From patchwork Wed Nov 16 10:13:38 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Heinrich Schuchardt X-Patchwork-Id: 1704358 X-Patchwork-Delegate: trini@ti.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=gmx.de header.i=@gmx.de header.a=rsa-sha256 header.s=s31663417 header.b=i/uL8ZeE; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4NBzRD2gC0z23n3 for ; Wed, 16 Nov 2022 21:14:00 +1100 (AEDT) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id B9693851BA; Wed, 16 Nov 2022 11:13:51 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; secure) header.d=gmx.de header.i=@gmx.de header.b="i/uL8ZeE"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 2D6D7851B1; Wed, 16 Nov 2022 11:13:50 +0100 (CET) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,RCVD_IN_MSPIKE_H2, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.2 Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 6C924851B1 for ; Wed, 16 Nov 2022 11:13:47 +0100 (CET) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=xypron.glpk@gmx.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.de; s=s31663417; t=1668593624; bh=KhB7sDp4gLnE0o5Ij9lDno4m541j73uR47vqV4lwJHM=; h=X-UI-Sender-Class:Date:To:Cc:From:Subject; b=i/uL8ZeEfhACi601Sreuxzl8bRaksRcsu/+VaICKOG9Z+Ou7y/e0w1QG53kHQFs0b w7PuY5s9ApZUh0kddhTV6APG3ov9HS2ZKjCy2N6m9/HIOn57vNORqsPQT8Ns8n6PiL 7O0VWP/yo1o2rWlu5gwcy9z48Ubj3tdKP5qmeOKRBzW6tRhITk5lZs/9D7loAJuKuo 3o1utQh85B2UiW4SwSjjbzs9l2ZBZtQRXp7UNY4LkIvR5UNdGdThGr2dPN6zEm5bWO EVboY+bbV3Cp5MVEbAkkxEz0VPbV9mBtxw1pX6GpF0ilwyYGQpwwMZBRDIL/SEH+uM T9U5AaYC+CqpA== X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a Received: from [192.168.123.67] ([84.118.157.2]) by mail.gmx.net (mrgmx104 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MEFzx-1olaFu48LF-00ABev; Wed, 16 Nov 2022 11:13:44 +0100 Message-ID: <3f5df7cb-9383-9f40-0159-22f1c4bc2815@gmx.de> Date: Wed, 16 Nov 2022 11:13:38 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.4.2 Content-Language: en-US To: Tom Rini Cc: U-Boot Mailing List , Ilias Apalodimas , Masahisa Kojima , Quentin Schulz , Quentin Schulz From: Heinrich Schuchardt Subject: Pull request for efi-2023-01-rc2 X-Provags-ID: V03:K1:lOf+Aot+/5CXTjm9OrHESi5VVrpXDR7rWV6M8egm4uV2zMpx1vm 89FsECTw4CGDCBhMu+grzREcfogM75lFtyOAM11RtsRkkpbvPTZd4MDKpJ9E8SqEW9lqMO5 mZsHMMEElHAMUD+rVJz24sQgiHvy0nW2fbiYO9axND5xo0SXhp6cWVBfomiGddNI7IYfYA6 JZPvUJ6etHibnRWJRA1zg== UI-OutboundReport: notjunk:1;M01:P0:VDNbJyT6jvc=;5AVQDRZ00P7nKS10GjSVFJrWmTl WqGmYHBhFYbkSAN2ugIyn2/r/2DU6/NYH0H8RUnalzWLN0E/N0ptMxZcJlkHb1tDK7ffeEfR0 DUF0vQ9z3b24ntqkO3Y9zYrI/x9AthQWRXuPQFEO+kTCuf7u6e1lVHlxIZDJd0gEEVqtnl+5b mZCb4H0pqL42NS7r8wRGy2Mr/SSRU39uNKPoRIILgztbbkjNX2NgEER2N2BSKinCYHx5ROxuV 7ZEUGRzVNoCokgKXCIHykVvYGQXszPj+AWnJb83Erlren2CozBhbU5mwb9qbPzGy+Gc54lSKg RORGzJrfMR2RWNiQ9g4O34M9qVBCwUtzX9wWqOLYuf+MJgHVahmHMGUjFF945QO651p6EOXOD zXl0/MiKCQHy1RMa56SsEK2i3lisl0i2Zss0MSLaciO2FpIWD3JRwIfn1bIw8vue78hxs8MbG vx6HL4ivI23p5WzQOIf3w1CzsGI1jfgYs6ZLMe5QHI+9S4M9sa3AOOJgw3Q02e+QZIBBNHv7C Gbpkq2RQtErQJrRUWHygKIJC09Tjm4wAc4QgV8nec3R0pla/qdPC+6jqqEbNRuBP6qhUB+I6u z8cvBbE/NInUOkvIpb9SQcu2JMZiyTdMaBK1asAROdYbssHhdmHgC9esTkRZd6johbPsjJPaT 7X8oocXR5Upcw0gsugu9txRVvbsEanz5LO+BWy7HMg2ZseFoVeyB8RQLOggdaSCSRkzOT29D6 sDa1/zi6kyqIYpgxgv41g4Ws+BWQi+tMONxiyzFpAGYFStTmamTWCCnlEJbaZk85vNLNDJ8v0 IgMonxae49Q0Q2ntUZBIsb7lnTTIrPXIWsMaagYVkI0Nw89LlMbMNFSjVSQ2yYrwfHfLhLPeP Ys/zRoPs+g7y8aC4AuJnvH6L/aSZSNWs8icOQi66XbNPuQSoEytQtXnM6i+ZQHhj0IOxiBHT0 G6vPxA== X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.6 at phobos.denx.de X-Virus-Status: Clean Dear Tom, The following changes since commit c4ee4fe92e9be120be6d12718273dec6b63cc7d9: Merge tag 'u-boot-imx-20221114' of https://gitlab.denx.de/u-boot/custodians/u-boot-imx (2022-11-14 09:33:36 -0500) are available in the Git repository at: https://source.denx.de/u-boot/custodians/u-boot-efi.git tags/efi-2023-01-rc2 for you to fetch changes up to a930d69baa958d5f308b3910187c5f3c083fe171: efi_loader: replace a u16_strdup with alloc + memcpy (2022-11-16 08:34:06 +0100) Gitlab CI showed no issues: https://source.denx.de/u-boot/custodians/u-boot-efi/-/pipelines/14127 ---------------------------------------------------------------- Pull request for efi-2023-01-rc2 Documentation: * fix building with Sphinx 5.0+ * man-pages for cmp and bootd commands UEFI: * Avoid unaligned access in efi_file_from_path() * More bug fixes ---------------------------------------------------------------- Heinrich Schuchardt (7): doc: fix documentation of enum gd_flags sandbox: fix documentation of struct host_ops Documentation: man-page for command bootd doc: add man-page for cmp command MAINTAINERS: add UEFI commands to EFI PAYLOAD cmd: remove superfluous if in eficonfig_edit_boot_option efi_loader: improve description of efi_file_from_path() Ilias Apalodimas (4): efi_loader: initialize return values in efi_uninstall_multiple_protocol_interfaces_int() efi_loader: add comments on efi_file_from_path() regarding alignment efi_loader: add missing EFI_CALL when closing a file efi_loader: replace a u16_strdup with alloc + memcpy Masahisa Kojima (1): eficonfig: fix missing variable initialization Quentin Schulz (1): doc: fix build with sphinx 5.0 and later. MAINTAINERS | 4 ++ cmd/eficonfig.c | 4 +- doc/conf.py | 2 +- doc/usage/cmd/bootd.rst | 38 ++++++++++++++ doc/usage/cmd/cmp.rst | 105 ++++++++++++++++++++++++++++++++++++++ doc/usage/index.rst | 2 + include/asm-generic/global_data.h | 2 +- include/sandbox_host.h | 19 +++---- lib/efi_loader/efi_boottime.c | 2 +- lib/efi_loader/efi_file.c | 24 ++++++++- 10 files changed, 183 insertions(+), 19 deletions(-) create mode 100644 doc/usage/cmd/bootd.rst create mode 100644 doc/usage/cmd/cmp.rst