Tom Rini | 70df9d6 | 2018-05-07 17:02:21 -0400 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0+ */ |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 2 | /* |
| 3 | * EFI application loader |
| 4 | * |
| 5 | * Copyright (c) 2016 Alexander Graf |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 6 | */ |
| 7 | |
Heinrich Schuchardt | c2fd477 | 2017-10-18 18:13:07 +0200 | [diff] [blame] | 8 | #ifndef _EFI_LOADER_H |
| 9 | #define _EFI_LOADER_H 1 |
| 10 | |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 11 | #include <common.h> |
Simon Glass | 655306c | 2020-05-10 11:39:58 -0600 | [diff] [blame] | 12 | #include <blk.h> |
Simon Glass | 0f2af88 | 2020-05-10 11:40:05 -0600 | [diff] [blame] | 13 | #include <log.h> |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 14 | #include <part_efi.h> |
| 15 | #include <efi_api.h> |
AKASHI Takahiro | 2c0f9f7 | 2020-04-21 09:38:38 +0900 | [diff] [blame] | 16 | #include <image.h> |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 17 | #include <pe.h> |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 18 | |
Simon Glass | 655306c | 2020-05-10 11:39:58 -0600 | [diff] [blame] | 19 | struct blk_desc; |
| 20 | |
Simon Glass | 16fc74a | 2019-09-25 08:11:32 -0600 | [diff] [blame] | 21 | static inline int guidcmp(const void *g1, const void *g2) |
| 22 | { |
| 23 | return memcmp(g1, g2, sizeof(efi_guid_t)); |
| 24 | } |
| 25 | |
Sughosh Ganu | 196f66d | 2019-12-29 00:01:04 +0530 | [diff] [blame] | 26 | static inline void *guidcpy(void *dst, const void *src) |
| 27 | { |
| 28 | return memcpy(dst, src, sizeof(efi_guid_t)); |
| 29 | } |
| 30 | |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 31 | /* No need for efi loader support in SPL */ |
Stephen Warren | d0de806 | 2018-08-30 15:43:43 -0600 | [diff] [blame] | 32 | #if CONFIG_IS_ENABLED(EFI_LOADER) |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 33 | |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 34 | #include <linux/list.h> |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 35 | #include <linux/oid_registry.h> |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 36 | |
Heinrich Schuchardt | 2f528c2 | 2018-06-28 12:45:32 +0200 | [diff] [blame] | 37 | /* Maximum number of configuration tables */ |
| 38 | #define EFI_MAX_CONFIGURATION_TABLES 16 |
| 39 | |
Heinrich Schuchardt | 79d7202 | 2018-09-20 21:58:23 +0200 | [diff] [blame] | 40 | /* GUID used by the root node */ |
| 41 | #define U_BOOT_GUID \ |
| 42 | EFI_GUID(0xe61d73b9, 0xa384, 0x4acc, \ |
| 43 | 0xae, 0xab, 0x82, 0xe8, 0x28, 0xf3, 0x62, 0x8b) |
AKASHI Takahiro | 659a626 | 2019-09-12 13:52:35 +0900 | [diff] [blame] | 44 | /* GUID used as host device on sandbox */ |
| 45 | #define U_BOOT_HOST_DEV_GUID \ |
| 46 | EFI_GUID(0xbbe4e671, 0x5773, 0x4ea1, \ |
| 47 | 0x9a, 0xab, 0x3a, 0x7d, 0xbf, 0x40, 0xc4, 0x82) |
Heinrich Schuchardt | c770aaa | 2020-05-20 22:39:35 +0200 | [diff] [blame] | 48 | /* GUID used as root for virtio devices */ |
| 49 | #define U_BOOT_VIRTIO_DEV_GUID \ |
| 50 | EFI_GUID(0x63293792, 0xadf5, 0x9325, \ |
| 51 | 0xb9, 0x9f, 0x4e, 0x0e, 0x45, 0x5c, 0x1b, 0x1e) |
Heinrich Schuchardt | 79d7202 | 2018-09-20 21:58:23 +0200 | [diff] [blame] | 52 | |
Heinrich Schuchardt | 6fbb8ac | 2019-11-28 06:46:09 +0100 | [diff] [blame] | 53 | /* Use internal device tree when starting UEFI application */ |
Heinrich Schuchardt | 6246741 | 2019-12-08 01:07:01 +0100 | [diff] [blame] | 54 | #define EFI_FDT_USE_INTERNAL NULL |
Heinrich Schuchardt | 6fbb8ac | 2019-11-28 06:46:09 +0100 | [diff] [blame] | 55 | |
AKASHI Takahiro | 0b27575 | 2019-04-16 13:24:20 +0900 | [diff] [blame] | 56 | /* Root node */ |
| 57 | extern efi_handle_t efi_root; |
| 58 | |
Heinrich Schuchardt | de9bdc6 | 2020-03-19 18:21:58 +0000 | [diff] [blame] | 59 | /* Set to EFI_SUCCESS when initialized */ |
| 60 | extern efi_status_t efi_obj_list_initialized; |
| 61 | |
Heinrich Schuchardt | 628dbd7 | 2020-11-12 21:26:28 +0100 | [diff] [blame] | 62 | /* Flag used by the selftest to avoid detaching devices in ExitBootServices() */ |
| 63 | extern bool efi_st_keep_devices; |
| 64 | |
Heinrich Schuchardt | a993173 | 2020-03-19 15:16:31 +0100 | [diff] [blame] | 65 | /* EFI system partition */ |
| 66 | extern struct efi_system_partition { |
| 67 | enum if_type if_type; |
| 68 | int devnum; |
| 69 | u8 part; |
| 70 | } efi_system_partition; |
| 71 | |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 72 | int __efi_entry_check(void); |
| 73 | int __efi_exit_check(void); |
Heinrich Schuchardt | 4d66489 | 2017-08-18 17:45:16 +0200 | [diff] [blame] | 74 | const char *__efi_nesting(void); |
Rob Clark | e7896c3 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 75 | const char *__efi_nesting_inc(void); |
| 76 | const char *__efi_nesting_dec(void); |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 77 | |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 78 | /* |
| 79 | * Enter the u-boot world from UEFI: |
| 80 | */ |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 81 | #define EFI_ENTRY(format, ...) do { \ |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 82 | assert(__efi_entry_check()); \ |
Rob Clark | e7896c3 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 83 | debug("%sEFI: Entry %s(" format ")\n", __efi_nesting_inc(), \ |
| 84 | __func__, ##__VA_ARGS__); \ |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 85 | } while(0) |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 86 | |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 87 | /* |
| 88 | * Exit the u-boot world back to UEFI: |
| 89 | */ |
Rob Clark | 84a19a0 | 2017-07-24 10:31:52 -0400 | [diff] [blame] | 90 | #define EFI_EXIT(ret) ({ \ |
xypron.glpk@gmx.de | 8f9dd92 | 2017-08-17 18:57:36 +0200 | [diff] [blame] | 91 | typeof(ret) _r = ret; \ |
Rob Clark | e7896c3 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 92 | debug("%sEFI: Exit: %s: %u\n", __efi_nesting_dec(), \ |
xypron.glpk@gmx.de | 8f9dd92 | 2017-08-17 18:57:36 +0200 | [diff] [blame] | 93 | __func__, (u32)((uintptr_t) _r & ~EFI_ERROR_MASK)); \ |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 94 | assert(__efi_exit_check()); \ |
| 95 | _r; \ |
Rob Clark | 84a19a0 | 2017-07-24 10:31:52 -0400 | [diff] [blame] | 96 | }) |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 97 | |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 98 | /* |
Heinrich Schuchardt | 91e5b8a | 2017-09-15 10:06:10 +0200 | [diff] [blame] | 99 | * Call non-void UEFI function from u-boot and retrieve return value: |
| 100 | */ |
| 101 | #define EFI_CALL(exp) ({ \ |
| 102 | debug("%sEFI: Call: %s\n", __efi_nesting_inc(), #exp); \ |
| 103 | assert(__efi_exit_check()); \ |
| 104 | typeof(exp) _r = exp; \ |
| 105 | assert(__efi_entry_check()); \ |
| 106 | debug("%sEFI: %lu returned by %s\n", __efi_nesting_dec(), \ |
| 107 | (unsigned long)((uintptr_t)_r & ~EFI_ERROR_MASK), #exp); \ |
| 108 | _r; \ |
| 109 | }) |
| 110 | |
| 111 | /* |
| 112 | * Call void UEFI function from u-boot: |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 113 | */ |
Heinrich Schuchardt | 91e5b8a | 2017-09-15 10:06:10 +0200 | [diff] [blame] | 114 | #define EFI_CALL_VOID(exp) do { \ |
Rob Clark | e7896c3 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 115 | debug("%sEFI: Call: %s\n", __efi_nesting_inc(), #exp); \ |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 116 | assert(__efi_exit_check()); \ |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 117 | exp; \ |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 118 | assert(__efi_entry_check()); \ |
Rob Clark | e7896c3 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 119 | debug("%sEFI: Return From: %s\n", __efi_nesting_dec(), #exp); \ |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 120 | } while(0) |
| 121 | |
Heinrich Schuchardt | 4d66489 | 2017-08-18 17:45:16 +0200 | [diff] [blame] | 122 | /* |
Heinrich Schuchardt | 3d2abc3 | 2018-01-11 08:16:01 +0100 | [diff] [blame] | 123 | * Write an indented message with EFI prefix |
Heinrich Schuchardt | 4d66489 | 2017-08-18 17:45:16 +0200 | [diff] [blame] | 124 | */ |
Heinrich Schuchardt | 3d2abc3 | 2018-01-11 08:16:01 +0100 | [diff] [blame] | 125 | #define EFI_PRINT(format, ...) ({ \ |
| 126 | debug("%sEFI: " format, __efi_nesting(), \ |
| 127 | ##__VA_ARGS__); \ |
Heinrich Schuchardt | 4d66489 | 2017-08-18 17:45:16 +0200 | [diff] [blame] | 128 | }) |
| 129 | |
Alexander Graf | 59254d6 | 2018-04-23 07:59:47 +0200 | [diff] [blame] | 130 | #ifdef CONFIG_SYS_CACHELINE_SIZE |
| 131 | #define EFI_CACHELINE_SIZE CONFIG_SYS_CACHELINE_SIZE |
| 132 | #else |
| 133 | /* Just use the greatest cache flush alignment requirement I'm aware of */ |
| 134 | #define EFI_CACHELINE_SIZE 128 |
| 135 | #endif |
| 136 | |
Heinrich Schuchardt | 0f233c4 | 2018-07-02 12:53:55 +0200 | [diff] [blame] | 137 | /* Key identifying current memory map */ |
| 138 | extern efi_uintn_t efi_memory_map_key; |
| 139 | |
Alexander Graf | 0bd425a | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 140 | extern struct efi_runtime_services efi_runtime_services; |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 141 | extern struct efi_system_table systab; |
| 142 | |
Heinrich Schuchardt | 580c13b | 2017-10-26 19:25:59 +0200 | [diff] [blame] | 143 | extern struct efi_simple_text_output_protocol efi_con_out; |
Heinrich Schuchardt | 3dabffd | 2018-09-08 10:20:10 +0200 | [diff] [blame] | 144 | extern struct efi_simple_text_input_protocol efi_con_in; |
Heinrich Schuchardt | 580c13b | 2017-10-26 19:25:59 +0200 | [diff] [blame] | 145 | extern struct efi_console_control_protocol efi_console_control; |
xypron.glpk@gmx.de | 3c042b2 | 2017-07-11 22:06:25 +0200 | [diff] [blame] | 146 | extern const struct efi_device_path_to_text_protocol efi_device_path_to_text; |
Leif Lindholm | b6e6fdc | 2018-03-09 17:43:21 +0100 | [diff] [blame] | 147 | /* implementation of the EFI_DEVICE_PATH_UTILITIES_PROTOCOL */ |
| 148 | extern const struct efi_device_path_utilities_protocol |
| 149 | efi_device_path_utilities; |
Heinrich Schuchardt | 18ed8cf | 2019-05-16 18:19:00 +0200 | [diff] [blame] | 150 | /* current version of the EFI_UNICODE_COLLATION_PROTOCOL */ |
Heinrich Schuchardt | e59072a | 2018-09-04 19:34:58 +0200 | [diff] [blame] | 151 | extern const struct efi_unicode_collation_protocol |
Heinrich Schuchardt | b325884 | 2019-05-16 07:52:58 +0200 | [diff] [blame] | 152 | efi_unicode_collation_protocol2; |
AKASHI Takahiro | ca8aa71 | 2019-01-21 12:13:00 +0900 | [diff] [blame] | 153 | extern const struct efi_hii_config_routing_protocol efi_hii_config_routing; |
| 154 | extern const struct efi_hii_config_access_protocol efi_hii_config_access; |
Leif Lindholm | 5aab1b8 | 2019-01-21 12:12:57 +0900 | [diff] [blame] | 155 | extern const struct efi_hii_database_protocol efi_hii_database; |
| 156 | extern const struct efi_hii_string_protocol efi_hii_string; |
Alexander Graf | 4aacacc | 2016-03-04 01:10:00 +0100 | [diff] [blame] | 157 | |
Rob Clark | 85dd721 | 2017-09-13 18:05:30 -0400 | [diff] [blame] | 158 | uint16_t *efi_dp_str(struct efi_device_path *dp); |
| 159 | |
Heinrich Schuchardt | 79d7202 | 2018-09-20 21:58:23 +0200 | [diff] [blame] | 160 | /* GUID of the U-Boot root node */ |
| 161 | extern const efi_guid_t efi_u_boot_guid; |
AKASHI Takahiro | 659a626 | 2019-09-12 13:52:35 +0900 | [diff] [blame] | 162 | #ifdef CONFIG_SANDBOX |
| 163 | /* GUID of U-Boot host device on sandbox */ |
| 164 | extern const efi_guid_t efi_guid_host_dev; |
| 165 | #endif |
Heinrich Schuchardt | 405afb5 | 2018-01-19 20:24:45 +0100 | [diff] [blame] | 166 | /* GUID of the EFI_BLOCK_IO_PROTOCOL */ |
| 167 | extern const efi_guid_t efi_block_io_guid; |
Rob Clark | c84c110 | 2017-09-13 18:05:38 -0400 | [diff] [blame] | 168 | extern const efi_guid_t efi_global_variable_guid; |
Alexander Graf | 4aacacc | 2016-03-04 01:10:00 +0100 | [diff] [blame] | 169 | extern const efi_guid_t efi_guid_console_control; |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 170 | extern const efi_guid_t efi_guid_device_path; |
Heinrich Schuchardt | 760255f | 2018-01-11 08:16:02 +0100 | [diff] [blame] | 171 | /* GUID of the EFI_DRIVER_BINDING_PROTOCOL */ |
| 172 | extern const efi_guid_t efi_guid_driver_binding_protocol; |
Heinrich Schuchardt | 672d99e | 2018-02-18 15:17:51 +0100 | [diff] [blame] | 173 | /* event group ExitBootServices() invoked */ |
| 174 | extern const efi_guid_t efi_guid_event_group_exit_boot_services; |
| 175 | /* event group SetVirtualAddressMap() invoked */ |
| 176 | extern const efi_guid_t efi_guid_event_group_virtual_address_change; |
| 177 | /* event group memory map changed */ |
| 178 | extern const efi_guid_t efi_guid_event_group_memory_map_change; |
| 179 | /* event group boot manager about to boot */ |
| 180 | extern const efi_guid_t efi_guid_event_group_ready_to_boot; |
| 181 | /* event group ResetSystem() invoked (before ExitBootServices) */ |
| 182 | extern const efi_guid_t efi_guid_event_group_reset_system; |
Heinrich Schuchardt | 44ab21b | 2018-03-03 15:29:03 +0100 | [diff] [blame] | 183 | /* GUID of the device tree table */ |
| 184 | extern const efi_guid_t efi_guid_fdt; |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 185 | extern const efi_guid_t efi_guid_loaded_image; |
AKASHI Takahiro | bbe13da | 2019-03-27 13:40:32 +0900 | [diff] [blame] | 186 | extern const efi_guid_t efi_guid_loaded_image_device_path; |
xypron.glpk@gmx.de | 3c042b2 | 2017-07-11 22:06:25 +0200 | [diff] [blame] | 187 | extern const efi_guid_t efi_guid_device_path_to_text_protocol; |
Rob Clark | 5314203 | 2017-09-13 18:05:34 -0400 | [diff] [blame] | 188 | extern const efi_guid_t efi_simple_file_system_protocol_guid; |
| 189 | extern const efi_guid_t efi_file_info_guid; |
Heinrich Schuchardt | 37fb4b9 | 2018-04-04 15:42:11 +0200 | [diff] [blame] | 190 | /* GUID for file system information */ |
| 191 | extern const efi_guid_t efi_file_system_info_guid; |
Leif Lindholm | b6e6fdc | 2018-03-09 17:43:21 +0100 | [diff] [blame] | 192 | extern const efi_guid_t efi_guid_device_path_utilities_protocol; |
Heinrich Schuchardt | 18ed8cf | 2019-05-16 18:19:00 +0200 | [diff] [blame] | 193 | /* GUID of the deprecated Unicode collation protocol */ |
| 194 | extern const efi_guid_t efi_guid_unicode_collation_protocol; |
Heinrich Schuchardt | 485956d | 2020-12-04 03:33:41 +0100 | [diff] [blame] | 195 | /* GUIDs of the Load File and Load File2 protocol */ |
| 196 | extern const efi_guid_t efi_guid_load_file_protocol; |
| 197 | extern const efi_guid_t efi_guid_load_file2_protocol; |
Heinrich Schuchardt | e59072a | 2018-09-04 19:34:58 +0200 | [diff] [blame] | 198 | /* GUID of the Unicode collation protocol */ |
Heinrich Schuchardt | b325884 | 2019-05-16 07:52:58 +0200 | [diff] [blame] | 199 | extern const efi_guid_t efi_guid_unicode_collation_protocol2; |
AKASHI Takahiro | ca8aa71 | 2019-01-21 12:13:00 +0900 | [diff] [blame] | 200 | extern const efi_guid_t efi_guid_hii_config_routing_protocol; |
| 201 | extern const efi_guid_t efi_guid_hii_config_access_protocol; |
Leif Lindholm | 5aab1b8 | 2019-01-21 12:12:57 +0900 | [diff] [blame] | 202 | extern const efi_guid_t efi_guid_hii_database_protocol; |
| 203 | extern const efi_guid_t efi_guid_hii_string_protocol; |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 204 | /* GUIDs for authentication */ |
| 205 | extern const efi_guid_t efi_guid_image_security_database; |
| 206 | extern const efi_guid_t efi_guid_sha256; |
| 207 | extern const efi_guid_t efi_guid_cert_x509; |
| 208 | extern const efi_guid_t efi_guid_cert_x509_sha256; |
AKASHI Takahiro | b0f49ee | 2020-04-14 11:51:41 +0900 | [diff] [blame] | 209 | extern const efi_guid_t efi_guid_cert_type_pkcs7; |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 210 | |
Sughosh Ganu | 693a4f4 | 2019-12-29 00:01:06 +0530 | [diff] [blame] | 211 | /* GUID of RNG protocol */ |
| 212 | extern const efi_guid_t efi_guid_rng_protocol; |
AKASHI Takahiro | 473d9b3 | 2020-11-17 09:27:55 +0900 | [diff] [blame] | 213 | /* GUID of capsule update result */ |
| 214 | extern const efi_guid_t efi_guid_capsule_report; |
AKASHI Takahiro | 0d96378 | 2020-11-30 18:12:11 +0900 | [diff] [blame] | 215 | /* GUID of firmware management protocol */ |
| 216 | extern const efi_guid_t efi_guid_firmware_management_protocol; |
Jose Marinho | ebb61ee | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 217 | /* GUID for the ESRT */ |
| 218 | extern const efi_guid_t efi_esrt_guid; |
Sughosh Ganu | 693a4f4 | 2019-12-29 00:01:06 +0530 | [diff] [blame] | 219 | |
Marek Behún | 6950450 | 2021-05-20 13:23:56 +0200 | [diff] [blame] | 220 | extern char __efi_runtime_start[], __efi_runtime_stop[]; |
| 221 | extern char __efi_runtime_rel_start[], __efi_runtime_rel_stop[]; |
Alexander Graf | 0bd425a | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 222 | |
Heinrich Schuchardt | 2e4b41f | 2019-05-21 17:51:35 +0200 | [diff] [blame] | 223 | /** |
| 224 | * struct efi_open_protocol_info_item - open protocol info item |
| 225 | * |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 226 | * When a protocol is opened a open protocol info entry is created. |
| 227 | * These are maintained in a list. |
Heinrich Schuchardt | 2e4b41f | 2019-05-21 17:51:35 +0200 | [diff] [blame] | 228 | * |
| 229 | * @link: link to the list of open protocol info entries of a protocol |
| 230 | * @info: information about the opening of a protocol |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 231 | */ |
| 232 | struct efi_open_protocol_info_item { |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 233 | struct list_head link; |
| 234 | struct efi_open_protocol_info_entry info; |
| 235 | }; |
| 236 | |
Heinrich Schuchardt | 2e4b41f | 2019-05-21 17:51:35 +0200 | [diff] [blame] | 237 | /** |
| 238 | * struct efi_handler - single protocol interface of a handle |
| 239 | * |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 240 | * When the UEFI payload wants to open a protocol on an object to get its |
| 241 | * interface (usually a struct with callback functions), this struct maps the |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 242 | * protocol GUID to the respective protocol interface |
Heinrich Schuchardt | 2e4b41f | 2019-05-21 17:51:35 +0200 | [diff] [blame] | 243 | * |
| 244 | * @link: link to the list of protocols of a handle |
| 245 | * @guid: GUID of the protocol |
| 246 | * @protocol_interface: protocol interface |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 247 | * @open_infos: link to the list of open protocol info items |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 248 | */ |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 249 | struct efi_handler { |
Heinrich Schuchardt | 99ce206 | 2017-11-26 14:05:17 +0100 | [diff] [blame] | 250 | struct list_head link; |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 251 | const efi_guid_t *guid; |
xypron.glpk@gmx.de | c35c924 | 2017-07-11 22:06:14 +0200 | [diff] [blame] | 252 | void *protocol_interface; |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 253 | struct list_head open_infos; |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 254 | }; |
| 255 | |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 256 | /** |
Heinrich Schuchardt | b27ced4 | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 257 | * enum efi_object_type - type of EFI object |
| 258 | * |
| 259 | * In UnloadImage we must be able to identify if the handle relates to a |
| 260 | * started image. |
| 261 | */ |
| 262 | enum efi_object_type { |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 263 | /** @EFI_OBJECT_TYPE_UNDEFINED: undefined image type */ |
Heinrich Schuchardt | b27ced4 | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 264 | EFI_OBJECT_TYPE_UNDEFINED = 0, |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 265 | /** @EFI_OBJECT_TYPE_U_BOOT_FIRMWARE: U-Boot firmware */ |
Heinrich Schuchardt | 2e0a790 | 2019-05-05 16:55:06 +0200 | [diff] [blame] | 266 | EFI_OBJECT_TYPE_U_BOOT_FIRMWARE, |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 267 | /** @EFI_OBJECT_TYPE_LOADED_IMAGE: loaded image (not started) */ |
Heinrich Schuchardt | b27ced4 | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 268 | EFI_OBJECT_TYPE_LOADED_IMAGE, |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 269 | /** @EFI_OBJECT_TYPE_STARTED_IMAGE: started image */ |
Heinrich Schuchardt | b27ced4 | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 270 | EFI_OBJECT_TYPE_STARTED_IMAGE, |
| 271 | }; |
| 272 | |
| 273 | /** |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 274 | * struct efi_object - dereferenced EFI handle |
| 275 | * |
| 276 | * @link: pointers to put the handle into a linked list |
| 277 | * @protocols: linked list with the protocol interfaces installed on this |
| 278 | * handle |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 279 | * @type: image type if the handle relates to an image |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 280 | * |
| 281 | * UEFI offers a flexible and expandable object model. The objects in the UEFI |
| 282 | * API are devices, drivers, and loaded images. struct efi_object is our storage |
| 283 | * structure for these objects. |
| 284 | * |
| 285 | * When including this structure into a larger structure always put it first so |
| 286 | * that when deleting a handle the whole encompassing structure can be freed. |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 287 | * |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 288 | * A pointer to this structure is referred to as a handle. Typedef efi_handle_t |
| 289 | * has been created for such pointers. |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 290 | */ |
| 291 | struct efi_object { |
| 292 | /* Every UEFI object is part of a global object list */ |
| 293 | struct list_head link; |
Heinrich Schuchardt | 99ce206 | 2017-11-26 14:05:17 +0100 | [diff] [blame] | 294 | /* The list of protocols */ |
| 295 | struct list_head protocols; |
Heinrich Schuchardt | b27ced4 | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 296 | enum efi_object_type type; |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 297 | }; |
| 298 | |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 299 | enum efi_image_auth_status { |
| 300 | EFI_IMAGE_AUTH_FAILED = 0, |
| 301 | EFI_IMAGE_AUTH_PASSED, |
| 302 | }; |
| 303 | |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 304 | /** |
Heinrich Schuchardt | 3c3a735 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 305 | * struct efi_loaded_image_obj - handle of a loaded image |
Heinrich Schuchardt | 7292872 | 2018-09-26 05:27:56 +0200 | [diff] [blame] | 306 | * |
| 307 | * @header: EFI object header |
Heinrich Schuchardt | 3d44512 | 2019-04-30 17:57:30 +0200 | [diff] [blame] | 308 | * @exit_status: exit status passed to Exit() |
| 309 | * @exit_data_size: exit data size passed to Exit() |
| 310 | * @exit_data: exit data passed to Exit() |
Heinrich Schuchardt | 93b40d6 | 2020-12-28 22:42:51 +0100 | [diff] [blame] | 311 | * @exit_jmp: long jump buffer for returning from started image |
Heinrich Schuchardt | 7292872 | 2018-09-26 05:27:56 +0200 | [diff] [blame] | 312 | * @entry: entry address of the relocated image |
Heinrich Schuchardt | 93b40d6 | 2020-12-28 22:42:51 +0100 | [diff] [blame] | 313 | * @image_type: indicates if the image is an applicition or a driver |
| 314 | * @auth_status: indicates if the image is authenticated |
Heinrich Schuchardt | 3c3a735 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 315 | */ |
| 316 | struct efi_loaded_image_obj { |
Heinrich Schuchardt | 7292872 | 2018-09-26 05:27:56 +0200 | [diff] [blame] | 317 | struct efi_object header; |
Heinrich Schuchardt | 026c7ec | 2020-12-28 23:24:40 +0100 | [diff] [blame] | 318 | efi_status_t *exit_status; |
Heinrich Schuchardt | 3d44512 | 2019-04-30 17:57:30 +0200 | [diff] [blame] | 319 | efi_uintn_t *exit_data_size; |
| 320 | u16 **exit_data; |
Heinrich Schuchardt | 026c7ec | 2020-12-28 23:24:40 +0100 | [diff] [blame] | 321 | struct jmp_buf_data *exit_jmp; |
Heinrich Schuchardt | 3c3a735 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 322 | EFIAPI efi_status_t (*entry)(efi_handle_t image_handle, |
| 323 | struct efi_system_table *st); |
Heinrich Schuchardt | 3758752 | 2019-05-01 20:07:04 +0200 | [diff] [blame] | 324 | u16 image_type; |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 325 | enum efi_image_auth_status auth_status; |
Heinrich Schuchardt | 3c3a735 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 326 | }; |
| 327 | |
| 328 | /** |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 329 | * struct efi_event |
| 330 | * |
Heinrich Schuchardt | 370c7a8 | 2018-02-18 15:17:50 +0100 | [diff] [blame] | 331 | * @link: Link to list of all events |
Heinrich Schuchardt | 35c0cf6 | 2019-06-05 21:00:39 +0200 | [diff] [blame] | 332 | * @queue_link: Link to the list of queued events |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 333 | * @type: Type of event, see efi_create_event |
| 334 | * @notify_tpl: Task priority level of notifications |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 335 | * @notify_function: Function to call when the event is triggered |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 336 | * @notify_context: Data to be passed to the notify function |
Heinrich Schuchardt | bf7f169 | 2018-02-18 15:17:52 +0100 | [diff] [blame] | 337 | * @group: Event group |
Heinrich Schuchardt | 370c7a8 | 2018-02-18 15:17:50 +0100 | [diff] [blame] | 338 | * @trigger_time: Period of the timer |
| 339 | * @trigger_next: Next time to trigger the timer |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 340 | * @trigger_type: Type of timer, see efi_set_timer |
Heinrich Schuchardt | 370c7a8 | 2018-02-18 15:17:50 +0100 | [diff] [blame] | 341 | * @is_signaled: The event occurred. The event is in the signaled state. |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 342 | */ |
| 343 | struct efi_event { |
Heinrich Schuchardt | 370c7a8 | 2018-02-18 15:17:50 +0100 | [diff] [blame] | 344 | struct list_head link; |
Heinrich Schuchardt | 35c0cf6 | 2019-06-05 21:00:39 +0200 | [diff] [blame] | 345 | struct list_head queue_link; |
xypron.glpk@gmx.de | 3ecc6bd | 2017-07-19 19:22:34 +0200 | [diff] [blame] | 346 | uint32_t type; |
Heinrich Schuchardt | f8d4ec3 | 2017-11-06 21:17:47 +0100 | [diff] [blame] | 347 | efi_uintn_t notify_tpl; |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 348 | void (EFIAPI *notify_function)(struct efi_event *event, void *context); |
| 349 | void *notify_context; |
Heinrich Schuchardt | bf7f169 | 2018-02-18 15:17:52 +0100 | [diff] [blame] | 350 | const efi_guid_t *group; |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 351 | u64 trigger_next; |
| 352 | u64 trigger_time; |
xypron.glpk@gmx.de | 3ecc6bd | 2017-07-19 19:22:34 +0200 | [diff] [blame] | 353 | enum efi_timer_delay trigger_type; |
Heinrich Schuchardt | 1bbee39 | 2017-10-04 15:03:24 +0200 | [diff] [blame] | 354 | bool is_signaled; |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 355 | }; |
| 356 | |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 357 | /* This list contains all UEFI objects we know of */ |
| 358 | extern struct list_head efi_obj_list; |
Heinrich Schuchardt | bf7f169 | 2018-02-18 15:17:52 +0100 | [diff] [blame] | 359 | /* List of all events */ |
| 360 | extern struct list_head efi_events; |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 361 | |
Heinrich Schuchardt | 6eec42d | 2019-05-04 17:27:54 +0200 | [diff] [blame] | 362 | /** |
Heinrich Schuchardt | d375e75 | 2019-05-21 18:19:01 +0200 | [diff] [blame] | 363 | * struct efi_protocol_notification - handle for notified protocol |
| 364 | * |
| 365 | * When a protocol interface is installed for which an event was registered with |
| 366 | * the RegisterProtocolNotify() service this structure is used to hold the |
| 367 | * handle on which the protocol interface was installed. |
| 368 | * |
| 369 | * @link: link to list of all handles notified for this event |
| 370 | * @handle: handle on which the notified protocol interface was installed |
| 371 | */ |
| 372 | struct efi_protocol_notification { |
| 373 | struct list_head link; |
| 374 | efi_handle_t handle; |
| 375 | }; |
| 376 | |
| 377 | /** |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 378 | * struct efi_register_notify_event - event registered by |
| 379 | * RegisterProtocolNotify() |
Heinrich Schuchardt | 6eec42d | 2019-05-04 17:27:54 +0200 | [diff] [blame] | 380 | * |
| 381 | * The address of this structure serves as registration value. |
| 382 | * |
Heinrich Schuchardt | d375e75 | 2019-05-21 18:19:01 +0200 | [diff] [blame] | 383 | * @link: link to list of all registered events |
| 384 | * @event: registered event. The same event may registered for multiple |
| 385 | * GUIDs. |
| 386 | * @protocol: protocol for which the event is registered |
| 387 | * @handles: linked list of all handles on which the notified protocol was |
| 388 | * installed |
Heinrich Schuchardt | 6eec42d | 2019-05-04 17:27:54 +0200 | [diff] [blame] | 389 | */ |
| 390 | struct efi_register_notify_event { |
| 391 | struct list_head link; |
| 392 | struct efi_event *event; |
| 393 | efi_guid_t protocol; |
Heinrich Schuchardt | d375e75 | 2019-05-21 18:19:01 +0200 | [diff] [blame] | 394 | struct list_head handles; |
Heinrich Schuchardt | 6eec42d | 2019-05-04 17:27:54 +0200 | [diff] [blame] | 395 | }; |
| 396 | |
| 397 | /* List of all events registered by RegisterProtocolNotify() */ |
| 398 | extern struct list_head efi_register_notify_events; |
| 399 | |
AKASHI Takahiro | 7e0badb | 2018-12-30 15:16:55 +0100 | [diff] [blame] | 400 | /* Initialize efi execution environment */ |
| 401 | efi_status_t efi_init_obj_list(void); |
Heinrich Schuchardt | 6246741 | 2019-12-08 01:07:01 +0100 | [diff] [blame] | 402 | /* Install device tree */ |
| 403 | efi_status_t efi_install_fdt(void *fdt); |
Heinrich Schuchardt | ffb9059 | 2019-12-07 20:51:06 +0100 | [diff] [blame] | 404 | /* Run loaded UEFI image */ |
| 405 | efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size); |
Heinrich Schuchardt | cf3b118 | 2019-06-20 13:52:16 +0200 | [diff] [blame] | 406 | /* Initialize variable services */ |
| 407 | efi_status_t efi_init_variables(void); |
Heinrich Schuchardt | 2ac6258 | 2019-06-20 15:25:48 +0200 | [diff] [blame] | 408 | /* Notify ExitBootServices() is called */ |
| 409 | void efi_variables_boot_exit_notify(void); |
Heinrich Schuchardt | 79d7202 | 2018-09-20 21:58:23 +0200 | [diff] [blame] | 410 | /* Called by bootefi to initialize root node */ |
| 411 | efi_status_t efi_root_node_register(void); |
Heinrich Schuchardt | 15070db | 2018-06-28 12:45:31 +0200 | [diff] [blame] | 412 | /* Called by bootefi to initialize runtime */ |
| 413 | efi_status_t efi_initialize_system_table(void); |
Heinrich Schuchardt | 1943dbb | 2019-07-05 17:42:16 +0200 | [diff] [blame] | 414 | /* efi_runtime_detach() - detach unimplemented runtime functions */ |
| 415 | void efi_runtime_detach(void); |
Heinrich Schuchardt | 699b7c6 | 2020-03-24 18:05:22 +0100 | [diff] [blame] | 416 | /* efi_convert_pointer() - convert pointer to virtual address */ |
| 417 | efi_status_t EFIAPI efi_convert_pointer(efi_uintn_t debug_disposition, |
| 418 | void **address); |
Heinrich Schuchardt | 2c1e224 | 2020-12-13 10:30:24 +0100 | [diff] [blame] | 419 | /* Carve out DT reserved memory ranges */ |
| 420 | void efi_carve_out_dt_rsv(void *fdt); |
xypron.glpk@gmx.de | 54c7a8e | 2017-07-18 20:17:22 +0200 | [diff] [blame] | 421 | /* Called by bootefi to make console interface available */ |
Heinrich Schuchardt | a92e9ab | 2018-10-02 06:08:26 +0200 | [diff] [blame] | 422 | efi_status_t efi_console_register(void); |
Alexander Graf | e83be45 | 2016-03-04 01:10:02 +0100 | [diff] [blame] | 423 | /* Called by bootefi to make all disk storage accessible as EFI objects */ |
Heinrich Schuchardt | cde7a36 | 2018-02-09 20:55:47 +0100 | [diff] [blame] | 424 | efi_status_t efi_disk_register(void); |
Heinrich Schuchardt | c63f68f | 2020-09-25 12:50:19 +0200 | [diff] [blame] | 425 | /* Called by efi_init_obj_list() to install EFI_RNG_PROTOCOL */ |
| 426 | efi_status_t efi_rng_register(void); |
Ilias Apalodimas | 590fef6 | 2020-11-11 11:18:11 +0200 | [diff] [blame] | 427 | /* Called by efi_init_obj_list() to install EFI_TCG2_PROTOCOL */ |
| 428 | efi_status_t efi_tcg2_register(void); |
Heinrich Schuchardt | 6f3de6b | 2018-01-19 20:24:47 +0100 | [diff] [blame] | 429 | /* Create handles and protocols for the partitions of a block device */ |
| 430 | int efi_disk_create_partitions(efi_handle_t parent, struct blk_desc *desc, |
| 431 | const char *if_typename, int diskid, |
| 432 | const char *pdevname); |
AKASHI Takahiro | 911df64 | 2020-04-27 18:48:20 +0900 | [diff] [blame] | 433 | /* Check if it is EFI system partition */ |
| 434 | bool efi_disk_is_system_part(efi_handle_t handle); |
Alexander Graf | d65783d | 2016-03-15 18:38:21 +0100 | [diff] [blame] | 435 | /* Called by bootefi to make GOP (graphical) interface available */ |
Heinrich Schuchardt | b91c084 | 2018-03-03 15:28:55 +0100 | [diff] [blame] | 436 | efi_status_t efi_gop_register(void); |
Alexander Graf | 94c4b99 | 2016-05-06 21:01:01 +0200 | [diff] [blame] | 437 | /* Called by bootefi to make the network interface available */ |
Heinrich Schuchardt | 6f5c73f | 2018-03-03 15:28:56 +0100 | [diff] [blame] | 438 | efi_status_t efi_net_register(void); |
Heinrich Schuchardt | 18081d4 | 2017-10-18 18:13:04 +0200 | [diff] [blame] | 439 | /* Called by bootefi to make the watchdog available */ |
Heinrich Schuchardt | f2704cc | 2018-03-03 15:28:57 +0100 | [diff] [blame] | 440 | efi_status_t efi_watchdog_register(void); |
Ilias Apalodimas | 3510ba7 | 2020-02-21 09:55:45 +0200 | [diff] [blame] | 441 | efi_status_t efi_initrd_register(void); |
Ilias Apalodimas | b307e3d | 2021-03-17 21:55:00 +0200 | [diff] [blame] | 442 | void efi_initrd_deregister(void); |
Alexander Graf | 66f96e1 | 2016-08-19 01:23:29 +0200 | [diff] [blame] | 443 | /* Called by bootefi to make SMBIOS tables available */ |
Simon Glass | 2e2858f | 2018-05-16 09:42:19 -0600 | [diff] [blame] | 444 | /** |
Bin Meng | 2cfbdae | 2018-06-27 20:38:03 -0700 | [diff] [blame] | 445 | * efi_acpi_register() - write out ACPI tables |
| 446 | * |
| 447 | * Called by bootefi to make ACPI tables available |
| 448 | * |
| 449 | * @return 0 if OK, -ENOMEM if no memory is available for the tables |
| 450 | */ |
| 451 | efi_status_t efi_acpi_register(void); |
| 452 | /** |
Simon Glass | 2e2858f | 2018-05-16 09:42:19 -0600 | [diff] [blame] | 453 | * efi_smbios_register() - write out SMBIOS tables |
| 454 | * |
| 455 | * Called by bootefi to make SMBIOS tables available |
| 456 | * |
| 457 | * @return 0 if OK, -ENOMEM if no memory is available for the tables |
| 458 | */ |
Heinrich Schuchardt | 7a369c4 | 2018-03-03 15:28:54 +0100 | [diff] [blame] | 459 | efi_status_t efi_smbios_register(void); |
Alexander Graf | 94c4b99 | 2016-05-06 21:01:01 +0200 | [diff] [blame] | 460 | |
Rob Clark | 5314203 | 2017-09-13 18:05:34 -0400 | [diff] [blame] | 461 | struct efi_simple_file_system_protocol * |
| 462 | efi_fs_from_path(struct efi_device_path *fp); |
| 463 | |
Alexander Graf | 94c4b99 | 2016-05-06 21:01:01 +0200 | [diff] [blame] | 464 | /* Called by networking code to memorize the dhcp ack package */ |
| 465 | void efi_net_set_dhcp_ack(void *pkt, int len); |
Heinrich Schuchardt | 18081d4 | 2017-10-18 18:13:04 +0200 | [diff] [blame] | 466 | /* Called by efi_set_watchdog_timer to reset the timer */ |
| 467 | efi_status_t efi_set_watchdog(unsigned long timeout); |
Alexander Graf | 94c4b99 | 2016-05-06 21:01:01 +0200 | [diff] [blame] | 468 | |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 469 | /* Called from places to check whether a timer expired */ |
| 470 | void efi_timer_check(void); |
Heinrich Schuchardt | ad6e0f7 | 2021-01-12 12:40:32 +0100 | [diff] [blame] | 471 | /* Check if a buffer contains a PE-COFF image */ |
| 472 | efi_status_t efi_check_pe(void *buffer, size_t size, void **nt_header); |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 473 | /* PE loader implementation */ |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 474 | efi_status_t efi_load_pe(struct efi_loaded_image_obj *handle, |
| 475 | void *efi, size_t efi_size, |
Heinrich Schuchardt | 408fbcc | 2018-12-26 12:49:09 +0100 | [diff] [blame] | 476 | struct efi_loaded_image *loaded_image_info); |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 477 | /* Called once to store the pristine gd pointer */ |
| 478 | void efi_save_gd(void); |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 479 | /* Special case handler for error/abort that just tries to dtrt to get |
| 480 | * back to u-boot world */ |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 481 | void efi_restore_gd(void); |
Alexander Graf | 0bd425a | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 482 | /* Call this to relocate the runtime section to an address space */ |
| 483 | void efi_runtime_relocate(ulong offset, struct efi_mem_desc *map); |
Alexander Graf | 8f19f26 | 2016-03-04 01:10:14 +0100 | [diff] [blame] | 484 | /* Call this to set the current device name */ |
Heinrich Schuchardt | 6b82159 | 2021-01-12 12:46:24 +0100 | [diff] [blame] | 485 | void efi_set_bootdev(const char *dev, const char *devnr, const char *path, |
| 486 | void *buffer, size_t buffer_size); |
Heinrich Schuchardt | 967d7de | 2017-11-26 14:05:23 +0100 | [diff] [blame] | 487 | /* Add a new object to the object list. */ |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 488 | void efi_add_handle(efi_handle_t obj); |
Heinrich Schuchardt | eb6106e | 2017-10-26 19:25:49 +0200 | [diff] [blame] | 489 | /* Create handle */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 490 | efi_status_t efi_create_handle(efi_handle_t *handle); |
Heinrich Schuchardt | 7d13546 | 2017-12-04 18:03:02 +0100 | [diff] [blame] | 491 | /* Delete handle */ |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 492 | void efi_delete_handle(efi_handle_t obj); |
Heinrich Schuchardt | 274cc87 | 2017-11-06 21:17:50 +0100 | [diff] [blame] | 493 | /* Call this to validate a handle and find the EFI object for it */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 494 | struct efi_object *efi_search_obj(const efi_handle_t handle); |
AKASHI Takahiro | b0ad905 | 2019-03-05 14:53:31 +0900 | [diff] [blame] | 495 | /* Load image */ |
| 496 | efi_status_t EFIAPI efi_load_image(bool boot_policy, |
| 497 | efi_handle_t parent_image, |
| 498 | struct efi_device_path *file_path, |
| 499 | void *source_buffer, |
| 500 | efi_uintn_t source_size, |
| 501 | efi_handle_t *image_handle); |
Heinrich Schuchardt | 2f8eb08 | 2018-12-26 13:28:09 +0100 | [diff] [blame] | 502 | /* Start image */ |
| 503 | efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle, |
| 504 | efi_uintn_t *exit_data_size, |
| 505 | u16 **exit_data); |
AKASHI Takahiro | b0ad905 | 2019-03-05 14:53:31 +0900 | [diff] [blame] | 506 | /* Unload image */ |
| 507 | efi_status_t EFIAPI efi_unload_image(efi_handle_t image_handle); |
Heinrich Schuchardt | 5aef61d | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 508 | /* Find a protocol on a handle */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 509 | efi_status_t efi_search_protocol(const efi_handle_t handle, |
Heinrich Schuchardt | 5aef61d | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 510 | const efi_guid_t *protocol_guid, |
| 511 | struct efi_handler **handler); |
| 512 | /* Install new protocol on a handle */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 513 | efi_status_t efi_add_protocol(const efi_handle_t handle, |
| 514 | const efi_guid_t *protocol, |
Heinrich Schuchardt | 5aef61d | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 515 | void *protocol_interface); |
Heinrich Schuchardt | 9c89d14 | 2020-01-10 12:33:59 +0100 | [diff] [blame] | 516 | /* Open protocol */ |
| 517 | efi_status_t efi_protocol_open(struct efi_handler *handler, |
| 518 | void **protocol_interface, void *agent_handle, |
| 519 | void *controller_handle, uint32_t attributes); |
| 520 | |
Heinrich Schuchardt | 5aef61d | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 521 | /* Delete protocol from a handle */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 522 | efi_status_t efi_remove_protocol(const efi_handle_t handle, |
| 523 | const efi_guid_t *protocol, |
Heinrich Schuchardt | 5aef61d | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 524 | void *protocol_interface); |
| 525 | /* Delete all protocols from a handle */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 526 | efi_status_t efi_remove_all_protocols(const efi_handle_t handle); |
Heinrich Schuchardt | 744d83e | 2019-04-12 06:59:49 +0200 | [diff] [blame] | 527 | /* Install multiple protocol interfaces */ |
| 528 | efi_status_t EFIAPI efi_install_multiple_protocol_interfaces |
| 529 | (efi_handle_t *handle, ...); |
AKASHI Takahiro | d99b1b3 | 2020-03-17 11:12:36 +0900 | [diff] [blame] | 530 | /* Get handles that support a given protocol */ |
| 531 | efi_status_t EFIAPI efi_locate_handle_buffer( |
| 532 | enum efi_locate_search_type search_type, |
| 533 | const efi_guid_t *protocol, void *search_key, |
| 534 | efi_uintn_t *no_handles, efi_handle_t **buffer); |
| 535 | /* Close an previously opened protocol interface */ |
| 536 | efi_status_t EFIAPI efi_close_protocol(efi_handle_t handle, |
| 537 | const efi_guid_t *protocol, |
| 538 | efi_handle_t agent_handle, |
| 539 | efi_handle_t controller_handle); |
| 540 | /* Open a protocol interface */ |
| 541 | efi_status_t EFIAPI efi_handle_protocol(efi_handle_t handle, |
| 542 | const efi_guid_t *protocol, |
| 543 | void **protocol_interface); |
xypron.glpk@gmx.de | 852a0e177 | 2017-07-18 20:17:20 +0200 | [diff] [blame] | 544 | /* Call this to create an event */ |
Heinrich Schuchardt | f8d4ec3 | 2017-11-06 21:17:47 +0100 | [diff] [blame] | 545 | efi_status_t efi_create_event(uint32_t type, efi_uintn_t notify_tpl, |
xypron.glpk@gmx.de | 852a0e177 | 2017-07-18 20:17:20 +0200 | [diff] [blame] | 546 | void (EFIAPI *notify_function) ( |
| 547 | struct efi_event *event, |
| 548 | void *context), |
Heinrich Schuchardt | bf7f169 | 2018-02-18 15:17:52 +0100 | [diff] [blame] | 549 | void *notify_context, efi_guid_t *group, |
| 550 | struct efi_event **event); |
xypron.glpk@gmx.de | a587fd1 | 2017-07-18 20:17:21 +0200 | [diff] [blame] | 551 | /* Call this to set a timer */ |
xypron.glpk@gmx.de | 3ecc6bd | 2017-07-19 19:22:34 +0200 | [diff] [blame] | 552 | efi_status_t efi_set_timer(struct efi_event *event, enum efi_timer_delay type, |
xypron.glpk@gmx.de | a587fd1 | 2017-07-18 20:17:21 +0200 | [diff] [blame] | 553 | uint64_t trigger_time); |
xypron.glpk@gmx.de | 54c7a8e | 2017-07-18 20:17:22 +0200 | [diff] [blame] | 554 | /* Call this to signal an event */ |
Heinrich Schuchardt | 7b4b8d86 | 2019-06-07 06:47:01 +0200 | [diff] [blame] | 555 | void efi_signal_event(struct efi_event *event); |
Alexander Graf | 0bd425a | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 556 | |
Rob Clark | 5314203 | 2017-09-13 18:05:34 -0400 | [diff] [blame] | 557 | /* open file system: */ |
| 558 | struct efi_simple_file_system_protocol *efi_simple_file_system( |
| 559 | struct blk_desc *desc, int part, struct efi_device_path *dp); |
| 560 | |
| 561 | /* open file from device-path: */ |
| 562 | struct efi_file_handle *efi_file_from_path(struct efi_device_path *fp); |
| 563 | |
Jose Marinho | ebb61ee | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 564 | /* Registers a callback function for a notification event. */ |
| 565 | efi_status_t EFIAPI efi_register_protocol_notify(const efi_guid_t *protocol, |
| 566 | struct efi_event *event, |
| 567 | void **registration); |
Ilias Apalodimas | aa0f755 | 2021-03-17 21:54:59 +0200 | [diff] [blame] | 568 | efi_status_t efi_file_size(struct efi_file_handle *fh, efi_uintn_t *size); |
| 569 | |
| 570 | /* get a device path from a Boot#### option */ |
| 571 | struct efi_device_path *efi_get_dp_from_boot(const efi_guid_t guid); |
| 572 | |
Heinrich Schuchardt | dcdca29 | 2018-11-18 17:58:49 +0100 | [diff] [blame] | 573 | /** |
| 574 | * efi_size_in_pages() - convert size in bytes to size in pages |
| 575 | * |
| 576 | * This macro returns the number of EFI memory pages required to hold 'size' |
| 577 | * bytes. |
| 578 | * |
| 579 | * @size: size in bytes |
| 580 | * Return: size in pages |
| 581 | */ |
Heinrich Schuchardt | aefb0c4 | 2021-01-17 07:52:09 +0100 | [diff] [blame] | 582 | #define efi_size_in_pages(size) (((size) + EFI_PAGE_MASK) >> EFI_PAGE_SHIFT) |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 583 | /* Generic EFI memory allocator, call this to get memory */ |
| 584 | void *efi_alloc(uint64_t len, int memory_type); |
| 585 | /* More specific EFI memory allocator, called by EFI payloads */ |
Heinrich Schuchardt | 798a441 | 2017-11-06 21:17:48 +0100 | [diff] [blame] | 586 | efi_status_t efi_allocate_pages(int type, int memory_type, efi_uintn_t pages, |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 587 | uint64_t *memory); |
Stefan Brüns | a4f4302 | 2016-10-01 23:32:27 +0200 | [diff] [blame] | 588 | /* EFI memory free function. */ |
Heinrich Schuchardt | 798a441 | 2017-11-06 21:17:48 +0100 | [diff] [blame] | 589 | efi_status_t efi_free_pages(uint64_t memory, efi_uintn_t pages); |
Stefan Brüns | 5a09aef | 2016-10-09 22:17:18 +0200 | [diff] [blame] | 590 | /* EFI memory allocator for small allocations */ |
Heinrich Schuchardt | 798a441 | 2017-11-06 21:17:48 +0100 | [diff] [blame] | 591 | efi_status_t efi_allocate_pool(int pool_type, efi_uintn_t size, |
Stefan Brüns | 5a09aef | 2016-10-09 22:17:18 +0200 | [diff] [blame] | 592 | void **buffer); |
Stefan Brüns | 67b67d9 | 2016-10-09 22:17:26 +0200 | [diff] [blame] | 593 | /* EFI pool memory free function. */ |
| 594 | efi_status_t efi_free_pool(void *buffer); |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 595 | /* Returns the EFI memory map */ |
Heinrich Schuchardt | 798a441 | 2017-11-06 21:17:48 +0100 | [diff] [blame] | 596 | efi_status_t efi_get_memory_map(efi_uintn_t *memory_map_size, |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 597 | struct efi_mem_desc *memory_map, |
Heinrich Schuchardt | 798a441 | 2017-11-06 21:17:48 +0100 | [diff] [blame] | 598 | efi_uintn_t *map_key, |
| 599 | efi_uintn_t *descriptor_size, |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 600 | uint32_t *descriptor_version); |
| 601 | /* Adds a range into the EFI memory map */ |
Michael Walle | 282d386 | 2020-05-17 12:29:19 +0200 | [diff] [blame] | 602 | efi_status_t efi_add_memory_map(u64 start, u64 size, int memory_type); |
Park, Aiden | e009e7a | 2019-09-03 17:43:43 +0000 | [diff] [blame] | 603 | /* Adds a conventional range into the EFI memory map */ |
| 604 | efi_status_t efi_add_conventional_memory_map(u64 ram_start, u64 ram_end, |
| 605 | u64 ram_top); |
| 606 | |
Heinrich Schuchardt | 11206f4 | 2018-01-21 19:29:30 +0100 | [diff] [blame] | 607 | /* Called by board init to initialize the EFI drivers */ |
Heinrich Schuchardt | 8f3cc5b | 2018-02-01 12:53:32 +0100 | [diff] [blame] | 608 | efi_status_t efi_driver_init(void); |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 609 | /* Called by board init to initialize the EFI memory map */ |
| 610 | int efi_memory_init(void); |
Alexander Graf | c5c1163 | 2016-08-19 01:23:24 +0200 | [diff] [blame] | 611 | /* Adds new or overrides configuration table entry to the system table */ |
| 612 | efi_status_t efi_install_configuration_table(const efi_guid_t *guid, void *table); |
Heinrich Schuchardt | 7db9f89 | 2017-12-04 18:03:01 +0100 | [diff] [blame] | 613 | /* Sets up a loaded image */ |
Heinrich Schuchardt | 3c3a735 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 614 | efi_status_t efi_setup_loaded_image(struct efi_device_path *device_path, |
| 615 | struct efi_device_path *file_path, |
| 616 | struct efi_loaded_image_obj **handle_ptr, |
| 617 | struct efi_loaded_image **info_ptr); |
Heinrich Schuchardt | 83d96b7 | 2018-04-05 11:56:21 +0200 | [diff] [blame] | 618 | /* Print information about all loaded images */ |
| 619 | void efi_print_image_infos(void *pc); |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 620 | |
Alexander Graf | 7c00a3c | 2016-05-11 18:25:48 +0200 | [diff] [blame] | 621 | #ifdef CONFIG_EFI_LOADER_BOUNCE_BUFFER |
| 622 | extern void *efi_bounce_buffer; |
| 623 | #define EFI_LOADER_BOUNCE_BUFFER_SIZE (64 * 1024 * 1024) |
| 624 | #endif |
| 625 | |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 626 | |
| 627 | struct efi_device_path *efi_dp_next(const struct efi_device_path *dp); |
Heinrich Schuchardt | 753e248 | 2017-10-26 19:25:48 +0200 | [diff] [blame] | 628 | int efi_dp_match(const struct efi_device_path *a, |
| 629 | const struct efi_device_path *b); |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 630 | struct efi_object *efi_dp_find_obj(struct efi_device_path *dp, |
| 631 | struct efi_device_path **rem); |
Heinrich Schuchardt | 51ca4f5 | 2018-04-16 07:59:08 +0200 | [diff] [blame] | 632 | /* get size of the first device path instance excluding end node */ |
| 633 | efi_uintn_t efi_dp_instance_size(const struct efi_device_path *dp); |
| 634 | /* size of multi-instance device path excluding end node */ |
| 635 | efi_uintn_t efi_dp_size(const struct efi_device_path *dp); |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 636 | struct efi_device_path *efi_dp_dup(const struct efi_device_path *dp); |
| 637 | struct efi_device_path *efi_dp_append(const struct efi_device_path *dp1, |
| 638 | const struct efi_device_path *dp2); |
| 639 | struct efi_device_path *efi_dp_append_node(const struct efi_device_path *dp, |
| 640 | const struct efi_device_path *node); |
Heinrich Schuchardt | b41c8e2 | 2018-04-16 07:59:05 +0200 | [diff] [blame] | 641 | /* Create a device path node of given type, sub-type, length */ |
| 642 | struct efi_device_path *efi_dp_create_device_node(const u8 type, |
| 643 | const u8 sub_type, |
| 644 | const u16 length); |
Heinrich Schuchardt | cb0f7ce | 2018-04-16 07:59:09 +0200 | [diff] [blame] | 645 | /* Append device path instance */ |
| 646 | struct efi_device_path *efi_dp_append_instance( |
| 647 | const struct efi_device_path *dp, |
| 648 | const struct efi_device_path *dpi); |
| 649 | /* Get next device path instance */ |
| 650 | struct efi_device_path *efi_dp_get_next_instance(struct efi_device_path **dp, |
| 651 | efi_uintn_t *size); |
| 652 | /* Check if a device path contains muliple instances */ |
| 653 | bool efi_dp_is_multi_instance(const struct efi_device_path *dp); |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 654 | |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 655 | struct efi_device_path *efi_dp_from_part(struct blk_desc *desc, int part); |
Heinrich Schuchardt | 6c6307c | 2018-01-19 20:24:46 +0100 | [diff] [blame] | 656 | /* Create a device node for a block device partition. */ |
| 657 | struct efi_device_path *efi_dp_part_node(struct blk_desc *desc, int part); |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 658 | struct efi_device_path *efi_dp_from_file(struct blk_desc *desc, int part, |
| 659 | const char *path); |
| 660 | struct efi_device_path *efi_dp_from_eth(void); |
Rob Clark | 18ceba7 | 2017-10-10 08:23:06 -0400 | [diff] [blame] | 661 | struct efi_device_path *efi_dp_from_mem(uint32_t mem_type, |
| 662 | uint64_t start_address, |
| 663 | uint64_t end_address); |
Heinrich Schuchardt | 0976f8b | 2018-01-19 20:24:49 +0100 | [diff] [blame] | 664 | /* Determine the last device path node that is not the end node. */ |
| 665 | const struct efi_device_path *efi_dp_last_node( |
| 666 | const struct efi_device_path *dp); |
Heinrich Schuchardt | 468bf97 | 2018-01-19 20:24:37 +0100 | [diff] [blame] | 667 | efi_status_t efi_dp_split_file_path(struct efi_device_path *full_path, |
| 668 | struct efi_device_path **device_path, |
| 669 | struct efi_device_path **file_path); |
AKASHI Takahiro | 035fb01 | 2018-10-17 16:32:03 +0900 | [diff] [blame] | 670 | efi_status_t efi_dp_from_name(const char *dev, const char *devnr, |
| 671 | const char *path, |
| 672 | struct efi_device_path **device, |
| 673 | struct efi_device_path **file); |
Heinrich Schuchardt | 22c8e08 | 2020-08-23 10:49:46 +0200 | [diff] [blame] | 674 | ssize_t efi_dp_check_length(const struct efi_device_path *dp, |
| 675 | const size_t maxlen); |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 676 | |
| 677 | #define EFI_DP_TYPE(_dp, _type, _subtype) \ |
| 678 | (((_dp)->type == DEVICE_PATH_TYPE_##_type) && \ |
| 679 | ((_dp)->sub_type == DEVICE_PATH_SUB_TYPE_##_subtype)) |
| 680 | |
Marek Behún | 4a4169b | 2021-05-20 13:23:57 +0200 | [diff] [blame^] | 681 | /** |
| 682 | * __efi_runtime_data - declares a non-const variable for EFI runtime section |
| 683 | * |
| 684 | * This macro indicates that a variable is non-const and should go into the |
| 685 | * EFI runtime section, and thus still be available when the OS is running. |
| 686 | * |
| 687 | * Only use on variables not declared const. |
| 688 | * |
| 689 | * Example: |
| 690 | * |
| 691 | * :: |
| 692 | * |
| 693 | * static __efi_runtime_data my_computed_table[256]; |
Alexander Graf | 0bd425a | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 694 | */ |
Marek Behún | 4bebdd3 | 2021-05-20 13:23:52 +0200 | [diff] [blame] | 695 | #define __efi_runtime_data __section(".data.efi_runtime") |
Marek Behún | 4a4169b | 2021-05-20 13:23:57 +0200 | [diff] [blame^] | 696 | |
| 697 | /** |
| 698 | * __efi_runtime - declares a function for EFI runtime section |
| 699 | * |
| 700 | * This macro indicates that a function should go into the EFI runtime section, |
| 701 | * and thus still be available when the OS is running. |
| 702 | * |
| 703 | * Example: |
| 704 | * |
| 705 | * :: |
| 706 | * |
| 707 | * static __efi_runtime compute_my_table(void); |
| 708 | */ |
Marek Behún | 4bebdd3 | 2021-05-20 13:23:52 +0200 | [diff] [blame] | 709 | #define __efi_runtime __section(".text.efi_runtime") |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 710 | |
AKASHI Takahiro | 3240184 | 2019-06-05 13:21:38 +0900 | [diff] [blame] | 711 | /* Indicate supported runtime services */ |
| 712 | efi_status_t efi_init_runtime_supported(void); |
| 713 | |
Heinrich Schuchardt | 69c1576 | 2018-07-29 09:49:04 +0200 | [diff] [blame] | 714 | /* Update CRC32 in table header */ |
| 715 | void __efi_runtime efi_update_table_header_crc32(struct efi_table_hdr *table); |
| 716 | |
Alexander Graf | 7725609 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 717 | /* Call this with mmio_ptr as the _pointer_ to a pointer to an MMIO region |
| 718 | * to make it available at runtime */ |
Heinrich Schuchardt | 099b3b7 | 2018-03-03 15:28:59 +0100 | [diff] [blame] | 719 | efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len); |
Alexander Graf | 7725609 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 720 | |
| 721 | /* Boards may provide the functions below to implement RTS functionality */ |
| 722 | |
Alexander Graf | 393dd91 | 2016-10-14 13:45:30 +0200 | [diff] [blame] | 723 | void __efi_runtime EFIAPI efi_reset_system( |
Alexander Graf | 7725609 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 724 | enum efi_reset_type reset_type, |
| 725 | efi_status_t reset_status, |
| 726 | unsigned long data_size, void *reset_data); |
Heinrich Schuchardt | 099b3b7 | 2018-03-03 15:28:59 +0100 | [diff] [blame] | 727 | |
| 728 | /* Architecture specific initialization of the EFI subsystem */ |
| 729 | efi_status_t efi_reset_system_init(void); |
Alexander Graf | 7725609 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 730 | |
Alexander Graf | 393dd91 | 2016-10-14 13:45:30 +0200 | [diff] [blame] | 731 | efi_status_t __efi_runtime EFIAPI efi_get_time( |
Alexander Graf | 7725609 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 732 | struct efi_time *time, |
| 733 | struct efi_time_cap *capabilities); |
Alexander Graf | 7725609 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 734 | |
Heinrich Schuchardt | 289121e | 2019-05-31 07:38:29 +0200 | [diff] [blame] | 735 | efi_status_t __efi_runtime EFIAPI efi_set_time(struct efi_time *time); |
| 736 | |
Heinrich Schuchardt | d33ae3e | 2017-09-15 10:06:11 +0200 | [diff] [blame] | 737 | #ifdef CONFIG_CMD_BOOTEFI_SELFTEST |
| 738 | /* |
| 739 | * Entry point for the tests of the EFI API. |
| 740 | * It is called by 'bootefi selftest' |
| 741 | */ |
| 742 | efi_status_t EFIAPI efi_selftest(efi_handle_t image_handle, |
| 743 | struct efi_system_table *systab); |
| 744 | #endif |
| 745 | |
Heinrich Schuchardt | e06ae19 | 2018-12-30 20:53:51 +0100 | [diff] [blame] | 746 | efi_status_t EFIAPI efi_get_variable(u16 *variable_name, |
| 747 | const efi_guid_t *vendor, u32 *attributes, |
| 748 | efi_uintn_t *data_size, void *data); |
Heinrich Schuchardt | d6a6baa | 2018-05-17 07:57:05 +0200 | [diff] [blame] | 749 | efi_status_t EFIAPI efi_get_next_variable_name(efi_uintn_t *variable_name_size, |
| 750 | u16 *variable_name, |
Heinrich Schuchardt | 82cd6c4 | 2020-03-22 18:28:20 +0100 | [diff] [blame] | 751 | efi_guid_t *vendor); |
Heinrich Schuchardt | e06ae19 | 2018-12-30 20:53:51 +0100 | [diff] [blame] | 752 | efi_status_t EFIAPI efi_set_variable(u16 *variable_name, |
| 753 | const efi_guid_t *vendor, u32 attributes, |
Heinrich Schuchardt | 73e2ab0 | 2018-12-30 21:03:15 +0100 | [diff] [blame] | 754 | efi_uintn_t data_size, const void *data); |
Rob Clark | 15f3d74 | 2017-09-13 18:05:37 -0400 | [diff] [blame] | 755 | |
Heinrich Schuchardt | 9b19dae | 2019-06-20 12:13:05 +0200 | [diff] [blame] | 756 | efi_status_t EFIAPI efi_query_variable_info( |
| 757 | u32 attributes, u64 *maximum_variable_storage_size, |
| 758 | u64 *remaining_variable_storage_size, |
| 759 | u64 *maximum_variable_size); |
| 760 | |
Ilias Apalodimas | aa0f755 | 2021-03-17 21:54:59 +0200 | [diff] [blame] | 761 | void *efi_get_var(u16 *name, const efi_guid_t *vendor, efi_uintn_t *size); |
| 762 | |
AKASHI Takahiro | bd23774 | 2018-11-05 18:06:41 +0900 | [diff] [blame] | 763 | /* |
| 764 | * See section 3.1.3 in the v2.7 UEFI spec for more details on |
| 765 | * the layout of EFI_LOAD_OPTION. In short it is: |
| 766 | * |
| 767 | * typedef struct _EFI_LOAD_OPTION { |
| 768 | * UINT32 Attributes; |
| 769 | * UINT16 FilePathListLength; |
| 770 | * // CHAR16 Description[]; <-- variable length, NULL terminated |
| 771 | * // EFI_DEVICE_PATH_PROTOCOL FilePathList[]; |
| 772 | * <-- FilePathListLength bytes |
| 773 | * // UINT8 OptionalData[]; |
| 774 | * } EFI_LOAD_OPTION; |
| 775 | */ |
| 776 | struct efi_load_option { |
| 777 | u32 attributes; |
| 778 | u16 file_path_length; |
| 779 | u16 *label; |
| 780 | struct efi_device_path *file_path; |
Heinrich Schuchardt | 9df002e | 2019-04-29 13:51:45 +0200 | [diff] [blame] | 781 | const u8 *optional_data; |
AKASHI Takahiro | bd23774 | 2018-11-05 18:06:41 +0900 | [diff] [blame] | 782 | }; |
| 783 | |
Ilias Apalodimas | 483d28e | 2021-03-17 21:54:58 +0200 | [diff] [blame] | 784 | struct efi_device_path *efi_dp_from_lo(struct efi_load_option *lo, |
| 785 | efi_uintn_t *size, efi_guid_t guid); |
| 786 | struct efi_device_path *efi_dp_concat(const struct efi_device_path *dp1, |
| 787 | const struct efi_device_path *dp2); |
Heinrich Schuchardt | 7ca84f8 | 2020-05-31 22:46:09 +0200 | [diff] [blame] | 788 | efi_status_t efi_deserialize_load_option(struct efi_load_option *lo, u8 *data, |
| 789 | efi_uintn_t *size); |
AKASHI Takahiro | bd23774 | 2018-11-05 18:06:41 +0900 | [diff] [blame] | 790 | unsigned long efi_serialize_load_option(struct efi_load_option *lo, u8 **data); |
Heinrich Schuchardt | 25c6be5 | 2020-08-07 17:47:13 +0200 | [diff] [blame] | 791 | efi_status_t efi_set_load_options(efi_handle_t handle, |
| 792 | efi_uintn_t load_options_size, |
| 793 | void *load_options); |
Heinrich Schuchardt | a7647a7 | 2020-08-07 17:49:39 +0200 | [diff] [blame] | 794 | efi_status_t efi_bootmgr_load(efi_handle_t *handle, void **load_options); |
Rob Clark | c84c110 | 2017-09-13 18:05:38 -0400 | [diff] [blame] | 795 | |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 796 | /** |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 797 | * struct efi_image_regions - A list of memory regions |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 798 | * |
| 799 | * @max: Maximum number of regions |
| 800 | * @num: Number of regions |
| 801 | * @reg: array of regions |
| 802 | */ |
| 803 | struct efi_image_regions { |
| 804 | int max; |
| 805 | int num; |
| 806 | struct image_region reg[]; |
| 807 | }; |
| 808 | |
| 809 | /** |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 810 | * struct efi_sig_data - A decoded data of struct efi_signature_data |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 811 | * |
| 812 | * This structure represents an internal form of signature in |
| 813 | * signature database. A listed list may represent a signature list. |
| 814 | * |
| 815 | * @next: Pointer to next entry |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 816 | * @owner: Signature owner |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 817 | * @data: Pointer to signature data |
| 818 | * @size: Size of signature data |
| 819 | */ |
| 820 | struct efi_sig_data { |
| 821 | struct efi_sig_data *next; |
| 822 | efi_guid_t owner; |
| 823 | void *data; |
| 824 | size_t size; |
| 825 | }; |
| 826 | |
| 827 | /** |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 828 | * struct efi_signature_store - A decoded data of signature database |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 829 | * |
| 830 | * This structure represents an internal form of signature database. |
| 831 | * |
| 832 | * @next: Pointer to next entry |
| 833 | * @sig_type: Signature type |
| 834 | * @sig_data_list: Pointer to signature list |
| 835 | */ |
| 836 | struct efi_signature_store { |
| 837 | struct efi_signature_store *next; |
| 838 | efi_guid_t sig_type; |
| 839 | struct efi_sig_data *sig_data_list; |
| 840 | }; |
| 841 | |
| 842 | struct x509_certificate; |
| 843 | struct pkcs7_message; |
| 844 | |
AKASHI Takahiro | de92407 | 2020-07-08 14:01:57 +0900 | [diff] [blame] | 845 | bool efi_signature_lookup_digest(struct efi_image_regions *regs, |
| 846 | struct efi_signature_store *db); |
AKASHI Takahiro | 14afd06 | 2020-07-21 19:35:22 +0900 | [diff] [blame] | 847 | bool efi_signature_verify(struct efi_image_regions *regs, |
| 848 | struct pkcs7_message *msg, |
| 849 | struct efi_signature_store *db, |
| 850 | struct efi_signature_store *dbx); |
AKASHI Takahiro | 1641180 | 2020-08-14 14:39:23 +0900 | [diff] [blame] | 851 | static inline bool efi_signature_verify_one(struct efi_image_regions *regs, |
| 852 | struct pkcs7_message *msg, |
| 853 | struct efi_signature_store *db) |
| 854 | { |
| 855 | return efi_signature_verify(regs, msg, db, NULL); |
| 856 | } |
AKASHI Takahiro | 4154b64 | 2020-07-08 14:01:56 +0900 | [diff] [blame] | 857 | bool efi_signature_check_signers(struct pkcs7_message *msg, |
| 858 | struct efi_signature_store *dbx); |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 859 | |
| 860 | efi_status_t efi_image_region_add(struct efi_image_regions *regs, |
| 861 | const void *start, const void *end, |
| 862 | int nocheck); |
AKASHI Takahiro | d2cefc8 | 2020-04-14 11:51:40 +0900 | [diff] [blame] | 863 | |
| 864 | void efi_sigstore_free(struct efi_signature_store *sigstore); |
Sughosh Ganu | fa0faa6 | 2020-12-30 19:27:08 +0530 | [diff] [blame] | 865 | struct efi_signature_store *efi_build_signature_store(void *sig_list, |
| 866 | efi_uintn_t size); |
AKASHI Takahiro | d2cefc8 | 2020-04-14 11:51:40 +0900 | [diff] [blame] | 867 | struct efi_signature_store *efi_sigstore_parse_sigdb(u16 *name); |
AKASHI Takahiro | b0f49ee | 2020-04-14 11:51:41 +0900 | [diff] [blame] | 868 | |
| 869 | bool efi_secure_boot_enabled(void); |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 870 | |
Sughosh Ganu | 586bb98 | 2020-12-30 19:27:09 +0530 | [diff] [blame] | 871 | bool efi_capsule_auth_enabled(void); |
| 872 | |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 873 | bool efi_image_parse(void *efi, size_t len, struct efi_image_regions **regp, |
| 874 | WIN_CERTIFICATE **auth, size_t *auth_len); |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 875 | |
Sughosh Ganu | ea35008 | 2020-12-30 19:27:07 +0530 | [diff] [blame] | 876 | struct pkcs7_message *efi_parse_pkcs7_header(const void *buf, |
| 877 | size_t buflen, |
| 878 | u8 **tmpbuf); |
| 879 | |
Heinrich Schuchardt | 8cd9975 | 2020-06-28 16:30:29 +0200 | [diff] [blame] | 880 | /* runtime implementation of memcpy() */ |
| 881 | void efi_memcpy_runtime(void *dest, const void *src, size_t n); |
| 882 | |
AKASHI Takahiro | 9407468 | 2020-10-29 13:47:46 +0900 | [diff] [blame] | 883 | /* commonly used helper function */ |
Ilias Apalodimas | 2157529 | 2020-12-31 12:26:46 +0200 | [diff] [blame] | 884 | u16 *efi_create_indexed_name(u16 *buffer, size_t buffer_size, const char *name, |
| 885 | unsigned int index); |
AKASHI Takahiro | 9407468 | 2020-10-29 13:47:46 +0900 | [diff] [blame] | 886 | |
AKASHI Takahiro | f4818e6 | 2020-11-30 18:12:12 +0900 | [diff] [blame] | 887 | extern const struct efi_firmware_management_protocol efi_fmp_fit; |
AKASHI Takahiro | 7ff3f3c | 2020-11-17 09:28:00 +0900 | [diff] [blame] | 888 | extern const struct efi_firmware_management_protocol efi_fmp_raw; |
AKASHI Takahiro | f4818e6 | 2020-11-30 18:12:12 +0900 | [diff] [blame] | 889 | |
AKASHI Takahiro | 473d9b3 | 2020-11-17 09:27:55 +0900 | [diff] [blame] | 890 | /* Capsule update */ |
| 891 | efi_status_t EFIAPI efi_update_capsule( |
| 892 | struct efi_capsule_header **capsule_header_array, |
| 893 | efi_uintn_t capsule_count, |
| 894 | u64 scatter_gather_list); |
| 895 | efi_status_t EFIAPI efi_query_capsule_caps( |
| 896 | struct efi_capsule_header **capsule_header_array, |
| 897 | efi_uintn_t capsule_count, |
| 898 | u64 *maximum_capsule_size, |
| 899 | u32 *reset_type); |
| 900 | |
Sughosh Ganu | 586bb98 | 2020-12-30 19:27:09 +0530 | [diff] [blame] | 901 | efi_status_t efi_capsule_authenticate(const void *capsule, |
| 902 | efi_uintn_t capsule_size, |
| 903 | void **image, efi_uintn_t *image_size); |
| 904 | |
AKASHI Takahiro | 45b81954 | 2020-11-17 09:27:56 +0900 | [diff] [blame] | 905 | #define EFI_CAPSULE_DIR L"\\EFI\\UpdateCapsule\\" |
| 906 | |
| 907 | /* Hook at initialization */ |
| 908 | efi_status_t efi_launch_capsules(void); |
| 909 | |
Stephen Warren | d0de806 | 2018-08-30 15:43:43 -0600 | [diff] [blame] | 910 | #else /* CONFIG_IS_ENABLED(EFI_LOADER) */ |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 911 | |
Alexander Graf | 0bd425a | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 912 | /* Without CONFIG_EFI_LOADER we don't have a runtime section, stub it out */ |
Alexander Graf | 393dd91 | 2016-10-14 13:45:30 +0200 | [diff] [blame] | 913 | #define __efi_runtime_data |
| 914 | #define __efi_runtime |
Heinrich Schuchardt | 099b3b7 | 2018-03-03 15:28:59 +0100 | [diff] [blame] | 915 | static inline efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len) |
| 916 | { |
| 917 | return EFI_SUCCESS; |
| 918 | } |
Alexander Graf | 0bd425a | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 919 | |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 920 | /* No loader configured, stub out EFI_ENTRY */ |
| 921 | static inline void efi_restore_gd(void) { } |
Alexander Graf | c49a1b8 | 2016-04-11 16:16:19 +0200 | [diff] [blame] | 922 | static inline void efi_set_bootdev(const char *dev, const char *devnr, |
Heinrich Schuchardt | 6b82159 | 2021-01-12 12:46:24 +0100 | [diff] [blame] | 923 | const char *path, void *buffer, |
| 924 | size_t buffer_size) { } |
Alexander Graf | 94c4b99 | 2016-05-06 21:01:01 +0200 | [diff] [blame] | 925 | static inline void efi_net_set_dhcp_ack(void *pkt, int len) { } |
Heinrich Schuchardt | 83d96b7 | 2018-04-05 11:56:21 +0200 | [diff] [blame] | 926 | static inline void efi_print_image_infos(void *pc) { } |
AKASHI Takahiro | 45b81954 | 2020-11-17 09:27:56 +0900 | [diff] [blame] | 927 | static inline efi_status_t efi_launch_capsules(void) |
| 928 | { |
| 929 | return EFI_SUCCESS; |
| 930 | } |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 931 | |
Stephen Warren | d0de806 | 2018-08-30 15:43:43 -0600 | [diff] [blame] | 932 | #endif /* CONFIG_IS_ENABLED(EFI_LOADER) */ |
Heinrich Schuchardt | c2fd477 | 2017-10-18 18:13:07 +0200 | [diff] [blame] | 933 | |
Jose Marinho | ebb61ee | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 934 | /** |
| 935 | * Install the ESRT system table. |
| 936 | * |
| 937 | * @return status code |
| 938 | */ |
| 939 | efi_status_t efi_esrt_register(void); |
| 940 | |
| 941 | /** |
| 942 | * efi_esrt_populate() - Populates the ESRT entries from the FMP instances |
| 943 | * present in the system. |
| 944 | * If an ESRT already exists, the old ESRT is replaced in the system table. |
| 945 | * The memory of the old ESRT is deallocated. |
| 946 | * |
| 947 | * Return: |
| 948 | * - EFI_SUCCESS if the ESRT is correctly created |
| 949 | * - error code otherwise. |
| 950 | */ |
| 951 | efi_status_t efi_esrt_populate(void); |
Heinrich Schuchardt | c2fd477 | 2017-10-18 18:13:07 +0200 | [diff] [blame] | 952 | #endif /* _EFI_LOADER_H */ |