From patchwork Mon Dec 6 14:18:42 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jan Beulich X-Patchwork-Id: 12658559 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 5F35FC433EF for ; Mon, 6 Dec 2021 14:19:04 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.239065.414364 (Exim 4.92) (envelope-from ) id 1muEpN-0006rF-Nl; Mon, 06 Dec 2021 14:18:49 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 239065.414364; Mon, 06 Dec 2021 14:18:49 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1muEpN-0006r6-KO; Mon, 06 Dec 2021 14:18:49 +0000 Received: by outflank-mailman (input) for mailman id 239065; Mon, 06 Dec 2021 14:18:48 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1muEpM-0004et-GJ for xen-devel@lists.xenproject.org; Mon, 06 Dec 2021 14:18:48 +0000 Received: from de-smtp-delivery-102.mimecast.com (de-smtp-delivery-102.mimecast.com [194.104.109.102]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 6d26117a-569f-11ec-a5e1-b9374ead2679; Mon, 06 Dec 2021 15:18:47 +0100 (CET) Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-vi1eur04lp2058.outbound.protection.outlook.com [104.47.14.58]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id de-mta-35-d0_4mdOCNhGb3VwROfVe9g-1; Mon, 06 Dec 2021 15:18:46 +0100 Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16) by VI1PR0401MB2333.eurprd04.prod.outlook.com (2603:10a6:800:28::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4755.21; Mon, 6 Dec 2021 14:18:44 +0000 Received: from VI1PR04MB5600.eurprd04.prod.outlook.com ([fe80::5951:a489:1cf0:19fe]) by VI1PR04MB5600.eurprd04.prod.outlook.com ([fe80::5951:a489:1cf0:19fe%6]) with mapi id 15.20.4755.021; Mon, 6 Dec 2021 14:18:44 +0000 Received: from [10.156.60.236] (37.24.206.209) by AM6P193CA0040.EURP193.PROD.OUTLOOK.COM (2603:10a6:209:8e::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4755.17 via Frontend Transport; Mon, 6 Dec 2021 14:18:43 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 6d26117a-569f-11ec-a5e1-b9374ead2679 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619; t=1638800327; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=EUZmArQIIQmbBqFpDtIyWDFCexGoWWvsGI0iICXtIpk=; b=NEOoqzDVdLBcFShl3f3b86XclGBMqTVisffNRFPgJHDPxjBs6i1Q4yPdxwBN5SBZUagbBv DInkDNMqnnO5yTqw9CcRDjD69FLoSakPtJJQ3zd7Ih9TLsiPobrAOHME6DCfUcyJ/+DspS XiIGXsygN6sPR07myONRrlrwMmgD/yI= X-MC-Unique: d0_4mdOCNhGb3VwROfVe9g-1 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=m5ekcXEZMaAJPtHRN8ZmvFY1+ZSsJcDxTyOs4Vm0ukkrzPmxnXA5WViPw8sO992hPVS0bJ6m6ghSIg3J0tumDxO17M222No93K6ITJevNJwo+UW/jIWNusC/aiZpiX0AMsmMHtQfk5uqW8jfu7CyllXO3+fzugI+xWXFux7HGGY85Y1X04oB3R1CafS/PgTH86EZHBUZctyIsD3XvgI5TIHphqB/htkWcvFfToX4jO39ENgoPjbxyDWZlCpCQgkyR6EQmwMQ+l7aE/UEVwSiCP0X/S8wyAoPQ6P0d1V7HJJlYElW2fJ8/AN2RyuXdgC4OBssmoBAxwpNyPxWSIsvrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=EUZmArQIIQmbBqFpDtIyWDFCexGoWWvsGI0iICXtIpk=; b=clqfn6WVdhoqMsRS01FC6buM0UkJb5Hj+ozOyQRFcy76k9p4agpYcFlLfylaEfdILU8skhVM6L2HMUaBgZx18o53gP63O4ym9OkdHCY2kG4UHWWhP1FKkKRtYGHQxo7X2c+Hbg7JVqUs634XBdF4Ni9Vp6EvzRQcpPhIBxv9CTLgKFasCNS67PaoulhH8t5+uOlRHEeYVjMBYrdiy5qR6pEl7OCjGa4Kwuk5zG3/Zx6d0uQyACpxIQOWTRuBWzbaQhiVycjV9rCfZhNZ7vPw28pU5GFHmgEhUzCOzLPrQ55AQ9RYn1OGS5dDzI1QjrJVwuyhTxXdAV7yB2Bi1lmhmg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com; Message-ID: Date: Mon, 6 Dec 2021 15:18:42 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.3.2 Subject: [PATCH v3 3/7] x86/EFI: retrieve EDID Content-Language: en-US From: Jan Beulich To: "xen-devel@lists.xenproject.org" Cc: =?utf-8?q?Roger_Pau_Monn=C3=A9?= , Andrew Cooper , George Dunlap , Ian Jackson , Julien Grall , Stefano Stabellini , Wei Liu References: <4af7ce92-8f4b-0be2-2439-a1bfaff59be6@suse.com> In-Reply-To: <4af7ce92-8f4b-0be2-2439-a1bfaff59be6@suse.com> X-ClientProxiedBy: AM6P193CA0040.EURP193.PROD.OUTLOOK.COM (2603:10a6:209:8e::17) To VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 8080d6ca-4ac1-4a91-c166-08d9b8c34f67 X-MS-TrafficTypeDiagnostic: VI1PR0401MB2333:EE_ X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:5516; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 2/if1WGU39mV9KB/HN+Rq7oGgjng2MyLWQs9czmiezqWDZo5pcEySYragH3zJHGt1DkYzc2loF2Uy6PX4Gxtvg6TJTOE9gog+atVztIPTTp6nwWQCd7VcFRKRTV6V97stGnFcwgfX3QJQrfW3F4iLN6CCWt9zKeke36M05XGvROK17emJUvQvzbzMkviRkLLodnvOUCMNY1BcavsV+Zg6gT/JntBqkXb6GaffBu0OhVq2JKUA4iUifGseELTGFBNEYp5Ac8ajrpYMpY76ujSSPQM9Z4qg7dtOSSD3nzElxTEmhmSbnxTq7bPOHxMXeBMBcqGziRgO9goSW9yRqjmWnnAB7G0OIYXsCQ4NqryIUkLcG/4D8tF/l1eOvqhsvIUNkzcsiEg0mIFQUl8qRf1XeVF8JO+Sv1NLLyNMdqeyJsdRfFHkU7mON1YJ/eXYsi2tGmO/HLS/G66YWo9rM7PeAS8Mn4caMquntx5y2O7qTbNzjp1Av4mn5uJtSgDLMgb8lG/AJnO7PqY+KQ1xzWgDm156vvYGCGA2albsfLX+0wzka6nV0WRTPzwwJ6Ba4lTACZ6jsTQYMpItWRuy8x5j5czgzReeH51xJeYnsJdHIR6SyO1WALwLDpfpWfKe6kYXt0PGONXtJwMy4QHTP6X0WUndY+RhcVzUBBIm0eQ7tG8Uj0YjjUSkG0beY8z7jSURGdSnpmf49cjhLQIi9pgmYWpl6aUlMCpemycCWzTmGCwtKW1dLhYeO4/yOmkrN4N/lKJZeM3m5PgW4XuV3Drqg== X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(366004)(31686004)(54906003)(316002)(16576012)(86362001)(31696002)(66476007)(66556008)(66946007)(5660300002)(2906002)(508600001)(8936002)(4326008)(8676002)(186003)(6486002)(2616005)(956004)(83380400001)(38100700002)(6916009)(26005)(36756003)(21314003)(43740500002)(45980500001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?hl+ddV+ExcSBWLAjZA0moqqulVc4?= =?utf-8?q?GdgBirsd/gJwmX+PJYVgsunX2i3KxE9XaJcZ+LHMzqmXb5DDDiPQSbyFodrdWigy4?= =?utf-8?q?DOhZNpaD5seay+IvrN/V7q27WeeAYkTdUPmR6ufsBhctz/lNPJguXXR0+wN7lf6jb?= =?utf-8?q?c9B9mC7VNzqwoWQGl1FaB50ke2NEkJ/o4rLiJLZaUhdRowA9pqjyMlU3S+Vg4rAc5?= =?utf-8?q?AhdqVRhrewrC2R+XCPEepeKuG0bkKbFM7F45WGTbicv/EfqymVO3SgSbilOMdGdZR?= =?utf-8?q?XaRqTpZMjtzCzSNGn9MlbC5GCjdocQtKDoI/60VA8JwjxzPqEAaNDUNMTnmyW99g2?= =?utf-8?q?9iuVnvvxSJTeUI0HXFH6Jw0ocYKdC58GZTcSAxKpSHI9+ztwBLwyN+p+P0qhyN8DQ?= =?utf-8?q?IiIdgOUDSFNBlMIekSgLa9Y+eI1MFT8HY5Yn3ix9Jojj5iCJEBDXhNmHRv2ph2FaM?= =?utf-8?q?v9xXOmT2WZ/gRzpaqVxWeVmek1Ix4vX3AmaFFwY7prgtiyXQqblvktmSGou8vpXAj?= =?utf-8?q?RtX9QIaSxgjEvkfrFBLXxCMwn9XVqC9GPv6WWgfZacWoXCw+tjVXg/+3Cb8SwgvR6?= =?utf-8?q?ks+Wq4pZniE+FcloarB9eGum78BXOevbo1SgRb80Ad3r0XMfHycacauabt2CGA6l8?= =?utf-8?q?wMKN71nJV6bd/yupZW8q2OlMS7GGZ/SofSKZyoj5jkw+bIBwVNLXRg6mBLHJ3mXuk?= =?utf-8?q?r8B91dMHAM0UR+iDAUAVTV+h8kWslIT8T4wYyMhLwqzdRrnhc3HC/s9L7L+rZGyq3?= =?utf-8?q?d9vcQWUVsrgTbgEWsKETI7+J8F2BRpgamzClvzHwZQAXA7OEzPRLdyACZ3QzFHoSG?= =?utf-8?q?31RKKVvVYoPhOQJQ8UC85X6Z6WUh5NNgyAqGLBeizFWgBy4LyjA06r7qEOmkqH4Bm?= =?utf-8?q?lteCXbtD0MezfMxHkGuv4QtKSu2iZELs5pbO0L/JgjMMbCPtZR4835KfYakf+Gqa/?= =?utf-8?q?NwiKa/TtZovB5Tjt0KCnT9lp3pOGZQQMBFz1iytBr/pkPTRLXRILVPc9BPhJrnzMF?= =?utf-8?q?DUznTM7KwU1pJJuVRLqpS52rGTg436KiETwQn3i0udGlvhHk3YX+YTQHJG0QrxaTI?= =?utf-8?q?HDklUX9kFpP/4tVN/rMvJhtMxAA9NY2ZcoiimEG+tJpb/GyxdgLy+31ObQh2iOwPc?= =?utf-8?q?uz4UGQKWLZjZ1rKsC0f0vthU6bwiRtwqXZlLfqgpGZbEAQc9VtUX9pRAbS7DU2Ivv?= =?utf-8?q?lV1IT74euD7a6urBARfp/iz2QAC1DJZA2NRLhXIAz82shhaOcIugQ5tq9/4pRxpUd?= =?utf-8?q?2jZoe1DX7Qsev0s8iPueHF1SmzdDVvsoSyzKnp5TucbAq7js6pXcNMTJ99pdQ/V+B?= =?utf-8?q?Dy475PfzYXhOZrieM+1c2Wk7SL30mrS5hpduEz69QOj9kgZPBiaciRxOq671LgS+i?= =?utf-8?q?VqFyC7TkyC6g4ZnucbVB0mkmUJlseUH0WIl3fFVV6ywOOCNCkB0tLdp2boATzI2HX?= =?utf-8?q?mDzHUjTA6nMZKTdtufGjrxmJ7N2MJ/GD9GuDKzJoGrHlDZ7vz+erH5+QAsDJVSm7m?= =?utf-8?q?3lH9SGst4qkcFD+XVN/PaiEe15IyceHU9JHfACcxi4oL5AlfMLSf/VI=3D?= X-OriginatorOrg: suse.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8080d6ca-4ac1-4a91-c166-08d9b8c34f67 X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 06 Dec 2021 14:18:44.1308 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: HAcS2Zfq+1VztLiy0O2oaOz4xK+s022MuyrojzchNeS6+SMvnkNKcfeL8RJNO7eRRwv5VnGVcWeJkHGdigmKTw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0401MB2333 When booting directly from EFI, obtaining this information from EFI is the only possible way. And even when booting with a boot loader interposed, it's more clean not to use legacy BIOS calls for this purpose. (The downside being that there are no "capabilities" that we can retrieve the EFI way.) To achieve this we need to propagate the handle used to obtain the EFI_GRAPHICS_OUTPUT_PROTOCOL instance for further obtaining an EFI_EDID_*_PROTOCOL instance, which has been part of the spec since 2.5. Signed-off-by: Jan Beulich --- Setting boot_edid_caps to zero isn't desirable, but arbitrarily setting one or both of the two low bits also doesn't seem appropriate. GrUB also checks an "agp-internal-edid" variable. As I haven't been able to find any related documentation, and as GrUB being happy about the variable being any size (rather than at least / precisely 128 bytes), I didn't follow that route. --- v3: Re-base. v2: New. --- a/xen/arch/arm/efi/efi-boot.h +++ b/xen/arch/arm/efi/efi-boot.h @@ -478,6 +478,10 @@ static void __init efi_arch_edd(void) { } +static void __init efi_arch_edid(EFI_HANDLE gop_handle) +{ +} + static void __init efi_arch_memory_setup(void) { } --- a/xen/arch/x86/boot/video.S +++ b/xen/arch/x86/boot/video.S @@ -922,7 +922,14 @@ store_edid: pushw %dx pushw %di - cmpb $1, bootsym(opt_edid) # EDID disabled on cmdline (edid=no)? + movb bootsym(opt_edid), %al + cmpw $0x1313, bootsym(boot_edid_caps) # Data already retrieved? + je .Lcheck_edid + cmpb $2, %al # EDID forced on cmdline (edid=force)? + jne .Lno_edid + +.Lcheck_edid: + cmpb $1, %al # EDID disabled on cmdline (edid=no)? je .Lno_edid leaw vesa_glob_info, %di --- a/xen/arch/x86/efi/efi-boot.h +++ b/xen/arch/x86/efi/efi-boot.h @@ -568,6 +568,49 @@ static void __init efi_arch_video_init(E #endif } +#ifdef CONFIG_VIDEO +static bool __init copy_edid(const void *buf, unsigned int size) +{ + /* + * Be conservative - for both undersized and oversized blobs it is unclear + * what to actually do with them. The more that unlike the VESA BIOS + * interface we also have no associated "capabilities" value (which might + * carry a hint as to possible interpretation). + */ + if ( size != ARRAY_SIZE(boot_edid_info) ) + return false; + + memcpy(boot_edid_info, buf, size); + boot_edid_caps = 0; + + return true; +} +#endif + +static void __init efi_arch_edid(EFI_HANDLE gop_handle) +{ +#ifdef CONFIG_VIDEO + static EFI_GUID __initdata active_guid = EFI_EDID_ACTIVE_PROTOCOL_GUID; + static EFI_GUID __initdata discovered_guid = EFI_EDID_DISCOVERED_PROTOCOL_GUID; + EFI_EDID_ACTIVE_PROTOCOL *active_edid; + EFI_EDID_DISCOVERED_PROTOCOL *discovered_edid; + EFI_STATUS status; + + status = efi_bs->OpenProtocol(gop_handle, &active_guid, + (void **)&active_edid, efi_ih, NULL, + EFI_OPEN_PROTOCOL_GET_PROTOCOL); + if ( status == EFI_SUCCESS && + copy_edid(active_edid->Edid, active_edid->SizeOfEdid) ) + return; + + status = efi_bs->OpenProtocol(gop_handle, &discovered_guid, + (void **)&discovered_edid, efi_ih, NULL, + EFI_OPEN_PROTOCOL_GET_PROTOCOL); + if ( status == EFI_SUCCESS ) + copy_edid(discovered_edid->Edid, discovered_edid->SizeOfEdid); +#endif +} + static void __init efi_arch_memory_setup(void) { unsigned int i; @@ -729,6 +772,7 @@ static void __init efi_arch_flush_dcache void __init efi_multiboot2(EFI_HANDLE ImageHandle, EFI_SYSTEM_TABLE *SystemTable) { EFI_GRAPHICS_OUTPUT_PROTOCOL *gop; + EFI_HANDLE gop_handle; UINTN cols, gop_mode = ~0, rows; __set_bit(EFI_BOOT, &efi_flags); @@ -742,11 +786,15 @@ void __init efi_multiboot2(EFI_HANDLE Im &cols, &rows) == EFI_SUCCESS ) efi_arch_console_init(cols, rows); - gop = efi_get_gop(); + gop = efi_get_gop(&gop_handle); if ( gop ) + { gop_mode = efi_find_gop_mode(gop, 0, 0, 0); + efi_arch_edid(gop_handle); + } + efi_arch_edd(); efi_arch_cpu(); --- a/xen/common/efi/boot.c +++ b/xen/common/efi/boot.c @@ -118,7 +118,7 @@ static bool read_section(const EFI_LOADE static void efi_init(EFI_HANDLE ImageHandle, EFI_SYSTEM_TABLE *SystemTable); static void efi_console_set_mode(void); -static EFI_GRAPHICS_OUTPUT_PROTOCOL *efi_get_gop(void); +static EFI_GRAPHICS_OUTPUT_PROTOCOL *efi_get_gop(EFI_HANDLE *gop_handle); static UINTN efi_find_gop_mode(EFI_GRAPHICS_OUTPUT_PROTOCOL *gop, UINTN cols, UINTN rows, UINTN depth); static void efi_tables(void); @@ -758,7 +758,7 @@ static void __init efi_console_set_mode( StdOut->SetMode(StdOut, best); } -static EFI_GRAPHICS_OUTPUT_PROTOCOL __init *efi_get_gop(void) +static EFI_GRAPHICS_OUTPUT_PROTOCOL __init *efi_get_gop(EFI_HANDLE *gop_handle) { EFI_GRAPHICS_OUTPUT_MODE_INFORMATION *mode_info; EFI_GRAPHICS_OUTPUT_PROTOCOL *gop = NULL; @@ -783,7 +783,10 @@ static EFI_GRAPHICS_OUTPUT_PROTOCOL __in continue; status = gop->QueryMode(gop, gop->Mode->Mode, &info_size, &mode_info); if ( !EFI_ERROR(status) ) + { + *gop_handle = handles[i]; break; + } } if ( handles ) efi_bs->FreePool(handles); @@ -1216,6 +1219,7 @@ efi_start(EFI_HANDLE ImageHandle, EFI_SY if ( use_cfg_file ) { EFI_FILE_HANDLE dir_handle; + EFI_HANDLE gop_handle; UINTN depth, cols, rows, size; size = cols = rows = depth = 0; @@ -1224,7 +1228,7 @@ efi_start(EFI_HANDLE ImageHandle, EFI_SY &cols, &rows) == EFI_SUCCESS ) efi_arch_console_init(cols, rows); - gop = efi_get_gop(); + gop = efi_get_gop(&gop_handle); /* Get the file system interface. */ dir_handle = get_parent_handle(loaded_image, &file_name); @@ -1354,7 +1358,11 @@ efi_start(EFI_HANDLE ImageHandle, EFI_SY dir_handle->Close(dir_handle); if ( gop && !base_video ) + { gop_mode = efi_find_gop_mode(gop, cols, rows, depth); + + efi_arch_edid(gop_handle); + } } /* Get the number of boot modules specified on the DT or an error (<0) */ @@ -1381,7 +1389,6 @@ efi_start(EFI_HANDLE ImageHandle, EFI_SY efi_arch_edd(); - /* XXX Collect EDID info. */ efi_arch_cpu(); efi_tables(); --- a/xen/include/efi/efiprot.h +++ b/xen/include/efi/efiprot.h @@ -724,5 +724,52 @@ struct _EFI_GRAPHICS_OUTPUT_PROTOCOL { EFI_GRAPHICS_OUTPUT_PROTOCOL_BLT Blt; EFI_GRAPHICS_OUTPUT_PROTOCOL_MODE *Mode; }; + +/* + * EFI EDID Discovered Protocol + * UEFI Specification Version 2.5 Section 11.9 + */ +#define EFI_EDID_DISCOVERED_PROTOCOL_GUID \ + { 0x1C0C34F6, 0xD380, 0x41FA, { 0xA0, 0x49, 0x8a, 0xD0, 0x6C, 0x1A, 0x66, 0xAA} } + +typedef struct _EFI_EDID_DISCOVERED_PROTOCOL { + UINT32 SizeOfEdid; + UINT8 *Edid; +} EFI_EDID_DISCOVERED_PROTOCOL; + +/* + * EFI EDID Active Protocol + * UEFI Specification Version 2.5 Section 11.9 + */ +#define EFI_EDID_ACTIVE_PROTOCOL_GUID \ + { 0xBD8C1056, 0x9F36, 0x44EC, { 0x92, 0xA8, 0xA6, 0x33, 0x7F, 0x81, 0x79, 0x86} } + +typedef struct _EFI_EDID_ACTIVE_PROTOCOL { + UINT32 SizeOfEdid; + UINT8 *Edid; +} EFI_EDID_ACTIVE_PROTOCOL; + +/* + * EFI EDID Override Protocol + * UEFI Specification Version 2.5 Section 11.9 + */ +#define EFI_EDID_OVERRIDE_PROTOCOL_GUID \ + { 0x48ECB431, 0xFB72, 0x45C0, { 0xA9, 0x22, 0xF4, 0x58, 0xFE, 0x04, 0x0B, 0xD5} } + +INTERFACE_DECL(_EFI_EDID_OVERRIDE_PROTOCOL); + +typedef +EFI_STATUS +(EFIAPI *EFI_EDID_OVERRIDE_PROTOCOL_GET_EDID) ( + IN struct _EFI_EDID_OVERRIDE_PROTOCOL *This, + IN EFI_HANDLE *ChildHandle, + OUT UINT32 *Attributes, + IN OUT UINTN *EdidSize, + IN OUT UINT8 **Edid); + +typedef struct _EFI_EDID_OVERRIDE_PROTOCOL { + EFI_EDID_OVERRIDE_PROTOCOL_GET_EDID GetEdid; +} EFI_EDID_OVERRIDE_PROTOCOL; + #endif