1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
|
/*
* CAAM/SEC 4.x Security Violation Handler
* Copyright 2012 Freescale Semiconductor, Inc., All Rights Reserved
*/
#include "compat.h"
#include "intern.h"
#include "secvio.h"
#include "regs.h"
/*
* These names are associated with each violation handler.
* The source names were taken from MX6, and are based on recommendations
* for most common SoCs.
*/
static const u8 *violation_src_name[] = {
"CAAM Security Violation",
"JTAG Alarm",
"Watchdog",
"(reserved)",
"External Boot",
"Tamper Detect",
};
/* Top-level security violation interrupt */
static irqreturn_t caam_secvio_interrupt(int irq, void *snvsdev)
{
struct device *dev = snvsdev;
struct caam_drv_private_secvio *svpriv = dev_get_drvdata(dev);
u32 irqstate;
/* Check the HP secvio status register */
irqstate = rd_reg32(&svpriv->svregs->hp.secvio_status) |
HP_SECVIOST_SECVIOMASK;
if (!irqstate)
return IRQ_NONE;
/* Mask out one or more causes for deferred service */
clrbits32(&svpriv->svregs->hp.secvio_int_ctl, irqstate);
/* Now ACK causes */
setbits32(&svpriv->svregs->hp.secvio_status, irqstate);
/* And run deferred service */
preempt_disable();
tasklet_schedule(&svpriv->irqtask[smp_processor_id()]);
preempt_enable();
return IRQ_HANDLED;
}
/* Deferred service handler. Tasklet arg is simply the SNVS dev */
static void caam_secvio_dispatch(unsigned long indev)
{
struct device *dev = (struct device *)indev;
struct caam_drv_private_secvio *svpriv = dev_get_drvdata(dev);
unsigned long flags, cause;
int i;
/*
* Capture the interrupt cause, using masked interrupts as
* identification. This only works if all are enabled; if
* this changes in the future, a "cause queue" will have to
* be built
*/
cause = rd_reg32(&svpriv->svregs->hp.secvio_int_ctl) &
(HP_SECVIO_INTEN_SRC5 | HP_SECVIO_INTEN_SRC4 |
HP_SECVIO_INTEN_SRC3 | HP_SECVIO_INTEN_SRC2 |
HP_SECVIO_INTEN_SRC1 | HP_SECVIO_INTEN_SRC0);
/* Look through causes, call each handler if exists */
for (i = 0; i < MAX_SECVIO_SOURCES; i++)
if (cause & (1 << i)) {
spin_lock_irqsave(&svpriv->svlock, flags);
svpriv->intsrc[i].handler(dev, i,
svpriv->intsrc[i].ext);
spin_unlock_irqrestore(&svpriv->svlock, flags);
};
/* Re-enable now-serviced interrupts */
setbits32(&svpriv->svregs->hp.secvio_int_ctl, cause);
}
/*
* Default cause handler, used in lieu of an application-defined handler.
* All it does at this time is print a console message. It could force a halt.
*/
static void caam_secvio_default(struct device *dev, u32 cause, void *ext)
{
struct caam_drv_private_secvio *svpriv = dev_get_drvdata(dev);
dev_err(dev, "Unhandled Security Violation Interrupt %d = %s\n",
cause, svpriv->intsrc[cause].intname);
}
/*
* Install an application-defined handler for a specified cause
* Arguments:
* - dev points to SNVS-owning device
* - cause interrupt source cause
* - handler application-defined handler, gets called with dev
* source cause, and locally-defined handler argument
* - cause_description points to a string to override the default cause
* name, this can be used as an alternate for error
* messages and such. If left NULL, the default
* description string is used.
* - ext pointer to any extra data needed by the handler.
*/
int caam_secvio_install_handler(struct device *dev, enum secvio_cause cause,
void (*handler)(struct device *dev, u32 cause,
void *ext),
u8 *cause_description, void *ext)
{
unsigned long flags;
struct caam_drv_private_secvio *svpriv;
svpriv = dev_get_drvdata(dev);
if ((handler == NULL) || (cause > SECVIO_CAUSE_SOURCE_5))
return -EINVAL;
spin_lock_irqsave(&svpriv->svlock, flags);
svpriv->intsrc[cause].handler = handler;
if (cause_description != NULL)
svpriv->intsrc[cause].intname = cause_description;
if (ext != NULL)
svpriv->intsrc[cause].ext = ext;
spin_unlock_irqrestore(&svpriv->svlock, flags);
return 0;
}
EXPORT_SYMBOL(caam_secvio_install_handler);
/*
* Remove an application-defined handler for a specified cause (and, by
* implication, restore the "default".
* Arguments:
* - dev points to SNVS-owning device
* - cause interrupt source cause
*/
int caam_secvio_remove_handler(struct device *dev, enum secvio_cause cause)
{
unsigned long flags;
struct caam_drv_private_secvio *svpriv;
svpriv = dev_get_drvdata(dev);
if (cause > SECVIO_CAUSE_SOURCE_5)
return -EINVAL;
spin_lock_irqsave(&svpriv->svlock, flags);
svpriv->intsrc[cause].intname = violation_src_name[cause];
svpriv->intsrc[cause].handler = caam_secvio_default;
svpriv->intsrc[cause].ext = NULL;
spin_unlock_irqrestore(&svpriv->svlock, flags);
return 0;
}
EXPORT_SYMBOL(caam_secvio_remove_handler);
int caam_secvio_startup(struct platform_device *pdev)
{
struct device *ctrldev, *svdev;
struct caam_drv_private *ctrlpriv;
struct caam_drv_private_secvio *svpriv;
struct platform_device *svpdev;
int i, error;
ctrldev = &pdev->dev;
ctrlpriv = dev_get_drvdata(ctrldev);
/*
* Set up the private block for secure memory
* Only one instance is possible
*/
svpriv = kzalloc(sizeof(struct caam_drv_private_secvio), GFP_KERNEL);
if (svpriv == NULL) {
dev_err(ctrldev, "can't alloc private mem for secvio\n");
return -ENOMEM;
}
svpriv->parentdev = ctrldev;
/* Create the security violation dev */
#ifdef CONFIG_OF
svpdev = of_platform_device_create(np, NULL, ctrldev);
#else
svpdev = platform_device_register_data(ctrldev, "caam_secvio", 0,
svpriv,
sizeof(struct caam_drv_private_secvio));
#endif
if (svpdev == NULL) {
kfree(svpriv);
return -EINVAL;
}
svdev = &svpdev->dev;
dev_set_drvdata(svdev, svpriv);
ctrlpriv->secviodev = svdev;
svpriv->svregs = ctrlpriv->snvs;
/*
* Now we have all the dev data set up. Init interrupt
* source descriptions
*/
for (i = 0; i < MAX_SECVIO_SOURCES; i++) {
svpriv->intsrc[i].intname = violation_src_name[i];
svpriv->intsrc[i].handler = caam_secvio_default;
}
/* Connect main handler */
for_each_possible_cpu(i)
tasklet_init(&svpriv->irqtask[i], caam_secvio_dispatch,
(unsigned long)svdev);
error = request_irq(ctrlpriv->secvio_irq, caam_secvio_interrupt,
IRQF_SHARED, "caam-secvio", svdev);
if (error) {
dev_err(svdev, "can't connect secvio interrupt\n");
irq_dispose_mapping(ctrlpriv->secvio_irq);
ctrlpriv->secvio_irq = 0;
return -EINVAL;
}
/* Enable all sources */
wr_reg32(&svpriv->svregs->hp.secvio_int_ctl, HP_SECVIO_INTEN_ALL);
dev_info(svdev, "security violation service handlers armed\n");
return 0;
}
void caam_secvio_shutdown(struct platform_device *pdev)
{
struct device *ctrldev, *svdev;
struct caam_drv_private *priv;
struct caam_drv_private_secvio *svpriv;
int i;
ctrldev = &pdev->dev;
priv = dev_get_drvdata(ctrldev);
svdev = priv->secviodev;
svpriv = dev_get_drvdata(svdev);
/* Shut off all sources */
wr_reg32(&svpriv->svregs->hp.secvio_int_ctl, 0);
/* Remove tasklets and release interrupt */
for_each_possible_cpu(i)
tasklet_kill(&svpriv->irqtask[i]);
free_irq(priv->secvio_irq, svdev);
kfree(svpriv);
}
#ifdef CONFIG_OF
static void __exit caam_secvio_exit(void)
{
struct device_node *dev_node;
struct platform_device *pdev;
dev_node = of_find_compatible_node(NULL, NULL, "fsl,sec-v4.0");
if (!dev_node) {
dev_node = of_find_compatible_node(NULL, NULL, "fsl,sec4.0");
if (!dev_node)
return -ENODEV;
}
pdev = of_find_device_by_node(dev_node);
if (!pdev)
return -ENODEV;
of_node_put(dev_node);
caam_sm_shutdown(pdev);
}
static int __init caam_secvio_init(void)
{
struct device_node *dev_node;
struct platform_device *pdev;
/*
* Do of_find_compatible_node() then of_find_device_by_node()
* once a functional device tree is available
*/
dev_node = of_find_compatible_node(NULL, NULL, "fsl,sec-v4.0");
if (!dev_node) {
dev_node = of_find_compatible_node(NULL, NULL, "fsl,sec4.0");
if (!dev_node)
return -ENODEV;
}
pdev = of_find_device_by_node(dev_node);
if (!pdev)
return -ENODEV;
of_node_put(dev_node);
return caam_secvio_startup(pdev);
}
module_init(caam_secvio_init);
module_exit(caam_secvio_exit);
MODULE_LICENSE("Dual BSD/GPL");
MODULE_DESCRIPTION("FSL CAAM/SNVS Security Violation Handler");
MODULE_AUTHOR("Freescale Semiconductor - NMSG/MAD");
#endif
|