Newer
Older
/*
* EFI application boot time services
*
* Copyright (c) 2016 Alexander Graf
*
* SPDX-License-Identifier: GPL-2.0+
*/
#include <common.h>
#include <malloc.h>
#include <asm/global_data.h>
#include <libfdt_env.h>
#include <u-boot/crc.h>
#include <bootm.h>
#include <inttypes.h>
#include <watchdog.h>
DECLARE_GLOBAL_DATA_PTR;
/* Task priority level */
static efi_uintn_t efi_tpl = TPL_APPLICATION;
/* This list contains all the EFI objects our payload has access to */
LIST_HEAD(efi_obj_list);
/*
* If we're running on nasty systems (32bit ARM booting into non-EFI Linux)
* we need to do trickery with caches. Since we don't want to break the EFI
* aware boot path, only apply hacks when loading exiting directly (breaking
* direct Linux EFI booting along the way - oh well).
*/
static bool efi_is_direct_boot = true;
/*
* EFI can pass arbitrary additional "tables" containing vendor specific
* information to the payload. One such table is the FDT table which contains
* a pointer to a flattened device tree blob.
*
* In most cases we want to pass an FDT to the payload, so reserve one slot of
* config table space for it. The pointer gets populated by do_bootefi_exec().
*/
static struct efi_configuration_table __efi_runtime_data efi_conf_table[2];
/*
* The "gd" pointer lives in a register on ARM and AArch64 that we declare
* fixed when compiling U-Boot. However, the payload does not know about that
* restriction so we need to manually swap its and our view of that register on
* EFI callback entry/exit.
*/
static volatile void *efi_gd, *app_gd;
static int entry_count;
static int nesting_level;
/* Called on every callback entry */
int __efi_entry_check(void)
{
int ret = entry_count++ == 0;
#ifdef CONFIG_ARM
assert(efi_gd);
app_gd = gd;
gd = efi_gd;
#endif
return ret;
}
/* Called on every callback exit */
int __efi_exit_check(void)
{
int ret = --entry_count == 0;
#ifdef CONFIG_ARM
gd = app_gd;
#endif
return ret;
}
/* Called from do_bootefi_exec() */
void efi_save_gd(void)
{
/*
* Special case handler for error/abort that just forces things back
* to u-boot world so we can dump out an abort msg, without any care
* about returning back to UEFI world.
*/
/* Only restore if we're already in EFI context */
if (!efi_gd)
return;
gd = efi_gd;
/*
* Two spaces per indent level, maxing out at 10.. which ought to be
* enough for anyone ;-)
*/
static const char *indent_string(int level)
{
const char *indent = " ";
const int max = strlen(indent);
level = min(max, level * 2);
return &indent[max - level];
}
const char *__efi_nesting(void)
{
return indent_string(nesting_level);
}
const char *__efi_nesting_inc(void)
{
return indent_string(nesting_level++);
}
const char *__efi_nesting_dec(void)
{
return indent_string(--nesting_level);
}
/*
* Queue an EFI event.
*
* This function queues the notification function of the event for future
* execution.
*
* The notification function is called if the task priority level of the
* event is higher than the current task priority level.
*
* For the SignalEvent service see efi_signal_event_ext.
*
* @event event to signal
*/
void efi_signal_event(struct efi_event *event)
if (event->notify_function) {
event->is_queued = true;
/* Check TPL */
if (efi_tpl >= event->notify_tpl)
return;
EFI_CALL_VOID(event->notify_function(event,
event->notify_context));
event->is_queued = false;
/*
* Raise the task priority level.
*
* This function implements the RaiseTpl service.
* See the Unified Extensible Firmware Interface (UEFI) specification
* for details.
*
* @new_tpl new value of the task priority level
* @return old value of the task priority level
*/
static unsigned long EFIAPI efi_raise_tpl(efi_uintn_t new_tpl)
efi_uintn_t old_tpl = efi_tpl;
EFI_ENTRY("0x%zx", new_tpl);
if (new_tpl < efi_tpl)
debug("WARNING: new_tpl < current_tpl in %s\n", __func__);
efi_tpl = new_tpl;
if (efi_tpl > TPL_HIGH_LEVEL)
efi_tpl = TPL_HIGH_LEVEL;
EFI_EXIT(EFI_SUCCESS);
return old_tpl;
/*
* Lower the task priority level.
*
* This function implements the RestoreTpl service.
* See the Unified Extensible Firmware Interface (UEFI) specification
* for details.
*
* @old_tpl value of the task priority level to be restored
*/
static void EFIAPI efi_restore_tpl(efi_uintn_t old_tpl)
EFI_ENTRY("0x%zx", old_tpl);
if (old_tpl > efi_tpl)
debug("WARNING: old_tpl > current_tpl in %s\n", __func__);
efi_tpl = old_tpl;
if (efi_tpl > TPL_HIGH_LEVEL)
Loading
Loading full blame...