[PATCH 2/7] efi: Allow runtime relocate to be disabled

Heinrich Schuchardt xypron.glpk at gmx.de
Fri May 17 20:45:08 CEST 2024



Am 17. Mai 2024 18:32:53 MESZ schrieb Jiaxun Yang <jiaxun.yang at flygoat.com>:
>Allow runtime relocate to be disabled because on MIPS we
>never do that. It's guaranteed that OS won't call
>set_virtual_address_map and convert_pointer as well.
>
>On MIPS KSEG0 is always mapped to memory and there is no
>way to disable it for kernel mode. Both EFI runtime and
>kernel lays in this segment, so relocation is totally
>unnecessary.
>
>Also U-Boot does not use traditional .dyn.rel to perform
>relocation on MIPS, that makes implementation of runtime
>relocation pretty hard.
>
>Signed-off-by: Jiaxun Yang <jiaxun.yang at flygoat.com>
>---
> include/efi_loader.h              | 26 ++++++++++++++++++--------
> lib/efi_loader/Kconfig            | 10 ++++++++++
> lib/efi_loader/efi_image_loader.c |  1 +
> lib/efi_loader/efi_memory.c       | 14 +++++++++++---
> lib/efi_loader/efi_runtime.c      | 11 ++++++++++-
> lib/efi_loader/efi_var_mem.c      |  6 +++++-
> lib/efi_selftest/Makefile         |  2 +-
> 7 files changed, 56 insertions(+), 14 deletions(-)
>
>diff --git a/include/efi_loader.h b/include/efi_loader.h
>index 9600941aa327..1ae62906e099 100644
>--- a/include/efi_loader.h
>+++ b/include/efi_loader.h
>@@ -31,7 +31,7 @@ static inline void *guidcpy(void *dst, const void *src)
> 	return memcpy(dst, src, sizeof(efi_guid_t));
> }
> 
>-#if CONFIG_IS_ENABLED(EFI_LOADER)
>+#if CONFIG_IS_ENABLED(EFI_LOADER) && CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE)
> 
> /**
>  * __efi_runtime_data - declares a non-const variable for EFI runtime section
>@@ -79,6 +79,23 @@ static inline void *guidcpy(void *dst, const void *src)
>  */
> #define __efi_runtime __section(".text.efi_runtime")
> 
>+/* Call this to relocate the runtime section to an address space */
>+void efi_runtime_relocate(ulong offset, struct efi_mem_desc *map);
>+
>+#else /* CONFIG_IS_ENABLED(EFI_LOADER) && CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE) */
>+
>+/* Without CONFIG_EFI_LOADER we don't have a runtime section, stub it out */
>+#define __efi_runtime_data
>+#define __efi_runtime_rodata
>+#define __efi_runtime
>+
>+static inline void efi_runtime_relocate(ulong offset,
>+					struct efi_mem_desc *map) {};
>+
>+#endif /* CONFIG_IS_ENABLED(EFI_LOADER) && CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE) */
>+
>+#if CONFIG_IS_ENABLED(EFI_LOADER)
>+
> /*
>  * Call this with mmio_ptr as the _pointer_ to a pointer to an MMIO region
>  * to make it available at runtime
>@@ -101,10 +118,6 @@ efi_status_t efi_launch_capsules(void);
> 
> #else /* CONFIG_IS_ENABLED(EFI_LOADER) */
> 
>-/* Without CONFIG_EFI_LOADER we don't have a runtime section, stub it out */
>-#define __efi_runtime_data
>-#define __efi_runtime_rodata
>-#define __efi_runtime
> static inline efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len)
> {
> 	return EFI_SUCCESS;
>@@ -118,7 +131,6 @@ static inline efi_status_t efi_launch_capsules(void)
> {
> 	return EFI_SUCCESS;
> }
>-
> #endif /* CONFIG_IS_ENABLED(EFI_LOADER) */
> 
> #if CONFIG_IS_ENABLED(EFI_BINARY_EXEC)
>@@ -641,8 +653,6 @@ efi_status_t efi_load_pe(struct efi_loaded_image_obj *handle,
> 			 struct efi_loaded_image *loaded_image_info);
> /* Called once to store the pristine gd pointer */
> void efi_save_gd(void);
>-/* Call this to relocate the runtime section to an address space */
>-void efi_runtime_relocate(ulong offset, struct efi_mem_desc *map);
> /* Call this to get image parameters */
> void efi_get_image_parameters(void **img_addr, size_t *img_size);
> /* Add a new object to the object list. */
>diff --git a/lib/efi_loader/Kconfig b/lib/efi_loader/Kconfig
>index 430bb7f0f7dc..bc5ae9086ea2 100644
>--- a/lib/efi_loader/Kconfig
>+++ b/lib/efi_loader/Kconfig
>@@ -359,6 +359,16 @@ config EFI_UNICODE_CAPITALIZATION
> 
> endif
> 
>+config EFI_RUNTIME_RELOCATE
>+	bool "Support relocation for EFI runtime service"
>+	depends on ARM || X86 || RISCV || SANDBOX

The sandbox should build on all architectures with EFI support. So for the sandbox I guess you should consider the host architecture.

>+	default y
>+	help
>+	  Select this option to enable relocation for EFI runtime service. It
>+	  enables set_virtual_address_map and convert_pointer runtime service.
>+	  It is required for OS on most architectures to make use of EFI runtime
>+	  services.
>+
> config EFI_LOADER_BOUNCE_BUFFER
> 	bool "EFI Applications use bounce buffers for DMA operations"
> 	depends on ARM64
>diff --git a/lib/efi_loader/efi_image_loader.c b/lib/efi_loader/efi_image_loader.c
>index 604243603289..cedc4d822fe7 100644
>--- a/lib/efi_loader/efi_image_loader.c
>+++ b/lib/efi_loader/efi_image_loader.c
>@@ -50,6 +50,7 @@ static int machines[] = {
> #if defined(__riscv) && (__riscv_xlen == 64)
> 	IMAGE_FILE_MACHINE_RISCV64,
> #endif
>+
> 	0 };
> 
> /**
>diff --git a/lib/efi_loader/efi_memory.c b/lib/efi_loader/efi_memory.c
>index 12cf23fa3fa8..7a1959d2409a 100644
>--- a/lib/efi_loader/efi_memory.c
>+++ b/lib/efi_loader/efi_memory.c
>@@ -908,8 +908,8 @@ __weak void efi_add_known_memory(void)
>  */
> static void add_u_boot_and_runtime(void)
> {
>-	unsigned long runtime_start, runtime_end, runtime_pages;
>-	unsigned long runtime_mask = EFI_PAGE_MASK;
>+	__maybe_unused unsigned long runtime_start, runtime_end, runtime_pages;
>+	__maybe_unused unsigned long runtime_mask = EFI_PAGE_MASK;
> 	unsigned long uboot_start, uboot_pages;
> 	unsigned long uboot_stack_size = CONFIG_STACK_SIZE;
> 
>@@ -918,7 +918,13 @@ static void add_u_boot_and_runtime(void)
> 		       uboot_stack_size) & ~EFI_PAGE_MASK;
> 	uboot_pages = ((uintptr_t)map_sysmem(gd->ram_top - 1, 0) -
> 		       uboot_start + EFI_PAGE_MASK) >> EFI_PAGE_SHIFT;
>-	efi_add_memory_map_pg(uboot_start, uboot_pages, EFI_BOOT_SERVICES_CODE,
>+	/*
>+	 * In case runtime relocate is not enabled just mark whole U-Boot
>+	 * as EFI_RUNTIME_SERVICES_CODE because all are required at runtime.
>+	 */
>+	efi_add_memory_map_pg(uboot_start, uboot_pages,
>+			      CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE) ?
>+			      EFI_BOOT_SERVICES_CODE : EFI_RUNTIME_SERVICES_CODE,
> 			      false);
> 
> #if defined(__aarch64__)
>@@ -930,6 +936,7 @@ static void add_u_boot_and_runtime(void)
> 	runtime_mask = SZ_64K - 1;
> #endif
> 
>+#if CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE)
> 	/*
> 	 * Add Runtime Services. We mark surrounding boottime code as runtime as
> 	 * well to fulfill the runtime alignment constraints but avoid padding.
>@@ -940,6 +947,7 @@ static void add_u_boot_and_runtime(void)
> 	runtime_pages = (runtime_end - runtime_start) >> EFI_PAGE_SHIFT;
> 	efi_add_memory_map_pg(runtime_start, runtime_pages,
> 			      EFI_RUNTIME_SERVICES_CODE, false);
>+#endif
> }
> 
> int efi_memory_init(void)
>diff --git a/lib/efi_loader/efi_runtime.c b/lib/efi_loader/efi_runtime.c
>index 011bcd04836d..9a6a131e5695 100644
>--- a/lib/efi_loader/efi_runtime.c
>+++ b/lib/efi_loader/efi_runtime.c
>@@ -37,6 +37,7 @@ static LIST_HEAD(efi_runtime_mmio);
> 
> static efi_status_t __efi_runtime EFIAPI efi_unimplemented(void);
> 
>+#if (CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE))
> /*
>  * TODO(sjg at chromium.org): These defines and structures should come from the ELF
>  * header for each architecture (or a generic header) rather than being repeated
>@@ -94,6 +95,7 @@ struct elf_rela {
> static __efi_runtime_data struct efi_mem_desc *efi_virtmap;
> static __efi_runtime_data efi_uintn_t efi_descriptor_count;
> static __efi_runtime_data efi_uintn_t efi_descriptor_size;
>+#endif
> 
> /*
>  * EFI runtime code lives in two stages. In the first stage, U-Boot and an EFI
>@@ -546,7 +548,7 @@ static efi_status_t __efi_runtime EFIAPI efi_query_capsule_caps_unsupported(
>  * Return:	true if the pointer points to a service function pointer in the
>  *		runtime table
>  */
>-static bool efi_is_runtime_service_pointer(void *p)
>+static bool __maybe_unused efi_is_runtime_service_pointer(void *p)
> {
> 	return (p >= (void *)&efi_runtime_services.get_time &&
> 		p <= (void *)&efi_runtime_services.query_variable_info) ||
>@@ -574,6 +576,7 @@ void efi_runtime_detach(void)
> 	efi_update_table_header_crc32(&efi_runtime_services.hdr);
> }
> 
>+#if (CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE))
> /**
>  * efi_set_virtual_address_map_runtime() - change from physical to virtual
>  *					   mapping
>@@ -910,6 +913,7 @@ static efi_status_t EFIAPI efi_set_virtual_address_map(
> out:
> 	return EFI_EXIT(ret);
> }
>+#endif
> 
> /**
>  * efi_add_runtime_mmio() - add memory-mapped IO region
>@@ -987,8 +991,13 @@ struct efi_runtime_services __efi_runtime_data efi_runtime_services = {
> 	.set_time = &efi_set_time_boottime,
> 	.get_wakeup_time = (void *)&efi_unimplemented,
> 	.set_wakeup_time = (void *)&efi_unimplemented,
>+#if (CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE))
> 	.set_virtual_address_map = &efi_set_virtual_address_map,
> 	.convert_pointer = efi_convert_pointer,
>+#else
>+	.set_virtual_address_map = (void *)&efi_unimplemented,
>+	.convert_pointer = (void *)&efi_unimplemented,
>+#endif
> 	.get_variable = efi_get_variable,
> 	.get_next_variable_name = efi_get_next_variable_name,
> 	.set_variable = efi_set_variable,
>diff --git a/lib/efi_loader/efi_var_mem.c b/lib/efi_loader/efi_var_mem.c
>index 139e16aad7c6..7afad47b9e12 100644
>--- a/lib/efi_loader/efi_var_mem.c
>+++ b/lib/efi_loader/efi_var_mem.c
>@@ -201,6 +201,7 @@ u64 __efi_runtime efi_var_mem_free(void)
> 	       sizeof(struct efi_var_entry);
> }
> 
>+#if CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE)
> /**
>  * efi_var_mem_notify_exit_boot_services() - SetVirtualMemoryMap callback
>  *
>@@ -213,12 +214,13 @@ efi_var_mem_notify_virtual_address_map(struct efi_event *event, void *context)
> 	efi_convert_pointer(0, (void **)&efi_var_buf);
> 	efi_current_var = NULL;
> }
>+#endif
> 
> efi_status_t efi_var_mem_init(void)
> {
> 	u64 memory;
> 	efi_status_t ret;
>-	struct efi_event *event;
>+	struct efi_event *event __maybe_unused;
> 
> 	ret = efi_allocate_pages(EFI_ALLOCATE_ANY_PAGES,
> 				 EFI_RUNTIME_SERVICES_DATA,
>@@ -232,11 +234,13 @@ efi_status_t efi_var_mem_init(void)
> 	efi_var_buf->length = (uintptr_t)efi_var_buf->var -
> 			      (uintptr_t)efi_var_buf;
> 
>+#if CONFIG_IS_ENABLED(EFI_RUNTIME_RELOCATE)
> 	ret = efi_create_event(EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE, TPL_CALLBACK,
> 			       efi_var_mem_notify_virtual_address_map, NULL,
> 			       NULL, &event);
> 	if (ret != EFI_SUCCESS)
> 		return ret;
>+#endif
> 	return ret;
> }
> 
>diff --git a/lib/efi_selftest/Makefile b/lib/efi_selftest/Makefile
>index 414701893f65..d707d921bc8e 100644
>--- a/lib/efi_selftest/Makefile
>+++ b/lib/efi_selftest/Makefile
>@@ -37,7 +37,6 @@ efi_selftest_memory.o \
> efi_selftest_open_protocol.o \
> efi_selftest_register_notify.o \
> efi_selftest_reset.o \
>-efi_selftest_set_virtual_address_map.o \
> efi_selftest_startimage_exit.o \
> efi_selftest_startimage_return.o \
> efi_selftest_textinput.o \
>@@ -50,6 +49,7 @@ efi_selftest_variables.o \
> efi_selftest_variables_runtime.o \
> efi_selftest_watchdog.o
> 
>+obj-$(CONFIG_EFI_RUNTIME_RELOCATE) += efi_selftest_set_virtual_address_map.o
> obj-$(CONFIG_EFI_ECPT) += efi_selftest_ecpt.o
> obj-$(CONFIG_NETDEVICES) += efi_selftest_snp.o
> 
>


More information about the U-Boot mailing list