blob: 06563d28ca977c577086de4dfb106d2b870fd05d [file] [log] [blame]
Tom Rinif739fcd2018-05-07 17:02:21 -04001// SPDX-License-Identifier: GPL-2.0+
Alexander Grafb9939332016-03-10 00:27:20 +01002/*
3 * EFI application loader
4 *
5 * Copyright (c) 2016 Alexander Graf
Alexander Grafb9939332016-03-10 00:27:20 +01006 */
7
Heinrich Schuchardtc0018372020-07-17 20:21:00 +02008#define LOG_CATEGORY LOGC_EFI
9
Alexander Grafb9939332016-03-10 00:27:20 +010010#include <common.h>
Heinrich Schuchardtf6c6df72019-01-08 18:13:06 +010011#include <charset.h>
Alexander Grafb9939332016-03-10 00:27:20 +010012#include <command.h>
Simon Glass9d922452017-05-17 17:18:03 -060013#include <dm.h>
Alexander Grafb9939332016-03-10 00:27:20 +010014#include <efi_loader.h>
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020015#include <efi_selftest.h>
Simon Glass7b51b572019-08-01 09:46:52 -060016#include <env.h>
Alexander Grafb9939332016-03-10 00:27:20 +010017#include <errno.h>
Simon Glass4d72caa2020-05-10 11:40:01 -060018#include <image.h>
Heinrich Schuchardtc0018372020-07-17 20:21:00 +020019#include <log.h>
Simon Glass336d4612020-02-03 07:36:16 -070020#include <malloc.h>
Masahiro Yamadab08c8c42018-03-05 01:20:11 +090021#include <linux/libfdt.h>
22#include <linux/libfdt_env.h>
Alexander Graf354264b2018-06-18 17:22:58 +020023#include <mapmem.h>
Alexander Grafad0c1a32016-04-11 23:51:01 +020024#include <memalign.h>
Simon Glasse2754582016-09-25 15:27:32 -060025#include <asm-generic/sections.h>
26#include <linux/linkage.h>
Alexander Graf0d9d5012016-04-11 16:55:26 +020027
28DECLARE_GLOBAL_DATA_PTR;
Alexander Grafb9939332016-03-10 00:27:20 +010029
Rob Clark95c55532017-09-13 18:05:33 -040030static struct efi_device_path *bootefi_image_path;
31static struct efi_device_path *bootefi_device_path;
Alexander Grafb9939332016-03-10 00:27:20 +010032
Heinrich Schuchardt810371a2019-07-14 13:00:44 +020033/**
Heinrich Schuchardt1064d042020-08-07 17:47:13 +020034 * efi_env_set_load_options() - set load options from environment variable
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020035 *
Heinrich Schuchardta3850e42020-01-03 22:53:42 +010036 * @handle: the image handle
37 * @env_var: name of the environment variable
38 * @load_options: pointer to load options (output)
39 * Return: status code
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020040 */
Heinrich Schuchardt1064d042020-08-07 17:47:13 +020041static efi_status_t efi_env_set_load_options(efi_handle_t handle,
42 const char *env_var,
43 u16 **load_options)
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020044{
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020045 const char *env = env_get(env_var);
Heinrich Schuchardt1064d042020-08-07 17:47:13 +020046 size_t size;
Heinrich Schuchardt7086a712018-08-31 21:31:33 +020047 u16 *pos;
AKASHI Takahirodefa7b82019-04-19 12:22:28 +090048 efi_status_t ret;
49
Heinrich Schuchardta3850e42020-01-03 22:53:42 +010050 *load_options = NULL;
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020051 if (!env)
Heinrich Schuchardt1064d042020-08-07 17:47:13 +020052 return EFI_SUCCESS;
53 size = sizeof(u16) * (utf8_utf16_strlen(env) + 1);
54 pos = calloc(size, 1);
55 if (!pos)
AKASHI Takahirodefa7b82019-04-19 12:22:28 +090056 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardta3850e42020-01-03 22:53:42 +010057 *load_options = pos;
Heinrich Schuchardt7086a712018-08-31 21:31:33 +020058 utf8_utf16_strcpy(&pos, env);
Heinrich Schuchardt1064d042020-08-07 17:47:13 +020059 ret = efi_set_load_options(handle, size, *load_options);
60 if (ret != EFI_SUCCESS) {
61 free(*load_options);
62 *load_options = NULL;
63 }
64 return ret;
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020065}
66
Heinrich Schuchardt61824952019-04-20 13:33:55 +020067#if !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
68
Simon Glass9dff4902018-08-08 03:54:30 -060069/**
70 * copy_fdt() - Copy the device tree to a new location available to EFI
71 *
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +010072 * The FDT is copied to a suitable location within the EFI memory map.
Heinrich Schuchardtc3772ca2018-11-18 17:58:49 +010073 * Additional 12 KiB are added to the space in case the device tree needs to be
Simon Glass9dff4902018-08-08 03:54:30 -060074 * expanded later with fdt_open_into().
75 *
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +010076 * @fdtp: On entry a pointer to the flattened device tree.
77 * On exit a pointer to the copy of the flattened device tree.
Heinrich Schuchardt4574d1b2018-11-12 18:55:22 +010078 * FDT start
79 * Return: status code
Simon Glass9dff4902018-08-08 03:54:30 -060080 */
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +010081static efi_status_t copy_fdt(void **fdtp)
Alexander Graf0d9d5012016-04-11 16:55:26 +020082{
Alexander Grafad0c1a32016-04-11 23:51:01 +020083 unsigned long fdt_ram_start = -1L, fdt_pages;
Simon Glass9dff4902018-08-08 03:54:30 -060084 efi_status_t ret = 0;
85 void *fdt, *new_fdt;
Alexander Grafad0c1a32016-04-11 23:51:01 +020086 u64 new_fdt_addr;
Simon Glass9dff4902018-08-08 03:54:30 -060087 uint fdt_size;
Alexander Grafad0c1a32016-04-11 23:51:01 +020088 int i;
Alexander Graf0d9d5012016-04-11 16:55:26 +020089
Simon Glass9dff4902018-08-08 03:54:30 -060090 for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) {
91 u64 ram_start = gd->bd->bi_dram[i].start;
92 u64 ram_size = gd->bd->bi_dram[i].size;
Alexander Graf0d9d5012016-04-11 16:55:26 +020093
Alexander Grafad0c1a32016-04-11 23:51:01 +020094 if (!ram_size)
95 continue;
96
97 if (ram_start < fdt_ram_start)
98 fdt_ram_start = ram_start;
99 }
100
Simon Glassbc9a6382018-06-18 08:08:25 -0600101 /*
Heinrich Schuchardtc3772ca2018-11-18 17:58:49 +0100102 * Give us at least 12 KiB of breathing room in case the device tree
103 * needs to be expanded later.
Simon Glassbc9a6382018-06-18 08:08:25 -0600104 */
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100105 fdt = *fdtp;
Heinrich Schuchardtc3772ca2018-11-18 17:58:49 +0100106 fdt_pages = efi_size_in_pages(fdt_totalsize(fdt) + 0x3000);
107 fdt_size = fdt_pages << EFI_PAGE_SHIFT;
Alexander Grafad0c1a32016-04-11 23:51:01 +0200108
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100109 /*
110 * Safe fdt location is at 127 MiB.
111 * On the sandbox convert from the sandbox address space.
112 */
113 new_fdt_addr = (uintptr_t)map_sysmem(fdt_ram_start + 0x7f00000 +
114 fdt_size, 0);
Simon Glass9dff4902018-08-08 03:54:30 -0600115 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardt42a426e2020-05-06 20:32:31 +0200116 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass9dff4902018-08-08 03:54:30 -0600117 &new_fdt_addr);
118 if (ret != EFI_SUCCESS) {
Alexander Grafad0c1a32016-04-11 23:51:01 +0200119 /* If we can't put it there, put it somewhere */
xypron.glpk@gmx.dea44bffc2017-08-11 21:19:25 +0200120 new_fdt_addr = (ulong)memalign(EFI_PAGE_SIZE, fdt_size);
Simon Glass9dff4902018-08-08 03:54:30 -0600121 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardt42a426e2020-05-06 20:32:31 +0200122 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass9dff4902018-08-08 03:54:30 -0600123 &new_fdt_addr);
124 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200125 log_err("ERROR: Failed to reserve space for FDT\n");
Simon Glass9dff4902018-08-08 03:54:30 -0600126 goto done;
Alexander Graf85a6e9b2017-07-03 13:32:35 +0200127 }
Alexander Grafad0c1a32016-04-11 23:51:01 +0200128 }
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100129 new_fdt = (void *)(uintptr_t)new_fdt_addr;
Alexander Graf0d9d5012016-04-11 16:55:26 +0200130 memcpy(new_fdt, fdt, fdt_totalsize(fdt));
131 fdt_set_totalsize(new_fdt, fdt_size);
132
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100133 *fdtp = (void *)(uintptr_t)new_fdt_addr;
Simon Glass9dff4902018-08-08 03:54:30 -0600134done:
135 return ret;
Alexander Graf0d9d5012016-04-11 16:55:26 +0200136}
137
Atish Patra7be64b82020-03-13 17:11:30 -0700138static void efi_reserve_memory(u64 addr, u64 size)
139{
Atish Patra7be64b82020-03-13 17:11:30 -0700140 /* Convert from sandbox address space. */
141 addr = (uintptr_t)map_sysmem(addr, 0);
Michael Walle714497e2020-05-17 12:29:19 +0200142 if (efi_add_memory_map(addr, size,
143 EFI_RESERVED_MEMORY_TYPE) != EFI_SUCCESS)
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200144 log_err("Reserved memory mapping failed addr %llx size %llx\n",
145 addr, size);
Atish Patra7be64b82020-03-13 17:11:30 -0700146}
147
Heinrich Schuchardt810371a2019-07-14 13:00:44 +0200148/**
Simon Glass416e07e2018-06-18 08:08:28 -0600149 * efi_carve_out_dt_rsv() - Carve out DT reserved memory ranges
150 *
151 * The mem_rsv entries of the FDT are added to the memory map. Any failures are
152 * ignored because this is not critical and we would rather continue to try to
153 * boot.
154 *
155 * @fdt: Pointer to device tree
156 */
157static void efi_carve_out_dt_rsv(void *fdt)
Alexander Graf806d2fa2018-04-06 09:40:51 +0200158{
159 int nr_rsv, i;
Atish Patra7be64b82020-03-13 17:11:30 -0700160 u64 addr, size;
161 int nodeoffset, subnode;
Alexander Graf806d2fa2018-04-06 09:40:51 +0200162
163 nr_rsv = fdt_num_mem_rsv(fdt);
164
165 /* Look for an existing entry and add it to the efi mem map. */
166 for (i = 0; i < nr_rsv; i++) {
167 if (fdt_get_mem_rsv(fdt, i, &addr, &size) != 0)
168 continue;
Atish Patra7be64b82020-03-13 17:11:30 -0700169 efi_reserve_memory(addr, size);
170 }
Alexander Graf806d2fa2018-04-06 09:40:51 +0200171
Atish Patra7be64b82020-03-13 17:11:30 -0700172 /* process reserved-memory */
173 nodeoffset = fdt_subnode_offset(fdt, 0, "reserved-memory");
174 if (nodeoffset >= 0) {
175 subnode = fdt_first_subnode(fdt, nodeoffset);
176 while (subnode >= 0) {
Bin Mengb1c272d2020-06-22 23:50:50 -0700177 fdt_addr_t fdt_addr;
178 fdt_size_t fdt_size;
Atish Patra0d7c2912020-06-18 18:51:50 -0700179
Atish Patra7be64b82020-03-13 17:11:30 -0700180 /* check if this subnode has a reg property */
Atish Patra0d7c2912020-06-18 18:51:50 -0700181 fdt_addr = fdtdec_get_addr_size_auto_parent(
182 fdt, nodeoffset, subnode,
183 "reg", 0, &fdt_size, false);
Atish Patra7be64b82020-03-13 17:11:30 -0700184 /*
185 * The /reserved-memory node may have children with
186 * a size instead of a reg property.
187 */
Heinrich Schuchardt039d4f52020-06-30 14:12:43 +0200188 if (fdt_addr != FDT_ADDR_T_NONE &&
Heinrich Schuchardt4ef2b0d2020-03-24 07:37:52 +0100189 fdtdec_get_is_enabled(fdt, subnode))
Atish Patra0d7c2912020-06-18 18:51:50 -0700190 efi_reserve_memory(fdt_addr, fdt_size);
Atish Patra7be64b82020-03-13 17:11:30 -0700191 subnode = fdt_next_subnode(fdt, subnode);
192 }
Alexander Graf806d2fa2018-04-06 09:40:51 +0200193 }
Alexander Graf806d2fa2018-04-06 09:40:51 +0200194}
195
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900196/**
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200197 * get_config_table() - get configuration table
198 *
199 * @guid: GUID of the configuration table
200 * Return: pointer to configuration table or NULL
201 */
202static void *get_config_table(const efi_guid_t *guid)
203{
204 size_t i;
205
206 for (i = 0; i < systab.nr_tables; i++) {
207 if (!guidcmp(guid, &systab.tables[i].guid))
208 return systab.tables[i].table;
209 }
210 return NULL;
211}
212
213#endif /* !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) */
214
215/**
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100216 * efi_install_fdt() - install device tree
Heinrich Schuchardte2d82f82019-05-12 20:16:25 +0200217 *
Heinrich Schuchardt7d4d5512020-02-07 22:10:49 +0100218 * If fdt is not EFI_FDT_USE_INTERNAL, the device tree located at that memory
219 * address will will be installed as configuration table, otherwise the device
220 * tree located at the address indicated by environment variable fdt_addr or as
221 * fallback fdtcontroladdr will be used.
Heinrich Schuchardte2d82f82019-05-12 20:16:25 +0200222 *
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100223 * On architectures using ACPI tables device trees shall not be installed as
224 * configuration table.
Heinrich Schuchardte2d82f82019-05-12 20:16:25 +0200225 *
Heinrich Schuchardt7d4d5512020-02-07 22:10:49 +0100226 * @fdt: address of device tree or EFI_FDT_USE_INTERNAL to use the
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100227 * the hardware device tree as indicated by environment variable
228 * fdt_addr or as fallback the internal device tree as indicated by
229 * the environment variable fdtcontroladdr
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900230 * Return: status code
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900231 */
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100232efi_status_t efi_install_fdt(void *fdt)
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900233{
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200234 /*
235 * The EBBR spec requires that we have either an FDT or an ACPI table
236 * but not both.
237 */
238#if CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100239 if (fdt) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200240 log_err("ERROR: can't have ACPI table and device tree.\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200241 return EFI_LOAD_ERROR;
242 }
243#else
AKASHI Takahiro3ffc52f2019-04-19 12:22:30 +0900244 bootm_headers_t img = { 0 };
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900245 efi_status_t ret;
246
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100247 if (fdt == EFI_FDT_USE_INTERNAL) {
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100248 const char *fdt_opt;
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100249 uintptr_t fdt_addr;
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100250
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200251 /* Look for device tree that is already installed */
252 if (get_config_table(&efi_guid_fdt))
253 return EFI_SUCCESS;
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100254 /* Check if there is a hardware device tree */
255 fdt_opt = env_get("fdt_addr");
256 /* Use our own device tree as fallback */
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200257 if (!fdt_opt) {
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100258 fdt_opt = env_get("fdtcontroladdr");
259 if (!fdt_opt) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200260 log_err("ERROR: need device tree\n");
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100261 return EFI_NOT_FOUND;
262 }
AKASHI Takahiro3ffc52f2019-04-19 12:22:30 +0900263 }
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200264 fdt_addr = simple_strtoul(fdt_opt, NULL, 16);
265 if (!fdt_addr) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200266 log_err("ERROR: invalid $fdt_addr or $fdtcontroladdr\n");
AKASHI Takahiro3ffc52f2019-04-19 12:22:30 +0900267 return EFI_LOAD_ERROR;
268 }
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100269 fdt = map_sysmem(fdt_addr, 0);
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900270 }
271
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200272 /* Install device tree */
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200273 if (fdt_check_header(fdt)) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200274 log_err("ERROR: invalid device tree\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200275 return EFI_LOAD_ERROR;
276 }
277
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200278 /* Prepare device tree for payload */
279 ret = copy_fdt(&fdt);
280 if (ret) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200281 log_err("ERROR: out of memory\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200282 return EFI_OUT_OF_RESOURCES;
283 }
284
285 if (image_setup_libfdt(&img, fdt, 0, NULL)) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200286 log_err("ERROR: failed to process device tree\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200287 return EFI_LOAD_ERROR;
288 }
289
Heinrich Schuchardtfef907b2020-03-14 10:59:34 +0100290 /* Create memory reservations as indicated by the device tree */
291 efi_carve_out_dt_rsv(fdt);
292
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200293 /* Install device tree as UEFI table */
294 ret = efi_install_configuration_table(&efi_guid_fdt, fdt);
295 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200296 log_err("ERROR: failed to install device tree\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200297 return ret;
298 }
299#endif /* GENERATE_ACPI_TABLE */
300
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900301 return EFI_SUCCESS;
302}
303
Simon Glass5e2f0392018-11-25 20:14:39 -0700304/**
Heinrich Schuchardtc9828742018-09-23 17:21:51 +0200305 * do_bootefi_exec() - execute EFI binary
306 *
Heinrich Schuchardt72e1fca2020-08-15 23:10:22 +0200307 * The image indicated by @handle is started. When it returns the allocated
308 * memory for the @load_options is freed.
309 *
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900310 * @handle: handle of loaded image
Heinrich Schuchardt72e1fca2020-08-15 23:10:22 +0200311 * @load_options: load options
Heinrich Schuchardtc9828742018-09-23 17:21:51 +0200312 * Return: status code
313 *
314 * Load the EFI binary into a newly assigned memory unwinding the relocation
315 * information, install the loaded image protocol, and call the binary.
Alexander Grafb9939332016-03-10 00:27:20 +0100316 */
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +0200317static efi_status_t do_bootefi_exec(efi_handle_t handle, void *load_options)
Alexander Grafb9939332016-03-10 00:27:20 +0100318{
Heinrich Schuchardt45204b12018-03-03 15:29:01 +0100319 efi_status_t ret;
Heinrich Schuchardt556d8dc2019-04-30 17:57:30 +0200320 efi_uintn_t exit_data_size = 0;
321 u16 *exit_data = NULL;
Rob Clarkbf192732017-10-10 08:23:06 -0400322
Alexander Grafb9939332016-03-10 00:27:20 +0100323 /* Call our payload! */
Heinrich Schuchardt556d8dc2019-04-30 17:57:30 +0200324 ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data));
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200325 if (ret != EFI_SUCCESS) {
326 log_err("## Application failed, r = %lu\n",
327 ret & ~EFI_ERROR_MASK);
328 if (exit_data) {
329 log_err("## %ls\n", exit_data);
330 efi_free_pool(exit_data);
331 }
Heinrich Schuchardt556d8dc2019-04-30 17:57:30 +0200332 }
Rob Clark95c55532017-09-13 18:05:33 -0400333
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900334 efi_restore_gd();
Simon Glass5e2f0392018-11-25 20:14:39 -0700335
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100336 free(load_options);
Rob Clark95c55532017-09-13 18:05:33 -0400337
338 return ret;
Alexander Grafb9939332016-03-10 00:27:20 +0100339}
340
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900341/**
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200342 * do_efibootmgr() - execute EFI boot manager
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900343 *
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900344 * Return: status code
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900345 */
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200346static int do_efibootmgr(void)
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900347{
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900348 efi_handle_t handle;
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900349 efi_status_t ret;
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +0200350 void *load_options;
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900351
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +0200352 ret = efi_bootmgr_load(&handle, &load_options);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900353 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200354 log_notice("EFI boot manager: Cannot load any image\n");
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900355 return CMD_RET_FAILURE;
356 }
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900357
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +0200358 ret = do_bootefi_exec(handle, load_options);
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900359
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900360 if (ret != EFI_SUCCESS)
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900361 return CMD_RET_FAILURE;
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900362
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900363 return CMD_RET_SUCCESS;
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900364}
365
Heinrich Schuchardt810371a2019-07-14 13:00:44 +0200366/**
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200367 * do_bootefi_image() - execute EFI binary
368 *
369 * Set up memory image for the binary to be loaded, prepare device path, and
370 * then call do_bootefi_exec() to execute it.
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900371 *
372 * @image_opt: string of image start address
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900373 * Return: status code
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900374 */
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200375static int do_bootefi_image(const char *image_opt)
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900376{
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900377 void *image_buf;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900378 unsigned long addr, size;
379 const char *size_str;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900380 efi_status_t ret;
381
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900382#ifdef CONFIG_CMD_BOOTEFI_HELLO
383 if (!strcmp(image_opt, "hello")) {
384 char *saddr;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900385
386 saddr = env_get("loadaddr");
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900387 size = __efi_helloworld_end - __efi_helloworld_begin;
388
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900389 if (saddr)
390 addr = simple_strtoul(saddr, NULL, 16);
391 else
392 addr = CONFIG_SYS_LOAD_ADDR;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900393
394 image_buf = map_sysmem(addr, size);
395 memcpy(image_buf, __efi_helloworld_begin, size);
396
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100397 efi_free_pool(bootefi_device_path);
398 efi_free_pool(bootefi_image_path);
399 bootefi_device_path = NULL;
400 bootefi_image_path = NULL;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900401 } else
402#endif
403 {
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900404 size_str = env_get("filesize");
405 if (size_str)
406 size = simple_strtoul(size_str, NULL, 16);
407 else
408 size = 0;
409
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900410 addr = simple_strtoul(image_opt, NULL, 16);
411 /* Check that a numeric value was passed */
412 if (!addr && *image_opt != '0')
413 return CMD_RET_USAGE;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900414
415 image_buf = map_sysmem(addr, size);
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900416 }
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100417 ret = efi_run_image(image_buf, size);
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900418
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100419 if (ret != EFI_SUCCESS)
420 return CMD_RET_FAILURE;
421
422 return CMD_RET_SUCCESS;
423}
424
425/**
426 * efi_run_image() - run loaded UEFI image
427 *
428 * @source_buffer: memory address of the UEFI image
429 * @source_size: size of the UEFI image
430 * Return: status code
431 */
432efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size)
433{
434 efi_handle_t mem_handle = NULL, handle;
435 struct efi_device_path *file_path = NULL;
436 efi_status_t ret;
437
438 if (!bootefi_device_path || !bootefi_image_path) {
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900439 /*
440 * Special case for efi payload not loaded from disk,
441 * such as 'bootefi hello' or for example payload
442 * loaded directly into memory via JTAG, etc:
443 */
444 file_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE,
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100445 (uintptr_t)source_buffer,
446 source_size);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900447 /*
448 * Make sure that device for device_path exist
449 * in load_image(). Otherwise, shell and grub will fail.
450 */
451 ret = efi_create_handle(&mem_handle);
452 if (ret != EFI_SUCCESS)
453 goto out;
454
455 ret = efi_add_protocol(mem_handle, &efi_guid_device_path,
456 file_path);
457 if (ret != EFI_SUCCESS)
458 goto out;
459 } else {
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100460 file_path = efi_dp_append(bootefi_device_path,
461 bootefi_image_path);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900462 }
463
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100464 ret = EFI_CALL(efi_load_image(false, efi_root, file_path, source_buffer,
465 source_size, &handle));
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900466 if (ret != EFI_SUCCESS)
467 goto out;
468
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +0200469 u16 *load_options;
470
471 /* Transfer environment variable as load options */
472 ret = efi_env_set_load_options(handle, "bootargs", &load_options);
473 if (ret != EFI_SUCCESS)
474 goto out;
475
476 ret = do_bootefi_exec(handle, load_options);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900477
478out:
Heinrich Schuchardt4fe050e2020-04-20 12:44:56 +0200479 efi_delete_handle(mem_handle);
480 efi_free_pool(file_path);
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100481 return ret;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900482}
483
Simon Glassd9717ea2018-11-25 20:14:37 -0700484#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900485static efi_status_t bootefi_run_prepare(const char *load_options_path,
486 struct efi_device_path *device_path,
487 struct efi_device_path *image_path,
488 struct efi_loaded_image_obj **image_objp,
489 struct efi_loaded_image **loaded_image_infop)
490{
491 efi_status_t ret;
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100492 u16 *load_options;
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900493
494 ret = efi_setup_loaded_image(device_path, image_path, image_objp,
495 loaded_image_infop);
496 if (ret != EFI_SUCCESS)
497 return ret;
498
499 /* Transfer environment variable as load options */
Heinrich Schuchardt1064d042020-08-07 17:47:13 +0200500 return efi_env_set_load_options((efi_handle_t)*image_objp,
501 load_options_path,
502 &load_options);
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900503}
504
Simon Glassd9717ea2018-11-25 20:14:37 -0700505/**
506 * bootefi_test_prepare() - prepare to run an EFI test
507 *
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100508 * Prepare to run a test as if it were provided by a loaded image.
Simon Glassd9717ea2018-11-25 20:14:37 -0700509 *
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100510 * @image_objp: pointer to be set to the loaded image handle
511 * @loaded_image_infop: pointer to be set to the loaded image protocol
512 * @path: dummy file path used to construct the device path
513 * set in the loaded image protocol
514 * @load_options_path: name of a U-Boot environment variable. Its value is
515 * set as load options in the loaded image protocol.
516 * Return: status code
Simon Glassd9717ea2018-11-25 20:14:37 -0700517 */
518static efi_status_t bootefi_test_prepare
519 (struct efi_loaded_image_obj **image_objp,
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100520 struct efi_loaded_image **loaded_image_infop, const char *path,
521 const char *load_options_path)
Simon Glassd9717ea2018-11-25 20:14:37 -0700522{
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100523 efi_status_t ret;
524
Simon Glassd9717ea2018-11-25 20:14:37 -0700525 /* Construct a dummy device path */
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100526 bootefi_device_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, 0, 0);
Simon Glassd9717ea2018-11-25 20:14:37 -0700527 if (!bootefi_device_path)
528 return EFI_OUT_OF_RESOURCES;
Simon Glassd9717ea2018-11-25 20:14:37 -0700529
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100530 bootefi_image_path = efi_dp_from_file(NULL, 0, path);
531 if (!bootefi_image_path) {
532 ret = EFI_OUT_OF_RESOURCES;
533 goto failure;
534 }
535
536 ret = bootefi_run_prepare(load_options_path, bootefi_device_path,
537 bootefi_image_path, image_objp,
538 loaded_image_infop);
539 if (ret == EFI_SUCCESS)
540 return ret;
541
542 efi_free_pool(bootefi_image_path);
543 bootefi_image_path = NULL;
544failure:
545 efi_free_pool(bootefi_device_path);
546 bootefi_device_path = NULL;
547 return ret;
Simon Glassd9717ea2018-11-25 20:14:37 -0700548}
549
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900550/**
551 * bootefi_run_finish() - finish up after running an EFI test
552 *
553 * @loaded_image_info: Pointer to a struct which holds the loaded image info
554 * @image_obj: Pointer to a struct which holds the loaded image object
555 */
556static void bootefi_run_finish(struct efi_loaded_image_obj *image_obj,
557 struct efi_loaded_image *loaded_image_info)
558{
559 efi_restore_gd();
560 free(loaded_image_info->load_options);
561 efi_delete_handle(&image_obj->header);
562}
563
564/**
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200565 * do_efi_selftest() - execute EFI selftest
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900566 *
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900567 * Return: status code
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900568 */
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200569static int do_efi_selftest(void)
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900570{
571 struct efi_loaded_image_obj *image_obj;
572 struct efi_loaded_image *loaded_image_info;
573 efi_status_t ret;
574
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900575 ret = bootefi_test_prepare(&image_obj, &loaded_image_info,
576 "\\selftest", "efi_selftest");
577 if (ret != EFI_SUCCESS)
578 return CMD_RET_FAILURE;
579
580 /* Execute the test */
581 ret = EFI_CALL(efi_selftest(&image_obj->header, &systab));
582 bootefi_run_finish(image_obj, loaded_image_info);
583
584 return ret != EFI_SUCCESS;
585}
Simon Glassd9717ea2018-11-25 20:14:37 -0700586#endif /* CONFIG_CMD_BOOTEFI_SELFTEST */
587
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200588/**
589 * do_bootefi() - execute `bootefi` command
590 *
591 * @cmdtp: table entry describing command
592 * @flag: bitmap indicating how the command was invoked
593 * @argc: number of arguments
594 * @argv: command line arguments
595 * Return: status code
596 */
Simon Glass09140112020-05-10 11:40:03 -0600597static int do_bootefi(struct cmd_tbl *cmdtp, int flag, int argc,
598 char *const argv[])
Alexander Grafb9939332016-03-10 00:27:20 +0100599{
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200600 efi_status_t ret;
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100601 void *fdt;
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200602
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900603 if (argc < 2)
604 return CMD_RET_USAGE;
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900605
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200606 /* Initialize EFI drivers */
607 ret = efi_init_obj_list();
608 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200609 log_err("Error: Cannot initialize UEFI sub-system, r = %lu\n",
610 ret & ~EFI_ERROR_MASK);
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200611 return CMD_RET_FAILURE;
612 }
613
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100614 if (argc > 2) {
615 uintptr_t fdt_addr;
616
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100617 fdt_addr = simple_strtoul(argv[2], NULL, 16);
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100618 fdt = map_sysmem(fdt_addr, 0);
619 } else {
620 fdt = EFI_FDT_USE_INTERNAL;
621 }
622 ret = efi_install_fdt(fdt);
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200623 if (ret == EFI_INVALID_PARAMETER)
624 return CMD_RET_USAGE;
625 else if (ret != EFI_SUCCESS)
626 return CMD_RET_FAILURE;
627
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900628 if (!strcmp(argv[1], "bootmgr"))
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200629 return do_efibootmgr();
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900630#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
631 else if (!strcmp(argv[1], "selftest"))
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200632 return do_efi_selftest();
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900633#endif
634
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200635 return do_bootefi_image(argv[1]);
Alexander Grafb9939332016-03-10 00:27:20 +0100636}
637
638#ifdef CONFIG_SYS_LONGHELP
639static char bootefi_help_text[] =
Alexander Graf1c398092016-04-14 16:07:53 +0200640 "<image address> [fdt address]\n"
641 " - boot EFI payload stored at address <image address>.\n"
642 " If specified, the device tree located at <fdt address> gets\n"
Simon Glassc7ae3df2016-11-07 08:47:08 -0700643 " exposed as EFI configuration table.\n"
644#ifdef CONFIG_CMD_BOOTEFI_HELLO
Heinrich Schuchardt623b3a52017-09-15 10:06:11 +0200645 "bootefi hello\n"
646 " - boot a sample Hello World application stored within U-Boot\n"
647#endif
648#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
Heinrich Schuchardtbc4f9132018-03-03 15:29:03 +0100649 "bootefi selftest [fdt address]\n"
Heinrich Schuchardt623b3a52017-09-15 10:06:11 +0200650 " - boot an EFI selftest application stored within U-Boot\n"
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +0200651 " Use environment variable efi_selftest to select a single test.\n"
652 " Use 'setenv efi_selftest list' to enumerate all tests.\n"
Simon Glassc7ae3df2016-11-07 08:47:08 -0700653#endif
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900654 "bootefi bootmgr [fdt address]\n"
Rob Clark9975fe92017-09-13 18:05:38 -0400655 " - load and boot EFI payload based on BootOrder/BootXXXX variables.\n"
656 "\n"
657 " If specified, the device tree located at <fdt address> gets\n"
658 " exposed as EFI configuration table.\n";
Alexander Grafb9939332016-03-10 00:27:20 +0100659#endif
660
661U_BOOT_CMD(
Alexander Graf1c398092016-04-14 16:07:53 +0200662 bootefi, 3, 0, do_bootefi,
Sergey Kubushyn92dfd922016-06-07 11:14:31 -0700663 "Boots an EFI payload from memory",
Alexander Grafb9939332016-03-10 00:27:20 +0100664 bootefi_help_text
665);
Alexander Graf0f4060e2016-03-04 01:10:14 +0100666
Heinrich Schuchardt810371a2019-07-14 13:00:44 +0200667/**
668 * efi_set_bootdev() - set boot device
669 *
670 * This function is called when a file is loaded, e.g. via the 'load' command.
671 * We use the path to this file to inform the UEFI binary about the boot device.
672 *
673 * @dev: device, e.g. "MMC"
674 * @devnr: number of the device, e.g. "1:2"
675 * @path: path to file loaded
676 */
Alexander Grafc07ad7c2016-04-11 16:16:19 +0200677void efi_set_bootdev(const char *dev, const char *devnr, const char *path)
Alexander Graf0f4060e2016-03-04 01:10:14 +0100678{
AKASHI Takahirof1589ff2018-10-17 16:32:03 +0900679 struct efi_device_path *device, *image;
680 efi_status_t ret;
Alexander Graf0f4060e2016-03-04 01:10:14 +0100681
Heinrich Schuchardt79276eb2018-09-16 07:20:21 +0200682 /* efi_set_bootdev is typically called repeatedly, recover memory */
683 efi_free_pool(bootefi_device_path);
684 efi_free_pool(bootefi_image_path);
Heinrich Schuchardt79276eb2018-09-16 07:20:21 +0200685
AKASHI Takahirof1589ff2018-10-17 16:32:03 +0900686 ret = efi_dp_from_name(dev, devnr, path, &device, &image);
687 if (ret == EFI_SUCCESS) {
688 bootefi_device_path = device;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900689 if (image) {
690 /* FIXME: image should not contain device */
691 struct efi_device_path *image_tmp = image;
692
693 efi_dp_split_file_path(image, &device, &image);
694 efi_free_pool(image_tmp);
695 }
AKASHI Takahirof1589ff2018-10-17 16:32:03 +0900696 bootefi_image_path = image;
Rob Clark95c55532017-09-13 18:05:33 -0400697 } else {
AKASHI Takahirof1589ff2018-10-17 16:32:03 +0900698 bootefi_device_path = NULL;
699 bootefi_image_path = NULL;
Alexander Graff9d334b2016-08-05 14:49:53 +0200700 }
Alexander Graf0f4060e2016-03-04 01:10:14 +0100701}