Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp614926ybc; Sat, 16 Nov 2019 05:40:33 -0800 (PST) X-Google-Smtp-Source: APXvYqzw5JnN0B7GdYpvi6BaEDU7NmjCi2a3cE/NTeMyF925pCA7b11rNC4kEUV4TsX4JLWRs336 X-Received: by 2002:a17:906:b2c7:: with SMTP id cf7mr9576677ejb.218.1573911632956; Sat, 16 Nov 2019 05:40:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573911632; cv=none; d=google.com; s=arc-20160816; b=Aei+rx/MzYvbnZ66j00mx7HYcwpLdftJ/78sOGK773+JBIhW1+4H5EWTgZ315/Ykqg BTGd9RpR/bMtGn0zHCQID+KHYYaZSk0MaKKk1jtOCLvfOcXsiKW1lUMd9hKi7Va5L5Ew NzqjuCzYmHr3b03wLEu255M46QApXlqdv3sKslf0Kl5U0aBh8YnD3JA4S62a7+snA1wq WpF1XQ+izgrJE/wq2JwfpYhBiycvvgNvnMkQuTyv1Xkc+8GF/TwJaLHmuGsD2fNsjQ1h Ry/Ds0fh3vL/jRreQX9VcuWeRyE+W4jcwOQWEY1amT6HBxRzZw1aKkvdMSPhidPfiwWe COgw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=AsllHCr+zPrwLCO4VORmJjYYtylWSuAhJRX34aBh1Ss=; b=GhG42+xAAcWq08ewAY5pAFYxVljF50jyTpdbTt0fbtA0UpIGdgl7iT8/wAHwNGpVbH QqLdV/tuNwAlaamlz4pXA8RRRUXu9Gt6/uZEDaqyKjuUOL4GLkvFXYrUDdLA331l7QOS 6i1RdPZOHso5b58EuCnoJ0qt+B9AxQrABy2GYf+1qyyzsvOJFDojyXXdC3qcZabVar4R DTudmpKpQKjhLLp7i5raX9JUVHe/pDOHzWrsY3iJR25YE/u4csB3KzEs5gUO5k8ip+9H cD4ms6nUTwK2S8Ax/yKIzNfz/eHNtZmq4ZsdCPh/f6M/7tlLlqeOY8rPbdw80k64OFK2 tHng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gfYaKuCi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k13si4001800edj.324.2019.11.16.05.39.32; Sat, 16 Nov 2019 05:40:32 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gfYaKuCi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727611AbfKPNgv (ORCPT + 99 others); Sat, 16 Nov 2019 08:36:51 -0500 Received: from mail.kernel.org ([198.145.29.99]:47496 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727550AbfKPNgv (ORCPT ); Sat, 16 Nov 2019 08:36:51 -0500 Received: from localhost (unknown [84.241.192.145]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E45C4206D4; Sat, 16 Nov 2019 13:36:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573911410; bh=N7e7ejkFZ0oYT6mA483jRqdcw8Rt9UrDJu2/WlCYpWs=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=gfYaKuCi3okMgehQ1BrFT49lXxAk7x0kpXGuBflFO2QzX1M2B9UySxO6hxlgL0xNF vRkjFHW2LH1kl9L4D0s4IVbn4g5CGLjov7Ylo5GpmJeOLiYRHJNP6DlPjayPXSbwUk 0bHsItqP2OLqVfChwoOgvAoq1T6rt9aACICDvi9Y= Date: Sat, 16 Nov 2019 14:36:47 +0100 From: Greg Kroah-Hartman To: patrick.rudolph@9elements.com Cc: linux-kernel@vger.kernel.org, coreboot@coreboot.org, Thomas Gleixner , Alexios Zavras , Allison Randal , Stephen Boyd , Julius Werner , Samuel Holland Subject: Re: [PATCH 1/2] firmware: google: Expose CBMEM over sysfs Message-ID: <20191116133647.GA454551@kroah.com> References: <20191115161524.23738-1-patrick.rudolph@9elements.com> <20191115161524.23738-2-patrick.rudolph@9elements.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191115161524.23738-2-patrick.rudolph@9elements.com> User-Agent: Mutt/1.12.2 (2019-09-21) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Nov 15, 2019 at 05:15:15PM +0100, patrick.rudolph@9elements.com wrote: > From: Patrick Rudolph > > Make all CBMEM buffers available to userland. This is useful for tools > that are currently using /dev/mem. > > Make the id, size and address available, as well as the raw table data. > > Tools can easily scan the right CBMEM buffer by reading > /sys/bus/coreboot/drivers/cbmem/coreboot*/cbmem_attributes/id > The binary table data can then be read from > /sys/bus/coreboot/drivers/cbmem/coreboot*/cbmem_attributes/data > > Signed-off-by: Patrick Rudolph > --- > drivers/firmware/google/Kconfig | 9 ++ > drivers/firmware/google/Makefile | 1 + > drivers/firmware/google/cbmem-coreboot.c | 162 +++++++++++++++++++++++ > drivers/firmware/google/coreboot_table.h | 13 ++ > 4 files changed, 185 insertions(+) > create mode 100644 drivers/firmware/google/cbmem-coreboot.c As Stephen said, you have to document new sysfs attributes (or changes or removals) in Documentation/ABI so we have a clue as to how to review these changes to see if they match the code or not. Please do so and resend the series with that addition and we will be glad to review. thanks, greg k-h