blob: 395b0629de2895aa79c4d66de7d650179b11be36 [file] [log] [blame]
Tom Rini70df9d62018-05-07 17:02:21 -04001// SPDX-License-Identifier: GPL-2.0+
Alexander Grafe2b04f22016-03-10 00:27:20 +01002/*
3 * EFI application loader
4 *
5 * Copyright (c) 2016 Alexander Graf
Alexander Grafe2b04f22016-03-10 00:27:20 +01006 */
7
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +02008#define LOG_CATEGORY LOGC_EFI
9
Alexander Grafe2b04f22016-03-10 00:27:20 +010010#include <common.h>
Heinrich Schuchardtaf64c3e2021-01-24 14:34:12 +000011#include <bootm.h>
Heinrich Schuchardtaa0b11b2019-01-08 18:13:06 +010012#include <charset.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010013#include <command.h>
Simon Glass11c89f32017-05-17 17:18:03 -060014#include <dm.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010015#include <efi_loader.h>
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020016#include <efi_selftest.h>
Simon Glass0af6e2d2019-08-01 09:46:52 -060017#include <env.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010018#include <errno.h>
Simon Glass2dc9c342020-05-10 11:40:01 -060019#include <image.h>
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +020020#include <log.h>
Simon Glass9bc15642020-02-03 07:36:16 -070021#include <malloc.h>
Simon Glass3ba929a2020-10-30 21:38:53 -060022#include <asm/global_data.h>
Masahiro Yamada75f82d02018-03-05 01:20:11 +090023#include <linux/libfdt.h>
24#include <linux/libfdt_env.h>
Alexander Grafa2414512018-06-18 17:22:58 +020025#include <mapmem.h>
Alexander Graffdbae012016-04-11 23:51:01 +020026#include <memalign.h>
Simon Glassc2194bf2016-09-25 15:27:32 -060027#include <asm-generic/sections.h>
28#include <linux/linkage.h>
Alexander Graf2ff5cc32016-04-11 16:55:26 +020029
30DECLARE_GLOBAL_DATA_PTR;
Alexander Grafe2b04f22016-03-10 00:27:20 +010031
Rob Clarkf8db9222017-09-13 18:05:33 -040032static struct efi_device_path *bootefi_image_path;
33static struct efi_device_path *bootefi_device_path;
Heinrich Schuchardt6b821592021-01-12 12:46:24 +010034static void *image_addr;
35static size_t image_size;
Alexander Grafe2b04f22016-03-10 00:27:20 +010036
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +020037/**
Rui Miguel Silva433f15a2022-05-11 10:55:40 +010038 * efi_get_image_parameters() - return image parameters
39 *
40 * @img_addr: address of loaded image in memory
41 * @img_size: size of loaded image
42 */
43void efi_get_image_parameters(void **img_addr, size_t *img_size)
44{
45 *img_addr = image_addr;
46 *img_size = image_size;
47}
48
49/**
Heinrich Schuchardt6b821592021-01-12 12:46:24 +010050 * efi_clear_bootdev() - clear boot device
51 */
52static void efi_clear_bootdev(void)
53{
54 efi_free_pool(bootefi_device_path);
55 efi_free_pool(bootefi_image_path);
56 bootefi_device_path = NULL;
57 bootefi_image_path = NULL;
58 image_addr = NULL;
59 image_size = 0;
60}
61
62/**
63 * efi_set_bootdev() - set boot device
64 *
65 * This function is called when a file is loaded, e.g. via the 'load' command.
66 * We use the path to this file to inform the UEFI binary about the boot device.
67 *
68 * @dev: device, e.g. "MMC"
69 * @devnr: number of the device, e.g. "1:2"
70 * @path: path to file loaded
71 * @buffer: buffer with file loaded
72 * @buffer_size: size of file loaded
73 */
74void efi_set_bootdev(const char *dev, const char *devnr, const char *path,
75 void *buffer, size_t buffer_size)
76{
77 struct efi_device_path *device, *image;
78 efi_status_t ret;
79
Simon Glass95c1d252022-01-29 14:58:37 -070080 log_debug("dev=%s, devnr=%s, path=%s, buffer=%p, size=%zx\n", dev,
81 devnr, path, buffer, buffer_size);
82
Heinrich Schuchardt6b821592021-01-12 12:46:24 +010083 /* Forget overwritten image */
84 if (buffer + buffer_size >= image_addr &&
85 image_addr + image_size >= buffer)
86 efi_clear_bootdev();
87
88 /* Remember only PE-COFF and FIT images */
89 if (efi_check_pe(buffer, buffer_size, NULL) != EFI_SUCCESS) {
Simon Glass95c1d252022-01-29 14:58:37 -070090 if (IS_ENABLED(CONFIG_FIT) &&
91 !fit_check_format(buffer, IMAGE_SIZE_INVAL)) {
92 /*
93 * FIT images of type EFI_OS are started via command
94 * bootm. We should not use their boot device with the
95 * bootefi command.
96 */
97 buffer = 0;
98 buffer_size = 0;
99 } else {
100 log_debug("- not remembering image\n");
Heinrich Schuchardt6b821592021-01-12 12:46:24 +0100101 return;
Simon Glass95c1d252022-01-29 14:58:37 -0700102 }
Heinrich Schuchardt6b821592021-01-12 12:46:24 +0100103 }
104
105 /* efi_set_bootdev() is typically called repeatedly, recover memory */
106 efi_clear_bootdev();
107
108 image_addr = buffer;
109 image_size = buffer_size;
110
111 ret = efi_dp_from_name(dev, devnr, path, &device, &image);
112 if (ret == EFI_SUCCESS) {
113 bootefi_device_path = device;
114 if (image) {
115 /* FIXME: image should not contain device */
116 struct efi_device_path *image_tmp = image;
117
118 efi_dp_split_file_path(image, &device, &image);
119 efi_free_pool(image_tmp);
120 }
121 bootefi_image_path = image;
Heinrich Schuchardtb274e772022-07-10 15:46:57 +0200122 log_debug("- boot device %pD\n", device);
Simon Glass95c1d252022-01-29 14:58:37 -0700123 if (image)
Heinrich Schuchardtb274e772022-07-10 15:46:57 +0200124 log_debug("- image %pD\n", image);
Heinrich Schuchardt6b821592021-01-12 12:46:24 +0100125 } else {
Simon Glass95c1d252022-01-29 14:58:37 -0700126 log_debug("- efi_dp_from_name() failed, err=%lx\n", ret);
Heinrich Schuchardt6b821592021-01-12 12:46:24 +0100127 efi_clear_bootdev();
128 }
129}
130
131/**
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200132 * efi_env_set_load_options() - set load options from environment variable
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200133 *
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100134 * @handle: the image handle
135 * @env_var: name of the environment variable
136 * @load_options: pointer to load options (output)
137 * Return: status code
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200138 */
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200139static efi_status_t efi_env_set_load_options(efi_handle_t handle,
140 const char *env_var,
141 u16 **load_options)
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200142{
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200143 const char *env = env_get(env_var);
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200144 size_t size;
Heinrich Schuchardtde527802018-08-31 21:31:33 +0200145 u16 *pos;
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +0900146 efi_status_t ret;
147
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100148 *load_options = NULL;
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200149 if (!env)
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200150 return EFI_SUCCESS;
151 size = sizeof(u16) * (utf8_utf16_strlen(env) + 1);
152 pos = calloc(size, 1);
153 if (!pos)
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +0900154 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100155 *load_options = pos;
Heinrich Schuchardtde527802018-08-31 21:31:33 +0200156 utf8_utf16_strcpy(&pos, env);
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200157 ret = efi_set_load_options(handle, size, *load_options);
158 if (ret != EFI_SUCCESS) {
159 free(*load_options);
160 *load_options = NULL;
161 }
162 return ret;
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200163}
164
Simon Glass5d618df2018-08-08 03:54:30 -0600165/**
166 * copy_fdt() - Copy the device tree to a new location available to EFI
167 *
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100168 * The FDT is copied to a suitable location within the EFI memory map.
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100169 * Additional 12 KiB are added to the space in case the device tree needs to be
Simon Glass5d618df2018-08-08 03:54:30 -0600170 * expanded later with fdt_open_into().
171 *
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100172 * @fdtp: On entry a pointer to the flattened device tree.
173 * On exit a pointer to the copy of the flattened device tree.
Heinrich Schuchardt96af56e2018-11-12 18:55:22 +0100174 * FDT start
175 * Return: status code
Simon Glass5d618df2018-08-08 03:54:30 -0600176 */
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100177static efi_status_t copy_fdt(void **fdtp)
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200178{
Alexander Graffdbae012016-04-11 23:51:01 +0200179 unsigned long fdt_ram_start = -1L, fdt_pages;
Simon Glass5d618df2018-08-08 03:54:30 -0600180 efi_status_t ret = 0;
181 void *fdt, *new_fdt;
Alexander Graffdbae012016-04-11 23:51:01 +0200182 u64 new_fdt_addr;
Simon Glass5d618df2018-08-08 03:54:30 -0600183 uint fdt_size;
Alexander Graffdbae012016-04-11 23:51:01 +0200184 int i;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200185
Simon Glass5d618df2018-08-08 03:54:30 -0600186 for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) {
187 u64 ram_start = gd->bd->bi_dram[i].start;
188 u64 ram_size = gd->bd->bi_dram[i].size;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200189
Alexander Graffdbae012016-04-11 23:51:01 +0200190 if (!ram_size)
191 continue;
192
193 if (ram_start < fdt_ram_start)
194 fdt_ram_start = ram_start;
195 }
196
Simon Glass56bbcc12018-06-18 08:08:25 -0600197 /*
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100198 * Give us at least 12 KiB of breathing room in case the device tree
199 * needs to be expanded later.
Simon Glass56bbcc12018-06-18 08:08:25 -0600200 */
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100201 fdt = *fdtp;
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100202 fdt_pages = efi_size_in_pages(fdt_totalsize(fdt) + 0x3000);
203 fdt_size = fdt_pages << EFI_PAGE_SHIFT;
Alexander Graffdbae012016-04-11 23:51:01 +0200204
Heinrich Schuchardt45a755d2023-02-23 20:27:38 +0100205 ret = efi_allocate_pages(EFI_ALLOCATE_ANY_PAGES,
Heinrich Schuchardte00764b2020-05-06 20:32:31 +0200206 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass5d618df2018-08-08 03:54:30 -0600207 &new_fdt_addr);
208 if (ret != EFI_SUCCESS) {
Heinrich Schuchardt45a755d2023-02-23 20:27:38 +0100209 log_err("ERROR: Failed to reserve space for FDT\n");
210 goto done;
Alexander Graffdbae012016-04-11 23:51:01 +0200211 }
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100212 new_fdt = (void *)(uintptr_t)new_fdt_addr;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200213 memcpy(new_fdt, fdt, fdt_totalsize(fdt));
214 fdt_set_totalsize(new_fdt, fdt_size);
215
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100216 *fdtp = (void *)(uintptr_t)new_fdt_addr;
Simon Glass5d618df2018-08-08 03:54:30 -0600217done:
218 return ret;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200219}
220
Heinrich Schuchardt928de7d2020-08-27 12:52:20 +0200221/**
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200222 * get_config_table() - get configuration table
223 *
224 * @guid: GUID of the configuration table
225 * Return: pointer to configuration table or NULL
226 */
227static void *get_config_table(const efi_guid_t *guid)
228{
229 size_t i;
230
231 for (i = 0; i < systab.nr_tables; i++) {
232 if (!guidcmp(guid, &systab.tables[i].guid))
233 return systab.tables[i].table;
234 }
235 return NULL;
Alexander Graf22c88bf2018-04-06 09:40:51 +0200236}
237
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900238/**
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100239 * efi_install_fdt() - install device tree
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200240 *
Heinrich Schuchardtb112ac22020-02-07 22:10:49 +0100241 * If fdt is not EFI_FDT_USE_INTERNAL, the device tree located at that memory
242 * address will will be installed as configuration table, otherwise the device
243 * tree located at the address indicated by environment variable fdt_addr or as
244 * fallback fdtcontroladdr will be used.
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200245 *
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100246 * On architectures using ACPI tables device trees shall not be installed as
247 * configuration table.
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200248 *
Heinrich Schuchardtb112ac22020-02-07 22:10:49 +0100249 * @fdt: address of device tree or EFI_FDT_USE_INTERNAL to use the
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100250 * the hardware device tree as indicated by environment variable
251 * fdt_addr or as fallback the internal device tree as indicated by
252 * the environment variable fdtcontroladdr
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900253 * Return: status code
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900254 */
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100255efi_status_t efi_install_fdt(void *fdt)
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900256{
Heinrich Schuchardt310af312023-11-16 10:29:28 +0100257 struct bootm_headers img = { 0 };
258 efi_status_t ret;
259
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200260 /*
261 * The EBBR spec requires that we have either an FDT or an ACPI table
262 * but not both.
263 */
Heinrich Schuchardt310af312023-11-16 10:29:28 +0100264 if (CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) && fdt)
Alexander Graf08994972022-02-27 13:18:56 +0100265 log_warning("WARNING: Can't have ACPI table and device tree - ignoring DT.\n");
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900266
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100267 if (fdt == EFI_FDT_USE_INTERNAL) {
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100268 const char *fdt_opt;
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100269 uintptr_t fdt_addr;
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100270
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200271 /* Look for device tree that is already installed */
272 if (get_config_table(&efi_guid_fdt))
273 return EFI_SUCCESS;
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100274 /* Check if there is a hardware device tree */
275 fdt_opt = env_get("fdt_addr");
276 /* Use our own device tree as fallback */
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200277 if (!fdt_opt) {
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100278 fdt_opt = env_get("fdtcontroladdr");
279 if (!fdt_opt) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200280 log_err("ERROR: need device tree\n");
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100281 return EFI_NOT_FOUND;
282 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200283 }
Simon Glass3ff49ec2021-07-24 09:03:29 -0600284 fdt_addr = hextoul(fdt_opt, NULL);
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200285 if (!fdt_addr) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200286 log_err("ERROR: invalid $fdt_addr or $fdtcontroladdr\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200287 return EFI_LOAD_ERROR;
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900288 }
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100289 fdt = map_sysmem(fdt_addr, 0);
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200290 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900291
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200292 /* Install device tree */
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200293 if (fdt_check_header(fdt)) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200294 log_err("ERROR: invalid device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200295 return EFI_LOAD_ERROR;
296 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900297
Heinrich Schuchardt310af312023-11-16 10:29:28 +0100298 /* Create memory reservations as indicated by the device tree */
299 efi_carve_out_dt_rsv(fdt);
300
301 if (CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE))
302 return EFI_SUCCESS;
303
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200304 /* Prepare device tree for payload */
305 ret = copy_fdt(&fdt);
306 if (ret) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200307 log_err("ERROR: out of memory\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200308 return EFI_OUT_OF_RESOURCES;
309 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900310
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200311 if (image_setup_libfdt(&img, fdt, 0, NULL)) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200312 log_err("ERROR: failed to process device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200313 return EFI_LOAD_ERROR;
314 }
315
Ilias Apalodimase4e56602022-01-03 14:07:37 +0200316 efi_try_purge_kaslr_seed(fdt);
317
Etienne Carriereb9064352023-02-16 17:29:48 +0100318 if (CONFIG_IS_ENABLED(EFI_TCG2_PROTOCOL_MEASURE_DTB)) {
319 ret = efi_tcg2_measure_dtb(fdt);
320 if (ret == EFI_SECURITY_VIOLATION) {
321 log_err("ERROR: failed to measure DTB\n");
322 return ret;
323 }
324 }
325
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200326 /* Install device tree as UEFI table */
327 ret = efi_install_configuration_table(&efi_guid_fdt, fdt);
328 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200329 log_err("ERROR: failed to install device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200330 return ret;
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900331 }
332
333 return EFI_SUCCESS;
334}
335
Simon Glass4d77ee62018-11-25 20:14:39 -0700336/**
Heinrich Schuchardt3c3a7352018-09-23 17:21:51 +0200337 * do_bootefi_exec() - execute EFI binary
338 *
Heinrich Schuchardtaa4a66c2020-08-15 23:10:22 +0200339 * The image indicated by @handle is started. When it returns the allocated
340 * memory for the @load_options is freed.
341 *
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900342 * @handle: handle of loaded image
Heinrich Schuchardtaa4a66c2020-08-15 23:10:22 +0200343 * @load_options: load options
Heinrich Schuchardt3c3a7352018-09-23 17:21:51 +0200344 * Return: status code
345 *
346 * Load the EFI binary into a newly assigned memory unwinding the relocation
347 * information, install the loaded image protocol, and call the binary.
Alexander Grafe2b04f22016-03-10 00:27:20 +0100348 */
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200349static efi_status_t do_bootefi_exec(efi_handle_t handle, void *load_options)
Alexander Grafe2b04f22016-03-10 00:27:20 +0100350{
Heinrich Schuchardt4b055a22018-03-03 15:29:01 +0100351 efi_status_t ret;
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200352 efi_uintn_t exit_data_size = 0;
353 u16 *exit_data = NULL;
Rob Clark18ceba72017-10-10 08:23:06 -0400354
Heinrich Schuchardtaf64c3e2021-01-24 14:34:12 +0000355 /* On ARM switch from EL3 or secure mode to EL2 or non-secure mode */
356 switch_to_non_secure_mode();
357
Masahisa Kojimad250a8f2022-02-22 09:58:30 +0900358 /*
359 * The UEFI standard requires that the watchdog timer is set to five
360 * minutes when invoking an EFI boot option.
361 *
362 * Unified Extensible Firmware Interface (UEFI), version 2.7 Errata A
363 * 7.5. Miscellaneous Boot Services - EFI_BOOT_SERVICES.SetWatchdogTimer
364 */
365 ret = efi_set_watchdog(300);
366 if (ret != EFI_SUCCESS) {
367 log_err("ERROR: Failed to set watchdog timer\n");
368 goto out;
369 }
370
Alexander Grafe2b04f22016-03-10 00:27:20 +0100371 /* Call our payload! */
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200372 ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data));
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200373 if (ret != EFI_SUCCESS) {
374 log_err("## Application failed, r = %lu\n",
375 ret & ~EFI_ERROR_MASK);
376 if (exit_data) {
377 log_err("## %ls\n", exit_data);
378 efi_free_pool(exit_data);
379 }
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200380 }
Rob Clarkf8db9222017-09-13 18:05:33 -0400381
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900382 efi_restore_gd();
Simon Glass4d77ee62018-11-25 20:14:39 -0700383
Masahisa Kojimad250a8f2022-02-22 09:58:30 +0900384out:
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100385 free(load_options);
Rob Clarkf8db9222017-09-13 18:05:33 -0400386
Ilias Apalodimas7e052792022-10-16 11:36:32 +0300387 if (IS_ENABLED(CONFIG_EFI_LOAD_FILE2_INITRD)) {
388 if (efi_initrd_deregister() != EFI_SUCCESS)
389 log_err("Failed to remove loadfile2 for initrd\n");
390 }
Ilias Apalodimasb307e3d2021-03-17 21:55:00 +0200391
Masahisa Kojimad250a8f2022-02-22 09:58:30 +0900392 /* Control is returned to U-Boot, disable EFI watchdog */
393 efi_set_watchdog(0);
394
Rob Clarkf8db9222017-09-13 18:05:33 -0400395 return ret;
Alexander Grafe2b04f22016-03-10 00:27:20 +0100396}
397
AKASHI Takahirocf819832019-04-19 12:22:33 +0900398/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200399 * do_efibootmgr() - execute EFI boot manager
AKASHI Takahirocf819832019-04-19 12:22:33 +0900400 *
AKASHI Takahirocf819832019-04-19 12:22:33 +0900401 * Return: status code
AKASHI Takahirocf819832019-04-19 12:22:33 +0900402 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200403static int do_efibootmgr(void)
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900404{
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900405 efi_handle_t handle;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900406 efi_status_t ret;
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200407 void *load_options;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900408
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200409 ret = efi_bootmgr_load(&handle, &load_options);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900410 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200411 log_notice("EFI boot manager: Cannot load any image\n");
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900412 return CMD_RET_FAILURE;
413 }
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900414
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200415 ret = do_bootefi_exec(handle, load_options);
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900416
AKASHI Takahirocf819832019-04-19 12:22:33 +0900417 if (ret != EFI_SUCCESS)
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900418 return CMD_RET_FAILURE;
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900419
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900420 return CMD_RET_SUCCESS;
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900421}
422
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +0200423/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200424 * do_bootefi_image() - execute EFI binary
425 *
426 * Set up memory image for the binary to be loaded, prepare device path, and
427 * then call do_bootefi_exec() to execute it.
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900428 *
Kyle Evans2c3bf4e2022-04-10 16:05:55 -0500429 * @image_opt: string with image start address
430 * @size_opt: string with image size or NULL
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900431 * Return: status code
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900432 */
Kyle Evans2c3bf4e2022-04-10 16:05:55 -0500433static int do_bootefi_image(const char *image_opt, const char *size_opt)
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900434{
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900435 void *image_buf;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900436 unsigned long addr, size;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900437 efi_status_t ret;
438
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900439#ifdef CONFIG_CMD_BOOTEFI_HELLO
440 if (!strcmp(image_opt, "hello")) {
Heinrich Schuchardt6a7ae672021-01-12 17:44:08 +0100441 image_buf = __efi_helloworld_begin;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900442 size = __efi_helloworld_end - __efi_helloworld_begin;
Heinrich Schuchardt6b821592021-01-12 12:46:24 +0100443 efi_clear_bootdev();
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900444 } else
445#endif
446 {
Heinrich Schuchardt6b821592021-01-12 12:46:24 +0100447 addr = strtoul(image_opt, NULL, 16);
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900448 /* Check that a numeric value was passed */
Heinrich Schuchardt6b821592021-01-12 12:46:24 +0100449 if (!addr)
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900450 return CMD_RET_USAGE;
Heinrich Schuchardt6b821592021-01-12 12:46:24 +0100451 image_buf = map_sysmem(addr, 0);
452
Kyle Evans2c3bf4e2022-04-10 16:05:55 -0500453 if (size_opt) {
454 size = strtoul(size_opt, NULL, 16);
455 if (!size)
456 return CMD_RET_USAGE;
457 efi_clear_bootdev();
458 } else {
459 if (image_buf != image_addr) {
460 log_err("No UEFI binary known at %s\n",
461 image_opt);
462 return CMD_RET_FAILURE;
463 }
464 size = image_size;
Heinrich Schuchardt6b821592021-01-12 12:46:24 +0100465 }
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900466 }
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100467 ret = efi_run_image(image_buf, size);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900468
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100469 if (ret != EFI_SUCCESS)
470 return CMD_RET_FAILURE;
471
472 return CMD_RET_SUCCESS;
473}
474
475/**
476 * efi_run_image() - run loaded UEFI image
477 *
478 * @source_buffer: memory address of the UEFI image
479 * @source_size: size of the UEFI image
480 * Return: status code
481 */
482efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size)
483{
484 efi_handle_t mem_handle = NULL, handle;
485 struct efi_device_path *file_path = NULL;
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000486 struct efi_device_path *msg_path;
Ilias Apalodimas3e2c20f2022-10-06 16:08:44 +0300487 efi_status_t ret, ret2;
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000488 u16 *load_options;
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100489
490 if (!bootefi_device_path || !bootefi_image_path) {
Simon Glass95c1d252022-01-29 14:58:37 -0700491 log_debug("Not loaded from disk\n");
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900492 /*
493 * Special case for efi payload not loaded from disk,
494 * such as 'bootefi hello' or for example payload
495 * loaded directly into memory via JTAG, etc:
496 */
497 file_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE,
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100498 (uintptr_t)source_buffer,
499 source_size);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900500 /*
501 * Make sure that device for device_path exist
502 * in load_image(). Otherwise, shell and grub will fail.
503 */
Ilias Apalodimas3e2c20f2022-10-06 16:08:44 +0300504 ret = efi_install_multiple_protocol_interfaces(&mem_handle,
505 &efi_guid_device_path,
506 file_path, NULL);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900507 if (ret != EFI_SUCCESS)
508 goto out;
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000509 msg_path = file_path;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900510 } else {
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100511 file_path = efi_dp_append(bootefi_device_path,
512 bootefi_image_path);
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000513 msg_path = bootefi_image_path;
Simon Glass95c1d252022-01-29 14:58:37 -0700514 log_debug("Loaded from disk\n");
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900515 }
516
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000517 log_info("Booting %pD\n", msg_path);
518
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100519 ret = EFI_CALL(efi_load_image(false, efi_root, file_path, source_buffer,
520 source_size, &handle));
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000521 if (ret != EFI_SUCCESS) {
522 log_err("Loading image failed\n");
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900523 goto out;
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000524 }
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200525
526 /* Transfer environment variable as load options */
527 ret = efi_env_set_load_options(handle, "bootargs", &load_options);
528 if (ret != EFI_SUCCESS)
529 goto out;
530
531 ret = do_bootefi_exec(handle, load_options);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900532
533out:
Ilias Apalodimas3e2c20f2022-10-06 16:08:44 +0300534 ret2 = efi_uninstall_multiple_protocol_interfaces(mem_handle,
535 &efi_guid_device_path,
536 file_path, NULL);
Heinrich Schuchardt6e35d3b2020-04-20 12:44:56 +0200537 efi_free_pool(file_path);
Ilias Apalodimas3e2c20f2022-10-06 16:08:44 +0300538 return (ret != EFI_SUCCESS) ? ret : ret2;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900539}
540
Simon Glass93f25592018-11-25 20:14:37 -0700541#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900542static efi_status_t bootefi_run_prepare(const char *load_options_path,
543 struct efi_device_path *device_path,
544 struct efi_device_path *image_path,
545 struct efi_loaded_image_obj **image_objp,
546 struct efi_loaded_image **loaded_image_infop)
547{
548 efi_status_t ret;
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100549 u16 *load_options;
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900550
551 ret = efi_setup_loaded_image(device_path, image_path, image_objp,
552 loaded_image_infop);
553 if (ret != EFI_SUCCESS)
554 return ret;
555
556 /* Transfer environment variable as load options */
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200557 return efi_env_set_load_options((efi_handle_t)*image_objp,
558 load_options_path,
559 &load_options);
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900560}
561
Simon Glass93f25592018-11-25 20:14:37 -0700562/**
563 * bootefi_test_prepare() - prepare to run an EFI test
564 *
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100565 * Prepare to run a test as if it were provided by a loaded image.
Simon Glass93f25592018-11-25 20:14:37 -0700566 *
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100567 * @image_objp: pointer to be set to the loaded image handle
568 * @loaded_image_infop: pointer to be set to the loaded image protocol
569 * @path: dummy file path used to construct the device path
570 * set in the loaded image protocol
571 * @load_options_path: name of a U-Boot environment variable. Its value is
572 * set as load options in the loaded image protocol.
573 * Return: status code
Simon Glass93f25592018-11-25 20:14:37 -0700574 */
575static efi_status_t bootefi_test_prepare
576 (struct efi_loaded_image_obj **image_objp,
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100577 struct efi_loaded_image **loaded_image_infop, const char *path,
578 const char *load_options_path)
Simon Glass93f25592018-11-25 20:14:37 -0700579{
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100580 efi_status_t ret;
581
Simon Glass93f25592018-11-25 20:14:37 -0700582 /* Construct a dummy device path */
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100583 bootefi_device_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, 0, 0);
Simon Glass93f25592018-11-25 20:14:37 -0700584 if (!bootefi_device_path)
585 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100586
Heinrich Schuchardtff08eac2023-05-13 10:36:21 +0200587 bootefi_image_path = efi_dp_from_file(NULL, path);
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100588 if (!bootefi_image_path) {
589 ret = EFI_OUT_OF_RESOURCES;
590 goto failure;
591 }
592
593 ret = bootefi_run_prepare(load_options_path, bootefi_device_path,
594 bootefi_image_path, image_objp,
595 loaded_image_infop);
596 if (ret == EFI_SUCCESS)
597 return ret;
Simon Glass93f25592018-11-25 20:14:37 -0700598
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100599failure:
Heinrich Schuchardt6b821592021-01-12 12:46:24 +0100600 efi_clear_bootdev();
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100601 return ret;
Simon Glass93f25592018-11-25 20:14:37 -0700602}
603
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900604/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200605 * do_efi_selftest() - execute EFI selftest
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900606 *
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900607 * Return: status code
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900608 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200609static int do_efi_selftest(void)
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900610{
611 struct efi_loaded_image_obj *image_obj;
612 struct efi_loaded_image *loaded_image_info;
613 efi_status_t ret;
614
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900615 ret = bootefi_test_prepare(&image_obj, &loaded_image_info,
616 "\\selftest", "efi_selftest");
617 if (ret != EFI_SUCCESS)
618 return CMD_RET_FAILURE;
619
620 /* Execute the test */
621 ret = EFI_CALL(efi_selftest(&image_obj->header, &systab));
Ilias Apalodimasb09ecf12023-07-24 13:17:36 +0300622 efi_restore_gd();
623 free(loaded_image_info->load_options);
624 if (ret != EFI_SUCCESS)
625 efi_delete_handle(&image_obj->header);
626 else
627 ret = efi_delete_handle(&image_obj->header);
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900628
629 return ret != EFI_SUCCESS;
630}
Simon Glass93f25592018-11-25 20:14:37 -0700631#endif /* CONFIG_CMD_BOOTEFI_SELFTEST */
632
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200633/**
634 * do_bootefi() - execute `bootefi` command
635 *
636 * @cmdtp: table entry describing command
637 * @flag: bitmap indicating how the command was invoked
638 * @argc: number of arguments
639 * @argv: command line arguments
640 * Return: status code
641 */
Simon Glassed38aef2020-05-10 11:40:03 -0600642static int do_bootefi(struct cmd_tbl *cmdtp, int flag, int argc,
643 char *const argv[])
Alexander Grafe2b04f22016-03-10 00:27:20 +0100644{
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200645 efi_status_t ret;
Heinrich Schuchardt3ea20e72022-05-19 08:00:56 +0200646 char *img_addr, *img_size, *str_copy, *pos;
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100647 void *fdt;
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200648
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900649 if (argc < 2)
650 return CMD_RET_USAGE;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900651
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200652 /* Initialize EFI drivers */
653 ret = efi_init_obj_list();
654 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200655 log_err("Error: Cannot initialize UEFI sub-system, r = %lu\n",
656 ret & ~EFI_ERROR_MASK);
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200657 return CMD_RET_FAILURE;
658 }
659
Heinrich Schuchardt3ea20e72022-05-19 08:00:56 +0200660 if (argc > 2) {
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100661 uintptr_t fdt_addr;
662
Simon Glass3ff49ec2021-07-24 09:03:29 -0600663 fdt_addr = hextoul(argv[2], NULL);
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100664 fdt = map_sysmem(fdt_addr, 0);
665 } else {
666 fdt = EFI_FDT_USE_INTERNAL;
667 }
668 ret = efi_install_fdt(fdt);
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200669 if (ret == EFI_INVALID_PARAMETER)
670 return CMD_RET_USAGE;
671 else if (ret != EFI_SUCCESS)
672 return CMD_RET_FAILURE;
673
Heinrich Schuchardtb2625e82021-01-15 19:02:50 +0100674 if (IS_ENABLED(CONFIG_CMD_BOOTEFI_BOOTMGR)) {
675 if (!strcmp(argv[1], "bootmgr"))
676 return do_efibootmgr();
677 }
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900678#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
Heinrich Schuchardtb2625e82021-01-15 19:02:50 +0100679 if (!strcmp(argv[1], "selftest"))
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200680 return do_efi_selftest();
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900681#endif
Heinrich Schuchardt3ea20e72022-05-19 08:00:56 +0200682 str_copy = strdup(argv[1]);
683 if (!str_copy) {
684 log_err("Out of memory\n");
685 return CMD_RET_FAILURE;
686 }
687 pos = str_copy;
688 img_addr = strsep(&pos, ":");
689 img_size = strsep(&pos, ":");
690 ret = do_bootefi_image(img_addr, img_size);
691 free(str_copy);
Simon Glassfac4ced2016-11-07 08:47:08 -0700692
Heinrich Schuchardt3ea20e72022-05-19 08:00:56 +0200693 return ret;
Alexander Grafe2b04f22016-03-10 00:27:20 +0100694}
695
Tom Rini03f146c2023-10-07 15:13:08 -0400696U_BOOT_LONGHELP(bootefi,
Heinrich Schuchardt3ea20e72022-05-19 08:00:56 +0200697 "<image address>[:<image size>] [<fdt address>]\n"
698 " - boot EFI payload\n"
Simon Glassfac4ced2016-11-07 08:47:08 -0700699#ifdef CONFIG_CMD_BOOTEFI_HELLO
Heinrich Schuchardtd33ae3e2017-09-15 10:06:11 +0200700 "bootefi hello\n"
701 " - boot a sample Hello World application stored within U-Boot\n"
702#endif
703#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
Heinrich Schuchardt44ab21b2018-03-03 15:29:03 +0100704 "bootefi selftest [fdt address]\n"
Heinrich Schuchardtd33ae3e2017-09-15 10:06:11 +0200705 " - boot an EFI selftest application stored within U-Boot\n"
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200706 " Use environment variable efi_selftest to select a single test.\n"
707 " Use 'setenv efi_selftest list' to enumerate all tests.\n"
Simon Glassfac4ced2016-11-07 08:47:08 -0700708#endif
Heinrich Schuchardtb2625e82021-01-15 19:02:50 +0100709#ifdef CONFIG_CMD_BOOTEFI_BOOTMGR
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900710 "bootefi bootmgr [fdt address]\n"
Rob Clarkc84c1102017-09-13 18:05:38 -0400711 " - load and boot EFI payload based on BootOrder/BootXXXX variables.\n"
712 "\n"
713 " If specified, the device tree located at <fdt address> gets\n"
Heinrich Schuchardtb2625e82021-01-15 19:02:50 +0100714 " exposed as EFI configuration table.\n"
715#endif
Tom Rini03f146c2023-10-07 15:13:08 -0400716 );
Alexander Grafe2b04f22016-03-10 00:27:20 +0100717
718U_BOOT_CMD(
Kyle Evans2c3bf4e2022-04-10 16:05:55 -0500719 bootefi, 4, 0, do_bootefi,
Sergey Kubushyn268f19e2016-06-07 11:14:31 -0700720 "Boots an EFI payload from memory",
Alexander Grafe2b04f22016-03-10 00:27:20 +0100721 bootefi_help_text
722);