lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 11 Jul 2018 11:40:32 +0200
From:   Ard Biesheuvel <ard.biesheuvel@...aro.org>
To:     linux-efi@...r.kernel.org, Ingo Molnar <mingo@...nel.org>,
        Thomas Gleixner <tglx@...utronix.de>
Cc:     Ard Biesheuvel <ard.biesheuvel@...aro.org>,
        linux-kernel@...r.kernel.org, Alexander Graf <agraf@...e.de>,
        Andy Lutomirski <luto@...nel.org>,
        Arnd Bergmann <arnd@...db.de>,
        Bartlomiej Zolnierkiewicz <b.zolnierkie@...sung.com>,
        Laszlo Ersek <lersek@...hat.com>,
        Leif Lindholm <leif.lindholm@...aro.org>,
        Linus Torvalds <torvalds@...ux-foundation.org>,
        Matt Fleming <matt@...eblueprint.co.uk>,
        Peter Jones <pjones@...hat.com>,
        Peter Zijlstra <peterz@...radead.org>,
        Sai Praneeth Prakhya <sai.praneeth.prakhya@...el.com>
Subject: [GIT PULL 0/8] EFI changes for v4.19

The following changes since commit 7daf201d7fe8334e2d2364d4e8ed3394ec9af819:

  Linux 4.18-rc2 (2018-06-24 20:54:29 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi.git tags/efi-next

for you to fetch changes up to 6a3524a55f16437d210f61bbb53c7c099b18babe:

  fbdev/efifb: honour UEFI memory map attributes when mapping the fb (2018-07-11 11:23:26 +0200)

----------------------------------------------------------------
EFI changes for v4.19, batch #1:
- Perform UEFI runtime services calls from a work queue so the calls into the
  firmware occur from a kernel thread (Sai)
- Honor the UEFI memory map attributes for live memory regions configured by
  UEFI as a framebuffer. This works around a coherency problem with KVM guests
  running on ARM. (Ard)
- Cleanup for the x86 EFI stub code (Ingo)
- A timekeeping fix from Arnd
- Gradually phase out the DTB loader in the ARM version of the EFI stub. (Ard)
- Drop an unused function declaration (Sai)

----------------------------------------------------------------
Ard Biesheuvel (3):
      efi/libstub/arm: add opt-in Kconfig option for the DTB loader
      efi: drop type and attribute checks in efi_mem_desc_lookup()
      fbdev/efifb: honour UEFI memory map attributes when mapping the fb

Arnd Bergmann (1):
      efi: cper: avoid using get_seconds()

Ingo Molnar (1):
      efi/x86: Clean up the eboot code

Sai Praneeth (3):
      efi/x86: Use non-blocking SetVariable() for efi_delete_dummy_variable()
      efi: Use a work queue to invoke EFI Runtime Services
      efi: Remove the declaration of efi_late_init() as the function is unused

 arch/x86/boot/compressed/eboot.c        | 245 ++++++++++++++++----------------
 arch/x86/platform/efi/quirks.c          |  14 +-
 drivers/firmware/efi/Kconfig            |  12 ++
 drivers/firmware/efi/cper.c             |  17 ++-
 drivers/firmware/efi/efi.c              |  22 ++-
 drivers/firmware/efi/esrt.c             |   5 +-
 drivers/firmware/efi/libstub/arm-stub.c |   7 +-
 drivers/firmware/efi/runtime-wrappers.c | 202 ++++++++++++++++++++++++--
 drivers/video/fbdev/efifb.c             |  51 +++++--
 include/linux/efi.h                     |   5 +-
 10 files changed, 413 insertions(+), 167 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ