From: Ard Biesheuvel <ardb+git@google.com>
To: linux-kernel@vger.kernel.org
Cc: linux-efi@vger.kernel.org, x86@kernel.org,
Ard Biesheuvel <ardb@kernel.org>,
"Mike Rapoport (Microsoft)" <rppt@kernel.org>,
Benjamin Herrenschmidt <benh@kernel.crashing.org>
Subject: [PATCH v2 15/19] x86/efi: Use iterator API when mapping EFI regions for runtime
Date: Thu, 19 Mar 2026 10:05:45 +0100 [thread overview]
Message-ID: <20260319090529.1091660-36-ardb+git@google.com> (raw)
In-Reply-To: <20260319090529.1091660-21-ardb+git@google.com>
From: Ard Biesheuvel <ardb@kernel.org>
Use the generic EFI memory map iterators to invoke efi_map_region() on
each entry in the map. x86_64 and i386 traverse the map in opposite
order, so the two cases are handled separately.
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
---
arch/x86/platform/efi/efi.c | 90 +++++---------------
1 file changed, 21 insertions(+), 69 deletions(-)
diff --git a/arch/x86/platform/efi/efi.c b/arch/x86/platform/efi/efi.c
index 44d106879120..8778ad441c42 100644
--- a/arch/x86/platform/efi/efi.c
+++ b/arch/x86/platform/efi/efi.c
@@ -498,73 +498,6 @@ void __init efi_init(void)
efi_print_memmap();
}
-/*
- * Iterate the EFI memory map in reverse order because the regions
- * will be mapped top-down. The end result is the same as if we had
- * mapped things forward, but doesn't require us to change the
- * existing implementation of efi_map_region().
- */
-static inline void *efi_map_next_entry_reverse(void *entry)
-{
- /* Initial call */
- if (!entry)
- return efi_memdesc_ptr(efi.memmap.map, efi.memmap.desc_size,
- efi.memmap.num_valid_entries - 1);
-
- entry -= efi.memmap.desc_size;
- if (entry < efi.memmap.map)
- return NULL;
-
- return entry;
-}
-
-/*
- * efi_map_next_entry - Return the next EFI memory map descriptor
- * @entry: Previous EFI memory map descriptor
- *
- * This is a helper function to iterate over the EFI memory map, which
- * we do in different orders depending on the current configuration.
- *
- * To begin traversing the memory map @entry must be %NULL.
- *
- * Returns %NULL when we reach the end of the memory map.
- */
-static void *efi_map_next_entry(void *entry)
-{
- if (efi_enabled(EFI_64BIT)) {
- /*
- * Starting in UEFI v2.5 the EFI_PROPERTIES_TABLE
- * config table feature requires us to map all entries
- * in the same order as they appear in the EFI memory
- * map. That is to say, entry N must have a lower
- * virtual address than entry N+1. This is because the
- * firmware toolchain leaves relative references in
- * the code/data sections, which are split and become
- * separate EFI memory regions. Mapping things
- * out-of-order leads to the firmware accessing
- * unmapped addresses.
- *
- * Since we need to map things this way whether or not
- * the kernel actually makes use of
- * EFI_PROPERTIES_TABLE, let's just switch to this
- * scheme by default for 64-bit.
- */
- return efi_map_next_entry_reverse(entry);
- }
-
- /* Initial call */
- if (!entry)
- return efi.memmap.map;
-
- entry += efi.memmap.desc_size;
- if (entry >= (void *)efi_memdesc_ptr(efi.memmap.map,
- efi.memmap.desc_size,
- efi.memmap.num_valid_entries))
- return NULL;
-
- return entry;
-}
-
static bool should_map_region(const efi_memory_desc_t *md, int unused)
{
/*
@@ -624,8 +557,27 @@ static void __init efi_map_regions(void)
efi_memmap_filter_entries(should_map_region);
- while ((md = efi_map_next_entry(md)))
- efi_map_region(md);
+ /*
+ * Starting in UEFI v2.5 the EFI_PROPERTIES_TABLE config table feature
+ * requires us to map all entries in the same order as they appear in
+ * the EFI memory map. That is to say, entry N must have a lower
+ * virtual address than entry N+1. This is because the firmware
+ * toolchain leaves relative references in the code/data sections,
+ * which are split and become separate EFI memory regions. Mapping
+ * things out-of-order leads to the firmware accessing unmapped
+ * addresses.
+ *
+ * Since we need to map things this way whether or not the kernel
+ * actually makes use of EFI_PROPERTIES_TABLE, let's just switch to
+ * this scheme by default for 64-bit.
+ */
+ if (efi_enabled(EFI_64BIT)) {
+ for_each_efi_memory_desc_rev(md)
+ efi_map_region(md);
+ } else {
+ for_each_efi_memory_desc(md)
+ efi_map_region(md);
+ }
}
static void __init kexec_enter_virtual_mode(void)
--
2.53.0.851.ga537e3e6e9-goog
next prev parent reply other threads:[~2026-03-19 9:06 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-03-19 9:05 [PATCH v2 00/19] efi/x86: Avoid the need to mangle the EFI memory map Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 01/19] memblock: Permit existing reserved regions to be marked RSRV_KERN Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 02/19] efi: Tag memblock reservations of boot services regions as RSRV_KERN Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 03/19] x86/efi: Unmap kernel-reserved boot regions from EFI page tables Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 04/19] x86/efi: Drop EFI_MEMORY_RUNTIME check from __ioremap_check_other() Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 05/19] x86/efi: Omit RSRV_KERN memblock reservations when freeing boot regions Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 06/19] x86/efi: Defer sub-1M check from unmap to free stage Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 07/19] x86/efi: Simplify real mode trampoline allocation quirk Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 08/19] x86/efi: Omit redundant kernel image overlap check Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 09/19] x86/efi: Drop redundant EFI_PARAVIRT check Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 10/19] x86/efi: Do not rely on EFI_MEMORY_RUNTIME bit and avoid entry splitting Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 11/19] efi: Use nr_map not map_end to find the last valid memory map entry Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 12/19] x86/efi: Only merge EFI memory map entries on 32-bit systems Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 13/19] x86/efi: Clean the memory map using iterator and filter API Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 14/19] x86/efi: Update the runtime map in place Ard Biesheuvel
2026-03-19 9:05 ` Ard Biesheuvel [this message]
2026-03-19 9:05 ` [PATCH v2 16/19] x86/efi: Reuse memory map instead of reallocating it Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 17/19] x86/efi: Defer compaction of the EFI memory map Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 18/19] x86/efi: Do not abuse RUNTIME bit to mark boot regions as reserved Ard Biesheuvel
2026-03-19 9:05 ` [PATCH v2 19/19] x86/efi: Free unused tail of the EFI memory map Ard Biesheuvel
2026-03-24 9:50 ` [PATCH v2 00/19] efi/x86: Avoid the need to mangle " Ard Biesheuvel
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260319090529.1091660-36-ardb+git@google.com \
--to=ardb+git@google.com \
--cc=ardb@kernel.org \
--cc=benh@kernel.crashing.org \
--cc=linux-efi@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=rppt@kernel.org \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.