Ingo, Thomas, The v1 of this pull request/series was sent out last Wednesday, and appears to have slipped through the cracks. This is actually for the better, given that I had overlooked a patch that I had queued in the wrong place, so I have included it now for this v2. Thanks, Ard. The following changes since commit 7d194c2100ad2a6dded545887d02754948ca5241: Linux 5.4-rc4 (2019-10-20 15:56:22 -0400) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi.git tags/efi-urgent for you to fetch changes up to 8a1022da89857a21556eb04f53d281eda94ef02d: efi/efi_test: lock down /dev/efi_test and require CAP_SYS_ADMIN (2019-10-29 10:30:18 +0100) ---------------------------------------------------------------- Some more fixes for the EFI subsystem: - Prevent boot problems on HyperV due to incorrect placement of the kernel - Classify UEFI randomness as bootloader randomness - Fix EFI boot for the Raspberry Pi2 running U-boot - A capability/lockdown fix for the efi_test module. - Some more odd fixes. ---------------------------------------------------------------- Ard Biesheuvel (1): efi: libstub/arm: account for firmware reserved memory at the base of RAM Dominik Brodowski (1): efi/random: treat EFI_RNG_PROTOCOL output as bootloader randomness Javier Martinez Canillas (1): efi/efi_test: lock down /dev/efi_test and require CAP_SYS_ADMIN Jerry Snitselaar (1): efi/tpm: return -EINVAL when determining tpm final events log size fails Kairui Song (1): x86, efi: never relocate kernel below lowest acceptable address Narendra K (1): efi: Make CONFIG_EFI_RCI2_TABLE selectable on x86 only arch/x86/boot/compressed/eboot.c | 4 +++- drivers/firmware/efi/Kconfig | 1 + drivers/firmware/efi/efi.c | 2 +- drivers/firmware/efi/libstub/Makefile | 1 + drivers/firmware/efi/libstub/arm32-stub.c | 16 +++++++++++++--- drivers/firmware/efi/libstub/efi-stub-helper.c | 24 ++++++++++-------------- drivers/firmware/efi/test/efi_test.c | 8 ++++++++ drivers/firmware/efi/tpm.c | 1 + include/linux/efi.h | 18 ++++++++++++++++-- include/linux/security.h | 1 + security/lockdown/lockdown.c | 1 + 11 files changed, 56 insertions(+), 21 deletions(-)