From patchwork Sun Jul 9 10:38:46 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Heinrich Schuchardt X-Patchwork-Id: 1805246 X-Patchwork-Delegate: trini@ti.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=gmx.de header.i=xypron.glpk@gmx.de header.a=rsa-sha256 header.s=s31663417 header.b=pHxhwQh0; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4QzNsQ2krTz20WT for ; Sun, 9 Jul 2023 20:38:48 +1000 (AEST) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id BC2F6847B6; Sun, 9 Jul 2023 12:38:39 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; secure) header.d=gmx.de header.i=xypron.glpk@gmx.de header.b="pHxhwQh0"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 4A7C1847BC; Sun, 9 Jul 2023 12:38:38 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.2 Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id B0CB28477A for ; Sun, 9 Jul 2023 12:38:35 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=xypron.glpk@gmx.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.de; s=s31663417; t=1688899112; x=1689503912; i=xypron.glpk@gmx.de; bh=/N6AbOzpmEDCGBd4F9nsaoRedlm4wrueXFr/5uLjaV4=; h=X-UI-Sender-Class:Date:To:Cc:From:Subject; b=pHxhwQh0phLUp6w8EOhp/aJrssKgUs9BggFfZyS1K+llZ40NY453ePrFKcnSPnD3fKGTLMf AZ5MJR91sFJstxlEO183NJMUcXdhpKyEDzs+WGQ16Tg1BviNlRIRvnG1drpb5LeDl9FnYtpWE 6ybgw7zOnX8y3CxVMqS2Bqh3HpDv/CP6PCOYOYuP+GhwXKP8R6uuOY1afYj6zWH4kZJX7bJGB rOkrFb51pxGWWFq75LazgoFBJur5JRWPTHKybycGLDUCZ8axEqYNyMp74tzLbneFNA59TtLwb qNepne3nTU3vHLQUA7W31hn75C/NDzYpAWs+RanVox8JAsuFlXVw== X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a Received: from [192.168.123.94] ([84.119.33.219]) by mail.gmx.net (mrgmx004 [212.227.17.190]) with ESMTPSA (Nemesis) id 1M2wGs-1qHKoW0bpU-003NxZ; Sun, 09 Jul 2023 12:38:32 +0200 Message-ID: <1d0da6f2-0407-b7b3-6ade-e5d3bdfc0db2@gmx.de> Date: Sun, 9 Jul 2023 12:38:46 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.13.0 Content-Language: en-US To: Tom Rini Cc: U-Boot Mailing List , Ilias Apalodimas , Alper Nebi Yasak , Malte Schmidt , Masahisa Kojima , Paul Barker From: Heinrich Schuchardt Subject: Pull request efi-2023-07-rc7 X-Provags-ID: V03:K1:rD51XiVskAzvB8ggbLEPtPlwAud+bifOgA+PRP8bXkH2LsqqMBW Tkzf7jCQc/suxFSf6g+Y9EB56aT7LW74OigQiSrRtDsTeofDhfIWEZ0dbzUJ+mhjHdxh7Qi O7hrBVPRsKVM3lrN6fVgwJ99VxvkuaBy6i9T/nW1v+TB86iDSLDSYi27W5yoGQd4ot6vejl M/Kg1iJUfiNFVDpK8yoag== UI-OutboundReport: notjunk:1;M01:P0:I1EEusoY2LM=;rnBsh6Nxv3SGE/sVHaradcSpCPg dqX3EkBXkOKpLvgi0iH//+CfVF38mronuf2rbivYB0vC8IDKJdi/B+HY49KxMFAQ5++j0GQkS 2jlicpbgulYbaO0v3anOa4eWl4QqmXIqZUFOpDsPNu0AXNDpirpEZGHuabRfa8aO5WlPCjpV4 Ai4D1/rAUlJa+G06Zt9jCt9152MHMcltCGhiEt27jbRB0r/lmbM9++Rt2TbyJV8v5m3w1RFHr aoXbQuqdGNKfPFsISR6zZ5i6/OxfoB2ay6mDReYD+UhWQdCafV/35Bdgg2zA1uDuX6WgmL+T2 kmz00uYBqXu5wz7ZprlN7bq2J+Aj+W/YTpBYzblhCdj9WupUg2emRNRnnFFm+bIL+Uo8hsgkp fYkH84dnLxOM+dE1O0jovyFzqeazNByn9cSA6bpVO4OWLzioWeTMW+kBGO5INFMguu189PU2S EnXGIZ9RUClgLvTbHo7RbBgEtqDbuqddWHpsv+0tDkYQdXz11nAE3882VAbAczxc2h1A91E9g 0sHkIiE+zr738TgU0XDIod7yj0QFjtF1bi8gmOwpr2x7xEK7iJdnHCPkPRB7V1KyIfeOYkHRx yLfrqPtDaTGgPb6U/KPpQo8sfx2sPGI1XPhGdErCZk9iocqZlFlZiZOeQsBVhsQzB32WYlY1J 5kynwQPXemA4fZ4G5JWfZsRWS16blfWHCtaw2/7D2yuwoUSAgrGtliTCSo28c8uutb2ylPb3v AzYnKufYDGV6mtk9C3M+jx5DTlqLxH+CkZuYI9gDA/NTix9hCY4KqTHZpQUfG1cKWWF3+qd+G xzhNfdhxZZdF0AJPcwAEx2V0/hYAiQ7GD8mTr+7RA8qUVwSkkHj9ioTU3ltEK/rfDOll5DbtK bXspYtlOPt8Rwxj7XR0aOuyyj8//yr2odk+OwmhYGHwxFFfsY/p7qFavp7wWQ2y+pK0NZWVt1 wuWKujUbAgfkVwj3PHL86w/qCgQ= X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.8 at phobos.denx.de X-Virus-Status: Clean Dear Tom, The following changes since commit 0beb649053b86b2cfd5cf55a0fc68bc2fe91a430: MAINTAINERS: correct at91 tree link (2023-07-07 11:37:09 -0400) are available in the Git repository at: https://source.denx.de/u-boot/custodians/u-boot-efi.git tags/efi-2023-07-rc7 for you to fetch changes up to e05a4b12a056fd7fe22e85715c8f5e5e811fb551: mkeficapsule: fix efi_firmware_management_capsule_header data type (2023-07-09 10:32:28 +0200) Gitlab CI showed no issues: https://source.denx.de/u-boot/custodians/u-boot-efi/-/pipelines/16815 ---------------------------------------------------------------- Pull request efi-2023-07-rc7 Documentation: * Fix links to Linux kernel documentation UEFI: * Fix memory leak in efidebug dh subcommand * Fix underflow when calculating remaining variable store size * Increase default variable store size to 64 KiB * mkeficapsule: fix efi_firmware_management_capsule_header data type ---------------------------------------------------------------- Alper Nebi Yasak (2): efi_loader: Avoid underflow when calculating remaining var store size efi_loader: Increase default variable store size to 64KiB Heinrich Schuchardt (1): doc: harmonize Linux kernel documentation links Malte Schmidt (1): mkeficapsule: fix efi_firmware_management_capsule_header data type Masahisa Kojima (1): cmd: efidebug: add missing efi_free_pool for dh subcommand Paul Barker (1): x86: Update docs link in bootparam header arch/x86/include/asm/bootparam.h | 2 +- cmd/efidebug.c | 1 + doc/develop/docstyle.rst | 2 +- doc/usage/blkmap.rst | 2 +- lib/efi_loader/Kconfig | 5 +++-- lib/efi_loader/efi_var_mem.c | 4 ++++ tools/eficapsule.h | 2 +- 7 files changed, 12 insertions(+), 6 deletions(-)