aboutsummaryrefslogtreecommitdiff
path: root/src/include/ipxe/efi
diff options
context:
space:
mode:
authorMichael Brown <mcb30@ipxe.org>2020-11-30 17:08:58 +0000
committerMichael Brown <mcb30@ipxe.org>2020-11-30 19:34:57 +0000
commit63625b43e9009833183f1921ed3753ba35d9261f (patch)
treec34e2b8b2b382b96e4d2ca6131a20be000942551 /src/include/ipxe/efi
parent354c252ee19ff32986f8af0cb80e171202741a20 (diff)
downloadipxe-63625b43e9009833183f1921ed3753ba35d9261f.zip
ipxe-63625b43e9009833183f1921ed3753ba35d9261f.tar.gz
ipxe-63625b43e9009833183f1921ed3753ba35d9261f.tar.bz2
[efi] Allow vetoing of drivers that cannot be unloaded
Some UEFI drivers (observed with the "Usb Xhci Driver" on an HP EliteBook) are particularly badly behaved: they cannot be unloaded and will leave handles opened with BY_DRIVER attributes even after disconnecting the driver, thereby preventing a replacement iPXE driver from opening the handle. Allow such drivers to be vetoed by falling back to a brute-force mechanism that will disconnect the driver from all handles, uninstall the driver binding protocol (to prevent it from attaching to any new handles), and finally close any stray handles that the vetoed driver has left open. Signed-off-by: Michael Brown <mcb30@ipxe.org>
Diffstat (limited to 'src/include/ipxe/efi')
-rw-r--r--src/include/ipxe/efi/efi_veto.h2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/include/ipxe/efi/efi_veto.h b/src/include/ipxe/efi/efi_veto.h
index f0c2255..c9ecbb0 100644
--- a/src/include/ipxe/efi/efi_veto.h
+++ b/src/include/ipxe/efi/efi_veto.h
@@ -8,6 +8,6 @@
FILE_LICENCE ( GPL2_OR_LATER_OR_UBDL );
-extern void efi_veto_unload ( void );
+extern void efi_veto ( void );
#endif /* _IPXE_EFI_VETO_H */