Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1284055ybh; Mon, 13 Jul 2020 14:31:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJycYA9lWn4DMf8h+9RMhe/7pP0SW8EAKdCSCIzbpi2A8u3C3xqDgP5WUNBvw6XsfzrxmgO0 X-Received: by 2002:a17:906:547:: with SMTP id k7mr1556967eja.287.1594675879550; Mon, 13 Jul 2020 14:31:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594675879; cv=none; d=google.com; s=arc-20160816; b=cOP1u/QfQ/zMPWhn/u8JJvHftAPXdl7ypwn7s/LMZnso059+5cbF1wLlc+xi+etLaq vqNN5Vht4oej0OA0roxuXiD4yW+hRNtU6s0X49j2HB3B5MJUCKfM5YLAaIhd3jVSTKtF 1MRc3rAmEBTPr/AYB7fe9mdqOBDciKieHAiHZ/zZVoZL1rARo3TgvPrNhkNEkE/7teDe M0CEFLufxO0mzto79da2u/hzuHC4+oeQ5KlBJW1JoQuSdvscMCORvl6Vg78CXGNNwbk3 hezNa4mzOQgolez97lvBQMmamj9hXplgcHeFUBTjDc904Z+04opdI1eiqseqL5DrYxOV qxIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:subject:cc:to :from:date:user-agent:message-id; bh=UzYj/BNuu5Q8hDEW9NyAg3ltB7nglzVssRLOf7G5OrM=; b=ToWXSkUJXY7AeESGed9lCSE8DM5nNADz048NVLrEBrtlpuEWgFeeN6pEoyJjJx048p bMUV57pD5+nJkEJXzzkTsyiDc7fOKkf++ymu4mAjSgxxUOX5bifanBMO1CpPkN+HVCsn dRYfeM6tLIBVr39hUlVvaroDxzmX/MBSnS9szlT6CLsPm4hHLFjIK5IqdV9hQauoEIPQ bes2JYaq3X5oFD9FeDa8qVupFMQalxhCT255HuvEWxoFK5W2f9sHF0dRz71Sd6Ah1FwN ZDkBKcSK2zOLSISWxfNUOQ3OV2m1gBeQkQo68kWOXn1WoMi121wa0UzXUtbTeotFl+WK CHcg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=hpe.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ox14si9735973ejb.688.2020.07.13.14.30.56; Mon, 13 Jul 2020 14:31:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=hpe.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726782AbgGMVas (ORCPT + 99 others); Mon, 13 Jul 2020 17:30:48 -0400 Received: from mx0b-002e3701.pphosted.com ([148.163.143.35]:55590 "EHLO mx0b-002e3701.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726768AbgGMVar (ORCPT ); Mon, 13 Jul 2020 17:30:47 -0400 Received: from pps.filterd (m0150244.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 06DLDwHD015943; Mon, 13 Jul 2020 21:30:00 GMT Received: from g2t2352.austin.hpe.com (g2t2352.austin.hpe.com [15.233.44.25]) by mx0b-002e3701.pphosted.com with ESMTP id 32763kbeng-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 13 Jul 2020 21:30:00 +0000 Received: from stormcage.eag.rdlabs.hpecorp.net (stormcage.eag.rdlabs.hpecorp.net [128.162.236.70]) by g2t2352.austin.hpe.com (Postfix) with ESMTP id DF6CA63; Mon, 13 Jul 2020 21:29:59 +0000 (UTC) Received: by stormcage.eag.rdlabs.hpecorp.net (Postfix, from userid 200934) id 1EEEB200FA7B1; Mon, 13 Jul 2020 16:29:56 -0500 (CDT) Message-ID: <20200713212956.019149227@hpe.com> User-Agent: quilt/0.66 Date: Mon, 13 Jul 2020 16:30:07 -0500 From: steve.wahl@hpe.com To: Steve Wahl , Jonathan Corbet , Ard Biesheuvel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org, "H. Peter Anvin" , Darren Hart , Andy Shevchenko , Mauro Carvalho Chehab , Andrew Morton , Greg Kroah-Hartman , "Paul E. McKenney" , Pawan Gupta , Juergen Gross , Mike Kravetz , Oliver Neukum , Mike Travis , Dimitri Sivanich , Benjamin Thiel , Andy Lutomirski , Arnd Bergmann , James Morris , David Howells , Kees Cook , Dave Young , Dan Williams , Logan Gunthorpe , Alexandre Chartre , "Peter Zijlstra (Intel)" , Austin Kim , Alexey Dobriyan , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-efi@vger.kernel.org Cc: Russ Anderson Subject: [patch v3 13/13] x86: Remove (now unused) EFI_UV1_MEMMAP from efi.h References: <20200713212954.444086564@hpe.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.235,18.0.687 definitions=2020-07-13_17:2020-07-13,2020-07-13 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 suspectscore=2 priorityscore=1501 bulkscore=0 clxscore=1015 lowpriorityscore=0 malwarescore=0 phishscore=0 mlxlogscore=999 adultscore=0 impostorscore=0 mlxscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2006250000 definitions=main-2007130153 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org With UV1 support removed, EFI_UV1_MEMMAP is no longer used. Signed-off-by: Steve Wahl Reviewed-by: Ard Biesheuvel --- arch/x86/include/asm/efi.h | 20 ++------------------ 1 file changed, 2 insertions(+), 18 deletions(-) --- linux.orig/arch/x86/include/asm/efi.h 2020-07-07 10:49:49.753511000 -0500 +++ linux/arch/x86/include/asm/efi.h 2020-07-07 10:56:15.821045006 -0500 @@ -22,17 +22,7 @@ extern unsigned long efi_fw_vendor, efi_ * * This is the main reason why we're doing stable VA mappings for RT * services. - * - * SGI UV1 machines are known to be incompatible with this scheme, so we - * provide an opt-out for these machines via a DMI quirk that sets the - * attribute below. */ -#define EFI_UV1_MEMMAP EFI_ARCH_1 - -static inline bool efi_have_uv1_memmap(void) -{ - return IS_ENABLED(CONFIG_X86_UV) && efi_enabled(EFI_UV1_MEMMAP); -} #define EFI32_LOADER_SIGNATURE "EL32" #define EFI64_LOADER_SIGNATURE "EL64" @@ -122,9 +112,7 @@ struct efi_scratch { efi_sync_low_kernel_mappings(); \ kernel_fpu_begin(); \ firmware_restrict_branch_speculation_start(); \ - \ - if (!efi_have_uv1_memmap()) \ - efi_switch_mm(&efi_mm); \ + efi_switch_mm(&efi_mm); \ }) #define arch_efi_call_virt(p, f, args...) \ @@ -132,9 +120,7 @@ struct efi_scratch { #define arch_efi_call_virt_teardown() \ ({ \ - if (!efi_have_uv1_memmap()) \ - efi_switch_mm(efi_scratch.prev_mm); \ - \ + efi_switch_mm(efi_scratch.prev_mm); \ firmware_restrict_branch_speculation_end(); \ kernel_fpu_end(); \ }) @@ -176,8 +162,6 @@ extern void efi_delete_dummy_variable(vo extern void efi_switch_mm(struct mm_struct *mm); extern void efi_recover_from_page_fault(unsigned long phys_addr); extern void efi_free_boot_services(void); -extern pgd_t * __init efi_uv1_memmap_phys_prolog(void); -extern void __init efi_uv1_memmap_phys_epilog(pgd_t *save_pgd); /* kexec external ABI */ struct efi_setup_data {