blob: 5523405e13da05c139d3771ad1ce86ddf2f75503 [file] [log] [blame]
Tom Rini70df9d62018-05-07 17:02:21 -04001// SPDX-License-Identifier: GPL-2.0+
Alexander Grafe2b04f22016-03-10 00:27:20 +01002/*
3 * EFI application loader
4 *
5 * Copyright (c) 2016 Alexander Graf
Alexander Grafe2b04f22016-03-10 00:27:20 +01006 */
7
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +02008#define LOG_CATEGORY LOGC_EFI
9
Alexander Grafe2b04f22016-03-10 00:27:20 +010010#include <common.h>
Heinrich Schuchardtaa0b11b2019-01-08 18:13:06 +010011#include <charset.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010012#include <command.h>
Simon Glass11c89f32017-05-17 17:18:03 -060013#include <dm.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010014#include <efi_loader.h>
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020015#include <efi_selftest.h>
Simon Glass0af6e2d2019-08-01 09:46:52 -060016#include <env.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010017#include <errno.h>
Simon Glass2dc9c342020-05-10 11:40:01 -060018#include <image.h>
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +020019#include <log.h>
Simon Glass9bc15642020-02-03 07:36:16 -070020#include <malloc.h>
Masahiro Yamada75f82d02018-03-05 01:20:11 +090021#include <linux/libfdt.h>
22#include <linux/libfdt_env.h>
Alexander Grafa2414512018-06-18 17:22:58 +020023#include <mapmem.h>
Alexander Graffdbae012016-04-11 23:51:01 +020024#include <memalign.h>
Simon Glassc2194bf2016-09-25 15:27:32 -060025#include <asm-generic/sections.h>
26#include <linux/linkage.h>
Alexander Graf2ff5cc32016-04-11 16:55:26 +020027
28DECLARE_GLOBAL_DATA_PTR;
Alexander Grafe2b04f22016-03-10 00:27:20 +010029
Rob Clarkf8db9222017-09-13 18:05:33 -040030static struct efi_device_path *bootefi_image_path;
31static struct efi_device_path *bootefi_device_path;
Alexander Grafe2b04f22016-03-10 00:27:20 +010032
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +020033/**
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020034 * efi_env_set_load_options() - set load options from environment variable
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020035 *
Heinrich Schuchardte6263952020-01-03 22:53:42 +010036 * @handle: the image handle
37 * @env_var: name of the environment variable
38 * @load_options: pointer to load options (output)
39 * Return: status code
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020040 */
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020041static efi_status_t efi_env_set_load_options(efi_handle_t handle,
42 const char *env_var,
43 u16 **load_options)
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020044{
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020045 const char *env = env_get(env_var);
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020046 size_t size;
Heinrich Schuchardtde527802018-08-31 21:31:33 +020047 u16 *pos;
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +090048 efi_status_t ret;
49
Heinrich Schuchardte6263952020-01-03 22:53:42 +010050 *load_options = NULL;
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020051 if (!env)
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020052 return EFI_SUCCESS;
53 size = sizeof(u16) * (utf8_utf16_strlen(env) + 1);
54 pos = calloc(size, 1);
55 if (!pos)
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +090056 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardte6263952020-01-03 22:53:42 +010057 *load_options = pos;
Heinrich Schuchardtde527802018-08-31 21:31:33 +020058 utf8_utf16_strcpy(&pos, env);
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020059 ret = efi_set_load_options(handle, size, *load_options);
60 if (ret != EFI_SUCCESS) {
61 free(*load_options);
62 *load_options = NULL;
63 }
64 return ret;
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020065}
66
Heinrich Schuchardt4420a332019-04-20 13:33:55 +020067#if !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
68
Simon Glass5d618df2018-08-08 03:54:30 -060069/**
70 * copy_fdt() - Copy the device tree to a new location available to EFI
71 *
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +010072 * The FDT is copied to a suitable location within the EFI memory map.
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +010073 * Additional 12 KiB are added to the space in case the device tree needs to be
Simon Glass5d618df2018-08-08 03:54:30 -060074 * expanded later with fdt_open_into().
75 *
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +010076 * @fdtp: On entry a pointer to the flattened device tree.
77 * On exit a pointer to the copy of the flattened device tree.
Heinrich Schuchardt96af56e2018-11-12 18:55:22 +010078 * FDT start
79 * Return: status code
Simon Glass5d618df2018-08-08 03:54:30 -060080 */
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +010081static efi_status_t copy_fdt(void **fdtp)
Alexander Graf2ff5cc32016-04-11 16:55:26 +020082{
Alexander Graffdbae012016-04-11 23:51:01 +020083 unsigned long fdt_ram_start = -1L, fdt_pages;
Simon Glass5d618df2018-08-08 03:54:30 -060084 efi_status_t ret = 0;
85 void *fdt, *new_fdt;
Alexander Graffdbae012016-04-11 23:51:01 +020086 u64 new_fdt_addr;
Simon Glass5d618df2018-08-08 03:54:30 -060087 uint fdt_size;
Alexander Graffdbae012016-04-11 23:51:01 +020088 int i;
Alexander Graf2ff5cc32016-04-11 16:55:26 +020089
Simon Glass5d618df2018-08-08 03:54:30 -060090 for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) {
91 u64 ram_start = gd->bd->bi_dram[i].start;
92 u64 ram_size = gd->bd->bi_dram[i].size;
Alexander Graf2ff5cc32016-04-11 16:55:26 +020093
Alexander Graffdbae012016-04-11 23:51:01 +020094 if (!ram_size)
95 continue;
96
97 if (ram_start < fdt_ram_start)
98 fdt_ram_start = ram_start;
99 }
100
Simon Glass56bbcc12018-06-18 08:08:25 -0600101 /*
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100102 * Give us at least 12 KiB of breathing room in case the device tree
103 * needs to be expanded later.
Simon Glass56bbcc12018-06-18 08:08:25 -0600104 */
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100105 fdt = *fdtp;
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100106 fdt_pages = efi_size_in_pages(fdt_totalsize(fdt) + 0x3000);
107 fdt_size = fdt_pages << EFI_PAGE_SHIFT;
Alexander Graffdbae012016-04-11 23:51:01 +0200108
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100109 /*
110 * Safe fdt location is at 127 MiB.
111 * On the sandbox convert from the sandbox address space.
112 */
113 new_fdt_addr = (uintptr_t)map_sysmem(fdt_ram_start + 0x7f00000 +
114 fdt_size, 0);
Simon Glass5d618df2018-08-08 03:54:30 -0600115 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardte00764b2020-05-06 20:32:31 +0200116 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass5d618df2018-08-08 03:54:30 -0600117 &new_fdt_addr);
118 if (ret != EFI_SUCCESS) {
Alexander Graffdbae012016-04-11 23:51:01 +0200119 /* If we can't put it there, put it somewhere */
xypron.glpk@gmx.def6b99122017-08-11 21:19:25 +0200120 new_fdt_addr = (ulong)memalign(EFI_PAGE_SIZE, fdt_size);
Simon Glass5d618df2018-08-08 03:54:30 -0600121 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardte00764b2020-05-06 20:32:31 +0200122 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass5d618df2018-08-08 03:54:30 -0600123 &new_fdt_addr);
124 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200125 log_err("ERROR: Failed to reserve space for FDT\n");
Simon Glass5d618df2018-08-08 03:54:30 -0600126 goto done;
Alexander Graf9b9b7162017-07-03 13:32:35 +0200127 }
Alexander Graffdbae012016-04-11 23:51:01 +0200128 }
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100129 new_fdt = (void *)(uintptr_t)new_fdt_addr;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200130 memcpy(new_fdt, fdt, fdt_totalsize(fdt));
131 fdt_set_totalsize(new_fdt, fdt_size);
132
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100133 *fdtp = (void *)(uintptr_t)new_fdt_addr;
Simon Glass5d618df2018-08-08 03:54:30 -0600134done:
135 return ret;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200136}
137
Atish Patra8e286f62020-03-13 17:11:30 -0700138static void efi_reserve_memory(u64 addr, u64 size)
139{
Atish Patra8e286f62020-03-13 17:11:30 -0700140 /* Convert from sandbox address space. */
141 addr = (uintptr_t)map_sysmem(addr, 0);
Michael Walle282d3862020-05-17 12:29:19 +0200142 if (efi_add_memory_map(addr, size,
143 EFI_RESERVED_MEMORY_TYPE) != EFI_SUCCESS)
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200144 log_err("Reserved memory mapping failed addr %llx size %llx\n",
145 addr, size);
Atish Patra8e286f62020-03-13 17:11:30 -0700146}
147
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +0200148/**
Simon Glass54b9b6e2018-06-18 08:08:28 -0600149 * efi_carve_out_dt_rsv() - Carve out DT reserved memory ranges
150 *
151 * The mem_rsv entries of the FDT are added to the memory map. Any failures are
152 * ignored because this is not critical and we would rather continue to try to
153 * boot.
154 *
155 * @fdt: Pointer to device tree
156 */
157static void efi_carve_out_dt_rsv(void *fdt)
Alexander Graf22c88bf2018-04-06 09:40:51 +0200158{
159 int nr_rsv, i;
Atish Patra8e286f62020-03-13 17:11:30 -0700160 u64 addr, size;
161 int nodeoffset, subnode;
Alexander Graf22c88bf2018-04-06 09:40:51 +0200162
163 nr_rsv = fdt_num_mem_rsv(fdt);
164
165 /* Look for an existing entry and add it to the efi mem map. */
166 for (i = 0; i < nr_rsv; i++) {
167 if (fdt_get_mem_rsv(fdt, i, &addr, &size) != 0)
168 continue;
Atish Patra8e286f62020-03-13 17:11:30 -0700169 efi_reserve_memory(addr, size);
170 }
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100171
Atish Patra8e286f62020-03-13 17:11:30 -0700172 /* process reserved-memory */
173 nodeoffset = fdt_subnode_offset(fdt, 0, "reserved-memory");
174 if (nodeoffset >= 0) {
175 subnode = fdt_first_subnode(fdt, nodeoffset);
176 while (subnode >= 0) {
Bin Mengeb0f48f2020-06-22 23:50:50 -0700177 fdt_addr_t fdt_addr;
178 fdt_size_t fdt_size;
Atish Patra0e52e942020-06-18 18:51:50 -0700179
Atish Patra8e286f62020-03-13 17:11:30 -0700180 /* check if this subnode has a reg property */
Atish Patra0e52e942020-06-18 18:51:50 -0700181 fdt_addr = fdtdec_get_addr_size_auto_parent(
182 fdt, nodeoffset, subnode,
183 "reg", 0, &fdt_size, false);
Atish Patra8e286f62020-03-13 17:11:30 -0700184 /*
185 * The /reserved-memory node may have children with
186 * a size instead of a reg property.
187 */
Heinrich Schuchardt8bec61e2020-06-30 14:12:43 +0200188 if (fdt_addr != FDT_ADDR_T_NONE &&
Heinrich Schuchardte93d5802020-03-24 07:37:52 +0100189 fdtdec_get_is_enabled(fdt, subnode))
Atish Patra0e52e942020-06-18 18:51:50 -0700190 efi_reserve_memory(fdt_addr, fdt_size);
Atish Patra8e286f62020-03-13 17:11:30 -0700191 subnode = fdt_next_subnode(fdt, subnode);
192 }
Alexander Graf22c88bf2018-04-06 09:40:51 +0200193 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200194}
195
196/**
197 * get_config_table() - get configuration table
198 *
199 * @guid: GUID of the configuration table
200 * Return: pointer to configuration table or NULL
201 */
202static void *get_config_table(const efi_guid_t *guid)
203{
204 size_t i;
205
206 for (i = 0; i < systab.nr_tables; i++) {
207 if (!guidcmp(guid, &systab.tables[i].guid))
208 return systab.tables[i].table;
209 }
210 return NULL;
Alexander Graf22c88bf2018-04-06 09:40:51 +0200211}
212
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200213#endif /* !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) */
214
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900215/**
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100216 * efi_install_fdt() - install device tree
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200217 *
Heinrich Schuchardtb112ac22020-02-07 22:10:49 +0100218 * If fdt is not EFI_FDT_USE_INTERNAL, the device tree located at that memory
219 * address will will be installed as configuration table, otherwise the device
220 * tree located at the address indicated by environment variable fdt_addr or as
221 * fallback fdtcontroladdr will be used.
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200222 *
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100223 * On architectures using ACPI tables device trees shall not be installed as
224 * configuration table.
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200225 *
Heinrich Schuchardtb112ac22020-02-07 22:10:49 +0100226 * @fdt: address of device tree or EFI_FDT_USE_INTERNAL to use the
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100227 * the hardware device tree as indicated by environment variable
228 * fdt_addr or as fallback the internal device tree as indicated by
229 * the environment variable fdtcontroladdr
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900230 * Return: status code
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900231 */
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100232efi_status_t efi_install_fdt(void *fdt)
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900233{
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200234 /*
235 * The EBBR spec requires that we have either an FDT or an ACPI table
236 * but not both.
237 */
238#if CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100239 if (fdt) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200240 log_err("ERROR: can't have ACPI table and device tree.\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200241 return EFI_LOAD_ERROR;
242 }
243#else
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900244 bootm_headers_t img = { 0 };
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900245 efi_status_t ret;
246
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100247 if (fdt == EFI_FDT_USE_INTERNAL) {
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100248 const char *fdt_opt;
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100249 uintptr_t fdt_addr;
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100250
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200251 /* Look for device tree that is already installed */
252 if (get_config_table(&efi_guid_fdt))
253 return EFI_SUCCESS;
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100254 /* Check if there is a hardware device tree */
255 fdt_opt = env_get("fdt_addr");
256 /* Use our own device tree as fallback */
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200257 if (!fdt_opt) {
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100258 fdt_opt = env_get("fdtcontroladdr");
259 if (!fdt_opt) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200260 log_err("ERROR: need device tree\n");
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100261 return EFI_NOT_FOUND;
262 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200263 }
264 fdt_addr = simple_strtoul(fdt_opt, NULL, 16);
265 if (!fdt_addr) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200266 log_err("ERROR: invalid $fdt_addr or $fdtcontroladdr\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200267 return EFI_LOAD_ERROR;
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900268 }
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100269 fdt = map_sysmem(fdt_addr, 0);
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200270 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900271
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200272 /* Install device tree */
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200273 if (fdt_check_header(fdt)) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200274 log_err("ERROR: invalid device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200275 return EFI_LOAD_ERROR;
276 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900277
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200278 /* Prepare device tree for payload */
279 ret = copy_fdt(&fdt);
280 if (ret) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200281 log_err("ERROR: out of memory\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200282 return EFI_OUT_OF_RESOURCES;
283 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900284
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200285 if (image_setup_libfdt(&img, fdt, 0, NULL)) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200286 log_err("ERROR: failed to process device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200287 return EFI_LOAD_ERROR;
288 }
289
Heinrich Schuchardt74811c82020-03-14 10:59:34 +0100290 /* Create memory reservations as indicated by the device tree */
291 efi_carve_out_dt_rsv(fdt);
292
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200293 /* Install device tree as UEFI table */
294 ret = efi_install_configuration_table(&efi_guid_fdt, fdt);
295 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200296 log_err("ERROR: failed to install device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200297 return ret;
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900298 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200299#endif /* GENERATE_ACPI_TABLE */
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900300
301 return EFI_SUCCESS;
302}
303
Simon Glass4d77ee62018-11-25 20:14:39 -0700304/**
Heinrich Schuchardt3c3a7352018-09-23 17:21:51 +0200305 * do_bootefi_exec() - execute EFI binary
306 *
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900307 * @handle: handle of loaded image
Heinrich Schuchardt3c3a7352018-09-23 17:21:51 +0200308 * Return: status code
309 *
310 * Load the EFI binary into a newly assigned memory unwinding the relocation
311 * information, install the loaded image protocol, and call the binary.
Alexander Grafe2b04f22016-03-10 00:27:20 +0100312 */
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900313static efi_status_t do_bootefi_exec(efi_handle_t handle)
Alexander Grafe2b04f22016-03-10 00:27:20 +0100314{
Heinrich Schuchardt4b055a22018-03-03 15:29:01 +0100315 efi_status_t ret;
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200316 efi_uintn_t exit_data_size = 0;
317 u16 *exit_data = NULL;
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100318 u16 *load_options;
Rob Clarkf8db9222017-09-13 18:05:33 -0400319
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900320 /* Transfer environment variable as load options */
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200321 ret = efi_env_set_load_options(handle, "bootargs", &load_options);
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900322 if (ret != EFI_SUCCESS)
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900323 return ret;
Rob Clark18ceba72017-10-10 08:23:06 -0400324
Alexander Grafe2b04f22016-03-10 00:27:20 +0100325 /* Call our payload! */
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200326 ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data));
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200327 if (ret != EFI_SUCCESS) {
328 log_err("## Application failed, r = %lu\n",
329 ret & ~EFI_ERROR_MASK);
330 if (exit_data) {
331 log_err("## %ls\n", exit_data);
332 efi_free_pool(exit_data);
333 }
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200334 }
Rob Clarkf8db9222017-09-13 18:05:33 -0400335
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900336 efi_restore_gd();
Simon Glass4d77ee62018-11-25 20:14:39 -0700337
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100338 free(load_options);
Rob Clarkf8db9222017-09-13 18:05:33 -0400339
340 return ret;
Alexander Grafe2b04f22016-03-10 00:27:20 +0100341}
342
AKASHI Takahirocf819832019-04-19 12:22:33 +0900343/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200344 * do_efibootmgr() - execute EFI boot manager
AKASHI Takahirocf819832019-04-19 12:22:33 +0900345 *
AKASHI Takahirocf819832019-04-19 12:22:33 +0900346 * Return: status code
AKASHI Takahirocf819832019-04-19 12:22:33 +0900347 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200348static int do_efibootmgr(void)
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900349{
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900350 efi_handle_t handle;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900351 efi_status_t ret;
352
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900353 ret = efi_bootmgr_load(&handle);
354 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200355 log_notice("EFI boot manager: Cannot load any image\n");
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900356 return CMD_RET_FAILURE;
357 }
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900358
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900359 ret = do_bootefi_exec(handle);
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900360
AKASHI Takahirocf819832019-04-19 12:22:33 +0900361 if (ret != EFI_SUCCESS)
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900362 return CMD_RET_FAILURE;
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900363
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900364 return CMD_RET_SUCCESS;
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900365}
366
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +0200367/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200368 * do_bootefi_image() - execute EFI binary
369 *
370 * Set up memory image for the binary to be loaded, prepare device path, and
371 * then call do_bootefi_exec() to execute it.
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900372 *
373 * @image_opt: string of image start address
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900374 * Return: status code
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900375 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200376static int do_bootefi_image(const char *image_opt)
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900377{
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900378 void *image_buf;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900379 unsigned long addr, size;
380 const char *size_str;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900381 efi_status_t ret;
382
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900383#ifdef CONFIG_CMD_BOOTEFI_HELLO
384 if (!strcmp(image_opt, "hello")) {
385 char *saddr;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900386
387 saddr = env_get("loadaddr");
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900388 size = __efi_helloworld_end - __efi_helloworld_begin;
389
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900390 if (saddr)
391 addr = simple_strtoul(saddr, NULL, 16);
392 else
393 addr = CONFIG_SYS_LOAD_ADDR;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900394
395 image_buf = map_sysmem(addr, size);
396 memcpy(image_buf, __efi_helloworld_begin, size);
397
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100398 efi_free_pool(bootefi_device_path);
399 efi_free_pool(bootefi_image_path);
400 bootefi_device_path = NULL;
401 bootefi_image_path = NULL;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900402 } else
403#endif
404 {
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900405 size_str = env_get("filesize");
406 if (size_str)
407 size = simple_strtoul(size_str, NULL, 16);
408 else
409 size = 0;
410
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900411 addr = simple_strtoul(image_opt, NULL, 16);
412 /* Check that a numeric value was passed */
413 if (!addr && *image_opt != '0')
414 return CMD_RET_USAGE;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900415
416 image_buf = map_sysmem(addr, size);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900417 }
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100418 ret = efi_run_image(image_buf, size);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900419
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100420 if (ret != EFI_SUCCESS)
421 return CMD_RET_FAILURE;
422
423 return CMD_RET_SUCCESS;
424}
425
426/**
427 * efi_run_image() - run loaded UEFI image
428 *
429 * @source_buffer: memory address of the UEFI image
430 * @source_size: size of the UEFI image
431 * Return: status code
432 */
433efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size)
434{
435 efi_handle_t mem_handle = NULL, handle;
436 struct efi_device_path *file_path = NULL;
437 efi_status_t ret;
438
439 if (!bootefi_device_path || !bootefi_image_path) {
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900440 /*
441 * Special case for efi payload not loaded from disk,
442 * such as 'bootefi hello' or for example payload
443 * loaded directly into memory via JTAG, etc:
444 */
445 file_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE,
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100446 (uintptr_t)source_buffer,
447 source_size);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900448 /*
449 * Make sure that device for device_path exist
450 * in load_image(). Otherwise, shell and grub will fail.
451 */
452 ret = efi_create_handle(&mem_handle);
453 if (ret != EFI_SUCCESS)
454 goto out;
455
456 ret = efi_add_protocol(mem_handle, &efi_guid_device_path,
457 file_path);
458 if (ret != EFI_SUCCESS)
459 goto out;
460 } else {
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100461 file_path = efi_dp_append(bootefi_device_path,
462 bootefi_image_path);
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900463 }
464
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100465 ret = EFI_CALL(efi_load_image(false, efi_root, file_path, source_buffer,
466 source_size, &handle));
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900467 if (ret != EFI_SUCCESS)
468 goto out;
469
470 ret = do_bootefi_exec(handle);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900471
472out:
Heinrich Schuchardt6e35d3b2020-04-20 12:44:56 +0200473 efi_delete_handle(mem_handle);
474 efi_free_pool(file_path);
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100475 return ret;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900476}
477
Simon Glass93f25592018-11-25 20:14:37 -0700478#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900479static efi_status_t bootefi_run_prepare(const char *load_options_path,
480 struct efi_device_path *device_path,
481 struct efi_device_path *image_path,
482 struct efi_loaded_image_obj **image_objp,
483 struct efi_loaded_image **loaded_image_infop)
484{
485 efi_status_t ret;
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100486 u16 *load_options;
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900487
488 ret = efi_setup_loaded_image(device_path, image_path, image_objp,
489 loaded_image_infop);
490 if (ret != EFI_SUCCESS)
491 return ret;
492
493 /* Transfer environment variable as load options */
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200494 return efi_env_set_load_options((efi_handle_t)*image_objp,
495 load_options_path,
496 &load_options);
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900497}
498
Simon Glass93f25592018-11-25 20:14:37 -0700499/**
500 * bootefi_test_prepare() - prepare to run an EFI test
501 *
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100502 * Prepare to run a test as if it were provided by a loaded image.
Simon Glass93f25592018-11-25 20:14:37 -0700503 *
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100504 * @image_objp: pointer to be set to the loaded image handle
505 * @loaded_image_infop: pointer to be set to the loaded image protocol
506 * @path: dummy file path used to construct the device path
507 * set in the loaded image protocol
508 * @load_options_path: name of a U-Boot environment variable. Its value is
509 * set as load options in the loaded image protocol.
510 * Return: status code
Simon Glass93f25592018-11-25 20:14:37 -0700511 */
512static efi_status_t bootefi_test_prepare
513 (struct efi_loaded_image_obj **image_objp,
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100514 struct efi_loaded_image **loaded_image_infop, const char *path,
515 const char *load_options_path)
Simon Glass93f25592018-11-25 20:14:37 -0700516{
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100517 efi_status_t ret;
518
Simon Glass93f25592018-11-25 20:14:37 -0700519 /* Construct a dummy device path */
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100520 bootefi_device_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, 0, 0);
Simon Glass93f25592018-11-25 20:14:37 -0700521 if (!bootefi_device_path)
522 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100523
Simon Glass93f25592018-11-25 20:14:37 -0700524 bootefi_image_path = efi_dp_from_file(NULL, 0, path);
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100525 if (!bootefi_image_path) {
526 ret = EFI_OUT_OF_RESOURCES;
527 goto failure;
528 }
529
530 ret = bootefi_run_prepare(load_options_path, bootefi_device_path,
531 bootefi_image_path, image_objp,
532 loaded_image_infop);
533 if (ret == EFI_SUCCESS)
534 return ret;
Simon Glass93f25592018-11-25 20:14:37 -0700535
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100536 efi_free_pool(bootefi_image_path);
537 bootefi_image_path = NULL;
538failure:
539 efi_free_pool(bootefi_device_path);
540 bootefi_device_path = NULL;
541 return ret;
Simon Glass93f25592018-11-25 20:14:37 -0700542}
543
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900544/**
545 * bootefi_run_finish() - finish up after running an EFI test
546 *
547 * @loaded_image_info: Pointer to a struct which holds the loaded image info
548 * @image_obj: Pointer to a struct which holds the loaded image object
549 */
550static void bootefi_run_finish(struct efi_loaded_image_obj *image_obj,
551 struct efi_loaded_image *loaded_image_info)
552{
553 efi_restore_gd();
554 free(loaded_image_info->load_options);
555 efi_delete_handle(&image_obj->header);
556}
557
558/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200559 * do_efi_selftest() - execute EFI selftest
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900560 *
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900561 * Return: status code
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900562 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200563static int do_efi_selftest(void)
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900564{
565 struct efi_loaded_image_obj *image_obj;
566 struct efi_loaded_image *loaded_image_info;
567 efi_status_t ret;
568
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900569 ret = bootefi_test_prepare(&image_obj, &loaded_image_info,
570 "\\selftest", "efi_selftest");
571 if (ret != EFI_SUCCESS)
572 return CMD_RET_FAILURE;
573
574 /* Execute the test */
575 ret = EFI_CALL(efi_selftest(&image_obj->header, &systab));
576 bootefi_run_finish(image_obj, loaded_image_info);
577
578 return ret != EFI_SUCCESS;
579}
Simon Glass93f25592018-11-25 20:14:37 -0700580#endif /* CONFIG_CMD_BOOTEFI_SELFTEST */
581
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200582/**
583 * do_bootefi() - execute `bootefi` command
584 *
585 * @cmdtp: table entry describing command
586 * @flag: bitmap indicating how the command was invoked
587 * @argc: number of arguments
588 * @argv: command line arguments
589 * Return: status code
590 */
Simon Glassed38aef2020-05-10 11:40:03 -0600591static int do_bootefi(struct cmd_tbl *cmdtp, int flag, int argc,
592 char *const argv[])
Alexander Grafe2b04f22016-03-10 00:27:20 +0100593{
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200594 efi_status_t ret;
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100595 void *fdt;
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200596
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900597 if (argc < 2)
598 return CMD_RET_USAGE;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900599
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200600 /* Initialize EFI drivers */
601 ret = efi_init_obj_list();
602 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200603 log_err("Error: Cannot initialize UEFI sub-system, r = %lu\n",
604 ret & ~EFI_ERROR_MASK);
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200605 return CMD_RET_FAILURE;
606 }
607
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100608 if (argc > 2) {
609 uintptr_t fdt_addr;
610
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100611 fdt_addr = simple_strtoul(argv[2], NULL, 16);
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100612 fdt = map_sysmem(fdt_addr, 0);
613 } else {
614 fdt = EFI_FDT_USE_INTERNAL;
615 }
616 ret = efi_install_fdt(fdt);
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200617 if (ret == EFI_INVALID_PARAMETER)
618 return CMD_RET_USAGE;
619 else if (ret != EFI_SUCCESS)
620 return CMD_RET_FAILURE;
621
AKASHI Takahirocf819832019-04-19 12:22:33 +0900622 if (!strcmp(argv[1], "bootmgr"))
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200623 return do_efibootmgr();
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900624#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
625 else if (!strcmp(argv[1], "selftest"))
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200626 return do_efi_selftest();
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900627#endif
Simon Glassfac4ced2016-11-07 08:47:08 -0700628
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200629 return do_bootefi_image(argv[1]);
Alexander Grafe2b04f22016-03-10 00:27:20 +0100630}
631
632#ifdef CONFIG_SYS_LONGHELP
633static char bootefi_help_text[] =
Alexander Graf54c1e832016-04-14 16:07:53 +0200634 "<image address> [fdt address]\n"
635 " - boot EFI payload stored at address <image address>.\n"
636 " If specified, the device tree located at <fdt address> gets\n"
Simon Glassfac4ced2016-11-07 08:47:08 -0700637 " exposed as EFI configuration table.\n"
638#ifdef CONFIG_CMD_BOOTEFI_HELLO
Heinrich Schuchardtd33ae3e2017-09-15 10:06:11 +0200639 "bootefi hello\n"
640 " - boot a sample Hello World application stored within U-Boot\n"
641#endif
642#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
Heinrich Schuchardt44ab21b2018-03-03 15:29:03 +0100643 "bootefi selftest [fdt address]\n"
Heinrich Schuchardtd33ae3e2017-09-15 10:06:11 +0200644 " - boot an EFI selftest application stored within U-Boot\n"
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200645 " Use environment variable efi_selftest to select a single test.\n"
646 " Use 'setenv efi_selftest list' to enumerate all tests.\n"
Simon Glassfac4ced2016-11-07 08:47:08 -0700647#endif
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900648 "bootefi bootmgr [fdt address]\n"
Rob Clarkc84c1102017-09-13 18:05:38 -0400649 " - load and boot EFI payload based on BootOrder/BootXXXX variables.\n"
650 "\n"
651 " If specified, the device tree located at <fdt address> gets\n"
652 " exposed as EFI configuration table.\n";
Alexander Grafe2b04f22016-03-10 00:27:20 +0100653#endif
654
655U_BOOT_CMD(
Alexander Graf54c1e832016-04-14 16:07:53 +0200656 bootefi, 3, 0, do_bootefi,
Sergey Kubushyn268f19e2016-06-07 11:14:31 -0700657 "Boots an EFI payload from memory",
Alexander Grafe2b04f22016-03-10 00:27:20 +0100658 bootefi_help_text
659);
Alexander Graf8f19f262016-03-04 01:10:14 +0100660
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +0200661/**
662 * efi_set_bootdev() - set boot device
663 *
664 * This function is called when a file is loaded, e.g. via the 'load' command.
665 * We use the path to this file to inform the UEFI binary about the boot device.
666 *
667 * @dev: device, e.g. "MMC"
668 * @devnr: number of the device, e.g. "1:2"
669 * @path: path to file loaded
670 */
Rob Clarkf8db9222017-09-13 18:05:33 -0400671void efi_set_bootdev(const char *dev, const char *devnr, const char *path)
672{
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900673 struct efi_device_path *device, *image;
674 efi_status_t ret;
Alexander Graf34118e72016-08-05 14:49:53 +0200675
Heinrich Schuchardt761ecc82018-09-16 07:20:21 +0200676 /* efi_set_bootdev is typically called repeatedly, recover memory */
677 efi_free_pool(bootefi_device_path);
678 efi_free_pool(bootefi_image_path);
Heinrich Schuchardt761ecc82018-09-16 07:20:21 +0200679
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900680 ret = efi_dp_from_name(dev, devnr, path, &device, &image);
681 if (ret == EFI_SUCCESS) {
682 bootefi_device_path = device;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900683 if (image) {
684 /* FIXME: image should not contain device */
685 struct efi_device_path *image_tmp = image;
686
687 efi_dp_split_file_path(image, &device, &image);
688 efi_free_pool(image_tmp);
689 }
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900690 bootefi_image_path = image;
Alexander Graf45e437d2016-07-21 01:44:46 +0200691 } else {
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900692 bootefi_device_path = NULL;
693 bootefi_image_path = NULL;
Alexander Graf45e437d2016-07-21 01:44:46 +0200694 }
Alexander Graf8f19f262016-03-04 01:10:14 +0100695}