Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp2057205pxb; Sat, 2 Apr 2022 13:39:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx34rcBknGwnOhr44LClN2S6I4Ha6LbUQtjZN6pCVgiTn+qOTuOjdYoPcCbks5N6L2FNnaq X-Received: by 2002:a17:90b:1806:b0:1c7:852d:e853 with SMTP id lw6-20020a17090b180600b001c7852de853mr18378686pjb.106.1648931940424; Sat, 02 Apr 2022 13:39:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648931940; cv=none; d=google.com; s=arc-20160816; b=kv+VlD7LNFqR3TXSuQi2IzmdB+jGd7cKxFDIwmmzg0MnlBv+IPIQD4F8jhJTC5+bla Qo80Nysexjf0MK9+oEhBSba/BZTfPSSzRVZ2YpaUucp94foAPU1dS2C8FsuqGrMt6FlB ZXivJS79gWXQCgAo0XSrzbMAQDFszjORacNhfF/KyBcO+xZ6RCm9hTA+7mNhRn167U+v vZb5XzT6sBv19JSZ38LCwprWHKWsNkCZMs8MKRfGX6GCf9rMzpUnJ0Mq4GP3sqnoLDdV rPVT8EDDH+LSL1E1PyR0oHBaaIvzlP779niP0tXH3Qcl8/OUuHHr3pypmJ/Sm2Z/QQr/ pqYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=9VRgzwHFkJ8RpaRTNeTR6bAFNqWwVaF3utM7Zb5436w=; b=aeGL2gIbZQXk1i8qfEv84Q3cLvtT7/w5we1hl8IboGI5jSe5Cp42/g3Or9sggQCyXC S5u2YDlSt7YrksbGKvqWWcQ0LqvRJZ0fy9wRgJskJZ3nCpGfYnORi16GK5GETNxVmSey s5v25JGUB6F8dr+VWIBofC3kbJDlCeCkzYISXDIKD/17LGZEt1yu3JrufGyjSqtDtPv7 FN4YroGvbU1Q3tCCf1THXSGvpIMv8AO2u9uhVayRrH+pGNdJVsol8sReQohVw7iPKWnf Oj9La8TPoyo71+1kwyO3/tQk6Fr+YKN2JUMR+FUv6LmU/ISa2vz6l3KSvFfm7r6uPhkB CncQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Atx2Fv8o; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h7-20020a655187000000b00398ff843754si1789092pgq.461.2022.04.02.13.38.37; Sat, 02 Apr 2022 13:39:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Atx2Fv8o; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243913AbiDAIgM (ORCPT + 99 others); Fri, 1 Apr 2022 04:36:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36116 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230512AbiDAIgJ (ORCPT ); Fri, 1 Apr 2022 04:36:09 -0400 Received: from sin.source.kernel.org (sin.source.kernel.org [IPv6:2604:1380:40e1:4800::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 430FD11CF5E; Fri, 1 Apr 2022 01:34:19 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id A3B36CE2484; Fri, 1 Apr 2022 08:34:17 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 138E6C340F3; Fri, 1 Apr 2022 08:34:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1648802056; bh=Cncuw6yqenexeu+oWaSLLblZjy6J8jeXz+OAjdQ5xtk=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=Atx2Fv8o9O6J/7hIyJtr6yRT8ATN36+yKY6WQql8aA+mqGVD6GzExOjGMs8H/Dcqm c4msXs+fOJLs1qTJhu1aG6HrIBl7PclD7wlpqrZEk9OswZiQhs1pfwHGQlRpsD/e2K 83+pgwzjU3OAmKsPEbrOL6Xvwk7cz4F8kCwkUIFKU7FP/sxlZTMxsKPN7Ov4NXmVQs DLw1uTjt8YS0b/xHpOIoEjKLymTp/GWW34fAvMR0kPbglRWpcKIKGg9VaVpFfuXSUH cTnArqqcKb1DKKIaBnwGCIwzo5HNnzT98CfTEMAhaNCBtpic80B3OXKuO2LcIeWwQF kOrphnZY8WV5w== Received: by mail-oa1-f45.google.com with SMTP id 586e51a60fabf-de3eda6b5dso2038029fac.0; Fri, 01 Apr 2022 01:34:16 -0700 (PDT) X-Gm-Message-State: AOAM531Jl2JyJe3fE0HEMdE1ay4KhxuO1IN2yKRsi3OMVZu5M8LkNcUS aHwbDm2Osts7qdkuZy7k2e5aCtrp2VE2yyL/4wA= X-Received: by 2002:a05:6870:b027:b0:de:7fcd:fabf with SMTP id y39-20020a056870b02700b000de7fcdfabfmr4575684oae.126.1648802055182; Fri, 01 Apr 2022 01:34:15 -0700 (PDT) MIME-Version: 1.0 References: <20220331151654.184433-1-javierm@redhat.com> <78a0360d-1a27-5280-10bf-d27d1d306fa5@redhat.com> In-Reply-To: <78a0360d-1a27-5280-10bf-d27d1d306fa5@redhat.com> From: Ard Biesheuvel Date: Fri, 1 Apr 2022 10:34:03 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v2] efi: Allow to enable EFI runtime services by default on RT To: Javier Martinez Canillas Cc: Sebastian Andrzej Siewior , "Ahmed S. Darwish" , Linux Kernel Mailing List , linux-efi , Brian Masney , Al Stone , Peter Robinson , Robbie Harwood , Peter Jones , Alexander Larsson , Andrew Halaney , linux-rt-users@vger.kernel.org, Thomas Gleixner Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 1 Apr 2022 at 10:33, Javier Martinez Canillas wrote: > > Hello Sebastian, > > On 4/1/22 09:42, Sebastian Andrzej Siewior wrote: > > On 2022-04-01 00:19:57 [+0200], Javier Martinez Canillas wrote: > >>> In case of (CONFIG_PREEMPT_RT=y && CONFIG_EFI_DISABLE_RUNTIME=n), > >>> shouldn't we add a small message in the kernel log warning that EFI > >>> runtime services are enabled for the RT kernel? > >>> > >>> In almost all HW, except custom ones with "verified" firmware, such a > >>> warning would be useful... This is especially true since in the embedded > >> > >> I considered that as well but was not sure about what that message should be. > > > > This makes sense and we had this in the past but dropped it for some > > reason. > > > > Ok, something like the following maybe? If you agree, I'll squash in v3: > > diff --git a/drivers/firmware/efi/efi.c b/drivers/firmware/efi/efi.c > index ff57db8f8d05..08d329a5179b 100644 > --- a/drivers/firmware/efi/efi.c > +++ b/drivers/firmware/efi/efi.c > @@ -362,6 +362,8 @@ static int __init efisubsys_init(void) > > if (!efi_enabled(EFI_RUNTIME_SERVICES)) > efi.runtime_supported_mask = 0; > + else if (IS_ENABLED(CONFIG_PREEMPT_RT)) > + pr_warn("EFI runtime services can lead to high latencies on Real-Time kernels\n"); > > if (!efi_enabled(EFI_BOOT)) > return 0; > I don't think we need another warning. The kernel log already tells you whether or not EFI runtime services are enabled.