Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp916938pxb; Thu, 5 Nov 2020 17:12:34 -0800 (PST) X-Google-Smtp-Source: ABdhPJwQmTj4iKstk1Gp0ZQbp6LvONmcufByVPvCs5yAfBsoqdziveA7TyvMLi1qPX67LbbN5ofv X-Received: by 2002:a17:906:5841:: with SMTP id h1mr5061767ejs.342.1604625154609; Thu, 05 Nov 2020 17:12:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604625154; cv=none; d=google.com; s=arc-20160816; b=bE9wqw+yhi2nhp/Ac5NiYhrGMfraVFGqnuorpiU6VwBbgMUOwDuZgk1kvphR5R+nUn x7m4q9e4XBYHm4fhNRbpAdhbyoMEnoT8X8WFiaftgi8B4/FC8p7jYuaINF4RSci/+O2o 2eS/p0O9h9egKdZ4Ecpxc6vbaGDEU44no4FcsfYnYCALwYsznubnUMGTepF4Lghrpnsc iqqortYkyjj0lD0aNYLhQ2xYkQqrVOf4XFsq83Q0RwXegFx6QFNua3fy1J6/oeXOyuyO EOwm2Q/KwV4ityeFTLhXn/n0ZWVH0gCAFMPyQn/lqqtX+WktttM9mrC0b8Xlq3BKf1T/ VCxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=Ih9FcZP9esma1pufMq1vOr0Wm2o43gFb87YZgNmCeHo=; b=eIe+670n25QgxYYkMXLp/ydl5m4S3rtdV6zv+jnLpnH/eoYiA81omyf2kzFrxK1e3F pqQ7bim4W1j7UsfTMgwMppa5GKqnxzyorzlhwLePZSM0QblxkER+SSaoNWcIuzC11769 PdA5Z4YlFjONlWw7HTC2UmagEIHjV7hv1xjahvkECVn7fxjEB/4OL8vTPJsoOEgH4ENr Fjq9nOdIvbaDssfZWpgETNclMY1CwVg7jsB1TRbMRYS42+8HPrxGXaQEZmDTo6AzGbUg ya2HwMIip672GFvfB+BN7VXS/nveBCpmMRaQOhRJyQ5ggTUQp+CDxAXJoduunOH+8hDx hrMw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u10si2546714ejy.15.2020.11.05.17.12.11; Thu, 05 Nov 2020 17:12:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733175AbgKFBKd (ORCPT + 99 others); Thu, 5 Nov 2020 20:10:33 -0500 Received: from mga11.intel.com ([192.55.52.93]:65182 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732779AbgKFBKW (ORCPT ); Thu, 5 Nov 2020 20:10:22 -0500 IronPort-SDR: I7fIvZYgM7hhRw3TzNkUf2kOdaBuXhi25HoBMRCxi769UuJ9mUsVsMi2bI/UrOW2tvNZ5EIe6U HiHXFEQmIxbg== X-IronPort-AV: E=McAfee;i="6000,8403,9796"; a="165976163" X-IronPort-AV: E=Sophos;i="5.77,454,1596524400"; d="scan'208";a="165976163" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Nov 2020 17:10:20 -0800 IronPort-SDR: bh3dDJi3DMduZiqkdUztlAht1S6YtLUWGIESd/pgx4CsBXWXYEjaY88RaofBRI4sMV4VAPGruC RZpXsLAyZEqw== X-IronPort-AV: E=Sophos;i="5.77,454,1596524400"; d="scan'208";a="528164637" Received: from rhweight-mobl2.amr.corp.intel.com (HELO rhweight-mobl2.ra.intel.com) ([10.254.65.158]) by fmsmga006-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Nov 2020 17:10:20 -0800 From: Russ Weight To: mdf@kernel.org, linux-fpga@vger.kernel.org, linux-kernel@vger.kernel.org Cc: trix@redhat.com, lgoncalv@redhat.com, yilun.xu@intel.com, hao.wu@intel.com, matthew.gerlach@intel.com, Russ Weight Subject: [PATCH v6 5/7] fpga: sec-mgr: expose sec-mgr update size Date: Thu, 5 Nov 2020 17:09:03 -0800 Message-Id: <20201106010905.11935-6-russell.h.weight@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20201106010905.11935-1-russell.h.weight@intel.com> References: <20201106010905.11935-1-russell.h.weight@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Extend the FPGA Security Manager class driver to include an update/remaining_size sysfs node that can be read to determine how much data remains to be transferred to the secure update engine. This file can be used to monitor progress during the "writing" phase of an update. Signed-off-by: Russ Weight Reviewed-by: Tom Rix --- v6: - No change v5: - Use new function sysfs_emit() in the remaining_size_show() function v4: - Changed from "Intel FPGA Security Manager" to FPGA Security Manager" and removed unnecessary references to "Intel". - Changed: imgr -> smgr, ifpga_ to fpga_ v3: - No change v2: - Bumped documentation date and version --- Documentation/ABI/testing/sysfs-class-fpga-sec-mgr | 11 +++++++++++ drivers/fpga/fpga-sec-mgr.c | 10 ++++++++++ 2 files changed, 21 insertions(+) diff --git a/Documentation/ABI/testing/sysfs-class-fpga-sec-mgr b/Documentation/ABI/testing/sysfs-class-fpga-sec-mgr index 9664f269ae8e..848b830c5db6 100644 --- a/Documentation/ABI/testing/sysfs-class-fpga-sec-mgr +++ b/Documentation/ABI/testing/sysfs-class-fpga-sec-mgr @@ -28,6 +28,17 @@ Description: Read-only. Returns a string describing the current as it will be signaled by sysfs_notify() on each state change. +What: /sys/class/fpga_sec_mgr/fpga_secX/update/remaining_size +Date: Oct 2020 +KernelVersion: 5.11 +Contact: Russ Weight +Description: Read-only. Returns the size of data that remains to + be written to the secure update engine. The size + value is initialized to the full size of the file + image and the value is updated periodically during + the "writing" phase of the update. + Format: "%u". + What: /sys/class/fpga_sec_mgr/fpga_secX/update/error Date: Oct 2020 KernelVersion: 5.11 diff --git a/drivers/fpga/fpga-sec-mgr.c b/drivers/fpga/fpga-sec-mgr.c index f41a92d288c3..62633e75ba53 100644 --- a/drivers/fpga/fpga-sec-mgr.c +++ b/drivers/fpga/fpga-sec-mgr.c @@ -204,6 +204,15 @@ error_show(struct device *dev, struct device_attribute *attr, char *buf) } static DEVICE_ATTR_RO(error); +static ssize_t remaining_size_show(struct device *dev, + struct device_attribute *attr, char *buf) +{ + struct fpga_sec_mgr *smgr = to_sec_mgr(dev); + + return sysfs_emit(buf, "%u\n", smgr->remaining_size); +} +static DEVICE_ATTR_RO(remaining_size); + static ssize_t filename_store(struct device *dev, struct device_attribute *attr, const char *buf, size_t count) { @@ -240,6 +249,7 @@ static struct attribute *sec_mgr_update_attrs[] = { &dev_attr_filename.attr, &dev_attr_status.attr, &dev_attr_error.attr, + &dev_attr_remaining_size.attr, NULL, }; -- 2.25.1