Show a cover letter.

GET /api/1.1/covers/2231964/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2231964,
    "url": "http://patchwork.ozlabs.org/api/1.1/covers/2231964/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/opensbi/cover/20260501183346.1596027-1-raymondmaoca@gmail.com/",
    "project": {
        "id": 67,
        "url": "http://patchwork.ozlabs.org/api/1.1/projects/67/?format=api",
        "name": "OpenSBI development",
        "link_name": "opensbi",
        "list_id": "opensbi.lists.infradead.org",
        "list_email": "opensbi@lists.infradead.org",
        "web_url": "https://github.com/riscv/opensbi",
        "scm_url": "",
        "webscm_url": ""
    },
    "msgid": "<20260501183346.1596027-1-raymondmaoca@gmail.com>",
    "date": "2026-05-01T18:33:43",
    "name": "[RFC,0/3] Add QEMU virt WorldGuard support on top of HWISO",
    "submitter": {
        "id": 91989,
        "url": "http://patchwork.ozlabs.org/api/1.1/people/91989/?format=api",
        "name": "Raymond Mao",
        "email": "raymondmaoca@gmail.com"
    },
    "mbox": "http://patchwork.ozlabs.org/project/opensbi/cover/20260501183346.1596027-1-raymondmaoca@gmail.com/mbox/",
    "series": [
        {
            "id": 502489,
            "url": "http://patchwork.ozlabs.org/api/1.1/series/502489/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/opensbi/list/?series=502489",
            "date": "2026-05-01T18:33:43",
            "name": "Add QEMU virt WorldGuard support on top of HWISO",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/502489/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/covers/2231964/comments/",
    "headers": {
        "Return-Path": "\n <opensbi-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=jjfCD4pD;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=kGjTis+c;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=opensbi-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g6fp31VdMz1yHZ\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 02 May 2026 04:34:16 +1000 (AEST)",
            "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wIsgj-00000007ZjL-1zqa;\n\tFri, 01 May 2026 18:34:09 +0000",
            "from mail-qv1-xf2a.google.com ([2607:f8b0:4864:20::f2a])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wIsgh-00000007Ziw-139d\n\tfor opensbi@lists.infradead.org;\n\tFri, 01 May 2026 18:34:08 +0000",
            "by mail-qv1-xf2a.google.com with SMTP id\n 6a1803df08f44-8acb09ddbf6so36141636d6.2\n        for <opensbi@lists.infradead.org>;\n Fri, 01 May 2026 11:34:06 -0700 (PDT)",
            "from ubuntu.localdomain (172-97-209-197.cpe.distributel.net.\n [172.97.209.197])\n        by smtp.gmail.com with ESMTPSA id\n 6a1803df08f44-8b53c1dceddsm29696886d6.30.2026.05.01.11.34.03\n        (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n        Fri, 01 May 2026 11:34:04 -0700 (PDT)"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc\n\t:To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:\n\tResent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:\n\tList-Owner; bh=WZmj6mlJvCBG9t3LD8ssTugcR6+bIUuOp/c56WYn3nc=; b=jjfCD4pDmaKiY0\n\trn7/qT4WwCQFtnVTNkgCntHJ2y9eVgiD+/LgHePkBjxlN0S+kz4S/qM3076Yxb7DmSondzaztCyPV\n\tO4Zw4iWVJoi7UbLEHdXChd+E47QUsLkXfCz8wOGEQU6is8S2AQ8yPDCp8zXQcmLy8QhSobrb7DBvB\n\tfcGb6db1FA5Xn79zfKs3E+IECeS1KEBNfkhfpRxD05osUycsB5zcO7iMluV+oqDVYLaSerDaCKdqu\n\tj66bNpHdVZrcr1tu4XRB4mKD+Ocr+SIpzPh6swtNtfHQfLLMKe5gDtvuIGqauzd5f5cLFF+mGQhy9\n\t/z8fSCs40/gNU9tv3kYw==;",
            "v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=gmail.com; s=20251104; t=1777660445; x=1778265245;\n darn=lists.infradead.org;\n        h=content-transfer-encoding:mime-version:message-id:date:subject:cc\n         :to:from:from:to:cc:subject:date:message-id:reply-to;\n        bh=vNGh7Aub9Rn17YKM8Unb+N+feNetq1GNPpKoCJBGsKk=;\n        b=kGjTis+c4d1VoEdn1iMPIQ30gZKMx1Lyyj08SBrEO0AOHPTPV40GBz2K87qFQgbr7/\n         LYlCFXyY8tTVoMi7G1UMvsUyxDDx5BmxozvTMjv1usLuQF0Qw+ALEcHFokqjWFARaRNj\n         564KFdpxAKJE9XhysNWu+f0QvVp1vVZmsdt1aBMScBKaf0QEGl3lwyG9AsXkCJbGjYP3\n         d2/zmaRzpbXJXY7IUJBfZd3mr9qG1iku4w4ieLerXLkNiex6H+l6IYfd1shbkPoiz/Po\n         jBMQBv6ASmoeBvf9ydwtn79dCyqkmiCKfh9vyQj3GnDZI/oP94jhnqOaFfElAPSs+th4\n         icaw=="
        ],
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20251104; t=1777660445; x=1778265245;\n        h=content-transfer-encoding:mime-version:message-id:date:subject:cc\n         :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date\n         :message-id:reply-to;\n        bh=vNGh7Aub9Rn17YKM8Unb+N+feNetq1GNPpKoCJBGsKk=;\n        b=kH6aOZ0/jUGUxE8UdaZS68r/1vZWzJpzRqwBxgVTgaGfcQf5PYljGJyHDZcbAzUFhM\n         1TdeydKygQfPpqGrObKJeFX66ZKPIxPvrs9KnqRnBzQtA4d9RdUFJlbCuPLkcHnZ7xKr\n         /8y75HcDIBt5SNenf6H3ESbDba+YltGbv/lOUH7jMprNlO+zREwauCi+prokLnFRUhy9\n         r/Xr9NJUcWUtecKbkLSP0Kr1hOQNx3hpnMqyUK+O2QfMYBCBbs/kdKVePqGTsOVrdQjj\n         O5Po66Jq7r3Gw6qDuUJ58ApEGzdeJUf89EaUZhya0xQnF7m27OCeG1taTRsMEOa69HaA\n         X9gg==",
        "X-Gm-Message-State": "AOJu0Yw0OXR0FCyvrg26q0m4pHWvX7FFZZNRUImVe6cQz+lyGsHDVA4f\n\tkn1gVQV1HiFLYS3Le7VhLopbgokyu7SP1r9g7y5cq+FAQUFHZos/Co6KEemqTybW",
        "X-Gm-Gg": "AeBDieswE9ielEn2pJoebkM73kryEzUal7lAVSlv7/soX2fvCjgS0XIRFNv8YJcMa/0\n\tslDC7T8tZ4JucrCRj1STHxjyjrvGuRbs83lp0u/bfRP5JoM4dK+YobXdGsY/OGzD4Z5VtH2YH6R\n\tGzVJPqWZsXwVWud4abDKP18NsEQIsOEQ/+9gIqI+Gw03ETZPLLAeybJ8jDA4fwDGcDgp/ZVh6dm\n\t9vAWAg55eItiX6USJAdcHjzgeyk1wUe4qH1qIDtNprXCz0POKSyzi37k2wYGoDIcI04tQXar3T1\n\tBX9n6b5V0UMEGHuoJTrsWWAuf7tsYSAn+yKVEgZrA6Ua7sKkunXqDc1oQGnxITxn75IP15ylIgt\n\tJgS69blMmdu81YB5G+nFmHqDeKOE6kCEpVi7S7uIIJjsuKkNA2gylAEB2Dmdm2r9I2E0glMy/Ec\n\tIAGNFolq7t/3Jpx4nD+lOJ+4CpcDOo0sfvJ76GTdVHNH5vGpeCzPwndqTTHIbyRqmVIhCKfKJ/X\n\tpMb4pEWexc8d1x72czWXQ==",
        "X-Received": "by 2002:a05:6214:21c7:b0:89a:116b:e67d with SMTP id\n 6a1803df08f44-8b668c10b2emr11386756d6.37.1777660444861;\n        Fri, 01 May 2026 11:34:04 -0700 (PDT)",
        "From": "Raymond Mao <raymondmaoca@gmail.com>",
        "To": "opensbi@lists.infradead.org",
        "Cc": "scott@riscstar.com,\n\tdave.patel@riscstar.com,\n\traymond.mao@riscstar.com,\n\trobin.randhawa@sifive.com,\n\tsamuel.holland@sifive.com,\n\tanup.patel@qti.qualcomm.com,\n\tanuppate@qti.qualcomm.com,\n\tanup@brainfault.org,\n\tdhaval@rivosinc.com,\n\tpeter.lin@sifive.com",
        "Subject": "[RFC PATCH 0/3] Add QEMU virt WorldGuard support on top of HWISO",
        "Date": "Fri,  1 May 2026 14:33:43 -0400",
        "Message-Id": "<20260501183346.1596027-1-raymondmaoca@gmail.com>",
        "X-Mailer": "git-send-email 2.25.1",
        "MIME-Version": "1.0",
        "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ",
        "X-CRM114-CacheID": "sfid-20260501_113407_301704_C6E92790 ",
        "X-CRM114-Status": "GOOD (  11.02  )",
        "X-Spam-Score": "-2.1 (--)",
        "X-Spam-Report": "Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  From: Raymond Mao This series adds an WorldGuard\n implementation\n    for OpenSBI on top of previous hardware-isolation framework (HWISO) RFC\n [1].\n    The goal is to let OpenSBI program platform WorldGuard checker state at\n boot\n    and reprogram WorldGuard hart state during domain transitions. The current\n    RFC targets the QEMU virt WorldGuard model on to [...]\n Content analysis details:   (-2.1 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n -0.0 RCVD_IN_DNSWL_NONE     RBL: Sender listed at https://www.dnswl.org/, no\n                             trust\n                             [2607:f8b0:4864:20:0:0:0:f2a listed in]\n                             [list.dnswl.org]\n -0.0 SPF_PASS               SPF: sender matches SPF record\n  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature\n -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n                             [score: 0.0000]\n  0.0 FREEMAIL_FROM          Sender email is commonly abused enduser mail\n provider\n                             [raymondmaoca(at)gmail.com]",
        "X-BeenThere": "opensbi@lists.infradead.org",
        "X-Mailman-Version": "2.1.34",
        "Precedence": "list",
        "List-Id": "<opensbi.lists.infradead.org>",
        "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/opensbi>,\n <mailto:opensbi-request@lists.infradead.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.infradead.org/pipermail/opensbi/>",
        "List-Post": "<mailto:opensbi@lists.infradead.org>",
        "List-Help": "<mailto:opensbi-request@lists.infradead.org?subject=help>",
        "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/opensbi>,\n <mailto:opensbi-request@lists.infradead.org?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Sender": "\"opensbi\" <opensbi-bounces@lists.infradead.org>",
        "Errors-To": "opensbi-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"
    },
    "content": "From: Raymond Mao <raymond.mao@riscstar.com>\n\nThis series adds an WorldGuard implementation for OpenSBI on top of\nprevious hardware-isolation framework (HWISO) RFC [1].\n\nThe goal is to let OpenSBI program platform WorldGuard checker state\nat boot and reprogram WorldGuard hart state during domain transitions.\nThe current RFC targets the QEMU virt WorldGuard model on top of the\nproposed generic HWISO hooks.\n\nThis series does the following:\n1. Add the WorldGuard CSR definitions and hart extension flags needed\n   to detect support for MLWID, MWIDDELEG, and SLWID.\n2. Document the HWISO/WorldGuard DT bindings and add a QEMU virt\n   overlay example for domain WID/WID list assignment and checker\n   permissions.\n3. Add a QEMU virt WorldGuard HWISO mechanism that:\n   - parses checker topology and protected resource permissions from\n     DT\n   - programs wgChecker MMIO state at boot\n   - parses per-hart default WorldGuard execution state\n   - parses per-domain WorldGuard metadata\n   - reprograms MLWID, MWIDDELEG, and SLWID on domain transitions\n\n[1] [RFC PATCH] sbi: add hardware isolation abstraction framework\nhttps://lore.kernel.org/opensbi/20260317201849.903071-1-raymondmaoca@gmail.com/\n\nRaymond Mao (3):\n  hart: add WorldGuard CSR IDs and hart extension flags\n  docs: document hwiso WorldGuard DT bindings and add QEMU overlay\n    example\n  platform: virt: add QEMU virt WorldGuard hwiso mechanism\n\n docs/domain_support.md                        |  159 +++\n include/sbi/riscv_encoding.h                  |    3 +\n include/sbi/sbi_hart.h                        |    4 +\n lib/sbi/sbi_hart.c                            |    2 +\n platform/generic/include/qemu_virt_wg.h       |   60 +\n platform/generic/objects.mk                   |    1 +\n platform/generic/platform.c                   |   11 +\n .../generic/virt/qemu-virt-hwiso-overlay.dts  |  120 ++\n platform/generic/virt/qemu_virt_wgchecker.c   | 1050 +++++++++++++++++\n 9 files changed, 1410 insertions(+)\n create mode 100644 platform/generic/include/qemu_virt_wg.h\n create mode 100644 platform/generic/virt/qemu-virt-hwiso-overlay.dts\n create mode 100644 platform/generic/virt/qemu_virt_wgchecker.c"
}