Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp720340ybt; Wed, 1 Jul 2020 08:28:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyi7Ly2eWDoywru7NFMjDuS0wJ7XTE2YwNQaMC9Q2Ou90WzAgUNZOdkdvLeOgql9lOLbM7X X-Received: by 2002:a50:ec93:: with SMTP id e19mr3590741edr.254.1593617334976; Wed, 01 Jul 2020 08:28:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593617334; cv=none; d=google.com; s=arc-20160816; b=egg21lEweng0U6MX4pczu+ITakUBREvqRBh5uIjr6SG/415H0dTCQSmlIVbjt8IBst yNMpPC0avH86wj/JlMU+JLsCQrz3ZvsJVbxWEWi55Jh+3o9GsKgskPKvnVTlQt+4pbFf h6U0+Bn8HVOjzqIRiqyQbQ6s8zF8Jf2JGmBxHp1wl8XzhvJPr/Vttr4SrGSb99u1lmma vi+lOS7csu0e8/qflpYTJEgdiaVjdh9xgehSzxW0PYzwDCJK8pBkeAZvYif7MBkpvn78 FgSPnIju3C4beh87pKpVHuQNUxJRYl/Po6WcGasiKRsQ9pdsoC7pgYwnPmCPtG117N8i 2o0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=o5vI75ZjnaIIPtAuINDRnvryVqT+NRcx9xqoNreBQR4=; b=0y1433sJpiCeIts35s9zn6QDPODSW1WzqDYJpchnzyaAGX4/4PmDixSFfFcgQIeydU Km5wEGIkFvTRqW5m75C7tW+MnRe2yq6EOHko0KDxiqjFdMGKr8fv8NGOKXY5lJPUv+dA EykB8zrGWk23oi0ca013yl6J5lVqXUDeYrlgZyTdiHIFgG68uOAc5WAjawFGb+U03J+N bsVfz8fX0xNN4PQNVA4w1FBx22EaMcmQLCpQY0u736x86E3BFBLvI60LbaMP5u6BLmxW z1LcFC8D7sIGNKwEJvZShKNi1ucbAR+juUSENmPtrAVKdnn+TKBqoYC+htM/t33UtTWu 95Cg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YAjxA7qo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g22si4647731edj.310.2020.07.01.08.28.31; Wed, 01 Jul 2020 08:28:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YAjxA7qo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731948AbgGAPZR (ORCPT + 99 others); Wed, 1 Jul 2020 11:25:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:55392 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731715AbgGAPZR (ORCPT ); Wed, 1 Jul 2020 11:25:17 -0400 Received: from mail-yb1-f169.google.com (mail-yb1-f169.google.com [209.85.219.169]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5F0D820899; Wed, 1 Jul 2020 15:25:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593617116; bh=yRmjzMu9YWj+NOLepjKm+aB0pjmOhF8mZmELt36mcA0=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=YAjxA7qonfZicJTji5t6KrKshQc8SIIF1shTK/aOyeWiOJNB3+/YbRLfQA+BaC+qM PJFwrSlA2jr7+HlaJAsBbo8TrE2pGeqol7bAH3Z1awMtGP8LQJJTZ1Nq1WrjvHz+bC KU+tCPmVN0Du4tkFI1t50hITsOEHx26RR25GMYZs= Received: by mail-yb1-f169.google.com with SMTP id o4so12184547ybp.0; Wed, 01 Jul 2020 08:25:16 -0700 (PDT) X-Gm-Message-State: AOAM530INUP0sylri8YwAYPWl2swvYGLZkkXBs9OJBfPpra4HtfLv1gb 0Xb8Ske1/ItWj4EbawTuQvW4SRvdb+I9ldDlLjA= X-Received: by 2002:a9d:4a8f:: with SMTP id i15mr24502977otf.77.1593617115444; Wed, 01 Jul 2020 08:25:15 -0700 (PDT) MIME-Version: 1.0 References: <20200701141731.377252388@hpe.com> <20200701141732.706351085@hpe.com> In-Reply-To: <20200701141732.706351085@hpe.com> From: Ard Biesheuvel Date: Wed, 1 Jul 2020 17:25:04 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [patch 10/13] Delete SGI UV1 detection. To: Steve Wahl Cc: Jonathan Corbet , Thomas Gleixner , Ingo Molnar , Borislav Petkov , X86 ML , "H. Peter Anvin" , Darren Hart , Andy Shevchenko , Mauro Carvalho Chehab , Andrew Morton , Greg Kroah-Hartman , "Paul E. McKenney" , Pawan Gupta , Juergen Gross , Mike Kravetz , Oliver Neukum , Mike Travis , Dimitri Sivanich , Benjamin Thiel , Andy Lutomirski , Arnd Bergmann , James Morris , David Howells , Kees Cook , Dave Young , Dan Williams , Logan Gunthorpe , Alexandre Chartre , "Peter Zijlstra (Intel)" , Austin Kim , Alexey Dobriyan , Linux Doc Mailing List , Linux Kernel Mailing List , linux-efi , Russ Anderson Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 1 Jul 2020 at 16:18, wrote: > > As a part of UV1 platform removal, don't try to recognize the platform > through DMI to set the EFI_UV1_MEMMAP bit. > > Signed-off-by: Steve Wahl Reviewed-by: Ard Biesheuvel > --- > arch/x86/platform/efi/quirks.c | 23 ----------------------- > 1 file changed, 23 deletions(-) > > --- linux.orig/arch/x86/platform/efi/quirks.c 2020-06-17 14:29:45.510015978 -0500 > +++ linux/arch/x86/platform/efi/quirks.c 2020-06-17 14:36:34.473414139 -0500 > @@ -558,16 +558,6 @@ out: > return ret; > } > > -static const struct dmi_system_id sgi_uv1_dmi[] __initconst = { > - { NULL, "SGI UV1", > - { DMI_MATCH(DMI_PRODUCT_NAME, "Stoutland Platform"), > - DMI_MATCH(DMI_PRODUCT_VERSION, "1.0"), > - DMI_MATCH(DMI_BIOS_VENDOR, "SGI.COM"), > - } > - }, > - { } /* NULL entry stops DMI scanning */ > -}; > - > void __init efi_apply_memmap_quirks(void) > { > /* > @@ -579,17 +569,6 @@ void __init efi_apply_memmap_quirks(void > pr_info("Setup done, disabling due to 32/64-bit mismatch\n"); > efi_memmap_unmap(); > } > - > - /* UV2+ BIOS has a fix for this issue. UV1 still needs the quirk. */ > - if (dmi_check_system(sgi_uv1_dmi)) { > - if (IS_ENABLED(CONFIG_X86_UV)) { > - set_bit(EFI_UV1_MEMMAP, &efi.flags); > - } else { > - pr_warn("EFI runtime disabled, needs CONFIG_X86_UV=y on UV1\n"); > - clear_bit(EFI_RUNTIME_SERVICES, &efi.flags); > - efi_memmap_unmap(); > - } > - } > } > > /* > @@ -723,8 +702,6 @@ void efi_recover_from_page_fault(unsigne > > /* > * Make sure that an efi runtime service caused the page fault. > - * "efi_mm" cannot be used to check if the page fault had occurred > - * in the firmware context because the UV1 memmap doesn't use efi_pgd. > */ > if (efi_rts_work.efi_rts_id == EFI_NONE) > return; >