From nobody Thu Apr 2 21:51:30 2026 Received: from mail-wm1-f73.google.com (mail-wm1-f73.google.com [209.85.128.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7F7133C5DB3 for ; Thu, 26 Mar 2026 13:27:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.73 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1774531643; cv=none; b=oWQREzx6B+q6NWbcflnJ3+cla+OO363Ar8FF6rsks07iyvQWo8JhFT1Oc+UYAoWZOTYlSlRvYD1+Tmx3UL+ncoOuAMV+AQ8hcNnBmGonawXRZYWrsS2Sq8rHWmGzA0Gw0dyG4FuBOulP+LghUMkm7OQ2kDZxez9qfkAE5+inyy4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1774531643; c=relaxed/simple; bh=rIk1R7y8NoaK+vucCth0wMIHQJyh4Ht8VsH1WDQOKj0=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=JK6H1vJoB4Tp3qYNhWcMriP/9VLBDuk0aG5IP/7eCO4+Fb+4VQVs5xL80xcagLP+S7f/oyIYiAc66euuz6v+dJjBbuZhPAJaHYQK7LF8ONdyNIIexE1KabzLUdwW6un6gMrGgblvoF+WvaF0YPyLU4ue4jXAfokV4jtpjlzu+Jk= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--ardb.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=W3sta5gC; arc=none smtp.client-ip=209.85.128.73 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--ardb.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="W3sta5gC" Received: by mail-wm1-f73.google.com with SMTP id 5b1f17b1804b1-4871fc50fe7so6189295e9.0 for ; Thu, 26 Mar 2026 06:27:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20251104; t=1774531641; x=1775136441; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=yCzf4aZhl663HYafsBCQA23EEnogYYWjlMdO1fVHwXE=; b=W3sta5gCcAcCeKhrIaC3gDcyhaoPp50EgyamzebY6vN3PzDlBwKCKqnktjlVh+fnaD 1v2EMVHi6lhspFlUpLAXYBfEMpQ6mA4mztHclRifxLMZYUjDYNikvG1f93rWdKR0sTsy 1ZFYcOEXWrOX83EsZQfebmwPt1nbhfp/Ptyt5U0fmUJa3SrCHK1bKk6x6MftGhhfVTg2 nujQ1TU8sjGNLohgqfPKRQGu2trsWTvYhopRIzPjmMG3xGxZB1oQzIFiEfJUQXXpXIlE LtCNOVhXKsxkn1IU+huUYqd+2YzJJdRTB9z163e+3SeWc7F/NTLL9fv3/UuxXD+QBk1y bydQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1774531641; x=1775136441; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=yCzf4aZhl663HYafsBCQA23EEnogYYWjlMdO1fVHwXE=; b=J9SXHCpXkzDcuZsx0dD2kArdSxJy0Gyv/BtqFeqO7SxrdaJgLqxDhJaBN8BUgJ3a5+ 6t84FDw66RpCMhEoRDidVCoc/BzvFEMf6mjQ76Yl5qUo4KF8L9dPzYCRIZbUPGQYWG2C sbqwSHVjjVeKrU9F5D1H+h/Tmwd4DZkply74KZrun45gO2ueu6Sq/TmBdK/um1mWRmcy lvdR2vBK6Zem3y86QpCAIQwf6z9ffvLYdAqYQkzwzFUV60cIKRo7wfjg2jmuGzBh/hHd YM0oxJ7BIT+vLNp9XB22zsrJCKiFODXgZYRCybG86LzOXWEEOugxOLH7KvMLZCCECJ42 lNXg== X-Gm-Message-State: AOJu0YxvuVeb9c6NAOAUz0ukouAQ99qv16L13nAW73zInlTIQuyB66Tv tZ9MrKhzy7Kdeu6B80gdW7O2HNwQFU+MJlhSwCbNVa6QWFLx6Xnp9ifw3/P4I4BvATzqZCNKlQ= = X-Received: from wmcq23.prod.google.com ([2002:a05:600c:c117:b0:480:4be7:3f3a]) (user=ardb job=prod-delivery.src-stubby-dispatcher) by 2002:a05:600c:3309:b0:487:219e:416 with SMTP id 5b1f17b1804b1-487219e0550mr20341805e9.8.1774531640788; Thu, 26 Mar 2026 06:27:20 -0700 (PDT) Date: Thu, 26 Mar 2026 14:27:01 +0100 In-Reply-To: <20260326132655.1733873-7-ardb+git@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20260326132655.1733873-7-ardb+git@google.com> X-Developer-Key: i=ardb@kernel.org; a=openpgp; fpr=F43D03328115A198C90016883D200E9CA6329909 X-Developer-Signature: v=1; a=openpgp-sha256; l=1261; i=ardb@kernel.org; h=from:subject; bh=9/p1gplyiVkCrjGlrbWLto/adyUX/ujHd1AFZTagrlM=; b=owGbwMvMwCVmkMcZplerG8N4Wi2JIfOoiVpW2xyxydyfz1+q+cdayjs5xtukQrfgz8S+R8fnP Cldu/JnRykLgxgXg6yYIovA7L/vdp6eKFXrPEsWZg4rE8gQBi5OAZjI5umMDN8uWemEikyrXcjE qyPyQu7h7mt3Lii5XvS70nY5+OHXzR8ZGb7UalSv5eM5liUjFPFu2sXvEy8pMQbVeCV2TZ5wfYv WXw4A X-Mailer: git-send-email 2.53.0.1018.g2bb0e51243-goog Message-ID: <20260326132655.1733873-12-ardb+git@google.com> Subject: [PATCH 5/5] x86/efi: Drop kexec quirk for the EFI memory attributes table From: Ard Biesheuvel To: linux-efi@vger.kernel.org Cc: linux-kernel@vger.kernel.org, x86@kernel.org, Ard Biesheuvel , Dave Young , Gregory Price , Usama Arif , Jiri Slaby , Breno Leitao Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Ard Biesheuvel Now that the EFI memory attributes table is preserved properly, and the quirk to detect corrupted tables has been updated not to result in false positives when the number of EFI memory map entries is low compared to the number of EFI memory attributes table entries, there is no longer a need to ignore the latter when doing a kexec boot. So drop the workaround. This reverts commit 64b45dd46e15 ("x86/efi: skip memattr table on kexec boot") Signed-off-by: Ard Biesheuvel --- arch/x86/platform/efi/quirks.c | 4 ---- 1 file changed, 4 deletions(-) diff --git a/arch/x86/platform/efi/quirks.c b/arch/x86/platform/efi/quirks.c index 79f0818131e8..98641c621e6c 100644 --- a/arch/x86/platform/efi/quirks.c +++ b/arch/x86/platform/efi/quirks.c @@ -611,10 +611,6 @@ int __init efi_reuse_config(u64 tables, int nr_tables) if (!efi_guidcmp(guid, SMBIOS_TABLE_GUID)) ((efi_config_table_64_t *)p)->table =3D data->smbios; =20 - /* Do not bother to play with mem attr table across kexec */ - if (!efi_guidcmp(guid, EFI_MEMORY_ATTRIBUTES_TABLE_GUID)) - ((efi_config_table_64_t *)p)->table =3D EFI_INVALID_TABLE_ADDR; - p +=3D sz; } early_memunmap(tablep, nr_tables * sz); --=20 2.53.0.1018.g2bb0e51243-goog