From patchwork Sat Jul 4 09:50:01 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Heinrich Schuchardt X-Patchwork-Id: 1322735 X-Patchwork-Delegate: trini@ti.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=gmx.de Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; secure) header.d=gmx.net header.i=@gmx.net header.a=rsa-sha256 header.s=badeba3b8450 header.b=h5jcHzhW; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 49zRsG5zCBz9sQt for ; Sat, 4 Jul 2020 19:50:24 +1000 (AEST) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 8E2DA8006D; Sat, 4 Jul 2020 11:50:13 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; secure) header.d=gmx.net header.i=@gmx.net header.b="h5jcHzhW"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 1775D801D8; Sat, 4 Jul 2020 11:50:12 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,FREEMAIL_FROM,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.2 Received: from mout.gmx.net (mout.gmx.net [212.227.17.21]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id D966C80030 for ; Sat, 4 Jul 2020 11:50:08 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=xypron.glpk@gmx.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1593856206; bh=0Cv/56kgrLzK8HS+zWzeLYIu+P4UnGzkPHaJi+NGAmk=; h=X-UI-Sender-Class:To:Cc:From:Subject:Date; b=h5jcHzhWO30ASsOs0XmFo1A2q5qAcs3LqD5JFpxJjqMtZWIxRewexpIS0GjLjN1Vi S2a8RDHm8OqVBBlgtDRexFD+gFyTdcapgRlSC+o+ZDCjN2vf73LbJNPNlkTLxlKf7X B+BBkf9ThJuBUtiFFQSZHT1rSi016S/sEwUYx7d0= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from [192.168.123.51] ([88.152.145.75]) by mail.gmx.com (mrgmx105 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MYvcG-1kMP5K0vVA-00Uo7Y; Sat, 04 Jul 2020 11:50:06 +0200 To: Tom Rini Cc: U-Boot Mailing List , Alexander Graf , AKASHI Takahiro From: Heinrich Schuchardt Subject: Pull request for UEFI sub-system for efi-2020-10-rc1 Autocrypt: addr=xypron.glpk@gmx.de; prefer-encrypt=mutual; keydata= mQINBE2g3goBEACaikqtClH8OarLlauqv9d9CPndgghjEmi3vvPZJi4jvgrhmIUKwl7q79wG IATxJ1UOXIGgriwoBwoHdooOK33QNy4hkjiNFNrtcaNT7uig+BG0g40AxSwVZ/OLmSFyEioO BmRqz1Zdo+AQ5RzHpu49ULlppgdSUYMYote8VPsRcE4Z8My/LLKmd7lvCn1kvcTGcOS1hyUC 4tMvfuloIehHX3tbcbw5UcQkg4IDh4l8XUc7lt2mdiyJwJoouyqezO3TJpkmkayS3L7o7dB5 AkUwntyY82tE6BU4quRVF6WJ8GH5gNn4y5m3TMDl135w27IIDd9Hv4Y5ycK5sEL3N+mjaWlk 2Sf6j1AOy3KNMHusXLgivPO8YKcL9GqtKRENpy7n+qWrvyHA9xV2QQiUDF13z85Sgy4Xi307 ex0GGrIo54EJXZBvwIDkufRyN9y0Ql7AdPyefOTDsGq5U4XTxh6xfsEXLESMDKQMiVMI74Ec cPYL8blzdkQc1MZJccU+zAr6yERkUwo1or14GC2WPGJh0y/Ym9L0FhXVkq9e1gnXjpF3QIJh wqVkPm4Two93mAL+929ypFr48OIsN7j1NaNAy6TkteIoNUi09winG0tqU5+U944cBMleRQOa dw+zQK0DahH4MGQIU0EVos7lVjFetxPjoKJE9SPl/TCSc+e0RwARAQABtChIZWlucmljaCBT Y2h1Y2hhcmR0IDx4eXByb24uZ2xwa0BnbXguZGU+iQI4BBMBAgAiAhsDBgsJCAcDAgYVCAIJ CgsEFgIDAQIeAQIXgAUCVAqnzgAKCRDEgdu8LAUaxP7AD/9Zwx3SnmrLLc3CqEIcOJP3FMrW gLNi5flG4A/WD9mnQAX+6DEpY6AxIagz6Yx8sZF7HUcn1ByDyZPBn8lHk1+ZaWNAD0LDScGi Ch5nopbJrpFGDSVnMWUNJJBiVZW7reERpzCJy+8dAxhxCQJLgHHAqPaspGtO7XjRBF6oBQZk oJlqbBRFkTcgOI8sDsSpnsfSItZptoaqqm+lZpMCrB5s8x7dsuMEFaRR/4bq1efh8lSq3Kbf eSY59MWh49zExRgAb0pwON5SE1X9C84T2hx51QDiWW/G/HvJF2vxF8hCS7RSx0fn/EbPWkM6 m+O1SncMaA43lx1TvRfPmYhxryncIWcez+YbvH/VqoLtxvz3r3OTH/WEA5J7mu5U1m2lUGNC cFN1bDsNoGhdlFZvG/LJJlBClWBWYHqHnnGEqEQJrlie9goBcS8YFUcfqKYpdmp5/F03qigY PmrE3ndBFnaOlOT7REEi8t3gmxpriTtGpKytFuwXNty1yK2kMiLRnQKWN7WgK70pbFFO4tyB vIhDeXhFmx6pyZHlXjsgbV3H4QbqazqxYOQlfHbkRpUJczuyPGosFe5zH+9eFvqDWYw2qdH+ b0Nt1r12vFC4Mmj5szi40z3rQrt+bFSfhT+wvW9kZuBB5xEFkTTzWSFZbDTUrdPpn2DjYePS sEHKTUhgl7kCDQRNoN4KARAA6WWIVTqFecZHTUXeOfeKYugUwysKBOp8E3WTksnv0zDyLS5T ImLI3y9XgAFkiGuKxrJRarDbw8AjLn6SCJSQr4JN+zMu0MSJJ+88v5sreQO/KRzkti+GCQBK YR5bpqY520C7EkKr77KHvto9MDvPVMKdfyFHDslloLEYY1HxdFPjOuiMs656pKr2d5P4C8+V iAeQlUOFlISaenNe9XRDaO4vMdNy65Xrvdbm3cW2OWCx/LDzMI6abR6qCJFAH9aXoat1voAc uoZ5F5NSaXul3RxRE9K+oWv4UbXhVD242iPnPMqdml6hAPYiNW0dlF3f68tFSVbpqusMXfiY cxkNECkhGwNlh/XcRDdb+AfpVfhYtRseZ0jEYdXLpUbq1SyYxxkDEvquncz2J9urvTyyXwsO QCNZ0oV7UFXf/3pTB7sAcCiAiZPycF4KFS4b7gYo9wBROu82B9aYSCQZnJFxX1tlbvvzTgc+ ecdQZui+LF/VsDPYdj2ggpgxVsZX5JU+5KGDObBZC7ahOi8Jdy0ondqSRwSczGXYzMsnFkDH hKGJaxDcUUw4q+QQuzuAIZZ197lnKJJv3Vd4N0zfxrB0krOcMqyMstvjqCnK/Vn4iOHUiBgA OmtIhygAsO4TkFwqVwIpC+cj2uw/ptN6EiKWzXOWsLfHkAE+D24WCtVw9r8AEQEAAYkCHwQY AQIACQIbDAUCVAqoNwAKCRDEgdu8LAUaxIkbD/wMTA8n8wgthSkPvhTeL13cO5/C3/EbejQU IJOS68I2stnC1ty1FyXwAygixxt3GE+3BlBVNN61dVS9SA498iO0ApxPsy4Q7vvQsF7DuJsC PdZzP/LZRySUMif3qAmIvom8fkq/BnyHhfyZ4XOl1HMr8pMIf6/eCBdgIvxfdOz79BeBBJzr qFlNpxVP8xrHiEjZxU965sNtDSD/1/9w82Wn3VkVisNP2MpUhowyHqdeOv2uoG6sUftmkXZ8 RMo+PY/iEIFjNXw1ufHDLRaHihWLkXW3+bS7agEkXo0T3u1qlFTI6xn8maR9Z0eUAjxtO6qV lGF58XeVhfunbQH8Kn+UlWgqcMJwBYgM69c65Dp2RCV7Tql+vMsuk4MT65+Lwm88Adnn6ppQ S2YmNgDtlNem1Sx3JgCvjq1NowW7q3B+28Onyy2fF0Xq6Kyjx7msPj3XtDZQnhknBwA7mqSZ DDw0aNy1mlCv6KmJBRENfOIZBFUqXCtODPvO5TcduJV/5XuxbTR/33Zj7ez2uZkOEuTs/pPN oKMATC28qfg0qM59YjDrrkdXi/+iDe7qCX93XxdIxpA5YM/ZiqgwziJX8ZOKV7UDV+Ph5KwF lTPJMPdQZYXDOt5DjG5l5j0cQWqE05QtYR/V6g8un6V2PqOs9WzaT/RB12YFcaeWlusa8Iqs Eg== Message-ID: Date: Sat, 4 Jul 2020 11:50:01 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.9.0 MIME-Version: 1.0 Content-Language: en-US X-Provags-ID: V03:K1:ZPbzX+EByZJ8lw80cHBQbo6Yiule4Sqv8WIOJkFkl5PJtoJKrMu +UXWVw51s2o5AJsiQYK5Hdf7Wp/3G+iFOtspoVfJhP6AtboIxsXLi9dP+ieE+EUaxfjHOXa PCDvfS+uG6Bw6gaxfHfHFqSsDUiBNpRuKa+w907vRvavV2HZmSCd3nvtIkXnGGl2oCGrh3G RwK9xzl375oZ0yUAp9d5Q== X-UI-Out-Filterresults: notjunk:1;V03:K0:s8/++jhwswU=:YFTmUxVWU5WVooRseCkp+q iTKD5h0p69uPfQt9EbDqW4z+uFITorwUaiR87BXsV9pbvtAWP5bX5F/Ni5QvwwgVHWAWt4v0r Asg3r8d8EC6Iu6KKfxyWx7wDKQjICwqFiQoSvrf7/E3EekGU8M/wKWG660UNnj9vbgNwNyp1V aU6BtxmbY6FAWUQMqMmqlufoCorBVRyOe17y4tWv/K93aocmsqYiOSLq5Msceb/RhjP/d9b/e yPh9HO6X0VjguD74+AEwTq4HMv2oKN8jVusTZinRUvHLoMU9hBq/LBhFBFYGQGI1720iuqC8n ge+Hu+MFJKJNQ33DGytTMp+VGrH81ERq3V6g0I4LVvhCtPl3PLyXlfRt3GdCIQJ5lNhvwnSFe WUpZf56HlSQGW1rw+WfVvBSh850FzWJzLCeuLV38vd/NIuizppzhNk2RPQMGbniNRvRI1H0X6 AwWNYqiz4X7swszMU5ZsyEm58Z15nuGgEFUWRFWfTO+ECXCq2OrKRsYWpptxBrFbLQ9mP90zL nDEdjXJBRl7kEJP/YErMgORPZTOkuo4aIPaMIJnZp36Yq18a9ROwB2Wp7Sg1xWi0H89Fb0UfO yGinD4/R1ytsgy5+yjEzjSgWPwbesHcVr0dvp47xwKEBBXjV8LnvbavbHXittSN4Du3mrjHxv hU8kiZvFIrDszUEfbCqDr5YY1GVDP4T2mV8UCRf7HVakOnAi3zOlV/XIBtSONfAMIM4B846LW n02n9ySbsWrhdCRtt23Tyb9PcTnTwWlP9pyWWxQCFBMKGgLcXZzFuxPJ655YZH0wECUt7xXYd 0xaU/V/IKNw+WNb8CYfGg8NYtOoDF5AGfknJsFMOlYpNMzW1eCop8dRk2+sRdQEQUabIau44S mH6a9UBGBFHsg9nP3nPBT9eNK2yTJLModeaMlFZ1GE/lzD1cS1VmO+LwOnvz6K1v6hiSZvdfG df/XGF/DxMSNZHWPYnwCXLIW7lLNf9nI6UvAN2IbURlMpnZuXIZfNEAt/ry4alf5ikTghzUxJ mSQmawkG+MNZcr/B0Dsv13n79yD/e+jBnnmqIfPN2c5hTMqFifH28RVeAHEHWflU91B65osm2 5cOgPps9gVZ+FCbO1I3eVcdPiwymXNOJmbXQLvuXeaZ/rMlm0vY/Zu7KuvF90aHgFZi759jgW 4WmMhAcIw6G7MdyOQRW6fTXyIVKsCUP9+C9W4kwyOmBkeJmKpdVb0KlQRwOvjC6Ku9yEVD6iy YTsd7FtrFInlOBzFl X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.102.3 at phobos.denx.de X-Virus-Status: Clean The following changes since commit bcfe764ee925d0820e82c69ccf75b71d142644c7: Merge tag 'efi-2020-07-rc6-2' of https://gitlab.denx.de/u-boot/custodians/u-boot-efi (2020-06-30 17:15:39 -0400) are available in the Git repository at: https://gitlab.denx.de/u-boot/custodians/u-boot-efi.git tags/efi-2020-10-rc1 for you to fetch changes up to 93f6201af71d9a0a521c99212e6066778270a357: efi_loader: imply FAT, FAT_WRITE (2020-07-03 18:03:56 +0200) ---------------------------------------------------------------- Pull request for UEFI sub-system for efi-2020-10-rc1 This series comprises error corrections for the UEFI subsystem: * correct consideration of timestamps for variable authentication * correct collection of data regions for code authentication * correct unit tests to test loading dbx * enable FAT_WRITE as required by the UEFI spec The boot manager uses log functions instead of printf() and debug(). The UEFI intialization state is exported. ---------------------------------------------------------------- AKASHI Takahiro (7): efi_loader: change efi objects initialization order Revert "test: stabilize test_efi_secboot" efi_loader: signature: replace debug to EFI_PRINT efi_loader: variable: replace debug to EFI_PRINT efi_loader: image_loader: replace debug to EFI_PRINT test/py: efi_secboot: remove all "re.search" test/py: efi_secboot: fix test case 1g of test_authvar Heinrich Schuchardt (9): test: correct time stamps for UEFI authentication efi_loader: fix efi_image_region_add() test: provide tests for efi_image_region_add() efi_loader: add missing validation of timestamp efi_loader: time based authentication efi_loader: use log function in boot manager efi_loader: rtc_mktime() called twice efi_loader: export initialization state efi_loader: imply FAT, FAT_WRITE MAINTAINERS | 1 + include/efi_loader.h | 3 + lib/efi_loader/Kconfig | 2 + lib/efi_loader/efi_bootmgr.c | 26 ++-- lib/efi_loader/efi_image_loader.c | 64 +++++----- lib/efi_loader/efi_setup.c | 9 +- lib/efi_loader/efi_signature.c | 152 +++++++++++----------- lib/efi_loader/efi_variable.c | 52 +++++--- test/lib/Makefile | 1 + test/lib/efi_image_region.c | 163 ++++++++++++++++++++++++ test/py/tests/test_efi_secboot/conftest.py | 16 +-- test/py/tests/test_efi_secboot/test_authvar.py | 91 +++++++------ test/py/tests/test_efi_secboot/test_signed.py | 38 +++--- test/py/tests/test_efi_secboot/test_unsigned.py | 38 +++--- 14 files changed, 420 insertions(+), 236 deletions(-) create mode 100644 test/lib/efi_image_region.c