blob: 69f00f7453a34c386237f4b2344f66a05f3c67fc [file] [log] [blame]
Thomas Gleixner55716d22019-06-01 10:08:42 +02001// SPDX-License-Identifier: GPL-2.0-only
Tom Gundersena9499fa2013-02-08 15:37:06 +00002/*
3 * efi.c - EFI subsystem
4 *
5 * Copyright (C) 2001,2003,2004 Dell <Matt_Domsch@dell.com>
6 * Copyright (C) 2004 Intel Corporation <matthew.e.tolentino@intel.com>
7 * Copyright (C) 2013 Tom Gundersen <teg@jklm.no>
8 *
9 * This code registers /sys/firmware/efi{,/efivars} when EFI is supported,
10 * allowing the efivarfs to be mounted or the efivars module to be loaded.
11 * The existance of /sys/firmware/efi may also be used by userspace to
12 * determine that the system supports EFI.
Tom Gundersena9499fa2013-02-08 15:37:06 +000013 */
14
Leif Lindholm272686b2013-09-05 11:34:54 +010015#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
16
Tom Gundersena9499fa2013-02-08 15:37:06 +000017#include <linux/kobject.h>
18#include <linux/module.h>
19#include <linux/init.h>
20#include <linux/device.h>
21#include <linux/efi.h>
Mark Salter0302f712013-12-30 12:12:12 -050022#include <linux/of.h>
23#include <linux/of_fdt.h>
Leif Lindholm272686b2013-09-05 11:34:54 +010024#include <linux/io.h>
Ard Biesheuvel63625982016-11-12 21:32:31 +000025#include <linux/kexec.h>
Lee, Chun-Yi28d54022014-07-09 18:39:29 +080026#include <linux/platform_device.h>
Ard Biesheuvel63625982016-11-12 21:32:31 +000027#include <linux/random.h>
28#include <linux/reboot.h>
Octavian Purdila475fb4e2016-07-08 19:13:12 +030029#include <linux/slab.h>
30#include <linux/acpi.h>
31#include <linux/ucs2_string.h>
Matt Fleming816e7612016-02-29 21:22:52 +000032#include <linux/memblock.h>
Matthew Garrett1957a85b2019-08-19 17:18:04 -070033#include <linux/security.h>
Leif Lindholm272686b2013-09-05 11:34:54 +010034
Ard Biesheuvel0f7f2f02016-01-12 14:22:46 +010035#include <asm/early_ioremap.h>
Ard Biesheuvelf7d92482015-11-30 13:28:19 +010036
Leif Lindholm272686b2013-09-05 11:34:54 +010037struct efi __read_mostly efi = {
Ard Biesheuvelbf924862015-09-09 10:08:15 +020038 .mps = EFI_INVALID_TABLE_ADDR,
39 .acpi = EFI_INVALID_TABLE_ADDR,
40 .acpi20 = EFI_INVALID_TABLE_ADDR,
41 .smbios = EFI_INVALID_TABLE_ADDR,
42 .smbios3 = EFI_INVALID_TABLE_ADDR,
Ard Biesheuvelbf924862015-09-09 10:08:15 +020043 .boot_info = EFI_INVALID_TABLE_ADDR,
44 .hcdp = EFI_INVALID_TABLE_ADDR,
45 .uga = EFI_INVALID_TABLE_ADDR,
Ard Biesheuvelbf924862015-09-09 10:08:15 +020046 .fw_vendor = EFI_INVALID_TABLE_ADDR,
47 .runtime = EFI_INVALID_TABLE_ADDR,
48 .config_table = EFI_INVALID_TABLE_ADDR,
49 .esrt = EFI_INVALID_TABLE_ADDR,
50 .properties_table = EFI_INVALID_TABLE_ADDR,
Ard Biesheuvela604af02016-04-25 21:06:44 +010051 .mem_attr_table = EFI_INVALID_TABLE_ADDR,
Ard Biesheuvel63625982016-11-12 21:32:31 +000052 .rng_seed = EFI_INVALID_TABLE_ADDR,
Ard Biesheuvel71e09402018-09-21 09:32:44 -070053 .tpm_log = EFI_INVALID_TABLE_ADDR,
Matthew Garrettc46f3402019-05-20 13:54:59 -070054 .tpm_final_log = EFI_INVALID_TABLE_ADDR,
Ard Biesheuvel71e09402018-09-21 09:32:44 -070055 .mem_reserve = EFI_INVALID_TABLE_ADDR,
Leif Lindholm272686b2013-09-05 11:34:54 +010056};
57EXPORT_SYMBOL(efi);
Tom Gundersena9499fa2013-02-08 15:37:06 +000058
Sai Praneeth7e904a92018-03-12 08:44:56 +000059struct mm_struct efi_mm = {
60 .mm_rb = RB_ROOT,
61 .mm_users = ATOMIC_INIT(2),
62 .mm_count = ATOMIC_INIT(1),
63 .mmap_sem = __RWSEM_INITIALIZER(efi_mm.mmap_sem),
64 .page_table_lock = __SPIN_LOCK_UNLOCKED(efi_mm.page_table_lock),
65 .mmlist = LIST_HEAD_INIT(efi_mm.mmlist),
Rik van Rielc1a2f7f2018-07-16 15:03:31 -040066 .cpu_bitmap = { [BITS_TO_LONGS(NR_CPUS)] = 0},
Sai Praneeth7e904a92018-03-12 08:44:56 +000067};
68
Sai Praneeth3eb420e2018-07-11 11:40:35 +020069struct workqueue_struct *efi_rts_wq;
70
Dave Youngb2e0a542014-08-14 17:15:26 +080071static bool disable_runtime;
72static int __init setup_noefi(char *arg)
73{
74 disable_runtime = true;
75 return 0;
76}
77early_param("noefi", setup_noefi);
78
79bool efi_runtime_disabled(void)
80{
81 return disable_runtime;
82}
83
Dave Young5ae36832014-08-14 17:15:28 +080084static int __init parse_efi_cmdline(char *str)
85{
Ricardo Neri9115c752015-07-15 19:36:03 -070086 if (!str) {
87 pr_warn("need at least one option\n");
88 return -EINVAL;
89 }
90
Leif Lindholm12dd00e2015-08-26 14:24:56 +010091 if (parse_option_str(str, "debug"))
92 set_bit(EFI_DBG, &efi.flags);
93
Dave Young5ae36832014-08-14 17:15:28 +080094 if (parse_option_str(str, "noruntime"))
95 disable_runtime = true;
96
97 return 0;
98}
99early_param("efi", parse_efi_cmdline);
100
Peter Jones0bb54902015-04-28 18:44:31 -0400101struct kobject *efi_kobj;
Tom Gundersena9499fa2013-02-08 15:37:06 +0000102
103/*
104 * Let's not leave out systab information that snuck into
105 * the efivars driver
Dave Young0b02e442017-12-06 09:50:10 +0000106 * Note, do not add more fields in systab sysfs file as it breaks sysfs
107 * one value per file rule!
Tom Gundersena9499fa2013-02-08 15:37:06 +0000108 */
109static ssize_t systab_show(struct kobject *kobj,
110 struct kobj_attribute *attr, char *buf)
111{
112 char *str = buf;
113
114 if (!kobj || !buf)
115 return -EINVAL;
116
117 if (efi.mps != EFI_INVALID_TABLE_ADDR)
118 str += sprintf(str, "MPS=0x%lx\n", efi.mps);
119 if (efi.acpi20 != EFI_INVALID_TABLE_ADDR)
120 str += sprintf(str, "ACPI20=0x%lx\n", efi.acpi20);
121 if (efi.acpi != EFI_INVALID_TABLE_ADDR)
122 str += sprintf(str, "ACPI=0x%lx\n", efi.acpi);
Jean Delvareb119fe02015-04-30 15:23:05 +0200123 /*
124 * If both SMBIOS and SMBIOS3 entry points are implemented, the
125 * SMBIOS3 entry point shall be preferred, so we list it first to
126 * let applications stop parsing after the first match.
127 */
Ard Biesheuvele1ccbbc2014-10-14 16:34:47 +0200128 if (efi.smbios3 != EFI_INVALID_TABLE_ADDR)
129 str += sprintf(str, "SMBIOS3=0x%lx\n", efi.smbios3);
Jean Delvareb119fe02015-04-30 15:23:05 +0200130 if (efi.smbios != EFI_INVALID_TABLE_ADDR)
131 str += sprintf(str, "SMBIOS=0x%lx\n", efi.smbios);
Tom Gundersena9499fa2013-02-08 15:37:06 +0000132 if (efi.hcdp != EFI_INVALID_TABLE_ADDR)
133 str += sprintf(str, "HCDP=0x%lx\n", efi.hcdp);
134 if (efi.boot_info != EFI_INVALID_TABLE_ADDR)
135 str += sprintf(str, "BOOTINFO=0x%lx\n", efi.boot_info);
136 if (efi.uga != EFI_INVALID_TABLE_ADDR)
137 str += sprintf(str, "UGA=0x%lx\n", efi.uga);
138
139 return str - buf;
140}
141
Greg Kroah-Hartmanaf97a772017-12-06 09:50:08 +0000142static struct kobj_attribute efi_attr_systab = __ATTR_RO_MODE(systab, 0400);
Tom Gundersena9499fa2013-02-08 15:37:06 +0000143
Dave Younga0998eb2013-12-20 18:02:17 +0800144#define EFI_FIELD(var) efi.var
145
146#define EFI_ATTR_SHOW(name) \
147static ssize_t name##_show(struct kobject *kobj, \
148 struct kobj_attribute *attr, char *buf) \
149{ \
150 return sprintf(buf, "0x%lx\n", EFI_FIELD(name)); \
151}
152
153EFI_ATTR_SHOW(fw_vendor);
154EFI_ATTR_SHOW(runtime);
155EFI_ATTR_SHOW(config_table);
156
Steve McIntyre2859dff2015-01-09 15:29:53 +0000157static ssize_t fw_platform_size_show(struct kobject *kobj,
158 struct kobj_attribute *attr, char *buf)
159{
160 return sprintf(buf, "%d\n", efi_enabled(EFI_64BIT) ? 64 : 32);
161}
162
Dave Younga0998eb2013-12-20 18:02:17 +0800163static struct kobj_attribute efi_attr_fw_vendor = __ATTR_RO(fw_vendor);
164static struct kobj_attribute efi_attr_runtime = __ATTR_RO(runtime);
165static struct kobj_attribute efi_attr_config_table = __ATTR_RO(config_table);
Steve McIntyre2859dff2015-01-09 15:29:53 +0000166static struct kobj_attribute efi_attr_fw_platform_size =
167 __ATTR_RO(fw_platform_size);
Dave Younga0998eb2013-12-20 18:02:17 +0800168
Tom Gundersena9499fa2013-02-08 15:37:06 +0000169static struct attribute *efi_subsys_attrs[] = {
170 &efi_attr_systab.attr,
Dave Younga0998eb2013-12-20 18:02:17 +0800171 &efi_attr_fw_vendor.attr,
172 &efi_attr_runtime.attr,
173 &efi_attr_config_table.attr,
Steve McIntyre2859dff2015-01-09 15:29:53 +0000174 &efi_attr_fw_platform_size.attr,
Dave Younga0998eb2013-12-20 18:02:17 +0800175 NULL,
Tom Gundersena9499fa2013-02-08 15:37:06 +0000176};
177
Dave Younga0998eb2013-12-20 18:02:17 +0800178static umode_t efi_attr_is_visible(struct kobject *kobj,
179 struct attribute *attr, int n)
180{
Daniel Kiper9f27bc52014-06-30 19:52:58 +0200181 if (attr == &efi_attr_fw_vendor.attr) {
182 if (efi_enabled(EFI_PARAVIRT) ||
183 efi.fw_vendor == EFI_INVALID_TABLE_ADDR)
184 return 0;
185 } else if (attr == &efi_attr_runtime.attr) {
186 if (efi.runtime == EFI_INVALID_TABLE_ADDR)
187 return 0;
188 } else if (attr == &efi_attr_config_table.attr) {
189 if (efi.config_table == EFI_INVALID_TABLE_ADDR)
190 return 0;
191 }
Dave Younga0998eb2013-12-20 18:02:17 +0800192
Daniel Kiper9f27bc52014-06-30 19:52:58 +0200193 return attr->mode;
Dave Younga0998eb2013-12-20 18:02:17 +0800194}
195
Arvind Yadav3ad6bd72017-08-18 20:49:46 +0100196static const struct attribute_group efi_subsys_attr_group = {
Tom Gundersena9499fa2013-02-08 15:37:06 +0000197 .attrs = efi_subsys_attrs,
Dave Younga0998eb2013-12-20 18:02:17 +0800198 .is_visible = efi_attr_is_visible,
Tom Gundersena9499fa2013-02-08 15:37:06 +0000199};
200
201static struct efivars generic_efivars;
202static struct efivar_operations generic_ops;
203
204static int generic_ops_register(void)
205{
206 generic_ops.get_variable = efi.get_variable;
207 generic_ops.set_variable = efi.set_variable;
Ard Biesheuvel9c6672a2016-02-01 22:06:55 +0000208 generic_ops.set_variable_nonblocking = efi.set_variable_nonblocking;
Tom Gundersena9499fa2013-02-08 15:37:06 +0000209 generic_ops.get_next_variable = efi.get_next_variable;
Matt Fleminga614e192013-04-30 11:30:24 +0100210 generic_ops.query_variable_store = efi_query_variable_store;
Tom Gundersena9499fa2013-02-08 15:37:06 +0000211
212 return efivars_register(&generic_efivars, &generic_ops, efi_kobj);
213}
214
215static void generic_ops_unregister(void)
216{
217 efivars_unregister(&generic_efivars);
218}
219
Octavian Purdila475fb4e2016-07-08 19:13:12 +0300220#if IS_ENABLED(CONFIG_ACPI)
221#define EFIVAR_SSDT_NAME_MAX 16
222static char efivar_ssdt[EFIVAR_SSDT_NAME_MAX] __initdata;
223static int __init efivar_ssdt_setup(char *str)
224{
Matthew Garrett1957a85b2019-08-19 17:18:04 -0700225 int ret = security_locked_down(LOCKDOWN_ACPI_TABLES);
226
227 if (ret)
228 return ret;
229
Octavian Purdila475fb4e2016-07-08 19:13:12 +0300230 if (strlen(str) < sizeof(efivar_ssdt))
231 memcpy(efivar_ssdt, str, strlen(str));
232 else
233 pr_warn("efivar_ssdt: name too long: %s\n", str);
234 return 0;
235}
236__setup("efivar_ssdt=", efivar_ssdt_setup);
237
238static __init int efivar_ssdt_iter(efi_char16_t *name, efi_guid_t vendor,
239 unsigned long name_size, void *data)
240{
241 struct efivar_entry *entry;
242 struct list_head *list = data;
243 char utf8_name[EFIVAR_SSDT_NAME_MAX];
244 int limit = min_t(unsigned long, EFIVAR_SSDT_NAME_MAX, name_size);
245
246 ucs2_as_utf8(utf8_name, name, limit - 1);
247 if (strncmp(utf8_name, efivar_ssdt, limit) != 0)
248 return 0;
249
250 entry = kmalloc(sizeof(*entry), GFP_KERNEL);
251 if (!entry)
252 return 0;
253
254 memcpy(entry->var.VariableName, name, name_size);
255 memcpy(&entry->var.VendorGuid, &vendor, sizeof(efi_guid_t));
256
257 efivar_entry_add(entry, list);
258
259 return 0;
260}
261
262static __init int efivar_ssdt_load(void)
263{
264 LIST_HEAD(entries);
265 struct efivar_entry *entry, *aux;
266 unsigned long size;
267 void *data;
268 int ret;
269
Ard Biesheuvelc05f8f92019-10-02 18:58:59 +0200270 if (!efivar_ssdt[0])
271 return 0;
272
Octavian Purdila475fb4e2016-07-08 19:13:12 +0300273 ret = efivar_init(efivar_ssdt_iter, &entries, true, &entries);
274
275 list_for_each_entry_safe(entry, aux, &entries, list) {
276 pr_info("loading SSDT from variable %s-%pUl\n", efivar_ssdt,
277 &entry->var.VendorGuid);
278
279 list_del(&entry->list);
280
281 ret = efivar_entry_size(entry, &size);
282 if (ret) {
283 pr_err("failed to get var size\n");
284 goto free_entry;
285 }
286
287 data = kmalloc(size, GFP_KERNEL);
Dan Carpentera75dcb52016-10-18 15:33:18 +0100288 if (!data) {
289 ret = -ENOMEM;
Octavian Purdila475fb4e2016-07-08 19:13:12 +0300290 goto free_entry;
Dan Carpentera75dcb52016-10-18 15:33:18 +0100291 }
Octavian Purdila475fb4e2016-07-08 19:13:12 +0300292
293 ret = efivar_entry_get(entry, NULL, &size, data);
294 if (ret) {
295 pr_err("failed to get var data\n");
296 goto free_data;
297 }
298
299 ret = acpi_load_table(data);
300 if (ret) {
301 pr_err("failed to load table: %d\n", ret);
302 goto free_data;
303 }
304
305 goto free_entry;
306
307free_data:
308 kfree(data);
309
310free_entry:
311 kfree(entry);
312 }
313
314 return ret;
315}
316#else
317static inline int efivar_ssdt_load(void) { return 0; }
318#endif
319
Tom Gundersena9499fa2013-02-08 15:37:06 +0000320/*
321 * We register the efi subsystem with the firmware subsystem and the
322 * efivars subsystem with the efi subsystem, if the system was booted with
323 * EFI.
324 */
325static int __init efisubsys_init(void)
326{
327 int error;
328
329 if (!efi_enabled(EFI_BOOT))
330 return 0;
331
Sai Praneeth3eb420e2018-07-11 11:40:35 +0200332 /*
333 * Since we process only one efi_runtime_service() at a time, an
334 * ordered workqueue (which creates only one execution context)
335 * should suffice all our needs.
336 */
337 efi_rts_wq = alloc_ordered_workqueue("efi_rts_wq", 0);
338 if (!efi_rts_wq) {
339 pr_err("Creating efi_rts_wq failed, EFI runtime services disabled.\n");
340 clear_bit(EFI_RUNTIME_SERVICES, &efi.flags);
341 return 0;
342 }
343
Tom Gundersena9499fa2013-02-08 15:37:06 +0000344 /* We register the efi directory at /sys/firmware/efi */
345 efi_kobj = kobject_create_and_add("efi", firmware_kobj);
346 if (!efi_kobj) {
347 pr_err("efi: Firmware registration failed.\n");
348 return -ENOMEM;
349 }
350
351 error = generic_ops_register();
352 if (error)
353 goto err_put;
354
Octavian Purdila475fb4e2016-07-08 19:13:12 +0300355 if (efi_enabled(EFI_RUNTIME_SERVICES))
356 efivar_ssdt_load();
357
Tom Gundersena9499fa2013-02-08 15:37:06 +0000358 error = sysfs_create_group(efi_kobj, &efi_subsys_attr_group);
359 if (error) {
360 pr_err("efi: Sysfs attribute export failed with error %d.\n",
361 error);
362 goto err_unregister;
363 }
364
Dave Young926172d2013-12-20 18:02:18 +0800365 error = efi_runtime_map_init(efi_kobj);
366 if (error)
367 goto err_remove_group;
368
Tom Gundersena9499fa2013-02-08 15:37:06 +0000369 /* and the standard mountpoint for efivarfs */
Eric W. Biedermanf9bb4882015-05-13 17:35:41 -0500370 error = sysfs_create_mount_point(efi_kobj, "efivars");
371 if (error) {
Tom Gundersena9499fa2013-02-08 15:37:06 +0000372 pr_err("efivars: Subsystem registration failed.\n");
Tom Gundersena9499fa2013-02-08 15:37:06 +0000373 goto err_remove_group;
374 }
375
376 return 0;
377
378err_remove_group:
379 sysfs_remove_group(efi_kobj, &efi_subsys_attr_group);
380err_unregister:
381 generic_ops_unregister();
382err_put:
383 kobject_put(efi_kobj);
384 return error;
385}
386
387subsys_initcall(efisubsys_init);
Leif Lindholm272686b2013-09-05 11:34:54 +0100388
Peter Jones0bb54902015-04-28 18:44:31 -0400389/*
390 * Find the efi memory descriptor for a given physical address. Given a
Matt Flemingdca0f972016-02-27 15:52:50 +0000391 * physical address, determine if it exists within an EFI Memory Map entry,
Peter Jones0bb54902015-04-28 18:44:31 -0400392 * and if so, populate the supplied memory descriptor with the appropriate
393 * data.
394 */
Ard Biesheuvel7e1550b2018-07-11 11:40:39 +0200395int efi_mem_desc_lookup(u64 phys_addr, efi_memory_desc_t *out_md)
Peter Jones0bb54902015-04-28 18:44:31 -0400396{
Matt Flemingdca0f972016-02-27 15:52:50 +0000397 efi_memory_desc_t *md;
Peter Jones0bb54902015-04-28 18:44:31 -0400398
399 if (!efi_enabled(EFI_MEMMAP)) {
400 pr_err_once("EFI_MEMMAP is not enabled.\n");
401 return -EINVAL;
402 }
403
Peter Jones0bb54902015-04-28 18:44:31 -0400404 if (!out_md) {
405 pr_err_once("out_md is null.\n");
406 return -EINVAL;
407 }
Peter Jones0bb54902015-04-28 18:44:31 -0400408
Matt Flemingdca0f972016-02-27 15:52:50 +0000409 for_each_efi_memory_desc(md) {
Peter Jones0bb54902015-04-28 18:44:31 -0400410 u64 size;
411 u64 end;
412
Peter Jones0bb54902015-04-28 18:44:31 -0400413 size = md->num_pages << EFI_PAGE_SHIFT;
414 end = md->phys_addr + size;
415 if (phys_addr >= md->phys_addr && phys_addr < end) {
416 memcpy(out_md, md, sizeof(*out_md));
Peter Jones0bb54902015-04-28 18:44:31 -0400417 return 0;
418 }
Peter Jones0bb54902015-04-28 18:44:31 -0400419 }
Peter Jones0bb54902015-04-28 18:44:31 -0400420 return -ENOENT;
421}
422
423/*
424 * Calculate the highest address of an efi memory descriptor.
425 */
426u64 __init efi_mem_desc_end(efi_memory_desc_t *md)
427{
428 u64 size = md->num_pages << EFI_PAGE_SHIFT;
429 u64 end = md->phys_addr + size;
430 return end;
431}
Leif Lindholm272686b2013-09-05 11:34:54 +0100432
Matt Fleming816e7612016-02-29 21:22:52 +0000433void __init __weak efi_arch_mem_reserve(phys_addr_t addr, u64 size) {}
434
435/**
436 * efi_mem_reserve - Reserve an EFI memory region
437 * @addr: Physical address to reserve
438 * @size: Size of reservation
439 *
440 * Mark a region as reserved from general kernel allocation and
441 * prevent it being released by efi_free_boot_services().
442 *
443 * This function should be called drivers once they've parsed EFI
444 * configuration tables to figure out where their data lives, e.g.
445 * efi_esrt_init().
446 */
447void __init efi_mem_reserve(phys_addr_t addr, u64 size)
448{
449 if (!memblock_is_region_reserved(addr, size))
450 memblock_reserve(addr, size);
451
452 /*
453 * Some architectures (x86) reserve all boot services ranges
454 * until efi_free_boot_services() because of buggy firmware
455 * implementations. This means the above memblock_reserve() is
456 * superfluous on x86 and instead what it needs to do is
457 * ensure the @start, @size is not freed.
458 */
459 efi_arch_mem_reserve(addr, size);
460}
461
Leif Lindholm272686b2013-09-05 11:34:54 +0100462static __initdata efi_config_table_type_t common_tables[] = {
463 {ACPI_20_TABLE_GUID, "ACPI 2.0", &efi.acpi20},
464 {ACPI_TABLE_GUID, "ACPI", &efi.acpi},
465 {HCDP_TABLE_GUID, "HCDP", &efi.hcdp},
466 {MPS_TABLE_GUID, "MPS", &efi.mps},
Leif Lindholm272686b2013-09-05 11:34:54 +0100467 {SMBIOS_TABLE_GUID, "SMBIOS", &efi.smbios},
Ard Biesheuvele1ccbbc2014-10-14 16:34:47 +0200468 {SMBIOS3_TABLE_GUID, "SMBIOS 3.0", &efi.smbios3},
Leif Lindholm272686b2013-09-05 11:34:54 +0100469 {UGA_IO_PROTOCOL_GUID, "UGA", &efi.uga},
Peter Jones0bb54902015-04-28 18:44:31 -0400470 {EFI_SYSTEM_RESOURCE_TABLE_GUID, "ESRT", &efi.esrt},
Ard Biesheuvelbf924862015-09-09 10:08:15 +0200471 {EFI_PROPERTIES_TABLE_GUID, "PROP", &efi.properties_table},
Ard Biesheuvela604af02016-04-25 21:06:44 +0100472 {EFI_MEMORY_ATTRIBUTES_TABLE_GUID, "MEMATTR", &efi.mem_attr_table},
Ard Biesheuvel63625982016-11-12 21:32:31 +0000473 {LINUX_EFI_RANDOM_SEED_TABLE_GUID, "RNG", &efi.rng_seed},
Thiebaud Weksteen33b6d032017-09-20 10:13:39 +0200474 {LINUX_EFI_TPM_EVENT_LOG_GUID, "TPMEventLog", &efi.tpm_log},
Matthew Garrettc46f3402019-05-20 13:54:59 -0700475 {LINUX_EFI_TPM_FINAL_LOG_GUID, "TPMFinalLog", &efi.tpm_final_log},
Ard Biesheuvel71e09402018-09-21 09:32:44 -0700476 {LINUX_EFI_MEMRESERVE_TABLE_GUID, "MEMRESERVE", &efi.mem_reserve},
Narendra K1c5fecb2019-07-10 18:59:15 +0000477#ifdef CONFIG_EFI_RCI2_TABLE
478 {DELLEMC_EFI_RCI2_TABLE_GUID, NULL, &rci2_table_phys},
479#endif
Daeseok Youn69e60842014-02-13 17:16:36 +0900480 {NULL_GUID, NULL, NULL},
Leif Lindholm272686b2013-09-05 11:34:54 +0100481};
482
483static __init int match_config_table(efi_guid_t *guid,
484 unsigned long table,
485 efi_config_table_type_t *table_types)
486{
Leif Lindholm272686b2013-09-05 11:34:54 +0100487 int i;
488
489 if (table_types) {
Leif Lindholm272686b2013-09-05 11:34:54 +0100490 for (i = 0; efi_guidcmp(table_types[i].guid, NULL_GUID); i++) {
Leif Lindholm272686b2013-09-05 11:34:54 +0100491 if (!efi_guidcmp(*guid, table_types[i].guid)) {
492 *(table_types[i].ptr) = table;
Ard Biesheuvel801820b2016-04-25 21:06:53 +0100493 if (table_types[i].name)
494 pr_cont(" %s=0x%lx ",
495 table_types[i].name, table);
Leif Lindholm272686b2013-09-05 11:34:54 +0100496 return 1;
497 }
498 }
499 }
500
501 return 0;
502}
503
Ard Biesheuvel7bb68412014-10-18 15:04:15 +0200504int __init efi_config_parse_tables(void *config_tables, int count, int sz,
505 efi_config_table_type_t *arch_tables)
506{
507 void *tablep;
508 int i;
509
510 tablep = config_tables;
511 pr_info("");
512 for (i = 0; i < count; i++) {
513 efi_guid_t guid;
514 unsigned long table;
515
516 if (efi_enabled(EFI_64BIT)) {
517 u64 table64;
518 guid = ((efi_config_table_64_t *)tablep)->guid;
519 table64 = ((efi_config_table_64_t *)tablep)->table;
520 table = table64;
521#ifndef CONFIG_64BIT
522 if (table64 >> 32) {
523 pr_cont("\n");
524 pr_err("Table located above 4GB, disabling EFI.\n");
525 return -EINVAL;
526 }
527#endif
528 } else {
529 guid = ((efi_config_table_32_t *)tablep)->guid;
530 table = ((efi_config_table_32_t *)tablep)->table;
531 }
532
533 if (!match_config_table(&guid, table, common_tables))
534 match_config_table(&guid, table, arch_tables);
535
536 tablep += sz;
537 }
538 pr_cont("\n");
539 set_bit(EFI_CONFIG_TABLES, &efi.flags);
Ard Biesheuvela1041712015-09-23 07:29:34 -0700540
Ard Biesheuvel63625982016-11-12 21:32:31 +0000541 if (efi.rng_seed != EFI_INVALID_TABLE_ADDR) {
542 struct linux_efi_random_seed *seed;
543 u32 size = 0;
544
545 seed = early_memremap(efi.rng_seed, sizeof(*seed));
546 if (seed != NULL) {
547 size = seed->size;
548 early_memunmap(seed, sizeof(*seed));
549 } else {
550 pr_err("Could not map UEFI random seed!\n");
551 }
552 if (size > 0) {
553 seed = early_memremap(efi.rng_seed,
554 sizeof(*seed) + size);
555 if (seed != NULL) {
Ard Biesheuvel5b4e4c32018-03-08 08:00:18 +0000556 pr_notice("seeding entropy pool\n");
Ard Biesheuvel63625982016-11-12 21:32:31 +0000557 add_device_randomness(seed->bits, seed->size);
558 early_memunmap(seed, sizeof(*seed) + size);
559 } else {
560 pr_err("Could not map UEFI random seed!\n");
561 }
562 }
563 }
564
Daniel Kiper457ea3f2017-06-22 12:51:36 +0200565 if (efi_enabled(EFI_MEMMAP))
566 efi_memattr_init();
Sai Praneeth3a6b6c62017-01-31 13:21:35 +0000567
Thiebaud Weksteen33b6d032017-09-20 10:13:39 +0200568 efi_tpm_eventlog_init();
569
Ard Biesheuvela1041712015-09-23 07:29:34 -0700570 /* Parse the EFI Properties table if it exists */
571 if (efi.properties_table != EFI_INVALID_TABLE_ADDR) {
572 efi_properties_table_t *tbl;
573
574 tbl = early_memremap(efi.properties_table, sizeof(*tbl));
575 if (tbl == NULL) {
576 pr_err("Could not map Properties table!\n");
577 return -ENOMEM;
578 }
579
580 if (tbl->memory_protection_attribute &
581 EFI_PROPERTIES_RUNTIME_MEMORY_PROTECTION_NON_EXECUTABLE_PE_DATA)
582 set_bit(EFI_NX_PE_DATA, &efi.flags);
583
584 early_memunmap(tbl, sizeof(*tbl));
585 }
586
Ard Biesheuvel71e09402018-09-21 09:32:44 -0700587 if (efi.mem_reserve != EFI_INVALID_TABLE_ADDR) {
588 unsigned long prsv = efi.mem_reserve;
589
590 while (prsv) {
591 struct linux_efi_memreserve *rsv;
Ard Biesheuvel5f0b0ec2018-11-29 18:12:28 +0100592 u8 *p;
593 int i;
Ard Biesheuvel71e09402018-09-21 09:32:44 -0700594
Ard Biesheuvel5f0b0ec2018-11-29 18:12:28 +0100595 /*
596 * Just map a full page: that is what we will get
597 * anyway, and it permits us to map the entire entry
598 * before knowing its size.
599 */
600 p = early_memremap(ALIGN_DOWN(prsv, PAGE_SIZE),
601 PAGE_SIZE);
602 if (p == NULL) {
Ard Biesheuvel71e09402018-09-21 09:32:44 -0700603 pr_err("Could not map UEFI memreserve entry!\n");
604 return -ENOMEM;
605 }
606
Ard Biesheuvel5f0b0ec2018-11-29 18:12:28 +0100607 rsv = (void *)(p + prsv % PAGE_SIZE);
608
609 /* reserve the entry itself */
610 memblock_reserve(prsv, EFI_MEMRESERVE_SIZE(rsv->size));
611
612 for (i = 0; i < atomic_read(&rsv->count); i++) {
613 memblock_reserve(rsv->entry[i].base,
614 rsv->entry[i].size);
615 }
Ard Biesheuvel71e09402018-09-21 09:32:44 -0700616
617 prsv = rsv->next;
Ard Biesheuvel5f0b0ec2018-11-29 18:12:28 +0100618 early_memunmap(p, PAGE_SIZE);
Ard Biesheuvel71e09402018-09-21 09:32:44 -0700619 }
620 }
621
Ard Biesheuvel7bb68412014-10-18 15:04:15 +0200622 return 0;
623}
624
Leif Lindholm272686b2013-09-05 11:34:54 +0100625int __init efi_config_init(efi_config_table_type_t *arch_tables)
626{
Ard Biesheuvel7bb68412014-10-18 15:04:15 +0200627 void *config_tables;
628 int sz, ret;
Leif Lindholm272686b2013-09-05 11:34:54 +0100629
Rob Bradford88447c52019-05-25 13:25:59 +0200630 if (efi.systab->nr_tables == 0)
631 return 0;
632
Leif Lindholm272686b2013-09-05 11:34:54 +0100633 if (efi_enabled(EFI_64BIT))
634 sz = sizeof(efi_config_table_64_t);
635 else
636 sz = sizeof(efi_config_table_32_t);
637
638 /*
639 * Let's see what config tables the firmware passed to us.
640 */
641 config_tables = early_memremap(efi.systab->tables,
642 efi.systab->nr_tables * sz);
643 if (config_tables == NULL) {
644 pr_err("Could not map Configuration table!\n");
645 return -ENOMEM;
646 }
647
Ard Biesheuvel7bb68412014-10-18 15:04:15 +0200648 ret = efi_config_parse_tables(config_tables, efi.systab->nr_tables, sz,
649 arch_tables);
Leif Lindholm272686b2013-09-05 11:34:54 +0100650
Daniel Kiperabc93f82014-06-30 19:52:56 +0200651 early_memunmap(config_tables, efi.systab->nr_tables * sz);
Ard Biesheuvel7bb68412014-10-18 15:04:15 +0200652 return ret;
Leif Lindholm272686b2013-09-05 11:34:54 +0100653}
Mark Salter0302f712013-12-30 12:12:12 -0500654
Lee, Chun-Yi28d54022014-07-09 18:39:29 +0800655#ifdef CONFIG_EFI_VARS_MODULE
656static int __init efi_load_efivars(void)
657{
658 struct platform_device *pdev;
659
660 if (!efi_enabled(EFI_RUNTIME_SERVICES))
661 return 0;
662
663 pdev = platform_device_register_simple("efivars", 0, NULL, 0);
Vasyl Gomonovych50342b22018-01-02 18:10:40 +0000664 return PTR_ERR_OR_ZERO(pdev);
Lee, Chun-Yi28d54022014-07-09 18:39:29 +0800665}
666device_initcall(efi_load_efivars);
667#endif
668
Mark Salter0302f712013-12-30 12:12:12 -0500669#ifdef CONFIG_EFI_PARAMS_FROM_FDT
670
671#define UEFI_PARAM(name, prop, field) \
672 { \
673 { name }, \
674 { prop }, \
675 offsetof(struct efi_fdt_params, field), \
676 FIELD_SIZEOF(struct efi_fdt_params, field) \
677 }
678
Shannon Zhao0cac5c32016-05-12 20:19:54 +0800679struct params {
Mark Salter0302f712013-12-30 12:12:12 -0500680 const char name[32];
681 const char propname[32];
682 int offset;
683 int size;
Shannon Zhao0cac5c32016-05-12 20:19:54 +0800684};
685
686static __initdata struct params fdt_params[] = {
Mark Salter0302f712013-12-30 12:12:12 -0500687 UEFI_PARAM("System Table", "linux,uefi-system-table", system_table),
688 UEFI_PARAM("MemMap Address", "linux,uefi-mmap-start", mmap),
689 UEFI_PARAM("MemMap Size", "linux,uefi-mmap-size", mmap_size),
690 UEFI_PARAM("MemMap Desc. Size", "linux,uefi-mmap-desc-size", desc_size),
691 UEFI_PARAM("MemMap Desc. Version", "linux,uefi-mmap-desc-ver", desc_ver)
692};
693
Shannon Zhao0cac5c32016-05-12 20:19:54 +0800694static __initdata struct params xen_fdt_params[] = {
695 UEFI_PARAM("System Table", "xen,uefi-system-table", system_table),
696 UEFI_PARAM("MemMap Address", "xen,uefi-mmap-start", mmap),
697 UEFI_PARAM("MemMap Size", "xen,uefi-mmap-size", mmap_size),
698 UEFI_PARAM("MemMap Desc. Size", "xen,uefi-mmap-desc-size", desc_size),
699 UEFI_PARAM("MemMap Desc. Version", "xen,uefi-mmap-desc-ver", desc_ver)
700};
701
702#define EFI_FDT_PARAMS_SIZE ARRAY_SIZE(fdt_params)
703
704static __initdata struct {
705 const char *uname;
706 const char *subnode;
707 struct params *params;
708} dt_params[] = {
709 { "hypervisor", "uefi", xen_fdt_params },
710 { "chosen", NULL, fdt_params },
711};
712
Mark Salter0302f712013-12-30 12:12:12 -0500713struct param_info {
Catalin Marinas29e24352014-07-08 16:54:18 +0100714 int found;
Mark Salter0302f712013-12-30 12:12:12 -0500715 void *params;
Shannon Zhao0cac5c32016-05-12 20:19:54 +0800716 const char *missing;
Mark Salter0302f712013-12-30 12:12:12 -0500717};
718
Shannon Zhao0cac5c32016-05-12 20:19:54 +0800719static int __init __find_uefi_params(unsigned long node,
720 struct param_info *info,
721 struct params *params)
Mark Salter0302f712013-12-30 12:12:12 -0500722{
Catalin Marinas6fb8cc82014-06-02 11:31:06 +0100723 const void *prop;
724 void *dest;
Mark Salter0302f712013-12-30 12:12:12 -0500725 u64 val;
Catalin Marinas6fb8cc82014-06-02 11:31:06 +0100726 int i, len;
Mark Salter0302f712013-12-30 12:12:12 -0500727
Shannon Zhao0cac5c32016-05-12 20:19:54 +0800728 for (i = 0; i < EFI_FDT_PARAMS_SIZE; i++) {
729 prop = of_get_flat_dt_prop(node, params[i].propname, &len);
730 if (!prop) {
731 info->missing = params[i].name;
Mark Salter0302f712013-12-30 12:12:12 -0500732 return 0;
Shannon Zhao0cac5c32016-05-12 20:19:54 +0800733 }
734
735 dest = info->params + params[i].offset;
Catalin Marinas29e24352014-07-08 16:54:18 +0100736 info->found++;
Mark Salter0302f712013-12-30 12:12:12 -0500737
738 val = of_read_number(prop, len / sizeof(u32));
739
Shannon Zhao0cac5c32016-05-12 20:19:54 +0800740 if (params[i].size == sizeof(u32))
Mark Salter0302f712013-12-30 12:12:12 -0500741 *(u32 *)dest = val;
742 else
743 *(u64 *)dest = val;
744
Leif Lindholm7968c0e2015-08-26 14:24:58 +0100745 if (efi_enabled(EFI_DBG))
Shannon Zhao0cac5c32016-05-12 20:19:54 +0800746 pr_info(" %s: 0x%0*llx\n", params[i].name,
747 params[i].size * 2, val);
Mark Salter0302f712013-12-30 12:12:12 -0500748 }
Shannon Zhao0cac5c32016-05-12 20:19:54 +0800749
Mark Salter0302f712013-12-30 12:12:12 -0500750 return 1;
751}
752
Shannon Zhao0cac5c32016-05-12 20:19:54 +0800753static int __init fdt_find_uefi_params(unsigned long node, const char *uname,
754 int depth, void *data)
755{
756 struct param_info *info = data;
757 int i;
758
759 for (i = 0; i < ARRAY_SIZE(dt_params); i++) {
760 const char *subnode = dt_params[i].subnode;
761
762 if (depth != 1 || strcmp(uname, dt_params[i].uname) != 0) {
763 info->missing = dt_params[i].params[0].name;
764 continue;
765 }
766
767 if (subnode) {
Andrzej Hajda4af9ed52016-08-30 12:41:37 +0200768 int err = of_get_flat_dt_subnode_by_name(node, subnode);
769
770 if (err < 0)
Shannon Zhao0cac5c32016-05-12 20:19:54 +0800771 return 0;
Andrzej Hajda4af9ed52016-08-30 12:41:37 +0200772
773 node = err;
Shannon Zhao0cac5c32016-05-12 20:19:54 +0800774 }
775
776 return __find_uefi_params(node, info, dt_params[i].params);
777 }
778
779 return 0;
780}
781
Leif Lindholm7968c0e2015-08-26 14:24:58 +0100782int __init efi_get_fdt_params(struct efi_fdt_params *params)
Mark Salter0302f712013-12-30 12:12:12 -0500783{
784 struct param_info info;
Catalin Marinas29e24352014-07-08 16:54:18 +0100785 int ret;
786
787 pr_info("Getting EFI parameters from FDT:\n");
Mark Salter0302f712013-12-30 12:12:12 -0500788
Catalin Marinas29e24352014-07-08 16:54:18 +0100789 info.found = 0;
Mark Salter0302f712013-12-30 12:12:12 -0500790 info.params = params;
791
Catalin Marinas29e24352014-07-08 16:54:18 +0100792 ret = of_scan_flat_dt(fdt_find_uefi_params, &info);
793 if (!info.found)
794 pr_info("UEFI not found.\n");
795 else if (!ret)
796 pr_err("Can't find '%s' in device tree!\n",
Shannon Zhao0cac5c32016-05-12 20:19:54 +0800797 info.missing);
Catalin Marinas29e24352014-07-08 16:54:18 +0100798
799 return ret;
Mark Salter0302f712013-12-30 12:12:12 -0500800}
801#endif /* CONFIG_EFI_PARAMS_FROM_FDT */
Laszlo Ersek98d2a6c2014-09-03 13:32:20 +0200802
803static __initdata char memory_type_name[][20] = {
804 "Reserved",
805 "Loader Code",
806 "Loader Data",
807 "Boot Code",
808 "Boot Data",
809 "Runtime Code",
810 "Runtime Data",
811 "Conventional Memory",
812 "Unusable Memory",
813 "ACPI Reclaim Memory",
814 "ACPI Memory NVS",
815 "Memory Mapped I/O",
816 "MMIO Port Space",
Robert Elliott35575e02016-02-01 22:07:07 +0000817 "PAL Code",
818 "Persistent Memory",
Laszlo Ersek98d2a6c2014-09-03 13:32:20 +0200819};
820
821char * __init efi_md_typeattr_format(char *buf, size_t size,
822 const efi_memory_desc_t *md)
823{
824 char *pos;
825 int type_len;
826 u64 attr;
827
828 pos = buf;
829 if (md->type >= ARRAY_SIZE(memory_type_name))
830 type_len = snprintf(pos, size, "[type=%u", md->type);
831 else
832 type_len = snprintf(pos, size, "[%-*s",
833 (int)(sizeof(memory_type_name[0]) - 1),
834 memory_type_name[md->type]);
835 if (type_len >= size)
836 return buf;
837
838 pos += type_len;
839 size -= type_len;
840
841 attr = md->attribute;
842 if (attr & ~(EFI_MEMORY_UC | EFI_MEMORY_WC | EFI_MEMORY_WT |
Ard Biesheuvel87db73ae2015-08-07 09:36:54 +0100843 EFI_MEMORY_WB | EFI_MEMORY_UCE | EFI_MEMORY_RO |
844 EFI_MEMORY_WP | EFI_MEMORY_RP | EFI_MEMORY_XP |
Robert Elliottc016ca02016-02-01 22:07:06 +0000845 EFI_MEMORY_NV |
Taku Izumi8be44322015-08-27 02:11:19 +0900846 EFI_MEMORY_RUNTIME | EFI_MEMORY_MORE_RELIABLE))
Laszlo Ersek98d2a6c2014-09-03 13:32:20 +0200847 snprintf(pos, size, "|attr=0x%016llx]",
848 (unsigned long long)attr);
849 else
Robert Elliottc016ca02016-02-01 22:07:06 +0000850 snprintf(pos, size,
851 "|%3s|%2s|%2s|%2s|%2s|%2s|%2s|%3s|%2s|%2s|%2s|%2s]",
Laszlo Ersek98d2a6c2014-09-03 13:32:20 +0200852 attr & EFI_MEMORY_RUNTIME ? "RUN" : "",
Taku Izumi8be44322015-08-27 02:11:19 +0900853 attr & EFI_MEMORY_MORE_RELIABLE ? "MR" : "",
Robert Elliottc016ca02016-02-01 22:07:06 +0000854 attr & EFI_MEMORY_NV ? "NV" : "",
Laszlo Ersek98d2a6c2014-09-03 13:32:20 +0200855 attr & EFI_MEMORY_XP ? "XP" : "",
856 attr & EFI_MEMORY_RP ? "RP" : "",
857 attr & EFI_MEMORY_WP ? "WP" : "",
Ard Biesheuvel87db73ae2015-08-07 09:36:54 +0100858 attr & EFI_MEMORY_RO ? "RO" : "",
Laszlo Ersek98d2a6c2014-09-03 13:32:20 +0200859 attr & EFI_MEMORY_UCE ? "UCE" : "",
860 attr & EFI_MEMORY_WB ? "WB" : "",
861 attr & EFI_MEMORY_WT ? "WT" : "",
862 attr & EFI_MEMORY_WC ? "WC" : "",
863 attr & EFI_MEMORY_UC ? "UC" : "");
864 return buf;
865}
Jonathan (Zhixiong) Zhang7bf79312015-08-07 09:36:57 +0100866
867/*
Jan Beulich23f05712017-08-25 16:50:18 +0100868 * IA64 has a funky EFI memory map that doesn't work the same way as
869 * other architectures.
870 */
871#ifndef CONFIG_IA64
872/*
Jonathan (Zhixiong) Zhang7bf79312015-08-07 09:36:57 +0100873 * efi_mem_attributes - lookup memmap attributes for physical address
874 * @phys_addr: the physical address to lookup
875 *
876 * Search in the EFI memory map for the region covering
877 * @phys_addr. Returns the EFI memory attributes if the region
878 * was found in the memory map, 0 otherwise.
Jonathan (Zhixiong) Zhang7bf79312015-08-07 09:36:57 +0100879 */
Jan Beulich23f05712017-08-25 16:50:18 +0100880u64 efi_mem_attributes(unsigned long phys_addr)
Jonathan (Zhixiong) Zhang7bf79312015-08-07 09:36:57 +0100881{
882 efi_memory_desc_t *md;
Jonathan (Zhixiong) Zhang7bf79312015-08-07 09:36:57 +0100883
884 if (!efi_enabled(EFI_MEMMAP))
885 return 0;
886
Matt Fleming78ce2482016-04-25 21:06:38 +0100887 for_each_efi_memory_desc(md) {
Jonathan (Zhixiong) Zhang7bf79312015-08-07 09:36:57 +0100888 if ((md->phys_addr <= phys_addr) &&
889 (phys_addr < (md->phys_addr +
890 (md->num_pages << EFI_PAGE_SHIFT))))
891 return md->attribute;
892 }
893 return 0;
894}
Matt Fleming806b0352016-04-25 21:06:58 +0100895
Jan Beulich23f05712017-08-25 16:50:18 +0100896/*
897 * efi_mem_type - lookup memmap type for physical address
898 * @phys_addr: the physical address to lookup
899 *
900 * Search in the EFI memory map for the region covering @phys_addr.
901 * Returns the EFI memory type if the region was found in the memory
902 * map, EFI_RESERVED_TYPE (zero) otherwise.
903 */
904int efi_mem_type(unsigned long phys_addr)
905{
906 const efi_memory_desc_t *md;
907
908 if (!efi_enabled(EFI_MEMMAP))
909 return -ENOTSUPP;
910
911 for_each_efi_memory_desc(md) {
912 if ((md->phys_addr <= phys_addr) &&
913 (phys_addr < (md->phys_addr +
914 (md->num_pages << EFI_PAGE_SHIFT))))
915 return md->type;
916 }
917 return -EINVAL;
918}
919#endif
920
Matt Fleming806b0352016-04-25 21:06:58 +0100921int efi_status_to_err(efi_status_t status)
922{
923 int err;
924
925 switch (status) {
926 case EFI_SUCCESS:
927 err = 0;
928 break;
929 case EFI_INVALID_PARAMETER:
930 err = -EINVAL;
931 break;
932 case EFI_OUT_OF_RESOURCES:
933 err = -ENOSPC;
934 break;
935 case EFI_DEVICE_ERROR:
936 err = -EIO;
937 break;
938 case EFI_WRITE_PROTECTED:
939 err = -EROFS;
940 break;
941 case EFI_SECURITY_VIOLATION:
942 err = -EACCES;
943 break;
944 case EFI_NOT_FOUND:
945 err = -ENOENT;
946 break;
Ard Biesheuveldce48e32016-07-15 21:36:31 +0200947 case EFI_ABORTED:
948 err = -EINTR;
949 break;
Matt Fleming806b0352016-04-25 21:06:58 +0100950 default:
951 err = -EINVAL;
952 }
953
954 return err;
955}
Ard Biesheuvel63625982016-11-12 21:32:31 +0000956
Ard Biesheuvela23d3bb2018-09-21 09:32:46 -0700957static DEFINE_SPINLOCK(efi_mem_reserve_persistent_lock);
Ard Biesheuvel63eb3222018-11-14 09:55:44 -0800958static struct linux_efi_memreserve *efi_memreserve_root __ro_after_init;
Ard Biesheuvela23d3bb2018-09-21 09:32:46 -0700959
Ard Biesheuvel976b4892018-11-23 22:51:32 +0100960static int __init efi_memreserve_map_root(void)
961{
962 if (efi.mem_reserve == EFI_INVALID_TABLE_ADDR)
963 return -ENODEV;
964
965 efi_memreserve_root = memremap(efi.mem_reserve,
966 sizeof(*efi_memreserve_root),
967 MEMREMAP_WB);
968 if (WARN_ON_ONCE(!efi_memreserve_root))
969 return -ENOMEM;
970 return 0;
971}
972
973int __ref efi_mem_reserve_persistent(phys_addr_t addr, u64 size)
Ard Biesheuvela23d3bb2018-09-21 09:32:46 -0700974{
Ard Biesheuvel63eb3222018-11-14 09:55:44 -0800975 struct linux_efi_memreserve *rsv;
Ard Biesheuvel80424b02018-11-29 18:12:29 +0100976 unsigned long prsv;
977 int rc, index;
Ard Biesheuvela23d3bb2018-09-21 09:32:46 -0700978
Ard Biesheuvel976b4892018-11-23 22:51:32 +0100979 if (efi_memreserve_root == (void *)ULONG_MAX)
Ard Biesheuvela23d3bb2018-09-21 09:32:46 -0700980 return -ENODEV;
981
Ard Biesheuvel976b4892018-11-23 22:51:32 +0100982 if (!efi_memreserve_root) {
983 rc = efi_memreserve_map_root();
984 if (rc)
985 return rc;
986 }
987
Ard Biesheuvel80424b02018-11-29 18:12:29 +0100988 /* first try to find a slot in an existing linked list entry */
989 for (prsv = efi_memreserve_root->next; prsv; prsv = rsv->next) {
Ard Biesheuvel18df7572019-06-09 20:17:44 +0200990 rsv = memremap(prsv, sizeof(*rsv), MEMREMAP_WB);
Ard Biesheuvel80424b02018-11-29 18:12:29 +0100991 index = atomic_fetch_add_unless(&rsv->count, 1, rsv->size);
992 if (index < rsv->size) {
993 rsv->entry[index].base = addr;
994 rsv->entry[index].size = size;
995
Ard Biesheuvel18df7572019-06-09 20:17:44 +0200996 memunmap(rsv);
Ard Biesheuvel80424b02018-11-29 18:12:29 +0100997 return 0;
998 }
Ard Biesheuvel18df7572019-06-09 20:17:44 +0200999 memunmap(rsv);
Ard Biesheuvel80424b02018-11-29 18:12:29 +01001000 }
1001
1002 /* no slot found - allocate a new linked list entry */
1003 rsv = (struct linux_efi_memreserve *)__get_free_page(GFP_ATOMIC);
Ard Biesheuvela23d3bb2018-09-21 09:32:46 -07001004 if (!rsv)
1005 return -ENOMEM;
1006
Ard Biesheuvel18df7572019-06-09 20:17:44 +02001007 /*
1008 * The memremap() call above assumes that a linux_efi_memreserve entry
1009 * never crosses a page boundary, so let's ensure that this remains true
1010 * even when kexec'ing a 4k pages kernel from a >4k pages kernel, by
1011 * using SZ_4K explicitly in the size calculation below.
1012 */
1013 rsv->size = EFI_MEMRESERVE_COUNT(SZ_4K);
Ard Biesheuvel5f0b0ec2018-11-29 18:12:28 +01001014 atomic_set(&rsv->count, 1);
1015 rsv->entry[0].base = addr;
1016 rsv->entry[0].size = size;
Ard Biesheuvela23d3bb2018-09-21 09:32:46 -07001017
1018 spin_lock(&efi_mem_reserve_persistent_lock);
Ard Biesheuvel63eb3222018-11-14 09:55:44 -08001019 rsv->next = efi_memreserve_root->next;
1020 efi_memreserve_root->next = __pa(rsv);
Ard Biesheuvela23d3bb2018-09-21 09:32:46 -07001021 spin_unlock(&efi_mem_reserve_persistent_lock);
1022
Ard Biesheuvela23d3bb2018-09-21 09:32:46 -07001023 return 0;
1024}
1025
Ard Biesheuvel63eb3222018-11-14 09:55:44 -08001026static int __init efi_memreserve_root_init(void)
1027{
Ard Biesheuvel976b4892018-11-23 22:51:32 +01001028 if (efi_memreserve_root)
1029 return 0;
1030 if (efi_memreserve_map_root())
1031 efi_memreserve_root = (void *)ULONG_MAX;
Ard Biesheuvel63eb3222018-11-14 09:55:44 -08001032 return 0;
1033}
1034early_initcall(efi_memreserve_root_init);
1035
Ard Biesheuvel63625982016-11-12 21:32:31 +00001036#ifdef CONFIG_KEXEC
1037static int update_efi_random_seed(struct notifier_block *nb,
1038 unsigned long code, void *unused)
1039{
1040 struct linux_efi_random_seed *seed;
1041 u32 size = 0;
1042
1043 if (!kexec_in_progress)
1044 return NOTIFY_DONE;
1045
1046 seed = memremap(efi.rng_seed, sizeof(*seed), MEMREMAP_WB);
1047 if (seed != NULL) {
Ard Biesheuvelc2ceb5f2017-08-25 16:50:16 +01001048 size = min(seed->size, EFI_RANDOM_SEED_SIZE);
Ard Biesheuvel63625982016-11-12 21:32:31 +00001049 memunmap(seed);
1050 } else {
1051 pr_err("Could not map UEFI random seed!\n");
1052 }
1053 if (size > 0) {
1054 seed = memremap(efi.rng_seed, sizeof(*seed) + size,
1055 MEMREMAP_WB);
1056 if (seed != NULL) {
1057 seed->size = size;
1058 get_random_bytes(seed->bits, seed->size);
1059 memunmap(seed);
1060 } else {
1061 pr_err("Could not map UEFI random seed!\n");
1062 }
1063 }
1064 return NOTIFY_DONE;
1065}
1066
1067static struct notifier_block efi_random_seed_nb = {
1068 .notifier_call = update_efi_random_seed,
1069};
1070
1071static int register_update_efi_random_seed(void)
1072{
1073 if (efi.rng_seed == EFI_INVALID_TABLE_ADDR)
1074 return 0;
1075 return register_reboot_notifier(&efi_random_seed_nb);
1076}
1077late_initcall(register_update_efi_random_seed);
1078#endif