]> Git Repo - J-u-boot.git/blame - cmd/bootefi.c
efi: Use asmlinkage for EFIAPI
[J-u-boot.git] / cmd / bootefi.c
CommitLineData
b9939336
AG
1/*
2 * EFI application loader
3 *
4 * Copyright (c) 2016 Alexander Graf
5 *
6 * SPDX-License-Identifier: GPL-2.0+
7 */
8
9#include <common.h>
10#include <command.h>
f9d334bd 11#include <dm/device.h>
b9939336
AG
12#include <efi_loader.h>
13#include <errno.h>
14#include <libfdt.h>
15#include <libfdt_env.h>
ad0c1a3d 16#include <memalign.h>
0d9d501f
AG
17#include <asm/global_data.h>
18
19DECLARE_GLOBAL_DATA_PTR;
b9939336
AG
20
21/*
22 * When booting using the "bootefi" command, we don't know which
23 * physical device the file came from. So we create a pseudo-device
24 * called "bootefi" with the device path /bootefi.
25 *
26 * In addition to the originating device we also declare the file path
27 * of "bootefi" based loads to be /bootefi.
28 */
0f4060eb 29static struct efi_device_path_file_path bootefi_image_path[] = {
b9939336
AG
30 {
31 .dp.type = DEVICE_PATH_TYPE_MEDIA_DEVICE,
32 .dp.sub_type = DEVICE_PATH_SUB_TYPE_FILE_PATH,
0f4060eb 33 .dp.length = sizeof(bootefi_image_path[0]),
b9939336
AG
34 .str = { 'b','o','o','t','e','f','i' },
35 }, {
36 .dp.type = DEVICE_PATH_TYPE_END,
37 .dp.sub_type = DEVICE_PATH_SUB_TYPE_END,
0f4060eb 38 .dp.length = sizeof(bootefi_image_path[0]),
b9939336
AG
39 }
40};
41
c07ad7c0
AG
42static struct efi_device_path_file_path bootefi_device_path[] = {
43 {
44 .dp.type = DEVICE_PATH_TYPE_MEDIA_DEVICE,
45 .dp.sub_type = DEVICE_PATH_SUB_TYPE_FILE_PATH,
46 .dp.length = sizeof(bootefi_image_path[0]),
47 .str = { 'b','o','o','t','e','f','i' },
48 }, {
49 .dp.type = DEVICE_PATH_TYPE_END,
50 .dp.sub_type = DEVICE_PATH_SUB_TYPE_END,
51 .dp.length = sizeof(bootefi_image_path[0]),
52 }
53};
54
b9939336
AG
55static efi_status_t bootefi_open_dp(void *handle, efi_guid_t *protocol,
56 void **protocol_interface, void *agent_handle,
57 void *controller_handle, uint32_t attributes)
58{
c07ad7c0 59 *protocol_interface = bootefi_device_path;
b9939336
AG
60 return EFI_SUCCESS;
61}
62
63/* The EFI loaded_image interface for the image executed via "bootefi" */
64static struct efi_loaded_image loaded_image_info = {
c07ad7c0 65 .device_handle = bootefi_device_path,
0f4060eb 66 .file_path = bootefi_image_path,
b9939336
AG
67};
68
69/* The EFI object struct for the image executed via "bootefi" */
70static struct efi_object loaded_image_info_obj = {
71 .handle = &loaded_image_info,
72 .protocols = {
73 {
74 /*
75 * When asking for the loaded_image interface, just
76 * return handle which points to loaded_image_info
77 */
78 .guid = &efi_guid_loaded_image,
79 .open = &efi_return_handle,
80 },
81 {
82 /*
83 * When asking for the device path interface, return
c07ad7c0 84 * bootefi_device_path
b9939336
AG
85 */
86 .guid = &efi_guid_device_path,
87 .open = &bootefi_open_dp,
88 },
89 },
90};
91
92/* The EFI object struct for the device the "bootefi" image was loaded from */
93static struct efi_object bootefi_device_obj = {
c07ad7c0 94 .handle = bootefi_device_path,
b9939336
AG
95 .protocols = {
96 {
97 /* When asking for the device path interface, return
c07ad7c0 98 * bootefi_device_path */
b9939336
AG
99 .guid = &efi_guid_device_path,
100 .open = &bootefi_open_dp,
101 }
102 },
103};
104
0d9d501f
AG
105static void *copy_fdt(void *fdt)
106{
107 u64 fdt_size = fdt_totalsize(fdt);
ad0c1a3d
AG
108 unsigned long fdt_ram_start = -1L, fdt_pages;
109 u64 new_fdt_addr;
0d9d501f 110 void *new_fdt;
ad0c1a3d 111 int i;
0d9d501f 112
ad0c1a3d
AG
113 for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) {
114 u64 ram_start = gd->bd->bi_dram[i].start;
115 u64 ram_size = gd->bd->bi_dram[i].size;
0d9d501f 116
ad0c1a3d
AG
117 if (!ram_size)
118 continue;
119
120 if (ram_start < fdt_ram_start)
121 fdt_ram_start = ram_start;
122 }
123
124 /* Give us at least 4kb breathing room */
125 fdt_size = ALIGN(fdt_size + 4096, 4096);
126 fdt_pages = fdt_size >> EFI_PAGE_SHIFT;
127
128 /* Safe fdt location is at 128MB */
129 new_fdt_addr = fdt_ram_start + (128 * 1024 * 1024) + fdt_size;
130 if (efi_allocate_pages(1, EFI_BOOT_SERVICES_DATA, fdt_pages,
131 &new_fdt_addr) != EFI_SUCCESS) {
132 /* If we can't put it there, put it somewhere */
133 new_fdt_addr = (ulong)memalign(4096, fdt_size);
134 }
135 new_fdt = (void*)(ulong)new_fdt_addr;
0d9d501f
AG
136 memcpy(new_fdt, fdt, fdt_totalsize(fdt));
137 fdt_set_totalsize(new_fdt, fdt_size);
138
139 return new_fdt;
140}
141
b9939336
AG
142/*
143 * Load an EFI payload into a newly allocated piece of memory, register all
144 * EFI objects it would want to access and jump to it.
145 */
1c39809b 146static unsigned long do_bootefi_exec(void *efi, void *fdt)
b9939336
AG
147{
148 ulong (*entry)(void *image_handle, struct efi_system_table *st);
149 ulong fdt_pages, fdt_size, fdt_start, fdt_end;
dea2174d 150 bootm_headers_t img = { 0 };
b9939336
AG
151
152 /*
153 * gd lives in a fixed register which may get clobbered while we execute
154 * the payload. So save it here and restore it on every callback entry
155 */
156 efi_save_gd();
157
1c39809b 158 if (fdt && !fdt_check_header(fdt)) {
dea2174d 159 /* Prepare fdt for payload */
0d9d501f
AG
160 fdt = copy_fdt(fdt);
161
162 if (image_setup_libfdt(&img, fdt, 0, NULL)) {
dea2174d
AG
163 printf("ERROR: Failed to process device tree\n");
164 return -EINVAL;
165 }
166
167 /* Link to it in the efi tables */
b9939336 168 systab.tables[0].guid = EFI_FDT_GUID;
0d9d501f 169 systab.tables[0].table = fdt;
b9939336
AG
170 systab.nr_tables = 1;
171
172 /* And reserve the space in the memory map */
0d9d501f
AG
173 fdt_start = ((ulong)fdt) & ~EFI_PAGE_MASK;
174 fdt_end = ((ulong)fdt) + fdt_totalsize(fdt);
b9939336
AG
175 fdt_size = (fdt_end - fdt_start) + EFI_PAGE_MASK;
176 fdt_pages = fdt_size >> EFI_PAGE_SHIFT;
177 /* Give a bootloader the chance to modify the device tree */
178 fdt_pages += 2;
179 efi_add_memory_map(fdt_start, fdt_pages,
180 EFI_BOOT_SERVICES_DATA, true);
b9939336 181 } else {
1c39809b 182 printf("WARNING: Invalid device tree, expect boot to fail\n");
b9939336
AG
183 systab.nr_tables = 0;
184 }
185
186 /* Load the EFI payload */
187 entry = efi_load_pe(efi, &loaded_image_info);
188 if (!entry)
189 return -ENOENT;
190
191 /* Initialize and populate EFI object list */
192 INIT_LIST_HEAD(&efi_obj_list);
193 list_add_tail(&loaded_image_info_obj.link, &efi_obj_list);
194 list_add_tail(&bootefi_device_obj.link, &efi_obj_list);
195#ifdef CONFIG_PARTITIONS
196 efi_disk_register();
197#endif
be8d3241
AG
198#ifdef CONFIG_LCD
199 efi_gop_register();
200#endif
0efe1bcf
AG
201#ifdef CONFIG_NET
202 void *nethandle = loaded_image_info.device_handle;
203 efi_net_register(&nethandle);
204
205 if (!memcmp(bootefi_device_path[0].str, "N\0e\0t", 6))
206 loaded_image_info.device_handle = nethandle;
207#endif
e663b350
AG
208#ifdef CONFIG_GENERATE_SMBIOS_TABLE
209 efi_smbios_register();
210#endif
b9939336 211
80a4800e
AG
212 /* Initialize EFI runtime services */
213 efi_reset_system_init();
214 efi_get_time_init();
215
b9939336 216 /* Call our payload! */
edcef3ba 217 debug("%s:%d Jumping to 0x%lx\n", __func__, __LINE__, (long)entry);
a86aeaf2
AG
218
219 if (setjmp(&loaded_image_info.exit_jmp)) {
220 efi_status_t status = loaded_image_info.exit_status;
221 return status == EFI_SUCCESS ? 0 : -EINVAL;
222 }
223
b9939336
AG
224 return entry(&loaded_image_info, &systab);
225}
226
227
228/* Interpreter command to boot an arbitrary EFI image from memory */
229static int do_bootefi(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
230{
1c39809b
AG
231 char *saddr, *sfdt;
232 unsigned long addr, fdt_addr = 0;
b9939336
AG
233 int r = 0;
234
235 if (argc < 2)
3c1dcef6 236 return CMD_RET_USAGE;
b9939336
AG
237 saddr = argv[1];
238
239 addr = simple_strtoul(saddr, NULL, 16);
240
1c39809b
AG
241 if (argc > 2) {
242 sfdt = argv[2];
243 fdt_addr = simple_strtoul(sfdt, NULL, 16);
244 }
245
b9939336 246 printf("## Starting EFI application at 0x%08lx ...\n", addr);
1c39809b 247 r = do_bootefi_exec((void *)addr, (void*)fdt_addr);
b9939336
AG
248 printf("## Application terminated, r = %d\n", r);
249
250 if (r != 0)
251 r = 1;
252
253 return r;
254}
255
256#ifdef CONFIG_SYS_LONGHELP
257static char bootefi_help_text[] =
1c39809b
AG
258 "<image address> [fdt address]\n"
259 " - boot EFI payload stored at address <image address>.\n"
260 " If specified, the device tree located at <fdt address> gets\n"
261 " exposed as EFI configuration table.\n";
b9939336
AG
262#endif
263
264U_BOOT_CMD(
1c39809b 265 bootefi, 3, 0, do_bootefi,
92dfd922 266 "Boots an EFI payload from memory",
b9939336
AG
267 bootefi_help_text
268);
0f4060eb 269
c07ad7c0 270void efi_set_bootdev(const char *dev, const char *devnr, const char *path)
0f4060eb 271{
8c3df0bf 272 __maybe_unused struct blk_desc *desc;
ecbe1a07 273 char devname[32] = { 0 }; /* dp->str is u16[32] long */
0f4060eb
AG
274 char *colon;
275
f9d334bd
AG
276#if defined(CONFIG_BLK) || defined(CONFIG_ISO_PARTITION)
277 desc = blk_get_dev(dev, simple_strtol(devnr, NULL, 10));
278#endif
279
280#ifdef CONFIG_BLK
281 if (desc) {
282 snprintf(devname, sizeof(devname), "%s", desc->bdev->name);
283 } else
284#endif
285
286 {
287 /* Assemble the condensed device name we use in efi_disk.c */
288 snprintf(devname, sizeof(devname), "%s%s", dev, devnr);
289 }
290
0f4060eb 291 colon = strchr(devname, ':');
8c3df0bf
AG
292
293#ifdef CONFIG_ISO_PARTITION
294 /* For ISOs we create partition block devices */
8c3df0bf
AG
295 if (desc && (desc->type != DEV_TYPE_UNKNOWN) &&
296 (desc->part_type == PART_TYPE_ISO)) {
297 if (!colon)
f9d334bd
AG
298 snprintf(devname, sizeof(devname), "%s:1", devname);
299
8c3df0bf
AG
300 colon = NULL;
301 }
302#endif
303
0f4060eb
AG
304 if (colon)
305 *colon = '\0';
306
c07ad7c0
AG
307 /* Patch bootefi_device_path to the target device */
308 memset(bootefi_device_path[0].str, 0, sizeof(bootefi_device_path[0].str));
309 ascii2unicode(bootefi_device_path[0].str, devname);
310
311 /* Patch bootefi_image_path to the target file path */
0f4060eb 312 memset(bootefi_image_path[0].str, 0, sizeof(bootefi_image_path[0].str));
49271666
AG
313 if (strcmp(dev, "Net")) {
314 /* Add leading / to fs paths, because they're absolute */
315 snprintf(devname, sizeof(devname), "/%s", path);
316 } else {
317 snprintf(devname, sizeof(devname), "%s", path);
318 }
0f4060eb
AG
319 ascii2unicode(bootefi_image_path[0].str, devname);
320}
This page took 0.116887 seconds and 4 git commands to generate.