lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 12 Jan 2015 17:51:52 +0000
From:	Ard Biesheuvel <ard.biesheuvel@...aro.org>
To:	Catalin Marinas <catalin.marinas@....com>,
	Will Deacon <will.deacon@....com>,
	"linux-arm-kernel@...ts.infradead.org" 
	<linux-arm-kernel@...ts.infradead.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Cc:	Leif Lindholm <leif.lindholm@...aro.org>,
	Roy Franz <roy.franz@...aro.org>,
	Mark Salter <msalter@...hat.com>,
	Mark Rutland <mark.rutland@....com>,
	Geoff Levand <geoff.levand@...aro.org>,
	Dave Young <dyoung@...hat.com>,
	Matt Fleming <matt.fleming@...el.com>
Subject: [GIT PULL] UEFI updates for arm64

Hello Catalin,

The following changes since commit eaa27f34e91a14cdceed26ed6c6793ec1d186115:

  linux 3.19-rc4 (2015-01-11 12:44:53 -0800)

are available in the git repository at:

  http://git.linaro.org/people/ard.biesheuvel/linux-arm.git tags/for-3.20

for you to fetch changes up to 9679be103108926cfe9e6fd2f6829cefa77e47b0:

  arm64/efi: remove idmap manipulations from UEFI code (2015-01-12
16:29:32 +0000)

Some patches touch files under drivers/firmware/efi, these have been
acked by Matt
Fleming, and he is aware that this series is being offered for merging
through the
arm64 tree

Regards,
Ard.


----------------------------------------------------------------
UEFI updates for arm64

This series consists of a reimplementation of the virtual remapping of
UEFI Runtime Services in a way that is stable across kexec, including
the required preparatory refactoring and other work to set the stage,
and some cleaning up afterwards to remove boot services memory and
identitity map handling that has now become redundant.

----------------------------------------------------------------
Ard Biesheuvel (8):
      arm64/mm: add explicit struct_mm argument to __create_mapping()
      arm64/mm: add create_pgd_mapping() to create private page tables
      efi: split off remapping code from efi_config_init()
      efi: efistub: allow allocation alignment larger than EFI_PAGE_SIZE
      arm64/efi: set EFI_ALLOC_ALIGN to 64 KB
      arm64/efi: move SetVirtualAddressMap() to UEFI stub
      arm64/efi: remove free_boot_services() and friends
      arm64/efi: remove idmap manipulations from UEFI code

 arch/arm64/include/asm/efi.h                   |  38 ++-
 arch/arm64/include/asm/mmu.h                   |   5 +-
 arch/arm64/include/asm/pgtable.h               |   5 +
 arch/arm64/kernel/efi.c                        | 369 ++++++++-----------------
 arch/arm64/kernel/setup.c                      |   2 +-
 arch/arm64/mm/mmu.c                            |  60 ++--
 drivers/firmware/efi/efi.c                     |  56 ++--
 drivers/firmware/efi/libstub/arm-stub.c        |  59 ++++
 drivers/firmware/efi/libstub/efi-stub-helper.c |  25 +-
 drivers/firmware/efi/libstub/efistub.h         |   4 +
 drivers/firmware/efi/libstub/fdt.c             |  62 ++++-
 include/linux/efi.h                            |   2 +
 12 files changed, 362 insertions(+), 325 deletions(-)
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ