162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * Extensible Firmware Interface
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Copyright (C) 2020 Western Digital Corporation or its affiliates.
662306a36Sopenharmony_ci *
762306a36Sopenharmony_ci * Based on Extensible Firmware Interface Specification version 2.4
862306a36Sopenharmony_ci * Adapted from drivers/firmware/efi/arm-runtime.c
962306a36Sopenharmony_ci *
1062306a36Sopenharmony_ci */
1162306a36Sopenharmony_ci
1262306a36Sopenharmony_ci#include <linux/dmi.h>
1362306a36Sopenharmony_ci#include <linux/efi.h>
1462306a36Sopenharmony_ci#include <linux/io.h>
1562306a36Sopenharmony_ci#include <linux/memblock.h>
1662306a36Sopenharmony_ci#include <linux/mm_types.h>
1762306a36Sopenharmony_ci#include <linux/preempt.h>
1862306a36Sopenharmony_ci#include <linux/rbtree.h>
1962306a36Sopenharmony_ci#include <linux/rwsem.h>
2062306a36Sopenharmony_ci#include <linux/sched.h>
2162306a36Sopenharmony_ci#include <linux/slab.h>
2262306a36Sopenharmony_ci#include <linux/spinlock.h>
2362306a36Sopenharmony_ci#include <linux/pgtable.h>
2462306a36Sopenharmony_ci
2562306a36Sopenharmony_ci#include <asm/cacheflush.h>
2662306a36Sopenharmony_ci#include <asm/efi.h>
2762306a36Sopenharmony_ci#include <asm/mmu.h>
2862306a36Sopenharmony_ci#include <asm/pgalloc.h>
2962306a36Sopenharmony_ci
3062306a36Sopenharmony_cistatic bool __init efi_virtmap_init(void)
3162306a36Sopenharmony_ci{
3262306a36Sopenharmony_ci	efi_memory_desc_t *md;
3362306a36Sopenharmony_ci
3462306a36Sopenharmony_ci	efi_mm.pgd = pgd_alloc(&efi_mm);
3562306a36Sopenharmony_ci	mm_init_cpumask(&efi_mm);
3662306a36Sopenharmony_ci	init_new_context(NULL, &efi_mm);
3762306a36Sopenharmony_ci
3862306a36Sopenharmony_ci	for_each_efi_memory_desc(md) {
3962306a36Sopenharmony_ci		phys_addr_t phys = md->phys_addr;
4062306a36Sopenharmony_ci		int ret;
4162306a36Sopenharmony_ci
4262306a36Sopenharmony_ci		if (!(md->attribute & EFI_MEMORY_RUNTIME))
4362306a36Sopenharmony_ci			continue;
4462306a36Sopenharmony_ci		if (md->virt_addr == U64_MAX)
4562306a36Sopenharmony_ci			return false;
4662306a36Sopenharmony_ci
4762306a36Sopenharmony_ci		ret = efi_create_mapping(&efi_mm, md);
4862306a36Sopenharmony_ci		if (ret) {
4962306a36Sopenharmony_ci			pr_warn("  EFI remap %pa: failed to create mapping (%d)\n",
5062306a36Sopenharmony_ci				&phys, ret);
5162306a36Sopenharmony_ci			return false;
5262306a36Sopenharmony_ci		}
5362306a36Sopenharmony_ci	}
5462306a36Sopenharmony_ci
5562306a36Sopenharmony_ci	if (efi_memattr_apply_permissions(&efi_mm, efi_set_mapping_permissions))
5662306a36Sopenharmony_ci		return false;
5762306a36Sopenharmony_ci
5862306a36Sopenharmony_ci	return true;
5962306a36Sopenharmony_ci}
6062306a36Sopenharmony_ci
6162306a36Sopenharmony_ci/*
6262306a36Sopenharmony_ci * Enable the UEFI Runtime Services if all prerequisites are in place, i.e.,
6362306a36Sopenharmony_ci * non-early mapping of the UEFI system table and virtual mappings for all
6462306a36Sopenharmony_ci * EFI_MEMORY_RUNTIME regions.
6562306a36Sopenharmony_ci */
6662306a36Sopenharmony_cistatic int __init riscv_enable_runtime_services(void)
6762306a36Sopenharmony_ci{
6862306a36Sopenharmony_ci	u64 mapsize;
6962306a36Sopenharmony_ci
7062306a36Sopenharmony_ci	if (!efi_enabled(EFI_BOOT)) {
7162306a36Sopenharmony_ci		pr_info("EFI services will not be available.\n");
7262306a36Sopenharmony_ci		return 0;
7362306a36Sopenharmony_ci	}
7462306a36Sopenharmony_ci
7562306a36Sopenharmony_ci	efi_memmap_unmap();
7662306a36Sopenharmony_ci
7762306a36Sopenharmony_ci	mapsize = efi.memmap.desc_size * efi.memmap.nr_map;
7862306a36Sopenharmony_ci
7962306a36Sopenharmony_ci	if (efi_memmap_init_late(efi.memmap.phys_map, mapsize)) {
8062306a36Sopenharmony_ci		pr_err("Failed to remap EFI memory map\n");
8162306a36Sopenharmony_ci		return 0;
8262306a36Sopenharmony_ci	}
8362306a36Sopenharmony_ci
8462306a36Sopenharmony_ci	if (efi_soft_reserve_enabled()) {
8562306a36Sopenharmony_ci		efi_memory_desc_t *md;
8662306a36Sopenharmony_ci
8762306a36Sopenharmony_ci		for_each_efi_memory_desc(md) {
8862306a36Sopenharmony_ci			u64 md_size = md->num_pages << EFI_PAGE_SHIFT;
8962306a36Sopenharmony_ci			struct resource *res;
9062306a36Sopenharmony_ci
9162306a36Sopenharmony_ci			if (!(md->attribute & EFI_MEMORY_SP))
9262306a36Sopenharmony_ci				continue;
9362306a36Sopenharmony_ci
9462306a36Sopenharmony_ci			res = kzalloc(sizeof(*res), GFP_KERNEL);
9562306a36Sopenharmony_ci			if (WARN_ON(!res))
9662306a36Sopenharmony_ci				break;
9762306a36Sopenharmony_ci
9862306a36Sopenharmony_ci			res->start	= md->phys_addr;
9962306a36Sopenharmony_ci			res->end	= md->phys_addr + md_size - 1;
10062306a36Sopenharmony_ci			res->name	= "Soft Reserved";
10162306a36Sopenharmony_ci			res->flags	= IORESOURCE_MEM;
10262306a36Sopenharmony_ci			res->desc	= IORES_DESC_SOFT_RESERVED;
10362306a36Sopenharmony_ci
10462306a36Sopenharmony_ci			insert_resource(&iomem_resource, res);
10562306a36Sopenharmony_ci		}
10662306a36Sopenharmony_ci	}
10762306a36Sopenharmony_ci
10862306a36Sopenharmony_ci	if (efi_runtime_disabled()) {
10962306a36Sopenharmony_ci		pr_info("EFI runtime services will be disabled.\n");
11062306a36Sopenharmony_ci		return 0;
11162306a36Sopenharmony_ci	}
11262306a36Sopenharmony_ci
11362306a36Sopenharmony_ci	if (efi_enabled(EFI_RUNTIME_SERVICES)) {
11462306a36Sopenharmony_ci		pr_info("EFI runtime services access via paravirt.\n");
11562306a36Sopenharmony_ci		return 0;
11662306a36Sopenharmony_ci	}
11762306a36Sopenharmony_ci
11862306a36Sopenharmony_ci	pr_info("Remapping and enabling EFI services.\n");
11962306a36Sopenharmony_ci
12062306a36Sopenharmony_ci	if (!efi_virtmap_init()) {
12162306a36Sopenharmony_ci		pr_err("UEFI virtual mapping missing or invalid -- runtime services will not be available\n");
12262306a36Sopenharmony_ci		return -ENOMEM;
12362306a36Sopenharmony_ci	}
12462306a36Sopenharmony_ci
12562306a36Sopenharmony_ci	/* Set up runtime services function pointers */
12662306a36Sopenharmony_ci	efi_native_runtime_setup();
12762306a36Sopenharmony_ci	set_bit(EFI_RUNTIME_SERVICES, &efi.flags);
12862306a36Sopenharmony_ci
12962306a36Sopenharmony_ci	return 0;
13062306a36Sopenharmony_ci}
13162306a36Sopenharmony_ciearly_initcall(riscv_enable_runtime_services);
13262306a36Sopenharmony_ci
13362306a36Sopenharmony_cistatic void efi_virtmap_load(void)
13462306a36Sopenharmony_ci{
13562306a36Sopenharmony_ci	preempt_disable();
13662306a36Sopenharmony_ci	switch_mm(current->active_mm, &efi_mm, NULL);
13762306a36Sopenharmony_ci}
13862306a36Sopenharmony_ci
13962306a36Sopenharmony_cistatic void efi_virtmap_unload(void)
14062306a36Sopenharmony_ci{
14162306a36Sopenharmony_ci	switch_mm(&efi_mm, current->active_mm, NULL);
14262306a36Sopenharmony_ci	preempt_enable();
14362306a36Sopenharmony_ci}
14462306a36Sopenharmony_ci
14562306a36Sopenharmony_civoid arch_efi_call_virt_setup(void)
14662306a36Sopenharmony_ci{
14762306a36Sopenharmony_ci	sync_kernel_mappings(efi_mm.pgd);
14862306a36Sopenharmony_ci	efi_virtmap_load();
14962306a36Sopenharmony_ci}
15062306a36Sopenharmony_ci
15162306a36Sopenharmony_civoid arch_efi_call_virt_teardown(void)
15262306a36Sopenharmony_ci{
15362306a36Sopenharmony_ci	efi_virtmap_unload();
15462306a36Sopenharmony_ci}
155