From patchwork Thu May 9 00:45:32 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Vabhav Sharma X-Patchwork-Id: 1933293 Return-Path: X-Original-To: incoming-dt@patchwork.ozlabs.org Delivered-To: patchwork-incoming-dt@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=nxp.com header.i=@nxp.com header.a=rsa-sha256 header.s=selector2 header.b=gRMGHo6d; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org (client-ip=2604:1380:45e3:2400::1; helo=sv.mirrors.kernel.org; envelope-from=devicetree+bounces-65890-incoming-dt=patchwork.ozlabs.org@vger.kernel.org; receiver=patchwork.ozlabs.org) Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org [IPv6:2604:1380:45e3:2400::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4VZYGZ1q96z20fh for ; Thu, 9 May 2024 10:45:58 +1000 (AEST) Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id ED12E284434 for ; Thu, 9 May 2024 00:45:56 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 1DE1A3A8D2; Thu, 9 May 2024 00:45:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=nxp.com header.i=@nxp.com header.b="gRMGHo6d" X-Original-To: devicetree@vger.kernel.org Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-he1eur04on2080.outbound.protection.outlook.com [40.107.7.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id BD51D376E1; Thu, 9 May 2024 00:45:44 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.107.7.80 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715215546; cv=fail; b=JSZF1DbUGsImAEbX0d2F4kVLZPafMPsErjo6x/R+17pMXBs04umqhDMyLcWuwAkbqDiPlQ6/gGj1vwWM0pKLXjtNfIA+mgOXzDt97a2PEsQYA8MkthSsaRNK+qovIvcqRDlczLE971dES7VTYJyGlX8DsgPqQrbj610cU+QjoVM= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715215546; c=relaxed/simple; bh=7ifINYCByfo5Rm2D01X9gpRbpguxgJzH/s1a2oalSGE=; h=From:Date:Subject:Content-Type:Message-Id:References:In-Reply-To: To:Cc:MIME-Version; b=qZfdC6miqa0Edt8pZcJWLyRaZFoE0/lgFafepacLeHXpKapr5z35whRt/EvgWNFwUGp6MEq5gILwjL09cReCGxxN/7IuUM/dLme99zZT0tLZge16S1fLJjpA4c/gZv0eWrOqZWv1Nd8gOh+dfJfyzLACtZnZtezo1SmurMpZI2E= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=nxp.com; spf=pass smtp.mailfrom=nxp.com; dkim=pass (1024-bit key) header.d=nxp.com header.i=@nxp.com header.b=gRMGHo6d; arc=fail smtp.client-ip=40.107.7.80 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=nxp.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=nxp.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Ewv6KbmbWr2caoRLEj17PizqOnNwmO7LSHXhYp6fbJkAxOHISJcx+rzDNcsdpV2RevupHfeX3AcMERKOsTNoRTkZq+uWsu2wg8rfC9A/sOTm6yaTqx8P0BczJalnUwJgAXR0PmCvmXpc9njSZAwLrx3ddWeyii1PD13Rg7b4wXbfNKALxV2C9DflxV/v4rAgtBJDh8ybnoxCzDmo16i3A6GiXA3g6AiWB/4m3lpGaFPX8c8Y6+ALbTgbgMjTsTce3P+rHXCG+4715zdKkYUekHQXNJB6ZkNjXVs5erTZTISIoJIdqu5T3ladYUradpvzb5tw0z3OpZsq5eirERllvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ZegWxIa1zIwZXyyTi83e83cwxK2CZBnVEV2ywdhASCQ=; b=Ow9BwA/3JN5RQj8EokaSNIVqX3rxV+YzZtvOr3gVLq1JAzbMcBezUrH2ZaJ4VTsbrTQ9B4rHATxO/Ym5zI5A7oxpsyFbC53LxBafri/4mcY3M3/hba7Bs6u8gCsRz5JTvJVD4It+sFxGot/vqBz7ZQzcTYj5aG7hD1RDAAsov5Dhr4ldbLVZtOMNrJr17jFwIgtDj8+KPUOu8LYhaqsqVYYz37kWZ3frPHmbqJ4VhVuaB2qv1CstXR2wgiXMR+iGR4n32g8WkZFT6wR12DNrIsdupqZkflpDhUSrfl37K67ALCoUmsLPD5VdvsP0vym0hK5HS9NhF6CyYBxSo2A+Gg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZegWxIa1zIwZXyyTi83e83cwxK2CZBnVEV2ywdhASCQ=; b=gRMGHo6dryrGI4IMsvBT47tqUgQ2RWru2u3TUBbEKmj0apq0vtrdMj/5pItcoPWb06LE5R643xstqXyAqHHvPjqtaQC4Iy7ug8kVnfDpsMwdg9c2ViO36PbZvgGySq3HR+VKC00HyhopOKP1RqEXYqzFnAUK5LV9qUJGhBVpbwM= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from AS1PR04MB9358.eurprd04.prod.outlook.com (2603:10a6:20b:4dc::19) by AM9PR04MB8273.eurprd04.prod.outlook.com (2603:10a6:20b:3e5::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7544.42; Thu, 9 May 2024 00:45:39 +0000 Received: from AS1PR04MB9358.eurprd04.prod.outlook.com ([fe80::d74b:21b6:d315:cb84]) by AS1PR04MB9358.eurprd04.prod.outlook.com ([fe80::d74b:21b6:d315:cb84%4]) with mapi id 15.20.7544.041; Thu, 9 May 2024 00:45:39 +0000 From: Vabhav Sharma Date: Thu, 09 May 2024 02:45:32 +0200 Subject: [PATCH 1/4] dt-bindings: firmware: secvio: Add device tree bindings Message-Id: <20240509-secvio-v1-1-90fbe2baeda2@nxp.com> References: <20240509-secvio-v1-0-90fbe2baeda2@nxp.com> In-Reply-To: <20240509-secvio-v1-0-90fbe2baeda2@nxp.com> To: Rob Herring , Krzysztof Kozlowski , Conor Dooley , Franck LENORMAND , Dong Aisheng , Shawn Guo , Sascha Hauer , Pengutronix Kernel Team , Fabio Estevam , Peng Fan Cc: devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, imx@lists.linux.dev, linux-arm-kernel@lists.infradead.org, Varun Sethi , Silvano Di Ninno , Pankaj Gupta , frank.li@nxp.com, daniel.baluta@nxp.com, Vabhav Sharma X-Mailer: b4 0.13.0 X-ClientProxiedBy: AS4P190CA0006.EURP190.PROD.OUTLOOK.COM (2603:10a6:20b:5de::9) To AS1PR04MB9358.eurprd04.prod.outlook.com (2603:10a6:20b:4dc::19) Precedence: bulk X-Mailing-List: devicetree@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AS1PR04MB9358:EE_|AM9PR04MB8273:EE_ X-MS-Office365-Filtering-Correlation-Id: 5da18fb3-c361-4791-1a91-08dc6fc158f4 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230031|1800799015|7416005|52116005|376005|366007|38350700005|921011; X-Microsoft-Antispam-Message-Info: =?utf-8?q?1kDTiTlyFbtjUUI3jztDodXlBMKxckR?= =?utf-8?q?Ei+yPDPQx7siLJQUwX4gG5BdTuS4kdluxB4mBIP7qM4utNJlKrECVUSbzjlEgovV2?= =?utf-8?q?dF/H3PmHTVsDVtpaKySVF1C1wcRvhgBNx4i1PYY/B8jHCOYBDE2/thd6LLSXRpHvN?= =?utf-8?q?YI2oPwwbi5+VnRTTegMkCadVZnvJeKWrU5dIOriSveEbPl+SJ4RJzBVVZg8izk34C?= =?utf-8?q?Zj3HN/2DR9IcG7GkbruVQgYIEAasQxdGKuzMNPEG/HGf8adaR5mhM2WKr6tz8yEET?= =?utf-8?q?4/wzjFw8oOJKPSrn//Rf/8piKUay2uMuZTAPNVirhp5dzvn9YU8TQCLoDFxiA663m?= =?utf-8?q?uWwjCGgsNRdFvrl62ZIjqmYbAUrokHkFiQiwxEnTZwSkF8jnKJtbgvJ1B+aUj2xNl?= =?utf-8?q?JC435cH50/1bboh13rE8a1DcprTighUSmTv5O+zLIQ3QikOuQJnJtMuO7rbkyiTuD?= =?utf-8?q?tle+KXrqSUtqM9+9abicTf4fxn7r/hNGdYJ+YEKQK2rw6iFSao15MfJ5ITCjVWhkl?= =?utf-8?q?qjuEkEcQ982HxgfJdOajbfYY8IULNAmdQCWLayemKtEYWVunwSFlj4u51bPuUlS6q?= =?utf-8?q?S/O5X7InxvHmKWpudvAyPzuDZnd7LpdNZ/aioJh57GRy+QNqLROmWOSS7zPU7hJbh?= =?utf-8?q?bXDJftefL82txlZWz0Ic96D0kMVFmGhkEVIKzZSoVDStsHk4DmZd+D1BK79f/fYgP?= =?utf-8?q?Qi2xo+WvpHLt6m/nICas8x7QMkY+a58N6R/+KAWAxyCwrku4Vn1phZNLsaoGfrPnv?= =?utf-8?q?65iRdjwWH5TY8S0qwfRBVDARuf1CGffxGW6EYIvaG6V6gtR+LGelbBfx9DoJsx3Kd?= =?utf-8?q?mZ/LqMtzsL+uVn5jkzxfYeG57rcisJOw/ZReTXmErllKiK56oMxGg+gAD0dRgwY14?= =?utf-8?q?TbS3il3egDdJVE5QJMMuEXqFVXnb2VaW+Q2b4Lsp58QPMTax1O7GqzvWC+/13zq4O?= =?utf-8?q?g1bqcSFJjrP3KJ7mVZ25uUQMYhe2BZXWVyjhDtu5/rEfEPdtMJqQkGaL8NzKLyiwb?= =?utf-8?q?uBufQzlL34wDO5046/BTQ1VW8xw1vBgT/3rwL1yofqoGCjA8e2VLNE++nUPxoVBpI?= =?utf-8?q?CUZNyVjoO8cPL6MFmwpExf95W9LI94BIJ4K6buKEju9jBjz634N4edLvPgsK21fVz?= =?utf-8?q?ETS30rjnQ4QigOcv2jgwFHHWt9GRogHSs9g0T0klCERktQTSZq1XzMxv4otoSYsPh?= =?utf-8?q?tBgpLhhQ9B6viuQzv7vrhog/5D2Q95khyZsBtxhRaFeyePpDgF+2OY1C8=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS1PR04MB9358.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(1800799015)(7416005)(52116005)(376005)(366007)(38350700005)(921011);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?GLmxvI8+49OEQDhUtZGTIMab2eSv?= =?utf-8?q?JSuegVf2qPyUuOnUuAiwE5lvWRUvrEId7jAh6E46/0pxb2nipnCxXNTKExxuHOor5?= =?utf-8?q?WDe/m59R66KzYdqPOfUHqEwCVJHrq5RUrLjoOpYp5RLyTklWVwwa7vbl21VEdwT/6?= =?utf-8?q?aMM2FtQncRh64K0mDQQcSB0+XTdwpEQDnojtDrRkYug8cPktOCNphmr8YcuVBBWQx?= =?utf-8?q?2Nw0Vu86LFRNIJPBoBlwFwMxYs6U80Rp1zrVFgnDDfPfxgqJJQxsfQwbKXNufI/TF?= =?utf-8?q?OBdAPoLE1sjP9AsDjpUGWKSh0Oh8t2B/CZ1EgIFkE1ae5Ym8O+lCS/y/bshFYlJCC?= =?utf-8?q?Z7aCWE/Va1E9GozY7Q/QJcM5KHGMFRUHrnXixHpeHKeJVEShfQh2obJToe2nvjn1g?= =?utf-8?q?gCZne4uJNlyohhdMx7dNFZzAZ4IeDzEP6VLlstk9wGeYB5ZaOoh5xQmhSooveDMIn?= =?utf-8?q?lbo+0edSuGfBGBI4Woqh0Ojbb/pwOnmH8fHhCf7nFbfz2NWIR9SocpfiwWmTfGOkL?= =?utf-8?q?2xE3QAtMChbkVnJvIORKdx71f+EFMUpBFa5YF37GVKBz2zeleJ5OQhfQWJQO+Kvv7?= =?utf-8?q?X3t6NLMSzIa7o99EOAKuN4C+dOhfBvmKjCdAFM+b3sA8v7qV3CQYDrzSPY506LClw?= =?utf-8?q?/QfgrF5TV4mMaoeJIt+oOZ/A39YQybtqmk8OmL1s5z+gENkAesvq3JJF6yGQkfDdB?= =?utf-8?q?24ghX4kIrQWQZOoUGns4cs06ckP/26IdYUvehKGYsyZuSH0donY+FByerX2mzxFBr?= =?utf-8?q?kYozjwlFybcCKGBNVYWFPkxoDu0R5IpruA4UcN/Kl81UvzxgA8lQDswsu1ZQNtDcR?= =?utf-8?q?06B2bSt0IS9SrKvpGK6xnSz6pwqd1WJOaDEw+qNaKQH8qk7Y4REJYd1PZHCn+0S/S?= =?utf-8?q?I7n2QJXRbP6eYB65bqNVegdEp7aPVDgm8F3fhvZ3dRl/6/v9m8WMiNl+tok9vcATH?= =?utf-8?q?bDUcMXkKR0cnSR0J5yg05IjveSOECVF99B9B+LwytxPd63EnlHokuBomp3cbslOeq?= =?utf-8?q?qVIeQc6Bsp8b62fjFn02FFycFDWp39WLIPTStDuaHBsMwsJjbtC2A3M3QTTvL2xsL?= =?utf-8?q?ZS5FEbwZuB5ZrXYHnA1g/xoPBNtCDleou2jQ0bVS3oL1valwIAGHkuEHWQGniAxDq?= =?utf-8?q?nQhj5rmrLVlclsEw14taHKwEh5IDQ1xPXwXi/s8WV6x1Zj1vO2Rct5TWT7PgNnYmE?= =?utf-8?q?dTkSFLpWG7zwZpw6/F8u/WvyR/G8aMKduwwSw8/dUYx09ofHltI0KfnPIaO0ZYmKM?= =?utf-8?q?qVOg4Ez1v0MSKMQq8lSpAfpPW/P0WAHc1E9FyuGq4uG7UCgntPjvac8EvmIBSbHeC?= =?utf-8?q?dgxoT3EMiZrZ5BpM9mGpktJfgWG78i9voPKkuHcK1tEzNSykQDRN206sfP1QcEu+B?= =?utf-8?q?5qGD6iibZHGWG7E5Pxb96NTDvV6DME+Ke6+WiXXTP0+4u66fFitAcqj5F6K5oFWY/?= =?utf-8?q?Y21CauIuDyzjW/n54kZrf8R51Wzoo5cVh4DhjFHLIgpOpExdH4KyyMqlyfyuOmysL?= =?utf-8?q?eCM0DXwko6MZ?= X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 5da18fb3-c361-4791-1a91-08dc6fc158f4 X-MS-Exchange-CrossTenant-AuthSource: AS1PR04MB9358.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 May 2024 00:45:39.2836 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: g4AxLtI2odJMYrAoPy3MSqb62RdVvlT3q8YkgwevqdWf/Um79ESyFnkvkNa0enuF8iMiI6YREPLEEWvjAV0Apg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8273 Document the secvio device tree bindings. The tampers are security feature available on i.MX products and managed by SNVS block.The tamper goal is to detect the variation of hardware or physical parameters, which can indicate an attack. The SNVS, which provides secure non-volatile storage, allows to detect some hardware attacks against the SoC.They are connected to the security-violation ports, which send an alert when an out-of-range value is detected. The "imx-secvio-sc" module is designed to report security violations and tamper triggering via SCU firmware to the user. Add the imx-scu secvio sub node and secvio sub node description. Signed-off-by: Franck LENORMAND Signed-off-by: Vabhav Sharma --- .../bindings/arm/freescale/fsl,scu-secvio.yaml | 35 ++++++++++++++++++++++ .../devicetree/bindings/firmware/fsl,scu.yaml | 10 +++++++ 2 files changed, 45 insertions(+) diff --git a/Documentation/devicetree/bindings/arm/freescale/fsl,scu-secvio.yaml b/Documentation/devicetree/bindings/arm/freescale/fsl,scu-secvio.yaml new file mode 100644 index 000000000000..30dc1e21f903 --- /dev/null +++ b/Documentation/devicetree/bindings/arm/freescale/fsl,scu-secvio.yaml @@ -0,0 +1,35 @@ +# SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) +%YAML 1.2 +--- +$id: http://devicetree.org/schemas/arm/freescale/fsl,scu-secvio.yaml# +$schema: http://devicetree.org/meta-schemas/core.yaml# + +title: NXP i.MX Security Violation driver + +maintainers: + - Franck LENORMAND + +description: | + Receive security violation from the SNVS via the SCU firmware. Allow to + register notifier for additional processing + +properties: + compatible: + enum: + - fsl,imx-sc-secvio + + nvmem: + maxItems: 1 + +required: + - compatible + - nvmem + +additionalProperties: false + +examples: + - | + secvio { + compatible = "fsl,imx-sc-secvio"; + nvmem = <&ocotp>; + }; diff --git a/Documentation/devicetree/bindings/firmware/fsl,scu.yaml b/Documentation/devicetree/bindings/firmware/fsl,scu.yaml index 557e524786c2..b40e127fdc88 100644 --- a/Documentation/devicetree/bindings/firmware/fsl,scu.yaml +++ b/Documentation/devicetree/bindings/firmware/fsl,scu.yaml @@ -129,6 +129,11 @@ properties: RTC controller provided by the SCU $ref: /schemas/rtc/fsl,scu-rtc.yaml + secvio: + description: + Receive security violation from the SNVS via the SCU firmware + $ref: /schemas/arm/freescale/fsl,scu-secvio.yaml + thermal-sensor: description: Thermal sensor provided by the SCU @@ -197,6 +202,11 @@ examples: compatible = "fsl,imx8qxp-sc-rtc"; }; + secvio { + compatible = "fsl,imx-sc-secvio"; + nvmem = <&ocotp>; + }; + keys { compatible = "fsl,imx8qxp-sc-key", "fsl,imx-sc-key"; linux,keycodes = ;