blob: fcb21e3d13c55eaa484823e08934cd9b66d02bf6 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001/* SPDX-License-Identifier: GPL-2.0 */
H. Peter Anvin1965aae2008-10-22 22:26:29 -07002#ifndef _ASM_X86_EFI_H
3#define _ASM_X86_EFI_H
Huang, Ying5b836832008-01-30 13:31:19 +01004
Ingo Molnardf6b35f2015-04-24 02:46:00 +02005#include <asm/fpu/api.h>
Ingo Molnar744937b0b2015-03-03 07:48:50 +01006#include <asm/pgtable.h>
Mark Rutland97883752016-04-25 21:07:11 +01007#include <asm/processor-flags.h>
Matt Flemingc9f2a9a2015-11-27 21:09:33 +00008#include <asm/tlb.h>
David Woodhousedd844412018-02-19 10:50:54 +00009#include <asm/nospec-branch.h>
Sai Praneeth7e904a92018-03-12 08:44:56 +000010#include <asm/mmu_context.h>
Arvind Sankar14b864f2020-01-03 12:39:48 +010011#include <linux/build_bug.h>
Ingo Molnar744937b0b2015-03-03 07:48:50 +010012
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +010013/*
14 * We map the EFI regions needed for runtime services non-contiguously,
15 * with preserved alignment on virtual addresses starting from -4G down
16 * for a total max space of 64G. This way, we provide for stable runtime
17 * services addresses across kernels so that a kexec'd kernel can still
18 * use them.
19 *
20 * This is the main reason why we're doing stable VA mappings for RT
21 * services.
22 *
Ard Biesheuvel1f299fa2020-01-13 18:22:39 +010023 * SGI UV1 machines are known to be incompatible with this scheme, so we
24 * provide an opt-out for these machines via a DMI quirk that sets the
25 * attribute below.
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +010026 */
Ard Biesheuvel1f299fa2020-01-13 18:22:39 +010027#define EFI_UV1_MEMMAP EFI_ARCH_1
28
29static inline bool efi_have_uv1_memmap(void)
30{
31 return IS_ENABLED(CONFIG_X86_UV) && efi_enabled(EFI_UV1_MEMMAP);
32}
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +010033
Matt Flemingb8ff87a2014-01-10 15:54:31 +000034#define EFI32_LOADER_SIGNATURE "EL32"
35#define EFI64_LOADER_SIGNATURE "EL64"
36
Mark Rutland97883752016-04-25 21:07:11 +010037#define ARCH_EFI_IRQ_FLAGS_MASK X86_EFLAGS_IF
Huang, Yinge4297952008-01-30 13:31:19 +010038
Arvind Sankar14b864f2020-01-03 12:39:48 +010039/*
40 * The EFI services are called through variadic functions in many cases. These
41 * functions are implemented in assembler and support only a fixed number of
42 * arguments. The macros below allows us to check at build time that we don't
43 * try to call them with too many arguments.
44 *
45 * __efi_nargs() will return the number of arguments if it is 7 or less, and
46 * cause a BUILD_BUG otherwise. The limitations of the C preprocessor make it
47 * impossible to calculate the exact number of arguments beyond some
48 * pre-defined limit. The maximum number of arguments currently supported by
49 * any of the thunks is 7, so this is good enough for now and can be extended
50 * in the obvious way if we ever need more.
51 */
52
53#define __efi_nargs(...) __efi_nargs_(__VA_ARGS__)
54#define __efi_nargs_(...) __efi_nargs__(0, ##__VA_ARGS__, \
55 __efi_arg_sentinel(7), __efi_arg_sentinel(6), \
56 __efi_arg_sentinel(5), __efi_arg_sentinel(4), \
57 __efi_arg_sentinel(3), __efi_arg_sentinel(2), \
58 __efi_arg_sentinel(1), __efi_arg_sentinel(0))
59#define __efi_nargs__(_0, _1, _2, _3, _4, _5, _6, _7, n, ...) \
60 __take_second_arg(n, \
61 ({ BUILD_BUG_ON_MSG(1, "__efi_nargs limit exceeded"); 8; }))
62#define __efi_arg_sentinel(n) , n
63
64/*
65 * __efi_nargs_check(f, n, ...) will cause a BUILD_BUG if the ellipsis
66 * represents more than n arguments.
67 */
68
69#define __efi_nargs_check(f, n, ...) \
70 __efi_nargs_check_(f, __efi_nargs(__VA_ARGS__), n)
71#define __efi_nargs_check_(f, p, n) __efi_nargs_check__(f, p, n)
72#define __efi_nargs_check__(f, p, n) ({ \
73 BUILD_BUG_ON_MSG( \
74 (p) > (n), \
75 #f " called with too many arguments (" #p ">" #n ")"); \
76})
77
Mark Rutland97883752016-04-25 21:07:11 +010078#ifdef CONFIG_X86_32
David Woodhousedd844412018-02-19 10:50:54 +000079#define arch_efi_call_virt_setup() \
80({ \
81 kernel_fpu_begin(); \
82 firmware_restrict_branch_speculation_start(); \
83})
84
85#define arch_efi_call_virt_teardown() \
86({ \
87 firmware_restrict_branch_speculation_end(); \
88 kernel_fpu_end(); \
89})
90
Mark Rutlandbc25f9d2016-04-25 21:07:06 +010091
Ard Biesheuvel89ed4862020-01-03 12:39:38 +010092#define arch_efi_call_virt(p, f, args...) p->f(args)
Ricardo Neri982e2392014-03-27 15:10:41 -070093
Matt Fleming3e8fa262012-10-19 13:25:46 +010094#define efi_ioremap(addr, size, type, attr) ioremap_cache(addr, size)
Keith Packarde1ad7832011-12-11 16:12:42 -080095
Huang, Ying5b836832008-01-30 13:31:19 +010096#else /* !CONFIG_X86_32 */
97
Matt Fleming62fa6e62014-03-27 15:10:39 -070098#define EFI_LOADER_SIGNATURE "EL64"
Huang, Ying5b836832008-01-30 13:31:19 +010099
Arvind Sankar14b864f2020-01-03 12:39:48 +0100100extern asmlinkage u64 __efi_call(void *fp, ...);
101
102#define efi_call(...) ({ \
103 __efi_nargs_check(efi_call, 7, __VA_ARGS__); \
104 __efi_call(__VA_ARGS__); \
105})
Huang, Ying5b836832008-01-30 13:31:19 +0100106
Matt Flemingc9f2a9a2015-11-27 21:09:33 +0000107/*
Sai Praneeth03781e42018-03-12 09:43:55 +0000108 * struct efi_scratch - Scratch space used while switching to/from efi_mm
109 * @phys_stack: stack used during EFI Mixed Mode
110 * @prev_mm: store/restore stolen mm_struct while switching to/from efi_mm
Matt Flemingc9f2a9a2015-11-27 21:09:33 +0000111 */
112struct efi_scratch {
Sai Praneeth03781e42018-03-12 09:43:55 +0000113 u64 phys_stack;
114 struct mm_struct *prev_mm;
Matt Flemingc9f2a9a2015-11-27 21:09:33 +0000115} __packed;
116
Mark Rutlandbc25f9d2016-04-25 21:07:06 +0100117#define arch_efi_call_virt_setup() \
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +0100118({ \
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +0100119 efi_sync_low_kernel_mappings(); \
Sebastian Andrzej Siewior12209992018-11-29 16:02:10 +0100120 kernel_fpu_begin(); \
David Woodhousedd844412018-02-19 10:50:54 +0000121 firmware_restrict_branch_speculation_start(); \
Matt Flemingc9f2a9a2015-11-27 21:09:33 +0000122 \
Ard Biesheuvel1f299fa2020-01-13 18:22:39 +0100123 if (!efi_have_uv1_memmap()) \
Sai Praneeth03781e42018-03-12 09:43:55 +0000124 efi_switch_mm(&efi_mm); \
Mark Rutlandbc25f9d2016-04-25 21:07:06 +0100125})
126
Alex Thorlton80e75592016-06-25 08:20:27 +0100127#define arch_efi_call_virt(p, f, args...) \
128 efi_call((void *)p->f, args) \
Mark Rutlandbc25f9d2016-04-25 21:07:06 +0100129
130#define arch_efi_call_virt_teardown() \
131({ \
Ard Biesheuvel1f299fa2020-01-13 18:22:39 +0100132 if (!efi_have_uv1_memmap()) \
Sai Praneeth03781e42018-03-12 09:43:55 +0000133 efi_switch_mm(efi_scratch.prev_mm); \
Matt Flemingc9f2a9a2015-11-27 21:09:33 +0000134 \
David Woodhousedd844412018-02-19 10:50:54 +0000135 firmware_restrict_branch_speculation_end(); \
Sebastian Andrzej Siewior12209992018-11-29 16:02:10 +0100136 kernel_fpu_end(); \
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +0100137})
138
Mathias Krause4e78eb052014-09-07 19:42:17 +0200139extern void __iomem *__init efi_ioremap(unsigned long addr, unsigned long size,
140 u32 type, u64 attribute);
Keith Packarde1ad7832011-12-11 16:12:42 -0800141
Andrey Ryabinina5238412015-10-01 15:36:48 -0700142#ifdef CONFIG_KASAN
Andrey Ryabinin769a8082015-09-22 14:59:17 -0700143/*
144 * CONFIG_KASAN may redefine memset to __memset. __memset function is present
145 * only in kernel binary. Since the EFI stub linked into a separate binary it
146 * doesn't have __memset(). So we should use standard memset from
147 * arch/x86/boot/compressed/string.c. The same applies to memcpy and memmove.
148 */
149#undef memcpy
150#undef memset
151#undef memmove
Andrey Ryabinina5238412015-10-01 15:36:48 -0700152#endif
Andrey Ryabinin769a8082015-09-22 14:59:17 -0700153
Huang, Ying5b836832008-01-30 13:31:19 +0100154#endif /* CONFIG_X86_32 */
155
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +0100156extern struct efi_scratch efi_scratch;
Mathias Krause4e78eb052014-09-07 19:42:17 +0200157extern void __init efi_set_executable(efi_memory_desc_t *md, bool executable);
158extern int __init efi_memblock_x86_reserve_range(void);
Taku Izumi0bbea1c2015-09-30 19:20:00 +0900159extern void __init efi_print_memmap(void);
Mathias Krause4e78eb052014-09-07 19:42:17 +0200160extern void __init efi_memory_uc(u64 addr, unsigned long size);
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +0100161extern void __init efi_map_region(efi_memory_desc_t *md);
Dave Young3b266492013-12-20 18:02:14 +0800162extern void __init efi_map_region_fixed(efi_memory_desc_t *md);
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +0100163extern void efi_sync_low_kernel_mappings(void);
Matt Fleming67a91082015-11-27 21:09:34 +0000164extern int __init efi_alloc_page_tables(void);
Mathias Krause4e78eb052014-09-07 19:42:17 +0200165extern int __init efi_setup_page_tables(unsigned long pa_memmap, unsigned num_pages);
Borislav Petkovd2f7cbe2013-10-31 17:25:08 +0100166extern void __init old_map_region(efi_memory_desc_t *md);
Borislav Petkovc55d0162014-02-14 08:24:24 +0100167extern void __init runtime_code_page_mkexec(void);
Sai Praneeth6d0cc882016-02-17 12:36:05 +0000168extern void __init efi_runtime_update_mappings(void);
Borislav Petkov11cc8512014-01-18 12:48:15 +0100169extern void __init efi_dump_pagetable(void);
Borislav Petkova5d90c92014-03-04 17:02:17 +0100170extern void __init efi_apply_memmap_quirks(void);
Saurabh Tangrieeb9db02014-06-02 05:18:35 -0700171extern int __init efi_reuse_config(u64 tables, int nr_tables);
172extern void efi_delete_dummy_variable(void);
Sai Praneeth03781e42018-03-12 09:43:55 +0000173extern void efi_switch_mm(struct mm_struct *mm);
Sai Praneeth3425d932018-09-11 12:15:22 -0700174extern void efi_recover_from_page_fault(unsigned long phys_addr);
Sai Praneeth Prakhya47c33a02018-11-29 18:12:25 +0100175extern void efi_free_boot_services(void);
Ard Biesheuvel1f299fa2020-01-13 18:22:39 +0100176extern pgd_t * __init efi_uv1_memmap_phys_prolog(void);
177extern void __init efi_uv1_memmap_phys_epilog(pgd_t *save_pgd);
Huang, Ying5b836832008-01-30 13:31:19 +0100178
Dave Young1fec0532013-12-20 18:02:19 +0800179struct efi_setup_data {
180 u64 fw_vendor;
181 u64 runtime;
182 u64 tables;
183 u64 smbios;
184 u64 reserved[8];
185};
186
187extern u64 efi_setup;
Dave Young1fec0532013-12-20 18:02:19 +0800188
Satoru Takeuchi6b59e362013-02-14 09:07:35 +0900189#ifdef CONFIG_EFI
Arvind Sankar14b864f2020-01-03 12:39:48 +0100190extern efi_status_t __efi64_thunk(u32, ...);
191
192#define efi64_thunk(...) ({ \
193 __efi_nargs_check(efi64_thunk, 6, __VA_ARGS__); \
194 __efi64_thunk(__VA_ARGS__); \
195})
Satoru Takeuchi6b59e362013-02-14 09:07:35 +0900196
Ard Biesheuvela8147db2019-12-24 16:10:06 +0100197static inline bool efi_is_mixed(void)
Satoru Takeuchi6b59e362013-02-14 09:07:35 +0900198{
Ard Biesheuvela8147db2019-12-24 16:10:06 +0100199 if (!IS_ENABLED(CONFIG_EFI_MIXED))
200 return false;
201 return IS_ENABLED(CONFIG_X86_64) && !efi_enabled(EFI_64BIT);
Satoru Takeuchi6b59e362013-02-14 09:07:35 +0900202}
203
Matt Fleming7d453ee2014-01-10 18:52:06 +0000204static inline bool efi_runtime_supported(void)
205{
Ard Biesheuvel6cfcd6f2020-01-03 12:39:36 +0100206 if (IS_ENABLED(CONFIG_X86_64) == efi_enabled(EFI_64BIT))
Matt Fleming7d453ee2014-01-10 18:52:06 +0000207 return true;
208
Ard Biesheuvel1f299fa2020-01-13 18:22:39 +0100209 return IS_ENABLED(CONFIG_EFI_MIXED);
Matt Fleming7d453ee2014-01-10 18:52:06 +0000210}
211
Dave Young5c12af02014-01-03 11:56:49 +0800212extern void parse_efi_setup(u64 phys_addr, u32 data_len);
Matt Fleming4f9dbcf2014-01-10 18:48:30 +0000213
Ard Biesheuvel21289ec2016-04-25 21:06:50 +0100214extern void efifb_setup_from_dmi(struct screen_info *si, const char *opt);
215
Matt Fleming4f9dbcf2014-01-10 18:48:30 +0000216extern void efi_thunk_runtime_setup(void);
Ard Biesheuvel69829472020-01-03 12:39:40 +0100217efi_status_t efi_set_virtual_address_map(unsigned long memory_map_size,
218 unsigned long descriptor_size,
219 u32 descriptor_version,
220 efi_memory_desc_t *virtual_map);
Ard Biesheuvel243b6752014-11-05 17:00:56 +0100221
222/* arch specific definitions used by the stub code */
223
Ard Biesheuvel796eb8d2020-01-13 18:22:33 +0100224__attribute_const__ bool efi_is_64bit(void);
Lukas Wunner27571612016-09-06 08:05:32 +0200225
Ard Biesheuvelf958efe2019-12-24 16:10:09 +0100226static inline bool efi_is_native(void)
227{
228 if (!IS_ENABLED(CONFIG_X86_64))
229 return true;
Ard Biesheuvelc3710de2019-12-24 16:10:17 +0100230 if (!IS_ENABLED(CONFIG_EFI_MIXED))
231 return true;
Ard Biesheuvelf958efe2019-12-24 16:10:09 +0100232 return efi_is_64bit();
233}
234
235#define efi_mixed_mode_cast(attr) \
236 __builtin_choose_expr( \
237 __builtin_types_compatible_p(u32, __typeof__(attr)), \
238 (unsigned long)(attr), (attr))
239
Ard Biesheuvel99ea8b12019-12-24 16:10:22 +0100240#define efi_table_attr(inst, attr) \
241 (efi_is_native() \
242 ? inst->attr \
243 : (__typeof__(inst->attr)) \
244 efi_mixed_mode_cast(inst->mixed_mode.attr))
Lukas Wunner3552fdf2016-11-12 21:32:35 +0000245
Arvind Sankarea7d87f2020-01-03 12:39:49 +0100246/*
247 * The following macros allow translating arguments if necessary from native to
248 * mixed mode. The use case for this is to initialize the upper 32 bits of
249 * output parameters, and where the 32-bit method requires a 64-bit argument,
250 * which must be split up into two arguments to be thunked properly.
251 *
252 * As examples, the AllocatePool boot service returns the address of the
253 * allocation, but it will not set the high 32 bits of the address. To ensure
254 * that the full 64-bit address is initialized, we zero-init the address before
255 * calling the thunk.
256 *
257 * The FreePages boot service takes a 64-bit physical address even in 32-bit
258 * mode. For the thunk to work correctly, a native 64-bit call of
259 * free_pages(addr, size)
260 * must be translated to
261 * efi64_thunk(free_pages, addr & U32_MAX, addr >> 32, size)
262 * so that the two 32-bit halves of addr get pushed onto the stack separately.
263 */
264
265static inline void *efi64_zero_upper(void *p)
266{
267 ((u32 *)p)[1] = 0;
268 return p;
269}
270
271#define __efi64_argmap_free_pages(addr, size) \
272 ((addr), 0, (size))
273
274#define __efi64_argmap_get_memory_map(mm_size, mm, key, size, ver) \
275 ((mm_size), (mm), efi64_zero_upper(key), efi64_zero_upper(size), (ver))
276
277#define __efi64_argmap_allocate_pool(type, size, buffer) \
278 ((type), (size), efi64_zero_upper(buffer))
279
280#define __efi64_argmap_handle_protocol(handle, protocol, interface) \
281 ((handle), (protocol), efi64_zero_upper(interface))
282
283#define __efi64_argmap_locate_protocol(protocol, reg, interface) \
284 ((protocol), (reg), efi64_zero_upper(interface))
285
Ard Biesheuvelabd26862020-02-10 17:02:47 +0100286#define __efi64_argmap_locate_device_path(protocol, path, handle) \
287 ((protocol), (path), efi64_zero_upper(handle))
288
Matthew Garrett4444f852020-01-03 12:39:50 +0100289/* PCI I/O */
290#define __efi64_argmap_get_location(protocol, seg, bus, dev, func) \
291 ((protocol), efi64_zero_upper(seg), efi64_zero_upper(bus), \
292 efi64_zero_upper(dev), efi64_zero_upper(func))
293
Ard Biesheuvel2931d522020-02-10 17:02:48 +0100294/* LoadFile */
295#define __efi64_argmap_load_file(protocol, path, policy, bufsize, buf) \
296 ((protocol), (path), (policy), efi64_zero_upper(bufsize), (buf))
297
Arvind Sankarea7d87f2020-01-03 12:39:49 +0100298/*
299 * The macros below handle the plumbing for the argument mapping. To add a
300 * mapping for a specific EFI method, simply define a macro
301 * __efi64_argmap_<method name>, following the examples above.
302 */
303
304#define __efi64_thunk_map(inst, func, ...) \
305 efi64_thunk(inst->mixed_mode.func, \
306 __efi64_argmap(__efi64_argmap_ ## func(__VA_ARGS__), \
307 (__VA_ARGS__)))
308
309#define __efi64_argmap(mapped, args) \
310 __PASTE(__efi64_argmap__, __efi_nargs(__efi_eat mapped))(mapped, args)
311#define __efi64_argmap__0(mapped, args) __efi_eval mapped
312#define __efi64_argmap__1(mapped, args) __efi_eval args
313
314#define __efi_eat(...)
315#define __efi_eval(...) __VA_ARGS__
316
317/* The three macros below handle dispatching via the thunk if needed */
318
Ard Biesheuvel47c0fd32019-12-24 16:10:21 +0100319#define efi_call_proto(inst, func, ...) \
Ard Biesheuvelafc4cc72019-12-24 16:10:13 +0100320 (efi_is_native() \
Ard Biesheuvel47c0fd32019-12-24 16:10:21 +0100321 ? inst->func(inst, ##__VA_ARGS__) \
Arvind Sankarea7d87f2020-01-03 12:39:49 +0100322 : __efi64_thunk_map(inst, func, inst, ##__VA_ARGS__))
Lukas Wunner3552fdf2016-11-12 21:32:35 +0000323
Ard Biesheuvel966291f2019-12-24 16:10:23 +0100324#define efi_bs_call(func, ...) \
Ard Biesheuvelafc4cc72019-12-24 16:10:13 +0100325 (efi_is_native() \
Ard Biesheuvel966291f2019-12-24 16:10:23 +0100326 ? efi_system_table()->boottime->func(__VA_ARGS__) \
Arvind Sankarea7d87f2020-01-03 12:39:49 +0100327 : __efi64_thunk_map(efi_table_attr(efi_system_table(), \
328 boottime), func, __VA_ARGS__))
Ard Biesheuvel243b6752014-11-05 17:00:56 +0100329
Ard Biesheuvel966291f2019-12-24 16:10:23 +0100330#define efi_rt_call(func, ...) \
Ard Biesheuvelafc4cc72019-12-24 16:10:13 +0100331 (efi_is_native() \
Ard Biesheuvel966291f2019-12-24 16:10:23 +0100332 ? efi_system_table()->runtime->func(__VA_ARGS__) \
Arvind Sankarea7d87f2020-01-03 12:39:49 +0100333 : __efi64_thunk_map(efi_table_attr(efi_system_table(), \
334 runtime), func, __VA_ARGS__))
David Howellsa2cd2f32017-02-06 11:22:40 +0000335
Matt Fleming44be28e2014-06-13 12:39:55 +0100336extern bool efi_reboot_required(void);
Ard Biesheuvele55f31a2019-06-25 15:36:45 +0200337extern bool efi_is_table_address(unsigned long phys_addr);
Matt Fleming44be28e2014-06-13 12:39:55 +0100338
Dan Williams6950e312019-11-06 17:43:05 -0800339extern void efi_find_mirror(void);
340extern void efi_reserve_boot_services(void);
Satoru Takeuchi6b59e362013-02-14 09:07:35 +0900341#else
Dave Young5c12af02014-01-03 11:56:49 +0800342static inline void parse_efi_setup(u64 phys_addr, u32 data_len) {}
Matt Fleming44be28e2014-06-13 12:39:55 +0100343static inline bool efi_reboot_required(void)
344{
345 return false;
346}
Ard Biesheuvele55f31a2019-06-25 15:36:45 +0200347static inline bool efi_is_table_address(unsigned long phys_addr)
348{
349 return false;
350}
Dan Williams6950e312019-11-06 17:43:05 -0800351static inline void efi_find_mirror(void)
352{
353}
354static inline void efi_reserve_boot_services(void)
355{
356}
Russ Anderson7f594232008-10-03 11:59:15 -0500357#endif /* CONFIG_EFI */
358
Dan Williams199c8472019-11-06 17:43:26 -0800359#ifdef CONFIG_EFI_FAKE_MEMMAP
360extern void __init efi_fake_memmap_early(void);
361#else
362static inline void efi_fake_memmap_early(void)
363{
364}
365#endif
366
H. Peter Anvin1965aae2008-10-22 22:26:29 -0700367#endif /* _ASM_X86_EFI_H */