From patchwork Thu Nov 4 12:54:33 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tim Gardner X-Patchwork-Id: 1550919 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=VWegNvtE; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4HlNv84wk5z9sP7 for ; Thu, 4 Nov 2021 23:56:52 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1micIN-0006zT-RE; Thu, 04 Nov 2021 12:56:43 +0000 Received: from smtp-relay-internal-0.internal ([10.131.114.225] helo=smtp-relay-internal-0.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1micHI-0004it-JA for kernel-team@lists.ubuntu.com; Thu, 04 Nov 2021 12:55:36 +0000 Received: from mail-pg1-f198.google.com (mail-pg1-f198.google.com [209.85.215.198]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id E14953F1F5 for ; Thu, 4 Nov 2021 12:55:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1636030533; bh=dZ35SUXAL4sALgRsI2qfN4NgESDTJ5k78k7/U4TPUt0=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=VWegNvtE6OUVRNnhcLLyKMwkHuUCFSMzgtUc6bu+MhsbLj+htqHXTdyY9mPECi2KX gvP7kpBhhRUJhkxTtsuxp+VcaP7WOVyGLlq7WghXJ9ZgDMvyDZ2Kh7ZnrScvwjFOTu mGK3/IODeD46pFk/NXkZg479SvzyTZj/LflNYnyC0Ld3i6US1RBVA2HrAx2YG5/oj8 t96jKsm+vnH28wBBK7nY673zJF2AhW2BXHVfgaarwOc46cQ3jstIA8UzZxNh298td4 S7EL/Z/+bxbfn1naGEuTXHSWFrjO4AcvSHbZgZWgYpsGfU2b+tgRQVuM4FSb/WXqXs J2I+Nm/kBzGAA== Received: by mail-pg1-f198.google.com with SMTP id h10-20020a63df4a000000b002a6ba425b58so3627294pgj.17 for ; Thu, 04 Nov 2021 05:55:33 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=dZ35SUXAL4sALgRsI2qfN4NgESDTJ5k78k7/U4TPUt0=; b=hU+VR+FMEUenrAXRJX0ODlj48XtoNIz8YU9pTH1ABnTlRbujVj/fLLoZz4OQDG7uPe GpeFZ2280t5AVxMCIIKeHnhPp8BkZPG1hZH0zUWvTlC9weQKSqbZDN6xwhVNCKUyiUqv JJ7NW2PaBMG4PXsZ9zxMqxpSzDOwkTLJ92E6JPn0U0Xgho0n8qMh8os0qcf3Ii3i1MVO 9ukEfX8ntroblXqckmpFtwzBnetXeOfhBhQWa+rg0hNB+YbZEmNQhzCss2xu2nzT61Fx OM6YzBd+ol5EASyz8uxzXJambfoDE9tZhOEtFg02RxNJ84c/dRrHMF+nljNW58YtEmNK yTVg== X-Gm-Message-State: AOAM530J29nWCxzC4jRpbWH/qjJOko5eKyA+y/BvOO5u1sRmyLhPvIgu avCpwPnqv8t6G0NYT1RSh9CfAZtI3XWcj0x4QsP2q/+TJ05cCerPwCI4D9XkTiVR7b4A3hNPamt evTjujqk7pApJMW1p6fvigXzMODZN8o8/mYY9ydWElA== X-Received: by 2002:a05:6a00:1781:b0:44d:faef:f2c0 with SMTP id s1-20020a056a00178100b0044dfaeff2c0mr50992692pfg.68.1636030532217; Thu, 04 Nov 2021 05:55:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzYEnAU4E4fMJW66C/fWhoYxOqgarYQcuyxxOZRrKHFXp86/KwRrJyA4BuAyhgXzccBxH7CCg== X-Received: by 2002:a05:6a00:1781:b0:44d:faef:f2c0 with SMTP id s1-20020a056a00178100b0044dfaeff2c0mr50992665pfg.68.1636030531954; Thu, 04 Nov 2021 05:55:31 -0700 (PDT) Received: from localhost.localdomain ([69.163.84.166]) by smtp.gmail.com with ESMTPSA id y4sm5283859pfi.178.2021.11.04.05.55.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 04 Nov 2021 05:55:31 -0700 (PDT) From: Tim Gardner To: kernel-team@lists.ubuntu.com Subject: [PATCH 25/41] arm64: efi: Export screen_info Date: Thu, 4 Nov 2021 06:54:33 -0600 Message-Id: <20211104125449.16540-26-tim.gardner@canonical.com> X-Mailer: git-send-email 2.33.1 In-Reply-To: <20211104125449.16540-1-tim.gardner@canonical.com> References: <20211104125449.16540-1-tim.gardner@canonical.com> MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" From: Michael Kelley BugLink: https://bugs.launchpad.net/bugs/1949770 The Hyper-V frame buffer driver may be built as a module, and it needs access to screen_info. So export screen_info. Signed-off-by: Michael Kelley Acked-by: Ard Biesheuvel Acked-by: Marc Zyngier Acked-by: Mark Rutland Acked-by: Catalin Marinas Link: https://lore.kernel.org/r/1628092359-61351-5-git-send-email-mikelley@microsoft.com Signed-off-by: Wei Liu (cherry picked from commit 9b16c2132f34316bf0b59d24357a788cc1e9e352) Signed-off-by: Tim Gardner --- arch/arm64/kernel/efi.c | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/arm64/kernel/efi.c b/arch/arm64/kernel/efi.c index fa02efb28e88..e1be6c429810 100644 --- a/arch/arm64/kernel/efi.c +++ b/arch/arm64/kernel/efi.c @@ -55,6 +55,7 @@ static __init pteval_t create_mapping_protection(efi_memory_desc_t *md) /* we will fill this structure from the stub, so don't put it in .bss */ struct screen_info screen_info __section(".data"); +EXPORT_SYMBOL(screen_info); int __init efi_create_mapping(struct mm_struct *mm, efi_memory_desc_t *md) {