Received: by 2002:ac0:e34a:0:0:0:0:0 with SMTP id g10csp346130imn; Wed, 27 Jul 2022 07:53:39 -0700 (PDT) X-Google-Smtp-Source: AGRyM1tlmqh0xhRo+kGhinFkg7mOwWyxyEQrXF6FY6Z9NGwH55qP3zeV8ZvAYjxaHTAJyQaMYOWX X-Received: by 2002:a05:6402:4516:b0:43b:c806:6346 with SMTP id ez22-20020a056402451600b0043bc8066346mr23788453edb.52.1658933618849; Wed, 27 Jul 2022 07:53:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658933618; cv=none; d=google.com; s=arc-20160816; b=RCRHFb5o9wpo94yNnRjpLF52hSVqnB+JKBsIT2RxUPjU7zigb/INkxTc7tc1GCRsH4 Yip3IZHRjRUKKqul9In8AIiDCycB66hKcfQuS8efTiNu03D+8PQV8mZSo2j6RqOgdSu2 EbJFEPFVpEm76dPhKPSQWGfbP956EKFFvRsPA1TMkpMshoSoPzvDUigijETZqrSgyn3o Xym/KPNenIM1UmjqzhbfTOHpqrKhIJaKUv++rXO0gYp+BNfzfEkJ119I07hJErezLa0/ 40ZSSHUpmQCLnWzojOkw1+JUD0BssqqiOyyBZ9Bttoon50A7ercMKt0N8jCpAyU9XUGk 7rmQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=g7sXk1x+mAlIVnjI6mSnBUc3PosDoepD30XFI2Dsmk8=; b=pTO2B85giUdJ6CYhUXTPqoALDS49QC7HhMOFZts8FGXWmR/gOmHb6ECWJY4Hlkdisu yfiLIYKZyZvhDk/tOWbgh7Z/vp4/fneWmLGNBoDTq1916TZvBZmCN/pH3E5Xfp/mN63O 7jm1nKuUwMDAZ3b1kAC+mifJAS2O4esM+QeP8PK+6vXJeGUOPp72Ch3H2V/rQS79OPjw ObKBpGD/p41aOwHxGLDSMGBaglEddfejMOBSi+dfACvDJVp/Ej262jbzou/Zm79YcHZp KRi3yIyHP/U9umTWpWB4EFaOVbDUtnmxC5D6i/2iBwUmBjtz7FRS40fOI6SiVDMw7K3W nw3A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=o03vaz9S; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s26-20020a056402037a00b0043bfa83014esi8010646edw.454.2022.07.27.07.53.13; Wed, 27 Jul 2022 07:53:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=o03vaz9S; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233168AbiG0OGA (ORCPT + 99 others); Wed, 27 Jul 2022 10:06:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35696 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231204AbiG0OF6 (ORCPT ); Wed, 27 Jul 2022 10:05:58 -0400 Received: from mail-qv1-xf2a.google.com (mail-qv1-xf2a.google.com [IPv6:2607:f8b0:4864:20::f2a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 98E5E5F58; Wed, 27 Jul 2022 07:05:57 -0700 (PDT) Received: by mail-qv1-xf2a.google.com with SMTP id mh14so12977947qvb.1; Wed, 27 Jul 2022 07:05:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=g7sXk1x+mAlIVnjI6mSnBUc3PosDoepD30XFI2Dsmk8=; b=o03vaz9SgZGF20HFejqu8j4uk14t+1+Ntu8f8HX38wHE6fda2DYCQTbuj2RG5re4ll CZAinx0CB9KAOb6xR72buzUfZqho5Vg3XXffxwUrvYdC/lrwabGCRM4bEG4hPe6JEOV/ 4E4ginhpyjdaE20FIubMwiaPeIRIReKh9QChah53hBBb6g7mVPTbeBdUrwarbtq3PWm8 KVqjnJ5zDWt7D4aSLMhLc0kFp6dUvMXmmv6EsPZYsr9wLeUqEfm+xgl+tYaifsP+aiRq NQnIARacSJgYXRzG+qsTuv7W9mxZoEy0MTB4pYDDpg0rz4dlTDOeCWBQj6i4QXqOA3Ji rvJg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=g7sXk1x+mAlIVnjI6mSnBUc3PosDoepD30XFI2Dsmk8=; b=EM25ENfm3w1R6lQIKG384aV7i7j5TSDgWCy2JTjT+dypYQufUuUvUwYuQkNdFnyLHJ UmCyhlgxi8xrUX3tJcUn4kih2Wzwpopn5lLPW9iPqezG5QQn9bkCmnd3Uuju9zFoa4Vg C2l8AQcVe8bnV/FSUcCV8ZAp9I3t448UEKKTKcpelfygd0V5sHibGEI5n/8oOBMQrdk7 gY+TWDGo1uE0tQxJfZjZBQlF/5ESKp5xjuHP3hDprvlPzwV49PgnVEB0feiILyPMWiIz 58UnZTmTIkiM9xMr7Bmxbrf3HroKaMJRQxQ7GxQcVqsQoxhFuetEQ3+OKqL5k/rMj9pR YGjQ== X-Gm-Message-State: AJIora8ixmN+h2SUiipo75XAyPIp50MJwKRqNE0VnTUDUGcgtxsXaRYv dg3F945el6msHmJ5BrYp0gMfq1DD/Ws= X-Received: by 2002:a0c:b2d0:0:b0:473:2c19:f1ee with SMTP id d16-20020a0cb2d0000000b004732c19f1eemr19103337qvf.130.1658930756307; Wed, 27 Jul 2022 07:05:56 -0700 (PDT) Received: from mimieux.lan ([38.126.102.198]) by smtp.gmail.com with ESMTPSA id ci23-20020a05622a261700b0031ed8ef7982sm10829015qtb.22.2022.07.27.07.05.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 27 Jul 2022 07:05:56 -0700 (PDT) From: "=?UTF-8?q?Jo=C3=A3o=20Paulo=20Rechi=20Vita?=" X-Google-Original-From: =?UTF-8?q?Jo=C3=A3o=20Paulo=20Rechi=20Vita?= To: Ard Biesheuvel , Jonathan Corbet Cc: linux@endlessos.org, =?UTF-8?q?Jo=C3=A3o=20Paulo=20Rechi=20Vita?= , linux-efi@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] docs: efi-stub: Fix paths for x86 / arm stubs Date: Wed, 27 Jul 2022 10:05:39 -0400 Message-Id: <20220727140539.10021-1-jprvita@endlessos.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This fixes the paths of x86 / arm efi-stub source files. Signed-off-by: João Paulo Rechi Vita --- Documentation/admin-guide/efi-stub.rst | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Documentation/admin-guide/efi-stub.rst b/Documentation/admin-guide/efi-stub.rst index 833edb0d0bc4..b24e7c40d832 100644 --- a/Documentation/admin-guide/efi-stub.rst +++ b/Documentation/admin-guide/efi-stub.rst @@ -7,10 +7,10 @@ as a PE/COFF image, thereby convincing EFI firmware loaders to load it as an EFI executable. The code that modifies the bzImage header, along with the EFI-specific entry point that the firmware loader jumps to are collectively known as the "EFI boot stub", and live in -arch/x86/boot/header.S and arch/x86/boot/compressed/eboot.c, +arch/x86/boot/header.S and drivers/firmware/efi/libstub/x86-stub.c, respectively. For ARM the EFI stub is implemented in arch/arm/boot/compressed/efi-header.S and -arch/arm/boot/compressed/efi-stub.c. EFI stub code that is shared +drivers/firmware/efi/libstub/arm32-stub.c. EFI stub code that is shared between architectures is in drivers/firmware/efi/libstub. For arm64, there is no compressed kernel support, so the Image itself -- 2.20.1