Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp2236945pxk; Sat, 5 Sep 2020 13:53:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwKB8rLER8XCn6lQ+znsxwi58UjuYRn1WNGoFGPitjzkrCLASRcTe00A+g3EFlMzALtB2mO X-Received: by 2002:a05:6402:1593:: with SMTP id c19mr15167869edv.33.1599339200840; Sat, 05 Sep 2020 13:53:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599339200; cv=none; d=google.com; s=arc-20160816; b=K5acLDE2o6UKnE7qdXcZJtNczdllzp6pjPoYZ0uwLYVjeDmfTK9CVt+v7hjZemaWkE S/n1+P01RYvaffa0OEw4PKmtHOrntO9GtbFUrHBRb2Q+LdyXd8qMNI/O39Wr9YYTFh4S NXC8LV+G28ruk7pfR+g1QORi/FuERbhU1gVbcUc/omwvg25NS+rN8q2qudnmjJQOzp4q 3fFwZnJC7YAprc8kEi/UKlIOi8IoaMuDkhNQSAdjXrESt5nHpERM53rOVHEAQvrTu5u6 LIivU2S+W8wZkwjZeDS2gZKZFn++1pKWJfvPAERR1BIGV+svvxt7I68FFN4+ml37aOuc hzVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=IX2JXUthZOK9ILrI2szDCLF/ohGIvOY3CoU57DOlSKU=; b=jh9Uo+8B1txp7yEgUcv4crfMdcuByCz3SNmDGXw034jOkZGQXHNwfD5lZ44cQdfBr9 VsFAgQBfXDVHiZqaOtRuw7arf3yYyb+gLFxqe0uSzT6D9ELOQWDHY7xqgkcXrU14sJ8D 4QAUxCd7jNaU9b4QpEWihJNWoFUC7ixyiOIW7WjMIaL1F0vDsVaHeiFqSknkq8AFLTl+ 3GWtmzOG1lcI+LLE6FLUPaf/yG/LwpfcV43Nq5AmptBxRhcQfeN62DpbW37zViM4sMI8 1dZ/mmT+OAvpB5Anq+FflPPDyRVz1E8GyjdNtetEnxm6mNB7nYfpx1VXa1vas3qiE/a4 53NQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ZUmANEce; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v21si7580938ejg.482.2020.09.05.13.52.57; Sat, 05 Sep 2020 13:53:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ZUmANEce; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728663AbgIEUw1 (ORCPT + 99 others); Sat, 5 Sep 2020 16:52:27 -0400 Received: from us-smtp-2.mimecast.com ([207.211.31.81]:42965 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728426AbgIEUwZ (ORCPT ); Sat, 5 Sep 2020 16:52:25 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1599339143; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=IX2JXUthZOK9ILrI2szDCLF/ohGIvOY3CoU57DOlSKU=; b=ZUmANEce24WhyKuhc74Wy/eNnBMp33mgq7+xZeOgEx4t+VL+ILOAkW6aDeRT+bAl8cBnCy fRSVsMdxjHPa+GAmNolxNOQm2ytBxCQEkaIEp4T9P7+uNmk2yrwkoGXt9uIEiTX4i6fAs1 oTeNombyGzvpUB8jjJZgOdrDq1sz3uc= Received: from mail-qk1-f200.google.com (mail-qk1-f200.google.com [209.85.222.200]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-387-evcVtQrhOXCWqFSA3snLCg-1; Sat, 05 Sep 2020 16:52:21 -0400 X-MC-Unique: evcVtQrhOXCWqFSA3snLCg-1 Received: by mail-qk1-f200.google.com with SMTP id m203so5507419qke.16 for ; Sat, 05 Sep 2020 13:52:21 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=IX2JXUthZOK9ILrI2szDCLF/ohGIvOY3CoU57DOlSKU=; b=Y2NRcLcAMFXIMGM9l8bVAWPrT6VNJ0yAwqpaH4V0aHNaN/ufNfwnpEBqkz3wHaPkzi azUYA9Nlf16hdbO1GBPDh+JK7q+26bcEy6LvuqQAR1OHDQtLW+YFQ9UqKm9j4a2sHM3z Gm+7MMAr+8lS0YVtQvRDmlVgWa/hbJUzonHhGlJKaNiSRprqFRB5yoPxy+Nj40r9tCCm RpSydkRVwyXSUdpYWoxagxZFAz3hFJ4ne+uZE3wCCG/+DHfkbWIpcypkVn0Mww97SwvA PBOb397nPgFm67bltzAGl8odtCj+B238ECIdyRx4daSWDgkY1eSqPHwk9wDnhIzD8jz8 YIZA== X-Gm-Message-State: AOAM532ZZYpXa7wrJqc0YMD5VF6gbpMW6suAR8ciQzivHD8TTEipV5rZ qiRu8QyDgKhyyyJXeK9Ded5fk1iGsZxiwLfqQmsiBs7IQ44C+iHgejrrtA4jAeTe9czL9hfUyEp iJldiTzDrUzQqP76iw578789Q X-Received: by 2002:ac8:3704:: with SMTP id o4mr13711167qtb.330.1599339141119; Sat, 05 Sep 2020 13:52:21 -0700 (PDT) X-Received: by 2002:ac8:3704:: with SMTP id o4mr13711156qtb.330.1599339140863; Sat, 05 Sep 2020 13:52:20 -0700 (PDT) Received: from trix.remote.csb (075-142-250-213.res.spectrum.com. [75.142.250.213]) by smtp.gmail.com with ESMTPSA id j11sm1552337qko.111.2020.09.05.13.52.19 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sat, 05 Sep 2020 13:52:20 -0700 (PDT) Subject: Re: [PATCH v1 04/12] fpga: expose max10 canceled keys in sysfs To: Russ Weight , mdf@kernel.org, lee.jones@linaro.org, linux-fpga@vger.kernel.org, linux-kernel@vger.kernel.org Cc: lgoncalv@redhat.com, yilun.xu@intel.com, hao.wu@intel.com, matthew.gerlach@intel.com References: <20200904235305.6254-1-russell.h.weight@intel.com> <20200904235305.6254-5-russell.h.weight@intel.com> From: Tom Rix Message-ID: Date: Sat, 5 Sep 2020 13:52:18 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 In-Reply-To: <20200904235305.6254-5-russell.h.weight@intel.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/4/20 4:52 PM, Russ Weight wrote: > Extend the MAX10 BMC Security Engine driver to provide a > handler to expose the canceled code signing key (CSK) bit > vectors. These use the standard bitmap list format > (e.g. 1,2-6,9). > > Signed-off-by: Russ Weight > Reviewed-by: Wu Hao > --- > drivers/fpga/intel-m10-bmc-secure.c | 60 +++++++++++++++++++++++++++++ > 1 file changed, 60 insertions(+) > > diff --git a/drivers/fpga/intel-m10-bmc-secure.c b/drivers/fpga/intel-m10-bmc-secure.c > index b824790e43aa..46cd49a08be0 100644 > --- a/drivers/fpga/intel-m10-bmc-secure.c > +++ b/drivers/fpga/intel-m10-bmc-secure.c > @@ -130,14 +130,74 @@ static int get_qspi_flash_count(struct ifpga_sec_mgr *imgr) > return ret ? : cnt; > } > > +#define CSK_BIT_LEN 128U > +#define CSK_32ARRAY_SIZE(_nbits) DIV_ROUND_UP(_nbits, 32) > + > +#define SYSFS_GET_CSK_CANCEL_NBITS(_name) \ > +static int get_##_name##_csk_cancel_nbits(struct ifpga_sec_mgr *imgr) \ > +{ \ > + return (int)CSK_BIT_LEN; \ > +} > + > +SYSFS_GET_CSK_CANCEL_NBITS(bmc) > +SYSFS_GET_CSK_CANCEL_NBITS(sr) > +SYSFS_GET_CSK_CANCEL_NBITS(pr) > + > +static int get_csk_vector(struct ifpga_sec_mgr *imgr, u32 addr, > + unsigned long *csk_map, unsigned int nbits) > +{ > + unsigned int i, arr_size = CSK_32ARRAY_SIZE(nbits); > + struct m10bmc_sec *sec = imgr->priv; > + u32 *csk32; > + int ret; > + > + csk32 = vmalloc(arr_size); > + if (!csk32) > + return -ENOMEM; > + > + ret = m10bmc_raw_bulk_read(sec->m10bmc, addr, csk32, arr_size); Is this correct ? other similar bulk read used the regmap stride. > + if (ret) { > + dev_err(sec->dev, "%s failed to read %d\n", __func__, ret); > + goto vfree_exit; > + } > + > + for (i = 0; i < arr_size; i++) > + csk32[i] = le32_to_cpu(csk32[i]); > + > + bitmap_from_arr32(csk_map, csk32, nbits); > + bitmap_complement(csk_map, csk_map, nbits); > + > +vfree_exit: > + vfree(csk32); > + return ret; > +} > + > +#define SYSFS_GET_CSK_VEC(_name, _addr) \ > +static int get_##_name##_canceled_csks(struct ifpga_sec_mgr *imgr, \ > + unsigned long *csk_map, \ > + unsigned int nbits) \ > +{ return get_csk_vector(imgr, _addr, csk_map, nbits); } > + > +#define CSK_VEC_OFFSET 0x34 > + > +SYSFS_GET_CSK_VEC(bmc, BMC_PROG_ADDR + CSK_VEC_OFFSET) > +SYSFS_GET_CSK_VEC(sr, SR_PROG_ADDR + CSK_VEC_OFFSET) > +SYSFS_GET_CSK_VEC(pr, PR_PROG_ADDR + CSK_VEC_OFFSET) Issues similar with earlier patches. > + > static const struct ifpga_sec_mgr_ops m10bmc_iops = { > .user_flash_count = get_qspi_flash_count, > .bmc_root_entry_hash = get_bmc_root_entry_hash, > .sr_root_entry_hash = get_sr_root_entry_hash, > .pr_root_entry_hash = get_pr_root_entry_hash, > + .bmc_canceled_csks = get_bmc_canceled_csks, > + .sr_canceled_csks = get_sr_canceled_csks, > + .pr_canceled_csks = get_pr_canceled_csks, > .bmc_reh_size = get_bmc_reh_size, > .sr_reh_size = get_sr_reh_size, > .pr_reh_size = get_pr_reh_size, > + .bmc_canceled_csk_nbits = get_bmc_csk_cancel_nbits, > + .sr_canceled_csk_nbits = get_sr_csk_cancel_nbits, > + .pr_canceled_csk_nbits = get_pr_csk_cancel_nbits These are copies the same function, replace with a common function. Tom > }; > > static void ifpga_sec_mgr_uinit(struct m10bmc_sec *sec)