From patchwork Fri Feb 28 12:14:02 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ard Biesheuvel X-Patchwork-Id: 206507 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-14.1 required=3.0 tests=DKIMWL_WL_HIGH, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, INCLUDES_PULL_REQUEST, MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING, SPF_HELO_NONE, SPF_PASS, USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 61473C3F2D2 for ; Fri, 28 Feb 2020 12:14:15 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 31496246AE for ; Fri, 28 Feb 2020 12:14:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582892055; bh=OXTWApyngKLjZ0TZy/1RIFY4CBj24eE6zYDN66Iyua0=; h=From:To:Cc:Subject:Date:List-ID:From; b=GPZqHw33DNf3CMKlzGJPASM1hHcNeLBDJNqPpzDilPP9HoUKyjPewElLH5OoTySc3 380oguVZxY4AIDgi9gVMxv89S1y4e+Q7bdXkP5AuwEcTfu9UD6st1/t+8XqDD7vPpp 37+2w6cV7aghey/bMW+ye7EY+7+X2PIB8N5DqgQY= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725802AbgB1MOO (ORCPT ); Fri, 28 Feb 2020 07:14:14 -0500 Received: from mail.kernel.org ([198.145.29.99]:45214 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725769AbgB1MOO (ORCPT ); Fri, 28 Feb 2020 07:14:14 -0500 Received: from e123331-lin.home (amontpellier-657-1-18-247.w109-210.abo.wanadoo.fr [109.210.65.247]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 972682087F; Fri, 28 Feb 2020 12:14:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582892054; bh=OXTWApyngKLjZ0TZy/1RIFY4CBj24eE6zYDN66Iyua0=; h=From:To:Cc:Subject:Date:From; b=EsI4LRThbyAgJxLZTxN0VEQ4dPdF1pcgIakZxLfNgFEN+UkadTVBJlDHq2bfUheSz ctdjN11ON8hk0kP/LYZbbjs6Bis3fWKtdTYWo1Yh4fiD+0tURWpfQM6R9HlQJP+030 AAe8srp3C1ZO6cCH//LQQtDvhsS2tsOWtVGRYKVQ= From: Ard Biesheuvel To: linux-efi@vger.kernel.org, Ingo Molnar , Thomas Gleixner Cc: Ard Biesheuvel , linux-kernel@vger.kernel.org, David Hildenbrand , Heinrich Schuchardt , Tom Lendacky Subject: [GIT PULL 0/6] More EFI updates for v5.7 Date: Fri, 28 Feb 2020 13:14:02 +0100 Message-Id: <20200228121408.9075-1-ardb@kernel.org> X-Mailer: git-send-email 2.17.1 Sender: linux-efi-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-efi@vger.kernel.org Hello Ingo, Thomas, A small set of EFI followup changes for v5.7. The last one fixes a boot regression in linux-next on x86 machines booting without EFI but with the IMA security subsystem enabled, which is why I am sending out the next batch a bit earlier than intended. Thanks, Ard. The following changes since commit e9765680a31b22ca6703936c000ce5cc46192e10: Merge tag 'efi-next' of git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi into efi/core (2020-02-26 15:21:22 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi.git tags/efi-next for you to fetch changes up to be15278269343ec0e4d0e41bab5f64b49b0edb6b: efi: mark all EFI runtime services as unsupported on non-EFI boot (2020-02-28 12:54:46 +0100) ---------------------------------------------------------------- More EFI updates for v5.7 A couple of followup fixes for the EFI changes queued for v5.7: - a fix for a boot regression on x86 booting without UEFI - memory encryption fixes for x86, so that the TPM tables and the RNG config table created by the stub are correctly identified as living in unencrypted memory - style tweak from Heinrich - followup to the ARM EFI entry code simplifications to ensure that we don't rely on EFI_LOADER_DATA memory being RWX ---------------------------------------------------------------- Ard Biesheuvel (3): efi/arm: clean EFI stub exit code from cache instead of avoiding it efi/arm64: clean EFI stub exit code from cache instead of avoiding it efi: mark all EFI runtime services as unsupported on non-EFI boot Heinrich Schuchardt (1): efi: don't shadow i in efi_config_parse_tables() Tom Lendacky (2): efi/x86: Add TPM related EFI tables to unencrypted mapping checks efi/x86: Add RNG seed EFI table to unencrypted mapping check arch/arm/boot/compressed/head.S | 18 ++++++++---------- arch/arm64/kernel/efi-entry.S | 26 +++++++++++++------------- arch/arm64/kernel/image-vars.h | 4 ++-- arch/x86/platform/efi/efi.c | 3 +++ drivers/firmware/efi/efi.c | 25 +++++++++++++------------ include/linux/efi.h | 2 ++ 6 files changed, 41 insertions(+), 37 deletions(-)