Merge branch 'efi-core-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull EFI updates from Ingo Molnar: "The main changes in this cycle were: - Rework the EFI capsule loader to allow for workarounds for non-compliant firmware (Ard Biesheuvel) - Implement a capsule loader quirk for Quark X102x (Jan Kiszka) - Enable SMBIOS/DMI support for the ARM architecture (Ard Biesheuvel) - Add CONFIG_EFI_PGT_DUMP=y support for x86-32 and kexec (Sai Praneeth) - Fixes for EFI support for Xen dom0 guests running under x86-64 hosts (Daniel Kiper)" * 'efi-core-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: x86/xen/efi: Initialize only the EFI struct members used by Xen efi: Process the MEMATTR table only if EFI_MEMMAP is enabled efi/arm: Enable DMI/SMBIOS x86/efi: Extend CONFIG_EFI_PGT_DUMP support to x86_32 and kexec as well efi/efi_test: Use memdup_user() helper efi/capsule: Add support for Quark security header efi/capsule-loader: Use page addresses rather than struct page pointers efi/capsule-loader: Redirect calls to efi_capsule_setup_info() via weak alias efi/capsule: Remove NULL test on kmap() efi/capsule-loader: Use a cached copy of the capsule header efi/capsule: Adjust return type of efi_capsule_setup_info() efi/capsule: Clean up pr_err/_info() messages efi/capsule: Remove pr_debug() on ENOMEM or EFAULT efi/capsule: Fix return code on failing kmap/vmap
This commit is contained in:
@@ -1014,7 +1014,6 @@ static void __init __efi_enter_virtual_mode(void)
|
||||
* necessary relocation fixups for the new virtual addresses.
|
||||
*/
|
||||
efi_runtime_update_mappings();
|
||||
efi_dump_pagetable();
|
||||
|
||||
/* clean DUMMY object */
|
||||
efi_delete_dummy_variable();
|
||||
@@ -1029,6 +1028,8 @@ void __init efi_enter_virtual_mode(void)
|
||||
kexec_enter_virtual_mode();
|
||||
else
|
||||
__efi_enter_virtual_mode();
|
||||
|
||||
efi_dump_pagetable();
|
||||
}
|
||||
|
||||
/*
|
||||
|
@@ -44,7 +44,14 @@ int __init efi_alloc_page_tables(void)
|
||||
}
|
||||
|
||||
void efi_sync_low_kernel_mappings(void) {}
|
||||
void __init efi_dump_pagetable(void) {}
|
||||
|
||||
void __init efi_dump_pagetable(void)
|
||||
{
|
||||
#ifdef CONFIG_EFI_PGT_DUMP
|
||||
ptdump_walk_pgd_level(NULL, swapper_pg_dir);
|
||||
#endif
|
||||
}
|
||||
|
||||
int __init efi_setup_page_tables(unsigned long pa_memmap, unsigned num_pages)
|
||||
{
|
||||
return 0;
|
||||
|
@@ -589,7 +589,10 @@ void __init efi_runtime_update_mappings(void)
|
||||
void __init efi_dump_pagetable(void)
|
||||
{
|
||||
#ifdef CONFIG_EFI_PGT_DUMP
|
||||
ptdump_walk_pgd_level(NULL, efi_pgd);
|
||||
if (efi_enabled(EFI_OLD_MEMMAP))
|
||||
ptdump_walk_pgd_level(NULL, swapper_pg_dir);
|
||||
else
|
||||
ptdump_walk_pgd_level(NULL, efi_pgd);
|
||||
#endif
|
||||
}
|
||||
|
||||
|
@@ -15,12 +15,66 @@
|
||||
#include <asm/e820/api.h>
|
||||
#include <asm/efi.h>
|
||||
#include <asm/uv/uv.h>
|
||||
#include <asm/cpu_device_id.h>
|
||||
|
||||
#define EFI_MIN_RESERVE 5120
|
||||
|
||||
#define EFI_DUMMY_GUID \
|
||||
EFI_GUID(0x4424ac57, 0xbe4b, 0x47dd, 0x9e, 0x97, 0xed, 0x50, 0xf0, 0x9f, 0x92, 0xa9)
|
||||
|
||||
#define QUARK_CSH_SIGNATURE 0x5f435348 /* _CSH */
|
||||
#define QUARK_SECURITY_HEADER_SIZE 0x400
|
||||
|
||||
/*
|
||||
* Header prepended to the standard EFI capsule on Quark systems the are based
|
||||
* on Intel firmware BSP.
|
||||
* @csh_signature: Unique identifier to sanity check signed module
|
||||
* presence ("_CSH").
|
||||
* @version: Current version of CSH used. Should be one for Quark A0.
|
||||
* @modulesize: Size of the entire module including the module header
|
||||
* and payload.
|
||||
* @security_version_number_index: Index of SVN to use for validation of signed
|
||||
* module.
|
||||
* @security_version_number: Used to prevent against roll back of modules.
|
||||
* @rsvd_module_id: Currently unused for Clanton (Quark).
|
||||
* @rsvd_module_vendor: Vendor Identifier. For Intel products value is
|
||||
* 0x00008086.
|
||||
* @rsvd_date: BCD representation of build date as yyyymmdd, where
|
||||
* yyyy=4 digit year, mm=1-12, dd=1-31.
|
||||
* @headersize: Total length of the header including including any
|
||||
* padding optionally added by the signing tool.
|
||||
* @hash_algo: What Hash is used in the module signing.
|
||||
* @cryp_algo: What Crypto is used in the module signing.
|
||||
* @keysize: Total length of the key data including including any
|
||||
* padding optionally added by the signing tool.
|
||||
* @signaturesize: Total length of the signature including including any
|
||||
* padding optionally added by the signing tool.
|
||||
* @rsvd_next_header: 32-bit pointer to the next Secure Boot Module in the
|
||||
* chain, if there is a next header.
|
||||
* @rsvd: Reserved, padding structure to required size.
|
||||
*
|
||||
* See also QuartSecurityHeader_t in
|
||||
* Quark_EDKII_v1.2.1.1/QuarkPlatformPkg/Include/QuarkBootRom.h
|
||||
* from https://downloadcenter.intel.com/download/23197/Intel-Quark-SoC-X1000-Board-Support-Package-BSP
|
||||
*/
|
||||
struct quark_security_header {
|
||||
u32 csh_signature;
|
||||
u32 version;
|
||||
u32 modulesize;
|
||||
u32 security_version_number_index;
|
||||
u32 security_version_number;
|
||||
u32 rsvd_module_id;
|
||||
u32 rsvd_module_vendor;
|
||||
u32 rsvd_date;
|
||||
u32 headersize;
|
||||
u32 hash_algo;
|
||||
u32 cryp_algo;
|
||||
u32 keysize;
|
||||
u32 signaturesize;
|
||||
u32 rsvd_next_header;
|
||||
u32 rsvd[2];
|
||||
};
|
||||
|
||||
static efi_char16_t efi_dummy_name[6] = { 'D', 'U', 'M', 'M', 'Y', 0 };
|
||||
|
||||
static bool efi_no_storage_paranoia;
|
||||
@@ -504,3 +558,86 @@ bool efi_poweroff_required(void)
|
||||
{
|
||||
return acpi_gbl_reduced_hardware || acpi_no_s5;
|
||||
}
|
||||
|
||||
#ifdef CONFIG_EFI_CAPSULE_QUIRK_QUARK_CSH
|
||||
|
||||
static int qrk_capsule_setup_info(struct capsule_info *cap_info, void **pkbuff,
|
||||
size_t hdr_bytes)
|
||||
{
|
||||
struct quark_security_header *csh = *pkbuff;
|
||||
|
||||
/* Only process data block that is larger than the security header */
|
||||
if (hdr_bytes < sizeof(struct quark_security_header))
|
||||
return 0;
|
||||
|
||||
if (csh->csh_signature != QUARK_CSH_SIGNATURE ||
|
||||
csh->headersize != QUARK_SECURITY_HEADER_SIZE)
|
||||
return 1;
|
||||
|
||||
/* Only process data block if EFI header is included */
|
||||
if (hdr_bytes < QUARK_SECURITY_HEADER_SIZE +
|
||||
sizeof(efi_capsule_header_t))
|
||||
return 0;
|
||||
|
||||
pr_debug("Quark security header detected\n");
|
||||
|
||||
if (csh->rsvd_next_header != 0) {
|
||||
pr_err("multiple Quark security headers not supported\n");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
*pkbuff += csh->headersize;
|
||||
cap_info->total_size = csh->headersize;
|
||||
|
||||
/*
|
||||
* Update the first page pointer to skip over the CSH header.
|
||||
*/
|
||||
cap_info->pages[0] += csh->headersize;
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
#define ICPU(family, model, quirk_handler) \
|
||||
{ X86_VENDOR_INTEL, family, model, X86_FEATURE_ANY, \
|
||||
(unsigned long)&quirk_handler }
|
||||
|
||||
static const struct x86_cpu_id efi_capsule_quirk_ids[] = {
|
||||
ICPU(5, 9, qrk_capsule_setup_info), /* Intel Quark X1000 */
|
||||
{ }
|
||||
};
|
||||
|
||||
int efi_capsule_setup_info(struct capsule_info *cap_info, void *kbuff,
|
||||
size_t hdr_bytes)
|
||||
{
|
||||
int (*quirk_handler)(struct capsule_info *, void **, size_t);
|
||||
const struct x86_cpu_id *id;
|
||||
int ret;
|
||||
|
||||
if (hdr_bytes < sizeof(efi_capsule_header_t))
|
||||
return 0;
|
||||
|
||||
cap_info->total_size = 0;
|
||||
|
||||
id = x86_match_cpu(efi_capsule_quirk_ids);
|
||||
if (id) {
|
||||
/*
|
||||
* The quirk handler is supposed to return
|
||||
* - a value > 0 if the setup should continue, after advancing
|
||||
* kbuff as needed
|
||||
* - 0 if not enough hdr_bytes are available yet
|
||||
* - a negative error code otherwise
|
||||
*/
|
||||
quirk_handler = (typeof(quirk_handler))id->driver_data;
|
||||
ret = quirk_handler(cap_info, &kbuff, hdr_bytes);
|
||||
if (ret <= 0)
|
||||
return ret;
|
||||
}
|
||||
|
||||
memcpy(&cap_info->header, kbuff, sizeof(cap_info->header));
|
||||
|
||||
cap_info->total_size += cap_info->header.imagesize;
|
||||
|
||||
return __efi_capsule_setup_info(cap_info);
|
||||
}
|
||||
|
||||
#endif
|
||||
|
Reference in New Issue
Block a user