blob: f1d7d8bc6634f4b1624959667457bcd0bbb21372 [file] [log] [blame]
Tom Rini70df9d62018-05-07 17:02:21 -04001// SPDX-License-Identifier: GPL-2.0+
Alexander Grafe2b04f22016-03-10 00:27:20 +01002/*
3 * EFI application loader
4 *
5 * Copyright (c) 2016 Alexander Graf
Alexander Grafe2b04f22016-03-10 00:27:20 +01006 */
7
8#include <common.h>
Heinrich Schuchardtaa0b11b2019-01-08 18:13:06 +01009#include <bootm.h>
10#include <charset.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010011#include <command.h>
Simon Glass11c89f32017-05-17 17:18:03 -060012#include <dm.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010013#include <efi_loader.h>
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020014#include <efi_selftest.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010015#include <errno.h>
Masahiro Yamada75f82d02018-03-05 01:20:11 +090016#include <linux/libfdt.h>
17#include <linux/libfdt_env.h>
Alexander Grafa2414512018-06-18 17:22:58 +020018#include <mapmem.h>
Alexander Graffdbae012016-04-11 23:51:01 +020019#include <memalign.h>
Alexander Graf2ff5cc32016-04-11 16:55:26 +020020#include <asm/global_data.h>
Simon Glassc2194bf2016-09-25 15:27:32 -060021#include <asm-generic/sections.h>
Heinrich Schuchardt954e2b92018-04-03 21:59:32 +020022#include <asm-generic/unaligned.h>
Simon Glassc2194bf2016-09-25 15:27:32 -060023#include <linux/linkage.h>
Alexander Graf2ff5cc32016-04-11 16:55:26 +020024
25DECLARE_GLOBAL_DATA_PTR;
Alexander Grafe2b04f22016-03-10 00:27:20 +010026
Rob Clarkf8db9222017-09-13 18:05:33 -040027static struct efi_device_path *bootefi_image_path;
28static struct efi_device_path *bootefi_device_path;
Alexander Grafe2b04f22016-03-10 00:27:20 +010029
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020030/*
Heinrich Schuchardt954e2b92018-04-03 21:59:32 +020031 * Allow unaligned memory access.
32 *
33 * This routine is overridden by architectures providing this feature.
34 */
35void __weak allow_unaligned(void)
36{
37}
38
39/*
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020040 * Set the load options of an image from an environment variable.
41 *
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +090042 * @handle: the image handle
43 * @env_var: name of the environment variable
44 * Return: status code
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020045 */
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +090046static efi_status_t set_load_options(efi_handle_t handle, const char *env_var)
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020047{
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +090048 struct efi_loaded_image *loaded_image_info;
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020049 size_t size;
50 const char *env = env_get(env_var);
Heinrich Schuchardtde527802018-08-31 21:31:33 +020051 u16 *pos;
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +090052 efi_status_t ret;
53
54 ret = EFI_CALL(systab.boottime->open_protocol(
55 handle,
56 &efi_guid_loaded_image,
57 (void **)&loaded_image_info,
58 efi_root, NULL,
59 EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL));
60 if (ret != EFI_SUCCESS)
61 return EFI_INVALID_PARAMETER;
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020062
63 loaded_image_info->load_options = NULL;
64 loaded_image_info->load_options_size = 0;
65 if (!env)
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +090066 goto out;
67
Heinrich Schuchardtde527802018-08-31 21:31:33 +020068 size = utf8_utf16_strlen(env) + 1;
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020069 loaded_image_info->load_options = calloc(size, sizeof(u16));
70 if (!loaded_image_info->load_options) {
71 printf("ERROR: Out of memory\n");
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +090072 EFI_CALL(systab.boottime->close_protocol(handle,
73 &efi_guid_loaded_image,
74 efi_root, NULL));
75 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020076 }
Heinrich Schuchardtde527802018-08-31 21:31:33 +020077 pos = loaded_image_info->load_options;
78 utf8_utf16_strcpy(&pos, env);
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020079 loaded_image_info->load_options_size = size * 2;
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +090080
81out:
82 return EFI_CALL(systab.boottime->close_protocol(handle,
83 &efi_guid_loaded_image,
84 efi_root, NULL));
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020085}
86
Heinrich Schuchardt4420a332019-04-20 13:33:55 +020087#if !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
88
Simon Glass5d618df2018-08-08 03:54:30 -060089/**
90 * copy_fdt() - Copy the device tree to a new location available to EFI
91 *
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +010092 * The FDT is copied to a suitable location within the EFI memory map.
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +010093 * Additional 12 KiB are added to the space in case the device tree needs to be
Simon Glass5d618df2018-08-08 03:54:30 -060094 * expanded later with fdt_open_into().
95 *
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +010096 * @fdtp: On entry a pointer to the flattened device tree.
97 * On exit a pointer to the copy of the flattened device tree.
Heinrich Schuchardt96af56e2018-11-12 18:55:22 +010098 * FDT start
99 * Return: status code
Simon Glass5d618df2018-08-08 03:54:30 -0600100 */
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100101static efi_status_t copy_fdt(void **fdtp)
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200102{
Alexander Graffdbae012016-04-11 23:51:01 +0200103 unsigned long fdt_ram_start = -1L, fdt_pages;
Simon Glass5d618df2018-08-08 03:54:30 -0600104 efi_status_t ret = 0;
105 void *fdt, *new_fdt;
Alexander Graffdbae012016-04-11 23:51:01 +0200106 u64 new_fdt_addr;
Simon Glass5d618df2018-08-08 03:54:30 -0600107 uint fdt_size;
Alexander Graffdbae012016-04-11 23:51:01 +0200108 int i;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200109
Simon Glass5d618df2018-08-08 03:54:30 -0600110 for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) {
111 u64 ram_start = gd->bd->bi_dram[i].start;
112 u64 ram_size = gd->bd->bi_dram[i].size;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200113
Alexander Graffdbae012016-04-11 23:51:01 +0200114 if (!ram_size)
115 continue;
116
117 if (ram_start < fdt_ram_start)
118 fdt_ram_start = ram_start;
119 }
120
Simon Glass56bbcc12018-06-18 08:08:25 -0600121 /*
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100122 * Give us at least 12 KiB of breathing room in case the device tree
123 * needs to be expanded later.
Simon Glass56bbcc12018-06-18 08:08:25 -0600124 */
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100125 fdt = *fdtp;
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100126 fdt_pages = efi_size_in_pages(fdt_totalsize(fdt) + 0x3000);
127 fdt_size = fdt_pages << EFI_PAGE_SHIFT;
Alexander Graffdbae012016-04-11 23:51:01 +0200128
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100129 /*
130 * Safe fdt location is at 127 MiB.
131 * On the sandbox convert from the sandbox address space.
132 */
133 new_fdt_addr = (uintptr_t)map_sysmem(fdt_ram_start + 0x7f00000 +
134 fdt_size, 0);
Simon Glass5d618df2018-08-08 03:54:30 -0600135 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Ilias Apalodimas0468b8e2019-04-12 21:26:28 +0300136 EFI_BOOT_SERVICES_DATA, fdt_pages,
Simon Glass5d618df2018-08-08 03:54:30 -0600137 &new_fdt_addr);
138 if (ret != EFI_SUCCESS) {
Alexander Graffdbae012016-04-11 23:51:01 +0200139 /* If we can't put it there, put it somewhere */
xypron.glpk@gmx.def6b99122017-08-11 21:19:25 +0200140 new_fdt_addr = (ulong)memalign(EFI_PAGE_SIZE, fdt_size);
Simon Glass5d618df2018-08-08 03:54:30 -0600141 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Ilias Apalodimas0468b8e2019-04-12 21:26:28 +0300142 EFI_BOOT_SERVICES_DATA, fdt_pages,
Simon Glass5d618df2018-08-08 03:54:30 -0600143 &new_fdt_addr);
144 if (ret != EFI_SUCCESS) {
Alexander Graf9b9b7162017-07-03 13:32:35 +0200145 printf("ERROR: Failed to reserve space for FDT\n");
Simon Glass5d618df2018-08-08 03:54:30 -0600146 goto done;
Alexander Graf9b9b7162017-07-03 13:32:35 +0200147 }
Alexander Graffdbae012016-04-11 23:51:01 +0200148 }
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100149 new_fdt = (void *)(uintptr_t)new_fdt_addr;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200150 memcpy(new_fdt, fdt, fdt_totalsize(fdt));
151 fdt_set_totalsize(new_fdt, fdt_size);
152
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100153 *fdtp = (void *)(uintptr_t)new_fdt_addr;
Simon Glass5d618df2018-08-08 03:54:30 -0600154done:
155 return ret;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200156}
157
Simon Glass54b9b6e2018-06-18 08:08:28 -0600158/*
159 * efi_carve_out_dt_rsv() - Carve out DT reserved memory ranges
160 *
161 * The mem_rsv entries of the FDT are added to the memory map. Any failures are
162 * ignored because this is not critical and we would rather continue to try to
163 * boot.
164 *
165 * @fdt: Pointer to device tree
166 */
167static void efi_carve_out_dt_rsv(void *fdt)
Alexander Graf22c88bf2018-04-06 09:40:51 +0200168{
169 int nr_rsv, i;
170 uint64_t addr, size, pages;
171
172 nr_rsv = fdt_num_mem_rsv(fdt);
173
174 /* Look for an existing entry and add it to the efi mem map. */
175 for (i = 0; i < nr_rsv; i++) {
176 if (fdt_get_mem_rsv(fdt, i, &addr, &size) != 0)
177 continue;
178
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100179 /* Convert from sandbox address space. */
180 addr = (uintptr_t)map_sysmem(addr, 0);
181
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100182 pages = efi_size_in_pages(size + (addr & EFI_PAGE_MASK));
Heinrich Schuchardt3d92fc82018-11-12 18:55:23 +0100183 addr &= ~EFI_PAGE_MASK;
Simon Glass54b9b6e2018-06-18 08:08:28 -0600184 if (!efi_add_memory_map(addr, pages, EFI_RESERVED_MEMORY_TYPE,
185 false))
186 printf("FDT memrsv map %d: Failed to add to map\n", i);
Alexander Graf22c88bf2018-04-06 09:40:51 +0200187 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200188}
189
190/**
191 * get_config_table() - get configuration table
192 *
193 * @guid: GUID of the configuration table
194 * Return: pointer to configuration table or NULL
195 */
196static void *get_config_table(const efi_guid_t *guid)
197{
198 size_t i;
199
200 for (i = 0; i < systab.nr_tables; i++) {
201 if (!guidcmp(guid, &systab.tables[i].guid))
202 return systab.tables[i].table;
203 }
204 return NULL;
Alexander Graf22c88bf2018-04-06 09:40:51 +0200205}
206
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200207#endif /* !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) */
208
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900209/**
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900210 * efi_install_fdt() - install fdt passed by a command argument
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900211 * @fdt_opt: pointer to argument
212 * Return: status code
213 *
214 * If specified, fdt will be installed as configuration table,
215 * otherwise no fdt will be passed.
216 */
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900217static efi_status_t efi_install_fdt(const char *fdt_opt)
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900218{
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200219 /*
220 * The EBBR spec requires that we have either an FDT or an ACPI table
221 * but not both.
222 */
223#if CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
224 if (fdt_opt) {
225 printf("ERROR: can't have ACPI table and device tree.\n");
226 return EFI_LOAD_ERROR;
227 }
228#else
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900229 unsigned long fdt_addr;
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900230 void *fdt;
231 bootm_headers_t img = { 0 };
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900232 efi_status_t ret;
233
234 if (fdt_opt) {
235 fdt_addr = simple_strtoul(fdt_opt, NULL, 16);
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200236 if (!fdt_addr)
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900237 return EFI_INVALID_PARAMETER;
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200238 } else {
239 /* Look for device tree that is already installed */
240 if (get_config_table(&efi_guid_fdt))
241 return EFI_SUCCESS;
242 /* Use our own device tree as default */
243 fdt_opt = env_get("fdtcontroladdr");
244 if (!fdt_opt) {
245 printf("ERROR: need device tree\n");
246 return EFI_NOT_FOUND;
247 }
248 fdt_addr = simple_strtoul(fdt_opt, NULL, 16);
249 if (!fdt_addr) {
250 printf("ERROR: invalid $fdtcontroladdr\n");
251 return EFI_LOAD_ERROR;
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900252 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200253 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900254
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200255 /* Install device tree */
256 fdt = map_sysmem(fdt_addr, 0);
257 if (fdt_check_header(fdt)) {
258 printf("ERROR: invalid device tree\n");
259 return EFI_LOAD_ERROR;
260 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900261
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200262 /* Create memory reservations as indicated by the device tree */
263 efi_carve_out_dt_rsv(fdt);
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900264
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200265 /* Prepare device tree for payload */
266 ret = copy_fdt(&fdt);
267 if (ret) {
268 printf("ERROR: out of memory\n");
269 return EFI_OUT_OF_RESOURCES;
270 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900271
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200272 if (image_setup_libfdt(&img, fdt, 0, NULL)) {
273 printf("ERROR: failed to process device tree\n");
274 return EFI_LOAD_ERROR;
275 }
276
277 /* Install device tree as UEFI table */
278 ret = efi_install_configuration_table(&efi_guid_fdt, fdt);
279 if (ret != EFI_SUCCESS) {
280 printf("ERROR: failed to install device tree\n");
281 return ret;
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900282 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200283#endif /* GENERATE_ACPI_TABLE */
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900284
285 return EFI_SUCCESS;
286}
287
Simon Glass4d77ee62018-11-25 20:14:39 -0700288/**
Heinrich Schuchardt3c3a7352018-09-23 17:21:51 +0200289 * do_bootefi_exec() - execute EFI binary
290 *
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900291 * @handle: handle of loaded image
Heinrich Schuchardt3c3a7352018-09-23 17:21:51 +0200292 * Return: status code
293 *
294 * Load the EFI binary into a newly assigned memory unwinding the relocation
295 * information, install the loaded image protocol, and call the binary.
Alexander Grafe2b04f22016-03-10 00:27:20 +0100296 */
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900297static efi_status_t do_bootefi_exec(efi_handle_t handle)
Alexander Grafe2b04f22016-03-10 00:27:20 +0100298{
Heinrich Schuchardt4b055a22018-03-03 15:29:01 +0100299 efi_status_t ret;
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200300 efi_uintn_t exit_data_size = 0;
301 u16 *exit_data = NULL;
Rob Clarkf8db9222017-09-13 18:05:33 -0400302
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900303 /* Transfer environment variable as load options */
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900304 ret = set_load_options(handle, "bootargs");
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900305 if (ret != EFI_SUCCESS)
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900306 return ret;
Rob Clark18ceba72017-10-10 08:23:06 -0400307
Alexander Grafe2b04f22016-03-10 00:27:20 +0100308 /* Call our payload! */
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200309 ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data));
310 printf("## Application terminated, r = %lu\n", ret & ~EFI_ERROR_MASK);
311 if (ret && exit_data) {
312 printf("## %ls\n", exit_data);
313 efi_free_pool(exit_data);
314 }
Rob Clarkf8db9222017-09-13 18:05:33 -0400315
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900316 efi_restore_gd();
Simon Glass4d77ee62018-11-25 20:14:39 -0700317
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900318 /*
319 * FIXME: Who is responsible for
320 * free(loaded_image_info->load_options);
321 * Once efi_exit() is implemented correctly,
322 * handle itself doesn't exist here.
323 */
Rob Clarkf8db9222017-09-13 18:05:33 -0400324
325 return ret;
Alexander Grafe2b04f22016-03-10 00:27:20 +0100326}
327
AKASHI Takahirocf819832019-04-19 12:22:33 +0900328/**
329 * do_efibootmgr() - execute EFI Boot Manager
330 *
331 * @fdt_opt: string of fdt start address
332 * Return: status code
333 *
334 * Execute EFI Boot Manager
335 */
336static int do_efibootmgr(const char *fdt_opt)
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900337{
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900338 efi_handle_t handle;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900339 efi_status_t ret;
340
341 /* Allow unaligned memory access */
342 allow_unaligned();
343
344 switch_to_non_secure_mode();
345
346 /* Initialize EFI drivers */
347 ret = efi_init_obj_list();
348 if (ret != EFI_SUCCESS) {
349 printf("Error: Cannot initialize UEFI sub-system, r = %lu\n",
350 ret & ~EFI_ERROR_MASK);
351 return CMD_RET_FAILURE;
352 }
353
354 ret = efi_install_fdt(fdt_opt);
355 if (ret == EFI_INVALID_PARAMETER)
356 return CMD_RET_USAGE;
357 else if (ret != EFI_SUCCESS)
358 return CMD_RET_FAILURE;
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900359
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900360 ret = efi_bootmgr_load(&handle);
361 if (ret != EFI_SUCCESS) {
362 printf("EFI boot manager: Cannot load any image\n");
363 return CMD_RET_FAILURE;
364 }
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900365
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900366 ret = do_bootefi_exec(handle);
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900367
AKASHI Takahirocf819832019-04-19 12:22:33 +0900368 if (ret != EFI_SUCCESS)
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900369 return CMD_RET_FAILURE;
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900370
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900371 return CMD_RET_SUCCESS;
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900372}
373
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900374/*
375 * do_bootefi_image() - execute EFI binary from command line
376 *
377 * @image_opt: string of image start address
378 * @fdt_opt: string of fdt start address
379 * Return: status code
380 *
381 * Set up memory image for the binary to be loaded, prepare
382 * device path and then call do_bootefi_exec() to execute it.
383 */
384static int do_bootefi_image(const char *image_opt, const char *fdt_opt)
385{
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900386 void *image_buf;
387 struct efi_device_path *device_path, *image_path;
388 struct efi_device_path *file_path = NULL;
389 unsigned long addr, size;
390 const char *size_str;
391 efi_handle_t mem_handle = NULL, handle;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900392 efi_status_t ret;
393
394 /* Allow unaligned memory access */
395 allow_unaligned();
396
397 switch_to_non_secure_mode();
398
399 /* Initialize EFI drivers */
400 ret = efi_init_obj_list();
401 if (ret != EFI_SUCCESS) {
402 printf("Error: Cannot initialize UEFI sub-system, r = %lu\n",
403 ret & ~EFI_ERROR_MASK);
404 return CMD_RET_FAILURE;
405 }
406
407 ret = efi_install_fdt(fdt_opt);
408 if (ret == EFI_INVALID_PARAMETER)
409 return CMD_RET_USAGE;
410 else if (ret != EFI_SUCCESS)
411 return CMD_RET_FAILURE;
412
413#ifdef CONFIG_CMD_BOOTEFI_HELLO
414 if (!strcmp(image_opt, "hello")) {
415 char *saddr;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900416
417 saddr = env_get("loadaddr");
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900418 size = __efi_helloworld_end - __efi_helloworld_begin;
419
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900420 if (saddr)
421 addr = simple_strtoul(saddr, NULL, 16);
422 else
423 addr = CONFIG_SYS_LOAD_ADDR;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900424
425 image_buf = map_sysmem(addr, size);
426 memcpy(image_buf, __efi_helloworld_begin, size);
427
428 device_path = NULL;
429 image_path = NULL;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900430 } else
431#endif
432 {
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900433 size_str = env_get("filesize");
434 if (size_str)
435 size = simple_strtoul(size_str, NULL, 16);
436 else
437 size = 0;
438
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900439 addr = simple_strtoul(image_opt, NULL, 16);
440 /* Check that a numeric value was passed */
441 if (!addr && *image_opt != '0')
442 return CMD_RET_USAGE;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900443
444 image_buf = map_sysmem(addr, size);
445
446 device_path = bootefi_device_path;
447 image_path = bootefi_image_path;
448 }
449
450 if (!device_path && !image_path) {
451 /*
452 * Special case for efi payload not loaded from disk,
453 * such as 'bootefi hello' or for example payload
454 * loaded directly into memory via JTAG, etc:
455 */
456 file_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE,
457 (uintptr_t)image_buf, size);
458 /*
459 * Make sure that device for device_path exist
460 * in load_image(). Otherwise, shell and grub will fail.
461 */
462 ret = efi_create_handle(&mem_handle);
463 if (ret != EFI_SUCCESS)
464 goto out;
465
466 ret = efi_add_protocol(mem_handle, &efi_guid_device_path,
467 file_path);
468 if (ret != EFI_SUCCESS)
469 goto out;
470 } else {
471 assert(device_path && image_path);
472 file_path = efi_dp_append(device_path, image_path);
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900473 }
474
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900475 ret = EFI_CALL(efi_load_image(false, efi_root,
476 file_path, image_buf, size, &handle));
477 if (ret != EFI_SUCCESS)
478 goto out;
479
480 ret = do_bootefi_exec(handle);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900481
482out:
483 if (mem_handle)
484 efi_delete_handle(mem_handle);
485 if (file_path)
486 efi_free_pool(file_path);
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900487
488 if (ret != EFI_SUCCESS)
489 return CMD_RET_FAILURE;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900490
491 return CMD_RET_SUCCESS;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900492}
493
Simon Glass93f25592018-11-25 20:14:37 -0700494#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900495static efi_status_t bootefi_run_prepare(const char *load_options_path,
496 struct efi_device_path *device_path,
497 struct efi_device_path *image_path,
498 struct efi_loaded_image_obj **image_objp,
499 struct efi_loaded_image **loaded_image_infop)
500{
501 efi_status_t ret;
502
503 ret = efi_setup_loaded_image(device_path, image_path, image_objp,
504 loaded_image_infop);
505 if (ret != EFI_SUCCESS)
506 return ret;
507
508 /* Transfer environment variable as load options */
509 return set_load_options((efi_handle_t)*image_objp, load_options_path);
510}
511
Simon Glass93f25592018-11-25 20:14:37 -0700512/**
513 * bootefi_test_prepare() - prepare to run an EFI test
514 *
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100515 * Prepare to run a test as if it were provided by a loaded image.
Simon Glass93f25592018-11-25 20:14:37 -0700516 *
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100517 * @image_objp: pointer to be set to the loaded image handle
518 * @loaded_image_infop: pointer to be set to the loaded image protocol
519 * @path: dummy file path used to construct the device path
520 * set in the loaded image protocol
521 * @load_options_path: name of a U-Boot environment variable. Its value is
522 * set as load options in the loaded image protocol.
523 * Return: status code
Simon Glass93f25592018-11-25 20:14:37 -0700524 */
525static efi_status_t bootefi_test_prepare
526 (struct efi_loaded_image_obj **image_objp,
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100527 struct efi_loaded_image **loaded_image_infop, const char *path,
528 const char *load_options_path)
Simon Glass93f25592018-11-25 20:14:37 -0700529{
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100530 efi_status_t ret;
531
Simon Glass93f25592018-11-25 20:14:37 -0700532 /* Construct a dummy device path */
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100533 bootefi_device_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, 0, 0);
Simon Glass93f25592018-11-25 20:14:37 -0700534 if (!bootefi_device_path)
535 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100536
Simon Glass93f25592018-11-25 20:14:37 -0700537 bootefi_image_path = efi_dp_from_file(NULL, 0, path);
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100538 if (!bootefi_image_path) {
539 ret = EFI_OUT_OF_RESOURCES;
540 goto failure;
541 }
542
543 ret = bootefi_run_prepare(load_options_path, bootefi_device_path,
544 bootefi_image_path, image_objp,
545 loaded_image_infop);
546 if (ret == EFI_SUCCESS)
547 return ret;
Simon Glass93f25592018-11-25 20:14:37 -0700548
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100549 efi_free_pool(bootefi_image_path);
550 bootefi_image_path = NULL;
551failure:
552 efi_free_pool(bootefi_device_path);
553 bootefi_device_path = NULL;
554 return ret;
Simon Glass93f25592018-11-25 20:14:37 -0700555}
556
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900557/**
558 * bootefi_run_finish() - finish up after running an EFI test
559 *
560 * @loaded_image_info: Pointer to a struct which holds the loaded image info
561 * @image_obj: Pointer to a struct which holds the loaded image object
562 */
563static void bootefi_run_finish(struct efi_loaded_image_obj *image_obj,
564 struct efi_loaded_image *loaded_image_info)
565{
566 efi_restore_gd();
567 free(loaded_image_info->load_options);
568 efi_delete_handle(&image_obj->header);
569}
570
571/**
572 * do_efi_selftest() - execute EFI Selftest
573 *
574 * @fdt_opt: string of fdt start address
575 * Return: status code
576 *
577 * Execute EFI Selftest
578 */
579static int do_efi_selftest(const char *fdt_opt)
580{
581 struct efi_loaded_image_obj *image_obj;
582 struct efi_loaded_image *loaded_image_info;
583 efi_status_t ret;
584
585 /* Allow unaligned memory access */
586 allow_unaligned();
587
588 switch_to_non_secure_mode();
589
590 /* Initialize EFI drivers */
591 ret = efi_init_obj_list();
592 if (ret != EFI_SUCCESS) {
593 printf("Error: Cannot initialize UEFI sub-system, r = %lu\n",
594 ret & ~EFI_ERROR_MASK);
595 return CMD_RET_FAILURE;
596 }
597
598 ret = efi_install_fdt(fdt_opt);
599 if (ret == EFI_INVALID_PARAMETER)
600 return CMD_RET_USAGE;
601 else if (ret != EFI_SUCCESS)
602 return CMD_RET_FAILURE;
603
604 ret = bootefi_test_prepare(&image_obj, &loaded_image_info,
605 "\\selftest", "efi_selftest");
606 if (ret != EFI_SUCCESS)
607 return CMD_RET_FAILURE;
608
609 /* Execute the test */
610 ret = EFI_CALL(efi_selftest(&image_obj->header, &systab));
611 bootefi_run_finish(image_obj, loaded_image_info);
612
613 return ret != EFI_SUCCESS;
614}
Simon Glass93f25592018-11-25 20:14:37 -0700615#endif /* CONFIG_CMD_BOOTEFI_SELFTEST */
616
Alexander Grafe2b04f22016-03-10 00:27:20 +0100617/* Interpreter command to boot an arbitrary EFI image from memory */
618static int do_bootefi(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
619{
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900620 if (argc < 2)
621 return CMD_RET_USAGE;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900622
623 if (!strcmp(argv[1], "bootmgr"))
624 return do_efibootmgr(argc > 2 ? argv[2] : NULL);
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900625#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
626 else if (!strcmp(argv[1], "selftest"))
627 return do_efi_selftest(argc > 2 ? argv[2] : NULL);
628#endif
Simon Glassfac4ced2016-11-07 08:47:08 -0700629
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900630 return do_bootefi_image(argv[1], argc > 2 ? argv[2] : NULL);
Alexander Grafe2b04f22016-03-10 00:27:20 +0100631}
632
633#ifdef CONFIG_SYS_LONGHELP
634static char bootefi_help_text[] =
Alexander Graf54c1e832016-04-14 16:07:53 +0200635 "<image address> [fdt address]\n"
636 " - boot EFI payload stored at address <image address>.\n"
637 " If specified, the device tree located at <fdt address> gets\n"
Simon Glassfac4ced2016-11-07 08:47:08 -0700638 " exposed as EFI configuration table.\n"
639#ifdef CONFIG_CMD_BOOTEFI_HELLO
Heinrich Schuchardtd33ae3e2017-09-15 10:06:11 +0200640 "bootefi hello\n"
641 " - boot a sample Hello World application stored within U-Boot\n"
642#endif
643#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
Heinrich Schuchardt44ab21b2018-03-03 15:29:03 +0100644 "bootefi selftest [fdt address]\n"
Heinrich Schuchardtd33ae3e2017-09-15 10:06:11 +0200645 " - boot an EFI selftest application stored within U-Boot\n"
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200646 " Use environment variable efi_selftest to select a single test.\n"
647 " Use 'setenv efi_selftest list' to enumerate all tests.\n"
Simon Glassfac4ced2016-11-07 08:47:08 -0700648#endif
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900649 "bootefi bootmgr [fdt address]\n"
Rob Clarkc84c1102017-09-13 18:05:38 -0400650 " - load and boot EFI payload based on BootOrder/BootXXXX variables.\n"
651 "\n"
652 " If specified, the device tree located at <fdt address> gets\n"
653 " exposed as EFI configuration table.\n";
Alexander Grafe2b04f22016-03-10 00:27:20 +0100654#endif
655
656U_BOOT_CMD(
Alexander Graf54c1e832016-04-14 16:07:53 +0200657 bootefi, 3, 0, do_bootefi,
Sergey Kubushyn268f19e2016-06-07 11:14:31 -0700658 "Boots an EFI payload from memory",
Alexander Grafe2b04f22016-03-10 00:27:20 +0100659 bootefi_help_text
660);
Alexander Graf8f19f262016-03-04 01:10:14 +0100661
Rob Clarkf8db9222017-09-13 18:05:33 -0400662void efi_set_bootdev(const char *dev, const char *devnr, const char *path)
663{
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900664 struct efi_device_path *device, *image;
665 efi_status_t ret;
Alexander Graf34118e72016-08-05 14:49:53 +0200666
Heinrich Schuchardt761ecc82018-09-16 07:20:21 +0200667 /* efi_set_bootdev is typically called repeatedly, recover memory */
668 efi_free_pool(bootefi_device_path);
669 efi_free_pool(bootefi_image_path);
Heinrich Schuchardt761ecc82018-09-16 07:20:21 +0200670
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900671 ret = efi_dp_from_name(dev, devnr, path, &device, &image);
672 if (ret == EFI_SUCCESS) {
673 bootefi_device_path = device;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900674 if (image) {
675 /* FIXME: image should not contain device */
676 struct efi_device_path *image_tmp = image;
677
678 efi_dp_split_file_path(image, &device, &image);
679 efi_free_pool(image_tmp);
680 }
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900681 bootefi_image_path = image;
Alexander Graf45e437d2016-07-21 01:44:46 +0200682 } else {
AKASHI Takahiro035fb012018-10-17 16:32:03 +0900683 bootefi_device_path = NULL;
684 bootefi_image_path = NULL;
Alexander Graf45e437d2016-07-21 01:44:46 +0200685 }
Alexander Graf8f19f262016-03-04 01:10:14 +0100686}