Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp6747616ybc; Thu, 28 Nov 2019 04:53:13 -0800 (PST) X-Google-Smtp-Source: APXvYqwZxcEClDcmy7fOqo23/MnbwL38ozY0nYvNZa1CfCElHjsgCmlc+fzkg243F5FZx/ZBjvO5 X-Received: by 2002:a50:f299:: with SMTP id f25mr6211937edm.280.1574945593316; Thu, 28 Nov 2019 04:53:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574945593; cv=none; d=google.com; s=arc-20160816; b=QJQMYz8fYY/eOLN+s33xliabC3L0FQLQhIv7dVPRcTS+dPsJoKBUqJcRk1ePmtzPBp Twlp69orI/lHVUMuwFtEH36z42isRqEuwIfHd2wpW7abRou55BZpcn6alNY+8elGN6eQ S5GTTLxeCZQ1kesRaxNmq2F7nhEW0D1mRlUP6L4wJGOMJhYiR0mVFI7DF3e4DadbFAEJ 9An14oR5sAJaKzJY1PiIiT5dFboj/GAMxM51hvMO4f9+79sYUTPBP/CVBOsZMPjvSeBD uy3mVrQ5M+Y3xcXb42NTUeoaq6gC74lOMeRDaA+RfSiHfLXNWKuzpKJTmMJijn+Tc5po Hlvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=q0QefnKGlT6lTSYC6pwMuJFWL2vfoXdiJLSgkpnVlPc=; b=xxpmpFQIKQs5I4z/OdgSh88JGMmLLrJ5Bh1u7+Ho7o5SHRwVTY7o9jwBatlHJLGxuZ +KNNBpKJ3Onn2iBJiKtviKTLD6/c6Dv4k0FA/+5FZAnvNPMWUAXlo66UKxbb1r1jSjye Wn/QSIIDFR043uvPomsQ4aJxzrQHRsl+NlKj5W0jQRjGT/YCApsnWvM44F2ksjlFa+sZ WPt8GrIsCFhwxaqBxHdV0AfHpIrTh8iKIrih/75w2iot+oEoZKe/NYMMsk/5yf6dW4by dyKMYW2rGc1bD+q+g3XQj8/mAQqVTP+qSY6+COadjcPIqFuGH2LDNJyTfNdo3kf3EUGx ERdQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@9elements.com header.s=google header.b=atV9f1e9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=9elements.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m15si11206824ejk.320.2019.11.28.04.52.49; Thu, 28 Nov 2019 04:53:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@9elements.com header.s=google header.b=atV9f1e9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=9elements.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726610AbfK1Mvd (ORCPT + 99 others); Thu, 28 Nov 2019 07:51:33 -0500 Received: from mail-wr1-f65.google.com ([209.85.221.65]:37393 "EHLO mail-wr1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726227AbfK1Mvc (ORCPT ); Thu, 28 Nov 2019 07:51:32 -0500 Received: by mail-wr1-f65.google.com with SMTP id w15so12314wru.4 for ; Thu, 28 Nov 2019 04:51:29 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=9elements.com; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=q0QefnKGlT6lTSYC6pwMuJFWL2vfoXdiJLSgkpnVlPc=; b=atV9f1e9MlP4646ZOATifVtNxEccamHGqWPkFMyWjYF3Yj2XCQMM0gWxrlVloPwlkA EeeftgyUKORLg8t4KU2V55JK6IitH9Xltgwg8S2cHAuWmqPKnPAd8UPHmAYcJfuuZPyZ YXiPbU3jBfJekIhwllBeT7DiX6sQF9TENslkPwEbYryq8GSXnEcuW++xozmPpYX9+44O rBzIp+/kMojbT5cE0pXF/Z4YcILqG71Wz3ikuNAEf4hQ4l/hcN/CPzTxb13worv9qcow etySmG5kesMxDVdDf/nzbIbrD3RMKzM2A59UxV8BQOpHGQ+2UdnaSilHyd6wWW1dDrSn nl8A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=q0QefnKGlT6lTSYC6pwMuJFWL2vfoXdiJLSgkpnVlPc=; b=lgqt3GAtfJIjpwjDVWTqjYexd9X9/HCCpl0hOG/AhjWA1ZHsus0LneKd41ynmQJ9Ny R8yNEKXR6UBhdgf/yNGWhREt4zbQjFEWeyGzK9LhirLyAKImUPAlhYSu2sqc9i/gmLpE aIMnZT6BK8Ix024txCUgo7+89X/ZAd+N2I5t+PBaV9ctpdplRqqvbvYJaxKjbwkdnoaz aB4h4CoPj+LQ+hBwSYfGCrSpXXykeg8Xoq3gXUAYw8c4VO0bbsScA11lV9QHj9sDWUV5 UWqKlDKAWw7hOzwJL4sjNFyeJVEUACMNJ1dRFdY1eepZqDoW5LS+2DojjsNj7w3ebayY SQtg== X-Gm-Message-State: APjAAAUC26mYA5CMWubFp03w1IV7xZpNueP0itKr6hC57pLhyHydP3NC SAK+KJxPyZUfx2ovpDzW85c7wtacpOJfnQ== X-Received: by 2002:a5d:5284:: with SMTP id c4mr10558548wrv.376.1574945488448; Thu, 28 Nov 2019 04:51:28 -0800 (PST) Received: from rudolphp.sr1.9esec.dev (b2b-78-94-0-50.unitymedia.biz. [78.94.0.50]) by smtp.gmail.com with ESMTPSA id j11sm22959607wrq.26.2019.11.28.04.51.27 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 28 Nov 2019 04:51:27 -0800 (PST) From: patrick.rudolph@9elements.com To: linux-kernel@vger.kernel.org Cc: Patrick Rudolph , Thomas Gleixner , Greg Kroah-Hartman , Alexios Zavras , Allison Randal , Stephen Boyd , Julius Werner , Samuel Holland Subject: [PATCH v3 0/2] firmware: google: Expose coreboot tables and CBMEM Date: Thu, 28 Nov 2019 13:50:49 +0100 Message-Id: <20191128125100.14291-1-patrick.rudolph@9elements.com> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Patrick Rudolph As user land tools currently use /dev/mem to access coreboot tables and CBMEM, provide a better way by using read-only sysfs attributes. Unconditionally expose all tables and buffers making future changes in coreboot possible without modifying a kernel driver. Changes in v2: - Add ABI documentation - Add 0x prefix on hex values - Remove wrong ioremap hint as found by CI Changes in v3: - Use BIN_ATTR_RO Patrick Rudolph (2): firmware: google: Expose CBMEM over sysfs firmware: google: Expose coreboot tables over sysfs Patrick Rudolph (2): firmware: google: Expose CBMEM over sysfs firmware: google: Expose coreboot tables over sysfs Documentation/ABI/stable/sysfs-bus-coreboot | 73 +++++++++ drivers/firmware/google/Kconfig | 9 ++ drivers/firmware/google/Makefile | 1 + drivers/firmware/google/cbmem-coreboot.c | 159 ++++++++++++++++++++ drivers/firmware/google/coreboot_table.c | 57 +++++++ drivers/firmware/google/coreboot_table.h | 13 ++ 6 files changed, 312 insertions(+) create mode 100644 Documentation/ABI/stable/sysfs-bus-coreboot create mode 100644 drivers/firmware/google/cbmem-coreboot.c -- 2.21.0