hansson , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, Shawn Guo , Sascha Hauer , Iuliana Prodan Cc: Silvano Di Ninno , Varun Sethi , Pankaj Gupta , Peng Fan , Dong Aisheng , frank.li@nxp.com, daniel.baluta@nxp.com, Vabhav Sharma , Franck LENORMAND , Horia Geanta Subject: [PATCH 2/4] firmware: imx: Add SC APIs required for secvio module Date: Wed, 1 May 2024 07:32:03 +0200 Message-Id: <20240501053205.1737248-3-vabhav.sharma@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20240501053205.1737248-1-vabhav.sharma@nxp.com> References: <20240501053205.1737248-1-vabhav.sharma@nxp.com> X-ClientProxiedBy: AS4P189CA0029.EURP189.PROD.OUTLOOK.COM (2603:10a6:20b:5db::20) To DB9PR04MB9354.eurprd04.prod.outlook.com (2603:10a6:10:36c::10) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DB9PR04MB9354:EE_|GVXPR04MB10071:EE_ X-MS-Office365-Filtering-Correlation-Id: 28dd5c37-88d8-43bd-bd84-08dc69a021f2 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230031|366007|1800799015|7416005|376005|52116005|38350700005|921011; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB9PR04MB9354.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(366007)(1800799015)(7416005)(376005)(52116005)(38350700005)(921011);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 28dd5c37-88d8-43bd-bd84-08dc69a021f2 X-MS-Exchange-CrossTenant-AuthSource: DB9PR04MB9354.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 May 2024 05:32:46.6291 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: Xd79naCG10ekIJpHecdmFejrHXpP3T1aC/6mEfATjyuKlOej2AshS1g3wCFX0sEoRuS31SaJhkfTYDbx8UbjFQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: GVXPR04MB10071 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20240430_223259_933235_AF562BA4 X-CRM114-Status: GOOD ( 22.94 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org The Security Violation module requires SC API. Added below API: - imx_sc_seco_build_info - imx_sc_seco_secvio_enable - imx_sc_seco_secvio_config - imx_sc_seco_secvio_dgo_config Signed-off-by: Franck LENORMAND Reviewed-by: Iuliana Prodan Reviewed-by: Horia Geanta Signed-off-by: Dong Aisheng Signed-off-by: Vabhav Sharma --- drivers/firmware/imx/Makefile | 2 +- drivers/firmware/imx/imx-scu.c | 4 +- drivers/firmware/imx/seco.c | 216 ++++++++++++++++++++++++++ include/linux/firmware/imx/ipc.h | 1 + include/linux/firmware/imx/sci.h | 4 + include/linux/firmware/imx/svc/seco.h | 69 ++++++++ 6 files changed, 294 insertions(+), 2 deletions(-) create mode 100644 drivers/firmware/imx/seco.c create mode 100644 include/linux/firmware/imx/svc/seco.h diff --git a/drivers/firmware/imx/Makefile b/drivers/firmware/imx/Makefile index 8f9f04a513a8..b53d2dee8ff3 100644 --- a/drivers/firmware/imx/Makefile +++ b/drivers/firmware/imx/Makefile @@ -1,3 +1,3 @@ # SPDX-License-Identifier: GPL-2.0 obj-$(CONFIG_IMX_DSP) += imx-dsp.o -obj-$(CONFIG_IMX_SCU) += imx-scu.o misc.o imx-scu-irq.o rm.o imx-scu-soc.o +obj-$(CONFIG_IMX_SCU) += imx-scu.o misc.o imx-scu-irq.o rm.o imx-scu-soc.o seco.o diff --git a/drivers/firmware/imx/imx-scu.c b/drivers/firmware/imx/imx-scu.c index 1dd4362ef9a3..c96dc73689a8 100644 --- a/drivers/firmware/imx/imx-scu.c +++ b/drivers/firmware/imx/imx-scu.c @@ -242,9 +242,11 @@ int imx_scu_call_rpc(struct imx_sc_ipc *sc_ipc, void *msg, bool have_resp) * APIs are defined as void function in SCU firmware, so they * should be treated as return success always. */ - if ((saved_svc == IMX_SC_RPC_SVC_MISC) && + if (((saved_svc == IMX_SC_RPC_SVC_MISC) && (saved_func == IMX_SC_MISC_FUNC_UNIQUE_ID || saved_func == IMX_SC_MISC_FUNC_GET_BUTTON_STATUS)) + || (saved_svc == IMX_SC_RPC_SVC_SECO && + saved_func == IMX_SC_SECO_FUNC_BUILD_INFO)) ret = 0; } diff --git a/drivers/firmware/imx/seco.c b/drivers/firmware/imx/seco.c new file mode 100644 index 000000000000..2d6bf301ac87 --- /dev/null +++ b/drivers/firmware/imx/seco.c @@ -0,0 +1,216 @@ +// SPDX-License-Identifier: GPL-2.0+ +/* + * Copyright 2020, 2024 NXP + * + * File containing client-side RPC functions for the SECO service. These + * function are ported to clients that communicate to the SC. + */ + +#include + +struct imx_sc_msg_seco_get_build_id { + struct imx_sc_rpc_msg hdr; + u32 version; + u32 commit; +} __packed __aligned(4); + +int imx_sc_seco_build_info(struct imx_sc_ipc *ipc, uint32_t *version, + uint32_t *commit) +{ + struct imx_sc_msg_seco_get_build_id msg; + struct imx_sc_rpc_msg *hdr = &msg.hdr; + int ret; + + hdr->ver = IMX_SC_RPC_VERSION; + hdr->svc = IMX_SC_RPC_SVC_SECO; + hdr->func = IMX_SC_SECO_FUNC_BUILD_INFO; + hdr->size = 1; + + ret = imx_scu_call_rpc(ipc, &msg, true); + if (ret) + return ret; + + if (version) + *version = msg.version; + if (commit) + *commit = msg.commit; + + return 0; +} +EXPORT_SYMBOL(imx_sc_seco_build_info); + +int imx_sc_seco_secvio_enable(struct imx_sc_ipc *ipc) +{ + struct imx_sc_rpc_msg msg; + struct imx_sc_rpc_msg *hdr = &msg; + + hdr->ver = IMX_SC_RPC_VERSION; + hdr->svc = IMX_SC_RPC_SVC_SECO; + hdr->func = IMX_SC_SECO_FUNC_SECVIO_ENABLE; + hdr->size = 1; + + return imx_scu_call_rpc(ipc, &msg, true); +} +EXPORT_SYMBOL(imx_sc_seco_secvio_enable); + +struct imx_sc_msg_req_seco_config { + struct imx_sc_rpc_msg hdr; + u32 data0; + u32 data1; + u32 data2; + u32 data3; + u32 data4; + u8 id; + u8 access; + u8 size; +} __packed __aligned(4); + +struct imx_sc_msg_resp_seco_config { + struct imx_sc_rpc_msg hdr; + u32 data0; + u32 data1; + u32 data2; + u32 data3; + u32 data4; +} __packed __aligned(4); + +int imx_sc_seco_secvio_config(struct imx_sc_ipc *ipc, u8 id, u8 access, + u32 *data0, u32 *data1, u32 *data2, u32 *data3, + u32 *data4, u8 size) +{ + struct imx_sc_msg_req_seco_config msg; + struct imx_sc_msg_resp_seco_config *resp; + struct imx_sc_rpc_msg *hdr = &msg.hdr; + int ret; + + hdr->ver = IMX_SC_RPC_VERSION; + hdr->svc = IMX_SC_RPC_SVC_SECO; + hdr->func = IMX_SC_SECO_FUNC_SECVIO_CONFIG; + hdr->size = 7; + + /* Check the pointers on data are valid and set it if doing a write */ + switch (size) { + case 5: + if (data4) { + if (access) + msg.data4 = *data4; + } else { + return -EINVAL; + } + fallthrough; + case 4: + if (data3) { + if (access) + msg.data3 = *data3; + } else { + return -EINVAL; + } + fallthrough; + case 3: + if (data2) { + if (access) + msg.data2 = *data2; + } else { + return -EINVAL; + } + fallthrough; + case 2: + if (data1) { + if (access) + msg.data1 = *data1; + } else { + return -EINVAL; + } + fallthrough; + case 1: + if (data0) { + if (access) + msg.data0 = *data0; + } else { + return -EINVAL; + } + break; + default: + return -EINVAL; + } + + msg.id = id; + msg.access = access; + msg.size = size; + + ret = imx_scu_call_rpc(ipc, &msg, true); + if (ret) + return ret; + + resp = (struct imx_sc_msg_resp_seco_config *)&msg; + + /* Pointers already checked so we just copy the data if reading */ + if (!access) + switch (size) { + case 5: + *data4 = resp->data4; + fallthrough; + case 4: + *data3 = resp->data3; + fallthrough; + case 3: + *data2 = resp->data2; + fallthrough; + case 2: + *data1 = resp->data1; + fallthrough; + case 1: + *data0 = resp->data0; + } + + return 0; +} +EXPORT_SYMBOL(imx_sc_seco_secvio_config); + +struct imx_sc_msg_req_seco_dgo_config { + struct imx_sc_rpc_msg hdr; + u32 data; + u8 id; + u8 access; +} __packed __aligned(4); + +struct imx_sc_msg_resp_seco_dgo_config { + struct imx_sc_rpc_msg hdr; + u32 data; +} __packed __aligned(4); + +int imx_sc_seco_secvio_dgo_config(struct imx_sc_ipc *ipc, u8 id, u8 access, + u32 *data) +{ + struct imx_sc_msg_req_seco_dgo_config msg; + struct imx_sc_msg_resp_seco_dgo_config *resp; + struct imx_sc_rpc_msg *hdr = &msg.hdr; + int ret; + + hdr->ver = IMX_SC_RPC_VERSION; + hdr->svc = IMX_SC_RPC_SVC_SECO; + hdr->func = IMX_SC_SECO_FUNC_SECVIO_DGO_CONFIG; + hdr->size = 3; + + if (access) { + if (data) + msg.data = *data; + else + return -EINVAL; + } + + msg.access = access; + msg.id = id; + + ret = imx_scu_call_rpc(ipc, &msg, true); + if (ret) + return ret; + + resp = (struct imx_sc_msg_resp_seco_dgo_config *)&msg; + + if (!access && data) + *data = resp->data; + + return 0; +} +EXPORT_SYMBOL(imx_sc_seco_secvio_dgo_config); diff --git a/include/linux/firmware/imx/ipc.h b/include/linux/firmware/imx/ipc.h index 0b4643571625..df38ab8e7e2e 100644 --- a/include/linux/firmware/imx/ipc.h +++ b/include/linux/firmware/imx/ipc.h @@ -25,6 +25,7 @@ enum imx_sc_rpc_svc { IMX_SC_RPC_SVC_PAD = 6, IMX_SC_RPC_SVC_MISC = 7, IMX_SC_RPC_SVC_IRQ = 8, + IMX_SC_RPC_SVC_SECO = 9, }; struct imx_sc_rpc_msg { diff --git a/include/linux/firmware/imx/sci.h b/include/linux/firmware/imx/sci.h index df17196df5ff..947e49d8bebc 100644 --- a/include/linux/firmware/imx/sci.h +++ b/include/linux/firmware/imx/sci.h @@ -15,6 +15,10 @@ #include #include #include +#include + +#define IMX_SC_IRQ_SECVIO BIT(6) /* Security violation */ +#define IMX_SC_IRQ_GROUP_WAKE 3 /* Wakeup interrupts */ #if IS_ENABLED(CONFIG_IMX_SCU) int imx_scu_enable_general_irq_channel(struct device *dev); diff --git a/include/linux/firmware/imx/svc/seco.h b/include/linux/firmware/imx/svc/seco.h new file mode 100644 index 000000000000..508444c02d39 --- /dev/null +++ b/include/linux/firmware/imx/svc/seco.h @@ -0,0 +1,69 @@ +/* SPDX-License-Identifier: GPL-2.0+ */ +/* + * Copyright 2020, 2024 NXP + * + * Header file containing the public API for the System Controller (SC) + * Security Controller (SECO) function. + * + * SECO_SVC (SVC) Security Controller Service + * + * Module for the Security Controller (SECO) service. + */ + +#ifndef _SC_SECO_API_H +#define _SC_SECO_API_H + +#include +#include + +/* + * This type is used to indicate RPCs/RM/SECO function calls. + */ +enum imx_sc_seco_func { + IMX_SC_SECO_FUNC_UNKNOWN = 0, + IMX_SC_SECO_FUNC_BUILD_INFO = 16, + IMX_SC_SECO_FUNC_SECVIO_ENABLE = 25, + IMX_SC_SECO_FUNC_SECVIO_CONFIG = 26, + IMX_SC_SECO_FUNC_SECVIO_DGO_CONFIG = 27, +}; + +#if IS_ENABLED(CONFIG_IMX_SCU) +int imx_sc_seco_build_info(struct imx_sc_ipc *ipc, uint32_t *version, + uint32_t *commit); +int imx_sc_seco_secvio_enable(struct imx_sc_ipc *ipc); +int imx_sc_seco_secvio_config(struct imx_sc_ipc *ipc, u8 id, u8 access, + u32 *data0, u32 *data1, u32 *data2, u32 *data3, + u32 *data4, u8 size); +int imx_sc_seco_secvio_dgo_config(struct imx_sc_ipc *ipc, u8 id, u8 access, + u32 *data); +#else /* IS_ENABLED(CONFIG_IMX_SCU) */ +static inline +int imx_sc_seco_build_info(struct imx_sc_ipc *ipc, uint32_t *version, + uint32_t *commit) +{ + return -EOPNOTSUPP; +} + +static inline +int imx_sc_seco_secvio_enable(struct imx_sc_ipc *ipc) +{ + return -EOPNOTSUPP; +} + +static inline +int imx_sc_seco_secvio_config(struct imx_sc_ipc *ipc, u8 id, u8 access, + u32 *data0, u32 *data1, u32 *data2, u32 *data3, + u32 *data4, u8 size) +{ + return -EOPNOTSUPP; +} + +static inline +int imx_sc_seco_secvio_dgo_config(struct imx_sc_ipc *ipc, u8 id, u8 access, + u32 *data) +{ + return -EOPNOTSUPP; +} +#endif /* IS_ENABLED(CONFIG_IMX_SCU) */ + +#endif /* _SC_SECO_API_H */