linux/arch/x86/platform/efi
Ard Biesheuvel d85e3e3494 efi: xen: Set EFI_PARAVIRT for Xen dom0 boot on all architectures
Currently, the EFI_PARAVIRT flag is only used by Xen dom0 boot on x86,
even though other architectures also support pseudo-EFI boot, where the
core kernel is invoked directly and provided with a set of data tables
that resemble the ones constructed by the EFI stub, which never actually
runs in that case.

Let's fix this inconsistency, and always set this flag when booting dom0
via the EFI boot path. Note that Xen on x86 does not provide the EFI
memory map in this case, whereas other architectures do, so move the
associated EFI_PARAVIRT check into the x86 platform code.

Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
2022-11-18 09:14:09 +01:00
..
efi_32.c efi/x86: Move 32-bit code into efi_32.c 2020-08-20 11:18:36 +02:00
efi_64.c efi/x86-mixed: move unmitigated RET into .rodata 2022-08-16 09:28:05 +02:00
efi_stub_32.S x86: Prepare asm files for straight-line-speculation 2021-12-08 12:25:37 +01:00
efi_stub_64.S x86: Prepare asm files for straight-line-speculation 2021-12-08 12:25:37 +01:00
efi_thunk_64.S efi/x86-mixed: move unmitigated RET into .rodata 2022-08-16 09:28:05 +02:00
efi.c efi: xen: Set EFI_PARAVIRT for Xen dom0 boot on all architectures 2022-11-18 09:14:09 +01:00
fake_mem.c efi: memmap: Move EFI fake memmap support into x86 arch tree 2022-11-18 09:14:09 +01:00
Makefile efi: memmap: Move manipulation routines into x86 arch tree 2022-11-18 09:14:09 +01:00
memmap.c efi: xen: Set EFI_PARAVIRT for Xen dom0 boot on all architectures 2022-11-18 09:14:09 +01:00
quirks.c x86/sme: Explicitly map new EFI memmap table as encrypted 2021-12-05 16:44:52 +01:00