Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2725595imm; Mon, 10 Sep 2018 05:42:17 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZqVC5JNtCinS2mfaKbVGn+zXiSEqaRCF/zQ3DPC+w90DFIQ/sSqJ8DtE7WhULKbBkaGHnr X-Received: by 2002:a17:902:b688:: with SMTP id c8-v6mr21794938pls.114.1536583337929; Mon, 10 Sep 2018 05:42:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536583337; cv=none; d=google.com; s=arc-20160816; b=KFDrnnIrq2ezC/80RWEqvzCw5ulRRzqXXypoZZU4uBwhc0FLyCnLCzaXDtswDMv/YH Q/25DkwiJz+f5K/sA4se9YaWyqHgSS71cHJAokIdE4udt+PoUVEaAbGPoVhrKS6niHjU XCcVgkMwRcSKWV63Ql871cJ42zBe/1efUKijG35eFJKdRun0aa2XjahkGtUUZ5AIshRN mC9rv9kCUKpoujmpc11RfOBcCWLfYwyaqN007s0+R4qJIlye0gLLbuk2KVG4TITCxog6 +Jhbb4CKZzdOYec8NON+bpZPeWRoimwD8/9fI0Yv9/y8oXpfgA7d2IoS0VkK0gaIK7MM YPEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=B/50CrOWV29+bSYi9nSSILbQnGMCUGd4z28sdZIJsS8=; b=nIWmLv28E6LOd3oU3E2bjvCLnuw9ad3Sw5dal+eV9zOEWXWKZsoLXcMBSC1xNOCZAy Jvx11qDyJHF/KhtBKQPX76+hJh5EckQ3JzLphLxjI7+EZF9h9vHDIa3cBkyGNtZBsc+I 4ZexmqCIqqWhm3iR7mE/WMtNlLi22wMNHbbzqPZ8xgWcqwbCLkdf1mLwCdDTxEkSke8v 94EGE/GfrOXOe9kqwspDSj3Q4n6h9gtkjsA2c4to1MfkxwZqbkAhDwCwlMvgH/5olJ9h pX1RzCc1XjOb8D+BuN90CHlTBCn5r121DHw2A+mZCf9KWRYvPiqJa3JgoF7fXZ4SfGzL 6DyQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q6-v6si15197420pgk.94.2018.09.10.05.42.02; Mon, 10 Sep 2018 05:42:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728645AbeIJRek (ORCPT + 99 others); Mon, 10 Sep 2018 13:34:40 -0400 Received: from mail.cn.fujitsu.com ([183.91.158.132]:52644 "EHLO heian.cn.fujitsu.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727649AbeIJRek (ORCPT ); Mon, 10 Sep 2018 13:34:40 -0400 X-IronPort-AV: E=Sophos;i="5.43,368,1503331200"; d="scan'208";a="44733319" Received: from unknown (HELO cn.fujitsu.com) ([10.167.33.5]) by heian.cn.fujitsu.com with ESMTP; 10 Sep 2018 20:40:35 +0800 Received: from G08CNEXCHPEKD01.g08.fujitsu.local (unknown [10.167.33.80]) by cn.fujitsu.com (Postfix) with ESMTP id 40A504B6AE18; Mon, 10 Sep 2018 20:40:36 +0800 (CST) Received: from localhost (10.167.225.56) by G08CNEXCHPEKD01.g08.fujitsu.local (10.167.33.89) with Microsoft SMTP Server id 14.3.408.0; Mon, 10 Sep 2018 20:40:39 +0800 From: Chao Fan To: , , , , , , CC: , , , Chao Fan , "Rafael J. Wysocki" , Len Brown , Ard Biesheuvel , , Subject: [PATCH v6 1/3] x86/boot: Add acpitb.c to parse acpi tables Date: Mon, 10 Sep 2018 20:40:13 +0800 Message-ID: <20180910124015.18073-2-fanc.fnst@cn.fujitsu.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180910124015.18073-1-fanc.fnst@cn.fujitsu.com> References: <20180910124015.18073-1-fanc.fnst@cn.fujitsu.com> MIME-Version: 1.0 Content-Type: text/plain X-yoursite-MailScanner-ID: 40A504B6AE18.ACCA9 X-yoursite-MailScanner: Found to be clean X-yoursite-MailScanner-From: fanc.fnst@cn.fujitsu.com X-Spam-Status: No Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Imitate the ACPI code of parsing ACPI tables to dig and read ACPI tables. Since some operations are not needed here, functions are simplified. Functions will be used to dig SRAT tables to get information of memory, so that KASLR can the memory in immovable node. And also, these functions won't influence the initialization of ACPI after start_kernel(). Signed-off-by: Chao Fan Cc: "Rafael J. Wysocki" Cc: Len Brown Cc: Ard Biesheuvel Cc: linux-efi@vger.kernel.org Cc: linux-acpi@vger.kernel.org --- arch/x86/boot/compressed/Makefile | 4 + arch/x86/boot/compressed/acpitb.c | 382 ++++++++++++++++++++++++++++++ arch/x86/boot/compressed/misc.h | 8 + 3 files changed, 394 insertions(+) create mode 100644 arch/x86/boot/compressed/acpitb.c diff --git a/arch/x86/boot/compressed/Makefile b/arch/x86/boot/compressed/Makefile index 28764dacf018..394d7d93da7a 100644 --- a/arch/x86/boot/compressed/Makefile +++ b/arch/x86/boot/compressed/Makefile @@ -83,6 +83,10 @@ ifdef CONFIG_X86_64 vmlinux-objs-y += $(obj)/pgtable_64.o endif +ifdef CONFIG_MEMORY_HOTREMOVE +vmlinux-objs-$(CONFIG_RANDOMIZE_BASE) += $(obj)/acpitb.o +endif + $(obj)/eboot.o: KBUILD_CFLAGS += -fshort-wchar -mno-red-zone vmlinux-objs-$(CONFIG_EFI_STUB) += $(obj)/eboot.o $(obj)/efi_stub_$(BITS).o \ diff --git a/arch/x86/boot/compressed/acpitb.c b/arch/x86/boot/compressed/acpitb.c new file mode 100644 index 000000000000..66c515401076 --- /dev/null +++ b/arch/x86/boot/compressed/acpitb.c @@ -0,0 +1,382 @@ +// SPDX-License-Identifier: GPL-2.0 +#define BOOT_CTYPE_H +#include "misc.h" + +#include +#include +#include +#include + +extern unsigned long get_cmd_line_ptr(void); + +#define STATIC +#include + +#ifdef CONFIG_MEMORY_HOTREMOVE +struct mem_vector { + unsigned long long start; + unsigned long long size; +}; +/* Store the immovable memory regions */ +struct mem_vector immovable_mem[MAX_NUMNODES*2]; +#endif + +#ifdef CONFIG_EFI +/* Search EFI table for rsdp table. */ +static bool efi_get_rsdp_addr(acpi_physical_address *rsdp_addr) +{ + efi_system_table_t *systab; + bool find_rsdp = false; + bool efi_64 = false; + void *config_tables; + struct efi_info *e; + char *sig; + int size; + int i; + + e = &boot_params->efi_info; + sig = (char *)&e->efi_loader_signature; + + if (!strncmp(sig, EFI64_LOADER_SIGNATURE, 4)) + efi_64 = true; + else if (!strncmp(sig, EFI32_LOADER_SIGNATURE, 4)) + efi_64 = false; + else { + debug_putstr("Wrong EFI loader signature.\n"); + return false; + } + + /* Get systab from boot params. Based on efi_init(). */ +#ifdef CONFIG_X86_32 + if (e->efi_systab_hi || e->efi_memmap_hi) { + debug_putstr("Table located above 4GB, disabling EFI.\n"); + return false; + } + systab = (efi_system_table_t *)e->efi_systab; +#else + systab = (efi_system_table_t *)( + e->efi_systab | ((__u64)e->efi_systab_hi<<32)); +#endif + + if (systab == NULL) + return false; + + /* + * Get EFI tables from systab. Based on efi_config_init() and + * efi_config_parse_tables(). Only dig the useful tables but not + * do the initialization jobs. + */ + size = efi_64 ? sizeof(efi_config_table_64_t) : + sizeof(efi_config_table_32_t); + + for (i = 0; i < systab->nr_tables; i++) { + efi_guid_t guid; + unsigned long table; + + config_tables = (void *)(systab->tables + size * i); + if (efi_64) { + efi_config_table_64_t *tmp_table; + + tmp_table = (efi_config_table_64_t *)config_tables; + guid = tmp_table->guid; + table = tmp_table->table; +#ifndef CONFIG_64BIT + if (table >> 32) { + debug_putstr("Table located above 4G, disabling EFI.\n"); + return false; + } +#endif + } else { + efi_config_table_32_t *tmp_table; + + tmp_table = (efi_config_table_32_t *)config_tables; + guid = tmp_table->guid; + table = tmp_table->table; + } + + /* + * Get rsdp from EFI tables. + * If ACPI20 table found, use it and return true. + * If ACPI20 table not found, but ACPI table found, + * use the ACPI table and return true. + * If neither ACPI table nor ACPI20 table found, + * return false. + */ + if (!(efi_guidcmp(guid, ACPI_TABLE_GUID))) { + *rsdp_addr = (acpi_physical_address)table; + find_rsdp = true; + } else if (!(efi_guidcmp(guid, ACPI_20_TABLE_GUID))) { + *rsdp_addr = (acpi_physical_address)table; + return true; + } + } + return find_rsdp; +} +#else +static bool efi_get_rsdp_addr(acpi_physical_address *rsdp_addr) +{ + return false; +} +#endif + +static u8 checksum(u8 *buffer, u32 length) +{ + u8 sum = 0; + u8 *end = buffer + length; + + while (buffer < end) + sum = (u8)(sum + *(buffer++)); + + return sum; +} + +/* + * Used to search a block of memory for the RSDP signature. + * Return Pointer to the RSDP if found, otherwise NULL. + * Based on acpi_tb_scan_memory_for_rsdp(). + */ +static u8 *scan_mem_for_rsdp(u8 *start_address, u32 length) +{ + struct acpi_table_rsdp *rsdp; + u8 *end_address; + u8 *mem_rover; + + end_address = start_address + length; + + /* Search from given start address for the requested length */ + for (mem_rover = start_address; mem_rover < end_address; + mem_rover += ACPI_RSDP_SCAN_STEP) { + /* The RSDP signature and checksum must both be correct */ + rsdp = (struct acpi_table_rsdp *)mem_rover; + if (!ACPI_VALIDATE_RSDP_SIG(rsdp->signature)) + continue; + if (checksum((u8 *) rsdp, ACPI_RSDP_CHECKSUM_LENGTH) != 0) + continue; + if ((rsdp->revision >= 2) && + (checksum((u8 *) rsdp, ACPI_RSDP_XCHECKSUM_LENGTH) != 0)) + continue; + + /* Sig and checksum valid, we have found a real RSDP */ + return mem_rover; + } + return NULL; +} + +/* + * Used to search RSDP physical address. + * Based on acpi_find_root_pointer(). Since only use physical address + * in this period, so there is no need to do the memory map jobs. + */ +static void bios_get_rsdp_addr(acpi_physical_address *rsdp_addr) +{ + struct acpi_table_rsdp *rsdp; + u8 *table_ptr; + u8 *mem_rover; + u32 address; + + /* Get the location of the Extended BIOS Data Area (EBDA) */ + table_ptr = (u8 *)ACPI_EBDA_PTR_LOCATION; + *(u32 *)(void *)&address = *(u16 *)(void *)table_ptr; + address <<= 4; + table_ptr = (u8 *)(acpi_physical_address)address; + + /* + * Search EBDA paragraphs (EBDA is required to be a minimum of + * 1K length) + */ + if (address > 0x400) { + mem_rover = scan_mem_for_rsdp(table_ptr, ACPI_EBDA_WINDOW_SIZE); + + if (mem_rover) { + address += (u32)ACPI_PTR_DIFF(mem_rover, table_ptr); + *rsdp_addr = (acpi_physical_address)address; + return; + } + } + + table_ptr = (u8 *)ACPI_HI_RSDP_WINDOW_BASE; + mem_rover = scan_mem_for_rsdp(table_ptr, ACPI_HI_RSDP_WINDOW_SIZE); + + /* + * Search upper memory: 16-byte boundaries in E0000h-FFFFFh + */ + if (mem_rover) { + address = (u32)(ACPI_HI_RSDP_WINDOW_BASE + + ACPI_PTR_DIFF(mem_rover, table_ptr)); + *rsdp_addr = (acpi_physical_address)address; + return; + } +} + +#ifdef CONFIG_KEXEC +static bool get_acpi_rsdp(acpi_physical_address *rsdp_addr) +{ + char *args = (char *)get_cmd_line_ptr(); + size_t len = strlen((char *)args); + char *tmp_cmdline, *param, *val; + unsigned long long addr = 0; + char *endptr; + + if (!strstr(args, "acpi_rsdp=")) + return false; + + tmp_cmdline = malloc(len+1); + if (!tmp_cmdline) + error("Failed to allocate space for tmp_cmdline"); + + memcpy(tmp_cmdline, args, len); + tmp_cmdline[len] = 0; + args = tmp_cmdline; + + args = skip_spaces(args); + + while (*args) { + args = next_arg(args, ¶m, &val); + + if (!val && strcmp(param, "--") == 0) { + warn("Only '--' specified in cmdline"); + free(tmp_cmdline); + return false; + } + + if (!strcmp(param, "acpi_rsdp")) { + addr = simple_strtoull(val, &endptr, 0); + + if (addr == 0) + return false; + + *rsdp_addr = (acpi_physical_address)addr; + return true; + } + } + return false; +} +#else +static bool get_acpi_rsdp(acpi_physical_address *rsdp_addr) +{ + return false; +} +#endif + +/* + * Used to dig rsdp table from EFI table or BIOS. + * If rsdp table found in EFI table, use it. Or search BIOS. + * Based on acpi_os_get_root_pointer(). + */ +static acpi_physical_address get_rsdp_addr(void) +{ + acpi_physical_address pa = 0; + bool status = false; + + status = get_acpi_rsdp(&pa); + + if (!status || pa == 0) + status = efi_get_rsdp_addr(&pa); + + if (!status || pa == 0) + bios_get_rsdp_addr(&pa); + + return pa; +} + +struct acpi_table_header *get_acpi_srat_table(void) +{ + char *args = (char *)get_cmd_line_ptr(); + acpi_physical_address acpi_table; + acpi_physical_address root_table; + struct acpi_table_header *header; + struct acpi_table_rsdp *rsdp; + char *signature; + u8 *entry; + u32 count; + u32 size; + int i, j; + u32 len; + + rsdp = (struct acpi_table_rsdp *)get_rsdp_addr(); + if (!rsdp) + return NULL; + + /* Get rsdt or xsdt from rsdp. */ + if (!strstr(args, "acpi=rsdt") && + rsdp->xsdt_physical_address && rsdp->revision > 1) { + root_table = rsdp->xsdt_physical_address; + size = ACPI_XSDT_ENTRY_SIZE; + } else { + root_table = rsdp->rsdt_physical_address; + size = ACPI_RSDT_ENTRY_SIZE; + } + + /* Get ACPI root table from rsdt or xsdt.*/ + header = (struct acpi_table_header *)root_table; + len = header->length; + count = (u32)((len - sizeof(struct acpi_table_header)) / size); + entry = ACPI_ADD_PTR(u8, header, sizeof(struct acpi_table_header)); + + for (i = 0; i < count; i++) { + u64 address64; + + if (size == ACPI_RSDT_ENTRY_SIZE) + acpi_table = ((acpi_physical_address) + (*ACPI_CAST_PTR(u32, entry))); + else { + *(u64 *)(void *)&address64 = *(u64 *)(void *)entry; + acpi_table = (acpi_physical_address) address64; + } + + if (acpi_table) { + header = (struct acpi_table_header *)acpi_table; + signature = header->signature; + + if (!strncmp(signature, "SRAT", 4)) + return header; + } + entry += size; + } + return NULL; +} + +#ifdef CONFIG_MEMORY_HOTREMOVE +/* + * According to ACPI table, filter the immvoable memory regions + * and store them in immovable_mem[]. + */ +void get_immovable_mem(void) +{ + char *args = (char *)get_cmd_line_ptr(); + struct acpi_table_header *table_header; + struct acpi_subtable_header *table; + struct acpi_srat_mem_affinity *ma; + unsigned long table_end; + int i = 0; + + if (!strstr(args, "movable_node") || strstr(args, "acpi=off")) + return; + + table_header = get_acpi_srat_table(); + if (!table_header) + return; + + table_end = (unsigned long)table_header + table_header->length; + + table = (struct acpi_subtable_header *) + ((unsigned long)table_header + sizeof(struct acpi_table_srat)); + + while (((unsigned long)table) + table->length < table_end) { + if (table->type == 1) { + ma = (struct acpi_srat_mem_affinity *)table; + if (!(ma->flags & ACPI_SRAT_MEM_HOT_PLUGGABLE)) { + immovable_mem[i].start = ma->base_address; + immovable_mem[i].size = ma->length; + i++; + } + + if (i >= MAX_NUMNODES*2) + break; + } + table = (struct acpi_subtable_header *) + ((unsigned long)table + table->length); + } + num_immovable_mem = i; +} +#endif diff --git a/arch/x86/boot/compressed/misc.h b/arch/x86/boot/compressed/misc.h index a1d5918765f3..bb395e5f88e3 100644 --- a/arch/x86/boot/compressed/misc.h +++ b/arch/x86/boot/compressed/misc.h @@ -116,3 +116,11 @@ static inline void console_init(void) void set_sev_encryption_mask(void); #endif + +/* acpitb.c */ +/* Store the amount of immovable memory regions */ +int num_immovable_mem; +#ifdef CONFIG_MEMORY_HOTREMOVE +#define ACPI_MAX_TABLES 128 +void get_immovable_mem(void); +#endif -- 2.17.1