xref: /rk3399_rockchip-uboot/lib/efi_loader/efi_boottime.c (revision a95343b8d3db894681dd427bc60077abc891aecc)
1 /*
2  *  EFI application boot time services
3  *
4  *  Copyright (c) 2016 Alexander Graf
5  *
6  *  SPDX-License-Identifier:     GPL-2.0+
7  */
8 
9 #include <common.h>
10 #include <efi_loader.h>
11 #include <malloc.h>
12 #include <asm/global_data.h>
13 #include <libfdt_env.h>
14 #include <u-boot/crc.h>
15 #include <bootm.h>
16 #include <inttypes.h>
17 #include <watchdog.h>
18 
19 DECLARE_GLOBAL_DATA_PTR;
20 
21 /* This list contains all the EFI objects our payload has access to */
22 LIST_HEAD(efi_obj_list);
23 
24 /*
25  * If we're running on nasty systems (32bit ARM booting into non-EFI Linux)
26  * we need to do trickery with caches. Since we don't want to break the EFI
27  * aware boot path, only apply hacks when loading exiting directly (breaking
28  * direct Linux EFI booting along the way - oh well).
29  */
30 static bool efi_is_direct_boot = true;
31 
32 /*
33  * EFI can pass arbitrary additional "tables" containing vendor specific
34  * information to the payload. One such table is the FDT table which contains
35  * a pointer to a flattened device tree blob.
36  *
37  * In most cases we want to pass an FDT to the payload, so reserve one slot of
38  * config table space for it. The pointer gets populated by do_bootefi_exec().
39  */
40 static struct efi_configuration_table __efi_runtime_data efi_conf_table[2];
41 
42 #ifdef CONFIG_ARM
43 /*
44  * The "gd" pointer lives in a register on ARM and AArch64 that we declare
45  * fixed when compiling U-Boot. However, the payload does not know about that
46  * restriction so we need to manually swap its and our view of that register on
47  * EFI callback entry/exit.
48  */
49 static volatile void *efi_gd, *app_gd;
50 #endif
51 
52 /* Called from do_bootefi_exec() */
53 void efi_save_gd(void)
54 {
55 #ifdef CONFIG_ARM
56 	efi_gd = gd;
57 #endif
58 }
59 
60 /* Called on every callback entry */
61 void efi_restore_gd(void)
62 {
63 #ifdef CONFIG_ARM
64 	/* Only restore if we're already in EFI context */
65 	if (!efi_gd)
66 		return;
67 
68 	if (gd != efi_gd)
69 		app_gd = gd;
70 	gd = efi_gd;
71 #endif
72 }
73 
74 /* Called on every callback exit */
75 efi_status_t efi_exit_func(efi_status_t ret)
76 {
77 #ifdef CONFIG_ARM
78 	gd = app_gd;
79 #endif
80 
81 	return ret;
82 }
83 
84 static efi_status_t efi_unsupported(const char *funcname)
85 {
86 	debug("EFI: App called into unimplemented function %s\n", funcname);
87 	return EFI_EXIT(EFI_UNSUPPORTED);
88 }
89 
90 static int guidcmp(const efi_guid_t *g1, const efi_guid_t *g2)
91 {
92 	return memcmp(g1, g2, sizeof(efi_guid_t));
93 }
94 
95 static unsigned long EFIAPI efi_raise_tpl(unsigned long new_tpl)
96 {
97 	EFI_ENTRY("0x%lx", new_tpl);
98 	return EFI_EXIT(0);
99 }
100 
101 static void EFIAPI efi_restore_tpl(unsigned long old_tpl)
102 {
103 	EFI_ENTRY("0x%lx", old_tpl);
104 	EFI_EXIT(efi_unsupported(__func__));
105 }
106 
107 efi_status_t EFIAPI efi_allocate_pages_ext(int type, int memory_type,
108 					   unsigned long pages,
109 					   uint64_t *memory)
110 {
111 	efi_status_t r;
112 
113 	EFI_ENTRY("%d, %d, 0x%lx, %p", type, memory_type, pages, memory);
114 	r = efi_allocate_pages(type, memory_type, pages, memory);
115 	return EFI_EXIT(r);
116 }
117 
118 efi_status_t EFIAPI efi_free_pages_ext(uint64_t memory, unsigned long pages)
119 {
120 	efi_status_t r;
121 
122 	EFI_ENTRY("%"PRIx64", 0x%lx", memory, pages);
123 	r = efi_free_pages(memory, pages);
124 	return EFI_EXIT(r);
125 }
126 
127 efi_status_t EFIAPI efi_get_memory_map_ext(unsigned long *memory_map_size,
128 					   struct efi_mem_desc *memory_map,
129 					   unsigned long *map_key,
130 					   unsigned long *descriptor_size,
131 					   uint32_t *descriptor_version)
132 {
133 	efi_status_t r;
134 
135 	EFI_ENTRY("%p, %p, %p, %p, %p", memory_map_size, memory_map,
136 		  map_key, descriptor_size, descriptor_version);
137 	r = efi_get_memory_map(memory_map_size, memory_map, map_key,
138 			       descriptor_size, descriptor_version);
139 	return EFI_EXIT(r);
140 }
141 
142 static efi_status_t EFIAPI efi_allocate_pool_ext(int pool_type,
143 						 unsigned long size,
144 						 void **buffer)
145 {
146 	efi_status_t r;
147 
148 	EFI_ENTRY("%d, %ld, %p", pool_type, size, buffer);
149 	r = efi_allocate_pool(pool_type, size, buffer);
150 	return EFI_EXIT(r);
151 }
152 
153 static efi_status_t EFIAPI efi_free_pool_ext(void *buffer)
154 {
155 	efi_status_t r;
156 
157 	EFI_ENTRY("%p", buffer);
158 	r = efi_free_pool(buffer);
159 	return EFI_EXIT(r);
160 }
161 
162 /*
163  * Our event capabilities are very limited. Only support a single
164  * event to exist, so we don't need to maintain lists.
165  */
166 static struct {
167 	enum efi_event_type type;
168 	u32 trigger_type;
169 	u32 trigger_time;
170 	u64 trigger_next;
171 	unsigned long notify_tpl;
172 	void (EFIAPI *notify_function) (void *event, void *context);
173 	void *notify_context;
174 } efi_event = {
175 	/* Disable timers on bootup */
176 	.trigger_next = -1ULL,
177 };
178 
179 static efi_status_t EFIAPI efi_create_event(
180 			enum efi_event_type type, ulong notify_tpl,
181 			void (EFIAPI *notify_function) (void *event,
182 							void *context),
183 			void *notify_context, void **event)
184 {
185 	EFI_ENTRY("%d, 0x%lx, %p, %p", type, notify_tpl, notify_function,
186 		  notify_context);
187 	if (efi_event.notify_function) {
188 		/* We only support one event at a time */
189 		return EFI_EXIT(EFI_OUT_OF_RESOURCES);
190 	}
191 
192 	if (event == NULL)
193 		return EFI_EXIT(EFI_INVALID_PARAMETER);
194 
195 	if ((type & EVT_NOTIFY_SIGNAL) && (type & EVT_NOTIFY_WAIT))
196 		return EFI_EXIT(EFI_INVALID_PARAMETER);
197 
198 	if ((type & (EVT_NOTIFY_SIGNAL|EVT_NOTIFY_WAIT)) &&
199 	    notify_function == NULL)
200 		return EFI_EXIT(EFI_INVALID_PARAMETER);
201 
202 	efi_event.type = type;
203 	efi_event.notify_tpl = notify_tpl;
204 	efi_event.notify_function = notify_function;
205 	efi_event.notify_context = notify_context;
206 	*event = &efi_event;
207 
208 	return EFI_EXIT(EFI_SUCCESS);
209 }
210 
211 /*
212  * Our timers have to work without interrupts, so we check whenever keyboard
213  * input or disk accesses happen if enough time elapsed for it to fire.
214  */
215 void efi_timer_check(void)
216 {
217 	u64 now = timer_get_us();
218 
219 	if (now >= efi_event.trigger_next) {
220 		/* Triggering! */
221 		if (efi_event.trigger_type == EFI_TIMER_PERIODIC)
222 			efi_event.trigger_next += efi_event.trigger_time / 10;
223 		if (efi_event.type & (EVT_NOTIFY_WAIT | EVT_NOTIFY_SIGNAL))
224 			efi_event.notify_function(&efi_event,
225 			                          efi_event.notify_context);
226 	}
227 
228 	WATCHDOG_RESET();
229 }
230 
231 static efi_status_t EFIAPI efi_set_timer(void *event, int type,
232 					 uint64_t trigger_time)
233 {
234 	/* We don't have 64bit division available everywhere, so limit timer
235 	 * distances to 32bit bits. */
236 	u32 trigger32 = trigger_time;
237 
238 	EFI_ENTRY("%p, %d, %"PRIx64, event, type, trigger_time);
239 
240 	if (trigger32 < trigger_time) {
241 		printf("WARNING: Truncating timer from %"PRIx64" to %x\n",
242 		       trigger_time, trigger32);
243 	}
244 
245 	if (event != &efi_event) {
246 		/* We only support one event at a time */
247 		return EFI_EXIT(EFI_INVALID_PARAMETER);
248 	}
249 
250 	switch (type) {
251 	case EFI_TIMER_STOP:
252 		efi_event.trigger_next = -1ULL;
253 		break;
254 	case EFI_TIMER_PERIODIC:
255 	case EFI_TIMER_RELATIVE:
256 		efi_event.trigger_next = timer_get_us() + (trigger32 / 10);
257 		break;
258 	default:
259 		return EFI_EXIT(EFI_INVALID_PARAMETER);
260 	}
261 	efi_event.trigger_type = type;
262 	efi_event.trigger_time = trigger_time;
263 
264 	return EFI_EXIT(EFI_SUCCESS);
265 }
266 
267 static efi_status_t EFIAPI efi_wait_for_event(unsigned long num_events,
268 					      void *event, unsigned long *index)
269 {
270 	u64 now;
271 
272 	EFI_ENTRY("%ld, %p, %p", num_events, event, index);
273 
274 	now = timer_get_us();
275 	while (now < efi_event.trigger_next) { }
276 	efi_timer_check();
277 
278 	return EFI_EXIT(EFI_SUCCESS);
279 }
280 
281 static efi_status_t EFIAPI efi_signal_event(void *event)
282 {
283 	EFI_ENTRY("%p", event);
284 	return EFI_EXIT(EFI_SUCCESS);
285 }
286 
287 static efi_status_t EFIAPI efi_close_event(void *event)
288 {
289 	EFI_ENTRY("%p", event);
290 	efi_event.trigger_next = -1ULL;
291 	return EFI_EXIT(EFI_SUCCESS);
292 }
293 
294 static efi_status_t EFIAPI efi_check_event(void *event)
295 {
296 	EFI_ENTRY("%p", event);
297 	return EFI_EXIT(EFI_NOT_READY);
298 }
299 
300 static efi_status_t EFIAPI efi_install_protocol_interface(void **handle,
301 			efi_guid_t *protocol, int protocol_interface_type,
302 			void *protocol_interface)
303 {
304 	EFI_ENTRY("%p, %p, %d, %p", handle, protocol, protocol_interface_type,
305 		  protocol_interface);
306 	return EFI_EXIT(EFI_OUT_OF_RESOURCES);
307 }
308 static efi_status_t EFIAPI efi_reinstall_protocol_interface(void *handle,
309 			efi_guid_t *protocol, void *old_interface,
310 			void *new_interface)
311 {
312 	EFI_ENTRY("%p, %p, %p, %p", handle, protocol, old_interface,
313 		  new_interface);
314 	return EFI_EXIT(EFI_ACCESS_DENIED);
315 }
316 
317 static efi_status_t EFIAPI efi_uninstall_protocol_interface(void *handle,
318 			efi_guid_t *protocol, void *protocol_interface)
319 {
320 	EFI_ENTRY("%p, %p, %p", handle, protocol, protocol_interface);
321 	return EFI_EXIT(EFI_NOT_FOUND);
322 }
323 
324 static efi_status_t EFIAPI efi_register_protocol_notify(efi_guid_t *protocol,
325 							void *event,
326 							void **registration)
327 {
328 	EFI_ENTRY("%p, %p, %p", protocol, event, registration);
329 	return EFI_EXIT(EFI_OUT_OF_RESOURCES);
330 }
331 
332 static int efi_search(enum efi_locate_search_type search_type,
333 		      efi_guid_t *protocol, void *search_key,
334 		      struct efi_object *efiobj)
335 {
336 	int i;
337 
338 	switch (search_type) {
339 	case all_handles:
340 		return 0;
341 	case by_register_notify:
342 		return -1;
343 	case by_protocol:
344 		for (i = 0; i < ARRAY_SIZE(efiobj->protocols); i++) {
345 			const efi_guid_t *guid = efiobj->protocols[i].guid;
346 			if (guid && !guidcmp(guid, protocol))
347 				return 0;
348 		}
349 		return -1;
350 	}
351 
352 	return -1;
353 }
354 
355 static efi_status_t EFIAPI efi_locate_handle(
356 			enum efi_locate_search_type search_type,
357 			efi_guid_t *protocol, void *search_key,
358 			unsigned long *buffer_size, efi_handle_t *buffer)
359 {
360 	struct list_head *lhandle;
361 	unsigned long size = 0;
362 
363 	EFI_ENTRY("%d, %p, %p, %p, %p", search_type, protocol, search_key,
364 		  buffer_size, buffer);
365 
366 	/* Count how much space we need */
367 	list_for_each(lhandle, &efi_obj_list) {
368 		struct efi_object *efiobj;
369 		efiobj = list_entry(lhandle, struct efi_object, link);
370 		if (!efi_search(search_type, protocol, search_key, efiobj)) {
371 			size += sizeof(void*);
372 		}
373 	}
374 
375 	if (*buffer_size < size) {
376 		*buffer_size = size;
377 		return EFI_EXIT(EFI_BUFFER_TOO_SMALL);
378 	}
379 
380 	/* Then fill the array */
381 	list_for_each(lhandle, &efi_obj_list) {
382 		struct efi_object *efiobj;
383 		efiobj = list_entry(lhandle, struct efi_object, link);
384 		if (!efi_search(search_type, protocol, search_key, efiobj)) {
385 			*(buffer++) = efiobj->handle;
386 		}
387 	}
388 
389 	*buffer_size = size;
390 	return EFI_EXIT(EFI_SUCCESS);
391 }
392 
393 static efi_status_t EFIAPI efi_locate_device_path(efi_guid_t *protocol,
394 			struct efi_device_path **device_path,
395 			efi_handle_t *device)
396 {
397 	EFI_ENTRY("%p, %p, %p", protocol, device_path, device);
398 	return EFI_EXIT(EFI_NOT_FOUND);
399 }
400 
401 efi_status_t efi_install_configuration_table(const efi_guid_t *guid, void *table)
402 {
403 	int i;
404 
405 	/* Check for guid override */
406 	for (i = 0; i < systab.nr_tables; i++) {
407 		if (!guidcmp(guid, &efi_conf_table[i].guid)) {
408 			efi_conf_table[i].table = table;
409 			return EFI_SUCCESS;
410 		}
411 	}
412 
413 	/* No override, check for overflow */
414 	if (i >= ARRAY_SIZE(efi_conf_table))
415 		return EFI_OUT_OF_RESOURCES;
416 
417 	/* Add a new entry */
418 	memcpy(&efi_conf_table[i].guid, guid, sizeof(*guid));
419 	efi_conf_table[i].table = table;
420 	systab.nr_tables = i + 1;
421 
422 	return EFI_SUCCESS;
423 }
424 
425 static efi_status_t EFIAPI efi_install_configuration_table_ext(efi_guid_t *guid,
426 							       void *table)
427 {
428 	EFI_ENTRY("%p, %p", guid, table);
429 	return EFI_EXIT(efi_install_configuration_table(guid, table));
430 }
431 
432 static efi_status_t EFIAPI efi_load_image(bool boot_policy,
433 					  efi_handle_t parent_image,
434 					  struct efi_device_path *file_path,
435 					  void *source_buffer,
436 					  unsigned long source_size,
437 					  efi_handle_t *image_handle)
438 {
439 	static struct efi_object loaded_image_info_obj = {
440 		.protocols = {
441 			{
442 				.guid = &efi_guid_loaded_image,
443 				.open = &efi_return_handle,
444 			},
445 		},
446 	};
447 	struct efi_loaded_image *info;
448 	struct efi_object *obj;
449 
450 	EFI_ENTRY("%d, %p, %p, %p, %ld, %p", boot_policy, parent_image,
451 		  file_path, source_buffer, source_size, image_handle);
452 	info = malloc(sizeof(*info));
453 	obj = malloc(sizeof(loaded_image_info_obj));
454 	memset(info, 0, sizeof(*info));
455 	memcpy(obj, &loaded_image_info_obj, sizeof(loaded_image_info_obj));
456 	obj->handle = info;
457 	info->file_path = file_path;
458 	info->reserved = efi_load_pe(source_buffer, info);
459 	if (!info->reserved) {
460 		free(info);
461 		free(obj);
462 		return EFI_EXIT(EFI_UNSUPPORTED);
463 	}
464 
465 	*image_handle = info;
466 	list_add_tail(&obj->link, &efi_obj_list);
467 
468 	return EFI_EXIT(EFI_SUCCESS);
469 }
470 
471 static efi_status_t EFIAPI efi_start_image(efi_handle_t image_handle,
472 					   unsigned long *exit_data_size,
473 					   s16 **exit_data)
474 {
475 	ulong (*entry)(void *image_handle, struct efi_system_table *st);
476 	struct efi_loaded_image *info = image_handle;
477 
478 	EFI_ENTRY("%p, %p, %p", image_handle, exit_data_size, exit_data);
479 	entry = info->reserved;
480 
481 	efi_is_direct_boot = false;
482 
483 	/* call the image! */
484 	if (setjmp(&info->exit_jmp)) {
485 		/* We returned from the child image */
486 		return EFI_EXIT(info->exit_status);
487 	}
488 
489 	entry(image_handle, &systab);
490 
491 	/* Should usually never get here */
492 	return EFI_EXIT(EFI_SUCCESS);
493 }
494 
495 static efi_status_t EFIAPI efi_exit(efi_handle_t image_handle,
496 			efi_status_t exit_status, unsigned long exit_data_size,
497 			int16_t *exit_data)
498 {
499 	struct efi_loaded_image *loaded_image_info = (void*)image_handle;
500 
501 	EFI_ENTRY("%p, %ld, %ld, %p", image_handle, exit_status,
502 		  exit_data_size, exit_data);
503 
504 	loaded_image_info->exit_status = exit_status;
505 	longjmp(&loaded_image_info->exit_jmp, 1);
506 
507 	panic("EFI application exited");
508 }
509 
510 static struct efi_object *efi_search_obj(void *handle)
511 {
512 	struct list_head *lhandle;
513 
514 	list_for_each(lhandle, &efi_obj_list) {
515 		struct efi_object *efiobj;
516 		efiobj = list_entry(lhandle, struct efi_object, link);
517 		if (efiobj->handle == handle)
518 			return efiobj;
519 	}
520 
521 	return NULL;
522 }
523 
524 static efi_status_t EFIAPI efi_unload_image(void *image_handle)
525 {
526 	struct efi_object *efiobj;
527 
528 	EFI_ENTRY("%p", image_handle);
529 	efiobj = efi_search_obj(image_handle);
530 	if (efiobj)
531 		list_del(&efiobj->link);
532 
533 	return EFI_EXIT(EFI_SUCCESS);
534 }
535 
536 static void efi_exit_caches(void)
537 {
538 #if defined(CONFIG_ARM) && !defined(CONFIG_ARM64)
539 	/*
540 	 * Grub on 32bit ARM needs to have caches disabled before jumping into
541 	 * a zImage, but does not know of all cache layers. Give it a hand.
542 	 */
543 	if (efi_is_direct_boot)
544 		cleanup_before_linux();
545 #endif
546 }
547 
548 static efi_status_t EFIAPI efi_exit_boot_services(void *image_handle,
549 						  unsigned long map_key)
550 {
551 	EFI_ENTRY("%p, %ld", image_handle, map_key);
552 
553 	board_quiesce_devices();
554 
555 	/* Fix up caches for EFI payloads if necessary */
556 	efi_exit_caches();
557 
558 	/* This stops all lingering devices */
559 	bootm_disable_interrupts();
560 
561 	/* Give the payload some time to boot */
562 	WATCHDOG_RESET();
563 
564 	return EFI_EXIT(EFI_SUCCESS);
565 }
566 
567 static efi_status_t EFIAPI efi_get_next_monotonic_count(uint64_t *count)
568 {
569 	static uint64_t mono = 0;
570 	EFI_ENTRY("%p", count);
571 	*count = mono++;
572 	return EFI_EXIT(EFI_SUCCESS);
573 }
574 
575 static efi_status_t EFIAPI efi_stall(unsigned long microseconds)
576 {
577 	EFI_ENTRY("%ld", microseconds);
578 	udelay(microseconds);
579 	return EFI_EXIT(EFI_SUCCESS);
580 }
581 
582 static efi_status_t EFIAPI efi_set_watchdog_timer(unsigned long timeout,
583 						  uint64_t watchdog_code,
584 						  unsigned long data_size,
585 						  uint16_t *watchdog_data)
586 {
587 	EFI_ENTRY("%ld, 0x%"PRIx64", %ld, %p", timeout, watchdog_code,
588 		  data_size, watchdog_data);
589 	return EFI_EXIT(efi_unsupported(__func__));
590 }
591 
592 static efi_status_t EFIAPI efi_connect_controller(
593 			efi_handle_t controller_handle,
594 			efi_handle_t *driver_image_handle,
595 			struct efi_device_path *remain_device_path,
596 			bool recursive)
597 {
598 	EFI_ENTRY("%p, %p, %p, %d", controller_handle, driver_image_handle,
599 		  remain_device_path, recursive);
600 	return EFI_EXIT(EFI_NOT_FOUND);
601 }
602 
603 static efi_status_t EFIAPI efi_disconnect_controller(void *controller_handle,
604 						     void *driver_image_handle,
605 						     void *child_handle)
606 {
607 	EFI_ENTRY("%p, %p, %p", controller_handle, driver_image_handle,
608 		  child_handle);
609 	return EFI_EXIT(EFI_INVALID_PARAMETER);
610 }
611 
612 static efi_status_t EFIAPI efi_close_protocol(void *handle,
613 					      efi_guid_t *protocol,
614 					      void *agent_handle,
615 					      void *controller_handle)
616 {
617 	EFI_ENTRY("%p, %p, %p, %p", handle, protocol, agent_handle,
618 		  controller_handle);
619 	return EFI_EXIT(EFI_NOT_FOUND);
620 }
621 
622 static efi_status_t EFIAPI efi_open_protocol_information(efi_handle_t handle,
623 			efi_guid_t *protocol,
624 			struct efi_open_protocol_info_entry **entry_buffer,
625 			unsigned long *entry_count)
626 {
627 	EFI_ENTRY("%p, %p, %p, %p", handle, protocol, entry_buffer,
628 		  entry_count);
629 	return EFI_EXIT(EFI_NOT_FOUND);
630 }
631 
632 static efi_status_t EFIAPI efi_protocols_per_handle(void *handle,
633 			efi_guid_t ***protocol_buffer,
634 			unsigned long *protocol_buffer_count)
635 {
636 	EFI_ENTRY("%p, %p, %p", handle, protocol_buffer,
637 		  protocol_buffer_count);
638 	return EFI_EXIT(EFI_OUT_OF_RESOURCES);
639 }
640 
641 static efi_status_t EFIAPI efi_locate_handle_buffer(
642 			enum efi_locate_search_type search_type,
643 			efi_guid_t *protocol, void *search_key,
644 			unsigned long *no_handles, efi_handle_t **buffer)
645 {
646 	EFI_ENTRY("%d, %p, %p, %p, %p", search_type, protocol, search_key,
647 		  no_handles, buffer);
648 	return EFI_EXIT(EFI_NOT_FOUND);
649 }
650 
651 static struct efi_class_map efi_class_maps[] = {
652 	{
653 		.guid = &efi_guid_console_control,
654 		.interface = &efi_console_control
655 	},
656 };
657 
658 static efi_status_t EFIAPI efi_locate_protocol(efi_guid_t *protocol,
659 					       void *registration,
660 					       void **protocol_interface)
661 {
662 	int i;
663 
664 	EFI_ENTRY("%p, %p, %p", protocol, registration, protocol_interface);
665 	for (i = 0; i < ARRAY_SIZE(efi_class_maps); i++) {
666 		struct efi_class_map *curmap = &efi_class_maps[i];
667 		if (!guidcmp(protocol, curmap->guid)) {
668 			*protocol_interface = (void*)curmap->interface;
669 			return EFI_EXIT(EFI_SUCCESS);
670 		}
671 	}
672 
673 	return EFI_EXIT(EFI_NOT_FOUND);
674 }
675 
676 static efi_status_t EFIAPI efi_install_multiple_protocol_interfaces(
677 			void **handle, ...)
678 {
679 	EFI_ENTRY("%p", handle);
680 	return EFI_EXIT(EFI_OUT_OF_RESOURCES);
681 }
682 
683 static efi_status_t EFIAPI efi_uninstall_multiple_protocol_interfaces(
684 			void *handle, ...)
685 {
686 	EFI_ENTRY("%p", handle);
687 	return EFI_EXIT(EFI_INVALID_PARAMETER);
688 }
689 
690 static efi_status_t EFIAPI efi_calculate_crc32(void *data,
691 					       unsigned long data_size,
692 					       uint32_t *crc32_p)
693 {
694 	EFI_ENTRY("%p, %ld", data, data_size);
695 	*crc32_p = crc32(0, data, data_size);
696 	return EFI_EXIT(EFI_SUCCESS);
697 }
698 
699 static void EFIAPI efi_copy_mem(void *destination, void *source,
700 				unsigned long length)
701 {
702 	EFI_ENTRY("%p, %p, %ld", destination, source, length);
703 	memcpy(destination, source, length);
704 }
705 
706 static void EFIAPI efi_set_mem(void *buffer, unsigned long size, uint8_t value)
707 {
708 	EFI_ENTRY("%p, %ld, 0x%x", buffer, size, value);
709 	memset(buffer, value, size);
710 }
711 
712 static efi_status_t EFIAPI efi_open_protocol(
713 			void *handle, efi_guid_t *protocol,
714 			void **protocol_interface, void *agent_handle,
715 			void *controller_handle, uint32_t attributes)
716 {
717 	struct list_head *lhandle;
718 	int i;
719 	efi_status_t r = EFI_UNSUPPORTED;
720 
721 	EFI_ENTRY("%p, %p, %p, %p, %p, 0x%x", handle, protocol,
722 		  protocol_interface, agent_handle, controller_handle,
723 		  attributes);
724 	list_for_each(lhandle, &efi_obj_list) {
725 		struct efi_object *efiobj;
726 		efiobj = list_entry(lhandle, struct efi_object, link);
727 
728 		if (efiobj->handle != handle)
729 			continue;
730 
731 		for (i = 0; i < ARRAY_SIZE(efiobj->protocols); i++) {
732 			struct efi_handler *handler = &efiobj->protocols[i];
733 			const efi_guid_t *hprotocol = handler->guid;
734 			if (!hprotocol)
735 				break;
736 			if (!guidcmp(hprotocol, protocol)) {
737 				r = handler->open(handle, protocol,
738 				    protocol_interface, agent_handle,
739 				    controller_handle, attributes);
740 				goto out;
741 			}
742 		}
743 	}
744 
745 out:
746 	return EFI_EXIT(r);
747 }
748 
749 static efi_status_t EFIAPI efi_handle_protocol(void *handle,
750 					       efi_guid_t *protocol,
751 					       void **protocol_interface)
752 {
753 	return efi_open_protocol(handle, protocol, protocol_interface,
754 				 NULL, NULL, 0);
755 }
756 
757 static const struct efi_boot_services efi_boot_services = {
758 	.hdr = {
759 		.headersize = sizeof(struct efi_table_hdr),
760 	},
761 	.raise_tpl = efi_raise_tpl,
762 	.restore_tpl = efi_restore_tpl,
763 	.allocate_pages = efi_allocate_pages_ext,
764 	.free_pages = efi_free_pages_ext,
765 	.get_memory_map = efi_get_memory_map_ext,
766 	.allocate_pool = efi_allocate_pool_ext,
767 	.free_pool = efi_free_pool_ext,
768 	.create_event = efi_create_event,
769 	.set_timer = efi_set_timer,
770 	.wait_for_event = efi_wait_for_event,
771 	.signal_event = efi_signal_event,
772 	.close_event = efi_close_event,
773 	.check_event = efi_check_event,
774 	.install_protocol_interface = efi_install_protocol_interface,
775 	.reinstall_protocol_interface = efi_reinstall_protocol_interface,
776 	.uninstall_protocol_interface = efi_uninstall_protocol_interface,
777 	.handle_protocol = efi_handle_protocol,
778 	.reserved = NULL,
779 	.register_protocol_notify = efi_register_protocol_notify,
780 	.locate_handle = efi_locate_handle,
781 	.locate_device_path = efi_locate_device_path,
782 	.install_configuration_table = efi_install_configuration_table_ext,
783 	.load_image = efi_load_image,
784 	.start_image = efi_start_image,
785 	.exit = efi_exit,
786 	.unload_image = efi_unload_image,
787 	.exit_boot_services = efi_exit_boot_services,
788 	.get_next_monotonic_count = efi_get_next_monotonic_count,
789 	.stall = efi_stall,
790 	.set_watchdog_timer = efi_set_watchdog_timer,
791 	.connect_controller = efi_connect_controller,
792 	.disconnect_controller = efi_disconnect_controller,
793 	.open_protocol = efi_open_protocol,
794 	.close_protocol = efi_close_protocol,
795 	.open_protocol_information = efi_open_protocol_information,
796 	.protocols_per_handle = efi_protocols_per_handle,
797 	.locate_handle_buffer = efi_locate_handle_buffer,
798 	.locate_protocol = efi_locate_protocol,
799 	.install_multiple_protocol_interfaces = efi_install_multiple_protocol_interfaces,
800 	.uninstall_multiple_protocol_interfaces = efi_uninstall_multiple_protocol_interfaces,
801 	.calculate_crc32 = efi_calculate_crc32,
802 	.copy_mem = efi_copy_mem,
803 	.set_mem = efi_set_mem,
804 };
805 
806 
807 static uint16_t __efi_runtime_data firmware_vendor[] =
808 	{ 'D','a','s',' ','U','-','b','o','o','t',0 };
809 
810 struct efi_system_table __efi_runtime_data systab = {
811 	.hdr = {
812 		.signature = EFI_SYSTEM_TABLE_SIGNATURE,
813 		.revision = 0x20005, /* 2.5 */
814 		.headersize = sizeof(struct efi_table_hdr),
815 	},
816 	.fw_vendor = (long)firmware_vendor,
817 	.con_in = (void*)&efi_con_in,
818 	.con_out = (void*)&efi_con_out,
819 	.std_err = (void*)&efi_con_out,
820 	.runtime = (void*)&efi_runtime_services,
821 	.boottime = (void*)&efi_boot_services,
822 	.nr_tables = 0,
823 	.tables = (void*)efi_conf_table,
824 };
825