1 // SPDX-License-Identifier: GPL-2.0+
2 /*
3  *  EFI application boot time services
4  *
5  *  Copyright (c) 2016 Alexander Graf
6  */
7 
8 #include <common.h>
9 #include <div64.h>
10 #include <efi_loader.h>
11 #include <environment.h>
12 #include <malloc.h>
13 #include <asm/global_data.h>
14 #include <linux/libfdt_env.h>
15 #include <u-boot/crc.h>
16 #include <bootm.h>
17 #include <inttypes.h>
18 #include <watchdog.h>
19 
20 DECLARE_GLOBAL_DATA_PTR;
21 
22 /* Task priority level */
23 static efi_uintn_t efi_tpl = TPL_APPLICATION;
24 
25 /* This list contains all the EFI objects our payload has access to */
26 LIST_HEAD(efi_obj_list);
27 
28 /* List of all events */
29 LIST_HEAD(efi_events);
30 
31 /*
32  * If we're running on nasty systems (32bit ARM booting into non-EFI Linux)
33  * we need to do trickery with caches. Since we don't want to break the EFI
34  * aware boot path, only apply hacks when loading exiting directly (breaking
35  * direct Linux EFI booting along the way - oh well).
36  */
37 static bool efi_is_direct_boot = true;
38 
39 /*
40  * EFI can pass arbitrary additional "tables" containing vendor specific
41  * information to the payload. One such table is the FDT table which contains
42  * a pointer to a flattened device tree blob.
43  *
44  * In most cases we want to pass an FDT to the payload, so reserve one slot of
45  * config table space for it. The pointer gets populated by do_bootefi_exec().
46  */
47 static struct efi_configuration_table __efi_runtime_data efi_conf_table[2];
48 
49 #ifdef CONFIG_ARM
50 /*
51  * The "gd" pointer lives in a register on ARM and AArch64 that we declare
52  * fixed when compiling U-Boot. However, the payload does not know about that
53  * restriction so we need to manually swap its and our view of that register on
54  * EFI callback entry/exit.
55  */
56 static volatile void *efi_gd, *app_gd;
57 #endif
58 
59 static int entry_count;
60 static int nesting_level;
61 /* GUID of the device tree table */
62 const efi_guid_t efi_guid_fdt = EFI_FDT_GUID;
63 /* GUID of the EFI_DRIVER_BINDING_PROTOCOL */
64 const efi_guid_t efi_guid_driver_binding_protocol =
65 			EFI_DRIVER_BINDING_PROTOCOL_GUID;
66 
67 /* event group ExitBootServices() invoked */
68 const efi_guid_t efi_guid_event_group_exit_boot_services =
69 			EFI_EVENT_GROUP_EXIT_BOOT_SERVICES;
70 /* event group SetVirtualAddressMap() invoked */
71 const efi_guid_t efi_guid_event_group_virtual_address_change =
72 			EFI_EVENT_GROUP_VIRTUAL_ADDRESS_CHANGE;
73 /* event group memory map changed */
74 const efi_guid_t efi_guid_event_group_memory_map_change =
75 			EFI_EVENT_GROUP_MEMORY_MAP_CHANGE;
76 /* event group boot manager about to boot */
77 const efi_guid_t efi_guid_event_group_ready_to_boot =
78 			EFI_EVENT_GROUP_READY_TO_BOOT;
79 /* event group ResetSystem() invoked (before ExitBootServices) */
80 const efi_guid_t efi_guid_event_group_reset_system =
81 			EFI_EVENT_GROUP_RESET_SYSTEM;
82 
83 static efi_status_t EFIAPI efi_disconnect_controller(
84 					efi_handle_t controller_handle,
85 					efi_handle_t driver_image_handle,
86 					efi_handle_t child_handle);
87 
88 /* Called on every callback entry */
89 int __efi_entry_check(void)
90 {
91 	int ret = entry_count++ == 0;
92 #ifdef CONFIG_ARM
93 	assert(efi_gd);
94 	app_gd = gd;
95 	gd = efi_gd;
96 #endif
97 	return ret;
98 }
99 
100 /* Called on every callback exit */
101 int __efi_exit_check(void)
102 {
103 	int ret = --entry_count == 0;
104 #ifdef CONFIG_ARM
105 	gd = app_gd;
106 #endif
107 	return ret;
108 }
109 
110 /* Called from do_bootefi_exec() */
111 void efi_save_gd(void)
112 {
113 #ifdef CONFIG_ARM
114 	efi_gd = gd;
115 #endif
116 }
117 
118 /*
119  * Special case handler for error/abort that just forces things back
120  * to u-boot world so we can dump out an abort msg, without any care
121  * about returning back to UEFI world.
122  */
123 void efi_restore_gd(void)
124 {
125 #ifdef CONFIG_ARM
126 	/* Only restore if we're already in EFI context */
127 	if (!efi_gd)
128 		return;
129 	gd = efi_gd;
130 #endif
131 }
132 
133 /*
134  * Return a string for indenting with two spaces per level. A maximum of ten
135  * indent levels is supported. Higher indent levels will be truncated.
136  *
137  * @level	indent level
138  * @return	indent string
139  */
140 static const char *indent_string(int level)
141 {
142 	const char *indent = "                    ";
143 	const int max = strlen(indent);
144 
145 	level = min(max, level * 2);
146 	return &indent[max - level];
147 }
148 
149 const char *__efi_nesting(void)
150 {
151 	return indent_string(nesting_level);
152 }
153 
154 const char *__efi_nesting_inc(void)
155 {
156 	return indent_string(nesting_level++);
157 }
158 
159 const char *__efi_nesting_dec(void)
160 {
161 	return indent_string(--nesting_level);
162 }
163 
164 /*
165  * Queue an EFI event.
166  *
167  * This function queues the notification function of the event for future
168  * execution.
169  *
170  * The notification function is called if the task priority level of the
171  * event is higher than the current task priority level.
172  *
173  * For the SignalEvent service see efi_signal_event_ext.
174  *
175  * @event	event to signal
176  * @check_tpl	check the TPL level
177  */
178 static void efi_queue_event(struct efi_event *event, bool check_tpl)
179 {
180 	if (event->notify_function) {
181 		event->is_queued = true;
182 		/* Check TPL */
183 		if (check_tpl && efi_tpl >= event->notify_tpl)
184 			return;
185 		EFI_CALL_VOID(event->notify_function(event,
186 						     event->notify_context));
187 	}
188 	event->is_queued = false;
189 }
190 
191 /*
192  * Signal an EFI event.
193  *
194  * This function signals an event. If the event belongs to an event group
195  * all events of the group are signaled. If they are of type EVT_NOTIFY_SIGNAL
196  * their notification function is queued.
197  *
198  * For the SignalEvent service see efi_signal_event_ext.
199  *
200  * @event	event to signal
201  * @check_tpl	check the TPL level
202  */
203 void efi_signal_event(struct efi_event *event, bool check_tpl)
204 {
205 	if (event->group) {
206 		struct efi_event *evt;
207 
208 		/*
209 		 * The signaled state has to set before executing any
210 		 * notification function
211 		 */
212 		list_for_each_entry(evt, &efi_events, link) {
213 			if (!evt->group || guidcmp(evt->group, event->group))
214 				continue;
215 			if (evt->is_signaled)
216 				continue;
217 			evt->is_signaled = true;
218 			if (evt->type & EVT_NOTIFY_SIGNAL &&
219 			    evt->notify_function)
220 				evt->is_queued = true;
221 		}
222 		list_for_each_entry(evt, &efi_events, link) {
223 			if (!evt->group || guidcmp(evt->group, event->group))
224 				continue;
225 			if (evt->is_queued)
226 				efi_queue_event(evt, check_tpl);
227 		}
228 	} else if (!event->is_signaled) {
229 		event->is_signaled = true;
230 		if (event->type & EVT_NOTIFY_SIGNAL)
231 			efi_queue_event(event, check_tpl);
232 	}
233 }
234 
235 /*
236  * Raise the task priority level.
237  *
238  * This function implements the RaiseTpl service.
239  * See the Unified Extensible Firmware Interface (UEFI) specification
240  * for details.
241  *
242  * @new_tpl	new value of the task priority level
243  * @return	old value of the task priority level
244  */
245 static unsigned long EFIAPI efi_raise_tpl(efi_uintn_t new_tpl)
246 {
247 	efi_uintn_t old_tpl = efi_tpl;
248 
249 	EFI_ENTRY("0x%zx", new_tpl);
250 
251 	if (new_tpl < efi_tpl)
252 		debug("WARNING: new_tpl < current_tpl in %s\n", __func__);
253 	efi_tpl = new_tpl;
254 	if (efi_tpl > TPL_HIGH_LEVEL)
255 		efi_tpl = TPL_HIGH_LEVEL;
256 
257 	EFI_EXIT(EFI_SUCCESS);
258 	return old_tpl;
259 }
260 
261 /*
262  * Lower the task priority level.
263  *
264  * This function implements the RestoreTpl service.
265  * See the Unified Extensible Firmware Interface (UEFI) specification
266  * for details.
267  *
268  * @old_tpl	value of the task priority level to be restored
269  */
270 static void EFIAPI efi_restore_tpl(efi_uintn_t old_tpl)
271 {
272 	EFI_ENTRY("0x%zx", old_tpl);
273 
274 	if (old_tpl > efi_tpl)
275 		debug("WARNING: old_tpl > current_tpl in %s\n", __func__);
276 	efi_tpl = old_tpl;
277 	if (efi_tpl > TPL_HIGH_LEVEL)
278 		efi_tpl = TPL_HIGH_LEVEL;
279 
280 	/*
281 	 * Lowering the TPL may have made queued events eligible for execution.
282 	 */
283 	efi_timer_check();
284 
285 	EFI_EXIT(EFI_SUCCESS);
286 }
287 
288 /*
289  * Allocate memory pages.
290  *
291  * This function implements the AllocatePages service.
292  * See the Unified Extensible Firmware Interface (UEFI) specification
293  * for details.
294  *
295  * @type		type of allocation to be performed
296  * @memory_type		usage type of the allocated memory
297  * @pages		number of pages to be allocated
298  * @memory		allocated memory
299  * @return		status code
300  */
301 static efi_status_t EFIAPI efi_allocate_pages_ext(int type, int memory_type,
302 						  efi_uintn_t pages,
303 						  uint64_t *memory)
304 {
305 	efi_status_t r;
306 
307 	EFI_ENTRY("%d, %d, 0x%zx, %p", type, memory_type, pages, memory);
308 	r = efi_allocate_pages(type, memory_type, pages, memory);
309 	return EFI_EXIT(r);
310 }
311 
312 /*
313  * Free memory pages.
314  *
315  * This function implements the FreePages service.
316  * See the Unified Extensible Firmware Interface (UEFI) specification
317  * for details.
318  *
319  * @memory	start of the memory area to be freed
320  * @pages	number of pages to be freed
321  * @return	status code
322  */
323 static efi_status_t EFIAPI efi_free_pages_ext(uint64_t memory,
324 					      efi_uintn_t pages)
325 {
326 	efi_status_t r;
327 
328 	EFI_ENTRY("%" PRIx64 ", 0x%zx", memory, pages);
329 	r = efi_free_pages(memory, pages);
330 	return EFI_EXIT(r);
331 }
332 
333 /*
334  * Get map describing memory usage.
335  *
336  * This function implements the GetMemoryMap service.
337  * See the Unified Extensible Firmware Interface (UEFI) specification
338  * for details.
339  *
340  * @memory_map_size	on entry the size, in bytes, of the memory map buffer,
341  *			on exit the size of the copied memory map
342  * @memory_map		buffer to which the memory map is written
343  * @map_key		key for the memory map
344  * @descriptor_size	size of an individual memory descriptor
345  * @descriptor_version	version number of the memory descriptor structure
346  * @return		status code
347  */
348 static efi_status_t EFIAPI efi_get_memory_map_ext(
349 					efi_uintn_t *memory_map_size,
350 					struct efi_mem_desc *memory_map,
351 					efi_uintn_t *map_key,
352 					efi_uintn_t *descriptor_size,
353 					uint32_t *descriptor_version)
354 {
355 	efi_status_t r;
356 
357 	EFI_ENTRY("%p, %p, %p, %p, %p", memory_map_size, memory_map,
358 		  map_key, descriptor_size, descriptor_version);
359 	r = efi_get_memory_map(memory_map_size, memory_map, map_key,
360 			       descriptor_size, descriptor_version);
361 	return EFI_EXIT(r);
362 }
363 
364 /*
365  * Allocate memory from pool.
366  *
367  * This function implements the AllocatePool service.
368  * See the Unified Extensible Firmware Interface (UEFI) specification
369  * for details.
370  *
371  * @pool_type	type of the pool from which memory is to be allocated
372  * @size	number of bytes to be allocated
373  * @buffer	allocated memory
374  * @return	status code
375  */
376 static efi_status_t EFIAPI efi_allocate_pool_ext(int pool_type,
377 						 efi_uintn_t size,
378 						 void **buffer)
379 {
380 	efi_status_t r;
381 
382 	EFI_ENTRY("%d, %zd, %p", pool_type, size, buffer);
383 	r = efi_allocate_pool(pool_type, size, buffer);
384 	return EFI_EXIT(r);
385 }
386 
387 /*
388  * Free memory from pool.
389  *
390  * This function implements the FreePool service.
391  * See the Unified Extensible Firmware Interface (UEFI) specification
392  * for details.
393  *
394  * @buffer	start of memory to be freed
395  * @return	status code
396  */
397 static efi_status_t EFIAPI efi_free_pool_ext(void *buffer)
398 {
399 	efi_status_t r;
400 
401 	EFI_ENTRY("%p", buffer);
402 	r = efi_free_pool(buffer);
403 	return EFI_EXIT(r);
404 }
405 
406 /*
407  * Add a new object to the object list.
408  *
409  * The protocols list is initialized.
410  * The object handle is set.
411  *
412  * @obj	object to be added
413  */
414 void efi_add_handle(struct efi_object *obj)
415 {
416 	if (!obj)
417 		return;
418 	INIT_LIST_HEAD(&obj->protocols);
419 	obj->handle = obj;
420 	list_add_tail(&obj->link, &efi_obj_list);
421 }
422 
423 /*
424  * Create handle.
425  *
426  * @handle	new handle
427  * @return	status code
428  */
429 efi_status_t efi_create_handle(efi_handle_t *handle)
430 {
431 	struct efi_object *obj;
432 	efi_status_t r;
433 
434 	r = efi_allocate_pool(EFI_ALLOCATE_ANY_PAGES,
435 			      sizeof(struct efi_object),
436 			      (void **)&obj);
437 	if (r != EFI_SUCCESS)
438 		return r;
439 	efi_add_handle(obj);
440 	*handle = obj->handle;
441 	return r;
442 }
443 
444 /*
445  * Find a protocol on a handle.
446  *
447  * @handle		handle
448  * @protocol_guid	GUID of the protocol
449  * @handler		reference to the protocol
450  * @return		status code
451  */
452 efi_status_t efi_search_protocol(const efi_handle_t handle,
453 				 const efi_guid_t *protocol_guid,
454 				 struct efi_handler **handler)
455 {
456 	struct efi_object *efiobj;
457 	struct list_head *lhandle;
458 
459 	if (!handle || !protocol_guid)
460 		return EFI_INVALID_PARAMETER;
461 	efiobj = efi_search_obj(handle);
462 	if (!efiobj)
463 		return EFI_INVALID_PARAMETER;
464 	list_for_each(lhandle, &efiobj->protocols) {
465 		struct efi_handler *protocol;
466 
467 		protocol = list_entry(lhandle, struct efi_handler, link);
468 		if (!guidcmp(protocol->guid, protocol_guid)) {
469 			if (handler)
470 				*handler = protocol;
471 			return EFI_SUCCESS;
472 		}
473 	}
474 	return EFI_NOT_FOUND;
475 }
476 
477 /*
478  * Delete protocol from a handle.
479  *
480  * @handle			handle from which the protocol shall be deleted
481  * @protocol			GUID of the protocol to be deleted
482  * @protocol_interface		interface of the protocol implementation
483  * @return			status code
484  */
485 efi_status_t efi_remove_protocol(const efi_handle_t handle,
486 				 const efi_guid_t *protocol,
487 				 void *protocol_interface)
488 {
489 	struct efi_handler *handler;
490 	efi_status_t ret;
491 
492 	ret = efi_search_protocol(handle, protocol, &handler);
493 	if (ret != EFI_SUCCESS)
494 		return ret;
495 	if (guidcmp(handler->guid, protocol))
496 		return EFI_INVALID_PARAMETER;
497 	list_del(&handler->link);
498 	free(handler);
499 	return EFI_SUCCESS;
500 }
501 
502 /*
503  * Delete all protocols from a handle.
504  *
505  * @handle	handle from which the protocols shall be deleted
506  * @return	status code
507  */
508 efi_status_t efi_remove_all_protocols(const efi_handle_t handle)
509 {
510 	struct efi_object *efiobj;
511 	struct efi_handler *protocol;
512 	struct efi_handler *pos;
513 
514 	efiobj = efi_search_obj(handle);
515 	if (!efiobj)
516 		return EFI_INVALID_PARAMETER;
517 	list_for_each_entry_safe(protocol, pos, &efiobj->protocols, link) {
518 		efi_status_t ret;
519 
520 		ret = efi_remove_protocol(handle, protocol->guid,
521 					  protocol->protocol_interface);
522 		if (ret != EFI_SUCCESS)
523 			return ret;
524 	}
525 	return EFI_SUCCESS;
526 }
527 
528 /*
529  * Delete handle.
530  *
531  * @handle	handle to delete
532  */
533 void efi_delete_handle(struct efi_object *obj)
534 {
535 	if (!obj)
536 		return;
537 	efi_remove_all_protocols(obj->handle);
538 	list_del(&obj->link);
539 	free(obj);
540 }
541 
542 /*
543  * Check if a pointer is a valid event.
544  *
545  * @event		pointer to check
546  * @return		status code
547  */
548 static efi_status_t efi_is_event(const struct efi_event *event)
549 {
550 	const struct efi_event *evt;
551 
552 	if (!event)
553 		return EFI_INVALID_PARAMETER;
554 	list_for_each_entry(evt, &efi_events, link) {
555 		if (evt == event)
556 			return EFI_SUCCESS;
557 	}
558 	return EFI_INVALID_PARAMETER;
559 }
560 
561 /*
562  * Create an event.
563  *
564  * This function is used inside U-Boot code to create an event.
565  *
566  * For the API function implementing the CreateEvent service see
567  * efi_create_event_ext.
568  *
569  * @type		type of the event to create
570  * @notify_tpl		task priority level of the event
571  * @notify_function	notification function of the event
572  * @notify_context	pointer passed to the notification function
573  * @event		created event
574  * @return		status code
575  */
576 efi_status_t efi_create_event(uint32_t type, efi_uintn_t notify_tpl,
577 			      void (EFIAPI *notify_function) (
578 					struct efi_event *event,
579 					void *context),
580 			      void *notify_context, efi_guid_t *group,
581 			      struct efi_event **event)
582 {
583 	struct efi_event *evt;
584 
585 	if (event == NULL)
586 		return EFI_INVALID_PARAMETER;
587 
588 	if ((type & EVT_NOTIFY_SIGNAL) && (type & EVT_NOTIFY_WAIT))
589 		return EFI_INVALID_PARAMETER;
590 
591 	if ((type & (EVT_NOTIFY_SIGNAL | EVT_NOTIFY_WAIT)) &&
592 	    notify_function == NULL)
593 		return EFI_INVALID_PARAMETER;
594 
595 	evt = calloc(1, sizeof(struct efi_event));
596 	if (!evt)
597 		return EFI_OUT_OF_RESOURCES;
598 	evt->type = type;
599 	evt->notify_tpl = notify_tpl;
600 	evt->notify_function = notify_function;
601 	evt->notify_context = notify_context;
602 	evt->group = group;
603 	/* Disable timers on bootup */
604 	evt->trigger_next = -1ULL;
605 	evt->is_queued = false;
606 	evt->is_signaled = false;
607 	list_add_tail(&evt->link, &efi_events);
608 	*event = evt;
609 	return EFI_SUCCESS;
610 }
611 
612 /*
613  * Create an event in a group.
614  *
615  * This function implements the CreateEventEx service.
616  * See the Unified Extensible Firmware Interface (UEFI) specification
617  * for details.
618  * TODO: Support event groups
619  *
620  * @type		type of the event to create
621  * @notify_tpl		task priority level of the event
622  * @notify_function	notification function of the event
623  * @notify_context	pointer passed to the notification function
624  * @event		created event
625  * @event_group		event group
626  * @return		status code
627  */
628 efi_status_t EFIAPI efi_create_event_ex(uint32_t type, efi_uintn_t notify_tpl,
629 					void (EFIAPI *notify_function) (
630 							struct efi_event *event,
631 							void *context),
632 					void *notify_context,
633 					efi_guid_t *event_group,
634 					struct efi_event **event)
635 {
636 	EFI_ENTRY("%d, 0x%zx, %p, %p, %pUl", type, notify_tpl, notify_function,
637 		  notify_context, event_group);
638 	return EFI_EXIT(efi_create_event(type, notify_tpl, notify_function,
639 					 notify_context, event_group, event));
640 }
641 
642 /*
643  * Create an event.
644  *
645  * This function implements the CreateEvent service.
646  * See the Unified Extensible Firmware Interface (UEFI) specification
647  * for details.
648  *
649  * @type		type of the event to create
650  * @notify_tpl		task priority level of the event
651  * @notify_function	notification function of the event
652  * @notify_context	pointer passed to the notification function
653  * @event		created event
654  * @return		status code
655  */
656 static efi_status_t EFIAPI efi_create_event_ext(
657 			uint32_t type, efi_uintn_t notify_tpl,
658 			void (EFIAPI *notify_function) (
659 					struct efi_event *event,
660 					void *context),
661 			void *notify_context, struct efi_event **event)
662 {
663 	EFI_ENTRY("%d, 0x%zx, %p, %p", type, notify_tpl, notify_function,
664 		  notify_context);
665 	return EFI_EXIT(efi_create_event(type, notify_tpl, notify_function,
666 					 notify_context, NULL, event));
667 }
668 
669 /*
670  * Check if a timer event has occurred or a queued notification function should
671  * be called.
672  *
673  * Our timers have to work without interrupts, so we check whenever keyboard
674  * input or disk accesses happen if enough time elapsed for them to fire.
675  */
676 void efi_timer_check(void)
677 {
678 	struct efi_event *evt;
679 	u64 now = timer_get_us();
680 
681 	list_for_each_entry(evt, &efi_events, link) {
682 		if (evt->is_queued)
683 			efi_queue_event(evt, true);
684 		if (!(evt->type & EVT_TIMER) || now < evt->trigger_next)
685 			continue;
686 		switch (evt->trigger_type) {
687 		case EFI_TIMER_RELATIVE:
688 			evt->trigger_type = EFI_TIMER_STOP;
689 			break;
690 		case EFI_TIMER_PERIODIC:
691 			evt->trigger_next += evt->trigger_time;
692 			break;
693 		default:
694 			continue;
695 		}
696 		evt->is_signaled = false;
697 		efi_signal_event(evt, true);
698 	}
699 	WATCHDOG_RESET();
700 }
701 
702 /*
703  * Set the trigger time for a timer event or stop the event.
704  *
705  * This is the function for internal usage in U-Boot. For the API function
706  * implementing the SetTimer service see efi_set_timer_ext.
707  *
708  * @event		event for which the timer is set
709  * @type		type of the timer
710  * @trigger_time	trigger period in multiples of 100ns
711  * @return		status code
712  */
713 efi_status_t efi_set_timer(struct efi_event *event, enum efi_timer_delay type,
714 			   uint64_t trigger_time)
715 {
716 	/* Check that the event is valid */
717 	if (efi_is_event(event) != EFI_SUCCESS || !(event->type & EVT_TIMER))
718 		return EFI_INVALID_PARAMETER;
719 
720 	/*
721 	 * The parameter defines a multiple of 100ns.
722 	 * We use multiples of 1000ns. So divide by 10.
723 	 */
724 	do_div(trigger_time, 10);
725 
726 	switch (type) {
727 	case EFI_TIMER_STOP:
728 		event->trigger_next = -1ULL;
729 		break;
730 	case EFI_TIMER_PERIODIC:
731 	case EFI_TIMER_RELATIVE:
732 		event->trigger_next = timer_get_us() + trigger_time;
733 		break;
734 	default:
735 		return EFI_INVALID_PARAMETER;
736 	}
737 	event->trigger_type = type;
738 	event->trigger_time = trigger_time;
739 	event->is_signaled = false;
740 	return EFI_SUCCESS;
741 }
742 
743 /*
744  * Set the trigger time for a timer event or stop the event.
745  *
746  * This function implements the SetTimer service.
747  * See the Unified Extensible Firmware Interface (UEFI) specification
748  * for details.
749  *
750  * @event		event for which the timer is set
751  * @type		type of the timer
752  * @trigger_time	trigger period in multiples of 100ns
753  * @return		status code
754  */
755 static efi_status_t EFIAPI efi_set_timer_ext(struct efi_event *event,
756 					     enum efi_timer_delay type,
757 					     uint64_t trigger_time)
758 {
759 	EFI_ENTRY("%p, %d, %" PRIx64, event, type, trigger_time);
760 	return EFI_EXIT(efi_set_timer(event, type, trigger_time));
761 }
762 
763 /*
764  * Wait for events to be signaled.
765  *
766  * This function implements the WaitForEvent service.
767  * See the Unified Extensible Firmware Interface (UEFI) specification
768  * for details.
769  *
770  * @num_events	number of events to be waited for
771  * @events	events to be waited for
772  * @index	index of the event that was signaled
773  * @return	status code
774  */
775 static efi_status_t EFIAPI efi_wait_for_event(efi_uintn_t num_events,
776 					      struct efi_event **event,
777 					      efi_uintn_t *index)
778 {
779 	int i;
780 
781 	EFI_ENTRY("%zd, %p, %p", num_events, event, index);
782 
783 	/* Check parameters */
784 	if (!num_events || !event)
785 		return EFI_EXIT(EFI_INVALID_PARAMETER);
786 	/* Check TPL */
787 	if (efi_tpl != TPL_APPLICATION)
788 		return EFI_EXIT(EFI_UNSUPPORTED);
789 	for (i = 0; i < num_events; ++i) {
790 		if (efi_is_event(event[i]) != EFI_SUCCESS)
791 			return EFI_EXIT(EFI_INVALID_PARAMETER);
792 		if (!event[i]->type || event[i]->type & EVT_NOTIFY_SIGNAL)
793 			return EFI_EXIT(EFI_INVALID_PARAMETER);
794 		if (!event[i]->is_signaled)
795 			efi_queue_event(event[i], true);
796 	}
797 
798 	/* Wait for signal */
799 	for (;;) {
800 		for (i = 0; i < num_events; ++i) {
801 			if (event[i]->is_signaled)
802 				goto out;
803 		}
804 		/* Allow events to occur. */
805 		efi_timer_check();
806 	}
807 
808 out:
809 	/*
810 	 * Reset the signal which is passed to the caller to allow periodic
811 	 * events to occur.
812 	 */
813 	event[i]->is_signaled = false;
814 	if (index)
815 		*index = i;
816 
817 	return EFI_EXIT(EFI_SUCCESS);
818 }
819 
820 /*
821  * Signal an EFI event.
822  *
823  * This function implements the SignalEvent service.
824  * See the Unified Extensible Firmware Interface (UEFI) specification
825  * for details.
826  *
827  * This functions sets the signaled state of the event and queues the
828  * notification function for execution.
829  *
830  * @event	event to signal
831  * @return	status code
832  */
833 static efi_status_t EFIAPI efi_signal_event_ext(struct efi_event *event)
834 {
835 	EFI_ENTRY("%p", event);
836 	if (efi_is_event(event) != EFI_SUCCESS)
837 		return EFI_EXIT(EFI_INVALID_PARAMETER);
838 	efi_signal_event(event, true);
839 	return EFI_EXIT(EFI_SUCCESS);
840 }
841 
842 /*
843  * Close an EFI event.
844  *
845  * This function implements the CloseEvent service.
846  * See the Unified Extensible Firmware Interface (UEFI) specification
847  * for details.
848  *
849  * @event	event to close
850  * @return	status code
851  */
852 static efi_status_t EFIAPI efi_close_event(struct efi_event *event)
853 {
854 	EFI_ENTRY("%p", event);
855 	if (efi_is_event(event) != EFI_SUCCESS)
856 		return EFI_EXIT(EFI_INVALID_PARAMETER);
857 	list_del(&event->link);
858 	free(event);
859 	return EFI_EXIT(EFI_SUCCESS);
860 }
861 
862 /*
863  * Check if an event is signaled.
864  *
865  * This function implements the CheckEvent service.
866  * See the Unified Extensible Firmware Interface (UEFI) specification
867  * for details.
868  *
869  * If an event is not signaled yet, the notification function is queued.
870  * The signaled state is cleared.
871  *
872  * @event	event to check
873  * @return	status code
874  */
875 static efi_status_t EFIAPI efi_check_event(struct efi_event *event)
876 {
877 	EFI_ENTRY("%p", event);
878 	efi_timer_check();
879 	if (efi_is_event(event) != EFI_SUCCESS ||
880 	    event->type & EVT_NOTIFY_SIGNAL)
881 		return EFI_EXIT(EFI_INVALID_PARAMETER);
882 	if (!event->is_signaled)
883 		efi_queue_event(event, true);
884 	if (event->is_signaled) {
885 		event->is_signaled = false;
886 		return EFI_EXIT(EFI_SUCCESS);
887 	}
888 	return EFI_EXIT(EFI_NOT_READY);
889 }
890 
891 /*
892  * Find the internal EFI object for a handle.
893  *
894  * @handle	handle to find
895  * @return	EFI object
896  */
897 struct efi_object *efi_search_obj(const efi_handle_t handle)
898 {
899 	struct efi_object *efiobj;
900 
901 	list_for_each_entry(efiobj, &efi_obj_list, link) {
902 		if (efiobj->handle == handle)
903 			return efiobj;
904 	}
905 
906 	return NULL;
907 }
908 
909 /*
910  * Create open protocol info entry and add it to a protocol.
911  *
912  * @handler	handler of a protocol
913  * @return	open protocol info entry
914  */
915 static struct efi_open_protocol_info_entry *efi_create_open_info(
916 			struct efi_handler *handler)
917 {
918 	struct efi_open_protocol_info_item *item;
919 
920 	item = calloc(1, sizeof(struct efi_open_protocol_info_item));
921 	if (!item)
922 		return NULL;
923 	/* Append the item to the open protocol info list. */
924 	list_add_tail(&item->link, &handler->open_infos);
925 
926 	return &item->info;
927 }
928 
929 /*
930  * Remove an open protocol info entry from a protocol.
931  *
932  * @handler	handler of a protocol
933  * @return	status code
934  */
935 static efi_status_t efi_delete_open_info(
936 			struct efi_open_protocol_info_item *item)
937 {
938 	list_del(&item->link);
939 	free(item);
940 	return EFI_SUCCESS;
941 }
942 
943 /*
944  * Install new protocol on a handle.
945  *
946  * @handle			handle on which the protocol shall be installed
947  * @protocol			GUID of the protocol to be installed
948  * @protocol_interface		interface of the protocol implementation
949  * @return			status code
950  */
951 efi_status_t efi_add_protocol(const efi_handle_t handle,
952 			      const efi_guid_t *protocol,
953 			      void *protocol_interface)
954 {
955 	struct efi_object *efiobj;
956 	struct efi_handler *handler;
957 	efi_status_t ret;
958 
959 	efiobj = efi_search_obj(handle);
960 	if (!efiobj)
961 		return EFI_INVALID_PARAMETER;
962 	ret = efi_search_protocol(handle, protocol, NULL);
963 	if (ret != EFI_NOT_FOUND)
964 		return EFI_INVALID_PARAMETER;
965 	handler = calloc(1, sizeof(struct efi_handler));
966 	if (!handler)
967 		return EFI_OUT_OF_RESOURCES;
968 	handler->guid = protocol;
969 	handler->protocol_interface = protocol_interface;
970 	INIT_LIST_HEAD(&handler->open_infos);
971 	list_add_tail(&handler->link, &efiobj->protocols);
972 	if (!guidcmp(&efi_guid_device_path, protocol))
973 		EFI_PRINT("installed device path '%pD'\n", protocol_interface);
974 	return EFI_SUCCESS;
975 }
976 
977 /*
978  * Install protocol interface.
979  *
980  * This function implements the InstallProtocolInterface service.
981  * See the Unified Extensible Firmware Interface (UEFI) specification
982  * for details.
983  *
984  * @handle			handle on which the protocol shall be installed
985  * @protocol			GUID of the protocol to be installed
986  * @protocol_interface_type	type of the interface to be installed,
987  *				always EFI_NATIVE_INTERFACE
988  * @protocol_interface		interface of the protocol implementation
989  * @return			status code
990  */
991 static efi_status_t EFIAPI efi_install_protocol_interface(
992 			void **handle, const efi_guid_t *protocol,
993 			int protocol_interface_type, void *protocol_interface)
994 {
995 	efi_status_t r;
996 
997 	EFI_ENTRY("%p, %pUl, %d, %p", handle, protocol, protocol_interface_type,
998 		  protocol_interface);
999 
1000 	if (!handle || !protocol ||
1001 	    protocol_interface_type != EFI_NATIVE_INTERFACE) {
1002 		r = EFI_INVALID_PARAMETER;
1003 		goto out;
1004 	}
1005 
1006 	/* Create new handle if requested. */
1007 	if (!*handle) {
1008 		r = efi_create_handle(handle);
1009 		if (r != EFI_SUCCESS)
1010 			goto out;
1011 		debug("%sEFI: new handle %p\n", indent_string(nesting_level),
1012 		      *handle);
1013 	} else {
1014 		debug("%sEFI: handle %p\n", indent_string(nesting_level),
1015 		      *handle);
1016 	}
1017 	/* Add new protocol */
1018 	r = efi_add_protocol(*handle, protocol, protocol_interface);
1019 out:
1020 	return EFI_EXIT(r);
1021 }
1022 
1023 /*
1024  * Reinstall protocol interface.
1025  *
1026  * This function implements the ReinstallProtocolInterface service.
1027  * See the Unified Extensible Firmware Interface (UEFI) specification
1028  * for details.
1029  *
1030  * @handle			handle on which the protocol shall be
1031  *				reinstalled
1032  * @protocol			GUID of the protocol to be installed
1033  * @old_interface		interface to be removed
1034  * @new_interface		interface to be installed
1035  * @return			status code
1036  */
1037 static efi_status_t EFIAPI efi_reinstall_protocol_interface(
1038 			efi_handle_t handle, const efi_guid_t *protocol,
1039 			void *old_interface, void *new_interface)
1040 {
1041 	EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, old_interface,
1042 		  new_interface);
1043 	return EFI_EXIT(EFI_ACCESS_DENIED);
1044 }
1045 
1046 /*
1047  * Get all drivers associated to a controller.
1048  * The allocated buffer has to be freed with free().
1049  *
1050  * @efiobj			handle of the controller
1051  * @protocol			protocol guid (optional)
1052  * @number_of_drivers		number of child controllers
1053  * @driver_handle_buffer	handles of the the drivers
1054  * @return			status code
1055  */
1056 static efi_status_t efi_get_drivers(struct efi_object *efiobj,
1057 				    const efi_guid_t *protocol,
1058 				    efi_uintn_t *number_of_drivers,
1059 				    efi_handle_t **driver_handle_buffer)
1060 {
1061 	struct efi_handler *handler;
1062 	struct efi_open_protocol_info_item *item;
1063 	efi_uintn_t count = 0, i;
1064 	bool duplicate;
1065 
1066 	/* Count all driver associations */
1067 	list_for_each_entry(handler, &efiobj->protocols, link) {
1068 		if (protocol && guidcmp(handler->guid, protocol))
1069 			continue;
1070 		list_for_each_entry(item, &handler->open_infos, link) {
1071 			if (item->info.attributes &
1072 			    EFI_OPEN_PROTOCOL_BY_DRIVER)
1073 				++count;
1074 		}
1075 	}
1076 	/*
1077 	 * Create buffer. In case of duplicate driver assignments the buffer
1078 	 * will be too large. But that does not harm.
1079 	 */
1080 	*number_of_drivers = 0;
1081 	*driver_handle_buffer = calloc(count, sizeof(efi_handle_t));
1082 	if (!*driver_handle_buffer)
1083 		return EFI_OUT_OF_RESOURCES;
1084 	/* Collect unique driver handles */
1085 	list_for_each_entry(handler, &efiobj->protocols, link) {
1086 		if (protocol && guidcmp(handler->guid, protocol))
1087 			continue;
1088 		list_for_each_entry(item, &handler->open_infos, link) {
1089 			if (item->info.attributes &
1090 			    EFI_OPEN_PROTOCOL_BY_DRIVER) {
1091 				/* Check this is a new driver */
1092 				duplicate = false;
1093 				for (i = 0; i < *number_of_drivers; ++i) {
1094 					if ((*driver_handle_buffer)[i] ==
1095 					    item->info.agent_handle)
1096 						duplicate = true;
1097 				}
1098 				/* Copy handle to buffer */
1099 				if (!duplicate) {
1100 					i = (*number_of_drivers)++;
1101 					(*driver_handle_buffer)[i] =
1102 						item->info.agent_handle;
1103 				}
1104 			}
1105 		}
1106 	}
1107 	return EFI_SUCCESS;
1108 }
1109 
1110 /*
1111  * Disconnect all drivers from a controller.
1112  *
1113  * This function implements the DisconnectController service.
1114  * See the Unified Extensible Firmware Interface (UEFI) specification
1115  * for details.
1116  *
1117  * @efiobj		handle of the controller
1118  * @protocol		protocol guid (optional)
1119  * @child_handle	handle of the child to destroy
1120  * @return		status code
1121  */
1122 static efi_status_t efi_disconnect_all_drivers(
1123 				struct efi_object *efiobj,
1124 				const efi_guid_t *protocol,
1125 				efi_handle_t child_handle)
1126 {
1127 	efi_uintn_t number_of_drivers;
1128 	efi_handle_t *driver_handle_buffer;
1129 	efi_status_t r, ret;
1130 
1131 	ret = efi_get_drivers(efiobj, protocol, &number_of_drivers,
1132 			      &driver_handle_buffer);
1133 	if (ret != EFI_SUCCESS)
1134 		return ret;
1135 
1136 	ret = EFI_NOT_FOUND;
1137 	while (number_of_drivers) {
1138 		r = EFI_CALL(efi_disconnect_controller(
1139 				efiobj->handle,
1140 				driver_handle_buffer[--number_of_drivers],
1141 				child_handle));
1142 		if (r == EFI_SUCCESS)
1143 			ret = r;
1144 	}
1145 	free(driver_handle_buffer);
1146 	return ret;
1147 }
1148 
1149 /*
1150  * Uninstall protocol interface.
1151  *
1152  * This function implements the UninstallProtocolInterface service.
1153  * See the Unified Extensible Firmware Interface (UEFI) specification
1154  * for details.
1155  *
1156  * @handle			handle from which the protocol shall be removed
1157  * @protocol			GUID of the protocol to be removed
1158  * @protocol_interface		interface to be removed
1159  * @return			status code
1160  */
1161 static efi_status_t EFIAPI efi_uninstall_protocol_interface(
1162 				efi_handle_t handle, const efi_guid_t *protocol,
1163 				void *protocol_interface)
1164 {
1165 	struct efi_object *efiobj;
1166 	struct efi_handler *handler;
1167 	struct efi_open_protocol_info_item *item;
1168 	struct efi_open_protocol_info_item *pos;
1169 	efi_status_t r;
1170 
1171 	EFI_ENTRY("%p, %pUl, %p", handle, protocol, protocol_interface);
1172 
1173 	/* Check handle */
1174 	efiobj = efi_search_obj(handle);
1175 	if (!efiobj) {
1176 		r = EFI_INVALID_PARAMETER;
1177 		goto out;
1178 	}
1179 	/* Find the protocol on the handle */
1180 	r = efi_search_protocol(handle, protocol, &handler);
1181 	if (r != EFI_SUCCESS)
1182 		goto out;
1183 	/* Disconnect controllers */
1184 	efi_disconnect_all_drivers(efiobj, protocol, NULL);
1185 	if (!list_empty(&handler->open_infos)) {
1186 		r =  EFI_ACCESS_DENIED;
1187 		goto out;
1188 	}
1189 	/* Close protocol */
1190 	list_for_each_entry_safe(item, pos, &handler->open_infos, link) {
1191 		if (item->info.attributes ==
1192 			EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL ||
1193 		    item->info.attributes == EFI_OPEN_PROTOCOL_GET_PROTOCOL ||
1194 		    item->info.attributes == EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
1195 			list_del(&item->link);
1196 	}
1197 	if (!list_empty(&handler->open_infos)) {
1198 		r =  EFI_ACCESS_DENIED;
1199 		goto out;
1200 	}
1201 	r = efi_remove_protocol(handle, protocol, protocol_interface);
1202 out:
1203 	return EFI_EXIT(r);
1204 }
1205 
1206 /*
1207  * Register an event for notification when a protocol is installed.
1208  *
1209  * This function implements the RegisterProtocolNotify service.
1210  * See the Unified Extensible Firmware Interface (UEFI) specification
1211  * for details.
1212  *
1213  * @protocol		GUID of the protocol whose installation shall be
1214  *			notified
1215  * @event		event to be signaled upon installation of the protocol
1216  * @registration	key for retrieving the registration information
1217  * @return		status code
1218  */
1219 static efi_status_t EFIAPI efi_register_protocol_notify(
1220 						const efi_guid_t *protocol,
1221 						struct efi_event *event,
1222 						void **registration)
1223 {
1224 	EFI_ENTRY("%pUl, %p, %p", protocol, event, registration);
1225 	return EFI_EXIT(EFI_OUT_OF_RESOURCES);
1226 }
1227 
1228 /*
1229  * Determine if an EFI handle implements a protocol.
1230  *
1231  * See the documentation of the LocateHandle service in the UEFI specification.
1232  *
1233  * @search_type		selection criterion
1234  * @protocol		GUID of the protocol
1235  * @search_key		registration key
1236  * @efiobj		handle
1237  * @return		0 if the handle implements the protocol
1238  */
1239 static int efi_search(enum efi_locate_search_type search_type,
1240 		      const efi_guid_t *protocol, void *search_key,
1241 		      struct efi_object *efiobj)
1242 {
1243 	efi_status_t ret;
1244 
1245 	switch (search_type) {
1246 	case ALL_HANDLES:
1247 		return 0;
1248 	case BY_REGISTER_NOTIFY:
1249 		/* TODO: RegisterProtocolNotify is not implemented yet */
1250 		return -1;
1251 	case BY_PROTOCOL:
1252 		ret = efi_search_protocol(efiobj->handle, protocol, NULL);
1253 		return (ret != EFI_SUCCESS);
1254 	default:
1255 		/* Invalid search type */
1256 		return -1;
1257 	}
1258 }
1259 
1260 /*
1261  * Locate handles implementing a protocol.
1262  *
1263  * This function is meant for U-Boot internal calls. For the API implementation
1264  * of the LocateHandle service see efi_locate_handle_ext.
1265  *
1266  * @search_type		selection criterion
1267  * @protocol		GUID of the protocol
1268  * @search_key		registration key
1269  * @buffer_size		size of the buffer to receive the handles in bytes
1270  * @buffer		buffer to receive the relevant handles
1271  * @return		status code
1272  */
1273 static efi_status_t efi_locate_handle(
1274 			enum efi_locate_search_type search_type,
1275 			const efi_guid_t *protocol, void *search_key,
1276 			efi_uintn_t *buffer_size, efi_handle_t *buffer)
1277 {
1278 	struct efi_object *efiobj;
1279 	efi_uintn_t size = 0;
1280 
1281 	/* Check parameters */
1282 	switch (search_type) {
1283 	case ALL_HANDLES:
1284 		break;
1285 	case BY_REGISTER_NOTIFY:
1286 		if (!search_key)
1287 			return EFI_INVALID_PARAMETER;
1288 		/* RegisterProtocolNotify is not implemented yet */
1289 		return EFI_UNSUPPORTED;
1290 	case BY_PROTOCOL:
1291 		if (!protocol)
1292 			return EFI_INVALID_PARAMETER;
1293 		break;
1294 	default:
1295 		return EFI_INVALID_PARAMETER;
1296 	}
1297 
1298 	/*
1299 	 * efi_locate_handle_buffer uses this function for
1300 	 * the calculation of the necessary buffer size.
1301 	 * So do not require a buffer for buffersize == 0.
1302 	 */
1303 	if (!buffer_size || (*buffer_size && !buffer))
1304 		return EFI_INVALID_PARAMETER;
1305 
1306 	/* Count how much space we need */
1307 	list_for_each_entry(efiobj, &efi_obj_list, link) {
1308 		if (!efi_search(search_type, protocol, search_key, efiobj))
1309 			size += sizeof(void *);
1310 	}
1311 
1312 	if (*buffer_size < size) {
1313 		*buffer_size = size;
1314 		return EFI_BUFFER_TOO_SMALL;
1315 	}
1316 
1317 	*buffer_size = size;
1318 	if (size == 0)
1319 		return EFI_NOT_FOUND;
1320 
1321 	/* Then fill the array */
1322 	list_for_each_entry(efiobj, &efi_obj_list, link) {
1323 		if (!efi_search(search_type, protocol, search_key, efiobj))
1324 			*buffer++ = efiobj->handle;
1325 	}
1326 
1327 	return EFI_SUCCESS;
1328 }
1329 
1330 /*
1331  * Locate handles implementing a protocol.
1332  *
1333  * This function implements the LocateHandle service.
1334  * See the Unified Extensible Firmware Interface (UEFI) specification
1335  * for details.
1336  *
1337  * @search_type		selection criterion
1338  * @protocol		GUID of the protocol
1339  * @search_key		registration key
1340  * @buffer_size		size of the buffer to receive the handles in bytes
1341  * @buffer		buffer to receive the relevant handles
1342  * @return		0 if the handle implements the protocol
1343  */
1344 static efi_status_t EFIAPI efi_locate_handle_ext(
1345 			enum efi_locate_search_type search_type,
1346 			const efi_guid_t *protocol, void *search_key,
1347 			efi_uintn_t *buffer_size, efi_handle_t *buffer)
1348 {
1349 	EFI_ENTRY("%d, %pUl, %p, %p, %p", search_type, protocol, search_key,
1350 		  buffer_size, buffer);
1351 
1352 	return EFI_EXIT(efi_locate_handle(search_type, protocol, search_key,
1353 			buffer_size, buffer));
1354 }
1355 
1356 /* Collapses configuration table entries, removing index i */
1357 static void efi_remove_configuration_table(int i)
1358 {
1359 	struct efi_configuration_table *this = &efi_conf_table[i];
1360 	struct efi_configuration_table *next = &efi_conf_table[i + 1];
1361 	struct efi_configuration_table *end = &efi_conf_table[systab.nr_tables];
1362 
1363 	memmove(this, next, (ulong)end - (ulong)next);
1364 	systab.nr_tables--;
1365 }
1366 
1367 /*
1368  * Adds, updates, or removes a configuration table.
1369  *
1370  * This function is used for internal calls. For the API implementation of the
1371  * InstallConfigurationTable service see efi_install_configuration_table_ext.
1372  *
1373  * @guid		GUID of the installed table
1374  * @table		table to be installed
1375  * @return		status code
1376  */
1377 efi_status_t efi_install_configuration_table(const efi_guid_t *guid,
1378 					     void *table)
1379 {
1380 	struct efi_event *evt;
1381 	int i;
1382 
1383 	if (!guid)
1384 		return EFI_INVALID_PARAMETER;
1385 
1386 	/* Check for guid override */
1387 	for (i = 0; i < systab.nr_tables; i++) {
1388 		if (!guidcmp(guid, &efi_conf_table[i].guid)) {
1389 			if (table)
1390 				efi_conf_table[i].table = table;
1391 			else
1392 				efi_remove_configuration_table(i);
1393 			goto out;
1394 		}
1395 	}
1396 
1397 	if (!table)
1398 		return EFI_NOT_FOUND;
1399 
1400 	/* No override, check for overflow */
1401 	if (i >= ARRAY_SIZE(efi_conf_table))
1402 		return EFI_OUT_OF_RESOURCES;
1403 
1404 	/* Add a new entry */
1405 	memcpy(&efi_conf_table[i].guid, guid, sizeof(*guid));
1406 	efi_conf_table[i].table = table;
1407 	systab.nr_tables = i + 1;
1408 
1409 out:
1410 	/* Notify that the configuration table was changed */
1411 	list_for_each_entry(evt, &efi_events, link) {
1412 		if (evt->group && !guidcmp(evt->group, guid)) {
1413 			efi_signal_event(evt, false);
1414 			break;
1415 		}
1416 	}
1417 
1418 	return EFI_SUCCESS;
1419 }
1420 
1421 /*
1422  * Adds, updates, or removes a configuration table.
1423  *
1424  * This function implements the InstallConfigurationTable service.
1425  * See the Unified Extensible Firmware Interface (UEFI) specification
1426  * for details.
1427  *
1428  * @guid		GUID of the installed table
1429  * @table		table to be installed
1430  * @return		status code
1431  */
1432 static efi_status_t EFIAPI efi_install_configuration_table_ext(efi_guid_t *guid,
1433 							       void *table)
1434 {
1435 	EFI_ENTRY("%pUl, %p", guid, table);
1436 	return EFI_EXIT(efi_install_configuration_table(guid, table));
1437 }
1438 
1439 /*
1440  * Initialize a loaded_image_info + loaded_image_info object with correct
1441  * protocols, boot-device, etc.
1442  *
1443  * @info		loaded image info to be passed to the entry point of the
1444  *			image
1445  * @obj			internal object associated with the loaded image
1446  * @device_path		device path of the loaded image
1447  * @file_path		file path of the loaded image
1448  * @return		status code
1449  */
1450 efi_status_t efi_setup_loaded_image(
1451 			struct efi_loaded_image *info, struct efi_object *obj,
1452 			struct efi_device_path *device_path,
1453 			struct efi_device_path *file_path)
1454 {
1455 	efi_status_t ret;
1456 
1457 	/* Add internal object to object list */
1458 	efi_add_handle(obj);
1459 	/* efi_exit() assumes that the handle points to the info */
1460 	obj->handle = info;
1461 
1462 	info->file_path = file_path;
1463 
1464 	if (device_path) {
1465 		info->device_handle = efi_dp_find_obj(device_path, NULL);
1466 		/*
1467 		 * When asking for the device path interface, return
1468 		 * bootefi_device_path
1469 		 */
1470 		ret = efi_add_protocol(obj->handle, &efi_guid_device_path,
1471 				       device_path);
1472 		if (ret != EFI_SUCCESS)
1473 			goto failure;
1474 	}
1475 
1476 	/*
1477 	 * When asking for the loaded_image interface, just
1478 	 * return handle which points to loaded_image_info
1479 	 */
1480 	ret = efi_add_protocol(obj->handle, &efi_guid_loaded_image, info);
1481 	if (ret != EFI_SUCCESS)
1482 		goto failure;
1483 
1484 	ret = efi_add_protocol(obj->handle,
1485 			       &efi_guid_device_path_to_text_protocol,
1486 			       (void *)&efi_device_path_to_text);
1487 	if (ret != EFI_SUCCESS)
1488 		goto failure;
1489 
1490 	ret = efi_add_protocol(obj->handle,
1491 			       &efi_guid_device_path_utilities_protocol,
1492 			       (void *)&efi_device_path_utilities);
1493 	if (ret != EFI_SUCCESS)
1494 		goto failure;
1495 
1496 	return ret;
1497 failure:
1498 	printf("ERROR: Failure to install protocols for loaded image\n");
1499 	return ret;
1500 }
1501 
1502 /*
1503  * Load an image using a file path.
1504  *
1505  * @file_path		the path of the image to load
1506  * @buffer		buffer containing the loaded image
1507  * @return		status code
1508  */
1509 efi_status_t efi_load_image_from_path(struct efi_device_path *file_path,
1510 				      void **buffer)
1511 {
1512 	struct efi_file_info *info = NULL;
1513 	struct efi_file_handle *f;
1514 	static efi_status_t ret;
1515 	efi_uintn_t bs;
1516 
1517 	f = efi_file_from_path(file_path);
1518 	if (!f)
1519 		return EFI_DEVICE_ERROR;
1520 
1521 	bs = 0;
1522 	EFI_CALL(ret = f->getinfo(f, (efi_guid_t *)&efi_file_info_guid,
1523 				  &bs, info));
1524 	if (ret == EFI_BUFFER_TOO_SMALL) {
1525 		info = malloc(bs);
1526 		EFI_CALL(ret = f->getinfo(f, (efi_guid_t *)&efi_file_info_guid,
1527 					  &bs, info));
1528 	}
1529 	if (ret != EFI_SUCCESS)
1530 		goto error;
1531 
1532 	ret = efi_allocate_pool(EFI_LOADER_DATA, info->file_size, buffer);
1533 	if (ret)
1534 		goto error;
1535 
1536 	bs = info->file_size;
1537 	EFI_CALL(ret = f->read(f, &bs, *buffer));
1538 
1539 error:
1540 	free(info);
1541 	EFI_CALL(f->close(f));
1542 
1543 	if (ret != EFI_SUCCESS) {
1544 		efi_free_pool(*buffer);
1545 		*buffer = NULL;
1546 	}
1547 
1548 	return ret;
1549 }
1550 
1551 /*
1552  * Load an EFI image into memory.
1553  *
1554  * This function implements the LoadImage service.
1555  * See the Unified Extensible Firmware Interface (UEFI) specification
1556  * for details.
1557  *
1558  * @boot_policy		true for request originating from the boot manager
1559  * @parent_image	the caller's image handle
1560  * @file_path		the path of the image to load
1561  * @source_buffer	memory location from which the image is installed
1562  * @source_size		size of the memory area from which the image is
1563  *			installed
1564  * @image_handle	handle for the newly installed image
1565  * @return		status code
1566  */
1567 static efi_status_t EFIAPI efi_load_image(bool boot_policy,
1568 					  efi_handle_t parent_image,
1569 					  struct efi_device_path *file_path,
1570 					  void *source_buffer,
1571 					  efi_uintn_t source_size,
1572 					  efi_handle_t *image_handle)
1573 {
1574 	struct efi_loaded_image *info;
1575 	struct efi_object *obj;
1576 	efi_status_t ret;
1577 
1578 	EFI_ENTRY("%d, %p, %pD, %p, %zd, %p", boot_policy, parent_image,
1579 		  file_path, source_buffer, source_size, image_handle);
1580 
1581 	if (!image_handle || !parent_image) {
1582 		ret = EFI_INVALID_PARAMETER;
1583 		goto error;
1584 	}
1585 
1586 	if (!source_buffer && !file_path) {
1587 		ret = EFI_NOT_FOUND;
1588 		goto error;
1589 	}
1590 
1591 	info = calloc(1, sizeof(*info));
1592 	if (!info) {
1593 		ret = EFI_OUT_OF_RESOURCES;
1594 		goto error;
1595 	}
1596 	obj = calloc(1, sizeof(*obj));
1597 	if (!obj) {
1598 		free(info);
1599 		ret = EFI_OUT_OF_RESOURCES;
1600 		goto error;
1601 	}
1602 
1603 	if (!source_buffer) {
1604 		struct efi_device_path *dp, *fp;
1605 
1606 		ret = efi_load_image_from_path(file_path, &source_buffer);
1607 		if (ret != EFI_SUCCESS)
1608 			goto failure;
1609 		/*
1610 		 * split file_path which contains both the device and
1611 		 * file parts:
1612 		 */
1613 		efi_dp_split_file_path(file_path, &dp, &fp);
1614 		ret = efi_setup_loaded_image(info, obj, dp, fp);
1615 		if (ret != EFI_SUCCESS)
1616 			goto failure;
1617 	} else {
1618 		/* In this case, file_path is the "device" path, ie.
1619 		 * something like a HARDWARE_DEVICE:MEMORY_MAPPED
1620 		 */
1621 		ret = efi_setup_loaded_image(info, obj, file_path, NULL);
1622 		if (ret != EFI_SUCCESS)
1623 			goto failure;
1624 	}
1625 	info->reserved = efi_load_pe(source_buffer, info);
1626 	if (!info->reserved) {
1627 		ret = EFI_UNSUPPORTED;
1628 		goto failure;
1629 	}
1630 	info->system_table = &systab;
1631 	info->parent_handle = parent_image;
1632 	*image_handle = obj->handle;
1633 	return EFI_EXIT(EFI_SUCCESS);
1634 failure:
1635 	free(info);
1636 	efi_delete_handle(obj);
1637 error:
1638 	return EFI_EXIT(ret);
1639 }
1640 
1641 /*
1642  * Call the entry point of an image.
1643  *
1644  * This function implements the StartImage service.
1645  * See the Unified Extensible Firmware Interface (UEFI) specification
1646  * for details.
1647  *
1648  * @image_handle	handle of the image
1649  * @exit_data_size	size of the buffer
1650  * @exit_data		buffer to receive the exit data of the called image
1651  * @return		status code
1652  */
1653 static efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle,
1654 					   unsigned long *exit_data_size,
1655 					   s16 **exit_data)
1656 {
1657 	EFIAPI efi_status_t (*entry)(efi_handle_t image_handle,
1658 				     struct efi_system_table *st);
1659 	struct efi_loaded_image *info = image_handle;
1660 	efi_status_t ret;
1661 
1662 	EFI_ENTRY("%p, %p, %p", image_handle, exit_data_size, exit_data);
1663 	entry = info->reserved;
1664 
1665 	efi_is_direct_boot = false;
1666 
1667 	/* call the image! */
1668 	if (setjmp(&info->exit_jmp)) {
1669 		/*
1670 		 * We called the entry point of the child image with EFI_CALL
1671 		 * in the lines below. The child image called the Exit() boot
1672 		 * service efi_exit() which executed the long jump that brought
1673 		 * us to the current line. This implies that the second half
1674 		 * of the EFI_CALL macro has not been executed.
1675 		 */
1676 #ifdef CONFIG_ARM
1677 		/*
1678 		 * efi_exit() called efi_restore_gd(). We have to undo this
1679 		 * otherwise __efi_entry_check() will put the wrong value into
1680 		 * app_gd.
1681 		 */
1682 		gd = app_gd;
1683 #endif
1684 		/*
1685 		 * To get ready to call EFI_EXIT below we have to execute the
1686 		 * missed out steps of EFI_CALL.
1687 		 */
1688 		assert(__efi_entry_check());
1689 		debug("%sEFI: %lu returned by started image\n",
1690 		      __efi_nesting_dec(),
1691 		      (unsigned long)((uintptr_t)info->exit_status &
1692 				      ~EFI_ERROR_MASK));
1693 		return EFI_EXIT(info->exit_status);
1694 	}
1695 
1696 	ret = EFI_CALL(entry(image_handle, &systab));
1697 
1698 	/*
1699 	 * Usually UEFI applications call Exit() instead of returning.
1700 	 * But because the world doesn not consist of ponies and unicorns,
1701 	 * we're happy to emulate that behavior on behalf of a payload
1702 	 * that forgot.
1703 	 */
1704 	return EFI_CALL(systab.boottime->exit(image_handle, ret, 0, NULL));
1705 }
1706 
1707 /*
1708  * Leave an EFI application or driver.
1709  *
1710  * This function implements the Exit service.
1711  * See the Unified Extensible Firmware Interface (UEFI) specification
1712  * for details.
1713  *
1714  * @image_handle	handle of the application or driver that is exiting
1715  * @exit_status		status code
1716  * @exit_data_size	size of the buffer in bytes
1717  * @exit_data		buffer with data describing an error
1718  * @return		status code
1719  */
1720 static efi_status_t EFIAPI efi_exit(efi_handle_t image_handle,
1721 				    efi_status_t exit_status,
1722 				    unsigned long exit_data_size,
1723 				    int16_t *exit_data)
1724 {
1725 	/*
1726 	 * We require that the handle points to the original loaded
1727 	 * image protocol interface.
1728 	 *
1729 	 * For getting the longjmp address this is safer than locating
1730 	 * the protocol because the protocol may have been reinstalled
1731 	 * pointing to another memory location.
1732 	 *
1733 	 * TODO: We should call the unload procedure of the loaded
1734 	 *	 image protocol.
1735 	 */
1736 	struct efi_loaded_image *loaded_image_info = (void *)image_handle;
1737 
1738 	EFI_ENTRY("%p, %ld, %ld, %p", image_handle, exit_status,
1739 		  exit_data_size, exit_data);
1740 
1741 	/* Make sure entry/exit counts for EFI world cross-overs match */
1742 	EFI_EXIT(exit_status);
1743 
1744 	/*
1745 	 * But longjmp out with the U-Boot gd, not the application's, as
1746 	 * the other end is a setjmp call inside EFI context.
1747 	 */
1748 	efi_restore_gd();
1749 
1750 	loaded_image_info->exit_status = exit_status;
1751 	longjmp(&loaded_image_info->exit_jmp, 1);
1752 
1753 	panic("EFI application exited");
1754 }
1755 
1756 /*
1757  * Unload an EFI image.
1758  *
1759  * This function implements the UnloadImage service.
1760  * See the Unified Extensible Firmware Interface (UEFI) specification
1761  * for details.
1762  *
1763  * @image_handle	handle of the image to be unloaded
1764  * @return		status code
1765  */
1766 static efi_status_t EFIAPI efi_unload_image(efi_handle_t image_handle)
1767 {
1768 	struct efi_object *efiobj;
1769 
1770 	EFI_ENTRY("%p", image_handle);
1771 	efiobj = efi_search_obj(image_handle);
1772 	if (efiobj)
1773 		list_del(&efiobj->link);
1774 
1775 	return EFI_EXIT(EFI_SUCCESS);
1776 }
1777 
1778 /*
1779  * Fix up caches for EFI payloads if necessary.
1780  */
1781 static void efi_exit_caches(void)
1782 {
1783 #if defined(CONFIG_ARM) && !defined(CONFIG_ARM64)
1784 	/*
1785 	 * Grub on 32bit ARM needs to have caches disabled before jumping into
1786 	 * a zImage, but does not know of all cache layers. Give it a hand.
1787 	 */
1788 	if (efi_is_direct_boot)
1789 		cleanup_before_linux();
1790 #endif
1791 }
1792 
1793 /*
1794  * Stop all boot services.
1795  *
1796  * This function implements the ExitBootServices service.
1797  * See the Unified Extensible Firmware Interface (UEFI) specification
1798  * for details.
1799  *
1800  * All timer events are disabled.
1801  * For exit boot services events the notification function is called.
1802  * The boot services are disabled in the system table.
1803  *
1804  * @image_handle	handle of the loaded image
1805  * @map_key		key of the memory map
1806  * @return		status code
1807  */
1808 static efi_status_t EFIAPI efi_exit_boot_services(efi_handle_t image_handle,
1809 						  unsigned long map_key)
1810 {
1811 	struct efi_event *evt;
1812 
1813 	EFI_ENTRY("%p, %ld", image_handle, map_key);
1814 
1815 	/* Make sure that notification functions are not called anymore */
1816 	efi_tpl = TPL_HIGH_LEVEL;
1817 
1818 	/* Check if ExitBootServices has already been called */
1819 	if (!systab.boottime)
1820 		return EFI_EXIT(EFI_SUCCESS);
1821 
1822 	/* Add related events to the event group */
1823 	list_for_each_entry(evt, &efi_events, link) {
1824 		if (evt->type == EVT_SIGNAL_EXIT_BOOT_SERVICES)
1825 			evt->group = &efi_guid_event_group_exit_boot_services;
1826 	}
1827 	/* Notify that ExitBootServices is invoked. */
1828 	list_for_each_entry(evt, &efi_events, link) {
1829 		if (evt->group &&
1830 		    !guidcmp(evt->group,
1831 			     &efi_guid_event_group_exit_boot_services)) {
1832 			efi_signal_event(evt, false);
1833 			break;
1834 		}
1835 	}
1836 
1837 	/* TODO Should persist EFI variables here */
1838 
1839 	board_quiesce_devices();
1840 
1841 	/* Fix up caches for EFI payloads if necessary */
1842 	efi_exit_caches();
1843 
1844 	/* This stops all lingering devices */
1845 	bootm_disable_interrupts();
1846 
1847 	/* Disable boottime services */
1848 	systab.con_in_handle = NULL;
1849 	systab.con_in = NULL;
1850 	systab.con_out_handle = NULL;
1851 	systab.con_out = NULL;
1852 	systab.stderr_handle = NULL;
1853 	systab.std_err = NULL;
1854 	systab.boottime = NULL;
1855 
1856 	/* Recalculate CRC32 */
1857 	systab.hdr.crc32 = 0;
1858 	systab.hdr.crc32 = crc32(0, (const unsigned char *)&systab,
1859 				 sizeof(struct efi_system_table));
1860 
1861 	/* Give the payload some time to boot */
1862 	efi_set_watchdog(0);
1863 	WATCHDOG_RESET();
1864 
1865 	return EFI_EXIT(EFI_SUCCESS);
1866 }
1867 
1868 /*
1869  * Get next value of the counter.
1870  *
1871  * This function implements the NextMonotonicCount service.
1872  * See the Unified Extensible Firmware Interface (UEFI) specification
1873  * for details.
1874  *
1875  * @count	returned value of the counter
1876  * @return	status code
1877  */
1878 static efi_status_t EFIAPI efi_get_next_monotonic_count(uint64_t *count)
1879 {
1880 	static uint64_t mono;
1881 
1882 	EFI_ENTRY("%p", count);
1883 	*count = mono++;
1884 	return EFI_EXIT(EFI_SUCCESS);
1885 }
1886 
1887 /*
1888  * Sleep.
1889  *
1890  * This function implements the Stall sercive.
1891  * See the Unified Extensible Firmware Interface (UEFI) specification
1892  * for details.
1893  *
1894  * @microseconds	period to sleep in microseconds
1895  * @return		status code
1896  */
1897 static efi_status_t EFIAPI efi_stall(unsigned long microseconds)
1898 {
1899 	EFI_ENTRY("%ld", microseconds);
1900 	udelay(microseconds);
1901 	return EFI_EXIT(EFI_SUCCESS);
1902 }
1903 
1904 /*
1905  * Reset the watchdog timer.
1906  *
1907  * This function implements the SetWatchdogTimer service.
1908  * See the Unified Extensible Firmware Interface (UEFI) specification
1909  * for details.
1910  *
1911  * @timeout		seconds before reset by watchdog
1912  * @watchdog_code	code to be logged when resetting
1913  * @data_size		size of buffer in bytes
1914  * @watchdog_data	buffer with data describing the reset reason
1915  * @return		status code
1916  */
1917 static efi_status_t EFIAPI efi_set_watchdog_timer(unsigned long timeout,
1918 						  uint64_t watchdog_code,
1919 						  unsigned long data_size,
1920 						  uint16_t *watchdog_data)
1921 {
1922 	EFI_ENTRY("%ld, 0x%" PRIx64 ", %ld, %p", timeout, watchdog_code,
1923 		  data_size, watchdog_data);
1924 	return EFI_EXIT(efi_set_watchdog(timeout));
1925 }
1926 
1927 /*
1928  * Close a protocol.
1929  *
1930  * This function implements the CloseProtocol service.
1931  * See the Unified Extensible Firmware Interface (UEFI) specification
1932  * for details.
1933  *
1934  * @handle		handle on which the protocol shall be closed
1935  * @protocol		GUID of the protocol to close
1936  * @agent_handle	handle of the driver
1937  * @controller_handle	handle of the controller
1938  * @return		status code
1939  */
1940 static efi_status_t EFIAPI efi_close_protocol(efi_handle_t handle,
1941 					      const efi_guid_t *protocol,
1942 					      efi_handle_t agent_handle,
1943 					      efi_handle_t controller_handle)
1944 {
1945 	struct efi_handler *handler;
1946 	struct efi_open_protocol_info_item *item;
1947 	struct efi_open_protocol_info_item *pos;
1948 	efi_status_t r;
1949 
1950 	EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, agent_handle,
1951 		  controller_handle);
1952 
1953 	if (!agent_handle) {
1954 		r = EFI_INVALID_PARAMETER;
1955 		goto out;
1956 	}
1957 	r = efi_search_protocol(handle, protocol, &handler);
1958 	if (r != EFI_SUCCESS)
1959 		goto out;
1960 
1961 	r = EFI_NOT_FOUND;
1962 	list_for_each_entry_safe(item, pos, &handler->open_infos, link) {
1963 		if (item->info.agent_handle == agent_handle &&
1964 		    item->info.controller_handle == controller_handle) {
1965 			efi_delete_open_info(item);
1966 			r = EFI_SUCCESS;
1967 			break;
1968 		}
1969 	}
1970 out:
1971 	return EFI_EXIT(r);
1972 }
1973 
1974 /*
1975  * Provide information about then open status of a protocol on a handle
1976  *
1977  * This function implements the OpenProtocolInformation service.
1978  * See the Unified Extensible Firmware Interface (UEFI) specification
1979  * for details.
1980  *
1981  * @handle		handle for which the information shall be retrieved
1982  * @protocol		GUID of the protocol
1983  * @entry_buffer	buffer to receive the open protocol information
1984  * @entry_count		number of entries available in the buffer
1985  * @return		status code
1986  */
1987 static efi_status_t EFIAPI efi_open_protocol_information(
1988 			efi_handle_t handle, const efi_guid_t *protocol,
1989 			struct efi_open_protocol_info_entry **entry_buffer,
1990 			efi_uintn_t *entry_count)
1991 {
1992 	unsigned long buffer_size;
1993 	unsigned long count;
1994 	struct efi_handler *handler;
1995 	struct efi_open_protocol_info_item *item;
1996 	efi_status_t r;
1997 
1998 	EFI_ENTRY("%p, %pUl, %p, %p", handle, protocol, entry_buffer,
1999 		  entry_count);
2000 
2001 	/* Check parameters */
2002 	if (!entry_buffer) {
2003 		r = EFI_INVALID_PARAMETER;
2004 		goto out;
2005 	}
2006 	r = efi_search_protocol(handle, protocol, &handler);
2007 	if (r != EFI_SUCCESS)
2008 		goto out;
2009 
2010 	/* Count entries */
2011 	count = 0;
2012 	list_for_each_entry(item, &handler->open_infos, link) {
2013 		if (item->info.open_count)
2014 			++count;
2015 	}
2016 	*entry_count = count;
2017 	*entry_buffer = NULL;
2018 	if (!count) {
2019 		r = EFI_SUCCESS;
2020 		goto out;
2021 	}
2022 
2023 	/* Copy entries */
2024 	buffer_size = count * sizeof(struct efi_open_protocol_info_entry);
2025 	r = efi_allocate_pool(EFI_ALLOCATE_ANY_PAGES, buffer_size,
2026 			      (void **)entry_buffer);
2027 	if (r != EFI_SUCCESS)
2028 		goto out;
2029 	list_for_each_entry_reverse(item, &handler->open_infos, link) {
2030 		if (item->info.open_count)
2031 			(*entry_buffer)[--count] = item->info;
2032 	}
2033 out:
2034 	return EFI_EXIT(r);
2035 }
2036 
2037 /*
2038  * Get protocols installed on a handle.
2039  *
2040  * This function implements the ProtocolsPerHandleService.
2041  * See the Unified Extensible Firmware Interface (UEFI) specification
2042  * for details.
2043  *
2044  * @handle			handle for which the information is retrieved
2045  * @protocol_buffer		buffer with protocol GUIDs
2046  * @protocol_buffer_count	number of entries in the buffer
2047  * @return			status code
2048  */
2049 static efi_status_t EFIAPI efi_protocols_per_handle(
2050 			efi_handle_t handle, efi_guid_t ***protocol_buffer,
2051 			efi_uintn_t *protocol_buffer_count)
2052 {
2053 	unsigned long buffer_size;
2054 	struct efi_object *efiobj;
2055 	struct list_head *protocol_handle;
2056 	efi_status_t r;
2057 
2058 	EFI_ENTRY("%p, %p, %p", handle, protocol_buffer,
2059 		  protocol_buffer_count);
2060 
2061 	if (!handle || !protocol_buffer || !protocol_buffer_count)
2062 		return EFI_EXIT(EFI_INVALID_PARAMETER);
2063 
2064 	*protocol_buffer = NULL;
2065 	*protocol_buffer_count = 0;
2066 
2067 	efiobj = efi_search_obj(handle);
2068 	if (!efiobj)
2069 		return EFI_EXIT(EFI_INVALID_PARAMETER);
2070 
2071 	/* Count protocols */
2072 	list_for_each(protocol_handle, &efiobj->protocols) {
2073 		++*protocol_buffer_count;
2074 	}
2075 
2076 	/* Copy guids */
2077 	if (*protocol_buffer_count) {
2078 		size_t j = 0;
2079 
2080 		buffer_size = sizeof(efi_guid_t *) * *protocol_buffer_count;
2081 		r = efi_allocate_pool(EFI_ALLOCATE_ANY_PAGES, buffer_size,
2082 				      (void **)protocol_buffer);
2083 		if (r != EFI_SUCCESS)
2084 			return EFI_EXIT(r);
2085 		list_for_each(protocol_handle, &efiobj->protocols) {
2086 			struct efi_handler *protocol;
2087 
2088 			protocol = list_entry(protocol_handle,
2089 					      struct efi_handler, link);
2090 			(*protocol_buffer)[j] = (void *)protocol->guid;
2091 			++j;
2092 		}
2093 	}
2094 
2095 	return EFI_EXIT(EFI_SUCCESS);
2096 }
2097 
2098 /*
2099  * Locate handles implementing a protocol.
2100  *
2101  * This function implements the LocateHandleBuffer service.
2102  * See the Unified Extensible Firmware Interface (UEFI) specification
2103  * for details.
2104  *
2105  * @search_type		selection criterion
2106  * @protocol		GUID of the protocol
2107  * @search_key		registration key
2108  * @no_handles		number of returned handles
2109  * @buffer		buffer with the returned handles
2110  * @return		status code
2111  */
2112 static efi_status_t EFIAPI efi_locate_handle_buffer(
2113 			enum efi_locate_search_type search_type,
2114 			const efi_guid_t *protocol, void *search_key,
2115 			efi_uintn_t *no_handles, efi_handle_t **buffer)
2116 {
2117 	efi_status_t r;
2118 	efi_uintn_t buffer_size = 0;
2119 
2120 	EFI_ENTRY("%d, %pUl, %p, %p, %p", search_type, protocol, search_key,
2121 		  no_handles, buffer);
2122 
2123 	if (!no_handles || !buffer) {
2124 		r = EFI_INVALID_PARAMETER;
2125 		goto out;
2126 	}
2127 	*no_handles = 0;
2128 	*buffer = NULL;
2129 	r = efi_locate_handle(search_type, protocol, search_key, &buffer_size,
2130 			      *buffer);
2131 	if (r != EFI_BUFFER_TOO_SMALL)
2132 		goto out;
2133 	r = efi_allocate_pool(EFI_ALLOCATE_ANY_PAGES, buffer_size,
2134 			      (void **)buffer);
2135 	if (r != EFI_SUCCESS)
2136 		goto out;
2137 	r = efi_locate_handle(search_type, protocol, search_key, &buffer_size,
2138 			      *buffer);
2139 	if (r == EFI_SUCCESS)
2140 		*no_handles = buffer_size / sizeof(efi_handle_t);
2141 out:
2142 	return EFI_EXIT(r);
2143 }
2144 
2145 /*
2146  * Find an interface implementing a protocol.
2147  *
2148  * This function implements the LocateProtocol service.
2149  * See the Unified Extensible Firmware Interface (UEFI) specification
2150  * for details.
2151  *
2152  * @protocol		GUID of the protocol
2153  * @registration	registration key passed to the notification function
2154  * @protocol_interface	interface implementing the protocol
2155  * @return		status code
2156  */
2157 static efi_status_t EFIAPI efi_locate_protocol(const efi_guid_t *protocol,
2158 					       void *registration,
2159 					       void **protocol_interface)
2160 {
2161 	struct list_head *lhandle;
2162 	efi_status_t ret;
2163 
2164 	EFI_ENTRY("%pUl, %p, %p", protocol, registration, protocol_interface);
2165 
2166 	if (!protocol || !protocol_interface)
2167 		return EFI_EXIT(EFI_INVALID_PARAMETER);
2168 
2169 	list_for_each(lhandle, &efi_obj_list) {
2170 		struct efi_object *efiobj;
2171 		struct efi_handler *handler;
2172 
2173 		efiobj = list_entry(lhandle, struct efi_object, link);
2174 
2175 		ret = efi_search_protocol(efiobj->handle, protocol, &handler);
2176 		if (ret == EFI_SUCCESS) {
2177 			*protocol_interface = handler->protocol_interface;
2178 			return EFI_EXIT(EFI_SUCCESS);
2179 		}
2180 	}
2181 	*protocol_interface = NULL;
2182 
2183 	return EFI_EXIT(EFI_NOT_FOUND);
2184 }
2185 
2186 /*
2187  * Get the device path and handle of an device implementing a protocol.
2188  *
2189  * This function implements the LocateDevicePath service.
2190  * See the Unified Extensible Firmware Interface (UEFI) specification
2191  * for details.
2192  *
2193  * @protocol		GUID of the protocol
2194  * @device_path		device path
2195  * @device		handle of the device
2196  * @return		status code
2197  */
2198 static efi_status_t EFIAPI efi_locate_device_path(
2199 			const efi_guid_t *protocol,
2200 			struct efi_device_path **device_path,
2201 			efi_handle_t *device)
2202 {
2203 	struct efi_device_path *dp;
2204 	size_t i;
2205 	struct efi_handler *handler;
2206 	efi_handle_t *handles;
2207 	size_t len, len_dp;
2208 	size_t len_best = 0;
2209 	efi_uintn_t no_handles;
2210 	u8 *remainder;
2211 	efi_status_t ret;
2212 
2213 	EFI_ENTRY("%pUl, %p, %p", protocol, device_path, device);
2214 
2215 	if (!protocol || !device_path || !*device_path || !device) {
2216 		ret = EFI_INVALID_PARAMETER;
2217 		goto out;
2218 	}
2219 
2220 	/* Find end of device path */
2221 	len = efi_dp_instance_size(*device_path);
2222 
2223 	/* Get all handles implementing the protocol */
2224 	ret = EFI_CALL(efi_locate_handle_buffer(BY_PROTOCOL, protocol, NULL,
2225 						&no_handles, &handles));
2226 	if (ret != EFI_SUCCESS)
2227 		goto out;
2228 
2229 	for (i = 0; i < no_handles; ++i) {
2230 		/* Find the device path protocol */
2231 		ret = efi_search_protocol(handles[i], &efi_guid_device_path,
2232 					  &handler);
2233 		if (ret != EFI_SUCCESS)
2234 			continue;
2235 		dp = (struct efi_device_path *)handler->protocol_interface;
2236 		len_dp = efi_dp_instance_size(dp);
2237 		/*
2238 		 * This handle can only be a better fit
2239 		 * if its device path length is longer than the best fit and
2240 		 * if its device path length is shorter of equal the searched
2241 		 * device path.
2242 		 */
2243 		if (len_dp <= len_best || len_dp > len)
2244 			continue;
2245 		/* Check if dp is a subpath of device_path */
2246 		if (memcmp(*device_path, dp, len_dp))
2247 			continue;
2248 		*device = handles[i];
2249 		len_best = len_dp;
2250 	}
2251 	if (len_best) {
2252 		remainder = (u8 *)*device_path + len_best;
2253 		*device_path = (struct efi_device_path *)remainder;
2254 		ret = EFI_SUCCESS;
2255 	} else {
2256 		ret = EFI_NOT_FOUND;
2257 	}
2258 out:
2259 	return EFI_EXIT(ret);
2260 }
2261 
2262 /*
2263  * Install multiple protocol interfaces.
2264  *
2265  * This function implements the MultipleProtocolInterfaces service.
2266  * See the Unified Extensible Firmware Interface (UEFI) specification
2267  * for details.
2268  *
2269  * @handle	handle on which the protocol interfaces shall be installed
2270  * @...		NULL terminated argument list with pairs of protocol GUIDS and
2271  *		interfaces
2272  * @return	status code
2273  */
2274 static efi_status_t EFIAPI efi_install_multiple_protocol_interfaces(
2275 			void **handle, ...)
2276 {
2277 	EFI_ENTRY("%p", handle);
2278 
2279 	va_list argptr;
2280 	const efi_guid_t *protocol;
2281 	void *protocol_interface;
2282 	efi_status_t r = EFI_SUCCESS;
2283 	int i = 0;
2284 
2285 	if (!handle)
2286 		return EFI_EXIT(EFI_INVALID_PARAMETER);
2287 
2288 	va_start(argptr, handle);
2289 	for (;;) {
2290 		protocol = va_arg(argptr, efi_guid_t*);
2291 		if (!protocol)
2292 			break;
2293 		protocol_interface = va_arg(argptr, void*);
2294 		r = EFI_CALL(efi_install_protocol_interface(
2295 						handle, protocol,
2296 						EFI_NATIVE_INTERFACE,
2297 						protocol_interface));
2298 		if (r != EFI_SUCCESS)
2299 			break;
2300 		i++;
2301 	}
2302 	va_end(argptr);
2303 	if (r == EFI_SUCCESS)
2304 		return EFI_EXIT(r);
2305 
2306 	/* If an error occurred undo all changes. */
2307 	va_start(argptr, handle);
2308 	for (; i; --i) {
2309 		protocol = va_arg(argptr, efi_guid_t*);
2310 		protocol_interface = va_arg(argptr, void*);
2311 		EFI_CALL(efi_uninstall_protocol_interface(handle, protocol,
2312 							  protocol_interface));
2313 	}
2314 	va_end(argptr);
2315 
2316 	return EFI_EXIT(r);
2317 }
2318 
2319 /*
2320  * Uninstall multiple protocol interfaces.
2321  *
2322  * This function implements the UninstallMultipleProtocolInterfaces service.
2323  * See the Unified Extensible Firmware Interface (UEFI) specification
2324  * for details.
2325  *
2326  * @handle	handle from which the protocol interfaces shall be removed
2327  * @...		NULL terminated argument list with pairs of protocol GUIDS and
2328  *		interfaces
2329  * @return	status code
2330  */
2331 static efi_status_t EFIAPI efi_uninstall_multiple_protocol_interfaces(
2332 			void *handle, ...)
2333 {
2334 	EFI_ENTRY("%p", handle);
2335 
2336 	va_list argptr;
2337 	const efi_guid_t *protocol;
2338 	void *protocol_interface;
2339 	efi_status_t r = EFI_SUCCESS;
2340 	size_t i = 0;
2341 
2342 	if (!handle)
2343 		return EFI_EXIT(EFI_INVALID_PARAMETER);
2344 
2345 	va_start(argptr, handle);
2346 	for (;;) {
2347 		protocol = va_arg(argptr, efi_guid_t*);
2348 		if (!protocol)
2349 			break;
2350 		protocol_interface = va_arg(argptr, void*);
2351 		r = EFI_CALL(efi_uninstall_protocol_interface(
2352 						handle, protocol,
2353 						protocol_interface));
2354 		if (r != EFI_SUCCESS)
2355 			break;
2356 		i++;
2357 	}
2358 	va_end(argptr);
2359 	if (r == EFI_SUCCESS)
2360 		return EFI_EXIT(r);
2361 
2362 	/* If an error occurred undo all changes. */
2363 	va_start(argptr, handle);
2364 	for (; i; --i) {
2365 		protocol = va_arg(argptr, efi_guid_t*);
2366 		protocol_interface = va_arg(argptr, void*);
2367 		EFI_CALL(efi_install_protocol_interface(&handle, protocol,
2368 							EFI_NATIVE_INTERFACE,
2369 							protocol_interface));
2370 	}
2371 	va_end(argptr);
2372 
2373 	return EFI_EXIT(r);
2374 }
2375 
2376 /*
2377  * Calculate cyclic redundancy code.
2378  *
2379  * This function implements the CalculateCrc32 service.
2380  * See the Unified Extensible Firmware Interface (UEFI) specification
2381  * for details.
2382  *
2383  * @data	buffer with data
2384  * @data_size	size of buffer in bytes
2385  * @crc32_p	cyclic redundancy code
2386  * @return	status code
2387  */
2388 static efi_status_t EFIAPI efi_calculate_crc32(void *data,
2389 					       unsigned long data_size,
2390 					       uint32_t *crc32_p)
2391 {
2392 	EFI_ENTRY("%p, %ld", data, data_size);
2393 	*crc32_p = crc32(0, data, data_size);
2394 	return EFI_EXIT(EFI_SUCCESS);
2395 }
2396 
2397 /*
2398  * Copy memory.
2399  *
2400  * This function implements the CopyMem service.
2401  * See the Unified Extensible Firmware Interface (UEFI) specification
2402  * for details.
2403  *
2404  * @destination		destination of the copy operation
2405  * @source		source of the copy operation
2406  * @length		number of bytes to copy
2407  */
2408 static void EFIAPI efi_copy_mem(void *destination, const void *source,
2409 				size_t length)
2410 {
2411 	EFI_ENTRY("%p, %p, %ld", destination, source, (unsigned long)length);
2412 	memcpy(destination, source, length);
2413 	EFI_EXIT(EFI_SUCCESS);
2414 }
2415 
2416 /*
2417  * Fill memory with a byte value.
2418  *
2419  * This function implements the SetMem service.
2420  * See the Unified Extensible Firmware Interface (UEFI) specification
2421  * for details.
2422  *
2423  * @buffer		buffer to fill
2424  * @size		size of buffer in bytes
2425  * @value		byte to copy to the buffer
2426  */
2427 static void EFIAPI efi_set_mem(void *buffer, size_t size, uint8_t value)
2428 {
2429 	EFI_ENTRY("%p, %ld, 0x%x", buffer, (unsigned long)size, value);
2430 	memset(buffer, value, size);
2431 	EFI_EXIT(EFI_SUCCESS);
2432 }
2433 
2434 /*
2435  * Open protocol interface on a handle.
2436  *
2437  * @handler		handler of a protocol
2438  * @protocol_interface	interface implementing the protocol
2439  * @agent_handle	handle of the driver
2440  * @controller_handle	handle of the controller
2441  * @attributes		attributes indicating how to open the protocol
2442  * @return		status code
2443  */
2444 static efi_status_t efi_protocol_open(
2445 			struct efi_handler *handler,
2446 			void **protocol_interface, void *agent_handle,
2447 			void *controller_handle, uint32_t attributes)
2448 {
2449 	struct efi_open_protocol_info_item *item;
2450 	struct efi_open_protocol_info_entry *match = NULL;
2451 	bool opened_by_driver = false;
2452 	bool opened_exclusive = false;
2453 
2454 	/* If there is no agent, only return the interface */
2455 	if (!agent_handle)
2456 		goto out;
2457 
2458 	/* For TEST_PROTOCOL ignore interface attribute */
2459 	if (attributes != EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
2460 		*protocol_interface = NULL;
2461 
2462 	/*
2463 	 * Check if the protocol is already opened by a driver with the same
2464 	 * attributes or opened exclusively
2465 	 */
2466 	list_for_each_entry(item, &handler->open_infos, link) {
2467 		if (item->info.agent_handle == agent_handle) {
2468 			if ((attributes & EFI_OPEN_PROTOCOL_BY_DRIVER) &&
2469 			    (item->info.attributes == attributes))
2470 				return EFI_ALREADY_STARTED;
2471 		}
2472 		if (item->info.attributes & EFI_OPEN_PROTOCOL_EXCLUSIVE)
2473 			opened_exclusive = true;
2474 	}
2475 
2476 	/* Only one controller can open the protocol exclusively */
2477 	if (opened_exclusive && attributes &
2478 	    (EFI_OPEN_PROTOCOL_EXCLUSIVE | EFI_OPEN_PROTOCOL_BY_DRIVER))
2479 		return EFI_ACCESS_DENIED;
2480 
2481 	/* Prepare exclusive opening */
2482 	if (attributes & EFI_OPEN_PROTOCOL_EXCLUSIVE) {
2483 		/* Try to disconnect controllers */
2484 		list_for_each_entry(item, &handler->open_infos, link) {
2485 			if (item->info.attributes ==
2486 					EFI_OPEN_PROTOCOL_BY_DRIVER)
2487 				EFI_CALL(efi_disconnect_controller(
2488 						item->info.controller_handle,
2489 						item->info.agent_handle,
2490 						NULL));
2491 		}
2492 		opened_by_driver = false;
2493 		/* Check if all controllers are disconnected */
2494 		list_for_each_entry(item, &handler->open_infos, link) {
2495 			if (item->info.attributes & EFI_OPEN_PROTOCOL_BY_DRIVER)
2496 				opened_by_driver = true;
2497 		}
2498 		/* Only one controller can be conncected */
2499 		if (opened_by_driver)
2500 			return EFI_ACCESS_DENIED;
2501 	}
2502 
2503 	/* Find existing entry */
2504 	list_for_each_entry(item, &handler->open_infos, link) {
2505 		if (item->info.agent_handle == agent_handle &&
2506 		    item->info.controller_handle == controller_handle)
2507 			match = &item->info;
2508 	}
2509 	/* None found, create one */
2510 	if (!match) {
2511 		match = efi_create_open_info(handler);
2512 		if (!match)
2513 			return EFI_OUT_OF_RESOURCES;
2514 	}
2515 
2516 	match->agent_handle = agent_handle;
2517 	match->controller_handle = controller_handle;
2518 	match->attributes = attributes;
2519 	match->open_count++;
2520 
2521 out:
2522 	/* For TEST_PROTOCOL ignore interface attribute. */
2523 	if (attributes != EFI_OPEN_PROTOCOL_TEST_PROTOCOL)
2524 		*protocol_interface = handler->protocol_interface;
2525 
2526 	return EFI_SUCCESS;
2527 }
2528 
2529 /*
2530  * Open protocol interface on a handle.
2531  *
2532  * This function implements the OpenProtocol interface.
2533  * See the Unified Extensible Firmware Interface (UEFI) specification
2534  * for details.
2535  *
2536  * @handle		handle on which the protocol shall be opened
2537  * @protocol		GUID of the protocol
2538  * @protocol_interface	interface implementing the protocol
2539  * @agent_handle	handle of the driver
2540  * @controller_handle	handle of the controller
2541  * @attributes		attributes indicating how to open the protocol
2542  * @return		status code
2543  */
2544 static efi_status_t EFIAPI efi_open_protocol(
2545 			void *handle, const efi_guid_t *protocol,
2546 			void **protocol_interface, void *agent_handle,
2547 			void *controller_handle, uint32_t attributes)
2548 {
2549 	struct efi_handler *handler;
2550 	efi_status_t r = EFI_INVALID_PARAMETER;
2551 
2552 	EFI_ENTRY("%p, %pUl, %p, %p, %p, 0x%x", handle, protocol,
2553 		  protocol_interface, agent_handle, controller_handle,
2554 		  attributes);
2555 
2556 	if (!handle || !protocol ||
2557 	    (!protocol_interface && attributes !=
2558 	     EFI_OPEN_PROTOCOL_TEST_PROTOCOL)) {
2559 		goto out;
2560 	}
2561 
2562 	switch (attributes) {
2563 	case EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL:
2564 	case EFI_OPEN_PROTOCOL_GET_PROTOCOL:
2565 	case EFI_OPEN_PROTOCOL_TEST_PROTOCOL:
2566 		break;
2567 	case EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER:
2568 		if (controller_handle == handle)
2569 			goto out;
2570 		/* fall-through */
2571 	case EFI_OPEN_PROTOCOL_BY_DRIVER:
2572 	case EFI_OPEN_PROTOCOL_BY_DRIVER | EFI_OPEN_PROTOCOL_EXCLUSIVE:
2573 		/* Check that the controller handle is valid */
2574 		if (!efi_search_obj(controller_handle))
2575 			goto out;
2576 		/* fall-through */
2577 	case EFI_OPEN_PROTOCOL_EXCLUSIVE:
2578 		/* Check that the agent handle is valid */
2579 		if (!efi_search_obj(agent_handle))
2580 			goto out;
2581 		break;
2582 	default:
2583 		goto out;
2584 	}
2585 
2586 	r = efi_search_protocol(handle, protocol, &handler);
2587 	if (r != EFI_SUCCESS)
2588 		goto out;
2589 
2590 	r = efi_protocol_open(handler, protocol_interface, agent_handle,
2591 			      controller_handle, attributes);
2592 out:
2593 	return EFI_EXIT(r);
2594 }
2595 
2596 /*
2597  * Get interface of a protocol on a handle.
2598  *
2599  * This function implements the HandleProtocol service.
2600  * See the Unified Extensible Firmware Interface (UEFI) specification
2601  * for details.
2602  *
2603  * @handle		handle on which the protocol shall be opened
2604  * @protocol		GUID of the protocol
2605  * @protocol_interface  interface implementing the protocol
2606  * @return		status code
2607  */
2608 static efi_status_t EFIAPI efi_handle_protocol(efi_handle_t handle,
2609 					       const efi_guid_t *protocol,
2610 					       void **protocol_interface)
2611 {
2612 	return efi_open_protocol(handle, protocol, protocol_interface, NULL,
2613 				 NULL, EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL);
2614 }
2615 
2616 static efi_status_t efi_bind_controller(
2617 			efi_handle_t controller_handle,
2618 			efi_handle_t driver_image_handle,
2619 			struct efi_device_path *remain_device_path)
2620 {
2621 	struct efi_driver_binding_protocol *binding_protocol;
2622 	efi_status_t r;
2623 
2624 	r = EFI_CALL(efi_open_protocol(driver_image_handle,
2625 				       &efi_guid_driver_binding_protocol,
2626 				       (void **)&binding_protocol,
2627 				       driver_image_handle, NULL,
2628 				       EFI_OPEN_PROTOCOL_GET_PROTOCOL));
2629 	if (r != EFI_SUCCESS)
2630 		return r;
2631 	r = EFI_CALL(binding_protocol->supported(binding_protocol,
2632 						 controller_handle,
2633 						 remain_device_path));
2634 	if (r == EFI_SUCCESS)
2635 		r = EFI_CALL(binding_protocol->start(binding_protocol,
2636 						     controller_handle,
2637 						     remain_device_path));
2638 	EFI_CALL(efi_close_protocol(driver_image_handle,
2639 				    &efi_guid_driver_binding_protocol,
2640 				    driver_image_handle, NULL));
2641 	return r;
2642 }
2643 
2644 static efi_status_t efi_connect_single_controller(
2645 			efi_handle_t controller_handle,
2646 			efi_handle_t *driver_image_handle,
2647 			struct efi_device_path *remain_device_path)
2648 {
2649 	efi_handle_t *buffer;
2650 	size_t count;
2651 	size_t i;
2652 	efi_status_t r;
2653 	size_t connected = 0;
2654 
2655 	/* Get buffer with all handles with driver binding protocol */
2656 	r = EFI_CALL(efi_locate_handle_buffer(BY_PROTOCOL,
2657 					      &efi_guid_driver_binding_protocol,
2658 					      NULL, &count, &buffer));
2659 	if (r != EFI_SUCCESS)
2660 		return r;
2661 
2662 	/*  Context Override */
2663 	if (driver_image_handle) {
2664 		for (; *driver_image_handle; ++driver_image_handle) {
2665 			for (i = 0; i < count; ++i) {
2666 				if (buffer[i] == *driver_image_handle) {
2667 					buffer[i] = NULL;
2668 					r = efi_bind_controller(
2669 							controller_handle,
2670 							*driver_image_handle,
2671 							remain_device_path);
2672 					/*
2673 					 * For drivers that do not support the
2674 					 * controller or are already connected
2675 					 * we receive an error code here.
2676 					 */
2677 					if (r == EFI_SUCCESS)
2678 						++connected;
2679 				}
2680 			}
2681 		}
2682 	}
2683 
2684 	/*
2685 	 * TODO: Some overrides are not yet implemented:
2686 	 * - Platform Driver Override
2687 	 * - Driver Family Override Search
2688 	 * - Bus Specific Driver Override
2689 	 */
2690 
2691 	/* Driver Binding Search */
2692 	for (i = 0; i < count; ++i) {
2693 		if (buffer[i]) {
2694 			r = efi_bind_controller(controller_handle,
2695 						buffer[i],
2696 						remain_device_path);
2697 			if (r == EFI_SUCCESS)
2698 				++connected;
2699 		}
2700 	}
2701 
2702 	efi_free_pool(buffer);
2703 	if (!connected)
2704 		return EFI_NOT_FOUND;
2705 	return EFI_SUCCESS;
2706 }
2707 
2708 /*
2709  * Connect a controller to a driver.
2710  *
2711  * This function implements the ConnectController service.
2712  * See the Unified Extensible Firmware Interface (UEFI) specification
2713  * for details.
2714  *
2715  * First all driver binding protocol handles are tried for binding drivers.
2716  * Afterwards all handles that have openened a protocol of the controller
2717  * with EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER are connected to drivers.
2718  *
2719  * @controller_handle	handle of the controller
2720  * @driver_image_handle	handle of the driver
2721  * @remain_device_path	device path of a child controller
2722  * @recursive		true to connect all child controllers
2723  * @return		status code
2724  */
2725 static efi_status_t EFIAPI efi_connect_controller(
2726 			efi_handle_t controller_handle,
2727 			efi_handle_t *driver_image_handle,
2728 			struct efi_device_path *remain_device_path,
2729 			bool recursive)
2730 {
2731 	efi_status_t r;
2732 	efi_status_t ret = EFI_NOT_FOUND;
2733 	struct efi_object *efiobj;
2734 
2735 	EFI_ENTRY("%p, %p, %p, %d", controller_handle, driver_image_handle,
2736 		  remain_device_path, recursive);
2737 
2738 	efiobj = efi_search_obj(controller_handle);
2739 	if (!efiobj) {
2740 		ret = EFI_INVALID_PARAMETER;
2741 		goto out;
2742 	}
2743 
2744 	r = efi_connect_single_controller(controller_handle,
2745 					  driver_image_handle,
2746 					  remain_device_path);
2747 	if (r == EFI_SUCCESS)
2748 		ret = EFI_SUCCESS;
2749 	if (recursive) {
2750 		struct efi_handler *handler;
2751 		struct efi_open_protocol_info_item *item;
2752 
2753 		list_for_each_entry(handler, &efiobj->protocols, link) {
2754 			list_for_each_entry(item, &handler->open_infos, link) {
2755 				if (item->info.attributes &
2756 				    EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER) {
2757 					r = EFI_CALL(efi_connect_controller(
2758 						item->info.controller_handle,
2759 						driver_image_handle,
2760 						remain_device_path,
2761 						recursive));
2762 					if (r == EFI_SUCCESS)
2763 						ret = EFI_SUCCESS;
2764 				}
2765 			}
2766 		}
2767 	}
2768 	/*  Check for child controller specified by end node */
2769 	if (ret != EFI_SUCCESS && remain_device_path &&
2770 	    remain_device_path->type == DEVICE_PATH_TYPE_END)
2771 		ret = EFI_SUCCESS;
2772 out:
2773 	return EFI_EXIT(ret);
2774 }
2775 
2776 /*
2777  * Get all child controllers associated to a driver.
2778  * The allocated buffer has to be freed with free().
2779  *
2780  * @efiobj			handle of the controller
2781  * @driver_handle		handle of the driver
2782  * @number_of_children		number of child controllers
2783  * @child_handle_buffer		handles of the the child controllers
2784  */
2785 static efi_status_t efi_get_child_controllers(
2786 				struct efi_object *efiobj,
2787 				efi_handle_t driver_handle,
2788 				efi_uintn_t *number_of_children,
2789 				efi_handle_t **child_handle_buffer)
2790 {
2791 	struct efi_handler *handler;
2792 	struct efi_open_protocol_info_item *item;
2793 	efi_uintn_t count = 0, i;
2794 	bool duplicate;
2795 
2796 	/* Count all child controller associations */
2797 	list_for_each_entry(handler, &efiobj->protocols, link) {
2798 		list_for_each_entry(item, &handler->open_infos, link) {
2799 			if (item->info.agent_handle == driver_handle &&
2800 			    item->info.attributes &
2801 			    EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER)
2802 				++count;
2803 		}
2804 	}
2805 	/*
2806 	 * Create buffer. In case of duplicate child controller assignments
2807 	 * the buffer will be too large. But that does not harm.
2808 	 */
2809 	*number_of_children = 0;
2810 	*child_handle_buffer = calloc(count, sizeof(efi_handle_t));
2811 	if (!*child_handle_buffer)
2812 		return EFI_OUT_OF_RESOURCES;
2813 	/* Copy unique child handles */
2814 	list_for_each_entry(handler, &efiobj->protocols, link) {
2815 		list_for_each_entry(item, &handler->open_infos, link) {
2816 			if (item->info.agent_handle == driver_handle &&
2817 			    item->info.attributes &
2818 			    EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER) {
2819 				/* Check this is a new child controller */
2820 				duplicate = false;
2821 				for (i = 0; i < *number_of_children; ++i) {
2822 					if ((*child_handle_buffer)[i] ==
2823 					    item->info.controller_handle)
2824 						duplicate = true;
2825 				}
2826 				/* Copy handle to buffer */
2827 				if (!duplicate) {
2828 					i = (*number_of_children)++;
2829 					(*child_handle_buffer)[i] =
2830 						item->info.controller_handle;
2831 				}
2832 			}
2833 		}
2834 	}
2835 	return EFI_SUCCESS;
2836 }
2837 
2838 /*
2839  * Disconnect a controller from a driver.
2840  *
2841  * This function implements the DisconnectController service.
2842  * See the Unified Extensible Firmware Interface (UEFI) specification
2843  * for details.
2844  *
2845  * @controller_handle	handle of the controller
2846  * @driver_image_handle handle of the driver
2847  * @child_handle	handle of the child to destroy
2848  * @return		status code
2849  */
2850 static efi_status_t EFIAPI efi_disconnect_controller(
2851 				efi_handle_t controller_handle,
2852 				efi_handle_t driver_image_handle,
2853 				efi_handle_t child_handle)
2854 {
2855 	struct efi_driver_binding_protocol *binding_protocol;
2856 	efi_handle_t *child_handle_buffer = NULL;
2857 	size_t number_of_children = 0;
2858 	efi_status_t r;
2859 	size_t stop_count = 0;
2860 	struct efi_object *efiobj;
2861 
2862 	EFI_ENTRY("%p, %p, %p", controller_handle, driver_image_handle,
2863 		  child_handle);
2864 
2865 	efiobj = efi_search_obj(controller_handle);
2866 	if (!efiobj) {
2867 		r = EFI_INVALID_PARAMETER;
2868 		goto out;
2869 	}
2870 
2871 	if (child_handle && !efi_search_obj(child_handle)) {
2872 		r = EFI_INVALID_PARAMETER;
2873 		goto out;
2874 	}
2875 
2876 	/* If no driver handle is supplied, disconnect all drivers */
2877 	if (!driver_image_handle) {
2878 		r = efi_disconnect_all_drivers(efiobj, NULL, child_handle);
2879 		goto out;
2880 	}
2881 
2882 	/* Create list of child handles */
2883 	if (child_handle) {
2884 		number_of_children = 1;
2885 		child_handle_buffer = &child_handle;
2886 	} else {
2887 		efi_get_child_controllers(efiobj,
2888 					  driver_image_handle,
2889 					  &number_of_children,
2890 					  &child_handle_buffer);
2891 	}
2892 
2893 	/* Get the driver binding protocol */
2894 	r = EFI_CALL(efi_open_protocol(driver_image_handle,
2895 				       &efi_guid_driver_binding_protocol,
2896 				       (void **)&binding_protocol,
2897 				       driver_image_handle, NULL,
2898 				       EFI_OPEN_PROTOCOL_GET_PROTOCOL));
2899 	if (r != EFI_SUCCESS)
2900 		goto out;
2901 	/* Remove the children */
2902 	if (number_of_children) {
2903 		r = EFI_CALL(binding_protocol->stop(binding_protocol,
2904 						    controller_handle,
2905 						    number_of_children,
2906 						    child_handle_buffer));
2907 		if (r == EFI_SUCCESS)
2908 			++stop_count;
2909 	}
2910 	/* Remove the driver */
2911 	if (!child_handle)
2912 		r = EFI_CALL(binding_protocol->stop(binding_protocol,
2913 						    controller_handle,
2914 						    0, NULL));
2915 	if (r == EFI_SUCCESS)
2916 		++stop_count;
2917 	EFI_CALL(efi_close_protocol(driver_image_handle,
2918 				    &efi_guid_driver_binding_protocol,
2919 				    driver_image_handle, NULL));
2920 
2921 	if (stop_count)
2922 		r = EFI_SUCCESS;
2923 	else
2924 		r = EFI_NOT_FOUND;
2925 out:
2926 	if (!child_handle)
2927 		free(child_handle_buffer);
2928 	return EFI_EXIT(r);
2929 }
2930 
2931 static const struct efi_boot_services efi_boot_services = {
2932 	.hdr = {
2933 		.headersize = sizeof(struct efi_table_hdr),
2934 	},
2935 	.raise_tpl = efi_raise_tpl,
2936 	.restore_tpl = efi_restore_tpl,
2937 	.allocate_pages = efi_allocate_pages_ext,
2938 	.free_pages = efi_free_pages_ext,
2939 	.get_memory_map = efi_get_memory_map_ext,
2940 	.allocate_pool = efi_allocate_pool_ext,
2941 	.free_pool = efi_free_pool_ext,
2942 	.create_event = efi_create_event_ext,
2943 	.set_timer = efi_set_timer_ext,
2944 	.wait_for_event = efi_wait_for_event,
2945 	.signal_event = efi_signal_event_ext,
2946 	.close_event = efi_close_event,
2947 	.check_event = efi_check_event,
2948 	.install_protocol_interface = efi_install_protocol_interface,
2949 	.reinstall_protocol_interface = efi_reinstall_protocol_interface,
2950 	.uninstall_protocol_interface = efi_uninstall_protocol_interface,
2951 	.handle_protocol = efi_handle_protocol,
2952 	.reserved = NULL,
2953 	.register_protocol_notify = efi_register_protocol_notify,
2954 	.locate_handle = efi_locate_handle_ext,
2955 	.locate_device_path = efi_locate_device_path,
2956 	.install_configuration_table = efi_install_configuration_table_ext,
2957 	.load_image = efi_load_image,
2958 	.start_image = efi_start_image,
2959 	.exit = efi_exit,
2960 	.unload_image = efi_unload_image,
2961 	.exit_boot_services = efi_exit_boot_services,
2962 	.get_next_monotonic_count = efi_get_next_monotonic_count,
2963 	.stall = efi_stall,
2964 	.set_watchdog_timer = efi_set_watchdog_timer,
2965 	.connect_controller = efi_connect_controller,
2966 	.disconnect_controller = efi_disconnect_controller,
2967 	.open_protocol = efi_open_protocol,
2968 	.close_protocol = efi_close_protocol,
2969 	.open_protocol_information = efi_open_protocol_information,
2970 	.protocols_per_handle = efi_protocols_per_handle,
2971 	.locate_handle_buffer = efi_locate_handle_buffer,
2972 	.locate_protocol = efi_locate_protocol,
2973 	.install_multiple_protocol_interfaces =
2974 			efi_install_multiple_protocol_interfaces,
2975 	.uninstall_multiple_protocol_interfaces =
2976 			efi_uninstall_multiple_protocol_interfaces,
2977 	.calculate_crc32 = efi_calculate_crc32,
2978 	.copy_mem = efi_copy_mem,
2979 	.set_mem = efi_set_mem,
2980 	.create_event_ex = efi_create_event_ex,
2981 };
2982 
2983 static uint16_t __efi_runtime_data firmware_vendor[] = L"Das U-Boot";
2984 
2985 struct efi_system_table __efi_runtime_data systab = {
2986 	.hdr = {
2987 		.signature = EFI_SYSTEM_TABLE_SIGNATURE,
2988 		.revision = 2 << 16 | 70, /* 2.7 */
2989 		.headersize = sizeof(struct efi_table_hdr),
2990 	},
2991 	.fw_vendor = (long)firmware_vendor,
2992 	.con_in = (void *)&efi_con_in,
2993 	.con_out = (void *)&efi_con_out,
2994 	.std_err = (void *)&efi_con_out,
2995 	.runtime = (void *)&efi_runtime_services,
2996 	.boottime = (void *)&efi_boot_services,
2997 	.nr_tables = 0,
2998 	.tables = (void *)efi_conf_table,
2999 };
3000