diff options
author | Ard Biesheuvel <ardb@kernel.org> | 2022-11-30 19:37:17 +0300 |
---|---|---|
committer | Ard Biesheuvel <ardb@kernel.org> | 2022-12-01 16:48:26 +0300 |
commit | 7572ac3c979d4d0fb42d73a72d2608656516ff4f (patch) | |
tree | 1f5d452d5b93e3ac525dbaa04ed9106aa9ba4b18 /arch/arm64/include/asm | |
parent | 9b9eaee9828fe98b030cf43ac50065a54a2f5d52 (diff) | |
download | linux-7572ac3c979d4d0fb42d73a72d2608656516ff4f.tar.xz |
arm64: efi: Revert "Recover from synchronous exceptions ..."
This reverts commit 23715a26c8d81291, which introduced some code in
assembler that manipulates both the ordinary and the shadow call stack
pointer in a way that could potentially be taken advantage of. So let's
revert it, and do a better job the next time around.
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Diffstat (limited to 'arch/arm64/include/asm')
-rw-r--r-- | arch/arm64/include/asm/efi.h | 8 |
1 files changed, 0 insertions, 8 deletions
diff --git a/arch/arm64/include/asm/efi.h b/arch/arm64/include/asm/efi.h index d6cf535d8352..439e2bc5d5d8 100644 --- a/arch/arm64/include/asm/efi.h +++ b/arch/arm64/include/asm/efi.h @@ -14,16 +14,8 @@ #ifdef CONFIG_EFI extern void efi_init(void); - -bool efi_runtime_fixup_exception(struct pt_regs *regs, const char *msg); #else #define efi_init() - -static inline -bool efi_runtime_fixup_exception(struct pt_regs *regs, const char *msg) -{ - return false; -} #endif int efi_create_mapping(struct mm_struct *mm, efi_memory_desc_t *md); |