blob: 9849eb4f9950da0d0c008d3ec1b14760cfcc71bf [file] [log] [blame]
Tom Rinif739fcd2018-05-07 17:02:21 -04001// SPDX-License-Identifier: GPL-2.0+
Alexander Grafb9939332016-03-10 00:27:20 +01002/*
3 * EFI application loader
4 *
5 * Copyright (c) 2016 Alexander Graf
Alexander Grafb9939332016-03-10 00:27:20 +01006 */
7
8#include <common.h>
Heinrich Schuchardtf6c6df72019-01-08 18:13:06 +01009#include <charset.h>
Alexander Grafb9939332016-03-10 00:27:20 +010010#include <command.h>
Simon Glass9d922452017-05-17 17:18:03 -060011#include <dm.h>
Alexander Grafb9939332016-03-10 00:27:20 +010012#include <efi_loader.h>
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020013#include <efi_selftest.h>
Simon Glass7b51b572019-08-01 09:46:52 -060014#include <env.h>
Alexander Grafb9939332016-03-10 00:27:20 +010015#include <errno.h>
Simon Glass336d4612020-02-03 07:36:16 -070016#include <malloc.h>
Masahiro Yamadab08c8c42018-03-05 01:20:11 +090017#include <linux/libfdt.h>
18#include <linux/libfdt_env.h>
Alexander Graf354264b2018-06-18 17:22:58 +020019#include <mapmem.h>
Alexander Grafad0c1a32016-04-11 23:51:01 +020020#include <memalign.h>
Simon Glasse2754582016-09-25 15:27:32 -060021#include <asm-generic/sections.h>
22#include <linux/linkage.h>
Alexander Graf0d9d5012016-04-11 16:55:26 +020023
24DECLARE_GLOBAL_DATA_PTR;
Alexander Grafb9939332016-03-10 00:27:20 +010025
Rob Clark95c55532017-09-13 18:05:33 -040026static struct efi_device_path *bootefi_image_path;
27static struct efi_device_path *bootefi_device_path;
Alexander Grafb9939332016-03-10 00:27:20 +010028
Heinrich Schuchardt810371a2019-07-14 13:00:44 +020029/**
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020030 * Set the load options of an image from an environment variable.
31 *
Heinrich Schuchardta3850e42020-01-03 22:53:42 +010032 * @handle: the image handle
33 * @env_var: name of the environment variable
34 * @load_options: pointer to load options (output)
35 * Return: status code
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020036 */
Heinrich Schuchardta3850e42020-01-03 22:53:42 +010037static efi_status_t set_load_options(efi_handle_t handle, const char *env_var,
38 u16 **load_options)
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020039{
AKASHI Takahirodefa7b82019-04-19 12:22:28 +090040 struct efi_loaded_image *loaded_image_info;
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020041 size_t size;
42 const char *env = env_get(env_var);
Heinrich Schuchardt7086a712018-08-31 21:31:33 +020043 u16 *pos;
AKASHI Takahirodefa7b82019-04-19 12:22:28 +090044 efi_status_t ret;
45
Heinrich Schuchardta3850e42020-01-03 22:53:42 +010046 *load_options = NULL;
AKASHI Takahirodefa7b82019-04-19 12:22:28 +090047 ret = EFI_CALL(systab.boottime->open_protocol(
48 handle,
49 &efi_guid_loaded_image,
50 (void **)&loaded_image_info,
51 efi_root, NULL,
52 EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL));
53 if (ret != EFI_SUCCESS)
54 return EFI_INVALID_PARAMETER;
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020055
56 loaded_image_info->load_options = NULL;
57 loaded_image_info->load_options_size = 0;
58 if (!env)
AKASHI Takahirodefa7b82019-04-19 12:22:28 +090059 goto out;
60
Heinrich Schuchardt7086a712018-08-31 21:31:33 +020061 size = utf8_utf16_strlen(env) + 1;
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020062 loaded_image_info->load_options = calloc(size, sizeof(u16));
63 if (!loaded_image_info->load_options) {
64 printf("ERROR: Out of memory\n");
AKASHI Takahirodefa7b82019-04-19 12:22:28 +090065 EFI_CALL(systab.boottime->close_protocol(handle,
66 &efi_guid_loaded_image,
67 efi_root, NULL));
68 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020069 }
Heinrich Schuchardt7086a712018-08-31 21:31:33 +020070 pos = loaded_image_info->load_options;
Heinrich Schuchardta3850e42020-01-03 22:53:42 +010071 *load_options = pos;
Heinrich Schuchardt7086a712018-08-31 21:31:33 +020072 utf8_utf16_strcpy(&pos, env);
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020073 loaded_image_info->load_options_size = size * 2;
AKASHI Takahirodefa7b82019-04-19 12:22:28 +090074
75out:
76 return EFI_CALL(systab.boottime->close_protocol(handle,
77 &efi_guid_loaded_image,
78 efi_root, NULL));
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020079}
80
Heinrich Schuchardt61824952019-04-20 13:33:55 +020081#if !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
82
Simon Glass9dff4902018-08-08 03:54:30 -060083/**
84 * copy_fdt() - Copy the device tree to a new location available to EFI
85 *
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +010086 * The FDT is copied to a suitable location within the EFI memory map.
Heinrich Schuchardtc3772ca2018-11-18 17:58:49 +010087 * Additional 12 KiB are added to the space in case the device tree needs to be
Simon Glass9dff4902018-08-08 03:54:30 -060088 * expanded later with fdt_open_into().
89 *
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +010090 * @fdtp: On entry a pointer to the flattened device tree.
91 * On exit a pointer to the copy of the flattened device tree.
Heinrich Schuchardt4574d1b2018-11-12 18:55:22 +010092 * FDT start
93 * Return: status code
Simon Glass9dff4902018-08-08 03:54:30 -060094 */
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +010095static efi_status_t copy_fdt(void **fdtp)
Alexander Graf0d9d5012016-04-11 16:55:26 +020096{
Alexander Grafad0c1a32016-04-11 23:51:01 +020097 unsigned long fdt_ram_start = -1L, fdt_pages;
Simon Glass9dff4902018-08-08 03:54:30 -060098 efi_status_t ret = 0;
99 void *fdt, *new_fdt;
Alexander Grafad0c1a32016-04-11 23:51:01 +0200100 u64 new_fdt_addr;
Simon Glass9dff4902018-08-08 03:54:30 -0600101 uint fdt_size;
Alexander Grafad0c1a32016-04-11 23:51:01 +0200102 int i;
Alexander Graf0d9d5012016-04-11 16:55:26 +0200103
Simon Glass9dff4902018-08-08 03:54:30 -0600104 for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) {
105 u64 ram_start = gd->bd->bi_dram[i].start;
106 u64 ram_size = gd->bd->bi_dram[i].size;
Alexander Graf0d9d5012016-04-11 16:55:26 +0200107
Alexander Grafad0c1a32016-04-11 23:51:01 +0200108 if (!ram_size)
109 continue;
110
111 if (ram_start < fdt_ram_start)
112 fdt_ram_start = ram_start;
113 }
114
Simon Glassbc9a6382018-06-18 08:08:25 -0600115 /*
Heinrich Schuchardtc3772ca2018-11-18 17:58:49 +0100116 * Give us at least 12 KiB of breathing room in case the device tree
117 * needs to be expanded later.
Simon Glassbc9a6382018-06-18 08:08:25 -0600118 */
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100119 fdt = *fdtp;
Heinrich Schuchardtc3772ca2018-11-18 17:58:49 +0100120 fdt_pages = efi_size_in_pages(fdt_totalsize(fdt) + 0x3000);
121 fdt_size = fdt_pages << EFI_PAGE_SHIFT;
Alexander Grafad0c1a32016-04-11 23:51:01 +0200122
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100123 /*
124 * Safe fdt location is at 127 MiB.
125 * On the sandbox convert from the sandbox address space.
126 */
127 new_fdt_addr = (uintptr_t)map_sysmem(fdt_ram_start + 0x7f00000 +
128 fdt_size, 0);
Simon Glass9dff4902018-08-08 03:54:30 -0600129 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardt42a426e2020-05-06 20:32:31 +0200130 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass9dff4902018-08-08 03:54:30 -0600131 &new_fdt_addr);
132 if (ret != EFI_SUCCESS) {
Alexander Grafad0c1a32016-04-11 23:51:01 +0200133 /* If we can't put it there, put it somewhere */
xypron.glpk@gmx.dea44bffc2017-08-11 21:19:25 +0200134 new_fdt_addr = (ulong)memalign(EFI_PAGE_SIZE, fdt_size);
Simon Glass9dff4902018-08-08 03:54:30 -0600135 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardt42a426e2020-05-06 20:32:31 +0200136 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass9dff4902018-08-08 03:54:30 -0600137 &new_fdt_addr);
138 if (ret != EFI_SUCCESS) {
Alexander Graf85a6e9b2017-07-03 13:32:35 +0200139 printf("ERROR: Failed to reserve space for FDT\n");
Simon Glass9dff4902018-08-08 03:54:30 -0600140 goto done;
Alexander Graf85a6e9b2017-07-03 13:32:35 +0200141 }
Alexander Grafad0c1a32016-04-11 23:51:01 +0200142 }
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100143 new_fdt = (void *)(uintptr_t)new_fdt_addr;
Alexander Graf0d9d5012016-04-11 16:55:26 +0200144 memcpy(new_fdt, fdt, fdt_totalsize(fdt));
145 fdt_set_totalsize(new_fdt, fdt_size);
146
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100147 *fdtp = (void *)(uintptr_t)new_fdt_addr;
Simon Glass9dff4902018-08-08 03:54:30 -0600148done:
149 return ret;
Alexander Graf0d9d5012016-04-11 16:55:26 +0200150}
151
Atish Patra7be64b82020-03-13 17:11:30 -0700152static void efi_reserve_memory(u64 addr, u64 size)
153{
Atish Patra7be64b82020-03-13 17:11:30 -0700154 /* Convert from sandbox address space. */
155 addr = (uintptr_t)map_sysmem(addr, 0);
Michael Walle714497e2020-05-17 12:29:19 +0200156 if (efi_add_memory_map(addr, size,
157 EFI_RESERVED_MEMORY_TYPE) != EFI_SUCCESS)
Atish Patra7be64b82020-03-13 17:11:30 -0700158 printf("Reserved memory mapping failed addr %llx size %llx\n",
159 addr, size);
160}
161
Heinrich Schuchardt810371a2019-07-14 13:00:44 +0200162/**
Simon Glass416e07e2018-06-18 08:08:28 -0600163 * efi_carve_out_dt_rsv() - Carve out DT reserved memory ranges
164 *
165 * The mem_rsv entries of the FDT are added to the memory map. Any failures are
166 * ignored because this is not critical and we would rather continue to try to
167 * boot.
168 *
169 * @fdt: Pointer to device tree
170 */
171static void efi_carve_out_dt_rsv(void *fdt)
Alexander Graf806d2fa2018-04-06 09:40:51 +0200172{
173 int nr_rsv, i;
Atish Patra7be64b82020-03-13 17:11:30 -0700174 u64 addr, size;
175 int nodeoffset, subnode;
Alexander Graf806d2fa2018-04-06 09:40:51 +0200176
177 nr_rsv = fdt_num_mem_rsv(fdt);
178
179 /* Look for an existing entry and add it to the efi mem map. */
180 for (i = 0; i < nr_rsv; i++) {
181 if (fdt_get_mem_rsv(fdt, i, &addr, &size) != 0)
182 continue;
Atish Patra7be64b82020-03-13 17:11:30 -0700183 efi_reserve_memory(addr, size);
184 }
Alexander Graf806d2fa2018-04-06 09:40:51 +0200185
Atish Patra7be64b82020-03-13 17:11:30 -0700186 /* process reserved-memory */
187 nodeoffset = fdt_subnode_offset(fdt, 0, "reserved-memory");
188 if (nodeoffset >= 0) {
189 subnode = fdt_first_subnode(fdt, nodeoffset);
190 while (subnode >= 0) {
191 /* check if this subnode has a reg property */
192 addr = fdtdec_get_addr_size(fdt, subnode, "reg",
193 (fdt_size_t *)&size);
194 /*
195 * The /reserved-memory node may have children with
196 * a size instead of a reg property.
197 */
Heinrich Schuchardt4ef2b0d2020-03-24 07:37:52 +0100198 if (addr != FDT_ADDR_T_NONE &&
199 fdtdec_get_is_enabled(fdt, subnode))
Atish Patra7be64b82020-03-13 17:11:30 -0700200 efi_reserve_memory(addr, size);
201 subnode = fdt_next_subnode(fdt, subnode);
202 }
Alexander Graf806d2fa2018-04-06 09:40:51 +0200203 }
Alexander Graf806d2fa2018-04-06 09:40:51 +0200204}
205
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900206/**
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200207 * get_config_table() - get configuration table
208 *
209 * @guid: GUID of the configuration table
210 * Return: pointer to configuration table or NULL
211 */
212static void *get_config_table(const efi_guid_t *guid)
213{
214 size_t i;
215
216 for (i = 0; i < systab.nr_tables; i++) {
217 if (!guidcmp(guid, &systab.tables[i].guid))
218 return systab.tables[i].table;
219 }
220 return NULL;
221}
222
223#endif /* !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) */
224
225/**
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100226 * efi_install_fdt() - install device tree
Heinrich Schuchardte2d82f82019-05-12 20:16:25 +0200227 *
Heinrich Schuchardt7d4d5512020-02-07 22:10:49 +0100228 * If fdt is not EFI_FDT_USE_INTERNAL, the device tree located at that memory
229 * address will will be installed as configuration table, otherwise the device
230 * tree located at the address indicated by environment variable fdt_addr or as
231 * fallback fdtcontroladdr will be used.
Heinrich Schuchardte2d82f82019-05-12 20:16:25 +0200232 *
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100233 * On architectures using ACPI tables device trees shall not be installed as
234 * configuration table.
Heinrich Schuchardte2d82f82019-05-12 20:16:25 +0200235 *
Heinrich Schuchardt7d4d5512020-02-07 22:10:49 +0100236 * @fdt: address of device tree or EFI_FDT_USE_INTERNAL to use the
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100237 * the hardware device tree as indicated by environment variable
238 * fdt_addr or as fallback the internal device tree as indicated by
239 * the environment variable fdtcontroladdr
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900240 * Return: status code
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900241 */
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100242efi_status_t efi_install_fdt(void *fdt)
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900243{
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200244 /*
245 * The EBBR spec requires that we have either an FDT or an ACPI table
246 * but not both.
247 */
248#if CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100249 if (fdt) {
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200250 printf("ERROR: can't have ACPI table and device tree.\n");
251 return EFI_LOAD_ERROR;
252 }
253#else
AKASHI Takahiro3ffc52f2019-04-19 12:22:30 +0900254 bootm_headers_t img = { 0 };
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900255 efi_status_t ret;
256
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100257 if (fdt == EFI_FDT_USE_INTERNAL) {
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100258 const char *fdt_opt;
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100259 uintptr_t fdt_addr;
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100260
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200261 /* Look for device tree that is already installed */
262 if (get_config_table(&efi_guid_fdt))
263 return EFI_SUCCESS;
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100264 /* Check if there is a hardware device tree */
265 fdt_opt = env_get("fdt_addr");
266 /* Use our own device tree as fallback */
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200267 if (!fdt_opt) {
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100268 fdt_opt = env_get("fdtcontroladdr");
269 if (!fdt_opt) {
270 printf("ERROR: need device tree\n");
271 return EFI_NOT_FOUND;
272 }
AKASHI Takahiro3ffc52f2019-04-19 12:22:30 +0900273 }
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200274 fdt_addr = simple_strtoul(fdt_opt, NULL, 16);
275 if (!fdt_addr) {
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100276 printf("ERROR: invalid $fdt_addr or $fdtcontroladdr\n");
AKASHI Takahiro3ffc52f2019-04-19 12:22:30 +0900277 return EFI_LOAD_ERROR;
278 }
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100279 fdt = map_sysmem(fdt_addr, 0);
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900280 }
281
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200282 /* Install device tree */
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200283 if (fdt_check_header(fdt)) {
284 printf("ERROR: invalid device tree\n");
285 return EFI_LOAD_ERROR;
286 }
287
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200288 /* Prepare device tree for payload */
289 ret = copy_fdt(&fdt);
290 if (ret) {
291 printf("ERROR: out of memory\n");
292 return EFI_OUT_OF_RESOURCES;
293 }
294
295 if (image_setup_libfdt(&img, fdt, 0, NULL)) {
296 printf("ERROR: failed to process device tree\n");
297 return EFI_LOAD_ERROR;
298 }
299
Heinrich Schuchardtfef907b2020-03-14 10:59:34 +0100300 /* Create memory reservations as indicated by the device tree */
301 efi_carve_out_dt_rsv(fdt);
302
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200303 /* Install device tree as UEFI table */
304 ret = efi_install_configuration_table(&efi_guid_fdt, fdt);
305 if (ret != EFI_SUCCESS) {
306 printf("ERROR: failed to install device tree\n");
307 return ret;
308 }
309#endif /* GENERATE_ACPI_TABLE */
310
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900311 return EFI_SUCCESS;
312}
313
Simon Glass5e2f0392018-11-25 20:14:39 -0700314/**
Heinrich Schuchardtc9828742018-09-23 17:21:51 +0200315 * do_bootefi_exec() - execute EFI binary
316 *
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900317 * @handle: handle of loaded image
Heinrich Schuchardtc9828742018-09-23 17:21:51 +0200318 * Return: status code
319 *
320 * Load the EFI binary into a newly assigned memory unwinding the relocation
321 * information, install the loaded image protocol, and call the binary.
Alexander Grafb9939332016-03-10 00:27:20 +0100322 */
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900323static efi_status_t do_bootefi_exec(efi_handle_t handle)
Alexander Grafb9939332016-03-10 00:27:20 +0100324{
Heinrich Schuchardt45204b12018-03-03 15:29:01 +0100325 efi_status_t ret;
Heinrich Schuchardt556d8dc2019-04-30 17:57:30 +0200326 efi_uintn_t exit_data_size = 0;
327 u16 *exit_data = NULL;
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100328 u16 *load_options;
Rob Clark95c55532017-09-13 18:05:33 -0400329
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900330 /* Transfer environment variable as load options */
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100331 ret = set_load_options(handle, "bootargs", &load_options);
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900332 if (ret != EFI_SUCCESS)
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900333 return ret;
Rob Clarkbf192732017-10-10 08:23:06 -0400334
Alexander Grafb9939332016-03-10 00:27:20 +0100335 /* Call our payload! */
Heinrich Schuchardt556d8dc2019-04-30 17:57:30 +0200336 ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data));
337 printf("## Application terminated, r = %lu\n", ret & ~EFI_ERROR_MASK);
338 if (ret && exit_data) {
339 printf("## %ls\n", exit_data);
340 efi_free_pool(exit_data);
341 }
Rob Clark95c55532017-09-13 18:05:33 -0400342
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900343 efi_restore_gd();
Simon Glass5e2f0392018-11-25 20:14:39 -0700344
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100345 free(load_options);
Rob Clark95c55532017-09-13 18:05:33 -0400346
347 return ret;
Alexander Grafb9939332016-03-10 00:27:20 +0100348}
349
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900350/**
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200351 * do_efibootmgr() - execute EFI boot manager
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900352 *
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900353 * Return: status code
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900354 */
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200355static int do_efibootmgr(void)
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900356{
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900357 efi_handle_t handle;
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900358 efi_status_t ret;
359
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900360 ret = efi_bootmgr_load(&handle);
361 if (ret != EFI_SUCCESS) {
362 printf("EFI boot manager: Cannot load any image\n");
363 return CMD_RET_FAILURE;
364 }
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900365
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900366 ret = do_bootefi_exec(handle);
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900367
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900368 if (ret != EFI_SUCCESS)
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900369 return CMD_RET_FAILURE;
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900370
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900371 return CMD_RET_SUCCESS;
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900372}
373
Heinrich Schuchardt810371a2019-07-14 13:00:44 +0200374/**
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200375 * do_bootefi_image() - execute EFI binary
376 *
377 * Set up memory image for the binary to be loaded, prepare device path, and
378 * then call do_bootefi_exec() to execute it.
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900379 *
380 * @image_opt: string of image start address
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900381 * Return: status code
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900382 */
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200383static int do_bootefi_image(const char *image_opt)
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900384{
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900385 void *image_buf;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900386 unsigned long addr, size;
387 const char *size_str;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900388 efi_status_t ret;
389
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900390#ifdef CONFIG_CMD_BOOTEFI_HELLO
391 if (!strcmp(image_opt, "hello")) {
392 char *saddr;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900393
394 saddr = env_get("loadaddr");
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900395 size = __efi_helloworld_end - __efi_helloworld_begin;
396
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900397 if (saddr)
398 addr = simple_strtoul(saddr, NULL, 16);
399 else
400 addr = CONFIG_SYS_LOAD_ADDR;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900401
402 image_buf = map_sysmem(addr, size);
403 memcpy(image_buf, __efi_helloworld_begin, size);
404
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100405 efi_free_pool(bootefi_device_path);
406 efi_free_pool(bootefi_image_path);
407 bootefi_device_path = NULL;
408 bootefi_image_path = NULL;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900409 } else
410#endif
411 {
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900412 size_str = env_get("filesize");
413 if (size_str)
414 size = simple_strtoul(size_str, NULL, 16);
415 else
416 size = 0;
417
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900418 addr = simple_strtoul(image_opt, NULL, 16);
419 /* Check that a numeric value was passed */
420 if (!addr && *image_opt != '0')
421 return CMD_RET_USAGE;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900422
423 image_buf = map_sysmem(addr, size);
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900424 }
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100425 ret = efi_run_image(image_buf, size);
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900426
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100427 if (ret != EFI_SUCCESS)
428 return CMD_RET_FAILURE;
429
430 return CMD_RET_SUCCESS;
431}
432
433/**
434 * efi_run_image() - run loaded UEFI image
435 *
436 * @source_buffer: memory address of the UEFI image
437 * @source_size: size of the UEFI image
438 * Return: status code
439 */
440efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size)
441{
442 efi_handle_t mem_handle = NULL, handle;
443 struct efi_device_path *file_path = NULL;
444 efi_status_t ret;
445
446 if (!bootefi_device_path || !bootefi_image_path) {
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900447 /*
448 * Special case for efi payload not loaded from disk,
449 * such as 'bootefi hello' or for example payload
450 * loaded directly into memory via JTAG, etc:
451 */
452 file_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE,
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100453 (uintptr_t)source_buffer,
454 source_size);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900455 /*
456 * Make sure that device for device_path exist
457 * in load_image(). Otherwise, shell and grub will fail.
458 */
459 ret = efi_create_handle(&mem_handle);
460 if (ret != EFI_SUCCESS)
461 goto out;
462
463 ret = efi_add_protocol(mem_handle, &efi_guid_device_path,
464 file_path);
465 if (ret != EFI_SUCCESS)
466 goto out;
467 } else {
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100468 file_path = efi_dp_append(bootefi_device_path,
469 bootefi_image_path);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900470 }
471
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100472 ret = EFI_CALL(efi_load_image(false, efi_root, file_path, source_buffer,
473 source_size, &handle));
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900474 if (ret != EFI_SUCCESS)
475 goto out;
476
477 ret = do_bootefi_exec(handle);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900478
479out:
Heinrich Schuchardt4fe050e2020-04-20 12:44:56 +0200480 efi_delete_handle(mem_handle);
481 efi_free_pool(file_path);
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100482 return ret;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900483}
484
Simon Glassd9717ea2018-11-25 20:14:37 -0700485#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900486static efi_status_t bootefi_run_prepare(const char *load_options_path,
487 struct efi_device_path *device_path,
488 struct efi_device_path *image_path,
489 struct efi_loaded_image_obj **image_objp,
490 struct efi_loaded_image **loaded_image_infop)
491{
492 efi_status_t ret;
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100493 u16 *load_options;
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900494
495 ret = efi_setup_loaded_image(device_path, image_path, image_objp,
496 loaded_image_infop);
497 if (ret != EFI_SUCCESS)
498 return ret;
499
500 /* Transfer environment variable as load options */
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100501 return set_load_options((efi_handle_t)*image_objp, load_options_path,
502 &load_options);
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900503}
504
Simon Glassd9717ea2018-11-25 20:14:37 -0700505/**
506 * bootefi_test_prepare() - prepare to run an EFI test
507 *
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100508 * Prepare to run a test as if it were provided by a loaded image.
Simon Glassd9717ea2018-11-25 20:14:37 -0700509 *
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100510 * @image_objp: pointer to be set to the loaded image handle
511 * @loaded_image_infop: pointer to be set to the loaded image protocol
512 * @path: dummy file path used to construct the device path
513 * set in the loaded image protocol
514 * @load_options_path: name of a U-Boot environment variable. Its value is
515 * set as load options in the loaded image protocol.
516 * Return: status code
Simon Glassd9717ea2018-11-25 20:14:37 -0700517 */
518static efi_status_t bootefi_test_prepare
519 (struct efi_loaded_image_obj **image_objp,
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100520 struct efi_loaded_image **loaded_image_infop, const char *path,
521 const char *load_options_path)
Simon Glassd9717ea2018-11-25 20:14:37 -0700522{
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100523 efi_status_t ret;
524
Simon Glassd9717ea2018-11-25 20:14:37 -0700525 /* Construct a dummy device path */
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100526 bootefi_device_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, 0, 0);
Simon Glassd9717ea2018-11-25 20:14:37 -0700527 if (!bootefi_device_path)
528 return EFI_OUT_OF_RESOURCES;
Simon Glassd9717ea2018-11-25 20:14:37 -0700529
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100530 bootefi_image_path = efi_dp_from_file(NULL, 0, path);
531 if (!bootefi_image_path) {
532 ret = EFI_OUT_OF_RESOURCES;
533 goto failure;
534 }
535
536 ret = bootefi_run_prepare(load_options_path, bootefi_device_path,
537 bootefi_image_path, image_objp,
538 loaded_image_infop);
539 if (ret == EFI_SUCCESS)
540 return ret;
541
542 efi_free_pool(bootefi_image_path);
543 bootefi_image_path = NULL;
544failure:
545 efi_free_pool(bootefi_device_path);
546 bootefi_device_path = NULL;
547 return ret;
Simon Glassd9717ea2018-11-25 20:14:37 -0700548}
549
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900550/**
551 * bootefi_run_finish() - finish up after running an EFI test
552 *
553 * @loaded_image_info: Pointer to a struct which holds the loaded image info
554 * @image_obj: Pointer to a struct which holds the loaded image object
555 */
556static void bootefi_run_finish(struct efi_loaded_image_obj *image_obj,
557 struct efi_loaded_image *loaded_image_info)
558{
559 efi_restore_gd();
560 free(loaded_image_info->load_options);
561 efi_delete_handle(&image_obj->header);
562}
563
564/**
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200565 * do_efi_selftest() - execute EFI selftest
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900566 *
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900567 * Return: status code
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900568 */
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200569static int do_efi_selftest(void)
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900570{
571 struct efi_loaded_image_obj *image_obj;
572 struct efi_loaded_image *loaded_image_info;
573 efi_status_t ret;
574
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900575 ret = bootefi_test_prepare(&image_obj, &loaded_image_info,
576 "\\selftest", "efi_selftest");
577 if (ret != EFI_SUCCESS)
578 return CMD_RET_FAILURE;
579
580 /* Execute the test */
581 ret = EFI_CALL(efi_selftest(&image_obj->header, &systab));
582 bootefi_run_finish(image_obj, loaded_image_info);
583
584 return ret != EFI_SUCCESS;
585}
Simon Glassd9717ea2018-11-25 20:14:37 -0700586#endif /* CONFIG_CMD_BOOTEFI_SELFTEST */
587
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200588/**
589 * do_bootefi() - execute `bootefi` command
590 *
591 * @cmdtp: table entry describing command
592 * @flag: bitmap indicating how the command was invoked
593 * @argc: number of arguments
594 * @argv: command line arguments
595 * Return: status code
596 */
Alexander Grafb9939332016-03-10 00:27:20 +0100597static int do_bootefi(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
598{
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200599 efi_status_t ret;
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100600 void *fdt;
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200601
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900602 if (argc < 2)
603 return CMD_RET_USAGE;
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900604
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200605 /* Initialize EFI drivers */
606 ret = efi_init_obj_list();
607 if (ret != EFI_SUCCESS) {
608 printf("Error: Cannot initialize UEFI sub-system, r = %lu\n",
609 ret & ~EFI_ERROR_MASK);
610 return CMD_RET_FAILURE;
611 }
612
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100613 if (argc > 2) {
614 uintptr_t fdt_addr;
615
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100616 fdt_addr = simple_strtoul(argv[2], NULL, 16);
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100617 fdt = map_sysmem(fdt_addr, 0);
618 } else {
619 fdt = EFI_FDT_USE_INTERNAL;
620 }
621 ret = efi_install_fdt(fdt);
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200622 if (ret == EFI_INVALID_PARAMETER)
623 return CMD_RET_USAGE;
624 else if (ret != EFI_SUCCESS)
625 return CMD_RET_FAILURE;
626
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900627 if (!strcmp(argv[1], "bootmgr"))
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200628 return do_efibootmgr();
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900629#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
630 else if (!strcmp(argv[1], "selftest"))
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200631 return do_efi_selftest();
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900632#endif
633
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200634 return do_bootefi_image(argv[1]);
Alexander Grafb9939332016-03-10 00:27:20 +0100635}
636
637#ifdef CONFIG_SYS_LONGHELP
638static char bootefi_help_text[] =
Alexander Graf1c398092016-04-14 16:07:53 +0200639 "<image address> [fdt address]\n"
640 " - boot EFI payload stored at address <image address>.\n"
641 " If specified, the device tree located at <fdt address> gets\n"
Simon Glassc7ae3df2016-11-07 08:47:08 -0700642 " exposed as EFI configuration table.\n"
643#ifdef CONFIG_CMD_BOOTEFI_HELLO
Heinrich Schuchardt623b3a52017-09-15 10:06:11 +0200644 "bootefi hello\n"
645 " - boot a sample Hello World application stored within U-Boot\n"
646#endif
647#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
Heinrich Schuchardtbc4f9132018-03-03 15:29:03 +0100648 "bootefi selftest [fdt address]\n"
Heinrich Schuchardt623b3a52017-09-15 10:06:11 +0200649 " - boot an EFI selftest application stored within U-Boot\n"
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +0200650 " Use environment variable efi_selftest to select a single test.\n"
651 " Use 'setenv efi_selftest list' to enumerate all tests.\n"
Simon Glassc7ae3df2016-11-07 08:47:08 -0700652#endif
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900653 "bootefi bootmgr [fdt address]\n"
Rob Clark9975fe92017-09-13 18:05:38 -0400654 " - load and boot EFI payload based on BootOrder/BootXXXX variables.\n"
655 "\n"
656 " If specified, the device tree located at <fdt address> gets\n"
657 " exposed as EFI configuration table.\n";
Alexander Grafb9939332016-03-10 00:27:20 +0100658#endif
659
660U_BOOT_CMD(
Alexander Graf1c398092016-04-14 16:07:53 +0200661 bootefi, 3, 0, do_bootefi,
Sergey Kubushyn92dfd922016-06-07 11:14:31 -0700662 "Boots an EFI payload from memory",
Alexander Grafb9939332016-03-10 00:27:20 +0100663 bootefi_help_text
664);
Alexander Graf0f4060e2016-03-04 01:10:14 +0100665
Heinrich Schuchardt810371a2019-07-14 13:00:44 +0200666/**
667 * efi_set_bootdev() - set boot device
668 *
669 * This function is called when a file is loaded, e.g. via the 'load' command.
670 * We use the path to this file to inform the UEFI binary about the boot device.
671 *
672 * @dev: device, e.g. "MMC"
673 * @devnr: number of the device, e.g. "1:2"
674 * @path: path to file loaded
675 */
Alexander Grafc07ad7c2016-04-11 16:16:19 +0200676void efi_set_bootdev(const char *dev, const char *devnr, const char *path)
Alexander Graf0f4060e2016-03-04 01:10:14 +0100677{
AKASHI Takahirof1589ff2018-10-17 16:32:03 +0900678 struct efi_device_path *device, *image;
679 efi_status_t ret;
Alexander Graf0f4060e2016-03-04 01:10:14 +0100680
Heinrich Schuchardt79276eb2018-09-16 07:20:21 +0200681 /* efi_set_bootdev is typically called repeatedly, recover memory */
682 efi_free_pool(bootefi_device_path);
683 efi_free_pool(bootefi_image_path);
Heinrich Schuchardt79276eb2018-09-16 07:20:21 +0200684
AKASHI Takahirof1589ff2018-10-17 16:32:03 +0900685 ret = efi_dp_from_name(dev, devnr, path, &device, &image);
686 if (ret == EFI_SUCCESS) {
687 bootefi_device_path = device;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900688 if (image) {
689 /* FIXME: image should not contain device */
690 struct efi_device_path *image_tmp = image;
691
692 efi_dp_split_file_path(image, &device, &image);
693 efi_free_pool(image_tmp);
694 }
AKASHI Takahirof1589ff2018-10-17 16:32:03 +0900695 bootefi_image_path = image;
Rob Clark95c55532017-09-13 18:05:33 -0400696 } else {
AKASHI Takahirof1589ff2018-10-17 16:32:03 +0900697 bootefi_device_path = NULL;
698 bootefi_image_path = NULL;
Alexander Graff9d334b2016-08-05 14:49:53 +0200699 }
Alexander Graf0f4060e2016-03-04 01:10:14 +0100700}