Lines Matching defs:capsule

3  * EFI capsule support.
33 * efi_capsule_pending - has a capsule been passed to the firmware?
34 * @reset_type: store the type of EFI reset if capsule is pending
36 * To ensure that the registered capsule is processed correctly by the
37 * firmware we need to perform a specific type of reset. If a capsule is
62 * Whitelist of EFI capsule flags that we support.
73 * efi_capsule_supported - does the firmware support the capsule?
74 * @guid: vendor guid of capsule
75 * @flags: capsule flags
76 * @size: size of capsule data
77 * @reset: the reset type required for this capsule
79 * Check whether a capsule with @flags is supported by the firmware
80 * and that @size doesn't exceed the maximum size for a capsule.
87 efi_capsule_header_t capsule;
88 efi_capsule_header_t *cap_list[] = { &capsule };
95 capsule.headersize = capsule.imagesize = sizeof(capsule);
96 memcpy(&capsule.guid, &guid, sizeof(efi_guid_t));
97 capsule.flags = flags;
127 * efi_capsule_update_locked - pass a single capsule to the firmware
128 * @capsule: capsule to send to the firmware
130 * @reset: the reset type required for @capsule
134 * set it and capsule_pending if a capsule was successfully sent to
142 efi_capsule_update_locked(efi_capsule_header_t *capsule,
151 * If someone has already registered a capsule that requires a
155 pr_err("Conflicting capsule reset type %d (%d).\n",
173 status = efi.update_capsule(&capsule, 1, sglist_phys);
183 * efi_capsule_update - send a capsule to the firmware
184 * @capsule: capsule to send to firmware
185 * @pages: an array of capsule data pages
187 * Build a scatter gather list with EFI capsule block descriptors to
188 * map the capsule described by @capsule with its data in @pages and
191 * @capsule must be a virtual mapping of the complete capsule update in the
192 * kernel address space, as the capsule can be consumed immediately.
193 * A capsule_header_t that describes the entire contents of the capsule
197 * the capsule guid, users will likely want to check that
201 * If the capsule is successfully submitted to the firmware, any
208 * pending capsule that has a reset type that conflicts with the one
209 * required by @capsule. Do NOT use efi_capsule_pending() to detect
210 * this conflict since that would be racy. Instead, submit the capsule
215 int efi_capsule_update(efi_capsule_header_t *capsule, phys_addr_t *pages)
217 u32 imagesize = capsule->imagesize;
218 efi_guid_t guid = capsule->guid;
220 u32 flags = capsule->flags;
272 rv = efi_capsule_update_locked(capsule, sg_pages, reset_type);