[PATCH 2/7] efi: Allow runtime relocate to be disabled
Heinrich Schuchardt
xypron.glpk at gmx.de
Fri May 17 20:45:08 CEST 2024
Am 17. Mai 2024 18:32:53 MESZ schrieb Jiaxun Yang <jiaxun.yang at flygoat.com>:
>Allow runtime relocate to be disabled because on MIPS we
>never do that. It's guaranteed that OS won't call
>set_virtual_address_map and convert_pointer as well.
>
>On MIPS KSEG0 is always mapped to memory and there is no
>way to disable it for kernel mode. Both EFI runtime and
>kernel lays in this segment, so relocation is totally
>unnecessary.
>
>Also U-Boot does not use traditional .dyn.rel to perform
>relocation on MIPS, that makes implementation of runtime
>relocation pretty hard.
>
>Signed-off-by: Jiaxun Yang <jiaxun.yang at flygoat.com>
>---
> include/efi_loader.h | 26 ++++++++++++++++++--------
> lib/efi_loader/Kconfig | 10 ++++++++++
> lib/efi_loader/efi_image_loader.c | 1 +
> lib/efi_loader/efi_memory.c | 14 +++++++++++---
> lib/efi_loader/efi_runtime.c | 11 ++++++++++-
> lib/efi_loader/efi_var_mem.c | 6 +++++-
> lib/efi_selftest/Makefile | 2 +-
> 7 files changed, 56 insertions(+), 14 deletions(-)
>
>diff --git a/include/efi_loader.h b/include/efi_loader.h
>index 9600941aa327..1ae62906e099 100644
>--- a/include/efi_loader.h
>+++ b/include/efi_loader.h
>@@ -31,7 +31,7 @@ static inline void *guidcpy(void *dst, const void *src)
> return memcpy(dst, src, sizeof(efi_guid_t));
> }
>
>-#if CONFIG_IS_ENABLED(EFI_LOADER)
>+#if CONFIG_IS_ENABLED(EFI_LOADER) && CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE)
>
> /**
> * __efi_runtime_data - declares a non-const variable for EFI runtime section
>@@ -79,6 +79,23 @@ static inline void *guidcpy(void *dst, const void *src)
> */
> #define __efi_runtime __section(".text.efi_runtime")
>
>+/* Call this to relocate the runtime section to an address space */
>+void efi_runtime_relocate(ulong offset, struct efi_mem_desc *map);
>+
>+#else /* CONFIG_IS_ENABLED(EFI_LOADER) && CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE) */
>+
>+/* Without CONFIG_EFI_LOADER we don't have a runtime section, stub it out */
>+#define __efi_runtime_data
>+#define __efi_runtime_rodata
>+#define __efi_runtime
>+
>+static inline void efi_runtime_relocate(ulong offset,
>+ struct efi_mem_desc *map) {};
>+
>+#endif /* CONFIG_IS_ENABLED(EFI_LOADER) && CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE) */
>+
>+#if CONFIG_IS_ENABLED(EFI_LOADER)
>+
> /*
> * Call this with mmio_ptr as the _pointer_ to a pointer to an MMIO region
> * to make it available at runtime
>@@ -101,10 +118,6 @@ efi_status_t efi_launch_capsules(void);
>
> #else /* CONFIG_IS_ENABLED(EFI_LOADER) */
>
>-/* Without CONFIG_EFI_LOADER we don't have a runtime section, stub it out */
>-#define __efi_runtime_data
>-#define __efi_runtime_rodata
>-#define __efi_runtime
> static inline efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len)
> {
> return EFI_SUCCESS;
>@@ -118,7 +131,6 @@ static inline efi_status_t efi_launch_capsules(void)
> {
> return EFI_SUCCESS;
> }
>-
> #endif /* CONFIG_IS_ENABLED(EFI_LOADER) */
>
> #if CONFIG_IS_ENABLED(EFI_BINARY_EXEC)
>@@ -641,8 +653,6 @@ efi_status_t efi_load_pe(struct efi_loaded_image_obj *handle,
> struct efi_loaded_image *loaded_image_info);
> /* Called once to store the pristine gd pointer */
> void efi_save_gd(void);
>-/* Call this to relocate the runtime section to an address space */
>-void efi_runtime_relocate(ulong offset, struct efi_mem_desc *map);
> /* Call this to get image parameters */
> void efi_get_image_parameters(void **img_addr, size_t *img_size);
> /* Add a new object to the object list. */
>diff --git a/lib/efi_loader/Kconfig b/lib/efi_loader/Kconfig
>index 430bb7f0f7dc..bc5ae9086ea2 100644
>--- a/lib/efi_loader/Kconfig
>+++ b/lib/efi_loader/Kconfig
>@@ -359,6 +359,16 @@ config EFI_UNICODE_CAPITALIZATION
>
> endif
>
>+config EFI_RUNTIME_RELOCATE
>+ bool "Support relocation for EFI runtime service"
>+ depends on ARM || X86 || RISCV || SANDBOX
The sandbox should build on all architectures with EFI support. So for the sandbox I guess you should consider the host architecture.
>+ default y
>+ help
>+ Select this option to enable relocation for EFI runtime service. It
>+ enables set_virtual_address_map and convert_pointer runtime service.
>+ It is required for OS on most architectures to make use of EFI runtime
>+ services.
>+
> config EFI_LOADER_BOUNCE_BUFFER
> bool "EFI Applications use bounce buffers for DMA operations"
> depends on ARM64
>diff --git a/lib/efi_loader/efi_image_loader.c b/lib/efi_loader/efi_image_loader.c
>index 604243603289..cedc4d822fe7 100644
>--- a/lib/efi_loader/efi_image_loader.c
>+++ b/lib/efi_loader/efi_image_loader.c
>@@ -50,6 +50,7 @@ static int machines[] = {
> #if defined(__riscv) && (__riscv_xlen == 64)
> IMAGE_FILE_MACHINE_RISCV64,
> #endif
>+
> 0 };
>
> /**
>diff --git a/lib/efi_loader/efi_memory.c b/lib/efi_loader/efi_memory.c
>index 12cf23fa3fa8..7a1959d2409a 100644
>--- a/lib/efi_loader/efi_memory.c
>+++ b/lib/efi_loader/efi_memory.c
>@@ -908,8 +908,8 @@ __weak void efi_add_known_memory(void)
> */
> static void add_u_boot_and_runtime(void)
> {
>- unsigned long runtime_start, runtime_end, runtime_pages;
>- unsigned long runtime_mask = EFI_PAGE_MASK;
>+ __maybe_unused unsigned long runtime_start, runtime_end, runtime_pages;
>+ __maybe_unused unsigned long runtime_mask = EFI_PAGE_MASK;
> unsigned long uboot_start, uboot_pages;
> unsigned long uboot_stack_size = CONFIG_STACK_SIZE;
>
>@@ -918,7 +918,13 @@ static void add_u_boot_and_runtime(void)
> uboot_stack_size) & ~EFI_PAGE_MASK;
> uboot_pages = ((uintptr_t)map_sysmem(gd->ram_top - 1, 0) -
> uboot_start + EFI_PAGE_MASK) >> EFI_PAGE_SHIFT;
>- efi_add_memory_map_pg(uboot_start, uboot_pages, EFI_BOOT_SERVICES_CODE,
>+ /*
>+ * In case runtime relocate is not enabled just mark whole U-Boot
>+ * as EFI_RUNTIME_SERVICES_CODE because all are required at runtime.
>+ */
>+ efi_add_memory_map_pg(uboot_start, uboot_pages,
>+ CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE) ?
>+ EFI_BOOT_SERVICES_CODE : EFI_RUNTIME_SERVICES_CODE,
> false);
>
> #if defined(__aarch64__)
>@@ -930,6 +936,7 @@ static void add_u_boot_and_runtime(void)
> runtime_mask = SZ_64K - 1;
> #endif
>
>+#if CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE)
> /*
> * Add Runtime Services. We mark surrounding boottime code as runtime as
> * well to fulfill the runtime alignment constraints but avoid padding.
>@@ -940,6 +947,7 @@ static void add_u_boot_and_runtime(void)
> runtime_pages = (runtime_end - runtime_start) >> EFI_PAGE_SHIFT;
> efi_add_memory_map_pg(runtime_start, runtime_pages,
> EFI_RUNTIME_SERVICES_CODE, false);
>+#endif
> }
>
> int efi_memory_init(void)
>diff --git a/lib/efi_loader/efi_runtime.c b/lib/efi_loader/efi_runtime.c
>index 011bcd04836d..9a6a131e5695 100644
>--- a/lib/efi_loader/efi_runtime.c
>+++ b/lib/efi_loader/efi_runtime.c
>@@ -37,6 +37,7 @@ static LIST_HEAD(efi_runtime_mmio);
>
> static efi_status_t __efi_runtime EFIAPI efi_unimplemented(void);
>
>+#if (CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE))
> /*
> * TODO(sjg at chromium.org): These defines and structures should come from the ELF
> * header for each architecture (or a generic header) rather than being repeated
>@@ -94,6 +95,7 @@ struct elf_rela {
> static __efi_runtime_data struct efi_mem_desc *efi_virtmap;
> static __efi_runtime_data efi_uintn_t efi_descriptor_count;
> static __efi_runtime_data efi_uintn_t efi_descriptor_size;
>+#endif
>
> /*
> * EFI runtime code lives in two stages. In the first stage, U-Boot and an EFI
>@@ -546,7 +548,7 @@ static efi_status_t __efi_runtime EFIAPI efi_query_capsule_caps_unsupported(
> * Return: true if the pointer points to a service function pointer in the
> * runtime table
> */
>-static bool efi_is_runtime_service_pointer(void *p)
>+static bool __maybe_unused efi_is_runtime_service_pointer(void *p)
> {
> return (p >= (void *)&efi_runtime_services.get_time &&
> p <= (void *)&efi_runtime_services.query_variable_info) ||
>@@ -574,6 +576,7 @@ void efi_runtime_detach(void)
> efi_update_table_header_crc32(&efi_runtime_services.hdr);
> }
>
>+#if (CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE))
> /**
> * efi_set_virtual_address_map_runtime() - change from physical to virtual
> * mapping
>@@ -910,6 +913,7 @@ static efi_status_t EFIAPI efi_set_virtual_address_map(
> out:
> return EFI_EXIT(ret);
> }
>+#endif
>
> /**
> * efi_add_runtime_mmio() - add memory-mapped IO region
>@@ -987,8 +991,13 @@ struct efi_runtime_services __efi_runtime_data efi_runtime_services = {
> .set_time = &efi_set_time_boottime,
> .get_wakeup_time = (void *)&efi_unimplemented,
> .set_wakeup_time = (void *)&efi_unimplemented,
>+#if (CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE))
> .set_virtual_address_map = &efi_set_virtual_address_map,
> .convert_pointer = efi_convert_pointer,
>+#else
>+ .set_virtual_address_map = (void *)&efi_unimplemented,
>+ .convert_pointer = (void *)&efi_unimplemented,
>+#endif
> .get_variable = efi_get_variable,
> .get_next_variable_name = efi_get_next_variable_name,
> .set_variable = efi_set_variable,
>diff --git a/lib/efi_loader/efi_var_mem.c b/lib/efi_loader/efi_var_mem.c
>index 139e16aad7c6..7afad47b9e12 100644
>--- a/lib/efi_loader/efi_var_mem.c
>+++ b/lib/efi_loader/efi_var_mem.c
>@@ -201,6 +201,7 @@ u64 __efi_runtime efi_var_mem_free(void)
> sizeof(struct efi_var_entry);
> }
>
>+#if CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE)
> /**
> * efi_var_mem_notify_exit_boot_services() - SetVirtualMemoryMap callback
> *
>@@ -213,12 +214,13 @@ efi_var_mem_notify_virtual_address_map(struct efi_event *event, void *context)
> efi_convert_pointer(0, (void **)&efi_var_buf);
> efi_current_var = NULL;
> }
>+#endif
>
> efi_status_t efi_var_mem_init(void)
> {
> u64 memory;
> efi_status_t ret;
>- struct efi_event *event;
>+ struct efi_event *event __maybe_unused;
>
> ret = efi_allocate_pages(EFI_ALLOCATE_ANY_PAGES,
> EFI_RUNTIME_SERVICES_DATA,
>@@ -232,11 +234,13 @@ efi_status_t efi_var_mem_init(void)
> efi_var_buf->length = (uintptr_t)efi_var_buf->var -
> (uintptr_t)efi_var_buf;
>
>+#if CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE)
> ret = efi_create_event(EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE, TPL_CALLBACK,
> efi_var_mem_notify_virtual_address_map, NULL,
> NULL, &event);
> if (ret != EFI_SUCCESS)
> return ret;
>+#endif
> return ret;
> }
>
>diff --git a/lib/efi_selftest/Makefile b/lib/efi_selftest/Makefile
>index 414701893f65..d707d921bc8e 100644
>--- a/lib/efi_selftest/Makefile
>+++ b/lib/efi_selftest/Makefile
>@@ -37,7 +37,6 @@ efi_selftest_memory.o \
> efi_selftest_open_protocol.o \
> efi_selftest_register_notify.o \
> efi_selftest_reset.o \
>-efi_selftest_set_virtual_address_map.o \
> efi_selftest_startimage_exit.o \
> efi_selftest_startimage_return.o \
> efi_selftest_textinput.o \
>@@ -50,6 +49,7 @@ efi_selftest_variables.o \
> efi_selftest_variables_runtime.o \
> efi_selftest_watchdog.o
>
>+obj-$(CONFIG_EFI_RUNTIME_RELOCATE) += efi_selftest_set_virtual_address_map.o
> obj-$(CONFIG_EFI_ECPT) += efi_selftest_ecpt.o
> obj-$(CONFIG_NETDEVICES) += efi_selftest_snp.o
>
>
More information about the U-Boot
mailing list