From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-14.1 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,INCLUDES_PULL_REQUEST,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8ED67C3F2D1 for ; Fri, 28 Feb 2020 12:14:16 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 673E7246B0 for ; Fri, 28 Feb 2020 12:14:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582892056; bh=OXTWApyngKLjZ0TZy/1RIFY4CBj24eE6zYDN66Iyua0=; h=From:To:Cc:Subject:Date:List-ID:From; b=QAx0FrRMwQ3PQ7Cs1nCHTu5dANxl3YSSF0w0HBZmEeDTqZgc2uG53JIpi+fxJKQMT 4PBzg2vp23FvGF2itE7HXqW51ubfLjuVv5GcoR3vYuUMx/XPUt+xnYW+P1YilxTnKt X71cD5n1JMKrqzzeuJ2Qr1zR6n93TcB8XS27f3vY= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726094AbgB1MOP (ORCPT ); Fri, 28 Feb 2020 07:14:15 -0500 Received: from mail.kernel.org ([198.145.29.99]:45214 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725769AbgB1MOO (ORCPT ); Fri, 28 Feb 2020 07:14:14 -0500 Received: from e123331-lin.home (amontpellier-657-1-18-247.w109-210.abo.wanadoo.fr [109.210.65.247]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 972682087F; Fri, 28 Feb 2020 12:14:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582892054; bh=OXTWApyngKLjZ0TZy/1RIFY4CBj24eE6zYDN66Iyua0=; h=From:To:Cc:Subject:Date:From; b=EsI4LRThbyAgJxLZTxN0VEQ4dPdF1pcgIakZxLfNgFEN+UkadTVBJlDHq2bfUheSz ctdjN11ON8hk0kP/LYZbbjs6Bis3fWKtdTYWo1Yh4fiD+0tURWpfQM6R9HlQJP+030 AAe8srp3C1ZO6cCH//LQQtDvhsS2tsOWtVGRYKVQ= From: Ard Biesheuvel To: linux-efi@vger.kernel.org, Ingo Molnar , Thomas Gleixner Cc: Ard Biesheuvel , linux-kernel@vger.kernel.org, David Hildenbrand , Heinrich Schuchardt , Tom Lendacky Subject: [GIT PULL 0/6] More EFI updates for v5.7 Date: Fri, 28 Feb 2020 13:14:02 +0100 Message-Id: <20200228121408.9075-1-ardb@kernel.org> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello Ingo, Thomas, A small set of EFI followup changes for v5.7. The last one fixes a boot regression in linux-next on x86 machines booting without EFI but with the IMA security subsystem enabled, which is why I am sending out the next batch a bit earlier than intended. Thanks, Ard. The following changes since commit e9765680a31b22ca6703936c000ce5cc46192e10: Merge tag 'efi-next' of git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi into efi/core (2020-02-26 15:21:22 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi.git tags/efi-next for you to fetch changes up to be15278269343ec0e4d0e41bab5f64b49b0edb6b: efi: mark all EFI runtime services as unsupported on non-EFI boot (2020-02-28 12:54:46 +0100) ---------------------------------------------------------------- More EFI updates for v5.7 A couple of followup fixes for the EFI changes queued for v5.7: - a fix for a boot regression on x86 booting without UEFI - memory encryption fixes for x86, so that the TPM tables and the RNG config table created by the stub are correctly identified as living in unencrypted memory - style tweak from Heinrich - followup to the ARM EFI entry code simplifications to ensure that we don't rely on EFI_LOADER_DATA memory being RWX ---------------------------------------------------------------- Ard Biesheuvel (3): efi/arm: clean EFI stub exit code from cache instead of avoiding it efi/arm64: clean EFI stub exit code from cache instead of avoiding it efi: mark all EFI runtime services as unsupported on non-EFI boot Heinrich Schuchardt (1): efi: don't shadow i in efi_config_parse_tables() Tom Lendacky (2): efi/x86: Add TPM related EFI tables to unencrypted mapping checks efi/x86: Add RNG seed EFI table to unencrypted mapping check arch/arm/boot/compressed/head.S | 18 ++++++++---------- arch/arm64/kernel/efi-entry.S | 26 +++++++++++++------------- arch/arm64/kernel/image-vars.h | 4 ++-- arch/x86/platform/efi/efi.c | 3 +++ drivers/firmware/efi/efi.c | 25 +++++++++++++------------ include/linux/efi.h | 2 ++ 6 files changed, 41 insertions(+), 37 deletions(-)