mirror of
https://github.com/qemu/qemu.git
synced 2024-12-15 15:33:29 +08:00
hw/cxl: Add dummy security state get
Needed to allow the santize comamnds to be tested with proposed Linux Kernel support. Default value + no control of the security state will work for now. Signed-off-by: Jonathan Cameron <Jonathan.Cameron@huawei.com> Message-Id: <20231023160806.13206-17-Jonathan.Cameron@huawei.com> Reviewed-by: Michael S. Tsirkin <mst@redhat.com> Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
This commit is contained in:
parent
ede604d505
commit
44e4b316e4
@ -73,6 +73,8 @@ enum {
|
||||
SANITIZE = 0x44,
|
||||
#define OVERWRITE 0x0
|
||||
#define SECURE_ERASE 0x1
|
||||
PERSISTENT_MEM = 0x45,
|
||||
#define GET_SECURITY_STATE 0x0
|
||||
MEDIA_AND_POISON = 0x43,
|
||||
#define GET_POISON_LIST 0x0
|
||||
#define INJECT_POISON 0x1
|
||||
@ -886,6 +888,19 @@ static CXLRetCode cmd_sanitize_overwrite(const struct cxl_cmd *cmd,
|
||||
}
|
||||
}
|
||||
|
||||
static CXLRetCode cmd_get_security_state(const struct cxl_cmd *cmd,
|
||||
uint8_t *payload_in,
|
||||
size_t len_in,
|
||||
uint8_t *payload_out,
|
||||
size_t *len_out,
|
||||
CXLCCI *cci)
|
||||
{
|
||||
uint32_t *state = (uint32_t *)payload_out;
|
||||
|
||||
*state = 0;
|
||||
*len_out = 4;
|
||||
return CXL_MBOX_SUCCESS;
|
||||
}
|
||||
/*
|
||||
* This is very inefficient, but good enough for now!
|
||||
* Also the payload will always fit, so no need to handle the MORE flag and
|
||||
@ -1132,6 +1147,8 @@ static const struct cxl_cmd cxl_cmd_set[256][256] = {
|
||||
~0, IMMEDIATE_CONFIG_CHANGE | IMMEDIATE_DATA_CHANGE },
|
||||
[SANITIZE][OVERWRITE] = { "SANITIZE_OVERWRITE", cmd_sanitize_overwrite, 0,
|
||||
IMMEDIATE_DATA_CHANGE | SECURITY_STATE_CHANGE | BACKGROUND_OPERATION },
|
||||
[PERSISTENT_MEM][GET_SECURITY_STATE] = { "GET_SECURITY_STATE",
|
||||
cmd_get_security_state, 0, 0 },
|
||||
[MEDIA_AND_POISON][GET_POISON_LIST] = { "MEDIA_AND_POISON_GET_POISON_LIST",
|
||||
cmd_media_get_poison_list, 16, 0 },
|
||||
[MEDIA_AND_POISON][INJECT_POISON] = { "MEDIA_AND_POISON_INJECT_POISON",
|
||||
|
Loading…
Reference in New Issue
Block a user