Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp721274ybt; Wed, 1 Jul 2020 08:30:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyOoUPGnUbpVqU6jIvqPD6HdWvhijqfGOe+izuWZLNYFcAyKR7c+nVUr6WFVUv/9UOmWTkB X-Received: by 2002:aa7:d457:: with SMTP id q23mr26393323edr.376.1593617407205; Wed, 01 Jul 2020 08:30:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593617407; cv=none; d=google.com; s=arc-20160816; b=jgftFseThRPBc5yHz4aw01575Q5tnGOGyll5kQBC2GNBPmK2NuU/e717jUoD2XGpuS ZTuOKBbKj7ydNnLLy2KexTUiqv/qhYtyTp1S5FtnBP8oCYIO8Lkvf2ewa42F6OhDRIX9 k1CkH16+Le/8pmZcIwMlU4MNnfuwkczcq87LuXVeNbkYre/vP5XRenPCH/7mE1Q/ILxD gL5yKuxa4IGtMTrt1v8E2YocE3h9PeCKvBH7TFHnzZNzwbZr8WdlsHfPa66slR4+uPL4 YgwLiG7CInkqno3qYcsmWF5AVljFRc+5rgOGzHHTM/mM3mgt1VVp5DNJqsSgiHOBcWN8 jIyQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=4QQEjP2h/h2cMiKTKDRW2vSLUp6iGLbFJiu3iSW0ZlU=; b=CnHCWe35Xnyziut2mEtwM0qdQR6CJbi8gzOLsNfD9jKj6CWpwM06lLRLLFfnGz90Ah M/4jhVj9DQY8Lrr4eha0Utk8oVfk5VVb7ZcuukL655BsPxiAnlRJot59nhCYcq+88e4d OAgPMyJnBaipZP+1TKGoxXYzKjWj73YanwQqumKj9+zS+wvw2hHFVkxO/dOxa9N3iwIK EPwl558zEiCx5TdbZTReHRQQOidH3wfM5X3VPsFeeVOPW73p08XL2RVx+6GeNmr9zVra Yv4eGmaVDxpPKWBRWbx06R3xsNn+HUSveuh/PxXxEdwqg6fau1moRAXW//Z6dQ6iSK5y TPCQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ygHhpl2S; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b12si4138041ejp.213.2020.07.01.08.29.43; Wed, 01 Jul 2020 08:30:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ygHhpl2S; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731981AbgGAP3J (ORCPT + 99 others); Wed, 1 Jul 2020 11:29:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:57732 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731763AbgGAP3G (ORCPT ); Wed, 1 Jul 2020 11:29:06 -0400 Received: from mail-ot1-f43.google.com (mail-ot1-f43.google.com [209.85.210.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AA2AF2080D; Wed, 1 Jul 2020 15:29:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593617345; bh=6RpV1PcquvB5KGvhSCCiefj50EJSlVYNbwhMO1x1uCc=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=ygHhpl2SmxB+e5wnrEz/3ytMzGGNVa6l1A1Pbt9+PJObGItQapT47KKhK0sNXpVXd 4JxktHJuJAxQ3EHVTZ2zm1HBVQxeTFYzBJj5bHagVuQV0jB4oBst4FCe4RIg+IKqoX klM8tt/oX7hd9Fx9OBSvXkgEOo6mrmjD7VL2TUwA= Received: by mail-ot1-f43.google.com with SMTP id w17so13855864otl.4; Wed, 01 Jul 2020 08:29:05 -0700 (PDT) X-Gm-Message-State: AOAM530tzjqRde6k7YLEKKlG69V9GqhfdrMgO0YUM4HcuoFgfpEdLvti qcMciQRcX2Gzpx0TPjDegmBZgjWbS/dia7Gl58Y= X-Received: by 2002:a9d:688:: with SMTP id 8mr22965465otx.108.1593617344228; Wed, 01 Jul 2020 08:29:04 -0700 (PDT) MIME-Version: 1.0 References: <20200701141731.377252388@hpe.com> <20200701141733.081104906@hpe.com> In-Reply-To: <20200701141733.081104906@hpe.com> From: Ard Biesheuvel Date: Wed, 1 Jul 2020 17:28:52 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [patch 13/13] Remove (now unused) EFI_UV1_MEMMAP from efi.h To: Steve Wahl Cc: Jonathan Corbet , Thomas Gleixner , Ingo Molnar , Borislav Petkov , X86 ML , "H. Peter Anvin" , Darren Hart , Andy Shevchenko , Mauro Carvalho Chehab , Andrew Morton , Greg Kroah-Hartman , "Paul E. McKenney" , Pawan Gupta , Juergen Gross , Mike Kravetz , Oliver Neukum , Mike Travis , Dimitri Sivanich , Benjamin Thiel , Andy Lutomirski , Arnd Bergmann , James Morris , David Howells , Kees Cook , Dave Young , Dan Williams , Logan Gunthorpe , Alexandre Chartre , "Peter Zijlstra (Intel)" , Austin Kim , Alexey Dobriyan , Linux Doc Mailing List , Linux Kernel Mailing List , linux-efi , Russ Anderson Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 1 Jul 2020 at 16:18, wrote: > > With UV1 support removed, EFI_UV1_MEMMAP is no longer used. > > Signed-off-by: Steve Wahl Reviewed-by: Ard Biesheuvel > --- > arch/x86/include/asm/efi.h | 20 ++------------------ > 1 file changed, 2 insertions(+), 18 deletions(-) > > --- linux.orig/arch/x86/include/asm/efi.h 2020-06-17 14:21:49.798542440 -0500 > +++ linux/arch/x86/include/asm/efi.h 2020-06-17 14:28:55.830071857 -0500 > @@ -22,17 +22,7 @@ extern unsigned long efi_fw_vendor, efi_ > * > * This is the main reason why we're doing stable VA mappings for RT > * services. > - * > - * SGI UV1 machines are known to be incompatible with this scheme, so we > - * provide an opt-out for these machines via a DMI quirk that sets the > - * attribute below. > */ > -#define EFI_UV1_MEMMAP EFI_ARCH_1 > - > -static inline bool efi_have_uv1_memmap(void) > -{ > - return IS_ENABLED(CONFIG_X86_UV) && efi_enabled(EFI_UV1_MEMMAP); > -} > > #define EFI32_LOADER_SIGNATURE "EL32" > #define EFI64_LOADER_SIGNATURE "EL64" > @@ -122,9 +112,7 @@ struct efi_scratch { > efi_sync_low_kernel_mappings(); \ > kernel_fpu_begin(); \ > firmware_restrict_branch_speculation_start(); \ > - \ > - if (!efi_have_uv1_memmap()) \ > - efi_switch_mm(&efi_mm); \ > + efi_switch_mm(&efi_mm); \ > }) > > #define arch_efi_call_virt(p, f, args...) \ > @@ -132,9 +120,7 @@ struct efi_scratch { > > #define arch_efi_call_virt_teardown() \ > ({ \ > - if (!efi_have_uv1_memmap()) \ > - efi_switch_mm(efi_scratch.prev_mm); \ > - \ > + efi_switch_mm(efi_scratch.prev_mm); \ > firmware_restrict_branch_speculation_end(); \ > kernel_fpu_end(); \ > }) > @@ -176,8 +162,6 @@ extern void efi_delete_dummy_variable(vo > extern void efi_switch_mm(struct mm_struct *mm); > extern void efi_recover_from_page_fault(unsigned long phys_addr); > extern void efi_free_boot_services(void); > -extern pgd_t * __init efi_uv1_memmap_phys_prolog(void); > -extern void __init efi_uv1_memmap_phys_epilog(pgd_t *save_pgd); > > /* kexec external ABI */ > struct efi_setup_data { >