Tom Rini | f739fcd | 2018-05-07 17:02:21 -0400 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0+ */ |
Alexander Graf | cb149c6 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 2 | /* |
| 3 | * EFI application loader |
| 4 | * |
| 5 | * Copyright (c) 2016 Alexander Graf |
Alexander Graf | cb149c6 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 6 | */ |
| 7 | |
Heinrich Schuchardt | cd9e18d | 2017-10-18 18:13:07 +0200 | [diff] [blame] | 8 | #ifndef _EFI_LOADER_H |
| 9 | #define _EFI_LOADER_H 1 |
| 10 | |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 11 | #include <common.h> |
Simon Glass | e6f6f9e | 2020-05-10 11:39:58 -0600 | [diff] [blame] | 12 | #include <blk.h> |
Simon Glass | f7ae49f | 2020-05-10 11:40:05 -0600 | [diff] [blame] | 13 | #include <log.h> |
Alexander Graf | cb149c6 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 14 | #include <part_efi.h> |
| 15 | #include <efi_api.h> |
AKASHI Takahiro | d9f3307 | 2020-04-21 09:38:38 +0900 | [diff] [blame] | 16 | #include <image.h> |
AKASHI Takahiro | 4540dab | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 17 | #include <pe.h> |
Simon Glass | 6e3c654 | 2021-07-02 12:36:16 -0600 | [diff] [blame] | 18 | #include <linux/list.h> |
| 19 | #include <linux/oid_registry.h> |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 20 | |
Simon Glass | e6f6f9e | 2020-05-10 11:39:58 -0600 | [diff] [blame] | 21 | struct blk_desc; |
AKASHI Takahiro | 86a3d43 | 2021-07-20 14:57:02 +0900 | [diff] [blame] | 22 | struct jmp_buf_data; |
Simon Glass | e6f6f9e | 2020-05-10 11:39:58 -0600 | [diff] [blame] | 23 | |
Simon Glass | fdeb6f7 | 2019-09-25 08:11:32 -0600 | [diff] [blame] | 24 | static inline int guidcmp(const void *g1, const void *g2) |
| 25 | { |
| 26 | return memcmp(g1, g2, sizeof(efi_guid_t)); |
| 27 | } |
| 28 | |
Sughosh Ganu | 61e42d9 | 2019-12-29 00:01:04 +0530 | [diff] [blame] | 29 | static inline void *guidcpy(void *dst, const void *src) |
| 30 | { |
| 31 | return memcpy(dst, src, sizeof(efi_guid_t)); |
| 32 | } |
| 33 | |
Stephen Warren | 9b5e639 | 2018-08-30 15:43:43 -0600 | [diff] [blame] | 34 | #if CONFIG_IS_ENABLED(EFI_LOADER) |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 35 | |
Simon Glass | 6e3c654 | 2021-07-02 12:36:16 -0600 | [diff] [blame] | 36 | /** |
| 37 | * __efi_runtime_data - declares a non-const variable for EFI runtime section |
| 38 | * |
| 39 | * This macro indicates that a variable is non-const and should go into the |
| 40 | * EFI runtime section, and thus still be available when the OS is running. |
| 41 | * |
| 42 | * Only use on variables not declared const. |
| 43 | * |
| 44 | * Example: |
| 45 | * |
| 46 | * :: |
| 47 | * |
| 48 | * static __efi_runtime_data my_computed_table[256]; |
| 49 | */ |
| 50 | #define __efi_runtime_data __section(".data.efi_runtime") |
| 51 | |
| 52 | /** |
| 53 | * __efi_runtime_rodata - declares a read-only variable for EFI runtime section |
| 54 | * |
| 55 | * This macro indicates that a variable is read-only (const) and should go into |
| 56 | * the EFI runtime section, and thus still be available when the OS is running. |
| 57 | * |
| 58 | * Only use on variables also declared const. |
| 59 | * |
| 60 | * Example: |
| 61 | * |
| 62 | * :: |
| 63 | * |
| 64 | * static const __efi_runtime_rodata my_const_table[] = { 1, 2, 3 }; |
| 65 | */ |
| 66 | #define __efi_runtime_rodata __section(".rodata.efi_runtime") |
| 67 | |
| 68 | /** |
| 69 | * __efi_runtime - declares a function for EFI runtime section |
| 70 | * |
| 71 | * This macro indicates that a function should go into the EFI runtime section, |
| 72 | * and thus still be available when the OS is running. |
| 73 | * |
| 74 | * Example: |
| 75 | * |
| 76 | * :: |
| 77 | * |
| 78 | * static __efi_runtime compute_my_table(void); |
| 79 | */ |
| 80 | #define __efi_runtime __section(".text.efi_runtime") |
| 81 | |
| 82 | /* |
| 83 | * Call this with mmio_ptr as the _pointer_ to a pointer to an MMIO region |
| 84 | * to make it available at runtime |
| 85 | */ |
| 86 | efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len); |
| 87 | |
| 88 | /* |
| 89 | * Special case handler for error/abort that just tries to dtrt to get |
| 90 | * back to u-boot world |
| 91 | */ |
| 92 | void efi_restore_gd(void); |
| 93 | /* Call this to set the current device name */ |
| 94 | void efi_set_bootdev(const char *dev, const char *devnr, const char *path, |
| 95 | void *buffer, size_t buffer_size); |
| 96 | /* Called by networking code to memorize the dhcp ack package */ |
| 97 | void efi_net_set_dhcp_ack(void *pkt, int len); |
| 98 | /* Print information about all loaded images */ |
| 99 | void efi_print_image_infos(void *pc); |
| 100 | |
| 101 | /* Hook at initialization */ |
| 102 | efi_status_t efi_launch_capsules(void); |
| 103 | |
| 104 | #else /* CONFIG_IS_ENABLED(EFI_LOADER) */ |
| 105 | |
| 106 | /* Without CONFIG_EFI_LOADER we don't have a runtime section, stub it out */ |
| 107 | #define __efi_runtime_data |
| 108 | #define __efi_runtime_rodata |
| 109 | #define __efi_runtime |
| 110 | static inline efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len) |
| 111 | { |
| 112 | return EFI_SUCCESS; |
| 113 | } |
| 114 | |
| 115 | /* No loader configured, stub out EFI_ENTRY */ |
| 116 | static inline void efi_restore_gd(void) { } |
| 117 | static inline void efi_set_bootdev(const char *dev, const char *devnr, |
| 118 | const char *path, void *buffer, |
| 119 | size_t buffer_size) { } |
| 120 | static inline void efi_net_set_dhcp_ack(void *pkt, int len) { } |
| 121 | static inline void efi_print_image_infos(void *pc) { } |
| 122 | static inline efi_status_t efi_launch_capsules(void) |
| 123 | { |
| 124 | return EFI_SUCCESS; |
| 125 | } |
| 126 | |
| 127 | #endif /* CONFIG_IS_ENABLED(EFI_LOADER) */ |
Alexander Graf | cb149c6 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 128 | |
Heinrich Schuchardt | 4182a12 | 2018-06-28 12:45:32 +0200 | [diff] [blame] | 129 | /* Maximum number of configuration tables */ |
| 130 | #define EFI_MAX_CONFIGURATION_TABLES 16 |
| 131 | |
Heinrich Schuchardt | 4e6b5d6 | 2018-09-20 21:58:23 +0200 | [diff] [blame] | 132 | /* GUID used by the root node */ |
| 133 | #define U_BOOT_GUID \ |
| 134 | EFI_GUID(0xe61d73b9, 0xa384, 0x4acc, \ |
| 135 | 0xae, 0xab, 0x82, 0xe8, 0x28, 0xf3, 0x62, 0x8b) |
AKASHI Takahiro | 23ad52f | 2019-09-12 13:52:35 +0900 | [diff] [blame] | 136 | /* GUID used as host device on sandbox */ |
| 137 | #define U_BOOT_HOST_DEV_GUID \ |
| 138 | EFI_GUID(0xbbe4e671, 0x5773, 0x4ea1, \ |
| 139 | 0x9a, 0xab, 0x3a, 0x7d, 0xbf, 0x40, 0xc4, 0x82) |
Heinrich Schuchardt | 19ecced | 2020-05-20 22:39:35 +0200 | [diff] [blame] | 140 | /* GUID used as root for virtio devices */ |
| 141 | #define U_BOOT_VIRTIO_DEV_GUID \ |
| 142 | EFI_GUID(0x63293792, 0xadf5, 0x9325, \ |
| 143 | 0xb9, 0x9f, 0x4e, 0x0e, 0x45, 0x5c, 0x1b, 0x1e) |
Heinrich Schuchardt | 4e6b5d6 | 2018-09-20 21:58:23 +0200 | [diff] [blame] | 144 | |
Heinrich Schuchardt | 7a59725 | 2019-11-28 06:46:09 +0100 | [diff] [blame] | 145 | /* Use internal device tree when starting UEFI application */ |
Heinrich Schuchardt | f64f223 | 2019-12-08 01:07:01 +0100 | [diff] [blame] | 146 | #define EFI_FDT_USE_INTERNAL NULL |
Heinrich Schuchardt | 7a59725 | 2019-11-28 06:46:09 +0100 | [diff] [blame] | 147 | |
AKASHI Takahiro | a2a4bc3 | 2019-04-16 13:24:20 +0900 | [diff] [blame] | 148 | /* Root node */ |
| 149 | extern efi_handle_t efi_root; |
| 150 | |
Heinrich Schuchardt | 15b1bf1 | 2020-03-19 18:21:58 +0000 | [diff] [blame] | 151 | /* Set to EFI_SUCCESS when initialized */ |
| 152 | extern efi_status_t efi_obj_list_initialized; |
| 153 | |
Heinrich Schuchardt | fccd3d9 | 2020-11-12 21:26:28 +0100 | [diff] [blame] | 154 | /* Flag used by the selftest to avoid detaching devices in ExitBootServices() */ |
| 155 | extern bool efi_st_keep_devices; |
| 156 | |
Heinrich Schuchardt | 11078bb | 2020-03-19 15:16:31 +0100 | [diff] [blame] | 157 | /* EFI system partition */ |
| 158 | extern struct efi_system_partition { |
| 159 | enum if_type if_type; |
| 160 | int devnum; |
| 161 | u8 part; |
| 162 | } efi_system_partition; |
| 163 | |
Rob Clark | c160d2f | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 164 | int __efi_entry_check(void); |
| 165 | int __efi_exit_check(void); |
Heinrich Schuchardt | ae0bd3a | 2017-08-18 17:45:16 +0200 | [diff] [blame] | 166 | const char *__efi_nesting(void); |
Rob Clark | af65db8 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 167 | const char *__efi_nesting_inc(void); |
| 168 | const char *__efi_nesting_dec(void); |
Rob Clark | c160d2f | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 169 | |
Rob Clark | a095aad | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 170 | /* |
| 171 | * Enter the u-boot world from UEFI: |
| 172 | */ |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 173 | #define EFI_ENTRY(format, ...) do { \ |
Rob Clark | c160d2f | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 174 | assert(__efi_entry_check()); \ |
Rob Clark | af65db8 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 175 | debug("%sEFI: Entry %s(" format ")\n", __efi_nesting_inc(), \ |
| 176 | __func__, ##__VA_ARGS__); \ |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 177 | } while(0) |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 178 | |
Rob Clark | a095aad | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 179 | /* |
| 180 | * Exit the u-boot world back to UEFI: |
| 181 | */ |
Rob Clark | 804b1d7 | 2017-07-24 10:31:52 -0400 | [diff] [blame] | 182 | #define EFI_EXIT(ret) ({ \ |
xypron.glpk@gmx.de | c81883d | 2017-08-17 18:57:36 +0200 | [diff] [blame] | 183 | typeof(ret) _r = ret; \ |
Rob Clark | af65db8 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 184 | debug("%sEFI: Exit: %s: %u\n", __efi_nesting_dec(), \ |
xypron.glpk@gmx.de | c81883d | 2017-08-17 18:57:36 +0200 | [diff] [blame] | 185 | __func__, (u32)((uintptr_t) _r & ~EFI_ERROR_MASK)); \ |
Rob Clark | c160d2f | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 186 | assert(__efi_exit_check()); \ |
| 187 | _r; \ |
Rob Clark | 804b1d7 | 2017-07-24 10:31:52 -0400 | [diff] [blame] | 188 | }) |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 189 | |
Rob Clark | a095aad | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 190 | /* |
Heinrich Schuchardt | ea630ce | 2017-09-15 10:06:10 +0200 | [diff] [blame] | 191 | * Call non-void UEFI function from u-boot and retrieve return value: |
Rob Clark | a095aad | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 192 | */ |
Heinrich Schuchardt | ea630ce | 2017-09-15 10:06:10 +0200 | [diff] [blame] | 193 | #define EFI_CALL(exp) ({ \ |
| 194 | debug("%sEFI: Call: %s\n", __efi_nesting_inc(), #exp); \ |
| 195 | assert(__efi_exit_check()); \ |
| 196 | typeof(exp) _r = exp; \ |
| 197 | assert(__efi_entry_check()); \ |
| 198 | debug("%sEFI: %lu returned by %s\n", __efi_nesting_dec(), \ |
| 199 | (unsigned long)((uintptr_t)_r & ~EFI_ERROR_MASK), #exp); \ |
| 200 | _r; \ |
| 201 | }) |
| 202 | |
| 203 | /* |
| 204 | * Call void UEFI function from u-boot: |
| 205 | */ |
| 206 | #define EFI_CALL_VOID(exp) do { \ |
Rob Clark | af65db8 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 207 | debug("%sEFI: Call: %s\n", __efi_nesting_inc(), #exp); \ |
Rob Clark | c160d2f | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 208 | assert(__efi_exit_check()); \ |
Rob Clark | a095aad | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 209 | exp; \ |
Rob Clark | c160d2f | 2017-07-27 08:04:18 -0400 | [diff] [blame] | 210 | assert(__efi_entry_check()); \ |
Rob Clark | af65db8 | 2017-07-27 08:04:19 -0400 | [diff] [blame] | 211 | debug("%sEFI: Return From: %s\n", __efi_nesting_dec(), #exp); \ |
Rob Clark | a095aad | 2017-07-27 08:04:17 -0400 | [diff] [blame] | 212 | } while(0) |
| 213 | |
Heinrich Schuchardt | ae0bd3a | 2017-08-18 17:45:16 +0200 | [diff] [blame] | 214 | /* |
Heinrich Schuchardt | d550414 | 2018-01-11 08:16:01 +0100 | [diff] [blame] | 215 | * Write an indented message with EFI prefix |
Heinrich Schuchardt | ae0bd3a | 2017-08-18 17:45:16 +0200 | [diff] [blame] | 216 | */ |
Heinrich Schuchardt | d550414 | 2018-01-11 08:16:01 +0100 | [diff] [blame] | 217 | #define EFI_PRINT(format, ...) ({ \ |
| 218 | debug("%sEFI: " format, __efi_nesting(), \ |
| 219 | ##__VA_ARGS__); \ |
Heinrich Schuchardt | ae0bd3a | 2017-08-18 17:45:16 +0200 | [diff] [blame] | 220 | }) |
| 221 | |
Alexander Graf | 89aea43 | 2018-04-23 07:59:47 +0200 | [diff] [blame] | 222 | #ifdef CONFIG_SYS_CACHELINE_SIZE |
| 223 | #define EFI_CACHELINE_SIZE CONFIG_SYS_CACHELINE_SIZE |
| 224 | #else |
| 225 | /* Just use the greatest cache flush alignment requirement I'm aware of */ |
| 226 | #define EFI_CACHELINE_SIZE 128 |
| 227 | #endif |
| 228 | |
Heinrich Schuchardt | 1fcb7ea | 2018-07-02 12:53:55 +0200 | [diff] [blame] | 229 | /* Key identifying current memory map */ |
| 230 | extern efi_uintn_t efi_memory_map_key; |
| 231 | |
Alexander Graf | 50149ea | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 232 | extern struct efi_runtime_services efi_runtime_services; |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 233 | extern struct efi_system_table systab; |
| 234 | |
Heinrich Schuchardt | ebb4dd5 | 2017-10-26 19:25:59 +0200 | [diff] [blame] | 235 | extern struct efi_simple_text_output_protocol efi_con_out; |
Heinrich Schuchardt | 3e603ec | 2018-09-08 10:20:10 +0200 | [diff] [blame] | 236 | extern struct efi_simple_text_input_protocol efi_con_in; |
Heinrich Schuchardt | ebb4dd5 | 2017-10-26 19:25:59 +0200 | [diff] [blame] | 237 | extern struct efi_console_control_protocol efi_console_control; |
xypron.glpk@gmx.de | cc5b708 | 2017-07-11 22:06:25 +0200 | [diff] [blame] | 238 | extern const struct efi_device_path_to_text_protocol efi_device_path_to_text; |
Leif Lindholm | e70f8df | 2018-03-09 17:43:21 +0100 | [diff] [blame] | 239 | /* implementation of the EFI_DEVICE_PATH_UTILITIES_PROTOCOL */ |
| 240 | extern const struct efi_device_path_utilities_protocol |
| 241 | efi_device_path_utilities; |
Heinrich Schuchardt | b1b782d | 2019-05-16 18:19:00 +0200 | [diff] [blame] | 242 | /* current version of the EFI_UNICODE_COLLATION_PROTOCOL */ |
Heinrich Schuchardt | 0bc4b0d | 2018-09-04 19:34:58 +0200 | [diff] [blame] | 243 | extern const struct efi_unicode_collation_protocol |
Heinrich Schuchardt | 95ab381 | 2019-05-16 07:52:58 +0200 | [diff] [blame] | 244 | efi_unicode_collation_protocol2; |
AKASHI Takahiro | cb728e5 | 2019-01-21 12:13:00 +0900 | [diff] [blame] | 245 | extern const struct efi_hii_config_routing_protocol efi_hii_config_routing; |
| 246 | extern const struct efi_hii_config_access_protocol efi_hii_config_access; |
Leif Lindholm | c9bfb22 | 2019-01-21 12:12:57 +0900 | [diff] [blame] | 247 | extern const struct efi_hii_database_protocol efi_hii_database; |
| 248 | extern const struct efi_hii_string_protocol efi_hii_string; |
Alexander Graf | c1311ad | 2016-03-04 01:10:00 +0100 | [diff] [blame] | 249 | |
Rob Clark | adae431 | 2017-09-13 18:05:30 -0400 | [diff] [blame] | 250 | uint16_t *efi_dp_str(struct efi_device_path *dp); |
| 251 | |
Heinrich Schuchardt | 4e6b5d6 | 2018-09-20 21:58:23 +0200 | [diff] [blame] | 252 | /* GUID of the U-Boot root node */ |
| 253 | extern const efi_guid_t efi_u_boot_guid; |
AKASHI Takahiro | 23ad52f | 2019-09-12 13:52:35 +0900 | [diff] [blame] | 254 | #ifdef CONFIG_SANDBOX |
| 255 | /* GUID of U-Boot host device on sandbox */ |
| 256 | extern const efi_guid_t efi_guid_host_dev; |
| 257 | #endif |
Heinrich Schuchardt | b3dd14b | 2018-01-19 20:24:45 +0100 | [diff] [blame] | 258 | /* GUID of the EFI_BLOCK_IO_PROTOCOL */ |
| 259 | extern const efi_guid_t efi_block_io_guid; |
Rob Clark | 9975fe9 | 2017-09-13 18:05:38 -0400 | [diff] [blame] | 260 | extern const efi_guid_t efi_global_variable_guid; |
Alexander Graf | c1311ad | 2016-03-04 01:10:00 +0100 | [diff] [blame] | 261 | extern const efi_guid_t efi_guid_console_control; |
Alexander Graf | cb149c6 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 262 | extern const efi_guid_t efi_guid_device_path; |
Heinrich Schuchardt | f0959db | 2018-01-11 08:16:02 +0100 | [diff] [blame] | 263 | /* GUID of the EFI_DRIVER_BINDING_PROTOCOL */ |
| 264 | extern const efi_guid_t efi_guid_driver_binding_protocol; |
Heinrich Schuchardt | a3a28f5 | 2018-02-18 15:17:51 +0100 | [diff] [blame] | 265 | /* event group ExitBootServices() invoked */ |
| 266 | extern const efi_guid_t efi_guid_event_group_exit_boot_services; |
| 267 | /* event group SetVirtualAddressMap() invoked */ |
| 268 | extern const efi_guid_t efi_guid_event_group_virtual_address_change; |
| 269 | /* event group memory map changed */ |
| 270 | extern const efi_guid_t efi_guid_event_group_memory_map_change; |
| 271 | /* event group boot manager about to boot */ |
| 272 | extern const efi_guid_t efi_guid_event_group_ready_to_boot; |
| 273 | /* event group ResetSystem() invoked (before ExitBootServices) */ |
| 274 | extern const efi_guid_t efi_guid_event_group_reset_system; |
Heinrich Schuchardt | bc4f913 | 2018-03-03 15:29:03 +0100 | [diff] [blame] | 275 | /* GUID of the device tree table */ |
| 276 | extern const efi_guid_t efi_guid_fdt; |
Alexander Graf | cb149c6 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 277 | extern const efi_guid_t efi_guid_loaded_image; |
AKASHI Takahiro | bc8fc32 | 2019-03-27 13:40:32 +0900 | [diff] [blame] | 278 | extern const efi_guid_t efi_guid_loaded_image_device_path; |
xypron.glpk@gmx.de | cc5b708 | 2017-07-11 22:06:25 +0200 | [diff] [blame] | 279 | extern const efi_guid_t efi_guid_device_path_to_text_protocol; |
Rob Clark | 2a92080 | 2017-09-13 18:05:34 -0400 | [diff] [blame] | 280 | extern const efi_guid_t efi_simple_file_system_protocol_guid; |
| 281 | extern const efi_guid_t efi_file_info_guid; |
Heinrich Schuchardt | 9e6835e | 2018-04-04 15:42:11 +0200 | [diff] [blame] | 282 | /* GUID for file system information */ |
| 283 | extern const efi_guid_t efi_file_system_info_guid; |
Leif Lindholm | e70f8df | 2018-03-09 17:43:21 +0100 | [diff] [blame] | 284 | extern const efi_guid_t efi_guid_device_path_utilities_protocol; |
Heinrich Schuchardt | b1b782d | 2019-05-16 18:19:00 +0200 | [diff] [blame] | 285 | /* GUID of the deprecated Unicode collation protocol */ |
| 286 | extern const efi_guid_t efi_guid_unicode_collation_protocol; |
Heinrich Schuchardt | b6f1109 | 2020-12-04 03:33:41 +0100 | [diff] [blame] | 287 | /* GUIDs of the Load File and Load File2 protocol */ |
| 288 | extern const efi_guid_t efi_guid_load_file_protocol; |
| 289 | extern const efi_guid_t efi_guid_load_file2_protocol; |
Heinrich Schuchardt | 0bc4b0d | 2018-09-04 19:34:58 +0200 | [diff] [blame] | 290 | /* GUID of the Unicode collation protocol */ |
Heinrich Schuchardt | 95ab381 | 2019-05-16 07:52:58 +0200 | [diff] [blame] | 291 | extern const efi_guid_t efi_guid_unicode_collation_protocol2; |
AKASHI Takahiro | cb728e5 | 2019-01-21 12:13:00 +0900 | [diff] [blame] | 292 | extern const efi_guid_t efi_guid_hii_config_routing_protocol; |
| 293 | extern const efi_guid_t efi_guid_hii_config_access_protocol; |
Leif Lindholm | c9bfb22 | 2019-01-21 12:12:57 +0900 | [diff] [blame] | 294 | extern const efi_guid_t efi_guid_hii_database_protocol; |
| 295 | extern const efi_guid_t efi_guid_hii_string_protocol; |
AKASHI Takahiro | 593e17d | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 296 | /* GUIDs for authentication */ |
| 297 | extern const efi_guid_t efi_guid_image_security_database; |
| 298 | extern const efi_guid_t efi_guid_sha256; |
| 299 | extern const efi_guid_t efi_guid_cert_x509; |
| 300 | extern const efi_guid_t efi_guid_cert_x509_sha256; |
AKASHI Takahiro | 767f6ee | 2020-04-14 11:51:41 +0900 | [diff] [blame] | 301 | extern const efi_guid_t efi_guid_cert_type_pkcs7; |
Alexander Graf | cb149c6 | 2016-03-04 01:09:58 +0100 | [diff] [blame] | 302 | |
Sughosh Ganu | 33c37d9 | 2019-12-29 00:01:06 +0530 | [diff] [blame] | 303 | /* GUID of RNG protocol */ |
| 304 | extern const efi_guid_t efi_guid_rng_protocol; |
AKASHI Takahiro | 2bc27ca | 2020-11-17 09:27:55 +0900 | [diff] [blame] | 305 | /* GUID of capsule update result */ |
| 306 | extern const efi_guid_t efi_guid_capsule_report; |
AKASHI Takahiro | 8d99026 | 2020-11-30 18:12:11 +0900 | [diff] [blame] | 307 | /* GUID of firmware management protocol */ |
| 308 | extern const efi_guid_t efi_guid_firmware_management_protocol; |
Jose Marinho | 64a8aae | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 309 | /* GUID for the ESRT */ |
| 310 | extern const efi_guid_t efi_esrt_guid; |
Sughosh Ganu | 33c37d9 | 2019-12-29 00:01:06 +0530 | [diff] [blame] | 311 | |
Marek Behún | 2bdc6f5 | 2021-05-20 13:23:56 +0200 | [diff] [blame] | 312 | extern char __efi_runtime_start[], __efi_runtime_stop[]; |
| 313 | extern char __efi_runtime_rel_start[], __efi_runtime_rel_stop[]; |
Alexander Graf | 50149ea | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 314 | |
Heinrich Schuchardt | 1f1075c | 2019-05-21 17:51:35 +0200 | [diff] [blame] | 315 | /** |
| 316 | * struct efi_open_protocol_info_item - open protocol info item |
| 317 | * |
Heinrich Schuchardt | fe1599d | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 318 | * When a protocol is opened a open protocol info entry is created. |
| 319 | * These are maintained in a list. |
Heinrich Schuchardt | 1f1075c | 2019-05-21 17:51:35 +0200 | [diff] [blame] | 320 | * |
| 321 | * @link: link to the list of open protocol info entries of a protocol |
| 322 | * @info: information about the opening of a protocol |
Heinrich Schuchardt | fe1599d | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 323 | */ |
| 324 | struct efi_open_protocol_info_item { |
Heinrich Schuchardt | fe1599d | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 325 | struct list_head link; |
| 326 | struct efi_open_protocol_info_entry info; |
| 327 | }; |
| 328 | |
Heinrich Schuchardt | 1f1075c | 2019-05-21 17:51:35 +0200 | [diff] [blame] | 329 | /** |
| 330 | * struct efi_handler - single protocol interface of a handle |
| 331 | * |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 332 | * When the UEFI payload wants to open a protocol on an object to get its |
| 333 | * interface (usually a struct with callback functions), this struct maps the |
Heinrich Schuchardt | fe1599d | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 334 | * protocol GUID to the respective protocol interface |
Heinrich Schuchardt | 1f1075c | 2019-05-21 17:51:35 +0200 | [diff] [blame] | 335 | * |
| 336 | * @link: link to the list of protocols of a handle |
| 337 | * @guid: GUID of the protocol |
| 338 | * @protocol_interface: protocol interface |
Heinrich Schuchardt | c6f077a | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 339 | * @open_infos: link to the list of open protocol info items |
Heinrich Schuchardt | fe1599d | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 340 | */ |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 341 | struct efi_handler { |
Heinrich Schuchardt | 69fb6b1 | 2017-11-26 14:05:17 +0100 | [diff] [blame] | 342 | struct list_head link; |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 343 | const efi_guid_t *guid; |
xypron.glpk@gmx.de | b5349f7 | 2017-07-11 22:06:14 +0200 | [diff] [blame] | 344 | void *protocol_interface; |
Heinrich Schuchardt | fe1599d | 2018-01-11 08:15:57 +0100 | [diff] [blame] | 345 | struct list_head open_infos; |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 346 | }; |
| 347 | |
Heinrich Schuchardt | fae0118 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 348 | /** |
Heinrich Schuchardt | cd73aba | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 349 | * enum efi_object_type - type of EFI object |
| 350 | * |
| 351 | * In UnloadImage we must be able to identify if the handle relates to a |
| 352 | * started image. |
| 353 | */ |
| 354 | enum efi_object_type { |
Heinrich Schuchardt | c6f077a | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 355 | /** @EFI_OBJECT_TYPE_UNDEFINED: undefined image type */ |
Heinrich Schuchardt | cd73aba | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 356 | EFI_OBJECT_TYPE_UNDEFINED = 0, |
Heinrich Schuchardt | c6f077a | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 357 | /** @EFI_OBJECT_TYPE_U_BOOT_FIRMWARE: U-Boot firmware */ |
Heinrich Schuchardt | 84a918e | 2019-05-05 16:55:06 +0200 | [diff] [blame] | 358 | EFI_OBJECT_TYPE_U_BOOT_FIRMWARE, |
Heinrich Schuchardt | c6f077a | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 359 | /** @EFI_OBJECT_TYPE_LOADED_IMAGE: loaded image (not started) */ |
Heinrich Schuchardt | cd73aba | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 360 | EFI_OBJECT_TYPE_LOADED_IMAGE, |
Heinrich Schuchardt | c6f077a | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 361 | /** @EFI_OBJECT_TYPE_STARTED_IMAGE: started image */ |
Heinrich Schuchardt | cd73aba | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 362 | EFI_OBJECT_TYPE_STARTED_IMAGE, |
| 363 | }; |
| 364 | |
| 365 | /** |
Heinrich Schuchardt | fae0118 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 366 | * struct efi_object - dereferenced EFI handle |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 367 | * |
Heinrich Schuchardt | fae0118 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 368 | * @link: pointers to put the handle into a linked list |
| 369 | * @protocols: linked list with the protocol interfaces installed on this |
| 370 | * handle |
Heinrich Schuchardt | c6f077a | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 371 | * @type: image type if the handle relates to an image |
Heinrich Schuchardt | fae0118 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 372 | * |
| 373 | * UEFI offers a flexible and expandable object model. The objects in the UEFI |
| 374 | * API are devices, drivers, and loaded images. struct efi_object is our storage |
| 375 | * structure for these objects. |
| 376 | * |
| 377 | * When including this structure into a larger structure always put it first so |
| 378 | * that when deleting a handle the whole encompassing structure can be freed. |
| 379 | * |
| 380 | * A pointer to this structure is referred to as a handle. Typedef efi_handle_t |
| 381 | * has been created for such pointers. |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 382 | */ |
| 383 | struct efi_object { |
| 384 | /* Every UEFI object is part of a global object list */ |
| 385 | struct list_head link; |
Heinrich Schuchardt | 69fb6b1 | 2017-11-26 14:05:17 +0100 | [diff] [blame] | 386 | /* The list of protocols */ |
| 387 | struct list_head protocols; |
Heinrich Schuchardt | cd73aba | 2019-05-01 14:20:18 +0200 | [diff] [blame] | 388 | enum efi_object_type type; |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 389 | }; |
| 390 | |
AKASHI Takahiro | 4540dab | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 391 | enum efi_image_auth_status { |
| 392 | EFI_IMAGE_AUTH_FAILED = 0, |
| 393 | EFI_IMAGE_AUTH_PASSED, |
| 394 | }; |
| 395 | |
xypron.glpk@gmx.de | c684159 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 396 | /** |
Heinrich Schuchardt | c982874 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 397 | * struct efi_loaded_image_obj - handle of a loaded image |
Heinrich Schuchardt | d39646a | 2018-09-26 05:27:56 +0200 | [diff] [blame] | 398 | * |
| 399 | * @header: EFI object header |
Heinrich Schuchardt | 556d8dc | 2019-04-30 17:57:30 +0200 | [diff] [blame] | 400 | * @exit_status: exit status passed to Exit() |
| 401 | * @exit_data_size: exit data size passed to Exit() |
| 402 | * @exit_data: exit data passed to Exit() |
Heinrich Schuchardt | 0ce3fb5 | 2020-12-28 22:42:51 +0100 | [diff] [blame] | 403 | * @exit_jmp: long jump buffer for returning from started image |
Heinrich Schuchardt | d39646a | 2018-09-26 05:27:56 +0200 | [diff] [blame] | 404 | * @entry: entry address of the relocated image |
Heinrich Schuchardt | 0ce3fb5 | 2020-12-28 22:42:51 +0100 | [diff] [blame] | 405 | * @image_type: indicates if the image is an applicition or a driver |
| 406 | * @auth_status: indicates if the image is authenticated |
Heinrich Schuchardt | c982874 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 407 | */ |
| 408 | struct efi_loaded_image_obj { |
Heinrich Schuchardt | d39646a | 2018-09-26 05:27:56 +0200 | [diff] [blame] | 409 | struct efi_object header; |
Heinrich Schuchardt | f8212f0 | 2020-12-28 23:24:40 +0100 | [diff] [blame] | 410 | efi_status_t *exit_status; |
Heinrich Schuchardt | 556d8dc | 2019-04-30 17:57:30 +0200 | [diff] [blame] | 411 | efi_uintn_t *exit_data_size; |
| 412 | u16 **exit_data; |
Heinrich Schuchardt | f8212f0 | 2020-12-28 23:24:40 +0100 | [diff] [blame] | 413 | struct jmp_buf_data *exit_jmp; |
Heinrich Schuchardt | c982874 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 414 | EFIAPI efi_status_t (*entry)(efi_handle_t image_handle, |
| 415 | struct efi_system_table *st); |
Heinrich Schuchardt | 126a43f | 2019-05-01 20:07:04 +0200 | [diff] [blame] | 416 | u16 image_type; |
AKASHI Takahiro | 4540dab | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 417 | enum efi_image_auth_status auth_status; |
Heinrich Schuchardt | c982874 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 418 | }; |
| 419 | |
| 420 | /** |
xypron.glpk@gmx.de | c684159 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 421 | * struct efi_event |
| 422 | * |
Heinrich Schuchardt | 43bce44 | 2018-02-18 15:17:50 +0100 | [diff] [blame] | 423 | * @link: Link to list of all events |
Heinrich Schuchardt | 7a69e97 | 2019-06-05 21:00:39 +0200 | [diff] [blame] | 424 | * @queue_link: Link to the list of queued events |
xypron.glpk@gmx.de | c684159 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 425 | * @type: Type of event, see efi_create_event |
| 426 | * @notify_tpl: Task priority level of notifications |
Heinrich Schuchardt | c6f077a | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 427 | * @notify_function: Function to call when the event is triggered |
xypron.glpk@gmx.de | c684159 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 428 | * @notify_context: Data to be passed to the notify function |
Heinrich Schuchardt | b095f3c | 2018-02-18 15:17:52 +0100 | [diff] [blame] | 429 | * @group: Event group |
Heinrich Schuchardt | 43bce44 | 2018-02-18 15:17:50 +0100 | [diff] [blame] | 430 | * @trigger_time: Period of the timer |
| 431 | * @trigger_next: Next time to trigger the timer |
xypron.glpk@gmx.de | c684159 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 432 | * @trigger_type: Type of timer, see efi_set_timer |
Heinrich Schuchardt | 43bce44 | 2018-02-18 15:17:50 +0100 | [diff] [blame] | 433 | * @is_signaled: The event occurred. The event is in the signaled state. |
xypron.glpk@gmx.de | c684159 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 434 | */ |
| 435 | struct efi_event { |
Heinrich Schuchardt | 43bce44 | 2018-02-18 15:17:50 +0100 | [diff] [blame] | 436 | struct list_head link; |
Heinrich Schuchardt | 7a69e97 | 2019-06-05 21:00:39 +0200 | [diff] [blame] | 437 | struct list_head queue_link; |
xypron.glpk@gmx.de | b521d29 | 2017-07-19 19:22:34 +0200 | [diff] [blame] | 438 | uint32_t type; |
Heinrich Schuchardt | 152cade | 2017-11-06 21:17:47 +0100 | [diff] [blame] | 439 | efi_uintn_t notify_tpl; |
xypron.glpk@gmx.de | c684159 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 440 | void (EFIAPI *notify_function)(struct efi_event *event, void *context); |
| 441 | void *notify_context; |
Heinrich Schuchardt | b095f3c | 2018-02-18 15:17:52 +0100 | [diff] [blame] | 442 | const efi_guid_t *group; |
xypron.glpk@gmx.de | c684159 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 443 | u64 trigger_next; |
| 444 | u64 trigger_time; |
xypron.glpk@gmx.de | b521d29 | 2017-07-19 19:22:34 +0200 | [diff] [blame] | 445 | enum efi_timer_delay trigger_type; |
Heinrich Schuchardt | e190e89 | 2017-10-04 15:03:24 +0200 | [diff] [blame] | 446 | bool is_signaled; |
xypron.glpk@gmx.de | c684159 | 2017-07-18 20:17:18 +0200 | [diff] [blame] | 447 | }; |
| 448 | |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 449 | /* This list contains all UEFI objects we know of */ |
| 450 | extern struct list_head efi_obj_list; |
Heinrich Schuchardt | b095f3c | 2018-02-18 15:17:52 +0100 | [diff] [blame] | 451 | /* List of all events */ |
| 452 | extern struct list_head efi_events; |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 453 | |
Heinrich Schuchardt | ab15d41 | 2019-05-04 17:27:54 +0200 | [diff] [blame] | 454 | /** |
Heinrich Schuchardt | f09cea3 | 2019-05-21 18:19:01 +0200 | [diff] [blame] | 455 | * struct efi_protocol_notification - handle for notified protocol |
| 456 | * |
| 457 | * When a protocol interface is installed for which an event was registered with |
| 458 | * the RegisterProtocolNotify() service this structure is used to hold the |
| 459 | * handle on which the protocol interface was installed. |
| 460 | * |
| 461 | * @link: link to list of all handles notified for this event |
| 462 | * @handle: handle on which the notified protocol interface was installed |
| 463 | */ |
| 464 | struct efi_protocol_notification { |
| 465 | struct list_head link; |
| 466 | efi_handle_t handle; |
| 467 | }; |
| 468 | |
| 469 | /** |
Heinrich Schuchardt | c6f077a | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 470 | * struct efi_register_notify_event - event registered by |
| 471 | * RegisterProtocolNotify() |
Heinrich Schuchardt | ab15d41 | 2019-05-04 17:27:54 +0200 | [diff] [blame] | 472 | * |
| 473 | * The address of this structure serves as registration value. |
| 474 | * |
Heinrich Schuchardt | f09cea3 | 2019-05-21 18:19:01 +0200 | [diff] [blame] | 475 | * @link: link to list of all registered events |
| 476 | * @event: registered event. The same event may registered for multiple |
| 477 | * GUIDs. |
| 478 | * @protocol: protocol for which the event is registered |
| 479 | * @handles: linked list of all handles on which the notified protocol was |
| 480 | * installed |
Heinrich Schuchardt | ab15d41 | 2019-05-04 17:27:54 +0200 | [diff] [blame] | 481 | */ |
| 482 | struct efi_register_notify_event { |
| 483 | struct list_head link; |
| 484 | struct efi_event *event; |
| 485 | efi_guid_t protocol; |
Heinrich Schuchardt | f09cea3 | 2019-05-21 18:19:01 +0200 | [diff] [blame] | 486 | struct list_head handles; |
Heinrich Schuchardt | ab15d41 | 2019-05-04 17:27:54 +0200 | [diff] [blame] | 487 | }; |
| 488 | |
| 489 | /* List of all events registered by RegisterProtocolNotify() */ |
| 490 | extern struct list_head efi_register_notify_events; |
| 491 | |
AKASHI Takahiro | 056b45b | 2018-12-30 15:16:55 +0100 | [diff] [blame] | 492 | /* Initialize efi execution environment */ |
| 493 | efi_status_t efi_init_obj_list(void); |
Heinrich Schuchardt | f64f223 | 2019-12-08 01:07:01 +0100 | [diff] [blame] | 494 | /* Install device tree */ |
| 495 | efi_status_t efi_install_fdt(void *fdt); |
Heinrich Schuchardt | f9ceb6a | 2019-12-07 20:51:06 +0100 | [diff] [blame] | 496 | /* Run loaded UEFI image */ |
| 497 | efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size); |
Heinrich Schuchardt | 8819209 | 2019-06-20 13:52:16 +0200 | [diff] [blame] | 498 | /* Initialize variable services */ |
| 499 | efi_status_t efi_init_variables(void); |
Heinrich Schuchardt | 29018ab | 2019-06-20 15:25:48 +0200 | [diff] [blame] | 500 | /* Notify ExitBootServices() is called */ |
| 501 | void efi_variables_boot_exit_notify(void); |
Masahisa Kojima | fdff03e | 2021-08-13 16:12:41 +0900 | [diff] [blame] | 502 | efi_status_t efi_tcg2_notify_exit_boot_services_failed(void); |
Masahisa Kojima | 8fc4e0b | 2021-08-13 16:12:40 +0900 | [diff] [blame] | 503 | /* Measure efi application invocation */ |
| 504 | efi_status_t efi_tcg2_measure_efi_app_invocation(void); |
| 505 | /* Measure efi application exit */ |
| 506 | efi_status_t efi_tcg2_measure_efi_app_exit(void); |
Heinrich Schuchardt | 4e6b5d6 | 2018-09-20 21:58:23 +0200 | [diff] [blame] | 507 | /* Called by bootefi to initialize root node */ |
| 508 | efi_status_t efi_root_node_register(void); |
Heinrich Schuchardt | 640adad | 2018-06-28 12:45:31 +0200 | [diff] [blame] | 509 | /* Called by bootefi to initialize runtime */ |
| 510 | efi_status_t efi_initialize_system_table(void); |
Heinrich Schuchardt | 7f95104 | 2019-07-05 17:42:16 +0200 | [diff] [blame] | 511 | /* efi_runtime_detach() - detach unimplemented runtime functions */ |
| 512 | void efi_runtime_detach(void); |
Heinrich Schuchardt | a44d2a2 | 2020-03-24 18:05:22 +0100 | [diff] [blame] | 513 | /* efi_convert_pointer() - convert pointer to virtual address */ |
| 514 | efi_status_t EFIAPI efi_convert_pointer(efi_uintn_t debug_disposition, |
| 515 | void **address); |
Heinrich Schuchardt | 94686f6 | 2020-12-13 10:30:24 +0100 | [diff] [blame] | 516 | /* Carve out DT reserved memory ranges */ |
| 517 | void efi_carve_out_dt_rsv(void *fdt); |
xypron.glpk@gmx.de | 91be9a7 | 2017-07-18 20:17:22 +0200 | [diff] [blame] | 518 | /* Called by bootefi to make console interface available */ |
Heinrich Schuchardt | 6f566c2 | 2018-10-02 06:08:26 +0200 | [diff] [blame] | 519 | efi_status_t efi_console_register(void); |
Alexander Graf | 2a22d05 | 2016-03-04 01:10:02 +0100 | [diff] [blame] | 520 | /* Called by bootefi to make all disk storage accessible as EFI objects */ |
Heinrich Schuchardt | df9cf56 | 2018-02-09 20:55:47 +0100 | [diff] [blame] | 521 | efi_status_t efi_disk_register(void); |
Heinrich Schuchardt | b59c13d | 2020-09-25 12:50:19 +0200 | [diff] [blame] | 522 | /* Called by efi_init_obj_list() to install EFI_RNG_PROTOCOL */ |
| 523 | efi_status_t efi_rng_register(void); |
Ilias Apalodimas | c1c0210 | 2020-11-11 11:18:11 +0200 | [diff] [blame] | 524 | /* Called by efi_init_obj_list() to install EFI_TCG2_PROTOCOL */ |
| 525 | efi_status_t efi_tcg2_register(void); |
Masahisa Kojima | 163a0d7 | 2021-05-26 12:09:58 +0900 | [diff] [blame] | 526 | /* measure the pe-coff image, extend PCR and add Event Log */ |
| 527 | efi_status_t tcg2_measure_pe_image(void *efi, u64 efi_size, |
| 528 | struct efi_loaded_image_obj *handle, |
| 529 | struct efi_loaded_image *loaded_image_info); |
Heinrich Schuchardt | 64e4db0 | 2018-01-19 20:24:47 +0100 | [diff] [blame] | 530 | /* Create handles and protocols for the partitions of a block device */ |
| 531 | int efi_disk_create_partitions(efi_handle_t parent, struct blk_desc *desc, |
| 532 | const char *if_typename, int diskid, |
| 533 | const char *pdevname); |
AKASHI Takahiro | 41fd506 | 2020-04-27 18:48:20 +0900 | [diff] [blame] | 534 | /* Check if it is EFI system partition */ |
| 535 | bool efi_disk_is_system_part(efi_handle_t handle); |
Alexander Graf | be8d324 | 2016-03-15 18:38:21 +0100 | [diff] [blame] | 536 | /* Called by bootefi to make GOP (graphical) interface available */ |
Heinrich Schuchardt | 80ea9b0 | 2018-03-03 15:28:55 +0100 | [diff] [blame] | 537 | efi_status_t efi_gop_register(void); |
Alexander Graf | 0efe1bc | 2016-05-06 21:01:01 +0200 | [diff] [blame] | 538 | /* Called by bootefi to make the network interface available */ |
Heinrich Schuchardt | 075d425 | 2018-03-03 15:28:56 +0100 | [diff] [blame] | 539 | efi_status_t efi_net_register(void); |
Heinrich Schuchardt | b3d6090 | 2017-10-18 18:13:04 +0200 | [diff] [blame] | 540 | /* Called by bootefi to make the watchdog available */ |
Heinrich Schuchardt | d7b181d | 2018-03-03 15:28:57 +0100 | [diff] [blame] | 541 | efi_status_t efi_watchdog_register(void); |
Ilias Apalodimas | ec80b47 | 2020-02-21 09:55:45 +0200 | [diff] [blame] | 542 | efi_status_t efi_initrd_register(void); |
Ilias Apalodimas | 53f6a5a | 2021-03-17 21:55:00 +0200 | [diff] [blame] | 543 | void efi_initrd_deregister(void); |
Alexander Graf | e663b35 | 2016-08-19 01:23:29 +0200 | [diff] [blame] | 544 | /* Called by bootefi to make SMBIOS tables available */ |
Simon Glass | 0864c56 | 2018-05-16 09:42:19 -0600 | [diff] [blame] | 545 | /** |
Bin Meng | 86df34d | 2018-06-27 20:38:03 -0700 | [diff] [blame] | 546 | * efi_acpi_register() - write out ACPI tables |
| 547 | * |
| 548 | * Called by bootefi to make ACPI tables available |
| 549 | * |
| 550 | * @return 0 if OK, -ENOMEM if no memory is available for the tables |
| 551 | */ |
| 552 | efi_status_t efi_acpi_register(void); |
| 553 | /** |
Simon Glass | 0864c56 | 2018-05-16 09:42:19 -0600 | [diff] [blame] | 554 | * efi_smbios_register() - write out SMBIOS tables |
| 555 | * |
| 556 | * Called by bootefi to make SMBIOS tables available |
| 557 | * |
| 558 | * @return 0 if OK, -ENOMEM if no memory is available for the tables |
| 559 | */ |
Heinrich Schuchardt | 7657152 | 2018-03-03 15:28:54 +0100 | [diff] [blame] | 560 | efi_status_t efi_smbios_register(void); |
Alexander Graf | 0efe1bc | 2016-05-06 21:01:01 +0200 | [diff] [blame] | 561 | |
Rob Clark | 2a92080 | 2017-09-13 18:05:34 -0400 | [diff] [blame] | 562 | struct efi_simple_file_system_protocol * |
| 563 | efi_fs_from_path(struct efi_device_path *fp); |
| 564 | |
Heinrich Schuchardt | b3d6090 | 2017-10-18 18:13:04 +0200 | [diff] [blame] | 565 | /* Called by efi_set_watchdog_timer to reset the timer */ |
| 566 | efi_status_t efi_set_watchdog(unsigned long timeout); |
Alexander Graf | 0efe1bc | 2016-05-06 21:01:01 +0200 | [diff] [blame] | 567 | |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 568 | /* Called from places to check whether a timer expired */ |
| 569 | void efi_timer_check(void); |
Heinrich Schuchardt | 5dad05a | 2021-01-12 12:40:32 +0100 | [diff] [blame] | 570 | /* Check if a buffer contains a PE-COFF image */ |
| 571 | efi_status_t efi_check_pe(void *buffer, size_t size, void **nt_header); |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 572 | /* PE loader implementation */ |
AKASHI Takahiro | 4540dab | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 573 | efi_status_t efi_load_pe(struct efi_loaded_image_obj *handle, |
| 574 | void *efi, size_t efi_size, |
Heinrich Schuchardt | 8f7e2b2 | 2018-12-26 12:49:09 +0100 | [diff] [blame] | 575 | struct efi_loaded_image *loaded_image_info); |
Alexander Graf | bee9116 | 2016-03-04 01:09:59 +0100 | [diff] [blame] | 576 | /* Called once to store the pristine gd pointer */ |
| 577 | void efi_save_gd(void); |
Alexander Graf | 50149ea | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 578 | /* Call this to relocate the runtime section to an address space */ |
| 579 | void efi_runtime_relocate(ulong offset, struct efi_mem_desc *map); |
Heinrich Schuchardt | 44549d6 | 2017-11-26 14:05:23 +0100 | [diff] [blame] | 580 | /* Add a new object to the object list. */ |
Heinrich Schuchardt | fae0118 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 581 | void efi_add_handle(efi_handle_t obj); |
Heinrich Schuchardt | 2edab5e | 2017-10-26 19:25:49 +0200 | [diff] [blame] | 582 | /* Create handle */ |
Heinrich Schuchardt | 2074f70 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 583 | efi_status_t efi_create_handle(efi_handle_t *handle); |
Heinrich Schuchardt | 678e03a | 2017-12-04 18:03:02 +0100 | [diff] [blame] | 584 | /* Delete handle */ |
Heinrich Schuchardt | fae0118 | 2018-09-26 05:27:55 +0200 | [diff] [blame] | 585 | void efi_delete_handle(efi_handle_t obj); |
Heinrich Schuchardt | 1b68153 | 2017-11-06 21:17:50 +0100 | [diff] [blame] | 586 | /* Call this to validate a handle and find the EFI object for it */ |
Heinrich Schuchardt | 2074f70 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 587 | struct efi_object *efi_search_obj(const efi_handle_t handle); |
AKASHI Takahiro | d7e0b01 | 2019-03-05 14:53:31 +0900 | [diff] [blame] | 588 | /* Load image */ |
| 589 | efi_status_t EFIAPI efi_load_image(bool boot_policy, |
| 590 | efi_handle_t parent_image, |
| 591 | struct efi_device_path *file_path, |
| 592 | void *source_buffer, |
| 593 | efi_uintn_t source_size, |
| 594 | efi_handle_t *image_handle); |
Heinrich Schuchardt | f69d63f | 2018-12-26 13:28:09 +0100 | [diff] [blame] | 595 | /* Start image */ |
| 596 | efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle, |
| 597 | efi_uintn_t *exit_data_size, |
| 598 | u16 **exit_data); |
AKASHI Takahiro | d7e0b01 | 2019-03-05 14:53:31 +0900 | [diff] [blame] | 599 | /* Unload image */ |
| 600 | efi_status_t EFIAPI efi_unload_image(efi_handle_t image_handle); |
Heinrich Schuchardt | 3f79a2b | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 601 | /* Find a protocol on a handle */ |
Heinrich Schuchardt | 2074f70 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 602 | efi_status_t efi_search_protocol(const efi_handle_t handle, |
Heinrich Schuchardt | 3f79a2b | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 603 | const efi_guid_t *protocol_guid, |
| 604 | struct efi_handler **handler); |
| 605 | /* Install new protocol on a handle */ |
Heinrich Schuchardt | 2074f70 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 606 | efi_status_t efi_add_protocol(const efi_handle_t handle, |
| 607 | const efi_guid_t *protocol, |
Heinrich Schuchardt | 3f79a2b | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 608 | void *protocol_interface); |
Heinrich Schuchardt | f9ad240 | 2020-01-10 12:33:59 +0100 | [diff] [blame] | 609 | /* Open protocol */ |
| 610 | efi_status_t efi_protocol_open(struct efi_handler *handler, |
| 611 | void **protocol_interface, void *agent_handle, |
| 612 | void *controller_handle, uint32_t attributes); |
| 613 | |
Heinrich Schuchardt | 3f79a2b | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 614 | /* Delete protocol from a handle */ |
Heinrich Schuchardt | 2074f70 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 615 | efi_status_t efi_remove_protocol(const efi_handle_t handle, |
| 616 | const efi_guid_t *protocol, |
Heinrich Schuchardt | 3f79a2b | 2017-10-26 19:25:53 +0200 | [diff] [blame] | 617 | void *protocol_interface); |
| 618 | /* Delete all protocols from a handle */ |
Heinrich Schuchardt | 2074f70 | 2018-01-11 08:16:09 +0100 | [diff] [blame] | 619 | efi_status_t efi_remove_all_protocols(const efi_handle_t handle); |
Heinrich Schuchardt | 7657ae1 | 2019-04-12 06:59:49 +0200 | [diff] [blame] | 620 | /* Install multiple protocol interfaces */ |
| 621 | efi_status_t EFIAPI efi_install_multiple_protocol_interfaces |
| 622 | (efi_handle_t *handle, ...); |
AKASHI Takahiro | b51ec63 | 2020-03-17 11:12:36 +0900 | [diff] [blame] | 623 | /* Get handles that support a given protocol */ |
| 624 | efi_status_t EFIAPI efi_locate_handle_buffer( |
| 625 | enum efi_locate_search_type search_type, |
| 626 | const efi_guid_t *protocol, void *search_key, |
| 627 | efi_uintn_t *no_handles, efi_handle_t **buffer); |
| 628 | /* Close an previously opened protocol interface */ |
| 629 | efi_status_t EFIAPI efi_close_protocol(efi_handle_t handle, |
| 630 | const efi_guid_t *protocol, |
| 631 | efi_handle_t agent_handle, |
| 632 | efi_handle_t controller_handle); |
| 633 | /* Open a protocol interface */ |
| 634 | efi_status_t EFIAPI efi_handle_protocol(efi_handle_t handle, |
| 635 | const efi_guid_t *protocol, |
| 636 | void **protocol_interface); |
xypron.glpk@gmx.de | 49deb45 | 2017-07-18 20:17:20 +0200 | [diff] [blame] | 637 | /* Call this to create an event */ |
Heinrich Schuchardt | 152cade | 2017-11-06 21:17:47 +0100 | [diff] [blame] | 638 | efi_status_t efi_create_event(uint32_t type, efi_uintn_t notify_tpl, |
xypron.glpk@gmx.de | 49deb45 | 2017-07-18 20:17:20 +0200 | [diff] [blame] | 639 | void (EFIAPI *notify_function) ( |
| 640 | struct efi_event *event, |
| 641 | void *context), |
Heinrich Schuchardt | b095f3c | 2018-02-18 15:17:52 +0100 | [diff] [blame] | 642 | void *notify_context, efi_guid_t *group, |
| 643 | struct efi_event **event); |
xypron.glpk@gmx.de | bfc7246 | 2017-07-18 20:17:21 +0200 | [diff] [blame] | 644 | /* Call this to set a timer */ |
xypron.glpk@gmx.de | b521d29 | 2017-07-19 19:22:34 +0200 | [diff] [blame] | 645 | efi_status_t efi_set_timer(struct efi_event *event, enum efi_timer_delay type, |
xypron.glpk@gmx.de | bfc7246 | 2017-07-18 20:17:21 +0200 | [diff] [blame] | 646 | uint64_t trigger_time); |
xypron.glpk@gmx.de | 91be9a7 | 2017-07-18 20:17:22 +0200 | [diff] [blame] | 647 | /* Call this to signal an event */ |
Heinrich Schuchardt | 7eaa900 | 2019-06-07 06:47:01 +0200 | [diff] [blame] | 648 | void efi_signal_event(struct efi_event *event); |
Alexander Graf | 50149ea | 2016-03-04 01:10:01 +0100 | [diff] [blame] | 649 | |
Rob Clark | 2a92080 | 2017-09-13 18:05:34 -0400 | [diff] [blame] | 650 | /* open file system: */ |
| 651 | struct efi_simple_file_system_protocol *efi_simple_file_system( |
| 652 | struct blk_desc *desc, int part, struct efi_device_path *dp); |
| 653 | |
| 654 | /* open file from device-path: */ |
| 655 | struct efi_file_handle *efi_file_from_path(struct efi_device_path *fp); |
| 656 | |
Jose Marinho | 64a8aae | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 657 | /* Registers a callback function for a notification event. */ |
| 658 | efi_status_t EFIAPI efi_register_protocol_notify(const efi_guid_t *protocol, |
| 659 | struct efi_event *event, |
| 660 | void **registration); |
Ilias Apalodimas | 37c3ca5 | 2021-03-17 21:54:59 +0200 | [diff] [blame] | 661 | efi_status_t efi_file_size(struct efi_file_handle *fh, efi_uintn_t *size); |
| 662 | |
| 663 | /* get a device path from a Boot#### option */ |
| 664 | struct efi_device_path *efi_get_dp_from_boot(const efi_guid_t guid); |
| 665 | |
Heinrich Schuchardt | c3772ca | 2018-11-18 17:58:49 +0100 | [diff] [blame] | 666 | /** |
| 667 | * efi_size_in_pages() - convert size in bytes to size in pages |
| 668 | * |
| 669 | * This macro returns the number of EFI memory pages required to hold 'size' |
| 670 | * bytes. |
| 671 | * |
| 672 | * @size: size in bytes |
| 673 | * Return: size in pages |
| 674 | */ |
Heinrich Schuchardt | 0a7e516 | 2021-01-17 07:52:09 +0100 | [diff] [blame] | 675 | #define efi_size_in_pages(size) (((size) + EFI_PAGE_MASK) >> EFI_PAGE_SHIFT) |
Alexander Graf | 5d00995 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 676 | /* Generic EFI memory allocator, call this to get memory */ |
| 677 | void *efi_alloc(uint64_t len, int memory_type); |
| 678 | /* More specific EFI memory allocator, called by EFI payloads */ |
Heinrich Schuchardt | 49d225e | 2021-08-17 15:05:31 +0200 | [diff] [blame] | 679 | efi_status_t efi_allocate_pages(enum efi_allocate_type type, |
| 680 | enum efi_memory_type memory_type, |
| 681 | efi_uintn_t pages, uint64_t *memory); |
Stefan Brüns | b61d857 | 2016-10-01 23:32:27 +0200 | [diff] [blame] | 682 | /* EFI memory free function. */ |
Heinrich Schuchardt | f5a2a93 | 2017-11-06 21:17:48 +0100 | [diff] [blame] | 683 | efi_status_t efi_free_pages(uint64_t memory, efi_uintn_t pages); |
Stefan Brüns | ead1274 | 2016-10-09 22:17:18 +0200 | [diff] [blame] | 684 | /* EFI memory allocator for small allocations */ |
Heinrich Schuchardt | 49d225e | 2021-08-17 15:05:31 +0200 | [diff] [blame] | 685 | efi_status_t efi_allocate_pool(enum efi_memory_type pool_type, |
| 686 | efi_uintn_t size, void **buffer); |
Stefan Brüns | 42417bc | 2016-10-09 22:17:26 +0200 | [diff] [blame] | 687 | /* EFI pool memory free function. */ |
| 688 | efi_status_t efi_free_pool(void *buffer); |
Alexander Graf | 5d00995 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 689 | /* Returns the EFI memory map */ |
Heinrich Schuchardt | f5a2a93 | 2017-11-06 21:17:48 +0100 | [diff] [blame] | 690 | efi_status_t efi_get_memory_map(efi_uintn_t *memory_map_size, |
Alexander Graf | 5d00995 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 691 | struct efi_mem_desc *memory_map, |
Heinrich Schuchardt | f5a2a93 | 2017-11-06 21:17:48 +0100 | [diff] [blame] | 692 | efi_uintn_t *map_key, |
| 693 | efi_uintn_t *descriptor_size, |
Alexander Graf | 5d00995 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 694 | uint32_t *descriptor_version); |
| 695 | /* Adds a range into the EFI memory map */ |
Michael Walle | 714497e | 2020-05-17 12:29:19 +0200 | [diff] [blame] | 696 | efi_status_t efi_add_memory_map(u64 start, u64 size, int memory_type); |
Park, Aiden | b5b9eff | 2019-09-03 17:43:43 +0000 | [diff] [blame] | 697 | /* Adds a conventional range into the EFI memory map */ |
| 698 | efi_status_t efi_add_conventional_memory_map(u64 ram_start, u64 ram_end, |
| 699 | u64 ram_top); |
| 700 | |
Heinrich Schuchardt | 05ef48a | 2018-01-21 19:29:30 +0100 | [diff] [blame] | 701 | /* Called by board init to initialize the EFI drivers */ |
Heinrich Schuchardt | 038782a | 2018-02-01 12:53:32 +0100 | [diff] [blame] | 702 | efi_status_t efi_driver_init(void); |
Alexander Graf | 5d00995 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 703 | /* Called by board init to initialize the EFI memory map */ |
| 704 | int efi_memory_init(void); |
Alexander Graf | 488bf12 | 2016-08-19 01:23:24 +0200 | [diff] [blame] | 705 | /* Adds new or overrides configuration table entry to the system table */ |
| 706 | efi_status_t efi_install_configuration_table(const efi_guid_t *guid, void *table); |
Heinrich Schuchardt | 56d9288 | 2017-12-04 18:03:01 +0100 | [diff] [blame] | 707 | /* Sets up a loaded image */ |
Heinrich Schuchardt | c982874 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 708 | efi_status_t efi_setup_loaded_image(struct efi_device_path *device_path, |
| 709 | struct efi_device_path *file_path, |
| 710 | struct efi_loaded_image_obj **handle_ptr, |
| 711 | struct efi_loaded_image **info_ptr); |
Alexander Graf | 5d00995 | 2016-03-04 01:10:04 +0100 | [diff] [blame] | 712 | |
Alexander Graf | 51735ae | 2016-05-11 18:25:48 +0200 | [diff] [blame] | 713 | #ifdef CONFIG_EFI_LOADER_BOUNCE_BUFFER |
| 714 | extern void *efi_bounce_buffer; |
| 715 | #define EFI_LOADER_BOUNCE_BUFFER_SIZE (64 * 1024 * 1024) |
| 716 | #endif |
| 717 | |
Rob Clark | b66c60d | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 718 | |
| 719 | struct efi_device_path *efi_dp_next(const struct efi_device_path *dp); |
Heinrich Schuchardt | ff401d3 | 2017-10-26 19:25:48 +0200 | [diff] [blame] | 720 | int efi_dp_match(const struct efi_device_path *a, |
| 721 | const struct efi_device_path *b); |
Rob Clark | b66c60d | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 722 | struct efi_object *efi_dp_find_obj(struct efi_device_path *dp, |
| 723 | struct efi_device_path **rem); |
Heinrich Schuchardt | f6dd3f3 | 2018-04-16 07:59:08 +0200 | [diff] [blame] | 724 | /* get size of the first device path instance excluding end node */ |
| 725 | efi_uintn_t efi_dp_instance_size(const struct efi_device_path *dp); |
| 726 | /* size of multi-instance device path excluding end node */ |
| 727 | efi_uintn_t efi_dp_size(const struct efi_device_path *dp); |
Rob Clark | b66c60d | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 728 | struct efi_device_path *efi_dp_dup(const struct efi_device_path *dp); |
| 729 | struct efi_device_path *efi_dp_append(const struct efi_device_path *dp1, |
| 730 | const struct efi_device_path *dp2); |
| 731 | struct efi_device_path *efi_dp_append_node(const struct efi_device_path *dp, |
| 732 | const struct efi_device_path *node); |
Heinrich Schuchardt | 211314c | 2018-04-16 07:59:05 +0200 | [diff] [blame] | 733 | /* Create a device path node of given type, sub-type, length */ |
| 734 | struct efi_device_path *efi_dp_create_device_node(const u8 type, |
| 735 | const u8 sub_type, |
| 736 | const u16 length); |
Heinrich Schuchardt | 3acef5d | 2018-04-16 07:59:09 +0200 | [diff] [blame] | 737 | /* Append device path instance */ |
| 738 | struct efi_device_path *efi_dp_append_instance( |
| 739 | const struct efi_device_path *dp, |
| 740 | const struct efi_device_path *dpi); |
| 741 | /* Get next device path instance */ |
| 742 | struct efi_device_path *efi_dp_get_next_instance(struct efi_device_path **dp, |
| 743 | efi_uintn_t *size); |
| 744 | /* Check if a device path contains muliple instances */ |
| 745 | bool efi_dp_is_multi_instance(const struct efi_device_path *dp); |
Rob Clark | b66c60d | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 746 | |
Rob Clark | b66c60d | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 747 | struct efi_device_path *efi_dp_from_part(struct blk_desc *desc, int part); |
Heinrich Schuchardt | 98d48bd | 2018-01-19 20:24:46 +0100 | [diff] [blame] | 748 | /* Create a device node for a block device partition. */ |
| 749 | struct efi_device_path *efi_dp_part_node(struct blk_desc *desc, int part); |
Rob Clark | b66c60d | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 750 | struct efi_device_path *efi_dp_from_file(struct blk_desc *desc, int part, |
| 751 | const char *path); |
| 752 | struct efi_device_path *efi_dp_from_eth(void); |
Rob Clark | bf19273 | 2017-10-10 08:23:06 -0400 | [diff] [blame] | 753 | struct efi_device_path *efi_dp_from_mem(uint32_t mem_type, |
| 754 | uint64_t start_address, |
| 755 | uint64_t end_address); |
Heinrich Schuchardt | 65436f9 | 2018-01-19 20:24:49 +0100 | [diff] [blame] | 756 | /* Determine the last device path node that is not the end node. */ |
| 757 | const struct efi_device_path *efi_dp_last_node( |
| 758 | const struct efi_device_path *dp); |
Heinrich Schuchardt | 0429868 | 2018-01-19 20:24:37 +0100 | [diff] [blame] | 759 | efi_status_t efi_dp_split_file_path(struct efi_device_path *full_path, |
| 760 | struct efi_device_path **device_path, |
| 761 | struct efi_device_path **file_path); |
AKASHI Takahiro | f1589ff | 2018-10-17 16:32:03 +0900 | [diff] [blame] | 762 | efi_status_t efi_dp_from_name(const char *dev, const char *devnr, |
| 763 | const char *path, |
| 764 | struct efi_device_path **device, |
| 765 | struct efi_device_path **file); |
Heinrich Schuchardt | 5cad4a3 | 2020-08-23 10:49:46 +0200 | [diff] [blame] | 766 | ssize_t efi_dp_check_length(const struct efi_device_path *dp, |
| 767 | const size_t maxlen); |
Rob Clark | b66c60d | 2017-09-13 18:05:28 -0400 | [diff] [blame] | 768 | |
| 769 | #define EFI_DP_TYPE(_dp, _type, _subtype) \ |
| 770 | (((_dp)->type == DEVICE_PATH_TYPE_##_type) && \ |
| 771 | ((_dp)->sub_type == DEVICE_PATH_SUB_TYPE_##_subtype)) |
| 772 | |
AKASHI Takahiro | e771b4b | 2019-06-05 13:21:38 +0900 | [diff] [blame] | 773 | /* Indicate supported runtime services */ |
| 774 | efi_status_t efi_init_runtime_supported(void); |
| 775 | |
Heinrich Schuchardt | a39f39c | 2018-07-29 09:49:04 +0200 | [diff] [blame] | 776 | /* Update CRC32 in table header */ |
| 777 | void __efi_runtime efi_update_table_header_crc32(struct efi_table_hdr *table); |
| 778 | |
Alexander Graf | 80a4800 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 779 | /* Boards may provide the functions below to implement RTS functionality */ |
| 780 | |
Alexander Graf | 3c63db9 | 2016-10-14 13:45:30 +0200 | [diff] [blame] | 781 | void __efi_runtime EFIAPI efi_reset_system( |
Alexander Graf | 80a4800 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 782 | enum efi_reset_type reset_type, |
| 783 | efi_status_t reset_status, |
| 784 | unsigned long data_size, void *reset_data); |
Heinrich Schuchardt | 22c793e | 2018-03-03 15:28:59 +0100 | [diff] [blame] | 785 | |
| 786 | /* Architecture specific initialization of the EFI subsystem */ |
| 787 | efi_status_t efi_reset_system_init(void); |
Alexander Graf | 80a4800 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 788 | |
Alexander Graf | 3c63db9 | 2016-10-14 13:45:30 +0200 | [diff] [blame] | 789 | efi_status_t __efi_runtime EFIAPI efi_get_time( |
Alexander Graf | 80a4800 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 790 | struct efi_time *time, |
| 791 | struct efi_time_cap *capabilities); |
Alexander Graf | 80a4800 | 2016-08-16 21:08:45 +0200 | [diff] [blame] | 792 | |
Heinrich Schuchardt | 656f171 | 2019-05-31 07:38:29 +0200 | [diff] [blame] | 793 | efi_status_t __efi_runtime EFIAPI efi_set_time(struct efi_time *time); |
| 794 | |
Heinrich Schuchardt | 623b3a5 | 2017-09-15 10:06:11 +0200 | [diff] [blame] | 795 | #ifdef CONFIG_CMD_BOOTEFI_SELFTEST |
| 796 | /* |
| 797 | * Entry point for the tests of the EFI API. |
| 798 | * It is called by 'bootefi selftest' |
| 799 | */ |
| 800 | efi_status_t EFIAPI efi_selftest(efi_handle_t image_handle, |
| 801 | struct efi_system_table *systab); |
| 802 | #endif |
| 803 | |
Heinrich Schuchardt | 0bda81b | 2018-12-30 20:53:51 +0100 | [diff] [blame] | 804 | efi_status_t EFIAPI efi_get_variable(u16 *variable_name, |
| 805 | const efi_guid_t *vendor, u32 *attributes, |
| 806 | efi_uintn_t *data_size, void *data); |
Heinrich Schuchardt | 45c66f9 | 2018-05-17 07:57:05 +0200 | [diff] [blame] | 807 | efi_status_t EFIAPI efi_get_next_variable_name(efi_uintn_t *variable_name_size, |
| 808 | u16 *variable_name, |
Heinrich Schuchardt | 7a4e717 | 2020-03-22 18:28:20 +0100 | [diff] [blame] | 809 | efi_guid_t *vendor); |
Heinrich Schuchardt | 0bda81b | 2018-12-30 20:53:51 +0100 | [diff] [blame] | 810 | efi_status_t EFIAPI efi_set_variable(u16 *variable_name, |
| 811 | const efi_guid_t *vendor, u32 attributes, |
Heinrich Schuchardt | 452257a | 2018-12-30 21:03:15 +0100 | [diff] [blame] | 812 | efi_uintn_t data_size, const void *data); |
Rob Clark | ad644e7 | 2017-09-13 18:05:37 -0400 | [diff] [blame] | 813 | |
Heinrich Schuchardt | ce43528 | 2019-06-20 12:13:05 +0200 | [diff] [blame] | 814 | efi_status_t EFIAPI efi_query_variable_info( |
| 815 | u32 attributes, u64 *maximum_variable_storage_size, |
| 816 | u64 *remaining_variable_storage_size, |
| 817 | u64 *maximum_variable_size); |
| 818 | |
Ilias Apalodimas | 37c3ca5 | 2021-03-17 21:54:59 +0200 | [diff] [blame] | 819 | void *efi_get_var(u16 *name, const efi_guid_t *vendor, efi_uintn_t *size); |
| 820 | |
AKASHI Takahiro | 1a82b34 | 2018-11-05 18:06:41 +0900 | [diff] [blame] | 821 | /* |
| 822 | * See section 3.1.3 in the v2.7 UEFI spec for more details on |
| 823 | * the layout of EFI_LOAD_OPTION. In short it is: |
| 824 | * |
| 825 | * typedef struct _EFI_LOAD_OPTION { |
| 826 | * UINT32 Attributes; |
| 827 | * UINT16 FilePathListLength; |
| 828 | * // CHAR16 Description[]; <-- variable length, NULL terminated |
| 829 | * // EFI_DEVICE_PATH_PROTOCOL FilePathList[]; |
| 830 | * <-- FilePathListLength bytes |
| 831 | * // UINT8 OptionalData[]; |
| 832 | * } EFI_LOAD_OPTION; |
| 833 | */ |
| 834 | struct efi_load_option { |
| 835 | u32 attributes; |
| 836 | u16 file_path_length; |
| 837 | u16 *label; |
| 838 | struct efi_device_path *file_path; |
Heinrich Schuchardt | 39a1ff8 | 2019-04-29 13:51:45 +0200 | [diff] [blame] | 839 | const u8 *optional_data; |
AKASHI Takahiro | 1a82b34 | 2018-11-05 18:06:41 +0900 | [diff] [blame] | 840 | }; |
| 841 | |
Ilias Apalodimas | 76e8acc | 2021-03-17 21:54:58 +0200 | [diff] [blame] | 842 | struct efi_device_path *efi_dp_from_lo(struct efi_load_option *lo, |
| 843 | efi_uintn_t *size, efi_guid_t guid); |
| 844 | struct efi_device_path *efi_dp_concat(const struct efi_device_path *dp1, |
| 845 | const struct efi_device_path *dp2); |
Heinrich Schuchardt | 0e69bcf | 2020-05-31 22:46:09 +0200 | [diff] [blame] | 846 | efi_status_t efi_deserialize_load_option(struct efi_load_option *lo, u8 *data, |
| 847 | efi_uintn_t *size); |
AKASHI Takahiro | 1a82b34 | 2018-11-05 18:06:41 +0900 | [diff] [blame] | 848 | unsigned long efi_serialize_load_option(struct efi_load_option *lo, u8 **data); |
Heinrich Schuchardt | 1064d04 | 2020-08-07 17:47:13 +0200 | [diff] [blame] | 849 | efi_status_t efi_set_load_options(efi_handle_t handle, |
| 850 | efi_uintn_t load_options_size, |
| 851 | void *load_options); |
Heinrich Schuchardt | 0ad6400 | 2020-08-07 17:49:39 +0200 | [diff] [blame] | 852 | efi_status_t efi_bootmgr_load(efi_handle_t *handle, void **load_options); |
Rob Clark | 9975fe9 | 2017-09-13 18:05:38 -0400 | [diff] [blame] | 853 | |
AKASHI Takahiro | 593e17d | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 854 | /** |
Heinrich Schuchardt | c6f077a | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 855 | * struct efi_image_regions - A list of memory regions |
AKASHI Takahiro | 593e17d | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 856 | * |
| 857 | * @max: Maximum number of regions |
| 858 | * @num: Number of regions |
| 859 | * @reg: array of regions |
| 860 | */ |
| 861 | struct efi_image_regions { |
| 862 | int max; |
| 863 | int num; |
| 864 | struct image_region reg[]; |
| 865 | }; |
| 866 | |
| 867 | /** |
Heinrich Schuchardt | c6f077a | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 868 | * struct efi_sig_data - A decoded data of struct efi_signature_data |
AKASHI Takahiro | 593e17d | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 869 | * |
| 870 | * This structure represents an internal form of signature in |
| 871 | * signature database. A listed list may represent a signature list. |
| 872 | * |
| 873 | * @next: Pointer to next entry |
Heinrich Schuchardt | c6f077a | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 874 | * @owner: Signature owner |
AKASHI Takahiro | 593e17d | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 875 | * @data: Pointer to signature data |
| 876 | * @size: Size of signature data |
| 877 | */ |
| 878 | struct efi_sig_data { |
| 879 | struct efi_sig_data *next; |
| 880 | efi_guid_t owner; |
| 881 | void *data; |
| 882 | size_t size; |
| 883 | }; |
| 884 | |
| 885 | /** |
Heinrich Schuchardt | c6f077a | 2021-02-25 08:02:37 +0100 | [diff] [blame] | 886 | * struct efi_signature_store - A decoded data of signature database |
AKASHI Takahiro | 593e17d | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 887 | * |
| 888 | * This structure represents an internal form of signature database. |
| 889 | * |
| 890 | * @next: Pointer to next entry |
| 891 | * @sig_type: Signature type |
| 892 | * @sig_data_list: Pointer to signature list |
| 893 | */ |
| 894 | struct efi_signature_store { |
| 895 | struct efi_signature_store *next; |
| 896 | efi_guid_t sig_type; |
| 897 | struct efi_sig_data *sig_data_list; |
| 898 | }; |
| 899 | |
| 900 | struct x509_certificate; |
| 901 | struct pkcs7_message; |
| 902 | |
AKASHI Takahiro | 7926dfb | 2020-07-08 14:01:57 +0900 | [diff] [blame] | 903 | bool efi_signature_lookup_digest(struct efi_image_regions *regs, |
| 904 | struct efi_signature_store *db); |
AKASHI Takahiro | 1115edd | 2020-07-21 19:35:22 +0900 | [diff] [blame] | 905 | bool efi_signature_verify(struct efi_image_regions *regs, |
| 906 | struct pkcs7_message *msg, |
| 907 | struct efi_signature_store *db, |
| 908 | struct efi_signature_store *dbx); |
AKASHI Takahiro | 52956e5 | 2020-08-14 14:39:23 +0900 | [diff] [blame] | 909 | static inline bool efi_signature_verify_one(struct efi_image_regions *regs, |
| 910 | struct pkcs7_message *msg, |
| 911 | struct efi_signature_store *db) |
| 912 | { |
| 913 | return efi_signature_verify(regs, msg, db, NULL); |
| 914 | } |
AKASHI Takahiro | 11bafb2 | 2020-07-08 14:01:56 +0900 | [diff] [blame] | 915 | bool efi_signature_check_signers(struct pkcs7_message *msg, |
| 916 | struct efi_signature_store *dbx); |
AKASHI Takahiro | 593e17d | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 917 | |
| 918 | efi_status_t efi_image_region_add(struct efi_image_regions *regs, |
| 919 | const void *start, const void *end, |
| 920 | int nocheck); |
AKASHI Takahiro | be6296d | 2020-04-14 11:51:40 +0900 | [diff] [blame] | 921 | |
| 922 | void efi_sigstore_free(struct efi_signature_store *sigstore); |
Sughosh Ganu | b4f20a5 | 2020-12-30 19:27:08 +0530 | [diff] [blame] | 923 | struct efi_signature_store *efi_build_signature_store(void *sig_list, |
| 924 | efi_uintn_t size); |
AKASHI Takahiro | be6296d | 2020-04-14 11:51:40 +0900 | [diff] [blame] | 925 | struct efi_signature_store *efi_sigstore_parse_sigdb(u16 *name); |
AKASHI Takahiro | 767f6ee | 2020-04-14 11:51:41 +0900 | [diff] [blame] | 926 | |
| 927 | bool efi_secure_boot_enabled(void); |
AKASHI Takahiro | 4540dab | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 928 | |
Sughosh Ganu | 04be98b | 2020-12-30 19:27:09 +0530 | [diff] [blame] | 929 | bool efi_capsule_auth_enabled(void); |
| 930 | |
Masahisa Kojima | 163a0d7 | 2021-05-26 12:09:58 +0900 | [diff] [blame] | 931 | void *efi_prepare_aligned_image(void *efi, u64 *efi_size); |
| 932 | |
AKASHI Takahiro | 4540dab | 2020-04-14 11:51:44 +0900 | [diff] [blame] | 933 | bool efi_image_parse(void *efi, size_t len, struct efi_image_regions **regp, |
| 934 | WIN_CERTIFICATE **auth, size_t *auth_len); |
AKASHI Takahiro | 593e17d | 2020-04-14 11:51:39 +0900 | [diff] [blame] | 935 | |
Sughosh Ganu | 201b806 | 2020-12-30 19:27:07 +0530 | [diff] [blame] | 936 | struct pkcs7_message *efi_parse_pkcs7_header(const void *buf, |
| 937 | size_t buflen, |
| 938 | u8 **tmpbuf); |
| 939 | |
Heinrich Schuchardt | b0dd8cb | 2020-06-28 16:30:29 +0200 | [diff] [blame] | 940 | /* runtime implementation of memcpy() */ |
| 941 | void efi_memcpy_runtime(void *dest, const void *src, size_t n); |
| 942 | |
AKASHI Takahiro | 077153e | 2020-10-29 13:47:46 +0900 | [diff] [blame] | 943 | /* commonly used helper function */ |
Ilias Apalodimas | fe179d7 | 2020-12-31 12:26:46 +0200 | [diff] [blame] | 944 | u16 *efi_create_indexed_name(u16 *buffer, size_t buffer_size, const char *name, |
| 945 | unsigned int index); |
AKASHI Takahiro | 077153e | 2020-10-29 13:47:46 +0900 | [diff] [blame] | 946 | |
AKASHI Takahiro | f27c201 | 2020-11-30 18:12:12 +0900 | [diff] [blame] | 947 | extern const struct efi_firmware_management_protocol efi_fmp_fit; |
AKASHI Takahiro | bb7e71d | 2020-11-17 09:28:00 +0900 | [diff] [blame] | 948 | extern const struct efi_firmware_management_protocol efi_fmp_raw; |
AKASHI Takahiro | f27c201 | 2020-11-30 18:12:12 +0900 | [diff] [blame] | 949 | |
AKASHI Takahiro | 2bc27ca | 2020-11-17 09:27:55 +0900 | [diff] [blame] | 950 | /* Capsule update */ |
| 951 | efi_status_t EFIAPI efi_update_capsule( |
| 952 | struct efi_capsule_header **capsule_header_array, |
| 953 | efi_uintn_t capsule_count, |
| 954 | u64 scatter_gather_list); |
| 955 | efi_status_t EFIAPI efi_query_capsule_caps( |
| 956 | struct efi_capsule_header **capsule_header_array, |
| 957 | efi_uintn_t capsule_count, |
| 958 | u64 *maximum_capsule_size, |
| 959 | u32 *reset_type); |
| 960 | |
Sughosh Ganu | 04be98b | 2020-12-30 19:27:09 +0530 | [diff] [blame] | 961 | efi_status_t efi_capsule_authenticate(const void *capsule, |
| 962 | efi_uintn_t capsule_size, |
| 963 | void **image, efi_uintn_t *image_size); |
| 964 | |
AKASHI Takahiro | c74cd8b | 2020-11-17 09:27:56 +0900 | [diff] [blame] | 965 | #define EFI_CAPSULE_DIR L"\\EFI\\UpdateCapsule\\" |
| 966 | |
Jose Marinho | 64a8aae | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 967 | /** |
| 968 | * Install the ESRT system table. |
| 969 | * |
| 970 | * @return status code |
| 971 | */ |
| 972 | efi_status_t efi_esrt_register(void); |
| 973 | |
| 974 | /** |
| 975 | * efi_esrt_populate() - Populates the ESRT entries from the FMP instances |
| 976 | * present in the system. |
| 977 | * If an ESRT already exists, the old ESRT is replaced in the system table. |
| 978 | * The memory of the old ESRT is deallocated. |
| 979 | * |
| 980 | * Return: |
| 981 | * - EFI_SUCCESS if the ESRT is correctly created |
| 982 | * - error code otherwise. |
| 983 | */ |
| 984 | efi_status_t efi_esrt_populate(void); |
Ilias Apalodimas | 6e0184b | 2021-06-22 17:38:53 +0300 | [diff] [blame] | 985 | efi_status_t efi_load_capsule_drivers(void); |
Heinrich Schuchardt | cd9e18d | 2017-10-18 18:13:07 +0200 | [diff] [blame] | 986 | #endif /* _EFI_LOADER_H */ |