Re: [PATCH 0/9] dt-bindings: first tentative of conversion to yaml format

2019-08-13 Thread Rob Herring
On Thu, Aug 8, 2019 at 2:51 AM Neil Armstrong wrote: > > This is a first tentative to convert some of the simplest Amlogic > dt-bindings to the yaml format. > > All have been tested using : > $ make ARCH=arm64 dtbs_check > > Issues with the amlogic arm64 DTs has already been identified thanks > to

Re: [PATCH v7 00/15] crypto: caam - Add i.MX8MQ support

2019-08-13 Thread Andrey Smirnov
On Tue, Aug 13, 2019 at 6:59 AM Horia Geanta wrote: > > On 8/12/2019 11:08 PM, Andrey Smirnov wrote: > > Everyone: > > > > Picking up where Chris left off (I chatted with him privately > > beforehead), this series adds support for i.MX8MQ to CAAM driver. Just > > like [v1], this series is i.MX8MQ

Re: [PATCH v6 12/14] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs

2019-08-13 Thread Andrey Smirnov
On Tue, Aug 13, 2019 at 6:38 AM Horia Geanta wrote: > > On 8/12/2019 10:27 PM, Andrey Smirnov wrote: > > On Mon, Aug 5, 2019 at 1:23 AM Horia Geanta wrote: > >> > >> On 7/17/2019 6:25 PM, Andrey Smirnov wrote: > >>> @@ -603,11 +603,13 @@ static int caam_probe(struct platform_device *pdev) > >>>

Re: [PATCH v7 00/15] crypto: caam - Add i.MX8MQ support

2019-08-13 Thread Horia Geanta
On 8/12/2019 11:08 PM, Andrey Smirnov wrote: > Everyone: > > Picking up where Chris left off (I chatted with him privately > beforehead), this series adds support for i.MX8MQ to CAAM driver. Just > like [v1], this series is i.MX8MQ only. > > Feedback is welcome! > Thanks, > Andrey Smirnov > > Ch

Re: [PATCH v6 12/14] crypto: caam - force DMA address to 32-bit on 64-bit i.MX SoCs

2019-08-13 Thread Horia Geanta
On 8/12/2019 10:27 PM, Andrey Smirnov wrote: > On Mon, Aug 5, 2019 at 1:23 AM Horia Geanta wrote: >> >> On 7/17/2019 6:25 PM, Andrey Smirnov wrote: >>> @@ -603,11 +603,13 @@ static int caam_probe(struct platform_device *pdev) >>> ret = init_clocks(dev, ctrlpriv, imx_soc_match->data);

Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code

2019-08-13 Thread Sumit Garg
On Thu, 8 Aug 2019 at 20:46, Jarkko Sakkinen wrote: > > On Thu, Aug 08, 2019 at 06:51:38PM +0530, Sumit Garg wrote: > > It seems to be a functional change which I think requires proper unit > > testing. I am afraid that I don't posses a TPM device to test this and > > also very less conversant wit

[RFC/RFT v4 3/5] KEYS: trusted: create trusted keys subsystem

2019-08-13 Thread Sumit Garg
Move existing code to trusted keys subsystem. Also, rename files with "tpm" as suffix which provides the underlying implementation. Suggested-by: Jarkko Sakkinen Signed-off-by: Sumit Garg --- crypto/asymmetric_keys/asym_tpm.c | 2 +- include/keys/{trusted.h => trusted_tpm.

[RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework

2019-08-13 Thread Sumit Garg
Current trusted keys framework is tightly coupled to use TPM device as an underlying implementation which makes it difficult for implementations like Trusted Execution Environment (TEE) etc. to provide trusked keys support in case platform doesn't posses a TPM device. So this patch tries to add ge

[RFC/RFT v4 4/5] KEYS: trusted: move tpm2 trusted keys code

2019-08-13 Thread Sumit Garg
Move TPM2 trusted keys code to trusted keys subsystem. The reason being it's better to consolidate all the trusted keys code to a single location so that it can be maintained sanely. Suggested-by: Jarkko Sakkinen Signed-off-by: Sumit Garg --- drivers/char/tpm/tpm-chip.c | 1 + d

[RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem

2019-08-13 Thread Sumit Garg
This patch-set is an outcome of discussion here [1]. It has evolved very much since v1 to create, consolidate and generalize trusted keys subsystem. This framework has been tested with trusted keys support provided via TEE but I wasn't able to test it with a TPM device as I don't possess one. It w

[RFC/RFT v4 1/5] tpm: move tpm_buf code to include/linux/

2019-08-13 Thread Sumit Garg
Move tpm_buf code to common include/linux/tpm.h header so that it can be reused via other subsystems like trusted keys etc. Also rename trusted keys TPM 1.x buffer implementation to tpm1_buf to avoid any compilation errors. Suggested-by: Jarkko Sakkinen Signed-off-by: Sumit Garg --- drivers/ch

[RFC/RFT v4 2/5] KEYS: trusted: use common tpm_buf for TPM1.x code

2019-08-13 Thread Sumit Garg
Utilize common heap based tpm_buf code for TPM1.x trusted keys rather than using stack based tpm1_buf code. Also, remove tpm1_buf code. Suggested-by: Jarkko Sakkinen Signed-off-by: Sumit Garg --- include/keys/trusted.h | 37 +-- security/keys/trusted.c | 98