]> Git Repo - u-boot.git/blob - lib/efi_loader/efi_boottime.c
Merge tag 'u-boot-dfu-next-20240820' of https://source.denx.de/u-boot/custodians...
[u-boot.git] / lib / efi_loader / efi_boottime.c
1 // SPDX-License-Identifier: GPL-2.0+
2 /*
3  * EFI application boot time services
4  *
5  * Copyright (c) 2016 Alexander Graf
6  */
7
8 #include <bootm.h>
9 #include <div64.h>
10 #include <dm/device.h>
11 #include <dm/root.h>
12 #include <efi_loader.h>
13 #include <irq_func.h>
14 #include <log.h>
15 #include <malloc.h>
16 #include <pe.h>
17 #include <time.h>
18 #include <u-boot/crc.h>
19 #include <usb.h>
20 #include <watchdog.h>
21 #include <asm/global_data.h>
22 #include <asm/setjmp.h>
23 #include <linux/libfdt_env.h>
24
25 DECLARE_GLOBAL_DATA_PTR;
26
27 /* Task priority level */
28 static efi_uintn_t efi_tpl = TPL_APPLICATION;
29
30 /* This list contains all the EFI objects our payload has access to */
31 LIST_HEAD(efi_obj_list);
32
33 /* List of all events */
34 __efi_runtime_data LIST_HEAD(efi_events);
35
36 /* List of queued events */
37 static LIST_HEAD(efi_event_queue);
38
39 /* Flag to disable timer activity in ExitBootServices() */
40 static bool timers_enabled = true;
41
42 /* Flag used by the selftest to avoid detaching devices in ExitBootServices() */
43 bool efi_st_keep_devices;
44
45 /* List of all events registered by RegisterProtocolNotify() */
46 static LIST_HEAD(efi_register_notify_events);
47
48 /* Handle of the currently executing image */
49 static efi_handle_t current_image;
50
51 #if defined(CONFIG_ARM) || defined(CONFIG_RISCV)
52 /*
53  * The "gd" pointer lives in a register on ARM and RISC-V that we declare
54  * fixed when compiling U-Boot. However, the payload does not know about that
55  * restriction so we need to manually swap its and our view of that register on
56  * EFI callback entry/exit.
57  */
58 static volatile gd_t *efi_gd, *app_gd;
59 #endif
60
61 static efi_status_t efi_uninstall_protocol
62                         (efi_handle_t handle, const efi_guid_t *protocol,
63                          void *protocol_interface, bool preserve);
64
65 /* 1 if inside U-Boot code, 0 if inside EFI payload code */
66 static int entry_count = 1;
67 static int nesting_level;
68 /* GUID of the device tree table */
69 const efi_guid_t efi_guid_fdt = EFI_FDT_GUID;
70 /* GUID of the EFI_DRIVER_BINDING_PROTOCOL */
71 const efi_guid_t efi_guid_driver_binding_protocol =
72                         EFI_DRIVER_BINDING_PROTOCOL_GUID;
73
74 /* event group ExitBootServices() invoked */
75 const efi_guid_t efi_guid_event_group_exit_boot_services =
76                         EFI_EVENT_GROUP_EXIT_BOOT_SERVICES;
77 /* event group before ExitBootServices() invoked */
78 const efi_guid_t efi_guid_event_group_before_exit_boot_services =
79                         EFI_EVENT_GROUP_BEFORE_EXIT_BOOT_SERVICES;
80 /* event group SetVirtualAddressMap() invoked */
81 const efi_guid_t efi_guid_event_group_virtual_address_change =
82                         EFI_EVENT_GROUP_VIRTUAL_ADDRESS_CHANGE;
83 /* event group memory map changed */
84 const efi_guid_t efi_guid_event_group_memory_map_change =
85                         EFI_EVENT_GROUP_MEMORY_MAP_CHANGE;
86 /* event group boot manager about to boot */
87 const efi_guid_t efi_guid_event_group_ready_to_boot =
88                         EFI_EVENT_GROUP_READY_TO_BOOT;
89 /* event group ResetSystem() invoked (before ExitBootServices) */
90 const efi_guid_t efi_guid_event_group_reset_system =
91                         EFI_EVENT_GROUP_RESET_SYSTEM;
92 /* event group return to efibootmgr */
93 const efi_guid_t efi_guid_event_group_return_to_efibootmgr =
94                         EFI_EVENT_GROUP_RETURN_TO_EFIBOOTMGR;
95 /* GUIDs of the Load File and Load File2 protocols */
96 const efi_guid_t efi_guid_load_file_protocol = EFI_LOAD_FILE_PROTOCOL_GUID;
97 const efi_guid_t efi_guid_load_file2_protocol = EFI_LOAD_FILE2_PROTOCOL_GUID;
98 /* GUID of the SMBIOS table */
99 const efi_guid_t smbios_guid = SMBIOS_TABLE_GUID;
100
101 static efi_status_t EFIAPI efi_disconnect_controller(
102                                         efi_handle_t controller_handle,
103                                         efi_handle_t driver_image_handle,
104                                         efi_handle_t child_handle);
105
106 static
107 efi_status_t EFIAPI efi_connect_controller(efi_handle_t controller_handle,
108                                            efi_handle_t *driver_image_handle,
109                                            struct efi_device_path *remain_device_path,
110                                            bool recursive);
111
112 /* Called on every callback entry */
113 int __efi_entry_check(void)
114 {
115         int ret = entry_count++ == 0;
116 #if defined(CONFIG_ARM) || defined(CONFIG_RISCV)
117         assert(efi_gd);
118         app_gd = gd;
119         set_gd(efi_gd);
120 #endif
121         return ret;
122 }
123
124 /* Called on every callback exit */
125 int __efi_exit_check(void)
126 {
127         int ret = --entry_count == 0;
128 #if defined(CONFIG_ARM) || defined(CONFIG_RISCV)
129         set_gd(app_gd);
130 #endif
131         return ret;
132 }
133
134 /**
135  * efi_save_gd() - save global data register
136  *
137  * On the ARM and RISC-V architectures gd is mapped to a fixed register.
138  * As this register may be overwritten by an EFI payload we save it here
139  * and restore it on every callback entered.
140  *
141  * This function is called after relocation from initr_reloc_global_data().
142  */
143 void efi_save_gd(void)
144 {
145 #if defined(CONFIG_ARM) || defined(CONFIG_RISCV)
146         efi_gd = gd;
147 #endif
148 }
149
150 /**
151  * efi_restore_gd() - restore global data register
152  *
153  * On the ARM and RISC-V architectures gd is mapped to a fixed register.
154  * Restore it after returning from the UEFI world to the value saved via
155  * efi_save_gd().
156  */
157 void efi_restore_gd(void)
158 {
159 #if defined(CONFIG_ARM) || defined(CONFIG_RISCV)
160         /* Only restore if we're already in EFI context */
161         if (!efi_gd)
162                 return;
163         set_gd(efi_gd);
164 #endif
165 }
166
167 /**
168  * indent_string() - returns a string for indenting with two spaces per level
169  * @level: indent level
170  *
171  * A maximum of ten indent levels is supported. Higher indent levels will be
172  * truncated.
173  *
174  * Return: A string for indenting with two spaces per level is
175  *         returned.
176  */
177 static const char *indent_string(int level)
178 {
179         const char *indent = "                    ";
180         const int max = strlen(indent);
181
182         level = min(max, level * 2);
183         return &indent[max - level];
184 }
185
186 const char *__efi_nesting(void)
187 {
188         return indent_string(nesting_level);
189 }
190
191 const char *__efi_nesting_inc(void)
192 {
193         return indent_string(nesting_level++);
194 }
195
196 const char *__efi_nesting_dec(void)
197 {
198         return indent_string(--nesting_level);
199 }
200
201 /**
202  * efi_event_is_queued() - check if an event is queued
203  *
204  * @event:      event
205  * Return:      true if event is queued
206  */
207 static bool efi_event_is_queued(struct efi_event *event)
208 {
209         return !!event->queue_link.next;
210 }
211
212 /**
213  * efi_purge_handle() - Clean the deleted handle from the various lists
214  * @handle: handle to remove
215  *
216  * Return: status code
217  */
218 static efi_status_t efi_purge_handle(efi_handle_t handle)
219 {
220         struct efi_register_notify_event *item;
221
222         if (!list_empty(&handle->protocols))
223                 return EFI_ACCESS_DENIED;
224         /* The handle is about to be freed. Remove it from events */
225         list_for_each_entry(item, &efi_register_notify_events, link) {
226                 struct efi_protocol_notification *hitem, *hnext;
227
228                 list_for_each_entry_safe(hitem, hnext, &item->handles, link) {
229                         if (handle == hitem->handle) {
230                                 list_del(&hitem->link);
231                                 free(hitem);
232                         }
233                 }
234         }
235         /* The last protocol has been removed, delete the handle. */
236         list_del(&handle->link);
237         free(handle);
238
239         return EFI_SUCCESS;
240 }
241
242 /**
243  * efi_process_event_queue() - process event queue
244  */
245 static void efi_process_event_queue(void)
246 {
247         while (!list_empty(&efi_event_queue)) {
248                 struct efi_event *event;
249                 efi_uintn_t old_tpl;
250
251                 event = list_first_entry(&efi_event_queue, struct efi_event,
252                                          queue_link);
253                 if (efi_tpl >= event->notify_tpl)
254                         return;
255                 list_del(&event->queue_link);
256                 event->queue_link.next = NULL;
257                 event->queue_link.prev = NULL;
258                 /* Events must be executed at the event's TPL */
259                 old_tpl = efi_tpl;
260                 efi_tpl = event->notify_tpl;
261                 EFI_CALL_VOID(event->notify_function(event,
262                                                      event->notify_context));
263                 efi_tpl = old_tpl;
264                 if (event->type == EVT_NOTIFY_SIGNAL)
265                         event->is_signaled = 0;
266         }
267 }
268
269 /**
270  * efi_queue_event() - queue an EFI event
271  * @event:     event to signal
272  *
273  * This function queues the notification function of the event for future
274  * execution.
275  *
276  */
277 static void efi_queue_event(struct efi_event *event)
278 {
279         struct efi_event *item;
280
281         if (!event->notify_function)
282                 return;
283
284         if (!efi_event_is_queued(event)) {
285                 /*
286                  * Events must be notified in order of decreasing task priority
287                  * level. Insert the new event accordingly.
288                  */
289                 list_for_each_entry(item, &efi_event_queue, queue_link) {
290                         if (item->notify_tpl < event->notify_tpl) {
291                                 list_add_tail(&event->queue_link,
292                                               &item->queue_link);
293                                 event = NULL;
294                                 break;
295                         }
296                 }
297                 if (event)
298                         list_add_tail(&event->queue_link, &efi_event_queue);
299                 efi_process_event_queue();
300         }
301 }
302
303 /**
304  * is_valid_tpl() - check if the task priority level is valid
305  *
306  * @tpl:                TPL level to check
307  * Return:              status code
308  */
309 static efi_status_t is_valid_tpl(efi_uintn_t tpl)
310 {
311         switch (tpl) {
312         case TPL_APPLICATION:
313         case TPL_CALLBACK:
314         case TPL_NOTIFY:
315                 return EFI_SUCCESS;
316         default:
317                 return EFI_INVALID_PARAMETER;
318         }
319 }
320
321 /**
322  * efi_signal_event() - signal an EFI event
323  * @event:     event to signal
324  *
325  * This function signals an event. If the event belongs to an event group, all
326  * events of the group are signaled. If they are of type EVT_NOTIFY_SIGNAL,
327  * their notification function is queued.
328  *
329  * For the SignalEvent service see efi_signal_event_ext.
330  */
331 void efi_signal_event(struct efi_event *event)
332 {
333         if (event->is_signaled)
334                 return;
335         if (event->group) {
336                 struct efi_event *evt;
337
338                 /*
339                  * The signaled state has to set before executing any
340                  * notification function
341                  */
342                 list_for_each_entry(evt, &efi_events, link) {
343                         if (!evt->group || guidcmp(evt->group, event->group))
344                                 continue;
345                         if (evt->is_signaled)
346                                 continue;
347                         evt->is_signaled = true;
348                 }
349                 list_for_each_entry(evt, &efi_events, link) {
350                         if (!evt->group || guidcmp(evt->group, event->group))
351                                 continue;
352                         efi_queue_event(evt);
353                 }
354         } else {
355                 event->is_signaled = true;
356                 efi_queue_event(event);
357         }
358 }
359
360 /**
361  * efi_raise_tpl() - raise the task priority level
362  * @new_tpl: new value of the task priority level
363  *
364  * This function implements the RaiseTpl service.
365  *
366  * See the Unified Extensible Firmware Interface (UEFI) specification for
367  * details.
368  *
369  * Return: old value of the task priority level
370  */
371 static unsigned long EFIAPI efi_raise_tpl(efi_uintn_t new_tpl)
372 {
373         efi_uintn_t old_tpl = efi_tpl;
374
375         EFI_ENTRY("0x%zx", new_tpl);
376
377         if (new_tpl < efi_tpl)
378                 EFI_PRINT("WARNING: new_tpl < current_tpl in %s\n", __func__);
379         efi_tpl = new_tpl;
380         if (efi_tpl > TPL_HIGH_LEVEL)
381                 efi_tpl = TPL_HIGH_LEVEL;
382
383         EFI_EXIT(EFI_SUCCESS);
384         return old_tpl;
385 }
386
387 /**
388  * efi_restore_tpl() - lower the task priority level
389  * @old_tpl: value of the task priority level to be restored
390  *
391  * This function implements the RestoreTpl service.
392  *
393  * See the Unified Extensible Firmware Interface (UEFI) specification for
394  * details.
395  */
396 static void EFIAPI efi_restore_tpl(efi_uintn_t old_tpl)
397 {
398         EFI_ENTRY("0x%zx", old_tpl);
399
400         if (old_tpl > efi_tpl)
401                 EFI_PRINT("WARNING: old_tpl > current_tpl in %s\n", __func__);
402         efi_tpl = old_tpl;
403         if (efi_tpl > TPL_HIGH_LEVEL)
404                 efi_tpl = TPL_HIGH_LEVEL;
405
406         /*
407          * Lowering the TPL may have made queued events eligible for execution.
408          */
409         efi_timer_check();
410
411         EFI_EXIT(EFI_SUCCESS);
412 }
413
414 /**
415  * efi_allocate_pages_ext() - allocate memory pages
416  * @type:        type of allocation to be performed
417  * @memory_type: usage type of the allocated memory
418  * @pages:       number of pages to be allocated
419  * @memory:      allocated memory
420  *
421  * This function implements the AllocatePages service.
422  *
423  * See the Unified Extensible Firmware Interface (UEFI) specification for
424  * details.
425  *
426  * Return: status code
427  */
428 static efi_status_t EFIAPI efi_allocate_pages_ext(int type, int memory_type,
429                                                   efi_uintn_t pages,
430                                                   uint64_t *memory)
431 {
432         efi_status_t r;
433
434         EFI_ENTRY("%d, %d, 0x%zx, %p", type, memory_type, pages, memory);
435         r = efi_allocate_pages(type, memory_type, pages, memory);
436         return EFI_EXIT(r);
437 }
438
439 /**
440  * efi_free_pages_ext() - Free memory pages.
441  * @memory: start of the memory area to be freed
442  * @pages:  number of pages to be freed
443  *
444  * This function implements the FreePages service.
445  *
446  * See the Unified Extensible Firmware Interface (UEFI) specification for
447  * details.
448  *
449  * Return: status code
450  */
451 static efi_status_t EFIAPI efi_free_pages_ext(uint64_t memory,
452                                               efi_uintn_t pages)
453 {
454         efi_status_t r;
455
456         EFI_ENTRY("%llx, 0x%zx", memory, pages);
457         r = efi_free_pages(memory, pages);
458         return EFI_EXIT(r);
459 }
460
461 /**
462  * efi_get_memory_map_ext() - get map describing memory usage
463  * @memory_map_size:    on entry the size, in bytes, of the memory map buffer,
464  *                      on exit the size of the copied memory map
465  * @memory_map:         buffer to which the memory map is written
466  * @map_key:            key for the memory map
467  * @descriptor_size:    size of an individual memory descriptor
468  * @descriptor_version: version number of the memory descriptor structure
469  *
470  * This function implements the GetMemoryMap service.
471  *
472  * See the Unified Extensible Firmware Interface (UEFI) specification for
473  * details.
474  *
475  * Return: status code
476  */
477 static efi_status_t EFIAPI efi_get_memory_map_ext(
478                                         efi_uintn_t *memory_map_size,
479                                         struct efi_mem_desc *memory_map,
480                                         efi_uintn_t *map_key,
481                                         efi_uintn_t *descriptor_size,
482                                         uint32_t *descriptor_version)
483 {
484         efi_status_t r;
485
486         EFI_ENTRY("%p, %p, %p, %p, %p", memory_map_size, memory_map,
487                   map_key, descriptor_size, descriptor_version);
488         r = efi_get_memory_map(memory_map_size, memory_map, map_key,
489                                descriptor_size, descriptor_version);
490         return EFI_EXIT(r);
491 }
492
493 /**
494  * efi_allocate_pool_ext() - allocate memory from pool
495  * @pool_type: type of the pool from which memory is to be allocated
496  * @size:      number of bytes to be allocated
497  * @buffer:    allocated memory
498  *
499  * This function implements the AllocatePool service.
500  *
501  * See the Unified Extensible Firmware Interface (UEFI) specification for
502  * details.
503  *
504  * Return: status code
505  */
506 static efi_status_t EFIAPI efi_allocate_pool_ext(int pool_type,
507                                                  efi_uintn_t size,
508                                                  void **buffer)
509 {
510         efi_status_t r;
511
512         EFI_ENTRY("%d, %zu, %p", pool_type, size, buffer);
513         r = efi_allocate_pool(pool_type, size, buffer);
514         return EFI_EXIT(r);
515 }
516
517 /**
518  * efi_free_pool_ext() - free memory from pool
519  * @buffer: start of memory to be freed
520  *
521  * This function implements the FreePool service.
522  *
523  * See the Unified Extensible Firmware Interface (UEFI) specification for
524  * details.
525  *
526  * Return: status code
527  */
528 static efi_status_t EFIAPI efi_free_pool_ext(void *buffer)
529 {
530         efi_status_t r;
531
532         EFI_ENTRY("%p", buffer);
533         r = efi_free_pool(buffer);
534         return EFI_EXIT(r);
535 }
536
537 /**
538  * efi_add_handle() - add a new handle to the object list
539  *
540  * @handle:     handle to be added
541  *
542  * The protocols list is initialized. The handle is added to the list of known
543  * UEFI objects.
544  */
545 void efi_add_handle(efi_handle_t handle)
546 {
547         if (!handle)
548                 return;
549         INIT_LIST_HEAD(&handle->protocols);
550         list_add_tail(&handle->link, &efi_obj_list);
551 }
552
553 /**
554  * efi_create_handle() - create handle
555  * @handle: new handle
556  *
557  * Return: status code
558  */
559 efi_status_t efi_create_handle(efi_handle_t *handle)
560 {
561         struct efi_object *obj;
562
563         obj = calloc(1, sizeof(struct efi_object));
564         if (!obj)
565                 return EFI_OUT_OF_RESOURCES;
566
567         efi_add_handle(obj);
568         *handle = obj;
569
570         return EFI_SUCCESS;
571 }
572
573 /**
574  * efi_search_protocol() - find a protocol on a handle.
575  * @handle:        handle
576  * @protocol_guid: GUID of the protocol
577  * @handler:       reference to the protocol
578  *
579  * Return: status code
580  */
581 efi_status_t efi_search_protocol(const efi_handle_t handle,
582                                  const efi_guid_t *protocol_guid,
583                                  struct efi_handler **handler)
584 {
585         struct efi_object *efiobj;
586         struct list_head *lhandle;
587
588         if (!handle || !protocol_guid)
589                 return EFI_INVALID_PARAMETER;
590         efiobj = efi_search_obj(handle);
591         if (!efiobj)
592                 return EFI_INVALID_PARAMETER;
593         list_for_each(lhandle, &efiobj->protocols) {
594                 struct efi_handler *protocol;
595
596                 protocol = list_entry(lhandle, struct efi_handler, link);
597                 if (!guidcmp(&protocol->guid, protocol_guid)) {
598                         if (handler)
599                                 *handler = protocol;
600                         return EFI_SUCCESS;
601                 }
602         }
603         return EFI_NOT_FOUND;
604 }
605
606 /**
607  * efi_remove_protocol() - delete protocol from a handle
608  * @handle:             handle from which the protocol shall be deleted
609  * @protocol:           GUID of the protocol to be deleted
610  * @protocol_interface: interface of the protocol implementation
611  *
612  * Return: status code
613  */
614 static efi_status_t efi_remove_protocol(const efi_handle_t handle,
615                                         const efi_guid_t *protocol,
616                                         void *protocol_interface)
617 {
618         struct efi_handler *handler;
619         efi_status_t ret;
620
621         ret = efi_search_protocol(handle, protocol, &handler);
622         if (ret != EFI_SUCCESS)
623                 return ret;
624         if (handler->protocol_interface != protocol_interface)
625                 return EFI_NOT_FOUND;
626         list_del(&handler->link);
627         free(handler);
628         return EFI_SUCCESS;
629 }
630
631 /**
632  * efi_remove_all_protocols() - delete all protocols from a handle
633  * @handle: handle from which the protocols shall be deleted
634  *
635  * Return: status code
636  */
637 static efi_status_t efi_remove_all_protocols(const efi_handle_t handle)
638 {
639         struct efi_object *efiobj;
640         struct efi_handler *protocol;
641         struct efi_handler *pos;
642
643         efiobj = efi_search_obj(handle);
644         if (!efiobj)
645                 return EFI_INVALID_PARAMETER;
646         list_for_each_entry_safe(protocol, pos, &efiobj->protocols, link) {
647                 efi_status_t ret;
648
649                 ret = efi_uninstall_protocol(handle, &protocol->guid,
650                                              protocol->protocol_interface, true);
651                 if (ret != EFI_SUCCESS)
652                         return ret;
653         }
654         return EFI_SUCCESS;
655 }
656
657 /**
658  * efi_delete_handle() - delete handle
659  *
660  * @handle: handle to delete
661  *
662  * Return: status code
663  */
664 efi_status_t efi_delete_handle(efi_handle_t handle)
665 {
666         efi_status_t ret;
667
668         ret = efi_remove_all_protocols(handle);
669         if (ret != EFI_SUCCESS) {
670                 log_err("Handle %p has protocols installed. Unable to delete\n", handle);
671                 return ret;
672         }
673
674         return efi_purge_handle(handle);
675 }
676
677 /**
678  * efi_is_event() - check if a pointer is a valid event
679  * @event: pointer to check
680  *
681  * Return: status code
682  */
683 static efi_status_t efi_is_event(const struct efi_event *event)
684 {
685         const struct efi_event *evt;
686
687         if (!event)
688                 return EFI_INVALID_PARAMETER;
689         list_for_each_entry(evt, &efi_events, link) {
690                 if (evt == event)
691                         return EFI_SUCCESS;
692         }
693         return EFI_INVALID_PARAMETER;
694 }
695
696 /**
697  * efi_create_event() - create an event
698  *
699  * @type:            type of the event to create
700  * @notify_tpl:      task priority level of the event
701  * @notify_function: notification function of the event
702  * @notify_context:  pointer passed to the notification function
703  * @group:           event group
704  * @event:           created event
705  *
706  * This function is used inside U-Boot code to create an event.
707  *
708  * For the API function implementing the CreateEvent service see
709  * efi_create_event_ext.
710  *
711  * Return: status code
712  */
713 efi_status_t efi_create_event(uint32_t type, efi_uintn_t notify_tpl,
714                               void (EFIAPI *notify_function) (
715                                         struct efi_event *event,
716                                         void *context),
717                               void *notify_context, const efi_guid_t *group,
718                               struct efi_event **event)
719 {
720         struct efi_event *evt;
721         efi_status_t ret;
722         int pool_type;
723
724         if (event == NULL)
725                 return EFI_INVALID_PARAMETER;
726
727         switch (type) {
728         case 0:
729         case EVT_TIMER:
730         case EVT_NOTIFY_SIGNAL:
731         case EVT_TIMER | EVT_NOTIFY_SIGNAL:
732         case EVT_NOTIFY_WAIT:
733         case EVT_TIMER | EVT_NOTIFY_WAIT:
734         case EVT_SIGNAL_EXIT_BOOT_SERVICES:
735                 pool_type = EFI_BOOT_SERVICES_DATA;
736                 break;
737         case EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE:
738                 pool_type = EFI_RUNTIME_SERVICES_DATA;
739                 break;
740         default:
741                 return EFI_INVALID_PARAMETER;
742         }
743
744         /*
745          * The UEFI specification requires event notification levels to be
746          * > TPL_APPLICATION and <= TPL_HIGH_LEVEL.
747          *
748          * Parameter NotifyTpl should not be checked if it is not used.
749          */
750         if ((type & (EVT_NOTIFY_WAIT | EVT_NOTIFY_SIGNAL)) &&
751             (!notify_function || is_valid_tpl(notify_tpl) != EFI_SUCCESS ||
752              notify_tpl == TPL_APPLICATION))
753                 return EFI_INVALID_PARAMETER;
754
755         ret = efi_allocate_pool(pool_type, sizeof(struct efi_event),
756                                 (void **)&evt);
757         if (ret != EFI_SUCCESS)
758                 return ret;
759         memset(evt, 0, sizeof(struct efi_event));
760         evt->type = type;
761         evt->notify_tpl = notify_tpl;
762         evt->notify_function = notify_function;
763         evt->notify_context = notify_context;
764         evt->group = group;
765         /* Disable timers on boot up */
766         evt->trigger_next = -1ULL;
767         list_add_tail(&evt->link, &efi_events);
768         *event = evt;
769         return EFI_SUCCESS;
770 }
771
772 /*
773  * efi_create_event_ex() - create an event in a group
774  *
775  * @type:            type of the event to create
776  * @notify_tpl:      task priority level of the event
777  * @notify_function: notification function of the event
778  * @notify_context:  pointer passed to the notification function
779  * @event:           created event
780  * @event_group:     event group
781  *
782  * This function implements the CreateEventEx service.
783  *
784  * See the Unified Extensible Firmware Interface (UEFI) specification for
785  * details.
786  *
787  * Return: status code
788  */
789 static
790 efi_status_t EFIAPI efi_create_event_ex(uint32_t type, efi_uintn_t notify_tpl,
791                                         void (EFIAPI *notify_function) (
792                                                         struct efi_event *event,
793                                                         void *context),
794                                         void *notify_context,
795                                         const efi_guid_t *event_group,
796                                         struct efi_event **event)
797 {
798         efi_status_t ret;
799
800         EFI_ENTRY("%d, 0x%zx, %p, %p, %pUs", type, notify_tpl, notify_function,
801                   notify_context, event_group);
802
803         /*
804          * The allowable input parameters are the same as in CreateEvent()
805          * except for the following two disallowed event types.
806          */
807         switch (type) {
808         case EVT_SIGNAL_EXIT_BOOT_SERVICES:
809         case EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE:
810                 ret = EFI_INVALID_PARAMETER;
811                 goto out;
812         }
813
814         ret = efi_create_event(type, notify_tpl, notify_function,
815                                notify_context, event_group, event);
816 out:
817         return EFI_EXIT(ret);
818 }
819
820 /**
821  * efi_create_event_ext() - create an event
822  * @type:            type of the event to create
823  * @notify_tpl:      task priority level of the event
824  * @notify_function: notification function of the event
825  * @notify_context:  pointer passed to the notification function
826  * @event:           created event
827  *
828  * This function implements the CreateEvent service.
829  *
830  * See the Unified Extensible Firmware Interface (UEFI) specification for
831  * details.
832  *
833  * Return: status code
834  */
835 static efi_status_t EFIAPI efi_create_event_ext(
836                         uint32_t type, efi_uintn_t notify_tpl,
837                         void (EFIAPI *notify_function) (
838                                         struct efi_event *event,
839                                         void *context),
840                         void *notify_context, struct efi_event **event)
841 {
842         EFI_ENTRY("%d, 0x%zx, %p, %p", type, notify_tpl, notify_function,
843                   notify_context);
844         return EFI_EXIT(efi_create_event(type, notify_tpl, notify_function,
845                                          notify_context, NULL, event));
846 }
847
848 /**
849  * efi_timer_check() - check if a timer event has occurred
850  *
851  * Check if a timer event has occurred or a queued notification function should
852  * be called.
853  *
854  * Our timers have to work without interrupts, so we check whenever keyboard
855  * input or disk accesses happen if enough time elapsed for them to fire.
856  */
857 void efi_timer_check(void)
858 {
859         struct efi_event *evt;
860         u64 now = timer_get_us();
861
862         list_for_each_entry(evt, &efi_events, link) {
863                 if (!timers_enabled)
864                         continue;
865                 if (!(evt->type & EVT_TIMER) || now < evt->trigger_next)
866                         continue;
867                 switch (evt->trigger_type) {
868                 case EFI_TIMER_RELATIVE:
869                         evt->trigger_type = EFI_TIMER_STOP;
870                         break;
871                 case EFI_TIMER_PERIODIC:
872                         evt->trigger_next += evt->trigger_time;
873                         break;
874                 default:
875                         continue;
876                 }
877                 evt->is_signaled = false;
878                 efi_signal_event(evt);
879         }
880         efi_process_event_queue();
881         schedule();
882 }
883
884 /**
885  * efi_set_timer() - set the trigger time for a timer event or stop the event
886  * @event:        event for which the timer is set
887  * @type:         type of the timer
888  * @trigger_time: trigger period in multiples of 100 ns
889  *
890  * This is the function for internal usage in U-Boot. For the API function
891  * implementing the SetTimer service see efi_set_timer_ext.
892  *
893  * Return: status code
894  */
895 efi_status_t efi_set_timer(struct efi_event *event, enum efi_timer_delay type,
896                            uint64_t trigger_time)
897 {
898         /* Check that the event is valid */
899         if (efi_is_event(event) != EFI_SUCCESS || !(event->type & EVT_TIMER))
900                 return EFI_INVALID_PARAMETER;
901
902         /*
903          * The parameter defines a multiple of 100 ns.
904          * We use multiples of 1000 ns. So divide by 10.
905          */
906         do_div(trigger_time, 10);
907
908         switch (type) {
909         case EFI_TIMER_STOP:
910                 event->trigger_next = -1ULL;
911                 break;
912         case EFI_TIMER_PERIODIC:
913         case EFI_TIMER_RELATIVE:
914                 event->trigger_next = timer_get_us() + trigger_time;
915                 break;
916         default:
917                 return EFI_INVALID_PARAMETER;
918         }
919         event->trigger_type = type;
920         event->trigger_time = trigger_time;
921         event->is_signaled = false;
922         return EFI_SUCCESS;
923 }
924
925 /**
926  * efi_set_timer_ext() - Set the trigger time for a timer event or stop the
927  *                       event
928  * @event:        event for which the timer is set
929  * @type:         type of the timer
930  * @trigger_time: trigger period in multiples of 100 ns
931  *
932  * This function implements the SetTimer service.
933  *
934  * See the Unified Extensible Firmware Interface (UEFI) specification for
935  * details.
936  *
937  *
938  * Return: status code
939  */
940 static efi_status_t EFIAPI efi_set_timer_ext(struct efi_event *event,
941                                              enum efi_timer_delay type,
942                                              uint64_t trigger_time)
943 {
944         EFI_ENTRY("%p, %d, %llx", event, type, trigger_time);
945         return EFI_EXIT(efi_set_timer(event, type, trigger_time));
946 }
947
948 /**
949  * efi_wait_for_event() - wait for events to be signaled
950  * @num_events: number of events to be waited for
951  * @event:      events to be waited for
952  * @index:      index of the event that was signaled
953  *
954  * This function implements the WaitForEvent service.
955  *
956  * See the Unified Extensible Firmware Interface (UEFI) specification for
957  * details.
958  *
959  * Return: status code
960  */
961 static efi_status_t EFIAPI efi_wait_for_event(efi_uintn_t num_events,
962                                               struct efi_event **event,
963                                               efi_uintn_t *index)
964 {
965         int i;
966
967         EFI_ENTRY("%zu, %p, %p", num_events, event, index);
968
969         /* Check parameters */
970         if (!num_events || !event)
971                 return EFI_EXIT(EFI_INVALID_PARAMETER);
972         /* Check TPL */
973         if (efi_tpl != TPL_APPLICATION)
974                 return EFI_EXIT(EFI_UNSUPPORTED);
975         for (i = 0; i < num_events; ++i) {
976                 if (efi_is_event(event[i]) != EFI_SUCCESS)
977                         return EFI_EXIT(EFI_INVALID_PARAMETER);
978                 if (!event[i]->type || event[i]->type & EVT_NOTIFY_SIGNAL)
979                         return EFI_EXIT(EFI_INVALID_PARAMETER);
980                 if (!event[i]->is_signaled)
981                         efi_queue_event(event[i]);
982         }
983
984         /* Wait for signal */
985         for (;;) {
986                 for (i = 0; i < num_events; ++i) {
987                         if (event[i]->is_signaled)
988                                 goto out;
989                 }
990                 /* Allow events to occur. */
991                 efi_timer_check();
992         }
993
994 out:
995         /*
996          * Reset the signal which is passed to the caller to allow periodic
997          * events to occur.
998          */
999         event[i]->is_signaled = false;
1000         if (index)
1001                 *index = i;
1002
1003         return EFI_EXIT(EFI_SUCCESS);
1004 }
1005
1006 /**
1007  * efi_signal_event_ext() - signal an EFI event
1008  * @event: event to signal
1009  *
1010  * This function implements the SignalEvent service.
1011  *
1012  * See the Unified Extensible Firmware Interface (UEFI) specification for
1013  * details.
1014  *
1015  * This functions sets the signaled state of the event and queues the
1016  * notification function for execution.
1017  *
1018  * Return: status code
1019  */
1020 static efi_status_t EFIAPI efi_signal_event_ext(struct efi_event *event)
1021 {
1022         EFI_ENTRY("%p", event);
1023         if (efi_is_event(event) != EFI_SUCCESS)
1024                 return EFI_EXIT(EFI_INVALID_PARAMETER);
1025         efi_signal_event(event);
1026         return EFI_EXIT(EFI_SUCCESS);
1027 }
1028
1029 /**
1030  * efi_close_event() - close an EFI event
1031  * @event: event to close
1032  *
1033  * This function implements the CloseEvent service.
1034  *
1035  * See the Unified Extensible Firmware Interface (UEFI) specification for
1036  * details.
1037  *
1038  * Return: status code
1039  */
1040 static efi_status_t EFIAPI efi_close_event(struct efi_event *event)
1041 {
1042         struct efi_register_notify_event *item, *next;
1043
1044         EFI_ENTRY("%p", event);
1045         if (efi_is_event(event) != EFI_SUCCESS)
1046                 return EFI_EXIT(EFI_INVALID_PARAMETER);
1047
1048         /* Remove protocol notify registrations for the event */
1049         list_for_each_entry_safe(item, next, &efi_register_notify_events,
1050                                  link) {
1051                 if (event == item->event) {
1052                         struct efi_protocol_notification *hitem, *hnext;
1053
1054                         /* Remove signaled handles */
1055                         list_for_each_entry_safe(hitem, hnext, &item->handles,
1056                                                  link) {
1057                                 list_del(&hitem->link);
1058                                 free(hitem);
1059                         }
1060                         list_del(&item->link);
1061                         free(item);
1062                 }
1063         }
1064         /* Remove event from queue */
1065         if (efi_event_is_queued(event))
1066                 list_del(&event->queue_link);
1067
1068         list_del(&event->link);
1069         efi_free_pool(event);
1070         return EFI_EXIT(EFI_SUCCESS);
1071 }
1072
1073 /**
1074  * efi_check_event() - check if an event is signaled
1075  * @event: event to check
1076  *
1077  * This function implements the CheckEvent service.
1078  *
1079  * See the Unified Extensible Firmware Interface (UEFI) specification for
1080  * details.
1081  *
1082  * If an event is not signaled yet, the notification function is queued. The
1083  * signaled state is cleared.
1084  *
1085  * Return: status code
1086  */
1087 static efi_status_t EFIAPI efi_check_event(struct efi_event *event)
1088 {
1089         EFI_ENTRY("%p", event);
1090         efi_timer_check();
1091         if (efi_is_event(event) != EFI_SUCCESS ||
1092             event->type & EVT_NOTIFY_SIGNAL)
1093                 return EFI_EXIT(EFI_INVALID_PARAMETER);
1094         if (!event->is_signaled)
1095                 efi_queue_event(event);
1096         if (event->is_signaled) {
1097                 event->is_signaled = false;
1098                 return EFI_EXIT(EFI_SUCCESS);
1099         }
1100         return EFI_EXIT(EFI_NOT_READY);
1101 }
1102
1103 /**
1104  * efi_search_obj() - find the internal EFI object for a handle
1105  * @handle: handle to find
1106  *
1107  * Return: EFI object
1108  */
1109 struct efi_object *efi_search_obj(const efi_handle_t handle)
1110 {
1111         struct efi_object *efiobj;
1112
1113         if (!handle)
1114                 return NULL;
1115
1116         list_for_each_entry(efiobj, &efi_obj_list, link) {
1117                 if (efiobj == handle)
1118                         return efiobj;
1119         }
1120         return NULL;
1121 }
1122
1123 /**
1124  * efi_open_protocol_info_entry() - create open protocol info entry and add it
1125  *                                  to a protocol
1126  * @handler: handler of a protocol
1127  *
1128  * Return: open protocol info entry
1129  */
1130 static struct efi_open_protocol_info_entry *efi_create_open_info(
1131                         struct efi_handler *handler)
1132 {
1133         struct efi_open_protocol_info_item *item;
1134
1135         item = calloc(1, sizeof(struct efi_open_protocol_info_item));
1136         if (!item)
1137                 return NULL;
1138         /* Append the item to the open protocol info list. */
1139         list_add_tail(&item->link, &handler->open_infos);
1140
1141         return &item->info;
1142 }
1143
1144 /**
1145  * efi_delete_open_info() - remove an open protocol info entry from a protocol
1146  * @item: open protocol info entry to delete
1147  *
1148  * Return: status code
1149  */
1150 static efi_status_t efi_delete_open_info(
1151                         struct efi_open_protocol_info_item *item)
1152 {
1153         list_del(&item->link);
1154         free(item);
1155         return EFI_SUCCESS;
1156 }
1157
1158 /**
1159  * efi_add_protocol() - install new protocol on a handle
1160  * @handle:             handle on which the protocol shall be installed
1161  * @protocol:           GUID of the protocol to be installed
1162  * @protocol_interface: interface of the protocol implementation
1163  *
1164  * Return: status code
1165  */
1166 efi_status_t efi_add_protocol(const efi_handle_t handle,
1167                               const efi_guid_t *protocol,
1168                               void *protocol_interface)
1169 {
1170         struct efi_object *efiobj;
1171         struct efi_handler *handler;
1172         efi_status_t ret;
1173         struct efi_register_notify_event *event;
1174
1175         efiobj = efi_search_obj(handle);
1176         if (!efiobj)
1177                 return EFI_INVALID_PARAMETER;
1178         ret = efi_search_protocol(handle, protocol, NULL);
1179         if (ret != EFI_NOT_FOUND)
1180                 return EFI_INVALID_PARAMETER;
1181         handler = calloc(1, sizeof(struct efi_handler));
1182         if (!handler)
1183                 return EFI_OUT_OF_RESOURCES;
1184         memcpy((void *)&handler->guid, protocol, sizeof(efi_guid_t));
1185         handler->protocol_interface = protocol_interface;
1186         INIT_LIST_HEAD(&handler->open_infos);
1187         list_add_tail(&handler->link, &efiobj->protocols);
1188
1189         /* Notify registered events */
1190         list_for_each_entry(event, &efi_register_notify_events, link) {
1191                 if (!guidcmp(protocol, &event->protocol)) {
1192                         struct efi_protocol_notification *notif;
1193
1194                         notif = calloc(1, sizeof(*notif));
1195                         if (!notif) {
1196                                 list_del(&handler->link);
1197                                 free(handler);
1198                                 return EFI_OUT_OF_RESOURCES;
1199                         }
1200                         notif->handle = handle;
1201                         list_add_tail(&notif->link, &event->handles);
1202                         event->event->is_signaled = false;
1203                         efi_signal_event(event->event);
1204                 }
1205         }
1206
1207         if (!guidcmp(&efi_guid_device_path, protocol))
1208                 EFI_PRINT("installed device path '%pD'\n", protocol_interface);
1209         return EFI_SUCCESS;
1210 }
1211
1212 /**
1213  * efi_install_protocol_interface() - install protocol interface
1214  * @handle:                  handle on which the protocol shall be installed
1215  * @protocol:                GUID of the protocol to be installed
1216  * @protocol_interface_type: type of the interface to be installed,
1217  *                           always EFI_NATIVE_INTERFACE
1218  * @protocol_interface:      interface of the protocol implementation
1219  *
1220  * This function implements the InstallProtocolInterface service.
1221  *
1222  * See the Unified Extensible Firmware Interface (UEFI) specification for
1223  * details.
1224  *
1225  * Return: status code
1226  */
1227 static efi_status_t EFIAPI efi_install_protocol_interface(
1228                         efi_handle_t *handle, const efi_guid_t *protocol,
1229                         int protocol_interface_type, void *protocol_interface)
1230 {
1231         efi_status_t r;
1232
1233         EFI_ENTRY("%p, %pUs, %d, %p", handle, protocol, protocol_interface_type,
1234                   protocol_interface);
1235
1236         if (!handle || !protocol ||
1237             protocol_interface_type != EFI_NATIVE_INTERFACE) {
1238                 r = EFI_INVALID_PARAMETER;
1239                 goto out;
1240         }
1241
1242         /* Create new handle if requested. */
1243         if (!*handle) {
1244                 r = efi_create_handle(handle);
1245                 if (r != EFI_SUCCESS)
1246                         goto out;
1247                 EFI_PRINT("new handle %p\n", *handle);
1248         } else {
1249                 EFI_PRINT("handle %p\n", *handle);
1250         }
1251         /* Add new protocol */
1252         r = efi_add_protocol(*handle, protocol, protocol_interface);
1253 out:
1254         return EFI_EXIT(r);
1255 }
1256
1257 /**
1258  * efi_get_drivers() - get all drivers associated to a controller
1259  * @handle:               handle of the controller
1260  * @protocol:             protocol GUID (optional)
1261  * @number_of_drivers:    number of child controllers
1262  * @driver_handle_buffer: handles of the the drivers
1263  *
1264  * The allocated buffer has to be freed with free().
1265  *
1266  * Return: status code
1267  */
1268 static efi_status_t efi_get_drivers(efi_handle_t handle,
1269                                     const efi_guid_t *protocol,
1270                                     efi_uintn_t *number_of_drivers,
1271                                     efi_handle_t **driver_handle_buffer)
1272 {
1273         struct efi_handler *handler;
1274         struct efi_open_protocol_info_item *item;
1275         efi_uintn_t count = 0, i;
1276         bool duplicate;
1277
1278         /* Count all driver associations */
1279         list_for_each_entry(handler, &handle->protocols, link) {
1280                 if (protocol && guidcmp(&handler->guid, protocol))
1281                         continue;
1282                 list_for_each_entry(item, &handler->open_infos, link) {
1283                         if (item->info.attributes &
1284                             EFI_OPEN_PROTOCOL_BY_DRIVER)
1285                                 ++count;
1286                 }
1287         }
1288         *number_of_drivers = 0;
1289         if (!count) {
1290                 *driver_handle_buffer = NULL;
1291                 return EFI_SUCCESS;
1292         }
1293         /*
1294          * Create buffer. In case of duplicate driver assignments the buffer
1295          * will be too large. But that does not harm.
1296          */
1297         *driver_handle_buffer = calloc(count, sizeof(efi_handle_t));
1298         if (!*driver_handle_buffer)
1299                 return EFI_OUT_OF_RESOURCES;
1300         /* Collect unique driver handles */
1301         list_for_each_entry(handler, &handle->protocols, link) {
1302                 if (protocol && guidcmp(&handler->guid, protocol))
1303                         continue;
1304                 list_for_each_entry(item, &handler->open_infos, link) {
1305                         if (item->info.attributes &
1306                             EFI_OPEN_PROTOCOL_BY_DRIVER) {
1307                                 /* Check this is a new driver */
1308                                 duplicate = false;
1309                                 for (i = 0; i < *number_of_drivers; ++i) {
1310                                         if ((*driver_handle_buffer)[i] ==
1311                                             item->info.agent_handle)
1312                                                 duplicate = true;
1313                                 }
1314                                 /* Copy handle to buffer */
1315                                 if (!duplicate) {
1316                                         i = (*number_of_drivers)++;
1317                                         (*driver_handle_buffer)[i] =
1318                                                 item->info.agent_handle;
1319                                 }
1320                         }
1321                 }
1322         }
1323         return EFI_SUCCESS;
1324 }
1325
1326 /**
1327  * efi_disconnect_all_drivers() - disconnect all drivers from a controller
1328  * @handle:       handle of the controller
1329  * @protocol:     protocol GUID (optional)
1330  * @child_handle: handle of the child to destroy
1331  *
1332  * This function implements the DisconnectController service.
1333  *
1334  * See the Unified Extensible Firmware Interface (UEFI) specification for
1335  * details.
1336  *
1337  * Return: status code
1338  */
1339 static efi_status_t efi_disconnect_all_drivers
1340                                 (efi_handle_t handle,
1341                                  const efi_guid_t *protocol,
1342                                  efi_handle_t child_handle)
1343 {
1344         efi_uintn_t number_of_drivers;
1345         efi_handle_t *driver_handle_buffer;
1346         efi_status_t r, ret;
1347
1348         ret = efi_get_drivers(handle, protocol, &number_of_drivers,
1349                               &driver_handle_buffer);
1350         if (ret != EFI_SUCCESS)
1351                 return ret;
1352         if (!number_of_drivers)
1353                 return EFI_SUCCESS;
1354
1355         while (number_of_drivers) {
1356                 r = EFI_CALL(efi_disconnect_controller(
1357                                 handle,
1358                                 driver_handle_buffer[--number_of_drivers],
1359                                 child_handle));
1360                 if (r != EFI_SUCCESS)
1361                         ret = r;
1362         }
1363
1364         free(driver_handle_buffer);
1365         return ret;
1366 }
1367
1368 /**
1369  * efi_uninstall_protocol() - uninstall protocol interface
1370  *
1371  * @handle:             handle from which the protocol shall be removed
1372  * @protocol:           GUID of the protocol to be removed
1373  * @protocol_interface: interface to be removed
1374  * @preserve:           preserve or delete the handle and remove it from any
1375  *                      list it participates if no protocols remain
1376  *
1377  * This function DOES NOT delete a handle without installed protocol.
1378  *
1379  * Return: status code
1380  */
1381 static efi_status_t efi_uninstall_protocol
1382                         (efi_handle_t handle, const efi_guid_t *protocol,
1383                          void *protocol_interface, bool preserve)
1384 {
1385         struct efi_handler *handler;
1386         struct efi_open_protocol_info_item *item;
1387         struct efi_open_protocol_info_item *pos;
1388         efi_status_t r;
1389
1390         /* Find the protocol on the handle */
1391         r = efi_search_protocol(handle, protocol, &handler);
1392         if (r != EFI_SUCCESS)
1393                 goto out;
1394         if (handler->protocol_interface != protocol_interface)
1395                 return EFI_NOT_FOUND;
1396         /* Disconnect controllers */
1397         r = efi_disconnect_all_drivers(handle, protocol, NULL);
1398         if (r != EFI_SUCCESS) {
1399                 r = EFI_ACCESS_DENIED;
1400                 /*
1401                  * This will reconnect all controllers of the handle, even ones
1402                  * that were not connected before. This can be done better
1403                  * but we are following the EDKII implementation on this for
1404                  * now
1405                  */
1406                 EFI_CALL(efi_connect_controller(handle, NULL, NULL, true));
1407                 goto out;
1408         }
1409         /* Close protocol */
1410         list_for_each_entry_safe(item, pos, &handler->open_infos, link) {
1411                 if (item->info.attributes ==
1412                         EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL ||
1413                     item->info.attributes == EFI_OPEN_PROTOCOL_GET_PROTOCOL ||
1414                     item->info.attributes == EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
1415                         efi_delete_open_info(item);
1416         }
1417         /* if agents didn't close the protocols properly */
1418         if (!list_empty(&handler->open_infos)) {
1419                 r =  EFI_ACCESS_DENIED;
1420                 EFI_CALL(efi_connect_controller(handle, NULL, NULL, true));
1421                 goto out;
1422         }
1423         r = efi_remove_protocol(handle, protocol, protocol_interface);
1424         if (r != EFI_SUCCESS)
1425                 return r;
1426         /*
1427          * We don't care about the return value here since the
1428          * handle might have more protocols installed
1429          */
1430         if (!preserve)
1431                 efi_purge_handle(handle);
1432 out:
1433         return r;
1434 }
1435
1436 /**
1437  * efi_uninstall_protocol_interface() - uninstall protocol interface
1438  * @handle:             handle from which the protocol shall be removed
1439  * @protocol:           GUID of the protocol to be removed
1440  * @protocol_interface: interface to be removed
1441  *
1442  * This function implements the UninstallProtocolInterface service.
1443  *
1444  * See the Unified Extensible Firmware Interface (UEFI) specification for
1445  * details.
1446  *
1447  * Return: status code
1448  */
1449 static efi_status_t EFIAPI efi_uninstall_protocol_interface
1450                         (efi_handle_t handle, const efi_guid_t *protocol,
1451                          void *protocol_interface)
1452 {
1453         efi_status_t ret;
1454
1455         EFI_ENTRY("%p, %pUs, %p", handle, protocol, protocol_interface);
1456
1457         ret = efi_uninstall_protocol(handle, protocol, protocol_interface, false);
1458         if (ret != EFI_SUCCESS)
1459                 goto out;
1460
1461 out:
1462         return EFI_EXIT(ret);
1463 }
1464
1465 /**
1466  * efi_register_protocol_notify() - register an event for notification when a
1467  *                                  protocol is installed.
1468  * @protocol:     GUID of the protocol whose installation shall be notified
1469  * @event:        event to be signaled upon installation of the protocol
1470  * @registration: key for retrieving the registration information
1471  *
1472  * This function implements the RegisterProtocolNotify service.
1473  * See the Unified Extensible Firmware Interface (UEFI) specification
1474  * for details.
1475  *
1476  * Return: status code
1477  */
1478 efi_status_t EFIAPI efi_register_protocol_notify(const efi_guid_t *protocol,
1479                                                  struct efi_event *event,
1480                                                  void **registration)
1481 {
1482         struct efi_register_notify_event *item;
1483         efi_status_t ret = EFI_SUCCESS;
1484
1485         EFI_ENTRY("%pUs, %p, %p", protocol, event, registration);
1486
1487         if (!protocol || !event || !registration) {
1488                 ret = EFI_INVALID_PARAMETER;
1489                 goto out;
1490         }
1491
1492         item = calloc(1, sizeof(struct efi_register_notify_event));
1493         if (!item) {
1494                 ret = EFI_OUT_OF_RESOURCES;
1495                 goto out;
1496         }
1497
1498         item->event = event;
1499         guidcpy(&item->protocol, protocol);
1500         INIT_LIST_HEAD(&item->handles);
1501
1502         list_add_tail(&item->link, &efi_register_notify_events);
1503
1504         *registration = item;
1505 out:
1506         return EFI_EXIT(ret);
1507 }
1508
1509 /**
1510  * efi_search() - determine if an EFI handle implements a protocol
1511  *
1512  * @search_type: selection criterion
1513  * @protocol:    GUID of the protocol
1514  * @handle:      handle
1515  *
1516  * See the documentation of the LocateHandle service in the UEFI specification.
1517  *
1518  * Return: 0 if the handle implements the protocol
1519  */
1520 static int efi_search(enum efi_locate_search_type search_type,
1521                       const efi_guid_t *protocol, efi_handle_t handle)
1522 {
1523         efi_status_t ret;
1524
1525         switch (search_type) {
1526         case ALL_HANDLES:
1527                 return 0;
1528         case BY_PROTOCOL:
1529                 ret = efi_search_protocol(handle, protocol, NULL);
1530                 return (ret != EFI_SUCCESS);
1531         default:
1532                 /* Invalid search type */
1533                 return -1;
1534         }
1535 }
1536
1537 /**
1538  * efi_check_register_notify_event() - check if registration key is valid
1539  *
1540  * Check that a pointer is a valid registration key as returned by
1541  * RegisterProtocolNotify().
1542  *
1543  * @key:        registration key
1544  * Return:      valid registration key or NULL
1545  */
1546 static struct efi_register_notify_event *efi_check_register_notify_event
1547                                                                 (void *key)
1548 {
1549         struct efi_register_notify_event *event;
1550
1551         list_for_each_entry(event, &efi_register_notify_events, link) {
1552                 if (event == (struct efi_register_notify_event *)key)
1553                         return event;
1554         }
1555         return NULL;
1556 }
1557
1558 /**
1559  * efi_locate_handle() - locate handles implementing a protocol
1560  *
1561  * @search_type:        selection criterion
1562  * @protocol:           GUID of the protocol
1563  * @search_key:         registration key
1564  * @buffer_size:        size of the buffer to receive the handles in bytes
1565  * @buffer:             buffer to receive the relevant handles
1566  *
1567  * This function is meant for U-Boot internal calls. For the API implementation
1568  * of the LocateHandle service see efi_locate_handle_ext.
1569  *
1570  * Return: status code
1571  */
1572 static efi_status_t efi_locate_handle(
1573                         enum efi_locate_search_type search_type,
1574                         const efi_guid_t *protocol, void *search_key,
1575                         efi_uintn_t *buffer_size, efi_handle_t *buffer)
1576 {
1577         struct efi_object *efiobj;
1578         efi_uintn_t size = 0;
1579         struct efi_register_notify_event *event;
1580         struct efi_protocol_notification *handle = NULL;
1581
1582         /* Check parameters */
1583         switch (search_type) {
1584         case ALL_HANDLES:
1585                 break;
1586         case BY_REGISTER_NOTIFY:
1587                 if (!search_key)
1588                         return EFI_INVALID_PARAMETER;
1589                 /* Check that the registration key is valid */
1590                 event = efi_check_register_notify_event(search_key);
1591                 if (!event)
1592                         return EFI_INVALID_PARAMETER;
1593                 break;
1594         case BY_PROTOCOL:
1595                 if (!protocol)
1596                         return EFI_INVALID_PARAMETER;
1597                 break;
1598         default:
1599                 return EFI_INVALID_PARAMETER;
1600         }
1601
1602         /* Count how much space we need */
1603         if (search_type == BY_REGISTER_NOTIFY) {
1604                 if (list_empty(&event->handles))
1605                         return EFI_NOT_FOUND;
1606                 handle = list_first_entry(&event->handles,
1607                                           struct efi_protocol_notification,
1608                                           link);
1609                 efiobj = handle->handle;
1610                 size += sizeof(void *);
1611         } else {
1612                 list_for_each_entry(efiobj, &efi_obj_list, link) {
1613                         if (!efi_search(search_type, protocol, efiobj))
1614                                 size += sizeof(void *);
1615                 }
1616                 if (size == 0)
1617                         return EFI_NOT_FOUND;
1618         }
1619
1620         if (!buffer_size)
1621                 return EFI_INVALID_PARAMETER;
1622
1623         if (*buffer_size < size) {
1624                 *buffer_size = size;
1625                 return EFI_BUFFER_TOO_SMALL;
1626         }
1627
1628         *buffer_size = size;
1629
1630         /* The buffer size is sufficient but there is no buffer */
1631         if (!buffer)
1632                 return EFI_INVALID_PARAMETER;
1633
1634         /* Then fill the array */
1635         if (search_type == BY_REGISTER_NOTIFY) {
1636                 *buffer = efiobj;
1637                 list_del(&handle->link);
1638         } else {
1639                 list_for_each_entry(efiobj, &efi_obj_list, link) {
1640                         if (!efi_search(search_type, protocol, efiobj))
1641                                 *buffer++ = efiobj;
1642                 }
1643         }
1644
1645         return EFI_SUCCESS;
1646 }
1647
1648 /**
1649  * efi_locate_handle_ext() - locate handles implementing a protocol.
1650  * @search_type: selection criterion
1651  * @protocol:    GUID of the protocol
1652  * @search_key:  registration key
1653  * @buffer_size: size of the buffer to receive the handles in bytes
1654  * @buffer:      buffer to receive the relevant handles
1655  *
1656  * This function implements the LocateHandle service.
1657  *
1658  * See the Unified Extensible Firmware Interface (UEFI) specification for
1659  * details.
1660  *
1661  * Return: 0 if the handle implements the protocol
1662  */
1663 static efi_status_t EFIAPI efi_locate_handle_ext(
1664                         enum efi_locate_search_type search_type,
1665                         const efi_guid_t *protocol, void *search_key,
1666                         efi_uintn_t *buffer_size, efi_handle_t *buffer)
1667 {
1668         EFI_ENTRY("%d, %pUs, %p, %p, %p", search_type, protocol, search_key,
1669                   buffer_size, buffer);
1670
1671         return EFI_EXIT(efi_locate_handle(search_type, protocol, search_key,
1672                         buffer_size, buffer));
1673 }
1674
1675 /**
1676  * efi_remove_configuration_table() - collapses configuration table entries,
1677  *                                    removing index i
1678  *
1679  * @i: index of the table entry to be removed
1680  */
1681 static void efi_remove_configuration_table(int i)
1682 {
1683         struct efi_configuration_table *this = &systab.tables[i];
1684         struct efi_configuration_table *next = &systab.tables[i + 1];
1685         struct efi_configuration_table *end = &systab.tables[systab.nr_tables];
1686
1687         memmove(this, next, (ulong)end - (ulong)next);
1688         systab.nr_tables--;
1689 }
1690
1691 /**
1692  * efi_install_configuration_table() - adds, updates, or removes a
1693  *                                     configuration table
1694  * @guid:  GUID of the installed table
1695  * @table: table to be installed
1696  *
1697  * This function is used for internal calls. For the API implementation of the
1698  * InstallConfigurationTable service see efi_install_configuration_table_ext.
1699  *
1700  * Return: status code
1701  */
1702 efi_status_t efi_install_configuration_table(const efi_guid_t *guid,
1703                                              void *table)
1704 {
1705         struct efi_event *evt;
1706         int i;
1707
1708         if (!guid)
1709                 return EFI_INVALID_PARAMETER;
1710
1711         /* Check for GUID override */
1712         for (i = 0; i < systab.nr_tables; i++) {
1713                 if (!guidcmp(guid, &systab.tables[i].guid)) {
1714                         if (table)
1715                                 systab.tables[i].table = table;
1716                         else
1717                                 efi_remove_configuration_table(i);
1718                         goto out;
1719                 }
1720         }
1721
1722         if (!table)
1723                 return EFI_NOT_FOUND;
1724
1725         /* No override, check for overflow */
1726         if (i >= EFI_MAX_CONFIGURATION_TABLES)
1727                 return EFI_OUT_OF_RESOURCES;
1728
1729         /* Add a new entry */
1730         guidcpy(&systab.tables[i].guid, guid);
1731         systab.tables[i].table = table;
1732         systab.nr_tables = i + 1;
1733
1734 out:
1735         /* systab.nr_tables may have changed. So we need to update the CRC32 */
1736         efi_update_table_header_crc32(&systab.hdr);
1737
1738         /* Notify that the configuration table was changed */
1739         list_for_each_entry(evt, &efi_events, link) {
1740                 if (evt->group && !guidcmp(evt->group, guid)) {
1741                         efi_signal_event(evt);
1742                         break;
1743                 }
1744         }
1745
1746         return EFI_SUCCESS;
1747 }
1748
1749 /**
1750  * efi_install_configuration_table_ex() - Adds, updates, or removes a
1751  *                                        configuration table.
1752  * @guid:  GUID of the installed table
1753  * @table: table to be installed
1754  *
1755  * This function implements the InstallConfigurationTable service.
1756  *
1757  * See the Unified Extensible Firmware Interface (UEFI) specification for
1758  * details.
1759  *
1760  * Return: status code
1761  */
1762 static efi_status_t
1763 EFIAPI efi_install_configuration_table_ext(const efi_guid_t *guid,
1764                                            void *table)
1765 {
1766         EFI_ENTRY("%pUs, %p", guid, table);
1767         return EFI_EXIT(efi_install_configuration_table(guid, table));
1768 }
1769
1770 /**
1771  * efi_setup_loaded_image() - initialize a loaded image
1772  *
1773  * Initialize a loaded_image_info and loaded_image_info object with correct
1774  * protocols, boot-device, etc.
1775  *
1776  * In case of an error \*handle_ptr and \*info_ptr are set to NULL and an error
1777  * code is returned.
1778  *
1779  * @device_path:        device path of the loaded image
1780  * @file_path:          file path of the loaded image
1781  * @handle_ptr:         handle of the loaded image
1782  * @info_ptr:           loaded image protocol
1783  * Return:              status code
1784  */
1785 efi_status_t efi_setup_loaded_image(struct efi_device_path *device_path,
1786                                     struct efi_device_path *file_path,
1787                                     struct efi_loaded_image_obj **handle_ptr,
1788                                     struct efi_loaded_image **info_ptr)
1789 {
1790         efi_status_t ret;
1791         struct efi_loaded_image *info = NULL;
1792         struct efi_loaded_image_obj *obj = NULL;
1793         struct efi_device_path *dp;
1794
1795         /* In case of EFI_OUT_OF_RESOURCES avoid illegal free by caller. */
1796         *handle_ptr = NULL;
1797         *info_ptr = NULL;
1798
1799         info = calloc(1, sizeof(*info));
1800         if (!info)
1801                 return EFI_OUT_OF_RESOURCES;
1802         obj = calloc(1, sizeof(*obj));
1803         if (!obj) {
1804                 free(info);
1805                 return EFI_OUT_OF_RESOURCES;
1806         }
1807         obj->header.type = EFI_OBJECT_TYPE_LOADED_IMAGE;
1808
1809         /* Add internal object to object list */
1810         efi_add_handle(&obj->header);
1811
1812         info->revision =  EFI_LOADED_IMAGE_PROTOCOL_REVISION;
1813         info->file_path = file_path;
1814         info->system_table = &systab;
1815
1816         if (device_path) {
1817                 info->device_handle = efi_dp_find_obj(device_path, NULL, NULL);
1818
1819                 dp = efi_dp_concat(device_path, file_path, 0);
1820                 if (!dp) {
1821                         ret = EFI_OUT_OF_RESOURCES;
1822                         goto failure;
1823                 }
1824         } else {
1825                 dp = NULL;
1826         }
1827         ret = efi_add_protocol(&obj->header,
1828                                &efi_guid_loaded_image_device_path, dp);
1829         if (ret != EFI_SUCCESS)
1830                 goto failure;
1831
1832         /*
1833          * When asking for the loaded_image interface, just
1834          * return handle which points to loaded_image_info
1835          */
1836         ret = efi_add_protocol(&obj->header,
1837                                &efi_guid_loaded_image, info);
1838         if (ret != EFI_SUCCESS)
1839                 goto failure;
1840
1841         *info_ptr = info;
1842         *handle_ptr = obj;
1843
1844         return ret;
1845 failure:
1846         printf("ERROR: Failure to install protocols for loaded image\n");
1847         efi_delete_handle(&obj->header);
1848         free(info);
1849         return ret;
1850 }
1851
1852 /**
1853  * efi_locate_device_path() - Get the device path and handle of an device
1854  *                            implementing a protocol
1855  * @protocol:    GUID of the protocol
1856  * @device_path: device path
1857  * @device:      handle of the device
1858  *
1859  * This function implements the LocateDevicePath service.
1860  *
1861  * See the Unified Extensible Firmware Interface (UEFI) specification for
1862  * details.
1863  *
1864  * Return: status code
1865  */
1866 efi_status_t EFIAPI efi_locate_device_path(const efi_guid_t *protocol,
1867                                            struct efi_device_path **device_path,
1868                                            efi_handle_t *device)
1869 {
1870         struct efi_device_path *dp;
1871         size_t i;
1872         struct efi_handler *handler;
1873         efi_handle_t *handles;
1874         size_t len, len_dp;
1875         size_t len_best = 0;
1876         efi_uintn_t no_handles;
1877         u8 *remainder;
1878         efi_status_t ret;
1879
1880         EFI_ENTRY("%pUs, %p, %p", protocol, device_path, device);
1881
1882         if (!protocol || !device_path || !*device_path) {
1883                 ret = EFI_INVALID_PARAMETER;
1884                 goto out;
1885         }
1886
1887         /* Find end of device path */
1888         len = efi_dp_instance_size(*device_path);
1889
1890         /* Get all handles implementing the protocol */
1891         ret = EFI_CALL(efi_locate_handle_buffer(BY_PROTOCOL, protocol, NULL,
1892                                                 &no_handles, &handles));
1893         if (ret != EFI_SUCCESS)
1894                 goto out;
1895
1896         for (i = 0; i < no_handles; ++i) {
1897                 /* Find the device path protocol */
1898                 ret = efi_search_protocol(handles[i], &efi_guid_device_path,
1899                                           &handler);
1900                 if (ret != EFI_SUCCESS)
1901                         continue;
1902                 dp = (struct efi_device_path *)handler->protocol_interface;
1903                 len_dp = efi_dp_instance_size(dp);
1904                 /*
1905                  * This handle can only be a better fit
1906                  * if its device path length is longer than the best fit and
1907                  * if its device path length is shorter of equal the searched
1908                  * device path.
1909                  */
1910                 if (len_dp <= len_best || len_dp > len)
1911                         continue;
1912                 /* Check if dp is a subpath of device_path */
1913                 if (memcmp(*device_path, dp, len_dp))
1914                         continue;
1915                 if (!device) {
1916                         ret = EFI_INVALID_PARAMETER;
1917                         goto out;
1918                 }
1919                 *device = handles[i];
1920                 len_best = len_dp;
1921         }
1922         if (len_best) {
1923                 remainder = (u8 *)*device_path + len_best;
1924                 *device_path = (struct efi_device_path *)remainder;
1925                 ret = EFI_SUCCESS;
1926         } else {
1927                 ret = EFI_NOT_FOUND;
1928         }
1929 out:
1930         return EFI_EXIT(ret);
1931 }
1932
1933 /**
1934  * efi_load_image_from_file() - load an image from file system
1935  *
1936  * Read a file into a buffer allocated as EFI_BOOT_SERVICES_DATA. It is the
1937  * callers obligation to update the memory type as needed.
1938  *
1939  * @file_path:          the path of the image to load
1940  * @buffer:             buffer containing the loaded image
1941  * @size:               size of the loaded image
1942  * Return:              status code
1943  */
1944 static
1945 efi_status_t efi_load_image_from_file(struct efi_device_path *file_path,
1946                                       void **buffer, efi_uintn_t *size)
1947 {
1948         struct efi_file_handle *f;
1949         efi_status_t ret;
1950         u64 addr;
1951         efi_uintn_t bs;
1952
1953         /* Open file */
1954         f = efi_file_from_path(file_path);
1955         if (!f)
1956                 return EFI_NOT_FOUND;
1957
1958         ret = efi_file_size(f, &bs);
1959         if (ret != EFI_SUCCESS)
1960                 goto error;
1961
1962         /*
1963          * When reading the file we do not yet know if it contains an
1964          * application, a boottime driver, or a runtime driver. So here we
1965          * allocate a buffer as EFI_BOOT_SERVICES_DATA. The caller has to
1966          * update the reservation according to the image type.
1967          */
1968         ret = efi_allocate_pages(EFI_ALLOCATE_ANY_PAGES,
1969                                  EFI_BOOT_SERVICES_DATA,
1970                                  efi_size_in_pages(bs), &addr);
1971         if (ret != EFI_SUCCESS) {
1972                 ret = EFI_OUT_OF_RESOURCES;
1973                 goto error;
1974         }
1975
1976         /* Read file */
1977         EFI_CALL(ret = f->read(f, &bs, (void *)(uintptr_t)addr));
1978         if (ret != EFI_SUCCESS)
1979                 efi_free_pages(addr, efi_size_in_pages(bs));
1980         *buffer = (void *)(uintptr_t)addr;
1981         *size = bs;
1982 error:
1983         EFI_CALL(f->close(f));
1984         return ret;
1985 }
1986
1987 /**
1988  * efi_load_image_from_path() - load an image using a file path
1989  *
1990  * Read a file into a buffer allocated as EFI_BOOT_SERVICES_DATA. It is the
1991  * callers obligation to update the memory type as needed.
1992  *
1993  * @boot_policy:        true for request originating from the boot manager
1994  * @file_path:          the path of the image to load
1995  * @buffer:             buffer containing the loaded image
1996  * @size:               size of the loaded image
1997  * Return:              status code
1998  */
1999 efi_status_t efi_load_image_from_path(bool boot_policy,
2000                                       struct efi_device_path *file_path,
2001                                       void **buffer, efi_uintn_t *size)
2002 {
2003         efi_handle_t device;
2004         efi_status_t ret;
2005         struct efi_device_path *dp, *rem;
2006         struct efi_load_file_protocol *load_file_protocol = NULL;
2007         efi_uintn_t buffer_size;
2008         uint64_t addr, pages;
2009         const efi_guid_t *guid;
2010         struct efi_handler *handler;
2011
2012         /* In case of failure nothing is returned */
2013         *buffer = NULL;
2014         *size = 0;
2015
2016         dp = file_path;
2017         device = efi_dp_find_obj(dp, NULL, &rem);
2018         ret = efi_search_protocol(device, &efi_simple_file_system_protocol_guid,
2019                                   NULL);
2020         if (ret == EFI_SUCCESS)
2021                 return efi_load_image_from_file(file_path, buffer, size);
2022
2023         ret = efi_search_protocol(device, &efi_guid_load_file_protocol, NULL);
2024         if (ret == EFI_SUCCESS) {
2025                 guid = &efi_guid_load_file_protocol;
2026         } else if (!boot_policy) {
2027                 guid = &efi_guid_load_file2_protocol;
2028                 ret = efi_search_protocol(device, guid, NULL);
2029         }
2030         if (ret != EFI_SUCCESS)
2031                 return EFI_NOT_FOUND;
2032         ret = efi_search_protocol(device, guid, &handler);
2033         if (ret != EFI_SUCCESS)
2034                 return EFI_NOT_FOUND;
2035         buffer_size = 0;
2036         load_file_protocol = handler->protocol_interface;
2037         ret = EFI_CALL(load_file_protocol->load_file(
2038                                         load_file_protocol, rem, boot_policy,
2039                                         &buffer_size, NULL));
2040         if (ret != EFI_BUFFER_TOO_SMALL)
2041                 goto out;
2042         pages = efi_size_in_pages(buffer_size);
2043         ret = efi_allocate_pages(EFI_ALLOCATE_ANY_PAGES, EFI_BOOT_SERVICES_DATA,
2044                                  pages, &addr);
2045         if (ret != EFI_SUCCESS) {
2046                 ret = EFI_OUT_OF_RESOURCES;
2047                 goto out;
2048         }
2049         ret = EFI_CALL(load_file_protocol->load_file(
2050                                         load_file_protocol, rem, boot_policy,
2051                                         &buffer_size, (void *)(uintptr_t)addr));
2052         if (ret != EFI_SUCCESS)
2053                 efi_free_pages(addr, pages);
2054 out:
2055         efi_close_protocol(device, guid, efi_root, NULL);
2056         if (ret == EFI_SUCCESS) {
2057                 *buffer = (void *)(uintptr_t)addr;
2058                 *size = buffer_size;
2059         }
2060
2061         return ret;
2062 }
2063
2064 /**
2065  * efi_load_image() - load an EFI image into memory
2066  * @boot_policy:   true for request originating from the boot manager
2067  * @parent_image:  the caller's image handle
2068  * @file_path:     the path of the image to load
2069  * @source_buffer: memory location from which the image is installed
2070  * @source_size:   size of the memory area from which the image is installed
2071  * @image_handle:  handle for the newly installed image
2072  *
2073  * This function implements the LoadImage service.
2074  *
2075  * See the Unified Extensible Firmware Interface (UEFI) specification
2076  * for details.
2077  *
2078  * Return: status code
2079  */
2080 efi_status_t EFIAPI efi_load_image(bool boot_policy,
2081                                    efi_handle_t parent_image,
2082                                    struct efi_device_path *file_path,
2083                                    void *source_buffer,
2084                                    efi_uintn_t source_size,
2085                                    efi_handle_t *image_handle)
2086 {
2087         struct efi_device_path *dp, *fp;
2088         struct efi_loaded_image *info = NULL;
2089         struct efi_loaded_image_obj **image_obj =
2090                 (struct efi_loaded_image_obj **)image_handle;
2091         efi_status_t ret;
2092         void *dest_buffer;
2093
2094         EFI_ENTRY("%d, %p, %pD, %p, %zu, %p", boot_policy, parent_image,
2095                   file_path, source_buffer, source_size, image_handle);
2096
2097         if (!image_handle || (!source_buffer && !file_path) ||
2098             !efi_search_obj(parent_image) ||
2099             /* The parent image handle must refer to a loaded image */
2100             !parent_image->type) {
2101                 ret = EFI_INVALID_PARAMETER;
2102                 goto error;
2103         }
2104
2105         if (!source_buffer) {
2106                 ret = efi_load_image_from_path(boot_policy, file_path,
2107                                                &dest_buffer, &source_size);
2108                 if (ret != EFI_SUCCESS)
2109                         goto error;
2110         } else {
2111                 dest_buffer = source_buffer;
2112         }
2113         /* split file_path which contains both the device and file parts */
2114         efi_dp_split_file_path(file_path, &dp, &fp);
2115         ret = efi_setup_loaded_image(dp, fp, image_obj, &info);
2116         if (ret == EFI_SUCCESS)
2117                 ret = efi_load_pe(*image_obj, dest_buffer, source_size, info);
2118         if (!source_buffer)
2119                 /* Release buffer to which file was loaded */
2120                 efi_free_pages((uintptr_t)dest_buffer,
2121                                efi_size_in_pages(source_size));
2122         if (ret == EFI_SUCCESS || ret == EFI_SECURITY_VIOLATION) {
2123                 info->system_table = &systab;
2124                 info->parent_handle = parent_image;
2125         } else {
2126                 /* The image is invalid. Release all associated resources. */
2127                 efi_delete_handle(*image_handle);
2128                 *image_handle = NULL;
2129                 free(info);
2130         }
2131 error:
2132         return EFI_EXIT(ret);
2133 }
2134
2135 /**
2136  * efi_exit_caches() - fix up caches for EFI payloads if necessary
2137  */
2138 static void efi_exit_caches(void)
2139 {
2140 #if defined(CONFIG_EFI_GRUB_ARM32_WORKAROUND)
2141         /*
2142          * Boooting Linux via GRUB prior to version 2.04 fails on 32bit ARM if
2143          * caches are enabled.
2144          *
2145          * TODO:
2146          * According to the UEFI spec caches that can be managed via CP15
2147          * operations should be enabled. Caches requiring platform information
2148          * to manage should be disabled. This should not happen in
2149          * ExitBootServices() but before invoking any UEFI binary is invoked.
2150          *
2151          * We want to keep the current workaround while GRUB prior to version
2152          * 2.04 is still in use.
2153          */
2154         cleanup_before_linux();
2155 #endif
2156 }
2157
2158 /**
2159  * efi_exit_boot_services() - stop all boot services
2160  * @image_handle: handle of the loaded image
2161  * @map_key:      key of the memory map
2162  *
2163  * This function implements the ExitBootServices service.
2164  *
2165  * See the Unified Extensible Firmware Interface (UEFI) specification
2166  * for details.
2167  *
2168  * All timer events are disabled. For exit boot services events the
2169  * notification function is called. The boot services are disabled in the
2170  * system table.
2171  *
2172  * Return: status code
2173  */
2174 static efi_status_t EFIAPI efi_exit_boot_services(efi_handle_t image_handle,
2175                                                   efi_uintn_t map_key)
2176 {
2177         struct efi_event *evt, *next_event;
2178         efi_status_t ret = EFI_SUCCESS;
2179
2180         EFI_ENTRY("%p, %zx", image_handle, map_key);
2181
2182         /* Check that the caller has read the current memory map */
2183         if (map_key != efi_memory_map_key) {
2184                 ret = EFI_INVALID_PARAMETER;
2185                 goto out;
2186         }
2187
2188         /* Check if ExitBootServices has already been called */
2189         if (!systab.boottime)
2190                 goto out;
2191
2192         /* Notify EFI_EVENT_GROUP_BEFORE_EXIT_BOOT_SERVICES event group. */
2193         list_for_each_entry(evt, &efi_events, link) {
2194                 if (evt->group &&
2195                     !guidcmp(evt->group,
2196                              &efi_guid_event_group_before_exit_boot_services)) {
2197                         efi_signal_event(evt);
2198                         break;
2199                 }
2200         }
2201
2202         /* Stop all timer related activities */
2203         timers_enabled = false;
2204
2205         /* Add related events to the event group */
2206         list_for_each_entry(evt, &efi_events, link) {
2207                 if (evt->type == EVT_SIGNAL_EXIT_BOOT_SERVICES)
2208                         evt->group = &efi_guid_event_group_exit_boot_services;
2209         }
2210         /* Notify that ExitBootServices is invoked. */
2211         list_for_each_entry(evt, &efi_events, link) {
2212                 if (evt->group &&
2213                     !guidcmp(evt->group,
2214                              &efi_guid_event_group_exit_boot_services)) {
2215                         efi_signal_event(evt);
2216                         break;
2217                 }
2218         }
2219
2220         /* Make sure that notification functions are not called anymore */
2221         efi_tpl = TPL_HIGH_LEVEL;
2222
2223         /* Notify variable services */
2224         efi_variables_boot_exit_notify();
2225
2226         /* Remove all events except EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE */
2227         list_for_each_entry_safe(evt, next_event, &efi_events, link) {
2228                 if (evt->type != EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE)
2229                         list_del(&evt->link);
2230         }
2231
2232         if (!efi_st_keep_devices) {
2233                 bootm_disable_interrupts();
2234                 if (IS_ENABLED(CONFIG_USB_DEVICE))
2235                         udc_disconnect();
2236                 board_quiesce_devices();
2237                 dm_remove_devices_flags(DM_REMOVE_ACTIVE_ALL);
2238         }
2239
2240         /* Patch out unsupported runtime function */
2241         efi_runtime_detach();
2242
2243         /* Fix up caches for EFI payloads if necessary */
2244         efi_exit_caches();
2245
2246         /* Disable boot time services */
2247         systab.con_in_handle = NULL;
2248         systab.con_in = NULL;
2249         systab.con_out_handle = NULL;
2250         systab.con_out = NULL;
2251         systab.stderr_handle = NULL;
2252         systab.std_err = NULL;
2253         systab.boottime = NULL;
2254
2255         /* Recalculate CRC32 */
2256         efi_update_table_header_crc32(&systab.hdr);
2257
2258         /* Give the payload some time to boot */
2259         efi_set_watchdog(0);
2260         schedule();
2261 out:
2262         if (IS_ENABLED(CONFIG_EFI_TCG2_PROTOCOL)) {
2263                 if (ret != EFI_SUCCESS)
2264                         efi_tcg2_notify_exit_boot_services_failed();
2265         }
2266
2267         return EFI_EXIT(ret);
2268 }
2269
2270 /**
2271  * efi_get_next_monotonic_count() - get next value of the counter
2272  * @count: returned value of the counter
2273  *
2274  * This function implements the NextMonotonicCount service.
2275  *
2276  * See the Unified Extensible Firmware Interface (UEFI) specification for
2277  * details.
2278  *
2279  * Return: status code
2280  */
2281 static efi_status_t EFIAPI efi_get_next_monotonic_count(uint64_t *count)
2282 {
2283         static uint64_t mono;
2284         efi_status_t ret;
2285
2286         EFI_ENTRY("%p", count);
2287         if (!count) {
2288                 ret = EFI_INVALID_PARAMETER;
2289                 goto out;
2290         }
2291         *count = mono++;
2292         ret = EFI_SUCCESS;
2293 out:
2294         return EFI_EXIT(ret);
2295 }
2296
2297 /**
2298  * efi_stall() - sleep
2299  * @microseconds: period to sleep in microseconds
2300  *
2301  * This function implements the Stall service.
2302  *
2303  * See the Unified Extensible Firmware Interface (UEFI) specification for
2304  * details.
2305  *
2306  * Return:  status code
2307  */
2308 static efi_status_t EFIAPI efi_stall(unsigned long microseconds)
2309 {
2310         u64 end_tick;
2311
2312         EFI_ENTRY("%ld", microseconds);
2313
2314         end_tick = get_ticks() + usec_to_tick(microseconds);
2315         while (get_ticks() < end_tick)
2316                 efi_timer_check();
2317
2318         return EFI_EXIT(EFI_SUCCESS);
2319 }
2320
2321 /**
2322  * efi_set_watchdog_timer() - reset the watchdog timer
2323  * @timeout:       seconds before reset by watchdog
2324  * @watchdog_code: code to be logged when resetting
2325  * @data_size:     size of buffer in bytes
2326  * @watchdog_data: buffer with data describing the reset reason
2327  *
2328  * This function implements the SetWatchdogTimer service.
2329  *
2330  * See the Unified Extensible Firmware Interface (UEFI) specification for
2331  * details.
2332  *
2333  * Return: status code
2334  */
2335 static efi_status_t EFIAPI efi_set_watchdog_timer(unsigned long timeout,
2336                                                   uint64_t watchdog_code,
2337                                                   unsigned long data_size,
2338                                                   uint16_t *watchdog_data)
2339 {
2340         EFI_ENTRY("%ld, 0x%llx, %ld, %p", timeout, watchdog_code,
2341                   data_size, watchdog_data);
2342         return EFI_EXIT(efi_set_watchdog(timeout));
2343 }
2344
2345 /**
2346  * efi_close_protocol() - close a protocol
2347  * @handle:            handle on which the protocol shall be closed
2348  * @protocol:          GUID of the protocol to close
2349  * @agent_handle:      handle of the driver
2350  * @controller_handle: handle of the controller
2351  *
2352  * This is the function implementing the CloseProtocol service is for internal
2353  * usage in U-Boot. For API usage wrapper efi_close_protocol_ext() is provided.
2354  *
2355  * See the Unified Extensible Firmware Interface (UEFI) specification for
2356  * details.
2357  *
2358  * Return: status code
2359  */
2360 efi_status_t efi_close_protocol(efi_handle_t handle, const efi_guid_t *protocol,
2361                                 efi_handle_t agent_handle,
2362                                 efi_handle_t controller_handle)
2363 {
2364         struct efi_handler *handler;
2365         struct efi_open_protocol_info_item *item;
2366         struct efi_open_protocol_info_item *pos;
2367         efi_status_t ret;
2368
2369         if (!efi_search_obj(agent_handle) ||
2370             (controller_handle && !efi_search_obj(controller_handle)))
2371                 return EFI_INVALID_PARAMETER;
2372         ret = efi_search_protocol(handle, protocol, &handler);
2373         if (ret != EFI_SUCCESS)
2374                 return ret;
2375
2376         ret = EFI_NOT_FOUND;
2377         list_for_each_entry_safe(item, pos, &handler->open_infos, link) {
2378                 if (item->info.agent_handle == agent_handle &&
2379                     item->info.controller_handle == controller_handle) {
2380                         efi_delete_open_info(item);
2381                         ret = EFI_SUCCESS;
2382                 }
2383         }
2384
2385         return ret;
2386 }
2387
2388 /**
2389  * efi_close_protocol_ext() - close a protocol
2390  * @handle:            handle on which the protocol shall be closed
2391  * @protocol:          GUID of the protocol to close
2392  * @agent_handle:      handle of the driver
2393  * @controller_handle: handle of the controller
2394  *
2395  * This function implements the CloseProtocol service.
2396  *
2397  * See the Unified Extensible Firmware Interface (UEFI) specification for
2398  * details.
2399  *
2400  * Return: status code
2401  */
2402 static efi_status_t EFIAPI
2403 efi_close_protocol_ext(efi_handle_t handle, const efi_guid_t *protocol,
2404                        efi_handle_t agent_handle,
2405                        efi_handle_t controller_handle)
2406 {
2407         efi_status_t ret;
2408
2409         EFI_ENTRY("%p, %pUs, %p, %p", handle, protocol, agent_handle,
2410                   controller_handle);
2411
2412         ret = efi_close_protocol(handle, protocol,
2413                                  agent_handle, controller_handle);
2414
2415         return EFI_EXIT(ret);
2416 }
2417
2418 /**
2419  * efi_open_protocol_information() - provide information about then open status
2420  *                                   of a protocol on a handle
2421  * @handle:       handle for which the information shall be retrieved
2422  * @protocol:     GUID of the protocol
2423  * @entry_buffer: buffer to receive the open protocol information
2424  * @entry_count:  number of entries available in the buffer
2425  *
2426  * This function implements the OpenProtocolInformation service.
2427  *
2428  * See the Unified Extensible Firmware Interface (UEFI) specification for
2429  * details.
2430  *
2431  * Return: status code
2432  */
2433 static efi_status_t EFIAPI efi_open_protocol_information(
2434                         efi_handle_t handle, const efi_guid_t *protocol,
2435                         struct efi_open_protocol_info_entry **entry_buffer,
2436                         efi_uintn_t *entry_count)
2437 {
2438         unsigned long buffer_size;
2439         unsigned long count;
2440         struct efi_handler *handler;
2441         struct efi_open_protocol_info_item *item;
2442         efi_status_t r;
2443
2444         EFI_ENTRY("%p, %pUs, %p, %p", handle, protocol, entry_buffer,
2445                   entry_count);
2446
2447         /* Check parameters */
2448         if (!entry_buffer) {
2449                 r = EFI_INVALID_PARAMETER;
2450                 goto out;
2451         }
2452         r = efi_search_protocol(handle, protocol, &handler);
2453         if (r != EFI_SUCCESS)
2454                 goto out;
2455
2456         /* Count entries */
2457         count = 0;
2458         list_for_each_entry(item, &handler->open_infos, link) {
2459                 if (item->info.open_count)
2460                         ++count;
2461         }
2462         *entry_count = count;
2463         *entry_buffer = NULL;
2464         if (!count) {
2465                 r = EFI_SUCCESS;
2466                 goto out;
2467         }
2468
2469         /* Copy entries */
2470         buffer_size = count * sizeof(struct efi_open_protocol_info_entry);
2471         r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
2472                               (void **)entry_buffer);
2473         if (r != EFI_SUCCESS)
2474                 goto out;
2475         list_for_each_entry_reverse(item, &handler->open_infos, link) {
2476                 if (item->info.open_count)
2477                         (*entry_buffer)[--count] = item->info;
2478         }
2479 out:
2480         return EFI_EXIT(r);
2481 }
2482
2483 /**
2484  * efi_protocols_per_handle() - get protocols installed on a handle
2485  * @handle:                handle for which the information is retrieved
2486  * @protocol_buffer:       buffer with protocol GUIDs
2487  * @protocol_buffer_count: number of entries in the buffer
2488  *
2489  * This function implements the ProtocolsPerHandleService.
2490  *
2491  * See the Unified Extensible Firmware Interface (UEFI) specification for
2492  * details.
2493  *
2494  * Return: status code
2495  */
2496 static efi_status_t EFIAPI efi_protocols_per_handle(
2497                         efi_handle_t handle, efi_guid_t ***protocol_buffer,
2498                         efi_uintn_t *protocol_buffer_count)
2499 {
2500         unsigned long buffer_size;
2501         struct efi_object *efiobj;
2502         struct list_head *protocol_handle;
2503         efi_status_t r;
2504
2505         EFI_ENTRY("%p, %p, %p", handle, protocol_buffer,
2506                   protocol_buffer_count);
2507
2508         if (!handle || !protocol_buffer || !protocol_buffer_count)
2509                 return EFI_EXIT(EFI_INVALID_PARAMETER);
2510
2511         *protocol_buffer = NULL;
2512
2513         efiobj = efi_search_obj(handle);
2514         if (!efiobj)
2515                 return EFI_EXIT(EFI_INVALID_PARAMETER);
2516
2517         *protocol_buffer_count = list_count_nodes(&efiobj->protocols);
2518
2519         /* Copy GUIDs */
2520         if (*protocol_buffer_count) {
2521                 size_t j = 0;
2522
2523                 buffer_size = sizeof(efi_guid_t *) * *protocol_buffer_count;
2524                 r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
2525                                       (void **)protocol_buffer);
2526                 if (r != EFI_SUCCESS)
2527                         return EFI_EXIT(r);
2528                 list_for_each(protocol_handle, &efiobj->protocols) {
2529                         struct efi_handler *protocol;
2530
2531                         protocol = list_entry(protocol_handle,
2532                                               struct efi_handler, link);
2533                         (*protocol_buffer)[j] = (void *)&protocol->guid;
2534                         ++j;
2535                 }
2536         }
2537
2538         return EFI_EXIT(EFI_SUCCESS);
2539 }
2540
2541 efi_status_t efi_locate_handle_buffer_int(enum efi_locate_search_type search_type,
2542                                           const efi_guid_t *protocol, void *search_key,
2543                                           efi_uintn_t *no_handles, efi_handle_t **buffer)
2544 {
2545         efi_status_t r;
2546         efi_uintn_t buffer_size = 0;
2547
2548         if (!no_handles || !buffer) {
2549                 r = EFI_INVALID_PARAMETER;
2550                 goto out;
2551         }
2552         *no_handles = 0;
2553         *buffer = NULL;
2554         r = efi_locate_handle(search_type, protocol, search_key, &buffer_size,
2555                               *buffer);
2556         if (r != EFI_BUFFER_TOO_SMALL)
2557                 goto out;
2558         r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
2559                               (void **)buffer);
2560         if (r != EFI_SUCCESS)
2561                 goto out;
2562         r = efi_locate_handle(search_type, protocol, search_key, &buffer_size,
2563                               *buffer);
2564         if (r == EFI_SUCCESS)
2565                 *no_handles = buffer_size / sizeof(efi_handle_t);
2566 out:
2567         return r;
2568 }
2569
2570 /**
2571  * efi_locate_handle_buffer() - locate handles implementing a protocol
2572  * @search_type: selection criterion
2573  * @protocol:    GUID of the protocol
2574  * @search_key:  registration key
2575  * @no_handles:  number of returned handles
2576  * @buffer:      buffer with the returned handles
2577  *
2578  * This function implements the LocateHandleBuffer service.
2579  *
2580  * See the Unified Extensible Firmware Interface (UEFI) specification for
2581  * details.
2582  *
2583  * Return: status code
2584  */
2585 efi_status_t EFIAPI efi_locate_handle_buffer(
2586                         enum efi_locate_search_type search_type,
2587                         const efi_guid_t *protocol, void *search_key,
2588                         efi_uintn_t *no_handles, efi_handle_t **buffer)
2589 {
2590         efi_status_t r;
2591
2592         EFI_ENTRY("%d, %pUs, %p, %p, %p", search_type, protocol, search_key,
2593                   no_handles, buffer);
2594
2595         r = efi_locate_handle_buffer_int(search_type, protocol, search_key,
2596                                          no_handles, buffer);
2597
2598         return EFI_EXIT(r);
2599 }
2600
2601 /**
2602  * efi_locate_protocol() - find an interface implementing a protocol
2603  * @protocol:           GUID of the protocol
2604  * @registration:       registration key passed to the notification function
2605  * @protocol_interface: interface implementing the protocol
2606  *
2607  * This function implements the LocateProtocol service.
2608  *
2609  * See the Unified Extensible Firmware Interface (UEFI) specification for
2610  * details.
2611  *
2612  * Return: status code
2613  */
2614 static efi_status_t EFIAPI efi_locate_protocol(const efi_guid_t *protocol,
2615                                                void *registration,
2616                                                void **protocol_interface)
2617 {
2618         struct efi_handler *handler;
2619         efi_status_t ret;
2620         struct efi_object *efiobj;
2621
2622         EFI_ENTRY("%pUs, %p, %p", protocol, registration, protocol_interface);
2623
2624         /*
2625          * The UEFI spec explicitly requires a protocol even if a registration
2626          * key is provided. This differs from the logic in LocateHandle().
2627          */
2628         if (!protocol || !protocol_interface)
2629                 return EFI_EXIT(EFI_INVALID_PARAMETER);
2630
2631         if (registration) {
2632                 struct efi_register_notify_event *event;
2633                 struct efi_protocol_notification *handle;
2634
2635                 event = efi_check_register_notify_event(registration);
2636                 if (!event)
2637                         return EFI_EXIT(EFI_INVALID_PARAMETER);
2638                 /*
2639                  * The UEFI spec requires to return EFI_NOT_FOUND if no
2640                  * protocol instance matches protocol and registration.
2641                  * So let's do the same for a mismatch between protocol and
2642                  * registration.
2643                  */
2644                 if (guidcmp(&event->protocol, protocol))
2645                         goto not_found;
2646                 if (list_empty(&event->handles))
2647                         goto not_found;
2648                 handle = list_first_entry(&event->handles,
2649                                           struct efi_protocol_notification,
2650                                           link);
2651                 efiobj = handle->handle;
2652                 list_del(&handle->link);
2653                 free(handle);
2654                 ret = efi_search_protocol(efiobj, protocol, &handler);
2655                 if (ret == EFI_SUCCESS)
2656                         goto found;
2657         } else {
2658                 list_for_each_entry(efiobj, &efi_obj_list, link) {
2659                         ret = efi_search_protocol(efiobj, protocol, &handler);
2660                         if (ret == EFI_SUCCESS)
2661                                 goto found;
2662                 }
2663         }
2664 not_found:
2665         *protocol_interface = NULL;
2666         return EFI_EXIT(EFI_NOT_FOUND);
2667 found:
2668         *protocol_interface = handler->protocol_interface;
2669         return EFI_EXIT(EFI_SUCCESS);
2670 }
2671
2672 /**
2673  * efi_install_multiple_protocol_interfaces_int() - Install multiple protocol
2674  *                                              interfaces
2675  * @handle: handle on which the protocol interfaces shall be installed
2676  * @argptr: va_list of args
2677  *
2678  * Core functionality of efi_install_multiple_protocol_interfaces
2679  * Must not be called directly
2680  *
2681  * Return: status code
2682  */
2683 static efi_status_t EFIAPI
2684 efi_install_multiple_protocol_interfaces_int(efi_handle_t *handle,
2685                                              efi_va_list argptr)
2686 {
2687         const efi_guid_t *protocol;
2688         void *protocol_interface;
2689         efi_handle_t old_handle;
2690         efi_status_t ret = EFI_SUCCESS;
2691         int i = 0;
2692         efi_va_list argptr_copy;
2693
2694         if (!handle)
2695                 return EFI_INVALID_PARAMETER;
2696
2697         efi_va_copy(argptr_copy, argptr);
2698         for (;;) {
2699                 protocol = efi_va_arg(argptr, efi_guid_t*);
2700                 if (!protocol)
2701                         break;
2702                 protocol_interface = efi_va_arg(argptr, void*);
2703                 /* Check that a device path has not been installed before */
2704                 if (!guidcmp(protocol, &efi_guid_device_path)) {
2705                         struct efi_device_path *dp = protocol_interface;
2706
2707                         ret = EFI_CALL(efi_locate_device_path(protocol, &dp,
2708                                                               &old_handle));
2709                         if (ret == EFI_SUCCESS &&
2710                             dp->type == DEVICE_PATH_TYPE_END) {
2711                                 EFI_PRINT("Path %pD already installed\n",
2712                                           protocol_interface);
2713                                 ret = EFI_ALREADY_STARTED;
2714                                 break;
2715                         }
2716                 }
2717                 ret = EFI_CALL(efi_install_protocol_interface(handle, protocol,
2718                                                               EFI_NATIVE_INTERFACE,
2719                                                               protocol_interface));
2720                 if (ret != EFI_SUCCESS)
2721                         break;
2722                 i++;
2723         }
2724         if (ret == EFI_SUCCESS)
2725                 goto out;
2726
2727         /* If an error occurred undo all changes. */
2728         for (; i; --i) {
2729                 protocol = efi_va_arg(argptr_copy, efi_guid_t*);
2730                 protocol_interface = efi_va_arg(argptr_copy, void*);
2731                 EFI_CALL(efi_uninstall_protocol_interface(*handle, protocol,
2732                                                           protocol_interface));
2733         }
2734
2735 out:
2736         efi_va_end(argptr_copy);
2737         return ret;
2738
2739 }
2740
2741 /**
2742  * efi_install_multiple_protocol_interfaces() - Install multiple protocol
2743  *                                              interfaces
2744  * @handle: handle on which the protocol interfaces shall be installed
2745  * @...:    NULL terminated argument list with pairs of protocol GUIDS and
2746  *          interfaces
2747  *
2748  *
2749  * This is the function for internal usage in U-Boot. For the API function
2750  * implementing the InstallMultipleProtocol service see
2751  * efi_install_multiple_protocol_interfaces_ext()
2752  *
2753  * Return: status code
2754  */
2755 efi_status_t EFIAPI
2756 efi_install_multiple_protocol_interfaces(efi_handle_t *handle, ...)
2757 {
2758         efi_status_t ret;
2759         efi_va_list argptr;
2760
2761         efi_va_start(argptr, handle);
2762         ret = efi_install_multiple_protocol_interfaces_int(handle, argptr);
2763         efi_va_end(argptr);
2764         return ret;
2765 }
2766
2767 /**
2768  * efi_install_multiple_protocol_interfaces_ext() - Install multiple protocol
2769  *                                                  interfaces
2770  * @handle: handle on which the protocol interfaces shall be installed
2771  * @...:    NULL terminated argument list with pairs of protocol GUIDS and
2772  *          interfaces
2773  *
2774  * This function implements the MultipleProtocolInterfaces service.
2775  *
2776  * See the Unified Extensible Firmware Interface (UEFI) specification for
2777  * details.
2778  *
2779  * Return: status code
2780  */
2781 static efi_status_t EFIAPI
2782 efi_install_multiple_protocol_interfaces_ext(efi_handle_t *handle, ...)
2783 {
2784         EFI_ENTRY("%p", handle);
2785         efi_status_t ret;
2786         efi_va_list argptr;
2787
2788         efi_va_start(argptr, handle);
2789         ret = efi_install_multiple_protocol_interfaces_int(handle, argptr);
2790         efi_va_end(argptr);
2791         return EFI_EXIT(ret);
2792 }
2793
2794 /**
2795  * efi_uninstall_multiple_protocol_interfaces_int() - wrapper for uninstall
2796  *                                                  multiple protocol
2797  *                                                  interfaces
2798  * @handle: handle from which the protocol interfaces shall be removed
2799  * @argptr: va_list of args
2800  *
2801  * Core functionality of efi_uninstall_multiple_protocol_interfaces
2802  * Must not be called directly
2803  *
2804  * Return: status code
2805  */
2806 static efi_status_t EFIAPI
2807 efi_uninstall_multiple_protocol_interfaces_int(efi_handle_t handle,
2808                                                efi_va_list argptr)
2809 {
2810         const efi_guid_t *protocol, *next_protocol;
2811         void *protocol_interface;
2812         efi_status_t ret = EFI_SUCCESS;
2813         size_t i = 0;
2814         efi_va_list argptr_copy;
2815
2816         if (!handle)
2817                 return EFI_INVALID_PARAMETER;
2818
2819         efi_va_copy(argptr_copy, argptr);
2820         protocol = efi_va_arg(argptr, efi_guid_t*);
2821         for (;;) {
2822                 /*
2823                  * If efi_uninstall_protocol() fails we need to be able to
2824                  * reinstall the previously uninstalled protocols on the same
2825                  * handle.
2826                  * Instead of calling efi_uninstall_protocol(...,..., false)
2827                  * and potentially removing the handle, only allow the handle
2828                  * removal on the last protocol that we requested to uninstall.
2829                  * That way we can preserve  the handle in case the latter fails
2830                  */
2831                 bool preserve = true;
2832
2833                 if (!protocol)
2834                         break;
2835                 protocol_interface = efi_va_arg(argptr, void*);
2836                 next_protocol = efi_va_arg(argptr, efi_guid_t*);
2837                 if (!next_protocol)
2838                         preserve = false;
2839                 ret = efi_uninstall_protocol(handle, protocol,
2840                                              protocol_interface, preserve);
2841                 if (ret != EFI_SUCCESS)
2842                         break;
2843                 i++;
2844                 protocol = next_protocol;
2845         }
2846         if (ret == EFI_SUCCESS)
2847                 goto out;
2848
2849         /* If an error occurred undo all changes. */
2850         for (; i; --i) {
2851                 protocol = efi_va_arg(argptr_copy, efi_guid_t*);
2852                 protocol_interface = efi_va_arg(argptr_copy, void*);
2853                 EFI_CALL(efi_install_protocol_interface(&handle, protocol,
2854                                                         EFI_NATIVE_INTERFACE,
2855                                                         protocol_interface));
2856         }
2857         /*
2858          * If any errors are generated while the protocol interfaces are being
2859          * uninstalled, then the protocols uninstalled prior to the error will
2860          * be reinstalled using InstallProtocolInterface() and the status code
2861          * EFI_INVALID_PARAMETER is returned.
2862          */
2863         ret = EFI_INVALID_PARAMETER;
2864
2865 out:
2866         efi_va_end(argptr_copy);
2867         return ret;
2868 }
2869
2870 /**
2871  * efi_uninstall_multiple_protocol_interfaces() - uninstall multiple protocol
2872  *                                                interfaces
2873  * @handle: handle from which the protocol interfaces shall be removed
2874  * @...:    NULL terminated argument list with pairs of protocol GUIDS and
2875  *          interfaces
2876  *
2877  * This function implements the UninstallMultipleProtocolInterfaces service.
2878  *
2879  * This is the function for internal usage in U-Boot. For the API function
2880  * implementing the UninstallMultipleProtocolInterfaces service see
2881  * efi_uninstall_multiple_protocol_interfaces_ext()
2882  *
2883  * Return: status code
2884  */
2885 efi_status_t EFIAPI
2886 efi_uninstall_multiple_protocol_interfaces(efi_handle_t handle, ...)
2887 {
2888         efi_status_t ret;
2889         efi_va_list argptr;
2890
2891         efi_va_start(argptr, handle);
2892         ret = efi_uninstall_multiple_protocol_interfaces_int(handle, argptr);
2893         efi_va_end(argptr);
2894         return ret;
2895 }
2896
2897 /**
2898  * efi_uninstall_multiple_protocol_interfaces_ext() - uninstall multiple protocol
2899  *                                                    interfaces
2900  * @handle: handle from which the protocol interfaces shall be removed
2901  * @...:    NULL terminated argument list with pairs of protocol GUIDS and
2902  *          interfaces
2903  *
2904  * This function implements the UninstallMultipleProtocolInterfaces service.
2905  *
2906  * See the Unified Extensible Firmware Interface (UEFI) specification for
2907  * details.
2908  *
2909  * Return: status code
2910  */
2911 static efi_status_t EFIAPI
2912 efi_uninstall_multiple_protocol_interfaces_ext(efi_handle_t handle, ...)
2913 {
2914         EFI_ENTRY("%p", handle);
2915         efi_status_t ret;
2916         efi_va_list argptr;
2917
2918         efi_va_start(argptr, handle);
2919         ret = efi_uninstall_multiple_protocol_interfaces_int(handle, argptr);
2920         efi_va_end(argptr);
2921         return EFI_EXIT(ret);
2922 }
2923
2924 /**
2925  * efi_calculate_crc32() - calculate cyclic redundancy code
2926  * @data:      buffer with data
2927  * @data_size: size of buffer in bytes
2928  * @crc32_p:   cyclic redundancy code
2929  *
2930  * This function implements the CalculateCrc32 service.
2931  *
2932  * See the Unified Extensible Firmware Interface (UEFI) specification for
2933  * details.
2934  *
2935  * Return: status code
2936  */
2937 static efi_status_t EFIAPI efi_calculate_crc32(const void *data,
2938                                                efi_uintn_t data_size,
2939                                                u32 *crc32_p)
2940 {
2941         efi_status_t ret = EFI_SUCCESS;
2942
2943         EFI_ENTRY("%p, %zu", data, data_size);
2944         if (!data || !data_size || !crc32_p) {
2945                 ret = EFI_INVALID_PARAMETER;
2946                 goto out;
2947         }
2948         *crc32_p = crc32(0, data, data_size);
2949 out:
2950         return EFI_EXIT(ret);
2951 }
2952
2953 /**
2954  * efi_copy_mem() - copy memory
2955  * @destination: destination of the copy operation
2956  * @source:      source of the copy operation
2957  * @length:      number of bytes to copy
2958  *
2959  * This function implements the CopyMem service.
2960  *
2961  * See the Unified Extensible Firmware Interface (UEFI) specification for
2962  * details.
2963  */
2964 static void EFIAPI efi_copy_mem(void *destination, const void *source,
2965                                 size_t length)
2966 {
2967         EFI_ENTRY("%p, %p, %ld", destination, source, (unsigned long)length);
2968         memmove(destination, source, length);
2969         EFI_EXIT(EFI_SUCCESS);
2970 }
2971
2972 /**
2973  * efi_set_mem() - Fill memory with a byte value.
2974  * @buffer: buffer to fill
2975  * @size:   size of buffer in bytes
2976  * @value:  byte to copy to the buffer
2977  *
2978  * This function implements the SetMem service.
2979  *
2980  * See the Unified Extensible Firmware Interface (UEFI) specification for
2981  * details.
2982  */
2983 static void EFIAPI efi_set_mem(void *buffer, size_t size, uint8_t value)
2984 {
2985         EFI_ENTRY("%p, %ld, 0x%x", buffer, (unsigned long)size, value);
2986         memset(buffer, value, size);
2987         EFI_EXIT(EFI_SUCCESS);
2988 }
2989
2990 /**
2991  * efi_protocol_open() - open protocol interface on a handle
2992  * @handler:            handler of a protocol
2993  * @protocol_interface: interface implementing the protocol
2994  * @agent_handle:       handle of the driver
2995  * @controller_handle:  handle of the controller
2996  * @attributes:         attributes indicating how to open the protocol
2997  *
2998  * Return: status code
2999  */
3000 efi_status_t efi_protocol_open(
3001                         struct efi_handler *handler,
3002                         void **protocol_interface, void *agent_handle,
3003                         void *controller_handle, uint32_t attributes)
3004 {
3005         struct efi_open_protocol_info_item *item;
3006         struct efi_open_protocol_info_entry *match = NULL;
3007         bool opened_by_driver = false;
3008         bool opened_exclusive = false;
3009
3010         /* If there is no agent, only return the interface */
3011         if (!agent_handle)
3012                 goto out;
3013
3014         /* For TEST_PROTOCOL ignore interface attribute */
3015         if (attributes != EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
3016                 *protocol_interface = NULL;
3017
3018         /*
3019          * Check if the protocol is already opened by a driver with the same
3020          * attributes or opened exclusively
3021          */
3022         list_for_each_entry(item, &handler->open_infos, link) {
3023                 if (item->info.agent_handle == agent_handle) {
3024                         if ((attributes & EFI_OPEN_PROTOCOL_BY_DRIVER) &&
3025                             (item->info.attributes == attributes))
3026                                 return EFI_ALREADY_STARTED;
3027                 } else {
3028                         if (item->info.attributes &
3029                             EFI_OPEN_PROTOCOL_BY_DRIVER)
3030                                 opened_by_driver = true;
3031                 }
3032                 if (item->info.attributes & EFI_OPEN_PROTOCOL_EXCLUSIVE)
3033                         opened_exclusive = true;
3034         }
3035
3036         /* Only one controller can open the protocol exclusively */
3037         if (attributes & EFI_OPEN_PROTOCOL_EXCLUSIVE) {
3038                 if (opened_exclusive)
3039                         return EFI_ACCESS_DENIED;
3040         } else if (attributes & EFI_OPEN_PROTOCOL_BY_DRIVER) {
3041                 if (opened_exclusive || opened_by_driver)
3042                         return EFI_ACCESS_DENIED;
3043         }
3044
3045         /* Prepare exclusive opening */
3046         if (attributes & EFI_OPEN_PROTOCOL_EXCLUSIVE) {
3047                 /* Try to disconnect controllers */
3048 disconnect_next:
3049                 opened_by_driver = false;
3050                 list_for_each_entry(item, &handler->open_infos, link) {
3051                         efi_status_t ret;
3052
3053                         if (item->info.attributes ==
3054                                         EFI_OPEN_PROTOCOL_BY_DRIVER) {
3055                                 ret = EFI_CALL(efi_disconnect_controller(
3056                                                 item->info.controller_handle,
3057                                                 item->info.agent_handle,
3058                                                 NULL));
3059                                 if (ret == EFI_SUCCESS)
3060                                         /*
3061                                          * Child controllers may have been
3062                                          * removed from the open_infos list. So
3063                                          * let's restart the loop.
3064                                          */
3065                                         goto disconnect_next;
3066                                 else
3067                                         opened_by_driver = true;
3068                         }
3069                 }
3070                 /* Only one driver can be connected */
3071                 if (opened_by_driver)
3072                         return EFI_ACCESS_DENIED;
3073         }
3074
3075         /* Find existing entry */
3076         list_for_each_entry(item, &handler->open_infos, link) {
3077                 if (item->info.agent_handle == agent_handle &&
3078                     item->info.controller_handle == controller_handle &&
3079                     item->info.attributes == attributes)
3080                         match = &item->info;
3081         }
3082         /* None found, create one */
3083         if (!match) {
3084                 match = efi_create_open_info(handler);
3085                 if (!match)
3086                         return EFI_OUT_OF_RESOURCES;
3087         }
3088
3089         match->agent_handle = agent_handle;
3090         match->controller_handle = controller_handle;
3091         match->attributes = attributes;
3092         match->open_count++;
3093
3094 out:
3095         /* For TEST_PROTOCOL ignore interface attribute. */
3096         if (attributes != EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
3097                 *protocol_interface = handler->protocol_interface;
3098
3099         return EFI_SUCCESS;
3100 }
3101
3102 /**
3103  * efi_open_protocol() - open protocol interface on a handle
3104  * @handle:             handle on which the protocol shall be opened
3105  * @protocol:           GUID of the protocol
3106  * @protocol_interface: interface implementing the protocol
3107  * @agent_handle:       handle of the driver
3108  * @controller_handle:  handle of the controller
3109  * @attributes:         attributes indicating how to open the protocol
3110  *
3111  * This function implements the OpenProtocol interface.
3112  *
3113  * See the Unified Extensible Firmware Interface (UEFI) specification for
3114  * details.
3115  *
3116  * Return: status code
3117  */
3118 static efi_status_t EFIAPI efi_open_protocol
3119                         (efi_handle_t handle, const efi_guid_t *protocol,
3120                          void **protocol_interface, efi_handle_t agent_handle,
3121                          efi_handle_t controller_handle, uint32_t attributes)
3122 {
3123         struct efi_handler *handler;
3124         efi_status_t r = EFI_INVALID_PARAMETER;
3125
3126         EFI_ENTRY("%p, %pUs, %p, %p, %p, 0x%x", handle, protocol,
3127                   protocol_interface, agent_handle, controller_handle,
3128                   attributes);
3129
3130         if (!handle || !protocol ||
3131             (!protocol_interface && attributes !=
3132              EFI_OPEN_PROTOCOL_TEST_PROTOCOL)) {
3133                 goto out;
3134         }
3135
3136         switch (attributes) {
3137         case EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL:
3138         case EFI_OPEN_PROTOCOL_GET_PROTOCOL:
3139         case EFI_OPEN_PROTOCOL_TEST_PROTOCOL:
3140                 break;
3141         case EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER:
3142                 if (controller_handle == handle)
3143                         goto out;
3144                 /* fall-through */
3145         case EFI_OPEN_PROTOCOL_BY_DRIVER:
3146         case EFI_OPEN_PROTOCOL_BY_DRIVER | EFI_OPEN_PROTOCOL_EXCLUSIVE:
3147                 /* Check that the controller handle is valid */
3148                 if (!efi_search_obj(controller_handle))
3149                         goto out;
3150                 /* fall-through */
3151         case EFI_OPEN_PROTOCOL_EXCLUSIVE:
3152                 /* Check that the agent handle is valid */
3153                 if (!efi_search_obj(agent_handle))
3154                         goto out;
3155                 break;
3156         default:
3157                 goto out;
3158         }
3159
3160         r = efi_search_protocol(handle, protocol, &handler);
3161         switch (r) {
3162         case EFI_SUCCESS:
3163                 break;
3164         case EFI_NOT_FOUND:
3165                 r = EFI_UNSUPPORTED;
3166                 goto out;
3167         default:
3168                 goto out;
3169         }
3170
3171         r = efi_protocol_open(handler, protocol_interface, agent_handle,
3172                               controller_handle, attributes);
3173 out:
3174         return EFI_EXIT(r);
3175 }
3176
3177 /**
3178  * efi_start_image() - call the entry point of an image
3179  * @image_handle:   handle of the image
3180  * @exit_data_size: size of the buffer
3181  * @exit_data:      buffer to receive the exit data of the called image
3182  *
3183  * This function implements the StartImage service.
3184  *
3185  * See the Unified Extensible Firmware Interface (UEFI) specification for
3186  * details.
3187  *
3188  * Return: status code
3189  */
3190 efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle,
3191                                     efi_uintn_t *exit_data_size,
3192                                     u16 **exit_data)
3193 {
3194         struct efi_loaded_image_obj *image_obj =
3195                 (struct efi_loaded_image_obj *)image_handle;
3196         efi_status_t ret;
3197         void *info;
3198         efi_handle_t parent_image = current_image;
3199         efi_status_t exit_status;
3200         struct jmp_buf_data exit_jmp;
3201
3202         EFI_ENTRY("%p, %p, %p", image_handle, exit_data_size, exit_data);
3203
3204         if (!efi_search_obj(image_handle))
3205                 return EFI_EXIT(EFI_INVALID_PARAMETER);
3206
3207         /* Check parameters */
3208         if (image_obj->header.type != EFI_OBJECT_TYPE_LOADED_IMAGE)
3209                 return EFI_EXIT(EFI_INVALID_PARAMETER);
3210
3211         if (image_obj->auth_status != EFI_IMAGE_AUTH_PASSED)
3212                 return EFI_EXIT(EFI_SECURITY_VIOLATION);
3213
3214         ret = EFI_CALL(efi_open_protocol(image_handle, &efi_guid_loaded_image,
3215                                          &info, NULL, NULL,
3216                                          EFI_OPEN_PROTOCOL_GET_PROTOCOL));
3217         if (ret != EFI_SUCCESS)
3218                 return EFI_EXIT(EFI_INVALID_PARAMETER);
3219
3220         image_obj->exit_data_size = exit_data_size;
3221         image_obj->exit_data = exit_data;
3222         image_obj->exit_status = &exit_status;
3223         image_obj->exit_jmp = &exit_jmp;
3224
3225         if (IS_ENABLED(CONFIG_EFI_TCG2_PROTOCOL)) {
3226                 if (image_obj->image_type == IMAGE_SUBSYSTEM_EFI_APPLICATION) {
3227                         ret = efi_tcg2_measure_efi_app_invocation(image_obj);
3228                         if (ret == EFI_SECURITY_VIOLATION) {
3229                                 /*
3230                                  * TCG2 Protocol is installed but no TPM device found,
3231                                  * this is not expected.
3232                                  */
3233                                 return EFI_EXIT(EFI_SECURITY_VIOLATION);
3234                         }
3235                 }
3236         }
3237
3238         /* call the image! */
3239         if (setjmp(&exit_jmp)) {
3240                 /*
3241                  * We called the entry point of the child image with EFI_CALL
3242                  * in the lines below. The child image called the Exit() boot
3243                  * service efi_exit() which executed the long jump that brought
3244                  * us to the current line. This implies that the second half
3245                  * of the EFI_CALL macro has not been executed.
3246                  */
3247 #if defined(CONFIG_ARM) || defined(CONFIG_RISCV)
3248                 /*
3249                  * efi_exit() called efi_restore_gd(). We have to undo this
3250                  * otherwise __efi_entry_check() will put the wrong value into
3251                  * app_gd.
3252                  */
3253                 set_gd(app_gd);
3254 #endif
3255                 /*
3256                  * To get ready to call EFI_EXIT below we have to execute the
3257                  * missed out steps of EFI_CALL.
3258                  */
3259                 assert(__efi_entry_check());
3260                 EFI_PRINT("%lu returned by started image\n",
3261                           (unsigned long)((uintptr_t)exit_status &
3262                           ~EFI_ERROR_MASK));
3263                 current_image = parent_image;
3264                 return EFI_EXIT(exit_status);
3265         }
3266
3267         current_image = image_handle;
3268         image_obj->header.type = EFI_OBJECT_TYPE_STARTED_IMAGE;
3269         EFI_PRINT("Jumping into 0x%p\n", image_obj->entry);
3270         ret = EFI_CALL(image_obj->entry(image_handle, &systab));
3271
3272         /*
3273          * Control is returned from a started UEFI image either by calling
3274          * Exit() (where exit data can be provided) or by simply returning from
3275          * the entry point. In the latter case call Exit() on behalf of the
3276          * image.
3277          */
3278         return EFI_CALL(systab.boottime->exit(image_handle, ret, 0, NULL));
3279 }
3280
3281 /**
3282  * efi_delete_image() - delete loaded image from memory)
3283  *
3284  * @image_obj:                  handle of the loaded image
3285  * @loaded_image_protocol:      loaded image protocol
3286  */
3287 static efi_status_t efi_delete_image
3288                         (struct efi_loaded_image_obj *image_obj,
3289                          struct efi_loaded_image *loaded_image_protocol)
3290 {
3291         struct efi_object *efiobj;
3292         efi_status_t r, ret = EFI_SUCCESS;
3293
3294 close_next:
3295         list_for_each_entry(efiobj, &efi_obj_list, link) {
3296                 struct efi_handler *protocol;
3297
3298                 list_for_each_entry(protocol, &efiobj->protocols, link) {
3299                         struct efi_open_protocol_info_item *info;
3300
3301                         list_for_each_entry(info, &protocol->open_infos, link) {
3302                                 if (info->info.agent_handle !=
3303                                     (efi_handle_t)image_obj)
3304                                         continue;
3305                                 r = efi_close_protocol(
3306                                                 efiobj, &protocol->guid,
3307                                                 info->info.agent_handle,
3308                                                 info->info.controller_handle);
3309                                 if (r !=  EFI_SUCCESS)
3310                                         ret = r;
3311                                 /*
3312                                  * Closing protocols may results in further
3313                                  * items being deleted. To play it safe loop
3314                                  * over all elements again.
3315                                  */
3316                                 goto close_next;
3317                         }
3318                 }
3319         }
3320
3321         efi_free_pages((uintptr_t)loaded_image_protocol->image_base,
3322                        efi_size_in_pages(loaded_image_protocol->image_size));
3323         efi_delete_handle(&image_obj->header);
3324
3325         return ret;
3326 }
3327
3328 /**
3329  * efi_unload_image() - unload an EFI image
3330  * @image_handle: handle of the image to be unloaded
3331  *
3332  * This function implements the UnloadImage service.
3333  *
3334  * See the Unified Extensible Firmware Interface (UEFI) specification for
3335  * details.
3336  *
3337  * Return: status code
3338  */
3339 efi_status_t EFIAPI efi_unload_image(efi_handle_t image_handle)
3340 {
3341         efi_status_t ret = EFI_SUCCESS;
3342         struct efi_object *efiobj;
3343         struct efi_loaded_image *loaded_image_protocol;
3344
3345         EFI_ENTRY("%p", image_handle);
3346
3347         efiobj = efi_search_obj(image_handle);
3348         if (!efiobj) {
3349                 ret = EFI_INVALID_PARAMETER;
3350                 goto out;
3351         }
3352         /* Find the loaded image protocol */
3353         ret = EFI_CALL(efi_open_protocol(image_handle, &efi_guid_loaded_image,
3354                                          (void **)&loaded_image_protocol,
3355                                          NULL, NULL,
3356                                          EFI_OPEN_PROTOCOL_GET_PROTOCOL));
3357         if (ret != EFI_SUCCESS) {
3358                 ret = EFI_INVALID_PARAMETER;
3359                 goto out;
3360         }
3361         switch (efiobj->type) {
3362         case EFI_OBJECT_TYPE_STARTED_IMAGE:
3363                 /* Call the unload function */
3364                 if (!loaded_image_protocol->unload) {
3365                         ret = EFI_UNSUPPORTED;
3366                         goto out;
3367                 }
3368                 ret = EFI_CALL(loaded_image_protocol->unload(image_handle));
3369                 if (ret != EFI_SUCCESS)
3370                         goto out;
3371                 break;
3372         case EFI_OBJECT_TYPE_LOADED_IMAGE:
3373                 break;
3374         default:
3375                 ret = EFI_INVALID_PARAMETER;
3376                 goto out;
3377         }
3378         efi_delete_image((struct efi_loaded_image_obj *)efiobj,
3379                          loaded_image_protocol);
3380 out:
3381         return EFI_EXIT(ret);
3382 }
3383
3384 /**
3385  * efi_update_exit_data() - fill exit data parameters of StartImage()
3386  *
3387  * @image_obj:          image handle
3388  * @exit_data_size:     size of the exit data buffer
3389  * @exit_data:          buffer with data returned by UEFI payload
3390  * Return:              status code
3391  */
3392 static efi_status_t efi_update_exit_data(struct efi_loaded_image_obj *image_obj,
3393                                          efi_uintn_t exit_data_size,
3394                                          u16 *exit_data)
3395 {
3396         efi_status_t ret;
3397
3398         /*
3399          * If exit_data is not provided to StartImage(), exit_data_size must be
3400          * ignored.
3401          */
3402         if (!image_obj->exit_data)
3403                 return EFI_SUCCESS;
3404         if (image_obj->exit_data_size)
3405                 *image_obj->exit_data_size = exit_data_size;
3406         if (exit_data_size && exit_data) {
3407                 ret = efi_allocate_pool(EFI_BOOT_SERVICES_DATA,
3408                                         exit_data_size,
3409                                         (void **)image_obj->exit_data);
3410                 if (ret != EFI_SUCCESS)
3411                         return ret;
3412                 memcpy(*image_obj->exit_data, exit_data, exit_data_size);
3413         } else {
3414                 image_obj->exit_data = NULL;
3415         }
3416         return EFI_SUCCESS;
3417 }
3418
3419 /**
3420  * efi_exit() - leave an EFI application or driver
3421  * @image_handle:   handle of the application or driver that is exiting
3422  * @exit_status:    status code
3423  * @exit_data_size: size of the buffer in bytes
3424  * @exit_data:      buffer with data describing an error
3425  *
3426  * This function implements the Exit service.
3427  *
3428  * See the Unified Extensible Firmware Interface (UEFI) specification for
3429  * details.
3430  *
3431  * Return: status code
3432  */
3433 static efi_status_t EFIAPI efi_exit(efi_handle_t image_handle,
3434                                     efi_status_t exit_status,
3435                                     efi_uintn_t exit_data_size,
3436                                     u16 *exit_data)
3437 {
3438         /*
3439          * TODO: We should call the unload procedure of the loaded
3440          *       image protocol.
3441          */
3442         efi_status_t ret;
3443         struct efi_loaded_image *loaded_image_protocol;
3444         struct efi_loaded_image_obj *image_obj =
3445                 (struct efi_loaded_image_obj *)image_handle;
3446         struct jmp_buf_data *exit_jmp;
3447
3448         EFI_ENTRY("%p, %ld, %zu, %p", image_handle, exit_status,
3449                   exit_data_size, exit_data);
3450
3451         /* Check parameters */
3452         ret = EFI_CALL(efi_open_protocol(image_handle, &efi_guid_loaded_image,
3453                                          (void **)&loaded_image_protocol,
3454                                          NULL, NULL,
3455                                          EFI_OPEN_PROTOCOL_GET_PROTOCOL));
3456         if (ret != EFI_SUCCESS) {
3457                 ret = EFI_INVALID_PARAMETER;
3458                 goto out;
3459         }
3460
3461         /* Unloading of unstarted images */
3462         switch (image_obj->header.type) {
3463         case EFI_OBJECT_TYPE_STARTED_IMAGE:
3464                 break;
3465         case EFI_OBJECT_TYPE_LOADED_IMAGE:
3466                 efi_delete_image(image_obj, loaded_image_protocol);
3467                 ret = EFI_SUCCESS;
3468                 goto out;
3469         default:
3470                 /* Handle does not refer to loaded image */
3471                 ret = EFI_INVALID_PARAMETER;
3472                 goto out;
3473         }
3474         /* A started image can only be unloaded it is the last one started. */
3475         if (image_handle != current_image) {
3476                 ret = EFI_INVALID_PARAMETER;
3477                 goto out;
3478         }
3479
3480         /* Exit data is only foreseen in case of failure. */
3481         if (exit_status != EFI_SUCCESS) {
3482                 ret = efi_update_exit_data(image_obj, exit_data_size,
3483                                            exit_data);
3484                 /* Exiting has priority. Don't return error to caller. */
3485                 if (ret != EFI_SUCCESS)
3486                         EFI_PRINT("%s: out of memory\n", __func__);
3487         }
3488         /* efi_delete_image() frees image_obj. Copy before the call. */
3489         exit_jmp = image_obj->exit_jmp;
3490         *image_obj->exit_status = exit_status;
3491         if (image_obj->image_type == IMAGE_SUBSYSTEM_EFI_APPLICATION ||
3492             exit_status != EFI_SUCCESS)
3493                 efi_delete_image(image_obj, loaded_image_protocol);
3494
3495         if (IS_ENABLED(CONFIG_EFI_TCG2_PROTOCOL)) {
3496                 if (image_obj->image_type == IMAGE_SUBSYSTEM_EFI_APPLICATION) {
3497                         ret = efi_tcg2_measure_efi_app_exit();
3498                         if (ret != EFI_SUCCESS) {
3499                                 log_warning("tcg2 measurement fails(0x%lx)\n",
3500                                             ret);
3501                         }
3502                 }
3503         }
3504
3505         /* Make sure entry/exit counts for EFI world cross-overs match */
3506         EFI_EXIT(exit_status);
3507
3508         /*
3509          * But longjmp out with the U-Boot gd, not the application's, as
3510          * the other end is a setjmp call inside EFI context.
3511          */
3512         efi_restore_gd();
3513
3514         longjmp(exit_jmp, 1);
3515
3516         panic("EFI application exited");
3517 out:
3518         return EFI_EXIT(ret);
3519 }
3520
3521 /**
3522  * efi_handle_protocol() - get interface of a protocol on a handle
3523  * @handle:             handle on which the protocol shall be opened
3524  * @protocol:           GUID of the protocol
3525  * @protocol_interface: interface implementing the protocol
3526  *
3527  * This function implements the HandleProtocol service.
3528  *
3529  * See the Unified Extensible Firmware Interface (UEFI) specification for
3530  * details.
3531  *
3532  * Return: status code
3533  */
3534 efi_status_t EFIAPI efi_handle_protocol(efi_handle_t handle,
3535                                         const efi_guid_t *protocol,
3536                                         void **protocol_interface)
3537 {
3538         return efi_open_protocol(handle, protocol, protocol_interface, efi_root,
3539                                  NULL, EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL);
3540 }
3541
3542 /**
3543  * efi_bind_controller() - bind a single driver to a controller
3544  * @controller_handle:   controller handle
3545  * @driver_image_handle: driver handle
3546  * @remain_device_path:  remaining path
3547  *
3548  * Return: status code
3549  */
3550 static efi_status_t efi_bind_controller(
3551                         efi_handle_t controller_handle,
3552                         efi_handle_t driver_image_handle,
3553                         struct efi_device_path *remain_device_path)
3554 {
3555         struct efi_driver_binding_protocol *binding_protocol;
3556         efi_status_t r;
3557
3558         r = EFI_CALL(efi_open_protocol(driver_image_handle,
3559                                        &efi_guid_driver_binding_protocol,
3560                                        (void **)&binding_protocol,
3561                                        driver_image_handle, NULL,
3562                                        EFI_OPEN_PROTOCOL_GET_PROTOCOL));
3563         if (r != EFI_SUCCESS)
3564                 return r;
3565         r = EFI_CALL(binding_protocol->supported(binding_protocol,
3566                                                  controller_handle,
3567                                                  remain_device_path));
3568         if (r == EFI_SUCCESS)
3569                 r = EFI_CALL(binding_protocol->start(binding_protocol,
3570                                                      controller_handle,
3571                                                      remain_device_path));
3572         efi_close_protocol(driver_image_handle,
3573                            &efi_guid_driver_binding_protocol,
3574                            driver_image_handle, NULL);
3575         return r;
3576 }
3577
3578 /**
3579  * efi_connect_single_controller() - connect a single driver to a controller
3580  * @controller_handle:   controller
3581  * @driver_image_handle: driver
3582  * @remain_device_path:  remaining path
3583  *
3584  * Return: status code
3585  */
3586 static efi_status_t efi_connect_single_controller(
3587                         efi_handle_t controller_handle,
3588                         efi_handle_t *driver_image_handle,
3589                         struct efi_device_path *remain_device_path)
3590 {
3591         efi_handle_t *buffer;
3592         size_t count;
3593         size_t i;
3594         efi_status_t r;
3595         size_t connected = 0;
3596
3597         /* Get buffer with all handles with driver binding protocol */
3598         r = EFI_CALL(efi_locate_handle_buffer(BY_PROTOCOL,
3599                                               &efi_guid_driver_binding_protocol,
3600                                               NULL, &count, &buffer));
3601         if (r != EFI_SUCCESS)
3602                 return r;
3603
3604         /* Context Override */
3605         if (driver_image_handle) {
3606                 for (; *driver_image_handle; ++driver_image_handle) {
3607                         for (i = 0; i < count; ++i) {
3608                                 if (buffer[i] == *driver_image_handle) {
3609                                         buffer[i] = NULL;
3610                                         r = efi_bind_controller(
3611                                                         controller_handle,
3612                                                         *driver_image_handle,
3613                                                         remain_device_path);
3614                                         /*
3615                                          * For drivers that do not support the
3616                                          * controller or are already connected
3617                                          * we receive an error code here.
3618                                          */
3619                                         if (r == EFI_SUCCESS)
3620                                                 ++connected;
3621                                 }
3622                         }
3623                 }
3624         }
3625
3626         /*
3627          * TODO: Some overrides are not yet implemented:
3628          * - Platform Driver Override
3629          * - Driver Family Override Search
3630          * - Bus Specific Driver Override
3631          */
3632
3633         /* Driver Binding Search */
3634         for (i = 0; i < count; ++i) {
3635                 if (buffer[i]) {
3636                         r = efi_bind_controller(controller_handle,
3637                                                 buffer[i],
3638                                                 remain_device_path);
3639                         if (r == EFI_SUCCESS)
3640                                 ++connected;
3641                 }
3642         }
3643
3644         efi_free_pool(buffer);
3645         if (!connected)
3646                 return EFI_NOT_FOUND;
3647         return EFI_SUCCESS;
3648 }
3649
3650 /**
3651  * efi_connect_controller() - connect a controller to a driver
3652  * @controller_handle:   handle of the controller
3653  * @driver_image_handle: handle of the driver
3654  * @remain_device_path:  device path of a child controller
3655  * @recursive:           true to connect all child controllers
3656  *
3657  * This function implements the ConnectController service.
3658  *
3659  * See the Unified Extensible Firmware Interface (UEFI) specification for
3660  * details.
3661  *
3662  * First all driver binding protocol handles are tried for binding drivers.
3663  * Afterwards all handles that have opened a protocol of the controller
3664  * with EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER are connected to drivers.
3665  *
3666  * Return: status code
3667  */
3668 static efi_status_t EFIAPI efi_connect_controller(
3669                         efi_handle_t controller_handle,
3670                         efi_handle_t *driver_image_handle,
3671                         struct efi_device_path *remain_device_path,
3672                         bool recursive)
3673 {
3674         efi_status_t r;
3675         efi_status_t ret = EFI_NOT_FOUND;
3676         struct efi_object *efiobj;
3677
3678         EFI_ENTRY("%p, %p, %pD, %d", controller_handle, driver_image_handle,
3679                   remain_device_path, recursive);
3680
3681         efiobj = efi_search_obj(controller_handle);
3682         if (!efiobj) {
3683                 ret = EFI_INVALID_PARAMETER;
3684                 goto out;
3685         }
3686
3687         r = efi_connect_single_controller(controller_handle,
3688                                           driver_image_handle,
3689                                           remain_device_path);
3690         if (r == EFI_SUCCESS)
3691                 ret = EFI_SUCCESS;
3692         if (recursive) {
3693                 struct efi_handler *handler;
3694                 struct efi_open_protocol_info_item *item;
3695
3696                 list_for_each_entry(handler, &efiobj->protocols, link) {
3697                         list_for_each_entry(item, &handler->open_infos, link) {
3698                                 if (item->info.attributes &
3699                                     EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER) {
3700                                         r = EFI_CALL(efi_connect_controller(
3701                                                 item->info.controller_handle,
3702                                                 driver_image_handle,
3703                                                 remain_device_path,
3704                                                 recursive));
3705                                         if (r == EFI_SUCCESS)
3706                                                 ret = EFI_SUCCESS;
3707                                 }
3708                         }
3709                 }
3710         }
3711         /* Check for child controller specified by end node */
3712         if (ret != EFI_SUCCESS && remain_device_path &&
3713             remain_device_path->type == DEVICE_PATH_TYPE_END)
3714                 ret = EFI_SUCCESS;
3715 out:
3716         return EFI_EXIT(ret);
3717 }
3718
3719 /**
3720  * efi_reinstall_protocol_interface() - reinstall protocol interface
3721  * @handle:        handle on which the protocol shall be reinstalled
3722  * @protocol:      GUID of the protocol to be installed
3723  * @old_interface: interface to be removed
3724  * @new_interface: interface to be installed
3725  *
3726  * This function implements the ReinstallProtocolInterface service.
3727  *
3728  * See the Unified Extensible Firmware Interface (UEFI) specification for
3729  * details.
3730  *
3731  * The old interface is uninstalled. The new interface is installed.
3732  * Drivers are connected.
3733  *
3734  * Return: status code
3735  */
3736 static efi_status_t EFIAPI efi_reinstall_protocol_interface(
3737                         efi_handle_t handle, const efi_guid_t *protocol,
3738                         void *old_interface, void *new_interface)
3739 {
3740         efi_status_t ret;
3741
3742         EFI_ENTRY("%p, %pUs, %p, %p", handle, protocol, old_interface,
3743                   new_interface);
3744
3745         /* Uninstall protocol but do not delete handle */
3746         ret = efi_uninstall_protocol(handle, protocol, old_interface, true);
3747         if (ret != EFI_SUCCESS)
3748                 goto out;
3749
3750         /* Install the new protocol */
3751         ret = efi_add_protocol(handle, protocol, new_interface);
3752         /*
3753          * The UEFI spec does not specify what should happen to the handle
3754          * if in case of an error no protocol interface remains on the handle.
3755          * So let's do nothing here.
3756          */
3757         if (ret != EFI_SUCCESS)
3758                 goto out;
3759         /*
3760          * The returned status code has to be ignored.
3761          * Do not create an error if no suitable driver for the handle exists.
3762          */
3763         EFI_CALL(efi_connect_controller(handle, NULL, NULL, true));
3764 out:
3765         return EFI_EXIT(ret);
3766 }
3767
3768 /**
3769  * efi_get_child_controllers() - get all child controllers associated to a driver
3770  * @efiobj:              handle of the controller
3771  * @driver_handle:       handle of the driver
3772  * @number_of_children:  number of child controllers
3773  * @child_handle_buffer: handles of the the child controllers
3774  *
3775  * The allocated buffer has to be freed with free().
3776  *
3777  * Return: status code
3778  */
3779 static efi_status_t efi_get_child_controllers(
3780                                 struct efi_object *efiobj,
3781                                 efi_handle_t driver_handle,
3782                                 efi_uintn_t *number_of_children,
3783                                 efi_handle_t **child_handle_buffer)
3784 {
3785         struct efi_handler *handler;
3786         struct efi_open_protocol_info_item *item;
3787         efi_uintn_t count = 0, i;
3788         bool duplicate;
3789
3790         /* Count all child controller associations */
3791         list_for_each_entry(handler, &efiobj->protocols, link) {
3792                 list_for_each_entry(item, &handler->open_infos, link) {
3793                         if (item->info.agent_handle == driver_handle &&
3794                             item->info.attributes &
3795                             EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER)
3796                                 ++count;
3797                 }
3798         }
3799         /*
3800          * Create buffer. In case of duplicate child controller assignments
3801          * the buffer will be too large. But that does not harm.
3802          */
3803         *number_of_children = 0;
3804         if (!count)
3805                 return EFI_SUCCESS;
3806         *child_handle_buffer = calloc(count, sizeof(efi_handle_t));
3807         if (!*child_handle_buffer)
3808                 return EFI_OUT_OF_RESOURCES;
3809         /* Copy unique child handles */
3810         list_for_each_entry(handler, &efiobj->protocols, link) {
3811                 list_for_each_entry(item, &handler->open_infos, link) {
3812                         if (item->info.agent_handle == driver_handle &&
3813                             item->info.attributes &
3814                             EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER) {
3815                                 /* Check this is a new child controller */
3816                                 duplicate = false;
3817                                 for (i = 0; i < *number_of_children; ++i) {
3818                                         if ((*child_handle_buffer)[i] ==
3819                                             item->info.controller_handle)
3820                                                 duplicate = true;
3821                                 }
3822                                 /* Copy handle to buffer */
3823                                 if (!duplicate) {
3824                                         i = (*number_of_children)++;
3825                                         (*child_handle_buffer)[i] =
3826                                                 item->info.controller_handle;
3827                                 }
3828                         }
3829                 }
3830         }
3831         return EFI_SUCCESS;
3832 }
3833
3834 /**
3835  * efi_disconnect_controller() - disconnect a controller from a driver
3836  * @controller_handle:   handle of the controller
3837  * @driver_image_handle: handle of the driver
3838  * @child_handle:        handle of the child to destroy
3839  *
3840  * This function implements the DisconnectController service.
3841  *
3842  * See the Unified Extensible Firmware Interface (UEFI) specification for
3843  * details.
3844  *
3845  * Return: status code
3846  */
3847 static efi_status_t EFIAPI efi_disconnect_controller(
3848                                 efi_handle_t controller_handle,
3849                                 efi_handle_t driver_image_handle,
3850                                 efi_handle_t child_handle)
3851 {
3852         struct efi_driver_binding_protocol *binding_protocol;
3853         efi_handle_t *child_handle_buffer = NULL;
3854         size_t number_of_children = 0;
3855         efi_status_t r;
3856         struct efi_object *efiobj;
3857         bool sole_child;
3858
3859         EFI_ENTRY("%p, %p, %p", controller_handle, driver_image_handle,
3860                   child_handle);
3861
3862         efiobj = efi_search_obj(controller_handle);
3863         if (!efiobj) {
3864                 r = EFI_INVALID_PARAMETER;
3865                 goto out;
3866         }
3867
3868         if (child_handle && !efi_search_obj(child_handle)) {
3869                 r = EFI_INVALID_PARAMETER;
3870                 goto out;
3871         }
3872
3873         /* If no driver handle is supplied, disconnect all drivers */
3874         if (!driver_image_handle) {
3875                 r = efi_disconnect_all_drivers(efiobj, NULL, child_handle);
3876                 goto out;
3877         }
3878
3879         /* Create list of child handles */
3880         r = efi_get_child_controllers(efiobj,
3881                                       driver_image_handle,
3882                                       &number_of_children,
3883                                       &child_handle_buffer);
3884         if (r != EFI_SUCCESS)
3885                 return r;
3886         sole_child = (number_of_children == 1);
3887
3888         if (child_handle) {
3889                 number_of_children = 1;
3890                 free(child_handle_buffer);
3891                 child_handle_buffer = &child_handle;
3892         }
3893
3894         /* Get the driver binding protocol */
3895         r = EFI_CALL(efi_open_protocol(driver_image_handle,
3896                                        &efi_guid_driver_binding_protocol,
3897                                        (void **)&binding_protocol,
3898                                        driver_image_handle, NULL,
3899                                        EFI_OPEN_PROTOCOL_GET_PROTOCOL));
3900         if (r != EFI_SUCCESS) {
3901                 r = EFI_INVALID_PARAMETER;
3902                 goto out;
3903         }
3904         /* Remove the children */
3905         if (number_of_children) {
3906                 r = EFI_CALL(binding_protocol->stop(binding_protocol,
3907                                                     controller_handle,
3908                                                     number_of_children,
3909                                                     child_handle_buffer));
3910                 if (r != EFI_SUCCESS) {
3911                         r = EFI_DEVICE_ERROR;
3912                         goto out;
3913                 }
3914         }
3915         /* Remove the driver */
3916         if (!child_handle || sole_child) {
3917                 r = EFI_CALL(binding_protocol->stop(binding_protocol,
3918                                                     controller_handle,
3919                                                     0, NULL));
3920                 if (r != EFI_SUCCESS) {
3921                         r = EFI_DEVICE_ERROR;
3922                         goto out;
3923                 }
3924         }
3925         efi_close_protocol(driver_image_handle,
3926                            &efi_guid_driver_binding_protocol,
3927                            driver_image_handle, NULL);
3928         r = EFI_SUCCESS;
3929 out:
3930         if (!child_handle)
3931                 free(child_handle_buffer);
3932         return EFI_EXIT(r);
3933 }
3934
3935 static struct efi_boot_services efi_boot_services = {
3936         .hdr = {
3937                 .signature = EFI_BOOT_SERVICES_SIGNATURE,
3938                 .revision = EFI_SPECIFICATION_VERSION,
3939                 .headersize = sizeof(struct efi_boot_services),
3940         },
3941         .raise_tpl = efi_raise_tpl,
3942         .restore_tpl = efi_restore_tpl,
3943         .allocate_pages = efi_allocate_pages_ext,
3944         .free_pages = efi_free_pages_ext,
3945         .get_memory_map = efi_get_memory_map_ext,
3946         .allocate_pool = efi_allocate_pool_ext,
3947         .free_pool = efi_free_pool_ext,
3948         .create_event = efi_create_event_ext,
3949         .set_timer = efi_set_timer_ext,
3950         .wait_for_event = efi_wait_for_event,
3951         .signal_event = efi_signal_event_ext,
3952         .close_event = efi_close_event,
3953         .check_event = efi_check_event,
3954         .install_protocol_interface = efi_install_protocol_interface,
3955         .reinstall_protocol_interface = efi_reinstall_protocol_interface,
3956         .uninstall_protocol_interface = efi_uninstall_protocol_interface,
3957         .handle_protocol = efi_handle_protocol,
3958         .reserved = NULL,
3959         .register_protocol_notify = efi_register_protocol_notify,
3960         .locate_handle = efi_locate_handle_ext,
3961         .locate_device_path = efi_locate_device_path,
3962         .install_configuration_table = efi_install_configuration_table_ext,
3963         .load_image = efi_load_image,
3964         .start_image = efi_start_image,
3965         .exit = efi_exit,
3966         .unload_image = efi_unload_image,
3967         .exit_boot_services = efi_exit_boot_services,
3968         .get_next_monotonic_count = efi_get_next_monotonic_count,
3969         .stall = efi_stall,
3970         .set_watchdog_timer = efi_set_watchdog_timer,
3971         .connect_controller = efi_connect_controller,
3972         .disconnect_controller = efi_disconnect_controller,
3973         .open_protocol = efi_open_protocol,
3974         .close_protocol = efi_close_protocol_ext,
3975         .open_protocol_information = efi_open_protocol_information,
3976         .protocols_per_handle = efi_protocols_per_handle,
3977         .locate_handle_buffer = efi_locate_handle_buffer,
3978         .locate_protocol = efi_locate_protocol,
3979         .install_multiple_protocol_interfaces =
3980                         efi_install_multiple_protocol_interfaces_ext,
3981         .uninstall_multiple_protocol_interfaces =
3982                         efi_uninstall_multiple_protocol_interfaces_ext,
3983         .calculate_crc32 = efi_calculate_crc32,
3984         .copy_mem = efi_copy_mem,
3985         .set_mem = efi_set_mem,
3986         .create_event_ex = efi_create_event_ex,
3987 };
3988
3989 static u16 __efi_runtime_data firmware_vendor[] = u"Das U-Boot";
3990
3991 struct efi_system_table __efi_runtime_data systab = {
3992         .hdr = {
3993                 .signature = EFI_SYSTEM_TABLE_SIGNATURE,
3994                 .revision = EFI_SPECIFICATION_VERSION,
3995                 .headersize = sizeof(struct efi_system_table),
3996         },
3997         .fw_vendor = firmware_vendor,
3998         .fw_revision = FW_VERSION << 16 | FW_PATCHLEVEL << 8,
3999         .runtime = &efi_runtime_services,
4000         .nr_tables = 0,
4001         .tables = NULL,
4002 };
4003
4004 /**
4005  * efi_initialize_system_table() - Initialize system table
4006  *
4007  * Return:      status code
4008  */
4009 efi_status_t efi_initialize_system_table(void)
4010 {
4011         efi_status_t ret;
4012
4013         /* Allocate configuration table array */
4014         ret = efi_allocate_pool(EFI_RUNTIME_SERVICES_DATA,
4015                                 EFI_MAX_CONFIGURATION_TABLES *
4016                                 sizeof(struct efi_configuration_table),
4017                                 (void **)&systab.tables);
4018
4019         /*
4020          * These entries will be set to NULL in ExitBootServices(). To avoid
4021          * relocation in SetVirtualAddressMap(), set them dynamically.
4022          */
4023         systab.con_in_handle = efi_root;
4024         systab.con_in = &efi_con_in;
4025         systab.con_out_handle = efi_root;
4026         systab.con_out = &efi_con_out;
4027         systab.stderr_handle = efi_root;
4028         systab.std_err = &efi_con_out;
4029         systab.boottime = &efi_boot_services;
4030
4031         /* Set CRC32 field in table headers */
4032         efi_update_table_header_crc32(&systab.hdr);
4033         efi_update_table_header_crc32(&efi_runtime_services.hdr);
4034         efi_update_table_header_crc32(&efi_boot_services.hdr);
4035
4036         return ret;
4037 }
This page took 0.311104 seconds and 4 git commands to generate.