From patchwork Thu May 9 00:45:33 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Vabhav Sharma X-Patchwork-Id: 13659305 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 074CFC25B4F for ; Thu, 9 May 2024 00:46:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Cc:To:In-Reply-To: References:Message-Id:Subject:Date:From:Reply-To:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Owner; bh=CLtKfSZ8b+zneQvPFT1yQBKNr809A0awab1cPCH12pY=; b=cntOa39fyaBuS5XWkBcwO/dKtr 4EpptLjGJx3KliIvsy5/XbWWOONDIYRphsxXuYv79owN//TjQD/r2TLorcpNqR6ttEV4+lxQFvBO8 kKV1KUjCGdNm9797N9K52kL2v5sBsWL7ByFpmOp9crYQdYDVmZ+cBtB/muA0DGH6+CUP1ToUQv+Bw j1cmvxsoticjhupnS78Nflzgy63WFoGN3vXN6CkTrJ1yBmghgiFHQZGgjfp5FyNRUvzxfoAO3rKIC +TGA06jWl0v7zEm9uJDjc/YBJ8zOdr0aiVB+2IRrpE+10ICWJcSaw7JwD2UZSfmxBykPbYr1YIiuR DNznN2nw==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.97.1 #2 (Red Hat Linux)) id 1s4rv8-0000000HQqR-13Ds; Thu, 09 May 2024 00:46:02 +0000 Received: from mail-vi1eur05on20600.outbound.protection.outlook.com ([2a01:111:f403:2613::600] helo=EUR05-VI1-obe.outbound.protection.outlook.com) by bombadil.infradead.org with esmtps (Exim 4.97.1 #2 (Red Hat Linux)) id 1s4rv4-0000000HQlI-1aWt for linux-arm-kernel@lists.infradead.org; Thu, 09 May 2024 00:46:00 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kd6cDLeTGrbfMHcbeh7dvBn4sD9u29/18OXcEOsVC+dt5MzWjTwgHrunIg8NYJvZd2eOgUiPDP/GP3pNaWfmK6Y5ujYBDh796IboBGC9kmk2JdGzyFFRs5otzwuZ4eI+304zh4Aj/hyFnESE3VVOvlCFb8E615dLmnGhYhZagnv+DAbtG4AmPQTAn6q2Q2HXU2QnXuhVw7PneTnYLy1bnMkzLufDUTUSaElh8SOuKPdiNvFcg6oLeWW+leXHnnQa2dRKO0TqaCBqt4M3lJOCaAKmjbktrDjdoJylYFTM7e9KuszmHDRpHYgDXuqVfXNf6E+bumFiJBpF4Q25aU21VA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=KW3TEVYisXJpBSafePW3lqofXj3EwywSx5j4Jm9+RDw=; b=Q6qZ7dARUExSMp5sUFsgiI6LhZjcCH8pfxEo/R+vetRNIQLEq2FJq7WmgRDJlJeRzpH28WlIKvcsrTHI6jFs9WHDAeSOAhUQHjfJGYArfkdKVsnU0u3RPIeXiQZCjBonnd/GumbY4lTHzLNtdEyVKodFl4dqErLk8J+kvQ2/mW1IS0mJOvlk9wk9jcxDfoHjUyMuYM0axc5ns8m8rFA1UVdg4XaxCdsvFkTjUovPWCkNZlJDbpiLsJET5w3OqI3PYhLQcG/rUfLwiG7h8Yzvh8+VXwrT+/dbZayeIZT45MBX/efnrXa7rQNUfNoaPgWFj8ly5M7cpLW7Kk0qcL9TiA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KW3TEVYisXJpBSafePW3lqofXj3EwywSx5j4Jm9+RDw=; b=SO6aXHf+u3BT9a5FPAa8N0HD0YX0A+XXOUcAPU7O6ne7iDMX5IUsmjIQm/c6LmEQHPKAG/7+pMKa7rF5m09ikx6j2I2uPpdk0o7682Wp5K4nORni3nebTcKJJb++R+0qD1uXC9b4UWsFuPfsD/hvBB3zZ7VTVSezilLRGAyuEEM= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS1PR04MB9358.eurprd04.prod.outlook.com (2603:10a6:20b:4dc::19) by AM9PR04MB8273.eurprd04.prod.outlook.com (2603:10a6:20b:3e5::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7544.42; Thu, 9 May 2024 00:45:39 +0000 Received: from AS1PR04MB9358.eurprd04.prod.outlook.com ([fe80::d74b:21b6:d315:cb84]) by AS1PR04MB9358.eurprd04.prod.outlook.com ([fe80::d74b:21b6:d315:cb84%4]) with mapi id 15.20.7544.041; Thu, 9 May 2024 00:45:39 +0000 From: Vabhav Sharma Date: Thu, 09 May 2024 02:45:33 +0200 Subject: [PATCH 2/4] firmware: imx: Add SC APIs required for secvio module Message-Id: <20240509-secvio-v1-2-90fbe2baeda2@nxp.com> References: <20240509-secvio-v1-0-90fbe2baeda2@nxp.com> In-Reply-To: <20240509-secvio-v1-0-90fbe2baeda2@nxp.com> To: Rob Herring , Krzysztof Kozlowski , Conor Dooley , Franck LENORMAND , Dong Aisheng , Shawn Guo , Sascha Hauer , Pengutronix Kernel Team , Fabio Estevam , Peng Fan Cc: devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, imx@lists.linux.dev, linux-arm-kernel@lists.infradead.org, Varun Sethi , Silvano Di Ninno , Pankaj Gupta , frank.li@nxp.com, daniel.baluta@nxp.com, Vabhav Sharma , Iuliana Prodan , Horia Geanta X-Mailer: b4 0.13.0 X-ClientProxiedBy: AS4P190CA0006.EURP190.PROD.OUTLOOK.COM (2603:10a6:20b:5de::9) To AS1PR04MB9358.eurprd04.prod.outlook.com (2603:10a6:20b:4dc::19) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AS1PR04MB9358:EE_|AM9PR04MB8273:EE_ X-MS-Office365-Filtering-Correlation-Id: e7063b96-69c3-4074-3eea-08dc6fc15921 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230031|1800799015|7416005|52116005|376005|366007|38350700005|921011; X-Microsoft-Antispam-Message-Info: =?utf-8?q?JsPzIMEZtK78fcBaVfm8fa13jfJbBf2?= =?utf-8?q?nNXUOkHFnQpkXePgIzNTVSZZRZ2KNnPlFZGwhzeUUJPOOUuJxQupCTgJ6QXbc6YhN?= =?utf-8?q?cnpiiZ0uDzK7IL6TcJHgA/rA6g6+t9DiUoqBCrENj47Gbk45wcrgEUM0LG4YcYRRK?= =?utf-8?q?PyYie1+aL/T6hXUaR+itQjPltZE3UMaPpSRgWXmNe4uJ/275liXzS0HOZ5DbkzvGu?= =?utf-8?q?zSpd/aDXUZyyitqmadplzSbuViDsiuBFuLjRCvvFH7Vdck70PASBz9MAkWhT25Ulf?= =?utf-8?q?Lm73BCV0eA12JZDDQhWZSVDULt/eWsYhywLkslE977/4l3AatjZShLi1PAkXRJTnT?= =?utf-8?q?/A4C+PHMP2pRt+lkOqGqVx1Z/yFEegSwfHe0PXnVGYh+u9xtpdpKxHj0XWkUTh+TY?= =?utf-8?q?PIU+ekTwNdD0iPaMneojYFY6Yo3kN/NcuGbNaNbnE9Ccjbnlr4vNwp9U4+oWOK/Qs?= =?utf-8?q?+uTcnI81ZvCM14bL+8AmI6L7hs7GGV2fk7a+ALC9TNt78AzYcXhn+vE0y/ugS70hR?= =?utf-8?q?uJyH0rRUbkkAdntSIhiJmGd2sz2cUqJfaiAFPAkxe2G0vLWQARWGup2rxbUji8hVy?= =?utf-8?q?LXhbbrLuve6lE9FcuxXUS26Eaoi5dfb/Kg2iXqSt0eovDvOxjBaZJECPtqrdpu5UP?= =?utf-8?q?s48xSoO/vyE4bHM1AyN273SyiYQMPGFH0L7MHBynGUQIImElOShZrEeA71GHIINhf?= =?utf-8?q?cYqM+icOtlbKBZDUmLcXBnmv3T2hx0pPXTpeaGzDu2u6hPd7zDowSQR2Yzy/yLBnh?= =?utf-8?q?09xDg+ztfOTjnMv/nayZPS1WThpbjhfUwZbjibJCIyZFnwBkQNXHBivsNPs8E3UXF?= =?utf-8?q?1TgdDoxFvuEV6iajdO/ODhIP3MGaeoXTHIbTmgTlYJWLJ+3w1BA2w97/s0zLtRjat?= =?utf-8?q?nTlKV8XG9WYH64ZHTGcwC4tIFyrHVCXwwDN6QjSubjEtxMpMNXmZBW3IJck03TDnQ?= =?utf-8?q?1pfZ9Gq0YE5c//ycqJnTvZjOD+JmRpUvWs0k0ktLoJ0XC+xw/wMQRVU7xp5BiJh5i?= =?utf-8?q?YXEb0U74O8TEnBk5gYAkodATZAzqJ+4XZR/1mg9J5aTBL9P19I1j8jDRhfOWg4hg5?= =?utf-8?q?rnEWFnwledtDQ6ixRHuoaVwuSSFITb8CsZHeopwyerbVm1GKa+0LL2CazmcqbMXpr?= =?utf-8?q?KB2JOsxBAYEMYlfWyCb7eh/C7wziYWNW6C8xev2xDHwIyFLEdjIWUdmgjrfv2QGnZ?= =?utf-8?q?wzWXu7Zx8gpetFzD4xzNXkfB/zorYRxRhmlMtuw4wXaLq0JqmKdqe/rjp9u94J2pZ?= =?utf-8?q?aWJG+GUfbgAq9wQvS+2glTJL0ZaFlLA3pHRKcY6UFRdUeL8x84p2VcP8=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS1PR04MB9358.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(1800799015)(7416005)(52116005)(376005)(366007)(38350700005)(921011);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?OXKfgxz+4SU18js2LOtdiqpU1pat?= =?utf-8?q?q0wY2RpVWb+2fPec9Q6l3xM/nnhJvj8VpvG8Qz30ecdhdZqarLYOGxSfy6pVQdobh?= =?utf-8?q?AT73LLxN0kUYMZ1cNSTDWdiLKEayl2rafZ79IkmHuA0O/wKNgfvhF5KPVgSZyK7ji?= =?utf-8?q?VI6j6s6PwLxFq+STD+mrkSKl7+3wkiVfPP2WAlkBpTXYS4LaVRSDt6/f7nOLpZsiV?= =?utf-8?q?fzTnzCQqZ9F/7SwdOCV+dpCxszQQSd5pF3NRLLvoQEz8o0qIVdgicU2+JDgKKwtp9?= =?utf-8?q?IhUwBSr16FCqjxidDWzgOz9eBg7LCKXieLGwXAI5ZehN34O7wxOfqKOjbW7pQ38oa?= =?utf-8?q?uhzdBm5RvY9cMeGo2RnS47ogyC+QMFrqM358whmK5BiKVhwZX73AO811uNxv21zF+?= =?utf-8?q?Y0nEdoesna4LT5SAxIC+FPQLSqSiEcV/Yj09716iSNCRmNX8dof7lWVc9TUvBcZvY?= =?utf-8?q?zxUDWVVozbT4zggDvkIiKBwO6tWeC/G7cD7p1gQ/QJ9F84NUiirne1a05JLqprkmL?= =?utf-8?q?so+r5XW36ixP8yDd5MIHoBcrrSrjK7daWFO3KWzUyI/Vzm0Stv1JDGg+KdmMaumjx?= =?utf-8?q?chhlOdaIhNhnX876qoiKOQA6cKjZfdB5Y1Caz7nhyKiaEECbrD2BWpEddnD9A7Q+P?= =?utf-8?q?SI+eKDB6z+GVit0f8Yoc3mAbcsdqiosLtkvcdD35ScxjQ9YlC7117N0x3jUUgwBer?= =?utf-8?q?BLKrupcR/hUopYkeVUqjMVker5SVmAgIz4eyri4sxlAcovYVTOLbH0vgv0D+fcUGx?= =?utf-8?q?sJx5sQfXw+yzmvQKofgDuQi2HIF8t/enKku6ZoldjxjcE0vAqx7TFHreeJFzFaiqp?= =?utf-8?q?xRQRn/b6pRkR0LzXDDYdK1231Pg8I0XEJmBCZFVuMbh8pr4kv28xeFcWu/KmWHBE3?= =?utf-8?q?WCFAsy3udJ5dq0TsYInW06uLxFZ2DsAZKVZmruAkrR9YnR9D8QINxWVe5TMSEgwJA?= =?utf-8?q?7QlW6C7FMJPX00PEqW3a6Oj2xu3shqKgC2UNrxqMH/xQA6lbjfR1cSh+Tabq5UkPS?= =?utf-8?q?H3+HB/mxkn8oXegx5nLTSzemxxb4pHgioEKOYgp3bhF2k42EzZ+wPUYiJjn0ouhca?= =?utf-8?q?asDkdSY6+PZY69MCCuXUJBS/idwFrISV4+ykGJVDmaJG+M7osx2b07UhQtlCr6Ort?= =?utf-8?q?VNfdLbugscOFhrN7+rRCW7lhb6LinpDFEf91B3aFnoDewgc4TdtV0/gARru4smNJs?= =?utf-8?q?Wm9w8GGZ1dGnvyLp13oUkI77ohYbsnVr0UsrFmwnZiQafRas9bzKapDCMACpakn8d?= =?utf-8?q?/wEmk9AjZcbb5AeON4GSVtoy9Bc5krbNiJIVpwJtbfXVT08fWW+vati3s2vVsBHdQ?= =?utf-8?q?V/K4zA2bOPlkWxq/oGZwVbSg7wjt5vQPFvzuztZATGE+ikkhLe1y7LRw2ve80jVGt?= =?utf-8?q?zEdC83NNZmmpzmdJgh7GvKV26JkkMDm+wAYo9wrXyEpHvOznBXTfoyxnd99N3ZMOz?= =?utf-8?q?z38HdfuVd/R7yQ+INy0BPwGgCHZgxHf/yCQEmgIGgdTj+a3jknJAMAUmOY4wpjDNA?= =?utf-8?q?BTwyxfx5Uhb0?= X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: e7063b96-69c3-4074-3eea-08dc6fc15921 X-MS-Exchange-CrossTenant-AuthSource: AS1PR04MB9358.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 May 2024 00:45:39.5607 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: e84Ylbiz+qzaxQG9W2gyaQWgQXrwWn+/lQukJJXphu9JL32P5MGDXzXPSRPsoNhqb/m/YTcPbH++WyVpvcva/w== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8273 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20240508_174558_558254_BEBE4AB9 X-CRM114-Status: GOOD ( 20.49 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org The Security Violation module requires below System Controller Security controller API to interact with SNVS block via SCFW - imx_sc_seco_build_info - imx_sc_seco_secvio_enable - imx_sc_seco_secvio_config - imx_sc_seco_secvio_dgo_config Signed-off-by: Franck LENORMAND Reviewed-by: Iuliana Prodan Reviewed-by: Horia Geanta Signed-off-by: Dong Aisheng Signed-off-by: Vabhav Sharma --- drivers/firmware/imx/Makefile | 2 +- drivers/firmware/imx/imx-scu.c | 4 +- drivers/firmware/imx/seco.c | 216 ++++++++++++++++++++++++++++++++++ include/linux/firmware/imx/ipc.h | 1 + include/linux/firmware/imx/sci.h | 4 + include/linux/firmware/imx/svc/seco.h | 69 +++++++++++ 6 files changed, 294 insertions(+), 2 deletions(-) diff --git a/drivers/firmware/imx/Makefile b/drivers/firmware/imx/Makefile index 8f9f04a513a8..b53d2dee8ff3 100644 --- a/drivers/firmware/imx/Makefile +++ b/drivers/firmware/imx/Makefile @@ -1,3 +1,3 @@ # SPDX-License-Identifier: GPL-2.0 obj-$(CONFIG_IMX_DSP) += imx-dsp.o -obj-$(CONFIG_IMX_SCU) += imx-scu.o misc.o imx-scu-irq.o rm.o imx-scu-soc.o +obj-$(CONFIG_IMX_SCU) += imx-scu.o misc.o imx-scu-irq.o rm.o imx-scu-soc.o seco.o diff --git a/drivers/firmware/imx/imx-scu.c b/drivers/firmware/imx/imx-scu.c index 1dd4362ef9a3..c96dc73689a8 100644 --- a/drivers/firmware/imx/imx-scu.c +++ b/drivers/firmware/imx/imx-scu.c @@ -242,9 +242,11 @@ int imx_scu_call_rpc(struct imx_sc_ipc *sc_ipc, void *msg, bool have_resp) * APIs are defined as void function in SCU firmware, so they * should be treated as return success always. */ - if ((saved_svc == IMX_SC_RPC_SVC_MISC) && + if (((saved_svc == IMX_SC_RPC_SVC_MISC) && (saved_func == IMX_SC_MISC_FUNC_UNIQUE_ID || saved_func == IMX_SC_MISC_FUNC_GET_BUTTON_STATUS)) + || (saved_svc == IMX_SC_RPC_SVC_SECO && + saved_func == IMX_SC_SECO_FUNC_BUILD_INFO)) ret = 0; } diff --git a/drivers/firmware/imx/seco.c b/drivers/firmware/imx/seco.c new file mode 100644 index 000000000000..2d6bf301ac87 --- /dev/null +++ b/drivers/firmware/imx/seco.c @@ -0,0 +1,216 @@ +// SPDX-License-Identifier: GPL-2.0+ +/* + * Copyright 2020, 2024 NXP + * + * File containing client-side RPC functions for the SECO service. These + * function are ported to clients that communicate to the SC. + */ + +#include + +struct imx_sc_msg_seco_get_build_id { + struct imx_sc_rpc_msg hdr; + u32 version; + u32 commit; +} __packed __aligned(4); + +int imx_sc_seco_build_info(struct imx_sc_ipc *ipc, uint32_t *version, + uint32_t *commit) +{ + struct imx_sc_msg_seco_get_build_id msg; + struct imx_sc_rpc_msg *hdr = &msg.hdr; + int ret; + + hdr->ver = IMX_SC_RPC_VERSION; + hdr->svc = IMX_SC_RPC_SVC_SECO; + hdr->func = IMX_SC_SECO_FUNC_BUILD_INFO; + hdr->size = 1; + + ret = imx_scu_call_rpc(ipc, &msg, true); + if (ret) + return ret; + + if (version) + *version = msg.version; + if (commit) + *commit = msg.commit; + + return 0; +} +EXPORT_SYMBOL(imx_sc_seco_build_info); + +int imx_sc_seco_secvio_enable(struct imx_sc_ipc *ipc) +{ + struct imx_sc_rpc_msg msg; + struct imx_sc_rpc_msg *hdr = &msg; + + hdr->ver = IMX_SC_RPC_VERSION; + hdr->svc = IMX_SC_RPC_SVC_SECO; + hdr->func = IMX_SC_SECO_FUNC_SECVIO_ENABLE; + hdr->size = 1; + + return imx_scu_call_rpc(ipc, &msg, true); +} +EXPORT_SYMBOL(imx_sc_seco_secvio_enable); + +struct imx_sc_msg_req_seco_config { + struct imx_sc_rpc_msg hdr; + u32 data0; + u32 data1; + u32 data2; + u32 data3; + u32 data4; + u8 id; + u8 access; + u8 size; +} __packed __aligned(4); + +struct imx_sc_msg_resp_seco_config { + struct imx_sc_rpc_msg hdr; + u32 data0; + u32 data1; + u32 data2; + u32 data3; + u32 data4; +} __packed __aligned(4); + +int imx_sc_seco_secvio_config(struct imx_sc_ipc *ipc, u8 id, u8 access, + u32 *data0, u32 *data1, u32 *data2, u32 *data3, + u32 *data4, u8 size) +{ + struct imx_sc_msg_req_seco_config msg; + struct imx_sc_msg_resp_seco_config *resp; + struct imx_sc_rpc_msg *hdr = &msg.hdr; + int ret; + + hdr->ver = IMX_SC_RPC_VERSION; + hdr->svc = IMX_SC_RPC_SVC_SECO; + hdr->func = IMX_SC_SECO_FUNC_SECVIO_CONFIG; + hdr->size = 7; + + /* Check the pointers on data are valid and set it if doing a write */ + switch (size) { + case 5: + if (data4) { + if (access) + msg.data4 = *data4; + } else { + return -EINVAL; + } + fallthrough; + case 4: + if (data3) { + if (access) + msg.data3 = *data3; + } else { + return -EINVAL; + } + fallthrough; + case 3: + if (data2) { + if (access) + msg.data2 = *data2; + } else { + return -EINVAL; + } + fallthrough; + case 2: + if (data1) { + if (access) + msg.data1 = *data1; + } else { + return -EINVAL; + } + fallthrough; + case 1: + if (data0) { + if (access) + msg.data0 = *data0; + } else { + return -EINVAL; + } + break; + default: + return -EINVAL; + } + + msg.id = id; + msg.access = access; + msg.size = size; + + ret = imx_scu_call_rpc(ipc, &msg, true); + if (ret) + return ret; + + resp = (struct imx_sc_msg_resp_seco_config *)&msg; + + /* Pointers already checked so we just copy the data if reading */ + if (!access) + switch (size) { + case 5: + *data4 = resp->data4; + fallthrough; + case 4: + *data3 = resp->data3; + fallthrough; + case 3: + *data2 = resp->data2; + fallthrough; + case 2: + *data1 = resp->data1; + fallthrough; + case 1: + *data0 = resp->data0; + } + + return 0; +} +EXPORT_SYMBOL(imx_sc_seco_secvio_config); + +struct imx_sc_msg_req_seco_dgo_config { + struct imx_sc_rpc_msg hdr; + u32 data; + u8 id; + u8 access; +} __packed __aligned(4); + +struct imx_sc_msg_resp_seco_dgo_config { + struct imx_sc_rpc_msg hdr; + u32 data; +} __packed __aligned(4); + +int imx_sc_seco_secvio_dgo_config(struct imx_sc_ipc *ipc, u8 id, u8 access, + u32 *data) +{ + struct imx_sc_msg_req_seco_dgo_config msg; + struct imx_sc_msg_resp_seco_dgo_config *resp; + struct imx_sc_rpc_msg *hdr = &msg.hdr; + int ret; + + hdr->ver = IMX_SC_RPC_VERSION; + hdr->svc = IMX_SC_RPC_SVC_SECO; + hdr->func = IMX_SC_SECO_FUNC_SECVIO_DGO_CONFIG; + hdr->size = 3; + + if (access) { + if (data) + msg.data = *data; + else + return -EINVAL; + } + + msg.access = access; + msg.id = id; + + ret = imx_scu_call_rpc(ipc, &msg, true); + if (ret) + return ret; + + resp = (struct imx_sc_msg_resp_seco_dgo_config *)&msg; + + if (!access && data) + *data = resp->data; + + return 0; +} +EXPORT_SYMBOL(imx_sc_seco_secvio_dgo_config); diff --git a/include/linux/firmware/imx/ipc.h b/include/linux/firmware/imx/ipc.h index 0b4643571625..df38ab8e7e2e 100644 --- a/include/linux/firmware/imx/ipc.h +++ b/include/linux/firmware/imx/ipc.h @@ -25,6 +25,7 @@ enum imx_sc_rpc_svc { IMX_SC_RPC_SVC_PAD = 6, IMX_SC_RPC_SVC_MISC = 7, IMX_SC_RPC_SVC_IRQ = 8, + IMX_SC_RPC_SVC_SECO = 9, }; struct imx_sc_rpc_msg { diff --git a/include/linux/firmware/imx/sci.h b/include/linux/firmware/imx/sci.h index df17196df5ff..947e49d8bebc 100644 --- a/include/linux/firmware/imx/sci.h +++ b/include/linux/firmware/imx/sci.h @@ -15,6 +15,10 @@ #include #include #include +#include + +#define IMX_SC_IRQ_SECVIO BIT(6) /* Security violation */ +#define IMX_SC_IRQ_GROUP_WAKE 3 /* Wakeup interrupts */ #if IS_ENABLED(CONFIG_IMX_SCU) int imx_scu_enable_general_irq_channel(struct device *dev); diff --git a/include/linux/firmware/imx/svc/seco.h b/include/linux/firmware/imx/svc/seco.h new file mode 100644 index 000000000000..508444c02d39 --- /dev/null +++ b/include/linux/firmware/imx/svc/seco.h @@ -0,0 +1,69 @@ +/* SPDX-License-Identifier: GPL-2.0+ */ +/* + * Copyright 2020, 2024 NXP + * + * Header file containing the public API for the System Controller (SC) + * Security Controller (SECO) function. + * + * SECO_SVC (SVC) Security Controller Service + * + * Module for the Security Controller (SECO) service. + */ + +#ifndef _SC_SECO_API_H +#define _SC_SECO_API_H + +#include +#include + +/* + * This type is used to indicate RPCs/RM/SECO function calls. + */ +enum imx_sc_seco_func { + IMX_SC_SECO_FUNC_UNKNOWN = 0, + IMX_SC_SECO_FUNC_BUILD_INFO = 16, + IMX_SC_SECO_FUNC_SECVIO_ENABLE = 25, + IMX_SC_SECO_FUNC_SECVIO_CONFIG = 26, + IMX_SC_SECO_FUNC_SECVIO_DGO_CONFIG = 27, +}; + +#if IS_ENABLED(CONFIG_IMX_SCU) +int imx_sc_seco_build_info(struct imx_sc_ipc *ipc, uint32_t *version, + uint32_t *commit); +int imx_sc_seco_secvio_enable(struct imx_sc_ipc *ipc); +int imx_sc_seco_secvio_config(struct imx_sc_ipc *ipc, u8 id, u8 access, + u32 *data0, u32 *data1, u32 *data2, u32 *data3, + u32 *data4, u8 size); +int imx_sc_seco_secvio_dgo_config(struct imx_sc_ipc *ipc, u8 id, u8 access, + u32 *data); +#else /* IS_ENABLED(CONFIG_IMX_SCU) */ +static inline +int imx_sc_seco_build_info(struct imx_sc_ipc *ipc, uint32_t *version, + uint32_t *commit) +{ + return -EOPNOTSUPP; +} + +static inline +int imx_sc_seco_secvio_enable(struct imx_sc_ipc *ipc) +{ + return -EOPNOTSUPP; +} + +static inline +int imx_sc_seco_secvio_config(struct imx_sc_ipc *ipc, u8 id, u8 access, + u32 *data0, u32 *data1, u32 *data2, u32 *data3, + u32 *data4, u8 size) +{ + return -EOPNOTSUPP; +} + +static inline +int imx_sc_seco_secvio_dgo_config(struct imx_sc_ipc *ipc, u8 id, u8 access, + u32 *data) +{ + return -EOPNOTSUPP; +} +#endif /* IS_ENABLED(CONFIG_IMX_SCU) */ + +#endif /* _SC_SECO_API_H */