blob: 03cb12775043f0da051c52b0e893dd4d8c8c0a13 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001/* SPDX-License-Identifier: GPL-2.0 */
H. Peter Anvin1965aae2008-10-22 22:26:29 -07002#ifndef _ASM_X86_EFI_H
3#define _ASM_X86_EFI_H
Huang, Ying5b836832008-01-30 13:31:19 +01004
Ingo Molnardf6b35f2015-04-24 02:46:00 +02005#include <asm/fpu/api.h>
Mark Rutland97883752016-04-25 21:07:11 +01006#include <asm/processor-flags.h>
Matt Flemingc9f2a9a2015-11-27 21:09:33 +00007#include <asm/tlb.h>
David Woodhousedd844412018-02-19 10:50:54 +00008#include <asm/nospec-branch.h>
Sai Praneeth7e904a92018-03-12 08:44:56 +00009#include <asm/mmu_context.h>
Arvind Sankar14b864f2020-01-03 12:39:48 +010010#include <linux/build_bug.h>
Arvind Sankar9b47c522020-05-18 15:07:10 -040011#include <linux/kernel.h>
Mike Rapoport65fddcf2020-06-08 21:32:42 -070012#include <linux/pgtable.h>
Ingo Molnar744937b0b2015-03-03 07:48:50 +010013
Ard Biesheuvel9cd437a2020-01-20 17:23:21 +010014extern unsigned long efi_fw_vendor, efi_config_table;
Ard Biesheuvel3e1e00c2021-01-19 15:16:27 +010015extern unsigned long efi_mixed_mode_stack_pa;
Ard Biesheuvel9cd437a2020-01-20 17:23:21 +010016
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +010017/*
18 * We map the EFI regions needed for runtime services non-contiguously,
19 * with preserved alignment on virtual addresses starting from -4G down
20 * for a total max space of 64G. This way, we provide for stable runtime
21 * services addresses across kernels so that a kexec'd kernel can still
22 * use them.
23 *
24 * This is the main reason why we're doing stable VA mappings for RT
25 * services.
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +010026 */
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +010027
Matt Flemingb8ff87a2014-01-10 15:54:31 +000028#define EFI32_LOADER_SIGNATURE "EL32"
29#define EFI64_LOADER_SIGNATURE "EL64"
30
Mark Rutland97883752016-04-25 21:07:11 +010031#define ARCH_EFI_IRQ_FLAGS_MASK X86_EFLAGS_IF
Huang, Yinge4297952008-01-30 13:31:19 +010032
Arvind Sankar14b864f2020-01-03 12:39:48 +010033/*
34 * The EFI services are called through variadic functions in many cases. These
35 * functions are implemented in assembler and support only a fixed number of
36 * arguments. The macros below allows us to check at build time that we don't
37 * try to call them with too many arguments.
38 *
39 * __efi_nargs() will return the number of arguments if it is 7 or less, and
40 * cause a BUILD_BUG otherwise. The limitations of the C preprocessor make it
41 * impossible to calculate the exact number of arguments beyond some
42 * pre-defined limit. The maximum number of arguments currently supported by
43 * any of the thunks is 7, so this is good enough for now and can be extended
44 * in the obvious way if we ever need more.
45 */
46
47#define __efi_nargs(...) __efi_nargs_(__VA_ARGS__)
48#define __efi_nargs_(...) __efi_nargs__(0, ##__VA_ARGS__, \
Ard Biesheuvel44f155b2021-11-19 13:47:43 +020049 __efi_arg_sentinel(9), __efi_arg_sentinel(8), \
Arvind Sankar14b864f2020-01-03 12:39:48 +010050 __efi_arg_sentinel(7), __efi_arg_sentinel(6), \
51 __efi_arg_sentinel(5), __efi_arg_sentinel(4), \
52 __efi_arg_sentinel(3), __efi_arg_sentinel(2), \
53 __efi_arg_sentinel(1), __efi_arg_sentinel(0))
Ard Biesheuvel44f155b2021-11-19 13:47:43 +020054#define __efi_nargs__(_0, _1, _2, _3, _4, _5, _6, _7, _8, _9, n, ...) \
Arvind Sankar14b864f2020-01-03 12:39:48 +010055 __take_second_arg(n, \
Ard Biesheuvel44f155b2021-11-19 13:47:43 +020056 ({ BUILD_BUG_ON_MSG(1, "__efi_nargs limit exceeded"); 10; }))
Arvind Sankar14b864f2020-01-03 12:39:48 +010057#define __efi_arg_sentinel(n) , n
58
59/*
60 * __efi_nargs_check(f, n, ...) will cause a BUILD_BUG if the ellipsis
61 * represents more than n arguments.
62 */
63
64#define __efi_nargs_check(f, n, ...) \
65 __efi_nargs_check_(f, __efi_nargs(__VA_ARGS__), n)
66#define __efi_nargs_check_(f, p, n) __efi_nargs_check__(f, p, n)
67#define __efi_nargs_check__(f, p, n) ({ \
68 BUILD_BUG_ON_MSG( \
69 (p) > (n), \
70 #f " called with too many arguments (" #p ">" #n ")"); \
71})
72
Andy Lutomirskib0dc5532021-01-20 21:09:50 -080073static inline void efi_fpu_begin(void)
74{
75 /*
76 * The UEFI calling convention (UEFI spec 2.3.2 and 2.3.4) requires
77 * that FCW and MXCSR (64-bit) must be initialized prior to calling
78 * UEFI code. (Oddly the spec does not require that the FPU stack
79 * be empty.)
80 */
81 kernel_fpu_begin_mask(KFPU_387 | KFPU_MXCSR);
82}
83
84static inline void efi_fpu_end(void)
85{
86 kernel_fpu_end();
87}
88
Mark Rutland97883752016-04-25 21:07:11 +010089#ifdef CONFIG_X86_32
David Woodhousedd844412018-02-19 10:50:54 +000090#define arch_efi_call_virt_setup() \
91({ \
Andy Lutomirskib0dc5532021-01-20 21:09:50 -080092 efi_fpu_begin(); \
David Woodhousedd844412018-02-19 10:50:54 +000093 firmware_restrict_branch_speculation_start(); \
94})
95
96#define arch_efi_call_virt_teardown() \
97({ \
98 firmware_restrict_branch_speculation_end(); \
Andy Lutomirskib0dc5532021-01-20 21:09:50 -080099 efi_fpu_end(); \
David Woodhousedd844412018-02-19 10:50:54 +0000100})
101
Ard Biesheuvel89ed4862020-01-03 12:39:38 +0100102#define arch_efi_call_virt(p, f, args...) p->f(args)
Ricardo Neri982e2392014-03-27 15:10:41 -0700103
Huang, Ying5b836832008-01-30 13:31:19 +0100104#else /* !CONFIG_X86_32 */
105
Matt Fleming62fa6e62014-03-27 15:10:39 -0700106#define EFI_LOADER_SIGNATURE "EL64"
Huang, Ying5b836832008-01-30 13:31:19 +0100107
Arvind Sankar14b864f2020-01-03 12:39:48 +0100108extern asmlinkage u64 __efi_call(void *fp, ...);
109
110#define efi_call(...) ({ \
111 __efi_nargs_check(efi_call, 7, __VA_ARGS__); \
112 __efi_call(__VA_ARGS__); \
113})
Huang, Ying5b836832008-01-30 13:31:19 +0100114
Mark Rutlandbc25f9d2016-04-25 21:07:06 +0100115#define arch_efi_call_virt_setup() \
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +0100116({ \
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +0100117 efi_sync_low_kernel_mappings(); \
Andy Lutomirskib0dc5532021-01-20 21:09:50 -0800118 efi_fpu_begin(); \
David Woodhousedd844412018-02-19 10:50:54 +0000119 firmware_restrict_branch_speculation_start(); \
Ard Biesheuvel514b1a82021-01-19 15:05:40 +0100120 efi_enter_mm(); \
Mark Rutlandbc25f9d2016-04-25 21:07:06 +0100121})
122
Alex Thorlton80e75592016-06-25 08:20:27 +0100123#define arch_efi_call_virt(p, f, args...) \
124 efi_call((void *)p->f, args) \
Mark Rutlandbc25f9d2016-04-25 21:07:06 +0100125
126#define arch_efi_call_virt_teardown() \
127({ \
Ard Biesheuvel514b1a82021-01-19 15:05:40 +0100128 efi_leave_mm(); \
David Woodhousedd844412018-02-19 10:50:54 +0000129 firmware_restrict_branch_speculation_end(); \
Andy Lutomirskib0dc5532021-01-20 21:09:50 -0800130 efi_fpu_end(); \
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +0100131})
132
Andrey Ryabinina5238412015-10-01 15:36:48 -0700133#ifdef CONFIG_KASAN
Andrey Ryabinin769a8082015-09-22 14:59:17 -0700134/*
135 * CONFIG_KASAN may redefine memset to __memset. __memset function is present
136 * only in kernel binary. Since the EFI stub linked into a separate binary it
137 * doesn't have __memset(). So we should use standard memset from
138 * arch/x86/boot/compressed/string.c. The same applies to memcpy and memmove.
139 */
140#undef memcpy
141#undef memset
142#undef memmove
Andrey Ryabinina5238412015-10-01 15:36:48 -0700143#endif
Andrey Ryabinin769a8082015-09-22 14:59:17 -0700144
Huang, Ying5b836832008-01-30 13:31:19 +0100145#endif /* CONFIG_X86_32 */
146
Mathias Krause4e78eb052014-09-07 19:42:17 +0200147extern int __init efi_memblock_x86_reserve_range(void);
Taku Izumi0bbea1c2015-09-30 19:20:00 +0900148extern void __init efi_print_memmap(void);
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +0100149extern void __init efi_map_region(efi_memory_desc_t *md);
Dave Young3b266492013-12-20 18:02:14 +0800150extern void __init efi_map_region_fixed(efi_memory_desc_t *md);
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +0100151extern void efi_sync_low_kernel_mappings(void);
Matt Fleming67a91082015-11-27 21:09:34 +0000152extern int __init efi_alloc_page_tables(void);
Mathias Krause4e78eb052014-09-07 19:42:17 +0200153extern int __init efi_setup_page_tables(unsigned long pa_memmap, unsigned num_pages);
Sai Praneeth6d0cc882016-02-17 12:36:05 +0000154extern void __init efi_runtime_update_mappings(void);
Borislav Petkov11cc8512014-01-18 12:48:15 +0100155extern void __init efi_dump_pagetable(void);
Borislav Petkova5d90c92014-03-04 17:02:17 +0100156extern void __init efi_apply_memmap_quirks(void);
Saurabh Tangrieeb9db02014-06-02 05:18:35 -0700157extern int __init efi_reuse_config(u64 tables, int nr_tables);
158extern void efi_delete_dummy_variable(void);
Andy Lutomirskic46f5222021-02-09 18:33:46 -0800159extern void efi_crash_gracefully_on_page_fault(unsigned long phys_addr);
Sai Praneeth Prakhya47c33a02018-11-29 18:12:25 +0100160extern void efi_free_boot_services(void);
Huang, Ying5b836832008-01-30 13:31:19 +0100161
Ard Biesheuvel514b1a82021-01-19 15:05:40 +0100162void efi_enter_mm(void);
163void efi_leave_mm(void);
164
Ard Biesheuvela088b852020-04-10 09:43:20 +0200165/* kexec external ABI */
Dave Young1fec0532013-12-20 18:02:19 +0800166struct efi_setup_data {
167 u64 fw_vendor;
Ard Biesheuvela088b852020-04-10 09:43:20 +0200168 u64 __unused;
Dave Young1fec0532013-12-20 18:02:19 +0800169 u64 tables;
170 u64 smbios;
171 u64 reserved[8];
172};
173
174extern u64 efi_setup;
Dave Young1fec0532013-12-20 18:02:19 +0800175
Satoru Takeuchi6b59e362013-02-14 09:07:35 +0900176#ifdef CONFIG_EFI
Arvind Sankar14b864f2020-01-03 12:39:48 +0100177extern efi_status_t __efi64_thunk(u32, ...);
178
179#define efi64_thunk(...) ({ \
Ard Biesheuvel44f155b2021-11-19 13:47:43 +0200180 u64 __pad[3]; /* must have space for 3 args on the stack */ \
181 __efi_nargs_check(efi64_thunk, 9, __VA_ARGS__); \
182 __efi64_thunk(__VA_ARGS__, __pad); \
Arvind Sankar14b864f2020-01-03 12:39:48 +0100183})
Satoru Takeuchi6b59e362013-02-14 09:07:35 +0900184
Ard Biesheuvela8147db2019-12-24 16:10:06 +0100185static inline bool efi_is_mixed(void)
Satoru Takeuchi6b59e362013-02-14 09:07:35 +0900186{
Ard Biesheuvela8147db2019-12-24 16:10:06 +0100187 if (!IS_ENABLED(CONFIG_EFI_MIXED))
188 return false;
189 return IS_ENABLED(CONFIG_X86_64) && !efi_enabled(EFI_64BIT);
Satoru Takeuchi6b59e362013-02-14 09:07:35 +0900190}
191
Matt Fleming7d453ee2014-01-10 18:52:06 +0000192static inline bool efi_runtime_supported(void)
193{
Ard Biesheuvel6cfcd6f2020-01-03 12:39:36 +0100194 if (IS_ENABLED(CONFIG_X86_64) == efi_enabled(EFI_64BIT))
Matt Fleming7d453ee2014-01-10 18:52:06 +0000195 return true;
196
Ard Biesheuvel1f299fa2020-01-13 18:22:39 +0100197 return IS_ENABLED(CONFIG_EFI_MIXED);
Matt Fleming7d453ee2014-01-10 18:52:06 +0000198}
199
Dave Young5c12af02014-01-03 11:56:49 +0800200extern void parse_efi_setup(u64 phys_addr, u32 data_len);
Matt Fleming4f9dbcf2014-01-10 18:48:30 +0000201
Matt Fleming4f9dbcf2014-01-10 18:48:30 +0000202extern void efi_thunk_runtime_setup(void);
Ard Biesheuvel69829472020-01-03 12:39:40 +0100203efi_status_t efi_set_virtual_address_map(unsigned long memory_map_size,
204 unsigned long descriptor_size,
205 u32 descriptor_version,
Ard Biesheuvel59f2a612020-01-21 09:44:43 +0100206 efi_memory_desc_t *virtual_map,
207 unsigned long systab_phys);
Ard Biesheuvel243b6752014-11-05 17:00:56 +0100208
209/* arch specific definitions used by the stub code */
210
Arvind Sankarde8c5522020-05-04 11:02:48 -0400211#ifdef CONFIG_EFI_MIXED
212
213#define ARCH_HAS_EFISTUB_WRAPPERS
Ard Biesheuvel0a755612020-04-16 21:15:23 +0200214
215static inline bool efi_is_64bit(void)
216{
Arvind Sankarde8c5522020-05-04 11:02:48 -0400217 extern const bool efi_is64;
218
219 return efi_is64;
Ard Biesheuvel0a755612020-04-16 21:15:23 +0200220}
Lukas Wunner27571612016-09-06 08:05:32 +0200221
Ard Biesheuvelf958efe2019-12-24 16:10:09 +0100222static inline bool efi_is_native(void)
223{
Ard Biesheuvelf958efe2019-12-24 16:10:09 +0100224 return efi_is_64bit();
225}
226
227#define efi_mixed_mode_cast(attr) \
228 __builtin_choose_expr( \
229 __builtin_types_compatible_p(u32, __typeof__(attr)), \
230 (unsigned long)(attr), (attr))
231
Ard Biesheuvel99ea8b12019-12-24 16:10:22 +0100232#define efi_table_attr(inst, attr) \
233 (efi_is_native() \
234 ? inst->attr \
235 : (__typeof__(inst->attr)) \
236 efi_mixed_mode_cast(inst->mixed_mode.attr))
Lukas Wunner3552fdf2016-11-12 21:32:35 +0000237
Arvind Sankarea7d87f2020-01-03 12:39:49 +0100238/*
239 * The following macros allow translating arguments if necessary from native to
240 * mixed mode. The use case for this is to initialize the upper 32 bits of
241 * output parameters, and where the 32-bit method requires a 64-bit argument,
242 * which must be split up into two arguments to be thunked properly.
243 *
244 * As examples, the AllocatePool boot service returns the address of the
245 * allocation, but it will not set the high 32 bits of the address. To ensure
246 * that the full 64-bit address is initialized, we zero-init the address before
247 * calling the thunk.
248 *
249 * The FreePages boot service takes a 64-bit physical address even in 32-bit
250 * mode. For the thunk to work correctly, a native 64-bit call of
251 * free_pages(addr, size)
252 * must be translated to
253 * efi64_thunk(free_pages, addr & U32_MAX, addr >> 32, size)
254 * so that the two 32-bit halves of addr get pushed onto the stack separately.
255 */
256
257static inline void *efi64_zero_upper(void *p)
258{
259 ((u32 *)p)[1] = 0;
260 return p;
261}
262
Ard Biesheuvel3b8f44f2020-02-16 00:03:25 +0100263static inline u32 efi64_convert_status(efi_status_t status)
264{
265 return (u32)(status | (u64)status >> 32);
266}
267
Arvind Sankarea7d87f2020-01-03 12:39:49 +0100268#define __efi64_argmap_free_pages(addr, size) \
269 ((addr), 0, (size))
270
271#define __efi64_argmap_get_memory_map(mm_size, mm, key, size, ver) \
272 ((mm_size), (mm), efi64_zero_upper(key), efi64_zero_upper(size), (ver))
273
274#define __efi64_argmap_allocate_pool(type, size, buffer) \
275 ((type), (size), efi64_zero_upper(buffer))
276
Arvind Sankar9b47c522020-05-18 15:07:10 -0400277#define __efi64_argmap_create_event(type, tpl, f, c, event) \
278 ((type), (tpl), (f), (c), efi64_zero_upper(event))
279
280#define __efi64_argmap_set_timer(event, type, time) \
281 ((event), (type), lower_32_bits(time), upper_32_bits(time))
282
283#define __efi64_argmap_wait_for_event(num, event, index) \
284 ((num), (event), efi64_zero_upper(index))
285
Arvind Sankarea7d87f2020-01-03 12:39:49 +0100286#define __efi64_argmap_handle_protocol(handle, protocol, interface) \
287 ((handle), (protocol), efi64_zero_upper(interface))
288
289#define __efi64_argmap_locate_protocol(protocol, reg, interface) \
290 ((protocol), (reg), efi64_zero_upper(interface))
291
Ard Biesheuvelabd26862020-02-10 17:02:47 +0100292#define __efi64_argmap_locate_device_path(protocol, path, handle) \
293 ((protocol), (path), efi64_zero_upper(handle))
294
Ard Biesheuvel3b8f44f2020-02-16 00:03:25 +0100295#define __efi64_argmap_exit(handle, status, size, data) \
296 ((handle), efi64_convert_status(status), (size), (data))
297
Matthew Garrett4444f852020-01-03 12:39:50 +0100298/* PCI I/O */
299#define __efi64_argmap_get_location(protocol, seg, bus, dev, func) \
300 ((protocol), efi64_zero_upper(seg), efi64_zero_upper(bus), \
301 efi64_zero_upper(dev), efi64_zero_upper(func))
302
Ard Biesheuvel2931d522020-02-10 17:02:48 +0100303/* LoadFile */
304#define __efi64_argmap_load_file(protocol, path, policy, bufsize, buf) \
305 ((protocol), (path), (policy), efi64_zero_upper(bufsize), (buf))
306
Arvind Sankarb4b89a02020-03-19 22:00:24 -0400307/* Graphics Output Protocol */
308#define __efi64_argmap_query_mode(gop, mode, size, info) \
309 ((gop), (mode), efi64_zero_upper(size), efi64_zero_upper(info))
310
Ard Biesheuvel4da87c52021-11-19 13:47:42 +0200311/* TCG2 protocol */
312#define __efi64_argmap_hash_log_extend_event(prot, fl, addr, size, ev) \
313 ((prot), (fl), 0ULL, (u64)(addr), 0ULL, (u64)(size), 0ULL, ev)
314
Arvind Sankarea7d87f2020-01-03 12:39:49 +0100315/*
316 * The macros below handle the plumbing for the argument mapping. To add a
317 * mapping for a specific EFI method, simply define a macro
318 * __efi64_argmap_<method name>, following the examples above.
319 */
320
321#define __efi64_thunk_map(inst, func, ...) \
322 efi64_thunk(inst->mixed_mode.func, \
323 __efi64_argmap(__efi64_argmap_ ## func(__VA_ARGS__), \
324 (__VA_ARGS__)))
325
326#define __efi64_argmap(mapped, args) \
327 __PASTE(__efi64_argmap__, __efi_nargs(__efi_eat mapped))(mapped, args)
328#define __efi64_argmap__0(mapped, args) __efi_eval mapped
329#define __efi64_argmap__1(mapped, args) __efi_eval args
330
331#define __efi_eat(...)
332#define __efi_eval(...) __VA_ARGS__
333
334/* The three macros below handle dispatching via the thunk if needed */
335
Ard Biesheuvel47c0fd32019-12-24 16:10:21 +0100336#define efi_call_proto(inst, func, ...) \
Ard Biesheuvelafc4cc72019-12-24 16:10:13 +0100337 (efi_is_native() \
Ard Biesheuvel47c0fd32019-12-24 16:10:21 +0100338 ? inst->func(inst, ##__VA_ARGS__) \
Arvind Sankarea7d87f2020-01-03 12:39:49 +0100339 : __efi64_thunk_map(inst, func, inst, ##__VA_ARGS__))
Lukas Wunner3552fdf2016-11-12 21:32:35 +0000340
Ard Biesheuvel966291f2019-12-24 16:10:23 +0100341#define efi_bs_call(func, ...) \
Ard Biesheuvelafc4cc72019-12-24 16:10:13 +0100342 (efi_is_native() \
Ard Biesheuvelccc27ae2020-04-16 18:38:06 +0200343 ? efi_system_table->boottime->func(__VA_ARGS__) \
344 : __efi64_thunk_map(efi_table_attr(efi_system_table, \
345 boottime), \
346 func, __VA_ARGS__))
Ard Biesheuvel243b6752014-11-05 17:00:56 +0100347
Ard Biesheuvel966291f2019-12-24 16:10:23 +0100348#define efi_rt_call(func, ...) \
Ard Biesheuvelafc4cc72019-12-24 16:10:13 +0100349 (efi_is_native() \
Ard Biesheuvelccc27ae2020-04-16 18:38:06 +0200350 ? efi_system_table->runtime->func(__VA_ARGS__) \
351 : __efi64_thunk_map(efi_table_attr(efi_system_table, \
352 runtime), \
353 func, __VA_ARGS__))
David Howellsa2cd2f32017-02-06 11:22:40 +0000354
Arvind Sankarde8c5522020-05-04 11:02:48 -0400355#else /* CONFIG_EFI_MIXED */
356
357static inline bool efi_is_64bit(void)
358{
359 return IS_ENABLED(CONFIG_X86_64);
360}
361
362#endif /* CONFIG_EFI_MIXED */
363
Matt Fleming44be28e2014-06-13 12:39:55 +0100364extern bool efi_reboot_required(void);
Ard Biesheuvele55f31a2019-06-25 15:36:45 +0200365extern bool efi_is_table_address(unsigned long phys_addr);
Matt Fleming44be28e2014-06-13 12:39:55 +0100366
Dan Williams6950e312019-11-06 17:43:05 -0800367extern void efi_find_mirror(void);
368extern void efi_reserve_boot_services(void);
Satoru Takeuchi6b59e362013-02-14 09:07:35 +0900369#else
Dave Young5c12af02014-01-03 11:56:49 +0800370static inline void parse_efi_setup(u64 phys_addr, u32 data_len) {}
Matt Fleming44be28e2014-06-13 12:39:55 +0100371static inline bool efi_reboot_required(void)
372{
373 return false;
374}
Ard Biesheuvele55f31a2019-06-25 15:36:45 +0200375static inline bool efi_is_table_address(unsigned long phys_addr)
376{
377 return false;
378}
Dan Williams6950e312019-11-06 17:43:05 -0800379static inline void efi_find_mirror(void)
380{
381}
382static inline void efi_reserve_boot_services(void)
383{
384}
Russ Anderson7f594232008-10-03 11:59:15 -0500385#endif /* CONFIG_EFI */
386
Dan Williams199c8472019-11-06 17:43:26 -0800387#ifdef CONFIG_EFI_FAKE_MEMMAP
388extern void __init efi_fake_memmap_early(void);
389#else
390static inline void efi_fake_memmap_early(void)
391{
392}
393#endif
394
Chester Lin25519d62020-10-30 14:08:39 +0800395#define arch_ima_efi_boot_mode \
396 ({ extern struct boot_params boot_params; boot_params.secure_boot; })
397
H. Peter Anvin1965aae2008-10-22 22:26:29 -0700398#endif /* _ASM_X86_EFI_H */