All of lore.kernel.org
 help / color / mirror / Atom feed
From: Jan Kiszka <jan.kiszka@siemens.com>
To: Matt Fleming <matt@codeblueprint.co.uk>,
	Ard Biesheuvel <ard.biesheuvel@linaro.org>
Cc: linux-efi@vger.kernel.org,
	Linux Kernel Mailing List <linux-kernel@vger.kernel.org>,
	Andy Shevchenko <andy.shevchenko@gmail.com>,
	"Bryan O'Donoghue" <pure.logic@nexus-software.ie>,
	Hock Leong Kweh <hock.leong.kweh@intel.com>,
	Borislav Petkov <bp@alien8.de>,
	Sascha Weisenberger <sascha.weisenberger@siemens.com>
Subject: [PATCH v2 0/7] efi: Enhance capsule loader to support signed Quark images
Date: Fri, 24 Mar 2017 18:34:13 +0100	[thread overview]
Message-ID: <cover.1490376860.git.jan.kiszka@siemens.com> (raw)

This addresses the review feedback provided on round 1, specifically
- refactored queue to keep the Quark mess in 
- only check for CSH on Quark CPUs
- added some smaller cleanups of the capsule loader
- documented capsule header / linked to original code

See last patch for the background of the series.

The series has been tested on the Galileo Gen2, to exclude regressions,
with a firmware.cap with AND without security header and the SIMATIC
IOT2040 which requires the header because of its mandatory secure boot.

Jan

Jan Kiszka (7):
  efi/capsule: Fix return code on failing kmap/vmap
  efi/capsule: Remove pr_debug on ENOMEM or EFAULT
  efi/capsule: Clean up pr_err/info messages
  efi/capsule: Adjust return type of efi_capsule_setup_info
  efi/capsule: Prepare for loading images with security header
  efi/capsule: Factor out overloadable efi_capsule_identify_image
  efi/capsule: Add support for Quark security header

 arch/x86/platform/efi/quirks.c        |  95 ++++++++++++++++++++++++
 drivers/firmware/efi/capsule-loader.c | 136 +++++++++++++++++++---------------
 drivers/firmware/efi/capsule.c        |  21 +++++-
 include/linux/efi.h                   |  19 +++++
 4 files changed, 208 insertions(+), 63 deletions(-)

-- 
2.10.2

WARNING: multiple messages have this Message-ID (diff)
From: Jan Kiszka <jan.kiszka-kv7WeFo6aLtBDgjK7y7TUQ@public.gmane.org>
To: Matt Fleming
	<matt-mF/unelCI9GS6iBeEJttW/XRex20P6io@public.gmane.org>,
	Ard Biesheuvel
	<ard.biesheuvel-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org>
Cc: linux-efi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org,
	Linux Kernel Mailing List
	<linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>,
	Andy Shevchenko
	<andy.shevchenko-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>,
	Bryan O'Donoghue
	<pure.logic-SyKdqv6vbfZdzvEItQ6vdLNAH6kLmebB@public.gmane.org>,
	Hock Leong Kweh
	<hock.leong.kweh-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>,
	Borislav Petkov <bp-Gina5bIWoIWzQB+pC5nmwQ@public.gmane.org>,
	Sascha Weisenberger
	<sascha.weisenberger-kv7WeFo6aLtBDgjK7y7TUQ@public.gmane.org>
Subject: [PATCH v2 0/7] efi: Enhance capsule loader to support signed Quark images
Date: Fri, 24 Mar 2017 18:34:13 +0100	[thread overview]
Message-ID: <cover.1490376860.git.jan.kiszka@siemens.com> (raw)

This addresses the review feedback provided on round 1, specifically
- refactored queue to keep the Quark mess in 
- only check for CSH on Quark CPUs
- added some smaller cleanups of the capsule loader
- documented capsule header / linked to original code

See last patch for the background of the series.

The series has been tested on the Galileo Gen2, to exclude regressions,
with a firmware.cap with AND without security header and the SIMATIC
IOT2040 which requires the header because of its mandatory secure boot.

Jan

Jan Kiszka (7):
  efi/capsule: Fix return code on failing kmap/vmap
  efi/capsule: Remove pr_debug on ENOMEM or EFAULT
  efi/capsule: Clean up pr_err/info messages
  efi/capsule: Adjust return type of efi_capsule_setup_info
  efi/capsule: Prepare for loading images with security header
  efi/capsule: Factor out overloadable efi_capsule_identify_image
  efi/capsule: Add support for Quark security header

 arch/x86/platform/efi/quirks.c        |  95 ++++++++++++++++++++++++
 drivers/firmware/efi/capsule-loader.c | 136 +++++++++++++++++++---------------
 drivers/firmware/efi/capsule.c        |  21 +++++-
 include/linux/efi.h                   |  19 +++++
 4 files changed, 208 insertions(+), 63 deletions(-)

-- 
2.10.2

             reply	other threads:[~2017-03-24 17:35 UTC|newest]

Thread overview: 53+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-03-24 17:34 Jan Kiszka [this message]
2017-03-24 17:34 ` [PATCH v2 0/7] efi: Enhance capsule loader to support signed Quark images Jan Kiszka
2017-03-24 17:34 ` [PATCH v2 1/7] efi/capsule: Fix return code on failing kmap/vmap Jan Kiszka
2017-03-24 17:34   ` Jan Kiszka
2017-03-24 18:14   ` Ard Biesheuvel
2017-03-24 17:34 ` [PATCH v2 2/7] efi/capsule: Remove pr_debug on ENOMEM or EFAULT Jan Kiszka
2017-03-24 17:34   ` Jan Kiszka
2017-03-24 18:15   ` Ard Biesheuvel
2017-03-24 18:15     ` Ard Biesheuvel
2017-03-24 17:34 ` [PATCH v2 3/7] efi/capsule: Clean up pr_err/info messages Jan Kiszka
2017-03-24 17:34   ` Jan Kiszka
2017-03-24 18:17   ` Ard Biesheuvel
2017-03-24 18:17     ` Ard Biesheuvel
2017-03-24 17:34 ` [PATCH v2 4/7] efi/capsule: Adjust return type of efi_capsule_setup_info Jan Kiszka
2017-03-24 17:34   ` Jan Kiszka
2017-03-24 18:42   ` Ard Biesheuvel
2017-03-24 18:42     ` Ard Biesheuvel
2017-03-24 17:34 ` [PATCH v2 5/7] efi/capsule: Prepare for loading images with security header Jan Kiszka
2017-03-24 17:34   ` Jan Kiszka
2017-03-24 20:25   ` Andy Shevchenko
2017-03-24 20:25     ` Andy Shevchenko
2017-03-28 13:49   ` Ard Biesheuvel
2017-03-28 13:49     ` Ard Biesheuvel
2017-03-28 15:13     ` Jan Kiszka
2017-03-28 15:13       ` Jan Kiszka
2017-03-28 15:43       ` Jan Kiszka
2017-03-28 15:52         ` Ard Biesheuvel
2017-03-28 16:18           ` Jan Kiszka
2017-03-28 16:18             ` Jan Kiszka
2017-03-28 17:17             ` Ard Biesheuvel
2017-03-28 17:17               ` Ard Biesheuvel
2017-03-28 17:23               ` Ard Biesheuvel
2017-03-28 17:23                 ` Ard Biesheuvel
2017-03-30  9:06                 ` Jan Kiszka
2017-04-04 17:39                 ` Jan Kiszka
2017-04-04 17:39                   ` Jan Kiszka
2017-03-24 17:34 ` [PATCH v2 6/7] efi/capsule: Factor out overloadable efi_capsule_identify_image Jan Kiszka
2017-03-24 17:34   ` Jan Kiszka
2017-03-24 17:34 ` [PATCH v2 7/7] efi/capsule: Add support for Quark security header Jan Kiszka
2017-03-24 17:34   ` Jan Kiszka
2017-03-24 20:36   ` Andy Shevchenko
2017-03-24 20:36     ` Andy Shevchenko
2017-03-25 23:33   ` kbuild test robot
2017-03-24 20:39 ` [PATCH v2 0/7] efi: Enhance capsule loader to support signed Quark images Andy Shevchenko
2017-03-24 20:39   ` Andy Shevchenko
2017-03-27 11:19   ` Jan Kiszka
2017-03-27 11:19     ` Jan Kiszka
2017-03-27 10:29 ` Bryan O'Donoghue
2017-03-27 10:29   ` Bryan O'Donoghue
2017-03-27 11:01   ` Jan Kiszka
2017-03-27 11:01     ` Jan Kiszka
2017-03-28  0:48     ` Bryan O'Donoghue
2017-03-28  0:48       ` Bryan O'Donoghue

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=cover.1490376860.git.jan.kiszka@siemens.com \
    --to=jan.kiszka@siemens.com \
    --cc=andy.shevchenko@gmail.com \
    --cc=ard.biesheuvel@linaro.org \
    --cc=bp@alien8.de \
    --cc=hock.leong.kweh@intel.com \
    --cc=linux-efi@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=matt@codeblueprint.co.uk \
    --cc=pure.logic@nexus-software.ie \
    --cc=sascha.weisenberger@siemens.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.