Hi Greg, please consider these patches for inclusion into 5.14. Russ' changes introduce a new framework that enables secure updates of FPGA devices boot configuration by interacting with the secure HW engine. The use cases for the FPGA Security Manager which deals with the update of the permanent image for the FPGA device do not overlap enough with the FPGA Manage use case (runtime updates of the currently loaded image) to warrant a tighter coupling. Its first user is m10bmc-sec driver supporting the Intel MAX 10 BMC device. Thanks, Moritz Russ Weight (12): fpga: sec-mgr: fpga security manager class driver fpga: sec-mgr: enable secure updates fpga: sec-mgr: expose sec-mgr update status fpga: sec-mgr: expose sec-mgr update errors fpga: sec-mgr: expose sec-mgr update size fpga: sec-mgr: enable cancel of secure update fpga: sec-mgr: expose hardware error info fpga: m10bmc-sec: create max10 bmc secure update driver fpga: m10bmc-sec: expose max10 flash update count fpga: m10bmc-sec: expose max10 canceled keys in sysfs fpga: m10bmc-sec: add max10 secure update functions fpga: m10bmc-sec: add max10 get_hw_errinfo callback func .../ABI/testing/sysfs-class-fpga-sec-mgr | 81 +++ .../testing/sysfs-driver-intel-m10-bmc-secure | 61 ++ Documentation/fpga/fpga-sec-mgr.rst | 44 ++ Documentation/fpga/index.rst | 1 + MAINTAINERS | 11 + drivers/fpga/Kconfig | 20 + drivers/fpga/Makefile | 6 + drivers/fpga/fpga-sec-mgr.c | 648 ++++++++++++++++++ drivers/fpga/intel-m10-bmc-secure.c | 550 +++++++++++++++ include/linux/fpga/fpga-sec-mgr.h | 99 +++ 10 files changed, 1521 insertions(+) create mode 100644 Documentation/ABI/testing/sysfs-class-fpga-sec-mgr create mode 100644 Documentation/ABI/testing/sysfs-driver-intel-m10-bmc-secure create mode 100644 Documentation/fpga/fpga-sec-mgr.rst create mode 100644 drivers/fpga/fpga-sec-mgr.c create mode 100644 drivers/fpga/intel-m10-bmc-secure.c create mode 100644 include/linux/fpga/fpga-sec-mgr.h -- 2.31.1