162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * x86_64 specific EFI support functions 462306a36Sopenharmony_ci * Based on Extensible Firmware Interface Specification version 1.0 562306a36Sopenharmony_ci * 662306a36Sopenharmony_ci * Copyright (C) 2005-2008 Intel Co. 762306a36Sopenharmony_ci * Fenghua Yu <fenghua.yu@intel.com> 862306a36Sopenharmony_ci * Bibo Mao <bibo.mao@intel.com> 962306a36Sopenharmony_ci * Chandramouli Narayanan <mouli@linux.intel.com> 1062306a36Sopenharmony_ci * Huang Ying <ying.huang@intel.com> 1162306a36Sopenharmony_ci * 1262306a36Sopenharmony_ci * Code to convert EFI to E820 map has been implemented in elilo bootloader 1362306a36Sopenharmony_ci * based on a EFI patch by Edgar Hucek. Based on the E820 map, the page table 1462306a36Sopenharmony_ci * is setup appropriately for EFI runtime code. 1562306a36Sopenharmony_ci * - mouli 06/14/2007. 1662306a36Sopenharmony_ci * 1762306a36Sopenharmony_ci */ 1862306a36Sopenharmony_ci 1962306a36Sopenharmony_ci#define pr_fmt(fmt) "efi: " fmt 2062306a36Sopenharmony_ci 2162306a36Sopenharmony_ci#include <linux/kernel.h> 2262306a36Sopenharmony_ci#include <linux/init.h> 2362306a36Sopenharmony_ci#include <linux/mm.h> 2462306a36Sopenharmony_ci#include <linux/types.h> 2562306a36Sopenharmony_ci#include <linux/spinlock.h> 2662306a36Sopenharmony_ci#include <linux/memblock.h> 2762306a36Sopenharmony_ci#include <linux/ioport.h> 2862306a36Sopenharmony_ci#include <linux/mc146818rtc.h> 2962306a36Sopenharmony_ci#include <linux/efi.h> 3062306a36Sopenharmony_ci#include <linux/export.h> 3162306a36Sopenharmony_ci#include <linux/uaccess.h> 3262306a36Sopenharmony_ci#include <linux/io.h> 3362306a36Sopenharmony_ci#include <linux/reboot.h> 3462306a36Sopenharmony_ci#include <linux/slab.h> 3562306a36Sopenharmony_ci#include <linux/ucs2_string.h> 3662306a36Sopenharmony_ci#include <linux/cc_platform.h> 3762306a36Sopenharmony_ci#include <linux/sched/task.h> 3862306a36Sopenharmony_ci 3962306a36Sopenharmony_ci#include <asm/setup.h> 4062306a36Sopenharmony_ci#include <asm/page.h> 4162306a36Sopenharmony_ci#include <asm/e820/api.h> 4262306a36Sopenharmony_ci#include <asm/tlbflush.h> 4362306a36Sopenharmony_ci#include <asm/proto.h> 4462306a36Sopenharmony_ci#include <asm/efi.h> 4562306a36Sopenharmony_ci#include <asm/cacheflush.h> 4662306a36Sopenharmony_ci#include <asm/fixmap.h> 4762306a36Sopenharmony_ci#include <asm/realmode.h> 4862306a36Sopenharmony_ci#include <asm/time.h> 4962306a36Sopenharmony_ci#include <asm/pgalloc.h> 5062306a36Sopenharmony_ci#include <asm/sev.h> 5162306a36Sopenharmony_ci 5262306a36Sopenharmony_ci/* 5362306a36Sopenharmony_ci * We allocate runtime services regions top-down, starting from -4G, i.e. 5462306a36Sopenharmony_ci * 0xffff_ffff_0000_0000 and limit EFI VA mapping space to 64G. 5562306a36Sopenharmony_ci */ 5662306a36Sopenharmony_cistatic u64 efi_va = EFI_VA_START; 5762306a36Sopenharmony_cistatic struct mm_struct *efi_prev_mm; 5862306a36Sopenharmony_ci 5962306a36Sopenharmony_ci/* 6062306a36Sopenharmony_ci * We need our own copy of the higher levels of the page tables 6162306a36Sopenharmony_ci * because we want to avoid inserting EFI region mappings (EFI_VA_END 6262306a36Sopenharmony_ci * to EFI_VA_START) into the standard kernel page tables. Everything 6362306a36Sopenharmony_ci * else can be shared, see efi_sync_low_kernel_mappings(). 6462306a36Sopenharmony_ci * 6562306a36Sopenharmony_ci * We don't want the pgd on the pgd_list and cannot use pgd_alloc() for the 6662306a36Sopenharmony_ci * allocation. 6762306a36Sopenharmony_ci */ 6862306a36Sopenharmony_ciint __init efi_alloc_page_tables(void) 6962306a36Sopenharmony_ci{ 7062306a36Sopenharmony_ci pgd_t *pgd, *efi_pgd; 7162306a36Sopenharmony_ci p4d_t *p4d; 7262306a36Sopenharmony_ci pud_t *pud; 7362306a36Sopenharmony_ci gfp_t gfp_mask; 7462306a36Sopenharmony_ci 7562306a36Sopenharmony_ci gfp_mask = GFP_KERNEL | __GFP_ZERO; 7662306a36Sopenharmony_ci efi_pgd = (pgd_t *)__get_free_pages(gfp_mask, PGD_ALLOCATION_ORDER); 7762306a36Sopenharmony_ci if (!efi_pgd) 7862306a36Sopenharmony_ci goto fail; 7962306a36Sopenharmony_ci 8062306a36Sopenharmony_ci pgd = efi_pgd + pgd_index(EFI_VA_END); 8162306a36Sopenharmony_ci p4d = p4d_alloc(&init_mm, pgd, EFI_VA_END); 8262306a36Sopenharmony_ci if (!p4d) 8362306a36Sopenharmony_ci goto free_pgd; 8462306a36Sopenharmony_ci 8562306a36Sopenharmony_ci pud = pud_alloc(&init_mm, p4d, EFI_VA_END); 8662306a36Sopenharmony_ci if (!pud) 8762306a36Sopenharmony_ci goto free_p4d; 8862306a36Sopenharmony_ci 8962306a36Sopenharmony_ci efi_mm.pgd = efi_pgd; 9062306a36Sopenharmony_ci mm_init_cpumask(&efi_mm); 9162306a36Sopenharmony_ci init_new_context(NULL, &efi_mm); 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_ci return 0; 9462306a36Sopenharmony_ci 9562306a36Sopenharmony_cifree_p4d: 9662306a36Sopenharmony_ci if (pgtable_l5_enabled()) 9762306a36Sopenharmony_ci free_page((unsigned long)pgd_page_vaddr(*pgd)); 9862306a36Sopenharmony_cifree_pgd: 9962306a36Sopenharmony_ci free_pages((unsigned long)efi_pgd, PGD_ALLOCATION_ORDER); 10062306a36Sopenharmony_cifail: 10162306a36Sopenharmony_ci return -ENOMEM; 10262306a36Sopenharmony_ci} 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_ci/* 10562306a36Sopenharmony_ci * Add low kernel mappings for passing arguments to EFI functions. 10662306a36Sopenharmony_ci */ 10762306a36Sopenharmony_civoid efi_sync_low_kernel_mappings(void) 10862306a36Sopenharmony_ci{ 10962306a36Sopenharmony_ci unsigned num_entries; 11062306a36Sopenharmony_ci pgd_t *pgd_k, *pgd_efi; 11162306a36Sopenharmony_ci p4d_t *p4d_k, *p4d_efi; 11262306a36Sopenharmony_ci pud_t *pud_k, *pud_efi; 11362306a36Sopenharmony_ci pgd_t *efi_pgd = efi_mm.pgd; 11462306a36Sopenharmony_ci 11562306a36Sopenharmony_ci pgd_efi = efi_pgd + pgd_index(PAGE_OFFSET); 11662306a36Sopenharmony_ci pgd_k = pgd_offset_k(PAGE_OFFSET); 11762306a36Sopenharmony_ci 11862306a36Sopenharmony_ci num_entries = pgd_index(EFI_VA_END) - pgd_index(PAGE_OFFSET); 11962306a36Sopenharmony_ci memcpy(pgd_efi, pgd_k, sizeof(pgd_t) * num_entries); 12062306a36Sopenharmony_ci 12162306a36Sopenharmony_ci pgd_efi = efi_pgd + pgd_index(EFI_VA_END); 12262306a36Sopenharmony_ci pgd_k = pgd_offset_k(EFI_VA_END); 12362306a36Sopenharmony_ci p4d_efi = p4d_offset(pgd_efi, 0); 12462306a36Sopenharmony_ci p4d_k = p4d_offset(pgd_k, 0); 12562306a36Sopenharmony_ci 12662306a36Sopenharmony_ci num_entries = p4d_index(EFI_VA_END); 12762306a36Sopenharmony_ci memcpy(p4d_efi, p4d_k, sizeof(p4d_t) * num_entries); 12862306a36Sopenharmony_ci 12962306a36Sopenharmony_ci /* 13062306a36Sopenharmony_ci * We share all the PUD entries apart from those that map the 13162306a36Sopenharmony_ci * EFI regions. Copy around them. 13262306a36Sopenharmony_ci */ 13362306a36Sopenharmony_ci BUILD_BUG_ON((EFI_VA_START & ~PUD_MASK) != 0); 13462306a36Sopenharmony_ci BUILD_BUG_ON((EFI_VA_END & ~PUD_MASK) != 0); 13562306a36Sopenharmony_ci 13662306a36Sopenharmony_ci p4d_efi = p4d_offset(pgd_efi, EFI_VA_END); 13762306a36Sopenharmony_ci p4d_k = p4d_offset(pgd_k, EFI_VA_END); 13862306a36Sopenharmony_ci pud_efi = pud_offset(p4d_efi, 0); 13962306a36Sopenharmony_ci pud_k = pud_offset(p4d_k, 0); 14062306a36Sopenharmony_ci 14162306a36Sopenharmony_ci num_entries = pud_index(EFI_VA_END); 14262306a36Sopenharmony_ci memcpy(pud_efi, pud_k, sizeof(pud_t) * num_entries); 14362306a36Sopenharmony_ci 14462306a36Sopenharmony_ci pud_efi = pud_offset(p4d_efi, EFI_VA_START); 14562306a36Sopenharmony_ci pud_k = pud_offset(p4d_k, EFI_VA_START); 14662306a36Sopenharmony_ci 14762306a36Sopenharmony_ci num_entries = PTRS_PER_PUD - pud_index(EFI_VA_START); 14862306a36Sopenharmony_ci memcpy(pud_efi, pud_k, sizeof(pud_t) * num_entries); 14962306a36Sopenharmony_ci} 15062306a36Sopenharmony_ci 15162306a36Sopenharmony_ci/* 15262306a36Sopenharmony_ci * Wrapper for slow_virt_to_phys() that handles NULL addresses. 15362306a36Sopenharmony_ci */ 15462306a36Sopenharmony_cistatic inline phys_addr_t 15562306a36Sopenharmony_civirt_to_phys_or_null_size(void *va, unsigned long size) 15662306a36Sopenharmony_ci{ 15762306a36Sopenharmony_ci phys_addr_t pa; 15862306a36Sopenharmony_ci 15962306a36Sopenharmony_ci if (!va) 16062306a36Sopenharmony_ci return 0; 16162306a36Sopenharmony_ci 16262306a36Sopenharmony_ci if (virt_addr_valid(va)) 16362306a36Sopenharmony_ci return virt_to_phys(va); 16462306a36Sopenharmony_ci 16562306a36Sopenharmony_ci pa = slow_virt_to_phys(va); 16662306a36Sopenharmony_ci 16762306a36Sopenharmony_ci /* check if the object crosses a page boundary */ 16862306a36Sopenharmony_ci if (WARN_ON((pa ^ (pa + size - 1)) & PAGE_MASK)) 16962306a36Sopenharmony_ci return 0; 17062306a36Sopenharmony_ci 17162306a36Sopenharmony_ci return pa; 17262306a36Sopenharmony_ci} 17362306a36Sopenharmony_ci 17462306a36Sopenharmony_ci#define virt_to_phys_or_null(addr) \ 17562306a36Sopenharmony_ci virt_to_phys_or_null_size((addr), sizeof(*(addr))) 17662306a36Sopenharmony_ci 17762306a36Sopenharmony_ciint __init efi_setup_page_tables(unsigned long pa_memmap, unsigned num_pages) 17862306a36Sopenharmony_ci{ 17962306a36Sopenharmony_ci extern const u8 __efi64_thunk_ret_tramp[]; 18062306a36Sopenharmony_ci unsigned long pfn, text, pf, rodata, tramp; 18162306a36Sopenharmony_ci struct page *page; 18262306a36Sopenharmony_ci unsigned npages; 18362306a36Sopenharmony_ci pgd_t *pgd = efi_mm.pgd; 18462306a36Sopenharmony_ci 18562306a36Sopenharmony_ci /* 18662306a36Sopenharmony_ci * It can happen that the physical address of new_memmap lands in memory 18762306a36Sopenharmony_ci * which is not mapped in the EFI page table. Therefore we need to go 18862306a36Sopenharmony_ci * and ident-map those pages containing the map before calling 18962306a36Sopenharmony_ci * phys_efi_set_virtual_address_map(). 19062306a36Sopenharmony_ci */ 19162306a36Sopenharmony_ci pfn = pa_memmap >> PAGE_SHIFT; 19262306a36Sopenharmony_ci pf = _PAGE_NX | _PAGE_RW | _PAGE_ENC; 19362306a36Sopenharmony_ci if (kernel_map_pages_in_pgd(pgd, pfn, pa_memmap, num_pages, pf)) { 19462306a36Sopenharmony_ci pr_err("Error ident-mapping new memmap (0x%lx)!\n", pa_memmap); 19562306a36Sopenharmony_ci return 1; 19662306a36Sopenharmony_ci } 19762306a36Sopenharmony_ci 19862306a36Sopenharmony_ci /* 19962306a36Sopenharmony_ci * Certain firmware versions are way too sentimental and still believe 20062306a36Sopenharmony_ci * they are exclusive and unquestionable owners of the first physical page, 20162306a36Sopenharmony_ci * even though they explicitly mark it as EFI_CONVENTIONAL_MEMORY 20262306a36Sopenharmony_ci * (but then write-access it later during SetVirtualAddressMap()). 20362306a36Sopenharmony_ci * 20462306a36Sopenharmony_ci * Create a 1:1 mapping for this page, to avoid triple faults during early 20562306a36Sopenharmony_ci * boot with such firmware. We are free to hand this page to the BIOS, 20662306a36Sopenharmony_ci * as trim_bios_range() will reserve the first page and isolate it away 20762306a36Sopenharmony_ci * from memory allocators anyway. 20862306a36Sopenharmony_ci */ 20962306a36Sopenharmony_ci if (kernel_map_pages_in_pgd(pgd, 0x0, 0x0, 1, pf)) { 21062306a36Sopenharmony_ci pr_err("Failed to create 1:1 mapping for the first page!\n"); 21162306a36Sopenharmony_ci return 1; 21262306a36Sopenharmony_ci } 21362306a36Sopenharmony_ci 21462306a36Sopenharmony_ci /* 21562306a36Sopenharmony_ci * When SEV-ES is active, the GHCB as set by the kernel will be used 21662306a36Sopenharmony_ci * by firmware. Create a 1:1 unencrypted mapping for each GHCB. 21762306a36Sopenharmony_ci */ 21862306a36Sopenharmony_ci if (sev_es_efi_map_ghcbs(pgd)) { 21962306a36Sopenharmony_ci pr_err("Failed to create 1:1 mapping for the GHCBs!\n"); 22062306a36Sopenharmony_ci return 1; 22162306a36Sopenharmony_ci } 22262306a36Sopenharmony_ci 22362306a36Sopenharmony_ci /* 22462306a36Sopenharmony_ci * When making calls to the firmware everything needs to be 1:1 22562306a36Sopenharmony_ci * mapped and addressable with 32-bit pointers. Map the kernel 22662306a36Sopenharmony_ci * text and allocate a new stack because we can't rely on the 22762306a36Sopenharmony_ci * stack pointer being < 4GB. 22862306a36Sopenharmony_ci */ 22962306a36Sopenharmony_ci if (!efi_is_mixed()) 23062306a36Sopenharmony_ci return 0; 23162306a36Sopenharmony_ci 23262306a36Sopenharmony_ci page = alloc_page(GFP_KERNEL|__GFP_DMA32); 23362306a36Sopenharmony_ci if (!page) { 23462306a36Sopenharmony_ci pr_err("Unable to allocate EFI runtime stack < 4GB\n"); 23562306a36Sopenharmony_ci return 1; 23662306a36Sopenharmony_ci } 23762306a36Sopenharmony_ci 23862306a36Sopenharmony_ci efi_mixed_mode_stack_pa = page_to_phys(page + 1); /* stack grows down */ 23962306a36Sopenharmony_ci 24062306a36Sopenharmony_ci npages = (_etext - _text) >> PAGE_SHIFT; 24162306a36Sopenharmony_ci text = __pa(_text); 24262306a36Sopenharmony_ci 24362306a36Sopenharmony_ci if (kernel_unmap_pages_in_pgd(pgd, text, npages)) { 24462306a36Sopenharmony_ci pr_err("Failed to unmap kernel text 1:1 mapping\n"); 24562306a36Sopenharmony_ci return 1; 24662306a36Sopenharmony_ci } 24762306a36Sopenharmony_ci 24862306a36Sopenharmony_ci npages = (__end_rodata - __start_rodata) >> PAGE_SHIFT; 24962306a36Sopenharmony_ci rodata = __pa(__start_rodata); 25062306a36Sopenharmony_ci pfn = rodata >> PAGE_SHIFT; 25162306a36Sopenharmony_ci 25262306a36Sopenharmony_ci pf = _PAGE_NX | _PAGE_ENC; 25362306a36Sopenharmony_ci if (kernel_map_pages_in_pgd(pgd, pfn, rodata, npages, pf)) { 25462306a36Sopenharmony_ci pr_err("Failed to map kernel rodata 1:1\n"); 25562306a36Sopenharmony_ci return 1; 25662306a36Sopenharmony_ci } 25762306a36Sopenharmony_ci 25862306a36Sopenharmony_ci tramp = __pa(__efi64_thunk_ret_tramp); 25962306a36Sopenharmony_ci pfn = tramp >> PAGE_SHIFT; 26062306a36Sopenharmony_ci 26162306a36Sopenharmony_ci pf = _PAGE_ENC; 26262306a36Sopenharmony_ci if (kernel_map_pages_in_pgd(pgd, pfn, tramp, 1, pf)) { 26362306a36Sopenharmony_ci pr_err("Failed to map mixed mode return trampoline\n"); 26462306a36Sopenharmony_ci return 1; 26562306a36Sopenharmony_ci } 26662306a36Sopenharmony_ci 26762306a36Sopenharmony_ci return 0; 26862306a36Sopenharmony_ci} 26962306a36Sopenharmony_ci 27062306a36Sopenharmony_cistatic void __init __map_region(efi_memory_desc_t *md, u64 va) 27162306a36Sopenharmony_ci{ 27262306a36Sopenharmony_ci unsigned long flags = _PAGE_RW; 27362306a36Sopenharmony_ci unsigned long pfn; 27462306a36Sopenharmony_ci pgd_t *pgd = efi_mm.pgd; 27562306a36Sopenharmony_ci 27662306a36Sopenharmony_ci /* 27762306a36Sopenharmony_ci * EFI_RUNTIME_SERVICES_CODE regions typically cover PE/COFF 27862306a36Sopenharmony_ci * executable images in memory that consist of both R-X and 27962306a36Sopenharmony_ci * RW- sections, so we cannot apply read-only or non-exec 28062306a36Sopenharmony_ci * permissions just yet. However, modern EFI systems provide 28162306a36Sopenharmony_ci * a memory attributes table that describes those sections 28262306a36Sopenharmony_ci * with the appropriate restricted permissions, which are 28362306a36Sopenharmony_ci * applied in efi_runtime_update_mappings() below. All other 28462306a36Sopenharmony_ci * regions can be mapped non-executable at this point, with 28562306a36Sopenharmony_ci * the exception of boot services code regions, but those will 28662306a36Sopenharmony_ci * be unmapped again entirely in efi_free_boot_services(). 28762306a36Sopenharmony_ci */ 28862306a36Sopenharmony_ci if (md->type != EFI_BOOT_SERVICES_CODE && 28962306a36Sopenharmony_ci md->type != EFI_RUNTIME_SERVICES_CODE) 29062306a36Sopenharmony_ci flags |= _PAGE_NX; 29162306a36Sopenharmony_ci 29262306a36Sopenharmony_ci if (!(md->attribute & EFI_MEMORY_WB)) 29362306a36Sopenharmony_ci flags |= _PAGE_PCD; 29462306a36Sopenharmony_ci 29562306a36Sopenharmony_ci if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT) && 29662306a36Sopenharmony_ci md->type != EFI_MEMORY_MAPPED_IO) 29762306a36Sopenharmony_ci flags |= _PAGE_ENC; 29862306a36Sopenharmony_ci 29962306a36Sopenharmony_ci pfn = md->phys_addr >> PAGE_SHIFT; 30062306a36Sopenharmony_ci if (kernel_map_pages_in_pgd(pgd, pfn, va, md->num_pages, flags)) 30162306a36Sopenharmony_ci pr_warn("Error mapping PA 0x%llx -> VA 0x%llx!\n", 30262306a36Sopenharmony_ci md->phys_addr, va); 30362306a36Sopenharmony_ci} 30462306a36Sopenharmony_ci 30562306a36Sopenharmony_civoid __init efi_map_region(efi_memory_desc_t *md) 30662306a36Sopenharmony_ci{ 30762306a36Sopenharmony_ci unsigned long size = md->num_pages << PAGE_SHIFT; 30862306a36Sopenharmony_ci u64 pa = md->phys_addr; 30962306a36Sopenharmony_ci 31062306a36Sopenharmony_ci /* 31162306a36Sopenharmony_ci * Make sure the 1:1 mappings are present as a catch-all for b0rked 31262306a36Sopenharmony_ci * firmware which doesn't update all internal pointers after switching 31362306a36Sopenharmony_ci * to virtual mode and would otherwise crap on us. 31462306a36Sopenharmony_ci */ 31562306a36Sopenharmony_ci __map_region(md, md->phys_addr); 31662306a36Sopenharmony_ci 31762306a36Sopenharmony_ci /* 31862306a36Sopenharmony_ci * Enforce the 1:1 mapping as the default virtual address when 31962306a36Sopenharmony_ci * booting in EFI mixed mode, because even though we may be 32062306a36Sopenharmony_ci * running a 64-bit kernel, the firmware may only be 32-bit. 32162306a36Sopenharmony_ci */ 32262306a36Sopenharmony_ci if (efi_is_mixed()) { 32362306a36Sopenharmony_ci md->virt_addr = md->phys_addr; 32462306a36Sopenharmony_ci return; 32562306a36Sopenharmony_ci } 32662306a36Sopenharmony_ci 32762306a36Sopenharmony_ci efi_va -= size; 32862306a36Sopenharmony_ci 32962306a36Sopenharmony_ci /* Is PA 2M-aligned? */ 33062306a36Sopenharmony_ci if (!(pa & (PMD_SIZE - 1))) { 33162306a36Sopenharmony_ci efi_va &= PMD_MASK; 33262306a36Sopenharmony_ci } else { 33362306a36Sopenharmony_ci u64 pa_offset = pa & (PMD_SIZE - 1); 33462306a36Sopenharmony_ci u64 prev_va = efi_va; 33562306a36Sopenharmony_ci 33662306a36Sopenharmony_ci /* get us the same offset within this 2M page */ 33762306a36Sopenharmony_ci efi_va = (efi_va & PMD_MASK) + pa_offset; 33862306a36Sopenharmony_ci 33962306a36Sopenharmony_ci if (efi_va > prev_va) 34062306a36Sopenharmony_ci efi_va -= PMD_SIZE; 34162306a36Sopenharmony_ci } 34262306a36Sopenharmony_ci 34362306a36Sopenharmony_ci if (efi_va < EFI_VA_END) { 34462306a36Sopenharmony_ci pr_warn(FW_WARN "VA address range overflow!\n"); 34562306a36Sopenharmony_ci return; 34662306a36Sopenharmony_ci } 34762306a36Sopenharmony_ci 34862306a36Sopenharmony_ci /* Do the VA map */ 34962306a36Sopenharmony_ci __map_region(md, efi_va); 35062306a36Sopenharmony_ci md->virt_addr = efi_va; 35162306a36Sopenharmony_ci} 35262306a36Sopenharmony_ci 35362306a36Sopenharmony_ci/* 35462306a36Sopenharmony_ci * kexec kernel will use efi_map_region_fixed to map efi runtime memory ranges. 35562306a36Sopenharmony_ci * md->virt_addr is the original virtual address which had been mapped in kexec 35662306a36Sopenharmony_ci * 1st kernel. 35762306a36Sopenharmony_ci */ 35862306a36Sopenharmony_civoid __init efi_map_region_fixed(efi_memory_desc_t *md) 35962306a36Sopenharmony_ci{ 36062306a36Sopenharmony_ci __map_region(md, md->phys_addr); 36162306a36Sopenharmony_ci __map_region(md, md->virt_addr); 36262306a36Sopenharmony_ci} 36362306a36Sopenharmony_ci 36462306a36Sopenharmony_civoid __init parse_efi_setup(u64 phys_addr, u32 data_len) 36562306a36Sopenharmony_ci{ 36662306a36Sopenharmony_ci efi_setup = phys_addr + sizeof(struct setup_data); 36762306a36Sopenharmony_ci} 36862306a36Sopenharmony_ci 36962306a36Sopenharmony_cistatic int __init efi_update_mappings(efi_memory_desc_t *md, unsigned long pf) 37062306a36Sopenharmony_ci{ 37162306a36Sopenharmony_ci unsigned long pfn; 37262306a36Sopenharmony_ci pgd_t *pgd = efi_mm.pgd; 37362306a36Sopenharmony_ci int err1, err2; 37462306a36Sopenharmony_ci 37562306a36Sopenharmony_ci /* Update the 1:1 mapping */ 37662306a36Sopenharmony_ci pfn = md->phys_addr >> PAGE_SHIFT; 37762306a36Sopenharmony_ci err1 = kernel_map_pages_in_pgd(pgd, pfn, md->phys_addr, md->num_pages, pf); 37862306a36Sopenharmony_ci if (err1) { 37962306a36Sopenharmony_ci pr_err("Error while updating 1:1 mapping PA 0x%llx -> VA 0x%llx!\n", 38062306a36Sopenharmony_ci md->phys_addr, md->virt_addr); 38162306a36Sopenharmony_ci } 38262306a36Sopenharmony_ci 38362306a36Sopenharmony_ci err2 = kernel_map_pages_in_pgd(pgd, pfn, md->virt_addr, md->num_pages, pf); 38462306a36Sopenharmony_ci if (err2) { 38562306a36Sopenharmony_ci pr_err("Error while updating VA mapping PA 0x%llx -> VA 0x%llx!\n", 38662306a36Sopenharmony_ci md->phys_addr, md->virt_addr); 38762306a36Sopenharmony_ci } 38862306a36Sopenharmony_ci 38962306a36Sopenharmony_ci return err1 || err2; 39062306a36Sopenharmony_ci} 39162306a36Sopenharmony_ci 39262306a36Sopenharmony_cibool efi_disable_ibt_for_runtime __ro_after_init = true; 39362306a36Sopenharmony_ci 39462306a36Sopenharmony_cistatic int __init efi_update_mem_attr(struct mm_struct *mm, efi_memory_desc_t *md, 39562306a36Sopenharmony_ci bool has_ibt) 39662306a36Sopenharmony_ci{ 39762306a36Sopenharmony_ci unsigned long pf = 0; 39862306a36Sopenharmony_ci 39962306a36Sopenharmony_ci efi_disable_ibt_for_runtime |= !has_ibt; 40062306a36Sopenharmony_ci 40162306a36Sopenharmony_ci if (md->attribute & EFI_MEMORY_XP) 40262306a36Sopenharmony_ci pf |= _PAGE_NX; 40362306a36Sopenharmony_ci 40462306a36Sopenharmony_ci if (!(md->attribute & EFI_MEMORY_RO)) 40562306a36Sopenharmony_ci pf |= _PAGE_RW; 40662306a36Sopenharmony_ci 40762306a36Sopenharmony_ci if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT)) 40862306a36Sopenharmony_ci pf |= _PAGE_ENC; 40962306a36Sopenharmony_ci 41062306a36Sopenharmony_ci return efi_update_mappings(md, pf); 41162306a36Sopenharmony_ci} 41262306a36Sopenharmony_ci 41362306a36Sopenharmony_civoid __init efi_runtime_update_mappings(void) 41462306a36Sopenharmony_ci{ 41562306a36Sopenharmony_ci efi_memory_desc_t *md; 41662306a36Sopenharmony_ci 41762306a36Sopenharmony_ci /* 41862306a36Sopenharmony_ci * Use the EFI Memory Attribute Table for mapping permissions if it 41962306a36Sopenharmony_ci * exists, since it is intended to supersede EFI_PROPERTIES_TABLE. 42062306a36Sopenharmony_ci */ 42162306a36Sopenharmony_ci if (efi_enabled(EFI_MEM_ATTR)) { 42262306a36Sopenharmony_ci efi_disable_ibt_for_runtime = false; 42362306a36Sopenharmony_ci efi_memattr_apply_permissions(NULL, efi_update_mem_attr); 42462306a36Sopenharmony_ci return; 42562306a36Sopenharmony_ci } 42662306a36Sopenharmony_ci 42762306a36Sopenharmony_ci /* 42862306a36Sopenharmony_ci * EFI_MEMORY_ATTRIBUTES_TABLE is intended to replace 42962306a36Sopenharmony_ci * EFI_PROPERTIES_TABLE. So, use EFI_PROPERTIES_TABLE to update 43062306a36Sopenharmony_ci * permissions only if EFI_MEMORY_ATTRIBUTES_TABLE is not 43162306a36Sopenharmony_ci * published by the firmware. Even if we find a buggy implementation of 43262306a36Sopenharmony_ci * EFI_MEMORY_ATTRIBUTES_TABLE, don't fall back to 43362306a36Sopenharmony_ci * EFI_PROPERTIES_TABLE, because of the same reason. 43462306a36Sopenharmony_ci */ 43562306a36Sopenharmony_ci 43662306a36Sopenharmony_ci if (!efi_enabled(EFI_NX_PE_DATA)) 43762306a36Sopenharmony_ci return; 43862306a36Sopenharmony_ci 43962306a36Sopenharmony_ci for_each_efi_memory_desc(md) { 44062306a36Sopenharmony_ci unsigned long pf = 0; 44162306a36Sopenharmony_ci 44262306a36Sopenharmony_ci if (!(md->attribute & EFI_MEMORY_RUNTIME)) 44362306a36Sopenharmony_ci continue; 44462306a36Sopenharmony_ci 44562306a36Sopenharmony_ci if (!(md->attribute & EFI_MEMORY_WB)) 44662306a36Sopenharmony_ci pf |= _PAGE_PCD; 44762306a36Sopenharmony_ci 44862306a36Sopenharmony_ci if ((md->attribute & EFI_MEMORY_XP) || 44962306a36Sopenharmony_ci (md->type == EFI_RUNTIME_SERVICES_DATA)) 45062306a36Sopenharmony_ci pf |= _PAGE_NX; 45162306a36Sopenharmony_ci 45262306a36Sopenharmony_ci if (!(md->attribute & EFI_MEMORY_RO) && 45362306a36Sopenharmony_ci (md->type != EFI_RUNTIME_SERVICES_CODE)) 45462306a36Sopenharmony_ci pf |= _PAGE_RW; 45562306a36Sopenharmony_ci 45662306a36Sopenharmony_ci if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT)) 45762306a36Sopenharmony_ci pf |= _PAGE_ENC; 45862306a36Sopenharmony_ci 45962306a36Sopenharmony_ci efi_update_mappings(md, pf); 46062306a36Sopenharmony_ci } 46162306a36Sopenharmony_ci} 46262306a36Sopenharmony_ci 46362306a36Sopenharmony_civoid __init efi_dump_pagetable(void) 46462306a36Sopenharmony_ci{ 46562306a36Sopenharmony_ci#ifdef CONFIG_EFI_PGT_DUMP 46662306a36Sopenharmony_ci ptdump_walk_pgd_level(NULL, &efi_mm); 46762306a36Sopenharmony_ci#endif 46862306a36Sopenharmony_ci} 46962306a36Sopenharmony_ci 47062306a36Sopenharmony_ci/* 47162306a36Sopenharmony_ci * Makes the calling thread switch to/from efi_mm context. Can be used 47262306a36Sopenharmony_ci * in a kernel thread and user context. Preemption needs to remain disabled 47362306a36Sopenharmony_ci * while the EFI-mm is borrowed. mmgrab()/mmdrop() is not used because the mm 47462306a36Sopenharmony_ci * can not change under us. 47562306a36Sopenharmony_ci * It should be ensured that there are no concurrent calls to this function. 47662306a36Sopenharmony_ci */ 47762306a36Sopenharmony_cistatic void efi_enter_mm(void) 47862306a36Sopenharmony_ci{ 47962306a36Sopenharmony_ci efi_prev_mm = current->active_mm; 48062306a36Sopenharmony_ci current->active_mm = &efi_mm; 48162306a36Sopenharmony_ci switch_mm(efi_prev_mm, &efi_mm, NULL); 48262306a36Sopenharmony_ci} 48362306a36Sopenharmony_ci 48462306a36Sopenharmony_cistatic void efi_leave_mm(void) 48562306a36Sopenharmony_ci{ 48662306a36Sopenharmony_ci current->active_mm = efi_prev_mm; 48762306a36Sopenharmony_ci switch_mm(&efi_mm, efi_prev_mm, NULL); 48862306a36Sopenharmony_ci} 48962306a36Sopenharmony_ci 49062306a36Sopenharmony_civoid arch_efi_call_virt_setup(void) 49162306a36Sopenharmony_ci{ 49262306a36Sopenharmony_ci efi_sync_low_kernel_mappings(); 49362306a36Sopenharmony_ci efi_fpu_begin(); 49462306a36Sopenharmony_ci firmware_restrict_branch_speculation_start(); 49562306a36Sopenharmony_ci efi_enter_mm(); 49662306a36Sopenharmony_ci} 49762306a36Sopenharmony_ci 49862306a36Sopenharmony_civoid arch_efi_call_virt_teardown(void) 49962306a36Sopenharmony_ci{ 50062306a36Sopenharmony_ci efi_leave_mm(); 50162306a36Sopenharmony_ci firmware_restrict_branch_speculation_end(); 50262306a36Sopenharmony_ci efi_fpu_end(); 50362306a36Sopenharmony_ci} 50462306a36Sopenharmony_ci 50562306a36Sopenharmony_cistatic DEFINE_SPINLOCK(efi_runtime_lock); 50662306a36Sopenharmony_ci 50762306a36Sopenharmony_ci/* 50862306a36Sopenharmony_ci * DS and ES contain user values. We need to save them. 50962306a36Sopenharmony_ci * The 32-bit EFI code needs a valid DS, ES, and SS. There's no 51062306a36Sopenharmony_ci * need to save the old SS: __KERNEL_DS is always acceptable. 51162306a36Sopenharmony_ci */ 51262306a36Sopenharmony_ci#define __efi_thunk(func, ...) \ 51362306a36Sopenharmony_ci({ \ 51462306a36Sopenharmony_ci unsigned short __ds, __es; \ 51562306a36Sopenharmony_ci efi_status_t ____s; \ 51662306a36Sopenharmony_ci \ 51762306a36Sopenharmony_ci savesegment(ds, __ds); \ 51862306a36Sopenharmony_ci savesegment(es, __es); \ 51962306a36Sopenharmony_ci \ 52062306a36Sopenharmony_ci loadsegment(ss, __KERNEL_DS); \ 52162306a36Sopenharmony_ci loadsegment(ds, __KERNEL_DS); \ 52262306a36Sopenharmony_ci loadsegment(es, __KERNEL_DS); \ 52362306a36Sopenharmony_ci \ 52462306a36Sopenharmony_ci ____s = efi64_thunk(efi.runtime->mixed_mode.func, __VA_ARGS__); \ 52562306a36Sopenharmony_ci \ 52662306a36Sopenharmony_ci loadsegment(ds, __ds); \ 52762306a36Sopenharmony_ci loadsegment(es, __es); \ 52862306a36Sopenharmony_ci \ 52962306a36Sopenharmony_ci ____s ^= (____s & BIT(31)) | (____s & BIT_ULL(31)) << 32; \ 53062306a36Sopenharmony_ci ____s; \ 53162306a36Sopenharmony_ci}) 53262306a36Sopenharmony_ci 53362306a36Sopenharmony_ci/* 53462306a36Sopenharmony_ci * Switch to the EFI page tables early so that we can access the 1:1 53562306a36Sopenharmony_ci * runtime services mappings which are not mapped in any other page 53662306a36Sopenharmony_ci * tables. 53762306a36Sopenharmony_ci * 53862306a36Sopenharmony_ci * Also, disable interrupts because the IDT points to 64-bit handlers, 53962306a36Sopenharmony_ci * which aren't going to function correctly when we switch to 32-bit. 54062306a36Sopenharmony_ci */ 54162306a36Sopenharmony_ci#define efi_thunk(func...) \ 54262306a36Sopenharmony_ci({ \ 54362306a36Sopenharmony_ci efi_status_t __s; \ 54462306a36Sopenharmony_ci \ 54562306a36Sopenharmony_ci arch_efi_call_virt_setup(); \ 54662306a36Sopenharmony_ci \ 54762306a36Sopenharmony_ci __s = __efi_thunk(func); \ 54862306a36Sopenharmony_ci \ 54962306a36Sopenharmony_ci arch_efi_call_virt_teardown(); \ 55062306a36Sopenharmony_ci \ 55162306a36Sopenharmony_ci __s; \ 55262306a36Sopenharmony_ci}) 55362306a36Sopenharmony_ci 55462306a36Sopenharmony_cistatic efi_status_t __init __no_sanitize_address 55562306a36Sopenharmony_ciefi_thunk_set_virtual_address_map(unsigned long memory_map_size, 55662306a36Sopenharmony_ci unsigned long descriptor_size, 55762306a36Sopenharmony_ci u32 descriptor_version, 55862306a36Sopenharmony_ci efi_memory_desc_t *virtual_map) 55962306a36Sopenharmony_ci{ 56062306a36Sopenharmony_ci efi_status_t status; 56162306a36Sopenharmony_ci unsigned long flags; 56262306a36Sopenharmony_ci 56362306a36Sopenharmony_ci efi_sync_low_kernel_mappings(); 56462306a36Sopenharmony_ci local_irq_save(flags); 56562306a36Sopenharmony_ci 56662306a36Sopenharmony_ci efi_enter_mm(); 56762306a36Sopenharmony_ci 56862306a36Sopenharmony_ci status = __efi_thunk(set_virtual_address_map, memory_map_size, 56962306a36Sopenharmony_ci descriptor_size, descriptor_version, virtual_map); 57062306a36Sopenharmony_ci 57162306a36Sopenharmony_ci efi_leave_mm(); 57262306a36Sopenharmony_ci local_irq_restore(flags); 57362306a36Sopenharmony_ci 57462306a36Sopenharmony_ci return status; 57562306a36Sopenharmony_ci} 57662306a36Sopenharmony_ci 57762306a36Sopenharmony_cistatic efi_status_t efi_thunk_get_time(efi_time_t *tm, efi_time_cap_t *tc) 57862306a36Sopenharmony_ci{ 57962306a36Sopenharmony_ci return EFI_UNSUPPORTED; 58062306a36Sopenharmony_ci} 58162306a36Sopenharmony_ci 58262306a36Sopenharmony_cistatic efi_status_t efi_thunk_set_time(efi_time_t *tm) 58362306a36Sopenharmony_ci{ 58462306a36Sopenharmony_ci return EFI_UNSUPPORTED; 58562306a36Sopenharmony_ci} 58662306a36Sopenharmony_ci 58762306a36Sopenharmony_cistatic efi_status_t 58862306a36Sopenharmony_ciefi_thunk_get_wakeup_time(efi_bool_t *enabled, efi_bool_t *pending, 58962306a36Sopenharmony_ci efi_time_t *tm) 59062306a36Sopenharmony_ci{ 59162306a36Sopenharmony_ci return EFI_UNSUPPORTED; 59262306a36Sopenharmony_ci} 59362306a36Sopenharmony_ci 59462306a36Sopenharmony_cistatic efi_status_t 59562306a36Sopenharmony_ciefi_thunk_set_wakeup_time(efi_bool_t enabled, efi_time_t *tm) 59662306a36Sopenharmony_ci{ 59762306a36Sopenharmony_ci return EFI_UNSUPPORTED; 59862306a36Sopenharmony_ci} 59962306a36Sopenharmony_ci 60062306a36Sopenharmony_cistatic unsigned long efi_name_size(efi_char16_t *name) 60162306a36Sopenharmony_ci{ 60262306a36Sopenharmony_ci return ucs2_strsize(name, EFI_VAR_NAME_LEN) + 1; 60362306a36Sopenharmony_ci} 60462306a36Sopenharmony_ci 60562306a36Sopenharmony_cistatic efi_status_t 60662306a36Sopenharmony_ciefi_thunk_get_variable(efi_char16_t *name, efi_guid_t *vendor, 60762306a36Sopenharmony_ci u32 *attr, unsigned long *data_size, void *data) 60862306a36Sopenharmony_ci{ 60962306a36Sopenharmony_ci u8 buf[24] __aligned(8); 61062306a36Sopenharmony_ci efi_guid_t *vnd = PTR_ALIGN((efi_guid_t *)buf, sizeof(*vnd)); 61162306a36Sopenharmony_ci efi_status_t status; 61262306a36Sopenharmony_ci u32 phys_name, phys_vendor, phys_attr; 61362306a36Sopenharmony_ci u32 phys_data_size, phys_data; 61462306a36Sopenharmony_ci unsigned long flags; 61562306a36Sopenharmony_ci 61662306a36Sopenharmony_ci spin_lock_irqsave(&efi_runtime_lock, flags); 61762306a36Sopenharmony_ci 61862306a36Sopenharmony_ci *vnd = *vendor; 61962306a36Sopenharmony_ci 62062306a36Sopenharmony_ci phys_data_size = virt_to_phys_or_null(data_size); 62162306a36Sopenharmony_ci phys_vendor = virt_to_phys_or_null(vnd); 62262306a36Sopenharmony_ci phys_name = virt_to_phys_or_null_size(name, efi_name_size(name)); 62362306a36Sopenharmony_ci phys_attr = virt_to_phys_or_null(attr); 62462306a36Sopenharmony_ci phys_data = virt_to_phys_or_null_size(data, *data_size); 62562306a36Sopenharmony_ci 62662306a36Sopenharmony_ci if (!phys_name || (data && !phys_data)) 62762306a36Sopenharmony_ci status = EFI_INVALID_PARAMETER; 62862306a36Sopenharmony_ci else 62962306a36Sopenharmony_ci status = efi_thunk(get_variable, phys_name, phys_vendor, 63062306a36Sopenharmony_ci phys_attr, phys_data_size, phys_data); 63162306a36Sopenharmony_ci 63262306a36Sopenharmony_ci spin_unlock_irqrestore(&efi_runtime_lock, flags); 63362306a36Sopenharmony_ci 63462306a36Sopenharmony_ci return status; 63562306a36Sopenharmony_ci} 63662306a36Sopenharmony_ci 63762306a36Sopenharmony_cistatic efi_status_t 63862306a36Sopenharmony_ciefi_thunk_set_variable(efi_char16_t *name, efi_guid_t *vendor, 63962306a36Sopenharmony_ci u32 attr, unsigned long data_size, void *data) 64062306a36Sopenharmony_ci{ 64162306a36Sopenharmony_ci u8 buf[24] __aligned(8); 64262306a36Sopenharmony_ci efi_guid_t *vnd = PTR_ALIGN((efi_guid_t *)buf, sizeof(*vnd)); 64362306a36Sopenharmony_ci u32 phys_name, phys_vendor, phys_data; 64462306a36Sopenharmony_ci efi_status_t status; 64562306a36Sopenharmony_ci unsigned long flags; 64662306a36Sopenharmony_ci 64762306a36Sopenharmony_ci spin_lock_irqsave(&efi_runtime_lock, flags); 64862306a36Sopenharmony_ci 64962306a36Sopenharmony_ci *vnd = *vendor; 65062306a36Sopenharmony_ci 65162306a36Sopenharmony_ci phys_name = virt_to_phys_or_null_size(name, efi_name_size(name)); 65262306a36Sopenharmony_ci phys_vendor = virt_to_phys_or_null(vnd); 65362306a36Sopenharmony_ci phys_data = virt_to_phys_or_null_size(data, data_size); 65462306a36Sopenharmony_ci 65562306a36Sopenharmony_ci if (!phys_name || (data && !phys_data)) 65662306a36Sopenharmony_ci status = EFI_INVALID_PARAMETER; 65762306a36Sopenharmony_ci else 65862306a36Sopenharmony_ci status = efi_thunk(set_variable, phys_name, phys_vendor, 65962306a36Sopenharmony_ci attr, data_size, phys_data); 66062306a36Sopenharmony_ci 66162306a36Sopenharmony_ci spin_unlock_irqrestore(&efi_runtime_lock, flags); 66262306a36Sopenharmony_ci 66362306a36Sopenharmony_ci return status; 66462306a36Sopenharmony_ci} 66562306a36Sopenharmony_ci 66662306a36Sopenharmony_cistatic efi_status_t 66762306a36Sopenharmony_ciefi_thunk_set_variable_nonblocking(efi_char16_t *name, efi_guid_t *vendor, 66862306a36Sopenharmony_ci u32 attr, unsigned long data_size, 66962306a36Sopenharmony_ci void *data) 67062306a36Sopenharmony_ci{ 67162306a36Sopenharmony_ci u8 buf[24] __aligned(8); 67262306a36Sopenharmony_ci efi_guid_t *vnd = PTR_ALIGN((efi_guid_t *)buf, sizeof(*vnd)); 67362306a36Sopenharmony_ci u32 phys_name, phys_vendor, phys_data; 67462306a36Sopenharmony_ci efi_status_t status; 67562306a36Sopenharmony_ci unsigned long flags; 67662306a36Sopenharmony_ci 67762306a36Sopenharmony_ci if (!spin_trylock_irqsave(&efi_runtime_lock, flags)) 67862306a36Sopenharmony_ci return EFI_NOT_READY; 67962306a36Sopenharmony_ci 68062306a36Sopenharmony_ci *vnd = *vendor; 68162306a36Sopenharmony_ci 68262306a36Sopenharmony_ci phys_name = virt_to_phys_or_null_size(name, efi_name_size(name)); 68362306a36Sopenharmony_ci phys_vendor = virt_to_phys_or_null(vnd); 68462306a36Sopenharmony_ci phys_data = virt_to_phys_or_null_size(data, data_size); 68562306a36Sopenharmony_ci 68662306a36Sopenharmony_ci if (!phys_name || (data && !phys_data)) 68762306a36Sopenharmony_ci status = EFI_INVALID_PARAMETER; 68862306a36Sopenharmony_ci else 68962306a36Sopenharmony_ci status = efi_thunk(set_variable, phys_name, phys_vendor, 69062306a36Sopenharmony_ci attr, data_size, phys_data); 69162306a36Sopenharmony_ci 69262306a36Sopenharmony_ci spin_unlock_irqrestore(&efi_runtime_lock, flags); 69362306a36Sopenharmony_ci 69462306a36Sopenharmony_ci return status; 69562306a36Sopenharmony_ci} 69662306a36Sopenharmony_ci 69762306a36Sopenharmony_cistatic efi_status_t 69862306a36Sopenharmony_ciefi_thunk_get_next_variable(unsigned long *name_size, 69962306a36Sopenharmony_ci efi_char16_t *name, 70062306a36Sopenharmony_ci efi_guid_t *vendor) 70162306a36Sopenharmony_ci{ 70262306a36Sopenharmony_ci u8 buf[24] __aligned(8); 70362306a36Sopenharmony_ci efi_guid_t *vnd = PTR_ALIGN((efi_guid_t *)buf, sizeof(*vnd)); 70462306a36Sopenharmony_ci efi_status_t status; 70562306a36Sopenharmony_ci u32 phys_name_size, phys_name, phys_vendor; 70662306a36Sopenharmony_ci unsigned long flags; 70762306a36Sopenharmony_ci 70862306a36Sopenharmony_ci spin_lock_irqsave(&efi_runtime_lock, flags); 70962306a36Sopenharmony_ci 71062306a36Sopenharmony_ci *vnd = *vendor; 71162306a36Sopenharmony_ci 71262306a36Sopenharmony_ci phys_name_size = virt_to_phys_or_null(name_size); 71362306a36Sopenharmony_ci phys_vendor = virt_to_phys_or_null(vnd); 71462306a36Sopenharmony_ci phys_name = virt_to_phys_or_null_size(name, *name_size); 71562306a36Sopenharmony_ci 71662306a36Sopenharmony_ci if (!phys_name) 71762306a36Sopenharmony_ci status = EFI_INVALID_PARAMETER; 71862306a36Sopenharmony_ci else 71962306a36Sopenharmony_ci status = efi_thunk(get_next_variable, phys_name_size, 72062306a36Sopenharmony_ci phys_name, phys_vendor); 72162306a36Sopenharmony_ci 72262306a36Sopenharmony_ci spin_unlock_irqrestore(&efi_runtime_lock, flags); 72362306a36Sopenharmony_ci 72462306a36Sopenharmony_ci *vendor = *vnd; 72562306a36Sopenharmony_ci return status; 72662306a36Sopenharmony_ci} 72762306a36Sopenharmony_ci 72862306a36Sopenharmony_cistatic efi_status_t 72962306a36Sopenharmony_ciefi_thunk_get_next_high_mono_count(u32 *count) 73062306a36Sopenharmony_ci{ 73162306a36Sopenharmony_ci return EFI_UNSUPPORTED; 73262306a36Sopenharmony_ci} 73362306a36Sopenharmony_ci 73462306a36Sopenharmony_cistatic void 73562306a36Sopenharmony_ciefi_thunk_reset_system(int reset_type, efi_status_t status, 73662306a36Sopenharmony_ci unsigned long data_size, efi_char16_t *data) 73762306a36Sopenharmony_ci{ 73862306a36Sopenharmony_ci u32 phys_data; 73962306a36Sopenharmony_ci unsigned long flags; 74062306a36Sopenharmony_ci 74162306a36Sopenharmony_ci spin_lock_irqsave(&efi_runtime_lock, flags); 74262306a36Sopenharmony_ci 74362306a36Sopenharmony_ci phys_data = virt_to_phys_or_null_size(data, data_size); 74462306a36Sopenharmony_ci 74562306a36Sopenharmony_ci efi_thunk(reset_system, reset_type, status, data_size, phys_data); 74662306a36Sopenharmony_ci 74762306a36Sopenharmony_ci spin_unlock_irqrestore(&efi_runtime_lock, flags); 74862306a36Sopenharmony_ci} 74962306a36Sopenharmony_ci 75062306a36Sopenharmony_cistatic efi_status_t 75162306a36Sopenharmony_ciefi_thunk_update_capsule(efi_capsule_header_t **capsules, 75262306a36Sopenharmony_ci unsigned long count, unsigned long sg_list) 75362306a36Sopenharmony_ci{ 75462306a36Sopenharmony_ci /* 75562306a36Sopenharmony_ci * To properly support this function we would need to repackage 75662306a36Sopenharmony_ci * 'capsules' because the firmware doesn't understand 64-bit 75762306a36Sopenharmony_ci * pointers. 75862306a36Sopenharmony_ci */ 75962306a36Sopenharmony_ci return EFI_UNSUPPORTED; 76062306a36Sopenharmony_ci} 76162306a36Sopenharmony_ci 76262306a36Sopenharmony_cistatic efi_status_t 76362306a36Sopenharmony_ciefi_thunk_query_variable_info(u32 attr, u64 *storage_space, 76462306a36Sopenharmony_ci u64 *remaining_space, 76562306a36Sopenharmony_ci u64 *max_variable_size) 76662306a36Sopenharmony_ci{ 76762306a36Sopenharmony_ci efi_status_t status; 76862306a36Sopenharmony_ci u32 phys_storage, phys_remaining, phys_max; 76962306a36Sopenharmony_ci unsigned long flags; 77062306a36Sopenharmony_ci 77162306a36Sopenharmony_ci if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION) 77262306a36Sopenharmony_ci return EFI_UNSUPPORTED; 77362306a36Sopenharmony_ci 77462306a36Sopenharmony_ci spin_lock_irqsave(&efi_runtime_lock, flags); 77562306a36Sopenharmony_ci 77662306a36Sopenharmony_ci phys_storage = virt_to_phys_or_null(storage_space); 77762306a36Sopenharmony_ci phys_remaining = virt_to_phys_or_null(remaining_space); 77862306a36Sopenharmony_ci phys_max = virt_to_phys_or_null(max_variable_size); 77962306a36Sopenharmony_ci 78062306a36Sopenharmony_ci status = efi_thunk(query_variable_info, attr, phys_storage, 78162306a36Sopenharmony_ci phys_remaining, phys_max); 78262306a36Sopenharmony_ci 78362306a36Sopenharmony_ci spin_unlock_irqrestore(&efi_runtime_lock, flags); 78462306a36Sopenharmony_ci 78562306a36Sopenharmony_ci return status; 78662306a36Sopenharmony_ci} 78762306a36Sopenharmony_ci 78862306a36Sopenharmony_cistatic efi_status_t 78962306a36Sopenharmony_ciefi_thunk_query_variable_info_nonblocking(u32 attr, u64 *storage_space, 79062306a36Sopenharmony_ci u64 *remaining_space, 79162306a36Sopenharmony_ci u64 *max_variable_size) 79262306a36Sopenharmony_ci{ 79362306a36Sopenharmony_ci efi_status_t status; 79462306a36Sopenharmony_ci u32 phys_storage, phys_remaining, phys_max; 79562306a36Sopenharmony_ci unsigned long flags; 79662306a36Sopenharmony_ci 79762306a36Sopenharmony_ci if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION) 79862306a36Sopenharmony_ci return EFI_UNSUPPORTED; 79962306a36Sopenharmony_ci 80062306a36Sopenharmony_ci if (!spin_trylock_irqsave(&efi_runtime_lock, flags)) 80162306a36Sopenharmony_ci return EFI_NOT_READY; 80262306a36Sopenharmony_ci 80362306a36Sopenharmony_ci phys_storage = virt_to_phys_or_null(storage_space); 80462306a36Sopenharmony_ci phys_remaining = virt_to_phys_or_null(remaining_space); 80562306a36Sopenharmony_ci phys_max = virt_to_phys_or_null(max_variable_size); 80662306a36Sopenharmony_ci 80762306a36Sopenharmony_ci status = efi_thunk(query_variable_info, attr, phys_storage, 80862306a36Sopenharmony_ci phys_remaining, phys_max); 80962306a36Sopenharmony_ci 81062306a36Sopenharmony_ci spin_unlock_irqrestore(&efi_runtime_lock, flags); 81162306a36Sopenharmony_ci 81262306a36Sopenharmony_ci return status; 81362306a36Sopenharmony_ci} 81462306a36Sopenharmony_ci 81562306a36Sopenharmony_cistatic efi_status_t 81662306a36Sopenharmony_ciefi_thunk_query_capsule_caps(efi_capsule_header_t **capsules, 81762306a36Sopenharmony_ci unsigned long count, u64 *max_size, 81862306a36Sopenharmony_ci int *reset_type) 81962306a36Sopenharmony_ci{ 82062306a36Sopenharmony_ci /* 82162306a36Sopenharmony_ci * To properly support this function we would need to repackage 82262306a36Sopenharmony_ci * 'capsules' because the firmware doesn't understand 64-bit 82362306a36Sopenharmony_ci * pointers. 82462306a36Sopenharmony_ci */ 82562306a36Sopenharmony_ci return EFI_UNSUPPORTED; 82662306a36Sopenharmony_ci} 82762306a36Sopenharmony_ci 82862306a36Sopenharmony_civoid __init efi_thunk_runtime_setup(void) 82962306a36Sopenharmony_ci{ 83062306a36Sopenharmony_ci if (!IS_ENABLED(CONFIG_EFI_MIXED)) 83162306a36Sopenharmony_ci return; 83262306a36Sopenharmony_ci 83362306a36Sopenharmony_ci efi.get_time = efi_thunk_get_time; 83462306a36Sopenharmony_ci efi.set_time = efi_thunk_set_time; 83562306a36Sopenharmony_ci efi.get_wakeup_time = efi_thunk_get_wakeup_time; 83662306a36Sopenharmony_ci efi.set_wakeup_time = efi_thunk_set_wakeup_time; 83762306a36Sopenharmony_ci efi.get_variable = efi_thunk_get_variable; 83862306a36Sopenharmony_ci efi.get_next_variable = efi_thunk_get_next_variable; 83962306a36Sopenharmony_ci efi.set_variable = efi_thunk_set_variable; 84062306a36Sopenharmony_ci efi.set_variable_nonblocking = efi_thunk_set_variable_nonblocking; 84162306a36Sopenharmony_ci efi.get_next_high_mono_count = efi_thunk_get_next_high_mono_count; 84262306a36Sopenharmony_ci efi.reset_system = efi_thunk_reset_system; 84362306a36Sopenharmony_ci efi.query_variable_info = efi_thunk_query_variable_info; 84462306a36Sopenharmony_ci efi.query_variable_info_nonblocking = efi_thunk_query_variable_info_nonblocking; 84562306a36Sopenharmony_ci efi.update_capsule = efi_thunk_update_capsule; 84662306a36Sopenharmony_ci efi.query_capsule_caps = efi_thunk_query_capsule_caps; 84762306a36Sopenharmony_ci} 84862306a36Sopenharmony_ci 84962306a36Sopenharmony_ciefi_status_t __init __no_sanitize_address 85062306a36Sopenharmony_ciefi_set_virtual_address_map(unsigned long memory_map_size, 85162306a36Sopenharmony_ci unsigned long descriptor_size, 85262306a36Sopenharmony_ci u32 descriptor_version, 85362306a36Sopenharmony_ci efi_memory_desc_t *virtual_map, 85462306a36Sopenharmony_ci unsigned long systab_phys) 85562306a36Sopenharmony_ci{ 85662306a36Sopenharmony_ci const efi_system_table_t *systab = (efi_system_table_t *)systab_phys; 85762306a36Sopenharmony_ci efi_status_t status; 85862306a36Sopenharmony_ci unsigned long flags; 85962306a36Sopenharmony_ci 86062306a36Sopenharmony_ci if (efi_is_mixed()) 86162306a36Sopenharmony_ci return efi_thunk_set_virtual_address_map(memory_map_size, 86262306a36Sopenharmony_ci descriptor_size, 86362306a36Sopenharmony_ci descriptor_version, 86462306a36Sopenharmony_ci virtual_map); 86562306a36Sopenharmony_ci efi_enter_mm(); 86662306a36Sopenharmony_ci 86762306a36Sopenharmony_ci efi_fpu_begin(); 86862306a36Sopenharmony_ci 86962306a36Sopenharmony_ci /* Disable interrupts around EFI calls: */ 87062306a36Sopenharmony_ci local_irq_save(flags); 87162306a36Sopenharmony_ci status = arch_efi_call_virt(efi.runtime, set_virtual_address_map, 87262306a36Sopenharmony_ci memory_map_size, descriptor_size, 87362306a36Sopenharmony_ci descriptor_version, virtual_map); 87462306a36Sopenharmony_ci local_irq_restore(flags); 87562306a36Sopenharmony_ci 87662306a36Sopenharmony_ci efi_fpu_end(); 87762306a36Sopenharmony_ci 87862306a36Sopenharmony_ci /* grab the virtually remapped EFI runtime services table pointer */ 87962306a36Sopenharmony_ci efi.runtime = READ_ONCE(systab->runtime); 88062306a36Sopenharmony_ci 88162306a36Sopenharmony_ci efi_leave_mm(); 88262306a36Sopenharmony_ci 88362306a36Sopenharmony_ci return status; 88462306a36Sopenharmony_ci} 885