From: Heinrich Schuchardt <xypron.glpk@gmx.de>
To: u-boot@lists.denx.de
Subject: Pull request for efi-next
Date: Thu, 25 Mar 2021 22:31:06 +0100 [thread overview]
Message-ID: <e5b9d5e2-33f6-92b1-72e2-dd93288657a8@gmx.de> (raw)
Dear Tom,
a lot of patches in this pull-request are already in origin/master. The
rest is summarized in the tag description.
Gitlab CI showed no issues:
https://source.denx.de/u-boot/custodians/u-boot-efi/-/pipelines/6913
Please, merge into the *next* branch:
The following changes since commit 874dcedee92a828b03c8d3146dccfaa8b709618b:
Merge branch '2021-03-20-mediatek-updates' into next (2021-03-20
19:27:22 -0400)
are available in the Git repository at:
https://source.denx.de/u-boot/custodians/u-boot-efi.git tags/efi-next
for you to fetch changes up to ac30aad21076e9eeb460af2865b863f3ae3d2eaa:
efi_loader: Clean up file size calculations (2021-03-25 21:03:51 +0100)
----------------------------------------------------------------
Pull request for efi-next
New:
provide EFI ESRT table
initrd via Load_File2_Protocol uses boot options
create an S-CRTM event for measured boot
Bug fixes:
avoid double free of SPI device in dfu_free_entity()
avoid memory leak in TCG2 protocol
----------------------------------------------------------------
Heinrich Schuchardt (7):
efi_loader: disable GRUB_ARM32_WORKAROUND on ARCH_SUNXI
efi_selftest: illegal cast to pointer in initrddump
efi_loader: NULL dereference in EFI console
efi_loader: Uart device path
cmd/load: support uploading EFI binary via UART
dfu: dfu_sf: avoid double free of SPI device
efi_selfest: redefine enum efi_test_phase
Ilias Apalodimas (8):
efi_selftest: Remove loadfile2 for initrd selftests
efi_loader: Add device path related functions for initrd via Boot####
efi_loader: Add helper functions for EFI
efi_loader: Replace config option for initrd loading
efidebug: add multiple device path instances on Boot####
efi_loader: EFI TCG2 free efi memory on protocol failure
efi_loader: Add an S-CRTM even for firmware version
efi_loader: Clean up file size calculations
Jose Marinho (4):
efi: Add ESRT to the EFI system table
cmd: efi: ESRT table debug print
efi: ESRT creation tests
test: test the ESRT creation
Mark Kettenis (1):
efi_loader: fix memory type for memory reservation block
Simon Glass (1):
efi: Fix compiler warnings
cmd/bootefi.c | 3 +
cmd/efidebug.c | 281 ++++++++++--
cmd/load.c | 10 +-
doc/board/emulation/qemu_capsule_update.rst | 4 +-
doc/uefi/uefi.rst | 2 +-
drivers/dfu/dfu_sf.c | 18 +-
include/efi_api.h | 31 ++
include/efi_loader.h | 36 ++
include/efi_selftest.h | 7 +-
lib/efi_loader/Kconfig | 26 +-
lib/efi_loader/Makefile | 2 +
lib/efi_loader/efi_bootmgr.c | 19 +-
lib/efi_loader/efi_boottime.c | 23 +-
lib/efi_loader/efi_capsule.c | 12 +-
lib/efi_loader/efi_console.c | 51 ++-
lib/efi_loader/efi_device_path.c | 151 +++++-
lib/efi_loader/efi_device_path_to_text.c | 13 +
lib/efi_loader/efi_dt_fixup.c | 2 +-
lib/efi_loader/efi_esrt.c | 510
+++++++++++++++++++++
lib/efi_loader/efi_file.c | 39 ++
lib/efi_loader/efi_firmware.c | 4 +-
lib/efi_loader/efi_helper.c | 98 ++++
lib/efi_loader/efi_load_initrd.c | 202 ++++----
lib/efi_loader/efi_setup.c | 6 +
lib/efi_loader/efi_tcg2.c | 75 ++-
lib/efi_loader/efi_var_common.c | 33 ++
lib/efi_selftest/Makefile | 3 +-
lib/efi_selftest/efi_selftest.c | 11 +-
lib/efi_selftest/efi_selftest_esrt.c | 291 ++++++++++++
lib/efi_selftest/efi_selftest_load_initrd.c | 221 ---------
.../efi_selftest_set_virtual_address_map.c | 2 +-
lib/efi_selftest/initrddump.c | 2 +-
.../test_efi_capsule/test_capsule_firmware.py | 14 +-
test/py/tests/test_efi_secboot/test_signed.py | 16 +-
.../py/tests/test_efi_secboot/test_signed_intca.py | 8 +-
test/py/tests/test_efi_secboot/test_unsigned.py | 8 +-
36 files changed, 1781 insertions(+), 453 deletions(-)
create mode 100644 lib/efi_loader/efi_esrt.c
create mode 100644 lib/efi_loader/efi_helper.c
create mode 100644 lib/efi_selftest/efi_selftest_esrt.c
delete mode 100644 lib/efi_selftest/efi_selftest_load_initrd.c
next reply other threads:[~2021-03-25 21:31 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-03-25 21:31 Heinrich Schuchardt [this message]
2021-03-26 13:55 ` Pull request for efi-next Tom Rini
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=e5b9d5e2-33f6-92b1-72e2-dd93288657a8@gmx.de \
--to=xypron.glpk@gmx.de \
--cc=u-boot@lists.denx.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.