2018-05-08 05:02:21 +08:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0+ */
|
2016-03-04 08:09:58 +08:00
|
|
|
/*
|
|
|
|
* EFI application loader
|
|
|
|
*
|
|
|
|
* Copyright (c) 2016 Alexander Graf
|
|
|
|
*/
|
|
|
|
|
2017-10-19 00:13:07 +08:00
|
|
|
#ifndef _EFI_LOADER_H
|
|
|
|
#define _EFI_LOADER_H 1
|
|
|
|
|
2016-03-04 08:09:59 +08:00
|
|
|
#include <common.h>
|
2020-05-11 01:39:58 +08:00
|
|
|
#include <blk.h>
|
2020-05-11 01:40:05 +08:00
|
|
|
#include <log.h>
|
2016-03-04 08:09:58 +08:00
|
|
|
#include <part_efi.h>
|
|
|
|
#include <efi_api.h>
|
2020-04-21 08:38:38 +08:00
|
|
|
#include <image.h>
|
2020-04-14 10:51:44 +08:00
|
|
|
#include <pe.h>
|
2016-03-04 08:09:59 +08:00
|
|
|
|
2020-05-11 01:39:58 +08:00
|
|
|
struct blk_desc;
|
|
|
|
|
2019-09-25 22:11:32 +08:00
|
|
|
static inline int guidcmp(const void *g1, const void *g2)
|
|
|
|
{
|
|
|
|
return memcmp(g1, g2, sizeof(efi_guid_t));
|
|
|
|
}
|
|
|
|
|
2019-12-29 02:31:04 +08:00
|
|
|
static inline void *guidcpy(void *dst, const void *src)
|
|
|
|
{
|
|
|
|
return memcpy(dst, src, sizeof(efi_guid_t));
|
|
|
|
}
|
|
|
|
|
2016-03-04 08:09:59 +08:00
|
|
|
/* No need for efi loader support in SPL */
|
2018-08-31 05:43:43 +08:00
|
|
|
#if CONFIG_IS_ENABLED(EFI_LOADER)
|
2016-03-04 08:09:59 +08:00
|
|
|
|
2016-03-04 08:09:58 +08:00
|
|
|
#include <linux/list.h>
|
2020-04-14 10:51:39 +08:00
|
|
|
#include <linux/oid_registry.h>
|
2016-03-04 08:09:58 +08:00
|
|
|
|
2018-06-28 18:45:32 +08:00
|
|
|
/* Maximum number of configuration tables */
|
|
|
|
#define EFI_MAX_CONFIGURATION_TABLES 16
|
|
|
|
|
2018-09-21 03:58:23 +08:00
|
|
|
/* GUID used by the root node */
|
|
|
|
#define U_BOOT_GUID \
|
|
|
|
EFI_GUID(0xe61d73b9, 0xa384, 0x4acc, \
|
|
|
|
0xae, 0xab, 0x82, 0xe8, 0x28, 0xf3, 0x62, 0x8b)
|
efi_loader: device_path: support Sandbox's "host" devices
Sandbox's "host" devices are currently described as UCLASS_ROOT udevice
with DEV_IF_HOST block device. As the current implementation of
efi_device_path doesn't support such a type, any "host" device
on sandbox cannot be seen as a distinct object.
For example,
=> host bind 0 /foo/disk.img
=> efi devices
Scanning disk host0...
Found 1 disks
Device Device Path
================ ====================
0000000015c19970 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
0000000015c19d70 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
=> efi dh
Handle Protocols
================ ====================
0000000015c19970 Device Path, Device Path To Text, Device Path Utilities, Unicode Collation 2, HII String, HII Database, HII Config Routing
0000000015c19ba0 Driver Binding
0000000015c19c10 Simple Text Output
0000000015c19c80 Simple Text Input, Simple Text Input Ex
0000000015c19d70 Block IO, Device Path, Simple File System
As you can see here, efi_root (0x0000000015c19970) and host0 device
(0x0000000015c19d70) have the same representation of device path.
This is not only inconvenient, but also confusing since two different
efi objects are associated with the same device path and
efi_dp_find_obj() will possibly return a wrong result.
Solution:
Each "host" device should be given an additional device path node
of "vendor device path" to make it distinguishable.
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-09-12 12:52:35 +08:00
|
|
|
/* GUID used as host device on sandbox */
|
|
|
|
#define U_BOOT_HOST_DEV_GUID \
|
|
|
|
EFI_GUID(0xbbe4e671, 0x5773, 0x4ea1, \
|
|
|
|
0x9a, 0xab, 0x3a, 0x7d, 0xbf, 0x40, 0xc4, 0x82)
|
2020-05-21 04:39:35 +08:00
|
|
|
/* GUID used as root for virtio devices */
|
|
|
|
#define U_BOOT_VIRTIO_DEV_GUID \
|
|
|
|
EFI_GUID(0x63293792, 0xadf5, 0x9325, \
|
|
|
|
0xb9, 0x9f, 0x4e, 0x0e, 0x45, 0x5c, 0x1b, 0x1e)
|
2018-09-21 03:58:23 +08:00
|
|
|
|
2019-11-28 13:46:09 +08:00
|
|
|
/* Use internal device tree when starting UEFI application */
|
2019-12-08 08:07:01 +08:00
|
|
|
#define EFI_FDT_USE_INTERNAL NULL
|
2019-11-28 13:46:09 +08:00
|
|
|
|
2019-04-16 12:24:20 +08:00
|
|
|
/* Root node */
|
|
|
|
extern efi_handle_t efi_root;
|
|
|
|
|
2020-03-20 02:21:58 +08:00
|
|
|
/* Set to EFI_SUCCESS when initialized */
|
|
|
|
extern efi_status_t efi_obj_list_initialized;
|
|
|
|
|
2020-11-13 04:26:28 +08:00
|
|
|
/* Flag used by the selftest to avoid detaching devices in ExitBootServices() */
|
|
|
|
extern bool efi_st_keep_devices;
|
|
|
|
|
2020-03-19 22:16:31 +08:00
|
|
|
/* EFI system partition */
|
|
|
|
extern struct efi_system_partition {
|
|
|
|
enum if_type if_type;
|
|
|
|
int devnum;
|
|
|
|
u8 part;
|
|
|
|
} efi_system_partition;
|
|
|
|
|
2017-07-27 20:04:18 +08:00
|
|
|
int __efi_entry_check(void);
|
|
|
|
int __efi_exit_check(void);
|
2017-08-18 23:45:16 +08:00
|
|
|
const char *__efi_nesting(void);
|
2017-07-27 20:04:19 +08:00
|
|
|
const char *__efi_nesting_inc(void);
|
|
|
|
const char *__efi_nesting_dec(void);
|
2017-07-27 20:04:18 +08:00
|
|
|
|
2017-07-27 20:04:17 +08:00
|
|
|
/*
|
|
|
|
* Enter the u-boot world from UEFI:
|
|
|
|
*/
|
2016-03-04 08:09:59 +08:00
|
|
|
#define EFI_ENTRY(format, ...) do { \
|
2017-07-27 20:04:18 +08:00
|
|
|
assert(__efi_entry_check()); \
|
2017-07-27 20:04:19 +08:00
|
|
|
debug("%sEFI: Entry %s(" format ")\n", __efi_nesting_inc(), \
|
|
|
|
__func__, ##__VA_ARGS__); \
|
2016-03-04 08:09:59 +08:00
|
|
|
} while(0)
|
|
|
|
|
2017-07-27 20:04:17 +08:00
|
|
|
/*
|
|
|
|
* Exit the u-boot world back to UEFI:
|
|
|
|
*/
|
2017-07-24 22:31:52 +08:00
|
|
|
#define EFI_EXIT(ret) ({ \
|
2017-08-18 00:57:36 +08:00
|
|
|
typeof(ret) _r = ret; \
|
2017-07-27 20:04:19 +08:00
|
|
|
debug("%sEFI: Exit: %s: %u\n", __efi_nesting_dec(), \
|
2017-08-18 00:57:36 +08:00
|
|
|
__func__, (u32)((uintptr_t) _r & ~EFI_ERROR_MASK)); \
|
2017-07-27 20:04:18 +08:00
|
|
|
assert(__efi_exit_check()); \
|
|
|
|
_r; \
|
2017-07-24 22:31:52 +08:00
|
|
|
})
|
2016-03-04 08:09:59 +08:00
|
|
|
|
2017-07-27 20:04:17 +08:00
|
|
|
/*
|
2017-09-15 16:06:10 +08:00
|
|
|
* Call non-void UEFI function from u-boot and retrieve return value:
|
2017-07-27 20:04:17 +08:00
|
|
|
*/
|
2017-09-15 16:06:10 +08:00
|
|
|
#define EFI_CALL(exp) ({ \
|
|
|
|
debug("%sEFI: Call: %s\n", __efi_nesting_inc(), #exp); \
|
|
|
|
assert(__efi_exit_check()); \
|
|
|
|
typeof(exp) _r = exp; \
|
|
|
|
assert(__efi_entry_check()); \
|
|
|
|
debug("%sEFI: %lu returned by %s\n", __efi_nesting_dec(), \
|
|
|
|
(unsigned long)((uintptr_t)_r & ~EFI_ERROR_MASK), #exp); \
|
|
|
|
_r; \
|
|
|
|
})
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Call void UEFI function from u-boot:
|
|
|
|
*/
|
|
|
|
#define EFI_CALL_VOID(exp) do { \
|
2017-07-27 20:04:19 +08:00
|
|
|
debug("%sEFI: Call: %s\n", __efi_nesting_inc(), #exp); \
|
2017-07-27 20:04:18 +08:00
|
|
|
assert(__efi_exit_check()); \
|
2017-07-27 20:04:17 +08:00
|
|
|
exp; \
|
2017-07-27 20:04:18 +08:00
|
|
|
assert(__efi_entry_check()); \
|
2017-07-27 20:04:19 +08:00
|
|
|
debug("%sEFI: Return From: %s\n", __efi_nesting_dec(), #exp); \
|
2017-07-27 20:04:17 +08:00
|
|
|
} while(0)
|
|
|
|
|
2017-08-18 23:45:16 +08:00
|
|
|
/*
|
2018-01-11 15:16:01 +08:00
|
|
|
* Write an indented message with EFI prefix
|
2017-08-18 23:45:16 +08:00
|
|
|
*/
|
2018-01-11 15:16:01 +08:00
|
|
|
#define EFI_PRINT(format, ...) ({ \
|
|
|
|
debug("%sEFI: " format, __efi_nesting(), \
|
|
|
|
##__VA_ARGS__); \
|
2017-08-18 23:45:16 +08:00
|
|
|
})
|
|
|
|
|
2018-04-23 13:59:47 +08:00
|
|
|
#ifdef CONFIG_SYS_CACHELINE_SIZE
|
|
|
|
#define EFI_CACHELINE_SIZE CONFIG_SYS_CACHELINE_SIZE
|
|
|
|
#else
|
|
|
|
/* Just use the greatest cache flush alignment requirement I'm aware of */
|
|
|
|
#define EFI_CACHELINE_SIZE 128
|
|
|
|
#endif
|
|
|
|
|
2018-07-02 18:53:55 +08:00
|
|
|
/* Key identifying current memory map */
|
|
|
|
extern efi_uintn_t efi_memory_map_key;
|
|
|
|
|
2016-03-04 08:10:01 +08:00
|
|
|
extern struct efi_runtime_services efi_runtime_services;
|
2016-03-04 08:09:59 +08:00
|
|
|
extern struct efi_system_table systab;
|
|
|
|
|
2017-10-27 01:25:59 +08:00
|
|
|
extern struct efi_simple_text_output_protocol efi_con_out;
|
2018-09-08 16:20:10 +08:00
|
|
|
extern struct efi_simple_text_input_protocol efi_con_in;
|
2017-10-27 01:25:59 +08:00
|
|
|
extern struct efi_console_control_protocol efi_console_control;
|
2017-07-12 04:06:25 +08:00
|
|
|
extern const struct efi_device_path_to_text_protocol efi_device_path_to_text;
|
2018-03-10 00:43:21 +08:00
|
|
|
/* implementation of the EFI_DEVICE_PATH_UTILITIES_PROTOCOL */
|
|
|
|
extern const struct efi_device_path_utilities_protocol
|
|
|
|
efi_device_path_utilities;
|
2019-05-17 00:19:00 +08:00
|
|
|
/* current version of the EFI_UNICODE_COLLATION_PROTOCOL */
|
2018-09-05 01:34:58 +08:00
|
|
|
extern const struct efi_unicode_collation_protocol
|
2019-05-16 13:52:58 +08:00
|
|
|
efi_unicode_collation_protocol2;
|
2019-01-21 11:13:00 +08:00
|
|
|
extern const struct efi_hii_config_routing_protocol efi_hii_config_routing;
|
|
|
|
extern const struct efi_hii_config_access_protocol efi_hii_config_access;
|
2019-01-21 11:12:57 +08:00
|
|
|
extern const struct efi_hii_database_protocol efi_hii_database;
|
|
|
|
extern const struct efi_hii_string_protocol efi_hii_string;
|
2016-03-04 08:10:00 +08:00
|
|
|
|
2017-09-14 06:05:30 +08:00
|
|
|
uint16_t *efi_dp_str(struct efi_device_path *dp);
|
|
|
|
|
2018-09-21 03:58:23 +08:00
|
|
|
/* GUID of the U-Boot root node */
|
|
|
|
extern const efi_guid_t efi_u_boot_guid;
|
efi_loader: device_path: support Sandbox's "host" devices
Sandbox's "host" devices are currently described as UCLASS_ROOT udevice
with DEV_IF_HOST block device. As the current implementation of
efi_device_path doesn't support such a type, any "host" device
on sandbox cannot be seen as a distinct object.
For example,
=> host bind 0 /foo/disk.img
=> efi devices
Scanning disk host0...
Found 1 disks
Device Device Path
================ ====================
0000000015c19970 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
0000000015c19d70 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
=> efi dh
Handle Protocols
================ ====================
0000000015c19970 Device Path, Device Path To Text, Device Path Utilities, Unicode Collation 2, HII String, HII Database, HII Config Routing
0000000015c19ba0 Driver Binding
0000000015c19c10 Simple Text Output
0000000015c19c80 Simple Text Input, Simple Text Input Ex
0000000015c19d70 Block IO, Device Path, Simple File System
As you can see here, efi_root (0x0000000015c19970) and host0 device
(0x0000000015c19d70) have the same representation of device path.
This is not only inconvenient, but also confusing since two different
efi objects are associated with the same device path and
efi_dp_find_obj() will possibly return a wrong result.
Solution:
Each "host" device should be given an additional device path node
of "vendor device path" to make it distinguishable.
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-09-12 12:52:35 +08:00
|
|
|
#ifdef CONFIG_SANDBOX
|
|
|
|
/* GUID of U-Boot host device on sandbox */
|
|
|
|
extern const efi_guid_t efi_guid_host_dev;
|
|
|
|
#endif
|
2018-01-20 03:24:45 +08:00
|
|
|
/* GUID of the EFI_BLOCK_IO_PROTOCOL */
|
|
|
|
extern const efi_guid_t efi_block_io_guid;
|
2017-09-14 06:05:38 +08:00
|
|
|
extern const efi_guid_t efi_global_variable_guid;
|
2016-03-04 08:10:00 +08:00
|
|
|
extern const efi_guid_t efi_guid_console_control;
|
2016-03-04 08:09:58 +08:00
|
|
|
extern const efi_guid_t efi_guid_device_path;
|
2018-01-11 15:16:02 +08:00
|
|
|
/* GUID of the EFI_DRIVER_BINDING_PROTOCOL */
|
|
|
|
extern const efi_guid_t efi_guid_driver_binding_protocol;
|
2018-02-18 22:17:51 +08:00
|
|
|
/* event group ExitBootServices() invoked */
|
|
|
|
extern const efi_guid_t efi_guid_event_group_exit_boot_services;
|
|
|
|
/* event group SetVirtualAddressMap() invoked */
|
|
|
|
extern const efi_guid_t efi_guid_event_group_virtual_address_change;
|
|
|
|
/* event group memory map changed */
|
|
|
|
extern const efi_guid_t efi_guid_event_group_memory_map_change;
|
|
|
|
/* event group boot manager about to boot */
|
|
|
|
extern const efi_guid_t efi_guid_event_group_ready_to_boot;
|
|
|
|
/* event group ResetSystem() invoked (before ExitBootServices) */
|
|
|
|
extern const efi_guid_t efi_guid_event_group_reset_system;
|
2018-03-03 22:29:03 +08:00
|
|
|
/* GUID of the device tree table */
|
|
|
|
extern const efi_guid_t efi_guid_fdt;
|
2016-03-04 08:09:58 +08:00
|
|
|
extern const efi_guid_t efi_guid_loaded_image;
|
2019-03-27 12:40:32 +08:00
|
|
|
extern const efi_guid_t efi_guid_loaded_image_device_path;
|
2017-07-12 04:06:25 +08:00
|
|
|
extern const efi_guid_t efi_guid_device_path_to_text_protocol;
|
2017-09-14 06:05:34 +08:00
|
|
|
extern const efi_guid_t efi_simple_file_system_protocol_guid;
|
|
|
|
extern const efi_guid_t efi_file_info_guid;
|
2018-04-04 21:42:11 +08:00
|
|
|
/* GUID for file system information */
|
|
|
|
extern const efi_guid_t efi_file_system_info_guid;
|
2018-03-10 00:43:21 +08:00
|
|
|
extern const efi_guid_t efi_guid_device_path_utilities_protocol;
|
2019-05-17 00:19:00 +08:00
|
|
|
/* GUID of the deprecated Unicode collation protocol */
|
|
|
|
extern const efi_guid_t efi_guid_unicode_collation_protocol;
|
2020-12-04 10:33:41 +08:00
|
|
|
/* GUIDs of the Load File and Load File2 protocol */
|
|
|
|
extern const efi_guid_t efi_guid_load_file_protocol;
|
|
|
|
extern const efi_guid_t efi_guid_load_file2_protocol;
|
2018-09-05 01:34:58 +08:00
|
|
|
/* GUID of the Unicode collation protocol */
|
2019-05-16 13:52:58 +08:00
|
|
|
extern const efi_guid_t efi_guid_unicode_collation_protocol2;
|
2019-01-21 11:13:00 +08:00
|
|
|
extern const efi_guid_t efi_guid_hii_config_routing_protocol;
|
|
|
|
extern const efi_guid_t efi_guid_hii_config_access_protocol;
|
2019-01-21 11:12:57 +08:00
|
|
|
extern const efi_guid_t efi_guid_hii_database_protocol;
|
|
|
|
extern const efi_guid_t efi_guid_hii_string_protocol;
|
2020-04-14 10:51:39 +08:00
|
|
|
/* GUIDs for authentication */
|
|
|
|
extern const efi_guid_t efi_guid_image_security_database;
|
|
|
|
extern const efi_guid_t efi_guid_sha256;
|
|
|
|
extern const efi_guid_t efi_guid_cert_x509;
|
|
|
|
extern const efi_guid_t efi_guid_cert_x509_sha256;
|
2020-04-14 10:51:41 +08:00
|
|
|
extern const efi_guid_t efi_guid_cert_type_pkcs7;
|
2016-03-04 08:09:58 +08:00
|
|
|
|
2019-12-29 02:31:06 +08:00
|
|
|
/* GUID of RNG protocol */
|
|
|
|
extern const efi_guid_t efi_guid_rng_protocol;
|
2020-11-17 08:27:55 +08:00
|
|
|
/* GUID of capsule update result */
|
|
|
|
extern const efi_guid_t efi_guid_capsule_report;
|
2020-11-30 17:12:11 +08:00
|
|
|
/* GUID of firmware management protocol */
|
|
|
|
extern const efi_guid_t efi_guid_firmware_management_protocol;
|
2021-03-03 01:26:38 +08:00
|
|
|
/* GUID for the ESRT */
|
|
|
|
extern const efi_guid_t efi_esrt_guid;
|
2019-12-29 02:31:06 +08:00
|
|
|
|
2016-03-04 08:10:01 +08:00
|
|
|
extern unsigned int __efi_runtime_start, __efi_runtime_stop;
|
|
|
|
extern unsigned int __efi_runtime_rel_start, __efi_runtime_rel_stop;
|
|
|
|
|
2019-05-21 23:51:35 +08:00
|
|
|
/**
|
|
|
|
* struct efi_open_protocol_info_item - open protocol info item
|
|
|
|
*
|
2018-01-11 15:15:57 +08:00
|
|
|
* When a protocol is opened a open protocol info entry is created.
|
|
|
|
* These are maintained in a list.
|
2019-05-21 23:51:35 +08:00
|
|
|
*
|
|
|
|
* @link: link to the list of open protocol info entries of a protocol
|
|
|
|
* @info: information about the opening of a protocol
|
2018-01-11 15:15:57 +08:00
|
|
|
*/
|
|
|
|
struct efi_open_protocol_info_item {
|
|
|
|
struct list_head link;
|
|
|
|
struct efi_open_protocol_info_entry info;
|
|
|
|
};
|
|
|
|
|
2019-05-21 23:51:35 +08:00
|
|
|
/**
|
|
|
|
* struct efi_handler - single protocol interface of a handle
|
|
|
|
*
|
2016-03-04 08:09:59 +08:00
|
|
|
* When the UEFI payload wants to open a protocol on an object to get its
|
|
|
|
* interface (usually a struct with callback functions), this struct maps the
|
2018-01-11 15:15:57 +08:00
|
|
|
* protocol GUID to the respective protocol interface
|
2019-05-21 23:51:35 +08:00
|
|
|
*
|
|
|
|
* @link: link to the list of protocols of a handle
|
|
|
|
* @guid: GUID of the protocol
|
|
|
|
* @protocol_interface: protocol interface
|
2021-02-25 15:02:37 +08:00
|
|
|
* @open_infos: link to the list of open protocol info items
|
2018-01-11 15:15:57 +08:00
|
|
|
*/
|
2016-03-04 08:09:59 +08:00
|
|
|
struct efi_handler {
|
2017-11-26 21:05:17 +08:00
|
|
|
struct list_head link;
|
2016-03-04 08:09:59 +08:00
|
|
|
const efi_guid_t *guid;
|
2017-07-12 04:06:14 +08:00
|
|
|
void *protocol_interface;
|
2018-01-11 15:15:57 +08:00
|
|
|
struct list_head open_infos;
|
2016-03-04 08:09:59 +08:00
|
|
|
};
|
|
|
|
|
2019-05-01 20:20:18 +08:00
|
|
|
/**
|
|
|
|
* enum efi_object_type - type of EFI object
|
|
|
|
*
|
|
|
|
* In UnloadImage we must be able to identify if the handle relates to a
|
|
|
|
* started image.
|
|
|
|
*/
|
|
|
|
enum efi_object_type {
|
2021-02-25 15:02:37 +08:00
|
|
|
/** @EFI_OBJECT_TYPE_UNDEFINED: undefined image type */
|
2019-05-01 20:20:18 +08:00
|
|
|
EFI_OBJECT_TYPE_UNDEFINED = 0,
|
2021-02-25 15:02:37 +08:00
|
|
|
/** @EFI_OBJECT_TYPE_U_BOOT_FIRMWARE: U-Boot firmware */
|
2019-05-05 22:55:06 +08:00
|
|
|
EFI_OBJECT_TYPE_U_BOOT_FIRMWARE,
|
2021-02-25 15:02:37 +08:00
|
|
|
/** @EFI_OBJECT_TYPE_LOADED_IMAGE: loaded image (not started) */
|
2019-05-01 20:20:18 +08:00
|
|
|
EFI_OBJECT_TYPE_LOADED_IMAGE,
|
2021-02-25 15:02:37 +08:00
|
|
|
/** @EFI_OBJECT_TYPE_STARTED_IMAGE: started image */
|
2019-05-01 20:20:18 +08:00
|
|
|
EFI_OBJECT_TYPE_STARTED_IMAGE,
|
|
|
|
};
|
|
|
|
|
2018-09-26 11:27:55 +08:00
|
|
|
/**
|
|
|
|
* struct efi_object - dereferenced EFI handle
|
|
|
|
*
|
|
|
|
* @link: pointers to put the handle into a linked list
|
|
|
|
* @protocols: linked list with the protocol interfaces installed on this
|
|
|
|
* handle
|
2021-02-25 15:02:37 +08:00
|
|
|
* @type: image type if the handle relates to an image
|
2018-09-26 11:27:55 +08:00
|
|
|
*
|
|
|
|
* UEFI offers a flexible and expandable object model. The objects in the UEFI
|
|
|
|
* API are devices, drivers, and loaded images. struct efi_object is our storage
|
|
|
|
* structure for these objects.
|
|
|
|
*
|
|
|
|
* When including this structure into a larger structure always put it first so
|
|
|
|
* that when deleting a handle the whole encompassing structure can be freed.
|
2016-03-04 08:09:59 +08:00
|
|
|
*
|
2018-09-26 11:27:55 +08:00
|
|
|
* A pointer to this structure is referred to as a handle. Typedef efi_handle_t
|
|
|
|
* has been created for such pointers.
|
2016-03-04 08:09:59 +08:00
|
|
|
*/
|
|
|
|
struct efi_object {
|
|
|
|
/* Every UEFI object is part of a global object list */
|
|
|
|
struct list_head link;
|
2017-11-26 21:05:17 +08:00
|
|
|
/* The list of protocols */
|
|
|
|
struct list_head protocols;
|
2019-05-01 20:20:18 +08:00
|
|
|
enum efi_object_type type;
|
2016-03-04 08:09:59 +08:00
|
|
|
};
|
|
|
|
|
2020-04-14 10:51:44 +08:00
|
|
|
enum efi_image_auth_status {
|
|
|
|
EFI_IMAGE_AUTH_FAILED = 0,
|
|
|
|
EFI_IMAGE_AUTH_PASSED,
|
|
|
|
};
|
|
|
|
|
2018-09-23 23:21:51 +08:00
|
|
|
/**
|
|
|
|
* struct efi_loaded_image_obj - handle of a loaded image
|
2018-09-26 11:27:56 +08:00
|
|
|
*
|
|
|
|
* @header: EFI object header
|
2019-04-30 23:57:30 +08:00
|
|
|
* @exit_status: exit status passed to Exit()
|
|
|
|
* @exit_data_size: exit data size passed to Exit()
|
|
|
|
* @exit_data: exit data passed to Exit()
|
2020-12-29 05:42:51 +08:00
|
|
|
* @exit_jmp: long jump buffer for returning from started image
|
2018-09-26 11:27:56 +08:00
|
|
|
* @entry: entry address of the relocated image
|
2020-12-29 05:42:51 +08:00
|
|
|
* @image_type: indicates if the image is an applicition or a driver
|
|
|
|
* @auth_status: indicates if the image is authenticated
|
2018-09-23 23:21:51 +08:00
|
|
|
*/
|
|
|
|
struct efi_loaded_image_obj {
|
2018-09-26 11:27:56 +08:00
|
|
|
struct efi_object header;
|
2020-12-29 06:24:40 +08:00
|
|
|
efi_status_t *exit_status;
|
2019-04-30 23:57:30 +08:00
|
|
|
efi_uintn_t *exit_data_size;
|
|
|
|
u16 **exit_data;
|
2020-12-29 06:24:40 +08:00
|
|
|
struct jmp_buf_data *exit_jmp;
|
2018-09-23 23:21:51 +08:00
|
|
|
EFIAPI efi_status_t (*entry)(efi_handle_t image_handle,
|
|
|
|
struct efi_system_table *st);
|
2019-05-02 02:07:04 +08:00
|
|
|
u16 image_type;
|
2020-04-14 10:51:44 +08:00
|
|
|
enum efi_image_auth_status auth_status;
|
2018-09-23 23:21:51 +08:00
|
|
|
};
|
|
|
|
|
2017-07-19 02:17:18 +08:00
|
|
|
/**
|
|
|
|
* struct efi_event
|
|
|
|
*
|
2018-02-18 22:17:50 +08:00
|
|
|
* @link: Link to list of all events
|
2019-06-06 03:00:39 +08:00
|
|
|
* @queue_link: Link to the list of queued events
|
2017-07-19 02:17:18 +08:00
|
|
|
* @type: Type of event, see efi_create_event
|
|
|
|
* @notify_tpl: Task priority level of notifications
|
2021-02-25 15:02:37 +08:00
|
|
|
* @notify_function: Function to call when the event is triggered
|
2017-07-19 02:17:18 +08:00
|
|
|
* @notify_context: Data to be passed to the notify function
|
2018-02-18 22:17:52 +08:00
|
|
|
* @group: Event group
|
2018-02-18 22:17:50 +08:00
|
|
|
* @trigger_time: Period of the timer
|
|
|
|
* @trigger_next: Next time to trigger the timer
|
2017-07-19 02:17:18 +08:00
|
|
|
* @trigger_type: Type of timer, see efi_set_timer
|
2018-02-18 22:17:50 +08:00
|
|
|
* @is_signaled: The event occurred. The event is in the signaled state.
|
2017-07-19 02:17:18 +08:00
|
|
|
*/
|
|
|
|
struct efi_event {
|
2018-02-18 22:17:50 +08:00
|
|
|
struct list_head link;
|
2019-06-06 03:00:39 +08:00
|
|
|
struct list_head queue_link;
|
2017-07-20 01:22:34 +08:00
|
|
|
uint32_t type;
|
2017-11-07 04:17:47 +08:00
|
|
|
efi_uintn_t notify_tpl;
|
2017-07-19 02:17:18 +08:00
|
|
|
void (EFIAPI *notify_function)(struct efi_event *event, void *context);
|
|
|
|
void *notify_context;
|
2018-02-18 22:17:52 +08:00
|
|
|
const efi_guid_t *group;
|
2017-07-19 02:17:18 +08:00
|
|
|
u64 trigger_next;
|
|
|
|
u64 trigger_time;
|
2017-07-20 01:22:34 +08:00
|
|
|
enum efi_timer_delay trigger_type;
|
2017-10-04 21:03:24 +08:00
|
|
|
bool is_signaled;
|
2017-07-19 02:17:18 +08:00
|
|
|
};
|
|
|
|
|
2016-03-04 08:09:59 +08:00
|
|
|
/* This list contains all UEFI objects we know of */
|
|
|
|
extern struct list_head efi_obj_list;
|
2018-02-18 22:17:52 +08:00
|
|
|
/* List of all events */
|
|
|
|
extern struct list_head efi_events;
|
2016-03-04 08:09:59 +08:00
|
|
|
|
2019-05-22 00:19:01 +08:00
|
|
|
/**
|
|
|
|
* struct efi_protocol_notification - handle for notified protocol
|
|
|
|
*
|
|
|
|
* When a protocol interface is installed for which an event was registered with
|
|
|
|
* the RegisterProtocolNotify() service this structure is used to hold the
|
|
|
|
* handle on which the protocol interface was installed.
|
|
|
|
*
|
|
|
|
* @link: link to list of all handles notified for this event
|
|
|
|
* @handle: handle on which the notified protocol interface was installed
|
|
|
|
*/
|
|
|
|
struct efi_protocol_notification {
|
|
|
|
struct list_head link;
|
|
|
|
efi_handle_t handle;
|
|
|
|
};
|
|
|
|
|
2019-05-04 23:27:54 +08:00
|
|
|
/**
|
2021-02-25 15:02:37 +08:00
|
|
|
* struct efi_register_notify_event - event registered by
|
|
|
|
* RegisterProtocolNotify()
|
2019-05-04 23:27:54 +08:00
|
|
|
*
|
|
|
|
* The address of this structure serves as registration value.
|
|
|
|
*
|
2019-05-22 00:19:01 +08:00
|
|
|
* @link: link to list of all registered events
|
|
|
|
* @event: registered event. The same event may registered for multiple
|
|
|
|
* GUIDs.
|
|
|
|
* @protocol: protocol for which the event is registered
|
|
|
|
* @handles: linked list of all handles on which the notified protocol was
|
|
|
|
* installed
|
2019-05-04 23:27:54 +08:00
|
|
|
*/
|
|
|
|
struct efi_register_notify_event {
|
|
|
|
struct list_head link;
|
|
|
|
struct efi_event *event;
|
|
|
|
efi_guid_t protocol;
|
2019-05-22 00:19:01 +08:00
|
|
|
struct list_head handles;
|
2019-05-04 23:27:54 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/* List of all events registered by RegisterProtocolNotify() */
|
|
|
|
extern struct list_head efi_register_notify_events;
|
|
|
|
|
efi_loader: move efi_init_obj_list() to a new efi_setup.c
The function, efi_init_obj_list(), can be shared in different pseudo efi
applications, like bootefi/bootmgr as well as my efishell. Moreover, it
will be utilized to extend efi initialization, for example, my "removable
disk support" patch and "capsule-on-disk support" patch in the future.
So with this patch, it will be moved to a new file, efi_setup.c, under
lib/efi_loader and exported, making no changes in functionality.
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Remove lines deactivated by #if 1 #else
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
Signed-off-by: Alexander Graf <agraf@suse.de>
2018-12-30 22:16:55 +08:00
|
|
|
/* Initialize efi execution environment */
|
|
|
|
efi_status_t efi_init_obj_list(void);
|
2019-12-08 08:07:01 +08:00
|
|
|
/* Install device tree */
|
|
|
|
efi_status_t efi_install_fdt(void *fdt);
|
2019-12-08 03:51:06 +08:00
|
|
|
/* Run loaded UEFI image */
|
|
|
|
efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size);
|
2019-06-20 19:52:16 +08:00
|
|
|
/* Initialize variable services */
|
|
|
|
efi_status_t efi_init_variables(void);
|
2019-06-20 21:25:48 +08:00
|
|
|
/* Notify ExitBootServices() is called */
|
|
|
|
void efi_variables_boot_exit_notify(void);
|
2018-09-21 03:58:23 +08:00
|
|
|
/* Called by bootefi to initialize root node */
|
|
|
|
efi_status_t efi_root_node_register(void);
|
2018-06-28 18:45:31 +08:00
|
|
|
/* Called by bootefi to initialize runtime */
|
|
|
|
efi_status_t efi_initialize_system_table(void);
|
2019-07-05 23:42:16 +08:00
|
|
|
/* efi_runtime_detach() - detach unimplemented runtime functions */
|
|
|
|
void efi_runtime_detach(void);
|
2020-03-25 01:05:22 +08:00
|
|
|
/* efi_convert_pointer() - convert pointer to virtual address */
|
|
|
|
efi_status_t EFIAPI efi_convert_pointer(efi_uintn_t debug_disposition,
|
|
|
|
void **address);
|
2020-12-13 17:30:24 +08:00
|
|
|
/* Carve out DT reserved memory ranges */
|
|
|
|
void efi_carve_out_dt_rsv(void *fdt);
|
2017-07-19 02:17:22 +08:00
|
|
|
/* Called by bootefi to make console interface available */
|
2018-10-02 12:08:26 +08:00
|
|
|
efi_status_t efi_console_register(void);
|
2016-03-04 08:10:02 +08:00
|
|
|
/* Called by bootefi to make all disk storage accessible as EFI objects */
|
2018-02-10 03:55:47 +08:00
|
|
|
efi_status_t efi_disk_register(void);
|
2020-09-25 18:50:19 +08:00
|
|
|
/* Called by efi_init_obj_list() to install EFI_RNG_PROTOCOL */
|
|
|
|
efi_status_t efi_rng_register(void);
|
2020-11-11 17:18:11 +08:00
|
|
|
/* Called by efi_init_obj_list() to install EFI_TCG2_PROTOCOL */
|
|
|
|
efi_status_t efi_tcg2_register(void);
|
2018-01-20 03:24:47 +08:00
|
|
|
/* Create handles and protocols for the partitions of a block device */
|
|
|
|
int efi_disk_create_partitions(efi_handle_t parent, struct blk_desc *desc,
|
|
|
|
const char *if_typename, int diskid,
|
|
|
|
const char *pdevname);
|
2020-04-27 17:48:20 +08:00
|
|
|
/* Check if it is EFI system partition */
|
|
|
|
bool efi_disk_is_system_part(efi_handle_t handle);
|
2016-03-16 01:38:21 +08:00
|
|
|
/* Called by bootefi to make GOP (graphical) interface available */
|
2018-03-03 22:28:55 +08:00
|
|
|
efi_status_t efi_gop_register(void);
|
2016-05-07 03:01:01 +08:00
|
|
|
/* Called by bootefi to make the network interface available */
|
2018-03-03 22:28:56 +08:00
|
|
|
efi_status_t efi_net_register(void);
|
2017-10-19 00:13:04 +08:00
|
|
|
/* Called by bootefi to make the watchdog available */
|
2018-03-03 22:28:57 +08:00
|
|
|
efi_status_t efi_watchdog_register(void);
|
2020-02-21 15:55:45 +08:00
|
|
|
efi_status_t efi_initrd_register(void);
|
2021-03-18 03:55:00 +08:00
|
|
|
void efi_initrd_deregister(void);
|
2016-08-19 07:23:29 +08:00
|
|
|
/* Called by bootefi to make SMBIOS tables available */
|
2018-06-28 11:38:03 +08:00
|
|
|
/**
|
|
|
|
* efi_acpi_register() - write out ACPI tables
|
|
|
|
*
|
|
|
|
* Called by bootefi to make ACPI tables available
|
|
|
|
*
|
|
|
|
* @return 0 if OK, -ENOMEM if no memory is available for the tables
|
|
|
|
*/
|
|
|
|
efi_status_t efi_acpi_register(void);
|
2018-05-16 23:42:19 +08:00
|
|
|
/**
|
|
|
|
* efi_smbios_register() - write out SMBIOS tables
|
|
|
|
*
|
|
|
|
* Called by bootefi to make SMBIOS tables available
|
|
|
|
*
|
|
|
|
* @return 0 if OK, -ENOMEM if no memory is available for the tables
|
|
|
|
*/
|
2018-03-03 22:28:54 +08:00
|
|
|
efi_status_t efi_smbios_register(void);
|
2016-05-07 03:01:01 +08:00
|
|
|
|
2017-09-14 06:05:34 +08:00
|
|
|
struct efi_simple_file_system_protocol *
|
|
|
|
efi_fs_from_path(struct efi_device_path *fp);
|
|
|
|
|
2016-05-07 03:01:01 +08:00
|
|
|
/* Called by networking code to memorize the dhcp ack package */
|
|
|
|
void efi_net_set_dhcp_ack(void *pkt, int len);
|
2017-10-19 00:13:04 +08:00
|
|
|
/* Called by efi_set_watchdog_timer to reset the timer */
|
|
|
|
efi_status_t efi_set_watchdog(unsigned long timeout);
|
2016-05-07 03:01:01 +08:00
|
|
|
|
2016-03-04 08:09:59 +08:00
|
|
|
/* Called from places to check whether a timer expired */
|
|
|
|
void efi_timer_check(void);
|
2021-01-12 19:40:32 +08:00
|
|
|
/* Check if a buffer contains a PE-COFF image */
|
|
|
|
efi_status_t efi_check_pe(void *buffer, size_t size, void **nt_header);
|
2016-03-04 08:09:59 +08:00
|
|
|
/* PE loader implementation */
|
2020-04-14 10:51:44 +08:00
|
|
|
efi_status_t efi_load_pe(struct efi_loaded_image_obj *handle,
|
|
|
|
void *efi, size_t efi_size,
|
2018-12-26 19:49:09 +08:00
|
|
|
struct efi_loaded_image *loaded_image_info);
|
2016-03-04 08:09:59 +08:00
|
|
|
/* Called once to store the pristine gd pointer */
|
|
|
|
void efi_save_gd(void);
|
2017-07-27 20:04:18 +08:00
|
|
|
/* Special case handler for error/abort that just tries to dtrt to get
|
|
|
|
* back to u-boot world */
|
2016-03-04 08:09:59 +08:00
|
|
|
void efi_restore_gd(void);
|
2016-03-04 08:10:01 +08:00
|
|
|
/* Call this to relocate the runtime section to an address space */
|
|
|
|
void efi_runtime_relocate(ulong offset, struct efi_mem_desc *map);
|
2016-03-04 08:10:14 +08:00
|
|
|
/* Call this to set the current device name */
|
2021-01-12 19:46:24 +08:00
|
|
|
void efi_set_bootdev(const char *dev, const char *devnr, const char *path,
|
|
|
|
void *buffer, size_t buffer_size);
|
2017-11-26 21:05:23 +08:00
|
|
|
/* Add a new object to the object list. */
|
2018-09-26 11:27:55 +08:00
|
|
|
void efi_add_handle(efi_handle_t obj);
|
2017-10-27 01:25:49 +08:00
|
|
|
/* Create handle */
|
2018-01-11 15:16:09 +08:00
|
|
|
efi_status_t efi_create_handle(efi_handle_t *handle);
|
2017-12-05 01:03:02 +08:00
|
|
|
/* Delete handle */
|
2018-09-26 11:27:55 +08:00
|
|
|
void efi_delete_handle(efi_handle_t obj);
|
2017-11-07 04:17:50 +08:00
|
|
|
/* Call this to validate a handle and find the EFI object for it */
|
2018-01-11 15:16:09 +08:00
|
|
|
struct efi_object *efi_search_obj(const efi_handle_t handle);
|
2019-03-05 13:53:31 +08:00
|
|
|
/* Load image */
|
|
|
|
efi_status_t EFIAPI efi_load_image(bool boot_policy,
|
|
|
|
efi_handle_t parent_image,
|
|
|
|
struct efi_device_path *file_path,
|
|
|
|
void *source_buffer,
|
|
|
|
efi_uintn_t source_size,
|
|
|
|
efi_handle_t *image_handle);
|
2018-12-26 20:28:09 +08:00
|
|
|
/* Start image */
|
|
|
|
efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle,
|
|
|
|
efi_uintn_t *exit_data_size,
|
|
|
|
u16 **exit_data);
|
2019-03-05 13:53:31 +08:00
|
|
|
/* Unload image */
|
|
|
|
efi_status_t EFIAPI efi_unload_image(efi_handle_t image_handle);
|
2017-10-27 01:25:53 +08:00
|
|
|
/* Find a protocol on a handle */
|
2018-01-11 15:16:09 +08:00
|
|
|
efi_status_t efi_search_protocol(const efi_handle_t handle,
|
2017-10-27 01:25:53 +08:00
|
|
|
const efi_guid_t *protocol_guid,
|
|
|
|
struct efi_handler **handler);
|
|
|
|
/* Install new protocol on a handle */
|
2018-01-11 15:16:09 +08:00
|
|
|
efi_status_t efi_add_protocol(const efi_handle_t handle,
|
|
|
|
const efi_guid_t *protocol,
|
2017-10-27 01:25:53 +08:00
|
|
|
void *protocol_interface);
|
2020-01-10 19:33:59 +08:00
|
|
|
/* Open protocol */
|
|
|
|
efi_status_t efi_protocol_open(struct efi_handler *handler,
|
|
|
|
void **protocol_interface, void *agent_handle,
|
|
|
|
void *controller_handle, uint32_t attributes);
|
|
|
|
|
2017-10-27 01:25:53 +08:00
|
|
|
/* Delete protocol from a handle */
|
2018-01-11 15:16:09 +08:00
|
|
|
efi_status_t efi_remove_protocol(const efi_handle_t handle,
|
|
|
|
const efi_guid_t *protocol,
|
2017-10-27 01:25:53 +08:00
|
|
|
void *protocol_interface);
|
|
|
|
/* Delete all protocols from a handle */
|
2018-01-11 15:16:09 +08:00
|
|
|
efi_status_t efi_remove_all_protocols(const efi_handle_t handle);
|
2019-04-12 12:59:49 +08:00
|
|
|
/* Install multiple protocol interfaces */
|
|
|
|
efi_status_t EFIAPI efi_install_multiple_protocol_interfaces
|
|
|
|
(efi_handle_t *handle, ...);
|
2020-03-17 10:12:36 +08:00
|
|
|
/* Get handles that support a given protocol */
|
|
|
|
efi_status_t EFIAPI efi_locate_handle_buffer(
|
|
|
|
enum efi_locate_search_type search_type,
|
|
|
|
const efi_guid_t *protocol, void *search_key,
|
|
|
|
efi_uintn_t *no_handles, efi_handle_t **buffer);
|
|
|
|
/* Close an previously opened protocol interface */
|
|
|
|
efi_status_t EFIAPI efi_close_protocol(efi_handle_t handle,
|
|
|
|
const efi_guid_t *protocol,
|
|
|
|
efi_handle_t agent_handle,
|
|
|
|
efi_handle_t controller_handle);
|
|
|
|
/* Open a protocol interface */
|
|
|
|
efi_status_t EFIAPI efi_handle_protocol(efi_handle_t handle,
|
|
|
|
const efi_guid_t *protocol,
|
|
|
|
void **protocol_interface);
|
2017-07-19 02:17:20 +08:00
|
|
|
/* Call this to create an event */
|
2017-11-07 04:17:47 +08:00
|
|
|
efi_status_t efi_create_event(uint32_t type, efi_uintn_t notify_tpl,
|
2017-07-19 02:17:20 +08:00
|
|
|
void (EFIAPI *notify_function) (
|
|
|
|
struct efi_event *event,
|
|
|
|
void *context),
|
2018-02-18 22:17:52 +08:00
|
|
|
void *notify_context, efi_guid_t *group,
|
|
|
|
struct efi_event **event);
|
2017-07-19 02:17:21 +08:00
|
|
|
/* Call this to set a timer */
|
2017-07-20 01:22:34 +08:00
|
|
|
efi_status_t efi_set_timer(struct efi_event *event, enum efi_timer_delay type,
|
2017-07-19 02:17:21 +08:00
|
|
|
uint64_t trigger_time);
|
2017-07-19 02:17:22 +08:00
|
|
|
/* Call this to signal an event */
|
2019-06-07 12:47:01 +08:00
|
|
|
void efi_signal_event(struct efi_event *event);
|
2016-03-04 08:10:01 +08:00
|
|
|
|
2017-09-14 06:05:34 +08:00
|
|
|
/* open file system: */
|
|
|
|
struct efi_simple_file_system_protocol *efi_simple_file_system(
|
|
|
|
struct blk_desc *desc, int part, struct efi_device_path *dp);
|
|
|
|
|
|
|
|
/* open file from device-path: */
|
|
|
|
struct efi_file_handle *efi_file_from_path(struct efi_device_path *fp);
|
|
|
|
|
2021-03-03 01:26:38 +08:00
|
|
|
/* Registers a callback function for a notification event. */
|
|
|
|
efi_status_t EFIAPI efi_register_protocol_notify(const efi_guid_t *protocol,
|
|
|
|
struct efi_event *event,
|
|
|
|
void **registration);
|
2021-03-18 03:54:59 +08:00
|
|
|
efi_status_t efi_file_size(struct efi_file_handle *fh, efi_uintn_t *size);
|
|
|
|
|
|
|
|
/* get a device path from a Boot#### option */
|
|
|
|
struct efi_device_path *efi_get_dp_from_boot(const efi_guid_t guid);
|
|
|
|
|
2018-11-19 00:58:49 +08:00
|
|
|
/**
|
|
|
|
* efi_size_in_pages() - convert size in bytes to size in pages
|
|
|
|
*
|
|
|
|
* This macro returns the number of EFI memory pages required to hold 'size'
|
|
|
|
* bytes.
|
|
|
|
*
|
|
|
|
* @size: size in bytes
|
|
|
|
* Return: size in pages
|
|
|
|
*/
|
2021-01-17 14:52:09 +08:00
|
|
|
#define efi_size_in_pages(size) (((size) + EFI_PAGE_MASK) >> EFI_PAGE_SHIFT)
|
2016-03-04 08:10:04 +08:00
|
|
|
/* Generic EFI memory allocator, call this to get memory */
|
|
|
|
void *efi_alloc(uint64_t len, int memory_type);
|
|
|
|
/* More specific EFI memory allocator, called by EFI payloads */
|
2017-11-07 04:17:48 +08:00
|
|
|
efi_status_t efi_allocate_pages(int type, int memory_type, efi_uintn_t pages,
|
2016-03-04 08:10:04 +08:00
|
|
|
uint64_t *memory);
|
2016-10-02 05:32:27 +08:00
|
|
|
/* EFI memory free function. */
|
2017-11-07 04:17:48 +08:00
|
|
|
efi_status_t efi_free_pages(uint64_t memory, efi_uintn_t pages);
|
2016-10-10 04:17:18 +08:00
|
|
|
/* EFI memory allocator for small allocations */
|
2017-11-07 04:17:48 +08:00
|
|
|
efi_status_t efi_allocate_pool(int pool_type, efi_uintn_t size,
|
2016-10-10 04:17:18 +08:00
|
|
|
void **buffer);
|
2016-10-10 04:17:26 +08:00
|
|
|
/* EFI pool memory free function. */
|
|
|
|
efi_status_t efi_free_pool(void *buffer);
|
2016-03-04 08:10:04 +08:00
|
|
|
/* Returns the EFI memory map */
|
2017-11-07 04:17:48 +08:00
|
|
|
efi_status_t efi_get_memory_map(efi_uintn_t *memory_map_size,
|
2016-03-04 08:10:04 +08:00
|
|
|
struct efi_mem_desc *memory_map,
|
2017-11-07 04:17:48 +08:00
|
|
|
efi_uintn_t *map_key,
|
|
|
|
efi_uintn_t *descriptor_size,
|
2016-03-04 08:10:04 +08:00
|
|
|
uint32_t *descriptor_version);
|
|
|
|
/* Adds a range into the EFI memory map */
|
2020-05-17 18:29:19 +08:00
|
|
|
efi_status_t efi_add_memory_map(u64 start, u64 size, int memory_type);
|
2019-09-04 01:43:43 +08:00
|
|
|
/* Adds a conventional range into the EFI memory map */
|
|
|
|
efi_status_t efi_add_conventional_memory_map(u64 ram_start, u64 ram_end,
|
|
|
|
u64 ram_top);
|
|
|
|
|
2018-01-22 02:29:30 +08:00
|
|
|
/* Called by board init to initialize the EFI drivers */
|
2018-02-01 19:53:32 +08:00
|
|
|
efi_status_t efi_driver_init(void);
|
2016-03-04 08:10:04 +08:00
|
|
|
/* Called by board init to initialize the EFI memory map */
|
|
|
|
int efi_memory_init(void);
|
2016-08-19 07:23:24 +08:00
|
|
|
/* Adds new or overrides configuration table entry to the system table */
|
|
|
|
efi_status_t efi_install_configuration_table(const efi_guid_t *guid, void *table);
|
2017-12-05 01:03:01 +08:00
|
|
|
/* Sets up a loaded image */
|
2018-09-23 23:21:51 +08:00
|
|
|
efi_status_t efi_setup_loaded_image(struct efi_device_path *device_path,
|
|
|
|
struct efi_device_path *file_path,
|
|
|
|
struct efi_loaded_image_obj **handle_ptr,
|
|
|
|
struct efi_loaded_image **info_ptr);
|
2018-04-05 17:56:21 +08:00
|
|
|
/* Print information about all loaded images */
|
|
|
|
void efi_print_image_infos(void *pc);
|
2016-03-04 08:10:04 +08:00
|
|
|
|
2016-05-12 00:25:48 +08:00
|
|
|
#ifdef CONFIG_EFI_LOADER_BOUNCE_BUFFER
|
|
|
|
extern void *efi_bounce_buffer;
|
|
|
|
#define EFI_LOADER_BOUNCE_BUFFER_SIZE (64 * 1024 * 1024)
|
|
|
|
#endif
|
|
|
|
|
2017-09-14 06:05:28 +08:00
|
|
|
|
|
|
|
struct efi_device_path *efi_dp_next(const struct efi_device_path *dp);
|
2017-10-27 01:25:48 +08:00
|
|
|
int efi_dp_match(const struct efi_device_path *a,
|
|
|
|
const struct efi_device_path *b);
|
2017-09-14 06:05:28 +08:00
|
|
|
struct efi_object *efi_dp_find_obj(struct efi_device_path *dp,
|
|
|
|
struct efi_device_path **rem);
|
2018-04-16 13:59:08 +08:00
|
|
|
/* get size of the first device path instance excluding end node */
|
|
|
|
efi_uintn_t efi_dp_instance_size(const struct efi_device_path *dp);
|
|
|
|
/* size of multi-instance device path excluding end node */
|
|
|
|
efi_uintn_t efi_dp_size(const struct efi_device_path *dp);
|
2017-09-14 06:05:28 +08:00
|
|
|
struct efi_device_path *efi_dp_dup(const struct efi_device_path *dp);
|
|
|
|
struct efi_device_path *efi_dp_append(const struct efi_device_path *dp1,
|
|
|
|
const struct efi_device_path *dp2);
|
|
|
|
struct efi_device_path *efi_dp_append_node(const struct efi_device_path *dp,
|
|
|
|
const struct efi_device_path *node);
|
2018-04-16 13:59:05 +08:00
|
|
|
/* Create a device path node of given type, sub-type, length */
|
|
|
|
struct efi_device_path *efi_dp_create_device_node(const u8 type,
|
|
|
|
const u8 sub_type,
|
|
|
|
const u16 length);
|
2018-04-16 13:59:09 +08:00
|
|
|
/* Append device path instance */
|
|
|
|
struct efi_device_path *efi_dp_append_instance(
|
|
|
|
const struct efi_device_path *dp,
|
|
|
|
const struct efi_device_path *dpi);
|
|
|
|
/* Get next device path instance */
|
|
|
|
struct efi_device_path *efi_dp_get_next_instance(struct efi_device_path **dp,
|
|
|
|
efi_uintn_t *size);
|
|
|
|
/* Check if a device path contains muliple instances */
|
|
|
|
bool efi_dp_is_multi_instance(const struct efi_device_path *dp);
|
2017-09-14 06:05:28 +08:00
|
|
|
|
|
|
|
struct efi_device_path *efi_dp_from_part(struct blk_desc *desc, int part);
|
2018-01-20 03:24:46 +08:00
|
|
|
/* Create a device node for a block device partition. */
|
|
|
|
struct efi_device_path *efi_dp_part_node(struct blk_desc *desc, int part);
|
2017-09-14 06:05:28 +08:00
|
|
|
struct efi_device_path *efi_dp_from_file(struct blk_desc *desc, int part,
|
|
|
|
const char *path);
|
|
|
|
struct efi_device_path *efi_dp_from_eth(void);
|
2017-10-10 20:23:06 +08:00
|
|
|
struct efi_device_path *efi_dp_from_mem(uint32_t mem_type,
|
|
|
|
uint64_t start_address,
|
|
|
|
uint64_t end_address);
|
2018-01-20 03:24:49 +08:00
|
|
|
/* Determine the last device path node that is not the end node. */
|
|
|
|
const struct efi_device_path *efi_dp_last_node(
|
|
|
|
const struct efi_device_path *dp);
|
2018-01-20 03:24:37 +08:00
|
|
|
efi_status_t efi_dp_split_file_path(struct efi_device_path *full_path,
|
|
|
|
struct efi_device_path **device_path,
|
|
|
|
struct efi_device_path **file_path);
|
2018-10-17 15:32:03 +08:00
|
|
|
efi_status_t efi_dp_from_name(const char *dev, const char *devnr,
|
|
|
|
const char *path,
|
|
|
|
struct efi_device_path **device,
|
|
|
|
struct efi_device_path **file);
|
2020-08-23 16:49:46 +08:00
|
|
|
ssize_t efi_dp_check_length(const struct efi_device_path *dp,
|
|
|
|
const size_t maxlen);
|
2017-09-14 06:05:28 +08:00
|
|
|
|
|
|
|
#define EFI_DP_TYPE(_dp, _type, _subtype) \
|
|
|
|
(((_dp)->type == DEVICE_PATH_TYPE_##_type) && \
|
|
|
|
((_dp)->sub_type == DEVICE_PATH_SUB_TYPE_##_subtype))
|
|
|
|
|
2016-03-04 08:10:01 +08:00
|
|
|
/*
|
|
|
|
* Use these to indicate that your code / data should go into the EFI runtime
|
|
|
|
* section and thus still be available when the OS is running
|
|
|
|
*/
|
2018-06-12 13:48:37 +08:00
|
|
|
#define __efi_runtime_data __attribute__ ((section (".data.efi_runtime")))
|
|
|
|
#define __efi_runtime __attribute__ ((section (".text.efi_runtime")))
|
2016-03-04 08:09:59 +08:00
|
|
|
|
2019-06-05 12:21:38 +08:00
|
|
|
/* Indicate supported runtime services */
|
|
|
|
efi_status_t efi_init_runtime_supported(void);
|
|
|
|
|
2018-07-29 15:49:04 +08:00
|
|
|
/* Update CRC32 in table header */
|
|
|
|
void __efi_runtime efi_update_table_header_crc32(struct efi_table_hdr *table);
|
|
|
|
|
2016-08-17 03:08:45 +08:00
|
|
|
/* Call this with mmio_ptr as the _pointer_ to a pointer to an MMIO region
|
|
|
|
* to make it available at runtime */
|
2018-03-03 22:28:59 +08:00
|
|
|
efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len);
|
2016-08-17 03:08:45 +08:00
|
|
|
|
|
|
|
/* Boards may provide the functions below to implement RTS functionality */
|
|
|
|
|
2016-10-14 19:45:30 +08:00
|
|
|
void __efi_runtime EFIAPI efi_reset_system(
|
2016-08-17 03:08:45 +08:00
|
|
|
enum efi_reset_type reset_type,
|
|
|
|
efi_status_t reset_status,
|
|
|
|
unsigned long data_size, void *reset_data);
|
2018-03-03 22:28:59 +08:00
|
|
|
|
|
|
|
/* Architecture specific initialization of the EFI subsystem */
|
|
|
|
efi_status_t efi_reset_system_init(void);
|
2016-08-17 03:08:45 +08:00
|
|
|
|
2016-10-14 19:45:30 +08:00
|
|
|
efi_status_t __efi_runtime EFIAPI efi_get_time(
|
2016-08-17 03:08:45 +08:00
|
|
|
struct efi_time *time,
|
|
|
|
struct efi_time_cap *capabilities);
|
|
|
|
|
2019-05-31 13:38:29 +08:00
|
|
|
efi_status_t __efi_runtime EFIAPI efi_set_time(struct efi_time *time);
|
|
|
|
|
2017-09-15 16:06:11 +08:00
|
|
|
#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
|
|
|
|
/*
|
|
|
|
* Entry point for the tests of the EFI API.
|
|
|
|
* It is called by 'bootefi selftest'
|
|
|
|
*/
|
|
|
|
efi_status_t EFIAPI efi_selftest(efi_handle_t image_handle,
|
|
|
|
struct efi_system_table *systab);
|
|
|
|
#endif
|
|
|
|
|
2018-12-31 03:53:51 +08:00
|
|
|
efi_status_t EFIAPI efi_get_variable(u16 *variable_name,
|
|
|
|
const efi_guid_t *vendor, u32 *attributes,
|
|
|
|
efi_uintn_t *data_size, void *data);
|
2018-05-17 13:57:05 +08:00
|
|
|
efi_status_t EFIAPI efi_get_next_variable_name(efi_uintn_t *variable_name_size,
|
|
|
|
u16 *variable_name,
|
2020-03-23 01:28:20 +08:00
|
|
|
efi_guid_t *vendor);
|
2018-12-31 03:53:51 +08:00
|
|
|
efi_status_t EFIAPI efi_set_variable(u16 *variable_name,
|
|
|
|
const efi_guid_t *vendor, u32 attributes,
|
2018-12-31 04:03:15 +08:00
|
|
|
efi_uintn_t data_size, const void *data);
|
efi_loader: efi variable support
Add EFI variable support, mapping to u-boot environment variables.
Variables are pretty important for setting up boot order, among other
things. If the board supports saveenv, then it will be called in
ExitBootServices() to persist variables set by the efi payload. (For
example, fallback.efi configuring BootOrder and BootXXXX load-option
variables.)
Variables are *not* currently exposed at runtime, post ExitBootServices.
On boards without a dedicated device for storage, which the loaded OS
is not trying to also use, this is rather tricky. One idea, at least
for boards that can persist RAM across reboot, is to keep a "journal"
of modified variables in RAM, and then turn halt into a reboot into
u-boot, plus store variables, plus halt. Whatever the solution, it
likely involves some per-board support.
Mapping between EFI variables and u-boot variables:
efi_$guid_$varname = {attributes}(type)value
For example:
efi_8be4df61-93ca-11d2-aa0d-00e098032b8c_OsIndicationsSupported=
"{ro,boot,run}(blob)0000000000000000"
efi_8be4df61-93ca-11d2-aa0d-00e098032b8c_BootOrder=
"(blob)00010000"
The attributes are a comma separated list of these possible
attributes:
+ ro - read-only
+ boot - boot-services access
+ run - runtime access
NOTE: with current implementation, no variables are available after
ExitBootServices, and all are persisted (if possible).
If not specified, the attributes default to "{boot}".
The required type is one of:
+ utf8 - raw utf8 string
+ blob - arbitrary length hex string
Signed-off-by: Rob Clark <robdclark@gmail.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
2017-09-14 06:05:37 +08:00
|
|
|
|
2019-06-20 18:13:05 +08:00
|
|
|
efi_status_t EFIAPI efi_query_variable_info(
|
|
|
|
u32 attributes, u64 *maximum_variable_storage_size,
|
|
|
|
u64 *remaining_variable_storage_size,
|
|
|
|
u64 *maximum_variable_size);
|
|
|
|
|
2021-03-18 03:54:59 +08:00
|
|
|
void *efi_get_var(u16 *name, const efi_guid_t *vendor, efi_uintn_t *size);
|
|
|
|
|
2018-11-05 17:06:41 +08:00
|
|
|
/*
|
|
|
|
* See section 3.1.3 in the v2.7 UEFI spec for more details on
|
|
|
|
* the layout of EFI_LOAD_OPTION. In short it is:
|
|
|
|
*
|
|
|
|
* typedef struct _EFI_LOAD_OPTION {
|
|
|
|
* UINT32 Attributes;
|
|
|
|
* UINT16 FilePathListLength;
|
|
|
|
* // CHAR16 Description[]; <-- variable length, NULL terminated
|
|
|
|
* // EFI_DEVICE_PATH_PROTOCOL FilePathList[];
|
|
|
|
* <-- FilePathListLength bytes
|
|
|
|
* // UINT8 OptionalData[];
|
|
|
|
* } EFI_LOAD_OPTION;
|
|
|
|
*/
|
|
|
|
struct efi_load_option {
|
|
|
|
u32 attributes;
|
|
|
|
u16 file_path_length;
|
|
|
|
u16 *label;
|
|
|
|
struct efi_device_path *file_path;
|
2019-04-29 19:51:45 +08:00
|
|
|
const u8 *optional_data;
|
2018-11-05 17:06:41 +08:00
|
|
|
};
|
|
|
|
|
2021-03-18 03:54:58 +08:00
|
|
|
struct efi_device_path *efi_dp_from_lo(struct efi_load_option *lo,
|
|
|
|
efi_uintn_t *size, efi_guid_t guid);
|
|
|
|
struct efi_device_path *efi_dp_concat(const struct efi_device_path *dp1,
|
|
|
|
const struct efi_device_path *dp2);
|
2020-06-01 04:46:09 +08:00
|
|
|
efi_status_t efi_deserialize_load_option(struct efi_load_option *lo, u8 *data,
|
|
|
|
efi_uintn_t *size);
|
2018-11-05 17:06:41 +08:00
|
|
|
unsigned long efi_serialize_load_option(struct efi_load_option *lo, u8 **data);
|
2020-08-07 23:47:13 +08:00
|
|
|
efi_status_t efi_set_load_options(efi_handle_t handle,
|
|
|
|
efi_uintn_t load_options_size,
|
|
|
|
void *load_options);
|
2020-08-07 23:49:39 +08:00
|
|
|
efi_status_t efi_bootmgr_load(efi_handle_t *handle, void **load_options);
|
2017-09-14 06:05:38 +08:00
|
|
|
|
2020-04-14 10:51:39 +08:00
|
|
|
/**
|
2021-02-25 15:02:37 +08:00
|
|
|
* struct efi_image_regions - A list of memory regions
|
2020-04-14 10:51:39 +08:00
|
|
|
*
|
|
|
|
* @max: Maximum number of regions
|
|
|
|
* @num: Number of regions
|
|
|
|
* @reg: array of regions
|
|
|
|
*/
|
|
|
|
struct efi_image_regions {
|
|
|
|
int max;
|
|
|
|
int num;
|
|
|
|
struct image_region reg[];
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
2021-02-25 15:02:37 +08:00
|
|
|
* struct efi_sig_data - A decoded data of struct efi_signature_data
|
2020-04-14 10:51:39 +08:00
|
|
|
*
|
|
|
|
* This structure represents an internal form of signature in
|
|
|
|
* signature database. A listed list may represent a signature list.
|
|
|
|
*
|
|
|
|
* @next: Pointer to next entry
|
2021-02-25 15:02:37 +08:00
|
|
|
* @owner: Signature owner
|
2020-04-14 10:51:39 +08:00
|
|
|
* @data: Pointer to signature data
|
|
|
|
* @size: Size of signature data
|
|
|
|
*/
|
|
|
|
struct efi_sig_data {
|
|
|
|
struct efi_sig_data *next;
|
|
|
|
efi_guid_t owner;
|
|
|
|
void *data;
|
|
|
|
size_t size;
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
2021-02-25 15:02:37 +08:00
|
|
|
* struct efi_signature_store - A decoded data of signature database
|
2020-04-14 10:51:39 +08:00
|
|
|
*
|
|
|
|
* This structure represents an internal form of signature database.
|
|
|
|
*
|
|
|
|
* @next: Pointer to next entry
|
|
|
|
* @sig_type: Signature type
|
|
|
|
* @sig_data_list: Pointer to signature list
|
|
|
|
*/
|
|
|
|
struct efi_signature_store {
|
|
|
|
struct efi_signature_store *next;
|
|
|
|
efi_guid_t sig_type;
|
|
|
|
struct efi_sig_data *sig_data_list;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct x509_certificate;
|
|
|
|
struct pkcs7_message;
|
|
|
|
|
2020-07-08 13:01:57 +08:00
|
|
|
bool efi_signature_lookup_digest(struct efi_image_regions *regs,
|
|
|
|
struct efi_signature_store *db);
|
2020-07-21 18:35:22 +08:00
|
|
|
bool efi_signature_verify(struct efi_image_regions *regs,
|
|
|
|
struct pkcs7_message *msg,
|
|
|
|
struct efi_signature_store *db,
|
|
|
|
struct efi_signature_store *dbx);
|
2020-08-14 13:39:23 +08:00
|
|
|
static inline bool efi_signature_verify_one(struct efi_image_regions *regs,
|
|
|
|
struct pkcs7_message *msg,
|
|
|
|
struct efi_signature_store *db)
|
|
|
|
{
|
|
|
|
return efi_signature_verify(regs, msg, db, NULL);
|
|
|
|
}
|
2020-07-08 13:01:56 +08:00
|
|
|
bool efi_signature_check_signers(struct pkcs7_message *msg,
|
|
|
|
struct efi_signature_store *dbx);
|
2020-04-14 10:51:39 +08:00
|
|
|
|
|
|
|
efi_status_t efi_image_region_add(struct efi_image_regions *regs,
|
|
|
|
const void *start, const void *end,
|
|
|
|
int nocheck);
|
2020-04-14 10:51:40 +08:00
|
|
|
|
|
|
|
void efi_sigstore_free(struct efi_signature_store *sigstore);
|
2020-12-30 21:57:08 +08:00
|
|
|
struct efi_signature_store *efi_build_signature_store(void *sig_list,
|
|
|
|
efi_uintn_t size);
|
2020-04-14 10:51:40 +08:00
|
|
|
struct efi_signature_store *efi_sigstore_parse_sigdb(u16 *name);
|
2020-04-14 10:51:41 +08:00
|
|
|
|
|
|
|
bool efi_secure_boot_enabled(void);
|
2020-04-14 10:51:44 +08:00
|
|
|
|
2020-12-30 21:57:09 +08:00
|
|
|
bool efi_capsule_auth_enabled(void);
|
|
|
|
|
2020-04-14 10:51:44 +08:00
|
|
|
bool efi_image_parse(void *efi, size_t len, struct efi_image_regions **regp,
|
|
|
|
WIN_CERTIFICATE **auth, size_t *auth_len);
|
2020-04-14 10:51:39 +08:00
|
|
|
|
2020-12-30 21:57:07 +08:00
|
|
|
struct pkcs7_message *efi_parse_pkcs7_header(const void *buf,
|
|
|
|
size_t buflen,
|
|
|
|
u8 **tmpbuf);
|
|
|
|
|
2020-06-28 22:30:29 +08:00
|
|
|
/* runtime implementation of memcpy() */
|
|
|
|
void efi_memcpy_runtime(void *dest, const void *src, size_t n);
|
|
|
|
|
2020-10-29 12:47:46 +08:00
|
|
|
/* commonly used helper function */
|
2020-12-31 18:26:46 +08:00
|
|
|
u16 *efi_create_indexed_name(u16 *buffer, size_t buffer_size, const char *name,
|
|
|
|
unsigned int index);
|
2020-10-29 12:47:46 +08:00
|
|
|
|
2020-11-30 17:12:12 +08:00
|
|
|
extern const struct efi_firmware_management_protocol efi_fmp_fit;
|
2020-11-17 08:28:00 +08:00
|
|
|
extern const struct efi_firmware_management_protocol efi_fmp_raw;
|
2020-11-30 17:12:12 +08:00
|
|
|
|
2020-11-17 08:27:55 +08:00
|
|
|
/* Capsule update */
|
|
|
|
efi_status_t EFIAPI efi_update_capsule(
|
|
|
|
struct efi_capsule_header **capsule_header_array,
|
|
|
|
efi_uintn_t capsule_count,
|
|
|
|
u64 scatter_gather_list);
|
|
|
|
efi_status_t EFIAPI efi_query_capsule_caps(
|
|
|
|
struct efi_capsule_header **capsule_header_array,
|
|
|
|
efi_uintn_t capsule_count,
|
|
|
|
u64 *maximum_capsule_size,
|
|
|
|
u32 *reset_type);
|
|
|
|
|
2020-12-30 21:57:09 +08:00
|
|
|
efi_status_t efi_capsule_authenticate(const void *capsule,
|
|
|
|
efi_uintn_t capsule_size,
|
|
|
|
void **image, efi_uintn_t *image_size);
|
|
|
|
|
2020-11-17 08:27:56 +08:00
|
|
|
#define EFI_CAPSULE_DIR L"\\EFI\\UpdateCapsule\\"
|
|
|
|
|
|
|
|
/* Hook at initialization */
|
|
|
|
efi_status_t efi_launch_capsules(void);
|
|
|
|
|
2018-08-31 05:43:43 +08:00
|
|
|
#else /* CONFIG_IS_ENABLED(EFI_LOADER) */
|
2016-03-04 08:09:59 +08:00
|
|
|
|
2016-03-04 08:10:01 +08:00
|
|
|
/* Without CONFIG_EFI_LOADER we don't have a runtime section, stub it out */
|
2016-10-14 19:45:30 +08:00
|
|
|
#define __efi_runtime_data
|
|
|
|
#define __efi_runtime
|
2018-03-03 22:28:59 +08:00
|
|
|
static inline efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len)
|
|
|
|
{
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
2016-03-04 08:10:01 +08:00
|
|
|
|
2016-03-04 08:09:59 +08:00
|
|
|
/* No loader configured, stub out EFI_ENTRY */
|
|
|
|
static inline void efi_restore_gd(void) { }
|
2016-04-11 22:16:19 +08:00
|
|
|
static inline void efi_set_bootdev(const char *dev, const char *devnr,
|
2021-01-12 19:46:24 +08:00
|
|
|
const char *path, void *buffer,
|
|
|
|
size_t buffer_size) { }
|
2016-05-07 03:01:01 +08:00
|
|
|
static inline void efi_net_set_dhcp_ack(void *pkt, int len) { }
|
2018-04-05 17:56:21 +08:00
|
|
|
static inline void efi_print_image_infos(void *pc) { }
|
2020-11-17 08:27:56 +08:00
|
|
|
static inline efi_status_t efi_launch_capsules(void)
|
|
|
|
{
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
2016-03-04 08:09:59 +08:00
|
|
|
|
2018-08-31 05:43:43 +08:00
|
|
|
#endif /* CONFIG_IS_ENABLED(EFI_LOADER) */
|
2017-10-19 00:13:07 +08:00
|
|
|
|
2021-03-03 01:26:38 +08:00
|
|
|
/**
|
|
|
|
* Install the ESRT system table.
|
|
|
|
*
|
|
|
|
* @return status code
|
|
|
|
*/
|
|
|
|
efi_status_t efi_esrt_register(void);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* efi_esrt_populate() - Populates the ESRT entries from the FMP instances
|
|
|
|
* present in the system.
|
|
|
|
* If an ESRT already exists, the old ESRT is replaced in the system table.
|
|
|
|
* The memory of the old ESRT is deallocated.
|
|
|
|
*
|
|
|
|
* Return:
|
|
|
|
* - EFI_SUCCESS if the ESRT is correctly created
|
|
|
|
* - error code otherwise.
|
|
|
|
*/
|
|
|
|
efi_status_t efi_esrt_populate(void);
|
2017-10-19 00:13:07 +08:00
|
|
|
#endif /* _EFI_LOADER_H */
|