From patchwork Thu Dec 10 18:34:56 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Heinrich Schuchardt X-Patchwork-Id: 1414422 X-Patchwork-Delegate: trini@ti.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=gmx.de Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; secure) header.d=gmx.net header.i=@gmx.net header.a=rsa-sha256 header.s=badeba3b8450 header.b=QmsO1ct1; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4CsMzs5MJdz9sW1 for ; Fri, 11 Dec 2020 05:35:27 +1100 (AEDT) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id C31CF82625; Thu, 10 Dec 2020 19:35:12 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=fail (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; secure) header.d=gmx.net header.i=@gmx.net header.b="QmsO1ct1"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id E904A82625; Thu, 10 Dec 2020 19:35:10 +0100 (CET) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,FREEMAIL_FROM,RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H2, SPF_HELO_NONE autolearn=ham autolearn_force=no version=3.4.2 Received: from mout.gmx.net (mout.gmx.net [212.227.15.15]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 9C96682623 for ; Thu, 10 Dec 2020 19:35:07 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=xypron.glpk@gmx.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1607625306; bh=iTmfQbxniSe8UYjW40xuZWFP0XDM3Ka8xQvg+dtw6UQ=; h=X-UI-Sender-Class:Subject:References:To:Cc:From:Date:In-Reply-To; b=QmsO1ct1II7+L3Pm4+/rEswPgCylW1tqA6AWeFcXVbgZxF3LTAnxJpGGdwJD37K8O G7oC7w5YhNji8PYQ/RzDyjmtcgylItKmw0s67P8cyfs4xD7Jhjgo9eJKn3nWUFMWgS LOpQpIOWQfcfR/lW1igjqkYdilBEKmPHALAdhtwE= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from [192.168.123.51] ([62.143.246.89]) by mail.gmx.com (mrgmx005 [212.227.17.190]) with ESMTPSA (Nemesis) id 1MUGe1-1keFhJ1eS3-00RJbx; Thu, 10 Dec 2020 19:35:06 +0100 Subject: Pull request for UEFI sub-system for next References: <0108e173-9c7c-867c-cb4a-3aaacee2dcb0@gmx.de> To: Tom Rini Cc: Alexander Graf , U-Boot Mailing List From: Heinrich Schuchardt X-Forwarded-Message-Id: <0108e173-9c7c-867c-cb4a-3aaacee2dcb0@gmx.de> Message-ID: Date: Thu, 10 Dec 2020 19:34:56 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.5.1 MIME-Version: 1.0 In-Reply-To: <0108e173-9c7c-867c-cb4a-3aaacee2dcb0@gmx.de> Content-Language: en-US X-Provags-ID: V03:K1:0V+YEtL2gM8iOKesQrB0PiL9UKf8F9Oct2xW8mtkE2WsnVR4IsR Ot5Zv4NFFC9e5x8yIOBO/XPTNTZlxIfHOnxa0mJBGOUYyoUH4OfYGzOtwrb4yyVNCF7eo7q gf81FbFdb2oPH+cxarxweR70gYg1Q0YYat7a3XEr9GroXLvMaoThaorf8iFaiJ9VtsYWdX2 tBIh7yPLxmbeVa9MnLCUg== X-UI-Out-Filterresults: notjunk:1;V03:K0:bMNgTV5Ppkk=:Y4syWZTezYraC62F3WuuWI e7FaYaGCXnD4CYh815MMqX46AIuBiHlX+zmAue8iCmSfxbXnmM0DXdQ7BzolZyOBlJKSesPBN t1I78+Sm6gq7lt6lFOGEq4uWDAXcFww5t0+jeX6rFWPODPpESTisg/Xi4oT6hDsbJaQ6rH+ev lWX9XuN3hJGUrYUPPKTLDjqfzymNTHzY5injFqhSgr25oV10Mi29j7rvrQhjYClzemeqRnAQS YcTgu+oqgtSqfbcPn1Pf8SYccFljIupYUBmpVW8x1PERhZrkpXPxZPWIw2g2b6x/YZPmfKs9j IEhT+KKrt0YE6KNvH3mirXC+t6um09/w7R6ODlpbOwLR/3/itsgHg9tBYaweIDgjhePMV3+9s si7QArD70upiVp7eS4MlBt5vbudM4N76iR2qFikoJmonBaepW0Qk37b1AyyeUlNtgNWwFm210 vki0HweqxIml3Id0n3f+6doHU3tjzcmP/WFcyI01QQxkJOj2uqhZazILBmEiYod19efcwENXK OucVZNuApSbjND2ZNVWwW4MFa4VtAtLWTQ0fWGN7ASgtCfjvTJ708WOAAPtwqv89I9HXTau7L mm1q0e0DE3z5Ak/q3QTRN+MeOc8UuohRqgQTGBq+XJraykiQ2HpVIC+g/uj+gvs4qBc0F8a7x NyzT2TFVbPv9ifJ9on5MrJ1uau361nn8nxcKf0urdFyb6xK40J4veuMpTqISHbdYYWYewktce t4SMFi3CnyxFaYHMlMJiSP8IOEHE4ID7CmlrcEPUpMtMScwSMMGpfHXK/DAuqwXCT5RZvTVn3 wCU7sWYsIInWinXFhoVcO9FoUJ29iPj+al2ykQA26Yyh4bCgoZmDgcbwXToqD63YYH21MPLHc Bu5nciRvjHahzL06QvkQ== X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.102.3 at phobos.denx.de X-Virus-Status: Clean Dear Tom, The following changes since commit 03f1f78a9b44b5fd6fc09faf81639879d2d0f85f: spl: fit: Prefer a malloc()'d buffer for loading images (2020-12-07 17:40:34 -0500) are available in the Git repository at: https://gitlab.denx.de/u-boot/custodians/u-boot-efi.git tags/efi-next for you to fetch changes up to 264485131c59c1c8fa17fe742bbca65cef868d94: efi_loader: link partition to block device (2020-12-10 09:15:33 +0100) ---------------------------------------------------------------- Pull request for UEFI sub-system for next Bug fixes * avoid corruption of FAT file system when using long names * correct values for RuntimeServicesSupport concerning UEFI capsule update * link partition to block device via EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER New feature * support EFI_LOAD_FILE_PROTOCOL in LoadImage() boot service Gitlab CI showed no problem: https://gitlab.denx.de/u-boot/custodians/u-boot-efi/-/pipelines/5531 ---------------------------------------------------------------- Heinrich Schuchardt (26): fs: fat: correct first cluster for '..' fs: fat: export fat_next_cluster() fs: fat: create correct short names fs: fat: pass shortname to fill_dir_slot fs: fat: call set_name() only once fs: fat: generate unique short names fs: fat: dentry iterator for fill_dir_slot() fs: fat: set start cluster for root directory fs: fat: flush new directory cluster fs: fat: fat_find_empty_dentries() fs: fat: reuse deleted directory entries fs: fat: search file should not allocate cluster fs: fat: use constant DELETED_FLAG fs: fat: first dentry of long name in FAT iterator fs: fat: deletion of long file names efi_loader: don't set EFI_RT_SUPPORTED_UPDATE_CAPSULE efi_loader: remove EFI_HII_CONFIG_ROUTING_PROTOCOL efi_loader: resequence functions in efi_boottime.c efi_loader: move EFI_LOAD_FILE2_PROTOCOL_GUID efi_loader: pass boot_policy to efi_load_image_from_path efi_loader: carve out efi_load_image_from_file() efi_loader: support EFI_LOAD_FILE_PROTOCOL efi_selftest: clean up Makefile efi_selftest: test EFI_LOAD_FILE_PROTOCOL efi_loader: make efi_protocol_open() non-static efi_loader: link partition to block device fs/fat/fat.c | 130 +++++-- fs/fat/fat_write.c | 530 ++++++++++++++++++++-------- include/efi_loader.h | 8 + include/fat.h | 7 +- lib/Kconfig | 2 +- lib/efi_loader/Makefile | 2 +- lib/efi_loader/efi_boottime.c | 271 +++++++++----- lib/efi_loader/efi_disk.c | 20 ++ lib/efi_loader/efi_hii_config.c | 10 +- lib/efi_loader/efi_load_initrd.c | 3 - lib/efi_loader/efi_root_node.c | 3 - lib/efi_loader/efi_runtime.c | 4 - lib/efi_selftest/Makefile | 17 +- lib/efi_selftest/efi_selftest_load_file.c | 475 +++++++++++++++++++++++++ lib/efi_selftest/efi_selftest_load_initrd.c | 7 +- 15 files changed, 1191 insertions(+), 298 deletions(-) create mode 100644 lib/efi_selftest/efi_selftest_load_file.c