On 4/12/19 10:38 AM, AKASHI Takahiro wrote: > On Fri, Apr 12, 2019 at 07:53:25AM +0200, Heinrich Schuchardt wrote: >> On 3/27/19 5:40 AM, AKASHI Takahiro wrote: >>> In the current implementation, bootefi command and EFI boot manager >>> don't use load_image API, instead, use more primitive and internal >>> functions. This will introduce duplicated code and potentially >>> unknown bugs as well as inconsistent behaviours. >>> >>> With this patch, do_efibootmgr() and do_boot_efi() are completely >>> overhauled and re-implemented using load_image API. >>> >>> Signed-off-by: AKASHI Takahiro <takahiro.aka...@linaro.org> >>> --- >>> cmd/bootefi.c | 199 +++++++++++++++++++--------------- >>> include/efi_loader.h | 5 +- >>> lib/efi_loader/efi_bootmgr.c | 43 ++++---- >>> lib/efi_loader/efi_boottime.c | 1 + >>> 4 files changed, 138 insertions(+), 110 deletions(-) >>> >>> diff --git a/cmd/bootefi.c b/cmd/bootefi.c >>> index 39a0712af6ad..17dccd718008 100644 >>> --- a/cmd/bootefi.c >>> +++ b/cmd/bootefi.c >>> @@ -224,88 +224,43 @@ static efi_status_t efi_install_fdt(const char >>> *fdt_opt) >>> /** >>> * do_bootefi_exec() - execute EFI binary >>> * >>> - * @efi: address of the binary >>> - * @device_path: path of the device from which the binary was loaded >>> - * @image_path: device path of the binary >>> + * @handle: handle of loaded image >>> * Return: status code >>> * >>> * Load the EFI binary into a newly assigned memory unwinding the >>> relocation >>> * information, install the loaded image protocol, and call the binary. >>> */ >>> -static efi_status_t do_bootefi_exec(void *efi, >>> - struct efi_device_path *device_path, >>> - struct efi_device_path *image_path) >>> +static efi_status_t do_bootefi_exec(efi_handle_t handle) >>> { >>> - efi_handle_t mem_handle = NULL; >>> - struct efi_device_path *memdp = NULL; >>> - efi_status_t ret; >>> struct efi_loaded_image_obj *image_obj = NULL; >>> struct efi_loaded_image *loaded_image_info = NULL; >>> - >>> - /* >>> - * Special case for efi payload not loaded from disk, such as >>> - * 'bootefi hello' or for example payload loaded directly into >>> - * memory via JTAG, etc: >>> - */ >>> - if (!device_path && !image_path) { >>> - printf("WARNING: using memory device/image path, this may >>> confuse some payloads!\n"); >>> - /* actual addresses filled in after efi_load_pe() */ >>> - memdp = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, 0, 0); >>> - device_path = image_path = memdp; >>> - /* >>> - * Grub expects that the device path of the loaded image is >>> - * installed on a handle. >>> - */ >>> - ret = efi_create_handle(&mem_handle); >>> - if (ret != EFI_SUCCESS) >>> - return ret; /* TODO: leaks device_path */ >>> - ret = efi_add_protocol(mem_handle, &efi_guid_device_path, >>> - device_path); >>> - if (ret != EFI_SUCCESS) >>> - goto err_add_protocol; >>> - } else { >>> - assert(device_path && image_path); >>> - } >>> - >>> - ret = efi_setup_loaded_image(device_path, image_path, &image_obj, >>> - &loaded_image_info); >>> - if (ret) >>> - goto err_prepare; >>> + efi_status_t ret; >>> >>> /* Transfer environment variable as load options */ >>> - set_load_options(loaded_image_info, "bootargs"); >>> - >>> - /* Load the EFI payload */ >>> - ret = efi_load_pe(image_obj, efi, loaded_image_info); >>> + ret = EFI_CALL(systab.boottime->open_protocol( >>> + handle, >>> + &efi_guid_loaded_image, >>> + (void **)&loaded_image_info, >>> + NULL, NULL, >>> + EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL)); >>> if (ret != EFI_SUCCESS) >>> - goto err_prepare; >>> - >>> - if (memdp) { >>> - struct efi_device_path_memory *mdp = (void *)memdp; >>> - mdp->memory_type = loaded_image_info->image_code_type; >>> - mdp->start_address = (uintptr_t)loaded_image_info->image_base; >>> - mdp->end_address = mdp->start_address + >>> - loaded_image_info->image_size; >>> - } >>> + goto err; >>> + set_load_options(loaded_image_info, "bootargs"); >>> >>> /* we don't support much: */ >>> >>> env_set("efi_8be4df61-93ca-11d2-aa0d-00e098032b8c_OsIndicationsSupported", >>> "{ro,boot}(blob)0000000000000000"); >>> >>> /* Call our payload! */ >>> + image_obj = container_of(handle, struct efi_loaded_image_obj, header); >> This is not needed, if we remove the debug statement. >> >>> debug("%s: Jumping to 0x%p\n", __func__, image_obj->entry); >> That line should go to StartImage() if needed. Please, drop it here. >> >>> - ret = EFI_CALL(efi_start_image(&image_obj->header, NULL, NULL)); >>> + ret = EFI_CALL(efi_start_image(handle, NULL, NULL)); >>> >>> -err_prepare: >>> - /* image has returned, loaded-image obj goes *poof*: */ >>> efi_restore_gd(); >>> free(loaded_image_info->load_options); >>> - efi_delete_handle(&image_obj->header); >>> - >>> -err_add_protocol: >>> - if (mem_handle) >>> - efi_delete_handle(mem_handle); >>> + efi_free_pool(loaded_image_info); >> >> Wouldn't this be done by unload_image()? > > but we should not call unload_image(), efi_exit() does. Right? > Yes, correct.
>>> >>> +err: >>> return ret; >>> } >>> >>> @@ -319,8 +274,7 @@ err_add_protocol: >>> */ >>> static int do_efibootmgr(const char *fdt_opt) >>> { >>> - struct efi_device_path *device_path, *file_path; >>> - void *addr; >>> + efi_handle_t handle; >>> efi_status_t ret; >>> >>> /* Allow unaligned memory access */ >>> @@ -340,19 +294,21 @@ static int do_efibootmgr(const char *fdt_opt) >>> if (ret != EFI_SUCCESS) >>> return CMD_RET_FAILURE; >>> >>> - addr = efi_bootmgr_load(&device_path, &file_path); >>> - if (!addr) >>> - return 1; >>> + ret = efi_bootmgr_load(&handle); >>> + if (ret != EFI_SUCCESS) { >>> + printf("EFI boot manager: Cannot load any image\n"); >>> + return CMD_RET_FAILURE; >>> + } >>> >>> - printf("## Starting EFI application at %p ...\n", addr); >>> - ret = do_bootefi_exec(addr, device_path, file_path); >>> - printf("## Application terminated, r = %lu\n", >>> - ret & ~EFI_ERROR_MASK); >>> + ret = do_bootefi_exec(handle); >>> + printf("## Application terminated, r = %lu\n", ret & ~EFI_ERROR_MASK); >>> + >>> + EFI_CALL(efi_unload_image(handle)); >> >> Only applications have to be unloaded, not drivers. Unloading is to be >> handled by exit(), see UEFI spec. > > How do we know whether the loaded image is an application, or driver? In efi_load_pe() we should evaluate the field opt->Subsystem describing the "Windows Subsystem". I once started on this but then I saw that cmd/bootefi.c needed to be cleaned up first: https://github.com/xypron/u-boot-patches/blob/efi-next/0001-efi_loader-implement-UnloadImage.patch > >>> >>> if (ret != EFI_SUCCESS) >>> - return 1; >>> + return CMD_RET_FAILURE; >>> >>> - return 0; >>> + return CMD_RET_SUCCESS; >>> } >>> >>> /* >>> @@ -367,10 +323,14 @@ static int do_efibootmgr(const char *fdt_opt) >>> */ >>> static int do_boot_efi(const char *image_opt, const char *fdt_opt) >>> { >>> - unsigned long addr; >>> - char *saddr; >>> + void *image_buf; >>> + struct efi_device_path *device_path, *image_path; >>> + struct efi_device_path *memdp = NULL, *file_path = NULL; >>> + const char *saddr; >>> + unsigned long addr, size; >>> + const char *size_str; >>> + efi_handle_t mem_handle = NULL, handle; >>> efi_status_t ret; >>> - unsigned long fdt_addr; >>> >>> /* Allow unaligned memory access */ >>> allow_unaligned(); >>> @@ -390,36 +350,96 @@ static int do_boot_efi(const char *image_opt, const >>> char *fdt_opt) >>> return CMD_RET_FAILURE; >>> >>> #ifdef CONFIG_CMD_BOOTEFI_HELLO >>> - if (!strcmp(argv[1], "hello")) { >>> - ulong size = __efi_helloworld_end - __efi_helloworld_begin; >>> - >>> + if (!strcmp(image_opt, "hello")) { >>> saddr = env_get("loadaddr"); >>> + size = __efi_helloworld_end - __efi_helloworld_begin; >>> + >>> if (saddr) >>> addr = simple_strtoul(saddr, NULL, 16); >>> else >>> addr = CONFIG_SYS_LOAD_ADDR; >>> - memcpy(map_sysmem(addr, size), __efi_helloworld_begin, size); >>> + >>> + image_buf = map_sysmem(addr, size); >>> + memcpy(image_buf, __efi_helloworld_begin, size); >>> + >>> + device_path = NULL; >>> + image_path = NULL; >>> } else >>> #endif >>> { >>> - saddr = argv[1]; >>> + saddr = image_opt; >>> + size_str = env_get("filesize"); >>> + if (size_str) >>> + size = simple_strtoul(size_str, NULL, 16); >>> + else >>> + size = 0; >>> >>> addr = simple_strtoul(saddr, NULL, 16); >>> /* Check that a numeric value was passed */ >>> if (!addr && *saddr != '0') >>> return CMD_RET_USAGE; >>> + >>> + image_buf = map_sysmem(addr, size); >>> + >>> + device_path = bootefi_device_path; >>> + image_path = bootefi_image_path; >>> + } >>> + >>> + if (!device_path && !image_path) { >>> + /* >>> + * Special case for efi payload not loaded from disk, >>> + * such as 'bootefi hello' or for example payload >>> + * loaded directly into memory via JTAG, etc: >>> + */ >>> + printf("WARNING: using memory device/image path, this may >>> confuse some payloads!\n"); >>> + >>> + /* actual addresses filled in after efi_load_image() */ >>> + memdp = efi_dp_from_mem(EFI_RESERVED_MEMORY_TYPE, >>> + (uint64_t)image_buf, size); >>> + file_path = memdp; /* append(memdp, NULL) */ >>> + >>> + /* >>> + * Make sure that device for device_path exist >>> + * in load_image(). Otherwise, shell and grub will fail. >>> + */ >>> + ret = efi_create_handle(&mem_handle); >>> + if (ret != EFI_SUCCESS) >>> + /* TODO: leaks device_path */ >>> + goto err_add_protocol; >>> + >>> + ret = efi_add_protocol(mem_handle, &efi_guid_device_path, >>> + memdp); >>> + if (ret != EFI_SUCCESS) >>> + goto err_add_protocol; >>> + } else { >>> + assert(device_path && image_path); >>> + file_path = efi_dp_append(device_path, image_path); >>> } >>> >>> + ret = EFI_CALL(efi_load_image(false, (void *)0x1 /* FIXME */, >>> + file_path, image_buf, size, &handle)); >>> + if (ret != EFI_SUCCESS) >>> + goto err_prepare; >>> + >>> printf("## Starting EFI application at %08lx ...\n", addr); >>> - ret = do_bootefi_exec(map_sysmem(addr, 0), bootefi_device_path, >>> - bootefi_image_path); >>> - printf("## Application terminated, r = %lu\n", >>> - ret & ~EFI_ERROR_MASK); >>> + ret = do_bootefi_exec(handle); >>> + printf("## Application terminated, r = %lu\n", ret & ~EFI_ERROR_MASK); >> >> Why should we need all this duplicate code. Cant we move that to >> do_bootefi_exec()? >> >>> + >>> + EFI_CALL(efi_unload_image(handle)); >> >> That is the task of efi_exit(). > > Who should be blamed for reclaiming a handle which is created > with load_image()? > What if an application doesn't call efi_exit() by itself? When the last protocol interface is deleted from a handle via UninstallProtocolInterface() the handle is deleted. Best regards Heinrich > > -Takahiro Akashi > > >> Best regards >> >> Heinrich >> >>> +err_prepare: >>> + if (device_path) >>> + efi_free_pool(file_path); >>> + >>> +err_add_protocol: >>> + if (mem_handle) >>> + efi_delete_handle(mem_handle); >>> + if (memdp) >>> + efi_free_pool(memdp); >>> >>> if (ret != EFI_SUCCESS) >>> return CMD_RET_FAILURE; >>> - else >>> - return CMD_RET_SUCCESS; >>> + >>> + return CMD_RET_SUCCESS; >>> } >>> >>> #ifdef CONFIG_CMD_BOOTEFI_SELFTEST >>> @@ -577,7 +597,7 @@ static char bootefi_help_text[] = >>> " Use environment variable efi_selftest to select a single test.\n" >>> " Use 'setenv efi_selftest list' to enumerate all tests.\n" >>> #endif >>> - "bootefi bootmgr [fdt addr]\n" >>> + "bootefi bootmgr [fdt address]\n" >>> " - load and boot EFI payload based on BootOrder/BootXXXX variables.\n" >>> "\n" >>> " If specified, the device tree located at <fdt address> gets\n" >>> @@ -602,6 +622,13 @@ void efi_set_bootdev(const char *dev, const char >>> *devnr, const char *path) >>> ret = efi_dp_from_name(dev, devnr, path, &device, &image); >>> if (ret == EFI_SUCCESS) { >>> bootefi_device_path = device; >>> + if (image) { >>> + /* FIXME: image should not contain device */ >>> + struct efi_device_path *image_tmp = image; >>> + >>> + efi_dp_split_file_path(image, &device, &image); >>> + efi_free_pool(image_tmp); >>> + } >>> bootefi_image_path = image; >>> } else { >>> bootefi_device_path = NULL; >>> diff --git a/include/efi_loader.h b/include/efi_loader.h >>> index 6dfa2fef3cf0..6c09a7f40d02 100644 >>> --- a/include/efi_loader.h >>> +++ b/include/efi_loader.h >>> @@ -410,8 +410,6 @@ efi_status_t efi_setup_loaded_image(struct >>> efi_device_path *device_path, >>> struct efi_device_path *file_path, >>> struct efi_loaded_image_obj **handle_ptr, >>> struct efi_loaded_image **info_ptr); >>> -efi_status_t efi_load_image_from_path(struct efi_device_path *file_path, >>> - void **buffer, efi_uintn_t *size); >>> /* Print information about all loaded images */ >>> void efi_print_image_infos(void *pc); >>> >>> @@ -565,8 +563,7 @@ struct efi_load_option { >>> >>> void efi_deserialize_load_option(struct efi_load_option *lo, u8 *data); >>> unsigned long efi_serialize_load_option(struct efi_load_option *lo, u8 >>> **data); >>> -void *efi_bootmgr_load(struct efi_device_path **device_path, >>> - struct efi_device_path **file_path); >>> +efi_status_t efi_bootmgr_load(efi_handle_t *handle); >>> >>> #else /* CONFIG_IS_ENABLED(EFI_LOADER) */ >>> >>> diff --git a/lib/efi_loader/efi_bootmgr.c b/lib/efi_loader/efi_bootmgr.c >>> index 4fccadc5483d..13ec79b2098b 100644 >>> --- a/lib/efi_loader/efi_bootmgr.c >>> +++ b/lib/efi_loader/efi_bootmgr.c >>> @@ -120,14 +120,14 @@ static void *get_var(u16 *name, const efi_guid_t >>> *vendor, >>> * if successful. This checks that the EFI_LOAD_OPTION is active (enabled) >>> * and that the specified file to boot exists. >>> */ >>> -static void *try_load_entry(uint16_t n, struct efi_device_path >>> **device_path, >>> - struct efi_device_path **file_path) >>> +static efi_status_t try_load_entry(u16 n, efi_handle_t *handle) >>> { >>> struct efi_load_option lo; >>> u16 varname[] = L"Boot0000"; >>> u16 hexmap[] = L"0123456789ABCDEF"; >>> - void *load_option, *image = NULL; >>> + void *load_option; >>> efi_uintn_t size; >>> + efi_status_t ret; >>> >>> varname[4] = hexmap[(n & 0xf000) >> 12]; >>> varname[5] = hexmap[(n & 0x0f00) >> 8]; >>> @@ -136,19 +136,19 @@ static void *try_load_entry(uint16_t n, struct >>> efi_device_path **device_path, >>> >>> load_option = get_var(varname, &efi_global_variable_guid, &size); >>> if (!load_option) >>> - return NULL; >>> + return EFI_LOAD_ERROR; >>> >>> efi_deserialize_load_option(&lo, load_option); >>> >>> if (lo.attributes & LOAD_OPTION_ACTIVE) { >>> u32 attributes; >>> - efi_status_t ret; >>> >>> debug("%s: trying to load \"%ls\" from %pD\n", >>> __func__, lo.label, lo.file_path); >>> >>> - ret = efi_load_image_from_path(lo.file_path, &image, &size); >>> - >>> + ret = EFI_CALL(efi_load_image(false, (void *)0x1 /* FIXME */, >>> + lo.file_path, NULL, 0, >>> + handle)); >>> if (ret != EFI_SUCCESS) >>> goto error; >>> >>> @@ -159,17 +159,22 @@ static void *try_load_entry(uint16_t n, struct >>> efi_device_path **device_path, >>> L"BootCurrent", >>> (efi_guid_t *)&efi_global_variable_guid, >>> attributes, size, &n)); >>> - if (ret != EFI_SUCCESS) >>> + if (ret != EFI_SUCCESS) { >>> + if (EFI_CALL(efi_unload_image(*handle)) >>> + != EFI_SUCCESS) >>> + printf("Unloading image failed\n"); >>> goto error; >>> + } >>> >>> printf("Booting: %ls\n", lo.label); >>> - efi_dp_split_file_path(lo.file_path, device_path, file_path); >>> + } else { >>> + ret = EFI_LOAD_ERROR; >>> } >>> >>> error: >>> free(load_option); >>> >>> - return image; >>> + return ret; >>> } >>> >>> /* >>> @@ -177,12 +182,10 @@ error: >>> * EFI variable, the available load-options, finding and returning >>> * the first one that can be loaded successfully. >>> */ >>> -void *efi_bootmgr_load(struct efi_device_path **device_path, >>> - struct efi_device_path **file_path) >>> +efi_status_t efi_bootmgr_load(efi_handle_t *handle) >>> { >>> u16 bootnext, *bootorder; >>> efi_uintn_t size; >>> - void *image = NULL; >>> int i, num; >>> efi_status_t ret; >>> >>> @@ -209,10 +212,9 @@ void *efi_bootmgr_load(struct efi_device_path >>> **device_path, >>> /* load BootNext */ >>> if (ret == EFI_SUCCESS) { >>> if (size == sizeof(u16)) { >>> - image = try_load_entry(bootnext, device_path, >>> - file_path); >>> - if (image) >>> - return image; >>> + ret = try_load_entry(bootnext, handle); >>> + if (ret == EFI_SUCCESS) >>> + return ret; >>> } >>> } else { >>> printf("Deleting BootNext failed\n"); >>> @@ -223,19 +225,20 @@ void *efi_bootmgr_load(struct efi_device_path >>> **device_path, >>> bootorder = get_var(L"BootOrder", &efi_global_variable_guid, &size); >>> if (!bootorder) { >>> printf("BootOrder not defined\n"); >>> + ret = EFI_NOT_FOUND; >>> goto error; >>> } >>> >>> num = size / sizeof(uint16_t); >>> for (i = 0; i < num; i++) { >>> debug("%s: trying to load Boot%04X\n", __func__, bootorder[i]); >>> - image = try_load_entry(bootorder[i], device_path, file_path); >>> - if (image) >>> + ret = try_load_entry(bootorder[i], handle); >>> + if (ret == EFI_SUCCESS) >>> break; >>> } >>> >>> free(bootorder); >>> >>> error: >>> - return image; >>> + return ret; >>> } >>> diff --git a/lib/efi_loader/efi_boottime.c b/lib/efi_loader/efi_boottime.c >>> index 74da6b01054a..8e2fa0111591 100644 >>> --- a/lib/efi_loader/efi_boottime.c >>> +++ b/lib/efi_loader/efi_boottime.c >>> @@ -1610,6 +1610,7 @@ failure: >>> * @size: size of the loaded image >>> * Return: status code >>> */ >>> +static >>> efi_status_t efi_load_image_from_path(struct efi_device_path *file_path, >>> void **buffer, efi_uintn_t *size) >>> { >>> >> > _______________________________________________ U-Boot mailing list U-Boot@lists.denx.de https://lists.denx.de/listinfo/u-boot