From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 3F1BCC433EF for ; Tue, 19 Apr 2022 20:58:41 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 2090783C08; Tue, 19 Apr 2022 22:58:39 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=reject dis=none) header.from=seco.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=seco.com header.i=@seco.com header.b="ohp/Ckck"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 04BAD83B4D; Tue, 19 Apr 2022 22:58:38 +0200 (CEST) Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-ve1eur02on062a.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe06::62a]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 2AC0A83B4D for ; Tue, 19 Apr 2022 22:58:32 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=reject dis=none) header.from=seco.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=sean.anderson@seco.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=L8lUjtk1rK/5QxShQN4M912oKjHN/dZULz4shaGx1VYydi1le2Uy3KUcQoE/iRPuohR1E1XD9/IQpueySHrkq/QnYEJ6+OT7CUqcUmOfw/wN53v5Tv/JVSg7wrCy01u34Zavz4SJqhqDjavE+OWQKsvQ8cr4ObykmPRY1Dgh0Hx2oaUIEIKytAF9F1IgN+CYDqyFVzUuOhrjfITjKJRIMBVk4Qt4euLMY6o1OZXU0lEterMvm39C4L3GX2da8BFyaOHrbGKpJPyrsIcBUXMMLQ+LVHqHsFQQ/nbomOm+QolV4qdE272PHct+6i/7InvQ4fOt1WrZexMYAtkk7l0Xrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=OzYq7SpuH1X3MpgVyzbxeUR8ukQyXGQNRcLqlttG3g0=; b=A2vPkKXFEy762rWkwp2lJzeCzcudbZKyaCKswa2359Rtb4A/uD6fxBaN9FYSQLlC5hRh3xgFpJ3AxRoBR2zi6JaqjuIvc0rWtF6GBgSdp/+ybwsLjCE+b28tng2/XhmXzP2Pg8ugP3BHLg5s4mj50DuTnDoCeYxtwu+ba9hb8MTlAEu8WOlsvdd8JNDz2SjX71MblUrKsnCSKq1aW9F05ykdeDo8Ox6EmBj/0hNFiYVoDdGoeJ5S1FYvdjhtW0acRLLghm5mg9xVTxgjTBR33stKiNrGemZhKn77CqdyigRNuVxffsrhyu8Po6VzYFSOE37TDajaTd18QYMc3vSr1w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=seco.com; dmarc=pass action=none header.from=seco.com; dkim=pass header.d=seco.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=seco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OzYq7SpuH1X3MpgVyzbxeUR8ukQyXGQNRcLqlttG3g0=; b=ohp/CkckuZowxzrGbWrKRoMaQKHT7OhbHr8odUDG/d+GtcszsaQFsgeF/8TgY96vXHoldl345nhcEANOXi57daNJ3DwKC4eDsXNUA4+H3YvqL0FZH5TA3tbiM474iqgxl5vG7SPkZJwiEDgKVvM3Iy1Xnn+B9vPGXQUD1liSFDT/W8ySLzML7QwiE5CckFliyLCbhYtkI5rku6mqh7m3YzoJWLHvW2alzi3t2EhwkgEwYRoKp5ZFwlexb0UezKmoAZ87l64Nehc5dNBXPo49nux1MviqqWIz7i8qSHUgesLraTNsSfLzjnbGTTE+YrOmHluZnNwlOlC9/dnlKAW0Vw== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=seco.com; Received: from DB7PR03MB4972.eurprd03.prod.outlook.com (2603:10a6:10:7d::22) by AM9PR03MB7868.eurprd03.prod.outlook.com (2603:10a6:20b:433::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5164.20; Tue, 19 Apr 2022 20:58:29 +0000 Received: from DB7PR03MB4972.eurprd03.prod.outlook.com ([fe80::fd2d:a04b:de07:33f8]) by DB7PR03MB4972.eurprd03.prod.outlook.com ([fe80::fd2d:a04b:de07:33f8%6]) with mapi id 15.20.5164.025; Tue, 19 Apr 2022 20:58:29 +0000 From: Sean Anderson To: u-boot@lists.denx.de, Tom Rini Cc: Mingkai Hu , Alison Wang , Manish Tomar , Rajesh Bhagat , Mingkai Hu , Pramod Kumar , Vladimir Oltean , Sean Anderson Subject: [PATCH 1/2] arm: layerscape: Add sfp driver Date: Tue, 19 Apr 2022 16:58:18 -0400 Message-Id: <20220419205819.3765848-1-sean.anderson@seco.com> X-Mailer: git-send-email 2.35.1.1320.gc452695387.dirty Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: BLAPR03CA0042.namprd03.prod.outlook.com (2603:10b6:208:32d::17) To DB7PR03MB4972.eurprd03.prod.outlook.com (2603:10a6:10:7d::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 2d6d96bf-9767-48da-6fa0-08da22475b09 X-MS-TrafficTypeDiagnostic: AM9PR03MB7868:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB7PR03MB4972.eurprd03.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(52116002)(86362001)(2906002)(8676002)(107886003)(38100700002)(38350700002)(26005)(6506007)(6512007)(6666004)(316002)(54906003)(6916009)(83380400001)(66556008)(4326008)(36756003)(966005)(66946007)(66476007)(30864003)(2616005)(84970400001)(1076003)(6486002)(44832011)(508600001)(186003)(5660300002)(8936002); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?3qskZjBsMorybK/06IP1H7SKTgi8uuqGBiBIQ1tmm6u1T2FAkaLODpvqR6qF?= =?us-ascii?Q?mIFG94eZLFBiB75JP+Pbd+R8U/l90abRNQlGJsTyawn+EbVyXXerG22qQaLt?= =?us-ascii?Q?2bUoLmNTF/iESgWNMb8qMDsbLEyfcN2+eNC0R5cugpWh/3exmYdO//IPHBdT?= =?us-ascii?Q?KcruQdBHCmg2Kq/c1TGst9WfTIzkX4kOaEX9cVvZUNJTUsQJCFW1e9y91Wpl?= =?us-ascii?Q?e3ZR9UZNn5VhNX6RtkFfe27SdMoRbrZuUZOWBi7TutmfHWINLfh04EOYn7Lz?= =?us-ascii?Q?cqOWw8XSm5B2I8FGGQaA5162flDbqbcRixfGFQ9qKb3tdbW1YmSZ2+oKKKRi?= =?us-ascii?Q?sY+5i4X8dkFPKScyiFDIVcE0nFVA8BQgReYxto6OeY7n0XVpqFdzgcJ/0ow2?= =?us-ascii?Q?ZSIETZzOyaNb8fysIwtVPavFC9sFXdjm3Lspe17dywSN7PXJI7g+1WCNIBqd?= =?us-ascii?Q?bSx4rd6NW6niv2yeq7UIte5ahngRMTcw5mjhfpMaBI4veOfl4acFhMjS4mvo?= =?us-ascii?Q?hOSpotK1PphWpCer27a31Tmu3JzlQaKQ7scoFOuE0w1Bd4o+XaVIylS8EqN+?= =?us-ascii?Q?sTERZFrt6raueUTJfqkr0lIbQ9b5VUYkaboHuxCmH3aesrLYYISZhYzgN5L6?= =?us-ascii?Q?taIIiK0O4EwPAuj6EHH+UghMwzhtCIuX15/ZQ6GMpNxknxgk61pGra/oR8D8?= =?us-ascii?Q?rwaTxola7aq9cxaXQ/4yNFH89q5qIgmO4axAdIrbh884lXQCKD7PvvnmsNJP?= =?us-ascii?Q?B8nRB4vG25+gMx9AZdZBChpPjxETk7cCTyRDhRR1ygmWf7W0KAZuHt9OxBxY?= =?us-ascii?Q?7r8Mjmct3O3+LcCEVGyJ28UQuYsNnq+lzpfSKFe8c1zeVowUWHaMzLyGD2Ma?= =?us-ascii?Q?BYA4HtNbbjK7pYTqGsCOU99CrDdS8mo3JP7VqYA9SzGEacBgJii7IGECBaoW?= =?us-ascii?Q?Nfkx9jqKsF0l03omlHW3aAqbAcIsBldgo3EdZ45dQnL7xzkFmcBoQN/5PU9D?= =?us-ascii?Q?kC6/uvdLx8y/KZEklivPYZS8Vr418EK+py/NKyN5Stwz37m3phHZpL++tD6E?= =?us-ascii?Q?k7f37SHEtaT1/gC9W2c2mcDZfM4BOvwlhFClJLNNA8COSQUNHnroQ/FPIc9R?= =?us-ascii?Q?BJaQ7ytsexJPSbp1swY+2bpsI/NXoipboBt7HIMLSnMmN4/1bU7WbY1BF3iZ?= =?us-ascii?Q?NBBhJy2hiy4kd27BQxDwbvWKmz1YZU9kkcXlRH8huOBuUG0ibVR51HO8wnD4?= =?us-ascii?Q?B3LV+u5beng7ZLQdXXYBPm5CwuQeogxNI7QrsrdjkDx/0mMMSHP4rL+1+hSA?= =?us-ascii?Q?/D0KofGd478dbw1coDn8eteYN0GyBcDXsTWZI9Y3NK4Ie/2zvJhJCmnBPNgF?= =?us-ascii?Q?444RYMu1v6KbzitAxMo965qOswvFAiNQlDSrFVqBLykYzjPlm9B5Dfv47MDG?= =?us-ascii?Q?9oL45KjXkAB4FXg+JDwZEwto6Jnxz9GCPWVeQbIQR1ZOfJHluCAXOn7SETZ+?= =?us-ascii?Q?wX4GFjFyxvEe4tguQFOCy5G7rPJtjCCHeTvUQZKB1tQ37eDiuDGcsEx/p7PN?= =?us-ascii?Q?Cmsopws3/nemdVOI/FPYg/uNXAg6HnMkBYQcee+V9GZWKTpkvzIztFHzHFVV?= =?us-ascii?Q?qKqkHm/EAzFr3mwvmMYFArUO3J6/ByEln0zPzQ8zaKszZbS/siVsjYtzE2Ai?= =?us-ascii?Q?CBfsLjbH2rDCrA/pcOS2NnEgNRmn+QXZcfEFEJLA341CorZhQcOjboIs9nMb?= =?us-ascii?Q?v9G0z0P+RcBd1DhCMP2mBF1OUQNEUZI=3D?= X-OriginatorOrg: seco.com X-MS-Exchange-CrossTenant-Network-Message-Id: 2d6d96bf-9767-48da-6fa0-08da22475b09 X-MS-Exchange-CrossTenant-AuthSource: DB7PR03MB4972.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Apr 2022 20:58:29.3120 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: bebe97c3-6438-442e-ade3-ff17aa50e733 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: jQynwtA8rYUBKJvA2aj0CD+X5otnp09XYTr9jiVuiM95mEUzSuK42nr9XjozAoE7eWyS88+4kpui/j5LNf+5QA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR03MB7868 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.5 at phobos.denx.de X-Virus-Status: Clean This adds a driver for the Security Fuse Processor (SFP) present on LS1012A, LS1021A, LS1043A, and LS1046A processors. It holds the Super-Root Key (SRK), One-Time-Programmable Master Key (OTPMK), and other "security" related fuses. Similar devices (sharing the same name) are present on other processors, but for the moment this just supports the LS2 variants. The mirror registers are loaded during power-on reset. All mirror registers must be programmed or read at once. Because of this, `fuse prog` will program all fuses, even though only one might be specified. To prevent accidentally burning through all your fuse programming cycles with something like `fuse prog 0 0 A B C D`, we limit ourselves to one programming cycle per reset. Fuses are numbered based on their address. The fuse at 0x1e80200 is 0, the fuse at 0x1e80204 is 1, etc. The TA_PROG_SFP supply must be enabled when programming fuses, but must be disabled when reading them. Typically this supply is enabled by inserting a jumper or by setting a register in the board's FPGA. I've also added support for using a regulator. This could be helpful for automatically issuing the FPGA write, or for toggling a GPIO controlling the supply. I suggest using the following procedure for programming: 1. Override the fuses you wish to program => fuse override 0 2 A B C D 2. Inspect the values and ensure that they are what you expect => fuse sense 0 2 4 3. Enable TA_PROG_SFP 4. Issue a program command using OSPR0 as a dummy. Since it contains the write-protect bit you will usually want to write it last anyway. => fuse prog 0 0 0 5. Disable TA_PROG_SFP 6. Read back the fuses and ensure they are correct => fuse read 0 2 4 Signed-off-by: Sean Anderson --- MAINTAINERS | 5 + drivers/misc/Kconfig | 14 ++ drivers/misc/Makefile | 1 + drivers/misc/ls2_sfp.c | 350 +++++++++++++++++++++++++++++++++++++++++ 4 files changed, 370 insertions(+) create mode 100644 drivers/misc/ls2_sfp.c diff --git a/MAINTAINERS b/MAINTAINERS index 7a9e3156f4..6a302b35e2 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -271,6 +271,11 @@ F: drivers/spi/spi-qup.c F: drivers/net/mdio-ipq4019.c F: drivers/rng/msm_rng.c +ARM LAYERSCAPE SFP +M: Sean Anderson +S: Maintained +F: drivers/misc/ls2_sfp.c + ARM MARVELL KIRKWOOD ARMADA-XP ARMADA-38X ARMADA-37XX ARMADA-7K/8K M: Stefan Roese S: Maintained diff --git a/drivers/misc/Kconfig b/drivers/misc/Kconfig index 7029bb7b5c..2a86c42017 100644 --- a/drivers/misc/Kconfig +++ b/drivers/misc/Kconfig @@ -224,6 +224,20 @@ config JZ4780_EFUSE help This selects support for the eFUSE on Ingenic JZ4780 SoCs. +config LS2_SFP + bool "Layerscape Security Fuse Processor" + depends on FSL_LSCH2 || ARCH_LS1021A + depends on MISC + imply DM_REGULATOR + help + This adds support for the Security Fuse Processor found on Layerscape + SoCs. It contains various fuses related to secure boot, including the + Super Root Key hash, One-Time-Programmable Master Key, Debug + Challenge/Response values, and others. Fuses are numbered according + to their four-byte offset from the start of the bank. + + If you don't need to read/program fuses, say 'n'. + config MXC_OCOTP bool "Enable MXC OCOTP Driver" depends on ARCH_IMX8M || ARCH_MX6 || ARCH_MX7 || ARCH_MX7ULP || ARCH_VF610 diff --git a/drivers/misc/Makefile b/drivers/misc/Makefile index b7a8ef68ab..4926671833 100644 --- a/drivers/misc/Makefile +++ b/drivers/misc/Makefile @@ -50,6 +50,7 @@ obj-$(CONFIG_IMX8ULP) += imx8ulp/ obj-$(CONFIG_LED_STATUS) += status_led.o obj-$(CONFIG_LED_STATUS_GPIO) += gpio_led.o obj-$(CONFIG_MPC83XX_SERDES) += mpc83xx_serdes.o +obj-$(CONFIG_$(SPL_TPL_)LS2_SFP) += ls2_sfp.o obj-$(CONFIG_$(SPL_)MXC_OCOTP) += mxc_ocotp.o obj-$(CONFIG_MXS_OCOTP) += mxs_ocotp.o obj-$(CONFIG_NUVOTON_NCT6102D) += nuvoton_nct6102d.o diff --git a/drivers/misc/ls2_sfp.c b/drivers/misc/ls2_sfp.c new file mode 100644 index 0000000000..df54b0c89e --- /dev/null +++ b/drivers/misc/ls2_sfp.c @@ -0,0 +1,350 @@ +// SPDX-License-Identifier: GPL-2.0+ +/* + * Copyright (C) 2022 Sean Anderson + * + * This driver supports the Security Fuse Processor device found on some + * Layerscape processors. At the moment, we only support a few processors. + * This driver was written with reference to the Layerscape SDK User + * Guide [1] and the ATF SFP driver [2]. + * + * [1] https://docs.nxp.com/bundle/GUID-487B2E69-BB19-42CB-AC38-7EF18C0FE3AE/page/GUID-27FC40AD-3321-4A82-B29E-7BB49EE94F23.html + * [2] https://source.codeaurora.org/external/qoriq/qoriq-components/atf/tree/drivers/nxp/sfp?h=github.com/master + */ + +#define LOG_CATEGORY UCLASS_MISC +#include +#include +#include +#include +#include +#include +#include +#include +#include + +DECLARE_GLOBAL_DATA_PTR; + +#define SFP_INGR 0x20 +#define SFP_SVHESR 0x24 +#define SFP_SFPCR 0x28 + +#define SFP_START 0x200 +#define SFP_END 0x284 +#define SFP_SIZE (SFP_END - SFP_START + 4) + +#define SFP_INGR_ERR BIT(8) +#define SFP_INGR_INST GENMASK(7, 0) + +#define SFP_INGR_READFB 0x01 +#define SFP_INGR_PROGFB 0x02 + +#define SFP_SFPCR_PPW GENMASK(15, 0) + +enum ls2_sfp_ioctl { + LS2_SFP_IOCTL_READ, + LS2_SFP_IOCTL_PROG, +}; + +/** + * struct ls2_sfp_priv - private data for LS2 SFP + * @base: Base address of SFP + * @supply: The (optional) supply for TA_PROG_SFP + * @programmed: Whether we've already programmed the fuses since the last + * reset. The SFP has a *very* limited amount of programming + * cycles (two to six, depending on the model), so we try and + * prevent accidentally performing additional programming + * cycles. + * @dirty: Whether the mirror registers have been written to (overridden) + * since we've last read the fuses (either as part of the reset + * process or using a READFB instruction). There is a much larger, + * but still finite, limit on the number of SFP read cycles (around + * 300,000), so we try and minimize reads as well. + */ +struct ls2_sfp_priv { + void __iomem *base; + struct udevice *supply; + bool programmed, dirty; +}; + +static u32 ls2_sfp_readl(struct ls2_sfp_priv *priv, ulong off) +{ + u32 val = be32_to_cpu(readl(priv->base + off)); + + log_debug("%08x = readl(%p)\n", val, priv->base + off); + return val; +} + +static void ls2_sfp_writel(struct ls2_sfp_priv *priv, ulong val, ulong off) +{ + log_debug("writel(%08lx, %p)\n", val, priv->base + off); + writel(cpu_to_be32(val), priv->base + off); +} + +static bool ls2_sfp_validate(struct udevice *dev, int offset, int size) +{ + if (offset < 0 || size < 0) { + dev_notice(dev, "size and offset must be positive\n"); + return false; + } + + if (offset & 3 || size & 3) { + dev_notice(dev, "size and offset must be multiples of 4\n"); + return false; + } + + if (offset + size > SFP_SIZE) { + dev_notice(dev, "size + offset must be <= %#x\n", SFP_SIZE); + return false; + } + + return true; +} + +static int ls2_sfp_read(struct udevice *dev, int offset, void *buf_bytes, + int size) +{ + int i; + struct ls2_sfp_priv *priv = dev_get_priv(dev); + u32 *buf = buf_bytes; + + if (!ls2_sfp_validate(dev, offset, size)) + return -EINVAL; + + for (i = 0; i < size; i += 4) + buf[i >> 2] = ls2_sfp_readl(priv, SFP_START + offset + i); + + return size; +} + +static int ls2_sfp_write(struct udevice *dev, int offset, + const void *buf_bytes, int size) +{ + int i; + struct ls2_sfp_priv *priv = dev_get_priv(dev); + const u32 *buf = buf_bytes; + + if (!ls2_sfp_validate(dev, offset, size)) + return -EINVAL; + + for (i = 0; i < size; i += 4) + ls2_sfp_writel(priv, buf[i >> 2], SFP_START + offset + i); + + priv->dirty = true; + return size; +} + +static int ls2_sfp_check_secret(struct udevice *dev) +{ + struct ls2_sfp_priv *priv = dev_get_priv(dev); + u32 svhesr = ls2_sfp_readl(priv, SFP_SVHESR); + + if (svhesr) { + dev_warn(dev, "secret value hamming error not zero: %08x\n", + svhesr); + return -EIO; + } + return 0; +} + +static int ls2_sfp_transaction(struct ls2_sfp_priv *priv, ulong inst) +{ + u32 ingr; + + ls2_sfp_writel(priv, inst, SFP_INGR); + + do { + ingr = ls2_sfp_readl(priv, SFP_INGR); + } while (FIELD_GET(SFP_INGR_INST, ingr)); + + return FIELD_GET(SFP_INGR_ERR, ingr) ? -EIO : 0; +} + +static int ls2_sfp_ioctl(struct udevice *dev, unsigned long request, void *buf) +{ + int ret; + struct ls2_sfp_priv *priv = dev_get_priv(dev); + + switch (request) { + case LS2_SFP_IOCTL_READ: + if (!priv->dirty) { + dev_dbg(dev, "ignoring read request, since fuses are not dirty\n"); + return 0; + } + + ret = ls2_sfp_transaction(priv, SFP_INGR_READFB); + if (ret) { + dev_err(dev, "error reading fuses\n"); + return ret; + } + + ls2_sfp_check_secret(dev); + priv->dirty = false; + return 0; + case LS2_SFP_IOCTL_PROG: + if (priv->programmed) { + dev_warn(dev, "fuses already programmed\n"); + return -EPERM; + } + + ret = ls2_sfp_check_secret(dev); + if (ret) + return ret; + + if (priv->supply) { + ret = regulator_set_enable(priv->supply, true); + if (ret) + return ret; + } + + ret = ls2_sfp_transaction(priv, SFP_INGR_PROGFB); + priv->programmed = true; + if (priv->supply) + regulator_set_enable(priv->supply, false); + + if (ret) + dev_err(dev, "error programming fuses\n"); + return ret; + default: + dev_dbg(dev, "unknown ioctl %lu\n", request); + return -EINVAL; + } +} + +static const struct misc_ops ls2_sfp_ops = { + .read = ls2_sfp_read, + .write = ls2_sfp_write, + .ioctl = ls2_sfp_ioctl, +}; + +static int ls2_sfp_probe(struct udevice *dev) +{ + int ret; + struct clk clk; + struct ls2_sfp_priv *priv = dev_get_priv(dev); + ulong rate; + + priv->base = dev_read_addr_ptr(dev); + if (!priv->base) { + dev_dbg(dev, "could not read register base\n"); + return -EINVAL; + } + + ret = device_get_supply_regulator(dev, "ta-sfp-prog", &priv->supply); + if (ret && ret != -ENODEV && ret != -ENOSYS) { + dev_dbg(dev, "problem getting supply (err %d)\n", ret); + return ret; + } + + ret = clk_get_by_name(dev, "ipg", &clk); + if (ret == -ENOSYS) { + rate = gd->bus_clk; + } else if (ret) { + dev_dbg(dev, "could not get clock (err %d)\n", ret); + return ret; + } else { + ret = clk_enable(&clk); + if (ret) { + dev_dbg(dev, "could not enable clock (err %d)\n", ret); + return ret; + } + + rate = clk_get_rate(&clk); + clk_free(&clk); + if (!rate || IS_ERR_VALUE(rate)) { + ret = rate ? rate : -ENOENT; + dev_dbg(dev, "could not get clock rate (err %d)\n", + ret); + return ret; + } + } + + /* platform clock in MHz / 4 * 12 */ + ls2_sfp_writel(priv, FIELD_PREP(SFP_SFPCR_PPW, rate * 3 / 1000000), + SFP_SFPCR); + + ls2_sfp_check_secret(dev); + return 0; +} + +static const struct udevice_id ls2_sfp_ids[] = { + { .compatible = "fsl,ls1021a-sfp" }, + { } +}; + +U_BOOT_DRIVER(ls2_sfp) = { + .name = "ls2_sfp", + .id = UCLASS_MISC, + .of_match = ls2_sfp_ids, + .probe = ls2_sfp_probe, + .ops = &ls2_sfp_ops, + .priv_auto = sizeof(struct ls2_sfp_priv), +}; + +static int ls2_sfp_device(struct udevice **dev) +{ + int ret = uclass_get_device_by_driver(UCLASS_MISC, + DM_DRIVER_GET(ls2_sfp), dev); + + if (ret) + log_debug("device not found (err %d)\n", ret); + return ret; +} + +int fuse_read(u32 bank, u32 word, u32 *val) +{ + int ret; + struct udevice *dev; + + ret = ls2_sfp_device(&dev); + if (ret) + return ret; + + ret = misc_ioctl(dev, LS2_SFP_IOCTL_READ, NULL); + if (ret) + return ret; + + ret = misc_read(dev, word << 2, val, sizeof(*val)); + return ret < 0 ? ret : 0; +} + +int fuse_sense(u32 bank, u32 word, u32 *val) +{ + int ret; + struct udevice *dev; + + ret = ls2_sfp_device(&dev); + if (ret) + return ret; + + ret = misc_read(dev, word << 2, val, sizeof(*val)); + return ret < 0 ? ret : 0; +} + +int fuse_prog(u32 bank, u32 word, u32 val) +{ + int ret; + struct udevice *dev; + + ret = ls2_sfp_device(&dev); + if (ret) + return ret; + + ret = misc_write(dev, word << 2, &val, sizeof(val)); + if (ret < 0) + return ret; + + return misc_ioctl(dev, LS2_SFP_IOCTL_PROG, NULL); +} + +int fuse_override(u32 bank, u32 word, u32 val) +{ + int ret; + struct udevice *dev; + + ret = ls2_sfp_device(&dev); + if (ret) + return ret; + + ret = misc_write(dev, word << 2, &val, sizeof(val)); + return ret < 0 ? ret : 0; +} -- 2.35.1.1320.gc452695387.dirty