Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp2831403pxk; Sun, 4 Oct 2020 13:56:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwVin/fHzj9PvqtJi+vXZNoWksRTaCVKXU8wUxKx9dBHcwNUvEOT2hJ3gY3fEXiQA/tuZHk X-Received: by 2002:a17:906:c111:: with SMTP id do17mr12034715ejc.551.1601844989156; Sun, 04 Oct 2020 13:56:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601844989; cv=none; d=google.com; s=arc-20160816; b=FknXLeWgs687ncXtpGA02VCRNDlvYxB1/4QvVvIncMLoEK2ZTq/zN/RlZffQuWIEJ9 VThE8IxAWfVjCb5zvh0SyAsqTmVloJ9aNHxU8QSUpBUqnUo8DoRchpjTv/RfRYG4PmJ3 GQJhC+XLKW6s520UZpx2c8PLNsBSvle7Md9YZC9FDwIoXFRq2u+35JykD1+OespFgs2w 6cmGJbHzMuHPTps9kYKhtpa39xIHY02W2YRWHCq1N7tEIz2o6iJIfcn96/Ld1qKqBA2x DDnLhw2413CKq/O7rN3Us0yu0e5XrZglK5qA/Slo1Ep3ddflHgh5hPEM0AlD04vE/Z0R 1PJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=mWH/ATVcRB7rwNAEkwbR+sPGrk7a5wftqQOirUz0nmI=; b=PQgpUN5wryNdFWLa5znm3O8LSmIshy9L6voBMdsv8AFa8JnTfmnkNZtRuD1LrBotA9 S7MfQhXbLSC1TAAKfAaIXSL3ZlXxcav7zPoYxdGlUY2y6SKre33I3LOg+VuKoS24jHHG HEe7AEdZ4hywl/Hg2/Ssd42Hj1YeKHhXxMqtBWRJU5qdMjlrDFCWLCHjMYPc3SFh5hvY f8NZSOE6Aw2oBUA688miZttKl2nnVeLhAtr29XibPET+hSf3w8/D9MCe7JE0LewHgHdv 6kXkoBbHpK6k38pst46cfi2+N2JmybjzryMjjcdf8Zsmr6ZhjND1fRdCT/rakaAW377I s/2Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=UctFYXnX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id jr15si5777994ejb.183.2020.10.04.13.56.05; Sun, 04 Oct 2020 13:56:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=UctFYXnX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726431AbgJDUzE (ORCPT + 99 others); Sun, 4 Oct 2020 16:55:04 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:50756 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726313AbgJDUzE (ORCPT ); Sun, 4 Oct 2020 16:55:04 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1601844903; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=mWH/ATVcRB7rwNAEkwbR+sPGrk7a5wftqQOirUz0nmI=; b=UctFYXnXRsA1Nk3OiJsnFE8ZY/Ev9LUO/yRKrjdJ6JoFI17LRPvT+Y6TsCvbX2SZEgwjBS L6us0cDDaMkGd2XxDV47ah8thWGOMbuQ5+2XkeGA2KcAQK+IFqWg/Y3SDpJomtZxun5mMO vhEwkIVmH7wzBai5XCHYaJerKMdh62s= Received: from mail-qk1-f199.google.com (mail-qk1-f199.google.com [209.85.222.199]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-445-YVUaJKJ0Mr6qCfQQZNhpmw-1; Sun, 04 Oct 2020 16:55:01 -0400 X-MC-Unique: YVUaJKJ0Mr6qCfQQZNhpmw-1 Received: by mail-qk1-f199.google.com with SMTP id m23so5231451qkh.10 for ; Sun, 04 Oct 2020 13:55:01 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=mWH/ATVcRB7rwNAEkwbR+sPGrk7a5wftqQOirUz0nmI=; b=qAbS3/g9V8Z29hN+8JksdG/6u6qXzuqPt201e1NR2S7XfUVeZsIYzKHrc2mzATBlzR zCrZ/3NfMy/FOtmXJwNiGekBTBgi7i7CiaKJg97XxikhfyFuUt9JUa3wccUyPcVyXeNO yIfdsuvTXZAVT86S3CS7D3jB5hifEXDx7G01z5GUNWB6scX7zN7HWsYKJSbDFmXQOask 2K216Kf/J+2xOwXy8vnJYbVIxYZ9EwJDwc4u5t/StH3qTOBHQxQMyRGK1QJ/2K55lV/C iDllFaOSrVrifG/DWnS9FRVcyRrF00EuHab4alnPSDdGEhxvNKm3mQT3d1doAJTPdlyd kzig== X-Gm-Message-State: AOAM532AAa49QRiJ6ozwZFYY79Aj0ge15eVMzJ0OossrI7skvFexcrb5 XrrL7VnrOE0tmX93rkNk8T1LneMYqLMB1FefHxDlUutTwc56ZlLyNBQiSmEaV3oSCBj4wLuwkRl 4akrGGogCU0tG6jcRy+pslxr0 X-Received: by 2002:a05:6214:a52:: with SMTP id ee18mr6575003qvb.39.1601844901113; Sun, 04 Oct 2020 13:55:01 -0700 (PDT) X-Received: by 2002:a05:6214:a52:: with SMTP id ee18mr6574990qvb.39.1601844900893; Sun, 04 Oct 2020 13:55:00 -0700 (PDT) Received: from trix.remote.csb (075-142-250-213.res.spectrum.com. [75.142.250.213]) by smtp.gmail.com with ESMTPSA id f3sm1232955qtp.57.2020.10.04.13.54.59 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 04 Oct 2020 13:55:00 -0700 (PDT) Subject: Re: [PATCH v2 2/7] fpga: sec-mgr: enable secure updates To: Russ Weight , mdf@kernel.org, linux-fpga@vger.kernel.org, linux-kernel@vger.kernel.org Cc: lgoncalv@redhat.com, yilun.xu@intel.com, hao.wu@intel.com, matthew.gerlach@intel.com References: <20201002223701.1317-1-russell.h.weight@intel.com> <20201002223701.1317-3-russell.h.weight@intel.com> From: Tom Rix Message-ID: Date: Sun, 4 Oct 2020 13:54:58 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 In-Reply-To: <20201002223701.1317-3-russell.h.weight@intel.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/2/20 3:36 PM, Russ Weight wrote: > Extend the FPGA Intel Security Manager class driver to > include an update/filename sysfs node that can be used > to initiate a security update. The filename of a secure > update file (BMC image, FPGA image, Root Entry Hash image, > or Code Signing Key cancellation image) can be written to > this sysfs entry to cause a secure update to occur. > > The write of the filename will return immediately, and the > update will begin in the context of a kernel worker thread. > This tool utilizes the request_firmware framework, which > requires that the image file reside under /lib/firmware. > > Signed-off-by: Russ Weight > --- > v2: > - Bumped documentation date and version > - Removed explicit value assignments in enums > - Other minor code cleanup per review comments > --- > .../ABI/testing/sysfs-class-ifpga-sec-mgr | 13 ++ > drivers/fpga/ifpga-sec-mgr.c | 157 ++++++++++++++++++ > include/linux/fpga/ifpga-sec-mgr.h | 49 ++++++ > 3 files changed, 219 insertions(+) This was 05/12 in the old patchset. Looks good. Reviewed-by: Tom Rix