162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * x86_64 specific EFI support functions
462306a36Sopenharmony_ci * Based on Extensible Firmware Interface Specification version 1.0
562306a36Sopenharmony_ci *
662306a36Sopenharmony_ci * Copyright (C) 2005-2008 Intel Co.
762306a36Sopenharmony_ci *	Fenghua Yu <fenghua.yu@intel.com>
862306a36Sopenharmony_ci *	Bibo Mao <bibo.mao@intel.com>
962306a36Sopenharmony_ci *	Chandramouli Narayanan <mouli@linux.intel.com>
1062306a36Sopenharmony_ci *	Huang Ying <ying.huang@intel.com>
1162306a36Sopenharmony_ci *
1262306a36Sopenharmony_ci * Code to convert EFI to E820 map has been implemented in elilo bootloader
1362306a36Sopenharmony_ci * based on a EFI patch by Edgar Hucek. Based on the E820 map, the page table
1462306a36Sopenharmony_ci * is setup appropriately for EFI runtime code.
1562306a36Sopenharmony_ci * - mouli 06/14/2007.
1662306a36Sopenharmony_ci *
1762306a36Sopenharmony_ci */
1862306a36Sopenharmony_ci
1962306a36Sopenharmony_ci#define pr_fmt(fmt) "efi: " fmt
2062306a36Sopenharmony_ci
2162306a36Sopenharmony_ci#include <linux/kernel.h>
2262306a36Sopenharmony_ci#include <linux/init.h>
2362306a36Sopenharmony_ci#include <linux/mm.h>
2462306a36Sopenharmony_ci#include <linux/types.h>
2562306a36Sopenharmony_ci#include <linux/spinlock.h>
2662306a36Sopenharmony_ci#include <linux/memblock.h>
2762306a36Sopenharmony_ci#include <linux/ioport.h>
2862306a36Sopenharmony_ci#include <linux/mc146818rtc.h>
2962306a36Sopenharmony_ci#include <linux/efi.h>
3062306a36Sopenharmony_ci#include <linux/export.h>
3162306a36Sopenharmony_ci#include <linux/uaccess.h>
3262306a36Sopenharmony_ci#include <linux/io.h>
3362306a36Sopenharmony_ci#include <linux/reboot.h>
3462306a36Sopenharmony_ci#include <linux/slab.h>
3562306a36Sopenharmony_ci#include <linux/ucs2_string.h>
3662306a36Sopenharmony_ci#include <linux/cc_platform.h>
3762306a36Sopenharmony_ci#include <linux/sched/task.h>
3862306a36Sopenharmony_ci
3962306a36Sopenharmony_ci#include <asm/setup.h>
4062306a36Sopenharmony_ci#include <asm/page.h>
4162306a36Sopenharmony_ci#include <asm/e820/api.h>
4262306a36Sopenharmony_ci#include <asm/tlbflush.h>
4362306a36Sopenharmony_ci#include <asm/proto.h>
4462306a36Sopenharmony_ci#include <asm/efi.h>
4562306a36Sopenharmony_ci#include <asm/cacheflush.h>
4662306a36Sopenharmony_ci#include <asm/fixmap.h>
4762306a36Sopenharmony_ci#include <asm/realmode.h>
4862306a36Sopenharmony_ci#include <asm/time.h>
4962306a36Sopenharmony_ci#include <asm/pgalloc.h>
5062306a36Sopenharmony_ci#include <asm/sev.h>
5162306a36Sopenharmony_ci
5262306a36Sopenharmony_ci/*
5362306a36Sopenharmony_ci * We allocate runtime services regions top-down, starting from -4G, i.e.
5462306a36Sopenharmony_ci * 0xffff_ffff_0000_0000 and limit EFI VA mapping space to 64G.
5562306a36Sopenharmony_ci */
5662306a36Sopenharmony_cistatic u64 efi_va = EFI_VA_START;
5762306a36Sopenharmony_cistatic struct mm_struct *efi_prev_mm;
5862306a36Sopenharmony_ci
5962306a36Sopenharmony_ci/*
6062306a36Sopenharmony_ci * We need our own copy of the higher levels of the page tables
6162306a36Sopenharmony_ci * because we want to avoid inserting EFI region mappings (EFI_VA_END
6262306a36Sopenharmony_ci * to EFI_VA_START) into the standard kernel page tables. Everything
6362306a36Sopenharmony_ci * else can be shared, see efi_sync_low_kernel_mappings().
6462306a36Sopenharmony_ci *
6562306a36Sopenharmony_ci * We don't want the pgd on the pgd_list and cannot use pgd_alloc() for the
6662306a36Sopenharmony_ci * allocation.
6762306a36Sopenharmony_ci */
6862306a36Sopenharmony_ciint __init efi_alloc_page_tables(void)
6962306a36Sopenharmony_ci{
7062306a36Sopenharmony_ci	pgd_t *pgd, *efi_pgd;
7162306a36Sopenharmony_ci	p4d_t *p4d;
7262306a36Sopenharmony_ci	pud_t *pud;
7362306a36Sopenharmony_ci	gfp_t gfp_mask;
7462306a36Sopenharmony_ci
7562306a36Sopenharmony_ci	gfp_mask = GFP_KERNEL | __GFP_ZERO;
7662306a36Sopenharmony_ci	efi_pgd = (pgd_t *)__get_free_pages(gfp_mask, PGD_ALLOCATION_ORDER);
7762306a36Sopenharmony_ci	if (!efi_pgd)
7862306a36Sopenharmony_ci		goto fail;
7962306a36Sopenharmony_ci
8062306a36Sopenharmony_ci	pgd = efi_pgd + pgd_index(EFI_VA_END);
8162306a36Sopenharmony_ci	p4d = p4d_alloc(&init_mm, pgd, EFI_VA_END);
8262306a36Sopenharmony_ci	if (!p4d)
8362306a36Sopenharmony_ci		goto free_pgd;
8462306a36Sopenharmony_ci
8562306a36Sopenharmony_ci	pud = pud_alloc(&init_mm, p4d, EFI_VA_END);
8662306a36Sopenharmony_ci	if (!pud)
8762306a36Sopenharmony_ci		goto free_p4d;
8862306a36Sopenharmony_ci
8962306a36Sopenharmony_ci	efi_mm.pgd = efi_pgd;
9062306a36Sopenharmony_ci	mm_init_cpumask(&efi_mm);
9162306a36Sopenharmony_ci	init_new_context(NULL, &efi_mm);
9262306a36Sopenharmony_ci
9362306a36Sopenharmony_ci	return 0;
9462306a36Sopenharmony_ci
9562306a36Sopenharmony_cifree_p4d:
9662306a36Sopenharmony_ci	if (pgtable_l5_enabled())
9762306a36Sopenharmony_ci		free_page((unsigned long)pgd_page_vaddr(*pgd));
9862306a36Sopenharmony_cifree_pgd:
9962306a36Sopenharmony_ci	free_pages((unsigned long)efi_pgd, PGD_ALLOCATION_ORDER);
10062306a36Sopenharmony_cifail:
10162306a36Sopenharmony_ci	return -ENOMEM;
10262306a36Sopenharmony_ci}
10362306a36Sopenharmony_ci
10462306a36Sopenharmony_ci/*
10562306a36Sopenharmony_ci * Add low kernel mappings for passing arguments to EFI functions.
10662306a36Sopenharmony_ci */
10762306a36Sopenharmony_civoid efi_sync_low_kernel_mappings(void)
10862306a36Sopenharmony_ci{
10962306a36Sopenharmony_ci	unsigned num_entries;
11062306a36Sopenharmony_ci	pgd_t *pgd_k, *pgd_efi;
11162306a36Sopenharmony_ci	p4d_t *p4d_k, *p4d_efi;
11262306a36Sopenharmony_ci	pud_t *pud_k, *pud_efi;
11362306a36Sopenharmony_ci	pgd_t *efi_pgd = efi_mm.pgd;
11462306a36Sopenharmony_ci
11562306a36Sopenharmony_ci	pgd_efi = efi_pgd + pgd_index(PAGE_OFFSET);
11662306a36Sopenharmony_ci	pgd_k = pgd_offset_k(PAGE_OFFSET);
11762306a36Sopenharmony_ci
11862306a36Sopenharmony_ci	num_entries = pgd_index(EFI_VA_END) - pgd_index(PAGE_OFFSET);
11962306a36Sopenharmony_ci	memcpy(pgd_efi, pgd_k, sizeof(pgd_t) * num_entries);
12062306a36Sopenharmony_ci
12162306a36Sopenharmony_ci	pgd_efi = efi_pgd + pgd_index(EFI_VA_END);
12262306a36Sopenharmony_ci	pgd_k = pgd_offset_k(EFI_VA_END);
12362306a36Sopenharmony_ci	p4d_efi = p4d_offset(pgd_efi, 0);
12462306a36Sopenharmony_ci	p4d_k = p4d_offset(pgd_k, 0);
12562306a36Sopenharmony_ci
12662306a36Sopenharmony_ci	num_entries = p4d_index(EFI_VA_END);
12762306a36Sopenharmony_ci	memcpy(p4d_efi, p4d_k, sizeof(p4d_t) * num_entries);
12862306a36Sopenharmony_ci
12962306a36Sopenharmony_ci	/*
13062306a36Sopenharmony_ci	 * We share all the PUD entries apart from those that map the
13162306a36Sopenharmony_ci	 * EFI regions. Copy around them.
13262306a36Sopenharmony_ci	 */
13362306a36Sopenharmony_ci	BUILD_BUG_ON((EFI_VA_START & ~PUD_MASK) != 0);
13462306a36Sopenharmony_ci	BUILD_BUG_ON((EFI_VA_END & ~PUD_MASK) != 0);
13562306a36Sopenharmony_ci
13662306a36Sopenharmony_ci	p4d_efi = p4d_offset(pgd_efi, EFI_VA_END);
13762306a36Sopenharmony_ci	p4d_k = p4d_offset(pgd_k, EFI_VA_END);
13862306a36Sopenharmony_ci	pud_efi = pud_offset(p4d_efi, 0);
13962306a36Sopenharmony_ci	pud_k = pud_offset(p4d_k, 0);
14062306a36Sopenharmony_ci
14162306a36Sopenharmony_ci	num_entries = pud_index(EFI_VA_END);
14262306a36Sopenharmony_ci	memcpy(pud_efi, pud_k, sizeof(pud_t) * num_entries);
14362306a36Sopenharmony_ci
14462306a36Sopenharmony_ci	pud_efi = pud_offset(p4d_efi, EFI_VA_START);
14562306a36Sopenharmony_ci	pud_k = pud_offset(p4d_k, EFI_VA_START);
14662306a36Sopenharmony_ci
14762306a36Sopenharmony_ci	num_entries = PTRS_PER_PUD - pud_index(EFI_VA_START);
14862306a36Sopenharmony_ci	memcpy(pud_efi, pud_k, sizeof(pud_t) * num_entries);
14962306a36Sopenharmony_ci}
15062306a36Sopenharmony_ci
15162306a36Sopenharmony_ci/*
15262306a36Sopenharmony_ci * Wrapper for slow_virt_to_phys() that handles NULL addresses.
15362306a36Sopenharmony_ci */
15462306a36Sopenharmony_cistatic inline phys_addr_t
15562306a36Sopenharmony_civirt_to_phys_or_null_size(void *va, unsigned long size)
15662306a36Sopenharmony_ci{
15762306a36Sopenharmony_ci	phys_addr_t pa;
15862306a36Sopenharmony_ci
15962306a36Sopenharmony_ci	if (!va)
16062306a36Sopenharmony_ci		return 0;
16162306a36Sopenharmony_ci
16262306a36Sopenharmony_ci	if (virt_addr_valid(va))
16362306a36Sopenharmony_ci		return virt_to_phys(va);
16462306a36Sopenharmony_ci
16562306a36Sopenharmony_ci	pa = slow_virt_to_phys(va);
16662306a36Sopenharmony_ci
16762306a36Sopenharmony_ci	/* check if the object crosses a page boundary */
16862306a36Sopenharmony_ci	if (WARN_ON((pa ^ (pa + size - 1)) & PAGE_MASK))
16962306a36Sopenharmony_ci		return 0;
17062306a36Sopenharmony_ci
17162306a36Sopenharmony_ci	return pa;
17262306a36Sopenharmony_ci}
17362306a36Sopenharmony_ci
17462306a36Sopenharmony_ci#define virt_to_phys_or_null(addr)				\
17562306a36Sopenharmony_ci	virt_to_phys_or_null_size((addr), sizeof(*(addr)))
17662306a36Sopenharmony_ci
17762306a36Sopenharmony_ciint __init efi_setup_page_tables(unsigned long pa_memmap, unsigned num_pages)
17862306a36Sopenharmony_ci{
17962306a36Sopenharmony_ci	extern const u8 __efi64_thunk_ret_tramp[];
18062306a36Sopenharmony_ci	unsigned long pfn, text, pf, rodata, tramp;
18162306a36Sopenharmony_ci	struct page *page;
18262306a36Sopenharmony_ci	unsigned npages;
18362306a36Sopenharmony_ci	pgd_t *pgd = efi_mm.pgd;
18462306a36Sopenharmony_ci
18562306a36Sopenharmony_ci	/*
18662306a36Sopenharmony_ci	 * It can happen that the physical address of new_memmap lands in memory
18762306a36Sopenharmony_ci	 * which is not mapped in the EFI page table. Therefore we need to go
18862306a36Sopenharmony_ci	 * and ident-map those pages containing the map before calling
18962306a36Sopenharmony_ci	 * phys_efi_set_virtual_address_map().
19062306a36Sopenharmony_ci	 */
19162306a36Sopenharmony_ci	pfn = pa_memmap >> PAGE_SHIFT;
19262306a36Sopenharmony_ci	pf = _PAGE_NX | _PAGE_RW | _PAGE_ENC;
19362306a36Sopenharmony_ci	if (kernel_map_pages_in_pgd(pgd, pfn, pa_memmap, num_pages, pf)) {
19462306a36Sopenharmony_ci		pr_err("Error ident-mapping new memmap (0x%lx)!\n", pa_memmap);
19562306a36Sopenharmony_ci		return 1;
19662306a36Sopenharmony_ci	}
19762306a36Sopenharmony_ci
19862306a36Sopenharmony_ci	/*
19962306a36Sopenharmony_ci	 * Certain firmware versions are way too sentimental and still believe
20062306a36Sopenharmony_ci	 * they are exclusive and unquestionable owners of the first physical page,
20162306a36Sopenharmony_ci	 * even though they explicitly mark it as EFI_CONVENTIONAL_MEMORY
20262306a36Sopenharmony_ci	 * (but then write-access it later during SetVirtualAddressMap()).
20362306a36Sopenharmony_ci	 *
20462306a36Sopenharmony_ci	 * Create a 1:1 mapping for this page, to avoid triple faults during early
20562306a36Sopenharmony_ci	 * boot with such firmware. We are free to hand this page to the BIOS,
20662306a36Sopenharmony_ci	 * as trim_bios_range() will reserve the first page and isolate it away
20762306a36Sopenharmony_ci	 * from memory allocators anyway.
20862306a36Sopenharmony_ci	 */
20962306a36Sopenharmony_ci	if (kernel_map_pages_in_pgd(pgd, 0x0, 0x0, 1, pf)) {
21062306a36Sopenharmony_ci		pr_err("Failed to create 1:1 mapping for the first page!\n");
21162306a36Sopenharmony_ci		return 1;
21262306a36Sopenharmony_ci	}
21362306a36Sopenharmony_ci
21462306a36Sopenharmony_ci	/*
21562306a36Sopenharmony_ci	 * When SEV-ES is active, the GHCB as set by the kernel will be used
21662306a36Sopenharmony_ci	 * by firmware. Create a 1:1 unencrypted mapping for each GHCB.
21762306a36Sopenharmony_ci	 */
21862306a36Sopenharmony_ci	if (sev_es_efi_map_ghcbs(pgd)) {
21962306a36Sopenharmony_ci		pr_err("Failed to create 1:1 mapping for the GHCBs!\n");
22062306a36Sopenharmony_ci		return 1;
22162306a36Sopenharmony_ci	}
22262306a36Sopenharmony_ci
22362306a36Sopenharmony_ci	/*
22462306a36Sopenharmony_ci	 * When making calls to the firmware everything needs to be 1:1
22562306a36Sopenharmony_ci	 * mapped and addressable with 32-bit pointers. Map the kernel
22662306a36Sopenharmony_ci	 * text and allocate a new stack because we can't rely on the
22762306a36Sopenharmony_ci	 * stack pointer being < 4GB.
22862306a36Sopenharmony_ci	 */
22962306a36Sopenharmony_ci	if (!efi_is_mixed())
23062306a36Sopenharmony_ci		return 0;
23162306a36Sopenharmony_ci
23262306a36Sopenharmony_ci	page = alloc_page(GFP_KERNEL|__GFP_DMA32);
23362306a36Sopenharmony_ci	if (!page) {
23462306a36Sopenharmony_ci		pr_err("Unable to allocate EFI runtime stack < 4GB\n");
23562306a36Sopenharmony_ci		return 1;
23662306a36Sopenharmony_ci	}
23762306a36Sopenharmony_ci
23862306a36Sopenharmony_ci	efi_mixed_mode_stack_pa = page_to_phys(page + 1); /* stack grows down */
23962306a36Sopenharmony_ci
24062306a36Sopenharmony_ci	npages = (_etext - _text) >> PAGE_SHIFT;
24162306a36Sopenharmony_ci	text = __pa(_text);
24262306a36Sopenharmony_ci
24362306a36Sopenharmony_ci	if (kernel_unmap_pages_in_pgd(pgd, text, npages)) {
24462306a36Sopenharmony_ci		pr_err("Failed to unmap kernel text 1:1 mapping\n");
24562306a36Sopenharmony_ci		return 1;
24662306a36Sopenharmony_ci	}
24762306a36Sopenharmony_ci
24862306a36Sopenharmony_ci	npages = (__end_rodata - __start_rodata) >> PAGE_SHIFT;
24962306a36Sopenharmony_ci	rodata = __pa(__start_rodata);
25062306a36Sopenharmony_ci	pfn = rodata >> PAGE_SHIFT;
25162306a36Sopenharmony_ci
25262306a36Sopenharmony_ci	pf = _PAGE_NX | _PAGE_ENC;
25362306a36Sopenharmony_ci	if (kernel_map_pages_in_pgd(pgd, pfn, rodata, npages, pf)) {
25462306a36Sopenharmony_ci		pr_err("Failed to map kernel rodata 1:1\n");
25562306a36Sopenharmony_ci		return 1;
25662306a36Sopenharmony_ci	}
25762306a36Sopenharmony_ci
25862306a36Sopenharmony_ci	tramp = __pa(__efi64_thunk_ret_tramp);
25962306a36Sopenharmony_ci	pfn = tramp >> PAGE_SHIFT;
26062306a36Sopenharmony_ci
26162306a36Sopenharmony_ci	pf = _PAGE_ENC;
26262306a36Sopenharmony_ci	if (kernel_map_pages_in_pgd(pgd, pfn, tramp, 1, pf)) {
26362306a36Sopenharmony_ci		pr_err("Failed to map mixed mode return trampoline\n");
26462306a36Sopenharmony_ci		return 1;
26562306a36Sopenharmony_ci	}
26662306a36Sopenharmony_ci
26762306a36Sopenharmony_ci	return 0;
26862306a36Sopenharmony_ci}
26962306a36Sopenharmony_ci
27062306a36Sopenharmony_cistatic void __init __map_region(efi_memory_desc_t *md, u64 va)
27162306a36Sopenharmony_ci{
27262306a36Sopenharmony_ci	unsigned long flags = _PAGE_RW;
27362306a36Sopenharmony_ci	unsigned long pfn;
27462306a36Sopenharmony_ci	pgd_t *pgd = efi_mm.pgd;
27562306a36Sopenharmony_ci
27662306a36Sopenharmony_ci	/*
27762306a36Sopenharmony_ci	 * EFI_RUNTIME_SERVICES_CODE regions typically cover PE/COFF
27862306a36Sopenharmony_ci	 * executable images in memory that consist of both R-X and
27962306a36Sopenharmony_ci	 * RW- sections, so we cannot apply read-only or non-exec
28062306a36Sopenharmony_ci	 * permissions just yet. However, modern EFI systems provide
28162306a36Sopenharmony_ci	 * a memory attributes table that describes those sections
28262306a36Sopenharmony_ci	 * with the appropriate restricted permissions, which are
28362306a36Sopenharmony_ci	 * applied in efi_runtime_update_mappings() below. All other
28462306a36Sopenharmony_ci	 * regions can be mapped non-executable at this point, with
28562306a36Sopenharmony_ci	 * the exception of boot services code regions, but those will
28662306a36Sopenharmony_ci	 * be unmapped again entirely in efi_free_boot_services().
28762306a36Sopenharmony_ci	 */
28862306a36Sopenharmony_ci	if (md->type != EFI_BOOT_SERVICES_CODE &&
28962306a36Sopenharmony_ci	    md->type != EFI_RUNTIME_SERVICES_CODE)
29062306a36Sopenharmony_ci		flags |= _PAGE_NX;
29162306a36Sopenharmony_ci
29262306a36Sopenharmony_ci	if (!(md->attribute & EFI_MEMORY_WB))
29362306a36Sopenharmony_ci		flags |= _PAGE_PCD;
29462306a36Sopenharmony_ci
29562306a36Sopenharmony_ci	if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT) &&
29662306a36Sopenharmony_ci	    md->type != EFI_MEMORY_MAPPED_IO)
29762306a36Sopenharmony_ci		flags |= _PAGE_ENC;
29862306a36Sopenharmony_ci
29962306a36Sopenharmony_ci	pfn = md->phys_addr >> PAGE_SHIFT;
30062306a36Sopenharmony_ci	if (kernel_map_pages_in_pgd(pgd, pfn, va, md->num_pages, flags))
30162306a36Sopenharmony_ci		pr_warn("Error mapping PA 0x%llx -> VA 0x%llx!\n",
30262306a36Sopenharmony_ci			   md->phys_addr, va);
30362306a36Sopenharmony_ci}
30462306a36Sopenharmony_ci
30562306a36Sopenharmony_civoid __init efi_map_region(efi_memory_desc_t *md)
30662306a36Sopenharmony_ci{
30762306a36Sopenharmony_ci	unsigned long size = md->num_pages << PAGE_SHIFT;
30862306a36Sopenharmony_ci	u64 pa = md->phys_addr;
30962306a36Sopenharmony_ci
31062306a36Sopenharmony_ci	/*
31162306a36Sopenharmony_ci	 * Make sure the 1:1 mappings are present as a catch-all for b0rked
31262306a36Sopenharmony_ci	 * firmware which doesn't update all internal pointers after switching
31362306a36Sopenharmony_ci	 * to virtual mode and would otherwise crap on us.
31462306a36Sopenharmony_ci	 */
31562306a36Sopenharmony_ci	__map_region(md, md->phys_addr);
31662306a36Sopenharmony_ci
31762306a36Sopenharmony_ci	/*
31862306a36Sopenharmony_ci	 * Enforce the 1:1 mapping as the default virtual address when
31962306a36Sopenharmony_ci	 * booting in EFI mixed mode, because even though we may be
32062306a36Sopenharmony_ci	 * running a 64-bit kernel, the firmware may only be 32-bit.
32162306a36Sopenharmony_ci	 */
32262306a36Sopenharmony_ci	if (efi_is_mixed()) {
32362306a36Sopenharmony_ci		md->virt_addr = md->phys_addr;
32462306a36Sopenharmony_ci		return;
32562306a36Sopenharmony_ci	}
32662306a36Sopenharmony_ci
32762306a36Sopenharmony_ci	efi_va -= size;
32862306a36Sopenharmony_ci
32962306a36Sopenharmony_ci	/* Is PA 2M-aligned? */
33062306a36Sopenharmony_ci	if (!(pa & (PMD_SIZE - 1))) {
33162306a36Sopenharmony_ci		efi_va &= PMD_MASK;
33262306a36Sopenharmony_ci	} else {
33362306a36Sopenharmony_ci		u64 pa_offset = pa & (PMD_SIZE - 1);
33462306a36Sopenharmony_ci		u64 prev_va = efi_va;
33562306a36Sopenharmony_ci
33662306a36Sopenharmony_ci		/* get us the same offset within this 2M page */
33762306a36Sopenharmony_ci		efi_va = (efi_va & PMD_MASK) + pa_offset;
33862306a36Sopenharmony_ci
33962306a36Sopenharmony_ci		if (efi_va > prev_va)
34062306a36Sopenharmony_ci			efi_va -= PMD_SIZE;
34162306a36Sopenharmony_ci	}
34262306a36Sopenharmony_ci
34362306a36Sopenharmony_ci	if (efi_va < EFI_VA_END) {
34462306a36Sopenharmony_ci		pr_warn(FW_WARN "VA address range overflow!\n");
34562306a36Sopenharmony_ci		return;
34662306a36Sopenharmony_ci	}
34762306a36Sopenharmony_ci
34862306a36Sopenharmony_ci	/* Do the VA map */
34962306a36Sopenharmony_ci	__map_region(md, efi_va);
35062306a36Sopenharmony_ci	md->virt_addr = efi_va;
35162306a36Sopenharmony_ci}
35262306a36Sopenharmony_ci
35362306a36Sopenharmony_ci/*
35462306a36Sopenharmony_ci * kexec kernel will use efi_map_region_fixed to map efi runtime memory ranges.
35562306a36Sopenharmony_ci * md->virt_addr is the original virtual address which had been mapped in kexec
35662306a36Sopenharmony_ci * 1st kernel.
35762306a36Sopenharmony_ci */
35862306a36Sopenharmony_civoid __init efi_map_region_fixed(efi_memory_desc_t *md)
35962306a36Sopenharmony_ci{
36062306a36Sopenharmony_ci	__map_region(md, md->phys_addr);
36162306a36Sopenharmony_ci	__map_region(md, md->virt_addr);
36262306a36Sopenharmony_ci}
36362306a36Sopenharmony_ci
36462306a36Sopenharmony_civoid __init parse_efi_setup(u64 phys_addr, u32 data_len)
36562306a36Sopenharmony_ci{
36662306a36Sopenharmony_ci	efi_setup = phys_addr + sizeof(struct setup_data);
36762306a36Sopenharmony_ci}
36862306a36Sopenharmony_ci
36962306a36Sopenharmony_cistatic int __init efi_update_mappings(efi_memory_desc_t *md, unsigned long pf)
37062306a36Sopenharmony_ci{
37162306a36Sopenharmony_ci	unsigned long pfn;
37262306a36Sopenharmony_ci	pgd_t *pgd = efi_mm.pgd;
37362306a36Sopenharmony_ci	int err1, err2;
37462306a36Sopenharmony_ci
37562306a36Sopenharmony_ci	/* Update the 1:1 mapping */
37662306a36Sopenharmony_ci	pfn = md->phys_addr >> PAGE_SHIFT;
37762306a36Sopenharmony_ci	err1 = kernel_map_pages_in_pgd(pgd, pfn, md->phys_addr, md->num_pages, pf);
37862306a36Sopenharmony_ci	if (err1) {
37962306a36Sopenharmony_ci		pr_err("Error while updating 1:1 mapping PA 0x%llx -> VA 0x%llx!\n",
38062306a36Sopenharmony_ci			   md->phys_addr, md->virt_addr);
38162306a36Sopenharmony_ci	}
38262306a36Sopenharmony_ci
38362306a36Sopenharmony_ci	err2 = kernel_map_pages_in_pgd(pgd, pfn, md->virt_addr, md->num_pages, pf);
38462306a36Sopenharmony_ci	if (err2) {
38562306a36Sopenharmony_ci		pr_err("Error while updating VA mapping PA 0x%llx -> VA 0x%llx!\n",
38662306a36Sopenharmony_ci			   md->phys_addr, md->virt_addr);
38762306a36Sopenharmony_ci	}
38862306a36Sopenharmony_ci
38962306a36Sopenharmony_ci	return err1 || err2;
39062306a36Sopenharmony_ci}
39162306a36Sopenharmony_ci
39262306a36Sopenharmony_cibool efi_disable_ibt_for_runtime __ro_after_init = true;
39362306a36Sopenharmony_ci
39462306a36Sopenharmony_cistatic int __init efi_update_mem_attr(struct mm_struct *mm, efi_memory_desc_t *md,
39562306a36Sopenharmony_ci				      bool has_ibt)
39662306a36Sopenharmony_ci{
39762306a36Sopenharmony_ci	unsigned long pf = 0;
39862306a36Sopenharmony_ci
39962306a36Sopenharmony_ci	efi_disable_ibt_for_runtime |= !has_ibt;
40062306a36Sopenharmony_ci
40162306a36Sopenharmony_ci	if (md->attribute & EFI_MEMORY_XP)
40262306a36Sopenharmony_ci		pf |= _PAGE_NX;
40362306a36Sopenharmony_ci
40462306a36Sopenharmony_ci	if (!(md->attribute & EFI_MEMORY_RO))
40562306a36Sopenharmony_ci		pf |= _PAGE_RW;
40662306a36Sopenharmony_ci
40762306a36Sopenharmony_ci	if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT))
40862306a36Sopenharmony_ci		pf |= _PAGE_ENC;
40962306a36Sopenharmony_ci
41062306a36Sopenharmony_ci	return efi_update_mappings(md, pf);
41162306a36Sopenharmony_ci}
41262306a36Sopenharmony_ci
41362306a36Sopenharmony_civoid __init efi_runtime_update_mappings(void)
41462306a36Sopenharmony_ci{
41562306a36Sopenharmony_ci	efi_memory_desc_t *md;
41662306a36Sopenharmony_ci
41762306a36Sopenharmony_ci	/*
41862306a36Sopenharmony_ci	 * Use the EFI Memory Attribute Table for mapping permissions if it
41962306a36Sopenharmony_ci	 * exists, since it is intended to supersede EFI_PROPERTIES_TABLE.
42062306a36Sopenharmony_ci	 */
42162306a36Sopenharmony_ci	if (efi_enabled(EFI_MEM_ATTR)) {
42262306a36Sopenharmony_ci		efi_disable_ibt_for_runtime = false;
42362306a36Sopenharmony_ci		efi_memattr_apply_permissions(NULL, efi_update_mem_attr);
42462306a36Sopenharmony_ci		return;
42562306a36Sopenharmony_ci	}
42662306a36Sopenharmony_ci
42762306a36Sopenharmony_ci	/*
42862306a36Sopenharmony_ci	 * EFI_MEMORY_ATTRIBUTES_TABLE is intended to replace
42962306a36Sopenharmony_ci	 * EFI_PROPERTIES_TABLE. So, use EFI_PROPERTIES_TABLE to update
43062306a36Sopenharmony_ci	 * permissions only if EFI_MEMORY_ATTRIBUTES_TABLE is not
43162306a36Sopenharmony_ci	 * published by the firmware. Even if we find a buggy implementation of
43262306a36Sopenharmony_ci	 * EFI_MEMORY_ATTRIBUTES_TABLE, don't fall back to
43362306a36Sopenharmony_ci	 * EFI_PROPERTIES_TABLE, because of the same reason.
43462306a36Sopenharmony_ci	 */
43562306a36Sopenharmony_ci
43662306a36Sopenharmony_ci	if (!efi_enabled(EFI_NX_PE_DATA))
43762306a36Sopenharmony_ci		return;
43862306a36Sopenharmony_ci
43962306a36Sopenharmony_ci	for_each_efi_memory_desc(md) {
44062306a36Sopenharmony_ci		unsigned long pf = 0;
44162306a36Sopenharmony_ci
44262306a36Sopenharmony_ci		if (!(md->attribute & EFI_MEMORY_RUNTIME))
44362306a36Sopenharmony_ci			continue;
44462306a36Sopenharmony_ci
44562306a36Sopenharmony_ci		if (!(md->attribute & EFI_MEMORY_WB))
44662306a36Sopenharmony_ci			pf |= _PAGE_PCD;
44762306a36Sopenharmony_ci
44862306a36Sopenharmony_ci		if ((md->attribute & EFI_MEMORY_XP) ||
44962306a36Sopenharmony_ci			(md->type == EFI_RUNTIME_SERVICES_DATA))
45062306a36Sopenharmony_ci			pf |= _PAGE_NX;
45162306a36Sopenharmony_ci
45262306a36Sopenharmony_ci		if (!(md->attribute & EFI_MEMORY_RO) &&
45362306a36Sopenharmony_ci			(md->type != EFI_RUNTIME_SERVICES_CODE))
45462306a36Sopenharmony_ci			pf |= _PAGE_RW;
45562306a36Sopenharmony_ci
45662306a36Sopenharmony_ci		if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT))
45762306a36Sopenharmony_ci			pf |= _PAGE_ENC;
45862306a36Sopenharmony_ci
45962306a36Sopenharmony_ci		efi_update_mappings(md, pf);
46062306a36Sopenharmony_ci	}
46162306a36Sopenharmony_ci}
46262306a36Sopenharmony_ci
46362306a36Sopenharmony_civoid __init efi_dump_pagetable(void)
46462306a36Sopenharmony_ci{
46562306a36Sopenharmony_ci#ifdef CONFIG_EFI_PGT_DUMP
46662306a36Sopenharmony_ci	ptdump_walk_pgd_level(NULL, &efi_mm);
46762306a36Sopenharmony_ci#endif
46862306a36Sopenharmony_ci}
46962306a36Sopenharmony_ci
47062306a36Sopenharmony_ci/*
47162306a36Sopenharmony_ci * Makes the calling thread switch to/from efi_mm context. Can be used
47262306a36Sopenharmony_ci * in a kernel thread and user context. Preemption needs to remain disabled
47362306a36Sopenharmony_ci * while the EFI-mm is borrowed. mmgrab()/mmdrop() is not used because the mm
47462306a36Sopenharmony_ci * can not change under us.
47562306a36Sopenharmony_ci * It should be ensured that there are no concurrent calls to this function.
47662306a36Sopenharmony_ci */
47762306a36Sopenharmony_cistatic void efi_enter_mm(void)
47862306a36Sopenharmony_ci{
47962306a36Sopenharmony_ci	efi_prev_mm = current->active_mm;
48062306a36Sopenharmony_ci	current->active_mm = &efi_mm;
48162306a36Sopenharmony_ci	switch_mm(efi_prev_mm, &efi_mm, NULL);
48262306a36Sopenharmony_ci}
48362306a36Sopenharmony_ci
48462306a36Sopenharmony_cistatic void efi_leave_mm(void)
48562306a36Sopenharmony_ci{
48662306a36Sopenharmony_ci	current->active_mm = efi_prev_mm;
48762306a36Sopenharmony_ci	switch_mm(&efi_mm, efi_prev_mm, NULL);
48862306a36Sopenharmony_ci}
48962306a36Sopenharmony_ci
49062306a36Sopenharmony_civoid arch_efi_call_virt_setup(void)
49162306a36Sopenharmony_ci{
49262306a36Sopenharmony_ci	efi_sync_low_kernel_mappings();
49362306a36Sopenharmony_ci	efi_fpu_begin();
49462306a36Sopenharmony_ci	firmware_restrict_branch_speculation_start();
49562306a36Sopenharmony_ci	efi_enter_mm();
49662306a36Sopenharmony_ci}
49762306a36Sopenharmony_ci
49862306a36Sopenharmony_civoid arch_efi_call_virt_teardown(void)
49962306a36Sopenharmony_ci{
50062306a36Sopenharmony_ci	efi_leave_mm();
50162306a36Sopenharmony_ci	firmware_restrict_branch_speculation_end();
50262306a36Sopenharmony_ci	efi_fpu_end();
50362306a36Sopenharmony_ci}
50462306a36Sopenharmony_ci
50562306a36Sopenharmony_cistatic DEFINE_SPINLOCK(efi_runtime_lock);
50662306a36Sopenharmony_ci
50762306a36Sopenharmony_ci/*
50862306a36Sopenharmony_ci * DS and ES contain user values.  We need to save them.
50962306a36Sopenharmony_ci * The 32-bit EFI code needs a valid DS, ES, and SS.  There's no
51062306a36Sopenharmony_ci * need to save the old SS: __KERNEL_DS is always acceptable.
51162306a36Sopenharmony_ci */
51262306a36Sopenharmony_ci#define __efi_thunk(func, ...)						\
51362306a36Sopenharmony_ci({									\
51462306a36Sopenharmony_ci	unsigned short __ds, __es;					\
51562306a36Sopenharmony_ci	efi_status_t ____s;						\
51662306a36Sopenharmony_ci									\
51762306a36Sopenharmony_ci	savesegment(ds, __ds);						\
51862306a36Sopenharmony_ci	savesegment(es, __es);						\
51962306a36Sopenharmony_ci									\
52062306a36Sopenharmony_ci	loadsegment(ss, __KERNEL_DS);					\
52162306a36Sopenharmony_ci	loadsegment(ds, __KERNEL_DS);					\
52262306a36Sopenharmony_ci	loadsegment(es, __KERNEL_DS);					\
52362306a36Sopenharmony_ci									\
52462306a36Sopenharmony_ci	____s = efi64_thunk(efi.runtime->mixed_mode.func, __VA_ARGS__);	\
52562306a36Sopenharmony_ci									\
52662306a36Sopenharmony_ci	loadsegment(ds, __ds);						\
52762306a36Sopenharmony_ci	loadsegment(es, __es);						\
52862306a36Sopenharmony_ci									\
52962306a36Sopenharmony_ci	____s ^= (____s & BIT(31)) | (____s & BIT_ULL(31)) << 32;	\
53062306a36Sopenharmony_ci	____s;								\
53162306a36Sopenharmony_ci})
53262306a36Sopenharmony_ci
53362306a36Sopenharmony_ci/*
53462306a36Sopenharmony_ci * Switch to the EFI page tables early so that we can access the 1:1
53562306a36Sopenharmony_ci * runtime services mappings which are not mapped in any other page
53662306a36Sopenharmony_ci * tables.
53762306a36Sopenharmony_ci *
53862306a36Sopenharmony_ci * Also, disable interrupts because the IDT points to 64-bit handlers,
53962306a36Sopenharmony_ci * which aren't going to function correctly when we switch to 32-bit.
54062306a36Sopenharmony_ci */
54162306a36Sopenharmony_ci#define efi_thunk(func...)						\
54262306a36Sopenharmony_ci({									\
54362306a36Sopenharmony_ci	efi_status_t __s;						\
54462306a36Sopenharmony_ci									\
54562306a36Sopenharmony_ci	arch_efi_call_virt_setup();					\
54662306a36Sopenharmony_ci									\
54762306a36Sopenharmony_ci	__s = __efi_thunk(func);					\
54862306a36Sopenharmony_ci									\
54962306a36Sopenharmony_ci	arch_efi_call_virt_teardown();					\
55062306a36Sopenharmony_ci									\
55162306a36Sopenharmony_ci	__s;								\
55262306a36Sopenharmony_ci})
55362306a36Sopenharmony_ci
55462306a36Sopenharmony_cistatic efi_status_t __init __no_sanitize_address
55562306a36Sopenharmony_ciefi_thunk_set_virtual_address_map(unsigned long memory_map_size,
55662306a36Sopenharmony_ci				  unsigned long descriptor_size,
55762306a36Sopenharmony_ci				  u32 descriptor_version,
55862306a36Sopenharmony_ci				  efi_memory_desc_t *virtual_map)
55962306a36Sopenharmony_ci{
56062306a36Sopenharmony_ci	efi_status_t status;
56162306a36Sopenharmony_ci	unsigned long flags;
56262306a36Sopenharmony_ci
56362306a36Sopenharmony_ci	efi_sync_low_kernel_mappings();
56462306a36Sopenharmony_ci	local_irq_save(flags);
56562306a36Sopenharmony_ci
56662306a36Sopenharmony_ci	efi_enter_mm();
56762306a36Sopenharmony_ci
56862306a36Sopenharmony_ci	status = __efi_thunk(set_virtual_address_map, memory_map_size,
56962306a36Sopenharmony_ci			     descriptor_size, descriptor_version, virtual_map);
57062306a36Sopenharmony_ci
57162306a36Sopenharmony_ci	efi_leave_mm();
57262306a36Sopenharmony_ci	local_irq_restore(flags);
57362306a36Sopenharmony_ci
57462306a36Sopenharmony_ci	return status;
57562306a36Sopenharmony_ci}
57662306a36Sopenharmony_ci
57762306a36Sopenharmony_cistatic efi_status_t efi_thunk_get_time(efi_time_t *tm, efi_time_cap_t *tc)
57862306a36Sopenharmony_ci{
57962306a36Sopenharmony_ci	return EFI_UNSUPPORTED;
58062306a36Sopenharmony_ci}
58162306a36Sopenharmony_ci
58262306a36Sopenharmony_cistatic efi_status_t efi_thunk_set_time(efi_time_t *tm)
58362306a36Sopenharmony_ci{
58462306a36Sopenharmony_ci	return EFI_UNSUPPORTED;
58562306a36Sopenharmony_ci}
58662306a36Sopenharmony_ci
58762306a36Sopenharmony_cistatic efi_status_t
58862306a36Sopenharmony_ciefi_thunk_get_wakeup_time(efi_bool_t *enabled, efi_bool_t *pending,
58962306a36Sopenharmony_ci			  efi_time_t *tm)
59062306a36Sopenharmony_ci{
59162306a36Sopenharmony_ci	return EFI_UNSUPPORTED;
59262306a36Sopenharmony_ci}
59362306a36Sopenharmony_ci
59462306a36Sopenharmony_cistatic efi_status_t
59562306a36Sopenharmony_ciefi_thunk_set_wakeup_time(efi_bool_t enabled, efi_time_t *tm)
59662306a36Sopenharmony_ci{
59762306a36Sopenharmony_ci	return EFI_UNSUPPORTED;
59862306a36Sopenharmony_ci}
59962306a36Sopenharmony_ci
60062306a36Sopenharmony_cistatic unsigned long efi_name_size(efi_char16_t *name)
60162306a36Sopenharmony_ci{
60262306a36Sopenharmony_ci	return ucs2_strsize(name, EFI_VAR_NAME_LEN) + 1;
60362306a36Sopenharmony_ci}
60462306a36Sopenharmony_ci
60562306a36Sopenharmony_cistatic efi_status_t
60662306a36Sopenharmony_ciefi_thunk_get_variable(efi_char16_t *name, efi_guid_t *vendor,
60762306a36Sopenharmony_ci		       u32 *attr, unsigned long *data_size, void *data)
60862306a36Sopenharmony_ci{
60962306a36Sopenharmony_ci	u8 buf[24] __aligned(8);
61062306a36Sopenharmony_ci	efi_guid_t *vnd = PTR_ALIGN((efi_guid_t *)buf, sizeof(*vnd));
61162306a36Sopenharmony_ci	efi_status_t status;
61262306a36Sopenharmony_ci	u32 phys_name, phys_vendor, phys_attr;
61362306a36Sopenharmony_ci	u32 phys_data_size, phys_data;
61462306a36Sopenharmony_ci	unsigned long flags;
61562306a36Sopenharmony_ci
61662306a36Sopenharmony_ci	spin_lock_irqsave(&efi_runtime_lock, flags);
61762306a36Sopenharmony_ci
61862306a36Sopenharmony_ci	*vnd = *vendor;
61962306a36Sopenharmony_ci
62062306a36Sopenharmony_ci	phys_data_size = virt_to_phys_or_null(data_size);
62162306a36Sopenharmony_ci	phys_vendor = virt_to_phys_or_null(vnd);
62262306a36Sopenharmony_ci	phys_name = virt_to_phys_or_null_size(name, efi_name_size(name));
62362306a36Sopenharmony_ci	phys_attr = virt_to_phys_or_null(attr);
62462306a36Sopenharmony_ci	phys_data = virt_to_phys_or_null_size(data, *data_size);
62562306a36Sopenharmony_ci
62662306a36Sopenharmony_ci	if (!phys_name || (data && !phys_data))
62762306a36Sopenharmony_ci		status = EFI_INVALID_PARAMETER;
62862306a36Sopenharmony_ci	else
62962306a36Sopenharmony_ci		status = efi_thunk(get_variable, phys_name, phys_vendor,
63062306a36Sopenharmony_ci				   phys_attr, phys_data_size, phys_data);
63162306a36Sopenharmony_ci
63262306a36Sopenharmony_ci	spin_unlock_irqrestore(&efi_runtime_lock, flags);
63362306a36Sopenharmony_ci
63462306a36Sopenharmony_ci	return status;
63562306a36Sopenharmony_ci}
63662306a36Sopenharmony_ci
63762306a36Sopenharmony_cistatic efi_status_t
63862306a36Sopenharmony_ciefi_thunk_set_variable(efi_char16_t *name, efi_guid_t *vendor,
63962306a36Sopenharmony_ci		       u32 attr, unsigned long data_size, void *data)
64062306a36Sopenharmony_ci{
64162306a36Sopenharmony_ci	u8 buf[24] __aligned(8);
64262306a36Sopenharmony_ci	efi_guid_t *vnd = PTR_ALIGN((efi_guid_t *)buf, sizeof(*vnd));
64362306a36Sopenharmony_ci	u32 phys_name, phys_vendor, phys_data;
64462306a36Sopenharmony_ci	efi_status_t status;
64562306a36Sopenharmony_ci	unsigned long flags;
64662306a36Sopenharmony_ci
64762306a36Sopenharmony_ci	spin_lock_irqsave(&efi_runtime_lock, flags);
64862306a36Sopenharmony_ci
64962306a36Sopenharmony_ci	*vnd = *vendor;
65062306a36Sopenharmony_ci
65162306a36Sopenharmony_ci	phys_name = virt_to_phys_or_null_size(name, efi_name_size(name));
65262306a36Sopenharmony_ci	phys_vendor = virt_to_phys_or_null(vnd);
65362306a36Sopenharmony_ci	phys_data = virt_to_phys_or_null_size(data, data_size);
65462306a36Sopenharmony_ci
65562306a36Sopenharmony_ci	if (!phys_name || (data && !phys_data))
65662306a36Sopenharmony_ci		status = EFI_INVALID_PARAMETER;
65762306a36Sopenharmony_ci	else
65862306a36Sopenharmony_ci		status = efi_thunk(set_variable, phys_name, phys_vendor,
65962306a36Sopenharmony_ci				   attr, data_size, phys_data);
66062306a36Sopenharmony_ci
66162306a36Sopenharmony_ci	spin_unlock_irqrestore(&efi_runtime_lock, flags);
66262306a36Sopenharmony_ci
66362306a36Sopenharmony_ci	return status;
66462306a36Sopenharmony_ci}
66562306a36Sopenharmony_ci
66662306a36Sopenharmony_cistatic efi_status_t
66762306a36Sopenharmony_ciefi_thunk_set_variable_nonblocking(efi_char16_t *name, efi_guid_t *vendor,
66862306a36Sopenharmony_ci				   u32 attr, unsigned long data_size,
66962306a36Sopenharmony_ci				   void *data)
67062306a36Sopenharmony_ci{
67162306a36Sopenharmony_ci	u8 buf[24] __aligned(8);
67262306a36Sopenharmony_ci	efi_guid_t *vnd = PTR_ALIGN((efi_guid_t *)buf, sizeof(*vnd));
67362306a36Sopenharmony_ci	u32 phys_name, phys_vendor, phys_data;
67462306a36Sopenharmony_ci	efi_status_t status;
67562306a36Sopenharmony_ci	unsigned long flags;
67662306a36Sopenharmony_ci
67762306a36Sopenharmony_ci	if (!spin_trylock_irqsave(&efi_runtime_lock, flags))
67862306a36Sopenharmony_ci		return EFI_NOT_READY;
67962306a36Sopenharmony_ci
68062306a36Sopenharmony_ci	*vnd = *vendor;
68162306a36Sopenharmony_ci
68262306a36Sopenharmony_ci	phys_name = virt_to_phys_or_null_size(name, efi_name_size(name));
68362306a36Sopenharmony_ci	phys_vendor = virt_to_phys_or_null(vnd);
68462306a36Sopenharmony_ci	phys_data = virt_to_phys_or_null_size(data, data_size);
68562306a36Sopenharmony_ci
68662306a36Sopenharmony_ci	if (!phys_name || (data && !phys_data))
68762306a36Sopenharmony_ci		status = EFI_INVALID_PARAMETER;
68862306a36Sopenharmony_ci	else
68962306a36Sopenharmony_ci		status = efi_thunk(set_variable, phys_name, phys_vendor,
69062306a36Sopenharmony_ci				   attr, data_size, phys_data);
69162306a36Sopenharmony_ci
69262306a36Sopenharmony_ci	spin_unlock_irqrestore(&efi_runtime_lock, flags);
69362306a36Sopenharmony_ci
69462306a36Sopenharmony_ci	return status;
69562306a36Sopenharmony_ci}
69662306a36Sopenharmony_ci
69762306a36Sopenharmony_cistatic efi_status_t
69862306a36Sopenharmony_ciefi_thunk_get_next_variable(unsigned long *name_size,
69962306a36Sopenharmony_ci			    efi_char16_t *name,
70062306a36Sopenharmony_ci			    efi_guid_t *vendor)
70162306a36Sopenharmony_ci{
70262306a36Sopenharmony_ci	u8 buf[24] __aligned(8);
70362306a36Sopenharmony_ci	efi_guid_t *vnd = PTR_ALIGN((efi_guid_t *)buf, sizeof(*vnd));
70462306a36Sopenharmony_ci	efi_status_t status;
70562306a36Sopenharmony_ci	u32 phys_name_size, phys_name, phys_vendor;
70662306a36Sopenharmony_ci	unsigned long flags;
70762306a36Sopenharmony_ci
70862306a36Sopenharmony_ci	spin_lock_irqsave(&efi_runtime_lock, flags);
70962306a36Sopenharmony_ci
71062306a36Sopenharmony_ci	*vnd = *vendor;
71162306a36Sopenharmony_ci
71262306a36Sopenharmony_ci	phys_name_size = virt_to_phys_or_null(name_size);
71362306a36Sopenharmony_ci	phys_vendor = virt_to_phys_or_null(vnd);
71462306a36Sopenharmony_ci	phys_name = virt_to_phys_or_null_size(name, *name_size);
71562306a36Sopenharmony_ci
71662306a36Sopenharmony_ci	if (!phys_name)
71762306a36Sopenharmony_ci		status = EFI_INVALID_PARAMETER;
71862306a36Sopenharmony_ci	else
71962306a36Sopenharmony_ci		status = efi_thunk(get_next_variable, phys_name_size,
72062306a36Sopenharmony_ci				   phys_name, phys_vendor);
72162306a36Sopenharmony_ci
72262306a36Sopenharmony_ci	spin_unlock_irqrestore(&efi_runtime_lock, flags);
72362306a36Sopenharmony_ci
72462306a36Sopenharmony_ci	*vendor = *vnd;
72562306a36Sopenharmony_ci	return status;
72662306a36Sopenharmony_ci}
72762306a36Sopenharmony_ci
72862306a36Sopenharmony_cistatic efi_status_t
72962306a36Sopenharmony_ciefi_thunk_get_next_high_mono_count(u32 *count)
73062306a36Sopenharmony_ci{
73162306a36Sopenharmony_ci	return EFI_UNSUPPORTED;
73262306a36Sopenharmony_ci}
73362306a36Sopenharmony_ci
73462306a36Sopenharmony_cistatic void
73562306a36Sopenharmony_ciefi_thunk_reset_system(int reset_type, efi_status_t status,
73662306a36Sopenharmony_ci		       unsigned long data_size, efi_char16_t *data)
73762306a36Sopenharmony_ci{
73862306a36Sopenharmony_ci	u32 phys_data;
73962306a36Sopenharmony_ci	unsigned long flags;
74062306a36Sopenharmony_ci
74162306a36Sopenharmony_ci	spin_lock_irqsave(&efi_runtime_lock, flags);
74262306a36Sopenharmony_ci
74362306a36Sopenharmony_ci	phys_data = virt_to_phys_or_null_size(data, data_size);
74462306a36Sopenharmony_ci
74562306a36Sopenharmony_ci	efi_thunk(reset_system, reset_type, status, data_size, phys_data);
74662306a36Sopenharmony_ci
74762306a36Sopenharmony_ci	spin_unlock_irqrestore(&efi_runtime_lock, flags);
74862306a36Sopenharmony_ci}
74962306a36Sopenharmony_ci
75062306a36Sopenharmony_cistatic efi_status_t
75162306a36Sopenharmony_ciefi_thunk_update_capsule(efi_capsule_header_t **capsules,
75262306a36Sopenharmony_ci			 unsigned long count, unsigned long sg_list)
75362306a36Sopenharmony_ci{
75462306a36Sopenharmony_ci	/*
75562306a36Sopenharmony_ci	 * To properly support this function we would need to repackage
75662306a36Sopenharmony_ci	 * 'capsules' because the firmware doesn't understand 64-bit
75762306a36Sopenharmony_ci	 * pointers.
75862306a36Sopenharmony_ci	 */
75962306a36Sopenharmony_ci	return EFI_UNSUPPORTED;
76062306a36Sopenharmony_ci}
76162306a36Sopenharmony_ci
76262306a36Sopenharmony_cistatic efi_status_t
76362306a36Sopenharmony_ciefi_thunk_query_variable_info(u32 attr, u64 *storage_space,
76462306a36Sopenharmony_ci			      u64 *remaining_space,
76562306a36Sopenharmony_ci			      u64 *max_variable_size)
76662306a36Sopenharmony_ci{
76762306a36Sopenharmony_ci	efi_status_t status;
76862306a36Sopenharmony_ci	u32 phys_storage, phys_remaining, phys_max;
76962306a36Sopenharmony_ci	unsigned long flags;
77062306a36Sopenharmony_ci
77162306a36Sopenharmony_ci	if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION)
77262306a36Sopenharmony_ci		return EFI_UNSUPPORTED;
77362306a36Sopenharmony_ci
77462306a36Sopenharmony_ci	spin_lock_irqsave(&efi_runtime_lock, flags);
77562306a36Sopenharmony_ci
77662306a36Sopenharmony_ci	phys_storage = virt_to_phys_or_null(storage_space);
77762306a36Sopenharmony_ci	phys_remaining = virt_to_phys_or_null(remaining_space);
77862306a36Sopenharmony_ci	phys_max = virt_to_phys_or_null(max_variable_size);
77962306a36Sopenharmony_ci
78062306a36Sopenharmony_ci	status = efi_thunk(query_variable_info, attr, phys_storage,
78162306a36Sopenharmony_ci			   phys_remaining, phys_max);
78262306a36Sopenharmony_ci
78362306a36Sopenharmony_ci	spin_unlock_irqrestore(&efi_runtime_lock, flags);
78462306a36Sopenharmony_ci
78562306a36Sopenharmony_ci	return status;
78662306a36Sopenharmony_ci}
78762306a36Sopenharmony_ci
78862306a36Sopenharmony_cistatic efi_status_t
78962306a36Sopenharmony_ciefi_thunk_query_variable_info_nonblocking(u32 attr, u64 *storage_space,
79062306a36Sopenharmony_ci					  u64 *remaining_space,
79162306a36Sopenharmony_ci					  u64 *max_variable_size)
79262306a36Sopenharmony_ci{
79362306a36Sopenharmony_ci	efi_status_t status;
79462306a36Sopenharmony_ci	u32 phys_storage, phys_remaining, phys_max;
79562306a36Sopenharmony_ci	unsigned long flags;
79662306a36Sopenharmony_ci
79762306a36Sopenharmony_ci	if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION)
79862306a36Sopenharmony_ci		return EFI_UNSUPPORTED;
79962306a36Sopenharmony_ci
80062306a36Sopenharmony_ci	if (!spin_trylock_irqsave(&efi_runtime_lock, flags))
80162306a36Sopenharmony_ci		return EFI_NOT_READY;
80262306a36Sopenharmony_ci
80362306a36Sopenharmony_ci	phys_storage = virt_to_phys_or_null(storage_space);
80462306a36Sopenharmony_ci	phys_remaining = virt_to_phys_or_null(remaining_space);
80562306a36Sopenharmony_ci	phys_max = virt_to_phys_or_null(max_variable_size);
80662306a36Sopenharmony_ci
80762306a36Sopenharmony_ci	status = efi_thunk(query_variable_info, attr, phys_storage,
80862306a36Sopenharmony_ci			   phys_remaining, phys_max);
80962306a36Sopenharmony_ci
81062306a36Sopenharmony_ci	spin_unlock_irqrestore(&efi_runtime_lock, flags);
81162306a36Sopenharmony_ci
81262306a36Sopenharmony_ci	return status;
81362306a36Sopenharmony_ci}
81462306a36Sopenharmony_ci
81562306a36Sopenharmony_cistatic efi_status_t
81662306a36Sopenharmony_ciefi_thunk_query_capsule_caps(efi_capsule_header_t **capsules,
81762306a36Sopenharmony_ci			     unsigned long count, u64 *max_size,
81862306a36Sopenharmony_ci			     int *reset_type)
81962306a36Sopenharmony_ci{
82062306a36Sopenharmony_ci	/*
82162306a36Sopenharmony_ci	 * To properly support this function we would need to repackage
82262306a36Sopenharmony_ci	 * 'capsules' because the firmware doesn't understand 64-bit
82362306a36Sopenharmony_ci	 * pointers.
82462306a36Sopenharmony_ci	 */
82562306a36Sopenharmony_ci	return EFI_UNSUPPORTED;
82662306a36Sopenharmony_ci}
82762306a36Sopenharmony_ci
82862306a36Sopenharmony_civoid __init efi_thunk_runtime_setup(void)
82962306a36Sopenharmony_ci{
83062306a36Sopenharmony_ci	if (!IS_ENABLED(CONFIG_EFI_MIXED))
83162306a36Sopenharmony_ci		return;
83262306a36Sopenharmony_ci
83362306a36Sopenharmony_ci	efi.get_time = efi_thunk_get_time;
83462306a36Sopenharmony_ci	efi.set_time = efi_thunk_set_time;
83562306a36Sopenharmony_ci	efi.get_wakeup_time = efi_thunk_get_wakeup_time;
83662306a36Sopenharmony_ci	efi.set_wakeup_time = efi_thunk_set_wakeup_time;
83762306a36Sopenharmony_ci	efi.get_variable = efi_thunk_get_variable;
83862306a36Sopenharmony_ci	efi.get_next_variable = efi_thunk_get_next_variable;
83962306a36Sopenharmony_ci	efi.set_variable = efi_thunk_set_variable;
84062306a36Sopenharmony_ci	efi.set_variable_nonblocking = efi_thunk_set_variable_nonblocking;
84162306a36Sopenharmony_ci	efi.get_next_high_mono_count = efi_thunk_get_next_high_mono_count;
84262306a36Sopenharmony_ci	efi.reset_system = efi_thunk_reset_system;
84362306a36Sopenharmony_ci	efi.query_variable_info = efi_thunk_query_variable_info;
84462306a36Sopenharmony_ci	efi.query_variable_info_nonblocking = efi_thunk_query_variable_info_nonblocking;
84562306a36Sopenharmony_ci	efi.update_capsule = efi_thunk_update_capsule;
84662306a36Sopenharmony_ci	efi.query_capsule_caps = efi_thunk_query_capsule_caps;
84762306a36Sopenharmony_ci}
84862306a36Sopenharmony_ci
84962306a36Sopenharmony_ciefi_status_t __init __no_sanitize_address
85062306a36Sopenharmony_ciefi_set_virtual_address_map(unsigned long memory_map_size,
85162306a36Sopenharmony_ci			    unsigned long descriptor_size,
85262306a36Sopenharmony_ci			    u32 descriptor_version,
85362306a36Sopenharmony_ci			    efi_memory_desc_t *virtual_map,
85462306a36Sopenharmony_ci			    unsigned long systab_phys)
85562306a36Sopenharmony_ci{
85662306a36Sopenharmony_ci	const efi_system_table_t *systab = (efi_system_table_t *)systab_phys;
85762306a36Sopenharmony_ci	efi_status_t status;
85862306a36Sopenharmony_ci	unsigned long flags;
85962306a36Sopenharmony_ci
86062306a36Sopenharmony_ci	if (efi_is_mixed())
86162306a36Sopenharmony_ci		return efi_thunk_set_virtual_address_map(memory_map_size,
86262306a36Sopenharmony_ci							 descriptor_size,
86362306a36Sopenharmony_ci							 descriptor_version,
86462306a36Sopenharmony_ci							 virtual_map);
86562306a36Sopenharmony_ci	efi_enter_mm();
86662306a36Sopenharmony_ci
86762306a36Sopenharmony_ci	efi_fpu_begin();
86862306a36Sopenharmony_ci
86962306a36Sopenharmony_ci	/* Disable interrupts around EFI calls: */
87062306a36Sopenharmony_ci	local_irq_save(flags);
87162306a36Sopenharmony_ci	status = arch_efi_call_virt(efi.runtime, set_virtual_address_map,
87262306a36Sopenharmony_ci				    memory_map_size, descriptor_size,
87362306a36Sopenharmony_ci				    descriptor_version, virtual_map);
87462306a36Sopenharmony_ci	local_irq_restore(flags);
87562306a36Sopenharmony_ci
87662306a36Sopenharmony_ci	efi_fpu_end();
87762306a36Sopenharmony_ci
87862306a36Sopenharmony_ci	/* grab the virtually remapped EFI runtime services table pointer */
87962306a36Sopenharmony_ci	efi.runtime = READ_ONCE(systab->runtime);
88062306a36Sopenharmony_ci
88162306a36Sopenharmony_ci	efi_leave_mm();
88262306a36Sopenharmony_ci
88362306a36Sopenharmony_ci	return status;
88462306a36Sopenharmony_ci}
885