blob: c71e87d118030af05d32b7619c0497f6c1b0b592 [file] [log] [blame]
Ilias Apalodimas37c3ca52021-03-17 21:54:59 +02001// SPDX-License-Identifier: GPL-2.0+
2/*
3 * Copyright (c) 2020, Linaro Limited
4 */
5
6#define LOG_CATEGORY LOGC_EFI
7#include <common.h>
8#include <env.h>
9#include <malloc.h>
10#include <dm.h>
11#include <fs.h>
12#include <efi_load_initrd.h>
13#include <efi_loader.h>
14#include <efi_variable.h>
15
Heinrich Schuchardt9ad37fe2021-10-15 02:33:33 +020016#if defined(CONFIG_CMD_EFIDEBUG) || defined(CONFIG_EFI_LOAD_FILE2_INITRD)
17/* GUID used by Linux to identify the LoadFile2 protocol with the initrd */
18const efi_guid_t efi_lf2_initrd_guid = EFI_INITRD_MEDIA_GUID;
19#endif
20
Ilias Apalodimas37c3ca52021-03-17 21:54:59 +020021/**
22 * efi_create_current_boot_var() - Return Boot#### name were #### is replaced by
23 * the value of BootCurrent
24 *
25 * @var_name: variable name
26 * @var_name_size: size of var_name
27 *
28 * Return: Status code
29 */
30static efi_status_t efi_create_current_boot_var(u16 var_name[],
31 size_t var_name_size)
32{
33 efi_uintn_t boot_current_size;
34 efi_status_t ret;
35 u16 boot_current;
36 u16 *pos;
37
38 boot_current_size = sizeof(boot_current);
Simon Glass156ccbc2022-01-23 12:55:12 -070039 ret = efi_get_variable_int(u"BootCurrent",
Ilias Apalodimas37c3ca52021-03-17 21:54:59 +020040 &efi_global_variable_guid, NULL,
41 &boot_current_size, &boot_current, NULL);
42 if (ret != EFI_SUCCESS)
43 goto out;
44
45 pos = efi_create_indexed_name(var_name, var_name_size, "Boot",
46 boot_current);
47 if (!pos) {
48 ret = EFI_OUT_OF_RESOURCES;
49 goto out;
50 }
51
52out:
53 return ret;
54}
55
56/**
57 * efi_get_dp_from_boot() - Retrieve and return a device path from an EFI
58 * Boot### variable.
59 * A boot option may contain an array of device paths.
60 * We use a VenMedia() with a specific GUID to identify
61 * the usage of the array members. This function is
62 * used to extract a specific device path
63 *
64 * @guid: vendor GUID of the VenMedia() device path node identifying the
65 * device path
66 *
67 * Return: device path or NULL. Caller must free the returned value
68 */
69struct efi_device_path *efi_get_dp_from_boot(const efi_guid_t guid)
70{
Ilias Apalodimas37c3ca52021-03-17 21:54:59 +020071 struct efi_load_option lo;
Heinrich Schuchardtdb61e702021-10-15 02:59:15 +020072 void *var_value;
Ilias Apalodimas37c3ca52021-03-17 21:54:59 +020073 efi_uintn_t size;
74 efi_status_t ret;
75 u16 var_name[16];
76
77 ret = efi_create_current_boot_var(var_name, sizeof(var_name));
78 if (ret != EFI_SUCCESS)
79 return NULL;
80
81 var_value = efi_get_var(var_name, &efi_global_variable_guid, &size);
82 if (!var_value)
83 return NULL;
84
85 ret = efi_deserialize_load_option(&lo, var_value, &size);
86 if (ret != EFI_SUCCESS)
Heinrich Schuchardtdb61e702021-10-15 02:59:15 +020087 goto err;
Ilias Apalodimas37c3ca52021-03-17 21:54:59 +020088
Heinrich Schuchardtdb61e702021-10-15 02:59:15 +020089 return efi_dp_from_lo(&lo, &guid);
Ilias Apalodimas37c3ca52021-03-17 21:54:59 +020090
Heinrich Schuchardtdb61e702021-10-15 02:59:15 +020091err:
Ilias Apalodimas37c3ca52021-03-17 21:54:59 +020092 free(var_value);
Heinrich Schuchardtdb61e702021-10-15 02:59:15 +020093 return NULL;
Ilias Apalodimas37c3ca52021-03-17 21:54:59 +020094}
Ilias Apalodimasb436cc62022-05-06 15:36:00 +030095
96const struct guid_to_hash_map {
97 efi_guid_t guid;
98 const char algo[32];
99 u32 bits;
100} guid_to_hash[] = {
101 {
102 EFI_CERT_X509_SHA256_GUID,
103 "sha256",
104 SHA256_SUM_LEN * 8,
105 },
106 {
107 EFI_CERT_SHA256_GUID,
108 "sha256",
109 SHA256_SUM_LEN * 8,
110 },
111 {
112 EFI_CERT_X509_SHA384_GUID,
113 "sha384",
114 SHA384_SUM_LEN * 8,
115 },
116 {
117 EFI_CERT_X509_SHA512_GUID,
118 "sha512",
119 SHA512_SUM_LEN * 8,
120 },
121};
122
123#define MAX_GUID_TO_HASH_COUNT ARRAY_SIZE(guid_to_hash)
124
125/** guid_to_sha_str - return the sha string e.g "sha256" for a given guid
126 * used on EFI security databases
127 *
128 * @guid: guid to check
129 *
130 * Return: len or 0 if no match is found
131 */
132const char *guid_to_sha_str(const efi_guid_t *guid)
133{
134 size_t i;
135
136 for (i = 0; i < MAX_GUID_TO_HASH_COUNT; i++) {
137 if (!guidcmp(guid, &guid_to_hash[i].guid))
138 return guid_to_hash[i].algo;
139 }
140
141 return NULL;
142}
143
144/** algo_to_len - return the sha size in bytes for a given string
145 *
146 * @algo: string indicating hashing algorithm to check
147 *
148 * Return: length of hash in bytes or 0 if no match is found
149 */
150int algo_to_len(const char *algo)
151{
152 size_t i;
153
154 for (i = 0; i < MAX_GUID_TO_HASH_COUNT; i++) {
155 if (!strcmp(algo, guid_to_hash[i].algo))
156 return guid_to_hash[i].bits / 8;
157 }
158
159 return 0;
160}
Masahisa Kojimaee576662022-07-22 11:39:10 +0900161
162/** efi_link_dev - link the efi_handle_t and udevice
163 *
164 * @handle: efi handle to associate with udevice
165 * @dev: udevice to associate with efi handle
166 *
167 * Return: 0 on success, negative on failure
168 */
169int efi_link_dev(efi_handle_t handle, struct udevice *dev)
170{
171 handle->dev = dev;
172 return dev_tag_set_ptr(dev, DM_TAG_EFI, handle);
173}
Heinrich Schuchardt16b27b62022-10-03 09:47:51 +0200174
175/**
176 * efi_unlink_dev() - unlink udevice and handle
177 *
178 * @handle: EFI handle to unlink
179 *
180 * Return: 0 on success, negative on failure
181 */
182int efi_unlink_dev(efi_handle_t handle)
183{
184 int ret;
185
186 ret = dev_tag_del(handle->dev, DM_TAG_EFI);
187 if (ret)
188 return ret;
189 handle->dev = NULL;
190
191 return 0;
192}