| 214ee971 | 27-Apr-2022 |
Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> |
drivers: zymqmp_pm: add USER eFuse support
Adds necessary defines for accessing USER eFuses.
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Acked-by: Etienne Carriere <etienne.car
drivers: zymqmp_pm: add USER eFuse support
Adds necessary defines for accessing USER eFuses.
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 6e96536e | 30-Apr-2022 |
Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> |
drivers: zynqmp_pm: Add eFuse programming support
Add support to program eFuses utiling functionality found in PMU firmware.
If eFuse programming functionality has been disabled in PMU firmware the
drivers: zynqmp_pm: Add eFuse programming support
Add support to program eFuses utiling functionality found in PMU firmware.
If eFuse programming functionality has been disabled in PMU firmware then programming will fail.
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 97558570 | 29-Apr-2022 |
Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> |
drivers: zynqmp_pm: fix cache alignment for eFuse operation
Allocate cache aligned temporary memory for both eFuse operation request and data buffer to make sure that operation is always cache align
drivers: zynqmp_pm: fix cache alignment for eFuse operation
Allocate cache aligned temporary memory for both eFuse operation request and data buffer to make sure that operation is always cache aligned and to make usage easier.
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Acked-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 8e155bae | 30-Apr-2022 |
Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> |
imx: dcp: switch to new alloc_cache_aligned()
Use commonized outer cache line aligned memory allocator instead of having local implementation.
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@va
imx: dcp: switch to new alloc_cache_aligned()
Use commonized outer cache line aligned memory allocator instead of having local implementation.
Signed-off-by: Vesa Jääskeläinen <vesa.jaaskelainen@vaisala.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 613c6309 | 13-Aug-2022 |
Jorge Ramirez-Ortiz <jorge@foundries.io> |
drivers: se050: optional I2C access via trampoline
Platforms with secure I2C buses (i.e: STM32MP1) or those with only a secure element on the bus might prefer not to delegate the I2C traffic to the
drivers: se050: optional I2C access via trampoline
Platforms with secure I2C buses (i.e: STM32MP1) or those with only a secure element on the bus might prefer not to delegate the I2C traffic to the REE.
Signed-off-by: Jorge Ramirez-Ortiz <jorge@foundries.io> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org>
show more ...
|
| 961785fb | 29-Jul-2022 |
Tim Anderson <tim.anderson@foundries.io> |
drivers: imx_i2c: update the daisy chain setting for I2C1
Looking at IMX6ULLRM Rev. 1, 11/2017 paragraph 32.6.329 says the daisy chain for SDA on I2C1 on imx6ull-evk is 2 not 1.
Signed-off-by: Tim
drivers: imx_i2c: update the daisy chain setting for I2C1
Looking at IMX6ULLRM Rev. 1, 11/2017 paragraph 32.6.329 says the daisy chain for SDA on I2C1 on imx6ull-evk is 2 not 1.
Signed-off-by: Tim Anderson <tim.anderson@foundries.io> Acked-by: Clement Faure <clement.faure@nxp.com> Acked-by: Jorge Ramirez-Ortiz <jorge@foundries.io>
show more ...
|
| 460dc361 | 29-Jul-2022 |
Tim Anderson <tim.anderson@foundries.io> |
drivers: imx_i2c: update the I2C initialization
NXP drivers in both u-boot and linux waits 50us after enabling the bus controller to stabilize the bus.
Signed-off-by: Tim Anderson <tim.anderson@fou
drivers: imx_i2c: update the I2C initialization
NXP drivers in both u-boot and linux waits 50us after enabling the bus controller to stabilize the bus.
Signed-off-by: Tim Anderson <tim.anderson@foundries.io> Acked-by: Clement Faure <clement.faure@nxp.com>
show more ...
|
| 48ca91ed | 31-Mar-2021 |
Vahid Dukandar <vahidd@microsoft.com> |
drivers: bcm_sotp: add sotp write support
- Added write support for bcm secure one time programmable fuses. - bcm_iproc_sotp_mem_read() now takes in a bool value for sotp_add_ecc instead of an int
drivers: bcm_sotp: add sotp write support
- Added write support for bcm secure one time programmable fuses. - bcm_iproc_sotp_mem_read() now takes in a bool value for sotp_add_ecc instead of an int to denote if error checking memory is supported. - Updated debug and error messages to return TEE_result codes.
Signed-off-by: Vahid Dukandar <vahidd@microsoft.com> Signed-off-by: Andrew Mustea <andrew.mustea@microsoft.com> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| bc842791 | 05-Jul-2022 |
Andrew Davis <afd@ti.com> |
drivers: xiphera_trng: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so implement just hw_get_random_bytes().
drivers: xiphera_trng: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so implement just hw_get_random_bytes().
Signed-off-by: Andrew Davis <afd@ti.com> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 830d8c4c | 29-Apr-2022 |
Andrew Davis <afd@ti.com> |
drivers: hi16xx_rng: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so implement just hw_get_random_bytes().
S
drivers: hi16xx_rng: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so implement just hw_get_random_bytes().
Signed-off-by: Andrew Davis <afd@ti.com> Reviewed-by: Jerome Forissier <jerome.forissier@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 671dbd1e | 29-Apr-2022 |
Andrew Davis <afd@ti.com> |
drivers: dra7_rng: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so implement just hw_get_random_bytes().
Sig
drivers: dra7_rng: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so implement just hw_get_random_bytes().
Signed-off-by: Andrew Davis <afd@ti.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 6594a67e | 29-Apr-2022 |
Andrew Davis <afd@ti.com> |
drivers: dra7_rng: Factor out dra7_rng_read64()
The core function is a 64bit RNG read. Factor this out into its own function to help with the switch to hw_get_random_bytes().
Signed-off-by: Andrew
drivers: dra7_rng: Factor out dra7_rng_read64()
The core function is a 64bit RNG read. Factor this out into its own function to help with the switch to hw_get_random_bytes().
Signed-off-by: Andrew Davis <afd@ti.com> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| c6712bd0 | 29-Apr-2022 |
Andrew Davis <afd@ti.com> |
drivers: dra7_rng: Use cpu_spin_lock_xsave helper function
Does the same thing, saves us a line or two.
Signed-off-by: Andrew Davis <afd@ti.com> Reviewed-by: Etienne Carriere <etienne.carriere@lina
drivers: dra7_rng: Use cpu_spin_lock_xsave helper function
Does the same thing, saves us a line or two.
Signed-off-by: Andrew Davis <afd@ti.com> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| d11c29c3 | 29-Apr-2022 |
Andrew Davis <afd@ti.com> |
drivers: dra7_rng: Only fetch RNG base VA once
No reason to do this every time we want to get a random byte. Fetch this once on init and keep it in a static global.
Signed-off-by: Andrew Davis <afd
drivers: dra7_rng: Only fetch RNG base VA once
No reason to do this every time we want to get a random byte. Fetch this once on init and keep it in a static global.
Signed-off-by: Andrew Davis <afd@ti.com> Acked-by: Etienne Carriere <etienne.carriere@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| cb2478ef | 05-Jul-2022 |
Andrew Davis <afd@ti.com> |
drivers: stm32_rng: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so we do not need to override this and can s
drivers: stm32_rng: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so we do not need to override this and can simply implement just hw_get_random_bytes().
Signed-off-by: Andrew Davis <afd@ti.com> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 23b77ea3 | 05-Jul-2022 |
Andrew Davis <afd@ti.com> |
drivers: smccc_trng: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so we do not need to override this and can
drivers: smccc_trng: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so we do not need to override this and can simply implement just hw_get_random_bytes().
Signed-off-by: Andrew Davis <afd@ti.com> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| f6406a3c | 29-Apr-2022 |
Andrew Davis <afd@ti.com> |
drivers: imx_rngb: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so we do not need to override this and can si
drivers: imx_rngb: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so we do not need to override this and can simply implement just hw_get_random_bytes().
Signed-off-by: Andrew Davis <afd@ti.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 6b8ebe45 | 29-Apr-2022 |
Andrew Davis <afd@ti.com> |
drivers: se050: rng: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so we do not need to override this and can
drivers: se050: rng: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so we do not need to override this and can simply implement just hw_get_random_bytes().
Signed-off-by: Andrew Davis <afd@ti.com> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| e7d4dea3 | 29-Apr-2022 |
Andrew Davis <afd@ti.com> |
drivers: caam: rng: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so we do not need to override this and can s
drivers: caam: rng: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so we do not need to override this and can simply implement just hw_get_random_bytes().
Signed-off-by: Andrew Davis <afd@ti.com> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 8af02d37 | 29-Apr-2022 |
Andrew Davis <afd@ti.com> |
drivers: atmel_trng: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so we do not need to override this and can
drivers: atmel_trng: Switch to hw_get_random_bytes()
hw_get_random_byte() is no longer used. The default crypto_rng_read() calls hw_get_random_bytes() now so we do not need to override this and can simply implement just hw_get_random_bytes().
Signed-off-by: Andrew Davis <afd@ti.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 1c81e5f9 | 06-Jul-2022 |
Gatien Chevallier <gatien.chevallier@foss.st.com> |
drivers: stm32_gpio: temporary GPIO configuration for STM32MP13
This temporary change set all configured GPIOs to non-secure state on STM32MP13 platform. This change is needed while we align all com
drivers: stm32_gpio: temporary GPIO configuration for STM32MP13
This temporary change set all configured GPIOs to non-secure state on STM32MP13 platform. This change is needed while we align all components.
Changes I2C driver to assign I2C pins to secure world for STM32MP13.
Signed-off-by: Gatien Chevallier <gatien.chevallier@foss.st.com> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| f73343d3 | 06-Jul-2022 |
Gatien Chevallier <gatien.chevallier@foss.st.com> |
drivers: clk: clk-stm32mp13: add ck_mlahb to critical clocks
This clock must remain enabled as long as the platform is running.
Signed-off-by: Gabriel Fernandez <gabriel.fernandez@foss.st.com> Sign
drivers: clk: clk-stm32mp13: add ck_mlahb to critical clocks
This clock must remain enabled as long as the platform is running.
Signed-off-by: Gabriel Fernandez <gabriel.fernandez@foss.st.com> Signed-off-by: Gatien Chevallier <gatien.chevallier@foss.st.com> Reviewed-by: Etienne Carriere <etienne.carriere@linaro.org> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| 837adc0a | 28-Jun-2022 |
Clement Faure <clement.faure@nxp.com> |
drivers: caam: increase the minimum entropy delay the imx6sx
The i.MX6SX requires to start the RNG instantiation at a higher entropy delay to provide a stable RNG generation and avoid RNG hardware e
drivers: caam: increase the minimum entropy delay the imx6sx
The i.MX6SX requires to start the RNG instantiation at a higher entropy delay to provide a stable RNG generation and avoid RNG hardware errors.
Signed-off-by: Clement Faure <clement.faure@nxp.com> Acked-by: Jens Wiklander <jens.wiklander@linaro.org>
show more ...
|
| cd451498 | 28-Jun-2022 |
Etienne Carriere <etienne.carriere@linaro.org> |
drivers: stm32_rng: implement plat_rng_init()
Moves plat_rng_init() definition from platform source file rng_seed.c to core driver source stm32_rng.c. There is no platform magic needed in this funct
drivers: stm32_rng: implement plat_rng_init()
Moves plat_rng_init() definition from platform source file rng_seed.c to core driver source stm32_rng.c. There is no platform magic needed in this function. As a result, seed_rng.c source file is removed.
Acked-by: Jens Wiklander <jens.wiklander@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|
| 097f329a | 28-Jun-2022 |
Etienne Carriere <etienne.carriere@linaro.org> |
drivers: stm32_rng: register as hwrng source
Implements RNG as hardware entropy source when CFG_STM32_RNG is enable and CFG_WITH_SOFTWARE_PRNG is disable.
This is realised by implementing crypto_rn
drivers: stm32_rng: register as hwrng source
Implements RNG as hardware entropy source when CFG_STM32_RNG is enable and CFG_WITH_SOFTWARE_PRNG is disable.
This is realised by implementing crypto_rng_read() and hw_get_random_byte() in driver.
Reviewed-by: Jens Wiklander <jens.wiklander@linaro.org> Signed-off-by: Etienne Carriere <etienne.carriere@linaro.org>
show more ...
|