efi: Disable interrupts around EFI calls, not in the epilog/prolog calls
[linux-2.6-block.git] / arch / x86 / platform / efi / efi.c
CommitLineData
5b83683f
HY
1/*
2 * Common EFI (Extensible Firmware Interface) support functions
3 * Based on Extensible Firmware Interface Specification version 1.0
4 *
5 * Copyright (C) 1999 VA Linux Systems
6 * Copyright (C) 1999 Walt Drummond <drummond@valinux.com>
7 * Copyright (C) 1999-2002 Hewlett-Packard Co.
8 * David Mosberger-Tang <davidm@hpl.hp.com>
9 * Stephane Eranian <eranian@hpl.hp.com>
10 * Copyright (C) 2005-2008 Intel Co.
11 * Fenghua Yu <fenghua.yu@intel.com>
12 * Bibo Mao <bibo.mao@intel.com>
13 * Chandramouli Narayanan <mouli@linux.intel.com>
14 * Huang Ying <ying.huang@intel.com>
d2f7cbe7
BP
15 * Copyright (C) 2013 SuSE Labs
16 * Borislav Petkov <bp@suse.de> - runtime services VA mapping
5b83683f
HY
17 *
18 * Copied from efi_32.c to eliminate the duplicated code between EFI
19 * 32/64 support code. --ying 2007-10-26
20 *
21 * All EFI Runtime Services are not implemented yet as EFI only
22 * supports physical mode addressing on SoftSDV. This is to be fixed
23 * in a future version. --drummond 1999-07-20
24 *
25 * Implemented EFI runtime services and virtual mode calls. --davidm
26 *
27 * Goutham Rao: <goutham.rao@intel.com>
28 * Skip non-WB memory and ignore empty memory ranges.
29 */
30
e3cb3f5a
OJ
31#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
32
5b83683f
HY
33#include <linux/kernel.h>
34#include <linux/init.h>
35#include <linux/efi.h>
2223af38 36#include <linux/efi-bgrt.h>
69c60c88 37#include <linux/export.h>
5b83683f 38#include <linux/bootmem.h>
0d01ff25 39#include <linux/slab.h>
a9ce6bc1 40#include <linux/memblock.h>
5b83683f
HY
41#include <linux/spinlock.h>
42#include <linux/uaccess.h>
43#include <linux/time.h>
44#include <linux/io.h>
45#include <linux/reboot.h>
46#include <linux/bcd.h>
47
48#include <asm/setup.h>
49#include <asm/efi.h>
50#include <asm/time.h>
a2172e25
HY
51#include <asm/cacheflush.h>
52#include <asm/tlbflush.h>
7bd867df 53#include <asm/x86_init.h>
3195ef59 54#include <asm/rtc.h>
a5d90c92 55#include <asm/uv/uv.h>
5b83683f 56
f4fccac0 57#define EFI_DEBUG
5b83683f 58
5b83683f
HY
59struct efi_memory_map memmap;
60
ecaea42e 61static struct efi efi_phys __initdata;
5b83683f
HY
62static efi_system_table_t efi_systab __initdata;
63
9b7d2049 64static efi_config_table_type_t arch_tables[] __initdata = {
272686bf
LL
65#ifdef CONFIG_X86_UV
66 {UV_SYSTEM_TABLE_GUID, "UVsystab", &efi.uv_systab},
67#endif
722da9d2 68 {NULL_GUID, NULL, NULL},
272686bf
LL
69};
70
1fec0533 71u64 efi_setup; /* efi setup_data physical address */
926172d4 72
60920685 73static int add_efi_memmap __initdata;
200001eb
PJ
74static int __init setup_add_efi_memmap(char *arg)
75{
76 add_efi_memmap = 1;
77 return 0;
78}
79early_param("add_efi_memmap", setup_add_efi_memmap);
80
5b83683f
HY
81static efi_status_t __init phys_efi_set_virtual_address_map(
82 unsigned long memory_map_size,
83 unsigned long descriptor_size,
84 u32 descriptor_version,
85 efi_memory_desc_t *virtual_map)
86{
87 efi_status_t status;
23a0d4e8 88 unsigned long flags;
5b83683f 89
4e78eb05 90 efi_call_phys_prolog();
23a0d4e8
IM
91
92 /* Disable interrupts around EFI calls: */
93 local_irq_save(flags);
62fa6e69
MF
94 status = efi_call_phys(efi_phys.set_virtual_address_map,
95 memory_map_size, descriptor_size,
96 descriptor_version, virtual_map);
23a0d4e8
IM
97 local_irq_restore(flags);
98
5b83683f 99 efi_call_phys_epilog();
23a0d4e8 100
5b83683f
HY
101 return status;
102}
103
3565184e 104void efi_get_time(struct timespec *now)
5b83683f
HY
105{
106 efi_status_t status;
107 efi_time_t eft;
108 efi_time_cap_t cap;
109
110 status = efi.get_time(&eft, &cap);
111 if (status != EFI_SUCCESS)
e3cb3f5a 112 pr_err("Oops: efitime: can't read time!\n");
5b83683f 113
3565184e
DV
114 now->tv_sec = mktime(eft.year, eft.month, eft.day, eft.hour,
115 eft.minute, eft.second);
116 now->tv_nsec = 0;
5b83683f
HY
117}
118
69c91893
PJ
119/*
120 * Tell the kernel about the EFI memory map. This might include
121 * more than the max 128 entries that can fit in the e820 legacy
122 * (zeropage) memory map.
123 */
124
200001eb 125static void __init do_add_efi_memmap(void)
69c91893
PJ
126{
127 void *p;
128
129 for (p = memmap.map; p < memmap.map_end; p += memmap.desc_size) {
130 efi_memory_desc_t *md = p;
131 unsigned long long start = md->phys_addr;
132 unsigned long long size = md->num_pages << EFI_PAGE_SHIFT;
133 int e820_type;
134
e2a71476
CW
135 switch (md->type) {
136 case EFI_LOADER_CODE:
137 case EFI_LOADER_DATA:
138 case EFI_BOOT_SERVICES_CODE:
139 case EFI_BOOT_SERVICES_DATA:
140 case EFI_CONVENTIONAL_MEMORY:
141 if (md->attribute & EFI_MEMORY_WB)
142 e820_type = E820_RAM;
143 else
144 e820_type = E820_RESERVED;
145 break;
146 case EFI_ACPI_RECLAIM_MEMORY:
147 e820_type = E820_ACPI;
148 break;
149 case EFI_ACPI_MEMORY_NVS:
150 e820_type = E820_NVS;
151 break;
152 case EFI_UNUSABLE_MEMORY:
153 e820_type = E820_UNUSABLE;
154 break;
155 default:
156 /*
157 * EFI_RESERVED_TYPE EFI_RUNTIME_SERVICES_CODE
158 * EFI_RUNTIME_SERVICES_DATA EFI_MEMORY_MAPPED_IO
159 * EFI_MEMORY_MAPPED_IO_PORT_SPACE EFI_PAL_CODE
160 */
69c91893 161 e820_type = E820_RESERVED;
e2a71476
CW
162 break;
163 }
d0be6bde 164 e820_add_region(start, size, e820_type);
69c91893
PJ
165 }
166 sanitize_e820_map(e820.map, ARRAY_SIZE(e820.map), &e820.nr_map);
167}
168
1adbfa35 169int __init efi_memblock_x86_reserve_range(void)
ecacf09f 170{
15b9c359 171 struct efi_info *e = &boot_params.efi_info;
ecacf09f
HY
172 unsigned long pmap;
173
9f27bc54
DK
174 if (efi_enabled(EFI_PARAVIRT))
175 return 0;
176
05486fa7 177#ifdef CONFIG_X86_32
1adbfa35 178 /* Can't handle data above 4GB at this time */
15b9c359 179 if (e->efi_memmap_hi) {
1adbfa35
OJ
180 pr_err("Memory map is above 4GB, disabling EFI.\n");
181 return -EINVAL;
182 }
15b9c359 183 pmap = e->efi_memmap;
05486fa7 184#else
15b9c359 185 pmap = (e->efi_memmap | ((__u64)e->efi_memmap_hi << 32));
ecacf09f 186#endif
15b9c359
BP
187 memmap.phys_map = (void *)pmap;
188 memmap.nr_map = e->efi_memmap_size /
189 e->efi_memdesc_size;
190 memmap.desc_size = e->efi_memdesc_size;
191 memmap.desc_version = e->efi_memdesc_version;
192
24aa0788 193 memblock_reserve(pmap, memmap.nr_map * memmap.desc_size);
1adbfa35 194
258f6fd7
LL
195 efi.memmap = &memmap;
196
1adbfa35 197 return 0;
ecacf09f
HY
198}
199
5b83683f
HY
200static void __init print_efi_memmap(void)
201{
f4fccac0 202#ifdef EFI_DEBUG
5b83683f
HY
203 efi_memory_desc_t *md;
204 void *p;
205 int i;
206
207 for (p = memmap.map, i = 0;
208 p < memmap.map_end;
209 p += memmap.desc_size, i++) {
ace1d121
LE
210 char buf[64];
211
5b83683f 212 md = p;
ace1d121
LE
213 pr_info("mem%02u: %s range=[0x%016llx-0x%016llx) (%lluMB)\n",
214 i, efi_md_typeattr_format(buf, sizeof(buf), md),
215 md->phys_addr,
5b83683f
HY
216 md->phys_addr + (md->num_pages << EFI_PAGE_SHIFT),
217 (md->num_pages >> (20 - EFI_PAGE_SHIFT)));
218 }
5b83683f 219#endif /* EFI_DEBUG */
f4fccac0 220}
5b83683f 221
5189c2a7 222void __init efi_unmap_memmap(void)
78510792 223{
3e909599 224 clear_bit(EFI_MEMMAP, &efi.flags);
78510792 225 if (memmap.map) {
abc93f8e 226 early_memunmap(memmap.map, memmap.nr_map * memmap.desc_size);
78510792
JT
227 memmap.map = NULL;
228 }
229}
230
140bf275 231static int __init efi_systab_init(void *phys)
5b83683f 232{
83e68189 233 if (efi_enabled(EFI_64BIT)) {
1adbfa35 234 efi_system_table_64_t *systab64;
1fec0533 235 struct efi_setup_data *data = NULL;
1adbfa35
OJ
236 u64 tmp = 0;
237
1fec0533
DY
238 if (efi_setup) {
239 data = early_memremap(efi_setup, sizeof(*data));
240 if (!data)
241 return -ENOMEM;
242 }
abc93f8e 243 systab64 = early_memremap((unsigned long)phys,
1adbfa35
OJ
244 sizeof(*systab64));
245 if (systab64 == NULL) {
246 pr_err("Couldn't map the system table!\n");
1fec0533 247 if (data)
abc93f8e 248 early_memunmap(data, sizeof(*data));
1adbfa35
OJ
249 return -ENOMEM;
250 }
251
252 efi_systab.hdr = systab64->hdr;
1fec0533
DY
253 efi_systab.fw_vendor = data ? (unsigned long)data->fw_vendor :
254 systab64->fw_vendor;
255 tmp |= data ? data->fw_vendor : systab64->fw_vendor;
1adbfa35
OJ
256 efi_systab.fw_revision = systab64->fw_revision;
257 efi_systab.con_in_handle = systab64->con_in_handle;
258 tmp |= systab64->con_in_handle;
259 efi_systab.con_in = systab64->con_in;
260 tmp |= systab64->con_in;
261 efi_systab.con_out_handle = systab64->con_out_handle;
262 tmp |= systab64->con_out_handle;
263 efi_systab.con_out = systab64->con_out;
264 tmp |= systab64->con_out;
265 efi_systab.stderr_handle = systab64->stderr_handle;
266 tmp |= systab64->stderr_handle;
267 efi_systab.stderr = systab64->stderr;
268 tmp |= systab64->stderr;
1fec0533
DY
269 efi_systab.runtime = data ?
270 (void *)(unsigned long)data->runtime :
271 (void *)(unsigned long)systab64->runtime;
272 tmp |= data ? data->runtime : systab64->runtime;
1adbfa35
OJ
273 efi_systab.boottime = (void *)(unsigned long)systab64->boottime;
274 tmp |= systab64->boottime;
275 efi_systab.nr_tables = systab64->nr_tables;
1fec0533
DY
276 efi_systab.tables = data ? (unsigned long)data->tables :
277 systab64->tables;
278 tmp |= data ? data->tables : systab64->tables;
1adbfa35 279
abc93f8e 280 early_memunmap(systab64, sizeof(*systab64));
1fec0533 281 if (data)
abc93f8e 282 early_memunmap(data, sizeof(*data));
1adbfa35
OJ
283#ifdef CONFIG_X86_32
284 if (tmp >> 32) {
285 pr_err("EFI data located above 4GB, disabling EFI.\n");
286 return -EINVAL;
287 }
288#endif
289 } else {
290 efi_system_table_32_t *systab32;
291
abc93f8e 292 systab32 = early_memremap((unsigned long)phys,
1adbfa35
OJ
293 sizeof(*systab32));
294 if (systab32 == NULL) {
295 pr_err("Couldn't map the system table!\n");
296 return -ENOMEM;
297 }
298
299 efi_systab.hdr = systab32->hdr;
300 efi_systab.fw_vendor = systab32->fw_vendor;
301 efi_systab.fw_revision = systab32->fw_revision;
302 efi_systab.con_in_handle = systab32->con_in_handle;
303 efi_systab.con_in = systab32->con_in;
304 efi_systab.con_out_handle = systab32->con_out_handle;
305 efi_systab.con_out = systab32->con_out;
306 efi_systab.stderr_handle = systab32->stderr_handle;
307 efi_systab.stderr = systab32->stderr;
308 efi_systab.runtime = (void *)(unsigned long)systab32->runtime;
309 efi_systab.boottime = (void *)(unsigned long)systab32->boottime;
310 efi_systab.nr_tables = systab32->nr_tables;
311 efi_systab.tables = systab32->tables;
312
abc93f8e 313 early_memunmap(systab32, sizeof(*systab32));
140bf275 314 }
1adbfa35 315
5b83683f
HY
316 efi.systab = &efi_systab;
317
318 /*
319 * Verify the EFI Table
320 */
140bf275 321 if (efi.systab->hdr.signature != EFI_SYSTEM_TABLE_SIGNATURE) {
e3cb3f5a 322 pr_err("System table signature incorrect!\n");
140bf275
OJ
323 return -EINVAL;
324 }
5b83683f 325 if ((efi.systab->hdr.revision >> 16) == 0)
9b7d2049 326 pr_err("Warning: System table version %d.%02d, expected 1.00 or greater!\n",
5b83683f
HY
327 efi.systab->hdr.revision >> 16,
328 efi.systab->hdr.revision & 0xffff);
140bf275 329
0f8093a9
MF
330 set_bit(EFI_SYSTEM_TABLES, &efi.flags);
331
140bf275 332 return 0;
83e7ee66 333}
5b83683f 334
4f9dbcfc 335static int __init efi_runtime_init32(void)
83e7ee66 336{
4f9dbcfc
MF
337 efi_runtime_services_32_t *runtime;
338
abc93f8e 339 runtime = early_memremap((unsigned long)efi.systab->runtime,
4f9dbcfc
MF
340 sizeof(efi_runtime_services_32_t));
341 if (!runtime) {
342 pr_err("Could not map the runtime service table!\n");
343 return -ENOMEM;
344 }
5b83683f
HY
345
346 /*
0ce4605c
MK
347 * We will only need *early* access to the SetVirtualAddressMap
348 * EFI runtime service. All other runtime services will be called
349 * via the virtual mapping.
5b83683f 350 */
4f9dbcfc
MF
351 efi_phys.set_virtual_address_map =
352 (efi_set_virtual_address_map_t *)
353 (unsigned long)runtime->set_virtual_address_map;
abc93f8e 354 early_memunmap(runtime, sizeof(efi_runtime_services_32_t));
4f9dbcfc
MF
355
356 return 0;
357}
358
359static int __init efi_runtime_init64(void)
360{
361 efi_runtime_services_64_t *runtime;
362
abc93f8e 363 runtime = early_memremap((unsigned long)efi.systab->runtime,
4f9dbcfc 364 sizeof(efi_runtime_services_64_t));
140bf275 365 if (!runtime) {
e3cb3f5a 366 pr_err("Could not map the runtime service table!\n");
140bf275
OJ
367 return -ENOMEM;
368 }
4f9dbcfc 369
140bf275 370 /*
0ce4605c
MK
371 * We will only need *early* access to the SetVirtualAddressMap
372 * EFI runtime service. All other runtime services will be called
373 * via the virtual mapping.
140bf275 374 */
140bf275 375 efi_phys.set_virtual_address_map =
4f9dbcfc
MF
376 (efi_set_virtual_address_map_t *)
377 (unsigned long)runtime->set_virtual_address_map;
abc93f8e 378 early_memunmap(runtime, sizeof(efi_runtime_services_64_t));
4f9dbcfc
MF
379
380 return 0;
381}
382
383static int __init efi_runtime_init(void)
384{
385 int rv;
386
387 /*
388 * Check out the runtime services table. We need to map
389 * the runtime services table so that we can grab the physical
390 * address of several of the EFI runtime functions, needed to
391 * set the firmware into virtual mode.
9f27bc54
DK
392 *
393 * When EFI_PARAVIRT is in force then we could not map runtime
394 * service memory region because we do not have direct access to it.
395 * However, runtime services are available through proxy functions
396 * (e.g. in case of Xen dom0 EFI implementation they call special
397 * hypercall which executes relevant EFI functions) and that is why
398 * they are always enabled.
4f9dbcfc 399 */
4f9dbcfc 400
9f27bc54
DK
401 if (!efi_enabled(EFI_PARAVIRT)) {
402 if (efi_enabled(EFI_64BIT))
403 rv = efi_runtime_init64();
404 else
405 rv = efi_runtime_init32();
406
407 if (rv)
408 return rv;
409 }
140bf275 410
0f8093a9
MF
411 set_bit(EFI_RUNTIME_SERVICES, &efi.flags);
412
140bf275 413 return 0;
83e7ee66 414}
5b83683f 415
140bf275 416static int __init efi_memmap_init(void)
83e7ee66 417{
9f27bc54
DK
418 if (efi_enabled(EFI_PARAVIRT))
419 return 0;
420
5b83683f 421 /* Map the EFI memory map */
abc93f8e 422 memmap.map = early_memremap((unsigned long)memmap.phys_map,
beacfaac 423 memmap.nr_map * memmap.desc_size);
140bf275 424 if (memmap.map == NULL) {
e3cb3f5a 425 pr_err("Could not map the memory map!\n");
140bf275
OJ
426 return -ENOMEM;
427 }
5b83683f 428 memmap.map_end = memmap.map + (memmap.nr_map * memmap.desc_size);
175e438f 429
200001eb
PJ
430 if (add_efi_memmap)
431 do_add_efi_memmap();
140bf275 432
0f8093a9
MF
433 set_bit(EFI_MEMMAP, &efi.flags);
434
140bf275 435 return 0;
83e7ee66
OJ
436}
437
438void __init efi_init(void)
439{
440 efi_char16_t *c16;
441 char vendor[100] = "unknown";
442 int i = 0;
443 void *tmp;
444
445#ifdef CONFIG_X86_32
1adbfa35
OJ
446 if (boot_params.efi_info.efi_systab_hi ||
447 boot_params.efi_info.efi_memmap_hi) {
448 pr_info("Table located above 4GB, disabling EFI.\n");
1adbfa35
OJ
449 return;
450 }
83e7ee66
OJ
451 efi_phys.systab = (efi_system_table_t *)boot_params.efi_info.efi_systab;
452#else
453 efi_phys.systab = (efi_system_table_t *)
1adbfa35
OJ
454 (boot_params.efi_info.efi_systab |
455 ((__u64)boot_params.efi_info.efi_systab_hi<<32));
83e7ee66
OJ
456#endif
457
83e68189 458 if (efi_systab_init(efi_phys.systab))
140bf275 459 return;
83e68189 460
a0998eb1
DY
461 efi.config_table = (unsigned long)efi.systab->tables;
462 efi.fw_vendor = (unsigned long)efi.systab->fw_vendor;
463 efi.runtime = (unsigned long)efi.systab->runtime;
464
83e7ee66
OJ
465 /*
466 * Show what we know for posterity
467 */
abc93f8e 468 c16 = tmp = early_memremap(efi.systab->fw_vendor, 2);
83e7ee66
OJ
469 if (c16) {
470 for (i = 0; i < sizeof(vendor) - 1 && *c16; ++i)
471 vendor[i] = *c16++;
472 vendor[i] = '\0';
473 } else
e3cb3f5a 474 pr_err("Could not map the firmware vendor!\n");
abc93f8e 475 early_memunmap(tmp, 2);
83e7ee66 476
e3cb3f5a
OJ
477 pr_info("EFI v%u.%.02u by %s\n",
478 efi.systab->hdr.revision >> 16,
479 efi.systab->hdr.revision & 0xffff, vendor);
83e7ee66 480
1fec0533
DY
481 if (efi_reuse_config(efi.systab->tables, efi.systab->nr_tables))
482 return;
483
272686bf 484 if (efi_config_init(arch_tables))
140bf275 485 return;
83e68189 486
1adbfa35
OJ
487 /*
488 * Note: We currently don't support runtime services on an EFI
489 * that doesn't match the kernel 32/64-bit mode.
490 */
491
7d453eee 492 if (!efi_runtime_supported())
1adbfa35 493 pr_info("No EFI runtime due to 32/64-bit mismatch with kernel\n");
83e68189 494 else {
b2e0a54a 495 if (efi_runtime_disabled() || efi_runtime_init())
83e68189 496 return;
140bf275 497 }
83e68189 498 if (efi_memmap_init())
140bf275 499 return;
83e68189 500
fed6cefe
BP
501 if (efi_enabled(EFI_DBG))
502 print_efi_memmap();
5b83683f
HY
503}
504
2223af38
JT
505void __init efi_late_init(void)
506{
507 efi_bgrt_init();
508}
509
9cd2b07c
MG
510void __init efi_set_executable(efi_memory_desc_t *md, bool executable)
511{
512 u64 addr, npages;
513
514 addr = md->virt_addr;
515 npages = md->num_pages;
516
517 memrange_efi_to_native(&addr, &npages);
518
519 if (executable)
520 set_memory_x(addr, npages);
521 else
522 set_memory_nx(addr, npages);
523}
524
c55d016f 525void __init runtime_code_page_mkexec(void)
a2172e25
HY
526{
527 efi_memory_desc_t *md;
a2172e25
HY
528 void *p;
529
a2172e25
HY
530 /* Make EFI runtime service code area executable */
531 for (p = memmap.map; p < memmap.map_end; p += memmap.desc_size) {
532 md = p;
1c083eb2
HY
533
534 if (md->type != EFI_RUNTIME_SERVICES_CODE)
535 continue;
536
9cd2b07c 537 efi_set_executable(md, true);
a2172e25 538 }
a2172e25 539}
a2172e25 540
4e78eb05 541void __init efi_memory_uc(u64 addr, unsigned long size)
3e8fa263
MF
542{
543 unsigned long page_shift = 1UL << EFI_PAGE_SHIFT;
544 u64 npages;
545
546 npages = round_up(size, page_shift) / page_shift;
547 memrange_efi_to_native(&addr, &npages);
548 set_memory_uc(addr, npages);
549}
550
d2f7cbe7
BP
551void __init old_map_region(efi_memory_desc_t *md)
552{
553 u64 start_pfn, end_pfn, end;
554 unsigned long size;
555 void *va;
556
557 start_pfn = PFN_DOWN(md->phys_addr);
558 size = md->num_pages << PAGE_SHIFT;
559 end = md->phys_addr + size;
560 end_pfn = PFN_UP(end);
561
562 if (pfn_range_is_mapped(start_pfn, end_pfn)) {
563 va = __va(md->phys_addr);
564
565 if (!(md->attribute & EFI_MEMORY_WB))
566 efi_memory_uc((u64)(unsigned long)va, size);
567 } else
568 va = efi_ioremap(md->phys_addr, size,
569 md->type, md->attribute);
570
571 md->virt_addr = (u64) (unsigned long) va;
572 if (!va)
573 pr_err("ioremap of 0x%llX failed!\n",
574 (unsigned long long)md->phys_addr);
575}
576
481f75c0
DY
577/* Merge contiguous regions of the same type and attribute */
578static void __init efi_merge_regions(void)
5b83683f 579{
481f75c0 580 void *p;
202f9d0a 581 efi_memory_desc_t *md, *prev_md = NULL;
202f9d0a 582
202f9d0a
MG
583 for (p = memmap.map; p < memmap.map_end; p += memmap.desc_size) {
584 u64 prev_size;
585 md = p;
586
587 if (!prev_md) {
588 prev_md = md;
589 continue;
590 }
591
592 if (prev_md->type != md->type ||
593 prev_md->attribute != md->attribute) {
594 prev_md = md;
595 continue;
596 }
597
598 prev_size = prev_md->num_pages << EFI_PAGE_SHIFT;
599
600 if (md->phys_addr == (prev_md->phys_addr + prev_size)) {
601 prev_md->num_pages += md->num_pages;
602 md->type = EFI_RESERVED_TYPE;
603 md->attribute = 0;
604 continue;
605 }
606 prev_md = md;
481f75c0
DY
607 }
608}
609
610static void __init get_systab_virt_addr(efi_memory_desc_t *md)
611{
612 unsigned long size;
613 u64 end, systab;
d2f7cbe7 614
481f75c0
DY
615 size = md->num_pages << EFI_PAGE_SHIFT;
616 end = md->phys_addr + size;
617 systab = (u64)(unsigned long)efi_phys.systab;
618 if (md->phys_addr <= systab && systab < end) {
619 systab += md->virt_addr - md->phys_addr;
620 efi.systab = (efi_system_table_t *)(unsigned long)systab;
202f9d0a 621 }
481f75c0
DY
622}
623
fabb37c7 624static void __init save_runtime_map(void)
926172d4 625{
fabb37c7 626#ifdef CONFIG_KEXEC
926172d4
DY
627 efi_memory_desc_t *md;
628 void *tmp, *p, *q = NULL;
629 int count = 0;
630
a3530e8f
DY
631 if (efi_enabled(EFI_OLD_MEMMAP))
632 return;
633
926172d4
DY
634 for (p = memmap.map; p < memmap.map_end; p += memmap.desc_size) {
635 md = p;
636
637 if (!(md->attribute & EFI_MEMORY_RUNTIME) ||
638 (md->type == EFI_BOOT_SERVICES_CODE) ||
639 (md->type == EFI_BOOT_SERVICES_DATA))
640 continue;
641 tmp = krealloc(q, (count + 1) * memmap.desc_size, GFP_KERNEL);
642 if (!tmp)
643 goto out;
644 q = tmp;
645
646 memcpy(q + count * memmap.desc_size, md, memmap.desc_size);
647 count++;
648 }
649
518548ab 650 efi_runtime_map_setup(q, count, memmap.desc_size);
fabb37c7 651 return;
926172d4 652
926172d4
DY
653out:
654 kfree(q);
fabb37c7
BP
655 pr_err("Error saving runtime map, efi runtime on kexec non-functional!!\n");
656#endif
1fec0533
DY
657}
658
b7b898ae
BP
659static void *realloc_pages(void *old_memmap, int old_shift)
660{
661 void *ret;
662
663 ret = (void *)__get_free_pages(GFP_KERNEL, old_shift + 1);
664 if (!ret)
665 goto out;
666
667 /*
668 * A first-time allocation doesn't have anything to copy.
669 */
670 if (!old_memmap)
671 return ret;
672
673 memcpy(ret, old_memmap, PAGE_SIZE << old_shift);
674
675out:
676 free_pages((unsigned long)old_memmap, old_shift);
677 return ret;
678}
679
481f75c0 680/*
b7b898ae
BP
681 * Map the efi memory ranges of the runtime services and update new_mmap with
682 * virtual addresses.
481f75c0 683 */
b7b898ae 684static void * __init efi_map_regions(int *count, int *pg_shift)
481f75c0 685{
b7b898ae
BP
686 void *p, *new_memmap = NULL;
687 unsigned long left = 0;
481f75c0 688 efi_memory_desc_t *md;
202f9d0a 689
5b83683f
HY
690 for (p = memmap.map; p < memmap.map_end; p += memmap.desc_size) {
691 md = p;
70087011
JB
692 if (!(md->attribute & EFI_MEMORY_RUNTIME)) {
693#ifdef CONFIG_X86_64
694 if (md->type != EFI_BOOT_SERVICES_CODE &&
695 md->type != EFI_BOOT_SERVICES_DATA)
696#endif
697 continue;
698 }
1c083eb2 699
d2f7cbe7 700 efi_map_region(md);
481f75c0
DY
701 get_systab_virt_addr(md);
702
b7b898ae
BP
703 if (left < memmap.desc_size) {
704 new_memmap = realloc_pages(new_memmap, *pg_shift);
705 if (!new_memmap)
706 return NULL;
707
708 left += PAGE_SIZE << *pg_shift;
709 (*pg_shift)++;
710 }
711
481f75c0
DY
712 memcpy(new_memmap + (*count * memmap.desc_size), md,
713 memmap.desc_size);
b7b898ae
BP
714
715 left -= memmap.desc_size;
481f75c0
DY
716 (*count)++;
717 }
d2f7cbe7 718
481f75c0 719 return new_memmap;
481f75c0
DY
720}
721
fabb37c7
BP
722static void __init kexec_enter_virtual_mode(void)
723{
724#ifdef CONFIG_KEXEC
725 efi_memory_desc_t *md;
726 void *p;
727
728 efi.systab = NULL;
729
730 /*
731 * We don't do virtual mode, since we don't do runtime services, on
732 * non-native EFI
733 */
734 if (!efi_is_native()) {
735 efi_unmap_memmap();
a5a750a9 736 clear_bit(EFI_RUNTIME_SERVICES, &efi.flags);
fabb37c7
BP
737 return;
738 }
739
740 /*
741 * Map efi regions which were passed via setup_data. The virt_addr is a
742 * fixed addr which was used in first kernel of a kexec boot.
743 */
744 for (p = memmap.map; p < memmap.map_end; p += memmap.desc_size) {
745 md = p;
746 efi_map_region_fixed(md); /* FIXME: add error handling */
747 get_systab_virt_addr(md);
748 }
749
750 save_runtime_map();
751
752 BUG_ON(!efi.systab);
753
754 efi_sync_low_kernel_mappings();
755
756 /*
757 * Now that EFI is in virtual mode, update the function
758 * pointers in the runtime service table to the new virtual addresses.
759 *
760 * Call EFI services through wrapper functions.
761 */
762 efi.runtime_version = efi_systab.hdr.revision;
994448f1 763
022ee6c5 764 efi_native_runtime_setup();
994448f1 765
fabb37c7 766 efi.set_virtual_address_map = NULL;
fabb37c7
BP
767
768 if (efi_enabled(EFI_OLD_MEMMAP) && (__supported_pte_mask & _PAGE_NX))
769 runtime_code_page_mkexec();
770
771 /* clean DUMMY object */
eeb9db09 772 efi_delete_dummy_variable();
fabb37c7
BP
773#endif
774}
775
481f75c0
DY
776/*
777 * This function will switch the EFI runtime services to virtual mode.
778 * Essentially, we look through the EFI memmap and map every region that
779 * has the runtime attribute bit set in its memory descriptor into the
780 * ->trampoline_pgd page table using a top-down VA allocation scheme.
781 *
782 * The old method which used to update that memory descriptor with the
783 * virtual address obtained from ioremap() is still supported when the
784 * kernel is booted with efi=old_map on its command line. Same old
785 * method enabled the runtime services to be called without having to
786 * thunk back into physical mode for every invocation.
787 *
788 * The new method does a pagetable switch in a preemption-safe manner
789 * so that we're in a different address space when calling a runtime
790 * function. For function arguments passing we do copy the PGDs of the
791 * kernel page table into ->trampoline_pgd prior to each call.
1fec0533
DY
792 *
793 * Specially for kexec boot, efi runtime maps in previous kernel should
794 * be passed in via setup_data. In that case runtime ranges will be mapped
fabb37c7
BP
795 * to the same virtual addresses as the first kernel, see
796 * kexec_enter_virtual_mode().
481f75c0 797 */
fabb37c7 798static void __init __efi_enter_virtual_mode(void)
481f75c0 799{
fabb37c7 800 int count = 0, pg_shift = 0;
481f75c0 801 void *new_memmap = NULL;
b7b898ae 802 efi_status_t status;
1c083eb2 803
481f75c0 804 efi.systab = NULL;
d2f7cbe7 805
fabb37c7
BP
806 efi_merge_regions();
807 new_memmap = efi_map_regions(&count, &pg_shift);
808 if (!new_memmap) {
809 pr_err("Error reallocating memory, EFI runtime non-functional!\n");
a5a750a9 810 clear_bit(EFI_RUNTIME_SERVICES, &efi.flags);
fabb37c7 811 return;
b7b898ae 812 }
926172d4 813
fabb37c7
BP
814 save_runtime_map();
815
5b83683f
HY
816 BUG_ON(!efi.systab);
817
a5a750a9
DY
818 if (efi_setup_page_tables(__pa(new_memmap), 1 << pg_shift)) {
819 clear_bit(EFI_RUNTIME_SERVICES, &efi.flags);
fabb37c7 820 return;
a5a750a9 821 }
b7b898ae 822
d2f7cbe7 823 efi_sync_low_kernel_mappings();
11cc8512 824 efi_dump_pagetable();
d2f7cbe7 825
994448f1
MF
826 if (efi_is_native()) {
827 status = phys_efi_set_virtual_address_map(
828 memmap.desc_size * count,
829 memmap.desc_size,
830 memmap.desc_version,
831 (efi_memory_desc_t *)__pa(new_memmap));
832 } else {
833 status = efi_thunk_set_virtual_address_map(
834 efi_phys.set_virtual_address_map,
835 memmap.desc_size * count,
836 memmap.desc_size,
837 memmap.desc_version,
838 (efi_memory_desc_t *)__pa(new_memmap));
839 }
1fec0533 840
fabb37c7
BP
841 if (status != EFI_SUCCESS) {
842 pr_alert("Unable to switch EFI into virtual mode (status=%lx)!\n",
843 status);
844 panic("EFI call to SetVirtualAddressMap() failed!");
5b83683f
HY
845 }
846
847 /*
848 * Now that EFI is in virtual mode, update the function
849 * pointers in the runtime service table to the new virtual addresses.
850 *
851 * Call EFI services through wrapper functions.
852 */
712ba9e9 853 efi.runtime_version = efi_systab.hdr.revision;
4f9dbcfc
MF
854
855 if (efi_is_native())
022ee6c5 856 efi_native_runtime_setup();
4f9dbcfc
MF
857 else
858 efi_thunk_runtime_setup();
859
2b5e8ef3 860 efi.set_virtual_address_map = NULL;
d2f7cbe7 861
c55d016f 862 efi_runtime_mkexec();
1adbfa35 863
b7b898ae
BP
864 /*
865 * We mapped the descriptor array into the EFI pagetable above but we're
866 * not unmapping it here. Here's why:
867 *
868 * We're copying select PGDs from the kernel page table to the EFI page
869 * table and when we do so and make changes to those PGDs like unmapping
870 * stuff from them, those changes appear in the kernel page table and we
871 * go boom.
872 *
873 * From setup_real_mode():
874 *
875 * ...
876 * trampoline_pgd[0] = init_level4_pgt[pgd_index(__PAGE_OFFSET)].pgd;
877 *
878 * In this particular case, our allocation is in PGD 0 of the EFI page
879 * table but we've copied that PGD from PGD[272] of the EFI page table:
880 *
881 * pgd_index(__PAGE_OFFSET = 0xffff880000000000) = 272
882 *
883 * where the direct memory mapping in kernel space is.
884 *
885 * new_memmap's VA comes from that direct mapping and thus clearing it,
886 * it would get cleared in the kernel page table too.
887 *
888 * efi_cleanup_page_tables(__pa(new_memmap), 1 << pg_shift);
889 */
fabb37c7 890 free_pages((unsigned long)new_memmap, pg_shift);
f8b84043
MG
891
892 /* clean DUMMY object */
eeb9db09 893 efi_delete_dummy_variable();
5b83683f
HY
894}
895
fabb37c7
BP
896void __init efi_enter_virtual_mode(void)
897{
9f27bc54
DK
898 if (efi_enabled(EFI_PARAVIRT))
899 return;
900
fabb37c7
BP
901 if (efi_setup)
902 kexec_enter_virtual_mode();
903 else
904 __efi_enter_virtual_mode();
905}
906
5b83683f
HY
907/*
908 * Convenience functions to obtain memory types and attributes
909 */
910u32 efi_mem_type(unsigned long phys_addr)
911{
912 efi_memory_desc_t *md;
913 void *p;
914
83e68189
MF
915 if (!efi_enabled(EFI_MEMMAP))
916 return 0;
917
5b83683f
HY
918 for (p = memmap.map; p < memmap.map_end; p += memmap.desc_size) {
919 md = p;
920 if ((md->phys_addr <= phys_addr) &&
921 (phys_addr < (md->phys_addr +
922 (md->num_pages << EFI_PAGE_SHIFT))))
923 return md->type;
924 }
925 return 0;
926}
927
928u64 efi_mem_attributes(unsigned long phys_addr)
929{
930 efi_memory_desc_t *md;
931 void *p;
932
67a9b9c5
DK
933 if (!efi_enabled(EFI_MEMMAP))
934 return 0;
935
5b83683f
HY
936 for (p = memmap.map; p < memmap.map_end; p += memmap.desc_size) {
937 md = p;
938 if ((md->phys_addr <= phys_addr) &&
939 (phys_addr < (md->phys_addr +
940 (md->num_pages << EFI_PAGE_SHIFT))))
941 return md->attribute;
942 }
943 return 0;
944}
a6e4d5a0 945
5ae3683c 946static int __init arch_parse_efi_cmdline(char *str)
d2f7cbe7 947{
6ccc72b8
DY
948 if (parse_option_str(str, "old_map"))
949 set_bit(EFI_OLD_MEMMAP, &efi.flags);
fed6cefe
BP
950 if (parse_option_str(str, "debug"))
951 set_bit(EFI_DBG, &efi.flags);
d2f7cbe7
BP
952
953 return 0;
954}
5ae3683c 955early_param("efi", arch_parse_efi_cmdline);