efi_info
struct efi_info *ei;
ei = &bp->efi_info;
struct efi_info *ei;
ei = &bp->efi_info;
struct efi_info *e = &boot_params_ptr->efi_info;
signature = (char *)&boot_params_ptr->efi_info.efi_loader_signature;
BOOT_PARAM_PRESERVE(efi_info),
struct efi_info efi_info; /* 0x1c0 */
struct efi_info *ei = ¶ms->efi_info;
struct efi_info *current_ei = &boot_params.efi_info;
struct efi_info *ei = ¶ms->efi_info;
mstart = (boot_params.efi_info.efi_systab |
((u64)boot_params.efi_info.efi_systab_hi<<32));
if (!strncmp((char *)&boot_params.efi_info.efi_loader_signature,
} else if (!strncmp((char *)&boot_params.efi_info.efi_loader_signature,
paddr = boot_params.efi_info.efi_memmap_hi;
paddr |= boot_params.efi_info.efi_memmap;
paddr = boot_params.efi_info.efi_systab_hi;
paddr |= boot_params.efi_info.efi_systab;
struct efi_info *e = &boot_params.efi_info;
(boot_params.efi_info.efi_systab_hi ||
boot_params.efi_info.efi_memmap_hi)) {
efi_systab_phys = boot_params.efi_info.efi_systab |
((__u64)boot_params.efi_info.efi_systab_hi << 32);
strscpy((char *)&boot_params->efi_info.efi_loader_signature, "Xen",
sizeof(boot_params->efi_info.efi_loader_signature));
boot_params->efi_info.efi_systab = (__u32)__pa(efi_systab_xen);
boot_params->efi_info.efi_systab_hi = (__u32)(__pa(efi_systab_xen) >> 32);
union xenpf_efi_info *info = &op.u.firmware_info.u.efi_info;
efi_info("Free memory starts at 0x%lx, setting kernel_base to 0x%lx\n",
efi_info("Entering in %s mode with MMU %sabled\n",
efi_info("Booting Linux Kernel...\n");
efi_info("Loaded initrd from LINUX_EFI_INITRD_MEDIA_GUID device path\n");
efi_info("Loaded initrd from command line option\n");
efi_info("Measured initrd data into PCR 9\n");
efi_info("Using DTB from command line\n");
efi_info("Using DTB from configuration table\n");
efi_info("Generating empty DTB\n");
efi_info("Exiting boot services...\n");
efi_info("KASLR disabled on kernel command line\n");
efi_info("Image placement fixed by loader\n");
efi_info("EFI_RNG_PROTOCOL unavailable\n");
efi_info("Exiting boot services\n");
efi_info("UEFI Secure Boot is enabled.\n");
struct efi_info *efi = ¶ms->efi_info;
struct efi_info *efi;
priv.efi = &boot_params->efi_info;
efi_info("%s detected on the kernel command line - disabling physical KASLR\n",
efi_info("Decompressing Linux Kernel...\n");
efi_info("KASLR disabled on kernel command line\n");
efi_info("EFI_RNG_PROTOCOL unavailable\n");
union xenpf_efi_info *info = &op.u.firmware_info.u.efi_info;
.u.efi_info.mem.addr = phys_addr,
.u.efi_info.mem.size = U64_MAX - phys_addr,
} efi_info; /* XEN_FW_EFI_INFO */