2018-05-08 05:02:21 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0+
|
2016-03-10 07:27:20 +08:00
|
|
|
/*
|
|
|
|
* EFI application loader
|
|
|
|
*
|
|
|
|
* Copyright (c) 2016 Alexander Graf
|
|
|
|
*/
|
|
|
|
|
2020-07-18 02:21:00 +08:00
|
|
|
#define LOG_CATEGORY LOGC_EFI
|
|
|
|
|
2016-03-10 07:27:20 +08:00
|
|
|
#include <common.h>
|
2021-01-24 22:34:12 +08:00
|
|
|
#include <bootm.h>
|
2019-01-09 01:13:06 +08:00
|
|
|
#include <charset.h>
|
2016-03-10 07:27:20 +08:00
|
|
|
#include <command.h>
|
2017-05-18 07:18:03 +08:00
|
|
|
#include <dm.h>
|
2016-03-10 07:27:20 +08:00
|
|
|
#include <efi_loader.h>
|
2017-10-19 00:13:13 +08:00
|
|
|
#include <efi_selftest.h>
|
2019-08-01 23:46:52 +08:00
|
|
|
#include <env.h>
|
2016-03-10 07:27:20 +08:00
|
|
|
#include <errno.h>
|
2020-05-11 01:40:01 +08:00
|
|
|
#include <image.h>
|
2020-07-18 02:21:00 +08:00
|
|
|
#include <log.h>
|
2020-02-03 22:36:16 +08:00
|
|
|
#include <malloc.h>
|
2020-10-31 11:38:53 +08:00
|
|
|
#include <asm/global_data.h>
|
2018-03-05 00:20:11 +08:00
|
|
|
#include <linux/libfdt.h>
|
|
|
|
#include <linux/libfdt_env.h>
|
2018-06-18 23:22:58 +08:00
|
|
|
#include <mapmem.h>
|
2016-04-12 05:51:01 +08:00
|
|
|
#include <memalign.h>
|
2016-09-26 05:27:32 +08:00
|
|
|
#include <asm-generic/sections.h>
|
|
|
|
#include <linux/linkage.h>
|
2016-04-11 22:55:26 +08:00
|
|
|
|
|
|
|
DECLARE_GLOBAL_DATA_PTR;
|
2016-03-10 07:27:20 +08:00
|
|
|
|
2017-09-14 06:05:33 +08:00
|
|
|
static struct efi_device_path *bootefi_image_path;
|
|
|
|
static struct efi_device_path *bootefi_device_path;
|
2021-01-12 19:46:24 +08:00
|
|
|
static void *image_addr;
|
|
|
|
static size_t image_size;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* efi_clear_bootdev() - clear boot device
|
|
|
|
*/
|
|
|
|
static void efi_clear_bootdev(void)
|
|
|
|
{
|
|
|
|
efi_free_pool(bootefi_device_path);
|
|
|
|
efi_free_pool(bootefi_image_path);
|
|
|
|
bootefi_device_path = NULL;
|
|
|
|
bootefi_image_path = NULL;
|
|
|
|
image_addr = NULL;
|
|
|
|
image_size = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* efi_set_bootdev() - set boot device
|
|
|
|
*
|
|
|
|
* This function is called when a file is loaded, e.g. via the 'load' command.
|
|
|
|
* We use the path to this file to inform the UEFI binary about the boot device.
|
|
|
|
*
|
|
|
|
* @dev: device, e.g. "MMC"
|
|
|
|
* @devnr: number of the device, e.g. "1:2"
|
|
|
|
* @path: path to file loaded
|
|
|
|
* @buffer: buffer with file loaded
|
|
|
|
* @buffer_size: size of file loaded
|
|
|
|
*/
|
|
|
|
void efi_set_bootdev(const char *dev, const char *devnr, const char *path,
|
|
|
|
void *buffer, size_t buffer_size)
|
|
|
|
{
|
|
|
|
struct efi_device_path *device, *image;
|
|
|
|
efi_status_t ret;
|
|
|
|
|
2022-01-30 05:58:37 +08:00
|
|
|
log_debug("dev=%s, devnr=%s, path=%s, buffer=%p, size=%zx\n", dev,
|
|
|
|
devnr, path, buffer, buffer_size);
|
|
|
|
|
2021-01-12 19:46:24 +08:00
|
|
|
/* Forget overwritten image */
|
|
|
|
if (buffer + buffer_size >= image_addr &&
|
|
|
|
image_addr + image_size >= buffer)
|
|
|
|
efi_clear_bootdev();
|
|
|
|
|
|
|
|
/* Remember only PE-COFF and FIT images */
|
|
|
|
if (efi_check_pe(buffer, buffer_size, NULL) != EFI_SUCCESS) {
|
2022-01-30 05:58:37 +08:00
|
|
|
if (IS_ENABLED(CONFIG_FIT) &&
|
|
|
|
!fit_check_format(buffer, IMAGE_SIZE_INVAL)) {
|
|
|
|
/*
|
|
|
|
* FIT images of type EFI_OS are started via command
|
|
|
|
* bootm. We should not use their boot device with the
|
|
|
|
* bootefi command.
|
|
|
|
*/
|
|
|
|
buffer = 0;
|
|
|
|
buffer_size = 0;
|
|
|
|
} else {
|
|
|
|
log_debug("- not remembering image\n");
|
2021-01-12 19:46:24 +08:00
|
|
|
return;
|
2022-01-30 05:58:37 +08:00
|
|
|
}
|
2021-01-12 19:46:24 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* efi_set_bootdev() is typically called repeatedly, recover memory */
|
|
|
|
efi_clear_bootdev();
|
|
|
|
|
|
|
|
image_addr = buffer;
|
|
|
|
image_size = buffer_size;
|
|
|
|
|
|
|
|
ret = efi_dp_from_name(dev, devnr, path, &device, &image);
|
|
|
|
if (ret == EFI_SUCCESS) {
|
|
|
|
bootefi_device_path = device;
|
|
|
|
if (image) {
|
|
|
|
/* FIXME: image should not contain device */
|
|
|
|
struct efi_device_path *image_tmp = image;
|
|
|
|
|
|
|
|
efi_dp_split_file_path(image, &device, &image);
|
|
|
|
efi_free_pool(image_tmp);
|
|
|
|
}
|
|
|
|
bootefi_image_path = image;
|
2022-01-30 05:58:37 +08:00
|
|
|
log_debug("- recorded device %ls\n", efi_dp_str(device));
|
|
|
|
if (image)
|
|
|
|
log_debug("- and image %ls\n", efi_dp_str(image));
|
2021-01-12 19:46:24 +08:00
|
|
|
} else {
|
2022-01-30 05:58:37 +08:00
|
|
|
log_debug("- efi_dp_from_name() failed, err=%lx\n", ret);
|
2021-01-12 19:46:24 +08:00
|
|
|
efi_clear_bootdev();
|
|
|
|
}
|
|
|
|
}
|
2016-03-10 07:27:20 +08:00
|
|
|
|
2019-07-14 19:00:44 +08:00
|
|
|
/**
|
2020-08-07 23:47:13 +08:00
|
|
|
* efi_env_set_load_options() - set load options from environment variable
|
2017-10-19 00:13:13 +08:00
|
|
|
*
|
2020-01-04 05:53:42 +08:00
|
|
|
* @handle: the image handle
|
|
|
|
* @env_var: name of the environment variable
|
|
|
|
* @load_options: pointer to load options (output)
|
|
|
|
* Return: status code
|
2017-10-19 00:13:13 +08:00
|
|
|
*/
|
2020-08-07 23:47:13 +08:00
|
|
|
static efi_status_t efi_env_set_load_options(efi_handle_t handle,
|
|
|
|
const char *env_var,
|
|
|
|
u16 **load_options)
|
2017-10-19 00:13:13 +08:00
|
|
|
{
|
|
|
|
const char *env = env_get(env_var);
|
2020-08-07 23:47:13 +08:00
|
|
|
size_t size;
|
2018-09-01 03:31:33 +08:00
|
|
|
u16 *pos;
|
2019-04-19 11:22:28 +08:00
|
|
|
efi_status_t ret;
|
|
|
|
|
2020-01-04 05:53:42 +08:00
|
|
|
*load_options = NULL;
|
2017-10-19 00:13:13 +08:00
|
|
|
if (!env)
|
2020-08-07 23:47:13 +08:00
|
|
|
return EFI_SUCCESS;
|
|
|
|
size = sizeof(u16) * (utf8_utf16_strlen(env) + 1);
|
|
|
|
pos = calloc(size, 1);
|
|
|
|
if (!pos)
|
2019-04-19 11:22:28 +08:00
|
|
|
return EFI_OUT_OF_RESOURCES;
|
2020-01-04 05:53:42 +08:00
|
|
|
*load_options = pos;
|
2018-09-01 03:31:33 +08:00
|
|
|
utf8_utf16_strcpy(&pos, env);
|
2020-08-07 23:47:13 +08:00
|
|
|
ret = efi_set_load_options(handle, size, *load_options);
|
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
free(*load_options);
|
|
|
|
*load_options = NULL;
|
|
|
|
}
|
|
|
|
return ret;
|
2017-10-19 00:13:13 +08:00
|
|
|
}
|
|
|
|
|
2019-04-20 19:33:55 +08:00
|
|
|
#if !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
|
|
|
|
|
efi: sandbox: Tidy up copy_fdt() to work with sandbox
At present this function takes a pointer as its argument, then passes this
to efi_allocate_pages(), which actually takes an address. It uses casts,
which are not supported on sandbox.
Also the function calculates the FDT size rounded up to the neared EFI
page size, then its caller recalculates the size and adds a bit more to
it.
This function is much better written as something that works with
addresses only, and returns both the address and the size of the relocated
FDT.
Also, copy_fdt() returns NULL on error, but really should propagate the
error from efi_allocate_pages(). To do this it needs to return an
efi_status_t, not a void *.
Update the code in this way, so that it is easier to follow, and also
supports sandbox.
Signed-off-by: Simon Glass <sjg@chromium.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2018-08-08 17:54:30 +08:00
|
|
|
/**
|
|
|
|
* copy_fdt() - Copy the device tree to a new location available to EFI
|
|
|
|
*
|
2018-11-19 00:58:52 +08:00
|
|
|
* The FDT is copied to a suitable location within the EFI memory map.
|
2018-11-19 00:58:49 +08:00
|
|
|
* Additional 12 KiB are added to the space in case the device tree needs to be
|
efi: sandbox: Tidy up copy_fdt() to work with sandbox
At present this function takes a pointer as its argument, then passes this
to efi_allocate_pages(), which actually takes an address. It uses casts,
which are not supported on sandbox.
Also the function calculates the FDT size rounded up to the neared EFI
page size, then its caller recalculates the size and adds a bit more to
it.
This function is much better written as something that works with
addresses only, and returns both the address and the size of the relocated
FDT.
Also, copy_fdt() returns NULL on error, but really should propagate the
error from efi_allocate_pages(). To do this it needs to return an
efi_status_t, not a void *.
Update the code in this way, so that it is easier to follow, and also
supports sandbox.
Signed-off-by: Simon Glass <sjg@chromium.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2018-08-08 17:54:30 +08:00
|
|
|
* expanded later with fdt_open_into().
|
|
|
|
*
|
2018-11-19 00:58:52 +08:00
|
|
|
* @fdtp: On entry a pointer to the flattened device tree.
|
|
|
|
* On exit a pointer to the copy of the flattened device tree.
|
2018-11-13 01:55:22 +08:00
|
|
|
* FDT start
|
|
|
|
* Return: status code
|
efi: sandbox: Tidy up copy_fdt() to work with sandbox
At present this function takes a pointer as its argument, then passes this
to efi_allocate_pages(), which actually takes an address. It uses casts,
which are not supported on sandbox.
Also the function calculates the FDT size rounded up to the neared EFI
page size, then its caller recalculates the size and adds a bit more to
it.
This function is much better written as something that works with
addresses only, and returns both the address and the size of the relocated
FDT.
Also, copy_fdt() returns NULL on error, but really should propagate the
error from efi_allocate_pages(). To do this it needs to return an
efi_status_t, not a void *.
Update the code in this way, so that it is easier to follow, and also
supports sandbox.
Signed-off-by: Simon Glass <sjg@chromium.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2018-08-08 17:54:30 +08:00
|
|
|
*/
|
2018-11-19 00:58:52 +08:00
|
|
|
static efi_status_t copy_fdt(void **fdtp)
|
2016-04-11 22:55:26 +08:00
|
|
|
{
|
2016-04-12 05:51:01 +08:00
|
|
|
unsigned long fdt_ram_start = -1L, fdt_pages;
|
efi: sandbox: Tidy up copy_fdt() to work with sandbox
At present this function takes a pointer as its argument, then passes this
to efi_allocate_pages(), which actually takes an address. It uses casts,
which are not supported on sandbox.
Also the function calculates the FDT size rounded up to the neared EFI
page size, then its caller recalculates the size and adds a bit more to
it.
This function is much better written as something that works with
addresses only, and returns both the address and the size of the relocated
FDT.
Also, copy_fdt() returns NULL on error, but really should propagate the
error from efi_allocate_pages(). To do this it needs to return an
efi_status_t, not a void *.
Update the code in this way, so that it is easier to follow, and also
supports sandbox.
Signed-off-by: Simon Glass <sjg@chromium.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2018-08-08 17:54:30 +08:00
|
|
|
efi_status_t ret = 0;
|
|
|
|
void *fdt, *new_fdt;
|
2016-04-12 05:51:01 +08:00
|
|
|
u64 new_fdt_addr;
|
efi: sandbox: Tidy up copy_fdt() to work with sandbox
At present this function takes a pointer as its argument, then passes this
to efi_allocate_pages(), which actually takes an address. It uses casts,
which are not supported on sandbox.
Also the function calculates the FDT size rounded up to the neared EFI
page size, then its caller recalculates the size and adds a bit more to
it.
This function is much better written as something that works with
addresses only, and returns both the address and the size of the relocated
FDT.
Also, copy_fdt() returns NULL on error, but really should propagate the
error from efi_allocate_pages(). To do this it needs to return an
efi_status_t, not a void *.
Update the code in this way, so that it is easier to follow, and also
supports sandbox.
Signed-off-by: Simon Glass <sjg@chromium.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2018-08-08 17:54:30 +08:00
|
|
|
uint fdt_size;
|
2016-04-12 05:51:01 +08:00
|
|
|
int i;
|
2016-04-11 22:55:26 +08:00
|
|
|
|
efi: sandbox: Tidy up copy_fdt() to work with sandbox
At present this function takes a pointer as its argument, then passes this
to efi_allocate_pages(), which actually takes an address. It uses casts,
which are not supported on sandbox.
Also the function calculates the FDT size rounded up to the neared EFI
page size, then its caller recalculates the size and adds a bit more to
it.
This function is much better written as something that works with
addresses only, and returns both the address and the size of the relocated
FDT.
Also, copy_fdt() returns NULL on error, but really should propagate the
error from efi_allocate_pages(). To do this it needs to return an
efi_status_t, not a void *.
Update the code in this way, so that it is easier to follow, and also
supports sandbox.
Signed-off-by: Simon Glass <sjg@chromium.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2018-08-08 17:54:30 +08:00
|
|
|
for (i = 0; i < CONFIG_NR_DRAM_BANKS; i++) {
|
|
|
|
u64 ram_start = gd->bd->bi_dram[i].start;
|
|
|
|
u64 ram_size = gd->bd->bi_dram[i].size;
|
2016-04-11 22:55:26 +08:00
|
|
|
|
2016-04-12 05:51:01 +08:00
|
|
|
if (!ram_size)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (ram_start < fdt_ram_start)
|
|
|
|
fdt_ram_start = ram_start;
|
|
|
|
}
|
|
|
|
|
2018-06-18 22:08:25 +08:00
|
|
|
/*
|
2018-11-19 00:58:49 +08:00
|
|
|
* Give us at least 12 KiB of breathing room in case the device tree
|
|
|
|
* needs to be expanded later.
|
2018-06-18 22:08:25 +08:00
|
|
|
*/
|
2018-11-19 00:58:52 +08:00
|
|
|
fdt = *fdtp;
|
2018-11-19 00:58:49 +08:00
|
|
|
fdt_pages = efi_size_in_pages(fdt_totalsize(fdt) + 0x3000);
|
|
|
|
fdt_size = fdt_pages << EFI_PAGE_SHIFT;
|
2016-04-12 05:51:01 +08:00
|
|
|
|
2018-11-19 00:58:52 +08:00
|
|
|
/*
|
|
|
|
* Safe fdt location is at 127 MiB.
|
|
|
|
* On the sandbox convert from the sandbox address space.
|
|
|
|
*/
|
|
|
|
new_fdt_addr = (uintptr_t)map_sysmem(fdt_ram_start + 0x7f00000 +
|
|
|
|
fdt_size, 0);
|
efi: sandbox: Tidy up copy_fdt() to work with sandbox
At present this function takes a pointer as its argument, then passes this
to efi_allocate_pages(), which actually takes an address. It uses casts,
which are not supported on sandbox.
Also the function calculates the FDT size rounded up to the neared EFI
page size, then its caller recalculates the size and adds a bit more to
it.
This function is much better written as something that works with
addresses only, and returns both the address and the size of the relocated
FDT.
Also, copy_fdt() returns NULL on error, but really should propagate the
error from efi_allocate_pages(). To do this it needs to return an
efi_status_t, not a void *.
Update the code in this way, so that it is easier to follow, and also
supports sandbox.
Signed-off-by: Simon Glass <sjg@chromium.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2018-08-08 17:54:30 +08:00
|
|
|
ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
|
2020-05-07 02:32:31 +08:00
|
|
|
EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
|
efi: sandbox: Tidy up copy_fdt() to work with sandbox
At present this function takes a pointer as its argument, then passes this
to efi_allocate_pages(), which actually takes an address. It uses casts,
which are not supported on sandbox.
Also the function calculates the FDT size rounded up to the neared EFI
page size, then its caller recalculates the size and adds a bit more to
it.
This function is much better written as something that works with
addresses only, and returns both the address and the size of the relocated
FDT.
Also, copy_fdt() returns NULL on error, but really should propagate the
error from efi_allocate_pages(). To do this it needs to return an
efi_status_t, not a void *.
Update the code in this way, so that it is easier to follow, and also
supports sandbox.
Signed-off-by: Simon Glass <sjg@chromium.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2018-08-08 17:54:30 +08:00
|
|
|
&new_fdt_addr);
|
|
|
|
if (ret != EFI_SUCCESS) {
|
2016-04-12 05:51:01 +08:00
|
|
|
/* If we can't put it there, put it somewhere */
|
2017-08-12 03:19:25 +08:00
|
|
|
new_fdt_addr = (ulong)memalign(EFI_PAGE_SIZE, fdt_size);
|
efi: sandbox: Tidy up copy_fdt() to work with sandbox
At present this function takes a pointer as its argument, then passes this
to efi_allocate_pages(), which actually takes an address. It uses casts,
which are not supported on sandbox.
Also the function calculates the FDT size rounded up to the neared EFI
page size, then its caller recalculates the size and adds a bit more to
it.
This function is much better written as something that works with
addresses only, and returns both the address and the size of the relocated
FDT.
Also, copy_fdt() returns NULL on error, but really should propagate the
error from efi_allocate_pages(). To do this it needs to return an
efi_status_t, not a void *.
Update the code in this way, so that it is easier to follow, and also
supports sandbox.
Signed-off-by: Simon Glass <sjg@chromium.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2018-08-08 17:54:30 +08:00
|
|
|
ret = efi_allocate_pages(EFI_ALLOCATE_MAX_ADDRESS,
|
2020-05-07 02:32:31 +08:00
|
|
|
EFI_ACPI_RECLAIM_MEMORY, fdt_pages,
|
efi: sandbox: Tidy up copy_fdt() to work with sandbox
At present this function takes a pointer as its argument, then passes this
to efi_allocate_pages(), which actually takes an address. It uses casts,
which are not supported on sandbox.
Also the function calculates the FDT size rounded up to the neared EFI
page size, then its caller recalculates the size and adds a bit more to
it.
This function is much better written as something that works with
addresses only, and returns both the address and the size of the relocated
FDT.
Also, copy_fdt() returns NULL on error, but really should propagate the
error from efi_allocate_pages(). To do this it needs to return an
efi_status_t, not a void *.
Update the code in this way, so that it is easier to follow, and also
supports sandbox.
Signed-off-by: Simon Glass <sjg@chromium.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2018-08-08 17:54:30 +08:00
|
|
|
&new_fdt_addr);
|
|
|
|
if (ret != EFI_SUCCESS) {
|
2020-07-18 02:21:00 +08:00
|
|
|
log_err("ERROR: Failed to reserve space for FDT\n");
|
efi: sandbox: Tidy up copy_fdt() to work with sandbox
At present this function takes a pointer as its argument, then passes this
to efi_allocate_pages(), which actually takes an address. It uses casts,
which are not supported on sandbox.
Also the function calculates the FDT size rounded up to the neared EFI
page size, then its caller recalculates the size and adds a bit more to
it.
This function is much better written as something that works with
addresses only, and returns both the address and the size of the relocated
FDT.
Also, copy_fdt() returns NULL on error, but really should propagate the
error from efi_allocate_pages(). To do this it needs to return an
efi_status_t, not a void *.
Update the code in this way, so that it is easier to follow, and also
supports sandbox.
Signed-off-by: Simon Glass <sjg@chromium.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2018-08-08 17:54:30 +08:00
|
|
|
goto done;
|
2017-07-03 19:32:35 +08:00
|
|
|
}
|
2016-04-12 05:51:01 +08:00
|
|
|
}
|
2018-11-19 00:58:52 +08:00
|
|
|
new_fdt = (void *)(uintptr_t)new_fdt_addr;
|
2016-04-11 22:55:26 +08:00
|
|
|
memcpy(new_fdt, fdt, fdt_totalsize(fdt));
|
|
|
|
fdt_set_totalsize(new_fdt, fdt_size);
|
|
|
|
|
2018-11-19 00:58:52 +08:00
|
|
|
*fdtp = (void *)(uintptr_t)new_fdt_addr;
|
efi: sandbox: Tidy up copy_fdt() to work with sandbox
At present this function takes a pointer as its argument, then passes this
to efi_allocate_pages(), which actually takes an address. It uses casts,
which are not supported on sandbox.
Also the function calculates the FDT size rounded up to the neared EFI
page size, then its caller recalculates the size and adds a bit more to
it.
This function is much better written as something that works with
addresses only, and returns both the address and the size of the relocated
FDT.
Also, copy_fdt() returns NULL on error, but really should propagate the
error from efi_allocate_pages(). To do this it needs to return an
efi_status_t, not a void *.
Update the code in this way, so that it is easier to follow, and also
supports sandbox.
Signed-off-by: Simon Glass <sjg@chromium.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2018-08-08 17:54:30 +08:00
|
|
|
done:
|
|
|
|
return ret;
|
2016-04-11 22:55:26 +08:00
|
|
|
}
|
|
|
|
|
2019-04-20 19:33:55 +08:00
|
|
|
/**
|
|
|
|
* get_config_table() - get configuration table
|
|
|
|
*
|
|
|
|
* @guid: GUID of the configuration table
|
|
|
|
* Return: pointer to configuration table or NULL
|
|
|
|
*/
|
|
|
|
static void *get_config_table(const efi_guid_t *guid)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
for (i = 0; i < systab.nr_tables; i++) {
|
|
|
|
if (!guidcmp(guid, &systab.tables[i].guid))
|
|
|
|
return systab.tables[i].table;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* !CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) */
|
|
|
|
|
2019-04-19 11:22:29 +08:00
|
|
|
/**
|
2019-11-28 13:46:09 +08:00
|
|
|
* efi_install_fdt() - install device tree
|
2019-05-13 02:16:25 +08:00
|
|
|
*
|
2020-02-08 05:10:49 +08:00
|
|
|
* If fdt is not EFI_FDT_USE_INTERNAL, the device tree located at that memory
|
|
|
|
* address will will be installed as configuration table, otherwise the device
|
|
|
|
* tree located at the address indicated by environment variable fdt_addr or as
|
|
|
|
* fallback fdtcontroladdr will be used.
|
2019-05-13 02:16:25 +08:00
|
|
|
*
|
2019-11-28 13:46:09 +08:00
|
|
|
* On architectures using ACPI tables device trees shall not be installed as
|
|
|
|
* configuration table.
|
2019-05-13 02:16:25 +08:00
|
|
|
*
|
2020-02-08 05:10:49 +08:00
|
|
|
* @fdt: address of device tree or EFI_FDT_USE_INTERNAL to use the
|
2019-12-04 19:31:12 +08:00
|
|
|
* the hardware device tree as indicated by environment variable
|
|
|
|
* fdt_addr or as fallback the internal device tree as indicated by
|
|
|
|
* the environment variable fdtcontroladdr
|
2019-04-19 11:22:29 +08:00
|
|
|
* Return: status code
|
|
|
|
*/
|
2019-12-08 08:07:01 +08:00
|
|
|
efi_status_t efi_install_fdt(void *fdt)
|
2019-04-19 11:22:29 +08:00
|
|
|
{
|
2019-04-20 19:33:55 +08:00
|
|
|
/*
|
|
|
|
* The EBBR spec requires that we have either an FDT or an ACPI table
|
|
|
|
* but not both.
|
|
|
|
*/
|
|
|
|
#if CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)
|
2019-12-08 08:07:01 +08:00
|
|
|
if (fdt) {
|
2022-02-27 20:18:56 +08:00
|
|
|
log_warning("WARNING: Can't have ACPI table and device tree - ignoring DT.\n");
|
|
|
|
return EFI_SUCCESS;
|
2019-04-20 19:33:55 +08:00
|
|
|
}
|
|
|
|
#else
|
2019-04-19 11:22:30 +08:00
|
|
|
bootm_headers_t img = { 0 };
|
2019-04-19 11:22:29 +08:00
|
|
|
efi_status_t ret;
|
|
|
|
|
2019-12-08 08:07:01 +08:00
|
|
|
if (fdt == EFI_FDT_USE_INTERNAL) {
|
2019-11-28 13:46:09 +08:00
|
|
|
const char *fdt_opt;
|
2019-12-08 08:07:01 +08:00
|
|
|
uintptr_t fdt_addr;
|
2019-11-28 13:46:09 +08:00
|
|
|
|
2019-04-20 19:33:55 +08:00
|
|
|
/* Look for device tree that is already installed */
|
|
|
|
if (get_config_table(&efi_guid_fdt))
|
|
|
|
return EFI_SUCCESS;
|
2019-12-04 19:31:12 +08:00
|
|
|
/* Check if there is a hardware device tree */
|
|
|
|
fdt_opt = env_get("fdt_addr");
|
|
|
|
/* Use our own device tree as fallback */
|
2019-04-20 19:33:55 +08:00
|
|
|
if (!fdt_opt) {
|
2019-12-04 19:31:12 +08:00
|
|
|
fdt_opt = env_get("fdtcontroladdr");
|
|
|
|
if (!fdt_opt) {
|
2020-07-18 02:21:00 +08:00
|
|
|
log_err("ERROR: need device tree\n");
|
2019-12-04 19:31:12 +08:00
|
|
|
return EFI_NOT_FOUND;
|
|
|
|
}
|
2019-04-20 19:33:55 +08:00
|
|
|
}
|
2021-07-24 23:03:29 +08:00
|
|
|
fdt_addr = hextoul(fdt_opt, NULL);
|
2019-04-20 19:33:55 +08:00
|
|
|
if (!fdt_addr) {
|
2020-07-18 02:21:00 +08:00
|
|
|
log_err("ERROR: invalid $fdt_addr or $fdtcontroladdr\n");
|
2019-04-20 19:33:55 +08:00
|
|
|
return EFI_LOAD_ERROR;
|
2019-04-19 11:22:30 +08:00
|
|
|
}
|
2019-12-08 08:07:01 +08:00
|
|
|
fdt = map_sysmem(fdt_addr, 0);
|
2019-04-20 19:33:55 +08:00
|
|
|
}
|
2019-04-19 11:22:30 +08:00
|
|
|
|
2019-04-20 19:33:55 +08:00
|
|
|
/* Install device tree */
|
|
|
|
if (fdt_check_header(fdt)) {
|
2020-07-18 02:21:00 +08:00
|
|
|
log_err("ERROR: invalid device tree\n");
|
2019-04-20 19:33:55 +08:00
|
|
|
return EFI_LOAD_ERROR;
|
|
|
|
}
|
2019-04-19 11:22:30 +08:00
|
|
|
|
2019-04-20 19:33:55 +08:00
|
|
|
/* Prepare device tree for payload */
|
|
|
|
ret = copy_fdt(&fdt);
|
|
|
|
if (ret) {
|
2020-07-18 02:21:00 +08:00
|
|
|
log_err("ERROR: out of memory\n");
|
2019-04-20 19:33:55 +08:00
|
|
|
return EFI_OUT_OF_RESOURCES;
|
|
|
|
}
|
2019-04-19 11:22:30 +08:00
|
|
|
|
2019-04-20 19:33:55 +08:00
|
|
|
if (image_setup_libfdt(&img, fdt, 0, NULL)) {
|
2020-07-18 02:21:00 +08:00
|
|
|
log_err("ERROR: failed to process device tree\n");
|
2019-04-20 19:33:55 +08:00
|
|
|
return EFI_LOAD_ERROR;
|
|
|
|
}
|
|
|
|
|
2020-03-14 17:59:34 +08:00
|
|
|
/* Create memory reservations as indicated by the device tree */
|
|
|
|
efi_carve_out_dt_rsv(fdt);
|
|
|
|
|
2022-01-03 20:07:37 +08:00
|
|
|
efi_try_purge_kaslr_seed(fdt);
|
|
|
|
|
2019-04-20 19:33:55 +08:00
|
|
|
/* Install device tree as UEFI table */
|
|
|
|
ret = efi_install_configuration_table(&efi_guid_fdt, fdt);
|
|
|
|
if (ret != EFI_SUCCESS) {
|
2020-07-18 02:21:00 +08:00
|
|
|
log_err("ERROR: failed to install device tree\n");
|
2019-04-20 19:33:55 +08:00
|
|
|
return ret;
|
2019-04-19 11:22:29 +08:00
|
|
|
}
|
2019-04-20 19:33:55 +08:00
|
|
|
#endif /* GENERATE_ACPI_TABLE */
|
2019-04-19 11:22:29 +08:00
|
|
|
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2018-09-23 23:21:51 +08:00
|
|
|
/**
|
|
|
|
* do_bootefi_exec() - execute EFI binary
|
|
|
|
*
|
2020-08-16 05:10:22 +08:00
|
|
|
* The image indicated by @handle is started. When it returns the allocated
|
|
|
|
* memory for the @load_options is freed.
|
|
|
|
*
|
2019-04-19 11:22:35 +08:00
|
|
|
* @handle: handle of loaded image
|
2020-08-16 05:10:22 +08:00
|
|
|
* @load_options: load options
|
2018-09-23 23:21:51 +08:00
|
|
|
* Return: status code
|
|
|
|
*
|
|
|
|
* Load the EFI binary into a newly assigned memory unwinding the relocation
|
|
|
|
* information, install the loaded image protocol, and call the binary.
|
2016-03-10 07:27:20 +08:00
|
|
|
*/
|
2020-08-07 23:49:39 +08:00
|
|
|
static efi_status_t do_bootefi_exec(efi_handle_t handle, void *load_options)
|
2016-03-10 07:27:20 +08:00
|
|
|
{
|
2018-03-03 22:29:01 +08:00
|
|
|
efi_status_t ret;
|
2019-04-30 23:57:30 +08:00
|
|
|
efi_uintn_t exit_data_size = 0;
|
|
|
|
u16 *exit_data = NULL;
|
2017-10-10 20:23:06 +08:00
|
|
|
|
2021-01-24 22:34:12 +08:00
|
|
|
/* On ARM switch from EL3 or secure mode to EL2 or non-secure mode */
|
|
|
|
switch_to_non_secure_mode();
|
|
|
|
|
2022-02-22 08:58:30 +08:00
|
|
|
/*
|
|
|
|
* The UEFI standard requires that the watchdog timer is set to five
|
|
|
|
* minutes when invoking an EFI boot option.
|
|
|
|
*
|
|
|
|
* Unified Extensible Firmware Interface (UEFI), version 2.7 Errata A
|
|
|
|
* 7.5. Miscellaneous Boot Services - EFI_BOOT_SERVICES.SetWatchdogTimer
|
|
|
|
*/
|
|
|
|
ret = efi_set_watchdog(300);
|
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
log_err("ERROR: Failed to set watchdog timer\n");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-03-10 07:27:20 +08:00
|
|
|
/* Call our payload! */
|
2019-04-30 23:57:30 +08:00
|
|
|
ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data));
|
2020-07-18 02:21:00 +08:00
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
log_err("## Application failed, r = %lu\n",
|
|
|
|
ret & ~EFI_ERROR_MASK);
|
|
|
|
if (exit_data) {
|
|
|
|
log_err("## %ls\n", exit_data);
|
|
|
|
efi_free_pool(exit_data);
|
|
|
|
}
|
2019-04-30 23:57:30 +08:00
|
|
|
}
|
2017-09-14 06:05:33 +08:00
|
|
|
|
2019-04-19 11:22:31 +08:00
|
|
|
efi_restore_gd();
|
2018-11-26 11:14:39 +08:00
|
|
|
|
2022-02-22 08:58:30 +08:00
|
|
|
out:
|
2020-01-04 05:53:42 +08:00
|
|
|
free(load_options);
|
2017-09-14 06:05:33 +08:00
|
|
|
|
2021-03-18 03:55:00 +08:00
|
|
|
if (IS_ENABLED(CONFIG_EFI_LOAD_FILE2_INITRD))
|
|
|
|
efi_initrd_deregister();
|
|
|
|
|
2022-02-22 08:58:30 +08:00
|
|
|
/* Control is returned to U-Boot, disable EFI watchdog */
|
|
|
|
efi_set_watchdog(0);
|
|
|
|
|
2017-09-14 06:05:33 +08:00
|
|
|
return ret;
|
2016-03-10 07:27:20 +08:00
|
|
|
}
|
|
|
|
|
2019-04-19 11:22:33 +08:00
|
|
|
/**
|
2019-05-13 02:16:25 +08:00
|
|
|
* do_efibootmgr() - execute EFI boot manager
|
2019-04-19 11:22:33 +08:00
|
|
|
*
|
|
|
|
* Return: status code
|
|
|
|
*/
|
2019-05-13 02:16:25 +08:00
|
|
|
static int do_efibootmgr(void)
|
2019-04-19 11:22:32 +08:00
|
|
|
{
|
2019-04-19 11:22:35 +08:00
|
|
|
efi_handle_t handle;
|
2019-04-19 11:22:33 +08:00
|
|
|
efi_status_t ret;
|
2020-08-07 23:49:39 +08:00
|
|
|
void *load_options;
|
2019-04-19 11:22:33 +08:00
|
|
|
|
2020-08-07 23:49:39 +08:00
|
|
|
ret = efi_bootmgr_load(&handle, &load_options);
|
2019-04-19 11:22:35 +08:00
|
|
|
if (ret != EFI_SUCCESS) {
|
2020-07-18 02:21:00 +08:00
|
|
|
log_notice("EFI boot manager: Cannot load any image\n");
|
2019-04-19 11:22:35 +08:00
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
}
|
2019-04-19 11:22:32 +08:00
|
|
|
|
2020-08-07 23:49:39 +08:00
|
|
|
ret = do_bootefi_exec(handle, load_options);
|
2019-04-19 11:22:32 +08:00
|
|
|
|
2019-04-19 11:22:33 +08:00
|
|
|
if (ret != EFI_SUCCESS)
|
2019-04-19 11:22:35 +08:00
|
|
|
return CMD_RET_FAILURE;
|
2019-04-19 11:22:32 +08:00
|
|
|
|
2019-04-19 11:22:35 +08:00
|
|
|
return CMD_RET_SUCCESS;
|
2019-04-19 11:22:32 +08:00
|
|
|
}
|
|
|
|
|
2019-07-14 19:00:44 +08:00
|
|
|
/**
|
2019-05-13 02:16:25 +08:00
|
|
|
* do_bootefi_image() - execute EFI binary
|
|
|
|
*
|
|
|
|
* Set up memory image for the binary to be loaded, prepare device path, and
|
|
|
|
* then call do_bootefi_exec() to execute it.
|
2019-04-19 11:22:34 +08:00
|
|
|
*
|
|
|
|
* @image_opt: string of image start address
|
|
|
|
* Return: status code
|
|
|
|
*/
|
2019-05-13 02:16:25 +08:00
|
|
|
static int do_bootefi_image(const char *image_opt)
|
2019-04-19 11:22:34 +08:00
|
|
|
{
|
2019-04-19 11:22:35 +08:00
|
|
|
void *image_buf;
|
|
|
|
unsigned long addr, size;
|
2019-04-19 11:22:34 +08:00
|
|
|
efi_status_t ret;
|
|
|
|
|
|
|
|
#ifdef CONFIG_CMD_BOOTEFI_HELLO
|
|
|
|
if (!strcmp(image_opt, "hello")) {
|
2021-01-13 00:44:08 +08:00
|
|
|
image_buf = __efi_helloworld_begin;
|
2019-04-19 11:22:35 +08:00
|
|
|
size = __efi_helloworld_end - __efi_helloworld_begin;
|
2021-01-12 19:46:24 +08:00
|
|
|
efi_clear_bootdev();
|
2019-04-19 11:22:34 +08:00
|
|
|
} else
|
|
|
|
#endif
|
|
|
|
{
|
2021-01-12 19:46:24 +08:00
|
|
|
addr = strtoul(image_opt, NULL, 16);
|
2019-04-19 11:22:34 +08:00
|
|
|
/* Check that a numeric value was passed */
|
2021-01-12 19:46:24 +08:00
|
|
|
if (!addr)
|
2019-04-19 11:22:34 +08:00
|
|
|
return CMD_RET_USAGE;
|
2019-04-19 11:22:35 +08:00
|
|
|
|
2021-01-12 19:46:24 +08:00
|
|
|
image_buf = map_sysmem(addr, 0);
|
|
|
|
|
|
|
|
if (image_buf != image_addr) {
|
|
|
|
log_err("No UEFI binary known at %s\n", image_opt);
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
}
|
|
|
|
size = image_size;
|
2019-04-19 11:22:34 +08:00
|
|
|
}
|
2019-12-08 03:51:06 +08:00
|
|
|
ret = efi_run_image(image_buf, size);
|
|
|
|
|
|
|
|
if (ret != EFI_SUCCESS)
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* efi_run_image() - run loaded UEFI image
|
|
|
|
*
|
|
|
|
* @source_buffer: memory address of the UEFI image
|
|
|
|
* @source_size: size of the UEFI image
|
|
|
|
* Return: status code
|
|
|
|
*/
|
|
|
|
efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size)
|
|
|
|
{
|
|
|
|
efi_handle_t mem_handle = NULL, handle;
|
|
|
|
struct efi_device_path *file_path = NULL;
|
2020-08-26 01:54:05 +08:00
|
|
|
struct efi_device_path *msg_path;
|
2019-12-08 03:51:06 +08:00
|
|
|
efi_status_t ret;
|
2020-08-26 01:54:05 +08:00
|
|
|
u16 *load_options;
|
2019-04-19 11:22:34 +08:00
|
|
|
|
2019-12-08 03:51:06 +08:00
|
|
|
if (!bootefi_device_path || !bootefi_image_path) {
|
2022-01-30 05:58:37 +08:00
|
|
|
log_debug("Not loaded from disk\n");
|
2019-04-19 11:22:35 +08:00
|
|
|
/*
|
|
|
|
* Special case for efi payload not loaded from disk,
|
|
|
|
* such as 'bootefi hello' or for example payload
|
|
|
|
* loaded directly into memory via JTAG, etc:
|
|
|
|
*/
|
|
|
|
file_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE,
|
2019-12-08 03:51:06 +08:00
|
|
|
(uintptr_t)source_buffer,
|
|
|
|
source_size);
|
2019-04-19 11:22:35 +08:00
|
|
|
/*
|
|
|
|
* Make sure that device for device_path exist
|
|
|
|
* in load_image(). Otherwise, shell and grub will fail.
|
|
|
|
*/
|
|
|
|
ret = efi_create_handle(&mem_handle);
|
|
|
|
if (ret != EFI_SUCCESS)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
ret = efi_add_protocol(mem_handle, &efi_guid_device_path,
|
|
|
|
file_path);
|
|
|
|
if (ret != EFI_SUCCESS)
|
|
|
|
goto out;
|
2020-08-26 01:54:05 +08:00
|
|
|
msg_path = file_path;
|
2019-04-19 11:22:35 +08:00
|
|
|
} else {
|
2019-12-08 03:51:06 +08:00
|
|
|
file_path = efi_dp_append(bootefi_device_path,
|
|
|
|
bootefi_image_path);
|
2020-08-26 01:54:05 +08:00
|
|
|
msg_path = bootefi_image_path;
|
2022-01-30 05:58:37 +08:00
|
|
|
log_debug("Loaded from disk\n");
|
2019-04-19 11:22:35 +08:00
|
|
|
}
|
|
|
|
|
2020-08-26 01:54:05 +08:00
|
|
|
log_info("Booting %pD\n", msg_path);
|
|
|
|
|
2019-12-08 03:51:06 +08:00
|
|
|
ret = EFI_CALL(efi_load_image(false, efi_root, file_path, source_buffer,
|
|
|
|
source_size, &handle));
|
2020-08-26 01:54:05 +08:00
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
log_err("Loading image failed\n");
|
2019-04-19 11:22:35 +08:00
|
|
|
goto out;
|
2020-08-26 01:54:05 +08:00
|
|
|
}
|
2020-08-07 23:49:39 +08:00
|
|
|
|
|
|
|
/* Transfer environment variable as load options */
|
|
|
|
ret = efi_env_set_load_options(handle, "bootargs", &load_options);
|
|
|
|
if (ret != EFI_SUCCESS)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
ret = do_bootefi_exec(handle, load_options);
|
2019-04-19 11:22:35 +08:00
|
|
|
|
|
|
|
out:
|
2020-04-20 18:44:56 +08:00
|
|
|
efi_delete_handle(mem_handle);
|
|
|
|
efi_free_pool(file_path);
|
2019-12-08 03:51:06 +08:00
|
|
|
return ret;
|
2019-04-19 11:22:34 +08:00
|
|
|
}
|
|
|
|
|
2018-11-26 11:14:37 +08:00
|
|
|
#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
|
2019-04-19 11:22:31 +08:00
|
|
|
static efi_status_t bootefi_run_prepare(const char *load_options_path,
|
|
|
|
struct efi_device_path *device_path,
|
|
|
|
struct efi_device_path *image_path,
|
|
|
|
struct efi_loaded_image_obj **image_objp,
|
|
|
|
struct efi_loaded_image **loaded_image_infop)
|
|
|
|
{
|
|
|
|
efi_status_t ret;
|
2020-01-04 05:53:42 +08:00
|
|
|
u16 *load_options;
|
2019-04-19 11:22:31 +08:00
|
|
|
|
|
|
|
ret = efi_setup_loaded_image(device_path, image_path, image_objp,
|
|
|
|
loaded_image_infop);
|
|
|
|
if (ret != EFI_SUCCESS)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
/* Transfer environment variable as load options */
|
2020-08-07 23:47:13 +08:00
|
|
|
return efi_env_set_load_options((efi_handle_t)*image_objp,
|
|
|
|
load_options_path,
|
|
|
|
&load_options);
|
2019-04-19 11:22:31 +08:00
|
|
|
}
|
|
|
|
|
2018-11-26 11:14:37 +08:00
|
|
|
/**
|
|
|
|
* bootefi_test_prepare() - prepare to run an EFI test
|
|
|
|
*
|
2019-01-12 21:42:40 +08:00
|
|
|
* Prepare to run a test as if it were provided by a loaded image.
|
2018-11-26 11:14:37 +08:00
|
|
|
*
|
2019-01-12 21:42:40 +08:00
|
|
|
* @image_objp: pointer to be set to the loaded image handle
|
|
|
|
* @loaded_image_infop: pointer to be set to the loaded image protocol
|
|
|
|
* @path: dummy file path used to construct the device path
|
|
|
|
* set in the loaded image protocol
|
|
|
|
* @load_options_path: name of a U-Boot environment variable. Its value is
|
|
|
|
* set as load options in the loaded image protocol.
|
|
|
|
* Return: status code
|
2018-11-26 11:14:37 +08:00
|
|
|
*/
|
|
|
|
static efi_status_t bootefi_test_prepare
|
|
|
|
(struct efi_loaded_image_obj **image_objp,
|
2019-01-12 21:42:40 +08:00
|
|
|
struct efi_loaded_image **loaded_image_infop, const char *path,
|
|
|
|
const char *load_options_path)
|
2018-11-26 11:14:37 +08:00
|
|
|
{
|
2019-01-12 21:42:40 +08:00
|
|
|
efi_status_t ret;
|
|
|
|
|
2018-11-26 11:14:37 +08:00
|
|
|
/* Construct a dummy device path */
|
2019-01-12 21:42:40 +08:00
|
|
|
bootefi_device_path = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, 0, 0);
|
2018-11-26 11:14:37 +08:00
|
|
|
if (!bootefi_device_path)
|
|
|
|
return EFI_OUT_OF_RESOURCES;
|
2019-01-12 21:42:40 +08:00
|
|
|
|
2018-11-26 11:14:37 +08:00
|
|
|
bootefi_image_path = efi_dp_from_file(NULL, 0, path);
|
2019-01-12 21:42:40 +08:00
|
|
|
if (!bootefi_image_path) {
|
|
|
|
ret = EFI_OUT_OF_RESOURCES;
|
|
|
|
goto failure;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = bootefi_run_prepare(load_options_path, bootefi_device_path,
|
|
|
|
bootefi_image_path, image_objp,
|
|
|
|
loaded_image_infop);
|
|
|
|
if (ret == EFI_SUCCESS)
|
|
|
|
return ret;
|
2018-11-26 11:14:37 +08:00
|
|
|
|
2019-01-12 21:42:40 +08:00
|
|
|
failure:
|
2021-01-12 19:46:24 +08:00
|
|
|
efi_clear_bootdev();
|
2019-01-12 21:42:40 +08:00
|
|
|
return ret;
|
2018-11-26 11:14:37 +08:00
|
|
|
}
|
|
|
|
|
2019-04-19 11:22:31 +08:00
|
|
|
/**
|
|
|
|
* bootefi_run_finish() - finish up after running an EFI test
|
|
|
|
*
|
|
|
|
* @loaded_image_info: Pointer to a struct which holds the loaded image info
|
|
|
|
* @image_obj: Pointer to a struct which holds the loaded image object
|
|
|
|
*/
|
|
|
|
static void bootefi_run_finish(struct efi_loaded_image_obj *image_obj,
|
|
|
|
struct efi_loaded_image *loaded_image_info)
|
|
|
|
{
|
|
|
|
efi_restore_gd();
|
|
|
|
free(loaded_image_info->load_options);
|
|
|
|
efi_delete_handle(&image_obj->header);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2019-05-13 02:16:25 +08:00
|
|
|
* do_efi_selftest() - execute EFI selftest
|
2019-04-19 11:22:31 +08:00
|
|
|
*
|
|
|
|
* Return: status code
|
|
|
|
*/
|
2019-05-13 02:16:25 +08:00
|
|
|
static int do_efi_selftest(void)
|
2019-04-19 11:22:31 +08:00
|
|
|
{
|
|
|
|
struct efi_loaded_image_obj *image_obj;
|
|
|
|
struct efi_loaded_image *loaded_image_info;
|
|
|
|
efi_status_t ret;
|
|
|
|
|
|
|
|
ret = bootefi_test_prepare(&image_obj, &loaded_image_info,
|
|
|
|
"\\selftest", "efi_selftest");
|
|
|
|
if (ret != EFI_SUCCESS)
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
|
|
|
|
/* Execute the test */
|
|
|
|
ret = EFI_CALL(efi_selftest(&image_obj->header, &systab));
|
|
|
|
bootefi_run_finish(image_obj, loaded_image_info);
|
|
|
|
|
|
|
|
return ret != EFI_SUCCESS;
|
|
|
|
}
|
2018-11-26 11:14:37 +08:00
|
|
|
#endif /* CONFIG_CMD_BOOTEFI_SELFTEST */
|
|
|
|
|
2019-05-13 02:16:25 +08:00
|
|
|
/**
|
|
|
|
* do_bootefi() - execute `bootefi` command
|
|
|
|
*
|
|
|
|
* @cmdtp: table entry describing command
|
|
|
|
* @flag: bitmap indicating how the command was invoked
|
|
|
|
* @argc: number of arguments
|
|
|
|
* @argv: command line arguments
|
|
|
|
* Return: status code
|
|
|
|
*/
|
2020-05-11 01:40:03 +08:00
|
|
|
static int do_bootefi(struct cmd_tbl *cmdtp, int flag, int argc,
|
|
|
|
char *const argv[])
|
2016-03-10 07:27:20 +08:00
|
|
|
{
|
2019-05-13 02:16:25 +08:00
|
|
|
efi_status_t ret;
|
2019-12-08 08:07:01 +08:00
|
|
|
void *fdt;
|
2019-05-13 02:16:25 +08:00
|
|
|
|
2019-04-19 11:22:31 +08:00
|
|
|
if (argc < 2)
|
|
|
|
return CMD_RET_USAGE;
|
2019-04-19 11:22:33 +08:00
|
|
|
|
2019-05-13 02:16:25 +08:00
|
|
|
/* Initialize EFI drivers */
|
|
|
|
ret = efi_init_obj_list();
|
|
|
|
if (ret != EFI_SUCCESS) {
|
2020-07-18 02:21:00 +08:00
|
|
|
log_err("Error: Cannot initialize UEFI sub-system, r = %lu\n",
|
|
|
|
ret & ~EFI_ERROR_MASK);
|
2019-05-13 02:16:25 +08:00
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
}
|
|
|
|
|
2019-12-08 08:07:01 +08:00
|
|
|
if (argc > 2) {
|
|
|
|
uintptr_t fdt_addr;
|
|
|
|
|
2021-07-24 23:03:29 +08:00
|
|
|
fdt_addr = hextoul(argv[2], NULL);
|
2019-12-08 08:07:01 +08:00
|
|
|
fdt = map_sysmem(fdt_addr, 0);
|
|
|
|
} else {
|
|
|
|
fdt = EFI_FDT_USE_INTERNAL;
|
|
|
|
}
|
|
|
|
ret = efi_install_fdt(fdt);
|
2019-05-13 02:16:25 +08:00
|
|
|
if (ret == EFI_INVALID_PARAMETER)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
else if (ret != EFI_SUCCESS)
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
|
2021-01-16 02:02:50 +08:00
|
|
|
if (IS_ENABLED(CONFIG_CMD_BOOTEFI_BOOTMGR)) {
|
|
|
|
if (!strcmp(argv[1], "bootmgr"))
|
|
|
|
return do_efibootmgr();
|
|
|
|
}
|
2019-04-19 11:22:31 +08:00
|
|
|
#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
|
2021-01-16 02:02:50 +08:00
|
|
|
if (!strcmp(argv[1], "selftest"))
|
2019-05-13 02:16:25 +08:00
|
|
|
return do_efi_selftest();
|
2019-04-19 11:22:31 +08:00
|
|
|
#endif
|
|
|
|
|
2019-05-13 02:16:25 +08:00
|
|
|
return do_bootefi_image(argv[1]);
|
2016-03-10 07:27:20 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_SYS_LONGHELP
|
|
|
|
static char bootefi_help_text[] =
|
2016-04-14 22:07:53 +08:00
|
|
|
"<image address> [fdt address]\n"
|
|
|
|
" - boot EFI payload stored at address <image address>.\n"
|
|
|
|
" If specified, the device tree located at <fdt address> gets\n"
|
2016-11-07 23:47:08 +08:00
|
|
|
" exposed as EFI configuration table.\n"
|
|
|
|
#ifdef CONFIG_CMD_BOOTEFI_HELLO
|
2017-09-15 16:06:11 +08:00
|
|
|
"bootefi hello\n"
|
|
|
|
" - boot a sample Hello World application stored within U-Boot\n"
|
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_CMD_BOOTEFI_SELFTEST
|
2018-03-03 22:29:03 +08:00
|
|
|
"bootefi selftest [fdt address]\n"
|
2017-09-15 16:06:11 +08:00
|
|
|
" - boot an EFI selftest application stored within U-Boot\n"
|
2017-10-19 00:13:13 +08:00
|
|
|
" Use environment variable efi_selftest to select a single test.\n"
|
|
|
|
" Use 'setenv efi_selftest list' to enumerate all tests.\n"
|
2016-11-07 23:47:08 +08:00
|
|
|
#endif
|
2021-01-16 02:02:50 +08:00
|
|
|
#ifdef CONFIG_CMD_BOOTEFI_BOOTMGR
|
2019-04-19 11:22:35 +08:00
|
|
|
"bootefi bootmgr [fdt address]\n"
|
2017-09-14 06:05:38 +08:00
|
|
|
" - load and boot EFI payload based on BootOrder/BootXXXX variables.\n"
|
|
|
|
"\n"
|
|
|
|
" If specified, the device tree located at <fdt address> gets\n"
|
2021-01-16 02:02:50 +08:00
|
|
|
" exposed as EFI configuration table.\n"
|
|
|
|
#endif
|
|
|
|
;
|
2016-03-10 07:27:20 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
U_BOOT_CMD(
|
2016-04-14 22:07:53 +08:00
|
|
|
bootefi, 3, 0, do_bootefi,
|
2016-06-08 02:14:31 +08:00
|
|
|
"Boots an EFI payload from memory",
|
2016-03-10 07:27:20 +08:00
|
|
|
bootefi_help_text
|
|
|
|
);
|