On Fri, 28 Feb 2020 at 13:14, Ard Biesheuvel <ardb@xxxxxxxxxx> wrote: > > Hello Ingo, Thomas, > > A small set of EFI followup changes for v5.7. The last one fixes a boot > regression in linux-next on x86 machines booting without EFI but with > the IMA security subsystem enabled, which is why I am sending out the > next batch a bit earlier than intended. > Please disregard this for now. I will send a v2 tomorrow or Friday which will contain a few more fixes for the changes that are queued for v5.7 already. > > The following changes since commit e9765680a31b22ca6703936c000ce5cc46192e10: > > Merge tag 'efi-next' of git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi into efi/core (2020-02-26 15:21:22 +0100) > > are available in the Git repository at: > > git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi.git tags/efi-next > > for you to fetch changes up to be15278269343ec0e4d0e41bab5f64b49b0edb6b: > > efi: mark all EFI runtime services as unsupported on non-EFI boot (2020-02-28 12:54:46 +0100) > > ---------------------------------------------------------------- > More EFI updates for v5.7 > > A couple of followup fixes for the EFI changes queued for v5.7: > - a fix for a boot regression on x86 booting without UEFI > - memory encryption fixes for x86, so that the TPM tables and the RNG > config table created by the stub are correctly identified as living > in unencrypted memory > - style tweak from Heinrich > - followup to the ARM EFI entry code simplifications to ensure that we > don't rely on EFI_LOADER_DATA memory being RWX > > ---------------------------------------------------------------- > Ard Biesheuvel (3): > efi/arm: clean EFI stub exit code from cache instead of avoiding it > efi/arm64: clean EFI stub exit code from cache instead of avoiding it > efi: mark all EFI runtime services as unsupported on non-EFI boot > > Heinrich Schuchardt (1): > efi: don't shadow i in efi_config_parse_tables() > > Tom Lendacky (2): > efi/x86: Add TPM related EFI tables to unencrypted mapping checks > efi/x86: Add RNG seed EFI table to unencrypted mapping check > > arch/arm/boot/compressed/head.S | 18 ++++++++---------- > arch/arm64/kernel/efi-entry.S | 26 +++++++++++++------------- > arch/arm64/kernel/image-vars.h | 4 ++-- > arch/x86/platform/efi/efi.c | 3 +++ > drivers/firmware/efi/efi.c | 25 +++++++++++++------------ > include/linux/efi.h | 2 ++ > 6 files changed, 41 insertions(+), 37 deletions(-)