Tom Rini | 70df9d6 | 2018-05-07 17:02:21 -0400 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0+ */ |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 2 | /* |
| 3 | * EFI application loader |
| 4 | * |
| 5 | * Copyright (c) 2016 Alexander Graf |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 6 | */ |
| 7 | |
Heinrich Schuchardt | c2fd477 | 2017-10-18 18:13:07 +0200 | [diff] [blame] | 8 | #ifndef _EFI_LOADER_H |
| 9 | #define _EFI_LOADER_H 1 |
| 10 | |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 11 | #include <common.h> |
Simon Glass | 655306c | 2020-05-10 11:39:58 -0600 | [diff] [blame] | 12 | #include <blk.h> |
Heinrich Schuchardt | da620cf | 2022-10-06 07:29:41 +0200 | [diff] [blame] | 13 | #include <event.h> |
Simon Glass | 0f2af88 | 2020-05-10 11:40:05 -0600 | [diff] [blame] | 14 | #include <log.h> |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 15 | #include <part_efi.h> |
| 16 | #include <efi_api.h> |
AKASHI Takahiro | 2c0f9f7 | 2020-04-21 09:38:38 +0900 | [diff] [blame] | 17 | #include <image.h> |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 18 | #include <pe.h> |
Simon Glass | 97f9bd4 | 2021-07-02 12:36:16 -0600 | [diff] [blame] | 19 | #include <linux/list.h> |
| 20 | #include <linux/oid_registry.h> |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 21 | |
Simon Glass | 655306c | 2020-05-10 11:39:58 -0600 | [diff] [blame] | 22 | struct blk_desc; |
AKASHI Takahiro | 4cbba2b | 2021-07-20 14:57:02 +0900 | [diff] [blame] | 23 | struct jmp_buf_data; |
Simon Glass | 655306c | 2020-05-10 11:39:58 -0600 | [diff] [blame] | 24 | |
Simon Glass | 16fc74a | 2019-09-25 08:11:32 -0600 | [diff] [blame] | 25 | static inline int guidcmp(const void *g1, const void *g2) |
| 26 | { |
| 27 | return memcmp(g1, g2, sizeof(efi_guid_t)); |
| 28 | } |
| 29 | |
Sughosh Ganu | 196f66d | 2019-12-29 00:01:04 +0530 | [diff] [blame] | 30 | static inline void *guidcpy(void *dst, const void *src) |
| 31 | { |
| 32 | return memcpy(dst, src, sizeof(efi_guid_t)); |
| 33 | } |
| 34 | |
Stephen Warren | d0de806 | 2018-08-30 15:43:43 -0600 | [diff] [blame] | 35 | #if CONFIG_IS_ENABLED(EFI_LOADER) |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 36 | |
Simon Glass | 97f9bd4 | 2021-07-02 12:36:16 -0600 | [diff] [blame] | 37 | /** |
| 38 | * __efi_runtime_data - declares a non-const variable for EFI runtime section |
| 39 | * |
| 40 | * This macro indicates that a variable is non-const and should go into the |
| 41 | * EFI runtime section, and thus still be available when the OS is running. |
| 42 | * |
| 43 | * Only use on variables not declared const. |
| 44 | * |
| 45 | * Example: |
| 46 | * |
| 47 | * :: |
| 48 | * |
| 49 | * static __efi_runtime_data my_computed_table[256]; |
| 50 | */ |
| 51 | #define __efi_runtime_data __section(".data.efi_runtime") |
| 52 | |
| 53 | /** |
| 54 | * __efi_runtime_rodata - declares a read-only variable for EFI runtime section |
| 55 | * |
| 56 | * This macro indicates that a variable is read-only (const) and should go into |
| 57 | * the EFI runtime section, and thus still be available when the OS is running. |
| 58 | * |
| 59 | * Only use on variables also declared const. |
| 60 | * |
| 61 | * Example: |
| 62 | * |
| 63 | * :: |
| 64 | * |
| 65 | * static const __efi_runtime_rodata my_const_table[] = { 1, 2, 3 }; |
| 66 | */ |
| 67 | #define __efi_runtime_rodata __section(".rodata.efi_runtime") |
| 68 | |
| 69 | /** |
| 70 | * __efi_runtime - declares a function for EFI runtime section |
| 71 | * |
| 72 | * This macro indicates that a function should go into the EFI runtime section, |
| 73 | * and thus still be available when the OS is running. |
| 74 | * |
| 75 | * Example: |
| 76 | * |
| 77 | * :: |
| 78 | * |
| 79 | * static __efi_runtime compute_my_table(void); |
| 80 | */ |
| 81 | #define __efi_runtime __section(".text.efi_runtime") |
| 82 | |
| 83 | /* |
| 84 | * Call this with mmio_ptr as the _pointer_ to a pointer to an MMIO region |
| 85 | * to make it available at runtime |
| 86 | */ |
| 87 | efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len); |
| 88 | |
| 89 | /* |
| 90 | * Special case handler for error/abort that just tries to dtrt to get |
| 91 | * back to u-boot world |
| 92 | */ |
| 93 | void efi_restore_gd(void); |
| 94 | /* Call this to set the current device name */ |
| 95 | void efi_set_bootdev(const char *dev, const char *devnr, const char *path, |
| 96 | void *buffer, size_t buffer_size); |
| 97 | /* Called by networking code to memorize the dhcp ack package */ |
| 98 | void efi_net_set_dhcp_ack(void *pkt, int len); |
| 99 | /* Print information about all loaded images */ |
| 100 | void efi_print_image_infos(void *pc); |
| 101 | |
| 102 | /* Hook at initialization */ |
| 103 | efi_status_t efi_launch_capsules(void); |
| 104 | |
| 105 | #else /* CONFIG_IS_ENABLED(EFI_LOADER) */ |
| 106 | |
| 107 | /* Without CONFIG_EFI_LOADER we don't have a runtime section, stub it out */ |
| 108 | #define __efi_runtime_data |
| 109 | #define __efi_runtime_rodata |
| 110 | #define __efi_runtime |
| 111 | static inline efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len) |
| 112 | { |
| 113 | return EFI_SUCCESS; |
| 114 | } |
| 115 | |
| 116 | /* No loader configured, stub out EFI_ENTRY */ |
| 117 | static inline void efi_restore_gd(void) { } |
| 118 | static inline void efi_set_bootdev(const char *dev, const char *devnr, |
| 119 | const char *path, void *buffer, |
| 120 | size_t buffer_size) { } |
| 121 | static inline void efi_net_set_dhcp_ack(void *pkt, int len) { } |
| 122 | static inline void efi_print_image_infos(void *pc) { } |
| 123 | static inline efi_status_t efi_launch_capsules(void) |
| 124 | { |
| 125 | return EFI_SUCCESS; |
| 126 | } |
| 127 | |
| 128 | #endif /* CONFIG_IS_ENABLED(EFI_LOADER) */ |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 129 | |
Heinrich Schuchardt | 2f528c2 | 2018-06-28 12:45:32 +0200 | [diff] [blame] | 130 | /* Maximum number of configuration tables */ |
| 131 | #define EFI_MAX_CONFIGURATION_TABLES 16 |
| 132 | |
Heinrich Schuchardt | 79d7202 | 2018-09-20 21:58:23 +0200 | [diff] [blame] | 133 | /* GUID used by the root node */ |
| 134 | #define U_BOOT_GUID \ |
| 135 | EFI_GUID(0xe61d73b9, 0xa384, 0x4acc, \ |
| 136 | 0xae, 0xab, 0x82, 0xe8, 0x28, 0xf3, 0x62, 0x8b) |
AKASHI Takahiro | 659a626 | 2019-09-12 13:52:35 +0900 | [diff] [blame] | 137 | /* GUID used as host device on sandbox */ |
| 138 | #define U_BOOT_HOST_DEV_GUID \ |
| 139 | EFI_GUID(0xbbe4e671, 0x5773, 0x4ea1, \ |
| 140 | 0x9a, 0xab, 0x3a, 0x7d, 0xbf, 0x40, 0xc4, 0x82) |
Heinrich Schuchardt | c770aaa | 2020-05-20 22:39:35 +0200 | [diff] [blame] | 141 | /* GUID used as root for virtio devices */ |
| 142 | #define U_BOOT_VIRTIO_DEV_GUID \ |
| 143 | EFI_GUID(0x63293792, 0xadf5, 0x9325, \ |
| 144 | 0xb9, 0x9f, 0x4e, 0x0e, 0x45, 0x5c, 0x1b, 0x1e) |
Heinrich Schuchardt | 79d7202 | 2018-09-20 21:58:23 +0200 | [diff] [blame] | 145 | |
Masahisa Kojima | c5ff0a0 | 2022-09-12 17:33:50 +0900 | [diff] [blame] | 146 | /* GUID for the auto generated boot menu entry */ |
| 147 | #define EFICONFIG_AUTO_GENERATED_ENTRY_GUID \ |
| 148 | EFI_GUID(0x38c1acc1, 0x9fc0, 0x41f0, \ |
| 149 | 0xb9, 0x01, 0xfa, 0x74, 0xd6, 0xd6, 0xe4, 0xde) |
| 150 | |
Heinrich Schuchardt | 6fbb8ac | 2019-11-28 06:46:09 +0100 | [diff] [blame] | 151 | /* Use internal device tree when starting UEFI application */ |
Heinrich Schuchardt | 6246741 | 2019-12-08 01:07:01 +0100 | [diff] [blame] | 152 | #define EFI_FDT_USE_INTERNAL NULL |
Heinrich Schuchardt | 6fbb8ac | 2019-11-28 06:46:09 +0100 | [diff] [blame] | 153 | |
AKASHI Takahiro | 0b27575 | 2019-04-16 13:24:20 +0900 | [diff] [blame] | 154 | /* Root node */ |
| 155 | extern efi_handle_t efi_root; |
| 156 | |
Heinrich Schuchardt | de9bdc6 | 2020-03-19 18:21:58 +0000 | [diff] [blame] | 157 | /* Set to EFI_SUCCESS when initialized */ |
| 158 | extern efi_status_t efi_obj_list_initialized; |
| 159 | |
Heinrich Schuchardt | 628dbd7 | 2020-11-12 21:26:28 +0100 | [diff] [blame] | 160 | /* Flag used by the selftest to avoid detaching devices in ExitBootServices() */ |
| 161 | extern bool efi_st_keep_devices; |
| 162 | |
Heinrich Schuchardt | a993173 | 2020-03-19 15:16:31 +0100 | [diff] [blame] | 163 | /* EFI system partition */ |
| 164 | extern struct efi_system_partition { |
Simon Glass | fada3f9 | 2022-09-17 09:00:09 -0600 | [diff] [blame] | 165 | enum uclass_id uclass_id; |
Heinrich Schuchardt | a993173 | 2020-03-19 15:16:31 +0100 | [diff] [blame] | 166 | int devnum; |
| 167 | u8 part; |
| 168 | } efi_system_partition; |
| 169 | |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 170 | int __efi_entry_check(void); |
| 171 | int __efi_exit_check(void); |
Heinrich Schuchardt | 4d66489 | 2017-08-18 17:45:16 +0200 | [diff] [blame] | 172 | const char *__efi_nesting(void); |
Rob Clark | e7896c3 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 173 | const char *__efi_nesting_inc(void); |
| 174 | const char *__efi_nesting_dec(void); |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 175 | |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 176 | /* |
| 177 | * Enter the u-boot world from UEFI: |
| 178 | */ |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 179 | #define EFI_ENTRY(format, ...) do { \ |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 180 | assert(__efi_entry_check()); \ |
Rob Clark | e7896c3 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 181 | debug("%sEFI: Entry %s(" format ")\n", __efi_nesting_inc(), \ |
| 182 | __func__, ##__VA_ARGS__); \ |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 183 | } while(0) |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 184 | |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 185 | /* |
| 186 | * Exit the u-boot world back to UEFI: |
| 187 | */ |
Rob Clark | 84a19a0 | 2017-07-24 10:31:52 -0400 | [diff] [blame] | 188 | #define EFI_EXIT(ret) ({ \ |
xypron.glpk@gmx.de | 8f9dd92 | 2017-08-17 18:57:36 +0200 | [diff] [blame] | 189 | typeof(ret) _r = ret; \ |
Rob Clark | e7896c3 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 190 | debug("%sEFI: Exit: %s: %u\n", __efi_nesting_dec(), \ |
xypron.glpk@gmx.de | 8f9dd92 | 2017-08-17 18:57:36 +0200 | [diff] [blame] | 191 | __func__, (u32)((uintptr_t) _r & ~EFI_ERROR_MASK)); \ |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 192 | assert(__efi_exit_check()); \ |
| 193 | _r; \ |
Rob Clark | 84a19a0 | 2017-07-24 10:31:52 -0400 | [diff] [blame] | 194 | }) |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 195 | |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 196 | /* |
Heinrich Schuchardt | 91e5b8a | 2017-09-15 10:06:10 +0200 | [diff] [blame] | 197 | * Call non-void UEFI function from u-boot and retrieve return value: |
| 198 | */ |
| 199 | #define EFI_CALL(exp) ({ \ |
| 200 | debug("%sEFI: Call: %s\n", __efi_nesting_inc(), #exp); \ |
| 201 | assert(__efi_exit_check()); \ |
| 202 | typeof(exp) _r = exp; \ |
| 203 | assert(__efi_entry_check()); \ |
| 204 | debug("%sEFI: %lu returned by %s\n", __efi_nesting_dec(), \ |
| 205 | (unsigned long)((uintptr_t)_r & ~EFI_ERROR_MASK), #exp); \ |
| 206 | _r; \ |
| 207 | }) |
| 208 | |
| 209 | /* |
| 210 | * Call void UEFI function from u-boot: |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 211 | */ |
Heinrich Schuchardt | 91e5b8a | 2017-09-15 10:06:10 +0200 | [diff] [blame] | 212 | #define EFI_CALL_VOID(exp) do { \ |
Rob Clark | e7896c3 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 213 | debug("%sEFI: Call: %s\n", __efi_nesting_inc(), #exp); \ |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 214 | assert(__efi_exit_check()); \ |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 215 | exp; \ |
Rob Clark | 86789d5 | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 216 | assert(__efi_entry_check()); \ |
Rob Clark | e7896c3 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 217 | debug("%sEFI: Return From: %s\n", __efi_nesting_dec(), #exp); \ |
Rob Clark | 63ea77a | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 218 | } while(0) |
| 219 | |
Heinrich Schuchardt | 4d66489 | 2017-08-18 17:45:16 +0200 | [diff] [blame] | 220 | /* |
Heinrich Schuchardt | 3d2abc3 | 2018-01-11 08:16:01 +0100 | [diff] [blame] | 221 | * Write an indented message with EFI prefix |
Heinrich Schuchardt | 4d66489 | 2017-08-18 17:45:16 +0200 | [diff] [blame] | 222 | */ |
Heinrich Schuchardt | 3d2abc3 | 2018-01-11 08:16:01 +0100 | [diff] [blame] | 223 | #define EFI_PRINT(format, ...) ({ \ |
| 224 | debug("%sEFI: " format, __efi_nesting(), \ |
| 225 | ##__VA_ARGS__); \ |
Heinrich Schuchardt | 4d66489 | 2017-08-18 17:45:16 +0200 | [diff] [blame] | 226 | }) |
| 227 | |
Alexander Graf | 59254d6 | 2018-04-23 07:59:47 +0200 | [diff] [blame] | 228 | #ifdef CONFIG_SYS_CACHELINE_SIZE |
| 229 | #define EFI_CACHELINE_SIZE CONFIG_SYS_CACHELINE_SIZE |
| 230 | #else |
| 231 | /* Just use the greatest cache flush alignment requirement I'm aware of */ |
| 232 | #define EFI_CACHELINE_SIZE 128 |
| 233 | #endif |
| 234 | |
Masahisa Kojima | c5ff0a0 | 2022-09-12 17:33:50 +0900 | [diff] [blame] | 235 | /* max bootmenu title size for volume selection */ |
| 236 | #define BOOTMENU_DEVICE_NAME_MAX 16 |
| 237 | |
Heinrich Schuchardt | 0f233c4 | 2018-07-02 12:53:55 +0200 | [diff] [blame] | 238 | /* Key identifying current memory map */ |
| 239 | extern efi_uintn_t efi_memory_map_key; |
| 240 | |
Alexander Graf | 0bd425a | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 241 | extern struct efi_runtime_services efi_runtime_services; |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 242 | extern struct efi_system_table systab; |
| 243 | |
Heinrich Schuchardt | 580c13b | 2017-10-26 19:25:59 +0200 | [diff] [blame] | 244 | extern struct efi_simple_text_output_protocol efi_con_out; |
Heinrich Schuchardt | 3dabffd | 2018-09-08 10:20:10 +0200 | [diff] [blame] | 245 | extern struct efi_simple_text_input_protocol efi_con_in; |
Heinrich Schuchardt | 580c13b | 2017-10-26 19:25:59 +0200 | [diff] [blame] | 246 | extern struct efi_console_control_protocol efi_console_control; |
xypron.glpk@gmx.de | 3c042b2 | 2017-07-11 22:06:25 +0200 | [diff] [blame] | 247 | extern const struct efi_device_path_to_text_protocol efi_device_path_to_text; |
Leif Lindholm | b6e6fdc | 2018-03-09 17:43:21 +0100 | [diff] [blame] | 248 | /* implementation of the EFI_DEVICE_PATH_UTILITIES_PROTOCOL */ |
| 249 | extern const struct efi_device_path_utilities_protocol |
| 250 | efi_device_path_utilities; |
Heinrich Schuchardt | 18ed8cf | 2019-05-16 18:19:00 +0200 | [diff] [blame] | 251 | /* current version of the EFI_UNICODE_COLLATION_PROTOCOL */ |
Heinrich Schuchardt | e59072a | 2018-09-04 19:34:58 +0200 | [diff] [blame] | 252 | extern const struct efi_unicode_collation_protocol |
Heinrich Schuchardt | b325884 | 2019-05-16 07:52:58 +0200 | [diff] [blame] | 253 | efi_unicode_collation_protocol2; |
AKASHI Takahiro | ca8aa71 | 2019-01-21 12:13:00 +0900 | [diff] [blame] | 254 | extern const struct efi_hii_config_routing_protocol efi_hii_config_routing; |
| 255 | extern const struct efi_hii_config_access_protocol efi_hii_config_access; |
Leif Lindholm | 5aab1b8 | 2019-01-21 12:12:57 +0900 | [diff] [blame] | 256 | extern const struct efi_hii_database_protocol efi_hii_database; |
| 257 | extern const struct efi_hii_string_protocol efi_hii_string; |
Alexander Graf | 4aacacc | 2016-03-04 01:10:00 +0100 | [diff] [blame] | 258 | |
Rob Clark | 85dd721 | 2017-09-13 18:05:30 -0400 | [diff] [blame] | 259 | uint16_t *efi_dp_str(struct efi_device_path *dp); |
| 260 | |
Masahisa Kojima | c5ff0a0 | 2022-09-12 17:33:50 +0900 | [diff] [blame] | 261 | /* GUID for the auto generated boot menu entry */ |
| 262 | extern const efi_guid_t efi_guid_bootmenu_auto_generated; |
| 263 | |
Heinrich Schuchardt | 79d7202 | 2018-09-20 21:58:23 +0200 | [diff] [blame] | 264 | /* GUID of the U-Boot root node */ |
| 265 | extern const efi_guid_t efi_u_boot_guid; |
AKASHI Takahiro | 659a626 | 2019-09-12 13:52:35 +0900 | [diff] [blame] | 266 | #ifdef CONFIG_SANDBOX |
| 267 | /* GUID of U-Boot host device on sandbox */ |
| 268 | extern const efi_guid_t efi_guid_host_dev; |
| 269 | #endif |
Heinrich Schuchardt | 405afb5 | 2018-01-19 20:24:45 +0100 | [diff] [blame] | 270 | /* GUID of the EFI_BLOCK_IO_PROTOCOL */ |
| 271 | extern const efi_guid_t efi_block_io_guid; |
Rob Clark | c84c110 | 2017-09-13 18:05:38 -0400 | [diff] [blame] | 272 | extern const efi_guid_t efi_global_variable_guid; |
Alexander Graf | 4aacacc | 2016-03-04 01:10:00 +0100 | [diff] [blame] | 273 | extern const efi_guid_t efi_guid_console_control; |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 274 | extern const efi_guid_t efi_guid_device_path; |
Heinrich Schuchardt | e840b9c | 2022-03-19 07:04:03 +0100 | [diff] [blame] | 275 | /* GUID of the EFI system partition */ |
| 276 | extern const efi_guid_t efi_system_partition_guid; |
Heinrich Schuchardt | 760255f | 2018-01-11 08:16:02 +0100 | [diff] [blame] | 277 | /* GUID of the EFI_DRIVER_BINDING_PROTOCOL */ |
| 278 | extern const efi_guid_t efi_guid_driver_binding_protocol; |
Heinrich Schuchardt | 672d99e | 2018-02-18 15:17:51 +0100 | [diff] [blame] | 279 | /* event group ExitBootServices() invoked */ |
| 280 | extern const efi_guid_t efi_guid_event_group_exit_boot_services; |
| 281 | /* event group SetVirtualAddressMap() invoked */ |
| 282 | extern const efi_guid_t efi_guid_event_group_virtual_address_change; |
| 283 | /* event group memory map changed */ |
| 284 | extern const efi_guid_t efi_guid_event_group_memory_map_change; |
| 285 | /* event group boot manager about to boot */ |
| 286 | extern const efi_guid_t efi_guid_event_group_ready_to_boot; |
| 287 | /* event group ResetSystem() invoked (before ExitBootServices) */ |
| 288 | extern const efi_guid_t efi_guid_event_group_reset_system; |
Heinrich Schuchardt | 44ab21b | 2018-03-03 15:29:03 +0100 | [diff] [blame] | 289 | /* GUID of the device tree table */ |
| 290 | extern const efi_guid_t efi_guid_fdt; |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 291 | extern const efi_guid_t efi_guid_loaded_image; |
AKASHI Takahiro | bbe13da | 2019-03-27 13:40:32 +0900 | [diff] [blame] | 292 | extern const efi_guid_t efi_guid_loaded_image_device_path; |
xypron.glpk@gmx.de | 3c042b2 | 2017-07-11 22:06:25 +0200 | [diff] [blame] | 293 | extern const efi_guid_t efi_guid_device_path_to_text_protocol; |
Rob Clark | 5314203 | 2017-09-13 18:05:34 -0400 | [diff] [blame] | 294 | extern const efi_guid_t efi_simple_file_system_protocol_guid; |
| 295 | extern const efi_guid_t efi_file_info_guid; |
Heinrich Schuchardt | 37fb4b9 | 2018-04-04 15:42:11 +0200 | [diff] [blame] | 296 | /* GUID for file system information */ |
| 297 | extern const efi_guid_t efi_file_system_info_guid; |
Leif Lindholm | b6e6fdc | 2018-03-09 17:43:21 +0100 | [diff] [blame] | 298 | extern const efi_guid_t efi_guid_device_path_utilities_protocol; |
Heinrich Schuchardt | 18ed8cf | 2019-05-16 18:19:00 +0200 | [diff] [blame] | 299 | /* GUID of the deprecated Unicode collation protocol */ |
| 300 | extern const efi_guid_t efi_guid_unicode_collation_protocol; |
Heinrich Schuchardt | 485956d | 2020-12-04 03:33:41 +0100 | [diff] [blame] | 301 | /* GUIDs of the Load File and Load File2 protocol */ |
| 302 | extern const efi_guid_t efi_guid_load_file_protocol; |
| 303 | extern const efi_guid_t efi_guid_load_file2_protocol; |
Heinrich Schuchardt | e59072a | 2018-09-04 19:34:58 +0200 | [diff] [blame] | 304 | /* GUID of the Unicode collation protocol */ |
Heinrich Schuchardt | b325884 | 2019-05-16 07:52:58 +0200 | [diff] [blame] | 305 | extern const efi_guid_t efi_guid_unicode_collation_protocol2; |
AKASHI Takahiro | ca8aa71 | 2019-01-21 12:13:00 +0900 | [diff] [blame] | 306 | extern const efi_guid_t efi_guid_hii_config_routing_protocol; |
| 307 | extern const efi_guid_t efi_guid_hii_config_access_protocol; |
Leif Lindholm | 5aab1b8 | 2019-01-21 12:12:57 +0900 | [diff] [blame] | 308 | extern const efi_guid_t efi_guid_hii_database_protocol; |
| 309 | extern const efi_guid_t efi_guid_hii_string_protocol; |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 310 | /* GUIDs for authentication */ |
| 311 | extern const efi_guid_t efi_guid_image_security_database; |
| 312 | extern const efi_guid_t efi_guid_sha256; |
| 313 | extern const efi_guid_t efi_guid_cert_x509; |
| 314 | extern const efi_guid_t efi_guid_cert_x509_sha256; |
Ilias Apalodimas | 34db9b1 | 2022-05-06 15:36:00 +0300 | [diff] [blame] | 315 | extern const efi_guid_t efi_guid_cert_x509_sha384; |
| 316 | extern const efi_guid_t efi_guid_cert_x509_sha512; |
AKASHI Takahiro | b0f49ee | 2020-04-14 11:51:41 +0900 | [diff] [blame] | 317 | extern const efi_guid_t efi_guid_cert_type_pkcs7; |
Alexander Graf | 4e0c1c1 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 318 | |
Sughosh Ganu | 693a4f4 | 2019-12-29 00:01:06 +0530 | [diff] [blame] | 319 | /* GUID of RNG protocol */ |
| 320 | extern const efi_guid_t efi_guid_rng_protocol; |
AKASHI Takahiro | 473d9b3 | 2020-11-17 09:27:55 +0900 | [diff] [blame] | 321 | /* GUID of capsule update result */ |
| 322 | extern const efi_guid_t efi_guid_capsule_report; |
AKASHI Takahiro | 0d96378 | 2020-11-30 18:12:11 +0900 | [diff] [blame] | 323 | /* GUID of firmware management protocol */ |
| 324 | extern const efi_guid_t efi_guid_firmware_management_protocol; |
Jose Marinho | ebb61ee | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 325 | /* GUID for the ESRT */ |
| 326 | extern const efi_guid_t efi_esrt_guid; |
Masahisa Kojima | cd1fe7d | 2021-10-26 17:27:24 +0900 | [diff] [blame] | 327 | /* GUID of the SMBIOS table */ |
| 328 | extern const efi_guid_t smbios_guid; |
Masahisa Kojima | c5ff0a0 | 2022-09-12 17:33:50 +0900 | [diff] [blame] | 329 | /*GUID of console */ |
| 330 | extern const efi_guid_t efi_guid_text_input_protocol; |
Sughosh Ganu | 693a4f4 | 2019-12-29 00:01:06 +0530 | [diff] [blame] | 331 | |
Marek Behún | 6950450 | 2021-05-20 13:23:56 +0200 | [diff] [blame] | 332 | extern char __efi_runtime_start[], __efi_runtime_stop[]; |
| 333 | extern char __efi_runtime_rel_start[], __efi_runtime_rel_stop[]; |
Alexander Graf | 0bd425a | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 334 | |
Heinrich Schuchardt | 2e4b41f | 2019-05-21 17:51:35 +0200 | [diff] [blame] | 335 | /** |
| 336 | * struct efi_open_protocol_info_item - open protocol info item |
| 337 | * |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 338 | * When a protocol is opened a open protocol info entry is created. |
| 339 | * These are maintained in a list. |
Heinrich Schuchardt | 2e4b41f | 2019-05-21 17:51:35 +0200 | [diff] [blame] | 340 | * |
| 341 | * @link: link to the list of open protocol info entries of a protocol |
| 342 | * @info: information about the opening of a protocol |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 343 | */ |
| 344 | struct efi_open_protocol_info_item { |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 345 | struct list_head link; |
| 346 | struct efi_open_protocol_info_entry info; |
| 347 | }; |
| 348 | |
Heinrich Schuchardt | 2e4b41f | 2019-05-21 17:51:35 +0200 | [diff] [blame] | 349 | /** |
| 350 | * struct efi_handler - single protocol interface of a handle |
| 351 | * |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 352 | * When the UEFI payload wants to open a protocol on an object to get its |
| 353 | * interface (usually a struct with callback functions), this struct maps the |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 354 | * protocol GUID to the respective protocol interface |
Heinrich Schuchardt | 2e4b41f | 2019-05-21 17:51:35 +0200 | [diff] [blame] | 355 | * |
| 356 | * @link: link to the list of protocols of a handle |
| 357 | * @guid: GUID of the protocol |
| 358 | * @protocol_interface: protocol interface |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 359 | * @open_infos: link to the list of open protocol info items |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 360 | */ |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 361 | struct efi_handler { |
Heinrich Schuchardt | 99ce206 | 2017-11-26 14:05:17 +0100 | [diff] [blame] | 362 | struct list_head link; |
Heinrich Schuchardt | 2a22db9 | 2022-03-09 19:56:23 +0100 | [diff] [blame] | 363 | const efi_guid_t guid; |
xypron.glpk@gmx.de | c35c924 | 2017-07-11 22:06:14 +0200 | [diff] [blame] | 364 | void *protocol_interface; |
Heinrich Schuchardt | a277d3a | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 365 | struct list_head open_infos; |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 366 | }; |
| 367 | |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 368 | /** |
Heinrich Schuchardt | b27ced4 | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 369 | * enum efi_object_type - type of EFI object |
| 370 | * |
| 371 | * In UnloadImage we must be able to identify if the handle relates to a |
| 372 | * started image. |
| 373 | */ |
| 374 | enum efi_object_type { |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 375 | /** @EFI_OBJECT_TYPE_UNDEFINED: undefined image type */ |
Heinrich Schuchardt | b27ced4 | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 376 | EFI_OBJECT_TYPE_UNDEFINED = 0, |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 377 | /** @EFI_OBJECT_TYPE_U_BOOT_FIRMWARE: U-Boot firmware */ |
Heinrich Schuchardt | 2e0a790 | 2019-05-05 16:55:06 +0200 | [diff] [blame] | 378 | EFI_OBJECT_TYPE_U_BOOT_FIRMWARE, |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 379 | /** @EFI_OBJECT_TYPE_LOADED_IMAGE: loaded image (not started) */ |
Heinrich Schuchardt | b27ced4 | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 380 | EFI_OBJECT_TYPE_LOADED_IMAGE, |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 381 | /** @EFI_OBJECT_TYPE_STARTED_IMAGE: started image */ |
Heinrich Schuchardt | b27ced4 | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 382 | EFI_OBJECT_TYPE_STARTED_IMAGE, |
| 383 | }; |
| 384 | |
| 385 | /** |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 386 | * struct efi_object - dereferenced EFI handle |
| 387 | * |
| 388 | * @link: pointers to put the handle into a linked list |
| 389 | * @protocols: linked list with the protocol interfaces installed on this |
| 390 | * handle |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 391 | * @type: image type if the handle relates to an image |
Masahisa Kojima | c961108 | 2022-07-22 11:39:10 +0900 | [diff] [blame] | 392 | * @dev: pointer to the DM device which is associated with this EFI handle |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 393 | * |
| 394 | * UEFI offers a flexible and expandable object model. The objects in the UEFI |
| 395 | * API are devices, drivers, and loaded images. struct efi_object is our storage |
| 396 | * structure for these objects. |
| 397 | * |
| 398 | * When including this structure into a larger structure always put it first so |
| 399 | * that when deleting a handle the whole encompassing structure can be freed. |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 400 | * |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 401 | * A pointer to this structure is referred to as a handle. Typedef efi_handle_t |
| 402 | * has been created for such pointers. |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 403 | */ |
| 404 | struct efi_object { |
| 405 | /* Every UEFI object is part of a global object list */ |
| 406 | struct list_head link; |
Heinrich Schuchardt | 99ce206 | 2017-11-26 14:05:17 +0100 | [diff] [blame] | 407 | /* The list of protocols */ |
| 408 | struct list_head protocols; |
Heinrich Schuchardt | b27ced4 | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 409 | enum efi_object_type type; |
Masahisa Kojima | c961108 | 2022-07-22 11:39:10 +0900 | [diff] [blame] | 410 | struct udevice *dev; |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 411 | }; |
| 412 | |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 413 | enum efi_image_auth_status { |
| 414 | EFI_IMAGE_AUTH_FAILED = 0, |
| 415 | EFI_IMAGE_AUTH_PASSED, |
| 416 | }; |
| 417 | |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 418 | /** |
Heinrich Schuchardt | 3c3a735 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 419 | * struct efi_loaded_image_obj - handle of a loaded image |
Heinrich Schuchardt | 7292872 | 2018-09-26 05:27:56 +0200 | [diff] [blame] | 420 | * |
| 421 | * @header: EFI object header |
Heinrich Schuchardt | 3d44512 | 2019-04-30 17:57:30 +0200 | [diff] [blame] | 422 | * @exit_status: exit status passed to Exit() |
| 423 | * @exit_data_size: exit data size passed to Exit() |
| 424 | * @exit_data: exit data passed to Exit() |
Heinrich Schuchardt | 93b40d6 | 2020-12-28 22:42:51 +0100 | [diff] [blame] | 425 | * @exit_jmp: long jump buffer for returning from started image |
Heinrich Schuchardt | 7292872 | 2018-09-26 05:27:56 +0200 | [diff] [blame] | 426 | * @entry: entry address of the relocated image |
Heinrich Schuchardt | 93b40d6 | 2020-12-28 22:42:51 +0100 | [diff] [blame] | 427 | * @image_type: indicates if the image is an applicition or a driver |
| 428 | * @auth_status: indicates if the image is authenticated |
Heinrich Schuchardt | 3c3a735 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 429 | */ |
| 430 | struct efi_loaded_image_obj { |
Heinrich Schuchardt | 7292872 | 2018-09-26 05:27:56 +0200 | [diff] [blame] | 431 | struct efi_object header; |
Heinrich Schuchardt | 026c7ec | 2020-12-28 23:24:40 +0100 | [diff] [blame] | 432 | efi_status_t *exit_status; |
Heinrich Schuchardt | 3d44512 | 2019-04-30 17:57:30 +0200 | [diff] [blame] | 433 | efi_uintn_t *exit_data_size; |
| 434 | u16 **exit_data; |
Heinrich Schuchardt | 026c7ec | 2020-12-28 23:24:40 +0100 | [diff] [blame] | 435 | struct jmp_buf_data *exit_jmp; |
Heinrich Schuchardt | 3c3a735 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 436 | EFIAPI efi_status_t (*entry)(efi_handle_t image_handle, |
| 437 | struct efi_system_table *st); |
Heinrich Schuchardt | 3758752 | 2019-05-01 20:07:04 +0200 | [diff] [blame] | 438 | u16 image_type; |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 439 | enum efi_image_auth_status auth_status; |
Heinrich Schuchardt | 3c3a735 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 440 | }; |
| 441 | |
| 442 | /** |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 443 | * struct efi_event |
| 444 | * |
Heinrich Schuchardt | 370c7a8 | 2018-02-18 15:17:50 +0100 | [diff] [blame] | 445 | * @link: Link to list of all events |
Heinrich Schuchardt | 35c0cf6 | 2019-06-05 21:00:39 +0200 | [diff] [blame] | 446 | * @queue_link: Link to the list of queued events |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 447 | * @type: Type of event, see efi_create_event |
| 448 | * @notify_tpl: Task priority level of notifications |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 449 | * @notify_function: Function to call when the event is triggered |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 450 | * @notify_context: Data to be passed to the notify function |
Heinrich Schuchardt | bf7f169 | 2018-02-18 15:17:52 +0100 | [diff] [blame] | 451 | * @group: Event group |
Heinrich Schuchardt | 370c7a8 | 2018-02-18 15:17:50 +0100 | [diff] [blame] | 452 | * @trigger_time: Period of the timer |
| 453 | * @trigger_next: Next time to trigger the timer |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 454 | * @trigger_type: Type of timer, see efi_set_timer |
Heinrich Schuchardt | 370c7a8 | 2018-02-18 15:17:50 +0100 | [diff] [blame] | 455 | * @is_signaled: The event occurred. The event is in the signaled state. |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 456 | */ |
| 457 | struct efi_event { |
Heinrich Schuchardt | 370c7a8 | 2018-02-18 15:17:50 +0100 | [diff] [blame] | 458 | struct list_head link; |
Heinrich Schuchardt | 35c0cf6 | 2019-06-05 21:00:39 +0200 | [diff] [blame] | 459 | struct list_head queue_link; |
xypron.glpk@gmx.de | 3ecc6bd | 2017-07-19 19:22:34 +0200 | [diff] [blame] | 460 | uint32_t type; |
Heinrich Schuchardt | f8d4ec3 | 2017-11-06 21:17:47 +0100 | [diff] [blame] | 461 | efi_uintn_t notify_tpl; |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 462 | void (EFIAPI *notify_function)(struct efi_event *event, void *context); |
| 463 | void *notify_context; |
Heinrich Schuchardt | bf7f169 | 2018-02-18 15:17:52 +0100 | [diff] [blame] | 464 | const efi_guid_t *group; |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 465 | u64 trigger_next; |
| 466 | u64 trigger_time; |
xypron.glpk@gmx.de | 3ecc6bd | 2017-07-19 19:22:34 +0200 | [diff] [blame] | 467 | enum efi_timer_delay trigger_type; |
Heinrich Schuchardt | 1bbee39 | 2017-10-04 15:03:24 +0200 | [diff] [blame] | 468 | bool is_signaled; |
xypron.glpk@gmx.de | 3070823 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 469 | }; |
| 470 | |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 471 | /* This list contains all UEFI objects we know of */ |
| 472 | extern struct list_head efi_obj_list; |
Heinrich Schuchardt | bf7f169 | 2018-02-18 15:17:52 +0100 | [diff] [blame] | 473 | /* List of all events */ |
| 474 | extern struct list_head efi_events; |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 475 | |
Heinrich Schuchardt | 6eec42d | 2019-05-04 17:27:54 +0200 | [diff] [blame] | 476 | /** |
Heinrich Schuchardt | d375e75 | 2019-05-21 18:19:01 +0200 | [diff] [blame] | 477 | * struct efi_protocol_notification - handle for notified protocol |
| 478 | * |
| 479 | * When a protocol interface is installed for which an event was registered with |
| 480 | * the RegisterProtocolNotify() service this structure is used to hold the |
| 481 | * handle on which the protocol interface was installed. |
| 482 | * |
| 483 | * @link: link to list of all handles notified for this event |
| 484 | * @handle: handle on which the notified protocol interface was installed |
| 485 | */ |
| 486 | struct efi_protocol_notification { |
| 487 | struct list_head link; |
| 488 | efi_handle_t handle; |
| 489 | }; |
| 490 | |
| 491 | /** |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 492 | * struct efi_register_notify_event - event registered by |
| 493 | * RegisterProtocolNotify() |
Heinrich Schuchardt | 6eec42d | 2019-05-04 17:27:54 +0200 | [diff] [blame] | 494 | * |
| 495 | * The address of this structure serves as registration value. |
| 496 | * |
Heinrich Schuchardt | d375e75 | 2019-05-21 18:19:01 +0200 | [diff] [blame] | 497 | * @link: link to list of all registered events |
| 498 | * @event: registered event. The same event may registered for multiple |
| 499 | * GUIDs. |
| 500 | * @protocol: protocol for which the event is registered |
| 501 | * @handles: linked list of all handles on which the notified protocol was |
| 502 | * installed |
Heinrich Schuchardt | 6eec42d | 2019-05-04 17:27:54 +0200 | [diff] [blame] | 503 | */ |
| 504 | struct efi_register_notify_event { |
| 505 | struct list_head link; |
| 506 | struct efi_event *event; |
| 507 | efi_guid_t protocol; |
Heinrich Schuchardt | d375e75 | 2019-05-21 18:19:01 +0200 | [diff] [blame] | 508 | struct list_head handles; |
Heinrich Schuchardt | 6eec42d | 2019-05-04 17:27:54 +0200 | [diff] [blame] | 509 | }; |
| 510 | |
| 511 | /* List of all events registered by RegisterProtocolNotify() */ |
| 512 | extern struct list_head efi_register_notify_events; |
| 513 | |
AKASHI Takahiro | a36dc25 | 2022-04-19 10:05:11 +0900 | [diff] [blame] | 514 | /* called at pre-initialization */ |
| 515 | int efi_init_early(void); |
AKASHI Takahiro | 7e0badb | 2018-12-30 15:16:55 +0100 | [diff] [blame] | 516 | /* Initialize efi execution environment */ |
| 517 | efi_status_t efi_init_obj_list(void); |
Heinrich Schuchardt | 761908e | 2022-06-14 08:02:03 +0200 | [diff] [blame] | 518 | /* Set up console modes */ |
| 519 | void efi_setup_console_size(void); |
Heinrich Schuchardt | 6246741 | 2019-12-08 01:07:01 +0100 | [diff] [blame] | 520 | /* Install device tree */ |
| 521 | efi_status_t efi_install_fdt(void *fdt); |
Heinrich Schuchardt | ffb9059 | 2019-12-07 20:51:06 +0100 | [diff] [blame] | 522 | /* Run loaded UEFI image */ |
| 523 | efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size); |
Heinrich Schuchardt | cf3b118 | 2019-06-20 13:52:16 +0200 | [diff] [blame] | 524 | /* Initialize variable services */ |
| 525 | efi_status_t efi_init_variables(void); |
Heinrich Schuchardt | 2ac6258 | 2019-06-20 15:25:48 +0200 | [diff] [blame] | 526 | /* Notify ExitBootServices() is called */ |
| 527 | void efi_variables_boot_exit_notify(void); |
Masahisa Kojima | 1ac19bb | 2021-08-13 16:12:41 +0900 | [diff] [blame] | 528 | efi_status_t efi_tcg2_notify_exit_boot_services_failed(void); |
Masahisa Kojima | 8173cd4 | 2021-08-13 16:12:40 +0900 | [diff] [blame] | 529 | /* Measure efi application invocation */ |
Masahisa Kojima | 6460c3e | 2021-10-26 17:27:25 +0900 | [diff] [blame] | 530 | efi_status_t efi_tcg2_measure_efi_app_invocation(struct efi_loaded_image_obj *handle); |
Masahisa Kojima | 8173cd4 | 2021-08-13 16:12:40 +0900 | [diff] [blame] | 531 | /* Measure efi application exit */ |
| 532 | efi_status_t efi_tcg2_measure_efi_app_exit(void); |
Heinrich Schuchardt | 79d7202 | 2018-09-20 21:58:23 +0200 | [diff] [blame] | 533 | /* Called by bootefi to initialize root node */ |
| 534 | efi_status_t efi_root_node_register(void); |
Heinrich Schuchardt | 15070db | 2018-06-28 12:45:31 +0200 | [diff] [blame] | 535 | /* Called by bootefi to initialize runtime */ |
| 536 | efi_status_t efi_initialize_system_table(void); |
Heinrich Schuchardt | 1943dbb | 2019-07-05 17:42:16 +0200 | [diff] [blame] | 537 | /* efi_runtime_detach() - detach unimplemented runtime functions */ |
| 538 | void efi_runtime_detach(void); |
Heinrich Schuchardt | 699b7c6 | 2020-03-24 18:05:22 +0100 | [diff] [blame] | 539 | /* efi_convert_pointer() - convert pointer to virtual address */ |
| 540 | efi_status_t EFIAPI efi_convert_pointer(efi_uintn_t debug_disposition, |
| 541 | void **address); |
Heinrich Schuchardt | 2c1e224 | 2020-12-13 10:30:24 +0100 | [diff] [blame] | 542 | /* Carve out DT reserved memory ranges */ |
| 543 | void efi_carve_out_dt_rsv(void *fdt); |
Ilias Apalodimas | e4e5660 | 2022-01-03 14:07:37 +0200 | [diff] [blame] | 544 | /* Purge unused kaslr-seed */ |
| 545 | void efi_try_purge_kaslr_seed(void *fdt); |
xypron.glpk@gmx.de | 54c7a8e | 2017-07-18 20:17:22 +0200 | [diff] [blame] | 546 | /* Called by bootefi to make console interface available */ |
Heinrich Schuchardt | a92e9ab | 2018-10-02 06:08:26 +0200 | [diff] [blame] | 547 | efi_status_t efi_console_register(void); |
Heinrich Schuchardt | a02228f | 2022-08-31 16:37:35 +0200 | [diff] [blame] | 548 | /* Called by efi_init_obj_list() to proble all block devices */ |
| 549 | efi_status_t efi_disks_register(void); |
Heinrich Schuchardt | c63f68f | 2020-09-25 12:50:19 +0200 | [diff] [blame] | 550 | /* Called by efi_init_obj_list() to install EFI_RNG_PROTOCOL */ |
| 551 | efi_status_t efi_rng_register(void); |
Ilias Apalodimas | 590fef6 | 2020-11-11 11:18:11 +0200 | [diff] [blame] | 552 | /* Called by efi_init_obj_list() to install EFI_TCG2_PROTOCOL */ |
| 553 | efi_status_t efi_tcg2_register(void); |
Sunil V L | 279d1c8 | 2022-01-28 20:48:44 +0530 | [diff] [blame] | 554 | /* Called by efi_init_obj_list() to install RISCV_EFI_BOOT_PROTOCOL */ |
| 555 | efi_status_t efi_riscv_register(void); |
Masahisa Kojima | 0fd4379 | 2021-12-07 14:15:31 +0900 | [diff] [blame] | 556 | /* Called by efi_init_obj_list() to do initial measurement */ |
| 557 | efi_status_t efi_tcg2_do_initial_measurement(void); |
Masahisa Kojima | 70be5a6 | 2021-05-26 12:09:58 +0900 | [diff] [blame] | 558 | /* measure the pe-coff image, extend PCR and add Event Log */ |
| 559 | efi_status_t tcg2_measure_pe_image(void *efi, u64 efi_size, |
| 560 | struct efi_loaded_image_obj *handle, |
| 561 | struct efi_loaded_image *loaded_image_info); |
Heinrich Schuchardt | 6f3de6b | 2018-01-19 20:24:47 +0100 | [diff] [blame] | 562 | /* Create handles and protocols for the partitions of a block device */ |
| 563 | int efi_disk_create_partitions(efi_handle_t parent, struct blk_desc *desc, |
Simon Glass | fada3f9 | 2022-09-17 09:00:09 -0600 | [diff] [blame] | 564 | const char *uclass_idname, int diskid, |
Heinrich Schuchardt | 6f3de6b | 2018-01-19 20:24:47 +0100 | [diff] [blame] | 565 | const char *pdevname); |
Alexander Graf | d65783d | 2016-03-15 18:38:21 +0100 | [diff] [blame] | 566 | /* Called by bootefi to make GOP (graphical) interface available */ |
Heinrich Schuchardt | b91c084 | 2018-03-03 15:28:55 +0100 | [diff] [blame] | 567 | efi_status_t efi_gop_register(void); |
Alexander Graf | 94c4b99 | 2016-05-06 21:01:01 +0200 | [diff] [blame] | 568 | /* Called by bootefi to make the network interface available */ |
Heinrich Schuchardt | 6f5c73f | 2018-03-03 15:28:56 +0100 | [diff] [blame] | 569 | efi_status_t efi_net_register(void); |
Heinrich Schuchardt | 18081d4 | 2017-10-18 18:13:04 +0200 | [diff] [blame] | 570 | /* Called by bootefi to make the watchdog available */ |
Heinrich Schuchardt | f2704cc | 2018-03-03 15:28:57 +0100 | [diff] [blame] | 571 | efi_status_t efi_watchdog_register(void); |
Ilias Apalodimas | 3510ba7 | 2020-02-21 09:55:45 +0200 | [diff] [blame] | 572 | efi_status_t efi_initrd_register(void); |
Ilias Apalodimas | b307e3d | 2021-03-17 21:55:00 +0200 | [diff] [blame] | 573 | void efi_initrd_deregister(void); |
Alexander Graf | 66f96e1 | 2016-08-19 01:23:29 +0200 | [diff] [blame] | 574 | /* Called by bootefi to make SMBIOS tables available */ |
Simon Glass | 2e2858f | 2018-05-16 09:42:19 -0600 | [diff] [blame] | 575 | /** |
Bin Meng | 2cfbdae | 2018-06-27 20:38:03 -0700 | [diff] [blame] | 576 | * efi_acpi_register() - write out ACPI tables |
| 577 | * |
| 578 | * Called by bootefi to make ACPI tables available |
| 579 | * |
Heinrich Schuchardt | 47b4c02 | 2022-01-19 18:05:50 +0100 | [diff] [blame] | 580 | * Return: 0 if OK, -ENOMEM if no memory is available for the tables |
Bin Meng | 2cfbdae | 2018-06-27 20:38:03 -0700 | [diff] [blame] | 581 | */ |
| 582 | efi_status_t efi_acpi_register(void); |
| 583 | /** |
Simon Glass | 2e2858f | 2018-05-16 09:42:19 -0600 | [diff] [blame] | 584 | * efi_smbios_register() - write out SMBIOS tables |
| 585 | * |
| 586 | * Called by bootefi to make SMBIOS tables available |
| 587 | * |
Heinrich Schuchardt | 47b4c02 | 2022-01-19 18:05:50 +0100 | [diff] [blame] | 588 | * Return: 0 if OK, -ENOMEM if no memory is available for the tables |
Simon Glass | 2e2858f | 2018-05-16 09:42:19 -0600 | [diff] [blame] | 589 | */ |
Heinrich Schuchardt | 7a369c4 | 2018-03-03 15:28:54 +0100 | [diff] [blame] | 590 | efi_status_t efi_smbios_register(void); |
Alexander Graf | 94c4b99 | 2016-05-06 21:01:01 +0200 | [diff] [blame] | 591 | |
Rob Clark | 5314203 | 2017-09-13 18:05:34 -0400 | [diff] [blame] | 592 | struct efi_simple_file_system_protocol * |
| 593 | efi_fs_from_path(struct efi_device_path *fp); |
| 594 | |
Heinrich Schuchardt | 18081d4 | 2017-10-18 18:13:04 +0200 | [diff] [blame] | 595 | /* Called by efi_set_watchdog_timer to reset the timer */ |
| 596 | efi_status_t efi_set_watchdog(unsigned long timeout); |
Alexander Graf | 94c4b99 | 2016-05-06 21:01:01 +0200 | [diff] [blame] | 597 | |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 598 | /* Called from places to check whether a timer expired */ |
| 599 | void efi_timer_check(void); |
Heinrich Schuchardt | ad6e0f7 | 2021-01-12 12:40:32 +0100 | [diff] [blame] | 600 | /* Check if a buffer contains a PE-COFF image */ |
| 601 | efi_status_t efi_check_pe(void *buffer, size_t size, void **nt_header); |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 602 | /* PE loader implementation */ |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 603 | efi_status_t efi_load_pe(struct efi_loaded_image_obj *handle, |
| 604 | void *efi, size_t efi_size, |
Heinrich Schuchardt | 408fbcc | 2018-12-26 12:49:09 +0100 | [diff] [blame] | 605 | struct efi_loaded_image *loaded_image_info); |
Alexander Graf | c15d921 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 606 | /* Called once to store the pristine gd pointer */ |
| 607 | void efi_save_gd(void); |
Alexander Graf | 0bd425a | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 608 | /* Call this to relocate the runtime section to an address space */ |
| 609 | void efi_runtime_relocate(ulong offset, struct efi_mem_desc *map); |
Rui Miguel Silva | 433f15a | 2022-05-11 10:55:40 +0100 | [diff] [blame] | 610 | /* Call this to get image parameters */ |
| 611 | void efi_get_image_parameters(void **img_addr, size_t *img_size); |
Heinrich Schuchardt | 967d7de | 2017-11-26 14:05:23 +0100 | [diff] [blame] | 612 | /* Add a new object to the object list. */ |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 613 | void efi_add_handle(efi_handle_t obj); |
Heinrich Schuchardt | eb6106e | 2017-10-26 19:25:49 +0200 | [diff] [blame] | 614 | /* Create handle */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 615 | efi_status_t efi_create_handle(efi_handle_t *handle); |
Heinrich Schuchardt | 7d13546 | 2017-12-04 18:03:02 +0100 | [diff] [blame] | 616 | /* Delete handle */ |
Heinrich Schuchardt | adb50d0 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 617 | void efi_delete_handle(efi_handle_t obj); |
Heinrich Schuchardt | 274cc87 | 2017-11-06 21:17:50 +0100 | [diff] [blame] | 618 | /* Call this to validate a handle and find the EFI object for it */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 619 | struct efi_object *efi_search_obj(const efi_handle_t handle); |
AKASHI Takahiro | 537a693 | 2022-04-28 17:09:38 +0900 | [diff] [blame] | 620 | /* Locate device_path handle */ |
| 621 | efi_status_t EFIAPI efi_locate_device_path(const efi_guid_t *protocol, |
| 622 | struct efi_device_path **device_path, |
| 623 | efi_handle_t *device); |
AKASHI Takahiro | b0ad905 | 2019-03-05 14:53:31 +0900 | [diff] [blame] | 624 | /* Load image */ |
| 625 | efi_status_t EFIAPI efi_load_image(bool boot_policy, |
| 626 | efi_handle_t parent_image, |
| 627 | struct efi_device_path *file_path, |
| 628 | void *source_buffer, |
| 629 | efi_uintn_t source_size, |
| 630 | efi_handle_t *image_handle); |
Heinrich Schuchardt | 2f8eb08 | 2018-12-26 13:28:09 +0100 | [diff] [blame] | 631 | /* Start image */ |
| 632 | efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle, |
| 633 | efi_uintn_t *exit_data_size, |
| 634 | u16 **exit_data); |
AKASHI Takahiro | b0ad905 | 2019-03-05 14:53:31 +0900 | [diff] [blame] | 635 | /* Unload image */ |
| 636 | efi_status_t EFIAPI efi_unload_image(efi_handle_t image_handle); |
Heinrich Schuchardt | 5aef61d | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 637 | /* Find a protocol on a handle */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 638 | efi_status_t efi_search_protocol(const efi_handle_t handle, |
Heinrich Schuchardt | 5aef61d | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 639 | const efi_guid_t *protocol_guid, |
| 640 | struct efi_handler **handler); |
| 641 | /* Install new protocol on a handle */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 642 | efi_status_t efi_add_protocol(const efi_handle_t handle, |
| 643 | const efi_guid_t *protocol, |
Heinrich Schuchardt | 5aef61d | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 644 | void *protocol_interface); |
Heinrich Schuchardt | 9c89d14 | 2020-01-10 12:33:59 +0100 | [diff] [blame] | 645 | /* Open protocol */ |
| 646 | efi_status_t efi_protocol_open(struct efi_handler *handler, |
| 647 | void **protocol_interface, void *agent_handle, |
| 648 | void *controller_handle, uint32_t attributes); |
| 649 | |
Heinrich Schuchardt | 5aef61d | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 650 | /* Delete protocol from a handle */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 651 | efi_status_t efi_remove_protocol(const efi_handle_t handle, |
| 652 | const efi_guid_t *protocol, |
Heinrich Schuchardt | 5aef61d | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 653 | void *protocol_interface); |
| 654 | /* Delete all protocols from a handle */ |
Heinrich Schuchardt | b7cb8b4 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 655 | efi_status_t efi_remove_all_protocols(const efi_handle_t handle); |
Heinrich Schuchardt | 744d83e | 2019-04-12 06:59:49 +0200 | [diff] [blame] | 656 | /* Install multiple protocol interfaces */ |
| 657 | efi_status_t EFIAPI efi_install_multiple_protocol_interfaces |
| 658 | (efi_handle_t *handle, ...); |
AKASHI Takahiro | d99b1b3 | 2020-03-17 11:12:36 +0900 | [diff] [blame] | 659 | /* Get handles that support a given protocol */ |
| 660 | efi_status_t EFIAPI efi_locate_handle_buffer( |
| 661 | enum efi_locate_search_type search_type, |
| 662 | const efi_guid_t *protocol, void *search_key, |
| 663 | efi_uintn_t *no_handles, efi_handle_t **buffer); |
| 664 | /* Close an previously opened protocol interface */ |
| 665 | efi_status_t EFIAPI efi_close_protocol(efi_handle_t handle, |
| 666 | const efi_guid_t *protocol, |
| 667 | efi_handle_t agent_handle, |
| 668 | efi_handle_t controller_handle); |
| 669 | /* Open a protocol interface */ |
| 670 | efi_status_t EFIAPI efi_handle_protocol(efi_handle_t handle, |
| 671 | const efi_guid_t *protocol, |
| 672 | void **protocol_interface); |
xypron.glpk@gmx.de | 852a0e177 | 2017-07-18 20:17:20 +0200 | [diff] [blame] | 673 | /* Call this to create an event */ |
Heinrich Schuchardt | f8d4ec3 | 2017-11-06 21:17:47 +0100 | [diff] [blame] | 674 | efi_status_t efi_create_event(uint32_t type, efi_uintn_t notify_tpl, |
xypron.glpk@gmx.de | 852a0e177 | 2017-07-18 20:17:20 +0200 | [diff] [blame] | 675 | void (EFIAPI *notify_function) ( |
| 676 | struct efi_event *event, |
| 677 | void *context), |
Heinrich Schuchardt | bf7f169 | 2018-02-18 15:17:52 +0100 | [diff] [blame] | 678 | void *notify_context, efi_guid_t *group, |
| 679 | struct efi_event **event); |
xypron.glpk@gmx.de | a587fd1 | 2017-07-18 20:17:21 +0200 | [diff] [blame] | 680 | /* Call this to set a timer */ |
xypron.glpk@gmx.de | 3ecc6bd | 2017-07-19 19:22:34 +0200 | [diff] [blame] | 681 | efi_status_t efi_set_timer(struct efi_event *event, enum efi_timer_delay type, |
xypron.glpk@gmx.de | a587fd1 | 2017-07-18 20:17:21 +0200 | [diff] [blame] | 682 | uint64_t trigger_time); |
xypron.glpk@gmx.de | 54c7a8e | 2017-07-18 20:17:22 +0200 | [diff] [blame] | 683 | /* Call this to signal an event */ |
Heinrich Schuchardt | 7b4b8d86 | 2019-06-07 06:47:01 +0200 | [diff] [blame] | 684 | void efi_signal_event(struct efi_event *event); |
Alexander Graf | 0bd425a | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 685 | |
AKASHI Takahiro | ba647af | 2022-05-12 11:29:01 +0900 | [diff] [blame] | 686 | /* return true if the device is removable */ |
| 687 | bool efi_disk_is_removable(efi_handle_t handle); |
| 688 | |
Rob Clark | 5314203 | 2017-09-13 18:05:34 -0400 | [diff] [blame] | 689 | /* open file system: */ |
| 690 | struct efi_simple_file_system_protocol *efi_simple_file_system( |
| 691 | struct blk_desc *desc, int part, struct efi_device_path *dp); |
| 692 | |
| 693 | /* open file from device-path: */ |
| 694 | struct efi_file_handle *efi_file_from_path(struct efi_device_path *fp); |
| 695 | |
Jose Marinho | ebb61ee | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 696 | /* Registers a callback function for a notification event. */ |
| 697 | efi_status_t EFIAPI efi_register_protocol_notify(const efi_guid_t *protocol, |
| 698 | struct efi_event *event, |
| 699 | void **registration); |
Ilias Apalodimas | aa0f755 | 2021-03-17 21:54:59 +0200 | [diff] [blame] | 700 | efi_status_t efi_file_size(struct efi_file_handle *fh, efi_uintn_t *size); |
| 701 | |
| 702 | /* get a device path from a Boot#### option */ |
| 703 | struct efi_device_path *efi_get_dp_from_boot(const efi_guid_t guid); |
| 704 | |
Ilias Apalodimas | 34db9b1 | 2022-05-06 15:36:00 +0300 | [diff] [blame] | 705 | /* get len, string (used in u-boot crypto from a guid */ |
| 706 | const char *guid_to_sha_str(const efi_guid_t *guid); |
| 707 | int algo_to_len(const char *algo); |
| 708 | |
Masahisa Kojima | c961108 | 2022-07-22 11:39:10 +0900 | [diff] [blame] | 709 | int efi_link_dev(efi_handle_t handle, struct udevice *dev); |
Heinrich Schuchardt | 34f3462 | 2022-10-03 09:47:51 +0200 | [diff] [blame] | 710 | int efi_unlink_dev(efi_handle_t handle); |
Masahisa Kojima | c961108 | 2022-07-22 11:39:10 +0900 | [diff] [blame] | 711 | |
Heinrich Schuchardt | dcdca29 | 2018-11-18 17:58:49 +0100 | [diff] [blame] | 712 | /** |
| 713 | * efi_size_in_pages() - convert size in bytes to size in pages |
| 714 | * |
| 715 | * This macro returns the number of EFI memory pages required to hold 'size' |
| 716 | * bytes. |
| 717 | * |
| 718 | * @size: size in bytes |
| 719 | * Return: size in pages |
| 720 | */ |
Heinrich Schuchardt | aefb0c4 | 2021-01-17 07:52:09 +0100 | [diff] [blame] | 721 | #define efi_size_in_pages(size) (((size) + EFI_PAGE_MASK) >> EFI_PAGE_SHIFT) |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 722 | /* Generic EFI memory allocator, call this to get memory */ |
| 723 | void *efi_alloc(uint64_t len, int memory_type); |
Ilias Apalodimas | 6e01c23 | 2021-10-11 15:10:23 +0300 | [diff] [blame] | 724 | /* Allocate pages on the specified alignment */ |
| 725 | void *efi_alloc_aligned_pages(u64 len, int memory_type, size_t align); |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 726 | /* More specific EFI memory allocator, called by EFI payloads */ |
Heinrich Schuchardt | 9822894 | 2021-08-17 15:05:31 +0200 | [diff] [blame] | 727 | efi_status_t efi_allocate_pages(enum efi_allocate_type type, |
| 728 | enum efi_memory_type memory_type, |
| 729 | efi_uintn_t pages, uint64_t *memory); |
Stefan Brüns | a4f4302 | 2016-10-01 23:32:27 +0200 | [diff] [blame] | 730 | /* EFI memory free function. */ |
Heinrich Schuchardt | 798a441 | 2017-11-06 21:17:48 +0100 | [diff] [blame] | 731 | efi_status_t efi_free_pages(uint64_t memory, efi_uintn_t pages); |
Stefan Brüns | 5a09aef | 2016-10-09 22:17:18 +0200 | [diff] [blame] | 732 | /* EFI memory allocator for small allocations */ |
Heinrich Schuchardt | 9822894 | 2021-08-17 15:05:31 +0200 | [diff] [blame] | 733 | efi_status_t efi_allocate_pool(enum efi_memory_type pool_type, |
| 734 | efi_uintn_t size, void **buffer); |
Stefan Brüns | 67b67d9 | 2016-10-09 22:17:26 +0200 | [diff] [blame] | 735 | /* EFI pool memory free function. */ |
| 736 | efi_status_t efi_free_pool(void *buffer); |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 737 | /* Returns the EFI memory map */ |
Heinrich Schuchardt | 798a441 | 2017-11-06 21:17:48 +0100 | [diff] [blame] | 738 | efi_status_t efi_get_memory_map(efi_uintn_t *memory_map_size, |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 739 | struct efi_mem_desc *memory_map, |
Heinrich Schuchardt | 798a441 | 2017-11-06 21:17:48 +0100 | [diff] [blame] | 740 | efi_uintn_t *map_key, |
| 741 | efi_uintn_t *descriptor_size, |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 742 | uint32_t *descriptor_version); |
| 743 | /* Adds a range into the EFI memory map */ |
Michael Walle | 282d386 | 2020-05-17 12:29:19 +0200 | [diff] [blame] | 744 | efi_status_t efi_add_memory_map(u64 start, u64 size, int memory_type); |
Park, Aiden | e009e7a | 2019-09-03 17:43:43 +0000 | [diff] [blame] | 745 | /* Adds a conventional range into the EFI memory map */ |
| 746 | efi_status_t efi_add_conventional_memory_map(u64 ram_start, u64 ram_end, |
| 747 | u64 ram_top); |
| 748 | |
Heinrich Schuchardt | 11206f4 | 2018-01-21 19:29:30 +0100 | [diff] [blame] | 749 | /* Called by board init to initialize the EFI drivers */ |
Heinrich Schuchardt | 8f3cc5b | 2018-02-01 12:53:32 +0100 | [diff] [blame] | 750 | efi_status_t efi_driver_init(void); |
Heinrich Schuchardt | da620cf | 2022-10-06 07:29:41 +0200 | [diff] [blame] | 751 | /* Called when a block device is added */ |
| 752 | int efi_disk_probe(void *ctx, struct event *event); |
| 753 | /* Called when a block device is removed */ |
| 754 | int efi_disk_remove(void *ctx, struct event *event); |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 755 | /* Called by board init to initialize the EFI memory map */ |
| 756 | int efi_memory_init(void); |
Alexander Graf | c5c1163 | 2016-08-19 01:23:24 +0200 | [diff] [blame] | 757 | /* Adds new or overrides configuration table entry to the system table */ |
| 758 | efi_status_t efi_install_configuration_table(const efi_guid_t *guid, void *table); |
Heinrich Schuchardt | 7db9f89 | 2017-12-04 18:03:01 +0100 | [diff] [blame] | 759 | /* Sets up a loaded image */ |
Heinrich Schuchardt | 3c3a735 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 760 | efi_status_t efi_setup_loaded_image(struct efi_device_path *device_path, |
| 761 | struct efi_device_path *file_path, |
| 762 | struct efi_loaded_image_obj **handle_ptr, |
| 763 | struct efi_loaded_image **info_ptr); |
Alexander Graf | 8623f92 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 764 | |
Alexander Graf | 7c00a3c | 2016-05-11 18:25:48 +0200 | [diff] [blame] | 765 | #ifdef CONFIG_EFI_LOADER_BOUNCE_BUFFER |
| 766 | extern void *efi_bounce_buffer; |
| 767 | #define EFI_LOADER_BOUNCE_BUFFER_SIZE (64 * 1024 * 1024) |
| 768 | #endif |
| 769 | |
Heinrich Schuchardt | 24f0e6a | 2022-02-26 12:10:10 +0100 | [diff] [blame] | 770 | /* shorten device path */ |
| 771 | struct efi_device_path *efi_dp_shorten(struct efi_device_path *dp); |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 772 | struct efi_device_path *efi_dp_next(const struct efi_device_path *dp); |
Heinrich Schuchardt | 753e248 | 2017-10-26 19:25:48 +0200 | [diff] [blame] | 773 | int efi_dp_match(const struct efi_device_path *a, |
| 774 | const struct efi_device_path *b); |
Heinrich Schuchardt | ad6d5a4 | 2022-03-04 08:20:00 +0100 | [diff] [blame] | 775 | efi_handle_t efi_dp_find_obj(struct efi_device_path *dp, |
Heinrich Schuchardt | 0a04a41 | 2022-03-19 06:35:43 +0100 | [diff] [blame] | 776 | const efi_guid_t *guid, |
Heinrich Schuchardt | ad6d5a4 | 2022-03-04 08:20:00 +0100 | [diff] [blame] | 777 | struct efi_device_path **rem); |
Heinrich Schuchardt | 51ca4f5 | 2018-04-16 07:59:08 +0200 | [diff] [blame] | 778 | /* get size of the first device path instance excluding end node */ |
| 779 | efi_uintn_t efi_dp_instance_size(const struct efi_device_path *dp); |
| 780 | /* size of multi-instance device path excluding end node */ |
| 781 | efi_uintn_t efi_dp_size(const struct efi_device_path *dp); |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 782 | struct efi_device_path *efi_dp_dup(const struct efi_device_path *dp); |
| 783 | struct efi_device_path *efi_dp_append(const struct efi_device_path *dp1, |
| 784 | const struct efi_device_path *dp2); |
| 785 | struct efi_device_path *efi_dp_append_node(const struct efi_device_path *dp, |
| 786 | const struct efi_device_path *node); |
Heinrich Schuchardt | b41c8e2 | 2018-04-16 07:59:05 +0200 | [diff] [blame] | 787 | /* Create a device path node of given type, sub-type, length */ |
| 788 | struct efi_device_path *efi_dp_create_device_node(const u8 type, |
| 789 | const u8 sub_type, |
| 790 | const u16 length); |
Heinrich Schuchardt | cb0f7ce | 2018-04-16 07:59:09 +0200 | [diff] [blame] | 791 | /* Append device path instance */ |
| 792 | struct efi_device_path *efi_dp_append_instance( |
| 793 | const struct efi_device_path *dp, |
| 794 | const struct efi_device_path *dpi); |
| 795 | /* Get next device path instance */ |
| 796 | struct efi_device_path *efi_dp_get_next_instance(struct efi_device_path **dp, |
| 797 | efi_uintn_t *size); |
| 798 | /* Check if a device path contains muliple instances */ |
| 799 | bool efi_dp_is_multi_instance(const struct efi_device_path *dp); |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 800 | |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 801 | struct efi_device_path *efi_dp_from_part(struct blk_desc *desc, int part); |
Heinrich Schuchardt | 6c6307c | 2018-01-19 20:24:46 +0100 | [diff] [blame] | 802 | /* Create a device node for a block device partition. */ |
| 803 | struct efi_device_path *efi_dp_part_node(struct blk_desc *desc, int part); |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 804 | struct efi_device_path *efi_dp_from_file(struct blk_desc *desc, int part, |
| 805 | const char *path); |
| 806 | struct efi_device_path *efi_dp_from_eth(void); |
Rob Clark | 18ceba7 | 2017-10-10 08:23:06 -0400 | [diff] [blame] | 807 | struct efi_device_path *efi_dp_from_mem(uint32_t mem_type, |
| 808 | uint64_t start_address, |
| 809 | uint64_t end_address); |
Heinrich Schuchardt | 0976f8b | 2018-01-19 20:24:49 +0100 | [diff] [blame] | 810 | /* Determine the last device path node that is not the end node. */ |
| 811 | const struct efi_device_path *efi_dp_last_node( |
| 812 | const struct efi_device_path *dp); |
Heinrich Schuchardt | 468bf97 | 2018-01-19 20:24:37 +0100 | [diff] [blame] | 813 | efi_status_t efi_dp_split_file_path(struct efi_device_path *full_path, |
| 814 | struct efi_device_path **device_path, |
| 815 | struct efi_device_path **file_path); |
Heinrich Schuchardt | 81244ea | 2022-02-04 20:47:09 +0100 | [diff] [blame] | 816 | struct efi_device_path *efi_dp_from_uart(void); |
AKASHI Takahiro | 035fb01 | 2018-10-17 16:32:03 +0900 | [diff] [blame] | 817 | efi_status_t efi_dp_from_name(const char *dev, const char *devnr, |
| 818 | const char *path, |
| 819 | struct efi_device_path **device, |
| 820 | struct efi_device_path **file); |
Heinrich Schuchardt | 22c8e08 | 2020-08-23 10:49:46 +0200 | [diff] [blame] | 821 | ssize_t efi_dp_check_length(const struct efi_device_path *dp, |
| 822 | const size_t maxlen); |
Rob Clark | f90cb9f | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 823 | |
| 824 | #define EFI_DP_TYPE(_dp, _type, _subtype) \ |
| 825 | (((_dp)->type == DEVICE_PATH_TYPE_##_type) && \ |
| 826 | ((_dp)->sub_type == DEVICE_PATH_SUB_TYPE_##_subtype)) |
| 827 | |
Masahisa Kojima | 97bd9da | 2022-06-19 13:55:59 +0900 | [diff] [blame] | 828 | /* template END node: */ |
| 829 | extern const struct efi_device_path END; |
| 830 | |
AKASHI Takahiro | 3240184 | 2019-06-05 13:21:38 +0900 | [diff] [blame] | 831 | /* Indicate supported runtime services */ |
| 832 | efi_status_t efi_init_runtime_supported(void); |
| 833 | |
Heinrich Schuchardt | 69c1576 | 2018-07-29 09:49:04 +0200 | [diff] [blame] | 834 | /* Update CRC32 in table header */ |
| 835 | void __efi_runtime efi_update_table_header_crc32(struct efi_table_hdr *table); |
| 836 | |
Alexander Graf | 7725609 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 837 | /* Boards may provide the functions below to implement RTS functionality */ |
| 838 | |
Alexander Graf | 393dd91 | 2016-10-14 13:45:30 +0200 | [diff] [blame] | 839 | void __efi_runtime EFIAPI efi_reset_system( |
Alexander Graf | 7725609 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 840 | enum efi_reset_type reset_type, |
| 841 | efi_status_t reset_status, |
| 842 | unsigned long data_size, void *reset_data); |
Heinrich Schuchardt | 099b3b7 | 2018-03-03 15:28:59 +0100 | [diff] [blame] | 843 | |
| 844 | /* Architecture specific initialization of the EFI subsystem */ |
| 845 | efi_status_t efi_reset_system_init(void); |
Alexander Graf | 7725609 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 846 | |
Alexander Graf | 393dd91 | 2016-10-14 13:45:30 +0200 | [diff] [blame] | 847 | efi_status_t __efi_runtime EFIAPI efi_get_time( |
Alexander Graf | 7725609 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 848 | struct efi_time *time, |
| 849 | struct efi_time_cap *capabilities); |
Alexander Graf | 7725609 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 850 | |
Heinrich Schuchardt | 289121e | 2019-05-31 07:38:29 +0200 | [diff] [blame] | 851 | efi_status_t __efi_runtime EFIAPI efi_set_time(struct efi_time *time); |
| 852 | |
Heinrich Schuchardt | d33ae3e | 2017-09-15 10:06:11 +0200 | [diff] [blame] | 853 | #ifdef CONFIG_CMD_BOOTEFI_SELFTEST |
| 854 | /* |
| 855 | * Entry point for the tests of the EFI API. |
| 856 | * It is called by 'bootefi selftest' |
| 857 | */ |
| 858 | efi_status_t EFIAPI efi_selftest(efi_handle_t image_handle, |
| 859 | struct efi_system_table *systab); |
| 860 | #endif |
| 861 | |
Heinrich Schuchardt | e06ae19 | 2018-12-30 20:53:51 +0100 | [diff] [blame] | 862 | efi_status_t EFIAPI efi_get_variable(u16 *variable_name, |
| 863 | const efi_guid_t *vendor, u32 *attributes, |
| 864 | efi_uintn_t *data_size, void *data); |
Heinrich Schuchardt | d6a6baa | 2018-05-17 07:57:05 +0200 | [diff] [blame] | 865 | efi_status_t EFIAPI efi_get_next_variable_name(efi_uintn_t *variable_name_size, |
| 866 | u16 *variable_name, |
Heinrich Schuchardt | 82cd6c4 | 2020-03-22 18:28:20 +0100 | [diff] [blame] | 867 | efi_guid_t *vendor); |
Heinrich Schuchardt | e06ae19 | 2018-12-30 20:53:51 +0100 | [diff] [blame] | 868 | efi_status_t EFIAPI efi_set_variable(u16 *variable_name, |
| 869 | const efi_guid_t *vendor, u32 attributes, |
Heinrich Schuchardt | 73e2ab0 | 2018-12-30 21:03:15 +0100 | [diff] [blame] | 870 | efi_uintn_t data_size, const void *data); |
Rob Clark | 15f3d74 | 2017-09-13 18:05:37 -0400 | [diff] [blame] | 871 | |
Heinrich Schuchardt | 9b19dae | 2019-06-20 12:13:05 +0200 | [diff] [blame] | 872 | efi_status_t EFIAPI efi_query_variable_info( |
| 873 | u32 attributes, u64 *maximum_variable_storage_size, |
| 874 | u64 *remaining_variable_storage_size, |
| 875 | u64 *maximum_variable_size); |
| 876 | |
Heinrich Schuchardt | 1ad2f0d | 2021-09-09 07:12:14 +0200 | [diff] [blame] | 877 | void *efi_get_var(const u16 *name, const efi_guid_t *vendor, efi_uintn_t *size); |
Ilias Apalodimas | aa0f755 | 2021-03-17 21:54:59 +0200 | [diff] [blame] | 878 | |
AKASHI Takahiro | bd23774 | 2018-11-05 18:06:41 +0900 | [diff] [blame] | 879 | /* |
| 880 | * See section 3.1.3 in the v2.7 UEFI spec for more details on |
| 881 | * the layout of EFI_LOAD_OPTION. In short it is: |
| 882 | * |
| 883 | * typedef struct _EFI_LOAD_OPTION { |
| 884 | * UINT32 Attributes; |
| 885 | * UINT16 FilePathListLength; |
| 886 | * // CHAR16 Description[]; <-- variable length, NULL terminated |
| 887 | * // EFI_DEVICE_PATH_PROTOCOL FilePathList[]; |
| 888 | * <-- FilePathListLength bytes |
| 889 | * // UINT8 OptionalData[]; |
| 890 | * } EFI_LOAD_OPTION; |
| 891 | */ |
| 892 | struct efi_load_option { |
| 893 | u32 attributes; |
| 894 | u16 file_path_length; |
| 895 | u16 *label; |
| 896 | struct efi_device_path *file_path; |
Heinrich Schuchardt | 9df002e | 2019-04-29 13:51:45 +0200 | [diff] [blame] | 897 | const u8 *optional_data; |
AKASHI Takahiro | bd23774 | 2018-11-05 18:06:41 +0900 | [diff] [blame] | 898 | }; |
| 899 | |
Ilias Apalodimas | 483d28e | 2021-03-17 21:54:58 +0200 | [diff] [blame] | 900 | struct efi_device_path *efi_dp_from_lo(struct efi_load_option *lo, |
Heinrich Schuchardt | 9979cff | 2021-10-15 01:31:02 +0200 | [diff] [blame] | 901 | const efi_guid_t *guid); |
Ilias Apalodimas | 483d28e | 2021-03-17 21:54:58 +0200 | [diff] [blame] | 902 | struct efi_device_path *efi_dp_concat(const struct efi_device_path *dp1, |
| 903 | const struct efi_device_path *dp2); |
Masahisa Kojima | 6460c3e | 2021-10-26 17:27:25 +0900 | [diff] [blame] | 904 | struct efi_device_path *search_gpt_dp_node(struct efi_device_path *device_path); |
Heinrich Schuchardt | 7ca84f8 | 2020-05-31 22:46:09 +0200 | [diff] [blame] | 905 | efi_status_t efi_deserialize_load_option(struct efi_load_option *lo, u8 *data, |
| 906 | efi_uintn_t *size); |
AKASHI Takahiro | bd23774 | 2018-11-05 18:06:41 +0900 | [diff] [blame] | 907 | unsigned long efi_serialize_load_option(struct efi_load_option *lo, u8 **data); |
Heinrich Schuchardt | 25c6be5 | 2020-08-07 17:47:13 +0200 | [diff] [blame] | 908 | efi_status_t efi_set_load_options(efi_handle_t handle, |
| 909 | efi_uintn_t load_options_size, |
| 910 | void *load_options); |
Heinrich Schuchardt | a7647a7 | 2020-08-07 17:49:39 +0200 | [diff] [blame] | 911 | efi_status_t efi_bootmgr_load(efi_handle_t *handle, void **load_options); |
Rob Clark | c84c110 | 2017-09-13 18:05:38 -0400 | [diff] [blame] | 912 | |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 913 | /** |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 914 | * struct efi_image_regions - A list of memory regions |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 915 | * |
| 916 | * @max: Maximum number of regions |
| 917 | * @num: Number of regions |
| 918 | * @reg: array of regions |
| 919 | */ |
| 920 | struct efi_image_regions { |
| 921 | int max; |
| 922 | int num; |
| 923 | struct image_region reg[]; |
| 924 | }; |
| 925 | |
| 926 | /** |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 927 | * struct efi_sig_data - A decoded data of struct efi_signature_data |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 928 | * |
| 929 | * This structure represents an internal form of signature in |
| 930 | * signature database. A listed list may represent a signature list. |
| 931 | * |
| 932 | * @next: Pointer to next entry |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 933 | * @owner: Signature owner |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 934 | * @data: Pointer to signature data |
| 935 | * @size: Size of signature data |
| 936 | */ |
| 937 | struct efi_sig_data { |
| 938 | struct efi_sig_data *next; |
| 939 | efi_guid_t owner; |
| 940 | void *data; |
| 941 | size_t size; |
| 942 | }; |
| 943 | |
| 944 | /** |
Heinrich Schuchardt | 6eb30c1 | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 945 | * struct efi_signature_store - A decoded data of signature database |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 946 | * |
| 947 | * This structure represents an internal form of signature database. |
| 948 | * |
| 949 | * @next: Pointer to next entry |
| 950 | * @sig_type: Signature type |
| 951 | * @sig_data_list: Pointer to signature list |
| 952 | */ |
| 953 | struct efi_signature_store { |
| 954 | struct efi_signature_store *next; |
| 955 | efi_guid_t sig_type; |
| 956 | struct efi_sig_data *sig_data_list; |
| 957 | }; |
| 958 | |
| 959 | struct x509_certificate; |
| 960 | struct pkcs7_message; |
| 961 | |
Masahisa Kojima | 767a9e6 | 2022-09-12 17:33:54 +0900 | [diff] [blame] | 962 | /** |
| 963 | * struct eficonfig_media_boot_option - boot option for (removable) media device |
| 964 | * |
| 965 | * This structure is used to enumerate possible boot option |
| 966 | * |
| 967 | * @lo: Serialized load option data |
| 968 | * @size: Size of serialized load option data |
| 969 | * @exist: Flag to indicate the load option already exists |
| 970 | * in Non-volatile load option |
| 971 | */ |
| 972 | struct eficonfig_media_boot_option { |
| 973 | void *lo; |
| 974 | efi_uintn_t size; |
| 975 | bool exist; |
| 976 | }; |
| 977 | |
AKASHI Takahiro | f47b9b3 | 2022-07-05 14:48:12 +0900 | [diff] [blame] | 978 | bool efi_hash_regions(struct image_region *regs, int count, |
| 979 | void **hash, const char *hash_algo, int *len); |
AKASHI Takahiro | de92407 | 2020-07-08 14:01:57 +0900 | [diff] [blame] | 980 | bool efi_signature_lookup_digest(struct efi_image_regions *regs, |
Ilias Apalodimas | 71eae98 | 2022-01-29 00:20:31 +0200 | [diff] [blame] | 981 | struct efi_signature_store *db, |
| 982 | bool dbx); |
AKASHI Takahiro | 14afd06 | 2020-07-21 19:35:22 +0900 | [diff] [blame] | 983 | bool efi_signature_verify(struct efi_image_regions *regs, |
| 984 | struct pkcs7_message *msg, |
| 985 | struct efi_signature_store *db, |
| 986 | struct efi_signature_store *dbx); |
AKASHI Takahiro | 1641180 | 2020-08-14 14:39:23 +0900 | [diff] [blame] | 987 | static inline bool efi_signature_verify_one(struct efi_image_regions *regs, |
| 988 | struct pkcs7_message *msg, |
| 989 | struct efi_signature_store *db) |
| 990 | { |
| 991 | return efi_signature_verify(regs, msg, db, NULL); |
| 992 | } |
AKASHI Takahiro | 4154b64 | 2020-07-08 14:01:56 +0900 | [diff] [blame] | 993 | bool efi_signature_check_signers(struct pkcs7_message *msg, |
| 994 | struct efi_signature_store *dbx); |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 995 | |
| 996 | efi_status_t efi_image_region_add(struct efi_image_regions *regs, |
| 997 | const void *start, const void *end, |
| 998 | int nocheck); |
AKASHI Takahiro | d2cefc8 | 2020-04-14 11:51:40 +0900 | [diff] [blame] | 999 | |
| 1000 | void efi_sigstore_free(struct efi_signature_store *sigstore); |
Sughosh Ganu | fa0faa6 | 2020-12-30 19:27:08 +0530 | [diff] [blame] | 1001 | struct efi_signature_store *efi_build_signature_store(void *sig_list, |
| 1002 | efi_uintn_t size); |
AKASHI Takahiro | d2cefc8 | 2020-04-14 11:51:40 +0900 | [diff] [blame] | 1003 | struct efi_signature_store *efi_sigstore_parse_sigdb(u16 *name); |
AKASHI Takahiro | b0f49ee | 2020-04-14 11:51:41 +0900 | [diff] [blame] | 1004 | |
| 1005 | bool efi_secure_boot_enabled(void); |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 1006 | |
Sughosh Ganu | 586bb98 | 2020-12-30 19:27:09 +0530 | [diff] [blame] | 1007 | bool efi_capsule_auth_enabled(void); |
| 1008 | |
Masahisa Kojima | 70be5a6 | 2021-05-26 12:09:58 +0900 | [diff] [blame] | 1009 | void *efi_prepare_aligned_image(void *efi, u64 *efi_size); |
| 1010 | |
AKASHI Takahiro | 0e104e3 | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 1011 | bool efi_image_parse(void *efi, size_t len, struct efi_image_regions **regp, |
| 1012 | WIN_CERTIFICATE **auth, size_t *auth_len); |
AKASHI Takahiro | 1faaca4 | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 1013 | |
Sughosh Ganu | ea35008 | 2020-12-30 19:27:07 +0530 | [diff] [blame] | 1014 | struct pkcs7_message *efi_parse_pkcs7_header(const void *buf, |
| 1015 | size_t buflen, |
| 1016 | u8 **tmpbuf); |
| 1017 | |
Heinrich Schuchardt | 8cd9975 | 2020-06-28 16:30:29 +0200 | [diff] [blame] | 1018 | /* runtime implementation of memcpy() */ |
| 1019 | void efi_memcpy_runtime(void *dest, const void *src, size_t n); |
| 1020 | |
Paul Barker | 8acc3d9 | 2022-10-05 13:18:35 +0100 | [diff] [blame] | 1021 | /* commonly used helper functions */ |
Ilias Apalodimas | 2157529 | 2020-12-31 12:26:46 +0200 | [diff] [blame] | 1022 | u16 *efi_create_indexed_name(u16 *buffer, size_t buffer_size, const char *name, |
| 1023 | unsigned int index); |
Paul Barker | 8acc3d9 | 2022-10-05 13:18:35 +0100 | [diff] [blame] | 1024 | efi_string_t efi_convert_string(const char *str); |
AKASHI Takahiro | 9407468 | 2020-10-29 13:47:46 +0900 | [diff] [blame] | 1025 | |
AKASHI Takahiro | f4818e6 | 2020-11-30 18:12:12 +0900 | [diff] [blame] | 1026 | extern const struct efi_firmware_management_protocol efi_fmp_fit; |
AKASHI Takahiro | 7ff3f3c | 2020-11-17 09:28:00 +0900 | [diff] [blame] | 1027 | extern const struct efi_firmware_management_protocol efi_fmp_raw; |
AKASHI Takahiro | f4818e6 | 2020-11-30 18:12:12 +0900 | [diff] [blame] | 1028 | |
AKASHI Takahiro | 473d9b3 | 2020-11-17 09:27:55 +0900 | [diff] [blame] | 1029 | /* Capsule update */ |
| 1030 | efi_status_t EFIAPI efi_update_capsule( |
| 1031 | struct efi_capsule_header **capsule_header_array, |
| 1032 | efi_uintn_t capsule_count, |
| 1033 | u64 scatter_gather_list); |
| 1034 | efi_status_t EFIAPI efi_query_capsule_caps( |
| 1035 | struct efi_capsule_header **capsule_header_array, |
| 1036 | efi_uintn_t capsule_count, |
| 1037 | u64 *maximum_capsule_size, |
| 1038 | u32 *reset_type); |
| 1039 | |
Sughosh Ganu | 586bb98 | 2020-12-30 19:27:09 +0530 | [diff] [blame] | 1040 | efi_status_t efi_capsule_authenticate(const void *capsule, |
| 1041 | efi_uintn_t capsule_size, |
| 1042 | void **image, efi_uintn_t *image_size); |
| 1043 | |
Simon Glass | 9097537 | 2022-01-23 12:55:12 -0700 | [diff] [blame] | 1044 | #define EFI_CAPSULE_DIR u"\\EFI\\UpdateCapsule\\" |
AKASHI Takahiro | 45b81954 | 2020-11-17 09:27:56 +0900 | [diff] [blame] | 1045 | |
Jose Marinho | ebb61ee | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 1046 | /** |
Sughosh Ganu | ccb3646 | 2022-04-15 11:29:34 +0530 | [diff] [blame] | 1047 | * struct efi_fw_image - Information on firmware images updatable through |
| 1048 | * capsule update |
| 1049 | * |
| 1050 | * This structure gives information about the firmware images on the platform |
| 1051 | * which can be updated through the capsule update mechanism |
| 1052 | * |
| 1053 | * @image_type_id: Image GUID. Same value is to be used in the capsule |
| 1054 | * @fw_name: Name of the firmware image |
| 1055 | * @image_index: Image Index, same as value passed to SetImage FMP |
| 1056 | * function |
| 1057 | */ |
| 1058 | struct efi_fw_image { |
| 1059 | efi_guid_t image_type_id; |
| 1060 | u16 *fw_name; |
| 1061 | u8 image_index; |
| 1062 | }; |
| 1063 | |
| 1064 | /** |
| 1065 | * struct efi_capsule_update_info - Information needed for capsule updates |
| 1066 | * |
| 1067 | * This structure provides information needed for performing firmware |
| 1068 | * updates. The structure needs to be initialised per platform, for all |
| 1069 | * platforms which enable capsule updates |
| 1070 | * |
| 1071 | * @dfu_string: String used to populate dfu_alt_info |
| 1072 | * @images: Pointer to an array of updatable images |
| 1073 | */ |
| 1074 | struct efi_capsule_update_info { |
| 1075 | const char *dfu_string; |
| 1076 | struct efi_fw_image *images; |
| 1077 | }; |
| 1078 | |
| 1079 | extern struct efi_capsule_update_info update_info; |
| 1080 | extern u8 num_image_type_guids; |
| 1081 | |
| 1082 | /** |
Jose Marinho | ebb61ee | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 1083 | * Install the ESRT system table. |
| 1084 | * |
Heinrich Schuchardt | 47b4c02 | 2022-01-19 18:05:50 +0100 | [diff] [blame] | 1085 | * Return: status code |
Jose Marinho | ebb61ee | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 1086 | */ |
| 1087 | efi_status_t efi_esrt_register(void); |
| 1088 | |
| 1089 | /** |
Jose Marinho | ff72cb3 | 2021-12-23 14:51:07 +0000 | [diff] [blame] | 1090 | * efi_ecpt_register() - Install the ECPT system table. |
| 1091 | * |
| 1092 | * Return: status code |
| 1093 | */ |
| 1094 | efi_status_t efi_ecpt_register(void); |
| 1095 | |
| 1096 | /** |
Jose Marinho | ebb61ee | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 1097 | * efi_esrt_populate() - Populates the ESRT entries from the FMP instances |
| 1098 | * present in the system. |
| 1099 | * If an ESRT already exists, the old ESRT is replaced in the system table. |
| 1100 | * The memory of the old ESRT is deallocated. |
| 1101 | * |
| 1102 | * Return: |
| 1103 | * - EFI_SUCCESS if the ESRT is correctly created |
| 1104 | * - error code otherwise. |
| 1105 | */ |
| 1106 | efi_status_t efi_esrt_populate(void); |
Ilias Apalodimas | fac773e | 2021-06-22 17:38:53 +0300 | [diff] [blame] | 1107 | efi_status_t efi_load_capsule_drivers(void); |
Ruchika Gupta | bc9495c | 2021-11-29 13:09:44 +0530 | [diff] [blame] | 1108 | |
| 1109 | efi_status_t platform_get_eventlog(struct udevice *dev, u64 *addr, u32 *sz); |
Masahisa Kojima | c5ff0a0 | 2022-09-12 17:33:50 +0900 | [diff] [blame] | 1110 | |
| 1111 | efi_status_t efi_locate_handle_buffer_int(enum efi_locate_search_type search_type, |
| 1112 | const efi_guid_t *protocol, void *search_key, |
| 1113 | efi_uintn_t *no_handles, efi_handle_t **buffer); |
| 1114 | |
| 1115 | efi_status_t efi_open_volume_int(struct efi_simple_file_system_protocol *this, |
| 1116 | struct efi_file_handle **root); |
| 1117 | efi_status_t efi_file_open_int(struct efi_file_handle *this, |
| 1118 | struct efi_file_handle **new_handle, |
| 1119 | u16 *file_name, u64 open_mode, |
| 1120 | u64 attributes); |
| 1121 | efi_status_t efi_file_close_int(struct efi_file_handle *file); |
| 1122 | efi_status_t efi_file_read_int(struct efi_file_handle *this, |
| 1123 | efi_uintn_t *buffer_size, void *buffer); |
| 1124 | efi_status_t efi_file_setpos_int(struct efi_file_handle *file, u64 pos); |
| 1125 | |
| 1126 | typedef efi_status_t (*efi_console_filter_func)(struct efi_input_key *key); |
| 1127 | efi_status_t efi_console_get_u16_string |
| 1128 | (struct efi_simple_text_input_protocol *cin, |
| 1129 | u16 *buf, efi_uintn_t count, efi_console_filter_func filer_func, |
| 1130 | int row, int col); |
| 1131 | |
| 1132 | efi_status_t efi_disk_get_device_name(const efi_handle_t handle, char *buf, int size); |
| 1133 | |
Heinrich Schuchardt | c2fd477 | 2017-10-18 18:13:07 +0200 | [diff] [blame] | 1134 | #endif /* _EFI_LOADER_H */ |