Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp97734rwb; Tue, 27 Sep 2022 23:19:48 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4nDWgoyYk7wZ6YExeW/UvNBeCExcQyEi4gnT4fNP+IPKynG/gQYnXMoor3zRZI0F2YOSac X-Received: by 2002:a63:515d:0:b0:42a:cf33:4320 with SMTP id r29-20020a63515d000000b0042acf334320mr27179346pgl.21.1664345988292; Tue, 27 Sep 2022 23:19:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664345988; cv=none; d=google.com; s=arc-20160816; b=ptEncW3H6PNzHdGKaPvgBX1zjX/JxiqXZRLN6w9UkUfPawNUiC/EqzmNSu8v8TEm+J wz4vsVsc2iQWw10Dp3/ie/79gPkx1bpG3rNtPnMPCGfXWxt5rF4WVT5wNQAlyNrSO/v6 BXtn2CbXykzpuk6UN31Ive+jk5OrZfFEgW4zRgWfEeZw2543IiGFzSk7HcLr3CGbaehp HpxZgvmkZ2+SC/cKENkpvz1aMPUfRgmut463u3qCZbEpNVNinu1HfZcbjsCh1z22G2Qc X66ED51bFIJWXg2uU2B+2zDeJ5B+ZlkrX8QUBM/JEZPumqG83oE/HdwZYatWjZemaPC2 KW3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=DZ7C6+DCRYlaXd+lleDHPjyMOmuho7hTD+qVYbstFBE=; b=cVqVCxHyrGV+dcJMnRg8dw7ZtMG3f/4AaOexEWA0c1cG6eO10Hi9txNgBPk6gp+i0r o34nV5c7XldtsFebGwkmr0N8iHkAzCQvHWxJ0KJQSfeGCZfQ3ffQ7tgWs7O0RDwWncg5 usojUZ4maVYza6pbWFIDABioFzEpl0d1TuwhELid5T+vnTYLZ0QcvKGdfFpPjzAgO7va K/9UdfjnOSZ3H4r5QL2lCc/8TgJ9eNAnOzLvi2G/wIp9ZDrzw1UWgS2P9dsB1/etaMDy DfBYj2Eyzg6rogT65Whqx2Ea2GLYVTSGKgfTKU0pii8Ypk7P2yHvC4SaZCdPHn3jbnNO 7wwg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fCJNTRpS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m7-20020aa79007000000b005257035371bsi1757837pfo.108.2022.09.27.23.19.27; Tue, 27 Sep 2022 23:19:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fCJNTRpS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231419AbiI1GH3 (ORCPT + 99 others); Wed, 28 Sep 2022 02:07:29 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48754 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229489AbiI1GH0 (ORCPT ); Wed, 28 Sep 2022 02:07:26 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 94821118B13 for ; Tue, 27 Sep 2022 23:07:25 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 1F6E4B81E8A for ; Wed, 28 Sep 2022 06:07:24 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3F197C433C1; Wed, 28 Sep 2022 06:07:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1664345242; bh=wzLHBlAoXENDdYRhonxwHiNgupy+D9oRTtjJqug0AbM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=fCJNTRpSElIlz18Tv7joZedq7GL08DgL1gHo0kFGlCndqiq5z/8IujuBaYdbsbj75 v2fLxX5Gakt8Xl32Xh1mO8/xpwlrSxs7QpUF/80J+DD4RzLI1IzQhEW9/dqmh4loql qAHz/n9a9jlZ/hXk8kEck85Doff4bs28EnOzUUu4= Date: Wed, 28 Sep 2022 08:07:57 +0200 From: Greg KH To: Jack Rosenthal Cc: linux-kernel@vger.kernel.org, chrome-platform@lists.linux.dev, Stephen Boyd , Tzung-Bi Shih , Guenter Roeck , Julius Werner Subject: Re: [RESEND PATCH v10] firmware: google: Implement cbmem in sysfs driver Message-ID: References: <20220927205551.2017473-1-jrosenth@chromium.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220927205551.2017473-1-jrosenth@chromium.org> X-Spam-Status: No, score=-7.2 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 27, 2022 at 02:55:51PM -0600, Jack Rosenthal wrote: > The CBMEM area is a downward-growing memory region used by coreboot to > dynamically allocate tagged data structures ("CBMEM entries") that > remain resident during boot. > > This implements a driver which exports access to the CBMEM entries > via sysfs under /sys/firmware/coreboot/cbmem/. > > This implementation is quite versatile. Examples of how it could be > used are given below: > > * Tools like util/cbmem from the coreboot tree could use this driver > instead of finding CBMEM in /dev/mem directly. Alternatively, > firmware developers debugging an issue may find the sysfs interface > more ergonomic than the cbmem tool and choose to use it directly. > > * The crossystem tool, which exposes verified boot variables, can use > this driver to read the vboot work buffer. > > * Tools which read the BIOS SPI flash (e.g., flashrom) can find the > flash layout in CBMEM directly, which is significantly faster than > searching the flash directly. > > Write access is provided to all CBMEM regions via > /sys/firmware/coreboot/cbmem//mem, as the existing cbmem tooling > updates this memory region, and envisioned use cases with crossystem > can benefit from updating memory regions. > > Link: https://issuetracker.google.com/239604743 > Cc: Stephen Boyd > Cc: Tzung-Bi Shih > Reviewed-by: Guenter Roeck > Reviewed-by: Julius Werner > Tested-by: Jack Rosenthal > Signed-off-by: Jack Rosenthal > --- > .../ABI/testing/sysfs-firmware-coreboot | 49 ++++ > drivers/firmware/google/Kconfig | 8 + > drivers/firmware/google/Makefile | 3 + > drivers/firmware/google/cbmem.c | 225 ++++++++++++++++++ > drivers/firmware/google/coreboot_table.c | 10 + > drivers/firmware/google/coreboot_table.h | 16 ++ > 6 files changed, 311 insertions(+) > create mode 100644 Documentation/ABI/testing/sysfs-firmware-coreboot > create mode 100644 drivers/firmware/google/cbmem.c > Hi, This is the friendly patch-bot of Greg Kroah-Hartman. You have sent him a patch that has triggered this response. He used to manually respond to these common problems, but in order to save his sanity (he kept writing the same thing over and over, yet to different people), I was created. Hopefully you will not take offence and will fix the problem in your patch and resubmit it so that it can be accepted into the Linux kernel tree. You are receiving this message because of the following common error(s) as indicated below: - This looks like a new version of a previously submitted patch, but you did not list below the --- line any changes from the previous version. Please read the section entitled "The canonical patch format" in the kernel file, Documentation/SubmittingPatches for what needs to be done here to properly describe this. If you wish to discuss this problem further, or you have questions about how to resolve this issue, please feel free to respond to this email and Greg will reply once he has dug out from the pending patches received from other developers. thanks, greg k-h's patch email bot