summaryrefslogtreecommitdiff
path: root/arch/arm64/include/asm
diff options
context:
space:
mode:
authorArd Biesheuvel <ardb@kernel.org>2022-11-30 19:37:17 +0300
committerArd Biesheuvel <ardb@kernel.org>2022-12-01 16:48:26 +0300
commit7572ac3c979d4d0fb42d73a72d2608656516ff4f (patch)
tree1f5d452d5b93e3ac525dbaa04ed9106aa9ba4b18 /arch/arm64/include/asm
parent9b9eaee9828fe98b030cf43ac50065a54a2f5d52 (diff)
downloadlinux-7572ac3c979d4d0fb42d73a72d2608656516ff4f.tar.xz
arm64: efi: Revert "Recover from synchronous exceptions ..."
This reverts commit 23715a26c8d81291, which introduced some code in assembler that manipulates both the ordinary and the shadow call stack pointer in a way that could potentially be taken advantage of. So let's revert it, and do a better job the next time around. Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Diffstat (limited to 'arch/arm64/include/asm')
-rw-r--r--arch/arm64/include/asm/efi.h8
1 files changed, 0 insertions, 8 deletions
diff --git a/arch/arm64/include/asm/efi.h b/arch/arm64/include/asm/efi.h
index d6cf535d8352..439e2bc5d5d8 100644
--- a/arch/arm64/include/asm/efi.h
+++ b/arch/arm64/include/asm/efi.h
@@ -14,16 +14,8 @@
#ifdef CONFIG_EFI
extern void efi_init(void);
-
-bool efi_runtime_fixup_exception(struct pt_regs *regs, const char *msg);
#else
#define efi_init()
-
-static inline
-bool efi_runtime_fixup_exception(struct pt_regs *regs, const char *msg)
-{
- return false;
-}
#endif
int efi_create_mapping(struct mm_struct *mm, efi_memory_desc_t *md);