lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Sat,  7 Mar 2020 16:56:43 +0100
From:   Ard Biesheuvel <>
To:, Ingo Molnar <>,
        Thomas Gleixner <>
Cc:     Ard Biesheuvel <>,,,
Subject: [GIT PULL v2] More EFI updates for v5.7

Hello Ingo, Thomas,

This is v2 of my pull request for the second batch of EFI updates for v5.7.
It incorporates the stable branch created to help get Hans's embedded
firmware stuff merged, so I am sending this as an ordinary pull request
as well.

Please pull.

The following changes since commit e9765680a31b22ca6703936c000ce5cc46192e10:

  Merge tag 'efi-next' of git:// into efi/core (2020-02-26 15:21:22 +0100)

are available in the Git repository at:

  git:// tags/efi-next

for you to fetch changes up to dfb2a1c61fcdc8be5dd74608c411c78008a0f078:

  partitions/efi: Fix partition name parsing in GUID partition entry (2020-03-06 11:17:42 +0100)

More EFI updates for v5.7

- a fix for a boot regression in the IMA code on x86 booting without UEFI
- memory encryption fixes for x86, so that the TPM tables and the RNG
  config table created by the stub are correctly identified as living in
  unencrypted memory
- style tweak and doc update from Heinrich
- followup to the ARM EFI entry code simplifications to ensure that we
  don't rely on EFI_LOADER_DATA memory being RWX
- fixes from Arvind to ensure that the new mixed mode approach works as
  expected regardless of where the image is loaded in memory by the UEFI
  PE/COFF loader
- more fixes from Arvind to make it more likely that the image can be
  decompressed in place, regardless of where it was loaded in memory
- efivars bugfix and some cleanup from Vladis
- incorporate a stable branch with the EFI pieces of Hans's work on
  loading device firmware from EFI boot service memory regions
- some followup fixes for the EFI stub changes that are queued for
  v5.7 already
- an endianness fix for the EFI GPT partition table driver

Ard Biesheuvel (8):
      Merge tag 'stable-shared-branch-for-driver-tree' into HEAD
      efi/arm: clean EFI stub exit code from cache instead of avoiding it
      efi/arm64: clean EFI stub exit code from cache instead of avoiding it
      efi: mark all EFI runtime services as unsupported on non-EFI boot
      efi/libstub/x86: deal with exit() boot service returning
      efi/x86: ignore memory attributes table on i386
      efi/x86: preserve %ebx correctly in efi_set_virtual_address_map()
      efi/libstub/x86: use ULONG_MAX as upper bound for all allocations

Arvind Sankar (11):
      efi/x86: Annotate the LOADED_IMAGE_PROTOCOL_GUID with SYM_DATA
      efi/x86: Respect 32-bit ABI in efi32_pe_entry
      efi/x86: Make efi32_pe_entry more readable
      efi/x86: Avoid using code32_start
      x86/boot: Use unsigned comparison for addresses
      x86/boot/compressed/32: Save the output address instead of recalculating it
      efi/x86: Decompress at start of PE image load address
      efi/x86: Add kernel preferred address to PE header
      efi/x86: Remove extra headroom for setup block
      efi/x86: Don't relocate the kernel unless necessary
      efi/x86: Fix cast of image argument

Hans de Goede (2):
      efi: Export boot-services code and data as debugfs-blobs
      efi: Add embedded peripheral firmware support

Heinrich Schuchardt (2):
      efi: don't shadow i in efi_config_parse_tables()
      efi/libstub: add libstub/mem.c to documentation tree

Lukas Bulwahn (1):
      MAINTAINERS: adjust EFI entry to removing eboot.c

Masahiro Yamada (1):
      efi/libstub: avoid linking libstub/lib-ksyms.o into vmlinux

Nikolai Merinov (1):
      partitions/efi: Fix partition name parsing in GUID partition entry

Tom Lendacky (2):
      efi/x86: Add TPM related EFI tables to unencrypted mapping checks
      efi/x86: Add RNG seed EFI table to unencrypted mapping check

Vladis Dronov (3):
      efi: fix a race and a buffer overflow while reading efivars via sysfs
      efi: add a sanity check to efivar_store_raw()
      efi: fix a mistype in comments mentioning efivar_entry_iter_begin()

 Documentation/driver-api/firmware/efi/index.rst |  11 ++
 Documentation/driver-api/firmware/index.rst     |   1 +
 MAINTAINERS                                     |   1 -
 arch/arm/boot/compressed/head.S                 |  18 ++-
 arch/arm64/kernel/efi-entry.S                   |  26 ++---
 arch/arm64/kernel/image-vars.h                  |   4 +-
 arch/x86/boot/compressed/head_32.S              |  47 +++++---
 arch/x86/boot/compressed/head_64.S              | 112 ++++++++++++++----
 arch/x86/boot/header.S                          |   6 +-
 arch/x86/boot/tools/build.c                     |  44 +++++--
 arch/x86/kernel/asm-offsets.c                   |   1 -
 arch/x86/platform/efi/efi.c                     |   5 +
 arch/x86/platform/efi/efi_stub_32.S             |   2 +-
 arch/x86/platform/efi/quirks.c                  |   4 +
 block/partitions/efi.c                          |  35 ++++--
 block/partitions/efi.h                          |   2 +-
 drivers/firmware/efi/Kconfig                    |   5 +
 drivers/firmware/efi/Makefile                   |   3 +-
 drivers/firmware/efi/efi-pstore.c               |   2 +-
 drivers/firmware/efi/efi.c                      |  84 +++++++++++---
 drivers/firmware/efi/efivars.c                  |  32 ++++--
 drivers/firmware/efi/embedded-firmware.c        | 147 ++++++++++++++++++++++++
 drivers/firmware/efi/libstub/x86-stub.c         |  80 +++++++++----
 drivers/firmware/efi/vars.c                     |   2 +-
 include/linux/efi.h                             |   9 ++
 include/linux/efi_embedded_fw.h                 |  41 +++++++
 26 files changed, 583 insertions(+), 141 deletions(-)
 create mode 100644 Documentation/driver-api/firmware/efi/index.rst
 create mode 100644 drivers/firmware/efi/embedded-firmware.c
 create mode 100644 include/linux/efi_embedded_fw.h

Powered by blists - more mailing lists