From: Jan Kiszka <jan.kiszka@siemens.com> To: Matt Fleming <matt@codeblueprint.co.uk>, Ard Biesheuvel <ard.biesheuvel@linaro.org> Cc: linux-efi@vger.kernel.org, Linux Kernel Mailing List <linux-kernel@vger.kernel.org>, Andy Shevchenko <andy.shevchenko@gmail.com>, "Bryan O'Donoghue" <pure.logic@nexus-software.ie>, Hock Leong Kweh <hock.leong.kweh@intel.com>, Borislav Petkov <bp@alien8.de>, Sascha Weisenberger <sascha.weisenberger@siemens.com> Subject: [PATCH v2 0/7] efi: Enhance capsule loader to support signed Quark images Date: Fri, 24 Mar 2017 18:34:13 +0100 [thread overview] Message-ID: <cover.1490376860.git.jan.kiszka@siemens.com> (raw) This addresses the review feedback provided on round 1, specifically - refactored queue to keep the Quark mess in - only check for CSH on Quark CPUs - added some smaller cleanups of the capsule loader - documented capsule header / linked to original code See last patch for the background of the series. The series has been tested on the Galileo Gen2, to exclude regressions, with a firmware.cap with AND without security header and the SIMATIC IOT2040 which requires the header because of its mandatory secure boot. Jan Jan Kiszka (7): efi/capsule: Fix return code on failing kmap/vmap efi/capsule: Remove pr_debug on ENOMEM or EFAULT efi/capsule: Clean up pr_err/info messages efi/capsule: Adjust return type of efi_capsule_setup_info efi/capsule: Prepare for loading images with security header efi/capsule: Factor out overloadable efi_capsule_identify_image efi/capsule: Add support for Quark security header arch/x86/platform/efi/quirks.c | 95 ++++++++++++++++++++++++ drivers/firmware/efi/capsule-loader.c | 136 +++++++++++++++++++--------------- drivers/firmware/efi/capsule.c | 21 +++++- include/linux/efi.h | 19 +++++ 4 files changed, 208 insertions(+), 63 deletions(-) -- 2.10.2
WARNING: multiple messages have this Message-ID (diff)
From: Jan Kiszka <jan.kiszka-kv7WeFo6aLtBDgjK7y7TUQ@public.gmane.org> To: Matt Fleming <matt-mF/unelCI9GS6iBeEJttW/XRex20P6io@public.gmane.org>, Ard Biesheuvel <ard.biesheuvel-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org> Cc: linux-efi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, Linux Kernel Mailing List <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>, Andy Shevchenko <andy.shevchenko-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>, Bryan O'Donoghue <pure.logic-SyKdqv6vbfZdzvEItQ6vdLNAH6kLmebB@public.gmane.org>, Hock Leong Kweh <hock.leong.kweh-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>, Borislav Petkov <bp-Gina5bIWoIWzQB+pC5nmwQ@public.gmane.org>, Sascha Weisenberger <sascha.weisenberger-kv7WeFo6aLtBDgjK7y7TUQ@public.gmane.org> Subject: [PATCH v2 0/7] efi: Enhance capsule loader to support signed Quark images Date: Fri, 24 Mar 2017 18:34:13 +0100 [thread overview] Message-ID: <cover.1490376860.git.jan.kiszka@siemens.com> (raw) This addresses the review feedback provided on round 1, specifically - refactored queue to keep the Quark mess in - only check for CSH on Quark CPUs - added some smaller cleanups of the capsule loader - documented capsule header / linked to original code See last patch for the background of the series. The series has been tested on the Galileo Gen2, to exclude regressions, with a firmware.cap with AND without security header and the SIMATIC IOT2040 which requires the header because of its mandatory secure boot. Jan Jan Kiszka (7): efi/capsule: Fix return code on failing kmap/vmap efi/capsule: Remove pr_debug on ENOMEM or EFAULT efi/capsule: Clean up pr_err/info messages efi/capsule: Adjust return type of efi_capsule_setup_info efi/capsule: Prepare for loading images with security header efi/capsule: Factor out overloadable efi_capsule_identify_image efi/capsule: Add support for Quark security header arch/x86/platform/efi/quirks.c | 95 ++++++++++++++++++++++++ drivers/firmware/efi/capsule-loader.c | 136 +++++++++++++++++++--------------- drivers/firmware/efi/capsule.c | 21 +++++- include/linux/efi.h | 19 +++++ 4 files changed, 208 insertions(+), 63 deletions(-) -- 2.10.2
next reply other threads:[~2017-03-24 17:35 UTC|newest] Thread overview: 53+ messages / expand[flat|nested] mbox.gz Atom feed top 2017-03-24 17:34 Jan Kiszka [this message] 2017-03-24 17:34 ` [PATCH v2 0/7] efi: Enhance capsule loader to support signed Quark images Jan Kiszka 2017-03-24 17:34 ` [PATCH v2 1/7] efi/capsule: Fix return code on failing kmap/vmap Jan Kiszka 2017-03-24 17:34 ` Jan Kiszka 2017-03-24 18:14 ` Ard Biesheuvel 2017-03-24 17:34 ` [PATCH v2 2/7] efi/capsule: Remove pr_debug on ENOMEM or EFAULT Jan Kiszka 2017-03-24 17:34 ` Jan Kiszka 2017-03-24 18:15 ` Ard Biesheuvel 2017-03-24 18:15 ` Ard Biesheuvel 2017-03-24 17:34 ` [PATCH v2 3/7] efi/capsule: Clean up pr_err/info messages Jan Kiszka 2017-03-24 17:34 ` Jan Kiszka 2017-03-24 18:17 ` Ard Biesheuvel 2017-03-24 18:17 ` Ard Biesheuvel 2017-03-24 17:34 ` [PATCH v2 4/7] efi/capsule: Adjust return type of efi_capsule_setup_info Jan Kiszka 2017-03-24 17:34 ` Jan Kiszka 2017-03-24 18:42 ` Ard Biesheuvel 2017-03-24 18:42 ` Ard Biesheuvel 2017-03-24 17:34 ` [PATCH v2 5/7] efi/capsule: Prepare for loading images with security header Jan Kiszka 2017-03-24 17:34 ` Jan Kiszka 2017-03-24 20:25 ` Andy Shevchenko 2017-03-24 20:25 ` Andy Shevchenko 2017-03-28 13:49 ` Ard Biesheuvel 2017-03-28 13:49 ` Ard Biesheuvel 2017-03-28 15:13 ` Jan Kiszka 2017-03-28 15:13 ` Jan Kiszka 2017-03-28 15:43 ` Jan Kiszka 2017-03-28 15:52 ` Ard Biesheuvel 2017-03-28 16:18 ` Jan Kiszka 2017-03-28 16:18 ` Jan Kiszka 2017-03-28 17:17 ` Ard Biesheuvel 2017-03-28 17:17 ` Ard Biesheuvel 2017-03-28 17:23 ` Ard Biesheuvel 2017-03-28 17:23 ` Ard Biesheuvel 2017-03-30 9:06 ` Jan Kiszka 2017-04-04 17:39 ` Jan Kiszka 2017-04-04 17:39 ` Jan Kiszka 2017-03-24 17:34 ` [PATCH v2 6/7] efi/capsule: Factor out overloadable efi_capsule_identify_image Jan Kiszka 2017-03-24 17:34 ` Jan Kiszka 2017-03-24 17:34 ` [PATCH v2 7/7] efi/capsule: Add support for Quark security header Jan Kiszka 2017-03-24 17:34 ` Jan Kiszka 2017-03-24 20:36 ` Andy Shevchenko 2017-03-24 20:36 ` Andy Shevchenko 2017-03-25 23:33 ` kbuild test robot 2017-03-24 20:39 ` [PATCH v2 0/7] efi: Enhance capsule loader to support signed Quark images Andy Shevchenko 2017-03-24 20:39 ` Andy Shevchenko 2017-03-27 11:19 ` Jan Kiszka 2017-03-27 11:19 ` Jan Kiszka 2017-03-27 10:29 ` Bryan O'Donoghue 2017-03-27 10:29 ` Bryan O'Donoghue 2017-03-27 11:01 ` Jan Kiszka 2017-03-27 11:01 ` Jan Kiszka 2017-03-28 0:48 ` Bryan O'Donoghue 2017-03-28 0:48 ` Bryan O'Donoghue
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=cover.1490376860.git.jan.kiszka@siemens.com \ --to=jan.kiszka@siemens.com \ --cc=andy.shevchenko@gmail.com \ --cc=ard.biesheuvel@linaro.org \ --cc=bp@alien8.de \ --cc=hock.leong.kweh@intel.com \ --cc=linux-efi@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=matt@codeblueprint.co.uk \ --cc=pure.logic@nexus-software.ie \ --cc=sascha.weisenberger@siemens.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.