]>
Commit | Line | Data |
---|---|---|
b9939336 AG |
1 | /* |
2 | * EFI application loader | |
3 | * | |
4 | * Copyright (c) 2016 Alexander Graf | |
5 | * | |
6 | * SPDX-License-Identifier: GPL-2.0+ | |
7 | */ | |
8 | ||
9 | #include <common.h> | |
10 | #include <command.h> | |
f9d334bd | 11 | #include <dm/device.h> |
b9939336 AG |
12 | #include <efi_loader.h> |
13 | #include <errno.h> | |
14 | #include <libfdt.h> | |
15 | #include <libfdt_env.h> | |
ad0c1a3d | 16 | #include <memalign.h> |
0d9d501f AG |
17 | #include <asm/global_data.h> |
18 | ||
19 | DECLARE_GLOBAL_DATA_PTR; | |
b9939336 AG |
20 | |
21 | /* | |
22 | * When booting using the "bootefi" command, we don't know which | |
23 | * physical device the file came from. So we create a pseudo-device | |
24 | * called "bootefi" with the device path /bootefi. | |
25 | * | |
26 | * In addition to the originating device we also declare the file path | |
27 | * of "bootefi" based loads to be /bootefi. | |
28 | */ | |
0f4060eb | 29 | static struct efi_device_path_file_path bootefi_image_path[] = { |
b9939336 AG |
30 | { |
31 | .dp.type = DEVICE_PATH_TYPE_MEDIA_DEVICE, | |
32 | .dp.sub_type = DEVICE_PATH_SUB_TYPE_FILE_PATH, | |
0f4060eb | 33 | .dp.length = sizeof(bootefi_image_path[0]), |
b9939336 AG |
34 | .str = { 'b','o','o','t','e','f','i' }, |
35 | }, { | |
36 | .dp.type = DEVICE_PATH_TYPE_END, | |
37 | .dp.sub_type = DEVICE_PATH_SUB_TYPE_END, | |
0f4060eb | 38 | .dp.length = sizeof(bootefi_image_path[0]), |
b9939336 AG |
39 | } |
40 | }; | |
41 | ||
c07ad7c0 AG |
42 | static struct efi_device_path_file_path bootefi_device_path[] = { |
43 | { | |
44 | .dp.type = DEVICE_PATH_TYPE_MEDIA_DEVICE, | |
45 | .dp.sub_type = DEVICE_PATH_SUB_TYPE_FILE_PATH, | |
46 | .dp.length = sizeof(bootefi_image_path[0]), | |
47 | .str = { 'b','o','o','t','e','f','i' }, | |
48 | }, { | |
49 | .dp.type = DEVICE_PATH_TYPE_END, | |
50 | .dp.sub_type = DEVICE_PATH_SUB_TYPE_END, | |
51 | .dp.length = sizeof(bootefi_image_path[0]), | |
52 | } | |
53 | }; | |
54 | ||
b9939336 AG |
55 | static efi_status_t bootefi_open_dp(void *handle, efi_guid_t *protocol, |
56 | void **protocol_interface, void *agent_handle, | |
57 | void *controller_handle, uint32_t attributes) | |
58 | { | |
c07ad7c0 | 59 | *protocol_interface = bootefi_device_path; |
b9939336 AG |
60 | return EFI_SUCCESS; |
61 | } | |
62 | ||
63 | /* The EFI loaded_image interface for the image executed via "bootefi" */ | |
64 | static struct efi_loaded_image loaded_image_info = { | |
c07ad7c0 | 65 | .device_handle = bootefi_device_path, |
0f4060eb | 66 | .file_path = bootefi_image_path, |
b9939336 AG |
67 | }; |
68 | ||
69 | /* The EFI object struct for the image executed via "bootefi" */ | |
70 | static struct efi_object loaded_image_info_obj = { | |
71 | .handle = &loaded_image_info, | |
72 | .protocols = { | |
73 | { | |
74 | /* | |
75 | * When asking for the loaded_image interface, just | |
76 | * return handle which points to loaded_image_info | |
77 | */ | |
78 | .guid = &efi_guid_loaded_image, | |
79 | .open = &efi_return_handle, | |
80 | }, | |
81 | { | |
82 | /* | |
83 | * When asking for the device path interface, return | |
c07ad7c0 | 84 | * bootefi_device_path |
b9939336 AG |
85 | */ |
86 | .guid = &efi_guid_device_path, | |
87 | .open = &bootefi_open_dp, | |
88 | }, | |
89 | }, | |
90 | }; | |
91 | ||
92 | /* The EFI object struct for the device the "bootefi" image was loaded from */ | |
93 | static struct efi_object bootefi_device_obj = { | |
c07ad7c0 | 94 | .handle = bootefi_device_path, |
b9939336 AG |
95 | .protocols = { |
96 | { | |
97 | /* When asking for the device path interface, return | |
c07ad7c0 | 98 | * bootefi_device_path */ |
b9939336 AG |
99 | .guid = &efi_guid_device_path, |
100 | .open = &bootefi_open_dp, | |
101 | } | |
102 | }, | |
103 | }; | |
104 | ||
0d9d501f AG |
105 | static void *copy_fdt(void *fdt) |
106 | { | |
107 | u64 fdt_size = fdt_totalsize(fdt); | |
ad0c1a3d AG |
108 | unsigned long fdt_ram_start = -1L, fdt_pages; |
109 | u64 new_fdt_addr; | |
0d9d501f | 110 | void *new_fdt; |
ad0c1a3d | 111 | int i; |
0d9d501f | 112 | |
ad0c1a3d AG |
113 | for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) { |
114 | u64 ram_start = gd->bd->bi_dram[i].start; | |
115 | u64 ram_size = gd->bd->bi_dram[i].size; | |
0d9d501f | 116 | |
ad0c1a3d AG |
117 | if (!ram_size) |
118 | continue; | |
119 | ||
120 | if (ram_start < fdt_ram_start) | |
121 | fdt_ram_start = ram_start; | |
122 | } | |
123 | ||
124 | /* Give us at least 4kb breathing room */ | |
125 | fdt_size = ALIGN(fdt_size + 4096, 4096); | |
126 | fdt_pages = fdt_size >> EFI_PAGE_SHIFT; | |
127 | ||
128 | /* Safe fdt location is at 128MB */ | |
129 | new_fdt_addr = fdt_ram_start + (128 * 1024 * 1024) + fdt_size; | |
130 | if (efi_allocate_pages(1, EFI_BOOT_SERVICES_DATA, fdt_pages, | |
131 | &new_fdt_addr) != EFI_SUCCESS) { | |
132 | /* If we can't put it there, put it somewhere */ | |
133 | new_fdt_addr = (ulong)memalign(4096, fdt_size); | |
134 | } | |
135 | new_fdt = (void*)(ulong)new_fdt_addr; | |
0d9d501f AG |
136 | memcpy(new_fdt, fdt, fdt_totalsize(fdt)); |
137 | fdt_set_totalsize(new_fdt, fdt_size); | |
138 | ||
139 | return new_fdt; | |
140 | } | |
141 | ||
b9939336 AG |
142 | /* |
143 | * Load an EFI payload into a newly allocated piece of memory, register all | |
144 | * EFI objects it would want to access and jump to it. | |
145 | */ | |
1c39809b | 146 | static unsigned long do_bootefi_exec(void *efi, void *fdt) |
b9939336 AG |
147 | { |
148 | ulong (*entry)(void *image_handle, struct efi_system_table *st); | |
149 | ulong fdt_pages, fdt_size, fdt_start, fdt_end; | |
dea2174d | 150 | bootm_headers_t img = { 0 }; |
b9939336 AG |
151 | |
152 | /* | |
153 | * gd lives in a fixed register which may get clobbered while we execute | |
154 | * the payload. So save it here and restore it on every callback entry | |
155 | */ | |
156 | efi_save_gd(); | |
157 | ||
1c39809b | 158 | if (fdt && !fdt_check_header(fdt)) { |
dea2174d | 159 | /* Prepare fdt for payload */ |
0d9d501f AG |
160 | fdt = copy_fdt(fdt); |
161 | ||
162 | if (image_setup_libfdt(&img, fdt, 0, NULL)) { | |
dea2174d AG |
163 | printf("ERROR: Failed to process device tree\n"); |
164 | return -EINVAL; | |
165 | } | |
166 | ||
167 | /* Link to it in the efi tables */ | |
b9939336 | 168 | systab.tables[0].guid = EFI_FDT_GUID; |
0d9d501f | 169 | systab.tables[0].table = fdt; |
b9939336 AG |
170 | systab.nr_tables = 1; |
171 | ||
172 | /* And reserve the space in the memory map */ | |
0d9d501f AG |
173 | fdt_start = ((ulong)fdt) & ~EFI_PAGE_MASK; |
174 | fdt_end = ((ulong)fdt) + fdt_totalsize(fdt); | |
b9939336 AG |
175 | fdt_size = (fdt_end - fdt_start) + EFI_PAGE_MASK; |
176 | fdt_pages = fdt_size >> EFI_PAGE_SHIFT; | |
177 | /* Give a bootloader the chance to modify the device tree */ | |
178 | fdt_pages += 2; | |
179 | efi_add_memory_map(fdt_start, fdt_pages, | |
180 | EFI_BOOT_SERVICES_DATA, true); | |
b9939336 | 181 | } else { |
1c39809b | 182 | printf("WARNING: Invalid device tree, expect boot to fail\n"); |
b9939336 AG |
183 | systab.nr_tables = 0; |
184 | } | |
185 | ||
186 | /* Load the EFI payload */ | |
187 | entry = efi_load_pe(efi, &loaded_image_info); | |
188 | if (!entry) | |
189 | return -ENOENT; | |
190 | ||
191 | /* Initialize and populate EFI object list */ | |
192 | INIT_LIST_HEAD(&efi_obj_list); | |
193 | list_add_tail(&loaded_image_info_obj.link, &efi_obj_list); | |
194 | list_add_tail(&bootefi_device_obj.link, &efi_obj_list); | |
195 | #ifdef CONFIG_PARTITIONS | |
196 | efi_disk_register(); | |
197 | #endif | |
be8d3241 AG |
198 | #ifdef CONFIG_LCD |
199 | efi_gop_register(); | |
200 | #endif | |
0efe1bcf AG |
201 | #ifdef CONFIG_NET |
202 | void *nethandle = loaded_image_info.device_handle; | |
203 | efi_net_register(&nethandle); | |
204 | ||
205 | if (!memcmp(bootefi_device_path[0].str, "N\0e\0t", 6)) | |
206 | loaded_image_info.device_handle = nethandle; | |
207 | #endif | |
e663b350 AG |
208 | #ifdef CONFIG_GENERATE_SMBIOS_TABLE |
209 | efi_smbios_register(); | |
210 | #endif | |
b9939336 | 211 | |
80a4800e AG |
212 | /* Initialize EFI runtime services */ |
213 | efi_reset_system_init(); | |
214 | efi_get_time_init(); | |
215 | ||
b9939336 | 216 | /* Call our payload! */ |
edcef3ba | 217 | debug("%s:%d Jumping to 0x%lx\n", __func__, __LINE__, (long)entry); |
a86aeaf2 AG |
218 | |
219 | if (setjmp(&loaded_image_info.exit_jmp)) { | |
220 | efi_status_t status = loaded_image_info.exit_status; | |
221 | return status == EFI_SUCCESS ? 0 : -EINVAL; | |
222 | } | |
223 | ||
b9939336 AG |
224 | return entry(&loaded_image_info, &systab); |
225 | } | |
226 | ||
227 | ||
228 | /* Interpreter command to boot an arbitrary EFI image from memory */ | |
229 | static int do_bootefi(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[]) | |
230 | { | |
1c39809b AG |
231 | char *saddr, *sfdt; |
232 | unsigned long addr, fdt_addr = 0; | |
b9939336 AG |
233 | int r = 0; |
234 | ||
235 | if (argc < 2) | |
3c1dcef6 | 236 | return CMD_RET_USAGE; |
b9939336 AG |
237 | saddr = argv[1]; |
238 | ||
239 | addr = simple_strtoul(saddr, NULL, 16); | |
240 | ||
1c39809b AG |
241 | if (argc > 2) { |
242 | sfdt = argv[2]; | |
243 | fdt_addr = simple_strtoul(sfdt, NULL, 16); | |
244 | } | |
245 | ||
b9939336 | 246 | printf("## Starting EFI application at 0x%08lx ...\n", addr); |
1c39809b | 247 | r = do_bootefi_exec((void *)addr, (void*)fdt_addr); |
b9939336 AG |
248 | printf("## Application terminated, r = %d\n", r); |
249 | ||
250 | if (r != 0) | |
251 | r = 1; | |
252 | ||
253 | return r; | |
254 | } | |
255 | ||
256 | #ifdef CONFIG_SYS_LONGHELP | |
257 | static char bootefi_help_text[] = | |
1c39809b AG |
258 | "<image address> [fdt address]\n" |
259 | " - boot EFI payload stored at address <image address>.\n" | |
260 | " If specified, the device tree located at <fdt address> gets\n" | |
261 | " exposed as EFI configuration table.\n"; | |
b9939336 AG |
262 | #endif |
263 | ||
264 | U_BOOT_CMD( | |
1c39809b | 265 | bootefi, 3, 0, do_bootefi, |
92dfd922 | 266 | "Boots an EFI payload from memory", |
b9939336 AG |
267 | bootefi_help_text |
268 | ); | |
0f4060eb | 269 | |
c07ad7c0 | 270 | void efi_set_bootdev(const char *dev, const char *devnr, const char *path) |
0f4060eb | 271 | { |
8c3df0bf | 272 | __maybe_unused struct blk_desc *desc; |
ecbe1a07 | 273 | char devname[32] = { 0 }; /* dp->str is u16[32] long */ |
0f4060eb AG |
274 | char *colon; |
275 | ||
f9d334bd AG |
276 | #if defined(CONFIG_BLK) || defined(CONFIG_ISO_PARTITION) |
277 | desc = blk_get_dev(dev, simple_strtol(devnr, NULL, 10)); | |
278 | #endif | |
279 | ||
280 | #ifdef CONFIG_BLK | |
281 | if (desc) { | |
282 | snprintf(devname, sizeof(devname), "%s", desc->bdev->name); | |
283 | } else | |
284 | #endif | |
285 | ||
286 | { | |
287 | /* Assemble the condensed device name we use in efi_disk.c */ | |
288 | snprintf(devname, sizeof(devname), "%s%s", dev, devnr); | |
289 | } | |
290 | ||
0f4060eb | 291 | colon = strchr(devname, ':'); |
8c3df0bf AG |
292 | |
293 | #ifdef CONFIG_ISO_PARTITION | |
294 | /* For ISOs we create partition block devices */ | |
8c3df0bf AG |
295 | if (desc && (desc->type != DEV_TYPE_UNKNOWN) && |
296 | (desc->part_type == PART_TYPE_ISO)) { | |
297 | if (!colon) | |
f9d334bd AG |
298 | snprintf(devname, sizeof(devname), "%s:1", devname); |
299 | ||
8c3df0bf AG |
300 | colon = NULL; |
301 | } | |
302 | #endif | |
303 | ||
0f4060eb AG |
304 | if (colon) |
305 | *colon = '\0'; | |
306 | ||
c07ad7c0 AG |
307 | /* Patch bootefi_device_path to the target device */ |
308 | memset(bootefi_device_path[0].str, 0, sizeof(bootefi_device_path[0].str)); | |
309 | ascii2unicode(bootefi_device_path[0].str, devname); | |
310 | ||
311 | /* Patch bootefi_image_path to the target file path */ | |
0f4060eb | 312 | memset(bootefi_image_path[0].str, 0, sizeof(bootefi_image_path[0].str)); |
49271666 AG |
313 | if (strcmp(dev, "Net")) { |
314 | /* Add leading / to fs paths, because they're absolute */ | |
315 | snprintf(devname, sizeof(devname), "/%s", path); | |
316 | } else { | |
317 | snprintf(devname, sizeof(devname), "%s", path); | |
318 | } | |
0f4060eb AG |
319 | ascii2unicode(bootefi_image_path[0].str, devname); |
320 | } |