Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp1228135rwb; Fri, 13 Jan 2023 09:25:48 -0800 (PST) X-Google-Smtp-Source: AMrXdXuBGTh3ZfXA7SJcngx9SLMDzo7TxpqpqnhsJwc012J7dbMIBEIbABupWosQDI/PifiBiJPd X-Received: by 2002:aa7:d393:0:b0:490:47c3:3d78 with SMTP id x19-20020aa7d393000000b0049047c33d78mr30280212edq.1.1673630748286; Fri, 13 Jan 2023 09:25:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673630748; cv=none; d=google.com; s=arc-20160816; b=CAaED65dDWC7Mn8TuJyZ291LRZK1vDcjqCQuw39gbax0jLu8qJGQ588yHC/F8r08nu Qw/ShbRe5PVXmzCabg5n3pXzruTKo+VIWNkAari0XxvqrlDUa/b0XKv/O62m6DZZ8aJ/ szoRUtIFAzq0T6Dm8VwjfH1MVHoyalVqUCDEPMRCbK0CD0fV6bRqVehU/6Fem3XKlTJW kF9ErcutuzmSy9nt8MCJSjX7lOwRUVXf4pWJsbXPDLf6CUExk3yq+5uqt8cgHwRN6Aau pjk4dao9ySh2AZkgnxhccP7gNxDhxCvByDCpsAceosrfcAIaG3DxK8Rm9AnDOvLCKF9C ODHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:mime-version:date :dkim-signature; bh=R2f0XZo/PD+Ey17NBObNZ33DU+dMs/x1UfqUEm+zGQE=; b=nopHzjrfhWIVJstmcMGZc3RCkarQKa/d+ZfwveCEOC2uCJmjCn9+hoNBBSKXyPbLNd 0rj1KEulEnH3yankidee4T6pqKVJUMLFex9pNVhDaerzHljKG45ItB8O61jxr9/CJN7X oAhqaD1CNWLGkrVbYwQq+BUwh27FbXiZxX6SOmVuplVTr7sECnust+bE0aKP2CuZe5+g Vbmz3e2yiRKJafaFqkDUvc6l+LZ7jz0vI0MobI4Wdbm/sleYElCEs6PzmILNoKoRG3eJ kk4FPD7TGh9a32KH3Vty0YV8yyxCH3MkW6qqutmP1+2h7MzeHQ00bFls/hAaqAN58K69 HxQg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=PqKZAvIP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id by6-20020a0564021b0600b0049553740b71si19601931edb.431.2023.01.13.09.25.35; Fri, 13 Jan 2023 09:25:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=PqKZAvIP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229808AbjAMRNC (ORCPT + 51 others); Fri, 13 Jan 2023 12:13:02 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54594 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229654AbjAMRM4 (ORCPT ); Fri, 13 Jan 2023 12:12:56 -0500 Received: from mail-pj1-x1049.google.com (mail-pj1-x1049.google.com [IPv6:2607:f8b0:4864:20::1049]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3ECA688DE7 for ; Fri, 13 Jan 2023 09:11:31 -0800 (PST) Received: by mail-pj1-x1049.google.com with SMTP id d8-20020a17090a7bc800b00226eb4523ceso9567877pjl.7 for ; Fri, 13 Jan 2023 09:11:31 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=R2f0XZo/PD+Ey17NBObNZ33DU+dMs/x1UfqUEm+zGQE=; b=PqKZAvIPs3HOFkoiRJrrffuGojJvP+xMiiv721G4OJzOfQH2bX8jU4Mk2Tl5LDooSs aa8YjWaVu58VLPJ2NSG+I6yEqbH87g3u9i/MSUJTdlO5BkZ5lMIjuEYq+Ln+PxhtQNH5 z+C7YjmB0dIdbKTKqAyZWqr2fHRXNdzOE4dmkBGTqbd4zgK4YyxEtATFDnyOQc4aGvck rkLiekUldLX2NNd4kbDGG1iVSCrT5b4FAwfAtLBfetz33KAxOBGZ4BEiER6OPdwjy4qp +gQcx6w0IxPA6d3bYpUjKWLd9hCtATtGDBbcnnFHR9vD7lSJuc/XVaE7VZ1jcHFXzHYo rgsA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=R2f0XZo/PD+Ey17NBObNZ33DU+dMs/x1UfqUEm+zGQE=; b=H7cnNP95Fo0+oUCRcpji88627nQaXrzpTR1+E+pDkixzWDyt5zJrsRVr5wKW2UGnbo wEwnETeu5H7sqvRrTkbgQ1Rw7aaBcI1eqkwX/Gak+m8kjC9Fahju+FQvsjKZIgmlNQr3 vIsqtmdcmPPkLXvO9DElAr48vAtNmzvdJ9fAPk49YfrOF6EOU7b0SDH3HCwHSS+/NY5M bDlGoghiuHqUFrr32pymnefEhMlC4kwoKdMtFQcl/Yd940/xltpK6Nadva67skXimrhf ud8dDuHLTmcQ0sYG9eNHwgPhJoQpCoMpJ37yR/uEhdaYUz9ZD1KBlRn58yzjzFAgN4zZ 9A/Q== X-Gm-Message-State: AFqh2krYHRgz5Jn9yZ4o5b5ZsvWXPVhRifF2poYGB4jAC3jEHlfp8/GP MS/7n02KIDG3CXNnFnT2xxD5AsQkR1EdNUJNkBSbXh8GExt/FbfIrQhvgOHZjZ56v8UUs1Soln+ bersDU4Gt0iYglzSjw6a+lqa0SyH5XJci9VtdeXxIxACXveBnEPCoV7e2j9/P4Md4wJ7GKV8WD1 giFc70ZXw= X-Received: from dionnaglaze.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:2ee6]) (user=dionnaglaze job=sendgmr) by 2002:a62:6d47:0:b0:581:1417:6ce6 with SMTP id i68-20020a626d47000000b0058114176ce6mr4915820pfc.58.1673629890428; Fri, 13 Jan 2023 09:11:30 -0800 (PST) Date: Fri, 13 Jan 2023 17:11:25 +0000 Mime-Version: 1.0 X-Mailer: git-send-email 2.39.0.314.g84b9a713c41-goog Message-ID: <20230113171125.2846306-1-dionnaglaze@google.com> Subject: [PATCH] x86/efi: Safely enable unaccepted memory in UEFI From: Dionna Glaze To: linux-kernel@vger.kernel.org, x86@kernel.org Cc: jiewen.yao@intel.com, devel@edk2.groups.io, Dionna Glaze , Ard Biescheuvel , "Min M. Xu" , Gerd Hoffmann , James Bottomley , Tom Lendacky , Erdem Aktas , "Kirill A. Shutemov" , Dave Hansen Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch depends on Kirill A. Shutemov's series [PATCHv8 00/14] mm, x86/cc: Implement support for unaccepted memory The UEFI v2.9 specification includes a new memory type to be used in environments where the OS must accept memory that is provided from its host. Before the introduction of this memory type, all memory was accepted eagerly in the firmware. In order for the firmware to safely stop accepting memory on the OS's behalf, the OS must affirmatively indicate support to the firmware. Enabling unaccepted memory requires calling a 0-argument enablement protocol before ExitBootServices. This call is only made if the kernel is compiled with UNACCEPTED_MEMORY=y The naming of the protocol guid is dependent on the standardization of the protocol, which is being discussed. Acceptance is contingent on the kernel community's approval. Cc: Ard Biescheuvel Cc: "Min M. Xu" Cc: Gerd Hoffmann Cc: James Bottomley Cc: Tom Lendacky Cc: Jiewen Yao Cc: Erdem Aktas Cc: "Kirill A. Shutemov" Cc: Dave Hansen Signed-off-by: Dionna Glaze --- drivers/firmware/efi/libstub/x86-stub.c | 36 +++++++++++++++++++++++++ include/linux/efi.h | 1 + 2 files changed, 37 insertions(+) diff --git a/drivers/firmware/efi/libstub/x86-stub.c b/drivers/firmware/efi/libstub/x86-stub.c index a0bfd31358ba..5e9ebfbb49e6 100644 --- a/drivers/firmware/efi/libstub/x86-stub.c +++ b/drivers/firmware/efi/libstub/x86-stub.c @@ -26,6 +26,17 @@ const efi_dxe_services_table_t *efi_dxe_table; u32 image_offset __section(".data"); static efi_loaded_image_t *image = NULL; +union memory_acceptance_protocol { + struct { + efi_status_t (__efiapi *allow_unaccepted_memory)( + union memory_acceptance_protocol *); + }; + struct { + u32 allow_unaccepted_memory; + } mixed_mode; +}; +typedef union memory_acceptance_protocol memory_acceptance_protocol_t; + static efi_status_t preserve_pci_rom_image(efi_pci_io_protocol_t *pci, struct pci_setup_rom **__rom) { @@ -310,6 +321,29 @@ setup_memory_protection(unsigned long image_base, unsigned long image_size) #endif } + +static void setup_unaccepted_memory(void) +{ +#ifdef CONFIG_UNACCEPTED_MEMORY + efi_guid_t mem_acceptance_proto = EFI_MEMORY_ACCEPTANCE_PROTOCOL_GUID; + memory_acceptance_protocol_t *proto; + efi_status_t status; + + /* + * Enable unaccepted memory before calling exit boot services in order + * for the UEFI to not accept all memory on EBS. + */ + status = efi_bs_call(locate_protocol, &mem_acceptance_proto, NULL, + (void **)&proto); + if (status != EFI_SUCCESS) + return; + + status = efi_call_proto(proto, allow_unaccepted_memory); + if (status != EFI_SUCCESS) + efi_err("Memory acceptance protocol failed\n"); +#endif +} + static const efi_char16_t apple[] = L"Apple"; static void setup_quirks(struct boot_params *boot_params, @@ -899,6 +933,8 @@ asmlinkage unsigned long efi_main(efi_handle_t handle, setup_quirks(boot_params, bzimage_addr, buffer_end - buffer_start); + setup_unaccepted_memory(); + status = exit_boot(boot_params, handle); if (status != EFI_SUCCESS) { efi_err("exit_boot() failed!\n"); diff --git a/include/linux/efi.h b/include/linux/efi.h index 4b27519143f5..bfc0e4f2aba5 100644 --- a/include/linux/efi.h +++ b/include/linux/efi.h @@ -391,6 +391,7 @@ void efi_native_runtime_setup(void); #define EFI_RT_PROPERTIES_TABLE_GUID EFI_GUID(0xeb66918a, 0x7eef, 0x402a, 0x84, 0x2e, 0x93, 0x1d, 0x21, 0xc3, 0x8a, 0xe9) #define EFI_DXE_SERVICES_TABLE_GUID EFI_GUID(0x05ad34ba, 0x6f02, 0x4214, 0x95, 0x2e, 0x4d, 0xa0, 0x39, 0x8e, 0x2b, 0xb9) #define EFI_SMBIOS_PROTOCOL_GUID EFI_GUID(0x03583ff6, 0xcb36, 0x4940, 0x94, 0x7e, 0xb9, 0xb3, 0x9f, 0x4a, 0xfa, 0xf7) +#define EFI_MEMORY_ACCEPTANCE_PROTOCOL_GUID EFI_GUID(0xc5a010fe, 0x38a7, 0x4531, 0x8a, 0x4a, 0x05, 0x00, 0xd2, 0xfd, 0x16, 0x49) #define EFI_IMAGE_SECURITY_DATABASE_GUID EFI_GUID(0xd719b2cb, 0x3d3a, 0x4596, 0xa3, 0xbc, 0xda, 0xd0, 0x0e, 0x67, 0x65, 0x6f) #define EFI_SHIM_LOCK_GUID EFI_GUID(0x605dab50, 0xe046, 0x4300, 0xab, 0xb6, 0x3d, 0xd8, 0x10, 0xdd, 0x8b, 0x23) -- 2.39.0.314.g84b9a713c41-goog