From: Michal Simek <michal.simek@amd.com>
To: Ilias Apalodimas <ilias.apalodimas@linaro.org>
Cc: Heinrich Schuchardt <xypron.glpk@gmx.de>,
u-boot@lists.denx.de, git@amd.com,
Shantur Rathore <i@shantur.com>,
Gabriel Dalimonte <gabriel.dalimonte@gmail.com>,
Jonathan Humphreys <j-humphreys@ti.com>,
Raymond Mao <raymondmaoca@gmail.com>,
Simon Glass <sjg@chromium.org>, Tom Rini <trini@konsulko.com>,
"Ying-Chun Liu (PaulLiu)" <paul.liu@linaro.org>
Subject: Re: [PATCH v4 3/3] efi_vars: Implement SPI Flash store
Date: Fri, 23 Jan 2026 15:15:25 +0100 [thread overview]
Message-ID: <24f089bd-f102-4859-b6d3-e042bf58cb6d@amd.com> (raw)
In-Reply-To: <CAC_iWjJy=77AVuPUyaJzxgQyGtkkcNcrEQsknLwU0r8e35absA@mail.gmail.com>
On 1/23/26 14:01, Ilias Apalodimas wrote:
> On Fri, 23 Jan 2026 at 10:22, Michal Simek <michal.simek@amd.com> wrote:
>>
>>
>>
>> On 1/23/26 08:40, Ilias Apalodimas wrote:
>>> On Thu, 22 Jan 2026 at 14:32, Michal Simek <michal.simek@amd.com> wrote:
>>>>
>>>> Hi,
>>>>
>>>> On 1/22/26 13:18, Ilias Apalodimas wrote:
>>>>> Hi Michal,
>>>>>
>>>>> [...]
>>>>>
>>>>>>
>>>>>> config EFI_RT_VOLATILE_STORE
>>>>>> bool "Allow variable runtime services in volatile storage (e.g RAM)"
>>>>>> - depends on EFI_VARIABLE_FILE_STORE
>>>>>> + depends on EFI_VARIABLE_FILE_STORE || EFI_VARIABLE_SF_STORE
>>>>>
>>>>> Will this work on nands as well? They got a much shrter lifetime that
>>>>> spi flashes.
>>>>
>>>> I don't think this is valid argument here. Users have options to decide where to
>>>> put them. The same argument can be used for u-boot variables saved in NAND.
>>>> Obviously I can update Kconfig option with saying that you should be careful
>>>> about it but it is user choice.
>>>
>>> Yes I think that's a good idea.
>>>
>>>>
>>>>>
>>>>>> help
>>>>>> When EFI variables are stored on file we don't allow SetVariableRT,
>>>>>> since the OS doesn't know how to write that file. At the same time
>>>>>
>>>>> I am not sure we need to allow this for now. At least not until we've
>>>>> talked to the efitool maintainers and make sure they will accept
>>>>> another 'special' case.
>>>>
>>>> Not a problem for me to disable it for now.
>>>>
>>>>>
>>>>> The problem with allowing this is that if people enable it, boot a
>>>>> linux and do a setvariable, it will return a success. But none of the
>>>>> variables will be preserved after a reboot unless someone manually
>>>>> updates the serial flash contents. In theory, we can preserve the
>>>>> driver model and the spi drivers in EFI runtime services and allow
>>>>> 'proper' setvariable at runtime.
>>>>
>>>> Wasn't this the same case for file based one? I mean u-boot had it but efi
>>>>
>>>> Yours efivar patch was merged Jun 23, 2025
>>>> But this symbol was introduce in U-Boot April 18, 2024.
>>>
>>> Yes but the patches were sent a long time ago in efivar. If you look
>>> at the original PR date it was a lot eariler [0]. It just took a long
>>> time to discuss and merge.
>>> Apart from that the case for file stored variables is by itself pretty
>>> unique and convincing the maintainers to accept the patch had some
>>> basis. I don't know if they want the same workaround for spi flashes.
>>
>> Correct June, 2024
>> https://github.com/rhboot/efivar/pull/267
>>
>>
>>>>
>>>>
>>>>> However, I think this is not very useful. Having an unprotected to
>>>>> store authenticated EFI variables, is dangerous. Someone can erase the
>>>>> SPI flash and efectively disable secure boot. Due to that, I prefer
>>>>> the current file based approach for EFI variables -- which doesn't
>>>>> store/restore authenticated EFI variables (and which this patch
>>>>> implements). The obvious downside is that enable setvariable at
>>>>> runtime is tricky once again....
>>>>
>>>> Isn't the same happening with file store too?
>>>>
>>>> From implementation perspective it should be the same as file based. Obviously
>>>> efivar part is missing.
>>>
>>> Yes. However, that commit included instructions on how to set runtime
>>> variables with dd, so people could use it until the efivar changes
>>> were merged.
>>
>> I don't think it is going to be problem too.
>>
>> What about?
>> dd if=/sys/firmware/efi/efivars/VarToFile-b2ac5fc9-92b7-4acd-aeac-11e818c3130c \
>> of=/tmp/vars skip=4 bs=1
>> flashcp /tmp/vars /dev/mtdX
>
> If you manage to test this then yes, please include it on the commit
> message and in the future we can add it to the documentation
yes, I have also tested it on SOM.
Let me send v5 with discussed changes and also with logs.
Thanks,
Michal
next prev parent reply other threads:[~2026-01-23 14:15 UTC|newest]
Thread overview: 15+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-01-14 15:15 [PATCH v4 0/3] efi_vars: Implement SPI Flash storage for EFI Michal Simek
2026-01-14 15:15 ` [PATCH v4 1/3] efi_var_file: refactor to move buffer functions Michal Simek
2026-01-14 15:15 ` [PATCH v4 2/3] efi_var: Unify read/write access helper function Michal Simek
2026-01-14 15:15 ` [PATCH v4 3/3] efi_vars: Implement SPI Flash store Michal Simek
2026-01-15 7:55 ` Ilias Apalodimas
2026-01-15 10:01 ` Peter Robinson
2026-01-15 10:08 ` Ilias Apalodimas
2026-01-22 12:18 ` Ilias Apalodimas
2026-01-22 12:32 ` Michal Simek
2026-01-23 7:40 ` Ilias Apalodimas
2026-01-23 8:22 ` Michal Simek
2026-01-23 13:01 ` Ilias Apalodimas
2026-01-23 14:15 ` Michal Simek [this message]
2026-01-14 18:24 ` [PATCH v4 0/3] efi_vars: Implement SPI Flash storage for EFI E Shattow
2026-01-15 2:40 ` Peter Robinson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=24f089bd-f102-4859-b6d3-e042bf58cb6d@amd.com \
--to=michal.simek@amd.com \
--cc=gabriel.dalimonte@gmail.com \
--cc=git@amd.com \
--cc=i@shantur.com \
--cc=ilias.apalodimas@linaro.org \
--cc=j-humphreys@ti.com \
--cc=paul.liu@linaro.org \
--cc=raymondmaoca@gmail.com \
--cc=sjg@chromium.org \
--cc=trini@konsulko.com \
--cc=u-boot@lists.denx.de \
--cc=xypron.glpk@gmx.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox