Tom Rini | f739fcd | 2018-05-07 17:02:21 -0400 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0+ |
Alexander Graf | b993933 | 2016-03-10 00:27:20 +0100 | [diff] [blame] | 2 | /* |
| 3 | * EFI application loader |
| 4 | * |
| 5 | * Copyright (c) 2016 Alexander Graf |
Alexander Graf | b993933 | 2016-03-10 00:27:20 +0100 | [diff] [blame] | 6 | */ |
| 7 | |
Heinrich Schuchardt | c001837 | 2020-07-17 20:21:00 +0200 | [diff] [blame] | 8 | #define LOG_CATEGORY LOGC_EFI |
| 9 | |
Alexander Graf | b993933 | 2016-03-10 00:27:20 +0100 | [diff] [blame] | 10 | #include <common.h> |
Heinrich Schuchardt | 82d01f0 | 2021-01-24 14:34:12 +0000 | [diff] [blame] | 11 | #include <bootm.h> |
Heinrich Schuchardt | f6c6df7 | 2019-01-08 18:13:06 +0100 | [diff] [blame] | 12 | #include <charset.h> |
Alexander Graf | b993933 | 2016-03-10 00:27:20 +0100 | [diff] [blame] | 13 | #include <command.h> |
Simon Glass | 9d92245 | 2017-05-17 17:18:03 -0600 | [diff] [blame] | 14 | #include <dm.h> |
Alexander Graf | b993933 | 2016-03-10 00:27:20 +0100 | [diff] [blame] | 15 | #include <efi_loader.h> |
Heinrich Schuchardt | d78e40d | 2017-10-18 18:13:13 +0200 | [diff] [blame] | 16 | #include <efi_selftest.h> |
Simon Glass | 7b51b57 | 2019-08-01 09:46:52 -0600 | [diff] [blame] | 17 | #include <env.h> |
Alexander Graf | b993933 | 2016-03-10 00:27:20 +0100 | [diff] [blame] | 18 | #include <errno.h> |
Simon Glass | 4d72caa | 2020-05-10 11:40:01 -0600 | [diff] [blame] | 19 | #include <image.h> |
Heinrich Schuchardt | c001837 | 2020-07-17 20:21:00 +0200 | [diff] [blame] | 20 | #include <log.h> |
Simon Glass | 336d461 | 2020-02-03 07:36:16 -0700 | [diff] [blame] | 21 | #include <malloc.h> |
Simon Glass | 401d1c4 | 2020-10-30 21:38:53 -0600 | [diff] [blame] | 22 | #include <asm/global_data.h> |
Masahiro Yamada | b08c8c4 | 2018-03-05 01:20:11 +0900 | [diff] [blame] | 23 | #include <linux/libfdt.h> |
| 24 | #include <linux/libfdt_env.h> |
Alexander Graf | 354264b | 2018-06-18 17:22:58 +0200 | [diff] [blame] | 25 | #include <mapmem.h> |
Alexander Graf | ad0c1a3 | 2016-04-11 23:51:01 +0200 | [diff] [blame] | 26 | #include <memalign.h> |
Simon Glass | e275458 | 2016-09-25 15:27:32 -0600 | [diff] [blame] | 27 | #include <asm-generic/sections.h> |
| 28 | #include <linux/linkage.h> |
Alexander Graf | 0d9d501 | 2016-04-11 16:55:26 +0200 | [diff] [blame] | 29 | |
| 30 | DECLARE_GLOBAL_DATA_PTR; |
Alexander Graf | b993933 | 2016-03-10 00:27:20 +0100 | [diff] [blame] | 31 | |
Rob Clark | 95c5553 | 2017-09-13 18:05:33 -0400 | [diff] [blame] | 32 | static struct efi_device_path *bootefi_image_path; |
| 33 | static struct efi_device_path *bootefi_device_path; |
Heinrich Schuchardt | 5f59518 | 2021-01-12 12:46:24 +0100 | [diff] [blame] | 34 | static void *image_addr; |
| 35 | static size_t image_size; |
| 36 | |
| 37 | /** |
Rui Miguel Silva | bfef72e | 2022-05-11 10:55:40 +0100 | [diff] [blame] | 38 | * efi_get_image_parameters() - return image parameters |
| 39 | * |
| 40 | * @img_addr: address of loaded image in memory |
| 41 | * @img_size: size of loaded image |
| 42 | */ |
| 43 | void efi_get_image_parameters(void **img_addr, size_t *img_size) |
| 44 | { |
| 45 | *img_addr = image_addr; |
| 46 | *img_size = image_size; |
| 47 | } |
| 48 | |
| 49 | /** |
Heinrich Schuchardt | 5f59518 | 2021-01-12 12:46:24 +0100 | [diff] [blame] | 50 | * efi_clear_bootdev() - clear boot device |
| 51 | */ |
| 52 | static void efi_clear_bootdev(void) |
| 53 | { |
| 54 | efi_free_pool(bootefi_device_path); |
| 55 | efi_free_pool(bootefi_image_path); |
| 56 | bootefi_device_path = NULL; |
| 57 | bootefi_image_path = NULL; |
| 58 | image_addr = NULL; |
| 59 | image_size = 0; |
| 60 | } |
| 61 | |
| 62 | /** |
| 63 | * efi_set_bootdev() - set boot device |
| 64 | * |
| 65 | * This function is called when a file is loaded, e.g. via the 'load' command. |
| 66 | * We use the path to this file to inform the UEFI binary about the boot device. |
| 67 | * |
| 68 | * @dev: device, e.g. "MMC" |
| 69 | * @devnr: number of the device, e.g. "1:2" |
| 70 | * @path: path to file loaded |
| 71 | * @buffer: buffer with file loaded |
| 72 | * @buffer_size: size of file loaded |
| 73 | */ |
| 74 | void efi_set_bootdev(const char *dev, const char *devnr, const char *path, |
| 75 | void *buffer, size_t buffer_size) |
| 76 | { |
| 77 | struct efi_device_path *device, *image; |
| 78 | efi_status_t ret; |
| 79 | |
Simon Glass | d837cb1 | 2022-01-29 14:58:37 -0700 | [diff] [blame] | 80 | log_debug("dev=%s, devnr=%s, path=%s, buffer=%p, size=%zx\n", dev, |
| 81 | devnr, path, buffer, buffer_size); |
| 82 | |
Heinrich Schuchardt | 5f59518 | 2021-01-12 12:46:24 +0100 | [diff] [blame] | 83 | /* Forget overwritten image */ |
| 84 | if (buffer + buffer_size >= image_addr && |
| 85 | image_addr + image_size >= buffer) |
| 86 | efi_clear_bootdev(); |
| 87 | |
| 88 | /* Remember only PE-COFF and FIT images */ |
| 89 | if (efi_check_pe(buffer, buffer_size, NULL) != EFI_SUCCESS) { |
Simon Glass | d837cb1 | 2022-01-29 14:58:37 -0700 | [diff] [blame] | 90 | if (IS_ENABLED(CONFIG_FIT) && |
| 91 | !fit_check_format(buffer, IMAGE_SIZE_INVAL)) { |
| 92 | /* |
| 93 | * FIT images of type EFI_OS are started via command |
| 94 | * bootm. We should not use their boot device with the |
| 95 | * bootefi command. |
| 96 | */ |
| 97 | buffer = 0; |
| 98 | buffer_size = 0; |
| 99 | } else { |
| 100 | log_debug("- not remembering image\n"); |
Heinrich Schuchardt | 5f59518 | 2021-01-12 12:46:24 +0100 | [diff] [blame] | 101 | return; |
Simon Glass | d837cb1 | 2022-01-29 14:58:37 -0700 | [diff] [blame] | 102 | } |
Heinrich Schuchardt | 5f59518 | 2021-01-12 12:46:24 +0100 | [diff] [blame] | 103 | } |
| 104 | |
| 105 | /* efi_set_bootdev() is typically called repeatedly, recover memory */ |
| 106 | efi_clear_bootdev(); |
| 107 | |
| 108 | image_addr = buffer; |
| 109 | image_size = buffer_size; |
| 110 | |
| 111 | ret = efi_dp_from_name(dev, devnr, path, &device, &image); |
| 112 | if (ret == EFI_SUCCESS) { |
| 113 | bootefi_device_path = device; |
| 114 | if (image) { |
| 115 | /* FIXME: image should not contain device */ |
| 116 | struct efi_device_path *image_tmp = image; |
| 117 | |
| 118 | efi_dp_split_file_path(image, &device, &image); |
| 119 | efi_free_pool(image_tmp); |
| 120 | } |
| 121 | bootefi_image_path = image; |
Heinrich Schuchardt | 868353d | 2022-07-10 15:46:57 +0200 | [diff] [blame] | 122 | log_debug("- boot device %pD\n", device); |
Simon Glass | d837cb1 | 2022-01-29 14:58:37 -0700 | [diff] [blame] | 123 | if (image) |
Heinrich Schuchardt | 868353d | 2022-07-10 15:46:57 +0200 | [diff] [blame] | 124 | log_debug("- image %pD\n", image); |
Heinrich Schuchardt | 5f59518 | 2021-01-12 12:46:24 +0100 | [diff] [blame] | 125 | } else { |
Simon Glass | d837cb1 | 2022-01-29 14:58:37 -0700 | [diff] [blame] | 126 | log_debug("- efi_dp_from_name() failed, err=%lx\n", ret); |
Heinrich Schuchardt | 5f59518 | 2021-01-12 12:46:24 +0100 | [diff] [blame] | 127 | efi_clear_bootdev(); |
| 128 | } |
| 129 | } |
Alexander Graf | b993933 | 2016-03-10 00:27:20 +0100 | [diff] [blame] | 130 | |
Heinrich Schuchardt | 810371a | 2019-07-14 13:00:44 +0200 | [diff] [blame] | 131 | /** |
Heinrich Schuchardt | 1064d04 | 2020-08-07 17:47:13 +0200 | [diff] [blame] | 132 | * efi_env_set_load_options() - set load options from environment variable |
Heinrich Schuchardt | d78e40d | 2017-10-18 18:13:13 +0200 | [diff] [blame] | 133 | * |
Heinrich Schuchardt | a3850e4 | 2020-01-03 22:53:42 +0100 | [diff] [blame] | 134 | * @handle: the image handle |
| 135 | * @env_var: name of the environment variable |
| 136 | * @load_options: pointer to load options (output) |
| 137 | * Return: status code |
Heinrich Schuchardt | d78e40d | 2017-10-18 18:13:13 +0200 | [diff] [blame] | 138 | */ |
Heinrich Schuchardt | 1064d04 | 2020-08-07 17:47:13 +0200 | [diff] [blame] | 139 | static efi_status_t efi_env_set_load_options(efi_handle_t handle, |
| 140 | const char *env_var, |
| 141 | u16 **load_options) |
Heinrich Schuchardt | d78e40d | 2017-10-18 18:13:13 +0200 | [diff] [blame] | 142 | { |
Heinrich Schuchardt | d78e40d | 2017-10-18 18:13:13 +0200 | [diff] [blame] | 143 | const char *env = env_get(env_var); |
Heinrich Schuchardt | 1064d04 | 2020-08-07 17:47:13 +0200 | [diff] [blame] | 144 | size_t size; |
Heinrich Schuchardt | 7086a71 | 2018-08-31 21:31:33 +0200 | [diff] [blame] | 145 | u16 *pos; |
AKASHI Takahiro | defa7b8 | 2019-04-19 12:22:28 +0900 | [diff] [blame] | 146 | efi_status_t ret; |
| 147 | |
Heinrich Schuchardt | a3850e4 | 2020-01-03 22:53:42 +0100 | [diff] [blame] | 148 | *load_options = NULL; |
Heinrich Schuchardt | d78e40d | 2017-10-18 18:13:13 +0200 | [diff] [blame] | 149 | if (!env) |
Heinrich Schuchardt | 1064d04 | 2020-08-07 17:47:13 +0200 | [diff] [blame] | 150 | return EFI_SUCCESS; |
| 151 | size = sizeof(u16) * (utf8_utf16_strlen(env) + 1); |
| 152 | pos = calloc(size, 1); |
| 153 | if (!pos) |
AKASHI Takahiro | defa7b8 | 2019-04-19 12:22:28 +0900 | [diff] [blame] | 154 | return EFI_OUT_OF_RESOURCES; |
Heinrich Schuchardt | a3850e4 | 2020-01-03 22:53:42 +0100 | [diff] [blame] | 155 | *load_options = pos; |
Heinrich Schuchardt | 7086a71 | 2018-08-31 21:31:33 +0200 | [diff] [blame] | 156 | utf8_utf16_strcpy(&pos, env); |
Heinrich Schuchardt | 1064d04 | 2020-08-07 17:47:13 +0200 | [diff] [blame] | 157 | ret = efi_set_load_options(handle, size, *load_options); |
| 158 | if (ret != EFI_SUCCESS) { |
| 159 | free(*load_options); |
| 160 | *load_options = NULL; |
| 161 | } |
| 162 | return ret; |
Heinrich Schuchardt | d78e40d | 2017-10-18 18:13:13 +0200 | [diff] [blame] | 163 | } |
| 164 | |
Heinrich Schuchardt | 6182495 | 2019-04-20 13:33:55 +0200 | [diff] [blame] | 165 | #if !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) |
| 166 | |
Simon Glass | 9dff490 | 2018-08-08 03:54:30 -0600 | [diff] [blame] | 167 | /** |
| 168 | * copy_fdt() - Copy the device tree to a new location available to EFI |
| 169 | * |
Heinrich Schuchardt | 16b615d | 2018-11-18 17:58:52 +0100 | [diff] [blame] | 170 | * The FDT is copied to a suitable location within the EFI memory map. |
Heinrich Schuchardt | c3772ca | 2018-11-18 17:58:49 +0100 | [diff] [blame] | 171 | * Additional 12 KiB are added to the space in case the device tree needs to be |
Simon Glass | 9dff490 | 2018-08-08 03:54:30 -0600 | [diff] [blame] | 172 | * expanded later with fdt_open_into(). |
| 173 | * |
Heinrich Schuchardt | 16b615d | 2018-11-18 17:58:52 +0100 | [diff] [blame] | 174 | * @fdtp: On entry a pointer to the flattened device tree. |
| 175 | * On exit a pointer to the copy of the flattened device tree. |
Heinrich Schuchardt | 4574d1b | 2018-11-12 18:55:22 +0100 | [diff] [blame] | 176 | * FDT start |
| 177 | * Return: status code |
Simon Glass | 9dff490 | 2018-08-08 03:54:30 -0600 | [diff] [blame] | 178 | */ |
Heinrich Schuchardt | 16b615d | 2018-11-18 17:58:52 +0100 | [diff] [blame] | 179 | static efi_status_t copy_fdt(void **fdtp) |
Alexander Graf | 0d9d501 | 2016-04-11 16:55:26 +0200 | [diff] [blame] | 180 | { |
Alexander Graf | ad0c1a3 | 2016-04-11 23:51:01 +0200 | [diff] [blame] | 181 | unsigned long fdt_ram_start = -1L, fdt_pages; |
Simon Glass | 9dff490 | 2018-08-08 03:54:30 -0600 | [diff] [blame] | 182 | efi_status_t ret = 0; |
| 183 | void *fdt, *new_fdt; |
Alexander Graf | ad0c1a3 | 2016-04-11 23:51:01 +0200 | [diff] [blame] | 184 | u64 new_fdt_addr; |
Simon Glass | 9dff490 | 2018-08-08 03:54:30 -0600 | [diff] [blame] | 185 | uint fdt_size; |
Alexander Graf | ad0c1a3 | 2016-04-11 23:51:01 +0200 | [diff] [blame] | 186 | int i; |
Alexander Graf | 0d9d501 | 2016-04-11 16:55:26 +0200 | [diff] [blame] | 187 | |
Simon Glass | 9dff490 | 2018-08-08 03:54:30 -0600 | [diff] [blame] | 188 | for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) { |
| 189 | u64 ram_start = gd->bd->bi_dram[i].start; |
| 190 | u64 ram_size = gd->bd->bi_dram[i].size; |
Alexander Graf | 0d9d501 | 2016-04-11 16:55:26 +0200 | [diff] [blame] | 191 | |
Alexander Graf | ad0c1a3 | 2016-04-11 23:51:01 +0200 | [diff] [blame] | 192 | if (!ram_size) |
| 193 | continue; |
| 194 | |
| 195 | if (ram_start < fdt_ram_start) |
| 196 | fdt_ram_start = ram_start; |
| 197 | } |
| 198 | |
Simon Glass | bc9a638 | 2018-06-18 08:08:25 -0600 | [diff] [blame] | 199 | /* |
Heinrich Schuchardt | c3772ca | 2018-11-18 17:58:49 +0100 | [diff] [blame] | 200 | * Give us at least 12 KiB of breathing room in case the device tree |
| 201 | * needs to be expanded later. |
Simon Glass | bc9a638 | 2018-06-18 08:08:25 -0600 | [diff] [blame] | 202 | */ |
Heinrich Schuchardt | 16b615d | 2018-11-18 17:58:52 +0100 | [diff] [blame] | 203 | fdt = *fdtp; |
Heinrich Schuchardt | c3772ca | 2018-11-18 17:58:49 +0100 | [diff] [blame] | 204 | fdt_pages = efi_size_in_pages(fdt_totalsize(fdt) + 0x3000); |
| 205 | fdt_size = fdt_pages << EFI_PAGE_SHIFT; |
Alexander Graf | ad0c1a3 | 2016-04-11 23:51:01 +0200 | [diff] [blame] | 206 | |
Heinrich Schuchardt | 16b615d | 2018-11-18 17:58:52 +0100 | [diff] [blame] | 207 | /* |
| 208 | * Safe fdt location is at 127 MiB. |
| 209 | * On the sandbox convert from the sandbox address space. |
| 210 | */ |
| 211 | new_fdt_addr = (uintptr_t)map_sysmem(fdt_ram_start + 0x7f00000 + |
| 212 | fdt_size, 0); |
Simon Glass | 9dff490 | 2018-08-08 03:54:30 -0600 | [diff] [blame] | 213 | ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS, |
Heinrich Schuchardt | 42a426e | 2020-05-06 20:32:31 +0200 | [diff] [blame] | 214 | EFI_ACPI_RECLAIM_MEMORY, fdt_pages, |
Simon Glass | 9dff490 | 2018-08-08 03:54:30 -0600 | [diff] [blame] | 215 | &new_fdt_addr); |
| 216 | if (ret != EFI_SUCCESS) { |
Alexander Graf | ad0c1a3 | 2016-04-11 23:51:01 +0200 | [diff] [blame] | 217 | /* If we can't put it there, put it somewhere */ |
xypron.glpk@gmx.de | a44bffc | 2017-08-11 21:19:25 +0200 | [diff] [blame] | 218 | new_fdt_addr = (ulong)memalign(EFI_PAGE_SIZE, fdt_size); |
Simon Glass | 9dff490 | 2018-08-08 03:54:30 -0600 | [diff] [blame] | 219 | ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS, |
Heinrich Schuchardt | 42a426e | 2020-05-06 20:32:31 +0200 | [diff] [blame] | 220 | EFI_ACPI_RECLAIM_MEMORY, fdt_pages, |
Simon Glass | 9dff490 | 2018-08-08 03:54:30 -0600 | [diff] [blame] | 221 | &new_fdt_addr); |
| 222 | if (ret != EFI_SUCCESS) { |
Heinrich Schuchardt | c001837 | 2020-07-17 20:21:00 +0200 | [diff] [blame] | 223 | log_err("ERROR: Failed to reserve space for FDT\n"); |
Simon Glass | 9dff490 | 2018-08-08 03:54:30 -0600 | [diff] [blame] | 224 | goto done; |
Alexander Graf | 85a6e9b | 2017-07-03 13:32:35 +0200 | [diff] [blame] | 225 | } |
Alexander Graf | ad0c1a3 | 2016-04-11 23:51:01 +0200 | [diff] [blame] | 226 | } |
Heinrich Schuchardt | 16b615d | 2018-11-18 17:58:52 +0100 | [diff] [blame] | 227 | new_fdt = (void *)(uintptr_t)new_fdt_addr; |
Alexander Graf | 0d9d501 | 2016-04-11 16:55:26 +0200 | [diff] [blame] | 228 | memcpy(new_fdt, fdt, fdt_totalsize(fdt)); |
| 229 | fdt_set_totalsize(new_fdt, fdt_size); |
| 230 | |
Heinrich Schuchardt | 16b615d | 2018-11-18 17:58:52 +0100 | [diff] [blame] | 231 | *fdtp = (void *)(uintptr_t)new_fdt_addr; |
Simon Glass | 9dff490 | 2018-08-08 03:54:30 -0600 | [diff] [blame] | 232 | done: |
| 233 | return ret; |
Alexander Graf | 0d9d501 | 2016-04-11 16:55:26 +0200 | [diff] [blame] | 234 | } |
| 235 | |
Heinrich Schuchardt | 4cbb293 | 2020-08-27 12:52:20 +0200 | [diff] [blame] | 236 | /** |
Heinrich Schuchardt | 6182495 | 2019-04-20 13:33:55 +0200 | [diff] [blame] | 237 | * get_config_table() - get configuration table |
| 238 | * |
| 239 | * @guid: GUID of the configuration table |
| 240 | * Return: pointer to configuration table or NULL |
| 241 | */ |
| 242 | static void *get_config_table(const efi_guid_t *guid) |
| 243 | { |
| 244 | size_t i; |
| 245 | |
| 246 | for (i = 0; i < systab.nr_tables; i++) { |
| 247 | if (!guidcmp(guid, &systab.tables[i].guid)) |
| 248 | return systab.tables[i].table; |
| 249 | } |
| 250 | return NULL; |
| 251 | } |
| 252 | |
| 253 | #endif /* !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) */ |
| 254 | |
| 255 | /** |
Heinrich Schuchardt | 7a59725 | 2019-11-28 06:46:09 +0100 | [diff] [blame] | 256 | * efi_install_fdt() - install device tree |
Heinrich Schuchardt | e2d82f8 | 2019-05-12 20:16:25 +0200 | [diff] [blame] | 257 | * |
Heinrich Schuchardt | 7d4d551 | 2020-02-07 22:10:49 +0100 | [diff] [blame] | 258 | * If fdt is not EFI_FDT_USE_INTERNAL, the device tree located at that memory |
| 259 | * address will will be installed as configuration table, otherwise the device |
| 260 | * tree located at the address indicated by environment variable fdt_addr or as |
| 261 | * fallback fdtcontroladdr will be used. |
Heinrich Schuchardt | e2d82f8 | 2019-05-12 20:16:25 +0200 | [diff] [blame] | 262 | * |
Heinrich Schuchardt | 7a59725 | 2019-11-28 06:46:09 +0100 | [diff] [blame] | 263 | * On architectures using ACPI tables device trees shall not be installed as |
| 264 | * configuration table. |
Heinrich Schuchardt | e2d82f8 | 2019-05-12 20:16:25 +0200 | [diff] [blame] | 265 | * |
Heinrich Schuchardt | 7d4d551 | 2020-02-07 22:10:49 +0100 | [diff] [blame] | 266 | * @fdt: address of device tree or EFI_FDT_USE_INTERNAL to use the |
Heinrich Schuchardt | 753aa18 | 2019-12-04 12:31:12 +0100 | [diff] [blame] | 267 | * the hardware device tree as indicated by environment variable |
| 268 | * fdt_addr or as fallback the internal device tree as indicated by |
| 269 | * the environment variable fdtcontroladdr |
AKASHI Takahiro | e878e6a | 2019-04-19 12:22:29 +0900 | [diff] [blame] | 270 | * Return: status code |
AKASHI Takahiro | e878e6a | 2019-04-19 12:22:29 +0900 | [diff] [blame] | 271 | */ |
Heinrich Schuchardt | f64f223 | 2019-12-08 01:07:01 +0100 | [diff] [blame] | 272 | efi_status_t efi_install_fdt(void *fdt) |
AKASHI Takahiro | e878e6a | 2019-04-19 12:22:29 +0900 | [diff] [blame] | 273 | { |
Heinrich Schuchardt | 6182495 | 2019-04-20 13:33:55 +0200 | [diff] [blame] | 274 | /* |
| 275 | * The EBBR spec requires that we have either an FDT or an ACPI table |
| 276 | * but not both. |
| 277 | */ |
| 278 | #if CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) |
Heinrich Schuchardt | f64f223 | 2019-12-08 01:07:01 +0100 | [diff] [blame] | 279 | if (fdt) { |
Alexander Graf | 0832dd2 | 2022-02-27 13:18:56 +0100 | [diff] [blame] | 280 | log_warning("WARNING: Can't have ACPI table and device tree - ignoring DT.\n"); |
| 281 | return EFI_SUCCESS; |
Heinrich Schuchardt | 6182495 | 2019-04-20 13:33:55 +0200 | [diff] [blame] | 282 | } |
| 283 | #else |
Simon Glass | d9d7c20 | 2022-09-06 20:26:50 -0600 | [diff] [blame] | 284 | struct bootm_headers img = { 0 }; |
AKASHI Takahiro | e878e6a | 2019-04-19 12:22:29 +0900 | [diff] [blame] | 285 | efi_status_t ret; |
| 286 | |
Heinrich Schuchardt | f64f223 | 2019-12-08 01:07:01 +0100 | [diff] [blame] | 287 | if (fdt == EFI_FDT_USE_INTERNAL) { |
Heinrich Schuchardt | 7a59725 | 2019-11-28 06:46:09 +0100 | [diff] [blame] | 288 | const char *fdt_opt; |
Heinrich Schuchardt | f64f223 | 2019-12-08 01:07:01 +0100 | [diff] [blame] | 289 | uintptr_t fdt_addr; |
Heinrich Schuchardt | 7a59725 | 2019-11-28 06:46:09 +0100 | [diff] [blame] | 290 | |
Heinrich Schuchardt | 6182495 | 2019-04-20 13:33:55 +0200 | [diff] [blame] | 291 | /* Look for device tree that is already installed */ |
| 292 | if (get_config_table(&efi_guid_fdt)) |
| 293 | return EFI_SUCCESS; |
Heinrich Schuchardt | 753aa18 | 2019-12-04 12:31:12 +0100 | [diff] [blame] | 294 | /* Check if there is a hardware device tree */ |
| 295 | fdt_opt = env_get("fdt_addr"); |
| 296 | /* Use our own device tree as fallback */ |
Heinrich Schuchardt | 6182495 | 2019-04-20 13:33:55 +0200 | [diff] [blame] | 297 | if (!fdt_opt) { |
Heinrich Schuchardt | 753aa18 | 2019-12-04 12:31:12 +0100 | [diff] [blame] | 298 | fdt_opt = env_get("fdtcontroladdr"); |
| 299 | if (!fdt_opt) { |
Heinrich Schuchardt | c001837 | 2020-07-17 20:21:00 +0200 | [diff] [blame] | 300 | log_err("ERROR: need device tree\n"); |
Heinrich Schuchardt | 753aa18 | 2019-12-04 12:31:12 +0100 | [diff] [blame] | 301 | return EFI_NOT_FOUND; |
| 302 | } |
AKASHI Takahiro | 3ffc52f | 2019-04-19 12:22:30 +0900 | [diff] [blame] | 303 | } |
Simon Glass | 7e5f460 | 2021-07-24 09:03:29 -0600 | [diff] [blame] | 304 | fdt_addr = hextoul(fdt_opt, NULL); |
Heinrich Schuchardt | 6182495 | 2019-04-20 13:33:55 +0200 | [diff] [blame] | 305 | if (!fdt_addr) { |
Heinrich Schuchardt | c001837 | 2020-07-17 20:21:00 +0200 | [diff] [blame] | 306 | log_err("ERROR: invalid $fdt_addr or $fdtcontroladdr\n"); |
AKASHI Takahiro | 3ffc52f | 2019-04-19 12:22:30 +0900 | [diff] [blame] | 307 | return EFI_LOAD_ERROR; |
| 308 | } |
Heinrich Schuchardt | f64f223 | 2019-12-08 01:07:01 +0100 | [diff] [blame] | 309 | fdt = map_sysmem(fdt_addr, 0); |
AKASHI Takahiro | e878e6a | 2019-04-19 12:22:29 +0900 | [diff] [blame] | 310 | } |
| 311 | |
Heinrich Schuchardt | 6182495 | 2019-04-20 13:33:55 +0200 | [diff] [blame] | 312 | /* Install device tree */ |
Heinrich Schuchardt | 6182495 | 2019-04-20 13:33:55 +0200 | [diff] [blame] | 313 | if (fdt_check_header(fdt)) { |
Heinrich Schuchardt | c001837 | 2020-07-17 20:21:00 +0200 | [diff] [blame] | 314 | log_err("ERROR: invalid device tree\n"); |
Heinrich Schuchardt | 6182495 | 2019-04-20 13:33:55 +0200 | [diff] [blame] | 315 | return EFI_LOAD_ERROR; |
| 316 | } |
| 317 | |
Heinrich Schuchardt | 6182495 | 2019-04-20 13:33:55 +0200 | [diff] [blame] | 318 | /* Prepare device tree for payload */ |
| 319 | ret = copy_fdt(&fdt); |
| 320 | if (ret) { |
Heinrich Schuchardt | c001837 | 2020-07-17 20:21:00 +0200 | [diff] [blame] | 321 | log_err("ERROR: out of memory\n"); |
Heinrich Schuchardt | 6182495 | 2019-04-20 13:33:55 +0200 | [diff] [blame] | 322 | return EFI_OUT_OF_RESOURCES; |
| 323 | } |
| 324 | |
| 325 | if (image_setup_libfdt(&img, fdt, 0, NULL)) { |
Heinrich Schuchardt | c001837 | 2020-07-17 20:21:00 +0200 | [diff] [blame] | 326 | log_err("ERROR: failed to process device tree\n"); |
Heinrich Schuchardt | 6182495 | 2019-04-20 13:33:55 +0200 | [diff] [blame] | 327 | return EFI_LOAD_ERROR; |
| 328 | } |
| 329 | |
Heinrich Schuchardt | fef907b | 2020-03-14 10:59:34 +0100 | [diff] [blame] | 330 | /* Create memory reservations as indicated by the device tree */ |
| 331 | efi_carve_out_dt_rsv(fdt); |
| 332 | |
Ilias Apalodimas | a2f1482 | 2022-01-03 14:07:37 +0200 | [diff] [blame] | 333 | efi_try_purge_kaslr_seed(fdt); |
| 334 | |
Etienne Carriere | aa2d394 | 2023-02-16 17:29:48 +0100 | [diff] [blame] | 335 | if (CONFIG_IS_ENABLED(EFI_TCG2_PROTOCOL_MEASURE_DTB)) { |
| 336 | ret = efi_tcg2_measure_dtb(fdt); |
| 337 | if (ret == EFI_SECURITY_VIOLATION) { |
| 338 | log_err("ERROR: failed to measure DTB\n"); |
| 339 | return ret; |
| 340 | } |
| 341 | } |
| 342 | |
Heinrich Schuchardt | 6182495 | 2019-04-20 13:33:55 +0200 | [diff] [blame] | 343 | /* Install device tree as UEFI table */ |
| 344 | ret = efi_install_configuration_table(&efi_guid_fdt, fdt); |
| 345 | if (ret != EFI_SUCCESS) { |
Heinrich Schuchardt | c001837 | 2020-07-17 20:21:00 +0200 | [diff] [blame] | 346 | log_err("ERROR: failed to install device tree\n"); |
Heinrich Schuchardt | 6182495 | 2019-04-20 13:33:55 +0200 | [diff] [blame] | 347 | return ret; |
| 348 | } |
| 349 | #endif /* GENERATE_ACPI_TABLE */ |
| 350 | |
AKASHI Takahiro | e878e6a | 2019-04-19 12:22:29 +0900 | [diff] [blame] | 351 | return EFI_SUCCESS; |
| 352 | } |
| 353 | |
Simon Glass | 5e2f039 | 2018-11-25 20:14:39 -0700 | [diff] [blame] | 354 | /** |
Heinrich Schuchardt | c982874 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 355 | * do_bootefi_exec() - execute EFI binary |
| 356 | * |
Heinrich Schuchardt | 72e1fca | 2020-08-15 23:10:22 +0200 | [diff] [blame] | 357 | * The image indicated by @handle is started. When it returns the allocated |
| 358 | * memory for the @load_options is freed. |
| 359 | * |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 360 | * @handle: handle of loaded image |
Heinrich Schuchardt | 72e1fca | 2020-08-15 23:10:22 +0200 | [diff] [blame] | 361 | * @load_options: load options |
Heinrich Schuchardt | c982874 | 2018-09-23 17:21:51 +0200 | [diff] [blame] | 362 | * Return: status code |
| 363 | * |
| 364 | * Load the EFI binary into a newly assigned memory unwinding the relocation |
| 365 | * information, install the loaded image protocol, and call the binary. |
Alexander Graf | b993933 | 2016-03-10 00:27:20 +0100 | [diff] [blame] | 366 | */ |
Heinrich Schuchardt | 0ad6400 | 2020-08-07 17:49:39 +0200 | [diff] [blame] | 367 | static efi_status_t do_bootefi_exec(efi_handle_t handle, void *load_options) |
Alexander Graf | b993933 | 2016-03-10 00:27:20 +0100 | [diff] [blame] | 368 | { |
Heinrich Schuchardt | 45204b1 | 2018-03-03 15:29:01 +0100 | [diff] [blame] | 369 | efi_status_t ret; |
Heinrich Schuchardt | 556d8dc | 2019-04-30 17:57:30 +0200 | [diff] [blame] | 370 | efi_uintn_t exit_data_size = 0; |
| 371 | u16 *exit_data = NULL; |
Rob Clark | bf19273 | 2017-10-10 08:23:06 -0400 | [diff] [blame] | 372 | |
Heinrich Schuchardt | 82d01f0 | 2021-01-24 14:34:12 +0000 | [diff] [blame] | 373 | /* On ARM switch from EL3 or secure mode to EL2 or non-secure mode */ |
| 374 | switch_to_non_secure_mode(); |
| 375 | |
Masahisa Kojima | 3fa9ed9 | 2022-02-22 09:58:30 +0900 | [diff] [blame] | 376 | /* |
| 377 | * The UEFI standard requires that the watchdog timer is set to five |
| 378 | * minutes when invoking an EFI boot option. |
| 379 | * |
| 380 | * Unified Extensible Firmware Interface (UEFI), version 2.7 Errata A |
| 381 | * 7.5. Miscellaneous Boot Services - EFI_BOOT_SERVICES.SetWatchdogTimer |
| 382 | */ |
| 383 | ret = efi_set_watchdog(300); |
| 384 | if (ret != EFI_SUCCESS) { |
| 385 | log_err("ERROR: Failed to set watchdog timer\n"); |
| 386 | goto out; |
| 387 | } |
| 388 | |
Alexander Graf | b993933 | 2016-03-10 00:27:20 +0100 | [diff] [blame] | 389 | /* Call our payload! */ |
Heinrich Schuchardt | 556d8dc | 2019-04-30 17:57:30 +0200 | [diff] [blame] | 390 | ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data)); |
Heinrich Schuchardt | c001837 | 2020-07-17 20:21:00 +0200 | [diff] [blame] | 391 | if (ret != EFI_SUCCESS) { |
| 392 | log_err("## Application failed, r = %lu\n", |
| 393 | ret & ~EFI_ERROR_MASK); |
| 394 | if (exit_data) { |
| 395 | log_err("## %ls\n", exit_data); |
| 396 | efi_free_pool(exit_data); |
| 397 | } |
Heinrich Schuchardt | 556d8dc | 2019-04-30 17:57:30 +0200 | [diff] [blame] | 398 | } |
Rob Clark | 95c5553 | 2017-09-13 18:05:33 -0400 | [diff] [blame] | 399 | |
AKASHI Takahiro | 3fc2b16 | 2019-04-19 12:22:31 +0900 | [diff] [blame] | 400 | efi_restore_gd(); |
Simon Glass | 5e2f039 | 2018-11-25 20:14:39 -0700 | [diff] [blame] | 401 | |
Masahisa Kojima | 3fa9ed9 | 2022-02-22 09:58:30 +0900 | [diff] [blame] | 402 | out: |
Heinrich Schuchardt | a3850e4 | 2020-01-03 22:53:42 +0100 | [diff] [blame] | 403 | free(load_options); |
Rob Clark | 95c5553 | 2017-09-13 18:05:33 -0400 | [diff] [blame] | 404 | |
Ilias Apalodimas | 70089c1 | 2022-10-16 11:36:32 +0300 | [diff] [blame] | 405 | if (IS_ENABLED(CONFIG_EFI_LOAD_FILE2_INITRD)) { |
| 406 | if (efi_initrd_deregister() != EFI_SUCCESS) |
| 407 | log_err("Failed to remove loadfile2 for initrd\n"); |
| 408 | } |
Ilias Apalodimas | 53f6a5a | 2021-03-17 21:55:00 +0200 | [diff] [blame] | 409 | |
Masahisa Kojima | 3fa9ed9 | 2022-02-22 09:58:30 +0900 | [diff] [blame] | 410 | /* Control is returned to U-Boot, disable EFI watchdog */ |
| 411 | efi_set_watchdog(0); |
| 412 | |
Rob Clark | 95c5553 | 2017-09-13 18:05:33 -0400 | [diff] [blame] | 413 | return ret; |
Alexander Graf | b993933 | 2016-03-10 00:27:20 +0100 | [diff] [blame] | 414 | } |
| 415 | |
AKASHI Takahiro | d6b2189 | 2019-04-19 12:22:33 +0900 | [diff] [blame] | 416 | /** |
Heinrich Schuchardt | 7e92db8 | 2019-05-12 20:16:25 +0200 | [diff] [blame] | 417 | * do_efibootmgr() - execute EFI boot manager |
AKASHI Takahiro | d6b2189 | 2019-04-19 12:22:33 +0900 | [diff] [blame] | 418 | * |
AKASHI Takahiro | d6b2189 | 2019-04-19 12:22:33 +0900 | [diff] [blame] | 419 | * Return: status code |
AKASHI Takahiro | d6b2189 | 2019-04-19 12:22:33 +0900 | [diff] [blame] | 420 | */ |
Heinrich Schuchardt | 7e92db8 | 2019-05-12 20:16:25 +0200 | [diff] [blame] | 421 | static int do_efibootmgr(void) |
AKASHI Takahiro | cc999d5 | 2019-04-19 12:22:32 +0900 | [diff] [blame] | 422 | { |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 423 | efi_handle_t handle; |
AKASHI Takahiro | d6b2189 | 2019-04-19 12:22:33 +0900 | [diff] [blame] | 424 | efi_status_t ret; |
Heinrich Schuchardt | 0ad6400 | 2020-08-07 17:49:39 +0200 | [diff] [blame] | 425 | void *load_options; |
AKASHI Takahiro | d6b2189 | 2019-04-19 12:22:33 +0900 | [diff] [blame] | 426 | |
Heinrich Schuchardt | 0ad6400 | 2020-08-07 17:49:39 +0200 | [diff] [blame] | 427 | ret = efi_bootmgr_load(&handle, &load_options); |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 428 | if (ret != EFI_SUCCESS) { |
Heinrich Schuchardt | c001837 | 2020-07-17 20:21:00 +0200 | [diff] [blame] | 429 | log_notice("EFI boot manager: Cannot load any image\n"); |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 430 | return CMD_RET_FAILURE; |
| 431 | } |
AKASHI Takahiro | cc999d5 | 2019-04-19 12:22:32 +0900 | [diff] [blame] | 432 | |
Heinrich Schuchardt | 0ad6400 | 2020-08-07 17:49:39 +0200 | [diff] [blame] | 433 | ret = do_bootefi_exec(handle, load_options); |
AKASHI Takahiro | cc999d5 | 2019-04-19 12:22:32 +0900 | [diff] [blame] | 434 | |
AKASHI Takahiro | d6b2189 | 2019-04-19 12:22:33 +0900 | [diff] [blame] | 435 | if (ret != EFI_SUCCESS) |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 436 | return CMD_RET_FAILURE; |
AKASHI Takahiro | cc999d5 | 2019-04-19 12:22:32 +0900 | [diff] [blame] | 437 | |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 438 | return CMD_RET_SUCCESS; |
AKASHI Takahiro | cc999d5 | 2019-04-19 12:22:32 +0900 | [diff] [blame] | 439 | } |
| 440 | |
Heinrich Schuchardt | 810371a | 2019-07-14 13:00:44 +0200 | [diff] [blame] | 441 | /** |
Heinrich Schuchardt | 7e92db8 | 2019-05-12 20:16:25 +0200 | [diff] [blame] | 442 | * do_bootefi_image() - execute EFI binary |
| 443 | * |
| 444 | * Set up memory image for the binary to be loaded, prepare device path, and |
| 445 | * then call do_bootefi_exec() to execute it. |
AKASHI Takahiro | e2e4098 | 2019-04-19 12:22:34 +0900 | [diff] [blame] | 446 | * |
Kyle Evans | 2058983 | 2022-04-10 16:05:55 -0500 | [diff] [blame] | 447 | * @image_opt: string with image start address |
| 448 | * @size_opt: string with image size or NULL |
AKASHI Takahiro | e2e4098 | 2019-04-19 12:22:34 +0900 | [diff] [blame] | 449 | * Return: status code |
AKASHI Takahiro | e2e4098 | 2019-04-19 12:22:34 +0900 | [diff] [blame] | 450 | */ |
Kyle Evans | 2058983 | 2022-04-10 16:05:55 -0500 | [diff] [blame] | 451 | static int do_bootefi_image(const char *image_opt, const char *size_opt) |
AKASHI Takahiro | e2e4098 | 2019-04-19 12:22:34 +0900 | [diff] [blame] | 452 | { |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 453 | void *image_buf; |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 454 | unsigned long addr, size; |
AKASHI Takahiro | e2e4098 | 2019-04-19 12:22:34 +0900 | [diff] [blame] | 455 | efi_status_t ret; |
| 456 | |
AKASHI Takahiro | e2e4098 | 2019-04-19 12:22:34 +0900 | [diff] [blame] | 457 | #ifdef CONFIG_CMD_BOOTEFI_HELLO |
| 458 | if (!strcmp(image_opt, "hello")) { |
Heinrich Schuchardt | bb33c79 | 2021-01-12 17:44:08 +0100 | [diff] [blame] | 459 | image_buf = __efi_helloworld_begin; |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 460 | size = __efi_helloworld_end - __efi_helloworld_begin; |
Heinrich Schuchardt | 5f59518 | 2021-01-12 12:46:24 +0100 | [diff] [blame] | 461 | efi_clear_bootdev(); |
AKASHI Takahiro | e2e4098 | 2019-04-19 12:22:34 +0900 | [diff] [blame] | 462 | } else |
| 463 | #endif |
| 464 | { |
Heinrich Schuchardt | 5f59518 | 2021-01-12 12:46:24 +0100 | [diff] [blame] | 465 | addr = strtoul(image_opt, NULL, 16); |
AKASHI Takahiro | e2e4098 | 2019-04-19 12:22:34 +0900 | [diff] [blame] | 466 | /* Check that a numeric value was passed */ |
Heinrich Schuchardt | 5f59518 | 2021-01-12 12:46:24 +0100 | [diff] [blame] | 467 | if (!addr) |
AKASHI Takahiro | e2e4098 | 2019-04-19 12:22:34 +0900 | [diff] [blame] | 468 | return CMD_RET_USAGE; |
Heinrich Schuchardt | 5f59518 | 2021-01-12 12:46:24 +0100 | [diff] [blame] | 469 | image_buf = map_sysmem(addr, 0); |
| 470 | |
Kyle Evans | 2058983 | 2022-04-10 16:05:55 -0500 | [diff] [blame] | 471 | if (size_opt) { |
| 472 | size = strtoul(size_opt, NULL, 16); |
| 473 | if (!size) |
| 474 | return CMD_RET_USAGE; |
| 475 | efi_clear_bootdev(); |
| 476 | } else { |
| 477 | if (image_buf != image_addr) { |
| 478 | log_err("No UEFI binary known at %s\n", |
| 479 | image_opt); |
| 480 | return CMD_RET_FAILURE; |
| 481 | } |
| 482 | size = image_size; |
Heinrich Schuchardt | 5f59518 | 2021-01-12 12:46:24 +0100 | [diff] [blame] | 483 | } |
AKASHI Takahiro | e2e4098 | 2019-04-19 12:22:34 +0900 | [diff] [blame] | 484 | } |
Heinrich Schuchardt | f9ceb6a | 2019-12-07 20:51:06 +0100 | [diff] [blame] | 485 | ret = efi_run_image(image_buf, size); |
AKASHI Takahiro | e2e4098 | 2019-04-19 12:22:34 +0900 | [diff] [blame] | 486 | |
Heinrich Schuchardt | f9ceb6a | 2019-12-07 20:51:06 +0100 | [diff] [blame] | 487 | if (ret != EFI_SUCCESS) |
| 488 | return CMD_RET_FAILURE; |
| 489 | |
| 490 | return CMD_RET_SUCCESS; |
| 491 | } |
| 492 | |
| 493 | /** |
| 494 | * efi_run_image() - run loaded UEFI image |
| 495 | * |
| 496 | * @source_buffer: memory address of the UEFI image |
| 497 | * @source_size: size of the UEFI image |
| 498 | * Return: status code |
| 499 | */ |
| 500 | efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size) |
| 501 | { |
| 502 | efi_handle_t mem_handle = NULL, handle; |
| 503 | struct efi_device_path *file_path = NULL; |
Heinrich Schuchardt | c2f0103 | 2020-08-25 17:54:05 +0000 | [diff] [blame] | 504 | struct efi_device_path *msg_path; |
Ilias Apalodimas | a75e835 | 2022-10-06 16:08:44 +0300 | [diff] [blame] | 505 | efi_status_t ret, ret2; |
Heinrich Schuchardt | c2f0103 | 2020-08-25 17:54:05 +0000 | [diff] [blame] | 506 | u16 *load_options; |
Heinrich Schuchardt | f9ceb6a | 2019-12-07 20:51:06 +0100 | [diff] [blame] | 507 | |
| 508 | if (!bootefi_device_path || !bootefi_image_path) { |
Simon Glass | d837cb1 | 2022-01-29 14:58:37 -0700 | [diff] [blame] | 509 | log_debug("Not loaded from disk\n"); |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 510 | /* |
| 511 | * Special case for efi payload not loaded from disk, |
| 512 | * such as 'bootefi hello' or for example payload |
| 513 | * loaded directly into memory via JTAG, etc: |
| 514 | */ |
| 515 | file_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, |
Heinrich Schuchardt | f9ceb6a | 2019-12-07 20:51:06 +0100 | [diff] [blame] | 516 | (uintptr_t)source_buffer, |
| 517 | source_size); |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 518 | /* |
| 519 | * Make sure that device for device_path exist |
| 520 | * in load_image(). Otherwise, shell and grub will fail. |
| 521 | */ |
Ilias Apalodimas | a75e835 | 2022-10-06 16:08:44 +0300 | [diff] [blame] | 522 | ret = efi_install_multiple_protocol_interfaces(&mem_handle, |
| 523 | &efi_guid_device_path, |
| 524 | file_path, NULL); |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 525 | if (ret != EFI_SUCCESS) |
| 526 | goto out; |
Heinrich Schuchardt | c2f0103 | 2020-08-25 17:54:05 +0000 | [diff] [blame] | 527 | msg_path = file_path; |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 528 | } else { |
Heinrich Schuchardt | f9ceb6a | 2019-12-07 20:51:06 +0100 | [diff] [blame] | 529 | file_path = efi_dp_append(bootefi_device_path, |
| 530 | bootefi_image_path); |
Heinrich Schuchardt | c2f0103 | 2020-08-25 17:54:05 +0000 | [diff] [blame] | 531 | msg_path = bootefi_image_path; |
Simon Glass | d837cb1 | 2022-01-29 14:58:37 -0700 | [diff] [blame] | 532 | log_debug("Loaded from disk\n"); |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 533 | } |
| 534 | |
Heinrich Schuchardt | c2f0103 | 2020-08-25 17:54:05 +0000 | [diff] [blame] | 535 | log_info("Booting %pD\n", msg_path); |
| 536 | |
Heinrich Schuchardt | f9ceb6a | 2019-12-07 20:51:06 +0100 | [diff] [blame] | 537 | ret = EFI_CALL(efi_load_image(false, efi_root, file_path, source_buffer, |
| 538 | source_size, &handle)); |
Heinrich Schuchardt | c2f0103 | 2020-08-25 17:54:05 +0000 | [diff] [blame] | 539 | if (ret != EFI_SUCCESS) { |
| 540 | log_err("Loading image failed\n"); |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 541 | goto out; |
Heinrich Schuchardt | c2f0103 | 2020-08-25 17:54:05 +0000 | [diff] [blame] | 542 | } |
Heinrich Schuchardt | 0ad6400 | 2020-08-07 17:49:39 +0200 | [diff] [blame] | 543 | |
| 544 | /* Transfer environment variable as load options */ |
| 545 | ret = efi_env_set_load_options(handle, "bootargs", &load_options); |
| 546 | if (ret != EFI_SUCCESS) |
| 547 | goto out; |
| 548 | |
| 549 | ret = do_bootefi_exec(handle, load_options); |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 550 | |
| 551 | out: |
Ilias Apalodimas | a75e835 | 2022-10-06 16:08:44 +0300 | [diff] [blame] | 552 | ret2 = efi_uninstall_multiple_protocol_interfaces(mem_handle, |
| 553 | &efi_guid_device_path, |
| 554 | file_path, NULL); |
Heinrich Schuchardt | 4fe050e | 2020-04-20 12:44:56 +0200 | [diff] [blame] | 555 | efi_free_pool(file_path); |
Ilias Apalodimas | a75e835 | 2022-10-06 16:08:44 +0300 | [diff] [blame] | 556 | return (ret != EFI_SUCCESS) ? ret : ret2; |
AKASHI Takahiro | e2e4098 | 2019-04-19 12:22:34 +0900 | [diff] [blame] | 557 | } |
| 558 | |
Simon Glass | d9717ea | 2018-11-25 20:14:37 -0700 | [diff] [blame] | 559 | #ifdef CONFIG_CMD_BOOTEFI_SELFTEST |
AKASHI Takahiro | 3fc2b16 | 2019-04-19 12:22:31 +0900 | [diff] [blame] | 560 | static efi_status_t bootefi_run_prepare(const char *load_options_path, |
| 561 | struct efi_device_path *device_path, |
| 562 | struct efi_device_path *image_path, |
| 563 | struct efi_loaded_image_obj **image_objp, |
| 564 | struct efi_loaded_image **loaded_image_infop) |
| 565 | { |
| 566 | efi_status_t ret; |
Heinrich Schuchardt | a3850e4 | 2020-01-03 22:53:42 +0100 | [diff] [blame] | 567 | u16 *load_options; |
AKASHI Takahiro | 3fc2b16 | 2019-04-19 12:22:31 +0900 | [diff] [blame] | 568 | |
| 569 | ret = efi_setup_loaded_image(device_path, image_path, image_objp, |
| 570 | loaded_image_infop); |
| 571 | if (ret != EFI_SUCCESS) |
| 572 | return ret; |
| 573 | |
| 574 | /* Transfer environment variable as load options */ |
Heinrich Schuchardt | 1064d04 | 2020-08-07 17:47:13 +0200 | [diff] [blame] | 575 | return efi_env_set_load_options((efi_handle_t)*image_objp, |
| 576 | load_options_path, |
| 577 | &load_options); |
AKASHI Takahiro | 3fc2b16 | 2019-04-19 12:22:31 +0900 | [diff] [blame] | 578 | } |
| 579 | |
Simon Glass | d9717ea | 2018-11-25 20:14:37 -0700 | [diff] [blame] | 580 | /** |
| 581 | * bootefi_test_prepare() - prepare to run an EFI test |
| 582 | * |
Heinrich Schuchardt | 1504bb0 | 2019-01-12 14:42:40 +0100 | [diff] [blame] | 583 | * Prepare to run a test as if it were provided by a loaded image. |
Simon Glass | d9717ea | 2018-11-25 20:14:37 -0700 | [diff] [blame] | 584 | * |
Heinrich Schuchardt | 1504bb0 | 2019-01-12 14:42:40 +0100 | [diff] [blame] | 585 | * @image_objp: pointer to be set to the loaded image handle |
| 586 | * @loaded_image_infop: pointer to be set to the loaded image protocol |
| 587 | * @path: dummy file path used to construct the device path |
| 588 | * set in the loaded image protocol |
| 589 | * @load_options_path: name of a U-Boot environment variable. Its value is |
| 590 | * set as load options in the loaded image protocol. |
| 591 | * Return: status code |
Simon Glass | d9717ea | 2018-11-25 20:14:37 -0700 | [diff] [blame] | 592 | */ |
| 593 | static efi_status_t bootefi_test_prepare |
| 594 | (struct efi_loaded_image_obj **image_objp, |
Heinrich Schuchardt | 1504bb0 | 2019-01-12 14:42:40 +0100 | [diff] [blame] | 595 | struct efi_loaded_image **loaded_image_infop, const char *path, |
| 596 | const char *load_options_path) |
Simon Glass | d9717ea | 2018-11-25 20:14:37 -0700 | [diff] [blame] | 597 | { |
Heinrich Schuchardt | 1504bb0 | 2019-01-12 14:42:40 +0100 | [diff] [blame] | 598 | efi_status_t ret; |
| 599 | |
Simon Glass | d9717ea | 2018-11-25 20:14:37 -0700 | [diff] [blame] | 600 | /* Construct a dummy device path */ |
Heinrich Schuchardt | 1504bb0 | 2019-01-12 14:42:40 +0100 | [diff] [blame] | 601 | bootefi_device_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, 0, 0); |
Simon Glass | d9717ea | 2018-11-25 20:14:37 -0700 | [diff] [blame] | 602 | if (!bootefi_device_path) |
| 603 | return EFI_OUT_OF_RESOURCES; |
Simon Glass | d9717ea | 2018-11-25 20:14:37 -0700 | [diff] [blame] | 604 | |
Heinrich Schuchardt | 1504bb0 | 2019-01-12 14:42:40 +0100 | [diff] [blame] | 605 | bootefi_image_path = efi_dp_from_file(NULL, 0, path); |
| 606 | if (!bootefi_image_path) { |
| 607 | ret = EFI_OUT_OF_RESOURCES; |
| 608 | goto failure; |
| 609 | } |
| 610 | |
| 611 | ret = bootefi_run_prepare(load_options_path, bootefi_device_path, |
| 612 | bootefi_image_path, image_objp, |
| 613 | loaded_image_infop); |
| 614 | if (ret == EFI_SUCCESS) |
| 615 | return ret; |
| 616 | |
Heinrich Schuchardt | 1504bb0 | 2019-01-12 14:42:40 +0100 | [diff] [blame] | 617 | failure: |
Heinrich Schuchardt | 5f59518 | 2021-01-12 12:46:24 +0100 | [diff] [blame] | 618 | efi_clear_bootdev(); |
Heinrich Schuchardt | 1504bb0 | 2019-01-12 14:42:40 +0100 | [diff] [blame] | 619 | return ret; |
Simon Glass | d9717ea | 2018-11-25 20:14:37 -0700 | [diff] [blame] | 620 | } |
| 621 | |
AKASHI Takahiro | 3fc2b16 | 2019-04-19 12:22:31 +0900 | [diff] [blame] | 622 | /** |
| 623 | * bootefi_run_finish() - finish up after running an EFI test |
| 624 | * |
| 625 | * @loaded_image_info: Pointer to a struct which holds the loaded image info |
| 626 | * @image_obj: Pointer to a struct which holds the loaded image object |
| 627 | */ |
| 628 | static void bootefi_run_finish(struct efi_loaded_image_obj *image_obj, |
| 629 | struct efi_loaded_image *loaded_image_info) |
| 630 | { |
| 631 | efi_restore_gd(); |
| 632 | free(loaded_image_info->load_options); |
| 633 | efi_delete_handle(&image_obj->header); |
| 634 | } |
| 635 | |
| 636 | /** |
Heinrich Schuchardt | 7e92db8 | 2019-05-12 20:16:25 +0200 | [diff] [blame] | 637 | * do_efi_selftest() - execute EFI selftest |
AKASHI Takahiro | 3fc2b16 | 2019-04-19 12:22:31 +0900 | [diff] [blame] | 638 | * |
AKASHI Takahiro | 3fc2b16 | 2019-04-19 12:22:31 +0900 | [diff] [blame] | 639 | * Return: status code |
AKASHI Takahiro | 3fc2b16 | 2019-04-19 12:22:31 +0900 | [diff] [blame] | 640 | */ |
Heinrich Schuchardt | 7e92db8 | 2019-05-12 20:16:25 +0200 | [diff] [blame] | 641 | static int do_efi_selftest(void) |
AKASHI Takahiro | 3fc2b16 | 2019-04-19 12:22:31 +0900 | [diff] [blame] | 642 | { |
| 643 | struct efi_loaded_image_obj *image_obj; |
| 644 | struct efi_loaded_image *loaded_image_info; |
| 645 | efi_status_t ret; |
| 646 | |
AKASHI Takahiro | 3fc2b16 | 2019-04-19 12:22:31 +0900 | [diff] [blame] | 647 | ret = bootefi_test_prepare(&image_obj, &loaded_image_info, |
| 648 | "\\selftest", "efi_selftest"); |
| 649 | if (ret != EFI_SUCCESS) |
| 650 | return CMD_RET_FAILURE; |
| 651 | |
| 652 | /* Execute the test */ |
| 653 | ret = EFI_CALL(efi_selftest(&image_obj->header, &systab)); |
| 654 | bootefi_run_finish(image_obj, loaded_image_info); |
| 655 | |
| 656 | return ret != EFI_SUCCESS; |
| 657 | } |
Simon Glass | d9717ea | 2018-11-25 20:14:37 -0700 | [diff] [blame] | 658 | #endif /* CONFIG_CMD_BOOTEFI_SELFTEST */ |
| 659 | |
Heinrich Schuchardt | 7e92db8 | 2019-05-12 20:16:25 +0200 | [diff] [blame] | 660 | /** |
| 661 | * do_bootefi() - execute `bootefi` command |
| 662 | * |
| 663 | * @cmdtp: table entry describing command |
| 664 | * @flag: bitmap indicating how the command was invoked |
| 665 | * @argc: number of arguments |
| 666 | * @argv: command line arguments |
| 667 | * Return: status code |
| 668 | */ |
Simon Glass | 0914011 | 2020-05-10 11:40:03 -0600 | [diff] [blame] | 669 | static int do_bootefi(struct cmd_tbl *cmdtp, int flag, int argc, |
| 670 | char *const argv[]) |
Alexander Graf | b993933 | 2016-03-10 00:27:20 +0100 | [diff] [blame] | 671 | { |
Heinrich Schuchardt | 7e92db8 | 2019-05-12 20:16:25 +0200 | [diff] [blame] | 672 | efi_status_t ret; |
Heinrich Schuchardt | 8131c85 | 2022-05-19 08:00:56 +0200 | [diff] [blame] | 673 | char *img_addr, *img_size, *str_copy, *pos; |
Heinrich Schuchardt | f64f223 | 2019-12-08 01:07:01 +0100 | [diff] [blame] | 674 | void *fdt; |
Heinrich Schuchardt | 7e92db8 | 2019-05-12 20:16:25 +0200 | [diff] [blame] | 675 | |
AKASHI Takahiro | 3fc2b16 | 2019-04-19 12:22:31 +0900 | [diff] [blame] | 676 | if (argc < 2) |
| 677 | return CMD_RET_USAGE; |
AKASHI Takahiro | d6b2189 | 2019-04-19 12:22:33 +0900 | [diff] [blame] | 678 | |
Heinrich Schuchardt | 7e92db8 | 2019-05-12 20:16:25 +0200 | [diff] [blame] | 679 | /* Initialize EFI drivers */ |
| 680 | ret = efi_init_obj_list(); |
| 681 | if (ret != EFI_SUCCESS) { |
Heinrich Schuchardt | c001837 | 2020-07-17 20:21:00 +0200 | [diff] [blame] | 682 | log_err("Error: Cannot initialize UEFI sub-system, r = %lu\n", |
| 683 | ret & ~EFI_ERROR_MASK); |
Heinrich Schuchardt | 7e92db8 | 2019-05-12 20:16:25 +0200 | [diff] [blame] | 684 | return CMD_RET_FAILURE; |
| 685 | } |
| 686 | |
Heinrich Schuchardt | 8131c85 | 2022-05-19 08:00:56 +0200 | [diff] [blame] | 687 | if (argc > 2) { |
Heinrich Schuchardt | f64f223 | 2019-12-08 01:07:01 +0100 | [diff] [blame] | 688 | uintptr_t fdt_addr; |
| 689 | |
Simon Glass | 7e5f460 | 2021-07-24 09:03:29 -0600 | [diff] [blame] | 690 | fdt_addr = hextoul(argv[2], NULL); |
Heinrich Schuchardt | f64f223 | 2019-12-08 01:07:01 +0100 | [diff] [blame] | 691 | fdt = map_sysmem(fdt_addr, 0); |
| 692 | } else { |
| 693 | fdt = EFI_FDT_USE_INTERNAL; |
| 694 | } |
| 695 | ret = efi_install_fdt(fdt); |
Heinrich Schuchardt | 7e92db8 | 2019-05-12 20:16:25 +0200 | [diff] [blame] | 696 | if (ret == EFI_INVALID_PARAMETER) |
| 697 | return CMD_RET_USAGE; |
| 698 | else if (ret != EFI_SUCCESS) |
| 699 | return CMD_RET_FAILURE; |
| 700 | |
Heinrich Schuchardt | ff2f532 | 2021-01-15 19:02:50 +0100 | [diff] [blame] | 701 | if (IS_ENABLED(CONFIG_CMD_BOOTEFI_BOOTMGR)) { |
| 702 | if (!strcmp(argv[1], "bootmgr")) |
| 703 | return do_efibootmgr(); |
| 704 | } |
AKASHI Takahiro | 3fc2b16 | 2019-04-19 12:22:31 +0900 | [diff] [blame] | 705 | #ifdef CONFIG_CMD_BOOTEFI_SELFTEST |
Heinrich Schuchardt | ff2f532 | 2021-01-15 19:02:50 +0100 | [diff] [blame] | 706 | if (!strcmp(argv[1], "selftest")) |
Heinrich Schuchardt | 7e92db8 | 2019-05-12 20:16:25 +0200 | [diff] [blame] | 707 | return do_efi_selftest(); |
AKASHI Takahiro | 3fc2b16 | 2019-04-19 12:22:31 +0900 | [diff] [blame] | 708 | #endif |
Heinrich Schuchardt | 8131c85 | 2022-05-19 08:00:56 +0200 | [diff] [blame] | 709 | str_copy = strdup(argv[1]); |
| 710 | if (!str_copy) { |
| 711 | log_err("Out of memory\n"); |
| 712 | return CMD_RET_FAILURE; |
| 713 | } |
| 714 | pos = str_copy; |
| 715 | img_addr = strsep(&pos, ":"); |
| 716 | img_size = strsep(&pos, ":"); |
| 717 | ret = do_bootefi_image(img_addr, img_size); |
| 718 | free(str_copy); |
AKASHI Takahiro | 3fc2b16 | 2019-04-19 12:22:31 +0900 | [diff] [blame] | 719 | |
Heinrich Schuchardt | 8131c85 | 2022-05-19 08:00:56 +0200 | [diff] [blame] | 720 | return ret; |
Alexander Graf | b993933 | 2016-03-10 00:27:20 +0100 | [diff] [blame] | 721 | } |
| 722 | |
| 723 | #ifdef CONFIG_SYS_LONGHELP |
| 724 | static char bootefi_help_text[] = |
Heinrich Schuchardt | 8131c85 | 2022-05-19 08:00:56 +0200 | [diff] [blame] | 725 | "<image address>[:<image size>] [<fdt address>]\n" |
| 726 | " - boot EFI payload\n" |
Simon Glass | c7ae3df | 2016-11-07 08:47:08 -0700 | [diff] [blame] | 727 | #ifdef CONFIG_CMD_BOOTEFI_HELLO |
Heinrich Schuchardt | 623b3a5 | 2017-09-15 10:06:11 +0200 | [diff] [blame] | 728 | "bootefi hello\n" |
| 729 | " - boot a sample Hello World application stored within U-Boot\n" |
| 730 | #endif |
| 731 | #ifdef CONFIG_CMD_BOOTEFI_SELFTEST |
Heinrich Schuchardt | bc4f913 | 2018-03-03 15:29:03 +0100 | [diff] [blame] | 732 | "bootefi selftest [fdt address]\n" |
Heinrich Schuchardt | 623b3a5 | 2017-09-15 10:06:11 +0200 | [diff] [blame] | 733 | " - boot an EFI selftest application stored within U-Boot\n" |
Heinrich Schuchardt | d78e40d | 2017-10-18 18:13:13 +0200 | [diff] [blame] | 734 | " Use environment variable efi_selftest to select a single test.\n" |
| 735 | " Use 'setenv efi_selftest list' to enumerate all tests.\n" |
Simon Glass | c7ae3df | 2016-11-07 08:47:08 -0700 | [diff] [blame] | 736 | #endif |
Heinrich Schuchardt | ff2f532 | 2021-01-15 19:02:50 +0100 | [diff] [blame] | 737 | #ifdef CONFIG_CMD_BOOTEFI_BOOTMGR |
AKASHI Takahiro | 6b95b38 | 2019-04-19 12:22:35 +0900 | [diff] [blame] | 738 | "bootefi bootmgr [fdt address]\n" |
Rob Clark | 9975fe9 | 2017-09-13 18:05:38 -0400 | [diff] [blame] | 739 | " - load and boot EFI payload based on BootOrder/BootXXXX variables.\n" |
| 740 | "\n" |
| 741 | " If specified, the device tree located at <fdt address> gets\n" |
Heinrich Schuchardt | ff2f532 | 2021-01-15 19:02:50 +0100 | [diff] [blame] | 742 | " exposed as EFI configuration table.\n" |
| 743 | #endif |
| 744 | ; |
Alexander Graf | b993933 | 2016-03-10 00:27:20 +0100 | [diff] [blame] | 745 | #endif |
| 746 | |
| 747 | U_BOOT_CMD( |
Kyle Evans | 2058983 | 2022-04-10 16:05:55 -0500 | [diff] [blame] | 748 | bootefi, 4, 0, do_bootefi, |
Sergey Kubushyn | 92dfd92 | 2016-06-07 11:14:31 -0700 | [diff] [blame] | 749 | "Boots an EFI payload from memory", |
Alexander Graf | b993933 | 2016-03-10 00:27:20 +0100 | [diff] [blame] | 750 | bootefi_help_text |
| 751 | ); |