162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Extensible Firmware Interface 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (C) 2020 Western Digital Corporation or its affiliates. 662306a36Sopenharmony_ci * 762306a36Sopenharmony_ci * Based on Extensible Firmware Interface Specification version 2.4 862306a36Sopenharmony_ci * Adapted from drivers/firmware/efi/arm-runtime.c 962306a36Sopenharmony_ci * 1062306a36Sopenharmony_ci */ 1162306a36Sopenharmony_ci 1262306a36Sopenharmony_ci#include <linux/dmi.h> 1362306a36Sopenharmony_ci#include <linux/efi.h> 1462306a36Sopenharmony_ci#include <linux/io.h> 1562306a36Sopenharmony_ci#include <linux/memblock.h> 1662306a36Sopenharmony_ci#include <linux/mm_types.h> 1762306a36Sopenharmony_ci#include <linux/preempt.h> 1862306a36Sopenharmony_ci#include <linux/rbtree.h> 1962306a36Sopenharmony_ci#include <linux/rwsem.h> 2062306a36Sopenharmony_ci#include <linux/sched.h> 2162306a36Sopenharmony_ci#include <linux/slab.h> 2262306a36Sopenharmony_ci#include <linux/spinlock.h> 2362306a36Sopenharmony_ci#include <linux/pgtable.h> 2462306a36Sopenharmony_ci 2562306a36Sopenharmony_ci#include <asm/cacheflush.h> 2662306a36Sopenharmony_ci#include <asm/efi.h> 2762306a36Sopenharmony_ci#include <asm/mmu.h> 2862306a36Sopenharmony_ci#include <asm/pgalloc.h> 2962306a36Sopenharmony_ci 3062306a36Sopenharmony_cistatic bool __init efi_virtmap_init(void) 3162306a36Sopenharmony_ci{ 3262306a36Sopenharmony_ci efi_memory_desc_t *md; 3362306a36Sopenharmony_ci 3462306a36Sopenharmony_ci efi_mm.pgd = pgd_alloc(&efi_mm); 3562306a36Sopenharmony_ci mm_init_cpumask(&efi_mm); 3662306a36Sopenharmony_ci init_new_context(NULL, &efi_mm); 3762306a36Sopenharmony_ci 3862306a36Sopenharmony_ci for_each_efi_memory_desc(md) { 3962306a36Sopenharmony_ci phys_addr_t phys = md->phys_addr; 4062306a36Sopenharmony_ci int ret; 4162306a36Sopenharmony_ci 4262306a36Sopenharmony_ci if (!(md->attribute & EFI_MEMORY_RUNTIME)) 4362306a36Sopenharmony_ci continue; 4462306a36Sopenharmony_ci if (md->virt_addr == U64_MAX) 4562306a36Sopenharmony_ci return false; 4662306a36Sopenharmony_ci 4762306a36Sopenharmony_ci ret = efi_create_mapping(&efi_mm, md); 4862306a36Sopenharmony_ci if (ret) { 4962306a36Sopenharmony_ci pr_warn(" EFI remap %pa: failed to create mapping (%d)\n", 5062306a36Sopenharmony_ci &phys, ret); 5162306a36Sopenharmony_ci return false; 5262306a36Sopenharmony_ci } 5362306a36Sopenharmony_ci } 5462306a36Sopenharmony_ci 5562306a36Sopenharmony_ci if (efi_memattr_apply_permissions(&efi_mm, efi_set_mapping_permissions)) 5662306a36Sopenharmony_ci return false; 5762306a36Sopenharmony_ci 5862306a36Sopenharmony_ci return true; 5962306a36Sopenharmony_ci} 6062306a36Sopenharmony_ci 6162306a36Sopenharmony_ci/* 6262306a36Sopenharmony_ci * Enable the UEFI Runtime Services if all prerequisites are in place, i.e., 6362306a36Sopenharmony_ci * non-early mapping of the UEFI system table and virtual mappings for all 6462306a36Sopenharmony_ci * EFI_MEMORY_RUNTIME regions. 6562306a36Sopenharmony_ci */ 6662306a36Sopenharmony_cistatic int __init riscv_enable_runtime_services(void) 6762306a36Sopenharmony_ci{ 6862306a36Sopenharmony_ci u64 mapsize; 6962306a36Sopenharmony_ci 7062306a36Sopenharmony_ci if (!efi_enabled(EFI_BOOT)) { 7162306a36Sopenharmony_ci pr_info("EFI services will not be available.\n"); 7262306a36Sopenharmony_ci return 0; 7362306a36Sopenharmony_ci } 7462306a36Sopenharmony_ci 7562306a36Sopenharmony_ci efi_memmap_unmap(); 7662306a36Sopenharmony_ci 7762306a36Sopenharmony_ci mapsize = efi.memmap.desc_size * efi.memmap.nr_map; 7862306a36Sopenharmony_ci 7962306a36Sopenharmony_ci if (efi_memmap_init_late(efi.memmap.phys_map, mapsize)) { 8062306a36Sopenharmony_ci pr_err("Failed to remap EFI memory map\n"); 8162306a36Sopenharmony_ci return 0; 8262306a36Sopenharmony_ci } 8362306a36Sopenharmony_ci 8462306a36Sopenharmony_ci if (efi_soft_reserve_enabled()) { 8562306a36Sopenharmony_ci efi_memory_desc_t *md; 8662306a36Sopenharmony_ci 8762306a36Sopenharmony_ci for_each_efi_memory_desc(md) { 8862306a36Sopenharmony_ci u64 md_size = md->num_pages << EFI_PAGE_SHIFT; 8962306a36Sopenharmony_ci struct resource *res; 9062306a36Sopenharmony_ci 9162306a36Sopenharmony_ci if (!(md->attribute & EFI_MEMORY_SP)) 9262306a36Sopenharmony_ci continue; 9362306a36Sopenharmony_ci 9462306a36Sopenharmony_ci res = kzalloc(sizeof(*res), GFP_KERNEL); 9562306a36Sopenharmony_ci if (WARN_ON(!res)) 9662306a36Sopenharmony_ci break; 9762306a36Sopenharmony_ci 9862306a36Sopenharmony_ci res->start = md->phys_addr; 9962306a36Sopenharmony_ci res->end = md->phys_addr + md_size - 1; 10062306a36Sopenharmony_ci res->name = "Soft Reserved"; 10162306a36Sopenharmony_ci res->flags = IORESOURCE_MEM; 10262306a36Sopenharmony_ci res->desc = IORES_DESC_SOFT_RESERVED; 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_ci insert_resource(&iomem_resource, res); 10562306a36Sopenharmony_ci } 10662306a36Sopenharmony_ci } 10762306a36Sopenharmony_ci 10862306a36Sopenharmony_ci if (efi_runtime_disabled()) { 10962306a36Sopenharmony_ci pr_info("EFI runtime services will be disabled.\n"); 11062306a36Sopenharmony_ci return 0; 11162306a36Sopenharmony_ci } 11262306a36Sopenharmony_ci 11362306a36Sopenharmony_ci if (efi_enabled(EFI_RUNTIME_SERVICES)) { 11462306a36Sopenharmony_ci pr_info("EFI runtime services access via paravirt.\n"); 11562306a36Sopenharmony_ci return 0; 11662306a36Sopenharmony_ci } 11762306a36Sopenharmony_ci 11862306a36Sopenharmony_ci pr_info("Remapping and enabling EFI services.\n"); 11962306a36Sopenharmony_ci 12062306a36Sopenharmony_ci if (!efi_virtmap_init()) { 12162306a36Sopenharmony_ci pr_err("UEFI virtual mapping missing or invalid -- runtime services will not be available\n"); 12262306a36Sopenharmony_ci return -ENOMEM; 12362306a36Sopenharmony_ci } 12462306a36Sopenharmony_ci 12562306a36Sopenharmony_ci /* Set up runtime services function pointers */ 12662306a36Sopenharmony_ci efi_native_runtime_setup(); 12762306a36Sopenharmony_ci set_bit(EFI_RUNTIME_SERVICES, &efi.flags); 12862306a36Sopenharmony_ci 12962306a36Sopenharmony_ci return 0; 13062306a36Sopenharmony_ci} 13162306a36Sopenharmony_ciearly_initcall(riscv_enable_runtime_services); 13262306a36Sopenharmony_ci 13362306a36Sopenharmony_cistatic void efi_virtmap_load(void) 13462306a36Sopenharmony_ci{ 13562306a36Sopenharmony_ci preempt_disable(); 13662306a36Sopenharmony_ci switch_mm(current->active_mm, &efi_mm, NULL); 13762306a36Sopenharmony_ci} 13862306a36Sopenharmony_ci 13962306a36Sopenharmony_cistatic void efi_virtmap_unload(void) 14062306a36Sopenharmony_ci{ 14162306a36Sopenharmony_ci switch_mm(&efi_mm, current->active_mm, NULL); 14262306a36Sopenharmony_ci preempt_enable(); 14362306a36Sopenharmony_ci} 14462306a36Sopenharmony_ci 14562306a36Sopenharmony_civoid arch_efi_call_virt_setup(void) 14662306a36Sopenharmony_ci{ 14762306a36Sopenharmony_ci sync_kernel_mappings(efi_mm.pgd); 14862306a36Sopenharmony_ci efi_virtmap_load(); 14962306a36Sopenharmony_ci} 15062306a36Sopenharmony_ci 15162306a36Sopenharmony_civoid arch_efi_call_virt_teardown(void) 15262306a36Sopenharmony_ci{ 15362306a36Sopenharmony_ci efi_virtmap_unload(); 15462306a36Sopenharmony_ci} 155