Show a cover letter.

GET /api/1.1/covers/2228247/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2228247,
    "url": "http://patchwork.ozlabs.org/api/1.1/covers/2228247/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/uboot/cover/20260424173151.371134-1-harsimransingh.tungal@arm.com/",
    "project": {
        "id": 18,
        "url": "http://patchwork.ozlabs.org/api/1.1/projects/18/?format=api",
        "name": "U-Boot",
        "link_name": "uboot",
        "list_id": "u-boot.lists.denx.de",
        "list_email": "u-boot@lists.denx.de",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null
    },
    "msgid": "<20260424173151.371134-1-harsimransingh.tungal@arm.com>",
    "date": "2026-04-24T17:31:39",
    "name": "[00/12] arm64: FF-A runtime transport for EFI variables",
    "submitter": {
        "id": 88701,
        "url": "http://patchwork.ozlabs.org/api/1.1/people/88701/?format=api",
        "name": "Harsimran Singh Tungal",
        "email": "harsimransingh.tungal@arm.com"
    },
    "mbox": "http://patchwork.ozlabs.org/project/uboot/cover/20260424173151.371134-1-harsimransingh.tungal@arm.com/mbox/",
    "series": [
        {
            "id": 501471,
            "url": "http://patchwork.ozlabs.org/api/1.1/series/501471/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=501471",
            "date": "2026-04-24T17:31:50",
            "name": "arm64: FF-A runtime transport for EFI variables",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/501471/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/covers/2228247/comments/",
    "headers": {
        "Return-Path": "<u-boot-bounces@lists.denx.de>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256\n header.s=foss header.b=T0ptiQO7;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)",
            "phobos.denx.de;\n dmarc=fail (p=none dis=none) header.from=arm.com",
            "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de",
            "phobos.denx.de;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n unprotected) header.d=arm.com header.i=@arm.com header.b=\"T0ptiQO7\";\n\tdkim-atps=neutral",
            "phobos.denx.de;\n dmarc=pass (p=none dis=none) header.from=arm.com",
            "phobos.denx.de;\n spf=pass smtp.mailfrom=harsimransingh.tungal@arm.com"
        ],
        "Received": [
            "from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g2yPN1bZNz1yHS\n\tfor <incoming@patchwork.ozlabs.org>; Sun, 26 Apr 2026 04:03:36 +1000 (AEST)",
            "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 53CA48446D;\n\tSat, 25 Apr 2026 20:02:46 +0200 (CEST)",
            "by phobos.denx.de (Postfix, from userid 109)\n id E3A8B843FB; Sat, 25 Apr 2026 19:01:49 +0200 (CEST)",
            "from foss.arm.com (foss.arm.com [217.140.110.172])\n by phobos.denx.de (Postfix) with ESMTP id A2C6380087\n for <u-boot@lists.denx.de>; Sat, 25 Apr 2026 19:01:45 +0200 (CEST)",
            "from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])\n by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 0D6DD359B;\n Fri, 24 Apr 2026 10:32:22 -0700 (PDT)",
            "from e132995.arm.com (unknown [10.57.64.144])\n by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E66723FB3E;\n Fri, 24 Apr 2026 10:32:25 -0700 (PDT)"
        ],
        "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,\n DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_BLOCKED,\n SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.2",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=simple/simple; d=arm.com; s=foss;\n t=1777051947; bh=yA+VgB7EnxCDcnm/KPyWWnnRYjLDlhNLH7EzU5f2NeY=;\n h=From:To:Cc:Subject:Date:From;\n b=T0ptiQO7kEF+uagKl22lxlfe/svziL0LWVN+Qc+zxdslKcYMDg0gDogJ/bZrzF8WC\n wYnPGARvvh308X2cTIjTBT5DlArPZu9H8vJTmbhoY3Vsadfjtk2oaIDclC3Fi4iU4p\n 3P6LPKECl3rqC/DsKqtoaC+/7Lt1IRQOR5OvfVmY=",
        "From": "Harsimran Singh Tungal <harsimransingh.tungal@arm.com>",
        "To": "u-boot@lists.denx.de",
        "Cc": "Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>,\n Tom Rini <trini@konsulko.com>,\n Ilias Apalodimas <ilias.apalodimas@linaro.org>,\n Heinrich Schuchardt <xypron.glpk@gmx.de>,\n Hugues Kamba Mpiana <hugues.kambampiana@arm.com>,\n Simon Glass <sjg@chromium.org>,\n Harsimran Singh Tungal <harsimransingh.tungal@arm.com>",
        "Subject": "[PATCH 00/12] arm64: FF-A runtime transport for EFI variables",
        "Date": "Fri, 24 Apr 2026 18:31:39 +0100",
        "Message-Id": "<20260424173151.371134-1-harsimransingh.tungal@arm.com>",
        "X-Mailer": "git-send-email 2.34.1",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain; charset=UTF-8",
        "Content-Transfer-Encoding": "8bit",
        "X-Mailman-Approved-At": "Sat, 25 Apr 2026 20:02:44 +0200",
        "X-BeenThere": "u-boot@lists.denx.de",
        "X-Mailman-Version": "2.1.39",
        "Precedence": "list",
        "List-Id": "U-Boot discussion <u-boot.lists.denx.de>",
        "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>",
        "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>",
        "List-Post": "<mailto:u-boot@lists.denx.de>",
        "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>",
        "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>",
        "Errors-To": "u-boot-bounces@lists.denx.de",
        "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>",
        "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de",
        "X-Virus-Status": "Clean"
    },
    "content": "Hi all,\n\nThis series adds FF-A runtime transport support so EFI variable runtime\nservices can communicate with the secure world after ExitBootServices().\nIt also extends tests, docs, and board configs to validate the runtime\npath and keep boot‑time behavior aligned with the runtime flow.\n\nChanges in this series:\n- Add EFI runtime-safe memset helper and FF-A runtime transport support.\n- Implement FF-A runtime communication in the EFI variable TEE backend.\n- Enable runtime variable operations and move helpers to avoid conflicts.\n- Add sandbox runtime transport tests and metadata reuse.\n- Extend EFI selftests for runtime variables and bootefi selftest config.\n- Document the FF-A runtime transport and selftest behavior.\n- Align boot‑time cache maintenance with the runtime path.\n\nHarsimran Singh Tungal (12):\n  efi_loader: add runtime memset helper\n  arm-ffa: add FF-A bus runtime support\n  efi_loader: add FF-A runtime support in EFI variable TEE driver\n  efi_loader: enable EFI runtime SetVariable()/GetVariable() using FF-A\n    transport\n  efi_loader: move runtime GetVariable() helpers to efi_variable.c\n  corstone1000: enable bootefi selftest\n  efi: selftest: add runtime variable tests with non-volatile storage\n  test: dm: add sandbox FF-A runtime transport tests\n  sandbox: ffa: share synthetic partition metadata via macros\n  doc: arm64: document FF-A runtime path for EFI variables\n  doc: bootefi: note two-phase runtime variables selftest\n  efi_loader: align FF-A cache maintenance with runtime path\n\n arch/sandbox/include/asm/sandbox_arm_ffa.h    |  16 +-\n configs/corstone1000_defconfig                |   3 +\n doc/arch/arm64.ffa.rst                        |  92 ++-\n doc/usage/cmd/armffa.rst                      |  11 +\n doc/usage/cmd/bootefi.rst                     |  12 +\n drivers/firmware/arm-ffa/Kconfig              |  11 +\n drivers/firmware/arm-ffa/Makefile             |   4 +-\n drivers/firmware/arm-ffa/arm-ffa-runtime.c    | 287 ++++++++\n drivers/firmware/arm-ffa/arm-ffa-uclass.c     | 111 +--\n drivers/firmware/arm-ffa/arm-ffa.c            |  16 +-\n drivers/firmware/arm-ffa/ffa-emul-uclass.c    |  48 +-\n include/arm_ffa.h                             |  16 +-\n include/arm_ffa_priv.h                        |  24 +-\n include/arm_ffa_runtime.h                     | 183 +++++\n include/efi_loader.h                          |   3 +\n lib/charset.c                                 |   2 +-\n lib/efi_loader/efi_runtime.c                  |  21 +\n lib/efi_loader/efi_var_common.c               |  24 -\n lib/efi_loader/efi_variable.c                 |  24 +\n lib/efi_loader/efi_variable_tee.c             | 686 +++++++++++++++++-\n .../efi_selftest_variables_runtime.c          | 106 ++-\n test/dm/Makefile                              |   3 +-\n test/dm/ffa.c                                 |   6 +-\n test/dm/ffa_runtime.c                         |  82 +++\n 24 files changed, 1602 insertions(+), 189 deletions(-)\n create mode 100644 drivers/firmware/arm-ffa/arm-ffa-runtime.c\n create mode 100644 include/arm_ffa_runtime.h\n create mode 100644 test/dm/ffa_runtime.c"
}