From patchwork Wed Apr 27 07:43:51 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Juerg Haefliger X-Patchwork-Id: 566834 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7BD24C433F5 for ; Wed, 27 Apr 2022 07:44:00 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1358982AbiD0HrI (ORCPT ); Wed, 27 Apr 2022 03:47:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53454 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1356434AbiD0HrH (ORCPT ); Wed, 27 Apr 2022 03:47:07 -0400 Received: from smtp-relay-internal-1.canonical.com (smtp-relay-internal-1.canonical.com [185.125.188.123]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 619E7157830 for ; Wed, 27 Apr 2022 00:43:57 -0700 (PDT) Received: from mail-ed1-f69.google.com (mail-ed1-f69.google.com [209.85.208.69]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id CBE823F323 for ; Wed, 27 Apr 2022 07:43:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1651045435; bh=8jXf4hJvUNA7Zgo2Xy9fULH0xSDw50tBXLQ5NxaCPwc=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=tz7EM3y9eXOS59Ku6qCdubLxcdytS+ZWbicKdZj9tB25+63bP6qscCEyoiSU1LLPe jDl2oEPW4WzE0wH3Y8gPToez6f/h056WNAZaeufHG3dJwcVUlhlIqY5Xnm7tftW3SN 11lZKGO1q01/a0/Fp4LShyzfd3T0U4BB4yMHrk8G4dq0GYoR9tBm0c8OXy1cOVRZrn nekSck/hy/Tw4rNO7QQDbZn+LgfyeXp/9xQuYF0uj546kyiHchSUt0zPib0Sj5iR9z HKqJLV8BGVJxnDEuAdvfMSqySMR3Bt9eGC/EpJtkfWFVImS8cz3vu9Up5SJGgh01rT l05+ZSk3qIa5Q== Received: by mail-ed1-f69.google.com with SMTP id c23-20020a50d657000000b00425d5162a0dso530263edj.16 for ; Wed, 27 Apr 2022 00:43:55 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=8jXf4hJvUNA7Zgo2Xy9fULH0xSDw50tBXLQ5NxaCPwc=; b=tsRUjfmxpl+G2CLAYxtVOa3cmA2szhXlbmF6XqQhrSSNqAdRisO7+req9AwrfDrvCe +JQORvTBrRuyjy1w0Cea8HeMX4DrPXKO0U/c7HpNmxlJDXqSqaSxZcy8ZqxG7perarFP +kZK2D/bq4R+8DAPOr3LcYnxvk5UFrFNmAH9HtnQY19lqxVJ8dsqdWqLT6VvJVelmXFN McJJ64tgvPkZKg4bNC465i1P2xbxrGd7gEgRxU7yXbfq1o8BYtZUc5BKL1Mmo7ajejYh e8ML7Qs2BCLVRvxUQyP3VIAmLuQvTZWLSwbpQioXOyv+3XOuS8E+8AvpktBGlt+nvnLs qRDg== X-Gm-Message-State: AOAM532szwin59GZ8m02VCM5nrMfgbZed/Y5Jwi2HdFKm14hRcV/4edt 1x/Ub1rulb2b7W9G4cl4pZP6H7jFmUBNdNKNdkS67hOHV8mAQaYLnR8LkV8SmNuhF4AHe8nbuR6 2qOwrTTTGaXHJkJljc7Nqq+Mm1qF/vckFxJxQ4SMauw== X-Received: by 2002:a05:6402:4305:b0:423:f73b:4dd8 with SMTP id m5-20020a056402430500b00423f73b4dd8mr28872560edc.218.1651045435585; Wed, 27 Apr 2022 00:43:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw9qGwbmj4RQdcIrM402uZX33x1RmjKuotIbf3u96QABOyiSqGny7stvH42Ubp0YmHhK/i+ZQ== X-Received: by 2002:a05:6402:4305:b0:423:f73b:4dd8 with SMTP id m5-20020a056402430500b00423f73b4dd8mr28872550edc.218.1651045435434; Wed, 27 Apr 2022 00:43:55 -0700 (PDT) Received: from gollum.fritz.box ([194.191.244.86]) by smtp.gmail.com with ESMTPSA id q8-20020a056402040800b004227b347ee3sm7902998edv.56.2022.04.27.00.43.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 27 Apr 2022 00:43:55 -0700 (PDT) From: Juerg Haefliger X-Google-Original-From: Juerg Haefliger To: atenart@kernel.org, herbert@gondor.apana.org.au, davem@davemloft.net, linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Juerg Haefliger Subject: [PATCH v2] crypto: inside-secure - Add MODULE_FIRMWARE macros Date: Wed, 27 Apr 2022 09:43:51 +0200 Message-Id: <20220427074351.391580-1-juergh@protonmail.com> X-Mailer: git-send-email 2.32.0 MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org The safexcel module loads firmware so add MODULE_FIRMWARE macros to provide that information via modinfo. Signed-off-by: Juerg Haefliger Acked-by: Antoine Tenart --- v2: Add legacy fallback firmware locations. --- drivers/crypto/inside-secure/safexcel.c | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/drivers/crypto/inside-secure/safexcel.c b/drivers/crypto/inside-secure/safexcel.c index 9ff885d50edf..9b1a158aec29 100644 --- a/drivers/crypto/inside-secure/safexcel.c +++ b/drivers/crypto/inside-secure/safexcel.c @@ -1997,3 +1997,12 @@ MODULE_AUTHOR("Igal Liberman "); MODULE_DESCRIPTION("Support for SafeXcel cryptographic engines: EIP97 & EIP197"); MODULE_LICENSE("GPL v2"); MODULE_IMPORT_NS(CRYPTO_INTERNAL); + +MODULE_FIRMWARE("ifpp.bin"); +MODULE_FIRMWARE("ipue.bin"); +MODULE_FIRMWARE("inside-secure/eip197b/ifpp.bin"); +MODULE_FIRMWARE("inside-secure/eip197b/ipue.bin"); +MODULE_FIRMWARE("inside-secure/eip197d/ifpp.bin"); +MODULE_FIRMWARE("inside-secure/eip197d/ipue.bin"); +MODULE_FIRMWARE("inside-secure/eip197_minifw/ifpp.bin"); +MODULE_FIRMWARE("inside-secure/eip197_minifw/ipue.bin");