From: Matt Fleming <matt@codeblueprint.co.uk>
To: Ingo Molnar <mingo@kernel.org>,
Thomas Gleixner <tglx@linutronix.de>,
"H . Peter Anvin" <hpa@zytor.com>
Cc: Mark Rutland <mark.rutland@arm.com>,
Raphael Hertzog <hertzog@debian.org>,
linux-efi@vger.kernel.org,
Jeremy Compostella <jeremy.compostella@intel.com>,
Matt Fleming <matt@codeblueprint.co.uk>,
Catalin Marinas <catalin.marinas@arm.com>,
Will Deacon <will.deacon@arm.com>,
James Bottomley <James.Bottomley@HansenPartnership.com>,
Peter Jones <pjones@redhat.com>,
David Herrmann <dh.herrmann@gmail.com>,
Christoph Hellwig <hch@lst.de>,
Kweh Hock Leong <hock.leong.kweh@intel.com>,
Russell King <linux@arm.linux.org.uk>,
Peter Zijlstra <peterz@infradead.org>,
Mark Salter <msalter@redhat.com>,
Darren Hart <dvhart@infradead.org>,
Stefan Stanacar <stefan.stanacar@intel.com>,
Borislav Petkov <bp@suse.de>, Ben Hutchings <ben@decadent.org.uk>,
Robert Elliott <elliott@hpe.com>,
Ricardo Neri <ricardo.neri-calderon@linux.intel.com>,
Robin Murphy <robin.murphy@arm.com>, Leif Lindholm <leif.>
Subject: [GIT PULL 00/40] EFI changes for v4.7
Date: Mon, 25 Apr 2016 21:06:32 +0100 [thread overview]
Message-ID: <1461614832-17633-1-git-send-email-matt@codeblueprint.co.uk> (raw)
Folks, here's the queue of EFI material for v4.7. This is probably the
biggest EFI pull ever sent, and there quite a few different topics
covered.
On the plus side the majority of new features (EFI Memory Attribute
tables, EFI capsules, GOP framebuffer) are basically architecture
independent, and some of the existing architecture-specific code has
been generalised and moved to drivers/firmware/efi.
The following changes since commit c3b46c73264b03000d1e18b22f5caf63332547c9:
Linux 4.6-rc4 (2016-04-17 19:13:32 -0700)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/mfleming/efi.git tags/efi-next
for you to fetch changes up to 4716a27d61ca3e3201d3201a6ee073da24902613:
efi/runtime-wrappers: Remove ARCH_EFI_IRQ_FLAGS_MASK ifdef (2016-04-25 16:53:59 +0100)
----------------------------------------------------------------
* Drop the unused EFI_SYSTEM_TABLES efi.flags bit and ensure the
ARM/arm64 EFI System Table mapping is read-only - Ard Biesheuvel
* Add a comment to explain that one of the code paths in the x86/pat
code is only executed for EFI boot - Matt Fleming
* Improve Secure Boot status checks on arm64 and handle unexpected
errors - Linn Crosetto
* Remove the global EFI memory map variable 'memmap' as the same
information is already available in efi::memmap - Matt Fleming
* EFI Memory Attribute table support for ARM/arm64 - Ard Biesheuvel
* EFI GOP framebuffer support for ARM/arm64 - Ard Biesheuvel
* EFI Bootloader Control driver for storing reboot(2) data in EFI
variables for consumption by bootloaders - Jeremy Compostella
* Core EFI capsule support - Matt Fleming
* EFI capsule char driver - Kweh, Hock Leong
* EFI memory map code unification for ARM and arm64 - Ard Biesheuvel
* Add generic EFI support for detecting when firmware corrupts cpu
status register bits (like IRQ flags) when performing EFI runtime
service calls - Mark Rutland
----------------------------------------------------------------
Ard Biesheuvel (19):
efi: Get rid of EFI_SYSTEM_TABLES status bit
efi/arm*: Drop writable mapping of the UEFI System table
efi: Check EFI_MEMORY_DESCRIPTOR version explicitly
efi/arm*: Use memremap() to create the persistent memmap mapping
ARM: efi: Apply strict permissons for UEFI Runtime Services regions
arm64: efi: Apply strict permissons for UEFI Runtime Services regions
efi: Add support for the EFI_MEMORY_ATTRIBUTES_TABLE config table
efi: Implement generic support for the Memory Attributes table
efi/arm*: Take the Memory Attributes table into account
x86/efi: Prepare GOP handling code for reuse as generic code
efi/libstub: Move Graphics Output Protocol handling to generic code
x86/efi: efifb: Move DMI based quirks handling out of generic code
efifb: Use builtin_platform_driver and drop unused includes
arm64/efi: libstub: Make screen_info accessible to the UEFI stub
efi/arm: libstub: Make screen_info accessible to the UEFI stub
efi/arm*: libstub: Wire up GOP protocol to struct screen_info
efi/arm*: Wire up struct screen_info to efi-framebuffer platform device
efifb: Enable the efi-framebuffer platform driver for ARM and arm64
efi/arm-init: Reserve rather than unmap the memory map for ARM as well
Compostella, Jeremy (1):
efibc: EFI Bootloader Control
Kweh, Hock Leong (1):
efi: A misc char interface to update EFI firmware
Linn Crosetto (2):
efi/arm64: Report unexpected errors when determining Secure Boot status
efi/arm64: Check SetupMode when determining Secure Boot status
Mark Rutland (10):
efi/runtime-wrappers: Add {__,}efi_call_virt templates
arm64/efi: Move to generic {__,}efi_call_virt
arm/efi: Move to generic {__,}efi_call_virt
x86/efi: Move to generic {__,}efi_call_virt
efi/runtime-wrappers: Remove redundant ifdefs
efi/runtime-wrappers: Detect firmware irq flag corruption
arm64/efi: Enable runtime call flag checking
arm/efi: Enable runtime call flag checking
x86/efi: Enable runtime call flag checking
efi/runtime-wrappers: Remove ARCH_EFI_IRQ_FLAGS_MASK ifdef
Matt Fleming (7):
x86/mm/pat: Document the (currently) EFI-only code path
efi: Iterate over efi.memmap in for_each_efi_memory_desc
efi: Remove global 'memmap'
x86/efi: Remove the always true EFI_DEBUG symbol
efi: Move efi_status_to_err() to drivers/firmware/efi/
efi: Capsule update support
x86/efi: Force EFI reboot to process pending capsules
arch/arm/include/asm/efi.h | 37 +--
arch/arm/kernel/efi.c | 41 +++
arch/arm/kernel/setup.c | 3 +-
arch/arm64/include/asm/efi.h | 37 +--
arch/arm64/kernel/efi.c | 57 +++-
arch/arm64/kernel/image.h | 1 +
arch/ia64/kernel/efi.c | 2 -
arch/x86/boot/compressed/eboot.c | 308 +--------------------
arch/x86/boot/compressed/eboot.h | 74 ------
arch/x86/include/asm/efi.h | 52 ++--
arch/x86/kernel/reboot.c | 9 +
arch/x86/kernel/sysfb_efi.c | 15 ++
arch/x86/mm/pageattr.c | 8 +-
arch/x86/platform/efi/efi.c | 133 +++++-----
arch/x86/platform/efi/efi_64.c | 10 +-
arch/x86/platform/efi/quirks.c | 10 +-
drivers/firmware/efi/Kconfig | 25 ++
drivers/firmware/efi/Makefile | 5 +-
drivers/firmware/efi/arm-init.c | 96 +++++--
drivers/firmware/efi/arm-runtime.c | 45 ++--
drivers/firmware/efi/capsule-loader.c | 343 ++++++++++++++++++++++++
drivers/firmware/efi/capsule.c | 300 +++++++++++++++++++++
drivers/firmware/efi/efi.c | 48 +++-
drivers/firmware/efi/efibc.c | 101 +++++++
drivers/firmware/efi/fake_mem.c | 43 ++-
drivers/firmware/efi/libstub/Makefile | 2 +-
drivers/firmware/efi/libstub/arm-stub.c | 77 +++++-
drivers/firmware/efi/libstub/arm32-stub.c | 37 +++
drivers/firmware/efi/libstub/efi-stub-helper.c | 6 +-
drivers/firmware/efi/libstub/gop.c | 354 +++++++++++++++++++++++++
drivers/firmware/efi/memattr.c | 182 +++++++++++++
drivers/firmware/efi/reboot.c | 12 +-
drivers/firmware/efi/runtime-wrappers.c | 60 +++++
drivers/firmware/efi/vars.c | 33 ---
drivers/video/fbdev/Kconfig | 2 +-
drivers/video/fbdev/efifb.c | 21 +-
include/linux/efi.h | 164 +++++++++++-
37 files changed, 2062 insertions(+), 691 deletions(-)
create mode 100644 drivers/firmware/efi/capsule-loader.c
create mode 100644 drivers/firmware/efi/capsule.c
create mode 100644 drivers/firmware/efi/efibc.c
create mode 100644 drivers/firmware/efi/libstub/gop.c
create mode 100644 drivers/firmware/efi/memattr.c
next reply other threads:[~2016-04-25 20:06 UTC|newest]
Thread overview: 41+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-04-25 20:06 Matt Fleming [this message]
2016-04-25 20:06 ` [PATCH 03/40] x86/mm/pat: Document the (currently) EFI-only code path Matt Fleming
2016-04-25 20:06 ` [PATCH 04/40] efi/arm64: Report unexpected errors when determining Secure Boot status Matt Fleming
2016-04-25 20:06 ` [PATCH 05/40] efi/arm64: Check SetupMode " Matt Fleming
2016-04-25 20:06 ` [PATCH 06/40] efi: Iterate over efi.memmap in for_each_efi_memory_desc Matt Fleming
2016-04-25 20:06 ` [PATCH 07/40] efi: Remove global 'memmap' Matt Fleming
2016-04-25 20:06 ` [PATCH 08/40] efi: Check EFI_MEMORY_DESCRIPTOR version explicitly Matt Fleming
2016-04-25 20:06 ` [PATCH 11/40] arm64: efi: Apply strict permissons for UEFI Runtime Services regions Matt Fleming
2016-04-25 20:06 ` [PATCH 12/40] efi: Add support for the EFI_MEMORY_ATTRIBUTES_TABLE config table Matt Fleming
2016-04-25 20:06 ` [PATCH 13/40] efi: Implement generic support for the Memory Attributes table Matt Fleming
2016-04-25 20:06 ` [PATCH 16/40] x86/efi: Prepare GOP handling code for reuse as generic code Matt Fleming
2016-04-25 20:06 ` [PATCH 17/40] efi/libstub: Move Graphics Output Protocol handling to " Matt Fleming
2016-04-25 20:06 ` [PATCH 18/40] x86/efi: efifb: Move DMI based quirks handling out of " Matt Fleming
2016-04-25 20:06 ` [PATCH 19/40] efifb: Use builtin_platform_driver and drop unused includes Matt Fleming
2016-04-25 20:06 ` [PATCH 20/40] arm64/efi: libstub: Make screen_info accessible to the UEFI stub Matt Fleming
2016-04-25 20:06 ` [PATCH 22/40] efi/arm*: libstub: Wire up GOP protocol to struct screen_info Matt Fleming
2016-04-25 20:06 ` [PATCH 23/40] efi/arm*: Wire up struct screen_info to efi-framebuffer platform device Matt Fleming
2016-04-25 20:06 ` [PATCH 24/40] efifb: Enable the efi-framebuffer platform driver for ARM and arm64 Matt Fleming
[not found] ` <1461614832-17633-1-git-send-email-matt-mF/unelCI9GS6iBeEJttW/XRex20P6io@public.gmane.org>
2016-04-25 20:06 ` [PATCH 01/40] efi: Get rid of EFI_SYSTEM_TABLES status bit Matt Fleming
2016-04-25 20:06 ` [PATCH 02/40] efi/arm*: Drop writable mapping of the UEFI System table Matt Fleming
2016-04-25 20:06 ` [PATCH 09/40] efi/arm*: Use memremap() to create the persistent memmap mapping Matt Fleming
2016-04-25 20:06 ` [PATCH 10/40] ARM: efi: Apply strict permissons for UEFI Runtime Services regions Matt Fleming
2016-04-25 20:06 ` [PATCH 14/40] efi/arm*: Take the Memory Attributes table into account Matt Fleming
2016-04-25 20:06 ` [PATCH 15/40] x86/efi: Remove the always true EFI_DEBUG symbol Matt Fleming
2016-04-25 20:06 ` [PATCH 21/40] efi/arm: libstub: Make screen_info accessible to the UEFI stub Matt Fleming
2016-04-25 20:06 ` [PATCH 25/40] efibc: EFI Bootloader Control Matt Fleming
2016-04-25 20:07 ` [PATCH 31/40] efi/runtime-wrappers: Add {__,}efi_call_virt templates Matt Fleming
2016-04-25 20:07 ` [PATCH 32/40] arm64/efi: Move to generic {__,}efi_call_virt Matt Fleming
2016-04-25 20:07 ` [PATCH 34/40] x86/efi: " Matt Fleming
2016-04-25 20:07 ` [PATCH 35/40] efi/runtime-wrappers: Remove redundant ifdefs Matt Fleming
2016-04-25 20:06 ` [PATCH 26/40] efi: Move efi_status_to_err() to drivers/firmware/efi/ Matt Fleming
2016-04-25 20:06 ` [PATCH 27/40] efi: Capsule update support Matt Fleming
2016-04-25 20:07 ` [PATCH 28/40] x86/efi: Force EFI reboot to process pending capsules Matt Fleming
2016-04-25 20:07 ` [PATCH 29/40] efi: A misc char interface to update EFI firmware Matt Fleming
2016-04-25 20:07 ` [PATCH 30/40] efi/arm-init: Reserve rather than unmap the memory map for ARM as well Matt Fleming
2016-04-25 20:07 ` [PATCH 33/40] arm/efi: Move to generic {__,}efi_call_virt Matt Fleming
2016-04-25 20:07 ` [PATCH 36/40] efi/runtime-wrappers: Detect firmware irq flag corruption Matt Fleming
2016-04-25 20:07 ` [PATCH 37/40] arm64/efi: Enable runtime call flag checking Matt Fleming
2016-04-25 20:07 ` [PATCH 38/40] arm/efi: " Matt Fleming
2016-04-25 20:07 ` [PATCH 39/40] x86/efi: " Matt Fleming
2016-04-25 20:07 ` [PATCH 40/40] efi/runtime-wrappers: Remove ARCH_EFI_IRQ_FLAGS_MASK ifdef Matt Fleming
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1461614832-17633-1-git-send-email-matt@codeblueprint.co.uk \
--to=matt@codeblueprint.co.uk \
--cc=James.Bottomley@HansenPartnership.com \
--cc=ben@decadent.org.uk \
--cc=bp@suse.de \
--cc=catalin.marinas@arm.com \
--cc=dh.herrmann@gmail.com \
--cc=dvhart@infradead.org \
--cc=elliott@hpe.com \
--cc=hch@lst.de \
--cc=hertzog@debian.org \
--cc=hock.leong.kweh@intel.com \
--cc=hpa@zytor.com \
--cc=jeremy.compostella@intel.com \
--cc=linux-efi@vger.kernel.org \
--cc=linux@arm.linux.org.uk \
--cc=mark.rutland@arm.com \
--cc=mingo@kernel.org \
--cc=msalter@redhat.com \
--cc=peterz@infradead.org \
--cc=pjones@redhat.com \
--cc=ricardo.neri-calderon@linux.intel.com \
--cc=robin.murphy@arm.com \
--cc=stefan.stanacar@intel.com \
--cc=tglx@linutronix.de \
--cc=will.deacon@arm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).