/* $OpenBSD: efi_machdep.c,v 1.7 2023/07/08 07:18:39 kettenis Exp $ */ /* * Copyright (c) 2022 Mark Kettenis * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include #include #include #include #include #include #include extern paddr_t cr3_reuse_pcid; #include #include extern EFI_MEMORY_DESCRIPTOR *mmap; int efi_match(struct device *, void *, void *); void efi_attach(struct device *, struct device *, void *); const struct cfattach efi_ca = { sizeof(struct efi_softc), efi_match, efi_attach }; void efi_map_runtime(struct efi_softc *); label_t efi_jmpbuf; int efi_match(struct device *parent, void *match, void *aux) { struct bios_attach_args *ba = aux; struct cfdata *cf = match; if (strcmp(ba->ba_name, cf->cf_driver->cd_name) == 0 && bios_efiinfo->system_table != 0) return 1; return 0; } void efi_attach(struct device *parent, struct device *self, void *aux) { struct efi_softc *sc = (struct efi_softc *)self; struct bios_attach_args *ba = aux; uint32_t mmap_desc_ver = bios_efiinfo->mmap_desc_ver; uint64_t system_table; bus_space_handle_t memh; EFI_SYSTEM_TABLE *st; uint16_t major, minor; int i; if (mmap_desc_ver != EFI_MEMORY_DESCRIPTOR_VERSION) { printf(": unsupported memory descriptor version %d\n", mmap_desc_ver); return; } system_table = bios_efiinfo->system_table; KASSERT(system_table); if (bus_space_map(ba->ba_memt, system_table, sizeof(EFI_SYSTEM_TABLE), BUS_SPACE_MAP_LINEAR | BUS_SPACE_MAP_CACHEABLE, &memh)) { printf(": can't map system table\n"); return; } st = bus_space_vaddr(ba->ba_memt, memh); sc->sc_rs = st->RuntimeServices; major = st->Hdr.Revision >> 16; minor = st->Hdr.Revision & 0xffff; printf(": UEFI %d.%d", major, minor / 10); if (minor % 10) printf(".%d", minor % 10); printf("\n"); /* Early implementations can be buggy. */ if (major < 2 || (major == 2 && minor < 10)) return; if ((bios_efiinfo->flags & BEI_64BIT) == 0) return; if (bios_efiinfo->flags & BEI_ESRT) sc->sc_esrt = (void *)bios_efiinfo->config_esrt; efi_map_runtime(sc); /* * Activate our pmap such that we can access the * FirmwareVendor and ConfigurationTable fields. */ efi_enter(sc); if (st->FirmwareVendor) { printf("%s: ", sc->sc_dev.dv_xname); for (i = 0; st->FirmwareVendor[i]; i++) printf("%c", st->FirmwareVendor[i]); printf(" rev 0x%x\n", st->FirmwareRevision); } efi_leave(sc); } void efi_map_runtime(struct efi_softc *sc) { uint32_t mmap_size = bios_efiinfo->mmap_size; uint32_t mmap_desc_size = bios_efiinfo->mmap_desc_size; EFI_MEMORY_DESCRIPTOR *desc; int i; /* * We don't really want some random executable non-OpenBSD * code lying around in kernel space. So create a separate * pmap and only activate it when we call runtime services. */ sc->sc_pm = pmap_create(); desc = mmap; for (i = 0; i < mmap_size / mmap_desc_size; i++) { if (desc->Attribute & EFI_MEMORY_RUNTIME) { vaddr_t va = desc->VirtualStart; paddr_t pa = desc->PhysicalStart; int npages = desc->NumberOfPages; vm_prot_t prot = PROT_READ | PROT_WRITE; #ifdef EFI_DEBUG printf("type 0x%x pa 0x%llx va 0x%llx pages 0x%llx attr 0x%llx\n", desc->Type, desc->PhysicalStart, desc->VirtualStart, desc->NumberOfPages, desc->Attribute); #endif /* * If the virtual address is still zero, use * an identity mapping. */ if (va == 0) va = pa; /* * Normal memory is expected to be "write * back" cacheable. Everything else is mapped * as device memory. */ if ((desc->Attribute & EFI_MEMORY_WB) == 0) pa |= PMAP_NOCACHE; /* * Only make pages marked as runtime service code * executable. This violates the standard but it * seems we can get away with it. */ if (desc->Type == EfiRuntimeServicesCode) prot |= PROT_EXEC; if (desc->Attribute & EFI_MEMORY_RP) prot &= ~PROT_READ; if (desc->Attribute & EFI_MEMORY_XP) prot &= ~PROT_EXEC; if (desc->Attribute & EFI_MEMORY_RO) prot &= ~PROT_WRITE; while (npages--) { pmap_enter(sc->sc_pm, va, pa, prot, prot | PMAP_WIRED | PMAP_EFI); va += PAGE_SIZE; pa += PAGE_SIZE; } } desc = NextMemoryDescriptor(desc, mmap_desc_size); } } void efi_fault(void) { longjmp(&efi_jmpbuf); } __asm(".pushsection .nofault, \"a\"; .quad efi_fault; .popsection"); void efi_enter(struct efi_softc *sc) { sc->sc_psw = intr_disable(); sc->sc_cr3 = rcr3() | cr3_reuse_pcid; lcr3(sc->sc_pm->pm_pdirpa | (pmap_use_pcid ? PCID_EFI : 0)); fpu_kernel_enter(); curpcb->pcb_onfault = (void *)efi_fault; if (curcpu()->ci_feature_sefflags_edx & SEFF0EDX_IBT) lcr4(rcr4() & ~CR4_CET); } void efi_leave(struct efi_softc *sc) { if (curcpu()->ci_feature_sefflags_edx & SEFF0EDX_IBT) lcr4(rcr4() | CR4_CET); curpcb->pcb_onfault = NULL; fpu_kernel_exit(); lcr3(sc->sc_cr3); intr_restore(sc->sc_psw); }