Received: by 10.223.185.116 with SMTP id b49csp3163332wrg; Mon, 5 Mar 2018 15:31:35 -0800 (PST) X-Google-Smtp-Source: AG47ELteGfPliJuECl1JZY/xCeY2rDWbwDvm/Pv5NdoG8r9YroEjKvHOUhwa27B5hb7QxUE/nM9Z X-Received: by 10.167.129.129 with SMTP id g1mr16865548pfi.224.1520292695818; Mon, 05 Mar 2018 15:31:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1520292695; cv=none; d=google.com; s=arc-20160816; b=SmeDslkpKWQXsJV0DBIwfKKM405u5/k3aQLkA07w6BqJWvV5d9in4+cL3f/nszoyAP Y1zFK5dDbEWCfC9+89Ak39Ei0IgAYsgZoTO9ByWulU59FB4RHebn7x9zW8oBQgdqummK CNBBf8H2MbQXJUmC78Joinfll81yfZ8tYf9EiUEw+6o8jJVbwsSvSRdPaYy+YOOdpLFL vplX+a2HJuMl8EAwj5ScXLQauABglIPez31IS6Kto0xMdO+tLv3OoLDXB7oKiRXv7usD hzyrwyUp/ZIqhbWzyP3sMgy44d6KNIHwE/0y4TlujrGSMj8C5VAaXNmmobEz4D7h7xti iMgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=7YEGIisC+51jfGvz9iLvLuvxJ64/2CbXmgQMhQrI+Ko=; b=rzSiWdjiVxzT8lMCoMENYgHB33vH8DmSb5se/jQ3NYAhnHGigmBr+0eGimgqwdhCuk PwF/7dfVQ4hek0SeMKTT86mloluqpYM8tWdr4vRRixaxO/CsirpDTh9IrOuAWgdVmOVP 9L5PkyfCgZu/aX2vZDQZcHS+cyHAkCxQviHok3/3FYvCl/DX+RLriC9T4aA7Pg9wzpQ+ iR5itSVW+9OBQ36xrzC1ab5tajBJhwJ7c3BP41XJxSfMI7/bxAWFqk0nH96NIP+Ulw8P tMcJw1WMJQQDSZ6voyumRb3vNx2fXn7cxavzPRvG0POqPWqpE0sk8zq7PYXTj1Bt7XEC uNaw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u2si6862764pfd.201.2018.03.05.15.31.21; Mon, 05 Mar 2018 15:31:35 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932804AbeCEX3m (ORCPT + 99 others); Mon, 5 Mar 2018 18:29:42 -0500 Received: from mga02.intel.com ([134.134.136.20]:47760 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932395AbeCEX3j (ORCPT ); Mon, 5 Mar 2018 18:29:39 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga101.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 05 Mar 2018 15:29:38 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.47,429,1515484800"; d="scan'208";a="25443526" Received: from sai-dev-mach.sc.intel.com ([143.183.140.145]) by fmsmga002.fm.intel.com with ESMTP; 05 Mar 2018 15:29:38 -0800 From: Sai Praneeth Prakhya To: linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Sai Praneeth , Lee@vger.kernel.org, Chun-Yi , Borislav Petkov , Tony Luck , Will Deacon , Dave Hansen , Mark Rutland , Bhupesh Sharma , Ricardo Neri , Ravi Shankar , Matt Fleming , Peter Zijlstra , Ard Biesheuvel , Dan Williams Subject: [PATCH V2 1/3] x86/efi: Call efi_delete_dummy_variable() during efi subsystem initialization Date: Mon, 5 Mar 2018 15:23:08 -0800 Message-Id: <1520292190-5027-2-git-send-email-sai.praneeth.prakhya@intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1520292190-5027-1-git-send-email-sai.praneeth.prakhya@intel.com> References: <1520292190-5027-1-git-send-email-sai.praneeth.prakhya@intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sai Praneeth Invoking efi_runtime_services() through efi_workqueue means all accesses to efi_runtime_services() should be done after efi_rts_wq has been created. efi_delete_dummy_variable() calls set_variable(), hence efi_delete_dummy_variable() should be called after efi_rts_wq has been created. efi_delete_dummy_variable() is called from efi_enter_virtual_mode() which is early in the boot phase (efi_rts_wq isn't created yet), so call efi_delete_dummy_variable() later in the boot phase i.e. while initializing efi subsystem. In the next patch, this is the place where we create efi_rts_wq and all the efi_runtime_services() will be called using efi_rts_wq. Signed-off-by: Sai Praneeth Prakhya Suggested-by: Andy Lutomirski Cc: Lee, Chun-Yi Cc: Borislav Petkov Cc: Tony Luck Cc: Will Deacon Cc: Dave Hansen Cc: Mark Rutland Cc: Bhupesh Sharma Cc: Ricardo Neri Cc: Ravi Shankar Cc: Matt Fleming Cc: Peter Zijlstra Cc: Ard Biesheuvel Cc: Dan Williams --- arch/x86/include/asm/efi.h | 1 - arch/x86/platform/efi/efi.c | 6 ------ drivers/firmware/efi/efi.c | 6 ++++++ include/linux/efi.h | 3 +++ 4 files changed, 9 insertions(+), 7 deletions(-) diff --git a/arch/x86/include/asm/efi.h b/arch/x86/include/asm/efi.h index a399c1ebf6f0..43009e3f821b 100644 --- a/arch/x86/include/asm/efi.h +++ b/arch/x86/include/asm/efi.h @@ -143,7 +143,6 @@ extern void __init efi_runtime_update_mappings(void); extern void __init efi_dump_pagetable(void); extern void __init efi_apply_memmap_quirks(void); extern int __init efi_reuse_config(u64 tables, int nr_tables); -extern void efi_delete_dummy_variable(void); struct efi_setup_data { u64 fw_vendor; diff --git a/arch/x86/platform/efi/efi.c b/arch/x86/platform/efi/efi.c index 9061babfbc83..a3169d14583f 100644 --- a/arch/x86/platform/efi/efi.c +++ b/arch/x86/platform/efi/efi.c @@ -893,9 +893,6 @@ static void __init kexec_enter_virtual_mode(void) if (efi_enabled(EFI_OLD_MEMMAP) && (__supported_pte_mask & _PAGE_NX)) runtime_code_page_mkexec(); - - /* clean DUMMY object */ - efi_delete_dummy_variable(); #endif } @@ -1015,9 +1012,6 @@ static void __init __efi_enter_virtual_mode(void) * necessary relocation fixups for the new virtual addresses. */ efi_runtime_update_mappings(); - - /* clean DUMMY object */ - efi_delete_dummy_variable(); } void __init efi_enter_virtual_mode(void) diff --git a/drivers/firmware/efi/efi.c b/drivers/firmware/efi/efi.c index cd42f66a7c85..838b8efe639c 100644 --- a/drivers/firmware/efi/efi.c +++ b/drivers/firmware/efi/efi.c @@ -328,6 +328,12 @@ static int __init efisubsys_init(void) if (!efi_enabled(EFI_BOOT)) return 0; + /* + * Clean DUMMY object calls EFI Runtime Service, set_variable(), so + * it should be invoked only after efi_rts_workqueue is ready. + */ + efi_delete_dummy_variable(); + /* We register the efi directory at /sys/firmware/efi */ efi_kobj = kobject_create_and_add("efi", firmware_kobj); if (!efi_kobj) { diff --git a/include/linux/efi.h b/include/linux/efi.h index f5083aa72eae..c4efb3ef0dfa 100644 --- a/include/linux/efi.h +++ b/include/linux/efi.h @@ -992,6 +992,7 @@ extern efi_status_t efi_query_variable_store(u32 attributes, unsigned long size, bool nonblocking); extern void efi_find_mirror(void); +extern void efi_delete_dummy_variable(void); #else static inline void efi_late_init(void) {} static inline void efi_free_boot_services(void) {} @@ -1002,6 +1003,8 @@ static inline efi_status_t efi_query_variable_store(u32 attributes, { return EFI_SUCCESS; } + +static inline void efi_delete_dummy_variable(void) {} #endif extern void __iomem *efi_lookup_mapped_addr(u64 phys_addr); -- 2.7.4