1
2
3
4
5
6
7
8
9
10
11
12
13
14
15#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
16
17#include <linux/kobject.h>
18#include <linux/module.h>
19#include <linux/init.h>
20#include <linux/debugfs.h>
21#include <linux/device.h>
22#include <linux/efi.h>
23#include <linux/of.h>
24#include <linux/io.h>
25#include <linux/kexec.h>
26#include <linux/platform_device.h>
27#include <linux/random.h>
28#include <linux/reboot.h>
29#include <linux/slab.h>
30#include <linux/acpi.h>
31#include <linux/ucs2_string.h>
32#include <linux/memblock.h>
33#include <linux/security.h>
34
35#include <asm/early_ioremap.h>
36
37struct efi __read_mostly efi = {
38 .runtime_supported_mask = EFI_RT_SUPPORTED_ALL,
39 .acpi = EFI_INVALID_TABLE_ADDR,
40 .acpi20 = EFI_INVALID_TABLE_ADDR,
41 .smbios = EFI_INVALID_TABLE_ADDR,
42 .smbios3 = EFI_INVALID_TABLE_ADDR,
43 .esrt = EFI_INVALID_TABLE_ADDR,
44 .tpm_log = EFI_INVALID_TABLE_ADDR,
45 .tpm_final_log = EFI_INVALID_TABLE_ADDR,
46#ifdef CONFIG_LOAD_UEFI_KEYS
47 .mokvar_table = EFI_INVALID_TABLE_ADDR,
48#endif
49};
50EXPORT_SYMBOL(efi);
51
52unsigned long __ro_after_init efi_rng_seed = EFI_INVALID_TABLE_ADDR;
53static unsigned long __initdata mem_reserve = EFI_INVALID_TABLE_ADDR;
54static unsigned long __initdata rt_prop = EFI_INVALID_TABLE_ADDR;
55
56struct mm_struct efi_mm = {
57 .mm_rb = RB_ROOT,
58 .mm_users = ATOMIC_INIT(2),
59 .mm_count = ATOMIC_INIT(1),
60 .write_protect_seq = SEQCNT_ZERO(efi_mm.write_protect_seq),
61 MMAP_LOCK_INITIALIZER(efi_mm)
62 .page_table_lock = __SPIN_LOCK_UNLOCKED(efi_mm.page_table_lock),
63 .mmlist = LIST_HEAD_INIT(efi_mm.mmlist),
64 .cpu_bitmap = { [BITS_TO_LONGS(NR_CPUS)] = 0},
65};
66
67struct workqueue_struct *efi_rts_wq;
68
69static bool disable_runtime;
70static int __init setup_noefi(char *arg)
71{
72 disable_runtime = true;
73 return 0;
74}
75early_param("noefi", setup_noefi);
76
77bool efi_runtime_disabled(void)
78{
79 return disable_runtime;
80}
81
82bool __pure __efi_soft_reserve_enabled(void)
83{
84 return !efi_enabled(EFI_MEM_NO_SOFT_RESERVE);
85}
86
87static int __init parse_efi_cmdline(char *str)
88{
89 if (!str) {
90 pr_warn("need at least one option\n");
91 return -EINVAL;
92 }
93
94 if (parse_option_str(str, "debug"))
95 set_bit(EFI_DBG, &efi.flags);
96
97 if (parse_option_str(str, "noruntime"))
98 disable_runtime = true;
99
100 if (parse_option_str(str, "nosoftreserve"))
101 set_bit(EFI_MEM_NO_SOFT_RESERVE, &efi.flags);
102
103 return 0;
104}
105early_param("efi", parse_efi_cmdline);
106
107struct kobject *efi_kobj;
108
109
110
111
112
113
114
115static ssize_t systab_show(struct kobject *kobj,
116 struct kobj_attribute *attr, char *buf)
117{
118 char *str = buf;
119
120 if (!kobj || !buf)
121 return -EINVAL;
122
123 if (efi.acpi20 != EFI_INVALID_TABLE_ADDR)
124 str += sprintf(str, "ACPI20=0x%lx\n", efi.acpi20);
125 if (efi.acpi != EFI_INVALID_TABLE_ADDR)
126 str += sprintf(str, "ACPI=0x%lx\n", efi.acpi);
127
128
129
130
131
132 if (efi.smbios3 != EFI_INVALID_TABLE_ADDR)
133 str += sprintf(str, "SMBIOS3=0x%lx\n", efi.smbios3);
134 if (efi.smbios != EFI_INVALID_TABLE_ADDR)
135 str += sprintf(str, "SMBIOS=0x%lx\n", efi.smbios);
136
137 if (IS_ENABLED(CONFIG_IA64) || IS_ENABLED(CONFIG_X86))
138 str = efi_systab_show_arch(str);
139
140 return str - buf;
141}
142
143static struct kobj_attribute efi_attr_systab = __ATTR_RO_MODE(systab, 0400);
144
145static ssize_t fw_platform_size_show(struct kobject *kobj,
146 struct kobj_attribute *attr, char *buf)
147{
148 return sprintf(buf, "%d\n", efi_enabled(EFI_64BIT) ? 64 : 32);
149}
150
151extern __weak struct kobj_attribute efi_attr_fw_vendor;
152extern __weak struct kobj_attribute efi_attr_runtime;
153extern __weak struct kobj_attribute efi_attr_config_table;
154static struct kobj_attribute efi_attr_fw_platform_size =
155 __ATTR_RO(fw_platform_size);
156
157static struct attribute *efi_subsys_attrs[] = {
158 &efi_attr_systab.attr,
159 &efi_attr_fw_platform_size.attr,
160 &efi_attr_fw_vendor.attr,
161 &efi_attr_runtime.attr,
162 &efi_attr_config_table.attr,
163 NULL,
164};
165
166umode_t __weak efi_attr_is_visible(struct kobject *kobj, struct attribute *attr,
167 int n)
168{
169 return attr->mode;
170}
171
172static const struct attribute_group efi_subsys_attr_group = {
173 .attrs = efi_subsys_attrs,
174 .is_visible = efi_attr_is_visible,
175};
176
177static struct efivars generic_efivars;
178static struct efivar_operations generic_ops;
179
180static int generic_ops_register(void)
181{
182 generic_ops.get_variable = efi.get_variable;
183 generic_ops.get_next_variable = efi.get_next_variable;
184 generic_ops.query_variable_store = efi_query_variable_store;
185
186 if (efi_rt_services_supported(EFI_RT_SUPPORTED_SET_VARIABLE)) {
187 generic_ops.set_variable = efi.set_variable;
188 generic_ops.set_variable_nonblocking = efi.set_variable_nonblocking;
189 }
190 return efivars_register(&generic_efivars, &generic_ops, efi_kobj);
191}
192
193static void generic_ops_unregister(void)
194{
195 efivars_unregister(&generic_efivars);
196}
197
198#ifdef CONFIG_EFI_CUSTOM_SSDT_OVERLAYS
199#define EFIVAR_SSDT_NAME_MAX 16
200static char efivar_ssdt[EFIVAR_SSDT_NAME_MAX] __initdata;
201static int __init efivar_ssdt_setup(char *str)
202{
203 int ret = security_locked_down(LOCKDOWN_ACPI_TABLES);
204
205 if (ret)
206 return ret;
207
208 if (strlen(str) < sizeof(efivar_ssdt))
209 memcpy(efivar_ssdt, str, strlen(str));
210 else
211 pr_warn("efivar_ssdt: name too long: %s\n", str);
212 return 0;
213}
214__setup("efivar_ssdt=", efivar_ssdt_setup);
215
216static __init int efivar_ssdt_iter(efi_char16_t *name, efi_guid_t vendor,
217 unsigned long name_size, void *data)
218{
219 struct efivar_entry *entry;
220 struct list_head *list = data;
221 char utf8_name[EFIVAR_SSDT_NAME_MAX];
222 int limit = min_t(unsigned long, EFIVAR_SSDT_NAME_MAX, name_size);
223
224 ucs2_as_utf8(utf8_name, name, limit - 1);
225 if (strncmp(utf8_name, efivar_ssdt, limit) != 0)
226 return 0;
227
228 entry = kmalloc(sizeof(*entry), GFP_KERNEL);
229 if (!entry)
230 return 0;
231
232 memcpy(entry->var.VariableName, name, name_size);
233 memcpy(&entry->var.VendorGuid, &vendor, sizeof(efi_guid_t));
234
235 efivar_entry_add(entry, list);
236
237 return 0;
238}
239
240static __init int efivar_ssdt_load(void)
241{
242 LIST_HEAD(entries);
243 struct efivar_entry *entry, *aux;
244 unsigned long size;
245 void *data;
246 int ret;
247
248 if (!efivar_ssdt[0])
249 return 0;
250
251 ret = efivar_init(efivar_ssdt_iter, &entries, true, &entries);
252
253 list_for_each_entry_safe(entry, aux, &entries, list) {
254 pr_info("loading SSDT from variable %s-%pUl\n", efivar_ssdt,
255 &entry->var.VendorGuid);
256
257 list_del(&entry->list);
258
259 ret = efivar_entry_size(entry, &size);
260 if (ret) {
261 pr_err("failed to get var size\n");
262 goto free_entry;
263 }
264
265 data = kmalloc(size, GFP_KERNEL);
266 if (!data) {
267 ret = -ENOMEM;
268 goto free_entry;
269 }
270
271 ret = efivar_entry_get(entry, NULL, &size, data);
272 if (ret) {
273 pr_err("failed to get var data\n");
274 goto free_data;
275 }
276
277 ret = acpi_load_table(data, NULL);
278 if (ret) {
279 pr_err("failed to load table: %d\n", ret);
280 goto free_data;
281 }
282
283 goto free_entry;
284
285free_data:
286 kfree(data);
287
288free_entry:
289 kfree(entry);
290 }
291
292 return ret;
293}
294#else
295static inline int efivar_ssdt_load(void) { return 0; }
296#endif
297
298#ifdef CONFIG_DEBUG_FS
299
300#define EFI_DEBUGFS_MAX_BLOBS 32
301
302static struct debugfs_blob_wrapper debugfs_blob[EFI_DEBUGFS_MAX_BLOBS];
303
304static void __init efi_debugfs_init(void)
305{
306 struct dentry *efi_debugfs;
307 efi_memory_desc_t *md;
308 char name[32];
309 int type_count[EFI_BOOT_SERVICES_DATA + 1] = {};
310 int i = 0;
311
312 efi_debugfs = debugfs_create_dir("efi", NULL);
313 if (IS_ERR_OR_NULL(efi_debugfs))
314 return;
315
316 for_each_efi_memory_desc(md) {
317 switch (md->type) {
318 case EFI_BOOT_SERVICES_CODE:
319 snprintf(name, sizeof(name), "boot_services_code%d",
320 type_count[md->type]++);
321 break;
322 case EFI_BOOT_SERVICES_DATA:
323 snprintf(name, sizeof(name), "boot_services_data%d",
324 type_count[md->type]++);
325 break;
326 default:
327 continue;
328 }
329
330 if (i >= EFI_DEBUGFS_MAX_BLOBS) {
331 pr_warn("More then %d EFI boot service segments, only showing first %d in debugfs\n",
332 EFI_DEBUGFS_MAX_BLOBS, EFI_DEBUGFS_MAX_BLOBS);
333 break;
334 }
335
336 debugfs_blob[i].size = md->num_pages << EFI_PAGE_SHIFT;
337 debugfs_blob[i].data = memremap(md->phys_addr,
338 debugfs_blob[i].size,
339 MEMREMAP_WB);
340 if (!debugfs_blob[i].data)
341 continue;
342
343 debugfs_create_blob(name, 0400, efi_debugfs, &debugfs_blob[i]);
344 i++;
345 }
346}
347#else
348static inline void efi_debugfs_init(void) {}
349#endif
350
351
352
353
354
355
356static int __init efisubsys_init(void)
357{
358 int error;
359
360 if (!efi_enabled(EFI_RUNTIME_SERVICES))
361 efi.runtime_supported_mask = 0;
362
363 if (!efi_enabled(EFI_BOOT))
364 return 0;
365
366 if (efi.runtime_supported_mask) {
367
368
369
370
371
372 efi_rts_wq = alloc_ordered_workqueue("efi_rts_wq", 0);
373 if (!efi_rts_wq) {
374 pr_err("Creating efi_rts_wq failed, EFI runtime services disabled.\n");
375 clear_bit(EFI_RUNTIME_SERVICES, &efi.flags);
376 efi.runtime_supported_mask = 0;
377 return 0;
378 }
379 }
380
381 if (efi_rt_services_supported(EFI_RT_SUPPORTED_TIME_SERVICES))
382 platform_device_register_simple("rtc-efi", 0, NULL, 0);
383
384
385 efi_kobj = kobject_create_and_add("efi", firmware_kobj);
386 if (!efi_kobj) {
387 pr_err("efi: Firmware registration failed.\n");
388 destroy_workqueue(efi_rts_wq);
389 return -ENOMEM;
390 }
391
392 if (efi_rt_services_supported(EFI_RT_SUPPORTED_GET_VARIABLE |
393 EFI_RT_SUPPORTED_GET_NEXT_VARIABLE_NAME)) {
394 error = generic_ops_register();
395 if (error)
396 goto err_put;
397 efivar_ssdt_load();
398 platform_device_register_simple("efivars", 0, NULL, 0);
399 }
400
401 error = sysfs_create_group(efi_kobj, &efi_subsys_attr_group);
402 if (error) {
403 pr_err("efi: Sysfs attribute export failed with error %d.\n",
404 error);
405 goto err_unregister;
406 }
407
408 error = efi_runtime_map_init(efi_kobj);
409 if (error)
410 goto err_remove_group;
411
412
413 error = sysfs_create_mount_point(efi_kobj, "efivars");
414 if (error) {
415 pr_err("efivars: Subsystem registration failed.\n");
416 goto err_remove_group;
417 }
418
419 if (efi_enabled(EFI_DBG) && efi_enabled(EFI_PRESERVE_BS_REGIONS))
420 efi_debugfs_init();
421
422 return 0;
423
424err_remove_group:
425 sysfs_remove_group(efi_kobj, &efi_subsys_attr_group);
426err_unregister:
427 if (efi_rt_services_supported(EFI_RT_SUPPORTED_GET_VARIABLE |
428 EFI_RT_SUPPORTED_GET_NEXT_VARIABLE_NAME))
429 generic_ops_unregister();
430err_put:
431 kobject_put(efi_kobj);
432 destroy_workqueue(efi_rts_wq);
433 return error;
434}
435
436subsys_initcall(efisubsys_init);
437
438
439
440
441
442
443
444int efi_mem_desc_lookup(u64 phys_addr, efi_memory_desc_t *out_md)
445{
446 efi_memory_desc_t *md;
447
448 if (!efi_enabled(EFI_MEMMAP)) {
449 pr_err_once("EFI_MEMMAP is not enabled.\n");
450 return -EINVAL;
451 }
452
453 if (!out_md) {
454 pr_err_once("out_md is null.\n");
455 return -EINVAL;
456 }
457
458 for_each_efi_memory_desc(md) {
459 u64 size;
460 u64 end;
461
462 size = md->num_pages << EFI_PAGE_SHIFT;
463 end = md->phys_addr + size;
464 if (phys_addr >= md->phys_addr && phys_addr < end) {
465 memcpy(out_md, md, sizeof(*out_md));
466 return 0;
467 }
468 }
469 return -ENOENT;
470}
471
472
473
474
475u64 __init efi_mem_desc_end(efi_memory_desc_t *md)
476{
477 u64 size = md->num_pages << EFI_PAGE_SHIFT;
478 u64 end = md->phys_addr + size;
479 return end;
480}
481
482void __init __weak efi_arch_mem_reserve(phys_addr_t addr, u64 size) {}
483
484
485
486
487
488
489
490
491
492
493
494
495
496void __init efi_mem_reserve(phys_addr_t addr, u64 size)
497{
498 if (!memblock_is_region_reserved(addr, size))
499 memblock_reserve(addr, size);
500
501
502
503
504
505
506
507
508 efi_arch_mem_reserve(addr, size);
509}
510
511static const efi_config_table_type_t common_tables[] __initconst = {
512 {ACPI_20_TABLE_GUID, &efi.acpi20, "ACPI 2.0" },
513 {ACPI_TABLE_GUID, &efi.acpi, "ACPI" },
514 {SMBIOS_TABLE_GUID, &efi.smbios, "SMBIOS" },
515 {SMBIOS3_TABLE_GUID, &efi.smbios3, "SMBIOS 3.0" },
516 {EFI_SYSTEM_RESOURCE_TABLE_GUID, &efi.esrt, "ESRT" },
517 {EFI_MEMORY_ATTRIBUTES_TABLE_GUID, &efi_mem_attr_table, "MEMATTR" },
518 {LINUX_EFI_RANDOM_SEED_TABLE_GUID, &efi_rng_seed, "RNG" },
519 {LINUX_EFI_TPM_EVENT_LOG_GUID, &efi.tpm_log, "TPMEventLog" },
520 {LINUX_EFI_TPM_FINAL_LOG_GUID, &efi.tpm_final_log, "TPMFinalLog" },
521 {LINUX_EFI_MEMRESERVE_TABLE_GUID, &mem_reserve, "MEMRESERVE" },
522 {EFI_RT_PROPERTIES_TABLE_GUID, &rt_prop, "RTPROP" },
523#ifdef CONFIG_EFI_RCI2_TABLE
524 {DELLEMC_EFI_RCI2_TABLE_GUID, &rci2_table_phys },
525#endif
526#ifdef CONFIG_LOAD_UEFI_KEYS
527 {LINUX_EFI_MOK_VARIABLE_TABLE_GUID, &efi.mokvar_table, "MOKvar" },
528#endif
529 {},
530};
531
532static __init int match_config_table(const efi_guid_t *guid,
533 unsigned long table,
534 const efi_config_table_type_t *table_types)
535{
536 int i;
537
538 for (i = 0; efi_guidcmp(table_types[i].guid, NULL_GUID); i++) {
539 if (!efi_guidcmp(*guid, table_types[i].guid)) {
540 *(table_types[i].ptr) = table;
541 if (table_types[i].name[0])
542 pr_cont("%s=0x%lx ",
543 table_types[i].name, table);
544 return 1;
545 }
546 }
547
548 return 0;
549}
550
551int __init efi_config_parse_tables(const efi_config_table_t *config_tables,
552 int count,
553 const efi_config_table_type_t *arch_tables)
554{
555 const efi_config_table_64_t *tbl64 = (void *)config_tables;
556 const efi_config_table_32_t *tbl32 = (void *)config_tables;
557 const efi_guid_t *guid;
558 unsigned long table;
559 int i;
560
561 pr_info("");
562 for (i = 0; i < count; i++) {
563 if (!IS_ENABLED(CONFIG_X86)) {
564 guid = &config_tables[i].guid;
565 table = (unsigned long)config_tables[i].table;
566 } else if (efi_enabled(EFI_64BIT)) {
567 guid = &tbl64[i].guid;
568 table = tbl64[i].table;
569
570 if (IS_ENABLED(CONFIG_X86_32) &&
571 tbl64[i].table > U32_MAX) {
572 pr_cont("\n");
573 pr_err("Table located above 4GB, disabling EFI.\n");
574 return -EINVAL;
575 }
576 } else {
577 guid = &tbl32[i].guid;
578 table = tbl32[i].table;
579 }
580
581 if (!match_config_table(guid, table, common_tables) && arch_tables)
582 match_config_table(guid, table, arch_tables);
583 }
584 pr_cont("\n");
585 set_bit(EFI_CONFIG_TABLES, &efi.flags);
586
587 if (efi_rng_seed != EFI_INVALID_TABLE_ADDR) {
588 struct linux_efi_random_seed *seed;
589 u32 size = 0;
590
591 seed = early_memremap(efi_rng_seed, sizeof(*seed));
592 if (seed != NULL) {
593 size = READ_ONCE(seed->size);
594 early_memunmap(seed, sizeof(*seed));
595 } else {
596 pr_err("Could not map UEFI random seed!\n");
597 }
598 if (size > 0) {
599 seed = early_memremap(efi_rng_seed,
600 sizeof(*seed) + size);
601 if (seed != NULL) {
602 pr_notice("seeding entropy pool\n");
603 add_bootloader_randomness(seed->bits, size);
604 early_memunmap(seed, sizeof(*seed) + size);
605 } else {
606 pr_err("Could not map UEFI random seed!\n");
607 }
608 }
609 }
610
611 if (!IS_ENABLED(CONFIG_X86_32) && efi_enabled(EFI_MEMMAP))
612 efi_memattr_init();
613
614 efi_tpm_eventlog_init();
615
616 if (mem_reserve != EFI_INVALID_TABLE_ADDR) {
617 unsigned long prsv = mem_reserve;
618
619 while (prsv) {
620 struct linux_efi_memreserve *rsv;
621 u8 *p;
622
623
624
625
626
627
628 p = early_memremap(ALIGN_DOWN(prsv, PAGE_SIZE),
629 PAGE_SIZE);
630 if (p == NULL) {
631 pr_err("Could not map UEFI memreserve entry!\n");
632 return -ENOMEM;
633 }
634
635 rsv = (void *)(p + prsv % PAGE_SIZE);
636
637
638 memblock_reserve(prsv,
639 struct_size(rsv, entry, rsv->size));
640
641 for (i = 0; i < atomic_read(&rsv->count); i++) {
642 memblock_reserve(rsv->entry[i].base,
643 rsv->entry[i].size);
644 }
645
646 prsv = rsv->next;
647 early_memunmap(p, PAGE_SIZE);
648 }
649 }
650
651 if (rt_prop != EFI_INVALID_TABLE_ADDR) {
652 efi_rt_properties_table_t *tbl;
653
654 tbl = early_memremap(rt_prop, sizeof(*tbl));
655 if (tbl) {
656 efi.runtime_supported_mask &= tbl->runtime_services_supported;
657 early_memunmap(tbl, sizeof(*tbl));
658 }
659 }
660
661 return 0;
662}
663
664int __init efi_systab_check_header(const efi_table_hdr_t *systab_hdr,
665 int min_major_version)
666{
667 if (systab_hdr->signature != EFI_SYSTEM_TABLE_SIGNATURE) {
668 pr_err("System table signature incorrect!\n");
669 return -EINVAL;
670 }
671
672 if ((systab_hdr->revision >> 16) < min_major_version)
673 pr_err("Warning: System table version %d.%02d, expected %d.00 or greater!\n",
674 systab_hdr->revision >> 16,
675 systab_hdr->revision & 0xffff,
676 min_major_version);
677
678 return 0;
679}
680
681#ifndef CONFIG_IA64
682static const efi_char16_t *__init map_fw_vendor(unsigned long fw_vendor,
683 size_t size)
684{
685 const efi_char16_t *ret;
686
687 ret = early_memremap_ro(fw_vendor, size);
688 if (!ret)
689 pr_err("Could not map the firmware vendor!\n");
690 return ret;
691}
692
693static void __init unmap_fw_vendor(const void *fw_vendor, size_t size)
694{
695 early_memunmap((void *)fw_vendor, size);
696}
697#else
698#define map_fw_vendor(p, s) __va(p)
699#define unmap_fw_vendor(v, s)
700#endif
701
702void __init efi_systab_report_header(const efi_table_hdr_t *systab_hdr,
703 unsigned long fw_vendor)
704{
705 char vendor[100] = "unknown";
706 const efi_char16_t *c16;
707 size_t i;
708
709 c16 = map_fw_vendor(fw_vendor, sizeof(vendor) * sizeof(efi_char16_t));
710 if (c16) {
711 for (i = 0; i < sizeof(vendor) - 1 && c16[i]; ++i)
712 vendor[i] = c16[i];
713 vendor[i] = '\0';
714
715 unmap_fw_vendor(c16, sizeof(vendor) * sizeof(efi_char16_t));
716 }
717
718 pr_info("EFI v%u.%.02u by %s\n",
719 systab_hdr->revision >> 16,
720 systab_hdr->revision & 0xffff,
721 vendor);
722}
723
724static __initdata char memory_type_name[][13] = {
725 "Reserved",
726 "Loader Code",
727 "Loader Data",
728 "Boot Code",
729 "Boot Data",
730 "Runtime Code",
731 "Runtime Data",
732 "Conventional",
733 "Unusable",
734 "ACPI Reclaim",
735 "ACPI Mem NVS",
736 "MMIO",
737 "MMIO Port",
738 "PAL Code",
739 "Persistent",
740};
741
742char * __init efi_md_typeattr_format(char *buf, size_t size,
743 const efi_memory_desc_t *md)
744{
745 char *pos;
746 int type_len;
747 u64 attr;
748
749 pos = buf;
750 if (md->type >= ARRAY_SIZE(memory_type_name))
751 type_len = snprintf(pos, size, "[type=%u", md->type);
752 else
753 type_len = snprintf(pos, size, "[%-*s",
754 (int)(sizeof(memory_type_name[0]) - 1),
755 memory_type_name[md->type]);
756 if (type_len >= size)
757 return buf;
758
759 pos += type_len;
760 size -= type_len;
761
762 attr = md->attribute;
763 if (attr & ~(EFI_MEMORY_UC | EFI_MEMORY_WC | EFI_MEMORY_WT |
764 EFI_MEMORY_WB | EFI_MEMORY_UCE | EFI_MEMORY_RO |
765 EFI_MEMORY_WP | EFI_MEMORY_RP | EFI_MEMORY_XP |
766 EFI_MEMORY_NV | EFI_MEMORY_SP | EFI_MEMORY_CPU_CRYPTO |
767 EFI_MEMORY_RUNTIME | EFI_MEMORY_MORE_RELIABLE))
768 snprintf(pos, size, "|attr=0x%016llx]",
769 (unsigned long long)attr);
770 else
771 snprintf(pos, size,
772 "|%3s|%2s|%2s|%2s|%2s|%2s|%2s|%2s|%2s|%3s|%2s|%2s|%2s|%2s]",
773 attr & EFI_MEMORY_RUNTIME ? "RUN" : "",
774 attr & EFI_MEMORY_MORE_RELIABLE ? "MR" : "",
775 attr & EFI_MEMORY_CPU_CRYPTO ? "CC" : "",
776 attr & EFI_MEMORY_SP ? "SP" : "",
777 attr & EFI_MEMORY_NV ? "NV" : "",
778 attr & EFI_MEMORY_XP ? "XP" : "",
779 attr & EFI_MEMORY_RP ? "RP" : "",
780 attr & EFI_MEMORY_WP ? "WP" : "",
781 attr & EFI_MEMORY_RO ? "RO" : "",
782 attr & EFI_MEMORY_UCE ? "UCE" : "",
783 attr & EFI_MEMORY_WB ? "WB" : "",
784 attr & EFI_MEMORY_WT ? "WT" : "",
785 attr & EFI_MEMORY_WC ? "WC" : "",
786 attr & EFI_MEMORY_UC ? "UC" : "");
787 return buf;
788}
789
790
791
792
793
794#ifndef CONFIG_IA64
795
796
797
798
799
800
801
802
803u64 efi_mem_attributes(unsigned long phys_addr)
804{
805 efi_memory_desc_t *md;
806
807 if (!efi_enabled(EFI_MEMMAP))
808 return 0;
809
810 for_each_efi_memory_desc(md) {
811 if ((md->phys_addr <= phys_addr) &&
812 (phys_addr < (md->phys_addr +
813 (md->num_pages << EFI_PAGE_SHIFT))))
814 return md->attribute;
815 }
816 return 0;
817}
818
819
820
821
822
823
824
825
826
827int efi_mem_type(unsigned long phys_addr)
828{
829 const efi_memory_desc_t *md;
830
831 if (!efi_enabled(EFI_MEMMAP))
832 return -ENOTSUPP;
833
834 for_each_efi_memory_desc(md) {
835 if ((md->phys_addr <= phys_addr) &&
836 (phys_addr < (md->phys_addr +
837 (md->num_pages << EFI_PAGE_SHIFT))))
838 return md->type;
839 }
840 return -EINVAL;
841}
842#endif
843
844int efi_status_to_err(efi_status_t status)
845{
846 int err;
847
848 switch (status) {
849 case EFI_SUCCESS:
850 err = 0;
851 break;
852 case EFI_INVALID_PARAMETER:
853 err = -EINVAL;
854 break;
855 case EFI_OUT_OF_RESOURCES:
856 err = -ENOSPC;
857 break;
858 case EFI_DEVICE_ERROR:
859 err = -EIO;
860 break;
861 case EFI_WRITE_PROTECTED:
862 err = -EROFS;
863 break;
864 case EFI_SECURITY_VIOLATION:
865 err = -EACCES;
866 break;
867 case EFI_NOT_FOUND:
868 err = -ENOENT;
869 break;
870 case EFI_ABORTED:
871 err = -EINTR;
872 break;
873 default:
874 err = -EINVAL;
875 }
876
877 return err;
878}
879
880static DEFINE_SPINLOCK(efi_mem_reserve_persistent_lock);
881static struct linux_efi_memreserve *efi_memreserve_root __ro_after_init;
882
883static int __init efi_memreserve_map_root(void)
884{
885 if (mem_reserve == EFI_INVALID_TABLE_ADDR)
886 return -ENODEV;
887
888 efi_memreserve_root = memremap(mem_reserve,
889 sizeof(*efi_memreserve_root),
890 MEMREMAP_WB);
891 if (WARN_ON_ONCE(!efi_memreserve_root))
892 return -ENOMEM;
893 return 0;
894}
895
896static int efi_mem_reserve_iomem(phys_addr_t addr, u64 size)
897{
898 struct resource *res, *parent;
899 int ret;
900
901 res = kzalloc(sizeof(struct resource), GFP_ATOMIC);
902 if (!res)
903 return -ENOMEM;
904
905 res->name = "reserved";
906 res->flags = IORESOURCE_MEM;
907 res->start = addr;
908 res->end = addr + size - 1;
909
910
911 parent = request_resource_conflict(&iomem_resource, res);
912 ret = parent ? request_resource(parent, res) : 0;
913
914
915
916
917
918
919 if (IS_ENABLED(CONFIG_ARCH_KEEP_MEMBLOCK) && !ret)
920 memblock_reserve(addr, size);
921
922 return ret;
923}
924
925int __ref efi_mem_reserve_persistent(phys_addr_t addr, u64 size)
926{
927 struct linux_efi_memreserve *rsv;
928 unsigned long prsv;
929 int rc, index;
930
931 if (efi_memreserve_root == (void *)ULONG_MAX)
932 return -ENODEV;
933
934 if (!efi_memreserve_root) {
935 rc = efi_memreserve_map_root();
936 if (rc)
937 return rc;
938 }
939
940
941 for (prsv = efi_memreserve_root->next; prsv; ) {
942 rsv = memremap(prsv, sizeof(*rsv), MEMREMAP_WB);
943 index = atomic_fetch_add_unless(&rsv->count, 1, rsv->size);
944 if (index < rsv->size) {
945 rsv->entry[index].base = addr;
946 rsv->entry[index].size = size;
947
948 memunmap(rsv);
949 return efi_mem_reserve_iomem(addr, size);
950 }
951 prsv = rsv->next;
952 memunmap(rsv);
953 }
954
955
956 rsv = (struct linux_efi_memreserve *)__get_free_page(GFP_ATOMIC);
957 if (!rsv)
958 return -ENOMEM;
959
960 rc = efi_mem_reserve_iomem(__pa(rsv), SZ_4K);
961 if (rc) {
962 free_page((unsigned long)rsv);
963 return rc;
964 }
965
966
967
968
969
970
971
972 rsv->size = EFI_MEMRESERVE_COUNT(SZ_4K);
973 atomic_set(&rsv->count, 1);
974 rsv->entry[0].base = addr;
975 rsv->entry[0].size = size;
976
977 spin_lock(&efi_mem_reserve_persistent_lock);
978 rsv->next = efi_memreserve_root->next;
979 efi_memreserve_root->next = __pa(rsv);
980 spin_unlock(&efi_mem_reserve_persistent_lock);
981
982 return efi_mem_reserve_iomem(addr, size);
983}
984
985static int __init efi_memreserve_root_init(void)
986{
987 if (efi_memreserve_root)
988 return 0;
989 if (efi_memreserve_map_root())
990 efi_memreserve_root = (void *)ULONG_MAX;
991 return 0;
992}
993early_initcall(efi_memreserve_root_init);
994
995#ifdef CONFIG_KEXEC
996static int update_efi_random_seed(struct notifier_block *nb,
997 unsigned long code, void *unused)
998{
999 struct linux_efi_random_seed *seed;
1000 u32 size = 0;
1001
1002 if (!kexec_in_progress)
1003 return NOTIFY_DONE;
1004
1005 seed = memremap(efi_rng_seed, sizeof(*seed), MEMREMAP_WB);
1006 if (seed != NULL) {
1007 size = min(seed->size, EFI_RANDOM_SEED_SIZE);
1008 memunmap(seed);
1009 } else {
1010 pr_err("Could not map UEFI random seed!\n");
1011 }
1012 if (size > 0) {
1013 seed = memremap(efi_rng_seed, sizeof(*seed) + size,
1014 MEMREMAP_WB);
1015 if (seed != NULL) {
1016 seed->size = size;
1017 get_random_bytes(seed->bits, seed->size);
1018 memunmap(seed);
1019 } else {
1020 pr_err("Could not map UEFI random seed!\n");
1021 }
1022 }
1023 return NOTIFY_DONE;
1024}
1025
1026static struct notifier_block efi_random_seed_nb = {
1027 .notifier_call = update_efi_random_seed,
1028};
1029
1030static int __init register_update_efi_random_seed(void)
1031{
1032 if (efi_rng_seed == EFI_INVALID_TABLE_ADDR)
1033 return 0;
1034 return register_reboot_notifier(&efi_random_seed_nb);
1035}
1036late_initcall(register_update_efi_random_seed);
1037#endif
1038