1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * 4 * Procedures for interfacing to the RTAS on CHRP machines. 5 * 6 * Peter Bergner, IBM March 2001. 7 * Copyright (C) 2001 IBM. 8 */ 9 10 #define pr_fmt(fmt) "rtas: " fmt 11 12 #include <linux/bsearch.h> 13 #include <linux/capability.h> 14 #include <linux/delay.h> 15 #include <linux/export.h> 16 #include <linux/init.h> 17 #include <linux/kconfig.h> 18 #include <linux/kernel.h> 19 #include <linux/lockdep.h> 20 #include <linux/memblock.h> 21 #include <linux/of.h> 22 #include <linux/of_fdt.h> 23 #include <linux/reboot.h> 24 #include <linux/sched.h> 25 #include <linux/security.h> 26 #include <linux/slab.h> 27 #include <linux/spinlock.h> 28 #include <linux/stdarg.h> 29 #include <linux/syscalls.h> 30 #include <linux/types.h> 31 #include <linux/uaccess.h> 32 #include <linux/xarray.h> 33 34 #include <asm/delay.h> 35 #include <asm/firmware.h> 36 #include <asm/interrupt.h> 37 #include <asm/machdep.h> 38 #include <asm/mmu.h> 39 #include <asm/page.h> 40 #include <asm/rtas-work-area.h> 41 #include <asm/rtas.h> 42 #include <asm/time.h> 43 #include <asm/trace.h> 44 #include <asm/udbg.h> 45 46 struct rtas_filter { 47 /* Indexes into the args buffer, -1 if not used */ 48 const int buf_idx1; 49 const int size_idx1; 50 const int buf_idx2; 51 const int size_idx2; 52 /* 53 * Assumed buffer size per the spec if the function does not 54 * have a size parameter, e.g. ibm,errinjct. 0 if unused. 55 */ 56 const int fixed_size; 57 }; 58 59 /** 60 * struct rtas_function - Descriptor for RTAS functions. 61 * 62 * @token: Value of @name if it exists under the /rtas node. 63 * @name: Function name. 64 * @filter: If non-NULL, invoking this function via the rtas syscall is 65 * generally allowed, and @filter describes constraints on the 66 * arguments. See also @banned_for_syscall_on_le. 67 * @banned_for_syscall_on_le: Set when call via sys_rtas is generally allowed 68 * but specifically restricted on ppc64le. Such 69 * functions are believed to have no users on 70 * ppc64le, and we want to keep it that way. It does 71 * not make sense for this to be set when @filter 72 * is NULL. 73 */ 74 struct rtas_function { 75 s32 token; 76 const bool banned_for_syscall_on_le:1; 77 const char * const name; 78 const struct rtas_filter *filter; 79 }; 80 81 static struct rtas_function rtas_function_table[] __ro_after_init = { 82 [RTAS_FNIDX__CHECK_EXCEPTION] = { 83 .name = "check-exception", 84 }, 85 [RTAS_FNIDX__DISPLAY_CHARACTER] = { 86 .name = "display-character", 87 .filter = &(const struct rtas_filter) { 88 .buf_idx1 = -1, .size_idx1 = -1, 89 .buf_idx2 = -1, .size_idx2 = -1, 90 }, 91 }, 92 [RTAS_FNIDX__EVENT_SCAN] = { 93 .name = "event-scan", 94 }, 95 [RTAS_FNIDX__FREEZE_TIME_BASE] = { 96 .name = "freeze-time-base", 97 }, 98 [RTAS_FNIDX__GET_POWER_LEVEL] = { 99 .name = "get-power-level", 100 .filter = &(const struct rtas_filter) { 101 .buf_idx1 = -1, .size_idx1 = -1, 102 .buf_idx2 = -1, .size_idx2 = -1, 103 }, 104 }, 105 [RTAS_FNIDX__GET_SENSOR_STATE] = { 106 .name = "get-sensor-state", 107 .filter = &(const struct rtas_filter) { 108 .buf_idx1 = -1, .size_idx1 = -1, 109 .buf_idx2 = -1, .size_idx2 = -1, 110 }, 111 }, 112 [RTAS_FNIDX__GET_TERM_CHAR] = { 113 .name = "get-term-char", 114 }, 115 [RTAS_FNIDX__GET_TIME_OF_DAY] = { 116 .name = "get-time-of-day", 117 .filter = &(const struct rtas_filter) { 118 .buf_idx1 = -1, .size_idx1 = -1, 119 .buf_idx2 = -1, .size_idx2 = -1, 120 }, 121 }, 122 [RTAS_FNIDX__IBM_ACTIVATE_FIRMWARE] = { 123 .name = "ibm,activate-firmware", 124 .filter = &(const struct rtas_filter) { 125 .buf_idx1 = -1, .size_idx1 = -1, 126 .buf_idx2 = -1, .size_idx2 = -1, 127 }, 128 }, 129 [RTAS_FNIDX__IBM_CBE_START_PTCAL] = { 130 .name = "ibm,cbe-start-ptcal", 131 }, 132 [RTAS_FNIDX__IBM_CBE_STOP_PTCAL] = { 133 .name = "ibm,cbe-stop-ptcal", 134 }, 135 [RTAS_FNIDX__IBM_CHANGE_MSI] = { 136 .name = "ibm,change-msi", 137 }, 138 [RTAS_FNIDX__IBM_CLOSE_ERRINJCT] = { 139 .name = "ibm,close-errinjct", 140 .filter = &(const struct rtas_filter) { 141 .buf_idx1 = -1, .size_idx1 = -1, 142 .buf_idx2 = -1, .size_idx2 = -1, 143 }, 144 }, 145 [RTAS_FNIDX__IBM_CONFIGURE_BRIDGE] = { 146 .name = "ibm,configure-bridge", 147 }, 148 [RTAS_FNIDX__IBM_CONFIGURE_CONNECTOR] = { 149 .name = "ibm,configure-connector", 150 .filter = &(const struct rtas_filter) { 151 .buf_idx1 = 0, .size_idx1 = -1, 152 .buf_idx2 = 1, .size_idx2 = -1, 153 .fixed_size = 4096, 154 }, 155 }, 156 [RTAS_FNIDX__IBM_CONFIGURE_KERNEL_DUMP] = { 157 .name = "ibm,configure-kernel-dump", 158 }, 159 [RTAS_FNIDX__IBM_CONFIGURE_PE] = { 160 .name = "ibm,configure-pe", 161 }, 162 [RTAS_FNIDX__IBM_CREATE_PE_DMA_WINDOW] = { 163 .name = "ibm,create-pe-dma-window", 164 }, 165 [RTAS_FNIDX__IBM_DISPLAY_MESSAGE] = { 166 .name = "ibm,display-message", 167 .filter = &(const struct rtas_filter) { 168 .buf_idx1 = 0, .size_idx1 = -1, 169 .buf_idx2 = -1, .size_idx2 = -1, 170 }, 171 }, 172 [RTAS_FNIDX__IBM_ERRINJCT] = { 173 .name = "ibm,errinjct", 174 .filter = &(const struct rtas_filter) { 175 .buf_idx1 = 2, .size_idx1 = -1, 176 .buf_idx2 = -1, .size_idx2 = -1, 177 .fixed_size = 1024, 178 }, 179 }, 180 [RTAS_FNIDX__IBM_EXTI2C] = { 181 .name = "ibm,exti2c", 182 }, 183 [RTAS_FNIDX__IBM_GET_CONFIG_ADDR_INFO] = { 184 .name = "ibm,get-config-addr-info", 185 }, 186 [RTAS_FNIDX__IBM_GET_CONFIG_ADDR_INFO2] = { 187 .name = "ibm,get-config-addr-info2", 188 .filter = &(const struct rtas_filter) { 189 .buf_idx1 = -1, .size_idx1 = -1, 190 .buf_idx2 = -1, .size_idx2 = -1, 191 }, 192 }, 193 [RTAS_FNIDX__IBM_GET_DYNAMIC_SENSOR_STATE] = { 194 .name = "ibm,get-dynamic-sensor-state", 195 .filter = &(const struct rtas_filter) { 196 .buf_idx1 = 1, .size_idx1 = -1, 197 .buf_idx2 = -1, .size_idx2 = -1, 198 }, 199 }, 200 [RTAS_FNIDX__IBM_GET_INDICES] = { 201 .name = "ibm,get-indices", 202 .filter = &(const struct rtas_filter) { 203 .buf_idx1 = 2, .size_idx1 = 3, 204 .buf_idx2 = -1, .size_idx2 = -1, 205 }, 206 }, 207 [RTAS_FNIDX__IBM_GET_RIO_TOPOLOGY] = { 208 .name = "ibm,get-rio-topology", 209 }, 210 [RTAS_FNIDX__IBM_GET_SYSTEM_PARAMETER] = { 211 .name = "ibm,get-system-parameter", 212 .filter = &(const struct rtas_filter) { 213 .buf_idx1 = 1, .size_idx1 = 2, 214 .buf_idx2 = -1, .size_idx2 = -1, 215 }, 216 }, 217 [RTAS_FNIDX__IBM_GET_VPD] = { 218 .name = "ibm,get-vpd", 219 .filter = &(const struct rtas_filter) { 220 .buf_idx1 = 0, .size_idx1 = -1, 221 .buf_idx2 = 1, .size_idx2 = 2, 222 }, 223 }, 224 [RTAS_FNIDX__IBM_GET_XIVE] = { 225 .name = "ibm,get-xive", 226 }, 227 [RTAS_FNIDX__IBM_INT_OFF] = { 228 .name = "ibm,int-off", 229 }, 230 [RTAS_FNIDX__IBM_INT_ON] = { 231 .name = "ibm,int-on", 232 }, 233 [RTAS_FNIDX__IBM_IO_QUIESCE_ACK] = { 234 .name = "ibm,io-quiesce-ack", 235 }, 236 [RTAS_FNIDX__IBM_LPAR_PERFTOOLS] = { 237 .name = "ibm,lpar-perftools", 238 .filter = &(const struct rtas_filter) { 239 .buf_idx1 = 2, .size_idx1 = 3, 240 .buf_idx2 = -1, .size_idx2 = -1, 241 }, 242 }, 243 [RTAS_FNIDX__IBM_MANAGE_FLASH_IMAGE] = { 244 .name = "ibm,manage-flash-image", 245 }, 246 [RTAS_FNIDX__IBM_MANAGE_STORAGE_PRESERVATION] = { 247 .name = "ibm,manage-storage-preservation", 248 }, 249 [RTAS_FNIDX__IBM_NMI_INTERLOCK] = { 250 .name = "ibm,nmi-interlock", 251 }, 252 [RTAS_FNIDX__IBM_NMI_REGISTER] = { 253 .name = "ibm,nmi-register", 254 }, 255 [RTAS_FNIDX__IBM_OPEN_ERRINJCT] = { 256 .name = "ibm,open-errinjct", 257 .filter = &(const struct rtas_filter) { 258 .buf_idx1 = -1, .size_idx1 = -1, 259 .buf_idx2 = -1, .size_idx2 = -1, 260 }, 261 }, 262 [RTAS_FNIDX__IBM_OPEN_SRIOV_ALLOW_UNFREEZE] = { 263 .name = "ibm,open-sriov-allow-unfreeze", 264 }, 265 [RTAS_FNIDX__IBM_OPEN_SRIOV_MAP_PE_NUMBER] = { 266 .name = "ibm,open-sriov-map-pe-number", 267 }, 268 [RTAS_FNIDX__IBM_OS_TERM] = { 269 .name = "ibm,os-term", 270 }, 271 [RTAS_FNIDX__IBM_PARTNER_CONTROL] = { 272 .name = "ibm,partner-control", 273 }, 274 [RTAS_FNIDX__IBM_PHYSICAL_ATTESTATION] = { 275 .name = "ibm,physical-attestation", 276 .filter = &(const struct rtas_filter) { 277 .buf_idx1 = 0, .size_idx1 = 1, 278 .buf_idx2 = -1, .size_idx2 = -1, 279 }, 280 }, 281 [RTAS_FNIDX__IBM_PLATFORM_DUMP] = { 282 .name = "ibm,platform-dump", 283 .filter = &(const struct rtas_filter) { 284 .buf_idx1 = 4, .size_idx1 = 5, 285 .buf_idx2 = -1, .size_idx2 = -1, 286 }, 287 }, 288 [RTAS_FNIDX__IBM_POWER_OFF_UPS] = { 289 .name = "ibm,power-off-ups", 290 }, 291 [RTAS_FNIDX__IBM_QUERY_INTERRUPT_SOURCE_NUMBER] = { 292 .name = "ibm,query-interrupt-source-number", 293 }, 294 [RTAS_FNIDX__IBM_QUERY_PE_DMA_WINDOW] = { 295 .name = "ibm,query-pe-dma-window", 296 }, 297 [RTAS_FNIDX__IBM_READ_PCI_CONFIG] = { 298 .name = "ibm,read-pci-config", 299 }, 300 [RTAS_FNIDX__IBM_READ_SLOT_RESET_STATE] = { 301 .name = "ibm,read-slot-reset-state", 302 .filter = &(const struct rtas_filter) { 303 .buf_idx1 = -1, .size_idx1 = -1, 304 .buf_idx2 = -1, .size_idx2 = -1, 305 }, 306 }, 307 [RTAS_FNIDX__IBM_READ_SLOT_RESET_STATE2] = { 308 .name = "ibm,read-slot-reset-state2", 309 }, 310 [RTAS_FNIDX__IBM_REMOVE_PE_DMA_WINDOW] = { 311 .name = "ibm,remove-pe-dma-window", 312 }, 313 [RTAS_FNIDX__IBM_RESET_PE_DMA_WINDOWS] = { 314 .name = "ibm,reset-pe-dma-windows", 315 }, 316 [RTAS_FNIDX__IBM_SCAN_LOG_DUMP] = { 317 .name = "ibm,scan-log-dump", 318 .filter = &(const struct rtas_filter) { 319 .buf_idx1 = 0, .size_idx1 = 1, 320 .buf_idx2 = -1, .size_idx2 = -1, 321 }, 322 }, 323 [RTAS_FNIDX__IBM_SET_DYNAMIC_INDICATOR] = { 324 .name = "ibm,set-dynamic-indicator", 325 .filter = &(const struct rtas_filter) { 326 .buf_idx1 = 2, .size_idx1 = -1, 327 .buf_idx2 = -1, .size_idx2 = -1, 328 }, 329 }, 330 [RTAS_FNIDX__IBM_SET_EEH_OPTION] = { 331 .name = "ibm,set-eeh-option", 332 .filter = &(const struct rtas_filter) { 333 .buf_idx1 = -1, .size_idx1 = -1, 334 .buf_idx2 = -1, .size_idx2 = -1, 335 }, 336 }, 337 [RTAS_FNIDX__IBM_SET_SLOT_RESET] = { 338 .name = "ibm,set-slot-reset", 339 }, 340 [RTAS_FNIDX__IBM_SET_SYSTEM_PARAMETER] = { 341 .name = "ibm,set-system-parameter", 342 .filter = &(const struct rtas_filter) { 343 .buf_idx1 = 1, .size_idx1 = -1, 344 .buf_idx2 = -1, .size_idx2 = -1, 345 }, 346 }, 347 [RTAS_FNIDX__IBM_SET_XIVE] = { 348 .name = "ibm,set-xive", 349 }, 350 [RTAS_FNIDX__IBM_SLOT_ERROR_DETAIL] = { 351 .name = "ibm,slot-error-detail", 352 }, 353 [RTAS_FNIDX__IBM_SUSPEND_ME] = { 354 .name = "ibm,suspend-me", 355 .banned_for_syscall_on_le = true, 356 .filter = &(const struct rtas_filter) { 357 .buf_idx1 = -1, .size_idx1 = -1, 358 .buf_idx2 = -1, .size_idx2 = -1, 359 }, 360 }, 361 [RTAS_FNIDX__IBM_TUNE_DMA_PARMS] = { 362 .name = "ibm,tune-dma-parms", 363 }, 364 [RTAS_FNIDX__IBM_UPDATE_FLASH_64_AND_REBOOT] = { 365 .name = "ibm,update-flash-64-and-reboot", 366 }, 367 [RTAS_FNIDX__IBM_UPDATE_NODES] = { 368 .name = "ibm,update-nodes", 369 .banned_for_syscall_on_le = true, 370 .filter = &(const struct rtas_filter) { 371 .buf_idx1 = 0, .size_idx1 = -1, 372 .buf_idx2 = -1, .size_idx2 = -1, 373 .fixed_size = 4096, 374 }, 375 }, 376 [RTAS_FNIDX__IBM_UPDATE_PROPERTIES] = { 377 .name = "ibm,update-properties", 378 .banned_for_syscall_on_le = true, 379 .filter = &(const struct rtas_filter) { 380 .buf_idx1 = 0, .size_idx1 = -1, 381 .buf_idx2 = -1, .size_idx2 = -1, 382 .fixed_size = 4096, 383 }, 384 }, 385 [RTAS_FNIDX__IBM_VALIDATE_FLASH_IMAGE] = { 386 .name = "ibm,validate-flash-image", 387 }, 388 [RTAS_FNIDX__IBM_WRITE_PCI_CONFIG] = { 389 .name = "ibm,write-pci-config", 390 }, 391 [RTAS_FNIDX__NVRAM_FETCH] = { 392 .name = "nvram-fetch", 393 }, 394 [RTAS_FNIDX__NVRAM_STORE] = { 395 .name = "nvram-store", 396 }, 397 [RTAS_FNIDX__POWER_OFF] = { 398 .name = "power-off", 399 }, 400 [RTAS_FNIDX__PUT_TERM_CHAR] = { 401 .name = "put-term-char", 402 }, 403 [RTAS_FNIDX__QUERY_CPU_STOPPED_STATE] = { 404 .name = "query-cpu-stopped-state", 405 }, 406 [RTAS_FNIDX__READ_PCI_CONFIG] = { 407 .name = "read-pci-config", 408 }, 409 [RTAS_FNIDX__RTAS_LAST_ERROR] = { 410 .name = "rtas-last-error", 411 }, 412 [RTAS_FNIDX__SET_INDICATOR] = { 413 .name = "set-indicator", 414 .filter = &(const struct rtas_filter) { 415 .buf_idx1 = -1, .size_idx1 = -1, 416 .buf_idx2 = -1, .size_idx2 = -1, 417 }, 418 }, 419 [RTAS_FNIDX__SET_POWER_LEVEL] = { 420 .name = "set-power-level", 421 .filter = &(const struct rtas_filter) { 422 .buf_idx1 = -1, .size_idx1 = -1, 423 .buf_idx2 = -1, .size_idx2 = -1, 424 }, 425 }, 426 [RTAS_FNIDX__SET_TIME_FOR_POWER_ON] = { 427 .name = "set-time-for-power-on", 428 .filter = &(const struct rtas_filter) { 429 .buf_idx1 = -1, .size_idx1 = -1, 430 .buf_idx2 = -1, .size_idx2 = -1, 431 }, 432 }, 433 [RTAS_FNIDX__SET_TIME_OF_DAY] = { 434 .name = "set-time-of-day", 435 .filter = &(const struct rtas_filter) { 436 .buf_idx1 = -1, .size_idx1 = -1, 437 .buf_idx2 = -1, .size_idx2 = -1, 438 }, 439 }, 440 [RTAS_FNIDX__START_CPU] = { 441 .name = "start-cpu", 442 }, 443 [RTAS_FNIDX__STOP_SELF] = { 444 .name = "stop-self", 445 }, 446 [RTAS_FNIDX__SYSTEM_REBOOT] = { 447 .name = "system-reboot", 448 }, 449 [RTAS_FNIDX__THAW_TIME_BASE] = { 450 .name = "thaw-time-base", 451 }, 452 [RTAS_FNIDX__WRITE_PCI_CONFIG] = { 453 .name = "write-pci-config", 454 }, 455 }; 456 457 /* 458 * Nearly all RTAS calls need to be serialized. All uses of the 459 * default rtas_args block must hold rtas_lock. 460 * 461 * Exceptions to the RTAS serialization requirement (e.g. stop-self) 462 * must use a separate rtas_args structure. 463 */ 464 static DEFINE_RAW_SPINLOCK(rtas_lock); 465 static struct rtas_args rtas_args; 466 467 /** 468 * rtas_function_token() - RTAS function token lookup. 469 * @handle: Function handle, e.g. RTAS_FN_EVENT_SCAN. 470 * 471 * Context: Any context. 472 * Return: the token value for the function if implemented by this platform, 473 * otherwise RTAS_UNKNOWN_SERVICE. 474 */ 475 s32 rtas_function_token(const rtas_fn_handle_t handle) 476 { 477 const size_t index = handle.index; 478 const bool out_of_bounds = index >= ARRAY_SIZE(rtas_function_table); 479 480 if (WARN_ONCE(out_of_bounds, "invalid function index %zu", index)) 481 return RTAS_UNKNOWN_SERVICE; 482 /* 483 * Various drivers attempt token lookups on non-RTAS 484 * platforms. 485 */ 486 if (!rtas.dev) 487 return RTAS_UNKNOWN_SERVICE; 488 489 return rtas_function_table[index].token; 490 } 491 EXPORT_SYMBOL_GPL(rtas_function_token); 492 493 static int rtas_function_cmp(const void *a, const void *b) 494 { 495 const struct rtas_function *f1 = a; 496 const struct rtas_function *f2 = b; 497 498 return strcmp(f1->name, f2->name); 499 } 500 501 /* 502 * Boot-time initialization of the function table needs the lookup to 503 * return a non-const-qualified object. Use rtas_name_to_function() 504 * in all other contexts. 505 */ 506 static struct rtas_function *__rtas_name_to_function(const char *name) 507 { 508 const struct rtas_function key = { 509 .name = name, 510 }; 511 struct rtas_function *found; 512 513 found = bsearch(&key, rtas_function_table, ARRAY_SIZE(rtas_function_table), 514 sizeof(rtas_function_table[0]), rtas_function_cmp); 515 516 return found; 517 } 518 519 static const struct rtas_function *rtas_name_to_function(const char *name) 520 { 521 return __rtas_name_to_function(name); 522 } 523 524 static DEFINE_XARRAY(rtas_token_to_function_xarray); 525 526 static int __init rtas_token_to_function_xarray_init(void) 527 { 528 int err = 0; 529 530 for (size_t i = 0; i < ARRAY_SIZE(rtas_function_table); ++i) { 531 const struct rtas_function *func = &rtas_function_table[i]; 532 const s32 token = func->token; 533 534 if (token == RTAS_UNKNOWN_SERVICE) 535 continue; 536 537 err = xa_err(xa_store(&rtas_token_to_function_xarray, 538 token, (void *)func, GFP_KERNEL)); 539 if (err) 540 break; 541 } 542 543 return err; 544 } 545 arch_initcall(rtas_token_to_function_xarray_init); 546 547 static const struct rtas_function *rtas_token_to_function(s32 token) 548 { 549 const struct rtas_function *func; 550 551 if (WARN_ONCE(token < 0, "invalid token %d", token)) 552 return NULL; 553 554 func = xa_load(&rtas_token_to_function_xarray, token); 555 556 if (WARN_ONCE(!func, "unexpected failed lookup for token %d", token)) 557 return NULL; 558 559 return func; 560 } 561 562 /* This is here deliberately so it's only used in this file */ 563 void enter_rtas(unsigned long); 564 565 static void __do_enter_rtas(struct rtas_args *args) 566 { 567 enter_rtas(__pa(args)); 568 srr_regs_clobbered(); /* rtas uses SRRs, invalidate */ 569 } 570 571 static void __do_enter_rtas_trace(struct rtas_args *args) 572 { 573 const char *name = NULL; 574 575 if (args == &rtas_args) 576 lockdep_assert_held(&rtas_lock); 577 /* 578 * If the tracepoints that consume the function name aren't 579 * active, avoid the lookup. 580 */ 581 if ((trace_rtas_input_enabled() || trace_rtas_output_enabled())) { 582 const s32 token = be32_to_cpu(args->token); 583 const struct rtas_function *func = rtas_token_to_function(token); 584 585 name = func->name; 586 } 587 588 trace_rtas_input(args, name); 589 trace_rtas_ll_entry(args); 590 591 __do_enter_rtas(args); 592 593 trace_rtas_ll_exit(args); 594 trace_rtas_output(args, name); 595 } 596 597 static void do_enter_rtas(struct rtas_args *args) 598 { 599 const unsigned long msr = mfmsr(); 600 /* 601 * Situations where we want to skip any active tracepoints for 602 * safety reasons: 603 * 604 * 1. The last code executed on an offline CPU as it stops, 605 * i.e. we're about to call stop-self. The tracepoints' 606 * function name lookup uses xarray, which uses RCU, which 607 * isn't valid to call on an offline CPU. Any events 608 * emitted on an offline CPU will be discarded anyway. 609 * 610 * 2. In real mode, as when invoking ibm,nmi-interlock from 611 * the pseries MCE handler. We cannot count on trace 612 * buffers or the entries in rtas_token_to_function_xarray 613 * to be contained in the RMO. 614 */ 615 const unsigned long mask = MSR_IR | MSR_DR; 616 const bool can_trace = likely(cpu_online(raw_smp_processor_id()) && 617 (msr & mask) == mask); 618 /* 619 * Make sure MSR[RI] is currently enabled as it will be forced later 620 * in enter_rtas. 621 */ 622 BUG_ON(!(msr & MSR_RI)); 623 624 BUG_ON(!irqs_disabled()); 625 626 hard_irq_disable(); /* Ensure MSR[EE] is disabled on PPC64 */ 627 628 if (can_trace) 629 __do_enter_rtas_trace(args); 630 else 631 __do_enter_rtas(args); 632 } 633 634 struct rtas_t rtas; 635 636 DEFINE_SPINLOCK(rtas_data_buf_lock); 637 EXPORT_SYMBOL_GPL(rtas_data_buf_lock); 638 639 char rtas_data_buf[RTAS_DATA_BUF_SIZE] __aligned(SZ_4K); 640 EXPORT_SYMBOL_GPL(rtas_data_buf); 641 642 unsigned long rtas_rmo_buf; 643 644 /* 645 * If non-NULL, this gets called when the kernel terminates. 646 * This is done like this so rtas_flash can be a module. 647 */ 648 void (*rtas_flash_term_hook)(int); 649 EXPORT_SYMBOL_GPL(rtas_flash_term_hook); 650 651 /* 652 * call_rtas_display_status and call_rtas_display_status_delay 653 * are designed only for very early low-level debugging, which 654 * is why the token is hard-coded to 10. 655 */ 656 static void call_rtas_display_status(unsigned char c) 657 { 658 unsigned long flags; 659 660 if (!rtas.base) 661 return; 662 663 raw_spin_lock_irqsave(&rtas_lock, flags); 664 rtas_call_unlocked(&rtas_args, 10, 1, 1, NULL, c); 665 raw_spin_unlock_irqrestore(&rtas_lock, flags); 666 } 667 668 static void call_rtas_display_status_delay(char c) 669 { 670 static int pending_newline = 0; /* did last write end with unprinted newline? */ 671 static int width = 16; 672 673 if (c == '\n') { 674 while (width-- > 0) 675 call_rtas_display_status(' '); 676 width = 16; 677 mdelay(500); 678 pending_newline = 1; 679 } else { 680 if (pending_newline) { 681 call_rtas_display_status('\r'); 682 call_rtas_display_status('\n'); 683 } 684 pending_newline = 0; 685 if (width--) { 686 call_rtas_display_status(c); 687 udelay(10000); 688 } 689 } 690 } 691 692 void __init udbg_init_rtas_panel(void) 693 { 694 udbg_putc = call_rtas_display_status_delay; 695 } 696 697 #ifdef CONFIG_UDBG_RTAS_CONSOLE 698 699 /* If you think you're dying before early_init_dt_scan_rtas() does its 700 * work, you can hard code the token values for your firmware here and 701 * hardcode rtas.base/entry etc. 702 */ 703 static unsigned int rtas_putchar_token = RTAS_UNKNOWN_SERVICE; 704 static unsigned int rtas_getchar_token = RTAS_UNKNOWN_SERVICE; 705 706 static void udbg_rtascon_putc(char c) 707 { 708 int tries; 709 710 if (!rtas.base) 711 return; 712 713 /* Add CRs before LFs */ 714 if (c == '\n') 715 udbg_rtascon_putc('\r'); 716 717 /* if there is more than one character to be displayed, wait a bit */ 718 for (tries = 0; tries < 16; tries++) { 719 if (rtas_call(rtas_putchar_token, 1, 1, NULL, c) == 0) 720 break; 721 udelay(1000); 722 } 723 } 724 725 static int udbg_rtascon_getc_poll(void) 726 { 727 int c; 728 729 if (!rtas.base) 730 return -1; 731 732 if (rtas_call(rtas_getchar_token, 0, 2, &c)) 733 return -1; 734 735 return c; 736 } 737 738 static int udbg_rtascon_getc(void) 739 { 740 int c; 741 742 while ((c = udbg_rtascon_getc_poll()) == -1) 743 ; 744 745 return c; 746 } 747 748 749 void __init udbg_init_rtas_console(void) 750 { 751 udbg_putc = udbg_rtascon_putc; 752 udbg_getc = udbg_rtascon_getc; 753 udbg_getc_poll = udbg_rtascon_getc_poll; 754 } 755 #endif /* CONFIG_UDBG_RTAS_CONSOLE */ 756 757 void rtas_progress(char *s, unsigned short hex) 758 { 759 struct device_node *root; 760 int width; 761 const __be32 *p; 762 char *os; 763 static int display_character, set_indicator; 764 static int display_width, display_lines, form_feed; 765 static const int *row_width; 766 static DEFINE_SPINLOCK(progress_lock); 767 static int current_line; 768 static int pending_newline = 0; /* did last write end with unprinted newline? */ 769 770 if (!rtas.base) 771 return; 772 773 if (display_width == 0) { 774 display_width = 0x10; 775 if ((root = of_find_node_by_path("/rtas"))) { 776 if ((p = of_get_property(root, 777 "ibm,display-line-length", NULL))) 778 display_width = be32_to_cpu(*p); 779 if ((p = of_get_property(root, 780 "ibm,form-feed", NULL))) 781 form_feed = be32_to_cpu(*p); 782 if ((p = of_get_property(root, 783 "ibm,display-number-of-lines", NULL))) 784 display_lines = be32_to_cpu(*p); 785 row_width = of_get_property(root, 786 "ibm,display-truncation-length", NULL); 787 of_node_put(root); 788 } 789 display_character = rtas_function_token(RTAS_FN_DISPLAY_CHARACTER); 790 set_indicator = rtas_function_token(RTAS_FN_SET_INDICATOR); 791 } 792 793 if (display_character == RTAS_UNKNOWN_SERVICE) { 794 /* use hex display if available */ 795 if (set_indicator != RTAS_UNKNOWN_SERVICE) 796 rtas_call(set_indicator, 3, 1, NULL, 6, 0, hex); 797 return; 798 } 799 800 spin_lock(&progress_lock); 801 802 /* 803 * Last write ended with newline, but we didn't print it since 804 * it would just clear the bottom line of output. Print it now 805 * instead. 806 * 807 * If no newline is pending and form feed is supported, clear the 808 * display with a form feed; otherwise, print a CR to start output 809 * at the beginning of the line. 810 */ 811 if (pending_newline) { 812 rtas_call(display_character, 1, 1, NULL, '\r'); 813 rtas_call(display_character, 1, 1, NULL, '\n'); 814 pending_newline = 0; 815 } else { 816 current_line = 0; 817 if (form_feed) 818 rtas_call(display_character, 1, 1, NULL, 819 (char)form_feed); 820 else 821 rtas_call(display_character, 1, 1, NULL, '\r'); 822 } 823 824 if (row_width) 825 width = row_width[current_line]; 826 else 827 width = display_width; 828 os = s; 829 while (*os) { 830 if (*os == '\n' || *os == '\r') { 831 /* If newline is the last character, save it 832 * until next call to avoid bumping up the 833 * display output. 834 */ 835 if (*os == '\n' && !os[1]) { 836 pending_newline = 1; 837 current_line++; 838 if (current_line > display_lines-1) 839 current_line = display_lines-1; 840 spin_unlock(&progress_lock); 841 return; 842 } 843 844 /* RTAS wants CR-LF, not just LF */ 845 846 if (*os == '\n') { 847 rtas_call(display_character, 1, 1, NULL, '\r'); 848 rtas_call(display_character, 1, 1, NULL, '\n'); 849 } else { 850 /* CR might be used to re-draw a line, so we'll 851 * leave it alone and not add LF. 852 */ 853 rtas_call(display_character, 1, 1, NULL, *os); 854 } 855 856 if (row_width) 857 width = row_width[current_line]; 858 else 859 width = display_width; 860 } else { 861 width--; 862 rtas_call(display_character, 1, 1, NULL, *os); 863 } 864 865 os++; 866 867 /* if we overwrite the screen length */ 868 if (width <= 0) 869 while ((*os != 0) && (*os != '\n') && (*os != '\r')) 870 os++; 871 } 872 873 spin_unlock(&progress_lock); 874 } 875 EXPORT_SYMBOL_GPL(rtas_progress); /* needed by rtas_flash module */ 876 877 int rtas_token(const char *service) 878 { 879 const struct rtas_function *func; 880 const __be32 *tokp; 881 882 if (rtas.dev == NULL) 883 return RTAS_UNKNOWN_SERVICE; 884 885 func = rtas_name_to_function(service); 886 if (func) 887 return func->token; 888 /* 889 * The caller is looking up a name that is not known to be an 890 * RTAS function. Either it's a function that needs to be 891 * added to the table, or they're misusing rtas_token() to 892 * access non-function properties of the /rtas node. Warn and 893 * fall back to the legacy behavior. 894 */ 895 WARN_ONCE(1, "unknown function `%s`, should it be added to rtas_function_table?\n", 896 service); 897 898 tokp = of_get_property(rtas.dev, service, NULL); 899 return tokp ? be32_to_cpu(*tokp) : RTAS_UNKNOWN_SERVICE; 900 } 901 EXPORT_SYMBOL_GPL(rtas_token); 902 903 #ifdef CONFIG_RTAS_ERROR_LOGGING 904 905 static u32 rtas_error_log_max __ro_after_init = RTAS_ERROR_LOG_MAX; 906 907 /* 908 * Return the firmware-specified size of the error log buffer 909 * for all rtas calls that require an error buffer argument. 910 * This includes 'check-exception' and 'rtas-last-error'. 911 */ 912 int rtas_get_error_log_max(void) 913 { 914 return rtas_error_log_max; 915 } 916 917 static void __init init_error_log_max(void) 918 { 919 static const char propname[] __initconst = "rtas-error-log-max"; 920 u32 max; 921 922 if (of_property_read_u32(rtas.dev, propname, &max)) { 923 pr_warn("%s not found, using default of %u\n", 924 propname, RTAS_ERROR_LOG_MAX); 925 max = RTAS_ERROR_LOG_MAX; 926 } 927 928 if (max > RTAS_ERROR_LOG_MAX) { 929 pr_warn("%s = %u, clamping max error log size to %u\n", 930 propname, max, RTAS_ERROR_LOG_MAX); 931 max = RTAS_ERROR_LOG_MAX; 932 } 933 934 rtas_error_log_max = max; 935 } 936 937 938 static char rtas_err_buf[RTAS_ERROR_LOG_MAX]; 939 940 /** Return a copy of the detailed error text associated with the 941 * most recent failed call to rtas. Because the error text 942 * might go stale if there are any other intervening rtas calls, 943 * this routine must be called atomically with whatever produced 944 * the error (i.e. with rtas_lock still held from the previous call). 945 */ 946 static char *__fetch_rtas_last_error(char *altbuf) 947 { 948 const s32 token = rtas_function_token(RTAS_FN_RTAS_LAST_ERROR); 949 struct rtas_args err_args, save_args; 950 u32 bufsz; 951 char *buf = NULL; 952 953 lockdep_assert_held(&rtas_lock); 954 955 if (token == -1) 956 return NULL; 957 958 bufsz = rtas_get_error_log_max(); 959 960 err_args.token = cpu_to_be32(token); 961 err_args.nargs = cpu_to_be32(2); 962 err_args.nret = cpu_to_be32(1); 963 err_args.args[0] = cpu_to_be32(__pa(rtas_err_buf)); 964 err_args.args[1] = cpu_to_be32(bufsz); 965 err_args.args[2] = 0; 966 967 save_args = rtas_args; 968 rtas_args = err_args; 969 970 do_enter_rtas(&rtas_args); 971 972 err_args = rtas_args; 973 rtas_args = save_args; 974 975 /* Log the error in the unlikely case that there was one. */ 976 if (unlikely(err_args.args[2] == 0)) { 977 if (altbuf) { 978 buf = altbuf; 979 } else { 980 buf = rtas_err_buf; 981 if (slab_is_available()) 982 buf = kmalloc(RTAS_ERROR_LOG_MAX, GFP_ATOMIC); 983 } 984 if (buf) 985 memmove(buf, rtas_err_buf, RTAS_ERROR_LOG_MAX); 986 } 987 988 return buf; 989 } 990 991 #define get_errorlog_buffer() kmalloc(RTAS_ERROR_LOG_MAX, GFP_KERNEL) 992 993 #else /* CONFIG_RTAS_ERROR_LOGGING */ 994 #define __fetch_rtas_last_error(x) NULL 995 #define get_errorlog_buffer() NULL 996 static void __init init_error_log_max(void) {} 997 #endif 998 999 1000 static void 1001 va_rtas_call_unlocked(struct rtas_args *args, int token, int nargs, int nret, 1002 va_list list) 1003 { 1004 int i; 1005 1006 args->token = cpu_to_be32(token); 1007 args->nargs = cpu_to_be32(nargs); 1008 args->nret = cpu_to_be32(nret); 1009 args->rets = &(args->args[nargs]); 1010 1011 for (i = 0; i < nargs; ++i) 1012 args->args[i] = cpu_to_be32(va_arg(list, __u32)); 1013 1014 for (i = 0; i < nret; ++i) 1015 args->rets[i] = 0; 1016 1017 do_enter_rtas(args); 1018 } 1019 1020 /** 1021 * rtas_call_unlocked() - Invoke an RTAS firmware function without synchronization. 1022 * @args: RTAS parameter block to be used for the call, must obey RTAS addressing 1023 * constraints. 1024 * @token: Identifies the function being invoked. 1025 * @nargs: Number of input parameters. Does not include token. 1026 * @nret: Number of output parameters, including the call status. 1027 * @....: List of @nargs input parameters. 1028 * 1029 * Invokes the RTAS function indicated by @token, which the caller 1030 * should obtain via rtas_function_token(). 1031 * 1032 * This function is similar to rtas_call(), but must be used with a 1033 * limited set of RTAS calls specifically exempted from the general 1034 * requirement that only one RTAS call may be in progress at any 1035 * time. Examples include stop-self and ibm,nmi-interlock. 1036 */ 1037 void rtas_call_unlocked(struct rtas_args *args, int token, int nargs, int nret, ...) 1038 { 1039 va_list list; 1040 1041 va_start(list, nret); 1042 va_rtas_call_unlocked(args, token, nargs, nret, list); 1043 va_end(list); 1044 } 1045 1046 static bool token_is_restricted_errinjct(s32 token) 1047 { 1048 return token == rtas_function_token(RTAS_FN_IBM_OPEN_ERRINJCT) || 1049 token == rtas_function_token(RTAS_FN_IBM_ERRINJCT); 1050 } 1051 1052 /** 1053 * rtas_call() - Invoke an RTAS firmware function. 1054 * @token: Identifies the function being invoked. 1055 * @nargs: Number of input parameters. Does not include token. 1056 * @nret: Number of output parameters, including the call status. 1057 * @outputs: Array of @nret output words. 1058 * @....: List of @nargs input parameters. 1059 * 1060 * Invokes the RTAS function indicated by @token, which the caller 1061 * should obtain via rtas_function_token(). 1062 * 1063 * The @nargs and @nret arguments must match the number of input and 1064 * output parameters specified for the RTAS function. 1065 * 1066 * rtas_call() returns RTAS status codes, not conventional Linux errno 1067 * values. Callers must translate any failure to an appropriate errno 1068 * in syscall context. Most callers of RTAS functions that can return 1069 * -2 or 990x should use rtas_busy_delay() to correctly handle those 1070 * statuses before calling again. 1071 * 1072 * The return value descriptions are adapted from 7.2.8 [RTAS] Return 1073 * Codes of the PAPR and CHRP specifications. 1074 * 1075 * Context: Process context preferably, interrupt context if 1076 * necessary. Acquires an internal spinlock and may perform 1077 * GFP_ATOMIC slab allocation in error path. Unsafe for NMI 1078 * context. 1079 * Return: 1080 * * 0 - RTAS function call succeeded. 1081 * * -1 - RTAS function encountered a hardware or 1082 * platform error, or the token is invalid, 1083 * or the function is restricted by kernel policy. 1084 * * -2 - Specs say "A necessary hardware device was busy, 1085 * and the requested function could not be 1086 * performed. The operation should be retried at 1087 * a later time." This is misleading, at least with 1088 * respect to current RTAS implementations. What it 1089 * usually means in practice is that the function 1090 * could not be completed while meeting RTAS's 1091 * deadline for returning control to the OS (250us 1092 * for PAPR/PowerVM, typically), but the call may be 1093 * immediately reattempted to resume work on it. 1094 * * -3 - Parameter error. 1095 * * -7 - Unexpected state change. 1096 * * 9000...9899 - Vendor-specific success codes. 1097 * * 9900...9905 - Advisory extended delay. Caller should try 1098 * again after ~10^x ms has elapsed, where x is 1099 * the last digit of the status [0-5]. Again going 1100 * beyond the PAPR text, 990x on PowerVM indicates 1101 * contention for RTAS-internal resources. Other 1102 * RTAS call sequences in progress should be 1103 * allowed to complete before reattempting the 1104 * call. 1105 * * -9000 - Multi-level isolation error. 1106 * * -9999...-9004 - Vendor-specific error codes. 1107 * * Additional negative values - Function-specific error. 1108 * * Additional positive values - Function-specific success. 1109 */ 1110 int rtas_call(int token, int nargs, int nret, int *outputs, ...) 1111 { 1112 struct pin_cookie cookie; 1113 va_list list; 1114 int i; 1115 unsigned long flags; 1116 struct rtas_args *args; 1117 char *buff_copy = NULL; 1118 int ret; 1119 1120 if (!rtas.entry || token == RTAS_UNKNOWN_SERVICE) 1121 return -1; 1122 1123 if (token_is_restricted_errinjct(token)) { 1124 /* 1125 * It would be nicer to not discard the error value 1126 * from security_locked_down(), but callers expect an 1127 * RTAS status, not an errno. 1128 */ 1129 if (security_locked_down(LOCKDOWN_RTAS_ERROR_INJECTION)) 1130 return -1; 1131 } 1132 1133 if ((mfmsr() & (MSR_IR|MSR_DR)) != (MSR_IR|MSR_DR)) { 1134 WARN_ON_ONCE(1); 1135 return -1; 1136 } 1137 1138 raw_spin_lock_irqsave(&rtas_lock, flags); 1139 cookie = lockdep_pin_lock(&rtas_lock); 1140 1141 /* We use the global rtas args buffer */ 1142 args = &rtas_args; 1143 1144 va_start(list, outputs); 1145 va_rtas_call_unlocked(args, token, nargs, nret, list); 1146 va_end(list); 1147 1148 /* A -1 return code indicates that the last command couldn't 1149 be completed due to a hardware error. */ 1150 if (be32_to_cpu(args->rets[0]) == -1) 1151 buff_copy = __fetch_rtas_last_error(NULL); 1152 1153 if (nret > 1 && outputs != NULL) 1154 for (i = 0; i < nret-1; ++i) 1155 outputs[i] = be32_to_cpu(args->rets[i + 1]); 1156 ret = (nret > 0) ? be32_to_cpu(args->rets[0]) : 0; 1157 1158 lockdep_unpin_lock(&rtas_lock, cookie); 1159 raw_spin_unlock_irqrestore(&rtas_lock, flags); 1160 1161 if (buff_copy) { 1162 log_error(buff_copy, ERR_TYPE_RTAS_LOG, 0); 1163 if (slab_is_available()) 1164 kfree(buff_copy); 1165 } 1166 return ret; 1167 } 1168 EXPORT_SYMBOL_GPL(rtas_call); 1169 1170 /** 1171 * rtas_busy_delay_time() - From an RTAS status value, calculate the 1172 * suggested delay time in milliseconds. 1173 * 1174 * @status: a value returned from rtas_call() or similar APIs which return 1175 * the status of a RTAS function call. 1176 * 1177 * Context: Any context. 1178 * 1179 * Return: 1180 * * 100000 - If @status is 9905. 1181 * * 10000 - If @status is 9904. 1182 * * 1000 - If @status is 9903. 1183 * * 100 - If @status is 9902. 1184 * * 10 - If @status is 9901. 1185 * * 1 - If @status is either 9900 or -2. This is "wrong" for -2, but 1186 * some callers depend on this behavior, and the worst outcome 1187 * is that they will delay for longer than necessary. 1188 * * 0 - If @status is not a busy or extended delay value. 1189 */ 1190 unsigned int rtas_busy_delay_time(int status) 1191 { 1192 int order; 1193 unsigned int ms = 0; 1194 1195 if (status == RTAS_BUSY) { 1196 ms = 1; 1197 } else if (status >= RTAS_EXTENDED_DELAY_MIN && 1198 status <= RTAS_EXTENDED_DELAY_MAX) { 1199 order = status - RTAS_EXTENDED_DELAY_MIN; 1200 for (ms = 1; order > 0; order--) 1201 ms *= 10; 1202 } 1203 1204 return ms; 1205 } 1206 1207 /* 1208 * Early boot fallback for rtas_busy_delay(). 1209 */ 1210 static bool __init rtas_busy_delay_early(int status) 1211 { 1212 static size_t successive_ext_delays __initdata; 1213 bool retry; 1214 1215 switch (status) { 1216 case RTAS_EXTENDED_DELAY_MIN...RTAS_EXTENDED_DELAY_MAX: 1217 /* 1218 * In the unlikely case that we receive an extended 1219 * delay status in early boot, the OS is probably not 1220 * the cause, and there's nothing we can do to clear 1221 * the condition. Best we can do is delay for a bit 1222 * and hope it's transient. Lie to the caller if it 1223 * seems like we're stuck in a retry loop. 1224 */ 1225 mdelay(1); 1226 retry = true; 1227 successive_ext_delays += 1; 1228 if (successive_ext_delays > 1000) { 1229 pr_err("too many extended delays, giving up\n"); 1230 dump_stack(); 1231 retry = false; 1232 successive_ext_delays = 0; 1233 } 1234 break; 1235 case RTAS_BUSY: 1236 retry = true; 1237 successive_ext_delays = 0; 1238 break; 1239 default: 1240 retry = false; 1241 successive_ext_delays = 0; 1242 break; 1243 } 1244 1245 return retry; 1246 } 1247 1248 /** 1249 * rtas_busy_delay() - helper for RTAS busy and extended delay statuses 1250 * 1251 * @status: a value returned from rtas_call() or similar APIs which return 1252 * the status of a RTAS function call. 1253 * 1254 * Context: Process context. May sleep or schedule. 1255 * 1256 * Return: 1257 * * true - @status is RTAS_BUSY or an extended delay hint. The 1258 * caller may assume that the CPU has been yielded if necessary, 1259 * and that an appropriate delay for @status has elapsed. 1260 * Generally the caller should reattempt the RTAS call which 1261 * yielded @status. 1262 * 1263 * * false - @status is not @RTAS_BUSY nor an extended delay hint. The 1264 * caller is responsible for handling @status. 1265 */ 1266 bool __ref rtas_busy_delay(int status) 1267 { 1268 unsigned int ms; 1269 bool ret; 1270 1271 /* 1272 * Can't do timed sleeps before timekeeping is up. 1273 */ 1274 if (system_state < SYSTEM_SCHEDULING) 1275 return rtas_busy_delay_early(status); 1276 1277 switch (status) { 1278 case RTAS_EXTENDED_DELAY_MIN...RTAS_EXTENDED_DELAY_MAX: 1279 ret = true; 1280 ms = rtas_busy_delay_time(status); 1281 /* 1282 * The extended delay hint can be as high as 100 seconds. 1283 * Surely any function returning such a status is either 1284 * buggy or isn't going to be significantly slowed by us 1285 * polling at 1HZ. Clamp the sleep time to one second. 1286 */ 1287 ms = clamp(ms, 1U, 1000U); 1288 /* 1289 * The delay hint is an order-of-magnitude suggestion, not 1290 * a minimum. It is fine, possibly even advantageous, for 1291 * us to pause for less time than hinted. For small values, 1292 * use usleep_range() to ensure we don't sleep much longer 1293 * than actually needed. 1294 * 1295 * See Documentation/timers/timers-howto.rst for 1296 * explanation of the threshold used here. In effect we use 1297 * usleep_range() for 9900 and 9901, msleep() for 1298 * 9902-9905. 1299 */ 1300 if (ms <= 20) 1301 usleep_range(ms * 100, ms * 1000); 1302 else 1303 msleep(ms); 1304 break; 1305 case RTAS_BUSY: 1306 ret = true; 1307 /* 1308 * We should call again immediately if there's no other 1309 * work to do. 1310 */ 1311 cond_resched(); 1312 break; 1313 default: 1314 ret = false; 1315 /* 1316 * Not a busy or extended delay status; the caller should 1317 * handle @status itself. Ensure we warn on misuses in 1318 * atomic context regardless. 1319 */ 1320 might_sleep(); 1321 break; 1322 } 1323 1324 return ret; 1325 } 1326 EXPORT_SYMBOL_GPL(rtas_busy_delay); 1327 1328 int rtas_error_rc(int rtas_rc) 1329 { 1330 int rc; 1331 1332 switch (rtas_rc) { 1333 case RTAS_HARDWARE_ERROR: /* Hardware Error */ 1334 rc = -EIO; 1335 break; 1336 case RTAS_INVALID_PARAMETER: /* Bad indicator/domain/etc */ 1337 rc = -EINVAL; 1338 break; 1339 case -9000: /* Isolation error */ 1340 rc = -EFAULT; 1341 break; 1342 case -9001: /* Outstanding TCE/PTE */ 1343 rc = -EEXIST; 1344 break; 1345 case -9002: /* No usable slot */ 1346 rc = -ENODEV; 1347 break; 1348 default: 1349 pr_err("%s: unexpected error %d\n", __func__, rtas_rc); 1350 rc = -ERANGE; 1351 break; 1352 } 1353 return rc; 1354 } 1355 EXPORT_SYMBOL_GPL(rtas_error_rc); 1356 1357 int rtas_get_power_level(int powerdomain, int *level) 1358 { 1359 int token = rtas_function_token(RTAS_FN_GET_POWER_LEVEL); 1360 int rc; 1361 1362 if (token == RTAS_UNKNOWN_SERVICE) 1363 return -ENOENT; 1364 1365 while ((rc = rtas_call(token, 1, 2, level, powerdomain)) == RTAS_BUSY) 1366 udelay(1); 1367 1368 if (rc < 0) 1369 return rtas_error_rc(rc); 1370 return rc; 1371 } 1372 EXPORT_SYMBOL_GPL(rtas_get_power_level); 1373 1374 int rtas_set_power_level(int powerdomain, int level, int *setlevel) 1375 { 1376 int token = rtas_function_token(RTAS_FN_SET_POWER_LEVEL); 1377 int rc; 1378 1379 if (token == RTAS_UNKNOWN_SERVICE) 1380 return -ENOENT; 1381 1382 do { 1383 rc = rtas_call(token, 2, 2, setlevel, powerdomain, level); 1384 } while (rtas_busy_delay(rc)); 1385 1386 if (rc < 0) 1387 return rtas_error_rc(rc); 1388 return rc; 1389 } 1390 EXPORT_SYMBOL_GPL(rtas_set_power_level); 1391 1392 int rtas_get_sensor(int sensor, int index, int *state) 1393 { 1394 int token = rtas_function_token(RTAS_FN_GET_SENSOR_STATE); 1395 int rc; 1396 1397 if (token == RTAS_UNKNOWN_SERVICE) 1398 return -ENOENT; 1399 1400 do { 1401 rc = rtas_call(token, 2, 2, state, sensor, index); 1402 } while (rtas_busy_delay(rc)); 1403 1404 if (rc < 0) 1405 return rtas_error_rc(rc); 1406 return rc; 1407 } 1408 EXPORT_SYMBOL_GPL(rtas_get_sensor); 1409 1410 int rtas_get_sensor_fast(int sensor, int index, int *state) 1411 { 1412 int token = rtas_function_token(RTAS_FN_GET_SENSOR_STATE); 1413 int rc; 1414 1415 if (token == RTAS_UNKNOWN_SERVICE) 1416 return -ENOENT; 1417 1418 rc = rtas_call(token, 2, 2, state, sensor, index); 1419 WARN_ON(rc == RTAS_BUSY || (rc >= RTAS_EXTENDED_DELAY_MIN && 1420 rc <= RTAS_EXTENDED_DELAY_MAX)); 1421 1422 if (rc < 0) 1423 return rtas_error_rc(rc); 1424 return rc; 1425 } 1426 1427 bool rtas_indicator_present(int token, int *maxindex) 1428 { 1429 int proplen, count, i; 1430 const struct indicator_elem { 1431 __be32 token; 1432 __be32 maxindex; 1433 } *indicators; 1434 1435 indicators = of_get_property(rtas.dev, "rtas-indicators", &proplen); 1436 if (!indicators) 1437 return false; 1438 1439 count = proplen / sizeof(struct indicator_elem); 1440 1441 for (i = 0; i < count; i++) { 1442 if (__be32_to_cpu(indicators[i].token) != token) 1443 continue; 1444 if (maxindex) 1445 *maxindex = __be32_to_cpu(indicators[i].maxindex); 1446 return true; 1447 } 1448 1449 return false; 1450 } 1451 1452 int rtas_set_indicator(int indicator, int index, int new_value) 1453 { 1454 int token = rtas_function_token(RTAS_FN_SET_INDICATOR); 1455 int rc; 1456 1457 if (token == RTAS_UNKNOWN_SERVICE) 1458 return -ENOENT; 1459 1460 do { 1461 rc = rtas_call(token, 3, 1, NULL, indicator, index, new_value); 1462 } while (rtas_busy_delay(rc)); 1463 1464 if (rc < 0) 1465 return rtas_error_rc(rc); 1466 return rc; 1467 } 1468 EXPORT_SYMBOL_GPL(rtas_set_indicator); 1469 1470 /* 1471 * Ignoring RTAS extended delay 1472 */ 1473 int rtas_set_indicator_fast(int indicator, int index, int new_value) 1474 { 1475 int token = rtas_function_token(RTAS_FN_SET_INDICATOR); 1476 int rc; 1477 1478 if (token == RTAS_UNKNOWN_SERVICE) 1479 return -ENOENT; 1480 1481 rc = rtas_call(token, 3, 1, NULL, indicator, index, new_value); 1482 1483 WARN_ON(rc == RTAS_BUSY || (rc >= RTAS_EXTENDED_DELAY_MIN && 1484 rc <= RTAS_EXTENDED_DELAY_MAX)); 1485 1486 if (rc < 0) 1487 return rtas_error_rc(rc); 1488 1489 return rc; 1490 } 1491 1492 /** 1493 * rtas_ibm_suspend_me() - Call ibm,suspend-me to suspend the LPAR. 1494 * 1495 * @fw_status: RTAS call status will be placed here if not NULL. 1496 * 1497 * rtas_ibm_suspend_me() should be called only on a CPU which has 1498 * received H_CONTINUE from the H_JOIN hcall. All other active CPUs 1499 * should be waiting to return from H_JOIN. 1500 * 1501 * rtas_ibm_suspend_me() may suspend execution of the OS 1502 * indefinitely. Callers should take appropriate measures upon return, such as 1503 * resetting watchdog facilities. 1504 * 1505 * Callers may choose to retry this call if @fw_status is 1506 * %RTAS_THREADS_ACTIVE. 1507 * 1508 * Return: 1509 * 0 - The partition has resumed from suspend, possibly after 1510 * migration to a different host. 1511 * -ECANCELED - The operation was aborted. 1512 * -EAGAIN - There were other CPUs not in H_JOIN at the time of the call. 1513 * -EBUSY - Some other condition prevented the suspend from succeeding. 1514 * -EIO - Hardware/platform error. 1515 */ 1516 int rtas_ibm_suspend_me(int *fw_status) 1517 { 1518 int token = rtas_function_token(RTAS_FN_IBM_SUSPEND_ME); 1519 int fwrc; 1520 int ret; 1521 1522 fwrc = rtas_call(token, 0, 1, NULL); 1523 1524 switch (fwrc) { 1525 case 0: 1526 ret = 0; 1527 break; 1528 case RTAS_SUSPEND_ABORTED: 1529 ret = -ECANCELED; 1530 break; 1531 case RTAS_THREADS_ACTIVE: 1532 ret = -EAGAIN; 1533 break; 1534 case RTAS_NOT_SUSPENDABLE: 1535 case RTAS_OUTSTANDING_COPROC: 1536 ret = -EBUSY; 1537 break; 1538 case -1: 1539 default: 1540 ret = -EIO; 1541 break; 1542 } 1543 1544 if (fw_status) 1545 *fw_status = fwrc; 1546 1547 return ret; 1548 } 1549 1550 void __noreturn rtas_restart(char *cmd) 1551 { 1552 if (rtas_flash_term_hook) 1553 rtas_flash_term_hook(SYS_RESTART); 1554 pr_emerg("system-reboot returned %d\n", 1555 rtas_call(rtas_function_token(RTAS_FN_SYSTEM_REBOOT), 0, 1, NULL)); 1556 for (;;); 1557 } 1558 1559 void rtas_power_off(void) 1560 { 1561 if (rtas_flash_term_hook) 1562 rtas_flash_term_hook(SYS_POWER_OFF); 1563 /* allow power on only with power button press */ 1564 pr_emerg("power-off returned %d\n", 1565 rtas_call(rtas_function_token(RTAS_FN_POWER_OFF), 2, 1, NULL, -1, -1)); 1566 for (;;); 1567 } 1568 1569 void __noreturn rtas_halt(void) 1570 { 1571 if (rtas_flash_term_hook) 1572 rtas_flash_term_hook(SYS_HALT); 1573 /* allow power on only with power button press */ 1574 pr_emerg("power-off returned %d\n", 1575 rtas_call(rtas_function_token(RTAS_FN_POWER_OFF), 2, 1, NULL, -1, -1)); 1576 for (;;); 1577 } 1578 1579 /* Must be in the RMO region, so we place it here */ 1580 static char rtas_os_term_buf[2048]; 1581 static bool ibm_extended_os_term; 1582 1583 void rtas_os_term(char *str) 1584 { 1585 s32 token = rtas_function_token(RTAS_FN_IBM_OS_TERM); 1586 static struct rtas_args args; 1587 int status; 1588 1589 /* 1590 * Firmware with the ibm,extended-os-term property is guaranteed 1591 * to always return from an ibm,os-term call. Earlier versions without 1592 * this property may terminate the partition which we want to avoid 1593 * since it interferes with panic_timeout. 1594 */ 1595 1596 if (token == RTAS_UNKNOWN_SERVICE || !ibm_extended_os_term) 1597 return; 1598 1599 snprintf(rtas_os_term_buf, 2048, "OS panic: %s", str); 1600 1601 /* 1602 * Keep calling as long as RTAS returns a "try again" status, 1603 * but don't use rtas_busy_delay(), which potentially 1604 * schedules. 1605 */ 1606 do { 1607 rtas_call_unlocked(&args, token, 1, 1, NULL, __pa(rtas_os_term_buf)); 1608 status = be32_to_cpu(args.rets[0]); 1609 } while (rtas_busy_delay_time(status)); 1610 1611 if (status != 0) 1612 pr_emerg("ibm,os-term call failed %d\n", status); 1613 } 1614 1615 /** 1616 * rtas_activate_firmware() - Activate a new version of firmware. 1617 * 1618 * Context: This function may sleep. 1619 * 1620 * Activate a new version of partition firmware. The OS must call this 1621 * after resuming from a partition hibernation or migration in order 1622 * to maintain the ability to perform live firmware updates. It's not 1623 * catastrophic for this method to be absent or to fail; just log the 1624 * condition in that case. 1625 */ 1626 void rtas_activate_firmware(void) 1627 { 1628 int token = rtas_function_token(RTAS_FN_IBM_ACTIVATE_FIRMWARE); 1629 int fwrc; 1630 1631 if (token == RTAS_UNKNOWN_SERVICE) { 1632 pr_notice("ibm,activate-firmware method unavailable\n"); 1633 return; 1634 } 1635 1636 do { 1637 fwrc = rtas_call(token, 0, 1, NULL); 1638 } while (rtas_busy_delay(fwrc)); 1639 1640 if (fwrc) 1641 pr_err("ibm,activate-firmware failed (%i)\n", fwrc); 1642 } 1643 1644 /** 1645 * get_pseries_errorlog() - Find a specific pseries error log in an RTAS 1646 * extended event log. 1647 * @log: RTAS error/event log 1648 * @section_id: two character section identifier 1649 * 1650 * Return: A pointer to the specified errorlog or NULL if not found. 1651 */ 1652 noinstr struct pseries_errorlog *get_pseries_errorlog(struct rtas_error_log *log, 1653 uint16_t section_id) 1654 { 1655 struct rtas_ext_event_log_v6 *ext_log = 1656 (struct rtas_ext_event_log_v6 *)log->buffer; 1657 struct pseries_errorlog *sect; 1658 unsigned char *p, *log_end; 1659 uint32_t ext_log_length = rtas_error_extended_log_length(log); 1660 uint8_t log_format = rtas_ext_event_log_format(ext_log); 1661 uint32_t company_id = rtas_ext_event_company_id(ext_log); 1662 1663 /* Check that we understand the format */ 1664 if (ext_log_length < sizeof(struct rtas_ext_event_log_v6) || 1665 log_format != RTAS_V6EXT_LOG_FORMAT_EVENT_LOG || 1666 company_id != RTAS_V6EXT_COMPANY_ID_IBM) 1667 return NULL; 1668 1669 log_end = log->buffer + ext_log_length; 1670 p = ext_log->vendor_log; 1671 1672 while (p < log_end) { 1673 sect = (struct pseries_errorlog *)p; 1674 if (pseries_errorlog_id(sect) == section_id) 1675 return sect; 1676 p += pseries_errorlog_length(sect); 1677 } 1678 1679 return NULL; 1680 } 1681 1682 /* 1683 * The sys_rtas syscall, as originally designed, allows root to pass 1684 * arbitrary physical addresses to RTAS calls. A number of RTAS calls 1685 * can be abused to write to arbitrary memory and do other things that 1686 * are potentially harmful to system integrity, and thus should only 1687 * be used inside the kernel and not exposed to userspace. 1688 * 1689 * All known legitimate users of the sys_rtas syscall will only ever 1690 * pass addresses that fall within the RMO buffer, and use a known 1691 * subset of RTAS calls. 1692 * 1693 * Accordingly, we filter RTAS requests to check that the call is 1694 * permitted, and that provided pointers fall within the RMO buffer. 1695 * If a function is allowed to be invoked via the syscall, then its 1696 * entry in the rtas_functions table points to a rtas_filter that 1697 * describes its constraints, with the indexes of the parameters which 1698 * are expected to contain addresses and sizes of buffers allocated 1699 * inside the RMO buffer. 1700 */ 1701 1702 static bool in_rmo_buf(u32 base, u32 end) 1703 { 1704 return base >= rtas_rmo_buf && 1705 base < (rtas_rmo_buf + RTAS_USER_REGION_SIZE) && 1706 base <= end && 1707 end >= rtas_rmo_buf && 1708 end < (rtas_rmo_buf + RTAS_USER_REGION_SIZE); 1709 } 1710 1711 static bool block_rtas_call(int token, int nargs, 1712 struct rtas_args *args) 1713 { 1714 const struct rtas_function *func; 1715 const struct rtas_filter *f; 1716 const bool is_platform_dump = token == rtas_function_token(RTAS_FN_IBM_PLATFORM_DUMP); 1717 const bool is_config_conn = token == rtas_function_token(RTAS_FN_IBM_CONFIGURE_CONNECTOR); 1718 u32 base, size, end; 1719 1720 /* 1721 * If this token doesn't correspond to a function the kernel 1722 * understands, you're not allowed to call it. 1723 */ 1724 func = rtas_token_to_function(token); 1725 if (!func) 1726 goto err; 1727 /* 1728 * And only functions with filters attached are allowed. 1729 */ 1730 f = func->filter; 1731 if (!f) 1732 goto err; 1733 /* 1734 * And some functions aren't allowed on LE. 1735 */ 1736 if (IS_ENABLED(CONFIG_CPU_LITTLE_ENDIAN) && func->banned_for_syscall_on_le) 1737 goto err; 1738 1739 if (f->buf_idx1 != -1) { 1740 base = be32_to_cpu(args->args[f->buf_idx1]); 1741 if (f->size_idx1 != -1) 1742 size = be32_to_cpu(args->args[f->size_idx1]); 1743 else if (f->fixed_size) 1744 size = f->fixed_size; 1745 else 1746 size = 1; 1747 1748 end = base + size - 1; 1749 1750 /* 1751 * Special case for ibm,platform-dump - NULL buffer 1752 * address is used to indicate end of dump processing 1753 */ 1754 if (is_platform_dump && base == 0) 1755 return false; 1756 1757 if (!in_rmo_buf(base, end)) 1758 goto err; 1759 } 1760 1761 if (f->buf_idx2 != -1) { 1762 base = be32_to_cpu(args->args[f->buf_idx2]); 1763 if (f->size_idx2 != -1) 1764 size = be32_to_cpu(args->args[f->size_idx2]); 1765 else if (f->fixed_size) 1766 size = f->fixed_size; 1767 else 1768 size = 1; 1769 end = base + size - 1; 1770 1771 /* 1772 * Special case for ibm,configure-connector where the 1773 * address can be 0 1774 */ 1775 if (is_config_conn && base == 0) 1776 return false; 1777 1778 if (!in_rmo_buf(base, end)) 1779 goto err; 1780 } 1781 1782 return false; 1783 err: 1784 pr_err_ratelimited("sys_rtas: RTAS call blocked - exploit attempt?\n"); 1785 pr_err_ratelimited("sys_rtas: token=0x%x, nargs=%d (called by %s)\n", 1786 token, nargs, current->comm); 1787 return true; 1788 } 1789 1790 /* We assume to be passed big endian arguments */ 1791 SYSCALL_DEFINE1(rtas, struct rtas_args __user *, uargs) 1792 { 1793 struct pin_cookie cookie; 1794 struct rtas_args args; 1795 unsigned long flags; 1796 char *buff_copy, *errbuf = NULL; 1797 int nargs, nret, token; 1798 1799 if (!capable(CAP_SYS_ADMIN)) 1800 return -EPERM; 1801 1802 if (!rtas.entry) 1803 return -EINVAL; 1804 1805 if (copy_from_user(&args, uargs, 3 * sizeof(u32)) != 0) 1806 return -EFAULT; 1807 1808 nargs = be32_to_cpu(args.nargs); 1809 nret = be32_to_cpu(args.nret); 1810 token = be32_to_cpu(args.token); 1811 1812 if (nargs >= ARRAY_SIZE(args.args) 1813 || nret > ARRAY_SIZE(args.args) 1814 || nargs + nret > ARRAY_SIZE(args.args)) 1815 return -EINVAL; 1816 1817 /* Copy in args. */ 1818 if (copy_from_user(args.args, uargs->args, 1819 nargs * sizeof(rtas_arg_t)) != 0) 1820 return -EFAULT; 1821 1822 if (token == RTAS_UNKNOWN_SERVICE) 1823 return -EINVAL; 1824 1825 args.rets = &args.args[nargs]; 1826 memset(args.rets, 0, nret * sizeof(rtas_arg_t)); 1827 1828 if (block_rtas_call(token, nargs, &args)) 1829 return -EINVAL; 1830 1831 if (token_is_restricted_errinjct(token)) { 1832 int err; 1833 1834 err = security_locked_down(LOCKDOWN_RTAS_ERROR_INJECTION); 1835 if (err) 1836 return err; 1837 } 1838 1839 /* Need to handle ibm,suspend_me call specially */ 1840 if (token == rtas_function_token(RTAS_FN_IBM_SUSPEND_ME)) { 1841 1842 /* 1843 * rtas_ibm_suspend_me assumes the streamid handle is in cpu 1844 * endian, or at least the hcall within it requires it. 1845 */ 1846 int rc = 0; 1847 u64 handle = ((u64)be32_to_cpu(args.args[0]) << 32) 1848 | be32_to_cpu(args.args[1]); 1849 rc = rtas_syscall_dispatch_ibm_suspend_me(handle); 1850 if (rc == -EAGAIN) 1851 args.rets[0] = cpu_to_be32(RTAS_NOT_SUSPENDABLE); 1852 else if (rc == -EIO) 1853 args.rets[0] = cpu_to_be32(-1); 1854 else if (rc) 1855 return rc; 1856 goto copy_return; 1857 } 1858 1859 buff_copy = get_errorlog_buffer(); 1860 1861 raw_spin_lock_irqsave(&rtas_lock, flags); 1862 cookie = lockdep_pin_lock(&rtas_lock); 1863 1864 rtas_args = args; 1865 do_enter_rtas(&rtas_args); 1866 args = rtas_args; 1867 1868 /* A -1 return code indicates that the last command couldn't 1869 be completed due to a hardware error. */ 1870 if (be32_to_cpu(args.rets[0]) == -1) 1871 errbuf = __fetch_rtas_last_error(buff_copy); 1872 1873 lockdep_unpin_lock(&rtas_lock, cookie); 1874 raw_spin_unlock_irqrestore(&rtas_lock, flags); 1875 1876 if (buff_copy) { 1877 if (errbuf) 1878 log_error(errbuf, ERR_TYPE_RTAS_LOG, 0); 1879 kfree(buff_copy); 1880 } 1881 1882 copy_return: 1883 /* Copy out args. */ 1884 if (copy_to_user(uargs->args + nargs, 1885 args.args + nargs, 1886 nret * sizeof(rtas_arg_t)) != 0) 1887 return -EFAULT; 1888 1889 return 0; 1890 } 1891 1892 static void __init rtas_function_table_init(void) 1893 { 1894 struct property *prop; 1895 1896 for (size_t i = 0; i < ARRAY_SIZE(rtas_function_table); ++i) { 1897 struct rtas_function *curr = &rtas_function_table[i]; 1898 struct rtas_function *prior; 1899 int cmp; 1900 1901 curr->token = RTAS_UNKNOWN_SERVICE; 1902 1903 if (i == 0) 1904 continue; 1905 /* 1906 * Ensure table is sorted correctly for binary search 1907 * on function names. 1908 */ 1909 prior = &rtas_function_table[i - 1]; 1910 1911 cmp = strcmp(prior->name, curr->name); 1912 if (cmp < 0) 1913 continue; 1914 1915 if (cmp == 0) { 1916 pr_err("'%s' has duplicate function table entries\n", 1917 curr->name); 1918 } else { 1919 pr_err("function table unsorted: '%s' wrongly precedes '%s'\n", 1920 prior->name, curr->name); 1921 } 1922 } 1923 1924 for_each_property_of_node(rtas.dev, prop) { 1925 struct rtas_function *func; 1926 1927 if (prop->length != sizeof(u32)) 1928 continue; 1929 1930 func = __rtas_name_to_function(prop->name); 1931 if (!func) 1932 continue; 1933 1934 func->token = be32_to_cpup((__be32 *)prop->value); 1935 1936 pr_debug("function %s has token %u\n", func->name, func->token); 1937 } 1938 } 1939 1940 /* 1941 * Call early during boot, before mem init, to retrieve the RTAS 1942 * information from the device-tree and allocate the RMO buffer for userland 1943 * accesses. 1944 */ 1945 void __init rtas_initialize(void) 1946 { 1947 unsigned long rtas_region = RTAS_INSTANTIATE_MAX; 1948 u32 base, size, entry; 1949 int no_base, no_size, no_entry; 1950 1951 /* Get RTAS dev node and fill up our "rtas" structure with infos 1952 * about it. 1953 */ 1954 rtas.dev = of_find_node_by_name(NULL, "rtas"); 1955 if (!rtas.dev) 1956 return; 1957 1958 no_base = of_property_read_u32(rtas.dev, "linux,rtas-base", &base); 1959 no_size = of_property_read_u32(rtas.dev, "rtas-size", &size); 1960 if (no_base || no_size) { 1961 of_node_put(rtas.dev); 1962 rtas.dev = NULL; 1963 return; 1964 } 1965 1966 rtas.base = base; 1967 rtas.size = size; 1968 no_entry = of_property_read_u32(rtas.dev, "linux,rtas-entry", &entry); 1969 rtas.entry = no_entry ? rtas.base : entry; 1970 1971 init_error_log_max(); 1972 1973 /* Must be called before any function token lookups */ 1974 rtas_function_table_init(); 1975 1976 /* 1977 * Discover this now to avoid a device tree lookup in the 1978 * panic path. 1979 */ 1980 ibm_extended_os_term = of_property_read_bool(rtas.dev, "ibm,extended-os-term"); 1981 1982 /* If RTAS was found, allocate the RMO buffer for it and look for 1983 * the stop-self token if any 1984 */ 1985 #ifdef CONFIG_PPC64 1986 if (firmware_has_feature(FW_FEATURE_LPAR)) 1987 rtas_region = min(ppc64_rma_size, RTAS_INSTANTIATE_MAX); 1988 #endif 1989 rtas_rmo_buf = memblock_phys_alloc_range(RTAS_USER_REGION_SIZE, PAGE_SIZE, 1990 0, rtas_region); 1991 if (!rtas_rmo_buf) 1992 panic("ERROR: RTAS: Failed to allocate %lx bytes below %pa\n", 1993 PAGE_SIZE, &rtas_region); 1994 1995 rtas_work_area_reserve_arena(rtas_region); 1996 } 1997 1998 int __init early_init_dt_scan_rtas(unsigned long node, 1999 const char *uname, int depth, void *data) 2000 { 2001 const u32 *basep, *entryp, *sizep; 2002 2003 if (depth != 1 || strcmp(uname, "rtas") != 0) 2004 return 0; 2005 2006 basep = of_get_flat_dt_prop(node, "linux,rtas-base", NULL); 2007 entryp = of_get_flat_dt_prop(node, "linux,rtas-entry", NULL); 2008 sizep = of_get_flat_dt_prop(node, "rtas-size", NULL); 2009 2010 #ifdef CONFIG_PPC64 2011 /* need this feature to decide the crashkernel offset */ 2012 if (of_get_flat_dt_prop(node, "ibm,hypertas-functions", NULL)) 2013 powerpc_firmware_features |= FW_FEATURE_LPAR; 2014 #endif 2015 2016 if (basep && entryp && sizep) { 2017 rtas.base = *basep; 2018 rtas.entry = *entryp; 2019 rtas.size = *sizep; 2020 } 2021 2022 #ifdef CONFIG_UDBG_RTAS_CONSOLE 2023 basep = of_get_flat_dt_prop(node, "put-term-char", NULL); 2024 if (basep) 2025 rtas_putchar_token = *basep; 2026 2027 basep = of_get_flat_dt_prop(node, "get-term-char", NULL); 2028 if (basep) 2029 rtas_getchar_token = *basep; 2030 2031 if (rtas_putchar_token != RTAS_UNKNOWN_SERVICE && 2032 rtas_getchar_token != RTAS_UNKNOWN_SERVICE) 2033 udbg_init_rtas_console(); 2034 2035 #endif 2036 2037 /* break now */ 2038 return 1; 2039 } 2040 2041 static DEFINE_RAW_SPINLOCK(timebase_lock); 2042 static u64 timebase = 0; 2043 2044 void rtas_give_timebase(void) 2045 { 2046 unsigned long flags; 2047 2048 raw_spin_lock_irqsave(&timebase_lock, flags); 2049 hard_irq_disable(); 2050 rtas_call(rtas_function_token(RTAS_FN_FREEZE_TIME_BASE), 0, 1, NULL); 2051 timebase = get_tb(); 2052 raw_spin_unlock(&timebase_lock); 2053 2054 while (timebase) 2055 barrier(); 2056 rtas_call(rtas_function_token(RTAS_FN_THAW_TIME_BASE), 0, 1, NULL); 2057 local_irq_restore(flags); 2058 } 2059 2060 void rtas_take_timebase(void) 2061 { 2062 while (!timebase) 2063 barrier(); 2064 raw_spin_lock(&timebase_lock); 2065 set_tb(timebase >> 32, timebase & 0xffffffff); 2066 timebase = 0; 2067 raw_spin_unlock(&timebase_lock); 2068 } 2069