From patchwork Tue May 27 07:16:02 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: John Ernberg X-Patchwork-Id: 892827 Received: from mail.actia.se (mail.actia.se [212.181.117.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E2EF345009; Tue, 27 May 2025 07:16:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=212.181.117.226 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1748330168; cv=none; b=A01jwXwtxAOj9yb/6k9E35vSoh57SgWceQt80kag1/L7/oZn1hItWxNzJJqV09Ayy+mnvUBM1Uc65iLuRL6HehjAifUbzMl8uc8dGFPWJmV02QtlqAvjIEgCprtIYsb+gGv8LjOZRiXVLL1tC2Dov8BNpcqA+ABC3wmWiCx6a/w= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1748330168; c=relaxed/simple; bh=k+by0adHcEvdVW7TpYj+/UGk4iIyaS/4a2TG6II89tI=; h=From:To:CC:Subject:Date:Message-ID:Content-Type:MIME-Version; b=lRK7DdydLuYfEfIzqIYh5MPiYzo1mWkCvrKGpbaaID8rgHmYmXOZ0JO4xpFCaRLbFIiP3hzyJyxKT23H8usCzJsBcFC41h7nKKRCVQ7CceOVzmHsWHSMBrvyveg/dfeQXEYI23qOr927O3K+9WQc+8QHZJXfiiOsNEuXnRurHZY= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=actia.se; spf=pass smtp.mailfrom=actia.se; arc=none smtp.client-ip=212.181.117.226 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=actia.se Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=actia.se Received: from S036ANL.actianordic.se (10.12.31.117) by S036ANL.actianordic.se (10.12.31.117) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 27 May 2025 09:16:02 +0200 Received: from S036ANL.actianordic.se ([fe80::e13e:1feb:4ea6:ec69]) by S036ANL.actianordic.se ([fe80::e13e:1feb:4ea6:ec69%3]) with mapi id 15.01.2507.039; Tue, 27 May 2025 09:16:02 +0200 From: John Ernberg To: =?utf-8?q?Horia_Geant=C4=83?= , Pankaj Gupta , Gaurav Jain , Herbert Xu , "David S . Miller" , "Rob Herring" , Krzysztof Kozlowski , "Conor Dooley" , Shawn Guo , Sascha Hauer CC: Frank Li , Pengutronix Kernel Team , Fabio Estevam , Thomas Richard , "linux-crypto@vger.kernel.org" , "devicetree@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "imx@lists.linux.dev" , "linux-arm-kernel@lists.infradead.org" , John Ernberg Subject: [PATCH v2 0/4] crypto: caam - iMX8QXP support (and related fixes) Thread-Topic: [PATCH v2 0/4] crypto: caam - iMX8QXP support (and related fixes) Thread-Index: AQHbztc0+n0doXv/EUywtPoFaqnp/Q== Date: Tue, 27 May 2025 07:16:02 +0000 Message-ID: <20250527071552.1424997-1-john.ernberg@actia.se> Accept-Language: en-US, sv-SE Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: git-send-email 2.49.0 x-esetresult: clean, is OK x-esetid: 37303A2955B1445360726A Content-ID: Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 This series enables the use of the CAAM (Cryptographic Acceleration and Assurance Module) on the iMX8QXP (and its variants). v2: (detailed logs in each patch) - Clarify in the commit message how the crash fix works (Frank Li) - Restrict power-domains only for iMX8Q* SoCs in bindings (Frank Li) - Collect tags v1: https://lore.kernel.org/linux-crypto/20250523131814.1047662-1-john.ernberg@actia.se/T Horia Geantă (1): arm64: dts: freescale: imx8qxp/imx8qm: Add CAAM support John Ernberg (3): crypto: caam - Prevent crash on suspend with iMX8QM / iMX8ULP crypto: caam - Support iMX8QXP and variants thereof dt-bindings: crypto: fsl,sec-v4.0: Add power domains for iMX8QM and iMX8QXP .../bindings/crypto/fsl,sec-v4.0.yaml | 36 ++++++++++++++++++ .../boot/dts/freescale/imx8-ss-security.dtsi | 38 +++++++++++++++++++ arch/arm64/boot/dts/freescale/imx8qm.dtsi | 1 + arch/arm64/boot/dts/freescale/imx8qxp.dtsi | 1 + drivers/crypto/caam/ctrl.c | 7 ++-- drivers/crypto/caam/intern.h | 1 + 6 files changed, 81 insertions(+), 3 deletions(-) create mode 100644 arch/arm64/boot/dts/freescale/imx8-ss-security.dtsi