Loading...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 | // SPDX-License-Identifier: GPL-2.0+ /* * Copyright (c) 2020, Linaro Limited */ #define LOG_CATEGORY LOGC_EFI #include <blkmap.h> #include <bootm.h> #include <efi_device_path.h> #include <env.h> #include <image.h> #include <log.h> #include <malloc.h> #include <mapmem.h> #include <dm.h> #include <fs_legacy.h> #include <efi.h> #include <efi_api.h> #include <efi_load_initrd.h> #include <efi_loader.h> #include <efi_variable.h> #include <host_arch.h> #include <linux/libfdt.h> #include <linux/list.h> /** * efi_create_current_boot_var() - Return Boot#### name were #### is replaced by * the value of BootCurrent * * @var_name: variable name * @var_name_size: size of var_name * * Return: Status code */ static efi_status_t efi_create_current_boot_var(u16 var_name[], size_t var_name_size) { efi_uintn_t boot_current_size; efi_status_t ret; u16 boot_current; u16 *pos; boot_current_size = sizeof(boot_current); ret = efi_get_variable_int(u"BootCurrent", &efi_global_variable_guid, NULL, &boot_current_size, &boot_current, NULL); if (ret != EFI_SUCCESS) goto out; pos = efi_create_indexed_name(var_name, var_name_size, "Boot", boot_current); if (!pos) { ret = EFI_OUT_OF_RESOURCES; goto out; } out: return ret; } /** * efi_get_dp_from_boot() - Retrieve and return a device path from an EFI * Boot### variable. * A boot option may contain an array of device paths. * We use a VenMedia() with a specific GUID to identify * the usage of the array members. This function is * used to extract a specific device path * * @guid: vendor GUID of the VenMedia() device path node identifying the * device path * * Return: device path or NULL. Caller must free the returned value */ struct efi_device_path *efi_get_dp_from_boot(const efi_guid_t *guid) { struct efi_device_path *file_path = NULL; struct efi_load_option lo; void *var_value; efi_uintn_t size; efi_status_t ret; u16 var_name[16]; ret = efi_create_current_boot_var(var_name, sizeof(var_name)); if (ret != EFI_SUCCESS) return NULL; var_value = efi_get_var(var_name, &efi_global_variable_guid, &size); if (!var_value) return NULL; ret = efi_deserialize_load_option(&lo, var_value, &size); if (ret != EFI_SUCCESS) goto err; file_path = efi_dp_from_lo(&lo, guid); err: free(var_value); return file_path; } const struct guid_to_hash_map { efi_guid_t guid; const char algo[32]; u32 bits; } guid_to_hash[] = { { EFI_CERT_X509_SHA256_GUID, "sha256", SHA256_SUM_LEN * 8, }, { EFI_CERT_SHA256_GUID, "sha256", SHA256_SUM_LEN * 8, }, { EFI_CERT_X509_SHA384_GUID, "sha384", SHA384_SUM_LEN * 8, }, { EFI_CERT_X509_SHA512_GUID, "sha512", SHA512_SUM_LEN * 8, }, }; #define MAX_GUID_TO_HASH_COUNT ARRAY_SIZE(guid_to_hash) /** guid_to_sha_str - return the sha string e.g "sha256" for a given guid * used on EFI security databases * * @guid: guid to check * * Return: len or 0 if no match is found */ const char *guid_to_sha_str(const efi_guid_t *guid) { size_t i; for (i = 0; i < MAX_GUID_TO_HASH_COUNT; i++) { if (!guidcmp(guid, &guid_to_hash[i].guid)) return guid_to_hash[i].algo; } return NULL; } /** algo_to_len - return the sha size in bytes for a given string * * @algo: string indicating hashing algorithm to check * * Return: length of hash in bytes or 0 if no match is found */ int algo_to_len(const char *algo) { size_t i; for (i = 0; i < MAX_GUID_TO_HASH_COUNT; i++) { if (!strcmp(algo, guid_to_hash[i].algo)) return guid_to_hash[i].bits / 8; } return 0; } /** efi_link_dev - link the efi_handle_t and udevice * * @handle: efi handle to associate with udevice * @dev: udevice to associate with efi handle * * Return: 0 on success, negative on failure */ int efi_link_dev(efi_handle_t handle, struct udevice *dev) { handle->dev = dev; return dev_tag_set_ptr(dev, DM_TAG_EFI, handle); } /** * efi_unlink_dev() - unlink udevice and handle * * @handle: EFI handle to unlink * * Return: 0 on success, negative on failure */ int efi_unlink_dev(efi_handle_t handle) { int ret; ret = dev_tag_del(handle->dev, DM_TAG_EFI); if (ret) return ret; handle->dev = NULL; return 0; } /** * efi_next_variable_name() - get next variable name * * This function is a wrapper of efi_get_next_variable_name_int(). * If efi_get_next_variable_name_int() returns EFI_BUFFER_TOO_SMALL, * @size and @buf are updated by new buffer size and realloced buffer. * * @size: pointer to the buffer size * @buf: pointer to the buffer * @guid: pointer to the guid * Return: status code */ efi_status_t efi_next_variable_name(efi_uintn_t *size, u16 **buf, efi_guid_t *guid) { u16 *p; efi_status_t ret; efi_uintn_t buf_size = *size; ret = efi_get_next_variable_name_int(&buf_size, *buf, guid); if (ret == EFI_NOT_FOUND) return ret; if (ret == EFI_BUFFER_TOO_SMALL) { p = realloc(*buf, buf_size); if (!p) return EFI_OUT_OF_RESOURCES; *buf = p; *size = buf_size; ret = efi_get_next_variable_name_int(&buf_size, *buf, guid); } return ret; } /** * efi_search_bootorder() - search the boot option index in BootOrder * * @bootorder: pointer to the BootOrder variable * @num: number of BootOrder entry * @target: target boot option index to search * @index: pointer to store the index of BootOrder variable * Return: true if exists, false otherwise */ bool efi_search_bootorder(u16 *bootorder, efi_uintn_t num, u32 target, u32 *index) { u32 i; for (i = 0; i < num; i++) { if (target == bootorder[i]) { if (index) *index = i; return true; } } return false; } /** * efi_env_set_load_options() - set load options from environment variable * * @handle: the image handle * @env_var: name of the environment variable * @load_options: pointer to load options (output) * Return: status code */ efi_status_t efi_env_set_load_options(efi_handle_t handle, const char *env_var, u16 **load_options) { const char *env = env_get(env_var); size_t size; u16 *pos; efi_status_t ret; *load_options = NULL; if (!env) return EFI_SUCCESS; size = sizeof(u16) * (utf8_utf16_strlen(env) + 1); pos = calloc(size, 1); if (!pos) return EFI_OUT_OF_RESOURCES; *load_options = pos; utf8_utf16_strcpy(&pos, env); ret = efi_set_load_options(handle, size, *load_options); if (ret != EFI_SUCCESS) { free(*load_options); *load_options = NULL; } return ret; } /** * copy_fdt() - Copy the device tree to a new location available to EFI * * The FDT is copied to a suitable location within the EFI memory map. * Additional 12 KiB are added to the space in case the device tree needs to be * expanded later with fdt_open_into(). * * @fdtp: On entry a pointer to the flattened device tree. * On exit a pointer to the copy of the flattened device tree. * FDT start * Return: status code */ static efi_status_t copy_fdt(void **fdtp) { efi_status_t ret = 0; void *fdt, *new_fdt; static u64 new_fdt_addr; static efi_uintn_t fdt_pages; ulong fdt_size; /* * Remove the configuration table that might already be * installed, ignoring EFI_NOT_FOUND if no device-tree * is installed */ efi_install_configuration_table(&efi_guid_fdt, NULL); if (new_fdt_addr) { log_debug("%s: Found allocated memory at %#llx, with %#zx pages\n", __func__, new_fdt_addr, fdt_pages); ret = efi_free_pages(new_fdt_addr, fdt_pages); if (ret != EFI_SUCCESS) log_err("Unable to free up existing FDT memory region\n"); new_fdt_addr = 0; fdt_pages = 0; } /* * Give us at least 12 KiB of breathing room in case the device tree * needs to be expanded later. */ fdt = *fdtp; fdt_pages = efi_size_in_pages(fdt_totalsize(fdt) + CONFIG_SYS_FDT_PAD); fdt_size = fdt_pages << EFI_PAGE_SHIFT; ret = efi_allocate_pages(EFI_ALLOCATE_ANY_PAGES, EFI_ACPI_RECLAIM_MEMORY, fdt_pages, &new_fdt_addr); if (ret != EFI_SUCCESS) { log_err("Failed to reserve space for FDT\n"); return ret; } new_fdt = map_sysmem(new_fdt_addr, fdt_size); log_debug("%s: Allocated memory at %#llx, with %#zx pages\n", __func__, new_fdt_addr, fdt_pages); memcpy(new_fdt, fdt, fdt_totalsize(fdt)); fdt_set_totalsize(new_fdt, fdt_size); *fdtp = new_fdt; return EFI_SUCCESS; } /** * efi_get_configuration_table() - get configuration table * * @guid: GUID of the configuration table * Return: pointer to configuration table or NULL */ void *efi_get_configuration_table(const efi_guid_t *guid) { size_t i; for (i = 0; i < systab.nr_tables; i++) { if (!guidcmp(guid, &systab.tables[i].guid)) return systab.tables[i].table; } return NULL; } /** * efi_install_fdt() - install device tree * * If fdt is not EFI_FDT_USE_INTERNAL, the device tree located at that memory * address will be installed as configuration table, otherwise the device * tree located at the address indicated by environment variable fdt_addr or as * fallback fdtcontroladdr will be used. * * On architectures using ACPI tables device trees shall not be installed as * configuration table. * * @fdt: address of device tree or EFI_FDT_USE_INTERNAL to use * the hardware device tree as indicated by environment variable * fdt_addr or as fallback the internal device tree as indicated by * the environment variable fdtcontroladdr * Return: status code */ efi_status_t efi_install_fdt(void *fdt) { struct bootm_headers img = { 0 }; efi_status_t ret; /* * The EBBR spec requires that we have either an FDT or an ACPI table * but not both. */ if (CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE) && fdt) log_warning("Can't have ACPI table and device tree - ignoring DT.\n"); if (fdt == EFI_FDT_USE_INTERNAL) { const char *fdt_opt; uintptr_t fdt_addr; /* Check if there is a hardware device tree */ fdt_opt = env_get("fdt_addr"); /* Use our own device tree as fallback */ if (!fdt_opt) { fdt_opt = env_get("fdtcontroladdr"); if (!fdt_opt) { log_err("need device tree\n"); return EFI_NOT_FOUND; } } fdt_addr = hextoul(fdt_opt, NULL); if (!fdt_addr) { log_err("invalid $fdt_addr or $fdtcontroladdr\n"); return EFI_LOAD_ERROR; } fdt = map_sysmem(fdt_addr, 0); } /* Install device tree */ if (fdt_check_header(fdt)) { log_err("invalid device tree\n"); return EFI_LOAD_ERROR; } if (CONFIG_IS_ENABLED(GENERATE_ACPI_TABLE)) { /* Create memory reservations as indicated by the device tree */ efi_carve_out_dt_rsv(fdt); return EFI_SUCCESS; } /* Prepare device tree for payload */ ret = copy_fdt(&fdt); if (ret) { log_err("out of memory\n"); return EFI_OUT_OF_RESOURCES; } if (image_setup_libfdt(&img, fdt, false)) { log_err("failed to process device tree\n"); return EFI_LOAD_ERROR; } /* Create memory reservations as indicated by the device tree */ efi_carve_out_dt_rsv(fdt); efi_try_purge_rng_seed(fdt); if (CONFIG_IS_ENABLED(EFI_TCG2_PROTOCOL_MEASURE_DTB)) { ret = efi_tcg2_measure_dtb(fdt); if (ret == EFI_SECURITY_VIOLATION) { log_err("failed to measure DTB\n"); return ret; } } /* Install device tree as UEFI table */ ret = efi_install_configuration_table(&efi_guid_fdt, fdt); if (ret != EFI_SUCCESS) { log_err("failed to install device tree\n"); return ret; } return EFI_SUCCESS; } /** * efi_install_initrd() - install initrd * * Install the initrd located at @initrd using the EFI_LOAD_FILE2 * protocol. * * @initrd: address of initrd or NULL if none is provided * @initrd_sz: size of initrd * Return: status code */ efi_status_t efi_install_initrd(void *initrd, size_t initd_sz) { efi_status_t ret; struct efi_device_path *dp_initrd; if (!initrd) return EFI_SUCCESS; dp_initrd = efi_dp_from_mem(EFI_LOADER_DATA, initrd, initd_sz); if (!dp_initrd) return EFI_OUT_OF_RESOURCES; ret = efi_initrd_register(dp_initrd); if (ret != EFI_SUCCESS) efi_free_pool(dp_initrd); return ret; } /** * do_bootefi_exec() - execute EFI binary * * The image indicated by @handle is started. When it returns the allocated * memory for the @load_options is freed. * * @handle: handle of loaded image * @load_options: load options * Return: status code * * Load the EFI binary into a newly assigned memory unwinding the relocation * information, install the loaded image protocol, and call the binary. */ efi_status_t do_bootefi_exec(efi_handle_t handle, void *load_options) { efi_status_t ret; efi_uintn_t exit_data_size = 0; u16 *exit_data = NULL; struct efi_event *evt; /* On ARM switch from EL3 or secure mode to EL2 or non-secure mode */ switch_to_non_secure_mode(); /* * The UEFI standard requires that the watchdog timer is set to five * minutes when invoking an EFI boot option. * * Unified Extensible Firmware Interface (UEFI), version 2.7 Errata A * 7.5. Miscellaneous Boot Services - EFI_BOOT_SERVICES.SetWatchdogTimer */ ret = efi_set_watchdog(300); if (ret != EFI_SUCCESS) { log_err("failed to set watchdog timer\n"); goto out; } /* Call our payload! */ ret = EFI_CALL(efi_start_image(handle, &exit_data_size, &exit_data)); if (ret != EFI_SUCCESS) { log_err("## Application failed, r = %lu\n", ret & ~EFI_ERROR_MASK); if (exit_data) { log_err("## %ls\n", exit_data); efi_free_pool(exit_data); } } out: free(load_options); /* Notify EFI_EVENT_GROUP_RETURN_TO_EFIBOOTMGR event group. */ list_for_each_entry(evt, &efi_events, link) { if (evt->group && !guidcmp(evt->group, &efi_guid_event_group_return_to_efibootmgr)) { efi_signal_event(evt); EFI_CALL(systab.boottime->close_event(evt)); break; } } /* Control is returned to U-Boot, disable EFI watchdog */ efi_set_watchdog(0); return ret; } /** * pmem_node_efi_memmap_setup() - Add pmem node and tweak EFI memmap * @fdt: The devicetree to which pmem node is added * @addr: start address of the pmem node * @size: size of the memory of the pmem node * * The function adds the pmem node to the device-tree along with removing * the corresponding region from the EFI memory map. Used primarily to * pass the information of a RAM based ISO image to the OS. * * Return: 0 on success, -ve value on error */ static int pmem_node_efi_memmap_setup(void *fdt, u64 addr, u64 size) { int ret; u64 pages; efi_status_t status; ret = fdt_fixup_pmem_region(fdt, addr, size); if (ret) { log_err("Failed to setup pmem node for addr %#llx, size %#llx, err %d\n", addr, size, ret); return ret; } /* Remove the pmem region from the EFI memory map */ pages = efi_size_in_pages(size + (addr & EFI_PAGE_MASK)); status = efi_update_memory_map(addr, pages, EFI_CONVENTIONAL_MEMORY, false, true); if (status != EFI_SUCCESS) return -1; return 0; } int fdt_efi_pmem_setup(void *fdt) { return blkmap_get_preserved_pmem_slices(pmem_node_efi_memmap_setup, fdt); } |