summaryrefslogtreecommitdiffstats
path: root/drivers/firmware
diff options
context:
space:
mode:
authorSasha Levin <sashal@kernel.org>2019-03-11 20:28:23 -0400
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2019-03-23 08:44:28 +0100
commita20168a138368f4d470923f0d446bfcc827fe745 (patch)
treef15b23c4958cffb737683cd1736c3aece36ed53c /drivers/firmware
parenta264be2b41088ed423f5610e8d0b8e923b4c32af (diff)
downloadlinux-stable-a20168a138368f4d470923f0d446bfcc827fe745.tar.gz
linux-stable-a20168a138368f4d470923f0d446bfcc827fe745.tar.bz2
linux-stable-a20168a138368f4d470923f0d446bfcc827fe745.zip
Revert "x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls"
This reverts commit 7212e37cbdf99f48e4a6c689a42f4bda1ae69001. Hedi Berriche <hedi.berriche@hpe.com> notes: > In 4.4-stable efi_runtime_lock as defined in drivers/firmware/efi/runtime-wrappers.c > is a spinlock (given it predates commit dce48e351c0d) and commit > > f331e766c4be x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls > > which 7212e37cbdf9 is a backport of, needs it to be a semaphore. Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'drivers/firmware')
-rw-r--r--drivers/firmware/efi/runtime-wrappers.c7
1 files changed, 0 insertions, 7 deletions
diff --git a/drivers/firmware/efi/runtime-wrappers.c b/drivers/firmware/efi/runtime-wrappers.c
index 906d0224f50d..228bbf910461 100644
--- a/drivers/firmware/efi/runtime-wrappers.c
+++ b/drivers/firmware/efi/runtime-wrappers.c
@@ -88,13 +88,6 @@ static DEFINE_SPINLOCK(efi_runtime_lock);
*/
/*
- * Expose the EFI runtime lock to the UV platform
- */
-#ifdef CONFIG_X86_UV
-extern struct semaphore __efi_uv_runtime_lock __alias(efi_runtime_lock);
-#endif
-
-/*
* As per commit ef68c8f87ed1 ("x86: Serialize EFI time accesses on rtc_lock"),
* the EFI specification requires that callers of the time related runtime
* functions serialize with other CMOS accesses in the kernel, as the EFI time