]> git.ipfire.org Git - thirdparty/u-boot.git/blob - lib/efi_loader/efi_boottime.c
Merge tag 'efi-2019-07-rc1' of git://git.denx.de/u-boot-efi
[thirdparty/u-boot.git] / lib / efi_loader / efi_boottime.c
1 // SPDX-License-Identifier: GPL-2.0+
2 /*
3 * EFI application boot time services
4 *
5 * Copyright (c) 2016 Alexander Graf
6 */
7
8 #include <common.h>
9 #include <div64.h>
10 #include <efi_loader.h>
11 #include <environment.h>
12 #include <malloc.h>
13 #include <linux/libfdt_env.h>
14 #include <u-boot/crc.h>
15 #include <bootm.h>
16 #include <watchdog.h>
17
18 DECLARE_GLOBAL_DATA_PTR;
19
20 /* Task priority level */
21 static efi_uintn_t efi_tpl = TPL_APPLICATION;
22
23 /* This list contains all the EFI objects our payload has access to */
24 LIST_HEAD(efi_obj_list);
25
26 /* List of all events */
27 LIST_HEAD(efi_events);
28
29 /* Handle of the currently executing image */
30 static efi_handle_t current_image;
31
32 /*
33 * If we're running on nasty systems (32bit ARM booting into non-EFI Linux)
34 * we need to do trickery with caches. Since we don't want to break the EFI
35 * aware boot path, only apply hacks when loading exiting directly (breaking
36 * direct Linux EFI booting along the way - oh well).
37 */
38 static bool efi_is_direct_boot = true;
39
40 #ifdef CONFIG_ARM
41 /*
42 * The "gd" pointer lives in a register on ARM and AArch64 that we declare
43 * fixed when compiling U-Boot. However, the payload does not know about that
44 * restriction so we need to manually swap its and our view of that register on
45 * EFI callback entry/exit.
46 */
47 static volatile void *efi_gd, *app_gd;
48 #endif
49
50 /* 1 if inside U-Boot code, 0 if inside EFI payload code */
51 static int entry_count = 1;
52 static int nesting_level;
53 /* GUID of the device tree table */
54 const efi_guid_t efi_guid_fdt = EFI_FDT_GUID;
55 /* GUID of the EFI_DRIVER_BINDING_PROTOCOL */
56 const efi_guid_t efi_guid_driver_binding_protocol =
57 EFI_DRIVER_BINDING_PROTOCOL_GUID;
58
59 /* event group ExitBootServices() invoked */
60 const efi_guid_t efi_guid_event_group_exit_boot_services =
61 EFI_EVENT_GROUP_EXIT_BOOT_SERVICES;
62 /* event group SetVirtualAddressMap() invoked */
63 const efi_guid_t efi_guid_event_group_virtual_address_change =
64 EFI_EVENT_GROUP_VIRTUAL_ADDRESS_CHANGE;
65 /* event group memory map changed */
66 const efi_guid_t efi_guid_event_group_memory_map_change =
67 EFI_EVENT_GROUP_MEMORY_MAP_CHANGE;
68 /* event group boot manager about to boot */
69 const efi_guid_t efi_guid_event_group_ready_to_boot =
70 EFI_EVENT_GROUP_READY_TO_BOOT;
71 /* event group ResetSystem() invoked (before ExitBootServices) */
72 const efi_guid_t efi_guid_event_group_reset_system =
73 EFI_EVENT_GROUP_RESET_SYSTEM;
74
75 static efi_status_t EFIAPI efi_disconnect_controller(
76 efi_handle_t controller_handle,
77 efi_handle_t driver_image_handle,
78 efi_handle_t child_handle);
79
80 /* Called on every callback entry */
81 int __efi_entry_check(void)
82 {
83 int ret = entry_count++ == 0;
84 #ifdef CONFIG_ARM
85 assert(efi_gd);
86 app_gd = gd;
87 gd = efi_gd;
88 #endif
89 return ret;
90 }
91
92 /* Called on every callback exit */
93 int __efi_exit_check(void)
94 {
95 int ret = --entry_count == 0;
96 #ifdef CONFIG_ARM
97 gd = app_gd;
98 #endif
99 return ret;
100 }
101
102 /* Called from do_bootefi_exec() */
103 void efi_save_gd(void)
104 {
105 #ifdef CONFIG_ARM
106 efi_gd = gd;
107 #endif
108 }
109
110 /*
111 * Special case handler for error/abort that just forces things back to u-boot
112 * world so we can dump out an abort message, without any care about returning
113 * back to UEFI world.
114 */
115 void efi_restore_gd(void)
116 {
117 #ifdef CONFIG_ARM
118 /* Only restore if we're already in EFI context */
119 if (!efi_gd)
120 return;
121 gd = efi_gd;
122 #endif
123 }
124
125 /**
126 * indent_string() - returns a string for indenting with two spaces per level
127 * @level: indent level
128 *
129 * A maximum of ten indent levels is supported. Higher indent levels will be
130 * truncated.
131 *
132 * Return: A string for indenting with two spaces per level is
133 * returned.
134 */
135 static const char *indent_string(int level)
136 {
137 const char *indent = " ";
138 const int max = strlen(indent);
139
140 level = min(max, level * 2);
141 return &indent[max - level];
142 }
143
144 const char *__efi_nesting(void)
145 {
146 return indent_string(nesting_level);
147 }
148
149 const char *__efi_nesting_inc(void)
150 {
151 return indent_string(nesting_level++);
152 }
153
154 const char *__efi_nesting_dec(void)
155 {
156 return indent_string(--nesting_level);
157 }
158
159 /**
160 * efi_queue_event() - queue an EFI event
161 * @event: event to signal
162 * @check_tpl: check the TPL level
163 *
164 * This function queues the notification function of the event for future
165 * execution.
166 *
167 * The notification function is called if the task priority level of the event
168 * is higher than the current task priority level.
169 *
170 * For the SignalEvent service see efi_signal_event_ext.
171 *
172 */
173 static void efi_queue_event(struct efi_event *event, bool check_tpl)
174 {
175 if (event->notify_function) {
176 event->is_queued = true;
177 /* Check TPL */
178 if (check_tpl && efi_tpl >= event->notify_tpl)
179 return;
180 EFI_CALL_VOID(event->notify_function(event,
181 event->notify_context));
182 }
183 event->is_queued = false;
184 }
185
186 /**
187 * is_valid_tpl() - check if the task priority level is valid
188 *
189 * @tpl: TPL level to check
190 * Return: status code
191 */
192 efi_status_t is_valid_tpl(efi_uintn_t tpl)
193 {
194 switch (tpl) {
195 case TPL_APPLICATION:
196 case TPL_CALLBACK:
197 case TPL_NOTIFY:
198 case TPL_HIGH_LEVEL:
199 return EFI_SUCCESS;
200 default:
201 return EFI_INVALID_PARAMETER;
202 }
203 }
204
205 /**
206 * efi_signal_event() - signal an EFI event
207 * @event: event to signal
208 * @check_tpl: check the TPL level
209 *
210 * This function signals an event. If the event belongs to an event group all
211 * events of the group are signaled. If they are of type EVT_NOTIFY_SIGNAL
212 * their notification function is queued.
213 *
214 * For the SignalEvent service see efi_signal_event_ext.
215 */
216 void efi_signal_event(struct efi_event *event, bool check_tpl)
217 {
218 if (event->group) {
219 struct efi_event *evt;
220
221 /*
222 * The signaled state has to set before executing any
223 * notification function
224 */
225 list_for_each_entry(evt, &efi_events, link) {
226 if (!evt->group || guidcmp(evt->group, event->group))
227 continue;
228 if (evt->is_signaled)
229 continue;
230 evt->is_signaled = true;
231 if (evt->type & EVT_NOTIFY_SIGNAL &&
232 evt->notify_function)
233 evt->is_queued = true;
234 }
235 list_for_each_entry(evt, &efi_events, link) {
236 if (!evt->group || guidcmp(evt->group, event->group))
237 continue;
238 if (evt->is_queued)
239 efi_queue_event(evt, check_tpl);
240 }
241 } else if (!event->is_signaled) {
242 event->is_signaled = true;
243 if (event->type & EVT_NOTIFY_SIGNAL)
244 efi_queue_event(event, check_tpl);
245 }
246 }
247
248 /**
249 * efi_raise_tpl() - raise the task priority level
250 * @new_tpl: new value of the task priority level
251 *
252 * This function implements the RaiseTpl service.
253 *
254 * See the Unified Extensible Firmware Interface (UEFI) specification for
255 * details.
256 *
257 * Return: old value of the task priority level
258 */
259 static unsigned long EFIAPI efi_raise_tpl(efi_uintn_t new_tpl)
260 {
261 efi_uintn_t old_tpl = efi_tpl;
262
263 EFI_ENTRY("0x%zx", new_tpl);
264
265 if (new_tpl < efi_tpl)
266 debug("WARNING: new_tpl < current_tpl in %s\n", __func__);
267 efi_tpl = new_tpl;
268 if (efi_tpl > TPL_HIGH_LEVEL)
269 efi_tpl = TPL_HIGH_LEVEL;
270
271 EFI_EXIT(EFI_SUCCESS);
272 return old_tpl;
273 }
274
275 /**
276 * efi_restore_tpl() - lower the task priority level
277 * @old_tpl: value of the task priority level to be restored
278 *
279 * This function implements the RestoreTpl service.
280 *
281 * See the Unified Extensible Firmware Interface (UEFI) specification for
282 * details.
283 */
284 static void EFIAPI efi_restore_tpl(efi_uintn_t old_tpl)
285 {
286 EFI_ENTRY("0x%zx", old_tpl);
287
288 if (old_tpl > efi_tpl)
289 debug("WARNING: old_tpl > current_tpl in %s\n", __func__);
290 efi_tpl = old_tpl;
291 if (efi_tpl > TPL_HIGH_LEVEL)
292 efi_tpl = TPL_HIGH_LEVEL;
293
294 /*
295 * Lowering the TPL may have made queued events eligible for execution.
296 */
297 efi_timer_check();
298
299 EFI_EXIT(EFI_SUCCESS);
300 }
301
302 /**
303 * efi_allocate_pages_ext() - allocate memory pages
304 * @type: type of allocation to be performed
305 * @memory_type: usage type of the allocated memory
306 * @pages: number of pages to be allocated
307 * @memory: allocated memory
308 *
309 * This function implements the AllocatePages service.
310 *
311 * See the Unified Extensible Firmware Interface (UEFI) specification for
312 * details.
313 *
314 * Return: status code
315 */
316 static efi_status_t EFIAPI efi_allocate_pages_ext(int type, int memory_type,
317 efi_uintn_t pages,
318 uint64_t *memory)
319 {
320 efi_status_t r;
321
322 EFI_ENTRY("%d, %d, 0x%zx, %p", type, memory_type, pages, memory);
323 r = efi_allocate_pages(type, memory_type, pages, memory);
324 return EFI_EXIT(r);
325 }
326
327 /**
328 * efi_free_pages_ext() - Free memory pages.
329 * @memory: start of the memory area to be freed
330 * @pages: number of pages to be freed
331 *
332 * This function implements the FreePages service.
333 *
334 * See the Unified Extensible Firmware Interface (UEFI) specification for
335 * details.
336 *
337 * Return: status code
338 */
339 static efi_status_t EFIAPI efi_free_pages_ext(uint64_t memory,
340 efi_uintn_t pages)
341 {
342 efi_status_t r;
343
344 EFI_ENTRY("%llx, 0x%zx", memory, pages);
345 r = efi_free_pages(memory, pages);
346 return EFI_EXIT(r);
347 }
348
349 /**
350 * efi_get_memory_map_ext() - get map describing memory usage
351 * @memory_map_size: on entry the size, in bytes, of the memory map buffer,
352 * on exit the size of the copied memory map
353 * @memory_map: buffer to which the memory map is written
354 * @map_key: key for the memory map
355 * @descriptor_size: size of an individual memory descriptor
356 * @descriptor_version: version number of the memory descriptor structure
357 *
358 * This function implements the GetMemoryMap service.
359 *
360 * See the Unified Extensible Firmware Interface (UEFI) specification for
361 * details.
362 *
363 * Return: status code
364 */
365 static efi_status_t EFIAPI efi_get_memory_map_ext(
366 efi_uintn_t *memory_map_size,
367 struct efi_mem_desc *memory_map,
368 efi_uintn_t *map_key,
369 efi_uintn_t *descriptor_size,
370 uint32_t *descriptor_version)
371 {
372 efi_status_t r;
373
374 EFI_ENTRY("%p, %p, %p, %p, %p", memory_map_size, memory_map,
375 map_key, descriptor_size, descriptor_version);
376 r = efi_get_memory_map(memory_map_size, memory_map, map_key,
377 descriptor_size, descriptor_version);
378 return EFI_EXIT(r);
379 }
380
381 /**
382 * efi_allocate_pool_ext() - allocate memory from pool
383 * @pool_type: type of the pool from which memory is to be allocated
384 * @size: number of bytes to be allocated
385 * @buffer: allocated memory
386 *
387 * This function implements the AllocatePool service.
388 *
389 * See the Unified Extensible Firmware Interface (UEFI) specification for
390 * details.
391 *
392 * Return: status code
393 */
394 static efi_status_t EFIAPI efi_allocate_pool_ext(int pool_type,
395 efi_uintn_t size,
396 void **buffer)
397 {
398 efi_status_t r;
399
400 EFI_ENTRY("%d, %zd, %p", pool_type, size, buffer);
401 r = efi_allocate_pool(pool_type, size, buffer);
402 return EFI_EXIT(r);
403 }
404
405 /**
406 * efi_free_pool_ext() - free memory from pool
407 * @buffer: start of memory to be freed
408 *
409 * This function implements the FreePool service.
410 *
411 * See the Unified Extensible Firmware Interface (UEFI) specification for
412 * details.
413 *
414 * Return: status code
415 */
416 static efi_status_t EFIAPI efi_free_pool_ext(void *buffer)
417 {
418 efi_status_t r;
419
420 EFI_ENTRY("%p", buffer);
421 r = efi_free_pool(buffer);
422 return EFI_EXIT(r);
423 }
424
425 /**
426 * efi_add_handle() - add a new object to the object list
427 * @obj: object to be added
428 *
429 * The protocols list is initialized. The object handle is set.
430 */
431 void efi_add_handle(efi_handle_t handle)
432 {
433 if (!handle)
434 return;
435 INIT_LIST_HEAD(&handle->protocols);
436 list_add_tail(&handle->link, &efi_obj_list);
437 }
438
439 /**
440 * efi_create_handle() - create handle
441 * @handle: new handle
442 *
443 * Return: status code
444 */
445 efi_status_t efi_create_handle(efi_handle_t *handle)
446 {
447 struct efi_object *obj;
448
449 obj = calloc(1, sizeof(struct efi_object));
450 if (!obj)
451 return EFI_OUT_OF_RESOURCES;
452
453 efi_add_handle(obj);
454 *handle = obj;
455
456 return EFI_SUCCESS;
457 }
458
459 /**
460 * efi_search_protocol() - find a protocol on a handle.
461 * @handle: handle
462 * @protocol_guid: GUID of the protocol
463 * @handler: reference to the protocol
464 *
465 * Return: status code
466 */
467 efi_status_t efi_search_protocol(const efi_handle_t handle,
468 const efi_guid_t *protocol_guid,
469 struct efi_handler **handler)
470 {
471 struct efi_object *efiobj;
472 struct list_head *lhandle;
473
474 if (!handle || !protocol_guid)
475 return EFI_INVALID_PARAMETER;
476 efiobj = efi_search_obj(handle);
477 if (!efiobj)
478 return EFI_INVALID_PARAMETER;
479 list_for_each(lhandle, &efiobj->protocols) {
480 struct efi_handler *protocol;
481
482 protocol = list_entry(lhandle, struct efi_handler, link);
483 if (!guidcmp(protocol->guid, protocol_guid)) {
484 if (handler)
485 *handler = protocol;
486 return EFI_SUCCESS;
487 }
488 }
489 return EFI_NOT_FOUND;
490 }
491
492 /**
493 * efi_remove_protocol() - delete protocol from a handle
494 * @handle: handle from which the protocol shall be deleted
495 * @protocol: GUID of the protocol to be deleted
496 * @protocol_interface: interface of the protocol implementation
497 *
498 * Return: status code
499 */
500 efi_status_t efi_remove_protocol(const efi_handle_t handle,
501 const efi_guid_t *protocol,
502 void *protocol_interface)
503 {
504 struct efi_handler *handler;
505 efi_status_t ret;
506
507 ret = efi_search_protocol(handle, protocol, &handler);
508 if (ret != EFI_SUCCESS)
509 return ret;
510 if (guidcmp(handler->guid, protocol))
511 return EFI_INVALID_PARAMETER;
512 if (handler->protocol_interface != protocol_interface)
513 return EFI_INVALID_PARAMETER;
514 list_del(&handler->link);
515 free(handler);
516 return EFI_SUCCESS;
517 }
518
519 /**
520 * efi_remove_all_protocols() - delete all protocols from a handle
521 * @handle: handle from which the protocols shall be deleted
522 *
523 * Return: status code
524 */
525 efi_status_t efi_remove_all_protocols(const efi_handle_t handle)
526 {
527 struct efi_object *efiobj;
528 struct efi_handler *protocol;
529 struct efi_handler *pos;
530
531 efiobj = efi_search_obj(handle);
532 if (!efiobj)
533 return EFI_INVALID_PARAMETER;
534 list_for_each_entry_safe(protocol, pos, &efiobj->protocols, link) {
535 efi_status_t ret;
536
537 ret = efi_remove_protocol(handle, protocol->guid,
538 protocol->protocol_interface);
539 if (ret != EFI_SUCCESS)
540 return ret;
541 }
542 return EFI_SUCCESS;
543 }
544
545 /**
546 * efi_delete_handle() - delete handle
547 *
548 * @obj: handle to delete
549 */
550 void efi_delete_handle(efi_handle_t handle)
551 {
552 if (!handle)
553 return;
554 efi_remove_all_protocols(handle);
555 list_del(&handle->link);
556 free(handle);
557 }
558
559 /**
560 * efi_is_event() - check if a pointer is a valid event
561 * @event: pointer to check
562 *
563 * Return: status code
564 */
565 static efi_status_t efi_is_event(const struct efi_event *event)
566 {
567 const struct efi_event *evt;
568
569 if (!event)
570 return EFI_INVALID_PARAMETER;
571 list_for_each_entry(evt, &efi_events, link) {
572 if (evt == event)
573 return EFI_SUCCESS;
574 }
575 return EFI_INVALID_PARAMETER;
576 }
577
578 /**
579 * efi_create_event() - create an event
580 * @type: type of the event to create
581 * @notify_tpl: task priority level of the event
582 * @notify_function: notification function of the event
583 * @notify_context: pointer passed to the notification function
584 * @group: event group
585 * @event: created event
586 *
587 * This function is used inside U-Boot code to create an event.
588 *
589 * For the API function implementing the CreateEvent service see
590 * efi_create_event_ext.
591 *
592 * Return: status code
593 */
594 efi_status_t efi_create_event(uint32_t type, efi_uintn_t notify_tpl,
595 void (EFIAPI *notify_function) (
596 struct efi_event *event,
597 void *context),
598 void *notify_context, efi_guid_t *group,
599 struct efi_event **event)
600 {
601 struct efi_event *evt;
602
603 if (event == NULL)
604 return EFI_INVALID_PARAMETER;
605
606 switch (type) {
607 case 0:
608 case EVT_TIMER:
609 case EVT_NOTIFY_SIGNAL:
610 case EVT_TIMER | EVT_NOTIFY_SIGNAL:
611 case EVT_NOTIFY_WAIT:
612 case EVT_TIMER | EVT_NOTIFY_WAIT:
613 case EVT_SIGNAL_EXIT_BOOT_SERVICES:
614 case EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE:
615 break;
616 default:
617 return EFI_INVALID_PARAMETER;
618 }
619
620 if ((type & (EVT_NOTIFY_WAIT | EVT_NOTIFY_SIGNAL)) &&
621 (is_valid_tpl(notify_tpl) != EFI_SUCCESS))
622 return EFI_INVALID_PARAMETER;
623
624 evt = calloc(1, sizeof(struct efi_event));
625 if (!evt)
626 return EFI_OUT_OF_RESOURCES;
627 evt->type = type;
628 evt->notify_tpl = notify_tpl;
629 evt->notify_function = notify_function;
630 evt->notify_context = notify_context;
631 evt->group = group;
632 /* Disable timers on boot up */
633 evt->trigger_next = -1ULL;
634 evt->is_queued = false;
635 evt->is_signaled = false;
636 list_add_tail(&evt->link, &efi_events);
637 *event = evt;
638 return EFI_SUCCESS;
639 }
640
641 /*
642 * efi_create_event_ex() - create an event in a group
643 * @type: type of the event to create
644 * @notify_tpl: task priority level of the event
645 * @notify_function: notification function of the event
646 * @notify_context: pointer passed to the notification function
647 * @event: created event
648 * @event_group: event group
649 *
650 * This function implements the CreateEventEx service.
651 *
652 * See the Unified Extensible Firmware Interface (UEFI) specification for
653 * details.
654 *
655 * Return: status code
656 */
657 efi_status_t EFIAPI efi_create_event_ex(uint32_t type, efi_uintn_t notify_tpl,
658 void (EFIAPI *notify_function) (
659 struct efi_event *event,
660 void *context),
661 void *notify_context,
662 efi_guid_t *event_group,
663 struct efi_event **event)
664 {
665 EFI_ENTRY("%d, 0x%zx, %p, %p, %pUl", type, notify_tpl, notify_function,
666 notify_context, event_group);
667 return EFI_EXIT(efi_create_event(type, notify_tpl, notify_function,
668 notify_context, event_group, event));
669 }
670
671 /**
672 * efi_create_event_ext() - create an event
673 * @type: type of the event to create
674 * @notify_tpl: task priority level of the event
675 * @notify_function: notification function of the event
676 * @notify_context: pointer passed to the notification function
677 * @event: created event
678 *
679 * This function implements the CreateEvent service.
680 *
681 * See the Unified Extensible Firmware Interface (UEFI) specification for
682 * details.
683 *
684 * Return: status code
685 */
686 static efi_status_t EFIAPI efi_create_event_ext(
687 uint32_t type, efi_uintn_t notify_tpl,
688 void (EFIAPI *notify_function) (
689 struct efi_event *event,
690 void *context),
691 void *notify_context, struct efi_event **event)
692 {
693 EFI_ENTRY("%d, 0x%zx, %p, %p", type, notify_tpl, notify_function,
694 notify_context);
695 return EFI_EXIT(efi_create_event(type, notify_tpl, notify_function,
696 notify_context, NULL, event));
697 }
698
699 /**
700 * efi_timer_check() - check if a timer event has occurred
701 *
702 * Check if a timer event has occurred or a queued notification function should
703 * be called.
704 *
705 * Our timers have to work without interrupts, so we check whenever keyboard
706 * input or disk accesses happen if enough time elapsed for them to fire.
707 */
708 void efi_timer_check(void)
709 {
710 struct efi_event *evt;
711 u64 now = timer_get_us();
712
713 list_for_each_entry(evt, &efi_events, link) {
714 if (evt->is_queued)
715 efi_queue_event(evt, true);
716 if (!(evt->type & EVT_TIMER) || now < evt->trigger_next)
717 continue;
718 switch (evt->trigger_type) {
719 case EFI_TIMER_RELATIVE:
720 evt->trigger_type = EFI_TIMER_STOP;
721 break;
722 case EFI_TIMER_PERIODIC:
723 evt->trigger_next += evt->trigger_time;
724 break;
725 default:
726 continue;
727 }
728 evt->is_signaled = false;
729 efi_signal_event(evt, true);
730 }
731 WATCHDOG_RESET();
732 }
733
734 /**
735 * efi_set_timer() - set the trigger time for a timer event or stop the event
736 * @event: event for which the timer is set
737 * @type: type of the timer
738 * @trigger_time: trigger period in multiples of 100 ns
739 *
740 * This is the function for internal usage in U-Boot. For the API function
741 * implementing the SetTimer service see efi_set_timer_ext.
742 *
743 * Return: status code
744 */
745 efi_status_t efi_set_timer(struct efi_event *event, enum efi_timer_delay type,
746 uint64_t trigger_time)
747 {
748 /* Check that the event is valid */
749 if (efi_is_event(event) != EFI_SUCCESS || !(event->type & EVT_TIMER))
750 return EFI_INVALID_PARAMETER;
751
752 /*
753 * The parameter defines a multiple of 100 ns.
754 * We use multiples of 1000 ns. So divide by 10.
755 */
756 do_div(trigger_time, 10);
757
758 switch (type) {
759 case EFI_TIMER_STOP:
760 event->trigger_next = -1ULL;
761 break;
762 case EFI_TIMER_PERIODIC:
763 case EFI_TIMER_RELATIVE:
764 event->trigger_next = timer_get_us() + trigger_time;
765 break;
766 default:
767 return EFI_INVALID_PARAMETER;
768 }
769 event->trigger_type = type;
770 event->trigger_time = trigger_time;
771 event->is_signaled = false;
772 return EFI_SUCCESS;
773 }
774
775 /**
776 * efi_set_timer_ext() - Set the trigger time for a timer event or stop the
777 * event
778 * @event: event for which the timer is set
779 * @type: type of the timer
780 * @trigger_time: trigger period in multiples of 100 ns
781 *
782 * This function implements the SetTimer service.
783 *
784 * See the Unified Extensible Firmware Interface (UEFI) specification for
785 * details.
786 *
787 *
788 * Return: status code
789 */
790 static efi_status_t EFIAPI efi_set_timer_ext(struct efi_event *event,
791 enum efi_timer_delay type,
792 uint64_t trigger_time)
793 {
794 EFI_ENTRY("%p, %d, %llx", event, type, trigger_time);
795 return EFI_EXIT(efi_set_timer(event, type, trigger_time));
796 }
797
798 /**
799 * efi_wait_for_event() - wait for events to be signaled
800 * @num_events: number of events to be waited for
801 * @event: events to be waited for
802 * @index: index of the event that was signaled
803 *
804 * This function implements the WaitForEvent service.
805 *
806 * See the Unified Extensible Firmware Interface (UEFI) specification for
807 * details.
808 *
809 * Return: status code
810 */
811 static efi_status_t EFIAPI efi_wait_for_event(efi_uintn_t num_events,
812 struct efi_event **event,
813 efi_uintn_t *index)
814 {
815 int i;
816
817 EFI_ENTRY("%zd, %p, %p", num_events, event, index);
818
819 /* Check parameters */
820 if (!num_events || !event)
821 return EFI_EXIT(EFI_INVALID_PARAMETER);
822 /* Check TPL */
823 if (efi_tpl != TPL_APPLICATION)
824 return EFI_EXIT(EFI_UNSUPPORTED);
825 for (i = 0; i < num_events; ++i) {
826 if (efi_is_event(event[i]) != EFI_SUCCESS)
827 return EFI_EXIT(EFI_INVALID_PARAMETER);
828 if (!event[i]->type || event[i]->type & EVT_NOTIFY_SIGNAL)
829 return EFI_EXIT(EFI_INVALID_PARAMETER);
830 if (!event[i]->is_signaled)
831 efi_queue_event(event[i], true);
832 }
833
834 /* Wait for signal */
835 for (;;) {
836 for (i = 0; i < num_events; ++i) {
837 if (event[i]->is_signaled)
838 goto out;
839 }
840 /* Allow events to occur. */
841 efi_timer_check();
842 }
843
844 out:
845 /*
846 * Reset the signal which is passed to the caller to allow periodic
847 * events to occur.
848 */
849 event[i]->is_signaled = false;
850 if (index)
851 *index = i;
852
853 return EFI_EXIT(EFI_SUCCESS);
854 }
855
856 /**
857 * efi_signal_event_ext() - signal an EFI event
858 * @event: event to signal
859 *
860 * This function implements the SignalEvent service.
861 *
862 * See the Unified Extensible Firmware Interface (UEFI) specification for
863 * details.
864 *
865 * This functions sets the signaled state of the event and queues the
866 * notification function for execution.
867 *
868 * Return: status code
869 */
870 static efi_status_t EFIAPI efi_signal_event_ext(struct efi_event *event)
871 {
872 EFI_ENTRY("%p", event);
873 if (efi_is_event(event) != EFI_SUCCESS)
874 return EFI_EXIT(EFI_INVALID_PARAMETER);
875 efi_signal_event(event, true);
876 return EFI_EXIT(EFI_SUCCESS);
877 }
878
879 /**
880 * efi_close_event() - close an EFI event
881 * @event: event to close
882 *
883 * This function implements the CloseEvent service.
884 *
885 * See the Unified Extensible Firmware Interface (UEFI) specification for
886 * details.
887 *
888 * Return: status code
889 */
890 static efi_status_t EFIAPI efi_close_event(struct efi_event *event)
891 {
892 EFI_ENTRY("%p", event);
893 if (efi_is_event(event) != EFI_SUCCESS)
894 return EFI_EXIT(EFI_INVALID_PARAMETER);
895 list_del(&event->link);
896 free(event);
897 return EFI_EXIT(EFI_SUCCESS);
898 }
899
900 /**
901 * efi_check_event() - check if an event is signaled
902 * @event: event to check
903 *
904 * This function implements the CheckEvent service.
905 *
906 * See the Unified Extensible Firmware Interface (UEFI) specification for
907 * details.
908 *
909 * If an event is not signaled yet, the notification function is queued. The
910 * signaled state is cleared.
911 *
912 * Return: status code
913 */
914 static efi_status_t EFIAPI efi_check_event(struct efi_event *event)
915 {
916 EFI_ENTRY("%p", event);
917 efi_timer_check();
918 if (efi_is_event(event) != EFI_SUCCESS ||
919 event->type & EVT_NOTIFY_SIGNAL)
920 return EFI_EXIT(EFI_INVALID_PARAMETER);
921 if (!event->is_signaled)
922 efi_queue_event(event, true);
923 if (event->is_signaled) {
924 event->is_signaled = false;
925 return EFI_EXIT(EFI_SUCCESS);
926 }
927 return EFI_EXIT(EFI_NOT_READY);
928 }
929
930 /**
931 * efi_search_obj() - find the internal EFI object for a handle
932 * @handle: handle to find
933 *
934 * Return: EFI object
935 */
936 struct efi_object *efi_search_obj(const efi_handle_t handle)
937 {
938 struct efi_object *efiobj;
939
940 list_for_each_entry(efiobj, &efi_obj_list, link) {
941 if (efiobj == handle)
942 return efiobj;
943 }
944
945 return NULL;
946 }
947
948 /**
949 * efi_open_protocol_info_entry() - create open protocol info entry and add it
950 * to a protocol
951 * @handler: handler of a protocol
952 *
953 * Return: open protocol info entry
954 */
955 static struct efi_open_protocol_info_entry *efi_create_open_info(
956 struct efi_handler *handler)
957 {
958 struct efi_open_protocol_info_item *item;
959
960 item = calloc(1, sizeof(struct efi_open_protocol_info_item));
961 if (!item)
962 return NULL;
963 /* Append the item to the open protocol info list. */
964 list_add_tail(&item->link, &handler->open_infos);
965
966 return &item->info;
967 }
968
969 /**
970 * efi_delete_open_info() - remove an open protocol info entry from a protocol
971 * @item: open protocol info entry to delete
972 *
973 * Return: status code
974 */
975 static efi_status_t efi_delete_open_info(
976 struct efi_open_protocol_info_item *item)
977 {
978 list_del(&item->link);
979 free(item);
980 return EFI_SUCCESS;
981 }
982
983 /**
984 * efi_add_protocol() - install new protocol on a handle
985 * @handle: handle on which the protocol shall be installed
986 * @protocol: GUID of the protocol to be installed
987 * @protocol_interface: interface of the protocol implementation
988 *
989 * Return: status code
990 */
991 efi_status_t efi_add_protocol(const efi_handle_t handle,
992 const efi_guid_t *protocol,
993 void *protocol_interface)
994 {
995 struct efi_object *efiobj;
996 struct efi_handler *handler;
997 efi_status_t ret;
998
999 efiobj = efi_search_obj(handle);
1000 if (!efiobj)
1001 return EFI_INVALID_PARAMETER;
1002 ret = efi_search_protocol(handle, protocol, NULL);
1003 if (ret != EFI_NOT_FOUND)
1004 return EFI_INVALID_PARAMETER;
1005 handler = calloc(1, sizeof(struct efi_handler));
1006 if (!handler)
1007 return EFI_OUT_OF_RESOURCES;
1008 handler->guid = protocol;
1009 handler->protocol_interface = protocol_interface;
1010 INIT_LIST_HEAD(&handler->open_infos);
1011 list_add_tail(&handler->link, &efiobj->protocols);
1012 if (!guidcmp(&efi_guid_device_path, protocol))
1013 EFI_PRINT("installed device path '%pD'\n", protocol_interface);
1014 return EFI_SUCCESS;
1015 }
1016
1017 /**
1018 * efi_install_protocol_interface() - install protocol interface
1019 * @handle: handle on which the protocol shall be installed
1020 * @protocol: GUID of the protocol to be installed
1021 * @protocol_interface_type: type of the interface to be installed,
1022 * always EFI_NATIVE_INTERFACE
1023 * @protocol_interface: interface of the protocol implementation
1024 *
1025 * This function implements the InstallProtocolInterface service.
1026 *
1027 * See the Unified Extensible Firmware Interface (UEFI) specification for
1028 * details.
1029 *
1030 * Return: status code
1031 */
1032 static efi_status_t EFIAPI efi_install_protocol_interface(
1033 efi_handle_t *handle, const efi_guid_t *protocol,
1034 int protocol_interface_type, void *protocol_interface)
1035 {
1036 efi_status_t r;
1037
1038 EFI_ENTRY("%p, %pUl, %d, %p", handle, protocol, protocol_interface_type,
1039 protocol_interface);
1040
1041 if (!handle || !protocol ||
1042 protocol_interface_type != EFI_NATIVE_INTERFACE) {
1043 r = EFI_INVALID_PARAMETER;
1044 goto out;
1045 }
1046
1047 /* Create new handle if requested. */
1048 if (!*handle) {
1049 r = efi_create_handle(handle);
1050 if (r != EFI_SUCCESS)
1051 goto out;
1052 debug("%sEFI: new handle %p\n", indent_string(nesting_level),
1053 *handle);
1054 } else {
1055 debug("%sEFI: handle %p\n", indent_string(nesting_level),
1056 *handle);
1057 }
1058 /* Add new protocol */
1059 r = efi_add_protocol(*handle, protocol, protocol_interface);
1060 out:
1061 return EFI_EXIT(r);
1062 }
1063
1064 /**
1065 * efi_get_drivers() - get all drivers associated to a controller
1066 * @handle: handle of the controller
1067 * @protocol: protocol GUID (optional)
1068 * @number_of_drivers: number of child controllers
1069 * @driver_handle_buffer: handles of the the drivers
1070 *
1071 * The allocated buffer has to be freed with free().
1072 *
1073 * Return: status code
1074 */
1075 static efi_status_t efi_get_drivers(efi_handle_t handle,
1076 const efi_guid_t *protocol,
1077 efi_uintn_t *number_of_drivers,
1078 efi_handle_t **driver_handle_buffer)
1079 {
1080 struct efi_handler *handler;
1081 struct efi_open_protocol_info_item *item;
1082 efi_uintn_t count = 0, i;
1083 bool duplicate;
1084
1085 /* Count all driver associations */
1086 list_for_each_entry(handler, &handle->protocols, link) {
1087 if (protocol && guidcmp(handler->guid, protocol))
1088 continue;
1089 list_for_each_entry(item, &handler->open_infos, link) {
1090 if (item->info.attributes &
1091 EFI_OPEN_PROTOCOL_BY_DRIVER)
1092 ++count;
1093 }
1094 }
1095 /*
1096 * Create buffer. In case of duplicate driver assignments the buffer
1097 * will be too large. But that does not harm.
1098 */
1099 *number_of_drivers = 0;
1100 *driver_handle_buffer = calloc(count, sizeof(efi_handle_t));
1101 if (!*driver_handle_buffer)
1102 return EFI_OUT_OF_RESOURCES;
1103 /* Collect unique driver handles */
1104 list_for_each_entry(handler, &handle->protocols, link) {
1105 if (protocol && guidcmp(handler->guid, protocol))
1106 continue;
1107 list_for_each_entry(item, &handler->open_infos, link) {
1108 if (item->info.attributes &
1109 EFI_OPEN_PROTOCOL_BY_DRIVER) {
1110 /* Check this is a new driver */
1111 duplicate = false;
1112 for (i = 0; i < *number_of_drivers; ++i) {
1113 if ((*driver_handle_buffer)[i] ==
1114 item->info.agent_handle)
1115 duplicate = true;
1116 }
1117 /* Copy handle to buffer */
1118 if (!duplicate) {
1119 i = (*number_of_drivers)++;
1120 (*driver_handle_buffer)[i] =
1121 item->info.agent_handle;
1122 }
1123 }
1124 }
1125 }
1126 return EFI_SUCCESS;
1127 }
1128
1129 /**
1130 * efi_disconnect_all_drivers() - disconnect all drivers from a controller
1131 * @handle: handle of the controller
1132 * @protocol: protocol GUID (optional)
1133 * @child_handle: handle of the child to destroy
1134 *
1135 * This function implements the DisconnectController service.
1136 *
1137 * See the Unified Extensible Firmware Interface (UEFI) specification for
1138 * details.
1139 *
1140 * Return: status code
1141 */
1142 static efi_status_t efi_disconnect_all_drivers
1143 (efi_handle_t handle,
1144 const efi_guid_t *protocol,
1145 efi_handle_t child_handle)
1146 {
1147 efi_uintn_t number_of_drivers;
1148 efi_handle_t *driver_handle_buffer;
1149 efi_status_t r, ret;
1150
1151 ret = efi_get_drivers(handle, protocol, &number_of_drivers,
1152 &driver_handle_buffer);
1153 if (ret != EFI_SUCCESS)
1154 return ret;
1155
1156 ret = EFI_NOT_FOUND;
1157 while (number_of_drivers) {
1158 r = EFI_CALL(efi_disconnect_controller(
1159 handle,
1160 driver_handle_buffer[--number_of_drivers],
1161 child_handle));
1162 if (r == EFI_SUCCESS)
1163 ret = r;
1164 }
1165 free(driver_handle_buffer);
1166 return ret;
1167 }
1168
1169 /**
1170 * efi_uninstall_protocol() - uninstall protocol interface
1171 *
1172 * @handle: handle from which the protocol shall be removed
1173 * @protocol: GUID of the protocol to be removed
1174 * @protocol_interface: interface to be removed
1175 *
1176 * This function DOES NOT delete a handle without installed protocol.
1177 *
1178 * Return: status code
1179 */
1180 static efi_status_t efi_uninstall_protocol
1181 (efi_handle_t handle, const efi_guid_t *protocol,
1182 void *protocol_interface)
1183 {
1184 struct efi_object *efiobj;
1185 struct efi_handler *handler;
1186 struct efi_open_protocol_info_item *item;
1187 struct efi_open_protocol_info_item *pos;
1188 efi_status_t r;
1189
1190 /* Check handle */
1191 efiobj = efi_search_obj(handle);
1192 if (!efiobj) {
1193 r = EFI_INVALID_PARAMETER;
1194 goto out;
1195 }
1196 /* Find the protocol on the handle */
1197 r = efi_search_protocol(handle, protocol, &handler);
1198 if (r != EFI_SUCCESS)
1199 goto out;
1200 /* Disconnect controllers */
1201 efi_disconnect_all_drivers(efiobj, protocol, NULL);
1202 if (!list_empty(&handler->open_infos)) {
1203 r = EFI_ACCESS_DENIED;
1204 goto out;
1205 }
1206 /* Close protocol */
1207 list_for_each_entry_safe(item, pos, &handler->open_infos, link) {
1208 if (item->info.attributes ==
1209 EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL ||
1210 item->info.attributes == EFI_OPEN_PROTOCOL_GET_PROTOCOL ||
1211 item->info.attributes == EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
1212 list_del(&item->link);
1213 }
1214 if (!list_empty(&handler->open_infos)) {
1215 r = EFI_ACCESS_DENIED;
1216 goto out;
1217 }
1218 r = efi_remove_protocol(handle, protocol, protocol_interface);
1219 out:
1220 return r;
1221 }
1222
1223 /**
1224 * efi_uninstall_protocol_interface() - uninstall protocol interface
1225 * @handle: handle from which the protocol shall be removed
1226 * @protocol: GUID of the protocol to be removed
1227 * @protocol_interface: interface to be removed
1228 *
1229 * This function implements the UninstallProtocolInterface service.
1230 *
1231 * See the Unified Extensible Firmware Interface (UEFI) specification for
1232 * details.
1233 *
1234 * Return: status code
1235 */
1236 static efi_status_t EFIAPI efi_uninstall_protocol_interface
1237 (efi_handle_t handle, const efi_guid_t *protocol,
1238 void *protocol_interface)
1239 {
1240 efi_status_t ret;
1241
1242 EFI_ENTRY("%p, %pUl, %p", handle, protocol, protocol_interface);
1243
1244 ret = efi_uninstall_protocol(handle, protocol, protocol_interface);
1245 if (ret != EFI_SUCCESS)
1246 goto out;
1247
1248 /* If the last protocol has been removed, delete the handle. */
1249 if (list_empty(&handle->protocols)) {
1250 list_del(&handle->link);
1251 free(handle);
1252 }
1253 out:
1254 return EFI_EXIT(ret);
1255 }
1256
1257 /**
1258 * efi_register_protocol_notify() - register an event for notification when a
1259 * protocol is installed.
1260 * @protocol: GUID of the protocol whose installation shall be notified
1261 * @event: event to be signaled upon installation of the protocol
1262 * @registration: key for retrieving the registration information
1263 *
1264 * This function implements the RegisterProtocolNotify service.
1265 * See the Unified Extensible Firmware Interface (UEFI) specification
1266 * for details.
1267 *
1268 * Return: status code
1269 */
1270 static efi_status_t EFIAPI efi_register_protocol_notify(
1271 const efi_guid_t *protocol,
1272 struct efi_event *event,
1273 void **registration)
1274 {
1275 EFI_ENTRY("%pUl, %p, %p", protocol, event, registration);
1276 return EFI_EXIT(EFI_OUT_OF_RESOURCES);
1277 }
1278
1279 /**
1280 * efi_search() - determine if an EFI handle implements a protocol
1281 * @search_type: selection criterion
1282 * @protocol: GUID of the protocol
1283 * @search_key: registration key
1284 * @handle: handle
1285 *
1286 * See the documentation of the LocateHandle service in the UEFI specification.
1287 *
1288 * Return: 0 if the handle implements the protocol
1289 */
1290 static int efi_search(enum efi_locate_search_type search_type,
1291 const efi_guid_t *protocol, void *search_key,
1292 efi_handle_t handle)
1293 {
1294 efi_status_t ret;
1295
1296 switch (search_type) {
1297 case ALL_HANDLES:
1298 return 0;
1299 case BY_REGISTER_NOTIFY:
1300 /* TODO: RegisterProtocolNotify is not implemented yet */
1301 return -1;
1302 case BY_PROTOCOL:
1303 ret = efi_search_protocol(handle, protocol, NULL);
1304 return (ret != EFI_SUCCESS);
1305 default:
1306 /* Invalid search type */
1307 return -1;
1308 }
1309 }
1310
1311 /**
1312 * efi_locate_handle() - locate handles implementing a protocol
1313 * @search_type: selection criterion
1314 * @protocol: GUID of the protocol
1315 * @search_key: registration key
1316 * @buffer_size: size of the buffer to receive the handles in bytes
1317 * @buffer: buffer to receive the relevant handles
1318 *
1319 * This function is meant for U-Boot internal calls. For the API implementation
1320 * of the LocateHandle service see efi_locate_handle_ext.
1321 *
1322 * Return: status code
1323 */
1324 static efi_status_t efi_locate_handle(
1325 enum efi_locate_search_type search_type,
1326 const efi_guid_t *protocol, void *search_key,
1327 efi_uintn_t *buffer_size, efi_handle_t *buffer)
1328 {
1329 struct efi_object *efiobj;
1330 efi_uintn_t size = 0;
1331
1332 /* Check parameters */
1333 switch (search_type) {
1334 case ALL_HANDLES:
1335 break;
1336 case BY_REGISTER_NOTIFY:
1337 if (!search_key)
1338 return EFI_INVALID_PARAMETER;
1339 /* RegisterProtocolNotify is not implemented yet */
1340 return EFI_UNSUPPORTED;
1341 case BY_PROTOCOL:
1342 if (!protocol)
1343 return EFI_INVALID_PARAMETER;
1344 break;
1345 default:
1346 return EFI_INVALID_PARAMETER;
1347 }
1348
1349 /*
1350 * efi_locate_handle_buffer uses this function for
1351 * the calculation of the necessary buffer size.
1352 * So do not require a buffer for buffersize == 0.
1353 */
1354 if (!buffer_size || (*buffer_size && !buffer))
1355 return EFI_INVALID_PARAMETER;
1356
1357 /* Count how much space we need */
1358 list_for_each_entry(efiobj, &efi_obj_list, link) {
1359 if (!efi_search(search_type, protocol, search_key, efiobj))
1360 size += sizeof(void *);
1361 }
1362
1363 if (*buffer_size < size) {
1364 *buffer_size = size;
1365 return EFI_BUFFER_TOO_SMALL;
1366 }
1367
1368 *buffer_size = size;
1369 if (size == 0)
1370 return EFI_NOT_FOUND;
1371
1372 /* Then fill the array */
1373 list_for_each_entry(efiobj, &efi_obj_list, link) {
1374 if (!efi_search(search_type, protocol, search_key, efiobj))
1375 *buffer++ = efiobj;
1376 }
1377
1378 return EFI_SUCCESS;
1379 }
1380
1381 /**
1382 * efi_locate_handle_ext() - locate handles implementing a protocol.
1383 * @search_type: selection criterion
1384 * @protocol: GUID of the protocol
1385 * @search_key: registration key
1386 * @buffer_size: size of the buffer to receive the handles in bytes
1387 * @buffer: buffer to receive the relevant handles
1388 *
1389 * This function implements the LocateHandle service.
1390 *
1391 * See the Unified Extensible Firmware Interface (UEFI) specification for
1392 * details.
1393 *
1394 * Return: 0 if the handle implements the protocol
1395 */
1396 static efi_status_t EFIAPI efi_locate_handle_ext(
1397 enum efi_locate_search_type search_type,
1398 const efi_guid_t *protocol, void *search_key,
1399 efi_uintn_t *buffer_size, efi_handle_t *buffer)
1400 {
1401 EFI_ENTRY("%d, %pUl, %p, %p, %p", search_type, protocol, search_key,
1402 buffer_size, buffer);
1403
1404 return EFI_EXIT(efi_locate_handle(search_type, protocol, search_key,
1405 buffer_size, buffer));
1406 }
1407
1408 /**
1409 * efi_remove_configuration_table() - collapses configuration table entries,
1410 * removing index i
1411 *
1412 * @i: index of the table entry to be removed
1413 */
1414 static void efi_remove_configuration_table(int i)
1415 {
1416 struct efi_configuration_table *this = &systab.tables[i];
1417 struct efi_configuration_table *next = &systab.tables[i + 1];
1418 struct efi_configuration_table *end = &systab.tables[systab.nr_tables];
1419
1420 memmove(this, next, (ulong)end - (ulong)next);
1421 systab.nr_tables--;
1422 }
1423
1424 /**
1425 * efi_install_configuration_table() - adds, updates, or removes a
1426 * configuration table
1427 * @guid: GUID of the installed table
1428 * @table: table to be installed
1429 *
1430 * This function is used for internal calls. For the API implementation of the
1431 * InstallConfigurationTable service see efi_install_configuration_table_ext.
1432 *
1433 * Return: status code
1434 */
1435 efi_status_t efi_install_configuration_table(const efi_guid_t *guid,
1436 void *table)
1437 {
1438 struct efi_event *evt;
1439 int i;
1440
1441 if (!guid)
1442 return EFI_INVALID_PARAMETER;
1443
1444 /* Check for GUID override */
1445 for (i = 0; i < systab.nr_tables; i++) {
1446 if (!guidcmp(guid, &systab.tables[i].guid)) {
1447 if (table)
1448 systab.tables[i].table = table;
1449 else
1450 efi_remove_configuration_table(i);
1451 goto out;
1452 }
1453 }
1454
1455 if (!table)
1456 return EFI_NOT_FOUND;
1457
1458 /* No override, check for overflow */
1459 if (i >= EFI_MAX_CONFIGURATION_TABLES)
1460 return EFI_OUT_OF_RESOURCES;
1461
1462 /* Add a new entry */
1463 memcpy(&systab.tables[i].guid, guid, sizeof(*guid));
1464 systab.tables[i].table = table;
1465 systab.nr_tables = i + 1;
1466
1467 out:
1468 /* systab.nr_tables may have changed. So we need to update the CRC32 */
1469 efi_update_table_header_crc32(&systab.hdr);
1470
1471 /* Notify that the configuration table was changed */
1472 list_for_each_entry(evt, &efi_events, link) {
1473 if (evt->group && !guidcmp(evt->group, guid)) {
1474 efi_signal_event(evt, false);
1475 break;
1476 }
1477 }
1478
1479 return EFI_SUCCESS;
1480 }
1481
1482 /**
1483 * efi_install_configuration_table_ex() - Adds, updates, or removes a
1484 * configuration table.
1485 * @guid: GUID of the installed table
1486 * @table: table to be installed
1487 *
1488 * This function implements the InstallConfigurationTable service.
1489 *
1490 * See the Unified Extensible Firmware Interface (UEFI) specification for
1491 * details.
1492 *
1493 * Return: status code
1494 */
1495 static efi_status_t EFIAPI efi_install_configuration_table_ext(efi_guid_t *guid,
1496 void *table)
1497 {
1498 EFI_ENTRY("%pUl, %p", guid, table);
1499 return EFI_EXIT(efi_install_configuration_table(guid, table));
1500 }
1501
1502 /**
1503 * efi_setup_loaded_image() - initialize a loaded image
1504 *
1505 * Initialize a loaded_image_info and loaded_image_info object with correct
1506 * protocols, boot-device, etc.
1507 *
1508 * In case of an error *handle_ptr and *info_ptr are set to NULL and an error
1509 * code is returned.
1510 *
1511 * @device_path: device path of the loaded image
1512 * @file_path: file path of the loaded image
1513 * @handle_ptr: handle of the loaded image
1514 * @info_ptr: loaded image protocol
1515 * Return: status code
1516 */
1517 efi_status_t efi_setup_loaded_image(struct efi_device_path *device_path,
1518 struct efi_device_path *file_path,
1519 struct efi_loaded_image_obj **handle_ptr,
1520 struct efi_loaded_image **info_ptr)
1521 {
1522 efi_status_t ret;
1523 struct efi_loaded_image *info = NULL;
1524 struct efi_loaded_image_obj *obj = NULL;
1525 struct efi_device_path *dp;
1526
1527 /* In case of EFI_OUT_OF_RESOURCES avoid illegal free by caller. */
1528 *handle_ptr = NULL;
1529 *info_ptr = NULL;
1530
1531 info = calloc(1, sizeof(*info));
1532 if (!info)
1533 return EFI_OUT_OF_RESOURCES;
1534 obj = calloc(1, sizeof(*obj));
1535 if (!obj) {
1536 free(info);
1537 return EFI_OUT_OF_RESOURCES;
1538 }
1539
1540 /* Add internal object to object list */
1541 efi_add_handle(&obj->header);
1542
1543 info->revision = EFI_LOADED_IMAGE_PROTOCOL_REVISION;
1544 info->file_path = file_path;
1545 info->system_table = &systab;
1546
1547 if (device_path) {
1548 info->device_handle = efi_dp_find_obj(device_path, NULL);
1549
1550 dp = efi_dp_append(device_path, file_path);
1551 if (!dp) {
1552 ret = EFI_OUT_OF_RESOURCES;
1553 goto failure;
1554 }
1555 } else {
1556 dp = NULL;
1557 }
1558 ret = efi_add_protocol(&obj->header,
1559 &efi_guid_loaded_image_device_path, dp);
1560 if (ret != EFI_SUCCESS)
1561 goto failure;
1562
1563 /*
1564 * When asking for the loaded_image interface, just
1565 * return handle which points to loaded_image_info
1566 */
1567 ret = efi_add_protocol(&obj->header,
1568 &efi_guid_loaded_image, info);
1569 if (ret != EFI_SUCCESS)
1570 goto failure;
1571
1572 #if CONFIG_IS_ENABLED(EFI_LOADER_HII)
1573 ret = efi_add_protocol(&obj->header,
1574 &efi_guid_hii_string_protocol,
1575 (void *)&efi_hii_string);
1576 if (ret != EFI_SUCCESS)
1577 goto failure;
1578
1579 ret = efi_add_protocol(&obj->header,
1580 &efi_guid_hii_database_protocol,
1581 (void *)&efi_hii_database);
1582 if (ret != EFI_SUCCESS)
1583 goto failure;
1584
1585 ret = efi_add_protocol(&obj->header,
1586 &efi_guid_hii_config_routing_protocol,
1587 (void *)&efi_hii_config_routing);
1588 if (ret != EFI_SUCCESS)
1589 goto failure;
1590 #endif
1591
1592 *info_ptr = info;
1593 *handle_ptr = obj;
1594
1595 return ret;
1596 failure:
1597 printf("ERROR: Failure to install protocols for loaded image\n");
1598 efi_delete_handle(&obj->header);
1599 free(info);
1600 return ret;
1601 }
1602
1603 /**
1604 * efi_load_image_from_path() - load an image using a file path
1605 *
1606 * Read a file into a buffer allocated as EFI_BOOT_SERVICES_DATA. It is the
1607 * callers obligation to update the memory type as needed.
1608 *
1609 * @file_path: the path of the image to load
1610 * @buffer: buffer containing the loaded image
1611 * @size: size of the loaded image
1612 * Return: status code
1613 */
1614 efi_status_t efi_load_image_from_path(struct efi_device_path *file_path,
1615 void **buffer, efi_uintn_t *size)
1616 {
1617 struct efi_file_info *info = NULL;
1618 struct efi_file_handle *f;
1619 static efi_status_t ret;
1620 u64 addr;
1621 efi_uintn_t bs;
1622
1623 /* In case of failure nothing is returned */
1624 *buffer = NULL;
1625 *size = 0;
1626
1627 /* Open file */
1628 f = efi_file_from_path(file_path);
1629 if (!f)
1630 return EFI_DEVICE_ERROR;
1631
1632 /* Get file size */
1633 bs = 0;
1634 EFI_CALL(ret = f->getinfo(f, (efi_guid_t *)&efi_file_info_guid,
1635 &bs, info));
1636 if (ret != EFI_BUFFER_TOO_SMALL) {
1637 ret = EFI_DEVICE_ERROR;
1638 goto error;
1639 }
1640
1641 info = malloc(bs);
1642 EFI_CALL(ret = f->getinfo(f, (efi_guid_t *)&efi_file_info_guid, &bs,
1643 info));
1644 if (ret != EFI_SUCCESS)
1645 goto error;
1646
1647 /*
1648 * When reading the file we do not yet know if it contains an
1649 * application, a boottime driver, or a runtime driver. So here we
1650 * allocate a buffer as EFI_BOOT_SERVICES_DATA. The caller has to
1651 * update the reservation according to the image type.
1652 */
1653 bs = info->file_size;
1654 ret = efi_allocate_pages(EFI_ALLOCATE_ANY_PAGES,
1655 EFI_BOOT_SERVICES_DATA,
1656 efi_size_in_pages(bs), &addr);
1657 if (ret != EFI_SUCCESS) {
1658 ret = EFI_OUT_OF_RESOURCES;
1659 goto error;
1660 }
1661
1662 /* Read file */
1663 EFI_CALL(ret = f->read(f, &bs, (void *)(uintptr_t)addr));
1664 if (ret != EFI_SUCCESS)
1665 efi_free_pages(addr, efi_size_in_pages(bs));
1666 *buffer = (void *)(uintptr_t)addr;
1667 *size = bs;
1668 error:
1669 EFI_CALL(f->close(f));
1670 free(info);
1671 return ret;
1672 }
1673
1674 /**
1675 * efi_load_image() - load an EFI image into memory
1676 * @boot_policy: true for request originating from the boot manager
1677 * @parent_image: the caller's image handle
1678 * @file_path: the path of the image to load
1679 * @source_buffer: memory location from which the image is installed
1680 * @source_size: size of the memory area from which the image is installed
1681 * @image_handle: handle for the newly installed image
1682 *
1683 * This function implements the LoadImage service.
1684 *
1685 * See the Unified Extensible Firmware Interface (UEFI) specification
1686 * for details.
1687 *
1688 * Return: status code
1689 */
1690 efi_status_t EFIAPI efi_load_image(bool boot_policy,
1691 efi_handle_t parent_image,
1692 struct efi_device_path *file_path,
1693 void *source_buffer,
1694 efi_uintn_t source_size,
1695 efi_handle_t *image_handle)
1696 {
1697 struct efi_device_path *dp, *fp;
1698 struct efi_loaded_image *info = NULL;
1699 struct efi_loaded_image_obj **image_obj =
1700 (struct efi_loaded_image_obj **)image_handle;
1701 efi_status_t ret;
1702 void *dest_buffer;
1703
1704 EFI_ENTRY("%d, %p, %pD, %p, %zd, %p", boot_policy, parent_image,
1705 file_path, source_buffer, source_size, image_handle);
1706
1707 if (!image_handle || !parent_image) {
1708 ret = EFI_INVALID_PARAMETER;
1709 goto error;
1710 }
1711
1712 if (!source_buffer && !file_path) {
1713 ret = EFI_NOT_FOUND;
1714 goto error;
1715 }
1716
1717 if (!source_buffer) {
1718 ret = efi_load_image_from_path(file_path, &dest_buffer,
1719 &source_size);
1720 if (ret != EFI_SUCCESS)
1721 goto error;
1722 /*
1723 * split file_path which contains both the device and
1724 * file parts:
1725 */
1726 efi_dp_split_file_path(file_path, &dp, &fp);
1727 } else {
1728 /* In this case, file_path is the "device" path, i.e.
1729 * something like a HARDWARE_DEVICE:MEMORY_MAPPED
1730 */
1731 dest_buffer = source_buffer;
1732 dp = file_path;
1733 fp = NULL;
1734 }
1735 ret = efi_setup_loaded_image(dp, fp, image_obj, &info);
1736 if (ret == EFI_SUCCESS)
1737 ret = efi_load_pe(*image_obj, dest_buffer, info);
1738 if (!source_buffer)
1739 /* Release buffer to which file was loaded */
1740 efi_free_pages((uintptr_t)dest_buffer,
1741 efi_size_in_pages(source_size));
1742 if (ret == EFI_SUCCESS) {
1743 info->system_table = &systab;
1744 info->parent_handle = parent_image;
1745 } else {
1746 /* The image is invalid. Release all associated resources. */
1747 efi_delete_handle(*image_handle);
1748 *image_handle = NULL;
1749 free(info);
1750 }
1751 error:
1752 return EFI_EXIT(ret);
1753 }
1754
1755 /**
1756 * efi_unload_image() - unload an EFI image
1757 * @image_handle: handle of the image to be unloaded
1758 *
1759 * This function implements the UnloadImage service.
1760 *
1761 * See the Unified Extensible Firmware Interface (UEFI) specification for
1762 * details.
1763 *
1764 * Return: status code
1765 */
1766 efi_status_t EFIAPI efi_unload_image(efi_handle_t image_handle)
1767 {
1768 struct efi_object *efiobj;
1769
1770 EFI_ENTRY("%p", image_handle);
1771 efiobj = efi_search_obj(image_handle);
1772 if (efiobj)
1773 list_del(&efiobj->link);
1774
1775 return EFI_EXIT(EFI_SUCCESS);
1776 }
1777
1778 /**
1779 * efi_exit_caches() - fix up caches for EFI payloads if necessary
1780 */
1781 static void efi_exit_caches(void)
1782 {
1783 #if defined(CONFIG_ARM) && !defined(CONFIG_ARM64)
1784 /*
1785 * Grub on 32bit ARM needs to have caches disabled before jumping into
1786 * a zImage, but does not know of all cache layers. Give it a hand.
1787 */
1788 if (efi_is_direct_boot)
1789 cleanup_before_linux();
1790 #endif
1791 }
1792
1793 /**
1794 * efi_exit_boot_services() - stop all boot services
1795 * @image_handle: handle of the loaded image
1796 * @map_key: key of the memory map
1797 *
1798 * This function implements the ExitBootServices service.
1799 *
1800 * See the Unified Extensible Firmware Interface (UEFI) specification
1801 * for details.
1802 *
1803 * All timer events are disabled. For exit boot services events the
1804 * notification function is called. The boot services are disabled in the
1805 * system table.
1806 *
1807 * Return: status code
1808 */
1809 static efi_status_t EFIAPI efi_exit_boot_services(efi_handle_t image_handle,
1810 unsigned long map_key)
1811 {
1812 struct efi_event *evt;
1813
1814 EFI_ENTRY("%p, %ld", image_handle, map_key);
1815
1816 /* Check that the caller has read the current memory map */
1817 if (map_key != efi_memory_map_key)
1818 return EFI_INVALID_PARAMETER;
1819
1820 /* Make sure that notification functions are not called anymore */
1821 efi_tpl = TPL_HIGH_LEVEL;
1822
1823 /* Check if ExitBootServices has already been called */
1824 if (!systab.boottime)
1825 return EFI_EXIT(EFI_SUCCESS);
1826
1827 /* Add related events to the event group */
1828 list_for_each_entry(evt, &efi_events, link) {
1829 if (evt->type == EVT_SIGNAL_EXIT_BOOT_SERVICES)
1830 evt->group = &efi_guid_event_group_exit_boot_services;
1831 }
1832 /* Notify that ExitBootServices is invoked. */
1833 list_for_each_entry(evt, &efi_events, link) {
1834 if (evt->group &&
1835 !guidcmp(evt->group,
1836 &efi_guid_event_group_exit_boot_services)) {
1837 efi_signal_event(evt, false);
1838 break;
1839 }
1840 }
1841
1842 /* TODO: Should persist EFI variables here */
1843
1844 board_quiesce_devices();
1845
1846 /* Fix up caches for EFI payloads if necessary */
1847 efi_exit_caches();
1848
1849 /* This stops all lingering devices */
1850 bootm_disable_interrupts();
1851
1852 /* Disable boot time services */
1853 systab.con_in_handle = NULL;
1854 systab.con_in = NULL;
1855 systab.con_out_handle = NULL;
1856 systab.con_out = NULL;
1857 systab.stderr_handle = NULL;
1858 systab.std_err = NULL;
1859 systab.boottime = NULL;
1860
1861 /* Recalculate CRC32 */
1862 efi_update_table_header_crc32(&systab.hdr);
1863
1864 /* Give the payload some time to boot */
1865 efi_set_watchdog(0);
1866 WATCHDOG_RESET();
1867
1868 return EFI_EXIT(EFI_SUCCESS);
1869 }
1870
1871 /**
1872 * efi_get_next_monotonic_count() - get next value of the counter
1873 * @count: returned value of the counter
1874 *
1875 * This function implements the NextMonotonicCount service.
1876 *
1877 * See the Unified Extensible Firmware Interface (UEFI) specification for
1878 * details.
1879 *
1880 * Return: status code
1881 */
1882 static efi_status_t EFIAPI efi_get_next_monotonic_count(uint64_t *count)
1883 {
1884 static uint64_t mono;
1885
1886 EFI_ENTRY("%p", count);
1887 *count = mono++;
1888 return EFI_EXIT(EFI_SUCCESS);
1889 }
1890
1891 /**
1892 * efi_stall() - sleep
1893 * @microseconds: period to sleep in microseconds
1894 *
1895 * This function implements the Stall service.
1896 *
1897 * See the Unified Extensible Firmware Interface (UEFI) specification for
1898 * details.
1899 *
1900 * Return: status code
1901 */
1902 static efi_status_t EFIAPI efi_stall(unsigned long microseconds)
1903 {
1904 EFI_ENTRY("%ld", microseconds);
1905 udelay(microseconds);
1906 return EFI_EXIT(EFI_SUCCESS);
1907 }
1908
1909 /**
1910 * efi_set_watchdog_timer() - reset the watchdog timer
1911 * @timeout: seconds before reset by watchdog
1912 * @watchdog_code: code to be logged when resetting
1913 * @data_size: size of buffer in bytes
1914 * @watchdog_data: buffer with data describing the reset reason
1915 *
1916 * This function implements the SetWatchdogTimer service.
1917 *
1918 * See the Unified Extensible Firmware Interface (UEFI) specification for
1919 * details.
1920 *
1921 * Return: status code
1922 */
1923 static efi_status_t EFIAPI efi_set_watchdog_timer(unsigned long timeout,
1924 uint64_t watchdog_code,
1925 unsigned long data_size,
1926 uint16_t *watchdog_data)
1927 {
1928 EFI_ENTRY("%ld, 0x%llx, %ld, %p", timeout, watchdog_code,
1929 data_size, watchdog_data);
1930 return EFI_EXIT(efi_set_watchdog(timeout));
1931 }
1932
1933 /**
1934 * efi_close_protocol() - close a protocol
1935 * @handle: handle on which the protocol shall be closed
1936 * @protocol: GUID of the protocol to close
1937 * @agent_handle: handle of the driver
1938 * @controller_handle: handle of the controller
1939 *
1940 * This function implements the CloseProtocol service.
1941 *
1942 * See the Unified Extensible Firmware Interface (UEFI) specification for
1943 * details.
1944 *
1945 * Return: status code
1946 */
1947 static efi_status_t EFIAPI efi_close_protocol(efi_handle_t handle,
1948 const efi_guid_t *protocol,
1949 efi_handle_t agent_handle,
1950 efi_handle_t controller_handle)
1951 {
1952 struct efi_handler *handler;
1953 struct efi_open_protocol_info_item *item;
1954 struct efi_open_protocol_info_item *pos;
1955 efi_status_t r;
1956
1957 EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, agent_handle,
1958 controller_handle);
1959
1960 if (!agent_handle) {
1961 r = EFI_INVALID_PARAMETER;
1962 goto out;
1963 }
1964 r = efi_search_protocol(handle, protocol, &handler);
1965 if (r != EFI_SUCCESS)
1966 goto out;
1967
1968 r = EFI_NOT_FOUND;
1969 list_for_each_entry_safe(item, pos, &handler->open_infos, link) {
1970 if (item->info.agent_handle == agent_handle &&
1971 item->info.controller_handle == controller_handle) {
1972 efi_delete_open_info(item);
1973 r = EFI_SUCCESS;
1974 break;
1975 }
1976 }
1977 out:
1978 return EFI_EXIT(r);
1979 }
1980
1981 /**
1982 * efi_open_protocol_information() - provide information about then open status
1983 * of a protocol on a handle
1984 * @handle: handle for which the information shall be retrieved
1985 * @protocol: GUID of the protocol
1986 * @entry_buffer: buffer to receive the open protocol information
1987 * @entry_count: number of entries available in the buffer
1988 *
1989 * This function implements the OpenProtocolInformation service.
1990 *
1991 * See the Unified Extensible Firmware Interface (UEFI) specification for
1992 * details.
1993 *
1994 * Return: status code
1995 */
1996 static efi_status_t EFIAPI efi_open_protocol_information(
1997 efi_handle_t handle, const efi_guid_t *protocol,
1998 struct efi_open_protocol_info_entry **entry_buffer,
1999 efi_uintn_t *entry_count)
2000 {
2001 unsigned long buffer_size;
2002 unsigned long count;
2003 struct efi_handler *handler;
2004 struct efi_open_protocol_info_item *item;
2005 efi_status_t r;
2006
2007 EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, entry_buffer,
2008 entry_count);
2009
2010 /* Check parameters */
2011 if (!entry_buffer) {
2012 r = EFI_INVALID_PARAMETER;
2013 goto out;
2014 }
2015 r = efi_search_protocol(handle, protocol, &handler);
2016 if (r != EFI_SUCCESS)
2017 goto out;
2018
2019 /* Count entries */
2020 count = 0;
2021 list_for_each_entry(item, &handler->open_infos, link) {
2022 if (item->info.open_count)
2023 ++count;
2024 }
2025 *entry_count = count;
2026 *entry_buffer = NULL;
2027 if (!count) {
2028 r = EFI_SUCCESS;
2029 goto out;
2030 }
2031
2032 /* Copy entries */
2033 buffer_size = count * sizeof(struct efi_open_protocol_info_entry);
2034 r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
2035 (void **)entry_buffer);
2036 if (r != EFI_SUCCESS)
2037 goto out;
2038 list_for_each_entry_reverse(item, &handler->open_infos, link) {
2039 if (item->info.open_count)
2040 (*entry_buffer)[--count] = item->info;
2041 }
2042 out:
2043 return EFI_EXIT(r);
2044 }
2045
2046 /**
2047 * efi_protocols_per_handle() - get protocols installed on a handle
2048 * @handle: handle for which the information is retrieved
2049 * @protocol_buffer: buffer with protocol GUIDs
2050 * @protocol_buffer_count: number of entries in the buffer
2051 *
2052 * This function implements the ProtocolsPerHandleService.
2053 *
2054 * See the Unified Extensible Firmware Interface (UEFI) specification for
2055 * details.
2056 *
2057 * Return: status code
2058 */
2059 static efi_status_t EFIAPI efi_protocols_per_handle(
2060 efi_handle_t handle, efi_guid_t ***protocol_buffer,
2061 efi_uintn_t *protocol_buffer_count)
2062 {
2063 unsigned long buffer_size;
2064 struct efi_object *efiobj;
2065 struct list_head *protocol_handle;
2066 efi_status_t r;
2067
2068 EFI_ENTRY("%p, %p, %p", handle, protocol_buffer,
2069 protocol_buffer_count);
2070
2071 if (!handle || !protocol_buffer || !protocol_buffer_count)
2072 return EFI_EXIT(EFI_INVALID_PARAMETER);
2073
2074 *protocol_buffer = NULL;
2075 *protocol_buffer_count = 0;
2076
2077 efiobj = efi_search_obj(handle);
2078 if (!efiobj)
2079 return EFI_EXIT(EFI_INVALID_PARAMETER);
2080
2081 /* Count protocols */
2082 list_for_each(protocol_handle, &efiobj->protocols) {
2083 ++*protocol_buffer_count;
2084 }
2085
2086 /* Copy GUIDs */
2087 if (*protocol_buffer_count) {
2088 size_t j = 0;
2089
2090 buffer_size = sizeof(efi_guid_t *) * *protocol_buffer_count;
2091 r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
2092 (void **)protocol_buffer);
2093 if (r != EFI_SUCCESS)
2094 return EFI_EXIT(r);
2095 list_for_each(protocol_handle, &efiobj->protocols) {
2096 struct efi_handler *protocol;
2097
2098 protocol = list_entry(protocol_handle,
2099 struct efi_handler, link);
2100 (*protocol_buffer)[j] = (void *)protocol->guid;
2101 ++j;
2102 }
2103 }
2104
2105 return EFI_EXIT(EFI_SUCCESS);
2106 }
2107
2108 /**
2109 * efi_locate_handle_buffer() - locate handles implementing a protocol
2110 * @search_type: selection criterion
2111 * @protocol: GUID of the protocol
2112 * @search_key: registration key
2113 * @no_handles: number of returned handles
2114 * @buffer: buffer with the returned handles
2115 *
2116 * This function implements the LocateHandleBuffer service.
2117 *
2118 * See the Unified Extensible Firmware Interface (UEFI) specification for
2119 * details.
2120 *
2121 * Return: status code
2122 */
2123 static efi_status_t EFIAPI efi_locate_handle_buffer(
2124 enum efi_locate_search_type search_type,
2125 const efi_guid_t *protocol, void *search_key,
2126 efi_uintn_t *no_handles, efi_handle_t **buffer)
2127 {
2128 efi_status_t r;
2129 efi_uintn_t buffer_size = 0;
2130
2131 EFI_ENTRY("%d, %pUl, %p, %p, %p", search_type, protocol, search_key,
2132 no_handles, buffer);
2133
2134 if (!no_handles || !buffer) {
2135 r = EFI_INVALID_PARAMETER;
2136 goto out;
2137 }
2138 *no_handles = 0;
2139 *buffer = NULL;
2140 r = efi_locate_handle(search_type, protocol, search_key, &buffer_size,
2141 *buffer);
2142 if (r != EFI_BUFFER_TOO_SMALL)
2143 goto out;
2144 r = efi_allocate_pool(EFI_BOOT_SERVICES_DATA, buffer_size,
2145 (void **)buffer);
2146 if (r != EFI_SUCCESS)
2147 goto out;
2148 r = efi_locate_handle(search_type, protocol, search_key, &buffer_size,
2149 *buffer);
2150 if (r == EFI_SUCCESS)
2151 *no_handles = buffer_size / sizeof(efi_handle_t);
2152 out:
2153 return EFI_EXIT(r);
2154 }
2155
2156 /**
2157 * efi_locate_protocol() - find an interface implementing a protocol
2158 * @protocol: GUID of the protocol
2159 * @registration: registration key passed to the notification function
2160 * @protocol_interface: interface implementing the protocol
2161 *
2162 * This function implements the LocateProtocol service.
2163 *
2164 * See the Unified Extensible Firmware Interface (UEFI) specification for
2165 * details.
2166 *
2167 * Return: status code
2168 */
2169 static efi_status_t EFIAPI efi_locate_protocol(const efi_guid_t *protocol,
2170 void *registration,
2171 void **protocol_interface)
2172 {
2173 struct list_head *lhandle;
2174 efi_status_t ret;
2175
2176 EFI_ENTRY("%pUl, %p, %p", protocol, registration, protocol_interface);
2177
2178 if (!protocol || !protocol_interface)
2179 return EFI_EXIT(EFI_INVALID_PARAMETER);
2180
2181 list_for_each(lhandle, &efi_obj_list) {
2182 struct efi_object *efiobj;
2183 struct efi_handler *handler;
2184
2185 efiobj = list_entry(lhandle, struct efi_object, link);
2186
2187 ret = efi_search_protocol(efiobj, protocol, &handler);
2188 if (ret == EFI_SUCCESS) {
2189 *protocol_interface = handler->protocol_interface;
2190 return EFI_EXIT(EFI_SUCCESS);
2191 }
2192 }
2193 *protocol_interface = NULL;
2194
2195 return EFI_EXIT(EFI_NOT_FOUND);
2196 }
2197
2198 /**
2199 * efi_locate_device_path() - Get the device path and handle of an device
2200 * implementing a protocol
2201 * @protocol: GUID of the protocol
2202 * @device_path: device path
2203 * @device: handle of the device
2204 *
2205 * This function implements the LocateDevicePath service.
2206 *
2207 * See the Unified Extensible Firmware Interface (UEFI) specification for
2208 * details.
2209 *
2210 * Return: status code
2211 */
2212 static efi_status_t EFIAPI efi_locate_device_path(
2213 const efi_guid_t *protocol,
2214 struct efi_device_path **device_path,
2215 efi_handle_t *device)
2216 {
2217 struct efi_device_path *dp;
2218 size_t i;
2219 struct efi_handler *handler;
2220 efi_handle_t *handles;
2221 size_t len, len_dp;
2222 size_t len_best = 0;
2223 efi_uintn_t no_handles;
2224 u8 *remainder;
2225 efi_status_t ret;
2226
2227 EFI_ENTRY("%pUl, %p, %p", protocol, device_path, device);
2228
2229 if (!protocol || !device_path || !*device_path || !device) {
2230 ret = EFI_INVALID_PARAMETER;
2231 goto out;
2232 }
2233
2234 /* Find end of device path */
2235 len = efi_dp_instance_size(*device_path);
2236
2237 /* Get all handles implementing the protocol */
2238 ret = EFI_CALL(efi_locate_handle_buffer(BY_PROTOCOL, protocol, NULL,
2239 &no_handles, &handles));
2240 if (ret != EFI_SUCCESS)
2241 goto out;
2242
2243 for (i = 0; i < no_handles; ++i) {
2244 /* Find the device path protocol */
2245 ret = efi_search_protocol(handles[i], &efi_guid_device_path,
2246 &handler);
2247 if (ret != EFI_SUCCESS)
2248 continue;
2249 dp = (struct efi_device_path *)handler->protocol_interface;
2250 len_dp = efi_dp_instance_size(dp);
2251 /*
2252 * This handle can only be a better fit
2253 * if its device path length is longer than the best fit and
2254 * if its device path length is shorter of equal the searched
2255 * device path.
2256 */
2257 if (len_dp <= len_best || len_dp > len)
2258 continue;
2259 /* Check if dp is a subpath of device_path */
2260 if (memcmp(*device_path, dp, len_dp))
2261 continue;
2262 *device = handles[i];
2263 len_best = len_dp;
2264 }
2265 if (len_best) {
2266 remainder = (u8 *)*device_path + len_best;
2267 *device_path = (struct efi_device_path *)remainder;
2268 ret = EFI_SUCCESS;
2269 } else {
2270 ret = EFI_NOT_FOUND;
2271 }
2272 out:
2273 return EFI_EXIT(ret);
2274 }
2275
2276 /**
2277 * efi_install_multiple_protocol_interfaces() - Install multiple protocol
2278 * interfaces
2279 * @handle: handle on which the protocol interfaces shall be installed
2280 * @...: NULL terminated argument list with pairs of protocol GUIDS and
2281 * interfaces
2282 *
2283 * This function implements the MultipleProtocolInterfaces service.
2284 *
2285 * See the Unified Extensible Firmware Interface (UEFI) specification for
2286 * details.
2287 *
2288 * Return: status code
2289 */
2290 static efi_status_t EFIAPI efi_install_multiple_protocol_interfaces
2291 (efi_handle_t *handle, ...)
2292 {
2293 EFI_ENTRY("%p", handle);
2294
2295 efi_va_list argptr;
2296 const efi_guid_t *protocol;
2297 void *protocol_interface;
2298 efi_status_t r = EFI_SUCCESS;
2299 int i = 0;
2300
2301 if (!handle)
2302 return EFI_EXIT(EFI_INVALID_PARAMETER);
2303
2304 efi_va_start(argptr, handle);
2305 for (;;) {
2306 protocol = efi_va_arg(argptr, efi_guid_t*);
2307 if (!protocol)
2308 break;
2309 protocol_interface = efi_va_arg(argptr, void*);
2310 r = EFI_CALL(efi_install_protocol_interface(
2311 handle, protocol,
2312 EFI_NATIVE_INTERFACE,
2313 protocol_interface));
2314 if (r != EFI_SUCCESS)
2315 break;
2316 i++;
2317 }
2318 efi_va_end(argptr);
2319 if (r == EFI_SUCCESS)
2320 return EFI_EXIT(r);
2321
2322 /* If an error occurred undo all changes. */
2323 efi_va_start(argptr, handle);
2324 for (; i; --i) {
2325 protocol = efi_va_arg(argptr, efi_guid_t*);
2326 protocol_interface = efi_va_arg(argptr, void*);
2327 EFI_CALL(efi_uninstall_protocol_interface(*handle, protocol,
2328 protocol_interface));
2329 }
2330 efi_va_end(argptr);
2331
2332 return EFI_EXIT(r);
2333 }
2334
2335 /**
2336 * efi_uninstall_multiple_protocol_interfaces() - uninstall multiple protocol
2337 * interfaces
2338 * @handle: handle from which the protocol interfaces shall be removed
2339 * @...: NULL terminated argument list with pairs of protocol GUIDS and
2340 * interfaces
2341 *
2342 * This function implements the UninstallMultipleProtocolInterfaces service.
2343 *
2344 * See the Unified Extensible Firmware Interface (UEFI) specification for
2345 * details.
2346 *
2347 * Return: status code
2348 */
2349 static efi_status_t EFIAPI efi_uninstall_multiple_protocol_interfaces(
2350 efi_handle_t handle, ...)
2351 {
2352 EFI_ENTRY("%p", handle);
2353
2354 efi_va_list argptr;
2355 const efi_guid_t *protocol;
2356 void *protocol_interface;
2357 efi_status_t r = EFI_SUCCESS;
2358 size_t i = 0;
2359
2360 if (!handle)
2361 return EFI_EXIT(EFI_INVALID_PARAMETER);
2362
2363 efi_va_start(argptr, handle);
2364 for (;;) {
2365 protocol = efi_va_arg(argptr, efi_guid_t*);
2366 if (!protocol)
2367 break;
2368 protocol_interface = efi_va_arg(argptr, void*);
2369 r = efi_uninstall_protocol(handle, protocol,
2370 protocol_interface);
2371 if (r != EFI_SUCCESS)
2372 break;
2373 i++;
2374 }
2375 efi_va_end(argptr);
2376 if (r == EFI_SUCCESS) {
2377 /* If the last protocol has been removed, delete the handle. */
2378 if (list_empty(&handle->protocols)) {
2379 list_del(&handle->link);
2380 free(handle);
2381 }
2382 return EFI_EXIT(r);
2383 }
2384
2385 /* If an error occurred undo all changes. */
2386 efi_va_start(argptr, handle);
2387 for (; i; --i) {
2388 protocol = efi_va_arg(argptr, efi_guid_t*);
2389 protocol_interface = efi_va_arg(argptr, void*);
2390 EFI_CALL(efi_install_protocol_interface(&handle, protocol,
2391 EFI_NATIVE_INTERFACE,
2392 protocol_interface));
2393 }
2394 efi_va_end(argptr);
2395
2396 /* In case of an error always return EFI_INVALID_PARAMETER */
2397 return EFI_EXIT(EFI_INVALID_PARAMETER);
2398 }
2399
2400 /**
2401 * efi_calculate_crc32() - calculate cyclic redundancy code
2402 * @data: buffer with data
2403 * @data_size: size of buffer in bytes
2404 * @crc32_p: cyclic redundancy code
2405 *
2406 * This function implements the CalculateCrc32 service.
2407 *
2408 * See the Unified Extensible Firmware Interface (UEFI) specification for
2409 * details.
2410 *
2411 * Return: status code
2412 */
2413 static efi_status_t EFIAPI efi_calculate_crc32(const void *data,
2414 efi_uintn_t data_size,
2415 u32 *crc32_p)
2416 {
2417 EFI_ENTRY("%p, %zu", data, data_size);
2418 *crc32_p = crc32(0, data, data_size);
2419 return EFI_EXIT(EFI_SUCCESS);
2420 }
2421
2422 /**
2423 * efi_copy_mem() - copy memory
2424 * @destination: destination of the copy operation
2425 * @source: source of the copy operation
2426 * @length: number of bytes to copy
2427 *
2428 * This function implements the CopyMem service.
2429 *
2430 * See the Unified Extensible Firmware Interface (UEFI) specification for
2431 * details.
2432 */
2433 static void EFIAPI efi_copy_mem(void *destination, const void *source,
2434 size_t length)
2435 {
2436 EFI_ENTRY("%p, %p, %ld", destination, source, (unsigned long)length);
2437 memmove(destination, source, length);
2438 EFI_EXIT(EFI_SUCCESS);
2439 }
2440
2441 /**
2442 * efi_set_mem() - Fill memory with a byte value.
2443 * @buffer: buffer to fill
2444 * @size: size of buffer in bytes
2445 * @value: byte to copy to the buffer
2446 *
2447 * This function implements the SetMem service.
2448 *
2449 * See the Unified Extensible Firmware Interface (UEFI) specification for
2450 * details.
2451 */
2452 static void EFIAPI efi_set_mem(void *buffer, size_t size, uint8_t value)
2453 {
2454 EFI_ENTRY("%p, %ld, 0x%x", buffer, (unsigned long)size, value);
2455 memset(buffer, value, size);
2456 EFI_EXIT(EFI_SUCCESS);
2457 }
2458
2459 /**
2460 * efi_protocol_open() - open protocol interface on a handle
2461 * @handler: handler of a protocol
2462 * @protocol_interface: interface implementing the protocol
2463 * @agent_handle: handle of the driver
2464 * @controller_handle: handle of the controller
2465 * @attributes: attributes indicating how to open the protocol
2466 *
2467 * Return: status code
2468 */
2469 static efi_status_t efi_protocol_open(
2470 struct efi_handler *handler,
2471 void **protocol_interface, void *agent_handle,
2472 void *controller_handle, uint32_t attributes)
2473 {
2474 struct efi_open_protocol_info_item *item;
2475 struct efi_open_protocol_info_entry *match = NULL;
2476 bool opened_by_driver = false;
2477 bool opened_exclusive = false;
2478
2479 /* If there is no agent, only return the interface */
2480 if (!agent_handle)
2481 goto out;
2482
2483 /* For TEST_PROTOCOL ignore interface attribute */
2484 if (attributes != EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
2485 *protocol_interface = NULL;
2486
2487 /*
2488 * Check if the protocol is already opened by a driver with the same
2489 * attributes or opened exclusively
2490 */
2491 list_for_each_entry(item, &handler->open_infos, link) {
2492 if (item->info.agent_handle == agent_handle) {
2493 if ((attributes & EFI_OPEN_PROTOCOL_BY_DRIVER) &&
2494 (item->info.attributes == attributes))
2495 return EFI_ALREADY_STARTED;
2496 }
2497 if (item->info.attributes & EFI_OPEN_PROTOCOL_EXCLUSIVE)
2498 opened_exclusive = true;
2499 }
2500
2501 /* Only one controller can open the protocol exclusively */
2502 if (opened_exclusive && attributes &
2503 (EFI_OPEN_PROTOCOL_EXCLUSIVE | EFI_OPEN_PROTOCOL_BY_DRIVER))
2504 return EFI_ACCESS_DENIED;
2505
2506 /* Prepare exclusive opening */
2507 if (attributes & EFI_OPEN_PROTOCOL_EXCLUSIVE) {
2508 /* Try to disconnect controllers */
2509 list_for_each_entry(item, &handler->open_infos, link) {
2510 if (item->info.attributes ==
2511 EFI_OPEN_PROTOCOL_BY_DRIVER)
2512 EFI_CALL(efi_disconnect_controller(
2513 item->info.controller_handle,
2514 item->info.agent_handle,
2515 NULL));
2516 }
2517 opened_by_driver = false;
2518 /* Check if all controllers are disconnected */
2519 list_for_each_entry(item, &handler->open_infos, link) {
2520 if (item->info.attributes & EFI_OPEN_PROTOCOL_BY_DRIVER)
2521 opened_by_driver = true;
2522 }
2523 /* Only one controller can be connected */
2524 if (opened_by_driver)
2525 return EFI_ACCESS_DENIED;
2526 }
2527
2528 /* Find existing entry */
2529 list_for_each_entry(item, &handler->open_infos, link) {
2530 if (item->info.agent_handle == agent_handle &&
2531 item->info.controller_handle == controller_handle)
2532 match = &item->info;
2533 }
2534 /* None found, create one */
2535 if (!match) {
2536 match = efi_create_open_info(handler);
2537 if (!match)
2538 return EFI_OUT_OF_RESOURCES;
2539 }
2540
2541 match->agent_handle = agent_handle;
2542 match->controller_handle = controller_handle;
2543 match->attributes = attributes;
2544 match->open_count++;
2545
2546 out:
2547 /* For TEST_PROTOCOL ignore interface attribute. */
2548 if (attributes != EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
2549 *protocol_interface = handler->protocol_interface;
2550
2551 return EFI_SUCCESS;
2552 }
2553
2554 /**
2555 * efi_open_protocol() - open protocol interface on a handle
2556 * @handle: handle on which the protocol shall be opened
2557 * @protocol: GUID of the protocol
2558 * @protocol_interface: interface implementing the protocol
2559 * @agent_handle: handle of the driver
2560 * @controller_handle: handle of the controller
2561 * @attributes: attributes indicating how to open the protocol
2562 *
2563 * This function implements the OpenProtocol interface.
2564 *
2565 * See the Unified Extensible Firmware Interface (UEFI) specification for
2566 * details.
2567 *
2568 * Return: status code
2569 */
2570 static efi_status_t EFIAPI efi_open_protocol
2571 (efi_handle_t handle, const efi_guid_t *protocol,
2572 void **protocol_interface, efi_handle_t agent_handle,
2573 efi_handle_t controller_handle, uint32_t attributes)
2574 {
2575 struct efi_handler *handler;
2576 efi_status_t r = EFI_INVALID_PARAMETER;
2577
2578 EFI_ENTRY("%p, %pUl, %p, %p, %p, 0x%x", handle, protocol,
2579 protocol_interface, agent_handle, controller_handle,
2580 attributes);
2581
2582 if (!handle || !protocol ||
2583 (!protocol_interface && attributes !=
2584 EFI_OPEN_PROTOCOL_TEST_PROTOCOL)) {
2585 goto out;
2586 }
2587
2588 switch (attributes) {
2589 case EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL:
2590 case EFI_OPEN_PROTOCOL_GET_PROTOCOL:
2591 case EFI_OPEN_PROTOCOL_TEST_PROTOCOL:
2592 break;
2593 case EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER:
2594 if (controller_handle == handle)
2595 goto out;
2596 /* fall-through */
2597 case EFI_OPEN_PROTOCOL_BY_DRIVER:
2598 case EFI_OPEN_PROTOCOL_BY_DRIVER | EFI_OPEN_PROTOCOL_EXCLUSIVE:
2599 /* Check that the controller handle is valid */
2600 if (!efi_search_obj(controller_handle))
2601 goto out;
2602 /* fall-through */
2603 case EFI_OPEN_PROTOCOL_EXCLUSIVE:
2604 /* Check that the agent handle is valid */
2605 if (!efi_search_obj(agent_handle))
2606 goto out;
2607 break;
2608 default:
2609 goto out;
2610 }
2611
2612 r = efi_search_protocol(handle, protocol, &handler);
2613 if (r != EFI_SUCCESS)
2614 goto out;
2615
2616 r = efi_protocol_open(handler, protocol_interface, agent_handle,
2617 controller_handle, attributes);
2618 out:
2619 return EFI_EXIT(r);
2620 }
2621
2622 /**
2623 * efi_start_image() - call the entry point of an image
2624 * @image_handle: handle of the image
2625 * @exit_data_size: size of the buffer
2626 * @exit_data: buffer to receive the exit data of the called image
2627 *
2628 * This function implements the StartImage service.
2629 *
2630 * See the Unified Extensible Firmware Interface (UEFI) specification for
2631 * details.
2632 *
2633 * Return: status code
2634 */
2635 efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle,
2636 efi_uintn_t *exit_data_size,
2637 u16 **exit_data)
2638 {
2639 struct efi_loaded_image_obj *image_obj =
2640 (struct efi_loaded_image_obj *)image_handle;
2641 efi_status_t ret;
2642 void *info;
2643 efi_handle_t parent_image = current_image;
2644
2645 EFI_ENTRY("%p, %p, %p", image_handle, exit_data_size, exit_data);
2646
2647 /* Check parameters */
2648 ret = EFI_CALL(efi_open_protocol(image_handle, &efi_guid_loaded_image,
2649 &info, NULL, NULL,
2650 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
2651 if (ret != EFI_SUCCESS)
2652 return EFI_EXIT(EFI_INVALID_PARAMETER);
2653
2654 efi_is_direct_boot = false;
2655
2656 /* call the image! */
2657 if (setjmp(&image_obj->exit_jmp)) {
2658 /*
2659 * We called the entry point of the child image with EFI_CALL
2660 * in the lines below. The child image called the Exit() boot
2661 * service efi_exit() which executed the long jump that brought
2662 * us to the current line. This implies that the second half
2663 * of the EFI_CALL macro has not been executed.
2664 */
2665 #ifdef CONFIG_ARM
2666 /*
2667 * efi_exit() called efi_restore_gd(). We have to undo this
2668 * otherwise __efi_entry_check() will put the wrong value into
2669 * app_gd.
2670 */
2671 gd = app_gd;
2672 #endif
2673 /*
2674 * To get ready to call EFI_EXIT below we have to execute the
2675 * missed out steps of EFI_CALL.
2676 */
2677 assert(__efi_entry_check());
2678 debug("%sEFI: %lu returned by started image\n",
2679 __efi_nesting_dec(),
2680 (unsigned long)((uintptr_t)image_obj->exit_status &
2681 ~EFI_ERROR_MASK));
2682 current_image = parent_image;
2683 return EFI_EXIT(image_obj->exit_status);
2684 }
2685
2686 current_image = image_handle;
2687 ret = EFI_CALL(image_obj->entry(image_handle, &systab));
2688
2689 /*
2690 * Usually UEFI applications call Exit() instead of returning.
2691 * But because the world doesn't consist of ponies and unicorns,
2692 * we're happy to emulate that behavior on behalf of a payload
2693 * that forgot.
2694 */
2695 return EFI_CALL(systab.boottime->exit(image_handle, ret, 0, NULL));
2696 }
2697
2698 /**
2699 * efi_exit() - leave an EFI application or driver
2700 * @image_handle: handle of the application or driver that is exiting
2701 * @exit_status: status code
2702 * @exit_data_size: size of the buffer in bytes
2703 * @exit_data: buffer with data describing an error
2704 *
2705 * This function implements the Exit service.
2706 *
2707 * See the Unified Extensible Firmware Interface (UEFI) specification for
2708 * details.
2709 *
2710 * Return: status code
2711 */
2712 static efi_status_t EFIAPI efi_exit(efi_handle_t image_handle,
2713 efi_status_t exit_status,
2714 efi_uintn_t exit_data_size,
2715 u16 *exit_data)
2716 {
2717 /*
2718 * TODO: We should call the unload procedure of the loaded
2719 * image protocol.
2720 */
2721 efi_status_t ret;
2722 void *info;
2723 struct efi_loaded_image_obj *image_obj =
2724 (struct efi_loaded_image_obj *)image_handle;
2725
2726 EFI_ENTRY("%p, %ld, %zu, %p", image_handle, exit_status,
2727 exit_data_size, exit_data);
2728
2729 /* Check parameters */
2730 if (image_handle != current_image)
2731 goto out;
2732 ret = EFI_CALL(efi_open_protocol(image_handle, &efi_guid_loaded_image,
2733 &info, NULL, NULL,
2734 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
2735 if (ret != EFI_SUCCESS)
2736 goto out;
2737
2738 /* Make sure entry/exit counts for EFI world cross-overs match */
2739 EFI_EXIT(exit_status);
2740
2741 /*
2742 * But longjmp out with the U-Boot gd, not the application's, as
2743 * the other end is a setjmp call inside EFI context.
2744 */
2745 efi_restore_gd();
2746
2747 image_obj->exit_status = exit_status;
2748 longjmp(&image_obj->exit_jmp, 1);
2749
2750 panic("EFI application exited");
2751 out:
2752 return EFI_EXIT(EFI_INVALID_PARAMETER);
2753 }
2754
2755 /**
2756 * efi_handle_protocol() - get interface of a protocol on a handle
2757 * @handle: handle on which the protocol shall be opened
2758 * @protocol: GUID of the protocol
2759 * @protocol_interface: interface implementing the protocol
2760 *
2761 * This function implements the HandleProtocol service.
2762 *
2763 * See the Unified Extensible Firmware Interface (UEFI) specification for
2764 * details.
2765 *
2766 * Return: status code
2767 */
2768 static efi_status_t EFIAPI efi_handle_protocol(efi_handle_t handle,
2769 const efi_guid_t *protocol,
2770 void **protocol_interface)
2771 {
2772 return efi_open_protocol(handle, protocol, protocol_interface, NULL,
2773 NULL, EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL);
2774 }
2775
2776 /**
2777 * efi_bind_controller() - bind a single driver to a controller
2778 * @controller_handle: controller handle
2779 * @driver_image_handle: driver handle
2780 * @remain_device_path: remaining path
2781 *
2782 * Return: status code
2783 */
2784 static efi_status_t efi_bind_controller(
2785 efi_handle_t controller_handle,
2786 efi_handle_t driver_image_handle,
2787 struct efi_device_path *remain_device_path)
2788 {
2789 struct efi_driver_binding_protocol *binding_protocol;
2790 efi_status_t r;
2791
2792 r = EFI_CALL(efi_open_protocol(driver_image_handle,
2793 &efi_guid_driver_binding_protocol,
2794 (void **)&binding_protocol,
2795 driver_image_handle, NULL,
2796 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
2797 if (r != EFI_SUCCESS)
2798 return r;
2799 r = EFI_CALL(binding_protocol->supported(binding_protocol,
2800 controller_handle,
2801 remain_device_path));
2802 if (r == EFI_SUCCESS)
2803 r = EFI_CALL(binding_protocol->start(binding_protocol,
2804 controller_handle,
2805 remain_device_path));
2806 EFI_CALL(efi_close_protocol(driver_image_handle,
2807 &efi_guid_driver_binding_protocol,
2808 driver_image_handle, NULL));
2809 return r;
2810 }
2811
2812 /**
2813 * efi_connect_single_controller() - connect a single driver to a controller
2814 * @controller_handle: controller
2815 * @driver_image_handle: driver
2816 * @remain_device_path: remaining path
2817 *
2818 * Return: status code
2819 */
2820 static efi_status_t efi_connect_single_controller(
2821 efi_handle_t controller_handle,
2822 efi_handle_t *driver_image_handle,
2823 struct efi_device_path *remain_device_path)
2824 {
2825 efi_handle_t *buffer;
2826 size_t count;
2827 size_t i;
2828 efi_status_t r;
2829 size_t connected = 0;
2830
2831 /* Get buffer with all handles with driver binding protocol */
2832 r = EFI_CALL(efi_locate_handle_buffer(BY_PROTOCOL,
2833 &efi_guid_driver_binding_protocol,
2834 NULL, &count, &buffer));
2835 if (r != EFI_SUCCESS)
2836 return r;
2837
2838 /* Context Override */
2839 if (driver_image_handle) {
2840 for (; *driver_image_handle; ++driver_image_handle) {
2841 for (i = 0; i < count; ++i) {
2842 if (buffer[i] == *driver_image_handle) {
2843 buffer[i] = NULL;
2844 r = efi_bind_controller(
2845 controller_handle,
2846 *driver_image_handle,
2847 remain_device_path);
2848 /*
2849 * For drivers that do not support the
2850 * controller or are already connected
2851 * we receive an error code here.
2852 */
2853 if (r == EFI_SUCCESS)
2854 ++connected;
2855 }
2856 }
2857 }
2858 }
2859
2860 /*
2861 * TODO: Some overrides are not yet implemented:
2862 * - Platform Driver Override
2863 * - Driver Family Override Search
2864 * - Bus Specific Driver Override
2865 */
2866
2867 /* Driver Binding Search */
2868 for (i = 0; i < count; ++i) {
2869 if (buffer[i]) {
2870 r = efi_bind_controller(controller_handle,
2871 buffer[i],
2872 remain_device_path);
2873 if (r == EFI_SUCCESS)
2874 ++connected;
2875 }
2876 }
2877
2878 efi_free_pool(buffer);
2879 if (!connected)
2880 return EFI_NOT_FOUND;
2881 return EFI_SUCCESS;
2882 }
2883
2884 /**
2885 * efi_connect_controller() - connect a controller to a driver
2886 * @controller_handle: handle of the controller
2887 * @driver_image_handle: handle of the driver
2888 * @remain_device_path: device path of a child controller
2889 * @recursive: true to connect all child controllers
2890 *
2891 * This function implements the ConnectController service.
2892 *
2893 * See the Unified Extensible Firmware Interface (UEFI) specification for
2894 * details.
2895 *
2896 * First all driver binding protocol handles are tried for binding drivers.
2897 * Afterwards all handles that have opened a protocol of the controller
2898 * with EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER are connected to drivers.
2899 *
2900 * Return: status code
2901 */
2902 static efi_status_t EFIAPI efi_connect_controller(
2903 efi_handle_t controller_handle,
2904 efi_handle_t *driver_image_handle,
2905 struct efi_device_path *remain_device_path,
2906 bool recursive)
2907 {
2908 efi_status_t r;
2909 efi_status_t ret = EFI_NOT_FOUND;
2910 struct efi_object *efiobj;
2911
2912 EFI_ENTRY("%p, %p, %pD, %d", controller_handle, driver_image_handle,
2913 remain_device_path, recursive);
2914
2915 efiobj = efi_search_obj(controller_handle);
2916 if (!efiobj) {
2917 ret = EFI_INVALID_PARAMETER;
2918 goto out;
2919 }
2920
2921 r = efi_connect_single_controller(controller_handle,
2922 driver_image_handle,
2923 remain_device_path);
2924 if (r == EFI_SUCCESS)
2925 ret = EFI_SUCCESS;
2926 if (recursive) {
2927 struct efi_handler *handler;
2928 struct efi_open_protocol_info_item *item;
2929
2930 list_for_each_entry(handler, &efiobj->protocols, link) {
2931 list_for_each_entry(item, &handler->open_infos, link) {
2932 if (item->info.attributes &
2933 EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER) {
2934 r = EFI_CALL(efi_connect_controller(
2935 item->info.controller_handle,
2936 driver_image_handle,
2937 remain_device_path,
2938 recursive));
2939 if (r == EFI_SUCCESS)
2940 ret = EFI_SUCCESS;
2941 }
2942 }
2943 }
2944 }
2945 /* Check for child controller specified by end node */
2946 if (ret != EFI_SUCCESS && remain_device_path &&
2947 remain_device_path->type == DEVICE_PATH_TYPE_END)
2948 ret = EFI_SUCCESS;
2949 out:
2950 return EFI_EXIT(ret);
2951 }
2952
2953 /**
2954 * efi_reinstall_protocol_interface() - reinstall protocol interface
2955 * @handle: handle on which the protocol shall be reinstalled
2956 * @protocol: GUID of the protocol to be installed
2957 * @old_interface: interface to be removed
2958 * @new_interface: interface to be installed
2959 *
2960 * This function implements the ReinstallProtocolInterface service.
2961 *
2962 * See the Unified Extensible Firmware Interface (UEFI) specification for
2963 * details.
2964 *
2965 * The old interface is uninstalled. The new interface is installed.
2966 * Drivers are connected.
2967 *
2968 * Return: status code
2969 */
2970 static efi_status_t EFIAPI efi_reinstall_protocol_interface(
2971 efi_handle_t handle, const efi_guid_t *protocol,
2972 void *old_interface, void *new_interface)
2973 {
2974 efi_status_t ret;
2975
2976 EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, old_interface,
2977 new_interface);
2978
2979 /* Uninstall protocol but do not delete handle */
2980 ret = efi_uninstall_protocol(handle, protocol, old_interface);
2981 if (ret != EFI_SUCCESS)
2982 goto out;
2983
2984 /* Install the new protocol */
2985 ret = efi_add_protocol(handle, protocol, new_interface);
2986 /*
2987 * The UEFI spec does not specify what should happen to the handle
2988 * if in case of an error no protocol interface remains on the handle.
2989 * So let's do nothing here.
2990 */
2991 if (ret != EFI_SUCCESS)
2992 goto out;
2993 /*
2994 * The returned status code has to be ignored.
2995 * Do not create an error if no suitable driver for the handle exists.
2996 */
2997 EFI_CALL(efi_connect_controller(handle, NULL, NULL, true));
2998 out:
2999 return EFI_EXIT(ret);
3000 }
3001
3002 /**
3003 * efi_get_child_controllers() - get all child controllers associated to a driver
3004 * @efiobj: handle of the controller
3005 * @driver_handle: handle of the driver
3006 * @number_of_children: number of child controllers
3007 * @child_handle_buffer: handles of the the child controllers
3008 *
3009 * The allocated buffer has to be freed with free().
3010 *
3011 * Return: status code
3012 */
3013 static efi_status_t efi_get_child_controllers(
3014 struct efi_object *efiobj,
3015 efi_handle_t driver_handle,
3016 efi_uintn_t *number_of_children,
3017 efi_handle_t **child_handle_buffer)
3018 {
3019 struct efi_handler *handler;
3020 struct efi_open_protocol_info_item *item;
3021 efi_uintn_t count = 0, i;
3022 bool duplicate;
3023
3024 /* Count all child controller associations */
3025 list_for_each_entry(handler, &efiobj->protocols, link) {
3026 list_for_each_entry(item, &handler->open_infos, link) {
3027 if (item->info.agent_handle == driver_handle &&
3028 item->info.attributes &
3029 EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER)
3030 ++count;
3031 }
3032 }
3033 /*
3034 * Create buffer. In case of duplicate child controller assignments
3035 * the buffer will be too large. But that does not harm.
3036 */
3037 *number_of_children = 0;
3038 *child_handle_buffer = calloc(count, sizeof(efi_handle_t));
3039 if (!*child_handle_buffer)
3040 return EFI_OUT_OF_RESOURCES;
3041 /* Copy unique child handles */
3042 list_for_each_entry(handler, &efiobj->protocols, link) {
3043 list_for_each_entry(item, &handler->open_infos, link) {
3044 if (item->info.agent_handle == driver_handle &&
3045 item->info.attributes &
3046 EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER) {
3047 /* Check this is a new child controller */
3048 duplicate = false;
3049 for (i = 0; i < *number_of_children; ++i) {
3050 if ((*child_handle_buffer)[i] ==
3051 item->info.controller_handle)
3052 duplicate = true;
3053 }
3054 /* Copy handle to buffer */
3055 if (!duplicate) {
3056 i = (*number_of_children)++;
3057 (*child_handle_buffer)[i] =
3058 item->info.controller_handle;
3059 }
3060 }
3061 }
3062 }
3063 return EFI_SUCCESS;
3064 }
3065
3066 /**
3067 * efi_disconnect_controller() - disconnect a controller from a driver
3068 * @controller_handle: handle of the controller
3069 * @driver_image_handle: handle of the driver
3070 * @child_handle: handle of the child to destroy
3071 *
3072 * This function implements the DisconnectController service.
3073 *
3074 * See the Unified Extensible Firmware Interface (UEFI) specification for
3075 * details.
3076 *
3077 * Return: status code
3078 */
3079 static efi_status_t EFIAPI efi_disconnect_controller(
3080 efi_handle_t controller_handle,
3081 efi_handle_t driver_image_handle,
3082 efi_handle_t child_handle)
3083 {
3084 struct efi_driver_binding_protocol *binding_protocol;
3085 efi_handle_t *child_handle_buffer = NULL;
3086 size_t number_of_children = 0;
3087 efi_status_t r;
3088 size_t stop_count = 0;
3089 struct efi_object *efiobj;
3090
3091 EFI_ENTRY("%p, %p, %p", controller_handle, driver_image_handle,
3092 child_handle);
3093
3094 efiobj = efi_search_obj(controller_handle);
3095 if (!efiobj) {
3096 r = EFI_INVALID_PARAMETER;
3097 goto out;
3098 }
3099
3100 if (child_handle && !efi_search_obj(child_handle)) {
3101 r = EFI_INVALID_PARAMETER;
3102 goto out;
3103 }
3104
3105 /* If no driver handle is supplied, disconnect all drivers */
3106 if (!driver_image_handle) {
3107 r = efi_disconnect_all_drivers(efiobj, NULL, child_handle);
3108 goto out;
3109 }
3110
3111 /* Create list of child handles */
3112 if (child_handle) {
3113 number_of_children = 1;
3114 child_handle_buffer = &child_handle;
3115 } else {
3116 efi_get_child_controllers(efiobj,
3117 driver_image_handle,
3118 &number_of_children,
3119 &child_handle_buffer);
3120 }
3121
3122 /* Get the driver binding protocol */
3123 r = EFI_CALL(efi_open_protocol(driver_image_handle,
3124 &efi_guid_driver_binding_protocol,
3125 (void **)&binding_protocol,
3126 driver_image_handle, NULL,
3127 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
3128 if (r != EFI_SUCCESS)
3129 goto out;
3130 /* Remove the children */
3131 if (number_of_children) {
3132 r = EFI_CALL(binding_protocol->stop(binding_protocol,
3133 controller_handle,
3134 number_of_children,
3135 child_handle_buffer));
3136 if (r == EFI_SUCCESS)
3137 ++stop_count;
3138 }
3139 /* Remove the driver */
3140 if (!child_handle)
3141 r = EFI_CALL(binding_protocol->stop(binding_protocol,
3142 controller_handle,
3143 0, NULL));
3144 if (r == EFI_SUCCESS)
3145 ++stop_count;
3146 EFI_CALL(efi_close_protocol(driver_image_handle,
3147 &efi_guid_driver_binding_protocol,
3148 driver_image_handle, NULL));
3149
3150 if (stop_count)
3151 r = EFI_SUCCESS;
3152 else
3153 r = EFI_NOT_FOUND;
3154 out:
3155 if (!child_handle)
3156 free(child_handle_buffer);
3157 return EFI_EXIT(r);
3158 }
3159
3160 static struct efi_boot_services efi_boot_services = {
3161 .hdr = {
3162 .signature = EFI_BOOT_SERVICES_SIGNATURE,
3163 .revision = EFI_SPECIFICATION_VERSION,
3164 .headersize = sizeof(struct efi_boot_services),
3165 },
3166 .raise_tpl = efi_raise_tpl,
3167 .restore_tpl = efi_restore_tpl,
3168 .allocate_pages = efi_allocate_pages_ext,
3169 .free_pages = efi_free_pages_ext,
3170 .get_memory_map = efi_get_memory_map_ext,
3171 .allocate_pool = efi_allocate_pool_ext,
3172 .free_pool = efi_free_pool_ext,
3173 .create_event = efi_create_event_ext,
3174 .set_timer = efi_set_timer_ext,
3175 .wait_for_event = efi_wait_for_event,
3176 .signal_event = efi_signal_event_ext,
3177 .close_event = efi_close_event,
3178 .check_event = efi_check_event,
3179 .install_protocol_interface = efi_install_protocol_interface,
3180 .reinstall_protocol_interface = efi_reinstall_protocol_interface,
3181 .uninstall_protocol_interface = efi_uninstall_protocol_interface,
3182 .handle_protocol = efi_handle_protocol,
3183 .reserved = NULL,
3184 .register_protocol_notify = efi_register_protocol_notify,
3185 .locate_handle = efi_locate_handle_ext,
3186 .locate_device_path = efi_locate_device_path,
3187 .install_configuration_table = efi_install_configuration_table_ext,
3188 .load_image = efi_load_image,
3189 .start_image = efi_start_image,
3190 .exit = efi_exit,
3191 .unload_image = efi_unload_image,
3192 .exit_boot_services = efi_exit_boot_services,
3193 .get_next_monotonic_count = efi_get_next_monotonic_count,
3194 .stall = efi_stall,
3195 .set_watchdog_timer = efi_set_watchdog_timer,
3196 .connect_controller = efi_connect_controller,
3197 .disconnect_controller = efi_disconnect_controller,
3198 .open_protocol = efi_open_protocol,
3199 .close_protocol = efi_close_protocol,
3200 .open_protocol_information = efi_open_protocol_information,
3201 .protocols_per_handle = efi_protocols_per_handle,
3202 .locate_handle_buffer = efi_locate_handle_buffer,
3203 .locate_protocol = efi_locate_protocol,
3204 .install_multiple_protocol_interfaces =
3205 efi_install_multiple_protocol_interfaces,
3206 .uninstall_multiple_protocol_interfaces =
3207 efi_uninstall_multiple_protocol_interfaces,
3208 .calculate_crc32 = efi_calculate_crc32,
3209 .copy_mem = efi_copy_mem,
3210 .set_mem = efi_set_mem,
3211 .create_event_ex = efi_create_event_ex,
3212 };
3213
3214 static u16 __efi_runtime_data firmware_vendor[] = L"Das U-Boot";
3215
3216 struct efi_system_table __efi_runtime_data systab = {
3217 .hdr = {
3218 .signature = EFI_SYSTEM_TABLE_SIGNATURE,
3219 .revision = EFI_SPECIFICATION_VERSION,
3220 .headersize = sizeof(struct efi_system_table),
3221 },
3222 .fw_vendor = firmware_vendor,
3223 .fw_revision = FW_VERSION << 16 | FW_PATCHLEVEL << 8,
3224 .con_in = (void *)&efi_con_in,
3225 .con_out = (void *)&efi_con_out,
3226 .std_err = (void *)&efi_con_out,
3227 .runtime = (void *)&efi_runtime_services,
3228 .boottime = (void *)&efi_boot_services,
3229 .nr_tables = 0,
3230 .tables = NULL,
3231 };
3232
3233 /**
3234 * efi_initialize_system_table() - Initialize system table
3235 *
3236 * Return: status code
3237 */
3238 efi_status_t efi_initialize_system_table(void)
3239 {
3240 efi_status_t ret;
3241
3242 /* Allocate configuration table array */
3243 ret = efi_allocate_pool(EFI_RUNTIME_SERVICES_DATA,
3244 EFI_MAX_CONFIGURATION_TABLES *
3245 sizeof(struct efi_configuration_table),
3246 (void **)&systab.tables);
3247
3248 /* Set CRC32 field in table headers */
3249 efi_update_table_header_crc32(&systab.hdr);
3250 efi_update_table_header_crc32(&efi_runtime_services.hdr);
3251 efi_update_table_header_crc32(&efi_boot_services.hdr);
3252
3253 return ret;
3254 }