From patchwork Mon Jun 17 20:59:37 2013 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Olliver Schinagl X-Patchwork-Id: 2737611 Return-Path: X-Original-To: patchwork-linux-arm@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.19.201]) by patchwork1.web.kernel.org (Postfix) with ESMTP id E9B779F39E for ; Mon, 17 Jun 2013 21:02:46 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id DF14420424 for ; Mon, 17 Jun 2013 21:02:45 +0000 (UTC) Received: from casper.infradead.org (casper.infradead.org [85.118.1.10]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id B024F203FC for ; Mon, 17 Jun 2013 21:02:44 +0000 (UTC) Received: from merlin.infradead.org ([2001:4978:20e::2]) by casper.infradead.org with esmtps (Exim 4.80.1 #2 (Red Hat Linux)) id 1UogZC-00060S-3h; Mon, 17 Jun 2013 21:02:22 +0000 Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.80.1 #2 (Red Hat Linux)) id 1UogZ5-0004bz-1G; Mon, 17 Jun 2013 21:02:15 +0000 Received: from 7of9.schinagl.nl ([88.159.158.68]) by merlin.infradead.org with esmtp (Exim 4.80.1 #2 (Red Hat Linux)) id 1UogYp-0004Zm-7K for linux-arm-kernel@lists.infradead.org; Mon, 17 Jun 2013 21:02:00 +0000 Received: from localhost (7of9.are-b.org [127.0.0.1]) by 7of9.schinagl.nl (Postfix) with ESMTP id 969CB229D5; Mon, 17 Jun 2013 23:01:41 +0200 (CEST) X-Virus-Scanned: amavisd-new at schinagl.nl Received: from 7of9.schinagl.nl ([127.0.0.1]) by localhost (7of9.schinagl.nl [127.0.0.1]) (amavisd-new, port 10024) with LMTP id yXEOYBb7qPM6; Mon, 17 Jun 2013 23:01:38 +0200 (CEST) Received: from riley (unknown [10.2.0.3]) by 7of9.schinagl.nl (Postfix) with SMTP id C8AF5226DE; Mon, 17 Jun 2013 23:01:36 +0200 (CEST) Received: by riley (sSMTP sendmail emulation); Mon, 17 Jun 2013 22:59:42 +0200 From: Oliver Schinagl To: arnd@arndb.de, gregkh@linuxfoundation.org Subject: [PATCH 1/2] Initial support for Allwinner's Security ID fuses Date: Mon, 17 Jun 2013 22:59:37 +0200 Message-Id: <1371502778-15849-2-git-send-email-oliver+list@schinagl.nl> X-Mailer: git-send-email 1.8.1.5 In-Reply-To: <1371502778-15849-1-git-send-email-oliver+list@schinagl.nl> References: <1371502778-15849-1-git-send-email-oliver+list@schinagl.nl> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20130617_170159_512209_04D83474 X-CRM114-Status: GOOD ( 21.35 ) X-Spam-Score: -3.0 (---) Cc: linux@arm.linux.org.uk, Oliver Schinagl , linus.walleij@linaro.org, linux-sunxi@googlegroups.com, linux-kernel@vger.kernel.org, andy.shevchenko@gmail.com, maxime.ripard@free-electrons.com, linux-arm-kernel@lists.infradead.org X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+patchwork-linux-arm=patchwork.kernel.org@lists.infradead.org X-Spam-Status: No, score=-5.3 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_MED, RP_MATCHES_RCVD, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP From: Oliver Schinagl Allwinner has electric fuses (efuse) on their line of chips. This driver reads those fuses, seeds the kernel entropy and exports them as a sysfs node. These fuses are most likly to be programmed at the factory, encoding things like Chip ID, some sort of serial number etc and appear to be reasonable unique. While in theory, these should be writeable by the user, it will probably be inconvinient to do so. Allwinner recommends that a certain input pin, labeled 'efuse_vddq', be connected to GND. To write these fuses, 2.5 V needs to be applied to this pin. Even so, they can still be used to generate a board-unique mac from, board unique RSA key and seed the kernel RNG. Currently supported are the following known chips: Allwinner sun4i (A10) Allwinner sun5i (A10s, A13) Signed-off-by: Oliver Schinagl Reviewed-by: Tomasz Figa --- drivers/misc/eeprom/Kconfig | 17 +++++ drivers/misc/eeprom/Makefile | 1 + drivers/misc/eeprom/sunxi_sid.c | 147 ++++++++++++++++++++++++++++++++++++++++ 3 files changed, 165 insertions(+) create mode 100644 drivers/misc/eeprom/sunxi_sid.c diff --git a/drivers/misc/eeprom/Kconfig b/drivers/misc/eeprom/Kconfig index 04f2e1f..c7bc6ed 100644 --- a/drivers/misc/eeprom/Kconfig +++ b/drivers/misc/eeprom/Kconfig @@ -96,4 +96,21 @@ config EEPROM_DIGSY_MTC_CFG If unsure, say N. +config EEPROM_SUNXI_SID + tristate "Allwinner sunxi security ID support" + depends on ARCH_SUNXI && SYSFS + help + This is a driver for the 'security ID' available on various Allwinner + devices. Currently supported are: + sun4i (A10) + sun5i (A13) + + Due to the potential risks involved with changing e-fuses, + this driver is read-only + + For more information visit http://linux-sunxi.org/SID + + This driver can also be built as a module. If so, the module + will be called sunxi_sid. + endmenu diff --git a/drivers/misc/eeprom/Makefile b/drivers/misc/eeprom/Makefile index fc1e81d..9507aec 100644 --- a/drivers/misc/eeprom/Makefile +++ b/drivers/misc/eeprom/Makefile @@ -4,4 +4,5 @@ obj-$(CONFIG_EEPROM_LEGACY) += eeprom.o obj-$(CONFIG_EEPROM_MAX6875) += max6875.o obj-$(CONFIG_EEPROM_93CX6) += eeprom_93cx6.o obj-$(CONFIG_EEPROM_93XX46) += eeprom_93xx46.o +obj-$(CONFIG_EEPROM_SUNXI_SID) += sunxi_sid.o obj-$(CONFIG_EEPROM_DIGSY_MTC_CFG) += digsy_mtc_eeprom.o diff --git a/drivers/misc/eeprom/sunxi_sid.c b/drivers/misc/eeprom/sunxi_sid.c new file mode 100644 index 0000000..6a16c19 --- /dev/null +++ b/drivers/misc/eeprom/sunxi_sid.c @@ -0,0 +1,147 @@ +/* + * Copyright (c) 2013 Oliver Schinagl + * http://www.linux-sunxi.org + * + * Oliver Schinagl + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * This driver exposes the Allwinner security ID, a 128 bit eeprom, in byte + * sized chunks. + */ + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#define DRV_NAME "sunxi-sid" + +/* There are 4 32-bit keys */ +#define SID_KEYS 4 +/* Each key is 4 bytes long */ +#define SID_SIZE (SID_KEYS * 4) + +/* We read the entire key, due to a 32 bit read alignment requirement. Since we + * want to return the requested byte, this resuls in somewhat slower code and + * uses 4 times more reads as needed but keeps code simpler. Since the SID is + * only very rarly probed, this is not really an issue. + */ +static u8 sunxi_sid_read_byte(const void __iomem *sid_reg_base, + const unsigned int offset) +{ + u32 sid_key; + + if (offset >= SID_SIZE) + return 0; + + sid_key = ioread32be(sid_reg_base + round_down(offset, 4)); + sid_key >>= (offset % 4) * 8; + + return sid_key; /* Only return the last byte */ +} + +static ssize_t sid_read(struct file *fd, struct kobject *kobj, + struct bin_attribute *attr, char *buf, + loff_t pos, size_t size) +{ + int i; + struct platform_device *pdev; + void __iomem *sid_reg_base; + + pdev = to_platform_device(kobj_to_dev(kobj)); + sid_reg_base = (void __iomem *)platform_get_drvdata(pdev); + + if (pos < 0 || pos >= SID_SIZE) + return 0; + if (size > (SID_SIZE - pos)) + size = SID_SIZE - pos; + + for (i = 0; i < size; i++) + buf[i] = sunxi_sid_read_byte(sid_reg_base, pos + i); + + return i; +} + +static const struct of_device_id sunxi_sid_of_match[] = { + { .compatible = "allwinner,sun4i-sid", }, + {/* sentinel */} +}; +MODULE_DEVICE_TABLE(of, sunxi_sid_of_match); + +static const struct bin_attribute sid_bin_attr = { + .attr = { + .name = "eeprom", + .mode = S_IRUGO, + }, + .size = SID_SIZE, + .read = sid_read, +}; + +static int sunxi_sid_remove(struct platform_device *pdev) +{ + device_remove_bin_file(&pdev->dev, &sid_bin_attr); + dev_dbg(&pdev->dev, "%s driver unloaded\n", DRV_NAME); + + return 0; +} + +static int __init sunxi_sid_probe(struct platform_device *pdev) +{ + u8 entropy[SID_SIZE]; + unsigned int i; + struct resource *res; + void __iomem *sid_reg_base; + int ret; + + res = platform_get_resource(pdev, IORESOURCE_MEM, 0); + sid_reg_base = devm_ioremap_resource(&pdev->dev, res); + if (IS_ERR(sid_reg_base)) + return PTR_ERR(sid_reg_base); + platform_set_drvdata(pdev, sid_reg_base); + + ret = device_create_bin_file(&pdev->dev, &sid_bin_attr); + if (ret) + return ret; + + for (i = 0; i < SID_SIZE; i++) + entropy[i] = sunxi_sid_read_byte(sid_reg_base, i); + add_device_randomness(entropy, SID_SIZE); + dev_dbg(&pdev->dev, "%s loaded\n", DRV_NAME); + + return 0; +} + +static struct platform_driver sunxi_sid_driver = { + .probe = sunxi_sid_probe, + .remove = sunxi_sid_remove, + .driver = { + .name = DRV_NAME, + .owner = THIS_MODULE, + .of_match_table = sunxi_sid_of_match, + }, +}; +module_platform_driver(sunxi_sid_driver); + +MODULE_AUTHOR("Oliver Schinagl "); +MODULE_DESCRIPTION("Allwinner sunxi security id driver"); +MODULE_LICENSE("GPL");