intel-m10-bmc-sec-update.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * Intel MAX10 Board Management Controller Secure Update Driver
  4. *
  5. * Copyright (C) 2019-2022 Intel Corporation. All rights reserved.
  6. *
  7. */
  8. #include <linux/bitfield.h>
  9. #include <linux/device.h>
  10. #include <linux/firmware.h>
  11. #include <linux/mfd/intel-m10-bmc.h>
  12. #include <linux/mod_devicetable.h>
  13. #include <linux/module.h>
  14. #include <linux/platform_device.h>
  15. #include <linux/slab.h>
  16. struct m10bmc_sec {
  17. struct device *dev;
  18. struct intel_m10bmc *m10bmc;
  19. struct fw_upload *fwl;
  20. char *fw_name;
  21. u32 fw_name_id;
  22. bool cancel_request;
  23. };
  24. static DEFINE_XARRAY_ALLOC(fw_upload_xa);
  25. /* Root Entry Hash (REH) support */
  26. #define REH_SHA256_SIZE 32
  27. #define REH_SHA384_SIZE 48
  28. #define REH_MAGIC GENMASK(15, 0)
  29. #define REH_SHA_NUM_BYTES GENMASK(31, 16)
  30. static ssize_t
  31. show_root_entry_hash(struct device *dev, u32 exp_magic,
  32. u32 prog_addr, u32 reh_addr, char *buf)
  33. {
  34. struct m10bmc_sec *sec = dev_get_drvdata(dev);
  35. int sha_num_bytes, i, ret, cnt = 0;
  36. u8 hash[REH_SHA384_SIZE];
  37. unsigned int stride;
  38. u32 magic;
  39. stride = regmap_get_reg_stride(sec->m10bmc->regmap);
  40. ret = m10bmc_raw_read(sec->m10bmc, prog_addr, &magic);
  41. if (ret)
  42. return ret;
  43. if (FIELD_GET(REH_MAGIC, magic) != exp_magic)
  44. return sysfs_emit(buf, "hash not programmed\n");
  45. sha_num_bytes = FIELD_GET(REH_SHA_NUM_BYTES, magic) / 8;
  46. if ((sha_num_bytes % stride) ||
  47. (sha_num_bytes != REH_SHA256_SIZE &&
  48. sha_num_bytes != REH_SHA384_SIZE)) {
  49. dev_err(sec->dev, "%s bad sha num bytes %d\n", __func__,
  50. sha_num_bytes);
  51. return -EINVAL;
  52. }
  53. ret = regmap_bulk_read(sec->m10bmc->regmap, reh_addr,
  54. hash, sha_num_bytes / stride);
  55. if (ret) {
  56. dev_err(dev, "failed to read root entry hash: %x cnt %x: %d\n",
  57. reh_addr, sha_num_bytes / stride, ret);
  58. return ret;
  59. }
  60. for (i = 0; i < sha_num_bytes; i++)
  61. cnt += sprintf(buf + cnt, "%02x", hash[i]);
  62. cnt += sprintf(buf + cnt, "\n");
  63. return cnt;
  64. }
  65. #define DEVICE_ATTR_SEC_REH_RO(_name, _magic, _prog_addr, _reh_addr) \
  66. static ssize_t _name##_root_entry_hash_show(struct device *dev, \
  67. struct device_attribute *attr, \
  68. char *buf) \
  69. { return show_root_entry_hash(dev, _magic, _prog_addr, _reh_addr, buf); } \
  70. static DEVICE_ATTR_RO(_name##_root_entry_hash)
  71. DEVICE_ATTR_SEC_REH_RO(bmc, BMC_PROG_MAGIC, BMC_PROG_ADDR, BMC_REH_ADDR);
  72. DEVICE_ATTR_SEC_REH_RO(sr, SR_PROG_MAGIC, SR_PROG_ADDR, SR_REH_ADDR);
  73. DEVICE_ATTR_SEC_REH_RO(pr, PR_PROG_MAGIC, PR_PROG_ADDR, PR_REH_ADDR);
  74. #define CSK_BIT_LEN 128U
  75. #define CSK_32ARRAY_SIZE DIV_ROUND_UP(CSK_BIT_LEN, 32)
  76. static ssize_t
  77. show_canceled_csk(struct device *dev, u32 addr, char *buf)
  78. {
  79. unsigned int i, stride, size = CSK_32ARRAY_SIZE * sizeof(u32);
  80. struct m10bmc_sec *sec = dev_get_drvdata(dev);
  81. DECLARE_BITMAP(csk_map, CSK_BIT_LEN);
  82. __le32 csk_le32[CSK_32ARRAY_SIZE];
  83. u32 csk32[CSK_32ARRAY_SIZE];
  84. int ret;
  85. stride = regmap_get_reg_stride(sec->m10bmc->regmap);
  86. if (size % stride) {
  87. dev_err(sec->dev,
  88. "CSK vector size (0x%x) not aligned to stride (0x%x)\n",
  89. size, stride);
  90. WARN_ON_ONCE(1);
  91. return -EINVAL;
  92. }
  93. ret = regmap_bulk_read(sec->m10bmc->regmap, addr, csk_le32,
  94. size / stride);
  95. if (ret) {
  96. dev_err(sec->dev, "failed to read CSK vector: %x cnt %x: %d\n",
  97. addr, size / stride, ret);
  98. return ret;
  99. }
  100. for (i = 0; i < CSK_32ARRAY_SIZE; i++)
  101. csk32[i] = le32_to_cpu(((csk_le32[i])));
  102. bitmap_from_arr32(csk_map, csk32, CSK_BIT_LEN);
  103. bitmap_complement(csk_map, csk_map, CSK_BIT_LEN);
  104. return bitmap_print_to_pagebuf(1, buf, csk_map, CSK_BIT_LEN);
  105. }
  106. #define DEVICE_ATTR_SEC_CSK_RO(_name, _addr) \
  107. static ssize_t _name##_canceled_csks_show(struct device *dev, \
  108. struct device_attribute *attr, \
  109. char *buf) \
  110. { return show_canceled_csk(dev, _addr, buf); } \
  111. static DEVICE_ATTR_RO(_name##_canceled_csks)
  112. #define CSK_VEC_OFFSET 0x34
  113. DEVICE_ATTR_SEC_CSK_RO(bmc, BMC_PROG_ADDR + CSK_VEC_OFFSET);
  114. DEVICE_ATTR_SEC_CSK_RO(sr, SR_PROG_ADDR + CSK_VEC_OFFSET);
  115. DEVICE_ATTR_SEC_CSK_RO(pr, PR_PROG_ADDR + CSK_VEC_OFFSET);
  116. #define FLASH_COUNT_SIZE 4096 /* count stored as inverted bit vector */
  117. static ssize_t flash_count_show(struct device *dev,
  118. struct device_attribute *attr, char *buf)
  119. {
  120. struct m10bmc_sec *sec = dev_get_drvdata(dev);
  121. unsigned int stride, num_bits;
  122. u8 *flash_buf;
  123. int cnt, ret;
  124. stride = regmap_get_reg_stride(sec->m10bmc->regmap);
  125. num_bits = FLASH_COUNT_SIZE * 8;
  126. if (FLASH_COUNT_SIZE % stride) {
  127. dev_err(sec->dev,
  128. "FLASH_COUNT_SIZE (0x%x) not aligned to stride (0x%x)\n",
  129. FLASH_COUNT_SIZE, stride);
  130. WARN_ON_ONCE(1);
  131. return -EINVAL;
  132. }
  133. flash_buf = kmalloc(FLASH_COUNT_SIZE, GFP_KERNEL);
  134. if (!flash_buf)
  135. return -ENOMEM;
  136. ret = regmap_bulk_read(sec->m10bmc->regmap, STAGING_FLASH_COUNT,
  137. flash_buf, FLASH_COUNT_SIZE / stride);
  138. if (ret) {
  139. dev_err(sec->dev,
  140. "failed to read flash count: %x cnt %x: %d\n",
  141. STAGING_FLASH_COUNT, FLASH_COUNT_SIZE / stride, ret);
  142. goto exit_free;
  143. }
  144. cnt = num_bits - bitmap_weight((unsigned long *)flash_buf, num_bits);
  145. exit_free:
  146. kfree(flash_buf);
  147. return ret ? : sysfs_emit(buf, "%u\n", cnt);
  148. }
  149. static DEVICE_ATTR_RO(flash_count);
  150. static struct attribute *m10bmc_security_attrs[] = {
  151. &dev_attr_flash_count.attr,
  152. &dev_attr_bmc_root_entry_hash.attr,
  153. &dev_attr_sr_root_entry_hash.attr,
  154. &dev_attr_pr_root_entry_hash.attr,
  155. &dev_attr_sr_canceled_csks.attr,
  156. &dev_attr_pr_canceled_csks.attr,
  157. &dev_attr_bmc_canceled_csks.attr,
  158. NULL,
  159. };
  160. static struct attribute_group m10bmc_security_attr_group = {
  161. .name = "security",
  162. .attrs = m10bmc_security_attrs,
  163. };
  164. static const struct attribute_group *m10bmc_sec_attr_groups[] = {
  165. &m10bmc_security_attr_group,
  166. NULL,
  167. };
  168. static void log_error_regs(struct m10bmc_sec *sec, u32 doorbell)
  169. {
  170. u32 auth_result;
  171. dev_err(sec->dev, "RSU error status: 0x%08x\n", doorbell);
  172. if (!m10bmc_sys_read(sec->m10bmc, M10BMC_AUTH_RESULT, &auth_result))
  173. dev_err(sec->dev, "RSU auth result: 0x%08x\n", auth_result);
  174. }
  175. static enum fw_upload_err rsu_check_idle(struct m10bmc_sec *sec)
  176. {
  177. u32 doorbell;
  178. int ret;
  179. ret = m10bmc_sys_read(sec->m10bmc, M10BMC_DOORBELL, &doorbell);
  180. if (ret)
  181. return FW_UPLOAD_ERR_RW_ERROR;
  182. if (rsu_prog(doorbell) != RSU_PROG_IDLE &&
  183. rsu_prog(doorbell) != RSU_PROG_RSU_DONE) {
  184. log_error_regs(sec, doorbell);
  185. return FW_UPLOAD_ERR_BUSY;
  186. }
  187. return FW_UPLOAD_ERR_NONE;
  188. }
  189. static inline bool rsu_start_done(u32 doorbell)
  190. {
  191. u32 status, progress;
  192. if (doorbell & DRBL_RSU_REQUEST)
  193. return false;
  194. status = rsu_stat(doorbell);
  195. if (status == RSU_STAT_ERASE_FAIL || status == RSU_STAT_WEAROUT)
  196. return true;
  197. progress = rsu_prog(doorbell);
  198. if (progress != RSU_PROG_IDLE && progress != RSU_PROG_RSU_DONE)
  199. return true;
  200. return false;
  201. }
  202. static enum fw_upload_err rsu_update_init(struct m10bmc_sec *sec)
  203. {
  204. u32 doorbell, status;
  205. int ret;
  206. ret = regmap_update_bits(sec->m10bmc->regmap,
  207. M10BMC_SYS_BASE + M10BMC_DOORBELL,
  208. DRBL_RSU_REQUEST | DRBL_HOST_STATUS,
  209. DRBL_RSU_REQUEST |
  210. FIELD_PREP(DRBL_HOST_STATUS,
  211. HOST_STATUS_IDLE));
  212. if (ret)
  213. return FW_UPLOAD_ERR_RW_ERROR;
  214. ret = regmap_read_poll_timeout(sec->m10bmc->regmap,
  215. M10BMC_SYS_BASE + M10BMC_DOORBELL,
  216. doorbell,
  217. rsu_start_done(doorbell),
  218. NIOS_HANDSHAKE_INTERVAL_US,
  219. NIOS_HANDSHAKE_TIMEOUT_US);
  220. if (ret == -ETIMEDOUT) {
  221. log_error_regs(sec, doorbell);
  222. return FW_UPLOAD_ERR_TIMEOUT;
  223. } else if (ret) {
  224. return FW_UPLOAD_ERR_RW_ERROR;
  225. }
  226. status = rsu_stat(doorbell);
  227. if (status == RSU_STAT_WEAROUT) {
  228. dev_warn(sec->dev, "Excessive flash update count detected\n");
  229. return FW_UPLOAD_ERR_WEAROUT;
  230. } else if (status == RSU_STAT_ERASE_FAIL) {
  231. log_error_regs(sec, doorbell);
  232. return FW_UPLOAD_ERR_HW_ERROR;
  233. }
  234. return FW_UPLOAD_ERR_NONE;
  235. }
  236. static enum fw_upload_err rsu_prog_ready(struct m10bmc_sec *sec)
  237. {
  238. unsigned long poll_timeout;
  239. u32 doorbell, progress;
  240. int ret;
  241. ret = m10bmc_sys_read(sec->m10bmc, M10BMC_DOORBELL, &doorbell);
  242. if (ret)
  243. return FW_UPLOAD_ERR_RW_ERROR;
  244. poll_timeout = jiffies + msecs_to_jiffies(RSU_PREP_TIMEOUT_MS);
  245. while (rsu_prog(doorbell) == RSU_PROG_PREPARE) {
  246. msleep(RSU_PREP_INTERVAL_MS);
  247. if (time_after(jiffies, poll_timeout))
  248. break;
  249. ret = m10bmc_sys_read(sec->m10bmc, M10BMC_DOORBELL, &doorbell);
  250. if (ret)
  251. return FW_UPLOAD_ERR_RW_ERROR;
  252. }
  253. progress = rsu_prog(doorbell);
  254. if (progress == RSU_PROG_PREPARE) {
  255. log_error_regs(sec, doorbell);
  256. return FW_UPLOAD_ERR_TIMEOUT;
  257. } else if (progress != RSU_PROG_READY) {
  258. log_error_regs(sec, doorbell);
  259. return FW_UPLOAD_ERR_HW_ERROR;
  260. }
  261. return FW_UPLOAD_ERR_NONE;
  262. }
  263. static enum fw_upload_err rsu_send_data(struct m10bmc_sec *sec)
  264. {
  265. u32 doorbell;
  266. int ret;
  267. ret = regmap_update_bits(sec->m10bmc->regmap,
  268. M10BMC_SYS_BASE + M10BMC_DOORBELL,
  269. DRBL_HOST_STATUS,
  270. FIELD_PREP(DRBL_HOST_STATUS,
  271. HOST_STATUS_WRITE_DONE));
  272. if (ret)
  273. return FW_UPLOAD_ERR_RW_ERROR;
  274. ret = regmap_read_poll_timeout(sec->m10bmc->regmap,
  275. M10BMC_SYS_BASE + M10BMC_DOORBELL,
  276. doorbell,
  277. rsu_prog(doorbell) != RSU_PROG_READY,
  278. NIOS_HANDSHAKE_INTERVAL_US,
  279. NIOS_HANDSHAKE_TIMEOUT_US);
  280. if (ret == -ETIMEDOUT) {
  281. log_error_regs(sec, doorbell);
  282. return FW_UPLOAD_ERR_TIMEOUT;
  283. } else if (ret) {
  284. return FW_UPLOAD_ERR_RW_ERROR;
  285. }
  286. switch (rsu_stat(doorbell)) {
  287. case RSU_STAT_NORMAL:
  288. case RSU_STAT_NIOS_OK:
  289. case RSU_STAT_USER_OK:
  290. case RSU_STAT_FACTORY_OK:
  291. break;
  292. default:
  293. log_error_regs(sec, doorbell);
  294. return FW_UPLOAD_ERR_HW_ERROR;
  295. }
  296. return FW_UPLOAD_ERR_NONE;
  297. }
  298. static int rsu_check_complete(struct m10bmc_sec *sec, u32 *doorbell)
  299. {
  300. if (m10bmc_sys_read(sec->m10bmc, M10BMC_DOORBELL, doorbell))
  301. return -EIO;
  302. switch (rsu_stat(*doorbell)) {
  303. case RSU_STAT_NORMAL:
  304. case RSU_STAT_NIOS_OK:
  305. case RSU_STAT_USER_OK:
  306. case RSU_STAT_FACTORY_OK:
  307. break;
  308. default:
  309. return -EINVAL;
  310. }
  311. switch (rsu_prog(*doorbell)) {
  312. case RSU_PROG_IDLE:
  313. case RSU_PROG_RSU_DONE:
  314. return 0;
  315. case RSU_PROG_AUTHENTICATING:
  316. case RSU_PROG_COPYING:
  317. case RSU_PROG_UPDATE_CANCEL:
  318. case RSU_PROG_PROGRAM_KEY_HASH:
  319. return -EAGAIN;
  320. default:
  321. return -EINVAL;
  322. }
  323. }
  324. static enum fw_upload_err rsu_cancel(struct m10bmc_sec *sec)
  325. {
  326. u32 doorbell;
  327. int ret;
  328. ret = m10bmc_sys_read(sec->m10bmc, M10BMC_DOORBELL, &doorbell);
  329. if (ret)
  330. return FW_UPLOAD_ERR_RW_ERROR;
  331. if (rsu_prog(doorbell) != RSU_PROG_READY)
  332. return FW_UPLOAD_ERR_BUSY;
  333. ret = regmap_update_bits(sec->m10bmc->regmap,
  334. M10BMC_SYS_BASE + M10BMC_DOORBELL,
  335. DRBL_HOST_STATUS,
  336. FIELD_PREP(DRBL_HOST_STATUS,
  337. HOST_STATUS_ABORT_RSU));
  338. if (ret)
  339. return FW_UPLOAD_ERR_RW_ERROR;
  340. return FW_UPLOAD_ERR_CANCELED;
  341. }
  342. static enum fw_upload_err m10bmc_sec_prepare(struct fw_upload *fwl,
  343. const u8 *data, u32 size)
  344. {
  345. struct m10bmc_sec *sec = fwl->dd_handle;
  346. u32 ret;
  347. sec->cancel_request = false;
  348. if (!size || size > M10BMC_STAGING_SIZE)
  349. return FW_UPLOAD_ERR_INVALID_SIZE;
  350. ret = rsu_check_idle(sec);
  351. if (ret != FW_UPLOAD_ERR_NONE)
  352. return ret;
  353. ret = rsu_update_init(sec);
  354. if (ret != FW_UPLOAD_ERR_NONE)
  355. return ret;
  356. ret = rsu_prog_ready(sec);
  357. if (ret != FW_UPLOAD_ERR_NONE)
  358. return ret;
  359. if (sec->cancel_request)
  360. return rsu_cancel(sec);
  361. return FW_UPLOAD_ERR_NONE;
  362. }
  363. #define WRITE_BLOCK_SIZE 0x4000 /* Default write-block size is 0x4000 bytes */
  364. static enum fw_upload_err m10bmc_sec_write(struct fw_upload *fwl, const u8 *data,
  365. u32 offset, u32 size, u32 *written)
  366. {
  367. struct m10bmc_sec *sec = fwl->dd_handle;
  368. u32 blk_size, doorbell, extra_offset;
  369. unsigned int stride, extra = 0;
  370. int ret;
  371. stride = regmap_get_reg_stride(sec->m10bmc->regmap);
  372. if (sec->cancel_request)
  373. return rsu_cancel(sec);
  374. ret = m10bmc_sys_read(sec->m10bmc, M10BMC_DOORBELL, &doorbell);
  375. if (ret) {
  376. return FW_UPLOAD_ERR_RW_ERROR;
  377. } else if (rsu_prog(doorbell) != RSU_PROG_READY) {
  378. log_error_regs(sec, doorbell);
  379. return FW_UPLOAD_ERR_HW_ERROR;
  380. }
  381. WARN_ON_ONCE(WRITE_BLOCK_SIZE % stride);
  382. blk_size = min_t(u32, WRITE_BLOCK_SIZE, size);
  383. ret = regmap_bulk_write(sec->m10bmc->regmap,
  384. M10BMC_STAGING_BASE + offset,
  385. (void *)data + offset,
  386. blk_size / stride);
  387. if (ret)
  388. return FW_UPLOAD_ERR_RW_ERROR;
  389. /*
  390. * If blk_size is not aligned to stride, then handle the extra
  391. * bytes with regmap_write.
  392. */
  393. if (blk_size % stride) {
  394. extra_offset = offset + ALIGN_DOWN(blk_size, stride);
  395. memcpy(&extra, (u8 *)(data + extra_offset), blk_size % stride);
  396. ret = regmap_write(sec->m10bmc->regmap,
  397. M10BMC_STAGING_BASE + extra_offset, extra);
  398. if (ret)
  399. return FW_UPLOAD_ERR_RW_ERROR;
  400. }
  401. *written = blk_size;
  402. return FW_UPLOAD_ERR_NONE;
  403. }
  404. static enum fw_upload_err m10bmc_sec_poll_complete(struct fw_upload *fwl)
  405. {
  406. struct m10bmc_sec *sec = fwl->dd_handle;
  407. unsigned long poll_timeout;
  408. u32 doorbell, result;
  409. int ret;
  410. if (sec->cancel_request)
  411. return rsu_cancel(sec);
  412. result = rsu_send_data(sec);
  413. if (result != FW_UPLOAD_ERR_NONE)
  414. return result;
  415. poll_timeout = jiffies + msecs_to_jiffies(RSU_COMPLETE_TIMEOUT_MS);
  416. do {
  417. msleep(RSU_COMPLETE_INTERVAL_MS);
  418. ret = rsu_check_complete(sec, &doorbell);
  419. } while (ret == -EAGAIN && !time_after(jiffies, poll_timeout));
  420. if (ret == -EAGAIN) {
  421. log_error_regs(sec, doorbell);
  422. return FW_UPLOAD_ERR_TIMEOUT;
  423. } else if (ret == -EIO) {
  424. return FW_UPLOAD_ERR_RW_ERROR;
  425. } else if (ret) {
  426. log_error_regs(sec, doorbell);
  427. return FW_UPLOAD_ERR_HW_ERROR;
  428. }
  429. return FW_UPLOAD_ERR_NONE;
  430. }
  431. /*
  432. * m10bmc_sec_cancel() may be called asynchronously with an on-going update.
  433. * All other functions are called sequentially in a single thread. To avoid
  434. * contention on register accesses, m10bmc_sec_cancel() must only update
  435. * the cancel_request flag. Other functions will check this flag and handle
  436. * the cancel request synchronously.
  437. */
  438. static void m10bmc_sec_cancel(struct fw_upload *fwl)
  439. {
  440. struct m10bmc_sec *sec = fwl->dd_handle;
  441. sec->cancel_request = true;
  442. }
  443. static void m10bmc_sec_cleanup(struct fw_upload *fwl)
  444. {
  445. struct m10bmc_sec *sec = fwl->dd_handle;
  446. (void)rsu_cancel(sec);
  447. }
  448. static const struct fw_upload_ops m10bmc_ops = {
  449. .prepare = m10bmc_sec_prepare,
  450. .write = m10bmc_sec_write,
  451. .poll_complete = m10bmc_sec_poll_complete,
  452. .cancel = m10bmc_sec_cancel,
  453. .cleanup = m10bmc_sec_cleanup,
  454. };
  455. #define SEC_UPDATE_LEN_MAX 32
  456. static int m10bmc_sec_probe(struct platform_device *pdev)
  457. {
  458. char buf[SEC_UPDATE_LEN_MAX];
  459. struct m10bmc_sec *sec;
  460. struct fw_upload *fwl;
  461. unsigned int len;
  462. int ret;
  463. sec = devm_kzalloc(&pdev->dev, sizeof(*sec), GFP_KERNEL);
  464. if (!sec)
  465. return -ENOMEM;
  466. sec->dev = &pdev->dev;
  467. sec->m10bmc = dev_get_drvdata(pdev->dev.parent);
  468. dev_set_drvdata(&pdev->dev, sec);
  469. ret = xa_alloc(&fw_upload_xa, &sec->fw_name_id, sec,
  470. xa_limit_32b, GFP_KERNEL);
  471. if (ret)
  472. return ret;
  473. len = scnprintf(buf, SEC_UPDATE_LEN_MAX, "secure-update%d",
  474. sec->fw_name_id);
  475. sec->fw_name = kmemdup_nul(buf, len, GFP_KERNEL);
  476. if (!sec->fw_name) {
  477. ret = -ENOMEM;
  478. goto fw_name_fail;
  479. }
  480. fwl = firmware_upload_register(THIS_MODULE, sec->dev, sec->fw_name,
  481. &m10bmc_ops, sec);
  482. if (IS_ERR(fwl)) {
  483. dev_err(sec->dev, "Firmware Upload driver failed to start\n");
  484. ret = PTR_ERR(fwl);
  485. goto fw_uploader_fail;
  486. }
  487. sec->fwl = fwl;
  488. return 0;
  489. fw_uploader_fail:
  490. kfree(sec->fw_name);
  491. fw_name_fail:
  492. xa_erase(&fw_upload_xa, sec->fw_name_id);
  493. return ret;
  494. }
  495. static int m10bmc_sec_remove(struct platform_device *pdev)
  496. {
  497. struct m10bmc_sec *sec = dev_get_drvdata(&pdev->dev);
  498. firmware_upload_unregister(sec->fwl);
  499. kfree(sec->fw_name);
  500. xa_erase(&fw_upload_xa, sec->fw_name_id);
  501. return 0;
  502. }
  503. static const struct platform_device_id intel_m10bmc_sec_ids[] = {
  504. {
  505. .name = "n3000bmc-sec-update",
  506. },
  507. {
  508. .name = "d5005bmc-sec-update",
  509. },
  510. { }
  511. };
  512. MODULE_DEVICE_TABLE(platform, intel_m10bmc_sec_ids);
  513. static struct platform_driver intel_m10bmc_sec_driver = {
  514. .probe = m10bmc_sec_probe,
  515. .remove = m10bmc_sec_remove,
  516. .driver = {
  517. .name = "intel-m10bmc-sec-update",
  518. .dev_groups = m10bmc_sec_attr_groups,
  519. },
  520. .id_table = intel_m10bmc_sec_ids,
  521. };
  522. module_platform_driver(intel_m10bmc_sec_driver);
  523. MODULE_AUTHOR("Intel Corporation");
  524. MODULE_DESCRIPTION("Intel MAX10 BMC Secure Update");
  525. MODULE_LICENSE("GPL");