xref: /openbmc/linux/arch/x86/include/asm/efi.h (revision b4b89a02724245c4f4eda9dbfb7895ddf122ca7f)
1b2441318SGreg Kroah-Hartman /* SPDX-License-Identifier: GPL-2.0 */
21965aae3SH. Peter Anvin #ifndef _ASM_X86_EFI_H
31965aae3SH. Peter Anvin #define _ASM_X86_EFI_H
4bb898558SAl Viro 
5df6b35f4SIngo Molnar #include <asm/fpu/api.h>
6744937b0SIngo Molnar #include <asm/pgtable.h>
79788375dSMark Rutland #include <asm/processor-flags.h>
8c9f2a9a6SMatt Fleming #include <asm/tlb.h>
9dd84441aSDavid Woodhouse #include <asm/nospec-branch.h>
107e904a91SSai Praneeth #include <asm/mmu_context.h>
1114b864f4SArvind Sankar #include <linux/build_bug.h>
12744937b0SIngo Molnar 
139cd437acSArd Biesheuvel extern unsigned long efi_fw_vendor, efi_config_table;
149cd437acSArd Biesheuvel 
15d2f7cbe7SBorislav Petkov /*
16d2f7cbe7SBorislav Petkov  * We map the EFI regions needed for runtime services non-contiguously,
17d2f7cbe7SBorislav Petkov  * with preserved alignment on virtual addresses starting from -4G down
18d2f7cbe7SBorislav Petkov  * for a total max space of 64G. This way, we provide for stable runtime
19d2f7cbe7SBorislav Petkov  * services addresses across kernels so that a kexec'd kernel can still
20d2f7cbe7SBorislav Petkov  * use them.
21d2f7cbe7SBorislav Petkov  *
22d2f7cbe7SBorislav Petkov  * This is the main reason why we're doing stable VA mappings for RT
23d2f7cbe7SBorislav Petkov  * services.
24d2f7cbe7SBorislav Petkov  *
251f299fadSArd Biesheuvel  * SGI UV1 machines are known to be incompatible with this scheme, so we
261f299fadSArd Biesheuvel  * provide an opt-out for these machines via a DMI quirk that sets the
271f299fadSArd Biesheuvel  * attribute below.
28d2f7cbe7SBorislav Petkov  */
291f299fadSArd Biesheuvel #define EFI_UV1_MEMMAP         EFI_ARCH_1
301f299fadSArd Biesheuvel 
311f299fadSArd Biesheuvel static inline bool efi_have_uv1_memmap(void)
321f299fadSArd Biesheuvel {
331f299fadSArd Biesheuvel 	return IS_ENABLED(CONFIG_X86_UV) && efi_enabled(EFI_UV1_MEMMAP);
341f299fadSArd Biesheuvel }
35d2f7cbe7SBorislav Petkov 
36b8ff87a6SMatt Fleming #define EFI32_LOADER_SIGNATURE	"EL32"
37b8ff87a6SMatt Fleming #define EFI64_LOADER_SIGNATURE	"EL64"
38b8ff87a6SMatt Fleming 
399788375dSMark Rutland #define ARCH_EFI_IRQ_FLAGS_MASK	X86_EFLAGS_IF
40bb898558SAl Viro 
4114b864f4SArvind Sankar /*
4214b864f4SArvind Sankar  * The EFI services are called through variadic functions in many cases. These
4314b864f4SArvind Sankar  * functions are implemented in assembler and support only a fixed number of
4414b864f4SArvind Sankar  * arguments. The macros below allows us to check at build time that we don't
4514b864f4SArvind Sankar  * try to call them with too many arguments.
4614b864f4SArvind Sankar  *
4714b864f4SArvind Sankar  * __efi_nargs() will return the number of arguments if it is 7 or less, and
4814b864f4SArvind Sankar  * cause a BUILD_BUG otherwise. The limitations of the C preprocessor make it
4914b864f4SArvind Sankar  * impossible to calculate the exact number of arguments beyond some
5014b864f4SArvind Sankar  * pre-defined limit. The maximum number of arguments currently supported by
5114b864f4SArvind Sankar  * any of the thunks is 7, so this is good enough for now and can be extended
5214b864f4SArvind Sankar  * in the obvious way if we ever need more.
5314b864f4SArvind Sankar  */
5414b864f4SArvind Sankar 
5514b864f4SArvind Sankar #define __efi_nargs(...) __efi_nargs_(__VA_ARGS__)
5614b864f4SArvind Sankar #define __efi_nargs_(...) __efi_nargs__(0, ##__VA_ARGS__,	\
5714b864f4SArvind Sankar 	__efi_arg_sentinel(7), __efi_arg_sentinel(6),		\
5814b864f4SArvind Sankar 	__efi_arg_sentinel(5), __efi_arg_sentinel(4),		\
5914b864f4SArvind Sankar 	__efi_arg_sentinel(3), __efi_arg_sentinel(2),		\
6014b864f4SArvind Sankar 	__efi_arg_sentinel(1), __efi_arg_sentinel(0))
6114b864f4SArvind Sankar #define __efi_nargs__(_0, _1, _2, _3, _4, _5, _6, _7, n, ...)	\
6214b864f4SArvind Sankar 	__take_second_arg(n,					\
6314b864f4SArvind Sankar 		({ BUILD_BUG_ON_MSG(1, "__efi_nargs limit exceeded"); 8; }))
6414b864f4SArvind Sankar #define __efi_arg_sentinel(n) , n
6514b864f4SArvind Sankar 
6614b864f4SArvind Sankar /*
6714b864f4SArvind Sankar  * __efi_nargs_check(f, n, ...) will cause a BUILD_BUG if the ellipsis
6814b864f4SArvind Sankar  * represents more than n arguments.
6914b864f4SArvind Sankar  */
7014b864f4SArvind Sankar 
7114b864f4SArvind Sankar #define __efi_nargs_check(f, n, ...)					\
7214b864f4SArvind Sankar 	__efi_nargs_check_(f, __efi_nargs(__VA_ARGS__), n)
7314b864f4SArvind Sankar #define __efi_nargs_check_(f, p, n) __efi_nargs_check__(f, p, n)
7414b864f4SArvind Sankar #define __efi_nargs_check__(f, p, n) ({					\
7514b864f4SArvind Sankar 	BUILD_BUG_ON_MSG(						\
7614b864f4SArvind Sankar 		(p) > (n),						\
7714b864f4SArvind Sankar 		#f " called with too many arguments (" #p ">" #n ")");	\
7814b864f4SArvind Sankar })
7914b864f4SArvind Sankar 
809788375dSMark Rutland #ifdef CONFIG_X86_32
81dd84441aSDavid Woodhouse #define arch_efi_call_virt_setup()					\
82dd84441aSDavid Woodhouse ({									\
83dd84441aSDavid Woodhouse 	kernel_fpu_begin();						\
84dd84441aSDavid Woodhouse 	firmware_restrict_branch_speculation_start();			\
85dd84441aSDavid Woodhouse })
86dd84441aSDavid Woodhouse 
87dd84441aSDavid Woodhouse #define arch_efi_call_virt_teardown()					\
88dd84441aSDavid Woodhouse ({									\
89dd84441aSDavid Woodhouse 	firmware_restrict_branch_speculation_end();			\
90dd84441aSDavid Woodhouse 	kernel_fpu_end();						\
91dd84441aSDavid Woodhouse })
92dd84441aSDavid Woodhouse 
93bc25f9dbSMark Rutland 
9489ed4865SArd Biesheuvel #define arch_efi_call_virt(p, f, args...)	p->f(args)
95982e239cSRicardo Neri 
963e8fa263SMatt Fleming #define efi_ioremap(addr, size, type, attr)	ioremap_cache(addr, size)
97e1ad783bSKeith Packard 
98bb898558SAl Viro #else /* !CONFIG_X86_32 */
99bb898558SAl Viro 
10062fa6e69SMatt Fleming #define EFI_LOADER_SIGNATURE	"EL64"
101bb898558SAl Viro 
10214b864f4SArvind Sankar extern asmlinkage u64 __efi_call(void *fp, ...);
10314b864f4SArvind Sankar 
10414b864f4SArvind Sankar #define efi_call(...) ({						\
10514b864f4SArvind Sankar 	__efi_nargs_check(efi_call, 7, __VA_ARGS__);			\
10614b864f4SArvind Sankar 	__efi_call(__VA_ARGS__);					\
10714b864f4SArvind Sankar })
108bb898558SAl Viro 
109c9f2a9a6SMatt Fleming /*
11003781e40SSai Praneeth  * struct efi_scratch - Scratch space used while switching to/from efi_mm
11103781e40SSai Praneeth  * @phys_stack: stack used during EFI Mixed Mode
11203781e40SSai Praneeth  * @prev_mm:    store/restore stolen mm_struct while switching to/from efi_mm
113c9f2a9a6SMatt Fleming  */
114c9f2a9a6SMatt Fleming struct efi_scratch {
115c9f2a9a6SMatt Fleming 	u64			phys_stack;
11603781e40SSai Praneeth 	struct mm_struct	*prev_mm;
117c9f2a9a6SMatt Fleming } __packed;
118c9f2a9a6SMatt Fleming 
119bc25f9dbSMark Rutland #define arch_efi_call_virt_setup()					\
120d2f7cbe7SBorislav Petkov ({									\
121d2f7cbe7SBorislav Petkov 	efi_sync_low_kernel_mappings();					\
12212209993SSebastian Andrzej Siewior 	kernel_fpu_begin();						\
123dd84441aSDavid Woodhouse 	firmware_restrict_branch_speculation_start();			\
124c9f2a9a6SMatt Fleming 									\
1251f299fadSArd Biesheuvel 	if (!efi_have_uv1_memmap())					\
12603781e40SSai Praneeth 		efi_switch_mm(&efi_mm);					\
127bc25f9dbSMark Rutland })
128bc25f9dbSMark Rutland 
12980e75596SAlex Thorlton #define arch_efi_call_virt(p, f, args...)				\
13080e75596SAlex Thorlton 	efi_call((void *)p->f, args)					\
131bc25f9dbSMark Rutland 
132bc25f9dbSMark Rutland #define arch_efi_call_virt_teardown()					\
133bc25f9dbSMark Rutland ({									\
1341f299fadSArd Biesheuvel 	if (!efi_have_uv1_memmap())					\
13503781e40SSai Praneeth 		efi_switch_mm(efi_scratch.prev_mm);			\
136c9f2a9a6SMatt Fleming 									\
137dd84441aSDavid Woodhouse 	firmware_restrict_branch_speculation_end();			\
13812209993SSebastian Andrzej Siewior 	kernel_fpu_end();						\
139d2f7cbe7SBorislav Petkov })
140d2f7cbe7SBorislav Petkov 
1414e78eb05SMathias Krause extern void __iomem *__init efi_ioremap(unsigned long addr, unsigned long size,
1423e8fa263SMatt Fleming 					u32 type, u64 attribute);
143e1ad783bSKeith Packard 
144a523841eSAndrey Ryabinin #ifdef CONFIG_KASAN
145769a8089SAndrey Ryabinin /*
146769a8089SAndrey Ryabinin  * CONFIG_KASAN may redefine memset to __memset.  __memset function is present
147769a8089SAndrey Ryabinin  * only in kernel binary.  Since the EFI stub linked into a separate binary it
148769a8089SAndrey Ryabinin  * doesn't have __memset().  So we should use standard memset from
149769a8089SAndrey Ryabinin  * arch/x86/boot/compressed/string.c.  The same applies to memcpy and memmove.
150769a8089SAndrey Ryabinin  */
151769a8089SAndrey Ryabinin #undef memcpy
152769a8089SAndrey Ryabinin #undef memset
153769a8089SAndrey Ryabinin #undef memmove
154a523841eSAndrey Ryabinin #endif
155769a8089SAndrey Ryabinin 
156bb898558SAl Viro #endif /* CONFIG_X86_32 */
157bb898558SAl Viro 
158d2f7cbe7SBorislav Petkov extern struct efi_scratch efi_scratch;
1594e78eb05SMathias Krause extern void __init efi_set_executable(efi_memory_desc_t *md, bool executable);
1604e78eb05SMathias Krause extern int __init efi_memblock_x86_reserve_range(void);
1610bbea1ceSTaku Izumi extern void __init efi_print_memmap(void);
1624e78eb05SMathias Krause extern void __init efi_memory_uc(u64 addr, unsigned long size);
163d2f7cbe7SBorislav Petkov extern void __init efi_map_region(efi_memory_desc_t *md);
1643b266496SDave Young extern void __init efi_map_region_fixed(efi_memory_desc_t *md);
165d2f7cbe7SBorislav Petkov extern void efi_sync_low_kernel_mappings(void);
16667a9108eSMatt Fleming extern int __init efi_alloc_page_tables(void);
1674e78eb05SMathias Krause extern int __init efi_setup_page_tables(unsigned long pa_memmap, unsigned num_pages);
168d2f7cbe7SBorislav Petkov extern void __init old_map_region(efi_memory_desc_t *md);
169c55d016fSBorislav Petkov extern void __init runtime_code_page_mkexec(void);
1706d0cc887SSai Praneeth extern void __init efi_runtime_update_mappings(void);
17111cc8512SBorislav Petkov extern void __init efi_dump_pagetable(void);
172a5d90c92SBorislav Petkov extern void __init efi_apply_memmap_quirks(void);
173eeb9db09SSaurabh Tangri extern int __init efi_reuse_config(u64 tables, int nr_tables);
174eeb9db09SSaurabh Tangri extern void efi_delete_dummy_variable(void);
17503781e40SSai Praneeth extern void efi_switch_mm(struct mm_struct *mm);
1763425d934SSai Praneeth extern void efi_recover_from_page_fault(unsigned long phys_addr);
17747c33a09SSai Praneeth Prakhya extern void efi_free_boot_services(void);
1781f299fadSArd Biesheuvel extern pgd_t * __init efi_uv1_memmap_phys_prolog(void);
1791f299fadSArd Biesheuvel extern void __init efi_uv1_memmap_phys_epilog(pgd_t *save_pgd);
180bb898558SAl Viro 
181a088b858SArd Biesheuvel /* kexec external ABI */
1821fec0533SDave Young struct efi_setup_data {
1831fec0533SDave Young 	u64 fw_vendor;
184a088b858SArd Biesheuvel 	u64 __unused;
1851fec0533SDave Young 	u64 tables;
1861fec0533SDave Young 	u64 smbios;
1871fec0533SDave Young 	u64 reserved[8];
1881fec0533SDave Young };
1891fec0533SDave Young 
1901fec0533SDave Young extern u64 efi_setup;
1911fec0533SDave Young 
1926b59e366SSatoru Takeuchi #ifdef CONFIG_EFI
19314b864f4SArvind Sankar extern efi_status_t __efi64_thunk(u32, ...);
19414b864f4SArvind Sankar 
19514b864f4SArvind Sankar #define efi64_thunk(...) ({						\
19614b864f4SArvind Sankar 	__efi_nargs_check(efi64_thunk, 6, __VA_ARGS__);			\
19714b864f4SArvind Sankar 	__efi64_thunk(__VA_ARGS__);					\
19814b864f4SArvind Sankar })
1996b59e366SSatoru Takeuchi 
200a8147dbaSArd Biesheuvel static inline bool efi_is_mixed(void)
2016b59e366SSatoru Takeuchi {
202a8147dbaSArd Biesheuvel 	if (!IS_ENABLED(CONFIG_EFI_MIXED))
203a8147dbaSArd Biesheuvel 		return false;
204a8147dbaSArd Biesheuvel 	return IS_ENABLED(CONFIG_X86_64) && !efi_enabled(EFI_64BIT);
2056b59e366SSatoru Takeuchi }
2066b59e366SSatoru Takeuchi 
2077d453eeeSMatt Fleming static inline bool efi_runtime_supported(void)
2087d453eeeSMatt Fleming {
2096cfcd6f0SArd Biesheuvel 	if (IS_ENABLED(CONFIG_X86_64) == efi_enabled(EFI_64BIT))
2107d453eeeSMatt Fleming 		return true;
2117d453eeeSMatt Fleming 
2121f299fadSArd Biesheuvel 	return IS_ENABLED(CONFIG_EFI_MIXED);
2137d453eeeSMatt Fleming }
2147d453eeeSMatt Fleming 
2155c12af0cSDave Young extern void parse_efi_setup(u64 phys_addr, u32 data_len);
2164f9dbcfcSMatt Fleming 
21721289ec0SArd Biesheuvel extern void efifb_setup_from_dmi(struct screen_info *si, const char *opt);
21821289ec0SArd Biesheuvel 
2194f9dbcfcSMatt Fleming extern void efi_thunk_runtime_setup(void);
22069829470SArd Biesheuvel efi_status_t efi_set_virtual_address_map(unsigned long memory_map_size,
22169829470SArd Biesheuvel 					 unsigned long descriptor_size,
22269829470SArd Biesheuvel 					 u32 descriptor_version,
22359f2a619SArd Biesheuvel 					 efi_memory_desc_t *virtual_map,
22459f2a619SArd Biesheuvel 					 unsigned long systab_phys);
225243b6754SArd Biesheuvel 
226243b6754SArd Biesheuvel /* arch specific definitions used by the stub code */
227243b6754SArd Biesheuvel 
228796eb8d2SArd Biesheuvel __attribute_const__ bool efi_is_64bit(void);
22927571616SLukas Wunner 
230f958efe9SArd Biesheuvel static inline bool efi_is_native(void)
231f958efe9SArd Biesheuvel {
232f958efe9SArd Biesheuvel 	if (!IS_ENABLED(CONFIG_X86_64))
233f958efe9SArd Biesheuvel 		return true;
234c3710de5SArd Biesheuvel 	if (!IS_ENABLED(CONFIG_EFI_MIXED))
235c3710de5SArd Biesheuvel 		return true;
236f958efe9SArd Biesheuvel 	return efi_is_64bit();
237f958efe9SArd Biesheuvel }
238f958efe9SArd Biesheuvel 
239f958efe9SArd Biesheuvel #define efi_mixed_mode_cast(attr)					\
240f958efe9SArd Biesheuvel 	__builtin_choose_expr(						\
241f958efe9SArd Biesheuvel 		__builtin_types_compatible_p(u32, __typeof__(attr)),	\
242f958efe9SArd Biesheuvel 			(unsigned long)(attr), (attr))
243f958efe9SArd Biesheuvel 
24499ea8b1dSArd Biesheuvel #define efi_table_attr(inst, attr)					\
24599ea8b1dSArd Biesheuvel 	(efi_is_native()						\
24699ea8b1dSArd Biesheuvel 		? inst->attr						\
24799ea8b1dSArd Biesheuvel 		: (__typeof__(inst->attr))				\
24899ea8b1dSArd Biesheuvel 			efi_mixed_mode_cast(inst->mixed_mode.attr))
2493552fdf2SLukas Wunner 
250ea7d87f9SArvind Sankar /*
251ea7d87f9SArvind Sankar  * The following macros allow translating arguments if necessary from native to
252ea7d87f9SArvind Sankar  * mixed mode. The use case for this is to initialize the upper 32 bits of
253ea7d87f9SArvind Sankar  * output parameters, and where the 32-bit method requires a 64-bit argument,
254ea7d87f9SArvind Sankar  * which must be split up into two arguments to be thunked properly.
255ea7d87f9SArvind Sankar  *
256ea7d87f9SArvind Sankar  * As examples, the AllocatePool boot service returns the address of the
257ea7d87f9SArvind Sankar  * allocation, but it will not set the high 32 bits of the address. To ensure
258ea7d87f9SArvind Sankar  * that the full 64-bit address is initialized, we zero-init the address before
259ea7d87f9SArvind Sankar  * calling the thunk.
260ea7d87f9SArvind Sankar  *
261ea7d87f9SArvind Sankar  * The FreePages boot service takes a 64-bit physical address even in 32-bit
262ea7d87f9SArvind Sankar  * mode. For the thunk to work correctly, a native 64-bit call of
263ea7d87f9SArvind Sankar  * 	free_pages(addr, size)
264ea7d87f9SArvind Sankar  * must be translated to
265ea7d87f9SArvind Sankar  * 	efi64_thunk(free_pages, addr & U32_MAX, addr >> 32, size)
266ea7d87f9SArvind Sankar  * so that the two 32-bit halves of addr get pushed onto the stack separately.
267ea7d87f9SArvind Sankar  */
268ea7d87f9SArvind Sankar 
269ea7d87f9SArvind Sankar static inline void *efi64_zero_upper(void *p)
270ea7d87f9SArvind Sankar {
271ea7d87f9SArvind Sankar 	((u32 *)p)[1] = 0;
272ea7d87f9SArvind Sankar 	return p;
273ea7d87f9SArvind Sankar }
274ea7d87f9SArvind Sankar 
2753b8f44fcSArd Biesheuvel static inline u32 efi64_convert_status(efi_status_t status)
2763b8f44fcSArd Biesheuvel {
2773b8f44fcSArd Biesheuvel 	return (u32)(status | (u64)status >> 32);
2783b8f44fcSArd Biesheuvel }
2793b8f44fcSArd Biesheuvel 
280ea7d87f9SArvind Sankar #define __efi64_argmap_free_pages(addr, size)				\
281ea7d87f9SArvind Sankar 	((addr), 0, (size))
282ea7d87f9SArvind Sankar 
283ea7d87f9SArvind Sankar #define __efi64_argmap_get_memory_map(mm_size, mm, key, size, ver)	\
284ea7d87f9SArvind Sankar 	((mm_size), (mm), efi64_zero_upper(key), efi64_zero_upper(size), (ver))
285ea7d87f9SArvind Sankar 
286ea7d87f9SArvind Sankar #define __efi64_argmap_allocate_pool(type, size, buffer)		\
287ea7d87f9SArvind Sankar 	((type), (size), efi64_zero_upper(buffer))
288ea7d87f9SArvind Sankar 
289ea7d87f9SArvind Sankar #define __efi64_argmap_handle_protocol(handle, protocol, interface)	\
290ea7d87f9SArvind Sankar 	((handle), (protocol), efi64_zero_upper(interface))
291ea7d87f9SArvind Sankar 
292ea7d87f9SArvind Sankar #define __efi64_argmap_locate_protocol(protocol, reg, interface)	\
293ea7d87f9SArvind Sankar 	((protocol), (reg), efi64_zero_upper(interface))
294ea7d87f9SArvind Sankar 
295abd26868SArd Biesheuvel #define __efi64_argmap_locate_device_path(protocol, path, handle)	\
296abd26868SArd Biesheuvel 	((protocol), (path), efi64_zero_upper(handle))
297abd26868SArd Biesheuvel 
2983b8f44fcSArd Biesheuvel #define __efi64_argmap_exit(handle, status, size, data)			\
2993b8f44fcSArd Biesheuvel 	((handle), efi64_convert_status(status), (size), (data))
3003b8f44fcSArd Biesheuvel 
3014444f854SMatthew Garrett /* PCI I/O */
3024444f854SMatthew Garrett #define __efi64_argmap_get_location(protocol, seg, bus, dev, func)	\
3034444f854SMatthew Garrett 	((protocol), efi64_zero_upper(seg), efi64_zero_upper(bus),	\
3044444f854SMatthew Garrett 	 efi64_zero_upper(dev), efi64_zero_upper(func))
3054444f854SMatthew Garrett 
3062931d526SArd Biesheuvel /* LoadFile */
3072931d526SArd Biesheuvel #define __efi64_argmap_load_file(protocol, path, policy, bufsize, buf)	\
3082931d526SArd Biesheuvel 	((protocol), (path), (policy), efi64_zero_upper(bufsize), (buf))
3092931d526SArd Biesheuvel 
310*b4b89a02SArvind Sankar /* Graphics Output Protocol */
311*b4b89a02SArvind Sankar #define __efi64_argmap_query_mode(gop, mode, size, info)		\
312*b4b89a02SArvind Sankar 	((gop), (mode), efi64_zero_upper(size), efi64_zero_upper(info))
313*b4b89a02SArvind Sankar 
314ea7d87f9SArvind Sankar /*
315ea7d87f9SArvind Sankar  * The macros below handle the plumbing for the argument mapping. To add a
316ea7d87f9SArvind Sankar  * mapping for a specific EFI method, simply define a macro
317ea7d87f9SArvind Sankar  * __efi64_argmap_<method name>, following the examples above.
318ea7d87f9SArvind Sankar  */
319ea7d87f9SArvind Sankar 
320ea7d87f9SArvind Sankar #define __efi64_thunk_map(inst, func, ...)				\
321ea7d87f9SArvind Sankar 	efi64_thunk(inst->mixed_mode.func,				\
322ea7d87f9SArvind Sankar 		__efi64_argmap(__efi64_argmap_ ## func(__VA_ARGS__),	\
323ea7d87f9SArvind Sankar 			       (__VA_ARGS__)))
324ea7d87f9SArvind Sankar 
325ea7d87f9SArvind Sankar #define __efi64_argmap(mapped, args)					\
326ea7d87f9SArvind Sankar 	__PASTE(__efi64_argmap__, __efi_nargs(__efi_eat mapped))(mapped, args)
327ea7d87f9SArvind Sankar #define __efi64_argmap__0(mapped, args) __efi_eval mapped
328ea7d87f9SArvind Sankar #define __efi64_argmap__1(mapped, args) __efi_eval args
329ea7d87f9SArvind Sankar 
330ea7d87f9SArvind Sankar #define __efi_eat(...)
331ea7d87f9SArvind Sankar #define __efi_eval(...) __VA_ARGS__
332ea7d87f9SArvind Sankar 
333ea7d87f9SArvind Sankar /* The three macros below handle dispatching via the thunk if needed */
334ea7d87f9SArvind Sankar 
33547c0fd39SArd Biesheuvel #define efi_call_proto(inst, func, ...)					\
336afc4cc71SArd Biesheuvel 	(efi_is_native()						\
33747c0fd39SArd Biesheuvel 		? inst->func(inst, ##__VA_ARGS__)			\
338ea7d87f9SArvind Sankar 		: __efi64_thunk_map(inst, func, inst, ##__VA_ARGS__))
3393552fdf2SLukas Wunner 
340966291f6SArd Biesheuvel #define efi_bs_call(func, ...)						\
341afc4cc71SArd Biesheuvel 	(efi_is_native()						\
342966291f6SArd Biesheuvel 		? efi_system_table()->boottime->func(__VA_ARGS__)	\
343ea7d87f9SArvind Sankar 		: __efi64_thunk_map(efi_table_attr(efi_system_table(),	\
344ea7d87f9SArvind Sankar 				boottime), func, __VA_ARGS__))
345243b6754SArd Biesheuvel 
346966291f6SArd Biesheuvel #define efi_rt_call(func, ...)						\
347afc4cc71SArd Biesheuvel 	(efi_is_native()						\
348966291f6SArd Biesheuvel 		? efi_system_table()->runtime->func(__VA_ARGS__)	\
349ea7d87f9SArvind Sankar 		: __efi64_thunk_map(efi_table_attr(efi_system_table(),	\
350ea7d87f9SArvind Sankar 				runtime), func, __VA_ARGS__))
351a2cd2f3fSDavid Howells 
35244be28e9SMatt Fleming extern bool efi_reboot_required(void);
353e55f31a5SArd Biesheuvel extern bool efi_is_table_address(unsigned long phys_addr);
35444be28e9SMatt Fleming 
3556950e31bSDan Williams extern void efi_find_mirror(void);
3566950e31bSDan Williams extern void efi_reserve_boot_services(void);
3576b59e366SSatoru Takeuchi #else
3585c12af0cSDave Young static inline void parse_efi_setup(u64 phys_addr, u32 data_len) {}
35944be28e9SMatt Fleming static inline bool efi_reboot_required(void)
36044be28e9SMatt Fleming {
36144be28e9SMatt Fleming 	return false;
36244be28e9SMatt Fleming }
363e55f31a5SArd Biesheuvel static inline  bool efi_is_table_address(unsigned long phys_addr)
364e55f31a5SArd Biesheuvel {
365e55f31a5SArd Biesheuvel 	return false;
366e55f31a5SArd Biesheuvel }
3676950e31bSDan Williams static inline void efi_find_mirror(void)
3686950e31bSDan Williams {
3696950e31bSDan Williams }
3706950e31bSDan Williams static inline void efi_reserve_boot_services(void)
3716950e31bSDan Williams {
3726950e31bSDan Williams }
373bb898558SAl Viro #endif /* CONFIG_EFI */
374bb898558SAl Viro 
375199c8471SDan Williams #ifdef CONFIG_EFI_FAKE_MEMMAP
376199c8471SDan Williams extern void __init efi_fake_memmap_early(void);
377199c8471SDan Williams #else
378199c8471SDan Williams static inline void efi_fake_memmap_early(void)
379199c8471SDan Williams {
380199c8471SDan Williams }
381199c8471SDan Williams #endif
382199c8471SDan Williams 
3831965aae3SH. Peter Anvin #endif /* _ASM_X86_EFI_H */
384