efi.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469
  1. /*
  2. * Extensible Firmware Interface
  3. *
  4. * Based on Extensible Firmware Interface Specification version 2.4
  5. *
  6. * Copyright (C) 2013, 2014 Linaro Ltd.
  7. *
  8. * This program is free software; you can redistribute it and/or modify
  9. * it under the terms of the GNU General Public License version 2 as
  10. * published by the Free Software Foundation.
  11. *
  12. */
  13. #include <linux/efi.h>
  14. #include <linux/export.h>
  15. #include <linux/memblock.h>
  16. #include <linux/bootmem.h>
  17. #include <linux/of.h>
  18. #include <linux/of_fdt.h>
  19. #include <linux/sched.h>
  20. #include <linux/slab.h>
  21. #include <asm/cacheflush.h>
  22. #include <asm/efi.h>
  23. #include <asm/tlbflush.h>
  24. #include <asm/mmu_context.h>
  25. struct efi_memory_map memmap;
  26. static efi_runtime_services_t *runtime;
  27. static u64 efi_system_table;
  28. static int uefi_debug __initdata;
  29. static int __init uefi_debug_setup(char *str)
  30. {
  31. uefi_debug = 1;
  32. return 0;
  33. }
  34. early_param("uefi_debug", uefi_debug_setup);
  35. static int __init is_normal_ram(efi_memory_desc_t *md)
  36. {
  37. if (md->attribute & EFI_MEMORY_WB)
  38. return 1;
  39. return 0;
  40. }
  41. static void __init efi_setup_idmap(void)
  42. {
  43. struct memblock_region *r;
  44. efi_memory_desc_t *md;
  45. u64 paddr, npages, size;
  46. for_each_memblock(memory, r)
  47. create_id_mapping(r->base, r->size, 0);
  48. /* map runtime io spaces */
  49. for_each_efi_memory_desc(&memmap, md) {
  50. if (!(md->attribute & EFI_MEMORY_RUNTIME) || is_normal_ram(md))
  51. continue;
  52. paddr = md->phys_addr;
  53. npages = md->num_pages;
  54. memrange_efi_to_native(&paddr, &npages);
  55. size = npages << PAGE_SHIFT;
  56. create_id_mapping(paddr, size, 1);
  57. }
  58. }
  59. static int __init uefi_init(void)
  60. {
  61. efi_char16_t *c16;
  62. char vendor[100] = "unknown";
  63. int i, retval;
  64. efi.systab = early_memremap(efi_system_table,
  65. sizeof(efi_system_table_t));
  66. if (efi.systab == NULL) {
  67. pr_warn("Unable to map EFI system table.\n");
  68. return -ENOMEM;
  69. }
  70. set_bit(EFI_BOOT, &efi.flags);
  71. set_bit(EFI_64BIT, &efi.flags);
  72. /*
  73. * Verify the EFI Table
  74. */
  75. if (efi.systab->hdr.signature != EFI_SYSTEM_TABLE_SIGNATURE) {
  76. pr_err("System table signature incorrect\n");
  77. return -EINVAL;
  78. }
  79. if ((efi.systab->hdr.revision >> 16) < 2)
  80. pr_warn("Warning: EFI system table version %d.%02d, expected 2.00 or greater\n",
  81. efi.systab->hdr.revision >> 16,
  82. efi.systab->hdr.revision & 0xffff);
  83. /* Show what we know for posterity */
  84. c16 = early_memremap(efi.systab->fw_vendor,
  85. sizeof(vendor));
  86. if (c16) {
  87. for (i = 0; i < (int) sizeof(vendor) - 1 && *c16; ++i)
  88. vendor[i] = c16[i];
  89. vendor[i] = '\0';
  90. }
  91. pr_info("EFI v%u.%.02u by %s\n",
  92. efi.systab->hdr.revision >> 16,
  93. efi.systab->hdr.revision & 0xffff, vendor);
  94. retval = efi_config_init(NULL);
  95. if (retval == 0)
  96. set_bit(EFI_CONFIG_TABLES, &efi.flags);
  97. early_memunmap(c16, sizeof(vendor));
  98. early_memunmap(efi.systab, sizeof(efi_system_table_t));
  99. return retval;
  100. }
  101. static __initdata char memory_type_name[][32] = {
  102. {"Reserved"},
  103. {"Loader Code"},
  104. {"Loader Data"},
  105. {"Boot Code"},
  106. {"Boot Data"},
  107. {"Runtime Code"},
  108. {"Runtime Data"},
  109. {"Conventional Memory"},
  110. {"Unusable Memory"},
  111. {"ACPI Reclaim Memory"},
  112. {"ACPI Memory NVS"},
  113. {"Memory Mapped I/O"},
  114. {"MMIO Port Space"},
  115. {"PAL Code"},
  116. };
  117. /*
  118. * Return true for RAM regions we want to permanently reserve.
  119. */
  120. static __init int is_reserve_region(efi_memory_desc_t *md)
  121. {
  122. if (!is_normal_ram(md))
  123. return 0;
  124. if (md->attribute & EFI_MEMORY_RUNTIME)
  125. return 1;
  126. if (md->type == EFI_ACPI_RECLAIM_MEMORY ||
  127. md->type == EFI_RESERVED_TYPE)
  128. return 1;
  129. return 0;
  130. }
  131. static __init void reserve_regions(void)
  132. {
  133. efi_memory_desc_t *md;
  134. u64 paddr, npages, size;
  135. if (uefi_debug)
  136. pr_info("Processing EFI memory map:\n");
  137. for_each_efi_memory_desc(&memmap, md) {
  138. paddr = md->phys_addr;
  139. npages = md->num_pages;
  140. if (uefi_debug)
  141. pr_info(" 0x%012llx-0x%012llx [%s]",
  142. paddr, paddr + (npages << EFI_PAGE_SHIFT) - 1,
  143. memory_type_name[md->type]);
  144. memrange_efi_to_native(&paddr, &npages);
  145. size = npages << PAGE_SHIFT;
  146. if (is_normal_ram(md))
  147. early_init_dt_add_memory_arch(paddr, size);
  148. if (is_reserve_region(md) ||
  149. md->type == EFI_BOOT_SERVICES_CODE ||
  150. md->type == EFI_BOOT_SERVICES_DATA) {
  151. memblock_reserve(paddr, size);
  152. if (uefi_debug)
  153. pr_cont("*");
  154. }
  155. if (uefi_debug)
  156. pr_cont("\n");
  157. }
  158. }
  159. static u64 __init free_one_region(u64 start, u64 end)
  160. {
  161. u64 size = end - start;
  162. if (uefi_debug)
  163. pr_info(" EFI freeing: 0x%012llx-0x%012llx\n", start, end - 1);
  164. free_bootmem_late(start, size);
  165. return size;
  166. }
  167. static u64 __init free_region(u64 start, u64 end)
  168. {
  169. u64 map_start, map_end, total = 0;
  170. if (end <= start)
  171. return total;
  172. map_start = (u64)memmap.phys_map;
  173. map_end = PAGE_ALIGN(map_start + (memmap.map_end - memmap.map));
  174. map_start &= PAGE_MASK;
  175. if (start < map_end && end > map_start) {
  176. /* region overlaps UEFI memmap */
  177. if (start < map_start)
  178. total += free_one_region(start, map_start);
  179. if (map_end < end)
  180. total += free_one_region(map_end, end);
  181. } else
  182. total += free_one_region(start, end);
  183. return total;
  184. }
  185. static void __init free_boot_services(void)
  186. {
  187. u64 total_freed = 0;
  188. u64 keep_end, free_start, free_end;
  189. efi_memory_desc_t *md;
  190. /*
  191. * If kernel uses larger pages than UEFI, we have to be careful
  192. * not to inadvertantly free memory we want to keep if there is
  193. * overlap at the kernel page size alignment. We do not want to
  194. * free is_reserve_region() memory nor the UEFI memmap itself.
  195. *
  196. * The memory map is sorted, so we keep track of the end of
  197. * any previous region we want to keep, remember any region
  198. * we want to free and defer freeing it until we encounter
  199. * the next region we want to keep. This way, before freeing
  200. * it, we can clip it as needed to avoid freeing memory we
  201. * want to keep for UEFI.
  202. */
  203. keep_end = 0;
  204. free_start = 0;
  205. for_each_efi_memory_desc(&memmap, md) {
  206. u64 paddr, npages, size;
  207. if (is_reserve_region(md)) {
  208. /*
  209. * We don't want to free any memory from this region.
  210. */
  211. if (free_start) {
  212. /* adjust free_end then free region */
  213. if (free_end > md->phys_addr)
  214. free_end -= PAGE_SIZE;
  215. total_freed += free_region(free_start, free_end);
  216. free_start = 0;
  217. }
  218. keep_end = md->phys_addr + (md->num_pages << EFI_PAGE_SHIFT);
  219. continue;
  220. }
  221. if (md->type != EFI_BOOT_SERVICES_CODE &&
  222. md->type != EFI_BOOT_SERVICES_DATA) {
  223. /* no need to free this region */
  224. continue;
  225. }
  226. /*
  227. * We want to free memory from this region.
  228. */
  229. paddr = md->phys_addr;
  230. npages = md->num_pages;
  231. memrange_efi_to_native(&paddr, &npages);
  232. size = npages << PAGE_SHIFT;
  233. if (free_start) {
  234. if (paddr <= free_end)
  235. free_end = paddr + size;
  236. else {
  237. total_freed += free_region(free_start, free_end);
  238. free_start = paddr;
  239. free_end = paddr + size;
  240. }
  241. } else {
  242. free_start = paddr;
  243. free_end = paddr + size;
  244. }
  245. if (free_start < keep_end) {
  246. free_start += PAGE_SIZE;
  247. if (free_start >= free_end)
  248. free_start = 0;
  249. }
  250. }
  251. if (free_start)
  252. total_freed += free_region(free_start, free_end);
  253. if (total_freed)
  254. pr_info("Freed 0x%llx bytes of EFI boot services memory",
  255. total_freed);
  256. }
  257. void __init efi_init(void)
  258. {
  259. struct efi_fdt_params params;
  260. /* Grab UEFI information placed in FDT by stub */
  261. if (!efi_get_fdt_params(&params, uefi_debug))
  262. return;
  263. efi_system_table = params.system_table;
  264. memblock_reserve(params.mmap & PAGE_MASK,
  265. PAGE_ALIGN(params.mmap_size + (params.mmap & ~PAGE_MASK)));
  266. memmap.phys_map = (void *)params.mmap;
  267. memmap.map = early_memremap(params.mmap, params.mmap_size);
  268. memmap.map_end = memmap.map + params.mmap_size;
  269. memmap.desc_size = params.desc_size;
  270. memmap.desc_version = params.desc_ver;
  271. if (uefi_init() < 0)
  272. return;
  273. reserve_regions();
  274. }
  275. void __init efi_idmap_init(void)
  276. {
  277. if (!efi_enabled(EFI_BOOT))
  278. return;
  279. /* boot time idmap_pg_dir is incomplete, so fill in missing parts */
  280. efi_setup_idmap();
  281. }
  282. static int __init remap_region(efi_memory_desc_t *md, void **new)
  283. {
  284. u64 paddr, vaddr, npages, size;
  285. paddr = md->phys_addr;
  286. npages = md->num_pages;
  287. memrange_efi_to_native(&paddr, &npages);
  288. size = npages << PAGE_SHIFT;
  289. if (is_normal_ram(md))
  290. vaddr = (__force u64)ioremap_cache(paddr, size);
  291. else
  292. vaddr = (__force u64)ioremap(paddr, size);
  293. if (!vaddr) {
  294. pr_err("Unable to remap 0x%llx pages @ %p\n",
  295. npages, (void *)paddr);
  296. return 0;
  297. }
  298. /* adjust for any rounding when EFI and system pagesize differs */
  299. md->virt_addr = vaddr + (md->phys_addr - paddr);
  300. if (uefi_debug)
  301. pr_info(" EFI remap 0x%012llx => %p\n",
  302. md->phys_addr, (void *)md->virt_addr);
  303. memcpy(*new, md, memmap.desc_size);
  304. *new += memmap.desc_size;
  305. return 1;
  306. }
  307. /*
  308. * Switch UEFI from an identity map to a kernel virtual map
  309. */
  310. static int __init arm64_enter_virtual_mode(void)
  311. {
  312. efi_memory_desc_t *md;
  313. phys_addr_t virtmap_phys;
  314. void *virtmap, *virt_md;
  315. efi_status_t status;
  316. u64 mapsize;
  317. int count = 0;
  318. unsigned long flags;
  319. if (!efi_enabled(EFI_BOOT)) {
  320. pr_info("EFI services will not be available.\n");
  321. return -1;
  322. }
  323. pr_info("Remapping and enabling EFI services.\n");
  324. /* replace early memmap mapping with permanent mapping */
  325. mapsize = memmap.map_end - memmap.map;
  326. early_memunmap(memmap.map, mapsize);
  327. memmap.map = (__force void *)ioremap_cache((phys_addr_t)memmap.phys_map,
  328. mapsize);
  329. memmap.map_end = memmap.map + mapsize;
  330. efi.memmap = &memmap;
  331. /* Map the runtime regions */
  332. virtmap = kmalloc(mapsize, GFP_KERNEL);
  333. if (!virtmap) {
  334. pr_err("Failed to allocate EFI virtual memmap\n");
  335. return -1;
  336. }
  337. virtmap_phys = virt_to_phys(virtmap);
  338. virt_md = virtmap;
  339. for_each_efi_memory_desc(&memmap, md) {
  340. if (!(md->attribute & EFI_MEMORY_RUNTIME))
  341. continue;
  342. if (remap_region(md, &virt_md))
  343. ++count;
  344. }
  345. efi.systab = (__force void *)efi_lookup_mapped_addr(efi_system_table);
  346. if (efi.systab)
  347. set_bit(EFI_SYSTEM_TABLES, &efi.flags);
  348. local_irq_save(flags);
  349. cpu_switch_mm(idmap_pg_dir, &init_mm);
  350. /* Call SetVirtualAddressMap with the physical address of the map */
  351. runtime = efi.systab->runtime;
  352. efi.set_virtual_address_map = runtime->set_virtual_address_map;
  353. status = efi.set_virtual_address_map(count * memmap.desc_size,
  354. memmap.desc_size,
  355. memmap.desc_version,
  356. (efi_memory_desc_t *)virtmap_phys);
  357. cpu_set_reserved_ttbr0();
  358. flush_tlb_all();
  359. local_irq_restore(flags);
  360. kfree(virtmap);
  361. free_boot_services();
  362. if (status != EFI_SUCCESS) {
  363. pr_err("Failed to set EFI virtual address map! [%lx]\n",
  364. status);
  365. return -1;
  366. }
  367. /* Set up runtime services function pointers */
  368. runtime = efi.systab->runtime;
  369. efi.get_time = runtime->get_time;
  370. efi.set_time = runtime->set_time;
  371. efi.get_wakeup_time = runtime->get_wakeup_time;
  372. efi.set_wakeup_time = runtime->set_wakeup_time;
  373. efi.get_variable = runtime->get_variable;
  374. efi.get_next_variable = runtime->get_next_variable;
  375. efi.set_variable = runtime->set_variable;
  376. efi.query_variable_info = runtime->query_variable_info;
  377. efi.update_capsule = runtime->update_capsule;
  378. efi.query_capsule_caps = runtime->query_capsule_caps;
  379. efi.get_next_high_mono_count = runtime->get_next_high_mono_count;
  380. efi.reset_system = runtime->reset_system;
  381. set_bit(EFI_RUNTIME_SERVICES, &efi.flags);
  382. return 0;
  383. }
  384. early_initcall(arm64_enter_virtual_mode);