Received: by 10.213.65.68 with SMTP id h4csp587933imn; Sat, 31 Mar 2018 05:21:35 -0700 (PDT) X-Google-Smtp-Source: AIpwx49vqzS1HI9deu5gbz0cEq3aXs6KvF5yWwGfWh65XpLyKv6uNXcc8pUf5v/7o9lnsv2drEE5 X-Received: by 10.99.104.9 with SMTP id d9mr1776231pgc.304.1522498895262; Sat, 31 Mar 2018 05:21:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522498895; cv=none; d=google.com; s=arc-20160816; b=0lrKERyLkNzAf+DumqcKMGDoay5z5Xv+2iRdTqTmav7RCpPxOvcgxmoxDr3Xfsa8bF Gh/JGfFRp4CCwAPCuI5RV10o33J/F+SS6QDqLhcbXEf0HJk+Ywc5P0SwZmLb/ox6IxcR A4tkuXHWnouATfdXZ9kYt/8W/gqcIrykDNxWNOverceD4cSg+MIQLxnjnbFWyhOlFZv+ uAFqZJalM/9KgV7RBMZ2Yp03L4/t0RTDwBBnmnJS1A9ATIUuisbyF2aU3LjCNQ2tYxuf cLIaEqPP6eKkkiyFaDPOLi8szrsKYiIl5tKZCQleZr0+3x3YNOB4eRZB/wzVWZfr4ivN 1M2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=Zx2RZPAyt5y+3y3koZ3/YzMiwiFiJEuo29sXS6pbv0g=; b=G8VzFn4h2c9yDUbWMvs8WgHX9nMDGc62pIKaWMp82NPZTAsGkfpGsfFTVYxukmAew6 xs2jzO6qG4aqmlQweBdULNfOYreV2Wwxt7hQ+8wkcmv2/RsZuDL4aZ+wjW2Jz31cMN4h 1fSBZGLtCBEQjHSoLE0IPdjx4GWXzlYHJFsucDltWxazElidipMaGm8WeamU1HmU47Oz nBIfF3Scd3PeZYxhgmWz/mJgrqGV0BdNQru0zeqSq82UkDAsqTbOuwYRN5MAZibVp+oJ fs/6x19A50mEhfP087yaxc5RMaLuaKK73ZDiJQsPqzRVxmc1FEEAG0ADqAstJjNqTUPs 9GcQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v189si7166897pgb.374.2018.03.31.05.21.21; Sat, 31 Mar 2018 05:21:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752516AbeCaMTu (ORCPT + 99 others); Sat, 31 Mar 2018 08:19:50 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:41882 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751678AbeCaMTs (ORCPT ); Sat, 31 Mar 2018 08:19:48 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 2EDE5BD9E; Sat, 31 Mar 2018 12:19:48 +0000 (UTC) Received: from shalem.localdomain.com (ovpn-116-59.ams2.redhat.com [10.36.116.59]) by smtp.corp.redhat.com (Postfix) with ESMTP id 23B572023235; Sat, 31 Mar 2018 12:19:46 +0000 (UTC) From: Hans de Goede To: Ard Biesheuvel , "Luis R . Rodriguez" , Greg Kroah-Hartman , Thomas Gleixner , Ingo Molnar , "H . Peter Anvin" Cc: Hans de Goede , linux-kernel@vger.kernel.org, Peter Jones , Dave Olsthoorn , x86@kernel.org, linux-efi@vger.kernel.org Subject: [PATCH 1/2] efi: Export boot-services code and data as debugfs-blobs Date: Sat, 31 Mar 2018 14:19:43 +0200 Message-Id: <20180331121944.8618-1-hdegoede@redhat.com> X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Sat, 31 Mar 2018 12:19:48 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Sat, 31 Mar 2018 12:19:48 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'hdegoede@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Sometimes it is useful to be able to dump the efi boot-services code and data. This commit adds these as debugfs-blobs to /sys/kernel/debug/efi, but only if efi=debug is passed on the kernel-commandline as this requires not freeing those memory-regions, which costs 20+ MB of RAM. Signed-off-by: Hans de Goede --- arch/x86/platform/efi/quirks.c | 4 +++ drivers/firmware/efi/efi.c | 57 ++++++++++++++++++++++++++++++++++ 2 files changed, 61 insertions(+) diff --git a/arch/x86/platform/efi/quirks.c b/arch/x86/platform/efi/quirks.c index 5b513ccffde4..0f968c7bcfec 100644 --- a/arch/x86/platform/efi/quirks.c +++ b/arch/x86/platform/efi/quirks.c @@ -374,6 +374,10 @@ void __init efi_free_boot_services(void) int num_entries = 0; void *new, *new_md; + /* Keep all regions for /sys/kernel/debug/efi */ + if (efi_enabled(EFI_DBG)) + return; + for_each_efi_memory_desc(md) { unsigned long long start = md->phys_addr; unsigned long long size = md->num_pages << EFI_PAGE_SHIFT; diff --git a/drivers/firmware/efi/efi.c b/drivers/firmware/efi/efi.c index cd42f66a7c85..fddc5f706fd2 100644 --- a/drivers/firmware/efi/efi.c +++ b/drivers/firmware/efi/efi.c @@ -18,6 +18,7 @@ #include #include #include +#include #include #include #include @@ -316,6 +317,59 @@ static __init int efivar_ssdt_load(void) static inline int efivar_ssdt_load(void) { return 0; } #endif +#ifdef CONFIG_DEBUG_FS + +#define EFI_DEBUGFS_MAX_BLOBS 32 + +struct debugfs_blob_wrapper debugfs_blob[EFI_DEBUGFS_MAX_BLOBS]; + +static void __init efi_debugfs_init(void) +{ + struct dentry *efi_debugfs; + efi_memory_desc_t *md; + char name[32]; + int type_count[EFI_BOOT_SERVICES_DATA + 1] = {}; + int i = 0; + + efi_debugfs = debugfs_create_dir("efi", NULL); + if (IS_ERR_OR_NULL(efi_debugfs)) { + pr_warn("Could not create efi debugfs entry\n"); + return; + } + + for_each_efi_memory_desc(md) { + switch (md->type) { + case EFI_BOOT_SERVICES_CODE: + snprintf(name, sizeof(name), "boot_services_code%d", + type_count[md->type]++); + break; + case EFI_BOOT_SERVICES_DATA: + snprintf(name, sizeof(name), "boot_services_data%d", + type_count[md->type]++); + break; + default: + continue; + } + + debugfs_blob[i].size = md->num_pages << EFI_PAGE_SHIFT; + debugfs_blob[i].data = memremap(md->phys_addr, + debugfs_blob[i].size, + MEMREMAP_WB); + if (!debugfs_blob[i].data) { + pr_warn("Error mapping %s\n", name); + continue; + } + + debugfs_create_blob(name, 0400, efi_debugfs, &debugfs_blob[i]); + i++; + if (i == EFI_DEBUGFS_MAX_BLOBS) + break; + } +} +#else +static inline void efi_debugfs_init(void) {} +#endif + /* * We register the efi subsystem with the firmware subsystem and the * efivars subsystem with the efi subsystem, if the system was booted with @@ -360,6 +414,9 @@ static int __init efisubsys_init(void) goto err_remove_group; } + if (efi_enabled(EFI_DBG)) + efi_debugfs_init(); + return 0; err_remove_group: -- 2.17.0.rc2