Message ID | 20190918012643.25192-12-takahiro.akashi@linaro.org |
---|---|
State | RFC |
Delegated to: | Heinrich Schuchardt |
Headers | show
Return-Path: <u-boot-bounces@lists.denx.de> X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.denx.de (client-ip=81.169.180.215; helo=lists.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=<UNKNOWN>) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=linaro.org Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=linaro.org header.i=@linaro.org header.b="ug5JmfS9"; dkim-atps=neutral Received: from lists.denx.de (dione.denx.de [81.169.180.215]) by ozlabs.org (Postfix) with ESMTP id 46Y2V60HyGz9sCJ for <incoming@patchwork.ozlabs.org>; Wed, 18 Sep 2019 11:30:21 +1000 (AEST) Received: by lists.denx.de (Postfix, from userid 105) id 605D8C21EBA; Wed, 18 Sep 2019 01:25:25 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on lists.denx.de X-Spam-Level: X-Spam-Status: No, score=-0.0 required=5.0 tests=RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL, T_DKIM_INVALID autolearn=unavailable autolearn_force=no version=3.4.0 Received: from lists.denx.de (localhost [IPv6:::1]) by lists.denx.de (Postfix) with ESMTP id 2B237C21E9F; Wed, 18 Sep 2019 01:24:24 +0000 (UTC) Received: by lists.denx.de (Postfix, from userid 105) id 3960CC21C29; Wed, 18 Sep 2019 01:24:05 +0000 (UTC) Received: from mail-pg1-f194.google.com (mail-pg1-f194.google.com [209.85.215.194]) by lists.denx.de (Postfix) with ESMTPS id 79642C21EC2 for <u-boot@lists.denx.de>; Wed, 18 Sep 2019 01:24:02 +0000 (UTC) Received: by mail-pg1-f194.google.com with SMTP id u17so2990919pgi.6 for <u-boot@lists.denx.de>; Tue, 17 Sep 2019 18:24:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=fCfmfPvXvHQ6Y2+STlqkdKqEtGQaUITTmrJrDO65JZY=; b=ug5JmfS9EK136tlBooUNGGMVtlSFPh0ZY7JCJrbBFgIsSNUYIBqI98dbDL9v3NHcpT 2vGZQoh+Rx6tct6QwTxaFHyX/yHCAQ2spS/5azjSw5GLsEIyxO5HqBmQIyduT+wl8DpY NdPcN96Fjm9W3CuAXPV8DpPmJ6mmnKypoUvQCV7fXl4pvuxZGfCEDsxl9HhTVXbzkuz5 CRKgE0u0YUtkeKkoO8bZlFiC3zb77clgvc4e8qzaY067lN5xAhRzlEGz6ZtxA8buPKTB y3R2Xg7YPI0JsCvJzW95qluy0wNIPjwwqrZkq+3ct1KakkWwB3XA8PeUzbCmvLQhfjxu XwXQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=fCfmfPvXvHQ6Y2+STlqkdKqEtGQaUITTmrJrDO65JZY=; b=s83NKc6y/mhexb5S85Wa6ZZrHU5OCiVVM463ZLR5uIcWpk3qCGbZ/h16FrQmInshOQ jgYiXLP6aUUqVoxFvYY4uokOFgUdMZY9ZEaXRUlpkwFhkZfh0Ql71hK/BUZF4ORE+Aj1 br/ipzBS+g8FPdft6dTgNSKZO/Vcbv+bMsqv8XNC4li3l1Kk+bmVnVGyQtCLh3iyWafI Kg1I1vfDx5q17b1SY98Yw3l/DXyMJUiRxrbMdnXegFLBITx6oP9SXLZbpmNRc2ZBDyjr Pm4AK1EhsjDwKg/luACsICM5zTKbx+oLfQ3T0Sr2ZCUro4YKOTdTQbz4vh6tZwbJUi0U 4dqA== X-Gm-Message-State: APjAAAXFr8bhhBSUtIfDrJUdrlJfa03RLZLlDx2CI2xLMiWKWrFG1pI8 hq8W2tz2Hwfi1DKBCCSEeKq93Q== X-Google-Smtp-Source: APXvYqwSCH2P2uZOWJ8qghhPmlCA0h7GpbxOpFx7fjYFuxH5RetgjPpuGizIFZ8/YMoRR3lK6ux2BA== X-Received: by 2002:a17:90a:5aa1:: with SMTP id n30mr1046471pji.82.1568769841195; Tue, 17 Sep 2019 18:24:01 -0700 (PDT) Received: from linaro.org ([121.95.100.191]) by smtp.googlemail.com with ESMTPSA id a11sm4159035pfg.94.2019.09.17.18.24.00 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 17 Sep 2019 18:24:00 -0700 (PDT) From: AKASHI Takahiro <takahiro.akashi@linaro.org> To: xypron.glpk@gmx.de, agraf@csgraf.de, trini@konsulko.com Date: Wed, 18 Sep 2019 10:26:39 +0900 Message-Id: <20190918012643.25192-12-takahiro.akashi@linaro.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190918012643.25192-1-takahiro.akashi@linaro.org> References: <20190918012643.25192-1-takahiro.akashi@linaro.org> MIME-Version: 1.0 Cc: u-boot@lists.denx.de Subject: [U-Boot] [RFC 11/15] efi_loader: initialize secure boot state X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.18 Precedence: list List-Id: U-Boot discussion <u-boot.lists.denx.de> List-Unsubscribe: <https://lists.denx.de/options/u-boot>, <mailto:u-boot-request@lists.denx.de?subject=unsubscribe> List-Archive: <http://lists.denx.de/pipermail/u-boot/> List-Post: <mailto:u-boot@lists.denx.de> List-Help: <mailto:u-boot-request@lists.denx.de?subject=help> List-Subscribe: <https://lists.denx.de/listinfo/u-boot>, <mailto:u-boot-request@lists.denx.de?subject=subscribe> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" <u-boot-bounces@lists.denx.de> |
Series |
efi_loader: add secure boot support
|
expand
|
diff --git a/lib/efi_loader/efi_setup.c b/lib/efi_loader/efi_setup.c index 0d915ba386da..de8f0bd7e68e 100644 --- a/lib/efi_loader/efi_setup.c +++ b/lib/efi_loader/efi_setup.c @@ -132,6 +132,11 @@ efi_status_t efi_init_obj_list(void) if (ret != EFI_SUCCESS) goto out; + /* Secure boot */ + ret = efi_init_secure_boot(); + if (ret != EFI_SUCCESS) + goto out; + /* Indicate supported runtime services */ ret = efi_init_runtime_supported(); if (ret != EFI_SUCCESS)
We call efi_init_secure_boot() after loading saved UEFI variables so that the initial secure boot status will be initialized. Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org> --- lib/efi_loader/efi_setup.c | 5 +++++ 1 file changed, 5 insertions(+)