Received: by 2002:ac0:e34a:0:0:0:0:0 with SMTP id g10csp553746imn; Thu, 28 Jul 2022 08:43:20 -0700 (PDT) X-Google-Smtp-Source: AGRyM1v1DP7qo15L1btDDeee8KCMx9a0b3FiNX8aRZcxYSuwFjflIbnsvq4S1MSNel3+d9F/CJP7 X-Received: by 2002:a17:907:3f13:b0:72f:2235:2c92 with SMTP id hq19-20020a1709073f1300b0072f22352c92mr21400949ejc.219.1659023000330; Thu, 28 Jul 2022 08:43:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1659023000; cv=none; d=google.com; s=arc-20160816; b=XDZfLBxqKxNkAFxHRsUObc92L8smB4vU6JudclqxPdgZmGQFIoq+assHWRtE4emYE3 Fh4+e6iP/2vzhwuYUOu85zQbxMBVrIhRPOhmpv1A3lfzqgX1NfaYBjir5SJzi5W5l2Nl 5qMfckWekkg76Wlw5b2yawT5GpImVdQZvK9IyhyJbfOYM9C0Iwi37lCxeMo60cyTs9H0 diM4ED4gNafPNSHTBNwbEzCHdAqTaSVXabCDlLXvXlo4bCeW/73xnaizveTfysNxcVf0 SbMv1iSZi7Fa11qcR6VcHiv/mjLqb72e7WFzWQW/WB3jBIRQPzdJ+hqMz4pMbQe3iYGS 6JIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=I/V7r/JjnXzUGcT6ui2gSCucu1LvJKddLujQ+JW0ayQ=; b=Eum0N5ZfzGXTRsk/7IG99Dz/BLKbLFF2koC+zMzykwZS34uVTF4IulTl8D4T0uWtxo cqhKq5dzOi9tjTwZ3mlimLt4b/vQYd/JhqeIicBNBOalaLjNeVpFSSx8uuGJmUUggAKx +nFFkG1jUv1IfDhLNVUrPeN7v9/5fgu0Ehh/j42U+Re2tfwyWPLirT2xG6evA+hcUOF6 KgnUGnrnwd8boyy66dfOVkmXHNW6mg9Pn02OM46I4dl8Z9EKnyKAhilBfHhAqZgtEr1b /MP/VPSF5FtT7nxMOJJcM/LjGoxRUm0lVqTnpy+zQjtITDaQ0dFnYUSxn8bFpbs12HVe qFDA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=gtAegM1F; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y7-20020a1709060a8700b007301c7b1e61si799662ejf.365.2022.07.28.08.42.55; Thu, 28 Jul 2022 08:43:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=gtAegM1F; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230483AbiG1PQn (ORCPT + 99 others); Thu, 28 Jul 2022 11:16:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58584 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230410AbiG1PQl (ORCPT ); Thu, 28 Jul 2022 11:16:41 -0400 Received: from mail-yw1-x1133.google.com (mail-yw1-x1133.google.com [IPv6:2607:f8b0:4864:20::1133]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 281A046D93 for ; Thu, 28 Jul 2022 08:16:40 -0700 (PDT) Received: by mail-yw1-x1133.google.com with SMTP id 00721157ae682-31f41584236so22850087b3.5 for ; Thu, 28 Jul 2022 08:16:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=I/V7r/JjnXzUGcT6ui2gSCucu1LvJKddLujQ+JW0ayQ=; b=gtAegM1F7Ga+mua1tY0e5tEW6tISaVKUX4kBorZeA23I7ZxrtAHlX6MMeI7VPUS7Z8 JasOmqNpNBjQV13JSpTdrN/pR7yns90gilE4ACtbhzDK/p/HW6ySpgJ7CJZsLZNu2zNL CILNfwTlct/Rnd7xJdyp89hoOw+7XyPFNRCmIAzftsNXvDbdfKx3lCmeiCdfpMyMZKFu HYqcjJNSLeh7uKHSlcifaPueU54vOp10O3VVMNmFXGnlbYw61STJ0H+f1p0nssrlj7U5 J5cNHKjJ1RyN9kDYIkTS3HSMcSDpTeVIFGPLgotsQ/pyJ6a3VvKsvzPZ3J147/XOnS+U WvnA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=I/V7r/JjnXzUGcT6ui2gSCucu1LvJKddLujQ+JW0ayQ=; b=uuD+vvmoOCTSxIjcBuzyz6wwUix8c3L5ZYgmrLmukb4YhQ8MAQc6hivdmssinU/I1I kmahWTq0b0gIwchdpTDgIIAtC9kYhyhyQ5GtACBQWMDuUeyi+Vq4jQNpgWWmrZGvogoC 0HaX2P++x/15F3U+L0YUw/p6Bl4EM8pxSrwBSjpXOD1+ISYJZl5CeNqWauRNwKjBke6t zj9jzjnd5YXfZKH1OZz21WIhOchAcWY6EjVPCWQ71ifNaOZy8jlz/bB1GSsN/rqImavr tVbpQKIMewK8GZQ+Kg+OYWubfuJXJo0cGCzCBduBqyJLwUGKzODEVNE2xO5RySlm6h1g j/SA== X-Gm-Message-State: AJIora+umke44X5aaq1djSBcQ0zowh0sNmJTc+j3jLW9CTdBSs/hSE9f xIh6lVfhTtSa8V0joMZ0ZisNWp+jffb8ArE0hsnz4g== X-Received: by 2002:a81:a149:0:b0:31f:fded:b121 with SMTP id y70-20020a81a149000000b0031ffdedb121mr5995007ywg.122.1659021399305; Thu, 28 Jul 2022 08:16:39 -0700 (PDT) MIME-Version: 1.0 References: <20220723224949.1089973-5-luzmaximilian@gmail.com> <20220726143005.wt4be7yo7sbd3xut@bogus> <829c8fee-cae5-597d-933d-784b4b57bd73@gmail.com> <20220726154138.74avqs6iqlzqpzjk@bogus> <7284953b-52bb-37ac-fbe1-1fa845c44ff9@linaro.org> <3d752603-365d-3a33-e13e-ca241cee9a11@gmail.com> <20220727132437.pjob3z2nyxsuxgam@bogus> <20220728113347.ver6argevzmlsc2c@bogus> In-Reply-To: From: Ilias Apalodimas Date: Thu, 28 Jul 2022 18:16:03 +0300 Message-ID: Subject: Re: [PATCH 4/4] dt-bindings: firmware: Add Qualcomm UEFI Secure Application client To: Ard Biesheuvel Cc: Sudeep Holla , Maximilian Luz , Krzysztof Kozlowski , Andy Gross , Bjorn Andersson , Konrad Dybcio , Rob Herring , Krzysztof Kozlowski , Steev Klimaszewski , Shawn Guo , Cristian Marussi , Greg Kroah-Hartman , linux-arm-msm , linux-efi , "open list:OPEN FIRMWARE AND FLATTENED DEVICE TREE BINDINGS" , Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Ard, [...] > > > From an end-user perspective, it's annoying enough that we'll have to > > > stick with DTs for the time being due to the use of PEPs in ACPI. > > > > But have we explored or investigated what it takes to rewrite ACPI f/w > > to just use standard methods ? Does it require more firmware changes or > > new firmware entities or impossible at any cost ? > > > > For me that is more important than just getting this one on DT. Because > > if you take that path, we will have to keep doing that, with loads of > > unnecessary drivers if they are not shared with any other SoC with DT > > support upstream. We might also miss chance to get things added to the ACPI > > spec as we don't care which means that we never be able to use ACPI on > > similar future platforms even though they get shipped with ACPI. > > > > It will be a loop where we constantly keep converting this ACPI shipped > > platform into DT upstream. IMHO we don't want to be there. > > > > Supporting these devices in Linux in ACPI mode would involve > reimplementing the PEP subsystem, and reimplementing PEP drivers for > all these QCOM peripherals to manage the probing and the power states. > I don't think this is realistic at all, and a huge waste of > engineering effort otherwise. > > It is also orthogonal to the discussion, as far as I understand: ACPI > is not telling the system whether or not these TZ services should be > used instead of EFI runtime calls. > > So I think this is a reasonable way to expose these EFI services, > although I am not thrilled about the fact that it is needed. > Surprisingly, Microsoft also supports this model both on x86 and arm64 > for platforms that keep their variables on eMMC (or any other kind of > storage that sits behind a controller that cannot be shared between > the OS and the firmware). So if we agree that we will support these > systems as best we can, supporting EFI variables at runtime is > something that we should support as well. (Note that I am not > convinced about the latter point myself: on many systems, the EFI > variable store is used precisely once, when GRUB gets installed and > its path added to the boot order, so if we could find a way to > streamline that without EFI runtime services, the story around why EFI > runtime services are important becomes quite weak) Unfortunately this is not entirely true. Yes the majority of use cases is what you describe, however we also need SetVariable for capsule update on disk. [...]