From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-wr1-f73.google.com (mail-wr1-f73.google.com [209.85.221.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4F5B039A072 for ; Fri, 10 Apr 2026 08:00:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.73 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775808030; cv=none; b=aW2DhcJNX+NBAT7f71N/IOjyWBKKKbyz52WoChjgKHv7uOa37pCVdaWrYT6POYn1rQUv4OZEI3H4Vu9wHuHLhHpFtncBQ0IB0gVMANqvVZXf7OWsB6McjR20vgRbEhsou/vnUUgwJm1UgLxO4YY+Ik2gK9jyEzEDE+jwWIjIDNM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775808030; c=relaxed/simple; bh=KZOdKedRJTaQZyah+9eCfz+YfoGmm7w2ZyA7JVGQMg4=; h=Date:Mime-Version:Message-ID:Subject:From:To:Cc:Content-Type; b=VlyMAb9L/l9vCe9VVpFfdlGEFzebd+dA9b3otow1ieZDAKH6/Dh2dmbeUzovt73FRF0My2PKt02Rc4dPWExih59l/KHt5eDMkSpD+GsWSy60sfVWs+ZqvdMTrWXg8alrplny3jQi16nEV1Kzb0NBNDMsqikDF0goGap+kstCf78= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--ardb.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=nbihcUM2; arc=none smtp.client-ip=209.85.221.73 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--ardb.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="nbihcUM2" Received: by mail-wr1-f73.google.com with SMTP id ffacd0b85a97d-43b8f9374dfso935329f8f.0 for ; Fri, 10 Apr 2026 01:00:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20251104; t=1775808028; x=1776412828; darn=vger.kernel.org; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=dLbVvzFy8D701YVA2BRF24HdYZCjubrUN80gi2rZdHE=; b=nbihcUM2nhhmB8xsEQO/A+MK8LNdCY8a8owrkjPuf0+43+C2CxlT+ranxkywjEkZi6 K+fjG3iuza9fVY2pE1CxkBQUOLgiAYFctJO1tQ0TUWGmAD4h5bbjIVjBaBcgOyJa5Dqz Lf1oIYlg3eniRH5KMrw1uH62ZwjpjRGypjEfgIyUCoUFdvXnQt44XishubtZhvwS9VTo cF+w4LCgf/vLzpczXbO0clJ1QzjZ0cxcf0qeMr3kRqMCVmlWZXv8AIvIjPLm6BLdGfgj uM3wdidFgZeNAxQVCcrr1583kwDvZ5bSeun9eMGuxooIXkb/3cUvuAnYR0TjA/MnlLh+ taCQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1775808028; x=1776412828; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=dLbVvzFy8D701YVA2BRF24HdYZCjubrUN80gi2rZdHE=; b=s7RV5GgpmFd2L2Lmu9nQtHoJB2SV79A6zOZrTePrsDb6IDcPD1WGJp4EgtqCpoLJDm Rp0wNwS3KU90A5ze73ZIw+9SCTup37DnKDDk0zpGmo7syw8rVwH5uw2KC10E+9Ta04fM /yiETG3YRMAsgjxx7VcNrZvP0BA6MASt8d3JkN8kN2kMJWLioCO3eMhsCMD1p7TW/DeE sz5drD/dcc7ukhymR9iKdCRiEOl2HiYXX5pDLiPIuhmBawFj9Zxcznn1B7wPPPPiXHN1 HKNqc0x0JNL1UVfY1dg1sqkob/ISUhK1ohlLAezvibvUamOnTwMMkZLJ1BWngUIQOwvL +o0A== X-Gm-Message-State: AOJu0YySjbWiKchTQyn54NlPE48nEYzLVYjCTGAlHKlIdSnTR7cRwDgX lIgU7bEsk8jTUwVZOXfKflVkfCPoq0j6CPY6K1Hqvk01Oz0H4CAHh0Q/DsNftU5CCdXLuVivMg= = X-Received: from wrrs6.prod.google.com ([2002:a5d:4246:0:b0:43b:63b2:1e5d]) (user=ardb job=prod-delivery.src-stubby-dispatcher) by 2002:a05:6000:3104:b0:43c:f67a:5b50 with SMTP id ffacd0b85a97d-43d6493219fmr2978983f8f.10.1775808027362; Fri, 10 Apr 2026 01:00:27 -0700 (PDT) Date: Fri, 10 Apr 2026 09:59:50 +0200 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 X-Developer-Key: i=ardb@kernel.org; a=openpgp; fpr=F43D03328115A198C90016883D200E9CA6329909 X-Developer-Signature: v=1; a=openpgp-sha256; l=1397; i=ardb@kernel.org; h=from:subject; bh=B48VgGQqLR2SWHpOUkloN+MlJxE8/ErgP8y5RmAT8vg=; b=owGbwMvMwCVmkMcZplerG8N4Wi2JIfPG2u8HT68+vfPgBK5LucZOyoor2Sc3nd3652vykoMBP Bt83Qvvd5SyMIhxMciKKbIIzP77bufpiVK1zrNkYeawMoEMYeDiFICJ/JrPyLD0Sr98720DS+F3 YQZ327d+CTrlWjf/Wdr6XE+WnXcFyn4z/NN5vffmbYF5M+QPc7xUC34fqHuo+MiqiLcRVbKxwlr +0kwA X-Mailer: git-send-email 2.53.0.1213.gd9a14994de-goog Message-ID: <20260410075950.1687350-9-ardb+git@google.com> Subject: [PATCH 0/7] x86/efi: Prepwork for memory map cleanup From: Ard Biesheuvel To: linux-efi@vger.kernel.org Cc: linux-kernel@vger.kernel.org, x86@kernel.org, Ard Biesheuvel Content-Type: text/plain; charset="UTF-8" From: Ard Biesheuvel This is a follow-up to [0], which had some fundamental issues, as spotted by Sashiko [1]. Disentangling the EFI memory map mess on x86 needs a rethink, but some of the prepwork is still worthwhile, and so it is presented here separately. The end goal is still the same, i.e., to remove the need for the x86 boot code to modify the EFI memory map, or reallocate/copy/remap it numerous times. [0] https://lore.kernel.org/all/20260319090529.1091660-21-ardb+git@google.com/ [1] https://sashiko.dev/#/patchset/20260319090529.1091660-21-ardb%2Bgit%40google.com Ard Biesheuvel (7): x86/efi: Omit redundant kernel image overlap check x86/efi: Drop redundant EFI_PARAVIRT check x86/efi: Only merge EFI memory map entries on 32-bit systems x86/efi: Defer sub-1M check from unmap to free stage x86/efi: Simplify real mode trampoline allocation quirk x86/efi: Unmap kernel-reserved boot regions from EFI page tables x86/efi: Drop EFI_MEMORY_RUNTIME check from __ioremap_check_other() arch/x86/include/asm/efi.h | 6 ++ arch/x86/mm/ioremap.c | 7 +- arch/x86/platform/efi/efi.c | 39 +--------- arch/x86/platform/efi/efi_32.c | 31 ++++++++ arch/x86/platform/efi/quirks.c | 78 +++++++------------- 5 files changed, 69 insertions(+), 92 deletions(-) base-commit: 259e3e6f9382b6a9fe570313d97c59a233f7d72f -- 2.53.0.1213.gd9a14994de-goog