Home
last modified time | relevance | path

Searched hist:"45 dd403da851124412d32e3193c21de4a51d29da" (Results 1 – 3 of 3) sorted by relevance

/linux/drivers/firmware/efi/libstub/
H A DMakefile.zbootdiff 45dd403da851124412d32e3193c21de4a51d29da Tue Apr 18 15:49:49 CEST 2023 Ard Biesheuvel <ardb@kernel.org> efi/zboot: arm64: Inject kernel code size symbol into the zboot payload

The EFI zboot code is not built as part of the kernel proper, like the
ordinary EFI stub, but still needs access to symbols that are defined
only internally in the kernel, and are left unexposed deliberately to
avoid creating ABI inadvertently that we're stuck with later.

So capture the kernel code size of the kernel image, and inject it as an
ELF symbol into the object that contains the compressed payload, where
it will be accessible to zboot code that needs it.

Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Acked-by: Mark Rutland <mark.rutland@arm.com>
/linux/arch/arm64/boot/
H A DMakefilediff 45dd403da851124412d32e3193c21de4a51d29da Tue Apr 18 15:49:49 CEST 2023 Ard Biesheuvel <ardb@kernel.org> efi/zboot: arm64: Inject kernel code size symbol into the zboot payload

The EFI zboot code is not built as part of the kernel proper, like the
ordinary EFI stub, but still needs access to symbols that are defined
only internally in the kernel, and are left unexposed deliberately to
avoid creating ABI inadvertently that we're stuck with later.

So capture the kernel code size of the kernel image, and inject it as an
ELF symbol into the object that contains the compressed payload, where
it will be accessible to zboot code that needs it.

Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Acked-by: Mark Rutland <mark.rutland@arm.com>
/linux/arch/arm64/kernel/
H A Dimage-vars.hdiff 45dd403da851124412d32e3193c21de4a51d29da Tue Apr 18 15:49:49 CEST 2023 Ard Biesheuvel <ardb@kernel.org> efi/zboot: arm64: Inject kernel code size symbol into the zboot payload

The EFI zboot code is not built as part of the kernel proper, like the
ordinary EFI stub, but still needs access to symbols that are defined
only internally in the kernel, and are left unexposed deliberately to
avoid creating ABI inadvertently that we're stuck with later.

So capture the kernel code size of the kernel image, and inject it as an
ELF symbol into the object that contains the compressed payload, where
it will be accessible to zboot code that needs it.

Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Acked-by: Mark Rutland <mark.rutland@arm.com>