473 lines
		
	
	
	
		
			11 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			473 lines
		
	
	
	
		
			11 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * Extensible Firmware Interface
 | 
						|
 *
 | 
						|
 * Based on Extensible Firmware Interface Specification version 2.4
 | 
						|
 *
 | 
						|
 * Copyright (C) 2013, 2014 Linaro Ltd.
 | 
						|
 *
 | 
						|
 * This program is free software; you can redistribute it and/or modify
 | 
						|
 * it under the terms of the GNU General Public License version 2 as
 | 
						|
 * published by the Free Software Foundation.
 | 
						|
 *
 | 
						|
 */
 | 
						|
 | 
						|
#include <linux/efi.h>
 | 
						|
#include <linux/export.h>
 | 
						|
#include <linux/memblock.h>
 | 
						|
#include <linux/bootmem.h>
 | 
						|
#include <linux/of.h>
 | 
						|
#include <linux/of_fdt.h>
 | 
						|
#include <linux/sched.h>
 | 
						|
#include <linux/slab.h>
 | 
						|
 | 
						|
#include <asm/cacheflush.h>
 | 
						|
#include <asm/efi.h>
 | 
						|
#include <asm/tlbflush.h>
 | 
						|
#include <asm/mmu_context.h>
 | 
						|
 | 
						|
struct efi_memory_map memmap;
 | 
						|
 | 
						|
static efi_runtime_services_t *runtime;
 | 
						|
 | 
						|
static u64 efi_system_table;
 | 
						|
 | 
						|
static int uefi_debug __initdata;
 | 
						|
static int __init uefi_debug_setup(char *str)
 | 
						|
{
 | 
						|
	uefi_debug = 1;
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
early_param("uefi_debug", uefi_debug_setup);
 | 
						|
 | 
						|
static int __init is_normal_ram(efi_memory_desc_t *md)
 | 
						|
{
 | 
						|
	if (md->attribute & EFI_MEMORY_WB)
 | 
						|
		return 1;
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static void __init efi_setup_idmap(void)
 | 
						|
{
 | 
						|
	struct memblock_region *r;
 | 
						|
	efi_memory_desc_t *md;
 | 
						|
	u64 paddr, npages, size;
 | 
						|
 | 
						|
	for_each_memblock(memory, r)
 | 
						|
		create_id_mapping(r->base, r->size, 0);
 | 
						|
 | 
						|
	/* map runtime io spaces */
 | 
						|
	for_each_efi_memory_desc(&memmap, md) {
 | 
						|
		if (!(md->attribute & EFI_MEMORY_RUNTIME) || is_normal_ram(md))
 | 
						|
			continue;
 | 
						|
		paddr = md->phys_addr;
 | 
						|
		npages = md->num_pages;
 | 
						|
		memrange_efi_to_native(&paddr, &npages);
 | 
						|
		size = npages << PAGE_SHIFT;
 | 
						|
		create_id_mapping(paddr, size, 1);
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
static int __init uefi_init(void)
 | 
						|
{
 | 
						|
	efi_char16_t *c16;
 | 
						|
	char vendor[100] = "unknown";
 | 
						|
	int i, retval;
 | 
						|
 | 
						|
	efi.systab = early_memremap(efi_system_table,
 | 
						|
				    sizeof(efi_system_table_t));
 | 
						|
	if (efi.systab == NULL) {
 | 
						|
		pr_warn("Unable to map EFI system table.\n");
 | 
						|
		return -ENOMEM;
 | 
						|
	}
 | 
						|
 | 
						|
	set_bit(EFI_BOOT, &efi.flags);
 | 
						|
	set_bit(EFI_64BIT, &efi.flags);
 | 
						|
 | 
						|
	/*
 | 
						|
	 * Verify the EFI Table
 | 
						|
	 */
 | 
						|
	if (efi.systab->hdr.signature != EFI_SYSTEM_TABLE_SIGNATURE) {
 | 
						|
		pr_err("System table signature incorrect\n");
 | 
						|
		retval = -EINVAL;
 | 
						|
		goto out;
 | 
						|
	}
 | 
						|
	if ((efi.systab->hdr.revision >> 16) < 2)
 | 
						|
		pr_warn("Warning: EFI system table version %d.%02d, expected 2.00 or greater\n",
 | 
						|
			efi.systab->hdr.revision >> 16,
 | 
						|
			efi.systab->hdr.revision & 0xffff);
 | 
						|
 | 
						|
	/* Show what we know for posterity */
 | 
						|
	c16 = early_memremap(efi.systab->fw_vendor,
 | 
						|
			     sizeof(vendor));
 | 
						|
	if (c16) {
 | 
						|
		for (i = 0; i < (int) sizeof(vendor) - 1 && *c16; ++i)
 | 
						|
			vendor[i] = c16[i];
 | 
						|
		vendor[i] = '\0';
 | 
						|
		early_memunmap(c16, sizeof(vendor));
 | 
						|
	}
 | 
						|
 | 
						|
	pr_info("EFI v%u.%.02u by %s\n",
 | 
						|
		efi.systab->hdr.revision >> 16,
 | 
						|
		efi.systab->hdr.revision & 0xffff, vendor);
 | 
						|
 | 
						|
	retval = efi_config_init(NULL);
 | 
						|
	if (retval == 0)
 | 
						|
		set_bit(EFI_CONFIG_TABLES, &efi.flags);
 | 
						|
 | 
						|
out:
 | 
						|
	early_memunmap(efi.systab,  sizeof(efi_system_table_t));
 | 
						|
	return retval;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Return true for RAM regions we want to permanently reserve.
 | 
						|
 */
 | 
						|
static __init int is_reserve_region(efi_memory_desc_t *md)
 | 
						|
{
 | 
						|
	if (!is_normal_ram(md))
 | 
						|
		return 0;
 | 
						|
 | 
						|
	if (md->attribute & EFI_MEMORY_RUNTIME)
 | 
						|
		return 1;
 | 
						|
 | 
						|
	if (md->type == EFI_ACPI_RECLAIM_MEMORY ||
 | 
						|
	    md->type == EFI_RESERVED_TYPE)
 | 
						|
		return 1;
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static __init void reserve_regions(void)
 | 
						|
{
 | 
						|
	efi_memory_desc_t *md;
 | 
						|
	u64 paddr, npages, size;
 | 
						|
 | 
						|
	if (uefi_debug)
 | 
						|
		pr_info("Processing EFI memory map:\n");
 | 
						|
 | 
						|
	for_each_efi_memory_desc(&memmap, md) {
 | 
						|
		paddr = md->phys_addr;
 | 
						|
		npages = md->num_pages;
 | 
						|
 | 
						|
		if (uefi_debug) {
 | 
						|
			char buf[64];
 | 
						|
 | 
						|
			pr_info("  0x%012llx-0x%012llx %s",
 | 
						|
				paddr, paddr + (npages << EFI_PAGE_SHIFT) - 1,
 | 
						|
				efi_md_typeattr_format(buf, sizeof(buf), md));
 | 
						|
		}
 | 
						|
 | 
						|
		memrange_efi_to_native(&paddr, &npages);
 | 
						|
		size = npages << PAGE_SHIFT;
 | 
						|
 | 
						|
		if (is_normal_ram(md))
 | 
						|
			early_init_dt_add_memory_arch(paddr, size);
 | 
						|
 | 
						|
		if (is_reserve_region(md) ||
 | 
						|
		    md->type == EFI_BOOT_SERVICES_CODE ||
 | 
						|
		    md->type == EFI_BOOT_SERVICES_DATA) {
 | 
						|
			memblock_reserve(paddr, size);
 | 
						|
			if (uefi_debug)
 | 
						|
				pr_cont("*");
 | 
						|
		}
 | 
						|
 | 
						|
		if (uefi_debug)
 | 
						|
			pr_cont("\n");
 | 
						|
	}
 | 
						|
 | 
						|
	set_bit(EFI_MEMMAP, &efi.flags);
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
static u64 __init free_one_region(u64 start, u64 end)
 | 
						|
{
 | 
						|
	u64 size = end - start;
 | 
						|
 | 
						|
	if (uefi_debug)
 | 
						|
		pr_info("  EFI freeing: 0x%012llx-0x%012llx\n",	start, end - 1);
 | 
						|
 | 
						|
	free_bootmem_late(start, size);
 | 
						|
	return size;
 | 
						|
}
 | 
						|
 | 
						|
static u64 __init free_region(u64 start, u64 end)
 | 
						|
{
 | 
						|
	u64 map_start, map_end, total = 0;
 | 
						|
 | 
						|
	if (end <= start)
 | 
						|
		return total;
 | 
						|
 | 
						|
	map_start = (u64)memmap.phys_map;
 | 
						|
	map_end = PAGE_ALIGN(map_start + (memmap.map_end - memmap.map));
 | 
						|
	map_start &= PAGE_MASK;
 | 
						|
 | 
						|
	if (start < map_end && end > map_start) {
 | 
						|
		/* region overlaps UEFI memmap */
 | 
						|
		if (start < map_start)
 | 
						|
			total += free_one_region(start, map_start);
 | 
						|
 | 
						|
		if (map_end < end)
 | 
						|
			total += free_one_region(map_end, end);
 | 
						|
	} else
 | 
						|
		total += free_one_region(start, end);
 | 
						|
 | 
						|
	return total;
 | 
						|
}
 | 
						|
 | 
						|
static void __init free_boot_services(void)
 | 
						|
{
 | 
						|
	u64 total_freed = 0;
 | 
						|
	u64 keep_end, free_start, free_end;
 | 
						|
	efi_memory_desc_t *md;
 | 
						|
 | 
						|
	/*
 | 
						|
	 * If kernel uses larger pages than UEFI, we have to be careful
 | 
						|
	 * not to inadvertantly free memory we want to keep if there is
 | 
						|
	 * overlap at the kernel page size alignment. We do not want to
 | 
						|
	 * free is_reserve_region() memory nor the UEFI memmap itself.
 | 
						|
	 *
 | 
						|
	 * The memory map is sorted, so we keep track of the end of
 | 
						|
	 * any previous region we want to keep, remember any region
 | 
						|
	 * we want to free and defer freeing it until we encounter
 | 
						|
	 * the next region we want to keep. This way, before freeing
 | 
						|
	 * it, we can clip it as needed to avoid freeing memory we
 | 
						|
	 * want to keep for UEFI.
 | 
						|
	 */
 | 
						|
 | 
						|
	keep_end = 0;
 | 
						|
	free_start = 0;
 | 
						|
 | 
						|
	for_each_efi_memory_desc(&memmap, md) {
 | 
						|
		u64 paddr, npages, size;
 | 
						|
 | 
						|
		if (is_reserve_region(md)) {
 | 
						|
			/*
 | 
						|
			 * We don't want to free any memory from this region.
 | 
						|
			 */
 | 
						|
			if (free_start) {
 | 
						|
				/* adjust free_end then free region */
 | 
						|
				if (free_end > md->phys_addr)
 | 
						|
					free_end -= PAGE_SIZE;
 | 
						|
				total_freed += free_region(free_start, free_end);
 | 
						|
				free_start = 0;
 | 
						|
			}
 | 
						|
			keep_end = md->phys_addr + (md->num_pages << EFI_PAGE_SHIFT);
 | 
						|
			continue;
 | 
						|
		}
 | 
						|
 | 
						|
		if (md->type != EFI_BOOT_SERVICES_CODE &&
 | 
						|
		    md->type != EFI_BOOT_SERVICES_DATA) {
 | 
						|
			/* no need to free this region */
 | 
						|
			continue;
 | 
						|
		}
 | 
						|
 | 
						|
		/*
 | 
						|
		 * We want to free memory from this region.
 | 
						|
		 */
 | 
						|
		paddr = md->phys_addr;
 | 
						|
		npages = md->num_pages;
 | 
						|
		memrange_efi_to_native(&paddr, &npages);
 | 
						|
		size = npages << PAGE_SHIFT;
 | 
						|
 | 
						|
		if (free_start) {
 | 
						|
			if (paddr <= free_end)
 | 
						|
				free_end = paddr + size;
 | 
						|
			else {
 | 
						|
				total_freed += free_region(free_start, free_end);
 | 
						|
				free_start = paddr;
 | 
						|
				free_end = paddr + size;
 | 
						|
			}
 | 
						|
		} else {
 | 
						|
			free_start = paddr;
 | 
						|
			free_end = paddr + size;
 | 
						|
		}
 | 
						|
		if (free_start < keep_end) {
 | 
						|
			free_start += PAGE_SIZE;
 | 
						|
			if (free_start >= free_end)
 | 
						|
				free_start = 0;
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if (free_start)
 | 
						|
		total_freed += free_region(free_start, free_end);
 | 
						|
 | 
						|
	if (total_freed)
 | 
						|
		pr_info("Freed 0x%llx bytes of EFI boot services memory",
 | 
						|
			total_freed);
 | 
						|
}
 | 
						|
 | 
						|
void __init efi_init(void)
 | 
						|
{
 | 
						|
	struct efi_fdt_params params;
 | 
						|
 | 
						|
	/* Grab UEFI information placed in FDT by stub */
 | 
						|
	if (!efi_get_fdt_params(¶ms, uefi_debug))
 | 
						|
		return;
 | 
						|
 | 
						|
	efi_system_table = params.system_table;
 | 
						|
 | 
						|
	memblock_reserve(params.mmap & PAGE_MASK,
 | 
						|
			 PAGE_ALIGN(params.mmap_size + (params.mmap & ~PAGE_MASK)));
 | 
						|
	memmap.phys_map = (void *)params.mmap;
 | 
						|
	memmap.map = early_memremap(params.mmap, params.mmap_size);
 | 
						|
	memmap.map_end = memmap.map + params.mmap_size;
 | 
						|
	memmap.desc_size = params.desc_size;
 | 
						|
	memmap.desc_version = params.desc_ver;
 | 
						|
 | 
						|
	if (uefi_init() < 0)
 | 
						|
		return;
 | 
						|
 | 
						|
	reserve_regions();
 | 
						|
}
 | 
						|
 | 
						|
void __init efi_idmap_init(void)
 | 
						|
{
 | 
						|
	if (!efi_enabled(EFI_BOOT))
 | 
						|
		return;
 | 
						|
 | 
						|
	/* boot time idmap_pg_dir is incomplete, so fill in missing parts */
 | 
						|
	efi_setup_idmap();
 | 
						|
}
 | 
						|
 | 
						|
static int __init remap_region(efi_memory_desc_t *md, void **new)
 | 
						|
{
 | 
						|
	u64 paddr, vaddr, npages, size;
 | 
						|
 | 
						|
	paddr = md->phys_addr;
 | 
						|
	npages = md->num_pages;
 | 
						|
	memrange_efi_to_native(&paddr, &npages);
 | 
						|
	size = npages << PAGE_SHIFT;
 | 
						|
 | 
						|
	if (is_normal_ram(md))
 | 
						|
		vaddr = (__force u64)ioremap_cache(paddr, size);
 | 
						|
	else
 | 
						|
		vaddr = (__force u64)ioremap(paddr, size);
 | 
						|
 | 
						|
	if (!vaddr) {
 | 
						|
		pr_err("Unable to remap 0x%llx pages @ %p\n",
 | 
						|
		       npages, (void *)paddr);
 | 
						|
		return 0;
 | 
						|
	}
 | 
						|
 | 
						|
	/* adjust for any rounding when EFI and system pagesize differs */
 | 
						|
	md->virt_addr = vaddr + (md->phys_addr - paddr);
 | 
						|
 | 
						|
	if (uefi_debug)
 | 
						|
		pr_info("  EFI remap 0x%012llx => %p\n",
 | 
						|
			md->phys_addr, (void *)md->virt_addr);
 | 
						|
 | 
						|
	memcpy(*new, md, memmap.desc_size);
 | 
						|
	*new += memmap.desc_size;
 | 
						|
 | 
						|
	return 1;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Switch UEFI from an identity map to a kernel virtual map
 | 
						|
 */
 | 
						|
static int __init arm64_enter_virtual_mode(void)
 | 
						|
{
 | 
						|
	efi_memory_desc_t *md;
 | 
						|
	phys_addr_t virtmap_phys;
 | 
						|
	void *virtmap, *virt_md;
 | 
						|
	efi_status_t status;
 | 
						|
	u64 mapsize;
 | 
						|
	int count = 0;
 | 
						|
	unsigned long flags;
 | 
						|
 | 
						|
	if (!efi_enabled(EFI_BOOT)) {
 | 
						|
		pr_info("EFI services will not be available.\n");
 | 
						|
		return -1;
 | 
						|
	}
 | 
						|
 | 
						|
	mapsize = memmap.map_end - memmap.map;
 | 
						|
	early_memunmap(memmap.map, mapsize);
 | 
						|
 | 
						|
	if (efi_runtime_disabled()) {
 | 
						|
		pr_info("EFI runtime services will be disabled.\n");
 | 
						|
		return -1;
 | 
						|
	}
 | 
						|
 | 
						|
	pr_info("Remapping and enabling EFI services.\n");
 | 
						|
	/* replace early memmap mapping with permanent mapping */
 | 
						|
	memmap.map = (__force void *)ioremap_cache((phys_addr_t)memmap.phys_map,
 | 
						|
						   mapsize);
 | 
						|
	memmap.map_end = memmap.map + mapsize;
 | 
						|
 | 
						|
	efi.memmap = &memmap;
 | 
						|
 | 
						|
	/* Map the runtime regions */
 | 
						|
	virtmap = kmalloc(mapsize, GFP_KERNEL);
 | 
						|
	if (!virtmap) {
 | 
						|
		pr_err("Failed to allocate EFI virtual memmap\n");
 | 
						|
		return -1;
 | 
						|
	}
 | 
						|
	virtmap_phys = virt_to_phys(virtmap);
 | 
						|
	virt_md = virtmap;
 | 
						|
 | 
						|
	for_each_efi_memory_desc(&memmap, md) {
 | 
						|
		if (!(md->attribute & EFI_MEMORY_RUNTIME))
 | 
						|
			continue;
 | 
						|
		if (!remap_region(md, &virt_md))
 | 
						|
			goto err_unmap;
 | 
						|
		++count;
 | 
						|
	}
 | 
						|
 | 
						|
	efi.systab = (__force void *)efi_lookup_mapped_addr(efi_system_table);
 | 
						|
	if (!efi.systab) {
 | 
						|
		/*
 | 
						|
		 * If we have no virtual mapping for the System Table at this
 | 
						|
		 * point, the memory map doesn't cover the physical offset where
 | 
						|
		 * it resides. This means the System Table will be inaccessible
 | 
						|
		 * to Runtime Services themselves once the virtual mapping is
 | 
						|
		 * installed.
 | 
						|
		 */
 | 
						|
		pr_err("Failed to remap EFI System Table -- buggy firmware?\n");
 | 
						|
		goto err_unmap;
 | 
						|
	}
 | 
						|
	set_bit(EFI_SYSTEM_TABLES, &efi.flags);
 | 
						|
 | 
						|
	local_irq_save(flags);
 | 
						|
	cpu_switch_mm(idmap_pg_dir, &init_mm);
 | 
						|
 | 
						|
	/* Call SetVirtualAddressMap with the physical address of the map */
 | 
						|
	runtime = efi.systab->runtime;
 | 
						|
	efi.set_virtual_address_map = runtime->set_virtual_address_map;
 | 
						|
 | 
						|
	status = efi.set_virtual_address_map(count * memmap.desc_size,
 | 
						|
					     memmap.desc_size,
 | 
						|
					     memmap.desc_version,
 | 
						|
					     (efi_memory_desc_t *)virtmap_phys);
 | 
						|
	cpu_set_reserved_ttbr0();
 | 
						|
	flush_tlb_all();
 | 
						|
	local_irq_restore(flags);
 | 
						|
 | 
						|
	kfree(virtmap);
 | 
						|
 | 
						|
	free_boot_services();
 | 
						|
 | 
						|
	if (status != EFI_SUCCESS) {
 | 
						|
		pr_err("Failed to set EFI virtual address map! [%lx]\n",
 | 
						|
			status);
 | 
						|
		return -1;
 | 
						|
	}
 | 
						|
 | 
						|
	/* Set up runtime services function pointers */
 | 
						|
	runtime = efi.systab->runtime;
 | 
						|
	efi_native_runtime_setup();
 | 
						|
	set_bit(EFI_RUNTIME_SERVICES, &efi.flags);
 | 
						|
 | 
						|
	efi.runtime_version = efi.systab->hdr.revision;
 | 
						|
 | 
						|
	return 0;
 | 
						|
 | 
						|
err_unmap:
 | 
						|
	/* unmap all mappings that succeeded: there are 'count' of those */
 | 
						|
	for (virt_md = virtmap; count--; virt_md += memmap.desc_size) {
 | 
						|
		md = virt_md;
 | 
						|
		iounmap((__force void __iomem *)md->virt_addr);
 | 
						|
	}
 | 
						|
	kfree(virtmap);
 | 
						|
	return -1;
 | 
						|
}
 | 
						|
early_initcall(arm64_enter_virtual_mode);
 |