]> Git Repo - u-boot.git/blame - include/efi_loader.h
efi_loader: limit output length for VenHw, VenMedia
[u-boot.git] / include / efi_loader.h
CommitLineData
f739fcd8 1/* SPDX-License-Identifier: GPL-2.0+ */
cb149c66
AG
2/*
3 * EFI application loader
4 *
5 * Copyright (c) 2016 Alexander Graf
cb149c66
AG
6 */
7
cd9e18de
HS
8#ifndef _EFI_LOADER_H
9#define _EFI_LOADER_H 1
10
bee91169 11#include <common.h>
e6f6f9e6 12#include <blk.h>
f7ae49fc 13#include <log.h>
cb149c66
AG
14#include <part_efi.h>
15#include <efi_api.h>
d9f3307a 16#include <image.h>
4540dabd 17#include <pe.h>
bee91169 18
e6f6f9e6
SG
19struct blk_desc;
20
fdeb6f7d
SG
21static inline int guidcmp(const void *g1, const void *g2)
22{
23 return memcmp(g1, g2, sizeof(efi_guid_t));
24}
25
61e42d94
SG
26static inline void *guidcpy(void *dst, const void *src)
27{
28 return memcpy(dst, src, sizeof(efi_guid_t));
29}
30
bee91169 31/* No need for efi loader support in SPL */
9b5e6396 32#if CONFIG_IS_ENABLED(EFI_LOADER)
bee91169 33
cb149c66 34#include <linux/list.h>
593e17d6 35#include <linux/oid_registry.h>
cb149c66 36
4182a129
HS
37/* Maximum number of configuration tables */
38#define EFI_MAX_CONFIGURATION_TABLES 16
39
4e6b5d65
HS
40/* GUID used by the root node */
41#define U_BOOT_GUID \
42 EFI_GUID(0xe61d73b9, 0xa384, 0x4acc, \
43 0xae, 0xab, 0x82, 0xe8, 0x28, 0xf3, 0x62, 0x8b)
23ad52ff
AT
44/* GUID used as host device on sandbox */
45#define U_BOOT_HOST_DEV_GUID \
46 EFI_GUID(0xbbe4e671, 0x5773, 0x4ea1, \
47 0x9a, 0xab, 0x3a, 0x7d, 0xbf, 0x40, 0xc4, 0x82)
19ecced7
HS
48/* GUID used as root for virtio devices */
49#define U_BOOT_VIRTIO_DEV_GUID \
50 EFI_GUID(0x63293792, 0xadf5, 0x9325, \
51 0xb9, 0x9f, 0x4e, 0x0e, 0x45, 0x5c, 0x1b, 0x1e)
4e6b5d65 52
7a597259 53/* Use internal device tree when starting UEFI application */
f64f2232 54#define EFI_FDT_USE_INTERNAL NULL
7a597259 55
a2a4bc3b
AT
56/* Root node */
57extern efi_handle_t efi_root;
58
15b1bf10
HS
59/* Set to EFI_SUCCESS when initialized */
60extern efi_status_t efi_obj_list_initialized;
61
fccd3d9c
HS
62/* Flag used by the selftest to avoid detaching devices in ExitBootServices() */
63extern bool efi_st_keep_devices;
64
11078bb2
HS
65/* EFI system partition */
66extern struct efi_system_partition {
67 enum if_type if_type;
68 int devnum;
69 u8 part;
70} efi_system_partition;
71
c160d2f5
RC
72int __efi_entry_check(void);
73int __efi_exit_check(void);
ae0bd3a9 74const char *__efi_nesting(void);
af65db85
RC
75const char *__efi_nesting_inc(void);
76const char *__efi_nesting_dec(void);
c160d2f5 77
a095aadf
RC
78/*
79 * Enter the u-boot world from UEFI:
80 */
bee91169 81#define EFI_ENTRY(format, ...) do { \
c160d2f5 82 assert(__efi_entry_check()); \
af65db85
RC
83 debug("%sEFI: Entry %s(" format ")\n", __efi_nesting_inc(), \
84 __func__, ##__VA_ARGS__); \
bee91169 85 } while(0)
bee91169 86
a095aadf
RC
87/*
88 * Exit the u-boot world back to UEFI:
89 */
804b1d73 90#define EFI_EXIT(ret) ({ \
c81883df 91 typeof(ret) _r = ret; \
af65db85 92 debug("%sEFI: Exit: %s: %u\n", __efi_nesting_dec(), \
c81883df 93 __func__, (u32)((uintptr_t) _r & ~EFI_ERROR_MASK)); \
c160d2f5
RC
94 assert(__efi_exit_check()); \
95 _r; \
804b1d73 96 })
bee91169 97
a095aadf 98/*
ea630ce9 99 * Call non-void UEFI function from u-boot and retrieve return value:
a095aadf 100 */
ea630ce9
HS
101#define EFI_CALL(exp) ({ \
102 debug("%sEFI: Call: %s\n", __efi_nesting_inc(), #exp); \
103 assert(__efi_exit_check()); \
104 typeof(exp) _r = exp; \
105 assert(__efi_entry_check()); \
106 debug("%sEFI: %lu returned by %s\n", __efi_nesting_dec(), \
107 (unsigned long)((uintptr_t)_r & ~EFI_ERROR_MASK), #exp); \
108 _r; \
109})
110
111/*
112 * Call void UEFI function from u-boot:
113 */
114#define EFI_CALL_VOID(exp) do { \
af65db85 115 debug("%sEFI: Call: %s\n", __efi_nesting_inc(), #exp); \
c160d2f5 116 assert(__efi_exit_check()); \
a095aadf 117 exp; \
c160d2f5 118 assert(__efi_entry_check()); \
af65db85 119 debug("%sEFI: Return From: %s\n", __efi_nesting_dec(), #exp); \
a095aadf
RC
120 } while(0)
121
ae0bd3a9 122/*
d5504144 123 * Write an indented message with EFI prefix
ae0bd3a9 124 */
d5504144
HS
125#define EFI_PRINT(format, ...) ({ \
126 debug("%sEFI: " format, __efi_nesting(), \
127 ##__VA_ARGS__); \
ae0bd3a9
HS
128 })
129
89aea436
AG
130#ifdef CONFIG_SYS_CACHELINE_SIZE
131#define EFI_CACHELINE_SIZE CONFIG_SYS_CACHELINE_SIZE
132#else
133/* Just use the greatest cache flush alignment requirement I'm aware of */
134#define EFI_CACHELINE_SIZE 128
135#endif
136
1fcb7ea2
HS
137/* Key identifying current memory map */
138extern efi_uintn_t efi_memory_map_key;
139
50149ea3 140extern struct efi_runtime_services efi_runtime_services;
bee91169
AG
141extern struct efi_system_table systab;
142
ebb4dd5b 143extern struct efi_simple_text_output_protocol efi_con_out;
3e603ec7 144extern struct efi_simple_text_input_protocol efi_con_in;
ebb4dd5b 145extern struct efi_console_control_protocol efi_console_control;
cc5b7081 146extern const struct efi_device_path_to_text_protocol efi_device_path_to_text;
e70f8dfa
LL
147/* implementation of the EFI_DEVICE_PATH_UTILITIES_PROTOCOL */
148extern const struct efi_device_path_utilities_protocol
149 efi_device_path_utilities;
b1b782d3 150/* current version of the EFI_UNICODE_COLLATION_PROTOCOL */
0bc4b0da 151extern const struct efi_unicode_collation_protocol
95ab3816 152 efi_unicode_collation_protocol2;
cb728e51
AT
153extern const struct efi_hii_config_routing_protocol efi_hii_config_routing;
154extern const struct efi_hii_config_access_protocol efi_hii_config_access;
c9bfb222
LL
155extern const struct efi_hii_database_protocol efi_hii_database;
156extern const struct efi_hii_string_protocol efi_hii_string;
c1311ad4 157
adae4313
RC
158uint16_t *efi_dp_str(struct efi_device_path *dp);
159
4e6b5d65
HS
160/* GUID of the U-Boot root node */
161extern const efi_guid_t efi_u_boot_guid;
23ad52ff
AT
162#ifdef CONFIG_SANDBOX
163/* GUID of U-Boot host device on sandbox */
164extern const efi_guid_t efi_guid_host_dev;
165#endif
b3dd14b6
HS
166/* GUID of the EFI_BLOCK_IO_PROTOCOL */
167extern const efi_guid_t efi_block_io_guid;
9975fe96 168extern const efi_guid_t efi_global_variable_guid;
c1311ad4 169extern const efi_guid_t efi_guid_console_control;
cb149c66 170extern const efi_guid_t efi_guid_device_path;
f0959dbe
HS
171/* GUID of the EFI_DRIVER_BINDING_PROTOCOL */
172extern const efi_guid_t efi_guid_driver_binding_protocol;
a3a28f5f
HS
173/* event group ExitBootServices() invoked */
174extern const efi_guid_t efi_guid_event_group_exit_boot_services;
175/* event group SetVirtualAddressMap() invoked */
176extern const efi_guid_t efi_guid_event_group_virtual_address_change;
177/* event group memory map changed */
178extern const efi_guid_t efi_guid_event_group_memory_map_change;
179/* event group boot manager about to boot */
180extern const efi_guid_t efi_guid_event_group_ready_to_boot;
181/* event group ResetSystem() invoked (before ExitBootServices) */
182extern const efi_guid_t efi_guid_event_group_reset_system;
bc4f9133
HS
183/* GUID of the device tree table */
184extern const efi_guid_t efi_guid_fdt;
cb149c66 185extern const efi_guid_t efi_guid_loaded_image;
bc8fc328 186extern const efi_guid_t efi_guid_loaded_image_device_path;
cc5b7081 187extern const efi_guid_t efi_guid_device_path_to_text_protocol;
2a92080d
RC
188extern const efi_guid_t efi_simple_file_system_protocol_guid;
189extern const efi_guid_t efi_file_info_guid;
9e6835e6
HS
190/* GUID for file system information */
191extern const efi_guid_t efi_file_system_info_guid;
e70f8dfa 192extern const efi_guid_t efi_guid_device_path_utilities_protocol;
b1b782d3
HS
193/* GUID of the deprecated Unicode collation protocol */
194extern const efi_guid_t efi_guid_unicode_collation_protocol;
b6f11098
HS
195/* GUIDs of the Load File and Load File2 protocol */
196extern const efi_guid_t efi_guid_load_file_protocol;
197extern const efi_guid_t efi_guid_load_file2_protocol;
0bc4b0da 198/* GUID of the Unicode collation protocol */
95ab3816 199extern const efi_guid_t efi_guid_unicode_collation_protocol2;
cb728e51
AT
200extern const efi_guid_t efi_guid_hii_config_routing_protocol;
201extern const efi_guid_t efi_guid_hii_config_access_protocol;
c9bfb222
LL
202extern const efi_guid_t efi_guid_hii_database_protocol;
203extern const efi_guid_t efi_guid_hii_string_protocol;
593e17d6
AT
204/* GUIDs for authentication */
205extern const efi_guid_t efi_guid_image_security_database;
206extern const efi_guid_t efi_guid_sha256;
207extern const efi_guid_t efi_guid_cert_x509;
208extern const efi_guid_t efi_guid_cert_x509_sha256;
767f6eeb 209extern const efi_guid_t efi_guid_cert_type_pkcs7;
cb149c66 210
33c37d97
SG
211/* GUID of RNG protocol */
212extern const efi_guid_t efi_guid_rng_protocol;
2bc27ca8
AT
213/* GUID of capsule update result */
214extern const efi_guid_t efi_guid_capsule_report;
8d99026f
AT
215/* GUID of firmware management protocol */
216extern const efi_guid_t efi_guid_firmware_management_protocol;
33c37d97 217
50149ea3
AG
218extern unsigned int __efi_runtime_start, __efi_runtime_stop;
219extern unsigned int __efi_runtime_rel_start, __efi_runtime_rel_stop;
220
1f1075c6
HS
221/**
222 * struct efi_open_protocol_info_item - open protocol info item
223 *
fe1599da
HS
224 * When a protocol is opened a open protocol info entry is created.
225 * These are maintained in a list.
1f1075c6
HS
226 *
227 * @link: link to the list of open protocol info entries of a protocol
228 * @info: information about the opening of a protocol
fe1599da
HS
229 */
230struct efi_open_protocol_info_item {
fe1599da
HS
231 struct list_head link;
232 struct efi_open_protocol_info_entry info;
233};
234
1f1075c6
HS
235/**
236 * struct efi_handler - single protocol interface of a handle
237 *
bee91169
AG
238 * When the UEFI payload wants to open a protocol on an object to get its
239 * interface (usually a struct with callback functions), this struct maps the
fe1599da 240 * protocol GUID to the respective protocol interface
1f1075c6
HS
241 *
242 * @link: link to the list of protocols of a handle
243 * @guid: GUID of the protocol
244 * @protocol_interface: protocol interface
245 * @open_infos link to the list of open protocol info items
fe1599da 246 */
bee91169 247struct efi_handler {
69fb6b1a 248 struct list_head link;
bee91169 249 const efi_guid_t *guid;
b5349f74 250 void *protocol_interface;
fe1599da 251 struct list_head open_infos;
bee91169
AG
252};
253
cd73aba6
HS
254/**
255 * enum efi_object_type - type of EFI object
256 *
257 * In UnloadImage we must be able to identify if the handle relates to a
258 * started image.
259 */
260enum efi_object_type {
261 EFI_OBJECT_TYPE_UNDEFINED = 0,
84a918e8 262 EFI_OBJECT_TYPE_U_BOOT_FIRMWARE,
cd73aba6
HS
263 EFI_OBJECT_TYPE_LOADED_IMAGE,
264 EFI_OBJECT_TYPE_STARTED_IMAGE,
265};
266
fae0118e
HS
267/**
268 * struct efi_object - dereferenced EFI handle
269 *
270 * @link: pointers to put the handle into a linked list
271 * @protocols: linked list with the protocol interfaces installed on this
272 * handle
273 *
274 * UEFI offers a flexible and expandable object model. The objects in the UEFI
275 * API are devices, drivers, and loaded images. struct efi_object is our storage
276 * structure for these objects.
277 *
278 * When including this structure into a larger structure always put it first so
279 * that when deleting a handle the whole encompassing structure can be freed.
bee91169 280 *
fae0118e
HS
281 * A pointer to this structure is referred to as a handle. Typedef efi_handle_t
282 * has been created for such pointers.
bee91169
AG
283 */
284struct efi_object {
285 /* Every UEFI object is part of a global object list */
286 struct list_head link;
69fb6b1a
HS
287 /* The list of protocols */
288 struct list_head protocols;
cd73aba6 289 enum efi_object_type type;
bee91169
AG
290};
291
4540dabd
AT
292enum efi_image_auth_status {
293 EFI_IMAGE_AUTH_FAILED = 0,
294 EFI_IMAGE_AUTH_PASSED,
295};
296
c982874e
HS
297/**
298 * struct efi_loaded_image_obj - handle of a loaded image
d39646a3
HS
299 *
300 * @header: EFI object header
556d8dc9
HS
301 * @exit_status: exit status passed to Exit()
302 * @exit_data_size: exit data size passed to Exit()
303 * @exit_data: exit data passed to Exit()
0ce3fb55 304 * @exit_jmp: long jump buffer for returning from started image
d39646a3 305 * @entry: entry address of the relocated image
0ce3fb55
HS
306 * @image_type: indicates if the image is an applicition or a driver
307 * @auth_status: indicates if the image is authenticated
c982874e
HS
308 */
309struct efi_loaded_image_obj {
d39646a3 310 struct efi_object header;
f8212f09 311 efi_status_t *exit_status;
556d8dc9
HS
312 efi_uintn_t *exit_data_size;
313 u16 **exit_data;
f8212f09 314 struct jmp_buf_data *exit_jmp;
c982874e
HS
315 EFIAPI efi_status_t (*entry)(efi_handle_t image_handle,
316 struct efi_system_table *st);
126a43f1 317 u16 image_type;
4540dabd 318 enum efi_image_auth_status auth_status;
c982874e
HS
319};
320
c6841592
HS
321/**
322 * struct efi_event
323 *
43bce442 324 * @link: Link to list of all events
7a69e97b 325 * @queue_link: Link to the list of queued events
c6841592
HS
326 * @type: Type of event, see efi_create_event
327 * @notify_tpl: Task priority level of notifications
c6841592
HS
328 * @nofify_function: Function to call when the event is triggered
329 * @notify_context: Data to be passed to the notify function
b095f3c8 330 * @group: Event group
43bce442
HS
331 * @trigger_time: Period of the timer
332 * @trigger_next: Next time to trigger the timer
c6841592 333 * @trigger_type: Type of timer, see efi_set_timer
43bce442 334 * @is_signaled: The event occurred. The event is in the signaled state.
c6841592
HS
335 */
336struct efi_event {
43bce442 337 struct list_head link;
7a69e97b 338 struct list_head queue_link;
b521d29e 339 uint32_t type;
152cade3 340 efi_uintn_t notify_tpl;
c6841592
HS
341 void (EFIAPI *notify_function)(struct efi_event *event, void *context);
342 void *notify_context;
b095f3c8 343 const efi_guid_t *group;
c6841592
HS
344 u64 trigger_next;
345 u64 trigger_time;
b521d29e 346 enum efi_timer_delay trigger_type;
e190e897 347 bool is_signaled;
c6841592
HS
348};
349
bee91169
AG
350/* This list contains all UEFI objects we know of */
351extern struct list_head efi_obj_list;
b095f3c8
HS
352/* List of all events */
353extern struct list_head efi_events;
bee91169 354
f09cea36
HS
355/**
356 * struct efi_protocol_notification - handle for notified protocol
357 *
358 * When a protocol interface is installed for which an event was registered with
359 * the RegisterProtocolNotify() service this structure is used to hold the
360 * handle on which the protocol interface was installed.
361 *
362 * @link: link to list of all handles notified for this event
363 * @handle: handle on which the notified protocol interface was installed
364 */
365struct efi_protocol_notification {
366 struct list_head link;
367 efi_handle_t handle;
368};
369
ab15d414
HS
370/**
371 * efi_register_notify_event - event registered by RegisterProtocolNotify()
372 *
373 * The address of this structure serves as registration value.
374 *
f09cea36
HS
375 * @link: link to list of all registered events
376 * @event: registered event. The same event may registered for multiple
377 * GUIDs.
378 * @protocol: protocol for which the event is registered
379 * @handles: linked list of all handles on which the notified protocol was
380 * installed
ab15d414
HS
381 */
382struct efi_register_notify_event {
383 struct list_head link;
384 struct efi_event *event;
385 efi_guid_t protocol;
f09cea36 386 struct list_head handles;
ab15d414
HS
387};
388
389/* List of all events registered by RegisterProtocolNotify() */
390extern struct list_head efi_register_notify_events;
391
056b45bc
AT
392/* Initialize efi execution environment */
393efi_status_t efi_init_obj_list(void);
f64f2232
HS
394/* Install device tree */
395efi_status_t efi_install_fdt(void *fdt);
f9ceb6ac
HS
396/* Run loaded UEFI image */
397efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size);
88192098
HS
398/* Initialize variable services */
399efi_status_t efi_init_variables(void);
29018abb
HS
400/* Notify ExitBootServices() is called */
401void efi_variables_boot_exit_notify(void);
4e6b5d65
HS
402/* Called by bootefi to initialize root node */
403efi_status_t efi_root_node_register(void);
640adadf
HS
404/* Called by bootefi to initialize runtime */
405efi_status_t efi_initialize_system_table(void);
7f95104d
HS
406/* efi_runtime_detach() - detach unimplemented runtime functions */
407void efi_runtime_detach(void);
a44d2a23
HS
408/* efi_convert_pointer() - convert pointer to virtual address */
409efi_status_t EFIAPI efi_convert_pointer(efi_uintn_t debug_disposition,
410 void **address);
94686f60
HS
411/* Carve out DT reserved memory ranges */
412void efi_carve_out_dt_rsv(void *fdt);
91be9a77 413/* Called by bootefi to make console interface available */
6f566c23 414efi_status_t efi_console_register(void);
2a22d05d 415/* Called by bootefi to make all disk storage accessible as EFI objects */
df9cf561 416efi_status_t efi_disk_register(void);
b59c13d4
HS
417/* Called by efi_init_obj_list() to install EFI_RNG_PROTOCOL */
418efi_status_t efi_rng_register(void);
c1c02105
IA
419/* Called by efi_init_obj_list() to install EFI_TCG2_PROTOCOL */
420efi_status_t efi_tcg2_register(void);
64e4db0f
HS
421/* Create handles and protocols for the partitions of a block device */
422int efi_disk_create_partitions(efi_handle_t parent, struct blk_desc *desc,
423 const char *if_typename, int diskid,
424 const char *pdevname);
41fd5068
AT
425/* Check if it is EFI system partition */
426bool efi_disk_is_system_part(efi_handle_t handle);
be8d3241 427/* Called by bootefi to make GOP (graphical) interface available */
80ea9b09 428efi_status_t efi_gop_register(void);
0efe1bcf 429/* Called by bootefi to make the network interface available */
075d425d 430efi_status_t efi_net_register(void);
b3d60900 431/* Called by bootefi to make the watchdog available */
d7b181d5 432efi_status_t efi_watchdog_register(void);
ec80b473 433efi_status_t efi_initrd_register(void);
e663b350 434/* Called by bootefi to make SMBIOS tables available */
86df34d4
BM
435/**
436 * efi_acpi_register() - write out ACPI tables
437 *
438 * Called by bootefi to make ACPI tables available
439 *
440 * @return 0 if OK, -ENOMEM if no memory is available for the tables
441 */
442efi_status_t efi_acpi_register(void);
0864c565
SG
443/**
444 * efi_smbios_register() - write out SMBIOS tables
445 *
446 * Called by bootefi to make SMBIOS tables available
447 *
448 * @return 0 if OK, -ENOMEM if no memory is available for the tables
449 */
7657152b 450efi_status_t efi_smbios_register(void);
0efe1bcf 451
2a92080d
RC
452struct efi_simple_file_system_protocol *
453efi_fs_from_path(struct efi_device_path *fp);
454
0efe1bcf
AG
455/* Called by networking code to memorize the dhcp ack package */
456void efi_net_set_dhcp_ack(void *pkt, int len);
b3d60900
HS
457/* Called by efi_set_watchdog_timer to reset the timer */
458efi_status_t efi_set_watchdog(unsigned long timeout);
0efe1bcf 459
bee91169
AG
460/* Called from places to check whether a timer expired */
461void efi_timer_check(void);
5dad05a0
HS
462/* Check if a buffer contains a PE-COFF image */
463efi_status_t efi_check_pe(void *buffer, size_t size, void **nt_header);
bee91169 464/* PE loader implementation */
4540dabd
AT
465efi_status_t efi_load_pe(struct efi_loaded_image_obj *handle,
466 void *efi, size_t efi_size,
8f7e2b29 467 struct efi_loaded_image *loaded_image_info);
bee91169
AG
468/* Called once to store the pristine gd pointer */
469void efi_save_gd(void);
c160d2f5
RC
470/* Special case handler for error/abort that just tries to dtrt to get
471 * back to u-boot world */
bee91169 472void efi_restore_gd(void);
50149ea3
AG
473/* Call this to relocate the runtime section to an address space */
474void efi_runtime_relocate(ulong offset, struct efi_mem_desc *map);
0f4060eb 475/* Call this to set the current device name */
5f59518a
HS
476void efi_set_bootdev(const char *dev, const char *devnr, const char *path,
477 void *buffer, size_t buffer_size);
44549d62 478/* Add a new object to the object list. */
fae0118e 479void efi_add_handle(efi_handle_t obj);
2edab5e2 480/* Create handle */
2074f700 481efi_status_t efi_create_handle(efi_handle_t *handle);
678e03a0 482/* Delete handle */
fae0118e 483void efi_delete_handle(efi_handle_t obj);
1b68153a 484/* Call this to validate a handle and find the EFI object for it */
2074f700 485struct efi_object *efi_search_obj(const efi_handle_t handle);
d7e0b010
AT
486/* Load image */
487efi_status_t EFIAPI efi_load_image(bool boot_policy,
488 efi_handle_t parent_image,
489 struct efi_device_path *file_path,
490 void *source_buffer,
491 efi_uintn_t source_size,
492 efi_handle_t *image_handle);
f69d63fa
HS
493/* Start image */
494efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle,
495 efi_uintn_t *exit_data_size,
496 u16 **exit_data);
d7e0b010
AT
497/* Unload image */
498efi_status_t EFIAPI efi_unload_image(efi_handle_t image_handle);
3f79a2b5 499/* Find a protocol on a handle */
2074f700 500efi_status_t efi_search_protocol(const efi_handle_t handle,
3f79a2b5
HS
501 const efi_guid_t *protocol_guid,
502 struct efi_handler **handler);
503/* Install new protocol on a handle */
2074f700
HS
504efi_status_t efi_add_protocol(const efi_handle_t handle,
505 const efi_guid_t *protocol,
3f79a2b5 506 void *protocol_interface);
f9ad240e
HS
507/* Open protocol */
508efi_status_t efi_protocol_open(struct efi_handler *handler,
509 void **protocol_interface, void *agent_handle,
510 void *controller_handle, uint32_t attributes);
511
3f79a2b5 512/* Delete protocol from a handle */
2074f700
HS
513efi_status_t efi_remove_protocol(const efi_handle_t handle,
514 const efi_guid_t *protocol,
3f79a2b5
HS
515 void *protocol_interface);
516/* Delete all protocols from a handle */
2074f700 517efi_status_t efi_remove_all_protocols(const efi_handle_t handle);
7657ae12
HS
518/* Install multiple protocol interfaces */
519efi_status_t EFIAPI efi_install_multiple_protocol_interfaces
520 (efi_handle_t *handle, ...);
b51ec639
AT
521/* Get handles that support a given protocol */
522efi_status_t EFIAPI efi_locate_handle_buffer(
523 enum efi_locate_search_type search_type,
524 const efi_guid_t *protocol, void *search_key,
525 efi_uintn_t *no_handles, efi_handle_t **buffer);
526/* Close an previously opened protocol interface */
527efi_status_t EFIAPI efi_close_protocol(efi_handle_t handle,
528 const efi_guid_t *protocol,
529 efi_handle_t agent_handle,
530 efi_handle_t controller_handle);
531/* Open a protocol interface */
532efi_status_t EFIAPI efi_handle_protocol(efi_handle_t handle,
533 const efi_guid_t *protocol,
534 void **protocol_interface);
49deb455 535/* Call this to create an event */
152cade3 536efi_status_t efi_create_event(uint32_t type, efi_uintn_t notify_tpl,
49deb455
HS
537 void (EFIAPI *notify_function) (
538 struct efi_event *event,
539 void *context),
b095f3c8
HS
540 void *notify_context, efi_guid_t *group,
541 struct efi_event **event);
bfc72462 542/* Call this to set a timer */
b521d29e 543efi_status_t efi_set_timer(struct efi_event *event, enum efi_timer_delay type,
bfc72462 544 uint64_t trigger_time);
91be9a77 545/* Call this to signal an event */
7eaa900e 546void efi_signal_event(struct efi_event *event);
50149ea3 547
2a92080d
RC
548/* open file system: */
549struct efi_simple_file_system_protocol *efi_simple_file_system(
550 struct blk_desc *desc, int part, struct efi_device_path *dp);
551
552/* open file from device-path: */
553struct efi_file_handle *efi_file_from_path(struct efi_device_path *fp);
554
c3772ca1
HS
555/**
556 * efi_size_in_pages() - convert size in bytes to size in pages
557 *
558 * This macro returns the number of EFI memory pages required to hold 'size'
559 * bytes.
560 *
561 * @size: size in bytes
562 * Return: size in pages
563 */
0a7e5165 564#define efi_size_in_pages(size) (((size) + EFI_PAGE_MASK) >> EFI_PAGE_SHIFT)
5d00995c
AG
565/* Generic EFI memory allocator, call this to get memory */
566void *efi_alloc(uint64_t len, int memory_type);
567/* More specific EFI memory allocator, called by EFI payloads */
f5a2a938 568efi_status_t efi_allocate_pages(int type, int memory_type, efi_uintn_t pages,
5d00995c 569 uint64_t *memory);
b61d857b 570/* EFI memory free function. */
f5a2a938 571efi_status_t efi_free_pages(uint64_t memory, efi_uintn_t pages);
ead1274b 572/* EFI memory allocator for small allocations */
f5a2a938 573efi_status_t efi_allocate_pool(int pool_type, efi_uintn_t size,
ead1274b 574 void **buffer);
42417bc8
SB
575/* EFI pool memory free function. */
576efi_status_t efi_free_pool(void *buffer);
5d00995c 577/* Returns the EFI memory map */
f5a2a938 578efi_status_t efi_get_memory_map(efi_uintn_t *memory_map_size,
5d00995c 579 struct efi_mem_desc *memory_map,
f5a2a938
HS
580 efi_uintn_t *map_key,
581 efi_uintn_t *descriptor_size,
5d00995c
AG
582 uint32_t *descriptor_version);
583/* Adds a range into the EFI memory map */
714497e3 584efi_status_t efi_add_memory_map(u64 start, u64 size, int memory_type);
b5b9eff2
PA
585/* Adds a conventional range into the EFI memory map */
586efi_status_t efi_add_conventional_memory_map(u64 ram_start, u64 ram_end,
587 u64 ram_top);
588
05ef48a2 589/* Called by board init to initialize the EFI drivers */
038782a2 590efi_status_t efi_driver_init(void);
5d00995c
AG
591/* Called by board init to initialize the EFI memory map */
592int efi_memory_init(void);
488bf12d
AG
593/* Adds new or overrides configuration table entry to the system table */
594efi_status_t efi_install_configuration_table(const efi_guid_t *guid, void *table);
56d92888 595/* Sets up a loaded image */
c982874e
HS
596efi_status_t efi_setup_loaded_image(struct efi_device_path *device_path,
597 struct efi_device_path *file_path,
598 struct efi_loaded_image_obj **handle_ptr,
599 struct efi_loaded_image **info_ptr);
c9a63f44
HS
600/* Print information about all loaded images */
601void efi_print_image_infos(void *pc);
5d00995c 602
51735ae0
AG
603#ifdef CONFIG_EFI_LOADER_BOUNCE_BUFFER
604extern void *efi_bounce_buffer;
605#define EFI_LOADER_BOUNCE_BUFFER_SIZE (64 * 1024 * 1024)
606#endif
607
b66c60dd
RC
608
609struct efi_device_path *efi_dp_next(const struct efi_device_path *dp);
ff401d3f
HS
610int efi_dp_match(const struct efi_device_path *a,
611 const struct efi_device_path *b);
b66c60dd
RC
612struct efi_object *efi_dp_find_obj(struct efi_device_path *dp,
613 struct efi_device_path **rem);
f6dd3f35
HS
614/* get size of the first device path instance excluding end node */
615efi_uintn_t efi_dp_instance_size(const struct efi_device_path *dp);
616/* size of multi-instance device path excluding end node */
617efi_uintn_t efi_dp_size(const struct efi_device_path *dp);
b66c60dd
RC
618struct efi_device_path *efi_dp_dup(const struct efi_device_path *dp);
619struct efi_device_path *efi_dp_append(const struct efi_device_path *dp1,
620 const struct efi_device_path *dp2);
621struct efi_device_path *efi_dp_append_node(const struct efi_device_path *dp,
622 const struct efi_device_path *node);
211314c1
HS
623/* Create a device path node of given type, sub-type, length */
624struct efi_device_path *efi_dp_create_device_node(const u8 type,
625 const u8 sub_type,
626 const u16 length);
3acef5da
HS
627/* Append device path instance */
628struct efi_device_path *efi_dp_append_instance(
629 const struct efi_device_path *dp,
630 const struct efi_device_path *dpi);
631/* Get next device path instance */
632struct efi_device_path *efi_dp_get_next_instance(struct efi_device_path **dp,
633 efi_uintn_t *size);
634/* Check if a device path contains muliple instances */
635bool efi_dp_is_multi_instance(const struct efi_device_path *dp);
b66c60dd 636
b66c60dd 637struct efi_device_path *efi_dp_from_part(struct blk_desc *desc, int part);
98d48bdf
HS
638/* Create a device node for a block device partition. */
639struct efi_device_path *efi_dp_part_node(struct blk_desc *desc, int part);
b66c60dd
RC
640struct efi_device_path *efi_dp_from_file(struct blk_desc *desc, int part,
641 const char *path);
642struct efi_device_path *efi_dp_from_eth(void);
bf19273e
RC
643struct efi_device_path *efi_dp_from_mem(uint32_t mem_type,
644 uint64_t start_address,
645 uint64_t end_address);
65436f91
HS
646/* Determine the last device path node that is not the end node. */
647const struct efi_device_path *efi_dp_last_node(
648 const struct efi_device_path *dp);
04298686
HS
649efi_status_t efi_dp_split_file_path(struct efi_device_path *full_path,
650 struct efi_device_path **device_path,
651 struct efi_device_path **file_path);
f1589ffb
AT
652efi_status_t efi_dp_from_name(const char *dev, const char *devnr,
653 const char *path,
654 struct efi_device_path **device,
655 struct efi_device_path **file);
5cad4a30
HS
656ssize_t efi_dp_check_length(const struct efi_device_path *dp,
657 const size_t maxlen);
b66c60dd
RC
658
659#define EFI_DP_TYPE(_dp, _type, _subtype) \
660 (((_dp)->type == DEVICE_PATH_TYPE_##_type) && \
661 ((_dp)->sub_type == DEVICE_PATH_SUB_TYPE_##_subtype))
662
50149ea3
AG
663/*
664 * Use these to indicate that your code / data should go into the EFI runtime
665 * section and thus still be available when the OS is running
666 */
7e21fbca
AG
667#define __efi_runtime_data __attribute__ ((section (".data.efi_runtime")))
668#define __efi_runtime __attribute__ ((section (".text.efi_runtime")))
bee91169 669
e771b4b3
AT
670/* Indicate supported runtime services */
671efi_status_t efi_init_runtime_supported(void);
672
a39f39cd
HS
673/* Update CRC32 in table header */
674void __efi_runtime efi_update_table_header_crc32(struct efi_table_hdr *table);
675
80a4800e
AG
676/* Call this with mmio_ptr as the _pointer_ to a pointer to an MMIO region
677 * to make it available at runtime */
22c793e6 678efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len);
80a4800e
AG
679
680/* Boards may provide the functions below to implement RTS functionality */
681
3c63db9c 682void __efi_runtime EFIAPI efi_reset_system(
80a4800e
AG
683 enum efi_reset_type reset_type,
684 efi_status_t reset_status,
685 unsigned long data_size, void *reset_data);
22c793e6
HS
686
687/* Architecture specific initialization of the EFI subsystem */
688efi_status_t efi_reset_system_init(void);
80a4800e 689
3c63db9c 690efi_status_t __efi_runtime EFIAPI efi_get_time(
80a4800e
AG
691 struct efi_time *time,
692 struct efi_time_cap *capabilities);
80a4800e 693
656f1710
HS
694efi_status_t __efi_runtime EFIAPI efi_set_time(struct efi_time *time);
695
623b3a57
HS
696#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
697/*
698 * Entry point for the tests of the EFI API.
699 * It is called by 'bootefi selftest'
700 */
701efi_status_t EFIAPI efi_selftest(efi_handle_t image_handle,
702 struct efi_system_table *systab);
703#endif
704
0bda81bf
HS
705efi_status_t EFIAPI efi_get_variable(u16 *variable_name,
706 const efi_guid_t *vendor, u32 *attributes,
707 efi_uintn_t *data_size, void *data);
45c66f9c
HS
708efi_status_t EFIAPI efi_get_next_variable_name(efi_uintn_t *variable_name_size,
709 u16 *variable_name,
7a4e717b 710 efi_guid_t *vendor);
0bda81bf
HS
711efi_status_t EFIAPI efi_set_variable(u16 *variable_name,
712 const efi_guid_t *vendor, u32 attributes,
452257a3 713 efi_uintn_t data_size, const void *data);
ad644e7c 714
ce43528d
HS
715efi_status_t EFIAPI efi_query_variable_info(
716 u32 attributes, u64 *maximum_variable_storage_size,
717 u64 *remaining_variable_storage_size,
718 u64 *maximum_variable_size);
719
1a82b341
AT
720/*
721 * See section 3.1.3 in the v2.7 UEFI spec for more details on
722 * the layout of EFI_LOAD_OPTION. In short it is:
723 *
724 * typedef struct _EFI_LOAD_OPTION {
725 * UINT32 Attributes;
726 * UINT16 FilePathListLength;
727 * // CHAR16 Description[]; <-- variable length, NULL terminated
728 * // EFI_DEVICE_PATH_PROTOCOL FilePathList[];
729 * <-- FilePathListLength bytes
730 * // UINT8 OptionalData[];
731 * } EFI_LOAD_OPTION;
732 */
733struct efi_load_option {
734 u32 attributes;
735 u16 file_path_length;
736 u16 *label;
737 struct efi_device_path *file_path;
39a1ff8c 738 const u8 *optional_data;
1a82b341
AT
739};
740
0e69bcfb
HS
741efi_status_t efi_deserialize_load_option(struct efi_load_option *lo, u8 *data,
742 efi_uintn_t *size);
1a82b341 743unsigned long efi_serialize_load_option(struct efi_load_option *lo, u8 **data);
1064d049
HS
744efi_status_t efi_set_load_options(efi_handle_t handle,
745 efi_uintn_t load_options_size,
746 void *load_options);
0ad64007 747efi_status_t efi_bootmgr_load(efi_handle_t *handle, void **load_options);
9975fe96 748
593e17d6
AT
749/**
750 * efi_image_regions - A list of memory regions
751 *
752 * @max: Maximum number of regions
753 * @num: Number of regions
754 * @reg: array of regions
755 */
756struct efi_image_regions {
757 int max;
758 int num;
759 struct image_region reg[];
760};
761
762/**
763 * efi_sig_data - A decoded data of struct efi_signature_data
764 *
765 * This structure represents an internal form of signature in
766 * signature database. A listed list may represent a signature list.
767 *
768 * @next: Pointer to next entry
769 * @onwer: Signature owner
770 * @data: Pointer to signature data
771 * @size: Size of signature data
772 */
773struct efi_sig_data {
774 struct efi_sig_data *next;
775 efi_guid_t owner;
776 void *data;
777 size_t size;
778};
779
780/**
781 * efi_signature_store - A decoded data of signature database
782 *
783 * This structure represents an internal form of signature database.
784 *
785 * @next: Pointer to next entry
786 * @sig_type: Signature type
787 * @sig_data_list: Pointer to signature list
788 */
789struct efi_signature_store {
790 struct efi_signature_store *next;
791 efi_guid_t sig_type;
792 struct efi_sig_data *sig_data_list;
793};
794
795struct x509_certificate;
796struct pkcs7_message;
797
7926dfb5
AT
798bool efi_signature_lookup_digest(struct efi_image_regions *regs,
799 struct efi_signature_store *db);
1115edd8
AT
800bool efi_signature_verify(struct efi_image_regions *regs,
801 struct pkcs7_message *msg,
802 struct efi_signature_store *db,
803 struct efi_signature_store *dbx);
52956e53
AT
804static inline bool efi_signature_verify_one(struct efi_image_regions *regs,
805 struct pkcs7_message *msg,
806 struct efi_signature_store *db)
807{
808 return efi_signature_verify(regs, msg, db, NULL);
809}
11bafb25
AT
810bool efi_signature_check_signers(struct pkcs7_message *msg,
811 struct efi_signature_store *dbx);
593e17d6
AT
812
813efi_status_t efi_image_region_add(struct efi_image_regions *regs,
814 const void *start, const void *end,
815 int nocheck);
be6296d0
AT
816
817void efi_sigstore_free(struct efi_signature_store *sigstore);
b4f20a5d
SG
818struct efi_signature_store *efi_build_signature_store(void *sig_list,
819 efi_uintn_t size);
be6296d0 820struct efi_signature_store *efi_sigstore_parse_sigdb(u16 *name);
767f6eeb
AT
821
822bool efi_secure_boot_enabled(void);
4540dabd 823
04be98bd
SG
824bool efi_capsule_auth_enabled(void);
825
4540dabd
AT
826bool efi_image_parse(void *efi, size_t len, struct efi_image_regions **regp,
827 WIN_CERTIFICATE **auth, size_t *auth_len);
593e17d6 828
201b8068
SG
829struct pkcs7_message *efi_parse_pkcs7_header(const void *buf,
830 size_t buflen,
831 u8 **tmpbuf);
832
b0dd8cb4
HS
833/* runtime implementation of memcpy() */
834void efi_memcpy_runtime(void *dest, const void *src, size_t n);
835
077153e0 836/* commonly used helper function */
fe179d7f
IA
837u16 *efi_create_indexed_name(u16 *buffer, size_t buffer_size, const char *name,
838 unsigned int index);
077153e0 839
f27c2014 840extern const struct efi_firmware_management_protocol efi_fmp_fit;
bb7e71d3 841extern const struct efi_firmware_management_protocol efi_fmp_raw;
f27c2014 842
2bc27ca8
AT
843/* Capsule update */
844efi_status_t EFIAPI efi_update_capsule(
845 struct efi_capsule_header **capsule_header_array,
846 efi_uintn_t capsule_count,
847 u64 scatter_gather_list);
848efi_status_t EFIAPI efi_query_capsule_caps(
849 struct efi_capsule_header **capsule_header_array,
850 efi_uintn_t capsule_count,
851 u64 *maximum_capsule_size,
852 u32 *reset_type);
853
04be98bd
SG
854efi_status_t efi_capsule_authenticate(const void *capsule,
855 efi_uintn_t capsule_size,
856 void **image, efi_uintn_t *image_size);
857
c74cd8bd
AT
858#define EFI_CAPSULE_DIR L"\\EFI\\UpdateCapsule\\"
859
860/* Hook at initialization */
861efi_status_t efi_launch_capsules(void);
862
9b5e6396 863#else /* CONFIG_IS_ENABLED(EFI_LOADER) */
bee91169 864
50149ea3 865/* Without CONFIG_EFI_LOADER we don't have a runtime section, stub it out */
3c63db9c
AG
866#define __efi_runtime_data
867#define __efi_runtime
22c793e6
HS
868static inline efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len)
869{
870 return EFI_SUCCESS;
871}
50149ea3 872
bee91169
AG
873/* No loader configured, stub out EFI_ENTRY */
874static inline void efi_restore_gd(void) { }
c07ad7c0 875static inline void efi_set_bootdev(const char *dev, const char *devnr,
5f59518a
HS
876 const char *path, void *buffer,
877 size_t buffer_size) { }
0efe1bcf 878static inline void efi_net_set_dhcp_ack(void *pkt, int len) { }
c9a63f44 879static inline void efi_print_image_infos(void *pc) { }
c74cd8bd
AT
880static inline efi_status_t efi_launch_capsules(void)
881{
882 return EFI_SUCCESS;
883}
bee91169 884
9b5e6396 885#endif /* CONFIG_IS_ENABLED(EFI_LOADER) */
cd9e18de
HS
886
887#endif /* _EFI_LOADER_H */
This page took 0.36358 seconds and 4 git commands to generate.