{"id":808090,"url":"http://patchwork.ozlabs.org/api/1.0/patches/808090/?format=json","project":{"id":44,"url":"http://patchwork.ozlabs.org/api/1.0/projects/44/?format=json","name":"skiboot firmware development","link_name":"skiboot","list_id":"skiboot.lists.ozlabs.org","list_email":"skiboot@lists.ozlabs.org","web_url":"http://github.com/open-power/skiboot","scm_url":"http://github.com/open-power/skiboot","webscm_url":""},"msgid":"<1504164285-15095-2-git-send-email-cclaudio@linux.vnet.ibm.com>","date":"2017-08-31T07:24:32","name":"[v2,01/14] libstb/stb.c: remove macros used to force secure-mode and trusted-mode","commit_ref":null,"pull_url":null,"state":"superseded","archived":false,"hash":"87fba57040ef5e0fafa32af78d0ad5b9dd6c6c99","submitter":{"id":69305,"url":"http://patchwork.ozlabs.org/api/1.0/people/69305/?format=json","name":"Claudio Carvalho","email":"cclaudio@linux.vnet.ibm.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/skiboot/patch/1504164285-15095-2-git-send-email-cclaudio@linux.vnet.ibm.com/mbox/","series":[{"id":760,"url":"http://patchwork.ozlabs.org/api/1.0/series/760/?format=json","date":"2017-08-31T07:24:31","name":"libstb: simplify the initialization of cvc drivers","version":2,"mbox":"http://patchwork.ozlabs.org/series/760/mbox/"}],"check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/808090/checks/","tags":{},"headers":{"Return-Path":"<skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org>","X-Original-To":["incoming@patchwork.ozlabs.org","skiboot@lists.ozlabs.org"],"Delivered-To":["patchwork-incoming@bilbo.ozlabs.org","skiboot@lists.ozlabs.org"],"Received":["from lists.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3])\n\t(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xjYnc2mt8z9sNr\n\tfor <incoming@patchwork.ozlabs.org>;\n\tThu, 31 Aug 2017 17:25:56 +1000 (AEST)","from lists.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 3xjYnb5q39zDqTr\n\tfor <incoming@patchwork.ozlabs.org>;\n\tThu, 31 Aug 2017 17:25:55 +1000 (AEST)","from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com\n\t[148.163.156.1])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n\tbits)) (No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 3xjYmf58SQzDqGX\n\tfor <skiboot@lists.ozlabs.org>; Thu, 31 Aug 2017 17:25:06 +1000 (AEST)","from pps.filterd (m0098410.ppops.net [127.0.0.1])\n\tby mx0a-001b2d01.pphosted.com (8.16.0.21/8.16.0.21) with SMTP id\n\tv7V7NgMO064296\n\tfor <skiboot@lists.ozlabs.org>; Thu, 31 Aug 2017 03:25:04 -0400","from e16.ny.us.ibm.com (e16.ny.us.ibm.com [129.33.205.206])\n\tby mx0a-001b2d01.pphosted.com with ESMTP id 2cpdby25wn-1\n\t(version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT)\n\tfor <skiboot@lists.ozlabs.org>; Thu, 31 Aug 2017 03:25:04 -0400","from localhost\n\tby e16.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use\n\tOnly! Violators will be prosecuted\n\tfor <skiboot@lists.ozlabs.org> from <cclaudio@linux.vnet.ibm.com>;\n\tThu, 31 Aug 2017 03:25:03 -0400","from b01cxnp22034.gho.pok.ibm.com (9.57.198.24)\n\tby e16.ny.us.ibm.com (146.89.104.203) with IBM ESMTP SMTP Gateway:\n\tAuthorized Use Only! Violators will be prosecuted; \n\tThu, 31 Aug 2017 03:25:00 -0400","from b01ledav004.gho.pok.ibm.com (b01ledav004.gho.pok.ibm.com\n\t[9.57.199.109])\n\tby b01cxnp22034.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP\n\tid v7V7P0Po23134372\n\tfor <skiboot@lists.ozlabs.org>; Thu, 31 Aug 2017 07:25:00 GMT","from localhost (unknown [127.0.0.1])\n\tby IMSVA (Postfix) with SMTP id CE88F112034\n\tfor <skiboot@lists.ozlabs.org>; Thu, 31 Aug 2017 03:24:45 -0400 (EDT)","from legolas.ibm.com (unknown [9.85.193.48])\n\tby b01ledav004.gho.pok.ibm.com (Postfix) with ESMTP id 43997112034;\n\tThu, 31 Aug 2017 03:24:39 -0400 (EDT)"],"X-IMSS-HAND-OFF-DIRECTIVE":"127.0.0.1:10026","From":"Claudio Carvalho <cclaudio@linux.vnet.ibm.com>","To":"skiboot@lists.ozlabs.org","Date":"Thu, 31 Aug 2017 04:24:32 -0300","X-Mailer":"git-send-email 2.7.4","In-Reply-To":"<1504164285-15095-1-git-send-email-cclaudio@linux.vnet.ibm.com>","References":"<1504164285-15095-1-git-send-email-cclaudio@linux.vnet.ibm.com>","X-TM-AS-GCONF":"00","x-cbid":"17083107-0024-0000-0000-000002C83746","X-IBM-SpamModules-Scores":"","X-IBM-SpamModules-Versions":"BY=3.00007640; HX=3.00000241; KW=3.00000007;\n\tPH=3.00000004; SC=3.00000226; SDB=6.00910097; UDB=6.00456510;\n\tIPR=6.00690378; \n\tBA=6.00005562; NDR=6.00000001; ZLA=6.00000005; ZF=6.00000009;\n\tZB=6.00000000; \n\tZP=6.00000000; ZH=6.00000000; ZU=6.00000002; MB=3.00016938;\n\tXFM=3.00000015; UTC=2017-08-31 07:25:01","X-IBM-AV-DETECTION":"SAVI=unused REMOTE=unused XFE=unused","x-cbparentid":"17083107-0025-0000-0000-00004544BA70","Message-Id":"<1504164285-15095-2-git-send-email-cclaudio@linux.vnet.ibm.com>","X-Proofpoint-Virus-Version":"vendor=fsecure engine=2.50.10432:, ,\n\tdefinitions=2017-08-31_02:, , signatures=0","X-Proofpoint-Spam-Details":"rule=outbound_notspam policy=outbound score=0\n\tspamscore=0 suspectscore=1\n\tmalwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam\n\tadjust=0 reason=mlx scancount=1 engine=8.0.1-1707230000\n\tdefinitions=main-1708310114","Subject":"[Skiboot] [PATCH v2 01/14] libstb/stb.c: remove macros used to\n\tforce secure-mode and trusted-mode","X-BeenThere":"skiboot@lists.ozlabs.org","X-Mailman-Version":"2.1.23","Precedence":"list","List-Id":"Mailing list for skiboot development <skiboot.lists.ozlabs.org>","List-Unsubscribe":"<https://lists.ozlabs.org/options/skiboot>,\n\t<mailto:skiboot-request@lists.ozlabs.org?subject=unsubscribe>","List-Archive":"<http://lists.ozlabs.org/pipermail/skiboot/>","List-Post":"<mailto:skiboot@lists.ozlabs.org>","List-Help":"<mailto:skiboot-request@lists.ozlabs.org?subject=help>","List-Subscribe":"<https://lists.ozlabs.org/listinfo/skiboot>,\n\t<mailto:skiboot-request@lists.ozlabs.org?subject=subscribe>","MIME-Version":"1.0","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"base64","Errors-To":"skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org","Sender":"\"Skiboot\"\n\t<skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org>"},"content":"This removes STB_FORCE_SECURE_MODE and STB_FORCE_TRUSTED_MODE, which are\nmacros used to force secure mode and trusted mode, respectively.\n\nWe don't need that anymore because the same functionality is provided by\nNVRAM config variables.\n\nSigned-off-by: Claudio Carvalho <cclaudio@linux.vnet.ibm.com>\n---\n libstb/stb.c | 12 ------------\n 1 file changed, 12 deletions(-)","diff":"diff --git a/libstb/stb.c b/libstb/stb.c\nindex f798bcb..41e6505 100644\n--- a/libstb/stb.c\n+++ b/libstb/stb.c\n@@ -28,8 +28,6 @@\n \n /* For debugging only */\n //#define STB_DEBUG\n-//#define STB_FORCE_SECURE_MODE\n-//#define STB_FORCE_TRUSTED_MODE\n \n static bool secure_mode = false;\n static bool trusted_mode = false;\n@@ -112,10 +110,6 @@ void stb_init(void)\n \t\treturn;\n \t}\n \n-#ifdef STB_FORCE_SECURE_MODE\n-\tsecure_mode = true;\n-\tprlog(PR_NOTICE, \"STB: secure mode on (forced!)\\n\");\n-#else\n \tsecure_mode = dt_has_node_property(ibm_secureboot, \"secure-enabled\",\n \t\t\t\t\t   NULL);\n \n@@ -127,12 +121,7 @@ void stb_init(void)\n \t} else {\n \t\tprlog(PR_NOTICE, \"STB: secure mode off\\n\");\n \t}\n-#endif\n \n-#ifdef STB_FORCE_TRUSTED_MODE\n-\ttrusted_mode = true;\n-\tprlog(PR_NOTICE, \"STB: trusted mode on (forced!)\\n\");\n-#else\n \ttrusted_mode = dt_has_node_property(ibm_secureboot, \"trusted-enabled\",\n \t\t\t\t\t    NULL);\n \tif (nvram_query_eq(\"force-trusted-mode\", \"true\")) {\n@@ -141,7 +130,6 @@ void stb_init(void)\n \t}\n \tprlog(PR_NOTICE, \"STB: trusted mode %s\\n\",\n \t      trusted_mode ? \"on\" : \"off\");\n-#endif\n \n \tif (!secure_mode && !trusted_mode)\n \t\treturn;\n","prefixes":["v2","01/14"]}