From patchwork Tue Oct 26 06:55:48 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Gaurav Jain X-Patchwork-Id: 1546256 X-Patchwork-Delegate: sbabic@denx.de Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=nxp.com header.i=@nxp.com header.a=rsa-sha256 header.s=selector2 header.b=M3Yfyqxd; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Received: from phobos.denx.de (phobos.denx.de [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4HdjN30LkLz9sRR for ; Tue, 26 Oct 2021 17:58:43 +1100 (AEDT) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 8719C835FD; Tue, 26 Oct 2021 08:58:36 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=nxp.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; unprotected) header.d=nxp.com header.i=@nxp.com header.b="M3Yfyqxd"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 6E54D835FE; Tue, 26 Oct 2021 08:57:55 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-1.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FORGED_SPF_HELO, MSGID_FROM_MTA_HEADER,SPF_HELO_PASS,T_SPF_PERMERROR autolearn=no autolearn_force=no version=3.4.2 Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-vi1eur04on0611.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0e::611]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id F3124835DA for ; Tue, 26 Oct 2021 08:57:47 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=nxp.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=gaurav.jain@nxp.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=edaFGcXRgkFgbCblJfsUm+EuPVj372nQPfCUq0ofucIYDp6+VTUz0k7ZPVd/yzl6hHEPWog+0sSrpiphVpFUpYoRJ9jRIHhnLxLY0Tyi8+Dxtpu1YzpeEXyWjwpDh1GdwzxGtxmpLkjIcmzqoSe8TKzbQXftK/EU9tQk1+w1NR9sS8LT1Z6WC/fHq4I+zOJwJQZf/sHgoHcwo15svBG/XHa3pVWjnEd6OSy25BtK5Mfy5C/3uDqgYl0dHkqiOAqkHz0tFikTH7DcSh6bumpjcK2vZ3rQiCqdyAGHnzF91sa4Wih+ttpSXWaIOUochWkgi/8hJu9d1POgGdnRgnSkxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=P8Y9NicfWFgQgRJ75lDgAo8n+F/vWZlX/d5LKFon+3U=; b=Hs9ZrLKPzFo7KSYyDR1nfIb0IUzpgqcY/EHkyyenQtdHDFYSlAPyC4XjRjyfUsen65pcqNWxottlQqgKhN17+n3ErgVRDh2WaNwtsE3Ed1VGrShP16cQBcVYxxOT4JzKDK6zveEDDYGI+O4ueymDZTFHiWWGJwbJBGL9q6McCjqaqECL45zhyaJa0rvJofcJm4t+ASGDiLCIWKjZDDwvGGobyFGezgu3dHhH9Bw6ejSjmiLJXXrRtDOYcFHSTDxeMnaBFqMZLAaS+Dp6/pr+EWKMUFjmRBI/KnsteHYglUmu/kn3FIkKVgO2LJL1ORH7bR28OTxhyB7HhUNpRHM1xw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=P8Y9NicfWFgQgRJ75lDgAo8n+F/vWZlX/d5LKFon+3U=; b=M3YfyqxdfcjVCWTgvnGkQF6QFcRkd/xdVWpbt1EjuCJ/a6TGtnArjixx5BGogVVM0785rS8mkq3N4H1OxHu2OqYgEBj6NS+YUfmPe+4oeBhg+y2y5nUB71a8GtiV3eKXo3cUXwWa8oe6nNQ75Uv7RvytNmRVUukQNir61xv2r5Y= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from VI1PR04MB5342.eurprd04.prod.outlook.com (2603:10a6:803:46::16) by VI1PR04MB5135.eurprd04.prod.outlook.com (2603:10a6:803:62::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4628.18; Tue, 26 Oct 2021 06:57:46 +0000 Received: from VI1PR04MB5342.eurprd04.prod.outlook.com ([fe80::7daf:2591:dd7b:b608]) by VI1PR04MB5342.eurprd04.prod.outlook.com ([fe80::7daf:2591:dd7b:b608%7]) with mapi id 15.20.4628.020; Tue, 26 Oct 2021 06:57:46 +0000 From: Gaurav Jain To: u-boot@lists.denx.de Cc: Stefano Babic , Fabio Estevam , Peng Fan , Simon Glass , Priyanka Jain , Ye Li , Horia Geanta , Ji Luo , Franck Lenormand , Silvano Di Ninno , Sahil malhotra , Pankaj Gupta , Varun Sethi , "NXP i . MX U-Boot Team" , Shengzhou Liu , Mingkai Hu , Rajesh Bhagat , Meenakshi Aggarwal , Wasim Khan , Alison Wang , Pramod Kumar , Tang Yuantian , Adrian Alonso , Vladimir Oltean , Gaurav Jain Subject: [PATCH v4 10/16] crypto/fsl: i.MX8: Enable Job ring driver model in SPL and U-Boot. Date: Tue, 26 Oct 2021 12:25:48 +0530 Message-Id: <20211026065554.29009-11-gaurav.jain@nxp.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20211026065554.29009-1-gaurav.jain@nxp.com> References: <20211026065554.29009-1-gaurav.jain@nxp.com> X-ClientProxiedBy: SGBP274CA0022.SGPP274.PROD.OUTLOOK.COM (2603:1096:4:b0::34) To VI1PR04MB5342.eurprd04.prod.outlook.com (2603:10a6:803:46::16) MIME-Version: 1.0 Received: from lsv03326.swis.in-blr01.nxp.com (14.142.151.118) by SGBP274CA0022.SGPP274.PROD.OUTLOOK.COM (2603:1096:4:b0::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4628.20 via Frontend Transport; Tue, 26 Oct 2021 06:57:40 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 63d9aee0-bc84-4ca9-36b8-08d9984dea68 X-MS-TrafficTypeDiagnostic: VI1PR04MB5135: X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:126; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 6DEu5qmaHXUxe2kV0sbsIIys3d+DGX4JzCCK6EGvaAKynBZGu9eWk46pi/o6rcxhyaA+jdSZxsuZyzlU4PctI3ja08FoNwIf/9aM/mprRGpL884Us24xkyOCsJj1gyzczuU/FnA6zSzRkKnmosH91y+QAMO2Km+I+07HiN8DG1hmKOjHzcYE5qNr20sw2la7ZbwuLGgWaHP2evfixLIHrDC2McznJuLgUu662hblQS0VDvZdYK3QjdIjisK3Q7dGmlBH3aLO/+tK0J8IDMIFdUsSbNPht8u+/RTJ8NrQX98lToNGwD7miDrNFH2d/JuV6Doap5CXTIShWcSg86RL+j1w7VpnmUnNt9ai3heffOIN+zBt4f0Sa2WD6H6wJmtzqlAcl4J6AlqVhb3u0lB2Z05z81NYK4ahuodpVnO3yhzlp1D3A19tevlM/nl5FF6LM7geD1jkIjcU47/JDBfFtiycuwCgehXg6NKKtXjwyD5IWuYGCj0qrBkX/dhOgTtvObe9DKhM/mceN/TbLESZcGaH3XumKAF57SxdRzwPIjK05wKFlbZBYPpNdtqEwSc0pl3dAq3nK6M0F1ECKL7sHNtxVeQ+lKa6WiAQk2/x3E3WfYsi7u735aGJR0/YO9DxajZGKMzl20IACkOcotL/3QwVZzTl8mboiYH9RESQs2Ib8r6c0/8f+fymqS03R/M18SmiMT3xuPiirV6eRkWsMiWKswlG0FBguyCtslCZkNfqjPdpaVV0+dPkKSBDDK2R X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR04MB5342.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(6486002)(956004)(54906003)(1076003)(508600001)(66556008)(316002)(66476007)(66946007)(83380400001)(2906002)(52116002)(26005)(36756003)(7696005)(38100700002)(186003)(1006002)(8936002)(38350700002)(5660300002)(4326008)(6916009)(55236004)(2616005)(86362001)(44832011)(8676002)(110426009); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?HYGiFxzhdywZUbytw4vgITZ1t2yY?= =?utf-8?q?QvYHwpVBOOG2Rye/3ry4Y99dfiJsHYcBGCwYMAGmx6/8I/OWUHydZNuDlAPZoJwZA?= =?utf-8?q?tB3Bkd5oOC6BMdFBMmkPmDztDDpWK1bc9jWbuwm7pVgCTNmLk32NDK+kh7/ZaEzs1?= =?utf-8?q?4cq9FNhqItdh0PhU/nfk2sfcor5f2BEILn/0i23Et79owqDUgKco+AA9i5OReKVuZ?= =?utf-8?q?3dp+04cEihecdr47HiPNjaUYfyqJ6d6qiliL83vJ/Oh6TvBY7ktPW6iGXM25ewiqZ?= =?utf-8?q?zxfAx8AiVYt3whexj7v3HsHQzk1xPVY/FAjYe3HDG+ntQdZQJFB1cgyiGprMyaqqc?= =?utf-8?q?Mr4vIznhvtSsMIupNfLbW8Q/jzoRZUHsmHbbEVZ6XOthO6Wm9kTsm8wT1Se/WtmUq?= =?utf-8?q?sivfDHxjc5tf+/lgjQvsAJrEU4LOkMfDqjkw9/1RckYU42gpfSiCekfzAZj07ZzGU?= =?utf-8?q?j53AHEOyBAZ29A1QYq24BOd35PeqxrD9ZPWm0qt6uW7IKrUg6oYsAl+L40R0yrLO6?= =?utf-8?q?Xgp2aysHJMCm0Ud+sa1q8645KjkidcJWjSokTIB7gc8e6tAg1ZkqsFeOBMwsSnWnu?= =?utf-8?q?1jBs/w4dKpkfYkADbO/VBFUjTiA3go5/UkyiiyKEnBJ+h1yYZPjnfObPgY0n84OJS?= =?utf-8?q?/g+kXWFtXeaEbr6Yt6+8RSvYLV2ko7f1C31j4JKaDe/KBG7rOlWyBcuWL73eUKgKB?= =?utf-8?q?RPTe+649Fd2wv0kizuAndvy4xgmM1KHbVtjXZnpDP3giazJfIiEkNbfaZ3b1W1Qtn?= =?utf-8?q?uIlkx0d+hHgIEXonqzS1LtHfbKZmUGu2AhYgCLGAs8bFI4Y1ipp2rqrWdvBBGQ56t?= =?utf-8?q?MNaHsQfDkI0hAPT0yLRZ3aeRRP9pFuL7zORAsaswpQYkil8i6pQhEpGni79eLMRBW?= =?utf-8?q?nF0VbhJEX5aZPdvCYcyEkRvhyCLqVHHJUzs6hcjGFxW7JdSaAeeI3eP5jpXYrx+mr?= =?utf-8?q?wmJ/ZHJce8MHpKDRR2afBa4eiJSImQkR5hrfZ79CT9Azd9CZ7Gukm2Q8gjWSSO7c1?= =?utf-8?q?IhnWwPhOSHSpLtd0hnU4LMWdzt5zQhoukZoPXFDjOZhLbmQncnbJlCJolCvV99OOK?= =?utf-8?q?4aUaHjgsiA1t4dVsZz84pcmC7FP2TXq7kMCYSAKFRf5cr+WpJVXn9rGgVQq0FawM1?= =?utf-8?q?FmegsYb+HOrqR6dpnUqxDTNlmPItfPKEYMtamxr3CsxR8DU2PtGlPqlSJ6REtBKiV?= =?utf-8?q?3G9DyhB/r1kjlWCrLY9FofQsLSgcwYdiwiCXlcgt6IUTjU/HcoWWAhTVLqmB4W8Ki?= =?utf-8?q?KQL+bgFk6gEftdoJHI/NhPqAGsgBL0rpROj9S2KlMXynL/v1er4utO/PFZmKcE3xd?= =?utf-8?q?DsRHtcZBLD7atGgUOl6xOZQrqSrim5XK4a8fZpQLXgFWNo0QZ2kAgmTg8N3g4DP8Q?= =?utf-8?q?JmfGx9yUM1aOKFyzcL3t2WUS83EWsqcHzlH/2iesnaH+UnVRHMYEtk1VqN0crJ1er?= =?utf-8?q?Nk4jAGu2soxoIsBSe7gvAg6cx7NNj6G/REea2Efcv2FGa7f4VqxH1/vubczOSdGnD?= =?utf-8?q?+PWYhljUHaUjgHWjALUQA+qgAYExtGy6DTNYJykc1R3mLdfK/FWaoAU=3D?= X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 63d9aee0-bc84-4ca9-36b8-08d9984dea68 X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5342.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Oct 2021 06:57:46.4326 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: iEvTJeUmJY/x5D9eqJKIbPL4PEgTzhnkOHHtbW0FADH0i5QwsjgrI3Lk7fmdFYhal9APZWV1l7/p98rNWAWIAA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB5135 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.2 at phobos.denx.de X-Virus-Status: Clean i.MX8(QM/QXP) - added support for JR driver model. sec is initialized based on job ring information processed from device tree. Signed-off-by: Gaurav Jain Signed-off-by: Horia Geantă Reviewed-by: Ye Li --- arch/arm/Kconfig | 3 +++ arch/arm/include/asm/arch-imx8/imx-regs.h | 5 ++++- arch/arm/mach-imx/cmd_dek.c | 1 + arch/arm/mach-imx/imx8/Kconfig | 9 +++++++++ arch/arm/mach-imx/imx8/cpu.c | 16 ++++++++++++++- board/freescale/imx8qm_mek/spl.c | 6 ++++-- board/freescale/imx8qxp_mek/spl.c | 6 ++++-- drivers/crypto/fsl/Kconfig | 2 +- drivers/crypto/fsl/jr.c | 24 +++++++++++++++++++++++ include/fsl_sec.h | 12 +++++------- 10 files changed, 70 insertions(+), 14 deletions(-) diff --git a/arch/arm/Kconfig b/arch/arm/Kconfig index 314e770931..9458ed7eb0 100644 --- a/arch/arm/Kconfig +++ b/arch/arm/Kconfig @@ -806,6 +806,9 @@ config ARCH_LPC32XX config ARCH_IMX8 bool "NXP i.MX8 platform" select ARM64 + select SYS_FSL_HAS_SEC + select SYS_FSL_SEC_COMPAT_4 + select SYS_FSL_SEC_LE select DM select GPIO_EXTRA_HEADER select MACH_IMX diff --git a/arch/arm/include/asm/arch-imx8/imx-regs.h b/arch/arm/include/asm/arch-imx8/imx-regs.h index ed6e05e556..2d64b0604b 100644 --- a/arch/arm/include/asm/arch-imx8/imx-regs.h +++ b/arch/arm/include/asm/arch-imx8/imx-regs.h @@ -1,6 +1,6 @@ /* SPDX-License-Identifier: GPL-2.0+ */ /* - * Copyright 2018 NXP + * Copyright 2018, 2021 NXP */ #ifndef __ASM_ARCH_IMX8_REGS_H__ @@ -47,4 +47,7 @@ #define USB_BASE_ADDR 0x5b0d0000 #define USB_PHY0_BASE_ADDR 0x5b100000 +#define CONFIG_SYS_FSL_SEC_ADDR (0x31400000) +#define CONFIG_SYS_FSL_MAX_NUM_OF_SEC 1 + #endif /* __ASM_ARCH_IMX8_REGS_H__ */ diff --git a/arch/arm/mach-imx/cmd_dek.c b/arch/arm/mach-imx/cmd_dek.c index 89da89c51d..04c4b20a84 100644 --- a/arch/arm/mach-imx/cmd_dek.c +++ b/arch/arm/mach-imx/cmd_dek.c @@ -9,6 +9,7 @@ #include #include #include +#include #include #include #include diff --git a/arch/arm/mach-imx/imx8/Kconfig b/arch/arm/mach-imx/imx8/Kconfig index b43739e5c6..9a20ebe84e 100644 --- a/arch/arm/mach-imx/imx8/Kconfig +++ b/arch/arm/mach-imx/imx8/Kconfig @@ -8,6 +8,7 @@ config AHAB_BOOT config IMX8 bool + select HAS_CAAM config MU_BASE_SPL hex "MU base address used in SPL" @@ -72,6 +73,10 @@ config TARGET_IMX8QM_MEK bool "Support i.MX8QM MEK board" select BOARD_LATE_INIT select IMX8QM + select FSL_CAAM + select FSL_BLOB + select ARCH_MISC_INIT + select SPL_CRYPTO if SPL config TARGET_CONGA_QMX8 bool "Support congatec conga-QMX8 board" @@ -89,6 +94,10 @@ config TARGET_IMX8QXP_MEK bool "Support i.MX8QXP MEK board" select BOARD_LATE_INIT select IMX8QXP + select FSL_CAAM + select FSL_BLOB + select ARCH_MISC_INIT + select SPL_CRYPTO if SPL endchoice diff --git a/arch/arm/mach-imx/imx8/cpu.c b/arch/arm/mach-imx/imx8/cpu.c index ee5cc47903..5140c93a37 100644 --- a/arch/arm/mach-imx/imx8/cpu.c +++ b/arch/arm/mach-imx/imx8/cpu.c @@ -1,6 +1,6 @@ // SPDX-License-Identifier: GPL-2.0+ /* - * Copyright 2018 NXP + * Copyright 2018, 2021 NXP */ #include @@ -89,6 +89,20 @@ int arch_cpu_init_dm(void) return 0; } +#if defined(CONFIG_ARCH_MISC_INIT) +int arch_misc_init(void) +{ + struct udevice *dev; + int ret; + + ret = uclass_get_device_by_driver(UCLASS_MISC, DM_DRIVER_GET(caam_jr), &dev); + if (ret) + printf("Failed to initialize %s: %d\n", dev->name, ret); + + return 0; +} +#endif + int print_bootinfo(void) { enum boot_device bt_dev = get_boot_device(); diff --git a/board/freescale/imx8qm_mek/spl.c b/board/freescale/imx8qm_mek/spl.c index 944ba745c0..332a662dee 100644 --- a/board/freescale/imx8qm_mek/spl.c +++ b/board/freescale/imx8qm_mek/spl.c @@ -1,7 +1,7 @@ +// SPDX-License-Identifier: GPL-2.0-or-later /* - * Copyright 2018 NXP + * Copyright 2018, 2021 NXP * - * SPDX-License-Identifier: GPL-2.0+ */ #include @@ -24,6 +24,8 @@ void spl_board_init(void) { struct udevice *dev; + uclass_get_device_by_driver(UCLASS_MISC, DM_DRIVER_GET(imx8_scu), &dev); + uclass_find_first_device(UCLASS_MISC, &dev); for (; dev; uclass_find_next_device(&dev)) { diff --git a/board/freescale/imx8qxp_mek/spl.c b/board/freescale/imx8qxp_mek/spl.c index ae6b64ff6e..2fa6840056 100644 --- a/board/freescale/imx8qxp_mek/spl.c +++ b/board/freescale/imx8qxp_mek/spl.c @@ -1,7 +1,7 @@ +// SPDX-License-Identifier: GPL-2.0-or-later /* - * Copyright 2018 NXP + * Copyright 2018, 2021 NXP * - * SPDX-License-Identifier: GPL-2.0+ */ #include @@ -39,6 +39,8 @@ void spl_board_init(void) { struct udevice *dev; + uclass_get_device_by_driver(UCLASS_MISC, DM_DRIVER_GET(imx8_scu), &dev); + uclass_find_first_device(UCLASS_MISC, &dev); for (; dev; uclass_find_next_device(&dev)) { diff --git a/drivers/crypto/fsl/Kconfig b/drivers/crypto/fsl/Kconfig index ab59d516f8..0bc1458eb5 100644 --- a/drivers/crypto/fsl/Kconfig +++ b/drivers/crypto/fsl/Kconfig @@ -11,7 +11,7 @@ config FSL_CAAM config CAAM_64BIT bool - default y if PHYS_64BIT && !ARCH_IMX8M + default y if PHYS_64BIT && !ARCH_IMX8M && !ARCH_IMX8 help Select Crypto driver for 64 bits CAAM version diff --git a/drivers/crypto/fsl/jr.c b/drivers/crypto/fsl/jr.c index 69804dc1df..0bfdf9070f 100644 --- a/drivers/crypto/fsl/jr.c +++ b/drivers/crypto/fsl/jr.c @@ -25,6 +25,7 @@ #include #include #include +#include #define CIRC_CNT(head, tail, size) (((head) - (tail)) & (size - 1)) #define CIRC_SPACE(head, tail, size) CIRC_CNT((tail), (head) + 1, (size)) @@ -790,6 +791,25 @@ int sec_init(void) return sec_init_idx(0); } +#ifdef CONFIG_ARCH_IMX8 +static int jr_power_on(int subnode) +{ +#if CONFIG_IS_ENABLED(POWER_DOMAIN) + struct udevice __maybe_unused jr_dev; + struct power_domain pd; + + dev_set_ofnode(&jr_dev, offset_to_ofnode(subnode)); + + /* Need to power on Job Ring before access it */ + if (!power_domain_get(&jr_dev, &pd)) { + if (power_domain_on(&pd)) + return -EINVAL; + } +#endif + return 0; +} +#endif + #if CONFIG_IS_ENABLED(DM) static int caam_jr_probe(struct udevice *dev) { @@ -822,6 +842,10 @@ static int caam_jr_probe(struct udevice *dev) jr_node = jr_node >> 4; } caam->jrid = jr_node - 1; +#ifdef CONFIG_ARCH_IMX8 + if (jr_power_on(subnode)) + return -EINVAL; +#endif break; } } diff --git a/include/fsl_sec.h b/include/fsl_sec.h index c4121696f8..7b6e3e2c20 100644 --- a/include/fsl_sec.h +++ b/include/fsl_sec.h @@ -3,7 +3,7 @@ * Common internal memory map for some Freescale SoCs * * Copyright 2014 Freescale Semiconductor, Inc. - * Copyright 2018 NXP + * Copyright 2018, 2021 NXP */ #ifndef __FSL_SEC_H @@ -194,12 +194,10 @@ typedef struct ccsr_sec { #define SEC_CHAVID_LS_RNG_SHIFT 16 #define SEC_CHAVID_RNG_LS_MASK 0x000f0000 -#define CONFIG_JRSTARTR_JR0 0x00000001 - struct jr_regs { #if defined(CONFIG_SYS_FSL_SEC_LE) && \ !(defined(CONFIG_MX6) || defined(CONFIG_MX7) || \ - defined(CONFIG_MX7ULP) || defined(CONFIG_IMX8M)) + defined(CONFIG_MX7ULP) || defined(CONFIG_IMX8M) || defined(CONFIG_IMX8)) u32 irba_l; u32 irba_h; #else @@ -214,7 +212,7 @@ struct jr_regs { u32 irja; #if defined(CONFIG_SYS_FSL_SEC_LE) && \ !(defined(CONFIG_MX6) || defined(CONFIG_MX7) || \ - defined(CONFIG_MX7ULP) || defined(CONFIG_IMX8M)) + defined(CONFIG_MX7ULP) || defined(CONFIG_IMX8M) || defined(CONFIG_IMX8)) u32 orba_l; u32 orba_h; #else @@ -248,7 +246,7 @@ struct jr_regs { struct sg_entry { #if defined(CONFIG_SYS_FSL_SEC_LE) && \ !(defined(CONFIG_MX6) || defined(CONFIG_MX7) || \ - defined(CONFIG_MX7ULP) || defined(CONFIG_IMX8M)) + defined(CONFIG_MX7ULP) || defined(CONFIG_IMX8M) || defined(CONFIG_IMX8)) uint32_t addr_lo; /* Memory Address - lo */ uint32_t addr_hi; /* Memory Address of start of buffer - hi */ #else @@ -268,7 +266,7 @@ struct sg_entry { }; #if defined(CONFIG_MX6) || defined(CONFIG_MX7) || \ - defined(CONFIG_MX7ULP) || defined(CONFIG_IMX8M) + defined(CONFIG_MX7ULP) || defined(CONFIG_IMX8M) || defined(CONFIG_IMX8) /* Job Ring Base Address */ #define JR_BASE_ADDR(x) (CONFIG_SYS_FSL_SEC_ADDR + 0x1000 * (x + 1)) /* Secure Memory Offset varies accross versions */