Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp4464587rdb; Mon, 11 Dec 2023 23:12:04 -0800 (PST) X-Google-Smtp-Source: AGHT+IGvZk3wyTIJamPvzhOygSi//KlgLFYFxI5kD6j1oZOae/YAvXUylOVvC9htDKXLCWoQLcec X-Received: by 2002:a05:6a21:3298:b0:18f:97c:6149 with SMTP id yt24-20020a056a21329800b0018f097c6149mr7814636pzb.70.1702365124497; Mon, 11 Dec 2023 23:12:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702365124; cv=none; d=google.com; s=arc-20160816; b=oK8c6ePc5kdXia4o2b4SD9MgjAZxbnVt12of/1DPkgyyDOPCmUi/pa/tQ/Z8E2sH4v xkJcx5+p9oZ3R6Qvza6UFYltALvi4HzCadHMwetxu+h6G4n8PxxpZkRcvykh8T8ai+N4 y1OJNM+dmJwD8UvHYalv3PF1mXFfpJOxNGM30iNdRki36C4gRZMRWTwSQdq0F06MfqgF +iOVXN8y0OXZNTeX/WSzlhvSb7/8MyxEs5Q03I577CsCY/8i0zCoWyIuznBmgx/0PqUw xBQrY24jO4G6wRE4sfCaQVDAEyA+9vWHgncPGLk/gQolPTa6HmKxeCYd2+cwh+hNsiAQ 4Nqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=mAmUSentyWLmxS3uIGWIk1/WaLIBgAtASobEkLuZlvM=; fh=IUujnh3HeahO0UbLUvvY/NuDJHLziiQdIJnjT5dN9kI=; b=oXLDC5nRHNEKV13AEa5yLhyOv9OlyBDQQavaA/GE7kk0FDZOtK8G7i9TCgHE6Nl40A UMZltEtgJ+pio7kNB7YmJzoN7C2+bTBgxEdgv3G5l7/WIPBCD6OQCUDpVUaUqSBVXVY7 4rkrwvZD+TvXcZ5dFRkXX45Y4Ob5URgr43f94NH4WrBjgfhBsNnrLKQq1CMJO0/90Ht0 UfUl/TcVzeJzAEmayCHj/nTruBIfHxo9Gd6VjsEniPYU3d2tqrn5cmMHB8JR4/oxr5DR BwwHFRQvrwwTcPirVbw3VpPBgh4HJGSK2mC+k8HfL2DmbWZXA1+FcOKET+/NzuENog8l cWrw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=k5Od11fz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id b7-20020a63eb47000000b005c65fcca231si7209801pgk.18.2023.12.11.23.12.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 11 Dec 2023 23:12:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=k5Od11fz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 029B4809D1DC; Mon, 11 Dec 2023 23:12:02 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230440AbjLLHLr (ORCPT + 99 others); Tue, 12 Dec 2023 02:11:47 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57546 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229454AbjLLHLp (ORCPT ); Tue, 12 Dec 2023 02:11:45 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AD33DED for ; Mon, 11 Dec 2023 23:11:51 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4A353C433C9; Tue, 12 Dec 2023 07:11:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1702365111; bh=mAmUSentyWLmxS3uIGWIk1/WaLIBgAtASobEkLuZlvM=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=k5Od11fzDY5KMknbUEDyOS5n59hXgpWpDno++QZ6xjmcPaPcEsafwrSrEjApDSC4h t7ixBPBEmBsPs+nQs1l2SU/llp3dhp/jgsu4RhCeYvhVGxP+XbsbiOEYNspmF8kjZL aBu0Sw3RE2NiVj8ZIWsaTqsDW0njBI24wNHouv7LxNv8gjChTb+uNuiIzBLJ9yaN1p Ipkg52K2CDW1XVuUKil0GjZmPnqUm5rHHr8G9mBNBuHpob2r0Zzh6I4yhVFs7ZOZ3C mzOpta/DA47V14vrwI6EuFnhfcZ8uSUcA7O3KqGUxvgVk4Y1jU2xmK7F+p3Bi2FBVO heNSrKqzhwU0Q== Received: by mail-lj1-f179.google.com with SMTP id 38308e7fff4ca-2c9bd3ec4f6so66679581fa.2; Mon, 11 Dec 2023 23:11:51 -0800 (PST) X-Gm-Message-State: AOJu0Ywyo9yPrKG9CxJK9vgL4SYITliZEJDsvNu7Iy1rffH0wf9Odfgx ywIV6BdS4KbAoStJR2FB9qXrbse5MSctI0izoyA= X-Received: by 2002:a2e:9856:0:b0:2ca:16d0:9e9a with SMTP id e22-20020a2e9856000000b002ca16d09e9amr1456456ljj.92.1702365109470; Mon, 11 Dec 2023 23:11:49 -0800 (PST) MIME-Version: 1.0 References: <20231013074540.8980-1-masahisa.kojima@linaro.org> <20231013074540.8980-5-masahisa.kojima@linaro.org> In-Reply-To: From: Ard Biesheuvel Date: Tue, 12 Dec 2023 08:11:38 +0100 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v9 4/6] efivarfs: automatically update super block flag To: Masahisa Kojima Cc: Jens Wiklander , Jan Kiszka , Sumit Garg , linux-kernel@vger.kernel.org, op-tee@lists.trustedfirmware.org, Ilias Apalodimas , Johan Hovold , Randy Dunlap , Heinrich Schuchardt , Jonathan Cameron , Jeremy Kerr , linux-efi@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Mon, 11 Dec 2023 23:12:02 -0800 (PST) On Tue, 12 Dec 2023 at 06:39, Masahisa Kojima wrote: > > Hi Ard, > > On Mon, 11 Dec 2023 at 19:02, Ard Biesheuvel wrote: > > > > On Fri, 13 Oct 2023 at 09:47, Masahisa Kojima > > wrote: > > > > > > efivar operation is updated when the tee_stmm_efi module is probed. > > > tee_stmm_efi module supports SetVariable runtime service, > > > but user needs to manually remount the efivarfs as RW to enable > > > the write access if the previous efivar operation does not support > > > SerVariable and efivarfs is mounted as read-only. > > > > > > This commit notifies the update of efivar operation to > > > efivarfs subsystem, then drops SB_RDONLY flag if the efivar > > > operation supports SetVariable. > > > > > > Signed-off-by: Masahisa Kojima > > > > Unfortunately, I have identified a problem with this approach. > > > > There are cases where there are multiple instances of struct > > superblock are associated with the efivarfs file system [0]. > > > > So I reworked the patch a little - please take the time to double > > check that I did not make any mistakes here. > > > > [0] https://lore.kernel.org/linux-efi/20231208163925.3225018-8-ardb@google.com/T/#u > > I think you are referring to this patch[1]? > The modification should be OK, also I have tested it works as expected. > > Thank you very much for fixing this. > Thank you Masahisa.