Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2146084/?format=api
{ "id": 2146084, "url": "http://patchwork.ozlabs.org/api/patches/2146084/?format=api", "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/20251006101057.4172248-2-anshuld@ti.com/", "project": { "id": 18, "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api", "name": "U-Boot", "link_name": "uboot", "list_id": "u-boot.lists.denx.de", "list_email": "u-boot@lists.denx.de", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20251006101057.4172248-2-anshuld@ti.com>", "list_archive_url": null, "date": "2025-10-06T10:10:49", "name": "[-next,v3,1/7] spl: Kconfig: add SPL_OS_BOOT_SECURE config symbol", "commit_ref": null, "pull_url": null, "state": "changes-requested", "archived": false, "hash": "31c90a072d49515dde8c08b03cf4a3aa6379adb8", "submitter": { "id": 90324, "url": "http://patchwork.ozlabs.org/api/people/90324/?format=api", "name": "Anshul Dalal", "email": "anshuld@ti.com" }, "delegate": { "id": 3651, "url": "http://patchwork.ozlabs.org/api/users/3651/?format=api", "username": "trini", "first_name": "Tom", "last_name": "Rini", "email": "trini@ti.com" }, "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/20251006101057.4172248-2-anshuld@ti.com/mbox/", "series": [ { "id": 476383, "url": "http://patchwork.ozlabs.org/api/series/476383/?format=api", "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=476383", "date": "2025-10-06T10:10:48", "name": "Add support for secure falcon mode: disable fallback", "version": 3, "mbox": "http://patchwork.ozlabs.org/series/476383/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2146084/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2146084/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<u-boot-bounces@lists.denx.de>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=ti.com header.i=@ti.com header.a=rsa-sha256\n header.s=ti-com-17Q1 header.b=IOjD9bqv;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)", "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=ti.com", "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de", "phobos.denx.de;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=ti.com header.i=@ti.com header.b=\"IOjD9bqv\";\n\tdkim-atps=neutral", "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=ti.com", "phobos.denx.de; spf=pass smtp.mailfrom=anshuld@ti.com" ], "Received": [ "from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4cgFRC65bsz1yGb\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 6 Oct 2025 21:11:19 +1100 (AEDT)", "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 25EF9835FE;\n\tMon, 6 Oct 2025 12:11:11 +0200 (CEST)", "by phobos.denx.de (Postfix, from userid 109)\n id E5AF383653; Mon, 6 Oct 2025 12:11:08 +0200 (CEST)", "from fllvem-ot03.ext.ti.com (fllvem-ot03.ext.ti.com [198.47.19.245])\n (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n bits)) (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id EB13C835C6\n for <u-boot@lists.denx.de>; Mon, 6 Oct 2025 12:11:06 +0200 (CEST)", "from fllvem-sh04.itg.ti.com ([10.64.41.54])\n by fllvem-ot03.ext.ti.com (8.15.2/8.15.2) with ESMTP id 596AB3pH3526633;\n Mon, 6 Oct 2025 05:11:03 -0500", "from DLEE103.ent.ti.com (dlee103.ent.ti.com [157.170.170.33])\n by fllvem-sh04.itg.ti.com (8.18.1/8.18.1) with ESMTPS id 596AB3HT4044645\n (version=TLSv1.2 cipher=ECDHE-RSA-AES128-SHA256 bits=128 verify=FAIL);\n Mon, 6 Oct 2025 05:11:03 -0500", "from DLEE215.ent.ti.com (157.170.170.118) by DLEE103.ent.ti.com\n (157.170.170.33) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2507.55; Mon, 6\n Oct 2025 05:11:02 -0500", "from lelvem-mr05.itg.ti.com (10.180.75.9) by DLEE215.ent.ti.com\n (157.170.170.118) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20 via Frontend\n Transport; Mon, 6 Oct 2025 05:11:02 -0500", "from localhost (dhcp-172-24-233-105.dhcp.ti.com [172.24.233.105])\n by lelvem-mr05.itg.ti.com (8.18.1/8.18.1) with ESMTP id 596AB10s3511531;\n Mon, 6 Oct 2025 05:11:02 -0500" ], "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de", "X-Spam-Level": "", "X-Spam-Status": "No, score=-2.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,\n DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,\n RCVD_IN_DNSWL_BLOCKED,RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,\n RCVD_IN_VALIDITY_RPBL_BLOCKED,SPF_HELO_PASS,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com;\n s=ti-com-17Q1; t=1759745463;\n bh=Jp7/xafMm6l8fNlv2qqj/gkubkkiSITH99AaRYmBEsY=;\n h=From:To:CC:Subject:Date:In-Reply-To:References;\n b=IOjD9bqvjoqshOfQyk2vLZo+w4FODAxrFrg4RUDW+0UdrzCrTDaGoqHmBTq42VtF2\n /q9/AjAQKb5BZX8G3JZ37nZv+SOTY4V46L9SVB9dfTjZoA/rHfiYuqQxyyL86Kef1s\n yVmQmik5FzekyaWH79gG5WocTU6YxbcS/VRQ0tdg=", "From": "Anshul Dalal <anshuld@ti.com>", "To": "<u-boot@lists.denx.de>", "CC": "Anshul Dalal <anshuld@ti.com>, <vigneshr@ti.com>, <trini@konsulko.com>,\n <afd@ti.com>, <m-chawdhry@ti.com>, <n-francis@ti.com>, <b-liu@ti.com>,\n <nm@ti.com>, <bb@ti.com>, <kever.yang@rock-chips.com>,\n <hl@rock-chips.com>, <tim@feathertop.org>,\n <marek.vasut+renesas@mailbox.org>", "Subject": "[PATCH -next v3 1/7] spl: Kconfig: add SPL_OS_BOOT_SECURE config\n symbol", "Date": "Mon, 6 Oct 2025 15:40:49 +0530", "Message-ID": "<20251006101057.4172248-2-anshuld@ti.com>", "X-Mailer": "git-send-email 2.51.0", "In-Reply-To": "<20251006101057.4172248-1-anshuld@ti.com>", "References": "<20251006101057.4172248-1-anshuld@ti.com>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "Content-Type": "text/plain", "X-C2ProcessedOrg": "333ef613-75bf-4e12-a4b1-8e3623f5dcea", "X-BeenThere": "u-boot@lists.denx.de", "X-Mailman-Version": "2.1.39", "Precedence": "list", "List-Id": "U-Boot discussion <u-boot.lists.denx.de>", "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>", "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>", "List-Post": "<mailto:u-boot@lists.denx.de>", "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>", "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>", "Errors-To": "u-boot-bounces@lists.denx.de", "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>", "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de", "X-Virus-Status": "Clean" }, "content": "This patch adds the new SPL_OS_BOOT_SECURE symbol that enables secure\nboot flow in falcon mode. This symbol can be used to disable certain\ninherently insecure options during falcon boot.\n\nReviewed-by: Tom Rini <trini@konsulko.com>\nSigned-off-by: Anshul Dalal <anshuld@ti.com>\n---\n common/spl/Kconfig | 8 ++++++++\n 1 file changed, 8 insertions(+)", "diff": "diff --git a/common/spl/Kconfig b/common/spl/Kconfig\nindex f34b96efc02..f20651c3769 100644\n--- a/common/spl/Kconfig\n+++ b/common/spl/Kconfig\n@@ -1206,6 +1206,14 @@ config SPL_OS_BOOT\n \t Enable booting directly to an OS from SPL.\n \t for more info read doc/README.falcon\n \n+config SPL_OS_BOOT_SECURE\n+\tbool \"Allow Falcon Mode on secure devices\"\n+\tdepends on SPL_OS_BOOT\n+\thelp\n+\t This allows for secure devices with signature verification capabilities\n+\t to use falcon mode by disabling certain inherently non-securable options\n+\t in the SPL boot flow.\n+\n config SPL_PAYLOAD_ARGS_ADDR\n \thex \"Address in memory to load 'args' file for Falcon Mode to\"\n \tdepends on SPL_OS_BOOT || SPL_LOAD_FIT_OPENSBI_OS_BOOT\n", "prefixes": [ "-next", "v3", "1/7" ] }