From: Ard Biesheuvel <ard.biesheuvel@linaro.org>
To: linux-efi@vger.kernel.org, Ingo Molnar <mingo@kernel.org>,
Thomas Gleixner <tglx@linutronix.de>
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>,
linux-kernel@vger.kernel.org, Borislav Petkov <bp@suse.de>,
Daniel Kiper <daniel.kiper@oracle.com>,
Hans de Goede <hdegoede@redhat.com>,
Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>,
Joey Zheng <yu.zheng@hxt-semitech.com>,
Kim Phillips <kim.phillips@arm.com>,
Lukas Wunner <lukas@wunner.de>,
Mark Rutland <mark.rutland@arm.com>,
Shunyong Yang <shunyong.yang@hxt-semitech.com>,
Wei Yongjun <weiyongjun1@huawei.com>,
Yazen Ghannam <yazen.ghannam@amd.com>
Subject: [GIT PULL 00/17] EFI updates for v4.18
Date: Fri, 4 May 2018 07:59:46 +0200 [thread overview]
Message-ID: <20180504060003.19618-1-ard.biesheuvel@linaro.org> (raw)
The following changes since commit 60cc43fc888428bb2f18f08997432d426a243338:
Linux 4.17-rc1 (2018-04-15 18:24:20 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi.git tags/efi-next
for you to fetch changes up to a0e781fedc0e975d2f33fda94e26d3f76331ee3d:
efi/libstub/arm64: handle randomized TEXT_OFFSET (2018-05-03 19:00:27 +0200)
----------------------------------------------------------------
First batch of EFI changes for v4.18:
- Initialize UEFI secure boot state during Xen dom0 boot (Daniel Kiper)
- Decode x86 CPER data (Yazen Ghannam)
- Ignore unrealistically large option roms (Hans de Goede)
- Additional minor tweaks
- A fix for arm64 kernels with CONFIG_RANDOMIZE_TEXT_OFFSET=y and running
with KASLR enabled. I was on the fence whether to send it as a fix or
cc it to stable, so I chose the latter. (TEXT_OFFSET randomization is a
debug feature that the distros don't enable)
----------------------------------------------------------------
Ard Biesheuvel (3):
efi: fix efi_pci_io_protocol32 prototype for mixed mode
efi: align efi_pci_io_protocol typedefs to type naming convention
efi/x86: fold __setup_efi_pci32 and __setup_efi_pci64 into one
Borislav Petkov (1):
efi/cper: Remove the INDENT_SP silliness
Daniel Kiper (1):
x86/xen/efi: Initialize UEFI secure boot state during dom0 boot
Hans de Goede (1):
efi/x86: Ignore unrealistically large option roms
Mark Rutland (1):
efi/libstub/arm64: handle randomized TEXT_OFFSET
Shunyong Yang (1):
efi/capsule-loader: Don't output reset log when reset flags are not set
Wei Yongjun (1):
efi/libstub/tpm: Make function efi_retrieve_tpm2_eventlog_1_2() static
Yazen Ghannam (8):
efi: Fix IA32/X64 Processor Error Record definition
efi: Decode IA32/X64 Processor Error Section
efi: Decode IA32/X64 Processor Error Info Structure
efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs
efi: Decode IA32/X64 Cache, TLB, and Bus Check structures
efi: Decode additional IA32/X64 Bus Check fields
efi: Decode IA32/X64 MS Check structure
efi: Decode IA32/X64 Context Info structure
arch/x86/boot/compressed/eboot.c | 112 +++-------
arch/x86/xen/efi.c | 57 +++++
drivers/firmware/efi/Kconfig | 5 +
drivers/firmware/efi/Makefile | 1 +
drivers/firmware/efi/capsule-loader.c | 14 +-
drivers/firmware/efi/cper-arm.c | 6 +-
drivers/firmware/efi/cper-x86.c | 356 ++++++++++++++++++++++++++++++
drivers/firmware/efi/cper.c | 16 +-
drivers/firmware/efi/libstub/arm64-stub.c | 7 +
drivers/firmware/efi/libstub/secureboot.c | 3 +
drivers/firmware/efi/libstub/tpm.c | 2 +-
include/linux/cper.h | 4 +-
include/linux/efi.h | 14 +-
13 files changed, 496 insertions(+), 101 deletions(-)
create mode 100644 drivers/firmware/efi/cper-x86.c
next reply other threads:[~2018-05-04 6:01 UTC|newest]
Thread overview: 47+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-05-04 5:59 Ard Biesheuvel [this message]
2018-05-04 5:59 ` [PATCH 01/17] x86/xen/efi: Initialize UEFI secure boot state during dom0 boot Ard Biesheuvel
2018-05-14 7:43 ` [tip:efi/core] " tip-bot for Daniel Kiper
2018-05-04 5:59 ` [PATCH 02/17] efi/cper: Remove the INDENT_SP silliness Ard Biesheuvel
2018-05-14 7:44 ` [tip:efi/core] " tip-bot for Borislav Petkov
2018-05-04 5:59 ` [PATCH 03/17] efi: Fix IA32/X64 Processor Error Record definition Ard Biesheuvel
2018-05-14 7:44 ` [tip:efi/core] " tip-bot for Yazen Ghannam
2018-05-04 5:59 ` [PATCH 04/17] efi: Decode IA32/X64 Processor Error Section Ard Biesheuvel
2018-05-14 7:45 ` [tip:efi/core] " tip-bot for Yazen Ghannam
2018-05-04 5:59 ` [PATCH 05/17] efi: Decode IA32/X64 Processor Error Info Structure Ard Biesheuvel
2018-05-14 7:45 ` [tip:efi/core] " tip-bot for Yazen Ghannam
2018-05-04 5:59 ` [PATCH 06/17] efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs Ard Biesheuvel
2018-05-14 7:46 ` [tip:efi/core] " tip-bot for Yazen Ghannam
2018-05-04 5:59 ` [PATCH 07/17] efi: Decode IA32/X64 Cache, TLB, and Bus Check structures Ard Biesheuvel
2018-05-14 7:46 ` [tip:efi/core] " tip-bot for Yazen Ghannam
2018-05-04 5:59 ` [PATCH 08/17] efi: Decode additional IA32/X64 Bus Check fields Ard Biesheuvel
2018-05-14 7:47 ` [tip:efi/core] " tip-bot for Yazen Ghannam
2018-05-04 5:59 ` [PATCH 09/17] efi: Decode IA32/X64 MS Check structure Ard Biesheuvel
2018-05-14 7:47 ` [tip:efi/core] " tip-bot for Yazen Ghannam
2018-05-04 5:59 ` [PATCH 10/17] efi: Decode IA32/X64 Context Info structure Ard Biesheuvel
2018-05-14 7:48 ` [tip:efi/core] " tip-bot for Yazen Ghannam
2018-05-04 5:59 ` [PATCH 11/17] efi/libstub/tpm: Make function efi_retrieve_tpm2_eventlog_1_2() static Ard Biesheuvel
2018-05-14 7:48 ` [tip:efi/core] " tip-bot for Wei Yongjun
2018-05-04 5:59 ` [PATCH 12/17] efi: fix efi_pci_io_protocol32 prototype for mixed mode Ard Biesheuvel
2018-05-14 6:57 ` Ingo Molnar
2018-05-14 7:02 ` Ard Biesheuvel
2018-05-14 7:42 ` [tip:efi/core] efi: Avoid potential crashes, fix the 'struct efi_pci_io_protocol_32' definition " tip-bot for Ard Biesheuvel
2018-05-04 5:59 ` [PATCH 13/17] efi: align efi_pci_io_protocol typedefs to type naming convention Ard Biesheuvel
2018-05-14 7:49 ` [tip:efi/core] efi: Align " tip-bot for Ard Biesheuvel
2018-05-04 6:00 ` [PATCH 14/17] efi/x86: fold __setup_efi_pci32 and __setup_efi_pci64 into one Ard Biesheuvel
2018-05-14 7:49 ` [tip:efi/core] efi/x86: Fold __setup_efi_pci32() and __setup_efi_pci64() into one function tip-bot for Ard Biesheuvel
2018-05-04 6:00 ` [PATCH 15/17] efi/x86: Ignore unrealistically large option roms Ard Biesheuvel
2018-05-14 6:40 ` Ingo Molnar
2018-05-14 6:43 ` [PATCH] efi/x86: Clean up the eboot code a bit Ingo Molnar
2018-05-14 6:47 ` Ard Biesheuvel
2018-05-14 6:58 ` Ingo Molnar
2018-05-14 6:59 ` Ard Biesheuvel
2018-05-14 7:50 ` [tip:efi/core] efi/x86: Ignore unrealistically large option ROMs tip-bot for Hans de Goede
2018-05-15 9:18 ` Ard Biesheuvel
2018-06-21 15:13 ` Ingo Molnar
2018-05-04 6:00 ` [PATCH 16/17] efi/capsule-loader: Don't output reset log when reset flags are not set Ard Biesheuvel
2018-05-14 7:50 ` [tip:efi/core] " tip-bot for Shunyong Yang
2018-05-04 6:00 ` [PATCH 17/17] efi/libstub/arm64: handle randomized TEXT_OFFSET Ard Biesheuvel
2018-05-14 6:47 ` Ingo Molnar
2018-05-14 6:48 ` Ard Biesheuvel
2018-05-14 7:00 ` Ingo Molnar
2018-05-14 7:01 ` Ard Biesheuvel
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180504060003.19618-1-ard.biesheuvel@linaro.org \
--to=ard.biesheuvel@linaro.org \
--cc=bp@suse.de \
--cc=daniel.kiper@oracle.com \
--cc=hdegoede@redhat.com \
--cc=jarkko.sakkinen@linux.intel.com \
--cc=kim.phillips@arm.com \
--cc=linux-efi@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=lukas@wunner.de \
--cc=mark.rutland@arm.com \
--cc=mingo@kernel.org \
--cc=shunyong.yang@hxt-semitech.com \
--cc=tglx@linutronix.de \
--cc=weiyongjun1@huawei.com \
--cc=yazen.ghannam@amd.com \
--cc=yu.zheng@hxt-semitech.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.