blob: f7a6970e9abc18fed20dfaa089d9c117d1fef893 [file] [log] [blame]
Mark Salter3c7f2552014-04-15 22:47:52 -04001/*
2 * Copyright (C) 2013, 2014 Linaro Ltd; <roy.franz@linaro.org>
3 *
4 * This file implements the EFI boot stub for the arm64 kernel.
5 * Adapted from ARM version by Mark Salter <msalter@redhat.com>
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
10 *
11 */
Ard Biesheuvel5f9b5e62017-08-18 20:49:36 +010012
13/*
14 * To prevent the compiler from emitting GOT-indirected (and thus absolute)
15 * references to the section markers, override their visibility as 'hidden'
16 */
17#pragma GCC visibility push(hidden)
18#include <asm/sections.h>
19#pragma GCC visibility pop
20
Mark Salter3c7f2552014-04-15 22:47:52 -040021#include <linux/efi.h>
Ard Biesheuvela13b0072014-07-02 14:54:41 +020022#include <asm/efi.h>
Ard Biesheuvel42b55732016-02-17 12:36:02 +000023#include <asm/sysreg.h>
Mark Salter3c7f2552014-04-15 22:47:52 -040024
Ard Biesheuvel2b5fe072016-01-26 14:48:29 +010025#include "efistub.h"
26
Ard Biesheuvel42b55732016-02-17 12:36:02 +000027efi_status_t check_platform_features(efi_system_table_t *sys_table_arg)
28{
29 u64 tg;
30
31 /* UEFI mandates support for 4 KB granularity, no need to check */
32 if (IS_ENABLED(CONFIG_ARM64_4K_PAGES))
33 return EFI_SUCCESS;
34
35 tg = (read_cpuid(ID_AA64MMFR0_EL1) >> ID_AA64MMFR0_TGRAN_SHIFT) & 0xf;
36 if (tg != ID_AA64MMFR0_TGRAN_SUPPORTED) {
37 if (IS_ENABLED(CONFIG_ARM64_64K_PAGES))
38 pr_efi_err(sys_table_arg, "This 64 KB granular kernel is not supported by your CPU\n");
39 else
40 pr_efi_err(sys_table_arg, "This 16 KB granular kernel is not supported by your CPU\n");
41 return EFI_UNSUPPORTED;
42 }
43 return EFI_SUCCESS;
44}
Mark Salter3c7f2552014-04-15 22:47:52 -040045
Ard Biesheuveldae31fd2016-02-17 12:35:57 +000046efi_status_t handle_kernel_image(efi_system_table_t *sys_table_arg,
47 unsigned long *image_addr,
48 unsigned long *image_size,
49 unsigned long *reserve_addr,
50 unsigned long *reserve_size,
51 unsigned long dram_base,
52 efi_loaded_image_t *image)
Mark Salter3c7f2552014-04-15 22:47:52 -040053{
54 efi_status_t status;
55 unsigned long kernel_size, kernel_memsize = 0;
Ard Biesheuvele38457c2015-07-24 12:38:27 +010056 void *old_image_addr = (void *)*image_addr;
Ard Biesheuvel73effcc2015-10-29 15:07:25 +010057 unsigned long preferred_offset;
Ard Biesheuvel2b5fe072016-01-26 14:48:29 +010058 u64 phys_seed = 0;
59
60 if (IS_ENABLED(CONFIG_RANDOMIZE_BASE)) {
Ard Biesheuvele3111d52017-04-04 17:09:08 +010061 if (!nokaslr()) {
Ard Biesheuvel2b5fe072016-01-26 14:48:29 +010062 status = efi_get_random_bytes(sys_table_arg,
63 sizeof(phys_seed),
64 (u8 *)&phys_seed);
65 if (status == EFI_NOT_FOUND) {
66 pr_efi(sys_table_arg, "EFI_RNG_PROTOCOL unavailable, no randomness supplied\n");
67 } else if (status != EFI_SUCCESS) {
68 pr_efi_err(sys_table_arg, "efi_get_random_bytes() failed\n");
69 return status;
70 }
71 } else {
72 pr_efi(sys_table_arg, "KASLR disabled on kernel command line\n");
73 }
74 }
Ard Biesheuvel73effcc2015-10-29 15:07:25 +010075
76 /*
77 * The preferred offset of the kernel Image is TEXT_OFFSET bytes beyond
78 * a 2 MB aligned base, which itself may be lower than dram_base, as
79 * long as the resulting offset equals or exceeds it.
80 */
Ard Biesheuvel2b5fe072016-01-26 14:48:29 +010081 preferred_offset = round_down(dram_base, MIN_KIMG_ALIGN) + TEXT_OFFSET;
Ard Biesheuvel73effcc2015-10-29 15:07:25 +010082 if (preferred_offset < dram_base)
Ard Biesheuvel2b5fe072016-01-26 14:48:29 +010083 preferred_offset += MIN_KIMG_ALIGN;
Mark Salter3c7f2552014-04-15 22:47:52 -040084
Mark Salter3c7f2552014-04-15 22:47:52 -040085 kernel_size = _edata - _text;
Ard Biesheuvel2b5fe072016-01-26 14:48:29 +010086 kernel_memsize = kernel_size + (_end - _edata);
Ard Biesheuvele38457c2015-07-24 12:38:27 +010087
Ard Biesheuvel2b5fe072016-01-26 14:48:29 +010088 if (IS_ENABLED(CONFIG_RANDOMIZE_BASE) && phys_seed != 0) {
Ard Biesheuvele38457c2015-07-24 12:38:27 +010089 /*
Ard Biesheuvel6f26b362016-04-18 17:09:48 +020090 * If CONFIG_DEBUG_ALIGN_RODATA is not set, produce a
91 * displacement in the interval [0, MIN_KIMG_ALIGN) that
92 * is a multiple of the minimal segment alignment (SZ_64K)
93 */
94 u32 mask = (MIN_KIMG_ALIGN - 1) & ~(SZ_64K - 1);
95 u32 offset = !IS_ENABLED(CONFIG_DEBUG_ALIGN_RODATA) ?
96 (phys_seed >> 32) & mask : TEXT_OFFSET;
97
98 /*
Ard Biesheuvel2b5fe072016-01-26 14:48:29 +010099 * If KASLR is enabled, and we have some randomness available,
100 * locate the kernel at a randomized offset in physical memory.
101 */
Ard Biesheuvel6f26b362016-04-18 17:09:48 +0200102 *reserve_size = kernel_memsize + offset;
Ard Biesheuvel2b5fe072016-01-26 14:48:29 +0100103 status = efi_random_alloc(sys_table_arg, *reserve_size,
104 MIN_KIMG_ALIGN, reserve_addr,
Ard Biesheuvel6f26b362016-04-18 17:09:48 +0200105 (u32)phys_seed);
Ard Biesheuvel2b5fe072016-01-26 14:48:29 +0100106
Ard Biesheuvel6f26b362016-04-18 17:09:48 +0200107 *image_addr = *reserve_addr + offset;
Ard Biesheuvel2b5fe072016-01-26 14:48:29 +0100108 } else {
109 /*
110 * Else, try a straight allocation at the preferred offset.
Ard Biesheuvele38457c2015-07-24 12:38:27 +0100111 * This will work around the issue where, if dram_base == 0x0,
112 * efi_low_alloc() refuses to allocate at 0x0 (to prevent the
113 * address of the allocation to be mistaken for a FAIL return
114 * value or a NULL pointer). It will also ensure that, on
115 * platforms where the [dram_base, dram_base + TEXT_OFFSET)
116 * interval is partially occupied by the firmware (like on APM
117 * Mustang), we can still place the kernel at the address
118 * 'dram_base + TEXT_OFFSET'.
119 */
Ard Biesheuvel2b5fe072016-01-26 14:48:29 +0100120 if (*image_addr == preferred_offset)
121 return EFI_SUCCESS;
Ard Biesheuvele38457c2015-07-24 12:38:27 +0100122
Ard Biesheuvel2b5fe072016-01-26 14:48:29 +0100123 *image_addr = *reserve_addr = preferred_offset;
124 *reserve_size = round_up(kernel_memsize, EFI_ALLOC_ALIGN);
125
126 status = efi_call_early(allocate_pages, EFI_ALLOCATE_ADDRESS,
127 EFI_LOADER_DATA,
128 *reserve_size / EFI_PAGE_SIZE,
129 (efi_physical_addr_t *)reserve_addr);
Mark Salter3c7f2552014-04-15 22:47:52 -0400130 }
131
Ard Biesheuvel2b5fe072016-01-26 14:48:29 +0100132 if (status != EFI_SUCCESS) {
133 *reserve_size = kernel_memsize + TEXT_OFFSET;
134 status = efi_low_alloc(sys_table_arg, *reserve_size,
135 MIN_KIMG_ALIGN, reserve_addr);
136
137 if (status != EFI_SUCCESS) {
138 pr_efi_err(sys_table_arg, "Failed to relocate kernel\n");
139 *reserve_size = 0;
140 return status;
141 }
142 *image_addr = *reserve_addr + TEXT_OFFSET;
143 }
144 memcpy((void *)*image_addr, old_image_addr, kernel_size);
Mark Salter3c7f2552014-04-15 22:47:52 -0400145
146 return EFI_SUCCESS;
147}