From nobody Wed Apr 1 21:59:41 2026 Received: from mail-wm1-f74.google.com (mail-wm1-f74.google.com [209.85.128.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E28B1401A03 for ; Wed, 1 Apr 2026 12:24:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.74 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775046253; cv=none; b=YL//cqqEnSX2W1jL2+uyayyhj8b26LVdYASFlKnTAwoTcbcjewDMCFvYostOa8Ld/9AQJ54AzGGNeHZIbQwCcWYcKEE2/yyN8Qkl57A/cHnQFT22YWbSf1gTCF5qhZ/iqTcTs174aq1UwGnnqoRr+rEtnbBeEKPEYqV359PxD5Y= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775046253; c=relaxed/simple; bh=Vq83sHeQM3lKtjJXQLWNxKXaNZHPY9RfSEtNN9UDHGg=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=G/Bh0cSmtlNVin1QmoqK5PghecZ0MuBcYEjdvwnwbL/1aZ8PEtOyXjNkZFW5MkIrJaof7SGAar5XuYinyltQTgOZiSMORD6VZv3GD2rkP+4bzLKZkAMSsvDbzKBkH+jJOVd3btAcvNUzYBGliM2RehKHVOAGHdcpgqlDwHrOcCg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--ardb.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=eTmz8knJ; arc=none smtp.client-ip=209.85.128.74 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--ardb.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="eTmz8knJ" Received: by mail-wm1-f74.google.com with SMTP id 5b1f17b1804b1-4887f8a8df3so9567705e9.0 for ; Wed, 01 Apr 2026 05:24:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20251104; t=1775046250; x=1775651050; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=raTovvIuA8BXu/kgHuJxIxG7+Jya4C5OKP0v/N62tFM=; b=eTmz8knJXHvW0G6JA9Z2oS07oT8ys8nhxT1tioj1MG1QzekjcBfdk/R3o+5V86Etfi fWGDynN0Wm3Il93Ka0E4KhuXozuTDeWjp2l9+udnYnBugfy2uyMIq3HjPv2ibEWs2ZxE kKJPCXpoC+FAr9J/Dy6t7ApxkhjRiVgd3JYn5VPGboiYXTXzOMaQvlU9ObU3kEC0n2b4 j/F67T/LSepO/ZxXro7HEeCDzlhcrqZ92uMYmrzDkjrqf/a2H10AbO5dRZNKK2wAYZen orH8NJv9+xjknJRwOqtSGKy0nXZH16ZDTr3NoBMJLfF+FPOu95qUU9gc0J9S1yVdEkQt jqGQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1775046250; x=1775651050; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=raTovvIuA8BXu/kgHuJxIxG7+Jya4C5OKP0v/N62tFM=; b=Ec6nIHksOtIjZeNjhA+OtTwNK+qJfTmgcfQTY+imK0DR07ZUfCuF00ewxO9BpRtkTt 8QbSfwhIL7XdfmJA1BPx9lbGyITbwudyrb+Dod0ttEAlfy5rn/8d05GMOzVJHzd6Vjg9 kg1NFbWa29DN7lnFIggnzFvC8do0A9XgT+03f33UE1OnphZg+J/Qd8okLs7WGZUZhQEw HvdWE8k0f5eKMjpdJinhVQB+I+6lX8iiofrAsnEg7zqaexBUYjCOtn6I3XhpCs2aZrO8 tebuh8YaTO/6LCLTKIXPo0Amk3Xv4QLJ2CppOajx8DV1FCMSswKhRKu/4oE/UMaY3ecF m8rQ== X-Gm-Message-State: AOJu0Yz9xE1HrFXky4Ri7D/BaePZWySPRLB/ANfZ9hKDnazs+NTiIfGz 300TLXZZ5JvbZQ23ioAnJer1cZGQJRi2kD2CnAi0umtsyQgHkdghbgqqP7C2qbVLfBAFi0NDCg= = X-Received: from wmok18.prod.google.com ([2002:a05:600c:4792:b0:488:7891:d1bf]) (user=ardb job=prod-delivery.src-stubby-dispatcher) by 2002:a05:600c:4f95:b0:477:a1a2:d829 with SMTP id 5b1f17b1804b1-4888356754dmr55980545e9.13.1775046250319; Wed, 01 Apr 2026 05:24:10 -0700 (PDT) Date: Wed, 1 Apr 2026 14:23:57 +0200 In-Reply-To: <20260401122351.2058145-7-ardb+git@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20260401122351.2058145-7-ardb+git@google.com> X-Developer-Key: i=ardb@kernel.org; a=openpgp; fpr=F43D03328115A198C90016883D200E9CA6329909 X-Developer-Signature: v=1; a=openpgp-sha256; l=1261; i=ardb@kernel.org; h=from:subject; bh=NDK6hD2ARL8meteiG5vAQnRk28SciK+OGjeHBR0xY18=; b=owGbwMvMwCVmkMcZplerG8N4Wi2JIfMsX/zxj3LaXd+2iK3b45EVEv5lX85yfff0dy1TtjQ4f EqX89buKGVhEONikBVTZBGY/ffdztMTpWqdZ8nCzGFlAhnCwMUpABPprWP475lWaBXEZMr8enVb 3vu9a7P2zd1W+T2KZ0n14WqbsJ9HFRj+6Rk3ps3Kq9qqxsbBxJpQ+eHjaf5TdvuqV7L8f1zv9Oo VKwA= X-Mailer: git-send-email 2.53.0.1118.gaef5881109-goog Message-ID: <20260401122351.2058145-12-ardb+git@google.com> Subject: [PATCH v2 5/5] x86/efi: Drop kexec quirk for the EFI memory attributes table From: Ard Biesheuvel To: linux-efi@vger.kernel.org Cc: linux-kernel@vger.kernel.org, x86@kernel.org, Ard Biesheuvel , Dave Young , Gregory Price , Usama Arif , Jiri Slaby , Breno Leitao Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Ard Biesheuvel Now that the EFI memory attributes table is preserved properly, and the quirk to detect corrupted tables has been updated not to result in false positives when the number of EFI memory map entries is low compared to the number of EFI memory attributes table entries, there is no longer a need to ignore the latter when doing a kexec boot. So drop the workaround. This reverts commit 64b45dd46e15 ("x86/efi: skip memattr table on kexec boot") Signed-off-by: Ard Biesheuvel --- arch/x86/platform/efi/quirks.c | 4 ---- 1 file changed, 4 deletions(-) diff --git a/arch/x86/platform/efi/quirks.c b/arch/x86/platform/efi/quirks.c index 79f0818131e8..98641c621e6c 100644 --- a/arch/x86/platform/efi/quirks.c +++ b/arch/x86/platform/efi/quirks.c @@ -611,10 +611,6 @@ int __init efi_reuse_config(u64 tables, int nr_tables) if (!efi_guidcmp(guid, SMBIOS_TABLE_GUID)) ((efi_config_table_64_t *)p)->table =3D data->smbios; =20 - /* Do not bother to play with mem attr table across kexec */ - if (!efi_guidcmp(guid, EFI_MEMORY_ATTRIBUTES_TABLE_GUID)) - ((efi_config_table_64_t *)p)->table =3D EFI_INVALID_TABLE_ADDR; - p +=3D sz; } early_memunmap(tablep, nr_tables * sz); --=20 2.53.0.1118.gaef5881109-goog