1 // SPDX-License-Identifier: GPL-2.0+
3 * EFI application boot time services
5 * Copyright (c) 2016 Alexander Graf
10 #include <efi_loader.h>
15 #include <linux/libfdt_env.h>
16 #include <u-boot/crc.h>
19 #include <u-boot/crc.h>
22 DECLARE_GLOBAL_DATA_PTR;
24 /* Task priority level */
25 static efi_uintn_t efi_tpl = TPL_APPLICATION;
27 /* This list contains all the EFI objects our payload has access to */
28 LIST_HEAD(efi_obj_list);
30 /* List of all events */
31 __efi_runtime_data LIST_HEAD(efi_events);
33 /* List of queued events */
34 LIST_HEAD(efi_event_queue);
36 /* Flag to disable timer activity in ExitBootServices() */
37 static bool timers_enabled = true;
39 /* List of all events registered by RegisterProtocolNotify() */
40 LIST_HEAD(efi_register_notify_events);
42 /* Handle of the currently executing image */
43 static efi_handle_t current_image;
45 #if defined(CONFIG_ARM) || defined(CONFIG_RISCV)
47 * The "gd" pointer lives in a register on ARM and RISC-V that we declare
48 * fixed when compiling U-Boot. However, the payload does not know about that
49 * restriction so we need to manually swap its and our view of that register on
50 * EFI callback entry/exit.
52 static volatile gd_t *efi_gd, *app_gd;
55 /* 1 if inside U-Boot code, 0 if inside EFI payload code */
56 static int entry_count = 1;
57 static int nesting_level;
58 /* GUID of the device tree table */
59 const efi_guid_t efi_guid_fdt = EFI_FDT_GUID;
60 /* GUID of the EFI_DRIVER_BINDING_PROTOCOL */
61 const efi_guid_t efi_guid_driver_binding_protocol =
62 EFI_DRIVER_BINDING_PROTOCOL_GUID;
64 /* event group ExitBootServices() invoked */
65 const efi_guid_t efi_guid_event_group_exit_boot_services =
66 EFI_EVENT_GROUP_EXIT_BOOT_SERVICES;
67 /* event group SetVirtualAddressMap() invoked */
68 const efi_guid_t efi_guid_event_group_virtual_address_change =
69 EFI_EVENT_GROUP_VIRTUAL_ADDRESS_CHANGE;
70 /* event group memory map changed */
71 const efi_guid_t efi_guid_event_group_memory_map_change =
72 EFI_EVENT_GROUP_MEMORY_MAP_CHANGE;
73 /* event group boot manager about to boot */
74 const efi_guid_t efi_guid_event_group_ready_to_boot =
75 EFI_EVENT_GROUP_READY_TO_BOOT;
76 /* event group ResetSystem() invoked (before ExitBootServices) */
77 const efi_guid_t efi_guid_event_group_reset_system =
78 EFI_EVENT_GROUP_RESET_SYSTEM;
80 static efi_status_t EFIAPI efi_disconnect_controller(
81 efi_handle_t controller_handle,
82 efi_handle_t driver_image_handle,
83 efi_handle_t child_handle);
85 /* Called on every callback entry */
86 int __efi_entry_check(void)
88 int ret = entry_count++ == 0;
89 #if defined(CONFIG_ARM) || defined(CONFIG_RISCV)
97 /* Called on every callback exit */
98 int __efi_exit_check(void)
100 int ret = --entry_count == 0;
101 #if defined(CONFIG_ARM) || defined(CONFIG_RISCV)
108 * efi_save_gd() - save global data register
110 * On the ARM and RISC-V architectures gd is mapped to a fixed register.
111 * As this register may be overwritten by an EFI payload we save it here
112 * and restore it on every callback entered.
114 * This function is called after relocation from initr_reloc_global_data().
116 void efi_save_gd(void)
118 #if defined(CONFIG_ARM) || defined(CONFIG_RISCV)
124 * efi_restore_gd() - restore global data register
126 * On the ARM and RISC-V architectures gd is mapped to a fixed register.
127 * Restore it after returning from the UEFI world to the value saved via
130 void efi_restore_gd(void)
132 #if defined(CONFIG_ARM) || defined(CONFIG_RISCV)
133 /* Only restore if we're already in EFI context */
141 * indent_string() - returns a string for indenting with two spaces per level
142 * @level: indent level
144 * A maximum of ten indent levels is supported. Higher indent levels will be
147 * Return: A string for indenting with two spaces per level is
150 static const char *indent_string(int level)
152 const char *indent = " ";
153 const int max = strlen(indent);
155 level = min(max, level * 2);
156 return &indent[max - level];
159 const char *__efi_nesting(void)
161 return indent_string(nesting_level);
164 const char *__efi_nesting_inc(void)
166 return indent_string(nesting_level++);
169 const char *__efi_nesting_dec(void)
171 return indent_string(--nesting_level);
175 * efi_event_is_queued() - check if an event is queued
178 * Return: true if event is queued
180 static bool efi_event_is_queued(struct efi_event *event)
182 return !!event->queue_link.next;
186 * efi_process_event_queue() - process event queue
188 static void efi_process_event_queue(void)
190 while (!list_empty(&efi_event_queue)) {
191 struct efi_event *event;
194 event = list_first_entry(&efi_event_queue, struct efi_event,
196 if (efi_tpl >= event->notify_tpl)
198 list_del(&event->queue_link);
199 event->queue_link.next = NULL;
200 event->queue_link.prev = NULL;
201 /* Events must be executed at the event's TPL */
203 efi_tpl = event->notify_tpl;
204 EFI_CALL_VOID(event->notify_function(event,
205 event->notify_context));
207 if (event->type == EVT_NOTIFY_SIGNAL)
208 event->is_signaled = 0;
213 * efi_queue_event() - queue an EFI event
214 * @event: event to signal
216 * This function queues the notification function of the event for future
220 static void efi_queue_event(struct efi_event *event)
222 struct efi_event *item;
224 if (!event->notify_function)
227 if (!efi_event_is_queued(event)) {
229 * Events must be notified in order of decreasing task priority
230 * level. Insert the new event accordingly.
232 list_for_each_entry(item, &efi_event_queue, queue_link) {
233 if (item->notify_tpl < event->notify_tpl) {
234 list_add_tail(&event->queue_link,
241 list_add_tail(&event->queue_link, &efi_event_queue);
243 efi_process_event_queue();
247 * is_valid_tpl() - check if the task priority level is valid
249 * @tpl: TPL level to check
250 * Return: status code
252 efi_status_t is_valid_tpl(efi_uintn_t tpl)
255 case TPL_APPLICATION:
261 return EFI_INVALID_PARAMETER;
266 * efi_signal_event() - signal an EFI event
267 * @event: event to signal
269 * This function signals an event. If the event belongs to an event group all
270 * events of the group are signaled. If they are of type EVT_NOTIFY_SIGNAL
271 * their notification function is queued.
273 * For the SignalEvent service see efi_signal_event_ext.
275 void efi_signal_event(struct efi_event *event)
277 if (event->is_signaled)
280 struct efi_event *evt;
283 * The signaled state has to set before executing any
284 * notification function
286 list_for_each_entry(evt, &efi_events, link) {
287 if (!evt->group || guidcmp(evt->group, event->group))
289 if (evt->is_signaled)
291 evt->is_signaled = true;
293 list_for_each_entry(evt, &efi_events, link) {
294 if (!evt->group || guidcmp(evt->group, event->group))
296 efi_queue_event(evt);
299 event->is_signaled = true;
300 efi_queue_event(event);
305 * efi_raise_tpl() - raise the task priority level
306 * @new_tpl: new value of the task priority level
308 * This function implements the RaiseTpl service.
310 * See the Unified Extensible Firmware Interface (UEFI) specification for
313 * Return: old value of the task priority level
315 static unsigned long EFIAPI efi_raise_tpl(efi_uintn_t new_tpl)
317 efi_uintn_t old_tpl = efi_tpl;
319 EFI_ENTRY("0x%zx", new_tpl);
321 if (new_tpl < efi_tpl)
322 EFI_PRINT("WARNING: new_tpl < current_tpl in %s\n", __func__);
324 if (efi_tpl > TPL_HIGH_LEVEL)
325 efi_tpl = TPL_HIGH_LEVEL;
327 EFI_EXIT(EFI_SUCCESS);
332 * efi_restore_tpl() - lower the task priority level
333 * @old_tpl: value of the task priority level to be restored
335 * This function implements the RestoreTpl service.
337 * See the Unified Extensible Firmware Interface (UEFI) specification for
340 static void EFIAPI efi_restore_tpl(efi_uintn_t old_tpl)
342 EFI_ENTRY("0x%zx", old_tpl);
344 if (old_tpl > efi_tpl)
345 EFI_PRINT("WARNING: old_tpl > current_tpl in %s\n", __func__);
347 if (efi_tpl > TPL_HIGH_LEVEL)
348 efi_tpl = TPL_HIGH_LEVEL;
351 * Lowering the TPL may have made queued events eligible for execution.
355 EFI_EXIT(EFI_SUCCESS);
359 * efi_allocate_pages_ext() - allocate memory pages
360 * @type: type of allocation to be performed
361 * @memory_type: usage type of the allocated memory
362 * @pages: number of pages to be allocated
363 * @memory: allocated memory
365 * This function implements the AllocatePages service.
367 * See the Unified Extensible Firmware Interface (UEFI) specification for
370 * Return: status code
372 static efi_status_t EFIAPI efi_allocate_pages_ext(int type, int memory_type,
378 EFI_ENTRY("%d, %d, 0x%zx, %p", type, memory_type, pages, memory);
379 r = efi_allocate_pages(type, memory_type, pages, memory);
384 * efi_free_pages_ext() - Free memory pages.
385 * @memory: start of the memory area to be freed
386 * @pages: number of pages to be freed
388 * This function implements the FreePages service.
390 * See the Unified Extensible Firmware Interface (UEFI) specification for
393 * Return: status code
395 static efi_status_t EFIAPI efi_free_pages_ext(uint64_t memory,
400 EFI_ENTRY("%llx, 0x%zx", memory, pages);
401 r = efi_free_pages(memory, pages);
406 * efi_get_memory_map_ext() - get map describing memory usage
407 * @memory_map_size: on entry the size, in bytes, of the memory map buffer,
408 * on exit the size of the copied memory map
409 * @memory_map: buffer to which the memory map is written
410 * @map_key: key for the memory map
411 * @descriptor_size: size of an individual memory descriptor
412 * @descriptor_version: version number of the memory descriptor structure
414 * This function implements the GetMemoryMap service.
416 * See the Unified Extensible Firmware Interface (UEFI) specification for
419 * Return: status code
421 static efi_status_t EFIAPI efi_get_memory_map_ext(
422 efi_uintn_t *memory_map_size,
423 struct efi_mem_desc *memory_map,
424 efi_uintn_t *map_key,
425 efi_uintn_t *descriptor_size,
426 uint32_t *descriptor_version)
430 EFI_ENTRY("%p, %p, %p, %p, %p", memory_map_size, memory_map,
431 map_key, descriptor_size, descriptor_version);
432 r = efi_get_memory_map(memory_map_size, memory_map, map_key,
433 descriptor_size, descriptor_version);
438 * efi_allocate_pool_ext() - allocate memory from pool
439 * @pool_type: type of the pool from which memory is to be allocated
440 * @size: number of bytes to be allocated
441 * @buffer: allocated memory
443 * This function implements the AllocatePool service.
445 * See the Unified Extensible Firmware Interface (UEFI) specification for
448 * Return: status code
450 static efi_status_t EFIAPI efi_allocate_pool_ext(int pool_type,
456 EFI_ENTRY("%d, %zd, %p", pool_type, size, buffer);
457 r = efi_allocate_pool(pool_type, size, buffer);
462 * efi_free_pool_ext() - free memory from pool
463 * @buffer: start of memory to be freed
465 * This function implements the FreePool service.
467 * See the Unified Extensible Firmware Interface (UEFI) specification for
470 * Return: status code
472 static efi_status_t EFIAPI efi_free_pool_ext(void *buffer)
476 EFI_ENTRY("%p", buffer);
477 r = efi_free_pool(buffer);
482 * efi_add_handle() - add a new handle to the object list
484 * @handle: handle to be added
486 * The protocols list is initialized. The handle is added to the list of known
489 void efi_add_handle(efi_handle_t handle)
493 INIT_LIST_HEAD(&handle->protocols);
494 list_add_tail(&handle->link, &efi_obj_list);
498 * efi_create_handle() - create handle
499 * @handle: new handle
501 * Return: status code
503 efi_status_t efi_create_handle(efi_handle_t *handle)
505 struct efi_object *obj;
507 obj = calloc(1, sizeof(struct efi_object));
509 return EFI_OUT_OF_RESOURCES;
518 * efi_search_protocol() - find a protocol on a handle.
520 * @protocol_guid: GUID of the protocol
521 * @handler: reference to the protocol
523 * Return: status code
525 efi_status_t efi_search_protocol(const efi_handle_t handle,
526 const efi_guid_t *protocol_guid,
527 struct efi_handler **handler)
529 struct efi_object *efiobj;
530 struct list_head *lhandle;
532 if (!handle || !protocol_guid)
533 return EFI_INVALID_PARAMETER;
534 efiobj = efi_search_obj(handle);
536 return EFI_INVALID_PARAMETER;
537 list_for_each(lhandle, &efiobj->protocols) {
538 struct efi_handler *protocol;
540 protocol = list_entry(lhandle, struct efi_handler, link);
541 if (!guidcmp(protocol->guid, protocol_guid)) {
547 return EFI_NOT_FOUND;
551 * efi_remove_protocol() - delete protocol from a handle
552 * @handle: handle from which the protocol shall be deleted
553 * @protocol: GUID of the protocol to be deleted
554 * @protocol_interface: interface of the protocol implementation
556 * Return: status code
558 efi_status_t efi_remove_protocol(const efi_handle_t handle,
559 const efi_guid_t *protocol,
560 void *protocol_interface)
562 struct efi_handler *handler;
565 ret = efi_search_protocol(handle, protocol, &handler);
566 if (ret != EFI_SUCCESS)
568 if (handler->protocol_interface != protocol_interface)
569 return EFI_NOT_FOUND;
570 list_del(&handler->link);
576 * efi_remove_all_protocols() - delete all protocols from a handle
577 * @handle: handle from which the protocols shall be deleted
579 * Return: status code
581 efi_status_t efi_remove_all_protocols(const efi_handle_t handle)
583 struct efi_object *efiobj;
584 struct efi_handler *protocol;
585 struct efi_handler *pos;
587 efiobj = efi_search_obj(handle);
589 return EFI_INVALID_PARAMETER;
590 list_for_each_entry_safe(protocol, pos, &efiobj->protocols, link) {
593 ret = efi_remove_protocol(handle, protocol->guid,
594 protocol->protocol_interface);
595 if (ret != EFI_SUCCESS)
602 * efi_delete_handle() - delete handle
604 * @handle: handle to delete
606 void efi_delete_handle(efi_handle_t handle)
610 efi_remove_all_protocols(handle);
611 list_del(&handle->link);
616 * efi_is_event() - check if a pointer is a valid event
617 * @event: pointer to check
619 * Return: status code
621 static efi_status_t efi_is_event(const struct efi_event *event)
623 const struct efi_event *evt;
626 return EFI_INVALID_PARAMETER;
627 list_for_each_entry(evt, &efi_events, link) {
631 return EFI_INVALID_PARAMETER;
635 * efi_create_event() - create an event
637 * @type: type of the event to create
638 * @notify_tpl: task priority level of the event
639 * @notify_function: notification function of the event
640 * @notify_context: pointer passed to the notification function
641 * @group: event group
642 * @event: created event
644 * This function is used inside U-Boot code to create an event.
646 * For the API function implementing the CreateEvent service see
647 * efi_create_event_ext.
649 * Return: status code
651 efi_status_t efi_create_event(uint32_t type, efi_uintn_t notify_tpl,
652 void (EFIAPI *notify_function) (
653 struct efi_event *event,
655 void *notify_context, efi_guid_t *group,
656 struct efi_event **event)
658 struct efi_event *evt;
663 return EFI_INVALID_PARAMETER;
668 case EVT_NOTIFY_SIGNAL:
669 case EVT_TIMER | EVT_NOTIFY_SIGNAL:
670 case EVT_NOTIFY_WAIT:
671 case EVT_TIMER | EVT_NOTIFY_WAIT:
672 case EVT_SIGNAL_EXIT_BOOT_SERVICES:
673 pool_type = EFI_BOOT_SERVICES_DATA;
675 case EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE:
676 pool_type = EFI_RUNTIME_SERVICES_DATA;
679 return EFI_INVALID_PARAMETER;
682 if ((type & (EVT_NOTIFY_WAIT | EVT_NOTIFY_SIGNAL)) &&
683 (!notify_function || is_valid_tpl(notify_tpl) != EFI_SUCCESS))
684 return EFI_INVALID_PARAMETER;
686 ret = efi_allocate_pool(pool_type, sizeof(struct efi_event),
688 if (ret != EFI_SUCCESS)
690 memset(evt, 0, sizeof(struct efi_event));
692 evt->notify_tpl = notify_tpl;
693 evt->notify_function = notify_function;
694 evt->notify_context = notify_context;
696 /* Disable timers on boot up */
697 evt->trigger_next = -1ULL;
698 list_add_tail(&evt->link, &efi_events);
704 * efi_create_event_ex() - create an event in a group
705 * @type: type of the event to create
706 * @notify_tpl: task priority level of the event
707 * @notify_function: notification function of the event
708 * @notify_context: pointer passed to the notification function
709 * @event: created event
710 * @event_group: event group
712 * This function implements the CreateEventEx service.
714 * See the Unified Extensible Firmware Interface (UEFI) specification for
717 * Return: status code
719 efi_status_t EFIAPI efi_create_event_ex(uint32_t type, efi_uintn_t notify_tpl,
720 void (EFIAPI *notify_function) (
721 struct efi_event *event,
723 void *notify_context,
724 efi_guid_t *event_group,
725 struct efi_event **event)
729 EFI_ENTRY("%d, 0x%zx, %p, %p, %pUl", type, notify_tpl, notify_function,
730 notify_context, event_group);
733 * The allowable input parameters are the same as in CreateEvent()
734 * except for the following two disallowed event types.
737 case EVT_SIGNAL_EXIT_BOOT_SERVICES:
738 case EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE:
739 ret = EFI_INVALID_PARAMETER;
743 ret = efi_create_event(type, notify_tpl, notify_function,
744 notify_context, event_group, event);
746 return EFI_EXIT(ret);
750 * efi_create_event_ext() - create an event
751 * @type: type of the event to create
752 * @notify_tpl: task priority level of the event
753 * @notify_function: notification function of the event
754 * @notify_context: pointer passed to the notification function
755 * @event: created event
757 * This function implements the CreateEvent service.
759 * See the Unified Extensible Firmware Interface (UEFI) specification for
762 * Return: status code
764 static efi_status_t EFIAPI efi_create_event_ext(
765 uint32_t type, efi_uintn_t notify_tpl,
766 void (EFIAPI *notify_function) (
767 struct efi_event *event,
769 void *notify_context, struct efi_event **event)
771 EFI_ENTRY("%d, 0x%zx, %p, %p", type, notify_tpl, notify_function,
773 return EFI_EXIT(efi_create_event(type, notify_tpl, notify_function,
774 notify_context, NULL, event));
778 * efi_timer_check() - check if a timer event has occurred
780 * Check if a timer event has occurred or a queued notification function should
783 * Our timers have to work without interrupts, so we check whenever keyboard
784 * input or disk accesses happen if enough time elapsed for them to fire.
786 void efi_timer_check(void)
788 struct efi_event *evt;
789 u64 now = timer_get_us();
791 list_for_each_entry(evt, &efi_events, link) {
794 if (!(evt->type & EVT_TIMER) || now < evt->trigger_next)
796 switch (evt->trigger_type) {
797 case EFI_TIMER_RELATIVE:
798 evt->trigger_type = EFI_TIMER_STOP;
800 case EFI_TIMER_PERIODIC:
801 evt->trigger_next += evt->trigger_time;
806 evt->is_signaled = false;
807 efi_signal_event(evt);
809 efi_process_event_queue();
814 * efi_set_timer() - set the trigger time for a timer event or stop the event
815 * @event: event for which the timer is set
816 * @type: type of the timer
817 * @trigger_time: trigger period in multiples of 100 ns
819 * This is the function for internal usage in U-Boot. For the API function
820 * implementing the SetTimer service see efi_set_timer_ext.
822 * Return: status code
824 efi_status_t efi_set_timer(struct efi_event *event, enum efi_timer_delay type,
825 uint64_t trigger_time)
827 /* Check that the event is valid */
828 if (efi_is_event(event) != EFI_SUCCESS || !(event->type & EVT_TIMER))
829 return EFI_INVALID_PARAMETER;
832 * The parameter defines a multiple of 100 ns.
833 * We use multiples of 1000 ns. So divide by 10.
835 do_div(trigger_time, 10);
839 event->trigger_next = -1ULL;
841 case EFI_TIMER_PERIODIC:
842 case EFI_TIMER_RELATIVE:
843 event->trigger_next = timer_get_us() + trigger_time;
846 return EFI_INVALID_PARAMETER;
848 event->trigger_type = type;
849 event->trigger_time = trigger_time;
850 event->is_signaled = false;
855 * efi_set_timer_ext() - Set the trigger time for a timer event or stop the
857 * @event: event for which the timer is set
858 * @type: type of the timer
859 * @trigger_time: trigger period in multiples of 100 ns
861 * This function implements the SetTimer service.
863 * See the Unified Extensible Firmware Interface (UEFI) specification for
867 * Return: status code
869 static efi_status_t EFIAPI efi_set_timer_ext(struct efi_event *event,
870 enum efi_timer_delay type,
871 uint64_t trigger_time)
873 EFI_ENTRY("%p, %d, %llx", event, type, trigger_time);
874 return EFI_EXIT(efi_set_timer(event, type, trigger_time));
878 * efi_wait_for_event() - wait for events to be signaled
879 * @num_events: number of events to be waited for
880 * @event: events to be waited for
881 * @index: index of the event that was signaled
883 * This function implements the WaitForEvent service.
885 * See the Unified Extensible Firmware Interface (UEFI) specification for
888 * Return: status code
890 static efi_status_t EFIAPI efi_wait_for_event(efi_uintn_t num_events,
891 struct efi_event **event,
896 EFI_ENTRY("%zd, %p, %p", num_events, event, index);
898 /* Check parameters */
899 if (!num_events || !event)
900 return EFI_EXIT(EFI_INVALID_PARAMETER);
902 if (efi_tpl != TPL_APPLICATION)
903 return EFI_EXIT(EFI_UNSUPPORTED);
904 for (i = 0; i < num_events; ++i) {
905 if (efi_is_event(event[i]) != EFI_SUCCESS)
906 return EFI_EXIT(EFI_INVALID_PARAMETER);
907 if (!event[i]->type || event[i]->type & EVT_NOTIFY_SIGNAL)
908 return EFI_EXIT(EFI_INVALID_PARAMETER);
909 if (!event[i]->is_signaled)
910 efi_queue_event(event[i]);
913 /* Wait for signal */
915 for (i = 0; i < num_events; ++i) {
916 if (event[i]->is_signaled)
919 /* Allow events to occur. */
925 * Reset the signal which is passed to the caller to allow periodic
928 event[i]->is_signaled = false;
932 return EFI_EXIT(EFI_SUCCESS);
936 * efi_signal_event_ext() - signal an EFI event
937 * @event: event to signal
939 * This function implements the SignalEvent service.
941 * See the Unified Extensible Firmware Interface (UEFI) specification for
944 * This functions sets the signaled state of the event and queues the
945 * notification function for execution.
947 * Return: status code
949 static efi_status_t EFIAPI efi_signal_event_ext(struct efi_event *event)
951 EFI_ENTRY("%p", event);
952 if (efi_is_event(event) != EFI_SUCCESS)
953 return EFI_EXIT(EFI_INVALID_PARAMETER);
954 efi_signal_event(event);
955 return EFI_EXIT(EFI_SUCCESS);
959 * efi_close_event() - close an EFI event
960 * @event: event to close
962 * This function implements the CloseEvent service.
964 * See the Unified Extensible Firmware Interface (UEFI) specification for
967 * Return: status code
969 static efi_status_t EFIAPI efi_close_event(struct efi_event *event)
971 struct efi_register_notify_event *item, *next;
973 EFI_ENTRY("%p", event);
974 if (efi_is_event(event) != EFI_SUCCESS)
975 return EFI_EXIT(EFI_INVALID_PARAMETER);
977 /* Remove protocol notify registrations for the event */
978 list_for_each_entry_safe(item, next, &efi_register_notify_events,
980 if (event == item->event) {
981 struct efi_protocol_notification *hitem, *hnext;
983 /* Remove signaled handles */
984 list_for_each_entry_safe(hitem, hnext, &item->handles,
986 list_del(&hitem->link);
989 list_del(&item->link);
993 /* Remove event from queue */
994 if (efi_event_is_queued(event))
995 list_del(&event->queue_link);
997 list_del(&event->link);
998 efi_free_pool(event);
999 return EFI_EXIT(EFI_SUCCESS);
1003 * efi_check_event() - check if an event is signaled
1004 * @event: event to check
1006 * This function implements the CheckEvent service.
1008 * See the Unified Extensible Firmware Interface (UEFI) specification for
1011 * If an event is not signaled yet, the notification function is queued. The
1012 * signaled state is cleared.
1014 * Return: status code
1016 static efi_status_t EFIAPI efi_check_event(struct efi_event *event)
1018 EFI_ENTRY("%p", event);
1020 if (efi_is_event(event) != EFI_SUCCESS ||
1021 event->type & EVT_NOTIFY_SIGNAL)
1022 return EFI_EXIT(EFI_INVALID_PARAMETER);
1023 if (!event->is_signaled)
1024 efi_queue_event(event);
1025 if (event->is_signaled) {
1026 event->is_signaled = false;
1027 return EFI_EXIT(EFI_SUCCESS);
1029 return EFI_EXIT(EFI_NOT_READY);
1033 * efi_search_obj() - find the internal EFI object for a handle
1034 * @handle: handle to find
1036 * Return: EFI object
1038 struct efi_object *efi_search_obj(const efi_handle_t handle)
1040 struct efi_object *efiobj;
1045 list_for_each_entry(efiobj, &efi_obj_list, link) {
1046 if (efiobj == handle)
1053 * efi_open_protocol_info_entry() - create open protocol info entry and add it
1055 * @handler: handler of a protocol
1057 * Return: open protocol info entry
1059 static struct efi_open_protocol_info_entry *efi_create_open_info(
1060 struct efi_handler *handler)
1062 struct efi_open_protocol_info_item *item;
1064 item = calloc(1, sizeof(struct efi_open_protocol_info_item));
1067 /* Append the item to the open protocol info list. */
1068 list_add_tail(&item->link, &handler->open_infos);
1074 * efi_delete_open_info() - remove an open protocol info entry from a protocol
1075 * @item: open protocol info entry to delete
1077 * Return: status code
1079 static efi_status_t efi_delete_open_info(
1080 struct efi_open_protocol_info_item *item)
1082 list_del(&item->link);
1088 * efi_add_protocol() - install new protocol on a handle
1089 * @handle: handle on which the protocol shall be installed
1090 * @protocol: GUID of the protocol to be installed
1091 * @protocol_interface: interface of the protocol implementation
1093 * Return: status code
1095 efi_status_t efi_add_protocol(const efi_handle_t handle,
1096 const efi_guid_t *protocol,
1097 void *protocol_interface)
1099 struct efi_object *efiobj;
1100 struct efi_handler *handler;
1102 struct efi_register_notify_event *event;
1104 efiobj = efi_search_obj(handle);
1106 return EFI_INVALID_PARAMETER;
1107 ret = efi_search_protocol(handle, protocol, NULL);
1108 if (ret != EFI_NOT_FOUND)
1109 return EFI_INVALID_PARAMETER;
1110 handler = calloc(1, sizeof(struct efi_handler));
1112 return EFI_OUT_OF_RESOURCES;
1113 handler->guid = protocol;
1114 handler->protocol_interface = protocol_interface;
1115 INIT_LIST_HEAD(&handler->open_infos);
1116 list_add_tail(&handler->link, &efiobj->protocols);
1118 /* Notify registered events */
1119 list_for_each_entry(event, &efi_register_notify_events, link) {
1120 if (!guidcmp(protocol, &event->protocol)) {
1121 struct efi_protocol_notification *notif;
1123 notif = calloc(1, sizeof(*notif));
1125 list_del(&handler->link);
1127 return EFI_OUT_OF_RESOURCES;
1129 notif->handle = handle;
1130 list_add_tail(¬if->link, &event->handles);
1131 event->event->is_signaled = false;
1132 efi_signal_event(event->event);
1136 if (!guidcmp(&efi_guid_device_path, protocol))
1137 EFI_PRINT("installed device path '%pD'\n", protocol_interface);
1142 * efi_install_protocol_interface() - install protocol interface
1143 * @handle: handle on which the protocol shall be installed
1144 * @protocol: GUID of the protocol to be installed
1145 * @protocol_interface_type: type of the interface to be installed,
1146 * always EFI_NATIVE_INTERFACE
1147 * @protocol_interface: interface of the protocol implementation
1149 * This function implements the InstallProtocolInterface service.
1151 * See the Unified Extensible Firmware Interface (UEFI) specification for
1154 * Return: status code
1156 static efi_status_t EFIAPI efi_install_protocol_interface(
1157 efi_handle_t *handle, const efi_guid_t *protocol,
1158 int protocol_interface_type, void *protocol_interface)
1162 EFI_ENTRY("%p, %pUl, %d, %p", handle, protocol, protocol_interface_type,
1163 protocol_interface);
1165 if (!handle || !protocol ||
1166 protocol_interface_type != EFI_NATIVE_INTERFACE) {
1167 r = EFI_INVALID_PARAMETER;
1171 /* Create new handle if requested. */
1173 r = efi_create_handle(handle);
1174 if (r != EFI_SUCCESS)
1176 EFI_PRINT("new handle %p\n", *handle);
1178 EFI_PRINT("handle %p\n", *handle);
1180 /* Add new protocol */
1181 r = efi_add_protocol(*handle, protocol, protocol_interface);
1187 * efi_get_drivers() - get all drivers associated to a controller
1188 * @handle: handle of the controller
1189 * @protocol: protocol GUID (optional)
1190 * @number_of_drivers: number of child controllers
1191 * @driver_handle_buffer: handles of the the drivers
1193 * The allocated buffer has to be freed with free().
1195 * Return: status code
1197 static efi_status_t efi_get_drivers(efi_handle_t handle,
1198 const efi_guid_t *protocol,
1199 efi_uintn_t *number_of_drivers,
1200 efi_handle_t **driver_handle_buffer)
1202 struct efi_handler *handler;
1203 struct efi_open_protocol_info_item *item;
1204 efi_uintn_t count = 0, i;
1207 /* Count all driver associations */
1208 list_for_each_entry(handler, &handle->protocols, link) {
1209 if (protocol && guidcmp(handler->guid, protocol))
1211 list_for_each_entry(item, &handler->open_infos, link) {
1212 if (item->info.attributes &
1213 EFI_OPEN_PROTOCOL_BY_DRIVER)
1217 *number_of_drivers = 0;
1219 *driver_handle_buffer = NULL;
1223 * Create buffer. In case of duplicate driver assignments the buffer
1224 * will be too large. But that does not harm.
1226 *driver_handle_buffer = calloc(count, sizeof(efi_handle_t));
1227 if (!*driver_handle_buffer)
1228 return EFI_OUT_OF_RESOURCES;
1229 /* Collect unique driver handles */
1230 list_for_each_entry(handler, &handle->protocols, link) {
1231 if (protocol && guidcmp(handler->guid, protocol))
1233 list_for_each_entry(item, &handler->open_infos, link) {
1234 if (item->info.attributes &
1235 EFI_OPEN_PROTOCOL_BY_DRIVER) {
1236 /* Check this is a new driver */
1238 for (i = 0; i < *number_of_drivers; ++i) {
1239 if ((*driver_handle_buffer)[i] ==
1240 item->info.agent_handle)
1243 /* Copy handle to buffer */
1245 i = (*number_of_drivers)++;
1246 (*driver_handle_buffer)[i] =
1247 item->info.agent_handle;
1256 * efi_disconnect_all_drivers() - disconnect all drivers from a controller
1257 * @handle: handle of the controller
1258 * @protocol: protocol GUID (optional)
1259 * @child_handle: handle of the child to destroy
1261 * This function implements the DisconnectController service.
1263 * See the Unified Extensible Firmware Interface (UEFI) specification for
1266 * Return: status code
1268 static efi_status_t efi_disconnect_all_drivers
1269 (efi_handle_t handle,
1270 const efi_guid_t *protocol,
1271 efi_handle_t child_handle)
1273 efi_uintn_t number_of_drivers;
1274 efi_handle_t *driver_handle_buffer;
1275 efi_status_t r, ret;
1277 ret = efi_get_drivers(handle, protocol, &number_of_drivers,
1278 &driver_handle_buffer);
1279 if (ret != EFI_SUCCESS)
1281 if (!number_of_drivers)
1283 ret = EFI_NOT_FOUND;
1284 while (number_of_drivers) {
1285 r = EFI_CALL(efi_disconnect_controller(
1287 driver_handle_buffer[--number_of_drivers],
1289 if (r == EFI_SUCCESS)
1292 free(driver_handle_buffer);
1297 * efi_uninstall_protocol() - uninstall protocol interface
1299 * @handle: handle from which the protocol shall be removed
1300 * @protocol: GUID of the protocol to be removed
1301 * @protocol_interface: interface to be removed
1303 * This function DOES NOT delete a handle without installed protocol.
1305 * Return: status code
1307 static efi_status_t efi_uninstall_protocol
1308 (efi_handle_t handle, const efi_guid_t *protocol,
1309 void *protocol_interface)
1311 struct efi_object *efiobj;
1312 struct efi_handler *handler;
1313 struct efi_open_protocol_info_item *item;
1314 struct efi_open_protocol_info_item *pos;
1318 efiobj = efi_search_obj(handle);
1320 r = EFI_INVALID_PARAMETER;
1323 /* Find the protocol on the handle */
1324 r = efi_search_protocol(handle, protocol, &handler);
1325 if (r != EFI_SUCCESS)
1327 /* Disconnect controllers */
1328 efi_disconnect_all_drivers(efiobj, protocol, NULL);
1329 /* Close protocol */
1330 list_for_each_entry_safe(item, pos, &handler->open_infos, link) {
1331 if (item->info.attributes ==
1332 EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL ||
1333 item->info.attributes == EFI_OPEN_PROTOCOL_GET_PROTOCOL ||
1334 item->info.attributes == EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
1335 list_del(&item->link);
1337 if (!list_empty(&handler->open_infos)) {
1338 r = EFI_ACCESS_DENIED;
1341 r = efi_remove_protocol(handle, protocol, protocol_interface);
1347 * efi_uninstall_protocol_interface() - uninstall protocol interface
1348 * @handle: handle from which the protocol shall be removed
1349 * @protocol: GUID of the protocol to be removed
1350 * @protocol_interface: interface to be removed
1352 * This function implements the UninstallProtocolInterface service.
1354 * See the Unified Extensible Firmware Interface (UEFI) specification for
1357 * Return: status code
1359 static efi_status_t EFIAPI efi_uninstall_protocol_interface
1360 (efi_handle_t handle, const efi_guid_t *protocol,
1361 void *protocol_interface)
1365 EFI_ENTRY("%p, %pUl, %p", handle, protocol, protocol_interface);
1367 ret = efi_uninstall_protocol(handle, protocol, protocol_interface);
1368 if (ret != EFI_SUCCESS)
1371 /* If the last protocol has been removed, delete the handle. */
1372 if (list_empty(&handle->protocols)) {
1373 list_del(&handle->link);
1377 return EFI_EXIT(ret);
1381 * efi_register_protocol_notify() - register an event for notification when a
1382 * protocol is installed.
1383 * @protocol: GUID of the protocol whose installation shall be notified
1384 * @event: event to be signaled upon installation of the protocol
1385 * @registration: key for retrieving the registration information
1387 * This function implements the RegisterProtocolNotify service.
1388 * See the Unified Extensible Firmware Interface (UEFI) specification
1391 * Return: status code
1393 static efi_status_t EFIAPI efi_register_protocol_notify(
1394 const efi_guid_t *protocol,
1395 struct efi_event *event,
1396 void **registration)
1398 struct efi_register_notify_event *item;
1399 efi_status_t ret = EFI_SUCCESS;
1401 EFI_ENTRY("%pUl, %p, %p", protocol, event, registration);
1403 if (!protocol || !event || !registration) {
1404 ret = EFI_INVALID_PARAMETER;
1408 item = calloc(1, sizeof(struct efi_register_notify_event));
1410 ret = EFI_OUT_OF_RESOURCES;
1414 item->event = event;
1415 guidcpy(&item->protocol, protocol);
1416 INIT_LIST_HEAD(&item->handles);
1418 list_add_tail(&item->link, &efi_register_notify_events);
1420 *registration = item;
1422 return EFI_EXIT(ret);
1426 * efi_search() - determine if an EFI handle implements a protocol
1428 * @search_type: selection criterion
1429 * @protocol: GUID of the protocol
1432 * See the documentation of the LocateHandle service in the UEFI specification.
1434 * Return: 0 if the handle implements the protocol
1436 static int efi_search(enum efi_locate_search_type search_type,
1437 const efi_guid_t *protocol, efi_handle_t handle)
1441 switch (search_type) {
1445 ret = efi_search_protocol(handle, protocol, NULL);
1446 return (ret != EFI_SUCCESS);
1448 /* Invalid search type */
1454 * efi_check_register_notify_event() - check if registration key is valid
1456 * Check that a pointer is a valid registration key as returned by
1457 * RegisterProtocolNotify().
1459 * @key: registration key
1460 * Return: valid registration key or NULL
1462 static struct efi_register_notify_event *efi_check_register_notify_event
1465 struct efi_register_notify_event *event;
1467 list_for_each_entry(event, &efi_register_notify_events, link) {
1468 if (event == (struct efi_register_notify_event *)key)
1475 * efi_locate_handle() - locate handles implementing a protocol
1477 * @search_type: selection criterion
1478 * @protocol: GUID of the protocol
1479 * @search_key: registration key
1480 * @buffer_size: size of the buffer to receive the handles in bytes
1481 * @buffer: buffer to receive the relevant handles
1483 * This function is meant for U-Boot internal calls. For the API implementation
1484 * of the LocateHandle service see efi_locate_handle_ext.
1486 * Return: status code
1488 static efi_status_t efi_locate_handle(
1489 enum efi_locate_search_type search_type,
1490 const efi_guid_t *protocol, void *search_key,
1491 efi_uintn_t *buffer_size, efi_handle_t *buffer)
1493 struct efi_object *efiobj;
1494 efi_uintn_t size = 0;
1495 struct efi_register_notify_event *event;
1496 struct efi_protocol_notification *handle = NULL;
1498 /* Check parameters */
1499 switch (search_type) {
1502 case BY_REGISTER_NOTIFY:
1504 return EFI_INVALID_PARAMETER;
1505 /* Check that the registration key is valid */
1506 event = efi_check_register_notify_event(search_key);
1508 return EFI_INVALID_PARAMETER;
1512 return EFI_INVALID_PARAMETER;
1515 return EFI_INVALID_PARAMETER;
1518 /* Count how much space we need */
1519 if (search_type == BY_REGISTER_NOTIFY) {
1520 if (list_empty(&event->handles))
1521 return EFI_NOT_FOUND;
1522 handle = list_first_entry(&event->handles,
1523 struct efi_protocol_notification,
1525 efiobj = handle->handle;
1526 size += sizeof(void *);
1528 list_for_each_entry(efiobj, &efi_obj_list, link) {
1529 if (!efi_search(search_type, protocol, efiobj))
1530 size += sizeof(void *);
1533 return EFI_NOT_FOUND;
1537 return EFI_INVALID_PARAMETER;
1539 if (*buffer_size < size) {
1540 *buffer_size = size;
1541 return EFI_BUFFER_TOO_SMALL;
1544 *buffer_size = size;
1546 /* The buffer size is sufficient but there is no buffer */
1548 return EFI_INVALID_PARAMETER;
1550 /* Then fill the array */
1551 if (search_type == BY_REGISTER_NOTIFY) {
1553 list_del(&handle->link);
1555 list_for_each_entry(efiobj, &efi_obj_list, link) {
1556 if (!efi_search(search_type, protocol, efiobj))
1565 * efi_locate_handle_ext() - locate handles implementing a protocol.
1566 * @search_type: selection criterion
1567 * @protocol: GUID of the protocol
1568 * @search_key: registration key
1569 * @buffer_size: size of the buffer to receive the handles in bytes
1570 * @buffer: buffer to receive the relevant handles
1572 * This function implements the LocateHandle service.
1574 * See the Unified Extensible Firmware Interface (UEFI) specification for
1577 * Return: 0 if the handle implements the protocol
1579 static efi_status_t EFIAPI efi_locate_handle_ext(
1580 enum efi_locate_search_type search_type,
1581 const efi_guid_t *protocol, void *search_key,
1582 efi_uintn_t *buffer_size, efi_handle_t *buffer)
1584 EFI_ENTRY("%d, %pUl, %p, %p, %p", search_type, protocol, search_key,
1585 buffer_size, buffer);
1587 return EFI_EXIT(efi_locate_handle(search_type, protocol, search_key,
1588 buffer_size, buffer));
1592 * efi_remove_configuration_table() - collapses configuration table entries,
1595 * @i: index of the table entry to be removed
1597 static void efi_remove_configuration_table(int i)
1599 struct efi_configuration_table *this = &systab.tables[i];
1600 struct efi_configuration_table *next = &systab.tables[i + 1];
1601 struct efi_configuration_table *end = &systab.tables[systab.nr_tables];
1603 memmove(this, next, (ulong)end - (ulong)next);
1608 * efi_install_configuration_table() - adds, updates, or removes a
1609 * configuration table
1610 * @guid: GUID of the installed table
1611 * @table: table to be installed
1613 * This function is used for internal calls. For the API implementation of the
1614 * InstallConfigurationTable service see efi_install_configuration_table_ext.
1616 * Return: status code
1618 efi_status_t efi_install_configuration_table(const efi_guid_t *guid,
1621 struct efi_event *evt;
1625 return EFI_INVALID_PARAMETER;
1627 /* Check for GUID override */
1628 for (i = 0; i < systab.nr_tables; i++) {
1629 if (!guidcmp(guid, &systab.tables[i].guid)) {
1631 systab.tables[i].table = table;
1633 efi_remove_configuration_table(i);
1639 return EFI_NOT_FOUND;
1641 /* No override, check for overflow */
1642 if (i >= EFI_MAX_CONFIGURATION_TABLES)
1643 return EFI_OUT_OF_RESOURCES;
1645 /* Add a new entry */
1646 guidcpy(&systab.tables[i].guid, guid);
1647 systab.tables[i].table = table;
1648 systab.nr_tables = i + 1;
1651 /* systab.nr_tables may have changed. So we need to update the CRC32 */
1652 efi_update_table_header_crc32(&systab.hdr);
1654 /* Notify that the configuration table was changed */
1655 list_for_each_entry(evt, &efi_events, link) {
1656 if (evt->group && !guidcmp(evt->group, guid)) {
1657 efi_signal_event(evt);
1666 * efi_install_configuration_table_ex() - Adds, updates, or removes a
1667 * configuration table.
1668 * @guid: GUID of the installed table
1669 * @table: table to be installed
1671 * This function implements the InstallConfigurationTable service.
1673 * See the Unified Extensible Firmware Interface (UEFI) specification for
1676 * Return: status code
1678 static efi_status_t EFIAPI efi_install_configuration_table_ext(efi_guid_t *guid,
1681 EFI_ENTRY("%pUl, %p", guid, table);
1682 return EFI_EXIT(efi_install_configuration_table(guid, table));
1686 * efi_setup_loaded_image() - initialize a loaded image
1688 * Initialize a loaded_image_info and loaded_image_info object with correct
1689 * protocols, boot-device, etc.
1691 * In case of an error \*handle_ptr and \*info_ptr are set to NULL and an error
1694 * @device_path: device path of the loaded image
1695 * @file_path: file path of the loaded image
1696 * @handle_ptr: handle of the loaded image
1697 * @info_ptr: loaded image protocol
1698 * Return: status code
1700 efi_status_t efi_setup_loaded_image(struct efi_device_path *device_path,
1701 struct efi_device_path *file_path,
1702 struct efi_loaded_image_obj **handle_ptr,
1703 struct efi_loaded_image **info_ptr)
1706 struct efi_loaded_image *info = NULL;
1707 struct efi_loaded_image_obj *obj = NULL;
1708 struct efi_device_path *dp;
1710 /* In case of EFI_OUT_OF_RESOURCES avoid illegal free by caller. */
1714 info = calloc(1, sizeof(*info));
1716 return EFI_OUT_OF_RESOURCES;
1717 obj = calloc(1, sizeof(*obj));
1720 return EFI_OUT_OF_RESOURCES;
1722 obj->header.type = EFI_OBJECT_TYPE_LOADED_IMAGE;
1724 /* Add internal object to object list */
1725 efi_add_handle(&obj->header);
1727 info->revision = EFI_LOADED_IMAGE_PROTOCOL_REVISION;
1728 info->file_path = file_path;
1729 info->system_table = &systab;
1732 info->device_handle = efi_dp_find_obj(device_path, NULL);
1734 dp = efi_dp_append(device_path, file_path);
1736 ret = EFI_OUT_OF_RESOURCES;
1742 ret = efi_add_protocol(&obj->header,
1743 &efi_guid_loaded_image_device_path, dp);
1744 if (ret != EFI_SUCCESS)
1748 * When asking for the loaded_image interface, just
1749 * return handle which points to loaded_image_info
1751 ret = efi_add_protocol(&obj->header,
1752 &efi_guid_loaded_image, info);
1753 if (ret != EFI_SUCCESS)
1761 printf("ERROR: Failure to install protocols for loaded image\n");
1762 efi_delete_handle(&obj->header);
1768 * efi_load_image_from_path() - load an image using a file path
1770 * Read a file into a buffer allocated as EFI_BOOT_SERVICES_DATA. It is the
1771 * callers obligation to update the memory type as needed.
1773 * @file_path: the path of the image to load
1774 * @buffer: buffer containing the loaded image
1775 * @size: size of the loaded image
1776 * Return: status code
1779 efi_status_t efi_load_image_from_path(struct efi_device_path *file_path,
1780 void **buffer, efi_uintn_t *size)
1782 struct efi_file_info *info = NULL;
1783 struct efi_file_handle *f;
1784 static efi_status_t ret;
1788 /* In case of failure nothing is returned */
1793 f = efi_file_from_path(file_path);
1795 return EFI_NOT_FOUND;
1799 EFI_CALL(ret = f->getinfo(f, (efi_guid_t *)&efi_file_info_guid,
1801 if (ret != EFI_BUFFER_TOO_SMALL) {
1802 ret = EFI_DEVICE_ERROR;
1807 EFI_CALL(ret = f->getinfo(f, (efi_guid_t *)&efi_file_info_guid, &bs,
1809 if (ret != EFI_SUCCESS)
1813 * When reading the file we do not yet know if it contains an
1814 * application, a boottime driver, or a runtime driver. So here we
1815 * allocate a buffer as EFI_BOOT_SERVICES_DATA. The caller has to
1816 * update the reservation according to the image type.
1818 bs = info->file_size;
1819 ret = efi_allocate_pages(EFI_ALLOCATE_ANY_PAGES,
1820 EFI_BOOT_SERVICES_DATA,
1821 efi_size_in_pages(bs), &addr);
1822 if (ret != EFI_SUCCESS) {
1823 ret = EFI_OUT_OF_RESOURCES;
1828 EFI_CALL(ret = f->read(f, &bs, (void *)(uintptr_t)addr));
1829 if (ret != EFI_SUCCESS)
1830 efi_free_pages(addr, efi_size_in_pages(bs));
1831 *buffer = (void *)(uintptr_t)addr;
1834 EFI_CALL(f->close(f));
1840 * efi_load_image() - load an EFI image into memory
1841 * @boot_policy: true for request originating from the boot manager
1842 * @parent_image: the caller's image handle
1843 * @file_path: the path of the image to load
1844 * @source_buffer: memory location from which the image is installed
1845 * @source_size: size of the memory area from which the image is installed
1846 * @image_handle: handle for the newly installed image
1848 * This function implements the LoadImage service.
1850 * See the Unified Extensible Firmware Interface (UEFI) specification
1853 * Return: status code
1855 efi_status_t EFIAPI efi_load_image(bool boot_policy,
1856 efi_handle_t parent_image,
1857 struct efi_device_path *file_path,
1858 void *source_buffer,
1859 efi_uintn_t source_size,
1860 efi_handle_t *image_handle)
1862 struct efi_device_path *dp, *fp;
1863 struct efi_loaded_image *info = NULL;
1864 struct efi_loaded_image_obj **image_obj =
1865 (struct efi_loaded_image_obj **)image_handle;
1869 EFI_ENTRY("%d, %p, %pD, %p, %zd, %p", boot_policy, parent_image,
1870 file_path, source_buffer, source_size, image_handle);
1872 if (!image_handle || (!source_buffer && !file_path) ||
1873 !efi_search_obj(parent_image) ||
1874 /* The parent image handle must refer to a loaded image */
1875 !parent_image->type) {
1876 ret = EFI_INVALID_PARAMETER;
1880 if (!source_buffer) {
1881 ret = efi_load_image_from_path(file_path, &dest_buffer,
1883 if (ret != EFI_SUCCESS)
1886 dest_buffer = source_buffer;
1888 /* split file_path which contains both the device and file parts */
1889 efi_dp_split_file_path(file_path, &dp, &fp);
1890 ret = efi_setup_loaded_image(dp, fp, image_obj, &info);
1891 if (ret == EFI_SUCCESS)
1892 ret = efi_load_pe(*image_obj, dest_buffer, source_size, info);
1894 /* Release buffer to which file was loaded */
1895 efi_free_pages((uintptr_t)dest_buffer,
1896 efi_size_in_pages(source_size));
1897 if (ret == EFI_SUCCESS || ret == EFI_SECURITY_VIOLATION) {
1898 info->system_table = &systab;
1899 info->parent_handle = parent_image;
1901 /* The image is invalid. Release all associated resources. */
1902 efi_delete_handle(*image_handle);
1903 *image_handle = NULL;
1907 return EFI_EXIT(ret);
1911 * efi_exit_caches() - fix up caches for EFI payloads if necessary
1913 static void efi_exit_caches(void)
1915 #if defined(CONFIG_EFI_GRUB_ARM32_WORKAROUND)
1917 * Boooting Linux via GRUB prior to version 2.04 fails on 32bit ARM if
1918 * caches are enabled.
1921 * According to the UEFI spec caches that can be managed via CP15
1922 * operations should be enabled. Caches requiring platform information
1923 * to manage should be disabled. This should not happen in
1924 * ExitBootServices() but before invoking any UEFI binary is invoked.
1926 * We want to keep the current workaround while GRUB prior to version
1927 * 2.04 is still in use.
1929 cleanup_before_linux();
1934 * efi_exit_boot_services() - stop all boot services
1935 * @image_handle: handle of the loaded image
1936 * @map_key: key of the memory map
1938 * This function implements the ExitBootServices service.
1940 * See the Unified Extensible Firmware Interface (UEFI) specification
1943 * All timer events are disabled. For exit boot services events the
1944 * notification function is called. The boot services are disabled in the
1947 * Return: status code
1949 static efi_status_t EFIAPI efi_exit_boot_services(efi_handle_t image_handle,
1950 efi_uintn_t map_key)
1952 struct efi_event *evt, *next_event;
1953 efi_status_t ret = EFI_SUCCESS;
1955 EFI_ENTRY("%p, %zx", image_handle, map_key);
1957 /* Check that the caller has read the current memory map */
1958 if (map_key != efi_memory_map_key) {
1959 ret = EFI_INVALID_PARAMETER;
1963 /* Check if ExitBootServices has already been called */
1964 if (!systab.boottime)
1967 /* Stop all timer related activities */
1968 timers_enabled = false;
1970 /* Add related events to the event group */
1971 list_for_each_entry(evt, &efi_events, link) {
1972 if (evt->type == EVT_SIGNAL_EXIT_BOOT_SERVICES)
1973 evt->group = &efi_guid_event_group_exit_boot_services;
1975 /* Notify that ExitBootServices is invoked. */
1976 list_for_each_entry(evt, &efi_events, link) {
1978 !guidcmp(evt->group,
1979 &efi_guid_event_group_exit_boot_services)) {
1980 efi_signal_event(evt);
1985 /* Make sure that notification functions are not called anymore */
1986 efi_tpl = TPL_HIGH_LEVEL;
1988 /* Notify variable services */
1989 efi_variables_boot_exit_notify();
1991 /* Remove all events except EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE */
1992 list_for_each_entry_safe(evt, next_event, &efi_events, link) {
1993 if (evt->type != EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE)
1994 list_del(&evt->link);
1997 board_quiesce_devices();
1999 /* Patch out unsupported runtime function */
2000 efi_runtime_detach();
2002 /* Fix up caches for EFI payloads if necessary */
2005 /* This stops all lingering devices */
2006 bootm_disable_interrupts();
2008 /* Disable boot time services */
2009 systab.con_in_handle = NULL;
2010 systab.con_in = NULL;
2011 systab.con_out_handle = NULL;
2012 systab.con_out = NULL;
2013 systab.stderr_handle = NULL;
2014 systab.std_err = NULL;
2015 systab.boottime = NULL;
2017 /* Recalculate CRC32 */
2018 efi_update_table_header_crc32(&systab.hdr);
2020 /* Give the payload some time to boot */
2021 efi_set_watchdog(0);
2024 return EFI_EXIT(ret);
2028 * efi_get_next_monotonic_count() - get next value of the counter
2029 * @count: returned value of the counter
2031 * This function implements the NextMonotonicCount service.
2033 * See the Unified Extensible Firmware Interface (UEFI) specification for
2036 * Return: status code
2038 static efi_status_t EFIAPI efi_get_next_monotonic_count(uint64_t *count)
2040 static uint64_t mono;
2043 EFI_ENTRY("%p", count);
2045 ret = EFI_INVALID_PARAMETER;
2051 return EFI_EXIT(ret);
2055 * efi_stall() - sleep
2056 * @microseconds: period to sleep in microseconds
2058 * This function implements the Stall service.
2060 * See the Unified Extensible Firmware Interface (UEFI) specification for
2063 * Return: status code
2065 static efi_status_t EFIAPI efi_stall(unsigned long microseconds)
2069 EFI_ENTRY("%ld", microseconds);
2071 end_tick = get_ticks() + usec_to_tick(microseconds);
2072 while (get_ticks() < end_tick)
2075 return EFI_EXIT(EFI_SUCCESS);
2079 * efi_set_watchdog_timer() - reset the watchdog timer
2080 * @timeout: seconds before reset by watchdog
2081 * @watchdog_code: code to be logged when resetting
2082 * @data_size: size of buffer in bytes
2083 * @watchdog_data: buffer with data describing the reset reason
2085 * This function implements the SetWatchdogTimer service.
2087 * See the Unified Extensible Firmware Interface (UEFI) specification for
2090 * Return: status code
2092 static efi_status_t EFIAPI efi_set_watchdog_timer(unsigned long timeout,
2093 uint64_t watchdog_code,
2094 unsigned long data_size,
2095 uint16_t *watchdog_data)
2097 EFI_ENTRY("%ld, 0x%llx, %ld, %p", timeout, watchdog_code,
2098 data_size, watchdog_data);
2099 return EFI_EXIT(efi_set_watchdog(timeout));
2103 * efi_close_protocol() - close a protocol
2104 * @handle: handle on which the protocol shall be closed
2105 * @protocol: GUID of the protocol to close
2106 * @agent_handle: handle of the driver
2107 * @controller_handle: handle of the controller
2109 * This function implements the CloseProtocol service.
2111 * See the Unified Extensible Firmware Interface (UEFI) specification for
2114 * Return: status code
2116 efi_status_t EFIAPI efi_close_protocol(efi_handle_t handle,
2117 const efi_guid_t *protocol,
2118 efi_handle_t agent_handle,
2119 efi_handle_t controller_handle)
2121 struct efi_handler *handler;
2122 struct efi_open_protocol_info_item *item;
2123 struct efi_open_protocol_info_item *pos;
2126 EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, agent_handle,
2129 if (!efi_search_obj(agent_handle) ||
2130 (controller_handle && !efi_search_obj(controller_handle))) {
2131 r = EFI_INVALID_PARAMETER;
2134 r = efi_search_protocol(handle, protocol, &handler);
2135 if (r != EFI_SUCCESS)
2139 list_for_each_entry_safe(item, pos, &handler->open_infos, link) {
2140 if (item->info.agent_handle == agent_handle &&
2141 item->info.controller_handle == controller_handle) {
2142 efi_delete_open_info(item);
2151 * efi_open_protocol_information() - provide information about then open status
2152 * of a protocol on a handle
2153 * @handle: handle for which the information shall be retrieved
2154 * @protocol: GUID of the protocol
2155 * @entry_buffer: buffer to receive the open protocol information
2156 * @entry_count: number of entries available in the buffer
2158 * This function implements the OpenProtocolInformation service.
2160 * See the Unified Extensible Firmware Interface (UEFI) specification for
2163 * Return: status code
2165 static efi_status_t EFIAPI efi_open_protocol_information(
2166 efi_handle_t handle, const efi_guid_t *protocol,
2167 struct efi_open_protocol_info_entry **entry_buffer,
2168 efi_uintn_t *entry_count)
2170 unsigned long buffer_size;
2171 unsigned long count;
2172 struct efi_handler *handler;
2173 struct efi_open_protocol_info_item *item;
2176 EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, entry_buffer,
2179 /* Check parameters */
2180 if (!entry_buffer) {
2181 r = EFI_INVALID_PARAMETER;
2184 r = efi_search_protocol(handle, protocol, &handler);
2185 if (r != EFI_SUCCESS)
2190 list_for_each_entry(item, &handler->open_infos, link) {
2191 if (item->info.open_count)
2194 *entry_count = count;
2195 *entry_buffer = NULL;
2202 buffer_size = count * sizeof(struct efi_open_protocol_info_entry);
2203 r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
2204 (void **)entry_buffer);
2205 if (r != EFI_SUCCESS)
2207 list_for_each_entry_reverse(item, &handler->open_infos, link) {
2208 if (item->info.open_count)
2209 (*entry_buffer)[--count] = item->info;
2216 * efi_protocols_per_handle() - get protocols installed on a handle
2217 * @handle: handle for which the information is retrieved
2218 * @protocol_buffer: buffer with protocol GUIDs
2219 * @protocol_buffer_count: number of entries in the buffer
2221 * This function implements the ProtocolsPerHandleService.
2223 * See the Unified Extensible Firmware Interface (UEFI) specification for
2226 * Return: status code
2228 static efi_status_t EFIAPI efi_protocols_per_handle(
2229 efi_handle_t handle, efi_guid_t ***protocol_buffer,
2230 efi_uintn_t *protocol_buffer_count)
2232 unsigned long buffer_size;
2233 struct efi_object *efiobj;
2234 struct list_head *protocol_handle;
2237 EFI_ENTRY("%p, %p, %p", handle, protocol_buffer,
2238 protocol_buffer_count);
2240 if (!handle || !protocol_buffer || !protocol_buffer_count)
2241 return EFI_EXIT(EFI_INVALID_PARAMETER);
2243 *protocol_buffer = NULL;
2244 *protocol_buffer_count = 0;
2246 efiobj = efi_search_obj(handle);
2248 return EFI_EXIT(EFI_INVALID_PARAMETER);
2250 /* Count protocols */
2251 list_for_each(protocol_handle, &efiobj->protocols) {
2252 ++*protocol_buffer_count;
2256 if (*protocol_buffer_count) {
2259 buffer_size = sizeof(efi_guid_t *) * *protocol_buffer_count;
2260 r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
2261 (void **)protocol_buffer);
2262 if (r != EFI_SUCCESS)
2264 list_for_each(protocol_handle, &efiobj->protocols) {
2265 struct efi_handler *protocol;
2267 protocol = list_entry(protocol_handle,
2268 struct efi_handler, link);
2269 (*protocol_buffer)[j] = (void *)protocol->guid;
2274 return EFI_EXIT(EFI_SUCCESS);
2278 * efi_locate_handle_buffer() - locate handles implementing a protocol
2279 * @search_type: selection criterion
2280 * @protocol: GUID of the protocol
2281 * @search_key: registration key
2282 * @no_handles: number of returned handles
2283 * @buffer: buffer with the returned handles
2285 * This function implements the LocateHandleBuffer service.
2287 * See the Unified Extensible Firmware Interface (UEFI) specification for
2290 * Return: status code
2292 efi_status_t EFIAPI efi_locate_handle_buffer(
2293 enum efi_locate_search_type search_type,
2294 const efi_guid_t *protocol, void *search_key,
2295 efi_uintn_t *no_handles, efi_handle_t **buffer)
2298 efi_uintn_t buffer_size = 0;
2300 EFI_ENTRY("%d, %pUl, %p, %p, %p", search_type, protocol, search_key,
2301 no_handles, buffer);
2303 if (!no_handles || !buffer) {
2304 r = EFI_INVALID_PARAMETER;
2309 r = efi_locate_handle(search_type, protocol, search_key, &buffer_size,
2311 if (r != EFI_BUFFER_TOO_SMALL)
2313 r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
2315 if (r != EFI_SUCCESS)
2317 r = efi_locate_handle(search_type, protocol, search_key, &buffer_size,
2319 if (r == EFI_SUCCESS)
2320 *no_handles = buffer_size / sizeof(efi_handle_t);
2326 * efi_locate_protocol() - find an interface implementing a protocol
2327 * @protocol: GUID of the protocol
2328 * @registration: registration key passed to the notification function
2329 * @protocol_interface: interface implementing the protocol
2331 * This function implements the LocateProtocol service.
2333 * See the Unified Extensible Firmware Interface (UEFI) specification for
2336 * Return: status code
2338 static efi_status_t EFIAPI efi_locate_protocol(const efi_guid_t *protocol,
2340 void **protocol_interface)
2342 struct efi_handler *handler;
2344 struct efi_object *efiobj;
2346 EFI_ENTRY("%pUl, %p, %p", protocol, registration, protocol_interface);
2349 * The UEFI spec explicitly requires a protocol even if a registration
2350 * key is provided. This differs from the logic in LocateHandle().
2352 if (!protocol || !protocol_interface)
2353 return EFI_EXIT(EFI_INVALID_PARAMETER);
2356 struct efi_register_notify_event *event;
2357 struct efi_protocol_notification *handle;
2359 event = efi_check_register_notify_event(registration);
2361 return EFI_EXIT(EFI_INVALID_PARAMETER);
2363 * The UEFI spec requires to return EFI_NOT_FOUND if no
2364 * protocol instance matches protocol and registration.
2365 * So let's do the same for a mismatch between protocol and
2368 if (guidcmp(&event->protocol, protocol))
2370 if (list_empty(&event->handles))
2372 handle = list_first_entry(&event->handles,
2373 struct efi_protocol_notification,
2375 efiobj = handle->handle;
2376 list_del(&handle->link);
2378 ret = efi_search_protocol(efiobj, protocol, &handler);
2379 if (ret == EFI_SUCCESS)
2382 list_for_each_entry(efiobj, &efi_obj_list, link) {
2383 ret = efi_search_protocol(efiobj, protocol, &handler);
2384 if (ret == EFI_SUCCESS)
2389 *protocol_interface = NULL;
2390 return EFI_EXIT(EFI_NOT_FOUND);
2392 *protocol_interface = handler->protocol_interface;
2393 return EFI_EXIT(EFI_SUCCESS);
2397 * efi_locate_device_path() - Get the device path and handle of an device
2398 * implementing a protocol
2399 * @protocol: GUID of the protocol
2400 * @device_path: device path
2401 * @device: handle of the device
2403 * This function implements the LocateDevicePath service.
2405 * See the Unified Extensible Firmware Interface (UEFI) specification for
2408 * Return: status code
2410 static efi_status_t EFIAPI efi_locate_device_path(
2411 const efi_guid_t *protocol,
2412 struct efi_device_path **device_path,
2413 efi_handle_t *device)
2415 struct efi_device_path *dp;
2417 struct efi_handler *handler;
2418 efi_handle_t *handles;
2420 size_t len_best = 0;
2421 efi_uintn_t no_handles;
2425 EFI_ENTRY("%pUl, %p, %p", protocol, device_path, device);
2427 if (!protocol || !device_path || !*device_path) {
2428 ret = EFI_INVALID_PARAMETER;
2432 /* Find end of device path */
2433 len = efi_dp_instance_size(*device_path);
2435 /* Get all handles implementing the protocol */
2436 ret = EFI_CALL(efi_locate_handle_buffer(BY_PROTOCOL, protocol, NULL,
2437 &no_handles, &handles));
2438 if (ret != EFI_SUCCESS)
2441 for (i = 0; i < no_handles; ++i) {
2442 /* Find the device path protocol */
2443 ret = efi_search_protocol(handles[i], &efi_guid_device_path,
2445 if (ret != EFI_SUCCESS)
2447 dp = (struct efi_device_path *)handler->protocol_interface;
2448 len_dp = efi_dp_instance_size(dp);
2450 * This handle can only be a better fit
2451 * if its device path length is longer than the best fit and
2452 * if its device path length is shorter of equal the searched
2455 if (len_dp <= len_best || len_dp > len)
2457 /* Check if dp is a subpath of device_path */
2458 if (memcmp(*device_path, dp, len_dp))
2461 ret = EFI_INVALID_PARAMETER;
2464 *device = handles[i];
2468 remainder = (u8 *)*device_path + len_best;
2469 *device_path = (struct efi_device_path *)remainder;
2472 ret = EFI_NOT_FOUND;
2475 return EFI_EXIT(ret);
2479 * efi_install_multiple_protocol_interfaces() - Install multiple protocol
2481 * @handle: handle on which the protocol interfaces shall be installed
2482 * @...: NULL terminated argument list with pairs of protocol GUIDS and
2485 * This function implements the MultipleProtocolInterfaces service.
2487 * See the Unified Extensible Firmware Interface (UEFI) specification for
2490 * Return: status code
2492 efi_status_t EFIAPI efi_install_multiple_protocol_interfaces
2493 (efi_handle_t *handle, ...)
2495 EFI_ENTRY("%p", handle);
2498 const efi_guid_t *protocol;
2499 void *protocol_interface;
2500 efi_handle_t old_handle;
2501 efi_status_t r = EFI_SUCCESS;
2505 return EFI_EXIT(EFI_INVALID_PARAMETER);
2507 efi_va_start(argptr, handle);
2509 protocol = efi_va_arg(argptr, efi_guid_t*);
2512 protocol_interface = efi_va_arg(argptr, void*);
2513 /* Check that a device path has not been installed before */
2514 if (!guidcmp(protocol, &efi_guid_device_path)) {
2515 struct efi_device_path *dp = protocol_interface;
2517 r = EFI_CALL(efi_locate_device_path(protocol, &dp,
2519 if (r == EFI_SUCCESS &&
2520 dp->type == DEVICE_PATH_TYPE_END) {
2521 EFI_PRINT("Path %pD already installed\n",
2522 protocol_interface);
2523 r = EFI_ALREADY_STARTED;
2527 r = EFI_CALL(efi_install_protocol_interface(
2529 EFI_NATIVE_INTERFACE,
2530 protocol_interface));
2531 if (r != EFI_SUCCESS)
2536 if (r == EFI_SUCCESS)
2539 /* If an error occurred undo all changes. */
2540 efi_va_start(argptr, handle);
2542 protocol = efi_va_arg(argptr, efi_guid_t*);
2543 protocol_interface = efi_va_arg(argptr, void*);
2544 EFI_CALL(efi_uninstall_protocol_interface(*handle, protocol,
2545 protocol_interface));
2553 * efi_uninstall_multiple_protocol_interfaces() - uninstall multiple protocol
2555 * @handle: handle from which the protocol interfaces shall be removed
2556 * @...: NULL terminated argument list with pairs of protocol GUIDS and
2559 * This function implements the UninstallMultipleProtocolInterfaces service.
2561 * See the Unified Extensible Firmware Interface (UEFI) specification for
2564 * Return: status code
2566 static efi_status_t EFIAPI efi_uninstall_multiple_protocol_interfaces(
2567 efi_handle_t handle, ...)
2569 EFI_ENTRY("%p", handle);
2572 const efi_guid_t *protocol;
2573 void *protocol_interface;
2574 efi_status_t r = EFI_SUCCESS;
2578 return EFI_EXIT(EFI_INVALID_PARAMETER);
2580 efi_va_start(argptr, handle);
2582 protocol = efi_va_arg(argptr, efi_guid_t*);
2585 protocol_interface = efi_va_arg(argptr, void*);
2586 r = efi_uninstall_protocol(handle, protocol,
2587 protocol_interface);
2588 if (r != EFI_SUCCESS)
2593 if (r == EFI_SUCCESS) {
2594 /* If the last protocol has been removed, delete the handle. */
2595 if (list_empty(&handle->protocols)) {
2596 list_del(&handle->link);
2602 /* If an error occurred undo all changes. */
2603 efi_va_start(argptr, handle);
2605 protocol = efi_va_arg(argptr, efi_guid_t*);
2606 protocol_interface = efi_va_arg(argptr, void*);
2607 EFI_CALL(efi_install_protocol_interface(&handle, protocol,
2608 EFI_NATIVE_INTERFACE,
2609 protocol_interface));
2613 /* In case of an error always return EFI_INVALID_PARAMETER */
2614 return EFI_EXIT(EFI_INVALID_PARAMETER);
2618 * efi_calculate_crc32() - calculate cyclic redundancy code
2619 * @data: buffer with data
2620 * @data_size: size of buffer in bytes
2621 * @crc32_p: cyclic redundancy code
2623 * This function implements the CalculateCrc32 service.
2625 * See the Unified Extensible Firmware Interface (UEFI) specification for
2628 * Return: status code
2630 static efi_status_t EFIAPI efi_calculate_crc32(const void *data,
2631 efi_uintn_t data_size,
2634 efi_status_t ret = EFI_SUCCESS;
2636 EFI_ENTRY("%p, %zu", data, data_size);
2637 if (!data || !data_size || !crc32_p) {
2638 ret = EFI_INVALID_PARAMETER;
2641 *crc32_p = crc32(0, data, data_size);
2643 return EFI_EXIT(ret);
2647 * efi_copy_mem() - copy memory
2648 * @destination: destination of the copy operation
2649 * @source: source of the copy operation
2650 * @length: number of bytes to copy
2652 * This function implements the CopyMem service.
2654 * See the Unified Extensible Firmware Interface (UEFI) specification for
2657 static void EFIAPI efi_copy_mem(void *destination, const void *source,
2660 EFI_ENTRY("%p, %p, %ld", destination, source, (unsigned long)length);
2661 memmove(destination, source, length);
2662 EFI_EXIT(EFI_SUCCESS);
2666 * efi_set_mem() - Fill memory with a byte value.
2667 * @buffer: buffer to fill
2668 * @size: size of buffer in bytes
2669 * @value: byte to copy to the buffer
2671 * This function implements the SetMem service.
2673 * See the Unified Extensible Firmware Interface (UEFI) specification for
2676 static void EFIAPI efi_set_mem(void *buffer, size_t size, uint8_t value)
2678 EFI_ENTRY("%p, %ld, 0x%x", buffer, (unsigned long)size, value);
2679 memset(buffer, value, size);
2680 EFI_EXIT(EFI_SUCCESS);
2684 * efi_protocol_open() - open protocol interface on a handle
2685 * @handler: handler of a protocol
2686 * @protocol_interface: interface implementing the protocol
2687 * @agent_handle: handle of the driver
2688 * @controller_handle: handle of the controller
2689 * @attributes: attributes indicating how to open the protocol
2691 * Return: status code
2693 static efi_status_t efi_protocol_open(
2694 struct efi_handler *handler,
2695 void **protocol_interface, void *agent_handle,
2696 void *controller_handle, uint32_t attributes)
2698 struct efi_open_protocol_info_item *item;
2699 struct efi_open_protocol_info_entry *match = NULL;
2700 bool opened_by_driver = false;
2701 bool opened_exclusive = false;
2703 /* If there is no agent, only return the interface */
2707 /* For TEST_PROTOCOL ignore interface attribute */
2708 if (attributes != EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
2709 *protocol_interface = NULL;
2712 * Check if the protocol is already opened by a driver with the same
2713 * attributes or opened exclusively
2715 list_for_each_entry(item, &handler->open_infos, link) {
2716 if (item->info.agent_handle == agent_handle) {
2717 if ((attributes & EFI_OPEN_PROTOCOL_BY_DRIVER) &&
2718 (item->info.attributes == attributes))
2719 return EFI_ALREADY_STARTED;
2721 if (item->info.attributes &
2722 EFI_OPEN_PROTOCOL_BY_DRIVER)
2723 opened_by_driver = true;
2725 if (item->info.attributes & EFI_OPEN_PROTOCOL_EXCLUSIVE)
2726 opened_exclusive = true;
2729 /* Only one controller can open the protocol exclusively */
2730 if (attributes & EFI_OPEN_PROTOCOL_EXCLUSIVE) {
2731 if (opened_exclusive)
2732 return EFI_ACCESS_DENIED;
2733 } else if (attributes & EFI_OPEN_PROTOCOL_BY_DRIVER) {
2734 if (opened_exclusive || opened_by_driver)
2735 return EFI_ACCESS_DENIED;
2738 /* Prepare exclusive opening */
2739 if (attributes & EFI_OPEN_PROTOCOL_EXCLUSIVE) {
2740 /* Try to disconnect controllers */
2742 opened_by_driver = false;
2743 list_for_each_entry(item, &handler->open_infos, link) {
2746 if (item->info.attributes ==
2747 EFI_OPEN_PROTOCOL_BY_DRIVER) {
2748 ret = EFI_CALL(efi_disconnect_controller(
2749 item->info.controller_handle,
2750 item->info.agent_handle,
2752 if (ret == EFI_SUCCESS)
2754 * Child controllers may have been
2755 * removed from the open_infos list. So
2756 * let's restart the loop.
2758 goto disconnect_next;
2760 opened_by_driver = true;
2763 /* Only one driver can be connected */
2764 if (opened_by_driver)
2765 return EFI_ACCESS_DENIED;
2768 /* Find existing entry */
2769 list_for_each_entry(item, &handler->open_infos, link) {
2770 if (item->info.agent_handle == agent_handle &&
2771 item->info.controller_handle == controller_handle &&
2772 item->info.attributes == attributes)
2773 match = &item->info;
2775 /* None found, create one */
2777 match = efi_create_open_info(handler);
2779 return EFI_OUT_OF_RESOURCES;
2782 match->agent_handle = agent_handle;
2783 match->controller_handle = controller_handle;
2784 match->attributes = attributes;
2785 match->open_count++;
2788 /* For TEST_PROTOCOL ignore interface attribute. */
2789 if (attributes != EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
2790 *protocol_interface = handler->protocol_interface;
2796 * efi_open_protocol() - open protocol interface on a handle
2797 * @handle: handle on which the protocol shall be opened
2798 * @protocol: GUID of the protocol
2799 * @protocol_interface: interface implementing the protocol
2800 * @agent_handle: handle of the driver
2801 * @controller_handle: handle of the controller
2802 * @attributes: attributes indicating how to open the protocol
2804 * This function implements the OpenProtocol interface.
2806 * See the Unified Extensible Firmware Interface (UEFI) specification for
2809 * Return: status code
2811 static efi_status_t EFIAPI efi_open_protocol
2812 (efi_handle_t handle, const efi_guid_t *protocol,
2813 void **protocol_interface, efi_handle_t agent_handle,
2814 efi_handle_t controller_handle, uint32_t attributes)
2816 struct efi_handler *handler;
2817 efi_status_t r = EFI_INVALID_PARAMETER;
2819 EFI_ENTRY("%p, %pUl, %p, %p, %p, 0x%x", handle, protocol,
2820 protocol_interface, agent_handle, controller_handle,
2823 if (!handle || !protocol ||
2824 (!protocol_interface && attributes !=
2825 EFI_OPEN_PROTOCOL_TEST_PROTOCOL)) {
2829 switch (attributes) {
2830 case EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL:
2831 case EFI_OPEN_PROTOCOL_GET_PROTOCOL:
2832 case EFI_OPEN_PROTOCOL_TEST_PROTOCOL:
2834 case EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER:
2835 if (controller_handle == handle)
2838 case EFI_OPEN_PROTOCOL_BY_DRIVER:
2839 case EFI_OPEN_PROTOCOL_BY_DRIVER | EFI_OPEN_PROTOCOL_EXCLUSIVE:
2840 /* Check that the controller handle is valid */
2841 if (!efi_search_obj(controller_handle))
2844 case EFI_OPEN_PROTOCOL_EXCLUSIVE:
2845 /* Check that the agent handle is valid */
2846 if (!efi_search_obj(agent_handle))
2853 r = efi_search_protocol(handle, protocol, &handler);
2858 r = EFI_UNSUPPORTED;
2864 r = efi_protocol_open(handler, protocol_interface, agent_handle,
2865 controller_handle, attributes);
2871 * efi_start_image() - call the entry point of an image
2872 * @image_handle: handle of the image
2873 * @exit_data_size: size of the buffer
2874 * @exit_data: buffer to receive the exit data of the called image
2876 * This function implements the StartImage service.
2878 * See the Unified Extensible Firmware Interface (UEFI) specification for
2881 * Return: status code
2883 efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle,
2884 efi_uintn_t *exit_data_size,
2887 struct efi_loaded_image_obj *image_obj =
2888 (struct efi_loaded_image_obj *)image_handle;
2891 efi_handle_t parent_image = current_image;
2893 EFI_ENTRY("%p, %p, %p", image_handle, exit_data_size, exit_data);
2895 if (!efi_search_obj(image_handle))
2896 return EFI_EXIT(EFI_INVALID_PARAMETER);
2898 /* Check parameters */
2899 if (image_obj->header.type != EFI_OBJECT_TYPE_LOADED_IMAGE)
2900 return EFI_EXIT(EFI_INVALID_PARAMETER);
2902 if (image_obj->auth_status != EFI_IMAGE_AUTH_PASSED)
2903 return EFI_EXIT(EFI_SECURITY_VIOLATION);
2905 ret = EFI_CALL(efi_open_protocol(image_handle, &efi_guid_loaded_image,
2907 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
2908 if (ret != EFI_SUCCESS)
2909 return EFI_EXIT(EFI_INVALID_PARAMETER);
2911 image_obj->exit_data_size = exit_data_size;
2912 image_obj->exit_data = exit_data;
2914 /* call the image! */
2915 if (setjmp(&image_obj->exit_jmp)) {
2917 * We called the entry point of the child image with EFI_CALL
2918 * in the lines below. The child image called the Exit() boot
2919 * service efi_exit() which executed the long jump that brought
2920 * us to the current line. This implies that the second half
2921 * of the EFI_CALL macro has not been executed.
2923 #if defined(CONFIG_ARM) || defined(CONFIG_RISCV)
2925 * efi_exit() called efi_restore_gd(). We have to undo this
2926 * otherwise __efi_entry_check() will put the wrong value into
2932 * To get ready to call EFI_EXIT below we have to execute the
2933 * missed out steps of EFI_CALL.
2935 assert(__efi_entry_check());
2936 EFI_PRINT("%lu returned by started image\n",
2937 (unsigned long)((uintptr_t)image_obj->exit_status &
2939 current_image = parent_image;
2940 return EFI_EXIT(image_obj->exit_status);
2943 current_image = image_handle;
2944 image_obj->header.type = EFI_OBJECT_TYPE_STARTED_IMAGE;
2945 EFI_PRINT("Jumping into 0x%p\n", image_obj->entry);
2946 ret = EFI_CALL(image_obj->entry(image_handle, &systab));
2949 * Control is returned from a started UEFI image either by calling
2950 * Exit() (where exit data can be provided) or by simply returning from
2951 * the entry point. In the latter case call Exit() on behalf of the
2954 return EFI_CALL(systab.boottime->exit(image_handle, ret, 0, NULL));
2958 * efi_delete_image() - delete loaded image from memory)
2960 * @image_obj: handle of the loaded image
2961 * @loaded_image_protocol: loaded image protocol
2963 static efi_status_t efi_delete_image
2964 (struct efi_loaded_image_obj *image_obj,
2965 struct efi_loaded_image *loaded_image_protocol)
2967 struct efi_object *efiobj;
2968 efi_status_t r, ret = EFI_SUCCESS;
2971 list_for_each_entry(efiobj, &efi_obj_list, link) {
2972 struct efi_handler *protocol;
2974 list_for_each_entry(protocol, &efiobj->protocols, link) {
2975 struct efi_open_protocol_info_item *info;
2977 list_for_each_entry(info, &protocol->open_infos, link) {
2978 if (info->info.agent_handle !=
2979 (efi_handle_t)image_obj)
2981 r = EFI_CALL(efi_close_protocol
2982 (efiobj, protocol->guid,
2983 info->info.agent_handle,
2984 info->info.controller_handle
2986 if (r != EFI_SUCCESS)
2989 * Closing protocols may results in further
2990 * items being deleted. To play it safe loop
2991 * over all elements again.
2998 efi_free_pages((uintptr_t)loaded_image_protocol->image_base,
2999 efi_size_in_pages(loaded_image_protocol->image_size));
3000 efi_delete_handle(&image_obj->header);
3006 * efi_unload_image() - unload an EFI image
3007 * @image_handle: handle of the image to be unloaded
3009 * This function implements the UnloadImage service.
3011 * See the Unified Extensible Firmware Interface (UEFI) specification for
3014 * Return: status code
3016 efi_status_t EFIAPI efi_unload_image(efi_handle_t image_handle)
3018 efi_status_t ret = EFI_SUCCESS;
3019 struct efi_object *efiobj;
3020 struct efi_loaded_image *loaded_image_protocol;
3022 EFI_ENTRY("%p", image_handle);
3024 efiobj = efi_search_obj(image_handle);
3026 ret = EFI_INVALID_PARAMETER;
3029 /* Find the loaded image protocol */
3030 ret = EFI_CALL(efi_open_protocol(image_handle, &efi_guid_loaded_image,
3031 (void **)&loaded_image_protocol,
3033 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
3034 if (ret != EFI_SUCCESS) {
3035 ret = EFI_INVALID_PARAMETER;
3038 switch (efiobj->type) {
3039 case EFI_OBJECT_TYPE_STARTED_IMAGE:
3040 /* Call the unload function */
3041 if (!loaded_image_protocol->unload) {
3042 ret = EFI_UNSUPPORTED;
3045 ret = EFI_CALL(loaded_image_protocol->unload(image_handle));
3046 if (ret != EFI_SUCCESS)
3049 case EFI_OBJECT_TYPE_LOADED_IMAGE:
3052 ret = EFI_INVALID_PARAMETER;
3055 efi_delete_image((struct efi_loaded_image_obj *)efiobj,
3056 loaded_image_protocol);
3058 return EFI_EXIT(ret);
3062 * efi_update_exit_data() - fill exit data parameters of StartImage()
3064 * @image_obj: image handle
3065 * @exit_data_size: size of the exit data buffer
3066 * @exit_data: buffer with data returned by UEFI payload
3067 * Return: status code
3069 static efi_status_t efi_update_exit_data(struct efi_loaded_image_obj *image_obj,
3070 efi_uintn_t exit_data_size,
3076 * If exit_data is not provided to StartImage(), exit_data_size must be
3079 if (!image_obj->exit_data)
3081 if (image_obj->exit_data_size)
3082 *image_obj->exit_data_size = exit_data_size;
3083 if (exit_data_size && exit_data) {
3084 ret = efi_allocate_pool(EFI_BOOT_SERVICES_DATA,
3086 (void **)image_obj->exit_data);
3087 if (ret != EFI_SUCCESS)
3089 memcpy(*image_obj->exit_data, exit_data, exit_data_size);
3091 image_obj->exit_data = NULL;
3097 * efi_exit() - leave an EFI application or driver
3098 * @image_handle: handle of the application or driver that is exiting
3099 * @exit_status: status code
3100 * @exit_data_size: size of the buffer in bytes
3101 * @exit_data: buffer with data describing an error
3103 * This function implements the Exit service.
3105 * See the Unified Extensible Firmware Interface (UEFI) specification for
3108 * Return: status code
3110 static efi_status_t EFIAPI efi_exit(efi_handle_t image_handle,
3111 efi_status_t exit_status,
3112 efi_uintn_t exit_data_size,
3116 * TODO: We should call the unload procedure of the loaded
3120 struct efi_loaded_image *loaded_image_protocol;
3121 struct efi_loaded_image_obj *image_obj =
3122 (struct efi_loaded_image_obj *)image_handle;
3124 EFI_ENTRY("%p, %ld, %zu, %p", image_handle, exit_status,
3125 exit_data_size, exit_data);
3127 /* Check parameters */
3128 ret = EFI_CALL(efi_open_protocol(image_handle, &efi_guid_loaded_image,
3129 (void **)&loaded_image_protocol,
3131 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
3132 if (ret != EFI_SUCCESS) {
3133 ret = EFI_INVALID_PARAMETER;
3137 /* Unloading of unstarted images */
3138 switch (image_obj->header.type) {
3139 case EFI_OBJECT_TYPE_STARTED_IMAGE:
3141 case EFI_OBJECT_TYPE_LOADED_IMAGE:
3142 efi_delete_image(image_obj, loaded_image_protocol);
3146 /* Handle does not refer to loaded image */
3147 ret = EFI_INVALID_PARAMETER;
3150 /* A started image can only be unloaded it is the last one started. */
3151 if (image_handle != current_image) {
3152 ret = EFI_INVALID_PARAMETER;
3156 /* Exit data is only foreseen in case of failure. */
3157 if (exit_status != EFI_SUCCESS) {
3158 ret = efi_update_exit_data(image_obj, exit_data_size,
3160 /* Exiting has priority. Don't return error to caller. */
3161 if (ret != EFI_SUCCESS)
3162 EFI_PRINT("%s: out of memory\n", __func__);
3164 if (image_obj->image_type == IMAGE_SUBSYSTEM_EFI_APPLICATION ||
3165 exit_status != EFI_SUCCESS)
3166 efi_delete_image(image_obj, loaded_image_protocol);
3168 /* Make sure entry/exit counts for EFI world cross-overs match */
3169 EFI_EXIT(exit_status);
3172 * But longjmp out with the U-Boot gd, not the application's, as
3173 * the other end is a setjmp call inside EFI context.
3177 image_obj->exit_status = exit_status;
3178 longjmp(&image_obj->exit_jmp, 1);
3180 panic("EFI application exited");
3182 return EFI_EXIT(ret);
3186 * efi_handle_protocol() - get interface of a protocol on a handle
3187 * @handle: handle on which the protocol shall be opened
3188 * @protocol: GUID of the protocol
3189 * @protocol_interface: interface implementing the protocol
3191 * This function implements the HandleProtocol service.
3193 * See the Unified Extensible Firmware Interface (UEFI) specification for
3196 * Return: status code
3198 efi_status_t EFIAPI efi_handle_protocol(efi_handle_t handle,
3199 const efi_guid_t *protocol,
3200 void **protocol_interface)
3202 return efi_open_protocol(handle, protocol, protocol_interface, efi_root,
3203 NULL, EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL);
3207 * efi_bind_controller() - bind a single driver to a controller
3208 * @controller_handle: controller handle
3209 * @driver_image_handle: driver handle
3210 * @remain_device_path: remaining path
3212 * Return: status code
3214 static efi_status_t efi_bind_controller(
3215 efi_handle_t controller_handle,
3216 efi_handle_t driver_image_handle,
3217 struct efi_device_path *remain_device_path)
3219 struct efi_driver_binding_protocol *binding_protocol;
3222 r = EFI_CALL(efi_open_protocol(driver_image_handle,
3223 &efi_guid_driver_binding_protocol,
3224 (void **)&binding_protocol,
3225 driver_image_handle, NULL,
3226 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
3227 if (r != EFI_SUCCESS)
3229 r = EFI_CALL(binding_protocol->supported(binding_protocol,
3231 remain_device_path));
3232 if (r == EFI_SUCCESS)
3233 r = EFI_CALL(binding_protocol->start(binding_protocol,
3235 remain_device_path));
3236 EFI_CALL(efi_close_protocol(driver_image_handle,
3237 &efi_guid_driver_binding_protocol,
3238 driver_image_handle, NULL));
3243 * efi_connect_single_controller() - connect a single driver to a controller
3244 * @controller_handle: controller
3245 * @driver_image_handle: driver
3246 * @remain_device_path: remaining path
3248 * Return: status code
3250 static efi_status_t efi_connect_single_controller(
3251 efi_handle_t controller_handle,
3252 efi_handle_t *driver_image_handle,
3253 struct efi_device_path *remain_device_path)
3255 efi_handle_t *buffer;
3259 size_t connected = 0;
3261 /* Get buffer with all handles with driver binding protocol */
3262 r = EFI_CALL(efi_locate_handle_buffer(BY_PROTOCOL,
3263 &efi_guid_driver_binding_protocol,
3264 NULL, &count, &buffer));
3265 if (r != EFI_SUCCESS)
3268 /* Context Override */
3269 if (driver_image_handle) {
3270 for (; *driver_image_handle; ++driver_image_handle) {
3271 for (i = 0; i < count; ++i) {
3272 if (buffer[i] == *driver_image_handle) {
3274 r = efi_bind_controller(
3276 *driver_image_handle,
3277 remain_device_path);
3279 * For drivers that do not support the
3280 * controller or are already connected
3281 * we receive an error code here.
3283 if (r == EFI_SUCCESS)
3291 * TODO: Some overrides are not yet implemented:
3292 * - Platform Driver Override
3293 * - Driver Family Override Search
3294 * - Bus Specific Driver Override
3297 /* Driver Binding Search */
3298 for (i = 0; i < count; ++i) {
3300 r = efi_bind_controller(controller_handle,
3302 remain_device_path);
3303 if (r == EFI_SUCCESS)
3308 efi_free_pool(buffer);
3310 return EFI_NOT_FOUND;
3315 * efi_connect_controller() - connect a controller to a driver
3316 * @controller_handle: handle of the controller
3317 * @driver_image_handle: handle of the driver
3318 * @remain_device_path: device path of a child controller
3319 * @recursive: true to connect all child controllers
3321 * This function implements the ConnectController service.
3323 * See the Unified Extensible Firmware Interface (UEFI) specification for
3326 * First all driver binding protocol handles are tried for binding drivers.
3327 * Afterwards all handles that have opened a protocol of the controller
3328 * with EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER are connected to drivers.
3330 * Return: status code
3332 static efi_status_t EFIAPI efi_connect_controller(
3333 efi_handle_t controller_handle,
3334 efi_handle_t *driver_image_handle,
3335 struct efi_device_path *remain_device_path,
3339 efi_status_t ret = EFI_NOT_FOUND;
3340 struct efi_object *efiobj;
3342 EFI_ENTRY("%p, %p, %pD, %d", controller_handle, driver_image_handle,
3343 remain_device_path, recursive);
3345 efiobj = efi_search_obj(controller_handle);
3347 ret = EFI_INVALID_PARAMETER;
3351 r = efi_connect_single_controller(controller_handle,
3352 driver_image_handle,
3353 remain_device_path);
3354 if (r == EFI_SUCCESS)
3357 struct efi_handler *handler;
3358 struct efi_open_protocol_info_item *item;
3360 list_for_each_entry(handler, &efiobj->protocols, link) {
3361 list_for_each_entry(item, &handler->open_infos, link) {
3362 if (item->info.attributes &
3363 EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER) {
3364 r = EFI_CALL(efi_connect_controller(
3365 item->info.controller_handle,
3366 driver_image_handle,
3369 if (r == EFI_SUCCESS)
3375 /* Check for child controller specified by end node */
3376 if (ret != EFI_SUCCESS && remain_device_path &&
3377 remain_device_path->type == DEVICE_PATH_TYPE_END)
3380 return EFI_EXIT(ret);
3384 * efi_reinstall_protocol_interface() - reinstall protocol interface
3385 * @handle: handle on which the protocol shall be reinstalled
3386 * @protocol: GUID of the protocol to be installed
3387 * @old_interface: interface to be removed
3388 * @new_interface: interface to be installed
3390 * This function implements the ReinstallProtocolInterface service.
3392 * See the Unified Extensible Firmware Interface (UEFI) specification for
3395 * The old interface is uninstalled. The new interface is installed.
3396 * Drivers are connected.
3398 * Return: status code
3400 static efi_status_t EFIAPI efi_reinstall_protocol_interface(
3401 efi_handle_t handle, const efi_guid_t *protocol,
3402 void *old_interface, void *new_interface)
3406 EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, old_interface,
3409 /* Uninstall protocol but do not delete handle */
3410 ret = efi_uninstall_protocol(handle, protocol, old_interface);
3411 if (ret != EFI_SUCCESS)
3414 /* Install the new protocol */
3415 ret = efi_add_protocol(handle, protocol, new_interface);
3417 * The UEFI spec does not specify what should happen to the handle
3418 * if in case of an error no protocol interface remains on the handle.
3419 * So let's do nothing here.
3421 if (ret != EFI_SUCCESS)
3424 * The returned status code has to be ignored.
3425 * Do not create an error if no suitable driver for the handle exists.
3427 EFI_CALL(efi_connect_controller(handle, NULL, NULL, true));
3429 return EFI_EXIT(ret);
3433 * efi_get_child_controllers() - get all child controllers associated to a driver
3434 * @efiobj: handle of the controller
3435 * @driver_handle: handle of the driver
3436 * @number_of_children: number of child controllers
3437 * @child_handle_buffer: handles of the the child controllers
3439 * The allocated buffer has to be freed with free().
3441 * Return: status code
3443 static efi_status_t efi_get_child_controllers(
3444 struct efi_object *efiobj,
3445 efi_handle_t driver_handle,
3446 efi_uintn_t *number_of_children,
3447 efi_handle_t **child_handle_buffer)
3449 struct efi_handler *handler;
3450 struct efi_open_protocol_info_item *item;
3451 efi_uintn_t count = 0, i;
3454 /* Count all child controller associations */
3455 list_for_each_entry(handler, &efiobj->protocols, link) {
3456 list_for_each_entry(item, &handler->open_infos, link) {
3457 if (item->info.agent_handle == driver_handle &&
3458 item->info.attributes &
3459 EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER)
3464 * Create buffer. In case of duplicate child controller assignments
3465 * the buffer will be too large. But that does not harm.
3467 *number_of_children = 0;
3470 *child_handle_buffer = calloc(count, sizeof(efi_handle_t));
3471 if (!*child_handle_buffer)
3472 return EFI_OUT_OF_RESOURCES;
3473 /* Copy unique child handles */
3474 list_for_each_entry(handler, &efiobj->protocols, link) {
3475 list_for_each_entry(item, &handler->open_infos, link) {
3476 if (item->info.agent_handle == driver_handle &&
3477 item->info.attributes &
3478 EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER) {
3479 /* Check this is a new child controller */
3481 for (i = 0; i < *number_of_children; ++i) {
3482 if ((*child_handle_buffer)[i] ==
3483 item->info.controller_handle)
3486 /* Copy handle to buffer */
3488 i = (*number_of_children)++;
3489 (*child_handle_buffer)[i] =
3490 item->info.controller_handle;
3499 * efi_disconnect_controller() - disconnect a controller from a driver
3500 * @controller_handle: handle of the controller
3501 * @driver_image_handle: handle of the driver
3502 * @child_handle: handle of the child to destroy
3504 * This function implements the DisconnectController service.
3506 * See the Unified Extensible Firmware Interface (UEFI) specification for
3509 * Return: status code
3511 static efi_status_t EFIAPI efi_disconnect_controller(
3512 efi_handle_t controller_handle,
3513 efi_handle_t driver_image_handle,
3514 efi_handle_t child_handle)
3516 struct efi_driver_binding_protocol *binding_protocol;
3517 efi_handle_t *child_handle_buffer = NULL;
3518 size_t number_of_children = 0;
3520 struct efi_object *efiobj;
3522 EFI_ENTRY("%p, %p, %p", controller_handle, driver_image_handle,
3525 efiobj = efi_search_obj(controller_handle);
3527 r = EFI_INVALID_PARAMETER;
3531 if (child_handle && !efi_search_obj(child_handle)) {
3532 r = EFI_INVALID_PARAMETER;
3536 /* If no driver handle is supplied, disconnect all drivers */
3537 if (!driver_image_handle) {
3538 r = efi_disconnect_all_drivers(efiobj, NULL, child_handle);
3542 /* Create list of child handles */
3544 number_of_children = 1;
3545 child_handle_buffer = &child_handle;
3547 r = efi_get_child_controllers(efiobj,
3548 driver_image_handle,
3549 &number_of_children,
3550 &child_handle_buffer);
3551 if (r != EFI_SUCCESS)
3555 /* Get the driver binding protocol */
3556 r = EFI_CALL(efi_open_protocol(driver_image_handle,
3557 &efi_guid_driver_binding_protocol,
3558 (void **)&binding_protocol,
3559 driver_image_handle, NULL,
3560 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
3561 if (r != EFI_SUCCESS) {
3562 r = EFI_INVALID_PARAMETER;
3565 /* Remove the children */
3566 if (number_of_children) {
3567 r = EFI_CALL(binding_protocol->stop(binding_protocol,
3570 child_handle_buffer));
3571 if (r != EFI_SUCCESS) {
3572 r = EFI_DEVICE_ERROR;
3576 /* Remove the driver */
3577 if (!child_handle) {
3578 r = EFI_CALL(binding_protocol->stop(binding_protocol,
3581 if (r != EFI_SUCCESS) {
3582 r = EFI_DEVICE_ERROR;
3586 EFI_CALL(efi_close_protocol(driver_image_handle,
3587 &efi_guid_driver_binding_protocol,
3588 driver_image_handle, NULL));
3592 free(child_handle_buffer);
3596 static struct efi_boot_services efi_boot_services = {
3598 .signature = EFI_BOOT_SERVICES_SIGNATURE,
3599 .revision = EFI_SPECIFICATION_VERSION,
3600 .headersize = sizeof(struct efi_boot_services),
3602 .raise_tpl = efi_raise_tpl,
3603 .restore_tpl = efi_restore_tpl,
3604 .allocate_pages = efi_allocate_pages_ext,
3605 .free_pages = efi_free_pages_ext,
3606 .get_memory_map = efi_get_memory_map_ext,
3607 .allocate_pool = efi_allocate_pool_ext,
3608 .free_pool = efi_free_pool_ext,
3609 .create_event = efi_create_event_ext,
3610 .set_timer = efi_set_timer_ext,
3611 .wait_for_event = efi_wait_for_event,
3612 .signal_event = efi_signal_event_ext,
3613 .close_event = efi_close_event,
3614 .check_event = efi_check_event,
3615 .install_protocol_interface = efi_install_protocol_interface,
3616 .reinstall_protocol_interface = efi_reinstall_protocol_interface,
3617 .uninstall_protocol_interface = efi_uninstall_protocol_interface,
3618 .handle_protocol = efi_handle_protocol,
3620 .register_protocol_notify = efi_register_protocol_notify,
3621 .locate_handle = efi_locate_handle_ext,
3622 .locate_device_path = efi_locate_device_path,
3623 .install_configuration_table = efi_install_configuration_table_ext,
3624 .load_image = efi_load_image,
3625 .start_image = efi_start_image,
3627 .unload_image = efi_unload_image,
3628 .exit_boot_services = efi_exit_boot_services,
3629 .get_next_monotonic_count = efi_get_next_monotonic_count,
3631 .set_watchdog_timer = efi_set_watchdog_timer,
3632 .connect_controller = efi_connect_controller,
3633 .disconnect_controller = efi_disconnect_controller,
3634 .open_protocol = efi_open_protocol,
3635 .close_protocol = efi_close_protocol,
3636 .open_protocol_information = efi_open_protocol_information,
3637 .protocols_per_handle = efi_protocols_per_handle,
3638 .locate_handle_buffer = efi_locate_handle_buffer,
3639 .locate_protocol = efi_locate_protocol,
3640 .install_multiple_protocol_interfaces =
3641 efi_install_multiple_protocol_interfaces,
3642 .uninstall_multiple_protocol_interfaces =
3643 efi_uninstall_multiple_protocol_interfaces,
3644 .calculate_crc32 = efi_calculate_crc32,
3645 .copy_mem = efi_copy_mem,
3646 .set_mem = efi_set_mem,
3647 .create_event_ex = efi_create_event_ex,
3650 static u16 __efi_runtime_data firmware_vendor[] = L"Das U-Boot";
3652 struct efi_system_table __efi_runtime_data systab = {
3654 .signature = EFI_SYSTEM_TABLE_SIGNATURE,
3655 .revision = EFI_SPECIFICATION_VERSION,
3656 .headersize = sizeof(struct efi_system_table),
3658 .fw_vendor = firmware_vendor,
3659 .fw_revision = FW_VERSION << 16 | FW_PATCHLEVEL << 8,
3660 .runtime = &efi_runtime_services,
3666 * efi_initialize_system_table() - Initialize system table
3668 * Return: status code
3670 efi_status_t efi_initialize_system_table(void)
3674 /* Allocate configuration table array */
3675 ret = efi_allocate_pool(EFI_RUNTIME_SERVICES_DATA,
3676 EFI_MAX_CONFIGURATION_TABLES *
3677 sizeof(struct efi_configuration_table),
3678 (void **)&systab.tables);
3681 * These entries will be set to NULL in ExitBootServices(). To avoid
3682 * relocation in SetVirtualAddressMap(), set them dynamically.
3684 systab.con_in = &efi_con_in;
3685 systab.con_out = &efi_con_out;
3686 systab.std_err = &efi_con_out;
3687 systab.boottime = &efi_boot_services;
3689 /* Set CRC32 field in table headers */
3690 efi_update_table_header_crc32(&systab.hdr);
3691 efi_update_table_header_crc32(&efi_runtime_services.hdr);
3692 efi_update_table_header_crc32(&efi_boot_services.hdr);