Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2196894/?format=api
{ "id": 2196894, "url": "http://patchwork.ozlabs.org/api/patches/2196894/?format=api", "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/f49e4ac8da5bae9252c79031f1661f386d17895f.1771247847.git.michal.simek@amd.com/", "project": { "id": 18, "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api", "name": "U-Boot", "link_name": "uboot", "list_id": "u-boot.lists.denx.de", "list_email": "u-boot@lists.denx.de", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<f49e4ac8da5bae9252c79031f1661f386d17895f.1771247847.git.michal.simek@amd.com>", "list_archive_url": null, "date": "2026-02-16T13:17:30", "name": "[v9] efi_vars: Implement SPI Flash store", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "c1c9e5daebbac73f20b06f7e0a1786eb4c3dc4c1", "submitter": { "id": 84271, "url": "http://patchwork.ozlabs.org/api/people/84271/?format=api", "name": "Michal Simek", "email": "michal.simek@amd.com" }, "delegate": { "id": 68728, "url": "http://patchwork.ozlabs.org/api/users/68728/?format=api", "username": "xypron", "first_name": "Heinrich", "last_name": "Schuchardt", "email": "xypron.glpk@gmx.de" }, "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/f49e4ac8da5bae9252c79031f1661f386d17895f.1771247847.git.michal.simek@amd.com/mbox/", "series": [ { "id": 492308, "url": "http://patchwork.ozlabs.org/api/series/492308/?format=api", "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=492308", "date": "2026-02-16T13:17:30", "name": "[v9] efi_vars: Implement SPI Flash store", "version": 9, "mbox": "http://patchwork.ozlabs.org/series/492308/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2196894/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2196894/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<u-boot-bounces@lists.denx.de>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=amd.com header.i=@amd.com header.a=rsa-sha256\n header.s=selector1 header.b=Nsww5hg1;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)", "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=amd.com", "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de", "phobos.denx.de;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=amd.com header.i=@amd.com header.b=\"Nsww5hg1\";\n\tdkim-atps=neutral", "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=amd.com", "phobos.denx.de;\n spf=fail smtp.mailfrom=michal.simek@amd.com" ], "Received": [ "from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fF3HH3GXVz1xtN\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 17 Feb 2026 00:18:03 +1100 (AEDT)", "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id A40A880FA1;\n\tMon, 16 Feb 2026 14:17:54 +0100 (CET)", "by phobos.denx.de (Postfix, from userid 109)\n id 7EEB7831AC; Mon, 16 Feb 2026 14:17:53 +0100 (CET)", "from CH4PR04CU002.outbound.protection.outlook.com\n (mail-northcentralusazlp170130007.outbound.protection.outlook.com\n [IPv6:2a01:111:f403:c105::7])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id EC0578063E\n for <u-boot@lists.denx.de>; Mon, 16 Feb 2026 14:17:50 +0100 (CET)", "from SA9PR10CA0020.namprd10.prod.outlook.com (2603:10b6:806:a7::25)\n by DM4PR12MB5770.namprd12.prod.outlook.com (2603:10b6:8:61::16) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9611.15; Mon, 16 Feb\n 2026 13:17:45 +0000", "from SA2PEPF0000150A.namprd04.prod.outlook.com\n (2603:10b6:806:a7:cafe::38) by SA9PR10CA0020.outlook.office365.com\n (2603:10b6:806:a7::25) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.15 via Frontend Transport; Mon,\n 16 Feb 2026 13:17:27 +0000", "from satlexmb07.amd.com (165.204.84.17) by\n SA2PEPF0000150A.mail.protection.outlook.com (10.167.242.42) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.9632.12 via Frontend Transport; Mon, 16 Feb 2026 13:17:44 +0000", "from Satlexmb09.amd.com (10.181.42.218) by satlexmb07.amd.com\n (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Mon, 16 Feb\n 2026 07:17:44 -0600", "from satlexmb08.amd.com (10.181.42.217) by satlexmb09.amd.com\n (10.181.42.218) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Mon, 16 Feb\n 2026 05:17:43 -0800", "from localhost (10.180.168.240) by satlexmb08.amd.com\n (10.181.42.217) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17 via Frontend\n Transport; Mon, 16 Feb 2026 07:17:43 -0600" ], "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de", "X-Spam-Level": "", "X-Spam-Status": "No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,\n DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,\n RCVD_IN_DNSWL_BLOCKED,SPF_HELO_PASS,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2", "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=Q7Igb9Ec+WJh7bxZ/ECsWzQsy+P3yAsWCqEX38yzXQU6yS6ZXmltwXBkLdq6DobXRBFcbKrnE2g7srfuRt5e7/DlrObkArwgU+t9UXQvGKdbyJRHivaKEkFD3OHXAqtQO43X+Zb2/SmTPLpCo4DP7tnWl8TorX+VpMv/GRmRwbg02ELAbaw0SWCtmpLNu5jpdu8oWVKuF8Mui4lcjO4nSJixoXKb0jH9z4TWhGbGjHsplTulXbMATiCuJF50o+z/DAsh0MZ5Z5AQ1AuF01FTcIyvqY82ovZDJFYNHhVAu+nzr831txUb4pQqIPZ74d07WJrjysz+glFY4Oa+nMUz9w==", "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=hqF9UIMVxR42jqrezXuDMjYw1x24gWiSy9oxOoM42Jw=;\n b=MWaR5FEc+7JYJU1Wdn1raYjjPhGeDcGYyoRSXn8fHUcijMcV8dvQf7qNhfQDfWYND9h8kIcBqjHHf4rOUvKinm0mcD4QvktFe0iXBDoa+G7s6pOp8MnxZqX+NUcaPCk/xK/1320PDgD+ly3zP3podpayb7zYdSBPWAyCXGBCQRrXGrVyxkNgUGc9eDgaCGdOr/oeVi8f3rSDr+jgYw9gIzyniVpMBpiXml7r2N14Ic9+zQExO5J8jX5e/LSXYEdlUxuHpUq8zdyd4dA5mZNSR5ioY2inAOz62ILonXlcYSr7wHG1X9V4fmVD55Hijw+6pwCJQA6DjfxzAyuvmDIelQ==", "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 165.204.84.17) smtp.rcpttodomain=lists.denx.de smtp.mailfrom=amd.com;\n dmarc=pass (p=quarantine sp=quarantine pct=100) action=none\n header.from=amd.com; dkim=none (message not signed); arc=none (0)", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=hqF9UIMVxR42jqrezXuDMjYw1x24gWiSy9oxOoM42Jw=;\n b=Nsww5hg1PLMlVAyJeWmaAHQnbkYXpjVVyWvByPxgWd5g5/300qD9ibHZWHdCY/JTB7ELgWBbaWKLyI8hShPlD0um/xkZzUblMqtmQbuSXPVjH8hLiRJjdPBxISYwQhKZroI6r2t3LBgtmwCZXf4p0iGrPGG9jyMMIdmzMByejFw=", "X-MS-Exchange-Authentication-Results": "spf=pass (sender IP is 165.204.84.17)\n smtp.mailfrom=amd.com; dkim=none (message not signed)\n header.d=none;dmarc=pass action=none header.from=amd.com;", "Received-SPF": "Pass (protection.outlook.com: domain of amd.com designates\n 165.204.84.17 as permitted sender) receiver=protection.outlook.com;\n client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C", "From": "Michal Simek <michal.simek@amd.com>", "To": "<u-boot@lists.denx.de>, <git@amd.com>", "CC": "Shantur Rathore <i@shantur.com>, Neil Armstrong\n <neil.armstrong@linaro.org>, Ilias Apalodimas <ilias.apalodimas@linaro.org>,\n Gabriel Dalimonte <gabriel.dalimonte@gmail.com>, Heinrich Schuchardt\n <xypron.glpk@gmx.de>, Jonathan Humphreys <j-humphreys@ti.com>, Simon Glass\n <sjg@chromium.org>, Sughosh Ganu <sughosh.ganu@arm.com>, Tom Rini\n <trini@konsulko.com>, \"Ying-Chun Liu (PaulLiu)\" <paul.liu@linaro.org>", "Subject": "[PATCH v9] efi_vars: Implement SPI Flash store", "Date": "Mon, 16 Feb 2026 14:17:30 +0100", "Message-ID": "\n <f49e4ac8da5bae9252c79031f1661f386d17895f.1771247847.git.michal.simek@amd.com>", "X-Mailer": "git-send-email 2.43.0", "MIME-Version": "1.0", "X-Developer-Signature": "v=1; a=openpgp-sha256; l=6572; i=michal.simek@amd.com;\n h=from:subject:message-id; bh=CTN2BOMh2YkcID/WJCRO7IJA5Hg4+RDqKRq7ZTjRAVg=;\n b=owGbwMvMwCG2mv3fB7+vgl8ZT6slMWROlnjN5RCscHHiwZV7bWc66F6Nebm9OVr6WdrqGrPvX\n F8uer5901HKwiDGwSArpsgynUnHYc23a0vFlkfmw8xhZQIZwsDFKQATuTCPkeF+87xpB3vVL189\n X6e++eGdJo9XoqEdIpOXtflcrfcyLmpgZFi6fWa3JvPM/hjJH/7ilWcTW2fc4ODkfyM3g+3UjFe\n Z2/kB", "X-Developer-Key": "i=michal.simek@amd.com; a=openpgp;\n fpr=67350C9BF5CCEE9B5364356A377C7F21FE3D1F91", "Content-Transfer-Encoding": "8bit", "Content-Type": "text/plain", "X-EOPAttributedMessage": "0", "X-MS-PublicTrafficType": "Email", "X-MS-TrafficTypeDiagnostic": "SA2PEPF0000150A:EE_|DM4PR12MB5770:EE_", "X-MS-Office365-Filtering-Correlation-Id": "145ea0ac-390d-46c5-f55e-08de6d5dc5a9", "X-MS-Exchange-SenderADCheck": "1", "X-MS-Exchange-AntiSpam-Relay": "0", "X-Microsoft-Antispam": "BCL:0;\n ARA:13230040|1800799024|82310400026|36860700013|376014|7416014;", "X-Microsoft-Antispam-Message-Info": "\n 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", "X-Forefront-Antispam-Report": "CIP:165.204.84.17; CTRY:US; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:satlexmb07.amd.com; PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(1800799024)(82310400026)(36860700013)(376014)(7416014);\n DIR:OUT;\n SFP:1101;", "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1", "X-MS-Exchange-AntiSpam-MessageData-0": "\n nZ4u/KEB3n6N/GFz6RzeOu+TSAte3vHjixdgCesp9hvTecGfUKZiVzSJqhlzl6ezB/doNOkKWgQhl/6MCm1iEvy6eYU60q9DKnk6kZQlE5SISJqfzxXJnrLAIgdJvt91AThHv+MXKQov2X6mziSNlR5Tj+HCLplzgNP4bH0ouCfJwNOcNOs6Glff4HKGIky+O7+fIxWrVoje7Do95MgUELRRzxDRbU0NFFzyqFCgaf4SAo7KJIWMroFjZ5pNleKkfYvh3ROAsB1KsQsDYSjslyWZ0ZU4T2vCc9nS3SIbEmjvR9GA6rLoasFcZVVlW1M9SAzXVC/qEpz0lSBVgluQd9811YnXCtDdL3aI/iEk8FgyEPC2vVLpUuYWjqUE2LJQ+CGbR/eWW+KxLSasuA3GpS51UpVlqEvLzgCkqnMnpk201I8EuWmmUKSFNUn4NKw5", "X-OriginatorOrg": "amd.com", "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "16 Feb 2026 13:17:44.8159 (UTC)", "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 145ea0ac-390d-46c5-f55e-08de6d5dc5a9", "X-MS-Exchange-CrossTenant-Id": "3dd8961f-e488-4e60-8e11-a82d994e183d", "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d; Ip=[165.204.84.17];\n Helo=[satlexmb07.amd.com]", "X-MS-Exchange-CrossTenant-AuthSource": "\n SA2PEPF0000150A.namprd04.prod.outlook.com", "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous", "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem", "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DM4PR12MB5770", "X-BeenThere": "u-boot@lists.denx.de", "X-Mailman-Version": "2.1.39", "Precedence": "list", "List-Id": "U-Boot discussion <u-boot.lists.denx.de>", "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>", "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>", "List-Post": "<mailto:u-boot@lists.denx.de>", "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>", "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>", "Errors-To": "u-boot-bounces@lists.denx.de", "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>", "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de", "X-Virus-Status": "Clean" }, "content": "From: Shantur Rathore <i@shantur.com>\n\nCurrently U-Boot uses ESP as storage for EFI variables.\nDevices with SPI Flash are used for storing environment with this\ncommit we allow EFI variables to be stored on SPI Flash.\n\nSigned-off-by: Shantur Rathore <i@shantur.com>\nSigned-off-by: Michal Simek <michal.simek@amd.com>\nTested-by: Neil Armstrong <neil.armstrong@linaro.org> # on AML-S905D3-CC\nAcked-by: Ilias Apalodimas <ilias.apalodimas@linaro.org>\n\n---\n\nChanges in v9:\n- Remove EFI_RT_VOLATILE_STORE enabling\n- Cleanup commit message\n\nChanges in v8:\n- Add missing EFI_VARIABLE_SF_STORE dependency to EFI_VARIABLE_SF_DEVICE_INDEX\n\nChanges in v7:\n- sed -i 's/efi_var_from/efi_var_from_storage/g'\n\nChanges in v6:\n- sed -i 's/efi_var_read/efi_var_from/g'\n- sed -i 's/efi_var_write/efi_var_to_storage/g'\n\nChanges in v4:\n- Extend Kconfig description\n- Extend commit message and describe efivar missing part\n- use unify methods for reading/writing variable\n\nChanges in v3:\n- Fixed compiler warnings.\n\nChanges in v2:\n- Refactored efi_var_file to move common parts out as requested\n- Changed ifdefs to use CONFIG_IS_DEFINED\n- Fixed typos\n\n lib/efi_loader/Kconfig | 33 +++++++++++++\n lib/efi_loader/Makefile | 1 +\n lib/efi_loader/efi_var_sf.c | 92 +++++++++++++++++++++++++++++++++++++\n 3 files changed, 126 insertions(+)\n create mode 100644 lib/efi_loader/efi_var_sf.c", "diff": "diff --git a/lib/efi_loader/Kconfig b/lib/efi_loader/Kconfig\nindex 579eed658801..315dd4f3e794 100644\n--- a/lib/efi_loader/Kconfig\n+++ b/lib/efi_loader/Kconfig\n@@ -124,6 +124,24 @@ config EFI_VARIABLE_FILE_STORE\n \t Select this option if you want non-volatile UEFI variables to be\n \t stored as file /ubootefi.var on the EFI system partition.\n \n+config EFI_VARIABLE_SF_STORE\n+\tbool \"Store non-volatile UEFI variables in SPI Flash\"\n+\tdepends on SPI_FLASH\n+\thelp\n+\t Select this option if you want non-volatile UEFI variables to be\n+\t stored in SPI Flash.\n+\n+\t Define CONFIG_EFI_VARIABLE_SF_OFFSET as offset in SPI Flash to use as\n+\t the storage for variables. CONFIG_EFI_VAR_BUF_SIZE defines the space\n+\t needed.\n+\n+\t Note that SPI Flash devices have a limited number of program/erase\n+\t cycles. Frequent updates to UEFI variables may cause excessive wear\n+\t and can permanently damage the flash device, particularly on SPI NAND\n+\t or low-end SPI NOR parts without wear leveling. This option should be\n+\t used with care on such systems, and is not recommended for platforms\n+\t where UEFI variables are updated frequently.\n+\n config EFI_MM_COMM_TEE\n \tbool \"UEFI variables storage service via the trusted world\"\n \tdepends on OPTEE\n@@ -194,6 +212,21 @@ config FFA_SHARED_MM_BUF_ADDR\n \t the MM SP in secure world.\n \t It is assumed that the MM SP knows the address of the shared MM communication buffer.\n \n+config EFI_VARIABLE_SF_OFFSET\n+\thex \"EFI variables in SPI flash offset\"\n+\tdepends on EFI_VARIABLE_SF_STORE\n+\thelp\n+\t Offset from the start of the SPI Flash where EFI variables will be stored.\n+\t This should be aligned to the sector size of SPI Flash.\n+\n+config EFI_VARIABLE_SF_DEVICE_INDEX\n+\tint \"Device Index for target SPI Flash\"\n+\tdepends on EFI_VARIABLE_SF_STORE\n+\tdefault 0\n+\thelp\n+\t The index of SPI Flash device used for storing EFI variables. This would be\n+\t needed if there are more than 1 SPI Flash devices available to use.\n+\n config EFI_VARIABLES_PRESEED\n \tbool \"Initial values for UEFI variables\"\n \tdepends on !COMPILE_TEST\ndiff --git a/lib/efi_loader/Makefile b/lib/efi_loader/Makefile\nindex ca1775eb03be..d73ad43951b1 100644\n--- a/lib/efi_loader/Makefile\n+++ b/lib/efi_loader/Makefile\n@@ -54,6 +54,7 @@ obj-y += efi_variable_tee.o\n else\n obj-y += efi_variable.o\n obj-$(CONFIG_EFI_VARIABLE_FILE_STORE) += efi_var_file.o\n+obj-$(CONFIG_EFI_VARIABLE_SF_STORE) += efi_var_sf.o\n obj-$(CONFIG_EFI_VARIABLES_PRESEED) += efi_var_seed.o\n endif\n obj-y += efi_watchdog.o\ndiff --git a/lib/efi_loader/efi_var_sf.c b/lib/efi_loader/efi_var_sf.c\nnew file mode 100644\nindex 000000000000..61d68f7c5c94\n--- /dev/null\n+++ b/lib/efi_loader/efi_var_sf.c\n@@ -0,0 +1,92 @@\n+// SPDX-License-Identifier: GPL-2.0+\n+/*\n+ * SPI Flash interface for UEFI variables\n+ *\n+ * Copyright (c) 2023, Shantur Rathore\n+ * Copyright (C) 2026, Advanced Micro Devices, Inc.\n+ */\n+\n+#define LOG_CATEGORY LOGC_EFI\n+\n+#include <efi_loader.h>\n+#include <efi_variable.h>\n+#include <spi_flash.h>\n+#include <dm.h>\n+\n+efi_status_t efi_var_to_storage(void)\n+{\n+\tefi_status_t ret;\n+\tstruct efi_var_file *buf;\n+\tloff_t len;\n+\tstruct udevice *sfdev;\n+\n+\tret = efi_var_collect(&buf, &len, EFI_VARIABLE_NON_VOLATILE);\n+\tif (len > EFI_VAR_BUF_SIZE) {\n+\t\tlog_err(\"EFI var buffer length more than target SPI Flash size\");\n+\t\tret = EFI_OUT_OF_RESOURCES;\n+\t\tgoto error;\n+\t}\n+\n+\tlog_debug(\"%s - Got buffer to write buf->len : %d\\n\", __func__, buf->length);\n+\n+\tif (ret != EFI_SUCCESS)\n+\t\tgoto error;\n+\n+\tret = uclass_get_device(UCLASS_SPI_FLASH, CONFIG_EFI_VARIABLE_SF_DEVICE_INDEX, &sfdev);\n+\tif (ret)\n+\t\tgoto error;\n+\n+\tret = spi_flash_erase_dm(sfdev, CONFIG_EFI_VARIABLE_SF_OFFSET, EFI_VAR_BUF_SIZE);\n+\tlog_debug(\"%s - Erased SPI Flash offset %x\\n\", __func__, CONFIG_EFI_VARIABLE_SF_OFFSET);\n+\tif (ret)\n+\t\tgoto error;\n+\n+\tret = spi_flash_write_dm(sfdev, CONFIG_EFI_VARIABLE_SF_OFFSET, len, buf);\n+\tlog_debug(\"%s - Wrote buffer to SPI Flash : %ld\\n\", __func__, ret);\n+\n+\tif (ret)\n+\t\tgoto error;\n+\n+\tret = EFI_SUCCESS;\n+error:\n+\tif (ret)\n+\t\tlog_err(\"Failed to persist EFI variables in SF\\n\");\n+\tfree(buf);\n+\treturn ret;\n+}\n+\n+efi_status_t efi_var_from_storage(void)\n+{\n+\tstruct efi_var_file *buf;\n+\tefi_status_t ret;\n+\tstruct udevice *sfdev;\n+\n+\tbuf = calloc(1, EFI_VAR_BUF_SIZE);\n+\tif (!buf) {\n+\t\tlog_err(\"%s - Unable to allocate buffer\\n\", __func__);\n+\t\treturn EFI_OUT_OF_RESOURCES;\n+\t}\n+\n+\tret = uclass_get_device(UCLASS_SPI_FLASH, 0, &sfdev);\n+\tif (ret)\n+\t\tgoto error;\n+\n+\tret = spi_flash_read_dm(sfdev, CONFIG_EFI_VARIABLE_SF_OFFSET,\n+\t\t\t\tEFI_VAR_BUF_SIZE, buf);\n+\n+\tlog_debug(\"%s - read buffer buf->length: %x\\n\", __func__, buf->length);\n+\n+\tif (ret || buf->length < sizeof(struct efi_var_file)) {\n+\t\tlog_err(\"%s - buffer read from SPI Flash isn't valid\\n\", __func__);\n+\t\tgoto error;\n+\t}\n+\n+\tret = efi_var_restore(buf, false);\n+\tif (ret != EFI_SUCCESS)\n+\t\tlog_err(\"%s - Unable to restore EFI variables from buffer\\n\", __func__);\n+\n+\tret = EFI_SUCCESS;\n+error:\n+\tfree(buf);\n+\treturn ret;\n+}\n", "prefixes": [ "v9" ] }