lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 23 Nov 2016 13:38:55 +0000 From: Mark Rutland <mark.rutland@....com> To: David Howells <dhowells@...hat.com> Cc: lukas@...ner.de, linux-efi@...r.kernel.org, linux-security-module@...r.kernel.org, keyrings@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH 2/6] arm/efi: Allow invocation of arbitrary runtime services [ver #2] On Wed, Nov 23, 2016 at 11:46:38AM +0000, David Howells wrote: > Mark Rutland <mark.rutland@....com> wrote: > > On Wed, Nov 23, 2016 at 12:22:43AM +0000, David Howells wrote: > > > Provide the ability to perform mixed-mode runtime service calls for arm in > > > the same way that commit 0a637ee61247bd4bed9b2a07568ef7a1cfc76187 > > > ("x86/efi: Allow invocation of arbitrary boot services") provides the > > > ability to invoke arbitrary boot services. > > > > I'm not sure I understand. On arm/arm64, "mixed-mode" simply isn't possible. > > > > I see we already call runtime services directly in efi_get_secureboot() > > in drivers/firmware/efi/libstub/arm-stub.c. > > > > If this is just to provide a consistent API for the stub, please note > > that. > > How about: > > arm/efi: Allow invocation of arbitrary runtime services > > efi_call_runtime() is provided for x86 to be able abstract mixed mode > support. Provide this for ARM also so that common code work in mixed mode > also. That sounds good to me. Thanks, Mark.
Powered by blists - more mailing lists