Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp479758imm; Thu, 26 Jul 2018 07:00:50 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcrrYb3c6sZrx+DeMX3X3+e6q5xb5jn9as+G8an/2wqQkIpDsR+7RDVC6fCDOMJUKKN7VmF X-Received: by 2002:a63:f344:: with SMTP id t4-v6mr2078941pgj.428.1532613650030; Thu, 26 Jul 2018 07:00:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532613650; cv=none; d=google.com; s=arc-20160816; b=Vf3EyvtBed9OnrxQl62J8K9Rov1a3sDucAaUSMIfTNi2jxt+Hiyk88DCaOxUujQTjc wIwdvbO6rksDzW5UcbHBekHF8jbHy2IIJ8M6uOTjZFacgxBQyV00Uj7Txpbf+5l2IFXM I6g3iSJ/iuXEow/zHCYqdZus+IvwjXJNCLiSzjlSwklMIQOwIwS6ElH7/AFc1dlbkV+L s+Vs/DwF5H0qtzbElduI0wTkgbJkTlgWBPQmAKMHaV7FxVEVPxBRj8BS6NoomHod25X4 lnwtfKMcdlk/BIiBaSsLls0ctPPg6MYeRqZE5FY2He1USgDMvqQHx+JnOwgdN6KEEKt6 pwZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature:arc-authentication-results; bh=m9CCiwR/zhrqNdJ6Qi86kfoFuPrHTGpOo/Cqk2c9lMw=; b=P3s4P5+ld2A/00VCj+cJqNSBrdfksNstCL6U0aDscqPKTah8DtatxwOd+wPSrQwMjj Ls+GTMkW8iXnS2oc/iKExXGXBMu9A5xCxvxRg029dK79LIQa1vSuwWOMUOpQoFHz+42j Pf9YcoemmuA07e9TiEnbOY7LTaTA9ZcONOPSgJ080xsYtQ2nSYcaL3QbH57q+CX5N1eL F24tOJkd4V8CsVjc6hXzPEqcAb2NDk5eaIx7N3gPhTrtpm9hrFlWLD6A01P3CSKeDg3g W8orN4kX30rXK+8HiuxtAnRPCX4QWzUIZrrVyeW/4EyoIbnIkt1l2e7xY5IqLP2zwI7x iEmQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@baylibre-com.20150623.gappssmtp.com header.s=20150623 header.b=NZkza4yo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u11-v6si1350852plm.143.2018.07.26.07.00.34; Thu, 26 Jul 2018 07:00:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@baylibre-com.20150623.gappssmtp.com header.s=20150623 header.b=NZkza4yo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730599AbeGZPQV (ORCPT + 99 others); Thu, 26 Jul 2018 11:16:21 -0400 Received: from mail-wm0-f65.google.com ([74.125.82.65]:54114 "EHLO mail-wm0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729506AbeGZPQV (ORCPT ); Thu, 26 Jul 2018 11:16:21 -0400 Received: by mail-wm0-f65.google.com with SMTP id s9-v6so2093349wmh.3 for ; Thu, 26 Jul 2018 06:59:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=baylibre-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id; bh=m9CCiwR/zhrqNdJ6Qi86kfoFuPrHTGpOo/Cqk2c9lMw=; b=NZkza4yogigBBOi5izjgx9CAY1ce3IXfSFLxmUy1TB4UQovCnPBny2wWmuPPw5D2Xn Fkdxi2tLXl9aP+jeqy6Z6IsjNtfouzYYkn8U4lRNi7nXCqE6pd5oURI8dP6p5c98Ys6K dam+D8uxPrX0AIzAnKOdI8aUWWBafjRDcFJSI4a3yWWlVKtZSUpbhq8K55GsLRxZniBm 4dI6ieTTm1fNilkW4e3yvUV1ldZr4EQB6L7DBb+wZQX9LPblJ8o0ZgrGKiIBE/siPC7T ZRsqjkB/Dq5/chQ254R3gqx2Mt5ibXU7/SSYJxP6khIb7Rs/vnCyuLyyO79Jrvwl7Rn7 lpnA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=m9CCiwR/zhrqNdJ6Qi86kfoFuPrHTGpOo/Cqk2c9lMw=; b=S4/L6f2NMub3Fplt5lIictHXPEDGRK48nZOqDIv3TTusgkpsWaqLG8ClMsVVDIzkFn sMcONXOBnIK74d5RVmeElJAjJdIb1Z5K/Uo9hAk9hgokHYm3NFY3qsJwDQGufjS4FOvg 08gywielBlSDxD0xcPcIeOyEueFN6V+EaRB9FPdfgeBCeP+LmQ0uIW66BmMz8q/vgduL vQG+DeTuBcauyvB7J6tg6wDPji9iUr+QWmbKJg25Fu+NffbuSo1H05YuRxi2i1M0XYVx AxoOEYJRIHz//17AItO4gtylQdyPUza15J35ie1L0oI797fHTXNkjYrWr0QzHCp4h0YU HJhg== X-Gm-Message-State: AOUpUlGTTUdlwR80TEhK6usTH0G8qYvi251FXeeBLQibPkcL5I5z9tOh dqf7A0fhxHlCEU4CLRl+i/LCNA== X-Received: by 2002:a1c:c4ce:: with SMTP id u197-v6mr1656860wmf.10.1532613559582; Thu, 26 Jul 2018 06:59:19 -0700 (PDT) Received: from bender.baylibre.local ([90.63.244.31]) by smtp.gmail.com with ESMTPSA id s7-v6sm1754942wru.96.2018.07.26.06.59.18 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 26 Jul 2018 06:59:18 -0700 (PDT) From: Neil Armstrong To: khilman@baylibre.com, carlo@caione.org Cc: Neil Armstrong , linux-amlogic@lists.infradead.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [PATCH] firmware: meson_sm: Add serial number sysfs entry Date: Thu, 26 Jul 2018 15:59:16 +0200 Message-Id: <1532613556-5398-1-git-send-email-narmstrong@baylibre.com> X-Mailer: git-send-email 2.7.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The Amlogic Meson SoC Secure Monitor implements a call to retrieve an unique SoC ID starting from the GX Family and all new families. The serial number is simply exposed as a sysfs entry under the firmware sysfs directory. Signed-off-by: Neil Armstrong --- drivers/firmware/meson/meson_sm.c | 56 +++++++++++++++++++++++++++++++++ include/linux/firmware/meson/meson_sm.h | 1 + 2 files changed, 57 insertions(+) diff --git a/drivers/firmware/meson/meson_sm.c b/drivers/firmware/meson/meson_sm.c index 0ec2ca8..29fbc81 100644 --- a/drivers/firmware/meson/meson_sm.c +++ b/drivers/firmware/meson/meson_sm.c @@ -24,6 +24,7 @@ #include #include #include + #include #include @@ -48,6 +49,7 @@ struct meson_sm_chip gxbb_chip = { CMD(SM_EFUSE_READ, 0x82000030), CMD(SM_EFUSE_WRITE, 0x82000031), CMD(SM_EFUSE_USER_MAX, 0x82000033), + CMD(SM_GET_CHIP_ID, 0x82000044), { /* sentinel */ }, }, }; @@ -214,6 +216,57 @@ int meson_sm_call_write(void *buffer, unsigned int size, unsigned int cmd_index, } EXPORT_SYMBOL(meson_sm_call_write); +#define SM_CHIP_ID_LENGTH 119 +#define SM_CHIP_ID_OFFSET 4 +#define SM_CHIP_ID_SIZE 12 + +static ssize_t serial_show(struct device *dev, struct device_attribute *attr, + char *buf) +{ + uint8_t *id_buf; + int ret; + + id_buf = kmalloc(SM_CHIP_ID_LENGTH, GFP_KERNEL); + if (!id_buf) + return -ENOMEM; + + ret = meson_sm_call_read(id_buf, SM_CHIP_ID_LENGTH, SM_GET_CHIP_ID, + 0, 0, 0, 0, 0); + if (ret < 0) { + kfree(id_buf); + return ret; + } + + ret = sprintf(buf, "%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x\n", + id_buf[SM_CHIP_ID_OFFSET + 0], + id_buf[SM_CHIP_ID_OFFSET + 1], + id_buf[SM_CHIP_ID_OFFSET + 2], + id_buf[SM_CHIP_ID_OFFSET + 3], + id_buf[SM_CHIP_ID_OFFSET + 4], + id_buf[SM_CHIP_ID_OFFSET + 5], + id_buf[SM_CHIP_ID_OFFSET + 6], + id_buf[SM_CHIP_ID_OFFSET + 7], + id_buf[SM_CHIP_ID_OFFSET + 8], + id_buf[SM_CHIP_ID_OFFSET + 9], + id_buf[SM_CHIP_ID_OFFSET + 10], + id_buf[SM_CHIP_ID_OFFSET + 11]); + + kfree(id_buf); + + return ret; +} + +static DEVICE_ATTR_RO(serial); + +static struct attribute *meson_sm_sysfs_attributes[] = { + &dev_attr_serial.attr, + NULL, +}; + +static const struct attribute_group meson_sm_sysfs_attr_group = { + .attrs = meson_sm_sysfs_attributes, +}; + static const struct of_device_id meson_sm_ids[] = { { .compatible = "amlogic,meson-gxbb-sm", .data = &gxbb_chip }, { /* sentinel */ }, @@ -242,6 +295,9 @@ static int __init meson_sm_probe(struct platform_device *pdev) fw.chip = chip; pr_info("secure-monitor enabled\n"); + if (sysfs_create_group(&pdev->dev.kobj, &meson_sm_sysfs_attr_group)) + goto out_in_base; + return 0; out_in_base: diff --git a/include/linux/firmware/meson/meson_sm.h b/include/linux/firmware/meson/meson_sm.h index 37a5eae..f98c20d 100644 --- a/include/linux/firmware/meson/meson_sm.h +++ b/include/linux/firmware/meson/meson_sm.h @@ -17,6 +17,7 @@ enum { SM_EFUSE_READ, SM_EFUSE_WRITE, SM_EFUSE_USER_MAX, + SM_GET_CHIP_ID, }; struct meson_sm_firmware; -- 2.7.4