Show a cover letter.

GET /api/covers/2195669/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2195669,
    "url": "http://patchwork.ozlabs.org/api/covers/2195669/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/uboot/cover/cover.1770825377.git.michal.simek@amd.com/",
    "project": {
        "id": 18,
        "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api",
        "name": "U-Boot",
        "link_name": "uboot",
        "list_id": "u-boot.lists.denx.de",
        "list_email": "u-boot@lists.denx.de",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<cover.1770825377.git.michal.simek@amd.com>",
    "list_archive_url": null,
    "date": "2026-02-11T15:56:19",
    "name": "[v8,0/4] efi_vars: Implement SPI Flash storage for EFI",
    "submitter": {
        "id": 84271,
        "url": "http://patchwork.ozlabs.org/api/people/84271/?format=api",
        "name": "Michal Simek",
        "email": "michal.simek@amd.com"
    },
    "mbox": "http://patchwork.ozlabs.org/project/uboot/cover/cover.1770825377.git.michal.simek@amd.com/mbox/",
    "series": [
        {
            "id": 491869,
            "url": "http://patchwork.ozlabs.org/api/series/491869/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=491869",
            "date": "2026-02-11T15:56:20",
            "name": "efi_vars: Implement SPI Flash storage for EFI",
            "version": 8,
            "mbox": "http://patchwork.ozlabs.org/series/491869/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/covers/2195669/comments/",
    "headers": {
        "Return-Path": "<u-boot-bounces@lists.denx.de>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=amd.com header.i=@amd.com header.a=rsa-sha256\n header.s=selector1 header.b=yhE3IsqX;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)",
            "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=amd.com",
            "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de",
            "phobos.denx.de;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=amd.com header.i=@amd.com header.b=\"yhE3IsqX\";\n\tdkim-atps=neutral",
            "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=amd.com",
            "phobos.denx.de;\n spf=fail smtp.mailfrom=michal.simek@amd.com"
        ],
        "Received": [
            "from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fB33D13dDz1xtr\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 12 Feb 2026 02:57:12 +1100 (AEDT)",
            "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 01A9A8388D;\n\tWed, 11 Feb 2026 16:56:55 +0100 (CET)",
            "by phobos.denx.de (Postfix, from userid 109)\n id 2716B83D71; Wed, 11 Feb 2026 16:56:54 +0100 (CET)",
            "from PH0PR06CU001.outbound.protection.outlook.com\n (mail-westus3azlp170110003.outbound.protection.outlook.com\n [IPv6:2a01:111:f403:c107::3])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id 66E2383015\n for <u-boot@lists.denx.de>; Wed, 11 Feb 2026 16:56:47 +0100 (CET)",
            "from BL1PR13CA0197.namprd13.prod.outlook.com (2603:10b6:208:2be::22)\n by SA1PR12MB6894.namprd12.prod.outlook.com (2603:10b6:806:24d::13)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9611.10; Wed, 11 Feb\n 2026 15:56:37 +0000",
            "from BL02EPF0002992E.namprd02.prod.outlook.com\n (2603:10b6:208:2be:cafe::31) by BL1PR13CA0197.outlook.office365.com\n (2603:10b6:208:2be::22) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9587.17 via Frontend Transport; Wed,\n 11 Feb 2026 15:56:31 +0000",
            "from satlexmb08.amd.com (165.204.84.17) by\n BL02EPF0002992E.mail.protection.outlook.com (10.167.249.59) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.9611.8 via Frontend Transport; Wed, 11 Feb 2026 15:56:36 +0000",
            "from Satlexmb09.amd.com (10.181.42.218) by satlexmb08.amd.com\n (10.181.42.217) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Wed, 11 Feb\n 2026 09:56:36 -0600",
            "from satlexmb07.amd.com (10.181.42.216) by satlexmb09.amd.com\n (10.181.42.218) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Wed, 11 Feb\n 2026 07:56:35 -0800",
            "from localhost (10.180.168.240) by satlexmb07.amd.com\n (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17 via Frontend\n Transport; Wed, 11 Feb 2026 09:56:34 -0600"
        ],
        "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,\n DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,\n RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2",
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=D4tTbVYHpU9OalhjgTaaRYTReKJo41gcul5bFi2yZbb+3LGfQQIP2lcsYnd7TcIRweTs5AVdnKfzZL02rc7tYmqiHg4dRalpCkO3Ws3xRZtbH+2ZYxnAnaakR8QnXQNJYCOhV991AyOMxyXdlcmzuZ/3qgnIsTvc+jnra2srpzCUW1ufqNluiSdI1HV9H+KYS/7Fgpofokzc3JvLfcm8XAy7x/ASMyeBZqGMLdorLJda4c5VXUIGwug5AV4uuiM+OIXAThJ1xwLV4o5QFBnk4L2dpz9SAF6dfe3jiaTaU2FBWXe1YhdyP9EmQ8jlRT/GnzygzZeaeQDPq7Z4aFotTQ==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=zpIOiOWGOsurqZkWVuaVdVrNBZNE2OOvAqKRNUHkEJQ=;\n b=T6KrfZbhGjVptfIx++3xCpfOFKAOHoGVY7IiQBlN8VP4aV6XWM0NavDTdUyXb98JdcvpTz98tWi7d0tcush92Zn/tVt/dGTDkdmhawodW4UFbpKU6A5Orz7hkpVQJ+7Tx8FniTNLlEJOTE/YonXzwGZILAtMU1hNC3/G/fTYkbybcLPUtiqvV6+di4OTNWRlAFEyvrhraxIPo7l6UgVLq5bruk/ywSYE+ekNOx4nyL+WRM8PkvL0HErLg0jd0Q1GHlz9veiRdg0cXhtQRaIcnN1e0gSzobBMMDvHqmkDQyaV9+AV0R54T+6IvUs3IgBJKVzXawIkBx73iPrEibsu+Q==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 165.204.84.17) smtp.rcpttodomain=lists.denx.de smtp.mailfrom=amd.com;\n dmarc=pass (p=quarantine sp=quarantine pct=100) action=none\n header.from=amd.com; dkim=none (message not signed); arc=none (0)",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=zpIOiOWGOsurqZkWVuaVdVrNBZNE2OOvAqKRNUHkEJQ=;\n b=yhE3IsqX2utAjjQ0jbvMQ6JLIjjRZDqsO46T8IA3N4AajT1ZtOEVlMjpKxtc1m6bZERSidiWrETeNb+CMOJGpUYMgVnsiJ0AIQTGgA9BkDP+XTpVZHIabEpGW0yOW8NLnid5qJo3sUu0bgQQmwwFYKxt+cu51JxiFTuk++H6hsY=",
        "X-MS-Exchange-Authentication-Results": "spf=pass (sender IP is 165.204.84.17)\n smtp.mailfrom=amd.com; dkim=none (message not signed)\n header.d=none;dmarc=pass action=none header.from=amd.com;",
        "Received-SPF": "Pass (protection.outlook.com: domain of amd.com designates\n 165.204.84.17 as permitted sender) receiver=protection.outlook.com;\n client-ip=165.204.84.17; helo=satlexmb08.amd.com; pr=C",
        "From": "Michal Simek <michal.simek@amd.com>",
        "To": "<u-boot@lists.denx.de>, <git@amd.com>",
        "CC": "Heinrich Schuchardt <xypron.glpk@gmx.de>, Ilias Apalodimas\n <ilias.apalodimas@linaro.org>, Jan Kiszka <jan.kiszka@siemens.com>, \"Jonathan\n Humphreys\" <j-humphreys@ti.com>, Neil Armstrong <neil.armstrong@linaro.org>,\n Pranav Tilak <pranav.vinaytilak@amd.com>, Shantur Rathore <i@shantur.com>,\n Simon Glass <sjg@chromium.org>, Sughosh Ganu <sughosh.ganu@arm.com>, Tom Rini\n <trini@konsulko.com>, \"Ying-Chun Liu (PaulLiu)\" <paul.liu@linaro.org>",
        "Subject": "[PATCH v8 0/4] efi_vars: Implement SPI Flash storage for EFI",
        "Date": "Wed, 11 Feb 2026 16:56:19 +0100",
        "Message-ID": "<cover.1770825377.git.michal.simek@amd.com>",
        "X-Mailer": "git-send-email 2.43.0",
        "MIME-Version": "1.0",
        "X-Developer-Signature": "v=1; a=openpgp-sha256; l=3006; i=michal.simek@amd.com;\n h=from:subject:message-id; bh=t/wTbpljg1saJkNWfd9gEJqqr+iEKPL5FRkZuPI15rU=;\n b=owGbwMvMwCG2mv3fB7+vgl8ZT6slMWT2LFsZuLVasXuubf+GdLfubdmzJebOvR3O7PkjpOPyv\n gtC0y5Ud5SyMIhxMMiKKbJMZ9JxWPPt2lKx5ZH5MHNYmUCGMHBxCsBElIMYGf6WVfcWmPZ1X3jP\n +PchjyHja+VoQe7K6FqeryorU1VszRn+ittWVdVF7+N8rfX+1qOpjMrXLsYXJS2Jbs5o3rhmksA\n 7ZgA=",
        "X-Developer-Key": "i=michal.simek@amd.com; a=openpgp;\n fpr=67350C9BF5CCEE9B5364356A377C7F21FE3D1F91",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-EOPAttributedMessage": "0",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-TrafficTypeDiagnostic": "BL02EPF0002992E:EE_|SA1PR12MB6894:EE_",
        "X-MS-Office365-Filtering-Correlation-Id": "e75524e1-e32b-4b28-99c3-08de698622f5",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;\n ARA:13230040|1800799024|376014|7416014|82310400026|36860700013|13003099007;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "CIP:165.204.84.17; CTRY:US; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:satlexmb08.amd.com; PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(1800799024)(376014)(7416014)(82310400026)(36860700013)(13003099007);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n gcaGaks121SVl5WRGmmm91UGpJHtZrKpCU7Brnr+5HNbNUvTmBNrIv6KlKGEQdG1f87Ci4+DYP2ZNlNTTpkbWtGCGefqRATkiGUOlubqGyNjcowvHrsK+qFT6mAXucvjE2K9LwKy/svYH3WIL+HYlspF+0gjTROIdrjuKGduL3ybsGLQ5lP76rtQ6+X3dOGVFnR3o3kO/uxPAXpXrCFoe4EWLMwS63f4wrzRJd/RgN2ntU+oowjYHifZKFYbRHSz+0PvSuxzyPHayGl+rB9zylXfwbU85xmctOYC4fq1nTdMnbaBeA8APd/GwmJxLkau/jTUP/QGhsKQg3vQveBd5w1TyM03PEN0I4Ze/h1/a6vrro3UfcUtimIOX38FlJU2lD+Uv0E0INRVyG/LwWeKFd2kyH3Q+BnsYMYmsGa7yWszyVNIBr30TKnyLhoHB59G",
        "X-OriginatorOrg": "amd.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "11 Feb 2026 15:56:36.5788 (UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n e75524e1-e32b-4b28-99c3-08de698622f5",
        "X-MS-Exchange-CrossTenant-Id": "3dd8961f-e488-4e60-8e11-a82d994e183d",
        "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d; Ip=[165.204.84.17];\n Helo=[satlexmb08.amd.com]",
        "X-MS-Exchange-CrossTenant-AuthSource": "\n BL02EPF0002992E.namprd02.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "SA1PR12MB6894",
        "X-BeenThere": "u-boot@lists.denx.de",
        "X-Mailman-Version": "2.1.39",
        "Precedence": "list",
        "List-Id": "U-Boot discussion <u-boot.lists.denx.de>",
        "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>",
        "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>",
        "List-Post": "<mailto:u-boot@lists.denx.de>",
        "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>",
        "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>",
        "Errors-To": "u-boot-bounces@lists.denx.de",
        "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>",
        "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de",
        "X-Virus-Status": "Clean"
    },
    "content": "This is updated series based on v3 version sent here\nhttps://lore.kernel.org/all/20231126220836.374956-1-i@shantur.com/\n\nthat's why I am continuing on v4 instead of starting from scratch.\n\nTested on kv260 with saving variables to location where User MTD partition\nis.\nCONFIG_EFI_VARIABLE_SF_STORE=y\nCONFIG_EFI_RT_VOLATILE_STORE=y\nCONFIG_EFI_VARIABLE_SF_OFFSET=0x22a0000\n\nIn Linux:\nroot@som:~# mount | grep efivars\nnone on /sys/firmware/efi/efivars type efivarfs (rw,relatime)\nroot@som:~# printf '\\x07\\x00\\x00\\x00Hello' \\\n  | sudo tee /sys/firmware/efi/efivars/TestVar-12345678-1234-1234-1234-123456789abc\nHelloroot@som:~#\nroot@som:~# dd if=/sys/firmware/efi/efivars/VarToFile-b2ac5fc9-92b7-4acd-aeac-11e818c3130c \\\n       of=/tmp/vars skip=4 bs=1\n1352+0 records in\n1352+0 records out\n1352 bytes (1.4 kB, 1.3 KiB) copied, 0.380992 s, 3.5 kB/s\nroot@som:~# flashcp /tmp/vars /dev/mtd16\nroot@som:~# reboot\n\nReboot and then in U-Boot:\n\nZynqMP> pri -e\n...\nTestVar:\n    12345678-1234-1234-1234-123456789abc (12345678-1234-1234-1234-123456789abc)\n    NV|BS|RT, DataSize = 0x5\n    00000000: 48 65 6c 6c 6f                                   Hello\n...\n\nThanks,\nMichal\n\nChanges in v8:\n- new patch\n- Add missing EFI_VARIABLE_SF_STORE dependency to EFI_VARIABLE_SF_DEVICE_INDEX\n\nChanges in v7:\n- sed -i 's/efi_var_from/efi_var_from_storage/g'\n- sed -i 's/efi_var_from/efi_var_from_storage/g'\n\nChanges in v6:\n- Return EFI_SUCCESS in efi_set_variable_int() when\n  CONFIG_EFI_VARIABLE_NO_STORE is enabled\n- sed -i 's/efi_var_read/efi_var_from/g'\n- sed -i 's/efi_var_write/efi_var_to_storage/g'\n- sed -i 's/efi_var_read/efi_var_from/g'\n- sed -i 's/efi_var_write/efi_var_to_storage/g'\n\nChanges in v5:\n- Invert logic in efi_variable.c and avoid #if\n\nChanges in v4:\n- New patch based on review comments from v3\n- Extend Kconfig description\n- Extend commit message and describe efivar missing part\n- use unify methods for reading/writing variable\n\nChanges in v3:\n- Fixed compiler warnings.\n\nChanges in v2:\n- Refactored efi_var_file to move common parts out as requested\n- Changed ifdefs to use CONFIG_IS_DEFINED\n- Fixed typos\n\nMichal Simek (2):\n  efi_var: Unify read/write access helper function\n  efi_loader: Setup default location for UEFI Variables storing\n\nShantur Rathore (2):\n  efi_var_file: refactor to move buffer functions\n  efi_vars: Implement SPI Flash store\n\n include/efi_variable.h          | 18 +++----\n lib/efi_loader/Kconfig          | 38 +++++++++++++-\n lib/efi_loader/Makefile         |  3 +-\n lib/efi_loader/efi_var_common.c | 42 +++++++++++++++\n lib/efi_loader/efi_var_file.c   | 65 ++---------------------\n lib/efi_loader/efi_var_sf.c     | 92 +++++++++++++++++++++++++++++++++\n lib/efi_loader/efi_variable.c   | 19 ++++---\n 7 files changed, 198 insertions(+), 79 deletions(-)\n create mode 100644 lib/efi_loader/efi_var_sf.c"
}