From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.9 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id E4E62CA9EB7 for ; Tue, 22 Oct 2019 23:38:43 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id BB99B2064B for ; Tue, 22 Oct 2019 23:38:43 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=ellerman.id.au header.i=@ellerman.id.au header.b="iJS0BO5Z" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389763AbfJVXim (ORCPT ); Tue, 22 Oct 2019 19:38:42 -0400 Received: from bilbo.ozlabs.org ([203.11.71.1]:35347 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732854AbfJVXim (ORCPT ); Tue, 22 Oct 2019 19:38:42 -0400 Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 46yVM30KZ7z9sP3; Wed, 23 Oct 2019 10:38:39 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ellerman.id.au; s=201909; t=1571787519; bh=ami4f9vYKglFSg2kDdmqUNRGc0PgB16FBNgszZYiGT8=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=iJS0BO5Zt/5UnZpboy9Fexepcv5UxfOTmUBHzEbwB/BblzxTYNspikCD5UaCMR91e f15rhAPDNUBW6y4Tor1tzB4i77fVRALpb+PgigrOTkMVHa+fLDz6+teRjwks8R2K4H BA3jub/ckFJsXyIIybAF0gIbX7nsDILWm6ncQ4PGN6N0MSZ2C1r69Aj3sigiDO+5h7 MsBi7VOWstM54ck9npR7g7Wfo7iru0Ovs8QwCVdCbtR4OyLbOlonmHCazRoiHaeLeO p6OcrSNJoTAmwzTF55V8Tax4wHJ1+SWFIfY/bWTPzDZFBdJDXxofABlAUaB2BijTsE nJNwdofapNTKw== From: Michael Ellerman To: Nayna Jain , linuxppc-dev@ozlabs.org, linux-efi@vger.kernel.org, linux-integrity@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Benjamin Herrenschmidt , Paul Mackerras , Ard Biesheuvel , Jeremy Kerr , Matthew Garret , Mimi Zohar , Greg Kroah-Hartman , Claudio Carvalho , George Wilson , Elaine Palmer , Eric Ricther , Oliver O'Halloran , Nayna Jain , Prakhar Srivastava , Lakshmi Ramasubramanian Subject: Re: [PATCH v8 3/8] powerpc: detect the trusted boot state of the system In-Reply-To: <1571508377-23603-4-git-send-email-nayna@linux.ibm.com> References: <1571508377-23603-1-git-send-email-nayna@linux.ibm.com> <1571508377-23603-4-git-send-email-nayna@linux.ibm.com> Date: Wed, 23 Oct 2019 10:38:38 +1100 Message-ID: <87wocw5p1d.fsf@mpe.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Nayna Jain writes: > diff --git a/arch/powerpc/kernel/secure_boot.c b/arch/powerpc/kernel/secure_boot.c > index 99bba7915629..9753470ab08a 100644 > --- a/arch/powerpc/kernel/secure_boot.c > +++ b/arch/powerpc/kernel/secure_boot.c > @@ -28,3 +39,16 @@ bool is_ppc_secureboot_enabled(void) > pr_info("Secure boot mode %s\n", enabled ? "enabled" : "disabled"); > return enabled; > } > + > +bool is_ppc_trustedboot_enabled(void) > +{ > + struct device_node *node; > + bool enabled = false; > + > + node = get_ppc_fw_sb_node(); > + enabled = of_property_read_bool(node, "trusted-enabled"); Also here you need: of_node_put(node); > + > + pr_info("Trusted boot mode %s\n", enabled ? "enabled" : "disabled"); > + > + return enabled; > +} cheers