Hello James, Nice to meet you! It's good that you posted on the mailing list.
Yes it would be very interesting to discuss your idea. From what you said, it seems like a new programmer can be part of group_internal. I think there is no support for windows in the group_internal at the moment, but maybe it could be. What phase are you currently in, do you have some experimental code working already? I understand the driver you are writing, it's all yours, so from flashrom side the question would be how to fit the new support into flashrom code. Are there any proprietary libraries involved in the implementation? Or in general, any new dependencies would be needed? Will you be able to do the testing in your environment? How would you like to discuss in more detail? We can talk in this thread, it's also possible someone else sees the post and joins. In case you already looked into how to add this to flashrom, you can even create a quick experimental patch? It can be a way to explain your idea. Thank you so much for the nice words about flashrom. It's the collective work of so many people over decades :) https://flashrom.org/about_flashrom/hall_of_fame.html On Fri, Sep 5, 2025 at 7:45 PM madam smith <[email protected]> wrote: > > Hi Flashrom team, > > I'm a forensic engineer focused on hardware-level validation and SPI flash > access across locked platforms. I've worked extensively on probing SPI flash > from T2 MacBooks and similar devices, and recently developed a custom Windows > kernel-mode driver for MMIO mapping and SPI controller access. > > As part of this work, I’ve begun creating a signed kernel-mode driver > designed to enable internal SPI flash access on Windows—particularly for > platforms where external programmers aren’t viable or where forensic > traceability is essential. The driver emphasizes modularity, context > preservation, and empirical validation, and I’m exploring how it could > interface with Flashrom’s internal programmer logic. > > I understand Flashrom currently relies on external drivers like WinRing0 or > portio.sys for low-level access on Windows, but these solutions are unsigned, > fragile, and often flagged by modern security tools. I’d like to ask whether > the team would be open to discussing the possibility of integrating or > supporting a signed kernel-mode driver for secure internal access on Windows. > > If there’s interest, I’d be happy to share technical details, constraints, > and potential implementation paths. I deeply appreciate the work you’ve done > on Flashrom—it’s an invaluable tool for the hardware security and research > community. > > Best regards, > James > > > _______________________________________________ > flashrom mailing list -- [email protected] > To unsubscribe send an email to [email protected] -- Anastasia. _______________________________________________ flashrom mailing list -- [email protected] To unsubscribe send an email to [email protected]
