From: Ard Biesheuvel <ardb@kernel.org>
To: linux-efi@vger.kernel.org, Ingo Molnar <mingo@kernel.org>,
Thomas Gleixner <tglx@linutronix.de>
Cc: Ard Biesheuvel <ardb@kernel.org>,
Ard Biesheuvel <ard.biesheuvel@linaro.org>,
linux-kernel@vger.kernel.org, Andy Lutomirski <luto@kernel.org>,
Arvind Sankar <nivedita@alum.mit.edu>,
Matthew Garrett <mjg59@google.com>
Subject: [GIT PULL 00/20] More EFI updates for v5.6
Date: Fri, 3 Jan 2020 12:39:33 +0100 [thread overview]
Message-ID: <20200103113953.9571-1-ardb@kernel.org> (raw)
Ingo, Thomas,
This is the second batch of EFI updates for v5.6. Two things are still
under discussion, so I'll probably have a few more changes for this
cycle in a week or so.
The following changes since commit 0679715e714345d273c0e1eb78078535ffc4b2a1:
efi/libstub/x86: Avoid globals to store context during mixed mode calls (2019-12-25 10:49:26 +0100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi.git tags/efi-next
for you to fetch changes up to d95e4feae5368a91775c4597a8f298ba84f31535:
efi/x86: avoid RWX mappings for all of DRAM (2020-01-03 11:46:15 +0100)
----------------------------------------------------------------
Second batch of EFI updates for v5.6:
- Some followup fixes for the EFI stub changes that have been queued up
already.
- Overhaul of the x86 EFI boot/runtime code, to peel off layers of pointer
casting and type mangling via variadic macros and asm wrappers that made
the code fragile and ugly.
- Increase robustness for mixed mode code, by using argmaps to annotate and
translate function prototypes that are not mixed mode safe. (Arvind)
- Add the ability to disable DMA at the root port level in the EFI stub, to
avoid booting into the kernel proper with IOMMUs in pass through and DMA
enabled (suggested by Matthew)
- Get rid of RWX mappings in the EFI memory map, where possible.
----------------------------------------------------------------
Ard Biesheuvel (17):
efi/libstub: fix boot argument handling in mixed mode entry code
efi/libstub/x86: force 'hidden' visibility for extern declarations
efi/x86: re-disable RT services for 32-bit kernels running on 64-bit EFI
efi/x86: map the entire EFI vendor string before copying it
efi/x86: avoid redundant cast of EFI firmware service pointer
efi/x86: split off some old memmap handling into separate routines
efi/x86: split SetVirtualAddresMap() wrappers into 32 and 64 bit versions
efi/x86: simplify i386 efi_call_phys() firmware call wrapper
efi/x86: simplify 64-bit EFI firmware call wrapper
efi/x86: simplify mixed mode call wrapper
efi/x86: drop two near identical versions of efi_runtime_init()
efi/x86: clean up efi_systab_init() routine for legibility
efi/x86: don't panic or BUG() on non-critical error conditions
efi/x86: remove unreachable code in kexec_enter_virtual_mode()
x86/mm: fix NX bit clearing issue in kernel_map_pages_in_pgd
efi/x86: don't map the entire kernel text RW for mixed mode
efi/x86: avoid RWX mappings for all of DRAM
Arvind Sankar (2):
efi/x86: Check number of arguments to variadic functions
efi/x86: Allow translating 64-bit arguments for mixed mode calls
Matthew Garrett (1):
efi: Allow disabling PCI busmastering on bridges during boot
Documentation/admin-guide/kernel-parameters.txt | 7 +-
arch/x86/boot/compressed/eboot.c | 18 +-
arch/x86/boot/compressed/efi_thunk_64.S | 4 +-
arch/x86/boot/compressed/head_64.S | 17 +-
arch/x86/include/asm/efi.h | 169 ++++++++---
arch/x86/mm/pageattr.c | 8 +-
arch/x86/platform/efi/Makefile | 1 -
arch/x86/platform/efi/efi.c | 354 ++++++++----------------
arch/x86/platform/efi/efi_32.c | 22 +-
arch/x86/platform/efi/efi_64.c | 157 +++++++----
arch/x86/platform/efi/efi_stub_32.S | 109 ++------
arch/x86/platform/efi/efi_stub_64.S | 43 +--
arch/x86/platform/efi/efi_thunk_64.S | 121 ++------
arch/x86/platform/uv/bios_uv.c | 7 +-
drivers/firmware/efi/Kconfig | 22 ++
drivers/firmware/efi/libstub/Makefile | 2 +-
drivers/firmware/efi/libstub/efi-stub-helper.c | 20 +-
drivers/firmware/efi/libstub/pci.c | 114 ++++++++
include/linux/efi.h | 29 +-
19 files changed, 597 insertions(+), 627 deletions(-)
create mode 100644 drivers/firmware/efi/libstub/pci.c
next reply other threads:[~2020-01-03 11:41 UTC|newest]
Thread overview: 24+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-01-03 11:39 Ard Biesheuvel [this message]
2020-01-03 11:39 ` [PATCH 01/20] efi/libstub: fix boot argument handling in mixed mode entry code Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 02/20] efi/libstub/x86: force 'hidden' visibility for extern declarations Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 03/20] efi/x86: re-disable RT services for 32-bit kernels running on 64-bit EFI Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 04/20] efi/x86: map the entire EFI vendor string before copying it Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 05/20] efi/x86: avoid redundant cast of EFI firmware service pointer Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 06/20] efi/x86: split off some old memmap handling into separate routines Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 07/20] efi/x86: split SetVirtualAddresMap() wrappers into 32 and 64 bit versions Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 08/20] efi/x86: simplify i386 efi_call_phys() firmware call wrapper Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 09/20] efi/x86: simplify 64-bit EFI " Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 10/20] efi/x86: simplify mixed mode " Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 11/20] efi/x86: drop two near identical versions of efi_runtime_init() Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 12/20] efi/x86: clean up efi_systab_init() routine for legibility Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 13/20] efi/x86: don't panic or BUG() on non-critical error conditions Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 14/20] efi/x86: remove unreachable code in kexec_enter_virtual_mode() Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 15/20] efi/x86: Check number of arguments to variadic functions Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 16/20] efi/x86: Allow translating 64-bit arguments for mixed mode calls Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 17/20] efi: Allow disabling PCI busmastering on bridges during boot Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 18/20] x86/mm: fix NX bit clearing issue in kernel_map_pages_in_pgd Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 19/20] efi/x86: don't map the entire kernel text RW for mixed mode Ard Biesheuvel
2020-01-03 11:39 ` [PATCH 20/20] efi/x86: avoid RWX mappings for all of DRAM Ard Biesheuvel
2020-01-09 9:37 ` [GIT PULL 00/20] More EFI updates for v5.6 Ard Biesheuvel
2020-01-10 18:13 ` Ingo Molnar
2020-01-13 7:29 ` Ard Biesheuvel
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200103113953.9571-1-ardb@kernel.org \
--to=ardb@kernel.org \
--cc=ard.biesheuvel@linaro.org \
--cc=linux-efi@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=luto@kernel.org \
--cc=mingo@kernel.org \
--cc=mjg59@google.com \
--cc=nivedita@alum.mit.edu \
--cc=tglx@linutronix.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).