Re: [PATCH] efivarfs: fix abnormal GUID in variable name by using strcpy to replace null with dash

2013-03-18 Thread Matt Fleming
is my patch for reference, but I think your original patch > is better for backward compatible on variable name. > > Please consider to merge your original patch! OK, this is what I've got queued up (note I removed the warning). --- >From afa9ae7bf47145d661487f88f2ec67b062ca98bc

Re: [PATCH] x86/efi: pull NV+BS variables out before we exit boot services

2013-03-20 Thread Matt Fleming
t; + *data_size = bvs->size; > + return EFI_BUFFER_TOO_SMALL; > + } > + *data_size = bvs->size; > + memcpy(data, bvs->data, bvs->size); > + > + return EFI_SUCCESS; > + } > +

[GIT PULL] EFI changes for v3.9-rc3

2013-03-21 Thread Matt Fleming
uirky implementations of GetNextVariableName() which resulted in machines hanging and sysfs files being created with garbage names. Matt Fleming (2): efivars: explicitly calculate length of VariableName efivars: H

Re: [PATCH] ia64/mm: fix a bad_page bug when crash kernel booting

2013-02-04 Thread Matt Fleming
On Tue, 2013-01-29 at 11:52 +0800, Xishi Qiu wrote: > On ia64 platform, I set "crashkernel=1024M-:600M", and dmesg shows 128M-728M > memory is reserved for crash kernel. Then "echo c > /proc/sysrq-trigger" to > test kdump. > > When crash kernel booting, efi_init() will aligns the memory address in

Re: [ 105/128] efi: Make efi_enabled a function to query EFI facilities

2013-02-04 Thread Matt Fleming
On Sun, 2013-02-03 at 16:15 +0100, Ben Hutchings wrote: > As you can see this needed quite a lot of work to backport, and I > haven't been able to test it yet. So I would particularly appreciate > careful review of this. Everything looks fine to me but I haven't actually booted with these changes

Re: [PATCH 1/3 v3] selftests: Add tests for efivarfs

2013-02-08 Thread Matt Fleming
On Fri, 2013-02-08 at 18:05 +0800, Jeremy Kerr wrote: > However, the tests expose a bug at the moment, so run_tests will fail. > Matt will have that fixed soon though :) In which case, would it make more sense for me to take these tests through the efi tree? I'm fine either way, I'm just looking

Re: [PATCH v5 -next 0/2] make efivars/efi_pstore interrupt-safe

2013-02-08 Thread Matt Fleming
On Fri, 2013-02-08 at 22:31 +, Seiji Aguchi wrote: > Matt, > > Can you please take a look at this patchset which removes > create_sysfs_entries() from efi_pstore_write()? > > It has been updated in accordance with Mike's comment and fixes an > actual bug. > http://comments.gmane.org/gmane.lin

Re: [PATCH v5 -next 1/2]efivars: Disable external interrupt while holding efivars->lock

2013-02-09 Thread Matt Fleming
t; > Signed-off-by: Seiji Aguchi > Acked-by: Mike Waychison > --- > drivers/firmware/efivars.c | 86 ++- > 1 files changed, 44 insertions(+), 42 deletions(-) Acked-by: Matt Fleming Tony, are you picking this up? -- Matt Fleming, Intel Open Sourc

Re: [PATCH v5 -next 2/2]efi_pstore: Introducing workqueue updating sysfs entries

2013-02-09 Thread Matt Fleming
nterrupt context with > this patch. > > Signed-off-by: Seiji Aguchi > --- > drivers/firmware/efivars.c | 85 > +--- > include/linux/efi.h | 3 +- > 2 files changed, 82 insertions(+), 6 deletions(-) Acked-by: Matt Flemin

Re: Patch "efi: Build EFI stub with EFI-appropriate options" has been added to the 3.6-stable tree

2013-04-03 Thread Matt Fleming
commit 9dead5bbb825 ("efi: Build EFI stub with EFI-appropriate options") contains a typo which means that the efi_stub_$(BITS).o code is still not compiled with -fshort-wchar and -mno-red-zone. Fix it with s/KBUILD_CLFAGS/KBUILD_CFLAGS/ -- Matt Fleming, Intel Open Source Tec

Re: [PATCH 1/2] efi: Determine how much space is used by boot services-only variables

2013-04-03 Thread Matt Fleming
ot via the EFI boot stub? That seems likely to upset some people. Introducing new features via the EFI boot stub is fine, and working around firmware bugs so that we can use some feature is also cool, but we can't start fixing regressions from other subsystems in the EFI boot stub. -- Matt Fleming,

Re: [PATCH 2/2] efi: Distinguish between "remaining space" and actually used space

2013-04-03 Thread Matt Fleming
seen, there are various schemes out there. This looks like something that will differ between implementations, and the fact that it's appearing in our code is a sure sign that this isn't the way to go. -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this

Re: [PATCH 2/2] efi: Distinguish between "remaining space" and actually used space

2013-04-03 Thread Matt Fleming
On 03/04/13 14:48, Matthew Garrett wrote: > On Wed, 2013-04-03 at 14:11 +0100, Matt Fleming wrote: > >> This looks like something that will differ between implementations, and the >> fact that it's appearing in our code is a sure sign that this isn't the way >>

[PATCH 1/6] efi: move utf16 string functions to efi.h

2013-04-04 Thread Matt Fleming
From: Matt Fleming There are currently two implementations of the utf16 string functions. Somewhat confusingly, they've got different names. Centralise the functions in efi.h. Cc: Tom Gundersen Cc: Mike Waychison Signed-off-by: Matt Fleming --- drivers/firmware/efivars.c |

[PATCH 2/6] efivars: Keep a private global pointer to efivars

2013-04-04 Thread Matt Fleming
From: Matt Fleming Some machines have an EFI variable interface that does not conform to the UEFI specification, e.g. CONFIG_GOOGLE_SMI. Add the necessary code and Kconfig glue so that it's only possible to select one implementation of EFI variable operations. This allows us to keep a s

[PATCH 0/6] Chainsaw efivars.c

2013-04-04 Thread Matt Fleming
From: Matt Fleming drivers/firmware/efivars.c has grown pretty large and is ~2K lines. Inside efivars.c there's currently, o code for handling EFI variables at the firmware-level o sysfs code for exposing EFI variables o a new EFI variable filesystem o a persistent storage backend

[PATCH 5/6] efivarfs: Move to fs/efivarfs

2013-04-04 Thread Matt Fleming
From: Matt Fleming Now that efivarfs uses the efivar API, move it out of efivars.c and into fs/efivarfs where it belongs. This move will eventually allow us to enable the efivarfs code without having to also enable CONFIG_EFI_VARS built, and vice versa. Furthermore, things like, mount -t

[PATCH 4/6] efivars: Move pstore code into the new EFI directory

2013-04-04 Thread Matt Fleming
From: Matt Fleming efivars.c has grown far too large and needs to be divided up. Create a new directory and move the persistence storage code to efi-pstore.c now that it uses the new efivar API. This helps us to greatly reduce the size of efivars.c and paves the way for moving other code out of

Re: [PATCH 1/2] efivars: Check max_size only if it is non-zero.

2013-04-05 Thread Matt Fleming
On 04/04/13 17:12, Richard Weinberger wrote: > Fair point. I'll add such a printk() to my patch and resend. Also take a look at FW_BUG. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vg

Re: [PATCH] x86, efi: remove attribute check from setup_efi_pci

2013-01-29 Thread Matt Fleming
On Tue, 2013-01-29 at 17:52 +0100, Maarten Lankhorst wrote: > It looks like the original commit that copied the rom contents from efi > always copied > the rom, and the fixup in setup_efi_pci from commit 886d751a2ea99a160 > ("x86, efi: correct precedence of operators in setup_efi_pci") broke that.

Re: [GIT PULL] EFI fixes for v3.8

2013-01-29 Thread Matt Fleming
x86, efi: fix 32-bit warnings in setup_efi_pci() Lingzhu Xiang (1): efivarfs: Drop link count of the right inode Maarten Lankhorst (1): x86, efi: remove attribute check from setup_efi_pci Matt Fleming (3): efivarfs: Never return ENOENT from firmware efivarfs: Delete den

Re: [RFC] efivars write(2) races

2013-01-25 Thread Matt Fleming
On Fri, 2013-01-25 at 00:25 +, Al Viro wrote: > 1) process A does write() on efivars file, reaches ->get_variable(), > gets newdatasize set, drops efivars->lock and loses CPU before an attempt to > grab ->i_mutex. process B comes and does the same thing, replacing the > variable contents

Re: [RFC] efivars write(2) races

2013-01-25 Thread Matt Fleming
On Fri, 2013-01-25 at 11:50 +0800, Lingzhu Xiang wrote: > On 01/25/2013 08:25 AM, Al Viro wrote: > > 1) process A does write() on efivars file, reaches ->get_variable(), > > gets newdatasize set, drops efivars->lock and loses CPU before an attempt to > > grab ->i_mutex. process B comes and doe

Re: [PATCH 1/2] efi: Make 'efi_enabled' a function to query EFI facilities

2013-01-25 Thread Matt Fleming
On Wed, 2013-01-23 at 13:17 +, Ben Hutchings wrote: > On Wed, 2013-01-23 at 07:52 +0000, Matt Fleming wrote: > > On Wed, 2013-01-23 at 04:16 +, Ben Hutchings wrote: > > > On Mon, 2013-01-21 at 21:12 +, Matt Fleming wrote: > &

Re: bzImage 2.12

2013-01-27 Thread Matt Fleming
On Sun, 2013-01-27 at 11:19 -0800, H. Peter Anvin wrote: > It turns out the patch I sent out doesn't actually build. Here is an > updated patch. Can I get your ack for this so I can do the appropriate > hacks to your and Yinghai's patchsets? > > -hpa > Ack

Re: [RFC] efivars write(2) races

2013-01-28 Thread Matt Fleming
On Mon, 2013-01-28 at 10:38 +0800, Lingzhu Xiang wrote: > On 01/25/2013 09:18 PM, Matt Fleming wrote: > >> 4. EFI_VARIABLE_APPEND_WRITE with EFI_OUT_OF_RESOURCES truncates size but > >> you > >> can still read its content. > > > > I'm not sure

[PATCH] x86, efi: Make "noefi" really disable EFI runtime serivces

2013-02-20 Thread Matt Fleming
From: Matt Fleming commit 1de63d60cd5b ("efi: Clear EFI_RUNTIME_SERVICES rather than EFI_BOOT by "noefi" boot parameter") attempted to make "noefi" true to its documentation and disable EFI runtime services to prevent the bricking bug described in commit e0094244e41

Re: [tip:x86/urgent] x86, efi: Make "noefi" really disable EFI runtime serivces

2013-02-21 Thread Matt Fleming
On Wed, 2013-02-20 at 16:16 -0800, Yinghai Lu wrote: > > diff --git a/arch/x86/platform/efi/efi.c b/arch/x86/platform/efi/efi.c > > index 928bf83..e2cd38f 100644 > > --- a/arch/x86/platform/efi/efi.c > > +++ b/arch/x86/platform/efi/efi.c > > @@ -85,9 +85,10 @@ int efi_enabled(int facility) > > } >

[PATCH v2] x86, efi: Make "noefi" really disable EFI runtime serivces

2013-02-21 Thread Matt Fleming
From: Matt Fleming commit 1de63d60cd5b ("efi: Clear EFI_RUNTIME_SERVICES rather than EFI_BOOT by "noefi" boot parameter") attempted to make "noefi" true to its documentation and disable EFI runtime services to prevent the bricking bug described in commit e0094244e41

[PATCH] x86, efi: Mark disable_runtime as __initdata

2013-02-22 Thread Matt Fleming
From: Matt Fleming disable_runtime is only referenced from __init functions, so mark it as __initdata. Reported-by: Yinghai Lu Cc: Satoru Takeuchi Cc: H. Peter Anvin Signed-off-by: Matt Fleming --- arch/x86/platform/efi/efi.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff

Re: [PATCH] efivars: Allow disabling use as a pstore backend

2013-03-12 Thread Matt Fleming
On Mon, 2013-03-11 at 16:17 -0500, Seth Forshee wrote: > Here's a patch that does the command line option. I'm happy with either > one. I like the idea, but isn't the logic backwards? I would have expected s/EFI_VARS_PSTORE_DEFAULT_DISABLE/EFI_VARS_PSTORE/g and then 'default y' in the Kconfig file

Re: [PATCH] efivars: Allow disabling use as a pstore backend

2013-03-13 Thread Matt Fleming
On Tue, 2013-03-12 at 16:14 -0500, Seth Forshee wrote: > From 91df4dd0d1e20f44ea16b3653cffecd507fdb500 Mon Sep 17 00:00:00 2001 > From: Seth Forshee > Date: Wed, 6 Mar 2013 14:25:36 -0600 > Subject: [PATCH] efivars: Add module parameter to allow disabling use as a > pstore backend > > We know th

Re: [PATCH] efivars: Allow disabling use as a pstore backend

2013-03-13 Thread Matt Fleming
On Wed, 2013-03-13 at 10:25 -0700, H. Peter Anvin wrote: > I think there should be two compile-time options (one to compile in the > EFI pstore code at all, and one to set its default.) OK, sorry Seth, looks like I'm the one that misunderstood. I've picked up your first two patches and pushed them

Re: [PATCH] efivars: Allow disabling use as a pstore backend

2013-03-13 Thread Matt Fleming
On Wed, 2013-03-13 at 14:14 -0500, Seth Forshee wrote: > On Wed, Mar 13, 2013 at 06:33:37PM +0000, Matt Fleming wrote: > > On Wed, 2013-03-13 at 10:25 -0700, H. Peter Anvin wrote: > > > I think there should be two compile-time options (one to compile in the > > > EFI pst

Re: [PATCH 0/3] Fix ACPI BGRT support for images located in EFI boot services memory

2012-09-04 Thread Matt Fleming
On Thu, 2012-08-30 at 14:28 -0700, Josh Triplett wrote: > The ACPI BGRT lets the OS access the BIOS logo image and its position on the > screen at boot time, allowing it to maintain that image on the screen until > ready to display something else, making boot more seamless. This series fixes > sup

Re: [PATCH 0/3] Fix ACPI BGRT support for images located in EFI boot services memory

2012-09-04 Thread Matt Fleming
On Tue, 2012-09-04 at 10:59 -0700, Josh Triplett wrote: > On Tue, Sep 04, 2012 at 03:27:20PM +0100, Matt Fleming wrote: > > On Thu, 2012-08-30 at 14:28 -0700, Josh Triplett wrote: > > > The ACPI BGRT lets the OS access the BIOS logo image and its position on > > > th

Re: [PATCHv3 0/4] Fix ACPI BGRT support for images located in EFI boot services memory

2012-09-14 Thread Matt Fleming
t, and reworks the existing BGRT > driver to use that existing copy. > > v2: Made the new internal function efi_unmap_memmap static. Incorporated > feedback from H. Peter Anvin and Matt Fleming: added stubs for > x86-specific EFI functions called from init/main.c to eli

Re: [PATCHv3 0/4] Fix ACPI BGRT support for images located in EFI boot services memory

2012-09-14 Thread Matt Fleming
t, and reworks the existing BGRT > driver to use that existing copy. > > v2: Made the new internal function efi_unmap_memmap static. Incorporated > feedback from H. Peter Anvin and Matt Fleming: added stubs for > x86-specific EFI functions called from init/main.c to eli

[PATCH] MAINTAINERS: Add EFI maintainer entry

2012-10-03 Thread Matt Fleming
From: Matt Fleming We're starting to need a channel through which we can funnel EFI patches to make sure they get merged in a timely fashion. Matthew and Peter seem happy enough for me to take that bullet. Signed-off-by: Matt Fleming Cc: H. Peter Anvin Cc: Matthew Garrett Cc: Ingo Molna

[PATCH 0/3] x86/efi: Identity mapping pagetable

2012-10-03 Thread Matt Fleming
From: Matt Fleming This series upgrades real_mode_header->trampoline_pgd to a proper kernel pagetable instead of just mapping the kernel text and module space. It also inserts the physical mappings for anything we ioremap(), so I/O regions are always accessible via their physical addres

[PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd

2012-10-03 Thread Matt Fleming
From: Matt Fleming There are various pieces of code in arch/x86 that require a page table with an identity mapping. Make trampoline_pgd a proper kernel page table, it currently only includes the kernel text and module space mapping. One new feature of trampoline_pgd is that it now has mappings

[PATCH 2/3] x86, efi: 1:1 pagetable mapping for virtual EFI calls

2012-10-03 Thread Matt Fleming
From: Matt Fleming Some firmware still needs a 1:1 (virt->phys) mapping even after we've called SetVirtualAddressMap(). So install the mapping alongside our existing kernel mapping whenever we make EFI calls in virtual mode. This bug was discovered on ASUS machines where the

[PATCH 3/3] x86/kernel: remove tboot 1:1 page table creation code

2012-10-03 Thread Matt Fleming
kernel didn't zap the identity mapping page table, so tboot related code can remove the remapping code before trapping back now. Signed-off-by: Xiaoyan Zhang Acked-by: Gang Wei Signed-off-by: Matt Fleming --- arch/x86/kernel/tboot.c | 78 - 1

Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd

2012-10-03 Thread Matt Fleming
On Wed, 2012-10-03 at 14:31 +0100, Jan Beulich wrote: > >>> Matt Fleming 10/03/12 2:59 PM >>> > >+static int insert_identity_mapping(resource_size_t paddr, unsigned long > >vaddr, > >+unsigned long size) > >+{ > >+unsi

Re: [PATCH] efi: add efivars kobject to efi sysfs folder

2012-10-04 Thread Matt Fleming
On Thu, 2012-10-04 at 10:24 +0800, Lee, Chun-Yi wrote: > UEFI variable filesystem need a new mount point, so this patch add > efivars kobject to efi_kobj for create a /sys/firmware/efi/efivars > folder. > > Cc: Matt Fleming > Cc: Jeremy Kerr > Cc: Matthew Garrett > Cc:

Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd

2012-10-04 Thread Matt Fleming
On Thu, 2012-10-04 at 07:32 +0100, Jan Beulich wrote: > >>> On 03.10.12 at 16:03, Matt Fleming wrote: > > On Wed, 2012-10-03 at 14:31 +0100, Jan Beulich wrote: > >> >>> Matt Fleming 10/03/12 2:59 PM >>> > >> >@@ -163,6 +258,10 @@ sta

Re: [PATCH 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd

2012-10-04 Thread Matt Fleming
On Fri, 2012-10-05 at 07:39 +0100, Jan Beulich wrote: > >>> On 04.10.12 at 23:08, "H. Peter Anvin" wrote: > > On 10/03/2012 06:31 AM, Jan Beulich wrote: > >>>>> Matt Fleming 10/03/12 2:59 PM >>> > >>> +static int inse

[PATCH v2 0/3] x86/efi: Identity mapping pagetable

2012-10-05 Thread Matt Fleming
From: Matt Fleming This series upgrades real_mode_header->trampoline_pgd to a proper kernel pagetable instead of just mapping the kernel text and module space. It also inserts the physical mappings for anything we ioremap(), so I/O regions are always accessible via their physical addres

[PATCH v2 1/3] x86, mm: Include the entire kernel memory map in trampoline_pgd

2012-10-05 Thread Matt Fleming
From: Matt Fleming There are various pieces of code in arch/x86 that require a page table with an identity mapping. Make trampoline_pgd a proper kernel page table, it currently only includes the kernel text and module space mapping. One new feature of trampoline_pgd is that it now has mappings

[PATCH 2/3] x86, efi: 1:1 pagetable mapping for virtual EFI calls

2012-10-05 Thread Matt Fleming
From: Matt Fleming Some firmware still needs a 1:1 (virt->phys) mapping even after we've called SetVirtualAddressMap(). So install the mapping alongside our existing kernel mapping whenever we make EFI calls in virtual mode. This bug was discovered on ASUS machines where the

[PATCH 3/3] x86/kernel: remove tboot 1:1 page table creation code

2012-10-05 Thread Matt Fleming
kernel didn't zap the identity mapping page table, so tboot related code can remove the remapping code before trapping back now. Signed-off-by: Xiaoyan Zhang Acked-by: Gang Wei Signed-off-by: Matt Fleming --- arch/x86/kernel/tboot.c | 78 - 1

Re: [PATCH v3] x86: efi: Turn off efi_enabled after setup on mixed fw/kernel

2012-10-25 Thread Matt Fleming
Olof Johansson > Acked-by: Maarten Lankhorst > Cc: sta...@kernel.org # 3.4 - 3.6 > Cc: Matthew Garrett Applied, thanks! -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to

Re: [PATCH v3] x86: efi: Turn off efi_enabled after setup on mixed fw/kernel

2012-10-25 Thread Matt Fleming
map(void) +void __init efi_unmap_memmap(void) { if (memmap.map) { early_iounmap(memmap.map, memmap.nr_map * memmap.desc_size); -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a me

[GIT PULL] EFI fixes for v3.7

2012-10-26 Thread Matt Fleming
repository location on kernel.org. Matt Fleming (1): MAINTAINERS: Add EFI git repository location Olof Johansson (1): x86: efi: Turn off efi_enabled after setup on mixed fw/kernel MAINTAINERS | 1 + arch

Re: [GIT PULL] EFI fixes for v3.7

2012-10-26 Thread Matt Fleming
On Fri, 2012-10-26 at 10:22 +0200, Ingo Molnar wrote: > * Matt Fleming wrote: > > > Hi guys, > > > > The following changes since commit ddffeb8c4d0331609ef2581d84de4d763607bd37: > > > > Linux 3.7-rc1 (2012-10-14 14:41:04 -0700) > > > > are av

[PATCH] samsung-laptop: Disable if CONFIG_EFI=y

2012-11-04 Thread Matt Fleming
From: Matt Fleming We've started getting reports of users seeing Machine Check Exceptions when booting their Samsung laptops in UEFI mode, https://bugzilla.kernel.org/show_bug.cgi?id=47121 This module seems to be the culprit as it's grovelling around in the 0xf region wh

Re: [PATCH] x86: remove dummy long from EFI stub

2012-11-04 Thread Matt Fleming
loc. > > Cc: Jordan Justen > Cc: Matt Fleming > Cc: "H. Peter Anvin" > Cc: Thomas Gleixner > Cc: Ingo Molnar > Signed-off-by: Cesar Eduardo Barros > --- > arch/x86/boot/header.S | 3 --- > 1 file changed, 3 deletions(-) > > diff --git a/arch/

Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y

2012-11-04 Thread Matt Fleming
On Sun, 2012-11-04 at 09:47 -0800, Jonathan Nieder wrote: > Matt Fleming wrote: > > > --- a/drivers/platform/x86/Kconfig > > +++ b/drivers/platform/x86/Kconfig > > @@ -717,7 +717,7 @@ config XO15_EBOOK > > > > config SAMSUNG_LAPTOP > > tristate &quo

Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y

2012-11-05 Thread Matt Fleming
27; variable, but it doesn't strictly mean "this_is_a_uefi_system()", it actually means "Do we have EFI runtime services?". The whole thing is a bit of a mess and I'm planning on cleaning it up this week. -- Matt Fleming, Intel Open Source Technology Center -- To u

Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y

2012-11-05 Thread Matt Fleming
On Mon, 2012-11-05 at 11:37 +0100, Greg KH wrote: > On Sun, Nov 04, 2012 at 05:35:06PM +0000, Matt Fleming wrote: > > From: Matt Fleming > > > > We've started getting reports of users seeing Machine Check Exceptions > > when booting their Samsung laptops i

Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y

2012-11-05 Thread Matt Fleming
mess and I'm planning on > > cleaning it up this week. > > > As far as I can understand it we should be reserving those areas on a > UEFI booted machine and just marking them as busy so that they are not > available to any drivers to go peering into. Yes, that would be t

Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y

2012-11-05 Thread Matt Fleming
't > grovel in places you shouldn't. Indeed its possible EFI should reserve > those memory regions ? The kernel would have to reserve the gaps in the memory mappings since there is no mapping in the EFI memory map for 0xf. There is no support for that currently AFAIK. -- Matt

Re: [PATCH] samsung-laptop: Disable if CONFIG_EFI=y

2012-11-05 Thread Matt Fleming
On Sun, 2012-11-04 at 17:44 +, Corentin Chary wrote: > On Sun, Nov 4, 2012 at 5:35 PM, Matt Fleming wrote: > > From: Matt Fleming > > > > We've started getting reports of users seeing Machine Check Exceptions > > when booting their Samsung laptops

Re: [PATCH] efi: Build EFI stub with EFI-appropriate options

2012-07-27 Thread Matt Fleming
handling > simpler. > > Signed-off-by: Matthew Garrett > --- > arch/x86/boot/compressed/Makefile |3 +++ > 1 file changed, 3 insertions(+) Acked-by: Matt Fleming -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to m

Re: [PATCH] X86: Improve GOP detection in the EFI boot stub

2012-07-27 Thread Matt Fleming
boot/compressed/eboot.h |4 > 2 files changed, 20 insertions(+), 13 deletions(-) Acked-by: Matt Fleming -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org

Re: [PATCH] Support UEFI variable append and deleting authenticated variables.

2012-07-30 Thread Matt Fleming
On Mon, 2012-06-25 at 09:12 -0400, Peter Jones wrote: > This adds support for appending to all UEFI variables, and also for > deleting authentication variables. > > Signed-off-by: Peter Jones > --- > drivers/firmware/efivars.c | 99 > +--- > 1 file chan

Re: [PATCH 1/6] efi-stub.txt updates for ARM

2013-10-03 Thread Matt Fleming
++--- > 1 file changed, 20 insertions(+), 7 deletions(-) Looks good to me. -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordo

Re: [PATCH 2/6] Add shared update_fdt() function for ARM/ARM64

2013-10-03 Thread Matt Fleming
rivers/firmware/efi/efi-stub-helper.c > +++ b/drivers/firmware/efi/efi-stub-helper.c > @@ -4,6 +4,7 @@ > * implementation files. > * > * Copyright 2011 Intel Corporation; author Matt Fleming > + * Copyright 2013 Linaro Limited; author Roy Franz > * > * This file is par

Re: [PATCH 2/6] Add shared update_fdt() function for ARM/ARM64

2013-10-03 Thread Matt Fleming
On Thu, 03 Oct, at 09:43:24AM, Mark Salter wrote: > On Thu, 2013-10-03 at 10:52 +0100, Matt Fleming wrote: > > > +#if defined(CONFIG_ARM) || defined(CONFIG_ARM64) > > > +static efi_status_t update_fdt(efi_system_table_t *sys_table, void > > > *orig_fdt, > >

Re: [PATCH 2/6] Add shared update_fdt() function for ARM/ARM64

2013-10-03 Thread Matt Fleming
efi-stub-fdt.c" file be satisfactory? This file would just be used > the ARM and ARM64, so this would remove > the need for the top-level #ifdefs. Fair enough, move it to drivers/firmware/efi/fdt.c - there's no need to prefix it with "efi-" (efi-pstore.c has historic baggage)

[GIT PULL] EFI changes

2013-10-04 Thread Matt Fleming
: Remove redundant memset() arch/x86/platform/efi/efi.c| 2 +- drivers/firmware/efi/efi-stub-helper.c | 2 -- 2 files changed, 1 insertion(+), 3 deletions(-) -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this list: send the line "unsubscribe linux-k

Re: uefi boot hang (bisected)

2013-07-10 Thread Matt Fleming
On 10/07/13 07:36, Dave Young wrote: > Another problem is: With this patch applied I tried noefi boot, but > kernel paniced, looks like efivar_init depends on efi runtime. Below > patches works for me about noefi boot though I'm not sure if it's a > right fix, please review. It makes more sense to

[GIT PULL] EFI urgent fixes

2013-07-11 Thread Matt Fleming
h that avoids passing EFI Boot Services regions to SetVirtualAddressMap(). It caused boot regressions. * Fix a crash in the efivars code by checking whether that EFI Runtime Services are available before attempting to use them. ----------

Re: [edk2] Corrupted EFI region

2013-09-16 Thread Matt Fleming
lp. That way we'd only need to reserve remaining regions in efi_reserve_boot_services(). This scheme would rely on nothing writing into the crash kernel area before we've extracted the BGRT data, however. -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this

Re: [PATCH] EFI: use nr_tables param directly in efi_config_init

2013-09-17 Thread Matt Fleming
t;\n"); > - early_iounmap(config_tables, efi.systab->nr_tables * sz); > + early_iounmap(config_tables, nr_tables * sz); > return 0; > } Thanks Dave, but this patch should no longer be necessary because of the changes sitting in the 'next' branch at, git

Re: access efi variables

2013-09-17 Thread Matt Fleming
ivarfs_file_read() is implemented, e.g. using efivar_entry_get(). In particular, note how it kmalloc()'s a buffer for reading the variable data into, thereby avoiding any 1024-byte limitation. -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this list: send the

Re: [PATCHv2] x86: EFI stub support for large memory maps

2013-09-17 Thread Matt Fleming
n Crosetto > --- > Changes in v2: > * Free memory when error is returned from alloc_e820ext() as suggested by Matt > Fleming > * Set pointer to NULL and size to 0 after freeing memory in alloc_e820ext() > > arch/x86/boot/compressed/eboot.c | 223 > +++

Re: [PATCH 08/17] Generalize relocate_kernel() for use by other architectures.

2013-09-18 Thread Matt Fleming
fi_low_alloc(sys_table_arg, alloc_size, 0, > + &new_addr); This is wrong. You've dropped the hdr->kernel_alignment argument, and the relaxed alignment of this allocation stops my machine from booting. -- Matt Fleming, Intel Open Source Technology

Re: [PATCH V4 00/17] ARM EFI stub common code

2013-09-18 Thread Matt Fleming
gt; is based on code in the x86 stub that has been generalized > to support other architectures. Apart from PATCH 8/17, these all look good to me and work on my test machines. If you can respin PATCH 8 based on my comments I'll pull this series into my efi tree and get it into linux-next.

[GIT PULL] EFI urgent fix

2013-09-19 Thread Matt Fleming
Josh Boyer Josh Boyer (1): x86, efi: Don't map Boot Services on i386 arch/x86/platform/efi/efi.c | 11 +++ 1 file changed, 7 insertions(+), 4 deletions(-) -- Matt Fleming, Intel Open Source Technology Center -- To unsubs

Re: [edk2] Corrupted EFI region

2013-09-20 Thread Matt Fleming
On Wed, 18 Sep, at 01:24:14PM, jerry.hoem...@hp.com wrote: > Matt, > > I conducted the following experiments on a 3.11 kernel: Jerry, could you paste your memory map from the kernel log? -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this list: send

Re: [PATCH 09/17] Move unicode to ASCII conversion to shared function.

2013-09-20 Thread Matt Fleming
y complete depend > on this one, > so getting this merged soon would be helpful. Just fixing the function name and comments is enough for this patch series. Anything else should be separate. -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this list: send the line &

Re: [PATCH 09/17] Move unicode to ASCII conversion to shared function.

2013-09-20 Thread Matt Fleming
ally end up in the 'next' branch at, git://git.kernel.org/pub/scm/linux/kernel/git/mfleming/efi.git -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.ke

Re: [PATCH 00/11] EFI runtime services virtual mapping

2013-09-20 Thread Matt Fleming
On Fri, 20 Sep, at 11:05:44AM, Borislav Petkov wrote: > But no, 32-bit is not addressed here. Which just dawned on me: Matt, I > probably should keep the ioremapping code for 32-bit, doh. I completely > went 64-bit only here :-) Yes, please keep the ioremap code. At least for now.

Re: [PATCH 00/11] EFI runtime services virtual mapping

2013-09-20 Thread Matt Fleming
/platform/efi/efi.c:867:2: error: implicit declaration of function ‘efi_sync_low_kernel_mappings’ [-Werror=implicit-function-declaration] -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message

Re: [PATCH 02/11] efi: Remove EFI_PAGE_SHIFT and EFI_PAGE_SIZE

2013-09-20 Thread Matt Fleming
(md->num_pages << PAGE_SHIFT > return md->attribute; > } > return 0; > diff --git a/include/linux/efi.h b/include/linux/efi.h > index 5f8f176154f7..fa47d80ab4b5 100644 > --- a/include/linux/efi.h > +++ b/include/linux/efi.h > @@

Re: [PATCH 00/11] EFI runtime services virtual mapping

2013-09-20 Thread Matt Fleming
%r15 + movq%r15, efi_scratch+16(%rip) callefi_main movq%rax,%rsi cmpq$0,%rax -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to ma

Re: [PATCH] x86 efi: bugfix interrupt disabling sequence

2013-09-20 Thread Matt Fleming
; allowing for a triple fault. Just to be clear, you haven't witnessed a triple fault, correct? > This patch fixes this by clearing the interrupt bit before the lidt > instruction. I think we can go even further than this and get rid of all of the IDT code in the EFI boot stub. The ke

Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot

2013-09-05 Thread Matt Fleming
RR_PTR(efi_status_to_err(status)); > + pr_err("PM: Couldn't get wake key data size: 0x%lx\n", status); > + goto error; > + } Is it safe to completely bypass the efivars interface and access efi.get_variable() directly? I wouldn't have thought so, unles

Re: [PATCH V3 11/11] Add option to automatically enforce module signatures when in Secure Boot mode

2013-09-05 Thread Matt Fleming
ed(EFI_BOOT) along with .secure_boot to guard against garbage values in boot_params. -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/

Re: [PATCH 11/18] Hibernate: introduced RSA key-pair to verify signature of snapshot

2013-09-05 Thread Matt Fleming
ey, it's that we can't invoke any of the variable runtime service functions concurrently. -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More

Re: [PATCH v4 0/3] Make commonly useful UEFI functions common

2013-09-05 Thread Matt Fleming
as to merge 'arm/efi-stub' into my 'next' branch and ask you to pull that into whichever branch you include in linux-next. Does that work? -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in

Re: [PATCH] x86: EFI stub support for large memory maps

2013-09-06 Thread Matt Fleming
status = alloc_e820ext(nr_e820ext, &e820ext, &e820ext_size); > + if (status != EFI_SUCCESS) > + return status; In the error path shouldn't we jump to free_mem_map to avoid leaking memory? -- Matt Fleming, Intel Open Source Technology

Re: [PATCH] Remove warning in efi_enter_virtual_mode

2013-09-12 Thread Matt Fleming
fice for now. [ Added to changelog - Matt ] Reported-by: Bryan O'Donoghue Acked-by: Tom Zanussi Acked-by: Darren Hart Cc: Josh Triplett Cc: Matthew Garrett Cc: H. Peter Anvin Cc: Ingo Molnar Cc: Thomas Gleixner Cc: Greg Kroah-Hartman Cc: Signed-off-by: Josh Boyer Signed-off-by: Ma

Re: [RFC][PATCH v2] efivars,efi-pstore: Hold off deletion of sysfs entry until the scan is completed

2013-10-07 Thread Matt Fleming
{ > + /* > + * The entry will be deleted > + * after scanning is completed. > + */ > + entry->deleting = true; > + } else > + l

Re: [PATCH 12/12] EFI: Runtime services virtual mapping

2013-10-10 Thread Matt Fleming
ices altogether. The spec is pretty clear that runtime drivers shouldn't be doing this, and so far this approach has served us well. There are only two reasons why we keep the Boot Services regions around (for a short period) at all, 1) To work around the aforementioned runtime firmware b

[PATCH] x86/efi: Add EFI framebuffer earlyprintk support

2013-10-10 Thread Matt Fleming
From: Matt Fleming It's incredibly difficult to diagnose early EFI boot issues without special hardware because earlyprintk=vga doesn't work on EFI systems. Add support for writing to the EFI framebuffer, via earlyprintk=efi, which will actually give users a chance of providing de

Re: UEFI Plugfest 2013 -- New Orleans

2013-09-01 Thread Matt Fleming
mplementations. It's only going to be a matter of time until we *have* to disable some our workarounds in order to boot the most recent incarantions of UEFI. Not least because carrying these workarounds unconditionally and indefinitely severely limits our ability to innovate. -- Matt Flemin

Re: [PATCH V3 RFC 00/16] EFI stub for ARM

2013-09-02 Thread Matt Fleming
. I'll reply to your emails asap. -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-inf

Re: [edk2] Corrupted EFI region

2013-09-02 Thread Matt Fleming
On Thu, 08 Aug, at 06:46:02AM, Andrew Fish wrote: > > On Aug 8, 2013, at 3:17 AM, Matt Fleming wrote: > > > On Wed, 07 Aug, at 02:10:28PM, Andrew Fish wrote: > >> Well the issue I see is I don't think OS X or Windows are doing this. > >> So I'm guessin

  1   2   3   4   5   6   7   8   9   10   >