summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBryan O'Donoghue <bryan.odonoghue@linaro.org>2018-01-22 17:01:14 +0000
committerRui Miguel Silva <rui.silva@linaro.org>2018-01-22 22:26:34 +0000
commit2de036a7927b753b8ad4d03cf0ffdd2aeea34318 (patch)
tree57036c29c4ca5feca476acc47b919e3b83cb6a82
parent14b25979ac90c262fb55113a304ad6aa891b0599 (diff)
crypto: caam: detect RNG init when TrustZone is activembl_v4.14.12-1
When TrustZone is enabled on sec4 compatible silicon the first page of the CAAM is reserved for TrustZone only, this means that access to the deco registers is restricted and will return zero when read. The solution to this problem is to initialize the RNG prior to TrustZone being enabled or to initialize the RNG from a TrustZone context and simultaneously to ensure that the job-ring registers have been assigned to the correct non-TrustZone context. Assigning of the job-ring registers is a task for u-boot or OPTEE/TrustZone as is the initialization of the RNG. This patch adds logic to detect RNG initialization if and only if TrustZone has been detected as active on the CAAM block. If TrustZone is initialized and the RNG looks to be setup - we mark the RNG as good to go and continue to load, else we mark the RNG as bad and bail out. More detail on the original problem and the split fix between u-boot and Linux is available in these two threads - https://github.com/OP-TEE/optee_os/issues/1408 - https://community.nxp.com/message/976537?commentID=976537#comment-976537 Signed-off-by: Bryan O'Donoghue <bryan.odonoghue@linaro.org> Tested-by: Ryan Harkin <ryan.harkin@linaro.org> Signed-off-by: Rui Miguel Silva <rui.silva@linaro.org>
-rw-r--r--drivers/crypto/caam/ctrl.c18
1 files changed, 18 insertions, 0 deletions
diff --git a/drivers/crypto/caam/ctrl.c b/drivers/crypto/caam/ctrl.c
index 7fd3bfcb58f0..66a7c7eecafd 100644
--- a/drivers/crypto/caam/ctrl.c
+++ b/drivers/crypto/caam/ctrl.c
@@ -711,6 +711,24 @@ static int caam_probe(struct platform_device *pdev)
int inst_handles =
rd_reg32(&ctrl->r4tst[0].rdsta) &
RDSTA_IFMASK;
+
+ /*
+ * If TrustZone is active then u-boot or the TrustZone
+ * firmware must have initialized the RNG for us else we
+ * cannot do so from Linux.
+ *
+ * We've previously detected TrustZone so now let's
+ * detect if the RNG has been initialized.
+ */
+ if (ctrlpriv->trust_zone) {
+ ret = -ENODEV;
+ if (ctrlpriv->rng4_sh_init || inst_handles)
+ ret = 0;
+ dev_info(dev, "TrustZone active RNG looks %s\n",
+ ret ? "uninitialized" : "initialized");
+ break;
+ }
+
/*
* If either SH were instantiated by somebody else
* (e.g. u-boot) then it is assumed that the entropy