docs: arm64: convert docs to ReST and rename to .rst
[linux-2.6-block.git] / arch / arm64 / include / asm / efi.h
CommitLineData
b2441318 1/* SPDX-License-Identifier: GPL-2.0 */
f84d0275
MS
2#ifndef _ASM_EFI_H
3#define _ASM_EFI_H
4
24d7c494 5#include <asm/boot.h>
39bc88e5 6#include <asm/cpufeature.h>
4328825d 7#include <asm/fpsimd.h>
f84d0275 8#include <asm/io.h>
170976bc 9#include <asm/memory.h>
f7d92489 10#include <asm/mmu_context.h>
e15dd494 11#include <asm/neon.h>
ee6cab5d 12#include <asm/ptrace.h>
f7d92489 13#include <asm/tlbflush.h>
f84d0275
MS
14
15#ifdef CONFIG_EFI
16extern void efi_init(void);
f84d0275
MS
17#else
18#define efi_init()
f84d0275
MS
19#endif
20
f7d92489 21int efi_create_mapping(struct mm_struct *mm, efi_memory_desc_t *md);
bd264d04 22int efi_set_mapping_permissions(struct mm_struct *mm, efi_memory_desc_t *md);
789957ef 23
489f80f7 24#define arch_efi_call_virt_setup() \
e15dd494 25({ \
f3cdfd23 26 efi_virtmap_load(); \
4328825d 27 __efi_fpsimd_begin(); \
e15dd494
AB
28})
29
80e75596 30#define arch_efi_call_virt(p, f, args...) \
e15dd494 31({ \
f3cdfd23 32 efi_##f##_t *__f; \
80e75596 33 __f = p->f; \
7e611e7d 34 __efi_rt_asm_wrapper(__f, #f, args); \
489f80f7
MR
35})
36
37#define arch_efi_call_virt_teardown() \
38({ \
4328825d 39 __efi_fpsimd_end(); \
f3cdfd23 40 efi_virtmap_unload(); \
e15dd494
AB
41})
42
7e611e7d
AB
43efi_status_t __efi_rt_asm_wrapper(void *, const char *, ...);
44
ee6cab5d
MR
45#define ARCH_EFI_IRQ_FLAGS_MASK (PSR_D_BIT | PSR_A_BIT | PSR_I_BIT | PSR_F_BIT)
46
4a503217
JT
47/*
48 * Even when Linux uses IRQ priorities for IRQ disabling, EFI does not.
49 * And EFI shouldn't really play around with priority masking as it is not aware
50 * which priorities the OS has assigned to its interrupts.
51 */
52#define arch_efi_save_flags(state_flags) \
53 ((void)((state_flags) = read_sysreg(daif)))
54
55#define arch_efi_restore_flags(state_flags) write_sysreg(state_flags, daif)
56
57
a13b0077
AB
58/* arch specific definitions used by the stub code */
59
60/*
61 * AArch64 requires the DTB to be 8-byte aligned in the first 512MiB from
62 * start of kernel and may not cross a 2MiB boundary. We set alignment to
63 * 2MiB so we know it won't cross a 2MiB boundary.
64 */
65#define EFI_FDT_ALIGN SZ_2M /* used by allocate_new_fdt_and_exit_boot() */
138728dd 66
e3067861
MR
67/*
68 * In some configurations (e.g. VMAP_STACK && 64K pages), stacks built into the
69 * kernel need greater alignment than we require the segments to be padded to.
70 */
71#define EFI_KIMG_ALIGN \
72 (SEGMENT_ALIGN > THREAD_ALIGN ? SEGMENT_ALIGN : THREAD_ALIGN)
170976bc 73
138728dd
AB
74/* on arm64, the FDT may be located anywhere in system RAM */
75static inline unsigned long efi_get_max_fdt_addr(unsigned long dram_base)
76{
77 return ULONG_MAX;
78}
79
80/*
81 * On arm64, we have to ensure that the initrd ends up in the linear region,
82 * which is a 1 GB aligned region of size '1UL << (VA_BITS - 1)' that is
83 * guaranteed to cover the kernel Image.
84 *
85 * Since the EFI stub is part of the kernel Image, we can relax the
b693d0b3 86 * usual requirements in Documentation/arm64/booting.rst, which still
138728dd
AB
87 * apply to other bootloaders, and are required for some kernel
88 * configurations.
89 */
90static inline unsigned long efi_get_max_initrd_addr(unsigned long dram_base,
91 unsigned long image_addr)
92{
93 return (image_addr & ~(SZ_1G - 1UL)) + (1UL << (VA_BITS - 1));
94}
a13b0077 95
fc372064
AB
96#define efi_call_early(f, ...) sys_table_arg->boottime->f(__VA_ARGS__)
97#define __efi_call_early(f, ...) f(__VA_ARGS__)
6d0ca4a4 98#define efi_call_runtime(f, ...) sys_table_arg->runtime->f(__VA_ARGS__)
fc372064 99#define efi_is_64bit() (true)
a13b0077 100
c4db9c1e
LW
101#define efi_table_attr(table, attr, instance) \
102 ((table##_t *)instance)->attr
103
3552fdf2
LW
104#define efi_call_proto(protocol, f, instance, ...) \
105 ((protocol##_t *)instance)->f(instance, ##__VA_ARGS__)
106
57fdb89a
AB
107#define alloc_screen_info(x...) &screen_info
108#define free_screen_info(x...)
109
760b61d7
AB
110/* redeclare as 'hidden' so the compiler will generate relative references */
111extern struct screen_info screen_info __attribute__((__visibility__("hidden")));
112
9822504c
AB
113static inline void efifb_setup_from_dmi(struct screen_info *si, const char *opt)
114{
115}
116
1bd0abb0
AB
117#define EFI_ALLOC_ALIGN SZ_64K
118
f3cdfd23 119/*
60305db9 120 * On ARM systems, virtually remapped UEFI runtime services are set up in two
f3cdfd23
AB
121 * distinct stages:
122 * - The stub retrieves the final version of the memory map from UEFI, populates
123 * the virt_addr fields and calls the SetVirtualAddressMap() [SVAM] runtime
124 * service to communicate the new mapping to the firmware (Note that the new
125 * mapping is not live at this time)
60305db9
AB
126 * - During an early initcall(), the EFI system table is permanently remapped
127 * and the virtual remapping of the UEFI Runtime Services regions is loaded
128 * into a private set of page tables. If this all succeeds, the Runtime
129 * Services are enabled and the EFI_RUNTIME_SERVICES bit set.
f3cdfd23 130 */
f3cdfd23 131
f7d92489
AB
132static inline void efi_set_pgd(struct mm_struct *mm)
133{
39bc88e5
CM
134 __switch_mm(mm);
135
136 if (system_uses_ttbr0_pan()) {
137 if (mm != current->active_mm) {
138 /*
139 * Update the current thread's saved ttbr0 since it is
6b88a32c
CM
140 * restored as part of a return from exception. Enable
141 * access to the valid TTBR0_EL1 and invoke the errata
142 * workaround directly since there is no return from
143 * exception when invoking the EFI run-time services.
39bc88e5
CM
144 */
145 update_saved_ttbr0(current, mm);
6b88a32c
CM
146 uaccess_ttbr0_enable();
147 post_ttbr_update_workaround();
39bc88e5
CM
148 } else {
149 /*
150 * Defer the switch to the current thread's TTBR0_EL1
151 * until uaccess_enable(). Restore the current
152 * thread's saved ttbr0 corresponding to its active_mm
39bc88e5 153 */
6b88a32c 154 uaccess_ttbr0_disable();
0adbdfde 155 update_saved_ttbr0(current, current->active_mm);
39bc88e5
CM
156 }
157 }
f7d92489
AB
158}
159
f3cdfd23
AB
160void efi_virtmap_load(void);
161void efi_virtmap_unload(void);
162
f84d0275 163#endif /* _ASM_EFI_H */