1 // SPDX-License-Identifier: GPL-2.0+
3 * EFI application boot time services
5 * Copyright (c) 2016 Alexander Graf
10 #include <efi_loader.h>
11 #include <environment.h>
13 #include <linux/libfdt_env.h>
14 #include <u-boot/crc.h>
19 DECLARE_GLOBAL_DATA_PTR;
21 /* Task priority level */
22 static efi_uintn_t efi_tpl = TPL_APPLICATION;
24 /* This list contains all the EFI objects our payload has access to */
25 LIST_HEAD(efi_obj_list);
27 /* List of all events */
28 LIST_HEAD(efi_events);
30 /* List of all events registered by RegisterProtocolNotify() */
31 LIST_HEAD(efi_register_notify_events);
33 /* Handle of the currently executing image */
34 static efi_handle_t current_image;
37 * If we're running on nasty systems (32bit ARM booting into non-EFI Linux)
38 * we need to do trickery with caches. Since we don't want to break the EFI
39 * aware boot path, only apply hacks when loading exiting directly (breaking
40 * direct Linux EFI booting along the way - oh well).
42 static bool efi_is_direct_boot = true;
46 * The "gd" pointer lives in a register on ARM and AArch64 that we declare
47 * fixed when compiling U-Boot. However, the payload does not know about that
48 * restriction so we need to manually swap its and our view of that register on
49 * EFI callback entry/exit.
51 static volatile void *efi_gd, *app_gd;
54 /* 1 if inside U-Boot code, 0 if inside EFI payload code */
55 static int entry_count = 1;
56 static int nesting_level;
57 /* GUID of the device tree table */
58 const efi_guid_t efi_guid_fdt = EFI_FDT_GUID;
59 /* GUID of the EFI_DRIVER_BINDING_PROTOCOL */
60 const efi_guid_t efi_guid_driver_binding_protocol =
61 EFI_DRIVER_BINDING_PROTOCOL_GUID;
63 /* event group ExitBootServices() invoked */
64 const efi_guid_t efi_guid_event_group_exit_boot_services =
65 EFI_EVENT_GROUP_EXIT_BOOT_SERVICES;
66 /* event group SetVirtualAddressMap() invoked */
67 const efi_guid_t efi_guid_event_group_virtual_address_change =
68 EFI_EVENT_GROUP_VIRTUAL_ADDRESS_CHANGE;
69 /* event group memory map changed */
70 const efi_guid_t efi_guid_event_group_memory_map_change =
71 EFI_EVENT_GROUP_MEMORY_MAP_CHANGE;
72 /* event group boot manager about to boot */
73 const efi_guid_t efi_guid_event_group_ready_to_boot =
74 EFI_EVENT_GROUP_READY_TO_BOOT;
75 /* event group ResetSystem() invoked (before ExitBootServices) */
76 const efi_guid_t efi_guid_event_group_reset_system =
77 EFI_EVENT_GROUP_RESET_SYSTEM;
79 static efi_status_t EFIAPI efi_disconnect_controller(
80 efi_handle_t controller_handle,
81 efi_handle_t driver_image_handle,
82 efi_handle_t child_handle);
84 /* Called on every callback entry */
85 int __efi_entry_check(void)
87 int ret = entry_count++ == 0;
96 /* Called on every callback exit */
97 int __efi_exit_check(void)
99 int ret = --entry_count == 0;
106 /* Called from do_bootefi_exec() */
107 void efi_save_gd(void)
115 * Special case handler for error/abort that just forces things back to u-boot
116 * world so we can dump out an abort message, without any care about returning
117 * back to UEFI world.
119 void efi_restore_gd(void)
122 /* Only restore if we're already in EFI context */
130 * indent_string() - returns a string for indenting with two spaces per level
131 * @level: indent level
133 * A maximum of ten indent levels is supported. Higher indent levels will be
136 * Return: A string for indenting with two spaces per level is
139 static const char *indent_string(int level)
141 const char *indent = " ";
142 const int max = strlen(indent);
144 level = min(max, level * 2);
145 return &indent[max - level];
148 const char *__efi_nesting(void)
150 return indent_string(nesting_level);
153 const char *__efi_nesting_inc(void)
155 return indent_string(nesting_level++);
158 const char *__efi_nesting_dec(void)
160 return indent_string(--nesting_level);
164 * efi_queue_event() - queue an EFI event
165 * @event: event to signal
166 * @check_tpl: check the TPL level
168 * This function queues the notification function of the event for future
171 * The notification function is called if the task priority level of the event
172 * is higher than the current task priority level.
174 * For the SignalEvent service see efi_signal_event_ext.
177 static void efi_queue_event(struct efi_event *event, bool check_tpl)
179 if (event->notify_function) {
180 event->is_queued = true;
182 if (check_tpl && efi_tpl >= event->notify_tpl)
184 event->is_queued = false;
185 EFI_CALL_VOID(event->notify_function(event,
186 event->notify_context));
188 event->is_queued = false;
193 * is_valid_tpl() - check if the task priority level is valid
195 * @tpl: TPL level to check
196 * Return: status code
198 efi_status_t is_valid_tpl(efi_uintn_t tpl)
201 case TPL_APPLICATION:
207 return EFI_INVALID_PARAMETER;
212 * efi_signal_event() - signal an EFI event
213 * @event: event to signal
214 * @check_tpl: check the TPL level
216 * This function signals an event. If the event belongs to an event group all
217 * events of the group are signaled. If they are of type EVT_NOTIFY_SIGNAL
218 * their notification function is queued.
220 * For the SignalEvent service see efi_signal_event_ext.
222 void efi_signal_event(struct efi_event *event, bool check_tpl)
225 struct efi_event *evt;
228 * The signaled state has to set before executing any
229 * notification function
231 list_for_each_entry(evt, &efi_events, link) {
232 if (!evt->group || guidcmp(evt->group, event->group))
234 if (evt->is_signaled)
236 evt->is_signaled = true;
237 if (evt->type & EVT_NOTIFY_SIGNAL &&
238 evt->notify_function)
239 evt->is_queued = true;
241 list_for_each_entry(evt, &efi_events, link) {
242 if (!evt->group || guidcmp(evt->group, event->group))
245 efi_queue_event(evt, check_tpl);
248 event->is_signaled = true;
249 if (event->type & EVT_NOTIFY_SIGNAL)
250 efi_queue_event(event, check_tpl);
255 * efi_raise_tpl() - raise the task priority level
256 * @new_tpl: new value of the task priority level
258 * This function implements the RaiseTpl service.
260 * See the Unified Extensible Firmware Interface (UEFI) specification for
263 * Return: old value of the task priority level
265 static unsigned long EFIAPI efi_raise_tpl(efi_uintn_t new_tpl)
267 efi_uintn_t old_tpl = efi_tpl;
269 EFI_ENTRY("0x%zx", new_tpl);
271 if (new_tpl < efi_tpl)
272 EFI_PRINT("WARNING: new_tpl < current_tpl in %s\n", __func__);
274 if (efi_tpl > TPL_HIGH_LEVEL)
275 efi_tpl = TPL_HIGH_LEVEL;
277 EFI_EXIT(EFI_SUCCESS);
282 * efi_restore_tpl() - lower the task priority level
283 * @old_tpl: value of the task priority level to be restored
285 * This function implements the RestoreTpl service.
287 * See the Unified Extensible Firmware Interface (UEFI) specification for
290 static void EFIAPI efi_restore_tpl(efi_uintn_t old_tpl)
292 EFI_ENTRY("0x%zx", old_tpl);
294 if (old_tpl > efi_tpl)
295 EFI_PRINT("WARNING: old_tpl > current_tpl in %s\n", __func__);
297 if (efi_tpl > TPL_HIGH_LEVEL)
298 efi_tpl = TPL_HIGH_LEVEL;
301 * Lowering the TPL may have made queued events eligible for execution.
305 EFI_EXIT(EFI_SUCCESS);
309 * efi_allocate_pages_ext() - allocate memory pages
310 * @type: type of allocation to be performed
311 * @memory_type: usage type of the allocated memory
312 * @pages: number of pages to be allocated
313 * @memory: allocated memory
315 * This function implements the AllocatePages service.
317 * See the Unified Extensible Firmware Interface (UEFI) specification for
320 * Return: status code
322 static efi_status_t EFIAPI efi_allocate_pages_ext(int type, int memory_type,
328 EFI_ENTRY("%d, %d, 0x%zx, %p", type, memory_type, pages, memory);
329 r = efi_allocate_pages(type, memory_type, pages, memory);
334 * efi_free_pages_ext() - Free memory pages.
335 * @memory: start of the memory area to be freed
336 * @pages: number of pages to be freed
338 * This function implements the FreePages service.
340 * See the Unified Extensible Firmware Interface (UEFI) specification for
343 * Return: status code
345 static efi_status_t EFIAPI efi_free_pages_ext(uint64_t memory,
350 EFI_ENTRY("%llx, 0x%zx", memory, pages);
351 r = efi_free_pages(memory, pages);
356 * efi_get_memory_map_ext() - get map describing memory usage
357 * @memory_map_size: on entry the size, in bytes, of the memory map buffer,
358 * on exit the size of the copied memory map
359 * @memory_map: buffer to which the memory map is written
360 * @map_key: key for the memory map
361 * @descriptor_size: size of an individual memory descriptor
362 * @descriptor_version: version number of the memory descriptor structure
364 * This function implements the GetMemoryMap service.
366 * See the Unified Extensible Firmware Interface (UEFI) specification for
369 * Return: status code
371 static efi_status_t EFIAPI efi_get_memory_map_ext(
372 efi_uintn_t *memory_map_size,
373 struct efi_mem_desc *memory_map,
374 efi_uintn_t *map_key,
375 efi_uintn_t *descriptor_size,
376 uint32_t *descriptor_version)
380 EFI_ENTRY("%p, %p, %p, %p, %p", memory_map_size, memory_map,
381 map_key, descriptor_size, descriptor_version);
382 r = efi_get_memory_map(memory_map_size, memory_map, map_key,
383 descriptor_size, descriptor_version);
388 * efi_allocate_pool_ext() - allocate memory from pool
389 * @pool_type: type of the pool from which memory is to be allocated
390 * @size: number of bytes to be allocated
391 * @buffer: allocated memory
393 * This function implements the AllocatePool service.
395 * See the Unified Extensible Firmware Interface (UEFI) specification for
398 * Return: status code
400 static efi_status_t EFIAPI efi_allocate_pool_ext(int pool_type,
406 EFI_ENTRY("%d, %zd, %p", pool_type, size, buffer);
407 r = efi_allocate_pool(pool_type, size, buffer);
412 * efi_free_pool_ext() - free memory from pool
413 * @buffer: start of memory to be freed
415 * This function implements the FreePool service.
417 * See the Unified Extensible Firmware Interface (UEFI) specification for
420 * Return: status code
422 static efi_status_t EFIAPI efi_free_pool_ext(void *buffer)
426 EFI_ENTRY("%p", buffer);
427 r = efi_free_pool(buffer);
432 * efi_add_handle() - add a new handle to the object list
434 * @handle: handle to be added
436 * The protocols list is initialized. The handle is added to the list of known
439 void efi_add_handle(efi_handle_t handle)
443 INIT_LIST_HEAD(&handle->protocols);
444 list_add_tail(&handle->link, &efi_obj_list);
448 * efi_create_handle() - create handle
449 * @handle: new handle
451 * Return: status code
453 efi_status_t efi_create_handle(efi_handle_t *handle)
455 struct efi_object *obj;
457 obj = calloc(1, sizeof(struct efi_object));
459 return EFI_OUT_OF_RESOURCES;
468 * efi_search_protocol() - find a protocol on a handle.
470 * @protocol_guid: GUID of the protocol
471 * @handler: reference to the protocol
473 * Return: status code
475 efi_status_t efi_search_protocol(const efi_handle_t handle,
476 const efi_guid_t *protocol_guid,
477 struct efi_handler **handler)
479 struct efi_object *efiobj;
480 struct list_head *lhandle;
482 if (!handle || !protocol_guid)
483 return EFI_INVALID_PARAMETER;
484 efiobj = efi_search_obj(handle);
486 return EFI_INVALID_PARAMETER;
487 list_for_each(lhandle, &efiobj->protocols) {
488 struct efi_handler *protocol;
490 protocol = list_entry(lhandle, struct efi_handler, link);
491 if (!guidcmp(protocol->guid, protocol_guid)) {
497 return EFI_NOT_FOUND;
501 * efi_remove_protocol() - delete protocol from a handle
502 * @handle: handle from which the protocol shall be deleted
503 * @protocol: GUID of the protocol to be deleted
504 * @protocol_interface: interface of the protocol implementation
506 * Return: status code
508 efi_status_t efi_remove_protocol(const efi_handle_t handle,
509 const efi_guid_t *protocol,
510 void *protocol_interface)
512 struct efi_handler *handler;
515 ret = efi_search_protocol(handle, protocol, &handler);
516 if (ret != EFI_SUCCESS)
518 if (handler->protocol_interface != protocol_interface)
519 return EFI_NOT_FOUND;
520 list_del(&handler->link);
526 * efi_remove_all_protocols() - delete all protocols from a handle
527 * @handle: handle from which the protocols shall be deleted
529 * Return: status code
531 efi_status_t efi_remove_all_protocols(const efi_handle_t handle)
533 struct efi_object *efiobj;
534 struct efi_handler *protocol;
535 struct efi_handler *pos;
537 efiobj = efi_search_obj(handle);
539 return EFI_INVALID_PARAMETER;
540 list_for_each_entry_safe(protocol, pos, &efiobj->protocols, link) {
543 ret = efi_remove_protocol(handle, protocol->guid,
544 protocol->protocol_interface);
545 if (ret != EFI_SUCCESS)
552 * efi_delete_handle() - delete handle
554 * @obj: handle to delete
556 void efi_delete_handle(efi_handle_t handle)
560 efi_remove_all_protocols(handle);
561 list_del(&handle->link);
566 * efi_is_event() - check if a pointer is a valid event
567 * @event: pointer to check
569 * Return: status code
571 static efi_status_t efi_is_event(const struct efi_event *event)
573 const struct efi_event *evt;
576 return EFI_INVALID_PARAMETER;
577 list_for_each_entry(evt, &efi_events, link) {
581 return EFI_INVALID_PARAMETER;
585 * efi_create_event() - create an event
586 * @type: type of the event to create
587 * @notify_tpl: task priority level of the event
588 * @notify_function: notification function of the event
589 * @notify_context: pointer passed to the notification function
590 * @group: event group
591 * @event: created event
593 * This function is used inside U-Boot code to create an event.
595 * For the API function implementing the CreateEvent service see
596 * efi_create_event_ext.
598 * Return: status code
600 efi_status_t efi_create_event(uint32_t type, efi_uintn_t notify_tpl,
601 void (EFIAPI *notify_function) (
602 struct efi_event *event,
604 void *notify_context, efi_guid_t *group,
605 struct efi_event **event)
607 struct efi_event *evt;
610 return EFI_INVALID_PARAMETER;
615 case EVT_NOTIFY_SIGNAL:
616 case EVT_TIMER | EVT_NOTIFY_SIGNAL:
617 case EVT_NOTIFY_WAIT:
618 case EVT_TIMER | EVT_NOTIFY_WAIT:
619 case EVT_SIGNAL_EXIT_BOOT_SERVICES:
620 case EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE:
623 return EFI_INVALID_PARAMETER;
626 if ((type & (EVT_NOTIFY_WAIT | EVT_NOTIFY_SIGNAL)) &&
627 (!notify_function || is_valid_tpl(notify_tpl) != EFI_SUCCESS))
628 return EFI_INVALID_PARAMETER;
630 evt = calloc(1, sizeof(struct efi_event));
632 return EFI_OUT_OF_RESOURCES;
634 evt->notify_tpl = notify_tpl;
635 evt->notify_function = notify_function;
636 evt->notify_context = notify_context;
638 /* Disable timers on boot up */
639 evt->trigger_next = -1ULL;
640 evt->is_queued = false;
641 evt->is_signaled = false;
642 list_add_tail(&evt->link, &efi_events);
648 * efi_create_event_ex() - create an event in a group
649 * @type: type of the event to create
650 * @notify_tpl: task priority level of the event
651 * @notify_function: notification function of the event
652 * @notify_context: pointer passed to the notification function
653 * @event: created event
654 * @event_group: event group
656 * This function implements the CreateEventEx service.
658 * See the Unified Extensible Firmware Interface (UEFI) specification for
661 * Return: status code
663 efi_status_t EFIAPI efi_create_event_ex(uint32_t type, efi_uintn_t notify_tpl,
664 void (EFIAPI *notify_function) (
665 struct efi_event *event,
667 void *notify_context,
668 efi_guid_t *event_group,
669 struct efi_event **event)
673 EFI_ENTRY("%d, 0x%zx, %p, %p, %pUl", type, notify_tpl, notify_function,
674 notify_context, event_group);
677 * The allowable input parameters are the same as in CreateEvent()
678 * except for the following two disallowed event types.
681 case EVT_SIGNAL_EXIT_BOOT_SERVICES:
682 case EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE:
683 ret = EFI_INVALID_PARAMETER;
687 ret = efi_create_event(type, notify_tpl, notify_function,
688 notify_context, event_group, event);
690 return EFI_EXIT(ret);
694 * efi_create_event_ext() - create an event
695 * @type: type of the event to create
696 * @notify_tpl: task priority level of the event
697 * @notify_function: notification function of the event
698 * @notify_context: pointer passed to the notification function
699 * @event: created event
701 * This function implements the CreateEvent service.
703 * See the Unified Extensible Firmware Interface (UEFI) specification for
706 * Return: status code
708 static efi_status_t EFIAPI efi_create_event_ext(
709 uint32_t type, efi_uintn_t notify_tpl,
710 void (EFIAPI *notify_function) (
711 struct efi_event *event,
713 void *notify_context, struct efi_event **event)
715 EFI_ENTRY("%d, 0x%zx, %p, %p", type, notify_tpl, notify_function,
717 return EFI_EXIT(efi_create_event(type, notify_tpl, notify_function,
718 notify_context, NULL, event));
722 * efi_timer_check() - check if a timer event has occurred
724 * Check if a timer event has occurred or a queued notification function should
727 * Our timers have to work without interrupts, so we check whenever keyboard
728 * input or disk accesses happen if enough time elapsed for them to fire.
730 void efi_timer_check(void)
732 struct efi_event *evt;
733 u64 now = timer_get_us();
735 list_for_each_entry(evt, &efi_events, link) {
737 efi_queue_event(evt, true);
738 if (!(evt->type & EVT_TIMER) || now < evt->trigger_next)
740 switch (evt->trigger_type) {
741 case EFI_TIMER_RELATIVE:
742 evt->trigger_type = EFI_TIMER_STOP;
744 case EFI_TIMER_PERIODIC:
745 evt->trigger_next += evt->trigger_time;
750 evt->is_signaled = false;
751 efi_signal_event(evt, true);
757 * efi_set_timer() - set the trigger time for a timer event or stop the event
758 * @event: event for which the timer is set
759 * @type: type of the timer
760 * @trigger_time: trigger period in multiples of 100 ns
762 * This is the function for internal usage in U-Boot. For the API function
763 * implementing the SetTimer service see efi_set_timer_ext.
765 * Return: status code
767 efi_status_t efi_set_timer(struct efi_event *event, enum efi_timer_delay type,
768 uint64_t trigger_time)
770 /* Check that the event is valid */
771 if (efi_is_event(event) != EFI_SUCCESS || !(event->type & EVT_TIMER))
772 return EFI_INVALID_PARAMETER;
775 * The parameter defines a multiple of 100 ns.
776 * We use multiples of 1000 ns. So divide by 10.
778 do_div(trigger_time, 10);
782 event->trigger_next = -1ULL;
784 case EFI_TIMER_PERIODIC:
785 case EFI_TIMER_RELATIVE:
786 event->trigger_next = timer_get_us() + trigger_time;
789 return EFI_INVALID_PARAMETER;
791 event->trigger_type = type;
792 event->trigger_time = trigger_time;
793 event->is_signaled = false;
798 * efi_set_timer_ext() - Set the trigger time for a timer event or stop the
800 * @event: event for which the timer is set
801 * @type: type of the timer
802 * @trigger_time: trigger period in multiples of 100 ns
804 * This function implements the SetTimer service.
806 * See the Unified Extensible Firmware Interface (UEFI) specification for
810 * Return: status code
812 static efi_status_t EFIAPI efi_set_timer_ext(struct efi_event *event,
813 enum efi_timer_delay type,
814 uint64_t trigger_time)
816 EFI_ENTRY("%p, %d, %llx", event, type, trigger_time);
817 return EFI_EXIT(efi_set_timer(event, type, trigger_time));
821 * efi_wait_for_event() - wait for events to be signaled
822 * @num_events: number of events to be waited for
823 * @event: events to be waited for
824 * @index: index of the event that was signaled
826 * This function implements the WaitForEvent service.
828 * See the Unified Extensible Firmware Interface (UEFI) specification for
831 * Return: status code
833 static efi_status_t EFIAPI efi_wait_for_event(efi_uintn_t num_events,
834 struct efi_event **event,
839 EFI_ENTRY("%zd, %p, %p", num_events, event, index);
841 /* Check parameters */
842 if (!num_events || !event)
843 return EFI_EXIT(EFI_INVALID_PARAMETER);
845 if (efi_tpl != TPL_APPLICATION)
846 return EFI_EXIT(EFI_UNSUPPORTED);
847 for (i = 0; i < num_events; ++i) {
848 if (efi_is_event(event[i]) != EFI_SUCCESS)
849 return EFI_EXIT(EFI_INVALID_PARAMETER);
850 if (!event[i]->type || event[i]->type & EVT_NOTIFY_SIGNAL)
851 return EFI_EXIT(EFI_INVALID_PARAMETER);
852 if (!event[i]->is_signaled)
853 efi_queue_event(event[i], true);
856 /* Wait for signal */
858 for (i = 0; i < num_events; ++i) {
859 if (event[i]->is_signaled)
862 /* Allow events to occur. */
868 * Reset the signal which is passed to the caller to allow periodic
871 event[i]->is_signaled = false;
875 return EFI_EXIT(EFI_SUCCESS);
879 * efi_signal_event_ext() - signal an EFI event
880 * @event: event to signal
882 * This function implements the SignalEvent service.
884 * See the Unified Extensible Firmware Interface (UEFI) specification for
887 * This functions sets the signaled state of the event and queues the
888 * notification function for execution.
890 * Return: status code
892 static efi_status_t EFIAPI efi_signal_event_ext(struct efi_event *event)
894 EFI_ENTRY("%p", event);
895 if (efi_is_event(event) != EFI_SUCCESS)
896 return EFI_EXIT(EFI_INVALID_PARAMETER);
897 efi_signal_event(event, true);
898 return EFI_EXIT(EFI_SUCCESS);
902 * efi_close_event() - close an EFI event
903 * @event: event to close
905 * This function implements the CloseEvent service.
907 * See the Unified Extensible Firmware Interface (UEFI) specification for
910 * Return: status code
912 static efi_status_t EFIAPI efi_close_event(struct efi_event *event)
914 struct efi_register_notify_event *item, *next;
916 EFI_ENTRY("%p", event);
917 if (efi_is_event(event) != EFI_SUCCESS)
918 return EFI_EXIT(EFI_INVALID_PARAMETER);
920 /* Remove protocol notify registrations for the event */
921 list_for_each_entry_safe(item, next, &efi_register_notify_events,
923 if (event == item->event) {
924 list_del(&item->link);
929 list_del(&event->link);
931 return EFI_EXIT(EFI_SUCCESS);
935 * efi_check_event() - check if an event is signaled
936 * @event: event to check
938 * This function implements the CheckEvent service.
940 * See the Unified Extensible Firmware Interface (UEFI) specification for
943 * If an event is not signaled yet, the notification function is queued. The
944 * signaled state is cleared.
946 * Return: status code
948 static efi_status_t EFIAPI efi_check_event(struct efi_event *event)
950 EFI_ENTRY("%p", event);
952 if (efi_is_event(event) != EFI_SUCCESS ||
953 event->type & EVT_NOTIFY_SIGNAL)
954 return EFI_EXIT(EFI_INVALID_PARAMETER);
955 if (!event->is_signaled)
956 efi_queue_event(event, true);
957 if (event->is_signaled) {
958 event->is_signaled = false;
959 return EFI_EXIT(EFI_SUCCESS);
961 return EFI_EXIT(EFI_NOT_READY);
965 * efi_search_obj() - find the internal EFI object for a handle
966 * @handle: handle to find
970 struct efi_object *efi_search_obj(const efi_handle_t handle)
972 struct efi_object *efiobj;
977 list_for_each_entry(efiobj, &efi_obj_list, link) {
978 if (efiobj == handle)
985 * efi_open_protocol_info_entry() - create open protocol info entry and add it
987 * @handler: handler of a protocol
989 * Return: open protocol info entry
991 static struct efi_open_protocol_info_entry *efi_create_open_info(
992 struct efi_handler *handler)
994 struct efi_open_protocol_info_item *item;
996 item = calloc(1, sizeof(struct efi_open_protocol_info_item));
999 /* Append the item to the open protocol info list. */
1000 list_add_tail(&item->link, &handler->open_infos);
1006 * efi_delete_open_info() - remove an open protocol info entry from a protocol
1007 * @item: open protocol info entry to delete
1009 * Return: status code
1011 static efi_status_t efi_delete_open_info(
1012 struct efi_open_protocol_info_item *item)
1014 list_del(&item->link);
1020 * efi_add_protocol() - install new protocol on a handle
1021 * @handle: handle on which the protocol shall be installed
1022 * @protocol: GUID of the protocol to be installed
1023 * @protocol_interface: interface of the protocol implementation
1025 * Return: status code
1027 efi_status_t efi_add_protocol(const efi_handle_t handle,
1028 const efi_guid_t *protocol,
1029 void *protocol_interface)
1031 struct efi_object *efiobj;
1032 struct efi_handler *handler;
1034 struct efi_register_notify_event *event;
1036 efiobj = efi_search_obj(handle);
1038 return EFI_INVALID_PARAMETER;
1039 ret = efi_search_protocol(handle, protocol, NULL);
1040 if (ret != EFI_NOT_FOUND)
1041 return EFI_INVALID_PARAMETER;
1042 handler = calloc(1, sizeof(struct efi_handler));
1044 return EFI_OUT_OF_RESOURCES;
1045 handler->guid = protocol;
1046 handler->protocol_interface = protocol_interface;
1047 INIT_LIST_HEAD(&handler->open_infos);
1048 list_add_tail(&handler->link, &efiobj->protocols);
1050 /* Notify registered events */
1051 list_for_each_entry(event, &efi_register_notify_events, link) {
1052 if (!guidcmp(protocol, &event->protocol))
1053 efi_signal_event(event->event, true);
1056 if (!guidcmp(&efi_guid_device_path, protocol))
1057 EFI_PRINT("installed device path '%pD'\n", protocol_interface);
1062 * efi_install_protocol_interface() - install protocol interface
1063 * @handle: handle on which the protocol shall be installed
1064 * @protocol: GUID of the protocol to be installed
1065 * @protocol_interface_type: type of the interface to be installed,
1066 * always EFI_NATIVE_INTERFACE
1067 * @protocol_interface: interface of the protocol implementation
1069 * This function implements the InstallProtocolInterface service.
1071 * See the Unified Extensible Firmware Interface (UEFI) specification for
1074 * Return: status code
1076 static efi_status_t EFIAPI efi_install_protocol_interface(
1077 efi_handle_t *handle, const efi_guid_t *protocol,
1078 int protocol_interface_type, void *protocol_interface)
1082 EFI_ENTRY("%p, %pUl, %d, %p", handle, protocol, protocol_interface_type,
1083 protocol_interface);
1085 if (!handle || !protocol ||
1086 protocol_interface_type != EFI_NATIVE_INTERFACE) {
1087 r = EFI_INVALID_PARAMETER;
1091 /* Create new handle if requested. */
1093 r = efi_create_handle(handle);
1094 if (r != EFI_SUCCESS)
1096 EFI_PRINT("new handle %p\n", *handle);
1098 EFI_PRINT("handle %p\n", *handle);
1100 /* Add new protocol */
1101 r = efi_add_protocol(*handle, protocol, protocol_interface);
1107 * efi_get_drivers() - get all drivers associated to a controller
1108 * @handle: handle of the controller
1109 * @protocol: protocol GUID (optional)
1110 * @number_of_drivers: number of child controllers
1111 * @driver_handle_buffer: handles of the the drivers
1113 * The allocated buffer has to be freed with free().
1115 * Return: status code
1117 static efi_status_t efi_get_drivers(efi_handle_t handle,
1118 const efi_guid_t *protocol,
1119 efi_uintn_t *number_of_drivers,
1120 efi_handle_t **driver_handle_buffer)
1122 struct efi_handler *handler;
1123 struct efi_open_protocol_info_item *item;
1124 efi_uintn_t count = 0, i;
1127 /* Count all driver associations */
1128 list_for_each_entry(handler, &handle->protocols, link) {
1129 if (protocol && guidcmp(handler->guid, protocol))
1131 list_for_each_entry(item, &handler->open_infos, link) {
1132 if (item->info.attributes &
1133 EFI_OPEN_PROTOCOL_BY_DRIVER)
1138 * Create buffer. In case of duplicate driver assignments the buffer
1139 * will be too large. But that does not harm.
1141 *number_of_drivers = 0;
1142 *driver_handle_buffer = calloc(count, sizeof(efi_handle_t));
1143 if (!*driver_handle_buffer)
1144 return EFI_OUT_OF_RESOURCES;
1145 /* Collect unique driver handles */
1146 list_for_each_entry(handler, &handle->protocols, link) {
1147 if (protocol && guidcmp(handler->guid, protocol))
1149 list_for_each_entry(item, &handler->open_infos, link) {
1150 if (item->info.attributes &
1151 EFI_OPEN_PROTOCOL_BY_DRIVER) {
1152 /* Check this is a new driver */
1154 for (i = 0; i < *number_of_drivers; ++i) {
1155 if ((*driver_handle_buffer)[i] ==
1156 item->info.agent_handle)
1159 /* Copy handle to buffer */
1161 i = (*number_of_drivers)++;
1162 (*driver_handle_buffer)[i] =
1163 item->info.agent_handle;
1172 * efi_disconnect_all_drivers() - disconnect all drivers from a controller
1173 * @handle: handle of the controller
1174 * @protocol: protocol GUID (optional)
1175 * @child_handle: handle of the child to destroy
1177 * This function implements the DisconnectController service.
1179 * See the Unified Extensible Firmware Interface (UEFI) specification for
1182 * Return: status code
1184 static efi_status_t efi_disconnect_all_drivers
1185 (efi_handle_t handle,
1186 const efi_guid_t *protocol,
1187 efi_handle_t child_handle)
1189 efi_uintn_t number_of_drivers;
1190 efi_handle_t *driver_handle_buffer;
1191 efi_status_t r, ret;
1193 ret = efi_get_drivers(handle, protocol, &number_of_drivers,
1194 &driver_handle_buffer);
1195 if (ret != EFI_SUCCESS)
1198 ret = EFI_NOT_FOUND;
1199 while (number_of_drivers) {
1200 r = EFI_CALL(efi_disconnect_controller(
1202 driver_handle_buffer[--number_of_drivers],
1204 if (r == EFI_SUCCESS)
1207 free(driver_handle_buffer);
1212 * efi_uninstall_protocol() - uninstall protocol interface
1214 * @handle: handle from which the protocol shall be removed
1215 * @protocol: GUID of the protocol to be removed
1216 * @protocol_interface: interface to be removed
1218 * This function DOES NOT delete a handle without installed protocol.
1220 * Return: status code
1222 static efi_status_t efi_uninstall_protocol
1223 (efi_handle_t handle, const efi_guid_t *protocol,
1224 void *protocol_interface)
1226 struct efi_object *efiobj;
1227 struct efi_handler *handler;
1228 struct efi_open_protocol_info_item *item;
1229 struct efi_open_protocol_info_item *pos;
1233 efiobj = efi_search_obj(handle);
1235 r = EFI_INVALID_PARAMETER;
1238 /* Find the protocol on the handle */
1239 r = efi_search_protocol(handle, protocol, &handler);
1240 if (r != EFI_SUCCESS)
1242 /* Disconnect controllers */
1243 efi_disconnect_all_drivers(efiobj, protocol, NULL);
1244 if (!list_empty(&handler->open_infos)) {
1245 r = EFI_ACCESS_DENIED;
1248 /* Close protocol */
1249 list_for_each_entry_safe(item, pos, &handler->open_infos, link) {
1250 if (item->info.attributes ==
1251 EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL ||
1252 item->info.attributes == EFI_OPEN_PROTOCOL_GET_PROTOCOL ||
1253 item->info.attributes == EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
1254 list_del(&item->link);
1256 if (!list_empty(&handler->open_infos)) {
1257 r = EFI_ACCESS_DENIED;
1260 r = efi_remove_protocol(handle, protocol, protocol_interface);
1266 * efi_uninstall_protocol_interface() - uninstall protocol interface
1267 * @handle: handle from which the protocol shall be removed
1268 * @protocol: GUID of the protocol to be removed
1269 * @protocol_interface: interface to be removed
1271 * This function implements the UninstallProtocolInterface service.
1273 * See the Unified Extensible Firmware Interface (UEFI) specification for
1276 * Return: status code
1278 static efi_status_t EFIAPI efi_uninstall_protocol_interface
1279 (efi_handle_t handle, const efi_guid_t *protocol,
1280 void *protocol_interface)
1284 EFI_ENTRY("%p, %pUl, %p", handle, protocol, protocol_interface);
1286 ret = efi_uninstall_protocol(handle, protocol, protocol_interface);
1287 if (ret != EFI_SUCCESS)
1290 /* If the last protocol has been removed, delete the handle. */
1291 if (list_empty(&handle->protocols)) {
1292 list_del(&handle->link);
1296 return EFI_EXIT(ret);
1300 * efi_register_protocol_notify() - register an event for notification when a
1301 * protocol is installed.
1302 * @protocol: GUID of the protocol whose installation shall be notified
1303 * @event: event to be signaled upon installation of the protocol
1304 * @registration: key for retrieving the registration information
1306 * This function implements the RegisterProtocolNotify service.
1307 * See the Unified Extensible Firmware Interface (UEFI) specification
1310 * Return: status code
1312 static efi_status_t EFIAPI efi_register_protocol_notify(
1313 const efi_guid_t *protocol,
1314 struct efi_event *event,
1315 void **registration)
1317 struct efi_register_notify_event *item;
1318 efi_status_t ret = EFI_SUCCESS;
1320 EFI_ENTRY("%pUl, %p, %p", protocol, event, registration);
1322 if (!protocol || !event || !registration) {
1323 ret = EFI_INVALID_PARAMETER;
1327 item = calloc(1, sizeof(struct efi_register_notify_event));
1329 ret = EFI_OUT_OF_RESOURCES;
1333 item->event = event;
1334 memcpy(&item->protocol, protocol, sizeof(efi_guid_t));
1336 list_add_tail(&item->link, &efi_register_notify_events);
1338 *registration = item;
1340 return EFI_EXIT(ret);
1344 * efi_search() - determine if an EFI handle implements a protocol
1345 * @search_type: selection criterion
1346 * @protocol: GUID of the protocol
1347 * @search_key: registration key
1350 * See the documentation of the LocateHandle service in the UEFI specification.
1352 * Return: 0 if the handle implements the protocol
1354 static int efi_search(enum efi_locate_search_type search_type,
1355 const efi_guid_t *protocol, efi_handle_t handle)
1359 switch (search_type) {
1362 case BY_REGISTER_NOTIFY:
1364 ret = efi_search_protocol(handle, protocol, NULL);
1365 return (ret != EFI_SUCCESS);
1367 /* Invalid search type */
1373 * efi_locate_handle() - locate handles implementing a protocol
1375 * @search_type: selection criterion
1376 * @protocol: GUID of the protocol
1377 * @search_key: registration key
1378 * @buffer_size: size of the buffer to receive the handles in bytes
1379 * @buffer: buffer to receive the relevant handles
1381 * This function is meant for U-Boot internal calls. For the API implementation
1382 * of the LocateHandle service see efi_locate_handle_ext.
1384 * Return: status code
1386 static efi_status_t efi_locate_handle(
1387 enum efi_locate_search_type search_type,
1388 const efi_guid_t *protocol, void *search_key,
1389 efi_uintn_t *buffer_size, efi_handle_t *buffer)
1391 struct efi_object *efiobj;
1392 efi_uintn_t size = 0;
1393 struct efi_register_notify_event *item, *event = NULL;
1395 /* Check parameters */
1396 switch (search_type) {
1399 case BY_REGISTER_NOTIFY:
1401 return EFI_INVALID_PARAMETER;
1402 /* Check that the registration key is valid */
1403 list_for_each_entry(item, &efi_register_notify_events, link) {
1405 (struct efi_register_notify_event *)search_key) {
1411 return EFI_INVALID_PARAMETER;
1413 protocol = &event->protocol;
1417 return EFI_INVALID_PARAMETER;
1420 return EFI_INVALID_PARAMETER;
1423 /* Count how much space we need */
1424 list_for_each_entry(efiobj, &efi_obj_list, link) {
1425 if (!efi_search(search_type, protocol, efiobj))
1426 size += sizeof(void *);
1430 return EFI_NOT_FOUND;
1433 return EFI_INVALID_PARAMETER;
1435 if (*buffer_size < size) {
1436 *buffer_size = size;
1437 return EFI_BUFFER_TOO_SMALL;
1440 *buffer_size = size;
1442 /* The buffer size is sufficient but there is no buffer */
1444 return EFI_INVALID_PARAMETER;
1446 /* Then fill the array */
1447 list_for_each_entry(efiobj, &efi_obj_list, link) {
1448 if (!efi_search(search_type, protocol, efiobj))
1456 * efi_locate_handle_ext() - locate handles implementing a protocol.
1457 * @search_type: selection criterion
1458 * @protocol: GUID of the protocol
1459 * @search_key: registration key
1460 * @buffer_size: size of the buffer to receive the handles in bytes
1461 * @buffer: buffer to receive the relevant handles
1463 * This function implements the LocateHandle service.
1465 * See the Unified Extensible Firmware Interface (UEFI) specification for
1468 * Return: 0 if the handle implements the protocol
1470 static efi_status_t EFIAPI efi_locate_handle_ext(
1471 enum efi_locate_search_type search_type,
1472 const efi_guid_t *protocol, void *search_key,
1473 efi_uintn_t *buffer_size, efi_handle_t *buffer)
1475 EFI_ENTRY("%d, %pUl, %p, %p, %p", search_type, protocol, search_key,
1476 buffer_size, buffer);
1478 return EFI_EXIT(efi_locate_handle(search_type, protocol, search_key,
1479 buffer_size, buffer));
1483 * efi_remove_configuration_table() - collapses configuration table entries,
1486 * @i: index of the table entry to be removed
1488 static void efi_remove_configuration_table(int i)
1490 struct efi_configuration_table *this = &systab.tables[i];
1491 struct efi_configuration_table *next = &systab.tables[i + 1];
1492 struct efi_configuration_table *end = &systab.tables[systab.nr_tables];
1494 memmove(this, next, (ulong)end - (ulong)next);
1499 * efi_install_configuration_table() - adds, updates, or removes a
1500 * configuration table
1501 * @guid: GUID of the installed table
1502 * @table: table to be installed
1504 * This function is used for internal calls. For the API implementation of the
1505 * InstallConfigurationTable service see efi_install_configuration_table_ext.
1507 * Return: status code
1509 efi_status_t efi_install_configuration_table(const efi_guid_t *guid,
1512 struct efi_event *evt;
1516 return EFI_INVALID_PARAMETER;
1518 /* Check for GUID override */
1519 for (i = 0; i < systab.nr_tables; i++) {
1520 if (!guidcmp(guid, &systab.tables[i].guid)) {
1522 systab.tables[i].table = table;
1524 efi_remove_configuration_table(i);
1530 return EFI_NOT_FOUND;
1532 /* No override, check for overflow */
1533 if (i >= EFI_MAX_CONFIGURATION_TABLES)
1534 return EFI_OUT_OF_RESOURCES;
1536 /* Add a new entry */
1537 memcpy(&systab.tables[i].guid, guid, sizeof(*guid));
1538 systab.tables[i].table = table;
1539 systab.nr_tables = i + 1;
1542 /* systab.nr_tables may have changed. So we need to update the CRC32 */
1543 efi_update_table_header_crc32(&systab.hdr);
1545 /* Notify that the configuration table was changed */
1546 list_for_each_entry(evt, &efi_events, link) {
1547 if (evt->group && !guidcmp(evt->group, guid)) {
1548 efi_signal_event(evt, false);
1557 * efi_install_configuration_table_ex() - Adds, updates, or removes a
1558 * configuration table.
1559 * @guid: GUID of the installed table
1560 * @table: table to be installed
1562 * This function implements the InstallConfigurationTable service.
1564 * See the Unified Extensible Firmware Interface (UEFI) specification for
1567 * Return: status code
1569 static efi_status_t EFIAPI efi_install_configuration_table_ext(efi_guid_t *guid,
1572 EFI_ENTRY("%pUl, %p", guid, table);
1573 return EFI_EXIT(efi_install_configuration_table(guid, table));
1577 * efi_setup_loaded_image() - initialize a loaded image
1579 * Initialize a loaded_image_info and loaded_image_info object with correct
1580 * protocols, boot-device, etc.
1582 * In case of an error *handle_ptr and *info_ptr are set to NULL and an error
1585 * @device_path: device path of the loaded image
1586 * @file_path: file path of the loaded image
1587 * @handle_ptr: handle of the loaded image
1588 * @info_ptr: loaded image protocol
1589 * Return: status code
1591 efi_status_t efi_setup_loaded_image(struct efi_device_path *device_path,
1592 struct efi_device_path *file_path,
1593 struct efi_loaded_image_obj **handle_ptr,
1594 struct efi_loaded_image **info_ptr)
1597 struct efi_loaded_image *info = NULL;
1598 struct efi_loaded_image_obj *obj = NULL;
1599 struct efi_device_path *dp;
1601 /* In case of EFI_OUT_OF_RESOURCES avoid illegal free by caller. */
1605 info = calloc(1, sizeof(*info));
1607 return EFI_OUT_OF_RESOURCES;
1608 obj = calloc(1, sizeof(*obj));
1611 return EFI_OUT_OF_RESOURCES;
1613 obj->header.type = EFI_OBJECT_TYPE_LOADED_IMAGE;
1615 /* Add internal object to object list */
1616 efi_add_handle(&obj->header);
1618 info->revision = EFI_LOADED_IMAGE_PROTOCOL_REVISION;
1619 info->file_path = file_path;
1620 info->system_table = &systab;
1623 info->device_handle = efi_dp_find_obj(device_path, NULL);
1625 dp = efi_dp_append(device_path, file_path);
1627 ret = EFI_OUT_OF_RESOURCES;
1633 ret = efi_add_protocol(&obj->header,
1634 &efi_guid_loaded_image_device_path, dp);
1635 if (ret != EFI_SUCCESS)
1639 * When asking for the loaded_image interface, just
1640 * return handle which points to loaded_image_info
1642 ret = efi_add_protocol(&obj->header,
1643 &efi_guid_loaded_image, info);
1644 if (ret != EFI_SUCCESS)
1652 printf("ERROR: Failure to install protocols for loaded image\n");
1653 efi_delete_handle(&obj->header);
1659 * efi_load_image_from_path() - load an image using a file path
1661 * Read a file into a buffer allocated as EFI_BOOT_SERVICES_DATA. It is the
1662 * callers obligation to update the memory type as needed.
1664 * @file_path: the path of the image to load
1665 * @buffer: buffer containing the loaded image
1666 * @size: size of the loaded image
1667 * Return: status code
1670 efi_status_t efi_load_image_from_path(struct efi_device_path *file_path,
1671 void **buffer, efi_uintn_t *size)
1673 struct efi_file_info *info = NULL;
1674 struct efi_file_handle *f;
1675 static efi_status_t ret;
1679 /* In case of failure nothing is returned */
1684 f = efi_file_from_path(file_path);
1686 return EFI_DEVICE_ERROR;
1690 EFI_CALL(ret = f->getinfo(f, (efi_guid_t *)&efi_file_info_guid,
1692 if (ret != EFI_BUFFER_TOO_SMALL) {
1693 ret = EFI_DEVICE_ERROR;
1698 EFI_CALL(ret = f->getinfo(f, (efi_guid_t *)&efi_file_info_guid, &bs,
1700 if (ret != EFI_SUCCESS)
1704 * When reading the file we do not yet know if it contains an
1705 * application, a boottime driver, or a runtime driver. So here we
1706 * allocate a buffer as EFI_BOOT_SERVICES_DATA. The caller has to
1707 * update the reservation according to the image type.
1709 bs = info->file_size;
1710 ret = efi_allocate_pages(EFI_ALLOCATE_ANY_PAGES,
1711 EFI_BOOT_SERVICES_DATA,
1712 efi_size_in_pages(bs), &addr);
1713 if (ret != EFI_SUCCESS) {
1714 ret = EFI_OUT_OF_RESOURCES;
1719 EFI_CALL(ret = f->read(f, &bs, (void *)(uintptr_t)addr));
1720 if (ret != EFI_SUCCESS)
1721 efi_free_pages(addr, efi_size_in_pages(bs));
1722 *buffer = (void *)(uintptr_t)addr;
1725 EFI_CALL(f->close(f));
1731 * efi_load_image() - load an EFI image into memory
1732 * @boot_policy: true for request originating from the boot manager
1733 * @parent_image: the caller's image handle
1734 * @file_path: the path of the image to load
1735 * @source_buffer: memory location from which the image is installed
1736 * @source_size: size of the memory area from which the image is installed
1737 * @image_handle: handle for the newly installed image
1739 * This function implements the LoadImage service.
1741 * See the Unified Extensible Firmware Interface (UEFI) specification
1744 * Return: status code
1746 efi_status_t EFIAPI efi_load_image(bool boot_policy,
1747 efi_handle_t parent_image,
1748 struct efi_device_path *file_path,
1749 void *source_buffer,
1750 efi_uintn_t source_size,
1751 efi_handle_t *image_handle)
1753 struct efi_device_path *dp, *fp;
1754 struct efi_loaded_image *info = NULL;
1755 struct efi_loaded_image_obj **image_obj =
1756 (struct efi_loaded_image_obj **)image_handle;
1760 EFI_ENTRY("%d, %p, %pD, %p, %zd, %p", boot_policy, parent_image,
1761 file_path, source_buffer, source_size, image_handle);
1763 if (!image_handle || !efi_search_obj(parent_image)) {
1764 ret = EFI_INVALID_PARAMETER;
1768 if (!source_buffer && !file_path) {
1769 ret = EFI_NOT_FOUND;
1772 /* The parent image handle must refer to a loaded image */
1773 if (!parent_image->type) {
1774 ret = EFI_INVALID_PARAMETER;
1778 if (!source_buffer) {
1779 ret = efi_load_image_from_path(file_path, &dest_buffer,
1781 if (ret != EFI_SUCCESS)
1785 ret = EFI_LOAD_ERROR;
1788 dest_buffer = source_buffer;
1790 /* split file_path which contains both the device and file parts */
1791 efi_dp_split_file_path(file_path, &dp, &fp);
1792 ret = efi_setup_loaded_image(dp, fp, image_obj, &info);
1793 if (ret == EFI_SUCCESS)
1794 ret = efi_load_pe(*image_obj, dest_buffer, info);
1796 /* Release buffer to which file was loaded */
1797 efi_free_pages((uintptr_t)dest_buffer,
1798 efi_size_in_pages(source_size));
1799 if (ret == EFI_SUCCESS) {
1800 info->system_table = &systab;
1801 info->parent_handle = parent_image;
1803 /* The image is invalid. Release all associated resources. */
1804 efi_delete_handle(*image_handle);
1805 *image_handle = NULL;
1809 return EFI_EXIT(ret);
1813 * efi_exit_caches() - fix up caches for EFI payloads if necessary
1815 static void efi_exit_caches(void)
1817 #if defined(CONFIG_ARM) && !defined(CONFIG_ARM64)
1819 * Grub on 32bit ARM needs to have caches disabled before jumping into
1820 * a zImage, but does not know of all cache layers. Give it a hand.
1822 if (efi_is_direct_boot)
1823 cleanup_before_linux();
1828 * efi_exit_boot_services() - stop all boot services
1829 * @image_handle: handle of the loaded image
1830 * @map_key: key of the memory map
1832 * This function implements the ExitBootServices service.
1834 * See the Unified Extensible Firmware Interface (UEFI) specification
1837 * All timer events are disabled. For exit boot services events the
1838 * notification function is called. The boot services are disabled in the
1841 * Return: status code
1843 static efi_status_t EFIAPI efi_exit_boot_services(efi_handle_t image_handle,
1844 efi_uintn_t map_key)
1846 struct efi_event *evt;
1848 EFI_ENTRY("%p, %zx", image_handle, map_key);
1850 /* Check that the caller has read the current memory map */
1851 if (map_key != efi_memory_map_key)
1852 return EFI_INVALID_PARAMETER;
1854 /* Make sure that notification functions are not called anymore */
1855 efi_tpl = TPL_HIGH_LEVEL;
1857 /* Check if ExitBootServices has already been called */
1858 if (!systab.boottime)
1859 return EFI_EXIT(EFI_SUCCESS);
1861 /* Add related events to the event group */
1862 list_for_each_entry(evt, &efi_events, link) {
1863 if (evt->type == EVT_SIGNAL_EXIT_BOOT_SERVICES)
1864 evt->group = &efi_guid_event_group_exit_boot_services;
1866 /* Notify that ExitBootServices is invoked. */
1867 list_for_each_entry(evt, &efi_events, link) {
1869 !guidcmp(evt->group,
1870 &efi_guid_event_group_exit_boot_services)) {
1871 efi_signal_event(evt, false);
1876 /* TODO: Should persist EFI variables here */
1878 board_quiesce_devices();
1880 /* Fix up caches for EFI payloads if necessary */
1883 /* This stops all lingering devices */
1884 bootm_disable_interrupts();
1886 /* Disable boot time services */
1887 systab.con_in_handle = NULL;
1888 systab.con_in = NULL;
1889 systab.con_out_handle = NULL;
1890 systab.con_out = NULL;
1891 systab.stderr_handle = NULL;
1892 systab.std_err = NULL;
1893 systab.boottime = NULL;
1895 /* Recalculate CRC32 */
1896 efi_update_table_header_crc32(&systab.hdr);
1898 /* Give the payload some time to boot */
1899 efi_set_watchdog(0);
1902 return EFI_EXIT(EFI_SUCCESS);
1906 * efi_get_next_monotonic_count() - get next value of the counter
1907 * @count: returned value of the counter
1909 * This function implements the NextMonotonicCount service.
1911 * See the Unified Extensible Firmware Interface (UEFI) specification for
1914 * Return: status code
1916 static efi_status_t EFIAPI efi_get_next_monotonic_count(uint64_t *count)
1918 static uint64_t mono;
1920 EFI_ENTRY("%p", count);
1922 return EFI_EXIT(EFI_SUCCESS);
1926 * efi_stall() - sleep
1927 * @microseconds: period to sleep in microseconds
1929 * This function implements the Stall service.
1931 * See the Unified Extensible Firmware Interface (UEFI) specification for
1934 * Return: status code
1936 static efi_status_t EFIAPI efi_stall(unsigned long microseconds)
1938 EFI_ENTRY("%ld", microseconds);
1939 udelay(microseconds);
1940 return EFI_EXIT(EFI_SUCCESS);
1944 * efi_set_watchdog_timer() - reset the watchdog timer
1945 * @timeout: seconds before reset by watchdog
1946 * @watchdog_code: code to be logged when resetting
1947 * @data_size: size of buffer in bytes
1948 * @watchdog_data: buffer with data describing the reset reason
1950 * This function implements the SetWatchdogTimer service.
1952 * See the Unified Extensible Firmware Interface (UEFI) specification for
1955 * Return: status code
1957 static efi_status_t EFIAPI efi_set_watchdog_timer(unsigned long timeout,
1958 uint64_t watchdog_code,
1959 unsigned long data_size,
1960 uint16_t *watchdog_data)
1962 EFI_ENTRY("%ld, 0x%llx, %ld, %p", timeout, watchdog_code,
1963 data_size, watchdog_data);
1964 return EFI_EXIT(efi_set_watchdog(timeout));
1968 * efi_close_protocol() - close a protocol
1969 * @handle: handle on which the protocol shall be closed
1970 * @protocol: GUID of the protocol to close
1971 * @agent_handle: handle of the driver
1972 * @controller_handle: handle of the controller
1974 * This function implements the CloseProtocol service.
1976 * See the Unified Extensible Firmware Interface (UEFI) specification for
1979 * Return: status code
1981 static efi_status_t EFIAPI efi_close_protocol(efi_handle_t handle,
1982 const efi_guid_t *protocol,
1983 efi_handle_t agent_handle,
1984 efi_handle_t controller_handle)
1986 struct efi_handler *handler;
1987 struct efi_open_protocol_info_item *item;
1988 struct efi_open_protocol_info_item *pos;
1991 EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, agent_handle,
1994 if (!efi_search_obj(agent_handle) ||
1995 (controller_handle && !efi_search_obj(controller_handle))) {
1996 r = EFI_INVALID_PARAMETER;
1999 r = efi_search_protocol(handle, protocol, &handler);
2000 if (r != EFI_SUCCESS)
2004 list_for_each_entry_safe(item, pos, &handler->open_infos, link) {
2005 if (item->info.agent_handle == agent_handle &&
2006 item->info.controller_handle == controller_handle) {
2007 efi_delete_open_info(item);
2017 * efi_open_protocol_information() - provide information about then open status
2018 * of a protocol on a handle
2019 * @handle: handle for which the information shall be retrieved
2020 * @protocol: GUID of the protocol
2021 * @entry_buffer: buffer to receive the open protocol information
2022 * @entry_count: number of entries available in the buffer
2024 * This function implements the OpenProtocolInformation service.
2026 * See the Unified Extensible Firmware Interface (UEFI) specification for
2029 * Return: status code
2031 static efi_status_t EFIAPI efi_open_protocol_information(
2032 efi_handle_t handle, const efi_guid_t *protocol,
2033 struct efi_open_protocol_info_entry **entry_buffer,
2034 efi_uintn_t *entry_count)
2036 unsigned long buffer_size;
2037 unsigned long count;
2038 struct efi_handler *handler;
2039 struct efi_open_protocol_info_item *item;
2042 EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, entry_buffer,
2045 /* Check parameters */
2046 if (!entry_buffer) {
2047 r = EFI_INVALID_PARAMETER;
2050 r = efi_search_protocol(handle, protocol, &handler);
2051 if (r != EFI_SUCCESS)
2056 list_for_each_entry(item, &handler->open_infos, link) {
2057 if (item->info.open_count)
2060 *entry_count = count;
2061 *entry_buffer = NULL;
2068 buffer_size = count * sizeof(struct efi_open_protocol_info_entry);
2069 r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
2070 (void **)entry_buffer);
2071 if (r != EFI_SUCCESS)
2073 list_for_each_entry_reverse(item, &handler->open_infos, link) {
2074 if (item->info.open_count)
2075 (*entry_buffer)[--count] = item->info;
2082 * efi_protocols_per_handle() - get protocols installed on a handle
2083 * @handle: handle for which the information is retrieved
2084 * @protocol_buffer: buffer with protocol GUIDs
2085 * @protocol_buffer_count: number of entries in the buffer
2087 * This function implements the ProtocolsPerHandleService.
2089 * See the Unified Extensible Firmware Interface (UEFI) specification for
2092 * Return: status code
2094 static efi_status_t EFIAPI efi_protocols_per_handle(
2095 efi_handle_t handle, efi_guid_t ***protocol_buffer,
2096 efi_uintn_t *protocol_buffer_count)
2098 unsigned long buffer_size;
2099 struct efi_object *efiobj;
2100 struct list_head *protocol_handle;
2103 EFI_ENTRY("%p, %p, %p", handle, protocol_buffer,
2104 protocol_buffer_count);
2106 if (!handle || !protocol_buffer || !protocol_buffer_count)
2107 return EFI_EXIT(EFI_INVALID_PARAMETER);
2109 *protocol_buffer = NULL;
2110 *protocol_buffer_count = 0;
2112 efiobj = efi_search_obj(handle);
2114 return EFI_EXIT(EFI_INVALID_PARAMETER);
2116 /* Count protocols */
2117 list_for_each(protocol_handle, &efiobj->protocols) {
2118 ++*protocol_buffer_count;
2122 if (*protocol_buffer_count) {
2125 buffer_size = sizeof(efi_guid_t *) * *protocol_buffer_count;
2126 r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
2127 (void **)protocol_buffer);
2128 if (r != EFI_SUCCESS)
2130 list_for_each(protocol_handle, &efiobj->protocols) {
2131 struct efi_handler *protocol;
2133 protocol = list_entry(protocol_handle,
2134 struct efi_handler, link);
2135 (*protocol_buffer)[j] = (void *)protocol->guid;
2140 return EFI_EXIT(EFI_SUCCESS);
2144 * efi_locate_handle_buffer() - locate handles implementing a protocol
2145 * @search_type: selection criterion
2146 * @protocol: GUID of the protocol
2147 * @search_key: registration key
2148 * @no_handles: number of returned handles
2149 * @buffer: buffer with the returned handles
2151 * This function implements the LocateHandleBuffer service.
2153 * See the Unified Extensible Firmware Interface (UEFI) specification for
2156 * Return: status code
2158 static efi_status_t EFIAPI efi_locate_handle_buffer(
2159 enum efi_locate_search_type search_type,
2160 const efi_guid_t *protocol, void *search_key,
2161 efi_uintn_t *no_handles, efi_handle_t **buffer)
2164 efi_uintn_t buffer_size = 0;
2166 EFI_ENTRY("%d, %pUl, %p, %p, %p", search_type, protocol, search_key,
2167 no_handles, buffer);
2169 if (!no_handles || !buffer) {
2170 r = EFI_INVALID_PARAMETER;
2175 r = efi_locate_handle(search_type, protocol, search_key, &buffer_size,
2177 if (r != EFI_BUFFER_TOO_SMALL)
2179 r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
2181 if (r != EFI_SUCCESS)
2183 r = efi_locate_handle(search_type, protocol, search_key, &buffer_size,
2185 if (r == EFI_SUCCESS)
2186 *no_handles = buffer_size / sizeof(efi_handle_t);
2192 * efi_locate_protocol() - find an interface implementing a protocol
2193 * @protocol: GUID of the protocol
2194 * @registration: registration key passed to the notification function
2195 * @protocol_interface: interface implementing the protocol
2197 * This function implements the LocateProtocol service.
2199 * See the Unified Extensible Firmware Interface (UEFI) specification for
2202 * Return: status code
2204 static efi_status_t EFIAPI efi_locate_protocol(const efi_guid_t *protocol,
2206 void **protocol_interface)
2208 struct list_head *lhandle;
2211 EFI_ENTRY("%pUl, %p, %p", protocol, registration, protocol_interface);
2213 if (!protocol || !protocol_interface)
2214 return EFI_EXIT(EFI_INVALID_PARAMETER);
2216 list_for_each(lhandle, &efi_obj_list) {
2217 struct efi_object *efiobj;
2218 struct efi_handler *handler;
2220 efiobj = list_entry(lhandle, struct efi_object, link);
2222 ret = efi_search_protocol(efiobj, protocol, &handler);
2223 if (ret == EFI_SUCCESS) {
2224 *protocol_interface = handler->protocol_interface;
2225 return EFI_EXIT(EFI_SUCCESS);
2228 *protocol_interface = NULL;
2230 return EFI_EXIT(EFI_NOT_FOUND);
2234 * efi_locate_device_path() - Get the device path and handle of an device
2235 * implementing a protocol
2236 * @protocol: GUID of the protocol
2237 * @device_path: device path
2238 * @device: handle of the device
2240 * This function implements the LocateDevicePath service.
2242 * See the Unified Extensible Firmware Interface (UEFI) specification for
2245 * Return: status code
2247 static efi_status_t EFIAPI efi_locate_device_path(
2248 const efi_guid_t *protocol,
2249 struct efi_device_path **device_path,
2250 efi_handle_t *device)
2252 struct efi_device_path *dp;
2254 struct efi_handler *handler;
2255 efi_handle_t *handles;
2257 size_t len_best = 0;
2258 efi_uintn_t no_handles;
2262 EFI_ENTRY("%pUl, %p, %p", protocol, device_path, device);
2264 if (!protocol || !device_path || !*device_path) {
2265 ret = EFI_INVALID_PARAMETER;
2269 /* Find end of device path */
2270 len = efi_dp_instance_size(*device_path);
2272 /* Get all handles implementing the protocol */
2273 ret = EFI_CALL(efi_locate_handle_buffer(BY_PROTOCOL, protocol, NULL,
2274 &no_handles, &handles));
2275 if (ret != EFI_SUCCESS)
2278 for (i = 0; i < no_handles; ++i) {
2279 /* Find the device path protocol */
2280 ret = efi_search_protocol(handles[i], &efi_guid_device_path,
2282 if (ret != EFI_SUCCESS)
2284 dp = (struct efi_device_path *)handler->protocol_interface;
2285 len_dp = efi_dp_instance_size(dp);
2287 * This handle can only be a better fit
2288 * if its device path length is longer than the best fit and
2289 * if its device path length is shorter of equal the searched
2292 if (len_dp <= len_best || len_dp > len)
2294 /* Check if dp is a subpath of device_path */
2295 if (memcmp(*device_path, dp, len_dp))
2298 ret = EFI_INVALID_PARAMETER;
2301 *device = handles[i];
2305 remainder = (u8 *)*device_path + len_best;
2306 *device_path = (struct efi_device_path *)remainder;
2309 ret = EFI_NOT_FOUND;
2312 return EFI_EXIT(ret);
2316 * efi_install_multiple_protocol_interfaces() - Install multiple protocol
2318 * @handle: handle on which the protocol interfaces shall be installed
2319 * @...: NULL terminated argument list with pairs of protocol GUIDS and
2322 * This function implements the MultipleProtocolInterfaces service.
2324 * See the Unified Extensible Firmware Interface (UEFI) specification for
2327 * Return: status code
2329 efi_status_t EFIAPI efi_install_multiple_protocol_interfaces
2330 (efi_handle_t *handle, ...)
2332 EFI_ENTRY("%p", handle);
2335 const efi_guid_t *protocol;
2336 void *protocol_interface;
2337 efi_handle_t old_handle;
2338 efi_status_t r = EFI_SUCCESS;
2342 return EFI_EXIT(EFI_INVALID_PARAMETER);
2344 efi_va_start(argptr, handle);
2346 protocol = efi_va_arg(argptr, efi_guid_t*);
2349 protocol_interface = efi_va_arg(argptr, void*);
2350 /* Check that a device path has not been installed before */
2351 if (!guidcmp(protocol, &efi_guid_device_path)) {
2352 struct efi_device_path *dp = protocol_interface;
2354 r = EFI_CALL(efi_locate_device_path(protocol, &dp,
2356 if (r == EFI_SUCCESS) {
2357 r = EFI_ALREADY_STARTED;
2361 r = EFI_CALL(efi_install_protocol_interface(
2363 EFI_NATIVE_INTERFACE,
2364 protocol_interface));
2365 if (r != EFI_SUCCESS)
2370 if (r == EFI_SUCCESS)
2373 /* If an error occurred undo all changes. */
2374 efi_va_start(argptr, handle);
2376 protocol = efi_va_arg(argptr, efi_guid_t*);
2377 protocol_interface = efi_va_arg(argptr, void*);
2378 EFI_CALL(efi_uninstall_protocol_interface(*handle, protocol,
2379 protocol_interface));
2387 * efi_uninstall_multiple_protocol_interfaces() - uninstall multiple protocol
2389 * @handle: handle from which the protocol interfaces shall be removed
2390 * @...: NULL terminated argument list with pairs of protocol GUIDS and
2393 * This function implements the UninstallMultipleProtocolInterfaces service.
2395 * See the Unified Extensible Firmware Interface (UEFI) specification for
2398 * Return: status code
2400 static efi_status_t EFIAPI efi_uninstall_multiple_protocol_interfaces(
2401 efi_handle_t handle, ...)
2403 EFI_ENTRY("%p", handle);
2406 const efi_guid_t *protocol;
2407 void *protocol_interface;
2408 efi_status_t r = EFI_SUCCESS;
2412 return EFI_EXIT(EFI_INVALID_PARAMETER);
2414 efi_va_start(argptr, handle);
2416 protocol = efi_va_arg(argptr, efi_guid_t*);
2419 protocol_interface = efi_va_arg(argptr, void*);
2420 r = efi_uninstall_protocol(handle, protocol,
2421 protocol_interface);
2422 if (r != EFI_SUCCESS)
2427 if (r == EFI_SUCCESS) {
2428 /* If the last protocol has been removed, delete the handle. */
2429 if (list_empty(&handle->protocols)) {
2430 list_del(&handle->link);
2436 /* If an error occurred undo all changes. */
2437 efi_va_start(argptr, handle);
2439 protocol = efi_va_arg(argptr, efi_guid_t*);
2440 protocol_interface = efi_va_arg(argptr, void*);
2441 EFI_CALL(efi_install_protocol_interface(&handle, protocol,
2442 EFI_NATIVE_INTERFACE,
2443 protocol_interface));
2447 /* In case of an error always return EFI_INVALID_PARAMETER */
2448 return EFI_EXIT(EFI_INVALID_PARAMETER);
2452 * efi_calculate_crc32() - calculate cyclic redundancy code
2453 * @data: buffer with data
2454 * @data_size: size of buffer in bytes
2455 * @crc32_p: cyclic redundancy code
2457 * This function implements the CalculateCrc32 service.
2459 * See the Unified Extensible Firmware Interface (UEFI) specification for
2462 * Return: status code
2464 static efi_status_t EFIAPI efi_calculate_crc32(const void *data,
2465 efi_uintn_t data_size,
2468 efi_status_t ret = EFI_SUCCESS;
2470 EFI_ENTRY("%p, %zu", data, data_size);
2471 if (!data || !data_size || !crc32_p) {
2472 ret = EFI_INVALID_PARAMETER;
2475 *crc32_p = crc32(0, data, data_size);
2477 return EFI_EXIT(ret);
2481 * efi_copy_mem() - copy memory
2482 * @destination: destination of the copy operation
2483 * @source: source of the copy operation
2484 * @length: number of bytes to copy
2486 * This function implements the CopyMem service.
2488 * See the Unified Extensible Firmware Interface (UEFI) specification for
2491 static void EFIAPI efi_copy_mem(void *destination, const void *source,
2494 EFI_ENTRY("%p, %p, %ld", destination, source, (unsigned long)length);
2495 memmove(destination, source, length);
2496 EFI_EXIT(EFI_SUCCESS);
2500 * efi_set_mem() - Fill memory with a byte value.
2501 * @buffer: buffer to fill
2502 * @size: size of buffer in bytes
2503 * @value: byte to copy to the buffer
2505 * This function implements the SetMem service.
2507 * See the Unified Extensible Firmware Interface (UEFI) specification for
2510 static void EFIAPI efi_set_mem(void *buffer, size_t size, uint8_t value)
2512 EFI_ENTRY("%p, %ld, 0x%x", buffer, (unsigned long)size, value);
2513 memset(buffer, value, size);
2514 EFI_EXIT(EFI_SUCCESS);
2518 * efi_protocol_open() - open protocol interface on a handle
2519 * @handler: handler of a protocol
2520 * @protocol_interface: interface implementing the protocol
2521 * @agent_handle: handle of the driver
2522 * @controller_handle: handle of the controller
2523 * @attributes: attributes indicating how to open the protocol
2525 * Return: status code
2527 static efi_status_t efi_protocol_open(
2528 struct efi_handler *handler,
2529 void **protocol_interface, void *agent_handle,
2530 void *controller_handle, uint32_t attributes)
2532 struct efi_open_protocol_info_item *item;
2533 struct efi_open_protocol_info_entry *match = NULL;
2534 bool opened_by_driver = false;
2535 bool opened_exclusive = false;
2537 /* If there is no agent, only return the interface */
2541 /* For TEST_PROTOCOL ignore interface attribute */
2542 if (attributes != EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
2543 *protocol_interface = NULL;
2546 * Check if the protocol is already opened by a driver with the same
2547 * attributes or opened exclusively
2549 list_for_each_entry(item, &handler->open_infos, link) {
2550 if (item->info.agent_handle == agent_handle) {
2551 if ((attributes & EFI_OPEN_PROTOCOL_BY_DRIVER) &&
2552 (item->info.attributes == attributes))
2553 return EFI_ALREADY_STARTED;
2555 if (item->info.attributes & EFI_OPEN_PROTOCOL_EXCLUSIVE)
2556 opened_exclusive = true;
2559 /* Only one controller can open the protocol exclusively */
2560 if (opened_exclusive && attributes &
2561 (EFI_OPEN_PROTOCOL_EXCLUSIVE | EFI_OPEN_PROTOCOL_BY_DRIVER))
2562 return EFI_ACCESS_DENIED;
2564 /* Prepare exclusive opening */
2565 if (attributes & EFI_OPEN_PROTOCOL_EXCLUSIVE) {
2566 /* Try to disconnect controllers */
2567 list_for_each_entry(item, &handler->open_infos, link) {
2568 if (item->info.attributes ==
2569 EFI_OPEN_PROTOCOL_BY_DRIVER)
2570 EFI_CALL(efi_disconnect_controller(
2571 item->info.controller_handle,
2572 item->info.agent_handle,
2575 opened_by_driver = false;
2576 /* Check if all controllers are disconnected */
2577 list_for_each_entry(item, &handler->open_infos, link) {
2578 if (item->info.attributes & EFI_OPEN_PROTOCOL_BY_DRIVER)
2579 opened_by_driver = true;
2581 /* Only one controller can be connected */
2582 if (opened_by_driver)
2583 return EFI_ACCESS_DENIED;
2586 /* Find existing entry */
2587 list_for_each_entry(item, &handler->open_infos, link) {
2588 if (item->info.agent_handle == agent_handle &&
2589 item->info.controller_handle == controller_handle)
2590 match = &item->info;
2592 /* None found, create one */
2594 match = efi_create_open_info(handler);
2596 return EFI_OUT_OF_RESOURCES;
2599 match->agent_handle = agent_handle;
2600 match->controller_handle = controller_handle;
2601 match->attributes = attributes;
2602 match->open_count++;
2605 /* For TEST_PROTOCOL ignore interface attribute. */
2606 if (attributes != EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
2607 *protocol_interface = handler->protocol_interface;
2613 * efi_open_protocol() - open protocol interface on a handle
2614 * @handle: handle on which the protocol shall be opened
2615 * @protocol: GUID of the protocol
2616 * @protocol_interface: interface implementing the protocol
2617 * @agent_handle: handle of the driver
2618 * @controller_handle: handle of the controller
2619 * @attributes: attributes indicating how to open the protocol
2621 * This function implements the OpenProtocol interface.
2623 * See the Unified Extensible Firmware Interface (UEFI) specification for
2626 * Return: status code
2628 static efi_status_t EFIAPI efi_open_protocol
2629 (efi_handle_t handle, const efi_guid_t *protocol,
2630 void **protocol_interface, efi_handle_t agent_handle,
2631 efi_handle_t controller_handle, uint32_t attributes)
2633 struct efi_handler *handler;
2634 efi_status_t r = EFI_INVALID_PARAMETER;
2636 EFI_ENTRY("%p, %pUl, %p, %p, %p, 0x%x", handle, protocol,
2637 protocol_interface, agent_handle, controller_handle,
2640 if (!handle || !protocol ||
2641 (!protocol_interface && attributes !=
2642 EFI_OPEN_PROTOCOL_TEST_PROTOCOL)) {
2646 switch (attributes) {
2647 case EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL:
2648 case EFI_OPEN_PROTOCOL_GET_PROTOCOL:
2649 case EFI_OPEN_PROTOCOL_TEST_PROTOCOL:
2651 case EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER:
2652 if (controller_handle == handle)
2655 case EFI_OPEN_PROTOCOL_BY_DRIVER:
2656 case EFI_OPEN_PROTOCOL_BY_DRIVER | EFI_OPEN_PROTOCOL_EXCLUSIVE:
2657 /* Check that the controller handle is valid */
2658 if (!efi_search_obj(controller_handle))
2661 case EFI_OPEN_PROTOCOL_EXCLUSIVE:
2662 /* Check that the agent handle is valid */
2663 if (!efi_search_obj(agent_handle))
2670 r = efi_search_protocol(handle, protocol, &handler);
2675 r = EFI_UNSUPPORTED;
2681 r = efi_protocol_open(handler, protocol_interface, agent_handle,
2682 controller_handle, attributes);
2688 * efi_start_image() - call the entry point of an image
2689 * @image_handle: handle of the image
2690 * @exit_data_size: size of the buffer
2691 * @exit_data: buffer to receive the exit data of the called image
2693 * This function implements the StartImage service.
2695 * See the Unified Extensible Firmware Interface (UEFI) specification for
2698 * Return: status code
2700 efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle,
2701 efi_uintn_t *exit_data_size,
2704 struct efi_loaded_image_obj *image_obj =
2705 (struct efi_loaded_image_obj *)image_handle;
2708 efi_handle_t parent_image = current_image;
2710 EFI_ENTRY("%p, %p, %p", image_handle, exit_data_size, exit_data);
2712 /* Check parameters */
2713 ret = EFI_CALL(efi_open_protocol(image_handle, &efi_guid_loaded_image,
2715 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
2716 if (ret != EFI_SUCCESS)
2717 return EFI_EXIT(EFI_INVALID_PARAMETER);
2719 efi_is_direct_boot = false;
2721 image_obj->exit_data_size = exit_data_size;
2722 image_obj->exit_data = exit_data;
2724 /* call the image! */
2725 if (setjmp(&image_obj->exit_jmp)) {
2727 * We called the entry point of the child image with EFI_CALL
2728 * in the lines below. The child image called the Exit() boot
2729 * service efi_exit() which executed the long jump that brought
2730 * us to the current line. This implies that the second half
2731 * of the EFI_CALL macro has not been executed.
2735 * efi_exit() called efi_restore_gd(). We have to undo this
2736 * otherwise __efi_entry_check() will put the wrong value into
2742 * To get ready to call EFI_EXIT below we have to execute the
2743 * missed out steps of EFI_CALL.
2745 assert(__efi_entry_check());
2746 EFI_PRINT("%lu returned by started image\n",
2747 (unsigned long)((uintptr_t)image_obj->exit_status &
2749 current_image = parent_image;
2750 return EFI_EXIT(image_obj->exit_status);
2753 current_image = image_handle;
2754 image_obj->header.type = EFI_OBJECT_TYPE_STARTED_IMAGE;
2755 EFI_PRINT("Jumping into 0x%p\n", image_obj->entry);
2756 ret = EFI_CALL(image_obj->entry(image_handle, &systab));
2759 * Usually UEFI applications call Exit() instead of returning.
2760 * But because the world doesn't consist of ponies and unicorns,
2761 * we're happy to emulate that behavior on behalf of a payload
2764 return EFI_CALL(systab.boottime->exit(image_handle, ret, 0, NULL));
2768 * efi_delete_image() - delete loaded image from memory)
2770 * @image_obj: handle of the loaded image
2771 * @loaded_image_protocol: loaded image protocol
2773 static void efi_delete_image(struct efi_loaded_image_obj *image_obj,
2774 struct efi_loaded_image *loaded_image_protocol)
2776 efi_free_pages((uintptr_t)loaded_image_protocol->image_base,
2777 efi_size_in_pages(loaded_image_protocol->image_size));
2778 efi_delete_handle(&image_obj->header);
2782 * efi_unload_image() - unload an EFI image
2783 * @image_handle: handle of the image to be unloaded
2785 * This function implements the UnloadImage service.
2787 * See the Unified Extensible Firmware Interface (UEFI) specification for
2790 * Return: status code
2792 efi_status_t EFIAPI efi_unload_image(efi_handle_t image_handle)
2794 efi_status_t ret = EFI_SUCCESS;
2795 struct efi_object *efiobj;
2796 struct efi_loaded_image *loaded_image_protocol;
2798 EFI_ENTRY("%p", image_handle);
2800 efiobj = efi_search_obj(image_handle);
2802 ret = EFI_INVALID_PARAMETER;
2805 /* Find the loaded image protocol */
2806 ret = EFI_CALL(efi_open_protocol(image_handle, &efi_guid_loaded_image,
2807 (void **)&loaded_image_protocol,
2809 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
2810 if (ret != EFI_SUCCESS) {
2811 ret = EFI_INVALID_PARAMETER;
2814 switch (efiobj->type) {
2815 case EFI_OBJECT_TYPE_STARTED_IMAGE:
2816 /* Call the unload function */
2817 if (!loaded_image_protocol->unload) {
2818 ret = EFI_UNSUPPORTED;
2821 ret = EFI_CALL(loaded_image_protocol->unload(image_handle));
2822 if (ret != EFI_SUCCESS)
2825 case EFI_OBJECT_TYPE_LOADED_IMAGE:
2828 ret = EFI_INVALID_PARAMETER;
2831 efi_delete_image((struct efi_loaded_image_obj *)efiobj,
2832 loaded_image_protocol);
2834 return EFI_EXIT(ret);
2838 * efi_update_exit_data() - fill exit data parameters of StartImage()
2840 * @image_obj image handle
2841 * @exit_data_size size of the exit data buffer
2842 * @exit_data buffer with data returned by UEFI payload
2843 * Return: status code
2845 static efi_status_t efi_update_exit_data(struct efi_loaded_image_obj *image_obj,
2846 efi_uintn_t exit_data_size,
2852 * If exit_data is not provided to StartImage(), exit_data_size must be
2855 if (!image_obj->exit_data)
2857 if (image_obj->exit_data_size)
2858 *image_obj->exit_data_size = exit_data_size;
2859 if (exit_data_size && exit_data) {
2860 ret = efi_allocate_pool(EFI_BOOT_SERVICES_DATA,
2862 (void **)image_obj->exit_data);
2863 if (ret != EFI_SUCCESS)
2865 memcpy(*image_obj->exit_data, exit_data, exit_data_size);
2867 image_obj->exit_data = NULL;
2873 * efi_exit() - leave an EFI application or driver
2874 * @image_handle: handle of the application or driver that is exiting
2875 * @exit_status: status code
2876 * @exit_data_size: size of the buffer in bytes
2877 * @exit_data: buffer with data describing an error
2879 * This function implements the Exit service.
2881 * See the Unified Extensible Firmware Interface (UEFI) specification for
2884 * Return: status code
2886 static efi_status_t EFIAPI efi_exit(efi_handle_t image_handle,
2887 efi_status_t exit_status,
2888 efi_uintn_t exit_data_size,
2892 * TODO: We should call the unload procedure of the loaded
2896 struct efi_loaded_image *loaded_image_protocol;
2897 struct efi_loaded_image_obj *image_obj =
2898 (struct efi_loaded_image_obj *)image_handle;
2900 EFI_ENTRY("%p, %ld, %zu, %p", image_handle, exit_status,
2901 exit_data_size, exit_data);
2903 /* Check parameters */
2904 ret = EFI_CALL(efi_open_protocol(image_handle, &efi_guid_loaded_image,
2905 (void **)&loaded_image_protocol,
2907 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
2908 if (ret != EFI_SUCCESS) {
2909 ret = EFI_INVALID_PARAMETER;
2913 /* Unloading of unstarted images */
2914 switch (image_obj->header.type) {
2915 case EFI_OBJECT_TYPE_STARTED_IMAGE:
2917 case EFI_OBJECT_TYPE_LOADED_IMAGE:
2918 efi_delete_image(image_obj, loaded_image_protocol);
2922 /* Handle does not refer to loaded image */
2923 ret = EFI_INVALID_PARAMETER;
2926 /* A started image can only be unloaded it is the last one started. */
2927 if (image_handle != current_image) {
2928 ret = EFI_INVALID_PARAMETER;
2932 /* Exit data is only foreseen in case of failure. */
2933 if (exit_status != EFI_SUCCESS) {
2934 ret = efi_update_exit_data(image_obj, exit_data_size,
2936 /* Exiting has priority. Don't return error to caller. */
2937 if (ret != EFI_SUCCESS)
2938 EFI_PRINT("%s: out of memory\n", __func__);
2940 if (image_obj->image_type == IMAGE_SUBSYSTEM_EFI_APPLICATION ||
2941 exit_status != EFI_SUCCESS)
2942 efi_delete_image(image_obj, loaded_image_protocol);
2944 /* Make sure entry/exit counts for EFI world cross-overs match */
2945 EFI_EXIT(exit_status);
2948 * But longjmp out with the U-Boot gd, not the application's, as
2949 * the other end is a setjmp call inside EFI context.
2953 image_obj->exit_status = exit_status;
2954 longjmp(&image_obj->exit_jmp, 1);
2956 panic("EFI application exited");
2958 return EFI_EXIT(ret);
2962 * efi_handle_protocol() - get interface of a protocol on a handle
2963 * @handle: handle on which the protocol shall be opened
2964 * @protocol: GUID of the protocol
2965 * @protocol_interface: interface implementing the protocol
2967 * This function implements the HandleProtocol service.
2969 * See the Unified Extensible Firmware Interface (UEFI) specification for
2972 * Return: status code
2974 static efi_status_t EFIAPI efi_handle_protocol(efi_handle_t handle,
2975 const efi_guid_t *protocol,
2976 void **protocol_interface)
2978 return efi_open_protocol(handle, protocol, protocol_interface, NULL,
2979 NULL, EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL);
2983 * efi_bind_controller() - bind a single driver to a controller
2984 * @controller_handle: controller handle
2985 * @driver_image_handle: driver handle
2986 * @remain_device_path: remaining path
2988 * Return: status code
2990 static efi_status_t efi_bind_controller(
2991 efi_handle_t controller_handle,
2992 efi_handle_t driver_image_handle,
2993 struct efi_device_path *remain_device_path)
2995 struct efi_driver_binding_protocol *binding_protocol;
2998 r = EFI_CALL(efi_open_protocol(driver_image_handle,
2999 &efi_guid_driver_binding_protocol,
3000 (void **)&binding_protocol,
3001 driver_image_handle, NULL,
3002 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
3003 if (r != EFI_SUCCESS)
3005 r = EFI_CALL(binding_protocol->supported(binding_protocol,
3007 remain_device_path));
3008 if (r == EFI_SUCCESS)
3009 r = EFI_CALL(binding_protocol->start(binding_protocol,
3011 remain_device_path));
3012 EFI_CALL(efi_close_protocol(driver_image_handle,
3013 &efi_guid_driver_binding_protocol,
3014 driver_image_handle, NULL));
3019 * efi_connect_single_controller() - connect a single driver to a controller
3020 * @controller_handle: controller
3021 * @driver_image_handle: driver
3022 * @remain_device_path: remaining path
3024 * Return: status code
3026 static efi_status_t efi_connect_single_controller(
3027 efi_handle_t controller_handle,
3028 efi_handle_t *driver_image_handle,
3029 struct efi_device_path *remain_device_path)
3031 efi_handle_t *buffer;
3035 size_t connected = 0;
3037 /* Get buffer with all handles with driver binding protocol */
3038 r = EFI_CALL(efi_locate_handle_buffer(BY_PROTOCOL,
3039 &efi_guid_driver_binding_protocol,
3040 NULL, &count, &buffer));
3041 if (r != EFI_SUCCESS)
3044 /* Context Override */
3045 if (driver_image_handle) {
3046 for (; *driver_image_handle; ++driver_image_handle) {
3047 for (i = 0; i < count; ++i) {
3048 if (buffer[i] == *driver_image_handle) {
3050 r = efi_bind_controller(
3052 *driver_image_handle,
3053 remain_device_path);
3055 * For drivers that do not support the
3056 * controller or are already connected
3057 * we receive an error code here.
3059 if (r == EFI_SUCCESS)
3067 * TODO: Some overrides are not yet implemented:
3068 * - Platform Driver Override
3069 * - Driver Family Override Search
3070 * - Bus Specific Driver Override
3073 /* Driver Binding Search */
3074 for (i = 0; i < count; ++i) {
3076 r = efi_bind_controller(controller_handle,
3078 remain_device_path);
3079 if (r == EFI_SUCCESS)
3084 efi_free_pool(buffer);
3086 return EFI_NOT_FOUND;
3091 * efi_connect_controller() - connect a controller to a driver
3092 * @controller_handle: handle of the controller
3093 * @driver_image_handle: handle of the driver
3094 * @remain_device_path: device path of a child controller
3095 * @recursive: true to connect all child controllers
3097 * This function implements the ConnectController service.
3099 * See the Unified Extensible Firmware Interface (UEFI) specification for
3102 * First all driver binding protocol handles are tried for binding drivers.
3103 * Afterwards all handles that have opened a protocol of the controller
3104 * with EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER are connected to drivers.
3106 * Return: status code
3108 static efi_status_t EFIAPI efi_connect_controller(
3109 efi_handle_t controller_handle,
3110 efi_handle_t *driver_image_handle,
3111 struct efi_device_path *remain_device_path,
3115 efi_status_t ret = EFI_NOT_FOUND;
3116 struct efi_object *efiobj;
3118 EFI_ENTRY("%p, %p, %pD, %d", controller_handle, driver_image_handle,
3119 remain_device_path, recursive);
3121 efiobj = efi_search_obj(controller_handle);
3123 ret = EFI_INVALID_PARAMETER;
3127 r = efi_connect_single_controller(controller_handle,
3128 driver_image_handle,
3129 remain_device_path);
3130 if (r == EFI_SUCCESS)
3133 struct efi_handler *handler;
3134 struct efi_open_protocol_info_item *item;
3136 list_for_each_entry(handler, &efiobj->protocols, link) {
3137 list_for_each_entry(item, &handler->open_infos, link) {
3138 if (item->info.attributes &
3139 EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER) {
3140 r = EFI_CALL(efi_connect_controller(
3141 item->info.controller_handle,
3142 driver_image_handle,
3145 if (r == EFI_SUCCESS)
3151 /* Check for child controller specified by end node */
3152 if (ret != EFI_SUCCESS && remain_device_path &&
3153 remain_device_path->type == DEVICE_PATH_TYPE_END)
3156 return EFI_EXIT(ret);
3160 * efi_reinstall_protocol_interface() - reinstall protocol interface
3161 * @handle: handle on which the protocol shall be reinstalled
3162 * @protocol: GUID of the protocol to be installed
3163 * @old_interface: interface to be removed
3164 * @new_interface: interface to be installed
3166 * This function implements the ReinstallProtocolInterface service.
3168 * See the Unified Extensible Firmware Interface (UEFI) specification for
3171 * The old interface is uninstalled. The new interface is installed.
3172 * Drivers are connected.
3174 * Return: status code
3176 static efi_status_t EFIAPI efi_reinstall_protocol_interface(
3177 efi_handle_t handle, const efi_guid_t *protocol,
3178 void *old_interface, void *new_interface)
3182 EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, old_interface,
3185 /* Uninstall protocol but do not delete handle */
3186 ret = efi_uninstall_protocol(handle, protocol, old_interface);
3187 if (ret != EFI_SUCCESS)
3190 /* Install the new protocol */
3191 ret = efi_add_protocol(handle, protocol, new_interface);
3193 * The UEFI spec does not specify what should happen to the handle
3194 * if in case of an error no protocol interface remains on the handle.
3195 * So let's do nothing here.
3197 if (ret != EFI_SUCCESS)
3200 * The returned status code has to be ignored.
3201 * Do not create an error if no suitable driver for the handle exists.
3203 EFI_CALL(efi_connect_controller(handle, NULL, NULL, true));
3205 return EFI_EXIT(ret);
3209 * efi_get_child_controllers() - get all child controllers associated to a driver
3210 * @efiobj: handle of the controller
3211 * @driver_handle: handle of the driver
3212 * @number_of_children: number of child controllers
3213 * @child_handle_buffer: handles of the the child controllers
3215 * The allocated buffer has to be freed with free().
3217 * Return: status code
3219 static efi_status_t efi_get_child_controllers(
3220 struct efi_object *efiobj,
3221 efi_handle_t driver_handle,
3222 efi_uintn_t *number_of_children,
3223 efi_handle_t **child_handle_buffer)
3225 struct efi_handler *handler;
3226 struct efi_open_protocol_info_item *item;
3227 efi_uintn_t count = 0, i;
3230 /* Count all child controller associations */
3231 list_for_each_entry(handler, &efiobj->protocols, link) {
3232 list_for_each_entry(item, &handler->open_infos, link) {
3233 if (item->info.agent_handle == driver_handle &&
3234 item->info.attributes &
3235 EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER)
3240 * Create buffer. In case of duplicate child controller assignments
3241 * the buffer will be too large. But that does not harm.
3243 *number_of_children = 0;
3244 *child_handle_buffer = calloc(count, sizeof(efi_handle_t));
3245 if (!*child_handle_buffer)
3246 return EFI_OUT_OF_RESOURCES;
3247 /* Copy unique child handles */
3248 list_for_each_entry(handler, &efiobj->protocols, link) {
3249 list_for_each_entry(item, &handler->open_infos, link) {
3250 if (item->info.agent_handle == driver_handle &&
3251 item->info.attributes &
3252 EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER) {
3253 /* Check this is a new child controller */
3255 for (i = 0; i < *number_of_children; ++i) {
3256 if ((*child_handle_buffer)[i] ==
3257 item->info.controller_handle)
3260 /* Copy handle to buffer */
3262 i = (*number_of_children)++;
3263 (*child_handle_buffer)[i] =
3264 item->info.controller_handle;
3273 * efi_disconnect_controller() - disconnect a controller from a driver
3274 * @controller_handle: handle of the controller
3275 * @driver_image_handle: handle of the driver
3276 * @child_handle: handle of the child to destroy
3278 * This function implements the DisconnectController service.
3280 * See the Unified Extensible Firmware Interface (UEFI) specification for
3283 * Return: status code
3285 static efi_status_t EFIAPI efi_disconnect_controller(
3286 efi_handle_t controller_handle,
3287 efi_handle_t driver_image_handle,
3288 efi_handle_t child_handle)
3290 struct efi_driver_binding_protocol *binding_protocol;
3291 efi_handle_t *child_handle_buffer = NULL;
3292 size_t number_of_children = 0;
3294 size_t stop_count = 0;
3295 struct efi_object *efiobj;
3297 EFI_ENTRY("%p, %p, %p", controller_handle, driver_image_handle,
3300 efiobj = efi_search_obj(controller_handle);
3302 r = EFI_INVALID_PARAMETER;
3306 if (child_handle && !efi_search_obj(child_handle)) {
3307 r = EFI_INVALID_PARAMETER;
3311 /* If no driver handle is supplied, disconnect all drivers */
3312 if (!driver_image_handle) {
3313 r = efi_disconnect_all_drivers(efiobj, NULL, child_handle);
3317 /* Create list of child handles */
3319 number_of_children = 1;
3320 child_handle_buffer = &child_handle;
3322 efi_get_child_controllers(efiobj,
3323 driver_image_handle,
3324 &number_of_children,
3325 &child_handle_buffer);
3328 /* Get the driver binding protocol */
3329 r = EFI_CALL(efi_open_protocol(driver_image_handle,
3330 &efi_guid_driver_binding_protocol,
3331 (void **)&binding_protocol,
3332 driver_image_handle, NULL,
3333 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
3334 if (r != EFI_SUCCESS)
3336 /* Remove the children */
3337 if (number_of_children) {
3338 r = EFI_CALL(binding_protocol->stop(binding_protocol,
3341 child_handle_buffer));
3342 if (r == EFI_SUCCESS)
3345 /* Remove the driver */
3347 r = EFI_CALL(binding_protocol->stop(binding_protocol,
3350 if (r == EFI_SUCCESS)
3352 EFI_CALL(efi_close_protocol(driver_image_handle,
3353 &efi_guid_driver_binding_protocol,
3354 driver_image_handle, NULL));
3362 free(child_handle_buffer);
3366 static struct efi_boot_services efi_boot_services = {
3368 .signature = EFI_BOOT_SERVICES_SIGNATURE,
3369 .revision = EFI_SPECIFICATION_VERSION,
3370 .headersize = sizeof(struct efi_boot_services),
3372 .raise_tpl = efi_raise_tpl,
3373 .restore_tpl = efi_restore_tpl,
3374 .allocate_pages = efi_allocate_pages_ext,
3375 .free_pages = efi_free_pages_ext,
3376 .get_memory_map = efi_get_memory_map_ext,
3377 .allocate_pool = efi_allocate_pool_ext,
3378 .free_pool = efi_free_pool_ext,
3379 .create_event = efi_create_event_ext,
3380 .set_timer = efi_set_timer_ext,
3381 .wait_for_event = efi_wait_for_event,
3382 .signal_event = efi_signal_event_ext,
3383 .close_event = efi_close_event,
3384 .check_event = efi_check_event,
3385 .install_protocol_interface = efi_install_protocol_interface,
3386 .reinstall_protocol_interface = efi_reinstall_protocol_interface,
3387 .uninstall_protocol_interface = efi_uninstall_protocol_interface,
3388 .handle_protocol = efi_handle_protocol,
3390 .register_protocol_notify = efi_register_protocol_notify,
3391 .locate_handle = efi_locate_handle_ext,
3392 .locate_device_path = efi_locate_device_path,
3393 .install_configuration_table = efi_install_configuration_table_ext,
3394 .load_image = efi_load_image,
3395 .start_image = efi_start_image,
3397 .unload_image = efi_unload_image,
3398 .exit_boot_services = efi_exit_boot_services,
3399 .get_next_monotonic_count = efi_get_next_monotonic_count,
3401 .set_watchdog_timer = efi_set_watchdog_timer,
3402 .connect_controller = efi_connect_controller,
3403 .disconnect_controller = efi_disconnect_controller,
3404 .open_protocol = efi_open_protocol,
3405 .close_protocol = efi_close_protocol,
3406 .open_protocol_information = efi_open_protocol_information,
3407 .protocols_per_handle = efi_protocols_per_handle,
3408 .locate_handle_buffer = efi_locate_handle_buffer,
3409 .locate_protocol = efi_locate_protocol,
3410 .install_multiple_protocol_interfaces =
3411 efi_install_multiple_protocol_interfaces,
3412 .uninstall_multiple_protocol_interfaces =
3413 efi_uninstall_multiple_protocol_interfaces,
3414 .calculate_crc32 = efi_calculate_crc32,
3415 .copy_mem = efi_copy_mem,
3416 .set_mem = efi_set_mem,
3417 .create_event_ex = efi_create_event_ex,
3420 static u16 __efi_runtime_data firmware_vendor[] = L"Das U-Boot";
3422 struct efi_system_table __efi_runtime_data systab = {
3424 .signature = EFI_SYSTEM_TABLE_SIGNATURE,
3425 .revision = EFI_SPECIFICATION_VERSION,
3426 .headersize = sizeof(struct efi_system_table),
3428 .fw_vendor = firmware_vendor,
3429 .fw_revision = FW_VERSION << 16 | FW_PATCHLEVEL << 8,
3430 .con_in = (void *)&efi_con_in,
3431 .con_out = (void *)&efi_con_out,
3432 .std_err = (void *)&efi_con_out,
3433 .runtime = (void *)&efi_runtime_services,
3434 .boottime = (void *)&efi_boot_services,
3440 * efi_initialize_system_table() - Initialize system table
3442 * Return: status code
3444 efi_status_t efi_initialize_system_table(void)
3448 /* Allocate configuration table array */
3449 ret = efi_allocate_pool(EFI_RUNTIME_SERVICES_DATA,
3450 EFI_MAX_CONFIGURATION_TABLES *
3451 sizeof(struct efi_configuration_table),
3452 (void **)&systab.tables);
3454 /* Set CRC32 field in table headers */
3455 efi_update_table_header_crc32(&systab.hdr);
3456 efi_update_table_header_crc32(&efi_runtime_services.hdr);
3457 efi_update_table_header_crc32(&efi_boot_services.hdr);