Tom Rini | 70df9d6 | 2018-05-07 17:02:21 -0400 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0+ */ |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 2 | /* |
| 3 | * EFI application loader |
| 4 | * |
| 5 | * Copyright (c) 2016 Alexander Graf |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 6 | */ |
| 7 | |
Heinrich Schuchardt | c2fd477 | 2017-10-18 18:13:07 +0200 | [diff] [blame] | 8 | #ifndef _EFI_LOADER_H |
| 9 | #define _EFI_LOADER_H 1 |
| 10 | |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 11 | #include <common.h> |
Simon Glass | 655306c | 2020-05-10 11:39:58 -0600 | [diff] [blame] | 12 | #include <blk.h> |
Simon Glass | 0f2af88 | 2020-05-10 11:40:05 -0600 | [diff] [blame] | 13 | #include <log.h> |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 14 | #include <part_efi.h> |
| 15 | #include <efi_api.h> |
AKASHI Takahiro | 2c0f9f7 | 2020-04-21 09:38:38 +0900 | [diff] [blame] | 16 | #include <image.h> |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 17 | #include <pe.h> |
Simon Glass | 97f9bd4 | 2021-07-02 12:36:16 -0600 | [diff] [blame] | 18 | #include <linux/list.h> |
| 19 | #include <linux/oid_registry.h> |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 20 | |
Simon Glass | 655306c | 2020-05-10 11:39:58 -0600 | [diff] [blame] | 21 | struct blk_desc; |
AKASHI Takahiro | 4cbba2b | 2021-07-20 14:57:02 +0900 | [diff] [blame] | 22 | struct jmp_buf_data; |
Simon Glass | 655306c | 2020-05-10 11:39:58 -0600 | [diff] [blame] | 23 | |
Simon Glass | 16fc74a | 2019-09-25 08:11:32 -0600 | [diff] [blame] | 24 | static inline int guidcmp(const void *g1, const void *g2) |
| 25 | { |
| 26 | return memcmp(g1, g2, sizeof(efi_guid_t)); |
| 27 | } |
| 28 | |
Sughosh Ganu | 196f66d | 2019-12-29 00:01:04 +0530 | [diff] [blame] | 29 | static inline void *guidcpy(void *dst, const void *src) |
| 30 | { |
| 31 | return memcpy(dst, src, sizeof(efi_guid_t)); |
| 32 | } |
| 33 | |
Stephen Warren | d0de806 | 2018-08-30 15:43:43 -0600 | [diff] [blame] | 34 | #if CONFIG_IS_ENABLED(EFI_LOADER) |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 35 | |
Simon Glass | 97f9bd4 | 2021-07-02 12:36:16 -0600 | [diff] [blame] | 36 | /** |
| 37 | * __efi_runtime_data - declares a non-const variable for EFI runtime section |
| 38 | * |
| 39 | * This macro indicates that a variable is non-const and should go into the |
| 40 | * EFI runtime section, and thus still be available when the OS is running. |
| 41 | * |
| 42 | * Only use on variables not declared const. |
| 43 | * |
| 44 | * Example: |
| 45 | * |
| 46 | * :: |
| 47 | * |
| 48 | * static __efi_runtime_data my_computed_table[256]; |
| 49 | */ |
| 50 | #define __efi_runtime_data __section(".data.efi_runtime") |
| 51 | |
| 52 | /** |
| 53 | * __efi_runtime_rodata - declares a read-only variable for EFI runtime section |
| 54 | * |
| 55 | * This macro indicates that a variable is read-only (const) and should go into |
| 56 | * the EFI runtime section, and thus still be available when the OS is running. |
| 57 | * |
| 58 | * Only use on variables also declared const. |
| 59 | * |
| 60 | * Example: |
| 61 | * |
| 62 | * :: |
| 63 | * |
| 64 | * static const __efi_runtime_rodata my_const_table[] = { 1, 2, 3 }; |
| 65 | */ |
| 66 | #define __efi_runtime_rodata __section(".rodata.efi_runtime") |
| 67 | |
| 68 | /** |
| 69 | * __efi_runtime - declares a function for EFI runtime section |
| 70 | * |
| 71 | * This macro indicates that a function should go into the EFI runtime section, |
| 72 | * and thus still be available when the OS is running. |
| 73 | * |
| 74 | * Example: |
| 75 | * |
| 76 | * :: |
| 77 | * |
| 78 | * static __efi_runtime compute_my_table(void); |
| 79 | */ |
| 80 | #define __efi_runtime __section(".text.efi_runtime") |
| 81 | |
| 82 | /* |
| 83 | * Call this with mmio_ptr as the _pointer_ to a pointer to an MMIO region |
| 84 | * to make it available at runtime |
| 85 | */ |
| 86 | efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len); |
| 87 | |
| 88 | /* |
| 89 | * Special case handler for error/abort that just tries to dtrt to get |
| 90 | * back to u-boot world |
| 91 | */ |
| 92 | void efi_restore_gd(void); |
| 93 | /* Call this to set the current device name */ |
| 94 | void efi_set_bootdev(const char *dev, const char *devnr, const char *path, |
| 95 | void *buffer, size_t buffer_size); |
| 96 | /* Called by networking code to memorize the dhcp ack package */ |
| 97 | void efi_net_set_dhcp_ack(void *pkt, int len); |
| 98 | /* Print information about all loaded images */ |
| 99 | void efi_print_image_infos(void *pc); |
| 100 | |
| 101 | /* Hook at initialization */ |
| 102 | efi_status_t efi_launch_capsules(void); |
| 103 | |
| 104 | #else /* CONFIG_IS_ENABLED(EFI_LOADER) */ |
| 105 | |
| 106 | /* Without CONFIG_EFI_LOADER we don't have a runtime section, stub it out */ |
| 107 | #define __efi_runtime_data |
| 108 | #define __efi_runtime_rodata |
| 109 | #define __efi_runtime |
| 110 | static inline efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len) |
| 111 | { |
| 112 | return EFI_SUCCESS; |
| 113 | } |
| 114 | |
| 115 | /* No loader configured, stub out EFI_ENTRY */ |
| 116 | static inline void efi_restore_gd(void) { } |
| 117 | static inline void efi_set_bootdev(const char *dev, const char *devnr, |
| 118 | const char *path, void *buffer, |
| 119 | size_t buffer_size) { } |
| 120 | static inline void efi_net_set_dhcp_ack(void *pkt, int len) { } |
| 121 | static inline void efi_print_image_infos(void *pc) { } |
| 122 | static inline efi_status_t efi_launch_capsules(void) |
| 123 | { |
| 124 | return EFI_SUCCESS; |
| 125 | } |
| 126 | |
| 127 | #endif /* CONFIG_IS_ENABLED(EFI_LOADER) */ |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 128 | |
Heinrich Schuchardt | 2f528c2 | 2018-06-28 12:45:32 +0200 | [diff] [blame] | 129 | /* Maximum number of configuration tables */ |
| 130 | #define EFI_MAX_CONFIGURATION_TABLES 16 |
| 131 | |
Heinrich Schuchardt | 79d7202 | 2018-09-20 21:58:23 +0200 | [diff] [blame] | 132 | /* GUID used by the root node */ |
| 133 | #define U_BOOT_GUID \ |
| 134 | EFI_GUID(0xe61d73b9, 0xa384, 0x4acc, \ |
| 135 | 0xae, 0xab, 0x82, 0xe8, 0x28, 0xf3, 0x62, 0x8b) |
AKASHI Takahiro | 659a626 | 2019-09-12 13:52:35 +0900 | [diff] [blame] | 136 | /* GUID used as host device on sandbox */ |
| 137 | #define U_BOOT_HOST_DEV_GUID \ |
| 138 | EFI_GUID(0xbbe4e671, 0x5773, 0x4ea1, \ |
| 139 | 0x9a, 0xab, 0x3a, 0x7d, 0xbf, 0x40, 0xc4, 0x82) |
Heinrich Schuchardt | c770aaa | 2020-05-20 22:39:35 +0200 | [diff] [blame] | 140 | /* GUID used as root for virtio devices */ |
| 141 | #define U_BOOT_VIRTIO_DEV_GUID \ |
| 142 | EFI_GUID(0x63293792, 0xadf5, 0x9325, \ |
| 143 | 0xb9, 0x9f, 0x4e, 0x0e, 0x45, 0x5c, 0x1b, 0x1e) |
Heinrich Schuchardt | 79d7202 | 2018-09-20 21:58:23 +0200 | [diff] [blame] | 144 | |
Heinrich Schuchardt | 6fbb8ac | 2019-11-28 06:46:09 +0100 | [diff] [blame] | 145 | /* Use internal device tree when starting UEFI application */ |
Heinrich Schuchardt | 6246741 | 2019-12-08 01:07:01 +0100 | [diff] [blame] | 146 | #define EFI_FDT_USE_INTERNAL NULL |
Heinrich Schuchardt | 6fbb8ac | 2019-11-28 06:46:09 +0100 | [diff] [blame] | 147 | |
AKASHI Takahiro | 0b27575 | 2019-04-16 13:24:20 +0900 | [diff] [blame] | 148 | /* Root node */ |
| 149 | extern efi_handle_t efi_root; |
| 150 | |
Heinrich Schuchardt | de9bdc6 | 2020-03-19 18:21:58 +0000 | [diff] [blame] | 151 | /* Set to EFI_SUCCESS when initialized */ |
| 152 | extern efi_status_t efi_obj_list_initialized; |
| 153 | |
Heinrich Schuchardt | 628dbd7 | 2020-11-12 21:26:28 +0100 | [diff] [blame] | 154 | /* Flag used by the selftest to avoid detaching devices in ExitBootServices() */ |
| 155 | extern bool efi_st_keep_devices; |
| 156 | |
Heinrich Schuchardt | a993173 | 2020-03-19 15:16:31 +0100 | [diff] [blame] | 157 | /* EFI system partition */ |
| 158 | extern struct efi_system_partition { |
| 159 | enum if_type if_type; |
| 160 | int devnum; |
| 161 | u8 part; |
| 162 | } efi_system_partition; |
| 163 | |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 164 | int __efi_entry_check(void); |
| 165 | int __efi_exit_check(void); |
Heinrich Schuchardt | 4d66489 | 2017-08-18 17:45:16 +0200 | [diff] [blame] | 166 | const char *__efi_nesting(void); |
Rob Clark | e7896c3 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 167 | const char *__efi_nesting_inc(void); |
| 168 | const char *__efi_nesting_dec(void); |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 169 | |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 170 | /* |
| 171 | * Enter the u-boot world from UEFI: |
| 172 | */ |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 173 | #define EFI_ENTRY(format, ...) do { \ |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 174 | assert(__efi_entry_check()); \ |
Rob Clark | e7896c3 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 175 | debug("%sEFI: Entry %s(" format ")\n", __efi_nesting_inc(), \ |
| 176 | __func__, ##__VA_ARGS__); \ |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 177 | } while(0) |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 178 | |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 179 | /* |
| 180 | * Exit the u-boot world back to UEFI: |
| 181 | */ |
Rob Clark | 84a19a0 | 2017-07-24 10:31:52 -0400 | [diff] [blame] | 182 | #define EFI_EXIT(ret) ({ \ |
xypron.glpk@gmx.de | 8f9dd92 | 2017-08-17 18:57:36 +0200 | [diff] [blame] | 183 | typeof(ret) _r = ret; \ |
Rob Clark | e7896c3 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 184 | debug("%sEFI: Exit: %s: %u\n", __efi_nesting_dec(), \ |
xypron.glpk@gmx.de | 8f9dd92 | 2017-08-17 18:57:36 +0200 | [diff] [blame] | 185 | __func__, (u32)((uintptr_t) _r & ~EFI_ERROR_MASK)); \ |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 186 | assert(__efi_exit_check()); \ |
| 187 | _r; \ |
Rob Clark | 84a19a0 | 2017-07-24 10:31:52 -0400 | [diff] [blame] | 188 | }) |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 189 | |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 190 | /* |
Heinrich Schuchardt | 91e5b8a | 2017-09-15 10:06:10 +0200 | [diff] [blame] | 191 | * Call non-void UEFI function from u-boot and retrieve return value: |
| 192 | */ |
| 193 | #define EFI_CALL(exp) ({ \ |
| 194 | debug("%sEFI: Call: %s\n", __efi_nesting_inc(), #exp); \ |
| 195 | assert(__efi_exit_check()); \ |
| 196 | typeof(exp) _r = exp; \ |
| 197 | assert(__efi_entry_check()); \ |
| 198 | debug("%sEFI: %lu returned by %s\n", __efi_nesting_dec(), \ |
| 199 | (unsigned long)((uintptr_t)_r & ~EFI_ERROR_MASK), #exp); \ |
| 200 | _r; \ |
| 201 | }) |
| 202 | |
| 203 | /* |
| 204 | * Call void UEFI function from u-boot: |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 205 | */ |
Heinrich Schuchardt | 91e5b8a | 2017-09-15 10:06:10 +0200 | [diff] [blame] | 206 | #define EFI_CALL_VOID(exp) do { \ |
Rob Clark | e7896c3 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 207 | debug("%sEFI: Call: %s\n", __efi_nesting_inc(), #exp); \ |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 208 | assert(__efi_exit_check()); \ |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 209 | exp; \ |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 210 | assert(__efi_entry_check()); \ |
Rob Clark | e7896c3 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 211 | debug("%sEFI: Return From: %s\n", __efi_nesting_dec(), #exp); \ |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 212 | } while(0) |
| 213 | |
Heinrich Schuchardt | 4d66489 | 2017-08-18 17:45:16 +0200 | [diff] [blame] | 214 | /* |
Heinrich Schuchardt | 3d2abc3 | 2018-01-11 08:16:01 +0100 | [diff] [blame] | 215 | * Write an indented message with EFI prefix |
Heinrich Schuchardt | 4d66489 | 2017-08-18 17:45:16 +0200 | [diff] [blame] | 216 | */ |
Heinrich Schuchardt | 3d2abc3 | 2018-01-11 08:16:01 +0100 | [diff] [blame] | 217 | #define EFI_PRINT(format, ...) ({ \ |
| 218 | debug("%sEFI: " format, __efi_nesting(), \ |
| 219 | ##__VA_ARGS__); \ |
Heinrich Schuchardt | 4d66489 | 2017-08-18 17:45:16 +0200 | [diff] [blame] | 220 | }) |
| 221 | |
Alexander Graf | 59254d6 | 2018-04-23 07:59:47 +0200 | [diff] [blame] | 222 | #ifdef CONFIG_SYS_CACHELINE_SIZE |
| 223 | #define EFI_CACHELINE_SIZE CONFIG_SYS_CACHELINE_SIZE |
| 224 | #else |
| 225 | /* Just use the greatest cache flush alignment requirement I'm aware of */ |
| 226 | #define EFI_CACHELINE_SIZE 128 |
| 227 | #endif |
| 228 | |
Heinrich Schuchardt | 0f233c4 | 2018-07-02 12:53:55 +0200 | [diff] [blame] | 229 | /* Key identifying current memory map */ |
| 230 | extern efi_uintn_t efi_memory_map_key; |
| 231 | |
Alexander Graf | 0bd425a | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 232 | extern struct efi_runtime_services efi_runtime_services; |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 233 | extern struct efi_system_table systab; |
| 234 | |
Heinrich Schuchardt | 580c13b | 2017-10-26 19:25:59 +0200 | [diff] [blame] | 235 | extern struct efi_simple_text_output_protocol efi_con_out; |
Heinrich Schuchardt | 3dabffd | 2018-09-08 10:20:10 +0200 | [diff] [blame] | 236 | extern struct efi_simple_text_input_protocol efi_con_in; |
Heinrich Schuchardt | 580c13b | 2017-10-26 19:25:59 +0200 | [diff] [blame] | 237 | extern struct efi_console_control_protocol efi_console_control; |
xypron.glpk@gmx.de | 3c042b2 | 2017-07-11 22:06:25 +0200 | [diff] [blame] | 238 | extern const struct efi_device_path_to_text_protocol efi_device_path_to_text; |
Leif Lindholm | b6e6fdc | 2018-03-09 17:43:21 +0100 | [diff] [blame] | 239 | /* implementation of the EFI_DEVICE_PATH_UTILITIES_PROTOCOL */ |
| 240 | extern const struct efi_device_path_utilities_protocol |
| 241 | efi_device_path_utilities; |
Heinrich Schuchardt | 18ed8cf | 2019-05-16 18:19:00 +0200 | [diff] [blame] | 242 | /* current version of the EFI_UNICODE_COLLATION_PROTOCOL */ |
Heinrich Schuchardt | e59072a | 2018-09-04 19:34:58 +0200 | [diff] [blame] | 243 | extern const struct efi_unicode_collation_protocol |
Heinrich Schuchardt | b325884 | 2019-05-16 07:52:58 +0200 | [diff] [blame] | 244 | efi_unicode_collation_protocol2; |
AKASHI Takahiro | ca8aa71 | 2019-01-21 12:13:00 +0900 | [diff] [blame] | 245 | extern const struct efi_hii_config_routing_protocol efi_hii_config_routing; |
| 246 | extern const struct efi_hii_config_access_protocol efi_hii_config_access; |
Leif Lindholm | 5aab1b8 | 2019-01-21 12:12:57 +0900 | [diff] [blame] | 247 | extern const struct efi_hii_database_protocol efi_hii_database; |
| 248 | extern const struct efi_hii_string_protocol efi_hii_string; |
Alexander Graf | 4aacacc | 2016-03-04 01:10:00 +0100 | [diff] [blame] | 249 | |
Rob Clark | 85dd721 | 2017-09-13 18:05:30 -0400 | [diff] [blame] | 250 | uint16_t *efi_dp_str(struct efi_device_path *dp); |
| 251 | |
Heinrich Schuchardt | 79d7202 | 2018-09-20 21:58:23 +0200 | [diff] [blame] | 252 | /* GUID of the U-Boot root node */ |
| 253 | extern const efi_guid_t efi_u_boot_guid; |
AKASHI Takahiro | 659a626 | 2019-09-12 13:52:35 +0900 | [diff] [blame] | 254 | #ifdef CONFIG_SANDBOX |
| 255 | /* GUID of U-Boot host device on sandbox */ |
| 256 | extern const efi_guid_t efi_guid_host_dev; |
| 257 | #endif |
Heinrich Schuchardt | 405afb5 | 2018-01-19 20:24:45 +0100 | [diff] [blame] | 258 | /* GUID of the EFI_BLOCK_IO_PROTOCOL */ |
| 259 | extern const efi_guid_t efi_block_io_guid; |
Rob Clark | c84c110 | 2017-09-13 18:05:38 -0400 | [diff] [blame] | 260 | extern const efi_guid_t efi_global_variable_guid; |
Alexander Graf | 4aacacc | 2016-03-04 01:10:00 +0100 | [diff] [blame] | 261 | extern const efi_guid_t efi_guid_console_control; |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 262 | extern const efi_guid_t efi_guid_device_path; |
Heinrich Schuchardt | e840b9c | 2022-03-19 07:04:03 +0100 | [diff] [blame] | 263 | /* GUID of the EFI system partition */ |
| 264 | extern const efi_guid_t efi_system_partition_guid; |
Heinrich Schuchardt | 760255f | 2018-01-11 08:16:02 +0100 | [diff] [blame] | 265 | /* GUID of the EFI_DRIVER_BINDING_PROTOCOL */ |
| 266 | extern const efi_guid_t efi_guid_driver_binding_protocol; |
Heinrich Schuchardt | 672d99e | 2018-02-18 15:17:51 +0100 | [diff] [blame] | 267 | /* event group ExitBootServices() invoked */ |
| 268 | extern const efi_guid_t efi_guid_event_group_exit_boot_services; |
| 269 | /* event group SetVirtualAddressMap() invoked */ |
| 270 | extern const efi_guid_t efi_guid_event_group_virtual_address_change; |
| 271 | /* event group memory map changed */ |
| 272 | extern const efi_guid_t efi_guid_event_group_memory_map_change; |
| 273 | /* event group boot manager about to boot */ |
| 274 | extern const efi_guid_t efi_guid_event_group_ready_to_boot; |
| 275 | /* event group ResetSystem() invoked (before ExitBootServices) */ |
| 276 | extern const efi_guid_t efi_guid_event_group_reset_system; |
Heinrich Schuchardt | 44ab21b | 2018-03-03 15:29:03 +0100 | [diff] [blame] | 277 | /* GUID of the device tree table */ |
| 278 | extern const efi_guid_t efi_guid_fdt; |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 279 | extern const efi_guid_t efi_guid_loaded_image; |
AKASHI Takahiro | bbe13da | 2019-03-27 13:40:32 +0900 | [diff] [blame] | 280 | extern const efi_guid_t efi_guid_loaded_image_device_path; |
xypron.glpk@gmx.de | 3c042b2 | 2017-07-11 22:06:25 +0200 | [diff] [blame] | 281 | extern const efi_guid_t efi_guid_device_path_to_text_protocol; |
Rob Clark | 5314203 | 2017-09-13 18:05:34 -0400 | [diff] [blame] | 282 | extern const efi_guid_t efi_simple_file_system_protocol_guid; |
| 283 | extern const efi_guid_t efi_file_info_guid; |
Heinrich Schuchardt | 37fb4b9 | 2018-04-04 15:42:11 +0200 | [diff] [blame] | 284 | /* GUID for file system information */ |
| 285 | extern const efi_guid_t efi_file_system_info_guid; |
Leif Lindholm | b6e6fdc | 2018-03-09 17:43:21 +0100 | [diff] [blame] | 286 | extern const efi_guid_t efi_guid_device_path_utilities_protocol; |
Heinrich Schuchardt | 18ed8cf | 2019-05-16 18:19:00 +0200 | [diff] [blame] | 287 | /* GUID of the deprecated Unicode collation protocol */ |
| 288 | extern const efi_guid_t efi_guid_unicode_collation_protocol; |
Heinrich Schuchardt | 485956d | 2020-12-04 03:33:41 +0100 | [diff] [blame] | 289 | /* GUIDs of the Load File and Load File2 protocol */ |
| 290 | extern const efi_guid_t efi_guid_load_file_protocol; |
| 291 | extern const efi_guid_t efi_guid_load_file2_protocol; |
Heinrich Schuchardt | e59072a | 2018-09-04 19:34:58 +0200 | [diff] [blame] | 292 | /* GUID of the Unicode collation protocol */ |
Heinrich Schuchardt | b325884 | 2019-05-16 07:52:58 +0200 | [diff] [blame] | 293 | extern const efi_guid_t efi_guid_unicode_collation_protocol2; |
AKASHI Takahiro | ca8aa71 | 2019-01-21 12:13:00 +0900 | [diff] [blame] | 294 | extern const efi_guid_t efi_guid_hii_config_routing_protocol; |
| 295 | extern const efi_guid_t efi_guid_hii_config_access_protocol; |
Leif Lindholm | 5aab1b8 | 2019-01-21 12:12:57 +0900 | [diff] [blame] | 296 | extern const efi_guid_t efi_guid_hii_database_protocol; |
| 297 | extern const efi_guid_t efi_guid_hii_string_protocol; |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 298 | /* GUIDs for authentication */ |
| 299 | extern const efi_guid_t efi_guid_image_security_database; |
| 300 | extern const efi_guid_t efi_guid_sha256; |
| 301 | extern const efi_guid_t efi_guid_cert_x509; |
| 302 | extern const efi_guid_t efi_guid_cert_x509_sha256; |
Ilias Apalodimas | 34db9b1 | 2022-05-06 15:36:00 +0300 | [diff] [blame] | 303 | extern const efi_guid_t efi_guid_cert_x509_sha384; |
| 304 | extern const efi_guid_t efi_guid_cert_x509_sha512; |
AKASHI Takahiro | b0f49ee | 2020-04-14 11:51:41 +0900 | [diff] [blame] | 305 | extern const efi_guid_t efi_guid_cert_type_pkcs7; |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 306 | |
Sughosh Ganu | 693a4f4 | 2019-12-29 00:01:06 +0530 | [diff] [blame] | 307 | /* GUID of RNG protocol */ |
| 308 | extern const efi_guid_t efi_guid_rng_protocol; |
AKASHI Takahiro | 473d9b3 | 2020-11-17 09:27:55 +0900 | [diff] [blame] | 309 | /* GUID of capsule update result */ |
| 310 | extern const efi_guid_t efi_guid_capsule_report; |
AKASHI Takahiro | 0d96378 | 2020-11-30 18:12:11 +0900 | [diff] [blame] | 311 | /* GUID of firmware management protocol */ |
| 312 | extern const efi_guid_t efi_guid_firmware_management_protocol; |
Jose Marinho | ebb61ee | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 313 | /* GUID for the ESRT */ |
| 314 | extern const efi_guid_t efi_esrt_guid; |
Masahisa Kojima | cd1fe7d | 2021-10-26 17:27:24 +0900 | [diff] [blame] | 315 | /* GUID of the SMBIOS table */ |
| 316 | extern const efi_guid_t smbios_guid; |
Sughosh Ganu | 693a4f4 | 2019-12-29 00:01:06 +0530 | [diff] [blame] | 317 | |
Marek Behún | 6950450 | 2021-05-20 13:23:56 +0200 | [diff] [blame] | 318 | extern char __efi_runtime_start[], __efi_runtime_stop[]; |
| 319 | extern char __efi_runtime_rel_start[], __efi_runtime_rel_stop[]; |
Alexander Graf | 0bd425a | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 320 | |
Heinrich Schuchardt | 2e4b41f | 2019-05-21 17:51:35 +0200 | [diff] [blame] | 321 | /** |
| 322 | * struct efi_open_protocol_info_item - open protocol info item |
| 323 | * |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 324 | * When a protocol is opened a open protocol info entry is created. |
| 325 | * These are maintained in a list. |
Heinrich Schuchardt | 2e4b41f | 2019-05-21 17:51:35 +0200 | [diff] [blame] | 326 | * |
| 327 | * @link: link to the list of open protocol info entries of a protocol |
| 328 | * @info: information about the opening of a protocol |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 329 | */ |
| 330 | struct efi_open_protocol_info_item { |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 331 | struct list_head link; |
| 332 | struct efi_open_protocol_info_entry info; |
| 333 | }; |
| 334 | |
Heinrich Schuchardt | 2e4b41f | 2019-05-21 17:51:35 +0200 | [diff] [blame] | 335 | /** |
| 336 | * struct efi_handler - single protocol interface of a handle |
| 337 | * |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 338 | * When the UEFI payload wants to open a protocol on an object to get its |
| 339 | * interface (usually a struct with callback functions), this struct maps the |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 340 | * protocol GUID to the respective protocol interface |
Heinrich Schuchardt | 2e4b41f | 2019-05-21 17:51:35 +0200 | [diff] [blame] | 341 | * |
| 342 | * @link: link to the list of protocols of a handle |
| 343 | * @guid: GUID of the protocol |
| 344 | * @protocol_interface: protocol interface |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 345 | * @open_infos: link to the list of open protocol info items |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 346 | */ |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 347 | struct efi_handler { |
Heinrich Schuchardt | 99ce206 | 2017-11-26 14:05:17 +0100 | [diff] [blame] | 348 | struct list_head link; |
Heinrich Schuchardt | 2a22db9 | 2022-03-09 19:56:23 +0100 | [diff] [blame] | 349 | const efi_guid_t guid; |
xypron.glpk@gmx.de | c35c924 | 2017-07-11 22:06:14 +0200 | [diff] [blame] | 350 | void *protocol_interface; |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 351 | struct list_head open_infos; |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 352 | }; |
| 353 | |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 354 | /** |
Heinrich Schuchardt | b27ced4 | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 355 | * enum efi_object_type - type of EFI object |
| 356 | * |
| 357 | * In UnloadImage we must be able to identify if the handle relates to a |
| 358 | * started image. |
| 359 | */ |
| 360 | enum efi_object_type { |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 361 | /** @EFI_OBJECT_TYPE_UNDEFINED: undefined image type */ |
Heinrich Schuchardt | b27ced4 | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 362 | EFI_OBJECT_TYPE_UNDEFINED = 0, |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 363 | /** @EFI_OBJECT_TYPE_U_BOOT_FIRMWARE: U-Boot firmware */ |
Heinrich Schuchardt | 2e0a790 | 2019-05-05 16:55:06 +0200 | [diff] [blame] | 364 | EFI_OBJECT_TYPE_U_BOOT_FIRMWARE, |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 365 | /** @EFI_OBJECT_TYPE_LOADED_IMAGE: loaded image (not started) */ |
Heinrich Schuchardt | b27ced4 | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 366 | EFI_OBJECT_TYPE_LOADED_IMAGE, |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 367 | /** @EFI_OBJECT_TYPE_STARTED_IMAGE: started image */ |
Heinrich Schuchardt | b27ced4 | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 368 | EFI_OBJECT_TYPE_STARTED_IMAGE, |
| 369 | }; |
| 370 | |
| 371 | /** |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 372 | * struct efi_object - dereferenced EFI handle |
| 373 | * |
| 374 | * @link: pointers to put the handle into a linked list |
| 375 | * @protocols: linked list with the protocol interfaces installed on this |
| 376 | * handle |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 377 | * @type: image type if the handle relates to an image |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 378 | * |
| 379 | * UEFI offers a flexible and expandable object model. The objects in the UEFI |
| 380 | * API are devices, drivers, and loaded images. struct efi_object is our storage |
| 381 | * structure for these objects. |
| 382 | * |
| 383 | * When including this structure into a larger structure always put it first so |
| 384 | * that when deleting a handle the whole encompassing structure can be freed. |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 385 | * |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 386 | * A pointer to this structure is referred to as a handle. Typedef efi_handle_t |
| 387 | * has been created for such pointers. |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 388 | */ |
| 389 | struct efi_object { |
| 390 | /* Every UEFI object is part of a global object list */ |
| 391 | struct list_head link; |
Heinrich Schuchardt | 99ce206 | 2017-11-26 14:05:17 +0100 | [diff] [blame] | 392 | /* The list of protocols */ |
| 393 | struct list_head protocols; |
Heinrich Schuchardt | b27ced4 | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 394 | enum efi_object_type type; |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 395 | }; |
| 396 | |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 397 | enum efi_image_auth_status { |
| 398 | EFI_IMAGE_AUTH_FAILED = 0, |
| 399 | EFI_IMAGE_AUTH_PASSED, |
| 400 | }; |
| 401 | |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 402 | /** |
Heinrich Schuchardt | 3c3a735 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 403 | * struct efi_loaded_image_obj - handle of a loaded image |
Heinrich Schuchardt | 7292872 | 2018-09-26 05:27:56 +0200 | [diff] [blame] | 404 | * |
| 405 | * @header: EFI object header |
Heinrich Schuchardt | 3d44512 | 2019-04-30 17:57:30 +0200 | [diff] [blame] | 406 | * @exit_status: exit status passed to Exit() |
| 407 | * @exit_data_size: exit data size passed to Exit() |
| 408 | * @exit_data: exit data passed to Exit() |
Heinrich Schuchardt | 93b40d6 | 2020-12-28 22:42:51 +0100 | [diff] [blame] | 409 | * @exit_jmp: long jump buffer for returning from started image |
Heinrich Schuchardt | 7292872 | 2018-09-26 05:27:56 +0200 | [diff] [blame] | 410 | * @entry: entry address of the relocated image |
Heinrich Schuchardt | 93b40d6 | 2020-12-28 22:42:51 +0100 | [diff] [blame] | 411 | * @image_type: indicates if the image is an applicition or a driver |
| 412 | * @auth_status: indicates if the image is authenticated |
Heinrich Schuchardt | 3c3a735 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 413 | */ |
| 414 | struct efi_loaded_image_obj { |
Heinrich Schuchardt | 7292872 | 2018-09-26 05:27:56 +0200 | [diff] [blame] | 415 | struct efi_object header; |
Heinrich Schuchardt | 026c7ec | 2020-12-28 23:24:40 +0100 | [diff] [blame] | 416 | efi_status_t *exit_status; |
Heinrich Schuchardt | 3d44512 | 2019-04-30 17:57:30 +0200 | [diff] [blame] | 417 | efi_uintn_t *exit_data_size; |
| 418 | u16 **exit_data; |
Heinrich Schuchardt | 026c7ec | 2020-12-28 23:24:40 +0100 | [diff] [blame] | 419 | struct jmp_buf_data *exit_jmp; |
Heinrich Schuchardt | 3c3a735 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 420 | EFIAPI efi_status_t (*entry)(efi_handle_t image_handle, |
| 421 | struct efi_system_table *st); |
Heinrich Schuchardt | 3758752 | 2019-05-01 20:07:04 +0200 | [diff] [blame] | 422 | u16 image_type; |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 423 | enum efi_image_auth_status auth_status; |
Heinrich Schuchardt | 3c3a735 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 424 | }; |
| 425 | |
| 426 | /** |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 427 | * struct efi_event |
| 428 | * |
Heinrich Schuchardt | 370c7a8 | 2018-02-18 15:17:50 +0100 | [diff] [blame] | 429 | * @link: Link to list of all events |
Heinrich Schuchardt | 35c0cf6 | 2019-06-05 21:00:39 +0200 | [diff] [blame] | 430 | * @queue_link: Link to the list of queued events |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 431 | * @type: Type of event, see efi_create_event |
| 432 | * @notify_tpl: Task priority level of notifications |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 433 | * @notify_function: Function to call when the event is triggered |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 434 | * @notify_context: Data to be passed to the notify function |
Heinrich Schuchardt | bf7f169 | 2018-02-18 15:17:52 +0100 | [diff] [blame] | 435 | * @group: Event group |
Heinrich Schuchardt | 370c7a8 | 2018-02-18 15:17:50 +0100 | [diff] [blame] | 436 | * @trigger_time: Period of the timer |
| 437 | * @trigger_next: Next time to trigger the timer |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 438 | * @trigger_type: Type of timer, see efi_set_timer |
Heinrich Schuchardt | 370c7a8 | 2018-02-18 15:17:50 +0100 | [diff] [blame] | 439 | * @is_signaled: The event occurred. The event is in the signaled state. |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 440 | */ |
| 441 | struct efi_event { |
Heinrich Schuchardt | 370c7a8 | 2018-02-18 15:17:50 +0100 | [diff] [blame] | 442 | struct list_head link; |
Heinrich Schuchardt | 35c0cf6 | 2019-06-05 21:00:39 +0200 | [diff] [blame] | 443 | struct list_head queue_link; |
xypron.glpk@gmx.de | 3ecc6bd | 2017-07-19 19:22:34 +0200 | [diff] [blame] | 444 | uint32_t type; |
Heinrich Schuchardt | f8d4ec3 | 2017-11-06 21:17:47 +0100 | [diff] [blame] | 445 | efi_uintn_t notify_tpl; |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 446 | void (EFIAPI *notify_function)(struct efi_event *event, void *context); |
| 447 | void *notify_context; |
Heinrich Schuchardt | bf7f169 | 2018-02-18 15:17:52 +0100 | [diff] [blame] | 448 | const efi_guid_t *group; |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 449 | u64 trigger_next; |
| 450 | u64 trigger_time; |
xypron.glpk@gmx.de | 3ecc6bd | 2017-07-19 19:22:34 +0200 | [diff] [blame] | 451 | enum efi_timer_delay trigger_type; |
Heinrich Schuchardt | 1bbee39 | 2017-10-04 15:03:24 +0200 | [diff] [blame] | 452 | bool is_signaled; |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 453 | }; |
| 454 | |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 455 | /* This list contains all UEFI objects we know of */ |
| 456 | extern struct list_head efi_obj_list; |
Heinrich Schuchardt | bf7f169 | 2018-02-18 15:17:52 +0100 | [diff] [blame] | 457 | /* List of all events */ |
| 458 | extern struct list_head efi_events; |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 459 | |
Heinrich Schuchardt | 6eec42d | 2019-05-04 17:27:54 +0200 | [diff] [blame] | 460 | /** |
Heinrich Schuchardt | d375e75 | 2019-05-21 18:19:01 +0200 | [diff] [blame] | 461 | * struct efi_protocol_notification - handle for notified protocol |
| 462 | * |
| 463 | * When a protocol interface is installed for which an event was registered with |
| 464 | * the RegisterProtocolNotify() service this structure is used to hold the |
| 465 | * handle on which the protocol interface was installed. |
| 466 | * |
| 467 | * @link: link to list of all handles notified for this event |
| 468 | * @handle: handle on which the notified protocol interface was installed |
| 469 | */ |
| 470 | struct efi_protocol_notification { |
| 471 | struct list_head link; |
| 472 | efi_handle_t handle; |
| 473 | }; |
| 474 | |
| 475 | /** |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 476 | * struct efi_register_notify_event - event registered by |
| 477 | * RegisterProtocolNotify() |
Heinrich Schuchardt | 6eec42d | 2019-05-04 17:27:54 +0200 | [diff] [blame] | 478 | * |
| 479 | * The address of this structure serves as registration value. |
| 480 | * |
Heinrich Schuchardt | d375e75 | 2019-05-21 18:19:01 +0200 | [diff] [blame] | 481 | * @link: link to list of all registered events |
| 482 | * @event: registered event. The same event may registered for multiple |
| 483 | * GUIDs. |
| 484 | * @protocol: protocol for which the event is registered |
| 485 | * @handles: linked list of all handles on which the notified protocol was |
| 486 | * installed |
Heinrich Schuchardt | 6eec42d | 2019-05-04 17:27:54 +0200 | [diff] [blame] | 487 | */ |
| 488 | struct efi_register_notify_event { |
| 489 | struct list_head link; |
| 490 | struct efi_event *event; |
| 491 | efi_guid_t protocol; |
Heinrich Schuchardt | d375e75 | 2019-05-21 18:19:01 +0200 | [diff] [blame] | 492 | struct list_head handles; |
Heinrich Schuchardt | 6eec42d | 2019-05-04 17:27:54 +0200 | [diff] [blame] | 493 | }; |
| 494 | |
| 495 | /* List of all events registered by RegisterProtocolNotify() */ |
| 496 | extern struct list_head efi_register_notify_events; |
| 497 | |
AKASHI Takahiro | a36dc25 | 2022-04-19 10:05:11 +0900 | [diff] [blame] | 498 | /* called at pre-initialization */ |
| 499 | int efi_init_early(void); |
AKASHI Takahiro | 7e0badb | 2018-12-30 15:16:55 +0100 | [diff] [blame] | 500 | /* Initialize efi execution environment */ |
| 501 | efi_status_t efi_init_obj_list(void); |
Heinrich Schuchardt | 761908e | 2022-06-14 08:02:03 +0200 | [diff] [blame] | 502 | /* Set up console modes */ |
| 503 | void efi_setup_console_size(void); |
Heinrich Schuchardt | 6246741 | 2019-12-08 01:07:01 +0100 | [diff] [blame] | 504 | /* Install device tree */ |
| 505 | efi_status_t efi_install_fdt(void *fdt); |
Heinrich Schuchardt | ffb9059 | 2019-12-07 20:51:06 +0100 | [diff] [blame] | 506 | /* Run loaded UEFI image */ |
| 507 | efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size); |
Heinrich Schuchardt | cf3b118 | 2019-06-20 13:52:16 +0200 | [diff] [blame] | 508 | /* Initialize variable services */ |
| 509 | efi_status_t efi_init_variables(void); |
Heinrich Schuchardt | 2ac6258 | 2019-06-20 15:25:48 +0200 | [diff] [blame] | 510 | /* Notify ExitBootServices() is called */ |
| 511 | void efi_variables_boot_exit_notify(void); |
Masahisa Kojima | 1ac19bb | 2021-08-13 16:12:41 +0900 | [diff] [blame] | 512 | efi_status_t efi_tcg2_notify_exit_boot_services_failed(void); |
Masahisa Kojima | 8173cd4 | 2021-08-13 16:12:40 +0900 | [diff] [blame] | 513 | /* Measure efi application invocation */ |
Masahisa Kojima | 6460c3e | 2021-10-26 17:27:25 +0900 | [diff] [blame] | 514 | efi_status_t efi_tcg2_measure_efi_app_invocation(struct efi_loaded_image_obj *handle); |
Masahisa Kojima | 8173cd4 | 2021-08-13 16:12:40 +0900 | [diff] [blame] | 515 | /* Measure efi application exit */ |
| 516 | efi_status_t efi_tcg2_measure_efi_app_exit(void); |
Heinrich Schuchardt | 79d7202 | 2018-09-20 21:58:23 +0200 | [diff] [blame] | 517 | /* Called by bootefi to initialize root node */ |
| 518 | efi_status_t efi_root_node_register(void); |
Heinrich Schuchardt | 15070db | 2018-06-28 12:45:31 +0200 | [diff] [blame] | 519 | /* Called by bootefi to initialize runtime */ |
| 520 | efi_status_t efi_initialize_system_table(void); |
Heinrich Schuchardt | 1943dbb | 2019-07-05 17:42:16 +0200 | [diff] [blame] | 521 | /* efi_runtime_detach() - detach unimplemented runtime functions */ |
| 522 | void efi_runtime_detach(void); |
Heinrich Schuchardt | 699b7c6 | 2020-03-24 18:05:22 +0100 | [diff] [blame] | 523 | /* efi_convert_pointer() - convert pointer to virtual address */ |
| 524 | efi_status_t EFIAPI efi_convert_pointer(efi_uintn_t debug_disposition, |
| 525 | void **address); |
Heinrich Schuchardt | 2c1e224 | 2020-12-13 10:30:24 +0100 | [diff] [blame] | 526 | /* Carve out DT reserved memory ranges */ |
| 527 | void efi_carve_out_dt_rsv(void *fdt); |
Ilias Apalodimas | e4e5660 | 2022-01-03 14:07:37 +0200 | [diff] [blame] | 528 | /* Purge unused kaslr-seed */ |
| 529 | void efi_try_purge_kaslr_seed(void *fdt); |
xypron.glpk@gmx.de | 54c7a8e | 2017-07-18 20:17:22 +0200 | [diff] [blame] | 530 | /* Called by bootefi to make console interface available */ |
Heinrich Schuchardt | a92e9ab | 2018-10-02 06:08:26 +0200 | [diff] [blame] | 531 | efi_status_t efi_console_register(void); |
AKASHI Takahiro | 2381f2e | 2022-04-19 10:05:12 +0900 | [diff] [blame] | 532 | /* Called by efi_init_obj_list() to initialize efi_disks */ |
| 533 | efi_status_t efi_disk_init(void); |
Heinrich Schuchardt | c63f68f | 2020-09-25 12:50:19 +0200 | [diff] [blame] | 534 | /* Called by efi_init_obj_list() to install EFI_RNG_PROTOCOL */ |
| 535 | efi_status_t efi_rng_register(void); |
Ilias Apalodimas | 590fef6 | 2020-11-11 11:18:11 +0200 | [diff] [blame] | 536 | /* Called by efi_init_obj_list() to install EFI_TCG2_PROTOCOL */ |
| 537 | efi_status_t efi_tcg2_register(void); |
Sunil V L | 279d1c8 | 2022-01-28 20:48:44 +0530 | [diff] [blame] | 538 | /* Called by efi_init_obj_list() to install RISCV_EFI_BOOT_PROTOCOL */ |
| 539 | efi_status_t efi_riscv_register(void); |
Masahisa Kojima | 0fd4379 | 2021-12-07 14:15:31 +0900 | [diff] [blame] | 540 | /* Called by efi_init_obj_list() to do initial measurement */ |
| 541 | efi_status_t efi_tcg2_do_initial_measurement(void); |
Masahisa Kojima | 70be5a6 | 2021-05-26 12:09:58 +0900 | [diff] [blame] | 542 | /* measure the pe-coff image, extend PCR and add Event Log */ |
| 543 | efi_status_t tcg2_measure_pe_image(void *efi, u64 efi_size, |
| 544 | struct efi_loaded_image_obj *handle, |
| 545 | struct efi_loaded_image *loaded_image_info); |
Heinrich Schuchardt | 6f3de6b | 2018-01-19 20:24:47 +0100 | [diff] [blame] | 546 | /* Create handles and protocols for the partitions of a block device */ |
| 547 | int efi_disk_create_partitions(efi_handle_t parent, struct blk_desc *desc, |
| 548 | const char *if_typename, int diskid, |
| 549 | const char *pdevname); |
Alexander Graf | d65783d | 2016-03-15 18:38:21 +0100 | [diff] [blame] | 550 | /* Called by bootefi to make GOP (graphical) interface available */ |
Heinrich Schuchardt | b91c084 | 2018-03-03 15:28:55 +0100 | [diff] [blame] | 551 | efi_status_t efi_gop_register(void); |
Alexander Graf | 94c4b99 | 2016-05-06 21:01:01 +0200 | [diff] [blame] | 552 | /* Called by bootefi to make the network interface available */ |
Heinrich Schuchardt | 6f5c73f | 2018-03-03 15:28:56 +0100 | [diff] [blame] | 553 | efi_status_t efi_net_register(void); |
Heinrich Schuchardt | 18081d4 | 2017-10-18 18:13:04 +0200 | [diff] [blame] | 554 | /* Called by bootefi to make the watchdog available */ |
Heinrich Schuchardt | f2704cc | 2018-03-03 15:28:57 +0100 | [diff] [blame] | 555 | efi_status_t efi_watchdog_register(void); |
Ilias Apalodimas | 3510ba7 | 2020-02-21 09:55:45 +0200 | [diff] [blame] | 556 | efi_status_t efi_initrd_register(void); |
Ilias Apalodimas | b307e3d | 2021-03-17 21:55:00 +0200 | [diff] [blame] | 557 | void efi_initrd_deregister(void); |
Alexander Graf | 66f96e1 | 2016-08-19 01:23:29 +0200 | [diff] [blame] | 558 | /* Called by bootefi to make SMBIOS tables available */ |
Simon Glass | 2e2858f | 2018-05-16 09:42:19 -0600 | [diff] [blame] | 559 | /** |
Bin Meng | 2cfbdae | 2018-06-27 20:38:03 -0700 | [diff] [blame] | 560 | * efi_acpi_register() - write out ACPI tables |
| 561 | * |
| 562 | * Called by bootefi to make ACPI tables available |
| 563 | * |
Heinrich Schuchardt | 47b4c02 | 2022-01-19 18:05:50 +0100 | [diff] [blame] | 564 | * Return: 0 if OK, -ENOMEM if no memory is available for the tables |
Bin Meng | 2cfbdae | 2018-06-27 20:38:03 -0700 | [diff] [blame] | 565 | */ |
| 566 | efi_status_t efi_acpi_register(void); |
| 567 | /** |
Simon Glass | 2e2858f | 2018-05-16 09:42:19 -0600 | [diff] [blame] | 568 | * efi_smbios_register() - write out SMBIOS tables |
| 569 | * |
| 570 | * Called by bootefi to make SMBIOS tables available |
| 571 | * |
Heinrich Schuchardt | 47b4c02 | 2022-01-19 18:05:50 +0100 | [diff] [blame] | 572 | * Return: 0 if OK, -ENOMEM if no memory is available for the tables |
Simon Glass | 2e2858f | 2018-05-16 09:42:19 -0600 | [diff] [blame] | 573 | */ |
Heinrich Schuchardt | 7a369c4 | 2018-03-03 15:28:54 +0100 | [diff] [blame] | 574 | efi_status_t efi_smbios_register(void); |
Alexander Graf | 94c4b99 | 2016-05-06 21:01:01 +0200 | [diff] [blame] | 575 | |
Rob Clark | 5314203 | 2017-09-13 18:05:34 -0400 | [diff] [blame] | 576 | struct efi_simple_file_system_protocol * |
| 577 | efi_fs_from_path(struct efi_device_path *fp); |
| 578 | |
Heinrich Schuchardt | 18081d4 | 2017-10-18 18:13:04 +0200 | [diff] [blame] | 579 | /* Called by efi_set_watchdog_timer to reset the timer */ |
| 580 | efi_status_t efi_set_watchdog(unsigned long timeout); |
Alexander Graf | 94c4b99 | 2016-05-06 21:01:01 +0200 | [diff] [blame] | 581 | |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 582 | /* Called from places to check whether a timer expired */ |
| 583 | void efi_timer_check(void); |
Heinrich Schuchardt | ad6e0f7 | 2021-01-12 12:40:32 +0100 | [diff] [blame] | 584 | /* Check if a buffer contains a PE-COFF image */ |
| 585 | efi_status_t efi_check_pe(void *buffer, size_t size, void **nt_header); |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 586 | /* PE loader implementation */ |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 587 | efi_status_t efi_load_pe(struct efi_loaded_image_obj *handle, |
| 588 | void *efi, size_t efi_size, |
Heinrich Schuchardt | 408fbcc | 2018-12-26 12:49:09 +0100 | [diff] [blame] | 589 | struct efi_loaded_image *loaded_image_info); |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 590 | /* Called once to store the pristine gd pointer */ |
| 591 | void efi_save_gd(void); |
Alexander Graf | 0bd425a | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 592 | /* Call this to relocate the runtime section to an address space */ |
| 593 | void efi_runtime_relocate(ulong offset, struct efi_mem_desc *map); |
Heinrich Schuchardt | 967d7de | 2017-11-26 14:05:23 +0100 | [diff] [blame] | 594 | /* Add a new object to the object list. */ |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 595 | void efi_add_handle(efi_handle_t obj); |
Heinrich Schuchardt | eb6106e | 2017-10-26 19:25:49 +0200 | [diff] [blame] | 596 | /* Create handle */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 597 | efi_status_t efi_create_handle(efi_handle_t *handle); |
Heinrich Schuchardt | 7d13546 | 2017-12-04 18:03:02 +0100 | [diff] [blame] | 598 | /* Delete handle */ |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 599 | void efi_delete_handle(efi_handle_t obj); |
Heinrich Schuchardt | 274cc87 | 2017-11-06 21:17:50 +0100 | [diff] [blame] | 600 | /* Call this to validate a handle and find the EFI object for it */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 601 | struct efi_object *efi_search_obj(const efi_handle_t handle); |
AKASHI Takahiro | 537a693 | 2022-04-28 17:09:38 +0900 | [diff] [blame] | 602 | /* Locate device_path handle */ |
| 603 | efi_status_t EFIAPI efi_locate_device_path(const efi_guid_t *protocol, |
| 604 | struct efi_device_path **device_path, |
| 605 | efi_handle_t *device); |
AKASHI Takahiro | b0ad905 | 2019-03-05 14:53:31 +0900 | [diff] [blame] | 606 | /* Load image */ |
| 607 | efi_status_t EFIAPI efi_load_image(bool boot_policy, |
| 608 | efi_handle_t parent_image, |
| 609 | struct efi_device_path *file_path, |
| 610 | void *source_buffer, |
| 611 | efi_uintn_t source_size, |
| 612 | efi_handle_t *image_handle); |
Heinrich Schuchardt | 2f8eb08 | 2018-12-26 13:28:09 +0100 | [diff] [blame] | 613 | /* Start image */ |
| 614 | efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle, |
| 615 | efi_uintn_t *exit_data_size, |
| 616 | u16 **exit_data); |
AKASHI Takahiro | b0ad905 | 2019-03-05 14:53:31 +0900 | [diff] [blame] | 617 | /* Unload image */ |
| 618 | efi_status_t EFIAPI efi_unload_image(efi_handle_t image_handle); |
Heinrich Schuchardt | 5aef61d | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 619 | /* Find a protocol on a handle */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 620 | efi_status_t efi_search_protocol(const efi_handle_t handle, |
Heinrich Schuchardt | 5aef61d | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 621 | const efi_guid_t *protocol_guid, |
| 622 | struct efi_handler **handler); |
| 623 | /* Install new protocol on a handle */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 624 | efi_status_t efi_add_protocol(const efi_handle_t handle, |
| 625 | const efi_guid_t *protocol, |
Heinrich Schuchardt | 5aef61d | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 626 | void *protocol_interface); |
Heinrich Schuchardt | 9c89d14 | 2020-01-10 12:33:59 +0100 | [diff] [blame] | 627 | /* Open protocol */ |
| 628 | efi_status_t efi_protocol_open(struct efi_handler *handler, |
| 629 | void **protocol_interface, void *agent_handle, |
| 630 | void *controller_handle, uint32_t attributes); |
| 631 | |
Heinrich Schuchardt | 5aef61d | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 632 | /* Delete protocol from a handle */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 633 | efi_status_t efi_remove_protocol(const efi_handle_t handle, |
| 634 | const efi_guid_t *protocol, |
Heinrich Schuchardt | 5aef61d | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 635 | void *protocol_interface); |
| 636 | /* Delete all protocols from a handle */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 637 | efi_status_t efi_remove_all_protocols(const efi_handle_t handle); |
Heinrich Schuchardt | 744d83e | 2019-04-12 06:59:49 +0200 | [diff] [blame] | 638 | /* Install multiple protocol interfaces */ |
| 639 | efi_status_t EFIAPI efi_install_multiple_protocol_interfaces |
| 640 | (efi_handle_t *handle, ...); |
AKASHI Takahiro | d99b1b3 | 2020-03-17 11:12:36 +0900 | [diff] [blame] | 641 | /* Get handles that support a given protocol */ |
| 642 | efi_status_t EFIAPI efi_locate_handle_buffer( |
| 643 | enum efi_locate_search_type search_type, |
| 644 | const efi_guid_t *protocol, void *search_key, |
| 645 | efi_uintn_t *no_handles, efi_handle_t **buffer); |
| 646 | /* Close an previously opened protocol interface */ |
| 647 | efi_status_t EFIAPI efi_close_protocol(efi_handle_t handle, |
| 648 | const efi_guid_t *protocol, |
| 649 | efi_handle_t agent_handle, |
| 650 | efi_handle_t controller_handle); |
| 651 | /* Open a protocol interface */ |
| 652 | efi_status_t EFIAPI efi_handle_protocol(efi_handle_t handle, |
| 653 | const efi_guid_t *protocol, |
| 654 | void **protocol_interface); |
xypron.glpk@gmx.de | 852a0e177 | 2017-07-18 20:17:20 +0200 | [diff] [blame] | 655 | /* Call this to create an event */ |
Heinrich Schuchardt | f8d4ec3 | 2017-11-06 21:17:47 +0100 | [diff] [blame] | 656 | efi_status_t efi_create_event(uint32_t type, efi_uintn_t notify_tpl, |
xypron.glpk@gmx.de | 852a0e177 | 2017-07-18 20:17:20 +0200 | [diff] [blame] | 657 | void (EFIAPI *notify_function) ( |
| 658 | struct efi_event *event, |
| 659 | void *context), |
Heinrich Schuchardt | bf7f169 | 2018-02-18 15:17:52 +0100 | [diff] [blame] | 660 | void *notify_context, efi_guid_t *group, |
| 661 | struct efi_event **event); |
xypron.glpk@gmx.de | a587fd1 | 2017-07-18 20:17:21 +0200 | [diff] [blame] | 662 | /* Call this to set a timer */ |
xypron.glpk@gmx.de | 3ecc6bd | 2017-07-19 19:22:34 +0200 | [diff] [blame] | 663 | efi_status_t efi_set_timer(struct efi_event *event, enum efi_timer_delay type, |
xypron.glpk@gmx.de | a587fd1 | 2017-07-18 20:17:21 +0200 | [diff] [blame] | 664 | uint64_t trigger_time); |
xypron.glpk@gmx.de | 54c7a8e | 2017-07-18 20:17:22 +0200 | [diff] [blame] | 665 | /* Call this to signal an event */ |
Heinrich Schuchardt | 7b4b8d86 | 2019-06-07 06:47:01 +0200 | [diff] [blame] | 666 | void efi_signal_event(struct efi_event *event); |
Alexander Graf | 0bd425a | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 667 | |
AKASHI Takahiro | ba647af | 2022-05-12 11:29:01 +0900 | [diff] [blame] | 668 | /* return true if the device is removable */ |
| 669 | bool efi_disk_is_removable(efi_handle_t handle); |
| 670 | |
Rob Clark | 5314203 | 2017-09-13 18:05:34 -0400 | [diff] [blame] | 671 | /* open file system: */ |
| 672 | struct efi_simple_file_system_protocol *efi_simple_file_system( |
| 673 | struct blk_desc *desc, int part, struct efi_device_path *dp); |
| 674 | |
| 675 | /* open file from device-path: */ |
| 676 | struct efi_file_handle *efi_file_from_path(struct efi_device_path *fp); |
| 677 | |
Jose Marinho | ebb61ee | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 678 | /* Registers a callback function for a notification event. */ |
| 679 | efi_status_t EFIAPI efi_register_protocol_notify(const efi_guid_t *protocol, |
| 680 | struct efi_event *event, |
| 681 | void **registration); |
Ilias Apalodimas | aa0f755 | 2021-03-17 21:54:59 +0200 | [diff] [blame] | 682 | efi_status_t efi_file_size(struct efi_file_handle *fh, efi_uintn_t *size); |
| 683 | |
| 684 | /* get a device path from a Boot#### option */ |
| 685 | struct efi_device_path *efi_get_dp_from_boot(const efi_guid_t guid); |
| 686 | |
Ilias Apalodimas | 34db9b1 | 2022-05-06 15:36:00 +0300 | [diff] [blame] | 687 | /* get len, string (used in u-boot crypto from a guid */ |
| 688 | const char *guid_to_sha_str(const efi_guid_t *guid); |
| 689 | int algo_to_len(const char *algo); |
| 690 | |
Heinrich Schuchardt | dcdca29 | 2018-11-18 17:58:49 +0100 | [diff] [blame] | 691 | /** |
| 692 | * efi_size_in_pages() - convert size in bytes to size in pages |
| 693 | * |
| 694 | * This macro returns the number of EFI memory pages required to hold 'size' |
| 695 | * bytes. |
| 696 | * |
| 697 | * @size: size in bytes |
| 698 | * Return: size in pages |
| 699 | */ |
Heinrich Schuchardt | aefb0c4 | 2021-01-17 07:52:09 +0100 | [diff] [blame] | 700 | #define efi_size_in_pages(size) (((size) + EFI_PAGE_MASK) >> EFI_PAGE_SHIFT) |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 701 | /* Generic EFI memory allocator, call this to get memory */ |
| 702 | void *efi_alloc(uint64_t len, int memory_type); |
Ilias Apalodimas | 6e01c23 | 2021-10-11 15:10:23 +0300 | [diff] [blame] | 703 | /* Allocate pages on the specified alignment */ |
| 704 | void *efi_alloc_aligned_pages(u64 len, int memory_type, size_t align); |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 705 | /* More specific EFI memory allocator, called by EFI payloads */ |
Heinrich Schuchardt | 9822894 | 2021-08-17 15:05:31 +0200 | [diff] [blame] | 706 | efi_status_t efi_allocate_pages(enum efi_allocate_type type, |
| 707 | enum efi_memory_type memory_type, |
| 708 | efi_uintn_t pages, uint64_t *memory); |
Stefan Brüns | a4f4302 | 2016-10-01 23:32:27 +0200 | [diff] [blame] | 709 | /* EFI memory free function. */ |
Heinrich Schuchardt | 798a441 | 2017-11-06 21:17:48 +0100 | [diff] [blame] | 710 | efi_status_t efi_free_pages(uint64_t memory, efi_uintn_t pages); |
Stefan Brüns | 5a09aef | 2016-10-09 22:17:18 +0200 | [diff] [blame] | 711 | /* EFI memory allocator for small allocations */ |
Heinrich Schuchardt | 9822894 | 2021-08-17 15:05:31 +0200 | [diff] [blame] | 712 | efi_status_t efi_allocate_pool(enum efi_memory_type pool_type, |
| 713 | efi_uintn_t size, void **buffer); |
Stefan Brüns | 67b67d9 | 2016-10-09 22:17:26 +0200 | [diff] [blame] | 714 | /* EFI pool memory free function. */ |
| 715 | efi_status_t efi_free_pool(void *buffer); |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 716 | /* Returns the EFI memory map */ |
Heinrich Schuchardt | 798a441 | 2017-11-06 21:17:48 +0100 | [diff] [blame] | 717 | efi_status_t efi_get_memory_map(efi_uintn_t *memory_map_size, |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 718 | struct efi_mem_desc *memory_map, |
Heinrich Schuchardt | 798a441 | 2017-11-06 21:17:48 +0100 | [diff] [blame] | 719 | efi_uintn_t *map_key, |
| 720 | efi_uintn_t *descriptor_size, |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 721 | uint32_t *descriptor_version); |
| 722 | /* Adds a range into the EFI memory map */ |
Michael Walle | 282d386 | 2020-05-17 12:29:19 +0200 | [diff] [blame] | 723 | efi_status_t efi_add_memory_map(u64 start, u64 size, int memory_type); |
Park, Aiden | e009e7a | 2019-09-03 17:43:43 +0000 | [diff] [blame] | 724 | /* Adds a conventional range into the EFI memory map */ |
| 725 | efi_status_t efi_add_conventional_memory_map(u64 ram_start, u64 ram_end, |
| 726 | u64 ram_top); |
| 727 | |
Heinrich Schuchardt | 11206f4 | 2018-01-21 19:29:30 +0100 | [diff] [blame] | 728 | /* Called by board init to initialize the EFI drivers */ |
Heinrich Schuchardt | 8f3cc5b | 2018-02-01 12:53:32 +0100 | [diff] [blame] | 729 | efi_status_t efi_driver_init(void); |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 730 | /* Called by board init to initialize the EFI memory map */ |
| 731 | int efi_memory_init(void); |
Alexander Graf | c5c1163 | 2016-08-19 01:23:24 +0200 | [diff] [blame] | 732 | /* Adds new or overrides configuration table entry to the system table */ |
| 733 | efi_status_t efi_install_configuration_table(const efi_guid_t *guid, void *table); |
Heinrich Schuchardt | 7db9f89 | 2017-12-04 18:03:01 +0100 | [diff] [blame] | 734 | /* Sets up a loaded image */ |
Heinrich Schuchardt | 3c3a735 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 735 | efi_status_t efi_setup_loaded_image(struct efi_device_path *device_path, |
| 736 | struct efi_device_path *file_path, |
| 737 | struct efi_loaded_image_obj **handle_ptr, |
| 738 | struct efi_loaded_image **info_ptr); |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 739 | |
Alexander Graf | 7c00a3c | 2016-05-11 18:25:48 +0200 | [diff] [blame] | 740 | #ifdef CONFIG_EFI_LOADER_BOUNCE_BUFFER |
| 741 | extern void *efi_bounce_buffer; |
| 742 | #define EFI_LOADER_BOUNCE_BUFFER_SIZE (64 * 1024 * 1024) |
| 743 | #endif |
| 744 | |
Heinrich Schuchardt | 24f0e6a | 2022-02-26 12:10:10 +0100 | [diff] [blame] | 745 | /* shorten device path */ |
| 746 | struct efi_device_path *efi_dp_shorten(struct efi_device_path *dp); |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 747 | struct efi_device_path *efi_dp_next(const struct efi_device_path *dp); |
Heinrich Schuchardt | 753e248 | 2017-10-26 19:25:48 +0200 | [diff] [blame] | 748 | int efi_dp_match(const struct efi_device_path *a, |
| 749 | const struct efi_device_path *b); |
Heinrich Schuchardt | ad6d5a4 | 2022-03-04 08:20:00 +0100 | [diff] [blame] | 750 | efi_handle_t efi_dp_find_obj(struct efi_device_path *dp, |
Heinrich Schuchardt | 0a04a41 | 2022-03-19 06:35:43 +0100 | [diff] [blame] | 751 | const efi_guid_t *guid, |
Heinrich Schuchardt | ad6d5a4 | 2022-03-04 08:20:00 +0100 | [diff] [blame] | 752 | struct efi_device_path **rem); |
Heinrich Schuchardt | 51ca4f5 | 2018-04-16 07:59:08 +0200 | [diff] [blame] | 753 | /* get size of the first device path instance excluding end node */ |
| 754 | efi_uintn_t efi_dp_instance_size(const struct efi_device_path *dp); |
| 755 | /* size of multi-instance device path excluding end node */ |
| 756 | efi_uintn_t efi_dp_size(const struct efi_device_path *dp); |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 757 | struct efi_device_path *efi_dp_dup(const struct efi_device_path *dp); |
| 758 | struct efi_device_path *efi_dp_append(const struct efi_device_path *dp1, |
| 759 | const struct efi_device_path *dp2); |
| 760 | struct efi_device_path *efi_dp_append_node(const struct efi_device_path *dp, |
| 761 | const struct efi_device_path *node); |
Heinrich Schuchardt | b41c8e2 | 2018-04-16 07:59:05 +0200 | [diff] [blame] | 762 | /* Create a device path node of given type, sub-type, length */ |
| 763 | struct efi_device_path *efi_dp_create_device_node(const u8 type, |
| 764 | const u8 sub_type, |
| 765 | const u16 length); |
Heinrich Schuchardt | cb0f7ce | 2018-04-16 07:59:09 +0200 | [diff] [blame] | 766 | /* Append device path instance */ |
| 767 | struct efi_device_path *efi_dp_append_instance( |
| 768 | const struct efi_device_path *dp, |
| 769 | const struct efi_device_path *dpi); |
| 770 | /* Get next device path instance */ |
| 771 | struct efi_device_path *efi_dp_get_next_instance(struct efi_device_path **dp, |
| 772 | efi_uintn_t *size); |
| 773 | /* Check if a device path contains muliple instances */ |
| 774 | bool efi_dp_is_multi_instance(const struct efi_device_path *dp); |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 775 | |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 776 | struct efi_device_path *efi_dp_from_part(struct blk_desc *desc, int part); |
Heinrich Schuchardt | 6c6307c | 2018-01-19 20:24:46 +0100 | [diff] [blame] | 777 | /* Create a device node for a block device partition. */ |
| 778 | struct efi_device_path *efi_dp_part_node(struct blk_desc *desc, int part); |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 779 | struct efi_device_path *efi_dp_from_file(struct blk_desc *desc, int part, |
| 780 | const char *path); |
| 781 | struct efi_device_path *efi_dp_from_eth(void); |
Rob Clark | 18ceba7 | 2017-10-10 08:23:06 -0400 | [diff] [blame] | 782 | struct efi_device_path *efi_dp_from_mem(uint32_t mem_type, |
| 783 | uint64_t start_address, |
| 784 | uint64_t end_address); |
Heinrich Schuchardt | 0976f8b | 2018-01-19 20:24:49 +0100 | [diff] [blame] | 785 | /* Determine the last device path node that is not the end node. */ |
| 786 | const struct efi_device_path *efi_dp_last_node( |
| 787 | const struct efi_device_path *dp); |
Heinrich Schuchardt | 468bf97 | 2018-01-19 20:24:37 +0100 | [diff] [blame] | 788 | efi_status_t efi_dp_split_file_path(struct efi_device_path *full_path, |
| 789 | struct efi_device_path **device_path, |
| 790 | struct efi_device_path **file_path); |
Heinrich Schuchardt | 81244ea | 2022-02-04 20:47:09 +0100 | [diff] [blame] | 791 | struct efi_device_path *efi_dp_from_uart(void); |
AKASHI Takahiro | 035fb01 | 2018-10-17 16:32:03 +0900 | [diff] [blame] | 792 | efi_status_t efi_dp_from_name(const char *dev, const char *devnr, |
| 793 | const char *path, |
| 794 | struct efi_device_path **device, |
| 795 | struct efi_device_path **file); |
Heinrich Schuchardt | 22c8e08 | 2020-08-23 10:49:46 +0200 | [diff] [blame] | 796 | ssize_t efi_dp_check_length(const struct efi_device_path *dp, |
| 797 | const size_t maxlen); |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 798 | |
| 799 | #define EFI_DP_TYPE(_dp, _type, _subtype) \ |
| 800 | (((_dp)->type == DEVICE_PATH_TYPE_##_type) && \ |
| 801 | ((_dp)->sub_type == DEVICE_PATH_SUB_TYPE_##_subtype)) |
| 802 | |
AKASHI Takahiro | 3240184 | 2019-06-05 13:21:38 +0900 | [diff] [blame] | 803 | /* Indicate supported runtime services */ |
| 804 | efi_status_t efi_init_runtime_supported(void); |
| 805 | |
Heinrich Schuchardt | 69c1576 | 2018-07-29 09:49:04 +0200 | [diff] [blame] | 806 | /* Update CRC32 in table header */ |
| 807 | void __efi_runtime efi_update_table_header_crc32(struct efi_table_hdr *table); |
| 808 | |
Alexander Graf | 7725609 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 809 | /* Boards may provide the functions below to implement RTS functionality */ |
| 810 | |
Alexander Graf | 393dd91 | 2016-10-14 13:45:30 +0200 | [diff] [blame] | 811 | void __efi_runtime EFIAPI efi_reset_system( |
Alexander Graf | 7725609 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 812 | enum efi_reset_type reset_type, |
| 813 | efi_status_t reset_status, |
| 814 | unsigned long data_size, void *reset_data); |
Heinrich Schuchardt | 099b3b7 | 2018-03-03 15:28:59 +0100 | [diff] [blame] | 815 | |
| 816 | /* Architecture specific initialization of the EFI subsystem */ |
| 817 | efi_status_t efi_reset_system_init(void); |
Alexander Graf | 7725609 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 818 | |
Alexander Graf | 393dd91 | 2016-10-14 13:45:30 +0200 | [diff] [blame] | 819 | efi_status_t __efi_runtime EFIAPI efi_get_time( |
Alexander Graf | 7725609 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 820 | struct efi_time *time, |
| 821 | struct efi_time_cap *capabilities); |
Alexander Graf | 7725609 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 822 | |
Heinrich Schuchardt | 289121e | 2019-05-31 07:38:29 +0200 | [diff] [blame] | 823 | efi_status_t __efi_runtime EFIAPI efi_set_time(struct efi_time *time); |
| 824 | |
Heinrich Schuchardt | d33ae3e | 2017-09-15 10:06:11 +0200 | [diff] [blame] | 825 | #ifdef CONFIG_CMD_BOOTEFI_SELFTEST |
| 826 | /* |
| 827 | * Entry point for the tests of the EFI API. |
| 828 | * It is called by 'bootefi selftest' |
| 829 | */ |
| 830 | efi_status_t EFIAPI efi_selftest(efi_handle_t image_handle, |
| 831 | struct efi_system_table *systab); |
| 832 | #endif |
| 833 | |
Heinrich Schuchardt | e06ae19 | 2018-12-30 20:53:51 +0100 | [diff] [blame] | 834 | efi_status_t EFIAPI efi_get_variable(u16 *variable_name, |
| 835 | const efi_guid_t *vendor, u32 *attributes, |
| 836 | efi_uintn_t *data_size, void *data); |
Heinrich Schuchardt | d6a6baa | 2018-05-17 07:57:05 +0200 | [diff] [blame] | 837 | efi_status_t EFIAPI efi_get_next_variable_name(efi_uintn_t *variable_name_size, |
| 838 | u16 *variable_name, |
Heinrich Schuchardt | 82cd6c4 | 2020-03-22 18:28:20 +0100 | [diff] [blame] | 839 | efi_guid_t *vendor); |
Heinrich Schuchardt | e06ae19 | 2018-12-30 20:53:51 +0100 | [diff] [blame] | 840 | efi_status_t EFIAPI efi_set_variable(u16 *variable_name, |
| 841 | const efi_guid_t *vendor, u32 attributes, |
Heinrich Schuchardt | 73e2ab0 | 2018-12-30 21:03:15 +0100 | [diff] [blame] | 842 | efi_uintn_t data_size, const void *data); |
Rob Clark | 15f3d74 | 2017-09-13 18:05:37 -0400 | [diff] [blame] | 843 | |
Heinrich Schuchardt | 9b19dae | 2019-06-20 12:13:05 +0200 | [diff] [blame] | 844 | efi_status_t EFIAPI efi_query_variable_info( |
| 845 | u32 attributes, u64 *maximum_variable_storage_size, |
| 846 | u64 *remaining_variable_storage_size, |
| 847 | u64 *maximum_variable_size); |
| 848 | |
Heinrich Schuchardt | 1ad2f0d | 2021-09-09 07:12:14 +0200 | [diff] [blame] | 849 | void *efi_get_var(const u16 *name, const efi_guid_t *vendor, efi_uintn_t *size); |
Ilias Apalodimas | aa0f755 | 2021-03-17 21:54:59 +0200 | [diff] [blame] | 850 | |
AKASHI Takahiro | bd23774 | 2018-11-05 18:06:41 +0900 | [diff] [blame] | 851 | /* |
| 852 | * See section 3.1.3 in the v2.7 UEFI spec for more details on |
| 853 | * the layout of EFI_LOAD_OPTION. In short it is: |
| 854 | * |
| 855 | * typedef struct _EFI_LOAD_OPTION { |
| 856 | * UINT32 Attributes; |
| 857 | * UINT16 FilePathListLength; |
| 858 | * // CHAR16 Description[]; <-- variable length, NULL terminated |
| 859 | * // EFI_DEVICE_PATH_PROTOCOL FilePathList[]; |
| 860 | * <-- FilePathListLength bytes |
| 861 | * // UINT8 OptionalData[]; |
| 862 | * } EFI_LOAD_OPTION; |
| 863 | */ |
| 864 | struct efi_load_option { |
| 865 | u32 attributes; |
| 866 | u16 file_path_length; |
| 867 | u16 *label; |
| 868 | struct efi_device_path *file_path; |
Heinrich Schuchardt | 9df002e | 2019-04-29 13:51:45 +0200 | [diff] [blame] | 869 | const u8 *optional_data; |
AKASHI Takahiro | bd23774 | 2018-11-05 18:06:41 +0900 | [diff] [blame] | 870 | }; |
| 871 | |
Ilias Apalodimas | 483d28e | 2021-03-17 21:54:58 +0200 | [diff] [blame] | 872 | struct efi_device_path *efi_dp_from_lo(struct efi_load_option *lo, |
Heinrich Schuchardt | 9979cff | 2021-10-15 01:31:02 +0200 | [diff] [blame] | 873 | const efi_guid_t *guid); |
Ilias Apalodimas | 483d28e | 2021-03-17 21:54:58 +0200 | [diff] [blame] | 874 | struct efi_device_path *efi_dp_concat(const struct efi_device_path *dp1, |
| 875 | const struct efi_device_path *dp2); |
Masahisa Kojima | 6460c3e | 2021-10-26 17:27:25 +0900 | [diff] [blame] | 876 | struct efi_device_path *search_gpt_dp_node(struct efi_device_path *device_path); |
Heinrich Schuchardt | 7ca84f8 | 2020-05-31 22:46:09 +0200 | [diff] [blame] | 877 | efi_status_t efi_deserialize_load_option(struct efi_load_option *lo, u8 *data, |
| 878 | efi_uintn_t *size); |
AKASHI Takahiro | bd23774 | 2018-11-05 18:06:41 +0900 | [diff] [blame] | 879 | unsigned long efi_serialize_load_option(struct efi_load_option *lo, u8 **data); |
Heinrich Schuchardt | 25c6be5 | 2020-08-07 17:47:13 +0200 | [diff] [blame] | 880 | efi_status_t efi_set_load_options(efi_handle_t handle, |
| 881 | efi_uintn_t load_options_size, |
| 882 | void *load_options); |
Heinrich Schuchardt | a7647a7 | 2020-08-07 17:49:39 +0200 | [diff] [blame] | 883 | efi_status_t efi_bootmgr_load(efi_handle_t *handle, void **load_options); |
Rob Clark | c84c110 | 2017-09-13 18:05:38 -0400 | [diff] [blame] | 884 | |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 885 | /** |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 886 | * struct efi_image_regions - A list of memory regions |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 887 | * |
| 888 | * @max: Maximum number of regions |
| 889 | * @num: Number of regions |
| 890 | * @reg: array of regions |
| 891 | */ |
| 892 | struct efi_image_regions { |
| 893 | int max; |
| 894 | int num; |
| 895 | struct image_region reg[]; |
| 896 | }; |
| 897 | |
| 898 | /** |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 899 | * struct efi_sig_data - A decoded data of struct efi_signature_data |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 900 | * |
| 901 | * This structure represents an internal form of signature in |
| 902 | * signature database. A listed list may represent a signature list. |
| 903 | * |
| 904 | * @next: Pointer to next entry |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 905 | * @owner: Signature owner |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 906 | * @data: Pointer to signature data |
| 907 | * @size: Size of signature data |
| 908 | */ |
| 909 | struct efi_sig_data { |
| 910 | struct efi_sig_data *next; |
| 911 | efi_guid_t owner; |
| 912 | void *data; |
| 913 | size_t size; |
| 914 | }; |
| 915 | |
| 916 | /** |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 917 | * struct efi_signature_store - A decoded data of signature database |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 918 | * |
| 919 | * This structure represents an internal form of signature database. |
| 920 | * |
| 921 | * @next: Pointer to next entry |
| 922 | * @sig_type: Signature type |
| 923 | * @sig_data_list: Pointer to signature list |
| 924 | */ |
| 925 | struct efi_signature_store { |
| 926 | struct efi_signature_store *next; |
| 927 | efi_guid_t sig_type; |
| 928 | struct efi_sig_data *sig_data_list; |
| 929 | }; |
| 930 | |
| 931 | struct x509_certificate; |
| 932 | struct pkcs7_message; |
| 933 | |
AKASHI Takahiro | de92407 | 2020-07-08 14:01:57 +0900 | [diff] [blame] | 934 | bool efi_signature_lookup_digest(struct efi_image_regions *regs, |
Ilias Apalodimas | 71eae98 | 2022-01-29 00:20:31 +0200 | [diff] [blame] | 935 | struct efi_signature_store *db, |
| 936 | bool dbx); |
AKASHI Takahiro | 14afd06 | 2020-07-21 19:35:22 +0900 | [diff] [blame] | 937 | bool efi_signature_verify(struct efi_image_regions *regs, |
| 938 | struct pkcs7_message *msg, |
| 939 | struct efi_signature_store *db, |
| 940 | struct efi_signature_store *dbx); |
AKASHI Takahiro | 1641180 | 2020-08-14 14:39:23 +0900 | [diff] [blame] | 941 | static inline bool efi_signature_verify_one(struct efi_image_regions *regs, |
| 942 | struct pkcs7_message *msg, |
| 943 | struct efi_signature_store *db) |
| 944 | { |
| 945 | return efi_signature_verify(regs, msg, db, NULL); |
| 946 | } |
AKASHI Takahiro | 4154b64 | 2020-07-08 14:01:56 +0900 | [diff] [blame] | 947 | bool efi_signature_check_signers(struct pkcs7_message *msg, |
| 948 | struct efi_signature_store *dbx); |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 949 | |
| 950 | efi_status_t efi_image_region_add(struct efi_image_regions *regs, |
| 951 | const void *start, const void *end, |
| 952 | int nocheck); |
AKASHI Takahiro | d2cefc8 | 2020-04-14 11:51:40 +0900 | [diff] [blame] | 953 | |
| 954 | void efi_sigstore_free(struct efi_signature_store *sigstore); |
Sughosh Ganu | fa0faa6 | 2020-12-30 19:27:08 +0530 | [diff] [blame] | 955 | struct efi_signature_store *efi_build_signature_store(void *sig_list, |
| 956 | efi_uintn_t size); |
AKASHI Takahiro | d2cefc8 | 2020-04-14 11:51:40 +0900 | [diff] [blame] | 957 | struct efi_signature_store *efi_sigstore_parse_sigdb(u16 *name); |
AKASHI Takahiro | b0f49ee | 2020-04-14 11:51:41 +0900 | [diff] [blame] | 958 | |
| 959 | bool efi_secure_boot_enabled(void); |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 960 | |
Sughosh Ganu | 586bb98 | 2020-12-30 19:27:09 +0530 | [diff] [blame] | 961 | bool efi_capsule_auth_enabled(void); |
| 962 | |
Masahisa Kojima | 70be5a6 | 2021-05-26 12:09:58 +0900 | [diff] [blame] | 963 | void *efi_prepare_aligned_image(void *efi, u64 *efi_size); |
| 964 | |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 965 | bool efi_image_parse(void *efi, size_t len, struct efi_image_regions **regp, |
| 966 | WIN_CERTIFICATE **auth, size_t *auth_len); |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 967 | |
Sughosh Ganu | ea35008 | 2020-12-30 19:27:07 +0530 | [diff] [blame] | 968 | struct pkcs7_message *efi_parse_pkcs7_header(const void *buf, |
| 969 | size_t buflen, |
| 970 | u8 **tmpbuf); |
| 971 | |
Heinrich Schuchardt | 8cd9975 | 2020-06-28 16:30:29 +0200 | [diff] [blame] | 972 | /* runtime implementation of memcpy() */ |
| 973 | void efi_memcpy_runtime(void *dest, const void *src, size_t n); |
| 974 | |
AKASHI Takahiro | 9407468 | 2020-10-29 13:47:46 +0900 | [diff] [blame] | 975 | /* commonly used helper function */ |
Ilias Apalodimas | 2157529 | 2020-12-31 12:26:46 +0200 | [diff] [blame] | 976 | u16 *efi_create_indexed_name(u16 *buffer, size_t buffer_size, const char *name, |
| 977 | unsigned int index); |
AKASHI Takahiro | 9407468 | 2020-10-29 13:47:46 +0900 | [diff] [blame] | 978 | |
AKASHI Takahiro | f4818e6 | 2020-11-30 18:12:12 +0900 | [diff] [blame] | 979 | extern const struct efi_firmware_management_protocol efi_fmp_fit; |
AKASHI Takahiro | 7ff3f3c | 2020-11-17 09:28:00 +0900 | [diff] [blame] | 980 | extern const struct efi_firmware_management_protocol efi_fmp_raw; |
AKASHI Takahiro | f4818e6 | 2020-11-30 18:12:12 +0900 | [diff] [blame] | 981 | |
AKASHI Takahiro | 473d9b3 | 2020-11-17 09:27:55 +0900 | [diff] [blame] | 982 | /* Capsule update */ |
| 983 | efi_status_t EFIAPI efi_update_capsule( |
| 984 | struct efi_capsule_header **capsule_header_array, |
| 985 | efi_uintn_t capsule_count, |
| 986 | u64 scatter_gather_list); |
| 987 | efi_status_t EFIAPI efi_query_capsule_caps( |
| 988 | struct efi_capsule_header **capsule_header_array, |
| 989 | efi_uintn_t capsule_count, |
| 990 | u64 *maximum_capsule_size, |
| 991 | u32 *reset_type); |
| 992 | |
Sughosh Ganu | 586bb98 | 2020-12-30 19:27:09 +0530 | [diff] [blame] | 993 | efi_status_t efi_capsule_authenticate(const void *capsule, |
| 994 | efi_uintn_t capsule_size, |
| 995 | void **image, efi_uintn_t *image_size); |
| 996 | |
Simon Glass | 9097537 | 2022-01-23 12:55:12 -0700 | [diff] [blame] | 997 | #define EFI_CAPSULE_DIR u"\\EFI\\UpdateCapsule\\" |
AKASHI Takahiro | 45b81954 | 2020-11-17 09:27:56 +0900 | [diff] [blame] | 998 | |
Jose Marinho | ebb61ee | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 999 | /** |
Sughosh Ganu | ccb3646 | 2022-04-15 11:29:34 +0530 | [diff] [blame] | 1000 | * struct efi_fw_image - Information on firmware images updatable through |
| 1001 | * capsule update |
| 1002 | * |
| 1003 | * This structure gives information about the firmware images on the platform |
| 1004 | * which can be updated through the capsule update mechanism |
| 1005 | * |
| 1006 | * @image_type_id: Image GUID. Same value is to be used in the capsule |
| 1007 | * @fw_name: Name of the firmware image |
| 1008 | * @image_index: Image Index, same as value passed to SetImage FMP |
| 1009 | * function |
| 1010 | */ |
| 1011 | struct efi_fw_image { |
| 1012 | efi_guid_t image_type_id; |
| 1013 | u16 *fw_name; |
| 1014 | u8 image_index; |
| 1015 | }; |
| 1016 | |
| 1017 | /** |
| 1018 | * struct efi_capsule_update_info - Information needed for capsule updates |
| 1019 | * |
| 1020 | * This structure provides information needed for performing firmware |
| 1021 | * updates. The structure needs to be initialised per platform, for all |
| 1022 | * platforms which enable capsule updates |
| 1023 | * |
| 1024 | * @dfu_string: String used to populate dfu_alt_info |
| 1025 | * @images: Pointer to an array of updatable images |
| 1026 | */ |
| 1027 | struct efi_capsule_update_info { |
| 1028 | const char *dfu_string; |
| 1029 | struct efi_fw_image *images; |
| 1030 | }; |
| 1031 | |
| 1032 | extern struct efi_capsule_update_info update_info; |
| 1033 | extern u8 num_image_type_guids; |
| 1034 | |
| 1035 | /** |
Jose Marinho | ebb61ee | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 1036 | * Install the ESRT system table. |
| 1037 | * |
Heinrich Schuchardt | 47b4c02 | 2022-01-19 18:05:50 +0100 | [diff] [blame] | 1038 | * Return: status code |
Jose Marinho | ebb61ee | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 1039 | */ |
| 1040 | efi_status_t efi_esrt_register(void); |
| 1041 | |
| 1042 | /** |
| 1043 | * efi_esrt_populate() - Populates the ESRT entries from the FMP instances |
| 1044 | * present in the system. |
| 1045 | * If an ESRT already exists, the old ESRT is replaced in the system table. |
| 1046 | * The memory of the old ESRT is deallocated. |
| 1047 | * |
| 1048 | * Return: |
| 1049 | * - EFI_SUCCESS if the ESRT is correctly created |
| 1050 | * - error code otherwise. |
| 1051 | */ |
| 1052 | efi_status_t efi_esrt_populate(void); |
Ilias Apalodimas | fac773e | 2021-06-22 17:38:53 +0300 | [diff] [blame] | 1053 | efi_status_t efi_load_capsule_drivers(void); |
Ruchika Gupta | bc9495c | 2021-11-29 13:09:44 +0530 | [diff] [blame] | 1054 | |
| 1055 | efi_status_t platform_get_eventlog(struct udevice *dev, u64 *addr, u32 *sz); |
Heinrich Schuchardt | c2fd477 | 2017-10-18 18:13:07 +0200 | [diff] [blame] | 1056 | #endif /* _EFI_LOADER_H */ |