Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C0330C433EF for ; Thu, 11 Nov 2021 09:02:40 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id ABA146124C for ; Thu, 11 Nov 2021 09:02:40 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232599AbhKKJF0 (ORCPT ); Thu, 11 Nov 2021 04:05:26 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38172 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232568AbhKKJDu (ORCPT ); Thu, 11 Nov 2021 04:03:50 -0500 Received: from mail-wm1-x32d.google.com (mail-wm1-x32d.google.com [IPv6:2a00:1450:4864:20::32d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E95CFC06120A for ; Thu, 11 Nov 2021 00:59:44 -0800 (PST) Received: by mail-wm1-x32d.google.com with SMTP id r9-20020a7bc089000000b00332f4abf43fso5111817wmh.0 for ; Thu, 11 Nov 2021 00:59:44 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=immu-ne.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=btaOpG2HGUj1JZxl+ePRoLEyHu6nH/++aTWt9XqRAAk=; b=eogWlWUt+ywwdFLpwIg9PnNRB38ICeXHmX9WqKX+hKzInFg+gjw6gCrqZ0hrlIRHKZ 4+oOOKY75ewDuO0vl+GbLlbJsFVoLPCWwtKgJGGsbwJA71ychtpjn3C8f/h41C693JiE cjIHxOw+/7mCzDgf00Fnh4IV16vC9eu8zpF4bGjIoOPxBuelTMOxKbuGjavVPpks8U4T pA2+XCEv1vSJzzsUbmmVWduTrWjOuDTEqd+EzjeDc7G3WLu2Befr3Jsq/F9pmZmQHC4+ WLOKCjQflys5VU7smbZUIF+H4QkIR4tSK3YJWAE6FQqOcER4UhDAjwPIY3xroeUZ4Q0R m7sA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=btaOpG2HGUj1JZxl+ePRoLEyHu6nH/++aTWt9XqRAAk=; b=ZusR88S9/ffnzZhbRNGYmlZU/Scu23LYm7XdPFWGL5/FTQ7B7nS335baod9qshX5ag q0ZYI2e7KnwLK56PWupj68LKNDOs5Bz7xoaFsIIrpQfrIP8u7P0nq9fvtQr1Vcm0C7sa xmP+mnY+3GIi76fAO+HdijrREt5LfqXqrA4YSC6pzwjmmXx030+hjKPsUxGgLjeWydpd OqJkRiKH145H6eaLhWRDTGIPpVXs0Bcj0mQk8pBP8SBNywujkCx8inQjX7DIFE0nynbQ jvkLaF2uZP20KLnU0ejJtWhqowmpsxIhDOcGFTsZYeU2urukc0lIuhwlmkDpXjAYddrn tmbA== X-Gm-Message-State: AOAM533aeDv0aLMWpIN8OuvRISwMeUvyJunpG+Si+MJSMDG/g2VCgMr7 zOSURFNozy8ESbKLHBfF5k9wr0+ToXGpZfniTYJmQg== X-Google-Smtp-Source: ABdhPJzN8HfHkw/HhQ69DeLN8FIVe242sAFG5SjILUWkcMAWJjh4vDu8FmfUybnIZ2xyUpwH9OYOlsdplVEj61C0YLM= X-Received: by 2002:a05:600c:2dc1:: with SMTP id e1mr6488643wmh.170.1636621183492; Thu, 11 Nov 2021 00:59:43 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Hans-Gert Dahmen Date: Thu, 11 Nov 2021 09:59:32 +0100 Message-ID: Subject: Re: [PATCH] firmware: export x86_64 platform flash bios region via sysfs To: Mika Westerberg Cc: Mauro Lima , Andy Shevchenko , Greg KH , "akpm@linux-foundation.org" , "linux-kernel@vger.kernel.org" , Philipp Deppenwiese , Richard Hughes , "platform-driver-x86@vger.kernel.org" Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Am Do., 11. Nov. 2021 um 07:42 Uhr schrieb Mika Westerberg : > > Hi, > > On Wed, Nov 10, 2021 at 02:37:56PM -0300, Mauro Lima wrote: > > > Try again to collaborate with Intel SPI driver author(s) / > > > maintainer(s) by sending the proposal that may work. > > > > The proposal I sent makes the driver work only with read ops, but that > > was not the issue with this driver. The issue was something related to > > a status register and this was fixed. So if there is no issue with > > write/erase ops, the bug was fixed and there is no intention to remove > > the tag. What kind of proposal are we talking about? > > I think we discussed this previously already but in any case, instead of > removing the tag from the "main" driver, we can make certain "safe" > parts of the driver available without that tag. That would allow you to > read the things the controller exposes and allow distros safely include > the driver too. By "safe" parts, I mean the information available > through the SPI flash controller without actually sending commands to > the flash chip. I think this is the information everybody (on this > thread at least) is interested in. Unless I'm mistaken - I did not check Yes you are mistaken. My patch is about safely reading the BIOS/UEFI binary on every past and future x86_64 system. There are tools out there that use the interface my patch uses and they can not work any longer when /dev/mem is locked down with SecureBoot enabled. The tools, like fwupd, should work out-of-the-box on the typical distribution. During this discussion we were told that my patch is not welcome and that we have to work with you to achieve the same. So I'm curious to hear how that can be done. > the original patch. If that's not enough we can possibly expand it to > cover the controllers that only use hardware sequencer since they > operate on a certain limited set of ops that should not break anything > accidentally. Hans-Gert