From patchwork Thu Aug 3 15:55:54 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Heinrich Schuchardt X-Patchwork-Id: 1816537 X-Patchwork-Delegate: trini@ti.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=gmx.de header.i=xypron.glpk@gmx.de header.a=rsa-sha256 header.s=s31663417 header.b=hZt486a6; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4RGtkC3W1Nz1ybS for ; Fri, 4 Aug 2023 01:56:17 +1000 (AEST) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 64BCE8671F; Thu, 3 Aug 2023 17:56:08 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; secure) header.d=gmx.de header.i=xypron.glpk@gmx.de header.b="hZt486a6"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 650B3866E9; Thu, 3 Aug 2023 17:56:07 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,RCVD_IN_MSPIKE_H2, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.2 Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id D488C8666E for ; Thu, 3 Aug 2023 17:56:04 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=xypron.glpk@gmx.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.de; s=s31663417; t=1691078160; x=1691682960; i=xypron.glpk@gmx.de; bh=hvzXPfVcojjafVpToKV/hblulE/uzvL7KhFiTXhmsvg=; h=X-UI-Sender-Class:Date:To:Cc:From:Subject; b=hZt486a6HDIYs0+rbDP30/qgYxt9yNdxLyt80DeZePsPsjA4CpXVkj6OJVYFsilMXgAAIR4 yuEm/K+DrcCezWt7LYhymQGsAv9d6BbOB1IPeK8zWlPzwbbrmZddpBahhc9OKukMZhcfS71ei T2C09lrM47VRsEWXCn3e9Hpdv977r5xDnQaw+9oQ5Q2bcQW3JzPSHZ1f1pcz6osHiY7jhcW67 hqsw7JRNEroQiuA4E1lx24LCxPxWwisEkrt2quCCrFW8ERBWNCwxdxt171qSlDCCjse8nodqd kSxF/RUzUl30Zl3mk4ZSNc8G3z0rJmfMf3dKDoCVN3bj/DSZerLA== X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a Received: from [192.168.123.67] ([62.143.244.162]) by mail.gmx.net (mrgmx004 [212.227.17.190]) with ESMTPSA (Nemesis) id 1MJVDW-1q7iNk0XW4-00Jqca; Thu, 03 Aug 2023 17:56:00 +0200 Message-ID: <2f3f0ae9-446b-7aa6-b556-fd08916ce059@gmx.de> Date: Thu, 3 Aug 2023 17:55:54 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.13.0 Content-Language: en-US To: Tom Rini Cc: U-Boot Mailing List , Ilias Apalodimas , Bin Meng , AKASHI Takahiro , Dan Carpenter , Masahisa Kojima , Nishanth Menon From: Heinrich Schuchardt Subject: Pull request efi-2023-10-rc2-2 X-Provags-ID: V03:K1:O+rn5nLZ7Y0UHJIo+lHsei2VKm+jiy0Jnu0pS4xF1LEhdEhSxgx FtdMT3CRxJMoNyoRIlXQvjwv9Y9y71nK718pm19iXT3WYdt6uhy+gxQWpaDgSpjyiXnRIpl J6HrUwWkiu3a/dxKZVYY2STYQ2kQW7qW+iXOhhEf1L/XyEh6/n9tbd/TTH19prCry3OwB+g Fk2ihjL8HQsRb7sItALAw== UI-OutboundReport: notjunk:1;M01:P0:962lNnXYmcQ=;ywHhW/pFB5re/eQu9fWw+Zu2SYE +32tK9uB/wzZb2P4Tel9KN4xtwnhRTgBkZxG/IJkccVqxUWaahWU11woa7Hu25Ny1RkC8OWPG KQjC5oRTF3mCWap0xq3gUidHaVTd1EVF5qyyRAuzb0hl2Hn5j0nZ6EN5LOpxuc0P8QNitxwXI hUOXg+FeaeEW9lDo3sVoUSo2m9eslC2W//xfrgHIALCrrHQdN+kX51UTU4PdUduDtnCIfzoKT mOeL7nWtruXiMZXxLhtK+FakPN0GOfKb0XFS8e8O7ap3UqgI8Gaut36KxQBXf+Z7QYTek607I /K7+P0p9bNZ88ioG6XbIfQ/7B3RUv3iIX9qFh8MBimD/HivPp4BmF/nQBMCGyS9/3qGaW/AkO J5Jtd3kpzCFH0UDVJIEkhtYN81qglWqst/X4S29ctsGV48YLNdDK+aOOOCN9qBYSzELNZc9k5 af4uBRj5EnHHq2U9TW55vkfvenK8WtF/TnA0dsBXmat+vIMV7XasTBZ0kena1uhvOYOgyaZiD OEohob/61L5SaYR3kmXU9AUv4AeYNX+LlDrhSnj1aqkbMKUm2OUsBOaOagxo46WhELiDGyWed B0vdWLU7hlTvB+1QrQ4PbwT2JE1Ka4oJdzn6ab/7c5tUPk25SDCEM7njEMdv+PrXYQ3me5I+C u1m8zIqyzC7hFnKMSrZzC4Z3J/ucUuZycKv9JsjOyrNx933GElK6U0dyU1C5qqFBnH1UvLd8M 0b0roCq6LzOXbF8CE/GRypniGyWFcHbAAuMBseosGAr9rFPAi1TkpghcMAHdwFTHn+W7/+eyT 5UazjS/N3HmxUjToYXbD8HGgFvIoDbgp2A9yNqTQu8fap1hjRP82pdCf5G4HArL38VcV0weau 4APVfyjO+1IbmyFvnT7nL4KMbOewEuAxlLtmjC4r2o+PdnCyPWW+cbvyPci5i9fv//ydRevAE 3nxmnQ1TGIqqe3QjtCHsDd98s2Q= X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.8 at phobos.denx.de X-Virus-Status: Clean Dear Tom, The following changes since commit 38dedebc547f795efc3daad17f7c013c515e1285: Merge https://source.denx.de/u-boot/custodians/u-boot-riscv (2023-08-02 12:13:16 -0400) are available in the Git repository at: https://source.denx.de/u-boot/custodians/u-boot-efi.git tags/efi-2023-10-rc2-2 for you to fetch changes up to cd87d2c61ce8e8e963de514f2c8ab0f959d6b586: efi_loader: check uuid_str_to_bin return value (2023-08-03 09:21:03 +0200) Gitlab CI showed no issues: https://source.denx.de/u-boot/custodians/u-boot-efi/-/pipelines/17191 ---------------------------------------------------------------- Pull request efi-2023-10-rc2-2 Documentation: * Move README.falcon to HTML * Describe usage of QEMU virtio block device * Add SPDX license identifiers to svg images * Add more detail to the description of U-Boot boot phases UEFI: * Fix buffer overflows * Fix memory leak in efi_add_memory_map_pg * Properly check return values of calloc, uuid_str_to_bin, efi_parse_pkcs7_header ---------------------------------------------------------------- AKASHI Takahiro (1): efi_loader: capsule: enforce guid check in api and capsule_on_disk Bin Meng (1): dm: Correct DM_FLAG_ comment Dan Carpenter (2): efi_loader: Fix memory corruption on 32bit systems efi_loader: fix an IS_ERR() vs NULL check Heinrich Schuchardt (11): doc: U-Boot boot phases doc: move README.falcon to HTML doc: describe QEMU virtio block device efi_selftest: remove superfluous assignments efi_loader: out of memory in efi_add_memory_map_pg efi_loader: error handling in tcg2_hash_pe_image() efi_loader: overflow in efi_allocate_pages efi_loader: out of memory in efi_mem_carve_out efi_loader: memory leak efi_add_memory_map_pg efi_loader: error handling in efi_disk_add_dev efi_loader: catch out of memory in file_open Masahisa Kojima (1): efi_loader: check uuid_str_to_bin return value Nishanth Menon (1): doc: board: ti: Add SPDX License to svg images doc/README.falcon | 232 ---------------------- doc/board/emulation/blkdev.rst | 14 +- doc/board/ti/img/boot_diagram_am65.svg | 4 + doc/board/ti/img/boot_diagram_j721e.svg | 4 + doc/board/ti/img/boot_diagram_k3_current.svg | 4 + doc/board/ti/img/boot_flow_01.svg | 4 + doc/board/ti/img/boot_flow_02.svg | 4 + doc/board/ti/img/boot_flow_03.svg | 4 + doc/board/ti/img/dm_tispl.bin.svg | 4 + doc/board/ti/img/emmc_am65x_evm_boot0.svg | 4 + doc/board/ti/img/emmc_j7200_evm_boot01.svg | 4 + doc/board/ti/img/emmc_j7200_evm_udafs.svg | 4 + doc/board/ti/img/j7200_tiboot3.bin.svg | 4 + doc/board/ti/img/multi_cert_tiboot3.bin.svg | 4 + doc/board/ti/img/no_multi_cert_tiboot3.bin.svg | 4 + doc/board/ti/img/nodm_tispl.bin.svg | 4 + doc/board/ti/img/ospi_sysfw.svg | 4 + doc/board/ti/img/sysfw.itb.svg | 4 + doc/develop/falcon.rst | 258 +++++++++++++++++++++++++ doc/develop/index.rst | 1 + doc/develop/spl.rst | 13 +- include/dm/device.h | 2 +- include/efi_loader.h | 18 +- lib/efi_loader/efi_capsule.c | 20 +- lib/efi_loader/efi_disk.c | 15 +- lib/efi_loader/efi_file.c | 14 +- lib/efi_loader/efi_firmware.c | 8 +- lib/efi_loader/efi_image_loader.c | 5 +- lib/efi_loader/efi_memory.c | 17 +- lib/efi_loader/efi_tcg2.c | 6 +- lib/efi_selftest/efi_selftest_hii.c | 11 -- 31 files changed, 416 insertions(+), 282 deletions(-) delete mode 100644 doc/README.falcon create mode 100644 doc/develop/falcon.rst