]> git.ipfire.org Git - thirdparty/u-boot.git/blame - lib/efi_loader/efi_boottime.c
efi_loader: CloseProtocol() requires valid agent handle
[thirdparty/u-boot.git] / lib / efi_loader / efi_boottime.c
CommitLineData
f739fcd8 1// SPDX-License-Identifier: GPL-2.0+
bee91169
AG
2/*
3 * EFI application boot time services
4 *
5 * Copyright (c) 2016 Alexander Graf
bee91169
AG
6 */
7
bee91169 8#include <common.h>
7d963323 9#include <div64.h>
bee91169 10#include <efi_loader.h>
ad644e7c 11#include <environment.h>
bee91169 12#include <malloc.h>
b08c8c48 13#include <linux/libfdt_env.h>
bee91169
AG
14#include <u-boot/crc.h>
15#include <bootm.h>
126a43f1 16#include <pe.h>
bee91169
AG
17#include <watchdog.h>
18
19DECLARE_GLOBAL_DATA_PTR;
20
32f4b2f8 21/* Task priority level */
152cade3 22static efi_uintn_t efi_tpl = TPL_APPLICATION;
32f4b2f8 23
bee91169
AG
24/* This list contains all the EFI objects our payload has access to */
25LIST_HEAD(efi_obj_list);
26
43bce442 27/* List of all events */
b095f3c8 28LIST_HEAD(efi_events);
43bce442 29
ab15d414
HS
30/* List of all events registered by RegisterProtocolNotify() */
31LIST_HEAD(efi_register_notify_events);
32
bb31c3f7
HS
33/* Handle of the currently executing image */
34static efi_handle_t current_image;
35
f31239ac
AG
36/*
37 * If we're running on nasty systems (32bit ARM booting into non-EFI Linux)
38 * we need to do trickery with caches. Since we don't want to break the EFI
39 * aware boot path, only apply hacks when loading exiting directly (breaking
40 * direct Linux EFI booting along the way - oh well).
41 */
42static bool efi_is_direct_boot = true;
43
65e4c0b1 44#ifdef CONFIG_ARM
bee91169
AG
45/*
46 * The "gd" pointer lives in a register on ARM and AArch64 that we declare
47 * fixed when compiling U-Boot. However, the payload does not know about that
48 * restriction so we need to manually swap its and our view of that register on
49 * EFI callback entry/exit.
50 */
51static volatile void *efi_gd, *app_gd;
65e4c0b1 52#endif
bee91169 53
914df75b
HS
54/* 1 if inside U-Boot code, 0 if inside EFI payload code */
55static int entry_count = 1;
af65db85 56static int nesting_level;
bc4f9133
HS
57/* GUID of the device tree table */
58const efi_guid_t efi_guid_fdt = EFI_FDT_GUID;
f0959dbe
HS
59/* GUID of the EFI_DRIVER_BINDING_PROTOCOL */
60const efi_guid_t efi_guid_driver_binding_protocol =
61 EFI_DRIVER_BINDING_PROTOCOL_GUID;
c160d2f5 62
a3a28f5f
HS
63/* event group ExitBootServices() invoked */
64const efi_guid_t efi_guid_event_group_exit_boot_services =
65 EFI_EVENT_GROUP_EXIT_BOOT_SERVICES;
66/* event group SetVirtualAddressMap() invoked */
67const efi_guid_t efi_guid_event_group_virtual_address_change =
68 EFI_EVENT_GROUP_VIRTUAL_ADDRESS_CHANGE;
69/* event group memory map changed */
70const efi_guid_t efi_guid_event_group_memory_map_change =
71 EFI_EVENT_GROUP_MEMORY_MAP_CHANGE;
72/* event group boot manager about to boot */
73const efi_guid_t efi_guid_event_group_ready_to_boot =
74 EFI_EVENT_GROUP_READY_TO_BOOT;
75/* event group ResetSystem() invoked (before ExitBootServices) */
76const efi_guid_t efi_guid_event_group_reset_system =
77 EFI_EVENT_GROUP_RESET_SYSTEM;
78
2074f700
HS
79static efi_status_t EFIAPI efi_disconnect_controller(
80 efi_handle_t controller_handle,
81 efi_handle_t driver_image_handle,
82 efi_handle_t child_handle);
3f9b0042 83
c160d2f5
RC
84/* Called on every callback entry */
85int __efi_entry_check(void)
86{
87 int ret = entry_count++ == 0;
88#ifdef CONFIG_ARM
89 assert(efi_gd);
90 app_gd = gd;
91 gd = efi_gd;
92#endif
93 return ret;
94}
95
96/* Called on every callback exit */
97int __efi_exit_check(void)
98{
99 int ret = --entry_count == 0;
100#ifdef CONFIG_ARM
101 gd = app_gd;
102#endif
103 return ret;
104}
105
bee91169
AG
106/* Called from do_bootefi_exec() */
107void efi_save_gd(void)
108{
65e4c0b1 109#ifdef CONFIG_ARM
bee91169 110 efi_gd = gd;
65e4c0b1 111#endif
bee91169
AG
112}
113
c160d2f5 114/*
78a88f79 115 * Special case handler for error/abort that just forces things back to u-boot
b72aaa87
HS
116 * world so we can dump out an abort message, without any care about returning
117 * back to UEFI world.
c160d2f5 118 */
bee91169
AG
119void efi_restore_gd(void)
120{
65e4c0b1 121#ifdef CONFIG_ARM
bee91169
AG
122 /* Only restore if we're already in EFI context */
123 if (!efi_gd)
124 return;
bee91169 125 gd = efi_gd;
65e4c0b1 126#endif
bee91169
AG
127}
128
6b03cd10 129/**
78a88f79
MS
130 * indent_string() - returns a string for indenting with two spaces per level
131 * @level: indent level
6b03cd10
HS
132 *
133 * A maximum of ten indent levels is supported. Higher indent levels will be
134 * truncated.
c8df80c5 135 *
78a88f79
MS
136 * Return: A string for indenting with two spaces per level is
137 * returned.
af65db85
RC
138 */
139static const char *indent_string(int level)
140{
141 const char *indent = " ";
142 const int max = strlen(indent);
ab9efa97 143
af65db85
RC
144 level = min(max, level * 2);
145 return &indent[max - level];
146}
147
ae0bd3a9
HS
148const char *__efi_nesting(void)
149{
150 return indent_string(nesting_level);
151}
152
af65db85
RC
153const char *__efi_nesting_inc(void)
154{
155 return indent_string(nesting_level++);
156}
157
158const char *__efi_nesting_dec(void)
159{
160 return indent_string(--nesting_level);
161}
162
6b03cd10 163/**
78a88f79
MS
164 * efi_queue_event() - queue an EFI event
165 * @event: event to signal
166 * @check_tpl: check the TPL level
332468f7
HS
167 *
168 * This function queues the notification function of the event for future
169 * execution.
170 *
78a88f79
MS
171 * The notification function is called if the task priority level of the event
172 * is higher than the current task priority level.
332468f7
HS
173 *
174 * For the SignalEvent service see efi_signal_event_ext.
175 *
332468f7 176 */
b095f3c8 177static void efi_queue_event(struct efi_event *event, bool check_tpl)
c6841592 178{
ca62a4f5 179 if (event->notify_function) {
e190e897 180 event->is_queued = true;
32f4b2f8 181 /* Check TPL */
9bc9664d 182 if (check_tpl && efi_tpl >= event->notify_tpl)
32f4b2f8 183 return;
ea630ce9
HS
184 EFI_CALL_VOID(event->notify_function(event,
185 event->notify_context));
c6841592 186 }
e190e897 187 event->is_queued = false;
c6841592
HS
188}
189
21b3edfc
HS
190/**
191 * is_valid_tpl() - check if the task priority level is valid
192 *
193 * @tpl: TPL level to check
b72aaa87 194 * Return: status code
21b3edfc
HS
195 */
196efi_status_t is_valid_tpl(efi_uintn_t tpl)
197{
198 switch (tpl) {
199 case TPL_APPLICATION:
200 case TPL_CALLBACK:
201 case TPL_NOTIFY:
202 case TPL_HIGH_LEVEL:
203 return EFI_SUCCESS;
204 default:
205 return EFI_INVALID_PARAMETER;
206 }
207}
208
6b03cd10 209/**
78a88f79
MS
210 * efi_signal_event() - signal an EFI event
211 * @event: event to signal
212 * @check_tpl: check the TPL level
b095f3c8 213 *
78a88f79
MS
214 * This function signals an event. If the event belongs to an event group all
215 * events of the group are signaled. If they are of type EVT_NOTIFY_SIGNAL
b095f3c8
HS
216 * their notification function is queued.
217 *
218 * For the SignalEvent service see efi_signal_event_ext.
b095f3c8
HS
219 */
220void efi_signal_event(struct efi_event *event, bool check_tpl)
221{
222 if (event->group) {
223 struct efi_event *evt;
224
225 /*
226 * The signaled state has to set before executing any
227 * notification function
228 */
229 list_for_each_entry(evt, &efi_events, link) {
230 if (!evt->group || guidcmp(evt->group, event->group))
231 continue;
232 if (evt->is_signaled)
233 continue;
234 evt->is_signaled = true;
235 if (evt->type & EVT_NOTIFY_SIGNAL &&
236 evt->notify_function)
237 evt->is_queued = true;
238 }
239 list_for_each_entry(evt, &efi_events, link) {
240 if (!evt->group || guidcmp(evt->group, event->group))
241 continue;
242 if (evt->is_queued)
243 efi_queue_event(evt, check_tpl);
244 }
3626e539 245 } else {
b095f3c8
HS
246 event->is_signaled = true;
247 if (event->type & EVT_NOTIFY_SIGNAL)
248 efi_queue_event(event, check_tpl);
249 }
250}
251
6b03cd10 252/**
78a88f79
MS
253 * efi_raise_tpl() - raise the task priority level
254 * @new_tpl: new value of the task priority level
332468f7
HS
255 *
256 * This function implements the RaiseTpl service.
332468f7 257 *
78a88f79
MS
258 * See the Unified Extensible Firmware Interface (UEFI) specification for
259 * details.
260 *
261 * Return: old value of the task priority level
332468f7 262 */
152cade3 263static unsigned long EFIAPI efi_raise_tpl(efi_uintn_t new_tpl)
bee91169 264{
152cade3 265 efi_uintn_t old_tpl = efi_tpl;
32f4b2f8 266
503f2695 267 EFI_ENTRY("0x%zx", new_tpl);
32f4b2f8
HS
268
269 if (new_tpl < efi_tpl)
270 debug("WARNING: new_tpl < current_tpl in %s\n", __func__);
271 efi_tpl = new_tpl;
272 if (efi_tpl > TPL_HIGH_LEVEL)
273 efi_tpl = TPL_HIGH_LEVEL;
274
275 EFI_EXIT(EFI_SUCCESS);
276 return old_tpl;
bee91169
AG
277}
278
6b03cd10 279/**
78a88f79
MS
280 * efi_restore_tpl() - lower the task priority level
281 * @old_tpl: value of the task priority level to be restored
332468f7
HS
282 *
283 * This function implements the RestoreTpl service.
332468f7 284 *
78a88f79
MS
285 * See the Unified Extensible Firmware Interface (UEFI) specification for
286 * details.
332468f7 287 */
152cade3 288static void EFIAPI efi_restore_tpl(efi_uintn_t old_tpl)
bee91169 289{
503f2695 290 EFI_ENTRY("0x%zx", old_tpl);
32f4b2f8
HS
291
292 if (old_tpl > efi_tpl)
293 debug("WARNING: old_tpl > current_tpl in %s\n", __func__);
294 efi_tpl = old_tpl;
295 if (efi_tpl > TPL_HIGH_LEVEL)
296 efi_tpl = TPL_HIGH_LEVEL;
297
0f7fcc72
HS
298 /*
299 * Lowering the TPL may have made queued events eligible for execution.
300 */
301 efi_timer_check();
302
32f4b2f8 303 EFI_EXIT(EFI_SUCCESS);
bee91169
AG
304}
305
6b03cd10 306/**
78a88f79
MS
307 * efi_allocate_pages_ext() - allocate memory pages
308 * @type: type of allocation to be performed
309 * @memory_type: usage type of the allocated memory
310 * @pages: number of pages to be allocated
311 * @memory: allocated memory
332468f7
HS
312 *
313 * This function implements the AllocatePages service.
332468f7 314 *
78a88f79
MS
315 * See the Unified Extensible Firmware Interface (UEFI) specification for
316 * details.
317 *
318 * Return: status code
332468f7 319 */
6e0bf8d8 320static efi_status_t EFIAPI efi_allocate_pages_ext(int type, int memory_type,
f5a2a938 321 efi_uintn_t pages,
6e0bf8d8 322 uint64_t *memory)
bee91169
AG
323{
324 efi_status_t r;
325
f5a2a938 326 EFI_ENTRY("%d, %d, 0x%zx, %p", type, memory_type, pages, memory);
bee91169
AG
327 r = efi_allocate_pages(type, memory_type, pages, memory);
328 return EFI_EXIT(r);
329}
330
6b03cd10 331/**
78a88f79
MS
332 * efi_free_pages_ext() - Free memory pages.
333 * @memory: start of the memory area to be freed
334 * @pages: number of pages to be freed
332468f7
HS
335 *
336 * This function implements the FreePages service.
332468f7 337 *
78a88f79
MS
338 * See the Unified Extensible Firmware Interface (UEFI) specification for
339 * details.
340 *
341 * Return: status code
332468f7 342 */
6e0bf8d8 343static efi_status_t EFIAPI efi_free_pages_ext(uint64_t memory,
f5a2a938 344 efi_uintn_t pages)
bee91169
AG
345{
346 efi_status_t r;
347
dee37fc9 348 EFI_ENTRY("%llx, 0x%zx", memory, pages);
bee91169
AG
349 r = efi_free_pages(memory, pages);
350 return EFI_EXIT(r);
351}
352
6b03cd10 353/**
78a88f79
MS
354 * efi_get_memory_map_ext() - get map describing memory usage
355 * @memory_map_size: on entry the size, in bytes, of the memory map buffer,
356 * on exit the size of the copied memory map
357 * @memory_map: buffer to which the memory map is written
358 * @map_key: key for the memory map
359 * @descriptor_size: size of an individual memory descriptor
360 * @descriptor_version: version number of the memory descriptor structure
332468f7
HS
361 *
362 * This function implements the GetMemoryMap service.
332468f7 363 *
78a88f79
MS
364 * See the Unified Extensible Firmware Interface (UEFI) specification for
365 * details.
366 *
367 * Return: status code
332468f7 368 */
6e0bf8d8 369static efi_status_t EFIAPI efi_get_memory_map_ext(
f5a2a938 370 efi_uintn_t *memory_map_size,
6e0bf8d8 371 struct efi_mem_desc *memory_map,
f5a2a938
HS
372 efi_uintn_t *map_key,
373 efi_uintn_t *descriptor_size,
6e0bf8d8 374 uint32_t *descriptor_version)
bee91169
AG
375{
376 efi_status_t r;
377
378 EFI_ENTRY("%p, %p, %p, %p, %p", memory_map_size, memory_map,
379 map_key, descriptor_size, descriptor_version);
380 r = efi_get_memory_map(memory_map_size, memory_map, map_key,
381 descriptor_size, descriptor_version);
382 return EFI_EXIT(r);
383}
384
6b03cd10 385/**
78a88f79
MS
386 * efi_allocate_pool_ext() - allocate memory from pool
387 * @pool_type: type of the pool from which memory is to be allocated
388 * @size: number of bytes to be allocated
389 * @buffer: allocated memory
332468f7
HS
390 *
391 * This function implements the AllocatePool service.
332468f7 392 *
78a88f79
MS
393 * See the Unified Extensible Firmware Interface (UEFI) specification for
394 * details.
395 *
396 * Return: status code
332468f7 397 */
ead1274b 398static efi_status_t EFIAPI efi_allocate_pool_ext(int pool_type,
f5a2a938 399 efi_uintn_t size,
ead1274b 400 void **buffer)
bee91169 401{
1cd29f0a
AG
402 efi_status_t r;
403
f5a2a938 404 EFI_ENTRY("%d, %zd, %p", pool_type, size, buffer);
ead1274b 405 r = efi_allocate_pool(pool_type, size, buffer);
1cd29f0a 406 return EFI_EXIT(r);
bee91169
AG
407}
408
6b03cd10 409/**
78a88f79
MS
410 * efi_free_pool_ext() - free memory from pool
411 * @buffer: start of memory to be freed
332468f7
HS
412 *
413 * This function implements the FreePool service.
332468f7 414 *
78a88f79
MS
415 * See the Unified Extensible Firmware Interface (UEFI) specification for
416 * details.
417 *
418 * Return: status code
332468f7 419 */
42417bc8 420static efi_status_t EFIAPI efi_free_pool_ext(void *buffer)
bee91169 421{
1cd29f0a
AG
422 efi_status_t r;
423
424 EFI_ENTRY("%p", buffer);
42417bc8 425 r = efi_free_pool(buffer);
1cd29f0a 426 return EFI_EXIT(r);
bee91169
AG
427}
428
6b03cd10 429/**
e6023be4 430 * efi_add_handle() - add a new handle to the object list
44549d62 431 *
e6023be4
HS
432 * @handle: handle to be added
433 *
434 * The protocols list is initialized. The handle is added to the list of known
435 * UEFI objects.
44549d62 436 */
fae0118e 437void efi_add_handle(efi_handle_t handle)
44549d62 438{
fae0118e 439 if (!handle)
44549d62 440 return;
fae0118e
HS
441 INIT_LIST_HEAD(&handle->protocols);
442 list_add_tail(&handle->link, &efi_obj_list);
44549d62
HS
443}
444
6b03cd10 445/**
78a88f79
MS
446 * efi_create_handle() - create handle
447 * @handle: new handle
2edab5e2 448 *
78a88f79 449 * Return: status code
2edab5e2 450 */
2074f700 451efi_status_t efi_create_handle(efi_handle_t *handle)
3cc6e3fe
HS
452{
453 struct efi_object *obj;
3cc6e3fe 454
d29e7824
HS
455 obj = calloc(1, sizeof(struct efi_object));
456 if (!obj)
457 return EFI_OUT_OF_RESOURCES;
458
44549d62 459 efi_add_handle(obj);
fae0118e 460 *handle = obj;
d29e7824
HS
461
462 return EFI_SUCCESS;
3cc6e3fe
HS
463}
464
6b03cd10 465/**
78a88f79
MS
466 * efi_search_protocol() - find a protocol on a handle.
467 * @handle: handle
468 * @protocol_guid: GUID of the protocol
469 * @handler: reference to the protocol
678e03a0 470 *
78a88f79 471 * Return: status code
678e03a0 472 */
2074f700 473efi_status_t efi_search_protocol(const efi_handle_t handle,
678e03a0
HS
474 const efi_guid_t *protocol_guid,
475 struct efi_handler **handler)
476{
477 struct efi_object *efiobj;
478 struct list_head *lhandle;
479
480 if (!handle || !protocol_guid)
481 return EFI_INVALID_PARAMETER;
482 efiobj = efi_search_obj(handle);
483 if (!efiobj)
484 return EFI_INVALID_PARAMETER;
485 list_for_each(lhandle, &efiobj->protocols) {
486 struct efi_handler *protocol;
487
488 protocol = list_entry(lhandle, struct efi_handler, link);
489 if (!guidcmp(protocol->guid, protocol_guid)) {
490 if (handler)
491 *handler = protocol;
492 return EFI_SUCCESS;
493 }
494 }
495 return EFI_NOT_FOUND;
496}
497
6b03cd10 498/**
78a88f79
MS
499 * efi_remove_protocol() - delete protocol from a handle
500 * @handle: handle from which the protocol shall be deleted
501 * @protocol: GUID of the protocol to be deleted
502 * @protocol_interface: interface of the protocol implementation
678e03a0 503 *
78a88f79 504 * Return: status code
678e03a0 505 */
2074f700
HS
506efi_status_t efi_remove_protocol(const efi_handle_t handle,
507 const efi_guid_t *protocol,
678e03a0
HS
508 void *protocol_interface)
509{
510 struct efi_handler *handler;
511 efi_status_t ret;
512
513 ret = efi_search_protocol(handle, protocol, &handler);
514 if (ret != EFI_SUCCESS)
515 return ret;
516 if (guidcmp(handler->guid, protocol))
517 return EFI_INVALID_PARAMETER;
1f470e17
HS
518 if (handler->protocol_interface != protocol_interface)
519 return EFI_INVALID_PARAMETER;
678e03a0
HS
520 list_del(&handler->link);
521 free(handler);
522 return EFI_SUCCESS;
523}
524
6b03cd10 525/**
78a88f79
MS
526 * efi_remove_all_protocols() - delete all protocols from a handle
527 * @handle: handle from which the protocols shall be deleted
678e03a0 528 *
78a88f79 529 * Return: status code
678e03a0 530 */
2074f700 531efi_status_t efi_remove_all_protocols(const efi_handle_t handle)
678e03a0
HS
532{
533 struct efi_object *efiobj;
32e6fed6
HS
534 struct efi_handler *protocol;
535 struct efi_handler *pos;
678e03a0
HS
536
537 efiobj = efi_search_obj(handle);
538 if (!efiobj)
539 return EFI_INVALID_PARAMETER;
32e6fed6 540 list_for_each_entry_safe(protocol, pos, &efiobj->protocols, link) {
678e03a0
HS
541 efi_status_t ret;
542
678e03a0
HS
543 ret = efi_remove_protocol(handle, protocol->guid,
544 protocol->protocol_interface);
545 if (ret != EFI_SUCCESS)
546 return ret;
547 }
548 return EFI_SUCCESS;
549}
550
6b03cd10 551/**
78a88f79 552 * efi_delete_handle() - delete handle
678e03a0 553 *
78a88f79 554 * @obj: handle to delete
678e03a0 555 */
fae0118e 556void efi_delete_handle(efi_handle_t handle)
678e03a0 557{
fae0118e 558 if (!handle)
678e03a0 559 return;
fae0118e
HS
560 efi_remove_all_protocols(handle);
561 list_del(&handle->link);
562 free(handle);
678e03a0
HS
563}
564
6b03cd10 565/**
78a88f79
MS
566 * efi_is_event() - check if a pointer is a valid event
567 * @event: pointer to check
43bce442 568 *
78a88f79 569 * Return: status code
bee91169 570 */
43bce442
HS
571static efi_status_t efi_is_event(const struct efi_event *event)
572{
573 const struct efi_event *evt;
574
575 if (!event)
576 return EFI_INVALID_PARAMETER;
577 list_for_each_entry(evt, &efi_events, link) {
578 if (evt == event)
579 return EFI_SUCCESS;
580 }
581 return EFI_INVALID_PARAMETER;
582}
bee91169 583
6b03cd10 584/**
78a88f79
MS
585 * efi_create_event() - create an event
586 * @type: type of the event to create
587 * @notify_tpl: task priority level of the event
588 * @notify_function: notification function of the event
589 * @notify_context: pointer passed to the notification function
590 * @group: event group
591 * @event: created event
332468f7
HS
592 *
593 * This function is used inside U-Boot code to create an event.
594 *
595 * For the API function implementing the CreateEvent service see
596 * efi_create_event_ext.
597 *
78a88f79 598 * Return: status code
332468f7 599 */
152cade3 600efi_status_t efi_create_event(uint32_t type, efi_uintn_t notify_tpl,
49deb455 601 void (EFIAPI *notify_function) (
2fd945fe
HS
602 struct efi_event *event,
603 void *context),
b095f3c8
HS
604 void *notify_context, efi_guid_t *group,
605 struct efi_event **event)
bee91169 606{
43bce442 607 struct efi_event *evt;
c6841592 608
a95343b8 609 if (event == NULL)
49deb455 610 return EFI_INVALID_PARAMETER;
a95343b8 611
21b3edfc
HS
612 switch (type) {
613 case 0:
614 case EVT_TIMER:
615 case EVT_NOTIFY_SIGNAL:
616 case EVT_TIMER | EVT_NOTIFY_SIGNAL:
617 case EVT_NOTIFY_WAIT:
618 case EVT_TIMER | EVT_NOTIFY_WAIT:
619 case EVT_SIGNAL_EXIT_BOOT_SERVICES:
620 case EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE:
621 break;
622 default:
49deb455 623 return EFI_INVALID_PARAMETER;
21b3edfc 624 }
a95343b8 625
3748ed90 626 if ((type & (EVT_NOTIFY_WAIT | EVT_NOTIFY_SIGNAL)) &&
751e928d 627 (!notify_function || is_valid_tpl(notify_tpl) != EFI_SUCCESS))
49deb455 628 return EFI_INVALID_PARAMETER;
a95343b8 629
43bce442
HS
630 evt = calloc(1, sizeof(struct efi_event));
631 if (!evt)
632 return EFI_OUT_OF_RESOURCES;
633 evt->type = type;
634 evt->notify_tpl = notify_tpl;
635 evt->notify_function = notify_function;
636 evt->notify_context = notify_context;
b095f3c8 637 evt->group = group;
b72aaa87 638 /* Disable timers on boot up */
43bce442
HS
639 evt->trigger_next = -1ULL;
640 evt->is_queued = false;
641 evt->is_signaled = false;
642 list_add_tail(&evt->link, &efi_events);
643 *event = evt;
644 return EFI_SUCCESS;
bee91169
AG
645}
646
9f0930e5 647/*
78a88f79
MS
648 * efi_create_event_ex() - create an event in a group
649 * @type: type of the event to create
650 * @notify_tpl: task priority level of the event
651 * @notify_function: notification function of the event
652 * @notify_context: pointer passed to the notification function
653 * @event: created event
654 * @event_group: event group
9f0930e5
HS
655 *
656 * This function implements the CreateEventEx service.
9f0930e5 657 *
78a88f79
MS
658 * See the Unified Extensible Firmware Interface (UEFI) specification for
659 * details.
660 *
661 * Return: status code
9f0930e5
HS
662 */
663efi_status_t EFIAPI efi_create_event_ex(uint32_t type, efi_uintn_t notify_tpl,
664 void (EFIAPI *notify_function) (
665 struct efi_event *event,
666 void *context),
667 void *notify_context,
668 efi_guid_t *event_group,
669 struct efi_event **event)
670{
1884512b
HS
671 efi_status_t ret;
672
9f0930e5
HS
673 EFI_ENTRY("%d, 0x%zx, %p, %p, %pUl", type, notify_tpl, notify_function,
674 notify_context, event_group);
1884512b
HS
675
676 /*
677 * The allowable input parameters are the same as in CreateEvent()
678 * except for the following two disallowed event types.
679 */
680 switch (type) {
681 case EVT_SIGNAL_EXIT_BOOT_SERVICES:
682 case EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE:
683 ret = EFI_INVALID_PARAMETER;
684 goto out;
685 }
686
687 ret = efi_create_event(type, notify_tpl, notify_function,
688 notify_context, event_group, event);
689out:
690 return EFI_EXIT(ret);
9f0930e5
HS
691}
692
6b03cd10 693/**
78a88f79
MS
694 * efi_create_event_ext() - create an event
695 * @type: type of the event to create
696 * @notify_tpl: task priority level of the event
697 * @notify_function: notification function of the event
698 * @notify_context: pointer passed to the notification function
699 * @event: created event
332468f7
HS
700 *
701 * This function implements the CreateEvent service.
332468f7 702 *
78a88f79
MS
703 * See the Unified Extensible Firmware Interface (UEFI) specification for
704 * details.
705 *
706 * Return: status code
332468f7 707 */
49deb455 708static efi_status_t EFIAPI efi_create_event_ext(
152cade3 709 uint32_t type, efi_uintn_t notify_tpl,
49deb455
HS
710 void (EFIAPI *notify_function) (
711 struct efi_event *event,
712 void *context),
713 void *notify_context, struct efi_event **event)
714{
715 EFI_ENTRY("%d, 0x%zx, %p, %p", type, notify_tpl, notify_function,
716 notify_context);
717 return EFI_EXIT(efi_create_event(type, notify_tpl, notify_function,
b095f3c8 718 notify_context, NULL, event));
49deb455
HS
719}
720
6b03cd10 721/**
78a88f79 722 * efi_timer_check() - check if a timer event has occurred
6b03cd10 723 *
332468f7
HS
724 * Check if a timer event has occurred or a queued notification function should
725 * be called.
726 *
bee91169 727 * Our timers have to work without interrupts, so we check whenever keyboard
332468f7 728 * input or disk accesses happen if enough time elapsed for them to fire.
bee91169
AG
729 */
730void efi_timer_check(void)
731{
43bce442 732 struct efi_event *evt;
bee91169
AG
733 u64 now = timer_get_us();
734
43bce442
HS
735 list_for_each_entry(evt, &efi_events, link) {
736 if (evt->is_queued)
b095f3c8 737 efi_queue_event(evt, true);
43bce442 738 if (!(evt->type & EVT_TIMER) || now < evt->trigger_next)
ca62a4f5 739 continue;
43bce442 740 switch (evt->trigger_type) {
ca62a4f5 741 case EFI_TIMER_RELATIVE:
43bce442 742 evt->trigger_type = EFI_TIMER_STOP;
ca62a4f5
HS
743 break;
744 case EFI_TIMER_PERIODIC:
43bce442 745 evt->trigger_next += evt->trigger_time;
ca62a4f5
HS
746 break;
747 default:
748 continue;
c6841592 749 }
b095f3c8 750 evt->is_signaled = false;
43bce442 751 efi_signal_event(evt, true);
bee91169 752 }
bee91169
AG
753 WATCHDOG_RESET();
754}
755
6b03cd10 756/**
78a88f79
MS
757 * efi_set_timer() - set the trigger time for a timer event or stop the event
758 * @event: event for which the timer is set
759 * @type: type of the timer
b72aaa87 760 * @trigger_time: trigger period in multiples of 100 ns
332468f7
HS
761 *
762 * This is the function for internal usage in U-Boot. For the API function
763 * implementing the SetTimer service see efi_set_timer_ext.
764 *
78a88f79 765 * Return: status code
332468f7 766 */
b521d29e 767efi_status_t efi_set_timer(struct efi_event *event, enum efi_timer_delay type,
bfc72462 768 uint64_t trigger_time)
bee91169 769{
43bce442
HS
770 /* Check that the event is valid */
771 if (efi_is_event(event) != EFI_SUCCESS || !(event->type & EVT_TIMER))
772 return EFI_INVALID_PARAMETER;
bee91169 773
8787b02e 774 /*
b72aaa87
HS
775 * The parameter defines a multiple of 100 ns.
776 * We use multiples of 1000 ns. So divide by 10.
8787b02e 777 */
7d963323 778 do_div(trigger_time, 10);
bee91169 779
43bce442
HS
780 switch (type) {
781 case EFI_TIMER_STOP:
782 event->trigger_next = -1ULL;
783 break;
784 case EFI_TIMER_PERIODIC:
785 case EFI_TIMER_RELATIVE:
786 event->trigger_next = timer_get_us() + trigger_time;
787 break;
788 default:
789 return EFI_INVALID_PARAMETER;
bee91169 790 }
43bce442
HS
791 event->trigger_type = type;
792 event->trigger_time = trigger_time;
793 event->is_signaled = false;
794 return EFI_SUCCESS;
bfc72462
HS
795}
796
6b03cd10 797/**
78a88f79
MS
798 * efi_set_timer_ext() - Set the trigger time for a timer event or stop the
799 * event
800 * @event: event for which the timer is set
801 * @type: type of the timer
b72aaa87 802 * @trigger_time: trigger period in multiples of 100 ns
332468f7
HS
803 *
804 * This function implements the SetTimer service.
332468f7 805 *
78a88f79
MS
806 * See the Unified Extensible Firmware Interface (UEFI) specification for
807 * details.
808 *
809 *
810 * Return: status code
332468f7 811 */
b521d29e
HS
812static efi_status_t EFIAPI efi_set_timer_ext(struct efi_event *event,
813 enum efi_timer_delay type,
814 uint64_t trigger_time)
bfc72462 815{
dee37fc9 816 EFI_ENTRY("%p, %d, %llx", event, type, trigger_time);
bfc72462 817 return EFI_EXIT(efi_set_timer(event, type, trigger_time));
bee91169
AG
818}
819
6b03cd10 820/**
78a88f79
MS
821 * efi_wait_for_event() - wait for events to be signaled
822 * @num_events: number of events to be waited for
823 * @event: events to be waited for
824 * @index: index of the event that was signaled
332468f7
HS
825 *
826 * This function implements the WaitForEvent service.
332468f7 827 *
78a88f79
MS
828 * See the Unified Extensible Firmware Interface (UEFI) specification for
829 * details.
830 *
831 * Return: status code
332468f7 832 */
f5a2a938 833static efi_status_t EFIAPI efi_wait_for_event(efi_uintn_t num_events,
2fd945fe 834 struct efi_event **event,
f5a2a938 835 efi_uintn_t *index)
bee91169 836{
43bce442 837 int i;
bee91169 838
f5a2a938 839 EFI_ENTRY("%zd, %p, %p", num_events, event, index);
bee91169 840
c6841592
HS
841 /* Check parameters */
842 if (!num_events || !event)
843 return EFI_EXIT(EFI_INVALID_PARAMETER);
32f4b2f8
HS
844 /* Check TPL */
845 if (efi_tpl != TPL_APPLICATION)
846 return EFI_EXIT(EFI_UNSUPPORTED);
c6841592 847 for (i = 0; i < num_events; ++i) {
43bce442
HS
848 if (efi_is_event(event[i]) != EFI_SUCCESS)
849 return EFI_EXIT(EFI_INVALID_PARAMETER);
c6841592
HS
850 if (!event[i]->type || event[i]->type & EVT_NOTIFY_SIGNAL)
851 return EFI_EXIT(EFI_INVALID_PARAMETER);
e190e897 852 if (!event[i]->is_signaled)
b095f3c8 853 efi_queue_event(event[i], true);
c6841592
HS
854 }
855
856 /* Wait for signal */
857 for (;;) {
858 for (i = 0; i < num_events; ++i) {
e190e897 859 if (event[i]->is_signaled)
c6841592
HS
860 goto out;
861 }
862 /* Allow events to occur. */
863 efi_timer_check();
864 }
865
866out:
867 /*
868 * Reset the signal which is passed to the caller to allow periodic
869 * events to occur.
870 */
e190e897 871 event[i]->is_signaled = false;
c6841592
HS
872 if (index)
873 *index = i;
bee91169
AG
874
875 return EFI_EXIT(EFI_SUCCESS);
876}
877
6b03cd10 878/**
78a88f79
MS
879 * efi_signal_event_ext() - signal an EFI event
880 * @event: event to signal
332468f7
HS
881 *
882 * This function implements the SignalEvent service.
78a88f79
MS
883 *
884 * See the Unified Extensible Firmware Interface (UEFI) specification for
885 * details.
332468f7
HS
886 *
887 * This functions sets the signaled state of the event and queues the
888 * notification function for execution.
889 *
78a88f79 890 * Return: status code
332468f7 891 */
c6841592 892static efi_status_t EFIAPI efi_signal_event_ext(struct efi_event *event)
bee91169
AG
893{
894 EFI_ENTRY("%p", event);
43bce442
HS
895 if (efi_is_event(event) != EFI_SUCCESS)
896 return EFI_EXIT(EFI_INVALID_PARAMETER);
b095f3c8 897 efi_signal_event(event, true);
bee91169
AG
898 return EFI_EXIT(EFI_SUCCESS);
899}
900
6b03cd10 901/**
78a88f79
MS
902 * efi_close_event() - close an EFI event
903 * @event: event to close
332468f7
HS
904 *
905 * This function implements the CloseEvent service.
332468f7 906 *
78a88f79
MS
907 * See the Unified Extensible Firmware Interface (UEFI) specification for
908 * details.
909 *
910 * Return: status code
332468f7 911 */
2fd945fe 912static efi_status_t EFIAPI efi_close_event(struct efi_event *event)
bee91169 913{
ab15d414
HS
914 struct efi_register_notify_event *item, *next;
915
bee91169 916 EFI_ENTRY("%p", event);
43bce442
HS
917 if (efi_is_event(event) != EFI_SUCCESS)
918 return EFI_EXIT(EFI_INVALID_PARAMETER);
ab15d414
HS
919
920 /* Remove protocol notify registrations for the event */
921 list_for_each_entry_safe(item, next, &efi_register_notify_events,
922 link) {
923 if (event == item->event) {
924 list_del(&item->link);
925 free(item);
926 }
927 }
928
43bce442
HS
929 list_del(&event->link);
930 free(event);
931 return EFI_EXIT(EFI_SUCCESS);
bee91169
AG
932}
933
6b03cd10 934/**
78a88f79
MS
935 * efi_check_event() - check if an event is signaled
936 * @event: event to check
332468f7
HS
937 *
938 * This function implements the CheckEvent service.
332468f7 939 *
78a88f79
MS
940 * See the Unified Extensible Firmware Interface (UEFI) specification for
941 * details.
942 *
943 * If an event is not signaled yet, the notification function is queued. The
944 * signaled state is cleared.
332468f7 945 *
78a88f79 946 * Return: status code
332468f7 947 */
2fd945fe 948static efi_status_t EFIAPI efi_check_event(struct efi_event *event)
bee91169
AG
949{
950 EFI_ENTRY("%p", event);
c6841592 951 efi_timer_check();
43bce442
HS
952 if (efi_is_event(event) != EFI_SUCCESS ||
953 event->type & EVT_NOTIFY_SIGNAL)
954 return EFI_EXIT(EFI_INVALID_PARAMETER);
955 if (!event->is_signaled)
b095f3c8 956 efi_queue_event(event, true);
43bce442
HS
957 if (event->is_signaled) {
958 event->is_signaled = false;
959 return EFI_EXIT(EFI_SUCCESS);
c6841592 960 }
43bce442 961 return EFI_EXIT(EFI_NOT_READY);
bee91169
AG
962}
963
6b03cd10 964/**
78a88f79
MS
965 * efi_search_obj() - find the internal EFI object for a handle
966 * @handle: handle to find
7b9f8ad7 967 *
78a88f79 968 * Return: EFI object
7b9f8ad7 969 */
2074f700 970struct efi_object *efi_search_obj(const efi_handle_t handle)
7b9f8ad7 971{
1b68153a 972 struct efi_object *efiobj;
7b9f8ad7 973
ec163faa
HS
974 if (!handle)
975 return NULL;
976
1b68153a 977 list_for_each_entry(efiobj, &efi_obj_list, link) {
fae0118e 978 if (efiobj == handle)
7b9f8ad7
HS
979 return efiobj;
980 }
7b9f8ad7
HS
981 return NULL;
982}
983
6b03cd10 984/**
78a88f79
MS
985 * efi_open_protocol_info_entry() - create open protocol info entry and add it
986 * to a protocol
987 * @handler: handler of a protocol
fe1599da 988 *
78a88f79 989 * Return: open protocol info entry
fe1599da
HS
990 */
991static struct efi_open_protocol_info_entry *efi_create_open_info(
992 struct efi_handler *handler)
993{
994 struct efi_open_protocol_info_item *item;
995
996 item = calloc(1, sizeof(struct efi_open_protocol_info_item));
997 if (!item)
998 return NULL;
999 /* Append the item to the open protocol info list. */
1000 list_add_tail(&item->link, &handler->open_infos);
1001
1002 return &item->info;
1003}
1004
6b03cd10 1005/**
78a88f79
MS
1006 * efi_delete_open_info() - remove an open protocol info entry from a protocol
1007 * @item: open protocol info entry to delete
fe1599da 1008 *
78a88f79 1009 * Return: status code
fe1599da
HS
1010 */
1011static efi_status_t efi_delete_open_info(
1012 struct efi_open_protocol_info_item *item)
1013{
1014 list_del(&item->link);
1015 free(item);
1016 return EFI_SUCCESS;
1017}
1018
6b03cd10 1019/**
78a88f79
MS
1020 * efi_add_protocol() - install new protocol on a handle
1021 * @handle: handle on which the protocol shall be installed
1022 * @protocol: GUID of the protocol to be installed
1023 * @protocol_interface: interface of the protocol implementation
3f79a2b5 1024 *
78a88f79 1025 * Return: status code
3f79a2b5 1026 */
2074f700
HS
1027efi_status_t efi_add_protocol(const efi_handle_t handle,
1028 const efi_guid_t *protocol,
3f79a2b5
HS
1029 void *protocol_interface)
1030{
1031 struct efi_object *efiobj;
1032 struct efi_handler *handler;
1033 efi_status_t ret;
ab15d414 1034 struct efi_register_notify_event *event;
3f79a2b5
HS
1035
1036 efiobj = efi_search_obj(handle);
1037 if (!efiobj)
1038 return EFI_INVALID_PARAMETER;
1039 ret = efi_search_protocol(handle, protocol, NULL);
1040 if (ret != EFI_NOT_FOUND)
1041 return EFI_INVALID_PARAMETER;
1042 handler = calloc(1, sizeof(struct efi_handler));
1043 if (!handler)
1044 return EFI_OUT_OF_RESOURCES;
69fb6b1a
HS
1045 handler->guid = protocol;
1046 handler->protocol_interface = protocol_interface;
fe1599da 1047 INIT_LIST_HEAD(&handler->open_infos);
69fb6b1a 1048 list_add_tail(&handler->link, &efiobj->protocols);
ab15d414
HS
1049
1050 /* Notify registered events */
1051 list_for_each_entry(event, &efi_register_notify_events, link) {
1052 if (!guidcmp(protocol, &event->protocol))
1053 efi_signal_event(event->event, true);
1054 }
1055
d5504144
HS
1056 if (!guidcmp(&efi_guid_device_path, protocol))
1057 EFI_PRINT("installed device path '%pD'\n", protocol_interface);
69fb6b1a 1058 return EFI_SUCCESS;
3f79a2b5
HS
1059}
1060
6b03cd10 1061/**
78a88f79
MS
1062 * efi_install_protocol_interface() - install protocol interface
1063 * @handle: handle on which the protocol shall be installed
1064 * @protocol: GUID of the protocol to be installed
1065 * @protocol_interface_type: type of the interface to be installed,
1066 * always EFI_NATIVE_INTERFACE
1067 * @protocol_interface: interface of the protocol implementation
332468f7 1068 *
1760ef57 1069 * This function implements the InstallProtocolInterface service.
332468f7 1070 *
78a88f79
MS
1071 * See the Unified Extensible Firmware Interface (UEFI) specification for
1072 * details.
1073 *
1074 * Return: status code
332468f7 1075 */
1760ef57 1076static efi_status_t EFIAPI efi_install_protocol_interface(
faea1041 1077 efi_handle_t *handle, const efi_guid_t *protocol,
1760ef57 1078 int protocol_interface_type, void *protocol_interface)
bee91169 1079{
e0549f8a
HS
1080 efi_status_t r;
1081
1760ef57
HS
1082 EFI_ENTRY("%p, %pUl, %d, %p", handle, protocol, protocol_interface_type,
1083 protocol_interface);
1084
e0549f8a
HS
1085 if (!handle || !protocol ||
1086 protocol_interface_type != EFI_NATIVE_INTERFACE) {
1087 r = EFI_INVALID_PARAMETER;
1088 goto out;
1089 }
1090
1091 /* Create new handle if requested. */
1092 if (!*handle) {
3cc6e3fe
HS
1093 r = efi_create_handle(handle);
1094 if (r != EFI_SUCCESS)
1095 goto out;
af1408e0
HS
1096 debug("%sEFI: new handle %p\n", indent_string(nesting_level),
1097 *handle);
1098 } else {
1099 debug("%sEFI: handle %p\n", indent_string(nesting_level),
1100 *handle);
e0549f8a 1101 }
1202530d
HS
1102 /* Add new protocol */
1103 r = efi_add_protocol(*handle, protocol, protocol_interface);
e0549f8a 1104out:
1760ef57 1105 return EFI_EXIT(r);
bee91169 1106}
e0549f8a 1107
6b03cd10 1108/**
78a88f79 1109 * efi_get_drivers() - get all drivers associated to a controller
fae0118e 1110 * @handle: handle of the controller
b72aaa87 1111 * @protocol: protocol GUID (optional)
78a88f79
MS
1112 * @number_of_drivers: number of child controllers
1113 * @driver_handle_buffer: handles of the the drivers
6b03cd10 1114 *
3f9b0042
HS
1115 * The allocated buffer has to be freed with free().
1116 *
78a88f79 1117 * Return: status code
3f9b0042 1118 */
fae0118e 1119static efi_status_t efi_get_drivers(efi_handle_t handle,
3f9b0042
HS
1120 const efi_guid_t *protocol,
1121 efi_uintn_t *number_of_drivers,
1122 efi_handle_t **driver_handle_buffer)
1123{
1124 struct efi_handler *handler;
1125 struct efi_open_protocol_info_item *item;
1126 efi_uintn_t count = 0, i;
1127 bool duplicate;
1128
1129 /* Count all driver associations */
fae0118e 1130 list_for_each_entry(handler, &handle->protocols, link) {
3f9b0042
HS
1131 if (protocol && guidcmp(handler->guid, protocol))
1132 continue;
1133 list_for_each_entry(item, &handler->open_infos, link) {
1134 if (item->info.attributes &
1135 EFI_OPEN_PROTOCOL_BY_DRIVER)
1136 ++count;
1137 }
1138 }
1139 /*
1140 * Create buffer. In case of duplicate driver assignments the buffer
1141 * will be too large. But that does not harm.
1142 */
1143 *number_of_drivers = 0;
1144 *driver_handle_buffer = calloc(count, sizeof(efi_handle_t));
1145 if (!*driver_handle_buffer)
1146 return EFI_OUT_OF_RESOURCES;
1147 /* Collect unique driver handles */
fae0118e 1148 list_for_each_entry(handler, &handle->protocols, link) {
3f9b0042
HS
1149 if (protocol && guidcmp(handler->guid, protocol))
1150 continue;
1151 list_for_each_entry(item, &handler->open_infos, link) {
1152 if (item->info.attributes &
1153 EFI_OPEN_PROTOCOL_BY_DRIVER) {
1154 /* Check this is a new driver */
1155 duplicate = false;
1156 for (i = 0; i < *number_of_drivers; ++i) {
1157 if ((*driver_handle_buffer)[i] ==
1158 item->info.agent_handle)
1159 duplicate = true;
1160 }
1161 /* Copy handle to buffer */
1162 if (!duplicate) {
1163 i = (*number_of_drivers)++;
1164 (*driver_handle_buffer)[i] =
1165 item->info.agent_handle;
1166 }
1167 }
1168 }
1169 }
1170 return EFI_SUCCESS;
1171}
1172
6b03cd10 1173/**
78a88f79 1174 * efi_disconnect_all_drivers() - disconnect all drivers from a controller
fae0118e 1175 * @handle: handle of the controller
b72aaa87 1176 * @protocol: protocol GUID (optional)
78a88f79 1177 * @child_handle: handle of the child to destroy
3f9b0042
HS
1178 *
1179 * This function implements the DisconnectController service.
3f9b0042 1180 *
78a88f79
MS
1181 * See the Unified Extensible Firmware Interface (UEFI) specification for
1182 * details.
1183 *
1184 * Return: status code
3f9b0042 1185 */
fae0118e
HS
1186static efi_status_t efi_disconnect_all_drivers
1187 (efi_handle_t handle,
1188 const efi_guid_t *protocol,
1189 efi_handle_t child_handle)
3f9b0042
HS
1190{
1191 efi_uintn_t number_of_drivers;
1192 efi_handle_t *driver_handle_buffer;
1193 efi_status_t r, ret;
1194
fae0118e 1195 ret = efi_get_drivers(handle, protocol, &number_of_drivers,
3f9b0042
HS
1196 &driver_handle_buffer);
1197 if (ret != EFI_SUCCESS)
1198 return ret;
1199
1200 ret = EFI_NOT_FOUND;
1201 while (number_of_drivers) {
1202 r = EFI_CALL(efi_disconnect_controller(
fae0118e 1203 handle,
3f9b0042
HS
1204 driver_handle_buffer[--number_of_drivers],
1205 child_handle));
1206 if (r == EFI_SUCCESS)
1207 ret = r;
1208 }
1209 free(driver_handle_buffer);
1210 return ret;
1211}
1212
6b03cd10 1213/**
9b47f13b
HS
1214 * efi_uninstall_protocol() - uninstall protocol interface
1215 *
78a88f79
MS
1216 * @handle: handle from which the protocol shall be removed
1217 * @protocol: GUID of the protocol to be removed
1218 * @protocol_interface: interface to be removed
332468f7 1219 *
9b47f13b 1220 * This function DOES NOT delete a handle without installed protocol.
78a88f79
MS
1221 *
1222 * Return: status code
332468f7 1223 */
9b47f13b
HS
1224static efi_status_t efi_uninstall_protocol
1225 (efi_handle_t handle, const efi_guid_t *protocol,
1226 void *protocol_interface)
bee91169 1227{
ad97373b 1228 struct efi_object *efiobj;
5810511d 1229 struct efi_handler *handler;
ad97373b
HS
1230 struct efi_open_protocol_info_item *item;
1231 struct efi_open_protocol_info_item *pos;
5810511d 1232 efi_status_t r;
4b6ed0d7 1233
ad97373b
HS
1234 /* Check handle */
1235 efiobj = efi_search_obj(handle);
1236 if (!efiobj) {
4b6ed0d7
HS
1237 r = EFI_INVALID_PARAMETER;
1238 goto out;
1239 }
5810511d
HS
1240 /* Find the protocol on the handle */
1241 r = efi_search_protocol(handle, protocol, &handler);
1242 if (r != EFI_SUCCESS)
1243 goto out;
ad97373b
HS
1244 /* Disconnect controllers */
1245 efi_disconnect_all_drivers(efiobj, protocol, NULL);
1246 if (!list_empty(&handler->open_infos)) {
5810511d 1247 r = EFI_ACCESS_DENIED;
ad97373b
HS
1248 goto out;
1249 }
1250 /* Close protocol */
1251 list_for_each_entry_safe(item, pos, &handler->open_infos, link) {
1252 if (item->info.attributes ==
1253 EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL ||
1254 item->info.attributes == EFI_OPEN_PROTOCOL_GET_PROTOCOL ||
1255 item->info.attributes == EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
1256 list_del(&item->link);
1257 }
1258 if (!list_empty(&handler->open_infos)) {
1259 r = EFI_ACCESS_DENIED;
1260 goto out;
4b6ed0d7 1261 }
ad97373b 1262 r = efi_remove_protocol(handle, protocol, protocol_interface);
4b6ed0d7 1263out:
9b47f13b
HS
1264 return r;
1265}
1266
1267/**
1268 * efi_uninstall_protocol_interface() - uninstall protocol interface
1269 * @handle: handle from which the protocol shall be removed
1270 * @protocol: GUID of the protocol to be removed
1271 * @protocol_interface: interface to be removed
1272 *
1273 * This function implements the UninstallProtocolInterface service.
1274 *
1275 * See the Unified Extensible Firmware Interface (UEFI) specification for
1276 * details.
1277 *
1278 * Return: status code
1279 */
1280static efi_status_t EFIAPI efi_uninstall_protocol_interface
1281 (efi_handle_t handle, const efi_guid_t *protocol,
1282 void *protocol_interface)
1283{
1284 efi_status_t ret;
1285
1286 EFI_ENTRY("%p, %pUl, %p", handle, protocol, protocol_interface);
1287
1288 ret = efi_uninstall_protocol(handle, protocol, protocol_interface);
1289 if (ret != EFI_SUCCESS)
1290 goto out;
1291
1292 /* If the last protocol has been removed, delete the handle. */
1293 if (list_empty(&handle->protocols)) {
1294 list_del(&handle->link);
1295 free(handle);
1296 }
1297out:
1298 return EFI_EXIT(ret);
bee91169
AG
1299}
1300
6b03cd10 1301/**
78a88f79
MS
1302 * efi_register_protocol_notify() - register an event for notification when a
1303 * protocol is installed.
1304 * @protocol: GUID of the protocol whose installation shall be notified
1305 * @event: event to be signaled upon installation of the protocol
1306 * @registration: key for retrieving the registration information
332468f7
HS
1307 *
1308 * This function implements the RegisterProtocolNotify service.
1309 * See the Unified Extensible Firmware Interface (UEFI) specification
1310 * for details.
1311 *
78a88f79 1312 * Return: status code
332468f7 1313 */
5a9682d0
HS
1314static efi_status_t EFIAPI efi_register_protocol_notify(
1315 const efi_guid_t *protocol,
1316 struct efi_event *event,
1317 void **registration)
bee91169 1318{
ab15d414
HS
1319 struct efi_register_notify_event *item;
1320 efi_status_t ret = EFI_SUCCESS;
1321
778e6af8 1322 EFI_ENTRY("%pUl, %p, %p", protocol, event, registration);
ab15d414
HS
1323
1324 if (!protocol || !event || !registration) {
1325 ret = EFI_INVALID_PARAMETER;
1326 goto out;
1327 }
1328
1329 item = calloc(1, sizeof(struct efi_register_notify_event));
1330 if (!item) {
1331 ret = EFI_OUT_OF_RESOURCES;
1332 goto out;
1333 }
1334
1335 item->event = event;
1336 memcpy(&item->protocol, protocol, sizeof(efi_guid_t));
1337
1338 list_add_tail(&item->link, &efi_register_notify_events);
1339
1340 *registration = item;
1341out:
1342 return EFI_EXIT(ret);
bee91169
AG
1343}
1344
6b03cd10 1345/**
78a88f79
MS
1346 * efi_search() - determine if an EFI handle implements a protocol
1347 * @search_type: selection criterion
1348 * @protocol: GUID of the protocol
1349 * @search_key: registration key
fae0118e 1350 * @handle: handle
332468f7
HS
1351 *
1352 * See the documentation of the LocateHandle service in the UEFI specification.
1353 *
78a88f79 1354 * Return: 0 if the handle implements the protocol
332468f7 1355 */
bee91169 1356static int efi_search(enum efi_locate_search_type search_type,
ab15d414 1357 const efi_guid_t *protocol, efi_handle_t handle)
bee91169 1358{
42cf1242 1359 efi_status_t ret;
bee91169
AG
1360
1361 switch (search_type) {
9f0770ff 1362 case ALL_HANDLES:
bee91169 1363 return 0;
9f0770ff 1364 case BY_REGISTER_NOTIFY:
9f0770ff 1365 case BY_PROTOCOL:
fae0118e 1366 ret = efi_search_protocol(handle, protocol, NULL);
42cf1242
HS
1367 return (ret != EFI_SUCCESS);
1368 default:
1369 /* Invalid search type */
bee91169
AG
1370 return -1;
1371 }
bee91169
AG
1372}
1373
6b03cd10 1374/**
78a88f79 1375 * efi_locate_handle() - locate handles implementing a protocol
ab15d414
HS
1376 *
1377 * @search_type: selection criterion
1378 * @protocol: GUID of the protocol
1379 * @search_key: registration key
1380 * @buffer_size: size of the buffer to receive the handles in bytes
1381 * @buffer: buffer to receive the relevant handles
332468f7
HS
1382 *
1383 * This function is meant for U-Boot internal calls. For the API implementation
1384 * of the LocateHandle service see efi_locate_handle_ext.
1385 *
78a88f79 1386 * Return: status code
332468f7 1387 */
ebf199b9 1388static efi_status_t efi_locate_handle(
bee91169 1389 enum efi_locate_search_type search_type,
5a9682d0 1390 const efi_guid_t *protocol, void *search_key,
f5a2a938 1391 efi_uintn_t *buffer_size, efi_handle_t *buffer)
bee91169 1392{
caf864e4 1393 struct efi_object *efiobj;
f5a2a938 1394 efi_uintn_t size = 0;
ab15d414 1395 struct efi_register_notify_event *item, *event = NULL;
bee91169 1396
caf864e4
HS
1397 /* Check parameters */
1398 switch (search_type) {
1399 case ALL_HANDLES:
1400 break;
1401 case BY_REGISTER_NOTIFY:
1402 if (!search_key)
1403 return EFI_INVALID_PARAMETER;
ab15d414
HS
1404 /* Check that the registration key is valid */
1405 list_for_each_entry(item, &efi_register_notify_events, link) {
1406 if (item ==
1407 (struct efi_register_notify_event *)search_key) {
1408 event = item;
1409 break;
1410 }
1411 }
1412 if (!event)
1413 return EFI_INVALID_PARAMETER;
1414
1415 protocol = &event->protocol;
1416 break;
caf864e4
HS
1417 case BY_PROTOCOL:
1418 if (!protocol)
1419 return EFI_INVALID_PARAMETER;
1420 break;
1421 default:
1422 return EFI_INVALID_PARAMETER;
1423 }
1424
bee91169 1425 /* Count how much space we need */
caf864e4 1426 list_for_each_entry(efiobj, &efi_obj_list, link) {
ab15d414 1427 if (!efi_search(search_type, protocol, efiobj))
ab9efa97 1428 size += sizeof(void *);
bee91169
AG
1429 }
1430
8dfb5e6e
HS
1431 if (size == 0)
1432 return EFI_NOT_FOUND;
1433
1434 if (!buffer_size)
1435 return EFI_INVALID_PARAMETER;
1436
bee91169
AG
1437 if (*buffer_size < size) {
1438 *buffer_size = size;
26329584 1439 return EFI_BUFFER_TOO_SMALL;
bee91169
AG
1440 }
1441
796a78cb 1442 *buffer_size = size;
8dfb5e6e
HS
1443
1444 /* The buffer size is sufficient but there is not buffer */
1445 if (!buffer)
1446 return EFI_INVALID_PARAMETER;
796a78cb 1447
bee91169 1448 /* Then fill the array */
caf864e4 1449 list_for_each_entry(efiobj, &efi_obj_list, link) {
ab15d414 1450 if (!efi_search(search_type, protocol, efiobj))
fae0118e 1451 *buffer++ = efiobj;
bee91169
AG
1452 }
1453
26329584
HS
1454 return EFI_SUCCESS;
1455}
1456
6b03cd10 1457/**
78a88f79
MS
1458 * efi_locate_handle_ext() - locate handles implementing a protocol.
1459 * @search_type: selection criterion
1460 * @protocol: GUID of the protocol
1461 * @search_key: registration key
1462 * @buffer_size: size of the buffer to receive the handles in bytes
1463 * @buffer: buffer to receive the relevant handles
332468f7
HS
1464 *
1465 * This function implements the LocateHandle service.
332468f7 1466 *
78a88f79
MS
1467 * See the Unified Extensible Firmware Interface (UEFI) specification for
1468 * details.
1469 *
1470 * Return: 0 if the handle implements the protocol
332468f7 1471 */
26329584
HS
1472static efi_status_t EFIAPI efi_locate_handle_ext(
1473 enum efi_locate_search_type search_type,
5a9682d0 1474 const efi_guid_t *protocol, void *search_key,
f5a2a938 1475 efi_uintn_t *buffer_size, efi_handle_t *buffer)
26329584 1476{
778e6af8 1477 EFI_ENTRY("%d, %pUl, %p, %p, %p", search_type, protocol, search_key,
26329584
HS
1478 buffer_size, buffer);
1479
1480 return EFI_EXIT(efi_locate_handle(search_type, protocol, search_key,
1481 buffer_size, buffer));
bee91169
AG
1482}
1483
6b03cd10 1484/**
78a88f79
MS
1485 * efi_remove_configuration_table() - collapses configuration table entries,
1486 * removing index i
6b03cd10 1487 *
78a88f79 1488 * @i: index of the table entry to be removed
6b03cd10 1489 */
d98cdf6a
AG
1490static void efi_remove_configuration_table(int i)
1491{
4182a129
HS
1492 struct efi_configuration_table *this = &systab.tables[i];
1493 struct efi_configuration_table *next = &systab.tables[i + 1];
1494 struct efi_configuration_table *end = &systab.tables[systab.nr_tables];
d98cdf6a
AG
1495
1496 memmove(this, next, (ulong)end - (ulong)next);
1497 systab.nr_tables--;
1498}
1499
6b03cd10 1500/**
78a88f79
MS
1501 * efi_install_configuration_table() - adds, updates, or removes a
1502 * configuration table
1503 * @guid: GUID of the installed table
1504 * @table: table to be installed
332468f7
HS
1505 *
1506 * This function is used for internal calls. For the API implementation of the
1507 * InstallConfigurationTable service see efi_install_configuration_table_ext.
1508 *
78a88f79 1509 * Return: status code
332468f7 1510 */
ab9efa97
HS
1511efi_status_t efi_install_configuration_table(const efi_guid_t *guid,
1512 void *table)
bee91169 1513{
b095f3c8 1514 struct efi_event *evt;
bee91169
AG
1515 int i;
1516
eb68b4ef
HS
1517 if (!guid)
1518 return EFI_INVALID_PARAMETER;
1519
b72aaa87 1520 /* Check for GUID override */
bee91169 1521 for (i = 0; i < systab.nr_tables; i++) {
4182a129 1522 if (!guidcmp(guid, &systab.tables[i].guid)) {
d98cdf6a 1523 if (table)
4182a129 1524 systab.tables[i].table = table;
d98cdf6a
AG
1525 else
1526 efi_remove_configuration_table(i);
b095f3c8 1527 goto out;
bee91169
AG
1528 }
1529 }
1530
d98cdf6a
AG
1531 if (!table)
1532 return EFI_NOT_FOUND;
1533
bee91169 1534 /* No override, check for overflow */
4182a129 1535 if (i >= EFI_MAX_CONFIGURATION_TABLES)
488bf12d 1536 return EFI_OUT_OF_RESOURCES;
bee91169
AG
1537
1538 /* Add a new entry */
4182a129
HS
1539 memcpy(&systab.tables[i].guid, guid, sizeof(*guid));
1540 systab.tables[i].table = table;
aba5e919 1541 systab.nr_tables = i + 1;
bee91169 1542
b095f3c8 1543out:
b72aaa87 1544 /* systab.nr_tables may have changed. So we need to update the CRC32 */
55d8ee3b
HS
1545 efi_update_table_header_crc32(&systab.hdr);
1546
b095f3c8
HS
1547 /* Notify that the configuration table was changed */
1548 list_for_each_entry(evt, &efi_events, link) {
1549 if (evt->group && !guidcmp(evt->group, guid)) {
1550 efi_signal_event(evt, false);
1551 break;
1552 }
1553 }
1554
488bf12d
AG
1555 return EFI_SUCCESS;
1556}
1557
6b03cd10 1558/**
78a88f79
MS
1559 * efi_install_configuration_table_ex() - Adds, updates, or removes a
1560 * configuration table.
1561 * @guid: GUID of the installed table
1562 * @table: table to be installed
332468f7
HS
1563 *
1564 * This function implements the InstallConfigurationTable service.
332468f7 1565 *
78a88f79
MS
1566 * See the Unified Extensible Firmware Interface (UEFI) specification for
1567 * details.
1568 *
1569 * Return: status code
332468f7 1570 */
488bf12d
AG
1571static efi_status_t EFIAPI efi_install_configuration_table_ext(efi_guid_t *guid,
1572 void *table)
1573{
778e6af8 1574 EFI_ENTRY("%pUl, %p", guid, table);
488bf12d 1575 return EFI_EXIT(efi_install_configuration_table(guid, table));
bee91169
AG
1576}
1577
6b03cd10 1578/**
78a88f79 1579 * efi_setup_loaded_image() - initialize a loaded image
6b03cd10
HS
1580 *
1581 * Initialize a loaded_image_info and loaded_image_info object with correct
95c5553e 1582 * protocols, boot-device, etc.
332468f7 1583 *
16112f9f
HS
1584 * In case of an error *handle_ptr and *info_ptr are set to NULL and an error
1585 * code is returned.
1586 *
1587 * @device_path: device path of the loaded image
1588 * @file_path: file path of the loaded image
1589 * @handle_ptr: handle of the loaded image
1590 * @info_ptr: loaded image protocol
1591 * Return: status code
95c5553e 1592 */
c982874e
HS
1593efi_status_t efi_setup_loaded_image(struct efi_device_path *device_path,
1594 struct efi_device_path *file_path,
1595 struct efi_loaded_image_obj **handle_ptr,
1596 struct efi_loaded_image **info_ptr)
95c5553e 1597{
48b66230 1598 efi_status_t ret;
16112f9f
HS
1599 struct efi_loaded_image *info = NULL;
1600 struct efi_loaded_image_obj *obj = NULL;
bc8fc328 1601 struct efi_device_path *dp;
16112f9f
HS
1602
1603 /* In case of EFI_OUT_OF_RESOURCES avoid illegal free by caller. */
1604 *handle_ptr = NULL;
1605 *info_ptr = NULL;
c982874e
HS
1606
1607 info = calloc(1, sizeof(*info));
1608 if (!info)
1609 return EFI_OUT_OF_RESOURCES;
1610 obj = calloc(1, sizeof(*obj));
1611 if (!obj) {
1612 free(info);
1613 return EFI_OUT_OF_RESOURCES;
1614 }
cd73aba6 1615 obj->header.type = EFI_OBJECT_TYPE_LOADED_IMAGE;
48b66230 1616
44549d62 1617 /* Add internal object to object list */
d39646a3 1618 efi_add_handle(&obj->header);
c982874e 1619
95147313 1620 info->revision = EFI_LOADED_IMAGE_PROTOCOL_REVISION;
48b66230 1621 info->file_path = file_path;
7e1effce 1622 info->system_table = &systab;
48b66230 1623
7df5af6f
HS
1624 if (device_path) {
1625 info->device_handle = efi_dp_find_obj(device_path, NULL);
bc8fc328
AT
1626
1627 dp = efi_dp_append(device_path, file_path);
1628 if (!dp) {
1629 ret = EFI_OUT_OF_RESOURCES;
7df5af6f 1630 goto failure;
bc8fc328
AT
1631 }
1632 } else {
1633 dp = NULL;
7df5af6f 1634 }
bc8fc328
AT
1635 ret = efi_add_protocol(&obj->header,
1636 &efi_guid_loaded_image_device_path, dp);
1637 if (ret != EFI_SUCCESS)
1638 goto failure;
95c5553e
RC
1639
1640 /*
1641 * When asking for the loaded_image interface, just
1642 * return handle which points to loaded_image_info
1643 */
d39646a3 1644 ret = efi_add_protocol(&obj->header,
c982874e 1645 &efi_guid_loaded_image, info);
48b66230
HS
1646 if (ret != EFI_SUCCESS)
1647 goto failure;
95c5553e 1648
d5974af7
HS
1649 *info_ptr = info;
1650 *handle_ptr = obj;
16112f9f 1651
56d92888 1652 return ret;
48b66230
HS
1653failure:
1654 printf("ERROR: Failure to install protocols for loaded image\n");
16112f9f
HS
1655 efi_delete_handle(&obj->header);
1656 free(info);
56d92888 1657 return ret;
95c5553e
RC
1658}
1659
6b03cd10 1660/**
78a88f79 1661 * efi_load_image_from_path() - load an image using a file path
332468f7 1662 *
0e18f584
HS
1663 * Read a file into a buffer allocated as EFI_BOOT_SERVICES_DATA. It is the
1664 * callers obligation to update the memory type as needed.
1665 *
1666 * @file_path: the path of the image to load
1667 * @buffer: buffer containing the loaded image
1668 * @size: size of the loaded image
1669 * Return: status code
332468f7 1670 */
6b95b38c 1671static
9975fe96 1672efi_status_t efi_load_image_from_path(struct efi_device_path *file_path,
0e18f584 1673 void **buffer, efi_uintn_t *size)
838ee4b4
RC
1674{
1675 struct efi_file_info *info = NULL;
1676 struct efi_file_handle *f;
1677 static efi_status_t ret;
0e18f584 1678 u64 addr;
b6dd5777 1679 efi_uintn_t bs;
838ee4b4 1680
0e18f584
HS
1681 /* In case of failure nothing is returned */
1682 *buffer = NULL;
1683 *size = 0;
1684
1685 /* Open file */
838ee4b4
RC
1686 f = efi_file_from_path(file_path);
1687 if (!f)
1688 return EFI_DEVICE_ERROR;
1689
0e18f584 1690 /* Get file size */
838ee4b4
RC
1691 bs = 0;
1692 EFI_CALL(ret = f->getinfo(f, (efi_guid_t *)&efi_file_info_guid,
1693 &bs, info));
0e18f584
HS
1694 if (ret != EFI_BUFFER_TOO_SMALL) {
1695 ret = EFI_DEVICE_ERROR;
838ee4b4 1696 goto error;
0e18f584 1697 }
838ee4b4 1698
0e18f584
HS
1699 info = malloc(bs);
1700 EFI_CALL(ret = f->getinfo(f, (efi_guid_t *)&efi_file_info_guid, &bs,
1701 info));
1702 if (ret != EFI_SUCCESS)
838ee4b4
RC
1703 goto error;
1704
0e18f584
HS
1705 /*
1706 * When reading the file we do not yet know if it contains an
1707 * application, a boottime driver, or a runtime driver. So here we
1708 * allocate a buffer as EFI_BOOT_SERVICES_DATA. The caller has to
1709 * update the reservation according to the image type.
1710 */
b6dd5777 1711 bs = info->file_size;
0e18f584
HS
1712 ret = efi_allocate_pages(EFI_ALLOCATE_ANY_PAGES,
1713 EFI_BOOT_SERVICES_DATA,
1714 efi_size_in_pages(bs), &addr);
838ee4b4 1715 if (ret != EFI_SUCCESS) {
0e18f584
HS
1716 ret = EFI_OUT_OF_RESOURCES;
1717 goto error;
838ee4b4
RC
1718 }
1719
0e18f584
HS
1720 /* Read file */
1721 EFI_CALL(ret = f->read(f, &bs, (void *)(uintptr_t)addr));
1722 if (ret != EFI_SUCCESS)
1723 efi_free_pages(addr, efi_size_in_pages(bs));
1724 *buffer = (void *)(uintptr_t)addr;
1725 *size = bs;
1726error:
1727 EFI_CALL(f->close(f));
1728 free(info);
838ee4b4
RC
1729 return ret;
1730}
1731
6b03cd10 1732/**
78a88f79
MS
1733 * efi_load_image() - load an EFI image into memory
1734 * @boot_policy: true for request originating from the boot manager
1735 * @parent_image: the caller's image handle
1736 * @file_path: the path of the image to load
1737 * @source_buffer: memory location from which the image is installed
1738 * @source_size: size of the memory area from which the image is installed
1739 * @image_handle: handle for the newly installed image
332468f7
HS
1740 *
1741 * This function implements the LoadImage service.
78a88f79 1742 *
332468f7
HS
1743 * See the Unified Extensible Firmware Interface (UEFI) specification
1744 * for details.
1745 *
78a88f79 1746 * Return: status code
332468f7 1747 */
d7e0b010
AT
1748efi_status_t EFIAPI efi_load_image(bool boot_policy,
1749 efi_handle_t parent_image,
1750 struct efi_device_path *file_path,
1751 void *source_buffer,
1752 efi_uintn_t source_size,
1753 efi_handle_t *image_handle)
bee91169 1754{
0e18f584 1755 struct efi_device_path *dp, *fp;
1c3b2f4a 1756 struct efi_loaded_image *info = NULL;
c982874e
HS
1757 struct efi_loaded_image_obj **image_obj =
1758 (struct efi_loaded_image_obj **)image_handle;
b9b17598 1759 efi_status_t ret;
b0c3c346 1760 void *dest_buffer;
bee91169 1761
7fb96a10 1762 EFI_ENTRY("%d, %p, %pD, %p, %zd, %p", boot_policy, parent_image,
bee91169 1763 file_path, source_buffer, source_size, image_handle);
838ee4b4 1764
28a4fd46
HS
1765 if (!image_handle || !parent_image) {
1766 ret = EFI_INVALID_PARAMETER;
1767 goto error;
1768 }
1769
1770 if (!source_buffer && !file_path) {
1771 ret = EFI_NOT_FOUND;
1772 goto error;
1773 }
1774
838ee4b4 1775 if (!source_buffer) {
b0c3c346 1776 ret = efi_load_image_from_path(file_path, &dest_buffer,
0e18f584 1777 &source_size);
b9b17598 1778 if (ret != EFI_SUCCESS)
0e18f584 1779 goto error;
838ee4b4 1780 } else {
b0c3c346 1781 dest_buffer = source_buffer;
838ee4b4 1782 }
1e15a9cb
HS
1783 /* split file_path which contains both the device and file parts */
1784 efi_dp_split_file_path(file_path, &dp, &fp);
0e18f584 1785 ret = efi_setup_loaded_image(dp, fp, image_obj, &info);
b0c3c346
HS
1786 if (ret == EFI_SUCCESS)
1787 ret = efi_load_pe(*image_obj, dest_buffer, info);
1788 if (!source_buffer)
1789 /* Release buffer to which file was loaded */
1790 efi_free_pages((uintptr_t)dest_buffer,
1791 efi_size_in_pages(source_size));
1792 if (ret == EFI_SUCCESS) {
1793 info->system_table = &systab;
1794 info->parent_handle = parent_image;
1795 } else {
1796 /* The image is invalid. Release all associated resources. */
1797 efi_delete_handle(*image_handle);
1798 *image_handle = NULL;
1799 free(info);
1800 }
28a4fd46 1801error:
b9b17598 1802 return EFI_EXIT(ret);
bee91169
AG
1803}
1804
f31239ac
AG
1805/**
1806 * efi_exit_caches() - fix up caches for EFI payloads if necessary
1807 */
1808static void efi_exit_caches(void)
1809{
1810#if defined(CONFIG_ARM) && !defined(CONFIG_ARM64)
1811 /*
1812 * Grub on 32bit ARM needs to have caches disabled before jumping into
1813 * a zImage, but does not know of all cache layers. Give it a hand.
1814 */
1815 if (efi_is_direct_boot)
1816 cleanup_before_linux();
1817#endif
1818}
1819
6b03cd10 1820/**
78a88f79
MS
1821 * efi_exit_boot_services() - stop all boot services
1822 * @image_handle: handle of the loaded image
1823 * @map_key: key of the memory map
332468f7
HS
1824 *
1825 * This function implements the ExitBootServices service.
78a88f79 1826 *
332468f7
HS
1827 * See the Unified Extensible Firmware Interface (UEFI) specification
1828 * for details.
1829 *
78a88f79
MS
1830 * All timer events are disabled. For exit boot services events the
1831 * notification function is called. The boot services are disabled in the
1832 * system table.
cc20ed03 1833 *
78a88f79 1834 * Return: status code
332468f7 1835 */
2074f700 1836static efi_status_t EFIAPI efi_exit_boot_services(efi_handle_t image_handle,
bee91169
AG
1837 unsigned long map_key)
1838{
43bce442 1839 struct efi_event *evt;
152a263c 1840
bee91169
AG
1841 EFI_ENTRY("%p, %ld", image_handle, map_key);
1842
1fcb7ea2
HS
1843 /* Check that the caller has read the current memory map */
1844 if (map_key != efi_memory_map_key)
1845 return EFI_INVALID_PARAMETER;
1846
cc20ed03
HS
1847 /* Make sure that notification functions are not called anymore */
1848 efi_tpl = TPL_HIGH_LEVEL;
1849
1850 /* Check if ExitBootServices has already been called */
1851 if (!systab.boottime)
1852 return EFI_EXIT(EFI_SUCCESS);
1853
b095f3c8
HS
1854 /* Add related events to the event group */
1855 list_for_each_entry(evt, &efi_events, link) {
1856 if (evt->type == EVT_SIGNAL_EXIT_BOOT_SERVICES)
1857 evt->group = &efi_guid_event_group_exit_boot_services;
1858 }
152a263c 1859 /* Notify that ExitBootServices is invoked. */
43bce442 1860 list_for_each_entry(evt, &efi_events, link) {
b095f3c8
HS
1861 if (evt->group &&
1862 !guidcmp(evt->group,
1863 &efi_guid_event_group_exit_boot_services)) {
1864 efi_signal_event(evt, false);
1865 break;
1866 }
152a263c 1867 }
152a263c 1868
b72aaa87 1869 /* TODO: Should persist EFI variables here */
ad644e7c 1870
b7b8410a
AG
1871 board_quiesce_devices();
1872
f31239ac
AG
1873 /* Fix up caches for EFI payloads if necessary */
1874 efi_exit_caches();
1875
bee91169
AG
1876 /* This stops all lingering devices */
1877 bootm_disable_interrupts();
1878
b72aaa87 1879 /* Disable boot time services */
cc20ed03
HS
1880 systab.con_in_handle = NULL;
1881 systab.con_in = NULL;
1882 systab.con_out_handle = NULL;
1883 systab.con_out = NULL;
1884 systab.stderr_handle = NULL;
1885 systab.std_err = NULL;
1886 systab.boottime = NULL;
1887
1888 /* Recalculate CRC32 */
640adadf 1889 efi_update_table_header_crc32(&systab.hdr);
cc20ed03 1890
bee91169 1891 /* Give the payload some time to boot */
b3d60900 1892 efi_set_watchdog(0);
bee91169
AG
1893 WATCHDOG_RESET();
1894
1895 return EFI_EXIT(EFI_SUCCESS);
1896}
1897
6b03cd10 1898/**
78a88f79
MS
1899 * efi_get_next_monotonic_count() - get next value of the counter
1900 * @count: returned value of the counter
332468f7
HS
1901 *
1902 * This function implements the NextMonotonicCount service.
332468f7 1903 *
78a88f79
MS
1904 * See the Unified Extensible Firmware Interface (UEFI) specification for
1905 * details.
1906 *
1907 * Return: status code
332468f7 1908 */
bee91169
AG
1909static efi_status_t EFIAPI efi_get_next_monotonic_count(uint64_t *count)
1910{
ab9efa97
HS
1911 static uint64_t mono;
1912
bee91169
AG
1913 EFI_ENTRY("%p", count);
1914 *count = mono++;
1915 return EFI_EXIT(EFI_SUCCESS);
1916}
1917
6b03cd10 1918/**
78a88f79
MS
1919 * efi_stall() - sleep
1920 * @microseconds: period to sleep in microseconds
332468f7 1921 *
78a88f79 1922 * This function implements the Stall service.
332468f7 1923 *
78a88f79
MS
1924 * See the Unified Extensible Firmware Interface (UEFI) specification for
1925 * details.
1926 *
1927 * Return: status code
332468f7 1928 */
bee91169
AG
1929static efi_status_t EFIAPI efi_stall(unsigned long microseconds)
1930{
1931 EFI_ENTRY("%ld", microseconds);
1932 udelay(microseconds);
1933 return EFI_EXIT(EFI_SUCCESS);
1934}
1935
6b03cd10 1936/**
78a88f79
MS
1937 * efi_set_watchdog_timer() - reset the watchdog timer
1938 * @timeout: seconds before reset by watchdog
1939 * @watchdog_code: code to be logged when resetting
1940 * @data_size: size of buffer in bytes
1941 * @watchdog_data: buffer with data describing the reset reason
332468f7 1942 *
b3d60900 1943 * This function implements the SetWatchdogTimer service.
332468f7 1944 *
78a88f79
MS
1945 * See the Unified Extensible Firmware Interface (UEFI) specification for
1946 * details.
1947 *
1948 * Return: status code
332468f7 1949 */
bee91169
AG
1950static efi_status_t EFIAPI efi_set_watchdog_timer(unsigned long timeout,
1951 uint64_t watchdog_code,
1952 unsigned long data_size,
1953 uint16_t *watchdog_data)
1954{
dee37fc9 1955 EFI_ENTRY("%ld, 0x%llx, %ld, %p", timeout, watchdog_code,
bee91169 1956 data_size, watchdog_data);
b3d60900 1957 return EFI_EXIT(efi_set_watchdog(timeout));
bee91169
AG
1958}
1959
6b03cd10 1960/**
78a88f79
MS
1961 * efi_close_protocol() - close a protocol
1962 * @handle: handle on which the protocol shall be closed
1963 * @protocol: GUID of the protocol to close
1964 * @agent_handle: handle of the driver
1965 * @controller_handle: handle of the controller
332468f7
HS
1966 *
1967 * This function implements the CloseProtocol service.
332468f7 1968 *
78a88f79
MS
1969 * See the Unified Extensible Firmware Interface (UEFI) specification for
1970 * details.
1971 *
1972 * Return: status code
332468f7 1973 */
2074f700 1974static efi_status_t EFIAPI efi_close_protocol(efi_handle_t handle,
5a9682d0 1975 const efi_guid_t *protocol,
2074f700
HS
1976 efi_handle_t agent_handle,
1977 efi_handle_t controller_handle)
bee91169 1978{
3b8a489c
HS
1979 struct efi_handler *handler;
1980 struct efi_open_protocol_info_item *item;
1981 struct efi_open_protocol_info_item *pos;
1982 efi_status_t r;
1983
778e6af8 1984 EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, agent_handle,
bee91169 1985 controller_handle);
3b8a489c 1986
ec163faa
HS
1987 if (!efi_search_obj(agent_handle) ||
1988 (controller_handle && !efi_search_obj(controller_handle))) {
3b8a489c
HS
1989 r = EFI_INVALID_PARAMETER;
1990 goto out;
1991 }
1992 r = efi_search_protocol(handle, protocol, &handler);
1993 if (r != EFI_SUCCESS)
1994 goto out;
1995
1996 r = EFI_NOT_FOUND;
1997 list_for_each_entry_safe(item, pos, &handler->open_infos, link) {
1998 if (item->info.agent_handle == agent_handle &&
1999 item->info.controller_handle == controller_handle) {
2000 efi_delete_open_info(item);
2001 r = EFI_SUCCESS;
2002 break;
2003 }
2004 }
2005out:
2006 return EFI_EXIT(r);
bee91169
AG
2007}
2008
6b03cd10 2009/**
78a88f79
MS
2010 * efi_open_protocol_information() - provide information about then open status
2011 * of a protocol on a handle
2012 * @handle: handle for which the information shall be retrieved
2013 * @protocol: GUID of the protocol
2014 * @entry_buffer: buffer to receive the open protocol information
2015 * @entry_count: number of entries available in the buffer
332468f7
HS
2016 *
2017 * This function implements the OpenProtocolInformation service.
332468f7 2018 *
78a88f79
MS
2019 * See the Unified Extensible Firmware Interface (UEFI) specification for
2020 * details.
2021 *
2022 * Return: status code
332468f7 2023 */
ab9efa97
HS
2024static efi_status_t EFIAPI efi_open_protocol_information(
2025 efi_handle_t handle, const efi_guid_t *protocol,
bee91169 2026 struct efi_open_protocol_info_entry **entry_buffer,
f5a2a938 2027 efi_uintn_t *entry_count)
bee91169 2028{
e3fbbc36
HS
2029 unsigned long buffer_size;
2030 unsigned long count;
2031 struct efi_handler *handler;
2032 struct efi_open_protocol_info_item *item;
2033 efi_status_t r;
2034
778e6af8 2035 EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, entry_buffer,
bee91169 2036 entry_count);
e3fbbc36
HS
2037
2038 /* Check parameters */
2039 if (!entry_buffer) {
2040 r = EFI_INVALID_PARAMETER;
2041 goto out;
2042 }
2043 r = efi_search_protocol(handle, protocol, &handler);
2044 if (r != EFI_SUCCESS)
2045 goto out;
2046
2047 /* Count entries */
2048 count = 0;
2049 list_for_each_entry(item, &handler->open_infos, link) {
2050 if (item->info.open_count)
2051 ++count;
2052 }
2053 *entry_count = count;
2054 *entry_buffer = NULL;
2055 if (!count) {
2056 r = EFI_SUCCESS;
2057 goto out;
2058 }
2059
2060 /* Copy entries */
2061 buffer_size = count * sizeof(struct efi_open_protocol_info_entry);
eee6530e 2062 r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
e3fbbc36
HS
2063 (void **)entry_buffer);
2064 if (r != EFI_SUCCESS)
2065 goto out;
2066 list_for_each_entry_reverse(item, &handler->open_infos, link) {
2067 if (item->info.open_count)
2068 (*entry_buffer)[--count] = item->info;
2069 }
2070out:
2071 return EFI_EXIT(r);
bee91169
AG
2072}
2073
6b03cd10 2074/**
78a88f79
MS
2075 * efi_protocols_per_handle() - get protocols installed on a handle
2076 * @handle: handle for which the information is retrieved
2077 * @protocol_buffer: buffer with protocol GUIDs
2078 * @protocol_buffer_count: number of entries in the buffer
332468f7
HS
2079 *
2080 * This function implements the ProtocolsPerHandleService.
332468f7 2081 *
78a88f79
MS
2082 * See the Unified Extensible Firmware Interface (UEFI) specification for
2083 * details.
2084 *
2085 * Return: status code
332468f7 2086 */
2074f700
HS
2087static efi_status_t EFIAPI efi_protocols_per_handle(
2088 efi_handle_t handle, efi_guid_t ***protocol_buffer,
f5a2a938 2089 efi_uintn_t *protocol_buffer_count)
bee91169 2090{
c0ebfc86
HS
2091 unsigned long buffer_size;
2092 struct efi_object *efiobj;
69fb6b1a 2093 struct list_head *protocol_handle;
c0ebfc86
HS
2094 efi_status_t r;
2095
bee91169
AG
2096 EFI_ENTRY("%p, %p, %p", handle, protocol_buffer,
2097 protocol_buffer_count);
c0ebfc86
HS
2098
2099 if (!handle || !protocol_buffer || !protocol_buffer_count)
2100 return EFI_EXIT(EFI_INVALID_PARAMETER);
2101
2102 *protocol_buffer = NULL;
661c8327 2103 *protocol_buffer_count = 0;
c0ebfc86 2104
69fb6b1a
HS
2105 efiobj = efi_search_obj(handle);
2106 if (!efiobj)
2107 return EFI_EXIT(EFI_INVALID_PARAMETER);
c0ebfc86 2108
69fb6b1a
HS
2109 /* Count protocols */
2110 list_for_each(protocol_handle, &efiobj->protocols) {
2111 ++*protocol_buffer_count;
2112 }
2113
b72aaa87 2114 /* Copy GUIDs */
69fb6b1a
HS
2115 if (*protocol_buffer_count) {
2116 size_t j = 0;
2117
2118 buffer_size = sizeof(efi_guid_t *) * *protocol_buffer_count;
eee6530e 2119 r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
69fb6b1a
HS
2120 (void **)protocol_buffer);
2121 if (r != EFI_SUCCESS)
2122 return EFI_EXIT(r);
2123 list_for_each(protocol_handle, &efiobj->protocols) {
2124 struct efi_handler *protocol;
2125
2126 protocol = list_entry(protocol_handle,
2127 struct efi_handler, link);
2128 (*protocol_buffer)[j] = (void *)protocol->guid;
2129 ++j;
c0ebfc86 2130 }
c0ebfc86
HS
2131 }
2132
2133 return EFI_EXIT(EFI_SUCCESS);
bee91169
AG
2134}
2135
6b03cd10 2136/**
78a88f79
MS
2137 * efi_locate_handle_buffer() - locate handles implementing a protocol
2138 * @search_type: selection criterion
2139 * @protocol: GUID of the protocol
2140 * @search_key: registration key
2141 * @no_handles: number of returned handles
2142 * @buffer: buffer with the returned handles
332468f7
HS
2143 *
2144 * This function implements the LocateHandleBuffer service.
332468f7 2145 *
78a88f79
MS
2146 * See the Unified Extensible Firmware Interface (UEFI) specification for
2147 * details.
2148 *
2149 * Return: status code
332468f7 2150 */
bee91169
AG
2151static efi_status_t EFIAPI efi_locate_handle_buffer(
2152 enum efi_locate_search_type search_type,
5a9682d0 2153 const efi_guid_t *protocol, void *search_key,
f5a2a938 2154 efi_uintn_t *no_handles, efi_handle_t **buffer)
bee91169 2155{
c2e703f9 2156 efi_status_t r;
f5a2a938 2157 efi_uintn_t buffer_size = 0;
c2e703f9 2158
778e6af8 2159 EFI_ENTRY("%d, %pUl, %p, %p, %p", search_type, protocol, search_key,
bee91169 2160 no_handles, buffer);
c2e703f9
HS
2161
2162 if (!no_handles || !buffer) {
2163 r = EFI_INVALID_PARAMETER;
2164 goto out;
2165 }
2166 *no_handles = 0;
2167 *buffer = NULL;
2168 r = efi_locate_handle(search_type, protocol, search_key, &buffer_size,
2169 *buffer);
2170 if (r != EFI_BUFFER_TOO_SMALL)
2171 goto out;
eee6530e 2172 r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
c2e703f9
HS
2173 (void **)buffer);
2174 if (r != EFI_SUCCESS)
2175 goto out;
2176 r = efi_locate_handle(search_type, protocol, search_key, &buffer_size,
2177 *buffer);
2178 if (r == EFI_SUCCESS)
2074f700 2179 *no_handles = buffer_size / sizeof(efi_handle_t);
c2e703f9
HS
2180out:
2181 return EFI_EXIT(r);
bee91169
AG
2182}
2183
6b03cd10 2184/**
78a88f79
MS
2185 * efi_locate_protocol() - find an interface implementing a protocol
2186 * @protocol: GUID of the protocol
2187 * @registration: registration key passed to the notification function
2188 * @protocol_interface: interface implementing the protocol
332468f7
HS
2189 *
2190 * This function implements the LocateProtocol service.
332468f7 2191 *
78a88f79
MS
2192 * See the Unified Extensible Firmware Interface (UEFI) specification for
2193 * details.
2194 *
2195 * Return: status code
332468f7 2196 */
5a9682d0 2197static efi_status_t EFIAPI efi_locate_protocol(const efi_guid_t *protocol,
bee91169
AG
2198 void *registration,
2199 void **protocol_interface)
2200{
88adae5e 2201 struct list_head *lhandle;
9172cd91 2202 efi_status_t ret;
bee91169 2203
778e6af8 2204 EFI_ENTRY("%pUl, %p, %p", protocol, registration, protocol_interface);
88adae5e
HS
2205
2206 if (!protocol || !protocol_interface)
2207 return EFI_EXIT(EFI_INVALID_PARAMETER);
2208
2209 list_for_each(lhandle, &efi_obj_list) {
2210 struct efi_object *efiobj;
9172cd91 2211 struct efi_handler *handler;
88adae5e
HS
2212
2213 efiobj = list_entry(lhandle, struct efi_object, link);
9172cd91 2214
fae0118e 2215 ret = efi_search_protocol(efiobj, protocol, &handler);
9172cd91
HS
2216 if (ret == EFI_SUCCESS) {
2217 *protocol_interface = handler->protocol_interface;
2218 return EFI_EXIT(EFI_SUCCESS);
bee91169
AG
2219 }
2220 }
88adae5e 2221 *protocol_interface = NULL;
bee91169
AG
2222
2223 return EFI_EXIT(EFI_NOT_FOUND);
2224}
2225
6b03cd10 2226/**
78a88f79
MS
2227 * efi_locate_device_path() - Get the device path and handle of an device
2228 * implementing a protocol
2229 * @protocol: GUID of the protocol
2230 * @device_path: device path
2231 * @device: handle of the device
ae2c85c1
HS
2232 *
2233 * This function implements the LocateDevicePath service.
ae2c85c1 2234 *
78a88f79
MS
2235 * See the Unified Extensible Firmware Interface (UEFI) specification for
2236 * details.
2237 *
2238 * Return: status code
ae2c85c1
HS
2239 */
2240static efi_status_t EFIAPI efi_locate_device_path(
2241 const efi_guid_t *protocol,
2242 struct efi_device_path **device_path,
2243 efi_handle_t *device)
2244{
2245 struct efi_device_path *dp;
2246 size_t i;
2247 struct efi_handler *handler;
2248 efi_handle_t *handles;
2249 size_t len, len_dp;
2250 size_t len_best = 0;
2251 efi_uintn_t no_handles;
2252 u8 *remainder;
2253 efi_status_t ret;
2254
2255 EFI_ENTRY("%pUl, %p, %p", protocol, device_path, device);
2256
2257 if (!protocol || !device_path || !*device_path || !device) {
2258 ret = EFI_INVALID_PARAMETER;
2259 goto out;
2260 }
2261
2262 /* Find end of device path */
f6dd3f35 2263 len = efi_dp_instance_size(*device_path);
ae2c85c1
HS
2264
2265 /* Get all handles implementing the protocol */
2266 ret = EFI_CALL(efi_locate_handle_buffer(BY_PROTOCOL, protocol, NULL,
2267 &no_handles, &handles));
2268 if (ret != EFI_SUCCESS)
2269 goto out;
2270
2271 for (i = 0; i < no_handles; ++i) {
2272 /* Find the device path protocol */
2273 ret = efi_search_protocol(handles[i], &efi_guid_device_path,
2274 &handler);
2275 if (ret != EFI_SUCCESS)
2276 continue;
2277 dp = (struct efi_device_path *)handler->protocol_interface;
f6dd3f35 2278 len_dp = efi_dp_instance_size(dp);
ae2c85c1
HS
2279 /*
2280 * This handle can only be a better fit
2281 * if its device path length is longer than the best fit and
2282 * if its device path length is shorter of equal the searched
2283 * device path.
2284 */
2285 if (len_dp <= len_best || len_dp > len)
2286 continue;
2287 /* Check if dp is a subpath of device_path */
2288 if (memcmp(*device_path, dp, len_dp))
2289 continue;
2290 *device = handles[i];
2291 len_best = len_dp;
2292 }
2293 if (len_best) {
2294 remainder = (u8 *)*device_path + len_best;
2295 *device_path = (struct efi_device_path *)remainder;
2296 ret = EFI_SUCCESS;
2297 } else {
2298 ret = EFI_NOT_FOUND;
2299 }
2300out:
2301 return EFI_EXIT(ret);
2302}
2303
6b03cd10 2304/**
78a88f79
MS
2305 * efi_install_multiple_protocol_interfaces() - Install multiple protocol
2306 * interfaces
2307 * @handle: handle on which the protocol interfaces shall be installed
2308 * @...: NULL terminated argument list with pairs of protocol GUIDS and
2309 * interfaces
332468f7
HS
2310 *
2311 * This function implements the MultipleProtocolInterfaces service.
332468f7 2312 *
78a88f79
MS
2313 * See the Unified Extensible Firmware Interface (UEFI) specification for
2314 * details.
2315 *
2316 * Return: status code
332468f7 2317 */
7657ae12 2318efi_status_t EFIAPI efi_install_multiple_protocol_interfaces
faea1041 2319 (efi_handle_t *handle, ...)
bee91169
AG
2320{
2321 EFI_ENTRY("%p", handle);
58b83586 2322
beb077a2 2323 efi_va_list argptr;
5a9682d0 2324 const efi_guid_t *protocol;
58b83586
HS
2325 void *protocol_interface;
2326 efi_status_t r = EFI_SUCCESS;
2327 int i = 0;
2328
2329 if (!handle)
2330 return EFI_EXIT(EFI_INVALID_PARAMETER);
2331
beb077a2 2332 efi_va_start(argptr, handle);
58b83586 2333 for (;;) {
beb077a2 2334 protocol = efi_va_arg(argptr, efi_guid_t*);
58b83586
HS
2335 if (!protocol)
2336 break;
beb077a2 2337 protocol_interface = efi_va_arg(argptr, void*);
1760ef57
HS
2338 r = EFI_CALL(efi_install_protocol_interface(
2339 handle, protocol,
2340 EFI_NATIVE_INTERFACE,
2341 protocol_interface));
58b83586
HS
2342 if (r != EFI_SUCCESS)
2343 break;
2344 i++;
2345 }
beb077a2 2346 efi_va_end(argptr);
58b83586
HS
2347 if (r == EFI_SUCCESS)
2348 return EFI_EXIT(r);
2349
62471e46 2350 /* If an error occurred undo all changes. */
beb077a2 2351 efi_va_start(argptr, handle);
58b83586 2352 for (; i; --i) {
beb077a2
AG
2353 protocol = efi_va_arg(argptr, efi_guid_t*);
2354 protocol_interface = efi_va_arg(argptr, void*);
faea1041 2355 EFI_CALL(efi_uninstall_protocol_interface(*handle, protocol,
cd534083 2356 protocol_interface));
58b83586 2357 }
beb077a2 2358 efi_va_end(argptr);
58b83586
HS
2359
2360 return EFI_EXIT(r);
bee91169
AG
2361}
2362
6b03cd10 2363/**
78a88f79
MS
2364 * efi_uninstall_multiple_protocol_interfaces() - uninstall multiple protocol
2365 * interfaces
2366 * @handle: handle from which the protocol interfaces shall be removed
2367 * @...: NULL terminated argument list with pairs of protocol GUIDS and
2368 * interfaces
332468f7
HS
2369 *
2370 * This function implements the UninstallMultipleProtocolInterfaces service.
332468f7 2371 *
78a88f79
MS
2372 * See the Unified Extensible Firmware Interface (UEFI) specification for
2373 * details.
2374 *
2375 * Return: status code
332468f7 2376 */
bee91169 2377static efi_status_t EFIAPI efi_uninstall_multiple_protocol_interfaces(
faea1041 2378 efi_handle_t handle, ...)
bee91169
AG
2379{
2380 EFI_ENTRY("%p", handle);
843ce54c 2381
beb077a2 2382 efi_va_list argptr;
843ce54c
HS
2383 const efi_guid_t *protocol;
2384 void *protocol_interface;
2385 efi_status_t r = EFI_SUCCESS;
2386 size_t i = 0;
2387
2388 if (!handle)
2389 return EFI_EXIT(EFI_INVALID_PARAMETER);
2390
beb077a2 2391 efi_va_start(argptr, handle);
843ce54c 2392 for (;;) {
beb077a2 2393 protocol = efi_va_arg(argptr, efi_guid_t*);
843ce54c
HS
2394 if (!protocol)
2395 break;
beb077a2 2396 protocol_interface = efi_va_arg(argptr, void*);
9b47f13b
HS
2397 r = efi_uninstall_protocol(handle, protocol,
2398 protocol_interface);
843ce54c
HS
2399 if (r != EFI_SUCCESS)
2400 break;
2401 i++;
2402 }
beb077a2 2403 efi_va_end(argptr);
9b47f13b
HS
2404 if (r == EFI_SUCCESS) {
2405 /* If the last protocol has been removed, delete the handle. */
2406 if (list_empty(&handle->protocols)) {
2407 list_del(&handle->link);
2408 free(handle);
2409 }
843ce54c 2410 return EFI_EXIT(r);
9b47f13b 2411 }
843ce54c
HS
2412
2413 /* If an error occurred undo all changes. */
beb077a2 2414 efi_va_start(argptr, handle);
843ce54c 2415 for (; i; --i) {
beb077a2
AG
2416 protocol = efi_va_arg(argptr, efi_guid_t*);
2417 protocol_interface = efi_va_arg(argptr, void*);
843ce54c
HS
2418 EFI_CALL(efi_install_protocol_interface(&handle, protocol,
2419 EFI_NATIVE_INTERFACE,
2420 protocol_interface));
2421 }
beb077a2 2422 efi_va_end(argptr);
843ce54c 2423
e2373021
HS
2424 /* In case of an error always return EFI_INVALID_PARAMETER */
2425 return EFI_EXIT(EFI_INVALID_PARAMETER);
bee91169
AG
2426}
2427
6b03cd10 2428/**
78a88f79
MS
2429 * efi_calculate_crc32() - calculate cyclic redundancy code
2430 * @data: buffer with data
2431 * @data_size: size of buffer in bytes
2432 * @crc32_p: cyclic redundancy code
332468f7
HS
2433 *
2434 * This function implements the CalculateCrc32 service.
332468f7 2435 *
78a88f79
MS
2436 * See the Unified Extensible Firmware Interface (UEFI) specification for
2437 * details.
2438 *
2439 * Return: status code
332468f7 2440 */
8aa8360e
HS
2441static efi_status_t EFIAPI efi_calculate_crc32(const void *data,
2442 efi_uintn_t data_size,
2443 u32 *crc32_p)
bee91169 2444{
8aa8360e 2445 EFI_ENTRY("%p, %zu", data, data_size);
bee91169
AG
2446 *crc32_p = crc32(0, data, data_size);
2447 return EFI_EXIT(EFI_SUCCESS);
2448}
2449
6b03cd10 2450/**
78a88f79
MS
2451 * efi_copy_mem() - copy memory
2452 * @destination: destination of the copy operation
2453 * @source: source of the copy operation
2454 * @length: number of bytes to copy
332468f7
HS
2455 *
2456 * This function implements the CopyMem service.
332468f7 2457 *
78a88f79
MS
2458 * See the Unified Extensible Firmware Interface (UEFI) specification for
2459 * details.
332468f7 2460 */
fc05a959
HS
2461static void EFIAPI efi_copy_mem(void *destination, const void *source,
2462 size_t length)
bee91169 2463{
fc05a959 2464 EFI_ENTRY("%p, %p, %ld", destination, source, (unsigned long)length);
0bc81a71 2465 memmove(destination, source, length);
f7c78176 2466 EFI_EXIT(EFI_SUCCESS);
bee91169
AG
2467}
2468
6b03cd10 2469/**
78a88f79
MS
2470 * efi_set_mem() - Fill memory with a byte value.
2471 * @buffer: buffer to fill
2472 * @size: size of buffer in bytes
2473 * @value: byte to copy to the buffer
332468f7
HS
2474 *
2475 * This function implements the SetMem service.
332468f7 2476 *
78a88f79
MS
2477 * See the Unified Extensible Firmware Interface (UEFI) specification for
2478 * details.
332468f7 2479 */
fc05a959 2480static void EFIAPI efi_set_mem(void *buffer, size_t size, uint8_t value)
bee91169 2481{
fc05a959 2482 EFI_ENTRY("%p, %ld, 0x%x", buffer, (unsigned long)size, value);
bee91169 2483 memset(buffer, value, size);
f7c78176 2484 EFI_EXIT(EFI_SUCCESS);
bee91169
AG
2485}
2486
6b03cd10 2487/**
78a88f79
MS
2488 * efi_protocol_open() - open protocol interface on a handle
2489 * @handler: handler of a protocol
2490 * @protocol_interface: interface implementing the protocol
2491 * @agent_handle: handle of the driver
2492 * @controller_handle: handle of the controller
2493 * @attributes: attributes indicating how to open the protocol
191a41cc 2494 *
78a88f79 2495 * Return: status code
191a41cc
HS
2496 */
2497static efi_status_t efi_protocol_open(
2498 struct efi_handler *handler,
2499 void **protocol_interface, void *agent_handle,
2500 void *controller_handle, uint32_t attributes)
2501{
2502 struct efi_open_protocol_info_item *item;
2503 struct efi_open_protocol_info_entry *match = NULL;
2504 bool opened_by_driver = false;
2505 bool opened_exclusive = false;
2506
2507 /* If there is no agent, only return the interface */
2508 if (!agent_handle)
2509 goto out;
2510
2511 /* For TEST_PROTOCOL ignore interface attribute */
2512 if (attributes != EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
2513 *protocol_interface = NULL;
2514
2515 /*
2516 * Check if the protocol is already opened by a driver with the same
2517 * attributes or opened exclusively
2518 */
2519 list_for_each_entry(item, &handler->open_infos, link) {
2520 if (item->info.agent_handle == agent_handle) {
2521 if ((attributes & EFI_OPEN_PROTOCOL_BY_DRIVER) &&
2522 (item->info.attributes == attributes))
2523 return EFI_ALREADY_STARTED;
2524 }
2525 if (item->info.attributes & EFI_OPEN_PROTOCOL_EXCLUSIVE)
2526 opened_exclusive = true;
2527 }
2528
2529 /* Only one controller can open the protocol exclusively */
2530 if (opened_exclusive && attributes &
2531 (EFI_OPEN_PROTOCOL_EXCLUSIVE | EFI_OPEN_PROTOCOL_BY_DRIVER))
2532 return EFI_ACCESS_DENIED;
2533
2534 /* Prepare exclusive opening */
2535 if (attributes & EFI_OPEN_PROTOCOL_EXCLUSIVE) {
2536 /* Try to disconnect controllers */
2537 list_for_each_entry(item, &handler->open_infos, link) {
2538 if (item->info.attributes ==
2539 EFI_OPEN_PROTOCOL_BY_DRIVER)
2540 EFI_CALL(efi_disconnect_controller(
2541 item->info.controller_handle,
2542 item->info.agent_handle,
2543 NULL));
2544 }
2545 opened_by_driver = false;
2546 /* Check if all controllers are disconnected */
2547 list_for_each_entry(item, &handler->open_infos, link) {
2548 if (item->info.attributes & EFI_OPEN_PROTOCOL_BY_DRIVER)
2549 opened_by_driver = true;
2550 }
4f37fa47 2551 /* Only one controller can be connected */
191a41cc
HS
2552 if (opened_by_driver)
2553 return EFI_ACCESS_DENIED;
2554 }
2555
2556 /* Find existing entry */
2557 list_for_each_entry(item, &handler->open_infos, link) {
2558 if (item->info.agent_handle == agent_handle &&
2559 item->info.controller_handle == controller_handle)
2560 match = &item->info;
2561 }
2562 /* None found, create one */
2563 if (!match) {
2564 match = efi_create_open_info(handler);
2565 if (!match)
2566 return EFI_OUT_OF_RESOURCES;
2567 }
2568
2569 match->agent_handle = agent_handle;
2570 match->controller_handle = controller_handle;
2571 match->attributes = attributes;
2572 match->open_count++;
2573
2574out:
2575 /* For TEST_PROTOCOL ignore interface attribute. */
2576 if (attributes != EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
2577 *protocol_interface = handler->protocol_interface;
2578
2579 return EFI_SUCCESS;
2580}
2581
6b03cd10 2582/**
78a88f79
MS
2583 * efi_open_protocol() - open protocol interface on a handle
2584 * @handle: handle on which the protocol shall be opened
2585 * @protocol: GUID of the protocol
2586 * @protocol_interface: interface implementing the protocol
2587 * @agent_handle: handle of the driver
2588 * @controller_handle: handle of the controller
2589 * @attributes: attributes indicating how to open the protocol
332468f7
HS
2590 *
2591 * This function implements the OpenProtocol interface.
332468f7 2592 *
78a88f79
MS
2593 * See the Unified Extensible Firmware Interface (UEFI) specification for
2594 * details.
2595 *
2596 * Return: status code
332468f7 2597 */
faea1041
HS
2598static efi_status_t EFIAPI efi_open_protocol
2599 (efi_handle_t handle, const efi_guid_t *protocol,
2600 void **protocol_interface, efi_handle_t agent_handle,
2601 efi_handle_t controller_handle, uint32_t attributes)
bee91169 2602{
80286e8f 2603 struct efi_handler *handler;
69baec67 2604 efi_status_t r = EFI_INVALID_PARAMETER;
bee91169 2605
778e6af8 2606 EFI_ENTRY("%p, %pUl, %p, %p, %p, 0x%x", handle, protocol,
bee91169
AG
2607 protocol_interface, agent_handle, controller_handle,
2608 attributes);
b5349f74 2609
69baec67
HS
2610 if (!handle || !protocol ||
2611 (!protocol_interface && attributes !=
2612 EFI_OPEN_PROTOCOL_TEST_PROTOCOL)) {
2613 goto out;
2614 }
2615
2616 switch (attributes) {
2617 case EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL:
2618 case EFI_OPEN_PROTOCOL_GET_PROTOCOL:
2619 case EFI_OPEN_PROTOCOL_TEST_PROTOCOL:
2620 break;
2621 case EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER:
2622 if (controller_handle == handle)
2623 goto out;
191a41cc 2624 /* fall-through */
69baec67
HS
2625 case EFI_OPEN_PROTOCOL_BY_DRIVER:
2626 case EFI_OPEN_PROTOCOL_BY_DRIVER | EFI_OPEN_PROTOCOL_EXCLUSIVE:
191a41cc
HS
2627 /* Check that the controller handle is valid */
2628 if (!efi_search_obj(controller_handle))
69baec67 2629 goto out;
191a41cc 2630 /* fall-through */
69baec67 2631 case EFI_OPEN_PROTOCOL_EXCLUSIVE:
191a41cc
HS
2632 /* Check that the agent handle is valid */
2633 if (!efi_search_obj(agent_handle))
69baec67
HS
2634 goto out;
2635 break;
2636 default:
b5349f74
HS
2637 goto out;
2638 }
2639
80286e8f
HS
2640 r = efi_search_protocol(handle, protocol, &handler);
2641 if (r != EFI_SUCCESS)
2642 goto out;
bee91169 2643
191a41cc
HS
2644 r = efi_protocol_open(handler, protocol_interface, agent_handle,
2645 controller_handle, attributes);
bee91169
AG
2646out:
2647 return EFI_EXIT(r);
2648}
2649
a115d565
HS
2650/**
2651 * efi_start_image() - call the entry point of an image
2652 * @image_handle: handle of the image
2653 * @exit_data_size: size of the buffer
2654 * @exit_data: buffer to receive the exit data of the called image
2655 *
2656 * This function implements the StartImage service.
2657 *
2658 * See the Unified Extensible Firmware Interface (UEFI) specification for
2659 * details.
2660 *
2661 * Return: status code
2662 */
2663efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle,
2664 efi_uintn_t *exit_data_size,
2665 u16 **exit_data)
2666{
2667 struct efi_loaded_image_obj *image_obj =
2668 (struct efi_loaded_image_obj *)image_handle;
2669 efi_status_t ret;
bb31c3f7
HS
2670 void *info;
2671 efi_handle_t parent_image = current_image;
a115d565
HS
2672
2673 EFI_ENTRY("%p, %p, %p", image_handle, exit_data_size, exit_data);
2674
bb31c3f7
HS
2675 /* Check parameters */
2676 ret = EFI_CALL(efi_open_protocol(image_handle, &efi_guid_loaded_image,
2677 &info, NULL, NULL,
2678 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
2679 if (ret != EFI_SUCCESS)
2680 return EFI_EXIT(EFI_INVALID_PARAMETER);
2681
a115d565
HS
2682 efi_is_direct_boot = false;
2683
556d8dc9
HS
2684 image_obj->exit_data_size = exit_data_size;
2685 image_obj->exit_data = exit_data;
2686
a115d565
HS
2687 /* call the image! */
2688 if (setjmp(&image_obj->exit_jmp)) {
2689 /*
2690 * We called the entry point of the child image with EFI_CALL
2691 * in the lines below. The child image called the Exit() boot
2692 * service efi_exit() which executed the long jump that brought
2693 * us to the current line. This implies that the second half
2694 * of the EFI_CALL macro has not been executed.
2695 */
2696#ifdef CONFIG_ARM
2697 /*
2698 * efi_exit() called efi_restore_gd(). We have to undo this
2699 * otherwise __efi_entry_check() will put the wrong value into
2700 * app_gd.
2701 */
2702 gd = app_gd;
2703#endif
2704 /*
2705 * To get ready to call EFI_EXIT below we have to execute the
2706 * missed out steps of EFI_CALL.
2707 */
2708 assert(__efi_entry_check());
2709 debug("%sEFI: %lu returned by started image\n",
2710 __efi_nesting_dec(),
2711 (unsigned long)((uintptr_t)image_obj->exit_status &
2712 ~EFI_ERROR_MASK));
bb31c3f7 2713 current_image = parent_image;
a115d565
HS
2714 return EFI_EXIT(image_obj->exit_status);
2715 }
2716
bb31c3f7 2717 current_image = image_handle;
cd73aba6 2718 image_obj->header.type = EFI_OBJECT_TYPE_STARTED_IMAGE;
6b95b38c 2719 EFI_PRINT("Jumping into 0x%p\n", image_obj->entry);
a115d565
HS
2720 ret = EFI_CALL(image_obj->entry(image_handle, &systab));
2721
2722 /*
2723 * Usually UEFI applications call Exit() instead of returning.
2724 * But because the world doesn't consist of ponies and unicorns,
2725 * we're happy to emulate that behavior on behalf of a payload
2726 * that forgot.
2727 */
2728 return EFI_CALL(systab.boottime->exit(image_handle, ret, 0, NULL));
2729}
2730
df116e81
HS
2731/**
2732 * efi_delete_image() - delete loaded image from memory)
2733 *
2734 * @image_obj: handle of the loaded image
2735 * @loaded_image_protocol: loaded image protocol
2736 */
2737static void efi_delete_image(struct efi_loaded_image_obj *image_obj,
2738 struct efi_loaded_image *loaded_image_protocol)
2739{
2740 efi_free_pages((uintptr_t)loaded_image_protocol->image_base,
2741 efi_size_in_pages(loaded_image_protocol->image_size));
2742 efi_delete_handle(&image_obj->header);
2743}
2744
46e99a9c
HS
2745/**
2746 * efi_unload_image() - unload an EFI image
2747 * @image_handle: handle of the image to be unloaded
2748 *
2749 * This function implements the UnloadImage service.
2750 *
2751 * See the Unified Extensible Firmware Interface (UEFI) specification for
2752 * details.
2753 *
2754 * Return: status code
2755 */
2756efi_status_t EFIAPI efi_unload_image(efi_handle_t image_handle)
2757{
df116e81 2758 efi_status_t ret = EFI_SUCCESS;
46e99a9c 2759 struct efi_object *efiobj;
df116e81 2760 struct efi_loaded_image *loaded_image_protocol;
46e99a9c
HS
2761
2762 EFI_ENTRY("%p", image_handle);
46e99a9c 2763
df116e81
HS
2764 efiobj = efi_search_obj(image_handle);
2765 if (!efiobj) {
2766 ret = EFI_INVALID_PARAMETER;
2767 goto out;
2768 }
2769 /* Find the loaded image protocol */
2770 ret = EFI_CALL(efi_open_protocol(image_handle, &efi_guid_loaded_image,
2771 (void **)&loaded_image_protocol,
2772 NULL, NULL,
2773 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
2774 if (ret != EFI_SUCCESS) {
2775 ret = EFI_INVALID_PARAMETER;
2776 goto out;
2777 }
2778 switch (efiobj->type) {
2779 case EFI_OBJECT_TYPE_STARTED_IMAGE:
2780 /* Call the unload function */
2781 if (!loaded_image_protocol->unload) {
2782 ret = EFI_UNSUPPORTED;
2783 goto out;
2784 }
2785 ret = EFI_CALL(loaded_image_protocol->unload(image_handle));
2786 if (ret != EFI_SUCCESS)
2787 goto out;
2788 break;
2789 case EFI_OBJECT_TYPE_LOADED_IMAGE:
2790 break;
2791 default:
2792 ret = EFI_INVALID_PARAMETER;
2793 goto out;
2794 }
2795 efi_delete_image((struct efi_loaded_image_obj *)efiobj,
2796 loaded_image_protocol);
2797out:
2798 return EFI_EXIT(ret);
46e99a9c
HS
2799}
2800
556d8dc9
HS
2801/**
2802 * efi_update_exit_data() - fill exit data parameters of StartImage()
2803 *
2804 * @image_obj image handle
2805 * @exit_data_size size of the exit data buffer
2806 * @exit_data buffer with data returned by UEFI payload
2807 * Return: status code
2808 */
2809static efi_status_t efi_update_exit_data(struct efi_loaded_image_obj *image_obj,
2810 efi_uintn_t exit_data_size,
2811 u16 *exit_data)
2812{
2813 efi_status_t ret;
2814
2815 /*
2816 * If exit_data is not provided to StartImage(), exit_data_size must be
2817 * ignored.
2818 */
2819 if (!image_obj->exit_data)
2820 return EFI_SUCCESS;
2821 if (image_obj->exit_data_size)
2822 *image_obj->exit_data_size = exit_data_size;
2823 if (exit_data_size && exit_data) {
2824 ret = efi_allocate_pool(EFI_BOOT_SERVICES_DATA,
2825 exit_data_size,
2826 (void **)image_obj->exit_data);
2827 if (ret != EFI_SUCCESS)
2828 return ret;
2829 memcpy(*image_obj->exit_data, exit_data, exit_data_size);
2830 } else {
2831 image_obj->exit_data = NULL;
2832 }
2833 return EFI_SUCCESS;
2834}
2835
a115d565
HS
2836/**
2837 * efi_exit() - leave an EFI application or driver
2838 * @image_handle: handle of the application or driver that is exiting
2839 * @exit_status: status code
2840 * @exit_data_size: size of the buffer in bytes
2841 * @exit_data: buffer with data describing an error
2842 *
2843 * This function implements the Exit service.
2844 *
2845 * See the Unified Extensible Firmware Interface (UEFI) specification for
2846 * details.
2847 *
2848 * Return: status code
2849 */
2850static efi_status_t EFIAPI efi_exit(efi_handle_t image_handle,
2851 efi_status_t exit_status,
2852 efi_uintn_t exit_data_size,
2853 u16 *exit_data)
2854{
2855 /*
2856 * TODO: We should call the unload procedure of the loaded
2857 * image protocol.
2858 */
bb31c3f7 2859 efi_status_t ret;
126a43f1 2860 struct efi_loaded_image *loaded_image_protocol;
a115d565
HS
2861 struct efi_loaded_image_obj *image_obj =
2862 (struct efi_loaded_image_obj *)image_handle;
2863
2864 EFI_ENTRY("%p, %ld, %zu, %p", image_handle, exit_status,
2865 exit_data_size, exit_data);
2866
bb31c3f7 2867 /* Check parameters */
bb31c3f7 2868 ret = EFI_CALL(efi_open_protocol(image_handle, &efi_guid_loaded_image,
126a43f1
HS
2869 (void **)&loaded_image_protocol,
2870 NULL, NULL,
bb31c3f7 2871 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
126a43f1
HS
2872 if (ret != EFI_SUCCESS) {
2873 ret = EFI_INVALID_PARAMETER;
bb31c3f7 2874 goto out;
126a43f1
HS
2875 }
2876
2877 /* Unloading of unstarted images */
2878 switch (image_obj->header.type) {
2879 case EFI_OBJECT_TYPE_STARTED_IMAGE:
2880 break;
2881 case EFI_OBJECT_TYPE_LOADED_IMAGE:
2882 efi_delete_image(image_obj, loaded_image_protocol);
2883 ret = EFI_SUCCESS;
2884 goto out;
2885 default:
2886 /* Handle does not refer to loaded image */
2887 ret = EFI_INVALID_PARAMETER;
2888 goto out;
2889 }
2890 /* A started image can only be unloaded it is the last one started. */
2891 if (image_handle != current_image) {
2892 ret = EFI_INVALID_PARAMETER;
2893 goto out;
2894 }
bb31c3f7 2895
556d8dc9
HS
2896 /* Exit data is only foreseen in case of failure. */
2897 if (exit_status != EFI_SUCCESS) {
2898 ret = efi_update_exit_data(image_obj, exit_data_size,
2899 exit_data);
2900 /* Exiting has priority. Don't return error to caller. */
2901 if (ret != EFI_SUCCESS)
2902 EFI_PRINT("%s: out of memory\n", __func__);
2903 }
126a43f1
HS
2904 if (image_obj->image_type == IMAGE_SUBSYSTEM_EFI_APPLICATION ||
2905 exit_status != EFI_SUCCESS)
2906 efi_delete_image(image_obj, loaded_image_protocol);
556d8dc9 2907
a115d565
HS
2908 /* Make sure entry/exit counts for EFI world cross-overs match */
2909 EFI_EXIT(exit_status);
2910
2911 /*
2912 * But longjmp out with the U-Boot gd, not the application's, as
2913 * the other end is a setjmp call inside EFI context.
2914 */
2915 efi_restore_gd();
2916
2917 image_obj->exit_status = exit_status;
2918 longjmp(&image_obj->exit_jmp, 1);
2919
2920 panic("EFI application exited");
bb31c3f7 2921out:
126a43f1 2922 return EFI_EXIT(ret);
a115d565
HS
2923}
2924
6b03cd10 2925/**
78a88f79
MS
2926 * efi_handle_protocol() - get interface of a protocol on a handle
2927 * @handle: handle on which the protocol shall be opened
2928 * @protocol: GUID of the protocol
2929 * @protocol_interface: interface implementing the protocol
332468f7
HS
2930 *
2931 * This function implements the HandleProtocol service.
332468f7 2932 *
78a88f79
MS
2933 * See the Unified Extensible Firmware Interface (UEFI) specification for
2934 * details.
2935 *
2936 * Return: status code
332468f7 2937 */
2074f700 2938static efi_status_t EFIAPI efi_handle_protocol(efi_handle_t handle,
5a9682d0 2939 const efi_guid_t *protocol,
bee91169
AG
2940 void **protocol_interface)
2941{
8e1d329f
HS
2942 return efi_open_protocol(handle, protocol, protocol_interface, NULL,
2943 NULL, EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL);
bee91169
AG
2944}
2945
6b03cd10 2946/**
78a88f79
MS
2947 * efi_bind_controller() - bind a single driver to a controller
2948 * @controller_handle: controller handle
2949 * @driver_image_handle: driver handle
2950 * @remain_device_path: remaining path
6b03cd10 2951 *
78a88f79 2952 * Return: status code
6b03cd10 2953 */
f0959dbe
HS
2954static efi_status_t efi_bind_controller(
2955 efi_handle_t controller_handle,
2956 efi_handle_t driver_image_handle,
2957 struct efi_device_path *remain_device_path)
2958{
2959 struct efi_driver_binding_protocol *binding_protocol;
2960 efi_status_t r;
2961
2962 r = EFI_CALL(efi_open_protocol(driver_image_handle,
2963 &efi_guid_driver_binding_protocol,
2964 (void **)&binding_protocol,
2965 driver_image_handle, NULL,
2966 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
2967 if (r != EFI_SUCCESS)
2968 return r;
2969 r = EFI_CALL(binding_protocol->supported(binding_protocol,
2970 controller_handle,
2971 remain_device_path));
2972 if (r == EFI_SUCCESS)
2973 r = EFI_CALL(binding_protocol->start(binding_protocol,
2974 controller_handle,
2975 remain_device_path));
2976 EFI_CALL(efi_close_protocol(driver_image_handle,
2977 &efi_guid_driver_binding_protocol,
2978 driver_image_handle, NULL));
2979 return r;
2980}
2981
6b03cd10 2982/**
78a88f79
MS
2983 * efi_connect_single_controller() - connect a single driver to a controller
2984 * @controller_handle: controller
2985 * @driver_image_handle: driver
b72aaa87 2986 * @remain_device_path: remaining path
6b03cd10 2987 *
78a88f79 2988 * Return: status code
6b03cd10 2989 */
f0959dbe
HS
2990static efi_status_t efi_connect_single_controller(
2991 efi_handle_t controller_handle,
2992 efi_handle_t *driver_image_handle,
2993 struct efi_device_path *remain_device_path)
2994{
2995 efi_handle_t *buffer;
2996 size_t count;
2997 size_t i;
2998 efi_status_t r;
2999 size_t connected = 0;
3000
3001 /* Get buffer with all handles with driver binding protocol */
3002 r = EFI_CALL(efi_locate_handle_buffer(BY_PROTOCOL,
3003 &efi_guid_driver_binding_protocol,
3004 NULL, &count, &buffer));
3005 if (r != EFI_SUCCESS)
3006 return r;
3007
3008 /* Context Override */
3009 if (driver_image_handle) {
3010 for (; *driver_image_handle; ++driver_image_handle) {
3011 for (i = 0; i < count; ++i) {
3012 if (buffer[i] == *driver_image_handle) {
3013 buffer[i] = NULL;
3014 r = efi_bind_controller(
3015 controller_handle,
3016 *driver_image_handle,
3017 remain_device_path);
3018 /*
3019 * For drivers that do not support the
3020 * controller or are already connected
3021 * we receive an error code here.
3022 */
3023 if (r == EFI_SUCCESS)
3024 ++connected;
3025 }
3026 }
3027 }
3028 }
3029
3030 /*
3031 * TODO: Some overrides are not yet implemented:
3032 * - Platform Driver Override
3033 * - Driver Family Override Search
3034 * - Bus Specific Driver Override
3035 */
3036
3037 /* Driver Binding Search */
3038 for (i = 0; i < count; ++i) {
3039 if (buffer[i]) {
3040 r = efi_bind_controller(controller_handle,
3041 buffer[i],
3042 remain_device_path);
3043 if (r == EFI_SUCCESS)
3044 ++connected;
3045 }
3046 }
3047
3048 efi_free_pool(buffer);
3049 if (!connected)
3050 return EFI_NOT_FOUND;
3051 return EFI_SUCCESS;
3052}
3053
6b03cd10 3054/**
78a88f79
MS
3055 * efi_connect_controller() - connect a controller to a driver
3056 * @controller_handle: handle of the controller
3057 * @driver_image_handle: handle of the driver
3058 * @remain_device_path: device path of a child controller
3059 * @recursive: true to connect all child controllers
f0959dbe
HS
3060 *
3061 * This function implements the ConnectController service.
78a88f79
MS
3062 *
3063 * See the Unified Extensible Firmware Interface (UEFI) specification for
3064 * details.
f0959dbe
HS
3065 *
3066 * First all driver binding protocol handles are tried for binding drivers.
b72aaa87 3067 * Afterwards all handles that have opened a protocol of the controller
f0959dbe
HS
3068 * with EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER are connected to drivers.
3069 *
78a88f79 3070 * Return: status code
f0959dbe
HS
3071 */
3072static efi_status_t EFIAPI efi_connect_controller(
3073 efi_handle_t controller_handle,
3074 efi_handle_t *driver_image_handle,
3075 struct efi_device_path *remain_device_path,
3076 bool recursive)
3077{
3078 efi_status_t r;
3079 efi_status_t ret = EFI_NOT_FOUND;
3080 struct efi_object *efiobj;
3081
d178836b 3082 EFI_ENTRY("%p, %p, %pD, %d", controller_handle, driver_image_handle,
f0959dbe
HS
3083 remain_device_path, recursive);
3084
3085 efiobj = efi_search_obj(controller_handle);
3086 if (!efiobj) {
3087 ret = EFI_INVALID_PARAMETER;
3088 goto out;
3089 }
3090
3091 r = efi_connect_single_controller(controller_handle,
3092 driver_image_handle,
3093 remain_device_path);
3094 if (r == EFI_SUCCESS)
3095 ret = EFI_SUCCESS;
3096 if (recursive) {
3097 struct efi_handler *handler;
3098 struct efi_open_protocol_info_item *item;
3099
3100 list_for_each_entry(handler, &efiobj->protocols, link) {
3101 list_for_each_entry(item, &handler->open_infos, link) {
3102 if (item->info.attributes &
3103 EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER) {
3104 r = EFI_CALL(efi_connect_controller(
3105 item->info.controller_handle,
3106 driver_image_handle,
3107 remain_device_path,
3108 recursive));
3109 if (r == EFI_SUCCESS)
3110 ret = EFI_SUCCESS;
3111 }
3112 }
3113 }
3114 }
3115 /* Check for child controller specified by end node */
3116 if (ret != EFI_SUCCESS && remain_device_path &&
3117 remain_device_path->type == DEVICE_PATH_TYPE_END)
3118 ret = EFI_SUCCESS;
3119out:
3120 return EFI_EXIT(ret);
3121}
3122
6b03cd10 3123/**
78a88f79
MS
3124 * efi_reinstall_protocol_interface() - reinstall protocol interface
3125 * @handle: handle on which the protocol shall be reinstalled
3126 * @protocol: GUID of the protocol to be installed
3127 * @old_interface: interface to be removed
3128 * @new_interface: interface to be installed
e861a120
HS
3129 *
3130 * This function implements the ReinstallProtocolInterface service.
78a88f79
MS
3131 *
3132 * See the Unified Extensible Firmware Interface (UEFI) specification for
3133 * details.
e861a120
HS
3134 *
3135 * The old interface is uninstalled. The new interface is installed.
3136 * Drivers are connected.
3137 *
78a88f79 3138 * Return: status code
e861a120
HS
3139 */
3140static efi_status_t EFIAPI efi_reinstall_protocol_interface(
3141 efi_handle_t handle, const efi_guid_t *protocol,
3142 void *old_interface, void *new_interface)
3143{
3144 efi_status_t ret;
3145
3146 EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, old_interface,
3147 new_interface);
9b47f13b
HS
3148
3149 /* Uninstall protocol but do not delete handle */
3150 ret = efi_uninstall_protocol(handle, protocol, old_interface);
e861a120
HS
3151 if (ret != EFI_SUCCESS)
3152 goto out;
9b47f13b
HS
3153
3154 /* Install the new protocol */
3155 ret = efi_add_protocol(handle, protocol, new_interface);
3156 /*
3157 * The UEFI spec does not specify what should happen to the handle
3158 * if in case of an error no protocol interface remains on the handle.
3159 * So let's do nothing here.
3160 */
e861a120
HS
3161 if (ret != EFI_SUCCESS)
3162 goto out;
3163 /*
3164 * The returned status code has to be ignored.
3165 * Do not create an error if no suitable driver for the handle exists.
3166 */
3167 EFI_CALL(efi_connect_controller(handle, NULL, NULL, true));
3168out:
3169 return EFI_EXIT(ret);
3170}
3171
6b03cd10 3172/**
78a88f79
MS
3173 * efi_get_child_controllers() - get all child controllers associated to a driver
3174 * @efiobj: handle of the controller
3175 * @driver_handle: handle of the driver
3176 * @number_of_children: number of child controllers
3177 * @child_handle_buffer: handles of the the child controllers
6b03cd10 3178 *
3f9b0042
HS
3179 * The allocated buffer has to be freed with free().
3180 *
78a88f79 3181 * Return: status code
3f9b0042
HS
3182 */
3183static efi_status_t efi_get_child_controllers(
3184 struct efi_object *efiobj,
3185 efi_handle_t driver_handle,
3186 efi_uintn_t *number_of_children,
3187 efi_handle_t **child_handle_buffer)
3188{
3189 struct efi_handler *handler;
3190 struct efi_open_protocol_info_item *item;
3191 efi_uintn_t count = 0, i;
3192 bool duplicate;
3193
3194 /* Count all child controller associations */
3195 list_for_each_entry(handler, &efiobj->protocols, link) {
3196 list_for_each_entry(item, &handler->open_infos, link) {
3197 if (item->info.agent_handle == driver_handle &&
3198 item->info.attributes &
3199 EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER)
3200 ++count;
3201 }
3202 }
3203 /*
3204 * Create buffer. In case of duplicate child controller assignments
3205 * the buffer will be too large. But that does not harm.
3206 */
3207 *number_of_children = 0;
3208 *child_handle_buffer = calloc(count, sizeof(efi_handle_t));
3209 if (!*child_handle_buffer)
3210 return EFI_OUT_OF_RESOURCES;
3211 /* Copy unique child handles */
3212 list_for_each_entry(handler, &efiobj->protocols, link) {
3213 list_for_each_entry(item, &handler->open_infos, link) {
3214 if (item->info.agent_handle == driver_handle &&
3215 item->info.attributes &
3216 EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER) {
3217 /* Check this is a new child controller */
3218 duplicate = false;
3219 for (i = 0; i < *number_of_children; ++i) {
3220 if ((*child_handle_buffer)[i] ==
3221 item->info.controller_handle)
3222 duplicate = true;
3223 }
3224 /* Copy handle to buffer */
3225 if (!duplicate) {
3226 i = (*number_of_children)++;
3227 (*child_handle_buffer)[i] =
3228 item->info.controller_handle;
3229 }
3230 }
3231 }
3232 }
3233 return EFI_SUCCESS;
3234}
3235
6b03cd10 3236/**
78a88f79
MS
3237 * efi_disconnect_controller() - disconnect a controller from a driver
3238 * @controller_handle: handle of the controller
3239 * @driver_image_handle: handle of the driver
3240 * @child_handle: handle of the child to destroy
3f9b0042
HS
3241 *
3242 * This function implements the DisconnectController service.
3f9b0042 3243 *
78a88f79
MS
3244 * See the Unified Extensible Firmware Interface (UEFI) specification for
3245 * details.
3246 *
3247 * Return: status code
3f9b0042
HS
3248 */
3249static efi_status_t EFIAPI efi_disconnect_controller(
3250 efi_handle_t controller_handle,
3251 efi_handle_t driver_image_handle,
3252 efi_handle_t child_handle)
3253{
3254 struct efi_driver_binding_protocol *binding_protocol;
3255 efi_handle_t *child_handle_buffer = NULL;
3256 size_t number_of_children = 0;
3257 efi_status_t r;
3258 size_t stop_count = 0;
3259 struct efi_object *efiobj;
3260
3261 EFI_ENTRY("%p, %p, %p", controller_handle, driver_image_handle,
3262 child_handle);
3263
3264 efiobj = efi_search_obj(controller_handle);
3265 if (!efiobj) {
3266 r = EFI_INVALID_PARAMETER;
3267 goto out;
3268 }
3269
3270 if (child_handle && !efi_search_obj(child_handle)) {
3271 r = EFI_INVALID_PARAMETER;
3272 goto out;
3273 }
3274
3275 /* If no driver handle is supplied, disconnect all drivers */
3276 if (!driver_image_handle) {
3277 r = efi_disconnect_all_drivers(efiobj, NULL, child_handle);
3278 goto out;
3279 }
3280
3281 /* Create list of child handles */
3282 if (child_handle) {
3283 number_of_children = 1;
3284 child_handle_buffer = &child_handle;
3285 } else {
3286 efi_get_child_controllers(efiobj,
3287 driver_image_handle,
3288 &number_of_children,
3289 &child_handle_buffer);
3290 }
3291
3292 /* Get the driver binding protocol */
3293 r = EFI_CALL(efi_open_protocol(driver_image_handle,
3294 &efi_guid_driver_binding_protocol,
3295 (void **)&binding_protocol,
3296 driver_image_handle, NULL,
3297 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
3298 if (r != EFI_SUCCESS)
3299 goto out;
3300 /* Remove the children */
3301 if (number_of_children) {
3302 r = EFI_CALL(binding_protocol->stop(binding_protocol,
3303 controller_handle,
3304 number_of_children,
3305 child_handle_buffer));
3306 if (r == EFI_SUCCESS)
3307 ++stop_count;
3308 }
3309 /* Remove the driver */
3310 if (!child_handle)
3311 r = EFI_CALL(binding_protocol->stop(binding_protocol,
3312 controller_handle,
3313 0, NULL));
3314 if (r == EFI_SUCCESS)
3315 ++stop_count;
3316 EFI_CALL(efi_close_protocol(driver_image_handle,
3317 &efi_guid_driver_binding_protocol,
3318 driver_image_handle, NULL));
3319
3320 if (stop_count)
3321 r = EFI_SUCCESS;
3322 else
3323 r = EFI_NOT_FOUND;
3324out:
3325 if (!child_handle)
3326 free(child_handle_buffer);
3327 return EFI_EXIT(r);
3328}
3329
640adadf 3330static struct efi_boot_services efi_boot_services = {
bee91169 3331 .hdr = {
112f2430
HS
3332 .signature = EFI_BOOT_SERVICES_SIGNATURE,
3333 .revision = EFI_SPECIFICATION_VERSION,
71c846ab 3334 .headersize = sizeof(struct efi_boot_services),
bee91169
AG
3335 },
3336 .raise_tpl = efi_raise_tpl,
3337 .restore_tpl = efi_restore_tpl,
3338 .allocate_pages = efi_allocate_pages_ext,
3339 .free_pages = efi_free_pages_ext,
3340 .get_memory_map = efi_get_memory_map_ext,
ead1274b 3341 .allocate_pool = efi_allocate_pool_ext,
42417bc8 3342 .free_pool = efi_free_pool_ext,
49deb455 3343 .create_event = efi_create_event_ext,
bfc72462 3344 .set_timer = efi_set_timer_ext,
bee91169 3345 .wait_for_event = efi_wait_for_event,
c6841592 3346 .signal_event = efi_signal_event_ext,
bee91169
AG
3347 .close_event = efi_close_event,
3348 .check_event = efi_check_event,
1760ef57 3349 .install_protocol_interface = efi_install_protocol_interface,
bee91169 3350 .reinstall_protocol_interface = efi_reinstall_protocol_interface,
cd534083 3351 .uninstall_protocol_interface = efi_uninstall_protocol_interface,
bee91169
AG
3352 .handle_protocol = efi_handle_protocol,
3353 .reserved = NULL,
3354 .register_protocol_notify = efi_register_protocol_notify,
26329584 3355 .locate_handle = efi_locate_handle_ext,
bee91169 3356 .locate_device_path = efi_locate_device_path,
488bf12d 3357 .install_configuration_table = efi_install_configuration_table_ext,
bee91169
AG
3358 .load_image = efi_load_image,
3359 .start_image = efi_start_image,
a86aeaf2 3360 .exit = efi_exit,
bee91169
AG
3361 .unload_image = efi_unload_image,
3362 .exit_boot_services = efi_exit_boot_services,
3363 .get_next_monotonic_count = efi_get_next_monotonic_count,
3364 .stall = efi_stall,
3365 .set_watchdog_timer = efi_set_watchdog_timer,
3366 .connect_controller = efi_connect_controller,
3367 .disconnect_controller = efi_disconnect_controller,
3368 .open_protocol = efi_open_protocol,
3369 .close_protocol = efi_close_protocol,
3370 .open_protocol_information = efi_open_protocol_information,
3371 .protocols_per_handle = efi_protocols_per_handle,
3372 .locate_handle_buffer = efi_locate_handle_buffer,
3373 .locate_protocol = efi_locate_protocol,
ab9efa97
HS
3374 .install_multiple_protocol_interfaces =
3375 efi_install_multiple_protocol_interfaces,
3376 .uninstall_multiple_protocol_interfaces =
3377 efi_uninstall_multiple_protocol_interfaces,
bee91169
AG
3378 .calculate_crc32 = efi_calculate_crc32,
3379 .copy_mem = efi_copy_mem,
3380 .set_mem = efi_set_mem,
9f0930e5 3381 .create_event_ex = efi_create_event_ex,
bee91169
AG
3382};
3383
0b386537 3384static u16 __efi_runtime_data firmware_vendor[] = L"Das U-Boot";
bee91169 3385
3c63db9c 3386struct efi_system_table __efi_runtime_data systab = {
bee91169
AG
3387 .hdr = {
3388 .signature = EFI_SYSTEM_TABLE_SIGNATURE,
112f2430 3389 .revision = EFI_SPECIFICATION_VERSION,
71c846ab 3390 .headersize = sizeof(struct efi_system_table),
bee91169 3391 },
0b386537
HS
3392 .fw_vendor = firmware_vendor,
3393 .fw_revision = FW_VERSION << 16 | FW_PATCHLEVEL << 8,
ab9efa97
HS
3394 .con_in = (void *)&efi_con_in,
3395 .con_out = (void *)&efi_con_out,
3396 .std_err = (void *)&efi_con_out,
3397 .runtime = (void *)&efi_runtime_services,
3398 .boottime = (void *)&efi_boot_services,
bee91169 3399 .nr_tables = 0,
4182a129 3400 .tables = NULL,
bee91169 3401};
640adadf
HS
3402
3403/**
3404 * efi_initialize_system_table() - Initialize system table
3405 *
0414359a 3406 * Return: status code
640adadf
HS
3407 */
3408efi_status_t efi_initialize_system_table(void)
3409{
4182a129
HS
3410 efi_status_t ret;
3411
3412 /* Allocate configuration table array */
3413 ret = efi_allocate_pool(EFI_RUNTIME_SERVICES_DATA,
3414 EFI_MAX_CONFIGURATION_TABLES *
3415 sizeof(struct efi_configuration_table),
3416 (void **)&systab.tables);
3417
b72aaa87 3418 /* Set CRC32 field in table headers */
640adadf
HS
3419 efi_update_table_header_crc32(&systab.hdr);
3420 efi_update_table_header_crc32(&efi_runtime_services.hdr);
3421 efi_update_table_header_crc32(&efi_boot_services.hdr);
4182a129
HS
3422
3423 return ret;
640adadf 3424}