blob: 8154efde52aa520ee1671c8cb249b9ac319e2459 [file] [log] [blame]
Tom Rinif739fcd2018-05-07 17:02:21 -04001// SPDX-License-Identifier: GPL-2.0+
Alexander Grafb9939332016-03-10 00:27:20 +01002/*
3 * EFI application loader
4 *
5 * Copyright (c) 2016 Alexander Graf
Alexander Grafb9939332016-03-10 00:27:20 +01006 */
7
Heinrich Schuchardtc0018372020-07-17 20:21:00 +02008#define LOG_CATEGORY LOGC_EFI
9
Alexander Grafb9939332016-03-10 00:27:20 +010010#include <common.h>
Heinrich Schuchardtf6c6df72019-01-08 18:13:06 +010011#include <charset.h>
Alexander Grafb9939332016-03-10 00:27:20 +010012#include <command.h>
Simon Glass9d922452017-05-17 17:18:03 -060013#include <dm.h>
Alexander Grafb9939332016-03-10 00:27:20 +010014#include <efi_loader.h>
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020015#include <efi_selftest.h>
Simon Glass7b51b572019-08-01 09:46:52 -060016#include <env.h>
Alexander Grafb9939332016-03-10 00:27:20 +010017#include <errno.h>
Simon Glass4d72caa2020-05-10 11:40:01 -060018#include <image.h>
Heinrich Schuchardtc0018372020-07-17 20:21:00 +020019#include <log.h>
Simon Glass336d4612020-02-03 07:36:16 -070020#include <malloc.h>
Masahiro Yamadab08c8c42018-03-05 01:20:11 +090021#include <linux/libfdt.h>
22#include <linux/libfdt_env.h>
Alexander Graf354264b2018-06-18 17:22:58 +020023#include <mapmem.h>
Alexander Grafad0c1a32016-04-11 23:51:01 +020024#include <memalign.h>
Simon Glasse2754582016-09-25 15:27:32 -060025#include <asm-generic/sections.h>
26#include <linux/linkage.h>
Alexander Graf0d9d5012016-04-11 16:55:26 +020027
28DECLARE_GLOBAL_DATA_PTR;
Alexander Grafb9939332016-03-10 00:27:20 +010029
Rob Clark95c55532017-09-13 18:05:33 -040030static struct efi_device_path *bootefi_image_path;
31static struct efi_device_path *bootefi_device_path;
Alexander Grafb9939332016-03-10 00:27:20 +010032
Heinrich Schuchardt810371a2019-07-14 13:00:44 +020033/**
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020034 * Set the load options of an image from an environment variable.
35 *
Heinrich Schuchardta3850e42020-01-03 22:53:42 +010036 * @handle: the image handle
37 * @env_var: name of the environment variable
38 * @load_options: pointer to load options (output)
39 * Return: status code
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020040 */
Heinrich Schuchardta3850e42020-01-03 22:53:42 +010041static efi_status_t set_load_options(efi_handle_t handle, const char *env_var,
42 u16 **load_options)
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020043{
AKASHI Takahirodefa7b82019-04-19 12:22:28 +090044 struct efi_loaded_image *loaded_image_info;
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020045 size_t size;
46 const char *env = env_get(env_var);
Heinrich Schuchardt7086a712018-08-31 21:31:33 +020047 u16 *pos;
AKASHI Takahirodefa7b82019-04-19 12:22:28 +090048 efi_status_t ret;
49
Heinrich Schuchardta3850e42020-01-03 22:53:42 +010050 *load_options = NULL;
AKASHI Takahirodefa7b82019-04-19 12:22:28 +090051 ret = EFI_CALL(systab.boottime->open_protocol(
52 handle,
53 &efi_guid_loaded_image,
54 (void **)&loaded_image_info,
55 efi_root, NULL,
56 EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL));
57 if (ret != EFI_SUCCESS)
58 return EFI_INVALID_PARAMETER;
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020059
60 loaded_image_info->load_options = NULL;
61 loaded_image_info->load_options_size = 0;
62 if (!env)
AKASHI Takahirodefa7b82019-04-19 12:22:28 +090063 goto out;
64
Heinrich Schuchardt7086a712018-08-31 21:31:33 +020065 size = utf8_utf16_strlen(env) + 1;
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020066 loaded_image_info->load_options = calloc(size, sizeof(u16));
67 if (!loaded_image_info->load_options) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +020068 log_err("ERROR: Out of memory\n");
AKASHI Takahirodefa7b82019-04-19 12:22:28 +090069 EFI_CALL(systab.boottime->close_protocol(handle,
70 &efi_guid_loaded_image,
71 efi_root, NULL));
72 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020073 }
Heinrich Schuchardt7086a712018-08-31 21:31:33 +020074 pos = loaded_image_info->load_options;
Heinrich Schuchardta3850e42020-01-03 22:53:42 +010075 *load_options = pos;
Heinrich Schuchardt7086a712018-08-31 21:31:33 +020076 utf8_utf16_strcpy(&pos, env);
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020077 loaded_image_info->load_options_size = size * 2;
AKASHI Takahirodefa7b82019-04-19 12:22:28 +090078
79out:
80 return EFI_CALL(systab.boottime->close_protocol(handle,
81 &efi_guid_loaded_image,
82 efi_root, NULL));
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +020083}
84
Heinrich Schuchardt61824952019-04-20 13:33:55 +020085#if !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
86
Simon Glass9dff4902018-08-08 03:54:30 -060087/**
88 * copy_fdt() - Copy the device tree to a new location available to EFI
89 *
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +010090 * The FDT is copied to a suitable location within the EFI memory map.
Heinrich Schuchardtc3772ca2018-11-18 17:58:49 +010091 * Additional 12 KiB are added to the space in case the device tree needs to be
Simon Glass9dff4902018-08-08 03:54:30 -060092 * expanded later with fdt_open_into().
93 *
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +010094 * @fdtp: On entry a pointer to the flattened device tree.
95 * On exit a pointer to the copy of the flattened device tree.
Heinrich Schuchardt4574d1b2018-11-12 18:55:22 +010096 * FDT start
97 * Return: status code
Simon Glass9dff4902018-08-08 03:54:30 -060098 */
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +010099static efi_status_t copy_fdt(void **fdtp)
Alexander Graf0d9d5012016-04-11 16:55:26 +0200100{
Alexander Grafad0c1a32016-04-11 23:51:01 +0200101 unsigned long fdt_ram_start = -1L, fdt_pages;
Simon Glass9dff4902018-08-08 03:54:30 -0600102 efi_status_t ret = 0;
103 void *fdt, *new_fdt;
Alexander Grafad0c1a32016-04-11 23:51:01 +0200104 u64 new_fdt_addr;
Simon Glass9dff4902018-08-08 03:54:30 -0600105 uint fdt_size;
Alexander Grafad0c1a32016-04-11 23:51:01 +0200106 int i;
Alexander Graf0d9d5012016-04-11 16:55:26 +0200107
Simon Glass9dff4902018-08-08 03:54:30 -0600108 for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) {
109 u64 ram_start = gd->bd->bi_dram[i].start;
110 u64 ram_size = gd->bd->bi_dram[i].size;
Alexander Graf0d9d5012016-04-11 16:55:26 +0200111
Alexander Grafad0c1a32016-04-11 23:51:01 +0200112 if (!ram_size)
113 continue;
114
115 if (ram_start < fdt_ram_start)
116 fdt_ram_start = ram_start;
117 }
118
Simon Glassbc9a6382018-06-18 08:08:25 -0600119 /*
Heinrich Schuchardtc3772ca2018-11-18 17:58:49 +0100120 * Give us at least 12 KiB of breathing room in case the device tree
121 * needs to be expanded later.
Simon Glassbc9a6382018-06-18 08:08:25 -0600122 */
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100123 fdt = *fdtp;
Heinrich Schuchardtc3772ca2018-11-18 17:58:49 +0100124 fdt_pages = efi_size_in_pages(fdt_totalsize(fdt) + 0x3000);
125 fdt_size = fdt_pages << EFI_PAGE_SHIFT;
Alexander Grafad0c1a32016-04-11 23:51:01 +0200126
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100127 /*
128 * Safe fdt location is at 127 MiB.
129 * On the sandbox convert from the sandbox address space.
130 */
131 new_fdt_addr = (uintptr_t)map_sysmem(fdt_ram_start + 0x7f00000 +
132 fdt_size, 0);
Simon Glass9dff4902018-08-08 03:54:30 -0600133 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardt42a426e2020-05-06 20:32:31 +0200134 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass9dff4902018-08-08 03:54:30 -0600135 &new_fdt_addr);
136 if (ret != EFI_SUCCESS) {
Alexander Grafad0c1a32016-04-11 23:51:01 +0200137 /* If we can't put it there, put it somewhere */
xypron.glpk@gmx.dea44bffc2017-08-11 21:19:25 +0200138 new_fdt_addr = (ulong)memalign(EFI_PAGE_SIZE, fdt_size);
Simon Glass9dff4902018-08-08 03:54:30 -0600139 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardt42a426e2020-05-06 20:32:31 +0200140 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass9dff4902018-08-08 03:54:30 -0600141 &new_fdt_addr);
142 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200143 log_err("ERROR: Failed to reserve space for FDT\n");
Simon Glass9dff4902018-08-08 03:54:30 -0600144 goto done;
Alexander Graf85a6e9b2017-07-03 13:32:35 +0200145 }
Alexander Grafad0c1a32016-04-11 23:51:01 +0200146 }
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100147 new_fdt = (void *)(uintptr_t)new_fdt_addr;
Alexander Graf0d9d5012016-04-11 16:55:26 +0200148 memcpy(new_fdt, fdt, fdt_totalsize(fdt));
149 fdt_set_totalsize(new_fdt, fdt_size);
150
Heinrich Schuchardt16b615d2018-11-18 17:58:52 +0100151 *fdtp = (void *)(uintptr_t)new_fdt_addr;
Simon Glass9dff4902018-08-08 03:54:30 -0600152done:
153 return ret;
Alexander Graf0d9d5012016-04-11 16:55:26 +0200154}
155
Atish Patra7be64b82020-03-13 17:11:30 -0700156static void efi_reserve_memory(u64 addr, u64 size)
157{
Atish Patra7be64b82020-03-13 17:11:30 -0700158 /* Convert from sandbox address space. */
159 addr = (uintptr_t)map_sysmem(addr, 0);
Michael Walle714497e2020-05-17 12:29:19 +0200160 if (efi_add_memory_map(addr, size,
161 EFI_RESERVED_MEMORY_TYPE) != EFI_SUCCESS)
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200162 log_err("Reserved memory mapping failed addr %llx size %llx\n",
163 addr, size);
Atish Patra7be64b82020-03-13 17:11:30 -0700164}
165
Heinrich Schuchardt810371a2019-07-14 13:00:44 +0200166/**
Simon Glass416e07e2018-06-18 08:08:28 -0600167 * efi_carve_out_dt_rsv() - Carve out DT reserved memory ranges
168 *
169 * The mem_rsv entries of the FDT are added to the memory map. Any failures are
170 * ignored because this is not critical and we would rather continue to try to
171 * boot.
172 *
173 * @fdt: Pointer to device tree
174 */
175static void efi_carve_out_dt_rsv(void *fdt)
Alexander Graf806d2fa2018-04-06 09:40:51 +0200176{
177 int nr_rsv, i;
Atish Patra7be64b82020-03-13 17:11:30 -0700178 u64 addr, size;
179 int nodeoffset, subnode;
Alexander Graf806d2fa2018-04-06 09:40:51 +0200180
181 nr_rsv = fdt_num_mem_rsv(fdt);
182
183 /* Look for an existing entry and add it to the efi mem map. */
184 for (i = 0; i < nr_rsv; i++) {
185 if (fdt_get_mem_rsv(fdt, i, &addr, &size) != 0)
186 continue;
Atish Patra7be64b82020-03-13 17:11:30 -0700187 efi_reserve_memory(addr, size);
188 }
Alexander Graf806d2fa2018-04-06 09:40:51 +0200189
Atish Patra7be64b82020-03-13 17:11:30 -0700190 /* process reserved-memory */
191 nodeoffset = fdt_subnode_offset(fdt, 0, "reserved-memory");
192 if (nodeoffset >= 0) {
193 subnode = fdt_first_subnode(fdt, nodeoffset);
194 while (subnode >= 0) {
Bin Mengb1c272d2020-06-22 23:50:50 -0700195 fdt_addr_t fdt_addr;
196 fdt_size_t fdt_size;
Atish Patra0d7c2912020-06-18 18:51:50 -0700197
Atish Patra7be64b82020-03-13 17:11:30 -0700198 /* check if this subnode has a reg property */
Atish Patra0d7c2912020-06-18 18:51:50 -0700199 fdt_addr = fdtdec_get_addr_size_auto_parent(
200 fdt, nodeoffset, subnode,
201 "reg", 0, &fdt_size, false);
Atish Patra7be64b82020-03-13 17:11:30 -0700202 /*
203 * The /reserved-memory node may have children with
204 * a size instead of a reg property.
205 */
Heinrich Schuchardt039d4f52020-06-30 14:12:43 +0200206 if (fdt_addr != FDT_ADDR_T_NONE &&
Heinrich Schuchardt4ef2b0d2020-03-24 07:37:52 +0100207 fdtdec_get_is_enabled(fdt, subnode))
Atish Patra0d7c2912020-06-18 18:51:50 -0700208 efi_reserve_memory(fdt_addr, fdt_size);
Atish Patra7be64b82020-03-13 17:11:30 -0700209 subnode = fdt_next_subnode(fdt, subnode);
210 }
Alexander Graf806d2fa2018-04-06 09:40:51 +0200211 }
Alexander Graf806d2fa2018-04-06 09:40:51 +0200212}
213
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900214/**
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200215 * get_config_table() - get configuration table
216 *
217 * @guid: GUID of the configuration table
218 * Return: pointer to configuration table or NULL
219 */
220static void *get_config_table(const efi_guid_t *guid)
221{
222 size_t i;
223
224 for (i = 0; i < systab.nr_tables; i++) {
225 if (!guidcmp(guid, &systab.tables[i].guid))
226 return systab.tables[i].table;
227 }
228 return NULL;
229}
230
231#endif /* !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) */
232
233/**
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100234 * efi_install_fdt() - install device tree
Heinrich Schuchardte2d82f82019-05-12 20:16:25 +0200235 *
Heinrich Schuchardt7d4d5512020-02-07 22:10:49 +0100236 * If fdt is not EFI_FDT_USE_INTERNAL, the device tree located at that memory
237 * address will will be installed as configuration table, otherwise the device
238 * tree located at the address indicated by environment variable fdt_addr or as
239 * fallback fdtcontroladdr will be used.
Heinrich Schuchardte2d82f82019-05-12 20:16:25 +0200240 *
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100241 * On architectures using ACPI tables device trees shall not be installed as
242 * configuration table.
Heinrich Schuchardte2d82f82019-05-12 20:16:25 +0200243 *
Heinrich Schuchardt7d4d5512020-02-07 22:10:49 +0100244 * @fdt: address of device tree or EFI_FDT_USE_INTERNAL to use the
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100245 * the hardware device tree as indicated by environment variable
246 * fdt_addr or as fallback the internal device tree as indicated by
247 * the environment variable fdtcontroladdr
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900248 * Return: status code
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900249 */
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100250efi_status_t efi_install_fdt(void *fdt)
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900251{
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200252 /*
253 * The EBBR spec requires that we have either an FDT or an ACPI table
254 * but not both.
255 */
256#if CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100257 if (fdt) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200258 log_err("ERROR: can't have ACPI table and device tree.\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200259 return EFI_LOAD_ERROR;
260 }
261#else
AKASHI Takahiro3ffc52f2019-04-19 12:22:30 +0900262 bootm_headers_t img = { 0 };
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900263 efi_status_t ret;
264
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100265 if (fdt == EFI_FDT_USE_INTERNAL) {
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100266 const char *fdt_opt;
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100267 uintptr_t fdt_addr;
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100268
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200269 /* Look for device tree that is already installed */
270 if (get_config_table(&efi_guid_fdt))
271 return EFI_SUCCESS;
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100272 /* Check if there is a hardware device tree */
273 fdt_opt = env_get("fdt_addr");
274 /* Use our own device tree as fallback */
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200275 if (!fdt_opt) {
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100276 fdt_opt = env_get("fdtcontroladdr");
277 if (!fdt_opt) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200278 log_err("ERROR: need device tree\n");
Heinrich Schuchardt753aa182019-12-04 12:31:12 +0100279 return EFI_NOT_FOUND;
280 }
AKASHI Takahiro3ffc52f2019-04-19 12:22:30 +0900281 }
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200282 fdt_addr = simple_strtoul(fdt_opt, NULL, 16);
283 if (!fdt_addr) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200284 log_err("ERROR: invalid $fdt_addr or $fdtcontroladdr\n");
AKASHI Takahiro3ffc52f2019-04-19 12:22:30 +0900285 return EFI_LOAD_ERROR;
286 }
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100287 fdt = map_sysmem(fdt_addr, 0);
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900288 }
289
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200290 /* Install device tree */
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200291 if (fdt_check_header(fdt)) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200292 log_err("ERROR: invalid device tree\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200293 return EFI_LOAD_ERROR;
294 }
295
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200296 /* Prepare device tree for payload */
297 ret = copy_fdt(&fdt);
298 if (ret) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200299 log_err("ERROR: out of memory\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200300 return EFI_OUT_OF_RESOURCES;
301 }
302
303 if (image_setup_libfdt(&img, fdt, 0, NULL)) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200304 log_err("ERROR: failed to process device tree\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200305 return EFI_LOAD_ERROR;
306 }
307
Heinrich Schuchardtfef907b2020-03-14 10:59:34 +0100308 /* Create memory reservations as indicated by the device tree */
309 efi_carve_out_dt_rsv(fdt);
310
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200311 /* Install device tree as UEFI table */
312 ret = efi_install_configuration_table(&efi_guid_fdt, fdt);
313 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200314 log_err("ERROR: failed to install device tree\n");
Heinrich Schuchardt61824952019-04-20 13:33:55 +0200315 return ret;
316 }
317#endif /* GENERATE_ACPI_TABLE */
318
AKASHI Takahiroe878e6a2019-04-19 12:22:29 +0900319 return EFI_SUCCESS;
320}
321
Simon Glass5e2f0392018-11-25 20:14:39 -0700322/**
Heinrich Schuchardtc9828742018-09-23 17:21:51 +0200323 * do_bootefi_exec() - execute EFI binary
324 *
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900325 * @handle: handle of loaded image
Heinrich Schuchardtc9828742018-09-23 17:21:51 +0200326 * Return: status code
327 *
328 * Load the EFI binary into a newly assigned memory unwinding the relocation
329 * information, install the loaded image protocol, and call the binary.
Alexander Grafb9939332016-03-10 00:27:20 +0100330 */
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900331static efi_status_t do_bootefi_exec(efi_handle_t handle)
Alexander Grafb9939332016-03-10 00:27:20 +0100332{
Heinrich Schuchardt45204b12018-03-03 15:29:01 +0100333 efi_status_t ret;
Heinrich Schuchardt556d8dc2019-04-30 17:57:30 +0200334 efi_uintn_t exit_data_size = 0;
335 u16 *exit_data = NULL;
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100336 u16 *load_options;
Rob Clark95c55532017-09-13 18:05:33 -0400337
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900338 /* Transfer environment variable as load options */
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100339 ret = set_load_options(handle, "bootargs", &load_options);
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900340 if (ret != EFI_SUCCESS)
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900341 return ret;
Rob Clarkbf192732017-10-10 08:23:06 -0400342
Alexander Grafb9939332016-03-10 00:27:20 +0100343 /* Call our payload! */
Heinrich Schuchardt556d8dc2019-04-30 17:57:30 +0200344 ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data));
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200345 if (ret != EFI_SUCCESS) {
346 log_err("## Application failed, r = %lu\n",
347 ret & ~EFI_ERROR_MASK);
348 if (exit_data) {
349 log_err("## %ls\n", exit_data);
350 efi_free_pool(exit_data);
351 }
Heinrich Schuchardt556d8dc2019-04-30 17:57:30 +0200352 }
Rob Clark95c55532017-09-13 18:05:33 -0400353
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900354 efi_restore_gd();
Simon Glass5e2f0392018-11-25 20:14:39 -0700355
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100356 free(load_options);
Rob Clark95c55532017-09-13 18:05:33 -0400357
358 return ret;
Alexander Grafb9939332016-03-10 00:27:20 +0100359}
360
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900361/**
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200362 * do_efibootmgr() - execute EFI boot manager
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900363 *
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900364 * Return: status code
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900365 */
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200366static int do_efibootmgr(void)
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900367{
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900368 efi_handle_t handle;
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900369 efi_status_t ret;
370
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900371 ret = efi_bootmgr_load(&handle);
372 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200373 log_notice("EFI boot manager: Cannot load any image\n");
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900374 return CMD_RET_FAILURE;
375 }
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900376
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900377 ret = do_bootefi_exec(handle);
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900378
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900379 if (ret != EFI_SUCCESS)
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900380 return CMD_RET_FAILURE;
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900381
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900382 return CMD_RET_SUCCESS;
AKASHI Takahirocc999d52019-04-19 12:22:32 +0900383}
384
Heinrich Schuchardt810371a2019-07-14 13:00:44 +0200385/**
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200386 * do_bootefi_image() - execute EFI binary
387 *
388 * Set up memory image for the binary to be loaded, prepare device path, and
389 * then call do_bootefi_exec() to execute it.
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900390 *
391 * @image_opt: string of image start address
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900392 * Return: status code
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900393 */
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200394static int do_bootefi_image(const char *image_opt)
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900395{
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900396 void *image_buf;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900397 unsigned long addr, size;
398 const char *size_str;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900399 efi_status_t ret;
400
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900401#ifdef CONFIG_CMD_BOOTEFI_HELLO
402 if (!strcmp(image_opt, "hello")) {
403 char *saddr;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900404
405 saddr = env_get("loadaddr");
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900406 size = __efi_helloworld_end - __efi_helloworld_begin;
407
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900408 if (saddr)
409 addr = simple_strtoul(saddr, NULL, 16);
410 else
411 addr = CONFIG_SYS_LOAD_ADDR;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900412
413 image_buf = map_sysmem(addr, size);
414 memcpy(image_buf, __efi_helloworld_begin, size);
415
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100416 efi_free_pool(bootefi_device_path);
417 efi_free_pool(bootefi_image_path);
418 bootefi_device_path = NULL;
419 bootefi_image_path = NULL;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900420 } else
421#endif
422 {
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900423 size_str = env_get("filesize");
424 if (size_str)
425 size = simple_strtoul(size_str, NULL, 16);
426 else
427 size = 0;
428
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900429 addr = simple_strtoul(image_opt, NULL, 16);
430 /* Check that a numeric value was passed */
431 if (!addr && *image_opt != '0')
432 return CMD_RET_USAGE;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900433
434 image_buf = map_sysmem(addr, size);
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900435 }
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100436 ret = efi_run_image(image_buf, size);
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900437
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100438 if (ret != EFI_SUCCESS)
439 return CMD_RET_FAILURE;
440
441 return CMD_RET_SUCCESS;
442}
443
444/**
445 * efi_run_image() - run loaded UEFI image
446 *
447 * @source_buffer: memory address of the UEFI image
448 * @source_size: size of the UEFI image
449 * Return: status code
450 */
451efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size)
452{
453 efi_handle_t mem_handle = NULL, handle;
454 struct efi_device_path *file_path = NULL;
455 efi_status_t ret;
456
457 if (!bootefi_device_path || !bootefi_image_path) {
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900458 /*
459 * Special case for efi payload not loaded from disk,
460 * such as 'bootefi hello' or for example payload
461 * loaded directly into memory via JTAG, etc:
462 */
463 file_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE,
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100464 (uintptr_t)source_buffer,
465 source_size);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900466 /*
467 * Make sure that device for device_path exist
468 * in load_image(). Otherwise, shell and grub will fail.
469 */
470 ret = efi_create_handle(&mem_handle);
471 if (ret != EFI_SUCCESS)
472 goto out;
473
474 ret = efi_add_protocol(mem_handle, &efi_guid_device_path,
475 file_path);
476 if (ret != EFI_SUCCESS)
477 goto out;
478 } else {
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100479 file_path = efi_dp_append(bootefi_device_path,
480 bootefi_image_path);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900481 }
482
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100483 ret = EFI_CALL(efi_load_image(false, efi_root, file_path, source_buffer,
484 source_size, &handle));
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900485 if (ret != EFI_SUCCESS)
486 goto out;
487
488 ret = do_bootefi_exec(handle);
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900489
490out:
Heinrich Schuchardt4fe050e2020-04-20 12:44:56 +0200491 efi_delete_handle(mem_handle);
492 efi_free_pool(file_path);
Heinrich Schuchardtf9ceb6a2019-12-07 20:51:06 +0100493 return ret;
AKASHI Takahiroe2e40982019-04-19 12:22:34 +0900494}
495
Simon Glassd9717ea2018-11-25 20:14:37 -0700496#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900497static efi_status_t bootefi_run_prepare(const char *load_options_path,
498 struct efi_device_path *device_path,
499 struct efi_device_path *image_path,
500 struct efi_loaded_image_obj **image_objp,
501 struct efi_loaded_image **loaded_image_infop)
502{
503 efi_status_t ret;
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100504 u16 *load_options;
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900505
506 ret = efi_setup_loaded_image(device_path, image_path, image_objp,
507 loaded_image_infop);
508 if (ret != EFI_SUCCESS)
509 return ret;
510
511 /* Transfer environment variable as load options */
Heinrich Schuchardta3850e42020-01-03 22:53:42 +0100512 return set_load_options((efi_handle_t)*image_objp, load_options_path,
513 &load_options);
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900514}
515
Simon Glassd9717ea2018-11-25 20:14:37 -0700516/**
517 * bootefi_test_prepare() - prepare to run an EFI test
518 *
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100519 * Prepare to run a test as if it were provided by a loaded image.
Simon Glassd9717ea2018-11-25 20:14:37 -0700520 *
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100521 * @image_objp: pointer to be set to the loaded image handle
522 * @loaded_image_infop: pointer to be set to the loaded image protocol
523 * @path: dummy file path used to construct the device path
524 * set in the loaded image protocol
525 * @load_options_path: name of a U-Boot environment variable. Its value is
526 * set as load options in the loaded image protocol.
527 * Return: status code
Simon Glassd9717ea2018-11-25 20:14:37 -0700528 */
529static efi_status_t bootefi_test_prepare
530 (struct efi_loaded_image_obj **image_objp,
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100531 struct efi_loaded_image **loaded_image_infop, const char *path,
532 const char *load_options_path)
Simon Glassd9717ea2018-11-25 20:14:37 -0700533{
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100534 efi_status_t ret;
535
Simon Glassd9717ea2018-11-25 20:14:37 -0700536 /* Construct a dummy device path */
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100537 bootefi_device_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, 0, 0);
Simon Glassd9717ea2018-11-25 20:14:37 -0700538 if (!bootefi_device_path)
539 return EFI_OUT_OF_RESOURCES;
Simon Glassd9717ea2018-11-25 20:14:37 -0700540
Heinrich Schuchardt1504bb02019-01-12 14:42:40 +0100541 bootefi_image_path = efi_dp_from_file(NULL, 0, path);
542 if (!bootefi_image_path) {
543 ret = EFI_OUT_OF_RESOURCES;
544 goto failure;
545 }
546
547 ret = bootefi_run_prepare(load_options_path, bootefi_device_path,
548 bootefi_image_path, image_objp,
549 loaded_image_infop);
550 if (ret == EFI_SUCCESS)
551 return ret;
552
553 efi_free_pool(bootefi_image_path);
554 bootefi_image_path = NULL;
555failure:
556 efi_free_pool(bootefi_device_path);
557 bootefi_device_path = NULL;
558 return ret;
Simon Glassd9717ea2018-11-25 20:14:37 -0700559}
560
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900561/**
562 * bootefi_run_finish() - finish up after running an EFI test
563 *
564 * @loaded_image_info: Pointer to a struct which holds the loaded image info
565 * @image_obj: Pointer to a struct which holds the loaded image object
566 */
567static void bootefi_run_finish(struct efi_loaded_image_obj *image_obj,
568 struct efi_loaded_image *loaded_image_info)
569{
570 efi_restore_gd();
571 free(loaded_image_info->load_options);
572 efi_delete_handle(&image_obj->header);
573}
574
575/**
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200576 * do_efi_selftest() - execute EFI selftest
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900577 *
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900578 * Return: status code
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900579 */
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200580static int do_efi_selftest(void)
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900581{
582 struct efi_loaded_image_obj *image_obj;
583 struct efi_loaded_image *loaded_image_info;
584 efi_status_t ret;
585
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900586 ret = bootefi_test_prepare(&image_obj, &loaded_image_info,
587 "\\selftest", "efi_selftest");
588 if (ret != EFI_SUCCESS)
589 return CMD_RET_FAILURE;
590
591 /* Execute the test */
592 ret = EFI_CALL(efi_selftest(&image_obj->header, &systab));
593 bootefi_run_finish(image_obj, loaded_image_info);
594
595 return ret != EFI_SUCCESS;
596}
Simon Glassd9717ea2018-11-25 20:14:37 -0700597#endif /* CONFIG_CMD_BOOTEFI_SELFTEST */
598
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200599/**
600 * do_bootefi() - execute `bootefi` command
601 *
602 * @cmdtp: table entry describing command
603 * @flag: bitmap indicating how the command was invoked
604 * @argc: number of arguments
605 * @argv: command line arguments
606 * Return: status code
607 */
Simon Glass09140112020-05-10 11:40:03 -0600608static int do_bootefi(struct cmd_tbl *cmdtp, int flag, int argc,
609 char *const argv[])
Alexander Grafb9939332016-03-10 00:27:20 +0100610{
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200611 efi_status_t ret;
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100612 void *fdt;
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200613
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900614 if (argc < 2)
615 return CMD_RET_USAGE;
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900616
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200617 /* Initialize EFI drivers */
618 ret = efi_init_obj_list();
619 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtc0018372020-07-17 20:21:00 +0200620 log_err("Error: Cannot initialize UEFI sub-system, r = %lu\n",
621 ret & ~EFI_ERROR_MASK);
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200622 return CMD_RET_FAILURE;
623 }
624
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100625 if (argc > 2) {
626 uintptr_t fdt_addr;
627
Heinrich Schuchardt7a597252019-11-28 06:46:09 +0100628 fdt_addr = simple_strtoul(argv[2], NULL, 16);
Heinrich Schuchardtf64f2232019-12-08 01:07:01 +0100629 fdt = map_sysmem(fdt_addr, 0);
630 } else {
631 fdt = EFI_FDT_USE_INTERNAL;
632 }
633 ret = efi_install_fdt(fdt);
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200634 if (ret == EFI_INVALID_PARAMETER)
635 return CMD_RET_USAGE;
636 else if (ret != EFI_SUCCESS)
637 return CMD_RET_FAILURE;
638
AKASHI Takahirod6b21892019-04-19 12:22:33 +0900639 if (!strcmp(argv[1], "bootmgr"))
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200640 return do_efibootmgr();
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900641#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
642 else if (!strcmp(argv[1], "selftest"))
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200643 return do_efi_selftest();
AKASHI Takahiro3fc2b162019-04-19 12:22:31 +0900644#endif
645
Heinrich Schuchardt7e92db82019-05-12 20:16:25 +0200646 return do_bootefi_image(argv[1]);
Alexander Grafb9939332016-03-10 00:27:20 +0100647}
648
649#ifdef CONFIG_SYS_LONGHELP
650static char bootefi_help_text[] =
Alexander Graf1c398092016-04-14 16:07:53 +0200651 "<image address> [fdt address]\n"
652 " - boot EFI payload stored at address <image address>.\n"
653 " If specified, the device tree located at <fdt address> gets\n"
Simon Glassc7ae3df2016-11-07 08:47:08 -0700654 " exposed as EFI configuration table.\n"
655#ifdef CONFIG_CMD_BOOTEFI_HELLO
Heinrich Schuchardt623b3a52017-09-15 10:06:11 +0200656 "bootefi hello\n"
657 " - boot a sample Hello World application stored within U-Boot\n"
658#endif
659#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
Heinrich Schuchardtbc4f9132018-03-03 15:29:03 +0100660 "bootefi selftest [fdt address]\n"
Heinrich Schuchardt623b3a52017-09-15 10:06:11 +0200661 " - boot an EFI selftest application stored within U-Boot\n"
Heinrich Schuchardtd78e40d2017-10-18 18:13:13 +0200662 " Use environment variable efi_selftest to select a single test.\n"
663 " Use 'setenv efi_selftest list' to enumerate all tests.\n"
Simon Glassc7ae3df2016-11-07 08:47:08 -0700664#endif
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900665 "bootefi bootmgr [fdt address]\n"
Rob Clark9975fe92017-09-13 18:05:38 -0400666 " - load and boot EFI payload based on BootOrder/BootXXXX variables.\n"
667 "\n"
668 " If specified, the device tree located at <fdt address> gets\n"
669 " exposed as EFI configuration table.\n";
Alexander Grafb9939332016-03-10 00:27:20 +0100670#endif
671
672U_BOOT_CMD(
Alexander Graf1c398092016-04-14 16:07:53 +0200673 bootefi, 3, 0, do_bootefi,
Sergey Kubushyn92dfd922016-06-07 11:14:31 -0700674 "Boots an EFI payload from memory",
Alexander Grafb9939332016-03-10 00:27:20 +0100675 bootefi_help_text
676);
Alexander Graf0f4060e2016-03-04 01:10:14 +0100677
Heinrich Schuchardt810371a2019-07-14 13:00:44 +0200678/**
679 * efi_set_bootdev() - set boot device
680 *
681 * This function is called when a file is loaded, e.g. via the 'load' command.
682 * We use the path to this file to inform the UEFI binary about the boot device.
683 *
684 * @dev: device, e.g. "MMC"
685 * @devnr: number of the device, e.g. "1:2"
686 * @path: path to file loaded
687 */
Alexander Grafc07ad7c2016-04-11 16:16:19 +0200688void efi_set_bootdev(const char *dev, const char *devnr, const char *path)
Alexander Graf0f4060e2016-03-04 01:10:14 +0100689{
AKASHI Takahirof1589ff2018-10-17 16:32:03 +0900690 struct efi_device_path *device, *image;
691 efi_status_t ret;
Alexander Graf0f4060e2016-03-04 01:10:14 +0100692
Heinrich Schuchardt79276eb2018-09-16 07:20:21 +0200693 /* efi_set_bootdev is typically called repeatedly, recover memory */
694 efi_free_pool(bootefi_device_path);
695 efi_free_pool(bootefi_image_path);
Heinrich Schuchardt79276eb2018-09-16 07:20:21 +0200696
AKASHI Takahirof1589ff2018-10-17 16:32:03 +0900697 ret = efi_dp_from_name(dev, devnr, path, &device, &image);
698 if (ret == EFI_SUCCESS) {
699 bootefi_device_path = device;
AKASHI Takahiro6b95b382019-04-19 12:22:35 +0900700 if (image) {
701 /* FIXME: image should not contain device */
702 struct efi_device_path *image_tmp = image;
703
704 efi_dp_split_file_path(image, &device, &image);
705 efi_free_pool(image_tmp);
706 }
AKASHI Takahirof1589ff2018-10-17 16:32:03 +0900707 bootefi_image_path = image;
Rob Clark95c55532017-09-13 18:05:33 -0400708 } else {
AKASHI Takahirof1589ff2018-10-17 16:32:03 +0900709 bootefi_device_path = NULL;
710 bootefi_image_path = NULL;
Alexander Graff9d334b2016-08-05 14:49:53 +0200711 }
Alexander Graf0f4060e2016-03-04 01:10:14 +0100712}