Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp3724190pxb; Fri, 4 Feb 2022 15:08:30 -0800 (PST) X-Google-Smtp-Source: ABdhPJziGC0eZtKy/kLcYBCV/eH3iz2hQQvwH1igriQuWDsJ6CqBmuBS1yKOmGyMfF4h6i8NVkAs X-Received: by 2002:a17:90b:4d05:: with SMTP id mw5mr1480164pjb.34.1644016110624; Fri, 04 Feb 2022 15:08:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644016110; cv=none; d=google.com; s=arc-20160816; b=gKF8w7spymQRIeWqx+Yx2WKb0527NEPSc7xfNAWUny/4Ghc+9HlddTmuTed+ohNBmy MunTodvqILiV8T5Tx0CREVl9nt/ADDH77xn4WFUHBQVnzM3WaIYiSH7eskvy6D2q6wBm 2QoYCm+yk51ReAfWTUt5ddJ9He0rIywP8J4SdmwpjY+d8ohxsFwyIe4nyHI2d+N7p6Jf HlT38Z2hcwBsWCW/CWUnUFZgg8AamGxq86okbKZwJ7H9rVqtpp4NJnTwEgvR6clQXgAr BIZVOfSXCIMtOxzagKAORJC2b/HmA1yxq0b9dDkevR+P1dmrh9f38OoHgDRpBP7VLBOD BRWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=yhbThChrrXkAz4XfwpVVT3RlUP4NP3e99s/Cbh14bt4=; b=kujqOaOOuXlMQaj+xamAsyI322NJLFVVRCek8CormJJWXq6rEuAJipuJgej4ls5R3a TbmpV1srElUd/5fLZ/N+7+Co4J7WqGEXhfXwn1GtghZDqZ74CSdTebiGtUUz4231iTW2 zV8Jxsbr/tZ1GA7amd23n3f9zrCvVtSQOUCDka24b96JP3NC7t0zjv9OzoRCntqQzl5q 8pykllaoed8Ucw8vZK2TaHCIUX0fGATG3Q8Ib0ipnomLSw1ygGdf59ni0hDr2XsmuRa4 nSfaEjQnqRVxoAIxo+vzINER5+uluaNnQWTMbuEpK2L6If4byMyQPZfMH+7mWPbdV0Vj 5hhg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id mm21si10459929pjb.144.2022.02.04.15.08.18; Fri, 04 Feb 2022 15:08:30 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1351193AbiBCOXL (ORCPT + 99 others); Thu, 3 Feb 2022 09:23:11 -0500 Received: from foss.arm.com ([217.140.110.172]:49354 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1351158AbiBCOXF (ORCPT ); Thu, 3 Feb 2022 09:23:05 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id D9A5A1FB; Thu, 3 Feb 2022 06:23:04 -0800 (PST) Received: from [10.57.68.47] (unknown [10.57.68.47]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 915293F774; Thu, 3 Feb 2022 06:23:03 -0800 (PST) Message-ID: Date: Thu, 3 Feb 2022 14:22:59 +0000 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Thunderbird/91.5.1 Subject: Re: [PATCH v2 1/3] firmware: Add boot information to sysfs Content-Language: en-GB To: Joel Stanley , Arnd Bergmann , Andrew Jeffery , Greg Kroah-Hartman , "Rafael J . Wysocki" Cc: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-aspeed@lists.ozlabs.org References: <20220203115344.267159-1-joel@jms.id.au> <20220203115344.267159-2-joel@jms.id.au> From: Robin Murphy In-Reply-To: <20220203115344.267159-2-joel@jms.id.au> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022-02-03 11:53, Joel Stanley wrote: > Machines often have firmware that perform some action before Linux is > loaded. It's useful to know how this firmware is configured, so create a > sysfs directory and some properties that a system can choose to expose > to describe how the system was started. > > Currently the intended use describes five files, relating to hardware > root of trust configuration. > > These properties are populated by platform code at startup. Using fixed > values is suitable as the state that the system booted in will not > change after firmware has handed over. > > Signed-off-by: Joel Stanley > --- > v2: > - Rewrite so properties are present in common code and are exposed based > on the is_visible callback. > - Use sysfs_emit > --- > .../ABI/testing/sysfs-firmware-bootinfo | 43 +++++++++ > drivers/base/firmware.c | 90 +++++++++++++++++++ > include/linux/firmware_bootinfo.h | 22 +++++ > 3 files changed, 155 insertions(+) > create mode 100644 Documentation/ABI/testing/sysfs-firmware-bootinfo > create mode 100644 include/linux/firmware_bootinfo.h > > diff --git a/Documentation/ABI/testing/sysfs-firmware-bootinfo b/Documentation/ABI/testing/sysfs-firmware-bootinfo > new file mode 100644 > index 000000000000..cd6c42316345 > --- /dev/null > +++ b/Documentation/ABI/testing/sysfs-firmware-bootinfo > @@ -0,0 +1,43 @@ > +What: /sys/firmware/bootinfo/* > +Date: Jan 2022 > +Description: > + A system can expose information about how it was started in > + this directory. > + > + This information is agnostic as to the firmware implementation. > + > + A system may expose a subset of these properties as applicable. > + > + > +What: /sys/firmware/bootinfo/secure_boot > +Date: Jan 2022 > +Description: > + Indicates the system was started with secure boot enabled in > + the firmware. > + > + > +What: /sys/firmware/bootinfo/abr_image > +Date: Jan 2022 > +Description: > + Indicates the system was started from the alternate image > + loaded from an Alternate Boot Region. Often this is a result of > + the primary firmware image failing to start the system. > + > + > +What: /sys/firmware/bootinfo/low_security_key > +Date: Jan 2022 > +Description: > + Indicates the system's secure boot was verified with a low > + security or development key. > + > +What: /sys/firmware/bootinfo/otp_protected > +Date: Jan 2022 > +Description: > + Indicates the system's boot configuration region is write > + protected and cannot be modified. > + > +What: /sys/firmware/bootinfo/uart_boot > +Date: Jan 2022 > +Description: > + Indicates the system firmware was loaded from a UART instead of > + an internal boot device. I'd be concerned about how well details like "uart_boot" and "abr_image" scale beyond one SoC family from one vendor. The combinatorial explosion of possible boot configurations across Linux-capable SoCs and firmware in general is larger than I'd care to imagine, even before considering that the nuances don't necessarily stop there - e.g. whether a given storage interface is hard-wired or user-accessible is not a fixed property on many SoCs, and even a socketed SD card might be "trusted" if a board is deployed in a product with a sealed enclosure. Cheers, Robin. > diff --git a/drivers/base/firmware.c b/drivers/base/firmware.c > index 8dff940e0db9..24b931232eb2 100644 > --- a/drivers/base/firmware.c > +++ b/drivers/base/firmware.c > @@ -11,6 +11,7 @@ > #include > #include > #include > +#include > > #include "base.h" > > @@ -24,3 +25,92 @@ int __init firmware_init(void) > return -ENOMEM; > return 0; > } > + > +/* > + * Exposes attributes documented in Documentation/ABI/testing/sysfs-firmware-bootinfo > + */ > +static struct bootinfo bootinfo; > + > +static ssize_t abr_image_show(struct device *dev, struct device_attribute *attr, char *buf) > +{ > + return sysfs_emit(buf, "%d\n", bootinfo.abr_image.val); > +} > +static DEVICE_ATTR_RO(abr_image); > + > +static ssize_t low_security_key_show(struct device *dev, struct device_attribute *attr, char *buf) > +{ > + return sysfs_emit(buf, "%d\n", bootinfo.low_security_key.val); > +} > +static DEVICE_ATTR_RO(low_security_key); > + > +static ssize_t otp_protected_show(struct device *dev, struct device_attribute *attr, char *buf) > +{ > + return sysfs_emit(buf, "%d\n", bootinfo.otp_protected.val); > +} > +static DEVICE_ATTR_RO(otp_protected); > + > +static ssize_t secure_boot_show(struct device *dev, struct device_attribute *attr, char *buf) > +{ > + return sysfs_emit(buf, "%d\n", bootinfo.secure_boot.val); > +} > +static DEVICE_ATTR_RO(secure_boot); > + > +static ssize_t uart_boot_show(struct device *dev, struct device_attribute *attr, char *buf) > +{ > + return sysfs_emit(buf, "%d\n", bootinfo.uart_boot.val); > +} > +static DEVICE_ATTR_RO(uart_boot); > + > +#define ATTR_ENABLED(a) ((attr == &dev_attr_##a.attr) && bootinfo.a.en) > + > +static umode_t bootinfo_attr_mode(struct kobject *kobj, struct attribute *attr, int index) > +{ > + if (ATTR_ENABLED(abr_image)) > + return 0444; > + > + if (ATTR_ENABLED(otp_protected)) > + return 0444; > + > + if (ATTR_ENABLED(low_security_key)) > + return 0444; > + > + if (ATTR_ENABLED(otp_protected)) > + return 0444; > + > + if (ATTR_ENABLED(low_security_key)) > + return 0444; > + > + if (ATTR_ENABLED(secure_boot)) > + return 0444; > + > + if (ATTR_ENABLED(uart_boot)) > + return 0444; > + > + return 0; > +} > + > +static struct attribute *bootinfo_attrs[] = { > + &dev_attr_abr_image.attr, > + &dev_attr_low_security_key.attr, > + &dev_attr_otp_protected.attr, > + &dev_attr_secure_boot.attr, > + &dev_attr_uart_boot.attr, > + NULL, > +}; > + > +static const struct attribute_group bootinfo_attr_group = { > + .attrs = bootinfo_attrs, > + .is_visible = bootinfo_attr_mode, > +}; > + > +int __init firmware_bootinfo_init(struct bootinfo *bootinfo_init) > +{ > + struct kobject *kobj = kobject_create_and_add("bootinfo", firmware_kobj); > + if (!kobj) > + return -ENOMEM; > + > + memcpy(&bootinfo, bootinfo_init, sizeof(bootinfo)); > + > + return sysfs_create_group(kobj, &bootinfo_attr_group); > +} > +EXPORT_SYMBOL_GPL(firmware_bootinfo_init); > diff --git a/include/linux/firmware_bootinfo.h b/include/linux/firmware_bootinfo.h > new file mode 100644 > index 000000000000..3fe630b061b9 > --- /dev/null > +++ b/include/linux/firmware_bootinfo.h > @@ -0,0 +1,22 @@ > +/* SPDX-License-Identifier: GPL-2.0-or-later */ > +/* Copyright 2022 IBM Corp. */ > + > +#include > +#include > + > +#define BOOTINFO_SET(b, n, v) b.n.en = true; b.n.val = v > + > +struct bootinfo_entry { > + bool en; > + bool val; > +}; > + > +struct bootinfo { > + struct bootinfo_entry abr_image; > + struct bootinfo_entry low_security_key; > + struct bootinfo_entry otp_protected; > + struct bootinfo_entry secure_boot; > + struct bootinfo_entry uart_boot; > +}; > + > +int __init firmware_bootinfo_init(struct bootinfo *bootinfo_init);