From patchwork Thu Mar 25 09:29:59 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Peng Fan \(OSS\)" X-Patchwork-Id: 408767 Delivered-To: patch@linaro.org Received: by 2002:a02:8562:0:0:0:0:0 with SMTP id g89csp363842jai; Thu, 25 Mar 2021 02:31:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw7pZ3+hDQbBByiqpBWnXWnYSB9v/CcLUYoSizfthZ06eSJ7evXSMD69s4jL16ZTFcU3wKz X-Received: by 2002:a17:906:4c56:: with SMTP id d22mr8668323ejw.426.1616664713889; Thu, 25 Mar 2021 02:31:53 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1616664713; cv=pass; d=google.com; s=arc-20160816; b=nXG7NFdii4/S3fOdaQnFKXan4fDgIOnOkdyqiPfzW/pt4Xhb9qi5dlsmlVH9NEf377 PvzfwMqCZDZLt+mKrh8vcw4xi6eHFK89yXqq5PRyR1m03k0P7jAK++/zl/TNkEw6/kYm ZXT0rn+Mz9/zSXFxnnLq1lRchxEh/ztPpT1VmzgQ4dis4iShtYnJjXJy3mRHxueH0Bzl 3W5DXQVID6/WR91WlgJEGHf4SjZng5BMWeiSMzh0WxMfnZdkfa+/AUqYpxlTJU57W/hZ 6s8qF7hLBSGMDdSZ3vn9L/LJs4DdjIKsnGy7QFZBfLWP/WR12J1UnYSH/B8R7vzCXzfF Zu+g== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:mime-version :content-transfer-encoding:message-id:date:subject:cc:to:from :dkim-signature; bh=4+5ju+nsFgWF+cRriae8paEGcx2W7Gm9e7utzrvAIXQ=; b=G/L/GPfQMRwAbMtH/SlOGmsTpSwK4YqsqoigtQFJLW4H6MYBJp/sNRoFtKDIaZKlg4 4KrTQ/BhXJUGMpMz6qHa1dPgPwqTaZ4qfJkHhaLeqJ8TDwuxoZdFvpjH5DycSvLyjY/c TlsDfh9sfDKfn/O8he24leIInOrvfGgC7zsWvC1iQk0cYcZodmRll2JVHbPdQJnKyBt8 GW9iTaqgTOFbtBDt1l778ZUtVtUmXmK9BsjbegBwub0kQahXtV4WQ+jy8G6kv+jU9307 x4vpA8xPgqC+LHtOdFhcrY6trfm9AtZbN2RWL+5m4gXe1JkSzjErxEECjt2EytYEQuCm NYsg== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@NXP1.onmicrosoft.com header.s=selector2-NXP1-onmicrosoft-com header.b=jRNmGeAD; arc=pass (i=1 spf=pass spfdomain=oss.nxp.com dkim=pass dkdomain=oss.nxp.com dmarc=pass fromdomain=oss.nxp.com); spf=pass (google.com: domain of u-boot-bounces@lists.denx.de designates 2a01:238:438b:c500:173d:9f52:ddab:ee01 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Return-Path: Received: from phobos.denx.de (phobos.denx.de. [2a01:238:438b:c500:173d:9f52:ddab:ee01]) by mx.google.com with ESMTPS id jp24si3691801ejb.512.2021.03.25.02.31.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 25 Mar 2021 02:31:53 -0700 (PDT) Received-SPF: pass (google.com: domain of u-boot-bounces@lists.denx.de designates 2a01:238:438b:c500:173d:9f52:ddab:ee01 as permitted sender) client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; Authentication-Results: mx.google.com; dkim=pass header.i=@NXP1.onmicrosoft.com header.s=selector2-NXP1-onmicrosoft-com header.b=jRNmGeAD; arc=pass (i=1 spf=pass spfdomain=oss.nxp.com dkim=pass dkdomain=oss.nxp.com dmarc=pass fromdomain=oss.nxp.com); spf=pass (google.com: domain of u-boot-bounces@lists.denx.de designates 2a01:238:438b:c500:173d:9f52:ddab:ee01 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id F308080462; Thu, 25 Mar 2021 10:31:50 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=oss.nxp.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; unprotected) header.d=NXP1.onmicrosoft.com header.i=@NXP1.onmicrosoft.com header.b="jRNmGeAD"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id EEB9A805BF; Thu, 25 Mar 2021 10:31:49 +0100 (CET) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-0.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,FORGED_SPF_HELO,MSGID_FROM_MTA_HEADER,SPF_HELO_PASS autolearn=no autolearn_force=no version=3.4.2 Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0618.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe1e::618]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 131F580021 for ; Thu, 25 Mar 2021 10:31:47 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=oss.nxp.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=peng.fan@oss.nxp.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jYU56p3HEqflwnui+mzgloznAW3yAVre/3VzsBi1ua1ZFWTW5d4i9G87QrOoNJIJXdbfIfV4BvFZ9yMaAL4zBsxsue5tfEbXdf8Ay3BaVqBASq8/qnzBo7Ye/ShIYAAmMrY4c4ri/2JU4neMm+59VzwmZVPUETWvb1tcfpGK2bam9YKgBHtQ702jVqA7rN/stYwbouJIdxTk89NY/NlriuRhaM6UTZ1qUQbRa574P0Rd3DqZWN7RM6sHn/PfhUONE2ETwSByxfEIkHHqIMH6CS9uDSXKe5Qj2/SapBGveCQ9+nQnvTROMgpjaienwNgSleQR+TGJIx7p0jCXzvENAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4+5ju+nsFgWF+cRriae8paEGcx2W7Gm9e7utzrvAIXQ=; b=BGmqD6iEjpB7nf9syUdwdzw5iBpwGskEkws06laEyPmGRS8/56ArsYdR7RjPeqAwczdVC7YWpFMe964CZUu5+CrPMJo84T39iXecQJhLcfBJ1stbklZGbY323WoMqGpCcZU0AbjBWArxd5p9teuuBLwfm0WFHFx+mSrZ8rv7aCyaY3UPKA/smNe1Rmm9nScI4KKthAv0jtxSH+oYe1okQaisc1V+eq+woYeSZjVh23EpvMWLNTNelor9pVDUM8VWArViImTLd8MlcHVYIIS9M4i6S59eZgviGDR58Eu+pFpT7QhhDgZeUy9ohLfTp03LPq8Ao1QWhdbjbpJ+On0NOA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oss.nxp.com; dmarc=pass action=none header.from=oss.nxp.com; dkim=pass header.d=oss.nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=NXP1.onmicrosoft.com; s=selector2-NXP1-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4+5ju+nsFgWF+cRriae8paEGcx2W7Gm9e7utzrvAIXQ=; b=jRNmGeADTVk6GIplTKRldCJEnb1f6mFMJb8FmACPOY/WM2Fvgqm2ELZ9XJJeo6dPM24YZi/QOkNt3voBIP5cFc+UH5qUUZf8/hDe4k/4foscg2MvfssLQs0hDZEU7GTX9nL1fkCGtmQWbtSxx3yqhDgCvwqooV1YcIhADWpzTfA= Authentication-Results: denx.de; dkim=none (message not signed) header.d=none; denx.de; dmarc=none action=none header.from=oss.nxp.com; Received: from DB6PR0402MB2760.eurprd04.prod.outlook.com (2603:10a6:4:a1::14) by DB6PR04MB3127.eurprd04.prod.outlook.com (2603:10a6:6:c::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3977.26; Thu, 25 Mar 2021 09:31:44 +0000 Received: from DB6PR0402MB2760.eurprd04.prod.outlook.com ([fe80::d58c:d479:d094:43d0]) by DB6PR0402MB2760.eurprd04.prod.outlook.com ([fe80::d58c:d479:d094:43d0%9]) with mapi id 15.20.3955.025; Thu, 25 Mar 2021 09:31:44 +0000 From: "Peng Fan (OSS)" To: sbabic@denx.de, festevam@gmail.com Cc: uboot-imx@nxp.com, u-boot@lists.denx.de, Peng Subject: [PATCH 00/37] imx: hab/caam new feature and update Date: Thu, 25 Mar 2021 17:29:59 +0800 Message-Id: <20210325093036.3270101-1-peng.fan@oss.nxp.com> X-Mailer: git-send-email 2.25.1 X-Originating-IP: [119.31.174.66] X-ClientProxiedBy: HK2PR0302CA0021.apcprd03.prod.outlook.com (2603:1096:202::31) To DB6PR0402MB2760.eurprd04.prod.outlook.com (2603:10a6:4:a1::14) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from localhost.localdomain (119.31.174.66) by HK2PR0302CA0021.apcprd03.prod.outlook.com (2603:1096:202::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3999.16 via Frontend Transport; Thu, 25 Mar 2021 09:31:42 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 805bed98-e692-4885-1335-08d8ef70cdd6 X-MS-TrafficTypeDiagnostic: DB6PR04MB3127: X-MS-Exchange-SharedMailbox-RoutingAgent-Processed: True X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:758; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB6PR0402MB2760.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(396003)(136003)(376002)(39860400002)(346002)(26005)(66556008)(66476007)(8936002)(6486002)(6666004)(66946007)(15650500001)(478600001)(4326008)(52116002)(6506007)(83380400001)(86362001)(1076003)(316002)(5660300002)(186003)(16526019)(38100700001)(6512007)(2616005)(8676002)(2906002)(956004); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData: =?utf-8?q?+q7katXoba+GBvOXIMOhGX7KeiK?= =?utf-8?q?V3u9x665SzjXB/RYdKfvyELzofxEnqwiAiyhhUgtLsEugEYXo5/ueVje?= =?utf-8?q?TCgZEsNb6cXxLOT5au+ya6atL6jwqyRIhs79PzZXOzNETtSNbbMn3lGR?= =?utf-8?q?fdF8xQpVrpUhrH1kwQ9qhS5CilkXr0e/ljQ+N8yxQWsqG2GDtVdbg9p+?= =?utf-8?q?DGb1cA6aqxHQeoPta+IQamzlDi6DCAESuhHjOSi06WUUPRZ9UCA8xxn4?= =?utf-8?q?2JBNOmbDD5/ica+XXxSA6sxAohz12jeH3JZsZP43Ry5mIQlsxKAUwkqK?= =?utf-8?q?nmQ1MVARi+mAEKr8F4VFJhoj/KGfm5HAM4KBhBDMMjk7ItegxjkT398b?= =?utf-8?q?zyiOnUuN5C1DjpeQtjgbXBbncj5lBc+Vyxwq/J4K9dzBWnz80QcUKuiB?= =?utf-8?q?kxbT39CPQ4n6lTkaoxP2u1L6X94dY9BYHWcrgLQAObA2M+W6D5K/hTRa?= =?utf-8?q?hYAh5CrWdW3ONGvOQjf01+WbYIDjzFuO3mZw0qJeyz+rGo2FjhMgr6DQ?= =?utf-8?q?tYYFc/dY6yXmiKHhMU0Kj5yTqIUgrf4EaWabFilvAkMvqoQgg4/on4yy?= =?utf-8?q?F0RkjqW4ZpUmI7SjyMbGqYPkwACovNk8k5EnOg+fJzz1YSee0bAmnPfu?= =?utf-8?q?mYxabxKIr5GYkQ3j0RjQJ8V8+JYynZPplVrbHgHncznEBDW/YkhOmGXK?= =?utf-8?q?+241eGve3ftyjLr/+xhFGme1qUIv8STfTveBGwIyPjYowDoe1o7//bmC?= =?utf-8?q?QYySM7LldAVx3rHRZj9oFiK/MHgDHXg9xtJQpPtKqyzgBvQLOWEra3Yf?= =?utf-8?q?Zybzs53FHaKUhN6MouFdpgzFUi8XIoQXFHT2DXiGxESXDvc+oONTbEt/?= =?utf-8?q?RaevOY4RvWOqn2iIyA2WuQkfl9QVJBrytxjmeSPDna4uW8NTYE8AzQ8+?= =?utf-8?q?GBl10JQ/zOcPIxL+q0yRK7BK/tzbZPP+s29YBPk6InpXIbyfNddYTzbH?= =?utf-8?q?Ab91WkBGJabIpAkkL6ZTaZkb9OL5FqZ89o/Bet5UU213cFK/BJ/TuB3l?= =?utf-8?q?N9PMHiTMLhIhcoz+vOSDiWkbIf60G9z58w5Y9+Y/XeTXnHArEuC7/RP7?= =?utf-8?q?S9oOvsUy0a/blMwILBjIJk9+3rt/690m9vL54B4+Wh4A0bCuPz6ay9dF?= =?utf-8?q?+FD9Pvy81/XRdvnvmTn/vsousmvgNr6JMIdIXWliZE7yeCXirUlzyUF8?= =?utf-8?q?ZnwlLEkwyfdKsY+iEg/zifFNchwU5Fu9MIrGTzzWLue0PR8AEBM3A7ql?= =?utf-8?q?2bZVr9wxJvKIttRO/4OL3ltW7KJqn1kgeeaZ1HI/jtF2Nex5FhXyZ1O7?= =?utf-8?q?sm/KkTQdN4+KDrNjKyVe2EubsFHl8?= X-OriginatorOrg: oss.nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 805bed98-e692-4885-1335-08d8ef70cdd6 X-MS-Exchange-CrossTenant-AuthSource: DB6PR0402MB2760.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2021 09:31:44.3059 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: juPc271fQ620FXCIBT0ThwnYSKlyjCT9HNRZ9w2gW1iPzJb6ysoDBdfy9AInXAX2nApgRnMKFFhrqzG8461yew== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR04MB3127 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.102.4 at phobos.denx.de X-Virus-Status: Clean From: Peng This patchset is to upstream NXP downstream caam, hab features One more patch is to update maintainer for imx8mn_evk board. Aymen Sghaier (6): crypto: caam: Add CAAM support to i.MX8M platforms crypto: caam: Fix build warnings pointer casting crypto: Add blob command support for i.MX8M platforms crypto: caam: Fix pointer size to 32bit for i.MX8M crypto: caam: Add secure memory vid 3 support crypto: caam: RNG4 TRNG errata Breno Lima (13): imx: imx7 Support for Manufacturing Protection imx: Avoid hardcoded output ring size register offset (ORSR) imx: Ensure CAAM clock is enabled prior getting out_jr_size imx: Avoid hardcoded Job Ring Max size imx: hab: Enable hab.c to authenticate additional images in open configuration imx: hab: Check if IVT header is HABv4 mx7ulp: hab: Add hab_status command for HABv4 M4 boot imx: hab: Fix build warnings in 32-bit targets crypto: fsl: blob: Flush dcache range for destination address mx6dq: hab: Fix chip version in hab.h code cmd: blob: Add IMX_HAB and CAAM supported SoCs as dependency cmd: blob: Instantiate RNG before running CMD_BLOB fsl_mfgprot: Fix typo in sign_mppubk() Clement Faure (2): imx8m: Add DEK blob encapsulation for imx8m imx8: Add DEK blob encapsulation Clement Le Marquis (1): imx: caam: new u-boot command to set PRIBLOB bitfield from CAAM SCFGR register to 0x3 Franck LENORMAND (3): crypto: caam: change JR running loop caam: enable support for iMX7ULP imx7ulp: Enable support for cmd blob Peng (1): imx8mn: evk: update MAINTAINERS Peng Fan (2): imx8m: add regs used by CAAM imx: HAB: Update hab codes to support ARM64 and i.MX8M Utkarsh Gupta (2): imx: HAB: Validate IVT before authenticating image imx: hab: Display All HAB events via hab_status command Ye Li (7): imx: hab: Add function to authenticate kernel image hab: Change calling to ROM API failsafe imx: HAB: Add support for iMX8MM iMX8M: Add support to enable CONFIG_IMX_HAB imx: cmd_dek: Enable DEK only for chips supporting CAAM crypto: caam: Add fsl caam driver crypto: fsl: refactor for 32 bit version CAAM support on ARM64 arch/arm/Kconfig | 6 + arch/arm/dts/imx8mm-evk-u-boot.dtsi | 7 + arch/arm/dts/imx8mn-ddr4-evk-u-boot.dtsi | 6 + arch/arm/dts/imx8mp-evk-u-boot.dtsi | 6 + arch/arm/include/asm/arch-imx/cpu.h | 1 + arch/arm/include/asm/arch-imx8/image.h | 11 + arch/arm/include/asm/arch-imx8m/clock.h | 1 + arch/arm/include/asm/arch-imx8m/imx-regs.h | 10 + arch/arm/include/asm/arch-mx7/crm_regs.h | 8 + arch/arm/include/asm/arch-mx7ulp/imx-regs.h | 12 + arch/arm/include/asm/mach-imx/hab.h | 37 +- arch/arm/mach-imx/Kconfig | 44 +- arch/arm/mach-imx/Makefile | 3 + arch/arm/mach-imx/cmd_dek.c | 262 ++++++- arch/arm/mach-imx/cmd_mfgprot.c | 150 ++++ arch/arm/mach-imx/hab.c | 417 +++++++++-- arch/arm/mach-imx/imx8/Kconfig | 1 + arch/arm/mach-imx/imx8m/Kconfig | 1 + arch/arm/mach-imx/imx8m/clock_imx8mm.c | 8 + arch/arm/mach-imx/imx8m/clock_imx8mq.c | 7 + arch/arm/mach-imx/mx7ulp/Kconfig | 1 + arch/arm/mach-imx/priblob.c | 33 + board/freescale/imx8mn_evk/MAINTAINERS | 3 +- cmd/Kconfig | 8 + cmd/Makefile | 1 + cmd/blob.c | 16 + cmd/cmd_fsl_caam.c | 88 +++ doc/imx/habv4/guides/mx6_mx7_secure_boot.txt | 25 + drivers/crypto/Makefile | 1 + drivers/crypto/fsl/Kconfig | 6 + drivers/crypto/fsl/Makefile | 4 +- drivers/crypto/fsl/desc.h | 49 +- drivers/crypto/fsl/desc_constr.h | 28 +- drivers/crypto/fsl/fsl_blob.c | 6 + drivers/crypto/fsl/fsl_hash.c | 6 +- drivers/crypto/fsl/fsl_mfgprot.c | 160 +++++ drivers/crypto/fsl/jobdesc.c | 16 +- drivers/crypto/fsl/jr.c | 53 +- drivers/crypto/fsl/jr.h | 11 +- drivers/crypto/fsl/type.h | 16 + drivers/crypto/fsl_caam.c | 720 +++++++++++++++++++ drivers/crypto/fsl_caam_internal.h | 230 ++++++ include/fsl_caam.h | 24 + include/fsl_sec.h | 54 +- 44 files changed, 2388 insertions(+), 169 deletions(-) create mode 100644 arch/arm/mach-imx/cmd_mfgprot.c create mode 100644 arch/arm/mach-imx/priblob.c create mode 100644 cmd/cmd_fsl_caam.c create mode 100644 drivers/crypto/fsl/fsl_mfgprot.c create mode 100644 drivers/crypto/fsl/type.h create mode 100644 drivers/crypto/fsl_caam.c create mode 100644 drivers/crypto/fsl_caam_internal.h create mode 100644 include/fsl_caam.h -- 2.25.1