get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2196894/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2196894,
    "url": "http://patchwork.ozlabs.org/api/patches/2196894/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/f49e4ac8da5bae9252c79031f1661f386d17895f.1771247847.git.michal.simek@amd.com/",
    "project": {
        "id": 18,
        "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api",
        "name": "U-Boot",
        "link_name": "uboot",
        "list_id": "u-boot.lists.denx.de",
        "list_email": "u-boot@lists.denx.de",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<f49e4ac8da5bae9252c79031f1661f386d17895f.1771247847.git.michal.simek@amd.com>",
    "list_archive_url": null,
    "date": "2026-02-16T13:17:30",
    "name": "[v9] efi_vars: Implement SPI Flash store",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "c1c9e5daebbac73f20b06f7e0a1786eb4c3dc4c1",
    "submitter": {
        "id": 84271,
        "url": "http://patchwork.ozlabs.org/api/people/84271/?format=api",
        "name": "Michal Simek",
        "email": "michal.simek@amd.com"
    },
    "delegate": {
        "id": 68728,
        "url": "http://patchwork.ozlabs.org/api/users/68728/?format=api",
        "username": "xypron",
        "first_name": "Heinrich",
        "last_name": "Schuchardt",
        "email": "xypron.glpk@gmx.de"
    },
    "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/f49e4ac8da5bae9252c79031f1661f386d17895f.1771247847.git.michal.simek@amd.com/mbox/",
    "series": [
        {
            "id": 492308,
            "url": "http://patchwork.ozlabs.org/api/series/492308/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=492308",
            "date": "2026-02-16T13:17:30",
            "name": "[v9] efi_vars: Implement SPI Flash store",
            "version": 9,
            "mbox": "http://patchwork.ozlabs.org/series/492308/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2196894/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2196894/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<u-boot-bounces@lists.denx.de>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=amd.com header.i=@amd.com header.a=rsa-sha256\n header.s=selector1 header.b=Nsww5hg1;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)",
            "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=amd.com",
            "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de",
            "phobos.denx.de;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=amd.com header.i=@amd.com header.b=\"Nsww5hg1\";\n\tdkim-atps=neutral",
            "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=amd.com",
            "phobos.denx.de;\n spf=fail smtp.mailfrom=michal.simek@amd.com"
        ],
        "Received": [
            "from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fF3HH3GXVz1xtN\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 17 Feb 2026 00:18:03 +1100 (AEDT)",
            "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id A40A880FA1;\n\tMon, 16 Feb 2026 14:17:54 +0100 (CET)",
            "by phobos.denx.de (Postfix, from userid 109)\n id 7EEB7831AC; Mon, 16 Feb 2026 14:17:53 +0100 (CET)",
            "from CH4PR04CU002.outbound.protection.outlook.com\n (mail-northcentralusazlp170130007.outbound.protection.outlook.com\n [IPv6:2a01:111:f403:c105::7])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id EC0578063E\n for <u-boot@lists.denx.de>; Mon, 16 Feb 2026 14:17:50 +0100 (CET)",
            "from SA9PR10CA0020.namprd10.prod.outlook.com (2603:10b6:806:a7::25)\n by DM4PR12MB5770.namprd12.prod.outlook.com (2603:10b6:8:61::16) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9611.15; Mon, 16 Feb\n 2026 13:17:45 +0000",
            "from SA2PEPF0000150A.namprd04.prod.outlook.com\n (2603:10b6:806:a7:cafe::38) by SA9PR10CA0020.outlook.office365.com\n (2603:10b6:806:a7::25) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.15 via Frontend Transport; Mon,\n 16 Feb 2026 13:17:27 +0000",
            "from satlexmb07.amd.com (165.204.84.17) by\n SA2PEPF0000150A.mail.protection.outlook.com (10.167.242.42) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.9632.12 via Frontend Transport; Mon, 16 Feb 2026 13:17:44 +0000",
            "from Satlexmb09.amd.com (10.181.42.218) by satlexmb07.amd.com\n (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Mon, 16 Feb\n 2026 07:17:44 -0600",
            "from satlexmb08.amd.com (10.181.42.217) by satlexmb09.amd.com\n (10.181.42.218) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Mon, 16 Feb\n 2026 05:17:43 -0800",
            "from localhost (10.180.168.240) by satlexmb08.amd.com\n (10.181.42.217) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17 via Frontend\n Transport; Mon, 16 Feb 2026 07:17:43 -0600"
        ],
        "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,\n DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,\n RCVD_IN_DNSWL_BLOCKED,SPF_HELO_PASS,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2",
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=Q7Igb9Ec+WJh7bxZ/ECsWzQsy+P3yAsWCqEX38yzXQU6yS6ZXmltwXBkLdq6DobXRBFcbKrnE2g7srfuRt5e7/DlrObkArwgU+t9UXQvGKdbyJRHivaKEkFD3OHXAqtQO43X+Zb2/SmTPLpCo4DP7tnWl8TorX+VpMv/GRmRwbg02ELAbaw0SWCtmpLNu5jpdu8oWVKuF8Mui4lcjO4nSJixoXKb0jH9z4TWhGbGjHsplTulXbMATiCuJF50o+z/DAsh0MZ5Z5AQ1AuF01FTcIyvqY82ovZDJFYNHhVAu+nzr831txUb4pQqIPZ74d07WJrjysz+glFY4Oa+nMUz9w==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=hqF9UIMVxR42jqrezXuDMjYw1x24gWiSy9oxOoM42Jw=;\n b=MWaR5FEc+7JYJU1Wdn1raYjjPhGeDcGYyoRSXn8fHUcijMcV8dvQf7qNhfQDfWYND9h8kIcBqjHHf4rOUvKinm0mcD4QvktFe0iXBDoa+G7s6pOp8MnxZqX+NUcaPCk/xK/1320PDgD+ly3zP3podpayb7zYdSBPWAyCXGBCQRrXGrVyxkNgUGc9eDgaCGdOr/oeVi8f3rSDr+jgYw9gIzyniVpMBpiXml7r2N14Ic9+zQExO5J8jX5e/LSXYEdlUxuHpUq8zdyd4dA5mZNSR5ioY2inAOz62ILonXlcYSr7wHG1X9V4fmVD55Hijw+6pwCJQA6DjfxzAyuvmDIelQ==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 165.204.84.17) smtp.rcpttodomain=lists.denx.de smtp.mailfrom=amd.com;\n dmarc=pass (p=quarantine sp=quarantine pct=100) action=none\n header.from=amd.com; dkim=none (message not signed); arc=none (0)",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=hqF9UIMVxR42jqrezXuDMjYw1x24gWiSy9oxOoM42Jw=;\n b=Nsww5hg1PLMlVAyJeWmaAHQnbkYXpjVVyWvByPxgWd5g5/300qD9ibHZWHdCY/JTB7ELgWBbaWKLyI8hShPlD0um/xkZzUblMqtmQbuSXPVjH8hLiRJjdPBxISYwQhKZroI6r2t3LBgtmwCZXf4p0iGrPGG9jyMMIdmzMByejFw=",
        "X-MS-Exchange-Authentication-Results": "spf=pass (sender IP is 165.204.84.17)\n smtp.mailfrom=amd.com; dkim=none (message not signed)\n header.d=none;dmarc=pass action=none header.from=amd.com;",
        "Received-SPF": "Pass (protection.outlook.com: domain of amd.com designates\n 165.204.84.17 as permitted sender) receiver=protection.outlook.com;\n client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C",
        "From": "Michal Simek <michal.simek@amd.com>",
        "To": "<u-boot@lists.denx.de>, <git@amd.com>",
        "CC": "Shantur Rathore <i@shantur.com>, Neil Armstrong\n <neil.armstrong@linaro.org>, Ilias Apalodimas <ilias.apalodimas@linaro.org>,\n Gabriel Dalimonte <gabriel.dalimonte@gmail.com>, Heinrich Schuchardt\n <xypron.glpk@gmx.de>, Jonathan Humphreys <j-humphreys@ti.com>, Simon Glass\n <sjg@chromium.org>, Sughosh Ganu <sughosh.ganu@arm.com>, Tom Rini\n <trini@konsulko.com>, \"Ying-Chun Liu (PaulLiu)\" <paul.liu@linaro.org>",
        "Subject": "[PATCH v9] efi_vars: Implement SPI Flash store",
        "Date": "Mon, 16 Feb 2026 14:17:30 +0100",
        "Message-ID": "\n <f49e4ac8da5bae9252c79031f1661f386d17895f.1771247847.git.michal.simek@amd.com>",
        "X-Mailer": "git-send-email 2.43.0",
        "MIME-Version": "1.0",
        "X-Developer-Signature": "v=1; a=openpgp-sha256; l=6572; i=michal.simek@amd.com;\n h=from:subject:message-id; bh=CTN2BOMh2YkcID/WJCRO7IJA5Hg4+RDqKRq7ZTjRAVg=;\n b=owGbwMvMwCG2mv3fB7+vgl8ZT6slMWROlnjN5RCscHHiwZV7bWc66F6Nebm9OVr6WdrqGrPvX\n F8uer5901HKwiDGwSArpsgynUnHYc23a0vFlkfmw8xhZQIZwsDFKQATuTCPkeF+87xpB3vVL189\n X6e++eGdJo9XoqEdIpOXtflcrfcyLmpgZFi6fWa3JvPM/hjJH/7ilWcTW2fc4ODkfyM3g+3UjFe\n Z2/kB",
        "X-Developer-Key": "i=michal.simek@amd.com; a=openpgp;\n fpr=67350C9BF5CCEE9B5364356A377C7F21FE3D1F91",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-EOPAttributedMessage": "0",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-TrafficTypeDiagnostic": "SA2PEPF0000150A:EE_|DM4PR12MB5770:EE_",
        "X-MS-Office365-Filtering-Correlation-Id": "145ea0ac-390d-46c5-f55e-08de6d5dc5a9",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;\n ARA:13230040|1800799024|82310400026|36860700013|376014|7416014;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "CIP:165.204.84.17; CTRY:US; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:satlexmb07.amd.com; PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(1800799024)(82310400026)(36860700013)(376014)(7416014);\n DIR:OUT;\n SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n nZ4u/KEB3n6N/GFz6RzeOu+TSAte3vHjixdgCesp9hvTecGfUKZiVzSJqhlzl6ezB/doNOkKWgQhl/6MCm1iEvy6eYU60q9DKnk6kZQlE5SISJqfzxXJnrLAIgdJvt91AThHv+MXKQov2X6mziSNlR5Tj+HCLplzgNP4bH0ouCfJwNOcNOs6Glff4HKGIky+O7+fIxWrVoje7Do95MgUELRRzxDRbU0NFFzyqFCgaf4SAo7KJIWMroFjZ5pNleKkfYvh3ROAsB1KsQsDYSjslyWZ0ZU4T2vCc9nS3SIbEmjvR9GA6rLoasFcZVVlW1M9SAzXVC/qEpz0lSBVgluQd9811YnXCtDdL3aI/iEk8FgyEPC2vVLpUuYWjqUE2LJQ+CGbR/eWW+KxLSasuA3GpS51UpVlqEvLzgCkqnMnpk201I8EuWmmUKSFNUn4NKw5",
        "X-OriginatorOrg": "amd.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "16 Feb 2026 13:17:44.8159 (UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 145ea0ac-390d-46c5-f55e-08de6d5dc5a9",
        "X-MS-Exchange-CrossTenant-Id": "3dd8961f-e488-4e60-8e11-a82d994e183d",
        "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d; Ip=[165.204.84.17];\n Helo=[satlexmb07.amd.com]",
        "X-MS-Exchange-CrossTenant-AuthSource": "\n SA2PEPF0000150A.namprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DM4PR12MB5770",
        "X-BeenThere": "u-boot@lists.denx.de",
        "X-Mailman-Version": "2.1.39",
        "Precedence": "list",
        "List-Id": "U-Boot discussion <u-boot.lists.denx.de>",
        "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>",
        "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>",
        "List-Post": "<mailto:u-boot@lists.denx.de>",
        "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>",
        "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>",
        "Errors-To": "u-boot-bounces@lists.denx.de",
        "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>",
        "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de",
        "X-Virus-Status": "Clean"
    },
    "content": "From: Shantur Rathore <i@shantur.com>\n\nCurrently U-Boot uses ESP as storage for EFI variables.\nDevices with SPI Flash are used for storing environment with this\ncommit we allow EFI variables to be stored on SPI Flash.\n\nSigned-off-by: Shantur Rathore <i@shantur.com>\nSigned-off-by: Michal Simek <michal.simek@amd.com>\nTested-by: Neil Armstrong <neil.armstrong@linaro.org> # on AML-S905D3-CC\nAcked-by: Ilias Apalodimas <ilias.apalodimas@linaro.org>\n\n---\n\nChanges in v9:\n- Remove EFI_RT_VOLATILE_STORE enabling\n- Cleanup commit message\n\nChanges in v8:\n- Add missing EFI_VARIABLE_SF_STORE dependency to EFI_VARIABLE_SF_DEVICE_INDEX\n\nChanges in v7:\n- sed -i 's/efi_var_from/efi_var_from_storage/g'\n\nChanges in v6:\n- sed -i 's/efi_var_read/efi_var_from/g'\n- sed -i 's/efi_var_write/efi_var_to_storage/g'\n\nChanges in v4:\n- Extend Kconfig description\n- Extend commit message and describe efivar missing part\n- use unify methods for reading/writing variable\n\nChanges in v3:\n- Fixed compiler warnings.\n\nChanges in v2:\n- Refactored efi_var_file to move common parts out as requested\n- Changed ifdefs to use CONFIG_IS_DEFINED\n- Fixed typos\n\n lib/efi_loader/Kconfig      | 33 +++++++++++++\n lib/efi_loader/Makefile     |  1 +\n lib/efi_loader/efi_var_sf.c | 92 +++++++++++++++++++++++++++++++++++++\n 3 files changed, 126 insertions(+)\n create mode 100644 lib/efi_loader/efi_var_sf.c",
    "diff": "diff --git a/lib/efi_loader/Kconfig b/lib/efi_loader/Kconfig\nindex 579eed658801..315dd4f3e794 100644\n--- a/lib/efi_loader/Kconfig\n+++ b/lib/efi_loader/Kconfig\n@@ -124,6 +124,24 @@ config EFI_VARIABLE_FILE_STORE\n \t  Select this option if you want non-volatile UEFI variables to be\n \t  stored as file /ubootefi.var on the EFI system partition.\n \n+config EFI_VARIABLE_SF_STORE\n+\tbool \"Store non-volatile UEFI variables in SPI Flash\"\n+\tdepends on SPI_FLASH\n+\thelp\n+\t  Select this option if you want non-volatile UEFI variables to be\n+\t  stored in SPI Flash.\n+\n+\t  Define CONFIG_EFI_VARIABLE_SF_OFFSET as offset in SPI Flash to use as\n+\t  the storage for variables. CONFIG_EFI_VAR_BUF_SIZE defines the space\n+\t  needed.\n+\n+\t  Note that SPI Flash devices have a limited number of program/erase\n+\t  cycles. Frequent updates to UEFI variables may cause excessive wear\n+\t  and can permanently damage the flash device, particularly on SPI NAND\n+\t  or low-end SPI NOR parts without wear leveling. This option should be\n+\t  used with care on such systems, and is not recommended for platforms\n+\t  where UEFI variables are updated frequently.\n+\n config EFI_MM_COMM_TEE\n \tbool \"UEFI variables storage service via the trusted world\"\n \tdepends on OPTEE\n@@ -194,6 +212,21 @@ config FFA_SHARED_MM_BUF_ADDR\n \t  the MM SP in secure world.\n \t  It is assumed that the MM SP knows the address of the shared MM communication buffer.\n \n+config EFI_VARIABLE_SF_OFFSET\n+\thex \"EFI variables in SPI flash offset\"\n+\tdepends on EFI_VARIABLE_SF_STORE\n+\thelp\n+\t  Offset from the start of the SPI Flash where EFI variables will be stored.\n+\t  This should be aligned to the sector size of SPI Flash.\n+\n+config EFI_VARIABLE_SF_DEVICE_INDEX\n+\tint \"Device Index for target SPI Flash\"\n+\tdepends on EFI_VARIABLE_SF_STORE\n+\tdefault 0\n+\thelp\n+\t  The index of SPI Flash device used for storing EFI variables. This would be\n+\t  needed if there are more than 1 SPI Flash devices available to use.\n+\n config EFI_VARIABLES_PRESEED\n \tbool \"Initial values for UEFI variables\"\n \tdepends on !COMPILE_TEST\ndiff --git a/lib/efi_loader/Makefile b/lib/efi_loader/Makefile\nindex ca1775eb03be..d73ad43951b1 100644\n--- a/lib/efi_loader/Makefile\n+++ b/lib/efi_loader/Makefile\n@@ -54,6 +54,7 @@ obj-y += efi_variable_tee.o\n else\n obj-y += efi_variable.o\n obj-$(CONFIG_EFI_VARIABLE_FILE_STORE) += efi_var_file.o\n+obj-$(CONFIG_EFI_VARIABLE_SF_STORE) += efi_var_sf.o\n obj-$(CONFIG_EFI_VARIABLES_PRESEED) += efi_var_seed.o\n endif\n obj-y += efi_watchdog.o\ndiff --git a/lib/efi_loader/efi_var_sf.c b/lib/efi_loader/efi_var_sf.c\nnew file mode 100644\nindex 000000000000..61d68f7c5c94\n--- /dev/null\n+++ b/lib/efi_loader/efi_var_sf.c\n@@ -0,0 +1,92 @@\n+// SPDX-License-Identifier: GPL-2.0+\n+/*\n+ * SPI Flash interface for UEFI variables\n+ *\n+ * Copyright (c) 2023, Shantur Rathore\n+ * Copyright (C) 2026, Advanced Micro Devices, Inc.\n+ */\n+\n+#define LOG_CATEGORY LOGC_EFI\n+\n+#include <efi_loader.h>\n+#include <efi_variable.h>\n+#include <spi_flash.h>\n+#include <dm.h>\n+\n+efi_status_t efi_var_to_storage(void)\n+{\n+\tefi_status_t ret;\n+\tstruct efi_var_file *buf;\n+\tloff_t len;\n+\tstruct udevice *sfdev;\n+\n+\tret = efi_var_collect(&buf, &len, EFI_VARIABLE_NON_VOLATILE);\n+\tif (len > EFI_VAR_BUF_SIZE) {\n+\t\tlog_err(\"EFI var buffer length more than target SPI Flash size\");\n+\t\tret = EFI_OUT_OF_RESOURCES;\n+\t\tgoto error;\n+\t}\n+\n+\tlog_debug(\"%s - Got buffer to write buf->len : %d\\n\", __func__, buf->length);\n+\n+\tif (ret != EFI_SUCCESS)\n+\t\tgoto error;\n+\n+\tret = uclass_get_device(UCLASS_SPI_FLASH, CONFIG_EFI_VARIABLE_SF_DEVICE_INDEX, &sfdev);\n+\tif (ret)\n+\t\tgoto error;\n+\n+\tret = spi_flash_erase_dm(sfdev, CONFIG_EFI_VARIABLE_SF_OFFSET, EFI_VAR_BUF_SIZE);\n+\tlog_debug(\"%s - Erased SPI Flash offset %x\\n\", __func__, CONFIG_EFI_VARIABLE_SF_OFFSET);\n+\tif (ret)\n+\t\tgoto error;\n+\n+\tret = spi_flash_write_dm(sfdev, CONFIG_EFI_VARIABLE_SF_OFFSET, len, buf);\n+\tlog_debug(\"%s - Wrote buffer to SPI Flash : %ld\\n\", __func__, ret);\n+\n+\tif (ret)\n+\t\tgoto error;\n+\n+\tret = EFI_SUCCESS;\n+error:\n+\tif (ret)\n+\t\tlog_err(\"Failed to persist EFI variables in SF\\n\");\n+\tfree(buf);\n+\treturn ret;\n+}\n+\n+efi_status_t efi_var_from_storage(void)\n+{\n+\tstruct efi_var_file *buf;\n+\tefi_status_t ret;\n+\tstruct udevice *sfdev;\n+\n+\tbuf = calloc(1, EFI_VAR_BUF_SIZE);\n+\tif (!buf) {\n+\t\tlog_err(\"%s - Unable to allocate buffer\\n\", __func__);\n+\t\treturn EFI_OUT_OF_RESOURCES;\n+\t}\n+\n+\tret = uclass_get_device(UCLASS_SPI_FLASH, 0, &sfdev);\n+\tif (ret)\n+\t\tgoto error;\n+\n+\tret = spi_flash_read_dm(sfdev, CONFIG_EFI_VARIABLE_SF_OFFSET,\n+\t\t\t\tEFI_VAR_BUF_SIZE, buf);\n+\n+\tlog_debug(\"%s - read buffer buf->length: %x\\n\", __func__, buf->length);\n+\n+\tif (ret || buf->length < sizeof(struct efi_var_file)) {\n+\t\tlog_err(\"%s - buffer read from SPI Flash isn't valid\\n\", __func__);\n+\t\tgoto error;\n+\t}\n+\n+\tret = efi_var_restore(buf, false);\n+\tif (ret != EFI_SUCCESS)\n+\t\tlog_err(\"%s - Unable to restore EFI variables from buffer\\n\", __func__);\n+\n+\tret = EFI_SUCCESS;\n+error:\n+\tfree(buf);\n+\treturn ret;\n+}\n",
    "prefixes": [
        "v9"
    ]
}