diff options
author | Sasha Levin <sashal@kernel.org> | 2019-03-11 20:28:23 -0400 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2019-03-23 08:44:28 +0100 |
commit | a20168a138368f4d470923f0d446bfcc827fe745 (patch) | |
tree | f15b23c4958cffb737683cd1736c3aece36ed53c /drivers/firmware | |
parent | a264be2b41088ed423f5610e8d0b8e923b4c32af (diff) | |
download | linux-stable-a20168a138368f4d470923f0d446bfcc827fe745.tar.gz linux-stable-a20168a138368f4d470923f0d446bfcc827fe745.tar.bz2 linux-stable-a20168a138368f4d470923f0d446bfcc827fe745.zip |
Revert "x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls"
This reverts commit 7212e37cbdf99f48e4a6c689a42f4bda1ae69001.
Hedi Berriche <hedi.berriche@hpe.com> notes:
> In 4.4-stable efi_runtime_lock as defined in drivers/firmware/efi/runtime-wrappers.c
> is a spinlock (given it predates commit dce48e351c0d) and commit
>
> f331e766c4be x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls
>
> which 7212e37cbdf9 is a backport of, needs it to be a semaphore.
Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'drivers/firmware')
-rw-r--r-- | drivers/firmware/efi/runtime-wrappers.c | 7 |
1 files changed, 0 insertions, 7 deletions
diff --git a/drivers/firmware/efi/runtime-wrappers.c b/drivers/firmware/efi/runtime-wrappers.c index 906d0224f50d..228bbf910461 100644 --- a/drivers/firmware/efi/runtime-wrappers.c +++ b/drivers/firmware/efi/runtime-wrappers.c @@ -88,13 +88,6 @@ static DEFINE_SPINLOCK(efi_runtime_lock); */ /* - * Expose the EFI runtime lock to the UV platform - */ -#ifdef CONFIG_X86_UV -extern struct semaphore __efi_uv_runtime_lock __alias(efi_runtime_lock); -#endif - -/* * As per commit ef68c8f87ed1 ("x86: Serialize EFI time accesses on rtc_lock"), * the EFI specification requires that callers of the time related runtime * functions serialize with other CMOS accesses in the kernel, as the EFI time |