2018-05-07 21:02:21 +00:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0+ */
|
2016-03-04 00:09:58 +00:00
|
|
|
/*
|
|
|
|
* EFI application loader
|
|
|
|
*
|
|
|
|
* Copyright (c) 2016 Alexander Graf
|
|
|
|
*/
|
|
|
|
|
2017-10-18 16:13:07 +00:00
|
|
|
#ifndef _EFI_LOADER_H
|
|
|
|
#define _EFI_LOADER_H 1
|
|
|
|
|
2016-03-04 00:09:59 +00:00
|
|
|
#include <common.h>
|
2020-05-10 17:39:58 +00:00
|
|
|
#include <blk.h>
|
2022-10-06 05:29:41 +00:00
|
|
|
#include <event.h>
|
2020-05-10 17:40:05 +00:00
|
|
|
#include <log.h>
|
2016-03-04 00:09:58 +00:00
|
|
|
#include <part_efi.h>
|
|
|
|
#include <efi_api.h>
|
2020-04-21 00:38:38 +00:00
|
|
|
#include <image.h>
|
2020-04-14 02:51:44 +00:00
|
|
|
#include <pe.h>
|
2021-07-02 18:36:16 +00:00
|
|
|
#include <linux/list.h>
|
|
|
|
#include <linux/oid_registry.h>
|
2016-03-04 00:09:59 +00:00
|
|
|
|
2020-05-10 17:39:58 +00:00
|
|
|
struct blk_desc;
|
2021-07-20 05:57:02 +00:00
|
|
|
struct jmp_buf_data;
|
2020-05-10 17:39:58 +00:00
|
|
|
|
2019-09-25 14:11:32 +00:00
|
|
|
static inline int guidcmp(const void *g1, const void *g2)
|
|
|
|
{
|
|
|
|
return memcmp(g1, g2, sizeof(efi_guid_t));
|
|
|
|
}
|
|
|
|
|
2019-12-28 18:31:04 +00:00
|
|
|
static inline void *guidcpy(void *dst, const void *src)
|
|
|
|
{
|
|
|
|
return memcpy(dst, src, sizeof(efi_guid_t));
|
|
|
|
}
|
|
|
|
|
2018-08-30 21:43:43 +00:00
|
|
|
#if CONFIG_IS_ENABLED(EFI_LOADER)
|
2016-03-04 00:09:59 +00:00
|
|
|
|
2021-07-02 18:36:16 +00:00
|
|
|
/**
|
|
|
|
* __efi_runtime_data - declares a non-const variable for EFI runtime section
|
|
|
|
*
|
|
|
|
* This macro indicates that a variable is non-const and should go into the
|
|
|
|
* EFI runtime section, and thus still be available when the OS is running.
|
|
|
|
*
|
|
|
|
* Only use on variables not declared const.
|
|
|
|
*
|
|
|
|
* Example:
|
|
|
|
*
|
|
|
|
* ::
|
|
|
|
*
|
|
|
|
* static __efi_runtime_data my_computed_table[256];
|
|
|
|
*/
|
|
|
|
#define __efi_runtime_data __section(".data.efi_runtime")
|
|
|
|
|
|
|
|
/**
|
|
|
|
* __efi_runtime_rodata - declares a read-only variable for EFI runtime section
|
|
|
|
*
|
|
|
|
* This macro indicates that a variable is read-only (const) and should go into
|
|
|
|
* the EFI runtime section, and thus still be available when the OS is running.
|
|
|
|
*
|
|
|
|
* Only use on variables also declared const.
|
|
|
|
*
|
|
|
|
* Example:
|
|
|
|
*
|
|
|
|
* ::
|
|
|
|
*
|
|
|
|
* static const __efi_runtime_rodata my_const_table[] = { 1, 2, 3 };
|
|
|
|
*/
|
|
|
|
#define __efi_runtime_rodata __section(".rodata.efi_runtime")
|
|
|
|
|
|
|
|
/**
|
|
|
|
* __efi_runtime - declares a function for EFI runtime section
|
|
|
|
*
|
|
|
|
* This macro indicates that a function should go into the EFI runtime section,
|
|
|
|
* and thus still be available when the OS is running.
|
|
|
|
*
|
|
|
|
* Example:
|
|
|
|
*
|
|
|
|
* ::
|
|
|
|
*
|
|
|
|
* static __efi_runtime compute_my_table(void);
|
|
|
|
*/
|
|
|
|
#define __efi_runtime __section(".text.efi_runtime")
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Call this with mmio_ptr as the _pointer_ to a pointer to an MMIO region
|
|
|
|
* to make it available at runtime
|
|
|
|
*/
|
|
|
|
efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Special case handler for error/abort that just tries to dtrt to get
|
|
|
|
* back to u-boot world
|
|
|
|
*/
|
|
|
|
void efi_restore_gd(void);
|
|
|
|
/* Call this to set the current device name */
|
|
|
|
void efi_set_bootdev(const char *dev, const char *devnr, const char *path,
|
|
|
|
void *buffer, size_t buffer_size);
|
|
|
|
/* Called by networking code to memorize the dhcp ack package */
|
|
|
|
void efi_net_set_dhcp_ack(void *pkt, int len);
|
|
|
|
/* Print information about all loaded images */
|
|
|
|
void efi_print_image_infos(void *pc);
|
|
|
|
|
|
|
|
/* Hook at initialization */
|
|
|
|
efi_status_t efi_launch_capsules(void);
|
|
|
|
|
|
|
|
#else /* CONFIG_IS_ENABLED(EFI_LOADER) */
|
|
|
|
|
|
|
|
/* Without CONFIG_EFI_LOADER we don't have a runtime section, stub it out */
|
|
|
|
#define __efi_runtime_data
|
|
|
|
#define __efi_runtime_rodata
|
|
|
|
#define __efi_runtime
|
|
|
|
static inline efi_status_t efi_add_runtime_mmio(void *mmio_ptr, u64 len)
|
|
|
|
{
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* No loader configured, stub out EFI_ENTRY */
|
|
|
|
static inline void efi_restore_gd(void) { }
|
|
|
|
static inline void efi_set_bootdev(const char *dev, const char *devnr,
|
|
|
|
const char *path, void *buffer,
|
|
|
|
size_t buffer_size) { }
|
|
|
|
static inline void efi_net_set_dhcp_ack(void *pkt, int len) { }
|
|
|
|
static inline void efi_print_image_infos(void *pc) { }
|
|
|
|
static inline efi_status_t efi_launch_capsules(void)
|
|
|
|
{
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_IS_ENABLED(EFI_LOADER) */
|
2016-03-04 00:09:58 +00:00
|
|
|
|
2018-06-28 10:45:32 +00:00
|
|
|
/* Maximum number of configuration tables */
|
|
|
|
#define EFI_MAX_CONFIGURATION_TABLES 16
|
|
|
|
|
2018-09-20 19:58:23 +00:00
|
|
|
/* GUID used by the root node */
|
|
|
|
#define U_BOOT_GUID \
|
|
|
|
EFI_GUID(0xe61d73b9, 0xa384, 0x4acc, \
|
|
|
|
0xae, 0xab, 0x82, 0xe8, 0x28, 0xf3, 0x62, 0x8b)
|
2023-02-16 15:33:55 +00:00
|
|
|
/* GUID used as root for blkmap devices */
|
|
|
|
#define U_BOOT_BLKMAP_DEV_GUID \
|
|
|
|
EFI_GUID(0x4cad859d, 0xd644, 0x42ff, \
|
|
|
|
0x87, 0x0b, 0xc0, 0x2e, 0xac, 0x05, 0x58, 0x63)
|
efi_loader: device_path: support Sandbox's "host" devices
Sandbox's "host" devices are currently described as UCLASS_ROOT udevice
with DEV_IF_HOST block device. As the current implementation of
efi_device_path doesn't support such a type, any "host" device
on sandbox cannot be seen as a distinct object.
For example,
=> host bind 0 /foo/disk.img
=> efi devices
Scanning disk host0...
Found 1 disks
Device Device Path
================ ====================
0000000015c19970 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
0000000015c19d70 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
=> efi dh
Handle Protocols
================ ====================
0000000015c19970 Device Path, Device Path To Text, Device Path Utilities, Unicode Collation 2, HII String, HII Database, HII Config Routing
0000000015c19ba0 Driver Binding
0000000015c19c10 Simple Text Output
0000000015c19c80 Simple Text Input, Simple Text Input Ex
0000000015c19d70 Block IO, Device Path, Simple File System
As you can see here, efi_root (0x0000000015c19970) and host0 device
(0x0000000015c19d70) have the same representation of device path.
This is not only inconvenient, but also confusing since two different
efi objects are associated with the same device path and
efi_dp_find_obj() will possibly return a wrong result.
Solution:
Each "host" device should be given an additional device path node
of "vendor device path" to make it distinguishable.
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-09-12 04:52:35 +00:00
|
|
|
/* GUID used as host device on sandbox */
|
|
|
|
#define U_BOOT_HOST_DEV_GUID \
|
|
|
|
EFI_GUID(0xbbe4e671, 0x5773, 0x4ea1, \
|
|
|
|
0x9a, 0xab, 0x3a, 0x7d, 0xbf, 0x40, 0xc4, 0x82)
|
2020-05-20 20:39:35 +00:00
|
|
|
/* GUID used as root for virtio devices */
|
|
|
|
#define U_BOOT_VIRTIO_DEV_GUID \
|
|
|
|
EFI_GUID(0x63293792, 0xadf5, 0x9325, \
|
|
|
|
0xb9, 0x9f, 0x4e, 0x0e, 0x45, 0x5c, 0x1b, 0x1e)
|
2018-09-20 19:58:23 +00:00
|
|
|
|
2022-09-12 08:33:50 +00:00
|
|
|
/* GUID for the auto generated boot menu entry */
|
|
|
|
#define EFICONFIG_AUTO_GENERATED_ENTRY_GUID \
|
|
|
|
EFI_GUID(0x38c1acc1, 0x9fc0, 0x41f0, \
|
|
|
|
0xb9, 0x01, 0xfa, 0x74, 0xd6, 0xd6, 0xe4, 0xde)
|
|
|
|
|
2019-11-28 05:46:09 +00:00
|
|
|
/* Use internal device tree when starting UEFI application */
|
2019-12-08 00:07:01 +00:00
|
|
|
#define EFI_FDT_USE_INTERNAL NULL
|
2019-11-28 05:46:09 +00:00
|
|
|
|
2019-04-16 04:24:20 +00:00
|
|
|
/* Root node */
|
|
|
|
extern efi_handle_t efi_root;
|
|
|
|
|
2020-03-19 18:21:58 +00:00
|
|
|
/* Set to EFI_SUCCESS when initialized */
|
|
|
|
extern efi_status_t efi_obj_list_initialized;
|
|
|
|
|
2020-11-12 20:26:28 +00:00
|
|
|
/* Flag used by the selftest to avoid detaching devices in ExitBootServices() */
|
|
|
|
extern bool efi_st_keep_devices;
|
|
|
|
|
2020-03-19 14:16:31 +00:00
|
|
|
/* EFI system partition */
|
|
|
|
extern struct efi_system_partition {
|
2022-09-17 15:00:09 +00:00
|
|
|
enum uclass_id uclass_id;
|
2020-03-19 14:16:31 +00:00
|
|
|
int devnum;
|
|
|
|
u8 part;
|
|
|
|
} efi_system_partition;
|
|
|
|
|
2017-07-27 12:04:18 +00:00
|
|
|
int __efi_entry_check(void);
|
|
|
|
int __efi_exit_check(void);
|
2017-08-18 15:45:16 +00:00
|
|
|
const char *__efi_nesting(void);
|
2017-07-27 12:04:19 +00:00
|
|
|
const char *__efi_nesting_inc(void);
|
|
|
|
const char *__efi_nesting_dec(void);
|
2017-07-27 12:04:18 +00:00
|
|
|
|
2017-07-27 12:04:17 +00:00
|
|
|
/*
|
|
|
|
* Enter the u-boot world from UEFI:
|
|
|
|
*/
|
2016-03-04 00:09:59 +00:00
|
|
|
#define EFI_ENTRY(format, ...) do { \
|
2017-07-27 12:04:18 +00:00
|
|
|
assert(__efi_entry_check()); \
|
2017-07-27 12:04:19 +00:00
|
|
|
debug("%sEFI: Entry %s(" format ")\n", __efi_nesting_inc(), \
|
|
|
|
__func__, ##__VA_ARGS__); \
|
2016-03-04 00:09:59 +00:00
|
|
|
} while(0)
|
|
|
|
|
2017-07-27 12:04:17 +00:00
|
|
|
/*
|
|
|
|
* Exit the u-boot world back to UEFI:
|
|
|
|
*/
|
2017-07-24 14:31:52 +00:00
|
|
|
#define EFI_EXIT(ret) ({ \
|
2017-08-17 16:57:36 +00:00
|
|
|
typeof(ret) _r = ret; \
|
2017-07-27 12:04:19 +00:00
|
|
|
debug("%sEFI: Exit: %s: %u\n", __efi_nesting_dec(), \
|
2017-08-17 16:57:36 +00:00
|
|
|
__func__, (u32)((uintptr_t) _r & ~EFI_ERROR_MASK)); \
|
2017-07-27 12:04:18 +00:00
|
|
|
assert(__efi_exit_check()); \
|
|
|
|
_r; \
|
2017-07-24 14:31:52 +00:00
|
|
|
})
|
2016-03-04 00:09:59 +00:00
|
|
|
|
2017-07-27 12:04:17 +00:00
|
|
|
/*
|
2017-09-15 08:06:10 +00:00
|
|
|
* Call non-void UEFI function from u-boot and retrieve return value:
|
2017-07-27 12:04:17 +00:00
|
|
|
*/
|
2017-09-15 08:06:10 +00:00
|
|
|
#define EFI_CALL(exp) ({ \
|
|
|
|
debug("%sEFI: Call: %s\n", __efi_nesting_inc(), #exp); \
|
|
|
|
assert(__efi_exit_check()); \
|
|
|
|
typeof(exp) _r = exp; \
|
|
|
|
assert(__efi_entry_check()); \
|
|
|
|
debug("%sEFI: %lu returned by %s\n", __efi_nesting_dec(), \
|
|
|
|
(unsigned long)((uintptr_t)_r & ~EFI_ERROR_MASK), #exp); \
|
|
|
|
_r; \
|
|
|
|
})
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Call void UEFI function from u-boot:
|
|
|
|
*/
|
|
|
|
#define EFI_CALL_VOID(exp) do { \
|
2017-07-27 12:04:19 +00:00
|
|
|
debug("%sEFI: Call: %s\n", __efi_nesting_inc(), #exp); \
|
2017-07-27 12:04:18 +00:00
|
|
|
assert(__efi_exit_check()); \
|
2017-07-27 12:04:17 +00:00
|
|
|
exp; \
|
2017-07-27 12:04:18 +00:00
|
|
|
assert(__efi_entry_check()); \
|
2017-07-27 12:04:19 +00:00
|
|
|
debug("%sEFI: Return From: %s\n", __efi_nesting_dec(), #exp); \
|
2017-07-27 12:04:17 +00:00
|
|
|
} while(0)
|
|
|
|
|
2017-08-18 15:45:16 +00:00
|
|
|
/*
|
2018-01-11 07:16:01 +00:00
|
|
|
* Write an indented message with EFI prefix
|
2017-08-18 15:45:16 +00:00
|
|
|
*/
|
2018-01-11 07:16:01 +00:00
|
|
|
#define EFI_PRINT(format, ...) ({ \
|
|
|
|
debug("%sEFI: " format, __efi_nesting(), \
|
|
|
|
##__VA_ARGS__); \
|
2017-08-18 15:45:16 +00:00
|
|
|
})
|
|
|
|
|
2018-04-23 05:59:47 +00:00
|
|
|
#ifdef CONFIG_SYS_CACHELINE_SIZE
|
|
|
|
#define EFI_CACHELINE_SIZE CONFIG_SYS_CACHELINE_SIZE
|
|
|
|
#else
|
|
|
|
/* Just use the greatest cache flush alignment requirement I'm aware of */
|
|
|
|
#define EFI_CACHELINE_SIZE 128
|
|
|
|
#endif
|
|
|
|
|
2022-09-12 08:33:50 +00:00
|
|
|
/* max bootmenu title size for volume selection */
|
|
|
|
#define BOOTMENU_DEVICE_NAME_MAX 16
|
|
|
|
|
2018-07-02 10:53:55 +00:00
|
|
|
/* Key identifying current memory map */
|
|
|
|
extern efi_uintn_t efi_memory_map_key;
|
|
|
|
|
2016-03-04 00:10:01 +00:00
|
|
|
extern struct efi_runtime_services efi_runtime_services;
|
2016-03-04 00:09:59 +00:00
|
|
|
extern struct efi_system_table systab;
|
|
|
|
|
2017-10-26 17:25:59 +00:00
|
|
|
extern struct efi_simple_text_output_protocol efi_con_out;
|
2018-09-08 08:20:10 +00:00
|
|
|
extern struct efi_simple_text_input_protocol efi_con_in;
|
2017-10-26 17:25:59 +00:00
|
|
|
extern struct efi_console_control_protocol efi_console_control;
|
2017-07-11 20:06:25 +00:00
|
|
|
extern const struct efi_device_path_to_text_protocol efi_device_path_to_text;
|
2018-03-09 16:43:21 +00:00
|
|
|
/* implementation of the EFI_DEVICE_PATH_UTILITIES_PROTOCOL */
|
|
|
|
extern const struct efi_device_path_utilities_protocol
|
|
|
|
efi_device_path_utilities;
|
2019-05-16 16:19:00 +00:00
|
|
|
/* current version of the EFI_UNICODE_COLLATION_PROTOCOL */
|
2018-09-04 17:34:58 +00:00
|
|
|
extern const struct efi_unicode_collation_protocol
|
2019-05-16 05:52:58 +00:00
|
|
|
efi_unicode_collation_protocol2;
|
2019-01-21 03:13:00 +00:00
|
|
|
extern const struct efi_hii_config_routing_protocol efi_hii_config_routing;
|
|
|
|
extern const struct efi_hii_config_access_protocol efi_hii_config_access;
|
2019-01-21 03:12:57 +00:00
|
|
|
extern const struct efi_hii_database_protocol efi_hii_database;
|
|
|
|
extern const struct efi_hii_string_protocol efi_hii_string;
|
2016-03-04 00:10:00 +00:00
|
|
|
|
2017-09-13 22:05:30 +00:00
|
|
|
uint16_t *efi_dp_str(struct efi_device_path *dp);
|
|
|
|
|
2022-09-12 08:33:50 +00:00
|
|
|
/* GUID for the auto generated boot menu entry */
|
|
|
|
extern const efi_guid_t efi_guid_bootmenu_auto_generated;
|
|
|
|
|
2018-09-20 19:58:23 +00:00
|
|
|
/* GUID of the U-Boot root node */
|
|
|
|
extern const efi_guid_t efi_u_boot_guid;
|
efi_loader: device_path: support Sandbox's "host" devices
Sandbox's "host" devices are currently described as UCLASS_ROOT udevice
with DEV_IF_HOST block device. As the current implementation of
efi_device_path doesn't support such a type, any "host" device
on sandbox cannot be seen as a distinct object.
For example,
=> host bind 0 /foo/disk.img
=> efi devices
Scanning disk host0...
Found 1 disks
Device Device Path
================ ====================
0000000015c19970 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
0000000015c19d70 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
=> efi dh
Handle Protocols
================ ====================
0000000015c19970 Device Path, Device Path To Text, Device Path Utilities, Unicode Collation 2, HII String, HII Database, HII Config Routing
0000000015c19ba0 Driver Binding
0000000015c19c10 Simple Text Output
0000000015c19c80 Simple Text Input, Simple Text Input Ex
0000000015c19d70 Block IO, Device Path, Simple File System
As you can see here, efi_root (0x0000000015c19970) and host0 device
(0x0000000015c19d70) have the same representation of device path.
This is not only inconvenient, but also confusing since two different
efi objects are associated with the same device path and
efi_dp_find_obj() will possibly return a wrong result.
Solution:
Each "host" device should be given an additional device path node
of "vendor device path" to make it distinguishable.
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-09-12 04:52:35 +00:00
|
|
|
#ifdef CONFIG_SANDBOX
|
|
|
|
/* GUID of U-Boot host device on sandbox */
|
|
|
|
extern const efi_guid_t efi_guid_host_dev;
|
|
|
|
#endif
|
2018-01-19 19:24:45 +00:00
|
|
|
/* GUID of the EFI_BLOCK_IO_PROTOCOL */
|
|
|
|
extern const efi_guid_t efi_block_io_guid;
|
2017-09-13 22:05:38 +00:00
|
|
|
extern const efi_guid_t efi_global_variable_guid;
|
2016-03-04 00:10:00 +00:00
|
|
|
extern const efi_guid_t efi_guid_console_control;
|
2016-03-04 00:09:58 +00:00
|
|
|
extern const efi_guid_t efi_guid_device_path;
|
2022-03-19 06:04:03 +00:00
|
|
|
/* GUID of the EFI system partition */
|
|
|
|
extern const efi_guid_t efi_system_partition_guid;
|
2018-01-11 07:16:02 +00:00
|
|
|
/* GUID of the EFI_DRIVER_BINDING_PROTOCOL */
|
|
|
|
extern const efi_guid_t efi_guid_driver_binding_protocol;
|
2018-02-18 14:17:51 +00:00
|
|
|
/* event group ExitBootServices() invoked */
|
|
|
|
extern const efi_guid_t efi_guid_event_group_exit_boot_services;
|
|
|
|
/* event group SetVirtualAddressMap() invoked */
|
|
|
|
extern const efi_guid_t efi_guid_event_group_virtual_address_change;
|
|
|
|
/* event group memory map changed */
|
|
|
|
extern const efi_guid_t efi_guid_event_group_memory_map_change;
|
|
|
|
/* event group boot manager about to boot */
|
|
|
|
extern const efi_guid_t efi_guid_event_group_ready_to_boot;
|
|
|
|
/* event group ResetSystem() invoked (before ExitBootServices) */
|
|
|
|
extern const efi_guid_t efi_guid_event_group_reset_system;
|
2018-03-03 14:29:03 +00:00
|
|
|
/* GUID of the device tree table */
|
|
|
|
extern const efi_guid_t efi_guid_fdt;
|
2016-03-04 00:09:58 +00:00
|
|
|
extern const efi_guid_t efi_guid_loaded_image;
|
2019-03-27 04:40:32 +00:00
|
|
|
extern const efi_guid_t efi_guid_loaded_image_device_path;
|
2017-07-11 20:06:25 +00:00
|
|
|
extern const efi_guid_t efi_guid_device_path_to_text_protocol;
|
2017-09-13 22:05:34 +00:00
|
|
|
extern const efi_guid_t efi_simple_file_system_protocol_guid;
|
|
|
|
extern const efi_guid_t efi_file_info_guid;
|
2018-04-04 13:42:11 +00:00
|
|
|
/* GUID for file system information */
|
|
|
|
extern const efi_guid_t efi_file_system_info_guid;
|
2018-03-09 16:43:21 +00:00
|
|
|
extern const efi_guid_t efi_guid_device_path_utilities_protocol;
|
2019-05-16 16:19:00 +00:00
|
|
|
/* GUID of the deprecated Unicode collation protocol */
|
|
|
|
extern const efi_guid_t efi_guid_unicode_collation_protocol;
|
2020-12-04 02:33:41 +00:00
|
|
|
/* GUIDs of the Load File and Load File2 protocol */
|
|
|
|
extern const efi_guid_t efi_guid_load_file_protocol;
|
|
|
|
extern const efi_guid_t efi_guid_load_file2_protocol;
|
2018-09-04 17:34:58 +00:00
|
|
|
/* GUID of the Unicode collation protocol */
|
2019-05-16 05:52:58 +00:00
|
|
|
extern const efi_guid_t efi_guid_unicode_collation_protocol2;
|
2019-01-21 03:13:00 +00:00
|
|
|
extern const efi_guid_t efi_guid_hii_config_routing_protocol;
|
|
|
|
extern const efi_guid_t efi_guid_hii_config_access_protocol;
|
2019-01-21 03:12:57 +00:00
|
|
|
extern const efi_guid_t efi_guid_hii_database_protocol;
|
|
|
|
extern const efi_guid_t efi_guid_hii_string_protocol;
|
2020-04-14 02:51:39 +00:00
|
|
|
/* GUIDs for authentication */
|
|
|
|
extern const efi_guid_t efi_guid_image_security_database;
|
|
|
|
extern const efi_guid_t efi_guid_sha256;
|
|
|
|
extern const efi_guid_t efi_guid_cert_x509;
|
|
|
|
extern const efi_guid_t efi_guid_cert_x509_sha256;
|
2022-05-06 12:36:00 +00:00
|
|
|
extern const efi_guid_t efi_guid_cert_x509_sha384;
|
|
|
|
extern const efi_guid_t efi_guid_cert_x509_sha512;
|
2020-04-14 02:51:41 +00:00
|
|
|
extern const efi_guid_t efi_guid_cert_type_pkcs7;
|
2016-03-04 00:09:58 +00:00
|
|
|
|
2019-12-28 18:31:06 +00:00
|
|
|
/* GUID of RNG protocol */
|
|
|
|
extern const efi_guid_t efi_guid_rng_protocol;
|
2020-11-17 00:27:55 +00:00
|
|
|
/* GUID of capsule update result */
|
|
|
|
extern const efi_guid_t efi_guid_capsule_report;
|
2020-11-30 09:12:11 +00:00
|
|
|
/* GUID of firmware management protocol */
|
|
|
|
extern const efi_guid_t efi_guid_firmware_management_protocol;
|
2021-03-02 17:26:38 +00:00
|
|
|
/* GUID for the ESRT */
|
|
|
|
extern const efi_guid_t efi_esrt_guid;
|
2021-10-26 08:27:24 +00:00
|
|
|
/* GUID of the SMBIOS table */
|
|
|
|
extern const efi_guid_t smbios_guid;
|
2022-09-12 08:33:50 +00:00
|
|
|
/*GUID of console */
|
|
|
|
extern const efi_guid_t efi_guid_text_input_protocol;
|
2023-01-24 06:56:15 +00:00
|
|
|
extern const efi_guid_t efi_guid_text_output_protocol;
|
2019-12-28 18:31:06 +00:00
|
|
|
|
2021-05-20 11:23:56 +00:00
|
|
|
extern char __efi_runtime_start[], __efi_runtime_stop[];
|
|
|
|
extern char __efi_runtime_rel_start[], __efi_runtime_rel_stop[];
|
2016-03-04 00:10:01 +00:00
|
|
|
|
2019-05-21 15:51:35 +00:00
|
|
|
/**
|
|
|
|
* struct efi_open_protocol_info_item - open protocol info item
|
|
|
|
*
|
2018-01-11 07:15:57 +00:00
|
|
|
* When a protocol is opened a open protocol info entry is created.
|
|
|
|
* These are maintained in a list.
|
2019-05-21 15:51:35 +00:00
|
|
|
*
|
|
|
|
* @link: link to the list of open protocol info entries of a protocol
|
|
|
|
* @info: information about the opening of a protocol
|
2018-01-11 07:15:57 +00:00
|
|
|
*/
|
|
|
|
struct efi_open_protocol_info_item {
|
|
|
|
struct list_head link;
|
|
|
|
struct efi_open_protocol_info_entry info;
|
|
|
|
};
|
|
|
|
|
2019-05-21 15:51:35 +00:00
|
|
|
/**
|
|
|
|
* struct efi_handler - single protocol interface of a handle
|
|
|
|
*
|
2016-03-04 00:09:59 +00:00
|
|
|
* When the UEFI payload wants to open a protocol on an object to get its
|
|
|
|
* interface (usually a struct with callback functions), this struct maps the
|
2018-01-11 07:15:57 +00:00
|
|
|
* protocol GUID to the respective protocol interface
|
2019-05-21 15:51:35 +00:00
|
|
|
*
|
|
|
|
* @link: link to the list of protocols of a handle
|
|
|
|
* @guid: GUID of the protocol
|
|
|
|
* @protocol_interface: protocol interface
|
2021-02-25 07:02:37 +00:00
|
|
|
* @open_infos: link to the list of open protocol info items
|
2018-01-11 07:15:57 +00:00
|
|
|
*/
|
2016-03-04 00:09:59 +00:00
|
|
|
struct efi_handler {
|
2017-11-26 13:05:17 +00:00
|
|
|
struct list_head link;
|
2022-03-09 18:56:23 +00:00
|
|
|
const efi_guid_t guid;
|
2017-07-11 20:06:14 +00:00
|
|
|
void *protocol_interface;
|
2018-01-11 07:15:57 +00:00
|
|
|
struct list_head open_infos;
|
2016-03-04 00:09:59 +00:00
|
|
|
};
|
|
|
|
|
2019-05-01 12:20:18 +00:00
|
|
|
/**
|
|
|
|
* enum efi_object_type - type of EFI object
|
|
|
|
*
|
|
|
|
* In UnloadImage we must be able to identify if the handle relates to a
|
|
|
|
* started image.
|
|
|
|
*/
|
|
|
|
enum efi_object_type {
|
2021-02-25 07:02:37 +00:00
|
|
|
/** @EFI_OBJECT_TYPE_UNDEFINED: undefined image type */
|
2019-05-01 12:20:18 +00:00
|
|
|
EFI_OBJECT_TYPE_UNDEFINED = 0,
|
2021-02-25 07:02:37 +00:00
|
|
|
/** @EFI_OBJECT_TYPE_U_BOOT_FIRMWARE: U-Boot firmware */
|
2019-05-05 14:55:06 +00:00
|
|
|
EFI_OBJECT_TYPE_U_BOOT_FIRMWARE,
|
2021-02-25 07:02:37 +00:00
|
|
|
/** @EFI_OBJECT_TYPE_LOADED_IMAGE: loaded image (not started) */
|
2019-05-01 12:20:18 +00:00
|
|
|
EFI_OBJECT_TYPE_LOADED_IMAGE,
|
2021-02-25 07:02:37 +00:00
|
|
|
/** @EFI_OBJECT_TYPE_STARTED_IMAGE: started image */
|
2019-05-01 12:20:18 +00:00
|
|
|
EFI_OBJECT_TYPE_STARTED_IMAGE,
|
|
|
|
};
|
|
|
|
|
2018-09-26 03:27:55 +00:00
|
|
|
/**
|
|
|
|
* struct efi_object - dereferenced EFI handle
|
|
|
|
*
|
|
|
|
* @link: pointers to put the handle into a linked list
|
|
|
|
* @protocols: linked list with the protocol interfaces installed on this
|
|
|
|
* handle
|
2021-02-25 07:02:37 +00:00
|
|
|
* @type: image type if the handle relates to an image
|
2022-07-22 02:39:10 +00:00
|
|
|
* @dev: pointer to the DM device which is associated with this EFI handle
|
2018-09-26 03:27:55 +00:00
|
|
|
*
|
|
|
|
* UEFI offers a flexible and expandable object model. The objects in the UEFI
|
|
|
|
* API are devices, drivers, and loaded images. struct efi_object is our storage
|
|
|
|
* structure for these objects.
|
|
|
|
*
|
|
|
|
* When including this structure into a larger structure always put it first so
|
|
|
|
* that when deleting a handle the whole encompassing structure can be freed.
|
2016-03-04 00:09:59 +00:00
|
|
|
*
|
2018-09-26 03:27:55 +00:00
|
|
|
* A pointer to this structure is referred to as a handle. Typedef efi_handle_t
|
|
|
|
* has been created for such pointers.
|
2016-03-04 00:09:59 +00:00
|
|
|
*/
|
|
|
|
struct efi_object {
|
|
|
|
/* Every UEFI object is part of a global object list */
|
|
|
|
struct list_head link;
|
2017-11-26 13:05:17 +00:00
|
|
|
/* The list of protocols */
|
|
|
|
struct list_head protocols;
|
2019-05-01 12:20:18 +00:00
|
|
|
enum efi_object_type type;
|
2022-07-22 02:39:10 +00:00
|
|
|
struct udevice *dev;
|
2016-03-04 00:09:59 +00:00
|
|
|
};
|
|
|
|
|
2020-04-14 02:51:44 +00:00
|
|
|
enum efi_image_auth_status {
|
|
|
|
EFI_IMAGE_AUTH_FAILED = 0,
|
|
|
|
EFI_IMAGE_AUTH_PASSED,
|
|
|
|
};
|
|
|
|
|
2018-09-23 15:21:51 +00:00
|
|
|
/**
|
|
|
|
* struct efi_loaded_image_obj - handle of a loaded image
|
2018-09-26 03:27:56 +00:00
|
|
|
*
|
|
|
|
* @header: EFI object header
|
2019-04-30 15:57:30 +00:00
|
|
|
* @exit_status: exit status passed to Exit()
|
|
|
|
* @exit_data_size: exit data size passed to Exit()
|
|
|
|
* @exit_data: exit data passed to Exit()
|
2020-12-28 21:42:51 +00:00
|
|
|
* @exit_jmp: long jump buffer for returning from started image
|
2018-09-26 03:27:56 +00:00
|
|
|
* @entry: entry address of the relocated image
|
2020-12-28 21:42:51 +00:00
|
|
|
* @image_type: indicates if the image is an applicition or a driver
|
|
|
|
* @auth_status: indicates if the image is authenticated
|
2018-09-23 15:21:51 +00:00
|
|
|
*/
|
|
|
|
struct efi_loaded_image_obj {
|
2018-09-26 03:27:56 +00:00
|
|
|
struct efi_object header;
|
2020-12-28 22:24:40 +00:00
|
|
|
efi_status_t *exit_status;
|
2019-04-30 15:57:30 +00:00
|
|
|
efi_uintn_t *exit_data_size;
|
|
|
|
u16 **exit_data;
|
2020-12-28 22:24:40 +00:00
|
|
|
struct jmp_buf_data *exit_jmp;
|
2018-09-23 15:21:51 +00:00
|
|
|
EFIAPI efi_status_t (*entry)(efi_handle_t image_handle,
|
|
|
|
struct efi_system_table *st);
|
2019-05-01 18:07:04 +00:00
|
|
|
u16 image_type;
|
2020-04-14 02:51:44 +00:00
|
|
|
enum efi_image_auth_status auth_status;
|
2018-09-23 15:21:51 +00:00
|
|
|
};
|
|
|
|
|
2017-07-18 18:17:18 +00:00
|
|
|
/**
|
|
|
|
* struct efi_event
|
|
|
|
*
|
2018-02-18 14:17:50 +00:00
|
|
|
* @link: Link to list of all events
|
2019-06-05 19:00:39 +00:00
|
|
|
* @queue_link: Link to the list of queued events
|
2017-07-18 18:17:18 +00:00
|
|
|
* @type: Type of event, see efi_create_event
|
|
|
|
* @notify_tpl: Task priority level of notifications
|
2021-02-25 07:02:37 +00:00
|
|
|
* @notify_function: Function to call when the event is triggered
|
2017-07-18 18:17:18 +00:00
|
|
|
* @notify_context: Data to be passed to the notify function
|
2018-02-18 14:17:52 +00:00
|
|
|
* @group: Event group
|
2018-02-18 14:17:50 +00:00
|
|
|
* @trigger_time: Period of the timer
|
|
|
|
* @trigger_next: Next time to trigger the timer
|
2017-07-18 18:17:18 +00:00
|
|
|
* @trigger_type: Type of timer, see efi_set_timer
|
2018-02-18 14:17:50 +00:00
|
|
|
* @is_signaled: The event occurred. The event is in the signaled state.
|
2017-07-18 18:17:18 +00:00
|
|
|
*/
|
|
|
|
struct efi_event {
|
2018-02-18 14:17:50 +00:00
|
|
|
struct list_head link;
|
2019-06-05 19:00:39 +00:00
|
|
|
struct list_head queue_link;
|
2017-07-19 17:22:34 +00:00
|
|
|
uint32_t type;
|
2017-11-06 20:17:47 +00:00
|
|
|
efi_uintn_t notify_tpl;
|
2017-07-18 18:17:18 +00:00
|
|
|
void (EFIAPI *notify_function)(struct efi_event *event, void *context);
|
|
|
|
void *notify_context;
|
2018-02-18 14:17:52 +00:00
|
|
|
const efi_guid_t *group;
|
2017-07-18 18:17:18 +00:00
|
|
|
u64 trigger_next;
|
|
|
|
u64 trigger_time;
|
2017-07-19 17:22:34 +00:00
|
|
|
enum efi_timer_delay trigger_type;
|
2017-10-04 13:03:24 +00:00
|
|
|
bool is_signaled;
|
2017-07-18 18:17:18 +00:00
|
|
|
};
|
|
|
|
|
2016-03-04 00:09:59 +00:00
|
|
|
/* This list contains all UEFI objects we know of */
|
|
|
|
extern struct list_head efi_obj_list;
|
2018-02-18 14:17:52 +00:00
|
|
|
/* List of all events */
|
|
|
|
extern struct list_head efi_events;
|
2016-03-04 00:09:59 +00:00
|
|
|
|
2019-05-21 16:19:01 +00:00
|
|
|
/**
|
|
|
|
* struct efi_protocol_notification - handle for notified protocol
|
|
|
|
*
|
|
|
|
* When a protocol interface is installed for which an event was registered with
|
|
|
|
* the RegisterProtocolNotify() service this structure is used to hold the
|
|
|
|
* handle on which the protocol interface was installed.
|
|
|
|
*
|
|
|
|
* @link: link to list of all handles notified for this event
|
|
|
|
* @handle: handle on which the notified protocol interface was installed
|
|
|
|
*/
|
|
|
|
struct efi_protocol_notification {
|
|
|
|
struct list_head link;
|
|
|
|
efi_handle_t handle;
|
|
|
|
};
|
|
|
|
|
2019-05-04 15:27:54 +00:00
|
|
|
/**
|
2021-02-25 07:02:37 +00:00
|
|
|
* struct efi_register_notify_event - event registered by
|
|
|
|
* RegisterProtocolNotify()
|
2019-05-04 15:27:54 +00:00
|
|
|
*
|
|
|
|
* The address of this structure serves as registration value.
|
|
|
|
*
|
2019-05-21 16:19:01 +00:00
|
|
|
* @link: link to list of all registered events
|
|
|
|
* @event: registered event. The same event may registered for multiple
|
|
|
|
* GUIDs.
|
|
|
|
* @protocol: protocol for which the event is registered
|
|
|
|
* @handles: linked list of all handles on which the notified protocol was
|
|
|
|
* installed
|
2019-05-04 15:27:54 +00:00
|
|
|
*/
|
|
|
|
struct efi_register_notify_event {
|
|
|
|
struct list_head link;
|
|
|
|
struct efi_event *event;
|
|
|
|
efi_guid_t protocol;
|
2019-05-21 16:19:01 +00:00
|
|
|
struct list_head handles;
|
2019-05-04 15:27:54 +00:00
|
|
|
};
|
|
|
|
|
efi_loader: split efi_init_obj_list() into two stages
In the next commit, CONFIG_EFI_SETUP_EARLY will become mandated
in order to support dynamic enumeration of efi_disk objects.
This can, however, be problematic particularly in case of file-based
variable storage (efi_variable.c, default).
Non-volatile variables are to be restored from EFI system partition
by efi_init_variables() in efi_init_obj_list(). When efi_init_obj_list()
is called in board_init_r(), we don't know yet what disk devices
we have since none of device probing commands (say, scsi rescan) has not
been executed at that stage.
So in this commit, a preparatory change is made; efi_init_obj_list() is
broken into the two functions;
* efi_init_early(), and
* new efi_init_obj_list()
Only efi_init_early() will be called in board_init_r(), which allows
us to execute any of device probing commands, either though "preboot"
variable or normal command line, before calling efi_init_obj_list() which
is to be invoked at the first execution of an efi-related command
(or at efi_launch_capsules()) as used to be.
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
2022-04-19 01:05:11 +00:00
|
|
|
/* called at pre-initialization */
|
|
|
|
int efi_init_early(void);
|
efi_loader: move efi_init_obj_list() to a new efi_setup.c
The function, efi_init_obj_list(), can be shared in different pseudo efi
applications, like bootefi/bootmgr as well as my efishell. Moreover, it
will be utilized to extend efi initialization, for example, my "removable
disk support" patch and "capsule-on-disk support" patch in the future.
So with this patch, it will be moved to a new file, efi_setup.c, under
lib/efi_loader and exported, making no changes in functionality.
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Remove lines deactivated by #if 1 #else
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
Signed-off-by: Alexander Graf <agraf@suse.de>
2018-12-30 14:16:55 +00:00
|
|
|
/* Initialize efi execution environment */
|
|
|
|
efi_status_t efi_init_obj_list(void);
|
2023-06-19 21:22:58 +00:00
|
|
|
/* Append new boot option in BootOrder variable */
|
|
|
|
efi_status_t efi_bootmgr_append_bootorder(u16 index);
|
|
|
|
/* Get unused "Boot####" index */
|
|
|
|
efi_status_t efi_bootmgr_get_unused_bootoption(u16 *buf,
|
|
|
|
efi_uintn_t buf_size, u32 *index);
|
|
|
|
/* Generate the media device boot option */
|
|
|
|
efi_status_t efi_bootmgr_update_media_device_boot_option(void);
|
|
|
|
/* Delete selected boot option */
|
|
|
|
efi_status_t efi_bootmgr_delete_boot_option(u16 boot_index);
|
|
|
|
/* search the boot option index in BootOrder */
|
|
|
|
bool efi_search_bootorder(u16 *bootorder, efi_uintn_t num, u32 target, u32 *index);
|
2022-06-14 06:02:03 +00:00
|
|
|
/* Set up console modes */
|
|
|
|
void efi_setup_console_size(void);
|
2019-12-08 00:07:01 +00:00
|
|
|
/* Install device tree */
|
|
|
|
efi_status_t efi_install_fdt(void *fdt);
|
2019-12-07 19:51:06 +00:00
|
|
|
/* Run loaded UEFI image */
|
|
|
|
efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size);
|
2019-06-20 11:52:16 +00:00
|
|
|
/* Initialize variable services */
|
|
|
|
efi_status_t efi_init_variables(void);
|
2019-06-20 13:25:48 +00:00
|
|
|
/* Notify ExitBootServices() is called */
|
|
|
|
void efi_variables_boot_exit_notify(void);
|
2021-08-13 07:12:41 +00:00
|
|
|
efi_status_t efi_tcg2_notify_exit_boot_services_failed(void);
|
2021-08-13 07:12:40 +00:00
|
|
|
/* Measure efi application invocation */
|
2021-10-26 08:27:25 +00:00
|
|
|
efi_status_t efi_tcg2_measure_efi_app_invocation(struct efi_loaded_image_obj *handle);
|
2021-08-13 07:12:40 +00:00
|
|
|
/* Measure efi application exit */
|
|
|
|
efi_status_t efi_tcg2_measure_efi_app_exit(void);
|
2023-02-16 16:29:48 +00:00
|
|
|
/* Measure DTB */
|
|
|
|
efi_status_t efi_tcg2_measure_dtb(void *dtb);
|
2018-09-20 19:58:23 +00:00
|
|
|
/* Called by bootefi to initialize root node */
|
|
|
|
efi_status_t efi_root_node_register(void);
|
2018-06-28 10:45:31 +00:00
|
|
|
/* Called by bootefi to initialize runtime */
|
|
|
|
efi_status_t efi_initialize_system_table(void);
|
2019-07-05 15:42:16 +00:00
|
|
|
/* efi_runtime_detach() - detach unimplemented runtime functions */
|
|
|
|
void efi_runtime_detach(void);
|
2020-03-24 17:05:22 +00:00
|
|
|
/* efi_convert_pointer() - convert pointer to virtual address */
|
|
|
|
efi_status_t EFIAPI efi_convert_pointer(efi_uintn_t debug_disposition,
|
|
|
|
void **address);
|
2020-12-13 09:30:24 +00:00
|
|
|
/* Carve out DT reserved memory ranges */
|
|
|
|
void efi_carve_out_dt_rsv(void *fdt);
|
2022-01-03 12:07:37 +00:00
|
|
|
/* Purge unused kaslr-seed */
|
|
|
|
void efi_try_purge_kaslr_seed(void *fdt);
|
2017-07-18 18:17:22 +00:00
|
|
|
/* Called by bootefi to make console interface available */
|
2018-10-02 04:08:26 +00:00
|
|
|
efi_status_t efi_console_register(void);
|
efi_loader: ensure all block devices are probed
Only probed block devices are available in the UEFI sub-system. Multiple
block devices may be involved in the boot process. So we have to make sure
that all block devices are probed. Another reason is that we store UEFI
variables on the ESP which may be on any block device.
On the sandbox before the patch:
=> efidebug devices
No EFI system partition
Device Device Path
================ ====================
000000001b027c70 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000055d078bc1ae0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Uart(0,0,D,D)
000000001b22e0b0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/MAC(020011223344,1)
After the patch:
=> efidebug devices
No EFI system partition
Device Device Path
================ ====================
000000001b027c70 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000055bdac8ddae0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Uart(0,0,D,D)
000000001b230920 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/SD(2)/SD(0)
000000001b233ac0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/SD(1)/SD(1)
000000001b233b80 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/SD(1)/SD(1)/HD(1,GPT,d0a914ee-a71c-fc1e-73f0-7e302b0e6c20,0x30,0x1)
000000001b234110 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/SD(1)/SD(1)/HD(2,GPT,9330a0ea-8aff-f67a-294c-fa05d60896c3,0x31,0x1)
000000001b22f0e0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/SD(0)/SD(2)
000000001b238df0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/MAC(020011223344,1)
Fixes: a9bf024b2933 ("efi_loader: disk: a helper function to create efi_disk objects from udevice")
Signed-off-by: Heinrich Schuchardt <heinrich.schuchardt@canonical.com>
2022-08-31 14:37:35 +00:00
|
|
|
/* Called by efi_init_obj_list() to proble all block devices */
|
|
|
|
efi_status_t efi_disks_register(void);
|
2020-09-25 10:50:19 +00:00
|
|
|
/* Called by efi_init_obj_list() to install EFI_RNG_PROTOCOL */
|
|
|
|
efi_status_t efi_rng_register(void);
|
2020-11-11 09:18:11 +00:00
|
|
|
/* Called by efi_init_obj_list() to install EFI_TCG2_PROTOCOL */
|
|
|
|
efi_status_t efi_tcg2_register(void);
|
2022-01-28 15:18:44 +00:00
|
|
|
/* Called by efi_init_obj_list() to install RISCV_EFI_BOOT_PROTOCOL */
|
|
|
|
efi_status_t efi_riscv_register(void);
|
2021-12-07 05:15:31 +00:00
|
|
|
/* Called by efi_init_obj_list() to do initial measurement */
|
|
|
|
efi_status_t efi_tcg2_do_initial_measurement(void);
|
2021-05-26 03:09:58 +00:00
|
|
|
/* measure the pe-coff image, extend PCR and add Event Log */
|
|
|
|
efi_status_t tcg2_measure_pe_image(void *efi, u64 efi_size,
|
|
|
|
struct efi_loaded_image_obj *handle,
|
|
|
|
struct efi_loaded_image *loaded_image_info);
|
2018-01-19 19:24:47 +00:00
|
|
|
/* Create handles and protocols for the partitions of a block device */
|
|
|
|
int efi_disk_create_partitions(efi_handle_t parent, struct blk_desc *desc,
|
2022-09-17 15:00:09 +00:00
|
|
|
const char *uclass_idname, int diskid,
|
2018-01-19 19:24:47 +00:00
|
|
|
const char *pdevname);
|
2016-03-15 17:38:21 +00:00
|
|
|
/* Called by bootefi to make GOP (graphical) interface available */
|
2018-03-03 14:28:55 +00:00
|
|
|
efi_status_t efi_gop_register(void);
|
2016-05-06 19:01:01 +00:00
|
|
|
/* Called by bootefi to make the network interface available */
|
2018-03-03 14:28:56 +00:00
|
|
|
efi_status_t efi_net_register(void);
|
2017-10-18 16:13:04 +00:00
|
|
|
/* Called by bootefi to make the watchdog available */
|
2018-03-03 14:28:57 +00:00
|
|
|
efi_status_t efi_watchdog_register(void);
|
2020-02-21 07:55:45 +00:00
|
|
|
efi_status_t efi_initrd_register(void);
|
2022-10-16 08:36:32 +00:00
|
|
|
efi_status_t efi_initrd_deregister(void);
|
2016-08-18 23:23:29 +00:00
|
|
|
/* Called by bootefi to make SMBIOS tables available */
|
2018-06-28 03:38:03 +00:00
|
|
|
/**
|
|
|
|
* efi_acpi_register() - write out ACPI tables
|
|
|
|
*
|
|
|
|
* Called by bootefi to make ACPI tables available
|
|
|
|
*
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: 0 if OK, -ENOMEM if no memory is available for the tables
|
2018-06-28 03:38:03 +00:00
|
|
|
*/
|
|
|
|
efi_status_t efi_acpi_register(void);
|
2018-05-16 15:42:19 +00:00
|
|
|
/**
|
|
|
|
* efi_smbios_register() - write out SMBIOS tables
|
|
|
|
*
|
|
|
|
* Called by bootefi to make SMBIOS tables available
|
|
|
|
*
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: 0 if OK, -ENOMEM if no memory is available for the tables
|
2018-05-16 15:42:19 +00:00
|
|
|
*/
|
2018-03-03 14:28:54 +00:00
|
|
|
efi_status_t efi_smbios_register(void);
|
2016-05-06 19:01:01 +00:00
|
|
|
|
2017-09-13 22:05:34 +00:00
|
|
|
struct efi_simple_file_system_protocol *
|
|
|
|
efi_fs_from_path(struct efi_device_path *fp);
|
|
|
|
|
2017-10-18 16:13:04 +00:00
|
|
|
/* Called by efi_set_watchdog_timer to reset the timer */
|
|
|
|
efi_status_t efi_set_watchdog(unsigned long timeout);
|
2016-05-06 19:01:01 +00:00
|
|
|
|
2016-03-04 00:09:59 +00:00
|
|
|
/* Called from places to check whether a timer expired */
|
|
|
|
void efi_timer_check(void);
|
2021-01-12 11:40:32 +00:00
|
|
|
/* Check if a buffer contains a PE-COFF image */
|
|
|
|
efi_status_t efi_check_pe(void *buffer, size_t size, void **nt_header);
|
2016-03-04 00:09:59 +00:00
|
|
|
/* PE loader implementation */
|
2020-04-14 02:51:44 +00:00
|
|
|
efi_status_t efi_load_pe(struct efi_loaded_image_obj *handle,
|
|
|
|
void *efi, size_t efi_size,
|
2018-12-26 11:49:09 +00:00
|
|
|
struct efi_loaded_image *loaded_image_info);
|
2016-03-04 00:09:59 +00:00
|
|
|
/* Called once to store the pristine gd pointer */
|
|
|
|
void efi_save_gd(void);
|
2016-03-04 00:10:01 +00:00
|
|
|
/* Call this to relocate the runtime section to an address space */
|
|
|
|
void efi_runtime_relocate(ulong offset, struct efi_mem_desc *map);
|
2022-05-11 09:55:40 +00:00
|
|
|
/* Call this to get image parameters */
|
|
|
|
void efi_get_image_parameters(void **img_addr, size_t *img_size);
|
2017-11-26 13:05:23 +00:00
|
|
|
/* Add a new object to the object list. */
|
2018-09-26 03:27:55 +00:00
|
|
|
void efi_add_handle(efi_handle_t obj);
|
2017-10-26 17:25:49 +00:00
|
|
|
/* Create handle */
|
2018-01-11 07:16:09 +00:00
|
|
|
efi_status_t efi_create_handle(efi_handle_t *handle);
|
2017-12-04 17:03:02 +00:00
|
|
|
/* Delete handle */
|
2023-07-24 10:17:36 +00:00
|
|
|
efi_status_t efi_delete_handle(efi_handle_t obj);
|
2017-11-06 20:17:50 +00:00
|
|
|
/* Call this to validate a handle and find the EFI object for it */
|
2018-01-11 07:16:09 +00:00
|
|
|
struct efi_object *efi_search_obj(const efi_handle_t handle);
|
2022-04-28 08:09:38 +00:00
|
|
|
/* Locate device_path handle */
|
|
|
|
efi_status_t EFIAPI efi_locate_device_path(const efi_guid_t *protocol,
|
|
|
|
struct efi_device_path **device_path,
|
|
|
|
efi_handle_t *device);
|
2019-03-05 05:53:31 +00:00
|
|
|
/* Load image */
|
|
|
|
efi_status_t EFIAPI efi_load_image(bool boot_policy,
|
|
|
|
efi_handle_t parent_image,
|
|
|
|
struct efi_device_path *file_path,
|
|
|
|
void *source_buffer,
|
|
|
|
efi_uintn_t source_size,
|
|
|
|
efi_handle_t *image_handle);
|
2018-12-26 12:28:09 +00:00
|
|
|
/* Start image */
|
|
|
|
efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle,
|
|
|
|
efi_uintn_t *exit_data_size,
|
|
|
|
u16 **exit_data);
|
2019-03-05 05:53:31 +00:00
|
|
|
/* Unload image */
|
|
|
|
efi_status_t EFIAPI efi_unload_image(efi_handle_t image_handle);
|
2017-10-26 17:25:53 +00:00
|
|
|
/* Find a protocol on a handle */
|
2018-01-11 07:16:09 +00:00
|
|
|
efi_status_t efi_search_protocol(const efi_handle_t handle,
|
2017-10-26 17:25:53 +00:00
|
|
|
const efi_guid_t *protocol_guid,
|
|
|
|
struct efi_handler **handler);
|
|
|
|
/* Install new protocol on a handle */
|
2018-01-11 07:16:09 +00:00
|
|
|
efi_status_t efi_add_protocol(const efi_handle_t handle,
|
|
|
|
const efi_guid_t *protocol,
|
2017-10-26 17:25:53 +00:00
|
|
|
void *protocol_interface);
|
2020-01-10 11:33:59 +00:00
|
|
|
/* Open protocol */
|
|
|
|
efi_status_t efi_protocol_open(struct efi_handler *handler,
|
|
|
|
void **protocol_interface, void *agent_handle,
|
|
|
|
void *controller_handle, uint32_t attributes);
|
|
|
|
|
2019-04-12 04:59:49 +00:00
|
|
|
/* Install multiple protocol interfaces */
|
2022-10-06 13:08:46 +00:00
|
|
|
efi_status_t EFIAPI
|
|
|
|
efi_install_multiple_protocol_interfaces(efi_handle_t *handle, ...);
|
|
|
|
efi_status_t EFIAPI
|
|
|
|
efi_uninstall_multiple_protocol_interfaces(efi_handle_t handle, ...);
|
2020-03-17 02:12:36 +00:00
|
|
|
/* Get handles that support a given protocol */
|
|
|
|
efi_status_t EFIAPI efi_locate_handle_buffer(
|
|
|
|
enum efi_locate_search_type search_type,
|
|
|
|
const efi_guid_t *protocol, void *search_key,
|
|
|
|
efi_uintn_t *no_handles, efi_handle_t **buffer);
|
2022-10-07 13:18:15 +00:00
|
|
|
/* Close a previously opened protocol interface */
|
|
|
|
efi_status_t efi_close_protocol(efi_handle_t handle, const efi_guid_t *protocol,
|
|
|
|
efi_handle_t agent_handle,
|
|
|
|
efi_handle_t controller_handle);
|
2020-03-17 02:12:36 +00:00
|
|
|
/* Open a protocol interface */
|
|
|
|
efi_status_t EFIAPI efi_handle_protocol(efi_handle_t handle,
|
|
|
|
const efi_guid_t *protocol,
|
|
|
|
void **protocol_interface);
|
2017-07-18 18:17:20 +00:00
|
|
|
/* Call this to create an event */
|
2017-11-06 20:17:47 +00:00
|
|
|
efi_status_t efi_create_event(uint32_t type, efi_uintn_t notify_tpl,
|
2017-07-18 18:17:20 +00:00
|
|
|
void (EFIAPI *notify_function) (
|
|
|
|
struct efi_event *event,
|
|
|
|
void *context),
|
2018-02-18 14:17:52 +00:00
|
|
|
void *notify_context, efi_guid_t *group,
|
|
|
|
struct efi_event **event);
|
2017-07-18 18:17:21 +00:00
|
|
|
/* Call this to set a timer */
|
2017-07-19 17:22:34 +00:00
|
|
|
efi_status_t efi_set_timer(struct efi_event *event, enum efi_timer_delay type,
|
2017-07-18 18:17:21 +00:00
|
|
|
uint64_t trigger_time);
|
2017-07-18 18:17:22 +00:00
|
|
|
/* Call this to signal an event */
|
2019-06-07 04:47:01 +00:00
|
|
|
void efi_signal_event(struct efi_event *event);
|
2016-03-04 00:10:01 +00:00
|
|
|
|
2022-05-12 02:29:01 +00:00
|
|
|
/* return true if the device is removable */
|
|
|
|
bool efi_disk_is_removable(efi_handle_t handle);
|
|
|
|
|
2023-07-30 12:03:53 +00:00
|
|
|
/**
|
|
|
|
* efi_create_simple_file_system() - create simple file system protocol
|
|
|
|
*
|
|
|
|
* Create a simple file system protocol for a partition.
|
|
|
|
*
|
|
|
|
* @desc: block device descriptor
|
|
|
|
* @part: partition number
|
|
|
|
* @dp: device path
|
|
|
|
* @fsp: simple file system protocol
|
|
|
|
* Return: status code
|
|
|
|
*/
|
|
|
|
efi_status_t
|
|
|
|
efi_create_simple_file_system(struct blk_desc *desc, int part,
|
|
|
|
struct efi_device_path *dp,
|
|
|
|
struct efi_simple_file_system_protocol **fsp);
|
2017-09-13 22:05:34 +00:00
|
|
|
|
|
|
|
/* open file from device-path: */
|
|
|
|
struct efi_file_handle *efi_file_from_path(struct efi_device_path *fp);
|
|
|
|
|
2021-03-02 17:26:38 +00:00
|
|
|
/* Registers a callback function for a notification event. */
|
|
|
|
efi_status_t EFIAPI efi_register_protocol_notify(const efi_guid_t *protocol,
|
|
|
|
struct efi_event *event,
|
|
|
|
void **registration);
|
2021-03-17 19:54:59 +00:00
|
|
|
efi_status_t efi_file_size(struct efi_file_handle *fh, efi_uintn_t *size);
|
|
|
|
|
|
|
|
/* get a device path from a Boot#### option */
|
|
|
|
struct efi_device_path *efi_get_dp_from_boot(const efi_guid_t guid);
|
|
|
|
|
2022-05-06 12:36:00 +00:00
|
|
|
/* get len, string (used in u-boot crypto from a guid */
|
|
|
|
const char *guid_to_sha_str(const efi_guid_t *guid);
|
|
|
|
int algo_to_len(const char *algo);
|
|
|
|
|
2022-07-22 02:39:10 +00:00
|
|
|
int efi_link_dev(efi_handle_t handle, struct udevice *dev);
|
2022-10-03 07:47:51 +00:00
|
|
|
int efi_unlink_dev(efi_handle_t handle);
|
2022-12-02 04:59:35 +00:00
|
|
|
bool efi_varname_is_load_option(u16 *var_name16, int *index);
|
2022-12-19 02:33:12 +00:00
|
|
|
efi_status_t efi_next_variable_name(efi_uintn_t *size, u16 **buf,
|
|
|
|
efi_guid_t *guid);
|
2022-07-22 02:39:10 +00:00
|
|
|
|
2018-11-18 16:58:49 +00:00
|
|
|
/**
|
|
|
|
* efi_size_in_pages() - convert size in bytes to size in pages
|
|
|
|
*
|
|
|
|
* This macro returns the number of EFI memory pages required to hold 'size'
|
|
|
|
* bytes.
|
|
|
|
*
|
|
|
|
* @size: size in bytes
|
|
|
|
* Return: size in pages
|
|
|
|
*/
|
2021-01-17 06:52:09 +00:00
|
|
|
#define efi_size_in_pages(size) (((size) + EFI_PAGE_MASK) >> EFI_PAGE_SHIFT)
|
2023-03-19 08:20:22 +00:00
|
|
|
/* Allocate boot service data pool memory */
|
|
|
|
void *efi_alloc(size_t len);
|
2021-10-11 12:10:23 +00:00
|
|
|
/* Allocate pages on the specified alignment */
|
|
|
|
void *efi_alloc_aligned_pages(u64 len, int memory_type, size_t align);
|
2016-03-04 00:10:04 +00:00
|
|
|
/* More specific EFI memory allocator, called by EFI payloads */
|
2021-08-17 13:05:31 +00:00
|
|
|
efi_status_t efi_allocate_pages(enum efi_allocate_type type,
|
|
|
|
enum efi_memory_type memory_type,
|
|
|
|
efi_uintn_t pages, uint64_t *memory);
|
2016-10-01 21:32:27 +00:00
|
|
|
/* EFI memory free function. */
|
2017-11-06 20:17:48 +00:00
|
|
|
efi_status_t efi_free_pages(uint64_t memory, efi_uintn_t pages);
|
2016-10-09 20:17:18 +00:00
|
|
|
/* EFI memory allocator for small allocations */
|
2021-08-17 13:05:31 +00:00
|
|
|
efi_status_t efi_allocate_pool(enum efi_memory_type pool_type,
|
|
|
|
efi_uintn_t size, void **buffer);
|
2016-10-09 20:17:26 +00:00
|
|
|
/* EFI pool memory free function. */
|
|
|
|
efi_status_t efi_free_pool(void *buffer);
|
2023-01-05 17:26:01 +00:00
|
|
|
/* Allocate and retrieve EFI memory map */
|
|
|
|
efi_status_t efi_get_memory_map_alloc(efi_uintn_t *map_size,
|
|
|
|
struct efi_mem_desc **memory_map);
|
2016-03-04 00:10:04 +00:00
|
|
|
/* Returns the EFI memory map */
|
2017-11-06 20:17:48 +00:00
|
|
|
efi_status_t efi_get_memory_map(efi_uintn_t *memory_map_size,
|
2016-03-04 00:10:04 +00:00
|
|
|
struct efi_mem_desc *memory_map,
|
2017-11-06 20:17:48 +00:00
|
|
|
efi_uintn_t *map_key,
|
|
|
|
efi_uintn_t *descriptor_size,
|
2016-03-04 00:10:04 +00:00
|
|
|
uint32_t *descriptor_version);
|
|
|
|
/* Adds a range into the EFI memory map */
|
2020-05-17 10:29:19 +00:00
|
|
|
efi_status_t efi_add_memory_map(u64 start, u64 size, int memory_type);
|
2019-09-03 17:43:43 +00:00
|
|
|
/* Adds a conventional range into the EFI memory map */
|
|
|
|
efi_status_t efi_add_conventional_memory_map(u64 ram_start, u64 ram_end,
|
|
|
|
u64 ram_top);
|
|
|
|
|
2018-01-21 18:29:30 +00:00
|
|
|
/* Called by board init to initialize the EFI drivers */
|
2018-02-01 11:53:32 +00:00
|
|
|
efi_status_t efi_driver_init(void);
|
2022-10-06 05:29:41 +00:00
|
|
|
/* Called when a block device is added */
|
|
|
|
int efi_disk_probe(void *ctx, struct event *event);
|
|
|
|
/* Called when a block device is removed */
|
|
|
|
int efi_disk_remove(void *ctx, struct event *event);
|
2016-03-04 00:10:04 +00:00
|
|
|
/* Called by board init to initialize the EFI memory map */
|
|
|
|
int efi_memory_init(void);
|
2016-08-18 23:23:24 +00:00
|
|
|
/* Adds new or overrides configuration table entry to the system table */
|
|
|
|
efi_status_t efi_install_configuration_table(const efi_guid_t *guid, void *table);
|
2017-12-04 17:03:01 +00:00
|
|
|
/* Sets up a loaded image */
|
2018-09-23 15:21:51 +00:00
|
|
|
efi_status_t efi_setup_loaded_image(struct efi_device_path *device_path,
|
|
|
|
struct efi_device_path *file_path,
|
|
|
|
struct efi_loaded_image_obj **handle_ptr,
|
|
|
|
struct efi_loaded_image **info_ptr);
|
2016-03-04 00:10:04 +00:00
|
|
|
|
2016-05-11 16:25:48 +00:00
|
|
|
#ifdef CONFIG_EFI_LOADER_BOUNCE_BUFFER
|
|
|
|
extern void *efi_bounce_buffer;
|
|
|
|
#define EFI_LOADER_BOUNCE_BUFFER_SIZE (64 * 1024 * 1024)
|
|
|
|
#endif
|
|
|
|
|
2022-02-26 11:10:10 +00:00
|
|
|
/* shorten device path */
|
|
|
|
struct efi_device_path *efi_dp_shorten(struct efi_device_path *dp);
|
2017-09-13 22:05:28 +00:00
|
|
|
struct efi_device_path *efi_dp_next(const struct efi_device_path *dp);
|
2017-10-26 17:25:48 +00:00
|
|
|
int efi_dp_match(const struct efi_device_path *a,
|
|
|
|
const struct efi_device_path *b);
|
2022-03-04 07:20:00 +00:00
|
|
|
efi_handle_t efi_dp_find_obj(struct efi_device_path *dp,
|
2022-03-19 05:35:43 +00:00
|
|
|
const efi_guid_t *guid,
|
2022-03-04 07:20:00 +00:00
|
|
|
struct efi_device_path **rem);
|
2018-04-16 05:59:08 +00:00
|
|
|
/* get size of the first device path instance excluding end node */
|
|
|
|
efi_uintn_t efi_dp_instance_size(const struct efi_device_path *dp);
|
|
|
|
/* size of multi-instance device path excluding end node */
|
|
|
|
efi_uintn_t efi_dp_size(const struct efi_device_path *dp);
|
2017-09-13 22:05:28 +00:00
|
|
|
struct efi_device_path *efi_dp_dup(const struct efi_device_path *dp);
|
|
|
|
struct efi_device_path *efi_dp_append(const struct efi_device_path *dp1,
|
|
|
|
const struct efi_device_path *dp2);
|
|
|
|
struct efi_device_path *efi_dp_append_node(const struct efi_device_path *dp,
|
|
|
|
const struct efi_device_path *node);
|
2018-04-16 05:59:05 +00:00
|
|
|
/* Create a device path node of given type, sub-type, length */
|
|
|
|
struct efi_device_path *efi_dp_create_device_node(const u8 type,
|
|
|
|
const u8 sub_type,
|
|
|
|
const u16 length);
|
2018-04-16 05:59:09 +00:00
|
|
|
/* Append device path instance */
|
|
|
|
struct efi_device_path *efi_dp_append_instance(
|
|
|
|
const struct efi_device_path *dp,
|
|
|
|
const struct efi_device_path *dpi);
|
|
|
|
/* Get next device path instance */
|
|
|
|
struct efi_device_path *efi_dp_get_next_instance(struct efi_device_path **dp,
|
|
|
|
efi_uintn_t *size);
|
|
|
|
/* Check if a device path contains muliple instances */
|
|
|
|
bool efi_dp_is_multi_instance(const struct efi_device_path *dp);
|
2017-09-13 22:05:28 +00:00
|
|
|
|
|
|
|
struct efi_device_path *efi_dp_from_part(struct blk_desc *desc, int part);
|
2018-01-19 19:24:46 +00:00
|
|
|
/* Create a device node for a block device partition. */
|
|
|
|
struct efi_device_path *efi_dp_part_node(struct blk_desc *desc, int part);
|
2023-05-13 08:36:21 +00:00
|
|
|
struct efi_device_path *efi_dp_from_file(const struct efi_device_path *dp,
|
2017-09-13 22:05:28 +00:00
|
|
|
const char *path);
|
|
|
|
struct efi_device_path *efi_dp_from_eth(void);
|
2017-10-10 12:23:06 +00:00
|
|
|
struct efi_device_path *efi_dp_from_mem(uint32_t mem_type,
|
|
|
|
uint64_t start_address,
|
|
|
|
uint64_t end_address);
|
2018-01-19 19:24:49 +00:00
|
|
|
/* Determine the last device path node that is not the end node. */
|
|
|
|
const struct efi_device_path *efi_dp_last_node(
|
|
|
|
const struct efi_device_path *dp);
|
2018-01-19 19:24:37 +00:00
|
|
|
efi_status_t efi_dp_split_file_path(struct efi_device_path *full_path,
|
|
|
|
struct efi_device_path **device_path,
|
|
|
|
struct efi_device_path **file_path);
|
2022-02-04 19:47:09 +00:00
|
|
|
struct efi_device_path *efi_dp_from_uart(void);
|
2018-10-17 07:32:03 +00:00
|
|
|
efi_status_t efi_dp_from_name(const char *dev, const char *devnr,
|
|
|
|
const char *path,
|
|
|
|
struct efi_device_path **device,
|
|
|
|
struct efi_device_path **file);
|
2020-08-23 08:49:46 +00:00
|
|
|
ssize_t efi_dp_check_length(const struct efi_device_path *dp,
|
|
|
|
const size_t maxlen);
|
2017-09-13 22:05:28 +00:00
|
|
|
|
|
|
|
#define EFI_DP_TYPE(_dp, _type, _subtype) \
|
|
|
|
(((_dp)->type == DEVICE_PATH_TYPE_##_type) && \
|
|
|
|
((_dp)->sub_type == DEVICE_PATH_SUB_TYPE_##_subtype))
|
|
|
|
|
2022-06-19 04:55:59 +00:00
|
|
|
/* template END node: */
|
|
|
|
extern const struct efi_device_path END;
|
|
|
|
|
2019-06-05 04:21:38 +00:00
|
|
|
/* Indicate supported runtime services */
|
|
|
|
efi_status_t efi_init_runtime_supported(void);
|
|
|
|
|
2018-07-29 07:49:04 +00:00
|
|
|
/* Update CRC32 in table header */
|
|
|
|
void __efi_runtime efi_update_table_header_crc32(struct efi_table_hdr *table);
|
|
|
|
|
2016-08-16 19:08:45 +00:00
|
|
|
/* Boards may provide the functions below to implement RTS functionality */
|
|
|
|
|
2016-10-14 11:45:30 +00:00
|
|
|
void __efi_runtime EFIAPI efi_reset_system(
|
2016-08-16 19:08:45 +00:00
|
|
|
enum efi_reset_type reset_type,
|
|
|
|
efi_status_t reset_status,
|
|
|
|
unsigned long data_size, void *reset_data);
|
2018-03-03 14:28:59 +00:00
|
|
|
|
|
|
|
/* Architecture specific initialization of the EFI subsystem */
|
|
|
|
efi_status_t efi_reset_system_init(void);
|
2016-08-16 19:08:45 +00:00
|
|
|
|
2016-10-14 11:45:30 +00:00
|
|
|
efi_status_t __efi_runtime EFIAPI efi_get_time(
|
2016-08-16 19:08:45 +00:00
|
|
|
struct efi_time *time,
|
|
|
|
struct efi_time_cap *capabilities);
|
|
|
|
|
2019-05-31 05:38:29 +00:00
|
|
|
efi_status_t __efi_runtime EFIAPI efi_set_time(struct efi_time *time);
|
|
|
|
|
2017-09-15 08:06:11 +00:00
|
|
|
#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
|
|
|
|
/*
|
|
|
|
* Entry point for the tests of the EFI API.
|
|
|
|
* It is called by 'bootefi selftest'
|
|
|
|
*/
|
|
|
|
efi_status_t EFIAPI efi_selftest(efi_handle_t image_handle,
|
|
|
|
struct efi_system_table *systab);
|
|
|
|
#endif
|
|
|
|
|
2018-12-30 19:53:51 +00:00
|
|
|
efi_status_t EFIAPI efi_get_variable(u16 *variable_name,
|
|
|
|
const efi_guid_t *vendor, u32 *attributes,
|
|
|
|
efi_uintn_t *data_size, void *data);
|
2018-05-17 05:57:05 +00:00
|
|
|
efi_status_t EFIAPI efi_get_next_variable_name(efi_uintn_t *variable_name_size,
|
|
|
|
u16 *variable_name,
|
2020-03-22 17:28:20 +00:00
|
|
|
efi_guid_t *vendor);
|
2018-12-30 19:53:51 +00:00
|
|
|
efi_status_t EFIAPI efi_set_variable(u16 *variable_name,
|
|
|
|
const efi_guid_t *vendor, u32 attributes,
|
2018-12-30 20:03:15 +00:00
|
|
|
efi_uintn_t data_size, const void *data);
|
efi_loader: efi variable support
Add EFI variable support, mapping to u-boot environment variables.
Variables are pretty important for setting up boot order, among other
things. If the board supports saveenv, then it will be called in
ExitBootServices() to persist variables set by the efi payload. (For
example, fallback.efi configuring BootOrder and BootXXXX load-option
variables.)
Variables are *not* currently exposed at runtime, post ExitBootServices.
On boards without a dedicated device for storage, which the loaded OS
is not trying to also use, this is rather tricky. One idea, at least
for boards that can persist RAM across reboot, is to keep a "journal"
of modified variables in RAM, and then turn halt into a reboot into
u-boot, plus store variables, plus halt. Whatever the solution, it
likely involves some per-board support.
Mapping between EFI variables and u-boot variables:
efi_$guid_$varname = {attributes}(type)value
For example:
efi_8be4df61-93ca-11d2-aa0d-00e098032b8c_OsIndicationsSupported=
"{ro,boot,run}(blob)0000000000000000"
efi_8be4df61-93ca-11d2-aa0d-00e098032b8c_BootOrder=
"(blob)00010000"
The attributes are a comma separated list of these possible
attributes:
+ ro - read-only
+ boot - boot-services access
+ run - runtime access
NOTE: with current implementation, no variables are available after
ExitBootServices, and all are persisted (if possible).
If not specified, the attributes default to "{boot}".
The required type is one of:
+ utf8 - raw utf8 string
+ blob - arbitrary length hex string
Signed-off-by: Rob Clark <robdclark@gmail.com>
Signed-off-by: Alexander Graf <agraf@suse.de>
2017-09-13 22:05:37 +00:00
|
|
|
|
2019-06-20 10:13:05 +00:00
|
|
|
efi_status_t EFIAPI efi_query_variable_info(
|
|
|
|
u32 attributes, u64 *maximum_variable_storage_size,
|
|
|
|
u64 *remaining_variable_storage_size,
|
|
|
|
u64 *maximum_variable_size);
|
|
|
|
|
2021-09-09 05:12:14 +00:00
|
|
|
void *efi_get_var(const u16 *name, const efi_guid_t *vendor, efi_uintn_t *size);
|
2021-03-17 19:54:59 +00:00
|
|
|
|
2018-11-05 09:06:41 +00:00
|
|
|
/*
|
|
|
|
* See section 3.1.3 in the v2.7 UEFI spec for more details on
|
|
|
|
* the layout of EFI_LOAD_OPTION. In short it is:
|
|
|
|
*
|
|
|
|
* typedef struct _EFI_LOAD_OPTION {
|
|
|
|
* UINT32 Attributes;
|
|
|
|
* UINT16 FilePathListLength;
|
|
|
|
* // CHAR16 Description[]; <-- variable length, NULL terminated
|
|
|
|
* // EFI_DEVICE_PATH_PROTOCOL FilePathList[];
|
|
|
|
* <-- FilePathListLength bytes
|
|
|
|
* // UINT8 OptionalData[];
|
|
|
|
* } EFI_LOAD_OPTION;
|
|
|
|
*/
|
|
|
|
struct efi_load_option {
|
|
|
|
u32 attributes;
|
|
|
|
u16 file_path_length;
|
|
|
|
u16 *label;
|
|
|
|
struct efi_device_path *file_path;
|
2019-04-29 11:51:45 +00:00
|
|
|
const u8 *optional_data;
|
2018-11-05 09:06:41 +00:00
|
|
|
};
|
|
|
|
|
2021-03-17 19:54:58 +00:00
|
|
|
struct efi_device_path *efi_dp_from_lo(struct efi_load_option *lo,
|
2021-10-14 23:31:02 +00:00
|
|
|
const efi_guid_t *guid);
|
2021-03-17 19:54:58 +00:00
|
|
|
struct efi_device_path *efi_dp_concat(const struct efi_device_path *dp1,
|
|
|
|
const struct efi_device_path *dp2);
|
2021-10-26 08:27:25 +00:00
|
|
|
struct efi_device_path *search_gpt_dp_node(struct efi_device_path *device_path);
|
2020-05-31 20:46:09 +00:00
|
|
|
efi_status_t efi_deserialize_load_option(struct efi_load_option *lo, u8 *data,
|
|
|
|
efi_uintn_t *size);
|
2018-11-05 09:06:41 +00:00
|
|
|
unsigned long efi_serialize_load_option(struct efi_load_option *lo, u8 **data);
|
2020-08-07 15:47:13 +00:00
|
|
|
efi_status_t efi_set_load_options(efi_handle_t handle,
|
|
|
|
efi_uintn_t load_options_size,
|
|
|
|
void *load_options);
|
2020-08-07 15:49:39 +00:00
|
|
|
efi_status_t efi_bootmgr_load(efi_handle_t *handle, void **load_options);
|
2017-09-13 22:05:38 +00:00
|
|
|
|
2020-04-14 02:51:39 +00:00
|
|
|
/**
|
2021-02-25 07:02:37 +00:00
|
|
|
* struct efi_image_regions - A list of memory regions
|
2020-04-14 02:51:39 +00:00
|
|
|
*
|
|
|
|
* @max: Maximum number of regions
|
|
|
|
* @num: Number of regions
|
|
|
|
* @reg: array of regions
|
|
|
|
*/
|
|
|
|
struct efi_image_regions {
|
|
|
|
int max;
|
|
|
|
int num;
|
|
|
|
struct image_region reg[];
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
2021-02-25 07:02:37 +00:00
|
|
|
* struct efi_sig_data - A decoded data of struct efi_signature_data
|
2020-04-14 02:51:39 +00:00
|
|
|
*
|
|
|
|
* This structure represents an internal form of signature in
|
|
|
|
* signature database. A listed list may represent a signature list.
|
|
|
|
*
|
|
|
|
* @next: Pointer to next entry
|
2021-02-25 07:02:37 +00:00
|
|
|
* @owner: Signature owner
|
2020-04-14 02:51:39 +00:00
|
|
|
* @data: Pointer to signature data
|
|
|
|
* @size: Size of signature data
|
|
|
|
*/
|
|
|
|
struct efi_sig_data {
|
|
|
|
struct efi_sig_data *next;
|
|
|
|
efi_guid_t owner;
|
|
|
|
void *data;
|
|
|
|
size_t size;
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
2021-02-25 07:02:37 +00:00
|
|
|
* struct efi_signature_store - A decoded data of signature database
|
2020-04-14 02:51:39 +00:00
|
|
|
*
|
|
|
|
* This structure represents an internal form of signature database.
|
|
|
|
*
|
|
|
|
* @next: Pointer to next entry
|
|
|
|
* @sig_type: Signature type
|
|
|
|
* @sig_data_list: Pointer to signature list
|
|
|
|
*/
|
|
|
|
struct efi_signature_store {
|
|
|
|
struct efi_signature_store *next;
|
|
|
|
efi_guid_t sig_type;
|
|
|
|
struct efi_sig_data *sig_data_list;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct x509_certificate;
|
|
|
|
struct pkcs7_message;
|
|
|
|
|
2022-09-12 08:33:54 +00:00
|
|
|
/**
|
|
|
|
* struct eficonfig_media_boot_option - boot option for (removable) media device
|
|
|
|
*
|
|
|
|
* This structure is used to enumerate possible boot option
|
|
|
|
*
|
|
|
|
* @lo: Serialized load option data
|
|
|
|
* @size: Size of serialized load option data
|
|
|
|
* @exist: Flag to indicate the load option already exists
|
|
|
|
* in Non-volatile load option
|
|
|
|
*/
|
|
|
|
struct eficonfig_media_boot_option {
|
|
|
|
void *lo;
|
|
|
|
efi_uintn_t size;
|
|
|
|
bool exist;
|
|
|
|
};
|
|
|
|
|
2022-07-05 05:48:12 +00:00
|
|
|
bool efi_hash_regions(struct image_region *regs, int count,
|
|
|
|
void **hash, const char *hash_algo, int *len);
|
2020-07-08 05:01:57 +00:00
|
|
|
bool efi_signature_lookup_digest(struct efi_image_regions *regs,
|
2022-01-28 22:20:31 +00:00
|
|
|
struct efi_signature_store *db,
|
|
|
|
bool dbx);
|
2020-07-21 10:35:22 +00:00
|
|
|
bool efi_signature_verify(struct efi_image_regions *regs,
|
|
|
|
struct pkcs7_message *msg,
|
|
|
|
struct efi_signature_store *db,
|
|
|
|
struct efi_signature_store *dbx);
|
2020-08-14 05:39:23 +00:00
|
|
|
static inline bool efi_signature_verify_one(struct efi_image_regions *regs,
|
|
|
|
struct pkcs7_message *msg,
|
|
|
|
struct efi_signature_store *db)
|
|
|
|
{
|
|
|
|
return efi_signature_verify(regs, msg, db, NULL);
|
|
|
|
}
|
2020-07-08 05:01:56 +00:00
|
|
|
bool efi_signature_check_signers(struct pkcs7_message *msg,
|
|
|
|
struct efi_signature_store *dbx);
|
2020-04-14 02:51:39 +00:00
|
|
|
|
|
|
|
efi_status_t efi_image_region_add(struct efi_image_regions *regs,
|
|
|
|
const void *start, const void *end,
|
|
|
|
int nocheck);
|
2020-04-14 02:51:40 +00:00
|
|
|
|
|
|
|
void efi_sigstore_free(struct efi_signature_store *sigstore);
|
2020-12-30 13:57:08 +00:00
|
|
|
struct efi_signature_store *efi_build_signature_store(void *sig_list,
|
|
|
|
efi_uintn_t size);
|
2020-04-14 02:51:40 +00:00
|
|
|
struct efi_signature_store *efi_sigstore_parse_sigdb(u16 *name);
|
2020-04-14 02:51:41 +00:00
|
|
|
|
|
|
|
bool efi_secure_boot_enabled(void);
|
2020-04-14 02:51:44 +00:00
|
|
|
|
2020-12-30 13:57:09 +00:00
|
|
|
bool efi_capsule_auth_enabled(void);
|
|
|
|
|
2021-05-26 03:09:58 +00:00
|
|
|
void *efi_prepare_aligned_image(void *efi, u64 *efi_size);
|
|
|
|
|
2020-04-14 02:51:44 +00:00
|
|
|
bool efi_image_parse(void *efi, size_t len, struct efi_image_regions **regp,
|
|
|
|
WIN_CERTIFICATE **auth, size_t *auth_len);
|
2020-04-14 02:51:39 +00:00
|
|
|
|
2020-12-30 13:57:07 +00:00
|
|
|
struct pkcs7_message *efi_parse_pkcs7_header(const void *buf,
|
|
|
|
size_t buflen,
|
|
|
|
u8 **tmpbuf);
|
|
|
|
|
2020-06-28 14:30:29 +00:00
|
|
|
/* runtime implementation of memcpy() */
|
|
|
|
void efi_memcpy_runtime(void *dest, const void *src, size_t n);
|
|
|
|
|
2022-10-05 12:18:35 +00:00
|
|
|
/* commonly used helper functions */
|
2020-12-31 10:26:46 +00:00
|
|
|
u16 *efi_create_indexed_name(u16 *buffer, size_t buffer_size, const char *name,
|
|
|
|
unsigned int index);
|
2022-10-05 12:18:35 +00:00
|
|
|
efi_string_t efi_convert_string(const char *str);
|
2020-10-29 04:47:46 +00:00
|
|
|
|
2020-11-30 09:12:12 +00:00
|
|
|
extern const struct efi_firmware_management_protocol efi_fmp_fit;
|
2020-11-17 00:28:00 +00:00
|
|
|
extern const struct efi_firmware_management_protocol efi_fmp_raw;
|
2020-11-30 09:12:12 +00:00
|
|
|
|
2020-11-17 00:27:55 +00:00
|
|
|
/* Capsule update */
|
|
|
|
efi_status_t EFIAPI efi_update_capsule(
|
|
|
|
struct efi_capsule_header **capsule_header_array,
|
|
|
|
efi_uintn_t capsule_count,
|
|
|
|
u64 scatter_gather_list);
|
|
|
|
efi_status_t EFIAPI efi_query_capsule_caps(
|
|
|
|
struct efi_capsule_header **capsule_header_array,
|
|
|
|
efi_uintn_t capsule_count,
|
|
|
|
u64 *maximum_capsule_size,
|
|
|
|
u32 *reset_type);
|
|
|
|
|
2020-12-30 13:57:09 +00:00
|
|
|
efi_status_t efi_capsule_authenticate(const void *capsule,
|
|
|
|
efi_uintn_t capsule_size,
|
|
|
|
void **image, efi_uintn_t *image_size);
|
|
|
|
|
2022-01-23 19:55:12 +00:00
|
|
|
#define EFI_CAPSULE_DIR u"\\EFI\\UpdateCapsule\\"
|
2020-11-17 00:27:56 +00:00
|
|
|
|
2022-04-15 05:59:34 +00:00
|
|
|
/**
|
|
|
|
* struct efi_fw_image - Information on firmware images updatable through
|
|
|
|
* capsule update
|
|
|
|
*
|
|
|
|
* This structure gives information about the firmware images on the platform
|
|
|
|
* which can be updated through the capsule update mechanism
|
|
|
|
*
|
|
|
|
* @image_type_id: Image GUID. Same value is to be used in the capsule
|
|
|
|
* @fw_name: Name of the firmware image
|
|
|
|
* @image_index: Image Index, same as value passed to SetImage FMP
|
|
|
|
* function
|
|
|
|
*/
|
|
|
|
struct efi_fw_image {
|
|
|
|
efi_guid_t image_type_id;
|
|
|
|
u16 *fw_name;
|
|
|
|
u8 image_index;
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct efi_capsule_update_info - Information needed for capsule updates
|
|
|
|
*
|
|
|
|
* This structure provides information needed for performing firmware
|
|
|
|
* updates. The structure needs to be initialised per platform, for all
|
|
|
|
* platforms which enable capsule updates
|
|
|
|
*
|
|
|
|
* @dfu_string: String used to populate dfu_alt_info
|
2023-06-07 05:41:51 +00:00
|
|
|
* @num_images: The number of images array entries
|
2022-04-15 05:59:34 +00:00
|
|
|
* @images: Pointer to an array of updatable images
|
|
|
|
*/
|
|
|
|
struct efi_capsule_update_info {
|
|
|
|
const char *dfu_string;
|
2023-06-07 05:41:51 +00:00
|
|
|
int num_images;
|
2022-04-15 05:59:34 +00:00
|
|
|
struct efi_fw_image *images;
|
|
|
|
};
|
|
|
|
|
|
|
|
extern struct efi_capsule_update_info update_info;
|
|
|
|
|
2021-03-02 17:26:38 +00:00
|
|
|
/**
|
|
|
|
* Install the ESRT system table.
|
|
|
|
*
|
2022-01-19 17:05:50 +00:00
|
|
|
* Return: status code
|
2021-03-02 17:26:38 +00:00
|
|
|
*/
|
|
|
|
efi_status_t efi_esrt_register(void);
|
|
|
|
|
2021-12-23 14:51:07 +00:00
|
|
|
/**
|
|
|
|
* efi_ecpt_register() - Install the ECPT system table.
|
|
|
|
*
|
|
|
|
* Return: status code
|
|
|
|
*/
|
|
|
|
efi_status_t efi_ecpt_register(void);
|
|
|
|
|
2021-03-02 17:26:38 +00:00
|
|
|
/**
|
|
|
|
* efi_esrt_populate() - Populates the ESRT entries from the FMP instances
|
|
|
|
* present in the system.
|
|
|
|
* If an ESRT already exists, the old ESRT is replaced in the system table.
|
|
|
|
* The memory of the old ESRT is deallocated.
|
|
|
|
*
|
|
|
|
* Return:
|
|
|
|
* - EFI_SUCCESS if the ESRT is correctly created
|
|
|
|
* - error code otherwise.
|
|
|
|
*/
|
|
|
|
efi_status_t efi_esrt_populate(void);
|
2021-06-22 14:38:53 +00:00
|
|
|
efi_status_t efi_load_capsule_drivers(void);
|
2021-11-29 07:39:44 +00:00
|
|
|
|
|
|
|
efi_status_t platform_get_eventlog(struct udevice *dev, u64 *addr, u32 *sz);
|
2022-09-12 08:33:50 +00:00
|
|
|
|
|
|
|
efi_status_t efi_locate_handle_buffer_int(enum efi_locate_search_type search_type,
|
|
|
|
const efi_guid_t *protocol, void *search_key,
|
|
|
|
efi_uintn_t *no_handles, efi_handle_t **buffer);
|
|
|
|
|
|
|
|
efi_status_t efi_open_volume_int(struct efi_simple_file_system_protocol *this,
|
|
|
|
struct efi_file_handle **root);
|
|
|
|
efi_status_t efi_file_open_int(struct efi_file_handle *this,
|
|
|
|
struct efi_file_handle **new_handle,
|
|
|
|
u16 *file_name, u64 open_mode,
|
|
|
|
u64 attributes);
|
|
|
|
efi_status_t efi_file_close_int(struct efi_file_handle *file);
|
|
|
|
efi_status_t efi_file_read_int(struct efi_file_handle *this,
|
|
|
|
efi_uintn_t *buffer_size, void *buffer);
|
|
|
|
efi_status_t efi_file_setpos_int(struct efi_file_handle *file, u64 pos);
|
|
|
|
|
|
|
|
typedef efi_status_t (*efi_console_filter_func)(struct efi_input_key *key);
|
|
|
|
efi_status_t efi_console_get_u16_string
|
|
|
|
(struct efi_simple_text_input_protocol *cin,
|
|
|
|
u16 *buf, efi_uintn_t count, efi_console_filter_func filer_func,
|
|
|
|
int row, int col);
|
|
|
|
|
|
|
|
efi_status_t efi_disk_get_device_name(const efi_handle_t handle, char *buf, int size);
|
|
|
|
|
2023-02-10 08:01:13 +00:00
|
|
|
/**
|
|
|
|
* efi_add_known_memory() - add memory banks to EFI memory map
|
|
|
|
*
|
|
|
|
* This weak function may be overridden for specific architectures.
|
|
|
|
*/
|
|
|
|
void efi_add_known_memory(void);
|
|
|
|
|
2017-10-18 16:13:07 +00:00
|
|
|
#endif /* _EFI_LOADER_H */
|