]> git.proxmox.com Git - mirror_ubuntu-hirsute-kernel.git/blame - arch/x86/platform/efi/efi.c
efi-bgrt: Add error handling; inform the user when ignoring the BGRT
[mirror_ubuntu-hirsute-kernel.git] / arch / x86 / platform / efi / efi.c
CommitLineData
5b83683f
HY
1/*
2 * Common EFI (Extensible Firmware Interface) support functions
3 * Based on Extensible Firmware Interface Specification version 1.0
4 *
5 * Copyright (C) 1999 VA Linux Systems
6 * Copyright (C) 1999 Walt Drummond <drummond@valinux.com>
7 * Copyright (C) 1999-2002 Hewlett-Packard Co.
8 * David Mosberger-Tang <davidm@hpl.hp.com>
9 * Stephane Eranian <eranian@hpl.hp.com>
10 * Copyright (C) 2005-2008 Intel Co.
11 * Fenghua Yu <fenghua.yu@intel.com>
12 * Bibo Mao <bibo.mao@intel.com>
13 * Chandramouli Narayanan <mouli@linux.intel.com>
14 * Huang Ying <ying.huang@intel.com>
d2f7cbe7
BP
15 * Copyright (C) 2013 SuSE Labs
16 * Borislav Petkov <bp@suse.de> - runtime services VA mapping
5b83683f
HY
17 *
18 * Copied from efi_32.c to eliminate the duplicated code between EFI
19 * 32/64 support code. --ying 2007-10-26
20 *
21 * All EFI Runtime Services are not implemented yet as EFI only
22 * supports physical mode addressing on SoftSDV. This is to be fixed
23 * in a future version. --drummond 1999-07-20
24 *
25 * Implemented EFI runtime services and virtual mode calls. --davidm
26 *
27 * Goutham Rao: <goutham.rao@intel.com>
28 * Skip non-WB memory and ignore empty memory ranges.
29 */
30
e3cb3f5a
OJ
31#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
32
5b83683f
HY
33#include <linux/kernel.h>
34#include <linux/init.h>
35#include <linux/efi.h>
2223af38 36#include <linux/efi-bgrt.h>
69c60c88 37#include <linux/export.h>
5b83683f 38#include <linux/bootmem.h>
0d01ff25 39#include <linux/slab.h>
a9ce6bc1 40#include <linux/memblock.h>
5b83683f
HY
41#include <linux/spinlock.h>
42#include <linux/uaccess.h>
43#include <linux/time.h>
44#include <linux/io.h>
45#include <linux/reboot.h>
46#include <linux/bcd.h>
47
48#include <asm/setup.h>
49#include <asm/efi.h>
50#include <asm/time.h>
a2172e25
HY
51#include <asm/cacheflush.h>
52#include <asm/tlbflush.h>
7bd867df 53#include <asm/x86_init.h>
3195ef59 54#include <asm/rtc.h>
a5d90c92 55#include <asm/uv/uv.h>
5b83683f 56
f4fccac0 57#define EFI_DEBUG
5b83683f 58
5b83683f
HY
59struct efi_memory_map memmap;
60
ecaea42e 61static struct efi efi_phys __initdata;
5b83683f
HY
62static efi_system_table_t efi_systab __initdata;
63
9b7d2049 64static efi_config_table_type_t arch_tables[] __initdata = {
272686bf
LL
65#ifdef CONFIG_X86_UV
66 {UV_SYSTEM_TABLE_GUID, "UVsystab", &efi.uv_systab},
67#endif
722da9d2 68 {NULL_GUID, NULL, NULL},
272686bf
LL
69};
70
1fec0533 71u64 efi_setup; /* efi setup_data physical address */
926172d4 72
9b7d2049 73static bool disable_runtime __initdata = false;
8b2cb7a8
HY
74static int __init setup_noefi(char *arg)
75{
fb834c7a 76 disable_runtime = true;
8b2cb7a8
HY
77 return 0;
78}
79early_param("noefi", setup_noefi);
80
200001eb
PJ
81int add_efi_memmap;
82EXPORT_SYMBOL(add_efi_memmap);
83
84static int __init setup_add_efi_memmap(char *arg)
85{
86 add_efi_memmap = 1;
87 return 0;
88}
89early_param("add_efi_memmap", setup_add_efi_memmap);
90
5b83683f
HY
91static efi_status_t __init phys_efi_set_virtual_address_map(
92 unsigned long memory_map_size,
93 unsigned long descriptor_size,
94 u32 descriptor_version,
95 efi_memory_desc_t *virtual_map)
96{
97 efi_status_t status;
98
99 efi_call_phys_prelog();
62fa6e69
MF
100 status = efi_call_phys(efi_phys.set_virtual_address_map,
101 memory_map_size, descriptor_size,
102 descriptor_version, virtual_map);
5b83683f
HY
103 efi_call_phys_epilog();
104 return status;
105}
106
3565184e 107void efi_get_time(struct timespec *now)
5b83683f
HY
108{
109 efi_status_t status;
110 efi_time_t eft;
111 efi_time_cap_t cap;
112
113 status = efi.get_time(&eft, &cap);
114 if (status != EFI_SUCCESS)
e3cb3f5a 115 pr_err("Oops: efitime: can't read time!\n");
5b83683f 116
3565184e
DV
117 now->tv_sec = mktime(eft.year, eft.month, eft.day, eft.hour,
118 eft.minute, eft.second);
119 now->tv_nsec = 0;
5b83683f
HY
120}
121
69c91893
PJ
122/*
123 * Tell the kernel about the EFI memory map. This might include
124 * more than the max 128 entries that can fit in the e820 legacy
125 * (zeropage) memory map.
126 */
127
200001eb 128static void __init do_add_efi_memmap(void)
69c91893
PJ
129{
130 void *p;
131
132 for (p = memmap.map; p < memmap.map_end; p += memmap.desc_size) {
133 efi_memory_desc_t *md = p;
134 unsigned long long start = md->phys_addr;
135 unsigned long long size = md->num_pages << EFI_PAGE_SHIFT;
136 int e820_type;
137
e2a71476
CW
138 switch (md->type) {
139 case EFI_LOADER_CODE:
140 case EFI_LOADER_DATA:
141 case EFI_BOOT_SERVICES_CODE:
142 case EFI_BOOT_SERVICES_DATA:
143 case EFI_CONVENTIONAL_MEMORY:
144 if (md->attribute & EFI_MEMORY_WB)
145 e820_type = E820_RAM;
146 else
147 e820_type = E820_RESERVED;
148 break;
149 case EFI_ACPI_RECLAIM_MEMORY:
150 e820_type = E820_ACPI;
151 break;
152 case EFI_ACPI_MEMORY_NVS:
153 e820_type = E820_NVS;
154 break;
155 case EFI_UNUSABLE_MEMORY:
156 e820_type = E820_UNUSABLE;
157 break;
158 default:
159 /*
160 * EFI_RESERVED_TYPE EFI_RUNTIME_SERVICES_CODE
161 * EFI_RUNTIME_SERVICES_DATA EFI_MEMORY_MAPPED_IO
162 * EFI_MEMORY_MAPPED_IO_PORT_SPACE EFI_PAL_CODE
163 */
69c91893 164 e820_type = E820_RESERVED;
e2a71476
CW
165 break;
166 }
d0be6bde 167 e820_add_region(start, size, e820_type);
69c91893
PJ
168 }
169 sanitize_e820_map(e820.map, ARRAY_SIZE(e820.map), &e820.nr_map);
170}
171
1adbfa35 172int __init efi_memblock_x86_reserve_range(void)
ecacf09f 173{
15b9c359 174 struct efi_info *e = &boot_params.efi_info;
ecacf09f
HY
175 unsigned long pmap;
176
9f27bc54
DK
177 if (efi_enabled(EFI_PARAVIRT))
178 return 0;
179
05486fa7 180#ifdef CONFIG_X86_32
1adbfa35 181 /* Can't handle data above 4GB at this time */
15b9c359 182 if (e->efi_memmap_hi) {
1adbfa35
OJ
183 pr_err("Memory map is above 4GB, disabling EFI.\n");
184 return -EINVAL;
185 }
15b9c359 186 pmap = e->efi_memmap;
05486fa7 187#else
15b9c359 188 pmap = (e->efi_memmap | ((__u64)e->efi_memmap_hi << 32));
ecacf09f 189#endif
15b9c359
BP
190 memmap.phys_map = (void *)pmap;
191 memmap.nr_map = e->efi_memmap_size /
192 e->efi_memdesc_size;
193 memmap.desc_size = e->efi_memdesc_size;
194 memmap.desc_version = e->efi_memdesc_version;
195
24aa0788 196 memblock_reserve(pmap, memmap.nr_map * memmap.desc_size);
1adbfa35 197
258f6fd7
LL
198 efi.memmap = &memmap;
199
1adbfa35 200 return 0;
ecacf09f
HY
201}
202
5b83683f
HY
203static void __init print_efi_memmap(void)
204{
f4fccac0 205#ifdef EFI_DEBUG
5b83683f
HY
206 efi_memory_desc_t *md;
207 void *p;
208 int i;
209
210 for (p = memmap.map, i = 0;
211 p < memmap.map_end;
212 p += memmap.desc_size, i++) {
213 md = p;
9b7d2049 214 pr_info("mem%02u: type=%u, attr=0x%llx, range=[0x%016llx-0x%016llx) (%lluMB)\n",
5b83683f
HY
215 i, md->type, md->attribute, md->phys_addr,
216 md->phys_addr + (md->num_pages << EFI_PAGE_SHIFT),
217 (md->num_pages >> (20 - EFI_PAGE_SHIFT)));
218 }
5b83683f 219#endif /* EFI_DEBUG */
f4fccac0 220}
5b83683f 221
5189c2a7 222void __init efi_unmap_memmap(void)
78510792 223{
3e909599 224 clear_bit(EFI_MEMMAP, &efi.flags);
78510792 225 if (memmap.map) {
abc93f8e 226 early_memunmap(memmap.map, memmap.nr_map * memmap.desc_size);
78510792
JT
227 memmap.map = NULL;
228 }
229}
230
140bf275 231static int __init efi_systab_init(void *phys)
5b83683f 232{
83e68189 233 if (efi_enabled(EFI_64BIT)) {
1adbfa35 234 efi_system_table_64_t *systab64;
1fec0533 235 struct efi_setup_data *data = NULL;
1adbfa35
OJ
236 u64 tmp = 0;
237
1fec0533
DY
238 if (efi_setup) {
239 data = early_memremap(efi_setup, sizeof(*data));
240 if (!data)
241 return -ENOMEM;
242 }
abc93f8e 243 systab64 = early_memremap((unsigned long)phys,
1adbfa35
OJ
244 sizeof(*systab64));
245 if (systab64 == NULL) {
246 pr_err("Couldn't map the system table!\n");
1fec0533 247 if (data)
abc93f8e 248 early_memunmap(data, sizeof(*data));
1adbfa35
OJ
249 return -ENOMEM;
250 }
251
252 efi_systab.hdr = systab64->hdr;
1fec0533
DY
253 efi_systab.fw_vendor = data ? (unsigned long)data->fw_vendor :
254 systab64->fw_vendor;
255 tmp |= data ? data->fw_vendor : systab64->fw_vendor;
1adbfa35
OJ
256 efi_systab.fw_revision = systab64->fw_revision;
257 efi_systab.con_in_handle = systab64->con_in_handle;
258 tmp |= systab64->con_in_handle;
259 efi_systab.con_in = systab64->con_in;
260 tmp |= systab64->con_in;
261 efi_systab.con_out_handle = systab64->con_out_handle;
262 tmp |= systab64->con_out_handle;
263 efi_systab.con_out = systab64->con_out;
264 tmp |= systab64->con_out;
265 efi_systab.stderr_handle = systab64->stderr_handle;
266 tmp |= systab64->stderr_handle;
267 efi_systab.stderr = systab64->stderr;
268 tmp |= systab64->stderr;
1fec0533
DY
269 efi_systab.runtime = data ?
270 (void *)(unsigned long)data->runtime :
271 (void *)(unsigned long)systab64->runtime;
272 tmp |= data ? data->runtime : systab64->runtime;
1adbfa35
OJ
273 efi_systab.boottime = (void *)(unsigned long)systab64->boottime;
274 tmp |= systab64->boottime;
275 efi_systab.nr_tables = systab64->nr_tables;
1fec0533
DY
276 efi_systab.tables = data ? (unsigned long)data->tables :
277 systab64->tables;
278 tmp |= data ? data->tables : systab64->tables;
1adbfa35 279
abc93f8e 280 early_memunmap(systab64, sizeof(*systab64));
1fec0533 281 if (data)
abc93f8e 282 early_memunmap(data, sizeof(*data));
1adbfa35
OJ
283#ifdef CONFIG_X86_32
284 if (tmp >> 32) {
285 pr_err("EFI data located above 4GB, disabling EFI.\n");
286 return -EINVAL;
287 }
288#endif
289 } else {
290 efi_system_table_32_t *systab32;
291
abc93f8e 292 systab32 = early_memremap((unsigned long)phys,
1adbfa35
OJ
293 sizeof(*systab32));
294 if (systab32 == NULL) {
295 pr_err("Couldn't map the system table!\n");
296 return -ENOMEM;
297 }
298
299 efi_systab.hdr = systab32->hdr;
300 efi_systab.fw_vendor = systab32->fw_vendor;
301 efi_systab.fw_revision = systab32->fw_revision;
302 efi_systab.con_in_handle = systab32->con_in_handle;
303 efi_systab.con_in = systab32->con_in;
304 efi_systab.con_out_handle = systab32->con_out_handle;
305 efi_systab.con_out = systab32->con_out;
306 efi_systab.stderr_handle = systab32->stderr_handle;
307 efi_systab.stderr = systab32->stderr;
308 efi_systab.runtime = (void *)(unsigned long)systab32->runtime;
309 efi_systab.boottime = (void *)(unsigned long)systab32->boottime;
310 efi_systab.nr_tables = systab32->nr_tables;
311 efi_systab.tables = systab32->tables;
312
abc93f8e 313 early_memunmap(systab32, sizeof(*systab32));
140bf275 314 }
1adbfa35 315
5b83683f
HY
316 efi.systab = &efi_systab;
317
318 /*
319 * Verify the EFI Table
320 */
140bf275 321 if (efi.systab->hdr.signature != EFI_SYSTEM_TABLE_SIGNATURE) {
e3cb3f5a 322 pr_err("System table signature incorrect!\n");
140bf275
OJ
323 return -EINVAL;
324 }
5b83683f 325 if ((efi.systab->hdr.revision >> 16) == 0)
9b7d2049 326 pr_err("Warning: System table version %d.%02d, expected 1.00 or greater!\n",
5b83683f
HY
327 efi.systab->hdr.revision >> 16,
328 efi.systab->hdr.revision & 0xffff);
140bf275 329
0f8093a9
MF
330 set_bit(EFI_SYSTEM_TABLES, &efi.flags);
331
140bf275 332 return 0;
83e7ee66 333}
5b83683f 334
4f9dbcfc 335static int __init efi_runtime_init32(void)
83e7ee66 336{
4f9dbcfc
MF
337 efi_runtime_services_32_t *runtime;
338
abc93f8e 339 runtime = early_memremap((unsigned long)efi.systab->runtime,
4f9dbcfc
MF
340 sizeof(efi_runtime_services_32_t));
341 if (!runtime) {
342 pr_err("Could not map the runtime service table!\n");
343 return -ENOMEM;
344 }
5b83683f
HY
345
346 /*
4f9dbcfc
MF
347 * We will only need *early* access to the following two
348 * EFI runtime services before set_virtual_address_map
349 * is invoked.
5b83683f 350 */
4f9dbcfc
MF
351 efi_phys.set_virtual_address_map =
352 (efi_set_virtual_address_map_t *)
353 (unsigned long)runtime->set_virtual_address_map;
abc93f8e 354 early_memunmap(runtime, sizeof(efi_runtime_services_32_t));
4f9dbcfc
MF
355
356 return 0;
357}
358
359static int __init efi_runtime_init64(void)
360{
361 efi_runtime_services_64_t *runtime;
362
abc93f8e 363 runtime = early_memremap((unsigned long)efi.systab->runtime,
4f9dbcfc 364 sizeof(efi_runtime_services_64_t));
140bf275 365 if (!runtime) {
e3cb3f5a 366 pr_err("Could not map the runtime service table!\n");
140bf275
OJ
367 return -ENOMEM;
368 }
4f9dbcfc 369
140bf275 370 /*
4f9dbcfc
MF
371 * We will only need *early* access to the following two
372 * EFI runtime services before set_virtual_address_map
140bf275
OJ
373 * is invoked.
374 */
140bf275 375 efi_phys.set_virtual_address_map =
4f9dbcfc
MF
376 (efi_set_virtual_address_map_t *)
377 (unsigned long)runtime->set_virtual_address_map;
abc93f8e 378 early_memunmap(runtime, sizeof(efi_runtime_services_64_t));
4f9dbcfc
MF
379
380 return 0;
381}
382
383static int __init efi_runtime_init(void)
384{
385 int rv;
386
387 /*
388 * Check out the runtime services table. We need to map
389 * the runtime services table so that we can grab the physical
390 * address of several of the EFI runtime functions, needed to
391 * set the firmware into virtual mode.
9f27bc54
DK
392 *
393 * When EFI_PARAVIRT is in force then we could not map runtime
394 * service memory region because we do not have direct access to it.
395 * However, runtime services are available through proxy functions
396 * (e.g. in case of Xen dom0 EFI implementation they call special
397 * hypercall which executes relevant EFI functions) and that is why
398 * they are always enabled.
4f9dbcfc 399 */
4f9dbcfc 400
9f27bc54
DK
401 if (!efi_enabled(EFI_PARAVIRT)) {
402 if (efi_enabled(EFI_64BIT))
403 rv = efi_runtime_init64();
404 else
405 rv = efi_runtime_init32();
406
407 if (rv)
408 return rv;
409 }
140bf275 410
0f8093a9
MF
411 set_bit(EFI_RUNTIME_SERVICES, &efi.flags);
412
140bf275 413 return 0;
83e7ee66 414}
5b83683f 415
140bf275 416static int __init efi_memmap_init(void)
83e7ee66 417{
9f27bc54
DK
418 if (efi_enabled(EFI_PARAVIRT))
419 return 0;
420
5b83683f 421 /* Map the EFI memory map */
abc93f8e 422 memmap.map = early_memremap((unsigned long)memmap.phys_map,
beacfaac 423 memmap.nr_map * memmap.desc_size);
140bf275 424 if (memmap.map == NULL) {
e3cb3f5a 425 pr_err("Could not map the memory map!\n");
140bf275
OJ
426 return -ENOMEM;
427 }
5b83683f 428 memmap.map_end = memmap.map + (memmap.nr_map * memmap.desc_size);
175e438f 429
200001eb
PJ
430 if (add_efi_memmap)
431 do_add_efi_memmap();
140bf275 432
0f8093a9
MF
433 set_bit(EFI_MEMMAP, &efi.flags);
434
140bf275 435 return 0;
83e7ee66
OJ
436}
437
438void __init efi_init(void)
439{
440 efi_char16_t *c16;
441 char vendor[100] = "unknown";
442 int i = 0;
443 void *tmp;
444
445#ifdef CONFIG_X86_32
1adbfa35
OJ
446 if (boot_params.efi_info.efi_systab_hi ||
447 boot_params.efi_info.efi_memmap_hi) {
448 pr_info("Table located above 4GB, disabling EFI.\n");
1adbfa35
OJ
449 return;
450 }
83e7ee66
OJ
451 efi_phys.systab = (efi_system_table_t *)boot_params.efi_info.efi_systab;
452#else
453 efi_phys.systab = (efi_system_table_t *)
1adbfa35
OJ
454 (boot_params.efi_info.efi_systab |
455 ((__u64)boot_params.efi_info.efi_systab_hi<<32));
83e7ee66
OJ
456#endif
457
83e68189 458 if (efi_systab_init(efi_phys.systab))
140bf275 459 return;
83e68189 460
a0998eb1
DY
461 efi.config_table = (unsigned long)efi.systab->tables;
462 efi.fw_vendor = (unsigned long)efi.systab->fw_vendor;
463 efi.runtime = (unsigned long)efi.systab->runtime;
464
83e7ee66
OJ
465 /*
466 * Show what we know for posterity
467 */
abc93f8e 468 c16 = tmp = early_memremap(efi.systab->fw_vendor, 2);
83e7ee66
OJ
469 if (c16) {
470 for (i = 0; i < sizeof(vendor) - 1 && *c16; ++i)
471 vendor[i] = *c16++;
472 vendor[i] = '\0';
473 } else
e3cb3f5a 474 pr_err("Could not map the firmware vendor!\n");
abc93f8e 475 early_memunmap(tmp, 2);
83e7ee66 476
e3cb3f5a
OJ
477 pr_info("EFI v%u.%.02u by %s\n",
478 efi.systab->hdr.revision >> 16,
479 efi.systab->hdr.revision & 0xffff, vendor);
83e7ee66 480
1fec0533
DY
481 if (efi_reuse_config(efi.systab->tables, efi.systab->nr_tables))
482 return;
483
272686bf 484 if (efi_config_init(arch_tables))
140bf275 485 return;
83e68189 486
1adbfa35
OJ
487 /*
488 * Note: We currently don't support runtime services on an EFI
489 * that doesn't match the kernel 32/64-bit mode.
490 */
491
7d453eee 492 if (!efi_runtime_supported())
1adbfa35 493 pr_info("No EFI runtime due to 32/64-bit mismatch with kernel\n");
83e68189 494 else {
fb834c7a 495 if (disable_runtime || efi_runtime_init())
83e68189 496 return;
140bf275 497 }
83e68189 498 if (efi_memmap_init())
140bf275 499 return;
83e68189 500
5b83683f 501 print_efi_memmap();
5b83683f
HY
502}
503
2223af38
JT
504void __init efi_late_init(void)
505{
506 efi_bgrt_init();
507}
508
9cd2b07c
MG
509void __init efi_set_executable(efi_memory_desc_t *md, bool executable)
510{
511 u64 addr, npages;
512
513 addr = md->virt_addr;
514 npages = md->num_pages;
515
516 memrange_efi_to_native(&addr, &npages);
517
518 if (executable)
519 set_memory_x(addr, npages);
520 else
521 set_memory_nx(addr, npages);
522}
523
c55d016f 524void __init runtime_code_page_mkexec(void)
a2172e25
HY
525{
526 efi_memory_desc_t *md;
a2172e25
HY
527 void *p;
528
a2172e25
HY
529 /* Make EFI runtime service code area executable */
530 for (p = memmap.map; p < memmap.map_end; p += memmap.desc_size) {
531 md = p;
1c083eb2
HY
532
533 if (md->type != EFI_RUNTIME_SERVICES_CODE)
534 continue;
535
9cd2b07c 536 efi_set_executable(md, true);
a2172e25 537 }
a2172e25 538}
a2172e25 539
3e8fa263
MF
540void efi_memory_uc(u64 addr, unsigned long size)
541{
542 unsigned long page_shift = 1UL << EFI_PAGE_SHIFT;
543 u64 npages;
544
545 npages = round_up(size, page_shift) / page_shift;
546 memrange_efi_to_native(&addr, &npages);
547 set_memory_uc(addr, npages);
548}
549
d2f7cbe7
BP
550void __init old_map_region(efi_memory_desc_t *md)
551{
552 u64 start_pfn, end_pfn, end;
553 unsigned long size;
554 void *va;
555
556 start_pfn = PFN_DOWN(md->phys_addr);
557 size = md->num_pages << PAGE_SHIFT;
558 end = md->phys_addr + size;
559 end_pfn = PFN_UP(end);
560
561 if (pfn_range_is_mapped(start_pfn, end_pfn)) {
562 va = __va(md->phys_addr);
563
564 if (!(md->attribute & EFI_MEMORY_WB))
565 efi_memory_uc((u64)(unsigned long)va, size);
566 } else
567 va = efi_ioremap(md->phys_addr, size,
568 md->type, md->attribute);
569
570 md->virt_addr = (u64) (unsigned long) va;
571 if (!va)
572 pr_err("ioremap of 0x%llX failed!\n",
573 (unsigned long long)md->phys_addr);
574}
575
481f75c0
DY
576/* Merge contiguous regions of the same type and attribute */
577static void __init efi_merge_regions(void)
5b83683f 578{
481f75c0 579 void *p;
202f9d0a 580 efi_memory_desc_t *md, *prev_md = NULL;
202f9d0a 581
202f9d0a
MG
582 for (p = memmap.map; p < memmap.map_end; p += memmap.desc_size) {
583 u64 prev_size;
584 md = p;
585
586 if (!prev_md) {
587 prev_md = md;
588 continue;
589 }
590
591 if (prev_md->type != md->type ||
592 prev_md->attribute != md->attribute) {
593 prev_md = md;
594 continue;
595 }
596
597 prev_size = prev_md->num_pages << EFI_PAGE_SHIFT;
598
599 if (md->phys_addr == (prev_md->phys_addr + prev_size)) {
600 prev_md->num_pages += md->num_pages;
601 md->type = EFI_RESERVED_TYPE;
602 md->attribute = 0;
603 continue;
604 }
605 prev_md = md;
481f75c0
DY
606 }
607}
608
609static void __init get_systab_virt_addr(efi_memory_desc_t *md)
610{
611 unsigned long size;
612 u64 end, systab;
d2f7cbe7 613
481f75c0
DY
614 size = md->num_pages << EFI_PAGE_SHIFT;
615 end = md->phys_addr + size;
616 systab = (u64)(unsigned long)efi_phys.systab;
617 if (md->phys_addr <= systab && systab < end) {
618 systab += md->virt_addr - md->phys_addr;
619 efi.systab = (efi_system_table_t *)(unsigned long)systab;
202f9d0a 620 }
481f75c0
DY
621}
622
fabb37c7 623static void __init save_runtime_map(void)
926172d4 624{
fabb37c7 625#ifdef CONFIG_KEXEC
926172d4
DY
626 efi_memory_desc_t *md;
627 void *tmp, *p, *q = NULL;
628 int count = 0;
629
a3530e8f
DY
630 if (efi_enabled(EFI_OLD_MEMMAP))
631 return;
632
926172d4
DY
633 for (p = memmap.map; p < memmap.map_end; p += memmap.desc_size) {
634 md = p;
635
636 if (!(md->attribute & EFI_MEMORY_RUNTIME) ||
637 (md->type == EFI_BOOT_SERVICES_CODE) ||
638 (md->type == EFI_BOOT_SERVICES_DATA))
639 continue;
640 tmp = krealloc(q, (count + 1) * memmap.desc_size, GFP_KERNEL);
641 if (!tmp)
642 goto out;
643 q = tmp;
644
645 memcpy(q + count * memmap.desc_size, md, memmap.desc_size);
646 count++;
647 }
648
518548ab 649 efi_runtime_map_setup(q, count, memmap.desc_size);
fabb37c7 650 return;
926172d4 651
926172d4
DY
652out:
653 kfree(q);
fabb37c7
BP
654 pr_err("Error saving runtime map, efi runtime on kexec non-functional!!\n");
655#endif
1fec0533
DY
656}
657
b7b898ae
BP
658static void *realloc_pages(void *old_memmap, int old_shift)
659{
660 void *ret;
661
662 ret = (void *)__get_free_pages(GFP_KERNEL, old_shift + 1);
663 if (!ret)
664 goto out;
665
666 /*
667 * A first-time allocation doesn't have anything to copy.
668 */
669 if (!old_memmap)
670 return ret;
671
672 memcpy(ret, old_memmap, PAGE_SIZE << old_shift);
673
674out:
675 free_pages((unsigned long)old_memmap, old_shift);
676 return ret;
677}
678
481f75c0 679/*
b7b898ae
BP
680 * Map the efi memory ranges of the runtime services and update new_mmap with
681 * virtual addresses.
481f75c0 682 */
b7b898ae 683static void * __init efi_map_regions(int *count, int *pg_shift)
481f75c0 684{
b7b898ae
BP
685 void *p, *new_memmap = NULL;
686 unsigned long left = 0;
481f75c0 687 efi_memory_desc_t *md;
202f9d0a 688
5b83683f
HY
689 for (p = memmap.map; p < memmap.map_end; p += memmap.desc_size) {
690 md = p;
70087011
JB
691 if (!(md->attribute & EFI_MEMORY_RUNTIME)) {
692#ifdef CONFIG_X86_64
693 if (md->type != EFI_BOOT_SERVICES_CODE &&
694 md->type != EFI_BOOT_SERVICES_DATA)
695#endif
696 continue;
697 }
1c083eb2 698
d2f7cbe7 699 efi_map_region(md);
481f75c0
DY
700 get_systab_virt_addr(md);
701
b7b898ae
BP
702 if (left < memmap.desc_size) {
703 new_memmap = realloc_pages(new_memmap, *pg_shift);
704 if (!new_memmap)
705 return NULL;
706
707 left += PAGE_SIZE << *pg_shift;
708 (*pg_shift)++;
709 }
710
481f75c0
DY
711 memcpy(new_memmap + (*count * memmap.desc_size), md,
712 memmap.desc_size);
b7b898ae
BP
713
714 left -= memmap.desc_size;
481f75c0
DY
715 (*count)++;
716 }
d2f7cbe7 717
481f75c0 718 return new_memmap;
481f75c0
DY
719}
720
fabb37c7
BP
721static void __init kexec_enter_virtual_mode(void)
722{
723#ifdef CONFIG_KEXEC
724 efi_memory_desc_t *md;
725 void *p;
726
727 efi.systab = NULL;
728
729 /*
730 * We don't do virtual mode, since we don't do runtime services, on
731 * non-native EFI
732 */
733 if (!efi_is_native()) {
734 efi_unmap_memmap();
735 return;
736 }
737
738 /*
739 * Map efi regions which were passed via setup_data. The virt_addr is a
740 * fixed addr which was used in first kernel of a kexec boot.
741 */
742 for (p = memmap.map; p < memmap.map_end; p += memmap.desc_size) {
743 md = p;
744 efi_map_region_fixed(md); /* FIXME: add error handling */
745 get_systab_virt_addr(md);
746 }
747
748 save_runtime_map();
749
750 BUG_ON(!efi.systab);
751
752 efi_sync_low_kernel_mappings();
753
754 /*
755 * Now that EFI is in virtual mode, update the function
756 * pointers in the runtime service table to the new virtual addresses.
757 *
758 * Call EFI services through wrapper functions.
759 */
760 efi.runtime_version = efi_systab.hdr.revision;
994448f1 761
022ee6c5 762 efi_native_runtime_setup();
994448f1 763
fabb37c7 764 efi.set_virtual_address_map = NULL;
fabb37c7
BP
765
766 if (efi_enabled(EFI_OLD_MEMMAP) && (__supported_pte_mask & _PAGE_NX))
767 runtime_code_page_mkexec();
768
769 /* clean DUMMY object */
eeb9db09 770 efi_delete_dummy_variable();
fabb37c7
BP
771#endif
772}
773
481f75c0
DY
774/*
775 * This function will switch the EFI runtime services to virtual mode.
776 * Essentially, we look through the EFI memmap and map every region that
777 * has the runtime attribute bit set in its memory descriptor into the
778 * ->trampoline_pgd page table using a top-down VA allocation scheme.
779 *
780 * The old method which used to update that memory descriptor with the
781 * virtual address obtained from ioremap() is still supported when the
782 * kernel is booted with efi=old_map on its command line. Same old
783 * method enabled the runtime services to be called without having to
784 * thunk back into physical mode for every invocation.
785 *
786 * The new method does a pagetable switch in a preemption-safe manner
787 * so that we're in a different address space when calling a runtime
788 * function. For function arguments passing we do copy the PGDs of the
789 * kernel page table into ->trampoline_pgd prior to each call.
1fec0533
DY
790 *
791 * Specially for kexec boot, efi runtime maps in previous kernel should
792 * be passed in via setup_data. In that case runtime ranges will be mapped
fabb37c7
BP
793 * to the same virtual addresses as the first kernel, see
794 * kexec_enter_virtual_mode().
481f75c0 795 */
fabb37c7 796static void __init __efi_enter_virtual_mode(void)
481f75c0 797{
fabb37c7 798 int count = 0, pg_shift = 0;
481f75c0 799 void *new_memmap = NULL;
b7b898ae 800 efi_status_t status;
1c083eb2 801
481f75c0 802 efi.systab = NULL;
d2f7cbe7 803
fabb37c7
BP
804 efi_merge_regions();
805 new_memmap = efi_map_regions(&count, &pg_shift);
806 if (!new_memmap) {
807 pr_err("Error reallocating memory, EFI runtime non-functional!\n");
808 return;
b7b898ae 809 }
926172d4 810
fabb37c7
BP
811 save_runtime_map();
812
5b83683f
HY
813 BUG_ON(!efi.systab);
814
fabb37c7
BP
815 if (efi_setup_page_tables(__pa(new_memmap), 1 << pg_shift))
816 return;
b7b898ae 817
d2f7cbe7 818 efi_sync_low_kernel_mappings();
11cc8512 819 efi_dump_pagetable();
d2f7cbe7 820
994448f1
MF
821 if (efi_is_native()) {
822 status = phys_efi_set_virtual_address_map(
823 memmap.desc_size * count,
824 memmap.desc_size,
825 memmap.desc_version,
826 (efi_memory_desc_t *)__pa(new_memmap));
827 } else {
828 status = efi_thunk_set_virtual_address_map(
829 efi_phys.set_virtual_address_map,
830 memmap.desc_size * count,
831 memmap.desc_size,
832 memmap.desc_version,
833 (efi_memory_desc_t *)__pa(new_memmap));
834 }
1fec0533 835
fabb37c7
BP
836 if (status != EFI_SUCCESS) {
837 pr_alert("Unable to switch EFI into virtual mode (status=%lx)!\n",
838 status);
839 panic("EFI call to SetVirtualAddressMap() failed!");
5b83683f
HY
840 }
841
842 /*
843 * Now that EFI is in virtual mode, update the function
844 * pointers in the runtime service table to the new virtual addresses.
845 *
846 * Call EFI services through wrapper functions.
847 */
712ba9e9 848 efi.runtime_version = efi_systab.hdr.revision;
4f9dbcfc
MF
849
850 if (efi_is_native())
022ee6c5 851 efi_native_runtime_setup();
4f9dbcfc
MF
852 else
853 efi_thunk_runtime_setup();
854
2b5e8ef3 855 efi.set_virtual_address_map = NULL;
d2f7cbe7 856
c55d016f 857 efi_runtime_mkexec();
1adbfa35 858
b7b898ae
BP
859 /*
860 * We mapped the descriptor array into the EFI pagetable above but we're
861 * not unmapping it here. Here's why:
862 *
863 * We're copying select PGDs from the kernel page table to the EFI page
864 * table and when we do so and make changes to those PGDs like unmapping
865 * stuff from them, those changes appear in the kernel page table and we
866 * go boom.
867 *
868 * From setup_real_mode():
869 *
870 * ...
871 * trampoline_pgd[0] = init_level4_pgt[pgd_index(__PAGE_OFFSET)].pgd;
872 *
873 * In this particular case, our allocation is in PGD 0 of the EFI page
874 * table but we've copied that PGD from PGD[272] of the EFI page table:
875 *
876 * pgd_index(__PAGE_OFFSET = 0xffff880000000000) = 272
877 *
878 * where the direct memory mapping in kernel space is.
879 *
880 * new_memmap's VA comes from that direct mapping and thus clearing it,
881 * it would get cleared in the kernel page table too.
882 *
883 * efi_cleanup_page_tables(__pa(new_memmap), 1 << pg_shift);
884 */
fabb37c7 885 free_pages((unsigned long)new_memmap, pg_shift);
f8b84043
MG
886
887 /* clean DUMMY object */
eeb9db09 888 efi_delete_dummy_variable();
5b83683f
HY
889}
890
fabb37c7
BP
891void __init efi_enter_virtual_mode(void)
892{
9f27bc54
DK
893 if (efi_enabled(EFI_PARAVIRT))
894 return;
895
fabb37c7
BP
896 if (efi_setup)
897 kexec_enter_virtual_mode();
898 else
899 __efi_enter_virtual_mode();
900}
901
5b83683f
HY
902/*
903 * Convenience functions to obtain memory types and attributes
904 */
905u32 efi_mem_type(unsigned long phys_addr)
906{
907 efi_memory_desc_t *md;
908 void *p;
909
83e68189
MF
910 if (!efi_enabled(EFI_MEMMAP))
911 return 0;
912
5b83683f
HY
913 for (p = memmap.map; p < memmap.map_end; p += memmap.desc_size) {
914 md = p;
915 if ((md->phys_addr <= phys_addr) &&
916 (phys_addr < (md->phys_addr +
917 (md->num_pages << EFI_PAGE_SHIFT))))
918 return md->type;
919 }
920 return 0;
921}
922
923u64 efi_mem_attributes(unsigned long phys_addr)
924{
925 efi_memory_desc_t *md;
926 void *p;
927
67a9b9c5
DK
928 if (!efi_enabled(EFI_MEMMAP))
929 return 0;
930
5b83683f
HY
931 for (p = memmap.map; p < memmap.map_end; p += memmap.desc_size) {
932 md = p;
933 if ((md->phys_addr <= phys_addr) &&
934 (phys_addr < (md->phys_addr +
935 (md->num_pages << EFI_PAGE_SHIFT))))
936 return md->attribute;
937 }
938 return 0;
939}
a6e4d5a0 940
d2f7cbe7
BP
941static int __init parse_efi_cmdline(char *str)
942{
943 if (*str == '=')
944 str++;
945
5a17dae4
MF
946 while (*str) {
947 if (!strncmp(str, "old_map", 7)) {
948 set_bit(EFI_OLD_MEMMAP, &efi.flags);
949 str += strlen("old_map");
950 }
951
952 /*
953 * Skip any options we don't understand. Presumably
954 * they apply to the EFI boot stub.
955 */
956 while (*str && *str != ',')
957 str++;
958
959 /* If we hit a delimiter, skip it */
960 if (*str == ',')
961 str++;
962 }
d2f7cbe7
BP
963
964 return 0;
965}
966early_param("efi", parse_efi_cmdline);