blob: 271b385edea684f7b16236f2e941ab76ed009ab3 [file] [log] [blame]
Tom Rini70df9d62018-05-07 17:02:21 -04001// SPDX-License-Identifier: GPL-2.0+
Alexander Grafe2b04f22016-03-10 00:27:20 +01002/*
3 * EFI application loader
4 *
5 * Copyright (c) 2016 Alexander Graf
Alexander Grafe2b04f22016-03-10 00:27:20 +01006 */
7
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +02008#define LOG_CATEGORY LOGC_EFI
9
Alexander Grafe2b04f22016-03-10 00:27:20 +010010#include <common.h>
Heinrich Schuchardtaf64c3e2021-01-24 14:34:12 +000011#include <bootm.h>
Heinrich Schuchardtaa0b11b2019-01-08 18:13:06 +010012#include <charset.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010013#include <command.h>
Simon Glass11c89f32017-05-17 17:18:03 -060014#include <dm.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010015#include <efi_loader.h>
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +020016#include <efi_selftest.h>
Simon Glass0af6e2d2019-08-01 09:46:52 -060017#include <env.h>
Alexander Grafe2b04f22016-03-10 00:27:20 +010018#include <errno.h>
Simon Glass2dc9c342020-05-10 11:40:01 -060019#include <image.h>
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +020020#include <log.h>
Simon Glass9bc15642020-02-03 07:36:16 -070021#include <malloc.h>
Simon Glass3ba929a2020-10-30 21:38:53 -060022#include <asm/global_data.h>
Masahiro Yamada75f82d02018-03-05 01:20:11 +090023#include <linux/libfdt.h>
24#include <linux/libfdt_env.h>
Alexander Grafa2414512018-06-18 17:22:58 +020025#include <mapmem.h>
Alexander Graffdbae012016-04-11 23:51:01 +020026#include <memalign.h>
Simon Glassc2194bf2016-09-25 15:27:32 -060027#include <asm-generic/sections.h>
28#include <linux/linkage.h>
Alexander Graf2ff5cc32016-04-11 16:55:26 +020029
30DECLARE_GLOBAL_DATA_PTR;
Alexander Grafe2b04f22016-03-10 00:27:20 +010031
Rob Clarkf8db9222017-09-13 18:05:33 -040032static struct efi_device_path *bootefi_image_path;
33static struct efi_device_path *bootefi_device_path;
Heinrich Schuchardt6b821592021-01-12 12:46:24 +010034static void *image_addr;
35static size_t image_size;
Alexander Grafe2b04f22016-03-10 00:27:20 +010036
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +020037/**
Heinrich Schuchardt6b821592021-01-12 12:46:24 +010038 * efi_clear_bootdev() - clear boot device
39 */
40static void efi_clear_bootdev(void)
41{
42 efi_free_pool(bootefi_device_path);
43 efi_free_pool(bootefi_image_path);
44 bootefi_device_path = NULL;
45 bootefi_image_path = NULL;
46 image_addr = NULL;
47 image_size = 0;
48}
49
50/**
51 * efi_set_bootdev() - set boot device
52 *
53 * This function is called when a file is loaded, e.g. via the 'load' command.
54 * We use the path to this file to inform the UEFI binary about the boot device.
55 *
56 * @dev: device, e.g. "MMC"
57 * @devnr: number of the device, e.g. "1:2"
58 * @path: path to file loaded
59 * @buffer: buffer with file loaded
60 * @buffer_size: size of file loaded
61 */
62void efi_set_bootdev(const char *dev, const char *devnr, const char *path,
63 void *buffer, size_t buffer_size)
64{
65 struct efi_device_path *device, *image;
66 efi_status_t ret;
67
68 /* Forget overwritten image */
69 if (buffer + buffer_size >= image_addr &&
70 image_addr + image_size >= buffer)
71 efi_clear_bootdev();
72
73 /* Remember only PE-COFF and FIT images */
74 if (efi_check_pe(buffer, buffer_size, NULL) != EFI_SUCCESS) {
75#ifdef CONFIG_FIT
Simon Glassd563c252021-02-15 17:08:09 -070076 if (fit_check_format(buffer, IMAGE_SIZE_INVAL))
Heinrich Schuchardt6b821592021-01-12 12:46:24 +010077 return;
78 /*
79 * FIT images of type EFI_OS are started via command bootm.
80 * We should not use their boot device with the bootefi command.
81 */
82 buffer = 0;
83 buffer_size = 0;
84#else
85 return;
86#endif
87 }
88
89 /* efi_set_bootdev() is typically called repeatedly, recover memory */
90 efi_clear_bootdev();
91
92 image_addr = buffer;
93 image_size = buffer_size;
94
95 ret = efi_dp_from_name(dev, devnr, path, &device, &image);
96 if (ret == EFI_SUCCESS) {
97 bootefi_device_path = device;
98 if (image) {
99 /* FIXME: image should not contain device */
100 struct efi_device_path *image_tmp = image;
101
102 efi_dp_split_file_path(image, &device, &image);
103 efi_free_pool(image_tmp);
104 }
105 bootefi_image_path = image;
106 } else {
107 efi_clear_bootdev();
108 }
109}
110
111/**
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200112 * efi_env_set_load_options() - set load options from environment variable
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200113 *
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100114 * @handle: the image handle
115 * @env_var: name of the environment variable
116 * @load_options: pointer to load options (output)
117 * Return: status code
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200118 */
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200119static efi_status_t efi_env_set_load_options(efi_handle_t handle,
120 const char *env_var,
121 u16 **load_options)
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200122{
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200123 const char *env = env_get(env_var);
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200124 size_t size;
Heinrich Schuchardtde527802018-08-31 21:31:33 +0200125 u16 *pos;
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +0900126 efi_status_t ret;
127
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100128 *load_options = NULL;
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200129 if (!env)
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200130 return EFI_SUCCESS;
131 size = sizeof(u16) * (utf8_utf16_strlen(env) + 1);
132 pos = calloc(size, 1);
133 if (!pos)
AKASHI Takahiroe25a7b82019-04-19 12:22:28 +0900134 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100135 *load_options = pos;
Heinrich Schuchardtde527802018-08-31 21:31:33 +0200136 utf8_utf16_strcpy(&pos, env);
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200137 ret = efi_set_load_options(handle, size, *load_options);
138 if (ret != EFI_SUCCESS) {
139 free(*load_options);
140 *load_options = NULL;
141 }
142 return ret;
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200143}
144
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200145#if !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
146
Simon Glass5d618df2018-08-08 03:54:30 -0600147/**
148 * copy_fdt() - Copy the device tree to a new location available to EFI
149 *
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100150 * The FDT is copied to a suitable location within the EFI memory map.
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100151 * Additional 12 KiB are added to the space in case the device tree needs to be
Simon Glass5d618df2018-08-08 03:54:30 -0600152 * expanded later with fdt_open_into().
153 *
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100154 * @fdtp: On entry a pointer to the flattened device tree.
155 * On exit a pointer to the copy of the flattened device tree.
Heinrich Schuchardt96af56e2018-11-12 18:55:22 +0100156 * FDT start
157 * Return: status code
Simon Glass5d618df2018-08-08 03:54:30 -0600158 */
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100159static efi_status_t copy_fdt(void **fdtp)
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200160{
Alexander Graffdbae012016-04-11 23:51:01 +0200161 unsigned long fdt_ram_start = -1L, fdt_pages;
Simon Glass5d618df2018-08-08 03:54:30 -0600162 efi_status_t ret = 0;
163 void *fdt, *new_fdt;
Alexander Graffdbae012016-04-11 23:51:01 +0200164 u64 new_fdt_addr;
Simon Glass5d618df2018-08-08 03:54:30 -0600165 uint fdt_size;
Alexander Graffdbae012016-04-11 23:51:01 +0200166 int i;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200167
Simon Glass5d618df2018-08-08 03:54:30 -0600168 for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) {
169 u64 ram_start = gd->bd->bi_dram[i].start;
170 u64 ram_size = gd->bd->bi_dram[i].size;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200171
Alexander Graffdbae012016-04-11 23:51:01 +0200172 if (!ram_size)
173 continue;
174
175 if (ram_start < fdt_ram_start)
176 fdt_ram_start = ram_start;
177 }
178
Simon Glass56bbcc12018-06-18 08:08:25 -0600179 /*
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100180 * Give us at least 12 KiB of breathing room in case the device tree
181 * needs to be expanded later.
Simon Glass56bbcc12018-06-18 08:08:25 -0600182 */
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100183 fdt = *fdtp;
Heinrich Schuchardtdcdca292018-11-18 17:58:49 +0100184 fdt_pages = efi_size_in_pages(fdt_totalsize(fdt) + 0x3000);
185 fdt_size = fdt_pages << EFI_PAGE_SHIFT;
Alexander Graffdbae012016-04-11 23:51:01 +0200186
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100187 /*
188 * Safe fdt location is at 127 MiB.
189 * On the sandbox convert from the sandbox address space.
190 */
191 new_fdt_addr = (uintptr_t)map_sysmem(fdt_ram_start + 0x7f00000 +
192 fdt_size, 0);
Simon Glass5d618df2018-08-08 03:54:30 -0600193 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardte00764b2020-05-06 20:32:31 +0200194 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass5d618df2018-08-08 03:54:30 -0600195 &new_fdt_addr);
196 if (ret != EFI_SUCCESS) {
Alexander Graffdbae012016-04-11 23:51:01 +0200197 /* If we can't put it there, put it somewhere */
xypron.glpk@gmx.def6b99122017-08-11 21:19:25 +0200198 new_fdt_addr = (ulong)memalign(EFI_PAGE_SIZE, fdt_size);
Simon Glass5d618df2018-08-08 03:54:30 -0600199 ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
Heinrich Schuchardte00764b2020-05-06 20:32:31 +0200200 EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
Simon Glass5d618df2018-08-08 03:54:30 -0600201 &new_fdt_addr);
202 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200203 log_err("ERROR: Failed to reserve space for FDT\n");
Simon Glass5d618df2018-08-08 03:54:30 -0600204 goto done;
Alexander Graf9b9b7162017-07-03 13:32:35 +0200205 }
Alexander Graffdbae012016-04-11 23:51:01 +0200206 }
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100207 new_fdt = (void *)(uintptr_t)new_fdt_addr;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200208 memcpy(new_fdt, fdt, fdt_totalsize(fdt));
209 fdt_set_totalsize(new_fdt, fdt_size);
210
Heinrich Schuchardtb23f9b72018-11-18 17:58:52 +0100211 *fdtp = (void *)(uintptr_t)new_fdt_addr;
Simon Glass5d618df2018-08-08 03:54:30 -0600212done:
213 return ret;
Alexander Graf2ff5cc32016-04-11 16:55:26 +0200214}
215
Heinrich Schuchardt928de7d2020-08-27 12:52:20 +0200216/**
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200217 * get_config_table() - get configuration table
218 *
219 * @guid: GUID of the configuration table
220 * Return: pointer to configuration table or NULL
221 */
222static void *get_config_table(const efi_guid_t *guid)
223{
224 size_t i;
225
226 for (i = 0; i < systab.nr_tables; i++) {
227 if (!guidcmp(guid, &systab.tables[i].guid))
228 return systab.tables[i].table;
229 }
230 return NULL;
Alexander Graf22c88bf2018-04-06 09:40:51 +0200231}
232
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200233#endif /* !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) */
234
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900235/**
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100236 * efi_install_fdt() - install device tree
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200237 *
Heinrich Schuchardtb112ac22020-02-07 22:10:49 +0100238 * If fdt is not EFI_FDT_USE_INTERNAL, the device tree located at that memory
239 * address will will be installed as configuration table, otherwise the device
240 * tree located at the address indicated by environment variable fdt_addr or as
241 * fallback fdtcontroladdr will be used.
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200242 *
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100243 * On architectures using ACPI tables device trees shall not be installed as
244 * configuration table.
Heinrich Schuchardta3086cd2019-05-12 20:16:25 +0200245 *
Heinrich Schuchardtb112ac22020-02-07 22:10:49 +0100246 * @fdt: address of device tree or EFI_FDT_USE_INTERNAL to use the
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100247 * the hardware device tree as indicated by environment variable
248 * fdt_addr or as fallback the internal device tree as indicated by
249 * the environment variable fdtcontroladdr
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900250 * Return: status code
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900251 */
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100252efi_status_t efi_install_fdt(void *fdt)
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900253{
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200254 /*
255 * The EBBR spec requires that we have either an FDT or an ACPI table
256 * but not both.
257 */
258#if CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100259 if (fdt) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200260 log_err("ERROR: can't have ACPI table and device tree.\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200261 return EFI_LOAD_ERROR;
262 }
263#else
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900264 bootm_headers_t img = { 0 };
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900265 efi_status_t ret;
266
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100267 if (fdt == EFI_FDT_USE_INTERNAL) {
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100268 const char *fdt_opt;
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100269 uintptr_t fdt_addr;
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100270
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200271 /* Look for device tree that is already installed */
272 if (get_config_table(&efi_guid_fdt))
273 return EFI_SUCCESS;
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100274 /* Check if there is a hardware device tree */
275 fdt_opt = env_get("fdt_addr");
276 /* Use our own device tree as fallback */
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200277 if (!fdt_opt) {
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100278 fdt_opt = env_get("fdtcontroladdr");
279 if (!fdt_opt) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200280 log_err("ERROR: need device tree\n");
Heinrich Schuchardte478ad52019-12-04 12:31:12 +0100281 return EFI_NOT_FOUND;
282 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200283 }
284 fdt_addr = simple_strtoul(fdt_opt, NULL, 16);
285 if (!fdt_addr) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200286 log_err("ERROR: invalid $fdt_addr or $fdtcontroladdr\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200287 return EFI_LOAD_ERROR;
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900288 }
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100289 fdt = map_sysmem(fdt_addr, 0);
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200290 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900291
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200292 /* Install device tree */
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200293 if (fdt_check_header(fdt)) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200294 log_err("ERROR: invalid device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200295 return EFI_LOAD_ERROR;
296 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900297
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200298 /* Prepare device tree for payload */
299 ret = copy_fdt(&fdt);
300 if (ret) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200301 log_err("ERROR: out of memory\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200302 return EFI_OUT_OF_RESOURCES;
303 }
AKASHI Takahiro451e9912019-04-19 12:22:30 +0900304
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200305 if (image_setup_libfdt(&img, fdt, 0, NULL)) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200306 log_err("ERROR: failed to process device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200307 return EFI_LOAD_ERROR;
308 }
309
Heinrich Schuchardt74811c82020-03-14 10:59:34 +0100310 /* Create memory reservations as indicated by the device tree */
311 efi_carve_out_dt_rsv(fdt);
312
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200313 /* Install device tree as UEFI table */
314 ret = efi_install_configuration_table(&efi_guid_fdt, fdt);
315 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200316 log_err("ERROR: failed to install device tree\n");
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200317 return ret;
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900318 }
Heinrich Schuchardt4420a332019-04-20 13:33:55 +0200319#endif /* GENERATE_ACPI_TABLE */
AKASHI Takahirocc02f172019-04-19 12:22:29 +0900320
321 return EFI_SUCCESS;
322}
323
Simon Glass4d77ee62018-11-25 20:14:39 -0700324/**
Heinrich Schuchardt3c3a7352018-09-23 17:21:51 +0200325 * do_bootefi_exec() - execute EFI binary
326 *
Heinrich Schuchardtaa4a66c2020-08-15 23:10:22 +0200327 * The image indicated by @handle is started. When it returns the allocated
328 * memory for the @load_options is freed.
329 *
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900330 * @handle: handle of loaded image
Heinrich Schuchardtaa4a66c2020-08-15 23:10:22 +0200331 * @load_options: load options
Heinrich Schuchardt3c3a7352018-09-23 17:21:51 +0200332 * Return: status code
333 *
334 * Load the EFI binary into a newly assigned memory unwinding the relocation
335 * information, install the loaded image protocol, and call the binary.
Alexander Grafe2b04f22016-03-10 00:27:20 +0100336 */
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200337static efi_status_t do_bootefi_exec(efi_handle_t handle, void *load_options)
Alexander Grafe2b04f22016-03-10 00:27:20 +0100338{
Heinrich Schuchardt4b055a22018-03-03 15:29:01 +0100339 efi_status_t ret;
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200340 efi_uintn_t exit_data_size = 0;
341 u16 *exit_data = NULL;
Rob Clark18ceba72017-10-10 08:23:06 -0400342
Heinrich Schuchardtaf64c3e2021-01-24 14:34:12 +0000343 /* On ARM switch from EL3 or secure mode to EL2 or non-secure mode */
344 switch_to_non_secure_mode();
345
Alexander Grafe2b04f22016-03-10 00:27:20 +0100346 /* Call our payload! */
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200347 ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data));
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200348 if (ret != EFI_SUCCESS) {
349 log_err("## Application failed, r = %lu\n",
350 ret & ~EFI_ERROR_MASK);
351 if (exit_data) {
352 log_err("## %ls\n", exit_data);
353 efi_free_pool(exit_data);
354 }
Heinrich Schuchardt3d445122019-04-30 17:57:30 +0200355 }
Rob Clarkf8db9222017-09-13 18:05:33 -0400356
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900357 efi_restore_gd();
Simon Glass4d77ee62018-11-25 20:14:39 -0700358
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100359 free(load_options);
Rob Clarkf8db9222017-09-13 18:05:33 -0400360
361 return ret;
Alexander Grafe2b04f22016-03-10 00:27:20 +0100362}
363
AKASHI Takahirocf819832019-04-19 12:22:33 +0900364/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200365 * do_efibootmgr() - execute EFI boot manager
AKASHI Takahirocf819832019-04-19 12:22:33 +0900366 *
AKASHI Takahirocf819832019-04-19 12:22:33 +0900367 * Return: status code
AKASHI Takahirocf819832019-04-19 12:22:33 +0900368 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200369static int do_efibootmgr(void)
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900370{
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900371 efi_handle_t handle;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900372 efi_status_t ret;
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200373 void *load_options;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900374
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200375 ret = efi_bootmgr_load(&handle, &load_options);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900376 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200377 log_notice("EFI boot manager: Cannot load any image\n");
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900378 return CMD_RET_FAILURE;
379 }
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900380
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200381 ret = do_bootefi_exec(handle, load_options);
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900382
AKASHI Takahirocf819832019-04-19 12:22:33 +0900383 if (ret != EFI_SUCCESS)
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900384 return CMD_RET_FAILURE;
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900385
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900386 return CMD_RET_SUCCESS;
AKASHI Takahiro758733d2019-04-19 12:22:32 +0900387}
388
Heinrich Schuchardt031ea8f2019-07-14 13:00:44 +0200389/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200390 * do_bootefi_image() - execute EFI binary
391 *
392 * Set up memory image for the binary to be loaded, prepare device path, and
393 * then call do_bootefi_exec() to execute it.
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900394 *
395 * @image_opt: string of image start address
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900396 * Return: status code
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900397 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200398static int do_bootefi_image(const char *image_opt)
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900399{
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900400 void *image_buf;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900401 unsigned long addr, size;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900402 efi_status_t ret;
403
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900404#ifdef CONFIG_CMD_BOOTEFI_HELLO
405 if (!strcmp(image_opt, "hello")) {
Heinrich Schuchardt6a7ae672021-01-12 17:44:08 +0100406 image_buf = __efi_helloworld_begin;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900407 size = __efi_helloworld_end - __efi_helloworld_begin;
Heinrich Schuchardt6b821592021-01-12 12:46:24 +0100408 efi_clear_bootdev();
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900409 } else
410#endif
411 {
Heinrich Schuchardt6b821592021-01-12 12:46:24 +0100412 addr = strtoul(image_opt, NULL, 16);
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900413 /* Check that a numeric value was passed */
Heinrich Schuchardt6b821592021-01-12 12:46:24 +0100414 if (!addr)
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900415 return CMD_RET_USAGE;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900416
Heinrich Schuchardt6b821592021-01-12 12:46:24 +0100417 image_buf = map_sysmem(addr, 0);
418
419 if (image_buf != image_addr) {
420 log_err("No UEFI binary known at %s\n", image_opt);
421 return CMD_RET_FAILURE;
422 }
423 size = image_size;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900424 }
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100425 ret = efi_run_image(image_buf, size);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900426
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100427 if (ret != EFI_SUCCESS)
428 return CMD_RET_FAILURE;
429
430 return CMD_RET_SUCCESS;
431}
432
433/**
434 * efi_run_image() - run loaded UEFI image
435 *
436 * @source_buffer: memory address of the UEFI image
437 * @source_size: size of the UEFI image
438 * Return: status code
439 */
440efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size)
441{
442 efi_handle_t mem_handle = NULL, handle;
443 struct efi_device_path *file_path = NULL;
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000444 struct efi_device_path *msg_path;
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100445 efi_status_t ret;
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000446 u16 *load_options;
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100447
448 if (!bootefi_device_path || !bootefi_image_path) {
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900449 /*
450 * Special case for efi payload not loaded from disk,
451 * such as 'bootefi hello' or for example payload
452 * loaded directly into memory via JTAG, etc:
453 */
454 file_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE,
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100455 (uintptr_t)source_buffer,
456 source_size);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900457 /*
458 * Make sure that device for device_path exist
459 * in load_image(). Otherwise, shell and grub will fail.
460 */
461 ret = efi_create_handle(&mem_handle);
462 if (ret != EFI_SUCCESS)
463 goto out;
464
465 ret = efi_add_protocol(mem_handle, &efi_guid_device_path,
466 file_path);
467 if (ret != EFI_SUCCESS)
468 goto out;
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000469 msg_path = file_path;
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900470 } else {
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100471 file_path = efi_dp_append(bootefi_device_path,
472 bootefi_image_path);
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000473 msg_path = bootefi_image_path;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900474 }
475
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000476 log_info("Booting %pD\n", msg_path);
477
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100478 ret = EFI_CALL(efi_load_image(false, efi_root, file_path, source_buffer,
479 source_size, &handle));
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000480 if (ret != EFI_SUCCESS) {
481 log_err("Loading image failed\n");
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900482 goto out;
Heinrich Schuchardtc3a9c9c2020-08-25 17:54:05 +0000483 }
Heinrich Schuchardta7647a72020-08-07 17:49:39 +0200484
485 /* Transfer environment variable as load options */
486 ret = efi_env_set_load_options(handle, "bootargs", &load_options);
487 if (ret != EFI_SUCCESS)
488 goto out;
489
490 ret = do_bootefi_exec(handle, load_options);
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900491
492out:
Heinrich Schuchardt6e35d3b2020-04-20 12:44:56 +0200493 efi_delete_handle(mem_handle);
494 efi_free_pool(file_path);
Heinrich Schuchardtffb90592019-12-07 20:51:06 +0100495 return ret;
AKASHI Takahirofbd3ba52019-04-19 12:22:34 +0900496}
497
Simon Glass93f25592018-11-25 20:14:37 -0700498#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900499static efi_status_t bootefi_run_prepare(const char *load_options_path,
500 struct efi_device_path *device_path,
501 struct efi_device_path *image_path,
502 struct efi_loaded_image_obj **image_objp,
503 struct efi_loaded_image **loaded_image_infop)
504{
505 efi_status_t ret;
Heinrich Schuchardte6263952020-01-03 22:53:42 +0100506 u16 *load_options;
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900507
508 ret = efi_setup_loaded_image(device_path, image_path, image_objp,
509 loaded_image_infop);
510 if (ret != EFI_SUCCESS)
511 return ret;
512
513 /* Transfer environment variable as load options */
Heinrich Schuchardt25c6be52020-08-07 17:47:13 +0200514 return efi_env_set_load_options((efi_handle_t)*image_objp,
515 load_options_path,
516 &load_options);
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900517}
518
Simon Glass93f25592018-11-25 20:14:37 -0700519/**
520 * bootefi_test_prepare() - prepare to run an EFI test
521 *
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100522 * Prepare to run a test as if it were provided by a loaded image.
Simon Glass93f25592018-11-25 20:14:37 -0700523 *
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100524 * @image_objp: pointer to be set to the loaded image handle
525 * @loaded_image_infop: pointer to be set to the loaded image protocol
526 * @path: dummy file path used to construct the device path
527 * set in the loaded image protocol
528 * @load_options_path: name of a U-Boot environment variable. Its value is
529 * set as load options in the loaded image protocol.
530 * Return: status code
Simon Glass93f25592018-11-25 20:14:37 -0700531 */
532static efi_status_t bootefi_test_prepare
533 (struct efi_loaded_image_obj **image_objp,
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100534 struct efi_loaded_image **loaded_image_infop, const char *path,
535 const char *load_options_path)
Simon Glass93f25592018-11-25 20:14:37 -0700536{
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100537 efi_status_t ret;
538
Simon Glass93f25592018-11-25 20:14:37 -0700539 /* Construct a dummy device path */
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100540 bootefi_device_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, 0, 0);
Simon Glass93f25592018-11-25 20:14:37 -0700541 if (!bootefi_device_path)
542 return EFI_OUT_OF_RESOURCES;
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100543
Simon Glass93f25592018-11-25 20:14:37 -0700544 bootefi_image_path = efi_dp_from_file(NULL, 0, path);
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100545 if (!bootefi_image_path) {
546 ret = EFI_OUT_OF_RESOURCES;
547 goto failure;
548 }
549
550 ret = bootefi_run_prepare(load_options_path, bootefi_device_path,
551 bootefi_image_path, image_objp,
552 loaded_image_infop);
553 if (ret == EFI_SUCCESS)
554 return ret;
Simon Glass93f25592018-11-25 20:14:37 -0700555
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100556failure:
Heinrich Schuchardt6b821592021-01-12 12:46:24 +0100557 efi_clear_bootdev();
Heinrich Schuchardtfd9cbe32019-01-12 14:42:40 +0100558 return ret;
Simon Glass93f25592018-11-25 20:14:37 -0700559}
560
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900561/**
562 * bootefi_run_finish() - finish up after running an EFI test
563 *
564 * @loaded_image_info: Pointer to a struct which holds the loaded image info
565 * @image_obj: Pointer to a struct which holds the loaded image object
566 */
567static void bootefi_run_finish(struct efi_loaded_image_obj *image_obj,
568 struct efi_loaded_image *loaded_image_info)
569{
570 efi_restore_gd();
571 free(loaded_image_info->load_options);
572 efi_delete_handle(&image_obj->header);
573}
574
575/**
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200576 * do_efi_selftest() - execute EFI selftest
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900577 *
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900578 * Return: status code
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900579 */
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200580static int do_efi_selftest(void)
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900581{
582 struct efi_loaded_image_obj *image_obj;
583 struct efi_loaded_image *loaded_image_info;
584 efi_status_t ret;
585
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900586 ret = bootefi_test_prepare(&image_obj, &loaded_image_info,
587 "\\selftest", "efi_selftest");
588 if (ret != EFI_SUCCESS)
589 return CMD_RET_FAILURE;
590
591 /* Execute the test */
592 ret = EFI_CALL(efi_selftest(&image_obj->header, &systab));
593 bootefi_run_finish(image_obj, loaded_image_info);
594
595 return ret != EFI_SUCCESS;
596}
Simon Glass93f25592018-11-25 20:14:37 -0700597#endif /* CONFIG_CMD_BOOTEFI_SELFTEST */
598
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200599/**
600 * do_bootefi() - execute `bootefi` command
601 *
602 * @cmdtp: table entry describing command
603 * @flag: bitmap indicating how the command was invoked
604 * @argc: number of arguments
605 * @argv: command line arguments
606 * Return: status code
607 */
Simon Glassed38aef2020-05-10 11:40:03 -0600608static int do_bootefi(struct cmd_tbl *cmdtp, int flag, int argc,
609 char *const argv[])
Alexander Grafe2b04f22016-03-10 00:27:20 +0100610{
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200611 efi_status_t ret;
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100612 void *fdt;
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200613
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900614 if (argc < 2)
615 return CMD_RET_USAGE;
AKASHI Takahirocf819832019-04-19 12:22:33 +0900616
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200617 /* Initialize EFI drivers */
618 ret = efi_init_obj_list();
619 if (ret != EFI_SUCCESS) {
Heinrich Schuchardtbb38a1f2020-07-17 20:21:00 +0200620 log_err("Error: Cannot initialize UEFI sub-system, r = %lu\n",
621 ret & ~EFI_ERROR_MASK);
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200622 return CMD_RET_FAILURE;
623 }
624
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100625 if (argc > 2) {
626 uintptr_t fdt_addr;
627
Heinrich Schuchardt6fbb8ac2019-11-28 06:46:09 +0100628 fdt_addr = simple_strtoul(argv[2], NULL, 16);
Heinrich Schuchardt62467412019-12-08 01:07:01 +0100629 fdt = map_sysmem(fdt_addr, 0);
630 } else {
631 fdt = EFI_FDT_USE_INTERNAL;
632 }
633 ret = efi_install_fdt(fdt);
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200634 if (ret == EFI_INVALID_PARAMETER)
635 return CMD_RET_USAGE;
636 else if (ret != EFI_SUCCESS)
637 return CMD_RET_FAILURE;
638
Heinrich Schuchardtb2625e82021-01-15 19:02:50 +0100639 if (IS_ENABLED(CONFIG_CMD_BOOTEFI_BOOTMGR)) {
640 if (!strcmp(argv[1], "bootmgr"))
641 return do_efibootmgr();
642 }
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900643#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
Heinrich Schuchardtb2625e82021-01-15 19:02:50 +0100644 if (!strcmp(argv[1], "selftest"))
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200645 return do_efi_selftest();
AKASHI Takahiro09a81c72019-04-19 12:22:31 +0900646#endif
Simon Glassfac4ced2016-11-07 08:47:08 -0700647
Heinrich Schuchardt8fc56c62019-05-12 20:16:25 +0200648 return do_bootefi_image(argv[1]);
Alexander Grafe2b04f22016-03-10 00:27:20 +0100649}
650
651#ifdef CONFIG_SYS_LONGHELP
652static char bootefi_help_text[] =
Alexander Graf54c1e832016-04-14 16:07:53 +0200653 "<image address> [fdt address]\n"
654 " - boot EFI payload stored at address <image address>.\n"
655 " If specified, the device tree located at <fdt address> gets\n"
Simon Glassfac4ced2016-11-07 08:47:08 -0700656 " exposed as EFI configuration table.\n"
657#ifdef CONFIG_CMD_BOOTEFI_HELLO
Heinrich Schuchardtd33ae3e2017-09-15 10:06:11 +0200658 "bootefi hello\n"
659 " - boot a sample Hello World application stored within U-Boot\n"
660#endif
661#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
Heinrich Schuchardt44ab21b2018-03-03 15:29:03 +0100662 "bootefi selftest [fdt address]\n"
Heinrich Schuchardtd33ae3e2017-09-15 10:06:11 +0200663 " - boot an EFI selftest application stored within U-Boot\n"
Heinrich Schuchardt02efd5d2017-10-18 18:13:13 +0200664 " Use environment variable efi_selftest to select a single test.\n"
665 " Use 'setenv efi_selftest list' to enumerate all tests.\n"
Simon Glassfac4ced2016-11-07 08:47:08 -0700666#endif
Heinrich Schuchardtb2625e82021-01-15 19:02:50 +0100667#ifdef CONFIG_CMD_BOOTEFI_BOOTMGR
AKASHI Takahiro14ff23b2019-04-19 12:22:35 +0900668 "bootefi bootmgr [fdt address]\n"
Rob Clarkc84c1102017-09-13 18:05:38 -0400669 " - load and boot EFI payload based on BootOrder/BootXXXX variables.\n"
670 "\n"
671 " If specified, the device tree located at <fdt address> gets\n"
Heinrich Schuchardtb2625e82021-01-15 19:02:50 +0100672 " exposed as EFI configuration table.\n"
673#endif
674 ;
Alexander Grafe2b04f22016-03-10 00:27:20 +0100675#endif
676
677U_BOOT_CMD(
Alexander Graf54c1e832016-04-14 16:07:53 +0200678 bootefi, 3, 0, do_bootefi,
Sergey Kubushyn268f19e2016-06-07 11:14:31 -0700679 "Boots an EFI payload from memory",
Alexander Grafe2b04f22016-03-10 00:27:20 +0100680 bootefi_help_text
681);