]>
Commit | Line | Data |
---|---|---|
f739fcd8 | 1 | /* SPDX-License-Identifier: GPL-2.0+ */ |
cb149c66 AG |
2 | /* |
3 | * EFI application loader | |
4 | * | |
5 | * Copyright (c) 2016 Alexander Graf | |
cb149c66 AG |
6 | */ |
7 | ||
cd9e18de HS |
8 | #ifndef _EFI_LOADER_H |
9 | #define _EFI_LOADER_H 1 | |
10 | ||
bee91169 | 11 | #include <common.h> |
e6f6f9e6 | 12 | #include <blk.h> |
f7ae49fc | 13 | #include <log.h> |
cb149c66 AG |
14 | #include <part_efi.h> |
15 | #include <efi_api.h> | |
d9f3307a | 16 | #include <image.h> |
4540dabd | 17 | #include <pe.h> |
6e3c6544 SG |
18 | #include <linux/list.h> |
19 | #include <linux/oid_registry.h> | |
bee91169 | 20 | |
e6f6f9e6 | 21 | struct blk_desc; |
86a3d43b | 22 | struct jmp_buf_data; |
e6f6f9e6 | 23 | |
fdeb6f7d SG |
24 | static inline int guidcmp(const void *g1, const void *g2) |
25 | { | |
26 | return memcmp(g1, g2, sizeof(efi_guid_t)); | |
27 | } | |
28 | ||
61e42d94 SG |
29 | static inline void *guidcpy(void *dst, const void *src) |
30 | { | |
31 | return memcpy(dst, src, sizeof(efi_guid_t)); | |
32 | } | |
33 | ||
9b5e6396 | 34 | #if CONFIG_IS_ENABLED(EFI_LOADER) |
bee91169 | 35 | |
6e3c6544 SG |
36 | /** |
37 | * __efi_runtime_data - declares a non-const variable for EFI runtime section | |
38 | * | |
39 | * This macro indicates that a variable is non-const and should go into the | |
40 | * EFI runtime section, and thus still be available when the OS is running. | |
41 | * | |
42 | * Only use on variables not declared const. | |
43 | * | |
44 | * Example: | |
45 | * | |
46 | * :: | |
47 | * | |
48 | * static __efi_runtime_data my_computed_table[256]; | |
49 | */ | |
50 | #define __efi_runtime_data __section(".data.efi_runtime") | |
51 | ||
52 | /** | |
53 | * __efi_runtime_rodata - declares a read-only variable for EFI runtime section | |
54 | * | |
55 | * This macro indicates that a variable is read-only (const) and should go into | |
56 | * the EFI runtime section, and thus still be available when the OS is running. | |
57 | * | |
58 | * Only use on variables also declared const. | |
59 | * | |
60 | * Example: | |
61 | * | |
62 | * :: | |
63 | * | |
64 | * static const __efi_runtime_rodata my_const_table[] = { 1, 2, 3 }; | |
65 | */ | |
66 | #define __efi_runtime_rodata __section(".rodata.efi_runtime") | |
67 | ||
68 | /** | |
69 | * __efi_runtime - declares a function for EFI runtime section | |
70 | * | |
71 | * This macro indicates that a function should go into the EFI runtime section, | |
72 | * and thus still be available when the OS is running. | |
73 | * | |
74 | * Example: | |
75 | * | |
76 | * :: | |
77 | * | |
78 | * static __efi_runtime compute_my_table(void); | |
79 | */ | |
80 | #define __efi_runtime __section(".text.efi_runtime") | |
81 | ||
82 | /* | |
83 | * Call this with mmio_ptr as the _pointer_ to a pointer to an MMIO region | |
84 | * to make it available at runtime | |
85 | */ | |
86 | efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len); | |
87 | ||
88 | /* | |
89 | * Special case handler for error/abort that just tries to dtrt to get | |
90 | * back to u-boot world | |
91 | */ | |
92 | void efi_restore_gd(void); | |
93 | /* Call this to set the current device name */ | |
94 | void efi_set_bootdev(const char *dev, const char *devnr, const char *path, | |
95 | void *buffer, size_t buffer_size); | |
96 | /* Called by networking code to memorize the dhcp ack package */ | |
97 | void efi_net_set_dhcp_ack(void *pkt, int len); | |
98 | /* Print information about all loaded images */ | |
99 | void efi_print_image_infos(void *pc); | |
100 | ||
101 | /* Hook at initialization */ | |
102 | efi_status_t efi_launch_capsules(void); | |
103 | ||
104 | #else /* CONFIG_IS_ENABLED(EFI_LOADER) */ | |
105 | ||
106 | /* Without CONFIG_EFI_LOADER we don't have a runtime section, stub it out */ | |
107 | #define __efi_runtime_data | |
108 | #define __efi_runtime_rodata | |
109 | #define __efi_runtime | |
110 | static inline efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len) | |
111 | { | |
112 | return EFI_SUCCESS; | |
113 | } | |
114 | ||
115 | /* No loader configured, stub out EFI_ENTRY */ | |
116 | static inline void efi_restore_gd(void) { } | |
117 | static inline void efi_set_bootdev(const char *dev, const char *devnr, | |
118 | const char *path, void *buffer, | |
119 | size_t buffer_size) { } | |
120 | static inline void efi_net_set_dhcp_ack(void *pkt, int len) { } | |
121 | static inline void efi_print_image_infos(void *pc) { } | |
122 | static inline efi_status_t efi_launch_capsules(void) | |
123 | { | |
124 | return EFI_SUCCESS; | |
125 | } | |
126 | ||
127 | #endif /* CONFIG_IS_ENABLED(EFI_LOADER) */ | |
cb149c66 | 128 | |
4182a129 HS |
129 | /* Maximum number of configuration tables */ |
130 | #define EFI_MAX_CONFIGURATION_TABLES 16 | |
131 | ||
4e6b5d65 HS |
132 | /* GUID used by the root node */ |
133 | #define U_BOOT_GUID \ | |
134 | EFI_GUID(0xe61d73b9, 0xa384, 0x4acc, \ | |
135 | 0xae, 0xab, 0x82, 0xe8, 0x28, 0xf3, 0x62, 0x8b) | |
23ad52ff AT |
136 | /* GUID used as host device on sandbox */ |
137 | #define U_BOOT_HOST_DEV_GUID \ | |
138 | EFI_GUID(0xbbe4e671, 0x5773, 0x4ea1, \ | |
139 | 0x9a, 0xab, 0x3a, 0x7d, 0xbf, 0x40, 0xc4, 0x82) | |
19ecced7 HS |
140 | /* GUID used as root for virtio devices */ |
141 | #define U_BOOT_VIRTIO_DEV_GUID \ | |
142 | EFI_GUID(0x63293792, 0xadf5, 0x9325, \ | |
143 | 0xb9, 0x9f, 0x4e, 0x0e, 0x45, 0x5c, 0x1b, 0x1e) | |
4e6b5d65 | 144 | |
7a597259 | 145 | /* Use internal device tree when starting UEFI application */ |
f64f2232 | 146 | #define EFI_FDT_USE_INTERNAL NULL |
7a597259 | 147 | |
a2a4bc3b AT |
148 | /* Root node */ |
149 | extern efi_handle_t efi_root; | |
150 | ||
15b1bf10 HS |
151 | /* Set to EFI_SUCCESS when initialized */ |
152 | extern efi_status_t efi_obj_list_initialized; | |
153 | ||
fccd3d9c HS |
154 | /* Flag used by the selftest to avoid detaching devices in ExitBootServices() */ |
155 | extern bool efi_st_keep_devices; | |
156 | ||
11078bb2 HS |
157 | /* EFI system partition */ |
158 | extern struct efi_system_partition { | |
159 | enum if_type if_type; | |
160 | int devnum; | |
161 | u8 part; | |
162 | } efi_system_partition; | |
163 | ||
c160d2f5 RC |
164 | int __efi_entry_check(void); |
165 | int __efi_exit_check(void); | |
ae0bd3a9 | 166 | const char *__efi_nesting(void); |
af65db85 RC |
167 | const char *__efi_nesting_inc(void); |
168 | const char *__efi_nesting_dec(void); | |
c160d2f5 | 169 | |
a095aadf RC |
170 | /* |
171 | * Enter the u-boot world from UEFI: | |
172 | */ | |
bee91169 | 173 | #define EFI_ENTRY(format, ...) do { \ |
c160d2f5 | 174 | assert(__efi_entry_check()); \ |
af65db85 RC |
175 | debug("%sEFI: Entry %s(" format ")\n", __efi_nesting_inc(), \ |
176 | __func__, ##__VA_ARGS__); \ | |
bee91169 | 177 | } while(0) |
bee91169 | 178 | |
a095aadf RC |
179 | /* |
180 | * Exit the u-boot world back to UEFI: | |
181 | */ | |
804b1d73 | 182 | #define EFI_EXIT(ret) ({ \ |
c81883df | 183 | typeof(ret) _r = ret; \ |
af65db85 | 184 | debug("%sEFI: Exit: %s: %u\n", __efi_nesting_dec(), \ |
c81883df | 185 | __func__, (u32)((uintptr_t) _r & ~EFI_ERROR_MASK)); \ |
c160d2f5 RC |
186 | assert(__efi_exit_check()); \ |
187 | _r; \ | |
804b1d73 | 188 | }) |
bee91169 | 189 | |
a095aadf | 190 | /* |
ea630ce9 | 191 | * Call non-void UEFI function from u-boot and retrieve return value: |
a095aadf | 192 | */ |
ea630ce9 HS |
193 | #define EFI_CALL(exp) ({ \ |
194 | debug("%sEFI: Call: %s\n", __efi_nesting_inc(), #exp); \ | |
195 | assert(__efi_exit_check()); \ | |
196 | typeof(exp) _r = exp; \ | |
197 | assert(__efi_entry_check()); \ | |
198 | debug("%sEFI: %lu returned by %s\n", __efi_nesting_dec(), \ | |
199 | (unsigned long)((uintptr_t)_r & ~EFI_ERROR_MASK), #exp); \ | |
200 | _r; \ | |
201 | }) | |
202 | ||
203 | /* | |
204 | * Call void UEFI function from u-boot: | |
205 | */ | |
206 | #define EFI_CALL_VOID(exp) do { \ | |
af65db85 | 207 | debug("%sEFI: Call: %s\n", __efi_nesting_inc(), #exp); \ |
c160d2f5 | 208 | assert(__efi_exit_check()); \ |
a095aadf | 209 | exp; \ |
c160d2f5 | 210 | assert(__efi_entry_check()); \ |
af65db85 | 211 | debug("%sEFI: Return From: %s\n", __efi_nesting_dec(), #exp); \ |
a095aadf RC |
212 | } while(0) |
213 | ||
ae0bd3a9 | 214 | /* |
d5504144 | 215 | * Write an indented message with EFI prefix |
ae0bd3a9 | 216 | */ |
d5504144 HS |
217 | #define EFI_PRINT(format, ...) ({ \ |
218 | debug("%sEFI: " format, __efi_nesting(), \ | |
219 | ##__VA_ARGS__); \ | |
ae0bd3a9 HS |
220 | }) |
221 | ||
89aea436 AG |
222 | #ifdef CONFIG_SYS_CACHELINE_SIZE |
223 | #define EFI_CACHELINE_SIZE CONFIG_SYS_CACHELINE_SIZE | |
224 | #else | |
225 | /* Just use the greatest cache flush alignment requirement I'm aware of */ | |
226 | #define EFI_CACHELINE_SIZE 128 | |
227 | #endif | |
228 | ||
1fcb7ea2 HS |
229 | /* Key identifying current memory map */ |
230 | extern efi_uintn_t efi_memory_map_key; | |
231 | ||
50149ea3 | 232 | extern struct efi_runtime_services efi_runtime_services; |
bee91169 AG |
233 | extern struct efi_system_table systab; |
234 | ||
ebb4dd5b | 235 | extern struct efi_simple_text_output_protocol efi_con_out; |
3e603ec7 | 236 | extern struct efi_simple_text_input_protocol efi_con_in; |
ebb4dd5b | 237 | extern struct efi_console_control_protocol efi_console_control; |
cc5b7081 | 238 | extern const struct efi_device_path_to_text_protocol efi_device_path_to_text; |
e70f8dfa LL |
239 | /* implementation of the EFI_DEVICE_PATH_UTILITIES_PROTOCOL */ |
240 | extern const struct efi_device_path_utilities_protocol | |
241 | efi_device_path_utilities; | |
b1b782d3 | 242 | /* current version of the EFI_UNICODE_COLLATION_PROTOCOL */ |
0bc4b0da | 243 | extern const struct efi_unicode_collation_protocol |
95ab3816 | 244 | efi_unicode_collation_protocol2; |
cb728e51 AT |
245 | extern const struct efi_hii_config_routing_protocol efi_hii_config_routing; |
246 | extern const struct efi_hii_config_access_protocol efi_hii_config_access; | |
c9bfb222 LL |
247 | extern const struct efi_hii_database_protocol efi_hii_database; |
248 | extern const struct efi_hii_string_protocol efi_hii_string; | |
c1311ad4 | 249 | |
adae4313 RC |
250 | uint16_t *efi_dp_str(struct efi_device_path *dp); |
251 | ||
4e6b5d65 HS |
252 | /* GUID of the U-Boot root node */ |
253 | extern const efi_guid_t efi_u_boot_guid; | |
23ad52ff AT |
254 | #ifdef CONFIG_SANDBOX |
255 | /* GUID of U-Boot host device on sandbox */ | |
256 | extern const efi_guid_t efi_guid_host_dev; | |
257 | #endif | |
b3dd14b6 HS |
258 | /* GUID of the EFI_BLOCK_IO_PROTOCOL */ |
259 | extern const efi_guid_t efi_block_io_guid; | |
9975fe96 | 260 | extern const efi_guid_t efi_global_variable_guid; |
c1311ad4 | 261 | extern const efi_guid_t efi_guid_console_control; |
cb149c66 | 262 | extern const efi_guid_t efi_guid_device_path; |
f0959dbe HS |
263 | /* GUID of the EFI_DRIVER_BINDING_PROTOCOL */ |
264 | extern const efi_guid_t efi_guid_driver_binding_protocol; | |
a3a28f5f HS |
265 | /* event group ExitBootServices() invoked */ |
266 | extern const efi_guid_t efi_guid_event_group_exit_boot_services; | |
267 | /* event group SetVirtualAddressMap() invoked */ | |
268 | extern const efi_guid_t efi_guid_event_group_virtual_address_change; | |
269 | /* event group memory map changed */ | |
270 | extern const efi_guid_t efi_guid_event_group_memory_map_change; | |
271 | /* event group boot manager about to boot */ | |
272 | extern const efi_guid_t efi_guid_event_group_ready_to_boot; | |
273 | /* event group ResetSystem() invoked (before ExitBootServices) */ | |
274 | extern const efi_guid_t efi_guid_event_group_reset_system; | |
bc4f9133 HS |
275 | /* GUID of the device tree table */ |
276 | extern const efi_guid_t efi_guid_fdt; | |
cb149c66 | 277 | extern const efi_guid_t efi_guid_loaded_image; |
bc8fc328 | 278 | extern const efi_guid_t efi_guid_loaded_image_device_path; |
cc5b7081 | 279 | extern const efi_guid_t efi_guid_device_path_to_text_protocol; |
2a92080d RC |
280 | extern const efi_guid_t efi_simple_file_system_protocol_guid; |
281 | extern const efi_guid_t efi_file_info_guid; | |
9e6835e6 HS |
282 | /* GUID for file system information */ |
283 | extern const efi_guid_t efi_file_system_info_guid; | |
e70f8dfa | 284 | extern const efi_guid_t efi_guid_device_path_utilities_protocol; |
b1b782d3 HS |
285 | /* GUID of the deprecated Unicode collation protocol */ |
286 | extern const efi_guid_t efi_guid_unicode_collation_protocol; | |
b6f11098 HS |
287 | /* GUIDs of the Load File and Load File2 protocol */ |
288 | extern const efi_guid_t efi_guid_load_file_protocol; | |
289 | extern const efi_guid_t efi_guid_load_file2_protocol; | |
0bc4b0da | 290 | /* GUID of the Unicode collation protocol */ |
95ab3816 | 291 | extern const efi_guid_t efi_guid_unicode_collation_protocol2; |
cb728e51 AT |
292 | extern const efi_guid_t efi_guid_hii_config_routing_protocol; |
293 | extern const efi_guid_t efi_guid_hii_config_access_protocol; | |
c9bfb222 LL |
294 | extern const efi_guid_t efi_guid_hii_database_protocol; |
295 | extern const efi_guid_t efi_guid_hii_string_protocol; | |
593e17d6 AT |
296 | /* GUIDs for authentication */ |
297 | extern const efi_guid_t efi_guid_image_security_database; | |
298 | extern const efi_guid_t efi_guid_sha256; | |
299 | extern const efi_guid_t efi_guid_cert_x509; | |
300 | extern const efi_guid_t efi_guid_cert_x509_sha256; | |
767f6eeb | 301 | extern const efi_guid_t efi_guid_cert_type_pkcs7; |
cb149c66 | 302 | |
33c37d97 SG |
303 | /* GUID of RNG protocol */ |
304 | extern const efi_guid_t efi_guid_rng_protocol; | |
2bc27ca8 AT |
305 | /* GUID of capsule update result */ |
306 | extern const efi_guid_t efi_guid_capsule_report; | |
8d99026f AT |
307 | /* GUID of firmware management protocol */ |
308 | extern const efi_guid_t efi_guid_firmware_management_protocol; | |
64a8aae1 JM |
309 | /* GUID for the ESRT */ |
310 | extern const efi_guid_t efi_esrt_guid; | |
3d49ee85 MK |
311 | /* GUID of the SMBIOS table */ |
312 | extern const efi_guid_t smbios_guid; | |
33c37d97 | 313 | |
2bdc6f57 MB |
314 | extern char __efi_runtime_start[], __efi_runtime_stop[]; |
315 | extern char __efi_runtime_rel_start[], __efi_runtime_rel_stop[]; | |
50149ea3 | 316 | |
1f1075c6 HS |
317 | /** |
318 | * struct efi_open_protocol_info_item - open protocol info item | |
319 | * | |
fe1599da HS |
320 | * When a protocol is opened a open protocol info entry is created. |
321 | * These are maintained in a list. | |
1f1075c6 HS |
322 | * |
323 | * @link: link to the list of open protocol info entries of a protocol | |
324 | * @info: information about the opening of a protocol | |
fe1599da HS |
325 | */ |
326 | struct efi_open_protocol_info_item { | |
fe1599da HS |
327 | struct list_head link; |
328 | struct efi_open_protocol_info_entry info; | |
329 | }; | |
330 | ||
1f1075c6 HS |
331 | /** |
332 | * struct efi_handler - single protocol interface of a handle | |
333 | * | |
bee91169 AG |
334 | * When the UEFI payload wants to open a protocol on an object to get its |
335 | * interface (usually a struct with callback functions), this struct maps the | |
fe1599da | 336 | * protocol GUID to the respective protocol interface |
1f1075c6 HS |
337 | * |
338 | * @link: link to the list of protocols of a handle | |
339 | * @guid: GUID of the protocol | |
340 | * @protocol_interface: protocol interface | |
c6f077a2 | 341 | * @open_infos: link to the list of open protocol info items |
fe1599da | 342 | */ |
bee91169 | 343 | struct efi_handler { |
69fb6b1a | 344 | struct list_head link; |
66028930 | 345 | const efi_guid_t guid; |
b5349f74 | 346 | void *protocol_interface; |
fe1599da | 347 | struct list_head open_infos; |
bee91169 AG |
348 | }; |
349 | ||
cd73aba6 HS |
350 | /** |
351 | * enum efi_object_type - type of EFI object | |
352 | * | |
353 | * In UnloadImage we must be able to identify if the handle relates to a | |
354 | * started image. | |
355 | */ | |
356 | enum efi_object_type { | |
c6f077a2 | 357 | /** @EFI_OBJECT_TYPE_UNDEFINED: undefined image type */ |
cd73aba6 | 358 | EFI_OBJECT_TYPE_UNDEFINED = 0, |
c6f077a2 | 359 | /** @EFI_OBJECT_TYPE_U_BOOT_FIRMWARE: U-Boot firmware */ |
84a918e8 | 360 | EFI_OBJECT_TYPE_U_BOOT_FIRMWARE, |
c6f077a2 | 361 | /** @EFI_OBJECT_TYPE_LOADED_IMAGE: loaded image (not started) */ |
cd73aba6 | 362 | EFI_OBJECT_TYPE_LOADED_IMAGE, |
c6f077a2 | 363 | /** @EFI_OBJECT_TYPE_STARTED_IMAGE: started image */ |
cd73aba6 HS |
364 | EFI_OBJECT_TYPE_STARTED_IMAGE, |
365 | }; | |
366 | ||
fae0118e HS |
367 | /** |
368 | * struct efi_object - dereferenced EFI handle | |
369 | * | |
370 | * @link: pointers to put the handle into a linked list | |
371 | * @protocols: linked list with the protocol interfaces installed on this | |
372 | * handle | |
c6f077a2 | 373 | * @type: image type if the handle relates to an image |
fae0118e HS |
374 | * |
375 | * UEFI offers a flexible and expandable object model. The objects in the UEFI | |
376 | * API are devices, drivers, and loaded images. struct efi_object is our storage | |
377 | * structure for these objects. | |
378 | * | |
379 | * When including this structure into a larger structure always put it first so | |
380 | * that when deleting a handle the whole encompassing structure can be freed. | |
bee91169 | 381 | * |
fae0118e HS |
382 | * A pointer to this structure is referred to as a handle. Typedef efi_handle_t |
383 | * has been created for such pointers. | |
bee91169 AG |
384 | */ |
385 | struct efi_object { | |
386 | /* Every UEFI object is part of a global object list */ | |
387 | struct list_head link; | |
69fb6b1a HS |
388 | /* The list of protocols */ |
389 | struct list_head protocols; | |
cd73aba6 | 390 | enum efi_object_type type; |
bee91169 AG |
391 | }; |
392 | ||
4540dabd AT |
393 | enum efi_image_auth_status { |
394 | EFI_IMAGE_AUTH_FAILED = 0, | |
395 | EFI_IMAGE_AUTH_PASSED, | |
396 | }; | |
397 | ||
c982874e HS |
398 | /** |
399 | * struct efi_loaded_image_obj - handle of a loaded image | |
d39646a3 HS |
400 | * |
401 | * @header: EFI object header | |
556d8dc9 HS |
402 | * @exit_status: exit status passed to Exit() |
403 | * @exit_data_size: exit data size passed to Exit() | |
404 | * @exit_data: exit data passed to Exit() | |
0ce3fb55 | 405 | * @exit_jmp: long jump buffer for returning from started image |
d39646a3 | 406 | * @entry: entry address of the relocated image |
0ce3fb55 HS |
407 | * @image_type: indicates if the image is an applicition or a driver |
408 | * @auth_status: indicates if the image is authenticated | |
c982874e HS |
409 | */ |
410 | struct efi_loaded_image_obj { | |
d39646a3 | 411 | struct efi_object header; |
f8212f09 | 412 | efi_status_t *exit_status; |
556d8dc9 HS |
413 | efi_uintn_t *exit_data_size; |
414 | u16 **exit_data; | |
f8212f09 | 415 | struct jmp_buf_data *exit_jmp; |
c982874e HS |
416 | EFIAPI efi_status_t (*entry)(efi_handle_t image_handle, |
417 | struct efi_system_table *st); | |
126a43f1 | 418 | u16 image_type; |
4540dabd | 419 | enum efi_image_auth_status auth_status; |
c982874e HS |
420 | }; |
421 | ||
c6841592 HS |
422 | /** |
423 | * struct efi_event | |
424 | * | |
43bce442 | 425 | * @link: Link to list of all events |
7a69e97b | 426 | * @queue_link: Link to the list of queued events |
c6841592 HS |
427 | * @type: Type of event, see efi_create_event |
428 | * @notify_tpl: Task priority level of notifications | |
c6f077a2 | 429 | * @notify_function: Function to call when the event is triggered |
c6841592 | 430 | * @notify_context: Data to be passed to the notify function |
b095f3c8 | 431 | * @group: Event group |
43bce442 HS |
432 | * @trigger_time: Period of the timer |
433 | * @trigger_next: Next time to trigger the timer | |
c6841592 | 434 | * @trigger_type: Type of timer, see efi_set_timer |
43bce442 | 435 | * @is_signaled: The event occurred. The event is in the signaled state. |
c6841592 HS |
436 | */ |
437 | struct efi_event { | |
43bce442 | 438 | struct list_head link; |
7a69e97b | 439 | struct list_head queue_link; |
b521d29e | 440 | uint32_t type; |
152cade3 | 441 | efi_uintn_t notify_tpl; |
c6841592 HS |
442 | void (EFIAPI *notify_function)(struct efi_event *event, void *context); |
443 | void *notify_context; | |
b095f3c8 | 444 | const efi_guid_t *group; |
c6841592 HS |
445 | u64 trigger_next; |
446 | u64 trigger_time; | |
b521d29e | 447 | enum efi_timer_delay trigger_type; |
e190e897 | 448 | bool is_signaled; |
c6841592 HS |
449 | }; |
450 | ||
bee91169 AG |
451 | /* This list contains all UEFI objects we know of */ |
452 | extern struct list_head efi_obj_list; | |
b095f3c8 HS |
453 | /* List of all events */ |
454 | extern struct list_head efi_events; | |
bee91169 | 455 | |
f09cea36 HS |
456 | /** |
457 | * struct efi_protocol_notification - handle for notified protocol | |
458 | * | |
459 | * When a protocol interface is installed for which an event was registered with | |
460 | * the RegisterProtocolNotify() service this structure is used to hold the | |
461 | * handle on which the protocol interface was installed. | |
462 | * | |
463 | * @link: link to list of all handles notified for this event | |
464 | * @handle: handle on which the notified protocol interface was installed | |
465 | */ | |
466 | struct efi_protocol_notification { | |
467 | struct list_head link; | |
468 | efi_handle_t handle; | |
469 | }; | |
470 | ||
ab15d414 | 471 | /** |
c6f077a2 HS |
472 | * struct efi_register_notify_event - event registered by |
473 | * RegisterProtocolNotify() | |
ab15d414 HS |
474 | * |
475 | * The address of this structure serves as registration value. | |
476 | * | |
f09cea36 HS |
477 | * @link: link to list of all registered events |
478 | * @event: registered event. The same event may registered for multiple | |
479 | * GUIDs. | |
480 | * @protocol: protocol for which the event is registered | |
481 | * @handles: linked list of all handles on which the notified protocol was | |
482 | * installed | |
ab15d414 HS |
483 | */ |
484 | struct efi_register_notify_event { | |
485 | struct list_head link; | |
486 | struct efi_event *event; | |
487 | efi_guid_t protocol; | |
f09cea36 | 488 | struct list_head handles; |
ab15d414 HS |
489 | }; |
490 | ||
491 | /* List of all events registered by RegisterProtocolNotify() */ | |
492 | extern struct list_head efi_register_notify_events; | |
493 | ||
056b45bc AT |
494 | /* Initialize efi execution environment */ |
495 | efi_status_t efi_init_obj_list(void); | |
f64f2232 HS |
496 | /* Install device tree */ |
497 | efi_status_t efi_install_fdt(void *fdt); | |
f9ceb6ac HS |
498 | /* Run loaded UEFI image */ |
499 | efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size); | |
88192098 HS |
500 | /* Initialize variable services */ |
501 | efi_status_t efi_init_variables(void); | |
29018abb HS |
502 | /* Notify ExitBootServices() is called */ |
503 | void efi_variables_boot_exit_notify(void); | |
fdff03e5 | 504 | efi_status_t efi_tcg2_notify_exit_boot_services_failed(void); |
8fc4e0b4 | 505 | /* Measure efi application invocation */ |
ce3dbc5d | 506 | efi_status_t efi_tcg2_measure_efi_app_invocation(struct efi_loaded_image_obj *handle); |
8fc4e0b4 MK |
507 | /* Measure efi application exit */ |
508 | efi_status_t efi_tcg2_measure_efi_app_exit(void); | |
4e6b5d65 HS |
509 | /* Called by bootefi to initialize root node */ |
510 | efi_status_t efi_root_node_register(void); | |
640adadf HS |
511 | /* Called by bootefi to initialize runtime */ |
512 | efi_status_t efi_initialize_system_table(void); | |
7f95104d HS |
513 | /* efi_runtime_detach() - detach unimplemented runtime functions */ |
514 | void efi_runtime_detach(void); | |
a44d2a23 HS |
515 | /* efi_convert_pointer() - convert pointer to virtual address */ |
516 | efi_status_t EFIAPI efi_convert_pointer(efi_uintn_t debug_disposition, | |
517 | void **address); | |
94686f60 HS |
518 | /* Carve out DT reserved memory ranges */ |
519 | void efi_carve_out_dt_rsv(void *fdt); | |
a2f1482f IA |
520 | /* Purge unused kaslr-seed */ |
521 | void efi_try_purge_kaslr_seed(void *fdt); | |
91be9a77 | 522 | /* Called by bootefi to make console interface available */ |
6f566c23 | 523 | efi_status_t efi_console_register(void); |
2a22d05d | 524 | /* Called by bootefi to make all disk storage accessible as EFI objects */ |
df9cf561 | 525 | efi_status_t efi_disk_register(void); |
b59c13d4 HS |
526 | /* Called by efi_init_obj_list() to install EFI_RNG_PROTOCOL */ |
527 | efi_status_t efi_rng_register(void); | |
c1c02105 IA |
528 | /* Called by efi_init_obj_list() to install EFI_TCG2_PROTOCOL */ |
529 | efi_status_t efi_tcg2_register(void); | |
1ccf8716 S |
530 | /* Called by efi_init_obj_list() to install RISCV_EFI_BOOT_PROTOCOL */ |
531 | efi_status_t efi_riscv_register(void); | |
54bec17f MK |
532 | /* Called by efi_init_obj_list() to do initial measurement */ |
533 | efi_status_t efi_tcg2_do_initial_measurement(void); | |
163a0d7e MK |
534 | /* measure the pe-coff image, extend PCR and add Event Log */ |
535 | efi_status_t tcg2_measure_pe_image(void *efi, u64 efi_size, | |
536 | struct efi_loaded_image_obj *handle, | |
537 | struct efi_loaded_image *loaded_image_info); | |
64e4db0f HS |
538 | /* Create handles and protocols for the partitions of a block device */ |
539 | int efi_disk_create_partitions(efi_handle_t parent, struct blk_desc *desc, | |
540 | const char *if_typename, int diskid, | |
541 | const char *pdevname); | |
41fd5068 AT |
542 | /* Check if it is EFI system partition */ |
543 | bool efi_disk_is_system_part(efi_handle_t handle); | |
be8d3241 | 544 | /* Called by bootefi to make GOP (graphical) interface available */ |
80ea9b09 | 545 | efi_status_t efi_gop_register(void); |
0efe1bcf | 546 | /* Called by bootefi to make the network interface available */ |
075d425d | 547 | efi_status_t efi_net_register(void); |
b3d60900 | 548 | /* Called by bootefi to make the watchdog available */ |
d7b181d5 | 549 | efi_status_t efi_watchdog_register(void); |
ec80b473 | 550 | efi_status_t efi_initrd_register(void); |
53f6a5aa | 551 | void efi_initrd_deregister(void); |
e663b350 | 552 | /* Called by bootefi to make SMBIOS tables available */ |
86df34d4 BM |
553 | /** |
554 | * efi_acpi_register() - write out ACPI tables | |
555 | * | |
556 | * Called by bootefi to make ACPI tables available | |
557 | * | |
185f812c | 558 | * Return: 0 if OK, -ENOMEM if no memory is available for the tables |
86df34d4 BM |
559 | */ |
560 | efi_status_t efi_acpi_register(void); | |
0864c565 SG |
561 | /** |
562 | * efi_smbios_register() - write out SMBIOS tables | |
563 | * | |
564 | * Called by bootefi to make SMBIOS tables available | |
565 | * | |
185f812c | 566 | * Return: 0 if OK, -ENOMEM if no memory is available for the tables |
0864c565 | 567 | */ |
7657152b | 568 | efi_status_t efi_smbios_register(void); |
0efe1bcf | 569 | |
2a92080d RC |
570 | struct efi_simple_file_system_protocol * |
571 | efi_fs_from_path(struct efi_device_path *fp); | |
572 | ||
b3d60900 HS |
573 | /* Called by efi_set_watchdog_timer to reset the timer */ |
574 | efi_status_t efi_set_watchdog(unsigned long timeout); | |
0efe1bcf | 575 | |
bee91169 AG |
576 | /* Called from places to check whether a timer expired */ |
577 | void efi_timer_check(void); | |
5dad05a0 HS |
578 | /* Check if a buffer contains a PE-COFF image */ |
579 | efi_status_t efi_check_pe(void *buffer, size_t size, void **nt_header); | |
bee91169 | 580 | /* PE loader implementation */ |
4540dabd AT |
581 | efi_status_t efi_load_pe(struct efi_loaded_image_obj *handle, |
582 | void *efi, size_t efi_size, | |
8f7e2b29 | 583 | struct efi_loaded_image *loaded_image_info); |
bee91169 AG |
584 | /* Called once to store the pristine gd pointer */ |
585 | void efi_save_gd(void); | |
50149ea3 AG |
586 | /* Call this to relocate the runtime section to an address space */ |
587 | void efi_runtime_relocate(ulong offset, struct efi_mem_desc *map); | |
44549d62 | 588 | /* Add a new object to the object list. */ |
fae0118e | 589 | void efi_add_handle(efi_handle_t obj); |
2edab5e2 | 590 | /* Create handle */ |
2074f700 | 591 | efi_status_t efi_create_handle(efi_handle_t *handle); |
678e03a0 | 592 | /* Delete handle */ |
fae0118e | 593 | void efi_delete_handle(efi_handle_t obj); |
1b68153a | 594 | /* Call this to validate a handle and find the EFI object for it */ |
2074f700 | 595 | struct efi_object *efi_search_obj(const efi_handle_t handle); |
d7e0b010 AT |
596 | /* Load image */ |
597 | efi_status_t EFIAPI efi_load_image(bool boot_policy, | |
598 | efi_handle_t parent_image, | |
599 | struct efi_device_path *file_path, | |
600 | void *source_buffer, | |
601 | efi_uintn_t source_size, | |
602 | efi_handle_t *image_handle); | |
f69d63fa HS |
603 | /* Start image */ |
604 | efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle, | |
605 | efi_uintn_t *exit_data_size, | |
606 | u16 **exit_data); | |
d7e0b010 AT |
607 | /* Unload image */ |
608 | efi_status_t EFIAPI efi_unload_image(efi_handle_t image_handle); | |
3f79a2b5 | 609 | /* Find a protocol on a handle */ |
2074f700 | 610 | efi_status_t efi_search_protocol(const efi_handle_t handle, |
3f79a2b5 HS |
611 | const efi_guid_t *protocol_guid, |
612 | struct efi_handler **handler); | |
613 | /* Install new protocol on a handle */ | |
2074f700 HS |
614 | efi_status_t efi_add_protocol(const efi_handle_t handle, |
615 | const efi_guid_t *protocol, | |
3f79a2b5 | 616 | void *protocol_interface); |
f9ad240e HS |
617 | /* Open protocol */ |
618 | efi_status_t efi_protocol_open(struct efi_handler *handler, | |
619 | void **protocol_interface, void *agent_handle, | |
620 | void *controller_handle, uint32_t attributes); | |
621 | ||
3f79a2b5 | 622 | /* Delete protocol from a handle */ |
2074f700 HS |
623 | efi_status_t efi_remove_protocol(const efi_handle_t handle, |
624 | const efi_guid_t *protocol, | |
3f79a2b5 HS |
625 | void *protocol_interface); |
626 | /* Delete all protocols from a handle */ | |
2074f700 | 627 | efi_status_t efi_remove_all_protocols(const efi_handle_t handle); |
7657ae12 HS |
628 | /* Install multiple protocol interfaces */ |
629 | efi_status_t EFIAPI efi_install_multiple_protocol_interfaces | |
630 | (efi_handle_t *handle, ...); | |
b51ec639 AT |
631 | /* Get handles that support a given protocol */ |
632 | efi_status_t EFIAPI efi_locate_handle_buffer( | |
633 | enum efi_locate_search_type search_type, | |
634 | const efi_guid_t *protocol, void *search_key, | |
635 | efi_uintn_t *no_handles, efi_handle_t **buffer); | |
636 | /* Close an previously opened protocol interface */ | |
637 | efi_status_t EFIAPI efi_close_protocol(efi_handle_t handle, | |
638 | const efi_guid_t *protocol, | |
639 | efi_handle_t agent_handle, | |
640 | efi_handle_t controller_handle); | |
641 | /* Open a protocol interface */ | |
642 | efi_status_t EFIAPI efi_handle_protocol(efi_handle_t handle, | |
643 | const efi_guid_t *protocol, | |
644 | void **protocol_interface); | |
49deb455 | 645 | /* Call this to create an event */ |
152cade3 | 646 | efi_status_t efi_create_event(uint32_t type, efi_uintn_t notify_tpl, |
49deb455 HS |
647 | void (EFIAPI *notify_function) ( |
648 | struct efi_event *event, | |
649 | void *context), | |
b095f3c8 HS |
650 | void *notify_context, efi_guid_t *group, |
651 | struct efi_event **event); | |
bfc72462 | 652 | /* Call this to set a timer */ |
b521d29e | 653 | efi_status_t efi_set_timer(struct efi_event *event, enum efi_timer_delay type, |
bfc72462 | 654 | uint64_t trigger_time); |
91be9a77 | 655 | /* Call this to signal an event */ |
7eaa900e | 656 | void efi_signal_event(struct efi_event *event); |
50149ea3 | 657 | |
2a92080d RC |
658 | /* open file system: */ |
659 | struct efi_simple_file_system_protocol *efi_simple_file_system( | |
660 | struct blk_desc *desc, int part, struct efi_device_path *dp); | |
661 | ||
662 | /* open file from device-path: */ | |
663 | struct efi_file_handle *efi_file_from_path(struct efi_device_path *fp); | |
664 | ||
64a8aae1 JM |
665 | /* Registers a callback function for a notification event. */ |
666 | efi_status_t EFIAPI efi_register_protocol_notify(const efi_guid_t *protocol, | |
667 | struct efi_event *event, | |
668 | void **registration); | |
37c3ca5c IA |
669 | efi_status_t efi_file_size(struct efi_file_handle *fh, efi_uintn_t *size); |
670 | ||
671 | /* get a device path from a Boot#### option */ | |
672 | struct efi_device_path *efi_get_dp_from_boot(const efi_guid_t guid); | |
673 | ||
c3772ca1 HS |
674 | /** |
675 | * efi_size_in_pages() - convert size in bytes to size in pages | |
676 | * | |
677 | * This macro returns the number of EFI memory pages required to hold 'size' | |
678 | * bytes. | |
679 | * | |
680 | * @size: size in bytes | |
681 | * Return: size in pages | |
682 | */ | |
0a7e5165 | 683 | #define efi_size_in_pages(size) (((size) + EFI_PAGE_MASK) >> EFI_PAGE_SHIFT) |
5d00995c AG |
684 | /* Generic EFI memory allocator, call this to get memory */ |
685 | void *efi_alloc(uint64_t len, int memory_type); | |
ebdea88d IA |
686 | /* Allocate pages on the specified alignment */ |
687 | void *efi_alloc_aligned_pages(u64 len, int memory_type, size_t align); | |
5d00995c | 688 | /* More specific EFI memory allocator, called by EFI payloads */ |
49d225e7 HS |
689 | efi_status_t efi_allocate_pages(enum efi_allocate_type type, |
690 | enum efi_memory_type memory_type, | |
691 | efi_uintn_t pages, uint64_t *memory); | |
b61d857b | 692 | /* EFI memory free function. */ |
f5a2a938 | 693 | efi_status_t efi_free_pages(uint64_t memory, efi_uintn_t pages); |
ead1274b | 694 | /* EFI memory allocator for small allocations */ |
49d225e7 HS |
695 | efi_status_t efi_allocate_pool(enum efi_memory_type pool_type, |
696 | efi_uintn_t size, void **buffer); | |
42417bc8 SB |
697 | /* EFI pool memory free function. */ |
698 | efi_status_t efi_free_pool(void *buffer); | |
5d00995c | 699 | /* Returns the EFI memory map */ |
f5a2a938 | 700 | efi_status_t efi_get_memory_map(efi_uintn_t *memory_map_size, |
5d00995c | 701 | struct efi_mem_desc *memory_map, |
f5a2a938 HS |
702 | efi_uintn_t *map_key, |
703 | efi_uintn_t *descriptor_size, | |
5d00995c AG |
704 | uint32_t *descriptor_version); |
705 | /* Adds a range into the EFI memory map */ | |
714497e3 | 706 | efi_status_t efi_add_memory_map(u64 start, u64 size, int memory_type); |
b5b9eff2 PA |
707 | /* Adds a conventional range into the EFI memory map */ |
708 | efi_status_t efi_add_conventional_memory_map(u64 ram_start, u64 ram_end, | |
709 | u64 ram_top); | |
710 | ||
05ef48a2 | 711 | /* Called by board init to initialize the EFI drivers */ |
038782a2 | 712 | efi_status_t efi_driver_init(void); |
5d00995c AG |
713 | /* Called by board init to initialize the EFI memory map */ |
714 | int efi_memory_init(void); | |
488bf12d AG |
715 | /* Adds new or overrides configuration table entry to the system table */ |
716 | efi_status_t efi_install_configuration_table(const efi_guid_t *guid, void *table); | |
56d92888 | 717 | /* Sets up a loaded image */ |
c982874e HS |
718 | efi_status_t efi_setup_loaded_image(struct efi_device_path *device_path, |
719 | struct efi_device_path *file_path, | |
720 | struct efi_loaded_image_obj **handle_ptr, | |
721 | struct efi_loaded_image **info_ptr); | |
5d00995c | 722 | |
51735ae0 AG |
723 | #ifdef CONFIG_EFI_LOADER_BOUNCE_BUFFER |
724 | extern void *efi_bounce_buffer; | |
725 | #define EFI_LOADER_BOUNCE_BUFFER_SIZE (64 * 1024 * 1024) | |
726 | #endif | |
727 | ||
83994886 HS |
728 | /* shorten device path */ |
729 | struct efi_device_path *efi_dp_shorten(struct efi_device_path *dp); | |
b66c60dd | 730 | struct efi_device_path *efi_dp_next(const struct efi_device_path *dp); |
ff401d3f HS |
731 | int efi_dp_match(const struct efi_device_path *a, |
732 | const struct efi_device_path *b); | |
b66c60dd RC |
733 | struct efi_object *efi_dp_find_obj(struct efi_device_path *dp, |
734 | struct efi_device_path **rem); | |
f6dd3f35 HS |
735 | /* get size of the first device path instance excluding end node */ |
736 | efi_uintn_t efi_dp_instance_size(const struct efi_device_path *dp); | |
737 | /* size of multi-instance device path excluding end node */ | |
738 | efi_uintn_t efi_dp_size(const struct efi_device_path *dp); | |
b66c60dd RC |
739 | struct efi_device_path *efi_dp_dup(const struct efi_device_path *dp); |
740 | struct efi_device_path *efi_dp_append(const struct efi_device_path *dp1, | |
741 | const struct efi_device_path *dp2); | |
742 | struct efi_device_path *efi_dp_append_node(const struct efi_device_path *dp, | |
743 | const struct efi_device_path *node); | |
211314c1 HS |
744 | /* Create a device path node of given type, sub-type, length */ |
745 | struct efi_device_path *efi_dp_create_device_node(const u8 type, | |
746 | const u8 sub_type, | |
747 | const u16 length); | |
3acef5da HS |
748 | /* Append device path instance */ |
749 | struct efi_device_path *efi_dp_append_instance( | |
750 | const struct efi_device_path *dp, | |
751 | const struct efi_device_path *dpi); | |
752 | /* Get next device path instance */ | |
753 | struct efi_device_path *efi_dp_get_next_instance(struct efi_device_path **dp, | |
754 | efi_uintn_t *size); | |
755 | /* Check if a device path contains muliple instances */ | |
756 | bool efi_dp_is_multi_instance(const struct efi_device_path *dp); | |
b66c60dd | 757 | |
b66c60dd | 758 | struct efi_device_path *efi_dp_from_part(struct blk_desc *desc, int part); |
98d48bdf HS |
759 | /* Create a device node for a block device partition. */ |
760 | struct efi_device_path *efi_dp_part_node(struct blk_desc *desc, int part); | |
b66c60dd RC |
761 | struct efi_device_path *efi_dp_from_file(struct blk_desc *desc, int part, |
762 | const char *path); | |
763 | struct efi_device_path *efi_dp_from_eth(void); | |
bf19273e RC |
764 | struct efi_device_path *efi_dp_from_mem(uint32_t mem_type, |
765 | uint64_t start_address, | |
766 | uint64_t end_address); | |
65436f91 HS |
767 | /* Determine the last device path node that is not the end node. */ |
768 | const struct efi_device_path *efi_dp_last_node( | |
769 | const struct efi_device_path *dp); | |
04298686 HS |
770 | efi_status_t efi_dp_split_file_path(struct efi_device_path *full_path, |
771 | struct efi_device_path **device_path, | |
772 | struct efi_device_path **file_path); | |
3c95b323 | 773 | struct efi_device_path *efi_dp_from_uart(void); |
f1589ffb AT |
774 | efi_status_t efi_dp_from_name(const char *dev, const char *devnr, |
775 | const char *path, | |
776 | struct efi_device_path **device, | |
777 | struct efi_device_path **file); | |
5cad4a30 HS |
778 | ssize_t efi_dp_check_length(const struct efi_device_path *dp, |
779 | const size_t maxlen); | |
b66c60dd RC |
780 | |
781 | #define EFI_DP_TYPE(_dp, _type, _subtype) \ | |
782 | (((_dp)->type == DEVICE_PATH_TYPE_##_type) && \ | |
783 | ((_dp)->sub_type == DEVICE_PATH_SUB_TYPE_##_subtype)) | |
784 | ||
e771b4b3 AT |
785 | /* Indicate supported runtime services */ |
786 | efi_status_t efi_init_runtime_supported(void); | |
787 | ||
a39f39cd HS |
788 | /* Update CRC32 in table header */ |
789 | void __efi_runtime efi_update_table_header_crc32(struct efi_table_hdr *table); | |
790 | ||
80a4800e AG |
791 | /* Boards may provide the functions below to implement RTS functionality */ |
792 | ||
3c63db9c | 793 | void __efi_runtime EFIAPI efi_reset_system( |
80a4800e AG |
794 | enum efi_reset_type reset_type, |
795 | efi_status_t reset_status, | |
796 | unsigned long data_size, void *reset_data); | |
22c793e6 HS |
797 | |
798 | /* Architecture specific initialization of the EFI subsystem */ | |
799 | efi_status_t efi_reset_system_init(void); | |
80a4800e | 800 | |
3c63db9c | 801 | efi_status_t __efi_runtime EFIAPI efi_get_time( |
80a4800e AG |
802 | struct efi_time *time, |
803 | struct efi_time_cap *capabilities); | |
80a4800e | 804 | |
656f1710 HS |
805 | efi_status_t __efi_runtime EFIAPI efi_set_time(struct efi_time *time); |
806 | ||
623b3a57 HS |
807 | #ifdef CONFIG_CMD_BOOTEFI_SELFTEST |
808 | /* | |
809 | * Entry point for the tests of the EFI API. | |
810 | * It is called by 'bootefi selftest' | |
811 | */ | |
812 | efi_status_t EFIAPI efi_selftest(efi_handle_t image_handle, | |
813 | struct efi_system_table *systab); | |
814 | #endif | |
815 | ||
0bda81bf HS |
816 | efi_status_t EFIAPI efi_get_variable(u16 *variable_name, |
817 | const efi_guid_t *vendor, u32 *attributes, | |
818 | efi_uintn_t *data_size, void *data); | |
45c66f9c HS |
819 | efi_status_t EFIAPI efi_get_next_variable_name(efi_uintn_t *variable_name_size, |
820 | u16 *variable_name, | |
7a4e717b | 821 | efi_guid_t *vendor); |
0bda81bf HS |
822 | efi_status_t EFIAPI efi_set_variable(u16 *variable_name, |
823 | const efi_guid_t *vendor, u32 attributes, | |
452257a3 | 824 | efi_uintn_t data_size, const void *data); |
ad644e7c | 825 | |
ce43528d HS |
826 | efi_status_t EFIAPI efi_query_variable_info( |
827 | u32 attributes, u64 *maximum_variable_storage_size, | |
828 | u64 *remaining_variable_storage_size, | |
829 | u64 *maximum_variable_size); | |
830 | ||
d47671c6 | 831 | void *efi_get_var(const u16 *name, const efi_guid_t *vendor, efi_uintn_t *size); |
37c3ca5c | 832 | |
1a82b341 AT |
833 | /* |
834 | * See section 3.1.3 in the v2.7 UEFI spec for more details on | |
835 | * the layout of EFI_LOAD_OPTION. In short it is: | |
836 | * | |
837 | * typedef struct _EFI_LOAD_OPTION { | |
838 | * UINT32 Attributes; | |
839 | * UINT16 FilePathListLength; | |
840 | * // CHAR16 Description[]; <-- variable length, NULL terminated | |
841 | * // EFI_DEVICE_PATH_PROTOCOL FilePathList[]; | |
842 | * <-- FilePathListLength bytes | |
843 | * // UINT8 OptionalData[]; | |
844 | * } EFI_LOAD_OPTION; | |
845 | */ | |
846 | struct efi_load_option { | |
847 | u32 attributes; | |
848 | u16 file_path_length; | |
849 | u16 *label; | |
850 | struct efi_device_path *file_path; | |
39a1ff8c | 851 | const u8 *optional_data; |
1a82b341 AT |
852 | }; |
853 | ||
76e8acce | 854 | struct efi_device_path *efi_dp_from_lo(struct efi_load_option *lo, |
0421735d | 855 | const efi_guid_t *guid); |
76e8acce IA |
856 | struct efi_device_path *efi_dp_concat(const struct efi_device_path *dp1, |
857 | const struct efi_device_path *dp2); | |
ce3dbc5d | 858 | struct efi_device_path *search_gpt_dp_node(struct efi_device_path *device_path); |
0e69bcfb HS |
859 | efi_status_t efi_deserialize_load_option(struct efi_load_option *lo, u8 *data, |
860 | efi_uintn_t *size); | |
1a82b341 | 861 | unsigned long efi_serialize_load_option(struct efi_load_option *lo, u8 **data); |
1064d049 HS |
862 | efi_status_t efi_set_load_options(efi_handle_t handle, |
863 | efi_uintn_t load_options_size, | |
864 | void *load_options); | |
0ad64007 | 865 | efi_status_t efi_bootmgr_load(efi_handle_t *handle, void **load_options); |
9975fe96 | 866 | |
593e17d6 | 867 | /** |
c6f077a2 | 868 | * struct efi_image_regions - A list of memory regions |
593e17d6 AT |
869 | * |
870 | * @max: Maximum number of regions | |
871 | * @num: Number of regions | |
872 | * @reg: array of regions | |
873 | */ | |
874 | struct efi_image_regions { | |
875 | int max; | |
876 | int num; | |
877 | struct image_region reg[]; | |
878 | }; | |
879 | ||
880 | /** | |
c6f077a2 | 881 | * struct efi_sig_data - A decoded data of struct efi_signature_data |
593e17d6 AT |
882 | * |
883 | * This structure represents an internal form of signature in | |
884 | * signature database. A listed list may represent a signature list. | |
885 | * | |
886 | * @next: Pointer to next entry | |
c6f077a2 | 887 | * @owner: Signature owner |
593e17d6 AT |
888 | * @data: Pointer to signature data |
889 | * @size: Size of signature data | |
890 | */ | |
891 | struct efi_sig_data { | |
892 | struct efi_sig_data *next; | |
893 | efi_guid_t owner; | |
894 | void *data; | |
895 | size_t size; | |
896 | }; | |
897 | ||
898 | /** | |
c6f077a2 | 899 | * struct efi_signature_store - A decoded data of signature database |
593e17d6 AT |
900 | * |
901 | * This structure represents an internal form of signature database. | |
902 | * | |
903 | * @next: Pointer to next entry | |
904 | * @sig_type: Signature type | |
905 | * @sig_data_list: Pointer to signature list | |
906 | */ | |
907 | struct efi_signature_store { | |
908 | struct efi_signature_store *next; | |
909 | efi_guid_t sig_type; | |
910 | struct efi_sig_data *sig_data_list; | |
911 | }; | |
912 | ||
913 | struct x509_certificate; | |
914 | struct pkcs7_message; | |
915 | ||
7926dfb5 | 916 | bool efi_signature_lookup_digest(struct efi_image_regions *regs, |
4b634313 IA |
917 | struct efi_signature_store *db, |
918 | bool dbx); | |
1115edd8 AT |
919 | bool efi_signature_verify(struct efi_image_regions *regs, |
920 | struct pkcs7_message *msg, | |
921 | struct efi_signature_store *db, | |
922 | struct efi_signature_store *dbx); | |
52956e53 AT |
923 | static inline bool efi_signature_verify_one(struct efi_image_regions *regs, |
924 | struct pkcs7_message *msg, | |
925 | struct efi_signature_store *db) | |
926 | { | |
927 | return efi_signature_verify(regs, msg, db, NULL); | |
928 | } | |
11bafb25 AT |
929 | bool efi_signature_check_signers(struct pkcs7_message *msg, |
930 | struct efi_signature_store *dbx); | |
593e17d6 AT |
931 | |
932 | efi_status_t efi_image_region_add(struct efi_image_regions *regs, | |
933 | const void *start, const void *end, | |
934 | int nocheck); | |
be6296d0 AT |
935 | |
936 | void efi_sigstore_free(struct efi_signature_store *sigstore); | |
b4f20a5d SG |
937 | struct efi_signature_store *efi_build_signature_store(void *sig_list, |
938 | efi_uintn_t size); | |
be6296d0 | 939 | struct efi_signature_store *efi_sigstore_parse_sigdb(u16 *name); |
767f6eeb AT |
940 | |
941 | bool efi_secure_boot_enabled(void); | |
4540dabd | 942 | |
04be98bd SG |
943 | bool efi_capsule_auth_enabled(void); |
944 | ||
163a0d7e MK |
945 | void *efi_prepare_aligned_image(void *efi, u64 *efi_size); |
946 | ||
4540dabd AT |
947 | bool efi_image_parse(void *efi, size_t len, struct efi_image_regions **regp, |
948 | WIN_CERTIFICATE **auth, size_t *auth_len); | |
593e17d6 | 949 | |
201b8068 SG |
950 | struct pkcs7_message *efi_parse_pkcs7_header(const void *buf, |
951 | size_t buflen, | |
952 | u8 **tmpbuf); | |
953 | ||
b0dd8cb4 HS |
954 | /* runtime implementation of memcpy() */ |
955 | void efi_memcpy_runtime(void *dest, const void *src, size_t n); | |
956 | ||
077153e0 | 957 | /* commonly used helper function */ |
fe179d7f IA |
958 | u16 *efi_create_indexed_name(u16 *buffer, size_t buffer_size, const char *name, |
959 | unsigned int index); | |
077153e0 | 960 | |
f27c2014 | 961 | extern const struct efi_firmware_management_protocol efi_fmp_fit; |
bb7e71d3 | 962 | extern const struct efi_firmware_management_protocol efi_fmp_raw; |
f27c2014 | 963 | |
2bc27ca8 AT |
964 | /* Capsule update */ |
965 | efi_status_t EFIAPI efi_update_capsule( | |
966 | struct efi_capsule_header **capsule_header_array, | |
967 | efi_uintn_t capsule_count, | |
968 | u64 scatter_gather_list); | |
969 | efi_status_t EFIAPI efi_query_capsule_caps( | |
970 | struct efi_capsule_header **capsule_header_array, | |
971 | efi_uintn_t capsule_count, | |
972 | u64 *maximum_capsule_size, | |
973 | u32 *reset_type); | |
974 | ||
04be98bd SG |
975 | efi_status_t efi_capsule_authenticate(const void *capsule, |
976 | efi_uintn_t capsule_size, | |
977 | void **image, efi_uintn_t *image_size); | |
978 | ||
156ccbc3 | 979 | #define EFI_CAPSULE_DIR u"\\EFI\\UpdateCapsule\\" |
c74cd8bd | 980 | |
64a8aae1 JM |
981 | /** |
982 | * Install the ESRT system table. | |
983 | * | |
185f812c | 984 | * Return: status code |
64a8aae1 JM |
985 | */ |
986 | efi_status_t efi_esrt_register(void); | |
987 | ||
988 | /** | |
989 | * efi_esrt_populate() - Populates the ESRT entries from the FMP instances | |
990 | * present in the system. | |
991 | * If an ESRT already exists, the old ESRT is replaced in the system table. | |
992 | * The memory of the old ESRT is deallocated. | |
993 | * | |
994 | * Return: | |
995 | * - EFI_SUCCESS if the ESRT is correctly created | |
996 | * - error code otherwise. | |
997 | */ | |
998 | efi_status_t efi_esrt_populate(void); | |
6e0184b8 | 999 | efi_status_t efi_load_capsule_drivers(void); |
34287efd RG |
1000 | |
1001 | efi_status_t platform_get_eventlog(struct udevice *dev, u64 *addr, u32 *sz); | |
cd9e18de | 1002 | #endif /* _EFI_LOADER_H */ |