[{"id":1761463,"web_url":"http://patchwork.ozlabs.org/comment/1761463/","msgid":"<CAOSf1CHHK78BVGSFBzM02-7NsmDyZpryEmrgwRUNMhz1VditFA@mail.gmail.com>","list_archive_url":null,"date":"2017-09-01T04:24:16","subject":"Re: [Skiboot] [PATCH 1/5] hdata: add secure and trusted boot ntuple\n\tto SPIRA-H/S","submitter":{"id":68108,"url":"http://patchwork.ozlabs.org/api/people/68108/","name":"Oliver O'Halloran","email":"oohall@gmail.com"},"content":"On Thu, Aug 31, 2017 at 5:42 PM, Claudio Carvalho\n<cclaudio@linux.vnet.ibm.com> wrote:\n> This adds to spira-h/s the overall tpmrel structure, which defines\n> secure and trusted boot related data. The internal data structures will\n> be added in separated patches.\n>\n> Signed-off-by: Claudio Carvalho <cclaudio@linux.vnet.ibm.com>\n> ---\n>  hdata/Makefile.inc       |  2 +-\n>  hdata/hdata.h            |  1 +\n>  hdata/spira.c            |  4 ++++\n>  hdata/spira.h            | 12 +++++++++---\n>  hdata/test/hdata_to_dt.c |  1 +\n>  hdata/tpmrel.c           | 40 ++++++++++++++++++++++++++++++++++++++++\n>  6 files changed, 56 insertions(+), 4 deletions(-)\n>  create mode 100644 hdata/tpmrel.c\n>\n> diff --git a/hdata/Makefile.inc b/hdata/Makefile.inc\n> index 5b79dfe..c17b04f 100644\n> --- a/hdata/Makefile.inc\n> +++ b/hdata/Makefile.inc\n> @@ -2,7 +2,7 @@\n>\n>  SUBDIRS += hdata\n>  HDATA_OBJS = spira.o paca.o pcia.o hdif.o memory.o fsp.o iohub.o vpd.o slca.o\n> -HDATA_OBJS += cpu-common.o vpd-common.o hostservices.o i2c.o\n> +HDATA_OBJS += cpu-common.o vpd-common.o hostservices.o i2c.o tpmrel.o\n>  DEVSRC_OBJ = hdata/built-in.o\n>\n>  $(DEVSRC_OBJ): $(HDATA_OBJS:%=hdata/%)\n> diff --git a/hdata/hdata.h b/hdata/hdata.h\n> index 6da9b55..31223c8 100644\n> --- a/hdata/hdata.h\n> +++ b/hdata/hdata.h\n> @@ -65,6 +65,7 @@ extern void slca_dt_add_sai_node(void);\n>  extern bool hservices_from_hdat(const void *fdt, size_t size);\n>  int parse_i2c_devs(const struct HDIF_common_hdr *hdr, int idata_index,\n>         struct dt_node *xscom);\n> +extern void node_stb_parse(void);\n>\n>  #endif /* __HDATA_H */\n>\n> diff --git a/hdata/spira.c b/hdata/spira.c\n> index b58be7c..220ae9e 100644\n> --- a/hdata/spira.c\n> +++ b/hdata/spira.c\n> @@ -1278,6 +1278,7 @@ static void fixup_spira(void)\n>         spira.ntuples.proc_chip = spiras->ntuples.proc_chip;\n>         spira.ntuples.hs_data = spiras->ntuples.hs_data;\n>         spira.ntuples.ipmi_sensor = spiras->ntuples.ipmi_sensor;\n> +       spira.ntuples.node_stb_data = spiras->ntuples.node_stb_data;\n>  }\n>\n>  int parse_hdat(bool is_opal)\n> @@ -1347,6 +1348,9 @@ int parse_hdat(bool is_opal)\n>\n>         add_stop_levels();\n>\n> +       /* Parse node secure and trusted boot data */\n> +       node_stb_parse();\n> +\n>         prlog(PR_DEBUG, \"Parsing HDAT...done\\n\");\n>\n>         return 0;\n> diff --git a/hdata/spira.h b/hdata/spira.h\n> index 0276d4a..d2a70c1 100644\n> --- a/hdata/spira.h\n> +++ b/hdata/spira.h\n> @@ -40,7 +40,7 @@ struct spira_ntuple {\n>         __be64          padding;\n>  } __packed;\n>\n> -#define SPIRA_NTUPLES_COUNT    0x18\n> +#define SPIRA_NTUPLES_COUNT    0x19\n>\n>  struct spira_ntuples {\n>         struct HDIF_array_hdr   array_hdr;\n> @@ -69,6 +69,7 @@ struct spira_ntuples {\n>         struct spira_ntuple     proc_chip;              /* 0x300 */\n>         struct spira_ntuple     hs_data;                /* 0x320 */\n>         struct spira_ntuple     ipmi_sensor;            /* 0x360 */\n> +       struct spira_ntuple     node_stb_data;          /* 0x380 */\n>  };\n>\n>  struct spira {\n> @@ -82,7 +83,7 @@ struct spira {\n>          *\n>          * According to FSP engineers, this is an okay thing to do.\n>          */\n> -       u8                      reserved[0xa0];\n> +       u8                      reserved[0x80];\n>  } __packed __align(0x100);\n>\n>  extern struct spira spira;\n> @@ -146,7 +147,7 @@ struct spiras_ntuples {\n>         struct spira_ntuple     hs_data;                /* 0x200 */\n>         struct spira_ntuple     hbrt_data;              /* 0x220 */\n>         struct spira_ntuple     ipmi_sensor;            /* 0x240 */\n> -       struct spira_ntuple     node_data;              /* 0x260 */\n> +       struct spira_ntuple     node_stb_data;          /* 0x260 */\n>  };\n>\n>  struct spiras {\n> @@ -1092,6 +1093,11 @@ struct ipmi_sensors {\n>  /* Idata index 1 : LED - sensors ID mapping data */\n>  #define IPMI_SENSORS_IDATA_LED         1\n>\n> +/*\n> + * Node Secure and Trusted Boot Related Data\n> + */\n> +#define STB_HDIF_SIG   \"TPMREL\"\n> +\n>  static inline const char *cpu_state(u32 flags)\n>  {\n>         switch ((flags & CPU_ID_VERIFY_MASK) >> CPU_ID_VERIFY_SHIFT) {\n> diff --git a/hdata/test/hdata_to_dt.c b/hdata/test/hdata_to_dt.c\n> index 155e41b..6da80a5 100644\n> --- a/hdata/test/hdata_to_dt.c\n> +++ b/hdata/test/hdata_to_dt.c\n> @@ -124,6 +124,7 @@ static bool spira_check_ptr(const void *ptr, const char *file, unsigned int line\n>  #include \"../slca.c\"\n>  #include \"../hostservices.c\"\n>  #include \"../i2c.c\"\n> +#include \"../tpmrel.c\"\n>  #include \"../../core/vpd.c\"\n>  #include \"../../core/device.c\"\n>  #include \"../../core/chip.c\"\n> diff --git a/hdata/tpmrel.c b/hdata/tpmrel.c\n> new file mode 100644\n> index 0000000..7ded404\n> --- /dev/null\n> +++ b/hdata/tpmrel.c\n> @@ -0,0 +1,40 @@\n> +/* Copyright 2013-2017 IBM Corp.\n> + *\n> + * Licensed under the Apache License, Version 2.0 (the \"License\");\n> + * you may not use this file except in compliance with the License.\n> + * You may obtain a copy of the License at\n> + *\n> + *     http://www.apache.org/licenses/LICENSE-2.0\n> + *\n> + * Unless required by applicable law or agreed to in writing, software\n> + * distributed under the License is distributed on an \"AS IS\" BASIS,\n> + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or\n> + * implied.\n> + * See the License for the specific language governing permissions and\n> + * limitations under the License.\n> + */\n> +\n> +#ifndef pr_fmt\n> +#define pr_fmt(fmt) \"HDAT TPMREL: \" fmt\n\nJust make this TPMREL: or something. The bits of skiboot that are\ninside the HDAT parser are clearly marked already.\n\n> +#endif\n> +\n> +#include <skiboot.h>\n> +\n> +#include \"spira.h\"\n> +#include \"hdata.h\"\n> +#include \"hdif.h\"\n> +\n> +void node_stb_parse(void)\n> +{\n> +       struct HDIF_common_hdr *hdif_hdr;\n> +\n> +       hdif_hdr = get_hdif(&spira.ntuples.node_stb_data, \"TPMREL\");\n> +       if (!hdif_hdr) {\n> +               prlog(PR_INFO, \"could not find TPMREL data\\n\");\n\nMake this PR_DEBUG or higher. Gating this entire function around\nproc_gen >= proc_gen_p9 might also be a good idea since this tuple\nwill never be populated on P8 FSP systems so this is a nuisance\nwarning there.\n\n> +               return;\n> +       }\n> +\n> +       /* TODO: Idata 0: Secure Boot and TPM Instance Info */\n> +       /* TODO: Idata 1: User Physical Interaction Mechanism Info */\n> +       /* TODO: Idata 2: Hash and Verification Function Offset Array */\n> +}\n> --\n> 2.7.4\n>\n> _______________________________________________\n> Skiboot mailing list\n> Skiboot@lists.ozlabs.org\n> https://lists.ozlabs.org/listinfo/skiboot","headers":{"Return-Path":"<skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org>","X-Original-To":["incoming@patchwork.ozlabs.org","skiboot@lists.ozlabs.org"],"Delivered-To":["patchwork-incoming@bilbo.ozlabs.org","skiboot@lists.ozlabs.org"],"Received":["from lists.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3])\n\t(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xk5jw5S0Mz9s0g\n\tfor <incoming@patchwork.ozlabs.org>;\n\tFri,  1 Sep 2017 14:24:36 +1000 (AEST)","from lists.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 3xk5jw4BQ8zDqZw\n\tfor <incoming@patchwork.ozlabs.org>;\n\tFri,  1 Sep 2017 14:24:36 +1000 (AEST)","from mail-qk0-x243.google.com (mail-qk0-x243.google.com\n\t[IPv6:2607:f8b0:400d:c09::243])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128\n\tbits)) (No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 3xk5jb5QN7zDqXn\n\tfor <skiboot@lists.ozlabs.org>; Fri,  1 Sep 2017 14:24:19 +1000 (AEST)","by mail-qk0-x243.google.com with SMTP id l65so1130737qkc.3\n\tfor <skiboot@lists.ozlabs.org>; Thu, 31 Aug 2017 21:24:19 -0700 (PDT)","by 10.140.21.10 with HTTP; Thu, 31 Aug 2017 21:24:16 -0700 (PDT)"],"Authentication-Results":["ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n\tunprotected) header.d=gmail.com header.i=@gmail.com\n\theader.b=\"nAtpF0Tm\"; dkim-atps=neutral","lists.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n\tunprotected) header.d=gmail.com header.i=@gmail.com\n\theader.b=\"nAtpF0Tm\"; dkim-atps=neutral","lists.ozlabs.org; dkim=pass (2048-bit key;\n\tunprotected) header.d=gmail.com header.i=@gmail.com\n\theader.b=\"nAtpF0Tm\"; dkim-atps=neutral"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;\n\th=mime-version:in-reply-to:references:from:date:message-id:subject:to\n\t:cc; bh=/9sGKeR/CmMPrKINxo17BvEen4ENmZMOpXcxuV9BRyQ=;\n\tb=nAtpF0TmcOlR/JQqdhDkEPUSfuxOr0qEw7pH0N1rIkqGo6p+dVuVx42qDD/hmHTIct\n\tXEhKvxrlQnRSfWCtr/SSa/y6AT+5q++4qsR3jdKjQM+mLyjsnn7vBu9ZhSvszBszRoc0\n\tUG2z3dJwiG+oEwcYcQdHqOPjygGsIQTuD9IEPNqtES4UrUVfpnrqxRHUTU7t7qmcmhqb\n\t6OS9YjlHZRxqKdAIXd00gssGxTxDtt1K+VIvfAnR83+60ompnZZhmGuZ4INVi9EWqDlD\n\tCstXnH/i3qKPhH/DsLM5Ky+HJn+WR3LQH2a8rfPEAQO93ddxIts/Nz22ApLp6AXC5I5I\n\tXV3Q==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20161025;\n\th=x-gm-message-state:mime-version:in-reply-to:references:from:date\n\t:message-id:subject:to:cc;\n\tbh=/9sGKeR/CmMPrKINxo17BvEen4ENmZMOpXcxuV9BRyQ=;\n\tb=U7/o7qTLS66tgwf3X+YOL/HCWx4khOG1njrv4hOnYV/e8l1xzI+iDBZJYRTqwuDBqK\n\tnUvY5u7IJ+Vsd1UFa8ZKiOQFjjb7pgG2pArwyl5CWWMkV7YWX5Sm0WjmbOzg6fxwJ6Ac\n\tX9AuiKpyoVlBE5vA0L6RQZES0Hpy9pYk/G73R8lCKUmkJFD1l3YSrU1ACvNPA1uobCV4\n\t0OYJ4XT35vIn6rKjB/g02JI2kZC1cnTUQ4nwfUR3tY/pu3G37lvjrlbWJA4+7a2TH13r\n\tXz6D3pI/nvr3+mwIRjF1pbj+cSKk+VjBPRP3ResrBAriGSVs+2DRHc5vYACN3xCyd5tO\n\tGSoQ==","X-Gm-Message-State":"AHPjjUiJww7LASwkwTGPvIyu1gj/07ki2tXElI/2CAjMON2xsKsR4HWB\n\trhNql7sMK5PSKJRRJ2fS169G13BScv5C","X-Google-Smtp-Source":"ADKCNb6d3i3f/1tROHmbjcXkuZrtAqpl9JWGKFLnCmTHwfdj3vcOumBK02fpDm4Zg0tgURVwDh4WHP4ZjVWWqQ/tXBs=","X-Received":"by 10.233.239.4 with SMTP id d4mr903652qkg.196.1504239857372;\n\tThu, 31 Aug 2017 21:24:17 -0700 (PDT)","MIME-Version":"1.0","In-Reply-To":"<1504165372-15971-2-git-send-email-cclaudio@linux.vnet.ibm.com>","References":"<1504165372-15971-1-git-send-email-cclaudio@linux.vnet.ibm.com>\n\t<1504165372-15971-2-git-send-email-cclaudio@linux.vnet.ibm.com>","From":"Oliver <oohall@gmail.com>","Date":"Fri, 1 Sep 2017 14:24:16 +1000","Message-ID":"<CAOSf1CHHK78BVGSFBzM02-7NsmDyZpryEmrgwRUNMhz1VditFA@mail.gmail.com>","To":"Claudio Carvalho <cclaudio@linux.vnet.ibm.com>","Subject":"Re: [Skiboot] [PATCH 1/5] hdata: add secure and trusted boot ntuple\n\tto SPIRA-H/S","X-BeenThere":"skiboot@lists.ozlabs.org","X-Mailman-Version":"2.1.23","Precedence":"list","List-Id":"Mailing list for skiboot development <skiboot.lists.ozlabs.org>","List-Unsubscribe":"<https://lists.ozlabs.org/options/skiboot>,\n\t<mailto:skiboot-request@lists.ozlabs.org?subject=unsubscribe>","List-Archive":"<http://lists.ozlabs.org/pipermail/skiboot/>","List-Post":"<mailto:skiboot@lists.ozlabs.org>","List-Help":"<mailto:skiboot-request@lists.ozlabs.org?subject=help>","List-Subscribe":"<https://lists.ozlabs.org/listinfo/skiboot>,\n\t<mailto:skiboot-request@lists.ozlabs.org?subject=subscribe>","Cc":"skiboot list <skiboot@lists.ozlabs.org>","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"base64","Errors-To":"skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org","Sender":"\"Skiboot\"\n\t<skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org>"}},{"id":1762707,"web_url":"http://patchwork.ozlabs.org/comment/1762707/","msgid":"<5223e4ae-e597-2d4c-ba95-25bc25c2c3a2@linux.vnet.ibm.com>","list_archive_url":null,"date":"2017-09-04T14:50:58","subject":"Re: [Skiboot] [PATCH 1/5] hdata: add secure and trusted boot ntuple\n\tto SPIRA-H/S","submitter":{"id":69305,"url":"http://patchwork.ozlabs.org/api/people/69305/","name":"Claudio Carvalho","email":"cclaudio@linux.vnet.ibm.com"},"content":"On 01/09/2017 01:24, Oliver wrote:\n> On Thu, Aug 31, 2017 at 5:42 PM, Claudio Carvalho\n> <cclaudio@linux.vnet.ibm.com> wrote:\n>> + * Unless required by applicable law or agreed to in writing, software\n>> + * distributed under the License is distributed on an \"AS IS\" BASIS,\n>> + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or\n>> + * implied.\n>> + * See the License for the specific language governing permissions and\n>> + * limitations under the License.\n>> + */\n>> +\n>> +#ifndef pr_fmt\n>> +#define pr_fmt(fmt) \"HDAT TPMREL: \" fmt\n> Just make this TPMREL: or something. The bits of skiboot that are\n> inside the HDAT parser are clearly marked already.\nI will do that.\n\n>\n>> +#endif\n>> +\n>> +#include <skiboot.h>\n>> +\n>> +#include \"spira.h\"\n>> +#include \"hdata.h\"\n>> +#include \"hdif.h\"\n>> +\n>> +void node_stb_parse(void)\n>> +{\n>> +       struct HDIF_common_hdr *hdif_hdr;\n>> +\n>> +       hdif_hdr = get_hdif(&spira.ntuples.node_stb_data, \"TPMREL\");\n>> +       if (!hdif_hdr) {\n>> +               prlog(PR_INFO, \"could not find TPMREL data\\n\");\n> Make this PR_DEBUG or higher. Gating this entire function around\n> proc_gen >= proc_gen_p9 might also be a good idea since this tuple\n> will never be populated on P8 FSP systems so this is a nuisance\n> warning there.\n\nGood catch. I will gate that.\n\n>> +               return;\n>> +       }\n>> +\n>> +       /* TODO: Idata 0: Secure Boot and TPM Instance Info */\n>> +       /* TODO: Idata 1: User Physical Interaction Mechanism Info */\n>> +       /* TODO: Idata 2: Hash and Verification Function Offset Array */\n>> +}\n>> --\n>> 2.7.4\n>>\n>> _______________________________________________\n>> Skiboot mailing list\n>> Skiboot@lists.ozlabs.org\n>> https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.ozlabs.org_listinfo_skiboot&d=DwIBaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=75damxi8dv4vdGLwy_TNRoKm9_3FxQYCSDCtliSDIKc&m=srzWbN1CNe3nkNA26MGHhtCqfxwLG0s7MkdSflrrNKg&s=ePMbw9zE5RHH1jl0n6UnWIIhGVl_RXXhs4EdeFevYJI&e=","headers":{"Return-Path":"<skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org>","X-Original-To":["incoming@patchwork.ozlabs.org","skiboot@lists.ozlabs.org"],"Delivered-To":["patchwork-incoming@bilbo.ozlabs.org","skiboot@lists.ozlabs.org"],"Received":["from lists.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3])\n\t(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xmCTj5lXBz9t2R\n\tfor <incoming@patchwork.ozlabs.org>;\n\tTue,  5 Sep 2017 00:51:21 +1000 (AEST)","from lists.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 3xmCTj4hSxzDqsB\n\tfor <incoming@patchwork.ozlabs.org>;\n\tTue,  5 Sep 2017 00:51:21 +1000 (AEST)","from mx0a-001b2d01.pphosted.com (mx0b-001b2d01.pphosted.com\n\t[148.163.158.5])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n\tbits)) (No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 3xmCTS5wrQzDqZB\n\tfor <skiboot@lists.ozlabs.org>; Tue,  5 Sep 2017 00:51:07 +1000 (AEST)","from pps.filterd (m0098417.ppops.net [127.0.0.1])\n\tby mx0a-001b2d01.pphosted.com (8.16.0.21/8.16.0.21) with SMTP id\n\tv84EnDbQ062541\n\tfor <skiboot@lists.ozlabs.org>; Mon, 4 Sep 2017 10:51:05 -0400","from e35.co.us.ibm.com (e35.co.us.ibm.com [32.97.110.153])\n\tby mx0a-001b2d01.pphosted.com with ESMTP id 2cs8rsgn2n-1\n\t(version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT)\n\tfor <skiboot@lists.ozlabs.org>; Mon, 04 Sep 2017 10:51:05 -0400","from localhost\n\tby e35.co.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use\n\tOnly! Violators will be prosecuted\n\tfor <skiboot@lists.ozlabs.org> from <cclaudio@linux.vnet.ibm.com>;\n\tMon, 4 Sep 2017 08:51:04 -0600","from b03cxnp08027.gho.boulder.ibm.com (9.17.130.19)\n\tby e35.co.us.ibm.com (192.168.1.135) with IBM ESMTP SMTP Gateway:\n\tAuthorized Use Only! Violators will be prosecuted; \n\tMon, 4 Sep 2017 08:51:02 -0600","from b03ledav006.gho.boulder.ibm.com\n\t(b03ledav006.gho.boulder.ibm.com [9.17.130.237])\n\tby b03cxnp08027.gho.boulder.ibm.com (8.14.9/8.14.9/NCO v10.0) with\n\tESMTP id v84Ep2ZH65667160; Mon, 4 Sep 2017 07:51:02 -0700","from b03ledav006.gho.boulder.ibm.com (unknown [127.0.0.1])\n\tby IMSVA (Postfix) with ESMTP id 662C3C6047;\n\tMon,  4 Sep 2017 08:51:02 -0600 (MDT)","from [9.80.192.82] (unknown [9.80.192.82])\n\tby b03ledav006.gho.boulder.ibm.com (Postfix) with ESMTP id 6C5CBC6037;\n\tMon,  4 Sep 2017 08:51:01 -0600 (MDT)"],"Authentication-Results":"ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=linux.vnet.ibm.com\n\t(client-ip=148.163.158.5; helo=mx0a-001b2d01.pphosted.com;\n\tenvelope-from=cclaudio@linux.vnet.ibm.com; receiver=<UNKNOWN>)","To":"Oliver <oohall@gmail.com>","References":"<1504165372-15971-1-git-send-email-cclaudio@linux.vnet.ibm.com>\n\t<1504165372-15971-2-git-send-email-cclaudio@linux.vnet.ibm.com>\n\t<CAOSf1CHHK78BVGSFBzM02-7NsmDyZpryEmrgwRUNMhz1VditFA@mail.gmail.com>","From":"Claudio Carvalho <cclaudio@linux.vnet.ibm.com>","Date":"Mon, 4 Sep 2017 11:50:58 -0300","User-Agent":"Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101\n\tThunderbird/52.2.1","MIME-Version":"1.0","In-Reply-To":"<CAOSf1CHHK78BVGSFBzM02-7NsmDyZpryEmrgwRUNMhz1VditFA@mail.gmail.com>","Content-Language":"en-US","X-TM-AS-GCONF":"00","x-cbid":"17090414-0012-0000-0000-000014F4C47D","X-IBM-SpamModules-Scores":"","X-IBM-SpamModules-Versions":"BY=3.00007665; HX=3.00000241; KW=3.00000007;\n\tPH=3.00000004; SC=3.00000226; SDB=6.00912154; UDB=6.00457684;\n\tIPR=6.00692417; \n\tBA=6.00005569; NDR=6.00000001; ZLA=6.00000005; ZF=6.00000009;\n\tZB=6.00000000; \n\tZP=6.00000000; ZH=6.00000000; ZU=6.00000002; MB=3.00016998;\n\tXFM=3.00000015; UTC=2017-09-04 14:51:04","X-IBM-AV-DETECTION":"SAVI=unused REMOTE=unused XFE=unused","x-cbparentid":"17090414-0013-0000-0000-00004F59A69C","Message-Id":"<5223e4ae-e597-2d4c-ba95-25bc25c2c3a2@linux.vnet.ibm.com>","X-Proofpoint-Virus-Version":"vendor=fsecure engine=2.50.10432:, ,\n\tdefinitions=2017-09-04_09:, , signatures=0","X-Proofpoint-Spam-Details":"rule=outbound_notspam policy=outbound score=0\n\tspamscore=0 suspectscore=0\n\tmalwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam\n\tadjust=0 reason=mlx scancount=1 engine=8.0.1-1707230000\n\tdefinitions=main-1709040238","Subject":"Re: [Skiboot] [PATCH 1/5] hdata: add secure and trusted boot ntuple\n\tto SPIRA-H/S","X-BeenThere":"skiboot@lists.ozlabs.org","X-Mailman-Version":"2.1.23","Precedence":"list","List-Id":"Mailing list for skiboot development <skiboot.lists.ozlabs.org>","List-Unsubscribe":"<https://lists.ozlabs.org/options/skiboot>,\n\t<mailto:skiboot-request@lists.ozlabs.org?subject=unsubscribe>","List-Archive":"<http://lists.ozlabs.org/pipermail/skiboot/>","List-Post":"<mailto:skiboot@lists.ozlabs.org>","List-Help":"<mailto:skiboot-request@lists.ozlabs.org?subject=help>","List-Subscribe":"<https://lists.ozlabs.org/listinfo/skiboot>,\n\t<mailto:skiboot-request@lists.ozlabs.org?subject=subscribe>","Cc":"skiboot list <skiboot@lists.ozlabs.org>","Content-Transfer-Encoding":"base64","Content-Type":"text/plain; charset=\"utf-8\"; Format=\"flowed\"","Errors-To":"skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org","Sender":"\"Skiboot\"\n\t<skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org>"}}]