Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp4712816pxk; Wed, 30 Sep 2020 09:44:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz2+DOfDU2qis6cWon/N49TzEgqMWuZ15uHj8hfs7mImchdMMW+BUYvWY/+dwy/yDtT/HrS X-Received: by 2002:a17:906:4c4c:: with SMTP id d12mr3552865ejw.491.1601484256299; Wed, 30 Sep 2020 09:44:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601484256; cv=none; d=google.com; s=arc-20160816; b=uQcW3dY0eNeNVGKwShxzCPaKmUJVmrZTuK7UfSr+yQNe5puOrTXQPofSLy1HuTvbUU 8UzZcBkhBD4HYn53yRzUPlgNjO356SRR8GRKh0yi/ZD9AhXR6pSjbX13JUv4FtCeDUDU YlpXUU6diTt940ymdvsruOpM9I1exacWw82svIIe5n9pWU+QfCaZ71+8iZCs1zksQs/b B50Cacg1Y4YGhkMS03UaJfHj049rmNSdFZfCpwjbMd86eN+8NT7M12guU9OE9AVFlv1z yJE/yxeHvxnTh3HZbl8De5TfJLXwatzts6ezUiQffPzzNF7mPCm+YEBY9/5xIcsG5lJe zMtw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=lVLDUENS5HtvTi16CbvdwsaqFFfIVLSej05+iUQc+vs=; b=iTFpddXVKYJPSBdaBznC3S1b5g/3cBNco9OaarH2fr6kOHH9qDc1ZdDzY++m/R23nw ziJL0KlheAvpy7wqN2p0BmGEad/nkchtWLHEXguhvlLuREq088CkWMl6IEappBxRQCUs aC2IiqSgastvKAQjhqHA7vXN/qfMtAIP2LeqNNfET0F67+EHdgMPTbE9rHDyBvb3Kg8G 0TJVo0AcVyTZSsR0T7QUkjH5VTNSn6DEjPS8iYkA6PVIfC8R2qdvPsHmaFMXzFQCJXpX 71GHHadOtyD8+Tms2i+Jn1b2xZVLHj8ld7684R7hg1Eg907FjbFAO3PGaWIUE5MrS5+U IjSw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@eclypsium.com header.s=google header.b=R6nUSnBm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=eclypsium.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dn25si1355882edb.268.2020.09.30.09.43.52; Wed, 30 Sep 2020 09:44:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@eclypsium.com header.s=google header.b=R6nUSnBm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=eclypsium.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728232AbgI3Qmu (ORCPT + 99 others); Wed, 30 Sep 2020 12:42:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53778 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725799AbgI3Qmt (ORCPT ); Wed, 30 Sep 2020 12:42:49 -0400 Received: from mail-qt1-x841.google.com (mail-qt1-x841.google.com [IPv6:2607:f8b0:4864:20::841]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 26BB1C061755 for ; Wed, 30 Sep 2020 09:42:49 -0700 (PDT) Received: by mail-qt1-x841.google.com with SMTP id y11so1707102qtn.9 for ; Wed, 30 Sep 2020 09:42:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=eclypsium.com; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=lVLDUENS5HtvTi16CbvdwsaqFFfIVLSej05+iUQc+vs=; b=R6nUSnBm+5YV02WI9vt2g2rJwl9S/gQZByWVGatI7kdjLOVsZ1p1BEG09Z6FbbT0vy YIafd35emRgBE3TjkG7eTu6QtQSuPkK4WjhaMcLOkb9xt2/Lk+j8ZQAn/kcQmjwJcCmE NnzEsP89x6Gt/O0UsmJG3Bt1K9P360ATyxJ7D5kFxGJtWXA2SXSsoga1UQL7ptNABX2I rNJn+YsPgr6YYBuIfDXQ6FqxgKAOjdmWQLQflvMu3N2N8lGO628lG0HaYfFR+gMmGA2h i/HWNkEok+iMCaEpi4ubdQezKBdITZ1eoAX3wJaYX5ZsXoolumzUS1uKVJylTQ/9rMOb ctSA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=lVLDUENS5HtvTi16CbvdwsaqFFfIVLSej05+iUQc+vs=; b=H/Zs8/nJc+gyN/hvcqBkEf/So82RoCI5F0G3cBFCtbOThrHNsUURJxDAKU9Mt624Eu xdIO7XZ5FKsV1TNBOdnbLhP4AWc2iiccRR6c4L1FJ/N3D0Iyl1iR1yRiEJXZAx5o1dOG gt+pPmRQYn+5IdiYmVTZPE2UqZgp4wMPdw7wygoAdCq4Pa6zqim867lMHQQ7Vc5OG9n3 H58Z6rpQ5HiGWKfHL9Ov3S5ov+EJGj2Y9vnElrgn3qmq316j0XpDSO4NLSPbWCaTvSSS eQqXrF99LNnnbbbzSLo53FT45dqvHqTp+S7dOnFB0JNYwe7Xjt18ueOTg/QvKeSMnJhV ud/Q== X-Gm-Message-State: AOAM533AFgMOFhOR1kL2AuSGolFLts+Gu7kldgzpPwrmyic+pe1Kkg0/ 9gdDUvcWZ2gf2BMHkyj5z/AK3Y9Qe5OTC7O6u5mJbw== X-Received: by 2002:aed:3584:: with SMTP id c4mr3059581qte.84.1601484168220; Wed, 30 Sep 2020 09:42:48 -0700 (PDT) MIME-Version: 1.0 References: <20200930163714.12879-1-daniel.gutson@eclypsium.com> In-Reply-To: <20200930163714.12879-1-daniel.gutson@eclypsium.com> From: Daniel Gutson Date: Wed, 30 Sep 2020 13:42:37 -0300 Message-ID: Subject: Re: [PATCH 0/2] Platform integrity information in sysfs (version 9) To: Daniel Gutson , Derek Kiernan , Tudor Ambarus , Miquel Raynal , Richard Weinberger , Vignesh Raghavendra , Mika Westerberg , Arnd Bergmann , Greg Kroah-Hartman , Mauro Carvalho Chehab , linux-kernel , Richard Hughes , Alex Bazhaniuk , linux-mtd Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Sorry, I forgot to restore Tested-by: Richard Hughes which I removed for experimenting purposes with git-send-email. On Wed, Sep 30, 2020 at 1:37 PM Daniel Gutson wrote: > > This patch serie adds a misc kernel module and extends the intel-spi drivers > to publish platform integrity data in the sys-fs. > Please check the comments in the following patches of this serie for further > details. > > Daniel Gutson (2): > Platform integrity information in sysfs (version 9) > This patch exports the BIOS Write Enable (bioswe), BIOS Lock Enable > (biosle), and the SMM BIOS Write Protect (SMM_BIOSWP) fields of the > BIOS Control register using the platform-integrity misc kernel > module. The idea is to keep adding more flags, not only from the BC > but also from other registers in following versions. > > .../ABI/stable/sysfs-class-platform-integrity | 23 +++++ > MAINTAINERS | 7 ++ > drivers/misc/Kconfig | 11 +++ > drivers/misc/Makefile | 1 + > drivers/misc/platform-integrity.c | 57 ++++++++++++ > drivers/mtd/spi-nor/controllers/Kconfig | 1 + > .../mtd/spi-nor/controllers/intel-spi-pci.c | 75 +++++++++++++++- > .../spi-nor/controllers/intel-spi-platform.c | 2 +- > drivers/mtd/spi-nor/controllers/intel-spi.c | 90 ++++++++++++++++++- > drivers/mtd/spi-nor/controllers/intel-spi.h | 9 +- > include/linux/platform-integrity.h | 19 ++++ > 11 files changed, 288 insertions(+), 7 deletions(-) > create mode 100644 Documentation/ABI/stable/sysfs-class-platform-integrity > create mode 100644 drivers/misc/platform-integrity.c > create mode 100644 include/linux/platform-integrity.h > > -- > 2.25.1 -- Daniel Gutson Engineering Director Eclypsium, Inc. Below The Surface: Get the latest threat research and insights on firmware and supply chain threats from the research team at Eclypsium. https://eclypsium.com/research/#threatreport