[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20200307155643.18095-1-ardb@kernel.org>
Date: Sat, 7 Mar 2020 16:56:43 +0100
From: Ard Biesheuvel <ardb@...nel.org>
To: linux-efi@...r.kernel.org, Ingo Molnar <mingo@...nel.org>,
Thomas Gleixner <tglx@...utronix.de>
Cc: Ard Biesheuvel <ardb@...nel.org>, linux-kernel@...r.kernel.org,
hdegoede@...hat.com, nivedita@...m.mit.edu
Subject: [GIT PULL v2] More EFI updates for v5.7
Hello Ingo, Thomas,
This is v2 of my pull request for the second batch of EFI updates for v5.7.
It incorporates the stable branch created to help get Hans's embedded
firmware stuff merged, so I am sending this as an ordinary pull request
as well.
Please pull.
The following changes since commit e9765680a31b22ca6703936c000ce5cc46192e10:
Merge tag 'efi-next' of git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi into efi/core (2020-02-26 15:21:22 +0100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi.git tags/efi-next
for you to fetch changes up to dfb2a1c61fcdc8be5dd74608c411c78008a0f078:
partitions/efi: Fix partition name parsing in GUID partition entry (2020-03-06 11:17:42 +0100)
----------------------------------------------------------------
More EFI updates for v5.7
- a fix for a boot regression in the IMA code on x86 booting without UEFI
- memory encryption fixes for x86, so that the TPM tables and the RNG
config table created by the stub are correctly identified as living in
unencrypted memory
- style tweak and doc update from Heinrich
- followup to the ARM EFI entry code simplifications to ensure that we
don't rely on EFI_LOADER_DATA memory being RWX
- fixes from Arvind to ensure that the new mixed mode approach works as
expected regardless of where the image is loaded in memory by the UEFI
PE/COFF loader
- more fixes from Arvind to make it more likely that the image can be
decompressed in place, regardless of where it was loaded in memory
- efivars bugfix and some cleanup from Vladis
- incorporate a stable branch with the EFI pieces of Hans's work on
loading device firmware from EFI boot service memory regions
- some followup fixes for the EFI stub changes that are queued for
v5.7 already
- an endianness fix for the EFI GPT partition table driver
----------------------------------------------------------------
Ard Biesheuvel (8):
Merge tag 'stable-shared-branch-for-driver-tree' into HEAD
efi/arm: clean EFI stub exit code from cache instead of avoiding it
efi/arm64: clean EFI stub exit code from cache instead of avoiding it
efi: mark all EFI runtime services as unsupported on non-EFI boot
efi/libstub/x86: deal with exit() boot service returning
efi/x86: ignore memory attributes table on i386
efi/x86: preserve %ebx correctly in efi_set_virtual_address_map()
efi/libstub/x86: use ULONG_MAX as upper bound for all allocations
Arvind Sankar (11):
efi/x86: Annotate the LOADED_IMAGE_PROTOCOL_GUID with SYM_DATA
efi/x86: Respect 32-bit ABI in efi32_pe_entry
efi/x86: Make efi32_pe_entry more readable
efi/x86: Avoid using code32_start
x86/boot: Use unsigned comparison for addresses
x86/boot/compressed/32: Save the output address instead of recalculating it
efi/x86: Decompress at start of PE image load address
efi/x86: Add kernel preferred address to PE header
efi/x86: Remove extra headroom for setup block
efi/x86: Don't relocate the kernel unless necessary
efi/x86: Fix cast of image argument
Hans de Goede (2):
efi: Export boot-services code and data as debugfs-blobs
efi: Add embedded peripheral firmware support
Heinrich Schuchardt (2):
efi: don't shadow i in efi_config_parse_tables()
efi/libstub: add libstub/mem.c to documentation tree
Lukas Bulwahn (1):
MAINTAINERS: adjust EFI entry to removing eboot.c
Masahiro Yamada (1):
efi/libstub: avoid linking libstub/lib-ksyms.o into vmlinux
Nikolai Merinov (1):
partitions/efi: Fix partition name parsing in GUID partition entry
Tom Lendacky (2):
efi/x86: Add TPM related EFI tables to unencrypted mapping checks
efi/x86: Add RNG seed EFI table to unencrypted mapping check
Vladis Dronov (3):
efi: fix a race and a buffer overflow while reading efivars via sysfs
efi: add a sanity check to efivar_store_raw()
efi: fix a mistype in comments mentioning efivar_entry_iter_begin()
Documentation/driver-api/firmware/efi/index.rst | 11 ++
Documentation/driver-api/firmware/index.rst | 1 +
MAINTAINERS | 1 -
arch/arm/boot/compressed/head.S | 18 ++-
arch/arm64/kernel/efi-entry.S | 26 ++---
arch/arm64/kernel/image-vars.h | 4 +-
arch/x86/boot/compressed/head_32.S | 47 +++++---
arch/x86/boot/compressed/head_64.S | 112 ++++++++++++++----
arch/x86/boot/header.S | 6 +-
arch/x86/boot/tools/build.c | 44 +++++--
arch/x86/kernel/asm-offsets.c | 1 -
arch/x86/platform/efi/efi.c | 5 +
arch/x86/platform/efi/efi_stub_32.S | 2 +-
arch/x86/platform/efi/quirks.c | 4 +
block/partitions/efi.c | 35 ++++--
block/partitions/efi.h | 2 +-
drivers/firmware/efi/Kconfig | 5 +
drivers/firmware/efi/Makefile | 3 +-
drivers/firmware/efi/efi-pstore.c | 2 +-
drivers/firmware/efi/efi.c | 84 +++++++++++---
drivers/firmware/efi/efivars.c | 32 ++++--
drivers/firmware/efi/embedded-firmware.c | 147 ++++++++++++++++++++++++
drivers/firmware/efi/libstub/x86-stub.c | 80 +++++++++----
drivers/firmware/efi/vars.c | 2 +-
include/linux/efi.h | 9 ++
include/linux/efi_embedded_fw.h | 41 +++++++
26 files changed, 583 insertions(+), 141 deletions(-)
create mode 100644 Documentation/driver-api/firmware/efi/index.rst
create mode 100644 drivers/firmware/efi/embedded-firmware.c
create mode 100644 include/linux/efi_embedded_fw.h
Powered by blists - more mailing lists