Greg Kroah-Hartman | b244131 | 2017-11-01 15:07:57 +0100 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
H. Peter Anvin | 1965aae | 2008-10-22 22:26:29 -0700 | [diff] [blame] | 2 | #ifndef _ASM_X86_EFI_H |
| 3 | #define _ASM_X86_EFI_H |
Huang, Ying | 5b83683 | 2008-01-30 13:31:19 +0100 | [diff] [blame] | 4 | |
Ingo Molnar | df6b35f | 2015-04-24 02:46:00 +0200 | [diff] [blame] | 5 | #include <asm/fpu/api.h> |
Mark Rutland | 9788375 | 2016-04-25 21:07:11 +0100 | [diff] [blame] | 6 | #include <asm/processor-flags.h> |
Matt Fleming | c9f2a9a | 2015-11-27 21:09:33 +0000 | [diff] [blame] | 7 | #include <asm/tlb.h> |
David Woodhouse | dd84441 | 2018-02-19 10:50:54 +0000 | [diff] [blame] | 8 | #include <asm/nospec-branch.h> |
Sai Praneeth | 7e904a9 | 2018-03-12 08:44:56 +0000 | [diff] [blame] | 9 | #include <asm/mmu_context.h> |
Arvind Sankar | 14b864f | 2020-01-03 12:39:48 +0100 | [diff] [blame] | 10 | #include <linux/build_bug.h> |
Arvind Sankar | 9b47c52 | 2020-05-18 15:07:10 -0400 | [diff] [blame] | 11 | #include <linux/kernel.h> |
Mike Rapoport | 65fddcf | 2020-06-08 21:32:42 -0700 | [diff] [blame] | 12 | #include <linux/pgtable.h> |
Ingo Molnar | 744937b0b | 2015-03-03 07:48:50 +0100 | [diff] [blame] | 13 | |
Ard Biesheuvel | 9cd437a | 2020-01-20 17:23:21 +0100 | [diff] [blame] | 14 | extern unsigned long efi_fw_vendor, efi_config_table; |
| 15 | |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 16 | /* |
| 17 | * We map the EFI regions needed for runtime services non-contiguously, |
| 18 | * with preserved alignment on virtual addresses starting from -4G down |
| 19 | * for a total max space of 64G. This way, we provide for stable runtime |
| 20 | * services addresses across kernels so that a kexec'd kernel can still |
| 21 | * use them. |
| 22 | * |
| 23 | * This is the main reason why we're doing stable VA mappings for RT |
| 24 | * services. |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 25 | */ |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 26 | |
Matt Fleming | b8ff87a | 2014-01-10 15:54:31 +0000 | [diff] [blame] | 27 | #define EFI32_LOADER_SIGNATURE "EL32" |
| 28 | #define EFI64_LOADER_SIGNATURE "EL64" |
| 29 | |
Mark Rutland | 9788375 | 2016-04-25 21:07:11 +0100 | [diff] [blame] | 30 | #define ARCH_EFI_IRQ_FLAGS_MASK X86_EFLAGS_IF |
Huang, Ying | e429795 | 2008-01-30 13:31:19 +0100 | [diff] [blame] | 31 | |
Arvind Sankar | 14b864f | 2020-01-03 12:39:48 +0100 | [diff] [blame] | 32 | /* |
| 33 | * The EFI services are called through variadic functions in many cases. These |
| 34 | * functions are implemented in assembler and support only a fixed number of |
| 35 | * arguments. The macros below allows us to check at build time that we don't |
| 36 | * try to call them with too many arguments. |
| 37 | * |
| 38 | * __efi_nargs() will return the number of arguments if it is 7 or less, and |
| 39 | * cause a BUILD_BUG otherwise. The limitations of the C preprocessor make it |
| 40 | * impossible to calculate the exact number of arguments beyond some |
| 41 | * pre-defined limit. The maximum number of arguments currently supported by |
| 42 | * any of the thunks is 7, so this is good enough for now and can be extended |
| 43 | * in the obvious way if we ever need more. |
| 44 | */ |
| 45 | |
| 46 | #define __efi_nargs(...) __efi_nargs_(__VA_ARGS__) |
| 47 | #define __efi_nargs_(...) __efi_nargs__(0, ##__VA_ARGS__, \ |
| 48 | __efi_arg_sentinel(7), __efi_arg_sentinel(6), \ |
| 49 | __efi_arg_sentinel(5), __efi_arg_sentinel(4), \ |
| 50 | __efi_arg_sentinel(3), __efi_arg_sentinel(2), \ |
| 51 | __efi_arg_sentinel(1), __efi_arg_sentinel(0)) |
| 52 | #define __efi_nargs__(_0, _1, _2, _3, _4, _5, _6, _7, n, ...) \ |
| 53 | __take_second_arg(n, \ |
| 54 | ({ BUILD_BUG_ON_MSG(1, "__efi_nargs limit exceeded"); 8; })) |
| 55 | #define __efi_arg_sentinel(n) , n |
| 56 | |
| 57 | /* |
| 58 | * __efi_nargs_check(f, n, ...) will cause a BUILD_BUG if the ellipsis |
| 59 | * represents more than n arguments. |
| 60 | */ |
| 61 | |
| 62 | #define __efi_nargs_check(f, n, ...) \ |
| 63 | __efi_nargs_check_(f, __efi_nargs(__VA_ARGS__), n) |
| 64 | #define __efi_nargs_check_(f, p, n) __efi_nargs_check__(f, p, n) |
| 65 | #define __efi_nargs_check__(f, p, n) ({ \ |
| 66 | BUILD_BUG_ON_MSG( \ |
| 67 | (p) > (n), \ |
| 68 | #f " called with too many arguments (" #p ">" #n ")"); \ |
| 69 | }) |
| 70 | |
Mark Rutland | 9788375 | 2016-04-25 21:07:11 +0100 | [diff] [blame] | 71 | #ifdef CONFIG_X86_32 |
David Woodhouse | dd84441 | 2018-02-19 10:50:54 +0000 | [diff] [blame] | 72 | #define arch_efi_call_virt_setup() \ |
| 73 | ({ \ |
| 74 | kernel_fpu_begin(); \ |
| 75 | firmware_restrict_branch_speculation_start(); \ |
| 76 | }) |
| 77 | |
| 78 | #define arch_efi_call_virt_teardown() \ |
| 79 | ({ \ |
| 80 | firmware_restrict_branch_speculation_end(); \ |
| 81 | kernel_fpu_end(); \ |
| 82 | }) |
| 83 | |
Mark Rutland | bc25f9d | 2016-04-25 21:07:06 +0100 | [diff] [blame] | 84 | |
Ard Biesheuvel | 89ed486 | 2020-01-03 12:39:38 +0100 | [diff] [blame] | 85 | #define arch_efi_call_virt(p, f, args...) p->f(args) |
Ricardo Neri | 982e239 | 2014-03-27 15:10:41 -0700 | [diff] [blame] | 86 | |
Matt Fleming | 3e8fa26 | 2012-10-19 13:25:46 +0100 | [diff] [blame] | 87 | #define efi_ioremap(addr, size, type, attr) ioremap_cache(addr, size) |
Keith Packard | e1ad783 | 2011-12-11 16:12:42 -0800 | [diff] [blame] | 88 | |
Huang, Ying | 5b83683 | 2008-01-30 13:31:19 +0100 | [diff] [blame] | 89 | #else /* !CONFIG_X86_32 */ |
| 90 | |
Matt Fleming | 62fa6e6 | 2014-03-27 15:10:39 -0700 | [diff] [blame] | 91 | #define EFI_LOADER_SIGNATURE "EL64" |
Huang, Ying | 5b83683 | 2008-01-30 13:31:19 +0100 | [diff] [blame] | 92 | |
Arvind Sankar | 14b864f | 2020-01-03 12:39:48 +0100 | [diff] [blame] | 93 | extern asmlinkage u64 __efi_call(void *fp, ...); |
| 94 | |
| 95 | #define efi_call(...) ({ \ |
| 96 | __efi_nargs_check(efi_call, 7, __VA_ARGS__); \ |
| 97 | __efi_call(__VA_ARGS__); \ |
| 98 | }) |
Huang, Ying | 5b83683 | 2008-01-30 13:31:19 +0100 | [diff] [blame] | 99 | |
Matt Fleming | c9f2a9a | 2015-11-27 21:09:33 +0000 | [diff] [blame] | 100 | /* |
Sai Praneeth | 03781e4 | 2018-03-12 09:43:55 +0000 | [diff] [blame] | 101 | * struct efi_scratch - Scratch space used while switching to/from efi_mm |
| 102 | * @phys_stack: stack used during EFI Mixed Mode |
| 103 | * @prev_mm: store/restore stolen mm_struct while switching to/from efi_mm |
Matt Fleming | c9f2a9a | 2015-11-27 21:09:33 +0000 | [diff] [blame] | 104 | */ |
| 105 | struct efi_scratch { |
Sai Praneeth | 03781e4 | 2018-03-12 09:43:55 +0000 | [diff] [blame] | 106 | u64 phys_stack; |
| 107 | struct mm_struct *prev_mm; |
Matt Fleming | c9f2a9a | 2015-11-27 21:09:33 +0000 | [diff] [blame] | 108 | } __packed; |
| 109 | |
Mark Rutland | bc25f9d | 2016-04-25 21:07:06 +0100 | [diff] [blame] | 110 | #define arch_efi_call_virt_setup() \ |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 111 | ({ \ |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 112 | efi_sync_low_kernel_mappings(); \ |
Sebastian Andrzej Siewior | 1220999 | 2018-11-29 16:02:10 +0100 | [diff] [blame] | 113 | kernel_fpu_begin(); \ |
David Woodhouse | dd84441 | 2018-02-19 10:50:54 +0000 | [diff] [blame] | 114 | firmware_restrict_branch_speculation_start(); \ |
steve.wahl@hpe.com | 3bcf25a | 2020-07-13 16:30:07 -0500 | [diff] [blame] | 115 | efi_switch_mm(&efi_mm); \ |
Mark Rutland | bc25f9d | 2016-04-25 21:07:06 +0100 | [diff] [blame] | 116 | }) |
| 117 | |
Alex Thorlton | 80e7559 | 2016-06-25 08:20:27 +0100 | [diff] [blame] | 118 | #define arch_efi_call_virt(p, f, args...) \ |
| 119 | efi_call((void *)p->f, args) \ |
Mark Rutland | bc25f9d | 2016-04-25 21:07:06 +0100 | [diff] [blame] | 120 | |
| 121 | #define arch_efi_call_virt_teardown() \ |
| 122 | ({ \ |
steve.wahl@hpe.com | 3bcf25a | 2020-07-13 16:30:07 -0500 | [diff] [blame] | 123 | efi_switch_mm(efi_scratch.prev_mm); \ |
David Woodhouse | dd84441 | 2018-02-19 10:50:54 +0000 | [diff] [blame] | 124 | firmware_restrict_branch_speculation_end(); \ |
Sebastian Andrzej Siewior | 1220999 | 2018-11-29 16:02:10 +0100 | [diff] [blame] | 125 | kernel_fpu_end(); \ |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 126 | }) |
| 127 | |
Mathias Krause | 4e78eb05 | 2014-09-07 19:42:17 +0200 | [diff] [blame] | 128 | extern void __iomem *__init efi_ioremap(unsigned long addr, unsigned long size, |
| 129 | u32 type, u64 attribute); |
Keith Packard | e1ad783 | 2011-12-11 16:12:42 -0800 | [diff] [blame] | 130 | |
Andrey Ryabinin | a523841 | 2015-10-01 15:36:48 -0700 | [diff] [blame] | 131 | #ifdef CONFIG_KASAN |
Andrey Ryabinin | 769a808 | 2015-09-22 14:59:17 -0700 | [diff] [blame] | 132 | /* |
| 133 | * CONFIG_KASAN may redefine memset to __memset. __memset function is present |
| 134 | * only in kernel binary. Since the EFI stub linked into a separate binary it |
| 135 | * doesn't have __memset(). So we should use standard memset from |
| 136 | * arch/x86/boot/compressed/string.c. The same applies to memcpy and memmove. |
| 137 | */ |
| 138 | #undef memcpy |
| 139 | #undef memset |
| 140 | #undef memmove |
Andrey Ryabinin | a523841 | 2015-10-01 15:36:48 -0700 | [diff] [blame] | 141 | #endif |
Andrey Ryabinin | 769a808 | 2015-09-22 14:59:17 -0700 | [diff] [blame] | 142 | |
Huang, Ying | 5b83683 | 2008-01-30 13:31:19 +0100 | [diff] [blame] | 143 | #endif /* CONFIG_X86_32 */ |
| 144 | |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 145 | extern struct efi_scratch efi_scratch; |
Mathias Krause | 4e78eb05 | 2014-09-07 19:42:17 +0200 | [diff] [blame] | 146 | extern void __init efi_set_executable(efi_memory_desc_t *md, bool executable); |
| 147 | extern int __init efi_memblock_x86_reserve_range(void); |
Taku Izumi | 0bbea1c | 2015-09-30 19:20:00 +0900 | [diff] [blame] | 148 | extern void __init efi_print_memmap(void); |
Mathias Krause | 4e78eb05 | 2014-09-07 19:42:17 +0200 | [diff] [blame] | 149 | extern void __init efi_memory_uc(u64 addr, unsigned long size); |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 150 | extern void __init efi_map_region(efi_memory_desc_t *md); |
Dave Young | 3b26649 | 2013-12-20 18:02:14 +0800 | [diff] [blame] | 151 | extern void __init efi_map_region_fixed(efi_memory_desc_t *md); |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 152 | extern void efi_sync_low_kernel_mappings(void); |
Matt Fleming | 67a9108 | 2015-11-27 21:09:34 +0000 | [diff] [blame] | 153 | extern int __init efi_alloc_page_tables(void); |
Mathias Krause | 4e78eb05 | 2014-09-07 19:42:17 +0200 | [diff] [blame] | 154 | extern int __init efi_setup_page_tables(unsigned long pa_memmap, unsigned num_pages); |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 155 | extern void __init old_map_region(efi_memory_desc_t *md); |
Borislav Petkov | c55d016 | 2014-02-14 08:24:24 +0100 | [diff] [blame] | 156 | extern void __init runtime_code_page_mkexec(void); |
Sai Praneeth | 6d0cc88 | 2016-02-17 12:36:05 +0000 | [diff] [blame] | 157 | extern void __init efi_runtime_update_mappings(void); |
Borislav Petkov | 11cc851 | 2014-01-18 12:48:15 +0100 | [diff] [blame] | 158 | extern void __init efi_dump_pagetable(void); |
Borislav Petkov | a5d90c9 | 2014-03-04 17:02:17 +0100 | [diff] [blame] | 159 | extern void __init efi_apply_memmap_quirks(void); |
Saurabh Tangri | eeb9db0 | 2014-06-02 05:18:35 -0700 | [diff] [blame] | 160 | extern int __init efi_reuse_config(u64 tables, int nr_tables); |
| 161 | extern void efi_delete_dummy_variable(void); |
Sai Praneeth | 03781e4 | 2018-03-12 09:43:55 +0000 | [diff] [blame] | 162 | extern void efi_switch_mm(struct mm_struct *mm); |
Sai Praneeth | 3425d93 | 2018-09-11 12:15:22 -0700 | [diff] [blame] | 163 | extern void efi_recover_from_page_fault(unsigned long phys_addr); |
Sai Praneeth Prakhya | 47c33a0 | 2018-11-29 18:12:25 +0100 | [diff] [blame] | 164 | extern void efi_free_boot_services(void); |
Huang, Ying | 5b83683 | 2008-01-30 13:31:19 +0100 | [diff] [blame] | 165 | |
Ard Biesheuvel | a088b85 | 2020-04-10 09:43:20 +0200 | [diff] [blame] | 166 | /* kexec external ABI */ |
Dave Young | 1fec053 | 2013-12-20 18:02:19 +0800 | [diff] [blame] | 167 | struct efi_setup_data { |
| 168 | u64 fw_vendor; |
Ard Biesheuvel | a088b85 | 2020-04-10 09:43:20 +0200 | [diff] [blame] | 169 | u64 __unused; |
Dave Young | 1fec053 | 2013-12-20 18:02:19 +0800 | [diff] [blame] | 170 | u64 tables; |
| 171 | u64 smbios; |
| 172 | u64 reserved[8]; |
| 173 | }; |
| 174 | |
| 175 | extern u64 efi_setup; |
Dave Young | 1fec053 | 2013-12-20 18:02:19 +0800 | [diff] [blame] | 176 | |
Satoru Takeuchi | 6b59e36 | 2013-02-14 09:07:35 +0900 | [diff] [blame] | 177 | #ifdef CONFIG_EFI |
Arvind Sankar | 14b864f | 2020-01-03 12:39:48 +0100 | [diff] [blame] | 178 | extern efi_status_t __efi64_thunk(u32, ...); |
| 179 | |
| 180 | #define efi64_thunk(...) ({ \ |
| 181 | __efi_nargs_check(efi64_thunk, 6, __VA_ARGS__); \ |
| 182 | __efi64_thunk(__VA_ARGS__); \ |
| 183 | }) |
Satoru Takeuchi | 6b59e36 | 2013-02-14 09:07:35 +0900 | [diff] [blame] | 184 | |
Ard Biesheuvel | a8147db | 2019-12-24 16:10:06 +0100 | [diff] [blame] | 185 | static inline bool efi_is_mixed(void) |
Satoru Takeuchi | 6b59e36 | 2013-02-14 09:07:35 +0900 | [diff] [blame] | 186 | { |
Ard Biesheuvel | a8147db | 2019-12-24 16:10:06 +0100 | [diff] [blame] | 187 | if (!IS_ENABLED(CONFIG_EFI_MIXED)) |
| 188 | return false; |
| 189 | return IS_ENABLED(CONFIG_X86_64) && !efi_enabled(EFI_64BIT); |
Satoru Takeuchi | 6b59e36 | 2013-02-14 09:07:35 +0900 | [diff] [blame] | 190 | } |
| 191 | |
Matt Fleming | 7d453ee | 2014-01-10 18:52:06 +0000 | [diff] [blame] | 192 | static inline bool efi_runtime_supported(void) |
| 193 | { |
Ard Biesheuvel | 6cfcd6f | 2020-01-03 12:39:36 +0100 | [diff] [blame] | 194 | if (IS_ENABLED(CONFIG_X86_64) == efi_enabled(EFI_64BIT)) |
Matt Fleming | 7d453ee | 2014-01-10 18:52:06 +0000 | [diff] [blame] | 195 | return true; |
| 196 | |
Ard Biesheuvel | 1f299fa | 2020-01-13 18:22:39 +0100 | [diff] [blame] | 197 | return IS_ENABLED(CONFIG_EFI_MIXED); |
Matt Fleming | 7d453ee | 2014-01-10 18:52:06 +0000 | [diff] [blame] | 198 | } |
| 199 | |
Dave Young | 5c12af0 | 2014-01-03 11:56:49 +0800 | [diff] [blame] | 200 | extern void parse_efi_setup(u64 phys_addr, u32 data_len); |
Matt Fleming | 4f9dbcf | 2014-01-10 18:48:30 +0000 | [diff] [blame] | 201 | |
Ard Biesheuvel | 21289ec | 2016-04-25 21:06:50 +0100 | [diff] [blame] | 202 | extern void efifb_setup_from_dmi(struct screen_info *si, const char *opt); |
| 203 | |
Matt Fleming | 4f9dbcf | 2014-01-10 18:48:30 +0000 | [diff] [blame] | 204 | extern void efi_thunk_runtime_setup(void); |
Ard Biesheuvel | 6982947 | 2020-01-03 12:39:40 +0100 | [diff] [blame] | 205 | efi_status_t efi_set_virtual_address_map(unsigned long memory_map_size, |
| 206 | unsigned long descriptor_size, |
| 207 | u32 descriptor_version, |
Ard Biesheuvel | 59f2a61 | 2020-01-21 09:44:43 +0100 | [diff] [blame] | 208 | efi_memory_desc_t *virtual_map, |
| 209 | unsigned long systab_phys); |
Ard Biesheuvel | 243b675 | 2014-11-05 17:00:56 +0100 | [diff] [blame] | 210 | |
| 211 | /* arch specific definitions used by the stub code */ |
| 212 | |
Arvind Sankar | de8c552 | 2020-05-04 11:02:48 -0400 | [diff] [blame] | 213 | #ifdef CONFIG_EFI_MIXED |
| 214 | |
| 215 | #define ARCH_HAS_EFISTUB_WRAPPERS |
Ard Biesheuvel | 0a75561 | 2020-04-16 21:15:23 +0200 | [diff] [blame] | 216 | |
| 217 | static inline bool efi_is_64bit(void) |
| 218 | { |
Arvind Sankar | de8c552 | 2020-05-04 11:02:48 -0400 | [diff] [blame] | 219 | extern const bool efi_is64; |
| 220 | |
| 221 | return efi_is64; |
Ard Biesheuvel | 0a75561 | 2020-04-16 21:15:23 +0200 | [diff] [blame] | 222 | } |
Lukas Wunner | 2757161 | 2016-09-06 08:05:32 +0200 | [diff] [blame] | 223 | |
Ard Biesheuvel | f958efe | 2019-12-24 16:10:09 +0100 | [diff] [blame] | 224 | static inline bool efi_is_native(void) |
| 225 | { |
| 226 | if (!IS_ENABLED(CONFIG_X86_64)) |
| 227 | return true; |
| 228 | return efi_is_64bit(); |
| 229 | } |
| 230 | |
| 231 | #define efi_mixed_mode_cast(attr) \ |
| 232 | __builtin_choose_expr( \ |
| 233 | __builtin_types_compatible_p(u32, __typeof__(attr)), \ |
| 234 | (unsigned long)(attr), (attr)) |
| 235 | |
Ard Biesheuvel | 99ea8b1 | 2019-12-24 16:10:22 +0100 | [diff] [blame] | 236 | #define efi_table_attr(inst, attr) \ |
| 237 | (efi_is_native() \ |
| 238 | ? inst->attr \ |
| 239 | : (__typeof__(inst->attr)) \ |
| 240 | efi_mixed_mode_cast(inst->mixed_mode.attr)) |
Lukas Wunner | 3552fdf | 2016-11-12 21:32:35 +0000 | [diff] [blame] | 241 | |
Arvind Sankar | ea7d87f | 2020-01-03 12:39:49 +0100 | [diff] [blame] | 242 | /* |
| 243 | * The following macros allow translating arguments if necessary from native to |
| 244 | * mixed mode. The use case for this is to initialize the upper 32 bits of |
| 245 | * output parameters, and where the 32-bit method requires a 64-bit argument, |
| 246 | * which must be split up into two arguments to be thunked properly. |
| 247 | * |
| 248 | * As examples, the AllocatePool boot service returns the address of the |
| 249 | * allocation, but it will not set the high 32 bits of the address. To ensure |
| 250 | * that the full 64-bit address is initialized, we zero-init the address before |
| 251 | * calling the thunk. |
| 252 | * |
| 253 | * The FreePages boot service takes a 64-bit physical address even in 32-bit |
| 254 | * mode. For the thunk to work correctly, a native 64-bit call of |
| 255 | * free_pages(addr, size) |
| 256 | * must be translated to |
| 257 | * efi64_thunk(free_pages, addr & U32_MAX, addr >> 32, size) |
| 258 | * so that the two 32-bit halves of addr get pushed onto the stack separately. |
| 259 | */ |
| 260 | |
| 261 | static inline void *efi64_zero_upper(void *p) |
| 262 | { |
| 263 | ((u32 *)p)[1] = 0; |
| 264 | return p; |
| 265 | } |
| 266 | |
Ard Biesheuvel | 3b8f44f | 2020-02-16 00:03:25 +0100 | [diff] [blame] | 267 | static inline u32 efi64_convert_status(efi_status_t status) |
| 268 | { |
| 269 | return (u32)(status | (u64)status >> 32); |
| 270 | } |
| 271 | |
Arvind Sankar | ea7d87f | 2020-01-03 12:39:49 +0100 | [diff] [blame] | 272 | #define __efi64_argmap_free_pages(addr, size) \ |
| 273 | ((addr), 0, (size)) |
| 274 | |
| 275 | #define __efi64_argmap_get_memory_map(mm_size, mm, key, size, ver) \ |
| 276 | ((mm_size), (mm), efi64_zero_upper(key), efi64_zero_upper(size), (ver)) |
| 277 | |
| 278 | #define __efi64_argmap_allocate_pool(type, size, buffer) \ |
| 279 | ((type), (size), efi64_zero_upper(buffer)) |
| 280 | |
Arvind Sankar | 9b47c52 | 2020-05-18 15:07:10 -0400 | [diff] [blame] | 281 | #define __efi64_argmap_create_event(type, tpl, f, c, event) \ |
| 282 | ((type), (tpl), (f), (c), efi64_zero_upper(event)) |
| 283 | |
| 284 | #define __efi64_argmap_set_timer(event, type, time) \ |
| 285 | ((event), (type), lower_32_bits(time), upper_32_bits(time)) |
| 286 | |
| 287 | #define __efi64_argmap_wait_for_event(num, event, index) \ |
| 288 | ((num), (event), efi64_zero_upper(index)) |
| 289 | |
Arvind Sankar | ea7d87f | 2020-01-03 12:39:49 +0100 | [diff] [blame] | 290 | #define __efi64_argmap_handle_protocol(handle, protocol, interface) \ |
| 291 | ((handle), (protocol), efi64_zero_upper(interface)) |
| 292 | |
| 293 | #define __efi64_argmap_locate_protocol(protocol, reg, interface) \ |
| 294 | ((protocol), (reg), efi64_zero_upper(interface)) |
| 295 | |
Ard Biesheuvel | abd2686 | 2020-02-10 17:02:47 +0100 | [diff] [blame] | 296 | #define __efi64_argmap_locate_device_path(protocol, path, handle) \ |
| 297 | ((protocol), (path), efi64_zero_upper(handle)) |
| 298 | |
Ard Biesheuvel | 3b8f44f | 2020-02-16 00:03:25 +0100 | [diff] [blame] | 299 | #define __efi64_argmap_exit(handle, status, size, data) \ |
| 300 | ((handle), efi64_convert_status(status), (size), (data)) |
| 301 | |
Matthew Garrett | 4444f85 | 2020-01-03 12:39:50 +0100 | [diff] [blame] | 302 | /* PCI I/O */ |
| 303 | #define __efi64_argmap_get_location(protocol, seg, bus, dev, func) \ |
| 304 | ((protocol), efi64_zero_upper(seg), efi64_zero_upper(bus), \ |
| 305 | efi64_zero_upper(dev), efi64_zero_upper(func)) |
| 306 | |
Ard Biesheuvel | 2931d52 | 2020-02-10 17:02:48 +0100 | [diff] [blame] | 307 | /* LoadFile */ |
| 308 | #define __efi64_argmap_load_file(protocol, path, policy, bufsize, buf) \ |
| 309 | ((protocol), (path), (policy), efi64_zero_upper(bufsize), (buf)) |
| 310 | |
Arvind Sankar | b4b89a0 | 2020-03-19 22:00:24 -0400 | [diff] [blame] | 311 | /* Graphics Output Protocol */ |
| 312 | #define __efi64_argmap_query_mode(gop, mode, size, info) \ |
| 313 | ((gop), (mode), efi64_zero_upper(size), efi64_zero_upper(info)) |
| 314 | |
Arvind Sankar | ea7d87f | 2020-01-03 12:39:49 +0100 | [diff] [blame] | 315 | /* |
| 316 | * The macros below handle the plumbing for the argument mapping. To add a |
| 317 | * mapping for a specific EFI method, simply define a macro |
| 318 | * __efi64_argmap_<method name>, following the examples above. |
| 319 | */ |
| 320 | |
| 321 | #define __efi64_thunk_map(inst, func, ...) \ |
| 322 | efi64_thunk(inst->mixed_mode.func, \ |
| 323 | __efi64_argmap(__efi64_argmap_ ## func(__VA_ARGS__), \ |
| 324 | (__VA_ARGS__))) |
| 325 | |
| 326 | #define __efi64_argmap(mapped, args) \ |
| 327 | __PASTE(__efi64_argmap__, __efi_nargs(__efi_eat mapped))(mapped, args) |
| 328 | #define __efi64_argmap__0(mapped, args) __efi_eval mapped |
| 329 | #define __efi64_argmap__1(mapped, args) __efi_eval args |
| 330 | |
| 331 | #define __efi_eat(...) |
| 332 | #define __efi_eval(...) __VA_ARGS__ |
| 333 | |
| 334 | /* The three macros below handle dispatching via the thunk if needed */ |
| 335 | |
Ard Biesheuvel | 47c0fd3 | 2019-12-24 16:10:21 +0100 | [diff] [blame] | 336 | #define efi_call_proto(inst, func, ...) \ |
Ard Biesheuvel | afc4cc7 | 2019-12-24 16:10:13 +0100 | [diff] [blame] | 337 | (efi_is_native() \ |
Ard Biesheuvel | 47c0fd3 | 2019-12-24 16:10:21 +0100 | [diff] [blame] | 338 | ? inst->func(inst, ##__VA_ARGS__) \ |
Arvind Sankar | ea7d87f | 2020-01-03 12:39:49 +0100 | [diff] [blame] | 339 | : __efi64_thunk_map(inst, func, inst, ##__VA_ARGS__)) |
Lukas Wunner | 3552fdf | 2016-11-12 21:32:35 +0000 | [diff] [blame] | 340 | |
Ard Biesheuvel | 966291f | 2019-12-24 16:10:23 +0100 | [diff] [blame] | 341 | #define efi_bs_call(func, ...) \ |
Ard Biesheuvel | afc4cc7 | 2019-12-24 16:10:13 +0100 | [diff] [blame] | 342 | (efi_is_native() \ |
Ard Biesheuvel | ccc27ae | 2020-04-16 18:38:06 +0200 | [diff] [blame] | 343 | ? efi_system_table->boottime->func(__VA_ARGS__) \ |
| 344 | : __efi64_thunk_map(efi_table_attr(efi_system_table, \ |
| 345 | boottime), \ |
| 346 | func, __VA_ARGS__)) |
Ard Biesheuvel | 243b675 | 2014-11-05 17:00:56 +0100 | [diff] [blame] | 347 | |
Ard Biesheuvel | 966291f | 2019-12-24 16:10:23 +0100 | [diff] [blame] | 348 | #define efi_rt_call(func, ...) \ |
Ard Biesheuvel | afc4cc7 | 2019-12-24 16:10:13 +0100 | [diff] [blame] | 349 | (efi_is_native() \ |
Ard Biesheuvel | ccc27ae | 2020-04-16 18:38:06 +0200 | [diff] [blame] | 350 | ? efi_system_table->runtime->func(__VA_ARGS__) \ |
| 351 | : __efi64_thunk_map(efi_table_attr(efi_system_table, \ |
| 352 | runtime), \ |
| 353 | func, __VA_ARGS__)) |
David Howells | a2cd2f3 | 2017-02-06 11:22:40 +0000 | [diff] [blame] | 354 | |
Arvind Sankar | de8c552 | 2020-05-04 11:02:48 -0400 | [diff] [blame] | 355 | #else /* CONFIG_EFI_MIXED */ |
| 356 | |
| 357 | static inline bool efi_is_64bit(void) |
| 358 | { |
| 359 | return IS_ENABLED(CONFIG_X86_64); |
| 360 | } |
| 361 | |
| 362 | #endif /* CONFIG_EFI_MIXED */ |
| 363 | |
Matt Fleming | 44be28e | 2014-06-13 12:39:55 +0100 | [diff] [blame] | 364 | extern bool efi_reboot_required(void); |
Ard Biesheuvel | e55f31a | 2019-06-25 15:36:45 +0200 | [diff] [blame] | 365 | extern bool efi_is_table_address(unsigned long phys_addr); |
Matt Fleming | 44be28e | 2014-06-13 12:39:55 +0100 | [diff] [blame] | 366 | |
Dan Williams | 6950e31 | 2019-11-06 17:43:05 -0800 | [diff] [blame] | 367 | extern void efi_find_mirror(void); |
| 368 | extern void efi_reserve_boot_services(void); |
Satoru Takeuchi | 6b59e36 | 2013-02-14 09:07:35 +0900 | [diff] [blame] | 369 | #else |
Dave Young | 5c12af0 | 2014-01-03 11:56:49 +0800 | [diff] [blame] | 370 | static inline void parse_efi_setup(u64 phys_addr, u32 data_len) {} |
Matt Fleming | 44be28e | 2014-06-13 12:39:55 +0100 | [diff] [blame] | 371 | static inline bool efi_reboot_required(void) |
| 372 | { |
| 373 | return false; |
| 374 | } |
Ard Biesheuvel | e55f31a | 2019-06-25 15:36:45 +0200 | [diff] [blame] | 375 | static inline bool efi_is_table_address(unsigned long phys_addr) |
| 376 | { |
| 377 | return false; |
| 378 | } |
Dan Williams | 6950e31 | 2019-11-06 17:43:05 -0800 | [diff] [blame] | 379 | static inline void efi_find_mirror(void) |
| 380 | { |
| 381 | } |
| 382 | static inline void efi_reserve_boot_services(void) |
| 383 | { |
| 384 | } |
Russ Anderson | 7f59423 | 2008-10-03 11:59:15 -0500 | [diff] [blame] | 385 | #endif /* CONFIG_EFI */ |
| 386 | |
Dan Williams | 199c847 | 2019-11-06 17:43:26 -0800 | [diff] [blame] | 387 | #ifdef CONFIG_EFI_FAKE_MEMMAP |
| 388 | extern void __init efi_fake_memmap_early(void); |
| 389 | #else |
| 390 | static inline void efi_fake_memmap_early(void) |
| 391 | { |
| 392 | } |
| 393 | #endif |
| 394 | |
H. Peter Anvin | 1965aae | 2008-10-22 22:26:29 -0700 | [diff] [blame] | 395 | #endif /* _ASM_X86_EFI_H */ |