blob: fbfed54e8571f66cbf413069fb35d13912b50fa9 [file] [log] [blame]
Tom Rini70df9d62018-05-07 17:02:21 -04001// SPDX-License-Identifier: GPL-2.0+
Alexander Grafe2b04f22016-03-10 00:27:20 +01002/*
3 * EFI application loader
4 *
5 * Copyright (c) 2016 Alexander Graf
Alexander Grafe2b04f22016-03-10 00:27:20 +01006 */
7
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +02008#define LOG_CATEGORY LOGC_EFI
9
Alexander Grafe2b04f22016-03-10 00:27:20 +010010#include <common.h>
Heinrich Schuchardtaa0b11b2019-01-08 18:13:06 +010011#include <charset.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010012#include <command.h>
Simon Glass11c89f32017-05-17 17:18:03 -060013#include <dm.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010014#include <efi_loader.h>
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020015#include <efi_selftest.h>
Simon Glass0af6e2d2019-08-01 09:46:52 -060016#include <env.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010017#include <errno.h>
Simon Glass2dc9c342020-05-10 11:40:01 -060018#include <image.h>
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +020019#include <log.h>
Simon Glass9bc15642020-02-03 07:36:16 -070020#include <malloc.h>
Masahiro Yamada75f82d02018-03-05 01:20:11 +090021#include <linux/libfdt.h>
22#include <linux/libfdt_env.h>
Alexander Grafa2414512018-06-18 17:22:58 +020023#include <mapmem.h>
Alexander Graffdbae012016-04-11 23:51:01 +020024#include <memalign.h>
Simon Glassc2194bf2016-09-25 15:27:32 -060025#include <asm-generic/sections.h>
26#include <linux/linkage.h>
Alexander Graf2ff5cc32016-04-11 16:55:26 +020027
28DECLARE_GLOBAL_DATA_PTR;
Alexander Grafe2b04f22016-03-10 00:27:20 +010029
Rob Clarkf8db9222017-09-13 18:05:33 -040030static struct efi_device_path *bootefi_image_path;
31static struct efi_device_path *bootefi_device_path;
Alexander Grafe2b04f22016-03-10 00:27:20 +010032
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +020033/**
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020034 * efi_env_set_load_options() - set load options from environment variable
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020035 *
Heinrich Schuchardte6263952020-01-03 22:53:42 +010036 * @handle: the image handle
37 * @env_var: name of the environment variable
38 * @load_options: pointer to load options (output)
39 * Return: status code
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020040 */
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020041static efi_status_t efi_env_set_load_options(efi_handle_t handle,
42 const char *env_var,
43 u16 **load_options)
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020044{
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020045 const char *env = env_get(env_var);
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020046 size_t size;
Heinrich Schuchardtde527802018-08-31 21:31:33 +020047 u16 *pos;
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +090048 efi_status_t ret;
49
Heinrich Schuchardte6263952020-01-03 22:53:42 +010050 *load_options = NULL;
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020051 if (!env)
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020052 return EFI_SUCCESS;
53 size = sizeof(u16) * (utf8_utf16_strlen(env) + 1);
54 pos = calloc(size, 1);
55 if (!pos)
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +090056 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardte6263952020-01-03 22:53:42 +010057 *load_options = pos;
Heinrich Schuchardtde527802018-08-31 21:31:33 +020058 utf8_utf16_strcpy(&pos, env);
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020059 ret = efi_set_load_options(handle, size, *load_options);
60 if (ret != EFI_SUCCESS) {
61 free(*load_options);
62 *load_options = NULL;
63 }
64 return ret;
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020065}
66
Heinrich Schuchardt4420a332019-04-20 13:33:55 +020067#if !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
68
Simon Glass5d618df2018-08-08 03:54:30 -060069/**
70 * copy_fdt() - Copy the device tree to a new location available to EFI
71 *
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +010072 * The FDT is copied to a suitable location within the EFI memory map.
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +010073 * Additional 12 KiB are added to the space in case the device tree needs to be
Simon Glass5d618df2018-08-08 03:54:30 -060074 * expanded later with fdt_open_into().
75 *
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +010076 * @fdtp: On entry a pointer to the flattened device tree.
77 * On exit a pointer to the copy of the flattened device tree.
Heinrich Schuchardt96af56e2018-11-12 18:55:22 +010078 * FDT start
79 * Return: status code
Simon Glass5d618df2018-08-08 03:54:30 -060080 */
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +010081static efi_status_t copy_fdt(void **fdtp)
Alexander Graf2ff5cc32016-04-11 16:55:26 +020082{
Alexander Graffdbae012016-04-11 23:51:01 +020083 unsigned long fdt_ram_start = -1L, fdt_pages;
Simon Glass5d618df2018-08-08 03:54:30 -060084 efi_status_t ret = 0;
85 void *fdt, *new_fdt;
Alexander Graffdbae012016-04-11 23:51:01 +020086 u64 new_fdt_addr;
Simon Glass5d618df2018-08-08 03:54:30 -060087 uint fdt_size;
Alexander Graffdbae012016-04-11 23:51:01 +020088 int i;
Alexander Graf2ff5cc32016-04-11 16:55:26 +020089
Simon Glass5d618df2018-08-08 03:54:30 -060090 for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) {
91 u64 ram_start = gd->bd->bi_dram[i].start;
92 u64 ram_size = gd->bd->bi_dram[i].size;
Alexander Graf2ff5cc32016-04-11 16:55:26 +020093
Alexander Graffdbae012016-04-11 23:51:01 +020094 if (!ram_size)
95 continue;
96
97 if (ram_start < fdt_ram_start)
98 fdt_ram_start = ram_start;
99 }
100
Simon Glass56bbcc12018-06-18 08:08:25 -0600101 /*
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100102 * Give us at least 12 KiB of breathing room in case the device tree
103 * needs to be expanded later.
Simon Glass56bbcc12018-06-18 08:08:25 -0600104 */
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100105 fdt = *fdtp;
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100106 fdt_pages = efi_size_in_pages(fdt_totalsize(fdt) + 0x3000);
107 fdt_size = fdt_pages << EFI_PAGE_SHIFT;
Alexander Graffdbae012016-04-11 23:51:01 +0200108
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100109 /*
110 * Safe fdt location is at 127 MiB.
111 * On the sandbox convert from the sandbox address space.
112 */
113 new_fdt_addr = (uintptr_t)map_sysmem(fdt_ram_start + 0x7f00000 +
114 fdt_size, 0);
Simon Glass5d618df2018-08-08 03:54:30 -0600115 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardte00764b2020-05-06 20:32:31 +0200116 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass5d618df2018-08-08 03:54:30 -0600117 &new_fdt_addr);
118 if (ret != EFI_SUCCESS) {
Alexander Graffdbae012016-04-11 23:51:01 +0200119 /* If we can't put it there, put it somewhere */
xypron.glpk@gmx.def6b99122017-08-11 21:19:25 +0200120 new_fdt_addr = (ulong)memalign(EFI_PAGE_SIZE, fdt_size);
Simon Glass5d618df2018-08-08 03:54:30 -0600121 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardte00764b2020-05-06 20:32:31 +0200122 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass5d618df2018-08-08 03:54:30 -0600123 &new_fdt_addr);
124 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200125 log_err("ERROR: Failed to reserve space for FDT\n");
Simon Glass5d618df2018-08-08 03:54:30 -0600126 goto done;
Alexander Graf9b9b7162017-07-03 13:32:35 +0200127 }
Alexander Graffdbae012016-04-11 23:51:01 +0200128 }
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100129 new_fdt = (void *)(uintptr_t)new_fdt_addr;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200130 memcpy(new_fdt, fdt, fdt_totalsize(fdt));
131 fdt_set_totalsize(new_fdt, fdt_size);
132
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100133 *fdtp = (void *)(uintptr_t)new_fdt_addr;
Simon Glass5d618df2018-08-08 03:54:30 -0600134done:
135 return ret;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200136}
137
Atish Patra8e286f62020-03-13 17:11:30 -0700138static void efi_reserve_memory(u64 addr, u64 size)
139{
Atish Patra8e286f62020-03-13 17:11:30 -0700140 /* Convert from sandbox address space. */
141 addr = (uintptr_t)map_sysmem(addr, 0);
Michael Walle282d3862020-05-17 12:29:19 +0200142 if (efi_add_memory_map(addr, size,
143 EFI_RESERVED_MEMORY_TYPE) != EFI_SUCCESS)
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200144 log_err("Reserved memory mapping failed addr %llx size %llx\n",
145 addr, size);
Atish Patra8e286f62020-03-13 17:11:30 -0700146}
147
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +0200148/**
Simon Glass54b9b6e2018-06-18 08:08:28 -0600149 * efi_carve_out_dt_rsv() - Carve out DT reserved memory ranges
150 *
151 * The mem_rsv entries of the FDT are added to the memory map. Any failures are
152 * ignored because this is not critical and we would rather continue to try to
153 * boot.
154 *
155 * @fdt: Pointer to device tree
156 */
157static void efi_carve_out_dt_rsv(void *fdt)
Alexander Graf22c88bf2018-04-06 09:40:51 +0200158{
159 int nr_rsv, i;
Atish Patra8e286f62020-03-13 17:11:30 -0700160 u64 addr, size;
161 int nodeoffset, subnode;
Alexander Graf22c88bf2018-04-06 09:40:51 +0200162
163 nr_rsv = fdt_num_mem_rsv(fdt);
164
165 /* Look for an existing entry and add it to the efi mem map. */
166 for (i = 0; i < nr_rsv; i++) {
167 if (fdt_get_mem_rsv(fdt, i, &addr, &size) != 0)
168 continue;
Atish Patra8e286f62020-03-13 17:11:30 -0700169 efi_reserve_memory(addr, size);
170 }
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100171
Atish Patra8e286f62020-03-13 17:11:30 -0700172 /* process reserved-memory */
173 nodeoffset = fdt_subnode_offset(fdt, 0, "reserved-memory");
174 if (nodeoffset >= 0) {
175 subnode = fdt_first_subnode(fdt, nodeoffset);
176 while (subnode >= 0) {
Bin Mengeb0f48f2020-06-22 23:50:50 -0700177 fdt_addr_t fdt_addr;
178 fdt_size_t fdt_size;
Atish Patra0e52e942020-06-18 18:51:50 -0700179
Atish Patra8e286f62020-03-13 17:11:30 -0700180 /* check if this subnode has a reg property */
Atish Patra0e52e942020-06-18 18:51:50 -0700181 fdt_addr = fdtdec_get_addr_size_auto_parent(
182 fdt, nodeoffset, subnode,
183 "reg", 0, &fdt_size, false);
Atish Patra8e286f62020-03-13 17:11:30 -0700184 /*
185 * The /reserved-memory node may have children with
186 * a size instead of a reg property.
187 */
Heinrich Schuchardt8bec61e2020-06-30 14:12:43 +0200188 if (fdt_addr != FDT_ADDR_T_NONE &&
Heinrich Schuchardte93d5802020-03-24 07:37:52 +0100189 fdtdec_get_is_enabled(fdt, subnode))
Atish Patra0e52e942020-06-18 18:51:50 -0700190 efi_reserve_memory(fdt_addr, fdt_size);
Atish Patra8e286f62020-03-13 17:11:30 -0700191 subnode = fdt_next_subnode(fdt, subnode);
192 }
Alexander Graf22c88bf2018-04-06 09:40:51 +0200193 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200194}
195
196/**
197 * get_config_table() - get configuration table
198 *
199 * @guid: GUID of the configuration table
200 * Return: pointer to configuration table or NULL
201 */
202static void *get_config_table(const efi_guid_t *guid)
203{
204 size_t i;
205
206 for (i = 0; i < systab.nr_tables; i++) {
207 if (!guidcmp(guid, &systab.tables[i].guid))
208 return systab.tables[i].table;
209 }
210 return NULL;
Alexander Graf22c88bf2018-04-06 09:40:51 +0200211}
212
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200213#endif /* !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) */
214
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900215/**
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100216 * efi_install_fdt() - install device tree
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200217 *
Heinrich Schuchardtb112ac22020-02-07 22:10:49 +0100218 * If fdt is not EFI_FDT_USE_INTERNAL, the device tree located at that memory
219 * address will will be installed as configuration table, otherwise the device
220 * tree located at the address indicated by environment variable fdt_addr or as
221 * fallback fdtcontroladdr will be used.
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200222 *
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100223 * On architectures using ACPI tables device trees shall not be installed as
224 * configuration table.
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200225 *
Heinrich Schuchardtb112ac22020-02-07 22:10:49 +0100226 * @fdt: address of device tree or EFI_FDT_USE_INTERNAL to use the
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100227 * the hardware device tree as indicated by environment variable
228 * fdt_addr or as fallback the internal device tree as indicated by
229 * the environment variable fdtcontroladdr
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900230 * Return: status code
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900231 */
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100232efi_status_t efi_install_fdt(void *fdt)
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900233{
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200234 /*
235 * The EBBR spec requires that we have either an FDT or an ACPI table
236 * but not both.
237 */
238#if CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100239 if (fdt) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200240 log_err("ERROR: can't have ACPI table and device tree.\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200241 return EFI_LOAD_ERROR;
242 }
243#else
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900244 bootm_headers_t img = { 0 };
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900245 efi_status_t ret;
246
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100247 if (fdt == EFI_FDT_USE_INTERNAL) {
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100248 const char *fdt_opt;
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100249 uintptr_t fdt_addr;
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100250
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200251 /* Look for device tree that is already installed */
252 if (get_config_table(&efi_guid_fdt))
253 return EFI_SUCCESS;
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100254 /* Check if there is a hardware device tree */
255 fdt_opt = env_get("fdt_addr");
256 /* Use our own device tree as fallback */
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200257 if (!fdt_opt) {
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100258 fdt_opt = env_get("fdtcontroladdr");
259 if (!fdt_opt) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200260 log_err("ERROR: need device tree\n");
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100261 return EFI_NOT_FOUND;
262 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200263 }
264 fdt_addr = simple_strtoul(fdt_opt, NULL, 16);
265 if (!fdt_addr) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200266 log_err("ERROR: invalid $fdt_addr or $fdtcontroladdr\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200267 return EFI_LOAD_ERROR;
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900268 }
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100269 fdt = map_sysmem(fdt_addr, 0);
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200270 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900271
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200272 /* Install device tree */
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200273 if (fdt_check_header(fdt)) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200274 log_err("ERROR: invalid device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200275 return EFI_LOAD_ERROR;
276 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900277
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200278 /* Prepare device tree for payload */
279 ret = copy_fdt(&fdt);
280 if (ret) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200281 log_err("ERROR: out of memory\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200282 return EFI_OUT_OF_RESOURCES;
283 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900284
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200285 if (image_setup_libfdt(&img, fdt, 0, NULL)) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200286 log_err("ERROR: failed to process device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200287 return EFI_LOAD_ERROR;
288 }
289
Heinrich Schuchardt74811c82020-03-14 10:59:34 +0100290 /* Create memory reservations as indicated by the device tree */
291 efi_carve_out_dt_rsv(fdt);
292
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200293 /* Install device tree as UEFI table */
294 ret = efi_install_configuration_table(&efi_guid_fdt, fdt);
295 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200296 log_err("ERROR: failed to install device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200297 return ret;
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900298 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200299#endif /* GENERATE_ACPI_TABLE */
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900300
301 return EFI_SUCCESS;
302}
303
Simon Glass4d77ee62018-11-25 20:14:39 -0700304/**
Heinrich Schuchardt3c3a7352018-09-23 17:21:51 +0200305 * do_bootefi_exec() - execute EFI binary
306 *
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900307 * @handle: handle of loaded image
Heinrich Schuchardt3c3a7352018-09-23 17:21:51 +0200308 * Return: status code
309 *
310 * Load the EFI binary into a newly assigned memory unwinding the relocation
311 * information, install the loaded image protocol, and call the binary.
Alexander Grafe2b04f22016-03-10 00:27:20 +0100312 */
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200313static efi_status_t do_bootefi_exec(efi_handle_t handle, void *load_options)
Alexander Grafe2b04f22016-03-10 00:27:20 +0100314{
Heinrich Schuchardt4b055a22018-03-03 15:29:01 +0100315 efi_status_t ret;
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200316 efi_uintn_t exit_data_size = 0;
317 u16 *exit_data = NULL;
Rob Clark18ceba72017-10-10 08:23:06 -0400318
Alexander Grafe2b04f22016-03-10 00:27:20 +0100319 /* Call our payload! */
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200320 ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data));
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200321 if (ret != EFI_SUCCESS) {
322 log_err("## Application failed, r = %lu\n",
323 ret & ~EFI_ERROR_MASK);
324 if (exit_data) {
325 log_err("## %ls\n", exit_data);
326 efi_free_pool(exit_data);
327 }
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200328 }
Rob Clarkf8db9222017-09-13 18:05:33 -0400329
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900330 efi_restore_gd();
Simon Glass4d77ee62018-11-25 20:14:39 -0700331
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100332 free(load_options);
Rob Clarkf8db9222017-09-13 18:05:33 -0400333
334 return ret;
Alexander Grafe2b04f22016-03-10 00:27:20 +0100335}
336
AKASHI Takahirocf819832019-04-19 12:22:33 +0900337/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200338 * do_efibootmgr() - execute EFI boot manager
AKASHI Takahirocf819832019-04-19 12:22:33 +0900339 *
AKASHI Takahirocf819832019-04-19 12:22:33 +0900340 * Return: status code
AKASHI Takahirocf819832019-04-19 12:22:33 +0900341 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200342static int do_efibootmgr(void)
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900343{
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900344 efi_handle_t handle;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900345 efi_status_t ret;
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200346 void *load_options;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900347
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200348 ret = efi_bootmgr_load(&handle, &load_options);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900349 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200350 log_notice("EFI boot manager: Cannot load any image\n");
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900351 return CMD_RET_FAILURE;
352 }
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900353
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200354 ret = do_bootefi_exec(handle, load_options);
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900355
AKASHI Takahirocf819832019-04-19 12:22:33 +0900356 if (ret != EFI_SUCCESS)
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900357 return CMD_RET_FAILURE;
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900358
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900359 return CMD_RET_SUCCESS;
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900360}
361
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +0200362/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200363 * do_bootefi_image() - execute EFI binary
364 *
365 * Set up memory image for the binary to be loaded, prepare device path, and
366 * then call do_bootefi_exec() to execute it.
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900367 *
368 * @image_opt: string of image start address
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900369 * Return: status code
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900370 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200371static int do_bootefi_image(const char *image_opt)
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900372{
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900373 void *image_buf;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900374 unsigned long addr, size;
375 const char *size_str;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900376 efi_status_t ret;
377
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900378#ifdef CONFIG_CMD_BOOTEFI_HELLO
379 if (!strcmp(image_opt, "hello")) {
380 char *saddr;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900381
382 saddr = env_get("loadaddr");
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900383 size = __efi_helloworld_end - __efi_helloworld_begin;
384
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900385 if (saddr)
386 addr = simple_strtoul(saddr, NULL, 16);
387 else
388 addr = CONFIG_SYS_LOAD_ADDR;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900389
390 image_buf = map_sysmem(addr, size);
391 memcpy(image_buf, __efi_helloworld_begin, size);
392
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100393 efi_free_pool(bootefi_device_path);
394 efi_free_pool(bootefi_image_path);
395 bootefi_device_path = NULL;
396 bootefi_image_path = NULL;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900397 } else
398#endif
399 {
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900400 size_str = env_get("filesize");
401 if (size_str)
402 size = simple_strtoul(size_str, NULL, 16);
403 else
404 size = 0;
405
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900406 addr = simple_strtoul(image_opt, NULL, 16);
407 /* Check that a numeric value was passed */
408 if (!addr && *image_opt != '0')
409 return CMD_RET_USAGE;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900410
411 image_buf = map_sysmem(addr, size);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900412 }
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100413 ret = efi_run_image(image_buf, size);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900414
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100415 if (ret != EFI_SUCCESS)
416 return CMD_RET_FAILURE;
417
418 return CMD_RET_SUCCESS;
419}
420
421/**
422 * efi_run_image() - run loaded UEFI image
423 *
424 * @source_buffer: memory address of the UEFI image
425 * @source_size: size of the UEFI image
426 * Return: status code
427 */
428efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size)
429{
430 efi_handle_t mem_handle = NULL, handle;
431 struct efi_device_path *file_path = NULL;
432 efi_status_t ret;
433
434 if (!bootefi_device_path || !bootefi_image_path) {
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900435 /*
436 * Special case for efi payload not loaded from disk,
437 * such as 'bootefi hello' or for example payload
438 * loaded directly into memory via JTAG, etc:
439 */
440 file_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE,
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100441 (uintptr_t)source_buffer,
442 source_size);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900443 /*
444 * Make sure that device for device_path exist
445 * in load_image(). Otherwise, shell and grub will fail.
446 */
447 ret = efi_create_handle(&mem_handle);
448 if (ret != EFI_SUCCESS)
449 goto out;
450
451 ret = efi_add_protocol(mem_handle, &efi_guid_device_path,
452 file_path);
453 if (ret != EFI_SUCCESS)
454 goto out;
455 } else {
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100456 file_path = efi_dp_append(bootefi_device_path,
457 bootefi_image_path);
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900458 }
459
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100460 ret = EFI_CALL(efi_load_image(false, efi_root, file_path, source_buffer,
461 source_size, &handle));
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900462 if (ret != EFI_SUCCESS)
463 goto out;
464
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200465 u16 *load_options;
466
467 /* Transfer environment variable as load options */
468 ret = efi_env_set_load_options(handle, "bootargs", &load_options);
469 if (ret != EFI_SUCCESS)
470 goto out;
471
472 ret = do_bootefi_exec(handle, load_options);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900473
474out:
Heinrich Schuchardt6e35d3b2020-04-20 12:44:56 +0200475 efi_delete_handle(mem_handle);
476 efi_free_pool(file_path);
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100477 return ret;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900478}
479
Simon Glass93f25592018-11-25 20:14:37 -0700480#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900481static efi_status_t bootefi_run_prepare(const char *load_options_path,
482 struct efi_device_path *device_path,
483 struct efi_device_path *image_path,
484 struct efi_loaded_image_obj **image_objp,
485 struct efi_loaded_image **loaded_image_infop)
486{
487 efi_status_t ret;
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100488 u16 *load_options;
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900489
490 ret = efi_setup_loaded_image(device_path, image_path, image_objp,
491 loaded_image_infop);
492 if (ret != EFI_SUCCESS)
493 return ret;
494
495 /* Transfer environment variable as load options */
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200496 return efi_env_set_load_options((efi_handle_t)*image_objp,
497 load_options_path,
498 &load_options);
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900499}
500
Simon Glass93f25592018-11-25 20:14:37 -0700501/**
502 * bootefi_test_prepare() - prepare to run an EFI test
503 *
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100504 * Prepare to run a test as if it were provided by a loaded image.
Simon Glass93f25592018-11-25 20:14:37 -0700505 *
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100506 * @image_objp: pointer to be set to the loaded image handle
507 * @loaded_image_infop: pointer to be set to the loaded image protocol
508 * @path: dummy file path used to construct the device path
509 * set in the loaded image protocol
510 * @load_options_path: name of a U-Boot environment variable. Its value is
511 * set as load options in the loaded image protocol.
512 * Return: status code
Simon Glass93f25592018-11-25 20:14:37 -0700513 */
514static efi_status_t bootefi_test_prepare
515 (struct efi_loaded_image_obj **image_objp,
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100516 struct efi_loaded_image **loaded_image_infop, const char *path,
517 const char *load_options_path)
Simon Glass93f25592018-11-25 20:14:37 -0700518{
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100519 efi_status_t ret;
520
Simon Glass93f25592018-11-25 20:14:37 -0700521 /* Construct a dummy device path */
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100522 bootefi_device_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, 0, 0);
Simon Glass93f25592018-11-25 20:14:37 -0700523 if (!bootefi_device_path)
524 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100525
Simon Glass93f25592018-11-25 20:14:37 -0700526 bootefi_image_path = efi_dp_from_file(NULL, 0, path);
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100527 if (!bootefi_image_path) {
528 ret = EFI_OUT_OF_RESOURCES;
529 goto failure;
530 }
531
532 ret = bootefi_run_prepare(load_options_path, bootefi_device_path,
533 bootefi_image_path, image_objp,
534 loaded_image_infop);
535 if (ret == EFI_SUCCESS)
536 return ret;
Simon Glass93f25592018-11-25 20:14:37 -0700537
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100538 efi_free_pool(bootefi_image_path);
539 bootefi_image_path = NULL;
540failure:
541 efi_free_pool(bootefi_device_path);
542 bootefi_device_path = NULL;
543 return ret;
Simon Glass93f25592018-11-25 20:14:37 -0700544}
545
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900546/**
547 * bootefi_run_finish() - finish up after running an EFI test
548 *
549 * @loaded_image_info: Pointer to a struct which holds the loaded image info
550 * @image_obj: Pointer to a struct which holds the loaded image object
551 */
552static void bootefi_run_finish(struct efi_loaded_image_obj *image_obj,
553 struct efi_loaded_image *loaded_image_info)
554{
555 efi_restore_gd();
556 free(loaded_image_info->load_options);
557 efi_delete_handle(&image_obj->header);
558}
559
560/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200561 * do_efi_selftest() - execute EFI selftest
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900562 *
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900563 * Return: status code
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900564 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200565static int do_efi_selftest(void)
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900566{
567 struct efi_loaded_image_obj *image_obj;
568 struct efi_loaded_image *loaded_image_info;
569 efi_status_t ret;
570
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900571 ret = bootefi_test_prepare(&image_obj, &loaded_image_info,
572 "\\selftest", "efi_selftest");
573 if (ret != EFI_SUCCESS)
574 return CMD_RET_FAILURE;
575
576 /* Execute the test */
577 ret = EFI_CALL(efi_selftest(&image_obj->header, &systab));
578 bootefi_run_finish(image_obj, loaded_image_info);
579
580 return ret != EFI_SUCCESS;
581}
Simon Glass93f25592018-11-25 20:14:37 -0700582#endif /* CONFIG_CMD_BOOTEFI_SELFTEST */
583
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200584/**
585 * do_bootefi() - execute `bootefi` command
586 *
587 * @cmdtp: table entry describing command
588 * @flag: bitmap indicating how the command was invoked
589 * @argc: number of arguments
590 * @argv: command line arguments
591 * Return: status code
592 */
Simon Glassed38aef2020-05-10 11:40:03 -0600593static int do_bootefi(struct cmd_tbl *cmdtp, int flag, int argc,
594 char *const argv[])
Alexander Grafe2b04f22016-03-10 00:27:20 +0100595{
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200596 efi_status_t ret;
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100597 void *fdt;
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200598
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900599 if (argc < 2)
600 return CMD_RET_USAGE;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900601
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200602 /* Initialize EFI drivers */
603 ret = efi_init_obj_list();
604 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200605 log_err("Error: Cannot initialize UEFI sub-system, r = %lu\n",
606 ret & ~EFI_ERROR_MASK);
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200607 return CMD_RET_FAILURE;
608 }
609
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100610 if (argc > 2) {
611 uintptr_t fdt_addr;
612
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100613 fdt_addr = simple_strtoul(argv[2], NULL, 16);
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100614 fdt = map_sysmem(fdt_addr, 0);
615 } else {
616 fdt = EFI_FDT_USE_INTERNAL;
617 }
618 ret = efi_install_fdt(fdt);
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200619 if (ret == EFI_INVALID_PARAMETER)
620 return CMD_RET_USAGE;
621 else if (ret != EFI_SUCCESS)
622 return CMD_RET_FAILURE;
623
AKASHI Takahirocf819832019-04-19 12:22:33 +0900624 if (!strcmp(argv[1], "bootmgr"))
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200625 return do_efibootmgr();
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900626#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
627 else if (!strcmp(argv[1], "selftest"))
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200628 return do_efi_selftest();
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900629#endif
Simon Glassfac4ced2016-11-07 08:47:08 -0700630
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200631 return do_bootefi_image(argv[1]);
Alexander Grafe2b04f22016-03-10 00:27:20 +0100632}
633
634#ifdef CONFIG_SYS_LONGHELP
635static char bootefi_help_text[] =
Alexander Graf54c1e832016-04-14 16:07:53 +0200636 "<image address> [fdt address]\n"
637 " - boot EFI payload stored at address <image address>.\n"
638 " If specified, the device tree located at <fdt address> gets\n"
Simon Glassfac4ced2016-11-07 08:47:08 -0700639 " exposed as EFI configuration table.\n"
640#ifdef CONFIG_CMD_BOOTEFI_HELLO
Heinrich Schuchardtd33ae3e2017-09-15 10:06:11 +0200641 "bootefi hello\n"
642 " - boot a sample Hello World application stored within U-Boot\n"
643#endif
644#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
Heinrich Schuchardt44ab21b2018-03-03 15:29:03 +0100645 "bootefi selftest [fdt address]\n"
Heinrich Schuchardtd33ae3e2017-09-15 10:06:11 +0200646 " - boot an EFI selftest application stored within U-Boot\n"
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200647 " Use environment variable efi_selftest to select a single test.\n"
648 " Use 'setenv efi_selftest list' to enumerate all tests.\n"
Simon Glassfac4ced2016-11-07 08:47:08 -0700649#endif
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900650 "bootefi bootmgr [fdt address]\n"
Rob Clarkc84c1102017-09-13 18:05:38 -0400651 " - load and boot EFI payload based on BootOrder/BootXXXX variables.\n"
652 "\n"
653 " If specified, the device tree located at <fdt address> gets\n"
654 " exposed as EFI configuration table.\n";
Alexander Grafe2b04f22016-03-10 00:27:20 +0100655#endif
656
657U_BOOT_CMD(
Alexander Graf54c1e832016-04-14 16:07:53 +0200658 bootefi, 3, 0, do_bootefi,
Sergey Kubushyn268f19e2016-06-07 11:14:31 -0700659 "Boots an EFI payload from memory",
Alexander Grafe2b04f22016-03-10 00:27:20 +0100660 bootefi_help_text
661);
Alexander Graf8f19f262016-03-04 01:10:14 +0100662
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +0200663/**
664 * efi_set_bootdev() - set boot device
665 *
666 * This function is called when a file is loaded, e.g. via the 'load' command.
667 * We use the path to this file to inform the UEFI binary about the boot device.
668 *
669 * @dev: device, e.g. "MMC"
670 * @devnr: number of the device, e.g. "1:2"
671 * @path: path to file loaded
672 */
Rob Clarkf8db9222017-09-13 18:05:33 -0400673void efi_set_bootdev(const char *dev, const char *devnr, const char *path)
674{
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900675 struct efi_device_path *device, *image;
676 efi_status_t ret;
Alexander Graf34118e72016-08-05 14:49:53 +0200677
Heinrich Schuchardt761ecc82018-09-16 07:20:21 +0200678 /* efi_set_bootdev is typically called repeatedly, recover memory */
679 efi_free_pool(bootefi_device_path);
680 efi_free_pool(bootefi_image_path);
Heinrich Schuchardt761ecc82018-09-16 07:20:21 +0200681
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900682 ret = efi_dp_from_name(dev, devnr, path, &device, &image);
683 if (ret == EFI_SUCCESS) {
684 bootefi_device_path = device;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900685 if (image) {
686 /* FIXME: image should not contain device */
687 struct efi_device_path *image_tmp = image;
688
689 efi_dp_split_file_path(image, &device, &image);
690 efi_free_pool(image_tmp);
691 }
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900692 bootefi_image_path = image;
Alexander Graf45e437d2016-07-21 01:44:46 +0200693 } else {
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900694 bootefi_device_path = NULL;
695 bootefi_image_path = NULL;
Alexander Graf45e437d2016-07-21 01:44:46 +0200696 }
Alexander Graf8f19f262016-03-04 01:10:14 +0100697}