From patchwork Sun Jun 3 13:58:01 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Alexander Graf X-Patchwork-Id: 137602 Delivered-To: patch@linaro.org Received: by 2002:a2e:970d:0:0:0:0:0 with SMTP id r13-v6csp431688lji; Sun, 3 Jun 2018 06:58:10 -0700 (PDT) X-Google-Smtp-Source: ADUXVKJ4V+2FaKkPsrlhv904MweMnZQOMtZLlBmi+M48vE2wgs3/bwDm3xCEg0phXRcpTCIKZTh1 X-Received: by 2002:a50:83c7:: with SMTP id 65-v6mr19907285edi.248.1528034290382; Sun, 03 Jun 2018 06:58:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528034290; cv=none; d=google.com; s=arc-20160816; b=d2T/r0ACgBcyCU+/kknKCSAA8T+ho2UyAYVan+PdvrT57mcx0olhWBNrqgKXkoOsOs hWxcRwxZH+I2tpeZO6rXDntyUy8iM6Q5kpgJyRSR+hpgiDASZPnaunc4Ayt3OlF29Y+n nmMe7tKFF0v0JMU9Yr5RaoiFz/+UIJkyBKloX3T6ohnSbbvxNyh4D9WdKl1nFvwN5EyB nXcn7tNqGt5vCpNtDl5SUhPRVDdYJSanQP4QhrQ9Nk2cIV3c0/CKm8JwgUMNLH6cKM4I Z7KGuwlGVt+07QhUXOCbxWnn23UUMCn1qcdZf6cL70l4zCxSFr/tB8QHf4SSyFH+/SLC wjEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:content-transfer-encoding:mime-version :list-subscribe:list-help:list-post:list-archive:list-unsubscribe :list-id:precedence:subject:cc:message-id:date:to:from :arc-authentication-results; bh=tDbTFX01fNokew83QPC87jWmsz5M4AvK0J/XuolDgjo=; b=CUu78mnN6XEOOnsAxsq64VmvnOB1bfEZwzXiryVtS1TaKaWpqRdMt4dz/UI+vLce6G 7ocGP5Xbi2KW/0PBu6OD03cesfPmun3wL5fMjKsh55quLKLYgby3MXSOxtGfUU7CcGZJ 8dk46OXB69tCIJ52yZEFfJ2FJoMED4EYo6h1qIKaLzYDPukFiTYo/RXPvFyc8E5vX2SG frH8OJiquEaOYhTMMaJhV6l0xNoBzNe7pe+EhfAz3p0slFNuPpWRHZyYiuw1qBoeOzGB nPA+cfSNqgl22QpcCWnVJi9aG2wDtzGQWdvEsMlayTIKViD4/nJ1V4BOylDYsItnwcEL GJHg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of u-boot-bounces@lists.denx.de designates 81.169.180.215 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de Return-Path: Received: from lists.denx.de (dione.denx.de. [81.169.180.215]) by mx.google.com with ESMTP id l31-v6si2219865eda.427.2018.06.03.06.58.10; Sun, 03 Jun 2018 06:58:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of u-boot-bounces@lists.denx.de designates 81.169.180.215 as permitted sender) client-ip=81.169.180.215; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of u-boot-bounces@lists.denx.de designates 81.169.180.215 as permitted sender) smtp.mailfrom=u-boot-bounces@lists.denx.de Received: by lists.denx.de (Postfix, from userid 105) id E4F63C21DD7; Sun, 3 Jun 2018 13:58:06 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de X-Spam-Level: X-Spam-Status: No, score=0.0 required=5.0 tests=none autolearn=unavailable autolearn_force=no version=3.4.0 Received: from lists.denx.de (localhost [IPv6:::1]) by lists.denx.de (Postfix) with ESMTP id 82975C21C93; Sun, 3 Jun 2018 13:58:04 +0000 (UTC) Received: by lists.denx.de (Postfix, from userid 105) id 06F3CC21C93; Sun, 3 Jun 2018 13:58:02 +0000 (UTC) Received: from mx2.suse.de (mx2.suse.de [195.135.220.15]) by lists.denx.de (Postfix) with ESMTPS id 9CE9DC21C2F for ; Sun, 3 Jun 2018 13:58:02 +0000 (UTC) X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext-too.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 17187AC76; Sun, 3 Jun 2018 13:58:02 +0000 (UTC) From: Alexander Graf To: u-boot@lists.denx.de Date: Sun, 3 Jun 2018 15:58:01 +0200 Message-Id: <20180603135801.52869-1-agraf@suse.de> X-Mailer: git-send-email 2.12.3 Cc: Tom Rini Subject: [U-Boot] [PULL] efi patch queue 2018-06-03 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.18 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" Hi Tom, This is my current patch queue for efi. Please pull. Alex The following changes since commit 040b2583c3a87c83606b3df64ea653ccaf3aea62: Merge branch 'master' of git://git.denx.de/u-boot-sh (2018-06-02 16:58:27 -0400) are available in the git repository at: git://github.com/agraf/u-boot.git tags/signed-efi-next for you to fetch changes up to 80483b2ab62ca7cd200db445b6920ee96d17df88: efi_loader: Fix warning in raw/cols query (2018-06-03 15:51:19 +0200) ---------------------------------------------------------------- Patch queue for efi - 2018-06-03 A number of fixes and feature completeness work this time around: - Fix sunxi GOP reservation - Fix cursor position - Fix efi_get_variable - Allow more selftest parts to build on x86_64 - Allow unaligned memory access on armv7 - Implement ReinstallProtocolInterface - More sandbox preparation ---------------------------------------------------------------- Alexander Graf (1): efi_loader: Fix warning in raw/cols query Emmanuel Vadot (1): video: sunxi: de2: Reserve the fb region in the EFI memory map Heinrich Schuchardt (26): efi_loader: if EFI_LOADER is enabled, enable CFB_CONSOLE_ANSI efi_loader: remove unnecessary include efi_loader: updating the cursor position efi_selftest: updating the cursor position efi_loader: always check parameters in efi_cout_query_mode() efi_selftest: allow building relocation code on x86_64 efi_loader: build CRT0 and RELOC on x86_64 Makefile: clean should delete *.efi efi_selftest: do not call efi_init_obj_list() twice efi_loader: adjust definitions of variable services efi_selftest: unit test for variable services efi_loader: avoid using unitialized values as console size README.uefi: update list of missing functionality efi_selftest: correct efi_selftest_manageprotocols efi_loader: check interface when uninstalling protocol efi_loader: implement ReinstallProtocolInterface efi_selftest: test ReinstallProtocolInterface efi_loader: allow unaligned memory access arm: armv7: allow unaligned memory access efi_selftest: test unaligned memory access efi_loader: DocBook comments for boot services efi_selftest: imply FAT, FAT_WRITE Makefile: clean should delete *.so efi_loader: avoid anonymous constants for AllocatePages efi_loader: efi_mem_carve_out should return s64 efi_loader: create handles from normal memory Ivan Gorinov (3): efi_loader: correctly apply relocations from the .reloc section efi_loader: fix off-by-one bug in efi_get_variable efi_selftest: check for buffer overflow in efi_get_variable Simon Glass (5): efi: Update some comments related to smbios tables sandbox: Add a setjmp() implementation efi: sandbox: Add required linker sections Define board_quiesce_devices() in a shared location Add a comment for board_quiesce_devices() MAINTAINERS | 1 + Makefile | 3 +- arch/arm/cpu/armv7/Makefile | 4 + arch/arm/cpu/armv7/sctlr.S | 22 + arch/arm/include/asm/u-boot-arm.h | 1 - arch/sandbox/cpu/cpu.c | 13 + arch/sandbox/cpu/os.c | 23 + arch/sandbox/cpu/u-boot.lds | 29 + arch/sandbox/include/asm/setjmp.h | 30 + arch/sandbox/lib/Makefile | 2 +- arch/sandbox/lib/sections.c | 12 + arch/x86/config.mk | 20 +- arch/x86/include/asm/u-boot-x86.h | 1 - arch/x86/lib/Makefile | 12 +- arch/x86/lib/bootm.c | 4 - cmd/bootefi.c | 21 +- common/bootm.c | 4 + doc/DocBook/Makefile | 2 +- doc/DocBook/efi.tmpl | 17 + doc/README.uefi | 9 +- drivers/video/sunxi/sunxi_de2.c | 8 + include/asm-generic/unaligned.h | 3 + include/bootm.h | 8 + include/efi_api.h | 24 +- include/efi_loader.h | 25 +- include/os.h | 21 + include/smbios.h | 5 +- lib/efi_loader/Kconfig | 1 + lib/efi_loader/efi_bootmgr.c | 10 +- lib/efi_loader/efi_boottime.c | 898 +++++++++++++----------- lib/efi_loader/efi_console.c | 131 ++-- lib/efi_loader/efi_image_loader.c | 15 +- lib/efi_loader/efi_memory.c | 41 +- lib/efi_loader/efi_runtime.c | 11 +- lib/efi_loader/efi_smbios.c | 7 +- lib/efi_loader/efi_variable.c | 64 +- lib/efi_selftest/Kconfig | 2 + lib/efi_selftest/Makefile | 5 + lib/efi_selftest/efi_selftest_controllers.c | 35 +- lib/efi_selftest/efi_selftest_manageprotocols.c | 2 +- lib/efi_selftest/efi_selftest_textoutput.c | 78 ++ lib/efi_selftest/efi_selftest_unaligned.c | 67 ++ lib/efi_selftest/efi_selftest_variables.c | 196 ++++++ 43 files changed, 1299 insertions(+), 588 deletions(-) create mode 100644 arch/arm/cpu/armv7/sctlr.S create mode 100644 arch/sandbox/include/asm/setjmp.h create mode 100644 arch/sandbox/lib/sections.c create mode 100644 doc/DocBook/efi.tmpl create mode 100644 lib/efi_selftest/efi_selftest_unaligned.c create mode 100644 lib/efi_selftest/efi_selftest_variables.c