blob: 2a7d42925d65496a67cefcd70e0dfc645e53001a [file] [log] [blame]
Tom Rinif739fcd2018-05-07 17:02:21 -04001// SPDX-License-Identifier: GPL-2.0+
Alexander Grafb9939332016-03-10 00:27:20 +01002/*
3 * EFI application loader
4 *
5 * Copyright (c) 2016 Alexander Graf
Alexander Grafb9939332016-03-10 00:27:20 +01006 */
7
Heinrich Schuchardtc0018372020-07-17 20:21:00 +02008#define LOG_CATEGORY LOGC_EFI
9
Alexander Grafb9939332016-03-10 00:27:20 +010010#include <common.h>
Heinrich Schuchardt82d01f02021-01-24 14:34:12 +000011#include <bootm.h>
Heinrich Schuchardtf6c6df72019-01-08 18:13:06 +010012#include <charset.h>
Alexander Grafb9939332016-03-10 00:27:20 +010013#include <command.h>
Simon Glass9d922452017-05-17 17:18:03 -060014#include <dm.h>
Alexander Grafb9939332016-03-10 00:27:20 +010015#include <efi_loader.h>
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020016#include <efi_selftest.h>
Simon Glass7b51b572019-08-01 09:46:52 -060017#include <env.h>
Alexander Grafb9939332016-03-10 00:27:20 +010018#include <errno.h>
Simon Glass4d72caa2020-05-10 11:40:01 -060019#include <image.h>
Heinrich Schuchardtc0018372020-07-17 20:21:00 +020020#include <log.h>
Simon Glass336d4612020-02-03 07:36:16 -070021#include <malloc.h>
Simon Glass401d1c42020-10-30 21:38:53 -060022#include <asm/global_data.h>
Masahiro Yamadab08c8c42018-03-05 01:20:11 +090023#include <linux/libfdt.h>
24#include <linux/libfdt_env.h>
Alexander Graf354264b2018-06-18 17:22:58 +020025#include <mapmem.h>
Alexander Grafad0c1a32016-04-11 23:51:01 +020026#include <memalign.h>
Simon Glasse2754582016-09-25 15:27:32 -060027#include <asm-generic/sections.h>
28#include <linux/linkage.h>
Alexander Graf0d9d5012016-04-11 16:55:26 +020029
30DECLARE_GLOBAL_DATA_PTR;
Alexander Grafb9939332016-03-10 00:27:20 +010031
Rob Clark95c55532017-09-13 18:05:33 -040032static struct efi_device_path *bootefi_image_path;
33static struct efi_device_path *bootefi_device_path;
Heinrich Schuchardt5f595182021-01-12 12:46:24 +010034static void *image_addr;
35static size_t image_size;
36
37/**
Rui Miguel Silvabfef72e2022-05-11 10:55:40 +010038 * efi_get_image_parameters() - return image parameters
39 *
40 * @img_addr: address of loaded image in memory
41 * @img_size: size of loaded image
42 */
43void efi_get_image_parameters(void **img_addr, size_t *img_size)
44{
45 *img_addr = image_addr;
46 *img_size = image_size;
47}
48
49/**
Heinrich Schuchardt5f595182021-01-12 12:46:24 +010050 * efi_clear_bootdev() - clear boot device
51 */
52static void efi_clear_bootdev(void)
53{
54 efi_free_pool(bootefi_device_path);
55 efi_free_pool(bootefi_image_path);
56 bootefi_device_path = NULL;
57 bootefi_image_path = NULL;
58 image_addr = NULL;
59 image_size = 0;
60}
61
62/**
63 * efi_set_bootdev() - set boot device
64 *
65 * This function is called when a file is loaded, e.g. via the 'load' command.
66 * We use the path to this file to inform the UEFI binary about the boot device.
67 *
68 * @dev: device, e.g. "MMC"
69 * @devnr: number of the device, e.g. "1:2"
70 * @path: path to file loaded
71 * @buffer: buffer with file loaded
72 * @buffer_size: size of file loaded
73 */
74void efi_set_bootdev(const char *dev, const char *devnr, const char *path,
75 void *buffer, size_t buffer_size)
76{
77 struct efi_device_path *device, *image;
78 efi_status_t ret;
79
Simon Glassd837cb12022-01-29 14:58:37 -070080 log_debug("dev=%s, devnr=%s, path=%s, buffer=%p, size=%zx\n", dev,
81 devnr, path, buffer, buffer_size);
82
Heinrich Schuchardt5f595182021-01-12 12:46:24 +010083 /* Forget overwritten image */
84 if (buffer + buffer_size >= image_addr &&
85 image_addr + image_size >= buffer)
86 efi_clear_bootdev();
87
88 /* Remember only PE-COFF and FIT images */
89 if (efi_check_pe(buffer, buffer_size, NULL) != EFI_SUCCESS) {
Simon Glassd837cb12022-01-29 14:58:37 -070090 if (IS_ENABLED(CONFIG_FIT) &&
91 !fit_check_format(buffer, IMAGE_SIZE_INVAL)) {
92 /*
93 * FIT images of type EFI_OS are started via command
94 * bootm. We should not use their boot device with the
95 * bootefi command.
96 */
97 buffer = 0;
98 buffer_size = 0;
99 } else {
100 log_debug("- not remembering image\n");
Heinrich Schuchardt5f595182021-01-12 12:46:24 +0100101 return;
Simon Glassd837cb12022-01-29 14:58:37 -0700102 }
Heinrich Schuchardt5f595182021-01-12 12:46:24 +0100103 }
104
105 /* efi_set_bootdev() is typically called repeatedly, recover memory */
106 efi_clear_bootdev();
107
108 image_addr = buffer;
109 image_size = buffer_size;
110
111 ret = efi_dp_from_name(dev, devnr, path, &device, &image);
112 if (ret == EFI_SUCCESS) {
113 bootefi_device_path = device;
114 if (image) {
115 /* FIXME: image should not contain device */
116 struct efi_device_path *image_tmp = image;
117
118 efi_dp_split_file_path(image, &device, &image);
119 efi_free_pool(image_tmp);
120 }
121 bootefi_image_path = image;
Heinrich Schuchardt868353d2022-07-10 15:46:57 +0200122 log_debug("- boot device %pD\n", device);
Simon Glassd837cb12022-01-29 14:58:37 -0700123 if (image)
Heinrich Schuchardt868353d2022-07-10 15:46:57 +0200124 log_debug("- image %pD\n", image);
Heinrich Schuchardt5f595182021-01-12 12:46:24 +0100125 } else {
Simon Glassd837cb12022-01-29 14:58:37 -0700126 log_debug("- efi_dp_from_name() failed, err=%lx\n", ret);
Heinrich Schuchardt5f595182021-01-12 12:46:24 +0100127 efi_clear_bootdev();
128 }
129}
Alexander Grafb9939332016-03-10 00:27:20 +0100130
Heinrich Schuchardt810371a2019-07-14 13:00:44 +0200131/**
Heinrich Schuchardt1064d042020-08-07 17:47:13 +0200132 * efi_env_set_load_options() - set load options from environment variable
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +0200133 *
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100134 * @handle: the image handle
135 * @env_var: name of the environment variable
136 * @load_options: pointer to load options (output)
137 * Return: status code
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +0200138 */
Heinrich Schuchardt1064d042020-08-07 17:47:13 +0200139static efi_status_t efi_env_set_load_options(efi_handle_t handle,
140 const char *env_var,
141 u16 **load_options)
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +0200142{
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +0200143 const char *env = env_get(env_var);
Heinrich Schuchardt1064d042020-08-07 17:47:13 +0200144 size_t size;
Heinrich Schuchardt7086a712018-08-31 21:31:33 +0200145 u16 *pos;
AKASHI Takahirodefa7b82019-04-19 12:22:28 +0900146 efi_status_t ret;
147
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100148 *load_options = NULL;
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +0200149 if (!env)
Heinrich Schuchardt1064d042020-08-07 17:47:13 +0200150 return EFI_SUCCESS;
151 size = sizeof(u16) * (utf8_utf16_strlen(env) + 1);
152 pos = calloc(size, 1);
153 if (!pos)
AKASHI Takahirodefa7b82019-04-19 12:22:28 +0900154 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100155 *load_options = pos;
Heinrich Schuchardt7086a712018-08-31 21:31:33 +0200156 utf8_utf16_strcpy(&pos, env);
Heinrich Schuchardt1064d042020-08-07 17:47:13 +0200157 ret = efi_set_load_options(handle, size, *load_options);
158 if (ret != EFI_SUCCESS) {
159 free(*load_options);
160 *load_options = NULL;
161 }
162 return ret;
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +0200163}
164
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200165#if !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
166
Simon Glass9dff4902018-08-08 03:54:30 -0600167/**
168 * copy_fdt() - Copy the device tree to a new location available to EFI
169 *
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100170 * The FDT is copied to a suitable location within the EFI memory map.
Heinrich Schuchardtc3772ca2018-11-18 17:58:49 +0100171 * Additional 12 KiB are added to the space in case the device tree needs to be
Simon Glass9dff4902018-08-08 03:54:30 -0600172 * expanded later with fdt_open_into().
173 *
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100174 * @fdtp: On entry a pointer to the flattened device tree.
175 * On exit a pointer to the copy of the flattened device tree.
Heinrich Schuchardt4574d1b2018-11-12 18:55:22 +0100176 * FDT start
177 * Return: status code
Simon Glass9dff4902018-08-08 03:54:30 -0600178 */
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100179static efi_status_t copy_fdt(void **fdtp)
Alexander Graf0d9d5012016-04-11 16:55:26 +0200180{
Alexander Grafad0c1a32016-04-11 23:51:01 +0200181 unsigned long fdt_ram_start = -1L, fdt_pages;
Simon Glass9dff4902018-08-08 03:54:30 -0600182 efi_status_t ret = 0;
183 void *fdt, *new_fdt;
Alexander Grafad0c1a32016-04-11 23:51:01 +0200184 u64 new_fdt_addr;
Simon Glass9dff4902018-08-08 03:54:30 -0600185 uint fdt_size;
Alexander Grafad0c1a32016-04-11 23:51:01 +0200186 int i;
Alexander Graf0d9d5012016-04-11 16:55:26 +0200187
Simon Glass9dff4902018-08-08 03:54:30 -0600188 for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) {
189 u64 ram_start = gd->bd->bi_dram[i].start;
190 u64 ram_size = gd->bd->bi_dram[i].size;
Alexander Graf0d9d5012016-04-11 16:55:26 +0200191
Alexander Grafad0c1a32016-04-11 23:51:01 +0200192 if (!ram_size)
193 continue;
194
195 if (ram_start < fdt_ram_start)
196 fdt_ram_start = ram_start;
197 }
198
Simon Glassbc9a6382018-06-18 08:08:25 -0600199 /*
Heinrich Schuchardtc3772ca2018-11-18 17:58:49 +0100200 * Give us at least 12 KiB of breathing room in case the device tree
201 * needs to be expanded later.
Simon Glassbc9a6382018-06-18 08:08:25 -0600202 */
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100203 fdt = *fdtp;
Heinrich Schuchardtc3772ca2018-11-18 17:58:49 +0100204 fdt_pages = efi_size_in_pages(fdt_totalsize(fdt) + 0x3000);
205 fdt_size = fdt_pages << EFI_PAGE_SHIFT;
Alexander Grafad0c1a32016-04-11 23:51:01 +0200206
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100207 /*
208 * Safe fdt location is at 127 MiB.
209 * On the sandbox convert from the sandbox address space.
210 */
211 new_fdt_addr = (uintptr_t)map_sysmem(fdt_ram_start + 0x7f00000 +
212 fdt_size, 0);
Simon Glass9dff4902018-08-08 03:54:30 -0600213 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardt42a426e2020-05-06 20:32:31 +0200214 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass9dff4902018-08-08 03:54:30 -0600215 &new_fdt_addr);
216 if (ret != EFI_SUCCESS) {
Alexander Grafad0c1a32016-04-11 23:51:01 +0200217 /* If we can't put it there, put it somewhere */
xypron.glpk@gmx.dea44bffc2017-08-11 21:19:25 +0200218 new_fdt_addr = (ulong)memalign(EFI_PAGE_SIZE, fdt_size);
Simon Glass9dff4902018-08-08 03:54:30 -0600219 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardt42a426e2020-05-06 20:32:31 +0200220 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass9dff4902018-08-08 03:54:30 -0600221 &new_fdt_addr);
222 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200223 log_err("ERROR: Failed to reserve space for FDT\n");
Simon Glass9dff4902018-08-08 03:54:30 -0600224 goto done;
Alexander Graf85a6e9b2017-07-03 13:32:35 +0200225 }
Alexander Grafad0c1a32016-04-11 23:51:01 +0200226 }
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100227 new_fdt = (void *)(uintptr_t)new_fdt_addr;
Alexander Graf0d9d5012016-04-11 16:55:26 +0200228 memcpy(new_fdt, fdt, fdt_totalsize(fdt));
229 fdt_set_totalsize(new_fdt, fdt_size);
230
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100231 *fdtp = (void *)(uintptr_t)new_fdt_addr;
Simon Glass9dff4902018-08-08 03:54:30 -0600232done:
233 return ret;
Alexander Graf0d9d5012016-04-11 16:55:26 +0200234}
235
Heinrich Schuchardt4cbb2932020-08-27 12:52:20 +0200236/**
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200237 * get_config_table() - get configuration table
238 *
239 * @guid: GUID of the configuration table
240 * Return: pointer to configuration table or NULL
241 */
242static void *get_config_table(const efi_guid_t *guid)
243{
244 size_t i;
245
246 for (i = 0; i < systab.nr_tables; i++) {
247 if (!guidcmp(guid, &systab.tables[i].guid))
248 return systab.tables[i].table;
249 }
250 return NULL;
251}
252
253#endif /* !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) */
254
255/**
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100256 * efi_install_fdt() - install device tree
Heinrich Schuchardte2d82f82019-05-12 20:16:25 +0200257 *
Heinrich Schuchardt7d4d5512020-02-07 22:10:49 +0100258 * If fdt is not EFI_FDT_USE_INTERNAL, the device tree located at that memory
259 * address will will be installed as configuration table, otherwise the device
260 * tree located at the address indicated by environment variable fdt_addr or as
261 * fallback fdtcontroladdr will be used.
Heinrich Schuchardte2d82f82019-05-12 20:16:25 +0200262 *
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100263 * On architectures using ACPI tables device trees shall not be installed as
264 * configuration table.
Heinrich Schuchardte2d82f82019-05-12 20:16:25 +0200265 *
Heinrich Schuchardt7d4d5512020-02-07 22:10:49 +0100266 * @fdt: address of device tree or EFI_FDT_USE_INTERNAL to use the
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100267 * the hardware device tree as indicated by environment variable
268 * fdt_addr or as fallback the internal device tree as indicated by
269 * the environment variable fdtcontroladdr
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900270 * Return: status code
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900271 */
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100272efi_status_t efi_install_fdt(void *fdt)
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900273{
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200274 /*
275 * The EBBR spec requires that we have either an FDT or an ACPI table
276 * but not both.
277 */
278#if CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100279 if (fdt) {
Alexander Graf0832dd22022-02-27 13:18:56 +0100280 log_warning("WARNING: Can't have ACPI table and device tree - ignoring DT.\n");
281 return EFI_SUCCESS;
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200282 }
283#else
Simon Glassd9d7c202022-09-06 20:26:50 -0600284 struct bootm_headers img = { 0 };
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900285 efi_status_t ret;
286
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100287 if (fdt == EFI_FDT_USE_INTERNAL) {
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100288 const char *fdt_opt;
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100289 uintptr_t fdt_addr;
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100290
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200291 /* Look for device tree that is already installed */
292 if (get_config_table(&efi_guid_fdt))
293 return EFI_SUCCESS;
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100294 /* Check if there is a hardware device tree */
295 fdt_opt = env_get("fdt_addr");
296 /* Use our own device tree as fallback */
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200297 if (!fdt_opt) {
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100298 fdt_opt = env_get("fdtcontroladdr");
299 if (!fdt_opt) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200300 log_err("ERROR: need device tree\n");
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100301 return EFI_NOT_FOUND;
302 }
AKASHI Takahiro3ffc52f2019-04-19 12:22:30 +0900303 }
Simon Glass7e5f4602021-07-24 09:03:29 -0600304 fdt_addr = hextoul(fdt_opt, NULL);
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200305 if (!fdt_addr) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200306 log_err("ERROR: invalid $fdt_addr or $fdtcontroladdr\n");
AKASHI Takahiro3ffc52f2019-04-19 12:22:30 +0900307 return EFI_LOAD_ERROR;
308 }
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100309 fdt = map_sysmem(fdt_addr, 0);
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900310 }
311
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200312 /* Install device tree */
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200313 if (fdt_check_header(fdt)) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200314 log_err("ERROR: invalid device tree\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200315 return EFI_LOAD_ERROR;
316 }
317
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200318 /* Prepare device tree for payload */
319 ret = copy_fdt(&fdt);
320 if (ret) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200321 log_err("ERROR: out of memory\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200322 return EFI_OUT_OF_RESOURCES;
323 }
324
325 if (image_setup_libfdt(&img, fdt, 0, NULL)) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200326 log_err("ERROR: failed to process device tree\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200327 return EFI_LOAD_ERROR;
328 }
329
Heinrich Schuchardtfef907b2020-03-14 10:59:34 +0100330 /* Create memory reservations as indicated by the device tree */
331 efi_carve_out_dt_rsv(fdt);
332
Ilias Apalodimasa2f14822022-01-03 14:07:37 +0200333 efi_try_purge_kaslr_seed(fdt);
334
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200335 /* Install device tree as UEFI table */
336 ret = efi_install_configuration_table(&efi_guid_fdt, fdt);
337 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200338 log_err("ERROR: failed to install device tree\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200339 return ret;
340 }
341#endif /* GENERATE_ACPI_TABLE */
342
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900343 return EFI_SUCCESS;
344}
345
Simon Glass5e2f0392018-11-25 20:14:39 -0700346/**
Heinrich Schuchardtc9828742018-09-23 17:21:51 +0200347 * do_bootefi_exec() - execute EFI binary
348 *
Heinrich Schuchardt72e1fca2020-08-15 23:10:22 +0200349 * The image indicated by @handle is started. When it returns the allocated
350 * memory for the @load_options is freed.
351 *
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900352 * @handle: handle of loaded image
Heinrich Schuchardt72e1fca2020-08-15 23:10:22 +0200353 * @load_options: load options
Heinrich Schuchardtc9828742018-09-23 17:21:51 +0200354 * Return: status code
355 *
356 * Load the EFI binary into a newly assigned memory unwinding the relocation
357 * information, install the loaded image protocol, and call the binary.
Alexander Grafb9939332016-03-10 00:27:20 +0100358 */
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +0200359static efi_status_t do_bootefi_exec(efi_handle_t handle, void *load_options)
Alexander Grafb9939332016-03-10 00:27:20 +0100360{
Heinrich Schuchardt45204b12018-03-03 15:29:01 +0100361 efi_status_t ret;
Heinrich Schuchardt556d8dc2019-04-30 17:57:30 +0200362 efi_uintn_t exit_data_size = 0;
363 u16 *exit_data = NULL;
Rob Clarkbf192732017-10-10 08:23:06 -0400364
Heinrich Schuchardt82d01f02021-01-24 14:34:12 +0000365 /* On ARM switch from EL3 or secure mode to EL2 or non-secure mode */
366 switch_to_non_secure_mode();
367
Masahisa Kojima3fa9ed92022-02-22 09:58:30 +0900368 /*
369 * The UEFI standard requires that the watchdog timer is set to five
370 * minutes when invoking an EFI boot option.
371 *
372 * Unified Extensible Firmware Interface (UEFI), version 2.7 Errata A
373 * 7.5. Miscellaneous Boot Services - EFI_BOOT_SERVICES.SetWatchdogTimer
374 */
375 ret = efi_set_watchdog(300);
376 if (ret != EFI_SUCCESS) {
377 log_err("ERROR: Failed to set watchdog timer\n");
378 goto out;
379 }
380
Alexander Grafb9939332016-03-10 00:27:20 +0100381 /* Call our payload! */
Heinrich Schuchardt556d8dc2019-04-30 17:57:30 +0200382 ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data));
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200383 if (ret != EFI_SUCCESS) {
384 log_err("## Application failed, r = %lu\n",
385 ret & ~EFI_ERROR_MASK);
386 if (exit_data) {
387 log_err("## %ls\n", exit_data);
388 efi_free_pool(exit_data);
389 }
Heinrich Schuchardt556d8dc2019-04-30 17:57:30 +0200390 }
Rob Clark95c55532017-09-13 18:05:33 -0400391
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900392 efi_restore_gd();
Simon Glass5e2f0392018-11-25 20:14:39 -0700393
Masahisa Kojima3fa9ed92022-02-22 09:58:30 +0900394out:
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100395 free(load_options);
Rob Clark95c55532017-09-13 18:05:33 -0400396
Ilias Apalodimas70089c12022-10-16 11:36:32 +0300397 if (IS_ENABLED(CONFIG_EFI_LOAD_FILE2_INITRD)) {
398 if (efi_initrd_deregister() != EFI_SUCCESS)
399 log_err("Failed to remove loadfile2 for initrd\n");
400 }
Ilias Apalodimas53f6a5a2021-03-17 21:55:00 +0200401
Masahisa Kojima3fa9ed92022-02-22 09:58:30 +0900402 /* Control is returned to U-Boot, disable EFI watchdog */
403 efi_set_watchdog(0);
404
Rob Clark95c55532017-09-13 18:05:33 -0400405 return ret;
Alexander Grafb9939332016-03-10 00:27:20 +0100406}
407
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900408/**
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200409 * do_efibootmgr() - execute EFI boot manager
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900410 *
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900411 * Return: status code
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900412 */
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200413static int do_efibootmgr(void)
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900414{
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900415 efi_handle_t handle;
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900416 efi_status_t ret;
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +0200417 void *load_options;
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900418
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +0200419 ret = efi_bootmgr_load(&handle, &load_options);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900420 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200421 log_notice("EFI boot manager: Cannot load any image\n");
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900422 return CMD_RET_FAILURE;
423 }
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900424
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +0200425 ret = do_bootefi_exec(handle, load_options);
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900426
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900427 if (ret != EFI_SUCCESS)
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900428 return CMD_RET_FAILURE;
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900429
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900430 return CMD_RET_SUCCESS;
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900431}
432
Heinrich Schuchardt810371a2019-07-14 13:00:44 +0200433/**
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200434 * do_bootefi_image() - execute EFI binary
435 *
436 * Set up memory image for the binary to be loaded, prepare device path, and
437 * then call do_bootefi_exec() to execute it.
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900438 *
Kyle Evans20589832022-04-10 16:05:55 -0500439 * @image_opt: string with image start address
440 * @size_opt: string with image size or NULL
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900441 * Return: status code
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900442 */
Kyle Evans20589832022-04-10 16:05:55 -0500443static int do_bootefi_image(const char *image_opt, const char *size_opt)
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900444{
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900445 void *image_buf;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900446 unsigned long addr, size;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900447 efi_status_t ret;
448
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900449#ifdef CONFIG_CMD_BOOTEFI_HELLO
450 if (!strcmp(image_opt, "hello")) {
Heinrich Schuchardtbb33c792021-01-12 17:44:08 +0100451 image_buf = __efi_helloworld_begin;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900452 size = __efi_helloworld_end - __efi_helloworld_begin;
Heinrich Schuchardt5f595182021-01-12 12:46:24 +0100453 efi_clear_bootdev();
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900454 } else
455#endif
456 {
Heinrich Schuchardt5f595182021-01-12 12:46:24 +0100457 addr = strtoul(image_opt, NULL, 16);
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900458 /* Check that a numeric value was passed */
Heinrich Schuchardt5f595182021-01-12 12:46:24 +0100459 if (!addr)
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900460 return CMD_RET_USAGE;
Heinrich Schuchardt5f595182021-01-12 12:46:24 +0100461 image_buf = map_sysmem(addr, 0);
462
Kyle Evans20589832022-04-10 16:05:55 -0500463 if (size_opt) {
464 size = strtoul(size_opt, NULL, 16);
465 if (!size)
466 return CMD_RET_USAGE;
467 efi_clear_bootdev();
468 } else {
469 if (image_buf != image_addr) {
470 log_err("No UEFI binary known at %s\n",
471 image_opt);
472 return CMD_RET_FAILURE;
473 }
474 size = image_size;
Heinrich Schuchardt5f595182021-01-12 12:46:24 +0100475 }
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900476 }
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100477 ret = efi_run_image(image_buf, size);
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900478
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100479 if (ret != EFI_SUCCESS)
480 return CMD_RET_FAILURE;
481
482 return CMD_RET_SUCCESS;
483}
484
485/**
486 * efi_run_image() - run loaded UEFI image
487 *
488 * @source_buffer: memory address of the UEFI image
489 * @source_size: size of the UEFI image
490 * Return: status code
491 */
492efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size)
493{
494 efi_handle_t mem_handle = NULL, handle;
495 struct efi_device_path *file_path = NULL;
Heinrich Schuchardtc2f01032020-08-25 17:54:05 +0000496 struct efi_device_path *msg_path;
Ilias Apalodimasa75e8352022-10-06 16:08:44 +0300497 efi_status_t ret, ret2;
Heinrich Schuchardtc2f01032020-08-25 17:54:05 +0000498 u16 *load_options;
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100499
500 if (!bootefi_device_path || !bootefi_image_path) {
Simon Glassd837cb12022-01-29 14:58:37 -0700501 log_debug("Not loaded from disk\n");
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900502 /*
503 * Special case for efi payload not loaded from disk,
504 * such as 'bootefi hello' or for example payload
505 * loaded directly into memory via JTAG, etc:
506 */
507 file_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE,
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100508 (uintptr_t)source_buffer,
509 source_size);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900510 /*
511 * Make sure that device for device_path exist
512 * in load_image(). Otherwise, shell and grub will fail.
513 */
Ilias Apalodimasa75e8352022-10-06 16:08:44 +0300514 ret = efi_install_multiple_protocol_interfaces(&mem_handle,
515 &efi_guid_device_path,
516 file_path, NULL);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900517 if (ret != EFI_SUCCESS)
518 goto out;
Heinrich Schuchardtc2f01032020-08-25 17:54:05 +0000519 msg_path = file_path;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900520 } else {
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100521 file_path = efi_dp_append(bootefi_device_path,
522 bootefi_image_path);
Heinrich Schuchardtc2f01032020-08-25 17:54:05 +0000523 msg_path = bootefi_image_path;
Simon Glassd837cb12022-01-29 14:58:37 -0700524 log_debug("Loaded from disk\n");
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900525 }
526
Heinrich Schuchardtc2f01032020-08-25 17:54:05 +0000527 log_info("Booting %pD\n", msg_path);
528
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100529 ret = EFI_CALL(efi_load_image(false, efi_root, file_path, source_buffer,
530 source_size, &handle));
Heinrich Schuchardtc2f01032020-08-25 17:54:05 +0000531 if (ret != EFI_SUCCESS) {
532 log_err("Loading image failed\n");
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900533 goto out;
Heinrich Schuchardtc2f01032020-08-25 17:54:05 +0000534 }
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +0200535
536 /* Transfer environment variable as load options */
537 ret = efi_env_set_load_options(handle, "bootargs", &load_options);
538 if (ret != EFI_SUCCESS)
539 goto out;
540
541 ret = do_bootefi_exec(handle, load_options);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900542
543out:
Ilias Apalodimasa75e8352022-10-06 16:08:44 +0300544 ret2 = efi_uninstall_multiple_protocol_interfaces(mem_handle,
545 &efi_guid_device_path,
546 file_path, NULL);
Heinrich Schuchardt4fe050e2020-04-20 12:44:56 +0200547 efi_free_pool(file_path);
Ilias Apalodimasa75e8352022-10-06 16:08:44 +0300548 return (ret != EFI_SUCCESS) ? ret : ret2;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900549}
550
Simon Glassd9717ea2018-11-25 20:14:37 -0700551#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900552static efi_status_t bootefi_run_prepare(const char *load_options_path,
553 struct efi_device_path *device_path,
554 struct efi_device_path *image_path,
555 struct efi_loaded_image_obj **image_objp,
556 struct efi_loaded_image **loaded_image_infop)
557{
558 efi_status_t ret;
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100559 u16 *load_options;
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900560
561 ret = efi_setup_loaded_image(device_path, image_path, image_objp,
562 loaded_image_infop);
563 if (ret != EFI_SUCCESS)
564 return ret;
565
566 /* Transfer environment variable as load options */
Heinrich Schuchardt1064d042020-08-07 17:47:13 +0200567 return efi_env_set_load_options((efi_handle_t)*image_objp,
568 load_options_path,
569 &load_options);
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900570}
571
Simon Glassd9717ea2018-11-25 20:14:37 -0700572/**
573 * bootefi_test_prepare() - prepare to run an EFI test
574 *
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100575 * Prepare to run a test as if it were provided by a loaded image.
Simon Glassd9717ea2018-11-25 20:14:37 -0700576 *
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100577 * @image_objp: pointer to be set to the loaded image handle
578 * @loaded_image_infop: pointer to be set to the loaded image protocol
579 * @path: dummy file path used to construct the device path
580 * set in the loaded image protocol
581 * @load_options_path: name of a U-Boot environment variable. Its value is
582 * set as load options in the loaded image protocol.
583 * Return: status code
Simon Glassd9717ea2018-11-25 20:14:37 -0700584 */
585static efi_status_t bootefi_test_prepare
586 (struct efi_loaded_image_obj **image_objp,
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100587 struct efi_loaded_image **loaded_image_infop, const char *path,
588 const char *load_options_path)
Simon Glassd9717ea2018-11-25 20:14:37 -0700589{
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100590 efi_status_t ret;
591
Simon Glassd9717ea2018-11-25 20:14:37 -0700592 /* Construct a dummy device path */
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100593 bootefi_device_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, 0, 0);
Simon Glassd9717ea2018-11-25 20:14:37 -0700594 if (!bootefi_device_path)
595 return EFI_OUT_OF_RESOURCES;
Simon Glassd9717ea2018-11-25 20:14:37 -0700596
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100597 bootefi_image_path = efi_dp_from_file(NULL, 0, path);
598 if (!bootefi_image_path) {
599 ret = EFI_OUT_OF_RESOURCES;
600 goto failure;
601 }
602
603 ret = bootefi_run_prepare(load_options_path, bootefi_device_path,
604 bootefi_image_path, image_objp,
605 loaded_image_infop);
606 if (ret == EFI_SUCCESS)
607 return ret;
608
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100609failure:
Heinrich Schuchardt5f595182021-01-12 12:46:24 +0100610 efi_clear_bootdev();
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100611 return ret;
Simon Glassd9717ea2018-11-25 20:14:37 -0700612}
613
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900614/**
615 * bootefi_run_finish() - finish up after running an EFI test
616 *
617 * @loaded_image_info: Pointer to a struct which holds the loaded image info
618 * @image_obj: Pointer to a struct which holds the loaded image object
619 */
620static void bootefi_run_finish(struct efi_loaded_image_obj *image_obj,
621 struct efi_loaded_image *loaded_image_info)
622{
623 efi_restore_gd();
624 free(loaded_image_info->load_options);
625 efi_delete_handle(&image_obj->header);
626}
627
628/**
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200629 * do_efi_selftest() - execute EFI selftest
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900630 *
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900631 * Return: status code
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900632 */
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200633static int do_efi_selftest(void)
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900634{
635 struct efi_loaded_image_obj *image_obj;
636 struct efi_loaded_image *loaded_image_info;
637 efi_status_t ret;
638
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900639 ret = bootefi_test_prepare(&image_obj, &loaded_image_info,
640 "\\selftest", "efi_selftest");
641 if (ret != EFI_SUCCESS)
642 return CMD_RET_FAILURE;
643
644 /* Execute the test */
645 ret = EFI_CALL(efi_selftest(&image_obj->header, &systab));
646 bootefi_run_finish(image_obj, loaded_image_info);
647
648 return ret != EFI_SUCCESS;
649}
Simon Glassd9717ea2018-11-25 20:14:37 -0700650#endif /* CONFIG_CMD_BOOTEFI_SELFTEST */
651
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200652/**
653 * do_bootefi() - execute `bootefi` command
654 *
655 * @cmdtp: table entry describing command
656 * @flag: bitmap indicating how the command was invoked
657 * @argc: number of arguments
658 * @argv: command line arguments
659 * Return: status code
660 */
Simon Glass09140112020-05-10 11:40:03 -0600661static int do_bootefi(struct cmd_tbl *cmdtp, int flag, int argc,
662 char *const argv[])
Alexander Grafb9939332016-03-10 00:27:20 +0100663{
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200664 efi_status_t ret;
Heinrich Schuchardt8131c852022-05-19 08:00:56 +0200665 char *img_addr, *img_size, *str_copy, *pos;
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100666 void *fdt;
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200667
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900668 if (argc < 2)
669 return CMD_RET_USAGE;
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900670
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200671 /* Initialize EFI drivers */
672 ret = efi_init_obj_list();
673 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200674 log_err("Error: Cannot initialize UEFI sub-system, r = %lu\n",
675 ret & ~EFI_ERROR_MASK);
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200676 return CMD_RET_FAILURE;
677 }
678
Heinrich Schuchardt8131c852022-05-19 08:00:56 +0200679 if (argc > 2) {
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100680 uintptr_t fdt_addr;
681
Simon Glass7e5f4602021-07-24 09:03:29 -0600682 fdt_addr = hextoul(argv[2], NULL);
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100683 fdt = map_sysmem(fdt_addr, 0);
684 } else {
685 fdt = EFI_FDT_USE_INTERNAL;
686 }
687 ret = efi_install_fdt(fdt);
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200688 if (ret == EFI_INVALID_PARAMETER)
689 return CMD_RET_USAGE;
690 else if (ret != EFI_SUCCESS)
691 return CMD_RET_FAILURE;
692
Heinrich Schuchardtff2f5322021-01-15 19:02:50 +0100693 if (IS_ENABLED(CONFIG_CMD_BOOTEFI_BOOTMGR)) {
694 if (!strcmp(argv[1], "bootmgr"))
695 return do_efibootmgr();
696 }
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900697#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
Heinrich Schuchardtff2f5322021-01-15 19:02:50 +0100698 if (!strcmp(argv[1], "selftest"))
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200699 return do_efi_selftest();
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900700#endif
Heinrich Schuchardt8131c852022-05-19 08:00:56 +0200701 str_copy = strdup(argv[1]);
702 if (!str_copy) {
703 log_err("Out of memory\n");
704 return CMD_RET_FAILURE;
705 }
706 pos = str_copy;
707 img_addr = strsep(&pos, ":");
708 img_size = strsep(&pos, ":");
709 ret = do_bootefi_image(img_addr, img_size);
710 free(str_copy);
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900711
Heinrich Schuchardt8131c852022-05-19 08:00:56 +0200712 return ret;
Alexander Grafb9939332016-03-10 00:27:20 +0100713}
714
715#ifdef CONFIG_SYS_LONGHELP
716static char bootefi_help_text[] =
Heinrich Schuchardt8131c852022-05-19 08:00:56 +0200717 "<image address>[:<image size>] [<fdt address>]\n"
718 " - boot EFI payload\n"
Simon Glassc7ae3df2016-11-07 08:47:08 -0700719#ifdef CONFIG_CMD_BOOTEFI_HELLO
Heinrich Schuchardt623b3a52017-09-15 10:06:11 +0200720 "bootefi hello\n"
721 " - boot a sample Hello World application stored within U-Boot\n"
722#endif
723#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
Heinrich Schuchardtbc4f9132018-03-03 15:29:03 +0100724 "bootefi selftest [fdt address]\n"
Heinrich Schuchardt623b3a52017-09-15 10:06:11 +0200725 " - boot an EFI selftest application stored within U-Boot\n"
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +0200726 " Use environment variable efi_selftest to select a single test.\n"
727 " Use 'setenv efi_selftest list' to enumerate all tests.\n"
Simon Glassc7ae3df2016-11-07 08:47:08 -0700728#endif
Heinrich Schuchardtff2f5322021-01-15 19:02:50 +0100729#ifdef CONFIG_CMD_BOOTEFI_BOOTMGR
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900730 "bootefi bootmgr [fdt address]\n"
Rob Clark9975fe92017-09-13 18:05:38 -0400731 " - load and boot EFI payload based on BootOrder/BootXXXX variables.\n"
732 "\n"
733 " If specified, the device tree located at <fdt address> gets\n"
Heinrich Schuchardtff2f5322021-01-15 19:02:50 +0100734 " exposed as EFI configuration table.\n"
735#endif
736 ;
Alexander Grafb9939332016-03-10 00:27:20 +0100737#endif
738
739U_BOOT_CMD(
Kyle Evans20589832022-04-10 16:05:55 -0500740 bootefi, 4, 0, do_bootefi,
Sergey Kubushyn92dfd922016-06-07 11:14:31 -0700741 "Boots an EFI payload from memory",
Alexander Grafb9939332016-03-10 00:27:20 +0100742 bootefi_help_text
743);