]> git.ipfire.org Git - people/ms/u-boot.git/blame - cmd/bootefi.c
Merge branch 'master' of git://git.denx.de/u-boot-rockchip
[people/ms/u-boot.git] / cmd / bootefi.c
CommitLineData
b9939336
AG
1/*
2 * EFI application loader
3 *
4 * Copyright (c) 2016 Alexander Graf
5 *
6 * SPDX-License-Identifier: GPL-2.0+
7 */
8
9#include <common.h>
10#include <command.h>
9d922450 11#include <dm.h>
b9939336
AG
12#include <efi_loader.h>
13#include <errno.h>
14#include <libfdt.h>
15#include <libfdt_env.h>
ad0c1a3d 16#include <memalign.h>
0d9d501f 17#include <asm/global_data.h>
e275458c
SG
18#include <asm-generic/sections.h>
19#include <linux/linkage.h>
0d9d501f
AG
20
21DECLARE_GLOBAL_DATA_PTR;
b9939336
AG
22
23/*
24 * When booting using the "bootefi" command, we don't know which
25 * physical device the file came from. So we create a pseudo-device
26 * called "bootefi" with the device path /bootefi.
27 *
28 * In addition to the originating device we also declare the file path
29 * of "bootefi" based loads to be /bootefi.
30 */
0f4060eb 31static struct efi_device_path_file_path bootefi_image_path[] = {
b9939336
AG
32 {
33 .dp.type = DEVICE_PATH_TYPE_MEDIA_DEVICE,
34 .dp.sub_type = DEVICE_PATH_SUB_TYPE_FILE_PATH,
0f4060eb 35 .dp.length = sizeof(bootefi_image_path[0]),
b9939336
AG
36 .str = { 'b','o','o','t','e','f','i' },
37 }, {
38 .dp.type = DEVICE_PATH_TYPE_END,
39 .dp.sub_type = DEVICE_PATH_SUB_TYPE_END,
0f4060eb 40 .dp.length = sizeof(bootefi_image_path[0]),
b9939336
AG
41 }
42};
43
c07ad7c0
AG
44static struct efi_device_path_file_path bootefi_device_path[] = {
45 {
46 .dp.type = DEVICE_PATH_TYPE_MEDIA_DEVICE,
47 .dp.sub_type = DEVICE_PATH_SUB_TYPE_FILE_PATH,
48 .dp.length = sizeof(bootefi_image_path[0]),
49 .str = { 'b','o','o','t','e','f','i' },
50 }, {
51 .dp.type = DEVICE_PATH_TYPE_END,
52 .dp.sub_type = DEVICE_PATH_SUB_TYPE_END,
53 .dp.length = sizeof(bootefi_image_path[0]),
54 }
55};
56
e275458c 57static efi_status_t EFIAPI bootefi_open_dp(void *handle, efi_guid_t *protocol,
b9939336
AG
58 void **protocol_interface, void *agent_handle,
59 void *controller_handle, uint32_t attributes)
60{
c07ad7c0 61 *protocol_interface = bootefi_device_path;
b9939336
AG
62 return EFI_SUCCESS;
63}
64
65/* The EFI loaded_image interface for the image executed via "bootefi" */
66static struct efi_loaded_image loaded_image_info = {
c07ad7c0 67 .device_handle = bootefi_device_path,
0f4060eb 68 .file_path = bootefi_image_path,
b9939336
AG
69};
70
71/* The EFI object struct for the image executed via "bootefi" */
72static struct efi_object loaded_image_info_obj = {
73 .handle = &loaded_image_info,
74 .protocols = {
75 {
76 /*
77 * When asking for the loaded_image interface, just
78 * return handle which points to loaded_image_info
79 */
80 .guid = &efi_guid_loaded_image,
81 .open = &efi_return_handle,
82 },
83 {
84 /*
85 * When asking for the device path interface, return
c07ad7c0 86 * bootefi_device_path
b9939336
AG
87 */
88 .guid = &efi_guid_device_path,
89 .open = &bootefi_open_dp,
90 },
91 },
92};
93
94/* The EFI object struct for the device the "bootefi" image was loaded from */
95static struct efi_object bootefi_device_obj = {
c07ad7c0 96 .handle = bootefi_device_path,
b9939336
AG
97 .protocols = {
98 {
99 /* When asking for the device path interface, return
c07ad7c0 100 * bootefi_device_path */
b9939336
AG
101 .guid = &efi_guid_device_path,
102 .open = &bootefi_open_dp,
103 }
104 },
105};
106
0d9d501f
AG
107static void *copy_fdt(void *fdt)
108{
109 u64 fdt_size = fdt_totalsize(fdt);
ad0c1a3d
AG
110 unsigned long fdt_ram_start = -1L, fdt_pages;
111 u64 new_fdt_addr;
0d9d501f 112 void *new_fdt;
ad0c1a3d 113 int i;
0d9d501f 114
ad0c1a3d
AG
115 for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) {
116 u64 ram_start = gd->bd->bi_dram[i].start;
117 u64 ram_size = gd->bd->bi_dram[i].size;
0d9d501f 118
ad0c1a3d
AG
119 if (!ram_size)
120 continue;
121
122 if (ram_start < fdt_ram_start)
123 fdt_ram_start = ram_start;
124 }
125
126 /* Give us at least 4kb breathing room */
127 fdt_size = ALIGN(fdt_size + 4096, 4096);
128 fdt_pages = fdt_size >> EFI_PAGE_SHIFT;
129
130 /* Safe fdt location is at 128MB */
131 new_fdt_addr = fdt_ram_start + (128 * 1024 * 1024) + fdt_size;
132 if (efi_allocate_pages(1, EFI_BOOT_SERVICES_DATA, fdt_pages,
133 &new_fdt_addr) != EFI_SUCCESS) {
134 /* If we can't put it there, put it somewhere */
135 new_fdt_addr = (ulong)memalign(4096, fdt_size);
85a6e9b3
AG
136 if (efi_allocate_pages(1, EFI_BOOT_SERVICES_DATA, fdt_pages,
137 &new_fdt_addr) != EFI_SUCCESS) {
138 printf("ERROR: Failed to reserve space for FDT\n");
139 return NULL;
140 }
ad0c1a3d 141 }
85a6e9b3 142
ad0c1a3d 143 new_fdt = (void*)(ulong)new_fdt_addr;
0d9d501f
AG
144 memcpy(new_fdt, fdt, fdt_totalsize(fdt));
145 fdt_set_totalsize(new_fdt, fdt_size);
146
147 return new_fdt;
148}
149
ec6617c3
AW
150#ifdef CONFIG_ARM64
151static unsigned long efi_run_in_el2(ulong (*entry)(void *image_handle,
152 struct efi_system_table *st), void *image_handle,
153 struct efi_system_table *st)
154{
155 /* Enable caches again */
156 dcache_enable();
157
158 return entry(image_handle, st);
159}
160#endif
161
b9939336
AG
162/*
163 * Load an EFI payload into a newly allocated piece of memory, register all
164 * EFI objects it would want to access and jump to it.
165 */
1c39809b 166static unsigned long do_bootefi_exec(void *efi, void *fdt)
b9939336 167{
e275458c
SG
168 ulong (*entry)(void *image_handle, struct efi_system_table *st)
169 asmlinkage;
b9939336 170 ulong fdt_pages, fdt_size, fdt_start, fdt_end;
dea2174d 171 bootm_headers_t img = { 0 };
b9939336
AG
172
173 /*
174 * gd lives in a fixed register which may get clobbered while we execute
175 * the payload. So save it here and restore it on every callback entry
176 */
177 efi_save_gd();
178
1c39809b 179 if (fdt && !fdt_check_header(fdt)) {
dea2174d 180 /* Prepare fdt for payload */
0d9d501f
AG
181 fdt = copy_fdt(fdt);
182
183 if (image_setup_libfdt(&img, fdt, 0, NULL)) {
dea2174d
AG
184 printf("ERROR: Failed to process device tree\n");
185 return -EINVAL;
186 }
187
188 /* Link to it in the efi tables */
b9939336 189 systab.tables[0].guid = EFI_FDT_GUID;
0d9d501f 190 systab.tables[0].table = fdt;
b9939336
AG
191 systab.nr_tables = 1;
192
193 /* And reserve the space in the memory map */
0d9d501f
AG
194 fdt_start = ((ulong)fdt) & ~EFI_PAGE_MASK;
195 fdt_end = ((ulong)fdt) + fdt_totalsize(fdt);
b9939336
AG
196 fdt_size = (fdt_end - fdt_start) + EFI_PAGE_MASK;
197 fdt_pages = fdt_size >> EFI_PAGE_SHIFT;
198 /* Give a bootloader the chance to modify the device tree */
199 fdt_pages += 2;
200 efi_add_memory_map(fdt_start, fdt_pages,
201 EFI_BOOT_SERVICES_DATA, true);
b9939336 202 } else {
1c39809b 203 printf("WARNING: Invalid device tree, expect boot to fail\n");
b9939336
AG
204 systab.nr_tables = 0;
205 }
206
207 /* Load the EFI payload */
208 entry = efi_load_pe(efi, &loaded_image_info);
209 if (!entry)
210 return -ENOENT;
211
212 /* Initialize and populate EFI object list */
213 INIT_LIST_HEAD(&efi_obj_list);
214 list_add_tail(&loaded_image_info_obj.link, &efi_obj_list);
215 list_add_tail(&bootefi_device_obj.link, &efi_obj_list);
216#ifdef CONFIG_PARTITIONS
217 efi_disk_register();
218#endif
be8d3241
AG
219#ifdef CONFIG_LCD
220 efi_gop_register();
221#endif
0efe1bcf
AG
222#ifdef CONFIG_NET
223 void *nethandle = loaded_image_info.device_handle;
224 efi_net_register(&nethandle);
225
226 if (!memcmp(bootefi_device_path[0].str, "N\0e\0t", 6))
227 loaded_image_info.device_handle = nethandle;
3fb97e26
AG
228 else
229 loaded_image_info.device_handle = bootefi_device_path;
0efe1bcf 230#endif
e663b350
AG
231#ifdef CONFIG_GENERATE_SMBIOS_TABLE
232 efi_smbios_register();
233#endif
b9939336 234
80a4800e
AG
235 /* Initialize EFI runtime services */
236 efi_reset_system_init();
237 efi_get_time_init();
238
b9939336 239 /* Call our payload! */
edcef3ba 240 debug("%s:%d Jumping to 0x%lx\n", __func__, __LINE__, (long)entry);
a86aeaf2
AG
241
242 if (setjmp(&loaded_image_info.exit_jmp)) {
243 efi_status_t status = loaded_image_info.exit_status;
244 return status == EFI_SUCCESS ? 0 : -EINVAL;
245 }
246
69bd459d
AG
247#ifdef CONFIG_ARM64
248 /* On AArch64 we need to make sure we call our payload in < EL3 */
249 if (current_el() == 3) {
250 smp_kick_all_cpus();
251 dcache_disable(); /* flush cache before switch to EL2 */
ec6617c3
AW
252
253 /* Move into EL2 and keep running there */
254 armv8_switch_to_el2((ulong)entry, (ulong)&loaded_image_info,
7c5e1feb 255 (ulong)&systab, 0, (ulong)efi_run_in_el2,
ec6617c3
AW
256 ES_TO_AARCH64);
257
258 /* Should never reach here, efi exits with longjmp */
259 while (1) { }
69bd459d
AG
260 }
261#endif
262
b9939336
AG
263 return entry(&loaded_image_info, &systab);
264}
265
266
267/* Interpreter command to boot an arbitrary EFI image from memory */
268static int do_bootefi(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
269{
1c39809b
AG
270 char *saddr, *sfdt;
271 unsigned long addr, fdt_addr = 0;
b9939336
AG
272 int r = 0;
273
274 if (argc < 2)
3c1dcef6 275 return CMD_RET_USAGE;
c7ae3dfd
SG
276#ifdef CONFIG_CMD_BOOTEFI_HELLO
277 if (!strcmp(argv[1], "hello")) {
278 ulong size = __efi_hello_world_end - __efi_hello_world_begin;
b9939336 279
c7ae3dfd
SG
280 addr = CONFIG_SYS_LOAD_ADDR;
281 memcpy((char *)addr, __efi_hello_world_begin, size);
282 } else
283#endif
284 {
285 saddr = argv[1];
b9939336 286
c7ae3dfd
SG
287 addr = simple_strtoul(saddr, NULL, 16);
288
289 if (argc > 2) {
290 sfdt = argv[2];
291 fdt_addr = simple_strtoul(sfdt, NULL, 16);
292 }
1c39809b
AG
293 }
294
5ee31baf 295 printf("## Starting EFI application at %08lx ...\n", addr);
1c39809b 296 r = do_bootefi_exec((void *)addr, (void*)fdt_addr);
b9939336
AG
297 printf("## Application terminated, r = %d\n", r);
298
299 if (r != 0)
300 r = 1;
301
302 return r;
303}
304
305#ifdef CONFIG_SYS_LONGHELP
306static char bootefi_help_text[] =
1c39809b
AG
307 "<image address> [fdt address]\n"
308 " - boot EFI payload stored at address <image address>.\n"
309 " If specified, the device tree located at <fdt address> gets\n"
c7ae3dfd
SG
310 " exposed as EFI configuration table.\n"
311#ifdef CONFIG_CMD_BOOTEFI_HELLO
312 "hello\n"
313 " - boot a sample Hello World application stored within U-Boot"
314#endif
315 ;
b9939336
AG
316#endif
317
318U_BOOT_CMD(
1c39809b 319 bootefi, 3, 0, do_bootefi,
92dfd922 320 "Boots an EFI payload from memory",
b9939336
AG
321 bootefi_help_text
322);
0f4060eb 323
c07ad7c0 324void efi_set_bootdev(const char *dev, const char *devnr, const char *path)
0f4060eb 325{
8c3df0bf 326 __maybe_unused struct blk_desc *desc;
ecbe1a07 327 char devname[32] = { 0 }; /* dp->str is u16[32] long */
0f4060eb
AG
328 char *colon;
329
1acc0087 330#if defined(CONFIG_BLK) || CONFIG_IS_ENABLED(ISO_PARTITION)
f9d334bd
AG
331 desc = blk_get_dev(dev, simple_strtol(devnr, NULL, 10));
332#endif
333
334#ifdef CONFIG_BLK
335 if (desc) {
336 snprintf(devname, sizeof(devname), "%s", desc->bdev->name);
337 } else
338#endif
339
340 {
341 /* Assemble the condensed device name we use in efi_disk.c */
342 snprintf(devname, sizeof(devname), "%s%s", dev, devnr);
343 }
344
0f4060eb 345 colon = strchr(devname, ':');
8c3df0bf 346
1acc0087 347#if CONFIG_IS_ENABLED(ISO_PARTITION)
8c3df0bf 348 /* For ISOs we create partition block devices */
8c3df0bf
AG
349 if (desc && (desc->type != DEV_TYPE_UNKNOWN) &&
350 (desc->part_type == PART_TYPE_ISO)) {
351 if (!colon)
f9d334bd
AG
352 snprintf(devname, sizeof(devname), "%s:1", devname);
353
8c3df0bf
AG
354 colon = NULL;
355 }
356#endif
357
0f4060eb
AG
358 if (colon)
359 *colon = '\0';
360
c07ad7c0
AG
361 /* Patch bootefi_device_path to the target device */
362 memset(bootefi_device_path[0].str, 0, sizeof(bootefi_device_path[0].str));
363 ascii2unicode(bootefi_device_path[0].str, devname);
364
365 /* Patch bootefi_image_path to the target file path */
0f4060eb 366 memset(bootefi_image_path[0].str, 0, sizeof(bootefi_image_path[0].str));
49271666
AG
367 if (strcmp(dev, "Net")) {
368 /* Add leading / to fs paths, because they're absolute */
369 snprintf(devname, sizeof(devname), "/%s", path);
370 } else {
371 snprintf(devname, sizeof(devname), "%s", path);
372 }
0f4060eb
AG
373 ascii2unicode(bootefi_image_path[0].str, devname);
374}