Re: [PATCH 2/2] treewide: Use sysfs_bin_attr_simple_read() helper

2024-05-23 Thread Greg Kroah-Hartman
On Wed, May 22, 2024 at 07:51:35PM -0700, Guenter Roeck wrote: > Hi, > > On Sat, Apr 06, 2024 at 03:52:02PM +0200, Lukas Wunner wrote: > > Deduplicate ->read() callbacks of bin_attributes which are backed by a > > simple buffer in memory: > > > > Use the newly introduced

Re: [PATCH 0/2] Deduplicate bin_attribute simple read() callbacks

2024-04-11 Thread Greg Kroah-Hartman
On Sat, Apr 06, 2024 at 03:52:00PM +0200, Lukas Wunner wrote: > For my upcoming PCI device authentication v2 patches, I have the need > to expose a simple buffer in virtual memory as a bin_attribute. > > It turns out we've duplicated the ->read() callback for such simple > buffers a fair number

Re: [PATCH 1/2] sysfs: Add sysfs_bin_attr_simple_read() helper

2024-04-11 Thread Greg Kroah-Hartman
/file.c | 27 +++ > include/linux/sysfs.h | 15 +++++++ > 2 files changed, 42 insertions(+) Reviewed-by: Greg Kroah-Hartman

[PATCH 4.9 76/92] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified

2019-10-16 Thread Greg Kroah-Hartman
Gleixner Cc: linux-efi@vger.kernel.org Cc: linux-integr...@vger.kernel.org Fixes: 475fb4e8b2f4 ("efi / ACPI: load SSTDs from EFI variables") Link: https://lkml.kernel.org/r/20191002165904.8819-3-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --

[PATCH 4.14 43/65] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified

2019-10-16 Thread Greg Kroah-Hartman
Gleixner Cc: linux-efi@vger.kernel.org Cc: linux-integr...@vger.kernel.org Fixes: 475fb4e8b2f4 ("efi / ACPI: load SSTDs from EFI variables") Link: https://lkml.kernel.org/r/20191002165904.8819-3-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --

[PATCH 5.3 063/112] efi/tpm: Dont access event->count when it isnt mapped

2019-10-16 Thread Greg Kroah-Hartman
...@vger.kernel.org Fixes: 44038bc514a2 ("tpm: Abstract crypto agile event size calculations") Link: https://lkml.kernel.org/r/20191002165904.8819-4-ard.biesheu...@linaro.org [ Minor edits. ] Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- include/linux/tpm_eventlo

[PATCH 5.3 065/112] efi/tpm: Only set efi_tpm_final_log_size after successful event log parsing

2019-10-16 Thread Greg Kroah-Hartman
: c46f3405692de ("tpm: Reserve the TPM final events table") Link: https://lkml.kernel.org/r/20191002165904.8819-6-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- drivers/firmware/efi/tpm.c |9 - include/linux/tpm_eventlog.h |2 +

[PATCH 5.3 064/112] efi/tpm: Dont traverse an event log with no events

2019-10-16 Thread Greg Kroah-Hartman
: c46f3405692d ("tpm: Reserve the TPM final events table") Link: https://lkml.kernel.org/r/20191002165904.8819-5-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- drivers/firmware/efi/tpm.c | 15 ++- 1 file changed, 10 insertions(+), 5

[PATCH 5.3 062/112] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified

2019-10-16 Thread Greg Kroah-Hartman
Gleixner Cc: linux-efi@vger.kernel.org Cc: linux-integr...@vger.kernel.org Fixes: 475fb4e8b2f4 ("efi / ACPI: load SSTDs from EFI variables") Link: https://lkml.kernel.org/r/20191002165904.8819-3-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --

Re: [PATCH] sysfs: add BIN_ATTR_WO() macro

2019-10-01 Thread Greg Kroah-Hartman
On Tue, Oct 01, 2019 at 02:08:53PM -0400, Nayna wrote: > Hi Greg, > > > On 08/26/2019 11:01 AM, Greg Kroah-Hartman wrote: > > This variant was missing from sysfs.h, I guess no one noticed it before. > > > > Turns out the powerpc secure variable code can use

Re: [PATCH] sysfs: add BIN_ATTR_WO() macro

2019-09-04 Thread Greg Kroah-Hartman
On Tue, Sep 03, 2019 at 01:37:02PM +1000, Michael Ellerman wrote: > Greg Kroah-Hartman writes: > > This variant was missing from sysfs.h, I guess no one noticed it before. > > > > Turns out the powerpc secure variable code can use it, so add it to the > > tree for

Re: [PATCH v3 2/4] powerpc: expose secure variables to userspace via sysfs

2019-08-26 Thread Greg Kroah-Hartman
On Mon, Aug 26, 2019 at 11:46:11AM -0400, Nayna wrote: > > > On 08/26/2019 10:56 AM, Greg Kroah-Hartman wrote: > > On Mon, Aug 26, 2019 at 09:23:36AM -0400, Nayna Jain wrote: > > > +static struct kobj_attribute size_attr = __ATTR_RO(size); > > Wait, why not just nor

[PATCH] sysfs: add BIN_ATTR_WO() macro

2019-08-26 Thread Greg Kroah-Hartman
This variant was missing from sysfs.h, I guess no one noticed it before. Turns out the powerpc secure variable code can use it, so add it to the tree for it, and potentially others to take advantage of, instead of open-coding it. Reported-by: Nayna Jain Signed-off-by: Greg Kroah-Hartman

Re: [PATCH v3 2/4] powerpc: expose secure variables to userspace via sysfs

2019-08-26 Thread Greg Kroah-Hartman
On Mon, Aug 26, 2019 at 09:23:36AM -0400, Nayna Jain wrote: > +static struct kobj_attribute size_attr = __ATTR_RO(size); Wait, why not just normal ATTR_RO()? > +static struct bin_attribute data_attr = __BIN_ATTR_RO(data, > VARIABLE_MAX_SIZE); And BIN_ATTR_RO() here? Do those not work for you

Re: [PATCH v3 2/4] powerpc: expose secure variables to userspace via sysfs

2019-08-26 Thread Greg Kroah-Hartman
for you? That would make this more obvious, right? Other than that minor thing (not a complaint at all) looks much better to me, nice work: Reviewed-by: Greg Kroah-Hartman

Re: [PATCH v2 4/4] powerpc: load firmware trusted keys into kernel keyring

2019-08-21 Thread Greg Kroah-Hartman
On Wed, Aug 21, 2019 at 11:08:23AM -0400, Nayna Jain wrote: > The keys used to verify the Host OS kernel are managed by OPAL as secure > variables. This patch loads the verification keys into the .platform > keyring and revocation keys into .blacklist keyring. This enables > verification and

Re: [PATCH v2 3/4] x86/efi: move common keyring handler functions to new file

2019-08-21 Thread Greg Kroah-Hartman
On Wed, Aug 21, 2019 at 11:08:22AM -0400, Nayna Jain wrote: > This patch moves the common code to keyring_handler.c That says _what_ you are doing, but not _why_ you are doing it. We have no idea :(

Re: [PATCH v2 2/4] powerpc: expose secure variables to userspace via sysfs

2019-08-21 Thread Greg Kroah-Hartman
On Wed, Aug 21, 2019 at 11:08:21AM -0400, Nayna Jain wrote: > --- /dev/null > +++ b/Documentation/ABI/testing/sysfs-secvar > @@ -0,0 +1,27 @@ > +What:/sys/firmware/secvar > +Date:August 2019 > +Contact: Nayna Jain > +Description: > + This directory

Re: [PATCH 2/2] powerpc: expose secure variables via sysfs

2019-06-14 Thread Greg Kroah-Hartman
On Thu, Jun 13, 2019 at 04:50:27PM -0400, Nayna Jain wrote: > As part of PowerNV secure boot support, OS verification keys are stored > and controlled by OPAL as secure variables. These need to be exposed to > the userspace so that sysadmins can perform key management tasks. > > This patch adds

[PATCH 4.9 60/83] efi/libstub: Unify command line param parsing

2019-06-09 Thread Greg Kroah-Hartman
-by: Ard Biesheuvel Signed-off-by: Greg Kroah-Hartman --- drivers/firmware/efi/libstub/arm-stub.c| 23 +++ drivers/firmware/efi/libstub/arm64-stub.c |4 +--- drivers/firmware/efi/libstub/efi-stub-helper.c | 19 +++ drivers/firmware/efi

[PATCH 5.1 289/405] efifb: Omit memory map check on legacy boot

2019-05-29 Thread Greg Kroah-Hartman
[ Upstream commit c2999c281ea2d2ebbdfce96cecc7b52e2ae7c406 ] Since the following commit: 38ac0287b7f4 ("fbdev/efifb: Honour UEFI memory map attributes when mapping the FB") efifb_probe() checks its memory range via efi_mem_desc_lookup(), and this leads to a spurious error message:

[PATCH 5.0 260/346] efifb: Omit memory map check on legacy boot

2019-05-29 Thread Greg Kroah-Hartman
[ Upstream commit c2999c281ea2d2ebbdfce96cecc7b52e2ae7c406 ] Since the following commit: 38ac0287b7f4 ("fbdev/efifb: Honour UEFI memory map attributes when mapping the FB") efifb_probe() checks its memory range via efi_mem_desc_lookup(), and this leads to a spurious error message:

[PATCH 4.19 223/276] efifb: Omit memory map check on legacy boot

2019-05-29 Thread Greg Kroah-Hartman
[ Upstream commit c2999c281ea2d2ebbdfce96cecc7b52e2ae7c406 ] Since the following commit: 38ac0287b7f4 ("fbdev/efifb: Honour UEFI memory map attributes when mapping the FB") efifb_probe() checks its memory range via efi_mem_desc_lookup(), and this leads to a spurious error message:

[PATCH 4.19 061/114] fbdev/efifb: Ignore framebuffer memmap entries that lack any memory types

2019-05-23 Thread Greg Kroah-Hartman
y map attributes when ...") Link: http://lkml.kernel.org/r/20190516213159.3530-2-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- drivers/video/fbdev/efifb.c |8 ++-- 1 file changed, 6 insertions(+), 2 deletions(-) --- a/drivers/video/f

[PATCH 5.0 076/139] fbdev/efifb: Ignore framebuffer memmap entries that lack any memory types

2019-05-23 Thread Greg Kroah-Hartman
y map attributes when ...") Link: http://lkml.kernel.org/r/20190516213159.3530-2-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- drivers/video/fbdev/efifb.c |8 ++-- 1 file changed, 6 insertions(+), 2 deletions(-) --- a/drivers/video/f

[PATCH 5.1 085/122] fbdev/efifb: Ignore framebuffer memmap entries that lack any memory types

2019-05-23 Thread Greg Kroah-Hartman
y map attributes when ...") Link: http://lkml.kernel.org/r/20190516213159.3530-2-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- drivers/video/fbdev/efifb.c |8 ++-- 1 file changed, 6 insertions(+), 2 deletions(-) --- a/drivers/video/f

[PATCH 4.14 022/115] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 0082517fa4bce073e7cf542633439f26538a14cc ] Upon reboot, the Acer TravelMate X514-51T laptop appears to complete the shutdown process, but then it hangs in BIOS POST with a black screen. The problem is intermittent - at some points it has appeared related to Secure Boot settings

[PATCH 4.14 083/115] x86/fpu: Dont export __kernel_fpu_{begin,end}()

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 12209993e98c5fa1855c467f22a24e3d5b8be205 ] There is one user of __kernel_fpu_begin() and before invoking it, it invokes preempt_disable(). So it could invoke kernel_fpu_begin() right away. The 32bit version of arch_efi_call_virt_setup() and arch_efi_call_virt_teardown() does

[PATCH 4.19 037/113] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 0082517fa4bce073e7cf542633439f26538a14cc ] Upon reboot, the Acer TravelMate X514-51T laptop appears to complete the shutdown process, but then it hangs in BIOS POST with a black screen. The problem is intermittent - at some points it has appeared related to Secure Boot settings

[PATCH 5.0 049/137] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 0082517fa4bce073e7cf542633439f26538a14cc ] Upon reboot, the Acer TravelMate X514-51T laptop appears to complete the shutdown process, but then it hangs in BIOS POST with a black screen. The problem is intermittent - at some points it has appeared related to Secure Boot settings

[PATCH 4.9 16/51] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 0082517fa4bce073e7cf542633439f26538a14cc ] Upon reboot, the Acer TravelMate X514-51T laptop appears to complete the shutdown process, but then it hangs in BIOS POST with a black screen. The problem is intermittent - at some points it has appeared related to Secure Boot settings

[PATCH 4.19 083/100] x86/fpu: Dont export __kernel_fpu_{begin,end}()

2019-04-30 Thread Greg Kroah-Hartman
utronix.de Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/efi.h |6 ++ arch/x86/include/asm/fpu/api.h | 15 +-- arch/x86/kernel/fpu/core.c |6 ++ 3 files changed, 9 insertions(+), 18 deletions(-) --- a/arch/x86/include/asm/efi.h +++ b/arch/x86/in

[PATCH 4.9 67/91] efi/memattr: Dont bail on zero VA if it equals the regions PA

2019-04-04 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 5de0fef0230f3c8d75cff450a71740a7bf2db866 ] The EFI memory attributes code cross-references the EFI memory map with the more granular EFI memory attributes table to ensure that they

[PATCH 4.14 087/121] efi/memattr: Dont bail on zero VA if it equals the regions PA

2019-04-04 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 5de0fef0230f3c8d75cff450a71740a7bf2db866 ] The EFI memory attributes code cross-references the EFI memory map with the more granular EFI memory attributes table to ensure that they

[PATCH 4.14 089/121] efi/arm/arm64: Allow SetVirtualAddressMap() to be omitted

2019-04-04 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 4e46c2a956215482418d7b315749fb1b6c6bc224 ] The UEFI spec revision 2.7 errata A section 8.4 has the following to say about the virtual memory runtime services: "This section

[PATCH 4.19 137/187] efi/arm/arm64: Allow SetVirtualAddressMap() to be omitted

2019-04-04 Thread Greg Kroah-Hartman
4.19-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 4e46c2a956215482418d7b315749fb1b6c6bc224 ] The UEFI spec revision 2.7 errata A section 8.4 has the following to say about the virtual memory runtime services: "This section

[PATCH 5.0 126/246] efi: Fix build error due to enum collision between efi.h and ima.h

2019-04-04 Thread Greg Kroah-Hartman
5.0-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 5c418dc789a3898717ebf2caa5716ba91a7150b2 ] The following commit: a893ea15d764 ("tpm: move tpm_chip definition to include/linux/tpm.h") introduced a build error when both IMA and

[PATCH 5.0 175/246] efi/memattr: Dont bail on zero VA if it equals the regions PA

2019-04-04 Thread Greg Kroah-Hartman
5.0-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 5de0fef0230f3c8d75cff450a71740a7bf2db866 ] The EFI memory attributes code cross-references the EFI memory map with the more granular EFI memory attributes table to ensure that they

[PATCH 5.0 180/246] efi/arm/arm64: Allow SetVirtualAddressMap() to be omitted

2019-04-04 Thread Greg Kroah-Hartman
5.0-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 4e46c2a956215482418d7b315749fb1b6c6bc224 ] The UEFI spec revision 2.7 errata A section 8.4 has the following to say about the virtual memory runtime services: "This section

[PATCH 4.19 133/187] efi/memattr: Dont bail on zero VA if it equals the regions PA

2019-04-04 Thread Greg Kroah-Hartman
4.19-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 5de0fef0230f3c8d75cff450a71740a7bf2db866 ] The EFI memory attributes code cross-references the EFI memory map with the more granular EFI memory attributes table to ensure that they

[PATCH 4.20 22/32] arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table

2019-02-21 Thread Greg Kroah-Hartman
4.20-stable review patch. If anyone has any objections, please let me know. -- Commit 8a5b403d71affa098009cc3dff1b2c45113021ad upstream. In the irqchip and EFI code, we have what basically amounts to a quirk to work around a peculiarity in the GICv3 architecture, which permits

[PATCH 4.20 23/32] efi/arm: Revert "Defer persistent reservations until after paging_init()"

2019-02-21 Thread Greg Kroah-Hartman
4.20-stable review patch. If anyone has any objections, please let me know. -- Commit 582a32e708823e5957fd73ccd78dc4a9e49d21ea upstream. This reverts commit eff896288872d687d9662000ec9ae11b6d61766f, which deferred the processing of persistent memory reservations to a point

[PATCH 4.20 78/92] x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls

2019-02-18 Thread Greg Kroah-Hartman
Cc: Ingo Molnar Cc: linux-efi Cc: platform-driver-...@vger.kernel.org Cc: sta...@vger.kernel.org # v4.9+ Cc: Steve Wahl Cc: Thomas Gleixner Cc: x86-ml Link: https://lkml.kernel.org/r/20190213193413.25560-5-hedi.berri...@hpe.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm

[PATCH 4.19 74/85] x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls

2019-02-18 Thread Greg Kroah-Hartman
Cc: Ingo Molnar Cc: linux-efi Cc: platform-driver-...@vger.kernel.org Cc: sta...@vger.kernel.org # v4.9+ Cc: Steve Wahl Cc: Thomas Gleixner Cc: x86-ml Link: https://lkml.kernel.org/r/20190213193413.25560-5-hedi.berri...@hpe.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm

[PATCH 4.14 53/62] x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls

2019-02-18 Thread Greg Kroah-Hartman
Cc: Ingo Molnar Cc: linux-efi Cc: platform-driver-...@vger.kernel.org Cc: sta...@vger.kernel.org # v4.9+ Cc: Steve Wahl Cc: Thomas Gleixner Cc: x86-ml Link: https://lkml.kernel.org/r/20190213193413.25560-5-hedi.berri...@hpe.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm

[PATCH 4.9 47/58] x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls

2019-02-18 Thread Greg Kroah-Hartman
Cc: Ingo Molnar Cc: linux-efi Cc: platform-driver-...@vger.kernel.org Cc: sta...@vger.kernel.org # v4.9+ Cc: Steve Wahl Cc: Thomas Gleixner Cc: x86-ml Link: https://lkml.kernel.org/r/20190213193413.25560-5-hedi.berri...@hpe.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm

[PATCH 4.4 135/143] x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls

2019-02-18 Thread Greg Kroah-Hartman
Cc: Ingo Molnar Cc: linux-efi Cc: platform-driver-...@vger.kernel.org Cc: sta...@vger.kernel.org # v4.9+ Cc: Steve Wahl Cc: Thomas Gleixner Cc: x86-ml Link: https://lkml.kernel.org/r/20190213193413.25560-5-hedi.berri...@hpe.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm

[PATCH 4.20 095/352] firmware/efi: Add NULL pointer checks in efivars API functions

2019-02-11 Thread Greg Kroah-Hartman
4.20-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit ab2180a15ce54739fed381efb4cb12e78dfb1561 ] Since commit: ce2e6db554fa ("brcmfmac: Add support for getting nvram contents from EFI variables") we have a device driver accessing

[PATCH 4.19 082/313] firmware/efi: Add NULL pointer checks in efivars API functions

2019-02-11 Thread Greg Kroah-Hartman
4.19-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit ab2180a15ce54739fed381efb4cb12e78dfb1561 ] Since commit: ce2e6db554fa ("brcmfmac: Add support for getting nvram contents from EFI variables") we have a device driver accessing

[PATCH 4.14 054/205] firmware/efi: Add NULL pointer checks in efivars API functions

2019-02-11 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit ab2180a15ce54739fed381efb4cb12e78dfb1561 ] Since commit: ce2e6db554fa ("brcmfmac: Add support for getting nvram contents from EFI variables") we have a device driver accessing

[PATCH 4.9 031/137] firmware/efi: Add NULL pointer checks in efivars API functions

2019-02-11 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit ab2180a15ce54739fed381efb4cb12e78dfb1561 ] Since commit: ce2e6db554fa ("brcmfmac: Add support for getting nvram contents from EFI variables") we have a device driver accessing

[PATCH 4.19 038/106] efi/libstub: Disable some warnings for x86{,_64}

2019-01-24 Thread Greg Kroah-Hartman
4.19-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 3db5e0ba8b8f4aee631d7ee04b7a11c56cfdc213 ] When building the kernel with Clang, some disabled warnings appear because this Makefile overrides KBUILD_CFLAGS for x86{,_64}. Add them

[PATCH 4.20 050/127] efi/libstub: Disable some warnings for x86{,_64}

2019-01-24 Thread Greg Kroah-Hartman
4.20-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 3db5e0ba8b8f4aee631d7ee04b7a11c56cfdc213 ] When building the kernel with Clang, some disabled warnings appear because this Makefile overrides KBUILD_CFLAGS for x86{,_64}. Add them

[PATCH 3.18 14/31] x86/earlyprintk/efi: Fix infinite loop on some screen widths

2018-12-20 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 79c2206d369b87b19ac29cb47601059b6bf5c291 ] An affected screen resolution is 1366 x 768, which width is not divisible by 8, the default font width. On such screens, when longer lines

[PATCH 4.4 21/40] x86/earlyprintk/efi: Fix infinite loop on some screen widths

2018-12-20 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 79c2206d369b87b19ac29cb47601059b6bf5c291 ] An affected screen resolution is 1366 x 768, which width is not divisible by 8, the default font width. On such screens, when longer lines

[PATCH 4.9 34/61] x86/earlyprintk/efi: Fix infinite loop on some screen widths

2018-12-20 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 79c2206d369b87b19ac29cb47601059b6bf5c291 ] An affected screen resolution is 1366 x 768, which width is not divisible by 8, the default font width. On such screens, when longer lines

[PATCH 4.14 40/72] x86/earlyprintk/efi: Fix infinite loop on some screen widths

2018-12-20 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 79c2206d369b87b19ac29cb47601059b6bf5c291 ] An affected screen resolution is 1366 x 768, which width is not divisible by 8, the default font width. On such screens, when longer lines

[PATCH 4.19 13/67] x86/earlyprintk/efi: Fix infinite loop on some screen widths

2018-12-20 Thread Greg Kroah-Hartman
4.19-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 79c2206d369b87b19ac29cb47601059b6bf5c291 ] An affected screen resolution is 1366 x 768, which width is not divisible by 8, the default font width. On such screens, when longer lines

[PATCH 4.19 104/118] x86/efi: Allocate e820 buffer before calling efi_exit_boot_service

2018-12-11 Thread Greg Kroah-Hartman
Nathan Chancellor Cc: Peter Zijlstra Cc: Sai Praneeth Prakhya Cc: Sedat Dilek Cc: Thomas Gleixner Cc: YiFei Zhu Cc: linux-efi@vger.kernel.org Link: http://lkml.kernel.org/r/20181129171230.18699-2-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- a

[PATCH 4.9 49/50] efi/libstub: Make file I/O chunking x86-specific

2018-12-04 Thread Greg Kroah-Hartman
-by: Greg Kroah-Hartman --- drivers/firmware/efi/libstub/efi-stub-helper.c | 11 ++- 1 file changed, 10 insertions(+), 1 deletion(-) --- a/drivers/firmware/efi/libstub/efi-stub-helper.c +++ b/drivers/firmware/efi/libstub/efi-stub-helper.c @@ -356,6 +356,14 @@ efi_status_t efi_parse_options

Re: [PATCH 4.9 39/92] efi/arm: Revert deferred unmap of early memmap mapping

2018-11-29 Thread Greg Kroah-Hartman
On Thu, Nov 29, 2018 at 03:28:44PM +0100, Ard Biesheuvel wrote: > On Thu, 29 Nov 2018 at 15:21, Greg Kroah-Hartman > wrote: > > > > 4.9-stable review patch. If anyone has any objections, please let me know. > > > > --

[PATCH 4.9 39/92] efi/arm: Revert deferred unmap of early memmap mapping

2018-11-29 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 33412b8673135b18ea42beb7f5117ed0091798b6 ] Commit: 3ea86495aef2 ("efi/arm: preserve early mapping of UEFI memory map longer for BGRT") deferred the unmap of the early mapping of

[PATCH 4.14 061/100] efi/arm: Revert deferred unmap of early memmap mapping

2018-11-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 33412b8673135b18ea42beb7f5117ed0091798b6 ] Commit: 3ea86495aef2 ("efi/arm: preserve early mapping of UEFI memory map longer for BGRT") deferred the unmap of the early mapping

[PATCH 4.19 094/110] efi/arm: Revert deferred unmap of early memmap mapping

2018-11-29 Thread Greg Kroah-Hartman
4.19-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 33412b8673135b18ea42beb7f5117ed0091798b6 ] Commit: 3ea86495aef2 ("efi/arm: preserve early mapping of UEFI memory map longer for BGRT") deferred the unmap of the early mapping

[PATCH 4.4 19/70] efi/libstub/arm64: Set -fpie when building the EFI stub

2018-11-26 Thread Greg Kroah-Hartman
/20170818194947.19347-5-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Nathan Chancellor Signed-off-by: Greg Kroah-Hartman --- drivers/firmware/efi/libstub/Makefile |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/firmware/efi/libstub/Makefile +++ b/drivers

[PATCH 4.4 18/70] efi/libstub/arm64: Force hidden visibility for section markers

2018-11-26 Thread Greg Kroah-Hartman
...@linaro.org Signed-off-by: Ingo Molnar [nc: Fix conflict due to lack of commit 42b55734030c1 in linux-4.4.y] Signed-off-by: Nathan Chancellor Signed-off-by: Greg Kroah-Hartman --- drivers/firmware/efi/libstub/arm64-stub.c | 10 +- 1 file changed, 9 insertions(+), 1 deletion

[PATCH 4.9 29/59] efi/libstub/arm64: Force hidden visibility for section markers

2018-11-21 Thread Greg Kroah-Hartman
...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Nick Desaulniers Signed-off-by: Greg Kroah-Hartman --- drivers/firmware/efi/libstub/arm64-stub.c | 10 +- 1 file changed, 9 insertions(+), 1 deletion(-) --- a/drivers/firmware/efi/libstub/arm64-stub.c +++ b/drivers/firmware/efi

[PATCH 4.9 28/59] efi/libstub/arm64: Use hidden attribute for struct screen_info reference

2018-11-21 Thread Greg Kroah-Hartman
-off-by: Ingo Molnar Signed-off-by: Nick Desaulniers Signed-off-by: Greg Kroah-Hartman --- arch/arm64/include/asm/efi.h |3 +++ 1 file changed, 3 insertions(+) --- a/arch/arm64/include/asm/efi.h +++ b/arch/arm64/include/asm/efi.h @@ -54,6 +54,9 @@ int efi_set_mapping_permissions(struct m

[PATCH 4.9 31/59] efi/libstub/arm64: Set -fpie when building the EFI stub

2018-11-21 Thread Greg Kroah-Hartman
/20170818194947.19347-5-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Nick Desaulniers Signed-off-by: Greg Kroah-Hartman --- drivers/firmware/efi/libstub/Makefile |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/firmware/efi/libstub/Makefile +++ b/drivers

[PATCH 4.9 30/59] efi/libstub: Preserve .debug sections after absolute relocation check

2018-11-21 Thread Greg Kroah-Hartman
-by: Greg Kroah-Hartman --- drivers/firmware/efi/libstub/Makefile | 24 1 file changed, 16 insertions(+), 8 deletions(-) --- a/drivers/firmware/efi/libstub/Makefile +++ b/drivers/firmware/efi/libstub/Makefile @@ -11,7 +11,7 @@ cflags-$(CONFIG_X86) += -m$(BITS

[PATCH 4.19 170/205] efi/arm/libstub: Pack FDT after populating it

2018-11-19 Thread Greg Kroah-Hartman
b: Round up FDT allocation to mapping size") Link: http://lkml.kernel.org/r/20181114175544.12860-4-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- drivers/firmware/efi/libstub/fdt.c |4 1 file changed, 4 insertions(+) --- a/drivers/firmware/efi

[PATCH 4.18 143/171] efi/arm/libstub: Pack FDT after populating it

2018-11-19 Thread Greg Kroah-Hartman
b: Round up FDT allocation to mapping size") Link: http://lkml.kernel.org/r/20181114175544.12860-4-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- drivers/firmware/efi/libstub/fdt.c |4 1 file changed, 4 insertions(+) --- a/drivers/firmware/efi

[PATCH 4.14 106/124] efi/arm/libstub: Pack FDT after populating it

2018-11-19 Thread Greg Kroah-Hartman
b: Round up FDT allocation to mapping size") Link: http://lkml.kernel.org/r/20181114175544.12860-4-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- drivers/firmware/efi/libstub/fdt.c |4 1 file changed, 4 insertions(+) --- a/drivers/firmware/efi

[PATCH 4.9 079/111] efi/esrt: Only call efi_mem_reserve() for boot services memory

2018-09-24 Thread Greg Kroah-Hartman
em_reserve() conditional on the memory type. Signed-off-by: Ard Biesheuvel Cc: Linus Torvalds Cc: Peter Jones Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: linux-efi@vger.kernel.org Cc: linux-ker...@vger.kernel.org Signed-off-by: Ingo Molnar Signed-off-by: Sasha Levin Signed-off-by: Greg Kro

[PATCH 4.18 167/235] efi/esrt: Only call efi_mem_reserve() for boot services memory

2018-09-24 Thread Greg Kroah-Hartman
em_reserve() conditional on the memory type. Signed-off-by: Ard Biesheuvel Cc: Linus Torvalds Cc: Peter Jones Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: linux-efi@vger.kernel.org Cc: linux-ker...@vger.kernel.org Signed-off-by: Ingo Molnar Signed-off-by: Sasha Levin Signed-off-by: Greg Kro

[PATCH 4.14 122/173] efi/esrt: Only call efi_mem_reserve() for boot services memory

2018-09-24 Thread Greg Kroah-Hartman
em_reserve() conditional on the memory type. Signed-off-by: Ard Biesheuvel Cc: Linus Torvalds Cc: Peter Jones Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: linux-efi@vger.kernel.org Cc: linux-ker...@vger.kernel.org Signed-off-by: Ingo Molnar Signed-off-by: Sasha Levin Signed-off-by: Greg Kro

Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"

2018-08-31 Thread Greg Kroah-Hartman
On Fri, Aug 31, 2018 at 07:24:08AM +0100, Guillaume Tucker wrote: > On 24/08/18 21:32, Guenter Roeck wrote: > > On Fri, Aug 24, 2018 at 01:16:18PM -0700, Roland Dreier wrote: > >>> Sounds great. I'll hold off with sending my RFT series and wait for your > >>> test results. I think we'll also need

Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"

2018-08-25 Thread Greg Kroah-Hartman
On Sat, Aug 25, 2018 at 06:52:32AM -0700, Guenter Roeck wrote: > Hi Roland, > > On 08/24/2018 01:04 PM, Roland Dreier wrote: > > > Ok, so what patch should be reverted? I'm seeing other reports of > > > problems all around this same area, but I can't figure out exactly what > > > to do. > > > >

Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"

2018-08-24 Thread Greg Kroah-Hartman
On Fri, Aug 24, 2018 at 10:08:28AM -0700, Roland Dreier wrote: > > See > > . > > Thanks! I'm not using SGI UV and I'm not using kexec, so I guess I > sidestepped most of those issues. Greg, I think we need to unrevert

Re: [PATCH 4.4 103/105] Revert "x86/mm/pat: Ensure cpa->pfn only contains page frame numbers"

2018-08-23 Thread Greg Kroah-Hartman
On Wed, Aug 22, 2018 at 05:48:32PM -0700, Roland Dreier wrote: > On Fri, Dec 15, 2017 at 2:20 AM Greg Kroah-Hartman > wrote: > > This reverts commit 87e2bd898d3a79a8c609f183180adac47879a2a4 which is > > commit edc3b9129cecd0f0857112136f5b8b1bc1d45918 upstream. > > >

[PATCH 4.17 17/31] x86/efi: Access EFI MMIO data as unencrypted when SEV is active

2018-08-04 Thread Greg Kroah-Hartman
180720012846.23560-2-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/platform/efi/efi_64.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/arch/x86/platform/efi/efi_64.c +++ b/arch/x86/platform/efi/efi_64.c @@ -417,7 +417,7 @

[PATCH 4.4 018/107] x86/paravirt: Make native_save_fl() extern inline

2018-07-23 Thread Greg Kroah-Hartman
: virtualizat...@lists.linux-foundation.org Cc: will.dea...@arm.com Cc: yamada.masah...@socionext.com Link: http://lkml.kernel.org/r/20180621162324.36656-4-ndesaulni...@google.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/irqflags.h |2 +- ar

[PATCH 4.4 05/31] x86/asm: Add _ASM_ARG* constants for argument registers to

2018-07-20 Thread Greg Kroah-Hartman
-foundation.org Cc: will.dea...@arm.com Cc: yamada.masah...@socionext.com Link: http://lkml.kernel.org/r/20180621162324.36656-3-ndesaulni...@google.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/asm.h | 59 + 1

[PATCH 4.9 05/66] compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations

2018-07-20 Thread Greg Kroah-Hartman
Kroah-Hartman --- include/linux/compiler-gcc.h | 29 ++--- 1 file changed, 22 insertions(+), 7 deletions(-) --- a/include/linux/compiler-gcc.h +++ b/include/linux/compiler-gcc.h @@ -65,25 +65,40 @@ #endif /* + * Feature detection for gnu_inline (gnu89 extern inline

[PATCH 4.9 06/66] x86/asm: Add _ASM_ARG* constants for argument registers to

2018-07-20 Thread Greg Kroah-Hartman
-foundation.org Cc: will.dea...@arm.com Cc: yamada.masah...@socionext.com Link: http://lkml.kernel.org/r/20180621162324.36656-3-ndesaulni...@google.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/asm.h | 59 + 1

[PATCH 4.14 01/92] compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations

2018-07-20 Thread Greg Kroah-Hartman
Kroah-Hartman --- include/linux/compiler-gcc.h | 29 ++--- 1 file changed, 22 insertions(+), 7 deletions(-) --- a/include/linux/compiler-gcc.h +++ b/include/linux/compiler-gcc.h @@ -66,25 +66,40 @@ #endif /* + * Feature detection for gnu_inline (gnu89 extern inline

[PATCH 4.14 03/92] x86/paravirt: Make native_save_fl() extern inline

2018-07-20 Thread Greg Kroah-Hartman
nda...@amd.com Cc: tw...@google.com Cc: virtualizat...@lists.linux-foundation.org Cc: will.dea...@arm.com Cc: yamada.masah...@socionext.com Link: http://lkml.kernel.org/r/20180621162324.36656-4-ndesaulni...@google.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/incl

[PATCH 4.17 002/101] x86/asm: Add _ASM_ARG* constants for argument registers to

2018-07-20 Thread Greg Kroah-Hartman
-foundation.org Cc: will.dea...@arm.com Cc: yamada.masah...@socionext.com Link: http://lkml.kernel.org/r/20180621162324.36656-3-ndesaulni...@google.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/asm.h | 59 + 1

[PATCH 4.17 003/101] x86/paravirt: Make native_save_fl() extern inline

2018-07-20 Thread Greg Kroah-Hartman
nda...@amd.com Cc: tw...@google.com Cc: virtualizat...@lists.linux-foundation.org Cc: will.dea...@arm.com Cc: yamada.masah...@socionext.com Link: http://lkml.kernel.org/r/20180621162324.36656-4-ndesaulni...@google.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/incl

[PATCH 4.17 001/101] compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations

2018-07-20 Thread Greg Kroah-Hartman
Kroah-Hartman --- include/linux/compiler-gcc.h | 29 ++--- 1 file changed, 22 insertions(+), 7 deletions(-) --- a/include/linux/compiler-gcc.h +++ b/include/linux/compiler-gcc.h @@ -66,25 +66,40 @@ #endif /* + * Feature detection for gnu_inline (gnu89 extern inline

[PATCH 4.14 02/92] x86/asm: Add _ASM_ARG* constants for argument registers to

2018-07-20 Thread Greg Kroah-Hartman
-foundation.org Cc: will.dea...@arm.com Cc: yamada.masah...@socionext.com Link: http://lkml.kernel.org/r/20180621162324.36656-3-ndesaulni...@google.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/asm.h | 59 + 1

[PATCH 4.9 07/66] x86/paravirt: Make native_save_fl() extern inline

2018-07-20 Thread Greg Kroah-Hartman
nda...@amd.com Cc: tw...@google.com Cc: virtualizat...@lists.linux-foundation.org Cc: will.dea...@arm.com Cc: yamada.masah...@socionext.com Link: http://lkml.kernel.org/r/20180621162324.36656-4-ndesaulni...@google.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/

[PATCH 4.4 04/31] compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations

2018-07-20 Thread Greg Kroah-Hartman
Kroah-Hartman --- include/linux/compiler-gcc.h | 29 ++--- 1 file changed, 22 insertions(+), 7 deletions(-) --- a/include/linux/compiler-gcc.h +++ b/include/linux/compiler-gcc.h @@ -65,25 +65,40 @@ #endif /* + * Feature detection for gnu_inline (gnu89 extern inline

[PATCH 4.17 083/220] efi/libstub/tpm: Initialize efi_physical_addr_t vars to zero for mixed mode

2018-07-01 Thread Greg Kroah-Hartman
: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- drivers/firmware/efi/libstub/tpm.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/firmware/efi/libstub/tpm.c +++ b/drivers/firmware/efi/libstub/tpm.c @@ -64,7 +64,7 @@ void efi_retrieve_tpm2_eventlog_1_2(efi_

[PATCH 4.16 274/279] efi/libstub/arm64: Handle randomized TEXT_OFFSET

2018-06-18 Thread Greg Kroah-Hartman
Cc: linux-efi@vger.kernel.org Fixes: 6f26b3671184c36d ("arm64: kaslr: increase randomization granularity") Link: http://lkml.kernel.org/r/20180518140841.9731-2-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- driver

[PATCH 4.14 345/496] x86/mm: Fix bogus warning during EFI bootup, use boot_cpu_has() instead of this_cpu_has() in build_cr3_noflush()

2018-05-28 Thread Greg Kroah-Hartman
lkml.kernel.org/r/1522870459-7432-1-git-send-email-sai.praneeth.prak...@intel.com Signed-off-by: Ingo Molnar <mi...@kernel.org> Signed-off-by: Sasha Levin <alexander.le...@microsoft.com> Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org> --- arch/x86/include/asm/tlbfl

[PATCH 4.14 431/496] efi/arm*: Only register page tables when they exist

2018-05-28 Thread Greg Kroah-Hartman
tronix.de> Cc: linux-efi@vger.kernel.org Link: http://lkml.kernel.org/r/20180308080020.22828-2-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar <mi...@kernel.org> Signed-off-by: Sasha Levin <alexander.le...@microsoft.com> Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.or

[PATCH 4.16 078/272] x86/mm: Fix bogus warning during EFI bootup, use boot_cpu_has() instead of this_cpu_has() in build_cr3_noflush()

2018-05-28 Thread Greg Kroah-Hartman
lkml.kernel.org/r/1522870459-7432-1-git-send-email-sai.praneeth.prak...@intel.com Signed-off-by: Ingo Molnar <mi...@kernel.org> Signed-off-by: Sasha Levin <alexander.le...@microsoft.com> Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org> --- arch/x86/include/asm/tlbfl

[PATCH 4.16 191/272] efi/arm*: Only register page tables when they exist

2018-05-28 Thread Greg Kroah-Hartman
tronix.de> Cc: linux-efi@vger.kernel.org Link: http://lkml.kernel.org/r/20180308080020.22828-2-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar <mi...@kernel.org> Signed-off-by: Sasha Levin <alexander.le...@microsoft.com> Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.or

[PATCH 3.18 34/45] efi: Avoid potential crashes, fix the struct efi_pci_io_protocol_32 definition for mixed mode

2018-05-24 Thread Greg Kroah-Hartman
.@infradead.org> Cc: Thomas Gleixner <t...@linutronix.de> Cc: linux-efi@vger.kernel.org Link: http://lkml.kernel.org/r/20180504060003.19618-13-ard.biesheu...@linaro.org Signed-off-by: Ingo Molnar <mi...@kernel.org> Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org>

  1   2   >