mbox series

[GIT,PULL] EFI updates for v6.3

Message ID 20230220184729.344373-1-ardb@kernel.org
State New
Headers show
Series [GIT,PULL] EFI updates for v6.3 | expand

Pull-request

git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi.git tags/efi-next-for-v6.3

Message

Ard Biesheuvel Feb. 20, 2023, 6:47 p.m. UTC
Hello Linus,

Please pull the EFI updates below.

There is one minor conflict [0] in arch/arm64/include/asm/efi.h against a fix
that went into -rc8, but not worth the hassle of merging back the EFI fixes
branch, so you'll have to fix that up (if you don't mind).

Thanks,
Ard.


The following changes since commit 1b929c02afd37871d5afb9d498426f83432e71c2:

  Linux 6.2-rc1 (2022-12-25 13:41:39 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi.git tags/efi-next-for-v6.3

for you to fetch changes up to e1d447157f232c650e6f32c9fb89ff3d0207c69a:

  firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3 (2023-02-19 14:41:33 +0100)

[0] https://lore.kernel.org/all/20230220135844.73e9dcae@canb.auug.org.au/

----------------------------------------------------------------
A healthy mix of EFI contributions this time:

- Performance tweaks for efifb earlycon by Andy

- Preparatory refactoring and cleanup work in the efivar layer by Johan,
  which is needed to accommodate the Snapdragon arm64 laptops that
  expose their EFI variable store via a TEE secure world API.

- Enhancements to the EFI memory map handling so that Xen dom0 can
  safely access EFI configuration tables (Demi Marie)

- Wire up the newly introduced IBT/BTI flag in the EFI memory attributes
  table, so that firmware that is generated with ENDBR/BTI landing pads
  will be mapped with enforcement enabled.

- Clean up how we check and print the EFI revision exposed by the
  firmware.

- Incorporate EFI memory attributes protocol definition contributed by
  Evgeniy and wire it up in the EFI zboot code. This ensures that these
  images can execute under new and stricter rules regarding the default
  memory permissions for EFI page allocations. (More work is in progress
  here)

- CPER header cleanup by Dan Williams

- Use a raw spinlock to protect the EFI runtime services stack on arm64
  to ensure the correct semantics under -rt. (Pierre)

- EFI framebuffer quirk for Lenovo Ideapad by Darrell.

----------------------------------------------------------------
Andy Shevchenko (2):
      efi/earlycon: Replace open coded strnchrnul()
      efi/earlycon: Speed up scrolling by disregarding empty space

Ard Biesheuvel (7):
      efi: zboot: Use EFI protocol to remap code/data with the right attributes
      efi: Drop minimum EFI version check at boot
      efi: Use standard format for printing the EFI revision
      efi: Discover BTI support in runtime services regions
      efi: arm64: Wire up BTI annotation in memory attributes table
      efi: x86: Wire up IBT annotation in memory attributes table
      efi: Add mixed-mode thunk recipe for GetMemoryAttributes

Dan Williams (1):
      efi/cper, cxl: Remove cxl_err.h

Darrell Kavanagh (1):
      firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3

Demi Marie Obenour (5):
      efi: memmap: Disregard bogus entries instead of returning them
      efi: xen: Implement memory descriptor lookup based on hypercall
      efi: Apply allowlist to EFI configuration tables when running under Xen
      efi: Actually enable the ESRT under Xen
      efi: Warn if trying to reserve memory under Xen

Evgeniy Baskov (1):
      efi/libstub: Add memory attribute protocol definitions

Johan Hovold (6):
      efi: efivars: drop kobject from efivars_register()
      efi: efivars: make efivar_supports_writes() return bool
      efi: efivars: add efivars printk prefix
      efivarfs: always register filesystem
      efi: verify that variable services are supported
      efi: efivars: prevent double registration

Pierre Gondois (1):
      arm64: efi: Make efi_rt_lock a raw_spinlock

 arch/arm/include/asm/efi.h                     |  2 +-
 arch/arm/kernel/efi.c                          |  5 +-
 arch/arm64/include/asm/efi.h                   |  9 ++--
 arch/arm64/kernel/efi.c                        | 20 +++++--
 arch/arm64/kernel/traps.c                      |  6 +++
 arch/ia64/kernel/efi.c                         |  2 +-
 arch/riscv/include/asm/efi.h                   |  2 +-
 arch/riscv/kernel/efi.c                        |  3 +-
 arch/x86/include/asm/efi.h                     | 14 ++++-
 arch/x86/include/asm/ibt.h                     |  4 +-
 arch/x86/kernel/apm_32.c                       |  4 +-
 arch/x86/kernel/cpu/common.c                   |  5 +-
 arch/x86/platform/efi/efi.c                    |  2 +-
 arch/x86/platform/efi/efi_64.c                 |  8 ++-
 drivers/firmware/efi/cper_cxl.c                | 12 ++++-
 drivers/firmware/efi/earlycon.c                | 41 ++++++++++----
 drivers/firmware/efi/efi-init.c                |  2 +-
 drivers/firmware/efi/efi.c                     | 74 ++++++++++++++++++++------
 drivers/firmware/efi/esrt.c                    | 15 ++----
 drivers/firmware/efi/libstub/efi-stub-helper.c | 67 +++++++++++++++++++++++
 drivers/firmware/efi/libstub/efistub.h         | 23 ++++++++
 drivers/firmware/efi/libstub/zboot.c           |  2 +
 drivers/firmware/efi/memattr.c                 |  7 ++-
 drivers/firmware/efi/sysfb_efi.c               |  8 +++
 drivers/firmware/efi/vars.c                    | 38 +++++++------
 drivers/firmware/google/gsmi.c                 |  2 +-
 drivers/xen/efi.c                              | 61 +++++++++++++++++++++
 fs/efivarfs/super.c                            |  9 ++--
 include/linux/cxl_err.h                        | 22 --------
 include/linux/efi.h                            | 36 +++++++++----
 30 files changed, 389 insertions(+), 116 deletions(-)
 delete mode 100644 include/linux/cxl_err.h

Comments

pr-tracker-bot@kernel.org Feb. 23, 2023, 11:16 p.m. UTC | #1
The pull request you sent on Mon, 20 Feb 2023 19:47:29 +0100:

> git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi.git tags/efi-next-for-v6.3

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/06e1a81c4806d0b7f75f9d742ebf410718244e03

Thank you!