blob: 40d5ef2b3a5bfcb3c18d7c5439309efd49687b70 [file] [log] [blame]
Tom Rini70df9d62018-05-07 17:02:21 -04001// SPDX-License-Identifier: GPL-2.0+
Alexander Grafe2b04f22016-03-10 00:27:20 +01002/*
3 * EFI application loader
4 *
5 * Copyright (c) 2016 Alexander Graf
Alexander Grafe2b04f22016-03-10 00:27:20 +01006 */
7
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +02008#define LOG_CATEGORY LOGC_EFI
9
Alexander Grafe2b04f22016-03-10 00:27:20 +010010#include <common.h>
Heinrich Schuchardtaa0b11b2019-01-08 18:13:06 +010011#include <charset.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010012#include <command.h>
Simon Glass11c89f32017-05-17 17:18:03 -060013#include <dm.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010014#include <efi_loader.h>
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020015#include <efi_selftest.h>
Simon Glass0af6e2d2019-08-01 09:46:52 -060016#include <env.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010017#include <errno.h>
Simon Glass2dc9c342020-05-10 11:40:01 -060018#include <image.h>
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +020019#include <log.h>
Simon Glass9bc15642020-02-03 07:36:16 -070020#include <malloc.h>
Masahiro Yamada75f82d02018-03-05 01:20:11 +090021#include <linux/libfdt.h>
22#include <linux/libfdt_env.h>
Alexander Grafa2414512018-06-18 17:22:58 +020023#include <mapmem.h>
Alexander Graffdbae012016-04-11 23:51:01 +020024#include <memalign.h>
Simon Glassc2194bf2016-09-25 15:27:32 -060025#include <asm-generic/sections.h>
26#include <linux/linkage.h>
Alexander Graf2ff5cc32016-04-11 16:55:26 +020027
28DECLARE_GLOBAL_DATA_PTR;
Alexander Grafe2b04f22016-03-10 00:27:20 +010029
Rob Clarkf8db9222017-09-13 18:05:33 -040030static struct efi_device_path *bootefi_image_path;
31static struct efi_device_path *bootefi_device_path;
Alexander Grafe2b04f22016-03-10 00:27:20 +010032
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +020033/**
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020034 * efi_env_set_load_options() - set load options from environment variable
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020035 *
Heinrich Schuchardte6263952020-01-03 22:53:42 +010036 * @handle: the image handle
37 * @env_var: name of the environment variable
38 * @load_options: pointer to load options (output)
39 * Return: status code
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020040 */
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020041static efi_status_t efi_env_set_load_options(efi_handle_t handle,
42 const char *env_var,
43 u16 **load_options)
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020044{
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020045 const char *env = env_get(env_var);
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020046 size_t size;
Heinrich Schuchardtde527802018-08-31 21:31:33 +020047 u16 *pos;
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +090048 efi_status_t ret;
49
Heinrich Schuchardte6263952020-01-03 22:53:42 +010050 *load_options = NULL;
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020051 if (!env)
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020052 return EFI_SUCCESS;
53 size = sizeof(u16) * (utf8_utf16_strlen(env) + 1);
54 pos = calloc(size, 1);
55 if (!pos)
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +090056 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardte6263952020-01-03 22:53:42 +010057 *load_options = pos;
Heinrich Schuchardtde527802018-08-31 21:31:33 +020058 utf8_utf16_strcpy(&pos, env);
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +020059 ret = efi_set_load_options(handle, size, *load_options);
60 if (ret != EFI_SUCCESS) {
61 free(*load_options);
62 *load_options = NULL;
63 }
64 return ret;
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020065}
66
Heinrich Schuchardt4420a332019-04-20 13:33:55 +020067#if !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
68
Simon Glass5d618df2018-08-08 03:54:30 -060069/**
70 * copy_fdt() - Copy the device tree to a new location available to EFI
71 *
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +010072 * The FDT is copied to a suitable location within the EFI memory map.
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +010073 * Additional 12 KiB are added to the space in case the device tree needs to be
Simon Glass5d618df2018-08-08 03:54:30 -060074 * expanded later with fdt_open_into().
75 *
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +010076 * @fdtp: On entry a pointer to the flattened device tree.
77 * On exit a pointer to the copy of the flattened device tree.
Heinrich Schuchardt96af56e2018-11-12 18:55:22 +010078 * FDT start
79 * Return: status code
Simon Glass5d618df2018-08-08 03:54:30 -060080 */
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +010081static efi_status_t copy_fdt(void **fdtp)
Alexander Graf2ff5cc32016-04-11 16:55:26 +020082{
Alexander Graffdbae012016-04-11 23:51:01 +020083 unsigned long fdt_ram_start = -1L, fdt_pages;
Simon Glass5d618df2018-08-08 03:54:30 -060084 efi_status_t ret = 0;
85 void *fdt, *new_fdt;
Alexander Graffdbae012016-04-11 23:51:01 +020086 u64 new_fdt_addr;
Simon Glass5d618df2018-08-08 03:54:30 -060087 uint fdt_size;
Alexander Graffdbae012016-04-11 23:51:01 +020088 int i;
Alexander Graf2ff5cc32016-04-11 16:55:26 +020089
Simon Glass5d618df2018-08-08 03:54:30 -060090 for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) {
91 u64 ram_start = gd->bd->bi_dram[i].start;
92 u64 ram_size = gd->bd->bi_dram[i].size;
Alexander Graf2ff5cc32016-04-11 16:55:26 +020093
Alexander Graffdbae012016-04-11 23:51:01 +020094 if (!ram_size)
95 continue;
96
97 if (ram_start < fdt_ram_start)
98 fdt_ram_start = ram_start;
99 }
100
Simon Glass56bbcc12018-06-18 08:08:25 -0600101 /*
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100102 * Give us at least 12 KiB of breathing room in case the device tree
103 * needs to be expanded later.
Simon Glass56bbcc12018-06-18 08:08:25 -0600104 */
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100105 fdt = *fdtp;
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100106 fdt_pages = efi_size_in_pages(fdt_totalsize(fdt) + 0x3000);
107 fdt_size = fdt_pages << EFI_PAGE_SHIFT;
Alexander Graffdbae012016-04-11 23:51:01 +0200108
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100109 /*
110 * Safe fdt location is at 127 MiB.
111 * On the sandbox convert from the sandbox address space.
112 */
113 new_fdt_addr = (uintptr_t)map_sysmem(fdt_ram_start + 0x7f00000 +
114 fdt_size, 0);
Simon Glass5d618df2018-08-08 03:54:30 -0600115 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardte00764b2020-05-06 20:32:31 +0200116 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass5d618df2018-08-08 03:54:30 -0600117 &new_fdt_addr);
118 if (ret != EFI_SUCCESS) {
Alexander Graffdbae012016-04-11 23:51:01 +0200119 /* If we can't put it there, put it somewhere */
xypron.glpk@gmx.def6b99122017-08-11 21:19:25 +0200120 new_fdt_addr = (ulong)memalign(EFI_PAGE_SIZE, fdt_size);
Simon Glass5d618df2018-08-08 03:54:30 -0600121 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardte00764b2020-05-06 20:32:31 +0200122 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass5d618df2018-08-08 03:54:30 -0600123 &new_fdt_addr);
124 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200125 log_err("ERROR: Failed to reserve space for FDT\n");
Simon Glass5d618df2018-08-08 03:54:30 -0600126 goto done;
Alexander Graf9b9b7162017-07-03 13:32:35 +0200127 }
Alexander Graffdbae012016-04-11 23:51:01 +0200128 }
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100129 new_fdt = (void *)(uintptr_t)new_fdt_addr;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200130 memcpy(new_fdt, fdt, fdt_totalsize(fdt));
131 fdt_set_totalsize(new_fdt, fdt_size);
132
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100133 *fdtp = (void *)(uintptr_t)new_fdt_addr;
Simon Glass5d618df2018-08-08 03:54:30 -0600134done:
135 return ret;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200136}
137
Atish Patra8e286f62020-03-13 17:11:30 -0700138static void efi_reserve_memory(u64 addr, u64 size)
139{
Atish Patra8e286f62020-03-13 17:11:30 -0700140 /* Convert from sandbox address space. */
141 addr = (uintptr_t)map_sysmem(addr, 0);
Michael Walle282d3862020-05-17 12:29:19 +0200142 if (efi_add_memory_map(addr, size,
143 EFI_RESERVED_MEMORY_TYPE) != EFI_SUCCESS)
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200144 log_err("Reserved memory mapping failed addr %llx size %llx\n",
145 addr, size);
Atish Patra8e286f62020-03-13 17:11:30 -0700146}
147
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +0200148/**
Simon Glass54b9b6e2018-06-18 08:08:28 -0600149 * efi_carve_out_dt_rsv() - Carve out DT reserved memory ranges
150 *
151 * The mem_rsv entries of the FDT are added to the memory map. Any failures are
152 * ignored because this is not critical and we would rather continue to try to
153 * boot.
154 *
155 * @fdt: Pointer to device tree
156 */
157static void efi_carve_out_dt_rsv(void *fdt)
Alexander Graf22c88bf2018-04-06 09:40:51 +0200158{
159 int nr_rsv, i;
Atish Patra8e286f62020-03-13 17:11:30 -0700160 u64 addr, size;
161 int nodeoffset, subnode;
Alexander Graf22c88bf2018-04-06 09:40:51 +0200162
163 nr_rsv = fdt_num_mem_rsv(fdt);
164
165 /* Look for an existing entry and add it to the efi mem map. */
166 for (i = 0; i < nr_rsv; i++) {
167 if (fdt_get_mem_rsv(fdt, i, &addr, &size) != 0)
168 continue;
Atish Patra8e286f62020-03-13 17:11:30 -0700169 efi_reserve_memory(addr, size);
170 }
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100171
Atish Patra8e286f62020-03-13 17:11:30 -0700172 /* process reserved-memory */
173 nodeoffset = fdt_subnode_offset(fdt, 0, "reserved-memory");
174 if (nodeoffset >= 0) {
175 subnode = fdt_first_subnode(fdt, nodeoffset);
176 while (subnode >= 0) {
Bin Mengeb0f48f2020-06-22 23:50:50 -0700177 fdt_addr_t fdt_addr;
178 fdt_size_t fdt_size;
Atish Patra0e52e942020-06-18 18:51:50 -0700179
Atish Patra8e286f62020-03-13 17:11:30 -0700180 /* check if this subnode has a reg property */
Atish Patra0e52e942020-06-18 18:51:50 -0700181 fdt_addr = fdtdec_get_addr_size_auto_parent(
182 fdt, nodeoffset, subnode,
183 "reg", 0, &fdt_size, false);
Atish Patra8e286f62020-03-13 17:11:30 -0700184 /*
185 * The /reserved-memory node may have children with
186 * a size instead of a reg property.
187 */
Heinrich Schuchardt8bec61e2020-06-30 14:12:43 +0200188 if (fdt_addr != FDT_ADDR_T_NONE &&
Heinrich Schuchardte93d5802020-03-24 07:37:52 +0100189 fdtdec_get_is_enabled(fdt, subnode))
Atish Patra0e52e942020-06-18 18:51:50 -0700190 efi_reserve_memory(fdt_addr, fdt_size);
Atish Patra8e286f62020-03-13 17:11:30 -0700191 subnode = fdt_next_subnode(fdt, subnode);
192 }
Alexander Graf22c88bf2018-04-06 09:40:51 +0200193 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200194}
195
196/**
197 * get_config_table() - get configuration table
198 *
199 * @guid: GUID of the configuration table
200 * Return: pointer to configuration table or NULL
201 */
202static void *get_config_table(const efi_guid_t *guid)
203{
204 size_t i;
205
206 for (i = 0; i < systab.nr_tables; i++) {
207 if (!guidcmp(guid, &systab.tables[i].guid))
208 return systab.tables[i].table;
209 }
210 return NULL;
Alexander Graf22c88bf2018-04-06 09:40:51 +0200211}
212
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200213#endif /* !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) */
214
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900215/**
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100216 * efi_install_fdt() - install device tree
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200217 *
Heinrich Schuchardtb112ac22020-02-07 22:10:49 +0100218 * If fdt is not EFI_FDT_USE_INTERNAL, the device tree located at that memory
219 * address will will be installed as configuration table, otherwise the device
220 * tree located at the address indicated by environment variable fdt_addr or as
221 * fallback fdtcontroladdr will be used.
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200222 *
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100223 * On architectures using ACPI tables device trees shall not be installed as
224 * configuration table.
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200225 *
Heinrich Schuchardtb112ac22020-02-07 22:10:49 +0100226 * @fdt: address of device tree or EFI_FDT_USE_INTERNAL to use the
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100227 * the hardware device tree as indicated by environment variable
228 * fdt_addr or as fallback the internal device tree as indicated by
229 * the environment variable fdtcontroladdr
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900230 * Return: status code
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900231 */
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100232efi_status_t efi_install_fdt(void *fdt)
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900233{
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200234 /*
235 * The EBBR spec requires that we have either an FDT or an ACPI table
236 * but not both.
237 */
238#if CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100239 if (fdt) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200240 log_err("ERROR: can't have ACPI table and device tree.\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200241 return EFI_LOAD_ERROR;
242 }
243#else
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900244 bootm_headers_t img = { 0 };
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900245 efi_status_t ret;
246
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100247 if (fdt == EFI_FDT_USE_INTERNAL) {
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100248 const char *fdt_opt;
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100249 uintptr_t fdt_addr;
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100250
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200251 /* Look for device tree that is already installed */
252 if (get_config_table(&efi_guid_fdt))
253 return EFI_SUCCESS;
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100254 /* Check if there is a hardware device tree */
255 fdt_opt = env_get("fdt_addr");
256 /* Use our own device tree as fallback */
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200257 if (!fdt_opt) {
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100258 fdt_opt = env_get("fdtcontroladdr");
259 if (!fdt_opt) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200260 log_err("ERROR: need device tree\n");
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100261 return EFI_NOT_FOUND;
262 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200263 }
264 fdt_addr = simple_strtoul(fdt_opt, NULL, 16);
265 if (!fdt_addr) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200266 log_err("ERROR: invalid $fdt_addr or $fdtcontroladdr\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200267 return EFI_LOAD_ERROR;
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900268 }
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100269 fdt = map_sysmem(fdt_addr, 0);
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200270 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900271
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200272 /* Install device tree */
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200273 if (fdt_check_header(fdt)) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200274 log_err("ERROR: invalid device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200275 return EFI_LOAD_ERROR;
276 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900277
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200278 /* Prepare device tree for payload */
279 ret = copy_fdt(&fdt);
280 if (ret) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200281 log_err("ERROR: out of memory\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200282 return EFI_OUT_OF_RESOURCES;
283 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900284
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200285 if (image_setup_libfdt(&img, fdt, 0, NULL)) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200286 log_err("ERROR: failed to process device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200287 return EFI_LOAD_ERROR;
288 }
289
Heinrich Schuchardt74811c82020-03-14 10:59:34 +0100290 /* Create memory reservations as indicated by the device tree */
291 efi_carve_out_dt_rsv(fdt);
292
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200293 /* Install device tree as UEFI table */
294 ret = efi_install_configuration_table(&efi_guid_fdt, fdt);
295 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200296 log_err("ERROR: failed to install device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200297 return ret;
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900298 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200299#endif /* GENERATE_ACPI_TABLE */
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900300
301 return EFI_SUCCESS;
302}
303
Simon Glass4d77ee62018-11-25 20:14:39 -0700304/**
Heinrich Schuchardt3c3a7352018-09-23 17:21:51 +0200305 * do_bootefi_exec() - execute EFI binary
306 *
Heinrich Schuchardtaa4a66c2020-08-15 23:10:22 +0200307 * The image indicated by @handle is started. When it returns the allocated
308 * memory for the @load_options is freed.
309 *
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900310 * @handle: handle of loaded image
Heinrich Schuchardtaa4a66c2020-08-15 23:10:22 +0200311 * @load_options: load options
Heinrich Schuchardt3c3a7352018-09-23 17:21:51 +0200312 * Return: status code
313 *
314 * Load the EFI binary into a newly assigned memory unwinding the relocation
315 * information, install the loaded image protocol, and call the binary.
Alexander Grafe2b04f22016-03-10 00:27:20 +0100316 */
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200317static efi_status_t do_bootefi_exec(efi_handle_t handle, void *load_options)
Alexander Grafe2b04f22016-03-10 00:27:20 +0100318{
Heinrich Schuchardt4b055a22018-03-03 15:29:01 +0100319 efi_status_t ret;
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200320 efi_uintn_t exit_data_size = 0;
321 u16 *exit_data = NULL;
Rob Clark18ceba72017-10-10 08:23:06 -0400322
Alexander Grafe2b04f22016-03-10 00:27:20 +0100323 /* Call our payload! */
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200324 ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data));
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200325 if (ret != EFI_SUCCESS) {
326 log_err("## Application failed, r = %lu\n",
327 ret & ~EFI_ERROR_MASK);
328 if (exit_data) {
329 log_err("## %ls\n", exit_data);
330 efi_free_pool(exit_data);
331 }
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200332 }
Rob Clarkf8db9222017-09-13 18:05:33 -0400333
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900334 efi_restore_gd();
Simon Glass4d77ee62018-11-25 20:14:39 -0700335
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100336 free(load_options);
Rob Clarkf8db9222017-09-13 18:05:33 -0400337
338 return ret;
Alexander Grafe2b04f22016-03-10 00:27:20 +0100339}
340
AKASHI Takahirocf819832019-04-19 12:22:33 +0900341/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200342 * do_efibootmgr() - execute EFI boot manager
AKASHI Takahirocf819832019-04-19 12:22:33 +0900343 *
AKASHI Takahirocf819832019-04-19 12:22:33 +0900344 * Return: status code
AKASHI Takahirocf819832019-04-19 12:22:33 +0900345 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200346static int do_efibootmgr(void)
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900347{
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900348 efi_handle_t handle;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900349 efi_status_t ret;
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200350 void *load_options;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900351
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200352 ret = efi_bootmgr_load(&handle, &load_options);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900353 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200354 log_notice("EFI boot manager: Cannot load any image\n");
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900355 return CMD_RET_FAILURE;
356 }
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900357
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200358 ret = do_bootefi_exec(handle, load_options);
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900359
AKASHI Takahirocf819832019-04-19 12:22:33 +0900360 if (ret != EFI_SUCCESS)
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900361 return CMD_RET_FAILURE;
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900362
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900363 return CMD_RET_SUCCESS;
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900364}
365
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +0200366/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200367 * do_bootefi_image() - execute EFI binary
368 *
369 * Set up memory image for the binary to be loaded, prepare device path, and
370 * then call do_bootefi_exec() to execute it.
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900371 *
372 * @image_opt: string of image start address
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900373 * Return: status code
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900374 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200375static int do_bootefi_image(const char *image_opt)
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900376{
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900377 void *image_buf;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900378 unsigned long addr, size;
379 const char *size_str;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900380 efi_status_t ret;
381
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900382#ifdef CONFIG_CMD_BOOTEFI_HELLO
383 if (!strcmp(image_opt, "hello")) {
384 char *saddr;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900385
386 saddr = env_get("loadaddr");
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900387 size = __efi_helloworld_end - __efi_helloworld_begin;
388
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900389 if (saddr)
390 addr = simple_strtoul(saddr, NULL, 16);
391 else
392 addr = CONFIG_SYS_LOAD_ADDR;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900393
394 image_buf = map_sysmem(addr, size);
395 memcpy(image_buf, __efi_helloworld_begin, size);
396
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100397 efi_free_pool(bootefi_device_path);
398 efi_free_pool(bootefi_image_path);
399 bootefi_device_path = NULL;
400 bootefi_image_path = NULL;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900401 } else
402#endif
403 {
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900404 size_str = env_get("filesize");
405 if (size_str)
406 size = simple_strtoul(size_str, NULL, 16);
407 else
408 size = 0;
409
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900410 addr = simple_strtoul(image_opt, NULL, 16);
411 /* Check that a numeric value was passed */
412 if (!addr && *image_opt != '0')
413 return CMD_RET_USAGE;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900414
415 image_buf = map_sysmem(addr, size);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900416 }
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100417 ret = efi_run_image(image_buf, size);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900418
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100419 if (ret != EFI_SUCCESS)
420 return CMD_RET_FAILURE;
421
422 return CMD_RET_SUCCESS;
423}
424
425/**
426 * efi_run_image() - run loaded UEFI image
427 *
428 * @source_buffer: memory address of the UEFI image
429 * @source_size: size of the UEFI image
430 * Return: status code
431 */
432efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size)
433{
434 efi_handle_t mem_handle = NULL, handle;
435 struct efi_device_path *file_path = NULL;
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000436 struct efi_device_path *msg_path;
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100437 efi_status_t ret;
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000438 u16 *load_options;
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100439
440 if (!bootefi_device_path || !bootefi_image_path) {
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900441 /*
442 * Special case for efi payload not loaded from disk,
443 * such as 'bootefi hello' or for example payload
444 * loaded directly into memory via JTAG, etc:
445 */
446 file_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE,
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100447 (uintptr_t)source_buffer,
448 source_size);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900449 /*
450 * Make sure that device for device_path exist
451 * in load_image(). Otherwise, shell and grub will fail.
452 */
453 ret = efi_create_handle(&mem_handle);
454 if (ret != EFI_SUCCESS)
455 goto out;
456
457 ret = efi_add_protocol(mem_handle, &efi_guid_device_path,
458 file_path);
459 if (ret != EFI_SUCCESS)
460 goto out;
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000461 msg_path = file_path;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900462 } else {
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100463 file_path = efi_dp_append(bootefi_device_path,
464 bootefi_image_path);
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000465 msg_path = bootefi_image_path;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900466 }
467
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000468 log_info("Booting %pD\n", msg_path);
469
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100470 ret = EFI_CALL(efi_load_image(false, efi_root, file_path, source_buffer,
471 source_size, &handle));
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000472 if (ret != EFI_SUCCESS) {
473 log_err("Loading image failed\n");
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900474 goto out;
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000475 }
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200476
477 /* Transfer environment variable as load options */
478 ret = efi_env_set_load_options(handle, "bootargs", &load_options);
479 if (ret != EFI_SUCCESS)
480 goto out;
481
482 ret = do_bootefi_exec(handle, load_options);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900483
484out:
Heinrich Schuchardt6e35d3b2020-04-20 12:44:56 +0200485 efi_delete_handle(mem_handle);
486 efi_free_pool(file_path);
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100487 return ret;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900488}
489
Simon Glass93f25592018-11-25 20:14:37 -0700490#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900491static efi_status_t bootefi_run_prepare(const char *load_options_path,
492 struct efi_device_path *device_path,
493 struct efi_device_path *image_path,
494 struct efi_loaded_image_obj **image_objp,
495 struct efi_loaded_image **loaded_image_infop)
496{
497 efi_status_t ret;
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100498 u16 *load_options;
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900499
500 ret = efi_setup_loaded_image(device_path, image_path, image_objp,
501 loaded_image_infop);
502 if (ret != EFI_SUCCESS)
503 return ret;
504
505 /* Transfer environment variable as load options */
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200506 return efi_env_set_load_options((efi_handle_t)*image_objp,
507 load_options_path,
508 &load_options);
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900509}
510
Simon Glass93f25592018-11-25 20:14:37 -0700511/**
512 * bootefi_test_prepare() - prepare to run an EFI test
513 *
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100514 * Prepare to run a test as if it were provided by a loaded image.
Simon Glass93f25592018-11-25 20:14:37 -0700515 *
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100516 * @image_objp: pointer to be set to the loaded image handle
517 * @loaded_image_infop: pointer to be set to the loaded image protocol
518 * @path: dummy file path used to construct the device path
519 * set in the loaded image protocol
520 * @load_options_path: name of a U-Boot environment variable. Its value is
521 * set as load options in the loaded image protocol.
522 * Return: status code
Simon Glass93f25592018-11-25 20:14:37 -0700523 */
524static efi_status_t bootefi_test_prepare
525 (struct efi_loaded_image_obj **image_objp,
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100526 struct efi_loaded_image **loaded_image_infop, const char *path,
527 const char *load_options_path)
Simon Glass93f25592018-11-25 20:14:37 -0700528{
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100529 efi_status_t ret;
530
Simon Glass93f25592018-11-25 20:14:37 -0700531 /* Construct a dummy device path */
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100532 bootefi_device_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, 0, 0);
Simon Glass93f25592018-11-25 20:14:37 -0700533 if (!bootefi_device_path)
534 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100535
Simon Glass93f25592018-11-25 20:14:37 -0700536 bootefi_image_path = efi_dp_from_file(NULL, 0, path);
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100537 if (!bootefi_image_path) {
538 ret = EFI_OUT_OF_RESOURCES;
539 goto failure;
540 }
541
542 ret = bootefi_run_prepare(load_options_path, bootefi_device_path,
543 bootefi_image_path, image_objp,
544 loaded_image_infop);
545 if (ret == EFI_SUCCESS)
546 return ret;
Simon Glass93f25592018-11-25 20:14:37 -0700547
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100548 efi_free_pool(bootefi_image_path);
549 bootefi_image_path = NULL;
550failure:
551 efi_free_pool(bootefi_device_path);
552 bootefi_device_path = NULL;
553 return ret;
Simon Glass93f25592018-11-25 20:14:37 -0700554}
555
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900556/**
557 * bootefi_run_finish() - finish up after running an EFI test
558 *
559 * @loaded_image_info: Pointer to a struct which holds the loaded image info
560 * @image_obj: Pointer to a struct which holds the loaded image object
561 */
562static void bootefi_run_finish(struct efi_loaded_image_obj *image_obj,
563 struct efi_loaded_image *loaded_image_info)
564{
565 efi_restore_gd();
566 free(loaded_image_info->load_options);
567 efi_delete_handle(&image_obj->header);
568}
569
570/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200571 * do_efi_selftest() - execute EFI selftest
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900572 *
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900573 * Return: status code
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900574 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200575static int do_efi_selftest(void)
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900576{
577 struct efi_loaded_image_obj *image_obj;
578 struct efi_loaded_image *loaded_image_info;
579 efi_status_t ret;
580
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900581 ret = bootefi_test_prepare(&image_obj, &loaded_image_info,
582 "\\selftest", "efi_selftest");
583 if (ret != EFI_SUCCESS)
584 return CMD_RET_FAILURE;
585
586 /* Execute the test */
587 ret = EFI_CALL(efi_selftest(&image_obj->header, &systab));
588 bootefi_run_finish(image_obj, loaded_image_info);
589
590 return ret != EFI_SUCCESS;
591}
Simon Glass93f25592018-11-25 20:14:37 -0700592#endif /* CONFIG_CMD_BOOTEFI_SELFTEST */
593
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200594/**
595 * do_bootefi() - execute `bootefi` command
596 *
597 * @cmdtp: table entry describing command
598 * @flag: bitmap indicating how the command was invoked
599 * @argc: number of arguments
600 * @argv: command line arguments
601 * Return: status code
602 */
Simon Glassed38aef2020-05-10 11:40:03 -0600603static int do_bootefi(struct cmd_tbl *cmdtp, int flag, int argc,
604 char *const argv[])
Alexander Grafe2b04f22016-03-10 00:27:20 +0100605{
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200606 efi_status_t ret;
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100607 void *fdt;
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200608
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900609 if (argc < 2)
610 return CMD_RET_USAGE;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900611
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200612 /* Initialize EFI drivers */
613 ret = efi_init_obj_list();
614 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200615 log_err("Error: Cannot initialize UEFI sub-system, r = %lu\n",
616 ret & ~EFI_ERROR_MASK);
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200617 return CMD_RET_FAILURE;
618 }
619
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100620 if (argc > 2) {
621 uintptr_t fdt_addr;
622
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100623 fdt_addr = simple_strtoul(argv[2], NULL, 16);
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100624 fdt = map_sysmem(fdt_addr, 0);
625 } else {
626 fdt = EFI_FDT_USE_INTERNAL;
627 }
628 ret = efi_install_fdt(fdt);
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200629 if (ret == EFI_INVALID_PARAMETER)
630 return CMD_RET_USAGE;
631 else if (ret != EFI_SUCCESS)
632 return CMD_RET_FAILURE;
633
AKASHI Takahirocf819832019-04-19 12:22:33 +0900634 if (!strcmp(argv[1], "bootmgr"))
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200635 return do_efibootmgr();
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900636#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
637 else if (!strcmp(argv[1], "selftest"))
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200638 return do_efi_selftest();
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900639#endif
Simon Glassfac4ced2016-11-07 08:47:08 -0700640
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200641 return do_bootefi_image(argv[1]);
Alexander Grafe2b04f22016-03-10 00:27:20 +0100642}
643
644#ifdef CONFIG_SYS_LONGHELP
645static char bootefi_help_text[] =
Alexander Graf54c1e832016-04-14 16:07:53 +0200646 "<image address> [fdt address]\n"
647 " - boot EFI payload stored at address <image address>.\n"
648 " If specified, the device tree located at <fdt address> gets\n"
Simon Glassfac4ced2016-11-07 08:47:08 -0700649 " exposed as EFI configuration table.\n"
650#ifdef CONFIG_CMD_BOOTEFI_HELLO
Heinrich Schuchardtd33ae3e2017-09-15 10:06:11 +0200651 "bootefi hello\n"
652 " - boot a sample Hello World application stored within U-Boot\n"
653#endif
654#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
Heinrich Schuchardt44ab21b2018-03-03 15:29:03 +0100655 "bootefi selftest [fdt address]\n"
Heinrich Schuchardtd33ae3e2017-09-15 10:06:11 +0200656 " - boot an EFI selftest application stored within U-Boot\n"
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200657 " Use environment variable efi_selftest to select a single test.\n"
658 " Use 'setenv efi_selftest list' to enumerate all tests.\n"
Simon Glassfac4ced2016-11-07 08:47:08 -0700659#endif
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900660 "bootefi bootmgr [fdt address]\n"
Rob Clarkc84c1102017-09-13 18:05:38 -0400661 " - load and boot EFI payload based on BootOrder/BootXXXX variables.\n"
662 "\n"
663 " If specified, the device tree located at <fdt address> gets\n"
664 " exposed as EFI configuration table.\n";
Alexander Grafe2b04f22016-03-10 00:27:20 +0100665#endif
666
667U_BOOT_CMD(
Alexander Graf54c1e832016-04-14 16:07:53 +0200668 bootefi, 3, 0, do_bootefi,
Sergey Kubushyn268f19e2016-06-07 11:14:31 -0700669 "Boots an EFI payload from memory",
Alexander Grafe2b04f22016-03-10 00:27:20 +0100670 bootefi_help_text
671);
Alexander Graf8f19f262016-03-04 01:10:14 +0100672
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +0200673/**
674 * efi_set_bootdev() - set boot device
675 *
676 * This function is called when a file is loaded, e.g. via the 'load' command.
677 * We use the path to this file to inform the UEFI binary about the boot device.
678 *
679 * @dev: device, e.g. "MMC"
680 * @devnr: number of the device, e.g. "1:2"
681 * @path: path to file loaded
682 */
Rob Clarkf8db9222017-09-13 18:05:33 -0400683void efi_set_bootdev(const char *dev, const char *devnr, const char *path)
684{
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900685 struct efi_device_path *device, *image;
686 efi_status_t ret;
Alexander Graf34118e72016-08-05 14:49:53 +0200687
Heinrich Schuchardt761ecc82018-09-16 07:20:21 +0200688 /* efi_set_bootdev is typically called repeatedly, recover memory */
689 efi_free_pool(bootefi_device_path);
690 efi_free_pool(bootefi_image_path);
Heinrich Schuchardt761ecc82018-09-16 07:20:21 +0200691
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900692 ret = efi_dp_from_name(dev, devnr, path, &device, &image);
693 if (ret == EFI_SUCCESS) {
694 bootefi_device_path = device;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900695 if (image) {
696 /* FIXME: image should not contain device */
697 struct efi_device_path *image_tmp = image;
698
699 efi_dp_split_file_path(image, &device, &image);
700 efi_free_pool(image_tmp);
701 }
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900702 bootefi_image_path = image;
Alexander Graf45e437d2016-07-21 01:44:46 +0200703 } else {
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900704 bootefi_device_path = NULL;
705 bootefi_image_path = NULL;
Alexander Graf45e437d2016-07-21 01:44:46 +0200706 }
Alexander Graf8f19f262016-03-04 01:10:14 +0100707}