2019-02-02 17:41:15 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0+
|
2015-04-29 06:44:31 +08:00
|
|
|
/*
|
|
|
|
* esrt.c
|
|
|
|
*
|
|
|
|
* This module exports EFI System Resource Table (ESRT) entries into userspace
|
|
|
|
* through the sysfs file system. The ESRT provides a read-only catalog of
|
|
|
|
* system components for which the system accepts firmware upgrades via UEFI's
|
|
|
|
* "Capsule Update" feature. This module allows userland utilities to evaluate
|
|
|
|
* what firmware updates can be applied to this system, and potentially arrange
|
|
|
|
* for those updates to occur.
|
|
|
|
*
|
|
|
|
* Data is currently found below /sys/firmware/efi/esrt/...
|
|
|
|
*/
|
|
|
|
#define pr_fmt(fmt) "esrt: " fmt
|
|
|
|
|
|
|
|
#include <linux/capability.h>
|
|
|
|
#include <linux/device.h>
|
|
|
|
#include <linux/efi.h>
|
|
|
|
#include <linux/init.h>
|
2016-07-12 03:00:45 +08:00
|
|
|
#include <linux/io.h>
|
2015-04-29 06:44:31 +08:00
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <linux/kobject.h>
|
|
|
|
#include <linux/list.h>
|
|
|
|
#include <linux/memblock.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/types.h>
|
|
|
|
|
|
|
|
#include <asm/io.h>
|
|
|
|
#include <asm/early_ioremap.h>
|
|
|
|
|
|
|
|
struct efi_system_resource_entry_v1 {
|
|
|
|
efi_guid_t fw_class;
|
|
|
|
u32 fw_type;
|
|
|
|
u32 fw_version;
|
|
|
|
u32 lowest_supported_fw_version;
|
|
|
|
u32 capsule_flags;
|
|
|
|
u32 last_attempt_version;
|
|
|
|
u32 last_attempt_status;
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* _count and _version are what they seem like. _max is actually just
|
|
|
|
* accounting info for the firmware when creating the table; it should never
|
|
|
|
* have been exposed to us. To wit, the spec says:
|
|
|
|
* The maximum number of resource array entries that can be within the
|
|
|
|
* table without reallocating the table, must not be zero.
|
|
|
|
* Since there's no guidance about what that means in terms of memory layout,
|
|
|
|
* it means nothing to us.
|
|
|
|
*/
|
|
|
|
struct efi_system_resource_table {
|
|
|
|
u32 fw_resource_count;
|
|
|
|
u32 fw_resource_count_max;
|
|
|
|
u64 fw_resource_version;
|
|
|
|
u8 entries[];
|
|
|
|
};
|
|
|
|
|
|
|
|
static phys_addr_t esrt_data;
|
|
|
|
static size_t esrt_data_size;
|
|
|
|
|
|
|
|
static struct efi_system_resource_table *esrt;
|
|
|
|
|
|
|
|
struct esre_entry {
|
|
|
|
union {
|
|
|
|
struct efi_system_resource_entry_v1 *esre1;
|
|
|
|
} esre;
|
|
|
|
|
|
|
|
struct kobject kobj;
|
|
|
|
struct list_head list;
|
|
|
|
};
|
|
|
|
|
|
|
|
/* global list of esre_entry. */
|
|
|
|
static LIST_HEAD(entry_list);
|
|
|
|
|
|
|
|
/* entry attribute */
|
|
|
|
struct esre_attribute {
|
|
|
|
struct attribute attr;
|
|
|
|
ssize_t (*show)(struct esre_entry *entry, char *buf);
|
|
|
|
ssize_t (*store)(struct esre_entry *entry,
|
|
|
|
const char *buf, size_t count);
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct esre_entry *to_entry(struct kobject *kobj)
|
|
|
|
{
|
|
|
|
return container_of(kobj, struct esre_entry, kobj);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct esre_attribute *to_attr(struct attribute *attr)
|
|
|
|
{
|
|
|
|
return container_of(attr, struct esre_attribute, attr);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t esre_attr_show(struct kobject *kobj,
|
|
|
|
struct attribute *_attr, char *buf)
|
|
|
|
{
|
|
|
|
struct esre_entry *entry = to_entry(kobj);
|
|
|
|
struct esre_attribute *attr = to_attr(_attr);
|
|
|
|
|
|
|
|
/* Don't tell normal users what firmware versions we've got... */
|
|
|
|
if (!capable(CAP_SYS_ADMIN))
|
|
|
|
return -EACCES;
|
|
|
|
|
|
|
|
return attr->show(entry, buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct sysfs_ops esre_attr_ops = {
|
|
|
|
.show = esre_attr_show,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Generic ESRT Entry ("ESRE") support. */
|
2017-12-06 17:50:08 +08:00
|
|
|
static ssize_t fw_class_show(struct esre_entry *entry, char *buf)
|
2015-04-29 06:44:31 +08:00
|
|
|
{
|
|
|
|
char *str = buf;
|
|
|
|
|
|
|
|
efi_guid_to_str(&entry->esre.esre1->fw_class, str);
|
|
|
|
str += strlen(str);
|
|
|
|
str += sprintf(str, "\n");
|
|
|
|
|
|
|
|
return str - buf;
|
|
|
|
}
|
|
|
|
|
2017-12-06 17:50:08 +08:00
|
|
|
static struct esre_attribute esre_fw_class = __ATTR_RO_MODE(fw_class, 0400);
|
2015-04-29 06:44:31 +08:00
|
|
|
|
|
|
|
#define esre_attr_decl(name, size, fmt) \
|
2017-12-06 17:50:08 +08:00
|
|
|
static ssize_t name##_show(struct esre_entry *entry, char *buf) \
|
2015-04-29 06:44:31 +08:00
|
|
|
{ \
|
|
|
|
return sprintf(buf, fmt "\n", \
|
|
|
|
le##size##_to_cpu(entry->esre.esre1->name)); \
|
|
|
|
} \
|
|
|
|
\
|
2017-12-06 17:50:08 +08:00
|
|
|
static struct esre_attribute esre_##name = __ATTR_RO_MODE(name, 0400)
|
2015-04-29 06:44:31 +08:00
|
|
|
|
|
|
|
esre_attr_decl(fw_type, 32, "%u");
|
|
|
|
esre_attr_decl(fw_version, 32, "%u");
|
|
|
|
esre_attr_decl(lowest_supported_fw_version, 32, "%u");
|
|
|
|
esre_attr_decl(capsule_flags, 32, "0x%x");
|
|
|
|
esre_attr_decl(last_attempt_version, 32, "%u");
|
|
|
|
esre_attr_decl(last_attempt_status, 32, "%u");
|
|
|
|
|
|
|
|
static struct attribute *esre1_attrs[] = {
|
|
|
|
&esre_fw_class.attr,
|
|
|
|
&esre_fw_type.attr,
|
|
|
|
&esre_fw_version.attr,
|
|
|
|
&esre_lowest_supported_fw_version.attr,
|
|
|
|
&esre_capsule_flags.attr,
|
|
|
|
&esre_last_attempt_version.attr,
|
|
|
|
&esre_last_attempt_status.attr,
|
|
|
|
NULL
|
|
|
|
};
|
|
|
|
static void esre_release(struct kobject *kobj)
|
|
|
|
{
|
|
|
|
struct esre_entry *entry = to_entry(kobj);
|
|
|
|
|
|
|
|
list_del(&entry->list);
|
|
|
|
kfree(entry);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct kobj_type esre1_ktype = {
|
|
|
|
.release = esre_release,
|
|
|
|
.sysfs_ops = &esre_attr_ops,
|
|
|
|
.default_attrs = esre1_attrs,
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
static struct kobject *esrt_kobj;
|
|
|
|
static struct kset *esrt_kset;
|
|
|
|
|
|
|
|
static int esre_create_sysfs_entry(void *esre, int entry_num)
|
|
|
|
{
|
|
|
|
struct esre_entry *entry;
|
|
|
|
|
|
|
|
entry = kzalloc(sizeof(*entry), GFP_KERNEL);
|
|
|
|
if (!entry)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
entry->kobj.kset = esrt_kset;
|
|
|
|
|
|
|
|
if (esrt->fw_resource_version == 1) {
|
2015-04-30 22:49:20 +08:00
|
|
|
int rc = 0;
|
|
|
|
|
2015-04-29 06:44:31 +08:00
|
|
|
entry->esre.esre1 = esre;
|
|
|
|
rc = kobject_init_and_add(&entry->kobj, &esre1_ktype, NULL,
|
2015-11-20 18:30:17 +08:00
|
|
|
"entry%d", entry_num);
|
2015-04-30 22:49:20 +08:00
|
|
|
if (rc) {
|
2020-05-29 02:38:04 +08:00
|
|
|
kobject_put(&entry->kobj);
|
2015-04-30 22:49:20 +08:00
|
|
|
return rc;
|
|
|
|
}
|
2015-04-29 06:44:31 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
list_add_tail(&entry->list, &entry_list);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* support for displaying ESRT fields at the top level */
|
|
|
|
#define esrt_attr_decl(name, size, fmt) \
|
2017-12-06 17:50:08 +08:00
|
|
|
static ssize_t name##_show(struct kobject *kobj, \
|
2015-04-29 06:44:31 +08:00
|
|
|
struct kobj_attribute *attr, char *buf)\
|
|
|
|
{ \
|
|
|
|
return sprintf(buf, fmt "\n", le##size##_to_cpu(esrt->name)); \
|
|
|
|
} \
|
|
|
|
\
|
2017-12-06 17:50:08 +08:00
|
|
|
static struct kobj_attribute esrt_##name = __ATTR_RO_MODE(name, 0400)
|
2015-04-29 06:44:31 +08:00
|
|
|
|
|
|
|
esrt_attr_decl(fw_resource_count, 32, "%u");
|
|
|
|
esrt_attr_decl(fw_resource_count_max, 32, "%u");
|
|
|
|
esrt_attr_decl(fw_resource_version, 64, "%llu");
|
|
|
|
|
|
|
|
static struct attribute *esrt_attrs[] = {
|
|
|
|
&esrt_fw_resource_count.attr,
|
|
|
|
&esrt_fw_resource_count_max.attr,
|
|
|
|
&esrt_fw_resource_version.attr,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
static inline int esrt_table_exists(void)
|
|
|
|
{
|
|
|
|
if (!efi_enabled(EFI_CONFIG_TABLES))
|
|
|
|
return 0;
|
|
|
|
if (efi.esrt == EFI_INVALID_TABLE_ADDR)
|
|
|
|
return 0;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static umode_t esrt_attr_is_visible(struct kobject *kobj,
|
|
|
|
struct attribute *attr, int n)
|
|
|
|
{
|
|
|
|
if (!esrt_table_exists())
|
|
|
|
return 0;
|
|
|
|
return attr->mode;
|
|
|
|
}
|
|
|
|
|
2017-08-19 03:49:47 +08:00
|
|
|
static const struct attribute_group esrt_attr_group = {
|
2015-04-29 06:44:31 +08:00
|
|
|
.attrs = esrt_attrs,
|
|
|
|
.is_visible = esrt_attr_is_visible,
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
2016-03-02 07:08:03 +08:00
|
|
|
* remap the table, validate it, mark it reserved and unmap it.
|
2015-04-29 06:44:31 +08:00
|
|
|
*/
|
|
|
|
void __init efi_esrt_init(void)
|
|
|
|
{
|
|
|
|
void *va;
|
|
|
|
struct efi_system_resource_table tmpesrt;
|
|
|
|
size_t size, max, entry_size, entries_size;
|
|
|
|
efi_memory_desc_t md;
|
|
|
|
int rc;
|
2015-04-30 22:49:20 +08:00
|
|
|
phys_addr_t end;
|
2015-04-29 06:44:31 +08:00
|
|
|
|
2019-11-07 09:43:05 +08:00
|
|
|
if (!efi_enabled(EFI_MEMMAP))
|
|
|
|
return;
|
|
|
|
|
2015-04-29 06:44:31 +08:00
|
|
|
pr_debug("esrt-init: loading.\n");
|
|
|
|
if (!esrt_table_exists())
|
|
|
|
return;
|
|
|
|
|
|
|
|
rc = efi_mem_desc_lookup(efi.esrt, &md);
|
efi: Drop type and attribute checks in efi_mem_desc_lookup()
The current implementation of efi_mem_desc_lookup() includes the
following check on the memory descriptor it returns:
if (!(md->attribute & EFI_MEMORY_RUNTIME) &&
md->type != EFI_BOOT_SERVICES_DATA &&
md->type != EFI_RUNTIME_SERVICES_DATA) {
continue;
}
This means that only EfiBootServicesData or EfiRuntimeServicesData
regions are considered, or any other region type provided that it
has the EFI_MEMORY_RUNTIME attribute set.
Given what the name of the function implies, and the fact that any
physical address can be described in the UEFI memory map only a single
time, it does not make sense to impose this condition in the body of the
loop, but instead, should be imposed by the caller depending on the value
that is returned to it.
Two such callers exist at the moment:
- The BGRT code when running on x86, via efi_mem_reserve() and
efi_arch_mem_reserve(). In this case, the region is already known to
be EfiBootServicesData, and so the check is redundant.
- The ESRT handling code which introduced this function, which calls it
both directly from efi_esrt_init() and again via efi_mem_reserve() and
efi_arch_mem_reserve() [on x86].
So let's move this check into the callers instead. This preserves the
current behavior both for BGRT and ESRT handling, and allows the lookup
routine to be reused by other [upcoming] users that don't have this
limitation.
In the ESRT case, keep the entire condition, so that platforms that
deviate from the UEFI spec and use something other than
EfiBootServicesData for the ESRT table will keep working as before.
For x86's efi_arch_mem_reserve() implementation, limit the type to
EfiBootServicesData, since it is the only type the reservation code
expects to operate on in the first place.
While we're at it, drop the __init annotation so that drivers can use it
as well.
Tested-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Jones <pjones@redhat.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: linux-efi@vger.kernel.org
Link: http://lkml.kernel.org/r/20180711094040.12506-8-ard.biesheuvel@linaro.org
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2018-07-11 17:40:39 +08:00
|
|
|
if (rc < 0 ||
|
|
|
|
(!(md.attribute & EFI_MEMORY_RUNTIME) &&
|
|
|
|
md.type != EFI_BOOT_SERVICES_DATA &&
|
|
|
|
md.type != EFI_RUNTIME_SERVICES_DATA)) {
|
2017-02-08 03:08:23 +08:00
|
|
|
pr_warn("ESRT header is not in the memory map.\n");
|
2015-04-29 06:44:31 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
max = efi_mem_desc_end(&md);
|
|
|
|
if (max < efi.esrt) {
|
|
|
|
pr_err("EFI memory descriptor is invalid. (esrt: %p max: %p)\n",
|
|
|
|
(void *)efi.esrt, (void *)max);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
size = sizeof(*esrt);
|
|
|
|
max -= efi.esrt;
|
|
|
|
|
|
|
|
if (max < size) {
|
2017-01-31 21:21:38 +08:00
|
|
|
pr_err("ESRT header doesn't fit on single memory map entry. (size: %zu max: %zu)\n",
|
2015-04-29 06:44:31 +08:00
|
|
|
size, max);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
va = early_memremap(efi.esrt, size);
|
|
|
|
if (!va) {
|
|
|
|
pr_err("early_memremap(%p, %zu) failed.\n", (void *)efi.esrt,
|
|
|
|
size);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(&tmpesrt, va, sizeof(tmpesrt));
|
2018-03-12 16:44:59 +08:00
|
|
|
early_memunmap(va, size);
|
2015-04-29 06:44:31 +08:00
|
|
|
|
2020-02-24 04:45:57 +08:00
|
|
|
if (tmpesrt.fw_resource_version != 1) {
|
2015-04-29 06:44:31 +08:00
|
|
|
pr_err("Unsupported ESRT version %lld.\n",
|
|
|
|
tmpesrt.fw_resource_version);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-02-24 04:45:57 +08:00
|
|
|
entry_size = sizeof(struct efi_system_resource_entry_v1);
|
2015-04-29 06:44:31 +08:00
|
|
|
if (tmpesrt.fw_resource_count > 0 && max - size < entry_size) {
|
|
|
|
pr_err("ESRT memory map entry can only hold the header. (max: %zu size: %zu)\n",
|
|
|
|
max - size, entry_size);
|
2018-03-12 16:44:59 +08:00
|
|
|
return;
|
2015-04-29 06:44:31 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The format doesn't really give us any boundary to test here,
|
|
|
|
* so I'm making up 128 as the max number of individually updatable
|
|
|
|
* components we support.
|
|
|
|
* 128 should be pretty excessive, but there's still some chance
|
|
|
|
* somebody will do that someday and we'll need to raise this.
|
|
|
|
*/
|
|
|
|
if (tmpesrt.fw_resource_count > 128) {
|
|
|
|
pr_err("ESRT says fw_resource_count has very large value %d.\n",
|
|
|
|
tmpesrt.fw_resource_count);
|
2018-03-12 16:44:59 +08:00
|
|
|
return;
|
2015-04-29 06:44:31 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We know it can't be larger than N * sizeof() here, and N is limited
|
|
|
|
* by the previous test to a small number, so there's no overflow.
|
|
|
|
*/
|
|
|
|
entries_size = tmpesrt.fw_resource_count * entry_size;
|
|
|
|
if (max < size + entries_size) {
|
|
|
|
pr_err("ESRT does not fit on single memory map entry (size: %zu max: %zu)\n",
|
|
|
|
size, max);
|
2018-03-12 16:44:59 +08:00
|
|
|
return;
|
2015-04-29 06:44:31 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
size += entries_size;
|
|
|
|
|
|
|
|
esrt_data = (phys_addr_t)efi.esrt;
|
|
|
|
esrt_data_size = size;
|
|
|
|
|
2015-04-30 22:49:20 +08:00
|
|
|
end = esrt_data + size;
|
|
|
|
pr_info("Reserving ESRT space from %pa to %pa.\n", &esrt_data, &end);
|
2018-07-16 23:25:07 +08:00
|
|
|
if (md.type == EFI_BOOT_SERVICES_DATA)
|
|
|
|
efi_mem_reserve(esrt_data, esrt_data_size);
|
2015-04-29 06:44:31 +08:00
|
|
|
|
|
|
|
pr_debug("esrt-init: loaded.\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __init register_entries(void)
|
|
|
|
{
|
|
|
|
struct efi_system_resource_entry_v1 *v1_entries = (void *)esrt->entries;
|
|
|
|
int i, rc;
|
|
|
|
|
|
|
|
if (!esrt_table_exists())
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
for (i = 0; i < le32_to_cpu(esrt->fw_resource_count); i++) {
|
2015-04-30 22:49:20 +08:00
|
|
|
void *esre = NULL;
|
2015-04-29 06:44:31 +08:00
|
|
|
if (esrt->fw_resource_version == 1) {
|
2015-04-30 22:49:20 +08:00
|
|
|
esre = &v1_entries[i];
|
|
|
|
} else {
|
|
|
|
pr_err("Unsupported ESRT version %lld.\n",
|
|
|
|
esrt->fw_resource_version);
|
|
|
|
return -EINVAL;
|
2015-04-29 06:44:31 +08:00
|
|
|
}
|
2015-04-30 22:49:20 +08:00
|
|
|
|
|
|
|
rc = esre_create_sysfs_entry(esre, i);
|
2015-04-29 06:44:31 +08:00
|
|
|
if (rc < 0) {
|
|
|
|
pr_err("ESRT entry creation failed with error %d.\n",
|
|
|
|
rc);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void cleanup_entry_list(void)
|
|
|
|
{
|
|
|
|
struct esre_entry *entry, *next;
|
|
|
|
|
|
|
|
list_for_each_entry_safe(entry, next, &entry_list, list) {
|
|
|
|
kobject_put(&entry->kobj);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __init esrt_sysfs_init(void)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
|
|
|
|
pr_debug("esrt-sysfs: loading.\n");
|
|
|
|
if (!esrt_data || !esrt_data_size)
|
|
|
|
return -ENOSYS;
|
|
|
|
|
2016-07-12 03:00:45 +08:00
|
|
|
esrt = memremap(esrt_data, esrt_data_size, MEMREMAP_WB);
|
2016-03-02 07:08:03 +08:00
|
|
|
if (!esrt) {
|
2016-07-12 03:00:45 +08:00
|
|
|
pr_err("memremap(%pa, %zu) failed.\n", &esrt_data,
|
2015-04-29 06:44:31 +08:00
|
|
|
esrt_data_size);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
esrt_kobj = kobject_create_and_add("esrt", efi_kobj);
|
|
|
|
if (!esrt_kobj) {
|
|
|
|
pr_err("Firmware table registration failed.\n");
|
|
|
|
error = -ENOMEM;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
error = sysfs_create_group(esrt_kobj, &esrt_attr_group);
|
|
|
|
if (error) {
|
|
|
|
pr_err("Sysfs attribute export failed with error %d.\n",
|
|
|
|
error);
|
|
|
|
goto err_remove_esrt;
|
|
|
|
}
|
|
|
|
|
|
|
|
esrt_kset = kset_create_and_add("entries", NULL, esrt_kobj);
|
|
|
|
if (!esrt_kset) {
|
|
|
|
pr_err("kset creation failed.\n");
|
|
|
|
error = -ENOMEM;
|
|
|
|
goto err_remove_group;
|
|
|
|
}
|
|
|
|
|
|
|
|
error = register_entries();
|
|
|
|
if (error)
|
|
|
|
goto err_cleanup_list;
|
|
|
|
|
|
|
|
pr_debug("esrt-sysfs: loaded.\n");
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
err_cleanup_list:
|
|
|
|
cleanup_entry_list();
|
|
|
|
kset_unregister(esrt_kset);
|
|
|
|
err_remove_group:
|
|
|
|
sysfs_remove_group(esrt_kobj, &esrt_attr_group);
|
|
|
|
err_remove_esrt:
|
|
|
|
kobject_put(esrt_kobj);
|
|
|
|
err:
|
2017-12-06 17:50:09 +08:00
|
|
|
memunmap(esrt);
|
2015-04-29 06:44:31 +08:00
|
|
|
esrt = NULL;
|
|
|
|
return error;
|
|
|
|
}
|
2015-08-26 07:00:48 +08:00
|
|
|
device_initcall(esrt_sysfs_init);
|
2015-04-29 06:44:31 +08:00
|
|
|
|
2015-08-26 07:00:48 +08:00
|
|
|
/*
|
2015-04-29 06:44:31 +08:00
|
|
|
MODULE_AUTHOR("Peter Jones <pjones@redhat.com>");
|
|
|
|
MODULE_DESCRIPTION("EFI System Resource Table support");
|
|
|
|
MODULE_LICENSE("GPL");
|
2015-08-26 07:00:48 +08:00
|
|
|
*/
|