1 // SPDX-License-Identifier: GPL-2.0+
3 * EFI application boot time services
5 * Copyright (c) 2016 Alexander Graf
10 #include <efi_loader.h>
11 #include <environment.h>
13 #include <linux/libfdt_env.h>
14 #include <u-boot/crc.h>
18 DECLARE_GLOBAL_DATA_PTR;
20 /* Task priority level */
21 static efi_uintn_t efi_tpl = TPL_APPLICATION;
23 /* This list contains all the EFI objects our payload has access to */
24 LIST_HEAD(efi_obj_list);
26 /* List of all events */
27 LIST_HEAD(efi_events);
30 * If we're running on nasty systems (32bit ARM booting into non-EFI Linux)
31 * we need to do trickery with caches. Since we don't want to break the EFI
32 * aware boot path, only apply hacks when loading exiting directly (breaking
33 * direct Linux EFI booting along the way - oh well).
35 static bool efi_is_direct_boot = true;
39 * The "gd" pointer lives in a register on ARM and AArch64 that we declare
40 * fixed when compiling U-Boot. However, the payload does not know about that
41 * restriction so we need to manually swap its and our view of that register on
42 * EFI callback entry/exit.
44 static volatile void *efi_gd, *app_gd;
47 static int entry_count;
48 static int nesting_level;
49 /* GUID of the device tree table */
50 const efi_guid_t efi_guid_fdt = EFI_FDT_GUID;
51 /* GUID of the EFI_DRIVER_BINDING_PROTOCOL */
52 const efi_guid_t efi_guid_driver_binding_protocol =
53 EFI_DRIVER_BINDING_PROTOCOL_GUID;
55 /* event group ExitBootServices() invoked */
56 const efi_guid_t efi_guid_event_group_exit_boot_services =
57 EFI_EVENT_GROUP_EXIT_BOOT_SERVICES;
58 /* event group SetVirtualAddressMap() invoked */
59 const efi_guid_t efi_guid_event_group_virtual_address_change =
60 EFI_EVENT_GROUP_VIRTUAL_ADDRESS_CHANGE;
61 /* event group memory map changed */
62 const efi_guid_t efi_guid_event_group_memory_map_change =
63 EFI_EVENT_GROUP_MEMORY_MAP_CHANGE;
64 /* event group boot manager about to boot */
65 const efi_guid_t efi_guid_event_group_ready_to_boot =
66 EFI_EVENT_GROUP_READY_TO_BOOT;
67 /* event group ResetSystem() invoked (before ExitBootServices) */
68 const efi_guid_t efi_guid_event_group_reset_system =
69 EFI_EVENT_GROUP_RESET_SYSTEM;
71 static efi_status_t EFIAPI efi_disconnect_controller(
72 efi_handle_t controller_handle,
73 efi_handle_t driver_image_handle,
74 efi_handle_t child_handle);
76 /* Called on every callback entry */
77 int __efi_entry_check(void)
79 int ret = entry_count++ == 0;
88 /* Called on every callback exit */
89 int __efi_exit_check(void)
91 int ret = --entry_count == 0;
98 /* Called from do_bootefi_exec() */
99 void efi_save_gd(void)
107 * Special case handler for error/abort that just forces things back to u-boot
108 * world so we can dump out an abort message, without any care about returning
109 * back to UEFI world.
111 void efi_restore_gd(void)
114 /* Only restore if we're already in EFI context */
122 * indent_string() - returns a string for indenting with two spaces per level
123 * @level: indent level
125 * A maximum of ten indent levels is supported. Higher indent levels will be
128 * Return: A string for indenting with two spaces per level is
131 static const char *indent_string(int level)
133 const char *indent = " ";
134 const int max = strlen(indent);
136 level = min(max, level * 2);
137 return &indent[max - level];
140 const char *__efi_nesting(void)
142 return indent_string(nesting_level);
145 const char *__efi_nesting_inc(void)
147 return indent_string(nesting_level++);
150 const char *__efi_nesting_dec(void)
152 return indent_string(--nesting_level);
156 * efi_queue_event() - queue an EFI event
157 * @event: event to signal
158 * @check_tpl: check the TPL level
160 * This function queues the notification function of the event for future
163 * The notification function is called if the task priority level of the event
164 * is higher than the current task priority level.
166 * For the SignalEvent service see efi_signal_event_ext.
169 static void efi_queue_event(struct efi_event *event, bool check_tpl)
171 if (event->notify_function) {
172 event->is_queued = true;
174 if (check_tpl && efi_tpl >= event->notify_tpl)
176 EFI_CALL_VOID(event->notify_function(event,
177 event->notify_context));
179 event->is_queued = false;
183 * is_valid_tpl() - check if the task priority level is valid
185 * @tpl: TPL level to check
186 * Return: status code
188 efi_status_t is_valid_tpl(efi_uintn_t tpl)
191 case TPL_APPLICATION:
197 return EFI_INVALID_PARAMETER;
202 * efi_signal_event() - signal an EFI event
203 * @event: event to signal
204 * @check_tpl: check the TPL level
206 * This function signals an event. If the event belongs to an event group all
207 * events of the group are signaled. If they are of type EVT_NOTIFY_SIGNAL
208 * their notification function is queued.
210 * For the SignalEvent service see efi_signal_event_ext.
212 void efi_signal_event(struct efi_event *event, bool check_tpl)
215 struct efi_event *evt;
218 * The signaled state has to set before executing any
219 * notification function
221 list_for_each_entry(evt, &efi_events, link) {
222 if (!evt->group || guidcmp(evt->group, event->group))
224 if (evt->is_signaled)
226 evt->is_signaled = true;
227 if (evt->type & EVT_NOTIFY_SIGNAL &&
228 evt->notify_function)
229 evt->is_queued = true;
231 list_for_each_entry(evt, &efi_events, link) {
232 if (!evt->group || guidcmp(evt->group, event->group))
235 efi_queue_event(evt, check_tpl);
237 } else if (!event->is_signaled) {
238 event->is_signaled = true;
239 if (event->type & EVT_NOTIFY_SIGNAL)
240 efi_queue_event(event, check_tpl);
245 * efi_raise_tpl() - raise the task priority level
246 * @new_tpl: new value of the task priority level
248 * This function implements the RaiseTpl service.
250 * See the Unified Extensible Firmware Interface (UEFI) specification for
253 * Return: old value of the task priority level
255 static unsigned long EFIAPI efi_raise_tpl(efi_uintn_t new_tpl)
257 efi_uintn_t old_tpl = efi_tpl;
259 EFI_ENTRY("0x%zx", new_tpl);
261 if (new_tpl < efi_tpl)
262 debug("WARNING: new_tpl < current_tpl in %s\n", __func__);
264 if (efi_tpl > TPL_HIGH_LEVEL)
265 efi_tpl = TPL_HIGH_LEVEL;
267 EFI_EXIT(EFI_SUCCESS);
272 * efi_restore_tpl() - lower the task priority level
273 * @old_tpl: value of the task priority level to be restored
275 * This function implements the RestoreTpl service.
277 * See the Unified Extensible Firmware Interface (UEFI) specification for
280 static void EFIAPI efi_restore_tpl(efi_uintn_t old_tpl)
282 EFI_ENTRY("0x%zx", old_tpl);
284 if (old_tpl > efi_tpl)
285 debug("WARNING: old_tpl > current_tpl in %s\n", __func__);
287 if (efi_tpl > TPL_HIGH_LEVEL)
288 efi_tpl = TPL_HIGH_LEVEL;
291 * Lowering the TPL may have made queued events eligible for execution.
295 EFI_EXIT(EFI_SUCCESS);
299 * efi_allocate_pages_ext() - allocate memory pages
300 * @type: type of allocation to be performed
301 * @memory_type: usage type of the allocated memory
302 * @pages: number of pages to be allocated
303 * @memory: allocated memory
305 * This function implements the AllocatePages service.
307 * See the Unified Extensible Firmware Interface (UEFI) specification for
310 * Return: status code
312 static efi_status_t EFIAPI efi_allocate_pages_ext(int type, int memory_type,
318 EFI_ENTRY("%d, %d, 0x%zx, %p", type, memory_type, pages, memory);
319 r = efi_allocate_pages(type, memory_type, pages, memory);
324 * efi_free_pages_ext() - Free memory pages.
325 * @memory: start of the memory area to be freed
326 * @pages: number of pages to be freed
328 * This function implements the FreePages service.
330 * See the Unified Extensible Firmware Interface (UEFI) specification for
333 * Return: status code
335 static efi_status_t EFIAPI efi_free_pages_ext(uint64_t memory,
340 EFI_ENTRY("%llx, 0x%zx", memory, pages);
341 r = efi_free_pages(memory, pages);
346 * efi_get_memory_map_ext() - get map describing memory usage
347 * @memory_map_size: on entry the size, in bytes, of the memory map buffer,
348 * on exit the size of the copied memory map
349 * @memory_map: buffer to which the memory map is written
350 * @map_key: key for the memory map
351 * @descriptor_size: size of an individual memory descriptor
352 * @descriptor_version: version number of the memory descriptor structure
354 * This function implements the GetMemoryMap service.
356 * See the Unified Extensible Firmware Interface (UEFI) specification for
359 * Return: status code
361 static efi_status_t EFIAPI efi_get_memory_map_ext(
362 efi_uintn_t *memory_map_size,
363 struct efi_mem_desc *memory_map,
364 efi_uintn_t *map_key,
365 efi_uintn_t *descriptor_size,
366 uint32_t *descriptor_version)
370 EFI_ENTRY("%p, %p, %p, %p, %p", memory_map_size, memory_map,
371 map_key, descriptor_size, descriptor_version);
372 r = efi_get_memory_map(memory_map_size, memory_map, map_key,
373 descriptor_size, descriptor_version);
378 * efi_allocate_pool_ext() - allocate memory from pool
379 * @pool_type: type of the pool from which memory is to be allocated
380 * @size: number of bytes to be allocated
381 * @buffer: allocated memory
383 * This function implements the AllocatePool service.
385 * See the Unified Extensible Firmware Interface (UEFI) specification for
388 * Return: status code
390 static efi_status_t EFIAPI efi_allocate_pool_ext(int pool_type,
396 EFI_ENTRY("%d, %zd, %p", pool_type, size, buffer);
397 r = efi_allocate_pool(pool_type, size, buffer);
402 * efi_free_pool_ext() - free memory from pool
403 * @buffer: start of memory to be freed
405 * This function implements the FreePool service.
407 * See the Unified Extensible Firmware Interface (UEFI) specification for
410 * Return: status code
412 static efi_status_t EFIAPI efi_free_pool_ext(void *buffer)
416 EFI_ENTRY("%p", buffer);
417 r = efi_free_pool(buffer);
422 * efi_add_handle() - add a new object to the object list
423 * @obj: object to be added
425 * The protocols list is initialized. The object handle is set.
427 void efi_add_handle(efi_handle_t handle)
431 INIT_LIST_HEAD(&handle->protocols);
432 list_add_tail(&handle->link, &efi_obj_list);
436 * efi_create_handle() - create handle
437 * @handle: new handle
439 * Return: status code
441 efi_status_t efi_create_handle(efi_handle_t *handle)
443 struct efi_object *obj;
445 obj = calloc(1, sizeof(struct efi_object));
447 return EFI_OUT_OF_RESOURCES;
456 * efi_search_protocol() - find a protocol on a handle.
458 * @protocol_guid: GUID of the protocol
459 * @handler: reference to the protocol
461 * Return: status code
463 efi_status_t efi_search_protocol(const efi_handle_t handle,
464 const efi_guid_t *protocol_guid,
465 struct efi_handler **handler)
467 struct efi_object *efiobj;
468 struct list_head *lhandle;
470 if (!handle || !protocol_guid)
471 return EFI_INVALID_PARAMETER;
472 efiobj = efi_search_obj(handle);
474 return EFI_INVALID_PARAMETER;
475 list_for_each(lhandle, &efiobj->protocols) {
476 struct efi_handler *protocol;
478 protocol = list_entry(lhandle, struct efi_handler, link);
479 if (!guidcmp(protocol->guid, protocol_guid)) {
485 return EFI_NOT_FOUND;
489 * efi_remove_protocol() - delete protocol from a handle
490 * @handle: handle from which the protocol shall be deleted
491 * @protocol: GUID of the protocol to be deleted
492 * @protocol_interface: interface of the protocol implementation
494 * Return: status code
496 efi_status_t efi_remove_protocol(const efi_handle_t handle,
497 const efi_guid_t *protocol,
498 void *protocol_interface)
500 struct efi_handler *handler;
503 ret = efi_search_protocol(handle, protocol, &handler);
504 if (ret != EFI_SUCCESS)
506 if (guidcmp(handler->guid, protocol))
507 return EFI_INVALID_PARAMETER;
508 if (handler->protocol_interface != protocol_interface)
509 return EFI_INVALID_PARAMETER;
510 list_del(&handler->link);
516 * efi_remove_all_protocols() - delete all protocols from a handle
517 * @handle: handle from which the protocols shall be deleted
519 * Return: status code
521 efi_status_t efi_remove_all_protocols(const efi_handle_t handle)
523 struct efi_object *efiobj;
524 struct efi_handler *protocol;
525 struct efi_handler *pos;
527 efiobj = efi_search_obj(handle);
529 return EFI_INVALID_PARAMETER;
530 list_for_each_entry_safe(protocol, pos, &efiobj->protocols, link) {
533 ret = efi_remove_protocol(handle, protocol->guid,
534 protocol->protocol_interface);
535 if (ret != EFI_SUCCESS)
542 * efi_delete_handle() - delete handle
544 * @obj: handle to delete
546 void efi_delete_handle(efi_handle_t handle)
550 efi_remove_all_protocols(handle);
551 list_del(&handle->link);
556 * efi_is_event() - check if a pointer is a valid event
557 * @event: pointer to check
559 * Return: status code
561 static efi_status_t efi_is_event(const struct efi_event *event)
563 const struct efi_event *evt;
566 return EFI_INVALID_PARAMETER;
567 list_for_each_entry(evt, &efi_events, link) {
571 return EFI_INVALID_PARAMETER;
575 * efi_create_event() - create an event
576 * @type: type of the event to create
577 * @notify_tpl: task priority level of the event
578 * @notify_function: notification function of the event
579 * @notify_context: pointer passed to the notification function
580 * @group: event group
581 * @event: created event
583 * This function is used inside U-Boot code to create an event.
585 * For the API function implementing the CreateEvent service see
586 * efi_create_event_ext.
588 * Return: status code
590 efi_status_t efi_create_event(uint32_t type, efi_uintn_t notify_tpl,
591 void (EFIAPI *notify_function) (
592 struct efi_event *event,
594 void *notify_context, efi_guid_t *group,
595 struct efi_event **event)
597 struct efi_event *evt;
600 return EFI_INVALID_PARAMETER;
605 case EVT_NOTIFY_SIGNAL:
606 case EVT_TIMER | EVT_NOTIFY_SIGNAL:
607 case EVT_NOTIFY_WAIT:
608 case EVT_TIMER | EVT_NOTIFY_WAIT:
609 case EVT_SIGNAL_EXIT_BOOT_SERVICES:
610 case EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE:
613 return EFI_INVALID_PARAMETER;
616 if ((type & (EVT_NOTIFY_WAIT | EVT_NOTIFY_SIGNAL)) &&
617 (is_valid_tpl(notify_tpl) != EFI_SUCCESS))
618 return EFI_INVALID_PARAMETER;
620 evt = calloc(1, sizeof(struct efi_event));
622 return EFI_OUT_OF_RESOURCES;
624 evt->notify_tpl = notify_tpl;
625 evt->notify_function = notify_function;
626 evt->notify_context = notify_context;
628 /* Disable timers on boot up */
629 evt->trigger_next = -1ULL;
630 evt->is_queued = false;
631 evt->is_signaled = false;
632 list_add_tail(&evt->link, &efi_events);
638 * efi_create_event_ex() - create an event in a group
639 * @type: type of the event to create
640 * @notify_tpl: task priority level of the event
641 * @notify_function: notification function of the event
642 * @notify_context: pointer passed to the notification function
643 * @event: created event
644 * @event_group: event group
646 * This function implements the CreateEventEx service.
648 * See the Unified Extensible Firmware Interface (UEFI) specification for
651 * Return: status code
653 efi_status_t EFIAPI efi_create_event_ex(uint32_t type, efi_uintn_t notify_tpl,
654 void (EFIAPI *notify_function) (
655 struct efi_event *event,
657 void *notify_context,
658 efi_guid_t *event_group,
659 struct efi_event **event)
661 EFI_ENTRY("%d, 0x%zx, %p, %p, %pUl", type, notify_tpl, notify_function,
662 notify_context, event_group);
663 return EFI_EXIT(efi_create_event(type, notify_tpl, notify_function,
664 notify_context, event_group, event));
668 * efi_create_event_ext() - create an event
669 * @type: type of the event to create
670 * @notify_tpl: task priority level of the event
671 * @notify_function: notification function of the event
672 * @notify_context: pointer passed to the notification function
673 * @event: created event
675 * This function implements the CreateEvent service.
677 * See the Unified Extensible Firmware Interface (UEFI) specification for
680 * Return: status code
682 static efi_status_t EFIAPI efi_create_event_ext(
683 uint32_t type, efi_uintn_t notify_tpl,
684 void (EFIAPI *notify_function) (
685 struct efi_event *event,
687 void *notify_context, struct efi_event **event)
689 EFI_ENTRY("%d, 0x%zx, %p, %p", type, notify_tpl, notify_function,
691 return EFI_EXIT(efi_create_event(type, notify_tpl, notify_function,
692 notify_context, NULL, event));
696 * efi_timer_check() - check if a timer event has occurred
698 * Check if a timer event has occurred or a queued notification function should
701 * Our timers have to work without interrupts, so we check whenever keyboard
702 * input or disk accesses happen if enough time elapsed for them to fire.
704 void efi_timer_check(void)
706 struct efi_event *evt;
707 u64 now = timer_get_us();
709 list_for_each_entry(evt, &efi_events, link) {
711 efi_queue_event(evt, true);
712 if (!(evt->type & EVT_TIMER) || now < evt->trigger_next)
714 switch (evt->trigger_type) {
715 case EFI_TIMER_RELATIVE:
716 evt->trigger_type = EFI_TIMER_STOP;
718 case EFI_TIMER_PERIODIC:
719 evt->trigger_next += evt->trigger_time;
724 evt->is_signaled = false;
725 efi_signal_event(evt, true);
731 * efi_set_timer() - set the trigger time for a timer event or stop the event
732 * @event: event for which the timer is set
733 * @type: type of the timer
734 * @trigger_time: trigger period in multiples of 100 ns
736 * This is the function for internal usage in U-Boot. For the API function
737 * implementing the SetTimer service see efi_set_timer_ext.
739 * Return: status code
741 efi_status_t efi_set_timer(struct efi_event *event, enum efi_timer_delay type,
742 uint64_t trigger_time)
744 /* Check that the event is valid */
745 if (efi_is_event(event) != EFI_SUCCESS || !(event->type & EVT_TIMER))
746 return EFI_INVALID_PARAMETER;
749 * The parameter defines a multiple of 100 ns.
750 * We use multiples of 1000 ns. So divide by 10.
752 do_div(trigger_time, 10);
756 event->trigger_next = -1ULL;
758 case EFI_TIMER_PERIODIC:
759 case EFI_TIMER_RELATIVE:
760 event->trigger_next = timer_get_us() + trigger_time;
763 return EFI_INVALID_PARAMETER;
765 event->trigger_type = type;
766 event->trigger_time = trigger_time;
767 event->is_signaled = false;
772 * efi_set_timer_ext() - Set the trigger time for a timer event or stop the
774 * @event: event for which the timer is set
775 * @type: type of the timer
776 * @trigger_time: trigger period in multiples of 100 ns
778 * This function implements the SetTimer service.
780 * See the Unified Extensible Firmware Interface (UEFI) specification for
784 * Return: status code
786 static efi_status_t EFIAPI efi_set_timer_ext(struct efi_event *event,
787 enum efi_timer_delay type,
788 uint64_t trigger_time)
790 EFI_ENTRY("%p, %d, %llx", event, type, trigger_time);
791 return EFI_EXIT(efi_set_timer(event, type, trigger_time));
795 * efi_wait_for_event() - wait for events to be signaled
796 * @num_events: number of events to be waited for
797 * @event: events to be waited for
798 * @index: index of the event that was signaled
800 * This function implements the WaitForEvent service.
802 * See the Unified Extensible Firmware Interface (UEFI) specification for
805 * Return: status code
807 static efi_status_t EFIAPI efi_wait_for_event(efi_uintn_t num_events,
808 struct efi_event **event,
813 EFI_ENTRY("%zd, %p, %p", num_events, event, index);
815 /* Check parameters */
816 if (!num_events || !event)
817 return EFI_EXIT(EFI_INVALID_PARAMETER);
819 if (efi_tpl != TPL_APPLICATION)
820 return EFI_EXIT(EFI_UNSUPPORTED);
821 for (i = 0; i < num_events; ++i) {
822 if (efi_is_event(event[i]) != EFI_SUCCESS)
823 return EFI_EXIT(EFI_INVALID_PARAMETER);
824 if (!event[i]->type || event[i]->type & EVT_NOTIFY_SIGNAL)
825 return EFI_EXIT(EFI_INVALID_PARAMETER);
826 if (!event[i]->is_signaled)
827 efi_queue_event(event[i], true);
830 /* Wait for signal */
832 for (i = 0; i < num_events; ++i) {
833 if (event[i]->is_signaled)
836 /* Allow events to occur. */
842 * Reset the signal which is passed to the caller to allow periodic
845 event[i]->is_signaled = false;
849 return EFI_EXIT(EFI_SUCCESS);
853 * efi_signal_event_ext() - signal an EFI event
854 * @event: event to signal
856 * This function implements the SignalEvent service.
858 * See the Unified Extensible Firmware Interface (UEFI) specification for
861 * This functions sets the signaled state of the event and queues the
862 * notification function for execution.
864 * Return: status code
866 static efi_status_t EFIAPI efi_signal_event_ext(struct efi_event *event)
868 EFI_ENTRY("%p", event);
869 if (efi_is_event(event) != EFI_SUCCESS)
870 return EFI_EXIT(EFI_INVALID_PARAMETER);
871 efi_signal_event(event, true);
872 return EFI_EXIT(EFI_SUCCESS);
876 * efi_close_event() - close an EFI event
877 * @event: event to close
879 * This function implements the CloseEvent service.
881 * See the Unified Extensible Firmware Interface (UEFI) specification for
884 * Return: status code
886 static efi_status_t EFIAPI efi_close_event(struct efi_event *event)
888 EFI_ENTRY("%p", event);
889 if (efi_is_event(event) != EFI_SUCCESS)
890 return EFI_EXIT(EFI_INVALID_PARAMETER);
891 list_del(&event->link);
893 return EFI_EXIT(EFI_SUCCESS);
897 * efi_check_event() - check if an event is signaled
898 * @event: event to check
900 * This function implements the CheckEvent service.
902 * See the Unified Extensible Firmware Interface (UEFI) specification for
905 * If an event is not signaled yet, the notification function is queued. The
906 * signaled state is cleared.
908 * Return: status code
910 static efi_status_t EFIAPI efi_check_event(struct efi_event *event)
912 EFI_ENTRY("%p", event);
914 if (efi_is_event(event) != EFI_SUCCESS ||
915 event->type & EVT_NOTIFY_SIGNAL)
916 return EFI_EXIT(EFI_INVALID_PARAMETER);
917 if (!event->is_signaled)
918 efi_queue_event(event, true);
919 if (event->is_signaled) {
920 event->is_signaled = false;
921 return EFI_EXIT(EFI_SUCCESS);
923 return EFI_EXIT(EFI_NOT_READY);
927 * efi_search_obj() - find the internal EFI object for a handle
928 * @handle: handle to find
932 struct efi_object *efi_search_obj(const efi_handle_t handle)
934 struct efi_object *efiobj;
936 list_for_each_entry(efiobj, &efi_obj_list, link) {
937 if (efiobj == handle)
945 * efi_open_protocol_info_entry() - create open protocol info entry and add it
947 * @handler: handler of a protocol
949 * Return: open protocol info entry
951 static struct efi_open_protocol_info_entry *efi_create_open_info(
952 struct efi_handler *handler)
954 struct efi_open_protocol_info_item *item;
956 item = calloc(1, sizeof(struct efi_open_protocol_info_item));
959 /* Append the item to the open protocol info list. */
960 list_add_tail(&item->link, &handler->open_infos);
966 * efi_delete_open_info() - remove an open protocol info entry from a protocol
967 * @item: open protocol info entry to delete
969 * Return: status code
971 static efi_status_t efi_delete_open_info(
972 struct efi_open_protocol_info_item *item)
974 list_del(&item->link);
980 * efi_add_protocol() - install new protocol on a handle
981 * @handle: handle on which the protocol shall be installed
982 * @protocol: GUID of the protocol to be installed
983 * @protocol_interface: interface of the protocol implementation
985 * Return: status code
987 efi_status_t efi_add_protocol(const efi_handle_t handle,
988 const efi_guid_t *protocol,
989 void *protocol_interface)
991 struct efi_object *efiobj;
992 struct efi_handler *handler;
995 efiobj = efi_search_obj(handle);
997 return EFI_INVALID_PARAMETER;
998 ret = efi_search_protocol(handle, protocol, NULL);
999 if (ret != EFI_NOT_FOUND)
1000 return EFI_INVALID_PARAMETER;
1001 handler = calloc(1, sizeof(struct efi_handler));
1003 return EFI_OUT_OF_RESOURCES;
1004 handler->guid = protocol;
1005 handler->protocol_interface = protocol_interface;
1006 INIT_LIST_HEAD(&handler->open_infos);
1007 list_add_tail(&handler->link, &efiobj->protocols);
1008 if (!guidcmp(&efi_guid_device_path, protocol))
1009 EFI_PRINT("installed device path '%pD'\n", protocol_interface);
1014 * efi_install_protocol_interface() - install protocol interface
1015 * @handle: handle on which the protocol shall be installed
1016 * @protocol: GUID of the protocol to be installed
1017 * @protocol_interface_type: type of the interface to be installed,
1018 * always EFI_NATIVE_INTERFACE
1019 * @protocol_interface: interface of the protocol implementation
1021 * This function implements the InstallProtocolInterface service.
1023 * See the Unified Extensible Firmware Interface (UEFI) specification for
1026 * Return: status code
1028 static efi_status_t EFIAPI efi_install_protocol_interface(
1029 efi_handle_t *handle, const efi_guid_t *protocol,
1030 int protocol_interface_type, void *protocol_interface)
1034 EFI_ENTRY("%p, %pUl, %d, %p", handle, protocol, protocol_interface_type,
1035 protocol_interface);
1037 if (!handle || !protocol ||
1038 protocol_interface_type != EFI_NATIVE_INTERFACE) {
1039 r = EFI_INVALID_PARAMETER;
1043 /* Create new handle if requested. */
1045 r = efi_create_handle(handle);
1046 if (r != EFI_SUCCESS)
1048 debug("%sEFI: new handle %p\n", indent_string(nesting_level),
1051 debug("%sEFI: handle %p\n", indent_string(nesting_level),
1054 /* Add new protocol */
1055 r = efi_add_protocol(*handle, protocol, protocol_interface);
1061 * efi_get_drivers() - get all drivers associated to a controller
1062 * @handle: handle of the controller
1063 * @protocol: protocol GUID (optional)
1064 * @number_of_drivers: number of child controllers
1065 * @driver_handle_buffer: handles of the the drivers
1067 * The allocated buffer has to be freed with free().
1069 * Return: status code
1071 static efi_status_t efi_get_drivers(efi_handle_t handle,
1072 const efi_guid_t *protocol,
1073 efi_uintn_t *number_of_drivers,
1074 efi_handle_t **driver_handle_buffer)
1076 struct efi_handler *handler;
1077 struct efi_open_protocol_info_item *item;
1078 efi_uintn_t count = 0, i;
1081 /* Count all driver associations */
1082 list_for_each_entry(handler, &handle->protocols, link) {
1083 if (protocol && guidcmp(handler->guid, protocol))
1085 list_for_each_entry(item, &handler->open_infos, link) {
1086 if (item->info.attributes &
1087 EFI_OPEN_PROTOCOL_BY_DRIVER)
1092 * Create buffer. In case of duplicate driver assignments the buffer
1093 * will be too large. But that does not harm.
1095 *number_of_drivers = 0;
1096 *driver_handle_buffer = calloc(count, sizeof(efi_handle_t));
1097 if (!*driver_handle_buffer)
1098 return EFI_OUT_OF_RESOURCES;
1099 /* Collect unique driver handles */
1100 list_for_each_entry(handler, &handle->protocols, link) {
1101 if (protocol && guidcmp(handler->guid, protocol))
1103 list_for_each_entry(item, &handler->open_infos, link) {
1104 if (item->info.attributes &
1105 EFI_OPEN_PROTOCOL_BY_DRIVER) {
1106 /* Check this is a new driver */
1108 for (i = 0; i < *number_of_drivers; ++i) {
1109 if ((*driver_handle_buffer)[i] ==
1110 item->info.agent_handle)
1113 /* Copy handle to buffer */
1115 i = (*number_of_drivers)++;
1116 (*driver_handle_buffer)[i] =
1117 item->info.agent_handle;
1126 * efi_disconnect_all_drivers() - disconnect all drivers from a controller
1127 * @handle: handle of the controller
1128 * @protocol: protocol GUID (optional)
1129 * @child_handle: handle of the child to destroy
1131 * This function implements the DisconnectController service.
1133 * See the Unified Extensible Firmware Interface (UEFI) specification for
1136 * Return: status code
1138 static efi_status_t efi_disconnect_all_drivers
1139 (efi_handle_t handle,
1140 const efi_guid_t *protocol,
1141 efi_handle_t child_handle)
1143 efi_uintn_t number_of_drivers;
1144 efi_handle_t *driver_handle_buffer;
1145 efi_status_t r, ret;
1147 ret = efi_get_drivers(handle, protocol, &number_of_drivers,
1148 &driver_handle_buffer);
1149 if (ret != EFI_SUCCESS)
1152 ret = EFI_NOT_FOUND;
1153 while (number_of_drivers) {
1154 r = EFI_CALL(efi_disconnect_controller(
1156 driver_handle_buffer[--number_of_drivers],
1158 if (r == EFI_SUCCESS)
1161 free(driver_handle_buffer);
1166 * efi_uninstall_protocol() - uninstall protocol interface
1168 * @handle: handle from which the protocol shall be removed
1169 * @protocol: GUID of the protocol to be removed
1170 * @protocol_interface: interface to be removed
1172 * This function DOES NOT delete a handle without installed protocol.
1174 * Return: status code
1176 static efi_status_t efi_uninstall_protocol
1177 (efi_handle_t handle, const efi_guid_t *protocol,
1178 void *protocol_interface)
1180 struct efi_object *efiobj;
1181 struct efi_handler *handler;
1182 struct efi_open_protocol_info_item *item;
1183 struct efi_open_protocol_info_item *pos;
1187 efiobj = efi_search_obj(handle);
1189 r = EFI_INVALID_PARAMETER;
1192 /* Find the protocol on the handle */
1193 r = efi_search_protocol(handle, protocol, &handler);
1194 if (r != EFI_SUCCESS)
1196 /* Disconnect controllers */
1197 efi_disconnect_all_drivers(efiobj, protocol, NULL);
1198 if (!list_empty(&handler->open_infos)) {
1199 r = EFI_ACCESS_DENIED;
1202 /* Close protocol */
1203 list_for_each_entry_safe(item, pos, &handler->open_infos, link) {
1204 if (item->info.attributes ==
1205 EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL ||
1206 item->info.attributes == EFI_OPEN_PROTOCOL_GET_PROTOCOL ||
1207 item->info.attributes == EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
1208 list_del(&item->link);
1210 if (!list_empty(&handler->open_infos)) {
1211 r = EFI_ACCESS_DENIED;
1214 r = efi_remove_protocol(handle, protocol, protocol_interface);
1220 * efi_uninstall_protocol_interface() - uninstall protocol interface
1221 * @handle: handle from which the protocol shall be removed
1222 * @protocol: GUID of the protocol to be removed
1223 * @protocol_interface: interface to be removed
1225 * This function implements the UninstallProtocolInterface service.
1227 * See the Unified Extensible Firmware Interface (UEFI) specification for
1230 * Return: status code
1232 static efi_status_t EFIAPI efi_uninstall_protocol_interface
1233 (efi_handle_t handle, const efi_guid_t *protocol,
1234 void *protocol_interface)
1238 EFI_ENTRY("%p, %pUl, %p", handle, protocol, protocol_interface);
1240 ret = efi_uninstall_protocol(handle, protocol, protocol_interface);
1241 if (ret != EFI_SUCCESS)
1244 /* If the last protocol has been removed, delete the handle. */
1245 if (list_empty(&handle->protocols)) {
1246 list_del(&handle->link);
1250 return EFI_EXIT(ret);
1254 * efi_register_protocol_notify() - register an event for notification when a
1255 * protocol is installed.
1256 * @protocol: GUID of the protocol whose installation shall be notified
1257 * @event: event to be signaled upon installation of the protocol
1258 * @registration: key for retrieving the registration information
1260 * This function implements the RegisterProtocolNotify service.
1261 * See the Unified Extensible Firmware Interface (UEFI) specification
1264 * Return: status code
1266 static efi_status_t EFIAPI efi_register_protocol_notify(
1267 const efi_guid_t *protocol,
1268 struct efi_event *event,
1269 void **registration)
1271 EFI_ENTRY("%pUl, %p, %p", protocol, event, registration);
1272 return EFI_EXIT(EFI_OUT_OF_RESOURCES);
1276 * efi_search() - determine if an EFI handle implements a protocol
1277 * @search_type: selection criterion
1278 * @protocol: GUID of the protocol
1279 * @search_key: registration key
1282 * See the documentation of the LocateHandle service in the UEFI specification.
1284 * Return: 0 if the handle implements the protocol
1286 static int efi_search(enum efi_locate_search_type search_type,
1287 const efi_guid_t *protocol, void *search_key,
1288 efi_handle_t handle)
1292 switch (search_type) {
1295 case BY_REGISTER_NOTIFY:
1296 /* TODO: RegisterProtocolNotify is not implemented yet */
1299 ret = efi_search_protocol(handle, protocol, NULL);
1300 return (ret != EFI_SUCCESS);
1302 /* Invalid search type */
1308 * efi_locate_handle() - locate handles implementing a protocol
1309 * @search_type: selection criterion
1310 * @protocol: GUID of the protocol
1311 * @search_key: registration key
1312 * @buffer_size: size of the buffer to receive the handles in bytes
1313 * @buffer: buffer to receive the relevant handles
1315 * This function is meant for U-Boot internal calls. For the API implementation
1316 * of the LocateHandle service see efi_locate_handle_ext.
1318 * Return: status code
1320 static efi_status_t efi_locate_handle(
1321 enum efi_locate_search_type search_type,
1322 const efi_guid_t *protocol, void *search_key,
1323 efi_uintn_t *buffer_size, efi_handle_t *buffer)
1325 struct efi_object *efiobj;
1326 efi_uintn_t size = 0;
1328 /* Check parameters */
1329 switch (search_type) {
1332 case BY_REGISTER_NOTIFY:
1334 return EFI_INVALID_PARAMETER;
1335 /* RegisterProtocolNotify is not implemented yet */
1336 return EFI_UNSUPPORTED;
1339 return EFI_INVALID_PARAMETER;
1342 return EFI_INVALID_PARAMETER;
1346 * efi_locate_handle_buffer uses this function for
1347 * the calculation of the necessary buffer size.
1348 * So do not require a buffer for buffersize == 0.
1350 if (!buffer_size || (*buffer_size && !buffer))
1351 return EFI_INVALID_PARAMETER;
1353 /* Count how much space we need */
1354 list_for_each_entry(efiobj, &efi_obj_list, link) {
1355 if (!efi_search(search_type, protocol, search_key, efiobj))
1356 size += sizeof(void *);
1359 if (*buffer_size < size) {
1360 *buffer_size = size;
1361 return EFI_BUFFER_TOO_SMALL;
1364 *buffer_size = size;
1366 return EFI_NOT_FOUND;
1368 /* Then fill the array */
1369 list_for_each_entry(efiobj, &efi_obj_list, link) {
1370 if (!efi_search(search_type, protocol, search_key, efiobj))
1378 * efi_locate_handle_ext() - locate handles implementing a protocol.
1379 * @search_type: selection criterion
1380 * @protocol: GUID of the protocol
1381 * @search_key: registration key
1382 * @buffer_size: size of the buffer to receive the handles in bytes
1383 * @buffer: buffer to receive the relevant handles
1385 * This function implements the LocateHandle service.
1387 * See the Unified Extensible Firmware Interface (UEFI) specification for
1390 * Return: 0 if the handle implements the protocol
1392 static efi_status_t EFIAPI efi_locate_handle_ext(
1393 enum efi_locate_search_type search_type,
1394 const efi_guid_t *protocol, void *search_key,
1395 efi_uintn_t *buffer_size, efi_handle_t *buffer)
1397 EFI_ENTRY("%d, %pUl, %p, %p, %p", search_type, protocol, search_key,
1398 buffer_size, buffer);
1400 return EFI_EXIT(efi_locate_handle(search_type, protocol, search_key,
1401 buffer_size, buffer));
1405 * efi_remove_configuration_table() - collapses configuration table entries,
1408 * @i: index of the table entry to be removed
1410 static void efi_remove_configuration_table(int i)
1412 struct efi_configuration_table *this = &systab.tables[i];
1413 struct efi_configuration_table *next = &systab.tables[i + 1];
1414 struct efi_configuration_table *end = &systab.tables[systab.nr_tables];
1416 memmove(this, next, (ulong)end - (ulong)next);
1421 * efi_install_configuration_table() - adds, updates, or removes a
1422 * configuration table
1423 * @guid: GUID of the installed table
1424 * @table: table to be installed
1426 * This function is used for internal calls. For the API implementation of the
1427 * InstallConfigurationTable service see efi_install_configuration_table_ext.
1429 * Return: status code
1431 efi_status_t efi_install_configuration_table(const efi_guid_t *guid,
1434 struct efi_event *evt;
1438 return EFI_INVALID_PARAMETER;
1440 /* Check for GUID override */
1441 for (i = 0; i < systab.nr_tables; i++) {
1442 if (!guidcmp(guid, &systab.tables[i].guid)) {
1444 systab.tables[i].table = table;
1446 efi_remove_configuration_table(i);
1452 return EFI_NOT_FOUND;
1454 /* No override, check for overflow */
1455 if (i >= EFI_MAX_CONFIGURATION_TABLES)
1456 return EFI_OUT_OF_RESOURCES;
1458 /* Add a new entry */
1459 memcpy(&systab.tables[i].guid, guid, sizeof(*guid));
1460 systab.tables[i].table = table;
1461 systab.nr_tables = i + 1;
1464 /* systab.nr_tables may have changed. So we need to update the CRC32 */
1465 efi_update_table_header_crc32(&systab.hdr);
1467 /* Notify that the configuration table was changed */
1468 list_for_each_entry(evt, &efi_events, link) {
1469 if (evt->group && !guidcmp(evt->group, guid)) {
1470 efi_signal_event(evt, false);
1479 * efi_install_configuration_table_ex() - Adds, updates, or removes a
1480 * configuration table.
1481 * @guid: GUID of the installed table
1482 * @table: table to be installed
1484 * This function implements the InstallConfigurationTable service.
1486 * See the Unified Extensible Firmware Interface (UEFI) specification for
1489 * Return: status code
1491 static efi_status_t EFIAPI efi_install_configuration_table_ext(efi_guid_t *guid,
1494 EFI_ENTRY("%pUl, %p", guid, table);
1495 return EFI_EXIT(efi_install_configuration_table(guid, table));
1499 * efi_setup_loaded_image() - initialize a loaded image
1501 * Initialize a loaded_image_info and loaded_image_info object with correct
1502 * protocols, boot-device, etc.
1504 * In case of an error *handle_ptr and *info_ptr are set to NULL and an error
1507 * @device_path: device path of the loaded image
1508 * @file_path: file path of the loaded image
1509 * @handle_ptr: handle of the loaded image
1510 * @info_ptr: loaded image protocol
1511 * Return: status code
1513 efi_status_t efi_setup_loaded_image(struct efi_device_path *device_path,
1514 struct efi_device_path *file_path,
1515 struct efi_loaded_image_obj **handle_ptr,
1516 struct efi_loaded_image **info_ptr)
1519 struct efi_loaded_image *info = NULL;
1520 struct efi_loaded_image_obj *obj = NULL;
1522 /* In case of EFI_OUT_OF_RESOURCES avoid illegal free by caller. */
1526 info = calloc(1, sizeof(*info));
1528 return EFI_OUT_OF_RESOURCES;
1529 obj = calloc(1, sizeof(*obj));
1532 return EFI_OUT_OF_RESOURCES;
1535 /* Add internal object to object list */
1536 efi_add_handle(&obj->header);
1538 info->revision = EFI_LOADED_IMAGE_PROTOCOL_REVISION;
1539 info->file_path = file_path;
1540 info->system_table = &systab;
1543 info->device_handle = efi_dp_find_obj(device_path, NULL);
1545 * When asking for the device path interface, return
1546 * bootefi_device_path
1548 ret = efi_add_protocol(&obj->header,
1549 &efi_guid_device_path, device_path);
1550 if (ret != EFI_SUCCESS)
1555 * When asking for the loaded_image interface, just
1556 * return handle which points to loaded_image_info
1558 ret = efi_add_protocol(&obj->header,
1559 &efi_guid_loaded_image, info);
1560 if (ret != EFI_SUCCESS)
1563 #if CONFIG_IS_ENABLED(EFI_LOADER_HII)
1564 ret = efi_add_protocol(&obj->header,
1565 &efi_guid_hii_string_protocol,
1566 (void *)&efi_hii_string);
1567 if (ret != EFI_SUCCESS)
1570 ret = efi_add_protocol(&obj->header,
1571 &efi_guid_hii_database_protocol,
1572 (void *)&efi_hii_database);
1573 if (ret != EFI_SUCCESS)
1576 ret = efi_add_protocol(&obj->header,
1577 &efi_guid_hii_config_routing_protocol,
1578 (void *)&efi_hii_config_routing);
1579 if (ret != EFI_SUCCESS)
1590 printf("ERROR: Failure to install protocols for loaded image\n");
1591 efi_delete_handle(&obj->header);
1597 * efi_load_image_from_path() - load an image using a file path
1599 * Read a file into a buffer allocated as EFI_BOOT_SERVICES_DATA. It is the
1600 * callers obligation to update the memory type as needed.
1602 * @file_path: the path of the image to load
1603 * @buffer: buffer containing the loaded image
1604 * @size: size of the loaded image
1605 * Return: status code
1607 efi_status_t efi_load_image_from_path(struct efi_device_path *file_path,
1608 void **buffer, efi_uintn_t *size)
1610 struct efi_file_info *info = NULL;
1611 struct efi_file_handle *f;
1612 static efi_status_t ret;
1616 /* In case of failure nothing is returned */
1621 f = efi_file_from_path(file_path);
1623 return EFI_DEVICE_ERROR;
1627 EFI_CALL(ret = f->getinfo(f, (efi_guid_t *)&efi_file_info_guid,
1629 if (ret != EFI_BUFFER_TOO_SMALL) {
1630 ret = EFI_DEVICE_ERROR;
1635 EFI_CALL(ret = f->getinfo(f, (efi_guid_t *)&efi_file_info_guid, &bs,
1637 if (ret != EFI_SUCCESS)
1641 * When reading the file we do not yet know if it contains an
1642 * application, a boottime driver, or a runtime driver. So here we
1643 * allocate a buffer as EFI_BOOT_SERVICES_DATA. The caller has to
1644 * update the reservation according to the image type.
1646 bs = info->file_size;
1647 ret = efi_allocate_pages(EFI_ALLOCATE_ANY_PAGES,
1648 EFI_BOOT_SERVICES_DATA,
1649 efi_size_in_pages(bs), &addr);
1650 if (ret != EFI_SUCCESS) {
1651 ret = EFI_OUT_OF_RESOURCES;
1656 EFI_CALL(ret = f->read(f, &bs, (void *)(uintptr_t)addr));
1657 if (ret != EFI_SUCCESS)
1658 efi_free_pages(addr, efi_size_in_pages(bs));
1659 *buffer = (void *)(uintptr_t)addr;
1662 EFI_CALL(f->close(f));
1668 * efi_load_image() - load an EFI image into memory
1669 * @boot_policy: true for request originating from the boot manager
1670 * @parent_image: the caller's image handle
1671 * @file_path: the path of the image to load
1672 * @source_buffer: memory location from which the image is installed
1673 * @source_size: size of the memory area from which the image is installed
1674 * @image_handle: handle for the newly installed image
1676 * This function implements the LoadImage service.
1678 * See the Unified Extensible Firmware Interface (UEFI) specification
1681 * Return: status code
1683 static efi_status_t EFIAPI efi_load_image(bool boot_policy,
1684 efi_handle_t parent_image,
1685 struct efi_device_path *file_path,
1686 void *source_buffer,
1687 efi_uintn_t source_size,
1688 efi_handle_t *image_handle)
1690 struct efi_device_path *dp, *fp;
1691 struct efi_loaded_image *info = NULL;
1692 struct efi_loaded_image_obj **image_obj =
1693 (struct efi_loaded_image_obj **)image_handle;
1696 EFI_ENTRY("%d, %p, %pD, %p, %zd, %p", boot_policy, parent_image,
1697 file_path, source_buffer, source_size, image_handle);
1699 if (!image_handle || !parent_image) {
1700 ret = EFI_INVALID_PARAMETER;
1704 if (!source_buffer && !file_path) {
1705 ret = EFI_NOT_FOUND;
1709 if (!source_buffer) {
1710 ret = efi_load_image_from_path(file_path, &source_buffer,
1712 if (ret != EFI_SUCCESS)
1715 * split file_path which contains both the device and
1718 efi_dp_split_file_path(file_path, &dp, &fp);
1720 /* In this case, file_path is the "device" path, i.e.
1721 * something like a HARDWARE_DEVICE:MEMORY_MAPPED
1726 ret = efi_allocate_pages(EFI_ALLOCATE_ANY_PAGES,
1727 EFI_RUNTIME_SERVICES_CODE,
1728 efi_size_in_pages(source_size), &addr);
1729 if (ret != EFI_SUCCESS)
1731 dest_buffer = (void *)(uintptr_t)addr;
1732 memcpy(dest_buffer, source_buffer, source_size);
1733 source_buffer = dest_buffer;
1738 ret = efi_setup_loaded_image(dp, fp, image_obj, &info);
1739 if (ret != EFI_SUCCESS)
1740 goto error_invalid_image;
1741 (*image_obj)->entry = efi_load_pe(*image_obj, source_buffer, info);
1742 if (!(*image_obj)->entry) {
1743 ret = EFI_UNSUPPORTED;
1744 goto error_invalid_image;
1746 /* Update the type of the allocated memory */
1747 efi_add_memory_map((uintptr_t)source_buffer,
1748 efi_size_in_pages(source_size),
1749 info->image_code_type, false);
1750 info->system_table = &systab;
1751 info->parent_handle = parent_image;
1752 return EFI_EXIT(EFI_SUCCESS);
1753 error_invalid_image:
1754 /* The image is invalid. Release all associated resources. */
1755 efi_free_pages((uintptr_t)source_buffer,
1756 efi_size_in_pages(source_size));
1757 efi_delete_handle(*image_handle);
1758 *image_handle = NULL;
1761 return EFI_EXIT(ret);
1765 * efi_start_image() - call the entry point of an image
1766 * @image_handle: handle of the image
1767 * @exit_data_size: size of the buffer
1768 * @exit_data: buffer to receive the exit data of the called image
1770 * This function implements the StartImage service.
1772 * See the Unified Extensible Firmware Interface (UEFI) specification for
1775 * Return: status code
1777 static efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle,
1778 efi_uintn_t *exit_data_size,
1781 struct efi_loaded_image_obj *image_obj =
1782 (struct efi_loaded_image_obj *)image_handle;
1785 EFI_ENTRY("%p, %p, %p", image_handle, exit_data_size, exit_data);
1787 efi_is_direct_boot = false;
1789 /* call the image! */
1790 if (setjmp(&image_obj->exit_jmp)) {
1792 * We called the entry point of the child image with EFI_CALL
1793 * in the lines below. The child image called the Exit() boot
1794 * service efi_exit() which executed the long jump that brought
1795 * us to the current line. This implies that the second half
1796 * of the EFI_CALL macro has not been executed.
1800 * efi_exit() called efi_restore_gd(). We have to undo this
1801 * otherwise __efi_entry_check() will put the wrong value into
1807 * To get ready to call EFI_EXIT below we have to execute the
1808 * missed out steps of EFI_CALL.
1810 assert(__efi_entry_check());
1811 debug("%sEFI: %lu returned by started image\n",
1812 __efi_nesting_dec(),
1813 (unsigned long)((uintptr_t)image_obj->exit_status &
1815 return EFI_EXIT(image_obj->exit_status);
1818 ret = EFI_CALL(image_obj->entry(image_handle, &systab));
1821 * Usually UEFI applications call Exit() instead of returning.
1822 * But because the world doesn't consist of ponies and unicorns,
1823 * we're happy to emulate that behavior on behalf of a payload
1826 return EFI_CALL(systab.boottime->exit(image_handle, ret, 0, NULL));
1830 * efi_exit() - leave an EFI application or driver
1831 * @image_handle: handle of the application or driver that is exiting
1832 * @exit_status: status code
1833 * @exit_data_size: size of the buffer in bytes
1834 * @exit_data: buffer with data describing an error
1836 * This function implements the Exit service.
1838 * See the Unified Extensible Firmware Interface (UEFI) specification for
1841 * Return: status code
1843 static efi_status_t EFIAPI efi_exit(efi_handle_t image_handle,
1844 efi_status_t exit_status,
1845 efi_uintn_t exit_data_size,
1849 * TODO: We should call the unload procedure of the loaded
1852 struct efi_loaded_image_obj *image_obj =
1853 (struct efi_loaded_image_obj *)image_handle;
1855 EFI_ENTRY("%p, %ld, %zu, %p", image_handle, exit_status,
1856 exit_data_size, exit_data);
1858 /* Make sure entry/exit counts for EFI world cross-overs match */
1859 EFI_EXIT(exit_status);
1862 * But longjmp out with the U-Boot gd, not the application's, as
1863 * the other end is a setjmp call inside EFI context.
1867 image_obj->exit_status = exit_status;
1868 longjmp(&image_obj->exit_jmp, 1);
1870 panic("EFI application exited");
1874 * efi_unload_image() - unload an EFI image
1875 * @image_handle: handle of the image to be unloaded
1877 * This function implements the UnloadImage service.
1879 * See the Unified Extensible Firmware Interface (UEFI) specification for
1882 * Return: status code
1884 static efi_status_t EFIAPI efi_unload_image(efi_handle_t image_handle)
1886 struct efi_object *efiobj;
1888 EFI_ENTRY("%p", image_handle);
1889 efiobj = efi_search_obj(image_handle);
1891 list_del(&efiobj->link);
1893 return EFI_EXIT(EFI_SUCCESS);
1897 * efi_exit_caches() - fix up caches for EFI payloads if necessary
1899 static void efi_exit_caches(void)
1901 #if defined(CONFIG_ARM) && !defined(CONFIG_ARM64)
1903 * Grub on 32bit ARM needs to have caches disabled before jumping into
1904 * a zImage, but does not know of all cache layers. Give it a hand.
1906 if (efi_is_direct_boot)
1907 cleanup_before_linux();
1912 * efi_exit_boot_services() - stop all boot services
1913 * @image_handle: handle of the loaded image
1914 * @map_key: key of the memory map
1916 * This function implements the ExitBootServices service.
1918 * See the Unified Extensible Firmware Interface (UEFI) specification
1921 * All timer events are disabled. For exit boot services events the
1922 * notification function is called. The boot services are disabled in the
1925 * Return: status code
1927 static efi_status_t EFIAPI efi_exit_boot_services(efi_handle_t image_handle,
1928 unsigned long map_key)
1930 struct efi_event *evt;
1932 EFI_ENTRY("%p, %ld", image_handle, map_key);
1934 /* Check that the caller has read the current memory map */
1935 if (map_key != efi_memory_map_key)
1936 return EFI_INVALID_PARAMETER;
1938 /* Make sure that notification functions are not called anymore */
1939 efi_tpl = TPL_HIGH_LEVEL;
1941 /* Check if ExitBootServices has already been called */
1942 if (!systab.boottime)
1943 return EFI_EXIT(EFI_SUCCESS);
1945 /* Add related events to the event group */
1946 list_for_each_entry(evt, &efi_events, link) {
1947 if (evt->type == EVT_SIGNAL_EXIT_BOOT_SERVICES)
1948 evt->group = &efi_guid_event_group_exit_boot_services;
1950 /* Notify that ExitBootServices is invoked. */
1951 list_for_each_entry(evt, &efi_events, link) {
1953 !guidcmp(evt->group,
1954 &efi_guid_event_group_exit_boot_services)) {
1955 efi_signal_event(evt, false);
1960 /* TODO: Should persist EFI variables here */
1962 board_quiesce_devices();
1964 /* Fix up caches for EFI payloads if necessary */
1967 /* This stops all lingering devices */
1968 bootm_disable_interrupts();
1970 /* Disable boot time services */
1971 systab.con_in_handle = NULL;
1972 systab.con_in = NULL;
1973 systab.con_out_handle = NULL;
1974 systab.con_out = NULL;
1975 systab.stderr_handle = NULL;
1976 systab.std_err = NULL;
1977 systab.boottime = NULL;
1979 /* Recalculate CRC32 */
1980 efi_update_table_header_crc32(&systab.hdr);
1982 /* Give the payload some time to boot */
1983 efi_set_watchdog(0);
1986 return EFI_EXIT(EFI_SUCCESS);
1990 * efi_get_next_monotonic_count() - get next value of the counter
1991 * @count: returned value of the counter
1993 * This function implements the NextMonotonicCount service.
1995 * See the Unified Extensible Firmware Interface (UEFI) specification for
1998 * Return: status code
2000 static efi_status_t EFIAPI efi_get_next_monotonic_count(uint64_t *count)
2002 static uint64_t mono;
2004 EFI_ENTRY("%p", count);
2006 return EFI_EXIT(EFI_SUCCESS);
2010 * efi_stall() - sleep
2011 * @microseconds: period to sleep in microseconds
2013 * This function implements the Stall service.
2015 * See the Unified Extensible Firmware Interface (UEFI) specification for
2018 * Return: status code
2020 static efi_status_t EFIAPI efi_stall(unsigned long microseconds)
2022 EFI_ENTRY("%ld", microseconds);
2023 udelay(microseconds);
2024 return EFI_EXIT(EFI_SUCCESS);
2028 * efi_set_watchdog_timer() - reset the watchdog timer
2029 * @timeout: seconds before reset by watchdog
2030 * @watchdog_code: code to be logged when resetting
2031 * @data_size: size of buffer in bytes
2032 * @watchdog_data: buffer with data describing the reset reason
2034 * This function implements the SetWatchdogTimer service.
2036 * See the Unified Extensible Firmware Interface (UEFI) specification for
2039 * Return: status code
2041 static efi_status_t EFIAPI efi_set_watchdog_timer(unsigned long timeout,
2042 uint64_t watchdog_code,
2043 unsigned long data_size,
2044 uint16_t *watchdog_data)
2046 EFI_ENTRY("%ld, 0x%llx, %ld, %p", timeout, watchdog_code,
2047 data_size, watchdog_data);
2048 return EFI_EXIT(efi_set_watchdog(timeout));
2052 * efi_close_protocol() - close a protocol
2053 * @handle: handle on which the protocol shall be closed
2054 * @protocol: GUID of the protocol to close
2055 * @agent_handle: handle of the driver
2056 * @controller_handle: handle of the controller
2058 * This function implements the CloseProtocol service.
2060 * See the Unified Extensible Firmware Interface (UEFI) specification for
2063 * Return: status code
2065 static efi_status_t EFIAPI efi_close_protocol(efi_handle_t handle,
2066 const efi_guid_t *protocol,
2067 efi_handle_t agent_handle,
2068 efi_handle_t controller_handle)
2070 struct efi_handler *handler;
2071 struct efi_open_protocol_info_item *item;
2072 struct efi_open_protocol_info_item *pos;
2075 EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, agent_handle,
2078 if (!agent_handle) {
2079 r = EFI_INVALID_PARAMETER;
2082 r = efi_search_protocol(handle, protocol, &handler);
2083 if (r != EFI_SUCCESS)
2087 list_for_each_entry_safe(item, pos, &handler->open_infos, link) {
2088 if (item->info.agent_handle == agent_handle &&
2089 item->info.controller_handle == controller_handle) {
2090 efi_delete_open_info(item);
2100 * efi_open_protocol_information() - provide information about then open status
2101 * of a protocol on a handle
2102 * @handle: handle for which the information shall be retrieved
2103 * @protocol: GUID of the protocol
2104 * @entry_buffer: buffer to receive the open protocol information
2105 * @entry_count: number of entries available in the buffer
2107 * This function implements the OpenProtocolInformation service.
2109 * See the Unified Extensible Firmware Interface (UEFI) specification for
2112 * Return: status code
2114 static efi_status_t EFIAPI efi_open_protocol_information(
2115 efi_handle_t handle, const efi_guid_t *protocol,
2116 struct efi_open_protocol_info_entry **entry_buffer,
2117 efi_uintn_t *entry_count)
2119 unsigned long buffer_size;
2120 unsigned long count;
2121 struct efi_handler *handler;
2122 struct efi_open_protocol_info_item *item;
2125 EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, entry_buffer,
2128 /* Check parameters */
2129 if (!entry_buffer) {
2130 r = EFI_INVALID_PARAMETER;
2133 r = efi_search_protocol(handle, protocol, &handler);
2134 if (r != EFI_SUCCESS)
2139 list_for_each_entry(item, &handler->open_infos, link) {
2140 if (item->info.open_count)
2143 *entry_count = count;
2144 *entry_buffer = NULL;
2151 buffer_size = count * sizeof(struct efi_open_protocol_info_entry);
2152 r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
2153 (void **)entry_buffer);
2154 if (r != EFI_SUCCESS)
2156 list_for_each_entry_reverse(item, &handler->open_infos, link) {
2157 if (item->info.open_count)
2158 (*entry_buffer)[--count] = item->info;
2165 * efi_protocols_per_handle() - get protocols installed on a handle
2166 * @handle: handle for which the information is retrieved
2167 * @protocol_buffer: buffer with protocol GUIDs
2168 * @protocol_buffer_count: number of entries in the buffer
2170 * This function implements the ProtocolsPerHandleService.
2172 * See the Unified Extensible Firmware Interface (UEFI) specification for
2175 * Return: status code
2177 static efi_status_t EFIAPI efi_protocols_per_handle(
2178 efi_handle_t handle, efi_guid_t ***protocol_buffer,
2179 efi_uintn_t *protocol_buffer_count)
2181 unsigned long buffer_size;
2182 struct efi_object *efiobj;
2183 struct list_head *protocol_handle;
2186 EFI_ENTRY("%p, %p, %p", handle, protocol_buffer,
2187 protocol_buffer_count);
2189 if (!handle || !protocol_buffer || !protocol_buffer_count)
2190 return EFI_EXIT(EFI_INVALID_PARAMETER);
2192 *protocol_buffer = NULL;
2193 *protocol_buffer_count = 0;
2195 efiobj = efi_search_obj(handle);
2197 return EFI_EXIT(EFI_INVALID_PARAMETER);
2199 /* Count protocols */
2200 list_for_each(protocol_handle, &efiobj->protocols) {
2201 ++*protocol_buffer_count;
2205 if (*protocol_buffer_count) {
2208 buffer_size = sizeof(efi_guid_t *) * *protocol_buffer_count;
2209 r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
2210 (void **)protocol_buffer);
2211 if (r != EFI_SUCCESS)
2213 list_for_each(protocol_handle, &efiobj->protocols) {
2214 struct efi_handler *protocol;
2216 protocol = list_entry(protocol_handle,
2217 struct efi_handler, link);
2218 (*protocol_buffer)[j] = (void *)protocol->guid;
2223 return EFI_EXIT(EFI_SUCCESS);
2227 * efi_locate_handle_buffer() - locate handles implementing a protocol
2228 * @search_type: selection criterion
2229 * @protocol: GUID of the protocol
2230 * @search_key: registration key
2231 * @no_handles: number of returned handles
2232 * @buffer: buffer with the returned handles
2234 * This function implements the LocateHandleBuffer service.
2236 * See the Unified Extensible Firmware Interface (UEFI) specification for
2239 * Return: status code
2241 static efi_status_t EFIAPI efi_locate_handle_buffer(
2242 enum efi_locate_search_type search_type,
2243 const efi_guid_t *protocol, void *search_key,
2244 efi_uintn_t *no_handles, efi_handle_t **buffer)
2247 efi_uintn_t buffer_size = 0;
2249 EFI_ENTRY("%d, %pUl, %p, %p, %p", search_type, protocol, search_key,
2250 no_handles, buffer);
2252 if (!no_handles || !buffer) {
2253 r = EFI_INVALID_PARAMETER;
2258 r = efi_locate_handle(search_type, protocol, search_key, &buffer_size,
2260 if (r != EFI_BUFFER_TOO_SMALL)
2262 r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
2264 if (r != EFI_SUCCESS)
2266 r = efi_locate_handle(search_type, protocol, search_key, &buffer_size,
2268 if (r == EFI_SUCCESS)
2269 *no_handles = buffer_size / sizeof(efi_handle_t);
2275 * efi_locate_protocol() - find an interface implementing a protocol
2276 * @protocol: GUID of the protocol
2277 * @registration: registration key passed to the notification function
2278 * @protocol_interface: interface implementing the protocol
2280 * This function implements the LocateProtocol service.
2282 * See the Unified Extensible Firmware Interface (UEFI) specification for
2285 * Return: status code
2287 static efi_status_t EFIAPI efi_locate_protocol(const efi_guid_t *protocol,
2289 void **protocol_interface)
2291 struct list_head *lhandle;
2294 EFI_ENTRY("%pUl, %p, %p", protocol, registration, protocol_interface);
2296 if (!protocol || !protocol_interface)
2297 return EFI_EXIT(EFI_INVALID_PARAMETER);
2299 list_for_each(lhandle, &efi_obj_list) {
2300 struct efi_object *efiobj;
2301 struct efi_handler *handler;
2303 efiobj = list_entry(lhandle, struct efi_object, link);
2305 ret = efi_search_protocol(efiobj, protocol, &handler);
2306 if (ret == EFI_SUCCESS) {
2307 *protocol_interface = handler->protocol_interface;
2308 return EFI_EXIT(EFI_SUCCESS);
2311 *protocol_interface = NULL;
2313 return EFI_EXIT(EFI_NOT_FOUND);
2317 * efi_locate_device_path() - Get the device path and handle of an device
2318 * implementing a protocol
2319 * @protocol: GUID of the protocol
2320 * @device_path: device path
2321 * @device: handle of the device
2323 * This function implements the LocateDevicePath service.
2325 * See the Unified Extensible Firmware Interface (UEFI) specification for
2328 * Return: status code
2330 static efi_status_t EFIAPI efi_locate_device_path(
2331 const efi_guid_t *protocol,
2332 struct efi_device_path **device_path,
2333 efi_handle_t *device)
2335 struct efi_device_path *dp;
2337 struct efi_handler *handler;
2338 efi_handle_t *handles;
2340 size_t len_best = 0;
2341 efi_uintn_t no_handles;
2345 EFI_ENTRY("%pUl, %p, %p", protocol, device_path, device);
2347 if (!protocol || !device_path || !*device_path || !device) {
2348 ret = EFI_INVALID_PARAMETER;
2352 /* Find end of device path */
2353 len = efi_dp_instance_size(*device_path);
2355 /* Get all handles implementing the protocol */
2356 ret = EFI_CALL(efi_locate_handle_buffer(BY_PROTOCOL, protocol, NULL,
2357 &no_handles, &handles));
2358 if (ret != EFI_SUCCESS)
2361 for (i = 0; i < no_handles; ++i) {
2362 /* Find the device path protocol */
2363 ret = efi_search_protocol(handles[i], &efi_guid_device_path,
2365 if (ret != EFI_SUCCESS)
2367 dp = (struct efi_device_path *)handler->protocol_interface;
2368 len_dp = efi_dp_instance_size(dp);
2370 * This handle can only be a better fit
2371 * if its device path length is longer than the best fit and
2372 * if its device path length is shorter of equal the searched
2375 if (len_dp <= len_best || len_dp > len)
2377 /* Check if dp is a subpath of device_path */
2378 if (memcmp(*device_path, dp, len_dp))
2380 *device = handles[i];
2384 remainder = (u8 *)*device_path + len_best;
2385 *device_path = (struct efi_device_path *)remainder;
2388 ret = EFI_NOT_FOUND;
2391 return EFI_EXIT(ret);
2395 * efi_install_multiple_protocol_interfaces() - Install multiple protocol
2397 * @handle: handle on which the protocol interfaces shall be installed
2398 * @...: NULL terminated argument list with pairs of protocol GUIDS and
2401 * This function implements the MultipleProtocolInterfaces service.
2403 * See the Unified Extensible Firmware Interface (UEFI) specification for
2406 * Return: status code
2408 static efi_status_t EFIAPI efi_install_multiple_protocol_interfaces
2409 (efi_handle_t *handle, ...)
2411 EFI_ENTRY("%p", handle);
2414 const efi_guid_t *protocol;
2415 void *protocol_interface;
2416 efi_status_t r = EFI_SUCCESS;
2420 return EFI_EXIT(EFI_INVALID_PARAMETER);
2422 efi_va_start(argptr, handle);
2424 protocol = efi_va_arg(argptr, efi_guid_t*);
2427 protocol_interface = efi_va_arg(argptr, void*);
2428 r = EFI_CALL(efi_install_protocol_interface(
2430 EFI_NATIVE_INTERFACE,
2431 protocol_interface));
2432 if (r != EFI_SUCCESS)
2437 if (r == EFI_SUCCESS)
2440 /* If an error occurred undo all changes. */
2441 efi_va_start(argptr, handle);
2443 protocol = efi_va_arg(argptr, efi_guid_t*);
2444 protocol_interface = efi_va_arg(argptr, void*);
2445 EFI_CALL(efi_uninstall_protocol_interface(*handle, protocol,
2446 protocol_interface));
2454 * efi_uninstall_multiple_protocol_interfaces() - uninstall multiple protocol
2456 * @handle: handle from which the protocol interfaces shall be removed
2457 * @...: NULL terminated argument list with pairs of protocol GUIDS and
2460 * This function implements the UninstallMultipleProtocolInterfaces service.
2462 * See the Unified Extensible Firmware Interface (UEFI) specification for
2465 * Return: status code
2467 static efi_status_t EFIAPI efi_uninstall_multiple_protocol_interfaces(
2468 efi_handle_t handle, ...)
2470 EFI_ENTRY("%p", handle);
2473 const efi_guid_t *protocol;
2474 void *protocol_interface;
2475 efi_status_t r = EFI_SUCCESS;
2479 return EFI_EXIT(EFI_INVALID_PARAMETER);
2481 efi_va_start(argptr, handle);
2483 protocol = efi_va_arg(argptr, efi_guid_t*);
2486 protocol_interface = efi_va_arg(argptr, void*);
2487 r = efi_uninstall_protocol(handle, protocol,
2488 protocol_interface);
2489 if (r != EFI_SUCCESS)
2494 if (r == EFI_SUCCESS) {
2495 /* If the last protocol has been removed, delete the handle. */
2496 if (list_empty(&handle->protocols)) {
2497 list_del(&handle->link);
2503 /* If an error occurred undo all changes. */
2504 efi_va_start(argptr, handle);
2506 protocol = efi_va_arg(argptr, efi_guid_t*);
2507 protocol_interface = efi_va_arg(argptr, void*);
2508 EFI_CALL(efi_install_protocol_interface(&handle, protocol,
2509 EFI_NATIVE_INTERFACE,
2510 protocol_interface));
2514 /* In case of an error always return EFI_INVALID_PARAMETER */
2515 return EFI_EXIT(EFI_INVALID_PARAMETER);
2519 * efi_calculate_crc32() - calculate cyclic redundancy code
2520 * @data: buffer with data
2521 * @data_size: size of buffer in bytes
2522 * @crc32_p: cyclic redundancy code
2524 * This function implements the CalculateCrc32 service.
2526 * See the Unified Extensible Firmware Interface (UEFI) specification for
2529 * Return: status code
2531 static efi_status_t EFIAPI efi_calculate_crc32(const void *data,
2532 efi_uintn_t data_size,
2535 EFI_ENTRY("%p, %zu", data, data_size);
2536 *crc32_p = crc32(0, data, data_size);
2537 return EFI_EXIT(EFI_SUCCESS);
2541 * efi_copy_mem() - copy memory
2542 * @destination: destination of the copy operation
2543 * @source: source of the copy operation
2544 * @length: number of bytes to copy
2546 * This function implements the CopyMem service.
2548 * See the Unified Extensible Firmware Interface (UEFI) specification for
2551 static void EFIAPI efi_copy_mem(void *destination, const void *source,
2554 EFI_ENTRY("%p, %p, %ld", destination, source, (unsigned long)length);
2555 memmove(destination, source, length);
2556 EFI_EXIT(EFI_SUCCESS);
2560 * efi_set_mem() - Fill memory with a byte value.
2561 * @buffer: buffer to fill
2562 * @size: size of buffer in bytes
2563 * @value: byte to copy to the buffer
2565 * This function implements the SetMem service.
2567 * See the Unified Extensible Firmware Interface (UEFI) specification for
2570 static void EFIAPI efi_set_mem(void *buffer, size_t size, uint8_t value)
2572 EFI_ENTRY("%p, %ld, 0x%x", buffer, (unsigned long)size, value);
2573 memset(buffer, value, size);
2574 EFI_EXIT(EFI_SUCCESS);
2578 * efi_protocol_open() - open protocol interface on a handle
2579 * @handler: handler of a protocol
2580 * @protocol_interface: interface implementing the protocol
2581 * @agent_handle: handle of the driver
2582 * @controller_handle: handle of the controller
2583 * @attributes: attributes indicating how to open the protocol
2585 * Return: status code
2587 static efi_status_t efi_protocol_open(
2588 struct efi_handler *handler,
2589 void **protocol_interface, void *agent_handle,
2590 void *controller_handle, uint32_t attributes)
2592 struct efi_open_protocol_info_item *item;
2593 struct efi_open_protocol_info_entry *match = NULL;
2594 bool opened_by_driver = false;
2595 bool opened_exclusive = false;
2597 /* If there is no agent, only return the interface */
2601 /* For TEST_PROTOCOL ignore interface attribute */
2602 if (attributes != EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
2603 *protocol_interface = NULL;
2606 * Check if the protocol is already opened by a driver with the same
2607 * attributes or opened exclusively
2609 list_for_each_entry(item, &handler->open_infos, link) {
2610 if (item->info.agent_handle == agent_handle) {
2611 if ((attributes & EFI_OPEN_PROTOCOL_BY_DRIVER) &&
2612 (item->info.attributes == attributes))
2613 return EFI_ALREADY_STARTED;
2615 if (item->info.attributes & EFI_OPEN_PROTOCOL_EXCLUSIVE)
2616 opened_exclusive = true;
2619 /* Only one controller can open the protocol exclusively */
2620 if (opened_exclusive && attributes &
2621 (EFI_OPEN_PROTOCOL_EXCLUSIVE | EFI_OPEN_PROTOCOL_BY_DRIVER))
2622 return EFI_ACCESS_DENIED;
2624 /* Prepare exclusive opening */
2625 if (attributes & EFI_OPEN_PROTOCOL_EXCLUSIVE) {
2626 /* Try to disconnect controllers */
2627 list_for_each_entry(item, &handler->open_infos, link) {
2628 if (item->info.attributes ==
2629 EFI_OPEN_PROTOCOL_BY_DRIVER)
2630 EFI_CALL(efi_disconnect_controller(
2631 item->info.controller_handle,
2632 item->info.agent_handle,
2635 opened_by_driver = false;
2636 /* Check if all controllers are disconnected */
2637 list_for_each_entry(item, &handler->open_infos, link) {
2638 if (item->info.attributes & EFI_OPEN_PROTOCOL_BY_DRIVER)
2639 opened_by_driver = true;
2641 /* Only one controller can be connected */
2642 if (opened_by_driver)
2643 return EFI_ACCESS_DENIED;
2646 /* Find existing entry */
2647 list_for_each_entry(item, &handler->open_infos, link) {
2648 if (item->info.agent_handle == agent_handle &&
2649 item->info.controller_handle == controller_handle)
2650 match = &item->info;
2652 /* None found, create one */
2654 match = efi_create_open_info(handler);
2656 return EFI_OUT_OF_RESOURCES;
2659 match->agent_handle = agent_handle;
2660 match->controller_handle = controller_handle;
2661 match->attributes = attributes;
2662 match->open_count++;
2665 /* For TEST_PROTOCOL ignore interface attribute. */
2666 if (attributes != EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
2667 *protocol_interface = handler->protocol_interface;
2673 * efi_open_protocol() - open protocol interface on a handle
2674 * @handle: handle on which the protocol shall be opened
2675 * @protocol: GUID of the protocol
2676 * @protocol_interface: interface implementing the protocol
2677 * @agent_handle: handle of the driver
2678 * @controller_handle: handle of the controller
2679 * @attributes: attributes indicating how to open the protocol
2681 * This function implements the OpenProtocol interface.
2683 * See the Unified Extensible Firmware Interface (UEFI) specification for
2686 * Return: status code
2688 static efi_status_t EFIAPI efi_open_protocol
2689 (efi_handle_t handle, const efi_guid_t *protocol,
2690 void **protocol_interface, efi_handle_t agent_handle,
2691 efi_handle_t controller_handle, uint32_t attributes)
2693 struct efi_handler *handler;
2694 efi_status_t r = EFI_INVALID_PARAMETER;
2696 EFI_ENTRY("%p, %pUl, %p, %p, %p, 0x%x", handle, protocol,
2697 protocol_interface, agent_handle, controller_handle,
2700 if (!handle || !protocol ||
2701 (!protocol_interface && attributes !=
2702 EFI_OPEN_PROTOCOL_TEST_PROTOCOL)) {
2706 switch (attributes) {
2707 case EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL:
2708 case EFI_OPEN_PROTOCOL_GET_PROTOCOL:
2709 case EFI_OPEN_PROTOCOL_TEST_PROTOCOL:
2711 case EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER:
2712 if (controller_handle == handle)
2715 case EFI_OPEN_PROTOCOL_BY_DRIVER:
2716 case EFI_OPEN_PROTOCOL_BY_DRIVER | EFI_OPEN_PROTOCOL_EXCLUSIVE:
2717 /* Check that the controller handle is valid */
2718 if (!efi_search_obj(controller_handle))
2721 case EFI_OPEN_PROTOCOL_EXCLUSIVE:
2722 /* Check that the agent handle is valid */
2723 if (!efi_search_obj(agent_handle))
2730 r = efi_search_protocol(handle, protocol, &handler);
2731 if (r != EFI_SUCCESS)
2734 r = efi_protocol_open(handler, protocol_interface, agent_handle,
2735 controller_handle, attributes);
2741 * efi_handle_protocol() - get interface of a protocol on a handle
2742 * @handle: handle on which the protocol shall be opened
2743 * @protocol: GUID of the protocol
2744 * @protocol_interface: interface implementing the protocol
2746 * This function implements the HandleProtocol service.
2748 * See the Unified Extensible Firmware Interface (UEFI) specification for
2751 * Return: status code
2753 static efi_status_t EFIAPI efi_handle_protocol(efi_handle_t handle,
2754 const efi_guid_t *protocol,
2755 void **protocol_interface)
2757 return efi_open_protocol(handle, protocol, protocol_interface, NULL,
2758 NULL, EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL);
2762 * efi_bind_controller() - bind a single driver to a controller
2763 * @controller_handle: controller handle
2764 * @driver_image_handle: driver handle
2765 * @remain_device_path: remaining path
2767 * Return: status code
2769 static efi_status_t efi_bind_controller(
2770 efi_handle_t controller_handle,
2771 efi_handle_t driver_image_handle,
2772 struct efi_device_path *remain_device_path)
2774 struct efi_driver_binding_protocol *binding_protocol;
2777 r = EFI_CALL(efi_open_protocol(driver_image_handle,
2778 &efi_guid_driver_binding_protocol,
2779 (void **)&binding_protocol,
2780 driver_image_handle, NULL,
2781 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
2782 if (r != EFI_SUCCESS)
2784 r = EFI_CALL(binding_protocol->supported(binding_protocol,
2786 remain_device_path));
2787 if (r == EFI_SUCCESS)
2788 r = EFI_CALL(binding_protocol->start(binding_protocol,
2790 remain_device_path));
2791 EFI_CALL(efi_close_protocol(driver_image_handle,
2792 &efi_guid_driver_binding_protocol,
2793 driver_image_handle, NULL));
2798 * efi_connect_single_controller() - connect a single driver to a controller
2799 * @controller_handle: controller
2800 * @driver_image_handle: driver
2801 * @remain_device_path: remaining path
2803 * Return: status code
2805 static efi_status_t efi_connect_single_controller(
2806 efi_handle_t controller_handle,
2807 efi_handle_t *driver_image_handle,
2808 struct efi_device_path *remain_device_path)
2810 efi_handle_t *buffer;
2814 size_t connected = 0;
2816 /* Get buffer with all handles with driver binding protocol */
2817 r = EFI_CALL(efi_locate_handle_buffer(BY_PROTOCOL,
2818 &efi_guid_driver_binding_protocol,
2819 NULL, &count, &buffer));
2820 if (r != EFI_SUCCESS)
2823 /* Context Override */
2824 if (driver_image_handle) {
2825 for (; *driver_image_handle; ++driver_image_handle) {
2826 for (i = 0; i < count; ++i) {
2827 if (buffer[i] == *driver_image_handle) {
2829 r = efi_bind_controller(
2831 *driver_image_handle,
2832 remain_device_path);
2834 * For drivers that do not support the
2835 * controller or are already connected
2836 * we receive an error code here.
2838 if (r == EFI_SUCCESS)
2846 * TODO: Some overrides are not yet implemented:
2847 * - Platform Driver Override
2848 * - Driver Family Override Search
2849 * - Bus Specific Driver Override
2852 /* Driver Binding Search */
2853 for (i = 0; i < count; ++i) {
2855 r = efi_bind_controller(controller_handle,
2857 remain_device_path);
2858 if (r == EFI_SUCCESS)
2863 efi_free_pool(buffer);
2865 return EFI_NOT_FOUND;
2870 * efi_connect_controller() - connect a controller to a driver
2871 * @controller_handle: handle of the controller
2872 * @driver_image_handle: handle of the driver
2873 * @remain_device_path: device path of a child controller
2874 * @recursive: true to connect all child controllers
2876 * This function implements the ConnectController service.
2878 * See the Unified Extensible Firmware Interface (UEFI) specification for
2881 * First all driver binding protocol handles are tried for binding drivers.
2882 * Afterwards all handles that have opened a protocol of the controller
2883 * with EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER are connected to drivers.
2885 * Return: status code
2887 static efi_status_t EFIAPI efi_connect_controller(
2888 efi_handle_t controller_handle,
2889 efi_handle_t *driver_image_handle,
2890 struct efi_device_path *remain_device_path,
2894 efi_status_t ret = EFI_NOT_FOUND;
2895 struct efi_object *efiobj;
2897 EFI_ENTRY("%p, %p, %pD, %d", controller_handle, driver_image_handle,
2898 remain_device_path, recursive);
2900 efiobj = efi_search_obj(controller_handle);
2902 ret = EFI_INVALID_PARAMETER;
2906 r = efi_connect_single_controller(controller_handle,
2907 driver_image_handle,
2908 remain_device_path);
2909 if (r == EFI_SUCCESS)
2912 struct efi_handler *handler;
2913 struct efi_open_protocol_info_item *item;
2915 list_for_each_entry(handler, &efiobj->protocols, link) {
2916 list_for_each_entry(item, &handler->open_infos, link) {
2917 if (item->info.attributes &
2918 EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER) {
2919 r = EFI_CALL(efi_connect_controller(
2920 item->info.controller_handle,
2921 driver_image_handle,
2924 if (r == EFI_SUCCESS)
2930 /* Check for child controller specified by end node */
2931 if (ret != EFI_SUCCESS && remain_device_path &&
2932 remain_device_path->type == DEVICE_PATH_TYPE_END)
2935 return EFI_EXIT(ret);
2939 * efi_reinstall_protocol_interface() - reinstall protocol interface
2940 * @handle: handle on which the protocol shall be reinstalled
2941 * @protocol: GUID of the protocol to be installed
2942 * @old_interface: interface to be removed
2943 * @new_interface: interface to be installed
2945 * This function implements the ReinstallProtocolInterface service.
2947 * See the Unified Extensible Firmware Interface (UEFI) specification for
2950 * The old interface is uninstalled. The new interface is installed.
2951 * Drivers are connected.
2953 * Return: status code
2955 static efi_status_t EFIAPI efi_reinstall_protocol_interface(
2956 efi_handle_t handle, const efi_guid_t *protocol,
2957 void *old_interface, void *new_interface)
2961 EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, old_interface,
2964 /* Uninstall protocol but do not delete handle */
2965 ret = efi_uninstall_protocol(handle, protocol, old_interface);
2966 if (ret != EFI_SUCCESS)
2969 /* Install the new protocol */
2970 ret = efi_add_protocol(handle, protocol, new_interface);
2972 * The UEFI spec does not specify what should happen to the handle
2973 * if in case of an error no protocol interface remains on the handle.
2974 * So let's do nothing here.
2976 if (ret != EFI_SUCCESS)
2979 * The returned status code has to be ignored.
2980 * Do not create an error if no suitable driver for the handle exists.
2982 EFI_CALL(efi_connect_controller(handle, NULL, NULL, true));
2984 return EFI_EXIT(ret);
2988 * efi_get_child_controllers() - get all child controllers associated to a driver
2989 * @efiobj: handle of the controller
2990 * @driver_handle: handle of the driver
2991 * @number_of_children: number of child controllers
2992 * @child_handle_buffer: handles of the the child controllers
2994 * The allocated buffer has to be freed with free().
2996 * Return: status code
2998 static efi_status_t efi_get_child_controllers(
2999 struct efi_object *efiobj,
3000 efi_handle_t driver_handle,
3001 efi_uintn_t *number_of_children,
3002 efi_handle_t **child_handle_buffer)
3004 struct efi_handler *handler;
3005 struct efi_open_protocol_info_item *item;
3006 efi_uintn_t count = 0, i;
3009 /* Count all child controller associations */
3010 list_for_each_entry(handler, &efiobj->protocols, link) {
3011 list_for_each_entry(item, &handler->open_infos, link) {
3012 if (item->info.agent_handle == driver_handle &&
3013 item->info.attributes &
3014 EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER)
3019 * Create buffer. In case of duplicate child controller assignments
3020 * the buffer will be too large. But that does not harm.
3022 *number_of_children = 0;
3023 *child_handle_buffer = calloc(count, sizeof(efi_handle_t));
3024 if (!*child_handle_buffer)
3025 return EFI_OUT_OF_RESOURCES;
3026 /* Copy unique child handles */
3027 list_for_each_entry(handler, &efiobj->protocols, link) {
3028 list_for_each_entry(item, &handler->open_infos, link) {
3029 if (item->info.agent_handle == driver_handle &&
3030 item->info.attributes &
3031 EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER) {
3032 /* Check this is a new child controller */
3034 for (i = 0; i < *number_of_children; ++i) {
3035 if ((*child_handle_buffer)[i] ==
3036 item->info.controller_handle)
3039 /* Copy handle to buffer */
3041 i = (*number_of_children)++;
3042 (*child_handle_buffer)[i] =
3043 item->info.controller_handle;
3052 * efi_disconnect_controller() - disconnect a controller from a driver
3053 * @controller_handle: handle of the controller
3054 * @driver_image_handle: handle of the driver
3055 * @child_handle: handle of the child to destroy
3057 * This function implements the DisconnectController service.
3059 * See the Unified Extensible Firmware Interface (UEFI) specification for
3062 * Return: status code
3064 static efi_status_t EFIAPI efi_disconnect_controller(
3065 efi_handle_t controller_handle,
3066 efi_handle_t driver_image_handle,
3067 efi_handle_t child_handle)
3069 struct efi_driver_binding_protocol *binding_protocol;
3070 efi_handle_t *child_handle_buffer = NULL;
3071 size_t number_of_children = 0;
3073 size_t stop_count = 0;
3074 struct efi_object *efiobj;
3076 EFI_ENTRY("%p, %p, %p", controller_handle, driver_image_handle,
3079 efiobj = efi_search_obj(controller_handle);
3081 r = EFI_INVALID_PARAMETER;
3085 if (child_handle && !efi_search_obj(child_handle)) {
3086 r = EFI_INVALID_PARAMETER;
3090 /* If no driver handle is supplied, disconnect all drivers */
3091 if (!driver_image_handle) {
3092 r = efi_disconnect_all_drivers(efiobj, NULL, child_handle);
3096 /* Create list of child handles */
3098 number_of_children = 1;
3099 child_handle_buffer = &child_handle;
3101 efi_get_child_controllers(efiobj,
3102 driver_image_handle,
3103 &number_of_children,
3104 &child_handle_buffer);
3107 /* Get the driver binding protocol */
3108 r = EFI_CALL(efi_open_protocol(driver_image_handle,
3109 &efi_guid_driver_binding_protocol,
3110 (void **)&binding_protocol,
3111 driver_image_handle, NULL,
3112 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
3113 if (r != EFI_SUCCESS)
3115 /* Remove the children */
3116 if (number_of_children) {
3117 r = EFI_CALL(binding_protocol->stop(binding_protocol,
3120 child_handle_buffer));
3121 if (r == EFI_SUCCESS)
3124 /* Remove the driver */
3126 r = EFI_CALL(binding_protocol->stop(binding_protocol,
3129 if (r == EFI_SUCCESS)
3131 EFI_CALL(efi_close_protocol(driver_image_handle,
3132 &efi_guid_driver_binding_protocol,
3133 driver_image_handle, NULL));
3141 free(child_handle_buffer);
3145 static struct efi_boot_services efi_boot_services = {
3147 .signature = EFI_BOOT_SERVICES_SIGNATURE,
3148 .revision = EFI_SPECIFICATION_VERSION,
3149 .headersize = sizeof(struct efi_boot_services),
3151 .raise_tpl = efi_raise_tpl,
3152 .restore_tpl = efi_restore_tpl,
3153 .allocate_pages = efi_allocate_pages_ext,
3154 .free_pages = efi_free_pages_ext,
3155 .get_memory_map = efi_get_memory_map_ext,
3156 .allocate_pool = efi_allocate_pool_ext,
3157 .free_pool = efi_free_pool_ext,
3158 .create_event = efi_create_event_ext,
3159 .set_timer = efi_set_timer_ext,
3160 .wait_for_event = efi_wait_for_event,
3161 .signal_event = efi_signal_event_ext,
3162 .close_event = efi_close_event,
3163 .check_event = efi_check_event,
3164 .install_protocol_interface = efi_install_protocol_interface,
3165 .reinstall_protocol_interface = efi_reinstall_protocol_interface,
3166 .uninstall_protocol_interface = efi_uninstall_protocol_interface,
3167 .handle_protocol = efi_handle_protocol,
3169 .register_protocol_notify = efi_register_protocol_notify,
3170 .locate_handle = efi_locate_handle_ext,
3171 .locate_device_path = efi_locate_device_path,
3172 .install_configuration_table = efi_install_configuration_table_ext,
3173 .load_image = efi_load_image,
3174 .start_image = efi_start_image,
3176 .unload_image = efi_unload_image,
3177 .exit_boot_services = efi_exit_boot_services,
3178 .get_next_monotonic_count = efi_get_next_monotonic_count,
3180 .set_watchdog_timer = efi_set_watchdog_timer,
3181 .connect_controller = efi_connect_controller,
3182 .disconnect_controller = efi_disconnect_controller,
3183 .open_protocol = efi_open_protocol,
3184 .close_protocol = efi_close_protocol,
3185 .open_protocol_information = efi_open_protocol_information,
3186 .protocols_per_handle = efi_protocols_per_handle,
3187 .locate_handle_buffer = efi_locate_handle_buffer,
3188 .locate_protocol = efi_locate_protocol,
3189 .install_multiple_protocol_interfaces =
3190 efi_install_multiple_protocol_interfaces,
3191 .uninstall_multiple_protocol_interfaces =
3192 efi_uninstall_multiple_protocol_interfaces,
3193 .calculate_crc32 = efi_calculate_crc32,
3194 .copy_mem = efi_copy_mem,
3195 .set_mem = efi_set_mem,
3196 .create_event_ex = efi_create_event_ex,
3199 static u16 __efi_runtime_data firmware_vendor[] = L"Das U-Boot";
3201 struct efi_system_table __efi_runtime_data systab = {
3203 .signature = EFI_SYSTEM_TABLE_SIGNATURE,
3204 .revision = EFI_SPECIFICATION_VERSION,
3205 .headersize = sizeof(struct efi_system_table),
3207 .fw_vendor = firmware_vendor,
3208 .fw_revision = FW_VERSION << 16 | FW_PATCHLEVEL << 8,
3209 .con_in = (void *)&efi_con_in,
3210 .con_out = (void *)&efi_con_out,
3211 .std_err = (void *)&efi_con_out,
3212 .runtime = (void *)&efi_runtime_services,
3213 .boottime = (void *)&efi_boot_services,
3219 * efi_initialize_system_table() - Initialize system table
3221 * Return: status code
3223 efi_status_t efi_initialize_system_table(void)
3227 /* Allocate configuration table array */
3228 ret = efi_allocate_pool(EFI_RUNTIME_SERVICES_DATA,
3229 EFI_MAX_CONFIGURATION_TABLES *
3230 sizeof(struct efi_configuration_table),
3231 (void **)&systab.tables);
3233 /* Set CRC32 field in table headers */
3234 efi_update_table_header_crc32(&systab.hdr);
3235 efi_update_table_header_crc32(&efi_runtime_services.hdr);
3236 efi_update_table_header_crc32(&efi_boot_services.hdr);