Hello Ingo, Thomas, A small set of EFI followup changes for v5.7. The last one fixes a boot regression in linux-next on x86 machines booting without EFI but with the IMA security subsystem enabled, which is why I am sending out the next batch a bit earlier than intended. Thanks, Ard. The following changes since commit e9765680a31b22ca6703936c000ce5cc46192e10: Merge tag 'efi-next' of git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi into efi/core (2020-02-26 15:21:22 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi.git tags/efi-next for you to fetch changes up to be15278269343ec0e4d0e41bab5f64b49b0edb6b: efi: mark all EFI runtime services as unsupported on non-EFI boot (2020-02-28 12:54:46 +0100) ---------------------------------------------------------------- More EFI updates for v5.7 A couple of followup fixes for the EFI changes queued for v5.7: - a fix for a boot regression on x86 booting without UEFI - memory encryption fixes for x86, so that the TPM tables and the RNG config table created by the stub are correctly identified as living in unencrypted memory - style tweak from Heinrich - followup to the ARM EFI entry code simplifications to ensure that we don't rely on EFI_LOADER_DATA memory being RWX ---------------------------------------------------------------- Ard Biesheuvel (3): efi/arm: clean EFI stub exit code from cache instead of avoiding it efi/arm64: clean EFI stub exit code from cache instead of avoiding it efi: mark all EFI runtime services as unsupported on non-EFI boot Heinrich Schuchardt (1): efi: don't shadow i in efi_config_parse_tables() Tom Lendacky (2): efi/x86: Add TPM related EFI tables to unencrypted mapping checks efi/x86: Add RNG seed EFI table to unencrypted mapping check arch/arm/boot/compressed/head.S | 18 ++++++++---------- arch/arm64/kernel/efi-entry.S | 26 +++++++++++++------------- arch/arm64/kernel/image-vars.h | 4 ++-- arch/x86/platform/efi/efi.c | 3 +++ drivers/firmware/efi/efi.c | 25 +++++++++++++------------ include/linux/efi.h | 2 ++ 6 files changed, 41 insertions(+), 37 deletions(-)