Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/961287/?format=api
{ "id": 961287, "url": "http://patchwork.ozlabs.org/api/patches/961287/?format=api", "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/20180823104334.16083-15-jens.wiklander@linaro.org/", "project": { "id": 18, "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api", "name": "U-Boot", "link_name": "uboot", "list_id": "u-boot.lists.denx.de", "list_email": "u-boot@lists.denx.de", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20180823104334.16083-15-jens.wiklander@linaro.org>", "list_archive_url": null, "date": "2018-08-23T10:43:33", "name": "[U-Boot,v2,14/15] tee: optee: support AVB trusted application", "commit_ref": null, "pull_url": null, "state": "superseded", "archived": false, "hash": "b81d335184557e9ef5af0d4fc13bff19fc6efd98", "submitter": { "id": 66201, "url": "http://patchwork.ozlabs.org/api/people/66201/?format=api", "name": "Jens Wiklander", "email": "jens.wiklander@linaro.org" }, "delegate": { "id": 3651, "url": "http://patchwork.ozlabs.org/api/users/3651/?format=api", "username": "trini", "first_name": "Tom", "last_name": "Rini", "email": "trini@ti.com" }, "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/20180823104334.16083-15-jens.wiklander@linaro.org/mbox/", "series": [ { "id": 62144, "url": "http://patchwork.ozlabs.org/api/series/62144/?format=api", "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=62144", "date": "2018-08-23T10:43:19", "name": "AVB using OP-TEE", "version": 2, "mbox": "http://patchwork.ozlabs.org/series/62144/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/961287/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/961287/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<u-boot-bounces@lists.denx.de>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@bilbo.ozlabs.org", "Authentication-Results": [ "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=lists.denx.de\n\t(client-ip=81.169.180.215; helo=lists.denx.de;\n\tenvelope-from=u-boot-bounces@lists.denx.de;\n\treceiver=<UNKNOWN>)", "ozlabs.org;\n\tdmarc=fail (p=none dis=none) header.from=linaro.org", "ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n\tunprotected) header.d=linaro.org header.i=@linaro.org\n\theader.b=\"Fr0UXIdD\"; dkim-atps=neutral" ], "Received": [ "from lists.denx.de (dione.denx.de [81.169.180.215])\n\tby ozlabs.org (Postfix) with ESMTP id 41x1Tc1W9Mz9s3C\n\tfor <incoming@patchwork.ozlabs.org>;\n\tThu, 23 Aug 2018 20:52:52 +1000 (AEST)", "by lists.denx.de (Postfix, from userid 105)\n\tid D87D1C21F38; Thu, 23 Aug 2018 10:52:38 +0000 (UTC)", "from lists.denx.de (localhost [IPv6:::1])\n\tby lists.denx.de (Postfix) with ESMTP id 905BEC21E6C;\n\tThu, 23 Aug 2018 10:44:16 +0000 (UTC)", "by lists.denx.de (Postfix, from userid 105)\n\tid 00781C21F1C; Thu, 23 Aug 2018 10:44:08 +0000 (UTC)", "from mail-lj1-f194.google.com (mail-lj1-f194.google.com\n\t[209.85.208.194])\n\tby lists.denx.de (Postfix) with ESMTPS id E5BCFC21F2A\n\tfor <u-boot@lists.denx.de>; Thu, 23 Aug 2018 10:44:00 +0000 (UTC)", "by mail-lj1-f194.google.com with SMTP id m84-v6so3759164lje.10\n\tfor <u-boot@lists.denx.de>; Thu, 23 Aug 2018 03:44:00 -0700 (PDT)", "from jax.ideon.se ([85.235.10.227])\n\tby smtp.gmail.com with ESMTPSA id\n\ty5-v6sm679771ljj.75.2018.08.23.03.43.58\n\t(version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);\n\tThu, 23 Aug 2018 03:43:59 -0700 (PDT)" ], "X-Spam-Checker-Version": "SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de", "X-Spam-Level": "", "X-Spam-Status": "No, score=0.0 required=5.0 tests=RCVD_IN_MSPIKE_H2,\n\tT_DKIM_INVALID autolearn=unavailable autolearn_force=no version=3.4.0", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google;\n\th=from:to:cc:subject:date:message-id:in-reply-to:references;\n\tbh=klSemYlcrDKIF3DDPuRZP8FDdE304NvbognXejC19wg=;\n\tb=Fr0UXIdDcPQPdt/BoV2N9qD0oKRFDDCR8/bYzcKK0wFuKjOVtpBKmEuzUi6HeCCttO\n\t/82ZojS+tL9Zt3lbusz/mk/uCtiNssWWrL2b0x/TcnTJiFNjXG01f+LV4xDrRgDtAeXG\n\tfwJdyAzHChOF3qQD65bvu6FID9XA8KMaJ8Zjg=", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20161025;\n\th=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to\n\t:references;\n\tbh=klSemYlcrDKIF3DDPuRZP8FDdE304NvbognXejC19wg=;\n\tb=GHvewGeOvgb3xvq7TG8+8ZDBBuUguVwOVXmvHBNXl3o8fc0oXwVD+UgXvnBTNtRbuo\n\tjVTQQNL9P2PRvHR74nlvHVOm9BrQ54K5LKWER9Dyx7c/QRgarRoPybkAdeVjElrUIYAY\n\tAOE5TWPXA1dUAHHjWVhpf2DovPE8aOx/WYU47FqUH+2i5XlKlilMUAZNe/GBMYbtOHNL\n\tg7r+p/ffjmAtKXY9DRXKReWM3jN3IVWc++axs0/3cHnTYNK5mxGWacMqI2gqUOQ3ck8P\n\tj4UqkRw86gMhTqC9O8xGinYUexCQ+Z6o3nxosf0ts7z9XM5eGJTHaxZfTdGg+QUVTtIv\n\txmYA==", "X-Gm-Message-State": "APzg51DrydpNj4bTMmOQQJraGkbii7zLBAm7rY/h0dN3tedRaOnTzMgK\n\tiOYDb9Rdyho1C4fbpZ3DAvU2ltOt1MA=", "X-Google-Smtp-Source": "AA+uWPxZzYt6MXcwGHD6xWemi/jt5Q8sSMTnCklGJHpJbQ/WBuugv1+Ql/HO9+CNaijqyrcSmmhpSg==", "X-Received": "by 2002:a2e:9c0f:: with SMTP id\n\ts15-v6mr9617705lji.97.1535021040132; \n\tThu, 23 Aug 2018 03:44:00 -0700 (PDT)", "From": "Jens Wiklander <jens.wiklander@linaro.org>", "To": "u-boot@lists.denx.de", "Date": "Thu, 23 Aug 2018 12:43:33 +0200", "Message-Id": "<20180823104334.16083-15-jens.wiklander@linaro.org>", "X-Mailer": "git-send-email 2.17.1", "In-Reply-To": "<20180823104334.16083-1-jens.wiklander@linaro.org>", "References": "<20180823104334.16083-1-jens.wiklander@linaro.org>", "Cc": "Tom Rini <trini@konsulko.com>, Pierre Aubert <p.aubert@staubli.com>", "Subject": "[U-Boot] [PATCH v2 14/15] tee: optee: support AVB trusted\n\tapplication", "X-BeenThere": "u-boot@lists.denx.de", "X-Mailman-Version": "2.1.18", "Precedence": "list", "List-Id": "U-Boot discussion <u-boot.lists.denx.de>", "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n\t<mailto:u-boot-request@lists.denx.de?subject=unsubscribe>", "List-Archive": "<http://lists.denx.de/pipermail/u-boot/>", "List-Post": "<mailto:u-boot@lists.denx.de>", "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>", "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n\t<mailto:u-boot-request@lists.denx.de?subject=subscribe>", "MIME-Version": "1.0", "Content-Type": "text/plain; charset=\"utf-8\"", "Content-Transfer-Encoding": "base64", "Errors-To": "u-boot-bounces@lists.denx.de", "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>" }, "content": "Adds configuration option OPTEE_TA_AVB and a header file describing the\ninterface to the AVB trusted application provided by OP-TEE.\n\nTested-by: Igor Opaniuk <igor.opaniuk@linaro.org>\nReviewed-by: Igor Opaniuk <igor.opaniuk@linaro.org>\nSigned-off-by: Jens Wiklander <jens.wiklander@linaro.org>\n---\n MAINTAINERS | 1 +\n drivers/tee/optee/Kconfig | 16 +++++++++++++\n include/tee.h | 7 ++++++\n include/tee/optee_ta_avb.h | 48 ++++++++++++++++++++++++++++++++++++++\n 4 files changed, 72 insertions(+)\n create mode 100644 include/tee/optee_ta_avb.h", "diff": "diff --git a/MAINTAINERS b/MAINTAINERS\nindex 7458c606ee92..cb36c45d74ea 100644\n--- a/MAINTAINERS\n+++ b/MAINTAINERS\n@@ -576,6 +576,7 @@ M:\tJens Wiklander <jens.wiklander@linaro.org>\n S:\tMaintained\n F:\tdrivers/tee/\n F:\tinclude/tee.h\n+F:\tinclude/tee/\n \n UBI\n M:\tKyungmin Park <kmpark@infradead.org>\ndiff --git a/drivers/tee/optee/Kconfig b/drivers/tee/optee/Kconfig\nindex 8f7ebe161111..a5dc08439629 100644\n--- a/drivers/tee/optee/Kconfig\n+++ b/drivers/tee/optee/Kconfig\n@@ -5,3 +5,19 @@ config OPTEE\n \thelp\n \t This implements the OP-TEE Trusted Execution Environment (TEE)\n \t driver.\n+\n+if OPTEE\n+\n+menu \"OP-TEE options\"\n+\n+config OPTEE_TA_AVB\n+\tbool \"Support AVB TA\"\n+\tdefault y\n+\thelp\n+\t Enables support for the AVB Trusted Application (TA) in OP-TEE.\n+\t The TA can support the \"avb\" subcommands \"read_rb\", \"write\"rb\"\n+\t and \"is_unlocked\".\n+\n+endmenu\n+\n+endif\ndiff --git a/include/tee.h b/include/tee.h\nindex 3e6771123ef0..b851d718d32f 100644\n--- a/include/tee.h\n+++ b/include/tee.h\n@@ -48,6 +48,13 @@\n \n #define TEE_ORIGIN_COMMS\t\t0x00000002\n \n+struct tee_optee_ta_uuid {\n+\tu32 time_low;\n+\tu16 time_mid;\n+\tu16 time_hi_and_version;\n+\tu8 clock_seq_and_node[8];\n+};\n+\n /**\n * struct tee_shm - memory shared with the TEE\n * @dev:\tThe TEE device\ndiff --git a/include/tee/optee_ta_avb.h b/include/tee/optee_ta_avb.h\nnew file mode 100644\nindex 000000000000..0e1da084e09d\n--- /dev/null\n+++ b/include/tee/optee_ta_avb.h\n@@ -0,0 +1,48 @@\n+/* SPDX-License-Identifier: BSD-2-Clause */\n+/* Copyright (c) 2018, Linaro Limited */\n+\n+#ifndef __TA_AVB_H\n+#define __TA_AVB_H\n+\n+#define TA_AVB_UUID { 0x023f8f1a, 0x292a, 0x432b, \\\n+\t\t { 0x8f, 0xc4, 0xde, 0x84, 0x71, 0x35, 0x80, 0x67 } }\n+\n+#define TA_AVB_MAX_ROLLBACK_LOCATIONS\t256\n+\n+/*\n+ * Gets the rollback index corresponding to the given rollback index slot.\n+ *\n+ * in\tparams[0].value.a:\trollback index slot\n+ * out\tparams[1].value.a:\tupper 32 bits of rollback index\n+ * out\tparams[1].value.b:\tlower 32 bits of rollback index\n+ */\n+#define TA_AVB_CMD_READ_ROLLBACK_INDEX\t0\n+\n+/*\n+ * Updates the rollback index corresponding to the given rollback index slot.\n+ *\n+ * Will refuse to update a slot with a lower value.\n+ *\n+ * in\tparams[0].value.a:\trollback index slot\n+ * in\tparams[1].value.a:\tupper 32 bits of rollback index\n+ * in\tparams[1].value.b:\tlower 32 bits of rollback index\n+ */\n+#define TA_AVB_CMD_WRITE_ROLLBACK_INDEX\t1\n+\n+/*\n+ * Gets the lock state of the device.\n+ *\n+ * out\tparams[0].value.a:\tlock state\n+ */\n+#define TA_AVB_CMD_READ_LOCK_STATE\t2\n+\n+/*\n+ * Sets the lock state of the device.\n+ *\n+ * If the lock state is changed all rollback slots will be reset to 0\n+ *\n+ * in\tparams[0].value.a:\tlock state\n+ */\n+#define TA_AVB_CMD_WRITE_LOCK_STATE\t3\n+\n+#endif /*__TA_AVB_H*/\n", "prefixes": [ "U-Boot", "v2", "14/15" ] }