blob: 40d5ef2b3a5bfcb3c18d7c5439309efd49687b70 [file] [log] [blame]
Tom Rinif739fcd2018-05-07 17:02:21 -04001// SPDX-License-Identifier: GPL-2.0+
Alexander Grafb9939332016-03-10 00:27:20 +01002/*
3 * EFI application loader
4 *
5 * Copyright (c) 2016 Alexander Graf
Alexander Grafb9939332016-03-10 00:27:20 +01006 */
7
Heinrich Schuchardtc0018372020-07-17 20:21:00 +02008#define LOG_CATEGORY LOGC_EFI
9
Alexander Grafb9939332016-03-10 00:27:20 +010010#include <common.h>
Heinrich Schuchardtf6c6df72019-01-08 18:13:06 +010011#include <charset.h>
Alexander Grafb9939332016-03-10 00:27:20 +010012#include <command.h>
Simon Glass9d922452017-05-17 17:18:03 -060013#include <dm.h>
Alexander Grafb9939332016-03-10 00:27:20 +010014#include <efi_loader.h>
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020015#include <efi_selftest.h>
Simon Glass7b51b572019-08-01 09:46:52 -060016#include <env.h>
Alexander Grafb9939332016-03-10 00:27:20 +010017#include <errno.h>
Simon Glass4d72caa2020-05-10 11:40:01 -060018#include <image.h>
Heinrich Schuchardtc0018372020-07-17 20:21:00 +020019#include <log.h>
Simon Glass336d4612020-02-03 07:36:16 -070020#include <malloc.h>
Masahiro Yamadab08c8c42018-03-05 01:20:11 +090021#include <linux/libfdt.h>
22#include <linux/libfdt_env.h>
Alexander Graf354264b2018-06-18 17:22:58 +020023#include <mapmem.h>
Alexander Grafad0c1a32016-04-11 23:51:01 +020024#include <memalign.h>
Simon Glasse2754582016-09-25 15:27:32 -060025#include <asm-generic/sections.h>
26#include <linux/linkage.h>
Alexander Graf0d9d5012016-04-11 16:55:26 +020027
28DECLARE_GLOBAL_DATA_PTR;
Alexander Grafb9939332016-03-10 00:27:20 +010029
Rob Clark95c55532017-09-13 18:05:33 -040030static struct efi_device_path *bootefi_image_path;
31static struct efi_device_path *bootefi_device_path;
Alexander Grafb9939332016-03-10 00:27:20 +010032
Heinrich Schuchardt810371a2019-07-14 13:00:44 +020033/**
Heinrich Schuchardt1064d042020-08-07 17:47:13 +020034 * efi_env_set_load_options() - set load options from environment variable
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020035 *
Heinrich Schuchardta3850e42020-01-03 22:53:42 +010036 * @handle: the image handle
37 * @env_var: name of the environment variable
38 * @load_options: pointer to load options (output)
39 * Return: status code
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020040 */
Heinrich Schuchardt1064d042020-08-07 17:47:13 +020041static efi_status_t efi_env_set_load_options(efi_handle_t handle,
42 const char *env_var,
43 u16 **load_options)
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020044{
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020045 const char *env = env_get(env_var);
Heinrich Schuchardt1064d042020-08-07 17:47:13 +020046 size_t size;
Heinrich Schuchardt7086a712018-08-31 21:31:33 +020047 u16 *pos;
AKASHI Takahirodefa7b82019-04-19 12:22:28 +090048 efi_status_t ret;
49
Heinrich Schuchardta3850e42020-01-03 22:53:42 +010050 *load_options = NULL;
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020051 if (!env)
Heinrich Schuchardt1064d042020-08-07 17:47:13 +020052 return EFI_SUCCESS;
53 size = sizeof(u16) * (utf8_utf16_strlen(env) + 1);
54 pos = calloc(size, 1);
55 if (!pos)
AKASHI Takahirodefa7b82019-04-19 12:22:28 +090056 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardta3850e42020-01-03 22:53:42 +010057 *load_options = pos;
Heinrich Schuchardt7086a712018-08-31 21:31:33 +020058 utf8_utf16_strcpy(&pos, env);
Heinrich Schuchardt1064d042020-08-07 17:47:13 +020059 ret = efi_set_load_options(handle, size, *load_options);
60 if (ret != EFI_SUCCESS) {
61 free(*load_options);
62 *load_options = NULL;
63 }
64 return ret;
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020065}
66
Heinrich Schuchardt61824952019-04-20 13:33:55 +020067#if !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
68
Simon Glass9dff4902018-08-08 03:54:30 -060069/**
70 * copy_fdt() - Copy the device tree to a new location available to EFI
71 *
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +010072 * The FDT is copied to a suitable location within the EFI memory map.
Heinrich Schuchardtc3772ca2018-11-18 17:58:49 +010073 * Additional 12 KiB are added to the space in case the device tree needs to be
Simon Glass9dff4902018-08-08 03:54:30 -060074 * expanded later with fdt_open_into().
75 *
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +010076 * @fdtp: On entry a pointer to the flattened device tree.
77 * On exit a pointer to the copy of the flattened device tree.
Heinrich Schuchardt4574d1b2018-11-12 18:55:22 +010078 * FDT start
79 * Return: status code
Simon Glass9dff4902018-08-08 03:54:30 -060080 */
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +010081static efi_status_t copy_fdt(void **fdtp)
Alexander Graf0d9d5012016-04-11 16:55:26 +020082{
Alexander Grafad0c1a32016-04-11 23:51:01 +020083 unsigned long fdt_ram_start = -1L, fdt_pages;
Simon Glass9dff4902018-08-08 03:54:30 -060084 efi_status_t ret = 0;
85 void *fdt, *new_fdt;
Alexander Grafad0c1a32016-04-11 23:51:01 +020086 u64 new_fdt_addr;
Simon Glass9dff4902018-08-08 03:54:30 -060087 uint fdt_size;
Alexander Grafad0c1a32016-04-11 23:51:01 +020088 int i;
Alexander Graf0d9d5012016-04-11 16:55:26 +020089
Simon Glass9dff4902018-08-08 03:54:30 -060090 for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) {
91 u64 ram_start = gd->bd->bi_dram[i].start;
92 u64 ram_size = gd->bd->bi_dram[i].size;
Alexander Graf0d9d5012016-04-11 16:55:26 +020093
Alexander Grafad0c1a32016-04-11 23:51:01 +020094 if (!ram_size)
95 continue;
96
97 if (ram_start < fdt_ram_start)
98 fdt_ram_start = ram_start;
99 }
100
Simon Glassbc9a6382018-06-18 08:08:25 -0600101 /*
Heinrich Schuchardtc3772ca2018-11-18 17:58:49 +0100102 * Give us at least 12 KiB of breathing room in case the device tree
103 * needs to be expanded later.
Simon Glassbc9a6382018-06-18 08:08:25 -0600104 */
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100105 fdt = *fdtp;
Heinrich Schuchardtc3772ca2018-11-18 17:58:49 +0100106 fdt_pages = efi_size_in_pages(fdt_totalsize(fdt) + 0x3000);
107 fdt_size = fdt_pages << EFI_PAGE_SHIFT;
Alexander Grafad0c1a32016-04-11 23:51:01 +0200108
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100109 /*
110 * Safe fdt location is at 127 MiB.
111 * On the sandbox convert from the sandbox address space.
112 */
113 new_fdt_addr = (uintptr_t)map_sysmem(fdt_ram_start + 0x7f00000 +
114 fdt_size, 0);
Simon Glass9dff4902018-08-08 03:54:30 -0600115 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardt42a426e2020-05-06 20:32:31 +0200116 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass9dff4902018-08-08 03:54:30 -0600117 &new_fdt_addr);
118 if (ret != EFI_SUCCESS) {
Alexander Grafad0c1a32016-04-11 23:51:01 +0200119 /* If we can't put it there, put it somewhere */
xypron.glpk@gmx.dea44bffc2017-08-11 21:19:25 +0200120 new_fdt_addr = (ulong)memalign(EFI_PAGE_SIZE, fdt_size);
Simon Glass9dff4902018-08-08 03:54:30 -0600121 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardt42a426e2020-05-06 20:32:31 +0200122 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass9dff4902018-08-08 03:54:30 -0600123 &new_fdt_addr);
124 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200125 log_err("ERROR: Failed to reserve space for FDT\n");
Simon Glass9dff4902018-08-08 03:54:30 -0600126 goto done;
Alexander Graf85a6e9b2017-07-03 13:32:35 +0200127 }
Alexander Grafad0c1a32016-04-11 23:51:01 +0200128 }
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100129 new_fdt = (void *)(uintptr_t)new_fdt_addr;
Alexander Graf0d9d5012016-04-11 16:55:26 +0200130 memcpy(new_fdt, fdt, fdt_totalsize(fdt));
131 fdt_set_totalsize(new_fdt, fdt_size);
132
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100133 *fdtp = (void *)(uintptr_t)new_fdt_addr;
Simon Glass9dff4902018-08-08 03:54:30 -0600134done:
135 return ret;
Alexander Graf0d9d5012016-04-11 16:55:26 +0200136}
137
Atish Patra7be64b82020-03-13 17:11:30 -0700138static void efi_reserve_memory(u64 addr, u64 size)
139{
Atish Patra7be64b82020-03-13 17:11:30 -0700140 /* Convert from sandbox address space. */
141 addr = (uintptr_t)map_sysmem(addr, 0);
Michael Walle714497e2020-05-17 12:29:19 +0200142 if (efi_add_memory_map(addr, size,
143 EFI_RESERVED_MEMORY_TYPE) != EFI_SUCCESS)
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200144 log_err("Reserved memory mapping failed addr %llx size %llx\n",
145 addr, size);
Atish Patra7be64b82020-03-13 17:11:30 -0700146}
147
Heinrich Schuchardt810371a2019-07-14 13:00:44 +0200148/**
Simon Glass416e07e2018-06-18 08:08:28 -0600149 * efi_carve_out_dt_rsv() - Carve out DT reserved memory ranges
150 *
151 * The mem_rsv entries of the FDT are added to the memory map. Any failures are
152 * ignored because this is not critical and we would rather continue to try to
153 * boot.
154 *
155 * @fdt: Pointer to device tree
156 */
157static void efi_carve_out_dt_rsv(void *fdt)
Alexander Graf806d2fa2018-04-06 09:40:51 +0200158{
159 int nr_rsv, i;
Atish Patra7be64b82020-03-13 17:11:30 -0700160 u64 addr, size;
161 int nodeoffset, subnode;
Alexander Graf806d2fa2018-04-06 09:40:51 +0200162
163 nr_rsv = fdt_num_mem_rsv(fdt);
164
165 /* Look for an existing entry and add it to the efi mem map. */
166 for (i = 0; i < nr_rsv; i++) {
167 if (fdt_get_mem_rsv(fdt, i, &addr, &size) != 0)
168 continue;
Atish Patra7be64b82020-03-13 17:11:30 -0700169 efi_reserve_memory(addr, size);
170 }
Alexander Graf806d2fa2018-04-06 09:40:51 +0200171
Atish Patra7be64b82020-03-13 17:11:30 -0700172 /* process reserved-memory */
173 nodeoffset = fdt_subnode_offset(fdt, 0, "reserved-memory");
174 if (nodeoffset >= 0) {
175 subnode = fdt_first_subnode(fdt, nodeoffset);
176 while (subnode >= 0) {
Bin Mengb1c272d2020-06-22 23:50:50 -0700177 fdt_addr_t fdt_addr;
178 fdt_size_t fdt_size;
Atish Patra0d7c2912020-06-18 18:51:50 -0700179
Atish Patra7be64b82020-03-13 17:11:30 -0700180 /* check if this subnode has a reg property */
Atish Patra0d7c2912020-06-18 18:51:50 -0700181 fdt_addr = fdtdec_get_addr_size_auto_parent(
182 fdt, nodeoffset, subnode,
183 "reg", 0, &fdt_size, false);
Atish Patra7be64b82020-03-13 17:11:30 -0700184 /*
185 * The /reserved-memory node may have children with
186 * a size instead of a reg property.
187 */
Heinrich Schuchardt039d4f52020-06-30 14:12:43 +0200188 if (fdt_addr != FDT_ADDR_T_NONE &&
Heinrich Schuchardt4ef2b0d2020-03-24 07:37:52 +0100189 fdtdec_get_is_enabled(fdt, subnode))
Atish Patra0d7c2912020-06-18 18:51:50 -0700190 efi_reserve_memory(fdt_addr, fdt_size);
Atish Patra7be64b82020-03-13 17:11:30 -0700191 subnode = fdt_next_subnode(fdt, subnode);
192 }
Alexander Graf806d2fa2018-04-06 09:40:51 +0200193 }
Alexander Graf806d2fa2018-04-06 09:40:51 +0200194}
195
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900196/**
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200197 * get_config_table() - get configuration table
198 *
199 * @guid: GUID of the configuration table
200 * Return: pointer to configuration table or NULL
201 */
202static void *get_config_table(const efi_guid_t *guid)
203{
204 size_t i;
205
206 for (i = 0; i < systab.nr_tables; i++) {
207 if (!guidcmp(guid, &systab.tables[i].guid))
208 return systab.tables[i].table;
209 }
210 return NULL;
211}
212
213#endif /* !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) */
214
215/**
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100216 * efi_install_fdt() - install device tree
Heinrich Schuchardte2d82f82019-05-12 20:16:25 +0200217 *
Heinrich Schuchardt7d4d5512020-02-07 22:10:49 +0100218 * If fdt is not EFI_FDT_USE_INTERNAL, the device tree located at that memory
219 * address will will be installed as configuration table, otherwise the device
220 * tree located at the address indicated by environment variable fdt_addr or as
221 * fallback fdtcontroladdr will be used.
Heinrich Schuchardte2d82f82019-05-12 20:16:25 +0200222 *
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100223 * On architectures using ACPI tables device trees shall not be installed as
224 * configuration table.
Heinrich Schuchardte2d82f82019-05-12 20:16:25 +0200225 *
Heinrich Schuchardt7d4d5512020-02-07 22:10:49 +0100226 * @fdt: address of device tree or EFI_FDT_USE_INTERNAL to use the
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100227 * the hardware device tree as indicated by environment variable
228 * fdt_addr or as fallback the internal device tree as indicated by
229 * the environment variable fdtcontroladdr
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900230 * Return: status code
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900231 */
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100232efi_status_t efi_install_fdt(void *fdt)
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900233{
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200234 /*
235 * The EBBR spec requires that we have either an FDT or an ACPI table
236 * but not both.
237 */
238#if CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100239 if (fdt) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200240 log_err("ERROR: can't have ACPI table and device tree.\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200241 return EFI_LOAD_ERROR;
242 }
243#else
AKASHI Takahiro3ffc52f2019-04-19 12:22:30 +0900244 bootm_headers_t img = { 0 };
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900245 efi_status_t ret;
246
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100247 if (fdt == EFI_FDT_USE_INTERNAL) {
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100248 const char *fdt_opt;
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100249 uintptr_t fdt_addr;
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100250
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200251 /* Look for device tree that is already installed */
252 if (get_config_table(&efi_guid_fdt))
253 return EFI_SUCCESS;
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100254 /* Check if there is a hardware device tree */
255 fdt_opt = env_get("fdt_addr");
256 /* Use our own device tree as fallback */
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200257 if (!fdt_opt) {
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100258 fdt_opt = env_get("fdtcontroladdr");
259 if (!fdt_opt) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200260 log_err("ERROR: need device tree\n");
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100261 return EFI_NOT_FOUND;
262 }
AKASHI Takahiro3ffc52f2019-04-19 12:22:30 +0900263 }
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200264 fdt_addr = simple_strtoul(fdt_opt, NULL, 16);
265 if (!fdt_addr) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200266 log_err("ERROR: invalid $fdt_addr or $fdtcontroladdr\n");
AKASHI Takahiro3ffc52f2019-04-19 12:22:30 +0900267 return EFI_LOAD_ERROR;
268 }
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100269 fdt = map_sysmem(fdt_addr, 0);
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900270 }
271
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200272 /* Install device tree */
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200273 if (fdt_check_header(fdt)) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200274 log_err("ERROR: invalid device tree\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200275 return EFI_LOAD_ERROR;
276 }
277
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200278 /* Prepare device tree for payload */
279 ret = copy_fdt(&fdt);
280 if (ret) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200281 log_err("ERROR: out of memory\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200282 return EFI_OUT_OF_RESOURCES;
283 }
284
285 if (image_setup_libfdt(&img, fdt, 0, NULL)) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200286 log_err("ERROR: failed to process device tree\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200287 return EFI_LOAD_ERROR;
288 }
289
Heinrich Schuchardtfef907b2020-03-14 10:59:34 +0100290 /* Create memory reservations as indicated by the device tree */
291 efi_carve_out_dt_rsv(fdt);
292
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200293 /* Install device tree as UEFI table */
294 ret = efi_install_configuration_table(&efi_guid_fdt, fdt);
295 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200296 log_err("ERROR: failed to install device tree\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200297 return ret;
298 }
299#endif /* GENERATE_ACPI_TABLE */
300
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900301 return EFI_SUCCESS;
302}
303
Simon Glass5e2f0392018-11-25 20:14:39 -0700304/**
Heinrich Schuchardtc9828742018-09-23 17:21:51 +0200305 * do_bootefi_exec() - execute EFI binary
306 *
Heinrich Schuchardt72e1fca2020-08-15 23:10:22 +0200307 * The image indicated by @handle is started. When it returns the allocated
308 * memory for the @load_options is freed.
309 *
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900310 * @handle: handle of loaded image
Heinrich Schuchardt72e1fca2020-08-15 23:10:22 +0200311 * @load_options: load options
Heinrich Schuchardtc9828742018-09-23 17:21:51 +0200312 * Return: status code
313 *
314 * Load the EFI binary into a newly assigned memory unwinding the relocation
315 * information, install the loaded image protocol, and call the binary.
Alexander Grafb9939332016-03-10 00:27:20 +0100316 */
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +0200317static efi_status_t do_bootefi_exec(efi_handle_t handle, void *load_options)
Alexander Grafb9939332016-03-10 00:27:20 +0100318{
Heinrich Schuchardt45204b12018-03-03 15:29:01 +0100319 efi_status_t ret;
Heinrich Schuchardt556d8dc2019-04-30 17:57:30 +0200320 efi_uintn_t exit_data_size = 0;
321 u16 *exit_data = NULL;
Rob Clarkbf192732017-10-10 08:23:06 -0400322
Alexander Grafb9939332016-03-10 00:27:20 +0100323 /* Call our payload! */
Heinrich Schuchardt556d8dc2019-04-30 17:57:30 +0200324 ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data));
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200325 if (ret != EFI_SUCCESS) {
326 log_err("## Application failed, r = %lu\n",
327 ret & ~EFI_ERROR_MASK);
328 if (exit_data) {
329 log_err("## %ls\n", exit_data);
330 efi_free_pool(exit_data);
331 }
Heinrich Schuchardt556d8dc2019-04-30 17:57:30 +0200332 }
Rob Clark95c55532017-09-13 18:05:33 -0400333
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900334 efi_restore_gd();
Simon Glass5e2f0392018-11-25 20:14:39 -0700335
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100336 free(load_options);
Rob Clark95c55532017-09-13 18:05:33 -0400337
338 return ret;
Alexander Grafb9939332016-03-10 00:27:20 +0100339}
340
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900341/**
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200342 * do_efibootmgr() - execute EFI boot manager
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900343 *
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900344 * Return: status code
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900345 */
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200346static int do_efibootmgr(void)
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900347{
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900348 efi_handle_t handle;
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900349 efi_status_t ret;
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +0200350 void *load_options;
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900351
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +0200352 ret = efi_bootmgr_load(&handle, &load_options);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900353 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200354 log_notice("EFI boot manager: Cannot load any image\n");
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900355 return CMD_RET_FAILURE;
356 }
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900357
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +0200358 ret = do_bootefi_exec(handle, load_options);
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900359
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900360 if (ret != EFI_SUCCESS)
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900361 return CMD_RET_FAILURE;
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900362
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900363 return CMD_RET_SUCCESS;
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900364}
365
Heinrich Schuchardt810371a2019-07-14 13:00:44 +0200366/**
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200367 * do_bootefi_image() - execute EFI binary
368 *
369 * Set up memory image for the binary to be loaded, prepare device path, and
370 * then call do_bootefi_exec() to execute it.
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900371 *
372 * @image_opt: string of image start address
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900373 * Return: status code
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900374 */
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200375static int do_bootefi_image(const char *image_opt)
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900376{
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900377 void *image_buf;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900378 unsigned long addr, size;
379 const char *size_str;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900380 efi_status_t ret;
381
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900382#ifdef CONFIG_CMD_BOOTEFI_HELLO
383 if (!strcmp(image_opt, "hello")) {
384 char *saddr;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900385
386 saddr = env_get("loadaddr");
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900387 size = __efi_helloworld_end - __efi_helloworld_begin;
388
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900389 if (saddr)
390 addr = simple_strtoul(saddr, NULL, 16);
391 else
392 addr = CONFIG_SYS_LOAD_ADDR;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900393
394 image_buf = map_sysmem(addr, size);
395 memcpy(image_buf, __efi_helloworld_begin, size);
396
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100397 efi_free_pool(bootefi_device_path);
398 efi_free_pool(bootefi_image_path);
399 bootefi_device_path = NULL;
400 bootefi_image_path = NULL;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900401 } else
402#endif
403 {
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900404 size_str = env_get("filesize");
405 if (size_str)
406 size = simple_strtoul(size_str, NULL, 16);
407 else
408 size = 0;
409
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900410 addr = simple_strtoul(image_opt, NULL, 16);
411 /* Check that a numeric value was passed */
412 if (!addr && *image_opt != '0')
413 return CMD_RET_USAGE;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900414
415 image_buf = map_sysmem(addr, size);
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900416 }
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100417 ret = efi_run_image(image_buf, size);
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900418
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100419 if (ret != EFI_SUCCESS)
420 return CMD_RET_FAILURE;
421
422 return CMD_RET_SUCCESS;
423}
424
425/**
426 * efi_run_image() - run loaded UEFI image
427 *
428 * @source_buffer: memory address of the UEFI image
429 * @source_size: size of the UEFI image
430 * Return: status code
431 */
432efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size)
433{
434 efi_handle_t mem_handle = NULL, handle;
435 struct efi_device_path *file_path = NULL;
Heinrich Schuchardtc2f01032020-08-25 17:54:05 +0000436 struct efi_device_path *msg_path;
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100437 efi_status_t ret;
Heinrich Schuchardtc2f01032020-08-25 17:54:05 +0000438 u16 *load_options;
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100439
440 if (!bootefi_device_path || !bootefi_image_path) {
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900441 /*
442 * Special case for efi payload not loaded from disk,
443 * such as 'bootefi hello' or for example payload
444 * loaded directly into memory via JTAG, etc:
445 */
446 file_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE,
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100447 (uintptr_t)source_buffer,
448 source_size);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900449 /*
450 * Make sure that device for device_path exist
451 * in load_image(). Otherwise, shell and grub will fail.
452 */
453 ret = efi_create_handle(&mem_handle);
454 if (ret != EFI_SUCCESS)
455 goto out;
456
457 ret = efi_add_protocol(mem_handle, &efi_guid_device_path,
458 file_path);
459 if (ret != EFI_SUCCESS)
460 goto out;
Heinrich Schuchardtc2f01032020-08-25 17:54:05 +0000461 msg_path = file_path;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900462 } else {
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100463 file_path = efi_dp_append(bootefi_device_path,
464 bootefi_image_path);
Heinrich Schuchardtc2f01032020-08-25 17:54:05 +0000465 msg_path = bootefi_image_path;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900466 }
467
Heinrich Schuchardtc2f01032020-08-25 17:54:05 +0000468 log_info("Booting %pD\n", msg_path);
469
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100470 ret = EFI_CALL(efi_load_image(false, efi_root, file_path, source_buffer,
471 source_size, &handle));
Heinrich Schuchardtc2f01032020-08-25 17:54:05 +0000472 if (ret != EFI_SUCCESS) {
473 log_err("Loading image failed\n");
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900474 goto out;
Heinrich Schuchardtc2f01032020-08-25 17:54:05 +0000475 }
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +0200476
477 /* Transfer environment variable as load options */
478 ret = efi_env_set_load_options(handle, "bootargs", &load_options);
479 if (ret != EFI_SUCCESS)
480 goto out;
481
482 ret = do_bootefi_exec(handle, load_options);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900483
484out:
Heinrich Schuchardt4fe050e2020-04-20 12:44:56 +0200485 efi_delete_handle(mem_handle);
486 efi_free_pool(file_path);
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100487 return ret;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900488}
489
Simon Glassd9717ea2018-11-25 20:14:37 -0700490#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900491static efi_status_t bootefi_run_prepare(const char *load_options_path,
492 struct efi_device_path *device_path,
493 struct efi_device_path *image_path,
494 struct efi_loaded_image_obj **image_objp,
495 struct efi_loaded_image **loaded_image_infop)
496{
497 efi_status_t ret;
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100498 u16 *load_options;
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900499
500 ret = efi_setup_loaded_image(device_path, image_path, image_objp,
501 loaded_image_infop);
502 if (ret != EFI_SUCCESS)
503 return ret;
504
505 /* Transfer environment variable as load options */
Heinrich Schuchardt1064d042020-08-07 17:47:13 +0200506 return efi_env_set_load_options((efi_handle_t)*image_objp,
507 load_options_path,
508 &load_options);
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900509}
510
Simon Glassd9717ea2018-11-25 20:14:37 -0700511/**
512 * bootefi_test_prepare() - prepare to run an EFI test
513 *
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100514 * Prepare to run a test as if it were provided by a loaded image.
Simon Glassd9717ea2018-11-25 20:14:37 -0700515 *
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100516 * @image_objp: pointer to be set to the loaded image handle
517 * @loaded_image_infop: pointer to be set to the loaded image protocol
518 * @path: dummy file path used to construct the device path
519 * set in the loaded image protocol
520 * @load_options_path: name of a U-Boot environment variable. Its value is
521 * set as load options in the loaded image protocol.
522 * Return: status code
Simon Glassd9717ea2018-11-25 20:14:37 -0700523 */
524static efi_status_t bootefi_test_prepare
525 (struct efi_loaded_image_obj **image_objp,
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100526 struct efi_loaded_image **loaded_image_infop, const char *path,
527 const char *load_options_path)
Simon Glassd9717ea2018-11-25 20:14:37 -0700528{
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100529 efi_status_t ret;
530
Simon Glassd9717ea2018-11-25 20:14:37 -0700531 /* Construct a dummy device path */
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100532 bootefi_device_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, 0, 0);
Simon Glassd9717ea2018-11-25 20:14:37 -0700533 if (!bootefi_device_path)
534 return EFI_OUT_OF_RESOURCES;
Simon Glassd9717ea2018-11-25 20:14:37 -0700535
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100536 bootefi_image_path = efi_dp_from_file(NULL, 0, path);
537 if (!bootefi_image_path) {
538 ret = EFI_OUT_OF_RESOURCES;
539 goto failure;
540 }
541
542 ret = bootefi_run_prepare(load_options_path, bootefi_device_path,
543 bootefi_image_path, image_objp,
544 loaded_image_infop);
545 if (ret == EFI_SUCCESS)
546 return ret;
547
548 efi_free_pool(bootefi_image_path);
549 bootefi_image_path = NULL;
550failure:
551 efi_free_pool(bootefi_device_path);
552 bootefi_device_path = NULL;
553 return ret;
Simon Glassd9717ea2018-11-25 20:14:37 -0700554}
555
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900556/**
557 * bootefi_run_finish() - finish up after running an EFI test
558 *
559 * @loaded_image_info: Pointer to a struct which holds the loaded image info
560 * @image_obj: Pointer to a struct which holds the loaded image object
561 */
562static void bootefi_run_finish(struct efi_loaded_image_obj *image_obj,
563 struct efi_loaded_image *loaded_image_info)
564{
565 efi_restore_gd();
566 free(loaded_image_info->load_options);
567 efi_delete_handle(&image_obj->header);
568}
569
570/**
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200571 * do_efi_selftest() - execute EFI selftest
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900572 *
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900573 * Return: status code
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900574 */
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200575static int do_efi_selftest(void)
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900576{
577 struct efi_loaded_image_obj *image_obj;
578 struct efi_loaded_image *loaded_image_info;
579 efi_status_t ret;
580
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900581 ret = bootefi_test_prepare(&image_obj, &loaded_image_info,
582 "\\selftest", "efi_selftest");
583 if (ret != EFI_SUCCESS)
584 return CMD_RET_FAILURE;
585
586 /* Execute the test */
587 ret = EFI_CALL(efi_selftest(&image_obj->header, &systab));
588 bootefi_run_finish(image_obj, loaded_image_info);
589
590 return ret != EFI_SUCCESS;
591}
Simon Glassd9717ea2018-11-25 20:14:37 -0700592#endif /* CONFIG_CMD_BOOTEFI_SELFTEST */
593
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200594/**
595 * do_bootefi() - execute `bootefi` command
596 *
597 * @cmdtp: table entry describing command
598 * @flag: bitmap indicating how the command was invoked
599 * @argc: number of arguments
600 * @argv: command line arguments
601 * Return: status code
602 */
Simon Glass09140112020-05-10 11:40:03 -0600603static int do_bootefi(struct cmd_tbl *cmdtp, int flag, int argc,
604 char *const argv[])
Alexander Grafb9939332016-03-10 00:27:20 +0100605{
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200606 efi_status_t ret;
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100607 void *fdt;
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200608
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900609 if (argc < 2)
610 return CMD_RET_USAGE;
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900611
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200612 /* Initialize EFI drivers */
613 ret = efi_init_obj_list();
614 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200615 log_err("Error: Cannot initialize UEFI sub-system, r = %lu\n",
616 ret & ~EFI_ERROR_MASK);
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200617 return CMD_RET_FAILURE;
618 }
619
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100620 if (argc > 2) {
621 uintptr_t fdt_addr;
622
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100623 fdt_addr = simple_strtoul(argv[2], NULL, 16);
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100624 fdt = map_sysmem(fdt_addr, 0);
625 } else {
626 fdt = EFI_FDT_USE_INTERNAL;
627 }
628 ret = efi_install_fdt(fdt);
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200629 if (ret == EFI_INVALID_PARAMETER)
630 return CMD_RET_USAGE;
631 else if (ret != EFI_SUCCESS)
632 return CMD_RET_FAILURE;
633
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900634 if (!strcmp(argv[1], "bootmgr"))
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200635 return do_efibootmgr();
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900636#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
637 else if (!strcmp(argv[1], "selftest"))
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200638 return do_efi_selftest();
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900639#endif
640
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200641 return do_bootefi_image(argv[1]);
Alexander Grafb9939332016-03-10 00:27:20 +0100642}
643
644#ifdef CONFIG_SYS_LONGHELP
645static char bootefi_help_text[] =
Alexander Graf1c398092016-04-14 16:07:53 +0200646 "<image address> [fdt address]\n"
647 " - boot EFI payload stored at address <image address>.\n"
648 " If specified, the device tree located at <fdt address> gets\n"
Simon Glassc7ae3df2016-11-07 08:47:08 -0700649 " exposed as EFI configuration table.\n"
650#ifdef CONFIG_CMD_BOOTEFI_HELLO
Heinrich Schuchardt623b3a52017-09-15 10:06:11 +0200651 "bootefi hello\n"
652 " - boot a sample Hello World application stored within U-Boot\n"
653#endif
654#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
Heinrich Schuchardtbc4f9132018-03-03 15:29:03 +0100655 "bootefi selftest [fdt address]\n"
Heinrich Schuchardt623b3a52017-09-15 10:06:11 +0200656 " - boot an EFI selftest application stored within U-Boot\n"
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +0200657 " Use environment variable efi_selftest to select a single test.\n"
658 " Use 'setenv efi_selftest list' to enumerate all tests.\n"
Simon Glassc7ae3df2016-11-07 08:47:08 -0700659#endif
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900660 "bootefi bootmgr [fdt address]\n"
Rob Clark9975fe92017-09-13 18:05:38 -0400661 " - load and boot EFI payload based on BootOrder/BootXXXX variables.\n"
662 "\n"
663 " If specified, the device tree located at <fdt address> gets\n"
664 " exposed as EFI configuration table.\n";
Alexander Grafb9939332016-03-10 00:27:20 +0100665#endif
666
667U_BOOT_CMD(
Alexander Graf1c398092016-04-14 16:07:53 +0200668 bootefi, 3, 0, do_bootefi,
Sergey Kubushyn92dfd922016-06-07 11:14:31 -0700669 "Boots an EFI payload from memory",
Alexander Grafb9939332016-03-10 00:27:20 +0100670 bootefi_help_text
671);
Alexander Graf0f4060e2016-03-04 01:10:14 +0100672
Heinrich Schuchardt810371a2019-07-14 13:00:44 +0200673/**
674 * efi_set_bootdev() - set boot device
675 *
676 * This function is called when a file is loaded, e.g. via the 'load' command.
677 * We use the path to this file to inform the UEFI binary about the boot device.
678 *
679 * @dev: device, e.g. "MMC"
680 * @devnr: number of the device, e.g. "1:2"
681 * @path: path to file loaded
682 */
Alexander Grafc07ad7c2016-04-11 16:16:19 +0200683void efi_set_bootdev(const char *dev, const char *devnr, const char *path)
Alexander Graf0f4060e2016-03-04 01:10:14 +0100684{
AKASHI Takahirof1589ff2018-10-17 16:32:03 +0900685 struct efi_device_path *device, *image;
686 efi_status_t ret;
Alexander Graf0f4060e2016-03-04 01:10:14 +0100687
Heinrich Schuchardt79276eb2018-09-16 07:20:21 +0200688 /* efi_set_bootdev is typically called repeatedly, recover memory */
689 efi_free_pool(bootefi_device_path);
690 efi_free_pool(bootefi_image_path);
Heinrich Schuchardt79276eb2018-09-16 07:20:21 +0200691
AKASHI Takahirof1589ff2018-10-17 16:32:03 +0900692 ret = efi_dp_from_name(dev, devnr, path, &device, &image);
693 if (ret == EFI_SUCCESS) {
694 bootefi_device_path = device;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900695 if (image) {
696 /* FIXME: image should not contain device */
697 struct efi_device_path *image_tmp = image;
698
699 efi_dp_split_file_path(image, &device, &image);
700 efi_free_pool(image_tmp);
701 }
AKASHI Takahirof1589ff2018-10-17 16:32:03 +0900702 bootefi_image_path = image;
Rob Clark95c55532017-09-13 18:05:33 -0400703 } else {
AKASHI Takahirof1589ff2018-10-17 16:32:03 +0900704 bootefi_device_path = NULL;
705 bootefi_image_path = NULL;
Alexander Graff9d334b2016-08-05 14:49:53 +0200706 }
Alexander Graf0f4060e2016-03-04 01:10:14 +0100707}