2019-02-02 16:41:15 +07:00
|
|
|
// SPDX-License-Identifier: GPL-2.0+
|
2013-02-08 22:37:06 +07:00
|
|
|
/*
|
|
|
|
* Originally from efivars.c,
|
|
|
|
*
|
|
|
|
* Copyright (C) 2001,2003,2004 Dell <Matt_Domsch@dell.com>
|
|
|
|
* Copyright (C) 2004 Intel Corporation <matthew.e.tolentino@intel.com>
|
|
|
|
*
|
|
|
|
* This code takes all variables accessible from EFI runtime and
|
|
|
|
* exports them via sysfs
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/efi.h>
|
|
|
|
#include <linux/module.h>
|
2013-05-02 07:51:54 +07:00
|
|
|
#include <linux/slab.h>
|
2013-04-30 17:30:24 +07:00
|
|
|
#include <linux/ucs2_string.h>
|
2014-03-17 22:36:37 +07:00
|
|
|
#include <linux/compat.h>
|
2013-02-08 22:37:06 +07:00
|
|
|
|
|
|
|
#define EFIVARS_VERSION "0.08"
|
|
|
|
#define EFIVARS_DATE "2004-May-17"
|
|
|
|
|
|
|
|
MODULE_AUTHOR("Matt Domsch <Matt_Domsch@Dell.com>");
|
|
|
|
MODULE_DESCRIPTION("sysfs interface to EFI Variables");
|
|
|
|
MODULE_LICENSE("GPL");
|
|
|
|
MODULE_VERSION(EFIVARS_VERSION);
|
2014-07-09 17:39:29 +07:00
|
|
|
MODULE_ALIAS("platform:efivars");
|
2013-02-08 22:37:06 +07:00
|
|
|
|
|
|
|
LIST_HEAD(efivar_sysfs_list);
|
|
|
|
EXPORT_SYMBOL_GPL(efivar_sysfs_list);
|
|
|
|
|
|
|
|
static struct kset *efivars_kset;
|
|
|
|
|
|
|
|
static struct bin_attribute *efivars_new_var;
|
|
|
|
static struct bin_attribute *efivars_del_var;
|
|
|
|
|
2014-03-17 22:36:37 +07:00
|
|
|
struct compat_efi_variable {
|
|
|
|
efi_char16_t VariableName[EFI_VAR_NAME_LEN/sizeof(efi_char16_t)];
|
|
|
|
efi_guid_t VendorGuid;
|
|
|
|
__u32 DataSize;
|
|
|
|
__u8 Data[1024];
|
|
|
|
__u32 Status;
|
|
|
|
__u32 Attributes;
|
|
|
|
} __packed;
|
|
|
|
|
2013-02-08 22:37:06 +07:00
|
|
|
struct efivar_attribute {
|
|
|
|
struct attribute attr;
|
|
|
|
ssize_t (*show) (struct efivar_entry *entry, char *buf);
|
|
|
|
ssize_t (*store)(struct efivar_entry *entry, const char *buf, size_t count);
|
|
|
|
};
|
|
|
|
|
|
|
|
#define EFIVAR_ATTR(_name, _mode, _show, _store) \
|
|
|
|
struct efivar_attribute efivar_attr_##_name = { \
|
|
|
|
.attr = {.name = __stringify(_name), .mode = _mode}, \
|
|
|
|
.show = _show, \
|
|
|
|
.store = _store, \
|
|
|
|
};
|
|
|
|
|
|
|
|
#define to_efivar_attr(_attr) container_of(_attr, struct efivar_attribute, attr)
|
|
|
|
#define to_efivar_entry(obj) container_of(obj, struct efivar_entry, kobj)
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Prototype for sysfs creation function
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
efivar_create_sysfs_entry(struct efivar_entry *new_var);
|
|
|
|
|
|
|
|
static ssize_t
|
|
|
|
efivar_guid_read(struct efivar_entry *entry, char *buf)
|
|
|
|
{
|
|
|
|
struct efi_variable *var = &entry->var;
|
|
|
|
char *str = buf;
|
|
|
|
|
|
|
|
if (!entry || !buf)
|
|
|
|
return 0;
|
|
|
|
|
2014-12-18 22:02:17 +07:00
|
|
|
efi_guid_to_str(&var->VendorGuid, str);
|
2013-02-08 22:37:06 +07:00
|
|
|
str += strlen(str);
|
|
|
|
str += sprintf(str, "\n");
|
|
|
|
|
|
|
|
return str - buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t
|
|
|
|
efivar_attr_read(struct efivar_entry *entry, char *buf)
|
|
|
|
{
|
|
|
|
struct efi_variable *var = &entry->var;
|
2020-03-08 15:08:54 +07:00
|
|
|
unsigned long size = sizeof(var->Data);
|
2013-02-08 22:37:06 +07:00
|
|
|
char *str = buf;
|
2020-03-08 15:08:54 +07:00
|
|
|
int ret;
|
2013-02-08 22:37:06 +07:00
|
|
|
|
|
|
|
if (!entry || !buf)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2020-03-08 15:08:54 +07:00
|
|
|
ret = efivar_entry_get(entry, &var->Attributes, &size, var->Data);
|
|
|
|
var->DataSize = size;
|
|
|
|
if (ret)
|
2013-02-08 22:37:06 +07:00
|
|
|
return -EIO;
|
|
|
|
|
|
|
|
if (var->Attributes & EFI_VARIABLE_NON_VOLATILE)
|
|
|
|
str += sprintf(str, "EFI_VARIABLE_NON_VOLATILE\n");
|
|
|
|
if (var->Attributes & EFI_VARIABLE_BOOTSERVICE_ACCESS)
|
|
|
|
str += sprintf(str, "EFI_VARIABLE_BOOTSERVICE_ACCESS\n");
|
|
|
|
if (var->Attributes & EFI_VARIABLE_RUNTIME_ACCESS)
|
|
|
|
str += sprintf(str, "EFI_VARIABLE_RUNTIME_ACCESS\n");
|
|
|
|
if (var->Attributes & EFI_VARIABLE_HARDWARE_ERROR_RECORD)
|
|
|
|
str += sprintf(str, "EFI_VARIABLE_HARDWARE_ERROR_RECORD\n");
|
|
|
|
if (var->Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS)
|
|
|
|
str += sprintf(str,
|
|
|
|
"EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS\n");
|
|
|
|
if (var->Attributes &
|
|
|
|
EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS)
|
|
|
|
str += sprintf(str,
|
|
|
|
"EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS\n");
|
|
|
|
if (var->Attributes & EFI_VARIABLE_APPEND_WRITE)
|
|
|
|
str += sprintf(str, "EFI_VARIABLE_APPEND_WRITE\n");
|
|
|
|
return str - buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t
|
|
|
|
efivar_size_read(struct efivar_entry *entry, char *buf)
|
|
|
|
{
|
|
|
|
struct efi_variable *var = &entry->var;
|
2020-03-08 15:08:54 +07:00
|
|
|
unsigned long size = sizeof(var->Data);
|
2013-02-08 22:37:06 +07:00
|
|
|
char *str = buf;
|
2020-03-08 15:08:54 +07:00
|
|
|
int ret;
|
2013-02-08 22:37:06 +07:00
|
|
|
|
|
|
|
if (!entry || !buf)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2020-03-08 15:08:54 +07:00
|
|
|
ret = efivar_entry_get(entry, &var->Attributes, &size, var->Data);
|
|
|
|
var->DataSize = size;
|
|
|
|
if (ret)
|
2013-02-08 22:37:06 +07:00
|
|
|
return -EIO;
|
|
|
|
|
|
|
|
str += sprintf(str, "0x%lx\n", var->DataSize);
|
|
|
|
return str - buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t
|
|
|
|
efivar_data_read(struct efivar_entry *entry, char *buf)
|
|
|
|
{
|
|
|
|
struct efi_variable *var = &entry->var;
|
2020-03-08 15:08:54 +07:00
|
|
|
unsigned long size = sizeof(var->Data);
|
|
|
|
int ret;
|
2013-02-08 22:37:06 +07:00
|
|
|
|
|
|
|
if (!entry || !buf)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2020-03-08 15:08:54 +07:00
|
|
|
ret = efivar_entry_get(entry, &var->Attributes, &size, var->Data);
|
|
|
|
var->DataSize = size;
|
|
|
|
if (ret)
|
2013-02-08 22:37:06 +07:00
|
|
|
return -EIO;
|
|
|
|
|
|
|
|
memcpy(buf, var->Data, var->DataSize);
|
|
|
|
return var->DataSize;
|
|
|
|
}
|
2014-03-17 22:08:34 +07:00
|
|
|
|
|
|
|
static inline int
|
|
|
|
sanity_check(struct efi_variable *var, efi_char16_t *name, efi_guid_t vendor,
|
|
|
|
unsigned long size, u32 attributes, u8 *data)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* If only updating the variable data, then the name
|
|
|
|
* and guid should remain the same
|
|
|
|
*/
|
|
|
|
if (memcmp(name, var->VariableName, sizeof(var->VariableName)) ||
|
|
|
|
efi_guidcmp(vendor, var->VendorGuid)) {
|
|
|
|
printk(KERN_ERR "efivars: Cannot edit the wrong variable!\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((size <= 0) || (attributes == 0)){
|
|
|
|
printk(KERN_ERR "efivars: DataSize & Attributes must be valid!\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((attributes & ~EFI_VARIABLE_MASK) != 0 ||
|
2016-02-09 02:48:14 +07:00
|
|
|
efivar_validate(vendor, name, data, size) == false) {
|
2014-03-17 22:08:34 +07:00
|
|
|
printk(KERN_ERR "efivars: Malformed variable content\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-03-17 22:36:37 +07:00
|
|
|
static void
|
|
|
|
copy_out_compat(struct efi_variable *dst, struct compat_efi_variable *src)
|
|
|
|
{
|
|
|
|
memcpy(dst->VariableName, src->VariableName, EFI_VAR_NAME_LEN);
|
|
|
|
memcpy(dst->Data, src->Data, sizeof(src->Data));
|
|
|
|
|
|
|
|
dst->VendorGuid = src->VendorGuid;
|
|
|
|
dst->DataSize = src->DataSize;
|
|
|
|
dst->Attributes = src->Attributes;
|
|
|
|
}
|
|
|
|
|
2013-02-08 22:37:06 +07:00
|
|
|
/*
|
|
|
|
* We allow each variable to be edited via rewriting the
|
|
|
|
* entire efi variable structure.
|
|
|
|
*/
|
|
|
|
static ssize_t
|
|
|
|
efivar_store_raw(struct efivar_entry *entry, const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
struct efi_variable *new_var, *var = &entry->var;
|
2014-03-16 19:14:49 +07:00
|
|
|
efi_char16_t *name;
|
|
|
|
unsigned long size;
|
|
|
|
efi_guid_t vendor;
|
|
|
|
u32 attributes;
|
|
|
|
u8 *data;
|
2013-02-08 22:37:06 +07:00
|
|
|
int err;
|
|
|
|
|
2020-03-08 15:08:55 +07:00
|
|
|
if (!entry || !buf)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2018-10-12 20:42:53 +07:00
|
|
|
if (in_compat_syscall()) {
|
2014-03-17 22:36:37 +07:00
|
|
|
struct compat_efi_variable *compat;
|
2013-02-08 22:37:06 +07:00
|
|
|
|
2014-03-17 22:36:37 +07:00
|
|
|
if (count != sizeof(*compat))
|
|
|
|
return -EINVAL;
|
2014-03-16 19:14:49 +07:00
|
|
|
|
2014-03-17 22:36:37 +07:00
|
|
|
compat = (struct compat_efi_variable *)buf;
|
|
|
|
attributes = compat->Attributes;
|
|
|
|
vendor = compat->VendorGuid;
|
|
|
|
name = compat->VariableName;
|
|
|
|
size = compat->DataSize;
|
|
|
|
data = compat->Data;
|
2014-03-16 19:14:49 +07:00
|
|
|
|
2014-03-17 22:36:37 +07:00
|
|
|
err = sanity_check(var, name, vendor, size, attributes, data);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
copy_out_compat(&entry->var, compat);
|
|
|
|
} else {
|
|
|
|
if (count != sizeof(struct efi_variable))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
new_var = (struct efi_variable *)buf;
|
2013-02-08 22:37:06 +07:00
|
|
|
|
2014-03-17 22:36:37 +07:00
|
|
|
attributes = new_var->Attributes;
|
|
|
|
vendor = new_var->VendorGuid;
|
|
|
|
name = new_var->VariableName;
|
|
|
|
size = new_var->DataSize;
|
|
|
|
data = new_var->Data;
|
|
|
|
|
|
|
|
err = sanity_check(var, name, vendor, size, attributes, data);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
memcpy(&entry->var, new_var, count);
|
|
|
|
}
|
2013-02-08 22:37:06 +07:00
|
|
|
|
2014-03-16 19:14:49 +07:00
|
|
|
err = efivar_entry_set(entry, attributes, size, data, NULL);
|
2013-02-08 22:37:06 +07:00
|
|
|
if (err) {
|
|
|
|
printk(KERN_WARNING "efivars: set_variable() failed: status=%d\n", err);
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
return count;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t
|
|
|
|
efivar_show_raw(struct efivar_entry *entry, char *buf)
|
|
|
|
{
|
|
|
|
struct efi_variable *var = &entry->var;
|
2014-03-17 22:36:37 +07:00
|
|
|
struct compat_efi_variable *compat;
|
2020-03-08 15:08:54 +07:00
|
|
|
unsigned long datasize = sizeof(var->Data);
|
2014-03-17 22:36:37 +07:00
|
|
|
size_t size;
|
2020-03-08 15:08:54 +07:00
|
|
|
int ret;
|
2013-02-08 22:37:06 +07:00
|
|
|
|
|
|
|
if (!entry || !buf)
|
|
|
|
return 0;
|
|
|
|
|
2020-03-08 15:08:54 +07:00
|
|
|
ret = efivar_entry_get(entry, &var->Attributes, &datasize, var->Data);
|
|
|
|
var->DataSize = datasize;
|
|
|
|
if (ret)
|
2013-02-08 22:37:06 +07:00
|
|
|
return -EIO;
|
|
|
|
|
2018-10-12 20:42:53 +07:00
|
|
|
if (in_compat_syscall()) {
|
2014-03-17 22:36:37 +07:00
|
|
|
compat = (struct compat_efi_variable *)buf;
|
|
|
|
|
|
|
|
size = sizeof(*compat);
|
|
|
|
memcpy(compat->VariableName, var->VariableName,
|
|
|
|
EFI_VAR_NAME_LEN);
|
|
|
|
memcpy(compat->Data, var->Data, sizeof(compat->Data));
|
|
|
|
|
|
|
|
compat->VendorGuid = var->VendorGuid;
|
|
|
|
compat->DataSize = var->DataSize;
|
|
|
|
compat->Attributes = var->Attributes;
|
|
|
|
} else {
|
|
|
|
size = sizeof(*var);
|
|
|
|
memcpy(buf, var, size);
|
|
|
|
}
|
2013-02-08 22:37:06 +07:00
|
|
|
|
2014-03-17 22:36:37 +07:00
|
|
|
return size;
|
2013-02-08 22:37:06 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Generic read/write functions that call the specific functions of
|
|
|
|
* the attributes...
|
|
|
|
*/
|
|
|
|
static ssize_t efivar_attr_show(struct kobject *kobj, struct attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
struct efivar_entry *var = to_efivar_entry(kobj);
|
|
|
|
struct efivar_attribute *efivar_attr = to_efivar_attr(attr);
|
|
|
|
ssize_t ret = -EIO;
|
|
|
|
|
|
|
|
if (!capable(CAP_SYS_ADMIN))
|
|
|
|
return -EACCES;
|
|
|
|
|
|
|
|
if (efivar_attr->show) {
|
|
|
|
ret = efivar_attr->show(var, buf);
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t efivar_attr_store(struct kobject *kobj, struct attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
struct efivar_entry *var = to_efivar_entry(kobj);
|
|
|
|
struct efivar_attribute *efivar_attr = to_efivar_attr(attr);
|
|
|
|
ssize_t ret = -EIO;
|
|
|
|
|
|
|
|
if (!capable(CAP_SYS_ADMIN))
|
|
|
|
return -EACCES;
|
|
|
|
|
|
|
|
if (efivar_attr->store)
|
|
|
|
ret = efivar_attr->store(var, buf, count);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct sysfs_ops efivar_attr_ops = {
|
|
|
|
.show = efivar_attr_show,
|
|
|
|
.store = efivar_attr_store,
|
|
|
|
};
|
|
|
|
|
|
|
|
static void efivar_release(struct kobject *kobj)
|
|
|
|
{
|
2016-02-02 05:07:02 +07:00
|
|
|
struct efivar_entry *var = to_efivar_entry(kobj);
|
2013-02-08 22:37:06 +07:00
|
|
|
kfree(var);
|
|
|
|
}
|
|
|
|
|
|
|
|
static EFIVAR_ATTR(guid, 0400, efivar_guid_read, NULL);
|
|
|
|
static EFIVAR_ATTR(attributes, 0400, efivar_attr_read, NULL);
|
|
|
|
static EFIVAR_ATTR(size, 0400, efivar_size_read, NULL);
|
|
|
|
static EFIVAR_ATTR(data, 0400, efivar_data_read, NULL);
|
|
|
|
static EFIVAR_ATTR(raw_var, 0600, efivar_show_raw, efivar_store_raw);
|
|
|
|
|
|
|
|
static struct attribute *def_attrs[] = {
|
|
|
|
&efivar_attr_guid.attr,
|
|
|
|
&efivar_attr_size.attr,
|
|
|
|
&efivar_attr_attributes.attr,
|
|
|
|
&efivar_attr_data.attr,
|
|
|
|
&efivar_attr_raw_var.attr,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct kobj_type efivar_ktype = {
|
|
|
|
.release = efivar_release,
|
|
|
|
.sysfs_ops = &efivar_attr_ops,
|
|
|
|
.default_attrs = def_attrs,
|
|
|
|
};
|
|
|
|
|
|
|
|
static ssize_t efivar_create(struct file *filp, struct kobject *kobj,
|
|
|
|
struct bin_attribute *bin_attr,
|
|
|
|
char *buf, loff_t pos, size_t count)
|
|
|
|
{
|
2014-03-17 22:36:37 +07:00
|
|
|
struct compat_efi_variable *compat = (struct compat_efi_variable *)buf;
|
2013-02-08 22:37:06 +07:00
|
|
|
struct efi_variable *new_var = (struct efi_variable *)buf;
|
|
|
|
struct efivar_entry *new_entry;
|
2018-10-12 20:42:53 +07:00
|
|
|
bool need_compat = in_compat_syscall();
|
2014-03-17 17:57:00 +07:00
|
|
|
efi_char16_t *name;
|
2014-03-16 19:14:49 +07:00
|
|
|
unsigned long size;
|
|
|
|
u32 attributes;
|
|
|
|
u8 *data;
|
2013-02-08 22:37:06 +07:00
|
|
|
int err;
|
|
|
|
|
|
|
|
if (!capable(CAP_SYS_ADMIN))
|
|
|
|
return -EACCES;
|
|
|
|
|
2014-03-17 22:36:37 +07:00
|
|
|
if (need_compat) {
|
|
|
|
if (count != sizeof(*compat))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
attributes = compat->Attributes;
|
|
|
|
name = compat->VariableName;
|
|
|
|
size = compat->DataSize;
|
|
|
|
data = compat->Data;
|
|
|
|
} else {
|
|
|
|
if (count != sizeof(*new_var))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
attributes = new_var->Attributes;
|
|
|
|
name = new_var->VariableName;
|
|
|
|
size = new_var->DataSize;
|
|
|
|
data = new_var->Data;
|
|
|
|
}
|
2014-03-16 19:14:49 +07:00
|
|
|
|
|
|
|
if ((attributes & ~EFI_VARIABLE_MASK) != 0 ||
|
2016-02-09 02:48:14 +07:00
|
|
|
efivar_validate(new_var->VendorGuid, name, data,
|
|
|
|
size) == false) {
|
2013-02-08 22:37:06 +07:00
|
|
|
printk(KERN_ERR "efivars: Malformed variable content\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
new_entry = kzalloc(sizeof(*new_entry), GFP_KERNEL);
|
|
|
|
if (!new_entry)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2014-03-17 22:36:37 +07:00
|
|
|
if (need_compat)
|
|
|
|
copy_out_compat(&new_entry->var, compat);
|
|
|
|
else
|
|
|
|
memcpy(&new_entry->var, new_var, sizeof(*new_var));
|
2013-02-08 22:37:06 +07:00
|
|
|
|
2014-03-16 19:14:49 +07:00
|
|
|
err = efivar_entry_set(new_entry, attributes, size,
|
|
|
|
data, &efivar_sysfs_list);
|
2013-02-08 22:37:06 +07:00
|
|
|
if (err) {
|
|
|
|
if (err == -EEXIST)
|
|
|
|
err = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (efivar_create_sysfs_entry(new_entry)) {
|
|
|
|
printk(KERN_WARNING "efivars: failed to create sysfs entry.\n");
|
|
|
|
kfree(new_entry);
|
|
|
|
}
|
|
|
|
return count;
|
|
|
|
|
|
|
|
out:
|
|
|
|
kfree(new_entry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t efivar_delete(struct file *filp, struct kobject *kobj,
|
|
|
|
struct bin_attribute *bin_attr,
|
|
|
|
char *buf, loff_t pos, size_t count)
|
|
|
|
{
|
|
|
|
struct efi_variable *del_var = (struct efi_variable *)buf;
|
2014-03-17 22:36:37 +07:00
|
|
|
struct compat_efi_variable *compat;
|
2013-02-08 22:37:06 +07:00
|
|
|
struct efivar_entry *entry;
|
2014-03-16 19:14:49 +07:00
|
|
|
efi_char16_t *name;
|
|
|
|
efi_guid_t vendor;
|
2013-02-08 22:37:06 +07:00
|
|
|
int err = 0;
|
|
|
|
|
|
|
|
if (!capable(CAP_SYS_ADMIN))
|
|
|
|
return -EACCES;
|
|
|
|
|
2018-10-12 20:42:53 +07:00
|
|
|
if (in_compat_syscall()) {
|
2014-03-17 22:36:37 +07:00
|
|
|
if (count != sizeof(*compat))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
compat = (struct compat_efi_variable *)buf;
|
|
|
|
name = compat->VariableName;
|
|
|
|
vendor = compat->VendorGuid;
|
|
|
|
} else {
|
|
|
|
if (count != sizeof(*del_var))
|
|
|
|
return -EINVAL;
|
2014-03-17 16:17:28 +07:00
|
|
|
|
2014-03-17 22:36:37 +07:00
|
|
|
name = del_var->VariableName;
|
|
|
|
vendor = del_var->VendorGuid;
|
|
|
|
}
|
2014-03-16 19:14:49 +07:00
|
|
|
|
2016-07-16 02:36:30 +07:00
|
|
|
if (efivar_entry_iter_begin())
|
|
|
|
return -EINTR;
|
2014-03-16 19:14:49 +07:00
|
|
|
entry = efivar_entry_find(name, vendor, &efivar_sysfs_list, true);
|
2013-02-08 22:37:06 +07:00
|
|
|
if (!entry)
|
|
|
|
err = -EINVAL;
|
|
|
|
else if (__efivar_entry_delete(entry))
|
|
|
|
err = -EIO;
|
|
|
|
|
efivars, efi-pstore: Hold off deletion of sysfs entry until the scan is completed
Currently, when mounting pstore file system, a read callback of
efi_pstore driver runs mutiple times as below.
- In the first read callback, scan efivar_sysfs_list from head and pass
a kmsg buffer of a entry to an upper pstore layer.
- In the second read callback, rescan efivar_sysfs_list from the entry
and pass another kmsg buffer to it.
- Repeat the scan and pass until the end of efivar_sysfs_list.
In this process, an entry is read across the multiple read function
calls. To avoid race between the read and erasion, the whole process
above is protected by a spinlock, holding in open() and releasing in
close().
At the same time, kmemdup() is called to pass the buffer to pstore
filesystem during it. And then, it causes a following lockdep warning.
To make the dynamic memory allocation runnable without taking spinlock,
holding off a deletion of sysfs entry if it happens while scanning it
via efi_pstore, and deleting it after the scan is completed.
To implement it, this patch introduces two flags, scanning and deleting,
to efivar_entry.
On the code basis, it seems that all the scanning and deleting logic is
not needed because __efivars->lock are not dropped when reading from the
EFI variable store.
But, the scanning and deleting logic is still needed because an
efi-pstore and a pstore filesystem works as follows.
In case an entry(A) is found, the pointer is saved to psi->data. And
efi_pstore_read() passes the entry(A) to a pstore filesystem by
releasing __efivars->lock.
And then, the pstore filesystem calls efi_pstore_read() again and the
same entry(A), which is saved to psi->data, is used for resuming to scan
a sysfs-list.
So, to protect the entry(A), the logic is needed.
[ 1.143710] ------------[ cut here ]------------
[ 1.144058] WARNING: CPU: 1 PID: 1 at kernel/lockdep.c:2740 lockdep_trace_alloc+0x104/0x110()
[ 1.144058] DEBUG_LOCKS_WARN_ON(irqs_disabled_flags(flags))
[ 1.144058] Modules linked in:
[ 1.144058] CPU: 1 PID: 1 Comm: systemd Not tainted 3.11.0-rc5 #2
[ 1.144058] 0000000000000009 ffff8800797e9ae0 ffffffff816614a5 ffff8800797e9b28
[ 1.144058] ffff8800797e9b18 ffffffff8105510d 0000000000000080 0000000000000046
[ 1.144058] 00000000000000d0 00000000000003af ffffffff81ccd0c0 ffff8800797e9b78
[ 1.144058] Call Trace:
[ 1.144058] [<ffffffff816614a5>] dump_stack+0x54/0x74
[ 1.144058] [<ffffffff8105510d>] warn_slowpath_common+0x7d/0xa0
[ 1.144058] [<ffffffff8105517c>] warn_slowpath_fmt+0x4c/0x50
[ 1.144058] [<ffffffff8131290f>] ? vsscanf+0x57f/0x7b0
[ 1.144058] [<ffffffff810bbd74>] lockdep_trace_alloc+0x104/0x110
[ 1.144058] [<ffffffff81192da0>] __kmalloc_track_caller+0x50/0x280
[ 1.144058] [<ffffffff815147bb>] ? efi_pstore_read_func.part.1+0x12b/0x170
[ 1.144058] [<ffffffff8115b260>] kmemdup+0x20/0x50
[ 1.144058] [<ffffffff815147bb>] efi_pstore_read_func.part.1+0x12b/0x170
[ 1.144058] [<ffffffff81514800>] ? efi_pstore_read_func.part.1+0x170/0x170
[ 1.144058] [<ffffffff815148b4>] efi_pstore_read_func+0xb4/0xe0
[ 1.144058] [<ffffffff81512b7b>] __efivar_entry_iter+0xfb/0x120
[ 1.144058] [<ffffffff8151428f>] efi_pstore_read+0x3f/0x50
[ 1.144058] [<ffffffff8128d7ba>] pstore_get_records+0x9a/0x150
[ 1.158207] [<ffffffff812af25c>] ? selinux_d_instantiate+0x1c/0x20
[ 1.158207] [<ffffffff8128ce30>] ? parse_options+0x80/0x80
[ 1.158207] [<ffffffff8128ced5>] pstore_fill_super+0xa5/0xc0
[ 1.158207] [<ffffffff811ae7d2>] mount_single+0xa2/0xd0
[ 1.158207] [<ffffffff8128ccf8>] pstore_mount+0x18/0x20
[ 1.158207] [<ffffffff811ae8b9>] mount_fs+0x39/0x1b0
[ 1.158207] [<ffffffff81160550>] ? __alloc_percpu+0x10/0x20
[ 1.158207] [<ffffffff811c9493>] vfs_kern_mount+0x63/0xf0
[ 1.158207] [<ffffffff811cbb0e>] do_mount+0x23e/0xa20
[ 1.158207] [<ffffffff8115b51b>] ? strndup_user+0x4b/0xf0
[ 1.158207] [<ffffffff811cc373>] SyS_mount+0x83/0xc0
[ 1.158207] [<ffffffff81673cc2>] system_call_fastpath+0x16/0x1b
[ 1.158207] ---[ end trace 61981bc62de9f6f4 ]---
Signed-off-by: Seiji Aguchi <seiji.aguchi@hds.com>
Tested-by: Madper Xie <cxie@redhat.com>
Cc: stable@kernel.org
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
2013-10-31 02:27:26 +07:00
|
|
|
if (err) {
|
|
|
|
efivar_entry_iter_end();
|
2013-02-08 22:37:06 +07:00
|
|
|
return err;
|
efivars, efi-pstore: Hold off deletion of sysfs entry until the scan is completed
Currently, when mounting pstore file system, a read callback of
efi_pstore driver runs mutiple times as below.
- In the first read callback, scan efivar_sysfs_list from head and pass
a kmsg buffer of a entry to an upper pstore layer.
- In the second read callback, rescan efivar_sysfs_list from the entry
and pass another kmsg buffer to it.
- Repeat the scan and pass until the end of efivar_sysfs_list.
In this process, an entry is read across the multiple read function
calls. To avoid race between the read and erasion, the whole process
above is protected by a spinlock, holding in open() and releasing in
close().
At the same time, kmemdup() is called to pass the buffer to pstore
filesystem during it. And then, it causes a following lockdep warning.
To make the dynamic memory allocation runnable without taking spinlock,
holding off a deletion of sysfs entry if it happens while scanning it
via efi_pstore, and deleting it after the scan is completed.
To implement it, this patch introduces two flags, scanning and deleting,
to efivar_entry.
On the code basis, it seems that all the scanning and deleting logic is
not needed because __efivars->lock are not dropped when reading from the
EFI variable store.
But, the scanning and deleting logic is still needed because an
efi-pstore and a pstore filesystem works as follows.
In case an entry(A) is found, the pointer is saved to psi->data. And
efi_pstore_read() passes the entry(A) to a pstore filesystem by
releasing __efivars->lock.
And then, the pstore filesystem calls efi_pstore_read() again and the
same entry(A), which is saved to psi->data, is used for resuming to scan
a sysfs-list.
So, to protect the entry(A), the logic is needed.
[ 1.143710] ------------[ cut here ]------------
[ 1.144058] WARNING: CPU: 1 PID: 1 at kernel/lockdep.c:2740 lockdep_trace_alloc+0x104/0x110()
[ 1.144058] DEBUG_LOCKS_WARN_ON(irqs_disabled_flags(flags))
[ 1.144058] Modules linked in:
[ 1.144058] CPU: 1 PID: 1 Comm: systemd Not tainted 3.11.0-rc5 #2
[ 1.144058] 0000000000000009 ffff8800797e9ae0 ffffffff816614a5 ffff8800797e9b28
[ 1.144058] ffff8800797e9b18 ffffffff8105510d 0000000000000080 0000000000000046
[ 1.144058] 00000000000000d0 00000000000003af ffffffff81ccd0c0 ffff8800797e9b78
[ 1.144058] Call Trace:
[ 1.144058] [<ffffffff816614a5>] dump_stack+0x54/0x74
[ 1.144058] [<ffffffff8105510d>] warn_slowpath_common+0x7d/0xa0
[ 1.144058] [<ffffffff8105517c>] warn_slowpath_fmt+0x4c/0x50
[ 1.144058] [<ffffffff8131290f>] ? vsscanf+0x57f/0x7b0
[ 1.144058] [<ffffffff810bbd74>] lockdep_trace_alloc+0x104/0x110
[ 1.144058] [<ffffffff81192da0>] __kmalloc_track_caller+0x50/0x280
[ 1.144058] [<ffffffff815147bb>] ? efi_pstore_read_func.part.1+0x12b/0x170
[ 1.144058] [<ffffffff8115b260>] kmemdup+0x20/0x50
[ 1.144058] [<ffffffff815147bb>] efi_pstore_read_func.part.1+0x12b/0x170
[ 1.144058] [<ffffffff81514800>] ? efi_pstore_read_func.part.1+0x170/0x170
[ 1.144058] [<ffffffff815148b4>] efi_pstore_read_func+0xb4/0xe0
[ 1.144058] [<ffffffff81512b7b>] __efivar_entry_iter+0xfb/0x120
[ 1.144058] [<ffffffff8151428f>] efi_pstore_read+0x3f/0x50
[ 1.144058] [<ffffffff8128d7ba>] pstore_get_records+0x9a/0x150
[ 1.158207] [<ffffffff812af25c>] ? selinux_d_instantiate+0x1c/0x20
[ 1.158207] [<ffffffff8128ce30>] ? parse_options+0x80/0x80
[ 1.158207] [<ffffffff8128ced5>] pstore_fill_super+0xa5/0xc0
[ 1.158207] [<ffffffff811ae7d2>] mount_single+0xa2/0xd0
[ 1.158207] [<ffffffff8128ccf8>] pstore_mount+0x18/0x20
[ 1.158207] [<ffffffff811ae8b9>] mount_fs+0x39/0x1b0
[ 1.158207] [<ffffffff81160550>] ? __alloc_percpu+0x10/0x20
[ 1.158207] [<ffffffff811c9493>] vfs_kern_mount+0x63/0xf0
[ 1.158207] [<ffffffff811cbb0e>] do_mount+0x23e/0xa20
[ 1.158207] [<ffffffff8115b51b>] ? strndup_user+0x4b/0xf0
[ 1.158207] [<ffffffff811cc373>] SyS_mount+0x83/0xc0
[ 1.158207] [<ffffffff81673cc2>] system_call_fastpath+0x16/0x1b
[ 1.158207] ---[ end trace 61981bc62de9f6f4 ]---
Signed-off-by: Seiji Aguchi <seiji.aguchi@hds.com>
Tested-by: Madper Xie <cxie@redhat.com>
Cc: stable@kernel.org
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
2013-10-31 02:27:26 +07:00
|
|
|
}
|
2013-02-08 22:37:06 +07:00
|
|
|
|
efivars, efi-pstore: Hold off deletion of sysfs entry until the scan is completed
Currently, when mounting pstore file system, a read callback of
efi_pstore driver runs mutiple times as below.
- In the first read callback, scan efivar_sysfs_list from head and pass
a kmsg buffer of a entry to an upper pstore layer.
- In the second read callback, rescan efivar_sysfs_list from the entry
and pass another kmsg buffer to it.
- Repeat the scan and pass until the end of efivar_sysfs_list.
In this process, an entry is read across the multiple read function
calls. To avoid race between the read and erasion, the whole process
above is protected by a spinlock, holding in open() and releasing in
close().
At the same time, kmemdup() is called to pass the buffer to pstore
filesystem during it. And then, it causes a following lockdep warning.
To make the dynamic memory allocation runnable without taking spinlock,
holding off a deletion of sysfs entry if it happens while scanning it
via efi_pstore, and deleting it after the scan is completed.
To implement it, this patch introduces two flags, scanning and deleting,
to efivar_entry.
On the code basis, it seems that all the scanning and deleting logic is
not needed because __efivars->lock are not dropped when reading from the
EFI variable store.
But, the scanning and deleting logic is still needed because an
efi-pstore and a pstore filesystem works as follows.
In case an entry(A) is found, the pointer is saved to psi->data. And
efi_pstore_read() passes the entry(A) to a pstore filesystem by
releasing __efivars->lock.
And then, the pstore filesystem calls efi_pstore_read() again and the
same entry(A), which is saved to psi->data, is used for resuming to scan
a sysfs-list.
So, to protect the entry(A), the logic is needed.
[ 1.143710] ------------[ cut here ]------------
[ 1.144058] WARNING: CPU: 1 PID: 1 at kernel/lockdep.c:2740 lockdep_trace_alloc+0x104/0x110()
[ 1.144058] DEBUG_LOCKS_WARN_ON(irqs_disabled_flags(flags))
[ 1.144058] Modules linked in:
[ 1.144058] CPU: 1 PID: 1 Comm: systemd Not tainted 3.11.0-rc5 #2
[ 1.144058] 0000000000000009 ffff8800797e9ae0 ffffffff816614a5 ffff8800797e9b28
[ 1.144058] ffff8800797e9b18 ffffffff8105510d 0000000000000080 0000000000000046
[ 1.144058] 00000000000000d0 00000000000003af ffffffff81ccd0c0 ffff8800797e9b78
[ 1.144058] Call Trace:
[ 1.144058] [<ffffffff816614a5>] dump_stack+0x54/0x74
[ 1.144058] [<ffffffff8105510d>] warn_slowpath_common+0x7d/0xa0
[ 1.144058] [<ffffffff8105517c>] warn_slowpath_fmt+0x4c/0x50
[ 1.144058] [<ffffffff8131290f>] ? vsscanf+0x57f/0x7b0
[ 1.144058] [<ffffffff810bbd74>] lockdep_trace_alloc+0x104/0x110
[ 1.144058] [<ffffffff81192da0>] __kmalloc_track_caller+0x50/0x280
[ 1.144058] [<ffffffff815147bb>] ? efi_pstore_read_func.part.1+0x12b/0x170
[ 1.144058] [<ffffffff8115b260>] kmemdup+0x20/0x50
[ 1.144058] [<ffffffff815147bb>] efi_pstore_read_func.part.1+0x12b/0x170
[ 1.144058] [<ffffffff81514800>] ? efi_pstore_read_func.part.1+0x170/0x170
[ 1.144058] [<ffffffff815148b4>] efi_pstore_read_func+0xb4/0xe0
[ 1.144058] [<ffffffff81512b7b>] __efivar_entry_iter+0xfb/0x120
[ 1.144058] [<ffffffff8151428f>] efi_pstore_read+0x3f/0x50
[ 1.144058] [<ffffffff8128d7ba>] pstore_get_records+0x9a/0x150
[ 1.158207] [<ffffffff812af25c>] ? selinux_d_instantiate+0x1c/0x20
[ 1.158207] [<ffffffff8128ce30>] ? parse_options+0x80/0x80
[ 1.158207] [<ffffffff8128ced5>] pstore_fill_super+0xa5/0xc0
[ 1.158207] [<ffffffff811ae7d2>] mount_single+0xa2/0xd0
[ 1.158207] [<ffffffff8128ccf8>] pstore_mount+0x18/0x20
[ 1.158207] [<ffffffff811ae8b9>] mount_fs+0x39/0x1b0
[ 1.158207] [<ffffffff81160550>] ? __alloc_percpu+0x10/0x20
[ 1.158207] [<ffffffff811c9493>] vfs_kern_mount+0x63/0xf0
[ 1.158207] [<ffffffff811cbb0e>] do_mount+0x23e/0xa20
[ 1.158207] [<ffffffff8115b51b>] ? strndup_user+0x4b/0xf0
[ 1.158207] [<ffffffff811cc373>] SyS_mount+0x83/0xc0
[ 1.158207] [<ffffffff81673cc2>] system_call_fastpath+0x16/0x1b
[ 1.158207] ---[ end trace 61981bc62de9f6f4 ]---
Signed-off-by: Seiji Aguchi <seiji.aguchi@hds.com>
Tested-by: Madper Xie <cxie@redhat.com>
Cc: stable@kernel.org
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
2013-10-31 02:27:26 +07:00
|
|
|
if (!entry->scanning) {
|
|
|
|
efivar_entry_iter_end();
|
|
|
|
efivar_unregister(entry);
|
|
|
|
} else
|
|
|
|
efivar_entry_iter_end();
|
2013-02-08 22:37:06 +07:00
|
|
|
|
|
|
|
/* It's dead Jim.... */
|
|
|
|
return count;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* efivar_create_sysfs_entry - create a new entry in sysfs
|
|
|
|
* @new_var: efivar entry to create
|
|
|
|
*
|
2015-04-21 16:21:53 +07:00
|
|
|
* Returns 0 on success, negative error code on failure
|
2013-02-08 22:37:06 +07:00
|
|
|
*/
|
|
|
|
static int
|
|
|
|
efivar_create_sysfs_entry(struct efivar_entry *new_var)
|
|
|
|
{
|
2016-02-09 02:48:12 +07:00
|
|
|
int short_name_size;
|
2013-02-08 22:37:06 +07:00
|
|
|
char *short_name;
|
2016-02-09 02:48:12 +07:00
|
|
|
unsigned long utf8_name_size;
|
|
|
|
efi_char16_t *variable_name = new_var->var.VariableName;
|
2015-04-21 16:21:53 +07:00
|
|
|
int ret;
|
2013-02-08 22:37:06 +07:00
|
|
|
|
|
|
|
/*
|
2016-02-09 02:48:12 +07:00
|
|
|
* Length of the variable bytes in UTF8, plus the '-' separator,
|
2013-02-08 22:37:06 +07:00
|
|
|
* plus the GUID, plus trailing NUL
|
|
|
|
*/
|
2016-02-09 02:48:12 +07:00
|
|
|
utf8_name_size = ucs2_utf8size(variable_name);
|
|
|
|
short_name_size = utf8_name_size + 1 + EFI_VARIABLE_GUID_LEN + 1;
|
2013-02-08 22:37:06 +07:00
|
|
|
|
2016-02-09 02:48:12 +07:00
|
|
|
short_name = kmalloc(short_name_size, GFP_KERNEL);
|
2013-04-30 14:43:44 +07:00
|
|
|
if (!short_name)
|
2015-04-21 16:21:53 +07:00
|
|
|
return -ENOMEM;
|
2013-02-08 22:37:06 +07:00
|
|
|
|
2016-02-09 02:48:12 +07:00
|
|
|
ucs2_as_utf8(short_name, variable_name, short_name_size);
|
|
|
|
|
2013-02-08 22:37:06 +07:00
|
|
|
/* This is ugly, but necessary to separate one vendor's
|
|
|
|
private variables from another's. */
|
2016-02-09 02:48:12 +07:00
|
|
|
short_name[utf8_name_size] = '-';
|
2014-12-18 22:02:17 +07:00
|
|
|
efi_guid_to_str(&new_var->var.VendorGuid,
|
2016-02-09 02:48:12 +07:00
|
|
|
short_name + utf8_name_size + 1);
|
2013-02-08 22:37:06 +07:00
|
|
|
|
|
|
|
new_var->kobj.kset = efivars_kset;
|
|
|
|
|
2015-04-21 16:21:53 +07:00
|
|
|
ret = kobject_init_and_add(&new_var->kobj, &efivar_ktype,
|
2013-02-08 22:37:06 +07:00
|
|
|
NULL, "%s", short_name);
|
|
|
|
kfree(short_name);
|
2020-05-22 23:15:49 +07:00
|
|
|
if (ret) {
|
|
|
|
kobject_put(&new_var->kobj);
|
2015-04-21 16:21:53 +07:00
|
|
|
return ret;
|
2020-05-22 23:15:49 +07:00
|
|
|
}
|
2013-02-08 22:37:06 +07:00
|
|
|
|
|
|
|
kobject_uevent(&new_var->kobj, KOBJ_ADD);
|
2016-07-16 02:36:30 +07:00
|
|
|
if (efivar_entry_add(new_var, &efivar_sysfs_list)) {
|
|
|
|
efivar_unregister(new_var);
|
|
|
|
return -EINTR;
|
|
|
|
}
|
2013-02-08 22:37:06 +07:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
create_efivars_bin_attributes(void)
|
|
|
|
{
|
|
|
|
struct bin_attribute *attr;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
/* new_var */
|
|
|
|
attr = kzalloc(sizeof(*attr), GFP_KERNEL);
|
|
|
|
if (!attr)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
attr->attr.name = "new_var";
|
|
|
|
attr->attr.mode = 0200;
|
|
|
|
attr->write = efivar_create;
|
|
|
|
efivars_new_var = attr;
|
|
|
|
|
|
|
|
/* del_var */
|
|
|
|
attr = kzalloc(sizeof(*attr), GFP_KERNEL);
|
|
|
|
if (!attr) {
|
|
|
|
error = -ENOMEM;
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
attr->attr.name = "del_var";
|
|
|
|
attr->attr.mode = 0200;
|
|
|
|
attr->write = efivar_delete;
|
|
|
|
efivars_del_var = attr;
|
|
|
|
|
|
|
|
sysfs_bin_attr_init(efivars_new_var);
|
|
|
|
sysfs_bin_attr_init(efivars_del_var);
|
|
|
|
|
|
|
|
/* Register */
|
|
|
|
error = sysfs_create_bin_file(&efivars_kset->kobj, efivars_new_var);
|
|
|
|
if (error) {
|
|
|
|
printk(KERN_ERR "efivars: unable to create new_var sysfs file"
|
|
|
|
" due to error %d\n", error);
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
error = sysfs_create_bin_file(&efivars_kset->kobj, efivars_del_var);
|
|
|
|
if (error) {
|
|
|
|
printk(KERN_ERR "efivars: unable to create del_var sysfs file"
|
|
|
|
" due to error %d\n", error);
|
|
|
|
sysfs_remove_bin_file(&efivars_kset->kobj, efivars_new_var);
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
out_free:
|
|
|
|
kfree(efivars_del_var);
|
|
|
|
efivars_del_var = NULL;
|
|
|
|
kfree(efivars_new_var);
|
|
|
|
efivars_new_var = NULL;
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int efivar_update_sysfs_entry(efi_char16_t *name, efi_guid_t vendor,
|
|
|
|
unsigned long name_size, void *data)
|
|
|
|
{
|
|
|
|
struct efivar_entry *entry = data;
|
|
|
|
|
|
|
|
if (efivar_entry_find(name, vendor, &efivar_sysfs_list, false))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
memcpy(entry->var.VariableName, name, name_size);
|
|
|
|
memcpy(&(entry->var.VendorGuid), &vendor, sizeof(efi_guid_t));
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void efivar_update_sysfs_entries(struct work_struct *work)
|
|
|
|
{
|
|
|
|
struct efivar_entry *entry;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
/* Add new sysfs entries */
|
|
|
|
while (1) {
|
2013-05-11 03:45:36 +07:00
|
|
|
entry = kzalloc(sizeof(*entry), GFP_KERNEL);
|
|
|
|
if (!entry)
|
|
|
|
return;
|
2013-02-08 22:37:06 +07:00
|
|
|
|
|
|
|
err = efivar_init(efivar_update_sysfs_entry, entry,
|
2016-05-07 04:39:30 +07:00
|
|
|
false, &efivar_sysfs_list);
|
2013-02-08 22:37:06 +07:00
|
|
|
if (!err)
|
|
|
|
break;
|
|
|
|
|
|
|
|
efivar_create_sysfs_entry(entry);
|
|
|
|
}
|
|
|
|
|
|
|
|
kfree(entry);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int efivars_sysfs_callback(efi_char16_t *name, efi_guid_t vendor,
|
|
|
|
unsigned long name_size, void *data)
|
|
|
|
{
|
|
|
|
struct efivar_entry *entry;
|
|
|
|
|
|
|
|
entry = kzalloc(sizeof(*entry), GFP_KERNEL);
|
|
|
|
if (!entry)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
memcpy(entry->var.VariableName, name, name_size);
|
|
|
|
memcpy(&(entry->var.VendorGuid), &vendor, sizeof(efi_guid_t));
|
|
|
|
|
|
|
|
efivar_create_sysfs_entry(entry);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int efivar_sysfs_destroy(struct efivar_entry *entry, void *data)
|
|
|
|
{
|
2016-07-16 02:36:30 +07:00
|
|
|
int err = efivar_entry_remove(entry);
|
|
|
|
|
|
|
|
if (err)
|
|
|
|
return err;
|
2013-02-08 22:37:06 +07:00
|
|
|
efivar_unregister(entry);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-09-03 13:56:20 +07:00
|
|
|
static void efivars_sysfs_exit(void)
|
2013-02-08 22:37:06 +07:00
|
|
|
{
|
|
|
|
/* Remove all entries and destroy */
|
2016-07-16 02:36:30 +07:00
|
|
|
int err;
|
|
|
|
|
|
|
|
err = __efivar_entry_iter(efivar_sysfs_destroy, &efivar_sysfs_list,
|
|
|
|
NULL, NULL);
|
|
|
|
if (err) {
|
|
|
|
pr_err("efivars: Failed to destroy sysfs entries\n");
|
|
|
|
return;
|
|
|
|
}
|
2013-02-08 22:37:06 +07:00
|
|
|
|
|
|
|
if (efivars_new_var)
|
|
|
|
sysfs_remove_bin_file(&efivars_kset->kobj, efivars_new_var);
|
|
|
|
if (efivars_del_var)
|
|
|
|
sysfs_remove_bin_file(&efivars_kset->kobj, efivars_del_var);
|
|
|
|
kfree(efivars_new_var);
|
|
|
|
kfree(efivars_del_var);
|
|
|
|
kset_unregister(efivars_kset);
|
|
|
|
}
|
|
|
|
|
|
|
|
int efivars_sysfs_init(void)
|
|
|
|
{
|
|
|
|
struct kobject *parent_kobj = efivars_kobject();
|
|
|
|
int error = 0;
|
|
|
|
|
2020-01-23 15:12:00 +07:00
|
|
|
if (!efi_rt_services_supported(EFI_RT_SUPPORTED_VARIABLE_SERVICES))
|
2013-07-11 13:30:33 +07:00
|
|
|
return -ENODEV;
|
|
|
|
|
2013-02-08 22:37:06 +07:00
|
|
|
/* No efivars has been registered yet */
|
|
|
|
if (!parent_kobj)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
printk(KERN_INFO "EFI Variables Facility v%s %s\n", EFIVARS_VERSION,
|
|
|
|
EFIVARS_DATE);
|
|
|
|
|
|
|
|
efivars_kset = kset_create_and_add("vars", NULL, parent_kobj);
|
|
|
|
if (!efivars_kset) {
|
|
|
|
printk(KERN_ERR "efivars: Subsystem registration failed.\n");
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2016-05-07 04:39:30 +07:00
|
|
|
efivar_init(efivars_sysfs_callback, NULL, true, &efivar_sysfs_list);
|
2013-02-08 22:37:06 +07:00
|
|
|
|
|
|
|
error = create_efivars_bin_attributes();
|
|
|
|
if (error) {
|
|
|
|
efivars_sysfs_exit();
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
INIT_WORK(&efivar_work, efivar_update_sysfs_entries);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(efivars_sysfs_init);
|
|
|
|
|
|
|
|
module_init(efivars_sysfs_init);
|
|
|
|
module_exit(efivars_sysfs_exit);
|