blob: fdf909f8da2ca332f4a5dfa009afe8b6dbb45dda [file] [log] [blame]
Tom Rini70df9d62018-05-07 17:02:21 -04001// SPDX-License-Identifier: GPL-2.0+
Alexander Grafe2b04f22016-03-10 00:27:20 +01002/*
3 * EFI application loader
4 *
5 * Copyright (c) 2016 Alexander Graf
Alexander Grafe2b04f22016-03-10 00:27:20 +01006 */
7
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +02008#define LOG_CATEGORY LOGC_EFI
9
Alexander Grafe2b04f22016-03-10 00:27:20 +010010#include <common.h>
Heinrich Schuchardtaa0b11b2019-01-08 18:13:06 +010011#include <charset.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010012#include <command.h>
Simon Glass11c89f32017-05-17 17:18:03 -060013#include <dm.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010014#include <efi_loader.h>
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020015#include <efi_selftest.h>
Simon Glass0af6e2d2019-08-01 09:46:52 -060016#include <env.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010017#include <errno.h>
Simon Glass2dc9c342020-05-10 11:40:01 -060018#include <image.h>
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +020019#include <log.h>
Simon Glass9bc15642020-02-03 07:36:16 -070020#include <malloc.h>
Masahiro Yamada75f82d02018-03-05 01:20:11 +090021#include <linux/libfdt.h>
22#include <linux/libfdt_env.h>
Alexander Grafa2414512018-06-18 17:22:58 +020023#include <mapmem.h>
Alexander Graffdbae012016-04-11 23:51:01 +020024#include <memalign.h>
Simon Glassc2194bf2016-09-25 15:27:32 -060025#include <asm-generic/sections.h>
26#include <linux/linkage.h>
Alexander Graf2ff5cc32016-04-11 16:55:26 +020027
28DECLARE_GLOBAL_DATA_PTR;
Alexander Grafe2b04f22016-03-10 00:27:20 +010029
Rob Clarkf8db9222017-09-13 18:05:33 -040030static struct efi_device_path *bootefi_image_path;
31static struct efi_device_path *bootefi_device_path;
Alexander Grafe2b04f22016-03-10 00:27:20 +010032
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +020033/**
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020034 * efi_env_set_load_options() - set load options from environment variable
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020035 *
Heinrich Schuchardte6263952020-01-03 22:53:42 +010036 * @handle: the image handle
37 * @env_var: name of the environment variable
38 * @load_options: pointer to load options (output)
39 * Return: status code
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020040 */
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020041static efi_status_t efi_env_set_load_options(efi_handle_t handle,
42 const char *env_var,
43 u16 **load_options)
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020044{
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020045 const char *env = env_get(env_var);
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020046 size_t size;
Heinrich Schuchardtde527802018-08-31 21:31:33 +020047 u16 *pos;
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +090048 efi_status_t ret;
49
Heinrich Schuchardte6263952020-01-03 22:53:42 +010050 *load_options = NULL;
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020051 if (!env)
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020052 return EFI_SUCCESS;
53 size = sizeof(u16) * (utf8_utf16_strlen(env) + 1);
54 pos = calloc(size, 1);
55 if (!pos)
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +090056 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardte6263952020-01-03 22:53:42 +010057 *load_options = pos;
Heinrich Schuchardtde527802018-08-31 21:31:33 +020058 utf8_utf16_strcpy(&pos, env);
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020059 ret = efi_set_load_options(handle, size, *load_options);
60 if (ret != EFI_SUCCESS) {
61 free(*load_options);
62 *load_options = NULL;
63 }
64 return ret;
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020065}
66
Heinrich Schuchardt4420a332019-04-20 13:33:55 +020067#if !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
68
Simon Glass5d618df2018-08-08 03:54:30 -060069/**
70 * copy_fdt() - Copy the device tree to a new location available to EFI
71 *
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +010072 * The FDT is copied to a suitable location within the EFI memory map.
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +010073 * Additional 12 KiB are added to the space in case the device tree needs to be
Simon Glass5d618df2018-08-08 03:54:30 -060074 * expanded later with fdt_open_into().
75 *
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +010076 * @fdtp: On entry a pointer to the flattened device tree.
77 * On exit a pointer to the copy of the flattened device tree.
Heinrich Schuchardt96af56e2018-11-12 18:55:22 +010078 * FDT start
79 * Return: status code
Simon Glass5d618df2018-08-08 03:54:30 -060080 */
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +010081static efi_status_t copy_fdt(void **fdtp)
Alexander Graf2ff5cc32016-04-11 16:55:26 +020082{
Alexander Graffdbae012016-04-11 23:51:01 +020083 unsigned long fdt_ram_start = -1L, fdt_pages;
Simon Glass5d618df2018-08-08 03:54:30 -060084 efi_status_t ret = 0;
85 void *fdt, *new_fdt;
Alexander Graffdbae012016-04-11 23:51:01 +020086 u64 new_fdt_addr;
Simon Glass5d618df2018-08-08 03:54:30 -060087 uint fdt_size;
Alexander Graffdbae012016-04-11 23:51:01 +020088 int i;
Alexander Graf2ff5cc32016-04-11 16:55:26 +020089
Simon Glass5d618df2018-08-08 03:54:30 -060090 for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) {
91 u64 ram_start = gd->bd->bi_dram[i].start;
92 u64 ram_size = gd->bd->bi_dram[i].size;
Alexander Graf2ff5cc32016-04-11 16:55:26 +020093
Alexander Graffdbae012016-04-11 23:51:01 +020094 if (!ram_size)
95 continue;
96
97 if (ram_start < fdt_ram_start)
98 fdt_ram_start = ram_start;
99 }
100
Simon Glass56bbcc12018-06-18 08:08:25 -0600101 /*
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100102 * Give us at least 12 KiB of breathing room in case the device tree
103 * needs to be expanded later.
Simon Glass56bbcc12018-06-18 08:08:25 -0600104 */
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100105 fdt = *fdtp;
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100106 fdt_pages = efi_size_in_pages(fdt_totalsize(fdt) + 0x3000);
107 fdt_size = fdt_pages << EFI_PAGE_SHIFT;
Alexander Graffdbae012016-04-11 23:51:01 +0200108
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100109 /*
110 * Safe fdt location is at 127 MiB.
111 * On the sandbox convert from the sandbox address space.
112 */
113 new_fdt_addr = (uintptr_t)map_sysmem(fdt_ram_start + 0x7f00000 +
114 fdt_size, 0);
Simon Glass5d618df2018-08-08 03:54:30 -0600115 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardte00764b2020-05-06 20:32:31 +0200116 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass5d618df2018-08-08 03:54:30 -0600117 &new_fdt_addr);
118 if (ret != EFI_SUCCESS) {
Alexander Graffdbae012016-04-11 23:51:01 +0200119 /* If we can't put it there, put it somewhere */
xypron.glpk@gmx.def6b99122017-08-11 21:19:25 +0200120 new_fdt_addr = (ulong)memalign(EFI_PAGE_SIZE, fdt_size);
Simon Glass5d618df2018-08-08 03:54:30 -0600121 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardte00764b2020-05-06 20:32:31 +0200122 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass5d618df2018-08-08 03:54:30 -0600123 &new_fdt_addr);
124 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200125 log_err("ERROR: Failed to reserve space for FDT\n");
Simon Glass5d618df2018-08-08 03:54:30 -0600126 goto done;
Alexander Graf9b9b7162017-07-03 13:32:35 +0200127 }
Alexander Graffdbae012016-04-11 23:51:01 +0200128 }
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100129 new_fdt = (void *)(uintptr_t)new_fdt_addr;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200130 memcpy(new_fdt, fdt, fdt_totalsize(fdt));
131 fdt_set_totalsize(new_fdt, fdt_size);
132
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100133 *fdtp = (void *)(uintptr_t)new_fdt_addr;
Simon Glass5d618df2018-08-08 03:54:30 -0600134done:
135 return ret;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200136}
137
Heinrich Schuchardt928de7d2020-08-27 12:52:20 +0200138/**
139 * efi_reserve_memory() - add reserved memory to memory map
140 *
141 * @addr: start address of the reserved memory range
142 * @size: size of the reserved memory range
143 * @nomap: indicates that the memory range shall not be accessed by the
144 * UEFI payload
145 */
146static void efi_reserve_memory(u64 addr, u64 size, bool nomap)
Atish Patra8e286f62020-03-13 17:11:30 -0700147{
Heinrich Schuchardt928de7d2020-08-27 12:52:20 +0200148 int type;
149 efi_uintn_t ret;
150
Atish Patra8e286f62020-03-13 17:11:30 -0700151 /* Convert from sandbox address space. */
152 addr = (uintptr_t)map_sysmem(addr, 0);
Heinrich Schuchardt928de7d2020-08-27 12:52:20 +0200153
154 if (nomap)
155 type = EFI_RESERVED_MEMORY_TYPE;
156 else
157 type = EFI_BOOT_SERVICES_DATA;
158
159 ret = efi_add_memory_map(addr, size, type);
160 if (ret != EFI_SUCCESS)
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200161 log_err("Reserved memory mapping failed addr %llx size %llx\n",
162 addr, size);
Atish Patra8e286f62020-03-13 17:11:30 -0700163}
164
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +0200165/**
Simon Glass54b9b6e2018-06-18 08:08:28 -0600166 * efi_carve_out_dt_rsv() - Carve out DT reserved memory ranges
167 *
168 * The mem_rsv entries of the FDT are added to the memory map. Any failures are
169 * ignored because this is not critical and we would rather continue to try to
170 * boot.
171 *
172 * @fdt: Pointer to device tree
173 */
174static void efi_carve_out_dt_rsv(void *fdt)
Alexander Graf22c88bf2018-04-06 09:40:51 +0200175{
176 int nr_rsv, i;
Atish Patra8e286f62020-03-13 17:11:30 -0700177 u64 addr, size;
178 int nodeoffset, subnode;
Alexander Graf22c88bf2018-04-06 09:40:51 +0200179
180 nr_rsv = fdt_num_mem_rsv(fdt);
181
182 /* Look for an existing entry and add it to the efi mem map. */
183 for (i = 0; i < nr_rsv; i++) {
184 if (fdt_get_mem_rsv(fdt, i, &addr, &size) != 0)
185 continue;
Heinrich Schuchardt928de7d2020-08-27 12:52:20 +0200186 efi_reserve_memory(addr, size, false);
Atish Patra8e286f62020-03-13 17:11:30 -0700187 }
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100188
Atish Patra8e286f62020-03-13 17:11:30 -0700189 /* process reserved-memory */
190 nodeoffset = fdt_subnode_offset(fdt, 0, "reserved-memory");
191 if (nodeoffset >= 0) {
192 subnode = fdt_first_subnode(fdt, nodeoffset);
193 while (subnode >= 0) {
Bin Mengeb0f48f2020-06-22 23:50:50 -0700194 fdt_addr_t fdt_addr;
195 fdt_size_t fdt_size;
Atish Patra0e52e942020-06-18 18:51:50 -0700196
Atish Patra8e286f62020-03-13 17:11:30 -0700197 /* check if this subnode has a reg property */
Atish Patra0e52e942020-06-18 18:51:50 -0700198 fdt_addr = fdtdec_get_addr_size_auto_parent(
199 fdt, nodeoffset, subnode,
200 "reg", 0, &fdt_size, false);
Atish Patra8e286f62020-03-13 17:11:30 -0700201 /*
202 * The /reserved-memory node may have children with
203 * a size instead of a reg property.
204 */
Heinrich Schuchardt8bec61e2020-06-30 14:12:43 +0200205 if (fdt_addr != FDT_ADDR_T_NONE &&
Heinrich Schuchardt928de7d2020-08-27 12:52:20 +0200206 fdtdec_get_is_enabled(fdt, subnode)) {
207 bool nomap;
208
209 nomap = !!fdt_getprop(fdt, subnode, "no-map",
210 NULL);
211 efi_reserve_memory(fdt_addr, fdt_size, nomap);
212 }
Atish Patra8e286f62020-03-13 17:11:30 -0700213 subnode = fdt_next_subnode(fdt, subnode);
214 }
Alexander Graf22c88bf2018-04-06 09:40:51 +0200215 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200216}
217
218/**
219 * get_config_table() - get configuration table
220 *
221 * @guid: GUID of the configuration table
222 * Return: pointer to configuration table or NULL
223 */
224static void *get_config_table(const efi_guid_t *guid)
225{
226 size_t i;
227
228 for (i = 0; i < systab.nr_tables; i++) {
229 if (!guidcmp(guid, &systab.tables[i].guid))
230 return systab.tables[i].table;
231 }
232 return NULL;
Alexander Graf22c88bf2018-04-06 09:40:51 +0200233}
234
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200235#endif /* !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) */
236
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900237/**
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100238 * efi_install_fdt() - install device tree
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200239 *
Heinrich Schuchardtb112ac22020-02-07 22:10:49 +0100240 * If fdt is not EFI_FDT_USE_INTERNAL, the device tree located at that memory
241 * address will will be installed as configuration table, otherwise the device
242 * tree located at the address indicated by environment variable fdt_addr or as
243 * fallback fdtcontroladdr will be used.
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200244 *
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100245 * On architectures using ACPI tables device trees shall not be installed as
246 * configuration table.
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200247 *
Heinrich Schuchardtb112ac22020-02-07 22:10:49 +0100248 * @fdt: address of device tree or EFI_FDT_USE_INTERNAL to use the
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100249 * the hardware device tree as indicated by environment variable
250 * fdt_addr or as fallback the internal device tree as indicated by
251 * the environment variable fdtcontroladdr
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900252 * Return: status code
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900253 */
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100254efi_status_t efi_install_fdt(void *fdt)
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900255{
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200256 /*
257 * The EBBR spec requires that we have either an FDT or an ACPI table
258 * but not both.
259 */
260#if CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100261 if (fdt) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200262 log_err("ERROR: can't have ACPI table and device tree.\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200263 return EFI_LOAD_ERROR;
264 }
265#else
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900266 bootm_headers_t img = { 0 };
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900267 efi_status_t ret;
268
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100269 if (fdt == EFI_FDT_USE_INTERNAL) {
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100270 const char *fdt_opt;
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100271 uintptr_t fdt_addr;
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100272
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200273 /* Look for device tree that is already installed */
274 if (get_config_table(&efi_guid_fdt))
275 return EFI_SUCCESS;
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100276 /* Check if there is a hardware device tree */
277 fdt_opt = env_get("fdt_addr");
278 /* Use our own device tree as fallback */
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200279 if (!fdt_opt) {
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100280 fdt_opt = env_get("fdtcontroladdr");
281 if (!fdt_opt) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200282 log_err("ERROR: need device tree\n");
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100283 return EFI_NOT_FOUND;
284 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200285 }
286 fdt_addr = simple_strtoul(fdt_opt, NULL, 16);
287 if (!fdt_addr) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200288 log_err("ERROR: invalid $fdt_addr or $fdtcontroladdr\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200289 return EFI_LOAD_ERROR;
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900290 }
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100291 fdt = map_sysmem(fdt_addr, 0);
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200292 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900293
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200294 /* Install device tree */
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200295 if (fdt_check_header(fdt)) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200296 log_err("ERROR: invalid device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200297 return EFI_LOAD_ERROR;
298 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900299
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200300 /* Prepare device tree for payload */
301 ret = copy_fdt(&fdt);
302 if (ret) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200303 log_err("ERROR: out of memory\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200304 return EFI_OUT_OF_RESOURCES;
305 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900306
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200307 if (image_setup_libfdt(&img, fdt, 0, NULL)) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200308 log_err("ERROR: failed to process device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200309 return EFI_LOAD_ERROR;
310 }
311
Heinrich Schuchardt74811c82020-03-14 10:59:34 +0100312 /* Create memory reservations as indicated by the device tree */
313 efi_carve_out_dt_rsv(fdt);
314
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200315 /* Install device tree as UEFI table */
316 ret = efi_install_configuration_table(&efi_guid_fdt, fdt);
317 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200318 log_err("ERROR: failed to install device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200319 return ret;
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900320 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200321#endif /* GENERATE_ACPI_TABLE */
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900322
323 return EFI_SUCCESS;
324}
325
Simon Glass4d77ee62018-11-25 20:14:39 -0700326/**
Heinrich Schuchardt3c3a7352018-09-23 17:21:51 +0200327 * do_bootefi_exec() - execute EFI binary
328 *
Heinrich Schuchardtaa4a66c2020-08-15 23:10:22 +0200329 * The image indicated by @handle is started. When it returns the allocated
330 * memory for the @load_options is freed.
331 *
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900332 * @handle: handle of loaded image
Heinrich Schuchardtaa4a66c2020-08-15 23:10:22 +0200333 * @load_options: load options
Heinrich Schuchardt3c3a7352018-09-23 17:21:51 +0200334 * Return: status code
335 *
336 * Load the EFI binary into a newly assigned memory unwinding the relocation
337 * information, install the loaded image protocol, and call the binary.
Alexander Grafe2b04f22016-03-10 00:27:20 +0100338 */
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200339static efi_status_t do_bootefi_exec(efi_handle_t handle, void *load_options)
Alexander Grafe2b04f22016-03-10 00:27:20 +0100340{
Heinrich Schuchardt4b055a22018-03-03 15:29:01 +0100341 efi_status_t ret;
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200342 efi_uintn_t exit_data_size = 0;
343 u16 *exit_data = NULL;
Rob Clark18ceba72017-10-10 08:23:06 -0400344
Alexander Grafe2b04f22016-03-10 00:27:20 +0100345 /* Call our payload! */
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200346 ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data));
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200347 if (ret != EFI_SUCCESS) {
348 log_err("## Application failed, r = %lu\n",
349 ret & ~EFI_ERROR_MASK);
350 if (exit_data) {
351 log_err("## %ls\n", exit_data);
352 efi_free_pool(exit_data);
353 }
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200354 }
Rob Clarkf8db9222017-09-13 18:05:33 -0400355
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900356 efi_restore_gd();
Simon Glass4d77ee62018-11-25 20:14:39 -0700357
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100358 free(load_options);
Rob Clarkf8db9222017-09-13 18:05:33 -0400359
360 return ret;
Alexander Grafe2b04f22016-03-10 00:27:20 +0100361}
362
AKASHI Takahirocf819832019-04-19 12:22:33 +0900363/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200364 * do_efibootmgr() - execute EFI boot manager
AKASHI Takahirocf819832019-04-19 12:22:33 +0900365 *
AKASHI Takahirocf819832019-04-19 12:22:33 +0900366 * Return: status code
AKASHI Takahirocf819832019-04-19 12:22:33 +0900367 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200368static int do_efibootmgr(void)
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900369{
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900370 efi_handle_t handle;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900371 efi_status_t ret;
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200372 void *load_options;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900373
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200374 ret = efi_bootmgr_load(&handle, &load_options);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900375 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200376 log_notice("EFI boot manager: Cannot load any image\n");
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900377 return CMD_RET_FAILURE;
378 }
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900379
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200380 ret = do_bootefi_exec(handle, load_options);
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900381
AKASHI Takahirocf819832019-04-19 12:22:33 +0900382 if (ret != EFI_SUCCESS)
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900383 return CMD_RET_FAILURE;
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900384
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900385 return CMD_RET_SUCCESS;
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900386}
387
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +0200388/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200389 * do_bootefi_image() - execute EFI binary
390 *
391 * Set up memory image for the binary to be loaded, prepare device path, and
392 * then call do_bootefi_exec() to execute it.
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900393 *
394 * @image_opt: string of image start address
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900395 * Return: status code
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900396 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200397static int do_bootefi_image(const char *image_opt)
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900398{
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900399 void *image_buf;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900400 unsigned long addr, size;
401 const char *size_str;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900402 efi_status_t ret;
403
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900404#ifdef CONFIG_CMD_BOOTEFI_HELLO
405 if (!strcmp(image_opt, "hello")) {
406 char *saddr;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900407
408 saddr = env_get("loadaddr");
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900409 size = __efi_helloworld_end - __efi_helloworld_begin;
410
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900411 if (saddr)
412 addr = simple_strtoul(saddr, NULL, 16);
413 else
414 addr = CONFIG_SYS_LOAD_ADDR;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900415
416 image_buf = map_sysmem(addr, size);
417 memcpy(image_buf, __efi_helloworld_begin, size);
418
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100419 efi_free_pool(bootefi_device_path);
420 efi_free_pool(bootefi_image_path);
421 bootefi_device_path = NULL;
422 bootefi_image_path = NULL;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900423 } else
424#endif
425 {
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900426 size_str = env_get("filesize");
427 if (size_str)
428 size = simple_strtoul(size_str, NULL, 16);
429 else
430 size = 0;
431
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900432 addr = simple_strtoul(image_opt, NULL, 16);
433 /* Check that a numeric value was passed */
434 if (!addr && *image_opt != '0')
435 return CMD_RET_USAGE;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900436
437 image_buf = map_sysmem(addr, size);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900438 }
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100439 ret = efi_run_image(image_buf, size);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900440
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100441 if (ret != EFI_SUCCESS)
442 return CMD_RET_FAILURE;
443
444 return CMD_RET_SUCCESS;
445}
446
447/**
448 * efi_run_image() - run loaded UEFI image
449 *
450 * @source_buffer: memory address of the UEFI image
451 * @source_size: size of the UEFI image
452 * Return: status code
453 */
454efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size)
455{
456 efi_handle_t mem_handle = NULL, handle;
457 struct efi_device_path *file_path = NULL;
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000458 struct efi_device_path *msg_path;
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100459 efi_status_t ret;
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000460 u16 *load_options;
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100461
462 if (!bootefi_device_path || !bootefi_image_path) {
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900463 /*
464 * Special case for efi payload not loaded from disk,
465 * such as 'bootefi hello' or for example payload
466 * loaded directly into memory via JTAG, etc:
467 */
468 file_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE,
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100469 (uintptr_t)source_buffer,
470 source_size);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900471 /*
472 * Make sure that device for device_path exist
473 * in load_image(). Otherwise, shell and grub will fail.
474 */
475 ret = efi_create_handle(&mem_handle);
476 if (ret != EFI_SUCCESS)
477 goto out;
478
479 ret = efi_add_protocol(mem_handle, &efi_guid_device_path,
480 file_path);
481 if (ret != EFI_SUCCESS)
482 goto out;
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000483 msg_path = file_path;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900484 } else {
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100485 file_path = efi_dp_append(bootefi_device_path,
486 bootefi_image_path);
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000487 msg_path = bootefi_image_path;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900488 }
489
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000490 log_info("Booting %pD\n", msg_path);
491
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100492 ret = EFI_CALL(efi_load_image(false, efi_root, file_path, source_buffer,
493 source_size, &handle));
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000494 if (ret != EFI_SUCCESS) {
495 log_err("Loading image failed\n");
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900496 goto out;
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000497 }
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200498
499 /* Transfer environment variable as load options */
500 ret = efi_env_set_load_options(handle, "bootargs", &load_options);
501 if (ret != EFI_SUCCESS)
502 goto out;
503
504 ret = do_bootefi_exec(handle, load_options);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900505
506out:
Heinrich Schuchardt6e35d3b2020-04-20 12:44:56 +0200507 efi_delete_handle(mem_handle);
508 efi_free_pool(file_path);
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100509 return ret;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900510}
511
Simon Glass93f25592018-11-25 20:14:37 -0700512#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900513static efi_status_t bootefi_run_prepare(const char *load_options_path,
514 struct efi_device_path *device_path,
515 struct efi_device_path *image_path,
516 struct efi_loaded_image_obj **image_objp,
517 struct efi_loaded_image **loaded_image_infop)
518{
519 efi_status_t ret;
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100520 u16 *load_options;
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900521
522 ret = efi_setup_loaded_image(device_path, image_path, image_objp,
523 loaded_image_infop);
524 if (ret != EFI_SUCCESS)
525 return ret;
526
527 /* Transfer environment variable as load options */
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200528 return efi_env_set_load_options((efi_handle_t)*image_objp,
529 load_options_path,
530 &load_options);
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900531}
532
Simon Glass93f25592018-11-25 20:14:37 -0700533/**
534 * bootefi_test_prepare() - prepare to run an EFI test
535 *
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100536 * Prepare to run a test as if it were provided by a loaded image.
Simon Glass93f25592018-11-25 20:14:37 -0700537 *
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100538 * @image_objp: pointer to be set to the loaded image handle
539 * @loaded_image_infop: pointer to be set to the loaded image protocol
540 * @path: dummy file path used to construct the device path
541 * set in the loaded image protocol
542 * @load_options_path: name of a U-Boot environment variable. Its value is
543 * set as load options in the loaded image protocol.
544 * Return: status code
Simon Glass93f25592018-11-25 20:14:37 -0700545 */
546static efi_status_t bootefi_test_prepare
547 (struct efi_loaded_image_obj **image_objp,
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100548 struct efi_loaded_image **loaded_image_infop, const char *path,
549 const char *load_options_path)
Simon Glass93f25592018-11-25 20:14:37 -0700550{
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100551 efi_status_t ret;
552
Simon Glass93f25592018-11-25 20:14:37 -0700553 /* Construct a dummy device path */
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100554 bootefi_device_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, 0, 0);
Simon Glass93f25592018-11-25 20:14:37 -0700555 if (!bootefi_device_path)
556 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100557
Simon Glass93f25592018-11-25 20:14:37 -0700558 bootefi_image_path = efi_dp_from_file(NULL, 0, path);
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100559 if (!bootefi_image_path) {
560 ret = EFI_OUT_OF_RESOURCES;
561 goto failure;
562 }
563
564 ret = bootefi_run_prepare(load_options_path, bootefi_device_path,
565 bootefi_image_path, image_objp,
566 loaded_image_infop);
567 if (ret == EFI_SUCCESS)
568 return ret;
Simon Glass93f25592018-11-25 20:14:37 -0700569
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100570 efi_free_pool(bootefi_image_path);
571 bootefi_image_path = NULL;
572failure:
573 efi_free_pool(bootefi_device_path);
574 bootefi_device_path = NULL;
575 return ret;
Simon Glass93f25592018-11-25 20:14:37 -0700576}
577
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900578/**
579 * bootefi_run_finish() - finish up after running an EFI test
580 *
581 * @loaded_image_info: Pointer to a struct which holds the loaded image info
582 * @image_obj: Pointer to a struct which holds the loaded image object
583 */
584static void bootefi_run_finish(struct efi_loaded_image_obj *image_obj,
585 struct efi_loaded_image *loaded_image_info)
586{
587 efi_restore_gd();
588 free(loaded_image_info->load_options);
589 efi_delete_handle(&image_obj->header);
590}
591
592/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200593 * do_efi_selftest() - execute EFI selftest
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900594 *
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900595 * Return: status code
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900596 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200597static int do_efi_selftest(void)
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900598{
599 struct efi_loaded_image_obj *image_obj;
600 struct efi_loaded_image *loaded_image_info;
601 efi_status_t ret;
602
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900603 ret = bootefi_test_prepare(&image_obj, &loaded_image_info,
604 "\\selftest", "efi_selftest");
605 if (ret != EFI_SUCCESS)
606 return CMD_RET_FAILURE;
607
608 /* Execute the test */
609 ret = EFI_CALL(efi_selftest(&image_obj->header, &systab));
610 bootefi_run_finish(image_obj, loaded_image_info);
611
612 return ret != EFI_SUCCESS;
613}
Simon Glass93f25592018-11-25 20:14:37 -0700614#endif /* CONFIG_CMD_BOOTEFI_SELFTEST */
615
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200616/**
617 * do_bootefi() - execute `bootefi` command
618 *
619 * @cmdtp: table entry describing command
620 * @flag: bitmap indicating how the command was invoked
621 * @argc: number of arguments
622 * @argv: command line arguments
623 * Return: status code
624 */
Simon Glassed38aef2020-05-10 11:40:03 -0600625static int do_bootefi(struct cmd_tbl *cmdtp, int flag, int argc,
626 char *const argv[])
Alexander Grafe2b04f22016-03-10 00:27:20 +0100627{
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200628 efi_status_t ret;
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100629 void *fdt;
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200630
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900631 if (argc < 2)
632 return CMD_RET_USAGE;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900633
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200634 /* Initialize EFI drivers */
635 ret = efi_init_obj_list();
636 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200637 log_err("Error: Cannot initialize UEFI sub-system, r = %lu\n",
638 ret & ~EFI_ERROR_MASK);
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200639 return CMD_RET_FAILURE;
640 }
641
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100642 if (argc > 2) {
643 uintptr_t fdt_addr;
644
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100645 fdt_addr = simple_strtoul(argv[2], NULL, 16);
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100646 fdt = map_sysmem(fdt_addr, 0);
647 } else {
648 fdt = EFI_FDT_USE_INTERNAL;
649 }
650 ret = efi_install_fdt(fdt);
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200651 if (ret == EFI_INVALID_PARAMETER)
652 return CMD_RET_USAGE;
653 else if (ret != EFI_SUCCESS)
654 return CMD_RET_FAILURE;
655
AKASHI Takahirocf819832019-04-19 12:22:33 +0900656 if (!strcmp(argv[1], "bootmgr"))
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200657 return do_efibootmgr();
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900658#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
659 else if (!strcmp(argv[1], "selftest"))
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200660 return do_efi_selftest();
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900661#endif
Simon Glassfac4ced2016-11-07 08:47:08 -0700662
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200663 return do_bootefi_image(argv[1]);
Alexander Grafe2b04f22016-03-10 00:27:20 +0100664}
665
666#ifdef CONFIG_SYS_LONGHELP
667static char bootefi_help_text[] =
Alexander Graf54c1e832016-04-14 16:07:53 +0200668 "<image address> [fdt address]\n"
669 " - boot EFI payload stored at address <image address>.\n"
670 " If specified, the device tree located at <fdt address> gets\n"
Simon Glassfac4ced2016-11-07 08:47:08 -0700671 " exposed as EFI configuration table.\n"
672#ifdef CONFIG_CMD_BOOTEFI_HELLO
Heinrich Schuchardtd33ae3e2017-09-15 10:06:11 +0200673 "bootefi hello\n"
674 " - boot a sample Hello World application stored within U-Boot\n"
675#endif
676#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
Heinrich Schuchardt44ab21b2018-03-03 15:29:03 +0100677 "bootefi selftest [fdt address]\n"
Heinrich Schuchardtd33ae3e2017-09-15 10:06:11 +0200678 " - boot an EFI selftest application stored within U-Boot\n"
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200679 " Use environment variable efi_selftest to select a single test.\n"
680 " Use 'setenv efi_selftest list' to enumerate all tests.\n"
Simon Glassfac4ced2016-11-07 08:47:08 -0700681#endif
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900682 "bootefi bootmgr [fdt address]\n"
Rob Clarkc84c1102017-09-13 18:05:38 -0400683 " - load and boot EFI payload based on BootOrder/BootXXXX variables.\n"
684 "\n"
685 " If specified, the device tree located at <fdt address> gets\n"
686 " exposed as EFI configuration table.\n";
Alexander Grafe2b04f22016-03-10 00:27:20 +0100687#endif
688
689U_BOOT_CMD(
Alexander Graf54c1e832016-04-14 16:07:53 +0200690 bootefi, 3, 0, do_bootefi,
Sergey Kubushyn268f19e2016-06-07 11:14:31 -0700691 "Boots an EFI payload from memory",
Alexander Grafe2b04f22016-03-10 00:27:20 +0100692 bootefi_help_text
693);
Alexander Graf8f19f262016-03-04 01:10:14 +0100694
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +0200695/**
696 * efi_set_bootdev() - set boot device
697 *
698 * This function is called when a file is loaded, e.g. via the 'load' command.
699 * We use the path to this file to inform the UEFI binary about the boot device.
700 *
701 * @dev: device, e.g. "MMC"
702 * @devnr: number of the device, e.g. "1:2"
703 * @path: path to file loaded
704 */
Rob Clarkf8db9222017-09-13 18:05:33 -0400705void efi_set_bootdev(const char *dev, const char *devnr, const char *path)
706{
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900707 struct efi_device_path *device, *image;
708 efi_status_t ret;
Alexander Graf34118e72016-08-05 14:49:53 +0200709
Heinrich Schuchardt761ecc82018-09-16 07:20:21 +0200710 /* efi_set_bootdev is typically called repeatedly, recover memory */
711 efi_free_pool(bootefi_device_path);
712 efi_free_pool(bootefi_image_path);
Heinrich Schuchardt761ecc82018-09-16 07:20:21 +0200713
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900714 ret = efi_dp_from_name(dev, devnr, path, &device, &image);
715 if (ret == EFI_SUCCESS) {
716 bootefi_device_path = device;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900717 if (image) {
718 /* FIXME: image should not contain device */
719 struct efi_device_path *image_tmp = image;
720
721 efi_dp_split_file_path(image, &device, &image);
722 efi_free_pool(image_tmp);
723 }
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900724 bootefi_image_path = image;
Alexander Graf45e437d2016-07-21 01:44:46 +0200725 } else {
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900726 bootefi_device_path = NULL;
727 bootefi_image_path = NULL;
Alexander Graf45e437d2016-07-21 01:44:46 +0200728 }
Alexander Graf8f19f262016-03-04 01:10:14 +0100729}