From patchwork Sat Sep 4 09:56:47 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Heinrich Schuchardt X-Patchwork-Id: 1524602 X-Patchwork-Delegate: trini@ti.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; secure) header.d=gmx.net header.i=@gmx.net header.a=rsa-sha256 header.s=badeba3b8450 header.b=WlhLtusZ; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Received: from phobos.denx.de (phobos.denx.de [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4H1qnw3fYlz9sVq for ; Sat, 4 Sep 2021 19:57:08 +1000 (AEST) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id D252983327; Sat, 4 Sep 2021 11:57:02 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=fail (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; secure) header.d=gmx.net header.i=@gmx.net header.b="WlhLtusZ"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 01A8A8332D; Sat, 4 Sep 2021 11:57:01 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,FREEMAIL_FROM,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.2 Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id C209683314 for ; Sat, 4 Sep 2021 11:56:57 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=xypron.glpk@gmx.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1630749414; bh=v75YeJbHlNJcxcf+eJY+muDTLvCw/0wldblL9ETXrAc=; h=X-UI-Sender-Class:To:Cc:From:Subject:Date; b=WlhLtusZBqM5jLKGHN7AzH1sEm7oXsAZdvOiJJIT537xIvrGotzYt3A3gAs3oKnAE 7hORmiYX9Q3FZIxqUnmBHb8Ljeqnaf7tF0Fg+CpAbsH1ZdvSYXmm8xNV/xGyg2ia3p i63FU7liY+VzgHOywOzN5HICIrotImNaIE8TTa9w= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from [192.168.123.35] ([88.152.144.157]) by mail.gmx.net (mrgmx004 [212.227.17.190]) with ESMTPSA (Nemesis) id 1N49lD-1n4Hau42Sn-0108Af; Sat, 04 Sep 2021 11:56:54 +0200 To: Tom Rini Cc: U-Boot Mailing List , Alexander Graf , Masahisa Kojima , Ilias Apalodimas , AKASHI Takahiro From: Heinrich Schuchardt Subject: Pull request for efi-2021-10-rc4 Message-ID: <61e2e1cc-b474-84dd-eceb-bb86a59972be@gmx.de> Date: Sat, 4 Sep 2021 11:56:47 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.13.0 MIME-Version: 1.0 Content-Language: en-US X-Provags-ID: V03:K1:SE0aPla+lSd/8yERQwtY0MlQvLlxIJOEsCQN4Me/3fODWIoZuED Sd1dNrcFUcfOQ9Lr6hCq7gTYT6Epbr5OwMagsr+tWev/FTsDlZgLc2eTuQUQ5LxhtpEJOmR y0JczadLt2Zl3JpMG1XPv4FE5SFU+d312eoW3wMWPGHjtKNRgIs8lmstJNJO5uMu61H3RQy zNmMFHtkFKBO7MynpzzHw== X-UI-Out-Filterresults: notjunk:1;V03:K0:VxQTpWhkJng=:zIZKcdZSxDLbRmczdd3exs TQOHNdFo5NbtHvamAs1nqMCcPgQhZd9k6OzoAfWXaTuexNr1VK74wCiZSQJBAxY860obPKc4i y6Y6AcyHO0O8t5lJG0rtxxzzsuXvdC6G4TazM2lRsMkiSwpAsj3OQohaCRKbdkPCNf2KFUrC6 PGzMRs/x3Oq8tUD7n4YFrcY9O6if7jguWbfzEidu6djl/bl0b1euKuy8C1/4wH0+4M9S0WXix MW2fymmDuObwCxHl+Xyur/R3KppxUnXxeud6/yugvYNvlYdKkjkJEin0QQJpB9J5bfIXXfn1+ CWU9864uAffveC8L8pxf7Q4DCzJlRgkPlX4iych7JUvjq8C5UfjnBX+Q5xUB393QiX71NMx8F bGtM+86BdBMs1ZCiqY1Bj0XhmovTIB6bl35cuCz3qeLPW2grFUf9yRp5i/HYD7oJ2NgXYc7In qoD8bycg99cHHD0jTIxOCwXm4zILFCVvLObmIEWp4NQO/eH5h3gxbP+xEmpgFFpPsqV8pq5mE DJOhUOZf+bOrZOUfDehdiuPdLut3FHxERKq1ZCCbje8/dkZxq+AyVaP7uMugBvQATY4jMxhJO I1qpySWrTSBg18LgXuu1kZDB34UDg6kudTPp14iYek0jA4KaawV2N0CA7nJuvj0eBw3I0SCLa jLwwoOeZMq5dQgb2ggnMl2SeoC5EyYbeVZc8UpxyXOSwOzCQ8mB6b5xwiyevVOyj8+FthJMmJ qPcufLGP9TIVZLmfoSi1xl8uXtG+67b/W51TQ2Fk6UOdRfzMRYlajqlXmdm7BwKIwY+gNaLpR KbSVxZEIU8jUyt/Jp/2U9zMzbXW3Orx7jmTwN59lAZexLg9Oly4902/64ylkaLHUCgg+XUVg0 +lOY626U+ZNTMVWoEU1fhOvJWi4bzIIg0SL9IJpHfQ9R7MetmPMdRsl27zw33vA2Pv689+9Ew O/EMAPDdbPJ1SwF7V6TyuVXgaJ+KbAuoLvrHznkhLlNbatQ/O8T8/tq7sH0Z99yCgNIn2HMPT DtgdLJxrpp4yRqpw0xMIxtH/+xRZDjA/gM3/VHlMx8Dq3Y6lzKNLVfMc558ic6gTkH+yscMtk NjZgYNPbLlvgh5+d0X3mvciBaoG2hdhwfDN2seP+i2m6U2K7qS+IZvk2g== X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.2 at phobos.denx.de X-Virus-Status: Clean Dear Tom, The following changes since commit 94509b79b13e69c209199af0757afbde8d2ebd6d: btrfs: Use default subvolume as filesystem root (2021-09-01 10:11:24 -0400) are available in the Git repository at: https://source.denx.de/u-boot/custodians/u-boot-efi.git tags/efi-2021-10-rc4 for you to fetch changes up to 1dfa494610c5469cc28cf1f8538abf4be6c00324: efi_loader: fix efi_tcg2_hash_log_extend_event() parameter check (2021-09-04 09:15:09 +0200) ---------------------------------------------------------------- Pull request for efi-2021-10-rc4 Documentation: Remove invalid reference to configuration variable in UEFI doc UEFI: Parameter checks for the EFI_TCG2_PROTOCOL Improve support of preseeding UEFI variables. Correct the calculation of the size of loaded images. Allow for UEFI images with zero VirtualSize ---------------------------------------------------------------- Heinrich Schuchardt (5): efi_loader: sections with zero VirtualSize efi_loader: rounding of image size efi_loader: don't load signature database from file efi_loader: efi_auth_var_type for AuditMode, DeployedMode efi_loader: correct determination of secure boot state Masahisa Kojima (3): efi_loader: add missing parameter check for EFI_TCG2_PROTOCOL api efi_loader: fix boot_service_capability_min calculation efi_loader: fix efi_tcg2_hash_log_extend_event() parameter check include/efi_tcg2.h | 4 +++- include/efi_variable.h | 6 +++++- lib/efi_loader/efi_image_loader.c | 35 +++++++++++++++++++++++++------ lib/efi_loader/efi_tcg2.c | 21 ++++++++++++++++++- lib/efi_loader/efi_var_common.c | 43 ++++++++++++++++++++++++++++++--------- lib/efi_loader/efi_var_file.c | 41 ++++++++++++++++++++++--------------- lib/efi_loader/efi_variable.c | 6 +++--- 7 files changed, 118 insertions(+), 38 deletions(-)