From: ard.biesheuvel@linaro.org (Ard Biesheuvel)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v3 06/13] efi: register iomem resources for UEFI reserved regions
Date: Tue, 18 Nov 2014 13:57:05 +0100 [thread overview]
Message-ID: <1416315432-8534-7-git-send-email-ard.biesheuvel@linaro.org> (raw)
In-Reply-To: <1416315432-8534-1-git-send-email-ard.biesheuvel@linaro.org>
Register memory regions reserved by UEFI as IORESOURCE_MEM resources,
so that they are reserved for other uses, and also makes them turn up
in /proc/iomem.
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
---
drivers/firmware/efi/virtmap.c | 36 ++++++++++++++++++++++++++++++++++++
1 file changed, 36 insertions(+)
diff --git a/drivers/firmware/efi/virtmap.c b/drivers/firmware/efi/virtmap.c
index d1f1d416944f..98735fb43581 100644
--- a/drivers/firmware/efi/virtmap.c
+++ b/drivers/firmware/efi/virtmap.c
@@ -13,6 +13,7 @@
#include <linux/rwsem.h>
#include <linux/spinlock.h>
#include <linux/atomic.h>
+#include <linux/bootmem.h>
#include <asm/efi.h>
#include <asm/pgtable.h>
@@ -52,6 +53,39 @@ static pgprot_t efi_md_access_prot(efi_memory_desc_t *md, pgprot_t prot)
return pgprot_device(prot);
}
+static __init void efi_register_mem_resource(efi_memory_desc_t *md)
+{
+ struct resource *res, *parent;
+
+ res = alloc_bootmem_low(sizeof(*res));
+ res->start = md->phys_addr;
+ res->end = res->start + (md->num_pages << EFI_PAGE_SHIFT) - 1;
+ res->flags = IORESOURCE_MEM;
+
+ if (md->type == EFI_MEMORY_MAPPED_IO &&
+ (md->attribute & EFI_MEMORY_RUNTIME)) {
+ /*
+ * Device regions with the EFI_MEMORY_RUNTIME attribute
+ * are owned by the UEFI firmware, so make sure they are
+ * tagged as exclusive: this will also prevent access
+ * via /dev/mem if CONFIG_STRICT_DEVMEM is in effect.
+ */
+ res->name = "UEFI Runtime I/O";
+ res->flags |= IORESOURCE_EXCLUSIVE;
+ } else {
+ res->name = "UEFI Reserved";
+ }
+
+ /*
+ * Try to register this resource at the top level. If it conflicts with
+ * an existing entry ('System RAM', most likely), register it as its
+ * child instead.
+ */
+ parent = request_resource_conflict(&iomem_resource, res);
+ if (parent)
+ request_resource(parent, res);
+}
+
void __init efi_virtmap_init(void)
{
efi_memory_desc_t *md;
@@ -63,6 +97,8 @@ void __init efi_virtmap_init(void)
u64 paddr, npages, size;
pgprot_t prot;
+ if (!efi_mem_is_usable_region(md))
+ efi_register_mem_resource(md);
if (!(md->attribute & EFI_MEMORY_RUNTIME))
continue;
if (WARN(md->virt_addr == 0,
--
1.8.3.2
next prev parent reply other threads:[~2014-11-18 12:57 UTC|newest]
Thread overview: 32+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-11-18 12:56 [PATCH v3 00/13] arm64: stable UEFI mappings for kexec Ard Biesheuvel
2014-11-18 12:57 ` [PATCH v3 01/13] arm64/mm: add explicit struct_mm argument to __create_mapping() Ard Biesheuvel
2014-11-18 12:57 ` [PATCH v3 02/13] arm64/mm: add create_pgd_mapping() to create private page tables Ard Biesheuvel
2014-11-25 14:32 ` Will Deacon
2014-11-18 12:57 ` [PATCH v3 03/13] arm64: improve CONFIG_STRICT_DEVMEM handling Ard Biesheuvel
2014-11-25 17:39 ` Matt Fleming
2014-11-25 17:48 ` Borislav Petkov
2014-11-26 9:30 ` Dave Young
2014-11-26 16:23 ` Ard Biesheuvel
2014-11-27 6:22 ` Dave Young
2014-11-18 12:57 ` [PATCH v3 04/13] efi: split off remapping code from efi_config_init() Ard Biesheuvel
2014-11-25 17:24 ` Matt Fleming
2014-11-25 17:48 ` Will Deacon
2014-11-18 12:57 ` [PATCH v3 05/13] efi: add common infrastructure for stub-installed virtual mapping Ard Biesheuvel
2014-11-18 12:57 ` Ard Biesheuvel [this message]
2014-11-18 12:57 ` [PATCH v3 07/13] arm64/efi: move SetVirtualAddressMap() to UEFI stub Ard Biesheuvel
2014-11-18 12:57 ` [PATCH v3 08/13] arm64/efi: remove free_boot_services() and friends Ard Biesheuvel
2014-11-18 12:57 ` [PATCH v3 09/13] arm64/efi: remove idmap manipulations from UEFI code Ard Biesheuvel
2014-11-18 12:57 ` [PATCH v3 10/13] arm64/efi: use UEFI memory map unconditionally if available Ard Biesheuvel
2014-11-18 12:57 ` [PATCH v3 11/13] arm64/efi: use plain memblock API for adding and removing reserved RAM Ard Biesheuvel
2014-11-20 17:28 ` Mark Salter
2014-11-20 17:38 ` Ard Biesheuvel
2014-11-20 17:54 ` Mark Salter
2014-11-21 12:07 ` Ard Biesheuvel
2014-11-21 15:21 ` Mark Salter
2014-11-26 16:59 ` Ard Biesheuvel
2014-11-18 12:57 ` [PATCH v3 12/13] efi: efistub: allow allocation alignment larger than EFI_PAGE_SIZE Ard Biesheuvel
2014-11-27 17:30 ` Matt Fleming
2014-11-18 12:57 ` [PATCH v3 13/13] arm64/efi: set EFI_ALLOC_ALIGN to 64 KB Ard Biesheuvel
2014-11-20 1:27 ` [PATCH v3 00/13] arm64: stable UEFI mappings for kexec Geoff Levand
2014-11-20 22:05 ` Geoff Levand
2014-11-22 8:49 ` Ard Biesheuvel
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1416315432-8534-7-git-send-email-ard.biesheuvel@linaro.org \
--to=ard.biesheuvel@linaro.org \
--cc=linux-arm-kernel@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).