Greg Kroah-Hartman | b244131 | 2017-11-01 15:07:57 +0100 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
H. Peter Anvin | 1965aae | 2008-10-22 22:26:29 -0700 | [diff] [blame] | 2 | #ifndef _ASM_X86_EFI_H |
| 3 | #define _ASM_X86_EFI_H |
Huang, Ying | 5b83683 | 2008-01-30 13:31:19 +0100 | [diff] [blame] | 4 | |
Ingo Molnar | df6b35f | 2015-04-24 02:46:00 +0200 | [diff] [blame] | 5 | #include <asm/fpu/api.h> |
Ingo Molnar | 744937b0b | 2015-03-03 07:48:50 +0100 | [diff] [blame] | 6 | #include <asm/pgtable.h> |
Mark Rutland | 9788375 | 2016-04-25 21:07:11 +0100 | [diff] [blame] | 7 | #include <asm/processor-flags.h> |
Matt Fleming | c9f2a9a | 2015-11-27 21:09:33 +0000 | [diff] [blame] | 8 | #include <asm/tlb.h> |
David Woodhouse | dd84441 | 2018-02-19 10:50:54 +0000 | [diff] [blame] | 9 | #include <asm/nospec-branch.h> |
Sai Praneeth | 7e904a9 | 2018-03-12 08:44:56 +0000 | [diff] [blame] | 10 | #include <asm/mmu_context.h> |
Arvind Sankar | 14b864f | 2020-01-03 12:39:48 +0100 | [diff] [blame] | 11 | #include <linux/build_bug.h> |
Ingo Molnar | 744937b0b | 2015-03-03 07:48:50 +0100 | [diff] [blame] | 12 | |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 13 | /* |
| 14 | * We map the EFI regions needed for runtime services non-contiguously, |
| 15 | * with preserved alignment on virtual addresses starting from -4G down |
| 16 | * for a total max space of 64G. This way, we provide for stable runtime |
| 17 | * services addresses across kernels so that a kexec'd kernel can still |
| 18 | * use them. |
| 19 | * |
| 20 | * This is the main reason why we're doing stable VA mappings for RT |
| 21 | * services. |
| 22 | * |
Ard Biesheuvel | 1f299fa | 2020-01-13 18:22:39 +0100 | [diff] [blame] | 23 | * SGI UV1 machines are known to be incompatible with this scheme, so we |
| 24 | * provide an opt-out for these machines via a DMI quirk that sets the |
| 25 | * attribute below. |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 26 | */ |
Ard Biesheuvel | 1f299fa | 2020-01-13 18:22:39 +0100 | [diff] [blame] | 27 | #define EFI_UV1_MEMMAP EFI_ARCH_1 |
| 28 | |
| 29 | static inline bool efi_have_uv1_memmap(void) |
| 30 | { |
| 31 | return IS_ENABLED(CONFIG_X86_UV) && efi_enabled(EFI_UV1_MEMMAP); |
| 32 | } |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 33 | |
Matt Fleming | b8ff87a | 2014-01-10 15:54:31 +0000 | [diff] [blame] | 34 | #define EFI32_LOADER_SIGNATURE "EL32" |
| 35 | #define EFI64_LOADER_SIGNATURE "EL64" |
| 36 | |
Mark Rutland | 9788375 | 2016-04-25 21:07:11 +0100 | [diff] [blame] | 37 | #define ARCH_EFI_IRQ_FLAGS_MASK X86_EFLAGS_IF |
Huang, Ying | e429795 | 2008-01-30 13:31:19 +0100 | [diff] [blame] | 38 | |
Arvind Sankar | 14b864f | 2020-01-03 12:39:48 +0100 | [diff] [blame] | 39 | /* |
| 40 | * The EFI services are called through variadic functions in many cases. These |
| 41 | * functions are implemented in assembler and support only a fixed number of |
| 42 | * arguments. The macros below allows us to check at build time that we don't |
| 43 | * try to call them with too many arguments. |
| 44 | * |
| 45 | * __efi_nargs() will return the number of arguments if it is 7 or less, and |
| 46 | * cause a BUILD_BUG otherwise. The limitations of the C preprocessor make it |
| 47 | * impossible to calculate the exact number of arguments beyond some |
| 48 | * pre-defined limit. The maximum number of arguments currently supported by |
| 49 | * any of the thunks is 7, so this is good enough for now and can be extended |
| 50 | * in the obvious way if we ever need more. |
| 51 | */ |
| 52 | |
| 53 | #define __efi_nargs(...) __efi_nargs_(__VA_ARGS__) |
| 54 | #define __efi_nargs_(...) __efi_nargs__(0, ##__VA_ARGS__, \ |
| 55 | __efi_arg_sentinel(7), __efi_arg_sentinel(6), \ |
| 56 | __efi_arg_sentinel(5), __efi_arg_sentinel(4), \ |
| 57 | __efi_arg_sentinel(3), __efi_arg_sentinel(2), \ |
| 58 | __efi_arg_sentinel(1), __efi_arg_sentinel(0)) |
| 59 | #define __efi_nargs__(_0, _1, _2, _3, _4, _5, _6, _7, n, ...) \ |
| 60 | __take_second_arg(n, \ |
| 61 | ({ BUILD_BUG_ON_MSG(1, "__efi_nargs limit exceeded"); 8; })) |
| 62 | #define __efi_arg_sentinel(n) , n |
| 63 | |
| 64 | /* |
| 65 | * __efi_nargs_check(f, n, ...) will cause a BUILD_BUG if the ellipsis |
| 66 | * represents more than n arguments. |
| 67 | */ |
| 68 | |
| 69 | #define __efi_nargs_check(f, n, ...) \ |
| 70 | __efi_nargs_check_(f, __efi_nargs(__VA_ARGS__), n) |
| 71 | #define __efi_nargs_check_(f, p, n) __efi_nargs_check__(f, p, n) |
| 72 | #define __efi_nargs_check__(f, p, n) ({ \ |
| 73 | BUILD_BUG_ON_MSG( \ |
| 74 | (p) > (n), \ |
| 75 | #f " called with too many arguments (" #p ">" #n ")"); \ |
| 76 | }) |
| 77 | |
Mark Rutland | 9788375 | 2016-04-25 21:07:11 +0100 | [diff] [blame] | 78 | #ifdef CONFIG_X86_32 |
David Woodhouse | dd84441 | 2018-02-19 10:50:54 +0000 | [diff] [blame] | 79 | #define arch_efi_call_virt_setup() \ |
| 80 | ({ \ |
| 81 | kernel_fpu_begin(); \ |
| 82 | firmware_restrict_branch_speculation_start(); \ |
| 83 | }) |
| 84 | |
| 85 | #define arch_efi_call_virt_teardown() \ |
| 86 | ({ \ |
| 87 | firmware_restrict_branch_speculation_end(); \ |
| 88 | kernel_fpu_end(); \ |
| 89 | }) |
| 90 | |
Mark Rutland | bc25f9d | 2016-04-25 21:07:06 +0100 | [diff] [blame] | 91 | |
Ard Biesheuvel | 89ed486 | 2020-01-03 12:39:38 +0100 | [diff] [blame] | 92 | #define arch_efi_call_virt(p, f, args...) p->f(args) |
Ricardo Neri | 982e239 | 2014-03-27 15:10:41 -0700 | [diff] [blame] | 93 | |
Matt Fleming | 3e8fa26 | 2012-10-19 13:25:46 +0100 | [diff] [blame] | 94 | #define efi_ioremap(addr, size, type, attr) ioremap_cache(addr, size) |
Keith Packard | e1ad783 | 2011-12-11 16:12:42 -0800 | [diff] [blame] | 95 | |
Huang, Ying | 5b83683 | 2008-01-30 13:31:19 +0100 | [diff] [blame] | 96 | #else /* !CONFIG_X86_32 */ |
| 97 | |
Matt Fleming | 62fa6e6 | 2014-03-27 15:10:39 -0700 | [diff] [blame] | 98 | #define EFI_LOADER_SIGNATURE "EL64" |
Huang, Ying | 5b83683 | 2008-01-30 13:31:19 +0100 | [diff] [blame] | 99 | |
Arvind Sankar | 14b864f | 2020-01-03 12:39:48 +0100 | [diff] [blame] | 100 | extern asmlinkage u64 __efi_call(void *fp, ...); |
| 101 | |
| 102 | #define efi_call(...) ({ \ |
| 103 | __efi_nargs_check(efi_call, 7, __VA_ARGS__); \ |
| 104 | __efi_call(__VA_ARGS__); \ |
| 105 | }) |
Huang, Ying | 5b83683 | 2008-01-30 13:31:19 +0100 | [diff] [blame] | 106 | |
Matt Fleming | c9f2a9a | 2015-11-27 21:09:33 +0000 | [diff] [blame] | 107 | /* |
Sai Praneeth | 03781e4 | 2018-03-12 09:43:55 +0000 | [diff] [blame] | 108 | * struct efi_scratch - Scratch space used while switching to/from efi_mm |
| 109 | * @phys_stack: stack used during EFI Mixed Mode |
| 110 | * @prev_mm: store/restore stolen mm_struct while switching to/from efi_mm |
Matt Fleming | c9f2a9a | 2015-11-27 21:09:33 +0000 | [diff] [blame] | 111 | */ |
| 112 | struct efi_scratch { |
Sai Praneeth | 03781e4 | 2018-03-12 09:43:55 +0000 | [diff] [blame] | 113 | u64 phys_stack; |
| 114 | struct mm_struct *prev_mm; |
Matt Fleming | c9f2a9a | 2015-11-27 21:09:33 +0000 | [diff] [blame] | 115 | } __packed; |
| 116 | |
Mark Rutland | bc25f9d | 2016-04-25 21:07:06 +0100 | [diff] [blame] | 117 | #define arch_efi_call_virt_setup() \ |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 118 | ({ \ |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 119 | efi_sync_low_kernel_mappings(); \ |
Sebastian Andrzej Siewior | 1220999 | 2018-11-29 16:02:10 +0100 | [diff] [blame] | 120 | kernel_fpu_begin(); \ |
David Woodhouse | dd84441 | 2018-02-19 10:50:54 +0000 | [diff] [blame] | 121 | firmware_restrict_branch_speculation_start(); \ |
Matt Fleming | c9f2a9a | 2015-11-27 21:09:33 +0000 | [diff] [blame] | 122 | \ |
Ard Biesheuvel | 1f299fa | 2020-01-13 18:22:39 +0100 | [diff] [blame] | 123 | if (!efi_have_uv1_memmap()) \ |
Sai Praneeth | 03781e4 | 2018-03-12 09:43:55 +0000 | [diff] [blame] | 124 | efi_switch_mm(&efi_mm); \ |
Mark Rutland | bc25f9d | 2016-04-25 21:07:06 +0100 | [diff] [blame] | 125 | }) |
| 126 | |
Alex Thorlton | 80e7559 | 2016-06-25 08:20:27 +0100 | [diff] [blame] | 127 | #define arch_efi_call_virt(p, f, args...) \ |
| 128 | efi_call((void *)p->f, args) \ |
Mark Rutland | bc25f9d | 2016-04-25 21:07:06 +0100 | [diff] [blame] | 129 | |
| 130 | #define arch_efi_call_virt_teardown() \ |
| 131 | ({ \ |
Ard Biesheuvel | 1f299fa | 2020-01-13 18:22:39 +0100 | [diff] [blame] | 132 | if (!efi_have_uv1_memmap()) \ |
Sai Praneeth | 03781e4 | 2018-03-12 09:43:55 +0000 | [diff] [blame] | 133 | efi_switch_mm(efi_scratch.prev_mm); \ |
Matt Fleming | c9f2a9a | 2015-11-27 21:09:33 +0000 | [diff] [blame] | 134 | \ |
David Woodhouse | dd84441 | 2018-02-19 10:50:54 +0000 | [diff] [blame] | 135 | firmware_restrict_branch_speculation_end(); \ |
Sebastian Andrzej Siewior | 1220999 | 2018-11-29 16:02:10 +0100 | [diff] [blame] | 136 | kernel_fpu_end(); \ |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 137 | }) |
| 138 | |
Mathias Krause | 4e78eb05 | 2014-09-07 19:42:17 +0200 | [diff] [blame] | 139 | extern void __iomem *__init efi_ioremap(unsigned long addr, unsigned long size, |
| 140 | u32 type, u64 attribute); |
Keith Packard | e1ad783 | 2011-12-11 16:12:42 -0800 | [diff] [blame] | 141 | |
Andrey Ryabinin | a523841 | 2015-10-01 15:36:48 -0700 | [diff] [blame] | 142 | #ifdef CONFIG_KASAN |
Andrey Ryabinin | 769a808 | 2015-09-22 14:59:17 -0700 | [diff] [blame] | 143 | /* |
| 144 | * CONFIG_KASAN may redefine memset to __memset. __memset function is present |
| 145 | * only in kernel binary. Since the EFI stub linked into a separate binary it |
| 146 | * doesn't have __memset(). So we should use standard memset from |
| 147 | * arch/x86/boot/compressed/string.c. The same applies to memcpy and memmove. |
| 148 | */ |
| 149 | #undef memcpy |
| 150 | #undef memset |
| 151 | #undef memmove |
Andrey Ryabinin | a523841 | 2015-10-01 15:36:48 -0700 | [diff] [blame] | 152 | #endif |
Andrey Ryabinin | 769a808 | 2015-09-22 14:59:17 -0700 | [diff] [blame] | 153 | |
Huang, Ying | 5b83683 | 2008-01-30 13:31:19 +0100 | [diff] [blame] | 154 | #endif /* CONFIG_X86_32 */ |
| 155 | |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 156 | extern struct efi_scratch efi_scratch; |
Mathias Krause | 4e78eb05 | 2014-09-07 19:42:17 +0200 | [diff] [blame] | 157 | extern void __init efi_set_executable(efi_memory_desc_t *md, bool executable); |
| 158 | extern int __init efi_memblock_x86_reserve_range(void); |
Taku Izumi | 0bbea1c | 2015-09-30 19:20:00 +0900 | [diff] [blame] | 159 | extern void __init efi_print_memmap(void); |
Mathias Krause | 4e78eb05 | 2014-09-07 19:42:17 +0200 | [diff] [blame] | 160 | extern void __init efi_memory_uc(u64 addr, unsigned long size); |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 161 | extern void __init efi_map_region(efi_memory_desc_t *md); |
Dave Young | 3b26649 | 2013-12-20 18:02:14 +0800 | [diff] [blame] | 162 | extern void __init efi_map_region_fixed(efi_memory_desc_t *md); |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 163 | extern void efi_sync_low_kernel_mappings(void); |
Matt Fleming | 67a9108 | 2015-11-27 21:09:34 +0000 | [diff] [blame] | 164 | extern int __init efi_alloc_page_tables(void); |
Mathias Krause | 4e78eb05 | 2014-09-07 19:42:17 +0200 | [diff] [blame] | 165 | extern int __init efi_setup_page_tables(unsigned long pa_memmap, unsigned num_pages); |
Borislav Petkov | d2f7cbe | 2013-10-31 17:25:08 +0100 | [diff] [blame] | 166 | extern void __init old_map_region(efi_memory_desc_t *md); |
Borislav Petkov | c55d016 | 2014-02-14 08:24:24 +0100 | [diff] [blame] | 167 | extern void __init runtime_code_page_mkexec(void); |
Sai Praneeth | 6d0cc88 | 2016-02-17 12:36:05 +0000 | [diff] [blame] | 168 | extern void __init efi_runtime_update_mappings(void); |
Borislav Petkov | 11cc851 | 2014-01-18 12:48:15 +0100 | [diff] [blame] | 169 | extern void __init efi_dump_pagetable(void); |
Borislav Petkov | a5d90c9 | 2014-03-04 17:02:17 +0100 | [diff] [blame] | 170 | extern void __init efi_apply_memmap_quirks(void); |
Saurabh Tangri | eeb9db0 | 2014-06-02 05:18:35 -0700 | [diff] [blame] | 171 | extern int __init efi_reuse_config(u64 tables, int nr_tables); |
| 172 | extern void efi_delete_dummy_variable(void); |
Sai Praneeth | 03781e4 | 2018-03-12 09:43:55 +0000 | [diff] [blame] | 173 | extern void efi_switch_mm(struct mm_struct *mm); |
Sai Praneeth | 3425d93 | 2018-09-11 12:15:22 -0700 | [diff] [blame] | 174 | extern void efi_recover_from_page_fault(unsigned long phys_addr); |
Sai Praneeth Prakhya | 47c33a0 | 2018-11-29 18:12:25 +0100 | [diff] [blame] | 175 | extern void efi_free_boot_services(void); |
Ard Biesheuvel | 1f299fa | 2020-01-13 18:22:39 +0100 | [diff] [blame] | 176 | extern pgd_t * __init efi_uv1_memmap_phys_prolog(void); |
| 177 | extern void __init efi_uv1_memmap_phys_epilog(pgd_t *save_pgd); |
Huang, Ying | 5b83683 | 2008-01-30 13:31:19 +0100 | [diff] [blame] | 178 | |
Dave Young | 1fec053 | 2013-12-20 18:02:19 +0800 | [diff] [blame] | 179 | struct efi_setup_data { |
| 180 | u64 fw_vendor; |
| 181 | u64 runtime; |
| 182 | u64 tables; |
| 183 | u64 smbios; |
| 184 | u64 reserved[8]; |
| 185 | }; |
| 186 | |
| 187 | extern u64 efi_setup; |
Dave Young | 1fec053 | 2013-12-20 18:02:19 +0800 | [diff] [blame] | 188 | |
Satoru Takeuchi | 6b59e36 | 2013-02-14 09:07:35 +0900 | [diff] [blame] | 189 | #ifdef CONFIG_EFI |
Arvind Sankar | 14b864f | 2020-01-03 12:39:48 +0100 | [diff] [blame] | 190 | extern efi_status_t __efi64_thunk(u32, ...); |
| 191 | |
| 192 | #define efi64_thunk(...) ({ \ |
| 193 | __efi_nargs_check(efi64_thunk, 6, __VA_ARGS__); \ |
| 194 | __efi64_thunk(__VA_ARGS__); \ |
| 195 | }) |
Satoru Takeuchi | 6b59e36 | 2013-02-14 09:07:35 +0900 | [diff] [blame] | 196 | |
Ard Biesheuvel | a8147db | 2019-12-24 16:10:06 +0100 | [diff] [blame] | 197 | static inline bool efi_is_mixed(void) |
Satoru Takeuchi | 6b59e36 | 2013-02-14 09:07:35 +0900 | [diff] [blame] | 198 | { |
Ard Biesheuvel | a8147db | 2019-12-24 16:10:06 +0100 | [diff] [blame] | 199 | if (!IS_ENABLED(CONFIG_EFI_MIXED)) |
| 200 | return false; |
| 201 | return IS_ENABLED(CONFIG_X86_64) && !efi_enabled(EFI_64BIT); |
Satoru Takeuchi | 6b59e36 | 2013-02-14 09:07:35 +0900 | [diff] [blame] | 202 | } |
| 203 | |
Matt Fleming | 7d453ee | 2014-01-10 18:52:06 +0000 | [diff] [blame] | 204 | static inline bool efi_runtime_supported(void) |
| 205 | { |
Ard Biesheuvel | 6cfcd6f | 2020-01-03 12:39:36 +0100 | [diff] [blame] | 206 | if (IS_ENABLED(CONFIG_X86_64) == efi_enabled(EFI_64BIT)) |
Matt Fleming | 7d453ee | 2014-01-10 18:52:06 +0000 | [diff] [blame] | 207 | return true; |
| 208 | |
Ard Biesheuvel | 1f299fa | 2020-01-13 18:22:39 +0100 | [diff] [blame] | 209 | return IS_ENABLED(CONFIG_EFI_MIXED); |
Matt Fleming | 7d453ee | 2014-01-10 18:52:06 +0000 | [diff] [blame] | 210 | } |
| 211 | |
Dave Young | 5c12af0 | 2014-01-03 11:56:49 +0800 | [diff] [blame] | 212 | extern void parse_efi_setup(u64 phys_addr, u32 data_len); |
Matt Fleming | 4f9dbcf | 2014-01-10 18:48:30 +0000 | [diff] [blame] | 213 | |
Ard Biesheuvel | 21289ec | 2016-04-25 21:06:50 +0100 | [diff] [blame] | 214 | extern void efifb_setup_from_dmi(struct screen_info *si, const char *opt); |
| 215 | |
Matt Fleming | 4f9dbcf | 2014-01-10 18:48:30 +0000 | [diff] [blame] | 216 | extern void efi_thunk_runtime_setup(void); |
Ard Biesheuvel | 6982947 | 2020-01-03 12:39:40 +0100 | [diff] [blame] | 217 | efi_status_t efi_set_virtual_address_map(unsigned long memory_map_size, |
| 218 | unsigned long descriptor_size, |
| 219 | u32 descriptor_version, |
| 220 | efi_memory_desc_t *virtual_map); |
Ard Biesheuvel | 243b675 | 2014-11-05 17:00:56 +0100 | [diff] [blame] | 221 | |
| 222 | /* arch specific definitions used by the stub code */ |
| 223 | |
Ard Biesheuvel | 796eb8d | 2020-01-13 18:22:33 +0100 | [diff] [blame] | 224 | __attribute_const__ bool efi_is_64bit(void); |
Lukas Wunner | 2757161 | 2016-09-06 08:05:32 +0200 | [diff] [blame] | 225 | |
Ard Biesheuvel | f958efe | 2019-12-24 16:10:09 +0100 | [diff] [blame] | 226 | static inline bool efi_is_native(void) |
| 227 | { |
| 228 | if (!IS_ENABLED(CONFIG_X86_64)) |
| 229 | return true; |
Ard Biesheuvel | c3710de | 2019-12-24 16:10:17 +0100 | [diff] [blame] | 230 | if (!IS_ENABLED(CONFIG_EFI_MIXED)) |
| 231 | return true; |
Ard Biesheuvel | f958efe | 2019-12-24 16:10:09 +0100 | [diff] [blame] | 232 | return efi_is_64bit(); |
| 233 | } |
| 234 | |
| 235 | #define efi_mixed_mode_cast(attr) \ |
| 236 | __builtin_choose_expr( \ |
| 237 | __builtin_types_compatible_p(u32, __typeof__(attr)), \ |
| 238 | (unsigned long)(attr), (attr)) |
| 239 | |
Ard Biesheuvel | 99ea8b1 | 2019-12-24 16:10:22 +0100 | [diff] [blame] | 240 | #define efi_table_attr(inst, attr) \ |
| 241 | (efi_is_native() \ |
| 242 | ? inst->attr \ |
| 243 | : (__typeof__(inst->attr)) \ |
| 244 | efi_mixed_mode_cast(inst->mixed_mode.attr)) |
Lukas Wunner | 3552fdf | 2016-11-12 21:32:35 +0000 | [diff] [blame] | 245 | |
Arvind Sankar | ea7d87f | 2020-01-03 12:39:49 +0100 | [diff] [blame] | 246 | /* |
| 247 | * The following macros allow translating arguments if necessary from native to |
| 248 | * mixed mode. The use case for this is to initialize the upper 32 bits of |
| 249 | * output parameters, and where the 32-bit method requires a 64-bit argument, |
| 250 | * which must be split up into two arguments to be thunked properly. |
| 251 | * |
| 252 | * As examples, the AllocatePool boot service returns the address of the |
| 253 | * allocation, but it will not set the high 32 bits of the address. To ensure |
| 254 | * that the full 64-bit address is initialized, we zero-init the address before |
| 255 | * calling the thunk. |
| 256 | * |
| 257 | * The FreePages boot service takes a 64-bit physical address even in 32-bit |
| 258 | * mode. For the thunk to work correctly, a native 64-bit call of |
| 259 | * free_pages(addr, size) |
| 260 | * must be translated to |
| 261 | * efi64_thunk(free_pages, addr & U32_MAX, addr >> 32, size) |
| 262 | * so that the two 32-bit halves of addr get pushed onto the stack separately. |
| 263 | */ |
| 264 | |
| 265 | static inline void *efi64_zero_upper(void *p) |
| 266 | { |
| 267 | ((u32 *)p)[1] = 0; |
| 268 | return p; |
| 269 | } |
| 270 | |
| 271 | #define __efi64_argmap_free_pages(addr, size) \ |
| 272 | ((addr), 0, (size)) |
| 273 | |
| 274 | #define __efi64_argmap_get_memory_map(mm_size, mm, key, size, ver) \ |
| 275 | ((mm_size), (mm), efi64_zero_upper(key), efi64_zero_upper(size), (ver)) |
| 276 | |
| 277 | #define __efi64_argmap_allocate_pool(type, size, buffer) \ |
| 278 | ((type), (size), efi64_zero_upper(buffer)) |
| 279 | |
| 280 | #define __efi64_argmap_handle_protocol(handle, protocol, interface) \ |
| 281 | ((handle), (protocol), efi64_zero_upper(interface)) |
| 282 | |
| 283 | #define __efi64_argmap_locate_protocol(protocol, reg, interface) \ |
| 284 | ((protocol), (reg), efi64_zero_upper(interface)) |
| 285 | |
Ard Biesheuvel | abd2686 | 2020-02-10 17:02:47 +0100 | [diff] [blame] | 286 | #define __efi64_argmap_locate_device_path(protocol, path, handle) \ |
| 287 | ((protocol), (path), efi64_zero_upper(handle)) |
| 288 | |
Matthew Garrett | 4444f85 | 2020-01-03 12:39:50 +0100 | [diff] [blame] | 289 | /* PCI I/O */ |
| 290 | #define __efi64_argmap_get_location(protocol, seg, bus, dev, func) \ |
| 291 | ((protocol), efi64_zero_upper(seg), efi64_zero_upper(bus), \ |
| 292 | efi64_zero_upper(dev), efi64_zero_upper(func)) |
| 293 | |
Ard Biesheuvel | 2931d52 | 2020-02-10 17:02:48 +0100 | [diff] [blame^] | 294 | /* LoadFile */ |
| 295 | #define __efi64_argmap_load_file(protocol, path, policy, bufsize, buf) \ |
| 296 | ((protocol), (path), (policy), efi64_zero_upper(bufsize), (buf)) |
| 297 | |
Arvind Sankar | ea7d87f | 2020-01-03 12:39:49 +0100 | [diff] [blame] | 298 | /* |
| 299 | * The macros below handle the plumbing for the argument mapping. To add a |
| 300 | * mapping for a specific EFI method, simply define a macro |
| 301 | * __efi64_argmap_<method name>, following the examples above. |
| 302 | */ |
| 303 | |
| 304 | #define __efi64_thunk_map(inst, func, ...) \ |
| 305 | efi64_thunk(inst->mixed_mode.func, \ |
| 306 | __efi64_argmap(__efi64_argmap_ ## func(__VA_ARGS__), \ |
| 307 | (__VA_ARGS__))) |
| 308 | |
| 309 | #define __efi64_argmap(mapped, args) \ |
| 310 | __PASTE(__efi64_argmap__, __efi_nargs(__efi_eat mapped))(mapped, args) |
| 311 | #define __efi64_argmap__0(mapped, args) __efi_eval mapped |
| 312 | #define __efi64_argmap__1(mapped, args) __efi_eval args |
| 313 | |
| 314 | #define __efi_eat(...) |
| 315 | #define __efi_eval(...) __VA_ARGS__ |
| 316 | |
| 317 | /* The three macros below handle dispatching via the thunk if needed */ |
| 318 | |
Ard Biesheuvel | 47c0fd3 | 2019-12-24 16:10:21 +0100 | [diff] [blame] | 319 | #define efi_call_proto(inst, func, ...) \ |
Ard Biesheuvel | afc4cc7 | 2019-12-24 16:10:13 +0100 | [diff] [blame] | 320 | (efi_is_native() \ |
Ard Biesheuvel | 47c0fd3 | 2019-12-24 16:10:21 +0100 | [diff] [blame] | 321 | ? inst->func(inst, ##__VA_ARGS__) \ |
Arvind Sankar | ea7d87f | 2020-01-03 12:39:49 +0100 | [diff] [blame] | 322 | : __efi64_thunk_map(inst, func, inst, ##__VA_ARGS__)) |
Lukas Wunner | 3552fdf | 2016-11-12 21:32:35 +0000 | [diff] [blame] | 323 | |
Ard Biesheuvel | 966291f | 2019-12-24 16:10:23 +0100 | [diff] [blame] | 324 | #define efi_bs_call(func, ...) \ |
Ard Biesheuvel | afc4cc7 | 2019-12-24 16:10:13 +0100 | [diff] [blame] | 325 | (efi_is_native() \ |
Ard Biesheuvel | 966291f | 2019-12-24 16:10:23 +0100 | [diff] [blame] | 326 | ? efi_system_table()->boottime->func(__VA_ARGS__) \ |
Arvind Sankar | ea7d87f | 2020-01-03 12:39:49 +0100 | [diff] [blame] | 327 | : __efi64_thunk_map(efi_table_attr(efi_system_table(), \ |
| 328 | boottime), func, __VA_ARGS__)) |
Ard Biesheuvel | 243b675 | 2014-11-05 17:00:56 +0100 | [diff] [blame] | 329 | |
Ard Biesheuvel | 966291f | 2019-12-24 16:10:23 +0100 | [diff] [blame] | 330 | #define efi_rt_call(func, ...) \ |
Ard Biesheuvel | afc4cc7 | 2019-12-24 16:10:13 +0100 | [diff] [blame] | 331 | (efi_is_native() \ |
Ard Biesheuvel | 966291f | 2019-12-24 16:10:23 +0100 | [diff] [blame] | 332 | ? efi_system_table()->runtime->func(__VA_ARGS__) \ |
Arvind Sankar | ea7d87f | 2020-01-03 12:39:49 +0100 | [diff] [blame] | 333 | : __efi64_thunk_map(efi_table_attr(efi_system_table(), \ |
| 334 | runtime), func, __VA_ARGS__)) |
David Howells | a2cd2f3 | 2017-02-06 11:22:40 +0000 | [diff] [blame] | 335 | |
Matt Fleming | 44be28e | 2014-06-13 12:39:55 +0100 | [diff] [blame] | 336 | extern bool efi_reboot_required(void); |
Ard Biesheuvel | e55f31a | 2019-06-25 15:36:45 +0200 | [diff] [blame] | 337 | extern bool efi_is_table_address(unsigned long phys_addr); |
Matt Fleming | 44be28e | 2014-06-13 12:39:55 +0100 | [diff] [blame] | 338 | |
Dan Williams | 6950e31 | 2019-11-06 17:43:05 -0800 | [diff] [blame] | 339 | extern void efi_find_mirror(void); |
| 340 | extern void efi_reserve_boot_services(void); |
Satoru Takeuchi | 6b59e36 | 2013-02-14 09:07:35 +0900 | [diff] [blame] | 341 | #else |
Dave Young | 5c12af0 | 2014-01-03 11:56:49 +0800 | [diff] [blame] | 342 | static inline void parse_efi_setup(u64 phys_addr, u32 data_len) {} |
Matt Fleming | 44be28e | 2014-06-13 12:39:55 +0100 | [diff] [blame] | 343 | static inline bool efi_reboot_required(void) |
| 344 | { |
| 345 | return false; |
| 346 | } |
Ard Biesheuvel | e55f31a | 2019-06-25 15:36:45 +0200 | [diff] [blame] | 347 | static inline bool efi_is_table_address(unsigned long phys_addr) |
| 348 | { |
| 349 | return false; |
| 350 | } |
Dan Williams | 6950e31 | 2019-11-06 17:43:05 -0800 | [diff] [blame] | 351 | static inline void efi_find_mirror(void) |
| 352 | { |
| 353 | } |
| 354 | static inline void efi_reserve_boot_services(void) |
| 355 | { |
| 356 | } |
Russ Anderson | 7f59423 | 2008-10-03 11:59:15 -0500 | [diff] [blame] | 357 | #endif /* CONFIG_EFI */ |
| 358 | |
Dan Williams | 199c847 | 2019-11-06 17:43:26 -0800 | [diff] [blame] | 359 | #ifdef CONFIG_EFI_FAKE_MEMMAP |
| 360 | extern void __init efi_fake_memmap_early(void); |
| 361 | #else |
| 362 | static inline void efi_fake_memmap_early(void) |
| 363 | { |
| 364 | } |
| 365 | #endif |
| 366 | |
H. Peter Anvin | 1965aae | 2008-10-22 22:26:29 -0700 | [diff] [blame] | 367 | #endif /* _ASM_X86_EFI_H */ |