From: Ard Biesheuvel <ard.biesheuvel@linaro.org>
To: linux-efi@vger.kernel.org, Ingo Molnar <mingo@kernel.org>,
Thomas Gleixner <tglx@linutronix.de>
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>,
linux-kernel@vger.kernel.org, Borislav Petkov <bp@suse.de>,
Daniel Kiper <daniel.kiper@oracle.com>,
Hans de Goede <hdegoede@redhat.com>,
Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>,
Joey Zheng <yu.zheng@hxt-semitech.com>,
Kim Phillips <kim.phillips@arm.com>,
Lukas Wunner <lukas@wunner.de>,
Mark Rutland <mark.rutland@arm.com>,
Shunyong Yang <shunyong.yang@hxt-semitech.com>,
Wei Yongjun <weiyongjun1@huawei.com>,
Yazen Ghannam <yazen.ghannam@amd.com>
Subject: [GIT PULL 00/17] EFI updates for v4.18
Date: Fri, 4 May 2018 07:59:46 +0200 [thread overview]
Message-ID: <20180504060003.19618-1-ard.biesheuvel@linaro.org> (raw)
The following changes since commit 60cc43fc888428bb2f18f08997432d426a243338:
Linux 4.17-rc1 (2018-04-15 18:24:20 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi.git tags/efi-next
for you to fetch changes up to a0e781fedc0e975d2f33fda94e26d3f76331ee3d:
efi/libstub/arm64: handle randomized TEXT_OFFSET (2018-05-03 19:00:27 +0200)
----------------------------------------------------------------
First batch of EFI changes for v4.18:
- Initialize UEFI secure boot state during Xen dom0 boot (Daniel Kiper)
- Decode x86 CPER data (Yazen Ghannam)
- Ignore unrealistically large option roms (Hans de Goede)
- Additional minor tweaks
- A fix for arm64 kernels with CONFIG_RANDOMIZE_TEXT_OFFSET=y and running
with KASLR enabled. I was on the fence whether to send it as a fix or
cc it to stable, so I chose the latter. (TEXT_OFFSET randomization is a
debug feature that the distros don't enable)
----------------------------------------------------------------
Ard Biesheuvel (3):
efi: fix efi_pci_io_protocol32 prototype for mixed mode
efi: align efi_pci_io_protocol typedefs to type naming convention
efi/x86: fold __setup_efi_pci32 and __setup_efi_pci64 into one
Borislav Petkov (1):
efi/cper: Remove the INDENT_SP silliness
Daniel Kiper (1):
x86/xen/efi: Initialize UEFI secure boot state during dom0 boot
Hans de Goede (1):
efi/x86: Ignore unrealistically large option roms
Mark Rutland (1):
efi/libstub/arm64: handle randomized TEXT_OFFSET
Shunyong Yang (1):
efi/capsule-loader: Don't output reset log when reset flags are not set
Wei Yongjun (1):
efi/libstub/tpm: Make function efi_retrieve_tpm2_eventlog_1_2() static
Yazen Ghannam (8):
efi: Fix IA32/X64 Processor Error Record definition
efi: Decode IA32/X64 Processor Error Section
efi: Decode IA32/X64 Processor Error Info Structure
efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs
efi: Decode IA32/X64 Cache, TLB, and Bus Check structures
efi: Decode additional IA32/X64 Bus Check fields
efi: Decode IA32/X64 MS Check structure
efi: Decode IA32/X64 Context Info structure
arch/x86/boot/compressed/eboot.c | 112 +++-------
arch/x86/xen/efi.c | 57 +++++
drivers/firmware/efi/Kconfig | 5 +
drivers/firmware/efi/Makefile | 1 +
drivers/firmware/efi/capsule-loader.c | 14 +-
drivers/firmware/efi/cper-arm.c | 6 +-
drivers/firmware/efi/cper-x86.c | 356 ++++++++++++++++++++++++++++++
drivers/firmware/efi/cper.c | 16 +-
drivers/firmware/efi/libstub/arm64-stub.c | 7 +
drivers/firmware/efi/libstub/secureboot.c | 3 +
drivers/firmware/efi/libstub/tpm.c | 2 +-
include/linux/cper.h | 4 +-
include/linux/efi.h | 14 +-
13 files changed, 496 insertions(+), 101 deletions(-)
create mode 100644 drivers/firmware/efi/cper-x86.c
next reply other threads:[~2018-05-04 6:01 UTC|newest]
Thread overview: 47+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-05-04 5:59 Ard Biesheuvel [this message]
2018-05-04 5:59 ` [PATCH 01/17] x86/xen/efi: Initialize UEFI secure boot state during dom0 boot Ard Biesheuvel
2018-05-14 7:43 ` [tip:efi/core] " tip-bot for Daniel Kiper
2018-05-04 5:59 ` [PATCH 02/17] efi/cper: Remove the INDENT_SP silliness Ard Biesheuvel
2018-05-14 7:44 ` [tip:efi/core] " tip-bot for Borislav Petkov
2018-05-04 5:59 ` [PATCH 03/17] efi: Fix IA32/X64 Processor Error Record definition Ard Biesheuvel
2018-05-14 7:44 ` [tip:efi/core] " tip-bot for Yazen Ghannam
2018-05-04 5:59 ` [PATCH 04/17] efi: Decode IA32/X64 Processor Error Section Ard Biesheuvel
2018-05-14 7:45 ` [tip:efi/core] " tip-bot for Yazen Ghannam
2018-05-04 5:59 ` [PATCH 05/17] efi: Decode IA32/X64 Processor Error Info Structure Ard Biesheuvel
2018-05-14 7:45 ` [tip:efi/core] " tip-bot for Yazen Ghannam
2018-05-04 5:59 ` [PATCH 06/17] efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs Ard Biesheuvel
2018-05-14 7:46 ` [tip:efi/core] " tip-bot for Yazen Ghannam
2018-05-04 5:59 ` [PATCH 07/17] efi: Decode IA32/X64 Cache, TLB, and Bus Check structures Ard Biesheuvel
2018-05-14 7:46 ` [tip:efi/core] " tip-bot for Yazen Ghannam
2018-05-04 5:59 ` [PATCH 08/17] efi: Decode additional IA32/X64 Bus Check fields Ard Biesheuvel
2018-05-14 7:47 ` [tip:efi/core] " tip-bot for Yazen Ghannam
2018-05-04 5:59 ` [PATCH 09/17] efi: Decode IA32/X64 MS Check structure Ard Biesheuvel
2018-05-14 7:47 ` [tip:efi/core] " tip-bot for Yazen Ghannam
2018-05-04 5:59 ` [PATCH 10/17] efi: Decode IA32/X64 Context Info structure Ard Biesheuvel
2018-05-14 7:48 ` [tip:efi/core] " tip-bot for Yazen Ghannam
2018-05-04 5:59 ` [PATCH 11/17] efi/libstub/tpm: Make function efi_retrieve_tpm2_eventlog_1_2() static Ard Biesheuvel
2018-05-14 7:48 ` [tip:efi/core] " tip-bot for Wei Yongjun
2018-05-04 5:59 ` [PATCH 12/17] efi: fix efi_pci_io_protocol32 prototype for mixed mode Ard Biesheuvel
2018-05-14 6:57 ` Ingo Molnar
2018-05-14 7:02 ` Ard Biesheuvel
2018-05-14 7:42 ` [tip:efi/core] efi: Avoid potential crashes, fix the 'struct efi_pci_io_protocol_32' definition " tip-bot for Ard Biesheuvel
2018-05-04 5:59 ` [PATCH 13/17] efi: align efi_pci_io_protocol typedefs to type naming convention Ard Biesheuvel
2018-05-14 7:49 ` [tip:efi/core] efi: Align " tip-bot for Ard Biesheuvel
2018-05-04 6:00 ` [PATCH 14/17] efi/x86: fold __setup_efi_pci32 and __setup_efi_pci64 into one Ard Biesheuvel
2018-05-14 7:49 ` [tip:efi/core] efi/x86: Fold __setup_efi_pci32() and __setup_efi_pci64() into one function tip-bot for Ard Biesheuvel
2018-05-04 6:00 ` [PATCH 15/17] efi/x86: Ignore unrealistically large option roms Ard Biesheuvel
2018-05-14 6:40 ` Ingo Molnar
2018-05-14 6:43 ` [PATCH] efi/x86: Clean up the eboot code a bit Ingo Molnar
2018-05-14 6:47 ` Ard Biesheuvel
2018-05-14 6:58 ` Ingo Molnar
2018-05-14 6:59 ` Ard Biesheuvel
2018-05-14 7:50 ` [tip:efi/core] efi/x86: Ignore unrealistically large option ROMs tip-bot for Hans de Goede
2018-05-15 9:18 ` Ard Biesheuvel
2018-06-21 15:13 ` Ingo Molnar
2018-05-04 6:00 ` [PATCH 16/17] efi/capsule-loader: Don't output reset log when reset flags are not set Ard Biesheuvel
2018-05-14 7:50 ` [tip:efi/core] " tip-bot for Shunyong Yang
2018-05-04 6:00 ` [PATCH 17/17] efi/libstub/arm64: handle randomized TEXT_OFFSET Ard Biesheuvel
2018-05-14 6:47 ` Ingo Molnar
2018-05-14 6:48 ` Ard Biesheuvel
2018-05-14 7:00 ` Ingo Molnar
2018-05-14 7:01 ` Ard Biesheuvel
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180504060003.19618-1-ard.biesheuvel@linaro.org \
--to=ard.biesheuvel@linaro.org \
--cc=bp@suse.de \
--cc=daniel.kiper@oracle.com \
--cc=hdegoede@redhat.com \
--cc=jarkko.sakkinen@linux.intel.com \
--cc=kim.phillips@arm.com \
--cc=linux-efi@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=lukas@wunner.de \
--cc=mark.rutland@arm.com \
--cc=mingo@kernel.org \
--cc=shunyong.yang@hxt-semitech.com \
--cc=tglx@linutronix.de \
--cc=weiyongjun1@huawei.com \
--cc=yazen.ghannam@amd.com \
--cc=yu.zheng@hxt-semitech.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).