From: Lennart Poettering Date: Tue, 2 Jul 2024 15:44:24 +0000 (+0200) Subject: efi: split out efivars.[ch] from util.[ch] X-Git-Tag: v257-rc1~994^2~4 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=f84b512290c238e15fce3f727030d71562663984;p=thirdparty%2Fsystemd.git efi: split out efivars.[ch] from util.[ch] These are quite a bunch of functions, let's give them their own file. No code changes, just some trivial refactoring. --- diff --git a/src/boot/efi/boot.c b/src/boot/efi/boot.c index 9dbf96f169f..b643c259252 100644 --- a/src/boot/efi/boot.c +++ b/src/boot/efi/boot.c @@ -7,6 +7,7 @@ #include "devicetree.h" #include "drivers.h" #include "efivars-fundamental.h" +#include "efivars.h" #include "export-vars.h" #include "graphics.h" #include "initrd.h" diff --git a/src/boot/efi/efivars.c b/src/boot/efi/efivars.c new file mode 100644 index 00000000000..5cf348c3cb2 --- /dev/null +++ b/src/boot/efi/efivars.c @@ -0,0 +1,247 @@ +/* SPDX-License-Identifier: LGPL-2.1-or-later */ + +#include "efi-string.h" +#include "efivars.h" +#include "ticks.h" +#include "util.h" + +EFI_STATUS efivar_set_raw(const EFI_GUID *vendor, const char16_t *name, const void *buf, size_t size, uint32_t flags) { + assert(vendor); + assert(name); + assert(buf || size == 0); + + flags |= EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS; + return RT->SetVariable((char16_t *) name, (EFI_GUID *) vendor, flags, size, (void *) buf); +} + +EFI_STATUS efivar_set(const EFI_GUID *vendor, const char16_t *name, const char16_t *value, uint32_t flags) { + assert(vendor); + assert(name); + + return efivar_set_raw(vendor, name, value, value ? strsize16(value) : 0, flags); +} + +EFI_STATUS efivar_set_uint_string(const EFI_GUID *vendor, const char16_t *name, size_t i, uint32_t flags) { + assert(vendor); + assert(name); + + _cleanup_free_ char16_t *str = xasprintf("%zu", i); + return efivar_set(vendor, name, str, flags); +} + +EFI_STATUS efivar_set_uint32_le(const EFI_GUID *vendor, const char16_t *name, uint32_t value, uint32_t flags) { + uint8_t buf[4]; + + assert(vendor); + assert(name); + + buf[0] = (uint8_t)(value >> 0U & 0xFF); + buf[1] = (uint8_t)(value >> 8U & 0xFF); + buf[2] = (uint8_t)(value >> 16U & 0xFF); + buf[3] = (uint8_t)(value >> 24U & 0xFF); + + return efivar_set_raw(vendor, name, buf, sizeof(buf), flags); +} + +EFI_STATUS efivar_set_uint64_le(const EFI_GUID *vendor, const char16_t *name, uint64_t value, uint32_t flags) { + uint8_t buf[8]; + + assert(vendor); + assert(name); + + buf[0] = (uint8_t)(value >> 0U & 0xFF); + buf[1] = (uint8_t)(value >> 8U & 0xFF); + buf[2] = (uint8_t)(value >> 16U & 0xFF); + buf[3] = (uint8_t)(value >> 24U & 0xFF); + buf[4] = (uint8_t)(value >> 32U & 0xFF); + buf[5] = (uint8_t)(value >> 40U & 0xFF); + buf[6] = (uint8_t)(value >> 48U & 0xFF); + buf[7] = (uint8_t)(value >> 56U & 0xFF); + + return efivar_set_raw(vendor, name, buf, sizeof(buf), flags); +} + +EFI_STATUS efivar_unset(const EFI_GUID *vendor, const char16_t *name, uint32_t flags) { + EFI_STATUS err; + + assert(vendor); + assert(name); + + /* We could be wiping a non-volatile variable here and the spec makes no guarantees that won't incur + * in an extra write (and thus wear out). So check and clear only if needed. */ + err = efivar_get_raw(vendor, name, NULL, NULL); + if (err == EFI_SUCCESS) + return efivar_set_raw(vendor, name, NULL, 0, flags); + + return err; +} + +EFI_STATUS efivar_get(const EFI_GUID *vendor, const char16_t *name, char16_t **ret) { + _cleanup_free_ char16_t *buf = NULL; + EFI_STATUS err; + char16_t *val; + size_t size; + + assert(vendor); + assert(name); + + err = efivar_get_raw(vendor, name, (char **) &buf, &size); + if (err != EFI_SUCCESS) + return err; + + /* Make sure there are no incomplete characters in the buffer */ + if ((size % sizeof(char16_t)) != 0) + return EFI_INVALID_PARAMETER; + + if (!ret) + return EFI_SUCCESS; + + /* Return buffer directly if it happens to be NUL terminated already */ + if (size >= sizeof(char16_t) && buf[size / sizeof(char16_t) - 1] == 0) { + *ret = TAKE_PTR(buf); + return EFI_SUCCESS; + } + + /* Make sure a terminating NUL is available at the end */ + val = xmalloc(size + sizeof(char16_t)); + + memcpy(val, buf, size); + val[size / sizeof(char16_t) - 1] = 0; /* NUL terminate */ + + *ret = val; + return EFI_SUCCESS; +} + +EFI_STATUS efivar_get_uint_string(const EFI_GUID *vendor, const char16_t *name, size_t *ret) { + _cleanup_free_ char16_t *val = NULL; + EFI_STATUS err; + uint64_t u; + + assert(vendor); + assert(name); + + err = efivar_get(vendor, name, &val); + if (err != EFI_SUCCESS) + return err; + + if (!parse_number16(val, &u, NULL) || u > SIZE_MAX) + return EFI_INVALID_PARAMETER; + + if (ret) + *ret = u; + return EFI_SUCCESS; +} + +EFI_STATUS efivar_get_uint32_le(const EFI_GUID *vendor, const char16_t *name, uint32_t *ret) { + _cleanup_free_ char *buf = NULL; + size_t size; + EFI_STATUS err; + + assert(vendor); + assert(name); + + err = efivar_get_raw(vendor, name, &buf, &size); + if (err != EFI_SUCCESS) + return err; + + if (size != sizeof(uint32_t)) + return EFI_BUFFER_TOO_SMALL; + + if (ret) + *ret = (uint32_t) buf[0] << 0U | (uint32_t) buf[1] << 8U | (uint32_t) buf[2] << 16U | + (uint32_t) buf[3] << 24U; + + return EFI_SUCCESS; +} + +EFI_STATUS efivar_get_uint64_le(const EFI_GUID *vendor, const char16_t *name, uint64_t *ret) { + _cleanup_free_ char *buf = NULL; + size_t size; + EFI_STATUS err; + + assert(vendor); + assert(name); + + err = efivar_get_raw(vendor, name, &buf, &size); + if (err != EFI_SUCCESS) + return err; + + if (size != sizeof(uint64_t)) + return EFI_BUFFER_TOO_SMALL; + + if (ret) + *ret = (uint64_t) buf[0] << 0U | (uint64_t) buf[1] << 8U | (uint64_t) buf[2] << 16U | + (uint64_t) buf[3] << 24U | (uint64_t) buf[4] << 32U | (uint64_t) buf[5] << 40U | + (uint64_t) buf[6] << 48U | (uint64_t) buf[7] << 56U; + + return EFI_SUCCESS; +} + +EFI_STATUS efivar_get_raw(const EFI_GUID *vendor, const char16_t *name, char **ret, size_t *ret_size) { + EFI_STATUS err; + + assert(vendor); + assert(name); + + size_t size = 0; + err = RT->GetVariable((char16_t *) name, (EFI_GUID *) vendor, NULL, &size, NULL); + if (err != EFI_BUFFER_TOO_SMALL) + return err; + + _cleanup_free_ void *buf = xmalloc(size); + err = RT->GetVariable((char16_t *) name, (EFI_GUID *) vendor, NULL, &size, buf); + if (err != EFI_SUCCESS) + return err; + + if (ret) + *ret = TAKE_PTR(buf); + if (ret_size) + *ret_size = size; + + return EFI_SUCCESS; +} + +EFI_STATUS efivar_get_boolean_u8(const EFI_GUID *vendor, const char16_t *name, bool *ret) { + _cleanup_free_ char *b = NULL; + size_t size; + EFI_STATUS err; + + assert(vendor); + assert(name); + + err = efivar_get_raw(vendor, name, &b, &size); + if (err != EFI_SUCCESS) + return err; + + if (ret) + *ret = *b > 0; + + return EFI_SUCCESS; +} + +void efivar_set_time_usec(const EFI_GUID *vendor, const char16_t *name, uint64_t usec) { + assert(vendor); + assert(name); + + if (usec == 0) + usec = time_usec(); + if (usec == 0) + return; + + _cleanup_free_ char16_t *str = xasprintf("%" PRIu64, usec); + efivar_set(vendor, name, str, 0); +} + +uint64_t get_os_indications_supported(void) { + uint64_t osind; + EFI_STATUS err; + + /* Returns the supported OS indications. If we can't acquire it, returns a zeroed out mask, i.e. no + * supported features. */ + + err = efivar_get_uint64_le(MAKE_GUID_PTR(EFI_GLOBAL_VARIABLE), u"OsIndicationsSupported", &osind); + if (err != EFI_SUCCESS) + return 0; + + return osind; +} diff --git a/src/boot/efi/efivars.h b/src/boot/efi/efivars.h new file mode 100644 index 00000000000..32cb5496b84 --- /dev/null +++ b/src/boot/efi/efivars.h @@ -0,0 +1,30 @@ +/* SPDX-License-Identifier: LGPL-2.1-or-later */ +#pragma once + +#include "efi.h" + +/* + * Allocated random UUID, intended to be shared across tools that implement + * the (ESP)\loader\entries\-.conf convention and the + * associated EFI variables. + */ +#define LOADER_GUID \ + { 0x4a67b082, 0x0a4c, 0x41cf, { 0xb6, 0xc7, 0x44, 0x0b, 0x29, 0xbb, 0x8c, 0x4f } } + +EFI_STATUS efivar_set(const EFI_GUID *vendor, const char16_t *name, const char16_t *value, uint32_t flags); +EFI_STATUS efivar_set_raw(const EFI_GUID *vendor, const char16_t *name, const void *buf, size_t size, uint32_t flags); +EFI_STATUS efivar_set_uint_string(const EFI_GUID *vendor, const char16_t *name, size_t i, uint32_t flags); +EFI_STATUS efivar_set_uint32_le(const EFI_GUID *vendor, const char16_t *name, uint32_t value, uint32_t flags); +EFI_STATUS efivar_set_uint64_le(const EFI_GUID *vendor, const char16_t *name, uint64_t value, uint32_t flags); +void efivar_set_time_usec(const EFI_GUID *vendor, const char16_t *name, uint64_t usec); + +EFI_STATUS efivar_unset(const EFI_GUID *vendor, const char16_t *name, uint32_t flags); + +EFI_STATUS efivar_get(const EFI_GUID *vendor, const char16_t *name, char16_t **ret); +EFI_STATUS efivar_get_raw(const EFI_GUID *vendor, const char16_t *name, char **ret, size_t *ret_size); +EFI_STATUS efivar_get_uint_string(const EFI_GUID *vendor, const char16_t *name, size_t *ret); +EFI_STATUS efivar_get_uint32_le(const EFI_GUID *vendor, const char16_t *name, uint32_t *ret); +EFI_STATUS efivar_get_uint64_le(const EFI_GUID *vendor, const char16_t *name, uint64_t *ret); +EFI_STATUS efivar_get_boolean_u8(const EFI_GUID *vendor, const char16_t *name, bool *ret); + +uint64_t get_os_indications_supported(void); diff --git a/src/boot/efi/export-vars.c b/src/boot/efi/export-vars.c index 3926747bba1..ee41c5ccc3a 100644 --- a/src/boot/efi/export-vars.c +++ b/src/boot/efi/export-vars.c @@ -1,6 +1,7 @@ /* SPDX-License-Identifier: LGPL-2.1-or-later */ #include "device-path-util.h" +#include "efivars.h" #include "export-vars.h" #include "part-discovery.h" #include "util.h" diff --git a/src/boot/efi/meson.build b/src/boot/efi/meson.build index 42a7914bf68..bcfccfaddc8 100644 --- a/src/boot/efi/meson.build +++ b/src/boot/efi/meson.build @@ -258,6 +258,7 @@ libefi_sources = files( 'devicetree.c', 'drivers.c', 'efi-string.c', + 'efivars.c', 'export-vars.c', 'graphics.c', 'initrd.c', diff --git a/src/boot/efi/random-seed.c b/src/boot/efi/random-seed.c index 03f3ebd9b46..e5bad11962e 100644 --- a/src/boot/efi/random-seed.c +++ b/src/boot/efi/random-seed.c @@ -1,5 +1,6 @@ /* SPDX-License-Identifier: LGPL-2.1-or-later */ +#include "efivars.h" #include "memory-util-fundamental.h" #include "proto/rng.h" #include "random-seed.h" diff --git a/src/boot/efi/secure-boot.c b/src/boot/efi/secure-boot.c index 2400324fc56..566688adf83 100644 --- a/src/boot/efi/secure-boot.c +++ b/src/boot/efi/secure-boot.c @@ -1,6 +1,7 @@ /* SPDX-License-Identifier: LGPL-2.1-or-later */ #include "console.h" +#include "efivars.h" #include "proto/security-arch.h" #include "secure-boot.h" #include "util.h" diff --git a/src/boot/efi/shim.c b/src/boot/efi/shim.c index df136ed6d9f..59285534711 100644 --- a/src/boot/efi/shim.c +++ b/src/boot/efi/shim.c @@ -9,6 +9,7 @@ */ #include "device-path-util.h" +#include "efivars.h" #include "secure-boot.h" #include "shim.h" #include "util.h" diff --git a/src/boot/efi/stub.c b/src/boot/efi/stub.c index f51812d0d1b..bc3e349045a 100644 --- a/src/boot/efi/stub.c +++ b/src/boot/efi/stub.c @@ -3,6 +3,7 @@ #include "cpio.h" #include "device-path-util.h" #include "devicetree.h" +#include "efivars.h" #include "export-vars.h" #include "graphics.h" #include "iovec-util-fundamental.h" diff --git a/src/boot/efi/util.c b/src/boot/efi/util.c index eb29eb2d5b9..6ceb032fa13 100644 --- a/src/boot/efi/util.c +++ b/src/boot/efi/util.c @@ -7,233 +7,7 @@ #include "ticks.h" #include "util.h" #include "version.h" - -EFI_STATUS efivar_set_raw(const EFI_GUID *vendor, const char16_t *name, const void *buf, size_t size, uint32_t flags) { - assert(vendor); - assert(name); - assert(buf || size == 0); - - flags |= EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS; - return RT->SetVariable((char16_t *) name, (EFI_GUID *) vendor, flags, size, (void *) buf); -} - -EFI_STATUS efivar_set(const EFI_GUID *vendor, const char16_t *name, const char16_t *value, uint32_t flags) { - assert(vendor); - assert(name); - - return efivar_set_raw(vendor, name, value, value ? strsize16(value) : 0, flags); -} - -EFI_STATUS efivar_set_uint_string(const EFI_GUID *vendor, const char16_t *name, size_t i, uint32_t flags) { - assert(vendor); - assert(name); - - _cleanup_free_ char16_t *str = xasprintf("%zu", i); - return efivar_set(vendor, name, str, flags); -} - -EFI_STATUS efivar_set_uint32_le(const EFI_GUID *vendor, const char16_t *name, uint32_t value, uint32_t flags) { - uint8_t buf[4]; - - assert(vendor); - assert(name); - - buf[0] = (uint8_t)(value >> 0U & 0xFF); - buf[1] = (uint8_t)(value >> 8U & 0xFF); - buf[2] = (uint8_t)(value >> 16U & 0xFF); - buf[3] = (uint8_t)(value >> 24U & 0xFF); - - return efivar_set_raw(vendor, name, buf, sizeof(buf), flags); -} - -EFI_STATUS efivar_set_uint64_le(const EFI_GUID *vendor, const char16_t *name, uint64_t value, uint32_t flags) { - uint8_t buf[8]; - - assert(vendor); - assert(name); - - buf[0] = (uint8_t)(value >> 0U & 0xFF); - buf[1] = (uint8_t)(value >> 8U & 0xFF); - buf[2] = (uint8_t)(value >> 16U & 0xFF); - buf[3] = (uint8_t)(value >> 24U & 0xFF); - buf[4] = (uint8_t)(value >> 32U & 0xFF); - buf[5] = (uint8_t)(value >> 40U & 0xFF); - buf[6] = (uint8_t)(value >> 48U & 0xFF); - buf[7] = (uint8_t)(value >> 56U & 0xFF); - - return efivar_set_raw(vendor, name, buf, sizeof(buf), flags); -} - -EFI_STATUS efivar_unset(const EFI_GUID *vendor, const char16_t *name, uint32_t flags) { - EFI_STATUS err; - - assert(vendor); - assert(name); - - /* We could be wiping a non-volatile variable here and the spec makes no guarantees that won't incur - * in an extra write (and thus wear out). So check and clear only if needed. */ - err = efivar_get_raw(vendor, name, NULL, NULL); - if (err == EFI_SUCCESS) - return efivar_set_raw(vendor, name, NULL, 0, flags); - - return err; -} - -EFI_STATUS efivar_get(const EFI_GUID *vendor, const char16_t *name, char16_t **ret) { - _cleanup_free_ char16_t *buf = NULL; - EFI_STATUS err; - char16_t *val; - size_t size; - - assert(vendor); - assert(name); - - err = efivar_get_raw(vendor, name, (char **) &buf, &size); - if (err != EFI_SUCCESS) - return err; - - /* Make sure there are no incomplete characters in the buffer */ - if ((size % sizeof(char16_t)) != 0) - return EFI_INVALID_PARAMETER; - - if (!ret) - return EFI_SUCCESS; - - /* Return buffer directly if it happens to be NUL terminated already */ - if (size >= sizeof(char16_t) && buf[size / sizeof(char16_t) - 1] == 0) { - *ret = TAKE_PTR(buf); - return EFI_SUCCESS; - } - - /* Make sure a terminating NUL is available at the end */ - val = xmalloc(size + sizeof(char16_t)); - - memcpy(val, buf, size); - val[size / sizeof(char16_t) - 1] = 0; /* NUL terminate */ - - *ret = val; - return EFI_SUCCESS; -} - -EFI_STATUS efivar_get_uint_string(const EFI_GUID *vendor, const char16_t *name, size_t *ret) { - _cleanup_free_ char16_t *val = NULL; - EFI_STATUS err; - uint64_t u; - - assert(vendor); - assert(name); - - err = efivar_get(vendor, name, &val); - if (err != EFI_SUCCESS) - return err; - - if (!parse_number16(val, &u, NULL) || u > SIZE_MAX) - return EFI_INVALID_PARAMETER; - - if (ret) - *ret = u; - return EFI_SUCCESS; -} - -EFI_STATUS efivar_get_uint32_le(const EFI_GUID *vendor, const char16_t *name, uint32_t *ret) { - _cleanup_free_ char *buf = NULL; - size_t size; - EFI_STATUS err; - - assert(vendor); - assert(name); - - err = efivar_get_raw(vendor, name, &buf, &size); - if (err != EFI_SUCCESS) - return err; - - if (size != sizeof(uint32_t)) - return EFI_BUFFER_TOO_SMALL; - - if (ret) - *ret = (uint32_t) buf[0] << 0U | (uint32_t) buf[1] << 8U | (uint32_t) buf[2] << 16U | - (uint32_t) buf[3] << 24U; - - return EFI_SUCCESS; -} - -EFI_STATUS efivar_get_uint64_le(const EFI_GUID *vendor, const char16_t *name, uint64_t *ret) { - _cleanup_free_ char *buf = NULL; - size_t size; - EFI_STATUS err; - - assert(vendor); - assert(name); - - err = efivar_get_raw(vendor, name, &buf, &size); - if (err != EFI_SUCCESS) - return err; - - if (size != sizeof(uint64_t)) - return EFI_BUFFER_TOO_SMALL; - - if (ret) - *ret = (uint64_t) buf[0] << 0U | (uint64_t) buf[1] << 8U | (uint64_t) buf[2] << 16U | - (uint64_t) buf[3] << 24U | (uint64_t) buf[4] << 32U | (uint64_t) buf[5] << 40U | - (uint64_t) buf[6] << 48U | (uint64_t) buf[7] << 56U; - - return EFI_SUCCESS; -} - -EFI_STATUS efivar_get_raw(const EFI_GUID *vendor, const char16_t *name, char **ret, size_t *ret_size) { - EFI_STATUS err; - - assert(vendor); - assert(name); - - size_t size = 0; - err = RT->GetVariable((char16_t *) name, (EFI_GUID *) vendor, NULL, &size, NULL); - if (err != EFI_BUFFER_TOO_SMALL) - return err; - - _cleanup_free_ void *buf = xmalloc(size); - err = RT->GetVariable((char16_t *) name, (EFI_GUID *) vendor, NULL, &size, buf); - if (err != EFI_SUCCESS) - return err; - - if (ret) - *ret = TAKE_PTR(buf); - if (ret_size) - *ret_size = size; - - return EFI_SUCCESS; -} - -EFI_STATUS efivar_get_boolean_u8(const EFI_GUID *vendor, const char16_t *name, bool *ret) { - _cleanup_free_ char *b = NULL; - size_t size; - EFI_STATUS err; - - assert(vendor); - assert(name); - - err = efivar_get_raw(vendor, name, &b, &size); - if (err != EFI_SUCCESS) - return err; - - if (ret) - *ret = *b > 0; - - return EFI_SUCCESS; -} - -void efivar_set_time_usec(const EFI_GUID *vendor, const char16_t *name, uint64_t usec) { - assert(vendor); - assert(name); - - if (usec == 0) - usec = time_usec(); - if (usec == 0) - return; - - _cleanup_free_ char16_t *str = xasprintf("%" PRIu64, usec); - efivar_set(vendor, name, str, 0); -} +#include "efivars.h" void convert_efi_path(char16_t *path) { assert(path); @@ -544,20 +318,6 @@ EFI_STATUS open_directory( return EFI_SUCCESS; } -uint64_t get_os_indications_supported(void) { - uint64_t osind; - EFI_STATUS err; - - /* Returns the supported OS indications. If we can't acquire it, returns a zeroed out mask, i.e. no - * supported features. */ - - err = efivar_get_uint64_le(MAKE_GUID_PTR(EFI_GLOBAL_VARIABLE), u"OsIndicationsSupported", &osind); - if (err != EFI_SUCCESS) - return 0; - - return osind; -} - __attribute__((noinline)) void notify_debugger(const char *identity, volatile bool wait) { #ifdef EFI_DEBUG printf("%s@%p %s\n", identity, __executable_start, GIT_VERSION); diff --git a/src/boot/efi/util.h b/src/boot/efi/util.h index dc624f45aeb..3a26bc5c929 100644 --- a/src/boot/efi/util.h +++ b/src/boot/efi/util.h @@ -81,22 +81,6 @@ static inline Pages xmalloc_pages( }; } -EFI_STATUS efivar_set(const EFI_GUID *vendor, const char16_t *name, const char16_t *value, uint32_t flags); -EFI_STATUS efivar_set_raw(const EFI_GUID *vendor, const char16_t *name, const void *buf, size_t size, uint32_t flags); -EFI_STATUS efivar_set_uint_string(const EFI_GUID *vendor, const char16_t *name, size_t i, uint32_t flags); -EFI_STATUS efivar_set_uint32_le(const EFI_GUID *vendor, const char16_t *name, uint32_t value, uint32_t flags); -EFI_STATUS efivar_set_uint64_le(const EFI_GUID *vendor, const char16_t *name, uint64_t value, uint32_t flags); -void efivar_set_time_usec(const EFI_GUID *vendor, const char16_t *name, uint64_t usec); - -EFI_STATUS efivar_unset(const EFI_GUID *vendor, const char16_t *name, uint32_t flags); - -EFI_STATUS efivar_get(const EFI_GUID *vendor, const char16_t *name, char16_t **ret); -EFI_STATUS efivar_get_raw(const EFI_GUID *vendor, const char16_t *name, char **ret, size_t *ret_size); -EFI_STATUS efivar_get_uint_string(const EFI_GUID *vendor, const char16_t *name, size_t *ret); -EFI_STATUS efivar_get_uint32_le(const EFI_GUID *vendor, const char16_t *name, uint32_t *ret); -EFI_STATUS efivar_get_uint64_le(const EFI_GUID *vendor, const char16_t *name, uint64_t *ret); -EFI_STATUS efivar_get_boolean_u8(const EFI_GUID *vendor, const char16_t *name, bool *ret); - void convert_efi_path(char16_t *path); char16_t *xstr8_to_path(const char *stra); char16_t *mangle_stub_cmdline(char16_t *cmdline); @@ -116,14 +100,6 @@ static inline void unload_imagep(EFI_HANDLE *image) { (void) BS->UnloadImage(*image); } -/* - * Allocated random UUID, intended to be shared across tools that implement - * the (ESP)\loader\entries\-.conf convention and the - * associated EFI variables. - */ -#define LOADER_GUID \ - { 0x4a67b082, 0x0a4c, 0x41cf, { 0xb6, 0xc7, 0x44, 0x0b, 0x29, 0xbb, 0x8c, 0x4f } } - /* Note that GUID is evaluated multiple times! */ #define GUID_FORMAT_STR "%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X" #define GUID_FORMAT_VAL(g) (g).Data1, (g).Data2, (g).Data3, (g).Data4[0], (g).Data4[1], \ @@ -162,8 +138,6 @@ static inline void *PHYSICAL_ADDRESS_TO_POINTER(EFI_PHYSICAL_ADDRESS addr) { return (void *) (uintptr_t) addr; } -uint64_t get_os_indications_supported(void); - /* If EFI_DEBUG, print our name and version and also report the address of the image base so a debugger can * be attached. See debug-sd-boot.sh for how this can be done. */ void notify_debugger(const char *identity, bool wait); diff --git a/src/boot/efi/vmm.c b/src/boot/efi/vmm.c index 60e216d54c5..e7fce0763e0 100644 --- a/src/boot/efi/vmm.c +++ b/src/boot/efi/vmm.c @@ -8,6 +8,7 @@ #include "device-path-util.h" #include "drivers.h" #include "efi-string.h" +#include "efivars.h" #include "proto/device-path.h" #include "string-util-fundamental.h" #include "util.h"