efi-stub-helper.c 22.5 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0
2 3 4 5 6 7 8 9
/*
 * Helper functions used by the EFI stub on multiple
 * architectures. This should be #included by the EFI stub
 * implementation files.
 *
 * Copyright 2011 Intel Corporation; author Matt Fleming
 */

10 11 12 13
#include <linux/efi.h>
#include <asm/efi.h>

#include "efistub.h"
14

15 16 17 18 19 20 21 22 23 24 25 26 27
/*
 * Some firmware implementations have problems reading files in one go.
 * A read chunk size of 1MB seems to work for most platforms.
 *
 * Unfortunately, reading files in chunks triggers *other* bugs on some
 * platforms, so we provide a way to disable this workaround, which can
 * be done by passing "efi=nochunk" on the EFI boot stub command line.
 *
 * If you experience issues with initrd images being corrupt it's worth
 * trying efi=nochunk, but chunking is enabled by default because there
 * are far more machines that require the workaround than those that
 * break with it enabled.
 */
28
#define EFI_READ_CHUNK_SIZE	(1024 * 1024)
29

30 31
static unsigned long __chunk_size = EFI_READ_CHUNK_SIZE;

32
static int __section(.data) __nokaslr;
33
static int __section(.data) __quiet;
34
static int __section(.data) __novamap;
35 36 37 38 39

int __pure nokaslr(void)
{
	return __nokaslr;
}
40 41 42 43
int __pure is_quiet(void)
{
	return __quiet;
}
44 45 46 47
int __pure novamap(void)
{
	return __novamap;
}
48

49 50
#define EFI_MMAP_NR_SLACK_SLOTS	8

51
struct file_info {
52 53 54 55
	efi_file_handle_t *handle;
	u64 size;
};

56
void efi_printk(efi_system_table_t *sys_table_arg, char *str)
57 58 59 60 61 62 63 64 65
{
	char *s8;

	for (s8 = str; *s8; s8++) {
		efi_char16_t ch[2] = { 0 };

		ch[0] = *s8;
		if (*s8 == '\n') {
			efi_char16_t nl[2] = { '\r', 0 };
66
			efi_char16_printk(sys_table_arg, nl);
67 68
		}

69
		efi_char16_printk(sys_table_arg, ch);
70 71 72
	}
}

73 74 75 76 77 78 79 80 81
static inline bool mmap_has_headroom(unsigned long buff_size,
				     unsigned long map_size,
				     unsigned long desc_size)
{
	unsigned long slack = buff_size - map_size;

	return slack / desc_size >= EFI_MMAP_NR_SLACK_SLOTS;
}

82
efi_status_t efi_get_memory_map(efi_system_table_t *sys_table_arg,
83
				struct efi_boot_memmap *map)
84 85 86 87 88 89
{
	efi_memory_desc_t *m = NULL;
	efi_status_t status;
	unsigned long key;
	u32 desc_version;

90 91 92
	*map->desc_size =	sizeof(*m);
	*map->map_size =	*map->desc_size * 32;
	*map->buff_size =	*map->map_size;
93
again:
94
	status = efi_call_early(allocate_pool, EFI_LOADER_DATA,
95
				*map->map_size, (void **)&m);
96 97 98
	if (status != EFI_SUCCESS)
		goto fail;

99
	*map->desc_size = 0;
100
	key = 0;
101 102 103 104 105
	status = efi_call_early(get_memory_map, map->map_size, m,
				&key, map->desc_size, &desc_version);
	if (status == EFI_BUFFER_TOO_SMALL ||
	    !mmap_has_headroom(*map->buff_size, *map->map_size,
			       *map->desc_size)) {
106
		efi_call_early(free_pool, m);
107 108 109 110 111 112 113 114 115
		/*
		 * Make sure there is some entries of headroom so that the
		 * buffer can be reused for a new map after allocations are
		 * no longer permitted.  Its unlikely that the map will grow to
		 * exceed this headroom once we are ready to trigger
		 * ExitBootServices()
		 */
		*map->map_size += *map->desc_size * EFI_MMAP_NR_SLACK_SLOTS;
		*map->buff_size = *map->map_size;
116
		goto again;
117 118 119
	}

	if (status != EFI_SUCCESS)
120
		efi_call_early(free_pool, m);
121

122 123 124 125
	if (map->key_ptr && status == EFI_SUCCESS)
		*map->key_ptr = key;
	if (map->desc_ver && status == EFI_SUCCESS)
		*map->desc_ver = desc_version;
126 127

fail:
128
	*map->map = m;
129 130 131
	return status;
}

132

133
unsigned long get_dram_base(efi_system_table_t *sys_table_arg)
134 135
{
	efi_status_t status;
136
	unsigned long map_size, buff_size;
137 138 139
	unsigned long membase  = EFI_ERROR;
	struct efi_memory_map map;
	efi_memory_desc_t *md;
140
	struct efi_boot_memmap boot_map;
141

142 143 144 145 146 147 148 149
	boot_map.map =		(efi_memory_desc_t **)&map.map;
	boot_map.map_size =	&map_size;
	boot_map.desc_size =	&map.desc_size;
	boot_map.desc_ver =	NULL;
	boot_map.key_ptr =	NULL;
	boot_map.buff_size =	&buff_size;

	status = efi_get_memory_map(sys_table_arg, &boot_map);
150 151 152 153 154
	if (status != EFI_SUCCESS)
		return membase;

	map.map_end = map.map + map_size;

155 156
	for_each_efi_memory_desc_in_map(&map, md) {
		if (md->attribute & EFI_MEMORY_WB) {
157 158
			if (membase > md->phys_addr)
				membase = md->phys_addr;
159 160
		}
	}
161 162 163 164 165 166

	efi_call_early(free_pool, map.map);

	return membase;
}

167 168 169
/*
 * Allocate at the highest possible address that is not above 'max'.
 */
170 171 172
efi_status_t efi_high_alloc(efi_system_table_t *sys_table_arg,
			    unsigned long size, unsigned long align,
			    unsigned long *addr, unsigned long max)
173
{
174
	unsigned long map_size, desc_size, buff_size;
175 176 177 178 179
	efi_memory_desc_t *map;
	efi_status_t status;
	unsigned long nr_pages;
	u64 max_addr = 0;
	int i;
180 181 182 183 184 185 186 187
	struct efi_boot_memmap boot_map;

	boot_map.map =		&map;
	boot_map.map_size =	&map_size;
	boot_map.desc_size =	&desc_size;
	boot_map.desc_ver =	NULL;
	boot_map.key_ptr =	NULL;
	boot_map.buff_size =	&buff_size;
188

189
	status = efi_get_memory_map(sys_table_arg, &boot_map);
190 191 192
	if (status != EFI_SUCCESS)
		goto fail;

193
	/*
194 195 196 197
	 * Enforce minimum alignment that EFI or Linux requires when
	 * requesting a specific address.  We are doing page-based (or
	 * larger) allocations, and both the address and size must meet
	 * alignment constraints.
198
	 */
199 200
	if (align < EFI_ALLOC_ALIGN)
		align = EFI_ALLOC_ALIGN;
201

202 203
	size = round_up(size, EFI_ALLOC_ALIGN);
	nr_pages = size / EFI_PAGE_SIZE;
204 205 206 207 208 209
again:
	for (i = 0; i < map_size / desc_size; i++) {
		efi_memory_desc_t *desc;
		unsigned long m = (unsigned long)map;
		u64 start, end;

210
		desc = efi_early_memdesc_ptr(m, desc_size, i);
211 212 213 214 215 216 217
		if (desc->type != EFI_CONVENTIONAL_MEMORY)
			continue;

		if (desc->num_pages < nr_pages)
			continue;

		start = desc->phys_addr;
218
		end = start + desc->num_pages * EFI_PAGE_SIZE;
219

220
		if (end > max)
221 222
			end = max;

223 224 225
		if ((start + size) > end)
			continue;

226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244
		if (round_down(end - size, align) < start)
			continue;

		start = round_down(end - size, align);

		/*
		 * Don't allocate at 0x0. It will confuse code that
		 * checks pointers against NULL.
		 */
		if (start == 0x0)
			continue;

		if (start > max_addr)
			max_addr = start;
	}

	if (!max_addr)
		status = EFI_NOT_FOUND;
	else {
245 246 247
		status = efi_call_early(allocate_pages,
					EFI_ALLOCATE_ADDRESS, EFI_LOADER_DATA,
					nr_pages, &max_addr);
248 249 250 251 252 253 254 255 256
		if (status != EFI_SUCCESS) {
			max = max_addr;
			max_addr = 0;
			goto again;
		}

		*addr = max_addr;
	}

257
	efi_call_early(free_pool, map);
258 259 260 261 262 263 264
fail:
	return status;
}

/*
 * Allocate at the lowest possible address.
 */
265 266 267
efi_status_t efi_low_alloc(efi_system_table_t *sys_table_arg,
			   unsigned long size, unsigned long align,
			   unsigned long *addr)
268
{
269
	unsigned long map_size, desc_size, buff_size;
270 271 272 273
	efi_memory_desc_t *map;
	efi_status_t status;
	unsigned long nr_pages;
	int i;
274 275 276 277 278 279 280 281
	struct efi_boot_memmap boot_map;

	boot_map.map =		&map;
	boot_map.map_size =	&map_size;
	boot_map.desc_size =	&desc_size;
	boot_map.desc_ver =	NULL;
	boot_map.key_ptr =	NULL;
	boot_map.buff_size =	&buff_size;
282

283
	status = efi_get_memory_map(sys_table_arg, &boot_map);
284 285 286
	if (status != EFI_SUCCESS)
		goto fail;

287
	/*
288 289 290 291
	 * Enforce minimum alignment that EFI or Linux requires when
	 * requesting a specific address.  We are doing page-based (or
	 * larger) allocations, and both the address and size must meet
	 * alignment constraints.
292
	 */
293 294
	if (align < EFI_ALLOC_ALIGN)
		align = EFI_ALLOC_ALIGN;
295

296 297
	size = round_up(size, EFI_ALLOC_ALIGN);
	nr_pages = size / EFI_PAGE_SIZE;
298 299 300 301 302
	for (i = 0; i < map_size / desc_size; i++) {
		efi_memory_desc_t *desc;
		unsigned long m = (unsigned long)map;
		u64 start, end;

303
		desc = efi_early_memdesc_ptr(m, desc_size, i);
304 305 306 307 308 309 310 311

		if (desc->type != EFI_CONVENTIONAL_MEMORY)
			continue;

		if (desc->num_pages < nr_pages)
			continue;

		start = desc->phys_addr;
312
		end = start + desc->num_pages * EFI_PAGE_SIZE;
313 314 315 316 317 318 319 320 321 322 323 324 325

		/*
		 * Don't allocate at 0x0. It will confuse code that
		 * checks pointers against NULL. Skip the first 8
		 * bytes so we start at a nice even number.
		 */
		if (start == 0x0)
			start += 8;

		start = round_up(start, align);
		if ((start + size) > end)
			continue;

326 327 328
		status = efi_call_early(allocate_pages,
					EFI_ALLOCATE_ADDRESS, EFI_LOADER_DATA,
					nr_pages, &start);
329 330 331 332 333 334 335 336 337
		if (status == EFI_SUCCESS) {
			*addr = start;
			break;
		}
	}

	if (i == map_size / desc_size)
		status = EFI_NOT_FOUND;

338
	efi_call_early(free_pool, map);
339 340 341 342
fail:
	return status;
}

343 344
void efi_free(efi_system_table_t *sys_table_arg, unsigned long size,
	      unsigned long addr)
345 346 347
{
	unsigned long nr_pages;

348 349 350
	if (!size)
		return;

351
	nr_pages = round_up(size, EFI_ALLOC_ALIGN) / EFI_PAGE_SIZE;
352
	efi_call_early(free_pages, addr, nr_pages);
353 354
}

355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417
static efi_status_t efi_file_size(efi_system_table_t *sys_table_arg, void *__fh,
				  efi_char16_t *filename_16, void **handle,
				  u64 *file_sz)
{
	efi_file_handle_t *h, *fh = __fh;
	efi_file_info_t *info;
	efi_status_t status;
	efi_guid_t info_guid = EFI_FILE_INFO_ID;
	unsigned long info_sz;

	status = efi_call_proto(efi_file_handle, open, fh, &h, filename_16,
				EFI_FILE_MODE_READ, (u64)0);
	if (status != EFI_SUCCESS) {
		efi_printk(sys_table_arg, "Failed to open file: ");
		efi_char16_printk(sys_table_arg, filename_16);
		efi_printk(sys_table_arg, "\n");
		return status;
	}

	*handle = h;

	info_sz = 0;
	status = efi_call_proto(efi_file_handle, get_info, h, &info_guid,
				&info_sz, NULL);
	if (status != EFI_BUFFER_TOO_SMALL) {
		efi_printk(sys_table_arg, "Failed to get file info size\n");
		return status;
	}

grow:
	status = efi_call_early(allocate_pool, EFI_LOADER_DATA,
				info_sz, (void **)&info);
	if (status != EFI_SUCCESS) {
		efi_printk(sys_table_arg, "Failed to alloc mem for file info\n");
		return status;
	}

	status = efi_call_proto(efi_file_handle, get_info, h, &info_guid,
				&info_sz, info);
	if (status == EFI_BUFFER_TOO_SMALL) {
		efi_call_early(free_pool, info);
		goto grow;
	}

	*file_sz = info->file_size;
	efi_call_early(free_pool, info);

	if (status != EFI_SUCCESS)
		efi_printk(sys_table_arg, "Failed to get initrd info\n");

	return status;
}

static efi_status_t efi_file_read(void *handle, unsigned long *size, void *addr)
{
	return efi_call_proto(efi_file_handle, read, handle, size, addr);
}

static efi_status_t efi_file_close(void *handle)
{
	return efi_call_proto(efi_file_handle, close, handle);
}

418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445
static efi_status_t efi_open_volume(efi_system_table_t *sys_table_arg,
				    efi_loaded_image_t *image,
				    efi_file_handle_t **__fh)
{
	efi_file_io_interface_t *io;
	efi_file_handle_t *fh;
	efi_guid_t fs_proto = EFI_FILE_SYSTEM_GUID;
	efi_status_t status;
	void *handle = (void *)(unsigned long)efi_table_attr(efi_loaded_image,
							     device_handle,
							     image);

	status = efi_call_early(handle_protocol, handle,
				&fs_proto, (void **)&io);
	if (status != EFI_SUCCESS) {
		efi_printk(sys_table_arg, "Failed to handle fs_proto\n");
		return status;
	}

	status = efi_call_proto(efi_file_io_interface, open_volume, io, &fh);
	if (status != EFI_SUCCESS)
		efi_printk(sys_table_arg, "Failed to open volume\n");
	else
		*__fh = fh;

	return status;
}

446 447 448 449 450 451 452 453
/*
 * Parse the ASCII string 'cmdline' for EFI options, denoted by the efi=
 * option, e.g. efi=nochunk.
 *
 * It should be noted that efi= is parsed in two very different
 * environments, first in the early boot environment of the EFI boot
 * stub, and subsequently during the kernel boot.
 */
454
efi_status_t efi_parse_options(char const *cmdline)
455 456 457
{
	char *str;

458 459 460
	str = strstr(cmdline, "nokaslr");
	if (str == cmdline || (str && str > cmdline && *(str - 1) == ' '))
		__nokaslr = 1;
461

462 463 464 465
	str = strstr(cmdline, "quiet");
	if (str == cmdline || (str && str > cmdline && *(str - 1) == ' '))
		__quiet = 1;

466 467 468 469 470 471 472 473 474 475 476 477 478 479 480
	/*
	 * If no EFI parameters were specified on the cmdline we've got
	 * nothing to do.
	 */
	str = strstr(cmdline, "efi=");
	if (!str)
		return EFI_SUCCESS;

	/* Skip ahead to first argument */
	str += strlen("efi=");

	/*
	 * Remember, because efi= is also used by the kernel we need to
	 * skip over arguments we don't understand.
	 */
481
	while (*str && *str != ' ') {
482 483 484 485 486
		if (!strncmp(str, "nochunk", 7)) {
			str += strlen("nochunk");
			__chunk_size = -1UL;
		}

487 488 489 490 491
		if (!strncmp(str, "novamap", 7)) {
			str += strlen("novamap");
			__novamap = 1;
		}

492
		/* Group words together, delimited by "," */
493
		while (*str && *str != ' ' && *str != ',')
494 495 496 497 498 499 500 501
			str++;

		if (*str == ',')
			str++;
	}

	return EFI_SUCCESS;
}
502 503

/*
504
 * Check the cmdline for a LILO-style file= arguments.
505
 *
506 507
 * We only support loading a file from the same filesystem as
 * the kernel image.
508
 */
509 510 511 512 513 514
efi_status_t handle_cmdline_files(efi_system_table_t *sys_table_arg,
				  efi_loaded_image_t *image,
				  char *cmd_line, char *option_string,
				  unsigned long max_addr,
				  unsigned long *load_addr,
				  unsigned long *load_size)
515
{
516 517 518
	struct file_info *files;
	unsigned long file_addr;
	u64 file_size_total;
L
Leif Lindholm 已提交
519
	efi_file_handle_t *fh = NULL;
520
	efi_status_t status;
521
	int nr_files;
522 523 524
	char *str;
	int i, j, k;

525 526
	file_addr = 0;
	file_size_total = 0;
527

528
	str = cmd_line;
529 530 531

	j = 0;			/* See close_handles */

532 533 534 535 536 537
	if (!load_addr || !load_size)
		return EFI_INVALID_PARAMETER;

	*load_addr = 0;
	*load_size = 0;

538 539 540
	if (!str || !*str)
		return EFI_SUCCESS;

541
	for (nr_files = 0; *str; nr_files++) {
542
		str = strstr(str, option_string);
543 544 545
		if (!str)
			break;

546
		str += strlen(option_string);
547 548 549 550 551 552 553 554 555

		/* Skip any leading slashes */
		while (*str == '/' || *str == '\\')
			str++;

		while (*str && *str != ' ' && *str != '\n')
			str++;
	}

556
	if (!nr_files)
557 558
		return EFI_SUCCESS;

559 560
	status = efi_call_early(allocate_pool, EFI_LOADER_DATA,
				nr_files * sizeof(*files), (void **)&files);
561
	if (status != EFI_SUCCESS) {
562
		pr_efi_err(sys_table_arg, "Failed to alloc mem for file handle list\n");
563 564 565
		goto fail;
	}

566
	str = cmd_line;
567 568
	for (i = 0; i < nr_files; i++) {
		struct file_info *file;
569 570 571
		efi_char16_t filename_16[256];
		efi_char16_t *p;

572
		str = strstr(str, option_string);
573 574 575
		if (!str)
			break;

576
		str += strlen(option_string);
577

578
		file = &files[i];
579 580 581 582 583 584 585 586 587 588 589 590
		p = filename_16;

		/* Skip any leading slashes */
		while (*str == '/' || *str == '\\')
			str++;

		while (*str && *str != ' ' && *str != '\n') {
			if ((u8 *)p >= (u8 *)filename_16 + sizeof(filename_16))
				break;

			if (*str == '/') {
				*p++ = '\\';
591
				str++;
592 593 594 595 596 597 598 599 600
			} else {
				*p++ = *str++;
			}
		}

		*p = '\0';

		/* Only open the volume once. */
		if (!i) {
601
			status = efi_open_volume(sys_table_arg, image, &fh);
602
			if (status != EFI_SUCCESS)
603
				goto free_files;
604 605
		}

606 607 608
		status = efi_file_size(sys_table_arg, fh, filename_16,
				       (void **)&file->handle, &file->size);
		if (status != EFI_SUCCESS)
609 610
			goto close_handles;

611
		file_size_total += file->size;
612 613
	}

614
	if (file_size_total) {
615 616 617
		unsigned long addr;

		/*
618 619 620
		 * Multiple files need to be at consecutive addresses in memory,
		 * so allocate enough memory for all the files.  This is used
		 * for loading multiple files.
621
		 */
622 623
		status = efi_high_alloc(sys_table_arg, file_size_total, 0x1000,
				    &file_addr, max_addr);
624
		if (status != EFI_SUCCESS) {
625
			pr_efi_err(sys_table_arg, "Failed to alloc highmem for files\n");
626 627 628 629
			goto close_handles;
		}

		/* We've run out of free low memory. */
630
		if (file_addr > max_addr) {
631
			pr_efi_err(sys_table_arg, "We've run out of free low memory\n");
632
			status = EFI_INVALID_PARAMETER;
633
			goto free_file_total;
634 635
		}

636 637
		addr = file_addr;
		for (j = 0; j < nr_files; j++) {
638
			unsigned long size;
639

640
			size = files[j].size;
641
			while (size) {
642
				unsigned long chunksize;
643 644

				if (IS_ENABLED(CONFIG_X86) && size > __chunk_size)
645
					chunksize = __chunk_size;
646 647
				else
					chunksize = size;
648

649
				status = efi_file_read(files[j].handle,
650 651
						       &chunksize,
						       (void *)addr);
652
				if (status != EFI_SUCCESS) {
653
					pr_efi_err(sys_table_arg, "Failed to read file\n");
654
					goto free_file_total;
655 656 657 658 659
				}
				addr += chunksize;
				size -= chunksize;
			}

660
			efi_file_close(files[j].handle);
661 662 663 664
		}

	}

665
	efi_call_early(free_pool, files);
666

667 668
	*load_addr = file_addr;
	*load_size = file_size_total;
669 670 671

	return status;

672 673
free_file_total:
	efi_free(sys_table_arg, file_size_total, file_addr);
674 675 676

close_handles:
	for (k = j; k < i; k++)
677
		efi_file_close(files[k].handle);
678
free_files:
679
	efi_call_early(free_pool, files);
680
fail:
681 682
	*load_addr = 0;
	*load_size = 0;
683 684 685

	return status;
}
686 687 688 689 690 691 692 693 694 695
/*
 * Relocate a kernel image, either compressed or uncompressed.
 * In the ARM64 case, all kernel images are currently
 * uncompressed, and as such when we relocate it we need to
 * allocate additional space for the BSS segment. Any low
 * memory that this function should avoid needs to be
 * unavailable in the EFI memory map, as if the preferred
 * address is not available the lowest available address will
 * be used.
 */
696 697 698 699 700 701
efi_status_t efi_relocate_kernel(efi_system_table_t *sys_table_arg,
				 unsigned long *image_addr,
				 unsigned long image_size,
				 unsigned long alloc_size,
				 unsigned long preferred_addr,
				 unsigned long alignment)
702
{
703 704
	unsigned long cur_image_addr;
	unsigned long new_addr = 0;
705
	efi_status_t status;
706 707 708 709 710 711 712 713 714
	unsigned long nr_pages;
	efi_physical_addr_t efi_addr = preferred_addr;

	if (!image_addr || !image_size || !alloc_size)
		return EFI_INVALID_PARAMETER;
	if (alloc_size < image_size)
		return EFI_INVALID_PARAMETER;

	cur_image_addr = *image_addr;
715 716 717

	/*
	 * The EFI firmware loader could have placed the kernel image
718 719 720 721 722
	 * anywhere in memory, but the kernel has restrictions on the
	 * max physical address it can run at.  Some architectures
	 * also have a prefered address, so first try to relocate
	 * to the preferred address.  If that fails, allocate as low
	 * as possible while respecting the required alignment.
723
	 */
724
	nr_pages = round_up(alloc_size, EFI_ALLOC_ALIGN) / EFI_PAGE_SIZE;
725 726 727
	status = efi_call_early(allocate_pages,
				EFI_ALLOCATE_ADDRESS, EFI_LOADER_DATA,
				nr_pages, &efi_addr);
728 729 730 731 732
	new_addr = efi_addr;
	/*
	 * If preferred address allocation failed allocate as low as
	 * possible.
	 */
733
	if (status != EFI_SUCCESS) {
734 735 736 737
		status = efi_low_alloc(sys_table_arg, alloc_size, alignment,
				       &new_addr);
	}
	if (status != EFI_SUCCESS) {
738
		pr_efi_err(sys_table_arg, "Failed to allocate usable memory for kernel.\n");
739
		return status;
740 741
	}

742 743 744 745 746
	/*
	 * We know source/dest won't overlap since both memory ranges
	 * have been allocated by UEFI, so we can safely use memcpy.
	 */
	memcpy((void *)new_addr, (void *)cur_image_addr, image_size);
747

748 749
	/* Return the new address of the relocated image. */
	*image_addr = new_addr;
750 751 752

	return status;
}
753

754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802
/*
 * Get the number of UTF-8 bytes corresponding to an UTF-16 character.
 * This overestimates for surrogates, but that is okay.
 */
static int efi_utf8_bytes(u16 c)
{
	return 1 + (c >= 0x80) + (c >= 0x800);
}

/*
 * Convert an UTF-16 string, not necessarily null terminated, to UTF-8.
 */
static u8 *efi_utf16_to_utf8(u8 *dst, const u16 *src, int n)
{
	unsigned int c;

	while (n--) {
		c = *src++;
		if (n && c >= 0xd800 && c <= 0xdbff &&
		    *src >= 0xdc00 && *src <= 0xdfff) {
			c = 0x10000 + ((c & 0x3ff) << 10) + (*src & 0x3ff);
			src++;
			n--;
		}
		if (c >= 0xd800 && c <= 0xdfff)
			c = 0xfffd; /* Unmatched surrogate */
		if (c < 0x80) {
			*dst++ = c;
			continue;
		}
		if (c < 0x800) {
			*dst++ = 0xc0 + (c >> 6);
			goto t1;
		}
		if (c < 0x10000) {
			*dst++ = 0xe0 + (c >> 12);
			goto t2;
		}
		*dst++ = 0xf0 + (c >> 18);
		*dst++ = 0x80 + ((c >> 12) & 0x3f);
	t2:
		*dst++ = 0x80 + ((c >> 6) & 0x3f);
	t1:
		*dst++ = 0x80 + (c & 0x3f);
	}

	return dst;
}

803 804 805 806
#ifndef MAX_CMDLINE_ADDRESS
#define MAX_CMDLINE_ADDRESS	ULONG_MAX
#endif

807 808 809 810 811
/*
 * Convert the unicode UEFI command line to ASCII to pass to kernel.
 * Size of memory allocated return in *cmd_line_len.
 * Returns NULL on error.
 */
812 813 814
char *efi_convert_cmdline(efi_system_table_t *sys_table_arg,
			  efi_loaded_image_t *image,
			  int *cmd_line_len)
815
{
816
	const u16 *s2;
817 818
	u8 *s1 = NULL;
	unsigned long cmdline_addr = 0;
819 820 821 822
	int load_options_chars = image->load_options_size / 2; /* UTF-16 */
	const u16 *options = image->load_options;
	int options_bytes = 0;  /* UTF-8 bytes */
	int options_chars = 0;  /* UTF-16 chars */
823 824 825 826 827
	efi_status_t status;
	u16 zero = 0;

	if (options) {
		s2 = options;
828 829 830 831
		while (*s2 && *s2 != '\n'
		       && options_chars < load_options_chars) {
			options_bytes += efi_utf8_bytes(*s2++);
			options_chars++;
832 833 834
		}
	}

835
	if (!options_chars) {
836 837 838 839
		/* No command line options, so return empty string*/
		options = &zero;
	}

840
	options_bytes++;	/* NUL termination */
L
Leif Lindholm 已提交
841

842 843
	status = efi_high_alloc(sys_table_arg, options_bytes, 0,
				&cmdline_addr, MAX_CMDLINE_ADDRESS);
844 845 846 847
	if (status != EFI_SUCCESS)
		return NULL;

	s1 = (u8 *)cmdline_addr;
848
	s2 = (const u16 *)options;
849

850
	s1 = efi_utf16_to_utf8(s1, s2, options_chars);
851 852
	*s1 = '\0';

853
	*cmd_line_len = options_bytes;
854 855
	return (char *)cmdline_addr;
}
856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928

/*
 * Handle calling ExitBootServices according to the requirements set out by the
 * spec.  Obtains the current memory map, and returns that info after calling
 * ExitBootServices.  The client must specify a function to perform any
 * processing of the memory map data prior to ExitBootServices.  A client
 * specific structure may be passed to the function via priv.  The client
 * function may be called multiple times.
 */
efi_status_t efi_exit_boot_services(efi_system_table_t *sys_table_arg,
				    void *handle,
				    struct efi_boot_memmap *map,
				    void *priv,
				    efi_exit_boot_map_processing priv_func)
{
	efi_status_t status;

	status = efi_get_memory_map(sys_table_arg, map);

	if (status != EFI_SUCCESS)
		goto fail;

	status = priv_func(sys_table_arg, map, priv);
	if (status != EFI_SUCCESS)
		goto free_map;

	status = efi_call_early(exit_boot_services, handle, *map->key_ptr);

	if (status == EFI_INVALID_PARAMETER) {
		/*
		 * The memory map changed between efi_get_memory_map() and
		 * exit_boot_services().  Per the UEFI Spec v2.6, Section 6.4:
		 * EFI_BOOT_SERVICES.ExitBootServices we need to get the
		 * updated map, and try again.  The spec implies one retry
		 * should be sufficent, which is confirmed against the EDK2
		 * implementation.  Per the spec, we can only invoke
		 * get_memory_map() and exit_boot_services() - we cannot alloc
		 * so efi_get_memory_map() cannot be used, and we must reuse
		 * the buffer.  For all practical purposes, the headroom in the
		 * buffer should account for any changes in the map so the call
		 * to get_memory_map() is expected to succeed here.
		 */
		*map->map_size = *map->buff_size;
		status = efi_call_early(get_memory_map,
					map->map_size,
					*map->map,
					map->key_ptr,
					map->desc_size,
					map->desc_ver);

		/* exit_boot_services() was called, thus cannot free */
		if (status != EFI_SUCCESS)
			goto fail;

		status = priv_func(sys_table_arg, map, priv);
		/* exit_boot_services() was called, thus cannot free */
		if (status != EFI_SUCCESS)
			goto fail;

		status = efi_call_early(exit_boot_services, handle, *map->key_ptr);
	}

	/* exit_boot_services() was called, thus cannot free */
	if (status != EFI_SUCCESS)
		goto fail;

	return EFI_SUCCESS;

free_map:
	efi_call_early(free_pool, *map->map);
fail:
	return status;
}
929 930 931 932 933 934 935 936 937 938 939 940 941 942 943

void *get_efi_config_table(efi_system_table_t *sys_table, efi_guid_t guid)
{
	efi_config_table_t *tables = (efi_config_table_t *)sys_table->tables;
	int i;

	for (i = 0; i < sys_table->nr_tables; i++) {
		if (efi_guidcmp(tables[i].guid, guid) != 0)
			continue;

		return (void *)tables[i].table;
	}

	return NULL;
}