License cleanup: add SPDX GPL-2.0 license identifier to files with no license
Many source files in the tree are missing licensing information, which
makes it harder for compliance tools to determine the correct license.
By default all files without license information are under the default
license of the kernel, which is GPL version 2.
Update the files which contain no license information with the 'GPL-2.0'
SPDX license identifier. The SPDX identifier is a legally binding
shorthand, which can be used instead of the full boiler plate text.
This patch is based on work done by Thomas Gleixner and Kate Stewart and
Philippe Ombredanne.
How this work was done:
Patches were generated and checked against linux-4.14-rc6 for a subset of
the use cases:
- file had no licensing information it it.
- file was a */uapi/* one with no licensing information in it,
- file was a */uapi/* one with existing licensing information,
Further patches will be generated in subsequent months to fix up cases
where non-standard license headers were used, and references to license
had to be inferred by heuristics based on keywords.
The analysis to determine which SPDX License Identifier to be applied to
a file was done in a spreadsheet of side by side results from of the
output of two independent scanners (ScanCode & Windriver) producing SPDX
tag:value files created by Philippe Ombredanne. Philippe prepared the
base worksheet, and did an initial spot review of a few 1000 files.
The 4.13 kernel was the starting point of the analysis with 60,537 files
assessed. Kate Stewart did a file by file comparison of the scanner
results in the spreadsheet to determine which SPDX license identifier(s)
to be applied to the file. She confirmed any determination that was not
immediately clear with lawyers working with the Linux Foundation.
Criteria used to select files for SPDX license identifier tagging was:
- Files considered eligible had to be source code files.
- Make and config files were included as candidates if they contained >5
lines of source
- File already had some variant of a license header in it (even if <5
lines).
All documentation files were explicitly excluded.
The following heuristics were used to determine which SPDX license
identifiers to apply.
- when both scanners couldn't find any license traces, file was
considered to have no license information in it, and the top level
COPYING file license applied.
For non */uapi/* files that summary was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 11139
and resulted in the first patch in this series.
If that file was a */uapi/* path one, it was "GPL-2.0 WITH
Linux-syscall-note" otherwise it was "GPL-2.0". Results of that was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 WITH Linux-syscall-note 930
and resulted in the second patch in this series.
- if a file had some form of licensing information in it, and was one
of the */uapi/* ones, it was denoted with the Linux-syscall-note if
any GPL family license was found in the file or had no licensing in
it (per prior point). Results summary:
SPDX license identifier # files
---------------------------------------------------|------
GPL-2.0 WITH Linux-syscall-note 270
GPL-2.0+ WITH Linux-syscall-note 169
((GPL-2.0 WITH Linux-syscall-note) OR BSD-2-Clause) 21
((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 17
LGPL-2.1+ WITH Linux-syscall-note 15
GPL-1.0+ WITH Linux-syscall-note 14
((GPL-2.0+ WITH Linux-syscall-note) OR BSD-3-Clause) 5
LGPL-2.0+ WITH Linux-syscall-note 4
LGPL-2.1 WITH Linux-syscall-note 3
((GPL-2.0 WITH Linux-syscall-note) OR MIT) 3
((GPL-2.0 WITH Linux-syscall-note) AND MIT) 1
and that resulted in the third patch in this series.
- when the two scanners agreed on the detected license(s), that became
the concluded license(s).
- when there was disagreement between the two scanners (one detected a
license but the other didn't, or they both detected different
licenses) a manual inspection of the file occurred.
- In most cases a manual inspection of the information in the file
resulted in a clear resolution of the license that should apply (and
which scanner probably needed to revisit its heuristics).
- When it was not immediately clear, the license identifier was
confirmed with lawyers working with the Linux Foundation.
- If there was any question as to the appropriate license identifier,
the file was flagged for further research and to be revisited later
in time.
In total, over 70 hours of logged manual review was done on the
spreadsheet to determine the SPDX license identifiers to apply to the
source files by Kate, Philippe, Thomas and, in some cases, confirmation
by lawyers working with the Linux Foundation.
Kate also obtained a third independent scan of the 4.13 code base from
FOSSology, and compared selected files where the other two scanners
disagreed against that SPDX file, to see if there was new insights. The
Windriver scanner is based on an older version of FOSSology in part, so
they are related.
Thomas did random spot checks in about 500 files from the spreadsheets
for the uapi headers and agreed with SPDX license identifier in the
files he inspected. For the non-uapi files Thomas did random spot checks
in about 15000 files.
In initial set of patches against 4.14-rc6, 3 files were found to have
copy/paste license identifier errors, and have been fixed to reflect the
correct identifier.
Additionally Philippe spent 10 hours this week doing a detailed manual
inspection and review of the 12,461 patched files from the initial patch
version early this week with:
- a full scancode scan run, collecting the matched texts, detected
license ids and scores
- reviewing anything where there was a license detected (about 500+
files) to ensure that the applied SPDX license was correct
- reviewing anything where there was no detection but the patch license
was not GPL-2.0 WITH Linux-syscall-note to ensure that the applied
SPDX license was correct
This produced a worksheet with 20 files needing minor correction. This
worksheet was then exported into 3 different .csv files for the
different types of files to be modified.
These .csv files were then reviewed by Greg. Thomas wrote a script to
parse the csv files and add the proper SPDX tag to the file, in the
format that the file expected. This script was further refined by Greg
based on the output to detect more types of files automatically and to
distinguish between header and source .c files (which need different
comment types.) Finally Greg ran the script using the .csv files to
generate the patches.
Reviewed-by: Kate Stewart <kstewart@linuxfoundation.org>
Reviewed-by: Philippe Ombredanne <pombredanne@nexb.com>
Reviewed-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2017-11-01 17:07:57 +03:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0 */
|
2005-04-17 02:20:36 +04:00
|
|
|
#ifndef _LINUX_EFI_H
|
|
|
|
#define _LINUX_EFI_H
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Extensible Firmware Interface
|
|
|
|
* Based on 'Extensible Firmware Interface Specification' version 0.9, April 30, 1999
|
|
|
|
*
|
|
|
|
* Copyright (C) 1999 VA Linux Systems
|
|
|
|
* Copyright (C) 1999 Walt Drummond <drummond@valinux.com>
|
|
|
|
* Copyright (C) 1999, 2002-2003 Hewlett-Packard Co.
|
|
|
|
* David Mosberger-Tang <davidm@hpl.hp.com>
|
|
|
|
* Stephane Eranian <eranian@hpl.hp.com>
|
|
|
|
*/
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/string.h>
|
|
|
|
#include <linux/time.h>
|
|
|
|
#include <linux/types.h>
|
|
|
|
#include <linux/proc_fs.h>
|
|
|
|
#include <linux/rtc.h>
|
|
|
|
#include <linux/ioport.h>
|
2008-02-25 10:18:37 +03:00
|
|
|
#include <linux/pfn.h>
|
2011-07-22 00:57:56 +04:00
|
|
|
#include <linux/pstore.h>
|
2016-02-29 23:30:39 +03:00
|
|
|
#include <linux/range.h>
|
2014-06-13 15:22:22 +04:00
|
|
|
#include <linux/reboot.h>
|
2016-05-21 03:01:18 +03:00
|
|
|
#include <linux/uuid.h>
|
2016-04-25 23:06:48 +03:00
|
|
|
#include <linux/screen_info.h>
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
#include <asm/page.h>
|
|
|
|
|
|
|
|
#define EFI_SUCCESS 0
|
|
|
|
#define EFI_LOAD_ERROR ( 1 | (1UL << (BITS_PER_LONG-1)))
|
|
|
|
#define EFI_INVALID_PARAMETER ( 2 | (1UL << (BITS_PER_LONG-1)))
|
|
|
|
#define EFI_UNSUPPORTED ( 3 | (1UL << (BITS_PER_LONG-1)))
|
|
|
|
#define EFI_BAD_BUFFER_SIZE ( 4 | (1UL << (BITS_PER_LONG-1)))
|
|
|
|
#define EFI_BUFFER_TOO_SMALL ( 5 | (1UL << (BITS_PER_LONG-1)))
|
2012-10-05 09:54:56 +04:00
|
|
|
#define EFI_NOT_READY ( 6 | (1UL << (BITS_PER_LONG-1)))
|
|
|
|
#define EFI_DEVICE_ERROR ( 7 | (1UL << (BITS_PER_LONG-1)))
|
|
|
|
#define EFI_WRITE_PROTECTED ( 8 | (1UL << (BITS_PER_LONG-1)))
|
|
|
|
#define EFI_OUT_OF_RESOURCES ( 9 | (1UL << (BITS_PER_LONG-1)))
|
2005-04-17 02:20:36 +04:00
|
|
|
#define EFI_NOT_FOUND (14 | (1UL << (BITS_PER_LONG-1)))
|
2016-07-15 22:36:31 +03:00
|
|
|
#define EFI_ABORTED (21 | (1UL << (BITS_PER_LONG-1)))
|
2012-10-05 09:54:56 +04:00
|
|
|
#define EFI_SECURITY_VIOLATION (26 | (1UL << (BITS_PER_LONG-1)))
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
typedef unsigned long efi_status_t;
|
|
|
|
typedef u8 efi_bool_t;
|
|
|
|
typedef u16 efi_char16_t; /* UNICODE character */
|
2013-09-23 02:45:26 +04:00
|
|
|
typedef u64 efi_physical_addr_t;
|
|
|
|
typedef void *efi_handle_t;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2017-07-19 21:28:52 +03:00
|
|
|
typedef guid_t efi_guid_t;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
#define EFI_GUID(a,b,c,d0,d1,d2,d3,d4,d5,d6,d7) \
|
2017-07-19 21:28:52 +03:00
|
|
|
GUID_INIT(a, b, c, d0, d1, d2, d3, d4, d5, d6, d7)
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Generic EFI table header
|
|
|
|
*/
|
|
|
|
typedef struct {
|
|
|
|
u64 signature;
|
|
|
|
u32 revision;
|
|
|
|
u32 headersize;
|
|
|
|
u32 crc32;
|
|
|
|
u32 reserved;
|
|
|
|
} efi_table_hdr_t;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Memory map descriptor:
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Memory types: */
|
|
|
|
#define EFI_RESERVED_TYPE 0
|
|
|
|
#define EFI_LOADER_CODE 1
|
|
|
|
#define EFI_LOADER_DATA 2
|
|
|
|
#define EFI_BOOT_SERVICES_CODE 3
|
|
|
|
#define EFI_BOOT_SERVICES_DATA 4
|
|
|
|
#define EFI_RUNTIME_SERVICES_CODE 5
|
|
|
|
#define EFI_RUNTIME_SERVICES_DATA 6
|
|
|
|
#define EFI_CONVENTIONAL_MEMORY 7
|
|
|
|
#define EFI_UNUSABLE_MEMORY 8
|
|
|
|
#define EFI_ACPI_RECLAIM_MEMORY 9
|
|
|
|
#define EFI_ACPI_MEMORY_NVS 10
|
|
|
|
#define EFI_MEMORY_MAPPED_IO 11
|
|
|
|
#define EFI_MEMORY_MAPPED_IO_PORT_SPACE 12
|
|
|
|
#define EFI_PAL_CODE 13
|
2015-04-03 19:05:28 +03:00
|
|
|
#define EFI_PERSISTENT_MEMORY 14
|
|
|
|
#define EFI_MAX_MEMORY_TYPE 15
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
/* Attribute values: */
|
|
|
|
#define EFI_MEMORY_UC ((u64)0x0000000000000001ULL) /* uncached */
|
|
|
|
#define EFI_MEMORY_WC ((u64)0x0000000000000002ULL) /* write-coalescing */
|
|
|
|
#define EFI_MEMORY_WT ((u64)0x0000000000000004ULL) /* write-through */
|
|
|
|
#define EFI_MEMORY_WB ((u64)0x0000000000000008ULL) /* write-back */
|
2014-09-03 15:32:19 +04:00
|
|
|
#define EFI_MEMORY_UCE ((u64)0x0000000000000010ULL) /* uncached, exported */
|
2005-04-17 02:20:36 +04:00
|
|
|
#define EFI_MEMORY_WP ((u64)0x0000000000001000ULL) /* write-protect */
|
|
|
|
#define EFI_MEMORY_RP ((u64)0x0000000000002000ULL) /* read-protect */
|
|
|
|
#define EFI_MEMORY_XP ((u64)0x0000000000004000ULL) /* execute-protect */
|
2016-02-02 01:07:06 +03:00
|
|
|
#define EFI_MEMORY_NV ((u64)0x0000000000008000ULL) /* non-volatile */
|
2015-06-25 02:58:15 +03:00
|
|
|
#define EFI_MEMORY_MORE_RELIABLE \
|
|
|
|
((u64)0x0000000000010000ULL) /* higher reliability */
|
2015-08-07 11:36:54 +03:00
|
|
|
#define EFI_MEMORY_RO ((u64)0x0000000000020000ULL) /* read-only */
|
2005-04-17 02:20:36 +04:00
|
|
|
#define EFI_MEMORY_RUNTIME ((u64)0x8000000000000000ULL) /* range requires runtime mapping */
|
|
|
|
#define EFI_MEMORY_DESCRIPTOR_VERSION 1
|
|
|
|
|
|
|
|
#define EFI_PAGE_SHIFT 12
|
2013-09-23 02:45:26 +04:00
|
|
|
#define EFI_PAGE_SIZE (1UL << EFI_PAGE_SHIFT)
|
efi/x86: Prune invalid memory map entries and fix boot regression
Some machines, such as the Lenovo ThinkPad W541 with firmware GNET80WW
(2.28), include memory map entries with phys_addr=0x0 and num_pages=0.
These machines fail to boot after the following commit,
commit 8e80632fb23f ("efi/esrt: Use efi_mem_reserve() and avoid a kmalloc()")
Fix this by removing such bogus entries from the memory map.
Furthermore, currently the log output for this case (with efi=debug)
looks like:
[ 0.000000] efi: mem45: [Reserved | | | | | | | | | | | | ] range=[0x0000000000000000-0xffffffffffffffff] (0MB)
This is clearly wrong, and also not as informative as it could be. This
patch changes it so that if we find obviously invalid memory map
entries, we print an error and skip those entries. It also detects the
display of the address range calculation overflow, so the new output is:
[ 0.000000] efi: [Firmware Bug]: Invalid EFI memory map entries:
[ 0.000000] efi: mem45: [Reserved | | | | | | | | | | | | ] range=[0x0000000000000000-0x0000000000000000] (invalid)
It also detects memory map sizes that would overflow the physical
address, for example phys_addr=0xfffffffffffff000 and
num_pages=0x0200000000000001, and prints:
[ 0.000000] efi: [Firmware Bug]: Invalid EFI memory map entries:
[ 0.000000] efi: mem45: [Reserved | | | | | | | | | | | | ] range=[phys_addr=0xfffffffffffff000-0x20ffffffffffffffff] (invalid)
It then removes these entries from the memory map.
Signed-off-by: Peter Jones <pjones@redhat.com>
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
[ardb: refactor for clarity with no functional changes, avoid PAGE_SHIFT]
Signed-off-by: Matt Fleming <matt@codeblueprint.co.uk>
[Matt: Include bugzilla info in commit log]
Cc: <stable@vger.kernel.org> # v4.9+
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Link: https://bugzilla.kernel.org/show_bug.cgi?id=191121
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2016-12-13 02:42:28 +03:00
|
|
|
#define EFI_PAGES_MAX (U64_MAX >> EFI_PAGE_SHIFT)
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
u32 type;
|
|
|
|
u32 pad;
|
|
|
|
u64 phys_addr;
|
|
|
|
u64 virt_addr;
|
|
|
|
u64 num_pages;
|
|
|
|
u64 attribute;
|
|
|
|
} efi_memory_desc_t;
|
|
|
|
|
2011-06-06 23:36:25 +04:00
|
|
|
typedef struct {
|
|
|
|
efi_guid_t guid;
|
|
|
|
u32 headersize;
|
|
|
|
u32 flags;
|
|
|
|
u32 imagesize;
|
|
|
|
} efi_capsule_header_t;
|
|
|
|
|
2016-08-29 23:38:51 +03:00
|
|
|
struct efi_boot_memmap {
|
|
|
|
efi_memory_desc_t **map;
|
|
|
|
unsigned long *map_size;
|
|
|
|
unsigned long *desc_size;
|
|
|
|
u32 *desc_ver;
|
|
|
|
unsigned long *key_ptr;
|
|
|
|
unsigned long *buff_size;
|
|
|
|
};
|
|
|
|
|
2016-04-25 23:06:59 +03:00
|
|
|
/*
|
|
|
|
* EFI capsule flags
|
|
|
|
*/
|
|
|
|
#define EFI_CAPSULE_PERSIST_ACROSS_RESET 0x00010000
|
|
|
|
#define EFI_CAPSULE_POPULATE_SYSTEM_TABLE 0x00020000
|
|
|
|
#define EFI_CAPSULE_INITIATE_RESET 0x00040000
|
|
|
|
|
2017-06-02 16:52:02 +03:00
|
|
|
struct capsule_info {
|
|
|
|
efi_capsule_header_t header;
|
|
|
|
int reset_type;
|
|
|
|
long index;
|
|
|
|
size_t count;
|
|
|
|
size_t total_size;
|
2017-06-02 16:52:03 +03:00
|
|
|
phys_addr_t *pages;
|
2017-06-02 16:52:02 +03:00
|
|
|
size_t page_bytes_remain;
|
|
|
|
};
|
|
|
|
|
|
|
|
int __efi_capsule_setup_info(struct capsule_info *cap_info);
|
|
|
|
|
2011-11-15 16:57:03 +04:00
|
|
|
/*
|
|
|
|
* Allocation types for calls to boottime->allocate_pages.
|
|
|
|
*/
|
|
|
|
#define EFI_ALLOCATE_ANY_PAGES 0
|
|
|
|
#define EFI_ALLOCATE_MAX_ADDRESS 1
|
|
|
|
#define EFI_ALLOCATE_ADDRESS 2
|
|
|
|
#define EFI_MAX_ALLOCATE_TYPE 3
|
|
|
|
|
2009-05-23 00:49:49 +04:00
|
|
|
typedef int (*efi_freemem_callback_t) (u64 start, u64 end, void *arg);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Types and defines for Time Services
|
|
|
|
*/
|
|
|
|
#define EFI_TIME_ADJUST_DAYLIGHT 0x1
|
|
|
|
#define EFI_TIME_IN_DAYLIGHT 0x2
|
|
|
|
#define EFI_UNSPECIFIED_TIMEZONE 0x07ff
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
u16 year;
|
|
|
|
u8 month;
|
|
|
|
u8 day;
|
|
|
|
u8 hour;
|
|
|
|
u8 minute;
|
|
|
|
u8 second;
|
|
|
|
u8 pad1;
|
|
|
|
u32 nanosecond;
|
|
|
|
s16 timezone;
|
|
|
|
u8 daylight;
|
|
|
|
u8 pad2;
|
|
|
|
} efi_time_t;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
u32 resolution;
|
|
|
|
u32 accuracy;
|
|
|
|
u8 sets_to_zero;
|
|
|
|
} efi_time_cap_t;
|
|
|
|
|
2014-01-10 17:47:37 +04:00
|
|
|
typedef struct {
|
|
|
|
efi_table_hdr_t hdr;
|
|
|
|
u32 raise_tpl;
|
|
|
|
u32 restore_tpl;
|
|
|
|
u32 allocate_pages;
|
|
|
|
u32 free_pages;
|
|
|
|
u32 get_memory_map;
|
|
|
|
u32 allocate_pool;
|
|
|
|
u32 free_pool;
|
|
|
|
u32 create_event;
|
|
|
|
u32 set_timer;
|
|
|
|
u32 wait_for_event;
|
|
|
|
u32 signal_event;
|
|
|
|
u32 close_event;
|
|
|
|
u32 check_event;
|
|
|
|
u32 install_protocol_interface;
|
|
|
|
u32 reinstall_protocol_interface;
|
|
|
|
u32 uninstall_protocol_interface;
|
|
|
|
u32 handle_protocol;
|
|
|
|
u32 __reserved;
|
|
|
|
u32 register_protocol_notify;
|
|
|
|
u32 locate_handle;
|
|
|
|
u32 locate_device_path;
|
|
|
|
u32 install_configuration_table;
|
|
|
|
u32 load_image;
|
|
|
|
u32 start_image;
|
|
|
|
u32 exit;
|
|
|
|
u32 unload_image;
|
|
|
|
u32 exit_boot_services;
|
|
|
|
u32 get_next_monotonic_count;
|
|
|
|
u32 stall;
|
|
|
|
u32 set_watchdog_timer;
|
|
|
|
u32 connect_controller;
|
|
|
|
u32 disconnect_controller;
|
|
|
|
u32 open_protocol;
|
|
|
|
u32 close_protocol;
|
|
|
|
u32 open_protocol_information;
|
|
|
|
u32 protocols_per_handle;
|
|
|
|
u32 locate_handle_buffer;
|
|
|
|
u32 locate_protocol;
|
|
|
|
u32 install_multiple_protocol_interfaces;
|
|
|
|
u32 uninstall_multiple_protocol_interfaces;
|
|
|
|
u32 calculate_crc32;
|
|
|
|
u32 copy_mem;
|
|
|
|
u32 set_mem;
|
|
|
|
u32 create_event_ex;
|
|
|
|
} __packed efi_boot_services_32_t;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
efi_table_hdr_t hdr;
|
|
|
|
u64 raise_tpl;
|
|
|
|
u64 restore_tpl;
|
|
|
|
u64 allocate_pages;
|
|
|
|
u64 free_pages;
|
|
|
|
u64 get_memory_map;
|
|
|
|
u64 allocate_pool;
|
|
|
|
u64 free_pool;
|
|
|
|
u64 create_event;
|
|
|
|
u64 set_timer;
|
|
|
|
u64 wait_for_event;
|
|
|
|
u64 signal_event;
|
|
|
|
u64 close_event;
|
|
|
|
u64 check_event;
|
|
|
|
u64 install_protocol_interface;
|
|
|
|
u64 reinstall_protocol_interface;
|
|
|
|
u64 uninstall_protocol_interface;
|
|
|
|
u64 handle_protocol;
|
|
|
|
u64 __reserved;
|
|
|
|
u64 register_protocol_notify;
|
|
|
|
u64 locate_handle;
|
|
|
|
u64 locate_device_path;
|
|
|
|
u64 install_configuration_table;
|
|
|
|
u64 load_image;
|
|
|
|
u64 start_image;
|
|
|
|
u64 exit;
|
|
|
|
u64 unload_image;
|
|
|
|
u64 exit_boot_services;
|
|
|
|
u64 get_next_monotonic_count;
|
|
|
|
u64 stall;
|
|
|
|
u64 set_watchdog_timer;
|
|
|
|
u64 connect_controller;
|
|
|
|
u64 disconnect_controller;
|
|
|
|
u64 open_protocol;
|
|
|
|
u64 close_protocol;
|
|
|
|
u64 open_protocol_information;
|
|
|
|
u64 protocols_per_handle;
|
|
|
|
u64 locate_handle_buffer;
|
|
|
|
u64 locate_protocol;
|
|
|
|
u64 install_multiple_protocol_interfaces;
|
|
|
|
u64 uninstall_multiple_protocol_interfaces;
|
|
|
|
u64 calculate_crc32;
|
|
|
|
u64 copy_mem;
|
|
|
|
u64 set_mem;
|
|
|
|
u64 create_event_ex;
|
|
|
|
} __packed efi_boot_services_64_t;
|
|
|
|
|
2011-11-15 16:56:32 +04:00
|
|
|
/*
|
|
|
|
* EFI Boot Services table
|
|
|
|
*/
|
|
|
|
typedef struct {
|
|
|
|
efi_table_hdr_t hdr;
|
|
|
|
void *raise_tpl;
|
|
|
|
void *restore_tpl;
|
2013-09-23 02:45:26 +04:00
|
|
|
efi_status_t (*allocate_pages)(int, int, unsigned long,
|
|
|
|
efi_physical_addr_t *);
|
|
|
|
efi_status_t (*free_pages)(efi_physical_addr_t, unsigned long);
|
|
|
|
efi_status_t (*get_memory_map)(unsigned long *, void *, unsigned long *,
|
|
|
|
unsigned long *, u32 *);
|
|
|
|
efi_status_t (*allocate_pool)(int, unsigned long, void **);
|
|
|
|
efi_status_t (*free_pool)(void *);
|
2011-11-15 16:56:32 +04:00
|
|
|
void *create_event;
|
|
|
|
void *set_timer;
|
|
|
|
void *wait_for_event;
|
|
|
|
void *signal_event;
|
|
|
|
void *close_event;
|
|
|
|
void *check_event;
|
|
|
|
void *install_protocol_interface;
|
|
|
|
void *reinstall_protocol_interface;
|
|
|
|
void *uninstall_protocol_interface;
|
2013-09-23 02:45:26 +04:00
|
|
|
efi_status_t (*handle_protocol)(efi_handle_t, efi_guid_t *, void **);
|
2011-11-15 16:56:32 +04:00
|
|
|
void *__reserved;
|
|
|
|
void *register_protocol_notify;
|
2016-04-25 23:06:49 +03:00
|
|
|
efi_status_t (*locate_handle)(int, efi_guid_t *, void *,
|
|
|
|
unsigned long *, efi_handle_t *);
|
2011-11-15 16:56:32 +04:00
|
|
|
void *locate_device_path;
|
2016-04-25 23:06:53 +03:00
|
|
|
efi_status_t (*install_configuration_table)(efi_guid_t *, void *);
|
2011-11-15 16:56:32 +04:00
|
|
|
void *load_image;
|
|
|
|
void *start_image;
|
|
|
|
void *exit;
|
|
|
|
void *unload_image;
|
2013-09-23 02:45:26 +04:00
|
|
|
efi_status_t (*exit_boot_services)(efi_handle_t, unsigned long);
|
2011-11-15 16:56:32 +04:00
|
|
|
void *get_next_monotonic_count;
|
|
|
|
void *stall;
|
|
|
|
void *set_watchdog_timer;
|
|
|
|
void *connect_controller;
|
|
|
|
void *disconnect_controller;
|
|
|
|
void *open_protocol;
|
|
|
|
void *close_protocol;
|
|
|
|
void *open_protocol_information;
|
|
|
|
void *protocols_per_handle;
|
|
|
|
void *locate_handle_buffer;
|
2016-01-10 13:29:07 +03:00
|
|
|
efi_status_t (*locate_protocol)(efi_guid_t *, void *, void **);
|
2011-11-15 16:56:32 +04:00
|
|
|
void *install_multiple_protocol_interfaces;
|
|
|
|
void *uninstall_multiple_protocol_interfaces;
|
|
|
|
void *calculate_crc32;
|
|
|
|
void *copy_mem;
|
|
|
|
void *set_mem;
|
|
|
|
void *create_event_ex;
|
|
|
|
} efi_boot_services_t;
|
|
|
|
|
2012-12-06 01:33:26 +04:00
|
|
|
typedef enum {
|
|
|
|
EfiPciIoWidthUint8,
|
|
|
|
EfiPciIoWidthUint16,
|
|
|
|
EfiPciIoWidthUint32,
|
|
|
|
EfiPciIoWidthUint64,
|
|
|
|
EfiPciIoWidthFifoUint8,
|
|
|
|
EfiPciIoWidthFifoUint16,
|
|
|
|
EfiPciIoWidthFifoUint32,
|
|
|
|
EfiPciIoWidthFifoUint64,
|
|
|
|
EfiPciIoWidthFillUint8,
|
|
|
|
EfiPciIoWidthFillUint16,
|
|
|
|
EfiPciIoWidthFillUint32,
|
|
|
|
EfiPciIoWidthFillUint64,
|
|
|
|
EfiPciIoWidthMaximum
|
|
|
|
} EFI_PCI_IO_PROTOCOL_WIDTH;
|
|
|
|
|
|
|
|
typedef enum {
|
|
|
|
EfiPciIoAttributeOperationGet,
|
|
|
|
EfiPciIoAttributeOperationSet,
|
|
|
|
EfiPciIoAttributeOperationEnable,
|
|
|
|
EfiPciIoAttributeOperationDisable,
|
|
|
|
EfiPciIoAttributeOperationSupported,
|
|
|
|
EfiPciIoAttributeOperationMaximum
|
|
|
|
} EFI_PCI_IO_PROTOCOL_ATTRIBUTE_OPERATION;
|
|
|
|
|
2014-01-10 17:47:37 +04:00
|
|
|
typedef struct {
|
|
|
|
u32 read;
|
|
|
|
u32 write;
|
|
|
|
} efi_pci_io_protocol_access_32_t;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
u64 read;
|
|
|
|
u64 write;
|
|
|
|
} efi_pci_io_protocol_access_64_t;
|
2012-12-06 01:33:26 +04:00
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
void *read;
|
|
|
|
void *write;
|
|
|
|
} efi_pci_io_protocol_access_t;
|
|
|
|
|
2014-01-10 17:47:37 +04:00
|
|
|
typedef struct {
|
|
|
|
u32 poll_mem;
|
|
|
|
u32 poll_io;
|
|
|
|
efi_pci_io_protocol_access_32_t mem;
|
|
|
|
efi_pci_io_protocol_access_32_t io;
|
|
|
|
efi_pci_io_protocol_access_32_t pci;
|
|
|
|
u32 copy_mem;
|
|
|
|
u32 map;
|
|
|
|
u32 unmap;
|
|
|
|
u32 allocate_buffer;
|
|
|
|
u32 free_buffer;
|
|
|
|
u32 flush;
|
|
|
|
u32 get_location;
|
|
|
|
u32 attributes;
|
|
|
|
u32 get_bar_attributes;
|
|
|
|
u32 set_bar_attributes;
|
|
|
|
uint64_t romsize;
|
|
|
|
void *romimage;
|
|
|
|
} efi_pci_io_protocol_32;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
u64 poll_mem;
|
|
|
|
u64 poll_io;
|
|
|
|
efi_pci_io_protocol_access_64_t mem;
|
|
|
|
efi_pci_io_protocol_access_64_t io;
|
|
|
|
efi_pci_io_protocol_access_64_t pci;
|
|
|
|
u64 copy_mem;
|
|
|
|
u64 map;
|
|
|
|
u64 unmap;
|
|
|
|
u64 allocate_buffer;
|
|
|
|
u64 free_buffer;
|
|
|
|
u64 flush;
|
|
|
|
u64 get_location;
|
|
|
|
u64 attributes;
|
|
|
|
u64 get_bar_attributes;
|
|
|
|
u64 set_bar_attributes;
|
|
|
|
uint64_t romsize;
|
|
|
|
void *romimage;
|
|
|
|
} efi_pci_io_protocol_64;
|
|
|
|
|
2012-12-06 01:33:26 +04:00
|
|
|
typedef struct {
|
|
|
|
void *poll_mem;
|
|
|
|
void *poll_io;
|
|
|
|
efi_pci_io_protocol_access_t mem;
|
|
|
|
efi_pci_io_protocol_access_t io;
|
|
|
|
efi_pci_io_protocol_access_t pci;
|
|
|
|
void *copy_mem;
|
|
|
|
void *map;
|
|
|
|
void *unmap;
|
|
|
|
void *allocate_buffer;
|
|
|
|
void *free_buffer;
|
|
|
|
void *flush;
|
|
|
|
void *get_location;
|
|
|
|
void *attributes;
|
|
|
|
void *get_bar_attributes;
|
|
|
|
void *set_bar_attributes;
|
|
|
|
uint64_t romsize;
|
|
|
|
void *romimage;
|
|
|
|
} efi_pci_io_protocol;
|
|
|
|
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_ISA_MOTHERBOARD_IO 0x0001
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_ISA_IO 0x0002
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_VGA_PALETTE_IO 0x0004
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_VGA_MEMORY 0x0008
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_VGA_IO 0x0010
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_IDE_PRIMARY_IO 0x0020
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_IDE_SECONDARY_IO 0x0040
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_MEMORY_WRITE_COMBINE 0x0080
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_IO 0x0100
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_MEMORY 0x0200
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_BUS_MASTER 0x0400
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_MEMORY_CACHED 0x0800
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_MEMORY_DISABLE 0x1000
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_EMBEDDED_DEVICE 0x2000
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_EMBEDDED_ROM 0x4000
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_DUAL_ADDRESS_CYCLE 0x8000
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_ISA_IO_16 0x10000
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_VGA_PALETTE_IO_16 0x20000
|
|
|
|
#define EFI_PCI_IO_ATTRIBUTE_VGA_IO_16 0x40000
|
|
|
|
|
x86/efi: Retrieve and assign Apple device properties
Apple's EFI drivers supply device properties which are needed to support
Macs optimally. They contain vital information which cannot be obtained
any other way (e.g. Thunderbolt Device ROM). They're also used to convey
the current device state so that OS drivers can pick up where EFI
drivers left (e.g. GPU mode setting).
There's an EFI driver dubbed "AAPL,PathProperties" which implements a
per-device key/value store. Other EFI drivers populate it using a custom
protocol. The macOS bootloader /System/Library/CoreServices/boot.efi
retrieves the properties with the same protocol. The kernel extension
AppleACPIPlatform.kext subsequently merges them into the I/O Kit
registry (see ioreg(8)) where they can be queried by other kernel
extensions and user space.
This commit extends the efistub to retrieve the device properties before
ExitBootServices is called. It assigns them to devices in an fs_initcall
so that they can be queried with the API in <linux/property.h>.
Note that the device properties will only be available if the kernel is
booted with the efistub. Distros should adjust their installers to
always use the efistub on Macs. grub with the "linux" directive will not
work unless the functionality of this commit is duplicated in grub.
(The "linuxefi" directive should work but is not included upstream as of
this writing.)
The custom protocol has GUID 91BD12FE-F6C3-44FB-A5B7-5122AB303AE0 and
looks like this:
typedef struct {
unsigned long version; /* 0x10000 */
efi_status_t (*get) (
IN struct apple_properties_protocol *this,
IN struct efi_dev_path *device,
IN efi_char16_t *property_name,
OUT void *buffer,
IN OUT u32 *buffer_len);
/* EFI_SUCCESS, EFI_NOT_FOUND, EFI_BUFFER_TOO_SMALL */
efi_status_t (*set) (
IN struct apple_properties_protocol *this,
IN struct efi_dev_path *device,
IN efi_char16_t *property_name,
IN void *property_value,
IN u32 property_value_len);
/* allocates copies of property name and value */
/* EFI_SUCCESS, EFI_OUT_OF_RESOURCES */
efi_status_t (*del) (
IN struct apple_properties_protocol *this,
IN struct efi_dev_path *device,
IN efi_char16_t *property_name);
/* EFI_SUCCESS, EFI_NOT_FOUND */
efi_status_t (*get_all) (
IN struct apple_properties_protocol *this,
OUT void *buffer,
IN OUT u32 *buffer_len);
/* EFI_SUCCESS, EFI_BUFFER_TOO_SMALL */
} apple_properties_protocol;
Thanks to Pedro Vilaça for this blog post which was helpful in reverse
engineering Apple's EFI drivers and bootloader:
https://reverse.put.as/2016/06/25/apple-efi-firmware-passwords-and-the-scbo-myth/
If someone at Apple is reading this, please note there's a memory leak
in your implementation of the del() function as the property struct is
freed but the name and value allocations are not.
Neither the macOS bootloader nor Apple's EFI drivers check the protocol
version, but we do to avoid breakage if it's ever changed. It's been the
same since at least OS X 10.6 (2009).
The get_all() function conveniently fills a buffer with all properties
in marshalled form which can be passed to the kernel as a setup_data
payload. The number of device properties is dynamic and can change
between a first invocation of get_all() (to determine the buffer size)
and a second invocation (to retrieve the actual buffer), hence the
peculiar loop which does not finish until the buffer size settles.
The macOS bootloader does the same.
The setup_data payload is later on unmarshalled in an fs_initcall. The
idea is that most buses instantiate devices in "subsys" initcall level
and drivers are usually bound to these devices in "device" initcall
level, so we assign the properties in-between, i.e. in "fs" initcall
level.
This assumes that devices to which properties pertain are instantiated
from a "subsys" initcall or earlier. That should always be the case
since on macOS, AppleACPIPlatformExpert::matchEFIDevicePath() only
supports ACPI and PCI nodes and we've fully scanned those buses during
"subsys" initcall level.
The second assumption is that properties are only needed from a "device"
initcall or later. Seems reasonable to me, but should this ever not work
out, an alternative approach would be to store the property sets e.g. in
a btree early during boot. Then whenever device_add() is called, an EFI
Device Path would have to be constructed for the newly added device,
and looked up in the btree. That way, the property set could be assigned
to the device immediately on instantiation. And this would also work for
devices instantiated in a deferred fashion. It seems like this approach
would be more complicated and require more code. That doesn't seem
justified without a specific use case.
For comparison, the strategy on macOS is to assign properties to objects
in the ACPI namespace (AppleACPIPlatformExpert::mergeEFIProperties()).
That approach is definitely wrong as it fails for devices not present in
the namespace: The NHI EFI driver supplies properties for attached
Thunderbolt devices, yet on Macs with Thunderbolt 1 only one device
level behind the host controller is described in the namespace.
Consequently macOS cannot assign properties for chained devices. With
Thunderbolt 2 they started to describe three device levels behind host
controllers in the namespace but this grossly inflates the SSDT and
still fails if the user daisy-chained more than three devices.
We copy the property names and values from the setup_data payload to
swappable virtual memory and afterwards make the payload available to
the page allocator. This is just for the sake of good housekeeping, it
wouldn't occupy a meaningful amount of physical memory (4444 bytes on my
machine). Only the payload is freed, not the setup_data header since
otherwise we'd break the list linkage and we cannot safely update the
predecessor's ->next link because there's no locking for the list.
The payload is currently not passed on to kexec'ed kernels, same for PCI
ROMs retrieved by setup_efi_pci(). This can be added later if there is
demand by amending setup_efi_state(). The payload can then no longer be
made available to the page allocator of course.
Tested-by: Lukas Wunner <lukas@wunner.de> [MacBookPro9,1]
Tested-by: Pierre Moreau <pierre.morrow@free.fr> [MacBookPro11,3]
Signed-off-by: Lukas Wunner <lukas@wunner.de>
Signed-off-by: Matt Fleming <matt@codeblueprint.co.uk>
Cc: Andreas Noever <andreas.noever@gmail.com>
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Pedro Vilaça <reverser@put.as>
Cc: Peter Jones <pjones@redhat.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: grub-devel@gnu.org
Cc: linux-efi@vger.kernel.org
Link: http://lkml.kernel.org/r/20161112213237.8804-9-matt@codeblueprint.co.uk
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2016-11-13 00:32:36 +03:00
|
|
|
typedef struct {
|
|
|
|
u32 version;
|
|
|
|
u32 get;
|
|
|
|
u32 set;
|
|
|
|
u32 del;
|
|
|
|
u32 get_all;
|
|
|
|
} apple_properties_protocol_32_t;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
u64 version;
|
|
|
|
u64 get;
|
|
|
|
u64 set;
|
|
|
|
u64 del;
|
|
|
|
u64 get_all;
|
|
|
|
} apple_properties_protocol_64_t;
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
/*
|
|
|
|
* Types and defines for EFI ResetSystem
|
|
|
|
*/
|
|
|
|
#define EFI_RESET_COLD 0
|
|
|
|
#define EFI_RESET_WARM 1
|
|
|
|
#define EFI_RESET_SHUTDOWN 2
|
|
|
|
|
|
|
|
/*
|
|
|
|
* EFI Runtime Services table
|
|
|
|
*/
|
|
|
|
#define EFI_RUNTIME_SERVICES_SIGNATURE ((u64)0x5652453544e5552ULL)
|
|
|
|
#define EFI_RUNTIME_SERVICES_REVISION 0x00010000
|
|
|
|
|
2014-01-10 17:47:37 +04:00
|
|
|
typedef struct {
|
|
|
|
efi_table_hdr_t hdr;
|
|
|
|
u32 get_time;
|
|
|
|
u32 set_time;
|
|
|
|
u32 get_wakeup_time;
|
|
|
|
u32 set_wakeup_time;
|
|
|
|
u32 set_virtual_address_map;
|
|
|
|
u32 convert_pointer;
|
|
|
|
u32 get_variable;
|
|
|
|
u32 get_next_variable;
|
|
|
|
u32 set_variable;
|
|
|
|
u32 get_next_high_mono_count;
|
|
|
|
u32 reset_system;
|
|
|
|
u32 update_capsule;
|
|
|
|
u32 query_capsule_caps;
|
|
|
|
u32 query_variable_info;
|
|
|
|
} efi_runtime_services_32_t;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
efi_table_hdr_t hdr;
|
|
|
|
u64 get_time;
|
|
|
|
u64 set_time;
|
|
|
|
u64 get_wakeup_time;
|
|
|
|
u64 set_wakeup_time;
|
|
|
|
u64 set_virtual_address_map;
|
|
|
|
u64 convert_pointer;
|
|
|
|
u64 get_variable;
|
|
|
|
u64 get_next_variable;
|
|
|
|
u64 set_variable;
|
|
|
|
u64 get_next_high_mono_count;
|
|
|
|
u64 reset_system;
|
|
|
|
u64 update_capsule;
|
|
|
|
u64 query_capsule_caps;
|
|
|
|
u64 query_variable_info;
|
|
|
|
} efi_runtime_services_64_t;
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
typedef efi_status_t efi_get_time_t (efi_time_t *tm, efi_time_cap_t *tc);
|
|
|
|
typedef efi_status_t efi_set_time_t (efi_time_t *tm);
|
|
|
|
typedef efi_status_t efi_get_wakeup_time_t (efi_bool_t *enabled, efi_bool_t *pending,
|
|
|
|
efi_time_t *tm);
|
|
|
|
typedef efi_status_t efi_set_wakeup_time_t (efi_bool_t enabled, efi_time_t *tm);
|
|
|
|
typedef efi_status_t efi_get_variable_t (efi_char16_t *name, efi_guid_t *vendor, u32 *attr,
|
|
|
|
unsigned long *data_size, void *data);
|
|
|
|
typedef efi_status_t efi_get_next_variable_t (unsigned long *name_size, efi_char16_t *name,
|
|
|
|
efi_guid_t *vendor);
|
|
|
|
typedef efi_status_t efi_set_variable_t (efi_char16_t *name, efi_guid_t *vendor,
|
2011-06-06 23:36:24 +04:00
|
|
|
u32 attr, unsigned long data_size,
|
2005-04-17 02:20:36 +04:00
|
|
|
void *data);
|
|
|
|
typedef efi_status_t efi_get_next_high_mono_count_t (u32 *count);
|
|
|
|
typedef void efi_reset_system_t (int reset_type, efi_status_t status,
|
|
|
|
unsigned long data_size, efi_char16_t *data);
|
|
|
|
typedef efi_status_t efi_set_virtual_address_map_t (unsigned long memory_map_size,
|
|
|
|
unsigned long descriptor_size,
|
|
|
|
u32 descriptor_version,
|
|
|
|
efi_memory_desc_t *virtual_map);
|
2011-06-06 23:36:25 +04:00
|
|
|
typedef efi_status_t efi_query_variable_info_t(u32 attr,
|
|
|
|
u64 *storage_space,
|
|
|
|
u64 *remaining_space,
|
|
|
|
u64 *max_variable_size);
|
|
|
|
typedef efi_status_t efi_update_capsule_t(efi_capsule_header_t **capsules,
|
|
|
|
unsigned long count,
|
|
|
|
unsigned long sg_list);
|
|
|
|
typedef efi_status_t efi_query_capsule_caps_t(efi_capsule_header_t **capsules,
|
|
|
|
unsigned long count,
|
|
|
|
u64 *max_size,
|
|
|
|
int *reset_type);
|
2016-02-02 01:06:58 +03:00
|
|
|
typedef efi_status_t efi_query_variable_store_t(u32 attributes,
|
|
|
|
unsigned long size,
|
|
|
|
bool nonblocking);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2017-01-31 16:21:39 +03:00
|
|
|
typedef struct {
|
|
|
|
efi_table_hdr_t hdr;
|
|
|
|
efi_get_time_t *get_time;
|
|
|
|
efi_set_time_t *set_time;
|
|
|
|
efi_get_wakeup_time_t *get_wakeup_time;
|
|
|
|
efi_set_wakeup_time_t *set_wakeup_time;
|
|
|
|
efi_set_virtual_address_map_t *set_virtual_address_map;
|
|
|
|
void *convert_pointer;
|
|
|
|
efi_get_variable_t *get_variable;
|
|
|
|
efi_get_next_variable_t *get_next_variable;
|
|
|
|
efi_set_variable_t *set_variable;
|
|
|
|
efi_get_next_high_mono_count_t *get_next_high_mono_count;
|
|
|
|
efi_reset_system_t *reset_system;
|
|
|
|
efi_update_capsule_t *update_capsule;
|
|
|
|
efi_query_capsule_caps_t *query_capsule_caps;
|
|
|
|
efi_query_variable_info_t *query_variable_info;
|
|
|
|
} efi_runtime_services_t;
|
|
|
|
|
2014-06-26 14:09:05 +04:00
|
|
|
void efi_native_runtime_setup(void);
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
/*
|
2016-06-25 10:20:25 +03:00
|
|
|
* EFI Configuration Table and GUID definitions
|
|
|
|
*
|
2016-06-27 13:49:20 +03:00
|
|
|
* These are all defined in a single line to make them easier to
|
|
|
|
* grep for and to see them at a glance - while still having a
|
|
|
|
* similar structure to the definitions in the spec.
|
|
|
|
*
|
|
|
|
* Here's how they are structured:
|
2016-06-25 10:20:25 +03:00
|
|
|
*
|
|
|
|
* GUID: 12345678-1234-1234-1234-123456789012
|
|
|
|
* Spec:
|
|
|
|
* #define EFI_SOME_PROTOCOL_GUID \
|
|
|
|
* {0x12345678,0x1234,0x1234,\
|
|
|
|
* {0x12,0x34,0x12,0x34,0x56,0x78,0x90,0x12}}
|
|
|
|
* Here:
|
2016-06-27 13:49:20 +03:00
|
|
|
* #define SOME_PROTOCOL_GUID EFI_GUID(0x12345678, 0x1234, 0x1234, 0x12, 0x34, 0x12, 0x34, 0x56, 0x78, 0x90, 0x12)
|
|
|
|
* ^ tabs ^extra space
|
|
|
|
*
|
|
|
|
* Note that the 'extra space' separates the values at the same place
|
|
|
|
* where the UEFI SPEC breaks the line.
|
2005-04-17 02:20:36 +04:00
|
|
|
*/
|
2016-06-27 13:49:20 +03:00
|
|
|
#define NULL_GUID EFI_GUID(0x00000000, 0x0000, 0x0000, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00)
|
|
|
|
#define MPS_TABLE_GUID EFI_GUID(0xeb9d2d2f, 0x2d88, 0x11d3, 0x9a, 0x16, 0x00, 0x90, 0x27, 0x3f, 0xc1, 0x4d)
|
|
|
|
#define ACPI_TABLE_GUID EFI_GUID(0xeb9d2d30, 0x2d88, 0x11d3, 0x9a, 0x16, 0x00, 0x90, 0x27, 0x3f, 0xc1, 0x4d)
|
|
|
|
#define ACPI_20_TABLE_GUID EFI_GUID(0x8868e871, 0xe4f1, 0x11d3, 0xbc, 0x22, 0x00, 0x80, 0xc7, 0x3c, 0x88, 0x81)
|
|
|
|
#define SMBIOS_TABLE_GUID EFI_GUID(0xeb9d2d31, 0x2d88, 0x11d3, 0x9a, 0x16, 0x00, 0x90, 0x27, 0x3f, 0xc1, 0x4d)
|
|
|
|
#define SMBIOS3_TABLE_GUID EFI_GUID(0xf2fd1544, 0x9794, 0x4a2c, 0x99, 0x2e, 0xe5, 0xbb, 0xcf, 0x20, 0xe3, 0x94)
|
|
|
|
#define SAL_SYSTEM_TABLE_GUID EFI_GUID(0xeb9d2d32, 0x2d88, 0x11d3, 0x9a, 0x16, 0x00, 0x90, 0x27, 0x3f, 0xc1, 0x4d)
|
|
|
|
#define HCDP_TABLE_GUID EFI_GUID(0xf951938d, 0x620b, 0x42ef, 0x82, 0x79, 0xa8, 0x4b, 0x79, 0x61, 0x78, 0x98)
|
|
|
|
#define UGA_IO_PROTOCOL_GUID EFI_GUID(0x61a4d49e, 0x6f68, 0x4f1b, 0xb9, 0x22, 0xa8, 0x6e, 0xed, 0x0b, 0x07, 0xa2)
|
|
|
|
#define EFI_GLOBAL_VARIABLE_GUID EFI_GUID(0x8be4df61, 0x93ca, 0x11d2, 0xaa, 0x0d, 0x00, 0xe0, 0x98, 0x03, 0x2b, 0x8c)
|
|
|
|
#define UV_SYSTEM_TABLE_GUID EFI_GUID(0x3b13a7d4, 0x633e, 0x11dd, 0x93, 0xec, 0xda, 0x25, 0x56, 0xd8, 0x95, 0x93)
|
|
|
|
#define LINUX_EFI_CRASH_GUID EFI_GUID(0xcfc8fc79, 0xbe2e, 0x4ddc, 0x97, 0xf0, 0x9f, 0x98, 0xbf, 0xe2, 0x98, 0xa0)
|
|
|
|
#define LOADED_IMAGE_PROTOCOL_GUID EFI_GUID(0x5b1b31a1, 0x9562, 0x11d2, 0x8e, 0x3f, 0x00, 0xa0, 0xc9, 0x69, 0x72, 0x3b)
|
|
|
|
#define EFI_GRAPHICS_OUTPUT_PROTOCOL_GUID EFI_GUID(0x9042a9de, 0x23dc, 0x4a38, 0x96, 0xfb, 0x7a, 0xde, 0xd0, 0x80, 0x51, 0x6a)
|
|
|
|
#define EFI_UGA_PROTOCOL_GUID EFI_GUID(0x982c298b, 0xf4fa, 0x41cb, 0xb8, 0x38, 0x77, 0xaa, 0x68, 0x8f, 0xb8, 0x39)
|
|
|
|
#define EFI_PCI_IO_PROTOCOL_GUID EFI_GUID(0x4cf5b200, 0x68b8, 0x4ca5, 0x9e, 0xec, 0xb2, 0x3e, 0x3f, 0x50, 0x02, 0x9a)
|
|
|
|
#define EFI_FILE_INFO_ID EFI_GUID(0x09576e92, 0x6d3f, 0x11d2, 0x8e, 0x39, 0x00, 0xa0, 0xc9, 0x69, 0x72, 0x3b)
|
|
|
|
#define EFI_SYSTEM_RESOURCE_TABLE_GUID EFI_GUID(0xb122a263, 0x3661, 0x4f68, 0x99, 0x29, 0x78, 0xf8, 0xb0, 0xd6, 0x21, 0x80)
|
|
|
|
#define EFI_FILE_SYSTEM_GUID EFI_GUID(0x964e5b22, 0x6459, 0x11d2, 0x8e, 0x39, 0x00, 0xa0, 0xc9, 0x69, 0x72, 0x3b)
|
|
|
|
#define DEVICE_TREE_GUID EFI_GUID(0xb1b621d5, 0xf19c, 0x41a5, 0x83, 0x0b, 0xd9, 0x15, 0x2c, 0x69, 0xaa, 0xe0)
|
|
|
|
#define EFI_PROPERTIES_TABLE_GUID EFI_GUID(0x880aaca3, 0x4adc, 0x4a04, 0x90, 0x79, 0xb7, 0x47, 0x34, 0x08, 0x25, 0xe5)
|
|
|
|
#define EFI_RNG_PROTOCOL_GUID EFI_GUID(0x3152bca5, 0xeade, 0x433d, 0x86, 0x2e, 0xc0, 0x1c, 0xdc, 0x29, 0x1f, 0x44)
|
2016-11-13 00:32:33 +03:00
|
|
|
#define EFI_RNG_ALGORITHM_RAW EFI_GUID(0xe43176d7, 0xb6e8, 0x4827, 0xb7, 0x84, 0x7f, 0xfd, 0xc4, 0xb6, 0x85, 0x61)
|
2016-06-27 13:49:20 +03:00
|
|
|
#define EFI_MEMORY_ATTRIBUTES_TABLE_GUID EFI_GUID(0xdcfa911d, 0x26eb, 0x469f, 0xa2, 0x20, 0x38, 0xb7, 0xdc, 0x46, 0x12, 0x20)
|
|
|
|
#define EFI_CONSOLE_OUT_DEVICE_GUID EFI_GUID(0xd3b36f2c, 0xd551, 0x11d4, 0x9a, 0x46, 0x00, 0x90, 0x27, 0x3f, 0xc1, 0x4d)
|
x86/efi: Retrieve and assign Apple device properties
Apple's EFI drivers supply device properties which are needed to support
Macs optimally. They contain vital information which cannot be obtained
any other way (e.g. Thunderbolt Device ROM). They're also used to convey
the current device state so that OS drivers can pick up where EFI
drivers left (e.g. GPU mode setting).
There's an EFI driver dubbed "AAPL,PathProperties" which implements a
per-device key/value store. Other EFI drivers populate it using a custom
protocol. The macOS bootloader /System/Library/CoreServices/boot.efi
retrieves the properties with the same protocol. The kernel extension
AppleACPIPlatform.kext subsequently merges them into the I/O Kit
registry (see ioreg(8)) where they can be queried by other kernel
extensions and user space.
This commit extends the efistub to retrieve the device properties before
ExitBootServices is called. It assigns them to devices in an fs_initcall
so that they can be queried with the API in <linux/property.h>.
Note that the device properties will only be available if the kernel is
booted with the efistub. Distros should adjust their installers to
always use the efistub on Macs. grub with the "linux" directive will not
work unless the functionality of this commit is duplicated in grub.
(The "linuxefi" directive should work but is not included upstream as of
this writing.)
The custom protocol has GUID 91BD12FE-F6C3-44FB-A5B7-5122AB303AE0 and
looks like this:
typedef struct {
unsigned long version; /* 0x10000 */
efi_status_t (*get) (
IN struct apple_properties_protocol *this,
IN struct efi_dev_path *device,
IN efi_char16_t *property_name,
OUT void *buffer,
IN OUT u32 *buffer_len);
/* EFI_SUCCESS, EFI_NOT_FOUND, EFI_BUFFER_TOO_SMALL */
efi_status_t (*set) (
IN struct apple_properties_protocol *this,
IN struct efi_dev_path *device,
IN efi_char16_t *property_name,
IN void *property_value,
IN u32 property_value_len);
/* allocates copies of property name and value */
/* EFI_SUCCESS, EFI_OUT_OF_RESOURCES */
efi_status_t (*del) (
IN struct apple_properties_protocol *this,
IN struct efi_dev_path *device,
IN efi_char16_t *property_name);
/* EFI_SUCCESS, EFI_NOT_FOUND */
efi_status_t (*get_all) (
IN struct apple_properties_protocol *this,
OUT void *buffer,
IN OUT u32 *buffer_len);
/* EFI_SUCCESS, EFI_BUFFER_TOO_SMALL */
} apple_properties_protocol;
Thanks to Pedro Vilaça for this blog post which was helpful in reverse
engineering Apple's EFI drivers and bootloader:
https://reverse.put.as/2016/06/25/apple-efi-firmware-passwords-and-the-scbo-myth/
If someone at Apple is reading this, please note there's a memory leak
in your implementation of the del() function as the property struct is
freed but the name and value allocations are not.
Neither the macOS bootloader nor Apple's EFI drivers check the protocol
version, but we do to avoid breakage if it's ever changed. It's been the
same since at least OS X 10.6 (2009).
The get_all() function conveniently fills a buffer with all properties
in marshalled form which can be passed to the kernel as a setup_data
payload. The number of device properties is dynamic and can change
between a first invocation of get_all() (to determine the buffer size)
and a second invocation (to retrieve the actual buffer), hence the
peculiar loop which does not finish until the buffer size settles.
The macOS bootloader does the same.
The setup_data payload is later on unmarshalled in an fs_initcall. The
idea is that most buses instantiate devices in "subsys" initcall level
and drivers are usually bound to these devices in "device" initcall
level, so we assign the properties in-between, i.e. in "fs" initcall
level.
This assumes that devices to which properties pertain are instantiated
from a "subsys" initcall or earlier. That should always be the case
since on macOS, AppleACPIPlatformExpert::matchEFIDevicePath() only
supports ACPI and PCI nodes and we've fully scanned those buses during
"subsys" initcall level.
The second assumption is that properties are only needed from a "device"
initcall or later. Seems reasonable to me, but should this ever not work
out, an alternative approach would be to store the property sets e.g. in
a btree early during boot. Then whenever device_add() is called, an EFI
Device Path would have to be constructed for the newly added device,
and looked up in the btree. That way, the property set could be assigned
to the device immediately on instantiation. And this would also work for
devices instantiated in a deferred fashion. It seems like this approach
would be more complicated and require more code. That doesn't seem
justified without a specific use case.
For comparison, the strategy on macOS is to assign properties to objects
in the ACPI namespace (AppleACPIPlatformExpert::mergeEFIProperties()).
That approach is definitely wrong as it fails for devices not present in
the namespace: The NHI EFI driver supplies properties for attached
Thunderbolt devices, yet on Macs with Thunderbolt 1 only one device
level behind the host controller is described in the namespace.
Consequently macOS cannot assign properties for chained devices. With
Thunderbolt 2 they started to describe three device levels behind host
controllers in the namespace but this grossly inflates the SSDT and
still fails if the user daisy-chained more than three devices.
We copy the property names and values from the setup_data payload to
swappable virtual memory and afterwards make the payload available to
the page allocator. This is just for the sake of good housekeeping, it
wouldn't occupy a meaningful amount of physical memory (4444 bytes on my
machine). Only the payload is freed, not the setup_data header since
otherwise we'd break the list linkage and we cannot safely update the
predecessor's ->next link because there's no locking for the list.
The payload is currently not passed on to kexec'ed kernels, same for PCI
ROMs retrieved by setup_efi_pci(). This can be added later if there is
demand by amending setup_efi_state(). The payload can then no longer be
made available to the page allocator of course.
Tested-by: Lukas Wunner <lukas@wunner.de> [MacBookPro9,1]
Tested-by: Pierre Moreau <pierre.morrow@free.fr> [MacBookPro11,3]
Signed-off-by: Lukas Wunner <lukas@wunner.de>
Signed-off-by: Matt Fleming <matt@codeblueprint.co.uk>
Cc: Andreas Noever <andreas.noever@gmail.com>
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Pedro Vilaça <reverser@put.as>
Cc: Peter Jones <pjones@redhat.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: grub-devel@gnu.org
Cc: linux-efi@vger.kernel.org
Link: http://lkml.kernel.org/r/20161112213237.8804-9-matt@codeblueprint.co.uk
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2016-11-13 00:32:36 +03:00
|
|
|
#define APPLE_PROPERTIES_PROTOCOL_GUID EFI_GUID(0x91bd12fe, 0xf6c3, 0x44fb, 0xa5, 0xb7, 0x51, 0x22, 0xab, 0x30, 0x3a, 0xe0)
|
2016-04-25 23:06:49 +03:00
|
|
|
|
2017-02-06 14:22:42 +03:00
|
|
|
#define EFI_IMAGE_SECURITY_DATABASE_GUID EFI_GUID(0xd719b2cb, 0x3d3a, 0x4596, 0xa3, 0xbc, 0xda, 0xd0, 0x0e, 0x67, 0x65, 0x6f)
|
|
|
|
#define EFI_SHIM_LOCK_GUID EFI_GUID(0x605dab50, 0xe046, 0x4300, 0xab, 0xb6, 0x3d, 0xd8, 0x10, 0xdd, 0x8b, 0x23)
|
|
|
|
|
2016-04-25 23:06:53 +03:00
|
|
|
/*
|
|
|
|
* This GUID is used to pass to the kernel proper the struct screen_info
|
|
|
|
* structure that was populated by the stub based on the GOP protocol instance
|
|
|
|
* associated with ConOut
|
|
|
|
*/
|
2016-06-27 13:49:20 +03:00
|
|
|
#define LINUX_EFI_ARM_SCREEN_INFO_TABLE_GUID EFI_GUID(0xe03fc20a, 0x85dc, 0x406e, 0xb9, 0x0e, 0x4a, 0xb5, 0x02, 0x37, 0x1d, 0x95)
|
|
|
|
#define LINUX_EFI_LOADER_ENTRY_GUID EFI_GUID(0x4a67b082, 0x0a4c, 0x41cf, 0xb6, 0xc7, 0x44, 0x0b, 0x29, 0xbb, 0x8c, 0x4f)
|
2016-11-13 00:32:31 +03:00
|
|
|
#define LINUX_EFI_RANDOM_SEED_TABLE_GUID EFI_GUID(0x1ce1e5bc, 0x7ceb, 0x42f2, 0x81, 0xe5, 0x8a, 0xad, 0xf1, 0x80, 0xf5, 0x7b)
|
2016-04-25 23:06:57 +03:00
|
|
|
|
2012-02-13 01:24:29 +04:00
|
|
|
typedef struct {
|
|
|
|
efi_guid_t guid;
|
|
|
|
u64 table;
|
|
|
|
} efi_config_table_64_t;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
efi_guid_t guid;
|
|
|
|
u32 table;
|
|
|
|
} efi_config_table_32_t;
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
typedef struct {
|
|
|
|
efi_guid_t guid;
|
|
|
|
unsigned long table;
|
|
|
|
} efi_config_table_t;
|
|
|
|
|
2013-09-05 14:34:54 +04:00
|
|
|
typedef struct {
|
|
|
|
efi_guid_t guid;
|
|
|
|
const char *name;
|
|
|
|
unsigned long *ptr;
|
|
|
|
} efi_config_table_type_t;
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
#define EFI_SYSTEM_TABLE_SIGNATURE ((u64)0x5453595320494249ULL)
|
|
|
|
|
2011-06-06 23:36:25 +04:00
|
|
|
#define EFI_2_30_SYSTEM_TABLE_REVISION ((2 << 16) | (30))
|
|
|
|
#define EFI_2_20_SYSTEM_TABLE_REVISION ((2 << 16) | (20))
|
|
|
|
#define EFI_2_10_SYSTEM_TABLE_REVISION ((2 << 16) | (10))
|
|
|
|
#define EFI_2_00_SYSTEM_TABLE_REVISION ((2 << 16) | (00))
|
|
|
|
#define EFI_1_10_SYSTEM_TABLE_REVISION ((1 << 16) | (10))
|
|
|
|
#define EFI_1_02_SYSTEM_TABLE_REVISION ((1 << 16) | (02))
|
|
|
|
|
2012-02-13 01:24:29 +04:00
|
|
|
typedef struct {
|
|
|
|
efi_table_hdr_t hdr;
|
|
|
|
u64 fw_vendor; /* physical addr of CHAR16 vendor string */
|
|
|
|
u32 fw_revision;
|
|
|
|
u32 __pad1;
|
|
|
|
u64 con_in_handle;
|
|
|
|
u64 con_in;
|
|
|
|
u64 con_out_handle;
|
|
|
|
u64 con_out;
|
|
|
|
u64 stderr_handle;
|
|
|
|
u64 stderr;
|
|
|
|
u64 runtime;
|
|
|
|
u64 boottime;
|
|
|
|
u32 nr_tables;
|
|
|
|
u32 __pad2;
|
|
|
|
u64 tables;
|
|
|
|
} efi_system_table_64_t;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
efi_table_hdr_t hdr;
|
|
|
|
u32 fw_vendor; /* physical addr of CHAR16 vendor string */
|
|
|
|
u32 fw_revision;
|
|
|
|
u32 con_in_handle;
|
|
|
|
u32 con_in;
|
|
|
|
u32 con_out_handle;
|
|
|
|
u32 con_out;
|
|
|
|
u32 stderr_handle;
|
|
|
|
u32 stderr;
|
|
|
|
u32 runtime;
|
|
|
|
u32 boottime;
|
|
|
|
u32 nr_tables;
|
|
|
|
u32 tables;
|
|
|
|
} efi_system_table_32_t;
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
typedef struct {
|
|
|
|
efi_table_hdr_t hdr;
|
|
|
|
unsigned long fw_vendor; /* physical addr of CHAR16 vendor string */
|
|
|
|
u32 fw_revision;
|
|
|
|
unsigned long con_in_handle;
|
|
|
|
unsigned long con_in;
|
|
|
|
unsigned long con_out_handle;
|
|
|
|
unsigned long con_out;
|
|
|
|
unsigned long stderr_handle;
|
|
|
|
unsigned long stderr;
|
|
|
|
efi_runtime_services_t *runtime;
|
2011-11-15 16:56:32 +04:00
|
|
|
efi_boot_services_t *boottime;
|
2005-04-17 02:20:36 +04:00
|
|
|
unsigned long nr_tables;
|
|
|
|
unsigned long tables;
|
|
|
|
} efi_system_table_t;
|
|
|
|
|
2016-02-27 00:22:05 +03:00
|
|
|
/*
|
|
|
|
* Architecture independent structure for describing a memory map for the
|
|
|
|
* benefit of efi_memmap_init_early(), saving us the need to pass four
|
|
|
|
* parameters.
|
|
|
|
*/
|
|
|
|
struct efi_memory_map_data {
|
|
|
|
phys_addr_t phys_map;
|
|
|
|
unsigned long size;
|
|
|
|
unsigned long desc_version;
|
|
|
|
unsigned long desc_size;
|
|
|
|
};
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
struct efi_memory_map {
|
2015-10-23 12:48:16 +03:00
|
|
|
phys_addr_t phys_map;
|
2005-09-04 02:56:27 +04:00
|
|
|
void *map;
|
|
|
|
void *map_end;
|
2005-04-17 02:20:36 +04:00
|
|
|
int nr_map;
|
|
|
|
unsigned long desc_version;
|
2005-09-04 02:56:27 +04:00
|
|
|
unsigned long desc_size;
|
2016-02-27 18:52:50 +03:00
|
|
|
bool late;
|
2005-04-17 02:20:36 +04:00
|
|
|
};
|
|
|
|
|
2016-02-29 23:30:39 +03:00
|
|
|
struct efi_mem_range {
|
|
|
|
struct range range;
|
|
|
|
u64 attribute;
|
2005-04-17 02:20:36 +04:00
|
|
|
};
|
|
|
|
|
2013-12-30 21:12:12 +04:00
|
|
|
struct efi_fdt_params {
|
|
|
|
u64 system_table;
|
|
|
|
u64 mmap;
|
|
|
|
u32 mmap_size;
|
|
|
|
u32 desc_size;
|
|
|
|
u32 desc_ver;
|
|
|
|
};
|
|
|
|
|
2014-01-10 17:47:37 +04:00
|
|
|
typedef struct {
|
|
|
|
u32 revision;
|
|
|
|
u32 parent_handle;
|
|
|
|
u32 system_table;
|
|
|
|
u32 device_handle;
|
|
|
|
u32 file_path;
|
|
|
|
u32 reserved;
|
|
|
|
u32 load_options_size;
|
|
|
|
u32 load_options;
|
|
|
|
u32 image_base;
|
|
|
|
__aligned_u64 image_size;
|
|
|
|
unsigned int image_code_type;
|
|
|
|
unsigned int image_data_type;
|
|
|
|
unsigned long unload;
|
|
|
|
} efi_loaded_image_32_t;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
u32 revision;
|
|
|
|
u64 parent_handle;
|
|
|
|
u64 system_table;
|
|
|
|
u64 device_handle;
|
|
|
|
u64 file_path;
|
|
|
|
u64 reserved;
|
|
|
|
u32 load_options_size;
|
|
|
|
u64 load_options;
|
|
|
|
u64 image_base;
|
|
|
|
__aligned_u64 image_size;
|
|
|
|
unsigned int image_code_type;
|
|
|
|
unsigned int image_data_type;
|
|
|
|
unsigned long unload;
|
|
|
|
} efi_loaded_image_64_t;
|
|
|
|
|
2011-11-15 16:56:50 +04:00
|
|
|
typedef struct {
|
|
|
|
u32 revision;
|
|
|
|
void *parent_handle;
|
|
|
|
efi_system_table_t *system_table;
|
|
|
|
void *device_handle;
|
|
|
|
void *file_path;
|
|
|
|
void *reserved;
|
|
|
|
u32 load_options_size;
|
|
|
|
void *load_options;
|
|
|
|
void *image_base;
|
|
|
|
__aligned_u64 image_size;
|
|
|
|
unsigned int image_code_type;
|
|
|
|
unsigned int image_data_type;
|
|
|
|
unsigned long unload;
|
|
|
|
} efi_loaded_image_t;
|
|
|
|
|
2011-08-11 13:28:06 +04:00
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
u64 size;
|
|
|
|
u64 file_size;
|
|
|
|
u64 phys_size;
|
|
|
|
efi_time_t create_time;
|
|
|
|
efi_time_t last_access_time;
|
|
|
|
efi_time_t modification_time;
|
|
|
|
__aligned_u64 attribute;
|
|
|
|
efi_char16_t filename[1];
|
|
|
|
} efi_file_info_t;
|
|
|
|
|
2014-01-10 17:47:37 +04:00
|
|
|
typedef struct {
|
|
|
|
u64 revision;
|
|
|
|
u32 open;
|
|
|
|
u32 close;
|
|
|
|
u32 delete;
|
|
|
|
u32 read;
|
|
|
|
u32 write;
|
|
|
|
u32 get_position;
|
|
|
|
u32 set_position;
|
|
|
|
u32 get_info;
|
|
|
|
u32 set_info;
|
|
|
|
u32 flush;
|
|
|
|
} efi_file_handle_32_t;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
u64 revision;
|
|
|
|
u64 open;
|
|
|
|
u64 close;
|
|
|
|
u64 delete;
|
|
|
|
u64 read;
|
|
|
|
u64 write;
|
|
|
|
u64 get_position;
|
|
|
|
u64 set_position;
|
|
|
|
u64 get_info;
|
|
|
|
u64 set_info;
|
|
|
|
u64 flush;
|
|
|
|
} efi_file_handle_64_t;
|
|
|
|
|
2013-09-23 02:45:26 +04:00
|
|
|
typedef struct _efi_file_handle {
|
2011-08-11 13:28:06 +04:00
|
|
|
u64 revision;
|
2013-09-23 02:45:26 +04:00
|
|
|
efi_status_t (*open)(struct _efi_file_handle *,
|
|
|
|
struct _efi_file_handle **,
|
|
|
|
efi_char16_t *, u64, u64);
|
|
|
|
efi_status_t (*close)(struct _efi_file_handle *);
|
2011-08-11 13:28:06 +04:00
|
|
|
void *delete;
|
2013-09-23 02:45:26 +04:00
|
|
|
efi_status_t (*read)(struct _efi_file_handle *, unsigned long *,
|
|
|
|
void *);
|
2011-08-11 13:28:06 +04:00
|
|
|
void *write;
|
|
|
|
void *get_position;
|
|
|
|
void *set_position;
|
2013-09-23 02:45:26 +04:00
|
|
|
efi_status_t (*get_info)(struct _efi_file_handle *, efi_guid_t *,
|
|
|
|
unsigned long *, void *);
|
2011-08-11 13:28:06 +04:00
|
|
|
void *set_info;
|
|
|
|
void *flush;
|
|
|
|
} efi_file_handle_t;
|
|
|
|
|
2013-09-23 02:45:26 +04:00
|
|
|
typedef struct _efi_file_io_interface {
|
|
|
|
u64 revision;
|
|
|
|
int (*open_volume)(struct _efi_file_io_interface *,
|
|
|
|
efi_file_handle_t **);
|
|
|
|
} efi_file_io_interface_t;
|
|
|
|
|
2011-08-11 13:28:06 +04:00
|
|
|
#define EFI_FILE_MODE_READ 0x0000000000000001
|
|
|
|
#define EFI_FILE_MODE_WRITE 0x0000000000000002
|
|
|
|
#define EFI_FILE_MODE_CREATE 0x8000000000000000
|
|
|
|
|
2015-09-09 11:08:15 +03:00
|
|
|
typedef struct {
|
|
|
|
u32 version;
|
|
|
|
u32 length;
|
|
|
|
u64 memory_protection_attribute;
|
|
|
|
} efi_properties_table_t;
|
|
|
|
|
|
|
|
#define EFI_PROPERTIES_TABLE_VERSION 0x00010000
|
|
|
|
#define EFI_PROPERTIES_RUNTIME_MEMORY_PROTECTION_NON_EXECUTABLE_PE_DATA 0x1
|
|
|
|
|
2006-03-26 13:37:08 +04:00
|
|
|
#define EFI_INVALID_TABLE_ADDR (~0UL)
|
|
|
|
|
2016-04-25 23:06:44 +03:00
|
|
|
typedef struct {
|
|
|
|
u32 version;
|
|
|
|
u32 num_entries;
|
|
|
|
u32 desc_size;
|
|
|
|
u32 reserved;
|
|
|
|
efi_memory_desc_t entry[0];
|
|
|
|
} efi_memory_attributes_table_t;
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
/*
|
|
|
|
* All runtime access to EFI goes through this structure:
|
|
|
|
*/
|
|
|
|
extern struct efi {
|
|
|
|
efi_system_table_t *systab; /* EFI system table */
|
2011-06-06 23:36:25 +04:00
|
|
|
unsigned int runtime_version; /* Runtime services version */
|
2006-03-26 13:37:08 +04:00
|
|
|
unsigned long mps; /* MPS table */
|
|
|
|
unsigned long acpi; /* ACPI table (IA64 ext 0.71) */
|
|
|
|
unsigned long acpi20; /* ACPI table (ACPI 2.0) */
|
2014-10-14 18:34:47 +04:00
|
|
|
unsigned long smbios; /* SMBIOS table (32 bit entry point) */
|
|
|
|
unsigned long smbios3; /* SMBIOS table (64 bit entry point) */
|
2006-03-26 13:37:08 +04:00
|
|
|
unsigned long sal_systab; /* SAL system table */
|
|
|
|
unsigned long boot_info; /* boot info table */
|
|
|
|
unsigned long hcdp; /* HCDP table */
|
|
|
|
unsigned long uga; /* UGA table */
|
2008-10-03 20:58:54 +04:00
|
|
|
unsigned long uv_systab; /* UV system table */
|
2013-12-20 14:02:17 +04:00
|
|
|
unsigned long fw_vendor; /* fw_vendor */
|
|
|
|
unsigned long runtime; /* runtime table */
|
|
|
|
unsigned long config_table; /* config tables */
|
2015-04-29 01:44:31 +03:00
|
|
|
unsigned long esrt; /* ESRT table */
|
2015-09-09 11:08:15 +03:00
|
|
|
unsigned long properties_table; /* properties table */
|
2016-04-25 23:06:44 +03:00
|
|
|
unsigned long mem_attr_table; /* memory attributes table */
|
2016-11-13 00:32:31 +03:00
|
|
|
unsigned long rng_seed; /* UEFI firmware random seed */
|
2005-04-17 02:20:36 +04:00
|
|
|
efi_get_time_t *get_time;
|
|
|
|
efi_set_time_t *set_time;
|
|
|
|
efi_get_wakeup_time_t *get_wakeup_time;
|
|
|
|
efi_set_wakeup_time_t *set_wakeup_time;
|
|
|
|
efi_get_variable_t *get_variable;
|
|
|
|
efi_get_next_variable_t *get_next_variable;
|
|
|
|
efi_set_variable_t *set_variable;
|
2016-02-02 01:06:56 +03:00
|
|
|
efi_set_variable_t *set_variable_nonblocking;
|
2011-06-06 23:36:25 +04:00
|
|
|
efi_query_variable_info_t *query_variable_info;
|
2016-02-02 01:06:57 +03:00
|
|
|
efi_query_variable_info_t *query_variable_info_nonblocking;
|
2011-06-06 23:36:25 +04:00
|
|
|
efi_update_capsule_t *update_capsule;
|
|
|
|
efi_query_capsule_caps_t *query_capsule_caps;
|
2005-04-17 02:20:36 +04:00
|
|
|
efi_get_next_high_mono_count_t *get_next_high_mono_count;
|
|
|
|
efi_reset_system_t *reset_system;
|
|
|
|
efi_set_virtual_address_map_t *set_virtual_address_map;
|
2016-04-25 23:06:39 +03:00
|
|
|
struct efi_memory_map memmap;
|
2014-01-15 17:21:22 +04:00
|
|
|
unsigned long flags;
|
2005-04-17 02:20:36 +04:00
|
|
|
} efi;
|
|
|
|
|
|
|
|
static inline int
|
|
|
|
efi_guidcmp (efi_guid_t left, efi_guid_t right)
|
|
|
|
{
|
|
|
|
return memcmp(&left, &right, sizeof (efi_guid_t));
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline char *
|
2014-12-18 18:02:17 +03:00
|
|
|
efi_guid_to_str(efi_guid_t *guid, char *out)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2009-12-15 05:01:14 +03:00
|
|
|
sprintf(out, "%pUl", guid->b);
|
2005-04-17 02:20:36 +04:00
|
|
|
return out;
|
|
|
|
}
|
|
|
|
|
|
|
|
extern void efi_init (void);
|
|
|
|
extern void *efi_get_pal_addr (void);
|
|
|
|
extern void efi_map_pal_code (void);
|
|
|
|
extern void efi_memmap_walk (efi_freemem_callback_t callback, void *arg);
|
2016-06-17 17:48:17 +03:00
|
|
|
extern void efi_gettimeofday (struct timespec64 *ts);
|
2005-04-17 02:20:36 +04:00
|
|
|
extern void efi_enter_virtual_mode (void); /* switch EFI to virtual mode, if possible */
|
2012-09-29 04:55:44 +04:00
|
|
|
#ifdef CONFIG_X86
|
2012-09-29 04:57:05 +04:00
|
|
|
extern void efi_late_init(void);
|
2012-09-29 04:55:44 +04:00
|
|
|
extern void efi_free_boot_services(void);
|
2016-02-02 01:06:58 +03:00
|
|
|
extern efi_status_t efi_query_variable_store(u32 attributes,
|
|
|
|
unsigned long size,
|
|
|
|
bool nonblocking);
|
2015-06-25 02:58:15 +03:00
|
|
|
extern void efi_find_mirror(void);
|
2012-09-29 04:55:44 +04:00
|
|
|
#else
|
2012-09-29 04:57:05 +04:00
|
|
|
static inline void efi_late_init(void) {}
|
2012-09-29 04:55:44 +04:00
|
|
|
static inline void efi_free_boot_services(void) {}
|
2013-03-25 13:14:30 +04:00
|
|
|
|
2016-02-02 01:06:58 +03:00
|
|
|
static inline efi_status_t efi_query_variable_store(u32 attributes,
|
|
|
|
unsigned long size,
|
|
|
|
bool nonblocking)
|
2013-03-25 13:14:30 +04:00
|
|
|
{
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
2012-09-29 04:55:44 +04:00
|
|
|
#endif
|
2012-09-29 04:56:08 +04:00
|
|
|
extern void __iomem *efi_lookup_mapped_addr(u64 phys_addr);
|
2016-02-27 00:22:05 +03:00
|
|
|
|
2017-01-05 15:51:29 +03:00
|
|
|
extern phys_addr_t __init efi_memmap_alloc(unsigned int num_entries);
|
2016-02-27 00:22:05 +03:00
|
|
|
extern int __init efi_memmap_init_early(struct efi_memory_map_data *data);
|
2016-02-27 18:52:50 +03:00
|
|
|
extern int __init efi_memmap_init_late(phys_addr_t addr, unsigned long size);
|
2016-02-27 00:22:05 +03:00
|
|
|
extern void __init efi_memmap_unmap(void);
|
2016-06-22 18:54:00 +03:00
|
|
|
extern int __init efi_memmap_install(phys_addr_t addr, unsigned int nr_map);
|
2016-02-29 23:30:39 +03:00
|
|
|
extern int __init efi_memmap_split_count(efi_memory_desc_t *md,
|
|
|
|
struct range *range);
|
|
|
|
extern void __init efi_memmap_insert(struct efi_memory_map *old_memmap,
|
|
|
|
void *buf, struct efi_mem_range *mem);
|
2016-02-27 00:22:05 +03:00
|
|
|
|
2013-09-05 14:34:54 +04:00
|
|
|
extern int efi_config_init(efi_config_table_type_t *arch_tables);
|
efi: Work around ia64 build problem with ESRT driver
So, I'm told this problem exists in the world:
> Subject: Build error in -next due to 'efi: Add esrt support'
>
> Building ia64:defconfig ... failed
> --------------
> Error log:
>
> drivers/firmware/efi/esrt.c:28:31: fatal error: asm/early_ioremap.h: No such file or directory
>
I'm not really sure how it's okay that we have things in asm-generic on
some platforms but not others - is having it the same everywhere not the
whole point of asm-generic?
That said, ia64 doesn't have early_ioremap.h . So instead, since it's
difficult to imagine new IA64 machines with UEFI 2.5, just don't build
this code there.
To me this looks like a workaround - doing something like:
generic-y += early_ioremap.h
in arch/ia64/include/asm/Kbuild would appear to be more correct, but
ia64 has its own early_memremap() decl in arch/ia64/include/asm/io.h ,
and it's a macro. So adding the above /and/ requiring that asm/io.h be
included /after/ asm/early_ioremap.h in all cases would fix it, but
that's pretty ugly as well. Since I'm not going to spend the rest of my
life rectifying ia64 headers vs "generic" headers that aren't generic,
it's much simpler to just not build there.
Note that I've only actually tried to build this patch on x86_64, but
esrt.o still gets built there, and that would seem to demonstrate that
the conditional building is working correctly at all the places the code
built before. I no longer have any ia64 machines handy to test that the
exclusion actually works there.
Signed-off-by: Peter Jones <pjones@redhat.com>
Acked-by: Tony Luck <tony.luck@intel.com>
Reviewed-by: Guenter Roeck <linux@roeck-us.net>
(Compile-)Tested-by: Guenter Roeck <linux@roeck-us.net>
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
2015-06-05 22:14:54 +03:00
|
|
|
#ifdef CONFIG_EFI_ESRT
|
2015-04-29 01:44:31 +03:00
|
|
|
extern void __init efi_esrt_init(void);
|
efi: Work around ia64 build problem with ESRT driver
So, I'm told this problem exists in the world:
> Subject: Build error in -next due to 'efi: Add esrt support'
>
> Building ia64:defconfig ... failed
> --------------
> Error log:
>
> drivers/firmware/efi/esrt.c:28:31: fatal error: asm/early_ioremap.h: No such file or directory
>
I'm not really sure how it's okay that we have things in asm-generic on
some platforms but not others - is having it the same everywhere not the
whole point of asm-generic?
That said, ia64 doesn't have early_ioremap.h . So instead, since it's
difficult to imagine new IA64 machines with UEFI 2.5, just don't build
this code there.
To me this looks like a workaround - doing something like:
generic-y += early_ioremap.h
in arch/ia64/include/asm/Kbuild would appear to be more correct, but
ia64 has its own early_memremap() decl in arch/ia64/include/asm/io.h ,
and it's a macro. So adding the above /and/ requiring that asm/io.h be
included /after/ asm/early_ioremap.h in all cases would fix it, but
that's pretty ugly as well. Since I'm not going to spend the rest of my
life rectifying ia64 headers vs "generic" headers that aren't generic,
it's much simpler to just not build there.
Note that I've only actually tried to build this patch on x86_64, but
esrt.o still gets built there, and that would seem to demonstrate that
the conditional building is working correctly at all the places the code
built before. I no longer have any ia64 machines handy to test that the
exclusion actually works there.
Signed-off-by: Peter Jones <pjones@redhat.com>
Acked-by: Tony Luck <tony.luck@intel.com>
Reviewed-by: Guenter Roeck <linux@roeck-us.net>
(Compile-)Tested-by: Guenter Roeck <linux@roeck-us.net>
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
2015-06-05 22:14:54 +03:00
|
|
|
#else
|
|
|
|
static inline void efi_esrt_init(void) { }
|
|
|
|
#endif
|
2014-10-18 17:04:15 +04:00
|
|
|
extern int efi_config_parse_tables(void *config_tables, int count, int sz,
|
|
|
|
efi_config_table_type_t *arch_tables);
|
2005-04-17 02:20:36 +04:00
|
|
|
extern u64 efi_get_iobase (void);
|
2017-07-18 00:10:14 +03:00
|
|
|
extern int efi_mem_type(unsigned long phys_addr);
|
2005-04-17 02:20:36 +04:00
|
|
|
extern u64 efi_mem_attributes (unsigned long phys_addr);
|
2006-05-06 03:19:50 +04:00
|
|
|
extern u64 efi_mem_attribute (unsigned long phys_addr, unsigned long size);
|
2005-04-17 02:20:36 +04:00
|
|
|
extern int __init efi_uart_console_only (void);
|
2015-04-29 01:44:31 +03:00
|
|
|
extern u64 efi_mem_desc_end(efi_memory_desc_t *md);
|
|
|
|
extern int efi_mem_desc_lookup(u64 phys_addr, efi_memory_desc_t *out_md);
|
2016-03-01 00:22:52 +03:00
|
|
|
extern void efi_mem_reserve(phys_addr_t addr, u64 size);
|
2005-04-17 02:20:36 +04:00
|
|
|
extern void efi_initialize_iomem_resources(struct resource *code_resource,
|
2007-10-22 03:42:01 +04:00
|
|
|
struct resource *data_resource, struct resource *bss_resource);
|
x86, efi: Retain boot service code until after switching to virtual mode
UEFI stands for "Unified Extensible Firmware Interface", where "Firmware"
is an ancient African word meaning "Why do something right when you can
do it so wrong that children will weep and brave adults will cower before
you", and "UEI" is Celtic for "We missed DOS so we burned it into your
ROMs". The UEFI specification provides for runtime services (ie, another
way for the operating system to be forced to depend on the firmware) and
we rely on these for certain trivial tasks such as setting up the
bootloader. But some hardware fails to work if we attempt to use these
runtime services from physical mode, and so we have to switch into virtual
mode. So far so dreadful.
The specification makes it clear that the operating system is free to do
whatever it wants with boot services code after ExitBootServices() has been
called. SetVirtualAddressMap() can't be called until ExitBootServices() has
been. So, obviously, a whole bunch of EFI implementations call into boot
services code when we do that. Since we've been charmingly naive and
trusted that the specification may be somehow relevant to the real world,
we've already stuffed a picture of a penguin or something in that address
space. And just to make things more entertaining, we've also marked it
non-executable.
This patch allocates the boot services regions during EFI init and makes
sure that they're executable. Then, after SetVirtualAddressMap(), it
discards them and everyone lives happily ever after. Except for the ones
who have to work on EFI, who live sad lives haunted by the knowledge that
someone's eventually going to write yet another firmware specification.
[ hpa: adding this to urgent with a stable tag since it fixes currently-broken
hardware. However, I do not know what the dependencies are and so I do
not know which -stable versions this may be a candidate for. ]
Signed-off-by: Matthew Garrett <mjg@redhat.com>
Link: http://lkml.kernel.org/r/1306331593-28715-1-git-send-email-mjg@redhat.com
Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
Cc: Tony Luck <tony.luck@intel.com>
Cc: <stable@kernel.org>
2011-05-25 17:53:13 +04:00
|
|
|
extern void efi_reserve_boot_services(void);
|
2015-08-26 16:24:58 +03:00
|
|
|
extern int efi_get_fdt_params(struct efi_fdt_params *params);
|
2015-04-29 01:44:31 +03:00
|
|
|
extern struct kobject *efi_kobj;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2014-06-13 15:39:55 +04:00
|
|
|
extern int efi_reboot_quirk_mode;
|
efi/reboot: Allow powering off machines using EFI
Not only can EfiResetSystem() be used to reboot, it can also be used to
power down machines.
By and large, this functionality doesn't work very well across the range
of EFI machines in the wild, so it should definitely only be used as a
last resort. In an ideal world, this wouldn't be needed at all.
Unfortunately, we're starting to see machines where EFI is the *only*
reliable way to power down, and nothing else, not PCI, not ACPI, works.
efi_poweroff_required() should be implemented on a per-architecture
basis, since exactly when we should be using EFI runtime services is a
platform-specific decision. There's no analogue for reboot because each
architecture handles reboot very differently - the x86 code in
particular is pretty complex.
Patches to enable this for specific classes of hardware will be
submitted separately.
Tested-by: Mark Salter <msalter@redhat.com>
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
2014-06-13 15:35:21 +04:00
|
|
|
extern bool efi_poweroff_required(void);
|
|
|
|
|
2015-09-30 17:01:56 +03:00
|
|
|
#ifdef CONFIG_EFI_FAKE_MEMMAP
|
|
|
|
extern void __init efi_fake_memmap(void);
|
|
|
|
#else
|
|
|
|
static inline void efi_fake_memmap(void) { }
|
|
|
|
#endif
|
|
|
|
|
2016-04-25 23:06:45 +03:00
|
|
|
/*
|
|
|
|
* efi_memattr_perm_setter - arch specific callback function passed into
|
|
|
|
* efi_memattr_apply_permissions() that updates the
|
|
|
|
* mapping permissions described by the second
|
|
|
|
* argument in the page tables referred to by the
|
|
|
|
* first argument.
|
|
|
|
*/
|
|
|
|
typedef int (*efi_memattr_perm_setter)(struct mm_struct *, efi_memory_desc_t *);
|
|
|
|
|
|
|
|
extern int efi_memattr_init(void);
|
|
|
|
extern int efi_memattr_apply_permissions(struct mm_struct *mm,
|
|
|
|
efi_memattr_perm_setter fn);
|
|
|
|
|
2017-08-16 16:46:51 +03:00
|
|
|
/*
|
|
|
|
* efi_early_memdesc_ptr - get the n-th EFI memmap descriptor
|
|
|
|
* @map: the start of efi memmap
|
|
|
|
* @desc_size: the size of space for each EFI memmap descriptor
|
|
|
|
* @n: the index of efi memmap descriptor
|
|
|
|
*
|
|
|
|
* EFI boot service provides the GetMemoryMap() function to get a copy of the
|
|
|
|
* current memory map which is an array of memory descriptors, each of
|
|
|
|
* which describes a contiguous block of memory. It also gets the size of the
|
|
|
|
* map, and the size of each descriptor, etc.
|
|
|
|
*
|
|
|
|
* Note that per section 6.2 of UEFI Spec 2.6 Errata A, the returned size of
|
|
|
|
* each descriptor might not be equal to sizeof(efi_memory_memdesc_t),
|
|
|
|
* since efi_memory_memdesc_t may be extended in the future. Thus the OS
|
|
|
|
* MUST use the returned size of the descriptor to find the start of each
|
|
|
|
* efi_memory_memdesc_t in the memory map array. This should only be used
|
|
|
|
* during bootup since for_each_efi_memory_desc_xxx() is available after the
|
|
|
|
* kernel initializes the EFI subsystem to set up struct efi_memory_map.
|
|
|
|
*/
|
|
|
|
#define efi_early_memdesc_ptr(map, desc_size, n) \
|
|
|
|
(efi_memory_desc_t *)((void *)(map) + ((n) * (desc_size)))
|
|
|
|
|
2014-01-10 23:26:06 +04:00
|
|
|
/* Iterate through an efi_memory_map */
|
2016-04-25 23:06:38 +03:00
|
|
|
#define for_each_efi_memory_desc_in_map(m, md) \
|
2014-01-10 23:26:06 +04:00
|
|
|
for ((md) = (m)->map; \
|
2016-08-15 18:05:45 +03:00
|
|
|
(md) && ((void *)(md) + (m)->desc_size) <= (m)->map_end; \
|
2014-01-10 23:26:06 +04:00
|
|
|
(md) = (void *)(md) + (m)->desc_size)
|
|
|
|
|
2016-04-25 23:06:38 +03:00
|
|
|
/**
|
|
|
|
* for_each_efi_memory_desc - iterate over descriptors in efi.memmap
|
|
|
|
* @md: the efi_memory_desc_t * iterator
|
|
|
|
*
|
|
|
|
* Once the loop finishes @md must not be accessed.
|
|
|
|
*/
|
|
|
|
#define for_each_efi_memory_desc(md) \
|
2016-04-25 23:06:39 +03:00
|
|
|
for_each_efi_memory_desc_in_map(&efi.memmap, md)
|
2016-04-25 23:06:38 +03:00
|
|
|
|
2014-09-03 15:32:20 +04:00
|
|
|
/*
|
|
|
|
* Format an EFI memory descriptor's type and attributes to a user-provided
|
|
|
|
* character buffer, as per snprintf(), and return the buffer.
|
|
|
|
*/
|
|
|
|
char * __init efi_md_typeattr_format(char *buf, size_t size,
|
|
|
|
const efi_memory_desc_t *md);
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
/**
|
|
|
|
* efi_range_is_wc - check the WC bit on an address range
|
|
|
|
* @start: starting kvirt address
|
|
|
|
* @len: length of range
|
|
|
|
*
|
|
|
|
* Consult the EFI memory map and make sure it's ok to set this range WC.
|
|
|
|
* Returns true or false.
|
|
|
|
*/
|
|
|
|
static inline int efi_range_is_wc(unsigned long start, unsigned long len)
|
|
|
|
{
|
2005-06-17 02:14:00 +04:00
|
|
|
unsigned long i;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
for (i = 0; i < len; i += (1UL << EFI_PAGE_SHIFT)) {
|
|
|
|
unsigned long paddr = __pa(start + i);
|
|
|
|
if (!(efi_mem_attributes(paddr) & EFI_MEMORY_WC))
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* The range checked out */
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_EFI_PCDP
|
|
|
|
extern int __init efi_setup_pcdp_console(char *);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
2012-11-14 13:42:35 +04:00
|
|
|
* We play games with efi_enabled so that the compiler will, if
|
|
|
|
* possible, remove EFI-related code altogether.
|
2005-04-17 02:20:36 +04:00
|
|
|
*/
|
2012-11-14 13:42:35 +04:00
|
|
|
#define EFI_BOOT 0 /* Were we booted from EFI? */
|
|
|
|
#define EFI_CONFIG_TABLES 2 /* Can we use EFI config tables? */
|
|
|
|
#define EFI_RUNTIME_SERVICES 3 /* Can we use runtime services? */
|
|
|
|
#define EFI_MEMMAP 4 /* Can we use EFI memory map? */
|
|
|
|
#define EFI_64BIT 5 /* Is the firmware 64-bit? */
|
2014-06-30 21:52:58 +04:00
|
|
|
#define EFI_PARAVIRT 6 /* Access is via a paravirt interface */
|
|
|
|
#define EFI_ARCH_1 7 /* First arch-specific bit */
|
2015-02-05 13:44:41 +03:00
|
|
|
#define EFI_DBG 8 /* Print additional debug info at runtime */
|
2015-09-23 17:29:34 +03:00
|
|
|
#define EFI_NX_PE_DATA 9 /* Can runtime data regions be mapped non-executable? */
|
2017-01-31 16:21:36 +03:00
|
|
|
#define EFI_MEM_ATTR 10 /* Did firmware publish an EFI_MEMORY_ATTRIBUTES table? */
|
2012-11-14 13:42:35 +04:00
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
#ifdef CONFIG_EFI
|
2014-01-15 17:21:22 +04:00
|
|
|
/*
|
|
|
|
* Test whether the above EFI_* bits are enabled.
|
|
|
|
*/
|
|
|
|
static inline bool efi_enabled(int feature)
|
|
|
|
{
|
|
|
|
return test_bit(feature, &efi.flags) != 0;
|
|
|
|
}
|
2014-06-13 15:22:22 +04:00
|
|
|
extern void efi_reboot(enum reboot_mode reboot_mode, const char *__unused);
|
2017-07-18 00:10:13 +03:00
|
|
|
|
|
|
|
extern bool efi_is_table_address(unsigned long phys_addr);
|
2005-04-17 02:20:36 +04:00
|
|
|
#else
|
2014-01-15 17:21:22 +04:00
|
|
|
static inline bool efi_enabled(int feature)
|
2012-11-14 13:42:35 +04:00
|
|
|
{
|
2014-01-15 17:21:22 +04:00
|
|
|
return false;
|
2012-11-14 13:42:35 +04:00
|
|
|
}
|
2014-06-13 15:22:22 +04:00
|
|
|
static inline void
|
|
|
|
efi_reboot(enum reboot_mode reboot_mode, const char *__unused) {}
|
2016-04-25 23:07:00 +03:00
|
|
|
|
|
|
|
static inline bool
|
|
|
|
efi_capsule_pending(int *reset_type)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
2017-07-18 00:10:13 +03:00
|
|
|
|
|
|
|
static inline bool efi_is_table_address(unsigned long phys_addr)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
#endif
|
|
|
|
|
2016-04-25 23:06:58 +03:00
|
|
|
extern int efi_status_to_err(efi_status_t status);
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
/*
|
|
|
|
* Variable Attributes
|
|
|
|
*/
|
|
|
|
#define EFI_VARIABLE_NON_VOLATILE 0x0000000000000001
|
|
|
|
#define EFI_VARIABLE_BOOTSERVICE_ACCESS 0x0000000000000002
|
|
|
|
#define EFI_VARIABLE_RUNTIME_ACCESS 0x0000000000000004
|
2012-05-01 00:11:29 +04:00
|
|
|
#define EFI_VARIABLE_HARDWARE_ERROR_RECORD 0x0000000000000008
|
|
|
|
#define EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS 0x0000000000000010
|
|
|
|
#define EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS 0x0000000000000020
|
|
|
|
#define EFI_VARIABLE_APPEND_WRITE 0x0000000000000040
|
|
|
|
|
|
|
|
#define EFI_VARIABLE_MASK (EFI_VARIABLE_NON_VOLATILE | \
|
|
|
|
EFI_VARIABLE_BOOTSERVICE_ACCESS | \
|
|
|
|
EFI_VARIABLE_RUNTIME_ACCESS | \
|
|
|
|
EFI_VARIABLE_HARDWARE_ERROR_RECORD | \
|
|
|
|
EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS | \
|
|
|
|
EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS | \
|
|
|
|
EFI_VARIABLE_APPEND_WRITE)
|
2013-02-04 00:16:40 +04:00
|
|
|
/*
|
|
|
|
* Length of a GUID string (strlen("aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee"))
|
|
|
|
* not including trailing NUL
|
|
|
|
*/
|
2016-05-21 03:01:18 +03:00
|
|
|
#define EFI_VARIABLE_GUID_LEN UUID_STRING_LEN
|
2013-02-04 00:16:40 +04:00
|
|
|
|
2011-11-15 16:57:26 +04:00
|
|
|
/*
|
|
|
|
* The type of search to perform when calling boottime->locate_handle
|
|
|
|
*/
|
|
|
|
#define EFI_LOCATE_ALL_HANDLES 0
|
|
|
|
#define EFI_LOCATE_BY_REGISTER_NOTIFY 1
|
|
|
|
#define EFI_LOCATE_BY_PROTOCOL 2
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
/*
|
|
|
|
* EFI Device Path information
|
|
|
|
*/
|
|
|
|
#define EFI_DEV_HW 0x01
|
|
|
|
#define EFI_DEV_PCI 1
|
|
|
|
#define EFI_DEV_PCCARD 2
|
|
|
|
#define EFI_DEV_MEM_MAPPED 3
|
|
|
|
#define EFI_DEV_VENDOR 4
|
|
|
|
#define EFI_DEV_CONTROLLER 5
|
|
|
|
#define EFI_DEV_ACPI 0x02
|
|
|
|
#define EFI_DEV_BASIC_ACPI 1
|
|
|
|
#define EFI_DEV_EXPANDED_ACPI 2
|
|
|
|
#define EFI_DEV_MSG 0x03
|
|
|
|
#define EFI_DEV_MSG_ATAPI 1
|
|
|
|
#define EFI_DEV_MSG_SCSI 2
|
|
|
|
#define EFI_DEV_MSG_FC 3
|
|
|
|
#define EFI_DEV_MSG_1394 4
|
|
|
|
#define EFI_DEV_MSG_USB 5
|
|
|
|
#define EFI_DEV_MSG_USB_CLASS 15
|
|
|
|
#define EFI_DEV_MSG_I20 6
|
|
|
|
#define EFI_DEV_MSG_MAC 11
|
|
|
|
#define EFI_DEV_MSG_IPV4 12
|
|
|
|
#define EFI_DEV_MSG_IPV6 13
|
|
|
|
#define EFI_DEV_MSG_INFINIBAND 9
|
|
|
|
#define EFI_DEV_MSG_UART 14
|
|
|
|
#define EFI_DEV_MSG_VENDOR 10
|
|
|
|
#define EFI_DEV_MEDIA 0x04
|
|
|
|
#define EFI_DEV_MEDIA_HARD_DRIVE 1
|
|
|
|
#define EFI_DEV_MEDIA_CDROM 2
|
|
|
|
#define EFI_DEV_MEDIA_VENDOR 3
|
|
|
|
#define EFI_DEV_MEDIA_FILE 4
|
|
|
|
#define EFI_DEV_MEDIA_PROTOCOL 5
|
|
|
|
#define EFI_DEV_BIOS_BOOT 0x05
|
|
|
|
#define EFI_DEV_END_PATH 0x7F
|
|
|
|
#define EFI_DEV_END_PATH2 0xFF
|
|
|
|
#define EFI_DEV_END_INSTANCE 0x01
|
|
|
|
#define EFI_DEV_END_ENTIRE 0xFF
|
|
|
|
|
|
|
|
struct efi_generic_dev_path {
|
|
|
|
u8 type;
|
|
|
|
u8 sub_type;
|
|
|
|
u16 length;
|
|
|
|
} __attribute ((packed));
|
|
|
|
|
2016-11-13 00:32:34 +03:00
|
|
|
struct efi_dev_path {
|
|
|
|
u8 type; /* can be replaced with unnamed */
|
|
|
|
u8 sub_type; /* struct efi_generic_dev_path; */
|
|
|
|
u16 length; /* once we've moved to -std=c11 */
|
|
|
|
union {
|
|
|
|
struct {
|
|
|
|
u32 hid;
|
|
|
|
u32 uid;
|
|
|
|
} acpi;
|
|
|
|
struct {
|
|
|
|
u8 fn;
|
|
|
|
u8 dev;
|
|
|
|
} pci;
|
|
|
|
};
|
|
|
|
} __attribute ((packed));
|
|
|
|
|
|
|
|
#if IS_ENABLED(CONFIG_EFI_DEV_PATH_PARSER)
|
|
|
|
struct device *efi_get_device_by_path(struct efi_dev_path **node, size_t *len);
|
|
|
|
#endif
|
|
|
|
|
2008-02-25 10:18:37 +03:00
|
|
|
static inline void memrange_efi_to_native(u64 *addr, u64 *npages)
|
|
|
|
{
|
|
|
|
*npages = PFN_UP(*addr + (*npages<<EFI_PAGE_SHIFT)) - PFN_DOWN(*addr);
|
|
|
|
*addr &= PAGE_MASK;
|
|
|
|
}
|
|
|
|
|
2011-03-12 04:43:27 +03:00
|
|
|
/*
|
|
|
|
* EFI Variable support.
|
|
|
|
*
|
|
|
|
* Different firmware drivers can expose their EFI-like variables using
|
|
|
|
* the following.
|
|
|
|
*/
|
|
|
|
|
|
|
|
struct efivar_operations {
|
|
|
|
efi_get_variable_t *get_variable;
|
|
|
|
efi_get_next_variable_t *get_next_variable;
|
|
|
|
efi_set_variable_t *set_variable;
|
2016-02-02 01:06:56 +03:00
|
|
|
efi_set_variable_t *set_variable_nonblocking;
|
2013-03-25 13:14:30 +04:00
|
|
|
efi_query_variable_store_t *query_variable_store;
|
2011-03-12 04:43:27 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
struct efivars {
|
|
|
|
struct kset *kset;
|
2012-10-05 09:54:56 +04:00
|
|
|
struct kobject *kobject;
|
2011-03-12 04:43:27 +03:00
|
|
|
const struct efivar_operations *ops;
|
|
|
|
};
|
|
|
|
|
2013-02-04 00:16:40 +04:00
|
|
|
/*
|
|
|
|
* The maximum size of VariableName + Data = 1024
|
|
|
|
* Therefore, it's reasonable to save that much
|
|
|
|
* space in each part of the structure,
|
|
|
|
* and we use a page for reading/writing.
|
|
|
|
*/
|
|
|
|
|
2014-03-17 14:57:00 +04:00
|
|
|
#define EFI_VAR_NAME_LEN 1024
|
|
|
|
|
2013-02-04 00:16:40 +04:00
|
|
|
struct efi_variable {
|
2014-03-17 14:57:00 +04:00
|
|
|
efi_char16_t VariableName[EFI_VAR_NAME_LEN/sizeof(efi_char16_t)];
|
2013-02-04 00:16:40 +04:00
|
|
|
efi_guid_t VendorGuid;
|
|
|
|
unsigned long DataSize;
|
|
|
|
__u8 Data[1024];
|
|
|
|
efi_status_t Status;
|
|
|
|
__u32 Attributes;
|
|
|
|
} __attribute__((packed));
|
|
|
|
|
|
|
|
struct efivar_entry {
|
|
|
|
struct efi_variable var;
|
|
|
|
struct list_head list;
|
|
|
|
struct kobject kobj;
|
efivars, efi-pstore: Hold off deletion of sysfs entry until the scan is completed
Currently, when mounting pstore file system, a read callback of
efi_pstore driver runs mutiple times as below.
- In the first read callback, scan efivar_sysfs_list from head and pass
a kmsg buffer of a entry to an upper pstore layer.
- In the second read callback, rescan efivar_sysfs_list from the entry
and pass another kmsg buffer to it.
- Repeat the scan and pass until the end of efivar_sysfs_list.
In this process, an entry is read across the multiple read function
calls. To avoid race between the read and erasion, the whole process
above is protected by a spinlock, holding in open() and releasing in
close().
At the same time, kmemdup() is called to pass the buffer to pstore
filesystem during it. And then, it causes a following lockdep warning.
To make the dynamic memory allocation runnable without taking spinlock,
holding off a deletion of sysfs entry if it happens while scanning it
via efi_pstore, and deleting it after the scan is completed.
To implement it, this patch introduces two flags, scanning and deleting,
to efivar_entry.
On the code basis, it seems that all the scanning and deleting logic is
not needed because __efivars->lock are not dropped when reading from the
EFI variable store.
But, the scanning and deleting logic is still needed because an
efi-pstore and a pstore filesystem works as follows.
In case an entry(A) is found, the pointer is saved to psi->data. And
efi_pstore_read() passes the entry(A) to a pstore filesystem by
releasing __efivars->lock.
And then, the pstore filesystem calls efi_pstore_read() again and the
same entry(A), which is saved to psi->data, is used for resuming to scan
a sysfs-list.
So, to protect the entry(A), the logic is needed.
[ 1.143710] ------------[ cut here ]------------
[ 1.144058] WARNING: CPU: 1 PID: 1 at kernel/lockdep.c:2740 lockdep_trace_alloc+0x104/0x110()
[ 1.144058] DEBUG_LOCKS_WARN_ON(irqs_disabled_flags(flags))
[ 1.144058] Modules linked in:
[ 1.144058] CPU: 1 PID: 1 Comm: systemd Not tainted 3.11.0-rc5 #2
[ 1.144058] 0000000000000009 ffff8800797e9ae0 ffffffff816614a5 ffff8800797e9b28
[ 1.144058] ffff8800797e9b18 ffffffff8105510d 0000000000000080 0000000000000046
[ 1.144058] 00000000000000d0 00000000000003af ffffffff81ccd0c0 ffff8800797e9b78
[ 1.144058] Call Trace:
[ 1.144058] [<ffffffff816614a5>] dump_stack+0x54/0x74
[ 1.144058] [<ffffffff8105510d>] warn_slowpath_common+0x7d/0xa0
[ 1.144058] [<ffffffff8105517c>] warn_slowpath_fmt+0x4c/0x50
[ 1.144058] [<ffffffff8131290f>] ? vsscanf+0x57f/0x7b0
[ 1.144058] [<ffffffff810bbd74>] lockdep_trace_alloc+0x104/0x110
[ 1.144058] [<ffffffff81192da0>] __kmalloc_track_caller+0x50/0x280
[ 1.144058] [<ffffffff815147bb>] ? efi_pstore_read_func.part.1+0x12b/0x170
[ 1.144058] [<ffffffff8115b260>] kmemdup+0x20/0x50
[ 1.144058] [<ffffffff815147bb>] efi_pstore_read_func.part.1+0x12b/0x170
[ 1.144058] [<ffffffff81514800>] ? efi_pstore_read_func.part.1+0x170/0x170
[ 1.144058] [<ffffffff815148b4>] efi_pstore_read_func+0xb4/0xe0
[ 1.144058] [<ffffffff81512b7b>] __efivar_entry_iter+0xfb/0x120
[ 1.144058] [<ffffffff8151428f>] efi_pstore_read+0x3f/0x50
[ 1.144058] [<ffffffff8128d7ba>] pstore_get_records+0x9a/0x150
[ 1.158207] [<ffffffff812af25c>] ? selinux_d_instantiate+0x1c/0x20
[ 1.158207] [<ffffffff8128ce30>] ? parse_options+0x80/0x80
[ 1.158207] [<ffffffff8128ced5>] pstore_fill_super+0xa5/0xc0
[ 1.158207] [<ffffffff811ae7d2>] mount_single+0xa2/0xd0
[ 1.158207] [<ffffffff8128ccf8>] pstore_mount+0x18/0x20
[ 1.158207] [<ffffffff811ae8b9>] mount_fs+0x39/0x1b0
[ 1.158207] [<ffffffff81160550>] ? __alloc_percpu+0x10/0x20
[ 1.158207] [<ffffffff811c9493>] vfs_kern_mount+0x63/0xf0
[ 1.158207] [<ffffffff811cbb0e>] do_mount+0x23e/0xa20
[ 1.158207] [<ffffffff8115b51b>] ? strndup_user+0x4b/0xf0
[ 1.158207] [<ffffffff811cc373>] SyS_mount+0x83/0xc0
[ 1.158207] [<ffffffff81673cc2>] system_call_fastpath+0x16/0x1b
[ 1.158207] ---[ end trace 61981bc62de9f6f4 ]---
Signed-off-by: Seiji Aguchi <seiji.aguchi@hds.com>
Tested-by: Madper Xie <cxie@redhat.com>
Cc: stable@kernel.org
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
2013-10-30 23:27:26 +04:00
|
|
|
bool scanning;
|
|
|
|
bool deleting;
|
2013-02-04 00:16:40 +04:00
|
|
|
};
|
|
|
|
|
2017-01-31 16:21:34 +03:00
|
|
|
typedef struct {
|
2014-01-10 17:47:37 +04:00
|
|
|
u32 reset;
|
|
|
|
u32 output_string;
|
|
|
|
u32 test_string;
|
2017-01-31 16:21:34 +03:00
|
|
|
} efi_simple_text_output_protocol_32_t;
|
2014-01-10 17:47:37 +04:00
|
|
|
|
2017-01-31 16:21:34 +03:00
|
|
|
typedef struct {
|
2014-01-10 17:47:37 +04:00
|
|
|
u64 reset;
|
|
|
|
u64 output_string;
|
|
|
|
u64 test_string;
|
2017-01-31 16:21:34 +03:00
|
|
|
} efi_simple_text_output_protocol_64_t;
|
2013-09-23 02:45:26 +04:00
|
|
|
|
|
|
|
struct efi_simple_text_output_protocol {
|
|
|
|
void *reset;
|
|
|
|
efi_status_t (*output_string)(void *, void *);
|
|
|
|
void *test_string;
|
|
|
|
};
|
|
|
|
|
2016-04-25 23:06:49 +03:00
|
|
|
#define PIXEL_RGB_RESERVED_8BIT_PER_COLOR 0
|
|
|
|
#define PIXEL_BGR_RESERVED_8BIT_PER_COLOR 1
|
|
|
|
#define PIXEL_BIT_MASK 2
|
|
|
|
#define PIXEL_BLT_ONLY 3
|
|
|
|
#define PIXEL_FORMAT_MAX 4
|
|
|
|
|
|
|
|
struct efi_pixel_bitmask {
|
|
|
|
u32 red_mask;
|
|
|
|
u32 green_mask;
|
|
|
|
u32 blue_mask;
|
|
|
|
u32 reserved_mask;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct efi_graphics_output_mode_info {
|
|
|
|
u32 version;
|
|
|
|
u32 horizontal_resolution;
|
|
|
|
u32 vertical_resolution;
|
|
|
|
int pixel_format;
|
|
|
|
struct efi_pixel_bitmask pixel_information;
|
|
|
|
u32 pixels_per_scan_line;
|
|
|
|
} __packed;
|
|
|
|
|
|
|
|
struct efi_graphics_output_protocol_mode_32 {
|
|
|
|
u32 max_mode;
|
|
|
|
u32 mode;
|
|
|
|
u32 info;
|
|
|
|
u32 size_of_info;
|
|
|
|
u64 frame_buffer_base;
|
|
|
|
u32 frame_buffer_size;
|
|
|
|
} __packed;
|
|
|
|
|
|
|
|
struct efi_graphics_output_protocol_mode_64 {
|
|
|
|
u32 max_mode;
|
|
|
|
u32 mode;
|
|
|
|
u64 info;
|
|
|
|
u64 size_of_info;
|
|
|
|
u64 frame_buffer_base;
|
|
|
|
u64 frame_buffer_size;
|
|
|
|
} __packed;
|
|
|
|
|
|
|
|
struct efi_graphics_output_protocol_mode {
|
|
|
|
u32 max_mode;
|
|
|
|
u32 mode;
|
|
|
|
unsigned long info;
|
|
|
|
unsigned long size_of_info;
|
|
|
|
u64 frame_buffer_base;
|
|
|
|
unsigned long frame_buffer_size;
|
|
|
|
} __packed;
|
|
|
|
|
|
|
|
struct efi_graphics_output_protocol_32 {
|
|
|
|
u32 query_mode;
|
|
|
|
u32 set_mode;
|
|
|
|
u32 blt;
|
|
|
|
u32 mode;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct efi_graphics_output_protocol_64 {
|
|
|
|
u64 query_mode;
|
|
|
|
u64 set_mode;
|
|
|
|
u64 blt;
|
|
|
|
u64 mode;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct efi_graphics_output_protocol {
|
|
|
|
unsigned long query_mode;
|
|
|
|
unsigned long set_mode;
|
|
|
|
unsigned long blt;
|
|
|
|
struct efi_graphics_output_protocol_mode *mode;
|
|
|
|
};
|
|
|
|
|
|
|
|
typedef efi_status_t (*efi_graphics_output_protocol_query_mode)(
|
|
|
|
struct efi_graphics_output_protocol *, u32, unsigned long *,
|
|
|
|
struct efi_graphics_output_mode_info **);
|
|
|
|
|
2013-02-08 19:48:51 +04:00
|
|
|
extern struct list_head efivar_sysfs_list;
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
efivar_unregister(struct efivar_entry *var)
|
|
|
|
{
|
|
|
|
kobject_put(&var->kobj);
|
|
|
|
}
|
|
|
|
|
2013-02-04 00:16:40 +04:00
|
|
|
int efivars_register(struct efivars *efivars,
|
2011-03-12 04:43:27 +03:00
|
|
|
const struct efivar_operations *ops,
|
2013-02-04 00:16:40 +04:00
|
|
|
struct kobject *kobject);
|
|
|
|
int efivars_unregister(struct efivars *efivars);
|
|
|
|
struct kobject *efivars_kobject(void);
|
|
|
|
|
|
|
|
int efivar_init(int (*func)(efi_char16_t *, efi_guid_t, unsigned long, void *),
|
2016-05-07 00:39:30 +03:00
|
|
|
void *data, bool duplicates, struct list_head *head);
|
2013-02-04 00:16:40 +04:00
|
|
|
|
2016-07-15 22:36:30 +03:00
|
|
|
int efivar_entry_add(struct efivar_entry *entry, struct list_head *head);
|
|
|
|
int efivar_entry_remove(struct efivar_entry *entry);
|
2013-02-04 00:16:40 +04:00
|
|
|
|
|
|
|
int __efivar_entry_delete(struct efivar_entry *entry);
|
|
|
|
int efivar_entry_delete(struct efivar_entry *entry);
|
|
|
|
|
|
|
|
int efivar_entry_size(struct efivar_entry *entry, unsigned long *size);
|
2013-04-29 23:08:02 +04:00
|
|
|
int __efivar_entry_get(struct efivar_entry *entry, u32 *attributes,
|
|
|
|
unsigned long *size, void *data);
|
2013-02-04 00:16:40 +04:00
|
|
|
int efivar_entry_get(struct efivar_entry *entry, u32 *attributes,
|
|
|
|
unsigned long *size, void *data);
|
|
|
|
int efivar_entry_set(struct efivar_entry *entry, u32 attributes,
|
|
|
|
unsigned long size, void *data, struct list_head *head);
|
|
|
|
int efivar_entry_set_get_size(struct efivar_entry *entry, u32 attributes,
|
|
|
|
unsigned long *size, void *data, bool *set);
|
|
|
|
int efivar_entry_set_safe(efi_char16_t *name, efi_guid_t vendor, u32 attributes,
|
|
|
|
bool block, unsigned long size, void *data);
|
|
|
|
|
2016-07-15 22:36:30 +03:00
|
|
|
int efivar_entry_iter_begin(void);
|
2013-02-04 00:16:40 +04:00
|
|
|
void efivar_entry_iter_end(void);
|
|
|
|
|
|
|
|
int __efivar_entry_iter(int (*func)(struct efivar_entry *, void *),
|
|
|
|
struct list_head *head, void *data,
|
|
|
|
struct efivar_entry **prev);
|
|
|
|
int efivar_entry_iter(int (*func)(struct efivar_entry *, void *),
|
|
|
|
struct list_head *head, void *data);
|
|
|
|
|
|
|
|
struct efivar_entry *efivar_entry_find(efi_char16_t *name, efi_guid_t guid,
|
|
|
|
struct list_head *head, bool remove);
|
|
|
|
|
2016-02-08 22:48:14 +03:00
|
|
|
bool efivar_validate(efi_guid_t vendor, efi_char16_t *var_name, u8 *data,
|
|
|
|
unsigned long data_size);
|
2016-02-08 22:48:15 +03:00
|
|
|
bool efivar_variable_is_removable(efi_guid_t vendor, const char *name,
|
|
|
|
size_t len);
|
2013-02-04 00:16:40 +04:00
|
|
|
|
2013-02-08 19:37:06 +04:00
|
|
|
extern struct work_struct efivar_work;
|
2013-02-08 19:48:51 +04:00
|
|
|
void efivar_run_worker(void);
|
|
|
|
|
2013-02-08 19:37:06 +04:00
|
|
|
#if defined(CONFIG_EFI_VARS) || defined(CONFIG_EFI_VARS_MODULE)
|
2013-02-04 00:16:40 +04:00
|
|
|
int efivars_sysfs_init(void);
|
2011-03-12 04:43:27 +03:00
|
|
|
|
efivars, efi-pstore: Hold off deletion of sysfs entry until the scan is completed
Currently, when mounting pstore file system, a read callback of
efi_pstore driver runs mutiple times as below.
- In the first read callback, scan efivar_sysfs_list from head and pass
a kmsg buffer of a entry to an upper pstore layer.
- In the second read callback, rescan efivar_sysfs_list from the entry
and pass another kmsg buffer to it.
- Repeat the scan and pass until the end of efivar_sysfs_list.
In this process, an entry is read across the multiple read function
calls. To avoid race between the read and erasion, the whole process
above is protected by a spinlock, holding in open() and releasing in
close().
At the same time, kmemdup() is called to pass the buffer to pstore
filesystem during it. And then, it causes a following lockdep warning.
To make the dynamic memory allocation runnable without taking spinlock,
holding off a deletion of sysfs entry if it happens while scanning it
via efi_pstore, and deleting it after the scan is completed.
To implement it, this patch introduces two flags, scanning and deleting,
to efivar_entry.
On the code basis, it seems that all the scanning and deleting logic is
not needed because __efivars->lock are not dropped when reading from the
EFI variable store.
But, the scanning and deleting logic is still needed because an
efi-pstore and a pstore filesystem works as follows.
In case an entry(A) is found, the pointer is saved to psi->data. And
efi_pstore_read() passes the entry(A) to a pstore filesystem by
releasing __efivars->lock.
And then, the pstore filesystem calls efi_pstore_read() again and the
same entry(A), which is saved to psi->data, is used for resuming to scan
a sysfs-list.
So, to protect the entry(A), the logic is needed.
[ 1.143710] ------------[ cut here ]------------
[ 1.144058] WARNING: CPU: 1 PID: 1 at kernel/lockdep.c:2740 lockdep_trace_alloc+0x104/0x110()
[ 1.144058] DEBUG_LOCKS_WARN_ON(irqs_disabled_flags(flags))
[ 1.144058] Modules linked in:
[ 1.144058] CPU: 1 PID: 1 Comm: systemd Not tainted 3.11.0-rc5 #2
[ 1.144058] 0000000000000009 ffff8800797e9ae0 ffffffff816614a5 ffff8800797e9b28
[ 1.144058] ffff8800797e9b18 ffffffff8105510d 0000000000000080 0000000000000046
[ 1.144058] 00000000000000d0 00000000000003af ffffffff81ccd0c0 ffff8800797e9b78
[ 1.144058] Call Trace:
[ 1.144058] [<ffffffff816614a5>] dump_stack+0x54/0x74
[ 1.144058] [<ffffffff8105510d>] warn_slowpath_common+0x7d/0xa0
[ 1.144058] [<ffffffff8105517c>] warn_slowpath_fmt+0x4c/0x50
[ 1.144058] [<ffffffff8131290f>] ? vsscanf+0x57f/0x7b0
[ 1.144058] [<ffffffff810bbd74>] lockdep_trace_alloc+0x104/0x110
[ 1.144058] [<ffffffff81192da0>] __kmalloc_track_caller+0x50/0x280
[ 1.144058] [<ffffffff815147bb>] ? efi_pstore_read_func.part.1+0x12b/0x170
[ 1.144058] [<ffffffff8115b260>] kmemdup+0x20/0x50
[ 1.144058] [<ffffffff815147bb>] efi_pstore_read_func.part.1+0x12b/0x170
[ 1.144058] [<ffffffff81514800>] ? efi_pstore_read_func.part.1+0x170/0x170
[ 1.144058] [<ffffffff815148b4>] efi_pstore_read_func+0xb4/0xe0
[ 1.144058] [<ffffffff81512b7b>] __efivar_entry_iter+0xfb/0x120
[ 1.144058] [<ffffffff8151428f>] efi_pstore_read+0x3f/0x50
[ 1.144058] [<ffffffff8128d7ba>] pstore_get_records+0x9a/0x150
[ 1.158207] [<ffffffff812af25c>] ? selinux_d_instantiate+0x1c/0x20
[ 1.158207] [<ffffffff8128ce30>] ? parse_options+0x80/0x80
[ 1.158207] [<ffffffff8128ced5>] pstore_fill_super+0xa5/0xc0
[ 1.158207] [<ffffffff811ae7d2>] mount_single+0xa2/0xd0
[ 1.158207] [<ffffffff8128ccf8>] pstore_mount+0x18/0x20
[ 1.158207] [<ffffffff811ae8b9>] mount_fs+0x39/0x1b0
[ 1.158207] [<ffffffff81160550>] ? __alloc_percpu+0x10/0x20
[ 1.158207] [<ffffffff811c9493>] vfs_kern_mount+0x63/0xf0
[ 1.158207] [<ffffffff811cbb0e>] do_mount+0x23e/0xa20
[ 1.158207] [<ffffffff8115b51b>] ? strndup_user+0x4b/0xf0
[ 1.158207] [<ffffffff811cc373>] SyS_mount+0x83/0xc0
[ 1.158207] [<ffffffff81673cc2>] system_call_fastpath+0x16/0x1b
[ 1.158207] ---[ end trace 61981bc62de9f6f4 ]---
Signed-off-by: Seiji Aguchi <seiji.aguchi@hds.com>
Tested-by: Madper Xie <cxie@redhat.com>
Cc: stable@kernel.org
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
2013-10-30 23:27:26 +04:00
|
|
|
#define EFIVARS_DATA_SIZE_MAX 1024
|
|
|
|
|
2011-03-12 04:43:27 +03:00
|
|
|
#endif /* CONFIG_EFI_VARS */
|
2016-04-25 23:06:59 +03:00
|
|
|
extern bool efi_capsule_pending(int *reset_type);
|
|
|
|
|
|
|
|
extern int efi_capsule_supported(efi_guid_t guid, u32 flags,
|
|
|
|
size_t size, int *reset);
|
|
|
|
|
|
|
|
extern int efi_capsule_update(efi_capsule_header_t *capsule,
|
2017-06-02 16:52:03 +03:00
|
|
|
phys_addr_t *pages);
|
2011-03-12 04:43:27 +03:00
|
|
|
|
2013-12-20 14:02:18 +04:00
|
|
|
#ifdef CONFIG_EFI_RUNTIME_MAP
|
|
|
|
int efi_runtime_map_init(struct kobject *);
|
2014-08-09 01:26:11 +04:00
|
|
|
int efi_get_runtime_map_size(void);
|
|
|
|
int efi_get_runtime_map_desc_size(void);
|
|
|
|
int efi_runtime_map_copy(void *buf, size_t bufsz);
|
2013-12-20 14:02:18 +04:00
|
|
|
#else
|
|
|
|
static inline int efi_runtime_map_init(struct kobject *kobj)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-08-09 01:26:11 +04:00
|
|
|
static inline int efi_get_runtime_map_size(void)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int efi_get_runtime_map_desc_size(void)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int efi_runtime_map_copy(void *buf, size_t bufsz)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-12-20 14:02:18 +04:00
|
|
|
#endif
|
|
|
|
|
2014-07-02 16:54:42 +04:00
|
|
|
/* prototypes shared between arch specific and generic stub code */
|
|
|
|
|
|
|
|
void efi_printk(efi_system_table_t *sys_table_arg, char *str);
|
|
|
|
|
|
|
|
void efi_free(efi_system_table_t *sys_table_arg, unsigned long size,
|
|
|
|
unsigned long addr);
|
|
|
|
|
|
|
|
char *efi_convert_cmdline(efi_system_table_t *sys_table_arg,
|
|
|
|
efi_loaded_image_t *image, int *cmd_line_len);
|
|
|
|
|
|
|
|
efi_status_t efi_get_memory_map(efi_system_table_t *sys_table_arg,
|
2016-08-29 23:38:51 +03:00
|
|
|
struct efi_boot_memmap *map);
|
2014-07-02 16:54:42 +04:00
|
|
|
|
|
|
|
efi_status_t efi_low_alloc(efi_system_table_t *sys_table_arg,
|
|
|
|
unsigned long size, unsigned long align,
|
|
|
|
unsigned long *addr);
|
|
|
|
|
|
|
|
efi_status_t efi_high_alloc(efi_system_table_t *sys_table_arg,
|
|
|
|
unsigned long size, unsigned long align,
|
|
|
|
unsigned long *addr, unsigned long max);
|
|
|
|
|
|
|
|
efi_status_t efi_relocate_kernel(efi_system_table_t *sys_table_arg,
|
|
|
|
unsigned long *image_addr,
|
|
|
|
unsigned long image_size,
|
|
|
|
unsigned long alloc_size,
|
|
|
|
unsigned long preferred_addr,
|
|
|
|
unsigned long alignment);
|
|
|
|
|
|
|
|
efi_status_t handle_cmdline_files(efi_system_table_t *sys_table_arg,
|
|
|
|
efi_loaded_image_t *image,
|
|
|
|
char *cmd_line, char *option_string,
|
|
|
|
unsigned long max_addr,
|
|
|
|
unsigned long *load_addr,
|
|
|
|
unsigned long *load_size);
|
|
|
|
|
2017-04-04 19:09:08 +03:00
|
|
|
efi_status_t efi_parse_options(char const *cmdline);
|
2014-08-05 14:52:11 +04:00
|
|
|
|
2016-04-25 23:06:48 +03:00
|
|
|
efi_status_t efi_setup_gop(efi_system_table_t *sys_table_arg,
|
|
|
|
struct screen_info *si, efi_guid_t *proto,
|
|
|
|
unsigned long size);
|
|
|
|
|
2014-08-14 13:15:26 +04:00
|
|
|
bool efi_runtime_disabled(void);
|
2016-06-25 10:20:27 +03:00
|
|
|
extern void efi_call_virt_check_flags(unsigned long flags, const char *call);
|
|
|
|
|
2017-02-06 14:22:43 +03:00
|
|
|
enum efi_secureboot_mode {
|
|
|
|
efi_secureboot_mode_unset,
|
|
|
|
efi_secureboot_mode_unknown,
|
|
|
|
efi_secureboot_mode_disabled,
|
|
|
|
efi_secureboot_mode_enabled,
|
|
|
|
};
|
|
|
|
enum efi_secureboot_mode efi_get_secureboot(efi_system_table_t *sys_table);
|
|
|
|
|
2017-08-25 18:50:15 +03:00
|
|
|
#ifdef CONFIG_RESET_ATTACK_MITIGATION
|
|
|
|
void efi_enable_reset_attack_mitigation(efi_system_table_t *sys_table_arg);
|
|
|
|
#else
|
|
|
|
static inline void
|
|
|
|
efi_enable_reset_attack_mitigation(efi_system_table_t *sys_table_arg) { }
|
|
|
|
#endif
|
|
|
|
|
2016-06-25 10:20:27 +03:00
|
|
|
/*
|
|
|
|
* Arch code can implement the following three template macros, avoiding
|
|
|
|
* reptition for the void/non-void return cases of {__,}efi_call_virt():
|
|
|
|
*
|
|
|
|
* * arch_efi_call_virt_setup()
|
|
|
|
*
|
|
|
|
* Sets up the environment for the call (e.g. switching page tables,
|
|
|
|
* allowing kernel-mode use of floating point, if required).
|
|
|
|
*
|
|
|
|
* * arch_efi_call_virt()
|
|
|
|
*
|
|
|
|
* Performs the call. The last expression in the macro must be the call
|
|
|
|
* itself, allowing the logic to be shared by the void and non-void
|
|
|
|
* cases.
|
|
|
|
*
|
|
|
|
* * arch_efi_call_virt_teardown()
|
|
|
|
*
|
|
|
|
* Restores the usual kernel environment once the call has returned.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#define efi_call_virt_pointer(p, f, args...) \
|
|
|
|
({ \
|
|
|
|
efi_status_t __s; \
|
|
|
|
unsigned long __flags; \
|
|
|
|
\
|
|
|
|
arch_efi_call_virt_setup(); \
|
|
|
|
\
|
|
|
|
local_save_flags(__flags); \
|
|
|
|
__s = arch_efi_call_virt(p, f, args); \
|
|
|
|
efi_call_virt_check_flags(__flags, __stringify(f)); \
|
|
|
|
\
|
|
|
|
arch_efi_call_virt_teardown(); \
|
|
|
|
\
|
|
|
|
__s; \
|
|
|
|
})
|
|
|
|
|
|
|
|
#define __efi_call_virt_pointer(p, f, args...) \
|
|
|
|
({ \
|
|
|
|
unsigned long __flags; \
|
|
|
|
\
|
|
|
|
arch_efi_call_virt_setup(); \
|
|
|
|
\
|
|
|
|
local_save_flags(__flags); \
|
|
|
|
arch_efi_call_virt(p, f, args); \
|
|
|
|
efi_call_virt_check_flags(__flags, __stringify(f)); \
|
|
|
|
\
|
|
|
|
arch_efi_call_virt_teardown(); \
|
|
|
|
})
|
|
|
|
|
2016-08-29 23:38:52 +03:00
|
|
|
typedef efi_status_t (*efi_exit_boot_map_processing)(
|
|
|
|
efi_system_table_t *sys_table_arg,
|
|
|
|
struct efi_boot_memmap *map,
|
|
|
|
void *priv);
|
|
|
|
|
|
|
|
efi_status_t efi_exit_boot_services(efi_system_table_t *sys_table,
|
|
|
|
void *handle,
|
|
|
|
struct efi_boot_memmap *map,
|
|
|
|
void *priv,
|
|
|
|
efi_exit_boot_map_processing priv_func);
|
2016-11-13 00:32:31 +03:00
|
|
|
|
2017-08-25 18:50:16 +03:00
|
|
|
#define EFI_RANDOM_SEED_SIZE 64U
|
|
|
|
|
2016-11-13 00:32:31 +03:00
|
|
|
struct linux_efi_random_seed {
|
|
|
|
u32 size;
|
|
|
|
u8 bits[];
|
|
|
|
};
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
#endif /* _LINUX_EFI_H */
|