| /* Copyright (c) 2011-2013, The Linux Foundation. All rights reserved. |
| |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions are |
| * met: |
| * * Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * * Redistributions in binary form must reproduce the above |
| * copyright notice, this list of conditions and the following |
| * disclaimer in the documentation and/or other materials provided |
| * with the distribution. |
| * * Neither the name of The Linux Foundation nor the names of its |
| * contributors may be used to endorse or promote products derived |
| * from this software without specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED |
| * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF |
| * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT |
| * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS |
| * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
| * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
| * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR |
| * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, |
| * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE |
| * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN |
| * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #ifndef __SCM_H__ |
| #define __SCM_H__ |
| |
| /* 8 Byte SSD magic number (LE) */ |
| #define DECRYPT_MAGIC_0 0x73737A74 |
| #define DECRYPT_MAGIC_1 0x676D6964 |
| #define ENCRYPT_MAGIC_0 0x6B647373 |
| #define ENCRYPT_MAGIC_1 0x676D6973 |
| #define SSD_HEADER_MAGIC_SIZE 8 |
| #define SSD_HEADER_XML_SIZE 2048 |
| |
| typedef unsigned int uint32; |
| |
| typedef struct { |
| uint32 len; |
| uint32 buf_offset; |
| uint32 resp_hdr_offset; |
| uint32 id; |
| } scm_command; |
| |
| typedef struct { |
| uint32 len; |
| uint32 buf_offset; |
| uint32 is_complete; |
| } scm_response; |
| |
| typedef struct { |
| uint32 *img_ptr; |
| uint32 *img_len_ptr; |
| } img_req; |
| |
| typedef struct { |
| uint32 id; |
| uint32 spare; |
| } tz_secure_cfg; |
| |
| #define SCM_SVC_SSD 7 |
| #define SSD_DECRYPT_ID 0x01 |
| #define SSD_ENCRYPT_ID 0x02 |
| |
| #define SCM_SVC_SSD 0x0C |
| #define IOMMU_SECURE_CFG 0x02 |
| |
| #define SECURE_DEVICE_MDSS 1 |
| |
| static uint32 smc(uint32 cmd_addr); |
| |
| int decrypt_scm(uint32_t ** img_ptr, uint32_t * img_len_ptr); |
| int encrypt_scm(uint32_t ** img_ptr, uint32_t * img_len_ptr); |
| |
| #define SCM_SVC_FUSE 0x08 |
| #define SCM_BLOW_SW_FUSE_ID 0x01 |
| #define SCM_IS_SW_FUSE_BLOWN_ID 0x02 |
| |
| #define HLOS_IMG_TAMPER_FUSE 0 |
| |
| |
| #define SCM_SVC_CE_CHN_SWITCH_ID 0x04 |
| #define SCM_CE_CHN_SWITCH_ID 0x02 |
| |
| enum ap_ce_channel_type { |
| AP_CE_REGISTER_USE = 0, |
| AP_CE_ADM_USE = 1 |
| }; |
| |
| /* Apps CE resource. */ |
| #define TZ_RESOURCE_CE_AP 2 |
| |
| uint8_t switch_ce_chn_cmd(enum ap_ce_channel_type channel); |
| |
| |
| void set_tamper_fuse_cmd(); |
| |
| /** |
| * struct scm_command - one SCM command buffer |
| * @len: total available memory for command and response |
| * @buf_offset: start of command buffer |
| * @resp_hdr_offset: start of response buffer |
| * @id: command to be executed |
| * @buf: buffer returned from scm_get_command_buffer() |
| * |
| * An SCM command is layed out in memory as follows: |
| * |
| * ------------------- <--- struct scm_command |
| * | command header | |
| * ------------------- <--- scm_get_command_buffer() |
| * | command buffer | |
| * ------------------- <--- struct scm_response and |
| * | response header | scm_command_to_response() |
| * ------------------- <--- scm_get_response_buffer() |
| * | response buffer | |
| * ------------------- |
| * |
| * There can be arbitrary padding between the headers and buffers so |
| * you should always use the appropriate scm_get_*_buffer() routines |
| * to access the buffers in a safe manner. |
| */ |
| struct scm_command { |
| uint32_t len; |
| uint32_t buf_offset; |
| uint32_t resp_hdr_offset; |
| uint32_t id; |
| uint32_t buf[0]; |
| }; |
| |
| /** |
| * struct scm_response - one SCM response buffer |
| * @len: total available memory for response |
| * @buf_offset: start of response data relative to start of scm_response |
| * @is_complete: indicates if the command has finished processing |
| */ |
| struct scm_response { |
| uint32_t len; |
| uint32_t buf_offset; |
| uint32_t is_complete; |
| }; |
| |
| |
| |
| #endif |