]>
Commit | Line | Data |
---|---|---|
f739fcd8 | 1 | // SPDX-License-Identifier: GPL-2.0+ |
b9939336 AG |
2 | /* |
3 | * EFI application loader | |
4 | * | |
5 | * Copyright (c) 2016 Alexander Graf | |
b9939336 AG |
6 | */ |
7 | ||
c0018374 HS |
8 | #define LOG_CATEGORY LOGC_EFI |
9 | ||
b9939336 | 10 | #include <common.h> |
82d01f04 | 11 | #include <bootm.h> |
f6c6df7e | 12 | #include <charset.h> |
b9939336 | 13 | #include <command.h> |
9d922450 | 14 | #include <dm.h> |
b9939336 | 15 | #include <efi_loader.h> |
d78e40d6 | 16 | #include <efi_selftest.h> |
7b51b576 | 17 | #include <env.h> |
b9939336 | 18 | #include <errno.h> |
4d72caa5 | 19 | #include <image.h> |
c0018374 | 20 | #include <log.h> |
336d4615 | 21 | #include <malloc.h> |
401d1c4f | 22 | #include <asm/global_data.h> |
b08c8c48 MY |
23 | #include <linux/libfdt.h> |
24 | #include <linux/libfdt_env.h> | |
354264b3 | 25 | #include <mapmem.h> |
ad0c1a3d | 26 | #include <memalign.h> |
e275458c SG |
27 | #include <asm-generic/sections.h> |
28 | #include <linux/linkage.h> | |
0d9d501f AG |
29 | |
30 | DECLARE_GLOBAL_DATA_PTR; | |
b9939336 | 31 | |
95c5553e RC |
32 | static struct efi_device_path *bootefi_image_path; |
33 | static struct efi_device_path *bootefi_device_path; | |
5f59518a HS |
34 | static void *image_addr; |
35 | static size_t image_size; | |
36 | ||
37 | /** | |
38 | * efi_clear_bootdev() - clear boot device | |
39 | */ | |
40 | static void efi_clear_bootdev(void) | |
41 | { | |
42 | efi_free_pool(bootefi_device_path); | |
43 | efi_free_pool(bootefi_image_path); | |
44 | bootefi_device_path = NULL; | |
45 | bootefi_image_path = NULL; | |
46 | image_addr = NULL; | |
47 | image_size = 0; | |
48 | } | |
49 | ||
50 | /** | |
51 | * efi_set_bootdev() - set boot device | |
52 | * | |
53 | * This function is called when a file is loaded, e.g. via the 'load' command. | |
54 | * We use the path to this file to inform the UEFI binary about the boot device. | |
55 | * | |
56 | * @dev: device, e.g. "MMC" | |
57 | * @devnr: number of the device, e.g. "1:2" | |
58 | * @path: path to file loaded | |
59 | * @buffer: buffer with file loaded | |
60 | * @buffer_size: size of file loaded | |
61 | */ | |
62 | void efi_set_bootdev(const char *dev, const char *devnr, const char *path, | |
63 | void *buffer, size_t buffer_size) | |
64 | { | |
65 | struct efi_device_path *device, *image; | |
66 | efi_status_t ret; | |
67 | ||
d837cb1e SG |
68 | log_debug("dev=%s, devnr=%s, path=%s, buffer=%p, size=%zx\n", dev, |
69 | devnr, path, buffer, buffer_size); | |
70 | ||
5f59518a HS |
71 | /* Forget overwritten image */ |
72 | if (buffer + buffer_size >= image_addr && | |
73 | image_addr + image_size >= buffer) | |
74 | efi_clear_bootdev(); | |
75 | ||
76 | /* Remember only PE-COFF and FIT images */ | |
77 | if (efi_check_pe(buffer, buffer_size, NULL) != EFI_SUCCESS) { | |
d837cb1e SG |
78 | if (IS_ENABLED(CONFIG_FIT) && |
79 | !fit_check_format(buffer, IMAGE_SIZE_INVAL)) { | |
80 | /* | |
81 | * FIT images of type EFI_OS are started via command | |
82 | * bootm. We should not use their boot device with the | |
83 | * bootefi command. | |
84 | */ | |
85 | buffer = 0; | |
86 | buffer_size = 0; | |
87 | } else { | |
88 | log_debug("- not remembering image\n"); | |
5f59518a | 89 | return; |
d837cb1e | 90 | } |
5f59518a HS |
91 | } |
92 | ||
93 | /* efi_set_bootdev() is typically called repeatedly, recover memory */ | |
94 | efi_clear_bootdev(); | |
95 | ||
96 | image_addr = buffer; | |
97 | image_size = buffer_size; | |
98 | ||
99 | ret = efi_dp_from_name(dev, devnr, path, &device, &image); | |
100 | if (ret == EFI_SUCCESS) { | |
101 | bootefi_device_path = device; | |
102 | if (image) { | |
103 | /* FIXME: image should not contain device */ | |
104 | struct efi_device_path *image_tmp = image; | |
105 | ||
106 | efi_dp_split_file_path(image, &device, &image); | |
107 | efi_free_pool(image_tmp); | |
108 | } | |
109 | bootefi_image_path = image; | |
d837cb1e SG |
110 | log_debug("- recorded device %ls\n", efi_dp_str(device)); |
111 | if (image) | |
112 | log_debug("- and image %ls\n", efi_dp_str(image)); | |
5f59518a | 113 | } else { |
d837cb1e | 114 | log_debug("- efi_dp_from_name() failed, err=%lx\n", ret); |
5f59518a HS |
115 | efi_clear_bootdev(); |
116 | } | |
117 | } | |
b9939336 | 118 | |
810371a0 | 119 | /** |
1064d049 | 120 | * efi_env_set_load_options() - set load options from environment variable |
d78e40d6 | 121 | * |
a3850e40 HS |
122 | * @handle: the image handle |
123 | * @env_var: name of the environment variable | |
124 | * @load_options: pointer to load options (output) | |
125 | * Return: status code | |
d78e40d6 | 126 | */ |
1064d049 HS |
127 | static efi_status_t efi_env_set_load_options(efi_handle_t handle, |
128 | const char *env_var, | |
129 | u16 **load_options) | |
d78e40d6 | 130 | { |
d78e40d6 | 131 | const char *env = env_get(env_var); |
1064d049 | 132 | size_t size; |
7086a71a | 133 | u16 *pos; |
defa7b8e AT |
134 | efi_status_t ret; |
135 | ||
a3850e40 | 136 | *load_options = NULL; |
d78e40d6 | 137 | if (!env) |
1064d049 HS |
138 | return EFI_SUCCESS; |
139 | size = sizeof(u16) * (utf8_utf16_strlen(env) + 1); | |
140 | pos = calloc(size, 1); | |
141 | if (!pos) | |
defa7b8e | 142 | return EFI_OUT_OF_RESOURCES; |
a3850e40 | 143 | *load_options = pos; |
7086a71a | 144 | utf8_utf16_strcpy(&pos, env); |
1064d049 HS |
145 | ret = efi_set_load_options(handle, size, *load_options); |
146 | if (ret != EFI_SUCCESS) { | |
147 | free(*load_options); | |
148 | *load_options = NULL; | |
149 | } | |
150 | return ret; | |
d78e40d6 HS |
151 | } |
152 | ||
6182495e HS |
153 | #if !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) |
154 | ||
9dff4900 SG |
155 | /** |
156 | * copy_fdt() - Copy the device tree to a new location available to EFI | |
157 | * | |
16b615d9 | 158 | * The FDT is copied to a suitable location within the EFI memory map. |
c3772ca1 | 159 | * Additional 12 KiB are added to the space in case the device tree needs to be |
9dff4900 SG |
160 | * expanded later with fdt_open_into(). |
161 | * | |
16b615d9 HS |
162 | * @fdtp: On entry a pointer to the flattened device tree. |
163 | * On exit a pointer to the copy of the flattened device tree. | |
4574d1b3 HS |
164 | * FDT start |
165 | * Return: status code | |
9dff4900 | 166 | */ |
16b615d9 | 167 | static efi_status_t copy_fdt(void **fdtp) |
0d9d501f | 168 | { |
ad0c1a3d | 169 | unsigned long fdt_ram_start = -1L, fdt_pages; |
9dff4900 SG |
170 | efi_status_t ret = 0; |
171 | void *fdt, *new_fdt; | |
ad0c1a3d | 172 | u64 new_fdt_addr; |
9dff4900 | 173 | uint fdt_size; |
ad0c1a3d | 174 | int i; |
0d9d501f | 175 | |
9dff4900 SG |
176 | for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) { |
177 | u64 ram_start = gd->bd->bi_dram[i].start; | |
178 | u64 ram_size = gd->bd->bi_dram[i].size; | |
0d9d501f | 179 | |
ad0c1a3d AG |
180 | if (!ram_size) |
181 | continue; | |
182 | ||
183 | if (ram_start < fdt_ram_start) | |
184 | fdt_ram_start = ram_start; | |
185 | } | |
186 | ||
bc9a638a | 187 | /* |
c3772ca1 HS |
188 | * Give us at least 12 KiB of breathing room in case the device tree |
189 | * needs to be expanded later. | |
bc9a638a | 190 | */ |
16b615d9 | 191 | fdt = *fdtp; |
c3772ca1 HS |
192 | fdt_pages = efi_size_in_pages(fdt_totalsize(fdt) + 0x3000); |
193 | fdt_size = fdt_pages << EFI_PAGE_SHIFT; | |
ad0c1a3d | 194 | |
16b615d9 HS |
195 | /* |
196 | * Safe fdt location is at 127 MiB. | |
197 | * On the sandbox convert from the sandbox address space. | |
198 | */ | |
199 | new_fdt_addr = (uintptr_t)map_sysmem(fdt_ram_start + 0x7f00000 + | |
200 | fdt_size, 0); | |
9dff4900 | 201 | ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS, |
42a426e0 | 202 | EFI_ACPI_RECLAIM_MEMORY, fdt_pages, |
9dff4900 SG |
203 | &new_fdt_addr); |
204 | if (ret != EFI_SUCCESS) { | |
ad0c1a3d | 205 | /* If we can't put it there, put it somewhere */ |
a44bffcc | 206 | new_fdt_addr = (ulong)memalign(EFI_PAGE_SIZE, fdt_size); |
9dff4900 | 207 | ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS, |
42a426e0 | 208 | EFI_ACPI_RECLAIM_MEMORY, fdt_pages, |
9dff4900 SG |
209 | &new_fdt_addr); |
210 | if (ret != EFI_SUCCESS) { | |
c0018374 | 211 | log_err("ERROR: Failed to reserve space for FDT\n"); |
9dff4900 | 212 | goto done; |
85a6e9b3 | 213 | } |
ad0c1a3d | 214 | } |
16b615d9 | 215 | new_fdt = (void *)(uintptr_t)new_fdt_addr; |
0d9d501f AG |
216 | memcpy(new_fdt, fdt, fdt_totalsize(fdt)); |
217 | fdt_set_totalsize(new_fdt, fdt_size); | |
218 | ||
16b615d9 | 219 | *fdtp = (void *)(uintptr_t)new_fdt_addr; |
9dff4900 SG |
220 | done: |
221 | return ret; | |
0d9d501f AG |
222 | } |
223 | ||
6182495e HS |
224 | /** |
225 | * get_config_table() - get configuration table | |
226 | * | |
227 | * @guid: GUID of the configuration table | |
228 | * Return: pointer to configuration table or NULL | |
229 | */ | |
230 | static void *get_config_table(const efi_guid_t *guid) | |
231 | { | |
232 | size_t i; | |
233 | ||
234 | for (i = 0; i < systab.nr_tables; i++) { | |
235 | if (!guidcmp(guid, &systab.tables[i].guid)) | |
236 | return systab.tables[i].table; | |
237 | } | |
238 | return NULL; | |
239 | } | |
240 | ||
241 | #endif /* !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) */ | |
242 | ||
e878e6a7 | 243 | /** |
7a597259 | 244 | * efi_install_fdt() - install device tree |
e2d82f8b | 245 | * |
7d4d551e HS |
246 | * If fdt is not EFI_FDT_USE_INTERNAL, the device tree located at that memory |
247 | * address will will be installed as configuration table, otherwise the device | |
248 | * tree located at the address indicated by environment variable fdt_addr or as | |
249 | * fallback fdtcontroladdr will be used. | |
e2d82f8b | 250 | * |
7a597259 HS |
251 | * On architectures using ACPI tables device trees shall not be installed as |
252 | * configuration table. | |
e2d82f8b | 253 | * |
7d4d551e | 254 | * @fdt: address of device tree or EFI_FDT_USE_INTERNAL to use the |
753aa18f HS |
255 | * the hardware device tree as indicated by environment variable |
256 | * fdt_addr or as fallback the internal device tree as indicated by | |
257 | * the environment variable fdtcontroladdr | |
e878e6a7 | 258 | * Return: status code |
e878e6a7 | 259 | */ |
f64f2232 | 260 | efi_status_t efi_install_fdt(void *fdt) |
e878e6a7 | 261 | { |
6182495e HS |
262 | /* |
263 | * The EBBR spec requires that we have either an FDT or an ACPI table | |
264 | * but not both. | |
265 | */ | |
266 | #if CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) | |
f64f2232 | 267 | if (fdt) { |
0832dd29 AG |
268 | log_warning("WARNING: Can't have ACPI table and device tree - ignoring DT.\n"); |
269 | return EFI_SUCCESS; | |
6182495e HS |
270 | } |
271 | #else | |
3ffc52fd | 272 | bootm_headers_t img = { 0 }; |
e878e6a7 AT |
273 | efi_status_t ret; |
274 | ||
f64f2232 | 275 | if (fdt == EFI_FDT_USE_INTERNAL) { |
7a597259 | 276 | const char *fdt_opt; |
f64f2232 | 277 | uintptr_t fdt_addr; |
7a597259 | 278 | |
6182495e HS |
279 | /* Look for device tree that is already installed */ |
280 | if (get_config_table(&efi_guid_fdt)) | |
281 | return EFI_SUCCESS; | |
753aa18f HS |
282 | /* Check if there is a hardware device tree */ |
283 | fdt_opt = env_get("fdt_addr"); | |
284 | /* Use our own device tree as fallback */ | |
6182495e | 285 | if (!fdt_opt) { |
753aa18f HS |
286 | fdt_opt = env_get("fdtcontroladdr"); |
287 | if (!fdt_opt) { | |
c0018374 | 288 | log_err("ERROR: need device tree\n"); |
753aa18f HS |
289 | return EFI_NOT_FOUND; |
290 | } | |
6182495e | 291 | } |
7e5f460e | 292 | fdt_addr = hextoul(fdt_opt, NULL); |
6182495e | 293 | if (!fdt_addr) { |
c0018374 | 294 | log_err("ERROR: invalid $fdt_addr or $fdtcontroladdr\n"); |
6182495e | 295 | return EFI_LOAD_ERROR; |
3ffc52fd | 296 | } |
f64f2232 | 297 | fdt = map_sysmem(fdt_addr, 0); |
6182495e | 298 | } |
3ffc52fd | 299 | |
6182495e | 300 | /* Install device tree */ |
6182495e | 301 | if (fdt_check_header(fdt)) { |
c0018374 | 302 | log_err("ERROR: invalid device tree\n"); |
6182495e HS |
303 | return EFI_LOAD_ERROR; |
304 | } | |
3ffc52fd | 305 | |
6182495e HS |
306 | /* Prepare device tree for payload */ |
307 | ret = copy_fdt(&fdt); | |
308 | if (ret) { | |
c0018374 | 309 | log_err("ERROR: out of memory\n"); |
6182495e HS |
310 | return EFI_OUT_OF_RESOURCES; |
311 | } | |
3ffc52fd | 312 | |
6182495e | 313 | if (image_setup_libfdt(&img, fdt, 0, NULL)) { |
c0018374 | 314 | log_err("ERROR: failed to process device tree\n"); |
6182495e HS |
315 | return EFI_LOAD_ERROR; |
316 | } | |
317 | ||
fef907b2 HS |
318 | /* Create memory reservations as indicated by the device tree */ |
319 | efi_carve_out_dt_rsv(fdt); | |
320 | ||
a2f1482f IA |
321 | efi_try_purge_kaslr_seed(fdt); |
322 | ||
6182495e HS |
323 | /* Install device tree as UEFI table */ |
324 | ret = efi_install_configuration_table(&efi_guid_fdt, fdt); | |
325 | if (ret != EFI_SUCCESS) { | |
c0018374 | 326 | log_err("ERROR: failed to install device tree\n"); |
6182495e | 327 | return ret; |
e878e6a7 | 328 | } |
6182495e | 329 | #endif /* GENERATE_ACPI_TABLE */ |
e878e6a7 AT |
330 | |
331 | return EFI_SUCCESS; | |
332 | } | |
333 | ||
c982874e HS |
334 | /** |
335 | * do_bootefi_exec() - execute EFI binary | |
336 | * | |
72e1fcac HS |
337 | * The image indicated by @handle is started. When it returns the allocated |
338 | * memory for the @load_options is freed. | |
339 | * | |
6b95b38c | 340 | * @handle: handle of loaded image |
72e1fcac | 341 | * @load_options: load options |
c982874e HS |
342 | * Return: status code |
343 | * | |
344 | * Load the EFI binary into a newly assigned memory unwinding the relocation | |
345 | * information, install the loaded image protocol, and call the binary. | |
b9939336 | 346 | */ |
0ad64007 | 347 | static efi_status_t do_bootefi_exec(efi_handle_t handle, void *load_options) |
b9939336 | 348 | { |
45204b10 | 349 | efi_status_t ret; |
556d8dc9 HS |
350 | efi_uintn_t exit_data_size = 0; |
351 | u16 *exit_data = NULL; | |
bf19273e | 352 | |
82d01f04 HS |
353 | /* On ARM switch from EL3 or secure mode to EL2 or non-secure mode */ |
354 | switch_to_non_secure_mode(); | |
355 | ||
3fa9ed9a MK |
356 | /* |
357 | * The UEFI standard requires that the watchdog timer is set to five | |
358 | * minutes when invoking an EFI boot option. | |
359 | * | |
360 | * Unified Extensible Firmware Interface (UEFI), version 2.7 Errata A | |
361 | * 7.5. Miscellaneous Boot Services - EFI_BOOT_SERVICES.SetWatchdogTimer | |
362 | */ | |
363 | ret = efi_set_watchdog(300); | |
364 | if (ret != EFI_SUCCESS) { | |
365 | log_err("ERROR: Failed to set watchdog timer\n"); | |
366 | goto out; | |
367 | } | |
368 | ||
b9939336 | 369 | /* Call our payload! */ |
556d8dc9 | 370 | ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data)); |
c0018374 HS |
371 | if (ret != EFI_SUCCESS) { |
372 | log_err("## Application failed, r = %lu\n", | |
373 | ret & ~EFI_ERROR_MASK); | |
374 | if (exit_data) { | |
375 | log_err("## %ls\n", exit_data); | |
376 | efi_free_pool(exit_data); | |
377 | } | |
556d8dc9 | 378 | } |
95c5553e | 379 | |
3fc2b163 | 380 | efi_restore_gd(); |
5e2f0391 | 381 | |
3fa9ed9a | 382 | out: |
a3850e40 | 383 | free(load_options); |
95c5553e | 384 | |
53f6a5aa IA |
385 | if (IS_ENABLED(CONFIG_EFI_LOAD_FILE2_INITRD)) |
386 | efi_initrd_deregister(); | |
387 | ||
3fa9ed9a MK |
388 | /* Control is returned to U-Boot, disable EFI watchdog */ |
389 | efi_set_watchdog(0); | |
390 | ||
95c5553e | 391 | return ret; |
b9939336 AG |
392 | } |
393 | ||
d6b21894 | 394 | /** |
7e92db81 | 395 | * do_efibootmgr() - execute EFI boot manager |
d6b21894 | 396 | * |
d6b21894 | 397 | * Return: status code |
d6b21894 | 398 | */ |
7e92db81 | 399 | static int do_efibootmgr(void) |
cc999d58 | 400 | { |
6b95b38c | 401 | efi_handle_t handle; |
d6b21894 | 402 | efi_status_t ret; |
0ad64007 | 403 | void *load_options; |
d6b21894 | 404 | |
0ad64007 | 405 | ret = efi_bootmgr_load(&handle, &load_options); |
6b95b38c | 406 | if (ret != EFI_SUCCESS) { |
c0018374 | 407 | log_notice("EFI boot manager: Cannot load any image\n"); |
6b95b38c AT |
408 | return CMD_RET_FAILURE; |
409 | } | |
cc999d58 | 410 | |
0ad64007 | 411 | ret = do_bootefi_exec(handle, load_options); |
cc999d58 | 412 | |
d6b21894 | 413 | if (ret != EFI_SUCCESS) |
6b95b38c | 414 | return CMD_RET_FAILURE; |
cc999d58 | 415 | |
6b95b38c | 416 | return CMD_RET_SUCCESS; |
cc999d58 AT |
417 | } |
418 | ||
810371a0 | 419 | /** |
7e92db81 HS |
420 | * do_bootefi_image() - execute EFI binary |
421 | * | |
422 | * Set up memory image for the binary to be loaded, prepare device path, and | |
423 | * then call do_bootefi_exec() to execute it. | |
e2e4098e | 424 | * |
20589836 KE |
425 | * @image_opt: string with image start address |
426 | * @size_opt: string with image size or NULL | |
e2e4098e | 427 | * Return: status code |
e2e4098e | 428 | */ |
20589836 | 429 | static int do_bootefi_image(const char *image_opt, const char *size_opt) |
e2e4098e | 430 | { |
6b95b38c | 431 | void *image_buf; |
6b95b38c | 432 | unsigned long addr, size; |
e2e4098e AT |
433 | efi_status_t ret; |
434 | ||
e2e4098e AT |
435 | #ifdef CONFIG_CMD_BOOTEFI_HELLO |
436 | if (!strcmp(image_opt, "hello")) { | |
bb33c79e | 437 | image_buf = __efi_helloworld_begin; |
6b95b38c | 438 | size = __efi_helloworld_end - __efi_helloworld_begin; |
5f59518a | 439 | efi_clear_bootdev(); |
e2e4098e AT |
440 | } else |
441 | #endif | |
442 | { | |
5f59518a | 443 | addr = strtoul(image_opt, NULL, 16); |
e2e4098e | 444 | /* Check that a numeric value was passed */ |
5f59518a | 445 | if (!addr) |
e2e4098e | 446 | return CMD_RET_USAGE; |
5f59518a HS |
447 | image_buf = map_sysmem(addr, 0); |
448 | ||
20589836 KE |
449 | if (size_opt) { |
450 | size = strtoul(size_opt, NULL, 16); | |
451 | if (!size) | |
452 | return CMD_RET_USAGE; | |
453 | efi_clear_bootdev(); | |
454 | } else { | |
455 | if (image_buf != image_addr) { | |
456 | log_err("No UEFI binary known at %s\n", | |
457 | image_opt); | |
458 | return CMD_RET_FAILURE; | |
459 | } | |
460 | size = image_size; | |
5f59518a | 461 | } |
e2e4098e | 462 | } |
f9ceb6ac HS |
463 | ret = efi_run_image(image_buf, size); |
464 | ||
465 | if (ret != EFI_SUCCESS) | |
466 | return CMD_RET_FAILURE; | |
467 | ||
468 | return CMD_RET_SUCCESS; | |
469 | } | |
470 | ||
471 | /** | |
472 | * efi_run_image() - run loaded UEFI image | |
473 | * | |
474 | * @source_buffer: memory address of the UEFI image | |
475 | * @source_size: size of the UEFI image | |
476 | * Return: status code | |
477 | */ | |
478 | efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size) | |
479 | { | |
480 | efi_handle_t mem_handle = NULL, handle; | |
481 | struct efi_device_path *file_path = NULL; | |
c2f01039 | 482 | struct efi_device_path *msg_path; |
f9ceb6ac | 483 | efi_status_t ret; |
c2f01039 | 484 | u16 *load_options; |
e2e4098e | 485 | |
f9ceb6ac | 486 | if (!bootefi_device_path || !bootefi_image_path) { |
d837cb1e | 487 | log_debug("Not loaded from disk\n"); |
6b95b38c AT |
488 | /* |
489 | * Special case for efi payload not loaded from disk, | |
490 | * such as 'bootefi hello' or for example payload | |
491 | * loaded directly into memory via JTAG, etc: | |
492 | */ | |
493 | file_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, | |
f9ceb6ac HS |
494 | (uintptr_t)source_buffer, |
495 | source_size); | |
6b95b38c AT |
496 | /* |
497 | * Make sure that device for device_path exist | |
498 | * in load_image(). Otherwise, shell and grub will fail. | |
499 | */ | |
500 | ret = efi_create_handle(&mem_handle); | |
501 | if (ret != EFI_SUCCESS) | |
502 | goto out; | |
503 | ||
504 | ret = efi_add_protocol(mem_handle, &efi_guid_device_path, | |
505 | file_path); | |
506 | if (ret != EFI_SUCCESS) | |
507 | goto out; | |
c2f01039 | 508 | msg_path = file_path; |
6b95b38c | 509 | } else { |
f9ceb6ac HS |
510 | file_path = efi_dp_append(bootefi_device_path, |
511 | bootefi_image_path); | |
c2f01039 | 512 | msg_path = bootefi_image_path; |
d837cb1e | 513 | log_debug("Loaded from disk\n"); |
6b95b38c AT |
514 | } |
515 | ||
c2f01039 HS |
516 | log_info("Booting %pD\n", msg_path); |
517 | ||
f9ceb6ac HS |
518 | ret = EFI_CALL(efi_load_image(false, efi_root, file_path, source_buffer, |
519 | source_size, &handle)); | |
c2f01039 HS |
520 | if (ret != EFI_SUCCESS) { |
521 | log_err("Loading image failed\n"); | |
6b95b38c | 522 | goto out; |
c2f01039 | 523 | } |
0ad64007 HS |
524 | |
525 | /* Transfer environment variable as load options */ | |
526 | ret = efi_env_set_load_options(handle, "bootargs", &load_options); | |
527 | if (ret != EFI_SUCCESS) | |
528 | goto out; | |
529 | ||
530 | ret = do_bootefi_exec(handle, load_options); | |
6b95b38c AT |
531 | |
532 | out: | |
4fe050e6 HS |
533 | efi_delete_handle(mem_handle); |
534 | efi_free_pool(file_path); | |
f9ceb6ac | 535 | return ret; |
e2e4098e AT |
536 | } |
537 | ||
d9717eae | 538 | #ifdef CONFIG_CMD_BOOTEFI_SELFTEST |
3fc2b163 AT |
539 | static efi_status_t bootefi_run_prepare(const char *load_options_path, |
540 | struct efi_device_path *device_path, | |
541 | struct efi_device_path *image_path, | |
542 | struct efi_loaded_image_obj **image_objp, | |
543 | struct efi_loaded_image **loaded_image_infop) | |
544 | { | |
545 | efi_status_t ret; | |
a3850e40 | 546 | u16 *load_options; |
3fc2b163 AT |
547 | |
548 | ret = efi_setup_loaded_image(device_path, image_path, image_objp, | |
549 | loaded_image_infop); | |
550 | if (ret != EFI_SUCCESS) | |
551 | return ret; | |
552 | ||
553 | /* Transfer environment variable as load options */ | |
1064d049 HS |
554 | return efi_env_set_load_options((efi_handle_t)*image_objp, |
555 | load_options_path, | |
556 | &load_options); | |
3fc2b163 AT |
557 | } |
558 | ||
d9717eae SG |
559 | /** |
560 | * bootefi_test_prepare() - prepare to run an EFI test | |
561 | * | |
1504bb0d | 562 | * Prepare to run a test as if it were provided by a loaded image. |
d9717eae | 563 | * |
1504bb0d HS |
564 | * @image_objp: pointer to be set to the loaded image handle |
565 | * @loaded_image_infop: pointer to be set to the loaded image protocol | |
566 | * @path: dummy file path used to construct the device path | |
567 | * set in the loaded image protocol | |
568 | * @load_options_path: name of a U-Boot environment variable. Its value is | |
569 | * set as load options in the loaded image protocol. | |
570 | * Return: status code | |
d9717eae SG |
571 | */ |
572 | static efi_status_t bootefi_test_prepare | |
573 | (struct efi_loaded_image_obj **image_objp, | |
1504bb0d HS |
574 | struct efi_loaded_image **loaded_image_infop, const char *path, |
575 | const char *load_options_path) | |
d9717eae | 576 | { |
1504bb0d HS |
577 | efi_status_t ret; |
578 | ||
d9717eae | 579 | /* Construct a dummy device path */ |
1504bb0d | 580 | bootefi_device_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, 0, 0); |
d9717eae SG |
581 | if (!bootefi_device_path) |
582 | return EFI_OUT_OF_RESOURCES; | |
1504bb0d | 583 | |
d9717eae | 584 | bootefi_image_path = efi_dp_from_file(NULL, 0, path); |
1504bb0d HS |
585 | if (!bootefi_image_path) { |
586 | ret = EFI_OUT_OF_RESOURCES; | |
587 | goto failure; | |
588 | } | |
589 | ||
590 | ret = bootefi_run_prepare(load_options_path, bootefi_device_path, | |
591 | bootefi_image_path, image_objp, | |
592 | loaded_image_infop); | |
593 | if (ret == EFI_SUCCESS) | |
594 | return ret; | |
d9717eae | 595 | |
1504bb0d | 596 | failure: |
5f59518a | 597 | efi_clear_bootdev(); |
1504bb0d | 598 | return ret; |
d9717eae SG |
599 | } |
600 | ||
3fc2b163 AT |
601 | /** |
602 | * bootefi_run_finish() - finish up after running an EFI test | |
603 | * | |
604 | * @loaded_image_info: Pointer to a struct which holds the loaded image info | |
605 | * @image_obj: Pointer to a struct which holds the loaded image object | |
606 | */ | |
607 | static void bootefi_run_finish(struct efi_loaded_image_obj *image_obj, | |
608 | struct efi_loaded_image *loaded_image_info) | |
609 | { | |
610 | efi_restore_gd(); | |
611 | free(loaded_image_info->load_options); | |
612 | efi_delete_handle(&image_obj->header); | |
613 | } | |
614 | ||
615 | /** | |
7e92db81 | 616 | * do_efi_selftest() - execute EFI selftest |
3fc2b163 | 617 | * |
3fc2b163 | 618 | * Return: status code |
3fc2b163 | 619 | */ |
7e92db81 | 620 | static int do_efi_selftest(void) |
3fc2b163 AT |
621 | { |
622 | struct efi_loaded_image_obj *image_obj; | |
623 | struct efi_loaded_image *loaded_image_info; | |
624 | efi_status_t ret; | |
625 | ||
3fc2b163 AT |
626 | ret = bootefi_test_prepare(&image_obj, &loaded_image_info, |
627 | "\\selftest", "efi_selftest"); | |
628 | if (ret != EFI_SUCCESS) | |
629 | return CMD_RET_FAILURE; | |
630 | ||
631 | /* Execute the test */ | |
632 | ret = EFI_CALL(efi_selftest(&image_obj->header, &systab)); | |
633 | bootefi_run_finish(image_obj, loaded_image_info); | |
634 | ||
635 | return ret != EFI_SUCCESS; | |
636 | } | |
d9717eae SG |
637 | #endif /* CONFIG_CMD_BOOTEFI_SELFTEST */ |
638 | ||
7e92db81 HS |
639 | /** |
640 | * do_bootefi() - execute `bootefi` command | |
641 | * | |
642 | * @cmdtp: table entry describing command | |
643 | * @flag: bitmap indicating how the command was invoked | |
644 | * @argc: number of arguments | |
645 | * @argv: command line arguments | |
646 | * Return: status code | |
647 | */ | |
09140113 SG |
648 | static int do_bootefi(struct cmd_tbl *cmdtp, int flag, int argc, |
649 | char *const argv[]) | |
b9939336 | 650 | { |
7e92db81 | 651 | efi_status_t ret; |
8131c85a | 652 | char *img_addr, *img_size, *str_copy, *pos; |
f64f2232 | 653 | void *fdt; |
7e92db81 | 654 | |
3fc2b163 AT |
655 | if (argc < 2) |
656 | return CMD_RET_USAGE; | |
d6b21894 | 657 | |
7e92db81 HS |
658 | /* Initialize EFI drivers */ |
659 | ret = efi_init_obj_list(); | |
660 | if (ret != EFI_SUCCESS) { | |
c0018374 HS |
661 | log_err("Error: Cannot initialize UEFI sub-system, r = %lu\n", |
662 | ret & ~EFI_ERROR_MASK); | |
7e92db81 HS |
663 | return CMD_RET_FAILURE; |
664 | } | |
665 | ||
8131c85a | 666 | if (argc > 2) { |
f64f2232 HS |
667 | uintptr_t fdt_addr; |
668 | ||
7e5f460e | 669 | fdt_addr = hextoul(argv[2], NULL); |
f64f2232 HS |
670 | fdt = map_sysmem(fdt_addr, 0); |
671 | } else { | |
672 | fdt = EFI_FDT_USE_INTERNAL; | |
673 | } | |
674 | ret = efi_install_fdt(fdt); | |
7e92db81 HS |
675 | if (ret == EFI_INVALID_PARAMETER) |
676 | return CMD_RET_USAGE; | |
677 | else if (ret != EFI_SUCCESS) | |
678 | return CMD_RET_FAILURE; | |
679 | ||
ff2f532f HS |
680 | if (IS_ENABLED(CONFIG_CMD_BOOTEFI_BOOTMGR)) { |
681 | if (!strcmp(argv[1], "bootmgr")) | |
682 | return do_efibootmgr(); | |
683 | } | |
3fc2b163 | 684 | #ifdef CONFIG_CMD_BOOTEFI_SELFTEST |
ff2f532f | 685 | if (!strcmp(argv[1], "selftest")) |
7e92db81 | 686 | return do_efi_selftest(); |
3fc2b163 | 687 | #endif |
8131c85a HS |
688 | str_copy = strdup(argv[1]); |
689 | if (!str_copy) { | |
690 | log_err("Out of memory\n"); | |
691 | return CMD_RET_FAILURE; | |
692 | } | |
693 | pos = str_copy; | |
694 | img_addr = strsep(&pos, ":"); | |
695 | img_size = strsep(&pos, ":"); | |
696 | ret = do_bootefi_image(img_addr, img_size); | |
697 | free(str_copy); | |
3fc2b163 | 698 | |
8131c85a | 699 | return ret; |
b9939336 AG |
700 | } |
701 | ||
702 | #ifdef CONFIG_SYS_LONGHELP | |
703 | static char bootefi_help_text[] = | |
8131c85a HS |
704 | "<image address>[:<image size>] [<fdt address>]\n" |
705 | " - boot EFI payload\n" | |
c7ae3dfd | 706 | #ifdef CONFIG_CMD_BOOTEFI_HELLO |
623b3a57 HS |
707 | "bootefi hello\n" |
708 | " - boot a sample Hello World application stored within U-Boot\n" | |
709 | #endif | |
710 | #ifdef CONFIG_CMD_BOOTEFI_SELFTEST | |
bc4f9133 | 711 | "bootefi selftest [fdt address]\n" |
623b3a57 | 712 | " - boot an EFI selftest application stored within U-Boot\n" |
d78e40d6 HS |
713 | " Use environment variable efi_selftest to select a single test.\n" |
714 | " Use 'setenv efi_selftest list' to enumerate all tests.\n" | |
c7ae3dfd | 715 | #endif |
ff2f532f | 716 | #ifdef CONFIG_CMD_BOOTEFI_BOOTMGR |
6b95b38c | 717 | "bootefi bootmgr [fdt address]\n" |
9975fe96 RC |
718 | " - load and boot EFI payload based on BootOrder/BootXXXX variables.\n" |
719 | "\n" | |
720 | " If specified, the device tree located at <fdt address> gets\n" | |
ff2f532f HS |
721 | " exposed as EFI configuration table.\n" |
722 | #endif | |
723 | ; | |
b9939336 AG |
724 | #endif |
725 | ||
726 | U_BOOT_CMD( | |
20589836 | 727 | bootefi, 4, 0, do_bootefi, |
92dfd922 | 728 | "Boots an EFI payload from memory", |
b9939336 AG |
729 | bootefi_help_text |
730 | ); |