Show a cover letter.

GET /api/covers/2146083/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2146083,
    "url": "http://patchwork.ozlabs.org/api/covers/2146083/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/uboot/cover/20251006101057.4172248-1-anshuld@ti.com/",
    "project": {
        "id": 18,
        "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api",
        "name": "U-Boot",
        "link_name": "uboot",
        "list_id": "u-boot.lists.denx.de",
        "list_email": "u-boot@lists.denx.de",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20251006101057.4172248-1-anshuld@ti.com>",
    "list_archive_url": null,
    "date": "2025-10-06T10:10:48",
    "name": "[-next,v3,0/7] Add support for secure falcon mode: disable fallback",
    "submitter": {
        "id": 90324,
        "url": "http://patchwork.ozlabs.org/api/people/90324/?format=api",
        "name": "Anshul Dalal",
        "email": "anshuld@ti.com"
    },
    "mbox": "http://patchwork.ozlabs.org/project/uboot/cover/20251006101057.4172248-1-anshuld@ti.com/mbox/",
    "series": [
        {
            "id": 476383,
            "url": "http://patchwork.ozlabs.org/api/series/476383/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=476383",
            "date": "2025-10-06T10:10:48",
            "name": "Add support for secure falcon mode: disable fallback",
            "version": 3,
            "mbox": "http://patchwork.ozlabs.org/series/476383/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/covers/2146083/comments/",
    "headers": {
        "Return-Path": "<u-boot-bounces@lists.denx.de>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=ti.com header.i=@ti.com header.a=rsa-sha256\n header.s=ti-com-17Q1 header.b=RO/m/De7;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=85.214.62.61; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)",
            "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=ti.com",
            "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de",
            "phobos.denx.de;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=ti.com header.i=@ti.com header.b=\"RO/m/De7\";\n\tdkim-atps=neutral",
            "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=ti.com",
            "phobos.denx.de; spf=pass smtp.mailfrom=anshuld@ti.com"
        ],
        "Received": [
            "from phobos.denx.de (phobos.denx.de [85.214.62.61])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4cgFR54Xd2z1yGb\n\tfor <incoming@patchwork.ozlabs.org>; Mon,  6 Oct 2025 21:11:13 +1100 (AEDT)",
            "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id D73BC8361E;\n\tMon,  6 Oct 2025 12:11:08 +0200 (CEST)",
            "by phobos.denx.de (Postfix, from userid 109)\n id 69DEE8361E; Mon,  6 Oct 2025 12:11:08 +0200 (CEST)",
            "from fllvem-ot04.ext.ti.com (fllvem-ot04.ext.ti.com [198.47.19.246])\n (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n bits)) (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id CD31282E34\n for <u-boot@lists.denx.de>; Mon,  6 Oct 2025 12:11:05 +0200 (CEST)",
            "from fllvem-sh04.itg.ti.com ([10.64.41.54])\n by fllvem-ot04.ext.ti.com (8.15.2/8.15.2) with ESMTP id 596AB1sY3977139;\n Mon, 6 Oct 2025 05:11:01 -0500",
            "from DLEE106.ent.ti.com (dlee106.ent.ti.com [157.170.170.36])\n by fllvem-sh04.itg.ti.com (8.18.1/8.18.1) with ESMTPS id 596AB1WE4044589\n (version=TLSv1.2 cipher=ECDHE-RSA-AES128-SHA256 bits=128 verify=FAIL);\n Mon, 6 Oct 2025 05:11:01 -0500",
            "from DLEE201.ent.ti.com (157.170.170.76) by DLEE106.ent.ti.com\n (157.170.170.36) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2507.55; Mon, 6\n Oct 2025 05:11:00 -0500",
            "from lelvem-mr06.itg.ti.com (10.180.75.8) by DLEE201.ent.ti.com\n (157.170.170.76) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20 via Frontend\n Transport; Mon, 6 Oct 2025 05:11:00 -0500",
            "from localhost (dhcp-172-24-233-105.dhcp.ti.com [172.24.233.105])\n by lelvem-mr06.itg.ti.com (8.18.1/8.18.1) with ESMTP id 596AAx9T3268452;\n Mon, 6 Oct 2025 05:11:00 -0500"
        ],
        "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-2.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,\n DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,\n RCVD_IN_DNSWL_BLOCKED,RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,\n RCVD_IN_VALIDITY_RPBL_BLOCKED,SPF_HELO_PASS,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com;\n s=ti-com-17Q1; t=1759745461;\n bh=GSdgNLs4WiKyW/9blI9OHa4wMeFK8CcqcruCr4zwiok=;\n h=From:To:CC:Subject:Date;\n b=RO/m/De7APSBzwT6De8EDTzup675XpjABUSEEJ63Ko0mnoWepdtXKI5yCFBw/55ai\n vJutVHs/n/WyhjIQ1XQV1ITFJQFXr/hrebm60pMJ7mxUWwgdTeKjOwtdbbm5uqsKq3\n e3PMS334PA9lrD7zc7zXctPlHsXMTRUpkOxY0DD0=",
        "From": "Anshul Dalal <anshuld@ti.com>",
        "To": "<u-boot@lists.denx.de>",
        "CC": "Anshul Dalal <anshuld@ti.com>, <vigneshr@ti.com>, <trini@konsulko.com>,\n <afd@ti.com>, <m-chawdhry@ti.com>, <n-francis@ti.com>, <b-liu@ti.com>,\n <nm@ti.com>, <bb@ti.com>, <kever.yang@rock-chips.com>,\n <hl@rock-chips.com>, <tim@feathertop.org>,\n <marek.vasut+renesas@mailbox.org>",
        "Subject": "[PATCH -next v3 0/7] Add support for secure falcon mode: disable\n fallback",
        "Date": "Mon, 6 Oct 2025 15:40:48 +0530",
        "Message-ID": "<20251006101057.4172248-1-anshuld@ti.com>",
        "X-Mailer": "git-send-email 2.51.0",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-C2ProcessedOrg": "333ef613-75bf-4e12-a4b1-8e3623f5dcea",
        "X-BeenThere": "u-boot@lists.denx.de",
        "X-Mailman-Version": "2.1.39",
        "Precedence": "list",
        "List-Id": "U-Boot discussion <u-boot.lists.denx.de>",
        "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>",
        "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>",
        "List-Post": "<mailto:u-boot@lists.denx.de>",
        "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>",
        "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>",
        "Errors-To": "u-boot-bounces@lists.denx.de",
        "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>",
        "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de",
        "X-Virus-Status": "Clean"
    },
    "content": "Hi all,\n\nContinuing from the last series[1], this patch series addresses the requirement\nof allowing no fallbacks in secure falcon mode.\n\nTo do this in a clean way, all the falcon mode logic for each boot media was\nrefactored to a corresponding *_load_image_os function whereas the regular\nboot is implemented in *_load_image, this allows us to easily return early in\ncase the *_load_image_os function fails with secure mode enabled.\n\nThe series also introduces the new SPL_OS_BOOT_SECURE config symbol which\nenables secure falcon boot flow.\n\nThe generic flow after the patch series looks as follows:\n\n\tstatic int spl_<bootmedia>_load_image(...) {\n\t\tif (CONFIG_IS_ENABLED(OS_BOOT)) {\n\n\t\t\tret = spl_<bootmedia>_load_image_os(...);\n\n\t\t\tputs(\"Failcon mode failed\\n\");\n\t\t\tif (CONFIG_IS_ENABLED(OS_BOOT_SECURE)) {\n\t\t\t\tputs(\"no fallback allowed!\\n\");\n\t\t\t\treturn ret;\n\t\t\t}\n\n\t\t\tputs(\"Falling back to U-Boot\\n\");\n\t\t}\n\n\t\t/* Regular boot flow */\n\t}\n\nRegards,\nAnshul\n\n[1]: https://lore.kernel.org/u-boot/20250923124639.667718-1-anshuld@ti.com/\nDepends-on: https://lore.kernel.org/u-boot/20250923124639.667718-1-anshuld@ti.com/\n---\nChanges in v3:\n - Remove the patch enabling SPL_OS_BOOT for TI_SECURE_DEVICE\nv2: https://lore.kernel.org/u-boot/20250923130901.705124-1-anshuld@ti.com/\n\nChanges in v2:\n - Remove extra printf to address SPL size concerns\nv1: https://lore.kernel.org/u-boot/20250916105857.163951-1-anshuld@ti.com/\n---\n\nAnshul Dalal (7):\n  spl: Kconfig: add SPL_OS_BOOT_SECURE config symbol\n  spl: mmc: split spl_mmc_do_fs_boot into regular/os_boot\n  spl: ubi: refactor spl_ubi_load_image for falcon mode\n  spl: spi: refactor spl_spi_load_image for falcon mode\n  spl: nor: refactor spl_nor_load_image for falcon mode\n  spl: nand: refactor spl_nand_load_image for falcon mode\n  spl: falcon: disable fallback to U-Boot on failure\n\n common/spl/Kconfig    |   8 ++++\n common/spl/spl_mmc.c  |  84 ++++++++++++++++++++++------------\n common/spl/spl_nand.c |  95 +++++++++++++++++++++-----------------\n common/spl/spl_nor.c  | 104 ++++++++++++++++++++++++------------------\n common/spl/spl_spi.c  |  33 +++++++++++---\n common/spl/spl_ubi.c  |  46 ++++++++++++++-----\n 6 files changed, 234 insertions(+), 136 deletions(-)"
}