]> git.ipfire.org Git - people/ms/u-boot.git/blob - lib/efi_loader/efi_boottime.c
44bcbb1455920d4a937b99b7b3189a46ed95e485
[people/ms/u-boot.git] / lib / efi_loader / efi_boottime.c
1 /*
2 * EFI application boot time services
3 *
4 * Copyright (c) 2016 Alexander Graf
5 *
6 * SPDX-License-Identifier: GPL-2.0+
7 */
8
9 #include <common.h>
10 #include <efi_loader.h>
11 #include <malloc.h>
12 #include <asm/global_data.h>
13 #include <libfdt_env.h>
14 #include <u-boot/crc.h>
15 #include <bootm.h>
16 #include <inttypes.h>
17 #include <watchdog.h>
18
19 DECLARE_GLOBAL_DATA_PTR;
20
21 /* This list contains all the EFI objects our payload has access to */
22 LIST_HEAD(efi_obj_list);
23
24 /*
25 * If we're running on nasty systems (32bit ARM booting into non-EFI Linux)
26 * we need to do trickery with caches. Since we don't want to break the EFI
27 * aware boot path, only apply hacks when loading exiting directly (breaking
28 * direct Linux EFI booting along the way - oh well).
29 */
30 static bool efi_is_direct_boot = true;
31
32 /*
33 * EFI can pass arbitrary additional "tables" containing vendor specific
34 * information to the payload. One such table is the FDT table which contains
35 * a pointer to a flattened device tree blob.
36 *
37 * In most cases we want to pass an FDT to the payload, so reserve one slot of
38 * config table space for it. The pointer gets populated by do_bootefi_exec().
39 */
40 static struct efi_configuration_table __efi_runtime_data efi_conf_table[2];
41
42 #ifdef CONFIG_ARM
43 /*
44 * The "gd" pointer lives in a register on ARM and AArch64 that we declare
45 * fixed when compiling U-Boot. However, the payload does not know about that
46 * restriction so we need to manually swap its and our view of that register on
47 * EFI callback entry/exit.
48 */
49 static volatile void *efi_gd, *app_gd;
50 #endif
51
52 /* Called from do_bootefi_exec() */
53 void efi_save_gd(void)
54 {
55 #ifdef CONFIG_ARM
56 efi_gd = gd;
57 #endif
58 }
59
60 /* Called on every callback entry */
61 void efi_restore_gd(void)
62 {
63 #ifdef CONFIG_ARM
64 /* Only restore if we're already in EFI context */
65 if (!efi_gd)
66 return;
67
68 if (gd != efi_gd)
69 app_gd = gd;
70 gd = efi_gd;
71 #endif
72 }
73
74 /* Called on every callback exit */
75 efi_status_t efi_exit_func(efi_status_t ret)
76 {
77 #ifdef CONFIG_ARM
78 gd = app_gd;
79 #endif
80
81 return ret;
82 }
83
84 static efi_status_t efi_unsupported(const char *funcname)
85 {
86 debug("EFI: App called into unimplemented function %s\n", funcname);
87 return EFI_EXIT(EFI_UNSUPPORTED);
88 }
89
90 static int guidcmp(const efi_guid_t *g1, const efi_guid_t *g2)
91 {
92 return memcmp(g1, g2, sizeof(efi_guid_t));
93 }
94
95 static unsigned long EFIAPI efi_raise_tpl(unsigned long new_tpl)
96 {
97 EFI_ENTRY("0x%lx", new_tpl);
98 return EFI_EXIT(0);
99 }
100
101 static void EFIAPI efi_restore_tpl(unsigned long old_tpl)
102 {
103 EFI_ENTRY("0x%lx", old_tpl);
104 EFI_EXIT(efi_unsupported(__func__));
105 }
106
107 efi_status_t EFIAPI efi_allocate_pages_ext(int type, int memory_type,
108 unsigned long pages,
109 uint64_t *memory)
110 {
111 efi_status_t r;
112
113 EFI_ENTRY("%d, %d, 0x%lx, %p", type, memory_type, pages, memory);
114 r = efi_allocate_pages(type, memory_type, pages, memory);
115 return EFI_EXIT(r);
116 }
117
118 efi_status_t EFIAPI efi_free_pages_ext(uint64_t memory, unsigned long pages)
119 {
120 efi_status_t r;
121
122 EFI_ENTRY("%"PRIx64", 0x%lx", memory, pages);
123 r = efi_free_pages(memory, pages);
124 return EFI_EXIT(r);
125 }
126
127 efi_status_t EFIAPI efi_get_memory_map_ext(unsigned long *memory_map_size,
128 struct efi_mem_desc *memory_map,
129 unsigned long *map_key,
130 unsigned long *descriptor_size,
131 uint32_t *descriptor_version)
132 {
133 efi_status_t r;
134
135 EFI_ENTRY("%p, %p, %p, %p, %p", memory_map_size, memory_map,
136 map_key, descriptor_size, descriptor_version);
137 r = efi_get_memory_map(memory_map_size, memory_map, map_key,
138 descriptor_size, descriptor_version);
139 return EFI_EXIT(r);
140 }
141
142 static efi_status_t EFIAPI efi_allocate_pool_ext(int pool_type,
143 unsigned long size,
144 void **buffer)
145 {
146 efi_status_t r;
147
148 EFI_ENTRY("%d, %ld, %p", pool_type, size, buffer);
149 r = efi_allocate_pool(pool_type, size, buffer);
150 return EFI_EXIT(r);
151 }
152
153 static efi_status_t EFIAPI efi_free_pool_ext(void *buffer)
154 {
155 efi_status_t r;
156
157 EFI_ENTRY("%p", buffer);
158 r = efi_free_pool(buffer);
159 return EFI_EXIT(r);
160 }
161
162 /*
163 * Our event capabilities are very limited. Only support a single
164 * event to exist, so we don't need to maintain lists.
165 */
166 static struct {
167 enum efi_event_type type;
168 u32 trigger_type;
169 u32 trigger_time;
170 u64 trigger_next;
171 unsigned long notify_tpl;
172 void (EFIAPI *notify_function) (void *event, void *context);
173 void *notify_context;
174 } efi_event = {
175 /* Disable timers on bootup */
176 .trigger_next = -1ULL,
177 };
178
179 static efi_status_t EFIAPI efi_create_event(
180 enum efi_event_type type, ulong notify_tpl,
181 void (EFIAPI *notify_function) (void *event,
182 void *context),
183 void *notify_context, void **event)
184 {
185 EFI_ENTRY("%d, 0x%lx, %p, %p", type, notify_tpl, notify_function,
186 notify_context);
187 if (efi_event.notify_function) {
188 /* We only support one event at a time */
189 return EFI_EXIT(EFI_OUT_OF_RESOURCES);
190 }
191
192 if (event == NULL)
193 return EFI_EXIT(EFI_INVALID_PARAMETER);
194
195 if ((type & EVT_NOTIFY_SIGNAL) && (type & EVT_NOTIFY_WAIT))
196 return EFI_EXIT(EFI_INVALID_PARAMETER);
197
198 if ((type & (EVT_NOTIFY_SIGNAL|EVT_NOTIFY_WAIT)) &&
199 notify_function == NULL)
200 return EFI_EXIT(EFI_INVALID_PARAMETER);
201
202 efi_event.type = type;
203 efi_event.notify_tpl = notify_tpl;
204 efi_event.notify_function = notify_function;
205 efi_event.notify_context = notify_context;
206 *event = &efi_event;
207
208 return EFI_EXIT(EFI_SUCCESS);
209 }
210
211 /*
212 * Our timers have to work without interrupts, so we check whenever keyboard
213 * input or disk accesses happen if enough time elapsed for it to fire.
214 */
215 void efi_timer_check(void)
216 {
217 u64 now = timer_get_us();
218
219 if (now >= efi_event.trigger_next) {
220 /* Triggering! */
221 if (efi_event.trigger_type == EFI_TIMER_PERIODIC)
222 efi_event.trigger_next += efi_event.trigger_time / 10;
223 if (efi_event.type & (EVT_NOTIFY_WAIT | EVT_NOTIFY_SIGNAL))
224 efi_event.notify_function(&efi_event,
225 efi_event.notify_context);
226 }
227
228 WATCHDOG_RESET();
229 }
230
231 static efi_status_t EFIAPI efi_set_timer(void *event, int type,
232 uint64_t trigger_time)
233 {
234 /* We don't have 64bit division available everywhere, so limit timer
235 * distances to 32bit bits. */
236 u32 trigger32 = trigger_time;
237
238 EFI_ENTRY("%p, %d, %"PRIx64, event, type, trigger_time);
239
240 if (trigger32 < trigger_time) {
241 printf("WARNING: Truncating timer from %"PRIx64" to %x\n",
242 trigger_time, trigger32);
243 }
244
245 if (event != &efi_event) {
246 /* We only support one event at a time */
247 return EFI_EXIT(EFI_INVALID_PARAMETER);
248 }
249
250 switch (type) {
251 case EFI_TIMER_STOP:
252 efi_event.trigger_next = -1ULL;
253 break;
254 case EFI_TIMER_PERIODIC:
255 case EFI_TIMER_RELATIVE:
256 efi_event.trigger_next = timer_get_us() + (trigger32 / 10);
257 break;
258 default:
259 return EFI_EXIT(EFI_INVALID_PARAMETER);
260 }
261 efi_event.trigger_type = type;
262 efi_event.trigger_time = trigger_time;
263
264 return EFI_EXIT(EFI_SUCCESS);
265 }
266
267 static efi_status_t EFIAPI efi_wait_for_event(unsigned long num_events,
268 void *event, unsigned long *index)
269 {
270 u64 now;
271
272 EFI_ENTRY("%ld, %p, %p", num_events, event, index);
273
274 now = timer_get_us();
275 while (now < efi_event.trigger_next) { }
276 efi_timer_check();
277
278 return EFI_EXIT(EFI_SUCCESS);
279 }
280
281 static efi_status_t EFIAPI efi_signal_event(void *event)
282 {
283 EFI_ENTRY("%p", event);
284 return EFI_EXIT(EFI_SUCCESS);
285 }
286
287 static efi_status_t EFIAPI efi_close_event(void *event)
288 {
289 EFI_ENTRY("%p", event);
290 efi_event.trigger_next = -1ULL;
291 return EFI_EXIT(EFI_SUCCESS);
292 }
293
294 static efi_status_t EFIAPI efi_check_event(void *event)
295 {
296 EFI_ENTRY("%p", event);
297 return EFI_EXIT(EFI_NOT_READY);
298 }
299
300 static efi_status_t EFIAPI efi_install_protocol_interface(void **handle,
301 efi_guid_t *protocol, int protocol_interface_type,
302 void *protocol_interface)
303 {
304 EFI_ENTRY("%p, %p, %d, %p", handle, protocol, protocol_interface_type,
305 protocol_interface);
306 return EFI_EXIT(EFI_OUT_OF_RESOURCES);
307 }
308 static efi_status_t EFIAPI efi_reinstall_protocol_interface(void *handle,
309 efi_guid_t *protocol, void *old_interface,
310 void *new_interface)
311 {
312 EFI_ENTRY("%p, %p, %p, %p", handle, protocol, old_interface,
313 new_interface);
314 return EFI_EXIT(EFI_ACCESS_DENIED);
315 }
316
317 static efi_status_t EFIAPI efi_uninstall_protocol_interface(void *handle,
318 efi_guid_t *protocol, void *protocol_interface)
319 {
320 EFI_ENTRY("%p, %p, %p", handle, protocol, protocol_interface);
321 return EFI_EXIT(EFI_NOT_FOUND);
322 }
323
324 static efi_status_t EFIAPI efi_register_protocol_notify(efi_guid_t *protocol,
325 void *event,
326 void **registration)
327 {
328 EFI_ENTRY("%p, %p, %p", protocol, event, registration);
329 return EFI_EXIT(EFI_OUT_OF_RESOURCES);
330 }
331
332 static int efi_search(enum efi_locate_search_type search_type,
333 efi_guid_t *protocol, void *search_key,
334 struct efi_object *efiobj)
335 {
336 int i;
337
338 switch (search_type) {
339 case all_handles:
340 return 0;
341 case by_register_notify:
342 return -1;
343 case by_protocol:
344 for (i = 0; i < ARRAY_SIZE(efiobj->protocols); i++) {
345 const efi_guid_t *guid = efiobj->protocols[i].guid;
346 if (guid && !guidcmp(guid, protocol))
347 return 0;
348 }
349 return -1;
350 }
351
352 return -1;
353 }
354
355 static efi_status_t EFIAPI efi_locate_handle(
356 enum efi_locate_search_type search_type,
357 efi_guid_t *protocol, void *search_key,
358 unsigned long *buffer_size, efi_handle_t *buffer)
359 {
360 struct list_head *lhandle;
361 unsigned long size = 0;
362
363 EFI_ENTRY("%d, %p, %p, %p, %p", search_type, protocol, search_key,
364 buffer_size, buffer);
365
366 /* Count how much space we need */
367 list_for_each(lhandle, &efi_obj_list) {
368 struct efi_object *efiobj;
369 efiobj = list_entry(lhandle, struct efi_object, link);
370 if (!efi_search(search_type, protocol, search_key, efiobj)) {
371 size += sizeof(void*);
372 }
373 }
374
375 if (*buffer_size < size) {
376 *buffer_size = size;
377 return EFI_EXIT(EFI_BUFFER_TOO_SMALL);
378 }
379
380 /* Then fill the array */
381 list_for_each(lhandle, &efi_obj_list) {
382 struct efi_object *efiobj;
383 efiobj = list_entry(lhandle, struct efi_object, link);
384 if (!efi_search(search_type, protocol, search_key, efiobj)) {
385 *(buffer++) = efiobj->handle;
386 }
387 }
388
389 *buffer_size = size;
390 return EFI_EXIT(EFI_SUCCESS);
391 }
392
393 static efi_status_t EFIAPI efi_locate_device_path(efi_guid_t *protocol,
394 struct efi_device_path **device_path,
395 efi_handle_t *device)
396 {
397 EFI_ENTRY("%p, %p, %p", protocol, device_path, device);
398 return EFI_EXIT(EFI_NOT_FOUND);
399 }
400
401 efi_status_t efi_install_configuration_table(const efi_guid_t *guid, void *table)
402 {
403 int i;
404
405 /* Check for guid override */
406 for (i = 0; i < systab.nr_tables; i++) {
407 if (!guidcmp(guid, &efi_conf_table[i].guid)) {
408 efi_conf_table[i].table = table;
409 return EFI_SUCCESS;
410 }
411 }
412
413 /* No override, check for overflow */
414 if (i >= ARRAY_SIZE(efi_conf_table))
415 return EFI_OUT_OF_RESOURCES;
416
417 /* Add a new entry */
418 memcpy(&efi_conf_table[i].guid, guid, sizeof(*guid));
419 efi_conf_table[i].table = table;
420 systab.nr_tables = i + 1;
421
422 return EFI_SUCCESS;
423 }
424
425 static efi_status_t EFIAPI efi_install_configuration_table_ext(efi_guid_t *guid,
426 void *table)
427 {
428 EFI_ENTRY("%p, %p", guid, table);
429 return EFI_EXIT(efi_install_configuration_table(guid, table));
430 }
431
432 static efi_status_t EFIAPI efi_load_image(bool boot_policy,
433 efi_handle_t parent_image,
434 struct efi_device_path *file_path,
435 void *source_buffer,
436 unsigned long source_size,
437 efi_handle_t *image_handle)
438 {
439 static struct efi_object loaded_image_info_obj = {
440 .protocols = {
441 {
442 .guid = &efi_guid_loaded_image,
443 .open = &efi_return_handle,
444 },
445 },
446 };
447 struct efi_loaded_image *info;
448 struct efi_object *obj;
449
450 EFI_ENTRY("%d, %p, %p, %p, %ld, %p", boot_policy, parent_image,
451 file_path, source_buffer, source_size, image_handle);
452 info = malloc(sizeof(*info));
453 obj = malloc(sizeof(loaded_image_info_obj));
454 memset(info, 0, sizeof(*info));
455 memcpy(obj, &loaded_image_info_obj, sizeof(loaded_image_info_obj));
456 obj->handle = info;
457 info->file_path = file_path;
458 info->reserved = efi_load_pe(source_buffer, info);
459 if (!info->reserved) {
460 free(info);
461 free(obj);
462 return EFI_EXIT(EFI_UNSUPPORTED);
463 }
464
465 *image_handle = info;
466 list_add_tail(&obj->link, &efi_obj_list);
467
468 return EFI_EXIT(EFI_SUCCESS);
469 }
470
471 static efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle,
472 unsigned long *exit_data_size,
473 s16 **exit_data)
474 {
475 ulong (*entry)(void *image_handle, struct efi_system_table *st);
476 struct efi_loaded_image *info = image_handle;
477
478 EFI_ENTRY("%p, %p, %p", image_handle, exit_data_size, exit_data);
479 entry = info->reserved;
480
481 efi_is_direct_boot = false;
482
483 /* call the image! */
484 if (setjmp(&info->exit_jmp)) {
485 /* We returned from the child image */
486 return EFI_EXIT(info->exit_status);
487 }
488
489 entry(image_handle, &systab);
490
491 /* Should usually never get here */
492 return EFI_EXIT(EFI_SUCCESS);
493 }
494
495 static efi_status_t EFIAPI efi_exit(efi_handle_t image_handle,
496 efi_status_t exit_status, unsigned long exit_data_size,
497 int16_t *exit_data)
498 {
499 struct efi_loaded_image *loaded_image_info = (void*)image_handle;
500
501 EFI_ENTRY("%p, %ld, %ld, %p", image_handle, exit_status,
502 exit_data_size, exit_data);
503
504 loaded_image_info->exit_status = exit_status;
505 longjmp(&loaded_image_info->exit_jmp, 1);
506
507 panic("EFI application exited");
508 }
509
510 static struct efi_object *efi_search_obj(void *handle)
511 {
512 struct list_head *lhandle;
513
514 list_for_each(lhandle, &efi_obj_list) {
515 struct efi_object *efiobj;
516 efiobj = list_entry(lhandle, struct efi_object, link);
517 if (efiobj->handle == handle)
518 return efiobj;
519 }
520
521 return NULL;
522 }
523
524 static efi_status_t EFIAPI efi_unload_image(void *image_handle)
525 {
526 struct efi_object *efiobj;
527
528 EFI_ENTRY("%p", image_handle);
529 efiobj = efi_search_obj(image_handle);
530 if (efiobj)
531 list_del(&efiobj->link);
532
533 return EFI_EXIT(EFI_SUCCESS);
534 }
535
536 static void efi_exit_caches(void)
537 {
538 #if defined(CONFIG_ARM) && !defined(CONFIG_ARM64)
539 /*
540 * Grub on 32bit ARM needs to have caches disabled before jumping into
541 * a zImage, but does not know of all cache layers. Give it a hand.
542 */
543 if (efi_is_direct_boot)
544 cleanup_before_linux();
545 #endif
546 }
547
548 static efi_status_t EFIAPI efi_exit_boot_services(void *image_handle,
549 unsigned long map_key)
550 {
551 EFI_ENTRY("%p, %ld", image_handle, map_key);
552
553 board_quiesce_devices();
554
555 /* Fix up caches for EFI payloads if necessary */
556 efi_exit_caches();
557
558 /* This stops all lingering devices */
559 bootm_disable_interrupts();
560
561 /* Give the payload some time to boot */
562 WATCHDOG_RESET();
563
564 return EFI_EXIT(EFI_SUCCESS);
565 }
566
567 static efi_status_t EFIAPI efi_get_next_monotonic_count(uint64_t *count)
568 {
569 static uint64_t mono = 0;
570 EFI_ENTRY("%p", count);
571 *count = mono++;
572 return EFI_EXIT(EFI_SUCCESS);
573 }
574
575 static efi_status_t EFIAPI efi_stall(unsigned long microseconds)
576 {
577 EFI_ENTRY("%ld", microseconds);
578 udelay(microseconds);
579 return EFI_EXIT(EFI_SUCCESS);
580 }
581
582 static efi_status_t EFIAPI efi_set_watchdog_timer(unsigned long timeout,
583 uint64_t watchdog_code,
584 unsigned long data_size,
585 uint16_t *watchdog_data)
586 {
587 EFI_ENTRY("%ld, 0x%"PRIx64", %ld, %p", timeout, watchdog_code,
588 data_size, watchdog_data);
589 return EFI_EXIT(efi_unsupported(__func__));
590 }
591
592 static efi_status_t EFIAPI efi_connect_controller(
593 efi_handle_t controller_handle,
594 efi_handle_t *driver_image_handle,
595 struct efi_device_path *remain_device_path,
596 bool recursive)
597 {
598 EFI_ENTRY("%p, %p, %p, %d", controller_handle, driver_image_handle,
599 remain_device_path, recursive);
600 return EFI_EXIT(EFI_NOT_FOUND);
601 }
602
603 static efi_status_t EFIAPI efi_disconnect_controller(void *controller_handle,
604 void *driver_image_handle,
605 void *child_handle)
606 {
607 EFI_ENTRY("%p, %p, %p", controller_handle, driver_image_handle,
608 child_handle);
609 return EFI_EXIT(EFI_INVALID_PARAMETER);
610 }
611
612 static efi_status_t EFIAPI efi_close_protocol(void *handle,
613 efi_guid_t *protocol,
614 void *agent_handle,
615 void *controller_handle)
616 {
617 EFI_ENTRY("%p, %p, %p, %p", handle, protocol, agent_handle,
618 controller_handle);
619 return EFI_EXIT(EFI_NOT_FOUND);
620 }
621
622 static efi_status_t EFIAPI efi_open_protocol_information(efi_handle_t handle,
623 efi_guid_t *protocol,
624 struct efi_open_protocol_info_entry **entry_buffer,
625 unsigned long *entry_count)
626 {
627 EFI_ENTRY("%p, %p, %p, %p", handle, protocol, entry_buffer,
628 entry_count);
629 return EFI_EXIT(EFI_NOT_FOUND);
630 }
631
632 static efi_status_t EFIAPI efi_protocols_per_handle(void *handle,
633 efi_guid_t ***protocol_buffer,
634 unsigned long *protocol_buffer_count)
635 {
636 EFI_ENTRY("%p, %p, %p", handle, protocol_buffer,
637 protocol_buffer_count);
638 return EFI_EXIT(EFI_OUT_OF_RESOURCES);
639 }
640
641 static efi_status_t EFIAPI efi_locate_handle_buffer(
642 enum efi_locate_search_type search_type,
643 efi_guid_t *protocol, void *search_key,
644 unsigned long *no_handles, efi_handle_t **buffer)
645 {
646 EFI_ENTRY("%d, %p, %p, %p, %p", search_type, protocol, search_key,
647 no_handles, buffer);
648 return EFI_EXIT(EFI_NOT_FOUND);
649 }
650
651 static struct efi_class_map efi_class_maps[] = {
652 {
653 .guid = &efi_guid_console_control,
654 .interface = &efi_console_control
655 },
656 };
657
658 static efi_status_t EFIAPI efi_locate_protocol(efi_guid_t *protocol,
659 void *registration,
660 void **protocol_interface)
661 {
662 int i;
663
664 EFI_ENTRY("%p, %p, %p", protocol, registration, protocol_interface);
665 for (i = 0; i < ARRAY_SIZE(efi_class_maps); i++) {
666 struct efi_class_map *curmap = &efi_class_maps[i];
667 if (!guidcmp(protocol, curmap->guid)) {
668 *protocol_interface = (void*)curmap->interface;
669 return EFI_EXIT(EFI_SUCCESS);
670 }
671 }
672
673 return EFI_EXIT(EFI_NOT_FOUND);
674 }
675
676 static efi_status_t EFIAPI efi_install_multiple_protocol_interfaces(
677 void **handle, ...)
678 {
679 EFI_ENTRY("%p", handle);
680 return EFI_EXIT(EFI_OUT_OF_RESOURCES);
681 }
682
683 static efi_status_t EFIAPI efi_uninstall_multiple_protocol_interfaces(
684 void *handle, ...)
685 {
686 EFI_ENTRY("%p", handle);
687 return EFI_EXIT(EFI_INVALID_PARAMETER);
688 }
689
690 static efi_status_t EFIAPI efi_calculate_crc32(void *data,
691 unsigned long data_size,
692 uint32_t *crc32_p)
693 {
694 EFI_ENTRY("%p, %ld", data, data_size);
695 *crc32_p = crc32(0, data, data_size);
696 return EFI_EXIT(EFI_SUCCESS);
697 }
698
699 static void EFIAPI efi_copy_mem(void *destination, void *source,
700 unsigned long length)
701 {
702 EFI_ENTRY("%p, %p, %ld", destination, source, length);
703 memcpy(destination, source, length);
704 }
705
706 static void EFIAPI efi_set_mem(void *buffer, unsigned long size, uint8_t value)
707 {
708 EFI_ENTRY("%p, %ld, 0x%x", buffer, size, value);
709 memset(buffer, value, size);
710 }
711
712 static efi_status_t EFIAPI efi_open_protocol(
713 void *handle, efi_guid_t *protocol,
714 void **protocol_interface, void *agent_handle,
715 void *controller_handle, uint32_t attributes)
716 {
717 struct list_head *lhandle;
718 int i;
719 efi_status_t r = EFI_UNSUPPORTED;
720
721 EFI_ENTRY("%p, %p, %p, %p, %p, 0x%x", handle, protocol,
722 protocol_interface, agent_handle, controller_handle,
723 attributes);
724 list_for_each(lhandle, &efi_obj_list) {
725 struct efi_object *efiobj;
726 efiobj = list_entry(lhandle, struct efi_object, link);
727
728 if (efiobj->handle != handle)
729 continue;
730
731 for (i = 0; i < ARRAY_SIZE(efiobj->protocols); i++) {
732 struct efi_handler *handler = &efiobj->protocols[i];
733 const efi_guid_t *hprotocol = handler->guid;
734 if (!hprotocol)
735 break;
736 if (!guidcmp(hprotocol, protocol)) {
737 r = handler->open(handle, protocol,
738 protocol_interface, agent_handle,
739 controller_handle, attributes);
740 goto out;
741 }
742 }
743 }
744
745 out:
746 return EFI_EXIT(r);
747 }
748
749 static efi_status_t EFIAPI efi_handle_protocol(void *handle,
750 efi_guid_t *protocol,
751 void **protocol_interface)
752 {
753 return efi_open_protocol(handle, protocol, protocol_interface,
754 NULL, NULL, 0);
755 }
756
757 static const struct efi_boot_services efi_boot_services = {
758 .hdr = {
759 .headersize = sizeof(struct efi_table_hdr),
760 },
761 .raise_tpl = efi_raise_tpl,
762 .restore_tpl = efi_restore_tpl,
763 .allocate_pages = efi_allocate_pages_ext,
764 .free_pages = efi_free_pages_ext,
765 .get_memory_map = efi_get_memory_map_ext,
766 .allocate_pool = efi_allocate_pool_ext,
767 .free_pool = efi_free_pool_ext,
768 .create_event = efi_create_event,
769 .set_timer = efi_set_timer,
770 .wait_for_event = efi_wait_for_event,
771 .signal_event = efi_signal_event,
772 .close_event = efi_close_event,
773 .check_event = efi_check_event,
774 .install_protocol_interface = efi_install_protocol_interface,
775 .reinstall_protocol_interface = efi_reinstall_protocol_interface,
776 .uninstall_protocol_interface = efi_uninstall_protocol_interface,
777 .handle_protocol = efi_handle_protocol,
778 .reserved = NULL,
779 .register_protocol_notify = efi_register_protocol_notify,
780 .locate_handle = efi_locate_handle,
781 .locate_device_path = efi_locate_device_path,
782 .install_configuration_table = efi_install_configuration_table_ext,
783 .load_image = efi_load_image,
784 .start_image = efi_start_image,
785 .exit = efi_exit,
786 .unload_image = efi_unload_image,
787 .exit_boot_services = efi_exit_boot_services,
788 .get_next_monotonic_count = efi_get_next_monotonic_count,
789 .stall = efi_stall,
790 .set_watchdog_timer = efi_set_watchdog_timer,
791 .connect_controller = efi_connect_controller,
792 .disconnect_controller = efi_disconnect_controller,
793 .open_protocol = efi_open_protocol,
794 .close_protocol = efi_close_protocol,
795 .open_protocol_information = efi_open_protocol_information,
796 .protocols_per_handle = efi_protocols_per_handle,
797 .locate_handle_buffer = efi_locate_handle_buffer,
798 .locate_protocol = efi_locate_protocol,
799 .install_multiple_protocol_interfaces = efi_install_multiple_protocol_interfaces,
800 .uninstall_multiple_protocol_interfaces = efi_uninstall_multiple_protocol_interfaces,
801 .calculate_crc32 = efi_calculate_crc32,
802 .copy_mem = efi_copy_mem,
803 .set_mem = efi_set_mem,
804 };
805
806
807 static uint16_t __efi_runtime_data firmware_vendor[] =
808 { 'D','a','s',' ','U','-','b','o','o','t',0 };
809
810 struct efi_system_table __efi_runtime_data systab = {
811 .hdr = {
812 .signature = EFI_SYSTEM_TABLE_SIGNATURE,
813 .revision = 0x20005, /* 2.5 */
814 .headersize = sizeof(struct efi_table_hdr),
815 },
816 .fw_vendor = (long)firmware_vendor,
817 .con_in = (void*)&efi_con_in,
818 .con_out = (void*)&efi_con_out,
819 .std_err = (void*)&efi_con_out,
820 .runtime = (void*)&efi_runtime_services,
821 .boottime = (void*)&efi_boot_services,
822 .nr_tables = 0,
823 .tables = (void*)efi_conf_table,
824 };