From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-wm1-f73.google.com (mail-wm1-f73.google.com [209.85.128.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 30E7D313E20 for ; Fri, 20 Feb 2026 08:35:41 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.73 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771576542; cv=none; b=SLybHLEGiVi9/qdKxjkBDCf5M2kyXRS5MXmEpvpE70WqzjmEYdA4kqy4L+cIoOOSIx6yIwPQAZDLmwPeS1sfxbDiIG15FEkmHGltwoEIFgOPcovrpnZhjxNZMiNrt4G4IUlRENAq9weBGvYuFu2620MmU6jAqyRwSAx7w5ZJ68U= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771576542; c=relaxed/simple; bh=VqhhWAB53BH0GowGYKptvnlsrvI6G10eP0xTtztaCBg=; h=Date:Mime-Version:Message-ID:Subject:From:To:Cc:Content-Type; b=okG+ey2zvfMzg9lUtrgvWWi2KmD14r9Jrh1Q6tYnrkDjWfbB7vkXWBamkkYNlSp13RvDNAszufnNPO5qz1Xs4FXC7cm+OAB2gjzEBe7/93OdyG5BSzXYqcXBAXQOm5hvbWYacjTEGMM1sj6tiw4O1GxROmDcIbVDnqCzXiQCBsQ= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--ardb.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=ffp3rl1r; arc=none smtp.client-ip=209.85.128.73 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--ardb.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="ffp3rl1r" Received: by mail-wm1-f73.google.com with SMTP id 5b1f17b1804b1-4837bfcfe0dso20176465e9.1 for ; Fri, 20 Feb 2026 00:35:40 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1771576539; x=1772181339; darn=vger.kernel.org; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=wvH+YVVWVNQWsBs3qk+dy7aAbXXiPKtwOWSwPeYHWT0=; b=ffp3rl1rtliYE7j1EE6qkav14FDjzXnLTCE57XeI2v0jli6lcyD+6oGhG7KVU6UXQ6 IVVdWk/pu2xJjqXnpthzO5QJ92BxvBIRpVs1XfgRY0gMXk12cvnIZawnZY1jtmAg3iJ8 Ycmx7e75UWUcxKXU+HCFBJm/Lowu3yxqygtAzQTnsOv9YZ0NUTsSZST1cuF6Ml7NC+2s 53sMv48SCbddzWmDft2tHIiHgUoRPPK8z/60GSQPion8kAHdOvg9Dhr+21ytajbqlfvD 5xCsSOUMgdRSR4dnPZYZK+LS9DKWhKfzsP8vN2BdxkflTGOXhR5Dj4mFSgTDwRvcoSln 4gXg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1771576539; x=1772181339; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=wvH+YVVWVNQWsBs3qk+dy7aAbXXiPKtwOWSwPeYHWT0=; b=alNnESa0RxOy2FSRxnXaTG7XhCPkwXQN4w3qk3wG3CbHA/w7DvvwPayZWd3KtC2H78 ph147UrzcmwODFhjuRLepgGXV2ke/oW5AghxT3ERCst0+ufQ8LSyaqOyKnH0oxmnzDrD 32uSA4etrGp1bTozNKPByyEXzhsPtyf0vSLV7NGRC/FEuBV0XFYVeReGDwwc0Xsrj8nL F/1wH8c8m1wBcuY/7cdhTsCiMZ1c2xY1HabvPGr/Wis9MsD4oIx8ARGIvQr4euVEgKCl JEZqEDvAc0P5Z8/bfswtdusVFvUf+o3FdvdGfVxK+Rw/xRkTUjjnYSByVYlf5DXvKSKd 13CQ== X-Gm-Message-State: AOJu0YyqjHxs+n8+MZvbFKg22DWSU+MVyEBaeBhfczhgCGEDZA/oQII/ l2BN1QE+1kdyGH+8AGUQhIOUb3jecFFtrp2iXUnyGmMJyKgm8PmMhiBECriWbM9tHG9iZeDAdw= = X-Received: from wmpu2.prod.google.com ([2002:a05:600c:4d02:b0:480:2f40:9f85]) (user=ardb job=prod-delivery.src-stubby-dispatcher) by 2002:a05:600c:6814:b0:483:612d:7a5c with SMTP id 5b1f17b1804b1-48379bf5d3cmr371989715e9.25.1771576539336; Fri, 20 Feb 2026 00:35:39 -0800 (PST) Date: Fri, 20 Feb 2026 09:35:32 +0100 Precedence: bulk X-Mailing-List: linux-efi@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 X-Developer-Key: i=ardb@kernel.org; a=openpgp; fpr=F43D03328115A198C90016883D200E9CA6329909 X-Developer-Signature: v=1; a=openpgp-sha256; l=1940; i=ardb@kernel.org; h=from:subject; bh=3UllcstwH+cuqxiFL7b5OAnpuEUWNvGuhxkQg7Oyp8k=; b=owGbwMvMwCVmkMcZplerG8N4Wi2JIXOGzBVuyy17snJspZnS95TNeDAp4bzSjTrpiR3zqrx4Z lxVUpreUcrCIMbFICumyCIw+++7nacnStU6z5KFmcPKBDKEgYtTACbC5cHwh+ugstjetsRdAQ9e dJae17/h8+bLhfW8DI///l32sN5k9XuG/0mmLVdtwqKPFqxNl71VLHxe8cgjd/XUNayCLUtZSjp PMQIA X-Mailer: git-send-email 2.53.0.345.g96ddfc5eaa-goog Message-ID: <20260220083531.1254723-2-ardb+git@google.com> Subject: [GIT PULL] EFI fixes for v7.0 #1 From: Ard Biesheuvel To: torvalds@linux-foundation.org Cc: linux-efi@vger.kernel.org, Ard Biesheuvel Content-Type: text/plain; charset="UTF-8" From: Ard Biesheuvel Hi Linus, Mixed bag of EFI tweaks and bug fixes. Arnd's fix is a build fix that may annoy others so would be good to get it into -rc1, hence sending this now. The following changes since commit 9702969978695d9a699a1f34771580cdbb153b33: Merge tag 'slab-for-7.0-part2' of git://git.kernel.org/pub/scm/linux/kernel/git/vbabka/slab (2026-02-16 13:41:38 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/efi/efi.git tags/efi-fixes-for-v7.0-1 for you to fetch changes up to 948a013a54c47d5eba06e644b99d4927a8bc62f8: efi: Align unaccepted memory range to page boundary (2026-02-18 11:26:20 +0100) ---------------------------------------------------------------- EFI fixes for v7.0 #1 - Add a missing symbol export spotted by Arnd's randconfig testing - Fix kexec from a kernel booted with 'noefi' - Fix memblock handling of the unaccepted memory table - Constify an occurrence of struct efivar_operations - Add Ilias as EFI reviewer ---------------------------------------------------------------- Ard Biesheuvel (1): x86/kexec: Copy ACPI root pointer address from config table Arnd Bergmann (1): efi: export sysfb_primary_display for EDID Ilias Apalodimas (1): MAINTAINERS: Add a reviewer entry for EFI Kiryl Shutsemau (Meta) (2): efi: Fix reservation of unaccepted memory table efi: Align unaccepted memory range to page boundary Krzysztof Kozlowski (1): efi: stmm: Constify struct efivar_operations MAINTAINERS | 1 + arch/x86/kernel/kexec-bzimage64.c | 7 +++++++ drivers/firmware/efi/efi-init.c | 2 +- drivers/firmware/efi/efi.c | 8 ++++---- drivers/firmware/efi/stmm/tee_stmm_efi.c | 17 +++++++++-------- drivers/firmware/efi/unaccepted_memory.c | 10 ++++++++-- 6 files changed, 30 insertions(+), 15 deletions(-)